Techno-Prevention in Counterterrorism: Between Countering Crime and Human Rights Protection
DOI:
https://doi.org/10.53955/jhcls.v3i3.176Abstract
Terrorism has become a significant concern throughout the world. This concern is supported by the increasing use of the internet, which has triggered an increase in cyberattacks. This research aims to determine the role of governance in counter-cyber terrorism. The normative legal methodology utilized in this study results from an exhaustive literature evaluation. This research shows that the government's role is needed to counter cyber terrorism. Although the Indonesian government has initiated a national cybersecurity strategy and implemented short-term and long-term programs, some obstacles and challenges hinder its implementation. The ITE Law has encouraged Indonesia to establish policies and regulations regarding information security. There have yet to be any regulations regarding cyber-attacks to counter cyber terrorism. Various institutions with common interests in national defense and security, including the cyber domain, must collaborate with BSSN. Other government agencies that depend on each other include the TNI, Polri, Ministry of Defense, BIN, and Ministry of Communication and Information. Apart from that, governance is also needed, including international organizations, several non-governmental organizations (NGOs), government and private governance, and several other components.Â
References
Aghajani, Gholamreza, and Noradin Ghadimi, ‘Multi-Objective Energy Management in a Micro-Grid,’ Energy Reports, 4 (2018), 218–25 https://doi.org/10.1016/j.egyr.2017.10.002
Ahmetoglu, Huseyin, and Resul Das, ‘A Comprehensive Review on Detection of Cyber-Attacks: Data Sets, Methods, Challenges, and Future Research Directions,’ Internet of Things, 20 (2022), 100615 https://doi.org/10.1016/j.iot.2022.100615
Akanni, J.O., ‘A Non-Linear Optimal Control Model for Illicit Drug Use and Terrorism Dynamics in Developing Countries with Time-Dependent Control Variables,’ Decision Analytics Journal, 8 (2023), 100281 https://doi.org/10.1016/j.dajour.2023.100281
Alhayani, Bilal, Sara Taher Abbas, Dawood Zahi Khutar, and Husam Jasim Mohammed, ‘WITHDRAWN: Best Ways Computation Intelligent of Face Cyber Attacks’, Materials Today: Proceedings, 2021 https://doi.org/10.1016/j.matpr.2021.02.557
Amarini, Indriati, Yusuf Saefudin, Ika Ariani Kartini, Marsitiningsih Marsitiningsih, and Noorfajri Ismail, ‘Digital Transformation: Creating an Effective and Efficient Court in Indonesia’, Legality : Jurnal Ilmiah Hukum, 31.2 (2023), 266–84 https://doi.org/10.22219/ljih.v31i2.28013
Ampratwum, Godslove, Robert Osei-Kyei, and Vivian W.Y. Tam, ‘Exploring the Concept of Public-Private Partnership in Building Critical Infrastructure Resilience against Unexpected Events: A Systematic Review,’ International Journal of Critical Infrastructure Protection, 39 (2022), 100556 https://doi.org/10.1016/j.ijcip.2022.100556
Ardiana, Meity, Adriano Adriano, Kurniadi Doni, and Yulianto Yulianto, ‘Corporate Criminal Liability in Procurement of Goods and Services in Hospital,’ Yuridika, 38.2 (2023), 399–414 https://doi.org/10.20473/ydk.v38i2.43674
Ariefulloh, Ariefulloh, Hibnu Nugroho, Angkasa Angkasa, and Riris Ardhanariswari, ‘Restorative Justice-Based Criminal Case Resolution in Salatiga, Indonesia: Islamic Law Perspective and Legal Objectives’, Ijtihad : Jurnal Wacana Hukum Islam Dan Kemanusiaan, 23.1 (2023), 19–36 https://doi.org/10.18326/ijtihad.v23i1.19-36
Arifin, Ridwan, Sigit Riyanto, and Akbar Kurnia Putra, ‘Collaborative Efforts in ASEAN for Global Asset Recovery Frameworks to Combat Corruption in the Digital Era,’ Legality : Jurnal Ilmiah Hukum, 31.2 (2023), 329–43 https://doi.org/10.22219/ljih.v31i2.29381
Atiyah, Ghassan Adhab, Nazura Abdul Manap, and Saidatul Nadia Abd Aziz, ‘Legal Status of Cryptocurrency Circulation in Iraq: Lessons from the United Arab Emirates and the United States,’ Hasanuddin Law Review, 9.1 (2023), 1 https://doi.org/10.20956/halrev.v9i1.3867
Azhmyakov, Vadim, Erik I. Verriest, Moises Bonilla, and Stefan Pickl, ‘Optimal Control Methodology for the Counter-Terrorism Strategies: The Relaxation Based Approach’, Journal of the Franklin Institute, 359.13 (2022), 6690–6708 https://doi.org/10.1016/j.jfranklin.2022.07.013
Bakry, Muammar, Abdul Syatar, Achmad Abubakar, Chaerul Risal, Ahmad Ahmad, and Muhammad Majdy Amiruddin, ‘Strengthening the Cyber Terrorism Law Enforcement in Indonesia: Assimilation from Islamic Jurisdiction’, International Journal of Criminology and Sociology, 10 (2021), 1267–76 https://doi.org/10.6000/1929-4409.2021.10.146
Barry, Thomas, Jonathan Jona, and Naomi Soderstrom, ‘The Impact of Country Institutional Factors on Firm Disclosure: Cybersecurity Disclosures in Chinese Cross-Listed Firms’, Journal of Accounting and Public Policy, 41.6 (2022), 106998 https://doi.org/10.1016/j.jaccpubpol.2022.106998
Beechey, Matthew, Konstantinos G. Kyriakopoulos, and Sangarapillai Lambotharan, ‘Evidential Classification and Feature Selection for Cyber-Threat Hunting’, Knowledge-Based Systems, 226 (2021), 107120 https://doi.org/10.1016/j.knosys.2021.107120
Bolbot, Victor, Ketki Kulkarni, Päivi Brunou, Osiris Valdez Banda, and Mashrura Musharraf, ‘Developments and Research Directions in Maritime Cybersecurity: A Systematic Literature Review and Bibliometric Analysis’, International Journal of Critical Infrastructure Protection, 39 (2022), 100571 https://doi.org/10.1016/j.ijcip.2022.100571
Brata, Al Fadilla Yoga, and Rakotoarisoa Maminiaina Heritiana Sedera, ‘The Implementing a Carbon Tax as a Means of Increasing Investment Value in Indonesia’, Journal of Sustainable Development and Regulatory Issues (JSDERI), 1.2 (2023), 39–50 https://doi.org/10.53955/jsderi.v1i2.6
Bullock, Jane A., George D. Haddow, and Damon P. Coppola, ‘Cybersecurity and Critical Infrastructure Protection’, in Introduction to Homeland Security (Elsevier, 2021), pp. 425–97 https://doi.org/10.1016/B978-0-12-817137-0.00008-0
Burdon, Mark, and Lizzie Coles-Kemp, ‘The Significance of Securing as a Critical Component of Information Security: An Australian Narrative’, Computers & Security, 87 (2019), 101601 https://doi.org/10.1016/j.cose.2019.101601
Cappai, Marco, ‘The Role of Private and Public Regulation in the Case Study of Crypto-Assets: The Italian Move towards Participatory Regulation’, Computer Law & Security Review, 49 (2023), 105831 https://doi.org/10.1016/j.clsr.2023.105831
Chang, Lennon Y.C., and Nicholas Coppel, ‘Building Cyber Security Awareness in a Developing Country: Lessons from Myanmar’, Computers & Security, 97 (2020), 101959 https://doi.org/10.1016/j.cose.2020.101959
Chatzis, Petros, and Eliana Stavrou, ‘Cyber-Threat Landscape of Border Control Infrastructures’, International Journal of Critical Infrastructure Protection, 36 (2022), 100503 https://doi.org/10.1016/j.ijcip.2021.100503
Cheryl, Barr-Kumarakulasinghe, Boon-Kwee Ng, and Chan-Yuan Wong, ‘Governing the Progress of Internet-of-Things: Ambivalence in the Quest of Technology Exploitation and User Rights Protection’, Technology in Society, 64 (2021), 101463 https://doi.org/10.1016/j.techsoc.2020.101463
Choudhary, Sheraz Ahmad, Muhammad Azhar Khan, Abdullah Zafar Sheikh, Mohd Khata Jabor, Mohd Safarin bin Nordin, Abdelmohsen A. Nassani, and others, ‘Role of Information and Communication Technologies on the War against Terrorism and on the Development of Tourism: Evidence from a Panel of 28 Countries’, Technology in Society, 62 (2020), 101296 https://doi.org/10.1016/j.techsoc.2020.101296
Cleary, Christopher, ‘Public-Private Partnerships: Security Organizations’, Encyclopedia of Security and Emergency Management, 2019, 1–7 https://doi.org/10.1007/978-3-319-69891-5_228-1
Cross, M.K.D., ‘Counter-Terrorism & the Intelligence Network in Europe’, International Journal of Law, Crime and Justice, 72 (2023), 100368 https://doi.org/10.1016/j.ijlcj.2019.100368
Diaz Valdivia, Andres, ‘Between Decentralization and Reintermediation: Blockchain Platforms and the Governance of “Commons-Led†and “Business-Led†Energy Transitions’, Energy Research & Social Science, 98 (2023), 103034 https://doi.org/10.1016/j.erss.2023.103034
Dong, Changyin, Yujia Chen, Hao Wang, Leizhen Wang, Ye Li, Daiheng Ni, and others, ‘Evaluating Impact of Remote-Access Cyber-Attack on Lane Changes for Connected Automated Vehicles’, Digital Communications and Networks, 2023 https://doi.org/10.1016/j.dcan.2023.06.004
Fu, Lipeng, Xueqing Wang, Bingsheng Liu, and Ling Li, ‘Investigation into the Role of Human and Organizational Factors in Security Work against Terrorism at Large-Scale Events’, Safety Science, 128 (2020), 104764 https://doi.org/10.1016/j.ssci.2020.104764
Ge, Hui, Lei Zhao, Dong Yue, Xiangpeng Xie, Linghai Xie, Sergey Gorbachev, and others, ‘A Game Theory Based Optimal Allocation Strategy for Defense Resources of Smart Grid under Cyber-Attack’, Information Sciences, 652 (2024), 119759 https://doi.org/10.1016/j.ins.2023.119759
Ginting, Jamin, and Patrick Talbot, ‘Fundraising Aspect of International Terrorism Organization in ASEAN: Legal and Political Aspects’, Lex Scientia Law Review, 7.1 (2023), 1–30 https://doi.org/10.15294/lesrev.v7i1.60074
Homburger, Zine, ‘The Necessity and Pitfall of Cybersecurity Capacity Building for Norm Development in Cyberspace’, Global Society, 33.2 (2019), 224–42 https://doi.org/10.1080/13600826.2019.1569502
IAIANI, Matteo, Alessandro TUGNOLI, Sarah BONVICINI, and Valerio COZZANI, ‘Analysis of Cybersecurity-Related Incidents in the Process Industry’, Reliability Engineering & System Safety, 209 (2021), 107485 https://doi.org/10.1016/j.ress.2021.107485
Jaelani, Abdul Kadir, and Resti Dian Luthviati, ‘The Crime Of Damage After the Constitutional Court’s Decision Number 76/PUU-XV/2017’, Journal of Human Rights, Culture and Legal System, 1.1 (2021) https://doi.org/10.53955/jhcls.v1i1.5
Kelemen, Barbara, and Alessandro Fergnani, ‘The Futures of Terrorism against China in the Greater Middle East’, Futures, 124 (2020), 102643 https://doi.org/10.1016/j.futures.2020.102643
Kouloufakos, Triantafyllos, ‘Untangling the Cyber Norm to Protect Critical Infrastructures’, Computer Law & Security Review, 49 (2023), 105809 https://doi.org/10.1016/j.clsr.2023.105809
Kusumaningtyas, Reza Octavia, and James Kalimanzila, ‘The Impact of Tax Incentive on Increase Foreign Direct Investment’, Journal of Sustainable Development and Regulatory Issues (JSDERI), 1.2 (2023), 51–63 https://doi.org/10.53955/jsderi.v1i2.7
Lattanzio, Gabriele, and Yue Ma, ‘Cybersecurity Risk and Corporate Innovation’, Journal of Corporate Finance, 82 (2023), 102445 https://doi.org/10.1016/j.jcorpfin.2023.102445
Lee, Claire Seungeun, and Ji Hye Kim, ‘Latent Groups of Cybersecurity Preparedness in Europe: Sociodemographic Factors and Country-Level Contexts’, Computers & Security, 97 (2020), 101995 https://doi.org/10.1016/j.cose.2020.101995
Li, Yuchong, and Qinghui Liu, ‘A Comprehensive Review Study of Cyber-Attacks and Cyber Security; Emerging Trends and Recent Developments’, Energy Reports, 7 (2021), 8176–86 https://doi.org/10.1016/j.egyr.2021.08.126
Macas, Mayra, Chunming Wu, and Walter Fuertes, ‘Adversarial Examples: A Survey of Attacks and Defenses in Deep Learning-Enabled Cybersecurity Systems’, Expert Systems with Applications, 238 (2024), 122223 https://doi.org/10.1016/j.eswa.2023.122223
Mahardika, Harryadin, Juliana French, and Agung Sembada, ‘Keep Calm and Eat Satay: Indonesia’s Consumption-Themed Signals of Defiance against Terrorism’, Australasian Marketing Journal, 26.3 (2018), 231–38 https://doi.org/10.1016/j.ausmj.2018.06.002
Masyhar, Ali, Muhammad Azil Maskur, Sri Redjeki Prasetyowati, Aldita Evan Prihama, Roy Priyono, and Ahmad Alif, ‘Digital Transformation of Youth Movement for Counter Radicalism’, 2022, p. 030010 https://doi.org/10.1063/5.0109808
Masyhar, Ali, Ali Murtadho, and Ahmad Zaharuddin Sani Ahmad Sabri, ‘The Driving Factors for Recidivism of Former Terrorism Convicts in Socio-Legal Perspective’, Journal of Indonesian Legal Studies, 8.1 (2023) https://doi.org/10.15294/jils.v8i1.69445
Mishra, Alok, Yehia Ibrahim Alzoubi, Memoona Javeria Anwar, and Asif Qumer Gill, ‘Attributes Impacting Cybersecurity Policy Development: An Evidence from Seven Nations’, Computers & Security, 120 (2022), 102820 https://doi.org/10.1016/j.cose.2022.102820
Mohammadi, Mokhtar, Tarik A. Rashid, Sarkhel H.Taher Karim, Adil Hussain Mohammed Aldalwie, Quan Thanh Tho, Moazam Bidaki, and others, ‘A Comprehensive Survey and Taxonomy of the SVM-Based Intrusion Detection Systems’, Journal of Network and Computer Applications, 178 (2021), 102983 https://doi.org/10.1016/j.jnca.2021.102983
Motsch, William, Alexander David, Keran Sivalingam, Achim Wagner, and Martin Ruskowski, ‘Approach for Dynamic Price-Based Demand Side Management in Cyber-Physical Production Systems’, Procedia Manufacturing, 51 (2020), 1748–54 https://doi.org/10.1016/j.promfg.2020.10.243
Niraja, K.S., and Sabbineni Srinivasa Rao, ‘WITHDRAWN: A Hybrid Algorithm Design for near Real Time Detection Cyber Attacks from Compromised Devices to Enhance IoT Security’, Materials Today: Proceedings, 2021 https://doi.org/10.1016/j.matpr.2021.01.751
Nugraha, Yudhistira, and Andrew Martin, ‘Towards a Framework for Trustworthy Data Security Level Agreement in Cloud Procurement’, Computers & Security, 106 (2021), 102266 https://doi.org/10.1016/j.cose.2021.102266
Okey, Ogobuchi Daniel, Ekikere Umoren Udo, Renata Lopes Rosa, Demostenes Zegarra RodrÃguez, and João Henrique Kleinschmidt, ‘Investigating ChatGPT and Cybersecurity: A Perspective on Topic Modeling and Sentiment Analysis’, Computers & Security, 135 (2023), 103476 https://doi.org/10.1016/j.cose.2023.103476
Plotnek, Jordan J., and Jill Slay, ‘Cyber Terrorism: A Homogenized Taxonomy and Definition’, Computers & Security, 102 (2021), 102145 https://doi.org/10.1016/j.cose.2020.102145
QMN-Nguyen, Moon, ‘Media Presentations of Vietnam’s Cybersecurity Law: A Comparative Approach with Corpus-Based Critical Discourse Analysis’, Computer Law & Security Review, 50 (2023), 105835 https://doi.org/10.1016/j.clsr.2023.105835
Radomyski, Adam, and Paweł Bernat, ‘Contemporary Determinants of Organising Effective Protection of Civil Aviation Against Terrorism’, Transportation Research Procedia, 35 (2018), 259–70 https://doi.org/10.1016/j.trpro.2018.12.021
Röell, Christiaan, Ellis Osabutey, Peter Rodgers, Felix Arndt, Zaheer Khan, and Shlomo Tarba, ‘Managing Socio-Political Risk at the Subnational Level: Lessons from MNE Subsidiaries in Indonesia’, Journal of World Business, 57.3 (2022), 101312 https://doi.org/10.1016/j.jwb.2022.101312
Safaei Pour, Morteza, Christelle Nader, Kurt Friday, and Elias Bou-Harb, ‘A Comprehensive Survey of Recent Internet Measurement Techniques for Cyber Security’, Computers & Security, 128 (2023), 103123 https://doi.org/10.1016/j.cose.2023.103123
Saputra, Rian, Tiara Tiolince, Iswantoro Iswantoro, and Sanju Kumar Sigh, ‘Artificial Intelligence and Intellectual Property Protection in Indonesia and Japan’, Journal of Human Rights, Culture and Legal System, 3.2 (2023), 210–35 https://doi.org/10.53955/jhcls.v3i2.69
Seger Guttmann, Tali, Shaked Gilboa, and Judith Partouche-Sebban, ‘“I Live with Terror inside Meâ€: Exploring Customers’ Instinctive Reactions to Terror’, International Journal of Hospitality Management, 92 (2021), 102734 https://doi.org/10.1016/j.ijhm.2020.102734
Septasari, Dita, ‘The Cyber Security and The Challenge of Society 5.0 Era in Indonesia’, Aisyah Journal Of Informatics and Electrical Engineering (A.J.I.E.E), 5.2 (2023), 227–33 https://doi.org/10.30604/jti.v5i2.231
Sepúlveda Estay, Daniel A., Rishikesh Sahay, Michael B. Barfod, and Christian D. Jensen, ‘A Systematic Review of Cyber-Resilience Assessment Frameworks’, Computers & Security, 97 (2020), 101996 https://doi.org/10.1016/j.cose.2020.101996
Sholecha, Ema Mar’ati, Ahmat Saiful, Sheilla Yunika, Hariyanto Hariyanto, and Norhaiden Unsil, ‘Justice Collaborator’s Position and Function on Witness Protection’s Rights as a Suspect from the Perspective of Criminal Law in Indonesia’, Volksgeist: Jurnal Ilmu Hukum Dan Konstitusi, 2023, 131–43 https://doi.org/10.24090/volksgeist.v6i1.7246
Da Silva, Joseph, ‘Cyber Security and the Leviathan’, Computers & Security, 116 (2022), 102674 https://doi.org/10.1016/j.cose.2022.102674
Spalek, Basia, and Salwa El-Awa, ‘Governance and Counter-Terrorism: Engaging Moderate and Non-Violent Extremist Movements in Combatting Jihadist-Linked Terrorism’, International Journal of Law, Crime and Justice, 72 (2023), 100367 https://doi.org/10.1016/j.ijlcj.2019.100367
Stacey, Patrick, Rebecca Taylor, Omotolani Olowosule, and Konstantina Spanaki, ‘Emotional Reactions and Coping Responses of Employees to a Cyber-Attack: A Case Study’, International Journal of Information Management, 58 (2021), 102298 https://doi.org/10.1016/j.ijinfomgt.2020.102298
Suryono, Ryan Randy, Indra Budi, and Betty Purwandari, ‘Detection of Fintech P2P Lending Issues in Indonesia’, Heliyon, 7.4 (2021), e06782 https://doi.org/10.1016/j.heliyon.2021.e06782
Tan, Sen, Peilin Xie, Josep M. Guerrero, Juan C. Vasquez, Yunlu Li, and Xifeng Guo, ‘Attack Detection Design for Dc Microgrid Using Eigenvalue Assignment Approach’, Energy Reports, 7 (2021), 469–76 https://doi.org/10.1016/j.egyr.2021.01.045
Tauda, Gunawan A., Andy Omara, and Gioia Arnone, ‘Cryptocurrency: Highlighting the Approach, Regulations, and Protection in Indonesia and European Union’, BESTUUR, 11.1 (August) (2023), 1 https://doi.org/10.20961/bestuur.v11i1.67125
Tian, Shu, Bo Zhao, and Resi Ong Olivares, ‘Cybersecurity Risks and Central Banks’ Sentiment on Central Bank Digital Currency: Evidence from Global Cyberattacks’, Finance Research Letters, 53 (2023), 103609 https://doi.org/10.1016/j.frl.2022.103609
Uchendu, Betsy, Jason R.C. Nurse, Maria Bada, and Steven Furnell, ‘Developing a Cyber Security Culture: Current Practices and Future Needs’, Computers & Security, 109 (2021), 102387 https://doi.org/10.1016/j.cose.2021.102387
Wardana, Dodi Jaya, Sukardi Sukardi, and Radian Salman, ‘Public Participation in the Law-Making Process in Indonesia’, Jurnal Media Hukum, 30.1 (2023), 66–77 https://doi.org/10.18196/jmh.v30i1.14813
Wei, Xingxing, ‘A Critical Evaluation of China’s Legal Responses to Cyberterrorism’, Computer Law & Security Review, 47 (2022), 105768 https://doi.org/10.1016/j.clsr.2022.105768
Yaacoub, Jean-Paul, Hassan Noura, Ola Salman, and Ali Chehab, ‘Security Analysis of Drones Systems: Attacks, Limitations, and Recommendations’, Internet of Things, 11 (2020), 100218 https://doi.org/10.1016/j.iot.2020.100218
Downloads
Published
Issue
Section
Citation Check
License
Authors who publish with Journal of Human Rights, Culture and Legal System agree to the following terms:
- Authors retain copyright and grant the Journal of Human Rights, Culture and Legal System right of first publication with the work simultaneously licensed under Creative Commons Attribution License (CC BY 4.0) that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors can enter into separate, additional contractual arrangements for the non-exclusive distribution of the published version of the work (e.g., post it to an institutional repository or edit it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) before and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.