Вы находитесь на странице: 1из 7

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/261096293

Privacy and trust in the Islamic perspective: Implication of the digital age

Conference Paper · March 2013


DOI: 10.1109/ICT4M.2013.6518898

CITATIONS READS

5 1,435

2 authors:

Muharman Lubis Mira Kartiwi


Telkom University International Islamic University Malaysia
42 PUBLICATIONS   123 CITATIONS    118 PUBLICATIONS   591 CITATIONS   

SEE PROFILE SEE PROFILE

Some of the authors of this publication are also working on these related projects:

Information Security Awareness Maturity Model View project

E-Commerce in Developing Countries View project

All content following this page was uploaded by Muharman Lubis on 28 August 2018.

The user has requested enhancement of the downloaded file.


2013 5th International Conference on Information and Communication Technology for the Muslim World.

Privacy and Trust in the Islamic Perspective:


Implication of the Digital Age
Muharman Lubis and Mira Kartiwi
Department of Information Systems
Faculty of Information and Communication Technology
International Islamic University Malaysia
muharman.lubis@gmail.com, mira@iium.edu.my

Abstract— In the name of Allah, most Gracious and most perform a particular action important to the trustor,
Merciful. The digital age is slowly degrading the limitation and irrespective of the ability to monitor or control that other
common understanding of privacy and trust through digital life, party”.
which has open world concept. It has become normal procedure
when the user must submit their personal details for digital People who engage with technology implementation and
service such as social networking, electronic commerce, personal development should realize and consider ethics in their flow of
hosting, etc. Meanwhile, to be able to revealing their privacy work. It is believed that security of information can be
willingly, user put their trust on organization to use their data established not only through technology measures but also
based on agreement. In this sense, user expects their privacy with people's intention and behavior. When it comes to ethical
right to be protected securely and actively. The dilemma rules, including ones in business, the Qur’an and Sunnah can
occurred due to commercialization, consumerism and legislation be used a set of ethical terms to describe the concept of
as interaction issues, which shift the focus of user to identify the privacy and trust with goodness and equity, equilibrium and
importance of their personal data and organization to analyze the justice, truth and right, known and honesty, sincerity and
process of data management. On the other hand, Islam gave the piety, protection of minorities and a wider accountability,
basic understanding in privacy and trust that emphasize protection of confidentiality and transparency [16]. However,
important factor in human determination and intention. This the ability to prevent publication of personal data important to
paper will focus on how to define the standard and limitation of be begins by the hand of individual to control the information
the concept privacy and trust based on Islamic perspective in
and its flow. In such instances, privacy is argued to be a
aligning with the implication of digital age related to interest,
classification and purpose.
personal form of power of the citizen. Meanwhile, Warren
and Brandeis [6] highlight limitations to privacy which could
Keywords— Privacy, Trust, Islamic Perspective, Implication, be determined by the way of analogy with laws of slander and
Digital Age libel. The latter, for example, could not be used to prevent
publication of information of public officials running for
office. Hence a boundary was envisaged, in which the law
I. INTRODUCTION could determine where a person could and could not have a
Nowadays, the fast movement on technology around the ‘right to privacy’. Thus this foundation [6] to the effect that
globe can be seen easily by clicking on the fingertips to privacy was control over the dissemination of information
retrieve or obtain important and useful information for our about oneself, albeit, limited in certain circumstances and
daily life. Therefore, due to process of extraction and influence the use of trust as well.
collection of information, users engage with revealing their A person’s right to life, personal security, privacy and
personal data for the trust requirement with organization. For ownership are the most basic of all the fundamental rights and
certain reason, users are willing to disclose their privacy to liberties and are of concern to all legal systems and traditions.
manifest the participation of trend as common sacrifice to be To address them side by side with one another, as is attempted
made. Meanwhile, the level of popularity from provider or in the present volume, is reflective of their natural priority and
sites brings the ease of putting trust of the user without significance. These rights are simultaneously the most
considering whether the protection implemented or still on the vulnerable to aggression and abuse. The aim of this paper to
concept. In this sense, privacy is practically examined as review the implication of digital age towards privacy and trust
emotional and ethical concept while trust as continuous interrelationship based on Islamic perspective. The important
measure in accepting the risk. Key to any discussion of of approach align with Surah Al-Baqarah verse 187 and 229,
privacy is a clear specification of what is at stake (what is Surah An-Nisa’ verse 14, Surah Al-Maidah verse 45-50 and
being kept private) and the parties against which privacy is Surah Taubah verse 63, emphasized on Muslim obligatory to
being invoked (who should not be privy to the information obey the provision and law decided by Allah without
being kept private) [10]. On the other hand, trust is defined [4] exception, with limited to set the attribute of Islamic
as “the willingness of a party to be vulnerable to the actions of understanding and practices with current implication of digital
another party based on the expectation that the other will age. It is realized that this view are not comprehensive yet and

978-1-4799-0136-4/13/$31.00 ©2013 IEEE


still at beginning, the author pray to Allah for the reward for together with greetings as the respected approach to ask
its good intention and forgiveness for its weaknesses. permission from the owner. The permission from the owner is
the only way to validate and authorize for the visitor to enter
II. MEANS OF DEFINING PRIVACY AND TRUST the house [1]. In this verse, the area inside the house solely
BASED ON ISLAMIC PERSPECTIVE and completely in the hand of owner to allow someone enter
or not. Here, the area is defined through blocking factor in
Generally, Qur’an and Sunnah (Hadith) lie as the primary protected wall and door as the component of authentication.
sources of law and reference in Islam as the way of life for
Muslim. Every discussion to find solution of certain issue Moreover, other issue relate to authorization to deliver
should point the source (dalil) from both before decide the access limitation explained concussively in same Surah verse
conclusion with Qur’an and Sunnah as the priority 58. Tafsir Tabari mentioned the general rule from this verse,
respectively while ijma’ (agreement between Muslim jurist) which indicated the slave (whom your right hands possess)
and qiyas (adjustment) became the secondary sources. includes man and female as well as those who have not yet
Apparently, it was found in certain case the difficulties to reached puberty to ask permission if they want enter or access
agree in one term because several reason, like the sources to the area of their Master especially when taking a rest and
refer (Qur’an and Sunnah) seem contradict each other, the relaxing in three time of privacy. Although, the person
difference understanding of thought (madh’hab) or method involved in this case are the internal staff or even have close
(minhaj) and the custom among society (urf). For this reason, relationship with the master, still the verbal or might be note is
it is important to look back on the tradition of prophet (peace compulsory to allow their access. Meanwhile, Tafsir Ibnu
be upon him) understanding of the primary source and did Katsir described what the three times are; before Fajr prayer,
practice in their activity. Qailullah (take a nap in afternoon) and after Isya prayer,
whereby relative or not should respect of the individual right
In this sense, the scholars (ulama) establish the advice and of privacy, in the sense, those time are really valuable and
stipulate the guidance (fatwa) based implementation on the important times for Master to sleep or being alone without
beginning phase of Islamic tenets and teachings. The Muslim being distracted or disturbed [1]. On the other hand, to define
society will verify and crosscheck the evidence that scholar trust and its importance, Qur’an explained its relationship with
used logically or with other scholar. The issues occur in responsibility and fairly, like when Allah commanded in Surah
relation with the advancement of technology, which the Al-Baqarah verse 188, An-Nisa’ verse 58 and Al-Anfal verse
primary sources do not give clear and implicit explanation to 27. These verses emphasizes to the Muslim to be careful in
certain case. Therefore, the usage of technology in daily behaving and executing their activities because what they
activities has been encourage as long as it provides the support want to do will determine the quality of just and trust.
and help for human for their benefit, focused on Islamic
tenets. The invention of technology can be assumed as the gift Trust is really necessary to build and maintain friendships
from Allah to the mankind while the human as khalifah or relationships in term of any kind activities. In the certain
(leader) are obligated to praise Allah for the gift. situation, of course, the person cannot put trust automatically
without realizing or considering various factors like perceived
To some extent, the right of privacy can be divided on the benefits, privacy concern, risk management, virtues and value,
three points, which are property, meeting/conversation and etc. Nevertheless, the trust is essential in human interaction
evidence [12]. Fundamentally, unlike the Islamic Law which and communication the sign of good character, improve the
fixed and unchanged, mostly the characteristic of modern law commitment, decrease the pressure and burden and various
as the resulted derived from majority votes or discussion function, if the person place in the right spot. In Hadith
among legislator tend to changes periodically through certain Bukhari, no. 42; Abu Huraira said that prophet Muhammad
mechanism followed by some driver significantly. Moreover, (peace be upon him) decreed, “If the mandate (trust) is being
Islam protects the privacy of people tremendously apart from wasted, then wait for apocalypse (Day of Resurrection)". He
penetration both criminal and civil legal. Obviously, people said, "How can we waste it?" Prophet (peace be upon him)
expected to concern about their responsibility only and said, "If the case (affair) submitted to a non-expert, then wait
excluded other own business. Normally, the attempt to make for judgment day”. Furthermore, in Hadith Muslim, no. 3268;
gossip or talk-behind the person are not encourage and Abdullah ibn Mas’ud from Prophet (peace be upon him) said,
forbidden, as recorded in Hadith Arbain Nawawi, no. 12 by "For every person who treacherous will be given an ensign on
Tirmidhi that Prophet (peace be upon him) said “From the the Day of Judgment that says’ this is a betrayal of the so and
perfection of a person’s good faith in Islam is leaving alone so". In aligning with previous two Hadiths, in Surah Al-
what does not concern him” [2]. From this Hadith showed to Hujraat verse 12, Allah said the forbidden things should be
us the importance of being determined and concentrated to the avoided for Muslim, which is in relation of appreciating
issues relevant and related to us only in improving our others’ privacy and maintaining trust.
capacity and capability.
Respectively, Tafsir Tabari explained the verse as
In Surah An-Nur verse 27-28 mentioned that person forbidden command from Allah almighty, to having bad
forbidden to enter the other’s property if he/she does not have perception to the others in general situation, talking about the
permission from the owners that become the obligation for the weaknesses of somebody to the others for fun or unjustly
puberty Muslim. In Tafsir Tabari, in explaining this verse, it reason and looking for the vulnerabilities of Muslim brother
emphasized of the importance in giving greetings (salam) and sister. Moreover, Tafsir Ibnu Katsir cited Hadith from
before entering someone house. It has the function for Abu Dawud, Malik and quote of Umar ibn Khattab which
confirmation by saying something or giving sign, it can be by added the important of having preventive approach to
saying Islamic way of regard; assalamu’alaikum or ‘may I avoiding the suspicious of Muslim brother through spying,
come in’ or other way around. Meanwhile, Tafsir Ibnu Katsir hatred, hostile, envious, jealousy and ghibah [1]. Privacy and
paraphrased similar means which is knocking door three times trust are mutually inclusive, which any of both components
cannot happen successfully without the other. Person will digital reflection influence the concept and interrelationship
reluctant to reveal their personal data if they do not have trust. between privacy and trust.
On the other hand, they cannot trust somebody easily if they
do not reveal or hide their personal data. These To unprecedented event or emerging concern because
interrelationships between privacy and trust show the different specific occasion or blowups, lead to debate on limitation of
of them in the form of legal document and human expression privacy and trust. The root motivation is related to
to such object. In addition, in Sunan Abu Dawood book 36, communication goals for maintaining relationships and
No. 4862, narrated by Abu Barzah al-Aslami, The Prophet prevention approach for securing the assets. In addition,
(peace be upon him) said: “O community of people, who cultural and development aspects can have as great an impact
believed by their tongue, and belief did not enter their hearts, on the protection of privacy as the legal rights do themselves.
do not back-bite Muslims, and do not search for their faults, The willingness and ability of industry to support consumer
for if anyone searches for their faults, Allah will search for his privacy presumably reflects both the perceived benefits and
fault, and if Allah searches for the fault of anyone, He the availability of resources. Separating out where differences
disgraces him in his house”. Meanwhile, in Shahih Muslim in privacy are related to culture or development is not always
book 32, No. 6214, Abu Huraira reported Allah's Messenger easy and there is a significant interplay between national
(peace be upon him) as saying: “Avoid suspicion, for security interests and privacy protection [10].
suspicion is the gravest lie in talk and do not be inquisitive In nutshell, the digital age has re-defined communication
about one another and do not spy upon one another and do not and took it to different level that what we know yesterday
feel envy with the other, and nurse no malice, and nurse no quickly, while at the same time, we cannot abandon or isolate
aversion and hostility against one another. And be fellow- ourselves from the advancement of technology, even obvious
brothers and servants of Allah”. the disadvantages somehow, exceeded the benefits. The
disclosure obligation can be viewed as a positive contribution
III. TOWARD PRIVACY AND TRUST CONCEPT: to transparency. Moreover, the risk of disclosure likely creates
IMPLICATION FROM DIGITAL AGE or reinforces appropriate economic incentive for service
providers to take reasonable care with customer data and with
In digital age, Information Technology has essential network and service infrastructure [10]. Privacy rights are
function as tool, application or component used in an invoked to prevent the disclosure of such information. Further,
extensive, integrated and optimized manner to automate some kind of balancing of competing interests may be
process in improving quality and effectiveness. It has necessary. Lastly, balancing is a task that is essentially
transformed rapidly from a kind of luxury to somewhat a form political and thus the political and societal power of various
of a necessity. Although, it has brought an era with a vast of interest groups is critical to understanding how tradeoffs and
changes over the past few decades but one should never compromises on privacy develop [9]. Therefore, to develop
underestimate the implication towards its utilization, trend, further the definition of privacy, encompassing these three
integration and operational. For example are the cyber contingents, the following questions need to be addressed [7];
criminals’ activities whereby an individual or party doing In the circumstances above, has the citizen loss or gained
unlawful crimes through the Internet such as hacking the data privacy? Is the citizen aware in the circumstance that they
as the cases of fraud. In order to prevent such crimes from have lost or gained privacy? Does the citizen approve of the
happening, the relevant role must impose a strict law against loss or gain in privacy in the circumstance?
cyber-crimes or execute a heavy penalty to the offender of
misconducts. Apart from that, ethical dilemma be the major A knowledge-based and information-rich society is a
issue in term of the widespread of pornography and violent necessity for the survival of Muslims as reflected in a
materials across the world. Anyone who has an Internet Prophetic tradition that compares the Muslim Ummah
connection on his laptop or web electronic devices may access (society) like a single and unified body. In order to achieve
to those sites freely without any restriction even the ones who coordinated movement and cooperation, the flow of
underage. information must be free, mutual and productive. However,
these criteria still difficult to be achieve due to interest,
The discussion about privacy participation and trust regulation, intention and managerial constraint. Meanwhile,
measurement are varies greatly among culture and attached potential utilization of technology, positive impact towards the
into three major drivers [10] which are technological change, society and efficient implementation in the media can be
societal shift and media discontinuity. Many sites in the terms enhanced through critical evaluation and assessment of their
of transaction, marketing or political purpose are being use by judging the implication against the conceptual values of
reconfigured by new technologies of identification, Islam. Control over the process of governing information “that
monitoring, tracking, data analysis and control as the impact satisfies the business requirement of” enlarging and improving
of technological change. Popular activities include updating the scope of governance “by focusing on” similarities and
whereabouts, sharing photos, archiving events, getting updates differences between Islam and technological solution “is
on activities by friends, displaying a large social network, achieved by” recommending Islamic principles to be
presenting an idealized persona, sending messages privately embedded in and applied to governing processes “and is
and posting public testimonials [3] became the societal shift measured by” tangible and intangible improvements and
towards the digital life. Meanwhile, order processing system, amendments in practice [15]. One of the best controls over
customer service, documentation system and data warehouse society is through code of ethics, which based on Qur’an and
which previously delivered manual or through tangible Sunnah as the understanding of Prophet’s companion.
activities for service or product between customer, broker and
organization, but currently, the process are integrated into Furthermore, in Surah Al Mu’menun verse 8, it is clearly
fully or partially automated because cost, time and scope mentioned that trust are the component to be called as
reason implicated media discontinuity. These examples of Mu’min, the higher classification of follower of Prophet
Muhammad (peace be upon him) and slave of Allah that just relationship, it is useful for decision making. These
being Muslim. For a labeling system to be effective, the developments in information technology and practices have
criteria used by the labeling authorities and the way in which meant that is virtually no limit to the amount of information
compliance with those criteria is checked must be transparent that can be recorded, to the scope of analysis that can be done,
and must be effectively applied [10]. However, from study bounded only by human ingenuity and the information may be
[10] proved that trust is not as necessary in the building of stored virtually forever [8]. There are some of essential points
new relationships as it is in face to face encounters. They also regard privacy, in the sense of the party against which privacy
show that in an online site, the existence of trust and the is being invoked may have some reason for wanting access to
willingness to share information do not automatically translate the information being denied [9]. For instances, government
into new social interaction. The widespread of ordinary data investigate the behavior trend and essential items when
breaches around the world demonstrates how real the danger conducting ‘safety policy’ for citizen at night through CCTV
of critical infrastructure attack. As the hackers increase in or terrorist investigation; the curious parents who want to
terms of sophistication and technical expertise, and as the know what inside from ‘inbox’ email of their children to
critical information infrastructure becomes more massive and ensure whether their children consume drugs or not; many
intricate, it is more vulnerable to attack [14]. other cases happen when right of privacy is collided
subjectively because responsibility, authority or security.
Islamic law (Sharia) places great importance on the
protection of information by attaching to it a proprietary right Illegitimate intrusion of one's privacy and unlawful
and its infringement may result in civil and criminal liabilities, infringement of one's personal, sensitive or confidential
that information asset aptly constitutes property in law [13]. In information are disease that has to be prevented or even
the Islamic perspective, the right of privacy and trust mainly eliminated. Due to the harm this it potentially causes, this
concerned with boundaries, ownership and ethics with intrusion and infringement is not only an ethical misbehavior
emphasizing individual right in utilizing their belongings or but also a serious offence and threat to public security [13].
their properties such as prohibition to eavesdropping, the other Legal protection of privacy could in principle be enshrined as
should fulfill promises to keep the confidentiality of a legal right in a country’s constitution, effectively crafted as a
agreement and the attempt from individual to protect their legal right through judicial interpretation of the constitution,
assets, which assisted by government from interception. implemented through comprehensive privacy legislation, or
Nevertheless, this right is shifted which can be changed implemented through narrower and more targeted (e.g. sector-
through some justification from interest party. specific) legislation [10]. To tackle such issues the authority
might take several actions such as banning the relevant content
IV. PROTECTING PRIVACY AND TRUST from the view of the public or could be by filtering before
IN DIGITAL AGE releasing to the general audience.
Generally, the use of technology becomes such easy In relation with the implication, the privacy and trust are
process for individual and organization. The organization the major component got affected such as when individual do
simply introduce and advertise its company and product to invasion. One of the main problems arises from the issues of
customers, while the customer may gain all the information plagiarism of intellectual property. The cases of plagiarism
including good, pros and cons about the company and product. can be also prevented or reduced by setting up an organization
In aligning with the corporation purpose to increase the profit to monitor the works of academician and practical by enacting
significantly by recognizing the loyal customer as well the regulation. In other level, cyber-bullying and cyber-stalking
categories of their buyer so they can serve better later. also become most cases affected by personal data have been
However, in certain case, the potentiality to cross authority is revealed by respected organization because weak enforcement
obvious, whereby the corporation can submit the customer of regulation in monitor and control implementation of
data to third party for several reasons such as investment, privacy policy lead to less trust from citizen towards
transaction, exchange, etc. Meanwhile, the employee can use government and industry. Thus, companies must adequately
the data for their own benefit such as transaction which protect their business assets or be subject to stockholder suits
negatively can lead to harm customer physically or and customer information in their custody or they may face
emotionally such as cyber-stalking, robbery or kidnapping. legal suits on privacy infringement.
The prevention strategy is not relevant to only in the The rapid expansion of communication technology made it
regulation by government but also should be imbued in the easier to collect data and pass information among the
corporation policy and procedure as the impact tremendously employers, customer or people to establish what it is known as
can degrade customer trust to lower level. Therefore, using the e-communication. Industries have now the capabilities to
technology may increase the company cost, in certain case can improve their products in more efficient manner upon
degrade the financial status. For example, although machinery receiving instant feedback from immediate platform such as
can reduce the labor cost, the machine maintenance is social network. With this feedback, it is easier for them to
incredibly high related to spare part, maintenance cost and troubleshoot and improve the performance. Relatively
hiring the consultant or expert. speaking, corporation can evaluate the impact of other product
Most people have a strong sense of the personal from competitor by online or hire the competitor employee. It
information that is suitable, appropriate or relevant to revolutionized the communication process to beyond
particular situations, circumstances or relationships. When expectation and made more efficient to determine what-to-do
information is accessed suitable for a particular situation, it and what-will-we-do but it has brought ethical issues among
usually is readily shared; when appropriate information is society and intra-organization. The point in infringement is not
stored and applied appropriately to a certain circumstance, it related to the organization intention or objective in collecting
draws no objection and when information is relevant to such the data but the activities after that, which involve the attempt
to increase the profit but through illegitimate approach without
customer consent or clash with contract and agreement. It (something) to a person. He behaved in an uncivil manner
could be occurred due to lack of control among internal with him. This vexed the Companions whereupon prophet
organization towards their human resources or it might due to (peace be upon him) said: He who has a right is entitled to
lack enforcement and jurisdiction of the regulation in certain speak and said to them: Buy a camel for him and give that to
country. For company that uses technology for their efficient him. They said: We do not find a camel (of that age) but one
activities, they are required to provide training programme in with better age than that. He said: Buy that and give that to
order to make sure the staff that will use the system familiar to him, for best of you or best amongst you are those who are
the limits and boundaries. best in paying off debt. Furthermore, Prophet (peace be upon
him) also has emphasized the duty of protecting the privacy of
In digital age, the component of trust is believed will be people’s correspondence and communication whether or not
used in the process calculation of perceived cost. High trust they take place in a private place, even if a private
would lead to a perception of low cost and vice versa. Studies communication is conveyed on the public environment. Even
of interpersonal exchange situations confirm that trust is a those involved in shameful and sinful acts do not completely
precondition for self-disclosure, because it reduces perceived forgo their right to privacy, according to Prophet (peace be
risks involved in revealing private information [5] In aligning upon him), who commanded that Muslims not dishonor their
with Meeks [11] suggestion to protect the value of privacy and brothers and sisters who had been secretly involved in
trust, the citizen need push the envelope to protecting privacy disgraceful acts by revealing their secrets. Furthermore,
of forestalling the swift erosion of our personal lives and hold Prophet (peace be upon him) said “He, who looks into a letter
the government and those in authority over us accountable for belonging to his brother, looks into the hellfire” and “If you
protecting the information they are entitled to collect on us. have been embroiled in an embarrassing sin, which God chose
Several major developments also consciously have influence not to disclose, do not disclose it yourselves” [12].
privacy in terms of globalization, multimedia and
convergence. We have not yet arrived at a definition of Meanwhile, from the history books, ‘while passing by a
privacy but we can say that at least there are three main private place, Umar ibn al-Khattab, one of the Prophet’s close
contingents. Firstly, the contingent of a psychological state, in companions and the second Muslim Caliph (successor of the
that when a person feels their privacy has been violated, they Prophet as a political ruler) has overheard a group of people
feel a form of psychological invasion or hurt. Next, the chatting inside their private home, and it became obvious to
perception of the power to control what others may learn of him that they were drinking wine. As he was the head of the
the holder of the privacy. Lastly, the power to control the Islamic government at that time, and given that wine imbibing
circulation of information that others have acquired hold the is punishable under Islamic Law, Umar wished to carry out the
important roles. Ideally, to prevent social disruption and punishment himself. The drinkers argued that, if it were to be
support development; organization and government can delivered before a Muslim judge, Umar’s testimony must be
highlight its social integration function in the process of new disregarded, because it was attained in violation of the
products, in order to rebuild the integrated community while it prohibition of spying on people’s private places. Umar
can be displayed in two ways: providing the non-choice news accepted that reasoning and refrained from punishing these
to share common experience and expressing mainstream wine drinkers’ [12]. However, the enforcement is not
values through agenda setting to guide public opinion [18]. necessary directly by the victim unless the regulation allowed.
The evidence such as conveyance of testimony, document and
V. PRINCIPLES AND PRACTICES BASED ON recording are needed to establish justice in privacy which
ISLAMIC APPROACH should be legislated [5] and trust which should be formulized
like stated in Surah Al-Baqarah 283 that emphasized scribe
As our world connects more interactively and intricately and fear of Allah with trust.
more than before, a lot of disadvantages could endanger
people, though the benefits also should be optimized. In the case of Umar, as the Islamic practice in appreciating
Ironically, it sounds like unimportant thing when the case privacy right, though such person committed forbidden thing
reported only was recognized as small matter, while it could (called as disgrace); to not ask permission to enter somebody’s
destroy the nation especially relate to behavior and attitude property is categorized as privacy violation so the conveyance
like digital counterfeiting and illegal copies. In Shahih became invalid. Nonetheless, if the forbidden activities
Bukhari, 83, no. 26, Abu Huraira said that the Prophet (peace involve the other’s property, interest or life, it is called as
be upon him) said: “We (Muslims) are the last (to come) but crime and the individual of privacy right are not useful
(will be) the foremost (on the Day of Resurrection)." And anymore. It is necessary to limit privacy right to some extent
added, "If someone is peeping (looking secretly) into your by having criteria and standard, whether it implicates others or
house without your permission, and you throw a stone at him not. There is also some debate regard the testimony that
and destroy his eyes, there will be no blame on you”. In next conceal by other person who hear directly from the committed
hadith in same book, no 27, 38 and 39 mentioned the same person especially regard the issue on the debt, while some
punishment incurred for spying without permission, which the argue it’s allowed while other reluctant because at one case
victim can execute directly (on the spot) and with whatever Prophet (peace be upon him) ever reluctant to hear the
tools. Moreover, in Sunan Abu Dawood book 36, no, 5153, confession from the person who committed crime until three
the importance of privacy also became priority, which can be times [12]. The attempt to having description of privacy right
defined based on ownership of isolated boundary, hindrance depend on the person in defining his/her properties, attribute
from public view, intention of the perpetrator, direct and information while they are bounded to government
punishment and full authority of victim’s privacy rights. regulation and surrounding responsibility. Despite of person
responsibility, the evidence of documentation important to
In Hadith Muslim, book 10, no. 3898, from Abu Huraira guarantying the individual right of privacy and trust in
reported: Allah's Messenger (peace be upon him) owed preventing the opportunity of the other.
In the past, privacy of information was almost non-existed appreciate other intellectual right and encourage right manner
threatening the companies’ and even individuals’ secrecy. to use of reference in citing and quoting the statement. Finally,
Privacy as the activity to disabling of the process to view and as Muslim, we must obliged by the rules that have been set to
pass the data into the others through encryption though it us by Allah through Al-Quran and Sunnah, specifically as the
easily intercepts and decrypt. However, by using private understanding of Prophet’s companion to identify its right
network and authorize the limited privileges to user in terms implementation and measurement of the concept. Lastly, as
of access control can reduce the potential privacy violation. Muslim, we should realize our accountability and
The cyber crime relate privacy occurred not because the responsibility in any field that we involved, it should
intention from illegitimate person or group but mostly the accordance to sharia.
chance given to them to access the data. With much Muslim
embracing digital age like the rest of the world, the necessity References
on limitation of standard in terms of ethical and utilization
[1] Al Qur’an. (2011). Syamil Al Qur’an: Miracle the Reference. PT Sygma
could guide the Muslim. It has to do in determining the right Examedia Arkanleema.
and wrong of certain activities, even we cannot view one case [2] Hadith Collection. (2012). Shahih Bukhari, Shahih Muslim, Sunan Abu
only with rigid perspective by white and black. Dawood & 40 Hadith Nawawi. Search in November 10th, at
http://hadithcollection.com
The implementation of fundamental principles such as
[3] Mayer, R. C., Davis, J. H. and Schoorman, F. D. (1995). An Integrative
meticulous collection of data, authentication of source of Model of Organizational Trust. The Academy of Management Review
information, filtering and verification of the content of (20) 3, pp. 709-734.
information, assessments of impact and risks management, [4] Metzger, M. J. (2004) “Privacy, Trust, and Disclosure: Exploring
proper custody of information, non-repudiation measures, Barriers to Electronic Commerce. Journal of Computer-Mediated
effective dissemination, preservation of confidentiality and Communication (9), 4.
enforcement of law on the infringement has all found their [5] Kosa, T. (2010). Vampire Bats: Trust in Privacy. International
traces in many Quranic injunctions and Prophetic traditions. Conference on Privacy, Security and Trust, IEEE Computer Society,
Therefore, it is very accurate to conclude that Islam does (pp. 96-101).
encourage, adopts and practices comprehensive principles of [6] Warren and Brandeis, The Right to Privacy. Warren & Brandeis. (1890).
The Right to Privacy. Retrieved at October 10th, 2012 from:
privacy and trust. In addition, to embracing the concept of http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Privacy_br
what so called digital age, it is not necessarily isolate the and _warr2.html
primary sources and adopt new approach. Islam teachings [7] Ritchie, D. (2009). Is it possible to define ‘privacies’ within the law?
already complete in sense of the principle and essence of the Reflections on the ‘securitization’ debate and the interception of
concepts, so the approach which do not contradict the communications. International Review of Law, Computers &
teachings will be accepted. Islam refuses to distinguish Technology, Vol. 23, Nos. 1–2, March–July 2009, 25–34.
worldly affairs and affairs in the hereafter. It is meant that the [8] Nissenbaum, H. (2000). Protecting Privacy in an Information Age: The
Problem of Privacy in Public. Law and Philosophy, 17: 559-596, 2000.
people are not relying much over digital technology in
[9] Waldo, J., Lin, H.S. and Millett, L. I. (2007). Engaging Privacy and
following the trend. Meanwhile, Islamic work ethics might Information Technology in a Digital Age. National Research Council
lead to the commitment of the employee towards the Published by the National Academies Press, Washington, D.C., 2007.
organization as they are devoted to the organization and Journal of Privacy and Confidentiality (2010) 2, Number 1, pp. 5–18.
understands the value of contribution not only to the [10] J. Scott Marcus, Kenneth Carter. (2007). Comparison of Privacy and
organization but also society [17]. The hadith narrated in Trust Policies in the Area of Electronic Communications. Wik-
Shahih Bukhari, book 62, no. 47, at least can conclude the Consult/RAND Europe CLIP/CRID/GLOCOM.
relationship between privacy and trust based on general [11] Meeks, B.N. (2000). Is privacy possible in the digital age?. Retrieved at
Islamic perspective [2]. November, 20th, 2011 from:
http://www.msnbc.msn.com/id/3078854/t/privacy-possible-digital-
age/#.UPOUs6UWFSU
VI. CONCLUSION [12] Ahmad Atif Ahmad. (2005). The Right To Privacy And Sunni Islamic
Law: Preliminary Remarks. Retrieved at September 11st, 2012 from
In conclusion, it explain explicitly that Islamic law protect http://ahmadatifahmad.blogspot.com/2005/09/privacy-and-islamic-
the right of privacy of each person relate to their property that law_12.html
person forbidden to enter and also the conversation between to [13] Zulhuda, S. (2009). Information Security in the Islamic Perspective: The
person whether in private or public place unless the owners Principles and Practices. Proceeding 3rd International Conference on
give permission to be concealed, while that privacy can be ICT4M 2010. H-33 - H-39.
concealed when some person committed the crime that [14] Madieha, I., Zulhuda, S. and Wigati, S.P. (2010). Corroborative
implicated the other, but still around 4 witnesses should Intersection of the Information Security Standards and the Legal
Framework on Data Management. Second International Conference on
describes does thing. In relation to impact of IT adoption in Computer and Electrical Engineering, pp. 306 – 311.
various sectors, although tremendous benefit has been [15] Ozkan, N. (2011). Principles of Islam for Information Technology
obtained by individual or company, it does not mean Governance. International Conference on Research and Innovation in
necessarily we can simply misuse the technology for the Information Systems (ICRIIS), pp. 1-6.
wrong purposes or intentions. It is really important to [16] Hameed, S. A. (2009). Software Engineering Ethical Principles Based
organizing our activities and to make right decision to be fair on Islamic Values, Journal of Software, vol. 4, no. 6, August 2009, pp.
to all affairs that we are in charge without any mean to being 563-570.
injustice to any parties involve. [17] Idrus, S., Noordin, F., Hayati, Y., Aznan, N. F., Othman, A. (2011).
Islamic Work Ethics (IWE) Towards The Organizational Commitment.
The attempt to not overexposing our personal information 2011 IEEE Colloquium on Humanities, Science and Engineering
should be comes from ourselves by understanding the Research (CHUSER 2011), Dec 5-6 2011, Penang, pp. 402-406.
importance of objection of revealing the data as the beginning [18] Yin Qi. (2011). Risk Of Social Disruption And Integration Function
Development Of News Products Of Traditional Media In The Digital
step to protect our identity. Next, we must respect and Age.

View publication stats

Вам также может понравиться