[go: up one dir, main page]

Nugroho et al., 2022 - Google Patents

Research synthesis of cybercrime laws and COVID-19 in Indonesia: lessons for developed and developing countries

Nugroho et al., 2022

View HTML
Document ID
11682004289840861001
Author
Nugroho A
Chandrawulan A
Publication year
Publication venue
Security Journal

External Links

Snippet

The COVID-19 pandemic poses an unprecedented global challenge to the whole society. Previously, most of the physical activities were not conducted online and were not exposed to cybercrime. Thus, it necessitates paying attention to this emerging phenomenon and …
Continue reading at pmc.ncbi.nlm.nih.gov (HTML) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F17/30634Querying
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30386Retrieval requests
    • G06F17/30424Query processing
    • G06F17/30477Query execution
    • G06F17/30507Applying rules; deductive queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public service
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/08Insurance, e.g. risk analysis or pensions

Similar Documents

Publication Publication Date Title
Terry Existential challenges for healthcare data protection in the United States
Nugroho et al. Research synthesis of cybercrime laws and COVID-19 in Indonesia: lessons for developed and developing countries
Aslam et al. Getting smarter about smart cities: Improving data security and privacy through compliance
Fischer Federal laws relating to cybersecurity: overview and discussion of proposed revisions
Fischer Federal laws relating to cybersecurity: Overview of major issues, current laws, and proposed legislation
TW202232919A (en) Email certification system
Richards et al. African governments and the influence of corruption on the proliferation of cybercrime in Africa: wherein lies the rule of law?
Saleem et al. A survey of cybersecurity laws, regulations, and policies in technologically advanced nations: A case study of Pakistan to bridge the gap
Zhu et al. Systematic regulation of personal information rights in the era of big data
Brown The feasibility of transatlantic privacy-protective standards for surveillance
Chigada Towards an aligned South African national cybersecurity policy framework
Isibor Regulation of healthcare data security: Legal obligations in a digital age
Warsinske et al. The Official (ISC) 2 Guide to the CISSP CBK Reference
Brown et al. Public Information Management and E-Government: Policy and Issues: Policy and Issues
Fischer Federal laws relating to cybersecurity: discussion of proposed revisions
Sturc et al. Developing a system of indicators for clustering financial cybercrime
DoP et al. effect of data protection frameworks against cybercrimes on cyber security in Nigeria
Wickham Exploring data breaches and means to mitigate future occurrences in healthcare institutions: A content analysis
Moid Fighting Cyber Crimes Using Forensic Accounting: A Tool to Enhance Operational Efficiency.
Kayser et al. Identity theft: The importance of prosecuting on behalf of victims
Bangsawan et al. Personal Data Protection Policy during Covid-19 Pandemic Era
Patil et al. Securing financial systems through data sovereignty: a systematic review of approaches and regulations: A. Patil et al.
Wodi Data privacy and security: Fair information principles and data management strategies in a changing world
Seng Cybersecurity regulation—types, principles, and country deep dives in Asia
Fitriyanti et al. SECURING PERSONAL DATA IN E-KYC: VITAL FOR DIGITAL ECONOMY GROWTH