Main Article Content

Abstract

The evolution of the digital era has brought fundamental changes to personal data protection governance, making this a crucial issue in modern society. This activity aimed to increase public awareness about digital security, highlight common data theft methods, and provide practical tips for protecting personal data. The methodology included a literature review of personal data protection regulations, including the Indonesian Personal Data Protection Law (UU No. 27 Tahun 2022), and an analysis of the role of digital media in raising awareness and providing privacy setting tools. The research findings were then disseminated through a national webinar. The results of this activity showed that public awareness of the role of digital media in personal data protection increased by 75%. This study concludes that the effective use of digital media is essential for educating the public and preventing data breaches, making it a vital tool in modern cybersecurity efforts.

Keywords

Cybersecurity awareness Digital media Personal data protection

Article Details

References

  1. Abdillah, Widianingsih, I., Buchari, R. A., & Nurasa, H. (2024). Big data security & individual (psychological) resilience: A review of social media risks and lessons learned from Indonesia. Array, 21(2), 100–112. https://doi.org/10.1016/j.array.2024.100336
  2. Al-Harrasi, A., Shaikh, A. K., & Al-Badi, A. (2021). Towards protecting organisations’ data by preventing data theft by malicious insiders. International Journal of Organizational Analysis, 31(3), 875–888. https://doi.org/10.1108/IJOA-01-2021-2598
  3. Aslan, Ö., Aktuğ, S. S., Ozkan-Okay, M., Yilmaz, A. A., & Akin, E. (2023). A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions. Electronics, 12(6), 1–42. https://doi.org/10.3390/electronics12061333
  4. Bernes, A. (2022). Enhancing transparency of data processing and data subject’s rights through technical tools: The PIMS and PDS solution. In Privacy and Data Protection in Software Services (pp. 197–208).
  5. Bhadouria, A. S. (2022). Study of: impact of malicious attacks and data breach on the growth and performance of the company and few of the world’s biggest data breaches. International Journal of Scientific and Research Publications, 10(10), 1–11.
  6. Cheng, X., Su, L., Luo, X., Benitez, J., & Cai, S. (2022). The good, the bad, and the ugly: Impact of analytics and artificial intelligence-enabled personal information collection on privacy and participation in ridesharing. European Journal of Information Systems, 31(3), 339–363. https://doi.org/10.1080/0960085X.2020.1869508
  7. Florackis, C., Louca, C., Michaely, R., & Weber, M. (2023). Cybersecurity risk. The Review of Financial Studies, 36(1), 351–407.
  8. Fouad, N. S. (2021). Securing higher education against cyberthreats: from an institutional risk to a national policy challenge. Journal of Cyber Policy, 6(2), 137–154. https://doi.org/10.1080/23738871.2021.1973526
  9. Hillman, V. (2023). Bringing in the technological, ethical, educational and social-structural for a new education data governance. Learning, Media and Technology, 48(1), 122–137. https://doi.org/10.1080/17439884.2022.2052313
  10. Hughes-Lartey, K., Li, M., Botchey, F. E., & Qin, Z. (2021). Human factor, a critical weak point in the information security of an organization’s Internet of things. Heliyon, 7(3), 121–135. https://doi.org/10.1016/j.heliyon.2021.e06522
  11. Hussain, N., & Phulpoto, S. (2024). Digital literacy: Empowering individuals in the Digital Age. Assyfa Learning Journal, 2(2), 70–83. https://doi.org/10.61650/alj.v2i2.231
  12. Issalillah, F., & Hardyansah, R. (2024). Relevance of privacy within the sphere of human rights: A critical analysis of personal data protection. Bulletin of Science, Technology and Society, 3(1), 31–39.
  13. Joyce, A., & Javidroozi, V. (2024). Smart city development: Data sharing vs. data protection legislations. Cities, 148(3), 104–119. https://doi.org/10.1016/j.cities.2024.104859
  14. Labrecque, L. I., Markos, E., Swani, K., & Peña, P. (2021). When data security goes wrong: Examining the impact of stress, social contract violation, and data type on consumer coping responses following a data breach. Journal of Business Research, 135(2), 559–571. https://doi.org/10.1016/j.jbusres.2021.06.054
  15. Markos, E., Peña, P., Labrecque, L. I., & Swani, K. (2023). Are data breaches the new norm? Exploring data breach trends, consumer sentiment, and responses to security invasions. Journal of Consumer Affairs, 57(3), 1089–1119. https://doi.org/10.1111/joca.12554
  16. Marsela, D., Yudhistira, Y., & Fawaid, B. (2024). Legal Protection of Consumers in Online Business: A Criminal Law Perspective in Handling Fraud and Identity Theft. Research Horizon, 4(3), 99–106.
  17. Marune, A. E. M. S., & Hartanto, B. (2021). Strengthening personal data protection, cyber security, and improving public awareness in Indonesia: Progressive legal perspective. International Journal of Business, Economics, and Social Development, 2(4), 143–152. https://doi.org/10.46336/ijbesd.v2i4.170
  18. Prasetya, W., Yanto, & Surbakti, F. P. (2023). Pelaksanaan Kegiatan Pengabdian Masyarakat Webinar Nasional Building Bright Future for Generation Z bagi Siswa-Siswi SMA Jabodetabek. Jurnal Pengabdian Masyarakat Charitas, 3(02), 45–52. https://doi.org/10.25170/charitas.v3i02.4901
  19. Prince, C., Omrani, N., & Schiavone, F. (2024). Online privacy literacy and users’ information privacy empowerment: the case of GDPR in Europe. Information Technology & People, 37(8), 1–24. https://doi.org/10.1108/ITP-05-2023-0467
  20. Romansky, R. (2022). Digital age and personal data protection. International Journal on Information Technologies & Security, 14(3), 89–100.
  21. Srinivas, S., & Liang, H. (2022). Being digital to being vulnerable: does digital transformation allure a data breach? Journal of Electronic Business & Digital Economics, 1(2), 111–137. https://doi.org/10.1108/JEBDE-08-2022-0026
  22. Surbakti, F. P. S. (2024). Edukasi Keamanan Siber Berdigital dengan Aman. Prima Abdika: Jurnal Pengabdian Masyarakat, 4(4), 868–878. https://doi.org/10.37478/abdika.v4i4.4967
  23. Surbakti, F. P. S. (2025). INSAN education: Towards responsible internet users. Community Empowerment, 10(2), 1–12. https://doi.org/10.31603/ce.12934
  24. Sutikno, T., & Stiawan, D. (2022). Cyberattacks and data breaches in Indonesia by Bjorka: hacker or data collector? Bulletin of Electrical Engineering and Informatics, 11(6), 2989–2994. https://doi.org/10.11591/eei.v11i6.4854
  25. Zaidieh, A. J. Y. (2024). Combatting Cybersecurity Threats on Social Media: Network Protection and Data Integrity Strategies. Journal of Artificial Intelligence and Computational Technology, 3(1), 21–34. https://doi.org/10.70274/jaict.2024.1.1.32
  26. Zwilling, M., Klien, G., Lesjak, D., Wiechetek, Ł., Cetin, F., & Basim, H. N. (2022). Cyber security awareness, knowledge and behavior: A comparative study. Journal of Computer Information Systems, 62(1), 82–97. https://doi.org/10.1080/08874417.2020.1712269