Strategi Manajemen Sekuriti Untuk Meningkatkan Kepercayaan Pengguna Terhadap Transaksi E-Wallet
DOI:
https://doi.org/10.31599/3p9mf764Keywords:
Security Management, E-Wallet Transactions, Digital Security, Electronic Payment SystemsAbstract
Abstract: Implementing a security management strategy is essential to ensure the security of electronic transactions, particularly in the use of digital wallets. E-wallets have become one of the most popular solutions for conducting online transactions, but they are often vulnerable to cyber-attacks and identity theft. This paper aims to examine security management strategies and practices that can be used to strengthen user protection in e-wallet transactions. The methods applied include literature review and data collection to identify security threats often faced by e-wallet users and mitigation measures that can be taken to reduce these risks. The strategies discussed include data encryption, double authentication, suspicious transaction monitoring, and user training on digital security practices. It is expected that the understanding and implementation of these security management practices will provide better protection for e-wallet users and increase their confidence in utilizing electronic transaction services.
Downloads
Downloads
Published
Issue
Section
License
Please read and understand the copyright terms for submissions to this journal.
Copyright Notice
TheĀ Jurnal Keamanan NasionalĀ is under the Creative Commons Attribution 4.0 International (CC-BY 4.0) License, according to which:
1) Authors retain copyright and grant the journal the right to first publication, with the work simultaneously licensed under the Creative Commons Attribution (CC-BY 4.0) that allows the sharing of articles published with the acknowledgement of authorship and the initial publication in this journal.
2) The authors are authorized to make additional contracts separately for distribution of the version of the work published in this journal (for example, publication in an institutional repository or as a chapter of the book), as long as there is recognition of authorship and initial publication in this journal.
3) Authors are authorized and encouraged to publish and distribute their work online (for example, in institutional repositories or on their personal pages) at any time before or during the editorial process, as it increases the impact and reference of the published work.