AiPLaP

Article Details

Vol. 1 No. 1 (2026): January

Data-Driven Analysis of Cyber Threats and Public Policy Responses in Indonesia

https://doi.org/10.35912/aiplap.v1i1.3918

Abstract

Purpose: This study aims to examine cybersecurity vulnerabilities in Indonesia’s digital public service transformation using a data-driven public policy perspective and to generate evidence-based policy recommendations.

Research Methodology: This study applies a qualitative data science approach by combining systematic policy review with social media analytics. Public discourse on cybersecurity incidents was collected from Platform X through data scraping and analyzed using Orange software for sentiment analysis, keyword mapping, and temporal visualization to assess public perception and governance-related risks.

Results: The analysis reveals a dominance of negative sentiment associated with public distrust, institutional dissatisfaction, and concerns over recurring data leaks. Data patterns indicate three systemic drivers of cybersecurity vulnerability: delayed implementation of derivative regulations under the Personal Data Protection Law, technical fragility and centralized risk exposure within the National Data Center, and uneven digital literacy across the population. The findings demonstrate that cybersecurity failures are not isolated technical incidents but reflect broader governance and policy implementation gaps.

Conclusions: This study concludes that Indonesia’s digital transformation agenda is constrained by insufficient data-driven cybersecurity governance. The absence of integrated regulatory, technical, and social interventions weakens the state’s capacity to manage digital risks effectively.

Limitations: This study is limited to publicly available social media data and does not include direct institutional or field-level validation.

Contributions: This research contributes to data science for public policy by demonstrating how social media analytics can support policy diagnosis, risk assessment, and evidence-based cybersecurity reform in digital government systems.

Keywords

Cyber Security Data Science Digital Transformation Personal Data Protection Public Policy

How to Cite

Jannah, E. S. N. ., Prasasti, D. E. ., & Fisabilazkia, N. A. . (2026). Data-Driven Analysis of Cyber Threats and Public Policy Responses in Indonesia. Advances in Public Law and Policy, 1(1), 39–49. https://doi.org/10.35912/aiplap.v1i1.3918

References

  1. Ahludzikri, F., Hasibuan, M. S., Aziz, R. Z. A., & Triloka, J. (2025). Blibiometric analysis of detection lung cancer. Advances in Artificial Intelligent and Machine Learning, 1(1), 61-71. doi:https://doi.org/10.35912/aaiml.v1i1.3776
  2. Albaldan, K. A., & Lisasih, N. Y. (2025). Personal Data Security Violations in East Jakarta Regional Elections: Legal Analysis Through Personal Data Protection Legislation. Journal of Law and Economics, 4(2), 145-152. doi:https://doi.org/10.56347/jle.v4i2.330
  3. Alshammari, M., & Simpson, A. (2017). Towards a principled approach for engineering privacy by design. Paper presented at the Annual Privacy Forum.
  4. Bada, M., & Nurse, J. R. (2019). Developing cybersecurity education and awareness programmes for small-and medium-sized enterprises (SMEs). Information & Computer Security, 27(3), 393-410. doi:https://doi.org/10.1093/cybsec/tyz006
  5. Balaji, K. (2025). E-Government and E-Governance: Driving Digital Transformation in Public Administration. Public Governance Practices in the Age of AI, 23-44. doi:https://doi.org//0.4018/979-8-3693-9286-7.ch002
  6. Baldwin, R., Cave, M., & Lodge, M. (2011). Understanding regulation: theory, strategy, and practice: Oxford university press.
  7. Bendovschi, A. (2015). Cyber-attacks–trends, patterns and security countermeasures. Procedia Economics and Finance, 28, 24-31. doi:https://doi.org/10.1016/S2212-5671(15)01077-1
  8. Bennett, C. J., & Raab, C. D. (2017). The governance of privacy: Policy instruments in global perspective: Routledge.
  9. Budiman, E. M. (2026). Philosophical Critique of Capital Market Regulation: A Case Study between Public Interest and Privacy. Jurnal Ilmiah Hukum dan Hak Asasi Manusia, 5(2), 1-13. doi:https://doi.org/10.35912/jihham.v5i2.4728
  10. Creswell, J. W., & Poth, C. N. (2016). Qualitative inquiry and research design: Choosing among five approaches: Sage publications.
  11. D'Arcy, J., Herath, T., & Shoss, M. K. (2014). Understanding employee responses to stressful information security requirements: A coping perspective. Journal of management information systems, 31(2), 285-318. doi:https://doi.org/10.1111/isj.12012
  12. De Hert, P., & Papakonstantinou, V. (2016). The new General Data Protection Regulation: Still a sound system for the protection of individuals? Computer law & security review, 32(2), 179-194. doi:https://doi.org/10.1016/j.clsr.2016.03.012
  13. Greenleaf, G. (2017). Global data privacy laws 2017: 120 national data privacy laws, including Indonesia and Turkey. Including Indonesia and Turkey (January 30, 2017), 145(12), 10-13.
  14. Hadlington, L. (2017). Human factors in cybersecurity; examining the link between Internet addiction, impulsivity, attitudes towards cybersecurity, and risky cybersecurity behaviours. Heliyon, 3(7). doi:https://doi.org/10.1016/j.heliyon.2017.e00346
  15. Janssen, M., & Helbig, N. (2018). Innovating and changing the policy-cycle: Policy-makers be prepared! Government Information Quarterly, 35(4), S99-S105. doi:https://doi.org/10.1016/j.giq.2015.11.009
  16. Janssen, M., Weerakkody, V., Ismagilova, E., Sivarajah, U., & Irani, Z. (2020). A framework for analysing blockchain technology adoption: Integrating institutional, market and technical factors. International Journal of Information Management, 50, 302-309. doi:https://doi.org/10.1016/j.giq.2020.101512
  17. Kang, M., & Hovav, A. (2020). Benchmarking methodology for information security policy (BMISP): Artifact development and evaluation. Information Systems Frontiers, 22(1), 221-242. doi:https://doi.org/10.1007/s10796-018-9855-6
  18. Karaman, M., & Aybar, C. (2016). Institutional cybersecurity from military perspective. International journal of information security science, 5(1), 1-7.
  19. Leahovcenco, A. (2021). Cybersecurity as a fundamental element of the digital economy. MEST Journal, 9(1). doi:https://doi.org/10.1108/JES-01-2020-0032
  20. Nisa, S. R., & Ali, R. (2025). Application of Fuzzy Matching in chatbot development to improve user experience on e-commerce sites (Case study: Cutiw Fashion Store). Advances in Artificial Intelligent and Machine Learning, 1(1), 51-60. doi:https://doi.org/10.35912/aaiml.v1i1.3775
  21. Novitasari, E., Dewi, F. G., & Oktavia, R. (2022). Determinants of e-government implementation in Indonesia. Asian Journal of Economics, Business, and Accounting, 22(19), 25-33.
  22. Sahatatua, R., Setiady, T., Astawa, I., & Ansari, T. (2024). role of Investment Law in Indonesia's Economic Recovery Efforts. Journal of Multidisciplinary Academic and Practice Studies, 2, 257-259. doi:https://doi.org/10.35912/jomaps.v2i3.2218
  23. Silic, M., & Back, A. (2014). Information security: Critical review and future directions for research. Information Management & Computer Security, 22(3), 279-308. doi:https://doi.org/10.1108/IMCS-05-2013-0041
  24. Singer, P. W., & Friedman, A. (2013). Cybersecurity and cyberwar: What everyone needs to know®: Oxford University Press.
  25. Snyder, H. (2019). Literature review as a research methodology: An overview and guidelines. Journal of business research, 104, 333-339. doi:https://doi.org/10.1016/j.jbusres.2019.07.039
  26. Van Deursen, A. J., & Van Dijk, J. A. (2019). The first-level digital divide shifts from inequalities in physical access to inequalities in material access. New media & society, 21(2), 354-375. doi:https://doi.org/10.1177/1461444818797082
  27. Vial, G. (2021). Understanding digital transformation: A review and a research agenda. Managing digital transformation, 13-66. doi:https://doi.org/10.1016/j.jsis.2021.101695
  28. von Solms, R., & van Niekerk, J. (2013). From information security to cyber security. Computers & Security, 38, 97-102. doi:https://doi.org/10.1016/j.cose.2013.04.004
  29. Widyastuti, L. A., & Tarumingkeng, R. C. (2025). The effect of Artificial Intelligence (AI) and Customer Experience (CX) use in telemedicine on customer satisfaction moderated by service duration. Advances in Artificial Intelligent and Machine Learning, 1(1), 1-20. doi:https://doi.org/10.35912/aaiml.v1i1.3763
  30. Yulita, Y. (2025). Expert system for early detection of autism in children using forward chaining method based on android. Advances in Artificial Intelligent and Machine Learning, 1(1), 21-39. doi:https://doi.org/10.35912/aaiml.v1i1.3773
Contact Us
WhatsApp Instagram Facebook LinkedIn Email