Addressing The Hurdles: Enhancing Better Policies In Indonesia Cyber Security Management Amidst Uncertainty

Mohammad Fadil Imran, Hendra Gunawan, Dwi Asmoro

Abstrak


The purpose of this study is to address obstacles to cyber security in Indonesia. Using a systematic literature review (SLR) based on Scopus and Google Scholar, this study identifies tangible obstacles such as infrastructure-related, low preparedness for digitalization, and scarcity of skilled personnel. Intangible issues such as legal frameworks and regulatory vacuums and neglect of cyber security in smart cities are also noted. To address these issues, this study suggests a number of policy recommendations for the Indonesian government, including investments in cyber security development, creation of a cyber security maturity model, enhancement of human resource capabilities, role clarification, improved legislation, and promotion of collaborative security management. If followed, these suggestions have the potential to strengthen Indonesia’s cyber security defenses considerably and provide a safer digital environment for its residents and enterprises.


Kata Kunci


Cyber Security; Resilience; Digital Security; Security Threats; Digital Obstacles

Teks Lengkap:

PDF (English)

Referensi


Ahmad, A., Desouza, K. C., Maynard, S. B., Naseer, H., & Baskerville, R. L. (2020). How integration of cyber security management and incident response enables organizational learning. Journal of the Association for Information Science and Technology, 71(8), 939–953. https://doi.org/10.1002/asi.24311

Aji, M. P. (2023). Sistem Keamanan Siber dan Kedaulatan Data di Indonesia dalam Perspektif Ekonomi Politik (Studi Kasus Perlindungan Data Pribadi) [Cyber Security System and Data Sovereignty in Indonesia in Political Economic Perspective]. Jurnal Politica Dinamika Masalah Politik Dalam Negeri Dan Hubungan Internasional, 13(2), 222–238. https://doi.org/10.22212/jp.v13i2.3299

Alam, R. G. G., & Ibrahim, H. (2019). Cybersecurity Strategy for Smart City Implementation. International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences - ISPRS Archives, 42(4/W17), 3–6. https://doi.org/10.5194/isprs-archives-XLII-4-W17-3-2019

Alzahrani, N. M., & Alfouzan, F. A. (2022). Augmented Reality (AR) and Cyber-Security for Smart Cities—A Systematic Literature Review. Sensors, 22(7), 1–17. https://doi.org/10.3390/s22072792

Annur, C. M. (2022a). Banyak Lembaga Publik Belum Gunakan Layanan Cloud, Apa Alasannya? Databoks. https://databoks.katadata.co.id/datapublish/2022/08/24/banyak-lembaga-publik-belum-gunakan-layanan-cloud-apa-alasannya

Annur, C. M. (2022b). Pelindungan Data Pribadi Warga RI Masih Tergolong Rendah. Databoks. https://databoks.katadata.co.id/datapublish/2022/08/09/pelindungan-data-pribadi-warga-ri-masih-tergolong-rendah

Ariyaningsih, S., Andrianto, A. A., Kusuma, A. S., & Prastyanti, R. A. (2023). Korelasi Kejahatan Siber dengan Percepatan Digitalisasi di Indonesia. Justisia: Jurnal Ilmu Hukum, 1(1), 1–11.

Databoks. (2017). Indonesia Rentan Terkena Serangan Malware - Negara-negara yang Rentan Terkena Serangan Malware 2016. Katadata Insights Center.

Dunn Cavelty, M., & Wenger, A. (2020). Cyber security meets security politics: Complex technology, fragmented politics, and networked science. Contemporary Security Policy, 41(1), 5–32.

Efthymiopoulos, M. P. (2019). A cyber-security framework for development, defense and innovation at NATO. Journal of Innovation and Entrepreneurship, 8(1). https://doi.org/10.1186/s13731-019-0105-z

Fauzi, A. H., Rizal, M., & Arifianti, R. (2019). Corporate entrepreneurship in SMEs: A systematic mapping study. Jurnal Manajemen Pelayanan Publik, 2(1), 55.

Fichtner, L. (2018). What kind of cyber security? Theorising cyber security and mapping approaches. Internet Policy Review, 7(2). https://doi.org/10.14763/2018.2.788

Finne, T. (2000). Information Systems Risk Management: Key Concepts and Business Processes. Computers & Security, 19(3), 243–242.

Gerber, M., & Von Solms, R. (2005). Management of risk in the information age. Computers & Security, 24(1), 16–30. https://doi.org/10.1016/J.COSE.2004.11.002

Gojali, D. S. (2023). Identifying the Prevalence of Cybercrime in Indonesian Corporations: A Corporate Legislation Perspective. International Journal of Cyber Criminology, 17(1), 1–11. https://doi.org/10.5281/zenodo.4766600

Hajj, R. A., Muta, A., & Mamoto, B. J. (2022). Data and Information Security Management : Preparing Data in the Cyber Era in Indonesia. 19165–19171.

Harkin, D., & Molnar, A. (2023). Exploring the social implications of buying and selling cyber security. Crime, Law and Social Change, 79(1), 83 – 100. https://doi.org/10.1007/s10611-022-10037-y

Hill, R. (2015). Dealing with cyber security threats: International cooperation, ITU, and WCIT. 2015 7th International Conference on Cyber Conflict: Architectures in Cyberspace, 119–134.

Indah, F., & Sidabutar, A. Q. (2022). Peran Cyber Security Terhadap Keamanan Data Penduduk Negara Indonesia (Studi Kasus: Hacker Bjorka). Jurnal Bidang Penelitian Informatika, 1(1), 1–8.

Jenab, K., & Moslehpour, S. (2016). Cyber Security Management: A Review. Business Management Dynamics, 5(11), 16–39. www.bmdynamics.com

Kadek, I., Jaya, N. A., Ayu, I., & Dewi, U. (2021). Regulasi Keamanan Data Pribadi Pengguna pada E-commerce di Indonesia. Jurnal Sistem Informasi Akuntansi, 1–8.

Kalogiannidis, S., Paschalidou, M., Kalfas, D., & Chatzitheodoridis, F. (2023). Relationship between Cyber Security and Civil Protection in the Greek Reality. Applied Sciences (Switzerland), 13(4). https://doi.org/10.3390/app13042607

Kusmiarto, K., Aditya, T., Djurdjani, D., & Subaryono, S. (2021). Digital transformation of land services in indonesia. A Readiness Assessment. Land, 10(2), 1–16.

Kusnandar, V. B. (2022a). ITU: Keamanan Siber Indonesia Kalah dari Singapura dan Malaysia. Databoks. https://databoks.katadata.co.id/datapublish/2022/01/27/itukeamanan-siber-indonesiakalah-dari-singapura-dan-malaysia

Kusnandar, V. B. (2022b). Pemerintah Pangkas 60% Anggaran Badan Siber dan Sandi Negara pada 2022. Databoks. https://databoks.katadata.co.id/datapublish/2022/01/26/pemerintah-pangkas-60-anggaran-badan-siber-dan-sandi-negara-pada-2022

Limba, T., Plėta, T., Agafonov, K., & Damkus, M. (2017). CYBER SECURITY MANAGEMENT MODEL FOR CRITICAL INFRASTRUCTURE. The International Journal ENTREPRENEURSHIP AND SUSTAINABILITY ISSUES, 4(4), 559–573.

Manik, L. P., Akbar, Z., Yaman, A., & Indrawati, A. (2022). Indonesian Scientists’ Behavior Relative to Research Data Governance in Preventing WMD-Applicable Technology Transfer. Publications, 10(4). https://doi.org/10.3390/publications10040050

Michalec, O., Milyaeva, S., & Rashid, A. (2022). When the future meets the past: Can safety and cyber security coexist in modern critical infrastructures? Big Data and Society, 9(1). https://doi.org/10.1177/20539517221108369

Miner, M. (2021, March 16). What is the Difference between Data Security and Cyber Security? SSI NET. https://insider.ssi-net.com/insights/what-is-the-difference-between-data-security-and-cyber-security

Mirna, M., Judhariksawan, & Maskum. (2023). Analisis Pengaturan Keamanan Data Pribadi di Indonesia. Jurnal Ilmiah Living Law, 15(1), 16–30.

Mizan, N. S. M., Ma’arif, M. Y., Mohd Satar, N. S., & Shahar, S. M. (2020). CNDS-Cybersecurity: Issues and Challenges in ASEAN Countries. International Journal of Advanced Trends in Computer Science and Engineering, 8(June), 1965–1968.

Muhamad, N. (2023). Mayoritas Masyarakat Tidak Yakin dengan Tingkat Keamanan Siber di Indonesia. Databoks. https://databoks.katadata.co.id/datapublish/2023/08/10/mayoritas-masyarakat-tidak-yakin-dengan-tingkat-keamanan-siber-di-indonesia

Nurhaqiqi, H., Mustikasari, R. P., & Kusnarto. (2023). Data Security in Indonesia: Bibliometric Analysis of the Development of Personal Data Regulatory. Jurnal Spektrum Komunikasi (JSK), 11(1), 85–93.

Pal, D., Zhang, X., & Siyal, S. (2021). Prohibitive factors to the acceptance of Internet of Things (IoT) technology in society: A smart-home context using a resistive modelling approach. Technology in Society, 66. https://doi.org/10.1016/j.techsoc.2021.101683

Panahi Rizi, M. H., & Hosseini Seno, S. A. (2022). A systematic review of technologies and solutions to improve security and privacy protection of citizens in the smart city. Internet of Things (Netherlands), 20(August), 100584. https://doi.org/10.1016/j.iot.2022.100584

Persadha, P. D., Waskita, A. A., & Yazid, S. (2016). Comparative Study of Cyber Security Policies among Malaysia, Australia, Indonesia: A Responsibility Perspective. Proceedings - 4th International Conference on Cyber Security, Cyber Warfare, and Digital Forensics, CyberSec 2015, July 2018, 146–150. https://doi.org/10.1109/CyberSec.2015.36

Priyambodo, T. K., & Prayudi, Y. (2016). A Proposed Strategy for Secure and Trusted Environment in e-Government. Lecture Notes in Electrical Engineering, 362, 891–902. https://doi.org/10.1007/978-3-319-24584-3

Raul, A. C. (2021). The privacy, data protection and cybersecurity law review. Law Business Research Limited.

Rofii, M. S. (2020). Strengthening Digital Ecosystems for Sustainable Development in Indonesia: Anticipating Cyber Threats. IOP Conference Series: Earth and Environmental Science, 436(1). https://doi.org/10.1088/1755-1315/436/1/012026

Rosyda, S. S., & Raharja, S. J. (2020). Privatization in State-Owned Enterprises: A Systematic Literature Review. Jurnal Manajemen Pelayanan Publik, 3(2), 107–118.

Rumata, V. M., & Sastrosubroto, A. S. (2019). The Indonesian Law Enforcement Challenges over Encrypted Global Social Networking Platforms. 2018 International Conference on Computer, Control, Informatics and Its Applications: Recent Challenges in Machine Learning for Computing Applications, IC3INA 2018 - Proceeding, November, 199–203. https://doi.org/10.1109/IC3INA.2018.8629528

Sakban, A., Sahrul, Kasmawati, A., & Tahir, H. (2020). The role of Indonesian National Cyber Bureau in monitoring mining business companies. IOP Conference Series: Earth and Environmental Science, 413(1). https://doi.org/10.1088/1755-1315/413/1/012032

Salim, L., Harjono, S., Gunawan, F., Moniaga, J., & Rianto, I. (2022). A Literature Review on the Impact of Effective Management in Cyber Security System Performance. Proceedings - 4th International Conference on Informatics, Multimedia, Cyber and Information System, ICIMCIS 2022, 172–177. https://doi.org/10.1109/ICIMCIS56303.2022.10017933

Sandjojo, N., Zuhriyanto, M., & Pradnyana, I. W. W. (2020). The Effects of Fear of Cybercrime and Information Systems Security Policy on National Vigilance. Proceedings - 2nd International Conference on Informatics, Multimedia, Cyber, and Information System, ICIMCIS 2020, November 2020, 195–200. https://doi.org/10.1109/ICIMCIS51567.2020.9354283

Saputra, P. N., Sudirman, A., Sinaga, O., Wardhana, W., & Hayana, N. (2019). Addressing Indonesia’s Cyber Security through Public-Private Partnership (PPP). Central European Journal of International & Security Studies, 13(4).

Septi Jayanti, C., & Suraji. (2022). The Issues Of Data Protection Against Leaking Of Personal Data in Security Health Services (A Comparison Between Indonesia and Other Countries Regulations). International Journal of Business, Economics and Law, 26(1), 1.

Setiadi, F., Sucahyo, Y. G., & Hasibuan, Z. A. (2012). An overview of the development indonesia national cyber security. International Journal of Information & Computer Science, 6, 108.

Shedden, P., Smith, W., & Ahmad, A. (2010). Information Security Risk Assessment: Towards a Business Practice Perspective. Proceedings of the 8th Information Security Management Conference.

Silva, K. e. (2013). Europe’s fragmented approach towards cyber security. Internet Policy Review, 2(4).

Stoneburner, G., Goguen, A., & Feringa, A. (2002). Risk management guide for information technology systems. Nist Special Publication, 800(30), 800–830.

Sulistyowati, D., Handayani, F., & Suryanto, Y. (2020). Comparative Analysis and Design of Cybersecurity Maturity Assessment Methodology Using NIST CSF, COBIT, ISO/IEC 27002 and PCI DSS. International Journal on Informatics Visualization, 4(4), 225–230.

Syafrizal, M., Selamat, S. R., & Zakaria, N. A. (2020). Analysis of Cybersecurity Standard and Framework Components. International Journal of Communication Networks and Information Security, 12(3), 417–432. https://doi.org/10.17762/ijcnis.v12i3.4817

Syarief, E. (2022). Security Concerns in Digital Transformation of Electronic Land Registration: Legal Protection in Cybersecurity Laws in Indonesia. International Journal of Cyber Criminology, 16(2), 32–46. https://doi.org/10.5281/zenodo.4766565

Thompson, M., Tiwari, A., Fu, R., Moe, E., & Buckley, D. I. (2012). A Framework To Facilitate the Use of Systematic Reviews and Meta-Analyses in the Design of Primary Research Studies. Research White Paper: AHRQ Publication No. 12-EHC009-EF., 30.

Tvaronavičienė, M., Plėta, T., Della Casa, S., & Latvys, J. (2020). Cyber security management of critical energy infrastructure in national cybersecurity strategies: Cases of USA, UK, France, Estonia and Lithuania. Insights into Regional Development, 2(4), 802–813.

Utomo, R. G., Wills, G., & Walters, R. (2020). A framework for factors influencing the implementation of information assurance for e-Government in Indonesia. International Journal on Advanced Science, Engineering and Information Technology, 10(3), 1025–1034. https://doi.org/10.18517/ijaseit.10.3.9186

von Maltzan, S. (2019). No Contradiction Between Cyber-Security and Data Protection? Designing a Data Protecton Compliant Incident Response System. European Journal of Law and Technology, 10(1).

Yuadi, I., & Khusniah, L. (2022). Pemetaan Penelitian Terkait Keamanan Data di Indonesia. Petir, 15(2), 253–263. https://doi.org/10.33322/petir.v15i2.1586

Yuliana, R., & Hasibuan, Z. A. (2022). Best practice framework for information technology security governance in Indonesian government. International Journal of Electrical and Computer Engineering, 12(6), 6522–6534. https://doi.org/10.11591/ijece.v12i6.pp6522-6534

Yusni, M., & Sigalingging, B. (2021). Encryption as The Legal Protection Against Cybercrimes Associated with Digital Land Certificates in Indonesia. International Journal of Cyber Criminology, 15(2), 124–134. https://doi.org/10.5281/zenodo.4766551

Yusuf, M. Y., Kurniasih, D. K., & Setyoko, P. I. (2023). The Record Management: Upcoming Challenges and Key Components to Enhancing Better Public Services. Jurnal Manajemen Pelayanan Publik, 7(1), 61. https://doi.org/10.24198/jmpp.v7i1.47337




DOI: https://doi.org/10.24198/jmpp.v8i2.52212

Refbacks

  • Saat ini tidak ada refbacks.




 Jurnal Manajemen Pelayanan Publik Indexed By:

Google Scholar  Bielefeld Academic Search Engine (BASE) WorldCat Indonesia One Search          
 

 

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.