Cybercrime and Threats to the Electoral System
DOI:
https://doi.org/10.58982/jdlp.v3i1.508Keywords:
cyberattacks, electronic election, election systemAbstract
Cyberattacks have emerged as a growing threat in the context of elections worldwide, posing significant risks to the integrity, security, and trustworthiness of electoral systems in today's digital age where information technology plays a pivotal role. Drawing from documented cyberattack cases and security reports from government agencies and related organizations during elections, common attack types such as Denial-of-Service (DoS), Phishing, and Malware have been identified. Cybersecurity systems and data sovereignty form the bedrock of personal data protection. As technology advances, data has become a highly valuable commodity, and a nation's data sovereignty intersects with the private sector on a global scale in political and economic terms. The state's primary responsibility lies in crafting regulations for data protection and cybersecurity, ensuring citizens' rights to personal data protection, which necessitates enhancing their capacity and capabilities. Therefore, this qualitative research delves into the imperative of developing citizens' capacity and capabilities in building cybersecurity and data sovereignty, with a particular focus on safeguarding personal data in the Indonesian context, as books and journal articles serve as valuable sources for data collection. Bolstering citizens' capacity and capabilities is essential for preserving their personal data in the digital realm.
References
Anjani Firman, Fathika. “Kebijakan Pertahanan Cyber Estonia Dalam Merespon Tindakan Cyber Sabotage Oleh Rusia Kepada Estonia.” UNIKOM University, 2018. https://repository.unikom.ac.id/59424/.
Blayne Haggart, Jan Aart Scholte, Natasha Tusikov. Power and Authority in Internet Governance: Return of the State? New York: Taylor & Francis, 2021.
BSSN. “Indonesia: BSSN Issues Recommendations for Preventing Cyber Attacks.” 29 October, 2021. https://www.dataguidance.com/news/indonesia-bssn-issues-recommendations-preventing-cyber.
Clough, Jonathan. “A WORLD OF DIFFERENCE: THE BUDAPEST CONVENTION ON CYBERCRIME AND THE CHALLENGES OF HARMONISATION.” Monash University Law Review 40, no. 3 (2014): 698. http://classic.austlii.edu.au/au/journals/MonashULawRw/2014/28.pdf.
Jose, Hino Samuel. “Politisasi Agenda Keamanan Siber Pada Era Industri 4.0 Di Forum Multilateral.” Populika 9, no. 2 (2021): 70–85. https://doi.org/10.37631/populika.v9i2.390.
Kaskus. “Serangan DoS Pada Situs Kaskus Oleh Komunitas YogyaFree,” 2016. https://www.kaskus.co.id/thread/56c2c8d69a09515e5e8b4567/serangan-dos-pada-situs-kaskus-oleh-komunitas-yogyafree.
Nurul, Shinta, Shynta Anggrainy, and Siska Aprelyani. “Faktor-Faktor Yang Mempengaruhi Keamanan Sistem Informasi?: Keamanan Informasi , Teknologi Informasi Dan Network ( Literature Review Sim ).” Jurnal Ekonomi Manajemen Sistem Informasi (Jemsi) Vol. 3, no. No. 5 (2022): 564–73.
Parulian, Sahat, Devi Anassalifa Pratiwi, and Meiliya Cahya Yustina. “Ancaman Dan Solusi Serangan Siber Di Indonesia.” Telecommunications, Networks, Electronics, and Computer Technologies (TELNECT) 1, no. 2 (2021): 85–92. http://ejournal.upi.edu/index.php/TELNECT/.
Pratama, M Syadli, Fetri Miftach, and Yusuf Ali. “The Cyber Security Strategy of General Elections Commission in Facing the General Election 2019.” Jurnal Prodi Perang Asimetris 4, no. 3 (2018): 77–94.
Samad, M Yusuf, and Pratama Dahlian Persadha. “Memahami Perang Siber Rusia Dan Peran Badan Intelijen Negara Dalam Menangkal Ancaman Siber Understanding Russian Cyber Warfare and the Role of the State Intelligence Agency in Countering Cyber Threats.” Jurnal Ilmu Pengetahuan Dan Teknologi Komunikasi 24, no. 2 (2022): 135–46. http://dx.doi.org/10.17933/iptekkom.24.2.2022.135-146.
Sandrawati, Nyoman Amie. “Antisipasi Cybercrime Dan Kesenjangan Digital Dalam Penerapan TIK Di KPU.” Electoral Governance Jurnal Tata Kelola Pemilu Indonesia 3, no. 2 (2022): 232–57.
Snyder, H. “Literature Review as a Research Methodology: An Overview and Guidelines.” Journal of Business Research, 2019, 333–39. https://doi.org/https://doi.org/10.1016/j.jbusres.2019.07.039.
Soekanto, Soerjono. Faktor-Faktor Yang Mempengaruhi Penegakan Hukum. Jakarta: PT Rajawali Pers, 2015.
Statistics, National Center for Education. “Protecting Your System: Information Security,” 2023. https://nces.ed.gov/pubs98/safetech/chapter6.asp.
Suharto, Miko Aditiya, and Maria Novita Apriyani. “Konsep Cyber Attack, Cyber Crime, Dan Cyber Warfare Dalam Aspek Hukum Internasional.” Risalah Hukum 17 (2021): 98–107. https://doi.org/10.30872/risalah.v17i2.705.
Union, International Telecommunication. “Global Cybersecurity Index (GCI) 2017.” Geneva, 2017. https://www.itu.int/dms_pub/itu-d/opb/str/D-STR-GCI.01-2017-PDF-E.pdf.
Yuliantiningsih, Aryuni. “Analisis Doktrin Perang Yang Adil (Just War ) Dalam Kasus Serangan Siber Rusia Terhadap Georgia Tahun 2008.” Kosmik Hukum 21, no. 3 (2021): 175. https://doi.org/10.30595/kosmikhukum.v21i3.10613.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 Journal of Digital Law and Policy

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.