Archives

The Effect of Acceptance and Success of Information Security in UIN Syarif Hidayatullah Jakarta Using Technology Acceptance Model (TAM)


Yusuf Durahman,A’ang Subiyakto,Abdul Piqri
Abstract

Information security is an effort to secure information assets against threats that may arise. So that information security can indirectly guarantee business continuity, reduce the risks that occur, optimize return on investment. The more company or agency information stored, managed and shared, the greater the risk of damage, loss or exposure of data to unwanted external parties (Sarno & Iffano, 2009). The purpose of this research is to predict the factors that influence the acceptance and success of information security in UIN Syarif Hidayatullah Jakarta campus. This research method uses the TAM model by Delone & McLean (2003). Information Quality, System Quality, Service Quality, Intention To Use, User Satisfaction, Net Benefits. And several other variables from Davis, (1989) Perceived Usefulness, Perceived Easy Of Use, Usage Behavior, and Actual Use, with a quantitative approach. Questionnaires were distributed online and sample collection using quota sampling and snowball sampling techniques. Furthermore, the data obtained were analyzed using Ms. Excel 2016 and the PLS-SEM approach use SmartPLS 3.0. The results of this study were rejected four of 16 hypotheses, and 12 other hypotheses were accepted. So that the analysis proves that the 12 hypotheses affect the acceptance and success of information security.

Volume 12 | Issue 6

Pages: 2600-2607

DOI: 10.5373/JARDCS/V12I6/S20201218