Islamic-Based Digital Ethics: The Phenomenon of Online Consumer Data Security
Abstract
This paper seeks to explain the problem of widespread consumer data theft and the significance of online consumer data privacy in a review of Islamic values-based digital ethics. This research employs a qualitative approach by reviewing a variety of books, journals, papers, and other reputable sources, which are then examined using content analytic tools. The findings of this research indicate that first and foremost, effective cybersecurity will secure customer data. Second, ethical conduct derived from Islamic beliefs will be able to deter criminal activity and data breaches against consumers. Data privacy is a fundamental right that must be maintained collectively, according to Islam. The key to combating crime and breaches in the digital environment is hence the precautionary principle of stakeholders.
==========================================================================================================
ABSTRAK – Etika Digital Berbasis Islam: Fenomena Keamanan Data Konsumen Online. Penelitian ini bertujuan untuk menjelaskan fenomena maraknya pencurian data konsumen serta melihat posisi penting privasi data konsumen online dalam tinjauan etika digital berbasis nilai Islam. Penelitian ini menggunakan metode kualitatif, dengan menelaah berbagai literatur baik buku, jurnal, laporan dan sumber reliable lainnya yang kemudian dianalisis menggunakan teknik content analysis. Hasil penelitian ini menemukan bahwa, pertama, keamanan siber yang baik akan mampu melindungi data konsumen. kedua, perilaku etis yang bersumber dari nilai Islam akan mampu mencegah kejahatan dan pelanggaran data konsumen. Ketiga, dalam Islam data privasi merupakan hak dasar yang harus dihormati secara bersama-sama. Untuk itu prinsip kehati-hatian daripara stakeholder menjadi kunci melawan kajahatan dan pelanggaran diruang digital.
Keywords
Full Text:
DOWNLOAD PDFReferences
Ahmad, K., Uluyol, B., & Altwijry, O. (2021). Contrast in Ethics , Morality , Justice , and Behavior : Some Reflections on Business. Multidisciplinary Approaches to Ethics in the Digital Era, March, 292–305. https://doi.org/10.4018/978-1-7998-4117-3.ch016
Akmal, R., Musa, A., & Ibrahim, A. (2020). Pengaruh Religiusitas terhadap Perilaku Etika Bisnis Islam Pedagang Pasar Tradisional di Kota Banda Aceh. Journal of Sharia Economics, 1(1), 1-21.
Amatullah, N., Rosadi, S. D., & Handayani, T. (2020). Perlindungan Konsumen dalam Transaksi Direct Carrier Billing Melalui Keamanan Siber. Syiah Kuala Law Journal, 4(3), 323–337. https://doi.org/10.24815/sklj.v4i3.18967
APJII, T. (2021). Buletin APJII. APJII. https://apjii.or.id/downfile/file/BULETINAPJIIEDISI84April2021.pdf
Asad, M. (2017a). The Message of The Quran: Tafsir Al-Quran Bagi Orang-orang yang Berpikir (A. Muhammad (ed.); Vol. 2). PT Mizan Pustaka.
Asad, M. (2017b). The Message of The Quran: Tafsir Al-Quran Bagi Orang-orang yang Berpikir (A. Muhammad (ed.); Vol. 3). PT Mizan Pustaka.
Branch, J. (2021). What’s in a Name? Metaphors and Cybersecurity. International Organization, 75(1), 39–70. https://doi.org/10.1017/S002081832000051X
Peraturan Badan Siber dan Sandi Negara Nomor 8, (2020). https://peraturan.bpk.go.id/Home/Download/167483/Peraturan BSSN Nomor 8 Tahun 2020.pdf
Burgoon, J. K. (1982). Privacy and Communication. Annals of the International Communication Association, 6(1), 206–249. https://doi.org/10.1080/23808985.1982.11678499
Chaudhary, M. Y. (2020). Initial Considerations for Islamic Digital Ethics. Philosophy and Technology, 33(4), 639–657. https://doi.org/10.1007/s13347-020-00418-3
Choiriyati, W., & Windarsih, A. (2019). Etika Media Dalam Kultur New Technology ( Mengkaji Etika Internet Versus Undang-Undang Informasi Dan Transaksi Elektronik ) Media Ethics in New Technology Culture ( Reviewing the Internet Ethics Versus the Information and Electronic Transaction Act ). Masyarakat & Budaya, 21(2), 247–262.
Choo, K. K. R. (2011). The cyber threat landscape: Challenges and future research directions. Computers and Security, 30(8), 719–731. https://doi.org/10.1016/j.cose.2011.08.004
Corallo, A., Lazoi, M., Lezzi, M., & Pontrandolfo, P. (2021). Cybersecurity Challenges for Manufacturing Systems 4.0: Assessment of the Business Impact Level. IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT. https://doi.org/10.1109/TEM.2021.3084687
Craigen, D., Diakun-Thibault, N., & Purse, R. (2014). Defining Cybersecurity. Technology Innovation Management Review, 4(10), 13–21. https://doi.org/10.22215/timreview835
Creswell, J. W. (2014). Research design : qualitative, quantitative, and mixed methods approaches (4th ed). SAGE Publications, Inc.
Databoks. (2020). Bocornya Puluhan Juta Data Pengguna E-Commerce Indonesia. https://databoks.katadata.co.id/datapublish/2020/05/12/bocornya-puluhan-juta-data-pengguna-e-commerce-indonesia
Dawson, M., Bacius, R., Gouveia, L. B., & Vassilakos, A. (2021). Understanding the Challenge of Cybersecurity in Critical Infrastructure Sectors. Land Forces Academy Review, 26(1), 69–75. https://doi.org/10.2478/raft-2021-0011
de Bruijn, H., & Janssen, M. (2017). Building Cybersecurity Awareness: The need for evidence-based framing strategies. Government Information Quarterly, 34(1), 1–7. https://doi.org/10.1016/j.giq.2017.02.007
Desy Komalawati, M.R, M. D., & Kartika, R. D. (2021). Kejutan puluhan miliar tokopedia ditengah kasus kebocoran data. Jurnal Syntax Admiration, 2(1), 49–56. https://doi.org/https://doi.org/10.46799/jsa.v2i1.167
Diana Ambarwati. (2013). Etika Bisnis Yusuf Al-Qaradhawi (Upaya Membangun Kesadaran Bisnis Beretika). Adzkiya: Jurnal Hukum Dan Ekonomi Syariah.
Dixit, P., & Silakari, S. (2021). Deep Learning Algorithms for Cybersecurity Applications: A Technological and Status Review. Computer Science Review, 39. https://doi.org/https://doi.org/10.1016/j.cosrev.2020.100317
Djenna, A., Harous, S., & Saidouni, D. E. (2021). Internet of things meet internet of threats: New concern cyber security issues of critical cyber infrastructure. Applied Sciences (Switzerland), 11(10). https://doi.org/10.3390/app11104580
Ebert, N., Ackermann, K. A., & Heinrich, P. (2020). Does Context in Privacy Communication Really Matter? A- A Survey on Consumer Concerns and Preferences. Conference on Human Factors in Computing Systems - Proceedings, 1–11. https://doi.org/10.1145/3313831.3376575
Egloff, F. J., & Cavelty, M. D. (2021). Attribution and Knowledge Creation Assemblages in Cybersecurity Politics. Journal of Cybersecurity, 00, 1–12. https://doi.org/10.1093/cybsec/tyab002
Faisal, A. A., Nisa’, B. S., & Ibrahim, J. (2013). Mitigating privacy issues on Facebook by implementing information security awareness with Islamic perspectives. 2013 5th International Conference on Information and Communication Technology for the Muslim World, ICT4M 2013. https://doi.org/10.1109/ICT4M.2013.6518896
Floridi, L. (2016). On Human Dignity as a Foundation for the Right to Privacy. Philosophy & Technology, 307–312. https://doi.org/10.1007/s13347-016-0220-8
Floridi, L. (2018). Soft ethics, the governance of the digital and the General Data Protection Regulation. Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences, 376(2133). https://doi.org/10.1098/rsta.2018.0081
Hardiman, F. B. (2018). Manusia Dalam Prahara Revolusi Digital. Diskursus - Jurnal Filsafat Dan Teologi Stf Driyarkara, 17(2), 177–192. https://doi.org/10.36383/diskursus.v17i2.252
Herdiana, Y., Munawar, Z., & Putri, N. I. (2021). Mitigasi Ancaman Resiko Keamanan Siber. Jurnal ICT : Information Communication & Technology, 21(1), 42–52. https://ejournal.ikmi.ac.id/index.php/jict-ikmi/article/view/305/pdf
Hsieh, H.-F., & Shannon, S. E. (2005). Three Approaches to Qualitative Content Analysis. Qualitative Health Research, 15(9), 1277–1288. https://doi.org/10.1177/1049732305276687
Ibrahim, A., & Kamri, N. A. (2013, 27-28 November). Measuring the Islamic Work Ethics: An Alternative Approach. Paper presented at the International Convention on Islamic Management, Kuala Lumpur, Malaysia.
Ibrahim, A., & Kamri, N. A. (2016). The Commitment to Islamic Work Ethics among Islamic Banking’s Employees in Aceh Shariah Journal, 24(1).
Ibrahim, A., & Kamri, N. A. (2017). The Ethical Practices of Islamic Banking: An Analysis from Customer Satisfaction Perspective. MIQOT: Jurnal Ilmu-ilmu Keislaman, 41(1).
Imtiaz, S., Ali, S. H., & Kim, D. J. (2020). E-Commerce Growth in Pakistan: Privacy, Security, and Trust as Potential Issues. Culinary Science & Hospitality Research, 26(2), 10–18. https://doi.org/10.20878/cshr.2020.26.2.002
Kamri, N. A., Ramlan, S. F., & Ibrahim, A. (2014). Qur’anic Work Ethics. Journal of Usuluddin, 40(-), 135-172.
KBBI. (2020). Kamus Besar Bahasa Indonesia (KBBI) Kamus versi online/daring. Kemendikbud.
Kusumastuti, F., Astuti, S. I., Astuti, Y. D., Birowo, M. A., Hartanti, L. E. P., Amanda, N. M. R., & Kurnia, N. (2021). Etis Bermedia Digital. Kementerian Komunikasi dan Informatika. http://literasidigital.id/books/modul-etis-bermedia-digital/
Lee, I. (2021). Cybersecurity: Risk management framework and investment cost analysis. Business Horizons, 64(5), 659–671. https://doi.org/10.1016/j.bushor.2021.02.022
Luke, A. (2018). Digital Ethics Now. Language and Literacy, 20(3), 185–198. https://doi.org/10.20360/langandlit29416
Mago, N. (2014). Intelligent Cyber Defense System (ICDS): Hybrid Approach To Detect And Defense Against Cyber Crime. Apeejay Journal of Computer Science And Applications, 2, 54–60. https://acfa.apeejay.edu/docs/volumes/journal-2014/paper-09.pdf
Mohamed, H., & Ali, H. (2020). Finding Solutions to Cybersecurity Challenges in the Digital Economy. IGI Global, 80–96. https://doi.org/10.4018/978-1-7998-4390-0.ch005
Mujeeb-ur-Rehman, Lakhan, A., Hussain, Z., Khoso, F. H., & Arain, A. A. (2021). Cyber Security Intelligence and Ethereum Blockchain Technology for E-commerce. International Journal of Emerging Trends in Engineering Research, 9(7). https://doi.org/https://doi.org/10.30534/ijeter/2021/21972021
Mylrea, M., Gourisetti, S. N. G., & Nicholls, A. (2018). An introduction to buildings cybersecurity framework. 2017 IEEE Symposium Series on Computational Intelligence, SSCI 2017 - Proceedings, 2018-Janua, 1–7. https://doi.org/10.1109/SSCI.2017.8285228
Nafi’ah, R. (2020). Pelanggaran Data Dan Pencurian Identitas Pada E-Commerce. Cyber Security Dan Forensik Digital, 3(1), 7–13. https://doi.org/10.14421/csecurity.2020.3.1.1980
Naseer, H., Maynard, S. B., & Desouza, K. C. (2021). Demystifying analytical information processing capability: The case of cybersecurity incident response. Decision Support Systems, 143(December 2020), 113476. https://doi.org/10.1016/j.dss.2020.113476
Norwawi, N. M., Alwi, N. H. M., Ismail, R., Wahid, F., & Alkaenay, N. M. (2014). Promoting Islamic Ethics on Privacy in Digital Social Network for User Data Protection and Trust. ʻUlūm Islāmiyyah Journal, 13(Special Edition), 115–127. https://doi.org/10.12816/0012632
Pilliang, Y. (2012). Masyarakat Informasi dan Digital: Teknologi Informasi dan Perubahan Sosial. Jurnal Sosioteknologi, 11(27), 143–155.
Rachman, M. F., & Susan, N. (2021). Modal Sosial Masyarakat Digital dalam Diskursus Keamanan Siber. Jurnal Indonesia Maju, 1, 1–11. https://www.jurnalim.id/index.php/jp/article/view/6
Rahman, N. A. A., Sairi, I. H., Zizi, N. A. M., & Khalid, F. (2020). The importance of cybersecurity education in school. International Journal of Information and Education Technology, 10(5), 378–382. https://doi.org/10.18178/ijiet.2020.10.5.1393
Rahmawati, I. (2017). Analisis manajemen risiko ancaman kejahatan siber dalam peningkatan cyber defense. Jurnal Pertahanan & Bela Negara, Vol.7(No.2), 51–66.
Rebovich, D. (2021). The Changing Face of Financial Crime: New Technologies, New Offenders, New Victims, and New Strategies for Prevention and Control. In Victims and Offenders. https://doi.org/10.1080/15564886.2021.1876196
Sarker, I. H., Kayes, A. S. M., Badsha, S., Alqahtani, H., Watters, P., & Ng, A. (2020). Cybersecurity data science: an overview from machine learning perspective. Journal of Big Data, 7(1), 41. https://doi.org/10.1186/s40537-020-00318-5
Schoentgen, A., & Wilkinson, L. (2021). Ethical issues in digital technologies. International Telecommunications Society (ITS), 23. http://hdl.handle.net/10419/238052
Sharma, S., & Kumar Sharma, V. (2020). Cyber Crime analysis on Social Media. BSSS Journal of Computer. https://doi.org/10.51767/jc1104
Siber, P. (2020). Statistik Jumlah Laporan Polisi yang dibuat masyarakat. https://www.patrolisiber.id/statistic
Umuri, K., & Ibrahim, A. (2021). Analisis Perilaku Pedagang Kaki Lima Menurut Tinjauan Etika Bisnis Islam. Jurnal Iqtisaduna, 6(2), 187-197. https://doi.org/10.24252/iqtisaduna.v6i2.17511
UU ITE. (2008). Undang-Undang Republik Indonesia Nomor 11 Tahun 2008 Tentang Informasi Dan Transaksi Elektronik. Cell.
Véliz, C. (2019). Three things digital ethics can learn from medical ethics. Nature Electronics, 2(8), 316–318. https://doi.org/10.1038/s41928-019-0294-2
Voigt, P., & von dem Bussche, A. (2017). Enforcement and Fines Under the GDPR. In The EU General Data Protection Regulation (GDPR). https://doi.org/10.1007/978-3-319-57959-7_7
Wheatley, S., Maillart, T., & Sornette, D. (2016). The extreme risk of personal data breaches and the erosion of privacy. European Physical Journal B. https://doi.org/10.1140/epjb/e2015-60754-4
Widiantari, M. M. (2021). Urgensi Cyber Law dalam Kehidupan Masyarakat Indonesia Di Era Digital. Proceeding of Conference on Law and Social Studies.
DOI: http://dx.doi.org/10.22373/share.v11i1.11167
Refbacks
- There are currently no refbacks.
Copyright (c) 2022 Afriyan Arya Saputra, Muhammad Iqbal Fasa, Diana Ambarwati
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.