Big Data and Security: A Review of Social Media Risks and Insights for Indonesia

Ahmad Harakan, Abdillah Abdillah, Try Gustaf Said, Mujizatullah Mujizatullah, Simon Gray

Abstract


This article investigates the complex relationship between big data and management, focusing on the mitigation of potential threats arising from social media platforms, particularly in the Indonesian context. A comprehensive literature review examines existing social media security concerns and mitigation strategies, revealing a notable gap in research regarding effective government policies and plans to address these issues, especially in countries where such frameworks are lacking. This study contributes to the discourse by synthesizing key findings from the literature and offering actionable recommendations to stakeholders for mitigating social media security risks. Furthermore, it identifies practical lessons and proposes avenues for future research to explore strategies and pragmatic perspectives aimed at addressing the potential risks associated with social media for the Indonesian government. The novelty of this research lies in its focus on bridging the gap between big data, social media risks, and the development of effective government policies in the Indonesian context, contributing to a safer and more secure digital landscape.


Keywords


Social Media; Big Data Security; Security; Risk Mitigation Technique; Risk Mitigation Technique

Full Text:

PDF

References


Ahdiat, A. (2022). Survei: Pecandu Internet Terbanyak dari Kalangan Gen Z. [online] available at https://databoks.katadata.co.id/datapublish/2022/06/29/survei-pecandu-internet-terbanyak-dari-kalangan-gen-z accessed on November 2022

Akram, W., & Kumar, R. (2017). A study on positive and negative effects of social media on society. International Journal of Computer Sciences and Engineering, 5(10), 351–354. https://doi.org/10.26438/ijcse/v5i10.351354

Alneyadi, S., Sithirasenan, E., & Muthukkumarasamy, V. (2016). A survey on data leakage prevention systems. Journal of Network and Computer Applications, 62, 137–152. https://doi.org/10.1016/j.jnca.2016.01.008

Arafah, W., Nugroho, L., Takaya, R., & Soekapdjo, S. (2018). Marketing Strategy for Renewable Energy Development In Indonesia Context Today. International Journal of Energy Economics and Policy, 8(5), 181-186.

Aryotejo, G., & Kristiyanto, D. Y. (2018, May). Hybrid cloud: bridging of private and public cloud computing. Journal of Physics: Conference Series, 1025, 012091. https://doi.org/10.1088/1742-6596/1025/1/012091

Barolli, L., & Xhafa, F. (2010). Jxta-overlay: A p2p platform for distributed, collaborative, and ubiquitous computing. IEEE Transactions on Industrial Electronics, 58(6), 2163–2172. https://doi.org/10.1109/TIE.2010.2050751

Baruah, T. D. (2012). Effectiveness of Social Media as a tool of communication and its potential for technology enabled connections: A micro-level study. International journal of scientific and research publications, 2(5), 1-10.

Bertot, J. C., Jaeger, P. T., & Hansen, D. (2012). The impact of policies on government social media usage: Issues, challenges, and recommendations. Government information quarterly, 29(1), 30–40. https://doi.org/10.1016/j.giq.2011.04.004

Buchori, I., Sugiri, A., Maryono, M., Pramitasari, A., & Pamungkas, I. T. (2017). Theorizing spatial dynamics of metropolitan regions: A preliminary study in Java and Madura Islands, Indonesia. Sustainable cities and society, 35, 468–482. https://doi.org/10.1016/j.scs.2017.08.022

Buhalis, D., & Law, R. (2008). Progress in information technology and tourism management: 20 years on and 10 years after the Internet—The state of eTourism research. Tourism Management, 29(4), 609–623. https://doi.org/10.1016/j.tourman.2008.01.005

Candra, J. W., Briliyant, O. C., & Tamba, S. R. (2017, October). ISMS planning based on ISO/IEC 27001: 2013 using analytical hierarchy process at gap analysis phase (Case study: XYZ institute). In 2017 11th International Conference on Telecommunication Systems Services and Applications (TSSA) (pp. 1-6). IEEE. https://doi.org/10.1109/TSSA.2017.8272916

Carr, C. T., & Hayes, R. A. (2015). Social media: Defining, developing, and divining. Atlantic journal of communication, 23(1), 46–65. https://doi.org/10.1080/15456870.2015.972282

Choi, T. M., & Lambert, J. H. (2017). Advances in risk analysis with big data. Risk Analysis, 37(8), 1435–1442. https://doi.org/10.1111/risa.12859

Christopoulou, A. (2019). The Information disorder Ecosystem: A study on the role of Social Media, the Initiatives to tackle disinformation and a Systematic Literature Review of False Information Taxonomies. International Hellenic University, 1-82. https://repository.ihu.edu.gr//xmlui/handle/11544/29381

Costello, A., Abbas, M., Allen, A., Ball, S., Bell, S., Bellamy, R., ... & Patterson, C. (2009). Managing the health effects of climate change: Lancet and University College London Institute for Global Health Commission. The Lancet, 373(9676), 1693–1733. https://doi.org/10.1016/S0140-6736(09)60935-1

Dwivedi, Y. K., Ismagilova, E., Hughes, D. L., Carlson, J., Filieri, R., Jacobson, J., ... & Wang, Y. (2021). Setting the future of digital and social media marketing research: Perspectives and research propositions. International Journal of Information Management, 59, 102168. https://doi.org/10.1016/j.ijinfomgt.2020.102168

Fan, Z., Kalogridis, G., Efthymiou, C., Sooriyabandara, M., Serizawa, M., & McGeehan, J. (2010, April). The new frontier of communications research: smart grid and smart metering. In Proceedings of the 1st International Conference on Energy-Efficient Computing and Networking (pp. 115-118). https://doi.org/10.1109/MNET.2014.6863125

García-Ceballos, S., Rivero, P., Molina-Puche, S., & Navarro-Neri, I. (2021). Educommunication and Archaeological Heritage in Italy and Spain: An Analysis of Institutions’ Use of Twitter, Sustainability, and Citizen Participation. Sustainability, 13(4), 1602. https://doi.org/10.3390/su13041602

Hamidah, I., Sriyono, S., & Hudha, M. N. (2020). A Bibliometric analysis of COVID-19 research using VOSviewer. Indonesian Journal of Science and Technology, 34–41. https://doi.org/10.17509/ijost.v5i2.24522

He, W. (2012). A review of social media security risks and mitigation techniques. Journal of Systems and Information Technology, 14(2), 171–180. https://doi.org/10.1108/13287261211232180

Herath, T., & Rao, H. R. (2009a). Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness. Decision Support Systems, 47(2), 154–165. https://doi.org/10.1016/j.dss.2009.02.005

Herath, T., & Rao, H. R. (2009b). Protection motivation and deterrence: a framework for security policy compliance in organisations. European journal of information systems, 18(2), 106–125. https://doi.org/10.1057/ejis.2009.6

Hongjun, Z., Wenning, H., Dengchao, H., & Yuxing, M. (2014, August). Survey of research on information security in big data. In Anais do III Brazilian Workshop on Social Network Analysis and Mining (pp. 267-272). SBC.

Jensen, M. L., Dinger, M., Wright, R. T., & Thatcher, J. B. (2017). Training to mitigate phishing attacks using mindfulness techniques. Journal of Management Information Systems, 34(2), 597–626. https://doi.org/10.1080/07421222.2017.1334499

Karvana, K. G. M., Yazid, S., Syalim, A., & Mursanto, P. (2019, October). Customer churn analysis and prediction using data mining models in banking industry. In 2019 International Workshop on Big Data and Information Security (IWBIS) (pp. 33-38). IEEE. https://doi.org/10.1109/IWBIS.2019.8935884

Kenzler, J. (2020). Cambridge Analytica and the Public Sphere: An Investigation of Political Manipulation in the Digital Age (Master's thesis). Tampere University. https://core.ac.uk/download/pdf/288313141.pdf

Kraut, A., Kohalmi, L., & Toth, D. (2020). Digital dangers of smartphones. JE-Eur. Crim. L., 36. https://heinonline.org/HOL/LandingPage?handle=hein.journals/jeeucl2020&div=8&id=&page=

Liu, C., Chen, J., Yang, L. T., Zhang, X., Yang, C., Ranjan, R., & Kotagiri, R. (2014). Authorized public auditing of dynamic big data storage on cloud with efficient verifiable fine-grained updates. IEEE Transactions on Parallel and Distributed Systems, 25(9), 2234–2244. https://doi.org/10.1109/TPDS.2013.191

Liu, J., Yang, F., & Ren, L. (2018). Study on Reliability Evaluation Method Based on Improved Monte Carlo Method. In E3S Web of Conferences (Vol. 64, p. 04008). EDP Sciences. https://doi.org/10.1051/e3sconf/20186404008

Ma'Sum, M. A., Jatmiko, W., & Suhartanto, H. (2016, October). Enhanced tele ECG system using Hadoop framework to deal with big data processing. In 2016 International Workshop on Big Data and Information Security (IWBIS) (pp. 121-126). IEEE. https://doi.org/10.1109/IWBIS.2016.7872900

Masur, P. K., & Scharkow, M. (2016). Disclosure management on social network sites: Individual privacy perceptions and user-directed privacy strategies. Social Media+ Society, 2(1), 2056305116634368. https://doi.org/10.1177/2056305116634368

Muhammad, S. S., Dey, B. L., & Weerakkody, V. (2018). Analysis of factors that influence customers’ willingness to leave big data digital footprints on social media: A systematic review of literature. Information Systems Frontiers, 20(3), 559–576. https://doi.org/10.1007/s10796-017-9802-y

Nafi’ah, B. A., Roziqin, A., Suhermanto, D. F., & Fajrina, A. N. (2021). The Policy Studies Journal: A Bibliometric and Mapping Study from 20152020. Library Philosophy and Practice, 2021, 1–18. https://digitalcommons.unl.edu/libphilprac/5881/

Obar, J. A., & Oeldorf-Hirsch, A. (2020). The biggest lie on the internet: Ignoring the privacy policies and terms of service policies of social networking services. Information, Communication & Society, 23(1), 128–147. https://doi.org/10.1080/1369118X.2018.1486870

Osborn, E., & Simpson, A. (2018). Risk and the small-scale cyber security decision making dialogue—a UK case study. The Computer Journal, 61(4), 472–495. https://doi.org/10.1093/comjnl/bxx093

Paquette, S., Jaeger, P. T., & Wilson, S. C. (2010). Identifying the security risks associated with governmental use of cloud computing. Government information quarterly, 27(3), 245–253. https://doi.org/10.1016/j.giq.2010.01.002

Park, S., Akatyev, N., Jang, Y., Hwang, J., Kim, D., Yu, W., ... & Kim, J. (2018). A comparative study on data protection legislations and government standards to implement Digital Forensic Readiness as mandatory requirement. Digital Investigation, 24, S93-S100. https://doi.org/10.1016/j.diin.2018.01.012

Pearson, S., & Benameur, A. (2010, November). Privacy, security and trust issues arising from cloud computing. In 2010 IEEE Second International Conference on Cloud Computing Technology and Science (pp. 693-702). IEEE. https://doi.org/10.1109/CloudCom.2010.66

Prajapati, A., & Gupta, S. (2021). A Survey: Data Mining and Machine Learning Methods for Cyber Security. International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 7(2), 24–34. Internet Archive. https://doi.org/10.32628/cseit217212

Pramana, S., Yuniarto, B., Kurniawan, R., Yordani, R., Lee, J., Amin, I., ... & Indriani, R. (2017, September). Big data for government policy: Potential implementations of bigdata for official statistics in Indonesia. In 2017 International Workshop on Big Data and Information Security (IWBIS) (pp. 17-21). IEEE. https://doi.org/10.1109/IWBIS.2017.8275097

Price, W. N., & Cohen, I. G. (2019). Privacy in the age of medical big data. Nature medicine, 25(1), 37–43. https://doi.org/10.1038/s41591-018-0272-7

Purba, J. T., Samuel, S., & Purba, A. (2020, September). Strategic Collaboration ICT in the online Transportation Services in Jakarta Area. In IOP Conference Series: Materials Science and Engineering (Vol. 918, No. 1, p. 012206). IOP Publishing. https://doi.org/10.1088/1757-899X/918/1/012206

Rahardja, U., Hidayanto, A. N., Putra, P. O. H., & Hardini, M. (2021). Immutable Ubiquitous Digital Certificate Authentication Using Blockchain Protocol. Journal of applied research and technology, 19(4), 308–321. https://doi.org/10.22201/icat.24486736e.2021.19.4.1046

Romanosky, S., Telang, R., & Acquisti, A. (2011). Do data breach disclosure laws reduce identity theft? Journal of Policy Analysis and Management, 30(2), 256–286. https://doi.org/10.1002/pam.20567

Sari, I. C., & Ruldeviyani, Y. (2020, October). Sentiment analysis of the COVID-19 virus infection in Indonesian public transportation on Twitter data: A case study of commuter line passengers. In 2020 International Workshop on Big Data and Information Security (IWBIS) (pp. 23-28). IEEE. https://doi.org/10.1109/IWBIS50925.2020.9255531

Shafqat, N., & Masood, A. (2016). Comparative analysis of various national cyber security strategies. International Journal of Computer Science and Information Security, 14(1), 129.

Simangunsong, E. (2021). Identifying Personal Characteristics of Social Media Entrepreneurs in Indonesia. Jurnal ASPIKOM, 6(2), 360–372. https://doi.org/10.24329/aspikom.v6i2.934

Sotiriadis, M. D. (2017). Sharing tourism experiences in social media. International Journal of Contemporary Hospitality Management, 29(1), 179–225. https://doi.org/10.1108/IJCHM-05-2016-0300

Sri Adiningsih, S. E. (2019). Transformasi ekonomi berbasis digital di Indonesia: lahirnya tren baru teknologi, bisnis, ekonomi, dan kebijakan di Indonesia. Gramedia Pustaka Utama.

Sudira, H., Diar, A. L., & Ruldeviyani, Y. (2019, October). Instagram sentiment analysis with naive Bayes and KNN: exploring customer satisfaction of digital payment services in Indonesia. In 2019 International Workshop on Big Data and Information Security (IWBIS) (pp. 21-26). IEEE. https://doi.org/10.1109/IWBIS.2019.8935700

Surjandari, I., Megawati, C., Dhini, A., & Hardaya, I. B. N. S. (2016, March). Application of text mining for classification of textual reports: a study of Indonesia’s national complaint handling system. In 6th International Conference on Industrial Engineering and Operations Management (IEOM 2016). http://ieomsociety.org/ieom_2016/pdfs/320.pdf

Van Eck, N., & Waltman, L. (2010). Software survey: VOSviewer, a computer program for bibliometric mapping. Scientometrics, 84(2), 523–538. https://doi.org/10.1007/s11192-009-0146-3

Wang, Y., Min, Q., & Han, S. (2016). Understanding the effects of trust and risk on individual behavior toward social media platforms: A meta-analysis of the empirical evidence. Computers in Human Behavior, 56, 34–44. https://doi.org/10.1016/j.chb.2015.11.011

Weber, G. M., Mandl, K. D., & Kohane, I. S. (2014). Finding the missing link for big biomedical data. Jama, 311(24), 2479–2480. https://doi.org/10.1001/jama.2014.4228

Wibowo, S., & Sandikapura, T. (2019, November). Improving data security, interoperability, and veracity using blockchain for one data governance, case study of local tax big data. In 2019 International Conference on ICT for Smart Society (ICISS) (Vol. 7, pp. 1-6). IEEE. https://doi.org/10.1109/ICISS48059.2019.8969805

Wicaksono, S. B., Wibisono, A., Jatmiko, W., Gamal, A., & Wisesa, H. A. (2019, October). Semantic segmentation on lidar point cloud in urban area using deep learning. In 2019 International Workshop on Big Data and Information Security (IWBIS) (pp. 63-66). IEEE. https://doi.org/10.1109/IWBIS.2019.8935882

Wulandari, S. S. (2018). Employee commitment and service performance. Human Systems Management, 37(4), 381–386. https://doi.org/10.3233/HSM-17122

Yi, X., Liu, F., Liu, J., & Jin, H. (2014). Building a network highway for big data: architecture and challenges. IEEE Network, 28(4), 5–13. https://doi.org/10.1145/1791314.1791331




DOI: https://doi.org/10.18196/jgpp.v11i1.17038

Refbacks

  • There are currently no refbacks.


Copyright (c) 2024 Journal of Governance and Public Policy

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.

 


Office: 
Master of Government Affairs and Administration (MIP)
Postgraduate Building 2nd Floor UMY

Phone: +62 274 387 656 (ext: 173)

Jl. Brawijaya, Kasihan, Bantul, Daerah Istimewa Yogyakarta, Indonesia

View My Stats

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.