Transparency and Consent for the Use of Data Analytics in Indonesia
DOI:
https://doi.org/10.15575/adliya.v18i1.43758Keywords:
Personal Data Protection, Legal Framework, Data Analytics, Digital Economy, Transparency and ConsentAbstract
References
Abrams, Martin, John Abrams, Peter Cullen, and Lynn Goldstein. “Artificial Intelligence, Ethics, and Enhanced Data Stewardship.†IEEE Security and Privacy 17, no. 2 (2019): 17–30. https://doi.org/10.1109/MSEC.2018.2888778.
Alafaa, Princess. “Data Privacy and Data Protection: The Right of User’s and the Responsibility of Companies in the Digital World.†SSRN Electronic Journal, 2022, 1–12. https://doi.org/10.2139/ssrn.4005750.
Baik, Jeeyun (Sophia). “Data Privacy against Innovation or against Discrimination?: The Case of the California Consumer Privacy Act (CCPA).†Telematics and Informatics 52 (2020): 1–33. https://doi.org/10.1016/j.tele.2020.101431.
Bart, Rienties, Tom Olney, Mark Nichols, and Christothea Herodotou. “Effective Usage of Learning Analytics: What Do Practitioners Want and Where Should Distance Learning InBart, R., Olney, T., Nichols, M., & Herodotou, C. (2020). Effective Usage of Learning Analytics: What Do Practitioners Want and Where Should Distance Le.†Open Learning 35, no. 2 (2020): 178–95. https://doi.org/10.1080/02680513.2019.1690441.
Bellini, Valentina, Jonathan Montomoli, and Elena Bignami. “Poor Quality Data, Privacy, Lack of Certifications: The Lethal Triad of New Technologies in Intensive Care.†Intensive Care Medicine 47, no. 9 (2021): 1052–53. https://doi.org/10.1007/s00134-021-06473-4.
Bhandari, Vrinda, and Renuka Sane. “Protecting Citizens From the State Post Puttaswamy: Analysing the Privacy Implications of the Justice Srikrishna Committee Report and the Data Protection Bill, 2018.†Socio Legal Review 14, no. 2 (October 2018): 143–69.
Birnhack, Michael. “A Process-Based Approach to Informational Privacy and the Case of Big Medical Data.†Theoretical Inquiries in Law 20, no. 1 (2019): 257–90. https://doi.org/10.1515/til-2019-0009.
Bui, Duc, Yuan Yao, Kang G. Shin, Jong Min Choi, and Junbum Shin. “Consistency Analysis of Data-Usage Purposes in Mobile Apps.†In Proceedings of the ACM Conference on Computer and Communications Security, 2824–43, 2021. https://doi.org/10.1145/3460120.3484536.
Costa, Paulo, Ricardo Montenegro, Teresa Pereira, and Pedro Pinto. “The Security Challenges Emerging from the Technological Developments.†Mobile Networks and Applications 24, no. 6 (December 2019): 2032–37. https://doi.org/10.1007/s11036-018-01208-0.
Deepa, N., Quoc Viet Pham, Dinh C. Nguyen, Sweta Bhattacharya, B. Prabadevi, Thippa Reddy Gadekallu, Praveen Kumar Reddy Maddikunta, Fang Fang, and Pubudu N. Pathirana. “A Survey on Blockchain for Big Data: Approaches, Opportunities, and Future Directions.†Future Generation Computer Systems 131 (2022): 209–26. https://doi.org/10.1016/j.future.2022.01.017.
Disemadi, Hari Sutra. “Lenses of Legal Research: A Descriptive Essay on Legal Research Methodologies.†Journal of Judicial Review 24, no. 2 (2022): 289–304. https://doi.org/10.37253/jjr.v24i2.7280.
———. “Urgensi Regulasi Khusus Dan Pemanfaatan Artificial Intelligence Dalam Mewujudkan Perlindungan Data Pribadi Di Indonesia.†Jurnal Wawasan Yuridika 5, no. 2 (2021): 177–99. https://doi.org/10.25072/jwy.v5i2.460.
Economides, Nicholas, and Ioannis Lianos. “Restrictions On Privacy and Exploitation In The Digital Economy: A Market Failure Perspective.†Journal of Competition Law and Economics 17, no. 4 (2021): 765–847. https://doi.org/10.1093/joclec/nhab007.
Falchuk, Ben, Shoshana Loeb, and Ralph Neff. “The Social Metaverse: Battle for Privacy.†IEEE Technology and Society Magazine 37, no. 2 (2018): 52–61. https://doi.org/10.1109/MTS.2018.2826060.
Habrat, Dorota. “Legal Challenges of Digitalization and Automation in the Context of Industry 4.0.†In Procedia Manufacturing, 51:938–42, 2020. https://doi.org/10.1016/j.promfg.2020.10.132.
Islah, Khikmatul. “Peluang Dan Tantangan Pemanfaatan Teknologi Big Data Untuk Mengintegrasikan Pelayanan Publik Pemerintah.†Jurnal Reformasi Administrasi: Jurnal Ilmiah Untuk … 5, no. 1 (2018): 130–38.
Kreuter, Frauke, Rayid Ghani, and Julia Lane. “Change Through Data: A Data Analytics Training Program for Government Employees.†Harvard Data Science Review 1, no. 2 (2019): 1–24. https://doi.org/10.1162/99608f92.ed353ae3.
Kurtz, Christian, Martin Semmann, and Tilo Böhmann. “Privacy by Design to Comply with GDPR: A Review on Third-Party Data Processors.†In Americas Conference on Information Systems 2018: Digital Disruption, AMCIS 2018, 2018.
Liu, Yang, and Connor Greene. “The Dark Side of Big Data: Personal Privacy, Data Security, and Price Discrimination.†In Digital Transformation in Business and Society: Theory and Cases, 145–53, 2019. https://doi.org/10.1007/978-3-030-08277-2_9.
Livingstone, Sonia, Mariya Stoilova, and Rishita Nandagiri. “Data and Privacy Literacy: The Role of the School in Educating Children in a Datafied Society.†In Aufwachsen in Überwachten Umgebungen, 219–36, 2021. https://doi.org/10.5771/9783748921639-219.
Mariani, Marcello M., and Samuel Fosso Wamba. “Exploring How Consumer Goods Companies Innovate in the Digital Age: The Role of Big Data Analytics Companies.†Journal of Business Research 121 (2020): 338–52. https://doi.org/10.1016/j.jbusres.2020.09.012.
Merhi, Mohammad I., and Klajdi Bregu. “Effective and Efficient Usage of Big Data Analytics in Public Sector.†Transforming Government: People, Process and Policy 14, no. 4 (2020): 605–22. https://doi.org/10.1108/TG-08-2019-0083.
Mohan Rao P, Ram, S. Murali Krishna, and AP Siva Kumar. “Modern Privacy Threats and Privacy Preservation Techniques in Data Analytics.†In Factoring Ethics in Technology, Policy Making, Regulation and AI, 1–10, 2021. https://doi.org/10.5772/intechopen.99160.
Nam, Taewoo. “Understanding the Gap between Perceived Threats to and Preparedness for Cybersecurity.†Technology in Society 58 (August 2019): 1–10. https://doi.org/10.1016/j.techsoc.2019.03.005.
Nišević, Maja. “A Study on the Personal Data Processing and the UCPD Focused on Italy, Germany and the UK.†Maastricht Journal of European and Comparative Law 28, no. 1 (2021): 7–29. https://doi.org/10.1177/1023263X20961493.
Niu, Yanfang, Limeng Ying, Jie Yang, Mengqi Bao, and C. B. Sivaparthipan. “Organizational Business Intelligence and Decision Making Using Big Data Analytics.†Information Processing and Management 58, no. 6 (2021): 1–13. https://doi.org/10.1016/j.ipm.2021.102725.
Noor, Afif, and Dwi Wulandari. “Regulation of Sharia Information Technology-Based Peer-To-Peer Financing Services in POJK No. 10/POJK.05/2022.†ADLIYA: Jurnal Hukum Dan Kemanusiaan 17, no. 1 (March 2023): 1–18.
RamÃrez, Maricela, Lázaro RodrÃguez Ariza, MarÃa Elena Gómez Miranda, and Vartika. “The Disclosures of Information on Cybersecurity in Listed Companies in Latin America—Proposal for a Cybersecurity Disclosure Index.†Sustainability 14, no. 3 (January 2022): 1–23. https://doi.org/10.3390/su14031390.
Rehman, Arshia, Saeeda Naz, and Imran Razzak. “Leveraging Big Data Analytics in Healthcare Enhancement: Trends, Challenges and Opportunities.†In Multimedia Systems, 28:1339–71, 2022. https://doi.org/10.1007/s00530-020-00736-8.
Rupasinghe, Tharuka, Frada Burstein, and Carsten Rudolph. “Blockchain Based Dynamic Patient Consent: A Privacy-Preserving Data Acquisition Architecture for Clinical Data Analytics.†In 40th International Conference on Information Systems, ICIS 2019, 1–9, 2019.
Sadeghi Darvazeh, Saeid, Iman Raeesi Vanani, and Farzaneh Mansouri Musolu. “Big Data Analytics and Its Applications in Supply Chain Management.†In New Trends in the Use of Artificial Intelligence for the Industry 4.0, 1–26, 2020. https://doi.org/10.5772/intechopen.89426.
Setiawan, Yudy, and Anita Maharani. “Unboxing Employees Perspectives on Factors Affecting Their Compliance to Organizational Information Security Policies.†In SMARTCYBER 2021: Proceedings of 2nd International Conference on Smart Computing and Cyber Security, 182–93, 2022. https://doi.org/10.1007/978-981-16-9480-6_17.
Steinbuch, Robert, and Richard Peltz-Steele. “Ongoing Challenges In Researching Affirmative Action In Legal Education: Maximizing Public Welfare Through Transparency.†Texas Hispanic Journal of Law & Policy 25/26, no. 2/1 (2019): 57–84.
Sudarwanto, Al Sentot, and Dona Budi Budi Kharisma. “Comparative Study of Personal Data Protection Regulations in Indonesia, Hong Kong and Malaysia.†Journal of Financial Crime 29, no. 4 (2022): 1443–57. https://doi.org/10.1108/JFC-09-2021-0193.
Tan, David. “Metode Penelitian Hukum: Mengupas Dan Mengulas Metodologi Dalam Menyelenggarakan Penelitian Hukum.†NUSANTARA: Jurnal Ilmu Pengetahuan Sosial 8, no. 5 (2021): 2463–78.
Tsohou, Aggeliki, Emmanouil Magkos, Haralambos Mouratidis, George Chrysoloras, Luca Piras, Michalis Pavlidis, Julien Debussche, Marco Rotoloni, and Beatriz Gallego-Nicasio Crespo. “Privacy, Security, Legal and Technology Acceptance Elicited and Consolidated Requirements for a GDPR Compliance Platform.†Information and Computer Security 28, no. 4 (2020): 531–53. https://doi.org/10.1108/ICS-01-2020-0002.
Wachter, Sandra. “The GDPR and the Internet of Things: A Three-Step Transparency Model.†Law, Innovation and Technology 10, no. 2 (2018): 266–94. https://doi.org/10.1080/17579961.2018.1527479.
Widyadhana, Ayasha Nadira, Putu Wuri Handayani, and Pramitha Dwi Larasati. “Influence of Technological, Social, and Individual Factors on Security and Privacy Take-up of Digital Banking.†In 2022 International Conference on Information Management and Technology (ICIMTech), 33–38. IEEE, 2022. https://doi.org/10.1109/ICIMTech55957.2022.9915231.
Wu, Xuanting, and Yi Chen. “Research on Personal Data Privacy Security in the Era of Big Data.†Journal of Humanities and Social Sciences Studies 4, no. 3 (September 2022): 228–35. https://doi.org/10.32996/jhsss.2022.4.3.24.
Zhang, Xin, Lihong Cheng, Yugang Yu, and Yong Tan. “To Partner or Not to Partner? The Partnership Between Platforms and Data Brokers in Two-Sided Markets.†Information System Research Ahead-of-p, no. Ahead-of-print (August 2022): 1–39. https://doi.org/10.2139/ssrn.4189518.
Zhang, Xin, Wei Thoo Yue, and Yugang Yu. “Compete, Cooperate, or Coopete? The Strategic Role of Data Analytics in Targeted Advertising.†SSRN Electronic Journal, 2020. https://doi.org/10.2139/ssrn.3549642.
Zulfa, Mulki Indana, Rudy Hartanto, and Adhistya Erna Permanasari. “Caching Strategy for Web Application – a Systematic Literature Review.†International Journal of Web Information Systems 16, no. 5 (January 2020): 545–69. https://doi.org/10.1108/IJWIS-06-2020-0032.
Zwitter, Andrej, and Jilles Hazenberg. “Cyberspace, Blockchain, Governance: How Technology Implies Normative Power and Regulation.†In Blockchain, Law and Governance, 87–97, 2021. https://doi.org/10.1007/978-3-030-52722-8_6
Downloads
Published
How to Cite
Issue
Section
Citation Check
License
Copyright (c) 2024 Hari Sutra Disemadi, Rufinus Hotmaulana Hutauruk, Ninne Zahara Silviani, David Tan

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Authors who publish in ADLIYA: Jurnal Hukum dan Kemanusiaan agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Attribution-ShareAlike 4.0 International (CC BY-SA 4.0) License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).












