Upaya peningkatan kesadaran keamanan data bagi guru Bahasa Inggris SMA di Kabupaten Bantul
Submitted : 2024-01-31, Published : 2024-08-01.
Abstract
Keywords
Full Text:
Article (Bahasa Indonesia)References
T. Li et al., “Smartphone App Usage Analysis: Datasets, Methods, and Applications,” IEEE Communications Surveys and Tutorials, vol. 24, no. 2, pp. 937–966, 2022, doi: 10.1109/COMST.2022.3163176.
M. Hatamian, “Engineering Privacy in Smartphone Apps: A Technical Guideline Catalog for App Developers,” IEEE Access, vol. 8, pp. 35429–35445, 2020, doi: 10.1109/ACCESS.2020.2974911.
A. Papageorgiou, M. Strigkos, E. Politou, E. Alepis, A. Solanas, and C. Patsakis, “Security and Privacy Analysis of Mobile Health Applications: The Alarming State of Practice,” IEEE Access, vol. 6, pp. 9390–9403, Jan. 2018, doi: 10.1109/ACCESS.2018.2799522.
A. Yudhana, I. Riadi, R. Yudhi Prasongko, A. Dahlan, J. Ahmad Yani Tamanan, and J. Soepomo, “Forensik WhatsApp Menggunakan Metode Digital Forensic Research Workshop (DFRWS),” Jurnal Informatika: Jurnal Pengembangan IT, vol. 7, no. 1, pp. 43–48, Jan. 2022, doi: 10.30591/JPIT.V7I1.3639.
R. Aditama, “Penegakan Hukum Cyber Crime Terhadap Tindak Pidana Pencurian Uang Nasabah Dengan Cara Pembajakan Akun Internet Banking Lewat Media Sosial,” Wajah Hukum, vol. 5, no. 1, pp. 118–125, Apr. 2021, doi: 10.33087/WJH.V5I1.360.
A. I. Yuladi and R. Indrayani, “Analisis dan Perbandingan Tools Forensik menggunakan Metode NIST dalam Penanganan Kasus Kejahatan Siber,” Jurnal Teknologi Terpadu, vol. 9, no. 2, pp. 95–100, Dec. 2023, doi: 10.54914/JTT.V9I2.636.
T. Daengsi, P. Pornpongtechavanich, and P. Wuttidittachotti, “Cybersecurity Awareness Enhancement: A Study of the Effects of Age and Gender of Thai Employees Associated with Phishing Attacks,” Educ Inf Technol (Dordr), vol. 27, no. 4, pp. 4729–4752, May 2022, doi: 10.1007/S10639-021-10806-7/TABLES/7.
A. Kovacevic, N. Putnik, and O. Toskovic, “Factors Related to Cyber Security Behavior,” IEEE Access, vol. 8, pp. 125140–125148, 2020, doi: 10.1109/ACCESS.2020.3007867.
M. F. Rozi and M. P. Utami, “Perencanaan Strategis Penerapan Teknologi Informasi Menggunakan Metode Analisis SWOT Proses Bisnis Unit IT,” Decode: Jurnal Pendidikan Teknologi Informasi, vol. 3, no. 1, pp. 74–81, Feb. 2023, doi: 10.51454/DECODE.V3I1.139.
C. Berlian, “Kejahatan Siber yang Menjadi Kekosongan Hukum,” JOURNAL EQUITABLE, vol. 5, no. 2, pp. 19–20, Apr. 2020, doi: 10.37859/JEQ.V5I2.2532.
S. M. Tua Situmeang, “Penyalahgunaan Data Pribadi Sebagai Bentuk Kejahatan Sempurna Dalam Perspektif Hukum Siber,” SASI, vol. 27, no. 1, pp. 38–52, Mar. 2021, doi: 10.47268/sasi.v27i1.394.
A. Haryanto and S. M. Sutra, “Upaya Peningkatan Keamanan Siber Indonesia oleh Badan Siber dan Sandi Negara (BSSN) Tahun 2017-2020,” Global Political Studies Journal, vol. 7, no. 1, pp. 56–69, Apr. 2023, doi: 10.34010/GPSJOURNAL.V7I1.8141.
A. M. Rohmy, T. Suratman, and A. I. Nihayaty, “UU ITE Dalam Perspektif Perkembangan Teknologi Informasi dan Komunikasi,” Dakwatuna: Jurnal Dakwah dan Komunikasi Islam, vol. 7, no. 2, pp. 309–339, Aug. 2021, doi: 10.54471/DAKWATUNA.V7I2.1202.
J. Maulindar and D. Hartanti, “Pelatihan Perlindungan Data Pribadi dan Keamanan Siber Untuk Siswa SMK Negeri 2 Surakarta,” Madaniya, vol. 4, no. 4, pp. 1851–1856, Nov. 2023, doi: 10.53696/27214834.652.
M. A. Zein, U. Y. K. S. Hediyanto, and A. Almaarif, “Security Hardening Sistem Operasi Virtual Private Server pada Instansi Pendidikan XYZ Berdasarkan NIST SP 800-123,” JIPI (Jurnal Ilmiah Penelitian dan Pembelajaran Informatika), vol. 8, no. 1, pp. 230–241, Feb. 2023, doi: 10.29100/JIPI.V8I1.3438.
M. Grobler, M. A. P. Chamikara, J. Abbott, J. J. Jeong, S. Nepal, and C. Paris, “The importance of social identity on password formulations,” Pers Ubiquitous Comput, vol. 25, no. 5, pp. 813–827, Oct. 2021, doi: 10.1007/S00779-020-01477-1/METRICS.
R. Verma, N. Dhanda, and V. Nagar, “Enhancing Security with In-Depth Analysis of Brute-Force Attack on Secure Hashing Algorithms,” Lecture Notes in Networks and Systems, vol. 376, pp. 513–522, 2022, doi: 10.1007/978-981-16-8826-3_44/COVER.
M. E. Gharieb, “Knowing the Level of Information Security Awareness in the Usage of Social Media Among Female Secondary School Students in Eastern Makkah Al-Mukarramah- Saudi Arabia,” International Journal of Computer Science & Network Security, vol. 21, no. 8, pp. 360–368, 2021, doi: 10.22937/IJCSNS.2021.21.8.45.
L. F. Chaparro et al., “Quantifying Perception of Security through Social Media and Its Relationship with Crime,” IEEE Access, vol. 9, pp. 139201–139213, 2021, doi: 10.1109/ACCESS.2021.3114675.
U. S. Yadav, B. B. Gupta, D. Peraković, F. J. G. Peñalvo, and I. Cvitić, “Security and Privacy of Cloud-Based Online Online Social Media: A Survey,” EAI/Springer Innovations in Communication and Computing, pp. 213–236, 2022, doi: 10.1007/978-3-030-90462-3_14/COVER.
R. Mateless, D. Rejabek, O. Margalit, and R. Moskovitch, “Decompiled APK based malicious code classification,” Future Generation Computer Systems, vol. 110, pp. 135–147, Sep. 2020, doi: 10.1016/J.FUTURE.2020.03.052.
S. Jarecki, M. Jubur, H. Krawczyk, N. Saxena, and M. Shirvanian, “Two-factor Password-authenticated Key Exchange with End-to-end Security,” ACM Transactions on Privacy and Security (TOPS), vol. 24, no. 3, p. 17, Apr. 2021, doi: 10.1145/3446807.
J. Tan, L. Bauer, N. Christin, and L. F. Cranor, “Practical Recommendations for Stronger, More Usable Passwords Combining Minimum-strength, Minimum-length, and Blocklist Requirements,” Proceedings of the ACM Conference on Computer and Communications Security, pp. 1407–1426, Oct. 2020, doi: 10.1145/3372297.3417882.
D. Afah, A. Gautam, S. Misra, A. Agrawal, R. Damaševičius, and R. Maskeliūnas, “Smartphones Verification and Identification by the Use of Fingerprint,” Lecture Notes in Networks and Systems, vol. 292, pp. 365–373, 2022, doi: 10.1007/978-981-16-4435-1_35/COVER.
J. Priesnitz, C. Rathgeb, N. Buchmann, C. Busch, and M. Margraf, “An overview of touchless 2D fingerprint recognition,” EURASIP J Image Video Process, vol. 2021, no. 1, pp. 1–28, Dec. 2021, doi: 10.1186/S13640-021-00548-4/TABLES/5.
W. Yudha Aditama, I. Rosianal Hikmah, D. Febriyan Priambodo, P. Siber dan Sandi Negara, K. Bogor, and P. Korespondensi, “Analisis Komparatif Keamanan Aplikasi Pengelola Kata Sandi Berbayar Lastpass, 1Password, dan Keeper Berdasarkan ISO/IEC 25010,” Jurnal Teknologi Informasi dan Ilmu Komputer, vol. 10, no. 4, pp. 857–864, Aug. 2024, doi: 10.25126/JTIIK.20231036544.
M. R. Habibi and I. Liviani, “Kejahatan Teknologi Informasi (Cyber Crime) dan Penanggulangannya dalam Sistem Hukum Indonesia,” Al-Qanun: Jurnal Pemikiran dan Pembaharuan Hukum Islam, vol. 23, no. 2, pp. 400–426, Dec. 2020, doi: 10.15642/ALQANUN.2020.23.2.400-426.
Article Metrics
Abstract view: 142 timesDownload  : 69 times
This work is licensed under a Creative Commons Attribution 4.0 International License.
Refbacks
- There are currently no refbacks.