Implementation of Information Technology for the Indonesian Navy in Dealing with Cyber Threats

Authors

  • Zainal Syahlan Politeknik Angkatan Laut

DOI:

https://doi.org/10.5555/ijosmas.v4i4.334

Keywords:

Technology, Indonesian Navy, cyber threats, national defence

Abstract

National defence in the seas faces increasingly complex challenges due to developments in information technology. Cyber threats are a significant threat to national security, including in the context of national defence at sea. Therefore, the Indonesian Navy as a component of national defence needs to apply sophisticated information technology to deal with this threat. This study aims to analyse the application of Indonesian Navy information technology in dealing with cyber threats to support national defence at sea. The method used in this study is a qualitative method with a case study approach. This research involved collecting data through in-depth interviews, participant observation, and analysis of related documents. The results of this study indicate that the Indonesian Navy has implemented various innovative information technologies to deal with cyber threats. The application of this information technology involves Information Technology Infrastructure (hardware), the readiness of the Required Cyber Operation Software and Human Resources (brain ware), as well as the development of cyber capabilities within the organization. Through the application of this information technology, the Indonesian Navy can support national defence at sea more effectively

Downloads

Download data is not yet available.

References

L. Mengcheng and T. Tuure, “Information Technology–Supported value Co-Creation and Co-Destruction via social interaction and resource integration in service systems,” J. Strateg. Inf. Syst., vol. 31, no. 2, p. 101719, 2022, doi: 10.1016/j.jsis.2022.101719.

P. Putra Tampi, S. Diana Nabella, and D. P. Sari, “The Influence of Information Technology Users, Employee Empowerment, and Work Culture on Employee Performance at the Ministry of Law and Human Rights Regional Office of Riau Islands,” Enrich. J. Manag., vol. 12, no. 2, pp. 1620–1628, 2022.

K. Razikin and B. Soewito, “Cybersecurity decision support model to designing information technology security system based on risk analysis and cybersecurity framework,” Egypt. Informatics J., vol. 23, no. 3, pp. 383–404, 2022, doi: 10.1016/j.eij.2022.03.001.

B. Alhayani, S. T. Abbas, D. Z. Khutar, and H. J. Mohammed, “Best ways computation intelligent of face cyber attacks,” Mater. Today Proc., no. xxxx, 2021, doi: 10.1016/j.matpr.2021.02.557.

E. Tariq, M. Alshurideh, I. Akour, and S. Al-Hawary, “The effect of digital marketing capabilities on organizational ambidexterity of the information technology sector,” Int. J. Data Netw. Sci., vol. 6, no. 2, pp. 401–408, 2022, doi: 10.5267/j.ijdns.2021.12.014.

P. T, S. P. Djati, and E. Tanti P., “The Effect of Digital Leadership, organizational culture, digital competence and organization’s commitment on Organizational Performance: Information Technology System in Indonesian Navy,” Int. J. Sci. Res. Manag., vol. 11, no. 04, pp. 4833–4846, 2023, doi: 10.18535/ijsrm/v11i04.em06.

D. I. Sensuse, P. A. W. Putro, R. Rachmawati, and W. D. Sunindyo, “Initial Cybersecurity Framework in the New Capital City of Indonesia: Factors, Objectives, and Technology,” Inf., vol. 13, no. 12, pp. 1–10, 2022, doi: 10.3390/info13120580.

M. Boeding, K. Boswell, M. Hempel, H. Sharif, and J. Lopez, “Survey of Cybersecurity Governance, Threats, and Countermeasures for the Power Grid †,” vol. 15, no. 1, pp. 1–22, 2022, doi: https:// doi.org/10.3390/en15228692.

T. Sobb, B. Turnbull, and N. Moustafa, “Supply chain 4.0: A survey of cyber security challenges, solutions and future directions,” Electron., vol. 9, no. 11, pp. 1–31, 2020, doi: 10.3390/electronics9111864.

E. Ukwandu et al., “Cyber-Security Challenges in Aviation Industry: A Review of Current and Future Trends,” Inf., vol. 13, no. 3, pp. 1–22, 2022, doi: 10.3390/info13030146.

M. H. Alqaraleh, M. O. S. Almari, B. J. A. Ali, and M. S. Oudat, “the Mediating Role of Organizational Culture on the Relationship Between Information Technology and Internal Audit Effectiveness,” Corp. Gov. Organ. Behav. Rev., vol. 6, no. 1, pp. 8–18, 2022, doi: 10.22495/cgobrv6i1p1.

P. A. Ahmad, “Cyber Security Is More than Just a Question of Information Technology,” J. Image Process. Intell. Remote Sens., no. 12, pp. 1–7, 2021, doi: 10.55529/jipirs12.1.7.

A. M. Bossler and T. Berenblum, “Introduction: new directions in cybercrime research,” J. Crime Justice, vol. 42, no. 5, pp. 495–499, 2019, doi: 10.1080/0735648X.2019.1692426.

R. Desiana and S. C. Prima, “Cyber security policy in Indonesian shipping safety,” J. Marit. Stud. Natl. Integr., vol. 5, no. 2, pp. 109–117, 2022, doi: 10.14710/jmsni.v5i2.13673.

C. McMullin, “Transcription and Qualitative Methods: Implications for Third Sector Research,” Voluntas, vol. 34, no. 1, pp. 140–153, 2023, doi: 10.1007/s11266-021-00400-3.

A. B. Ferial, Mattalatta, and H. Tamsah, “Pengaruh Kompetensi Terhadap Kinerja Melalui Motivasi Dan Disiplin Tutor Pada Program Pendidikan Luar Sekolah Pada Pusat Kegiatan Belajar Masyarakat (PKBM) Kota Makassar,” YUME J. Manag., vol. 2, no. 1, 2019, [Online]. Available: https://journal.stieamkop.ac.id/index.php/yume/article/view/352

M. A. Benzaghta, A. Elwalda, M. Mousa, I. Erkan, and M. Rahman, “SWOT analysis applications: An integrative literature review,” J. Glob. Bus. Insights, vol. 6, no. 1, pp. 55–73, 2021, doi: 10.5038/2640-6489.6.1.1148.

Utomo, H. J. N., Irwantoro, I., Wasesa, S., Purwati, T., Sembiring, R., & Purwanto, A. (2023). Investigating The Role of Innovative Work Behavior, Organizational Trust, Perceived Organizational Support: An Empirical Study on SMEs Performance. Journal of Law and Sustainable Development, 11(2), e417. https://doi.org/10.55908/sdgs.v11i2.417

Purwanto, A., Purba, J.T., Bernarto, I., Sijabat, R. (2023b). The Role of Transformational Leadership, Organizational Citi-zenship Behavior, Innovative Work Behavior, Leader Member Exchange, Organizational Commitment. Quality Work Life and Digital Transformation on Private University Performance. Revista De Gestão Social E Ambiental, 17(4), e03365. https://doi.org/10.24857/rgsa.v17n427.

Purwanto, A., Purba, J.T., Bernarto, I., Sijabat, R.(2023).Investigating the role digital transformation and human resource management on the performance of the universities.International Journal of Data and Network Science,7(4), DOI: 10.5267/j.ijdns.2023.6.01128.

A. Citra Birru, S. Sudarmiatin, and A. Hermawan, “Competitive Strategies in The Lodging Service Sector : Five Porter Analyses And Case Study SWOT Analysis,” J. Bus. Manag. Rev., vol. 3, no. 1, pp. 001–017, 2022, doi: 10.47153/jbmr31.2732022.

rrr

Published

2023-07-17

How to Cite

Syahlan, Z. (2023). Implementation of Information Technology for the Indonesian Navy in Dealing with Cyber Threats. International Journal of Social and Management Studies, 4(4), 1–9. https://doi.org/10.5555/ijosmas.v4i4.334

Issue

Section

Articles