Main Article Content
Abstract
This study examines the impact of national data theft by hackers in 2024 by identifying weak communication regulations. The study was conducted using a qualitative approach with a case strategy. The study results found the need for strict regulations to protect sensitive data by emphasizing that clear and consistently implemented policies can reduce the risk of data theft. The case studies analyzed showed that weak passwords significantly increased vulnerability to attacks, illustrating the need for better education and implementation of stronger security practices. In conclusion, this study underscores the importance of effective regulations in addressing cyber threats and improving the protection of personal information in today's digital era.
Keywords
Article Details
Copyright (c) 2024 Muhammad Farrel Tanjung, Fadilla Febrianisa

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
References
- Adhikari, S. (2024). Necessity of Big Data Security and its Relation to National Security. Unity Journal, 5(1), 1–14. https://doi.org/10.3126/unityj.v5i1.63137
- Adnani, K. (2021). Metodologi Penelitian Komunikasi Kualitatif dan Kuantitatif (Firts). Efudepress. https://eprints.iain-surakarta.ac.id/5064/1/14.
- Andhika, I. K. (2024). “ADMIN#1234” Ternyata Password Untuk Akses Server PDN. 06 Juli. https://www.rri.co.id/iptek/806581/admin-1234-ternyata-password-untuk-akses-server-pdn
- Bahtiar, N. (2022). Darurat Kebocoran Data : Kebutuhan Regulasi Pemerintah. Development Policy and Management Review (DPMR), 2(1), 1–16. file:///C:/Users/user/Downloads/32144-Article Text-109597-1-10-20240320.pdf
- Chaudhary, S., Gkioulos, V., & Katsikas, S. (2022). Developing metrics to assess the effectiveness of cybersecurity awareness program. Journal of Cybersecurity, 8(1), 1–19. https://doi.org/10.1093/cybsec/tyac006
- Feintuck, M., & Varney, M. (2006). Media Regulation, Public Interest, and the Law. Edinburgh University Press Ltd.
- Li, L., He, W., Xu, L., Ash, I., Mohd Anwar, & Yuan, X. (2019). Investigating the impact of cybersecurity policy awareness on employees’ cybersecurity behavior. International Journal of Information Management, 45, 13–14. https://doi.org/https://doi.org/10.1016/j.ijinfomgt.2018.10.017
- Mishra, A., Alzoubi, Y. I., Gill, A. Q., & Anwar, M. J. (2022). Cybersecurity Enterprises Policies: A Comparative Study. Sensors, 22(2), 1–35. https://doi.org/10.3390/s22020538
- Nugroho, I. H. D., Pebriawan, K., Jati, K. G. T. M., Diptha, I. G. C. A., Listartha, I. M. E., & Saskara, G. A. J. (2023). Analisa Evaluasi Kinerja Software Password Attacker Pada Berkas File Zip. Jurnal Informatika Dan Tekonologi Komputer (JITEK), 3(1), 14–23. https://doi.org/10.55606/jitek.v3i1.899
- Rianto, P. (2019). Perbandingan Paradigma Otoritarianisme dan Demokrasi dalam Regulasi Media Massa di Indonesia. JURNAL IPTEKKOM : Jurnal Ilmu Pengetahuan & Teknologi Informasi, 21(2), 123. https://doi.org/10.33164/iptekkom.21.2.2019.123-138
- Rianto, P. (2024). Regulasi komunikasi: tantangan di era media baru (Firts). UII Press Yogyakarta.
- Sarjito, A. (2024). Data Security and Privacy in the Digital Era : Challenges for Modern Government. JIAN (Jurnal Ilmiah Administrasi Negara), 8(3), 1–13. https://ojs.ejournalunigoro.com/index.php/JIAN
References
Adhikari, S. (2024). Necessity of Big Data Security and its Relation to National Security. Unity Journal, 5(1), 1–14. https://doi.org/10.3126/unityj.v5i1.63137
Adnani, K. (2021). Metodologi Penelitian Komunikasi Kualitatif dan Kuantitatif (Firts). Efudepress. https://eprints.iain-surakarta.ac.id/5064/1/14.
Andhika, I. K. (2024). “ADMIN#1234” Ternyata Password Untuk Akses Server PDN. 06 Juli. https://www.rri.co.id/iptek/806581/admin-1234-ternyata-password-untuk-akses-server-pdn
Bahtiar, N. (2022). Darurat Kebocoran Data : Kebutuhan Regulasi Pemerintah. Development Policy and Management Review (DPMR), 2(1), 1–16. file:///C:/Users/user/Downloads/32144-Article Text-109597-1-10-20240320.pdf
Chaudhary, S., Gkioulos, V., & Katsikas, S. (2022). Developing metrics to assess the effectiveness of cybersecurity awareness program. Journal of Cybersecurity, 8(1), 1–19. https://doi.org/10.1093/cybsec/tyac006
Feintuck, M., & Varney, M. (2006). Media Regulation, Public Interest, and the Law. Edinburgh University Press Ltd.
Li, L., He, W., Xu, L., Ash, I., Mohd Anwar, & Yuan, X. (2019). Investigating the impact of cybersecurity policy awareness on employees’ cybersecurity behavior. International Journal of Information Management, 45, 13–14. https://doi.org/https://doi.org/10.1016/j.ijinfomgt.2018.10.017
Mishra, A., Alzoubi, Y. I., Gill, A. Q., & Anwar, M. J. (2022). Cybersecurity Enterprises Policies: A Comparative Study. Sensors, 22(2), 1–35. https://doi.org/10.3390/s22020538
Nugroho, I. H. D., Pebriawan, K., Jati, K. G. T. M., Diptha, I. G. C. A., Listartha, I. M. E., & Saskara, G. A. J. (2023). Analisa Evaluasi Kinerja Software Password Attacker Pada Berkas File Zip. Jurnal Informatika Dan Tekonologi Komputer (JITEK), 3(1), 14–23. https://doi.org/10.55606/jitek.v3i1.899
Rianto, P. (2019). Perbandingan Paradigma Otoritarianisme dan Demokrasi dalam Regulasi Media Massa di Indonesia. JURNAL IPTEKKOM : Jurnal Ilmu Pengetahuan & Teknologi Informasi, 21(2), 123. https://doi.org/10.33164/iptekkom.21.2.2019.123-138
Rianto, P. (2024). Regulasi komunikasi: tantangan di era media baru (Firts). UII Press Yogyakarta.
Sarjito, A. (2024). Data Security and Privacy in the Digital Era : Challenges for Modern Government. JIAN (Jurnal Ilmiah Administrasi Negara), 8(3), 1–13. https://ojs.ejournalunigoro.com/index.php/JIAN