Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 12 dokumen yang sesuai dengan query
cover
Ayu Septin Galuh Saraswati
Abstrak :
Peningkatan pengguna internet di Indonesia memunculkan masalah baru mengenai barang yang diperjualbelikan oleh penjual (merchant) dalam sistem yang ditawarkan oleh pihak penyelenggara marketplace. Beragamnya barang dalam platform marketplace bahkan mencakup barang yang seharusnya tidak diperjualbelikan secara bebas contohnya beberapa perangkat surveillance. Rekaman melalui perangkat surveillance dapat dilaksanakan dengan proses yang tanpa didasari persetujuan dari pihak yang direkam dan dapat mengandung informasi bersifat pribadi sehingga mengancam eksistensi hak privasi. Sepatutnya penggunaan perangkat surveillance mempertimbangkan metode yang digunakan untuk mendapatkan suatu informasi atau data yang bersifat pribadi seharusnya melalui cara yang adil dan tidak menyalahi ketentuan hukum. Dibutuhkan kerjasama berbagai pihak mengingat potensi masalah tersebut tidak lepas dari hubungan saling terkait antara para pihak yaitu negara atau Pemerintah; marketplace atau penyedia Platform; pemilik toko daring/Penjual/seller/merchant; dan Pembeli. Kehadiran negara mengawasi peredaran beberapa jenis perangkat surveillance penting adanya. Keadaan diperburuk dengan tidak dilaksanakannya berbagai prinsip dan kewajiban dalam penyelenggaraan sistem elektronik oleh marketplace menyikapi penjual (merchant) yang memperjualbelikan produk tersebut. Perlu dikaji mengenai regulasi yang mendasari pelaksanaan kegiatan surveillance dan penggunaan perangkat surveillance di Indonesia dan aktivitas perdagangan perangkat tersebut dikaitkan dengan eksistensi pelindungan hak privasi masyarakat di Indonesia serta menganalisa tanggung jawab hukum marketplace. Pendekatan dalam kajian ini adalah dengan metode yuridis normatif. ......The increase in internet users in Indonesia raises new problems regarding goods traded by sellers (merchants) in the system offered by the marketplace organizer. The variety of goods in the marketplace platform even includes goods that should not be freely traded, for example some surveillance devices. Recording through surveillance devices can be carried out with a process that is not based on the consent of the recorded party and may contain personal information that threatens the existence of privacy rights. The use of surveillance equipment should consider the method used to obtain information or personal data that should be in a fair manner and not violate legal provisions. The cooperation of various parties is needed considering that the potential problem cannot be separated from the interrelated relationship between the parties, namely the state or the Government; marketplace or Platform provider; online shop owner/seller/seller/merchant; and Buyers. The presence of the state oversees the circulation of several types of important surveillance equipment. The situation is exacerbated by the non-implementation of various principles and obligations in the implementation of the electronic system by the marketplace in response to the seller (merchant) who trades the product. It is necessary to study the regulations that underlie the implementation of surveillance activities and the use of surveillance equipment in Indonesia and the trading activities of these devices are related to the existence of protecting the privacy rights of the people in Indonesia as well as analyzing the legal responsibilities of the marketplace. The approach in this study is the normative juridical method.
Jakarta: Fakultas Hukum Universitas Indonesia, 2022
T-pdf
UI - Tesis Membership  Universitas Indonesia Library
cover
Denecke, Kerstin
Abstrak :
Denecke’s objective is to introduce the multiple possibilities and facets of surveillance and its applications. She first introduces the task of surveillance and provides an overview on surveillance in various domains. Next, the various information sources that are available and could already be used by surveillance systems are summarized. In the main part of the book, her focus is on unstructured data as a source for surveillance. An overview on existing methods as well as methods to be developed in order to process this kind of data with respect to surveillance is presented. As an example application, she introduces disease surveillance using Web 2.0, including corresponding methods and challenges to be addressed. The book closes with remarks on new possibilities for surveillance gained by recent developments of the Internet and mobile communication, and with an outline of future challenges.
Heidelberg: [Springer, ], 2012
e20408759
eBooks  Universitas Indonesia Library
cover
Aniati Murni Arymurthy
Abstrak :
Makalah ini menyajikan suatu metodologi penyelesaian masalah awan pada citra optik inderajaya dengan pendekatan citra optik multitemporal dan pendektan citra multisensor (yaitu citra optik dan citra radar). Masalah utama dari penggunaan citra optik adalah adanya gangguan awan, termasuk adanya awan permanen dan daerah awan tipis atau berkabut. Kebutuhan restorasi daerah tutupan pada tingkat tinggi (tingkat ct=itra tematik) tetapi juga pada tingkat rendah (tingkat citra mentah). Metodologi yang diajukan memuat beberapa skema penyelesaian masalah awan pad tingkat citra mentah maupun tingkat citra tematik, kondidi awan permanen ataupun daerah tutupan awan tipis. Pendekatan yang digunakan terdiri dari penggunaan teknik mosaik fusi data dan sintesa data. Citra bebas awan sebagai hasil restorasi mempunyai karakter tampak asli (khusus untuk pendektan sintesa), distribusi tingkat kabuan yang konsisten serta ketelitian klasifikasi yang optimal.
2001
JIKT-1-1-Mei2001-31
Artikel Jurnal  Universitas Indonesia Library
cover
Abstrak :
Salah satu cara untuk mengendalikan kamera web adalah dengan menggunakan DirectShow yang terintegrasi di dalam DirectX. DirectShow berperan sebagai API sehingga penggunaannya lebih mudah. Selanjutnya kamera web ini akan digunakan untuk mendeteksi gerakan obyek seperti halnya kamera pengawas. Metodenya adalah dengan membandingkan gambar acuan dengan gambar yang diambil kemudian. Jika ada perbedaan pada kedua gambar tersebut berarti sebuah gerakan telah terdeteksi.
Abstract
One of many ways to take control a web cam is by using DirectShow which is integrated in DirectX. DirectShow acts like an API therefore it is easier to use. Afterwards, web cam will be implemented to detect object?s motion as well as camera surveillance. The method is by comparing a reference image with other image which is taken lately. If there are differences between those image it means motion has been detected.
[Direktorat Riset dan Pengabdian Masyarakat Universitas Indonesia, Universitas Kristen Satya Wacana, Salatiga. Fakultas Teknik Elektronika dan Komputer], 2009
pdf
Artikel Jurnal  Universitas Indonesia Library
cover
Nilsson, Fredrik
Boca Raton: CRC Press, Taylor & Francis Group, 2009
621.389 28 NIL i
Buku Teks  Universitas Indonesia Library
cover
Abstrak :
Surveillance presents a conundrum: how to ensure safety, stability, and efficiency while respecting privacy and individual liberty. From police officers to corporations to intelligence agencies, surveillance law is tasked with striking this difficult and delicate balance. That challenge is compounded by ever-changing technologies and evolving social norms. Following the revelations of Edward Snowden and a host of private-sector controversies, there is intense interest among policymakers, business leaders, attorneys, academics, students, and the public regarding legal, technological, and policy issues relating to surveillance. This Handbook documents and organizes these conversations, bringing together some of the most thoughtful and impactful contributors to contemporary surveillance debates, policies, and practices. Its pages explore surveillance techniques and technologies; their value for law enforcement, national security, and private enterprise; their impacts on citizens and communities; and the many ways societies do - and should - regulate surveillance.
Cambridge: Cambridge University Press, 2017
e20518800
eBooks  Universitas Indonesia Library
cover
Asha Alifa Khairunnisa
Abstrak :
ABSTRACT
Pesatnya kemajuan teknologi membuat jenis identitas menjadi sangat bervariasi. Kemajuan teknologi juga memungkinkan penggunaan satu identitas, khususnya identitas digital digunakan untuk berbagai kegunaan. Penggunaan identitas untuk berbagai kegunaan tidak dapat terlepas dari pelaksanaan interoperabilitas data pribadi yang harus diperhatikan keamanan dan kerahasiaannya. Pelaksanaan interoperabilitas tersebut menimbulkan pertanyaan terkait ketentuan yang berlaku mengenai penyelenggara penyedia identitas di Indonesia serta bagaimanakah tanggung jawab penyelenggara penyedia identitas terhadap data pribadi di Indonesia dalam kaitannya dengan interoperabilitas data pribadi dan bagaimana penerapan interoperabilitas data pribadi tersebut di Indonesia. Penelitian merupkan penelitian hukum yuridis normatif. Mengingat identitas yang mempunyai sifat mudah dipindahkan portable adalah identitas digital yang online, ketentuan mengenai penyelengara penyedia identitas tidak hanya mengacu pada UU Administrasi Kependudukan. Namun, juga akan mengacu pada UU ITE, Peraturan Pemerintah tentang Penyelenggaraan Sistem dan Transaksi Elektronik serta Peraturan Menteri Kominfo tentang Perlindungan Data Pribadi dalam sistem Elektronik. Meskipun praktik interoperabilitas data pribadi di Indonesia telah banyak dilaksanakan, tetapi ketentuan tentang interoperabitas data pribadi, belum diatur secara komperehensif di Indonesia. Terkait masalah tanggung jawab terhadap data pribadi, penyelenggara penyedia identitas harus memperhatikan asas perlindungan data pribadi di Indonesia, terutama mengenai persetujuan, relevansi dengan tujuan dan kebutuhan serta penghormatan data pribadi sebagai privasi.
ABSTRACT
The rapid technological advances the type of identity varies greatly. Technological development also allows the use of an identity, particularly digital identity, used for various purposes. The use of identity for various purposes can not be separated from the implementation of the right to data portability that must be secured and confidential. The implementation of the right to data portability raises questions concerning the applicable law of the identity providers and the liability of the identity providers regarding personal data in relation to the right to data portability in Indonesia and and alaso regarding the implementation of the right to data portability in Indonesia.This research is conducted by normative juridical approach. Concerning the identity that has portable nature is an online digital identity, provisions regarding the identity providers in Indonesia not only subject to the Population Administration Act, but also subject to to the Law on Electronic Information and Transaction, the Government Regulation on Electronic System and Transaction Implementation and Ministry of Communication and Informatics Regulation on Personal Data Protection In Electronic system. Although the right to data portability has been widely practiced in Indonesia, the implementation of the right to data portability in Indonesia itself has not been regulated in a specific provision.On the subject of identity providers liability regarding personal data, identity providers should consider the principles of protection of personal data in Indonesia, particularly on approval, relevance to objectives and needs and respect the personal data as a privacy.
2017
S69514
UI - Skripsi Membership  Universitas Indonesia Library
cover
Neely, Matthew
Abstrak :
In many penetration tests, there is a lot of useful information to be gathered from the radios used by organizations. These radios can include two-way radios used by guards, wireless headsets, cordless phones and wireless cameras. Wireless Reconnaissance in Penetration Testing describes the many ways that a penetration tester can gather and apply the information available from radio traffic. Stopping attacks means thinking like an attacker, and understanding all the ways that attackers gather information, or in industry terms profile, specific targets. With information from what equipment to use and how to find frequency information, to tips for reducing radio information leakage, to actual case studies describing how this information can be used to attack computer systems, this book is the go-to resource for penetration testing and radio profiling. Author Matthew Neely is a respected and well-known expert and speaker on radio reconnaissance and penetration testingIncludes real-world case studies of actual penetration tests using radio profiling. Covers data leakage, frequency, attacks, and information gathering.
Amsterdam : Elsevier/Syngress, 2013
621.389 NEE w
Buku Teks  Universitas Indonesia Library
cover
Harding, Luke, 1968-
Abstrak :
The story of Edward Snowden and his shocking surveillance revelations. Edward Snowden was a 29-year-old computer genius working for the National Security Agency when he shocked the world by exposing the near-universal mass surveillance programs of the United States government. His whistleblowing has shaken the leaders of nations worldwide, and generated a passionate public debate on the dangers of global monitoring and the threat to individual privacy. In a tour de force of investigative journalism that reads like a spy novel, award-winning Guardian reporter Luke Harding tells Snowden's astonishing story--from the day he left his glamorous girlfriend in Honolulu carrying a hard drive full of secrets, to the weeks of his secret-spilling in Hong Kong, to his battle for asylum and his exile in Moscow. For the first time, Harding brings together the many sources and strands of the story--touching on everything from concerns about domestic spying to the complicity of the tech sector--while also placing us in the room with Edward Snowden himself. The result is a gripping insider narrative--and a necessary and timely account of what is at stake for all of us in the new digital age.
London : Guardian, 2016
327.127 HAR s
Buku Teks  Universitas Indonesia Library
cover
Kiefer, Peter
Abstrak :
This text provides an overview on plan and intention recognition, ranging from the late 1970s to very recent approaches. This overview is unique as it discusses approaches with respect to the specificities of mobile intention recognition. This book covers problems from research on mobile assistance systems using methods from artificial intelligence and natural language processing.
New York: Springer, 2012
e20406471
eBooks  Universitas Indonesia Library
<<   1 2   >>