Data Security and Individual Privacy from the Perspective of Public Administration

Authors

DOI:

https://doi.org/10.61194/ijss.v5i3.1297

Keywords:

Data Security, Hacking, Individual Privacy, Ransomware, Technological Protection

Abstract

The widespread use of Information and Communication Technology (ICT) has transformed social, economic, and everyday interactions, creating challenges in data security and individual privacy. This study explores aspects of data security and privacy within public administration in Indonesia, highlighting existing challenges, policies, and initiatives. The research methodology is a qualitative literature review encompassing journal articles, books, and research reports on data security and privacy. The findings indicate that cyber threats such as hacking, phishing, ransomware, and data breaches have led to financial losses, reputational damage, and privacy violations in Indonesia. The discussion of this research suggests that data security strategies, including security policies, encryption technology, firewalls, access controls, and risk management, are crucial for protecting sensitive information. Legislative measures, public awareness, and technological protection are necessary to balance technological benefits and the safety of individual rights, ensuring compliance with regulatory standards and enhancing public trust in government and organizations.

References

Adlini, M. N., Dinda, A. H., Yulinda, S., & Chotimah, O. (2022). Metode Penelitian Kualitatif Studi Pustaka. Jurnal Edumaspul, 6(1), 974–980. https://doi.org/10.33487/edumaspul.v6i1.3394

Aji, M. P. (2023). Sistem Keamanan Siber dan Kedaulatan Data di Indonesia dalam Perspektif Ekonomi Politik (Studi Kasus Perlindungan Data Pribadi)[Cyber Security System and Data Sovereignty in Indonesia in Political Economic Perspective]. Jurnal Politica Dinamika Masalah Politik Dalam Negeri Dan Hubungan Internasional, 13(2), 222–238. https://doi.org/10.22212/jp.v13i2.3299

Akhlaq, M., Mustafa, M. T., & Jahangir, H. A. (2022). Defending the Right to Privacy in the Digital Age. Journal of Policy Research, 8(4), 534–538. https://doi.org/10.61506/02.00006

Alalawneh, A. A., Al-Omar, S. Y. S., & Alkhatib, S. (2022). The Complexity of Interaction between Social Media Platforms and Organizational Performance. Journal of Open Innovation: Technology, Market, and Complexity, 8(4), 169. https://doi.org/10.3390/joitmc8040169

Antara. (2020). KPU checks data server security after personal data breach claim. https://en.antaranews.com/news/149115/kpu-checks-data-server-security-after-personal-data-breach-claim

Bangsawan, G. (2023). Kebijakan Akselerasi Transformasi Digital di Indonesia: Peluang dan Tantangan untuk Pengembangan Ekonomi Kreatif. Jurnal Studi Kebijakan Publik, 2(1), 27–40. https://doi.org/10.21787/jskp.2.2023.27-40

BBC News Indonesia. (2024). Pusat Data Nasional Sementara lumpuh akibat ransomware, mengapa instansi pemerintah masih rentan terhadap serangan siber? https://www.bbc.com/indonesia/articles/cxee2985jrvo

Cai, J., & Dumlao, M. F. (2024). Research on the Integration Strategy of Enterprise Data Security Governance and Data Analysis Applications. Academic Journal of Business & Management, 6(5). https://doi.org/10.25236/AJBM.2024.060532

Caimi, C., D’Errico, M., Gambardella, C., Manea, M., & Wainwright, N. (2015). Implementing Privacy Policies in the Cloud BT - Cyber Security and Privacy (F. Cleary & M. Felici (eds.); pp. 3–13). Springer International Publishing. https://doi.org/10.1007/978-3-319-25360-2_1

Chaturvedi, M., Narain Singh, A., Prasad Gupta, M., & Bhattacharya, J. (2014). Analyses of issues of information security in Indian context. Transforming Government: People, Process and Policy, 8(3), 374–397. https://doi.org/10.1108/TG-07-2013-0019

Concepcion, J. D., & Palaoag, T. D. (2024). An Assessment of Cybersecurity Awareness among Academic Employees at Quirino State University: Promoting Cyber Hygiene. Journal of Electrical Systems, 20(7), 769–775. https://doi.org/10.52783/jes.3445

Darmalaksana, W. (2020). Metode penelitian kualitatif studi pustaka dan studi lapangan.

de Hert, P., Papakonstantinou, V., Wright, D., & Gutwirth, S. (2013). The proposed Regulation and the construction of a principles-driven system for individual data protection. Innovation: The European Journal of Social Science Research, 26(1–2), 133–144. https://doi.org/10.1080/13511610.2013.734047

Djuric, A. (2024). Challenges, Citizens’ Trust and Privacy Protection Models in e-Government Systems: Security and Privacy Perspective: Student paper. 2024 23rd International Symposium INFOTEH-JAHORINA (INFOTEH), 1–6. https://doi.org/10.1109/INFOTEH60418.2024.10495931

Hoshmand, M. O., & Ratnawati, S. (2023). Analisis Keamanan Infrastruktur Teknologi Informasi dalam Menghadapi Ancaman Cybersecurity. Jurnal Sains Dan Teknologi, 5(2 SE-), 679–686. https://ejournal.sisfokomtek.org/index.php/saintek/article/view/2347

Hyka, D., Hyra, A., Basholli, F., Mema, B., & Basholli, A. (2023). Data security in public and private administration: Challenges, trends, and effective protection in the era of digitalization.

Indrajaya, T., Primasyah, D., Yulianti, S., Rosmiati, E., & Sova, M. (2022). Peran E-Bisnis Dalam Pengembangan UMKM. Jurnal Economina, 1(2), 239–247. https://doi.org/10.55681/economina.v1i2.73

Javvaji, S. (2023). Surveillance technology: balancing security and privacy in the digital age. EPRA International Journal of Multidisciplinary Research (IJMR), 9(7), 178–185. https://doi.org/10.36713/epra13852

Joshi, C., & Singh, U. K. (2017). Information security risks management framework – A step towards mitigating security risks in university network. Journal of Information Security and Applications, 35, 128–137. https://doi.org/https://doi.org/10.1016/j.jisa.2017.06.006

Katadata. (2023). No TitleKominfo Catatkan 1.730 Kasus Penipuan Online, Kerugian Ratusan Triliun. https://katadata.co.id/digital/teknologi/63f8a599de801/kominfo-catatkan-1730-kasus-penipuan-online-kerugian-ratusan-triliun

Kim, G.-H., Trimi, S., & Chung, J.-H. (2014). Big-data applications in the government sector. Commun. ACM, 57(3), 78–85. https://doi.org/10.1145/2500873

Kompas. (2022). 1,3 Miliar Data Registrasi Kartu SIM Diduga Bocor, Pengamat Sebut Datanya Valid. https://tekno.kompas.com/read/2022/09/01/13450037/13-miliar-data-registrasi-kartu-sim-diduga-bocor-pengamat-sebut-datanya-valid?page=all

Levin, I., & Mamlok, D. (2021). Culture and Society in the Digital Age. Information, 12(2), 1–13. https://doi.org/10.3390/info12020068

Mao, C., & Chang, D. (2023). Review of cross-device interaction for facilitating digital transformation in smart home context: A user-centric perspective. Advanced Engineering Informatics, 57, 102087. https://doi.org/10.1016/j.aei.2023.102087

Menpan-RB. (2023). Kominfo Telusuri Dugaan Kebocoran Data Paspor 34 Juta WNI. https://www.menpan.go.id/site/berita-terkini/berita-daerah/kominfo-telusuri-dugaan-kebocoran-data-paspor-34-juta-wni

Mijwil, M., Omega John Unogwu, Youssef Filali, Indu Bala, & Humam Al-Shahwani. (2023). Exploring the Top Five Evolving Threats in Cybersecurity: An In-Depth Overview. Mesopotamian Journal of CyberSecurity, 2023(SE-Articles), 57–63. https://doi.org/10.58496/MJCS/2023/010

Nie, J., & Dai, X. (2016). On the Information Security Issue in the Information Construction process of colleges and universities. 2016 12th International Conference on Computational Intelligence and Security (CIS), 582–585. https://doi.org/10.1109/CIS.2016.0141

Oh, E. G., Chang, Y., & Park, S. W. (2020). Design review of MOOCs: application of e-learning design principles. Journal of Computing in Higher Education, 32(3), 455–475. https://doi.org/10.1007/s12528-019-09243-w

Palvia, R. (2024). Right to Privacy in The Digital Age: Addressing Challenges in The Era of Technology Advancement. Journal of Unique Laws and Students (JULS), 3(1), 77–85. https://doi.org/10.59126/v3i1a7

Peeran, M., & Shanavas, D. A. M. (2022). Information Security Issues with E-Governance. International Journal of Next-Generation Computing, 13(3). https://doi.org/10.47164/ijngc.v13i3.649

Perkasa, J., & Saly, J. N. (2022). Legal Liability of Marketplace Companies Against Leaking of User Data Due to Third Party Breaking According to Law Number 8 of 1999 Concerning Consumer Protection (Case Example: Tokopedia User Data Leaking in 2020) BT - Proceedings of the 3rd Tarumanagara International Conference on the Applications of Social Sciences and Humanities (TICASH 2021). 606–614. https://doi.org/10.2991/assehr.k.220404.096

Photopoulos, C. (2008). Chapter 4 - Data Security Policy (C. B. T.-M. C. L. of S. D. Photopoulos (ed.); pp. 93–124). Syngress. https://doi.org/10.1016/B978-1-59749-239-3.00004-3

Putra, L. D., & Pratama, S. Z. A. (2023). Pemanfatan media dan teknologi digital dalam mengatasi masalah pembelajaran. Journal Transformation of Mandalika, 4(8), 323–329.

Raza, M. A. (2024). Cyber Security and Data Privacy in the Era of E-Governance. Social Science Journal for Advanced Research, 4(1 SE-Articles), 5–9. https://doi.org/10.54741/ssjar.4.1.2

Rezgui, Y., & Marks, A. (2008). Information security awareness in higher education: An exploratory study. Computers & Security, 27(7), 241–253. https://doi.org/https://doi.org/10.1016/j.cose.2008.07.008

Safaat, P. A., Suparman, N., & Maolani, D. Y. (2022). Inovasi pelayanan publik melalui Program One Hour Service pada Pengadilan Negeri Kelas IB Indramayu. Jurnal Dialektika: Jurnal Ilmu Sosial, 20(2), 83–92. https://doi.org/10.54783/dialektika.v20i2.67

Sastiono, P., & Nuryakin, C. (2019). Inklusi keuangan melalui program layanan keuangan digital dan laku pandai. Jurnal Ekonomi Dan Pembangunan Indonesia, 19(2), 7. https://doi.org/10.21002/jepi.2019.15

Schaar, P. (2017). Data Protection Empowerment BT - Cyber Security. Simply. Make it Happen.: Leveraging Digitization Through IT Security (F. Abolhassan (ed.); pp. 21–26). Springer International Publishing. https://doi.org/10.1007/978-3-319-46529-6_3

Scope, N., Rasin, A., Lenard, B., Heart, K., & Wagner, J. (2022). Harmonizing privacy regarding data retention and purging. Proceedings of the 34th International Conference on Scientific and Statistical Database Management, 1–12. https://doi.org/10.1145/3538712.3538718.

Sihombing, G. P., Hamzah, H. A., Tian, C., Lianda, T. A. C., Daniswara, M. D., & Saputra, M. N. (2023). Analisis dampak kejahatan siber terhadap kepercayaan konsumen dalam berbelanja di Tokopedia. Jurnal Ekonomika Dan Manajemen, 12(2), 110–120. https://doi.org/10.36080/jem.v12i2.2362

Situmeang, S. M. T. (2021). Penyalahgunaan Data Pribadi Sebagai Bentuk Kejahatan Sempurna Dalam Perspektif Hukum Siber. SASI, 27(1), 38–52. https://doi.org/10.47268/sasi.v27i1.394

Sudaryono, S., Rahwanto, E., & Komala, R. (2020). E-Commerce Dorong Perekonomian Indonesia, Selama Pandemi Covid 19 sebagai Entrepreneur Modern dan Pengaruhnya Terhadap Bisnis Offline. Jurnal Manajemen Dan Bisnis, 2(02), 110–124. https://doi.org/10.47080/10.47080/vol1no02/jumanis

Swanzy, P. N., Abukari, A. M., & Ansong, E. D. (2024). Data Security Framework for Protecting Data in Transit and Data at Rest in the Cloud. Current Journal of Applied Science and Technology, 43(6), 61–77. https://doi.org/10.9734/cjast/2024/v43i64387

Szczepaniuk, E. K., Szczepaniuk, H., Rokicki, T., & Klepacki, B. (2020). Information security assessment in public administration. Computers & Security, 90, 101709. https://doi.org/10.1016/j.cose.2019.101709

Teoh, C. S., Mahmood, A. K., & Dzazali, S. (2018). Cyber Security Challenges in Organisations: A Case Study in Malaysia. 2018 4th International Conference on Computer and Information Sciences (ICCOINS), 1–6. https://doi.org/10.1109/ICCOINS.2018.8510569

Venter, I. M., Blignaut, R. J., Renaud, K., & Venter, M. A. (2019). Cyber security education is as essential as “the three R’s” Heliyon, 5(12). https://doi.org/10.1016/j.heliyon.2019.e02855

Yadav, B. (2022). Overview of Cyber Security. International Journal of Advanced Research in Science, Communication and Technology (IJARSCT), 2(4), 489–492. https://doi.org/10.48175/IJARSCT-3959

Zaidoun, A. S. (2022). Security Management. In Computer Science Security (pp. 147–164). https://doi.org/10.1002/9781394163847.ch8

Downloads

Published

2024-08-03

How to Cite

Sari, J. A., Yuliani, I. ., Akadira, T. ., Sunarya, A. ., & Ating, R. (2024). Data Security and Individual Privacy from the Perspective of Public Administration. Ilomata International Journal of Social Science, 5(3), 818–830. https://doi.org/10.61194/ijss.v5i3.1297

Issue

Section

Articles

Most read articles by the same author(s)