PRIVACY AND SECURITY IN DIGITAL COMMUNICATIONS: CHALLENGES AND SOLUTIONS IN CYBERSPACE
Kata Kunci:
privacy, security, digital communications, challenges, solutions, encryption, security software, education, regulation, individual responsibility.Abstrak
Privacy and security are two crucial issues in the era of digital communication. The rapid development of technology has created various challenges in protecting personal information and maintaining security in cyberspace. The main challenges faced in digital communication include identity theft, data breaches, cyber attacks, and misuse of personal information. Solutions include the use of encryption, security software, education and awareness raising, regulation and enforcement, and individual responsibility. Therefore, it is important to emphasise the collective efforts and constant vigilance of various parties, including individuals, companies, and governments, to create a safer and more trusted digital environment. With a comprehensive and adaptive approach to technological developments, it is expected to protect privacy rights, reduce the risk of cyber threats, and promote sustainable growth of the digital economy.
Referensi
Acosta, F. (2023). Between expansion and segmentation: Revisiting old and new disparities in secondary education in Latin America. International Journal of Inclusive Education, Query date: 2025-01-04 06:18:11, 1-18. https://doi.org/10.1080/13603116.2023.2274114
Adari, G. V. C., & Manyala, R. R. (2022). Cyber Security in Smart Grids. Advances in Information Security, Privacy, and Ethics, Query date: 2025-01-05 20:33:25, 18-36. https://doi.org/10.4018/978-1-6684-5827-3.ch002
Adlini, M. N., Dinda, A. H., Yulinda, S., Chotimah, O., & Merliyana, S. J. (2022). Qualitative Research Methods of Literature Study. Edumaspul: Journal of Education,6 (1), 974-980. https://doi.org/10.33487/edumaspul.v6i1.3394
Agarwal, A. (2024). Understanding Green Economy. Advances in Business Strategy and Competitive Advantage, Query date: 2025-01-04 05:55:21, 1-22. https://doi.org/10.4018/979-8-3693-1297-1.ch001
Alaslan, A. (2022). QUALITATIVE RESEARCH METHODS. Query date: 2024-05-25 20:59:55. https://doi.org/10.31237/osf.io/2pr4s
Arastouei, N. (2023). 6G Technologies: Key Features, Challenges, Security and Privacy Issues. Communications in Computer and Information Science, Query date: 2025-01-05 20:33:25, 94-109. https://doi.org/10.1007/978-3-031-36096-1_7
Bhardwaj, T., Kamat, V. A., & Dwivedi, G. (2022). Blockchain-Based Solutions for Cybersecurity: Architecture, Applications, and Review. Blockchain Technologies, Query date: 2025-01-05 20:33:25, 47-57. https://doi.org/10.1007/978-981-19-1960-2_3
Bhattacharya, M., Roy, S., Chattopadhyay, S., Das, A. K., & Shetty, S. (2022). A comprehensive survey on online social networks security and privacy issues: Threats, machine learning-based solutions, and open challenges. SECURITY AND PRIVACY,6 (1). https://doi.org/10.1002/spy2.275
Costa, T. R. V. (2021). Arbitration Chambers and Data Protection. Advances in Information Security, Privacy, and Ethics, Query date: 2025-01-05 20:33:25, 188-194. https://doi.org/10.4018/978-1-7998-4201-9.ch010
Darwish, D. (2024). Social Networks Privacy and Security Basics. Advances in Information Security, Privacy, and Ethics, Query date: 2025-01-05 20:33:25, 1-14. https://doi.org/10.4018/979-8-3693-9491-5.ch001
Fischer, M. (2023). From newspapers to social media? Changing dynamics in Swiss direct democratic campaigns. Swiss Political Science Review,29 (4), 465-478. https://doi.org/10.1111/spsr.12578
França, R. P., Bonacin, R., & Monteiro, A. C. B. (2024). An Overview of Data Privacy and Security in Cloud Platforms. Digital Cultural Heritage, Query date: 2025-01-05 20:33:25, 21-39. https://doi.org/10.1201/9781032630564-2
Ganesan, P. (2021). Advanced Cloud Computing for Healthcare: Security Challenges and Solutions in Digital Transformation. International Journal of Science and Research (IJSR),10 (6), 1865-1872. https://doi.org/10.21275/sr24910085607
Garvey, M. D. (2021). A Philosophical Examination on the Definition of Cyberspace. Cyber Security and Supply Chain Management, Query date: 2025-01-05 20:33:25, 1-11. https://doi.org/10.1142/9789811233128_0001
Geada, N. (2021). Change Management in the Digital Transformation Projects. Advances in Information Security, Privacy, and Ethics, Query date: 2025-01-05 20:33:25, 91-97. https://doi.org/10.4018/978-1-7998-4201-9.ch005
Goel, P. K. (2024). Blockchain Technology for Enhancing Social Media Security and Privacy. Advances in Information Security, Privacy, and Ethics, Query date: 2025-01-05 20:33:25, 193-212. https://doi.org/10.4018/979-8-3693-9491-5.ch009
Johnson, J. (2020). Chapter 1 Media Use in American Presidential Campaigns. Political Rhetoric, Social Media, and American Presidential Campaigns, Query date: 2025-01-05 16:05:41, 7-32. https://doi.org/10.5771/9781498540841-7
Kumari, P. L. S. (2020). Big Data. Advances in Information Security, Privacy, and Ethics, Query date: 2025-01-05 20:33:25, 24-65. https://doi.org/10.4018/978-1-5225-9742-1.ch002
Mazurczyk, W., Bisson, P., Jover, R. P., Nakao, K., & Cabaj, K. (2020). Challenges and Novel Solutions for 5G Network Security, Privacy and Trust. IEEE Wireless Communications,27 (4), 6-7. https://doi.org/10.1109/mwc.2020.9170261
Palhares, F. (2021). Brazil's Data Protection Law. Advances in Information Security, Privacy, and Ethics, Query date: 2025-01-05 20:33:25, 98-118. https://doi.org/10.4018/978-1-7998-4201-9.ch006
Patel, B., & Mann, P. S. (2024). A Survey on Mobile Digital Forensic: Taxonomy, Tools, and Challenges. SECURITY AND PRIVACY, Query date: 2025-01-05 20:33:25. https://doi.org/10.1002/spy2.470
Reddy, L. V. K., & Rajendran, R. K. (2024). Addressing Privacy Setting Loopholes Challenges and the Need for Enhanced Data Protection. Advances in Information Security, Privacy, and Ethics, Query date: 2025-01-05 20:33:25, 335-364. https://doi.org/10.4018/979-8-3693-9491-5.ch015
Sezgin, A., & Boyacı, A. (2023). A Survey of Privacy and Security Challenges in Industrial Settings. 2023 11th International Symposium on Digital Forensics and Security (ISDFS), Query date: 2025-01-05 20:33:25, 1-7. https://doi.org/10.1109/isdfs58141.2023.10131858
Silva, L. R. F. da. (2021). Scaling Agile at Enterprise to Enable and Accelerate the Digital Transformation. Advances in Information Security, Privacy, and Ethics, Query date: 2025-01-05 20:33:25, 463-476. https://doi.org/10.4018/978-1-7998-4201-9.ch027
Sousa, M. J., Barros, G. O. de, & Tavares, N. (2021). Artificial Intelligence a Driver for Digital Transformation. Advances in Information Security, Privacy, and Ethics, Query date: 2025-01-05 20:33:25, 234-250. https://doi.org/10.4018/978-1-7998-4201-9.ch014
Suyitno. (2021). QUALITATIVE RESEARCH METHODS CONCEPTS, PRINCIPLES AND OPERATIONS. Query date: 2024-05-25 20:59:55. https://doi.org/10.31219/osf.io/auqfr
Verslegers, D. (2021). Challenges and Opportunities for Security Assurance in DevOps. Advances in Information Security, Privacy, and Ethics, Query date: 2025-01-05 20:33:25, 314-321. https://doi.org/10.4018/978-1-7998-7367-9.ch010