##plugins.themes.bootstrap3.article.main##

Marcella D Tambunan
Candra Tandi Reinhard Siagian
Habib Muharry yusdartono

Abstract

The use of digital gadgets in daily life has been ingrained in the lives of children, even toddlers, as information and communication technology progresses. This age group faces serious hazards associated to cyber vulnerability even while simple access to technology presents chances for learning and cognitive growth.Thus, this study is doing to collect the report about all threads already happens in Indonesia. The strategy classified into three approach: person (parents who have responsibility for the children), technology security (digital product itself), and regulation addressed to a more effective mitigation strategies in addressing cyber vulnerability among the children of Indonesia.

##plugins.themes.bootstrap3.article.details##

How to Cite
Tambunan, M. D., Siagian, C. T. R., & yusdartono, H. M. (2024). Evaluating Cybersecurity Threats of the Increasing of using Gadget by the Children in Indonesia: An Analysis and Protection Strategies. Instal : Jurnal Komputer, 16(05), 9–16. https://doi.org/10.54209/jurnalinstall.v16i05.297
References
[1] “Online knowledge and practice of children in Indonesia: A baseline study 2023 | UNICEF Indonesia.” Accessed: Oct. 14, 2024. [Online]. Available: https://www.unicef.org/indonesia/child protection/reports/online-knowledge-and-practice-children-indonesia baseline-study-2023
[2] B. P. S. Indonesia, “Persentase Penduduk Usia 5 Tahun ke Atas yang Pernah Mengakses Internet dalam 3 Bulan Terakhir Menurut Kelompok Umur - Tabel Statistik.” Accessed: Oct. 14, 2024. [Online]. Available: https://www.bps.go.id/id/statistics table/2/ODQwIzI=/persentase-penduduk-usia-5-tahun-ke-atas-yang pernah-mengakses-internet-dalam-3-bulan-terakhir-menurut-kelompok umur.html
[3] “Understanding vulnerabilities.” Accessed: Oct. 15, 2024. [Online]. Available: https://www.ncsc.gov.uk/collection/vulnerability management/understanding-vulnerabilities
[4] “Coronavirus Disease (COVID-19) and Its Implications for Protecting Children Online | UNICEF.” Accessed: Oct. 14, 2024. [Online]. Available: https://www.unicef.org/documents/covid-19-and-implications protecting-children-online
[5] A. Aptika, “Pentingnya Pelindungan Data Pribadi di Era Digital,” Ditjen Aptika. Accessed: Oct. 14, 2024. [Online]. Available: https://aptika.kominfo.go.id/2021/10/pentingnya-pelindungan-data-pribadi di-era-digital/
[6] R. Isus, K. Kolesnikova, I. Khlevna, T. Oleksandr, and K. Liubov, “Development of a model of personal data protection in the context of digitalization of the educational sphere using information technology tools,” Procedia Comput. Sci., vol. 231, pp. 347–352, Jan. 2024, doi: 10.1016/j.procs.2023.12.215.
[7] E. Rosmaini, T. Kusumasari, M. Lubis, and A. Lubis, “Study to the current protection of personal data in the educational sector in Indonesia,” J. Phys. Conf. Ser., vol. 978, p. 012037, Mar. 2018, doi: 10.1088/1742-6596/978/1/012037.
[8] “UU No. 11 Tahun 2008,” Database Peraturan | JDIH BPK. Accessed: Oct. 14, 2024. [Online]. Available: http://peraturan.bpk.go.id/Details/37589/uu-no-11-tahun-2008
[9] “About ITU,” ITU. Accessed: Oct. 14, 2024. [Online]. Available: https://www.itu.int:443/en/about/Pages/default.aspx [10] “Guidelines for industry on online child protection | UNICEF.” Accessed: Oct. 14, 2024. [Online]. Available: https://www.unicef.org/documents/guidelines-industry-online-child protection
[11] W. Stallings, Cryptography and network security: principles and practice, Seventh edition, Global edition. Boston Columbus Indianapolis New York San Francisco Hoboken Amsterdam Cape Town Dubai London Madrid Milan Munich Paris Montreal Toronto Delhi Mexico City Sao Paulo Sydney Hong Kong Seoul Singapore Taipei Tokyo: Pearson, 2017.
[12] A. Arizal, J. Sidabutar, and N. Yulianti, Kriptografi: Teknik Keamanan Data. Medan: Yayasan Kita Menulis, 2022.
[13] B. Rahul and K. Kuppusamy, “Efficiency Analysis of Cryptographic Algorithms for Image Data Security at Cloud Environment,” IETE J. Res., vol. 69, pp. 1–12, Oct. 2021, doi: 10.1080/03772063.2021.1990141.
[14] J. Wang and Z. A. Kissel, “Data Encryption Algorithms,” in Introduction to Network Security: Theory and Practice, Wiley, 2015, pp. 45–92. doi: 10.1002/9781119113102.ch2.
[15] “Aturan Perlindungan Anak di Internet Diusulkan, Target Rampung Juli,” teknologi. Accessed: Oct. 14, 2024. [Online]. Available: https://www.cnnindonesia.com/teknologi/20240420055324-192- 1088331/aturan-perlindungan-anak-di-internet-diusulkan-target-rampung juli

Author Biographies

Candra Tandi Reinhard Siagian, Institut Agama Kristen Negeri Tarutung

Prodi Pastoral Konseling Jurusan Filsafat

Habib Muharry yusdartono, Universitas Malikussaleh

Prodi Teknik Elektro