Article Details
Vol. 1 No. 1 (2026): January
Data-Driven Analysis of Cyber Threats and Public Policy Responses in Indonesia
Abstract
Purpose: This study aims to examine cybersecurity vulnerabilities in Indonesia’s digital public service transformation using a data-driven public policy perspective and to generate evidence-based policy recommendations.
Research Methodology: This study applies a qualitative data science approach by combining systematic policy review with social media analytics. Public discourse on cybersecurity incidents was collected from Platform X through data scraping and analyzed using Orange software for sentiment analysis, keyword mapping, and temporal visualization to assess public perception and governance-related risks.
Results: The analysis reveals a dominance of negative sentiment associated with public distrust, institutional dissatisfaction, and concerns over recurring data leaks. Data patterns indicate three systemic drivers of cybersecurity vulnerability: delayed implementation of derivative regulations under the Personal Data Protection Law, technical fragility and centralized risk exposure within the National Data Center, and uneven digital literacy across the population. The findings demonstrate that cybersecurity failures are not isolated technical incidents but reflect broader governance and policy implementation gaps.
Conclusions: This study concludes that Indonesia’s digital transformation agenda is constrained by insufficient data-driven cybersecurity governance. The absence of integrated regulatory, technical, and social interventions weakens the state’s capacity to manage digital risks effectively.
Limitations: This study is limited to publicly available social media data and does not include direct institutional or field-level validation.
Contributions: This research contributes to data science for public policy by demonstrating how social media analytics can support policy diagnosis, risk assessment, and evidence-based cybersecurity reform in digital government systems.
Keywords
How to Cite
Download Citation
References
- Ahludzikri, F., Hasibuan, M. S., Aziz, R. Z. A., & Triloka, J. (2025). Blibiometric analysis of detection lung cancer. Advances in Artificial Intelligent and Machine Learning, 1(1), 61-71. doi:https://doi.org/10.35912/aaiml.v1i1.3776
- Albaldan, K. A., & Lisasih, N. Y. (2025). Personal Data Security Violations in East Jakarta Regional Elections: Legal Analysis Through Personal Data Protection Legislation. Journal of Law and Economics, 4(2), 145-152. doi:https://doi.org/10.56347/jle.v4i2.330
- Alshammari, M., & Simpson, A. (2017). Towards a principled approach for engineering privacy by design. Paper presented at the Annual Privacy Forum.
- Bada, M., & Nurse, J. R. (2019). Developing cybersecurity education and awareness programmes for small-and medium-sized enterprises (SMEs). Information & Computer Security, 27(3), 393-410. doi:https://doi.org/10.1093/cybsec/tyz006
- Balaji, K. (2025). E-Government and E-Governance: Driving Digital Transformation in Public Administration. Public Governance Practices in the Age of AI, 23-44. doi:https://doi.org//0.4018/979-8-3693-9286-7.ch002
- Baldwin, R., Cave, M., & Lodge, M. (2011). Understanding regulation: theory, strategy, and practice: Oxford university press.
- Bendovschi, A. (2015). Cyber-attacks–trends, patterns and security countermeasures. Procedia Economics and Finance, 28, 24-31. doi:https://doi.org/10.1016/S2212-5671(15)01077-1
- Bennett, C. J., & Raab, C. D. (2017). The governance of privacy: Policy instruments in global perspective: Routledge.
- Budiman, E. M. (2026). Philosophical Critique of Capital Market Regulation: A Case Study between Public Interest and Privacy. Jurnal Ilmiah Hukum dan Hak Asasi Manusia, 5(2), 1-13. doi:https://doi.org/10.35912/jihham.v5i2.4728
- Creswell, J. W., & Poth, C. N. (2016). Qualitative inquiry and research design: Choosing among five approaches: Sage publications.
- D'Arcy, J., Herath, T., & Shoss, M. K. (2014). Understanding employee responses to stressful information security requirements: A coping perspective. Journal of management information systems, 31(2), 285-318. doi:https://doi.org/10.1111/isj.12012
- De Hert, P., & Papakonstantinou, V. (2016). The new General Data Protection Regulation: Still a sound system for the protection of individuals? Computer law & security review, 32(2), 179-194. doi:https://doi.org/10.1016/j.clsr.2016.03.012
- Greenleaf, G. (2017). Global data privacy laws 2017: 120 national data privacy laws, including Indonesia and Turkey. Including Indonesia and Turkey (January 30, 2017), 145(12), 10-13.
- Hadlington, L. (2017). Human factors in cybersecurity; examining the link between Internet addiction, impulsivity, attitudes towards cybersecurity, and risky cybersecurity behaviours. Heliyon, 3(7). doi:https://doi.org/10.1016/j.heliyon.2017.e00346
- Janssen, M., & Helbig, N. (2018). Innovating and changing the policy-cycle: Policy-makers be prepared! Government Information Quarterly, 35(4), S99-S105. doi:https://doi.org/10.1016/j.giq.2015.11.009
- Janssen, M., Weerakkody, V., Ismagilova, E., Sivarajah, U., & Irani, Z. (2020). A framework for analysing blockchain technology adoption: Integrating institutional, market and technical factors. International Journal of Information Management, 50, 302-309. doi:https://doi.org/10.1016/j.giq.2020.101512
- Kang, M., & Hovav, A. (2020). Benchmarking methodology for information security policy (BMISP): Artifact development and evaluation. Information Systems Frontiers, 22(1), 221-242. doi:https://doi.org/10.1007/s10796-018-9855-6
- Karaman, M., & Aybar, C. (2016). Institutional cybersecurity from military perspective. International journal of information security science, 5(1), 1-7.
- Leahovcenco, A. (2021). Cybersecurity as a fundamental element of the digital economy. MEST Journal, 9(1). doi:https://doi.org/10.1108/JES-01-2020-0032
- Nisa, S. R., & Ali, R. (2025). Application of Fuzzy Matching in chatbot development to improve user experience on e-commerce sites (Case study: Cutiw Fashion Store). Advances in Artificial Intelligent and Machine Learning, 1(1), 51-60. doi:https://doi.org/10.35912/aaiml.v1i1.3775
- Novitasari, E., Dewi, F. G., & Oktavia, R. (2022). Determinants of e-government implementation in Indonesia. Asian Journal of Economics, Business, and Accounting, 22(19), 25-33.
- Sahatatua, R., Setiady, T., Astawa, I., & Ansari, T. (2024). role of Investment Law in Indonesia's Economic Recovery Efforts. Journal of Multidisciplinary Academic and Practice Studies, 2, 257-259. doi:https://doi.org/10.35912/jomaps.v2i3.2218
- Silic, M., & Back, A. (2014). Information security: Critical review and future directions for research. Information Management & Computer Security, 22(3), 279-308. doi:https://doi.org/10.1108/IMCS-05-2013-0041
- Singer, P. W., & Friedman, A. (2013). Cybersecurity and cyberwar: What everyone needs to know®: Oxford University Press.
- Snyder, H. (2019). Literature review as a research methodology: An overview and guidelines. Journal of business research, 104, 333-339. doi:https://doi.org/10.1016/j.jbusres.2019.07.039
- Van Deursen, A. J., & Van Dijk, J. A. (2019). The first-level digital divide shifts from inequalities in physical access to inequalities in material access. New media & society, 21(2), 354-375. doi:https://doi.org/10.1177/1461444818797082
- Vial, G. (2021). Understanding digital transformation: A review and a research agenda. Managing digital transformation, 13-66. doi:https://doi.org/10.1016/j.jsis.2021.101695
- von Solms, R., & van Niekerk, J. (2013). From information security to cyber security. Computers & Security, 38, 97-102. doi:https://doi.org/10.1016/j.cose.2013.04.004
- Widyastuti, L. A., & Tarumingkeng, R. C. (2025). The effect of Artificial Intelligence (AI) and Customer Experience (CX) use in telemedicine on customer satisfaction moderated by service duration. Advances in Artificial Intelligent and Machine Learning, 1(1), 1-20. doi:https://doi.org/10.35912/aaiml.v1i1.3763
- Yulita, Y. (2025). Expert system for early detection of autism in children using forward chaining method based on android. Advances in Artificial Intelligent and Machine Learning, 1(1), 21-39. doi:https://doi.org/10.35912/aaiml.v1i1.3773