PENGARUH CYBER SECURITY TERHADAP KESEHATAN MENTAL MAHASISWA PSIKOLOGI
Keywords:
Cyber Crime, Cyber Security, Mental HealthAbstract
The rapid development of Internet technology has led to the emergence of new crimes in this field, such as data manipulation, espionage, sabotage, provocation, money laundering, hacking, software theft or hardware theft and many other crimes. Even the level of internet crime (cybercrime) is not monitored by the government so it is difficult to control. The emergence of a number of cyber crime cases in Indonesia has become a threat to the stability of security and public order with a fairly high level of escalation. The aim of this research is to better understand technology so that it is not easily affected by cyber crime and that everyone's cyber security is better maintained. The method we used in preparing this research was literature study. The results of data information found from various journals show that cyber crime cases greatly affect the level of cyber security and mental health of each person.
Downloads
References
Melfianora, I., & Si, M. (n.d.). PENULISAN KARYA TULIS ILMIAH DENGAN STUDI LITERATUR.
http://banjirembun.blogspot.co.id/2012/04/penelitian-kepustakaan.html Susilawati. (2017). Kesehatan Mental Menurut Zakiah Daradjat . Universitas Islam Negeri
Raden Intan Lampung.
TINJAUAN MANAJEMEN KEPERCAYAAN, K. D. P. B. K. (n.d.). TINJAUAN MANAJEMEN KEPERCAYAAN, KEAMANAN DAN PRIVASI BAHASA KEBIJAKAN.
Karin Höne and J.H.P. Eloff. (n.d.). Information security policy – what do international information security standards say?
Ardiyanti, H. (n.d.). CYBER-SECURITY DAN TANTANGAN PENGEMBANGANNYA DI
INDONESIA. http://kominfo.go.id/index.php/content/detail/3980/
Azizah, M., Fitri, N. K., Maura, N., & Salsabila, J. (2023). Parade Riset Mahasiswa 2023 Psychological Security Dalam Dinamika Kehidupan Mahasiswa Fakultas Psikologi
Universitas Bhayangkara Jakarta Raya Bullying pada Trend Pick Me Girl/Boy di TikTok (Vol. 1, Issue 1). Cyber.
Budi, E., Wira, D., & Infantono, A. (2021). Strategi Penguatan Cyber Security Guna Mewujudkan Keamanan Nasional di Era Society 5.0. Prosiding Seminar Nasional Sains Teknologi Dan Inovasi Indonesia (SENASTINDO), 3, 223–234. https://doi.org/10.54706/senastindo.v3.2021.141
Furnell, S. M., Clarke, N., Werlinger, R., Hawkey, K., & Beznosov, K. (2009). An integrated view of human, organizational, and technological challenges of IT security management. Information Management & Computer Security, 17(1), 4–19. https://doi.org/10.1108/09685220910944722
Gumara, A., Muthmainah, B., & Sharon Prameswari, A. (2023). Kecemasan Pada Mahasiswa Pengguna Tiktok Yang Melakukan Self Diagnose (Vol. 1, Issue 1).
Hafid, A., & Sudyana, D. (n.d.). ANALISIS KESADARAN MAHASISWA UMRI TERKAIT PENGGUNAAN TEKNOLOGI & MEDIA SOSIAL TERHADAP BAHAYA CYBERCRIME.
Keamanan Siber Dalam Mengatasi Konten Negatif, P., Siagian, L., Budiarto, A., & Strategi Pertahanan Udara Universitas Pertahanan, P. (n.d.). THE ROLE OF CYBER SECURITY IN OVERCOME NEGATIVE CONTENTS TO REALIZE NATIONAL INFORMATION RESILIENCE.
Keamanan siber di tingkat organisa Anteseden untuk meningkatkan tingkat keamanan siber dalam organisasi. (n.d.). https://doi.org/10.1108/JEIM-06-2020-0
Kurniawan, F. A., & Solihin, K. (2022). Penguatan Manajemen Risiko Lembaga Keuangan Syariah Non-Bank dalam Menghadapi Ancaman Cyber Security. JIOSE: Journal of Indonesian Sharia Economics, 1(1), 1–20. https://doi.org/10.35878/jiose.v1i1.360
Rai, I. N. A. S., Heryadi, D., & Kamaluddin N., A. (2022). The Role of Indonesia to Create Security and Resilience in Cyber Spaces [Peran Indonesia dalam Membentuk Keamanan dan Ketahanan di Ruang Siber]. Jurnal Politica Dinamika Masalah Politik Dalam Negeri Dan Hubungan Internasional, 13(1), 43–66. https://doi.org/10.22212/jp.v13i1.2641
Samudra, Y., Hidayat, A., & Wahyu, M. F. (2023). AMMA : Jurnal Pengabdian Masyarakat Pengenalan Cyber Security Sebagai Fundamental Keamanan Data Pada Era Digital. Januari, 1(12). https://journal.mediapublikasi.id/index.php/amma
Soesanto, E., Saputra, F., Puspitasari, D., & Putra Danaya, B. (n.d.). Determinasi Sistem Manajemen Sekuriti: Analisis Objek Vital, Pengamanan File dan Pengamanan Cyber pada Yayasan Siber Publisher. 2(1). https://doi.org/10.38035/jim.v2i1
Zhao, X., Xue, L., & Whinston, A. (2013). Managing interdependent information security risks: Cyberinsurance, managed security services, and risk pooling arrangements. Journal of Management Information Systems, 30(1), 123–152. https://doi.org/10.2753/MIS0742-1222300104








