•  
  •  
 

Creative Commons License

Creative Commons Attribution-Share Alike 4.0 International License
This work is licensed under a Creative Commons Attribution-Share Alike 4.0 International License.

Abstract

This paper examines how different generations in Indonesia perceive and respond to government data breaches, a recurring phenomenon that undermines trust in state-led digital governance. Using a mixed-methods design, it draws on interviews with civil society organisations, focus groups, and a survey of 1,081 respondents across Baby Boomers, Generation X, Millennials, and Generation Z. Findings show that distrust in the government’s ability to protect personal data is widespread, but generationally stratified. Baby Boomers and Generation X largely treat breaches as bureaucratic inevitabilities, exhibiting high resignation and minimal engagement. In contrast, Millennials and Generation Z show stronger concern, digital literacy, and proactive behaviour, yet frequently cycle through outrage and advocacy before lapsing into breach fatigue. These differences highlight that public apathy is not uniform, but shaped by generational memory, cultural norms, and historical experiences with governance. The novelty of this study lies in providing one of the first empirically grounded, generational analyses of digital insecurity in a Global South context. It reframes apathy not as disengagement but as an affective response to repeated institutional failure. Policy reforms—generationally targeted digital literacy initiatives, enforceable sanctions for public sector breaches, mandatory disclosure, and independent oversight—are essential to rebuild trust and counteract the emotional governance shaping Indonesia’s digital landscape.

References

Berlant, L. (2007). Slow death (Sovereignty, obesity, lateral agency). Critical Inquiry, 33(4), 754–780. https://doi.org/10.1086/521568

Bidgoli, M., & Grossklags, J. (2016, June). End user cybercrime reporting: what we know and what we can do to improve it. In 2016 IEEE International Conference on Cybercrime and Computer Forensic (ICCCF) (pp. 1-6). IEEE. doi: 10.1109/ICCCF.2016.7740424.

Badan Siber dan Sandi Negara. (2024). Lanskap keamanan siber Indonesia 2023. Badan Siber dan Sandi Negara. https://www.bssn.go.id/wp-content/uploads/2024/03/Lanskap-Keamanan-Siber-Indonesia-2023.pdf

Chang, L. Y. C. (2012). Cybercrime in the Greater China Region: Regulatory responses and crime prevention across the Taiwan Strait. In Cybercrime in the Greater China Region. Edward Elgar Publishing.

Chang, L. Y., & Coppel, N. (2020). Building cyber security awareness in a developing country: Lessons from Myanmar. Computers & Security, 97, 101959. https://doi.org/10.1016/j.cose.2020.101959

Draper, N. A., & Turow, J. (2019). The corporate cultivation of digital resignation. New Media & Society, 21(8), 1824–1839. https://doi.org/10.1177/1461444819833331

Ellis, D. (2019). Techno-Securitisation of everyday life and Cultures of Surveillance-Apatheia. Science as Culture, 29(1), 11–29. https://doi.org/10.1080/09505431.2018.1561660

Foucault, M. (1991). Governmentality. In G. Burchell, C. Gordon & P. Miller (Eds.), The Foucault Effect (pp. 87–104). University of Chicago Press.

Garland, D. (1997). `Governmentality’ and the problem of crime: Theoretical Criminology, 1(2), 173–214. https://doi.org/10.1177/1362480697001002002

Goode, S., Hoehle, H., Venkatesh, V., and Brown, S.A. (2017). User Compensation as a Data Breach Recovery Action: An Investigation of the Sony Playstation Network Breach, MIS Quarterly (41:3), pp. 703-727

Ha, H. and Chuah, C.K.P. (2023), "Digital economy in Southeast Asia: challenges, opportunities and future development", Southeast Asia: A Multidisciplinary Journal, Vol. 23 No. 1, pp. 19-35. https://doi.org/10.1108/SEAMJ-02-2023-0023

Ingrida, N. V., & Wibowo, D. (2024). Digital security in human Security: A case study of the Bjorka hacking incident. POLITICOS Jurnal Politik Dan Pemerintahan, 4(1), 56–65. https://doi.org/10.22225/politicos.4.1.2024.56-65

Joseph, R. C. (2017). Data breaches: Public sector perspectives. IT Professional, 20(4), 57-64

Juned, M., Martin, A., Pratama, N. (2024). Bjorka’s Hacktivism in Indonesia: The Intercourse Paradox of Cyberdemocracy, Cyberactivism, and Cybersecurity. Academic Journal of Interdisciplinary Studies, 13(5), 369-380 DOI: https://doi.org/10.36941/ajis-2024-0171

Liu, L., Han, M., Wang, Y., & Zhou, Y. (2018). Understanding data breach: a visualization aspect. In Lecture notes in computer science (pp. 883–892). https://doi.org/10.1007/978-3-319-94268-1_81

Martin, J., & Whelan, C. (2023). Ransomware through the lens of state crime: conceptualizing ransomware groups as cyber proxies, pirates, and privateers. State Crime J., 12, 4

Montasari, R., & Hopcraft, B. (2024). Securing Cyberspace: Addressing the dark web and cybercrime underreporting. In Space Law and Policy (pp. 185–198). https://doi.org/10.1007/978-3-031-64045-2_9

Muhajir, M., & Rosadi, D. (2024). Sentiment analysis and topic modelling of Bjorka using support vector machine and latent Dirichlet allocation. EKSAKTA Journal of Sciences and Data Analysis, 57–66. https://doi.org/10.20885/eksakta.vol5.iss1.art7

Rodrigues, G. A., Marques Serrano, A. L., Lopes Espiñeira Lemos, A. N., Canedo, E. D., Mendonça, F. L. L. d., de Oliveira Albuquerque, R., … & García Villalba, L. J. (2024). Understanding data breach from a global perspective: incident visualization and data protection law review. Data, 9(2), 27. https://doi.org/10.3390/data9020027

Sampson, S. (2021). Good people doing bad things. Journal of Legal Anthropology, 5(1), 110–134. https://doi.org/10.3167/jla.2021.050105

Sangari, S., Dallal, E., & Whitman, M. (2022). Modeling Under-Reporting in cyber incidents. Risks, 10(11), 200. https://doi.org/10.3390/risks10110200

Van De Weijer, S., Leukfeldt, R., & Van Der Zee, S. (2020). Reporting cybercrime victimization: determinants, motives, and previous experiences. Policing an International Journal, 43(1), 17–34. https://doi.org/10.1108/pijpsm-07-2019-0122

Wang, P., D'Cruze, H., & Wood, D. (2019). ECONOMIC COSTS AND IMPACTS OF BUSINESS DATA BREACHES. Issues in Information Systems, 20(2). DOI https://doi.org/10.48009/2_iis_2019_162-171

Zuboff, S. (2019). The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power. PublicAffairs.

JBB_Authorship Statement.pdf (341 kB)
JBB_Authorship Statement.pdf

First Page

144

Last Page

154

Share

COinS
 
 

To view the content in your browser, please download Adobe Reader or, alternately,
you may Download the file to your hard drive.

NOTE: The latest versions of Adobe Reader do not support viewing PDF files within Firefox on Mac OS and if you are using a modern (Intel) Mac, there is no official plugin for viewing PDF files within the browser window.