Showing 1 - 9 results of 9 for search '"data protection"', query time: 0.08s Refine Results
  1. 1

    Privacy, Confidentiality, and Data Protection: Ethical Considerations in the Use of the Internet by Devi Tri Indriasari, Karman Karman

    Published 2023-07-01
    “…The article delves into the ethical implications of the Internet, including privacy concerns, confidentiality, decision-making, and data protection. In conclusion, it posits that the Internet should not be viewed simply as a tool but as a cultural artifact with the potential to shape society for better or worse. …”
    Get full text
    Article
  2. 2
  3. 3

    Perbandingan Perlindungan Hukum Terkait Data Pribadi di Indonesia dan Jerman by Namrysilia Buti Anjawai, F. Yudhi Priyo Amboro, Rufinus Hotmaulana Hutauruk

    Published 2022-09-01
    “…Similarities and differences in personal data protection between Indonesia-Germany and the legal contributions of personal data protection that he can adopt or apply in Indonesia such as special arrangements for personal data protection, data classification, one of which is the deletion of personal data, and the establishment of a Personal Data Protection Supervisory Agency and the rules that govern it …”
    Get full text
    Article
  4. 4

    Tinjauan Yuridis Kejahatan di dalam Sistem Elektronik pada Rekening Virtual by Bani David Soaloon Pakpahan, Parameshwara Parameshwara, Kartina Pakpahan, Margaretha Citra Novriyanti Saota, Franciscus Orlando Tambunan

    Published 2023-09-01
    “…The aim of the research is to find out what electronic system crimes are, analyze the application of data protection laws, and legal sanctions for perpetrators of account burglary crimes. …”
    Get full text
    Article
  5. 5

    A Analisis Perlindungan Konsumen dalam Tindakan Penyalahgunaan Data Pribadi oleh Penyelenggara Pinjaman Online Berdasarkan Perspektif Hukum Indonesia by Novrianti Novri, Florianus Yudhi Priyo Amboro, Rufinus Hotmaulana Hutauruk

    Published 2023-05-01
    “…Law Number 27 of 2022 concerning Personal Data Protection was formed so that it does not overlap with other regulations that guarantee the protection of personal data in the community. …”
    Get full text
    Article
  6. 6

    Recovering Data from Password Protected Data Security Applications in Android Based Smartphones by Hammad Riaz

    Published 2016-06-01
    “…A few well known data protection android applications are analyzed. The analysis was performed on both partially supported and fully supported sets.…”
    Get full text
    Article
  7. 7

    Urgensi Perlindungan Hak Asasi Anak Atas Data Pribadi di Era Digitilasasi Berdasarkan Prinsip Negara Hukum by Duta Agung Rohmansyah, Kevin Mandela Saputra, Badrus Sholih

    Published 2023-07-01
    “…The normative legal research method is used, namely the primary legal material is collected and analyzed, namely the Child Protection Act, the Information and Electronic Commerce Law and the Personal Data Protection Act. The pattern of approach in this study is carried out using a deductive approach, that is, in general, it is specifically discussed. …”
    Get full text
    Article
  8. 8

    تعزيز المعالجة الآمنة و الفعالة للاستعلامات في ظل النموذج Truman للتحكم بالوصول على المستوى الناعم by يوسف دلا, آلاء اكر

    Published 2018-10-01
    “…Due to the failure of traditional data protection systems, researchers have sought to the Fine-Grained Access Control (FGAC) model to perform this task because of its accuracy in meeting current security requirements at the level of records, columns and even individual cells. …”
    Get full text
    Article
  9. 9

    المعوقات المجتمعية للمعرفة الرقمية في مصر دراسة ميدانية في بعض أحياء محافظة القاهرة by نجلاء محمود رؤوف السيد المصيلحي

    Published 2023-04-01
    “…It was a reason for the limited digital knowledge, and the results revealed the lack of training programs and with regard to the requirements of digital knowledge, the results emphasized the need to spread awareness of the importance of digital knowledge by a large percentage, and the importance of developing data protection laws.…”
    Get full text
    Article