Analysis of Data Privacy Policy, Data Processing Ethics, and Technology Ethics Awareness on User Privacy Protection in West Java

Authors

  • Arief Budi Pratomo STIE Nusa Megarkencana
  • Joko Santoso Institut Teknologi dan Bisnis STIKOM Bali
  • Anggun Nugroho Institut Teknologi dan Bisnis STIKOM Bali
  • Rully Fildansyah Universitas Nusa Putra
  • Arnes Yuli Vandika Universitas Bandar Lampung

DOI:

https://doi.org/10.58812/wsshs.v2i03.715

Keywords:

Data Privacy Policy, Data Processing Ethics, Technological Ethics Awareness, User Privacy Protection, Quantitative Analysis

Abstract

This study investigates the relationships between data privacy policy adherence, data processing ethics, technological ethics awareness, and user privacy protection in West Java, Indonesia. Utilizing a quantitative research design, data was collected through surveys administered to organizations and individual users. Structural Equation Modeling (SEM) with Partial Least Squares (PLS) analysis was employed to analyze the data. The results reveal significant positive relationships between data privacy policy adherence, data processing ethics, and technological ethics awareness with user privacy protection. The findings underscore the importance of regulatory compliance, ethical data practices, and user awareness in safeguarding user privacy. These insights provide valuable implications for policymakers, organizations, and users seeking to enhance privacy protection efforts in West Java and beyond.

References

V. P. Shehu and V. Shehu, “Human rights in the technology era–Protection of data rights,” … Journal of Economics, Law and Social Sciences. sciendo.com, 2023. doi: 10.2478/ejels-2023-0001.

M. Zostant and R. Chataut, “Privacy in computer ethics: Navigating the digital age,” Comput. Sci. Inf. Technol., vol. 4, no. 2, pp. 183–190, 2023.

V. Katiandagho, D. D. Putong, and I. J. Melo, “Undang–Undang Perlindungan Data Pribadi Memperkuat Undang–Undang Perbankan Dalam Menjaga Rahasia Data Nasabah Dan Untuk Melindungi Data Pribadi Masyarakat Indonesia,” J. Huk. to-ra Huk. Untuk Mengatur dan Melindungi Masy., vol. 9, no. 1, pp. 106–114, 2023.

E. Krisnaningsih, S. Dwiyatno, A. D. Jubaedi, and A. Shafitri, “Increasing Ethical Understanding of the Use of Information Technology Through Digital Literacy Proficiency Training,” Din. J. Pengabdi. Kpd. Masy., vol. 7, no. 3, pp. 789–801, 2023.

E. A. P. Manurung, “The right to privacy based on the Law of the Republic of Indonesia number 27 of 2022,” J. Digit. Law Policy, vol. 2, no. 3, pp. 103–110, 2023.

G. Harinath, “Does personal data protection matter in data protection law? A transformational model to fit in the digital era,” Handb. Big Data Res. Methods 0, 2023, [Online]. Available: https://books.google.com/books?hl=en&lr=&id=9gPEEAAAQBAJ&oi=fnd&pg=PA267&dq=personal+data+protection+in+the+digital+age&ots=ikgF61cekO&sig=JhPfL-foIY6R8mkM2R5jkPQPwUs

S. Wiefling, J. Tolsdorf, and L. Lo Iacono, “Data Protection Officers’ Perspectives on Privacy Challenges in Digital Ecosystems,” in European Symposium on Research in Computer Security, Springer, 2022, pp. 228–247.

N. Fedocenko and H. Spitsyna, “Current issues of international legal regulation of the protection of personal data of employees,” Anal. Comp. Jurisprud., pp. 204–208, Jun. 2023, doi: 10.24144/2788-6018.2023.02.34.

S. Simonova, “Data processing on digital platforms: topical issues of improving legislation and practice,” Vestn. Yarosl. Gos. Univ. im. P. G. Demidova. Seriya Gumanit. Nauk., vol. 16, p. 642, Dec. 2022, doi: 10.18255/1996-5648-2022-4-642-649.

R. Romansky, “Digital age and personal data protection,” … Journal on Information Technologies &Security. researchgate.net, 2022. [Online]. Available: https://www.researchgate.net/profile/Radi-Romansky/publication/362695987_DIGITAL_AGE_AND_PERSONAL_DATA_PROTECTION/links/62fa34f5e3c7de4c345c4233/DIGITAL-AGE-AND-PERSONAL-DATA-PROTECTION.pdf

M. Cuquet, G. Vega-Gorgojo, H. Lammerant, and R. Finn, “Societal impacts of big data: challenges and opportunities in Europe,” arXiv Prepr. arXiv1704.03361, 2017.

M. S. McCoy et al., “Ethical responsibilities for companies that process personal data,” Am. J. Bioeth., vol. 23, no. 11, pp. 11–23, 2023.

S. Matagi and S. Kaneko, “Challenges and opportunities on data protection and privacy in healthcare,” Int. J. Sci. Res. Updat., vol. 5, pp. 23–41, Jan. 2023, doi: 10.53430/ijsru.2023.5.1.0001.

N. Scope, A. Rasin, B. Lenard, K. Heart, and J. Wagner, “Harmonizing privacy regarding data retention and purging,” in Proceedings of the 34th International Conference on Scientific and Statistical Database Management, 2022, pp. 1–12.

L. Golightly, K. Wnuk, N. Shanmugan, A. Shaban, J. Longstaff, and V. Chang, “Towards a Working Conceptual Framework: Cyber Law for Data Privacy and Information Security Management for the Industrial Internet of Things Application Domain,” in 2022 International Conference on Industrial IoT, Big Data and Supply Chain (IIoTBDSC), IEEE, 2022, pp. 86–94.

R. J. Sancon, “Data Privacy Best Practices of A Local Higher Educational Institution: A Model for Governance,” Int. Multidiscip. Res. J., Jun. 2023, doi: 10.54476/ioer-imrj/688585.

P. Yadav, S. Tiwari, P. Kumari, and S. Mittal, “Business Policies and Practices for Ensuring Data Security: An Exploratory Study,” J. IoT Secur. Smart Technol., vol. 2, pp. 9–14, Feb. 2023, doi: 10.46610/JISST.2023.v02i01.002.

S. Parthasarathy, P. K. Panigrahi, and G. H. Subramanian, “A framework for managing ethics in data science projects,” Eng. Reports, p. e12722, 2023.

S. Shubham and S. Saloni, “Data and science engineering: The ethical dilemma of our time-exploring privacy breaches, algorithmic biases, and the need for transparency,” World J. Adv. Res. Rev., vol. 18, no. 1, pp. 762–768, 2023.

M. Levine, R. Philpot, S. J. Nightingale, and A. Kordoni, “Visual digital data, ethical challenges, and psychological science.,” Am. Psychol., vol. 79, no. 1, p. 109, 2024.

N. Tempini, “The ethics of data self-reporting: important issues and best practices,” F1000Research, vol. 12, p. 485, 2023.

V. Gerasimenko, “Digital Ethics of Artificial Intelligence Application in Business: Awareness of New Opportunities and Risks,” Sci. Res. Fac. Econ. Electron. J., vol. 15, pp. 37–54, Apr. 2023, doi: 10.38050/2078-3809-2023-15-1-37-54.

N. K. S. KUMAR, “End user privacy protection system and method thereof.” Google Patents, Dec. 08, 2022.

H. Wang, “Short Video Users’ Personal Privacy Leakage and Protection Measures,” in Intelligent Computing Theories and Application: 17th International Conference, ICIC 2021, Shenzhen, China, August 12–15, 2021, Proceedings, Part I 17, Springer, 2021, pp. 317–326.

M. Rodriguez-Garcia, M. Batet, D. Sánchez, and A. Viejo, “Privacy protection of user profiles in online search via semantic randomization,” Knowl. Inf. Syst., vol. 63, pp. 2455–2477, 2021.

Z. Qu, Y. Tang, G. Muhammad, and P. Tiwari, “Privacy protection in intelligent vehicle networking: A novel federated learning algorithm based on information fusion,” Inf. Fusion, vol. 98, p. 101824, 2023.

H. H. H. Aldboush and M. Ferdous, “Building Trust in Fintech: An Analysis of Ethical and Privacy Considerations in the Intersection of Big Data, AI, and Customer Trust,” Int. J. Financ. Stud., vol. 11, no. 3, p. 90, 2023.

C. U. Ingole, M. Bandela, D. Tanna, S. K. Solanki, P. Dhotre, and R. Patil, “Privacy Awareness and Online Behavior of Indian Users: An Analytical Study,” 2023.

J. Sah and S. Jun, “The role of consumers’ privacy awareness in the privacy calculus for iot services,” Int. J. Human–Computer Interact., pp. 1–12, 2023.

D. Susanto, “Protection of Personal Data in Business: An Overview of the Perspective of Business Ethics and Its Implications for Regulatory Compliance,” Indones. J. Contemp. Multidiscip. Res., vol. 2, no. 2, pp. 109–120, 2023.

Downloads

Published

2024-03-29

How to Cite

Pratomo, A. B., Santoso, J., Nugroho, A., Fildansyah, R., & Vandika, A. Y. (2024). Analysis of Data Privacy Policy, Data Processing Ethics, and Technology Ethics Awareness on User Privacy Protection in West Java. West Science Social and Humanities Studies, 2(03), 412–422. https://doi.org/10.58812/wsshs.v2i03.715