Doxing Phenomenon in Indonesia: Amid Waiting for Privacy Settings

Sayid Muhammad Rifqi Noval


The activity of privacy data dissemination in cyber world today often happens to people who allegedly made mistakes and went viral. Internet users often provide the detailed information through the easy access of various information today, as if it does not violate the law and even expected helping the process of identifying the perpetrator. In Fact, this action is close to what we call as doxing, the privacy violation. The research method of this paper is normative juridical with statute approach, case approach, analytical approach, and comparative approach. The data source of this research is secondary data. The specification of this study is analytical descriptive. The results of this study identified several regulations that could be applied on doxing perpetrators, especially the provisions set out in Law No. 19 of 2016, although the provisions do not specifically address doxing. Several concepts to be considered regarding doxing cases are to file a tort claim regarding privacy information, ie, the tort of public disclosure of private facts, or legal recovery for victims by carrying the concept of the tort of intentional infliction of emotional distress (IIED) claim that applies in some states of the United States.


doxing; personal data; privacy

Full Text:



Achmad, W. RW (2021). Conflict Resolution of Remote Indigenous Communities (Overview of The Sociology Communication). LEGAL BRIEF, 10(2), 280-286.

Al-Suwaidi, Noura, Nobanee, Haitham and Jabeen, Fauzia. “Estimating Causes of Cyber crime : Evidence from Panel Data FGLS Estimator”. International Journal of Cyber Criminology, Vol 12, Issue 2 (2018) : 392-407.

Banimal, Abu Hasan., (2020). “Peningkatan Serangan Doxing dan Tantangam Perlindungannya di Indonesia,” Southeast Asia Freedom of Expression Network, 22 Desember.

Bo’do,S. et al. (2019). Social Media, Public Sphere and Movement Discussion of Urban Farming in Indonesia. Budapest International Research and Critics Institute-Journal (BIRCI-Journal). P. 250-261.

Bossler, Adam M, and Berenblum, Tamar. (2019). “Introduction : New Direction in Cybersrime Research”. Journal of Crime and Justice, Vol.42, No.5: 495-499.

Corbride, Aste. “Responding to Doxing in Australia : Towards a Right to Informational Self-Determination ?”. UniSA Student Law Review, Vol.3 (2018) : 1-28.

David, Douglas M. (2016) “Doxing : A Conceptual Analysis”. Ethics and Information Technology,Volume 18: 199-210.

Decker, Eileen. “Full Count ? : Crime Rate Swings, Cybercrime Misses and Why We Don’t Really Know the Score”. Journal Of National Security Law & Policy, Vol. 10, Number 3 (2020) : 583-604.

Djafar, Wahyudi and Santoso, M Jodi. (2019). “Perlindungan Data Pribadi : Mengenali hak-hak subjek data, serta kewajiban pengendali dan prosesor data”. Lembaga Studi dan Advokasi Masyarakat (ELSAM).

Djafar, Wahyudi. (2014). “Memerhatikan perlindungan hak atas privasi dalam pengaturan dan praktik penyadapan di Indonesia”.Seminar Kewenangan Badan Pemerintah dalam melakukan penyadapan serta korelasinya dengan pelanggaran HAM. Komunitas Peradilan Semu Atma Jaya Moot Court Guild (AMG) Fakultas Hukum Universitas Katolik Indonesia Atma Jaya, 21 Maret.

Hawkes. Rebecca. (2017). “Local Nazis in your area : Public Shaming and communal disgust in the doxing of white nationalists at Charlottesville”. Journal of Undergraduate Research in the Creative Arts and Industries, Unitec Institute of Technology, Volume 1, No 1: 58-69.

Homchick, Natalia. (2019). “Reaching Throught the “Ghost Doxer :” An Argument for Imposing Secondary Liability on Online Intermediaries”. Washington and Lee Law Review, Vol.76, Issue 3, Article 7: 1307-1344.

Kuskridho Ambardi ( (2019). Jurnalisme, “Berita Palsu”, & Disinformasi Konteks Indonesia. Departemen Ilmu Komunikasi Universitas Gadjah Mada, Yogyakarta.

Li, Lisa Bei. (2108) “Data Privacy in the Cyber Age : Recommendations for Regulating Doxing and Swatting”. Federal Communicagions Law Journal, Vol.70, Issue 3: 317-328.

MacAllister, Julia M. (2017). “The Doxing Dilemma : Seeking a Remedy for the Malicious Publication of Personal Information”. Fordham Law Review, Volume 85, Issue 5, Article 44: 2451-2483.

McIntyre, Victoria. (2016). ““Do(x) You Really Want to Hurt Me ?” Adapting IIED as A Solution to Doxing by Reshaping Intent”. Tulane Journal of Technology & Intellectual Property, Vol.19: 111-134.

Microsoft. (2020). “Digital Civility Index 2020 : Civility, Safety & Interaction online”. 5th Edition, February 2021. Lee, Carmen. “Doxxing as Discursive Action in a Social Movement”. Critical Discourse Studies, Vol. 17, Number 3: 1-19.

Noval, Sayid Mohammad Rifqi. (2020). “Menimbang Kembali Hak Untuk Dilupakan : Penerapan dan Potensi Ancaman”. Jurnal Legislasi,Vol.17 No.3: 366-379.

Norris, Pippa. (2020). ”Closed Minds ? Is a ‘Cancel Culture’ Stifling Acedemic Freedom and Intelectuall Debate in Political Science ?”. Faculty Research Paper. Series. Harvard Kennedy School John F. Kennedy School Of Government, August.

Ritchey, Andrew J, and Ruback, R. Barry. (2018). “Predicting Lynching Atrocity : The Situational Norms of Lynchings in Georgia”. Personality and Social Psychology Bulletin, Vol. 44, No. 5: 619-637.

Sarmah, Animesh, Sarmah, Roshmi, and Jyoti Baruah, Amlan. (2017). “A Brief Study on Cyber Crime and Cyber Laws of India”. International Research Journal of Engineering and Technology (IRJET), Vol.4, Issue 6: 1633-1640.

Trottier, Daniel. (2020). “Denunciation and doxing : Toward a Conceptual model of digital vigilantism”. Global Crime, Vol.21, NOS. 3-4: 196-212.

Weaver, Michael. (2019). “Judge-Lynch in the Court of Public Opinion : Publicity and the De-Legitimation of Lynching”. American Political Science Review, Cambridge University Press, Volume 113, Issue 2: 293-310.

Yar, Majid and Drew, Jacqualine. (2019). “Image-Based Abuse, Non-Consensual Pornography Revenge Porn : A Study of Criminalization and Crime Prevention in Australia and England & Wales”. International Journal of Cyber Criminology, Vol. 13, Issue 2: 578-594.


Article Metrics

Abstract view : 182 times
PDF - 63 times


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.