Analysis of Digital Ethics and Student Data Security in the Use of Academic Information Systems
Authors
Department of Electrical Engineering and Informatics, Universitas Negeri Malang (Indonesia)
Department of Informatics Engineering, Politeknik Negeri Malang (Indonesia)
Article Information
DOI: 10.51244/IJRSI.2025.12110085
Subject Category: Social science
Volume/Issue: 12/11 | Page No: 921-929
Publication Timeline
Submitted: 2025-12-01
Accepted: 2025-12-05
Published: 2025-12-09
Abstract
The Academic Information System (SIAKAD) is a crucial digital infrastructure used to support academic administration processes in higher education. As technology utilization increases in data management, concerns regarding digital ethics and student information security are becoming increasingly important. This research effort aims to evaluate students' awareness of digital ethics, data security practices, and their level of trust in SIAKAD security. The study used a quantitative approach by distributing questionnaires to students, with analysis including descriptive statistics, validity tests, and reliability tests to map behavioral trends. The results indicate that students have a high level of digital ethics awareness, but this is not fully reflected in their security behaviors. Risky habits are still common, particularly storing passwords in browsers, using shared devices without protection, and not logging out after accessing SIAKAD. Furthermore, students' level of trust in system security is relatively low, particularly related to concerns about internal access and potential academic data leaks. The study recommends improving digital security literacy education, implementing multi-factor authentication, transparency of privacy policies, and adding security features to strengthen data protection and increase student trust in SIAKAD.
Keywords
Data Security, Digital ethics, SIAKAD, Student, Privacy
Downloads
References
1. Ahmed, A., & Thomas, R. (2022). Security awareness and behavioral inconsistency in academic information systems: A systematic review. IEEE Access, 10, 125233–125247. [Google Scholar] [Crossref]
2. Al-Khalifah, F. (2024). Multi-factor authentication adoption in higher education: Challenges and effectiveness. International Journal of Information Security Science, 13(1), 17–29. [Google Scholar] [Crossref]
3. Alzahrani, S. O. (2023). Factors influencing cybersecurity behavior of students in online academic systems. Heliyon, 9(2), e13122. [Google Scholar] [Crossref]
4. Andersen, P., & Davies, G. (2023). Ethical use of academic platforms: An integrative review. Education Digital Ethics Review. [Google Scholar] [Crossref]
5. Chen, H., & Zhao, Q. (2023). User authentication risks in web-based academic portals: A behavioral analysis. IEEE Transactions on Learning Technologies, 15(3), 360–372. [Google Scholar] [Crossref]
6. Cruickshank, M. (2024). Long-term effectiveness of security nudges in digital learning platforms. Computers & Security, 132, 103838. [Google Scholar] [Crossref]
7. Duggan, M., & Smith, P. (2023). Student privacy and the digital learning paradox: Behavioral gaps in higher education security practices. Computers & Security, 124, 103013. [Google Scholar] [Crossref]
8. Evans, R. (2024). Security habit formation in digital platforms: A behavioral perspective. Cyberpsychology, Behavior, and Social Networking, 14(2), 122–133. [Google Scholar] [Crossref]
9. Huang, L. (2023). Trust and avoidance behaviors in academic information systems. Journal of Educational Technology, 44(3), 215–229. [Google Scholar] [Crossref]
10. Islam, S. R., Hansen, T., & Karyda, M. (2022). Ethical considerations in learning analytics: Transparency, data minimization, and student trust. Computers in Human Behavior Reports, 6, 100205. [Google Scholar] [Crossref]
11. Karyda, M., Hansen, T., & Islam, S. (2022). Risk perceptions and behavioral inconsistency in young digital users. Computers in Human Behavior Reports, 6, 100214. [Google Scholar] [Crossref]
12. Mäkelä, P., & Salmela, T. (2022). The privacy paradox among university students using e-learning platforms. Information & Computer Security, 30(2), 295–312. [Google Scholar] [Crossref]
13. Molino, L., & Bennett, N. (2024). Digital ethics and privacy in higher education information systems. Journal of Higher Education Policy and Management, 46(1), 98–115. [Google Scholar] [Crossref]
14. National Institute of Standards and Technology. (2020). Security and privacy controls for information systems and organizations (NIST SP 800-53 Rev. 5). U.S. Department of Commerce. [Google Scholar] [Crossref]
15. Olvera, M. D. (2023). Human factor vulnerabilities in academic data systems: A behavioral risk assessment. Journal of Information Security and Applications, 70, 103548. [Google Scholar] [Crossref]
16. Özkan, Ç. A., & Yildirim, B. (2022). Investigating password hygiene among university students: An empirical assessment. Journal of Cybersecurity Education, 9(2), 45–60. [Google Scholar] [Crossref]
17. Pour, K. L., & Lee, A. J. (2024). Security nudges and habit formation in educational platforms. Computers & Education: Artificial Intelligence, 5, 100315. [Google Scholar] [Crossref]
18. Pratama, R. K. (2021). Information quality and system usability in university academic information systems. Journal of Information Education, 12(2), 44–56. [Google Scholar] [Crossref]
19. Shibata, N., & Sato, Y. (2024). Password reuse and authentication fatigue among college students. ACM Transactions on Privacy and Security, 27(1), 1–22. [Google Scholar] [Crossref]
20. Taufik, C. I. N., & Juhana, A. (2025). The privacy paradox of students’ personal data security in the digital age. SATESI: Jurnal Sains Teknologi dan Sistem Informasi, 5(1), 1–6. [Google Scholar] [Crossref]
21. Torres, E. M., & Miller, J. (2023). The role of institutional communication in improving student trust in academic information systems. Information Systems Education Journal, 22(4), 45–57. [Google Scholar] [Crossref]
22. Watini, S., Davies, G., & Andersen, N. (2024). Cybersecurity in learning systems: Data protection and privacy in educational information systems and digital learning environments. International Transactions on Education Technology, 4(1), 112–128. [Google Scholar] [Crossref]
23. White, B., & Tan, G. (2023). Understanding student data exposure risks in university information systems. IEEE Security & Privacy, 21(6), 67–75. [Google Scholar] [Crossref]
24. Woodward, J., & Caine, A. (2024). Student trust in educational data systems: A cross-institutional analysis. Education and Information Technologies, 29(3), 3555–3572. [Google Scholar] [Crossref]
Metrics
Views & Downloads
Similar Articles
- The Impact of Ownership Structure on Dividend Payout Policy of Listed Plantation Companies in Sri Lanka
- Urban Sustainability in North-East India: A Study through the lens of NER-SDG index
- Performance Assessment of Predictive Forecasting Techniques for Enhancing Hospital Supply Chain Efficiency in Healthcare Logistics
- The Fractured Self in Julian Barnes' Postmodern Fiction: Identity Crisis and Deflation in Metroland and the Sense of an Ending
- Impact of Flood on the Employment, Labour Productivity and Migration of Agricultural Labour in North Bihar