65 research outputs found

    Privacy and trust in the Islamic perspective: implication of the digital age

    Get PDF
    is slowly degrading the limitation and common understanding of privacy and trust through digital life, which has open world concept. It has become normal procedure when the user must submit their personal details for digital service such as social networking, electronic commerce, personal hosting, etc. Meanwhile, to be able to revealing their privacy willingly, user put their trust on organization to use their data based on agreement. In this sense, user expect their privacy right to be protected securely and actively. The dilemma occurred due to commercialization, consumerism and legislation as interaction issues, which shift the focus of user to identify the importance of their personal data and organization to analyze the process of data management. On the other hand, Islam gave the basic understanding in privacy and trust that emphasize important factor in human determination and intention. This paper will focus on how to define the standard and limitation of the concept privacy and trust based on Islamic perspective in aligning with the implication of digital age related to interest, classification and purpos

    Election fraud and privacy related issues: addressing electoral integrity

    Get PDF
    Nowadays, in a highly computerized system, people have tendency to have not expect privacy to be maintained and continue in its current form if individual control is required and monitored. Especially, in contemporary campaigns for higher office, the candidates often use mass media to deliver political message or having certain campaign developed by expert in the efficient use of providing personal information for the purpose of influencing the voters while some of them may be hidden or exploited by certain parties. Practically, it is impossible to have total control over personal information, once it has been collected and dispersed but it is possible to have privacy without control and vice versa. In election, huge amount of data is stored and transfer from multiple location to other numerous or single location to facilitate tabulation and calculation analysis. Thus, it is critical to conduct monitoring process to prevent crime such as theft, fraud and illegal use, to prevent unauthorized disclosure of confidential information, to comply with the obligation, law and regulation in avoiding discrimination, to maintain productivity and quality of service and to ensure integrity of the systems. This paper explores the election fraud and privacy related issues occurred during the election period in various countries to address the electoral integrity in Indonesia

    Information security awareness in university: maintaining learnability, performance and adaptability through roles of responsibility

    Get PDF
    The 21st century witnesses that technology is increasingly providing availability and accessibility to information, along with this trend is the emerging problem of information security. In order to analyze how technology introduces this new risks, it is necessary to discuss the technology lifecycle. Consider for instance the technology life cycleas concerning diffusion of an innovation. Since technological innovations or IT solutions are being adopted to support business processes, the need to protect those IT solutions also arises along with its adoption. Accordingly, two important factors need much consideration in raising awareness, firstly how organization influences significantly of end userโ€™s attitude and secondly how the organization ensure regular assessment or evaluation to measure the effectiveness of IS awareness policy within the organization

    The Indonesia Public Information Disclosure Act (UU-KIP): Its Challenges and Responses

    Get PDF
    Information Public Disclosure is one of the regulation that has purpose to encourage good governance for public service and citizen participation in national development. The enactment of Act No.14/2008 (UU KIP) has been strengthen the mandate to enforce the necessity of information disclosure in actualizing transparency and accountability in resource management and budget uses. It also become the primary instrument to prevent corruption, monopolistic competition and information disputes. However, there are certain provinces has not yet established information committee nor when it will be as entrusted by the regulation. Meanwhile, the remedies in term of jail duration and fines, arguably, it could not create deterrent effect to the perpetrator. Furthermore, the concern from ministry and public institution also in question in regard their roles of responsibility, lack of cooperation and continuous support. Thus, human resource, technology infrastructure, public participation, supervision and socialization become crucial factor to increase the awareness and satisfaction towards this regulatory compliance. This study is a qualitative research to evaluate the implementation of this Act by observing its consideration, background, principles and relevant article verses as primary sources through content analysis based on number of legal experts

    Privacy and Personal Data Protection in Electronic Voting: Factors and Measures

    Get PDF
    In general, electronic voting as the technology advancement offers the opportunities to reduce the time and budget of implementation which present the greater advantages than traditional approach. It seeks establish the privacy framework in the context of electronic voting that aligns with the mutual comprehension of relevant factors and measures. The result found that privacy concern and perceived benefit have influenced personal data protection significantly. The success and failure of electronic voting implementation depend on the fulfilment of the voter needs on privacy and personal data protection.

    Current State of Personal Data Protection in Electronic Voting: Criteria and Indicator for Effective Implementation

    Get PDF
    The adoption of electronic voting has been done in various countries related to cost and time reduction operationally. On the other hand, recent publication has been informed several issues occurred such as technicality, reliability, security and privacy due to the compromised system were used. In small scale, there are certain group of people who want to exploit the vulnerabilities for their own benefit in the election, while in the greater scale, it can reduce public confidence to entrust the adoption of e-voting system to augment participation rate, to improve the quality of voting and to aid the political right effectively. This paper aims to investigate the characteristic of people demanding the legislative to address the criteria and indicator for effective implementation in electronic voting. By understanding the perception of voters in viewing current electoral regulation are essential to provide some ideas and opinions for better enhancement, either through recommendation and drafting related legislation to cater the needs

    Current state of personal data protection in electronic voting: criteria and indicator for effective implementation

    Get PDF
    The adoption of electronic voting has been done in various countries related to cost and time reduction operationally. On the other hand, recent publication has been informed several issues occurred such as technicality, reliability, security and privacy due to the compromised system were used. In small scale, there are certain group of people who want to exploit the vulnerabilities for their own benefit in the election, while in the greater scale, it can reduce public confidence to entrust the adoption of e-voting system to augment participation rate, to improve the quality of voting and to aid the political right effectively. This paper aims to investigate the characteristic of people demanding the legislative to address the criteria and indicator for effective implementation in electronic voting. By understanding the perception of voters in viewing current electoral regulation are essential to provide some ideas and opinions for better enhancement, either through recommendation and drafting related legislation to cater the needs

    Current state of personal data protection in electronic voting: demand on legislatureโ€™s Bill

    Get PDF
    The strongest benefit has been offered for the implementation of electronic voting related to cost and time reduction. Therefore, recent publicity concerning the reliability, security and privacy issue of various e-voting systems has increased public scrutiny of the machines themselves as well as the election process as a whole. In the greater scale, it could reduce public confidence to entrust the adoption of e-voting system to augment participation rate, to improve the quality of voting and to aid the political right effectively and efficiently. This paper aims to provide general analysis of typical legal issues and its demand for personal data protection based on demographic data such as gender, age, occupation, electoral participation, education, earnings and legal literacy. By understanding the perception of voters in viewing current electoral regulation are essential to provide some insights and suggestion for better improvement, either through drafting or enforcing legislation. This study investigates the tendency of people in demanding the legislative to cater electronic voting

    Implication of human attitude factors toward information security: awareness in Malaysia Public University

    Get PDF
    Without a doubt, the whole world faces many challenges regarding hacker or cracker exploitation; and spammer in various sector such as Internet security, software privacy, email, etc. While Malaysian government attempted to establish several cyber laws in order to encounter the problem, mainly as the guidance for technology userโ€™s purpose, the danger in information exploitation still arise. The important factor that supports the successful of these policies implementation resides on how to raise the awareness among community. This process will give significance contribution to the effectiveness of policy implementation by its continuity through the communication chain and regularly information distribution. Government canโ€™t overrule the importance of university policies in building the awareness among student at beginning phase. Therefore, some factors need to be identified first, from which level that might influence positively the awareness in university. It has the function to measure the level of awareness for the improvement and performance purpose. However, the problem will always occur in terms of evolving the human mind in utilizing technology services, which put information security susceptible to attack and there is no standard regulation to ensure that human attitude involved delivering the secure and safety result. So, we can conclude that human error could be as greatest risk if current organizationโ€™s policy doesnโ€™t have the capability to control and manage it accordingly and frequently

    Analysis of project communication on smart card implementation in XYZ Malaysian higher education

    Get PDF
    Project communication is the exchange of project-specific information with the emphasis on creating understanding between the sender and the receiver. It reflected simultaneously to be an indispensable tool to manage project resources systematically. Communication through coordination and cooperation are common approach used for project scheduling, planning and control while collaboration establish the concrete result. Therefore, communication still remained as the main connector above all. Poor communication skill can cause anger, misunderstandings, conflict and distance that eventually influence project process significantly and lead to project failures. Analysis study was conducted to the โ€˜hiatusโ€™ smart card project implementation in XYZ Malaysian higher education with emphasize the point of communication as the important point should be considered without eliminating other knowledge management area which also important in succession of project. In addition, the analysis study conducted to give limelight specifically towards the smart card implementation in higher education as the reference of other project in preventing project failure happen
    • โ€ฆ
    corecore