Claim Missing Document
Check
Articles

Found 3 Documents
Search
Journal : Journal of Digital Law and Policy

The Impact of Information Technology Development on Cybercrime Rate in Indonesia Ni Komang Novia Widiasari; Emmy Febriani Thalib
Journal of Digital Law and Policy Vol. 1 No. 2 (2022): Journal of Digital Law and Policy - January 2022
Publisher : Catuspata

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (378.345 KB) | DOI: 10.58982/jdlp.v1i2.165

Abstract

Information technology is growing rapidly in society. In the period of technological development not only gives us a positive impact, but can also have a negative impact. One of the negative impact of the development of information technology is the misuse of the technology, so that it can harm others. Technological developments have an effect on the occurrence of cybercrime in Indonesia, the crimes that have occurred have also developed and varied. The method used in this research are a qualitative approach and descriptive methods. The results of the study show the impact of Information Technology development on the level of cybercrime in Indonesia occurs such as loss of privacy, unauthorized access to important data, data theft and others. Prevention and countermeasures that can be carry out to prevent cybercrime are preventive, pre-emptive and repressive measure
A Discussion of Malware Attacks Targeting Smart Homes and Connected Devices: Investigating Cybersecurity Risks in Everyday Living I Gede Adnyana; Emmy Febriani Thalib; Mariano Alan Harum; Martha Apriliani Chionia Nagas; Martinus Wilfrid Jawa
Journal of Digital Law and Policy Vol. 3 No. 1 (2023): Journal of Digital Law and Policy - September 2023
Publisher : Catuspata

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58982/jdlp.v3i1.507

Abstract

Computer technology has advanced with the digital age. Software for several platforms is crucial to streamlining human work with computers. This software is essential for many user tasks, including IoT ones. Through data exploitation and communication technologies, the Internet of entities (IoT) connects physical and virtual entities to the global web. This technology aims to make it easier for humans to interact with objects and let them communicate. In daily life, numerous specialized gadgets use the Internet of Things (IoT), especially Smart Homes. Smart Homes integrate networked communication networks with home devices for remote control, monitoring, and access. The name "Smart" in Smart Homes suggests intelligence, however IoT devices have limitations. Malware is purposely designed to disrupt or gain unauthorized access to computer systems without the system owner's knowledge or agreement. Malware threatens smart home security widely. Malware can also quickly regenerate and adapt as technology advances. It's often integrated into popular online apps. This study examines how malware assaults affect IoT and Smart Home devices. The study's conclusions include an analytical report on IoT and Smart Home malware mitigation in legal perspectives.
Analysis Of The 2nd Principle Of Pancasila On The Instagram Privacy Disclaimer Dwipasari, Berlian; Ananta Saputra, Nicolas; Thalib, Emmy Febriani
Journal of Digital Law and Policy Vol. 3 No. 2 (2024): Journal of Digital Law and Policy - January 2024
Publisher : Catuspata

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58982/jdlp.v3i2.533

Abstract

The article discusses the importance of user privacy on Instagram, a popular social media platform. In the digital era, millions of users share aspects of their personal lives, creating risks of data misuse and security threats. The right to privacy is recognized as a human right, including in the Indonesian Privacy Rights Law. Privacy Controls: Instagram gives users full control, allowing personal account settings. Data Policy: Instagram has a policy that explains the collection, use, and sharing of data, reflecting civilized principles. Data Security: Instagram claims to implement security measures and collaborate with third parties. Privacy Tools and Features: Instagram is constantly developing new privacy tools and features. In the context of Instagram user privacy, the principle of the 2nd Principle, "Just and Civilized Humanity," reflects fair treatment and respect for human rights. The rights to privacy, freedom of expression, data security, and control over personal information are the emphasis in implementing the 2nd Principle. Assessing the use of Instagram's privacy policy by the 2nd Principle and encouraging users to be wise in sharing information. A mixed method approach with descriptive qualitative methods and literature studies is used to understand the impact of Instagram user privacy. Privacy is a human right, and Instagram is expected to implement the principles of the 2nd Principle with policies that support the control, security, and fair treatment of users' data.