Anda di halaman 1dari 23

Digital Citizenship

Digital Security
& Safety

Dr. dr. Matrissya Hermita., MSi., M.IKom


Prof. Dr. Ir. Budi Hermana, MM.
Dr. Wahyu Rahardjo, S.Psi., M.Si
Dr. Indah Mulyani, S.Psi. M.Si
Dr. Ahmad Jum’a Khatib N, M.Si

COLORING THE GLOBAL FUTURE


Digital Citizenship
Digital Digital Security & Digital
Access Safety Law

Digital Digital Digital Health &


Communication Etiquette Wellness

Digital Digital Rights & Digital


Literacy Responsibilities Commerce
Outline
• Personal data, Electronic Information, Privacy Concern
• Cyber Crime
• Internet Safety: Best Practices
Definition

personal data means any information relating to an


identified or identifiable natural person (‘data subject’);
an identifiable natural person is one who can be identified, directly or indirectly, in particular by
reference to an identifier such as a name, an identification number, location data, an online identifier
or to one or more factors specific to the physical, physiological, genetic, mental, economic, cultural or
social identity of that natural person;
• segala informasi yang berkaitan dengan
orang yang diidentifikasi atau dapat
diidentifikasi ('subjek data ‘);

• Orang/perorangan yang dapat diidentifikasi


Personal data adalah orang yang dapat diidentifikasi, baik
secara langsung atau tidak langsung,
[GDPR] khususnya dengan mengacu pada pengenal
seperti nama, nomor identifikasi, data lokasi,
pengenal online atau satu atau lebih faktor
yang spesifik untuk fisik, fisiologis, identitas
genetik, mental, ekonomi, budaya atau sosial
dari orang tersebut;
All of which can collect and store personal information, including:

Full name inc. first Login details,


Physical address Email address Phone number
or last name Hashed passwords

Identity number:
Location —
Driver’s license Credit/debit card Gender, Date of
country, state, city, Race and ethnicity
number, NIK, details birth,
ZIP code
Passport

Age group
Job details Cookies IP address Device id
Informasi Elektronik
(UU no 19 Tahun 2016)

satu atau sekumpulan data elektronik, termasuk tetapi tidak terbatas pada
tulisan, suara, gambar, peta, rancangan, foto, electronic data interchange (EDI),
surat elektronik (electronic mail), telegram, teleks, telecopy atau sejenisnya,
huruf, tanda, angka, Kode Akses, simbol, atau perforasi yang telah diolah yang
memiliki arti atau dapat dipahami oleh orang yang mampu memahaminya
Privacy Concern
Data Privacy

Data Privacy is a branch of data security concerned with the


proper handling of data – consent, notice, and regulatory
obligations.

Data privacy governs how the data is collected, shared, used and
defines who has authorized access.

Now an incredible amount of data collected on individuals via


smart phones, internet browsers and other digitally connected
services such as smart watch, smart phone, laptop, bank account.
The Importance of Data Privacy (cited in Alamsyah, 2021)

Data is one of the most important assets a company has. Companies find enormous value in
collecting, sharing and using data.

Transparency in how businesses request consent, comply with privacy policies, and manage
the data that they’ve collected is vital to build trust and accountability with customers and
partners who expect privacy.
Regulatory Compliance: Managing data to ensure regulatory compliance. Non-compliance
could lead lost revenue and lost customer trust.

Privacy is the right of an individual to be free from uninvited surveillance.


Sumber : https://tekno.kompas.com/read/2020/10/12/07020007/kejahatan-siber-di-indonesia-naik-4-kali-
lipat-selama-pandemi
Kejahatan Siber

Klasifikasi Teori Pencegahan

Computer Disembodied Routine Activity Space Transition


Telepresence Approach (Cohen) Craved Theory Man Methods Tools Regulasi
Crime

Manajemen
Mudah
Suitable Victim Awareness Keamanan Monitoring UU Siber
disamarkan
Computer Informasi
Related Crime
UU
Program Teknologi
Likely Offender Mudah dihapus Kompetensi Perlindungan
Peningkatan Keamanan
Data Pribadi
Awareness dan
Kompetensi
Capable Perangkat
Mudah didapat
Guardian hukum

Enjoyable

Mudah
dipasarkan
Computer
Crime
Cyber Crime
[klasifikasi]

Computer
Realated Crime
Cyber-risk
Phishing: Taktik manipulasi dan penipuan melalui email, situs web,
dan pesan teks maupun suara untuk mencuri informasi atau hal .

Berdasarkan target : Spam & Spear

Spam Widespread attack, unspecific identified target

Spear Phishing: personalized informasi, serangan ditargetkan


terhadap individu atau bisnis yang bernilai tinggi.
Cyber-risk
Baiting: Serangan social engineering online dan fisik yang
menjanjikan korban sebuah hadiah.

Malware: Perangkat lunak korban akan dikirim malware


dan memaksa korban untuk membayar. Jika mereka
membayar, malware tersebut akan dihapus.

Pretexting: Menggunakan identitas palsu untuk menipu


korban agar memberikan informasi rahasia.
Internet Safety
Upaya memaksimalkan awareness (kesadaran) atas risiko keselamatan dan keamanan pribadi
serta properti terkait dengan penggunaan internet dan perlindungan diri dari kejahatan komputer
• Kesadaran akan ancaman dan risiko
• Pengetahuan berbagai macam kejahatan siber
• Kemampuan untuk melindungi diri dari berbagai ancaman dan risiko
• Perilaku ber Internet yang aman dan sehat

Target group peningkatan kesadaran

• Anak-anak dan remaja


• The new Internet baby born
• Bahkan pengguna Internet yang sudah berpengalaman terkadang menjadi korban karena ancaman
selalu berkembang dan mutakhir
Three factors use of authentication
(cited in Alamsyah, 2021)

What You Know : PIN, Password

What you have : card, Token, OTP

Who you are : biometric identification; fingerprint,


retina, voice, face recognition.
Factors that raise privacy concerns
and discourage information disclose
(Li, 2012)

• Perceived risks and vulnerability;


• Computer anxiety;
• Previous experience with privacy
invasion;
• Personalities such as social
awareness, conscientiousness,
openness to experience; cynical
distrust, paranoia,
• and social criticism, and
psychological need for privacy.
Factors that mitigate privacy
concerns and encourage
information disclosure
(Li, 2012)
Privacy Literacy (Rotman cited in Wissinger, 2017)

Understanding Understanding how personal information is used online.

Recognizing Recognizing the various places personal information may be shared online

Realizing Realizing the consequence of sharing personal information online.

Evaluating Evaluating the risks and benefits of sharing personal information online.

Deciding Deciding when to share personal information online.


• Wissinger, C.L. (2017). Privacy literacy: From theory to practice.
Communications in Information Literacy, 11(2), 378-389.
• UNESCO, 2018. A Global Framework of Reference on Digital Literacy
Skills for Indicator 4.4.2.
• Li, Y. 2012. Theories in online information privacy research: A critical

Daftar
review and an integrated framework. Decision Support Systems 54
(2012) 471–481
• Ostheimer & Iqbal. 2019Privacy in online dating: does it matter.

Pustaka • Smith, Dinev, Xu. 2011. INFORMATION PRIVACY RESEARCH: AN


INTERDISCIPLINARY REVIEW.
• Rahardjo, W., Qomariyah, N., Hermita, M., Suhatril, R. J., Marwan, M. A.,
& Andriani, I. (2020). Online adolescent self-disclosure as social media
users: The role of extraversion personality, perception of privacy risk,
convenience of relationship maintenance, and self-presentation. Jurnal
Psikologi, 19(3), 219-232. https://doi.org/10.14710/jp.19.3.219-232

Anda mungkin juga menyukai