-
1
Information security and data protection: Selected issues
Published 2013Get full text
Get full text
Proceeding Paper -
2
A guideline to enforce privacy and data protection regulation in Indonesia
Published 2013“…This paper will present guideline in applying privacy and data protection regulation in Indonesia, specifically in terms of commercial and administrative purpose.…”
Get full text
Proceeding Paper -
3
An overview of legal framework for personal data protection on electronic voting in Indonesia
Published 2013Get full text
Proceeding Paper -
4
How does the Personal Data Protection Act 2010 affect the clinical research?
Published 2013Get full text
Get full text
Get full text
Proceeding Paper -
5
The significance of Personal Data Protection Act (PDPA) 2010 on data security & IT audit
Published 2013Get full text
Get full text
Proceeding Paper -
6
Development of Al-Mu’awwidhah computing for personal data protection against abnormal attacks
Published 2013“…The Islamic concept of Al-Mu’awwidhah inspired the discovery of non-parametric cryptographs for personal data protection against abnormal (paranormal and asymmetric) cyber-attacks. …”
Get full text
Get full text
Proceeding Paper -
7
-
8
Privacy Impact Assessment (PIA): From management tools towards a privacy culture
Published 2013Get full text
Get full text
Proceeding Paper -
9
PDP law and the university data ecosystem: understanding the context
Published 2014“….- are among those who are regulated by the Personal Data Protection Act (PDPA) 2010. The data subjects include: students (obviously the main object here), staffs or employees, vendors, alumni, sponsors, as well as those applicants who have yet join the universities/schools. …”
Get full text
Get full text
Proceeding Paper -
10
User generated content and the Muslim consumer in Cyberspace
Published 2012“…This situation raises some issues concerning privacy, data protection and defamation with the responsibility now being more in the hands of the consumer in exercising self-restraint. …”
Get full text
Proceeding Paper -
11
Encryption in TECB mode: modeling, simulation and synthesis
Published 2007“…The growth of the Internet as a vehicle for secure communication has resulted in Data Encryption Standard DES) no longer capable of providing high-level security for data protection. Triple Data Encryption Standard (3DES) is a symmetric block cipher with 192 bits key proposed to further enhance DES. …”
Get full text
Proceeding Paper