•  
  •  
 

JURNAL KOMUNIKASI INDONESIA

Abstract

This research aims to determine the cybersecurity leadership of Indonesia's General Election Commission (KPU RI) in protecting voter data within the Voter Registration Information System (SIDALIH). With the increasing use of information technology in elections, including SIDALIH, these systems have become vulnerable to cyber threats. Previous cyberattacks during Indonesian elections highlight the critical importance of cybersecurity, especially in protecting voters' personal information. Given the growing complexity of cyber threats, organizations need responsive leadership and effective communication governance, with a focus on cybersecurity leadership. The primary research question examines how KPU's cybersecurity leadership ensures voter data security during SIDALIH's deployment in the 2024 elections. The study utilizes Ozkaya's Cybersecurity Leadership framework, comprising five key pillars. The research employs an interpretive paradigm and a qualitative descriptive research design, utilizing a single-case study approach. Findings emphasize the need to prioritize leadership and communication governance, transparency, public awareness, regulatory alignment, robust cybersecurity strategies, interagency collaboration, and adequate resource allocation to enhance voter data security.

References

Agrawal, A., Deep, V., Sharma, P., & Mishra, S. (2021). Review of Cybersecurity Post-COVID-19. In In Advances in Interdisciplinary Engineering: Select Proceedings of FLAME, 775-784. Springer.

https://download.e-bookshelf.de/download/0016/3820/87/L-G-0016382087-0055189482.pdf

Akbar, P., Pribadi, U., & Purnomo, E. (2020). Faktor-Faktor yang Mempengaruhi Kinerja Pegawai dalam Penerapan Sidalih di Komisi Pemilihan Umum Daerah Istimewa Yogyakarta. Analitika: Jurnal Magister Psikologi UMA, 12(1), 1–9. https://doi.org/10.31289/analitika.v12i1.3350

Saptohutomo, A.P. (2023). Dugaan Data Pemilih KPU Bocor, Peretas Diperkirakan Akses Admin Sidalih Secara Ilegal. Kompas.Com.

https://nasional.kompas.com/read/2023/11/29/14495691/dugaan-data-pemilih-kpu-bocor-peretas-diperkirakan-akses-admin-sidalih?page=all

Auffret, J. P., Snowdon, J. L., Stavrou, A., Katz, J. S., Kelley, D., Rahman, R. S., Stein, F., Sokol, L., Allor, P., & Warweg, P. (2017). Cybersecurity Leadership: Competencies, Governance, and Technologies for Industrial Control Systems. Journal of Interconnection Networks, 17(1), 1–20.

https://doi.org/10.1142/S0219265917400011

Badan Riset dan Inovasi Nasional (BRIN). (2019). Demokrasi: Sasaran Baru Serangan Siber. Politik.Brin.Go.Id. https://politik.brin.go.id/kolom/ekonomi-politik-isu-isu-strategis/demokrasi-sasaran-baru-serangan-siber/

Black, S. A. (2015). Qualities of Effective Leadership in Higher Education. Open Journal of Leadership, 4(2), 54-66. https://doi.org/10.4236/ojl.2015.42006

Bobbert, Y. (2020). Zero Trust Validation: From Practical Approaches to Theory. Scientific Journal of Research & Reviews, 2(5), 1–13.

https://doi.org/10.33552/sjrr.2020.02.000546

Cahyarini, F. D. (2021). Implementasi Digital Leadership dalam Pengembangan Kompetensi Digital pada Pelayanan Publik. Jurnal Studi Komunikasi Dan Media, 25(1), 47. https://doi.org/10.31445/jskm.2021.3780

Carlton, M., Levy, Y., & Ramim, M. (2019). Mitigating cyber attacks through the measurement of non-IT professionals’ cybersecurity skills. Information and Computer Security, 27(1), 101–121. https://doi.org/10.1108/ICS-11-2016-0088

Cerin, B. (2020). Cyber Security Risk is a Board-Level Issue. In 2020 43rd International Convention on Information, Communication and Electronic Technology (MIPRO), 384–388. https://doi.org/10.23919/MIPRO48935.2020.9245151

Cleveland, S., & Cleveland, M. (2018). Toward Cybersecurity Leadership Framework. Proceedings of the Thirteenth Midwest Association for Information Systems Conference, 1-5.

Craig, A. J., Johnson, R. A., & Gallop, M. (2023). Building cybersecurity capacity: a framework of analysis for national cybersecurity strategies. Journal of Cyber Policy, 1–24. https://doi.org/https://doi.org/10.1080/23738871.2023.2178318

de Bruijn, H., & Janssen, M. (2017). Building Cybersecurity Awareness: The need for evidence-based framing strategies. Government Information Quarterly, 34(1), 1–7. https://doi.org/10.1016/j.giq.2017.02.007

DetikInet. (2014). Xnuxer, “Hacker Partai Jambu” Situs KPU. DetikInet. https://inet.detik.com/cyberlife/d-2643201/xnuxer-hacker-partai-jambu-situs-kpu

Diniz, G., Muggah, R., & Glenny, M. (2014). Deconstructing cyber security in Brazil: Threats and Responses. In Strategic Paper, 11. https://igarape.org.br/wp-content/uploads/2014/11/Strategic-Paper-11-Cyber2.pdf

DiStaso, M. (2018). Communication Challenges in Cybersecurity. Journal of Communication Technology, 1(1). https://doi.org/http://dx.doi.org/10.51548/joctec-2018-004

Ferraro, P. (2016). CYBER SECURITY: Everything an Executive Needs to Know. Hasmark Publishing.

Farisa, F.C. (2020). Ketua KPU Ungkap Beda Serangan Siber di Pemilu Dulu dan Kini. Kompas.Com.

https://nasional.kompas.com/read/2020/08/28/11424601/ketua-kpu-ungkap-beda-serangan-siber-di-pemilu-dulu-dan-kini

Gale, M., Bongiovanni, I., & Slapnicar, S. (2022). Governing cybersecurity from the boardroom: Challenges, drivers, and ways ahead. Computers and Security, 121, 102840. https://doi.org/10.1016/j.cose.2022.102840

Hardiansyah, Z. (2022). 105 Juta Data KPU Diduga Bocor dan Dijual Online, Pengamat Sebut Datanya Valid. Kompas.Com.

https://tekno.kompas.com/read/2022/09/07/10150097/105-juta-data-kpu-diduga-bocor-dan-dijual-online-pengamat-sebut-datanya-valid?page=all

Harknett, R. J., & Stever, J. A. (2011). The new policy world of cybersecurity. Public Administration Review, 71(3), 455–460.

https://doi.org/10.1111/j.1540-6210.2011.02366.x

Hasib, M. (2015). Cyberecurity Leadership: Powering the Modern Organization. United States of America by Tomorrow’s Strategy Today, LLC.

Hersey, P., & Blanchard, K. H. (1982). Leadership style: Attitudes and behaviors. Training and Development Journal, 36(5), 50-52.

Hult, F., & Sivanesan, G. (2014). What good cyber resilience looks like. Journal of Business Continuity & Emergency Planning, 7(2), 112-125.

Hussain, A., Mohamed, A., & Razali, S. (2020). A Review on Cybersecurity: Challenges & Emerging Threats. Proceedings of the 3rdInternational Conference on Networking, Information Systems, & Security, 1-7. https://doi.org/10.1145/3386723.3387847

Izzaty, R., & Nugraha, X. (2019). Perwujudan Pemilu yang Luberjurdil melalui Validitas Daftar Pemilih Tetap. Jurnal Suara Hukum, 1(2), 155-171. https://doi.org/10.26740/jsh.v1n2.p155-171

Karaman, M., Çatalkaya, H., & Aybar, C. (2016). Institutional Cybersecurity from Military Perspective. International Journal of Information Security Science, 5(1), 1–7.

Kuusisto, R., & Kuusisto, T. (2013). Strategic Communication for Cyber-security Leadership 1. The Journal of Information Warfare, 12(3), 41–48.

https://www.jstor.org/stable/10.2307/26486840

Lee, M. (2020). Free the Data from the Birdcage: Opening Up Data and Crowdsourcing Activism in Taiwan. PoLAR: Political and Legal Anthropology Review, 43(2). https://doi.org/https://doi.org/10.1111/plar.12371

Lehto, M., & Limnéll, J. (2021). Strategic leadership in cyber security, case Finland. Information Security Journal, 30(3), 139–148.

https://doi.org/10.1080/19393555.2020.1813851

Nawaz, Z. A. K. D. A., & Khan, I. (2016). Leadership theories and styles: A literature review. Leadership, 16(1), 1–7.

Oberer, B., & Erkollar, A. (2018). Leadership 4.0: Digital Leaders in The Age of Industry 4.0. International Journal of Organizational Leadership, 7(4), 404–412. https://doi.org/10.33844/ijol.2018.60332

Ozkaya, E. (2021). Cybersecurity Leadership Demystified. Packt Publishing Ltd.

Paliszkiewicz, J. (2019). Information security policy compliance: Leadership and trust. Journal of Computer Information Systems, 59(3), 211–217.

https://doi.org/https://doi.org/10.1080/08874417.2019.1571459

Rahman, A. F. (2022). Indonesia Jadi Negara Terburuk di Dunia Soal Keamanan Cyber. Detikinet.

https://inet.detik.com/cyberlife/d-6222006/indonesia-jadi-negara-terburuk-di-dunia-soal-keamanan-cyber

Salabi, N. A. (2020). Website Lindungi Hak Pilihmu Sempat Alami Serangan DDoS. Rumahpemilu.Org. https://rumahpemilu.org/website-lindungi-hak-pilihmu-sempat-alami-serangan-ddos/

Suri, E. W., & Yuneva, Y. (2021). Akselerasi Transformasi Digital pada Tata Kelola Pemilu di Kota Bengkulu. Mimbar: Jurnal Penelitian Sosial Dan Politik, 10(2), 172–181. https://journals.unihaz.ac.id/index.php/mimbar/article/view/2257/1113

Uslu, O., Bass, B. M., Bush, T., Mango, E., & Hassan, Z. (2018). A General Overview to Leadership Theories from a Critical perspective. Educational Management Administration and Leadership, 46(1), 3–4.

https://doi.org/10.21272/mmi.2019.1-13

Wang, P., & Park, S. (2017). Communication in Cybersecurity: A Public Communication Model for Business Data Breach Incident Handling. Issues in Information Systems, 18(2), 136–147. https://iacis.org/iis/2017/2_iis_2017_136-147.pdf

Yi, Y., Ndofor, H.A. & Wei, Z. (2018). Top management team tenure diversity and performance: The moderating role of behavioral integration,. IEEE Tansaction on Engineering Management, 65(1), 21–33.

https://doi.org/10.1109/TEM.2017.2737663

Zeitalini, N. (2022). Apresiasi KPU Siapkan Pemilu 2024, Bamsoet: Manfaatkan Web Satu Data. DetikNews.Com. https://news.detik.com/berita/d-6129436/apresiasi-kpu-siapkan-pemilu-2024-bamsoet-manfaatkan-web-satu-data.

Share

COinS