Main Article Content
Abstract
The widespread use of Information and Communication Technology (ICT) has transformed social, economic, and everyday interactions, creating challenges in data security and individual privacy. This study explores aspects of data security and privacy within public administration in Indonesia, highlighting existing challenges, policies, and initiatives. The research methodology is a qualitative literature review encompassing journal articles, books, and research reports on data security and privacy. The findings indicate that cyber threats such as hacking, phishing, ransomware, and data breaches have led to financial losses, reputational damage, and privacy violations in Indonesia. The discussion of this research suggests that data security strategies, including security policies, encryption technology, firewalls, access controls, and risk management, are crucial for protecting sensitive information. Legislative measures, public awareness, and technological protection are necessary to balance technological benefits and the safety of individual rights, ensuring compliance with regulatory standards and enhancing public trust in government and organizations.
Keywords
Article Details
This work is licensed under a Creative Commons Attribution 4.0 International License.
References
- Adlini, M. N., Dinda, A. H., Yulinda, S., & Chotimah, O. (2022). Metode Penelitian Kualitatif Studi Pustaka. Jurnal Edumaspul, 6(1), 974–980. https://doi.org/10.33487/edumaspul.v6i1.3394
- Aji, M. P. (2023). Sistem Keamanan Siber dan Kedaulatan Data di Indonesia dalam Perspektif Ekonomi Politik (Studi Kasus Perlindungan Data Pribadi)[Cyber Security System and Data Sovereignty in Indonesia in Political Economic Perspective]. Jurnal Politica Dinamika Masalah Politik Dalam Negeri Dan Hubungan Internasional, 13(2), 222–238. https://doi.org/10.22212/jp.v13i2.3299
- Akhlaq, M., Mustafa, M. T., & Jahangir, H. A. (2022). Defending the Right to Privacy in the Digital Age. Journal of Policy Research, 8(4), 534–538. https://doi.org/10.61506/02.00006
- Alalawneh, A. A., Al-Omar, S. Y. S., & Alkhatib, S. (2022). The Complexity of Interaction between Social Media Platforms and Organizational Performance. Journal of Open Innovation: Technology, Market, and Complexity, 8(4), 169. https://doi.org/10.3390/joitmc8040169
- Antara. (2020). KPU checks data server security after personal data breach claim. https://en.antaranews.com/news/149115/kpu-checks-data-server-security-after-personal-data-breach-claim
- Bangsawan, G. (2023). Kebijakan Akselerasi Transformasi Digital di Indonesia: Peluang dan Tantangan untuk Pengembangan Ekonomi Kreatif. Jurnal Studi Kebijakan Publik, 2(1), 27–40. https://doi.org/10.21787/jskp.2.2023.27-40
- BBC News Indonesia. (2024). Pusat Data Nasional Sementara lumpuh akibat ransomware, mengapa instansi pemerintah masih rentan terhadap serangan siber? https://www.bbc.com/indonesia/articles/cxee2985jrvo
- Cai, J., & Dumlao, M. F. (2024). Research on the Integration Strategy of Enterprise Data Security Governance and Data Analysis Applications. Academic Journal of Business & Management, 6(5). https://doi.org/10.25236/AJBM.2024.060532
- Caimi, C., D’Errico, M., Gambardella, C., Manea, M., & Wainwright, N. (2015). Implementing Privacy Policies in the Cloud BT - Cyber Security and Privacy (F. Cleary & M. Felici (eds.); pp. 3–13). Springer International Publishing. https://doi.org/10.1007/978-3-319-25360-2_1
- Chaturvedi, M., Narain Singh, A., Prasad Gupta, M., & Bhattacharya, J. (2014). Analyses of issues of information security in Indian context. Transforming Government: People, Process and Policy, 8(3), 374–397. https://doi.org/10.1108/TG-07-2013-0019
- Concepcion, J. D., & Palaoag, T. D. (2024). An Assessment of Cybersecurity Awareness among Academic Employees at Quirino State University: Promoting Cyber Hygiene. Journal of Electrical Systems, 20(7), 769–775. https://doi.org/10.52783/jes.3445
- Darmalaksana, W. (2020). Metode penelitian kualitatif studi pustaka dan studi lapangan.
- de Hert, P., Papakonstantinou, V., Wright, D., & Gutwirth, S. (2013). The proposed Regulation and the construction of a principles-driven system for individual data protection. Innovation: The European Journal of Social Science Research, 26(1–2), 133–144. https://doi.org/10.1080/13511610.2013.734047
- Djuric, A. (2024). Challenges, Citizens’ Trust and Privacy Protection Models in e-Government Systems: Security and Privacy Perspective: Student paper. 2024 23rd International Symposium INFOTEH-JAHORINA (INFOTEH), 1–6. https://doi.org/10.1109/INFOTEH60418.2024.10495931
- Hoshmand, M. O., & Ratnawati, S. (2023). Analisis Keamanan Infrastruktur Teknologi Informasi dalam Menghadapi Ancaman Cybersecurity. Jurnal Sains Dan Teknologi, 5(2 SE-), 679–686. https://ejournal.sisfokomtek.org/index.php/saintek/article/view/2347
- Hyka, D., Hyra, A., Basholli, F., Mema, B., & Basholli, A. (2023). Data security in public and private administration: Challenges, trends, and effective protection in the era of digitalization.
- Indrajaya, T., Primasyah, D., Yulianti, S., Rosmiati, E., & Sova, M. (2022). Peran E-Bisnis Dalam Pengembangan UMKM. Jurnal Economina, 1(2), 239–247. https://doi.org/10.55681/economina.v1i2.73
- Javvaji, S. (2023). Surveillance technology: balancing security and privacy in the digital age. EPRA International Journal of Multidisciplinary Research (IJMR), 9(7), 178–185. https://doi.org/10.36713/epra13852
- Joshi, C., & Singh, U. K. (2017). Information security risks management framework – A step towards mitigating security risks in university network. Journal of Information Security and Applications, 35, 128–137. https://doi.org/https://doi.org/10.1016/j.jisa.2017.06.006
- Katadata. (2023). No TitleKominfo Catatkan 1.730 Kasus Penipuan Online, Kerugian Ratusan Triliun. https://katadata.co.id/digital/teknologi/63f8a599de801/kominfo-catatkan-1730-kasus-penipuan-online-kerugian-ratusan-triliun
- Kim, G.-H., Trimi, S., & Chung, J.-H. (2014). Big-data applications in the government sector. Commun. ACM, 57(3), 78–85. https://doi.org/10.1145/2500873
- Kompas. (2022). 1,3 Miliar Data Registrasi Kartu SIM Diduga Bocor, Pengamat Sebut Datanya Valid. https://tekno.kompas.com/read/2022/09/01/13450037/13-miliar-data-registrasi-kartu-sim-diduga-bocor-pengamat-sebut-datanya-valid?page=all
- Levin, I., & Mamlok, D. (2021). Culture and Society in the Digital Age. Information, 12(2), 1–13. https://doi.org/10.3390/info12020068
- Mao, C., & Chang, D. (2023). Review of cross-device interaction for facilitating digital transformation in smart home context: A user-centric perspective. Advanced Engineering Informatics, 57, 102087. https://doi.org/10.1016/j.aei.2023.102087
- Menpan-RB. (2023). Kominfo Telusuri Dugaan Kebocoran Data Paspor 34 Juta WNI. https://www.menpan.go.id/site/berita-terkini/berita-daerah/kominfo-telusuri-dugaan-kebocoran-data-paspor-34-juta-wni
- Mijwil, M., Omega John Unogwu, Youssef Filali, Indu Bala, & Humam Al-Shahwani. (2023). Exploring the Top Five Evolving Threats in Cybersecurity: An In-Depth Overview. Mesopotamian Journal of CyberSecurity, 2023(SE-Articles), 57–63. https://doi.org/10.58496/MJCS/2023/010
- Nie, J., & Dai, X. (2016). On the Information Security Issue in the Information Construction process of colleges and universities. 2016 12th International Conference on Computational Intelligence and Security (CIS), 582–585. https://doi.org/10.1109/CIS.2016.0141
- Oh, E. G., Chang, Y., & Park, S. W. (2020). Design review of MOOCs: application of e-learning design principles. Journal of Computing in Higher Education, 32(3), 455–475. https://doi.org/10.1007/s12528-019-09243-w
- Palvia, R. (2024). Right to Privacy in The Digital Age: Addressing Challenges in The Era of Technology Advancement. Journal of Unique Laws and Students (JULS), 3(1), 77–85. https://doi.org/10.59126/v3i1a7
- Peeran, M., & Shanavas, D. A. M. (2022). Information Security Issues with E-Governance. International Journal of Next-Generation Computing, 13(3). https://doi.org/10.47164/ijngc.v13i3.649
- Perkasa, J., & Saly, J. N. (2022). Legal Liability of Marketplace Companies Against Leaking of User Data Due to Third Party Breaking According to Law Number 8 of 1999 Concerning Consumer Protection (Case Example: Tokopedia User Data Leaking in 2020) BT - Proceedings of the 3rd Tarumanagara International Conference on the Applications of Social Sciences and Humanities (TICASH 2021). 606–614. https://doi.org/10.2991/assehr.k.220404.096
- Photopoulos, C. (2008). Chapter 4 - Data Security Policy (C. B. T.-M. C. L. of S. D. Photopoulos (ed.); pp. 93–124). Syngress. https://doi.org/10.1016/B978-1-59749-239-3.00004-3
- Putra, L. D., & Pratama, S. Z. A. (2023). Pemanfatan media dan teknologi digital dalam mengatasi masalah pembelajaran. Journal Transformation of Mandalika, 4(8), 323–329.
- Raza, M. A. (2024). Cyber Security and Data Privacy in the Era of E-Governance. Social Science Journal for Advanced Research, 4(1 SE-Articles), 5–9. https://doi.org/10.54741/ssjar.4.1.2
- Rezgui, Y., & Marks, A. (2008). Information security awareness in higher education: An exploratory study. Computers & Security, 27(7), 241–253. https://doi.org/https://doi.org/10.1016/j.cose.2008.07.008
- Safaat, P. A., Suparman, N., & Maolani, D. Y. (2022). Inovasi pelayanan publik melalui Program One Hour Service pada Pengadilan Negeri Kelas IB Indramayu. Jurnal Dialektika: Jurnal Ilmu Sosial, 20(2), 83–92. https://doi.org/10.54783/dialektika.v20i2.67
- Sastiono, P., & Nuryakin, C. (2019). Inklusi keuangan melalui program layanan keuangan digital dan laku pandai. Jurnal Ekonomi Dan Pembangunan Indonesia, 19(2), 7. https://doi.org/10.21002/jepi.2019.15
- Schaar, P. (2017). Data Protection Empowerment BT - Cyber Security. Simply. Make it Happen.: Leveraging Digitization Through IT Security (F. Abolhassan (ed.); pp. 21–26). Springer International Publishing. https://doi.org/10.1007/978-3-319-46529-6_3
- Scope, N., Rasin, A., Lenard, B., Heart, K., & Wagner, J. (2022). Harmonizing privacy regarding data retention and purging. Proceedings of the 34th International Conference on Scientific and Statistical Database Management, 1–12. https://doi.org/10.1145/3538712.3538718.
- Sihombing, G. P., Hamzah, H. A., Tian, C., Lianda, T. A. C., Daniswara, M. D., & Saputra, M. N. (2023). Analisis dampak kejahatan siber terhadap kepercayaan konsumen dalam berbelanja di Tokopedia. Jurnal Ekonomika Dan Manajemen, 12(2), 110–120. https://doi.org/10.36080/jem.v12i2.2362
- Situmeang, S. M. T. (2021). Penyalahgunaan Data Pribadi Sebagai Bentuk Kejahatan Sempurna Dalam Perspektif Hukum Siber. SASI, 27(1), 38–52. https://doi.org/10.47268/sasi.v27i1.394
- Sudaryono, S., Rahwanto, E., & Komala, R. (2020). E-Commerce Dorong Perekonomian Indonesia, Selama Pandemi Covid 19 sebagai Entrepreneur Modern dan Pengaruhnya Terhadap Bisnis Offline. Jurnal Manajemen Dan Bisnis, 2(02), 110–124. https://doi.org/10.47080/10.47080/vol1no02/jumanis
- Swanzy, P. N., Abukari, A. M., & Ansong, E. D. (2024). Data Security Framework for Protecting Data in Transit and Data at Rest in the Cloud. Current Journal of Applied Science and Technology, 43(6), 61–77. https://doi.org/10.9734/cjast/2024/v43i64387
- Szczepaniuk, E. K., Szczepaniuk, H., Rokicki, T., & Klepacki, B. (2020). Information security assessment in public administration. Computers & Security, 90, 101709. https://doi.org/10.1016/j.cose.2019.101709
- Teoh, C. S., Mahmood, A. K., & Dzazali, S. (2018). Cyber Security Challenges in Organisations: A Case Study in Malaysia. 2018 4th International Conference on Computer and Information Sciences (ICCOINS), 1–6. https://doi.org/10.1109/ICCOINS.2018.8510569
- Venter, I. M., Blignaut, R. J., Renaud, K., & Venter, M. A. (2019). Cyber security education is as essential as “the three R’s” Heliyon, 5(12). https://doi.org/10.1016/j.heliyon.2019.e02855
- Yadav, B. (2022). Overview of Cyber Security. International Journal of Advanced Research in Science, Communication and Technology (IJARSCT), 2(4), 489–492. https://doi.org/10.48175/IJARSCT-3959
- Zaidoun, A. S. (2022). Security Management. In Computer Science Security (pp. 147–164). https://doi.org/10.1002/9781394163847.ch8