Overcoming Security Challenges in Digital Government in West Papua
DOI:
https://doi.org/10.71435/639167Keywords:
Digital Government, Security Challenges, West Papua, Quantitative Method, Government EmployeesAbstract
Purpose: This research aims to identify and analyze the security challenges faced by digital government initiatives in West Papua, Indonesia
Subjects and Methods: The study employs a quantitative method, conducting surveys among government employees involved in digital transformation projects.
Results: The results of the analysis indicate that there is still a low level of awareness and understanding of digital security among government employees in West Papua. These findings highlight the importance of increasing awareness and training on digital security for government employees involved in digital government initiatives.
Conclusions: The conclusion of this research is the highlight several key findings regarding cybersecurity in digital governance in West Papua. There is a significant need for increased cybersecurity awareness and education, as well as greater investment in cybersecurity infrastructure and resources.
References
Addo, A., & Senyo, P. K. (2021). Advancing E-governance for development: Digital identification and its link to socioeconomic inclusion. Government Information Quarterly, 38(2), 101568. https://doi.org/10.1016/j.giq.2021.101568
AlDaajeh, S., Saleous, H., Alrabaee, S., Barka, E., Breitinger, F., & Choo, K. K. R. (2022). The role of national cybersecurity strategies on the improvement of cybersecurity education. Computers & Security, 119, 102754. https://doi.org/10.1016/j.cose.2022.102754
AlGhamdi, S., Win, K. T., & Vlahu-Gjorgievska, E. (2020). Information security governance challenges and critical success factors: Systematic review. Computers & security, 99, 102030. https://doi.org/10.1016/j.cose.2020.102030
Budi, N. F. A., Fitriani, W. R., Hidayanto, A. N., Kurnia, S., & Inan, D. I. (2020). A study of government 2.0 implementation in Indonesia. Socio-Economic Planning Sciences, 72, 100920. https://doi.org/10.1016/j.seps.2020.100920
Busby, J. W. (2021). Beyond internal conflict: The emergent practice of climate security. Journal of Peace Research, 58(1), 186-194. https://doi.org/10.1177/0022343320971019
Caraka, R. E., Lee, Y., Chen, R. C., Toharudin, T., Gio, P. U., Kurniawan, R., & Pardamean, B. (2020). Cluster around latent variable for vulnerability towards natural hazards, non-natural hazards, social hazards in West Papua. Ieee Access, 9, 1972-1986. https://doi.org/10.1109/ACCESS.2020.3038883
Chaoub, A., Giordani, M., Lall, B., Bhatia, V., Kliks, A., Mendes, L., ... & Zorzi, M. (2021). 6G for bridging the digital divide: Wireless connectivity to remote areas. IEEE Wireless Communications, 29(1), 160-168. https://doi.org/10.1109/MWC.001.2100137
Christawan, E., Perwita, A. A. B., Midhio, I. W., Hendra, A., & Risman, H. (2023). Implementation of the Total People’s War Strategy to Suppress Papua Separatist Movement. https://doi.org/10.31219/osf.io/8y2q7
Debrah, C., Chan, A. P., & Darko, A. (2022). Artificial intelligence in green building. Automation in Construction, 137, 104192. https://doi.org/10.1016/j.autcon.2022.104192
Djenna, A., Harous, S., & Saidouni, D. E. (2021). Internet of things meet internet of threats: New concern cyber security issues of critical cyber infrastructure. Applied Sciences, 11(10), 4580. https://doi.org/10.3390/app11104580
Fauzi, F. Z., Mayor, D. E., & Liauw, G. (2023). The Direction of Papua Development: Is A New Autonomous Region the Answer?. Policy & Governance Review, 7(1), 1-20. https://doi.org/10.30589/pgr.v7i1.609
Hasan, M. K., Habib, A. A., Shukur, Z., Ibrahim, F., Islam, S., & Razzaque, M. A. (2023). Review on cyber-physical and cyber-security system in smart grid: Standards, protocols, constraints, and recommendations. Journal of Network and Computer Applications, 209, 103540. https://doi.org/10.1016/j.jnca.2022.103540
Kabir, H., Tham, M. L., & Chang, Y. C. (2023). Internet of robotic things for mobile robots: concepts, technologies, challenges, applications, and future directions. Digital Communications and Networks. https://doi.org/10.1016/j.dcan.2023.05.006
Kitchin, R., & Dodge, M. (2020). The (in) security of smart cities: Vulnerabilities, risks, mitigation, and prevention. In Smart cities and innovative Urban technologies (pp. 47-65). Routledge. https://doi.org/10.4324/9781003132851
Kraus, S., Jones, P., Kailer, N., Weinmann, A., Chaparro-Banegas, N., & Roig-Tierno, N. (2021). Digital transformation: An overview of the current state of the art of research. Sage Open, 11(3), 21582440211047576. https://doi.org/10.1177/21582440211047576
Ksibi, S., Jaidi, F., & Bouhoula, A. (2023). A comprehensive study of security and cyber-security risk management within e-Health systems: Synthesis, analysis and a novel quantified approach. Mobile Networks and Applications, 28(1), 107-127. https://doi.org/10.1007/s11036-022-02042-1
Lehto, M. (2022). Cyber-attacks against critical infrastructure. In Cyber security: Critical infrastructure protection (pp. 3-42). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-030-91293-2_1
Malodia, S., Dhir, A., Mishra, M., & Bhatti, Z. A. (2021). Future of e-Government: An integrated conceptual framework. Technological Forecasting and Social Change, 173, 121102. https://doi.org/10.1016/j.techfore.2021.121102
Milakovich, M. E. (2021). Digital governance: Applying advanced technologies to improve public service. Routledge. https://doi.org/10.4324/9781003215875
Murphy, S. E., Farmer, G., Katz, L., Troëng, S., Henderson, S., Erdmann, M. V., ... & Putra, K. S. (2021). Fifteen years of lessons from the Seascape approach: A framework for improving ocean management at scale. Conservation Science and Practice, 3(6), e423. https://doi.org/10.1111/csp2.423
Putro, A. N. S., Mokodenseho, S., Hunawa, N. A., Mokoginta, M., & Marjoni, E. R. M. (2023). Enhancing security and reliability of information systems through blockchain technology: a case study on impacts and potential. West Science Information System and Technology, 1(01), 35-43. https://doi.org/10.58812/wsist.v1i01.166
Rahman, N. A. A., Sairi, I. H., Zizi, N. A. M., & Khalid, F. (2020). The importance of cybersecurity education in school. International Journal of Information and Education Technology, 10(5), 378-382. https://doi.org/10.18178/ijiet.2020.10.5.1393
Rizi, M. H. P., & Seno, S. A. H. (2022). A systematic review of technologies and solutions to improve security and privacy protection of citizens in the smart city. Internet of Things, 20, 100584. https://doi.org/10.1016/j.iot.2022.100584
Sarts, J. (2021). Disinformation as a threat to national security. Disinformation and Fake News, 23-33. https://doi.org/10.1007/978-981-15-5876-4_2
Satriawan, I., Elven, T. M. A., & Lailam, T. (2023). Internet Shutdown in Indonesia: An Appropriate Response or A Threat to Human Rights?. Sriwijaya Law Review, 7(1), 19-46. https://doii.org/10.28946/slrev.Vol7.Iss1.1018.pp19-46
Sawir, M., Robo, S., Abubakar, F., & Kamaluddin, S. (2023). Implementation Of Public Services In The Digital Era As A Public Information Media Regional Government Of Jayapura Regency, Papua Province. Jurnal Manajemen Pelayanan Publik, 6(2), 212. http://dx.doi.org/10.24198/jmpp.v6i2.45532
Saxena, N., Hayes, E., Bertino, E., Ojo, P., Choo, K. K. R., & Burnap, P. (2020). Impact and key challenges of insider threats on organizations and critical businesses. Electronics, 9(9), 1460. https://doi.org/10.3390/electronics9091460
Siagian, M. U. H. N. I. Z. A. R., & Yuliarti, M. S. (2021). Papua’s Internet Ban 2020: Politics, information democracy, and digital literacy. Jurnal Komunikasi: Malaysian Journal of Communication, 37(3), 304-316. https://doi.org/10.17576/JKMJC-2021-3703-18
Skouby, K. E., Dhotre, P., Williams, I., & Hiran, K. (Eds.). (2022). 5G, Cybersecurity and Privacy in Developing Countries. CRC Press. https://doi.org/10.4324/9781003374664
Speed, A., Thomson, C., & Richardson, K. (2020). Stay home, stay safe, save lives? An analysis of the impact of COVID-19 on the ability of victims of gender-based violence to access justice. The Journal of Criminal Law, 84(6), 539-572. https://doi.org/10.1177/0022018320948280
Sulaiman, A., Dwilaksana, C., & Muta'ali, A. (2023). Synergy between the Police, TNI, Local Government, and the Community to Promote Diversity and Improve Security and National Unity in the Papua Region. International Journal of Social Science Research and Review, 6(5), 436-448. https://doi.org/10.47814/ijssrr.v6i5.1317
Sule, M. J., Zennaro, M., & Thomas, G. (2021). Cybersecurity through the lens of digital identity and data protection: issues and trends. Technology in Society, 67, 101734. https://doi.org/10.1016/j.techsoc.2021.101734
Tenopir, C., Rice, N. M., Allard, S., Baird, L., Borycz, J., Christian, L., ... & Sandusky, R. J. (2020). Data sharing, management, use, and reuse: Practices and perceptions of scientists worldwide. PloS one, 15(3), e0229003. https://doi.org/10.1371/journal.pone.0229003
Toufaily, E., Zalan, T., & Dhaou, S. B. (2021). A framework of blockchain technology adoption: An investigation of challenges and expected value. Information & Management, 58(3), 103444. https://doi.org/10.1016/j.im.2021.103444
Wangge, H. R., & Lawson, S. (2023). The West Papua issue in Pacific regional politics: explaining Indonesia’s foreign policy failure. The Pacific Review, 36(1), 61-89. https://doi.org/10.1080/09512748.2021.1931417
Wasistiono, S., & Sartika, I. (2022). Model Evaluation of Papua and West Papua Province's Special Autonomous. Bestuurskunde: Journal of Governmental Studies, 2(1), 73-88. https://doi.org/10.53013/bestuurskunde.2.1.73-88
Downloads
Published
Issue
Section
License
Copyright (c) 2024 Asian Digital Governance Problems

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
