Bridging the Gap Between Policy and Practice: Evaluating Indonesia’s Cybersecurity Regulatory Framework (2020–2023)

Authors

  • Tahegga Primananda Alfath Universitas Narotama
  • Waskita Cahya Institut Bisnis dan Informatika (IBI) Kosgoro 1957

DOI:

https://doi.org/10.61978/data.v2i1.695

Keywords:

Cybersecurity, Policy Evaluation, Digital Governance, Indonesia, Cyber Threats, Regulatory Effectiveness, ASEAN

Abstract

Indonesia's rapid digital transformation has heightened its exposure to cybersecurity threats, prompting the introduction of several national policies aimed at enhancing cyber resilience. This study evaluates the effectiveness of three key regulations—Peraturan BSSN No.8/2020, Perpres 82/2022, and Perpres 47/2023—through a qualitative policy analysis framework. Data were drawn from national cyber incident statistics, regulatory documents, and secondary literature. Methodologically, the study applies qualitative frameworks and correlates policy timelines with cyber incident volumes between 2020 and 2023. Statistical tools, including time-series and regression analyses, are used to determine regulatory impacts on threat reduction. Findings reveal that while the regulations establish a strong structural foundation, implementation remains weak. Cyber incidents continued to rise post-regulation, and key challenges such as agency fragmentation, underinvestment (0.02% of GDP), and limited stakeholder collaboration persist. Case studies, including breaches at Dukcapil and Imigrasi, underscore the urgent need for better enforcement and inter-agency coordination. Comparative analysis with regional peers like Singapore highlights further room for improvement in governance and public-private synergy. The study concludes that Indonesia’s cybersecurity policies are directionally sound but require systemic reforms, centralized coordination, and investment scaling to achieve tangible outcomes. These insights contribute to the literature on regulatory effectiveness and cyber governance in emerging economies

References

Abrahams, T., Ewuga, S., Kaggwa, S., Uwaoma, P., Hassan, A., & Dawodu, S. (2024). Mastering compliance: a comprehensive review of regulatory frameworks in accounting and cybersecurity. Computer Science & IT Research Journal, 5(1), 120-140. https://doi.org/10.51594/csitrj.v5i1.709 DOI: https://doi.org/10.51594/csitrj.v5i1.709

Alexandri, M., Usman, I., Narimawati, U., & Taryana, A. (2023). Unraveling the fintech landscape: a systematic mapping study on the impact of financial technology innovation on investment decision-making in ASEAN banking. Khazanah Sosial, 5(1), 113-124. https://doi.org/10.15575/ks.v5i1.24555 DOI: https://doi.org/10.15575/ks.v5i1.24555

Arafa, A., Sheerah, H., & Alsalamah, S. (2023). Emerging digital technologies in healthcare with a spotlight on cybersecurity: A narrative review. Information, 14(12), 640. https://doi.org/10.3390/info14120640 DOI: https://doi.org/10.3390/info14120640

Atkins, S., & Lawson, C. (2021). An improvised patchwork: Success and failure in cybersecurity policy for critical infrastructure. Public Administration Review, 81(5), 847–861. https://doi.org/10.1111/puar.13322 DOI: https://doi.org/10.1111/puar.13322

Bagui, L., Lusinga, S., Pule, N., Tuyeni, T., Mtegha, C., Calandro, E., … & Solms, B. (2023). The impact of COVID‐19 on cybersecurity awareness‐raising and mindset in the Southern African Development Community (SADC). The Electronic Journal of Information Systems in Developing Countries, 89(4). https://doi.org/10.1002/isd2.12264 DOI: https://doi.org/10.1002/isd2.12264

Benjamin, L., Adegbola, A., Amajuoyi, P., Adegbola, M., & Adeusi, K. (2024). Digital transformation in SMEs: Identifying cybersecurity risks and developing effective mitigation strategies. Global Journal of Engineering and Technology Advances, 19(2), 134–153. https://doi.org/10.30574/gjeta.2024.19.2.0084 DOI: https://doi.org/10.30574/gjeta.2024.19.2.0084

Blamire, J., & Rees, J. (2025). Robust local governance responses in the context of turbulence: The case of collaborative and co‐created COVID‐19 pandemic responses in two local authority areas in England. Social Policy and Administration, 59(2), 350–359. https://doi.org/10.1111/spol.13126 DOI: https://doi.org/10.1111/spol.13126

Darmawan, A., Yuliawan, D., Aida, N., & Husain, F. (2024). Identifying the influence of foreign direct investment toward the ASEAN Economic Community 2025. KNE Social Sciences. https://doi.org/10.18502/kss.v9i14.16090 DOI: https://doi.org/10.18502/kss.v9i14.16090

Elendu, C., Omeludike, E., Oloyede, P., Obidigbo, B., & Omeludike, J. (2024). Legal implications for clinicians in cybersecurity incidents: A review. Medicine, 103(39), e39887. https://doi.org/10.1097/md.0000000000039887 DOI: https://doi.org/10.1097/MD.0000000000039887

Estiyovionita, K., & Sitamala, A. (2022). ASEAN's role in cybersecurity maintenance and security strategy through an international security approach. Lampung Journal of International Law, 4(2), 77–86. https://doi.org/10.25041/lajil.v4i2.2556 DOI: https://doi.org/10.25041/lajil.v4i2.2556

Familoni, B., & Shoetan, P. (2024). Cybersecurity in the financial sector: A comparative analysis of the USA and Nigeria. Computer Science & IT Research Journal, 5(4), 850–877. https://doi.org/10.51594/csitrj.v5i4.1046 DOI: https://doi.org/10.51594/csitrj.v5i4.1046

Folorunsho, S., Adenekan, O., Ezeigweneme, C., Somadina, I., & Okeleke, P. (2024). Ensuring cybersecurity in telecommunications: Strategies to protect digital infrastructure and sensitive data. Computer Science & IT Research Journal, 5(8), 1855–1883. https://doi.org/10.51594/csitrj.v5i8.1448 DOI: https://doi.org/10.51594/csitrj.v5i8.1448

Fortin, A., & Héroux, S. (2022). Limited usefulness of firm-provided cybersecurity information in institutional investors’ investment analysis. Information and Computer Security, 31(1), 108–123. https://doi.org/10.1108/ics-07-2022-0122 DOI: https://doi.org/10.1108/ICS-07-2022-0122

Freyer, O., Jahed, F., Ostermann, M., Rosenzweig, C., Werner, P., & Gilbert, S. (2024). Consideration of cybersecurity risks in the benefit-risk analysis of medical devices: Scoping review. Journal of Medical Internet Research, 26, e65528. https://doi.org/10.2196/65528 DOI: https://doi.org/10.2196/65528

Hersugondo, H., Widyarti, E., Maruddani, D., & Trimono, T. (2022). ASEAN-5 stock price index valuation after COVID-19 outbreak through GBM-MCS and VAR-SDPP methods. International Journal of Financial Studies, 10(4), 112. https://doi.org/10.3390/ijfs10040112 DOI: https://doi.org/10.3390/ijfs10040112

Huang, K., Madnick, S., Choucri, N., & Fang, Z. (2021). A systematic framework to understand transnational governance for cybersecurity risks from digital trade. Global Policy, 12(5), 625–638. https://doi.org/10.1111/1758-5899.13014 DOI: https://doi.org/10.1111/1758-5899.13014

Juanatey, A., Jordana, J., & Sancho, D. (2024). Multi‐level governance in higher education quality assurance: Agencification and policy coordination in Spain. Review of Policy Research, 42(3), 530–551. https://doi.org/10.1111/ropr.12624 DOI: https://doi.org/10.1111/ropr.12624

Kalderemidis, I., Farao, A., Bountakas, P., Panda, S., & Xenakis, C. (2022). GTM: Game theoretic methodology for optimal cybersecurity defending strategies and investments, 1–9. https://doi.org/10.1145/3538969.3544431 DOI: https://doi.org/10.1145/3538969.3544431

Kamariotou, M., & Kitsios, F. (2023). Information systems strategy and security policy: A conceptual framework. Electronics, 12(2), 382. https://doi.org/10.3390/electronics12020382 DOI: https://doi.org/10.3390/electronics12020382

Khan, N., Ikram, N., & Saleem, S. (2023). Effects of socioeconomic and digital inequalities on cybersecurity in a developing country. Security Journal, 37(2), 214–244. https://doi.org/10.1057/s41284-023-00375-4 DOI: https://doi.org/10.1057/s41284-023-00375-4

Khaw, T., Amran, A., & Teoh, A. (2024). Building a thematic framework of cybersecurity: A systematic literature review approach. Journal of Systems and Information Technology, 26(2), 234–256. https://doi.org/10.1108/jsit-07-2023-0132 DOI: https://doi.org/10.1108/JSIT-07-2023-0132

Kim, Y., Go, M., Kim, S., Lee, J., & Lee, K. (2023). Evaluating cybersecurity capacity building of ASEAN Plus Three through social network analysis. 網際網路技術學刊, 24(2), 495–505. https://doi.org/10.53106/160792642023032402031 DOI: https://doi.org/10.53106/160792642023032402031

Kuzior, A., Yarovenko, H., Brożek, P., Sidelnyk, N., Boyko, A., & Vasilyeva, T. (2023). Company cybersecurity system: Assessment, risks and expectations. Production Engineering Archives, 29(4), 379–392. https://doi.org/10.30657/pea.2023.29.43 DOI: https://doi.org/10.30657/pea.2023.29.43

Layode, O., Naiho, H., Adeleke, G., Udeh, E., & Labake, T. (2024). The role of cybersecurity in facilitating sustainable healthcare solutions: Overcoming challenges to protect sensitive data. International Medical Science Research Journal, 4(6), 668–693. https://doi.org/10.51594/imsrj.v4i6.1228 DOI: https://doi.org/10.51594/imsrj.v4i6.1228

Mahmood, S., Chadhar, M., & Firmin, S. (2024). Countermeasure strategies to address cybersecurity challenges amidst major crises in the higher education and research sector: An organisational learning perspective. Information, 15(2), 106. https://doi.org/10.3390/info15020106 DOI: https://doi.org/10.3390/info15020106

Melaku, H. (2023). A dynamic and adaptive cybersecurity governance framework. Journal of Cybersecurity and Privacy, 3(3), 327–350. https://doi.org/10.3390/jcp3030017 DOI: https://doi.org/10.3390/jcp3030017

Mishra, A., Alzoubi, Y., Anwar, M., & Gill, A. (2022). Attributes impacting cybersecurity policy development: An evidence from seven nations. Computers & Security, 120, 102820. https://doi.org/10.1016/j.cose.2022.102820 DOI: https://doi.org/10.1016/j.cose.2022.102820

Nagyfejeo, E., & Solms, B. (2020). Why do national cybersecurity awareness programmes often fail?. International Journal of Information Security and Cybercrime, 9(2), 18–27. https://doi.org/10.19107/ijisc.2020.02.03 DOI: https://doi.org/10.19107/IJISC.2020.02.03

Okoye, C., Nwankwo, E., Usman, F., Mhlongo, N., Odeyemi, O., & Ike, C. (2024). Securing financial data storage: A review of cybersecurity challenges and solutions. International Journal of Science and Research Archive, 11(1), 1968–1983. https://doi.org/10.30574/ijsra.2024.11.1.0267 DOI: https://doi.org/10.30574/ijsra.2024.11.1.0267

Oliha, J., Biu, P., & Chimezie, O. (2024). Securing the smart city: A review of cybersecurity challenges and strategies. Open Access Research Journal of Multidisciplinary Studies, 7(1), 094–101. https://doi.org/10.53022/oarjms.2024.7.1.0013 DOI: https://doi.org/10.53022/oarjms.2024.7.1.0013

Oyeniyi, L., Ugochukwu, C., & Mhlongo, N. (2024). Developing cybersecurity frameworks for financial institutions: A comprehensive review and best practices. Computer Science & IT Research Journal, 5(4), 903–925. https://doi.org/10.51594/csitrj.v5i4.1049 DOI: https://doi.org/10.51594/csitrj.v5i4.1049

Pramoda, M., Pramoda, S., & Correa, Z. (2022). Luster regained: A novel cyber incident risk prediction model using machine learning. International Journal of Scientific Research in Computer Science Engineering and Information Technology, 01–19. https://doi.org/10.32628/cseit2283125 DOI: https://doi.org/10.32628/CSEIT2283125

Ramadhan, I. (2022). ASEAN consensus and forming cybersecurity regulation in Southeast Asia. https://doi.org/10.4108/eai.31-3-2022.2320684 DOI: https://doi.org/10.4108/eai.31-3-2022.2320684

Rattanapong, P., & Ayuthaya, S. (2025). Influential factors of cybersecurity investment: A quantitative SEM analysis. Management Science Letters, 15(1), 31–44. https://doi.org/10.5267/j.msl.2024.3.005 DOI: https://doi.org/10.5267/j.msl.2024.3.005

Slater, S., Lawrence, M., Wood, B., Sêrodio, P., Akker, A., & Baker, P. (2024). The rise of multi-stakeholderism, the power of ultra-processed food corporations, and the implications for global food governance: A network analysis. Agriculture and Human Values, 42(1), 177–192. https://doi.org/10.1007/s10460-024-10593-0 DOI: https://doi.org/10.1007/s10460-024-10593-0

Trim, P., & Lee, Y. (2022). Combining sociocultural intelligence with artificial intelligence to increase organizational cyber security provision through enhanced resilience. Big Data and Cognitive Computing, 6(4), 110. https://doi.org/10.3390/bdcc6040110 DOI: https://doi.org/10.3390/bdcc6040110

Weiß, M., & Jankauskas, V. (2018). Securing cyberspace: How states design governance arrangements. Governance, 32(2), 259–275. https://doi.org/10.1111/gove.12368 DOI: https://doi.org/10.1111/gove.12368

Yamada, R. (2024). Impact of cybersecurity regulations on corporate compliance practices in Japan. International Journal of Law and Policy, 9(2), 28–38. https://doi.org/10.47604/ijlp.2705 DOI: https://doi.org/10.47604/ijlp.2705

Downloads

Published

2024-01-31

How to Cite

Alfath, T. P., & Cahya, W. (2024). Bridging the Gap Between Policy and Practice: Evaluating Indonesia’s Cybersecurity Regulatory Framework (2020–2023). Data : Journal of Information Systems and Management, 2(1), 14–24. https://doi.org/10.61978/data.v2i1.695