The Cyber Threat Landscape in Indonesia: Attacks and Security System Analysis
DOI:
https://doi.org/10.32664/smatika.v16i01.2200Kata Kunci:
cyber awareness, Cybersecurity, learning systems, risk assessment, security perceptionAbstrak
Cybersecurity in learning systems has become increasingly important as educational institutions rely more heavily on digital platforms such as learning management systems, online assessments, and cloud-based academic services. This rapid digital transformation exposes learning environments to sophisticated cyber threats that may disrupt academic activities and compromise sensitive information. However, many institutions still lack a clear understanding of how users perceive cyber risks and how these perceptions influence the effectiveness of cybersecurity systems. Currently, there is a significant research gap regarding empirical evidence that links user behavioral psychology with technical security outcomes in the Indonesian educational context. This study aims to empirically analyze the relationship between cyber awareness, perceived impact of cyber attacks, and perceived effectiveness of cybersecurity systems in digital learning environments. A quantitative research approach was applied using data collected from 402 respondents. The data were analyzed through descriptive statistics, correlation analysis, regression analysis, and group comparison tests to examine variable relationships and demographic differences. The findings indicate that cyber awareness significantly and positively predicts perceived system effectiveness (β = 0.501, p < 0.001), demonstrating that higher awareness levels enhance overall cybersecurity performance. Conversely, the perceived impact of cyber attacks does not show a significant effect on system effectiveness, suggesting that awareness is more influential than threat perception alone. Additional results reveal gender-based differences in cyber incident experiences, while awareness levels remain similar. The practical implications emphasize the importance of cybersecurity awareness programs, digital safety education, and proactive defense strategies to strengthen protection in learning systems and improve institutional cybersecurity readiness.
Referensi
[1] O. Goni, “Cyber Crime and Its Classification,” Int. J. Electron. Eng. Appl., vol. 10, no. 2, 2021, doi: 10.30696/ijeea.x.i.2022.01-17.
[2] C. Whelan and D. Harkin, “Civilianising specialist units: Reflections on the policing of cyber-crime,” Criminol. Crim. Justice, vol. 21, no. 4, 2021, doi: 10.1177/1748895819874866.
[3] T. T. Nguyen and V. J. Reddi, “Deep Reinforcement Learning for Cyber Security,” IEEE Trans. Neural Networks Learn. Syst., vol. 34, no. 8, 2023, doi: 10.1109/TNNLS.2021.3121870.
[4] T. Tan, H. Sama, T. Wibowo, G. Wijaya, and O. E. Aboagye, “Kesadaran Keamanan Siber pada Kalangan Mahasiswa Universitas di Kota Batam Cybersecurity Awareness among University Students in Batam City,” J. Teknol. dan Inf., vol. 14, 2024, doi: 10.34010/jati.v14i2.
[5] A. Bilen and A. B. Özer, “Cyber-attack method and perpetrator prediction using machine learning algorithms,” PeerJ Comput. Sci., vol. 7, 2021, doi: 10.7717/PEERJ-CS.475.
[6] S. E. Prasetyo, H. Haeruddin, and K. Ariesryo, “Website Security System from Denial of Service attacks, SQL Injection, Cross Site Scripting using Web Application Firewall,” Antivirus J. Ilm. Tek. Inform., vol. 18, no. 1, pp. 27–36, May 2024, doi: 10.35457/antivirus.v18i1.3339.
[7] W. Robert, A. Sunday, and F. U. O Y E Journal, “F U O Y E Journal of Criminology and Security Studies (IJCSS) CYBERCRIME AND ITS IMPLICATIONS FOR HUMAN CAPITAL DEVELOPMENT: A STUDY OF OTUOKE COMMUNITY, FUO STUDENTS,” Online, 2024.
[8] D. A. Marelino, “Understanding the Types of Cyber Crime and Its Prevention,” Math. Stat. Eng. Appl., vol. 71, no. 1, 2022, doi: 10.17762/msea.v71i1.50.
[9] O. Goni, Md. Haidar Ali, Showrov, Md. Mahbub Alam, and Md. Abu Shameem, “The Basic Concept of Cyber Crime,” J. Technol. Innov. Energy, vol. 1, no. 2, 2022, doi: 10.56556/jtie.v1i2.113.
[10] A. Rachh, “Spatial and temporal analysis of cyber-crime cases in India,” Lett. Spat. Resour. Sci., vol. 17, no. 1, 2024, doi: 10.1007/s12076-023-00360-w.
[11] A. B. I. For. Oluwatoyin Ajoke FarREVOLUTIONIZING BANKING SECURITY: INTEGRATING ARTIFICIAL INTELLIGENCE, BLOCKCHAIN, “ENHANCED CYBERSECURITY,” Financ. Account. Res. J., vol. 6, no. 4, pp. 501–514, Apr. 2024, doi: 10.51594/farj.v6i4.990.
[12] N. N. Cele and S. Kwenda, “Do cybersecurity threats and risks have an impact on the adoption of digital banking? A systematic literature review,” 2024, Emerald Publishing. doi: 10.1108/JFC-10-2023-0263.
[13] G. Sakellariou, P. Fouliras, I. Mavridis, and P. Sarigiannidis, “A Reference Model for Cyber Threat Intelligence (CTI) Systems,” Electron., vol. 11, no. 9, 2022, doi: 10.3390/electronics11091401.
[14] W. S. Admass, Y. Y. Munaye, and A. A. Diro, “Cyber security: State of the art, challenges and future directions,” 2024. doi: 10.1016/j.csa.2023.100031.
[15] T. N. Nguyen, H. Chi, M. City, and V. Correspondence, “A review of cyber crime,” J. Soc. Rev. Dev., vol. 2, no. 1, 2023.
[16] E. Irshad and A. Basit Siddiqui, “Cyber threat attribution using unstructured reports in cyber threat intelligence,” Egypt. Informatics J., vol. 24, no. 1, 2023, doi: 10.1016/j.eij.2022.11.001.
[17] Md. Asaad Raza, “Cyber Security and Data Privacy in the Era of E-Governance,” Soc. Sci. J. Adv. Res., vol. 4, no. 1, 2024, doi: 10.54741/ssjar.4.1.2.
[18] K. M. Caramancion, Y. Li, E. Dubois, and E. S. Jung, “The Missing Case of Disinformation from the Cybersecurity Risk Continuum: A Comparative Assessment of Disinformation with Other Cyber Threats,” Data, vol. 7, no. 4, 2022, doi: 10.3390/data7040049.
[19] D. P. Saputri, Surryanto D. W., and Helda Risman, “The Indonesian Cyber Diplomacy: ASEAN-Japan Online Cyber Exercise,” Tech. Soc. Sci. J., vol. 9, 2020, doi: 10.47577/tssj.v9i1.911.
[20] Y. Cao, C. Ke, D. Fan, Y. Ping, Q. Yang, and M. K. Yao, “State-aware access control for cyber-physical-social space: Model and policy security assurance,” Egypt. Informatics J., vol. 31, Sep. 2025, doi: 10.1016/j.eij.2025.100749.
[21] N. Tatipatri and S. L. Arun, “A Comprehensive Review on Cyber-Attacks in Power Systems: Impact Analysis, Detection, and Cyber Security,” IEEE Access, vol. 12, 2024, doi: 10.1109/ACCESS.2024.3361039.
[22] P. H. Meland, D. A. Nesheim, K. Bernsmed, and G. Sindre, “Assessing cyber threats for storyless systems,” J. Inf. Secur. Appl., vol. 64, 2022, doi: 10.1016/j.jisa.2021.103050.
[23] H. H. Amirullah, A. Eviyanti, and S. Sumarno, “Aplikasi Keamanan Berkas dengan Enkripsi AES dan Biometrik Sidik Jari Berbasis Android,” SMATIKA J., vol. 14, no. 01, pp. 23–32, Jun. 2024, doi: 10.32664/smatika.v14i01.1130.
Unduhan
Diterbitkan
Terbitan
Bagian
Lisensi
Hak Cipta (c) 2026 SMATIKA JURNAL : STIKI Informatika Jurnal

Artikel ini berlisensiCreative Commons Attribution-ShareAlike 4.0 International License.
Penulis telah menyetujui bahwa pemegang hak cipta adalah SMATIKA Jurnal. Dan Author berhak menyebarkan artikel tanpa seijin SMATIKA jurnal.

