Mohamad Fachri, Emilia Fitriana Dewi. "Personal Data Usage in Marketing Activity to Comply With PDP Law in Indonesian Digital Commerce Company (Case Study: PT Pitjarus Teknologi)" International Research Journal of Economics and Management Studies, Vol. 3, No. 1, pp. 79-88, 2024.
PT Pitjarus Teknologi is a digital commerce company in Indonesia that understands and applies the Personal Data Protection (PDP) Law, especially in its marketing practices. The goal is to create sales and marketing strategies that align with the PDP Law and uphold customer trust. The research explores individuals’ grasp of PDP principles, the ease of incorporating the law into marketing technologies, perceived benefits of compliance, assurance of proper procedures, and how customers feel about their data being used in marketing. Data is gathered from PT Pitjarus Teknologi’s Business Development and Marketing Division, using questionnaires and interviews, along with customers engaged in the company’s marketing efforts. Based on these findings, the study recommends enhanced education and training to better understand and apply the PDP Law in Indonesia, especially in marketing. It also advises organizations, including PT Pitjarus Teknologi, to be cautious when using personal data for marketing, considering the potential benefits and risks associated with different types of personal data.
[1] Al-Emran, M., Mezhuyev, V., & Kamaludin, A. (2019). Towards the development of an information privacy protection awareness initiative for data subjects and organizations. Journal of Information Privacy and Security, 15(1), 1-16.
[2] Baldwin, R., & Black, J. (2008). Really responsive regulation. The Modern Law Review, 71(1), 59–94.
[3] Culnan, M. J., & Armstrong, P. K. (1999). Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation. Organization Science, 10(1), 104-115.
[4] Dhagarra, D., Goswami, M., & Kumar, G. (2020). Impact of Trust and Privacy Concerns on Technology Acceptance in Healthcare: An Indian Perspective. International journal of medical informatics, 141, 104164. https://doi.org/10.1016/j.ijmedinf.2020.104164
[5] Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 319-340.
[6] Dinev, T., & Hart, P. (2006). An extended Privacy Calculus model for e-commerce transactions. Information Systems Research, 17(1), 61-80.
[7] European Union. (2016). Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation). Official Journal of the European Union.
[8] Fox, G., Lynn, T. and Rosati, P. (2022), “Enhancing consumer perceptions of privacy and trust: a GDPR label perspective,” Information Technology & People, Vol. 35 No. 8, pp. 181-204. https://doi.org/10.1108/ITP-09-2021-0706
[9] Gadermann, A. M., Guhn, M., & Zumbo, B. D. (2012). Investigating the substantive aspect of construct validity for the Satisfaction with Life Scale adapted for children: A focus on cognitive processes. Social Indicators Research, 106(1), 1-14.
[10] González-Estrada, E., & Cosmes, W. (2019). Shapiro–Wilk test for skew normal distributions based on data transformations. Journal of Statistical Computation and Simulation, 89(17), 3258-3272.
[11] Government of Indonesia. (2022). Law No. 27 of 2022 on Personal Data Protection.
[12] Hair Jr., J. F., Hult, G. T. M., Ringle, C., & Sarstedt, M. (2016). A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM). Sage Publications.
[13] Hamed, Armesh., Salarzehi, Habibollah., Yaghoobi, Noor., Alireza, Heydari., & Davoud, Nikbin. (2010). The Effects of Security and Privacy Information on Trust & Trustworthiness and Loyalty in Online Marketing in Malaysia. International Journal of Marketing Studies. 2. 10.5539/ijms.v2n2p223.
[14] Hanusz, Z., & TarasiNska, J. (2014). Simulation Study on Improved Shapiro–Wilk Tests for Normality. Communications in Statistics - Simulation and Computation, 43(8), 2093-2105.
[15] Harwell, M. R., Rubinstein, E. N., Hayes, W. S., & Olds, C. C. (1996). Summarizing Monte Carlo results in methodological research: the one- and two-factor fixed effects ANOVA cases. Journal of Educational Statistics, 21(2), 161-189.
[16] Hassandoust, F., & Johnston, A. C. (2023). Peering through the lens of high‐reliability theory: A competencies driven security culture model of high‐ reliability organisations. Journal of Contingencies and Crisis Management, 31(1), 1-14.
[17] Hu, Q., Dinev, T., Hart, P., & Cooke, D. (2012). Managing employee compliance with information security policies: The critical role of top management and organizational culture. Decision Sciences, 43(4), 615-660.
[18] Karlsson, M., Karlsson, F., Åström, J. and Denk, T. (2022), The effect of perceived organizational culture on employees’ information security compliance, Information and Computer Security, Vol. 30 No. 3, pp. 382-401. https://doi.org/10.1108/ICS-06-2021-0073
[19] Kim, D. J., Ferrin, D. L., & Rao, H. R. (2008). A trust-based consumer decision-making model in electronic commerce: The role of trust, perceived risk, and their antecedents. Decision Support Systems, 44(2), 544-564.
[20] Mayer, R. C., Davis, J. H., & Schoorman, F. D. (1995). An integrative model of organizational trust. Academy of Management Review, 20(3), 709- 734.
[21] McKnight, D. H., Choudhury, V., & Kacmar, C. (2002). Developing and validating trust measures for e-commerce: An integrative typology. Information Systems Research, 13(3), 334-359.
[22] Renny, S., Guritno, S., & Siringoringo, H. (2013). Perceived usefulness, ease of use, and attitude towards online shopping usefulness towards online airlines ticket purchase. Procedia - Social and Behavioral Sciences, 81, 212-216.
[23] Sakthivela, R., & William, M. L. (2015). An Extension of Shapiro-Wilk’s Test for Multivariate Normality and Power Investigation for Contaminated Alternatives. In Proceedings of the International Conference on Soft Computing Systems (pp. 1-10).
[24] Shillair, R., Esteve-González, V., & González, A. (2021). Cybersecurity education, awareness raising, and training initiatives: National level evidence- based results, challenges, and promise. Computers & Security, 105, 102235. https://doi.org/10.1016/j.cose.2021.102235
[25] Suryani, D., & Rakhmawati, A. (2022). Digital medical data protection compliance among medical staffs in Indonesia. IOP Conference Series:Materials Science and Engineering, 1339(01), 012100. doi:10.1088/1742-6596/1339/1/012100
[26] Tsai, J. Y., & Men, L. R. (2017). Privacy and security concerns, trust, and the moderating role of cultural values in smart home adoption: A moderated mediation analysis. Journal of Business Research, 70, 339-350.
[27] Venkatesh, V., & Davis, F. D. (2000). A theoretical extension of the Technology Acceptance Model: Four longitudinal field studies. Management Science, 46(2), 186-204.
Personal Data Protection (PDP) Law, Perceived Ease of Use, Perceived Usefulness, Personal Data Usage, Compliance with Regulations, Customer Trust, Awareness and Understanding of PDP Law, Proper Procedures and Safeguards, Customer Reactions and Feelings, and Success of Marketing Activities.