Quick jump to page content
  • Main Navigation
  • Main Content
  • Sidebar

  • Home
  • Current
  • Archives
  • Join As Reviewer
  • Info
  • Announcements
  • Statistics
  • About
    • About the Journal
    • Submissions
    • Editorial Team
    • Privacy Statement
    • Contact
  • Register
  • Login
  • Home
  • Current
  • Archives
  • Join As Reviewer
  • Info
  • Announcements
  • Statistics
  • About
    • About the Journal
    • Submissions
    • Editorial Team
    • Privacy Statement
    • Contact
  1. Home
  2. Archives
  3. Vol. 10, No. 3, August 2025
  4. Articles

Issue

Vol. 10, No. 3, August 2025

Issue Published : Jun 13, 2025
Creative Commons License

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

Cybersecurity Management Strategies for Smart Cities in Indonesia: Cultural Factors and Implementation Challenges

https://doi.org/10.22219/kinetik.v10i3.2226
RG Guntur Alam
Universitas Muhammadiyah Bengkulu
Amrul Faruq
Universitas Muhammadiyah Malang
Machmud Effendy
Universitas Muhammadiyah Malang

Corresponding Author(s) : RG Guntur Alam

rggunturalam@umb.ac.id

Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control, Vol. 10, No. 3, August 2025
Article Published : Jun 13, 2025

Share
WA Share on Facebook Share on Twitter Pinterest Email Telegram
  • Abstract
  • Cite
  • References
  • Authors Details

Abstract

The implementation of smart cities in Indonesia presents significant cybersecurity challenges, particularly amid bureaucratic complexity, low digital literacy, and limited institutional capacity. This study explores cybersecurity management strategies in the context of Jakarta Smart City (JSC), emphasizing sociotechnical dynamics and embedded cultural-institutional factors. Employing a qualitative approach and the Actor-Network Theory (ANT) framework, this research examines four key moments in the stabilization of cybersecurity networks: problematization, interessement, enrolment, and mobilization. Empirical findings reveal that challenges such as fragmented governance, security awareness gaps, and limitations in technological adaptation are addressed through context-specific strategies. These include regulatory reforms, multi-stakeholder collaboration, hybrid governance models, and the localization of international standards, particularly ISO/IEC 27001. The study also incorporates Indonesia’s Personal Data Protection Law (Law No. 27/2022) as a foundational legal framework that supports the integration of regional cybersecurity policies. Rather than focusing solely on technical solutions, this research emphasizes the importance of aligning cybersecurity strategies with local norms, leadership structures, and user practices. The proposed strategic model contributes to the cybersecurity governance literature by integrating ANT perspectives with empirical insights from a developing country. It offers a locally adapted and scalable framework to guide policymakers and Smart city administrators in building resilient and culturally sensitive cybersecurity systems.

Keywords

Cybersecurity Management Smart City Cultural Context Implementation Challenges Actor-Network Theory
Alam, R. G., Faruq, A., & Effendy, M. (2025). Cybersecurity Management Strategies for Smart Cities in Indonesia: Cultural Factors and Implementation Challenges. Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control, 10(3). https://doi.org/10.22219/kinetik.v10i3.2226
  • ACM
  • ACS
  • APA
  • ABNT
  • Chicago
  • Harvard
  • IEEE
  • MLA
  • Turabian
  • Vancouver
Download Citation
Endnote/Zotero/Mendeley (RIS)
BibTeX
References
  1. References
  2. A. M. Toli and N. Murtagh, “The Concept of Sustainability in Smart City Definitions,” Front. Built Environ., vol. 6, no. June, pp. 1–10, 2020, doi: 10.3389/fbuil.2020.00077.
  3. E. Ismagilova, L. Hughes, N. P. Rana, and Y. K. Dwivedi, “Security, privacy and risks within smart cities: Literature review and development of a smart city interaction framework.,” Inf. Syst. Front., vol. 1, no. 22, 2022, doi: https://doi.org/10.1007/s10796-020-10044-1.
  4. L. Axon et al., “Emerging cybersecurity capability gaps in the industrial internet of things: Overview and research agenda.,” Digit. Threat. Res. Pract., vol. 3, no. 4, pp. 1–27, 2022, doi: https://doi.org/10.1145/3503920.
  5. R. K. Goel and S. Vishnoi, “Urbanization and sustainable development for inclusiveness using ICTs.,” Telecomm. Policy, vol. 46, no. 6, p. 102311, 2022, doi: https://doi.org/10.1016/j.telpol.2022.102311.
  6. K. Khoirunnisa and D. Jubaidi, “Indonesia’s Digital Security Strategy: Countering the Threats of Cybercrime and Cyberterrorism.,” Polit. J. Public Adm. Polit. Sci. Int. Relations, vol. 2, no. 2, pp. 62–82, 2024, doi: DOI: https://doi.org/10.61978/politeia.v2i2.211.
  7. M. Kalinin, V. Krundyshev, and P. Zegzhda, “Cybersecurity risk assessment in smart city infrastructures.,” Machines, vol. 9., no. 4, p. 78, 2021, doi: https://doi.org/10.3390/machines9040078.
  8. J. S. Gracias, G. S. Parnell, E. Specking, E. A. Pohl, and R. Buchanan, “Smart cities—a structured literature review.,” Smart Cities, vol. 6, no. 4, pp. 1719–1743, 2023, doi: https://doi.org/10.3390/smartcities6040080.
  9. F. Almeida, “Prospects of cybersecurity in smart cities.,” Futur. Internet, vol. 15, no. 9, p. 285, 2023, doi: https://doi.org/10.3390/fi15090285.
  10. R. G. Alam, D. Abdullah, H. Ibrahim, and I. R. Karas, “Building a Resilient Smart City Ecosystem: A Comprehensive Security and Cybersecurity Management Model.,” in In The Proceedings of the International Conference on Smart City Applications, Cham: Springer Nature Switzerland., 2023, pp. 596–607. doi: DOI https://doi.org/10.1007/978-3-031-53824-7_53.
  11. R. G. Guntur Alam and H. Ibrahim, “Cybersecurity implementation succes factors in smart city,” J. Theor. Appl. Inf. Technol., vol. 99, no. 13, pp. 3353–3364, 2021.
  12. A. R. Arief, “An analysis of cybersecurity policies and practices in public administration.,” J. public Represent. Soc. Provis., vol. 2, no. 2, pp. 88–100, 2022, doi: DOI: https://doi.org/10.55885/jprsp.v2i2.211.
  13. M. Tight, Designing case studies. The sage handbook for qualitative research design, 6th edn. SAGE Publications Ltd, Thousand Oaks, 2022. [Online]. Available: https://www.torrossa.com/en/resources/an/5282289#
  14. M. Striepe, “Combining concept mapping with semi-structured interviews: adding another dimension to the research process.,” Int. J. Res. Method Educ., vol. 44, no. 5, pp. 519–532, 2021, doi: https://doi.org/10.1080/1743727X.2020.1841746.
  15. T. Buys, D. Casteleijn, T. Heyns, and H. Untiedt, “A reflexive lens on preparing and conducting semi-structured interviews with academic colleagues.,” Qual. Health Res., vol. 32, no. 13, pp. 2030–2039, 2022, doi: https://doi.org/10.1177/10497323221130832.
  16. A. Belina, “Semi-structured interviewing as a tool for understanding informal civil society.,” Volunt. Sect. Rev., vol. 14, no. 2, pp. 331–347, 2023, doi: DOI: https://doi.org/10.1332/204080522X16454629995872.
  17. K. Locke, M. Feldman, and K. Golden-Biddle, “Coding practices and iterativity: Beyond templates for analyzing qualitative data.,” Organ. Res. methods, vol. 25, no. 2, pp. 262–284, 2022, doi: https://doi.org/10.1177/1094428120948600.
  18. P. Sreeramagiri, G. Andrews, A. K. Greene, and G. Balasubramanian, “Analyzing Security Risks in Cyber-Physical Manufacturing Systems with Actor–Network Theory.,” Smart Sustain. Manuf. Syst., vol. 6, no. 1, pp. 110–121, 2022, doi: https://doi.org/10.1520/SSMS20210042.
  19. Y. S. Chen and S. T. Wu, “An exploration of actor-network theory and social affordance for the development of a tourist attraction: A case study of a Jimmy-related theme park, Taiwan.,” Tour. Manag., vol. 82, p. 104206, 2021, doi: https://doi.org/10.1016/j.tourman.2020.104206.
  20. R. Cury, M. Kennelly, and M. Howes, “Enacting environmental commitments and initiatives in Australian Olympic sport: an actor-network theory perspective.,” Manag. Sport Leis., no. 1–18, 2024, doi: https://doi.org/10.1080/23750472.2023.2299823.
  21. M. A. Sarlak, Y. Salamzadeh, and F. S. Farzad, “Actor-network theory and networked organizations, proposing a conceptual framework.,” Contemp. Appl. Actor Netw. Theory, pp. 197–210, 2020, doi: DOI https://doi.org/10.1007/978-981-15-7066-7_11.
  22. K. Park, S. Park, and T. J. Lee, “Analysis of a spatial network from the perspective of actor‐network theory.,” Int. J. Tour. Res., vol. 22, no. 5, pp. 653–665, 2020, doi: https://doi.org/10.1002/jtr.2363.
  23. M. Bolz, S. Mallon, and M. S. Estrada, Actor-Network Theory (ANT) as a Methodology for Researching Academic Knowledge Circulation. In Routledge Handbook of Academic Knowledge Circulation, 2023. [Online]. Available: https://www.taylorfrancis.com/chapters/edit/10.4324/9781003290650-49/actor-network-theory-ant-methodology-researching-academic-knowledge-circulation-manuel-bolz-stefanie-mallon-marcela-suárez-estrada
  24. F. Ramadhani, “Ramadhani, F. (2023). Dinamika UU ITE Sebagai Hukum Positif Di Indonesia Guna Meminimalisir Kejahatan Siber.,” Kult. J. Ilmu Hukum, Sos. Dan Hum., vol. 1, no. 1, pp. 89–97, 2023, doi: https://doi.org/10.572349/kultura.v1i1.98.
  25. E. Blancaflor, P. B. Y. Saunar, C. T. D. Bilbao, H. B. I. Villarias, and I. P. V. Mapue, “The Use of Cloud Computing and its Security Risks in a Philippine Education System’, A Lit. Rev.,” in 11th Int. Conf. Inf. Educ. Technol., 2023, pp. 66–70. doi: DOI: 10.1109/ICIET56899.2023.10111146.
  26. A. Jacuch, “Comparative analysis of cybersecurity strategies. European union strategy and policies. Polish and selected countries strategies.,” Online J. Model. new Eur., vol. 37, pp. 102-120., 2021, doi: doi: 10.24193/OJMNE.2021.37.06.
Read More

References


References

A. M. Toli and N. Murtagh, “The Concept of Sustainability in Smart City Definitions,” Front. Built Environ., vol. 6, no. June, pp. 1–10, 2020, doi: 10.3389/fbuil.2020.00077.

E. Ismagilova, L. Hughes, N. P. Rana, and Y. K. Dwivedi, “Security, privacy and risks within smart cities: Literature review and development of a smart city interaction framework.,” Inf. Syst. Front., vol. 1, no. 22, 2022, doi: https://doi.org/10.1007/s10796-020-10044-1.

L. Axon et al., “Emerging cybersecurity capability gaps in the industrial internet of things: Overview and research agenda.,” Digit. Threat. Res. Pract., vol. 3, no. 4, pp. 1–27, 2022, doi: https://doi.org/10.1145/3503920.

R. K. Goel and S. Vishnoi, “Urbanization and sustainable development for inclusiveness using ICTs.,” Telecomm. Policy, vol. 46, no. 6, p. 102311, 2022, doi: https://doi.org/10.1016/j.telpol.2022.102311.

K. Khoirunnisa and D. Jubaidi, “Indonesia’s Digital Security Strategy: Countering the Threats of Cybercrime and Cyberterrorism.,” Polit. J. Public Adm. Polit. Sci. Int. Relations, vol. 2, no. 2, pp. 62–82, 2024, doi: DOI: https://doi.org/10.61978/politeia.v2i2.211.

M. Kalinin, V. Krundyshev, and P. Zegzhda, “Cybersecurity risk assessment in smart city infrastructures.,” Machines, vol. 9., no. 4, p. 78, 2021, doi: https://doi.org/10.3390/machines9040078.

J. S. Gracias, G. S. Parnell, E. Specking, E. A. Pohl, and R. Buchanan, “Smart cities—a structured literature review.,” Smart Cities, vol. 6, no. 4, pp. 1719–1743, 2023, doi: https://doi.org/10.3390/smartcities6040080.

F. Almeida, “Prospects of cybersecurity in smart cities.,” Futur. Internet, vol. 15, no. 9, p. 285, 2023, doi: https://doi.org/10.3390/fi15090285.

R. G. Alam, D. Abdullah, H. Ibrahim, and I. R. Karas, “Building a Resilient Smart City Ecosystem: A Comprehensive Security and Cybersecurity Management Model.,” in In The Proceedings of the International Conference on Smart City Applications, Cham: Springer Nature Switzerland., 2023, pp. 596–607. doi: DOI https://doi.org/10.1007/978-3-031-53824-7_53.

R. G. Guntur Alam and H. Ibrahim, “Cybersecurity implementation succes factors in smart city,” J. Theor. Appl. Inf. Technol., vol. 99, no. 13, pp. 3353–3364, 2021.

A. R. Arief, “An analysis of cybersecurity policies and practices in public administration.,” J. public Represent. Soc. Provis., vol. 2, no. 2, pp. 88–100, 2022, doi: DOI: https://doi.org/10.55885/jprsp.v2i2.211.

M. Tight, Designing case studies. The sage handbook for qualitative research design, 6th edn. SAGE Publications Ltd, Thousand Oaks, 2022. [Online]. Available: https://www.torrossa.com/en/resources/an/5282289#

M. Striepe, “Combining concept mapping with semi-structured interviews: adding another dimension to the research process.,” Int. J. Res. Method Educ., vol. 44, no. 5, pp. 519–532, 2021, doi: https://doi.org/10.1080/1743727X.2020.1841746.

T. Buys, D. Casteleijn, T. Heyns, and H. Untiedt, “A reflexive lens on preparing and conducting semi-structured interviews with academic colleagues.,” Qual. Health Res., vol. 32, no. 13, pp. 2030–2039, 2022, doi: https://doi.org/10.1177/10497323221130832.

A. Belina, “Semi-structured interviewing as a tool for understanding informal civil society.,” Volunt. Sect. Rev., vol. 14, no. 2, pp. 331–347, 2023, doi: DOI: https://doi.org/10.1332/204080522X16454629995872.

K. Locke, M. Feldman, and K. Golden-Biddle, “Coding practices and iterativity: Beyond templates for analyzing qualitative data.,” Organ. Res. methods, vol. 25, no. 2, pp. 262–284, 2022, doi: https://doi.org/10.1177/1094428120948600.

P. Sreeramagiri, G. Andrews, A. K. Greene, and G. Balasubramanian, “Analyzing Security Risks in Cyber-Physical Manufacturing Systems with Actor–Network Theory.,” Smart Sustain. Manuf. Syst., vol. 6, no. 1, pp. 110–121, 2022, doi: https://doi.org/10.1520/SSMS20210042.

Y. S. Chen and S. T. Wu, “An exploration of actor-network theory and social affordance for the development of a tourist attraction: A case study of a Jimmy-related theme park, Taiwan.,” Tour. Manag., vol. 82, p. 104206, 2021, doi: https://doi.org/10.1016/j.tourman.2020.104206.

R. Cury, M. Kennelly, and M. Howes, “Enacting environmental commitments and initiatives in Australian Olympic sport: an actor-network theory perspective.,” Manag. Sport Leis., no. 1–18, 2024, doi: https://doi.org/10.1080/23750472.2023.2299823.

M. A. Sarlak, Y. Salamzadeh, and F. S. Farzad, “Actor-network theory and networked organizations, proposing a conceptual framework.,” Contemp. Appl. Actor Netw. Theory, pp. 197–210, 2020, doi: DOI https://doi.org/10.1007/978-981-15-7066-7_11.

K. Park, S. Park, and T. J. Lee, “Analysis of a spatial network from the perspective of actor‐network theory.,” Int. J. Tour. Res., vol. 22, no. 5, pp. 653–665, 2020, doi: https://doi.org/10.1002/jtr.2363.

M. Bolz, S. Mallon, and M. S. Estrada, Actor-Network Theory (ANT) as a Methodology for Researching Academic Knowledge Circulation. In Routledge Handbook of Academic Knowledge Circulation, 2023. [Online]. Available: https://www.taylorfrancis.com/chapters/edit/10.4324/9781003290650-49/actor-network-theory-ant-methodology-researching-academic-knowledge-circulation-manuel-bolz-stefanie-mallon-marcela-suárez-estrada

F. Ramadhani, “Ramadhani, F. (2023). Dinamika UU ITE Sebagai Hukum Positif Di Indonesia Guna Meminimalisir Kejahatan Siber.,” Kult. J. Ilmu Hukum, Sos. Dan Hum., vol. 1, no. 1, pp. 89–97, 2023, doi: https://doi.org/10.572349/kultura.v1i1.98.

E. Blancaflor, P. B. Y. Saunar, C. T. D. Bilbao, H. B. I. Villarias, and I. P. V. Mapue, “The Use of Cloud Computing and its Security Risks in a Philippine Education System’, A Lit. Rev.,” in 11th Int. Conf. Inf. Educ. Technol., 2023, pp. 66–70. doi: DOI: 10.1109/ICIET56899.2023.10111146.

A. Jacuch, “Comparative analysis of cybersecurity strategies. European union strategy and policies. Polish and selected countries strategies.,” Online J. Model. new Eur., vol. 37, pp. 102-120., 2021, doi: doi: 10.24193/OJMNE.2021.37.06.

Author biographies is not available.
Download this PDF file
Statistic
Read Counter : 0

Downloads

Download data is not yet available.

Quick Link

  • Author Guidelines
  • Download Manuscript Template
  • Peer Review Process
  • Editorial Board
  • Reviewer Acknowledgement
  • Aim and Scope
  • Publication Ethics
  • Licensing Term
  • Copyright Notice
  • Open Access Policy
  • Important Dates
  • Author Fees
  • Indexing and Abstracting
  • Archiving Policy
  • Scopus Citation Analysis
  • Statistic
  • Article Withdrawal

Meet Our Editorial Team

Ir. Amrul Faruq, M.Eng., Ph.D
Editor in Chief
Universitas Muhammadiyah Malang
Google Scholar Scopus
Agus Eko Minarno
Editorial Board
Universitas Muhammadiyah Malang
Google Scholar  Scopus
Hanung Adi Nugroho
Editorial Board
Universitas Gadjah Mada
Google Scholar Scopus
Roman Voliansky
Editorial Board
Dniprovsky State Technical University, Ukraine
Google Scholar Scopus
Read More
 

KINETIK: Game Technology, Information System, Computer Network, Computing, Electronics, and Control
eISSN : 2503-2267
pISSN : 2503-2259


Address

Program Studi Elektro dan Informatika

Fakultas Teknik, Universitas Muhammadiyah Malang

Jl. Raya Tlogomas 246 Malang

Phone 0341-464318 EXT 247

Contact Info

Principal Contact

Amrul Faruq
Phone: +62 812-9398-6539
Email: faruq@umm.ac.id

Support Contact

Fauzi Dwi Setiawan Sumadi
Phone: +62 815-1145-6946
Email: fauzisumadi@umm.ac.id

© 2020 KINETIK, All rights reserved. This is an open-access article distributed under the terms of the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License