The Compliance of Governance on Family Data Protection Regulation
DOI:
https://doi.org/10.53955/jhcls.v4i3.293Keywords:
Data, Digital, Family, Protection, RegulationAbstract
Digital transformation has changed the way family data is managed and stored. The vulnerability of family data has become a serious concern due to the increase in data breach incidents. This research aims to analyze public compliance with family data protection regulations and the ideality of government governance regulations regarding family data protection regulations. This research uses normative legal research methods to analyze the comparison of family data privacy protection regulations between Indonesia and England. This research examines various legal guidelines and policies by applying legislative techniques and a conceptual approach. The legal system theory is used as an analytical framework to evaluate the effectiveness of regulations, law enforcement, and legal culture's influence on public compliance. Data was collected through a literature review of primary and secondary sources, including documents, archives, books, and scientific research findings. The research results show First, that family data protection regulations in England are first more standardized with a higher level of public compliance than in Indonesia. Secondly, Indonesia still faces challenges such as the weak bargaining position of data subjects, the absence of clear guidelines for data controllers, and the need for an independent oversight authority. This research recommends regulatory improvements, the establishment of competent authorities, and enhanced public education to strengthen Indonesia's personal data protection system, particularly family data.
References
Abdillah, Abdillah, Ida Widianingsih, Rd Ahmad Buchari, and Heru Nurasa, ‘Big Data Security & Individual (Psychological) Resilience: A Review of Social Media Risks and Lessons Learned from Indonesia’, Array, 21 (2024), 100336 https://doi.org/https://doi.org/10.1016/j.array.2024.100336
Alhadidi, Ismaeel, Aman Nweiran, and Ghofran Hilal, ‘The Influence of Cybercrime and Legal Awareness on the Behavior of University of Jordan Students’, Heliyon, 10.12 (2024), e32371 https://doi.org/10.1016/j.heliyon.2024.e32371
Antonius, Andrean, Yuni Ginting, Clarissa Mulia, Sharron Syallomeita, Dennis Taweranusa, Gabriel Daffa, and others, ‘Sosialisasi Perbandingan Hukuman Tindak Pidana Pembukaan Rahasia Data Pribadi Negara Indonesia Dan Inggris’, Jurnal Pengabdian West Science, 3.04 (2024), 383–94 https://doi.org/10.58812/jpws.v3i04.1080
Aujla, Navneet, Helen Frost, Bruce Guthrie, Barbara Hanratty, Eileen Kaner, Amy O’Donnell, and others, ‘A Comparative Overview of Health and Social Care Policy for Older People in England and Scotland, United Kingdom (UK)’, Health Policy, 132.April (2023), 104814 https://doi.org/10.1016/j.healthpol.2023.104814
Ayu Palar, Miranda Risang, Laina Rafianti, and Helitha Novianty Muchtar, ‘Inclusive Rights to Protect Communal Intellectual Property: Indonesian Perspective on Its New Government Regulation’, Cogent Social Sciences, 9.2 (2023), 1–19 https://doi.org/10.1080/23311886.2023.2274431
Balboni, Paolo, and Kate Francis, ‘Chapter 55 - Personal Privacy Policies’, in Computer and Information Security Handbook (Fourth Edition), ed. by John R Vacca, Fourth Edition (Morgan Kaufmann, 2025), pp. 907–16 https://doi.org/https://doi.org/10.1016/B978-0-443-13223-0.00055-2
Balboni, Prof. Dr. Paolo, and Kate Elizabeth Francis, ‘Data Ethics and Digital Sustainability: Bridging Legal Data Protection Compliance and ESG for a Responsible Data-Driven Future’, Journal of Responsible Technology, 2024, 100099 https://doi.org/https://doi.org/10.1016/j.jrt.2024.100099
Boothby, Neil, and Lindsay Stark, ‘Data Surveillance in Child Protection Systems Development: An Indonesian Case Study’, Child Abuse and Neglect, 35.12 (2011), 993–1001 https://doi.org/10.1016/j.chiabu.2011.09.004
Boychuk, Vasiliy, Kirill Sukharev, Daniil Voloshin, and Vladislav Karbovskii, ‘An Exploratory Sentiment and Facial Expressions Analysis of Data from Photo-Sharing on Social Media: The Case of Football Violence’, Procedia Computer Science, 80 (2016), 398–406 https://doi.org/10.1016/j.procs.2016.05.340
Calvi, Alessandra, ‘Data Protection Impact Assessment under the EU General Data Protection Regulation: A Feminist Reflection’, Computer Law & Security Review, 53 (2024), 105950 https://doi.org/https://doi.org/10.1016/j.clsr.2024.105950
Chatsuwan, Panchapawn, Tanawat Phromma, Navaporn Surasvadi, and Suttipong Thajchayapong, ‘Personal Data Protection Compliance Assessment: A Privacy Policy Scoring Approach and Empirical Evidence from Thailand’s SMEs’, Heliyon, 9 (2023), 1–30 https://doi.org/https://doi.org/10.1016/j.heliyon.2023.e20648
Chelioudakis, Eleftherios, ‘Unpacking AI-Enabled Border Management Technologies in Greece: To What Extent Their Development and Deployment Are Transparent and Respect Data Protection Rules?’, Computer Law & Security Review, 53 (2024), 105967 https://doi.org/https://doi.org/10.1016/j.clsr.2024.105967
Chen, Meng, ‘Developing China’s Approaches to Regulate Cross-Border Data Transfer:Relaxation and Integration’, Computer Law & Security Review, 54 (2024), 105997 https://doi.org/https://doi.org/10.1016/j.clsr.2024.105997
Choi, Daeeun Daniel, and Paul Benjamin Lowry, ‘Balancing the Commitment to the Common Good and the Protection of Personal Privacy: Consumer Adoption of Sustainable, Smart Connected Cars’, Information & Management, 61.1 (2024), 103876 https://doi.org/https://doi.org/10.1016/j.im.2023.103876
Christensen, Tanja Kammersgaard, ‘Pre-Installed Cameras in Vehicles—New Technology from a Data Protection Law Perspective’, Computer Law & Security Review, 53 (2024), 105980 https://doi.org/https://doi.org/10.1016/j.clsr.2024.105980
Conca, Silvia De, ‘The Present Looks Nothing like the Jetsons: Deceptive Design in Virtual Assistants and the Protection of the Rights of Users’, Computer Law & Security Review, 51 (2023), 105866 https://doi.org/https://doi.org/10.1016/j.clsr.2023.105866
Costantini, Federico, and Giada Soncini, ‘Chapter 14 - Healthcare Data Governance in the EU: Main Challenges in Personal Data Protection’, in Endorobotics, ed. by Luigi Manfredi (Academic Press, 2022), pp. 319–36 https://doi.org/https://doi.org/10.1016/B978-0-12-821750-4.00014-1
Custers, Bart, ‘A Fair Trial in Complex Technology Cases: Why Courts and Judges Need a Basic Understanding of Complex Technologies’, Computer Law & Security Review, 52 (2024), 105935 https://doi.org/10.1016/j.clsr.2024.105935
Custers, Bart, and Gianclaudio Malgieri, ‘Priceless Data: Why the EU Fundamental Right to Data Protection Is at Odds with Trade in Personal Data’, Computer Law & Security Review, 45 (2022), 105683 https://doi.org/https://doi.org/10.1016/j.clsr.2022.105683
van Daalen, O.L., ‘The Right to Encryption: Privacy as Preventing Unlawful Access’, Computer Law & Security Review, 49 (2023), 105804 https://doi.org/10.1016/j.clsr.2023.105804
Daudén-Esmel, Cristòfol, Jordi Castellà-Roca, and Alexandre Viejo, ‘Blockchain-Based Access Control System for Efficient and GDPR-Compliant Personal Data Management’, Computer Communications, 214 (2024), 67–87 https://doi.org/https://doi.org/10.1016/j.comcom.2023.11.017
Demetzou, Katerina, Gabriela Zanfir-Fortuna, and Sebastião Barros Vale, ‘The Thin Red Line: Refocusing Data Protection Law on ADM, a Global Perspective with Lessons from Case-Law’, Computer Law & Security Review, 49 (2023), 105806 https://doi.org/https://doi.org/10.1016/j.clsr.2023.105806
Demir, Esra, ‘The Protection of Human Biodata: Is There Any Role for Data Ownership?’, Computer Law and Security Review, 51.August 2022 (2023), 105905 https://doi.org/10.1016/j.clsr.2023.105905
Dewitte, Pierre, ‘Better Alone than in Bad Company: Addressing the Risks of Companion Chatbots through Data Protection by Design’, Computer Law and Security Review, 54.July (2024), 106019 https://doi.org/10.1016/j.clsr.2024.106019
Dwivedi, Yogesh K., D. Laurie Hughes, Crispin Coombs, Ioanna Constantiou, Yanqing Duan, John S. Edwards, and others, ‘Impact of COVID-19 Pandemic on Information Management Research and Practice: Transforming Education, Work and Life’, International Journal of Information Management, 55.July (2020), 102211 https://doi.org/10.1016/j.ijinfomgt.2020.102211
Erdos, Dr David, ‘Identification in Personal Data: Authenticating the Meaning and Reach of Another Broad Concept in EU Data Protection Law’, Computer Law & Security Review, 46 (2022), 105721 https://doi.org/https://doi.org/10.1016/j.clsr.2022.105721
Fantonelli, Miliane dos Santos, Wagner Luiz Zanotto, Fabiana Magarrote Fernandes de Melo, Ianka Cristina Celuppi, Thaisa Cardoso Lacerda, Fernanda Maia de Oliveira, and others, ‘Organization and Management of Sensitive Personal Health Data in Electronic Systems in Countries with Implemented Data Protection Laws, Lessons to Brazil: A Brief Systematic Review’, Computer Law and Security Review, 51 (2023), 105872 https://doi.org/10.1016/j.clsr.2023.105872
Farhad, Mohsin Ali, ‘Consumer Data Protection Laws and Their Impact on Business Models in the Tech Industry’, Telecommunications Policy, 48.9 (2024), 102836 https://doi.org/https://doi.org/10.1016/j.telpol.2024.102836
Febbrajo, Alberto, Law, Legal Culture and Society, Law, Legal Culture and Society, 2018 https://doi.org/10.4324/9781351040341
Guamán, Danny S, David Rodriguez, Jose M del Alamo, and Jose Such, ‘Automated GDPR Compliance Assessment for Cross-Border Personal Data Transfers in Android Applications’, Computers & Security, 130 (2023), 103262 https://doi.org/https://doi.org/10.1016/j.cose.2023.103262
Guo, Shuai, and Xiang Li, ‘Cross-Border Data Flow in China: Shifting from Restriction to Relaxation?’, Computer Law & Security Review, 56 (2025), 106079 https://doi.org/https://doi.org/10.1016/j.clsr.2024.106079
Haarberg, Frøydis Lønborg, ‘What Do We Know about Children’s Representation in Child Protection Decisions? A Scoping Review’, Children and Youth Services Review, 160.March (2024) https://doi.org/10.1016/j.childyouth.2024.107588
Hu, Zhangxiang, ‘Layered Network Protocols for Secure Communications in the Internet of Things’, University of Oregon: Eugene, OR, USA, 2021
Hutomo, Priyo, and Markus Marselinus Soge, ‘Perspektif Teori Sistem Hukum Dalam Pembaharuan Pengaturan Sistem Pemasyarakatan Militer’, Legacy: Jurnal Hukum Dan Perundang-Undangan, 1.1 (2021), 46–68 https://doi.org/10.21274/legacy.2021.1.1.46-68
Imakura, Akira, Tetsuya Sakurai, Yukihiko Okada, Tomoya Fujii, Teppei Sakamoto, and Hiroyuki Abe, ‘Non-Readily Identifiable Data Collaboration Analysis for Multiple Datasets Including Personal Information’, Information Fusion, 98 (2023), 101826 https://doi.org/https://doi.org/10.1016/j.inffus.2023.101826
Ismail, Hamzah, Finley Febiyanto, Kevin, and Jurike V. Moniaga, ‘Methods to Prevent Privacy Violations on the Internet on the Personal Level in Indonesia’, Procedia Computer Science, 216.2022 (2022), 650–54 https://doi.org/10.1016/j.procs.2022.12.180
Isus, Raichuk, Kateryna Kolesnikova, Iulia Khlevna, Timinskyi Oleksandr, and Kubiavka Liubov, ‘Development of a Model of Personal Data Protection in the Context of Digitalization of the Educational Sphere Using Information Technology Tools’, Procedia Computer Science, 231 (2024), 347–52 https://doi.org/https://doi.org/10.1016/j.procs.2023.12.215
Kant, Immanuel, Kant: The Metaphysics of Morals (Cambridge University Press, 2017)
Karjalainen, Tuulia, ‘The Battle of Power: Enforcing Data Protection Law against Companies Holding Data Power’, Computer Law and Security Review, 47.August 2018 (2022), 105742 https://doi.org/10.1016/j.clsr.2022.105742
Kaya, G.K., S. Ustebay, J. Nixon, C. Pilbeam, and M. Sujan, ‘Exploring the Impact of Safety Culture on Incident Reporting: Lessons Learned from Machine Learning Analysis of NHS England Staff Survey and Incident Data’, Safety Science, 166 (2023), 106260 https://doi.org/10.1016/j.ssci.2023.106260
Kollnig, Konrad, Lu Zhang, Jun Zhao, and Nigel Shadbolt, ‘Privacy in Chinese IOS Apps and Impact of the Personal Information Protection Law’, Computer Law and Security Review, 55.February 2020 (2024), 106041 https://doi.org/10.1016/j.clsr.2024.106041
Kuang, Linghong, Wenlong Shi, and Jing Zhang, ‘Hierarchical Privacy Protection Model in Advanced Metering Infrastructure Based on Cloud and Fog Assistance’, Computers, Materials and Continua, 80.2 (2024), 3193–3219 https://doi.org/https://doi.org/10.32604/cmc.2024.054377
Laxton, Debra, Linda Cooper, and Sarah Younie, ‘Translational Research in Action: The Use of Technology to Disseminate Information to Parents during the COVID-19 Pandemic’, British Journal of Educational Technology, 52.4 (2021), 1538–53 https://doi.org/https://doi.org/10.1111/bjet.13100
Lee, Jaeung, Melchor C. de Guzman, Jingguo Wang, Manish Gupta, and H. Raghav Rao, ‘Investigating Perceptions about Risk of Data Breaches in Financial Institutions: A Routine Activity-Approach’, Computers and Security, 121 (2022) https://doi.org/10.1016/j.cose.2022.102832
Li, Wenlong, and Jiahong Chen, ‘From Brussels Effect to Gravity Assists: Understanding the Evolution of the GDPR-Inspired Personal Information Protection Law in China’, Computer Law & Security Review, 54 (2024), 105994 https://doi.org/https://doi.org/10.1016/j.clsr.2024.105994
Li, Yuanxin, and Darina Saxunová, ‘A Perspective on Categorizing Personal and Sensitive Data and the Analysis of Practical Protection Regulations’, Procedia Computer Science, 170 (2020), 1110–15 https://doi.org/https://doi.org/10.1016/j.procs.2020.03.060
Lin, Jiacheng, Xianwen Dai, Ke Nai, Jin Yuan, Zhiyong Li, Xu Zhang, and others, ‘BRPPNet: Balanced Privacy Protection Network for Referring Personal Image Privacy Protection’, Expert Systems with Applications, 233 (2023), 120960 https://doi.org/https://doi.org/10.1016/j.eswa.2023.120960
Livingstone, Sonia, Kruakae Pothong, Ayça Atabey, Louise Hooper, and Emma Day, ‘The Googlization of the Classroom: Is the UK Effective in Protecting Children’s Data and Rights?’, Computers and Education Open, 7.June (2024), 100195 https://doi.org/10.1016/j.caeo.2024.100195
Llanos, Jose Tomas, Madeline Carr, and Omer Rana, ‘Using the Blockchain to Enable Transparent and Auditable Processing of Personal Data in Cloud- Based Services: Lessons from the Privacy-Aware Cloud Ecosystems (PACE) Project’, Computer Law & Security Review, 51 (2023), 105873 https://doi.org/https://doi.org/10.1016/j.clsr.2023.105873
Locke, John, Two Treatises of Government (Cambridge university press, 1967)
Loideain, Nóra Ni, and Rachel Adams, ‘From Alexa to Siri and the GDPR: The Gendering of Virtual Personal Assistants and the Role of Data Protection Impact Assessments’, Computer Law and Security Review, 36 (2020), 1–14 https://doi.org/10.1016/j.clsr.2019.105366
———, ‘From Alexa to Siri and the GDPR: The Gendering of Virtual Personal Assistants and the Role of Data Protection Impact Assessments’, Computer Law & Security Review, 36 (2020), 105366 https://doi.org/https://doi.org/10.1016/j.clsr.2019.105366
Lubis, Muharman, and Dini Oktarina D. Handayani, ‘The Relationship of Personal Data Protection towards Internet Addiction: Cyber Crimes, Pornography and Reduced Physical Activity’, Procedia Computer Science, 197.2021 (2021), 151–61 https://doi.org/10.1016/j.procs.2021.12.129
Maple, Carsten, Security and Privacy in the Internet of Things, Journal of Cyber Policy, 2017, II https://doi.org/10.1080/23738871.2017.1366536
Marelli, Massimo, ‘The Law and Practice of International Organizations’ Interactions with Personal Data Protection Domestic Regulation: At the Crossroads between the International and Domestic Legal Orders’, Computer Law & Security Review, 50 (2023), 105849 https://doi.org/https://doi.org/10.1016/j.clsr.2023.105849
‘Marriott Breached Again’, Computer Fraud & Security, 2020.4 (2020), 3 https://doi.org/https://doi.org/10.1016/S1361-3723(20)30035-X
Milkaite, Ingrida, Ralf De Wolf, Eva Lievens, Tom De Leyn, and Marijn Martens, ‘Children’s Reflections on Privacy and the Protection of Their Personal Data: A Child-Centric Approach to Data Protection Information Formats’, Children and Youth Services Review, 129.December 2020 (2021), 106170 https://doi.org/10.1016/j.childyouth.2021.106170
Mollaeefar, Majid, and Silvio Ranise, ‘Identifying and Quantifying Trade-Offs in Multi-Stakeholder Risk Evaluation with Applications to the Data Protection Impact Assessment of the GDPR’, Computers & Security, 129 (2023), 103206 https://doi.org/https://doi.org/10.1016/j.cose.2023.103206
Montenarh, Jonas, and Simon Marsden, ‘Unmasking the Oligarchs – Using Open Source Data to Detect Sanctions Violations’, Journal of Economic Criminology, 3.February (2024), 100055 https://doi.org/10.1016/j.jeconc.2024.100055
Mourby, Miranda, Elaine Mackey, Mark Elliot, Heather Gowans, Susan E. Wallace, Jessica Bell, and others, ‘Are “Pseudonymised” Data Always Personal Data? Implications of the GDPR for Administrative Data Research in the UK’, Computer Law and Security Review, 34.2 (2018), 222–33 https://doi.org/10.1016/j.clsr.2018.01.002
Mutiara, Upik, and Romi Maulana, ‘Perlindungan Data Pribadi Sebagai Bagian Dari Hak Asasi Manusia Atas Perlindungan Diri Pribadi’, Indonesian Journal of Law and Policy Studies, 1.1 (2020), 42 https://doi.org/10.31000/ijlp.v1i1.2648
Navickas, Katrina, ‘Legal and Historical Geographies of the Greenham Common Protest Camps in the 1980s’, Journal of Historical Geography, 82 (2023), 11–22 https://doi.org/10.1016/j.jhg.2023.07.002
Niffari, Hanifan, ‘Perlindungan Data Pribadi Sebagai Bagian Dari Hak Asasi Manusia Atas Perlindungan Diri Pribadi Suatu Tinjauan Komparatif Dengan Peraturan Perundang-Undangan Di Negara Lain’, Jurnal Hukum Dan Bisnis (Selisik), 6.1 (2020), 1–14 https://doi.org/10.35814/selisik.v6i1.1699
Noor, Hendry Julian, Kardiansyah Afkar, and Henning Glaser, ‘Application of Sanctions Against State Administrative Officials in Failure to Implement Administrative Court Decisions’, BESTUUR, 9.1 (2021), 72 https://doi.org/10.20961/bestuur.v9i1.49686
Pascual, Hugo, Jose M del Alamo, David Rodriguez, and Juan C Dueñas, ‘Hunter: Tracing Anycast Communications to Uncover Cross-Border Personal Data Transfers’, Computers & Security, 141 (2024), 103823 https://doi.org/https://doi.org/10.1016/j.cose.2024.103823
Pauletto, Christian, ‘Options towards a Global Standard for the Protection of Individuals with Regard to the Processing of Personal Data’, Computer Law & Security Review, 40 (2021), 105433 https://doi.org/https://doi.org/10.1016/j.clsr.2020.105433
Phillips, Benjamin, ‘UK Further Education Sector Journey to Compliance with the General Data Protection Regulation and the Data Protection Act 2018’, Computer Law & Security Review, 42.105586 (2021), 1–13 https://doi.org/https://doi.org/10.1016/j.clsr.2021.105586
Pleger, Lyn E., Katharina Guirguis, and Alexander Mertes, ‘Making Public Concerns Tangible: An Empirical Study of German and UK Citizens’ Perception of Data Protection and Data Security’, Computers in Human Behavior, 122.February 2020 (2021), 106830 https://doi.org/10.1016/j.chb.2021.106830
Pratono, Aluisius Hery, and Ari Sutanti, ‘The Ecosystem of Social Enterprise: Social Culture, Legal Framework, and Policy Review in Indonesia’, Pacific Science Review B: Humanities and Social Sciences, 2.3 (2016), 106–12 https://doi.org/10.1016/j.psrb.2016.09.020
Purtova, Nadezhda, and Robin L Pierce, ‘Citizen Scientists as Data Controllers: Data Protection and Ethics Challenges of Distributed Science’, Computer Law & Security Review, 52 (2024), 105911 https://doi.org/https://doi.org/10.1016/j.clsr.2023.105911
Qaid, Hanif, Ari Widyanti, Sheila Amalia Salma, Fitri Trapsilawati, Titis Wijayanto, Utami Dyah Syafitri, and others, ‘Speed Choice and Speeding Behavior on Indonesian Highways: Extending the Theory of Planned Behavior’, IATSS Research, 46.2 (2022), 193–99 https://doi.org/10.1016/j.iatssr.2021.11.013
Ranjan, Aditya Kaushal, and Prabhat Kumar, ‘APPS: Authentication-Enabled Privacy Protection Scheme for Secure Data Transfer in Internet of Things’, Ad Hoc Networks, 164 (2024), 103631 https://doi.org/https://doi.org/10.1016/j.adhoc.2024.103631
Rataj, Piotr, ‘Botnet Defense under EU Data Protection Law’, Computer Law & Security Review, 56 (2025), 106080 https://doi.org/https://doi.org/10.1016/j.clsr.2024.106080
Rupp, Valentin, and Max von Grafenstein, ‘Clarifying “Personal Data” and the Role of Anonymisation in Data Protection Law Including and Excluding Data from the Scope of the GDPR (More Clearly) through Refining the Concept of Data Protection’, Computer Law and Security Review, 52.1 (2024), 105932 https://doi.org/10.1016/j.clsr.2023.105932
Sautunnida, Lia, ‘Urgensi Undang-Undang Perlindungan Data Pribadi Di Indonesia: Studi Perbandingan Hukum Inggris Dan Malaysia’, Kanun Jurnal Ilmu Hukum, 20.2 (2018), 369–84 https://doi.org/10.24815/kanun.v20i2.11159
Setiabudhi, Donna Okthalia, Ahsan Yunus, Irwansyah Irwansyah, and Andi Rifky, ‘The Role of Land Management Paradigm Towards Certainty and Justice’, BESTUUR, 11.1 (August) (2023), 43 https://doi.org/10.20961/bestuur.v11i1.71710
Sharpe, Sybil, National Security, Personal Privacy and the Law: Surveying Electronic Surveillance and Data Acquisition, National Security (Routledge, 2019) https://doi.org/10.4324/9780429020025
Silbey, Susan S., Legal Culture and Legal Consciousness, International Encyclopedia of the Social & Behavioral Sciences: Second Edition, Second Edi (Elsevier, 2015), XIII https://doi.org/10.1016/B978-0-08-097086-8.86067-5
de Sousa Rocha, Núbia Augusto, Alexandre Nascimento de Almeida, André Nunes, and Humberto Angelo, ‘Critical Points for the Processing of Personal Data by the Government: An Empirical Study in Brazil’, Computer Law & Security Review, 54 (2024), 106023 https://doi.org/https://doi.org/10.1016/j.clsr.2024.106023
Steppe, Richard, ‘Online Price Discrimination and Personal Data: A General Data Protection Regulation Perspective’, Computer Law and Security Review, 33.6 (2017), 768–85 https://doi.org/10.1016/j.clsr.2017.05.008
Studzinska, Joanna, ‘Request for Information as an Auxiliary Measure in Intellectual Property Litigation Concerning Electronic Works and the Protection of Personal Data’, Procedia Computer Science, 207 (2022), 4276–87 https://doi.org/https://doi.org/10.1016/j.procs.2022.09.491
Sun, Panjun, Yi Wan, Zongda Wu, Zhaoxi Fang, and Qi Li, ‘A Survey on Privacy and Security Issues in IoT-Based Environments: Technologies, Protection Measures and Future Directions’, Computers & Security, 148 (2025), 104097 https://doi.org/https://doi.org/10.1016/j.cose.2024.104097
Tang, Alan, Privacy in Practice, Privacy in Practice, 2022 https://doi.org/10.1201/9781003225089
Tauda, Gunawan A., Andy Omara, and Gioia Arnone, ‘Cryptocurrency: Highlighting the Approach, Regulations, and Protection in Indonesia and European Union’, BESTUUR, 11.1 (August) (2023), 1 https://doi.org/10.20961/bestuur.v11i1.67125
de Terwangne, Cécile, ‘Council of Europe Convention 108+: A Modernised International Treaty for the Protection of Personal Data’, Computer Law and Security Review, 40.September 1980 (2021), 3–4 https://doi.org/10.1016/j.clsr.2020.105497
Tonheim, Milfrid, Muireann Ní Raghallaigh, Ketil Eide, and Ala Sirriyeh, ‘Relational and Cultural Continuity for Children in Foster Care; A Critical Explo‐ Ration of National Policies in Norway, Sweden, Denmark, England, Ireland and Scotland’, Children and Youth Services Review, 2024, 108040 https://doi.org/10.1016/j.childyouth.2024.108040
‘UK Strategy Slated by Own Biometrics Commissioner’, Biometric Technology Today, 2018.7 (2018), 11–11 https://doi.org/10.1016/s0969-4765(18)30096-1
Valero, Cayetano, Jaime Pérez, Sonia Solera-Cotanilla, Mario Vega-Barbas, Guillermo Suarez-Tangil, Manuel Alvarez-Campana, and others, ‘Analysis of Security and Data Control in Smart Personal Assistants from the User’s Perspective’, Future Generation Computer Systems, 144 (2023), 12–23 https://doi.org/https://doi.org/10.1016/j.future.2023.02.009
Wang, Feng, Yongjie Gai, and Haitao Zhang, ‘Blockchain User Digital Identity Big Data and Information Security Process Protection Based on Network Trust’, Journal of King Saud University - Computer and Information Sciences, 36.4 (2024), 102031 https://doi.org/https://doi.org/10.1016/j.jksuci.2024.102031
Wang, Wayne Wei, ‘Contextualizing Personal Information: Privacy’s Post-Neoliberal Constitutionalism and Its Heterogeneous Imperfections in China’, Computer Law & Security Review, 55 (2024), 106030 https://doi.org/https://doi.org/10.1016/j.clsr.2024.106030
Wang, Yu, ‘Data Structure and Privacy Protection Analysis in Big Data Environment Based on Blockchain Technology’, International Journal of Intelligent Networks, 5 (2024), 120–32 https://doi.org/https://doi.org/10.1016/j.ijin.2024.02.005
Wicaksono, Agung, Irni Yunita, and Gede Ginaya, ‘Living Side by Side with Nature: Evidence of Self-Governance in Three Local Communities in Indonesia’, Heliyon, 8.12 (2022), e12248 https://doi.org/10.1016/j.heliyon.2022.e12248
Xiao, Zhiqiang, Jiacheng Lin, Jiajun Chen, Haolong Fu, Yifan Li, Jin Yuan, and others, ‘Privacy Preservation Network with Global-Aware Focal Loss for Interactive Personal Visual Privacy Preservation’, Neurocomputing, 602 (2024), 128193 https://doi.org/https://doi.org/10.1016/j.neucom.2024.128193
Yang, Shuling, and Yan Hou, ‘Cultivation Strategies of English Thinking Ability in the Environment of Internet of Things Shuling’, HELIYON, 2024, e39515 https://doi.org/10.1016/j.heliyon.2024.e39515
Yang, Zenghui, Xiubo Chen, Yunfeng He, Luxi Liu, Yinmei Che, Xiao Wang, and others, ‘An Attribute-Based Access Control Scheme Using Blockchain Technology for IoT Data Protection’, High-Confidence Computing, 4.3 (2024), 100199 https://doi.org/https://doi.org/10.1016/j.hcc.2024.100199
Ye, Jun, Ling Wang, Zhiyu Wang, Zhengqi Zhang, Zheng Xu, and Jinghua Zhao, ‘An Electronic Voting Scheme with Privacy Protection’, Procedia Computer Science, 243 (2024), 1248–56 https://doi.org/https://doi.org/10.1016/j.procs.2024.09.147
Ye, Xiongbiao, Yuhong Yan, Jia Li, and Bo Jiang, ‘Privacy and Personal Data Risk Governance for Generative Artificial Intelligence: A Chinese Perspective’, Telecommunications Policy, 48.10 (2024), 102851 https://doi.org/https://doi.org/10.1016/j.telpol.2024.102851
Zheng, Guan, and Jinchun Shu, ‘In the Name of Protection—A Critical Analysis of China’s Legal Framework of Children’s Personal Information Protection in the Digital Era’, Computer Law and Security Review, 53.April (2024), 105979 https://doi.org/10.1016/j.clsr.2024.105979
Zinovieva, Vera, Mikhail Shchelokov, and Evgeny Litvinovsky, ‘Legal Issues of Protection of Personal Data: Cases of Transport Data Leaks’, Transportation Research Procedia, 68 (2023), 461–67 https://doi.org/https://doi.org/10.1016/j.trpro.2023.02.062
Downloads
Published
Issue
Section
Citation Check
License
Copyright (c) 2024 Ni Komang Sutrisni, Putu Angga Pratama Sukma, Rahimah Embong , Khanlar Haydarov
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with Journal of Human Rights, Culture and Legal System agree to the following terms:
- Authors retain copyright and grant the Journal of Human Rights, Culture and Legal System right of first publication with the work simultaneously licensed under Creative Commons Attribution License (CC BY 4.0) that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors can enter into separate, additional contractual arrangements for the non-exclusive distribution of the published version of the work (e.g., post it to an institutional repository or edit it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) before and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.