Data Privacy, What Still Need Consideration in Online Application System?
This paper aims to conduct an analysis and exploration of matters that still needs to be considered in relation to data privacy in the online application system. This research is still a preliminary study. We conduct research related to data privacy using systematic literature review approach (SLR). Bt using SLR stages, we made a synthesis of 44 publications from Scopus Database Online that were released in the range 2015 - 2019. Based on this study, we found six things points to consider in data privacy, namely security and data protection, user awareness, risk managment, control setting, ethics, and transparency.
Albertini, D. A., Carminati, B., and Ferrari, E. 2017. “Privacy Settings Recommender for Online Social Network,” Proceedings - 2016 IEEE 2nd International Conference on Collaboration and Internet Computing, IEEE CIC 2016, IEEE, pp. 514–521. (https://doi.org/10.1109/CIC.2016.079).
Alsalamah, A. 2017. “Security Risk Management in Online System,” Proceedings - 2017 5th International Conference on Applied Computing and Information Technology, 2017 4th International Conference on Computational Science/Intelligence and Applied Informatics and 2017 1st International Conference on Big Data, Cloud Compu, IEEE, pp. 119–124. (https://doi.org/10.1109/ACIT-CSII-BCD.2017.59).
Baillie, C. F., Hawick, K. A., and Johnston, D. A. 1994. “Quenching 2D Quantum Gravity,” Physics Letters B (Vol. 328). (https://doi.org/10.1016/0370-2693(94)91481-8).
Barril, J. F. H., and Tan, Q. 2017. “Integrating Privacy in Architecture Design of Student Information System for Big Data Analytics,” 2017 2nd IEEE International Conference on Cloud Computing and Big Data Analysis, ICCCBDA 2017 (1), IEEE, pp. 139–144. (https://doi.org/10.1109/ICCCBDA.2017.7951899).
Burbach, L., Nakayama, J., Plettenberg, N., Ziele, M., and Valdez, A. C. 2018. “User Preferences in Recommendation Algorithms,” RecSys 2018 - 12th ACM Conference on Recommender Systems, pp. 306–310. (https://doi.org/10.1145/3240323.3240393).
Costa, L. 2016. Data Protection Law, Processes and Freedoms BT - Virtuality and Capabilities in a World of Ambient Intelligence: New Challenges to Privacy and Data Protection. (https://doi.org/10.1007/978-3-319-39198-4_6).
Curran, D. 2018. “Are You Ready? This Is All the Data Facebook and Google Have on You | Dylan Curran | Opinion | The Guardian,” The Guardian, pp. 1–12. (https://www.theguardian.com/commentisfree/2018/mar/28/all-the-data-facebook-google-has-on-you-privacy, accessed March 11, 2020).
Degadwala, S. D., and Gaur, S. 2017. “An Efficient Privacy Preserving System Using VCS, Block DWT-SVD and Modified Zernike Moment on RST Attacks,” 2017 International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies, ICAMMAET 2017 (2017–Janua), pp. 1–4. (https://doi.org/10.1109/ICAMMAET.2017.8186685).
DPR. 2006. “Laws of The Republic Indonesia Number 23 of 2006 Regarding of Population Administration.”
European Parliament and of the Council. 2016. “Art. 4 GDPR – Definitions | General Data Protection Regulation (GDPR),” European Parliament and of the Council. (https://gdpr-info.eu/art-4-gdpr/, accessed March 12, 2020).
GDPR.EU. 2019. “A Guide to GDPR Data Privacy Requirements,” A Guide to GDPR Data Privacy Requirements. (https://gdpr.eu/data-privacy/, accessed March 12, 2020).
Grewal, G. S., Ryan, M. D., Chen, L., and Clarkson, M. R. 2015. “Du-Vote: Remote Electronic Voting with Untrusted Computers,” Proceedings of the Computer Security Foundations Workshop (2015–Septe), IEEE, pp. 155–169. (https://doi.org/10.1109/CSF.2015.18).
Hölzl, M., Roland, M., and Mayrhofer, R. 2016. “Real-World Identification: Towards a Privacy-Aware Mobile EID for Physical and Offline Verification,” ACM International Conference Proceeding Series, pp. 280–283. (https://doi.org/10.1145/3007120.3007158).
Hossain, A. A., and Zhang, W. 2015. “Privacy and Security Concern of Online Social Networks from User Perspective,” ICISSP 2015 - 1st International Conference on Information Systems Security and Privacy, Proceedings, SCITEPRESS, pp. 246–253. (https://doi.org/10.5220/0005318202460253).
Hukum Online. 2018. “Yuk Simak, Perlindungan Data Pribadi Yang Tersebar Di Beberapa UU.” (https://www.hukumonline.com/berita/baca/lt5aa2522899af7/yuk-simak--perlindungan-data-pribadi-yang-tersebar-di-beberapa-uu/, accessed March 11, 2020).
Hung, P. C. K., Fantinato, M., and Rafferty, L. 2016. “A Study of Privacy Requirements for Smart Toys,” Pacific Asia Conference on Information Systems, PACIS 2016 - Proceedings (June).
Ilia, P., Carminati, B., and Ferrari, E. 2017. SAMPAC : Socially-Aware Collaborative Multi-Party Access Control, pp. 71–82.
Isaak, J., and Hanna, M. J. 2018. “User Data Privacy: Facebook, Cambridge Analytica, and Privacy Protection,” Computer (51:8), IEEE, pp. 56–59. (https://doi.org/10.1109/MC.2018.3191268).
Katadata. 2019. “LBH Terima 3.000 Aduan Pelanggaran Fintech Pembiayaan.” (https://katadata.co.id/berita/2019/02/04/lbh-terima-3000-aduan-pelanggaran-fintech-pembiayaan, accessed March 11, 2020).
Kitchenham, B., and Brereton, P. 2013. “A Systematic Review of Systematic Review Process Research in Software Engineering,” Information and Software Technology (55:12), Elsevier B.V., pp. 2049–2075. (https://doi.org/10.1016/j.infsof.2013.07.010).
Kitchenham, B., Pearl Brereton, O., Budgen, D., Turner, M., Bailey, J., and Linkman, S. 2009. “Systematic Literature Reviews in Software Engineering - A Systematic Literature Review,” Information and Software Technology (51:1), Elsevier B.V., pp. 7–15. (https://doi.org/10.1016/j.infsof.2008.09.009).
Klosek, J. 2000. “Data Privacy in the Information Age,” Quorum Books, p. 251. (https://books.google.com.my/books?id=18HSi5ekRbcC&printsec=frontcover&dq=data+privacy&hl=en&sa=X&ved=0ahUKEwjJqu2pxvfeAhUMiXAKHc1PBGYQ6AEIKjAA#v=onepage&q&f=false, accessed March 12, 2020).
Klukovich, E., Erdin, E., and Gunes, M. H. 2016. “POSN: A Privacy Preserving Decentralized Social Network App for Mobile Devices,” Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2016, IEEE, pp. 1426–1429. (https://doi.org/10.1109/ASONAM.2016.7752436).
Korže, B., and Čertanec, A. 2017. “Protecting Personal Data in the Context of Interoperability among Organizations for Protection and Rescue,” International Data Privacy Law (7:4). (https://doi.org/10.1093/idpl/ipx017).
Kulal, N., and Dhamdhere, V. 2017. “Technique for Preserving Privacy on Friend Recommendation System by Using Naive Bayes Classifier in OSN,” Proceedings of the 2017 International Conference on Intelligent Computing and Control Systems, ICICCS 2017 (2018–Janua), pp. 315–319. (https://doi.org/10.1109/ICCONS.2017.8250734).
Kumar, H., Jain, S., and Srivastava, R. 2017. “Risk Analysis of Online Social Networks,” Proceeding - IEEE International Conference on Computing, Communication and Automation, ICCCA 2016, IEEE, pp. 846–851. (https://doi.org/10.1109/CCAA.2016.7813833).
Leung, C., Ren, J., Choffnes, D., and Wilson, C. 2016. “Should You Use the App for That? Comparing the Privacy Implications of App-and Web-Based Online Services,” Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC (14–16–Nove), pp. 365–372. (https://doi.org/10.1145/2987443.2987456).
Livemint. 2019. “What The Great Hack Tells Us about Data Privacy.” (https://www.livemint.com/mint-lounge/features/what-the-great-hack-tells-us-about-data-privacy-1565946607143.html, accessed March 11, 2020).
Lopes, S., and Quaresma, R. 2016. “Data Privacy in Interoperability Environments -A Case Study in the Portuguese Healthcare Sector,” 16th Portuguese Association for Information Systems Conference, CAPSI 2016 (16), pp. 43–54. (https://doi.org/10.1109/INFCOM.2011.5934930).
Luma, A., Abazi, B., and Aliu, A. 2019. “An Approach to Privacy on Recommended Systems,” 3rd International Symposium on Multidisciplinary Studies and Innovative Technologies, ISMSIT 2019 - Proceedings, IEEE, pp. 1–5. (https://doi.org/10.1109/ISMSIT.2019.8932805).
Mai, J.-E. 2016. The Information Society An International Journal Big Data Privacy: The Datafication of Personal Information. (https://doi.org/10.1080/01972243.2016.1153010).
Majumdar, S., Tripathy, S., Majumdar, S., Tripathy, S., Abubakar, L., and Handayani, T. 2018. “IOP Conference Series: Earth and Environmental Science Financial Technology: Legal Challenges for Indonesia Financial Sector Related Content Data Protection in Financial Technology Services: Indonesian Legal Perspective Dian Purnama Anugerah and Masitoh Indriani-Service Sector Performance: A Critical Review Performance Evaluation of Indian Education Sector Using Interpretive Structural Modelling Financial Technology: Legal Challenges for Indonesia Financial Sector,” IOP Conf. Ser.: Earth Environ. Sci. 175 IOP Conf. Series: Earth and Environmental Science (175), p. 12204. (https://doi.org/10.1088/1755-1315/175/1/012204).
Malloy, M., Barford, P., Alp, E. C., Koller, J., and Jewell, A. 2017. “Internet Device Graphs,” Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (Part F1296), pp. 1913–1921. (https://doi.org/10.1145/3097983.3098114).
Masoumzadeh, A., and Cortese, A. 2017. “Towards Measuring Knowledge Exposure in Online Social Networks,” Proceedings - 2016 IEEE 2nd International Conference on Collaboration and Internet Computing, IEEE CIC 2016 (Section VI), IEEE, pp. 522–529. (https://doi.org/10.1109/CIC.2016.080).
Mijuskovic, A., and Ferati, M. 2016. “Cloud Storage Privacy and Security User Awareness: A Comparative Analysis between Dutch and Macedonian Users,” International Journal of Human Capital and Information Technology Professionals (7:3), pp. 1–18. (https://doi.org/10.4018/IJHCITP.2016070101).
Minkus, T., Liu, K., and Ross, K. W. 2015. “Children Seen but Not Heard: When Parents Compromise Children’s Online Privacy,” WWW 2015 - Proceedings of the 24th International Conference on World Wide Web, pp. 776–786. (https://doi.org/10.1145/2736277.2741124).
Mostafa, S. A. M., Noori, S. R. H., and Jafreen, S. 2017. “Transparency-A Key Feature Integration in Existing Privacy Frameworks for Online User,” IWCI 2016 - 2016 International Workshop on Computational Intelligence (December), IEEE, pp. 74–78. (https://doi.org/10.1109/IWCI.2016.7860342).
Nalinipriya, G., and Asswini, M. 2016. “A Survey on Vulnerable Attacks in Online Social Networks,” Proceedings 2015 - IEEE International Conference on Innovation, Information in Computing Technologies, ICIICT 2015, IEEE, pp. 1–6. (https://doi.org/10.1109/ICIICT.2015.7396102).
Nandhini, M., and Das, B. B. 2016. “An Assessment and Methodology for Fraud Detection in Online Social Network,” 2016 2nd International Conference on Science Technology Engineering and Management, ICONSTEM 2016, IEEE, pp. 104–108. (https://doi.org/10.1109/ICONSTEM.2016.7560932).
Nataraj Venkataramanan, A. S. 2016. “Data Privacy: Principles and Practice,” Chapman and Hall/CRC, p. 232. (https://books.google.co.id/books?id=lpWKDQAAQBAJ&printsec=frontcover&dq=%27data+privacy%27&hl=id&sa=X&ved=0ahUKEwjv3v-LmpToAhU2yTgGHW89CUAQ6AEIbzAH#v=onepage&q=’data privacy’&f=false, accessed March 12, 2020).
Petkos, G., Papadopoulos, S., and Kompatsiaris, Y. 2015. “PScore: A Framework for Enhancing Privacy Awareness in Online Social Networks,” Proceedings - 10th International Conference on Availability, Reliability and Security, ARES 2015, IEEE, pp. 592–600. (https://doi.org/10.1109/ARES.2015.80).
Pirzada, S. J. H., Murtaza, A., Liu, J., and Xu, T. 2019. “The Parallel CMAC Authentication Algorithm,” 2019 IEEE 11th International Conference on Communication Software and Networks, ICCSN 2019, IEEE, pp. 800–804. (https://doi.org/10.1109/ICCSN.2019.8905326).
Polakis, I., Maggi, F., Zanero, S., and Keromytis, A. D. 2016. “Security and Privacy Measurements in Social Networks: Experiences and Lessons Learned,” Proceedings - 3rd International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, BADGERS 2014, IEEE, pp. 18–29. (https://doi.org/10.1109/BADGERS.2014.9).
Purandhar, N., and Saravana Kumar, N. M. 2019. “Review of Data Extraction, Segregation Privacy with Big Data Analytics in the Online Health Care Systems,” Proceedings of the International Conference on Intelligent Sustainable Systems, ICISS 2019 (Iciss), IEEE, pp. 193–197. (https://doi.org/10.1109/ISS1.2019.8907973).
Reinsel, D., Gantz, J., and Rydning, J. 2018. The Digitization of the World From Edge to Core, (November). (https://www.seagate.com/files/www-content/our-story/trends/files/idc-seagate-dataage-whitepaper.pdf).
Revathi, S., and Suriakala, M. 2018. “An Intelligent and Novel Algorithm for Securing Vulnerable Users of Online Social Network,” Proceedings of the 2nd International Conference on Computing Methodologies and Communication, ICCMC 2018 (Iccmc), IEEE, pp. 214–219. (https://doi.org/10.1109/ICCMC.2018.8487760).
Schuppler, C., Leitner, M., and Rinderle-Ma, S. 2018. “Privacy-Aware Data Assessment of Online Social Network Registration Processes,” CODASPY 2018 - Proceedings of the 8th ACM Conference on Data and Application Security and Privacy (2018–Janua), pp. 167–169. (https://doi.org/10.1145/3176258.3176950).
Sedky, M. H., and Hamed, E. M. R. 2015. “A Secure E-Government’s e-Voting System,” Proceedings of the 2015 Science and Information Conference, SAI 2015, IEEE, pp. 1365–1373. (https://doi.org/10.1109/SAI.2015.7237320).
Sekretariat Kabinet Republik Indonesia. 2019. “No Leaks on Personal Data Database: Home Ministry.” (https://setkab.go.id/en/no-leaks-on-personal-data-database-home-ministry/, accessed March 11, 2020).
Shabtai, A., Elovici, Y., and Rokach, L. 2012. “Data Leakage Detection/Prevention Solutions,” SpringerBriefs in Computer Science (9781461420521), pp. 17–37. (https://doi.org/10.1007/978-1-4614-2053-8_4).
Shinjo, Y., Kainuma, N., Nobori, D., and Sato, A. 2016. “Magic Mantle Using Social VPNs against Centralized Social Networking Services,” 2016 14th Annual Conference on Privacy, Security and Trust, PST 2016, IEEE, pp. 341–348. (https://doi.org/10.1109/PST.2016.7906984).
Srivastava, A., and Geethakumari, G. 2016. “Determining Privacy Utility Trade-off for Online Social Network Data Publishing,” 12th IEEE International Conference Electronics, Energy, Environment, Communication, Computer, Control: (E3-C3), INDICON 2015, IEEE, pp. 1–6. (https://doi.org/10.1109/INDICON.2015.7443693).
Symeonidis, I., Tsormpatzoudi, P., and Preneel, B. 2016. “Collateral Damage of Online Social Network Applications,” ICISSP 2016 - Proceedings of the 2nd International Conference on Information Systems Security and Privacy (June), pp. 536–541. (https://doi.org/10.5220/0005806705360541).
Tambe, P., and Vora, D. 2017. “Data Sanitization for Privacy Preservation on Social Network,” International Conference on Automatic Control and Dynamic Optimization Techniques, ICACDOT 2016, IEEE, pp. 972–976. (https://doi.org/10.1109/ICACDOT.2016.7877732).
Tapsell, J., Akram, R. N., and Markantonakis, K. 2018. “Consumer Centric Data Control, Tracking and Transparency - A Position Paper,” Proceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018, IEEE, pp. 1380–1385. (https://doi.org/10.1109/TrustCom/BigDataSE.2018.00191).
TechSpot. 2019. “Twitter ‘accidentally’ Misused User Data to Sell Targeted Ads.” (https://www.techspot.com/news/82267-twitter-accidentally-misused-user-data-sell-targeted-ads.html, accessed March 11, 2020).
Thao, T. P., Makanju, A., and Kubota, A. 2018. “Anonymous and Analysable Web Browsing,” 2017 IEEE 36th International Performance Computing and Communications Conference, IPCCC 2017 (2018–Janua), pp. 1–8. (https://doi.org/10.1109/PCCC.2017.8280466).
Tsirtsis, A., Tsapatsoulis, N., Stamatelatos, M., Papadamou, K., and Sirivianos, M. 2016. “Cyber Security Risks for Minors: A Taxonomy and a Software Architecture,” Proceedings - 11th International Workshop on Semantic and Social Media Adaptation and Personalization, SMAP 2016, IEEE, pp. 93–99. (https://doi.org/10.1109/SMAP.2016.7753391).
Umair, A., Nanda, P., and He, X. 2017. “Online Social Network Information Forensics: A Survey on Use of Various Tools and Determining How Cautious Facebook Users Are?,” Proceedings - 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems, pp. 1139–1144. (https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.364).
Van Der Valk, R. V. R., Helms, R. W., Van De Wetering, R., Bex, F. J., and Corten, R. 2016. “Feeling Safe? Privacy Controls and Online Disclosure Behavior,” 24th European Conference on Information Systems, ECIS 2016 (June).
Vervier, L., Zeissig, E. M., Lidynia, C., and Ziefle, M. 2017. “Perceptions of Digital Footprints and the Value of Privacy,” IoTBDS 2017 - Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security (IoTBDS), pp. 80–91. (https://doi.org/10.5220/0006301000800091).
Yee, G. O. M. 2017a. “Model for Reducing Risks to Private or Sensitive Data,” Proceedings - 2017 IEEE/ACM 9th International Workshop on Modelling in Software Engineering, MiSE 2017, IEEE, pp. 19–25. (https://doi.org/10.1109/MiSE.2017.6).
Yee, G. O. M. 2017b. “Adding Privacy Protection to Distributed Software Systems,” ICETE 2017 - Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (4:Icete), pp. 351–358. (https://doi.org/10.5220/0006434903510358).
Yildirim, N., and Varol, A. 2019. “A Research on Security Vulnerabilities in Online and Mobile Banking Systems,” 7th International Symposium on Digital Forensics and Security, ISDFS 2019, IEEE, pp. 1–5. (https://doi.org/10.1109/ISDFS.2019.8757495).
Zhang, A., Bacchus, A., and Lin, X. 2016. “A Fairness-Aware and Privacy-Preserving Online Insurance Application System,” 2016 IEEE Global Communications Conference, GLOBECOM 2016 - Proceedings, IEEE, pp. 1–6. (https://doi.org/10.1109/GLOCOM.2016.7841495).
Zhang, J., Dibia, V., Sodnomov, A., and Lowry, P. B. 2015. “Understanding the Disclosure of Private Healthcare Information within Online Quantified Self 2.0 Platforms,” Pacific Asia Conference on Information Systems, PACIS 2015 - Proceedings.
Copyright (c) 2020 Jurnal Sistem Informasi
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).