2023
DOI: 10.14569/ijacsa.2023.0140465
|View full text |Cite
|
Sign up to set email alerts
|

Employee Information Security Awareness in the Power Generation Sector of PT ABC

Abstract: Presidential Regulation No. 82 of 2022 demonstrates the Indonesian government's dedication to protecting Vital Information Infrastructure, which has become increasingly susceptible to cyber attacks. Intrusion detections at PT ABC reached 79,575 in 2021, and malware, botnets, targeted attacks, malicious websites/domains, and ransomware attacks may cause considerable financial losses. The implication of these incidents is that employees' awareness of information security is critical, in addition to security tech… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
0
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(5 citation statements)
references
References 16 publications
0
0
0
Order By: Relevance
“…The questionnaire was employed as the research instrument in this study, which incorporated results from prior scholarly publications and included citations [5]- [7], [10], [16]- [19]. The security question components of the questionnaire are derived from eight areas of the ISO/IEC 27001:2013 standard [7], [11] and seven main areas of the HAIS-Q [7], [18].…”
Section: B Research Methodsmentioning
confidence: 99%
See 4 more Smart Citations
“…The questionnaire was employed as the research instrument in this study, which incorporated results from prior scholarly publications and included citations [5]- [7], [10], [16]- [19]. The security question components of the questionnaire are derived from eight areas of the ISO/IEC 27001:2013 standard [7], [11] and seven main areas of the HAIS-Q [7], [18].…”
Section: B Research Methodsmentioning
confidence: 99%
“…The questionnaire was employed as the research instrument in this study, which incorporated results from prior scholarly publications and included citations [5]- [7], [10], [16]- [19]. The security question components of the questionnaire are derived from eight areas of the ISO/IEC 27001:2013 standard [7], [11] and seven main areas of the HAIS-Q [7], [18]. Password management, email usage, internet usage, social media usage, mobile device usage, information control, and incident reporting are among the seven domains that exhibit substantial overlap.…”
Section: B Research Methodsmentioning
confidence: 99%
See 3 more Smart Citations