
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Cybersecurity Management Strategies for Smart Cities in Indonesia: Cultural Factors and Implementation Challenges
Corresponding Author(s) : RG Guntur Alam
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control,
Vol. 10, No. 3, August 2025
Abstract
The implementation of smart cities in Indonesia presents significant cybersecurity challenges, particularly amid bureaucratic complexity, low digital literacy, and limited institutional capacity. This study explores cybersecurity management strategies in the context of Jakarta Smart City (JSC), emphasizing sociotechnical dynamics and embedded cultural-institutional factors. Employing a qualitative approach and the Actor-Network Theory (ANT) framework, this research examines four key moments in the stabilization of cybersecurity networks: problematization, interessement, enrolment, and mobilization. Empirical findings reveal that challenges such as fragmented governance, security awareness gaps, and limitations in technological adaptation are addressed through context-specific strategies. These include regulatory reforms, multi-stakeholder collaboration, hybrid governance models, and the localization of international standards, particularly ISO/IEC 27001. The study also incorporates Indonesia’s Personal Data Protection Law (Law No. 27/2022) as a foundational legal framework that supports the integration of regional cybersecurity policies. Rather than focusing solely on technical solutions, this research emphasizes the importance of aligning cybersecurity strategies with local norms, leadership structures, and user practices. The proposed strategic model contributes to the cybersecurity governance literature by integrating ANT perspectives with empirical insights from a developing country. It offers a locally adapted and scalable framework to guide policymakers and Smart city administrators in building resilient and culturally sensitive cybersecurity systems.
Keywords
Download Citation
Endnote/Zotero/Mendeley (RIS)BibTeX
- References
- A. M. Toli and N. Murtagh, “The Concept of Sustainability in Smart City Definitions,” Front. Built Environ., vol. 6, no. June, pp. 1–10, 2020, doi: 10.3389/fbuil.2020.00077.
- E. Ismagilova, L. Hughes, N. P. Rana, and Y. K. Dwivedi, “Security, privacy and risks within smart cities: Literature review and development of a smart city interaction framework.,” Inf. Syst. Front., vol. 1, no. 22, 2022, doi: https://doi.org/10.1007/s10796-020-10044-1.
- L. Axon et al., “Emerging cybersecurity capability gaps in the industrial internet of things: Overview and research agenda.,” Digit. Threat. Res. Pract., vol. 3, no. 4, pp. 1–27, 2022, doi: https://doi.org/10.1145/3503920.
- R. K. Goel and S. Vishnoi, “Urbanization and sustainable development for inclusiveness using ICTs.,” Telecomm. Policy, vol. 46, no. 6, p. 102311, 2022, doi: https://doi.org/10.1016/j.telpol.2022.102311.
- K. Khoirunnisa and D. Jubaidi, “Indonesia’s Digital Security Strategy: Countering the Threats of Cybercrime and Cyberterrorism.,” Polit. J. Public Adm. Polit. Sci. Int. Relations, vol. 2, no. 2, pp. 62–82, 2024, doi: DOI: https://doi.org/10.61978/politeia.v2i2.211.
- M. Kalinin, V. Krundyshev, and P. Zegzhda, “Cybersecurity risk assessment in smart city infrastructures.,” Machines, vol. 9., no. 4, p. 78, 2021, doi: https://doi.org/10.3390/machines9040078.
- J. S. Gracias, G. S. Parnell, E. Specking, E. A. Pohl, and R. Buchanan, “Smart cities—a structured literature review.,” Smart Cities, vol. 6, no. 4, pp. 1719–1743, 2023, doi: https://doi.org/10.3390/smartcities6040080.
- F. Almeida, “Prospects of cybersecurity in smart cities.,” Futur. Internet, vol. 15, no. 9, p. 285, 2023, doi: https://doi.org/10.3390/fi15090285.
- R. G. Alam, D. Abdullah, H. Ibrahim, and I. R. Karas, “Building a Resilient Smart City Ecosystem: A Comprehensive Security and Cybersecurity Management Model.,” in In The Proceedings of the International Conference on Smart City Applications, Cham: Springer Nature Switzerland., 2023, pp. 596–607. doi: DOI https://doi.org/10.1007/978-3-031-53824-7_53.
- R. G. Guntur Alam and H. Ibrahim, “Cybersecurity implementation succes factors in smart city,” J. Theor. Appl. Inf. Technol., vol. 99, no. 13, pp. 3353–3364, 2021.
- A. R. Arief, “An analysis of cybersecurity policies and practices in public administration.,” J. public Represent. Soc. Provis., vol. 2, no. 2, pp. 88–100, 2022, doi: DOI: https://doi.org/10.55885/jprsp.v2i2.211.
- M. Tight, Designing case studies. The sage handbook for qualitative research design, 6th edn. SAGE Publications Ltd, Thousand Oaks, 2022. [Online]. Available: https://www.torrossa.com/en/resources/an/5282289#
- M. Striepe, “Combining concept mapping with semi-structured interviews: adding another dimension to the research process.,” Int. J. Res. Method Educ., vol. 44, no. 5, pp. 519–532, 2021, doi: https://doi.org/10.1080/1743727X.2020.1841746.
- T. Buys, D. Casteleijn, T. Heyns, and H. Untiedt, “A reflexive lens on preparing and conducting semi-structured interviews with academic colleagues.,” Qual. Health Res., vol. 32, no. 13, pp. 2030–2039, 2022, doi: https://doi.org/10.1177/10497323221130832.
- A. Belina, “Semi-structured interviewing as a tool for understanding informal civil society.,” Volunt. Sect. Rev., vol. 14, no. 2, pp. 331–347, 2023, doi: DOI: https://doi.org/10.1332/204080522X16454629995872.
- K. Locke, M. Feldman, and K. Golden-Biddle, “Coding practices and iterativity: Beyond templates for analyzing qualitative data.,” Organ. Res. methods, vol. 25, no. 2, pp. 262–284, 2022, doi: https://doi.org/10.1177/1094428120948600.
- P. Sreeramagiri, G. Andrews, A. K. Greene, and G. Balasubramanian, “Analyzing Security Risks in Cyber-Physical Manufacturing Systems with Actor–Network Theory.,” Smart Sustain. Manuf. Syst., vol. 6, no. 1, pp. 110–121, 2022, doi: https://doi.org/10.1520/SSMS20210042.
- Y. S. Chen and S. T. Wu, “An exploration of actor-network theory and social affordance for the development of a tourist attraction: A case study of a Jimmy-related theme park, Taiwan.,” Tour. Manag., vol. 82, p. 104206, 2021, doi: https://doi.org/10.1016/j.tourman.2020.104206.
- R. Cury, M. Kennelly, and M. Howes, “Enacting environmental commitments and initiatives in Australian Olympic sport: an actor-network theory perspective.,” Manag. Sport Leis., no. 1–18, 2024, doi: https://doi.org/10.1080/23750472.2023.2299823.
- M. A. Sarlak, Y. Salamzadeh, and F. S. Farzad, “Actor-network theory and networked organizations, proposing a conceptual framework.,” Contemp. Appl. Actor Netw. Theory, pp. 197–210, 2020, doi: DOI https://doi.org/10.1007/978-981-15-7066-7_11.
- K. Park, S. Park, and T. J. Lee, “Analysis of a spatial network from the perspective of actor‐network theory.,” Int. J. Tour. Res., vol. 22, no. 5, pp. 653–665, 2020, doi: https://doi.org/10.1002/jtr.2363.
- M. Bolz, S. Mallon, and M. S. Estrada, Actor-Network Theory (ANT) as a Methodology for Researching Academic Knowledge Circulation. In Routledge Handbook of Academic Knowledge Circulation, 2023. [Online]. Available: https://www.taylorfrancis.com/chapters/edit/10.4324/9781003290650-49/actor-network-theory-ant-methodology-researching-academic-knowledge-circulation-manuel-bolz-stefanie-mallon-marcela-suárez-estrada
- F. Ramadhani, “Ramadhani, F. (2023). Dinamika UU ITE Sebagai Hukum Positif Di Indonesia Guna Meminimalisir Kejahatan Siber.,” Kult. J. Ilmu Hukum, Sos. Dan Hum., vol. 1, no. 1, pp. 89–97, 2023, doi: https://doi.org/10.572349/kultura.v1i1.98.
- E. Blancaflor, P. B. Y. Saunar, C. T. D. Bilbao, H. B. I. Villarias, and I. P. V. Mapue, “The Use of Cloud Computing and its Security Risks in a Philippine Education System’, A Lit. Rev.,” in 11th Int. Conf. Inf. Educ. Technol., 2023, pp. 66–70. doi: DOI: 10.1109/ICIET56899.2023.10111146.
- A. Jacuch, “Comparative analysis of cybersecurity strategies. European union strategy and policies. Polish and selected countries strategies.,” Online J. Model. new Eur., vol. 37, pp. 102-120., 2021, doi: doi: 10.24193/OJMNE.2021.37.06.
References
References
A. M. Toli and N. Murtagh, “The Concept of Sustainability in Smart City Definitions,” Front. Built Environ., vol. 6, no. June, pp. 1–10, 2020, doi: 10.3389/fbuil.2020.00077.
E. Ismagilova, L. Hughes, N. P. Rana, and Y. K. Dwivedi, “Security, privacy and risks within smart cities: Literature review and development of a smart city interaction framework.,” Inf. Syst. Front., vol. 1, no. 22, 2022, doi: https://doi.org/10.1007/s10796-020-10044-1.
L. Axon et al., “Emerging cybersecurity capability gaps in the industrial internet of things: Overview and research agenda.,” Digit. Threat. Res. Pract., vol. 3, no. 4, pp. 1–27, 2022, doi: https://doi.org/10.1145/3503920.
R. K. Goel and S. Vishnoi, “Urbanization and sustainable development for inclusiveness using ICTs.,” Telecomm. Policy, vol. 46, no. 6, p. 102311, 2022, doi: https://doi.org/10.1016/j.telpol.2022.102311.
K. Khoirunnisa and D. Jubaidi, “Indonesia’s Digital Security Strategy: Countering the Threats of Cybercrime and Cyberterrorism.,” Polit. J. Public Adm. Polit. Sci. Int. Relations, vol. 2, no. 2, pp. 62–82, 2024, doi: DOI: https://doi.org/10.61978/politeia.v2i2.211.
M. Kalinin, V. Krundyshev, and P. Zegzhda, “Cybersecurity risk assessment in smart city infrastructures.,” Machines, vol. 9., no. 4, p. 78, 2021, doi: https://doi.org/10.3390/machines9040078.
J. S. Gracias, G. S. Parnell, E. Specking, E. A. Pohl, and R. Buchanan, “Smart cities—a structured literature review.,” Smart Cities, vol. 6, no. 4, pp. 1719–1743, 2023, doi: https://doi.org/10.3390/smartcities6040080.
F. Almeida, “Prospects of cybersecurity in smart cities.,” Futur. Internet, vol. 15, no. 9, p. 285, 2023, doi: https://doi.org/10.3390/fi15090285.
R. G. Alam, D. Abdullah, H. Ibrahim, and I. R. Karas, “Building a Resilient Smart City Ecosystem: A Comprehensive Security and Cybersecurity Management Model.,” in In The Proceedings of the International Conference on Smart City Applications, Cham: Springer Nature Switzerland., 2023, pp. 596–607. doi: DOI https://doi.org/10.1007/978-3-031-53824-7_53.
R. G. Guntur Alam and H. Ibrahim, “Cybersecurity implementation succes factors in smart city,” J. Theor. Appl. Inf. Technol., vol. 99, no. 13, pp. 3353–3364, 2021.
A. R. Arief, “An analysis of cybersecurity policies and practices in public administration.,” J. public Represent. Soc. Provis., vol. 2, no. 2, pp. 88–100, 2022, doi: DOI: https://doi.org/10.55885/jprsp.v2i2.211.
M. Tight, Designing case studies. The sage handbook for qualitative research design, 6th edn. SAGE Publications Ltd, Thousand Oaks, 2022. [Online]. Available: https://www.torrossa.com/en/resources/an/5282289#
M. Striepe, “Combining concept mapping with semi-structured interviews: adding another dimension to the research process.,” Int. J. Res. Method Educ., vol. 44, no. 5, pp. 519–532, 2021, doi: https://doi.org/10.1080/1743727X.2020.1841746.
T. Buys, D. Casteleijn, T. Heyns, and H. Untiedt, “A reflexive lens on preparing and conducting semi-structured interviews with academic colleagues.,” Qual. Health Res., vol. 32, no. 13, pp. 2030–2039, 2022, doi: https://doi.org/10.1177/10497323221130832.
A. Belina, “Semi-structured interviewing as a tool for understanding informal civil society.,” Volunt. Sect. Rev., vol. 14, no. 2, pp. 331–347, 2023, doi: DOI: https://doi.org/10.1332/204080522X16454629995872.
K. Locke, M. Feldman, and K. Golden-Biddle, “Coding practices and iterativity: Beyond templates for analyzing qualitative data.,” Organ. Res. methods, vol. 25, no. 2, pp. 262–284, 2022, doi: https://doi.org/10.1177/1094428120948600.
P. Sreeramagiri, G. Andrews, A. K. Greene, and G. Balasubramanian, “Analyzing Security Risks in Cyber-Physical Manufacturing Systems with Actor–Network Theory.,” Smart Sustain. Manuf. Syst., vol. 6, no. 1, pp. 110–121, 2022, doi: https://doi.org/10.1520/SSMS20210042.
Y. S. Chen and S. T. Wu, “An exploration of actor-network theory and social affordance for the development of a tourist attraction: A case study of a Jimmy-related theme park, Taiwan.,” Tour. Manag., vol. 82, p. 104206, 2021, doi: https://doi.org/10.1016/j.tourman.2020.104206.
R. Cury, M. Kennelly, and M. Howes, “Enacting environmental commitments and initiatives in Australian Olympic sport: an actor-network theory perspective.,” Manag. Sport Leis., no. 1–18, 2024, doi: https://doi.org/10.1080/23750472.2023.2299823.
M. A. Sarlak, Y. Salamzadeh, and F. S. Farzad, “Actor-network theory and networked organizations, proposing a conceptual framework.,” Contemp. Appl. Actor Netw. Theory, pp. 197–210, 2020, doi: DOI https://doi.org/10.1007/978-981-15-7066-7_11.
K. Park, S. Park, and T. J. Lee, “Analysis of a spatial network from the perspective of actor‐network theory.,” Int. J. Tour. Res., vol. 22, no. 5, pp. 653–665, 2020, doi: https://doi.org/10.1002/jtr.2363.
M. Bolz, S. Mallon, and M. S. Estrada, Actor-Network Theory (ANT) as a Methodology for Researching Academic Knowledge Circulation. In Routledge Handbook of Academic Knowledge Circulation, 2023. [Online]. Available: https://www.taylorfrancis.com/chapters/edit/10.4324/9781003290650-49/actor-network-theory-ant-methodology-researching-academic-knowledge-circulation-manuel-bolz-stefanie-mallon-marcela-suárez-estrada
F. Ramadhani, “Ramadhani, F. (2023). Dinamika UU ITE Sebagai Hukum Positif Di Indonesia Guna Meminimalisir Kejahatan Siber.,” Kult. J. Ilmu Hukum, Sos. Dan Hum., vol. 1, no. 1, pp. 89–97, 2023, doi: https://doi.org/10.572349/kultura.v1i1.98.
E. Blancaflor, P. B. Y. Saunar, C. T. D. Bilbao, H. B. I. Villarias, and I. P. V. Mapue, “The Use of Cloud Computing and its Security Risks in a Philippine Education System’, A Lit. Rev.,” in 11th Int. Conf. Inf. Educ. Technol., 2023, pp. 66–70. doi: DOI: 10.1109/ICIET56899.2023.10111146.
A. Jacuch, “Comparative analysis of cybersecurity strategies. European union strategy and policies. Polish and selected countries strategies.,” Online J. Model. new Eur., vol. 37, pp. 102-120., 2021, doi: doi: 10.24193/OJMNE.2021.37.06.