Islamic-Based Digital Ethics: The Phenomenon of Online Consumer Data Security

Afriyan Arya Saputra, Muhammad Iqbal Fasa, Diana Ambarwati

Abstract


This paper seeks to explain the problem of widespread consumer data theft and the significance of online consumer data privacy in a review of Islamic values-based digital ethics. This research employs a qualitative approach by reviewing a variety of books, journals, papers, and other reputable sources, which are then examined using content analytic tools. The findings of this research indicate that first and foremost, effective cybersecurity will secure customer data. Second, ethical conduct derived from Islamic beliefs will be able to deter criminal activity and data breaches against consumers. Data privacy is a fundamental right that must be maintained collectively, according to Islam. The key to combating crime and breaches in the digital environment is hence the precautionary principle of stakeholders.

==========================================================================================================

ABSTRAK – Etika Digital Berbasis Islam: Fenomena Keamanan Data Konsumen Online. Penelitian ini bertujuan untuk menjelaskan fenomena maraknya pencurian data konsumen serta melihat posisi penting privasi data konsumen online dalam tinjauan etika digital berbasis nilai Islam. Penelitian ini menggunakan metode kualitatif, dengan menelaah berbagai literatur baik buku, jurnal, laporan dan sumber reliable lainnya yang kemudian dianalisis menggunakan teknik content analysis. Hasil penelitian ini menemukan bahwa, pertama, keamanan siber yang baik akan mampu melindungi data konsumen. kedua, perilaku etis yang bersumber dari nilai Islam akan mampu mencegah kejahatan dan pelanggaran data konsumen. Ketiga, dalam Islam data privasi merupakan hak dasar yang harus dihormati secara bersama-sama. Untuk itu prinsip kehati-hatian daripara stakeholder menjadi kunci melawan kajahatan dan pelanggaran diruang digital.


Keywords


Cyber Security, Digital Space, Digital Ethics, Islamic Value

Full Text:

DOWNLOAD PDF

References


Ahmad, K., Uluyol, B., & Altwijry, O. (2021). Contrast in Ethics , Morality , Justice , and Behavior : Some Reflections on Business. Multidisciplinary Approaches to Ethics in the Digital Era, March, 292–305. https://doi.org/10.4018/978-1-7998-4117-3.ch016

Akmal, R., Musa, A., & Ibrahim, A. (2020). Pengaruh Religiusitas terhadap Perilaku Etika Bisnis Islam Pedagang Pasar Tradisional di Kota Banda Aceh. Journal of Sharia Economics, 1(1), 1-21.

Amatullah, N., Rosadi, S. D., & Handayani, T. (2020). Perlindungan Konsumen dalam Transaksi Direct Carrier Billing Melalui Keamanan Siber. Syiah Kuala Law Journal, 4(3), 323–337. https://doi.org/10.24815/sklj.v4i3.18967

APJII, T. (2021). Buletin APJII. APJII. https://apjii.or.id/downfile/file/BULETINAPJIIEDISI84April2021.pdf

Asad, M. (2017a). The Message of The Quran: Tafsir Al-Quran Bagi Orang-orang yang Berpikir (A. Muhammad (ed.); Vol. 2). PT Mizan Pustaka.

Asad, M. (2017b). The Message of The Quran: Tafsir Al-Quran Bagi Orang-orang yang Berpikir (A. Muhammad (ed.); Vol. 3). PT Mizan Pustaka.

Branch, J. (2021). What’s in a Name? Metaphors and Cybersecurity. International Organization, 75(1), 39–70. https://doi.org/10.1017/S002081832000051X

Peraturan Badan Siber dan Sandi Negara Nomor 8, (2020). https://peraturan.bpk.go.id/Home/Download/167483/Peraturan BSSN Nomor 8 Tahun 2020.pdf

Burgoon, J. K. (1982). Privacy and Communication. Annals of the International Communication Association, 6(1), 206–249. https://doi.org/10.1080/23808985.1982.11678499

Chaudhary, M. Y. (2020). Initial Considerations for Islamic Digital Ethics. Philosophy and Technology, 33(4), 639–657. https://doi.org/10.1007/s13347-020-00418-3

Choiriyati, W., & Windarsih, A. (2019). Etika Media Dalam Kultur New Technology ( Mengkaji Etika Internet Versus Undang-Undang Informasi Dan Transaksi Elektronik ) Media Ethics in New Technology Culture ( Reviewing the Internet Ethics Versus the Information and Electronic Transaction Act ). Masyarakat & Budaya, 21(2), 247–262.

Choo, K. K. R. (2011). The cyber threat landscape: Challenges and future research directions. Computers and Security, 30(8), 719–731. https://doi.org/10.1016/j.cose.2011.08.004

Corallo, A., Lazoi, M., Lezzi, M., & Pontrandolfo, P. (2021). Cybersecurity Challenges for Manufacturing Systems 4.0: Assessment of the Business Impact Level. IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT. https://doi.org/10.1109/TEM.2021.3084687

Craigen, D., Diakun-Thibault, N., & Purse, R. (2014). Defining Cybersecurity. Technology Innovation Management Review, 4(10), 13–21. https://doi.org/10.22215/timreview835

Creswell, J. W. (2014). Research design : qualitative, quantitative, and mixed methods approaches (4th ed). SAGE Publications, Inc.

Databoks. (2020). Bocornya Puluhan Juta Data Pengguna E-Commerce Indonesia. https://databoks.katadata.co.id/datapublish/2020/05/12/bocornya-puluhan-juta-data-pengguna-e-commerce-indonesia

Dawson, M., Bacius, R., Gouveia, L. B., & Vassilakos, A. (2021). Understanding the Challenge of Cybersecurity in Critical Infrastructure Sectors. Land Forces Academy Review, 26(1), 69–75. https://doi.org/10.2478/raft-2021-0011

de Bruijn, H., & Janssen, M. (2017). Building Cybersecurity Awareness: The need for evidence-based framing strategies. Government Information Quarterly, 34(1), 1–7. https://doi.org/10.1016/j.giq.2017.02.007

Desy Komalawati, M.R, M. D., & Kartika, R. D. (2021). Kejutan puluhan miliar tokopedia ditengah kasus kebocoran data. Jurnal Syntax Admiration, 2(1), 49–56. https://doi.org/https://doi.org/10.46799/jsa.v2i1.167

Diana Ambarwati. (2013). Etika Bisnis Yusuf Al-Qaradhawi (Upaya Membangun Kesadaran Bisnis Beretika). Adzkiya: Jurnal Hukum Dan Ekonomi Syariah.

Dixit, P., & Silakari, S. (2021). Deep Learning Algorithms for Cybersecurity Applications: A Technological and Status Review. Computer Science Review, 39. https://doi.org/https://doi.org/10.1016/j.cosrev.2020.100317

Djenna, A., Harous, S., & Saidouni, D. E. (2021). Internet of things meet internet of threats: New concern cyber security issues of critical cyber infrastructure. Applied Sciences (Switzerland), 11(10). https://doi.org/10.3390/app11104580

Ebert, N., Ackermann, K. A., & Heinrich, P. (2020). Does Context in Privacy Communication Really Matter? A- A Survey on Consumer Concerns and Preferences. Conference on Human Factors in Computing Systems - Proceedings, 1–11. https://doi.org/10.1145/3313831.3376575

Egloff, F. J., & Cavelty, M. D. (2021). Attribution and Knowledge Creation Assemblages in Cybersecurity Politics. Journal of Cybersecurity, 00, 1–12. https://doi.org/10.1093/cybsec/tyab002

Faisal, A. A., Nisa’, B. S., & Ibrahim, J. (2013). Mitigating privacy issues on Facebook by implementing information security awareness with Islamic perspectives. 2013 5th International Conference on Information and Communication Technology for the Muslim World, ICT4M 2013. https://doi.org/10.1109/ICT4M.2013.6518896

Floridi, L. (2016). On Human Dignity as a Foundation for the Right to Privacy. Philosophy & Technology, 307–312. https://doi.org/10.1007/s13347-016-0220-8

Floridi, L. (2018). Soft ethics, the governance of the digital and the General Data Protection Regulation. Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences, 376(2133). https://doi.org/10.1098/rsta.2018.0081

Hardiman, F. B. (2018). Manusia Dalam Prahara Revolusi Digital. Diskursus - Jurnal Filsafat Dan Teologi Stf Driyarkara, 17(2), 177–192. https://doi.org/10.36383/diskursus.v17i2.252

Herdiana, Y., Munawar, Z., & Putri, N. I. (2021). Mitigasi Ancaman Resiko Keamanan Siber. Jurnal ICT : Information Communication & Technology, 21(1), 42–52. https://ejournal.ikmi.ac.id/index.php/jict-ikmi/article/view/305/pdf

Hsieh, H.-F., & Shannon, S. E. (2005). Three Approaches to Qualitative Content Analysis. Qualitative Health Research, 15(9), 1277–1288. https://doi.org/10.1177/1049732305276687

Ibrahim, A., & Kamri, N. A. (2013, 27-28 November). Measuring the Islamic Work Ethics: An Alternative Approach. Paper presented at the International Convention on Islamic Management, Kuala Lumpur, Malaysia.

Ibrahim, A., & Kamri, N. A. (2016). The Commitment to Islamic Work Ethics among Islamic Banking’s Employees in Aceh Shariah Journal, 24(1).

Ibrahim, A., & Kamri, N. A. (2017). The Ethical Practices of Islamic Banking: An Analysis from Customer Satisfaction Perspective. MIQOT: Jurnal Ilmu-ilmu Keislaman, 41(1).

Imtiaz, S., Ali, S. H., & Kim, D. J. (2020). E-Commerce Growth in Pakistan: Privacy, Security, and Trust as Potential Issues. Culinary Science & Hospitality Research, 26(2), 10–18. https://doi.org/10.20878/cshr.2020.26.2.002

Kamri, N. A., Ramlan, S. F., & Ibrahim, A. (2014). Qur’anic Work Ethics. Journal of Usuluddin, 40(-), 135-172.

KBBI. (2020). Kamus Besar Bahasa Indonesia (KBBI) Kamus versi online/daring. Kemendikbud.

Kusumastuti, F., Astuti, S. I., Astuti, Y. D., Birowo, M. A., Hartanti, L. E. P., Amanda, N. M. R., & Kurnia, N. (2021). Etis Bermedia Digital. Kementerian Komunikasi dan Informatika. http://literasidigital.id/books/modul-etis-bermedia-digital/

Lee, I. (2021). Cybersecurity: Risk management framework and investment cost analysis. Business Horizons, 64(5), 659–671. https://doi.org/10.1016/j.bushor.2021.02.022

Luke, A. (2018). Digital Ethics Now. Language and Literacy, 20(3), 185–198. https://doi.org/10.20360/langandlit29416

Mago, N. (2014). Intelligent Cyber Defense System (ICDS): Hybrid Approach To Detect And Defense Against Cyber Crime. Apeejay Journal of Computer Science And Applications, 2, 54–60. https://acfa.apeejay.edu/docs/volumes/journal-2014/paper-09.pdf

Mohamed, H., & Ali, H. (2020). Finding Solutions to Cybersecurity Challenges in the Digital Economy. IGI Global, 80–96. https://doi.org/10.4018/978-1-7998-4390-0.ch005

Mujeeb-ur-Rehman, Lakhan, A., Hussain, Z., Khoso, F. H., & Arain, A. A. (2021). Cyber Security Intelligence and Ethereum Blockchain Technology for E-commerce. International Journal of Emerging Trends in Engineering Research, 9(7). https://doi.org/https://doi.org/10.30534/ijeter/2021/21972021

Mylrea, M., Gourisetti, S. N. G., & Nicholls, A. (2018). An introduction to buildings cybersecurity framework. 2017 IEEE Symposium Series on Computational Intelligence, SSCI 2017 - Proceedings, 2018-Janua, 1–7. https://doi.org/10.1109/SSCI.2017.8285228

Nafi’ah, R. (2020). Pelanggaran Data Dan Pencurian Identitas Pada E-Commerce. Cyber Security Dan Forensik Digital, 3(1), 7–13. https://doi.org/10.14421/csecurity.2020.3.1.1980

Naseer, H., Maynard, S. B., & Desouza, K. C. (2021). Demystifying analytical information processing capability: The case of cybersecurity incident response. Decision Support Systems, 143(December 2020), 113476. https://doi.org/10.1016/j.dss.2020.113476

Norwawi, N. M., Alwi, N. H. M., Ismail, R., Wahid, F., & Alkaenay, N. M. (2014). Promoting Islamic Ethics on Privacy in Digital Social Network for User Data Protection and Trust. ʻUlūm Islāmiyyah Journal, 13(Special Edition), 115–127. https://doi.org/10.12816/0012632

Pilliang, Y. (2012). Masyarakat Informasi dan Digital: Teknologi Informasi dan Perubahan Sosial. Jurnal Sosioteknologi, 11(27), 143–155.

Rachman, M. F., & Susan, N. (2021). Modal Sosial Masyarakat Digital dalam Diskursus Keamanan Siber. Jurnal Indonesia Maju, 1, 1–11. https://www.jurnalim.id/index.php/jp/article/view/6

Rahman, N. A. A., Sairi, I. H., Zizi, N. A. M., & Khalid, F. (2020). The importance of cybersecurity education in school. International Journal of Information and Education Technology, 10(5), 378–382. https://doi.org/10.18178/ijiet.2020.10.5.1393

Rahmawati, I. (2017). Analisis manajemen risiko ancaman kejahatan siber dalam peningkatan cyber defense. Jurnal Pertahanan & Bela Negara, Vol.7(No.2), 51–66.

Rebovich, D. (2021). The Changing Face of Financial Crime: New Technologies, New Offenders, New Victims, and New Strategies for Prevention and Control. In Victims and Offenders. https://doi.org/10.1080/15564886.2021.1876196

Sarker, I. H., Kayes, A. S. M., Badsha, S., Alqahtani, H., Watters, P., & Ng, A. (2020). Cybersecurity data science: an overview from machine learning perspective. Journal of Big Data, 7(1), 41. https://doi.org/10.1186/s40537-020-00318-5

Schoentgen, A., & Wilkinson, L. (2021). Ethical issues in digital technologies. International Telecommunications Society (ITS), 23. http://hdl.handle.net/10419/238052

Sharma, S., & Kumar Sharma, V. (2020). Cyber Crime analysis on Social Media. BSSS Journal of Computer. https://doi.org/10.51767/jc1104

Siber, P. (2020). Statistik Jumlah Laporan Polisi yang dibuat masyarakat. https://www.patrolisiber.id/statistic

Umuri, K., & Ibrahim, A. (2021). Analisis Perilaku Pedagang Kaki Lima Menurut Tinjauan Etika Bisnis Islam. Jurnal Iqtisaduna, 6(2), 187-197. https://doi.org/10.24252/iqtisaduna.v6i2.17511

UU ITE. (2008). Undang-Undang Republik Indonesia Nomor 11 Tahun 2008 Tentang Informasi Dan Transaksi Elektronik. Cell.

Véliz, C. (2019). Three things digital ethics can learn from medical ethics. Nature Electronics, 2(8), 316–318. https://doi.org/10.1038/s41928-019-0294-2

Voigt, P., & von dem Bussche, A. (2017). Enforcement and Fines Under the GDPR. In The EU General Data Protection Regulation (GDPR). https://doi.org/10.1007/978-3-319-57959-7_7

Wheatley, S., Maillart, T., & Sornette, D. (2016). The extreme risk of personal data breaches and the erosion of privacy. European Physical Journal B. https://doi.org/10.1140/epjb/e2015-60754-4

Widiantari, M. M. (2021). Urgensi Cyber Law dalam Kehidupan Masyarakat Indonesia Di Era Digital. Proceeding of Conference on Law and Social Studies.




DOI: http://dx.doi.org/10.22373/share.v11i1.11167

Refbacks

  • There are currently no refbacks.




Copyright (c) 2022 Afriyan Arya Saputra, Muhammad Iqbal Fasa, Diana Ambarwati

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.