PRIVACY AND SECURITY IN DIGITAL COMMUNICATIONS: CHALLENGES AND SOLUTIONS IN CYBERSPACE

Penulis

  • Gunawan Widjaja Universitas 17 Agustus 1945 Jakarta

Kata Kunci:

privacy, security, digital communications, challenges, solutions, encryption, security software, education, regulation, individual responsibility.

Abstrak

Privacy and security are two crucial issues in the era of digital communication. The rapid development of technology has created various challenges in protecting personal information and maintaining security in cyberspace. The main challenges faced in digital communication include identity theft, data breaches, cyber attacks, and misuse of personal information. Solutions include the use of encryption, security software, education and awareness raising, regulation and enforcement, and individual responsibility. Therefore, it is important to emphasise the collective efforts and constant vigilance of various parties, including individuals, companies, and governments, to create a safer and more trusted digital environment. With a comprehensive and adaptive approach to technological developments, it is expected to protect privacy rights, reduce the risk of cyber threats, and promote sustainable growth of the digital economy.

Referensi

Acosta, F. (2023). Between expansion and segmentation: Revisiting old and new disparities in secondary education in Latin America. International Journal of Inclusive Education, Query date: 2025-01-04 06:18:11, 1-18. https://doi.org/10.1080/13603116.2023.2274114

Adari, G. V. C., & Manyala, R. R. (2022). Cyber Security in Smart Grids. Advances in Information Security, Privacy, and Ethics, Query date: 2025-01-05 20:33:25, 18-36. https://doi.org/10.4018/978-1-6684-5827-3.ch002

Adlini, M. N., Dinda, A. H., Yulinda, S., Chotimah, O., & Merliyana, S. J. (2022). Qualitative Research Methods of Literature Study. Edumaspul: Journal of Education,6 (1), 974-980. https://doi.org/10.33487/edumaspul.v6i1.3394

Agarwal, A. (2024). Understanding Green Economy. Advances in Business Strategy and Competitive Advantage, Query date: 2025-01-04 05:55:21, 1-22. https://doi.org/10.4018/979-8-3693-1297-1.ch001

Alaslan, A. (2022). QUALITATIVE RESEARCH METHODS. Query date: 2024-05-25 20:59:55. https://doi.org/10.31237/osf.io/2pr4s

Arastouei, N. (2023). 6G Technologies: Key Features, Challenges, Security and Privacy Issues. Communications in Computer and Information Science, Query date: 2025-01-05 20:33:25, 94-109. https://doi.org/10.1007/978-3-031-36096-1_7

Bhardwaj, T., Kamat, V. A., & Dwivedi, G. (2022). Blockchain-Based Solutions for Cybersecurity: Architecture, Applications, and Review. Blockchain Technologies, Query date: 2025-01-05 20:33:25, 47-57. https://doi.org/10.1007/978-981-19-1960-2_3

Bhattacharya, M., Roy, S., Chattopadhyay, S., Das, A. K., & Shetty, S. (2022). A comprehensive survey on online social networks security and privacy issues: Threats, machine learning-based solutions, and open challenges. SECURITY AND PRIVACY,6 (1). https://doi.org/10.1002/spy2.275

Costa, T. R. V. (2021). Arbitration Chambers and Data Protection. Advances in Information Security, Privacy, and Ethics, Query date: 2025-01-05 20:33:25, 188-194. https://doi.org/10.4018/978-1-7998-4201-9.ch010

Darwish, D. (2024). Social Networks Privacy and Security Basics. Advances in Information Security, Privacy, and Ethics, Query date: 2025-01-05 20:33:25, 1-14. https://doi.org/10.4018/979-8-3693-9491-5.ch001

Fischer, M. (2023). From newspapers to social media? Changing dynamics in Swiss direct democratic campaigns. Swiss Political Science Review,29 (4), 465-478. https://doi.org/10.1111/spsr.12578

França, R. P., Bonacin, R., & Monteiro, A. C. B. (2024). An Overview of Data Privacy and Security in Cloud Platforms. Digital Cultural Heritage, Query date: 2025-01-05 20:33:25, 21-39. https://doi.org/10.1201/9781032630564-2

Ganesan, P. (2021). Advanced Cloud Computing for Healthcare: Security Challenges and Solutions in Digital Transformation. International Journal of Science and Research (IJSR),10 (6), 1865-1872. https://doi.org/10.21275/sr24910085607

Garvey, M. D. (2021). A Philosophical Examination on the Definition of Cyberspace. Cyber Security and Supply Chain Management, Query date: 2025-01-05 20:33:25, 1-11. https://doi.org/10.1142/9789811233128_0001

Geada, N. (2021). Change Management in the Digital Transformation Projects. Advances in Information Security, Privacy, and Ethics, Query date: 2025-01-05 20:33:25, 91-97. https://doi.org/10.4018/978-1-7998-4201-9.ch005

Goel, P. K. (2024). Blockchain Technology for Enhancing Social Media Security and Privacy. Advances in Information Security, Privacy, and Ethics, Query date: 2025-01-05 20:33:25, 193-212. https://doi.org/10.4018/979-8-3693-9491-5.ch009

Johnson, J. (2020). Chapter 1 Media Use in American Presidential Campaigns. Political Rhetoric, Social Media, and American Presidential Campaigns, Query date: 2025-01-05 16:05:41, 7-32. https://doi.org/10.5771/9781498540841-7

Kumari, P. L. S. (2020). Big Data. Advances in Information Security, Privacy, and Ethics, Query date: 2025-01-05 20:33:25, 24-65. https://doi.org/10.4018/978-1-5225-9742-1.ch002

Mazurczyk, W., Bisson, P., Jover, R. P., Nakao, K., & Cabaj, K. (2020). Challenges and Novel Solutions for 5G Network Security, Privacy and Trust. IEEE Wireless Communications,27 (4), 6-7. https://doi.org/10.1109/mwc.2020.9170261

Palhares, F. (2021). Brazil's Data Protection Law. Advances in Information Security, Privacy, and Ethics, Query date: 2025-01-05 20:33:25, 98-118. https://doi.org/10.4018/978-1-7998-4201-9.ch006

Patel, B., & Mann, P. S. (2024). A Survey on Mobile Digital Forensic: Taxonomy, Tools, and Challenges. SECURITY AND PRIVACY, Query date: 2025-01-05 20:33:25. https://doi.org/10.1002/spy2.470

Reddy, L. V. K., & Rajendran, R. K. (2024). Addressing Privacy Setting Loopholes Challenges and the Need for Enhanced Data Protection. Advances in Information Security, Privacy, and Ethics, Query date: 2025-01-05 20:33:25, 335-364. https://doi.org/10.4018/979-8-3693-9491-5.ch015

Sezgin, A., & Boyacı, A. (2023). A Survey of Privacy and Security Challenges in Industrial Settings. 2023 11th International Symposium on Digital Forensics and Security (ISDFS), Query date: 2025-01-05 20:33:25, 1-7. https://doi.org/10.1109/isdfs58141.2023.10131858

Silva, L. R. F. da. (2021). Scaling Agile at Enterprise to Enable and Accelerate the Digital Transformation. Advances in Information Security, Privacy, and Ethics, Query date: 2025-01-05 20:33:25, 463-476. https://doi.org/10.4018/978-1-7998-4201-9.ch027

Sousa, M. J., Barros, G. O. de, & Tavares, N. (2021). Artificial Intelligence a Driver for Digital Transformation. Advances in Information Security, Privacy, and Ethics, Query date: 2025-01-05 20:33:25, 234-250. https://doi.org/10.4018/978-1-7998-4201-9.ch014

Suyitno. (2021). QUALITATIVE RESEARCH METHODS CONCEPTS, PRINCIPLES AND OPERATIONS. Query date: 2024-05-25 20:59:55. https://doi.org/10.31219/osf.io/auqfr

Verslegers, D. (2021). Challenges and Opportunities for Security Assurance in DevOps. Advances in Information Security, Privacy, and Ethics, Query date: 2025-01-05 20:33:25, 314-321. https://doi.org/10.4018/978-1-7998-7367-9.ch010

Unduhan

Diterbitkan

2025-01-07

Terbitan

Bagian

##section.default.title##