Big Data and Security: A Review of Social Media Risks and Insights for Indonesia
Abstract
This article investigates the complex relationship between big data and management, focusing on the mitigation of potential threats arising from social media platforms, particularly in the Indonesian context. A comprehensive literature review examines existing social media security concerns and mitigation strategies, revealing a notable gap in research regarding effective government policies and plans to address these issues, especially in countries where such frameworks are lacking. This study contributes to the discourse by synthesizing key findings from the literature and offering actionable recommendations to stakeholders for mitigating social media security risks. Furthermore, it identifies practical lessons and proposes avenues for future research to explore strategies and pragmatic perspectives aimed at addressing the potential risks associated with social media for the Indonesian government. The novelty of this research lies in its focus on bridging the gap between big data, social media risks, and the development of effective government policies in the Indonesian context, contributing to a safer and more secure digital landscape.
Keywords
Full Text:
PDFReferences
Ahdiat, A. (2022). Survei: Pecandu Internet Terbanyak dari Kalangan Gen Z. [online] available at https://databoks.katadata.co.id/datapublish/2022/06/29/survei-pecandu-internet-terbanyak-dari-kalangan-gen-z accessed on November 2022
Akram, W., & Kumar, R. (2017). A study on positive and negative effects of social media on society. International Journal of Computer Sciences and Engineering, 5(10), 351–354. https://doi.org/10.26438/ijcse/v5i10.351354
Alneyadi, S., Sithirasenan, E., & Muthukkumarasamy, V. (2016). A survey on data leakage prevention systems. Journal of Network and Computer Applications, 62, 137–152. https://doi.org/10.1016/j.jnca.2016.01.008
Arafah, W., Nugroho, L., Takaya, R., & Soekapdjo, S. (2018). Marketing Strategy for Renewable Energy Development In Indonesia Context Today. International Journal of Energy Economics and Policy, 8(5), 181-186.
Aryotejo, G., & Kristiyanto, D. Y. (2018, May). Hybrid cloud: bridging of private and public cloud computing. Journal of Physics: Conference Series, 1025, 012091. https://doi.org/10.1088/1742-6596/1025/1/012091
Barolli, L., & Xhafa, F. (2010). Jxta-overlay: A p2p platform for distributed, collaborative, and ubiquitous computing. IEEE Transactions on Industrial Electronics, 58(6), 2163–2172. https://doi.org/10.1109/TIE.2010.2050751
Baruah, T. D. (2012). Effectiveness of Social Media as a tool of communication and its potential for technology enabled connections: A micro-level study. International journal of scientific and research publications, 2(5), 1-10.
Bertot, J. C., Jaeger, P. T., & Hansen, D. (2012). The impact of policies on government social media usage: Issues, challenges, and recommendations. Government information quarterly, 29(1), 30–40. https://doi.org/10.1016/j.giq.2011.04.004
Buchori, I., Sugiri, A., Maryono, M., Pramitasari, A., & Pamungkas, I. T. (2017). Theorizing spatial dynamics of metropolitan regions: A preliminary study in Java and Madura Islands, Indonesia. Sustainable cities and society, 35, 468–482. https://doi.org/10.1016/j.scs.2017.08.022
Buhalis, D., & Law, R. (2008). Progress in information technology and tourism management: 20 years on and 10 years after the Internet—The state of eTourism research. Tourism Management, 29(4), 609–623. https://doi.org/10.1016/j.tourman.2008.01.005
Candra, J. W., Briliyant, O. C., & Tamba, S. R. (2017, October). ISMS planning based on ISO/IEC 27001: 2013 using analytical hierarchy process at gap analysis phase (Case study: XYZ institute). In 2017 11th International Conference on Telecommunication Systems Services and Applications (TSSA) (pp. 1-6). IEEE. https://doi.org/10.1109/TSSA.2017.8272916
Carr, C. T., & Hayes, R. A. (2015). Social media: Defining, developing, and divining. Atlantic journal of communication, 23(1), 46–65. https://doi.org/10.1080/15456870.2015.972282
Choi, T. M., & Lambert, J. H. (2017). Advances in risk analysis with big data. Risk Analysis, 37(8), 1435–1442. https://doi.org/10.1111/risa.12859
Christopoulou, A. (2019). The Information disorder Ecosystem: A study on the role of Social Media, the Initiatives to tackle disinformation and a Systematic Literature Review of False Information Taxonomies. International Hellenic University, 1-82. https://repository.ihu.edu.gr//xmlui/handle/11544/29381
Costello, A., Abbas, M., Allen, A., Ball, S., Bell, S., Bellamy, R., ... & Patterson, C. (2009). Managing the health effects of climate change: Lancet and University College London Institute for Global Health Commission. The Lancet, 373(9676), 1693–1733. https://doi.org/10.1016/S0140-6736(09)60935-1
Dwivedi, Y. K., Ismagilova, E., Hughes, D. L., Carlson, J., Filieri, R., Jacobson, J., ... & Wang, Y. (2021). Setting the future of digital and social media marketing research: Perspectives and research propositions. International Journal of Information Management, 59, 102168. https://doi.org/10.1016/j.ijinfomgt.2020.102168
Fan, Z., Kalogridis, G., Efthymiou, C., Sooriyabandara, M., Serizawa, M., & McGeehan, J. (2010, April). The new frontier of communications research: smart grid and smart metering. In Proceedings of the 1st International Conference on Energy-Efficient Computing and Networking (pp. 115-118). https://doi.org/10.1109/MNET.2014.6863125
García-Ceballos, S., Rivero, P., Molina-Puche, S., & Navarro-Neri, I. (2021). Educommunication and Archaeological Heritage in Italy and Spain: An Analysis of Institutions’ Use of Twitter, Sustainability, and Citizen Participation. Sustainability, 13(4), 1602. https://doi.org/10.3390/su13041602
Hamidah, I., Sriyono, S., & Hudha, M. N. (2020). A Bibliometric analysis of COVID-19 research using VOSviewer. Indonesian Journal of Science and Technology, 34–41. https://doi.org/10.17509/ijost.v5i2.24522
He, W. (2012). A review of social media security risks and mitigation techniques. Journal of Systems and Information Technology, 14(2), 171–180. https://doi.org/10.1108/13287261211232180
Herath, T., & Rao, H. R. (2009a). Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness. Decision Support Systems, 47(2), 154–165. https://doi.org/10.1016/j.dss.2009.02.005
Herath, T., & Rao, H. R. (2009b). Protection motivation and deterrence: a framework for security policy compliance in organisations. European journal of information systems, 18(2), 106–125. https://doi.org/10.1057/ejis.2009.6
Hongjun, Z., Wenning, H., Dengchao, H., & Yuxing, M. (2014, August). Survey of research on information security in big data. In Anais do III Brazilian Workshop on Social Network Analysis and Mining (pp. 267-272). SBC.
Jensen, M. L., Dinger, M., Wright, R. T., & Thatcher, J. B. (2017). Training to mitigate phishing attacks using mindfulness techniques. Journal of Management Information Systems, 34(2), 597–626. https://doi.org/10.1080/07421222.2017.1334499
Karvana, K. G. M., Yazid, S., Syalim, A., & Mursanto, P. (2019, October). Customer churn analysis and prediction using data mining models in banking industry. In 2019 International Workshop on Big Data and Information Security (IWBIS) (pp. 33-38). IEEE. https://doi.org/10.1109/IWBIS.2019.8935884
Kenzler, J. (2020). Cambridge Analytica and the Public Sphere: An Investigation of Political Manipulation in the Digital Age (Master's thesis). Tampere University. https://core.ac.uk/download/pdf/288313141.pdf
Kraut, A., Kohalmi, L., & Toth, D. (2020). Digital dangers of smartphones. JE-Eur. Crim. L., 36. https://heinonline.org/HOL/LandingPage?handle=hein.journals/jeeucl2020&div=8&id=&page=
Liu, C., Chen, J., Yang, L. T., Zhang, X., Yang, C., Ranjan, R., & Kotagiri, R. (2014). Authorized public auditing of dynamic big data storage on cloud with efficient verifiable fine-grained updates. IEEE Transactions on Parallel and Distributed Systems, 25(9), 2234–2244. https://doi.org/10.1109/TPDS.2013.191
Liu, J., Yang, F., & Ren, L. (2018). Study on Reliability Evaluation Method Based on Improved Monte Carlo Method. In E3S Web of Conferences (Vol. 64, p. 04008). EDP Sciences. https://doi.org/10.1051/e3sconf/20186404008
Ma'Sum, M. A., Jatmiko, W., & Suhartanto, H. (2016, October). Enhanced tele ECG system using Hadoop framework to deal with big data processing. In 2016 International Workshop on Big Data and Information Security (IWBIS) (pp. 121-126). IEEE. https://doi.org/10.1109/IWBIS.2016.7872900
Masur, P. K., & Scharkow, M. (2016). Disclosure management on social network sites: Individual privacy perceptions and user-directed privacy strategies. Social Media+ Society, 2(1), 2056305116634368. https://doi.org/10.1177/2056305116634368
Muhammad, S. S., Dey, B. L., & Weerakkody, V. (2018). Analysis of factors that influence customers’ willingness to leave big data digital footprints on social media: A systematic review of literature. Information Systems Frontiers, 20(3), 559–576. https://doi.org/10.1007/s10796-017-9802-y
Nafi’ah, B. A., Roziqin, A., Suhermanto, D. F., & Fajrina, A. N. (2021). The Policy Studies Journal: A Bibliometric and Mapping Study from 20152020. Library Philosophy and Practice, 2021, 1–18. https://digitalcommons.unl.edu/libphilprac/5881/
Obar, J. A., & Oeldorf-Hirsch, A. (2020). The biggest lie on the internet: Ignoring the privacy policies and terms of service policies of social networking services. Information, Communication & Society, 23(1), 128–147. https://doi.org/10.1080/1369118X.2018.1486870
Osborn, E., & Simpson, A. (2018). Risk and the small-scale cyber security decision making dialogue—a UK case study. The Computer Journal, 61(4), 472–495. https://doi.org/10.1093/comjnl/bxx093
Paquette, S., Jaeger, P. T., & Wilson, S. C. (2010). Identifying the security risks associated with governmental use of cloud computing. Government information quarterly, 27(3), 245–253. https://doi.org/10.1016/j.giq.2010.01.002
Park, S., Akatyev, N., Jang, Y., Hwang, J., Kim, D., Yu, W., ... & Kim, J. (2018). A comparative study on data protection legislations and government standards to implement Digital Forensic Readiness as mandatory requirement. Digital Investigation, 24, S93-S100. https://doi.org/10.1016/j.diin.2018.01.012
Pearson, S., & Benameur, A. (2010, November). Privacy, security and trust issues arising from cloud computing. In 2010 IEEE Second International Conference on Cloud Computing Technology and Science (pp. 693-702). IEEE. https://doi.org/10.1109/CloudCom.2010.66
Prajapati, A., & Gupta, S. (2021). A Survey: Data Mining and Machine Learning Methods for Cyber Security. International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 7(2), 24–34. Internet Archive. https://doi.org/10.32628/cseit217212
Pramana, S., Yuniarto, B., Kurniawan, R., Yordani, R., Lee, J., Amin, I., ... & Indriani, R. (2017, September). Big data for government policy: Potential implementations of bigdata for official statistics in Indonesia. In 2017 International Workshop on Big Data and Information Security (IWBIS) (pp. 17-21). IEEE. https://doi.org/10.1109/IWBIS.2017.8275097
Price, W. N., & Cohen, I. G. (2019). Privacy in the age of medical big data. Nature medicine, 25(1), 37–43. https://doi.org/10.1038/s41591-018-0272-7
Purba, J. T., Samuel, S., & Purba, A. (2020, September). Strategic Collaboration ICT in the online Transportation Services in Jakarta Area. In IOP Conference Series: Materials Science and Engineering (Vol. 918, No. 1, p. 012206). IOP Publishing. https://doi.org/10.1088/1757-899X/918/1/012206
Rahardja, U., Hidayanto, A. N., Putra, P. O. H., & Hardini, M. (2021). Immutable Ubiquitous Digital Certificate Authentication Using Blockchain Protocol. Journal of applied research and technology, 19(4), 308–321. https://doi.org/10.22201/icat.24486736e.2021.19.4.1046
Romanosky, S., Telang, R., & Acquisti, A. (2011). Do data breach disclosure laws reduce identity theft? Journal of Policy Analysis and Management, 30(2), 256–286. https://doi.org/10.1002/pam.20567
Sari, I. C., & Ruldeviyani, Y. (2020, October). Sentiment analysis of the COVID-19 virus infection in Indonesian public transportation on Twitter data: A case study of commuter line passengers. In 2020 International Workshop on Big Data and Information Security (IWBIS) (pp. 23-28). IEEE. https://doi.org/10.1109/IWBIS50925.2020.9255531
Shafqat, N., & Masood, A. (2016). Comparative analysis of various national cyber security strategies. International Journal of Computer Science and Information Security, 14(1), 129.
Simangunsong, E. (2021). Identifying Personal Characteristics of Social Media Entrepreneurs in Indonesia. Jurnal ASPIKOM, 6(2), 360–372. https://doi.org/10.24329/aspikom.v6i2.934
Sotiriadis, M. D. (2017). Sharing tourism experiences in social media. International Journal of Contemporary Hospitality Management, 29(1), 179–225. https://doi.org/10.1108/IJCHM-05-2016-0300
Sri Adiningsih, S. E. (2019). Transformasi ekonomi berbasis digital di Indonesia: lahirnya tren baru teknologi, bisnis, ekonomi, dan kebijakan di Indonesia. Gramedia Pustaka Utama.
Sudira, H., Diar, A. L., & Ruldeviyani, Y. (2019, October). Instagram sentiment analysis with naive Bayes and KNN: exploring customer satisfaction of digital payment services in Indonesia. In 2019 International Workshop on Big Data and Information Security (IWBIS) (pp. 21-26). IEEE. https://doi.org/10.1109/IWBIS.2019.8935700
Surjandari, I., Megawati, C., Dhini, A., & Hardaya, I. B. N. S. (2016, March). Application of text mining for classification of textual reports: a study of Indonesia’s national complaint handling system. In 6th International Conference on Industrial Engineering and Operations Management (IEOM 2016). http://ieomsociety.org/ieom_2016/pdfs/320.pdf
Van Eck, N., & Waltman, L. (2010). Software survey: VOSviewer, a computer program for bibliometric mapping. Scientometrics, 84(2), 523–538. https://doi.org/10.1007/s11192-009-0146-3
Wang, Y., Min, Q., & Han, S. (2016). Understanding the effects of trust and risk on individual behavior toward social media platforms: A meta-analysis of the empirical evidence. Computers in Human Behavior, 56, 34–44. https://doi.org/10.1016/j.chb.2015.11.011
Weber, G. M., Mandl, K. D., & Kohane, I. S. (2014). Finding the missing link for big biomedical data. Jama, 311(24), 2479–2480. https://doi.org/10.1001/jama.2014.4228
Wibowo, S., & Sandikapura, T. (2019, November). Improving data security, interoperability, and veracity using blockchain for one data governance, case study of local tax big data. In 2019 International Conference on ICT for Smart Society (ICISS) (Vol. 7, pp. 1-6). IEEE. https://doi.org/10.1109/ICISS48059.2019.8969805
Wicaksono, S. B., Wibisono, A., Jatmiko, W., Gamal, A., & Wisesa, H. A. (2019, October). Semantic segmentation on lidar point cloud in urban area using deep learning. In 2019 International Workshop on Big Data and Information Security (IWBIS) (pp. 63-66). IEEE. https://doi.org/10.1109/IWBIS.2019.8935882
Wulandari, S. S. (2018). Employee commitment and service performance. Human Systems Management, 37(4), 381–386. https://doi.org/10.3233/HSM-17122
Yi, X., Liu, F., Liu, J., & Jin, H. (2014). Building a network highway for big data: architecture and challenges. IEEE Network, 28(4), 5–13. https://doi.org/10.1145/1791314.1791331
DOI: https://doi.org/10.18196/jgpp.v11i1.17038
Refbacks
- There are currently no refbacks.
Copyright (c) 2024 Journal of Governance and Public Policy
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Office:
Master of Government Affairs and Administration (MIP)
Postgraduate Building 2nd Floor UMY
Phone: +62 274 387 656 (ext: 173)
Jl. Brawijaya, Kasihan, Bantul, Daerah Istimewa Yogyakarta, Indonesia
View My Stats
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.