International Review of Humanities Studies
Abstract
This article examines cyberattacks on government-managed systems from the perspective of social epistemology. The development of information technology, particularly the internet, has changed the way governments operate and interact with the public. However, these changes have also created new vulnerabilities to cyberattacks that can disrupt public services, undermine public trust and threaten national security. Social epistemology, with its focus on how knowledge and beliefs are constructed and disseminated in society, provides a useful analytical framework for understanding these cyberattack dynamics. This article examines how cyberattacks affect the production, distribution and validation of knowledge in the context of governance. By analyzing how different actors, including governments, hackers, and the public, interact and form a shared understanding of threats and cybersecurity, this article aims to provide insights on how to build more effective cybersecurity strategies and improve the resilience of government systems to cyberattacks. In addition, this article will also discuss the philosophical implications of cyberattacks, specifically related to the thoughts of Heidegger, Latour, Clark, and Postman, to understand how technology shapes social and political interactions in the context of cybersecurity. Effective IT governance, which integrates socio-technical understanding, is crucial in mitigating risks and building public trust in the digital age.
Bahasa Abstract
Artikel ini mengkaji serangan siber pada sistem yang dikelola pemerintah melalui perspektif epistemologi sosial. Perkembangan teknologi informasi, khususnya internet, telah mengubah cara pemerintah beroperasi dan berinteraksi dengan publik. Namun, perubahan ini juga menciptakan kerentanan baru terhadap serangan siber yang dapat mengganggu layanan publik, merusak kepercayaan publik, dan mengancam keamanan nasional. Epistemologi sosial, dengan fokusnya pada bagaimana pengetahuan dan kepercayaan dikonstruksi dan disebarluaskan dalam masyarakat, memberikan kerangka analitis yang berguna untuk memahami dinamika serangan siber ini. Artikel ini membahas bagaimana serangan siber memengaruhi produksi, distribusi, dan validasi pengetahuan dalam konteks pemerintahan. Dengan menganalisis bagaimana aktor-aktor yang berbeda, termasuk pemerintah, peretas, dan publik, berinteraksi dan membentuk pemahaman bersama tentang ancaman dan keamanan siber, artikel ini bertujuan untuk memberikan wawasan tentang bagaimana membangun strategi keamanan siber yang lebih efektif dan meningkatkan ketahanan sistem pemerintahan terhadap serangan siber. Selain itu, artikel ini juga akan membahas implikasi filosofis dari serangan siber, khususnya terkait dengan pemikiran Heidegger, Latour, Clark, dan Postman, untuk memahami bagaimana teknologi membentuk interaksi sosial dan politik dalam konteks keamanan siber. IT governance yang efektif, yang mengintegrasikan pemahaman sosio-teknis, menjadi krusial dalam memitigasi risiko dan membangun kepercayaan publik dalam era digital.
References
Aji, M. P. (2023). Cyber Security System and Data Sovereignty in Indonesia in Political Economic Perspective (Case Study of Personal Data Protection). In Jurnal Politica Dinamika Masalah Politik Dalam Negeri dan Hubungan Internasional (Vol. 13, Issue 2, p. 222). https:// doi.org/10.22212/jp.v13i2.3299
Clark, A., & Chalmers, D. J. (1998). The extended mind. In Analysis (Vol. 58, p. 7). http://www.jstor.org/stable/3328150
Cloudflare. (n.d.). What is a DDoS attack? Cloudflare. Retrieved December 20, 2024, from https://www.cloudflare.com/en-gb/learning/ddos/what-is-a-ddos-attack/
Fachri, M. (2024, August 16). Data security in the digital era [Video]. Sadasa Academy. YouTube. https://www.youtube.com/live/QdJ5rCB3Op8?si=RD73UMRrpZRObsLH. .Retrieved December 15, 2024
Heidegger, M. (1977). The question concerning technology and other essays. Harper & Row, Publishers, Inc.
Kaspersky. (n.d.). Handling phishing attacks. Kaspersky. Retrieved December 20, 2024, from https://www.kaspersky.com/resource-center/threats/handling-phishing-attacks
Kaspersky. (n.d.). Ransomware. Kaspersky. Retrieved December 20, 2024, from https://www.kaspersky.com/resource-center/threats/ransomware
Latour, B. (1991). We Have Never Been Modern (Nous n'avons jamais ete modernes). In Configurations (Vol. 2, Issue 3, p. 578). La Decouverte, Translated by Harvard University Press.
Latour, B. (2005). Reassembling the social: An introduction to actor-network-theory. Oxford University Press.
Polanyi, M. (2009). The tacit dimension (Revised Ed.). University Chicago Press.
Ponemon Institute. (2019). 2019 Cost of a data breach report. IBM Security. Retrieved December 20, 2024, from https://insights.integrity360.com/hubfs/2019-cost-of-a-data-breach-report-04_03025203USEN.pdf
Postman, N. (2006). Amusing ourselves to death: Public discourse in the age of show business. In The Social Science Journal (Vol. 25, Issue 3, p. 386). Penguin Group.
Postman, N. (1992). Technopoly: The surrender of culture to technology. Vintage Books. Zetter, K. (2014). Countdown to Zero Day Stuxnet and the Launch of the World's First Digital Weapon. Crown Publishers.
Recommended Citation
Romavella, Aurelia Bunga Anggun Putri and Hadinata, Fristian
(2025)
"CYBER ATTACKS ON GOVERNMENT-MANAGED SYSTEMS: A SOCIAL EPISTEMOLOGY PERSPECTIVE,"
International Review of Humanities Studies: Vol. 10:
No.
2, Article 1.
DOI: 10.7454/irhs.v10i2.1385
Available at:
https://scholarhub.ui.ac.id/irhs/vol10/iss2/1
Included in
Epistemology Commons, Ethics and Political Philosophy Commons, Management Information Systems Commons, Social Justice Commons
