Main Article Content

Abstract

The widespread use of Information and Communication Technology (ICT) has transformed social, economic, and everyday interactions, creating challenges in data security and individual privacy. This study explores aspects of data security and privacy within public administration in Indonesia, highlighting existing challenges, policies, and initiatives. The research methodology is a qualitative literature review encompassing journal articles, books, and research reports on data security and privacy. The findings indicate that cyber threats such as hacking, phishing, ransomware, and data breaches have led to financial losses, reputational damage, and privacy violations in Indonesia. The discussion of this research suggests that data security strategies, including security policies, encryption technology, firewalls, access controls, and risk management, are crucial for protecting sensitive information. Legislative measures, public awareness, and technological protection are necessary to balance technological benefits and the safety of individual rights, ensuring compliance with regulatory standards and enhancing public trust in government and organizations.

Keywords

Data Security Hacking Individual Privacy Ransomware Technological Protection

Article Details

How to Cite
Sari, J. A., Yuliani, I., Akadira, T., Sunarya, A., & Ating, R. (2024). Data Security and Individual Privacy from the Perspective of Public Administration. Ilomata International Journal of Social Science, 5(3), 818-830. https://doi.org/10.61194/ijss.v5i3.1297

References

  1. Adlini, M. N., Dinda, A. H., Yulinda, S., & Chotimah, O. (2022). Metode Penelitian Kualitatif Studi Pustaka. Jurnal Edumaspul, 6(1), 974–980. https://doi.org/10.33487/edumaspul.v6i1.3394
  2. Aji, M. P. (2023). Sistem Keamanan Siber dan Kedaulatan Data di Indonesia dalam Perspektif Ekonomi Politik (Studi Kasus Perlindungan Data Pribadi)[Cyber Security System and Data Sovereignty in Indonesia in Political Economic Perspective]. Jurnal Politica Dinamika Masalah Politik Dalam Negeri Dan Hubungan Internasional, 13(2), 222–238. https://doi.org/10.22212/jp.v13i2.3299
  3. Akhlaq, M., Mustafa, M. T., & Jahangir, H. A. (2022). Defending the Right to Privacy in the Digital Age. Journal of Policy Research, 8(4), 534–538. https://doi.org/10.61506/02.00006
  4. Alalawneh, A. A., Al-Omar, S. Y. S., & Alkhatib, S. (2022). The Complexity of Interaction between Social Media Platforms and Organizational Performance. Journal of Open Innovation: Technology, Market, and Complexity, 8(4), 169. https://doi.org/10.3390/joitmc8040169
  5. Antara. (2020). KPU checks data server security after personal data breach claim. https://en.antaranews.com/news/149115/kpu-checks-data-server-security-after-personal-data-breach-claim
  6. Bangsawan, G. (2023). Kebijakan Akselerasi Transformasi Digital di Indonesia: Peluang dan Tantangan untuk Pengembangan Ekonomi Kreatif. Jurnal Studi Kebijakan Publik, 2(1), 27–40. https://doi.org/10.21787/jskp.2.2023.27-40
  7. BBC News Indonesia. (2024). Pusat Data Nasional Sementara lumpuh akibat ransomware, mengapa instansi pemerintah masih rentan terhadap serangan siber? https://www.bbc.com/indonesia/articles/cxee2985jrvo
  8. Cai, J., & Dumlao, M. F. (2024). Research on the Integration Strategy of Enterprise Data Security Governance and Data Analysis Applications. Academic Journal of Business & Management, 6(5). https://doi.org/10.25236/AJBM.2024.060532
  9. Caimi, C., D’Errico, M., Gambardella, C., Manea, M., & Wainwright, N. (2015). Implementing Privacy Policies in the Cloud BT - Cyber Security and Privacy (F. Cleary & M. Felici (eds.); pp. 3–13). Springer International Publishing. https://doi.org/10.1007/978-3-319-25360-2_1
  10. Chaturvedi, M., Narain Singh, A., Prasad Gupta, M., & Bhattacharya, J. (2014). Analyses of issues of information security in Indian context. Transforming Government: People, Process and Policy, 8(3), 374–397. https://doi.org/10.1108/TG-07-2013-0019
  11. Concepcion, J. D., & Palaoag, T. D. (2024). An Assessment of Cybersecurity Awareness among Academic Employees at Quirino State University: Promoting Cyber Hygiene. Journal of Electrical Systems, 20(7), 769–775. https://doi.org/10.52783/jes.3445
  12. Darmalaksana, W. (2020). Metode penelitian kualitatif studi pustaka dan studi lapangan.
  13. de Hert, P., Papakonstantinou, V., Wright, D., & Gutwirth, S. (2013). The proposed Regulation and the construction of a principles-driven system for individual data protection. Innovation: The European Journal of Social Science Research, 26(1–2), 133–144. https://doi.org/10.1080/13511610.2013.734047
  14. Djuric, A. (2024). Challenges, Citizens’ Trust and Privacy Protection Models in e-Government Systems: Security and Privacy Perspective: Student paper. 2024 23rd International Symposium INFOTEH-JAHORINA (INFOTEH), 1–6. https://doi.org/10.1109/INFOTEH60418.2024.10495931
  15. Hoshmand, M. O., & Ratnawati, S. (2023). Analisis Keamanan Infrastruktur Teknologi Informasi dalam Menghadapi Ancaman Cybersecurity. Jurnal Sains Dan Teknologi, 5(2 SE-), 679–686. https://ejournal.sisfokomtek.org/index.php/saintek/article/view/2347
  16. Hyka, D., Hyra, A., Basholli, F., Mema, B., & Basholli, A. (2023). Data security in public and private administration: Challenges, trends, and effective protection in the era of digitalization.
  17. Indrajaya, T., Primasyah, D., Yulianti, S., Rosmiati, E., & Sova, M. (2022). Peran E-Bisnis Dalam Pengembangan UMKM. Jurnal Economina, 1(2), 239–247. https://doi.org/10.55681/economina.v1i2.73
  18. Javvaji, S. (2023). Surveillance technology: balancing security and privacy in the digital age. EPRA International Journal of Multidisciplinary Research (IJMR), 9(7), 178–185. https://doi.org/10.36713/epra13852
  19. Joshi, C., & Singh, U. K. (2017). Information security risks management framework – A step towards mitigating security risks in university network. Journal of Information Security and Applications, 35, 128–137. https://doi.org/https://doi.org/10.1016/j.jisa.2017.06.006
  20. Katadata. (2023). No TitleKominfo Catatkan 1.730 Kasus Penipuan Online, Kerugian Ratusan Triliun. https://katadata.co.id/digital/teknologi/63f8a599de801/kominfo-catatkan-1730-kasus-penipuan-online-kerugian-ratusan-triliun
  21. Kim, G.-H., Trimi, S., & Chung, J.-H. (2014). Big-data applications in the government sector. Commun. ACM, 57(3), 78–85. https://doi.org/10.1145/2500873
  22. Kompas. (2022). 1,3 Miliar Data Registrasi Kartu SIM Diduga Bocor, Pengamat Sebut Datanya Valid. https://tekno.kompas.com/read/2022/09/01/13450037/13-miliar-data-registrasi-kartu-sim-diduga-bocor-pengamat-sebut-datanya-valid?page=all
  23. Levin, I., & Mamlok, D. (2021). Culture and Society in the Digital Age. Information, 12(2), 1–13. https://doi.org/10.3390/info12020068
  24. Mao, C., & Chang, D. (2023). Review of cross-device interaction for facilitating digital transformation in smart home context: A user-centric perspective. Advanced Engineering Informatics, 57, 102087. https://doi.org/10.1016/j.aei.2023.102087
  25. Menpan-RB. (2023). Kominfo Telusuri Dugaan Kebocoran Data Paspor 34 Juta WNI. https://www.menpan.go.id/site/berita-terkini/berita-daerah/kominfo-telusuri-dugaan-kebocoran-data-paspor-34-juta-wni
  26. Mijwil, M., Omega John Unogwu, Youssef Filali, Indu Bala, & Humam Al-Shahwani. (2023). Exploring the Top Five Evolving Threats in Cybersecurity: An In-Depth Overview. Mesopotamian Journal of CyberSecurity, 2023(SE-Articles), 57–63. https://doi.org/10.58496/MJCS/2023/010
  27. Nie, J., & Dai, X. (2016). On the Information Security Issue in the Information Construction process of colleges and universities. 2016 12th International Conference on Computational Intelligence and Security (CIS), 582–585. https://doi.org/10.1109/CIS.2016.0141
  28. Oh, E. G., Chang, Y., & Park, S. W. (2020). Design review of MOOCs: application of e-learning design principles. Journal of Computing in Higher Education, 32(3), 455–475. https://doi.org/10.1007/s12528-019-09243-w
  29. Palvia, R. (2024). Right to Privacy in The Digital Age: Addressing Challenges in The Era of Technology Advancement. Journal of Unique Laws and Students (JULS), 3(1), 77–85. https://doi.org/10.59126/v3i1a7
  30. Peeran, M., & Shanavas, D. A. M. (2022). Information Security Issues with E-Governance. International Journal of Next-Generation Computing, 13(3). https://doi.org/10.47164/ijngc.v13i3.649
  31. Perkasa, J., & Saly, J. N. (2022). Legal Liability of Marketplace Companies Against Leaking of User Data Due to Third Party Breaking According to Law Number 8 of 1999 Concerning Consumer Protection (Case Example: Tokopedia User Data Leaking in 2020) BT - Proceedings of the 3rd Tarumanagara International Conference on the Applications of Social Sciences and Humanities (TICASH 2021). 606–614. https://doi.org/10.2991/assehr.k.220404.096
  32. Photopoulos, C. (2008). Chapter 4 - Data Security Policy (C. B. T.-M. C. L. of S. D. Photopoulos (ed.); pp. 93–124). Syngress. https://doi.org/10.1016/B978-1-59749-239-3.00004-3
  33. Putra, L. D., & Pratama, S. Z. A. (2023). Pemanfatan media dan teknologi digital dalam mengatasi masalah pembelajaran. Journal Transformation of Mandalika, 4(8), 323–329.
  34. Raza, M. A. (2024). Cyber Security and Data Privacy in the Era of E-Governance. Social Science Journal for Advanced Research, 4(1 SE-Articles), 5–9. https://doi.org/10.54741/ssjar.4.1.2
  35. Rezgui, Y., & Marks, A. (2008). Information security awareness in higher education: An exploratory study. Computers & Security, 27(7), 241–253. https://doi.org/https://doi.org/10.1016/j.cose.2008.07.008
  36. Safaat, P. A., Suparman, N., & Maolani, D. Y. (2022). Inovasi pelayanan publik melalui Program One Hour Service pada Pengadilan Negeri Kelas IB Indramayu. Jurnal Dialektika: Jurnal Ilmu Sosial, 20(2), 83–92. https://doi.org/10.54783/dialektika.v20i2.67
  37. Sastiono, P., & Nuryakin, C. (2019). Inklusi keuangan melalui program layanan keuangan digital dan laku pandai. Jurnal Ekonomi Dan Pembangunan Indonesia, 19(2), 7. https://doi.org/10.21002/jepi.2019.15
  38. Schaar, P. (2017). Data Protection Empowerment BT - Cyber Security. Simply. Make it Happen.: Leveraging Digitization Through IT Security (F. Abolhassan (ed.); pp. 21–26). Springer International Publishing. https://doi.org/10.1007/978-3-319-46529-6_3
  39. Scope, N., Rasin, A., Lenard, B., Heart, K., & Wagner, J. (2022). Harmonizing privacy regarding data retention and purging. Proceedings of the 34th International Conference on Scientific and Statistical Database Management, 1–12. https://doi.org/10.1145/3538712.3538718.
  40. Sihombing, G. P., Hamzah, H. A., Tian, C., Lianda, T. A. C., Daniswara, M. D., & Saputra, M. N. (2023). Analisis dampak kejahatan siber terhadap kepercayaan konsumen dalam berbelanja di Tokopedia. Jurnal Ekonomika Dan Manajemen, 12(2), 110–120. https://doi.org/10.36080/jem.v12i2.2362
  41. Situmeang, S. M. T. (2021). Penyalahgunaan Data Pribadi Sebagai Bentuk Kejahatan Sempurna Dalam Perspektif Hukum Siber. SASI, 27(1), 38–52. https://doi.org/10.47268/sasi.v27i1.394
  42. Sudaryono, S., Rahwanto, E., & Komala, R. (2020). E-Commerce Dorong Perekonomian Indonesia, Selama Pandemi Covid 19 sebagai Entrepreneur Modern dan Pengaruhnya Terhadap Bisnis Offline. Jurnal Manajemen Dan Bisnis, 2(02), 110–124. https://doi.org/10.47080/10.47080/vol1no02/jumanis
  43. Swanzy, P. N., Abukari, A. M., & Ansong, E. D. (2024). Data Security Framework for Protecting Data in Transit and Data at Rest in the Cloud. Current Journal of Applied Science and Technology, 43(6), 61–77. https://doi.org/10.9734/cjast/2024/v43i64387
  44. Szczepaniuk, E. K., Szczepaniuk, H., Rokicki, T., & Klepacki, B. (2020). Information security assessment in public administration. Computers & Security, 90, 101709. https://doi.org/10.1016/j.cose.2019.101709
  45. Teoh, C. S., Mahmood, A. K., & Dzazali, S. (2018). Cyber Security Challenges in Organisations: A Case Study in Malaysia. 2018 4th International Conference on Computer and Information Sciences (ICCOINS), 1–6. https://doi.org/10.1109/ICCOINS.2018.8510569
  46. Venter, I. M., Blignaut, R. J., Renaud, K., & Venter, M. A. (2019). Cyber security education is as essential as “the three R’s” Heliyon, 5(12). https://doi.org/10.1016/j.heliyon.2019.e02855
  47. Yadav, B. (2022). Overview of Cyber Security. International Journal of Advanced Research in Science, Communication and Technology (IJARSCT), 2(4), 489–492. https://doi.org/10.48175/IJARSCT-3959
  48. Zaidoun, A. S. (2022). Security Management. In Computer Science Security (pp. 147–164). https://doi.org/10.1002/9781394163847.ch8