Protection of Personal Data in the Use of Digital ID Cards against Misuse of Data from Cyber Hack

  • Mia Rizki Diponegoro University
  • Augustin Rina Herawati Diponegoro University
  • Endang Larasati Diponegoro University
Keywords: Digital ID Card, Personal Data, Data Protection, E-Government

Abstract

Data misuse from cyber hack in Indonesia is still high, judging from data leakage cases in Indonesia, from January to June 2023 there were 35 cases. Data leaks related to personal data on identity cards totaling 377 million data leaked until 2023, the data is contained on the dark web in the form of NIK, full name, date of birth, birth certificate number, blood type, religion, marital status and so on. Writing using a qualitative descriptive approach, this study uses literature studies, namely data collection techniques by conducting a review study of books, literature, records, and reports related to Digital ID cards and data security. This research also uses a fact approach, a case approach to data misuse by cyber hackers, and a statutory approach. The type of data used is secondary data. There are still many personal data leaks in various factors including human error, malware, system security weaknesses, insider threats, lack of security awareness. The impact of data leaks are fraud and identity theft, threatened privacy, financial fraud, national security threats. There are various alternative recommendations to minimize data leakage, this anticipation can be done by the community, students, and the government. This anticipation is in the form of changing passwords regularly, being careful in using applications or social media that have viruses, avoiding uploading photos of ID cards, conducting cyber security training, community empowerment, bureaucracy forming a special IT department responsible for building virtual protection systems, cooperation with third parties.

References

Ali, S., Zheng, Z., Aillerie, M., Sawicki, J. P., Pera, M. C., & Hissel, D. (2021). A review of DC Microgrid energy management systems dedicated to residential applications. Energies, 14(14), 4308. https://doi.org/10.3390/en14144308

Bowen, T., Del Ninno, C., Andrews, C., Coll-Black, S., Johnson, K., Kawasoe, Y., ... & Williams, A. (2020). Adaptive social protection: building resilience to shocks. World Bank Publications.

Grantz, K. H., Meredith, H. R., Cummings, D. A., Metcalf, C. J. E., Grenfell, B. T., Giles, J. R., ... & Wesolowski, A. (2020). The use of mobile phone data to inform analysis of COVID-19 pandemic epidemiology. Nature communications, 11(1), 4961. https://doi.org/10.1038/s41467-020-18190-5

Hastuti, S. H. D. (2020). Pentingnya pemanfaatan data kependudukan di era digital. TEKNIMEDIA: Teknologi Informasi Dan Multimedia, 1(1), 18-21. https://doi.org/10.46764/teknimedia.v1i1.9

Hermawanto, A., & Anggraini, M. (2020, October). Globalization And Locality: Global Communication And Digital Revolution In The Borderless World Era. In Proceeding Of Lppm Upn “Veteran” Yogyakarta Conference Series 2020–Political And Social Science Series (Vol. 1, No. 1, pp. 9-16). https://doi.org/10.31098/pss.v1i1.84

Marcelliana, V., Zahra, S. M., Adzani, N. N., Massaid, H. N., Badriyyah, N., Benita, R., ... & Bayhaqi, T. A. R. (2023). Penerapan Perlindungan Konsumen Terhadap Nasabah Pt. Bank Syariah Indonesia Dalam Kasus Kebocoran Data Nasabah. Deposisi: Jurnal Publikasi Ilmu Hukum, 1(2), 180-194. https://doi.org/10.59581/deposisi.v1i2.577

Nugraha, A. (2020). Sistem Pengelolaan Dokumen Elektronik untuk Digitalisasi pada Layanan Publik. Jurnal Komputer dan Informatika, 15(1), 274-281.

Pratama, A. M., & Pati, U. K. (2021). Analysis principles of personal data protection on COVID-19 digital contact tracing application: pedulilindungi case study. Lex Scientia Law Review, 5(2), 65-88.

Saleh, S. S., Nat, M., & Aqel, M. (2022). Sustainable adoption of e-learning from the TAM perspective. Sustainability, 14(6), 3690. https://doi.org/10.3390/su14063690

Stevens, E., Antiga, L., & Viehmann, T. (2020). Deep learning with PyTorch. Manning Publications.

Syafriyani, I. (2019, December). Implementasi E-Government dalam Menjawab Tantangan Pelayanan Publik di Kabupaten Sumenep. In Prosiding: Seminar Nasional Ekonomi dan Teknologi (pp. 216-221).

Thompson, P., & Laaser, K. (2021). Beyond technological determinism: revitalising labour process analyses of technology, capital and labour. Work in the Global Economy, 1(1-2), 139-159. https://doi.org/10.1332/273241721X16276384832119

Todt, K. E. (2019). Data Privacy and Protection. The Cyber Defense Review, 4(2), 39-46. https://www.jstor.org/stable/26843891

Vu, C., & Rajaratnam, S. (2016). Cyber security in Singapore. S. Rajaratnam School of International Studies.

Published
2024-04-01
How to Cite
Rizki, M., Herawati, A. R., & Larasati, E. (2024). Protection of Personal Data in the Use of Digital ID Cards against Misuse of Data from Cyber Hack. Journal La Sociale, 5(2), 471-478. https://doi.org/10.37899/journal-la-sociale.v5i2.1132