Law and Justice Vol. No. 1, 2024, pp. e-ISSN : 2549-8282 https://journals2. id/index. php/laj/article/view/6484 The Urgency of Identity Verification and Safeguarding Personal Information During Online Transactions Anton Satila Universitas Muhammadiyah Kendari Sudirman Universitas Muhammadiyah Kendari Ismi Fadjriah Hamzah Universitas Muhammadiyah Kendari fadjriah@umkendari. Wahyudi Umar Universitas Muhammadiyah Kendari Matthias Wetzal Asia University. Taiwan DOI: 10. 23917/laj. Submission Track: Received: 29 August 2024 Final Revision: 30 August 2024 Available Online: 30 August 2024 Corresponding Author: Ismi Fadjriah Hamzah fadjriah@umkendari. ABSTRACT The complexity of law enforcement in online trading fraud cases poses significant challenges. Sellers can carry out fraudulent activities through product counterfeiting or making transactions outside of e-commerce platforms, while buyers can commit fraud by falsifying identities and making fake orders. Despite efforts to address this problem through legal remedies, the prevalence of fraud has not decreased. In the normative research study, fraudulent behavior is studied related to the provisions contained in the Electronic Information and Transaction Law and the Personal Data Protection Law. These findings underscore the importance of implementing authentication measures to verify the identity of sellers and buyers during online interactions. Authentication methods like this can significantly reduce fraud by allowing for quick identification of perpetrators and tracking of their fraudulent activities, ultimately deterring them from engaging in fraudulent behavior. Keywords: Verification. Personal Information. Online Transactions. ABSTRAK Kompleksitas penegakan hukum dalam kasus penipuan perdagangan online menimbulkan tantangan yang signifikan. Penjual dapat melakukan kegiatan penipuan melalui pemalsuan produk atau melakukan transaksi di luar Anton Satila. Sudirman. Ismi Fadjriah Hamzah. Wahyudi Umar & Matthias Wetzal platform e-commerce, sementara pembeli dapat melakukan penipuan dengan memalsukan identitas dan membuat pesanan palsu. Meskipun ada upaya untuk mengatasi masalah ini melalui upaya hukum, prevalensi penipuan tidak Dalam studi penelitian normatif ini, perilaku penipuan dikaji dengan aturan yang terdapat dalam UU ITE dan UU Perlindungan Data Pribadi. Temuan ini menggarisbawahi pentingnya penerapan langkahlangkah otentikasi untuk memverifikasi identitas penjual dan pembeli selama interaksi online. Metode otentikasi seperti ini dapat secara signifikan mengurangi penipuan dengan memungkinkan identifikasi pelaku dan pelacakan aktivitas penipuan dengan cepat, yang pada akhirnya menghalangi pelaku untuk terlibat dalam perilaku curang. Kata kunci: Verifikasi. Informasi Pribadi. Transaksi Online INTRODUCTION The recent surge in online trade has sparked public enthusiasm. NielsenIQ has reported a dramatic increase in the number of Indonesia consumers engaging in e-commerce, with a projected total of 32 million online shoppers in 2021. This figure increased by 88 percent compared to 2020, when the number reached 17 million. Rusdy Sumantri. Director of Nielsen Indonesia, attributed this growth to an increase in the internet user base in Indonesia by 32 percent, which increased from 34 million to 45 million people this year (Uli, 2. In addition, the implementation of government measures to limit mobility to combat the spread of COVID-19 has led to an increase in online consumer activity (Mahsuni & Wahono. Bank Indonesia estimates that the considerable growth in economic and digital transactions throughout 2021 is due to increasing public interest and e-commerce adoption. is projected that the value of trade transactions will reach IDR 401 trillion by the end of the year (Aula & Suharto, 2. The rise of online transactions has revolutionized the way businesses market and sell their products, overcoming the traditional barriers associated with physical storefronts. This ecommerce model eliminates the need for physical retail space and empowers individuals to buy and sell products easily using just smartphones and social media. However, the convenience of transacting online has its own challenges. High-quality product images taken with advanced cameras can be misleading, as the actual condition of the product may not match the picture. Additionally, the buyer may engage in fraudulent activities by using someone elseAos account or credit card information. The absence of face-to-face interaction complicates the authentication process, raising questions about the authenticity of buyer intent and seller trust. This unresolved problem has contributed to the many cases of fraud in the realm of e-commerce. For example, on January 18, 2019, there were 1,253 reports of data card breaches, resulting in Law and Justice Vol. No. 1, 2024, pp. e-ISSN : 2549-8282 https://journals2. id/index. php/laj/article/view/6484 losses of approximately $16 billion due to these fraudulent and criminal activities (Silalahi et , 2. Based on Cekrekening. id data, 115,756 cases of online fraud were reported in September 2021, most of which involved e-commerce and online sales through social media E-commerce scams often involve enticing buyers to make transactions outside of the official e-commerce platform. In a scenario like this, the buyer is required to make payment for the ordered item, but the seller fails to process the order and then changes his contact information to avoid accountability (Liputan6. com, 2. Indonesia has carved out a reputation as the fastest-growing e-commerce market in the world, with 74% of respondents having made an online purchase. However, this rapid expansion is also accompanied by a significant increase in fraudulent activity. On average, 25% of e-commerce participants have experienced criminal fraud cases in various services. This concern was expressed by Dev Dhiman. Managing Director of Southeast Asia and Emerging Markets at Experian Asia Pacific (Utami. Irwan, & Nasution, 2. The surge in e-commerce activity in Indonesia has posed challenges such as cybercrime and security concerns. The lack of human resources and low trust in the security of e-commerce are highlighted as obstacles to the successful implementation of e-commerce (S. Rahayu. Ruqoyah. Berliana. Pratiwi, & Saputra, 2. In addition, the adoption of e-commerce by small and medium enterprises (SME. in Indonesia is crucial for their survival in the information age and the increasingly digital economic landscape (R. Rahayu & Day, 2. To address the risks associated with e-commerce transactions, legal frameworks such as the Civil Code play a role in providing protection and compensation to buyers and sellers in the event of unexpected losses, including cybercrime incidents during e-commerce transactions (Ady. Nisrina. Ramadhani, & Irawan, 2. Additionally, the design and usability of e-commerce platforms play a crucial role in influencing repurchase intent and user perceptions of usability, ease of use, and trust (Wilson. Furthermore, the growth of e-commerce in Indonesia not only contributes significantly to the growth of the national economy but also offers opportunities for SMEs to increase their competitiveness and market reach (Wijayanto. Jushermi. Nursanti. Novandalina, & Rivai. However, to fully take advantage of the benefits of e-commerce, businesses need to address issues related to trust, security, and user experience to foster customer loyalty and repurchase intent (Mulia & Adlina, 2. Anton Satila. Sudirman. Ismi Fadjriah Hamzah. Wahyudi Umar & Matthias Wetzal Therefore, research is urgently needed to explore potential authentication measures to address widespread fraud in online commerce. Additionally, it is important to investigate the level of personal data protection available to consumers within the framework of Indonesian RESEARCH METHOD Doctrinal or normative legal research, which uses law as a fundamental norm, is used in this type of research. The system of norms in question is related to principles, norms, and legislation regarding the case quo (Rustan. Hsieh, & Umar, 2. The first stage of normative research consists of research with the aim of achieving objective law, by researching legal The second stage of normative law research is aimed at obtaining subjective laws (Sung & Umar, 2. This research will use a legal approach which means using the law as the basis for conducting research (Johnny, 2. RESULTS & DISCUSSION The evolution and transformation of the role of the state are shaped by the process of modernization and democratization in the system of government. This evolution includes the transition from a political state to a state of law and, ultimately, to a welfare state. Each of these paradigms utilizes state authority as a decisive force in shaping the welfare of the people under its government. The emergence of the welfare state is a response to the social disparities inherent in the liberal economic system. Within the framework of the welfare state, the government has a Aufreis ermessenAy, which means the freedom to be actively involved in all social, political, and economic spheres with the main goal of improving the general welfare and bestuurzorg (Sintha Dewi, 2. Historically, the government has played a significant role in regulating the activities of its The government exercised considerable control over trade, including the licensing of traders, the regulation of goods, and the designation of sales locations. While not a fully regulated system, the regulations that have been established and are currently in place can be readily implemented, given the extensive government control over its people. However, the modernization process has eliminated the governmentAos authority to regulate its citizens. This is exemplified in the context of online commerce . -commerc. , where the government can no longer strictly regulate the location of sales, sellers, buyers, and imports of goods into Indonesia. Through the internet, individuals are empowered to sell their products through their own websites or virtual marketplaces, thus presenting challenges in law Law and Justice Vol. No. 1, 2024, pp. e-ISSN : 2549-8282 https://journals2. id/index. php/laj/article/view/6484 enforcement and compliance. This situation makes it easier to violate certain laws, thus allowing for a scenario where a minor can easily buy items such as e-cigarettes that do not correspond to his age group while a teenager can easily sell jewelry stolen from his own home. The government was forced to transform from its traditional role as the ruler of the political state to a state of law, which eventually developed into a welfare state. The welfare state represents a form of democratic government that emphasizes the stateAos obligation to ensure the basic welfare of its citizens, directing the government to oversee the equitable distribution of state resources to prevent every individual from experiencing deprivation. Countries that fall into this classification usually integrate socialist elements, prioritizing welfare in both the political and economic spheres. The state has four main functions in the economic field. The first is to provide welfare for the people, which includes support for economic growth and social welfare (Thirlwall & Pacheco-Lypez, 2. Second, as a regulator, where the state has a role in regulating economic activities to ensure justice, efficiency, and sustainability (Akmal & Fayzullokh, 2. Third, the state plays the role of entrepreneurs through State-Owned Enterprises (SOE. , which are involved in the operation of certain sectors to advance the country's economy (Ting. Dollery, & Villano, 2. Fourth, the state also plays a role in managing the budget and government expenditure to support economic growth. Historically. IndonesiaAos constitutional framework has demonstrated a commitment to the principles of the welfare state. This commitment can be exemplified in the articulation of economic democracy in the Explanation of Article 33 of the 1945 Constitution which emphasizes the responsibility of the state to control the main branches of production that have an impact on the livelihood of many people. The rationale behind this regulatory framework is to prevent the consolidation of economic resources and the subsequent exploitation of society by those in positions of authority. IndonesiaAos unwavering commitment to the principles of a welfare state is reinforced by its designation as a constitutional state. By aligning with the ethos of the welfare state, the government is thereby empowered to utilize legal mechanisms for the regulation, control, and guarantee of the well-being of its citizens. It is therefore imperative that a comprehensive national legal framework be developed without delay in order to facilitate the realisation of this obligation. Fraudulent Models in E-Commerce Transactions Anton Satila. Sudirman. Ismi Fadjriah Hamzah. Wahyudi Umar & Matthias Wetzal Online scams involving e-commerce and social media platforms have become a significant concern due to the increasing popularity of online shopping and the integration of social elements into the shopping experience. The blend of shopping and social media, known as social commerce, not only improves the efficiency and convenience of online shopping but also plays a crucial role in building trust and loyalty among consumers (Pandowo. Rahmani, & Hapsari, 2. This trust is crucial in an online environment, especially in the context of ecommerce scams. The growth of the e-commerce market, such as in Malaysia, has been accelerated by factors such as the COVID-19 pandemic, which has led to an increased risk of fraudulent victimization in online transactions (Mohamad. Ismail, & Abdullah Thani, 2. The design features of the social trading platform utilizing social media and Web 2. 0 technology aim to increase customer participation and provide socially rich information, creating a more trustworthy online transaction environment (Lu. Fan, & Zhou, 2. However, despite these advancements, challenges remain, especially for small and medium-sized enterprises (SME. , where the perceived benefits of e-commerce may not always align with actual results (Hashim & Abdullah, 2. Cybersecurity risks are a significant concern in the realm of digital social media, where the use of various online platforms can expose individuals and businesses to fraudulent activity (Khidzir. Ismail. Daud. Ghani, & Ibrahim, 2. Malicious actors exploit social media for propaganda, radicalization, and recruitment purposes, further underscoring the vulnerabilities that exist in the online space (Chatfield. Reddick, & Brajawidagda, 2. In addition, the COVID-19 pandemic has not only shifted cybercrime opportunities but has also raised concerns about cybersecurity implications for individuals, companies, and even state entities (Buil-Gil. Miry-Llinares. Moneva. Kemp, & Dyaz-Castayo, 2. Strategies to increase public awareness and prevent online fraud are essential to address the rising cases of online fraud (Setyawan. Setyabudi, & Nita, 2. Understanding the spatiotemporal patterns and driving factors of cyber fraud crime, as seen in studies focusing on regions like China, can provide insights to combat such criminal activities (Chen et al. , 2. Additionally, exploring patterns and classifications of fraud in online sales transactions can help identify attributes that signal potential fraudulent behaviour. Authentication and application of digital data to minimize fraud rates. In the realm of digital data, ensuring authenticity and minimizing fraud are important aspects that organizations and individuals need to address. Authentication mechanisms play a crucial role in maintaining data integrity and preventing fraudulent activities. Various techniques and strategies have been developed to authenticate and secure digital data Law and Justice Vol. No. 1, 2024, pp. e-ISSN : 2549-8282 https://journals2. id/index. php/laj/article/view/6484 One approach to improve data security is through the implementation of watermarking protocols. Watermarking techniques, such as those based on timestamps and holograms, offer solutions for copyright protection and authentication in digital content such as images, videos, and audio (Dittmann. Steinebach, & Croce Ferri, 2. These protocols provide a means to verify the ownership and authenticity of data, thereby reducing the risk of fraudulent manipulation. Secure authentication mechanisms are essential for reliable data storage in cloud A multi-user authentication system has been proposed to improve data security in cloud environments, offering organizations comprehensive guidance to address the challenges, benefits, drawbacks, and implementation strategies (Shah & Dubey, 2. By ensuring that only authorized users can access and manipulate data, these systems contribute to minimizing potential fraudulent activity. Additionally, technological advancements have led to the development of innovative frameworks such as Communication Pattern-based Data Authentication (CPDA), which is specifically designed to process large data in multiple public cloud environments (Sirapaisan. Zhang, & He, 2. The Communication Pattern-based Data Authentication framework focuses on ensuring data authenticity and non-repudiation of origin without sacrificing efficiency and scalability. By incorporating communication patterns into the authentication process, the framework strengthens data security measures and reduces the likelihood of fraudulent data changes. Biometric-based authentication methods have also emerged as a reliable means of verifying user identities and improving data security. Biometric hash algorithms, which use unique biometric characteristics for authentication, offer a robust approach to ensuring data By leveraging biometric data for authentication purposes, organizations can build more secure and fraud-resistant systems for accessing and managing digital information. addition to authentication techniques, digital signature algorithms play a crucial role in verifying the authenticity of digital content. Methods such as Digital Signature Algorithms based on Biometric Hashes provide a secure means of validating the integrity and provenance of data (Saxena & Anand, 2. By incorporating digital signatures into the data verification process, organizations can build a strong foundation for detecting and preventing fraudulent activity in the digital environment. Protection of Personal Data Anton Satila. Sudirman. Ismi Fadjriah Hamzah. Wahyudi Umar & Matthias Wetzal Authentication entails validating or verifying a userAos identity when seeking access to a specific file, application, or system. Advanced authentication methods may involve the use of personal information, such as biometric fingerprints, to improve account security and prevent unauthorized access by individuals with technical expertise to exploit system vulnerabilities. Effective authentication offers increased assurance that systems and data will be better protected from unauthorized individuals (Tripathi & Nishad, 2. Personal data protection is regulated by the Personal Data Protection Law (PDP La. and the Electronic Information and Transaction Law. According to Article 26, paragraph . of Law Number 19 of 2016, the use of all information related to electronic media related to a personAos personal data must be carried out with the consent of the person unless otherwise specified by Personal data consists of specific personal data and general personal data. Personal data generally includes health data and information, biometric data, genetic data, crime records, child data, personal financial data, and other similar data. It also includes personal details such as full name, gender, nationality, religion, marital status, and any combination of personal data that can be used to identify a person (Permana, 2. After the amendment of the 1945 Constitution, the right to privacy, including the protection of personal data, was recognized as a constitutional right of citizens. This is stated in Article 28G paragraph . of the 1945 Constitution, which affirms everyoneAos right to selfprotection, family, honor, dignity, and dignity, as well as the property under their control. also guarantees the right to feel safe and protected from threats or coercion, as well as safeguarding the freedom of individuals to exercise their human rights. The principles that govern the protection of personal data in the Personal Data Protection Law include: (Anggen Suari & Sarjana, 2. The protection principle mandates that personal data be processed to prevent misuse and provide protection. The principle of legal certainty ensures that all processing of personal data is carried out on a legal basis, thus guaranteeing legal recognition inside and outside the judicial system. The principle of public interest emphasizes the need to consider the public interest and the wider community in upholding data protection. The principle of usefulness states that regulations regarding the protection of personal data must serve the national interest, especially in realizing the ideals of public welfare. The principle of prudence requires all parties involved in the processing and monitoring of personal data to consider all aspects that have the potential to cause harm. The principle of balance is an effort to protect personal data while maintaining a balance between the right to personal data on the one hand and the legitimate rights of the state based on the public interest. Law and Justice Vol. No. 1, 2024, pp. e-ISSN : 2549-8282 https://journals2. id/index. php/laj/article/view/6484 The principle of accountability requires all parties involved to act responsibly in handling personal data. The principle of confidentiality establishes that personal data is protected from unauthorized access and processing. Data protection refers to a set of actions and regulations that aim to safeguard personal information and ensure that individuals have control over their own data. The data owner must have the ability to determine whether to share the information, who can access it, for what purpose, and for how long, as well as be able to change some of this information. The data protection law is intended to cover data and automated processing, as well as structured storage formats for manual data, including filing systems. This implies that the law must cover all data processing on electronic devices such as computers, telephones. IoT devices, and physical This also extends to public and private institutions. However, it is generally recognized that data management for personal or household purposes is exempt from legal provisions. addition, data protection laws also consider cross-border data movements, which often creates jurisdictional complexity and potential conflicts with national laws. Article 20 of the Personal Data Protection Law stipulates that the processing of personal data requires written or recorded consent from the data subject, either submitted electronically or in physical form. Without such consent, the processing is considered null and void. Any use of personal data in electronic media must obtain the consent of the data owner. Violation of this provision may result in legal action for the losses incurred. The protection of personal data includes protection against unauthorized use, protection by electronic system operators, and defense against unlawful access and interference. Furthermore, personal information such as Family Card Number. Population Identification Number (KTP Numbe. , date/month/year of birth, details of physical and/or mental disabilities, biological motherAos NIN, fatherAos NIN, and the contents of selected Important Event records available on the internet, as referred to in Article 84 of the Administrative Law, are personal data that must be protected. Based on the Regulation of the Minister of Communication and Information Technology Number 20 of 2016 (PM 20/2. , which has been effective since December 2016, the protection of personal data includes the protection of the acquisition, collection, processing, analysis, storage, presentation, disclosure, transmission, dissemination, and destruction of personal data in electronic systems. As stated in PM 20/2016, electronic systems used to protect personal data must be certified and establish internal regulations related to the protection of Anton Satila. Sudirman. Ismi Fadjriah Hamzah. Wahyudi Umar & Matthias Wetzal personal data, considering the application of technology, human resources, methodologies, and Based on PM 20/2016, data owners have the right to maintain the confidentiality of their data, file complaints to resolve personal data disputes, access historical personal data, and request the deletion of certain personal data from electronic systems (Rista Maharani. Andria Luhur Prakoso, 2. This personal data is requested if we use the internet in connection with, for example, an e-commerce transaction. The personal data provided may only be used for the purposes approved by the data owner. Article 15 paragraph . of Government Regulation No. 71 of 2019 concerning Electronic Systems and Transactions explains that if there is a failure in the protection of personal data managed by it, the Electronic System Operator is obliged to notify in writing to the Personal Data Owner. The article does not explain the meaning of failure in question. In general, these failures can be categorized into 2 . First, procedural failures in confidentiality and security in data Second, system failure in terms of reliability and security aspects of the system used, as well as aspects of the proper functioning of the Electronic System . ee Explanation of Article 15 paragraph . of the Electronic Information and Transaction La. System failures can result from both internal and external factors, with cybercrime being a common external factor. The occurrence of cybercrime activities, including hacking, cracking, phishing, and identity theft, can result in a range of adverse impacts. These may include the leakage of personal data, manipulation of data, violations of privacy, and damage to systems. In the event of a failure to safeguard the confidentiality of personal data, every electronic system implementation is obliged to provide written notification to the data subject. The aforementioned notice must include a detailed account of the reason or cause of the failure in question, as well as confirmation of receipt by the data owner in instances where the failure in question may potentially result in financial losses. It must be issued within 14 days after the failure is identified. In addition, the Personal Data Protection Law provides legal protection for the security of electronic data against unauthorized access, especially in the case of unauthorized system entry that may result in the loss, alteration, or leakage of confidential or personal data. Based on Article 65 of the Personal Data Protection Law in conjunction with Article 67 of the Personal Data Protection Law, the following provisions are stipulated: Whoever deliberately and unlawfully obtains or collects personal data that does not belong to him, with the intention of benefiting himself or others, resulting in the loss of personal data as referred to in Article 65 paragraph . , shall be sentenced to Law and Justice Vol. No. 1, 2024, pp. e-ISSN : 2549-8282 https://journals2. id/index. php/laj/article/view/6484 imprisonment for a maximum of 5 years and/or a maximum fine of IDR 5,000,000,000. ive billion rupia. Whoever deliberately and unlawfully discloses personal data that does not belong to him as referred to in Article 65 paragraph . , shall be sentenced to imprisonment for a maximum of 4 years and/or a maximum fine of IDR 4,000,000,000. our billion Any person who deliberately and unlawfully uses personal data that does not belong to him as referred to in Article 65 paragraph . , is threatened with imprisonment for a maximum of 5 years and/or a maximum fine of IDR 5,000,000,000. ive billion If unauthorized access, such as breaking into someone elseAos system, leads to the potential loss, alteration, or leakage of confidential or personal data, the Personal Data Protection Law offers legal protection for electronic data security against illegal access. Any violation of the law that involves unauthorized access to and acquisition of electronic information/documents by violating the security system is a criminal offense based on Article 65 juncto Article 67 of the Personal Data Protection Law: Whoever deliberately and unlawfully obtains or collects Personal Data that does not belong to him with the intention of benefiting himself or others, resulting in the potential loss of the Personal Data Subject as referred to in Article 65 paragraph . , shall be sentenced to imprisonment for a maximum of 5 years and/or a maximum fine of IDR 5,000,000,000. ive billion rupia. Whoever deliberately and unlawfully discloses personal data that does not belong to him as referred to in Article 65 paragraph . , shall be sentenced to a maximum of 4 years in prison and/or a maximum fine of IDR 4,000,000,000. our billion rupia. Any person who deliberately and unlawfully uses Personal Data that does not belong to him as referred to in Article 65 paragraph . , shall be sentenced to imprisonment for a maximum of 5 years and/or a maximum fine of IDR 5,000,000,000. ive billion The presence of the Personal Data Protection Law has the potential to boost consumer trust by mandating data managers and processors to uphold transparency in handling personal data. addition, the Personal Data Protection Law creates a conducive environment for business Anton Satila. Sudirman. Ismi Fadjriah Hamzah. Wahyudi Umar & Matthias Wetzal innovation, as it encourages competition between companies to demonstrate their proficiency in data security management. CONCLUSION Digital identity refers to a set of digital records that store a person's identity, which a specific institution manages. The system simplifies the documentation process for citizens and the collection of their important data. Equipped with authentication and advanced security measures, digital identity systems eliminate the risk of theft, forgery, or loss associated with manual identity systems. The presence of a digital identity system allows the financial industry to accelerate the verification and identification of prospective customer data. In addition, this system can also be used to authenticate online shoppers during purchase transactions. Based on our previous discussion, it can be reaffirmed that sociologically, the online buying and selling system has had a significant impact on peopleAos culture. This change is mainly seen in the identity of sellers and buyers. In offline sales, it is usually not necessary to know the identities of the parties involved in the transaction. Simply expressing the desire to buy, making payments, and facilitating the transfer of goods signifies the completion of the buying and selling process. Even if the parties know their names, residences, and other identities, it is often caused by the establishment of family relationships. This is known as Autuna sathak profiti sanakAy, which means that building a family is more important than pursuing big He believes that having more brothers brings blessings. In contrast, online buying and selling usually occurs without face-to-face interaction and often involves remote transactions. However, complete identity and details are required to minimize the risk of fraud or fraud. The disclosure of information in online buying and selling raises concerns about the potential misuse of data for criminal activities. In the context of online transactions, the relationship between sellers and buyers is fundamentally transactional and physical, lacking the emotional and mutually supportive elements that are characteristic of offline transactions. This differs from the offline process, which fosters familiarity and emotional relationships between parties, and is characteristic of IndonesiaAos communal society. REFERENCES