Combating Cybercrime and Cyberterrorism in Indonesia

Cynthia Shafira Hartati, Ali Muhammad

Abstract


Cybercrime poses a serious risk to national security in Indonesia. The pervasive nature of cybercrime calls into question the efficacy of current regulatory measures. The study objective reflects how the government addresses sustaining securitization in cyberspace. This study employed a descriptive qualitative method to analyze the impact of cybercrime in Indonesia and the regulations with an extremely high intercorrelation. Terrorism, both on the ground and digitally, has been on the rise at an alarming rate in recent years. The influence of universal access to all relevant information has several implications, including the propagation of misinformation and the growth of cybercrime networks. There must be significant disruption to the cyberterrorism industry to foster safe circumstances in Indonesia. The success of Indonesia’s regulatory efforts depends on the contribution and synergy between the government and the public.


Full Text:

PDF

References


Abdullah, F. M. (2019). Using big data analytics to predict and reduce cyber crimes. International Journal of Mechanical Engineering and Technology, 10(1), 1540–1546. h

Ahmad, R., Yunos, Z., & Sahib, S. (2012). Understanding cyber terrorism: The grounded theory method applied (pp. 323–328). https://doi.org/10.1109/CyberSec.2012.6246081

Al Moubayed, N., Wall, D., & McGough, A. S. (2017, July). Identifying changes in the cybersecurity threat landscape using the LDA-web topic modelling data search engine. In International Conference on Human Aspects of Information Security, Privacy, and Trust (pp. 287-295). Springer, Cham.

Aliprandi, C., Lotti, L., Neri, F., & Sanna, G. (2022). Online Police Station, a cutting edge service against cybercrime. 40, 237–247. https://doi.org/10.2495/DATA080231

Arifah, D. A. (2011). Kasus cybercrime di indonesia. Jurnal Bisnis dan Ekonomi, 18(2).

Antunes, M., & Rabadão, C. (2019). Cybersecurity and Digital Forensics – Course Development in a Higher Education Institution (Vol. 942, pp. 338–348). https://doi.org/10.1007/978-3-030-17065-3_34

BBC. (2018). Serangan bom di tiga gereja Surabaya: Pelaku bom bunuh diri “perempuan yang membawa dua anak” - BBC News Indonesia. Retrieved December 13, 2022, from BBC: https://www.bbc.com/indonesia/indonesia-44097913

Beech, M., & Bishop, J. (2017). Cyber-stalking or just plain talking?: Investigating the linguistic properties of rape-threat messages as compulsive behaviours. In Violence and Society: Breakthroughs in Research and Practice (pp. 193–220). https://doi.org/10.4018/978-1-5225-0988-2.ch012

Bloom, M., & Daymon, C. (2018). Assessing the Future Threat: ISIS’s Virtual Caliphate. Orbis, 62(3), 372–388. https://doi.org/10.1016/j.orbis.2018.05.007

BSSN. (2020). Statistik Terorisme Siber. Retriever December 11, 2022 from BSSN: https://bssn.go.id/?s=terorisme+siber+2020

Castillo, I., Munoz, J., Lopez, J. I., Rodriguez, L., Romero, L. D., Gonzalez, M., & Ponce, J. C. (2022). Helping Students Detecting Cyberbullying Vocabulary in Internet with Web Mining Techniques. 21–27. https://doi.org/10.1109/CONTIE49246.2019.00014

Cherry, S. (2005). Terror goes online [cyberterrorism]. IEEE Spectrum, 42(1), 72-73.

Damayanti, D. (2021). Implementation of the cyber terrorism prevention, and rehabilitation policy in Polda Metro Jaya Police in Central Jakarta. In IBIMA Business Review (Vol. 2021). IBIMA Publishing. https://doi.org/10.5171/2021.695424

Data Reportal. (2021). Digital in Indonesia: All the Statistics You Need in 2021 — Data Reportal – Global Digital Insights. https://datareportal.com/reports/digital-2021-indonesia

Dlamini, S., & Mbambo, C. (2019). Understanding policing of cybercrime in South Africa: The phenomena, challenges and effective responses. Cogent Social Sciences, 5(1). https://doi.org/10.1080/23311886.2019.1675404

Fiorenza, N. (2007). NATO considers response to cyber warfare following attacks on Estonia. Jane’s International Defence Review, June.

Galis, V., & Summerton, J. (2018). We are all foreigners in an analogue world: cyber-material alliances in contesting immigration control in Stockholm’s metro system. Social Movement Studies, 17(3), 299–317. https://doi.org/10.1080/14742837.2017.1383892

Harkin, D., & Whelan, C. (2019). Exploring the implications of ‘low visibility’ specialist cyber-crime units. Australian and New Zealand Journal of Criminology, 52(4), 578–594. https://doi.org/10.1177/0004865819853321

Horgan, S., Collier, B., Jones, R., & Shepherd, L. (2020). Re-territorialising the policing of cybercrime in the post-COVID-19 era: towards a new vision of local democratic cyber policing. Journal of Criminal Psychology, 11(3), 222–239. https://doi.org/10.1108/JCP-08-2020-0034

Horsman, G. (2017). Can we continue to effectively police digital crime? Science and Justice, 57(6), 448–454. https://doi.org/10.1016/j.scijus.2017.06.001

Hovorushchenko, T., Herts, A., & Pavlova, O. (2020). Method of Forming a Logical Conclusion about Legal Responsibility in the Cybersecurity Domain. In ICTERI Workshops (pp. 128-135).

Huey, L., & Rosenberg, R. S. (2013). Reporting and Clearance of Cyberbullying Incidents: Applying “Offline” Theories to Online Victims. Canadian Journal of Criminology and Criminal Justice, 46(5), 597–606. https://doi.org/10.3138/cjccj.46.5.597

Hull, M., Eze, T., & Speakman, L. (2018, October). Policing the cyber threat: Exploring the threat from cyber crime and the ability of local law enforcement to respond. In 2018 European Intelligence and Security Informatics Conference (EISIC) (pp. 15-22). IEEE. https://doi.org/10.1109/EISIC.2018.00011

JDIH. (2013). UU No. 15 Tahun 2003 tentang Penetapan Peraturan Pemerintah Pengganti Undang-Undang Nomor 1 Tahun 2002 Tentang Pemberantasan Tindak Pidana Terorisme, Menjadi Undang-Undang. Retrieved December 13, 2022, from BPK RI: https://peraturan.bpk.go.id/Home/Details/43015/uu-no-15-tahun-2003

Kementerian Komunikasi dan Informatika. (2021). Statistik Teknologi Digital Asia. Retrieved December 13, 2022, from Kominfo: https://www.kominfo.go.id/content/detail/10259/hati-teroris-diteguhkan-melalui-telegram-ungkap-kominfo/0/sorotan_media

Kshetri, N. (2010). The global cybercrime industry: economic, institutional and strategic perspectives. Springer Science & Business Media.

Kuk, K., & Ranđelović, D. (2017). Knowledge discovery in cyberspace: Statistical analysis and predictive modeling (pp. 1-206).

Leukfeldt, E. R., Notté, R. J., & Malsch, M. (2019). Exploring the Needs of Victims of Cyber-dependent and Cyber-enabled Crimes. Victims and Offenders, 15(1), 60–77. https://doi.org/10.1080/15564886.2019.1672229

Ma, K. W. F., & McKinnon, T. (2021). COVID-19 and cyber fraud: emerging threats during the pandemic. Journal of Financial Crime. https://doi.org/10.1108/JFC-01-2021-0016

Martins, I., Resende, J. S., Sousa, P. R., Silva, S., Antunes, L., & Gama, J. (2019). The Global Cybercrime Industry: Economic, Institutional) and Strategic Nir Kshetri. Future Generation Computer Systems, 133, 95–113. https://doi.org/10.1016/j.future.2022.03.001

Millman, C. M., Winder, B., & Grifths, M. D. (2017). UK-based police officers’ perceptions of, and role in investigating, cyber-harassment as a crime. International Journal of Technoethics, 8(1), 87–102. https://doi.org/10.4018/IJT.2017010107

Mishra, S., Alowaidi, M. A., & Sharma, S. K. (2021). Impact of security standards and policies on the credibility of e-government. Journal of Ambient Intelligence and Humanized Computing, 2019(Naidoo 2020). https://doi.org/10.1007/s12652-020-02767-5

Moise, A. C. (2014). Some considerations on the phenomenon of cybercrime. Journal of Advanced Research in Law and Economics, 5(1), 38–43. https://doi.org/10.14505/jarle.v5.1(9).04

Nicholson, A., Watson, T., Norris, P., Duffy, A., & Isbell, R. (2012, July). A taxonomy of technical attribution techniques for cyber attacks. In European conference on information warfare and security (p. 188). Academic Conferences International Limited.

Pradnyana, I. P., & Rofii, M. S. (2020). Cyberterrorism Threats in Indonesia and State Responses. Literatus Journal, 2(2), 181-192.

Ramadhan, I. (2020). Cyber-Terrorism in the Context of Proselytizing, Coordination, Security, and Mobility. International Relations Department of Universitas Pertamina, Islamic World and Politics, 4(2).

Romanosky, S., Ablon, L., Kuehn, A., & Jones, T. (2019). Content analysis of cyber insurance policies: How do carriers price cyber risk? Journal of Cybersecurity, 5(1). https://doi.org/10.1093/cybsec/tyz002

Sakban, A., Sahrul, Kasmawati, A., & Tahir, H. (2019). Police preventative against cyber-bullying crimes in indonesia. International Journal of Scientific and Technology Research, 8(12), 1532–1534.

Santhoshi, N., Chandra Sekharaiah, K., Madan Mohan, K., Ravi Kumar, S., & Malathi, B. (2019). Cyber Intelligence Alternatives to Offset Online Sedition by in-Website Image Analysis Through WebCrawler Cyberforensics. In Soft Computing and Signal Processing (pp. 187-199). Springer, Singapore.

Saputra, R. W. (2016). A survey of cyber crime in Indonesia. 2016 International Conference on ICT for Smart Society, ICISS 2016, July, 1–5. https://doi.org/10.1109/ICTSS.2016.7792846

Setiawan, D. A. (2020). Cyber Terrorism and its Prevention in Indonesia. Jurnal Media Hukum, 27(2), 267–283. https://doi.org/10.18196/jmh.20200156

Sharma, P., Doshi, D., & Prajapati, M. M. (2016). Cybercrime: Internal security threat. In 2016 international conference on ICT in business industry & government (ICTBIG) (pp. 1-4). IEEE.

Sitorus, T., & Tannady, H. (2021). Synergy, System IT. Risk Management and The Influence on Cyber Terrorism and Hoax News Action. Journal of Theoretical and Applied Information Technology, 99(8), 1802-1814.

Svecova, H., & Blazek, P. (2021). The Impact of Cybersecurity on the Rescue System of Regional Governments in SmartCities: Vol. 1371 CCIS (pp. 365–375). https://doi.org/10.1007/978-981-16-1685-3_30

Villacampa, C., Torres, C., & Miranda, X. (2022). Institutional Response to Trafficking in Human Beings in Spain: Are All Victims Equally Protected? European Journal on Criminal Policy and Research, 0123456789. https://doi.org/10.1007/s10610-022-09506-w

Wahyudi, S. T. (2018). Hubbul Waton Minal Iman as Reinforcement Theorem of State Defense in the Context of Terrorism Prevention in Indonesia. SHS Web of Conferences, 54, 08019. https://doi.org/10.1051/shsconf/20185408019

Williams, M. L., Edwards, A., Housley, W., Burnap, P., Rana, O., Avis, N., & Sloan, L. (2013). Policing cyber-neighbourhoods: tension monitoring and social media networks. Policing and society, 23(4), 461-481.




DOI: https://doi.org/10.18196/jhi.v11i2.15647

Refbacks

  • There are currently no refbacks.


Copyright (c) 2023 Jurnal Hubungan Internasional

 Jurnal Hubungan Internasional Indexed by:

      


Editorial Office of Jurnal Hubungan Internasional 

Ki Bagus Hadikusumo Building, E4, 1st floor, Universitas Muhammadiyah Yogyakarta
Jl. Brawijaya, Tamantirto, Kasihan, Bantul, Daerah Istimewa Yogyakarta, 55183, Indonesia
jurnalhi@umy.ac.id ariekusumapaksi@umy.ac.id

 


Jurnal Hubungan Internasional in collaboration with:

   


Creative Commons License   

Jurnal Hubungan Internasional is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.

View My Stats