Claim Missing Document
Check
Articles

Found 2 Documents
Search

EVALUATION OF THE EFFECTIVENESS OF BASIC TRAINING FOR CIVIL SERVANT CANDIDATES IN IMPROVING PUBLIC SERVICES IN CENTRAL JAVA Erni Irawati; Endang Larasati; Hardi Warsono; Ida Hayu Dwimawanti
International Journal of Social Science Vol. 1 No. 3: October 2021
Publisher : Bajang Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53625/ijss.v1i3.414

Abstract

Improving the quality of human resources for the apparatus is carried out through the recruitment of civil servants with more transparency and integrity by screening qualified civil servants, as the main engine for running the government. Furthermore, the development of Human Resources of state civil apparatus becomes the authority of the Region and the assistance task which is assigned to the Region. In this study, four aspects related to the evaluation of the effectiveness of basic training for civil servant candidates were seen; which are as follows, Integrated Competence Development, State Defense Attitudes and Behaviors, Actualization of the Basic Values ​​of Civil Servants, and the Position and Role of Civil Servants in the Unitary State of the Republic of Indonesia. Competence is needed in service functions. Therefore, civil servants need to be equipped with practical education, not just theoretical. Basic Training for the Prospective Civil Servant as the initial provision for Prospective Civil Servants is a strategic training in which there are dominant aspects contained in the learning curriculum to be actualized later in the work and duties of the participants who are functions as civil servants. Curriculum development and learning systems that emphasize the transfer of culture or how those values ​​will be integrated in the attitudes and behavior of the apparatus, become a culture, work ethic that supports the professionalism of their duties and positions. Analysis of the effectiveness of the results of the training on the competence of the training alumni is to conduct an assessment of the achievement of objectives, and the standard competence that have been set. In this case, the standard competence which is used is based on the Regulation of the Minister of Administrative Reform and Bureaucratic Reform of the Republic of Indonesia Number 38 of 2017 which is concerning about Competency Standards for State Civil Apparatus Positions
Protection of Personal Data in the Use of Digital ID Cards against Misuse of Data from Cyber Hack Mia Rizki; Augustin Rina Herawati; Endang Larasati
Journal La Sociale Vol. 5 No. 2 (2024): Journal La Sociale
Publisher : Borong Newinera Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37899/journal-la-sociale.v5i2.1132

Abstract

Data misuse from cyber hack in Indonesia is still high, judging from data leakage cases in Indonesia, from January to June 2023 there were 35 cases. Data leaks related to personal data on identity cards totaling 377 million data leaked until 2023, the data is contained on the dark web in the form of NIK, full name, date of birth, birth certificate number, blood type, religion, marital status and so on. Writing using a qualitative descriptive approach, this study uses literature studies, namely data collection techniques by conducting a review study of books, literature, records, and reports related to Digital ID cards and data security. This research also uses a fact approach, a case approach to data misuse by cyber hackers, and a statutory approach. The type of data used is secondary data. There are still many personal data leaks in various factors including human error, malware, system security weaknesses, insider threats, lack of security awareness. The impact of data leaks are fraud and identity theft, threatened privacy, financial fraud, national security threats. There are various alternative recommendations to minimize data leakage, this anticipation can be done by the community, students, and the government. This anticipation is in the form of changing passwords regularly, being careful in using applications or social media that have viruses, avoiding uploading photos of ID cards, conducting cyber security training, community empowerment, bureaucracy forming a special IT department responsible for building virtual protection systems, cooperation with third parties.