CYBER SECURITY IN THE DIGITAL AGE: CHALLENGES AND SOLUTIONS FOR PUBLIC ADMINISTRATION

Authors

  • Gunawan Widjaja Fakultas Hukum Universitas 17 Agustus 1945 Jakarta Author

Keywords:

Cyber Security, Digital Age, Challenges, Solutions, Public Administration

Abstract

Cybersecurity in the digital age is a key challenge for public administrations, given the growth of increasingly sophisticated and destructive cyber threats. This demands effective strategies and solutions to protect critical infrastructure and sensitive data. A multi-layered technology approach, including system updates, encryption, and multi- factor authentication, combined with security training and policies for the workforce, is essential to respond to these threats. In addition, collaboration between governments, the private sector, and the international community should be optimised to strengthen responses to cyber threats. By implementing these measures, public administrations can significantly improve their digital security, ensure public services remain functional, and protect data from irresponsible exploitation.

Downloads

Download data is not yet available.

References

Afiyanti, Y. (2008). Focus Group Discussion as a Qualitative Research Data Collection Method. Indonesian Nursing Journal,12 (1), 58-62.

https://doi.org/10.7454/jki.v12i1.201

Anderson, R. (2020). Security Engineering: A Guide to Building Dependable Distributed Systems. Wiley.

Bayuk, J. (2012). Cybersecurity Policy Guidebook. Wiley.

Cavelty, M. D. (2014). The Militarisation of Cyber Security as a Source of Global Tension.

NATO Review.

Chen, A. C., & Chan, T. K. (2016). Legal Adjudication in Medical Malpractice Litigation: An Overview. Medical Law Review, 24(4), 499–512.

Hidayat, D. N. (2009). QUALITATIVE - QUANTITATIVE DICHOTOMY AND PARADIGMATIC VARIANTS IN QUALITATIVE RESEARCH. Scriptura,2 (2).

https://doi.org/10.9744/scriptura.2.2.81-94

Johnson, L., & Robinson, K. (2019). Understanding Cyber Attacks: A Threat-Based Approach. International Journal of Cyber Security, 12(3), 155–170.

Kaplan, J. (2016). Dark Territory: The Secret History of Cyber War. Simon & Schuster.

Kaufman, C., Perlman, R., & Speciner, M. (2010). Network Security: Private Communication in a Public World. Prentice Hall.

Lewis, J. A. (2018). Cybersecurity and Critical Infrastructure Protection.

Ma, J., Campbell, S., & Tran, M. (2020). Examining the Threat Landscape of Cybersecurity. Journal of Information Security Research, 11(2), 85–97.

Mitnick, K. D., & Simon, W. L. (2015). Ghost in the Wires: My Adventures as the World's Most Wanted Hacker. Little, Brown and Company.

Ross, R. (2017). Building a Secure System: Cybersecurity Standards and Implementation.

NIST Press.

Schneier, B. (2015). Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World. W. W. Norton & Company.

Singer, A. (2020). Hacked: The Inside Story of America's Struggle to Secure Cyberspace.

Random House.

Smith, J. K., & Jones, L. P. (2020). The Role of Privacy Laws in Telemedicine. Telemedicine and E-Health, 26(4), 425–432.

Stallings, W., & Brown, L. (2018). Computer Security: Principles and Practice. Pearson.

Syahran, M. (2020). Building Data Trust in Qualitative Research. PRIMARY EDUCATION JOURNAL (PEJ),4 (2), 19-23. https://doi.org/10.30631/pej.v4i2.72

unknown. (2023). Cyber Security: Challenges and Solutions in the Digital Age Introduction. ResearchGate.

https://www.researchgate.net/publication/372140509_Keamanan_Cyber_Tanta ngan_dan_Solusi_dalam_Era_Digital_Pendahuluan

Von Solms, R., & Van Niekerk, J. (2013). From information security to cyber security.

Computers & Security, 38, 97–102.

Wang, W., & Lu, Z. (2021). A Comprehensive Survey on Security in the IoT Era. IEEE Internet of Things Journal, 8(1), 3421–3434.

Whitman, M. E., & Mattord, H. J. (2022). Principles of Information Security. Cengage Learning.

Zhang, X., & Lee, Y. (2019). Evaluating the Effectiveness of Cybersecurity Policies. Policy and Internet, 11(3), 312–329.

Downloads

Published

2025-04-30

Issue

Section

Articles