{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,9]],"date-time":"2024-11-09T13:40:01Z","timestamp":1731159601977,"version":"3.28.0"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031477140"},{"type":"electronic","value":"9783031477157"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-47715-7_36","type":"book-chapter","created":{"date-parts":[[2024,1,29]],"date-time":"2024-01-29T20:02:44Z","timestamp":1706558564000},"page":"523-535","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Data Protection Design for Online Exam Proctoring in Compliance with the Indonesian Personal Data Protection Law"],"prefix":"10.1007","author":[{"given":"Sidik","family":"Prabowo","sequence":"first","affiliation":[]},{"given":"Maman","family":"Abdurohman","sequence":"additional","affiliation":[]},{"given":"Hilal Hudan","family":"Nuha","sequence":"additional","affiliation":[]},{"given":"Sarwono","family":"Sutikno","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,1,30]]},"reference":[{"key":"36_CR1","unstructured":"Dewan Perwakilan Rakyat-indonesia: UU no 27 Tahun 2022 Tentang Perlindungan Data Pribadi (2022)"},{"key":"36_CR2","doi-asserted-by":"crossref","unstructured":"Hisbulloh, M.H.: Urgensi Rancangan Undang-Undang (RUU) Perlindungan Data Pribadi. Jurnal Hukum (2021)","DOI":"10.26532\/jh.v37i2.16272"},{"key":"36_CR3","doi-asserted-by":"publisher","first-page":"3413","DOI":"10.1021\/acs.jchemed.0c00546","volume":"97","author":"TM Clark","year":"2020","unstructured":"Clark, T.M., Callam, C.S., Paul, N.M., Stoltzfus, M.W., Turner, D.: Testing in the time of COVID-19: a sudden transition to unproctored online exams. J. Chem. Educ. 97, 3413\u20133417 (2020)","journal-title":"J. Chem. Educ."},{"key":"36_CR4","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1111\/bjet.13182","volume":"53","author":"K Lee","year":"2022","unstructured":"Lee, K., Fanguy, M.: Online exam proctoring technologies: Educational innovation or deterioration? Br. J. Educ. Technol. 53, 475\u2013490 (2022)","journal-title":"Br. J. Educ. Technol."},{"key":"36_CR5","doi-asserted-by":"publisher","first-page":"6589","DOI":"10.1007\/s10639-021-10458-7","volume":"26","author":"FF Kharbat","year":"2021","unstructured":"Kharbat, F.F., Abu Daabes, A.S.: E-proctored exams during the COVID-19 pandemic: a close understanding. Educ. Inf. Technol. (Dordr) 26, 6589\u20136605 (2021)","journal-title":"Educ. Inf. Technol. (Dordr)"},{"key":"36_CR6","doi-asserted-by":"publisher","first-page":"1581","DOI":"10.1007\/s13347-021-00476-1","volume":"34","author":"S Coghlan","year":"2021","unstructured":"Coghlan, S., Miller, T., Paterson, J.: Good proctor or \u201cBig Brother\u201d? Ethics of online exam supervision technologies. Philos. Technol. 34, 1581\u20131606 (2021)","journal-title":"Philos. Technol."},{"key":"36_CR7","doi-asserted-by":"crossref","unstructured":"Hertianto, M.R.: Sistem Penegakan Hukum Terhadap Kegagalan Dalam Perlindungan Data Pribadi Di Indonesia. Kertha Patrika (2021)","DOI":"10.24843\/KP.2021.v43.i01.p07"},{"key":"36_CR8","doi-asserted-by":"crossref","unstructured":"Arruda, M.F., Bulc\u00e3o-Neto, R.F.: Toward a lightweight ontology for privacy protection in IoT. In: Proceedings of the 34th ACM\/SIGAPP Symposium on Applied Computing. Association for Computing Machinery, pp 880\u2013888. New York, NY, USA (2019)","DOI":"10.1145\/3297280.3297367"},{"key":"36_CR9","doi-asserted-by":"crossref","unstructured":"Rajagopalan, S.R., Sankar, L., Mohajer, S., Poor, H.V.: Smart meter privacy: a utility-privacy framework. In: 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm), pp .190\u2013195 (2011). Ieeexplore.ieee.org","DOI":"10.1109\/SmartGridComm.2011.6102315"},{"key":"36_CR10","doi-asserted-by":"crossref","unstructured":"Mrissa, M., Tbahriti, S.-E., Truong, H.-L.: Privacy model and annotation for DaaS. In: 2010 Eighth IEEE European Conference on Web Services, pp. 3\u201310 (2010). ieeexplore.ieee.org","DOI":"10.1109\/ECOWS.2010.11"},{"key":"36_CR11","doi-asserted-by":"crossref","unstructured":"Kammueller F (2018) Designing data protection for GDPR compliance into IoT healthcare systems. In: 2018 IEEE International Conference on Systems, Man, and Cybernetics (SMC), pp 3319\u20133324 (2018). ieeexplore.ieee.org","DOI":"10.1109\/SMC.2018.00562"},{"key":"36_CR12","unstructured":"Australian Government, \u201cPrivacy Act 1988,\u201d Cth, No. 119 (1988)"},{"key":"36_CR13","unstructured":"Jefatura, D., De Espa\u00f1a, R.: Spanish Fundamental Law on Data Protection and Digital Rights Guarantee (1999)"},{"key":"36_CR14","unstructured":"Japan: Act on the Protection of Personal Information Act No. 57 of ( 2003) (2003) Act on the Protection of Personal Information Act No. 57 of (2003)"},{"key":"36_CR15","unstructured":"Government of Singapore, \u201cPersonal Data Protection Act 2012,\u201d No. 26 (2012)"},{"key":"36_CR16","unstructured":"Republic of the Philippines, \u201cData Privacy Act of 2012,\u201d Republic Act No. 10173 (2012)"},{"key":"36_CR17","unstructured":"United Kingdom, \u201cData Protection Act 2018,\u201d c. 12 (2018)"},{"key":"36_CR18","unstructured":"Government of Thailand, \u201cPersonal Data Protection Act B.E. 2562 (2019) of Thailand (PDPA),\u201d B.E. 2562 (2019)"},{"key":"36_CR19","unstructured":"Government of South Korea, \u201cPersonal Information Protection Act 2020,\u201d No. 16930 (2020)"},{"key":"36_CR20","doi-asserted-by":"publisher","unstructured":"Nugroho, M.A., Abdurohman, M., Prabowo, S., Nurhayati, I.K., Rizal, A.: Intelligent Remote Online Proctoring in Learning Management Systems. In: So-In, C., Londhe, N.D., Bhatt, N., Kitsing, M. (eds.) Information Systems for Intelligent Systems. Smart Innovation, Systems and Technologies, vol 324. Springer, Singapore (2023). https:\/\/doi.org\/10.1007\/978-981-19-7447-2_21","DOI":"10.1007\/978-981-19-7447-2_21"},{"key":"36_CR21","doi-asserted-by":"publisher","first-page":"1052","DOI":"10.1007\/978-3-030-10576-1_248","volume-title":"Encyclopedia of Education and Information Technologies","author":"D Turnbull","year":"2020","unstructured":"Turnbull, D., Chugh, R., Luck, J.: Learning management systems, an overview. In: Tatnall, A. (ed.) Encyclopedia of Education and Information Technologies, pp. 1052\u20131058. Springer International Publishing, Cham (2020)"},{"key":"36_CR22","doi-asserted-by":"publisher","first-page":"72398","DOI":"10.1109\/ACCESS.2021.3079375","volume":"9","author":"M Labayen","year":"2021","unstructured":"Labayen, M., Vea, R., Fl\u00f3rez, J., Aginako, N., Sierra, B.: Online student authentication and proctoring system based on multimodal biometrics technology. IEEE Access 9, 72398\u201372411 (2021)","journal-title":"IEEE Access"},{"key":"36_CR23","doi-asserted-by":"crossref","unstructured":"Bittner, M., Kammuller, F. Translating fusion\/UML to object-Z. In: First ACM and IEEE International Conference on Formal Methods and Models for Co-Design, 2003. MEMOCODE\u201903. Proceedings, pp 49\u201350 (2003)","DOI":"10.1109\/MEMCOD.2003.1210087"},{"key":"36_CR24","doi-asserted-by":"publisher","first-page":"410","DOI":"10.1145\/363516.363526","volume":"9","author":"AC Myers","year":"2000","unstructured":"Myers, A.C., Liskov, B.: Protecting privacy using the decentralized label model. ACM Trans. Softw. Eng. Methodol. 9, 410\u2013442 (2000)","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"36_CR25","doi-asserted-by":"crossref","unstructured":"Myers, A.C., Liskov, B.: Complete, safe information flow with decentralized labels. In: Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186), pp 186\u2013197 (1998) .ieeexplore.ieee.org","DOI":"10.1109\/SECPRI.1998.674834"}],"container-title":["Lecture Notes in Networks and Systems","Intelligent Systems and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-47715-7_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,9]],"date-time":"2024-11-09T13:23:13Z","timestamp":1731158593000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-47715-7_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031477140","9783031477157"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-47715-7_36","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"30 January 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IntelliSys","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Intelligent Systems Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Amsterdam","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The Netherlands","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 September 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 September 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"intellisys12023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}