Securing Indonesia Cyber Space: Strategies for Cyber Security in the Digital Era
Main Article Content
Abstract
Abstract
The development of information and communication technology is increasing, this is directly proportional to the number of users who experience a significant increase every year, this makes the world borderless and timeless in one cyberspace then the state needs to guarantee the security of information and data in cyberspace from crime. cyber. In this study using a qualitative research methodology with secondary data collection, in this study it is known that Indonesia is working to strengthen cyber security through bilateral, multilateral, and cyber diplomacy cooperation with various relevant agencies such as the Ministry of Foreign Affairs, the Ministry of Defense, or the BSSN.
Article Details
How to Cite
Fransiska, F. B., & Tobing, F. B. (2023). Securing Indonesia Cyber Space: Strategies for Cyber Security in the Digital Era. Jurnal Studi Sosial Dan Politik, 7(1), 50-62. https://doi.org/10.19109/jssp.v7i1.15925
Section
Articles
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.
How to Cite
Fransiska, F. B., & Tobing, F. B. (2023). Securing Indonesia Cyber Space: Strategies for Cyber Security in the Digital Era. Jurnal Studi Sosial Dan Politik, 7(1), 50-62. https://doi.org/10.19109/jssp.v7i1.15925
References
Afiah, N. (2018). Pengaruh Keamanan, Reputasi Dan Pengalaman Terhadap Trust Pengguna Internet Untuk Bertransaksi Secara Online. JEKPEND: Jurnal Ekonomi Dan Pendidikan, 1(2), 58. https://doi.org/10.26858/jekpend.v1i2.7256
Aprilianti, I., & Dina, S. A. (2021). Co-regulating the Indonesian Digital Economy. Policy Paper no. 30, 1–40.
Arisanty, M., Febrina, N., Wiradharma, G., & Ginting, E. (2022). Social Media Users in Receiving and Sharing Hoax Information: Overview from Motivation Level. Jurnal Studi Sosial Dan Politik, 6(1), 80–100. https://doi.org/https://doi.org/10.19109/jssp.v6i1.12238
ASEAN. (2020). ASEAN Cybersecurity Cooperation Strategy (2021-2025). 1–14. https://asean.org/wp-content/uploads/2022/02/01-ASEAN-Cybersecurity-Cooperation-Paper-2021-2025_final-23-0122.pdf
Balleste, R., & Kulesza, J. (2013). Fordham Intellectual Property , Media and Entertainment Law Journal Signs and Portents in Cyberspace : The Rise of Jus Internet as New Order in International Law Signs and Portents in Cyberspace : The Rise of Jus Internet as New Order in International Law. 23(4).
Barrinha, A., & Renard, T. (2017). Cyber-diplomacy: the making of an international society in the digital age. Global Affairs, 3(4–5), 353–364. https://doi.org/10.1080/23340460.2017.1414924
Bechara, F. R., & Schuch, S. B. (2020). Cybersecurity and global regulatory challenges. Journal of Financial Crime, 28(2), 359–374. https://doi.org/10.1108/JFC-07-2020-0149
Buchan, R. (2016). Cyberspace, non-state actors and the obligation to prevent transboundary harm. Journal of Conflict and Security Law, 21(3), 429–453.
Caplan, N. (2013). Cyber War: the Challenge to National Security. Global Security Studies, 4(1).
Carr, M. (2016). Public – private partnerships in national cyber-security strategies. International Affairs, 92(1), 43–62.
Chotimah, H. C. (2019). Tata Kelola Keamanan Siber dan Diplomasi Siber Indonesia di Bawah Kelembagaan Badan Siber dan Sandi Negara [Cyber Security Governance and Indonesian Cyber Diplomacy by National Cyber and Encryption Agency]. Jurnal Politica Dinamika Masalah Politik Dalam Negeri Dan Hubungan Internasional, 10(2), 113–128. https://doi.org/10.22212/jp.v10i2.1447
Chotimah, H. C., Iswardhana, M. R., & Pratiwi, T. S. (2019). Penerapan Military Confi dence Building Measures dalam Menjaga Ketahanan Nasional Indonesia di Ruang Siber. Jurnal Ketahanan Nasional, 25(3), 331. https://doi.org/10.22146/jkn.50344
Clarke, R. A., & Knake, R. K. (2014). Cyber war. Old Saybrook: Tantor Media, Incorporated. Old Saybrook: Tantor Media, Incorporated.
Creswell, J. W., Hanson, W. E., Clark Plano, V. L., & Morales, A. (2007). Qualitative Research Designs: Selection and Implementation. The Counseling Psychologist, 35(2), 236–264. https://doi.org/10.1177/0011000006287390
Emmers, R. (2003). The Threat of Transnational Crime in Southeast Asia: Drug Trafficking, Human Smuggling and Trafficking and Sea Piracy. Revista UNISCI, 2, 1–11. http://www.unisci.es/the-threat-from-transnational-crime-in-southeast-asia-drug-trafficking-human-smuggling-and-trafficking-and-sea-piracy/
Farwell, J. P., & Rohozinski, R. (2011). Stuxnet and the future of cyber war. Survival, 53(1), 23–40. https://doi.org/10.1080/00396338.2011.555586
Frost & Sullivan. (2017). Cyber Security in the Era of Industrial IoT. 1–27.
Hilmy. Muhammad Irfan &, & Azmi, R. H. N. (2021). Konstruksi Pertahanan dan Keamanan Negara terhadap Perlindungan Data dalam Cyberspace untuk Menghadapi Pola Kebiasaan Baru. Jurnal Lemhannas RI, 9(1), 114–124. https://doi.org/10.55960/jlri.v9i1.381
Iswardhana, M. R. (2021). Cyber Diplomacy And Protection Measures Against Threats Of Information Communication Technology In Indonesia. Journal of Islamic World and Politics, 5(2), 343–367. https://doi.org/10.18196/jiwp.v5i2.12242
Jasparro, C., & Taylor, J. (2008). Climate change and regional vulnerability to transnational security threats in Southeast Asia. Geopolitics, 13(2), 232–256. https://doi.org/10.1080/14650040801991480
Kim, S. (2014). Cyber Security and Middle Power Diplomacy. The Korean Journal of International Studies, 12(2), 323. https://doi.org/10.14731/kjis.2014.12.12.2.323
Klingenberg, C. O., Borges, M. A. V., & Antunes, J. A. V. (2021). Industry 4.0 as a data-driven paradigm: a systematic literature review on technologies. Journal of Manufacturing Technology Management, 32(3), 570–592. https://doi.org/10.1108/JMTM-09-2018-0325
Lawrence Neuman, W. (2014). Social Research Methods: Qualitative and Quantitative Approaches W. Lawrence Neuman.
Legionosuko, T., Madjid, M. A., Asmoro, N., & Samudro, E. G. (2019). Posisi dan Strategi Indonesia dalam Menghadapi Perubahan Iklim guna Mendukung Ketahanan Nasional. Jurnal Ketahanan Nasional, 25(3), 295. https://doi.org/10.22146/jkn.50907
Margiansyah, D. (2020). Revisiting Indonesia’s economic diplomacy in the age of disruption: Towards digital economy and innovation diplomacy. Journal of ASEAN Studies, 8(1), 15–39. https://doi.org/10.21512/jas.v8i1.6433
Marhaeni, H. (2022). Direktorat Statistik Keuangan Teknologi Informasi dan Pariwisata Indonesia 2022. Https://Ppid.Bps.Go.Id/. https://ppid.bps.go.id/upload/doc/LAKIN_Direktorat_Statistik_Keuangan___TI__dan_Pariwisata_2022_1683604348.pdf
McGuire, M., & Dowling, S. (2013). A targeted attack occurs when the organisation is of specific interest to the attacker, who plans the digital offensive many months before it is launched. In Home Office Research Report 75 (Issue October). London, England, United Kingdom
Mukhtar, A., & Firdaus, A. (2020). ASEAN Community and Prospects for the Development of UIN Raden Fatah Palembang. Jurnal Studi Sosial Dan Politik, 4(2), 109–121. https://doi.org/https://doi.org/10.19109/jssp.v4i2.6771
Narindra, K. S. (2021). Keamanan dan Ancaman Cyber Bagi Sektor Privat dan Industry Militer Di Era 4.0. Jurnal Diplomasi Pertahanan, 7(1), 36–55. https://doi.org/10.33172/jdp.v7i1.675
NCSI. (2023). National Cyber Security Index. Https://Ncsi.Ega.Ee/. https://ncsi.ega.ee/ncsi-index/?order=rank
Panjaitan, S. N. (2020). Transformation of Radicalism Discourse into Extremist Violence (Analysis of News on the Handling of Radical Movements in Indonesia). Jurnal Studi Sosial Dan Politik, 4(1), 18–31. https://doi.org/10.19109/jssp.v4i1.5344
Pearlman, W., & Cunningham, K. G. (2012). Nonstate actors, fragmentation, and conflict processes. Journal of Conflict Resolution, 56(1), 3–15. https://doi.org/10.1177/0022002711429669
Rahmadany, A. F., & Ahmad, M. (2021). The Implementation E-Government to Increase Democratic Participation: The Use of Mobile Government. Jurnal Studi Sosi, 5(1), 22–34.
Rai, I. N. A. S., Heryadi, D., & Kamaluddin N., A. (2022). The Role of Indonesia to Create Security and Resilience in Cyber Spaces [Peran Indonesia dalam Membentuk Keamanan dan Ketahanan di Ruang Siber]. Jurnal Politica Dinamika Masalah Politik Dalam Negeri Dan Hubungan Internasional, 13(1), 43–66. https://doi.org/10.22212/jp.v13i1.2641
Rohali, S. M., & Yumitro, G. (2022). Women Terrorist Interests in the ISIS Movement: A Case Study in Indonesia. Jurnal Studi Sosial Dan Politik, 6(1), 17–29. https://doi.org/https://doi.org/10.19109/jssp.v6i1.11141
Rosy, A. F. (2020). Kerjasama Internasional Indonesia: Memperkuat Keamanan Nasional di Bidang Keamanan Siber. Journal of Government Science (GovSci) : Jurnal Ilmu Pemerintahan, 1(2), 118–129. https://doi.org/10.54144/govsci.v1i2.12
Sa’diyah, N. K., & Vinata, R. T. (2016). Rekonstruksi Pembentukan National Cyber Defense Sebagai Upaya Mempertahankan Kedaulatan Negara. Perspektif, 21(3), 168. https://doi.org/10.30742/perspektif.v21i3.587
Sen, A. (2000). Development As Freedom.
Shafira, I. (2021). Analyzing Indonesia’s National Cybersecurity Strategy: Center for Digital Society. Centre for Digital Society. https://cfds.fisipol.ugm.ac.id/id/2021/07/28/menganalisis-strategi-keamanan-siber-nasional-indonesia/
Sukarno, B., & Saleh, F. (2022). Vertical Conflict, Public Policies, and Pandemic Covid-19: Case Study of Central and Regional Government of DKI Jakarta. Jurnal Studi Sosial Dan Politik, 5(1), 83–104. https://doi.org/https://doi.org/10.19109/jssp.v5i1.7904
Syed, S., & Ahmed, Z. (2021). Abraham Accords, Indo-Pacific Accord and the US-Led Nexus of Curtailment: Threat to Regional Security, and Joint Counter Strategy. Policy Perspectives, 18(1), 25–52. https://doi.org/10.13169/polipers.18.1.0025
Weber, R. H. (2010). Internet of Things - New security and privacy challenges. Computer Law and Security Review, 26(1), 23–30. https://doi.org/10.1016/j.clsr.2009.11.008
Westcott, N. (2008). The impact of the Internet on international Relations. Oxford Internet Institute, July. http://do.rulitru.ru/docs/22/21978/conv_1/file1.pdf
Wibowo, E. B., Legionosuko, T., & Mahroza, J. (2020). Industry 4.0: Challenges and opportunities in competency development for defense apparatus’ human resources. International Journal of Advanced Science and Technology, 29(7), 45–60.
Widarda, D. (2020). The Relationship Between Religion and the State for the Sovereignty of the NKRI Study of Suryalaya TQN Murshid Thought in the Tanbih Text. Jurnal Studi Sosial Dan Politik, 4(2), 135–146. https://doi.org/10.19109/jssp.v4i2.6773
Yulianto, A. (2021). Cybersecurity Policy and Its Implementation in Indonesia. JAS (Journal of ASEAN Studies), 7(1), 69–82. https://doi.org/10.21512/jas.v4i1.967
Zheng, T., Ardolino, M., Bacchetti, A., & Perona, M. (2021). The applications of Industry 4.0 technologies in manufacturing context: a systematic literature review. International Journal of Production Research, 59(6), 1922–1954. https://doi.org/10.1080/00207543.2020.1824085
Zotti, A. (2011). Inside cyber warfare. Global Change, Peace & Security, 23(3), 437–438. https://doi.org/10.1080/14781158.2011.605638
Aprilianti, I., & Dina, S. A. (2021). Co-regulating the Indonesian Digital Economy. Policy Paper no. 30, 1–40.
Arisanty, M., Febrina, N., Wiradharma, G., & Ginting, E. (2022). Social Media Users in Receiving and Sharing Hoax Information: Overview from Motivation Level. Jurnal Studi Sosial Dan Politik, 6(1), 80–100. https://doi.org/https://doi.org/10.19109/jssp.v6i1.12238
ASEAN. (2020). ASEAN Cybersecurity Cooperation Strategy (2021-2025). 1–14. https://asean.org/wp-content/uploads/2022/02/01-ASEAN-Cybersecurity-Cooperation-Paper-2021-2025_final-23-0122.pdf
Balleste, R., & Kulesza, J. (2013). Fordham Intellectual Property , Media and Entertainment Law Journal Signs and Portents in Cyberspace : The Rise of Jus Internet as New Order in International Law Signs and Portents in Cyberspace : The Rise of Jus Internet as New Order in International Law. 23(4).
Barrinha, A., & Renard, T. (2017). Cyber-diplomacy: the making of an international society in the digital age. Global Affairs, 3(4–5), 353–364. https://doi.org/10.1080/23340460.2017.1414924
Bechara, F. R., & Schuch, S. B. (2020). Cybersecurity and global regulatory challenges. Journal of Financial Crime, 28(2), 359–374. https://doi.org/10.1108/JFC-07-2020-0149
Buchan, R. (2016). Cyberspace, non-state actors and the obligation to prevent transboundary harm. Journal of Conflict and Security Law, 21(3), 429–453.
Caplan, N. (2013). Cyber War: the Challenge to National Security. Global Security Studies, 4(1).
Carr, M. (2016). Public – private partnerships in national cyber-security strategies. International Affairs, 92(1), 43–62.
Chotimah, H. C. (2019). Tata Kelola Keamanan Siber dan Diplomasi Siber Indonesia di Bawah Kelembagaan Badan Siber dan Sandi Negara [Cyber Security Governance and Indonesian Cyber Diplomacy by National Cyber and Encryption Agency]. Jurnal Politica Dinamika Masalah Politik Dalam Negeri Dan Hubungan Internasional, 10(2), 113–128. https://doi.org/10.22212/jp.v10i2.1447
Chotimah, H. C., Iswardhana, M. R., & Pratiwi, T. S. (2019). Penerapan Military Confi dence Building Measures dalam Menjaga Ketahanan Nasional Indonesia di Ruang Siber. Jurnal Ketahanan Nasional, 25(3), 331. https://doi.org/10.22146/jkn.50344
Clarke, R. A., & Knake, R. K. (2014). Cyber war. Old Saybrook: Tantor Media, Incorporated. Old Saybrook: Tantor Media, Incorporated.
Creswell, J. W., Hanson, W. E., Clark Plano, V. L., & Morales, A. (2007). Qualitative Research Designs: Selection and Implementation. The Counseling Psychologist, 35(2), 236–264. https://doi.org/10.1177/0011000006287390
Emmers, R. (2003). The Threat of Transnational Crime in Southeast Asia: Drug Trafficking, Human Smuggling and Trafficking and Sea Piracy. Revista UNISCI, 2, 1–11. http://www.unisci.es/the-threat-from-transnational-crime-in-southeast-asia-drug-trafficking-human-smuggling-and-trafficking-and-sea-piracy/
Farwell, J. P., & Rohozinski, R. (2011). Stuxnet and the future of cyber war. Survival, 53(1), 23–40. https://doi.org/10.1080/00396338.2011.555586
Frost & Sullivan. (2017). Cyber Security in the Era of Industrial IoT. 1–27.
Hilmy. Muhammad Irfan &, & Azmi, R. H. N. (2021). Konstruksi Pertahanan dan Keamanan Negara terhadap Perlindungan Data dalam Cyberspace untuk Menghadapi Pola Kebiasaan Baru. Jurnal Lemhannas RI, 9(1), 114–124. https://doi.org/10.55960/jlri.v9i1.381
Iswardhana, M. R. (2021). Cyber Diplomacy And Protection Measures Against Threats Of Information Communication Technology In Indonesia. Journal of Islamic World and Politics, 5(2), 343–367. https://doi.org/10.18196/jiwp.v5i2.12242
Jasparro, C., & Taylor, J. (2008). Climate change and regional vulnerability to transnational security threats in Southeast Asia. Geopolitics, 13(2), 232–256. https://doi.org/10.1080/14650040801991480
Kim, S. (2014). Cyber Security and Middle Power Diplomacy. The Korean Journal of International Studies, 12(2), 323. https://doi.org/10.14731/kjis.2014.12.12.2.323
Klingenberg, C. O., Borges, M. A. V., & Antunes, J. A. V. (2021). Industry 4.0 as a data-driven paradigm: a systematic literature review on technologies. Journal of Manufacturing Technology Management, 32(3), 570–592. https://doi.org/10.1108/JMTM-09-2018-0325
Lawrence Neuman, W. (2014). Social Research Methods: Qualitative and Quantitative Approaches W. Lawrence Neuman.
Legionosuko, T., Madjid, M. A., Asmoro, N., & Samudro, E. G. (2019). Posisi dan Strategi Indonesia dalam Menghadapi Perubahan Iklim guna Mendukung Ketahanan Nasional. Jurnal Ketahanan Nasional, 25(3), 295. https://doi.org/10.22146/jkn.50907
Margiansyah, D. (2020). Revisiting Indonesia’s economic diplomacy in the age of disruption: Towards digital economy and innovation diplomacy. Journal of ASEAN Studies, 8(1), 15–39. https://doi.org/10.21512/jas.v8i1.6433
Marhaeni, H. (2022). Direktorat Statistik Keuangan Teknologi Informasi dan Pariwisata Indonesia 2022. Https://Ppid.Bps.Go.Id/. https://ppid.bps.go.id/upload/doc/LAKIN_Direktorat_Statistik_Keuangan___TI__dan_Pariwisata_2022_1683604348.pdf
McGuire, M., & Dowling, S. (2013). A targeted attack occurs when the organisation is of specific interest to the attacker, who plans the digital offensive many months before it is launched. In Home Office Research Report 75 (Issue October). London, England, United Kingdom
Mukhtar, A., & Firdaus, A. (2020). ASEAN Community and Prospects for the Development of UIN Raden Fatah Palembang. Jurnal Studi Sosial Dan Politik, 4(2), 109–121. https://doi.org/https://doi.org/10.19109/jssp.v4i2.6771
Narindra, K. S. (2021). Keamanan dan Ancaman Cyber Bagi Sektor Privat dan Industry Militer Di Era 4.0. Jurnal Diplomasi Pertahanan, 7(1), 36–55. https://doi.org/10.33172/jdp.v7i1.675
NCSI. (2023). National Cyber Security Index. Https://Ncsi.Ega.Ee/. https://ncsi.ega.ee/ncsi-index/?order=rank
Panjaitan, S. N. (2020). Transformation of Radicalism Discourse into Extremist Violence (Analysis of News on the Handling of Radical Movements in Indonesia). Jurnal Studi Sosial Dan Politik, 4(1), 18–31. https://doi.org/10.19109/jssp.v4i1.5344
Pearlman, W., & Cunningham, K. G. (2012). Nonstate actors, fragmentation, and conflict processes. Journal of Conflict Resolution, 56(1), 3–15. https://doi.org/10.1177/0022002711429669
Rahmadany, A. F., & Ahmad, M. (2021). The Implementation E-Government to Increase Democratic Participation: The Use of Mobile Government. Jurnal Studi Sosi, 5(1), 22–34.
Rai, I. N. A. S., Heryadi, D., & Kamaluddin N., A. (2022). The Role of Indonesia to Create Security and Resilience in Cyber Spaces [Peran Indonesia dalam Membentuk Keamanan dan Ketahanan di Ruang Siber]. Jurnal Politica Dinamika Masalah Politik Dalam Negeri Dan Hubungan Internasional, 13(1), 43–66. https://doi.org/10.22212/jp.v13i1.2641
Rohali, S. M., & Yumitro, G. (2022). Women Terrorist Interests in the ISIS Movement: A Case Study in Indonesia. Jurnal Studi Sosial Dan Politik, 6(1), 17–29. https://doi.org/https://doi.org/10.19109/jssp.v6i1.11141
Rosy, A. F. (2020). Kerjasama Internasional Indonesia: Memperkuat Keamanan Nasional di Bidang Keamanan Siber. Journal of Government Science (GovSci) : Jurnal Ilmu Pemerintahan, 1(2), 118–129. https://doi.org/10.54144/govsci.v1i2.12
Sa’diyah, N. K., & Vinata, R. T. (2016). Rekonstruksi Pembentukan National Cyber Defense Sebagai Upaya Mempertahankan Kedaulatan Negara. Perspektif, 21(3), 168. https://doi.org/10.30742/perspektif.v21i3.587
Sen, A. (2000). Development As Freedom.
Shafira, I. (2021). Analyzing Indonesia’s National Cybersecurity Strategy: Center for Digital Society. Centre for Digital Society. https://cfds.fisipol.ugm.ac.id/id/2021/07/28/menganalisis-strategi-keamanan-siber-nasional-indonesia/
Sukarno, B., & Saleh, F. (2022). Vertical Conflict, Public Policies, and Pandemic Covid-19: Case Study of Central and Regional Government of DKI Jakarta. Jurnal Studi Sosial Dan Politik, 5(1), 83–104. https://doi.org/https://doi.org/10.19109/jssp.v5i1.7904
Syed, S., & Ahmed, Z. (2021). Abraham Accords, Indo-Pacific Accord and the US-Led Nexus of Curtailment: Threat to Regional Security, and Joint Counter Strategy. Policy Perspectives, 18(1), 25–52. https://doi.org/10.13169/polipers.18.1.0025
Weber, R. H. (2010). Internet of Things - New security and privacy challenges. Computer Law and Security Review, 26(1), 23–30. https://doi.org/10.1016/j.clsr.2009.11.008
Westcott, N. (2008). The impact of the Internet on international Relations. Oxford Internet Institute, July. http://do.rulitru.ru/docs/22/21978/conv_1/file1.pdf
Wibowo, E. B., Legionosuko, T., & Mahroza, J. (2020). Industry 4.0: Challenges and opportunities in competency development for defense apparatus’ human resources. International Journal of Advanced Science and Technology, 29(7), 45–60.
Widarda, D. (2020). The Relationship Between Religion and the State for the Sovereignty of the NKRI Study of Suryalaya TQN Murshid Thought in the Tanbih Text. Jurnal Studi Sosial Dan Politik, 4(2), 135–146. https://doi.org/10.19109/jssp.v4i2.6773
Yulianto, A. (2021). Cybersecurity Policy and Its Implementation in Indonesia. JAS (Journal of ASEAN Studies), 7(1), 69–82. https://doi.org/10.21512/jas.v4i1.967
Zheng, T., Ardolino, M., Bacchetti, A., & Perona, M. (2021). The applications of Industry 4.0 technologies in manufacturing context: a systematic literature review. International Journal of Production Research, 59(6), 1922–1954. https://doi.org/10.1080/00207543.2020.1824085
Zotti, A. (2011). Inside cyber warfare. Global Change, Peace & Security, 23(3), 437–438. https://doi.org/10.1080/14781158.2011.605638