The Urgency of Stakeholder Cyberspace Collaboration to Support Indonesia’s National Defense
DOI:
https://doi.org/10.36574/jpp.v8i2.566Keywords:
cyberspace, cyber attacks, cyber security, stakeholder collaboration, national defenseAbstract
In today's interconnected digital world, stakeholder collaboration in cyberspace is crucial for national defense. Advances in information and communication technology have transformed daily life but also introduced complex cyber threats like cyber warfare, cybercrimes, and cyber terrorism, challenging security and stability. The objective of this study is to emphasize the importance of collaboration among diverse stakeholders in enhancing national defense against cyber threats. The methodology involves analyzing existing literature and case studies to understand the impact of collaboration on cybersecurity maturity and national defense strategies. The research findings, derived from SWOT and PESTLE analyses, have highlighted the strengths and weaknesses in collaboration, underscoring the significance of leveraging strengths and addressing weaknesses to establish a robust defense framework. To enhance national defense against cyber threats, a holistic approach is essential, combining political collaboration, economic partnerships, social awareness programs, technological advancements, legal harmonization, and environmental resilience strategies. Key recommendations include fostering regular communication among stakeholders, pooling resources for cybersecurity investments, promoting cybersecurity education, integrating advanced technologies like AI and IoT security solutions, and aligning legal frameworks across jurisdictions.
Downloads
References
Acronis. (2021). When More is Not Necessarily Better: The Impacts of Multiple Security Tools. Available from https://www.cio.com/article/189489/when-more-is-not-necessarily-better-the-impacts-of-multiple-security-tools.html?amp=1. Accessed 5 May 2024.
Aidoo, F.K. (2017). End Users Security Awareness Campaign from Information Security Threats, Vulnerabilities and Concurrent Cyber-Attacks. Texila International Journal of Academic Research, 4 (2).
Ajala, O.K. (2023). Establishing Cyber Resilience in Developing Countries: An Exploratory Investigation into Institutional, Legal, Financial, and Social Challenges. International Journal of Sustainable Infrastructure for Cities and Societies, 8(9), 1–10. Available from https://vectoral.org/index.php/IJSICS/article/view/27 Accessed 18 May 2024.
Akter, S., Uddin, M.R., Sajib, S., Lee, W.J.T., Michael, K., & Hossain, M.A. (2022). Reconceptualizing cybersecurity awareness capability in the data-driven digital economy. Ann Oper Res (2022). Available from https://link.springer.com/article/10.1007/s10479-022-04844-8#citeas Accessed 4 May 2024.
Anjani, N.H. (2021). Perlindungan Keamanan Siber di Indonesia. Center for Indonesian Policy Studies. Available from https://repository.cips-indonesia.org/publications/341780/perlindungan-keamanan-siber-di-indonesia#cite Accessed 18 May 2024.
Ayuwuragil, K. 2017. Kesadaran Keamanan Siber Indonesia Peringkat ke 70 Dunia. CNN Indonesia. Available from https://www.cnnindonesia.com/teknologi/20171206162248-185-260555/kesadaran-keamanan-siber-indonesia-peringkat-ke-70-dunia Accessed 19 May 2024.
Babikian, J. (2023). Navigating Legal Frontiers: Exploring Emerging Issues in Cyber Law. Revista Espanola De Documentacion Cientifica, 17(2), 95–109. Retrieved from https://redc.revistas-csic.com/index.php/Jorunal/article/view/154 Accessed 23 April 2024.
Babys, S. A. M. (2021). Ancaman Perang Siber di Era Digital dan Solusi Keamanan Nasional Indonesia. Jurnal Oratio Directa, 3 (1): 425-442. Available from https://ejurnal.ubk.ac.id/index.php/oratio/article/view/163 Accessed 6 Oktober 2024.
Bauer, J. M., and van Eeten, M. J. G. (2009). Cybersecurity: Stakeholders Incentives, Externalities, and Policy Options. Telecommunications Policy, 33: 706–719. Available from https://www.researchgate.net/publication/227426674_Cybersecurity_Stakeholder_incentives_externalities_and_policy_options Accessed 6 Oktober 2023
Bintoro A. (2017). Regulasi Lambat Jadi Penghambat Perkembangan Teknologi. Available from https://www.cnnindonesia.com/teknologi/20171109182014-185-254634/regulasi-lambat-jadi-penghambat-perkembangan-teknologi. Accessed 12 May 2024.
Brenner, S. W. (2013). Cyber-threats and the Limits of Bureaucratic Control. MINN. J.L. SCI. & TECH. 137. Available from https://scholarship.law.umn.edu/mjlst/vol14/iss1/6. Accessed 18 May 2024
Budi, E., Wira, D., dan Infantono, A. (2021). Strategi Penguatan Cyber Security Guna Mewujudkan Keamanan Nasional di Era Society 5.0. Prosiding Seminar Nasional Sains Teknologi dan Inovasi Indonesia Akademi Angkatan Udara Volume 3, Tahun 2021, hlm. 223-234. Available from https://www.researchgate.net/publication/357360644_Strategi_Penguatan_Cyber_Security_Guna_Mewujudkan_Keamanan_Nasional_di_Era_Society_50 Accessed 21 Juli 2023.
Burri, T., and Trusilo, D. (2021). Ethical Artificial Intelligence: An Approach to Evaluating Disembodied Autonomous Systems (March 31, 2021). In: Rain Liivoja and Ann Valjataga (eds), Autonomous Cyber Capabilities in International Law, forthcoming 2021. Available from https://ssrn.com/abstract=3816687 Accessed 18 May 2024.
Camp, L.J., & Lewis, S (2004). Economics of information security, Springer US pp. 95-104. Available from https://www.researchgate.net/publication/249908366_The_Economic_Consequences_of_Sharing_Security_Information1 Accessed 4 May 2024.
Chakraborty, S., E. M. Mombeshora, K. P. Clark and T. S. Mbavarira. (2024). Understanding of Cyber-Attack Vulnerabilities During Natural Disasters and Discussing A Cyber-Attack Resiliency Framework. Available from https://ieeexplore.ieee.org/document/10500233 Accessed 18 May 2024.
Chaudhari, N., Singh, V., Krishnan, A. (2022). A comparison of cybersecurity regulations: India. Asia Business Law Journal, 19 Oktober 2022. Available from https://law.asia/india-cybersecurity-regulations-2022/ Accessed 13 May 2024.
Choucri, N,. Madnick, S., and Ferwerda, J. (2013) “Institutions for Cyber Security: International Responses and Global Imperatives.” Information Technology for Development 20, no. 2 (October 22, 2013): 96–121. Available from https://dspace.mit.edu/handle/1721.1/109401 Accessed 21 May 2024.
CNBC Indonesia. (2022). Bjorka Berulah, 2 Instansi Ini Saling Lempar Tanggung Jawab. Available from https://www.cnbcindonesia.com/news/20220910125507-4-370980/bjorka-berulah-2-instansi-ini-saling-lempar-tanggung-jawab Accessed 6 Oktober 2023.
Cyber Security and Infrastructure Agency. (2024). Cyber Storm IX: National Cyber Exercise. Available from https://www.cisa.gov/sites/default/files/2024-04/Cyber%20Storm%20IX%20Fact%20Sheet_v02_508c.pdf Accessed 12 May 2024
Cybersecurity and Infrastructure Security Agency. (2023). NSA and CISA Red and Blue Teams Share Top Ten Cybersecurity Misconfigurations. Available from https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-278a Accessed 5 May 2024.
de Bruijn, H., & Janssen, M. (2017). Building cybersecurity awareness: The need for evidence-based framing strategies. Government Information Quarterly, 34 (1) (2017), pp. 1-7. Available from https://www.sciencedirect.com/science/article/pii/S0740624X17300540?via%3Dihub Accessed 4 May 2024
Decker, D., Rauhut, K., Pytlak, A. (2023). Fostering Accountability in Cyberspace. Available from https://www.stimson.org/2023/fostering-accountability-in-cyberspace/ Accessed 28 April 2024.
Gal-Or, E., & Ghose, A. (2004). The economic consequences of sharing security information Environment. Computers & Operations Research 85 (2017) 139–153. Available from https://www.sciencedirect.com/science/article/abs/pii/S0305054817300990 Accessed 19 May 2024.
Eckel, M. 2023. The Snake, The FBI, And Center 16: Why The Takedown Of A 'Most Sophisticated Cyber-Espionage Tool' Is Important. Russia Free Europe Radio Liberty, 11 May 2023. Available from https://www.rferl.org/a/russia-fsb-malware-snake-takedown/32407612.html Accessed 12 May 2024
Ertan, K. F., Pernik, P., Stevens, T. (2021). Cyber Threats and NATO 2030: Horizon Scanning and Analysis. NATO Cooperative Cyber Defence Centre of Excellence. Available from https://ccdcoe.org/uploads/2020/12/Cyber-Threats-and-NATO-2030_Horizon-Scanning-and-Analysis.pdf Accessed 18 May 2024.
Forbes. (2013). How to prevent cybercrime. Available from https://www.forbes.com/sites/thesba/2013/08/28/how-to-prevent-cybercrime/#62f3ad6efffd. Accessed 6 Oktober 2023.
Garamone, J. (2018). Cyber Tops List of Threats to U.S., Director of National Intelligence Says. Available from https://www.defense.gov/News/News-Stories/Article/Article/1440838/cyber-tops-list-of-threats-to-us-director-of-national-intelligence-says/ Accessed 22 April 2024.
Gordon, L.A., Loeb, M.P., Lucyshyn, W., Zhou, L (2015). The impact of information sharing on cybersecurity underinvestment: A real options perspective. Journal of Accounting and Public Policy, 34 (5) (2015), pp. 509-519. Available from https://www.sciencedirect.com/science/article/abs/pii/S0278425415000423 Accessed 4 May 2024.
Globe Newswire. (2020). Cybercrime To Cost The World $10.5 Trillion Annually By 2025. Available from https://www.globenewswire.com/news-release/2020/11/18/2129432/0/en/Cybercrime-To-Cost-TheWorld-10-5-Trillion-Annually-By-2025.html Accessed 25 May 2024.
Hübner, S. F., Alcaraz, C., Ferreira, A., Gago, C. F., Lopez, J., Markatos, E., Islami, L., dan Akil, M. (2021). Stakeholders Perspectives and Requirements on Cybersecurity in Europe. Journal of Information Security and Applications, 61. ISSN 2214-2126. Available from https://www.researchgate.net/publication/353119907_Stakeholder_perspectives_and_requirements_on_cybersecurity_in_Europe Accessed 19 May 2024.
Institute of Data. (2024). AI in Cyber Security: Enhancing Protection and Defence. Available from https://www.institutedata.com/blog/ai-in-cyber-security/ Accessed 7 May 2024.
International Monetary Fund. (2020). Cyber Risk is the New Threat to Financial Stability. Available from https://www.imf.org/en/Blogs/Articles/2020/12/07/blog-cyber-risk-is-the-new-threat-to-financial-stability Accessed 25 May 2024.
International Telecommunication Union. (2024). National Cybersecurity Strategies Repository. Available from https://www.itu.int/en/ITU-D/Cybersecurity/Pages/National-Strategies-repository.aspx Accessed 25 May 2024.
Intone Network, (2023). The Future of Cybersecurity Emerging Technologies. Available from https://intone.com/the-future-of-cybersecurity-emerging-technologies/ Accessed 23 April 2024.
ISC2. (2023). ISC2 Reveals Growth in Global Cybersecurity Workforce, But Record-Breaking Gap of 4 Million Cybersecurity Professionals Looms. Available from https://www.isc2.org/Insights/2023/10/ISC2-Reveals-Workforce-Growth-But-Record-Breaking-Gap-4-Million-Cybersecurity-Professionals Accessed 4 Maret 2024.
Karjalainen, M., Siponen, M., & Sarker, S. (2020). Toward a stage theory of the development of employees’ information security behavior. Computers & Security, 101782. Available from https://www.sciencedirect.com/science/article/pii/S0167404820300675 Accessed 21 May 2024.
Kaur, R., Gabrijelcic, D., Klobucar, T. (2023). Artificial intelligence for cybersecurity: Literature review and future research directions. Information Fusion, Volume 97. Available from https://www.sciencedirect.com/science/article/pii/S1566253523001136 Accessed 20 May 2024.
Kim S, Cheon S, Eom J. (2019). A leading cyber warfare strategy according to the evolution of cyber technology after the fourth industrial revolution. International Journal of Advanced Computer Research. 2019; 9 (40): 72-80. DOI:10.19101/IJACR.SOC6.
Lebo, D., dan Anwar, S. (2020). Pemberdayaan Komunitas Siber oleh Pemerintah Republik Indonesia dari Perspektif Strategi Perang Semesta. Jurnal Strategi Pertahanan Semesta, 6 (1): 101-127. Available from https://jurnalprodi.idu.ac.id/index.php/SPS/article/view/653 Accessed 6 Oktober 2023
Lewis, J. A. (2010). Sovereignty and the Role of Government in Cyberspace. The Brown Journal of World Affairs, XIV (II): 55-65. Available from https://repository.library.brown.edu/studio/item/bdr:1078801/PDF/?embed=true?embed=tru Accessed 18 May 2024.
Lopez, T.C. (2022). DOD: It's Not Just State Actors Who Pose Cyber Threat to U.S. Available from https://www.defense.gov/News/News-Stories/Article/Article/3039462/dod-its-not-just-state-actors-who-pose-cyber-threat-to-us/ Accessed 22 April 2024
Lyons, J. (2023). US military battling cyber threats from within and without. Available from https://www.theregister.com/2023/08/01/us_military_cybersecurity/ Accessed 22 April 2024.
Maurer, T., Levite, A., and Perkovich, G. (2017). Toward a Global Norm Against Manipulating The Integrity of Financial Data. Economics Discussion Papers, No 2017-38, Kiel Institute for the World Economy. Available from http://www.economics-ejournal.org/economics/discussionpapers/2017-38. Accessed 6 Oktober 2023.
Mittelstadt, S., Wang, X., Eaglin, T., Thom, D., Keim, D., Tolone, W., & Ribarsky, W. (2015). An Integrated In-Situ Approach to Impacts from Natural Disasters on Critical Infrastructures. 2015 48th Hawaii International Conference on System Sciences. pp. 1118-1127, doi: 10.1109/HICSS.2015.136. Available from https://sci-hub.se/10.1109/hicss.2015.136 Accessed 18 May 2024.
National Cyber Security Center. (2021). Financial Sector Cyber Collaboration Centre (FSCCC). Available from https://www.ncsc.gov.uk/information/financial-sector-cyber-collaboration-centre-fsccc Accessed 6 Oktober 2023
Harsono, N. (2022). Despite improvements, Indonesia’s digital literacy remains low. The Jakarta Post, 20 January 2022. Available from https://www.thejakartapost.com/business/2022/01/20/despite-improvements-indonesias-digital-literacy-remains-low.html Accessed 12 May 2024.
O’Halloran, J. (2017). Challenges Of Public-Private Partnerships In Cybersecurity. Available from https://www.academia.edu/36194661/CHALLENGES_OF_PUBLIC_PRIVATE_PARTNERSHIPS_IN_CYBERSECURITY Accessed 28 April 2024.
Paul, J. A., Wang, X. (2019). Socially optimal IT investment for cybersecurity. Decision Support Systems, 122(), 113069–. doi:10.1016/j.dss.2019.05.009. Available from https://www.sciencedirect.com/science/article/abs/pii/S0167923619300983 Accessed 6 Oktober 2023.
Preis, B. & Susskind, L. (2022). Municipal Cybersecurity: More work needs to be done. Urban Affairs Review, 58 (2), pp. 614-629. Available from https://journals.sagepub.com/doi/10.1177/1078087420973760#fn2-1078087420973760 Accessed 21 May 2024.
Proofpoint (2021). Proofpoint’s State of the Phish Report reveals remote workers in Australia are currently undertrained to deal with cyber threats. Available from https://www.proofpoint.com/au/newsroom/press-releases/proofpoints-state-phish-report-reveals-remote-workers-australia-are Accessed 4 May 2024.
Rizki, A., dan Timur, F. G. C. (2021). Synergy of Multi-Stakeholders in Defending Indonesia from Cyber Threats. Available from https://e-journal.unas.ac.id/index.php/jsps/article/view/80/68 Accessed 6 Oktober 2023
Rondelez, R. (2018). Governing Cyber Security through Networks: An Analysis of Cyber Security Coordination in Belgium. International Journal of Cyber Criminology, 12 (1): 300–315. ISSN: 0973-5089. DOI: 10.5281/zenodo.1467929. Available from https://www.cybercrimejournal.com/pdf/RondelezVol12Issue1IJCC2018.pdf Accessed 18 May 2024.
Schilling, A. (2017). A framework for secure IT operations in an uncertain and changing environment. Available from https://www.sciencedirect.com/science/article/abs/pii/S0305054817300990 Accessed 18 May 2024.
Sanchez, S.L. (2017). Artificial Intelligence (AI) Enabled Cyber Defence. European Defence Matters, no. 14 (2017): 18. Available from https://eda.europa.eu/docs/default-source/eda-magazine/edm-issue-14_web.pdf Accessed 18 May 2024.
Saudi, A. (2018). Kejahatan Siber Transnasional dan Strategi Pertahanan Siber Indonesia. Jurnal Demokrasi & Otonomi Daerah, 16 (3): 165-256. Available from https://jdod.ejournal.unri.ac.id/index.php/JDOD/article/view/6811 Accessed 6 Oktober 2023.
Spinu, N. (2020). Moldova Cybersecurity Governance Assessment. Switzerland: Geneva Centre for Security Sector Governance. Available from https://www.dcaf.ch/sites/default/files/publications/documents/MoldovaCybersecurityGovernanceAssessment.pdf Accessed 18 May 2024.
Srdjevic, Z., Bajcetic, R. & Srdjevic, B. (2012). Identifying the Criteria Set for Multicriteria Decision Making Based on SWOT/PESTLE Analysis: A Case Study of Reconstructing A Water Intake Structure. Water Resource Manage 26, 3379–3393 (2012). Available from https://link.springer.com/article/10.1007/s11269-012-0077-2 Accessed 18 May 2024.
Statista. (2010). Percentage of Stuxnet-infected hosts by country in 2010. Available from https://www.statista.com/statistics/271110/stuxnet-infected-hosts-by-country/ Accessed 26 May 2024.
Stroppa, M. (2023). Legal and ethical implications of autonomous cyber capabilities: a call for retaining human control in cyberspace. Ethics Inf Technol 25, 7 (2023). Available from https://doi.org/10.1007/s10676-023-09679-w Accessed 19 May 2024.
Taddeo, M., McCutcheon, T., and Floridi, L. 2019. Trusting Artificial Intelligence in Cybersecurity Is a Double-Edged Sword. Nature Machine Intelligence 1, no. 12 (2019): 557–60, page 557. Available from https://www.researchgate.net/publication/337176016_Trusting_Artificial_Intelligence_in_Cybersecurity_is_a_Double-edged_Sword Accessed 18 May 2024.
Tagarev. T. (2020). Towards the design of a collaborative cybersecurity networked organization: Identification and prioritization of governance needs and objectives. Future Internet, 12 (4) (2020), p. 62. Available from https://www.mdpi.com/1999-5903/12/4/62 Accessed 21 May 2024.
Tagarev, T., dan Sharkov, G. (2016). Multi-Stakeholder Approach to Cybersecurity and Resilience. Information & Security: An International Journal, 34 (1): 59-68. Available from https://www.researchgate.net/publication/366216551_Multistakeholder_Approach_to_Cybersecurity_and_Resilience Accessed 18 May 2024.
Tatar, U., Calik, O., and Karabacak, B. (2014). A Comparative Analysis of the National Cyber Security Strategies of Leading Nations. Available from https://fuse.franklin.edu/cgi/viewcontent.cgi?article=1037&context=facstaff-pub. Accessed 18 May 2024.
Tim Maurer, Arthur Nelson. (2020). International Strategy to better protect the financial system against cyber threats. Available from https://carnegieendowment.org/2020/11/18/international-strategy-to-better-protect-financial-system-against-cyber-threats-pub-83105 Accessed 5 May 2024.
Tobin, S. Israeli private eye arrested in London over alleged hacking for US firm. Reuters, 3 May 2024. Available from https://www.reuters.com/world/israeli-private-eye-arrested-uk-over-alleged-hacking-us-pr-firm-2024-05-02/ Accessed 6 May 2024.
Toulas, B. (2022). Chinese hackers use ransomware as a decoy for cyber espionage. Bleeping Computer, 23 Juni 2022. Available from https://www-bleepingcomputer-com.cdn.ampproject.org/c/s/www.bleepingcomputer.com/news/security/chinese-hackers-use-ransomware-as-decoy-for-cyber-espionage/amp/ Accessed 12 May 2024
van Laar, E., van Deursen, A. J. A. M., van Dijk, J. A. G. M., & de Haan, J. (2017). The relation between 21st-century skills and digital skills: A systematic literature review. Computers in Human Behavior, 72, 577–588. Available from https://www.sciencedirect.com/science/article/abs/pii/S0747563217301590?via%3Dihub Accessed 7 May 2024.
Wallace, I (2013). The Military Role in National Cybersecurity Governance. Available from https://www.brookings.edu/articles/the-military-role-in-national-cybersecurity-governance/ Accessed 22 April 2024.
Wang, V., Xinyao, Z., Wang, E. (2022). A comparison of cybersecurity regulations: China. Asia Business Law Journal, 19 Oktober 2022. Available from https://law.asia/china-cybersecurity-regulations-2022/ Accessed 13 May 2024.
Warta Ekonomi. 2022. Saling Lempar: Sebenarnya Siapa yang Bertanggung Jawab Atas Kebocoran Data, Kominfo atau BSSN? Available from https://wartaekonomi.co.id/read443139/saling-lempar-sebenarnya-siapa-yang-bertanggung-jawab-atas-kebocoran-data-kominfo-atau-bssn?page=all Accessed 6 Oktober 2023.
Wilson, J.R. (2019). Military cyber security: threats and solutions. Available from https://www.militaryaerospace.com/trusted-computing/article/14073852/military-cyber-security-tactical-network Accessed 22 April 2024.
Zheng, D. E., & Lewis, J.A. (2015). Cyber threat information sharing: Recommendations for Congress and the administration. Center for Strategic and International Studies, Washington, DC (2015). Available from http://csis-website-prod.s3.amazonaws.com/s3fs-public/legacy_files/files/publication/150310_cyberthreatinfosharing.pdf Accessed 4 May 2024.
Zimmermann, V., & Renaud, K. (2019). Moving from a ‘human-as-problem” to a ‘human-as -solution” cybersecurity mindset. International Journal of Human-Computer Studies. Available from https://www.sciencedirect.com/science/article/abs/pii/S1071581919300540?via%3Dihub Accessed 7 May 2024.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Jurnal Perencanaan Pembangunan: The Indonesian Journal of Development Planning
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
This is an open-access article distributed under the terms of the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License. Copyright © Kementerian PPN/Bappenas RI