Nugroho et al., 2022 - Google Patents
Research synthesis of cybercrime laws and COVID-19 in Indonesia: lessons for developed and developing countriesNugroho et al., 2022
View HTML- Document ID
- 11682004289840861001
- Author
- Nugroho A
- Chandrawulan A
- Publication year
- Publication venue
- Security Journal
External Links
Snippet
The COVID-19 pandemic poses an unprecedented global challenge to the whole society. Previously, most of the physical activities were not conducted online and were not exposed to cybercrime. Thus, it necessitates paying attention to this emerging phenomenon and …
- 208000025721 COVID-19 0 title abstract description 59
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30634—Querying
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30386—Retrieval requests
- G06F17/30424—Query processing
- G06F17/30477—Query execution
- G06F17/30507—Applying rules; deductive queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/26—Government or public service
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/08—Insurance, e.g. risk analysis or pensions
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Terry | Existential challenges for healthcare data protection in the United States | |
| Nugroho et al. | Research synthesis of cybercrime laws and COVID-19 in Indonesia: lessons for developed and developing countries | |
| Aslam et al. | Getting smarter about smart cities: Improving data security and privacy through compliance | |
| Fischer | Federal laws relating to cybersecurity: overview and discussion of proposed revisions | |
| Fischer | Federal laws relating to cybersecurity: Overview of major issues, current laws, and proposed legislation | |
| TW202232919A (en) | Email certification system | |
| Richards et al. | African governments and the influence of corruption on the proliferation of cybercrime in Africa: wherein lies the rule of law? | |
| Saleem et al. | A survey of cybersecurity laws, regulations, and policies in technologically advanced nations: A case study of Pakistan to bridge the gap | |
| Zhu et al. | Systematic regulation of personal information rights in the era of big data | |
| Brown | The feasibility of transatlantic privacy-protective standards for surveillance | |
| Chigada | Towards an aligned South African national cybersecurity policy framework | |
| Isibor | Regulation of healthcare data security: Legal obligations in a digital age | |
| Warsinske et al. | The Official (ISC) 2 Guide to the CISSP CBK Reference | |
| Brown et al. | Public Information Management and E-Government: Policy and Issues: Policy and Issues | |
| Fischer | Federal laws relating to cybersecurity: discussion of proposed revisions | |
| Sturc et al. | Developing a system of indicators for clustering financial cybercrime | |
| DoP et al. | effect of data protection frameworks against cybercrimes on cyber security in Nigeria | |
| Wickham | Exploring data breaches and means to mitigate future occurrences in healthcare institutions: A content analysis | |
| Moid | Fighting Cyber Crimes Using Forensic Accounting: A Tool to Enhance Operational Efficiency. | |
| Kayser et al. | Identity theft: The importance of prosecuting on behalf of victims | |
| Bangsawan et al. | Personal Data Protection Policy during Covid-19 Pandemic Era | |
| Patil et al. | Securing financial systems through data sovereignty: a systematic review of approaches and regulations: A. Patil et al. | |
| Wodi | Data privacy and security: Fair information principles and data management strategies in a changing world | |
| Seng | Cybersecurity regulation—types, principles, and country deep dives in Asia | |
| Fitriyanti et al. | SECURING PERSONAL DATA IN E-KYC: VITAL FOR DIGITAL ECONOMY GROWTH |