YOUTH CYBER-ETHIC: INDONESIAN POLICY FRAMEWORK AND OCIOLOGICAL APPROACH
Ciber-ética juvenil: marco político y enfoque sociológico en Indonesia.
Abstract
This study aims to examine the Indonesian system to protect youth and children from the potentially harmful content available via Information Communication and Technology (ICTs) through a national policy framework and sociological approach. The approach used in this study was a normative juridical approach. The results showed that Indonesia's regulation of child protection in cyberspace had not been carried out optimally according to the basic guidelines of international commitments related to child protection.
References
ÁLVAREZ-GARCÍA, D, NÚÑEZ, J, C, GONZÁLEZ-CASTRO, P, RODRÍGUEZ, C & CEREZO, R (2019). “The effect of parental control on cyber-victimization in adolescence: the mediating role of impulsivity and high-risk behaviors”. Frontiers in psychology, 10, pp. 11-29.
AMARINI, I (2018). “Pencegahan dampak negatif perkembangan teknologi informasi terhadap pengguna internet”. Kosmik Hukum, 18(1), pp. 35-62.
AWAN, J, H, MEMON, S, KHAN, R, A, NOONARI, A, Q, HUSSAIN, Z & USMAN, M (2017). “Security strategies to overcome cyber measures, factors and barriers”. Eng. Sci. Technol. Int. Res. J, 1(1), pp. 51-58.
AWAN, J, H, MEMON, S, PATHAN, S, M, USMAN, M, KHAN, R, A, ABBASI, S, ... & HUSSAIN, Z (2017). “A user friendly security framework for the protection of confidential information”. Int. J. Comput. Sci. Netw. Secur, 17(04), pp. 215-223.
AZAD, M, M, MAZID, K, N & SHARMIN, S, S (2017). “Cyber crime problem areas, legal areas and the cyber crime law”. International Journal of New Technology and Research, 3(05), pp. 11-25.
BALFE, M, GALLAGHER, B, MASSON, H, BALFE, S, BRUGHA, R & HACKETT, S (2015). “Internet child sex offenders' concerns about online security and their use of identity protection technologies: a review’. Child abuse review, 24(6), pp. 427-439.
DJANGGIH, H (2018). “The phenomenon of cyber crimes which impact children as victims in indonesia”. Yuridika, 33(2), pp. 212-231.
DJANGGIH, H, THALIB, H, BAHARUDDIN, H, QAMAR, N & AHMAR, A, S (2018). “The effectiveness of law enforcement on child protection for cybercrime victims in Indonesia”. In Journal of Physics: Conference Series, 1028(1), pp. 71-92.
FITRIANI, R (2015). “Perlindungan hukum terhadap anak akibatpenyebarluasan pornografi di internetdan media sosial”. Jurnal Hukum Samudra Keadilan, 10(2), pp. 228-240.
GALLAGHER, B (2016). “The role of digital technology in child protection: still helping and harming?”. Child abuse review, 25(5), pp. 327-331.
KWET, M (2019). “Digital colonialism: US empire and the new imperialism in the global south”. Race & Class, 60(4), pp. 3-26.
LAURENSIUS, S, SITUNGKIR, D, PUTRI, R & FAUZI, R (2018). “Cyber Bullying Against Children In Indonesia”. In International Conference on Social Sciences, Humanities, Economics and Law. 41(3), pp. 21-43.
MUHAMMAD, H (2020). “Efforts to overcome cyber crime actions in Indonesia”. International Journal of Psychosocial Rehabilitation, 24(03), pp. 1761-1768. (Muhammad: 2020, pp. 1761-1768)
NCUBE, L, S & DUBE, L (2016). “Cyberbullying a desecration of information ethics”. Journal of Information, Communication and Ethics in Society, 12(1), pp. 12-37.
PINTO, R, Á (2018). “Digital sovereignty or digital colonialism?” Sur International Journal on Human Rights, 15(27), pp. 15-27.
SAHAY, S, K, SHARMA, A & RATHORE, H (2020). “Evolution of malware and its detection techniques”. In Information and Communication Technology for Sustainable Development, 12, pp. 139-150.
VALE, A, PEREIRA, F, GONÇALVES, M & MATOS, M (2018). “Cyber-aggression in adolescence and internet parenting styles: A study with victims, perpetrators and victim-perpetrators”. Children and Youth Services Review, 93, pp. 88-99.
WEIR, G, R, TOOLAN, F & SMEED, D (2011). “The threats of social networking: Old wine in new bottles?”. Information security technical report, 16(2), pp. 38-43.
WURTELE, S, K & KENNY, M, C (2016). “Technology‐related sexual solicitation of adolescents: A review of prevention efforts”. Child Abuse Review, 25(5), pp. 332-344.