SlideShare uma empresa Scribd logo
1 de 4
Baixar para ler offline
THE STATE OF CYBERSECURITY IN INDONESIA
President of Indonesia, Joko “Jokowi” Widodo, said
recentlyinlateSeptember2016thatIndonesiahadseen
a drastic increase in cybercrime, with the number of
cases growing by 389 percents in 2014 to 2015. Jokowi
also informed that most of the cases occurred in the
e-commerce sector based and in 2013 Indonesia had
become the second largest target of cybercrimes
worldwide. The emergence of cybersecurity has become
a new challenge in terms of the readiness of Indonesian
governmentinstitutions.
According to the Global Cybersecurity Index (GCI) 2014
released by International Telecommunication Union
(ITU), Indonesia ranked number 5 in the cybersecurity
readiness among the Asia Pacic countries (or number
13 among 105 countries worldwide). Each country's
level of development analyzed
within 5 (ve) categories: Legal
Measures,TechnicalMeasures,
Organizational Measures,
Capacity Building and
Cooperation. The index aimed at capturing the
c y b e r s e c u r i t y r e a d i n e s s o f c o u n t r y
and not its detailed vulnerabilities. Based on the
Asia-Pacic Cybersecurity Dashboard 2015
releasedbyBusinessSoftwareAlliance(BSA),
The view of Jakarta's city lights from the top of building at midnight (photo:123RF)
continue to page 2
indonesia worldwideasia pacic
Graphical representations of the national, regional and global average have been produced from information collected for GCI
2014.ThedataisrepresentedinaradarchartwitheachspokeindicatingtheGCIscoreineachofthevecategories.
*) from secondary data
THE THREE KEYS FOR DIGITAL STARTUP
Indonesia's national movement for 1.000 digital
startups(GerakanNasional1000StartupDigital)isstill
underway. It has started in three cities since late July
2016 and will move on to incubation stage
laterintheyear.
This movement put a very strong emphasis on using
digital technology for solving problems in Indonesia. All
the aspiring startup founders involved in this program
are encouraged to really understand the problem they
want to solve, and try to build a business that has a
positiveimpactforthesociety.
One of the stages for this movement is called the
Workshop, this is the immediate stage after the
inspirationphasecalledIgnition.IntheWorkshopstage,
aspiring founders are taught three key activities that
willhelptheirstartup.Thoseactivitiesare:
1. Design Thinking
Using sample of problems provided by
Lab Kinetic, the participants will identify
Workshop stage for "Gerakan Nasional 1000 Startup Digital" was held in August and September 2016.
and create a mapping of the problem they choose in the
simulation. The activity also pushes the participant to try
andndacreativesolutionbasedondigitaltechnology.
Design Thinking is a method that will help aspiring
founders to reach a solution that accommodates
innovation through understanding of their users' desire,
technologyfeasibilityandbusinessviability.
2. Market Validation
The second tool in their arsenal is Market
Validation, this means attempting to
validate the solution by meeting users. They will be
challenged to explore, whether the problem they are trying
tosolveisrealandthesolutionacceptable.
3. Business Model
The third key activity is determining the
startup's Business Model. This is done by
considering the insights gathered from the two activities,
Design Thinking and Market Validation, and try to map the
possible Business Model through methods such as The
BusinessModelCanvasorother.
Aspiring startup founders in the movement must go
through several stages in the program. Aside from the
early talks (called Ignition), there is a Workshop, followed
by a hackathon using Hacksprint method and Bootcamp,
beforenallygoingintoIncubation.
Indonesia is in the early stages of developing a national cybersecurity strategy. Globally, the legal cybersecurity
framework should be strengthened and should be built upon the key principles, among others: engender trust and
work in partnership, respectful of privacy and civil liberties, and foster education and awareness about
cybersecurityrisk.
Awareness raising, education and training about clearly articulated cybersecurity priorities, principles, policies,
processes and programs are essential. Therefore, ICT Watch recently released Indonesian dub version of the
cybersecurityeducationvideoseriesthroughitsYouTubechannelat .Thisseries,http://youtube.com/internetsehat
developedinitiallybyGlobalPartnersDigital,aimstoprovidethetools,skillsandknowledgeforanyonewhowantto
engageeffectivelyincyberpolicydialogues.
frompage1
SOCIAL MEDIA FOR RADICALISM IN INDONESIA
ONLINE ANONYMITY IS A MUST, BUT WHAT FOR?
If the online privacy violations are rising, Indonesian
netizens called for the availability of adequate
regulation as a priority that must be done. It is based
on the 50.7% of respondent's answers for the
Indonesian Netizen Perspective of Internet Privacy
surveyconductedinApril-May2016.Thesurveywas
delivered by the Faculty of Law - Padjadjaran
University and ICT Watch, and supported by
the Citizen Lab - University of Toronto.
Internet, especially social
media, raises challenges in
countering extremism efforts.
Nowadays, many radicals use
social media to disseminate
radicalism as well as
spreading their propaganda.
This issue was discussed
during the Jakarta World Forum
for Media Development, recently on September 2016.
The issue is also relevant with the ndings from
Indonesian Center for Deradicalization and Wisdom
(ICDW) that conducted interview in early 2015 to
s e v e r a l
I n d o n e s i a n
former radical
activists. As an
open platform,
social media is widely used by the propaganda
bureau of several radical organizations, rather than
by the recruitment bureau. To recruit young radicals,
private-communication channel is more preferable,
namely Telegram, Whatsapp and Facebook
ilustration / 123rf
Messenger. Of course, the recruitment process will
carry on once the target is considered began to be
affected by the propaganda. ICDW believes that in
response to these challenges, online censorship will
not stop the systematic work of radical, especially if
the actors not reported to the law enforcer or
authority. Committee to Protect Journalists (CPJ),
during the forum was also voicing similar concerns. A
signicant challenge in the counter-narrative efforts
is the belief that “extremist views are not allowed to
be expressed”, (then may leads to immediate and
careless censorship - Ed.). As quoted by The Jakarta
Post, CPJ argued that online censorship only pushed
radicals to private and encrypted chat-rooms, where
journalists and authorities will hard to notice what is
going on. A more sensible approach should focus not
on content (censorship), but on the (counter)
perception/narrativeofcontent.
Related to the “anonymity”, 71.9% of respondents
said it is a must to have as an integral part
of privacy protection. Uniquely, around 57.1%
believe that the online anonym users in Indonesia
exist because they simply want to avoid
or run from responsibility, not for protecting the truth
or the good cause. For more results of the survey,
pleaseaccesshttp://bit.ly/id-netprivacy.
Netizen Facts
published jointly by:
ICT Watch Indonesia and Lab Kinetic
Jl. Tebet Barat Dalam 6H No. 16A
Jakarta Selatan +6221-8292428
info@ictwatch.id www.ictwatch.id
a signicant challenge in the counter-narrative efforts is the
belief that “extremist views are not allowed to be expressed”,
(then may leads to immediate and careless censorship. - Ed.)
Indonesian tax authority is pursuing Google Asia Pacic over what ofcials
allege are unpaid taxes from advertising revenue which is estimated more
than $400 million in the year of 2015. The Authority concerns with the
discrepancies of tax being paid by Google Indonesia, a limited liability
company and already subject of Indonesian tax regulation, compared to
potential tax generated from the revenue of Google Asia Pacic from its
business in Indonesia. It is noted that Google Indonesia already paid taxes on
revenues booked through its local ofce in Indonesia which is lower than the
amount of business transaction derived from Google's operations in
Indonesia through its Asia-Pacic headquarters in Singapore.
(by:SindyNurFitri/MoFA/Indonesia)
InternationalTelecommunicationUnion(ITU)andAssociationofSouthEastAsianNations(ASEAN)organizedaworkshop
onChildOnlineProtection(COP)on13-14September2016inManila,Philippines.Theobjectivesoftheworkshopwereto
provide a platform for ASEAN Member States to share experiences, strengthen their knowledge and raise awareness on
Child Online Safety through a multi-stakeholders approach, involving governments, educators, ICT/telecoms regulators,
companies and civil society organization (CSO) dealing with children and youth. On this occasion, Indonesian Ministry of
Communications and Information Technology (MCIT) and ICT Watch Indonesia became one of the panelists, one of the
subjects presented was about the initiative of Indonesian COP Roadmap development. Presentation:
http://bit.ly/itucop-idmcit http://bit.ly/itucop-ictwatch(MCIT)and (ICTWatch).(by:RizkyAmeliah/MCIT/Indonesia)
Association of South East Asian Nations (ASEAN) Leaders
adopted the Master Plan on ASEAN Connectivity 2025
(MPAC 2025) during the course of ASEAN Summit on 6
September 2016 in Vientiane, Lao PDR. The MPAC 2025
focused on ve strategic areas, including digital innovation.
The key feature of this Master Plan was the inclusion of
micro, small and medium enterprises (MSMEs) as the
center of connectivity development strategy, noting that
digital technologies in ASEAN could potentially be worth up to US$625 billion (8 percent of ASEAN's GDP) in 2030. The
MPAC2025alsohighlightedthestrategytoimprovedatamanagementanddigitalnancialserviceswithintheregion.The
MPAC2025documentcanbedownloadedhere .(by:SindyNurFitri/MoFA/Indonesia)http://bit.ly/asean2025
ASEAN LEADERS ADOPT MASTER PLAN
ON CONNECTIVITY 2025
INDONESIAN TAX AUTHORITY
LAUNCHES INVESTIGATION OVER GOOGLE
ITU AND ASEAN FACILITATED
COP MULTI-STAKEHOLDER SHARING
Master Plan ASEAN Connectivity 2025 / ASEAN.org
Google Maps Street View car in Jakarta / Techinasia
ITU - ASEAN COP Workshop in Manila / ICT Watch

Mais conteúdo relacionado

Mais procurados

Digital Citizenship Power Point Pres.
Digital Citizenship Power Point Pres.Digital Citizenship Power Point Pres.
Digital Citizenship Power Point Pres.vitor94
 
Community Disaster Incident Response
Community Disaster  Incident ResponseCommunity Disaster  Incident Response
Community Disaster Incident ResponseDinesh O Bareja
 
Igf 2013 daily news edititon 5
Igf 2013 daily news   edititon 5Igf 2013 daily news   edititon 5
Igf 2013 daily news edititon 5mataharitimoer MT
 
Can Cyber Insurance Enforce Change in Enterprise GRC
Can Cyber Insurance Enforce Change in Enterprise GRCCan Cyber Insurance Enforce Change in Enterprise GRC
Can Cyber Insurance Enforce Change in Enterprise GRCDinesh O Bareja
 
Cyber War, Cyber Peace, Stones and Glass Houses
Cyber War, Cyber Peace, Stones and Glass HousesCyber War, Cyber Peace, Stones and Glass Houses
Cyber War, Cyber Peace, Stones and Glass HousesPaige Rasid
 
Examining a display-peeping prevention method that uses real-time UI part tra...
Examining a display-peeping prevention method that uses real-time UI part tra...Examining a display-peeping prevention method that uses real-time UI part tra...
Examining a display-peeping prevention method that uses real-time UI part tra...journalBEEI
 
Battlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of Things
Battlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of ThingsBattlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of Things
Battlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of ThingsMaurice Dawson
 
Exploring Secure Computing for the Internet of Things, Internet of Everything...
Exploring Secure Computing for the Internet of Things, Internet of Everything...Exploring Secure Computing for the Internet of Things, Internet of Everything...
Exploring Secure Computing for the Internet of Things, Internet of Everything...Maurice Dawson
 
2015 Cyber Security Strategy
2015 Cyber Security Strategy 2015 Cyber Security Strategy
2015 Cyber Security Strategy Mohit Kumar
 
Security techniques for intelligent spam sensing and anomaly detection in onl...
Security techniques for intelligent spam sensing and anomaly detection in onl...Security techniques for intelligent spam sensing and anomaly detection in onl...
Security techniques for intelligent spam sensing and anomaly detection in onl...IJECEIAES
 
Is Big Data A Risky Business in Isaca Journal
Is Big Data A Risky Business in Isaca JournalIs Big Data A Risky Business in Isaca Journal
Is Big Data A Risky Business in Isaca JournalTushar Kale
 
Daily News 3rd ed
Daily News 3rd edDaily News 3rd ed
Daily News 3rd ed03bmai
 
Chapter 3.docx
Chapter 3.docxChapter 3.docx
Chapter 3.docxAmir Khan
 
South Africa MXIT exploratory paper
South Africa MXIT exploratory paperSouth Africa MXIT exploratory paper
South Africa MXIT exploratory paperAkshay Sinha
 

Mais procurados (19)

Digital Citizenship Power Point Pres.
Digital Citizenship Power Point Pres.Digital Citizenship Power Point Pres.
Digital Citizenship Power Point Pres.
 
Community Disaster Incident Response
Community Disaster  Incident ResponseCommunity Disaster  Incident Response
Community Disaster Incident Response
 
Igf 2013 daily news edititon 5
Igf 2013 daily news   edititon 5Igf 2013 daily news   edititon 5
Igf 2013 daily news edititon 5
 
Can Cyber Insurance Enforce Change in Enterprise GRC
Can Cyber Insurance Enforce Change in Enterprise GRCCan Cyber Insurance Enforce Change in Enterprise GRC
Can Cyber Insurance Enforce Change in Enterprise GRC
 
Cyber War, Cyber Peace, Stones and Glass Houses
Cyber War, Cyber Peace, Stones and Glass HousesCyber War, Cyber Peace, Stones and Glass Houses
Cyber War, Cyber Peace, Stones and Glass Houses
 
Examining a display-peeping prevention method that uses real-time UI part tra...
Examining a display-peeping prevention method that uses real-time UI part tra...Examining a display-peeping prevention method that uses real-time UI part tra...
Examining a display-peeping prevention method that uses real-time UI part tra...
 
ICOCI2013: Keynotes 1
ICOCI2013: Keynotes 1ICOCI2013: Keynotes 1
ICOCI2013: Keynotes 1
 
Battlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of Things
Battlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of ThingsBattlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of Things
Battlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of Things
 
Exploring Secure Computing for the Internet of Things, Internet of Everything...
Exploring Secure Computing for the Internet of Things, Internet of Everything...Exploring Secure Computing for the Internet of Things, Internet of Everything...
Exploring Secure Computing for the Internet of Things, Internet of Everything...
 
2015 Cyber Security Strategy
2015 Cyber Security Strategy 2015 Cyber Security Strategy
2015 Cyber Security Strategy
 
Cybercrime: An Analysis from Positive Law Perspective
Cybercrime: An Analysis from Positive Law PerspectiveCybercrime: An Analysis from Positive Law Perspective
Cybercrime: An Analysis from Positive Law Perspective
 
Singapore's regulation of cybercrime
Singapore's regulation of cybercrimeSingapore's regulation of cybercrime
Singapore's regulation of cybercrime
 
Security techniques for intelligent spam sensing and anomaly detection in onl...
Security techniques for intelligent spam sensing and anomaly detection in onl...Security techniques for intelligent spam sensing and anomaly detection in onl...
Security techniques for intelligent spam sensing and anomaly detection in onl...
 
Is Big Data A Risky Business in Isaca Journal
Is Big Data A Risky Business in Isaca JournalIs Big Data A Risky Business in Isaca Journal
Is Big Data A Risky Business in Isaca Journal
 
Child protection system in ict of thailand
Child protection system in ict of thailandChild protection system in ict of thailand
Child protection system in ict of thailand
 
Daily News 3rd ed
Daily News 3rd edDaily News 3rd ed
Daily News 3rd ed
 
Chapter 3.docx
Chapter 3.docxChapter 3.docx
Chapter 3.docx
 
South Africa MXIT exploratory paper
South Africa MXIT exploratory paperSouth Africa MXIT exploratory paper
South Africa MXIT exploratory paper
 
Assignment 1
Assignment 1Assignment 1
Assignment 1
 

Destaque

UU 19 tahun 2016 - Revisi UU ITE
UU 19 tahun 2016 - Revisi UU ITEUU 19 tahun 2016 - Revisi UU ITE
UU 19 tahun 2016 - Revisi UU ITEICT Watch
 
Netizen Indonesia Kini (Oktober - Desember 2016)
 Netizen Indonesia Kini (Oktober - Desember 2016)  Netizen Indonesia Kini (Oktober - Desember 2016)
Netizen Indonesia Kini (Oktober - Desember 2016) ICT Watch
 
Hasil Survei Privasi Online Indonesia 2016
Hasil Survei Privasi Online Indonesia 2016Hasil Survei Privasi Online Indonesia 2016
Hasil Survei Privasi Online Indonesia 2016ICT Watch
 
Master Plan ASEAN Connectivity 2025
Master Plan ASEAN Connectivity 2025Master Plan ASEAN Connectivity 2025
Master Plan ASEAN Connectivity 2025ICT Watch
 
National ID-IGF Dialogue 2016 Summary
National ID-IGF Dialogue 2016 SummaryNational ID-IGF Dialogue 2016 Summary
National ID-IGF Dialogue 2016 SummaryICT Watch
 
Masukan ict watch pd FGD Tayangan bermuatan SARA dan Terorisme, 21 september ...
Masukan ict watch pd FGD Tayangan bermuatan SARA dan Terorisme, 21 september ...Masukan ict watch pd FGD Tayangan bermuatan SARA dan Terorisme, 21 september ...
Masukan ict watch pd FGD Tayangan bermuatan SARA dan Terorisme, 21 september ...ICT Watch
 
Revisi UU ITE: Memerdekakan atau Membelengu
Revisi  UU ITE: Memerdekakan atau MembelenguRevisi  UU ITE: Memerdekakan atau Membelengu
Revisi UU ITE: Memerdekakan atau MembelenguICT Watch
 
Dinamika Etika dan Regulasi Internet Indonesia Pasca Revisi UU ITE
Dinamika Etika dan Regulasi Internet Indonesia Pasca Revisi UU ITEDinamika Etika dan Regulasi Internet Indonesia Pasca Revisi UU ITE
Dinamika Etika dan Regulasi Internet Indonesia Pasca Revisi UU ITEICT Watch
 
Privasi Online dan Perlindungan Data Pribadi
Privasi Online dan Perlindungan Data PribadiPrivasi Online dan Perlindungan Data Pribadi
Privasi Online dan Perlindungan Data PribadiICT Watch
 
Revisi UU ITE Nafas Lama
Revisi UU ITE Nafas LamaRevisi UU ITE Nafas Lama
Revisi UU ITE Nafas LamaICT Watch
 
Tanggapan ICT Watch atas RPM OTT
Tanggapan ICT Watch atas RPM OTTTanggapan ICT Watch atas RPM OTT
Tanggapan ICT Watch atas RPM OTTICT Watch
 
Masukan ICT Watch pada FGD Kominfo tentang Pembahasan Aplikasi yang Mengandun...
Masukan ICT Watch pada FGD Kominfo tentang Pembahasan Aplikasi yang Mengandun...Masukan ICT Watch pada FGD Kominfo tentang Pembahasan Aplikasi yang Mengandun...
Masukan ICT Watch pada FGD Kominfo tentang Pembahasan Aplikasi yang Mengandun...ICT Watch
 
Tata Kelola Internet dan HAM - ELSAM
Tata Kelola Internet dan HAM - ELSAMTata Kelola Internet dan HAM - ELSAM
Tata Kelola Internet dan HAM - ELSAMIGF Indonesia
 
Indonesia Netizen Facts (July - September 2016)
Indonesia Netizen Facts (July - September 2016)Indonesia Netizen Facts (July - September 2016)
Indonesia Netizen Facts (July - September 2016)ICT Watch
 
Handbook Internet BAIK
Handbook Internet BAIKHandbook Internet BAIK
Handbook Internet BAIKICT Watch
 
Modul Tata Kelola Internet - APCICT
Modul Tata Kelola Internet - APCICTModul Tata Kelola Internet - APCICT
Modul Tata Kelola Internet - APCICTIGF Indonesia
 
Ular Tangga Internet Sehat
Ular Tangga Internet SehatUlar Tangga Internet Sehat
Ular Tangga Internet SehatICT Watch
 
Internet Of Things - case study - Netizens na konferencji Microsoft dla Biznesu
Internet Of Things - case study - Netizens na konferencji Microsoft dla BiznesuInternet Of Things - case study - Netizens na konferencji Microsoft dla Biznesu
Internet Of Things - case study - Netizens na konferencji Microsoft dla BiznesuDawid Pacha
 

Destaque (20)

UU 19 tahun 2016 - Revisi UU ITE
UU 19 tahun 2016 - Revisi UU ITEUU 19 tahun 2016 - Revisi UU ITE
UU 19 tahun 2016 - Revisi UU ITE
 
Netizen Indonesia Kini (Oktober - Desember 2016)
 Netizen Indonesia Kini (Oktober - Desember 2016)  Netizen Indonesia Kini (Oktober - Desember 2016)
Netizen Indonesia Kini (Oktober - Desember 2016)
 
Hasil Survei Privasi Online Indonesia 2016
Hasil Survei Privasi Online Indonesia 2016Hasil Survei Privasi Online Indonesia 2016
Hasil Survei Privasi Online Indonesia 2016
 
Master Plan ASEAN Connectivity 2025
Master Plan ASEAN Connectivity 2025Master Plan ASEAN Connectivity 2025
Master Plan ASEAN Connectivity 2025
 
National ID-IGF Dialogue 2016 Summary
National ID-IGF Dialogue 2016 SummaryNational ID-IGF Dialogue 2016 Summary
National ID-IGF Dialogue 2016 Summary
 
Masukan ict watch pd FGD Tayangan bermuatan SARA dan Terorisme, 21 september ...
Masukan ict watch pd FGD Tayangan bermuatan SARA dan Terorisme, 21 september ...Masukan ict watch pd FGD Tayangan bermuatan SARA dan Terorisme, 21 september ...
Masukan ict watch pd FGD Tayangan bermuatan SARA dan Terorisme, 21 september ...
 
Revisi UU ITE: Memerdekakan atau Membelengu
Revisi  UU ITE: Memerdekakan atau MembelenguRevisi  UU ITE: Memerdekakan atau Membelengu
Revisi UU ITE: Memerdekakan atau Membelengu
 
Dinamika Etika dan Regulasi Internet Indonesia Pasca Revisi UU ITE
Dinamika Etika dan Regulasi Internet Indonesia Pasca Revisi UU ITEDinamika Etika dan Regulasi Internet Indonesia Pasca Revisi UU ITE
Dinamika Etika dan Regulasi Internet Indonesia Pasca Revisi UU ITE
 
Privasi Online dan Perlindungan Data Pribadi
Privasi Online dan Perlindungan Data PribadiPrivasi Online dan Perlindungan Data Pribadi
Privasi Online dan Perlindungan Data Pribadi
 
Revisi UU ITE Nafas Lama
Revisi UU ITE Nafas LamaRevisi UU ITE Nafas Lama
Revisi UU ITE Nafas Lama
 
Tanggapan ICT Watch atas RPM OTT
Tanggapan ICT Watch atas RPM OTTTanggapan ICT Watch atas RPM OTT
Tanggapan ICT Watch atas RPM OTT
 
Masukan ICT Watch pada FGD Kominfo tentang Pembahasan Aplikasi yang Mengandun...
Masukan ICT Watch pada FGD Kominfo tentang Pembahasan Aplikasi yang Mengandun...Masukan ICT Watch pada FGD Kominfo tentang Pembahasan Aplikasi yang Mengandun...
Masukan ICT Watch pada FGD Kominfo tentang Pembahasan Aplikasi yang Mengandun...
 
Tata Kelola Internet dan HAM - ELSAM
Tata Kelola Internet dan HAM - ELSAMTata Kelola Internet dan HAM - ELSAM
Tata Kelola Internet dan HAM - ELSAM
 
Indonesia Netizen Facts (July - September 2016)
Indonesia Netizen Facts (July - September 2016)Indonesia Netizen Facts (July - September 2016)
Indonesia Netizen Facts (July - September 2016)
 
Handbook Internet BAIK
Handbook Internet BAIKHandbook Internet BAIK
Handbook Internet BAIK
 
Internet Governance
Internet GovernanceInternet Governance
Internet Governance
 
Modul Tata Kelola Internet - APCICT
Modul Tata Kelola Internet - APCICTModul Tata Kelola Internet - APCICT
Modul Tata Kelola Internet - APCICT
 
Ular Tangga Internet Sehat
Ular Tangga Internet SehatUlar Tangga Internet Sehat
Ular Tangga Internet Sehat
 
Internet Of Things - case study - Netizens na konferencji Microsoft dla Biznesu
Internet Of Things - case study - Netizens na konferencji Microsoft dla BiznesuInternet Of Things - case study - Netizens na konferencji Microsoft dla Biznesu
Internet Of Things - case study - Netizens na konferencji Microsoft dla Biznesu
 
Menakar media sosial
Menakar media sosialMenakar media sosial
Menakar media sosial
 

Semelhante a Indonesia Netizen Facts (October - December 2016)

Indonesia Netizen Facts (October - December 2015)
Indonesia Netizen Facts (October - December 2015)Indonesia Netizen Facts (October - December 2015)
Indonesia Netizen Facts (October - December 2015)ICT Watch
 
Information Technology For Educational Development
Information Technology For Educational DevelopmentInformation Technology For Educational Development
Information Technology For Educational DevelopmentTheresa Singh
 
IRJET- Prospects of Online Advertising and its Implications on Children
IRJET-  	  Prospects of Online Advertising and its Implications on ChildrenIRJET-  	  Prospects of Online Advertising and its Implications on Children
IRJET- Prospects of Online Advertising and its Implications on ChildrenIRJET Journal
 
Resume of ID-IGF National Dialogue 2014
Resume of ID-IGF National Dialogue 2014Resume of ID-IGF National Dialogue 2014
Resume of ID-IGF National Dialogue 2014IGF Indonesia
 
Summary ID-IGF 2014 National Dialogue - English (tata kelola internet / int...
Summary  ID-IGF 2014 National Dialogue  - English (tata kelola internet / int...Summary  ID-IGF 2014 National Dialogue  - English (tata kelola internet / int...
Summary ID-IGF 2014 National Dialogue - English (tata kelola internet / int...ICT Watch - Indonesia
 
Igf 2013 daily news edition 4
Igf 2013 daily news   edition 4Igf 2013 daily news   edition 4
Igf 2013 daily news edition 4mataharitimoer MT
 
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVESAN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVESijcsit
 
Daily News 4th ed
Daily News 4th edDaily News 4th ed
Daily News 4th ed03bmai
 
Information Security Policies
Information Security PoliciesInformation Security Policies
Information Security PoliciesLaura Martin
 
Cyber Impact of Fake Instagram Business Account Identify Based on Sentiment A...
Cyber Impact of Fake Instagram Business Account Identify Based on Sentiment A...Cyber Impact of Fake Instagram Business Account Identify Based on Sentiment A...
Cyber Impact of Fake Instagram Business Account Identify Based on Sentiment A...IRJET Journal
 
Irjet v5 i1268
Irjet v5 i1268Irjet v5 i1268
Irjet v5 i1268xosap
 
Security risk analysis of bring your own device system in manufacturing compa...
Security risk analysis of bring your own device system in manufacturing compa...Security risk analysis of bring your own device system in manufacturing compa...
Security risk analysis of bring your own device system in manufacturing compa...TELKOMNIKA JOURNAL
 
Report on zero rating and its definition – 18 annenberg-oxford media policy s...
Report on zero rating and its definition – 18 annenberg-oxford media policy s...Report on zero rating and its definition – 18 annenberg-oxford media policy s...
Report on zero rating and its definition – 18 annenberg-oxford media policy s...Shreedeep Rayamajhi
 
Cyber Security Awareness and Corporate Agility of Deposit Money Banks in Nigeria
Cyber Security Awareness and Corporate Agility of Deposit Money Banks in NigeriaCyber Security Awareness and Corporate Agility of Deposit Money Banks in Nigeria
Cyber Security Awareness and Corporate Agility of Deposit Money Banks in Nigeriaijtsrd
 

Semelhante a Indonesia Netizen Facts (October - December 2016) (20)

Indonesia Netizen Facts (October - December 2015)
Indonesia Netizen Facts (October - December 2015)Indonesia Netizen Facts (October - December 2015)
Indonesia Netizen Facts (October - December 2015)
 
Monday Achivements
Monday AchivementsMonday Achivements
Monday Achivements
 
Information Technology For Educational Development
Information Technology For Educational DevelopmentInformation Technology For Educational Development
Information Technology For Educational Development
 
IRJET- Prospects of Online Advertising and its Implications on Children
IRJET-  	  Prospects of Online Advertising and its Implications on ChildrenIRJET-  	  Prospects of Online Advertising and its Implications on Children
IRJET- Prospects of Online Advertising and its Implications on Children
 
Resume of ID-IGF National Dialogue 2014
Resume of ID-IGF National Dialogue 2014Resume of ID-IGF National Dialogue 2014
Resume of ID-IGF National Dialogue 2014
 
Summary ID-IGF 2014 National Dialogue - English (tata kelola internet / int...
Summary  ID-IGF 2014 National Dialogue  - English (tata kelola internet / int...Summary  ID-IGF 2014 National Dialogue  - English (tata kelola internet / int...
Summary ID-IGF 2014 National Dialogue - English (tata kelola internet / int...
 
Igf 2013 daily news edition 4
Igf 2013 daily news   edition 4Igf 2013 daily news   edition 4
Igf 2013 daily news edition 4
 
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVESAN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
 
Daily News 4th ed
Daily News 4th edDaily News 4th ed
Daily News 4th ed
 
Warung Pintar Digital Literacy Report
Warung Pintar Digital Literacy ReportWarung Pintar Digital Literacy Report
Warung Pintar Digital Literacy Report
 
Information Security Policies
Information Security PoliciesInformation Security Policies
Information Security Policies
 
Olaf Kolkman - FIRST Keynote on Collaborative Security
Olaf Kolkman - FIRST Keynote on Collaborative SecurityOlaf Kolkman - FIRST Keynote on Collaborative Security
Olaf Kolkman - FIRST Keynote on Collaborative Security
 
Cyber Impact of Fake Instagram Business Account Identify Based on Sentiment A...
Cyber Impact of Fake Instagram Business Account Identify Based on Sentiment A...Cyber Impact of Fake Instagram Business Account Identify Based on Sentiment A...
Cyber Impact of Fake Instagram Business Account Identify Based on Sentiment A...
 
Resources for Mobiles
Resources for MobilesResources for Mobiles
Resources for Mobiles
 
Inside-Out-Newsletter 2020-21.pdf
Inside-Out-Newsletter 2020-21.pdfInside-Out-Newsletter 2020-21.pdf
Inside-Out-Newsletter 2020-21.pdf
 
Irjet v5 i1268
Irjet v5 i1268Irjet v5 i1268
Irjet v5 i1268
 
Security risk analysis of bring your own device system in manufacturing compa...
Security risk analysis of bring your own device system in manufacturing compa...Security risk analysis of bring your own device system in manufacturing compa...
Security risk analysis of bring your own device system in manufacturing compa...
 
Report on zero rating and its definition – 18 annenberg-oxford media policy s...
Report on zero rating and its definition – 18 annenberg-oxford media policy s...Report on zero rating and its definition – 18 annenberg-oxford media policy s...
Report on zero rating and its definition – 18 annenberg-oxford media policy s...
 
Cyber Security Awareness and Corporate Agility of Deposit Money Banks in Nigeria
Cyber Security Awareness and Corporate Agility of Deposit Money Banks in NigeriaCyber Security Awareness and Corporate Agility of Deposit Money Banks in Nigeria
Cyber Security Awareness and Corporate Agility of Deposit Money Banks in Nigeria
 
Sea igf 2021 executive summary
Sea igf 2021 executive summarySea igf 2021 executive summary
Sea igf 2021 executive summary
 

Mais de ICT Watch

Aktivasi 2FA di Media Sosial Lewat Ponsel
Aktivasi 2FA di Media Sosial Lewat PonselAktivasi 2FA di Media Sosial Lewat Ponsel
Aktivasi 2FA di Media Sosial Lewat PonselICT Watch
 
Rancangan UU Perlindungan Data Pribadi - Final
Rancangan UU Perlindungan Data Pribadi - FinalRancangan UU Perlindungan Data Pribadi - Final
Rancangan UU Perlindungan Data Pribadi - FinalICT Watch
 
Melihat RUU Pelindungan Data Pribadi
Melihat RUU Pelindungan Data PribadiMelihat RUU Pelindungan Data Pribadi
Melihat RUU Pelindungan Data PribadiICT Watch
 
RUU PDP APRIL 2019
RUU PDP APRIL 2019RUU PDP APRIL 2019
RUU PDP APRIL 2019ICT Watch
 
Tantangan Perlindungan Privasi dan Keterbukaan Informasi
Tantangan Perlindungan Privasi dan Keterbukaan InformasiTantangan Perlindungan Privasi dan Keterbukaan Informasi
Tantangan Perlindungan Privasi dan Keterbukaan InformasiICT Watch
 
Perlindungan Hak Atas Privasi di Internet
Perlindungan Hak Atas Privasi di InternetPerlindungan Hak Atas Privasi di Internet
Perlindungan Hak Atas Privasi di InternetICT Watch
 
Perlindungan Data Pribadi di Indonesia
Perlindungan Data Pribadi di IndonesiaPerlindungan Data Pribadi di Indonesia
Perlindungan Data Pribadi di IndonesiaICT Watch
 
Privasi dan Keamanan Internet
Privasi dan Keamanan InternetPrivasi dan Keamanan Internet
Privasi dan Keamanan InternetICT Watch
 
Privasi dan Perlindungan Data Pribadi
Privasi dan Perlindungan Data PribadiPrivasi dan Perlindungan Data Pribadi
Privasi dan Perlindungan Data PribadiICT Watch
 
Privasi 101 Panduan Memahami Privasi dan Perlindungan Data
Privasi 101 Panduan Memahami Privasi dan Perlindungan DataPrivasi 101 Panduan Memahami Privasi dan Perlindungan Data
Privasi 101 Panduan Memahami Privasi dan Perlindungan DataICT Watch
 
Panduan 1 2 3 Menjadi Netizen Cerdas
Panduan 1 2 3 Menjadi Netizen CerdasPanduan 1 2 3 Menjadi Netizen Cerdas
Panduan 1 2 3 Menjadi Netizen CerdasICT Watch
 
Ular Tangga Internet Sehat Anak
Ular Tangga Internet Sehat AnakUlar Tangga Internet Sehat Anak
Ular Tangga Internet Sehat AnakICT Watch
 
Literasi Digital ICT Watch
Literasi Digital ICT WatchLiterasi Digital ICT Watch
Literasi Digital ICT WatchICT Watch
 
Penetrasi dan Perilaku Pengguna Internet Indonesia 2016
Penetrasi dan Perilaku Pengguna Internet Indonesia 2016Penetrasi dan Perilaku Pengguna Internet Indonesia 2016
Penetrasi dan Perilaku Pengguna Internet Indonesia 2016ICT Watch
 
Peta Jalan Perlindungan Anak Indonesia di Internet (Sebuah Pengantar)
Peta Jalan Perlindungan Anak Indonesia di Internet  (Sebuah Pengantar)Peta Jalan Perlindungan Anak Indonesia di Internet  (Sebuah Pengantar)
Peta Jalan Perlindungan Anak Indonesia di Internet (Sebuah Pengantar)ICT Watch
 
Usulan RT RW Net oleh ICT Watch
Usulan RT RW Net oleh ICT WatchUsulan RT RW Net oleh ICT Watch
Usulan RT RW Net oleh ICT WatchICT Watch
 
Kartu status
Kartu statusKartu status
Kartu statusICT Watch
 
Indonesia Internet Sehat on Child Online Protection
Indonesia Internet Sehat on Child Online ProtectionIndonesia Internet Sehat on Child Online Protection
Indonesia Internet Sehat on Child Online ProtectionICT Watch
 
Internet Sehat dan Literasi Digital
Internet Sehat dan Literasi DigitalInternet Sehat dan Literasi Digital
Internet Sehat dan Literasi DigitalICT Watch
 

Mais de ICT Watch (19)

Aktivasi 2FA di Media Sosial Lewat Ponsel
Aktivasi 2FA di Media Sosial Lewat PonselAktivasi 2FA di Media Sosial Lewat Ponsel
Aktivasi 2FA di Media Sosial Lewat Ponsel
 
Rancangan UU Perlindungan Data Pribadi - Final
Rancangan UU Perlindungan Data Pribadi - FinalRancangan UU Perlindungan Data Pribadi - Final
Rancangan UU Perlindungan Data Pribadi - Final
 
Melihat RUU Pelindungan Data Pribadi
Melihat RUU Pelindungan Data PribadiMelihat RUU Pelindungan Data Pribadi
Melihat RUU Pelindungan Data Pribadi
 
RUU PDP APRIL 2019
RUU PDP APRIL 2019RUU PDP APRIL 2019
RUU PDP APRIL 2019
 
Tantangan Perlindungan Privasi dan Keterbukaan Informasi
Tantangan Perlindungan Privasi dan Keterbukaan InformasiTantangan Perlindungan Privasi dan Keterbukaan Informasi
Tantangan Perlindungan Privasi dan Keterbukaan Informasi
 
Perlindungan Hak Atas Privasi di Internet
Perlindungan Hak Atas Privasi di InternetPerlindungan Hak Atas Privasi di Internet
Perlindungan Hak Atas Privasi di Internet
 
Perlindungan Data Pribadi di Indonesia
Perlindungan Data Pribadi di IndonesiaPerlindungan Data Pribadi di Indonesia
Perlindungan Data Pribadi di Indonesia
 
Privasi dan Keamanan Internet
Privasi dan Keamanan InternetPrivasi dan Keamanan Internet
Privasi dan Keamanan Internet
 
Privasi dan Perlindungan Data Pribadi
Privasi dan Perlindungan Data PribadiPrivasi dan Perlindungan Data Pribadi
Privasi dan Perlindungan Data Pribadi
 
Privasi 101 Panduan Memahami Privasi dan Perlindungan Data
Privasi 101 Panduan Memahami Privasi dan Perlindungan DataPrivasi 101 Panduan Memahami Privasi dan Perlindungan Data
Privasi 101 Panduan Memahami Privasi dan Perlindungan Data
 
Panduan 1 2 3 Menjadi Netizen Cerdas
Panduan 1 2 3 Menjadi Netizen CerdasPanduan 1 2 3 Menjadi Netizen Cerdas
Panduan 1 2 3 Menjadi Netizen Cerdas
 
Ular Tangga Internet Sehat Anak
Ular Tangga Internet Sehat AnakUlar Tangga Internet Sehat Anak
Ular Tangga Internet Sehat Anak
 
Literasi Digital ICT Watch
Literasi Digital ICT WatchLiterasi Digital ICT Watch
Literasi Digital ICT Watch
 
Penetrasi dan Perilaku Pengguna Internet Indonesia 2016
Penetrasi dan Perilaku Pengguna Internet Indonesia 2016Penetrasi dan Perilaku Pengguna Internet Indonesia 2016
Penetrasi dan Perilaku Pengguna Internet Indonesia 2016
 
Peta Jalan Perlindungan Anak Indonesia di Internet (Sebuah Pengantar)
Peta Jalan Perlindungan Anak Indonesia di Internet  (Sebuah Pengantar)Peta Jalan Perlindungan Anak Indonesia di Internet  (Sebuah Pengantar)
Peta Jalan Perlindungan Anak Indonesia di Internet (Sebuah Pengantar)
 
Usulan RT RW Net oleh ICT Watch
Usulan RT RW Net oleh ICT WatchUsulan RT RW Net oleh ICT Watch
Usulan RT RW Net oleh ICT Watch
 
Kartu status
Kartu statusKartu status
Kartu status
 
Indonesia Internet Sehat on Child Online Protection
Indonesia Internet Sehat on Child Online ProtectionIndonesia Internet Sehat on Child Online Protection
Indonesia Internet Sehat on Child Online Protection
 
Internet Sehat dan Literasi Digital
Internet Sehat dan Literasi DigitalInternet Sehat dan Literasi Digital
Internet Sehat dan Literasi Digital
 

Último

办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
NSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationNSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationMarko4394
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Sonam Pathan
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Paul Calvano
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxeditsforyah
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Sonam Pathan
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationLinaWolf1
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 

Último (17)

办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
NSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationNSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentation
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptx
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 Documentation
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 

Indonesia Netizen Facts (October - December 2016)

  • 1. THE STATE OF CYBERSECURITY IN INDONESIA President of Indonesia, Joko “Jokowi” Widodo, said recentlyinlateSeptember2016thatIndonesiahadseen a drastic increase in cybercrime, with the number of cases growing by 389 percents in 2014 to 2015. Jokowi also informed that most of the cases occurred in the e-commerce sector based and in 2013 Indonesia had become the second largest target of cybercrimes worldwide. The emergence of cybersecurity has become a new challenge in terms of the readiness of Indonesian governmentinstitutions. According to the Global Cybersecurity Index (GCI) 2014 released by International Telecommunication Union (ITU), Indonesia ranked number 5 in the cybersecurity readiness among the Asia Pacic countries (or number 13 among 105 countries worldwide). Each country's level of development analyzed within 5 (ve) categories: Legal Measures,TechnicalMeasures, Organizational Measures, Capacity Building and Cooperation. The index aimed at capturing the c y b e r s e c u r i t y r e a d i n e s s o f c o u n t r y and not its detailed vulnerabilities. Based on the Asia-Pacic Cybersecurity Dashboard 2015 releasedbyBusinessSoftwareAlliance(BSA), The view of Jakarta's city lights from the top of building at midnight (photo:123RF) continue to page 2 indonesia worldwideasia pacic Graphical representations of the national, regional and global average have been produced from information collected for GCI 2014.ThedataisrepresentedinaradarchartwitheachspokeindicatingtheGCIscoreineachofthevecategories. *) from secondary data
  • 2. THE THREE KEYS FOR DIGITAL STARTUP Indonesia's national movement for 1.000 digital startups(GerakanNasional1000StartupDigital)isstill underway. It has started in three cities since late July 2016 and will move on to incubation stage laterintheyear. This movement put a very strong emphasis on using digital technology for solving problems in Indonesia. All the aspiring startup founders involved in this program are encouraged to really understand the problem they want to solve, and try to build a business that has a positiveimpactforthesociety. One of the stages for this movement is called the Workshop, this is the immediate stage after the inspirationphasecalledIgnition.IntheWorkshopstage, aspiring founders are taught three key activities that willhelptheirstartup.Thoseactivitiesare: 1. Design Thinking Using sample of problems provided by Lab Kinetic, the participants will identify Workshop stage for "Gerakan Nasional 1000 Startup Digital" was held in August and September 2016. and create a mapping of the problem they choose in the simulation. The activity also pushes the participant to try andndacreativesolutionbasedondigitaltechnology. Design Thinking is a method that will help aspiring founders to reach a solution that accommodates innovation through understanding of their users' desire, technologyfeasibilityandbusinessviability. 2. Market Validation The second tool in their arsenal is Market Validation, this means attempting to validate the solution by meeting users. They will be challenged to explore, whether the problem they are trying tosolveisrealandthesolutionacceptable. 3. Business Model The third key activity is determining the startup's Business Model. This is done by considering the insights gathered from the two activities, Design Thinking and Market Validation, and try to map the possible Business Model through methods such as The BusinessModelCanvasorother. Aspiring startup founders in the movement must go through several stages in the program. Aside from the early talks (called Ignition), there is a Workshop, followed by a hackathon using Hacksprint method and Bootcamp, beforenallygoingintoIncubation. Indonesia is in the early stages of developing a national cybersecurity strategy. Globally, the legal cybersecurity framework should be strengthened and should be built upon the key principles, among others: engender trust and work in partnership, respectful of privacy and civil liberties, and foster education and awareness about cybersecurityrisk. Awareness raising, education and training about clearly articulated cybersecurity priorities, principles, policies, processes and programs are essential. Therefore, ICT Watch recently released Indonesian dub version of the cybersecurityeducationvideoseriesthroughitsYouTubechannelat .Thisseries,http://youtube.com/internetsehat developedinitiallybyGlobalPartnersDigital,aimstoprovidethetools,skillsandknowledgeforanyonewhowantto engageeffectivelyincyberpolicydialogues. frompage1
  • 3. SOCIAL MEDIA FOR RADICALISM IN INDONESIA ONLINE ANONYMITY IS A MUST, BUT WHAT FOR? If the online privacy violations are rising, Indonesian netizens called for the availability of adequate regulation as a priority that must be done. It is based on the 50.7% of respondent's answers for the Indonesian Netizen Perspective of Internet Privacy surveyconductedinApril-May2016.Thesurveywas delivered by the Faculty of Law - Padjadjaran University and ICT Watch, and supported by the Citizen Lab - University of Toronto. Internet, especially social media, raises challenges in countering extremism efforts. Nowadays, many radicals use social media to disseminate radicalism as well as spreading their propaganda. This issue was discussed during the Jakarta World Forum for Media Development, recently on September 2016. The issue is also relevant with the ndings from Indonesian Center for Deradicalization and Wisdom (ICDW) that conducted interview in early 2015 to s e v e r a l I n d o n e s i a n former radical activists. As an open platform, social media is widely used by the propaganda bureau of several radical organizations, rather than by the recruitment bureau. To recruit young radicals, private-communication channel is more preferable, namely Telegram, Whatsapp and Facebook ilustration / 123rf Messenger. Of course, the recruitment process will carry on once the target is considered began to be affected by the propaganda. ICDW believes that in response to these challenges, online censorship will not stop the systematic work of radical, especially if the actors not reported to the law enforcer or authority. Committee to Protect Journalists (CPJ), during the forum was also voicing similar concerns. A signicant challenge in the counter-narrative efforts is the belief that “extremist views are not allowed to be expressed”, (then may leads to immediate and careless censorship - Ed.). As quoted by The Jakarta Post, CPJ argued that online censorship only pushed radicals to private and encrypted chat-rooms, where journalists and authorities will hard to notice what is going on. A more sensible approach should focus not on content (censorship), but on the (counter) perception/narrativeofcontent. Related to the “anonymity”, 71.9% of respondents said it is a must to have as an integral part of privacy protection. Uniquely, around 57.1% believe that the online anonym users in Indonesia exist because they simply want to avoid or run from responsibility, not for protecting the truth or the good cause. For more results of the survey, pleaseaccesshttp://bit.ly/id-netprivacy. Netizen Facts published jointly by: ICT Watch Indonesia and Lab Kinetic Jl. Tebet Barat Dalam 6H No. 16A Jakarta Selatan +6221-8292428 info@ictwatch.id www.ictwatch.id a signicant challenge in the counter-narrative efforts is the belief that “extremist views are not allowed to be expressed”, (then may leads to immediate and careless censorship. - Ed.)
  • 4. Indonesian tax authority is pursuing Google Asia Pacic over what ofcials allege are unpaid taxes from advertising revenue which is estimated more than $400 million in the year of 2015. The Authority concerns with the discrepancies of tax being paid by Google Indonesia, a limited liability company and already subject of Indonesian tax regulation, compared to potential tax generated from the revenue of Google Asia Pacic from its business in Indonesia. It is noted that Google Indonesia already paid taxes on revenues booked through its local ofce in Indonesia which is lower than the amount of business transaction derived from Google's operations in Indonesia through its Asia-Pacic headquarters in Singapore. (by:SindyNurFitri/MoFA/Indonesia) InternationalTelecommunicationUnion(ITU)andAssociationofSouthEastAsianNations(ASEAN)organizedaworkshop onChildOnlineProtection(COP)on13-14September2016inManila,Philippines.Theobjectivesoftheworkshopwereto provide a platform for ASEAN Member States to share experiences, strengthen their knowledge and raise awareness on Child Online Safety through a multi-stakeholders approach, involving governments, educators, ICT/telecoms regulators, companies and civil society organization (CSO) dealing with children and youth. On this occasion, Indonesian Ministry of Communications and Information Technology (MCIT) and ICT Watch Indonesia became one of the panelists, one of the subjects presented was about the initiative of Indonesian COP Roadmap development. Presentation: http://bit.ly/itucop-idmcit http://bit.ly/itucop-ictwatch(MCIT)and (ICTWatch).(by:RizkyAmeliah/MCIT/Indonesia) Association of South East Asian Nations (ASEAN) Leaders adopted the Master Plan on ASEAN Connectivity 2025 (MPAC 2025) during the course of ASEAN Summit on 6 September 2016 in Vientiane, Lao PDR. The MPAC 2025 focused on ve strategic areas, including digital innovation. The key feature of this Master Plan was the inclusion of micro, small and medium enterprises (MSMEs) as the center of connectivity development strategy, noting that digital technologies in ASEAN could potentially be worth up to US$625 billion (8 percent of ASEAN's GDP) in 2030. The MPAC2025alsohighlightedthestrategytoimprovedatamanagementanddigitalnancialserviceswithintheregion.The MPAC2025documentcanbedownloadedhere .(by:SindyNurFitri/MoFA/Indonesia)http://bit.ly/asean2025 ASEAN LEADERS ADOPT MASTER PLAN ON CONNECTIVITY 2025 INDONESIAN TAX AUTHORITY LAUNCHES INVESTIGATION OVER GOOGLE ITU AND ASEAN FACILITATED COP MULTI-STAKEHOLDER SHARING Master Plan ASEAN Connectivity 2025 / ASEAN.org Google Maps Street View car in Jakarta / Techinasia ITU - ASEAN COP Workshop in Manila / ICT Watch