Data Security and Individual Privacy from the Perspective of Public Administration
DOI:
https://doi.org/10.61194/ijss.v5i3.1297Keywords:
Data Security, Hacking, Individual Privacy, Ransomware, Technological ProtectionAbstract
The widespread use of Information and Communication Technology (ICT) has transformed social, economic, and everyday interactions, creating challenges in data security and individual privacy. This study explores aspects of data security and privacy within public administration in Indonesia, highlighting existing challenges, policies, and initiatives. The research methodology is a qualitative literature review encompassing journal articles, books, and research reports on data security and privacy. The findings indicate that cyber threats such as hacking, phishing, ransomware, and data breaches have led to financial losses, reputational damage, and privacy violations in Indonesia. The discussion of this research suggests that data security strategies, including security policies, encryption technology, firewalls, access controls, and risk management, are crucial for protecting sensitive information. Legislative measures, public awareness, and technological protection are necessary to balance technological benefits and the safety of individual rights, ensuring compliance with regulatory standards and enhancing public trust in government and organizations.
References
Adlini, M. N., Dinda, A. H., Yulinda, S., & Chotimah, O. (2022). Metode Penelitian Kualitatif Studi Pustaka. Jurnal Edumaspul, 6(1), 974–980. https://doi.org/10.33487/edumaspul.v6i1.3394
Aji, M. P. (2023). Sistem Keamanan Siber dan Kedaulatan Data di Indonesia dalam Perspektif Ekonomi Politik (Studi Kasus Perlindungan Data Pribadi)[Cyber Security System and Data Sovereignty in Indonesia in Political Economic Perspective]. Jurnal Politica Dinamika Masalah Politik Dalam Negeri Dan Hubungan Internasional, 13(2), 222–238. https://doi.org/10.22212/jp.v13i2.3299
Akhlaq, M., Mustafa, M. T., & Jahangir, H. A. (2022). Defending the Right to Privacy in the Digital Age. Journal of Policy Research, 8(4), 534–538. https://doi.org/10.61506/02.00006
Alalawneh, A. A., Al-Omar, S. Y. S., & Alkhatib, S. (2022). The Complexity of Interaction between Social Media Platforms and Organizational Performance. Journal of Open Innovation: Technology, Market, and Complexity, 8(4), 169. https://doi.org/10.3390/joitmc8040169
Antara. (2020). KPU checks data server security after personal data breach claim. https://en.antaranews.com/news/149115/kpu-checks-data-server-security-after-personal-data-breach-claim
Bangsawan, G. (2023). Kebijakan Akselerasi Transformasi Digital di Indonesia: Peluang dan Tantangan untuk Pengembangan Ekonomi Kreatif. Jurnal Studi Kebijakan Publik, 2(1), 27–40. https://doi.org/10.21787/jskp.2.2023.27-40
BBC News Indonesia. (2024). Pusat Data Nasional Sementara lumpuh akibat ransomware, mengapa instansi pemerintah masih rentan terhadap serangan siber? https://www.bbc.com/indonesia/articles/cxee2985jrvo
Cai, J., & Dumlao, M. F. (2024). Research on the Integration Strategy of Enterprise Data Security Governance and Data Analysis Applications. Academic Journal of Business & Management, 6(5). https://doi.org/10.25236/AJBM.2024.060532
Caimi, C., D’Errico, M., Gambardella, C., Manea, M., & Wainwright, N. (2015). Implementing Privacy Policies in the Cloud BT - Cyber Security and Privacy (F. Cleary & M. Felici (eds.); pp. 3–13). Springer International Publishing. https://doi.org/10.1007/978-3-319-25360-2_1
Chaturvedi, M., Narain Singh, A., Prasad Gupta, M., & Bhattacharya, J. (2014). Analyses of issues of information security in Indian context. Transforming Government: People, Process and Policy, 8(3), 374–397. https://doi.org/10.1108/TG-07-2013-0019
Concepcion, J. D., & Palaoag, T. D. (2024). An Assessment of Cybersecurity Awareness among Academic Employees at Quirino State University: Promoting Cyber Hygiene. Journal of Electrical Systems, 20(7), 769–775. https://doi.org/10.52783/jes.3445
Darmalaksana, W. (2020). Metode penelitian kualitatif studi pustaka dan studi lapangan.
de Hert, P., Papakonstantinou, V., Wright, D., & Gutwirth, S. (2013). The proposed Regulation and the construction of a principles-driven system for individual data protection. Innovation: The European Journal of Social Science Research, 26(1–2), 133–144. https://doi.org/10.1080/13511610.2013.734047
Djuric, A. (2024). Challenges, Citizens’ Trust and Privacy Protection Models in e-Government Systems: Security and Privacy Perspective: Student paper. 2024 23rd International Symposium INFOTEH-JAHORINA (INFOTEH), 1–6. https://doi.org/10.1109/INFOTEH60418.2024.10495931
Hoshmand, M. O., & Ratnawati, S. (2023). Analisis Keamanan Infrastruktur Teknologi Informasi dalam Menghadapi Ancaman Cybersecurity. Jurnal Sains Dan Teknologi, 5(2 SE-), 679–686. https://ejournal.sisfokomtek.org/index.php/saintek/article/view/2347
Hyka, D., Hyra, A., Basholli, F., Mema, B., & Basholli, A. (2023). Data security in public and private administration: Challenges, trends, and effective protection in the era of digitalization.
Indrajaya, T., Primasyah, D., Yulianti, S., Rosmiati, E., & Sova, M. (2022). Peran E-Bisnis Dalam Pengembangan UMKM. Jurnal Economina, 1(2), 239–247. https://doi.org/10.55681/economina.v1i2.73
Javvaji, S. (2023). Surveillance technology: balancing security and privacy in the digital age. EPRA International Journal of Multidisciplinary Research (IJMR), 9(7), 178–185. https://doi.org/10.36713/epra13852
Joshi, C., & Singh, U. K. (2017). Information security risks management framework – A step towards mitigating security risks in university network. Journal of Information Security and Applications, 35, 128–137. https://doi.org/https://doi.org/10.1016/j.jisa.2017.06.006
Katadata. (2023). No TitleKominfo Catatkan 1.730 Kasus Penipuan Online, Kerugian Ratusan Triliun. https://katadata.co.id/digital/teknologi/63f8a599de801/kominfo-catatkan-1730-kasus-penipuan-online-kerugian-ratusan-triliun
Kim, G.-H., Trimi, S., & Chung, J.-H. (2014). Big-data applications in the government sector. Commun. ACM, 57(3), 78–85. https://doi.org/10.1145/2500873
Kompas. (2022). 1,3 Miliar Data Registrasi Kartu SIM Diduga Bocor, Pengamat Sebut Datanya Valid. https://tekno.kompas.com/read/2022/09/01/13450037/13-miliar-data-registrasi-kartu-sim-diduga-bocor-pengamat-sebut-datanya-valid?page=all
Levin, I., & Mamlok, D. (2021). Culture and Society in the Digital Age. Information, 12(2), 1–13. https://doi.org/10.3390/info12020068
Mao, C., & Chang, D. (2023). Review of cross-device interaction for facilitating digital transformation in smart home context: A user-centric perspective. Advanced Engineering Informatics, 57, 102087. https://doi.org/10.1016/j.aei.2023.102087
Menpan-RB. (2023). Kominfo Telusuri Dugaan Kebocoran Data Paspor 34 Juta WNI. https://www.menpan.go.id/site/berita-terkini/berita-daerah/kominfo-telusuri-dugaan-kebocoran-data-paspor-34-juta-wni
Mijwil, M., Omega John Unogwu, Youssef Filali, Indu Bala, & Humam Al-Shahwani. (2023). Exploring the Top Five Evolving Threats in Cybersecurity: An In-Depth Overview. Mesopotamian Journal of CyberSecurity, 2023(SE-Articles), 57–63. https://doi.org/10.58496/MJCS/2023/010
Nie, J., & Dai, X. (2016). On the Information Security Issue in the Information Construction process of colleges and universities. 2016 12th International Conference on Computational Intelligence and Security (CIS), 582–585. https://doi.org/10.1109/CIS.2016.0141
Oh, E. G., Chang, Y., & Park, S. W. (2020). Design review of MOOCs: application of e-learning design principles. Journal of Computing in Higher Education, 32(3), 455–475. https://doi.org/10.1007/s12528-019-09243-w
Palvia, R. (2024). Right to Privacy in The Digital Age: Addressing Challenges in The Era of Technology Advancement. Journal of Unique Laws and Students (JULS), 3(1), 77–85. https://doi.org/10.59126/v3i1a7
Peeran, M., & Shanavas, D. A. M. (2022). Information Security Issues with E-Governance. International Journal of Next-Generation Computing, 13(3). https://doi.org/10.47164/ijngc.v13i3.649
Perkasa, J., & Saly, J. N. (2022). Legal Liability of Marketplace Companies Against Leaking of User Data Due to Third Party Breaking According to Law Number 8 of 1999 Concerning Consumer Protection (Case Example: Tokopedia User Data Leaking in 2020) BT - Proceedings of the 3rd Tarumanagara International Conference on the Applications of Social Sciences and Humanities (TICASH 2021). 606–614. https://doi.org/10.2991/assehr.k.220404.096
Photopoulos, C. (2008). Chapter 4 - Data Security Policy (C. B. T.-M. C. L. of S. D. Photopoulos (ed.); pp. 93–124). Syngress. https://doi.org/10.1016/B978-1-59749-239-3.00004-3
Putra, L. D., & Pratama, S. Z. A. (2023). Pemanfatan media dan teknologi digital dalam mengatasi masalah pembelajaran. Journal Transformation of Mandalika, 4(8), 323–329.
Raza, M. A. (2024). Cyber Security and Data Privacy in the Era of E-Governance. Social Science Journal for Advanced Research, 4(1 SE-Articles), 5–9. https://doi.org/10.54741/ssjar.4.1.2
Rezgui, Y., & Marks, A. (2008). Information security awareness in higher education: An exploratory study. Computers & Security, 27(7), 241–253. https://doi.org/https://doi.org/10.1016/j.cose.2008.07.008
Safaat, P. A., Suparman, N., & Maolani, D. Y. (2022). Inovasi pelayanan publik melalui Program One Hour Service pada Pengadilan Negeri Kelas IB Indramayu. Jurnal Dialektika: Jurnal Ilmu Sosial, 20(2), 83–92. https://doi.org/10.54783/dialektika.v20i2.67
Sastiono, P., & Nuryakin, C. (2019). Inklusi keuangan melalui program layanan keuangan digital dan laku pandai. Jurnal Ekonomi Dan Pembangunan Indonesia, 19(2), 7. https://doi.org/10.21002/jepi.2019.15
Schaar, P. (2017). Data Protection Empowerment BT - Cyber Security. Simply. Make it Happen.: Leveraging Digitization Through IT Security (F. Abolhassan (ed.); pp. 21–26). Springer International Publishing. https://doi.org/10.1007/978-3-319-46529-6_3
Scope, N., Rasin, A., Lenard, B., Heart, K., & Wagner, J. (2022). Harmonizing privacy regarding data retention and purging. Proceedings of the 34th International Conference on Scientific and Statistical Database Management, 1–12. https://doi.org/10.1145/3538712.3538718.
Sihombing, G. P., Hamzah, H. A., Tian, C., Lianda, T. A. C., Daniswara, M. D., & Saputra, M. N. (2023). Analisis dampak kejahatan siber terhadap kepercayaan konsumen dalam berbelanja di Tokopedia. Jurnal Ekonomika Dan Manajemen, 12(2), 110–120. https://doi.org/10.36080/jem.v12i2.2362
Situmeang, S. M. T. (2021). Penyalahgunaan Data Pribadi Sebagai Bentuk Kejahatan Sempurna Dalam Perspektif Hukum Siber. SASI, 27(1), 38–52. https://doi.org/10.47268/sasi.v27i1.394
Sudaryono, S., Rahwanto, E., & Komala, R. (2020). E-Commerce Dorong Perekonomian Indonesia, Selama Pandemi Covid 19 sebagai Entrepreneur Modern dan Pengaruhnya Terhadap Bisnis Offline. Jurnal Manajemen Dan Bisnis, 2(02), 110–124. https://doi.org/10.47080/10.47080/vol1no02/jumanis
Swanzy, P. N., Abukari, A. M., & Ansong, E. D. (2024). Data Security Framework for Protecting Data in Transit and Data at Rest in the Cloud. Current Journal of Applied Science and Technology, 43(6), 61–77. https://doi.org/10.9734/cjast/2024/v43i64387
Szczepaniuk, E. K., Szczepaniuk, H., Rokicki, T., & Klepacki, B. (2020). Information security assessment in public administration. Computers & Security, 90, 101709. https://doi.org/10.1016/j.cose.2019.101709
Teoh, C. S., Mahmood, A. K., & Dzazali, S. (2018). Cyber Security Challenges in Organisations: A Case Study in Malaysia. 2018 4th International Conference on Computer and Information Sciences (ICCOINS), 1–6. https://doi.org/10.1109/ICCOINS.2018.8510569
Venter, I. M., Blignaut, R. J., Renaud, K., & Venter, M. A. (2019). Cyber security education is as essential as “the three R’s” Heliyon, 5(12). https://doi.org/10.1016/j.heliyon.2019.e02855
Yadav, B. (2022). Overview of Cyber Security. International Journal of Advanced Research in Science, Communication and Technology (IJARSCT), 2(4), 489–492. https://doi.org/10.48175/IJARSCT-3959
Zaidoun, A. S. (2022). Security Management. In Computer Science Security (pp. 147–164). https://doi.org/10.1002/9781394163847.ch8



