Techno-Prevention in Counterterrorism: Between Countering Crime and Human Rights Protection


  • Ali Masyhar Faculty of Law, Universitas Negeri Semarang, Semarang, Indonesia
  • Silaas Oghenemaro Emovwodo Faculty of Art and Social Science, Universiti Brunei Darussalam, Brunei Darussalam



Terrorism has become a significant concern throughout the world. This concern is supported by the increasing use of the internet, which has triggered an increase in cyberattacks. This research aims to determine the role of governance in counter-cyber terrorism. The normative legal methodology utilized in this study results from an exhaustive literature evaluation. This research shows that the government's role is needed to counter cyber terrorism. Although the Indonesian government has initiated a national cybersecurity strategy and implemented short-term and long-term programs, some obstacles and challenges hinder its implementation. The ITE Law has encouraged Indonesia to establish policies and regulations regarding information security. There have yet to be any regulations regarding cyber-attacks to counter cyber terrorism. Various institutions with common interests in national defense and security, including the cyber domain, must collaborate with BSSN. Other government agencies that depend on each other include the TNI, Polri, Ministry of Defense, BIN, and Ministry of Communication and Information. Apart from that, governance is also needed, including international organizations, several non-governmental organizations (NGOs), government and private governance, and several other components. 


Aghajani, Gholamreza, and Noradin Ghadimi, ‘Multi-Objective Energy Management in a Micro-Grid,’ Energy Reports, 4 (2018), 218–25

Ahmetoglu, Huseyin, and Resul Das, ‘A Comprehensive Review on Detection of Cyber-Attacks: Data Sets, Methods, Challenges, and Future Research Directions,’ Internet of Things, 20 (2022), 100615

Akanni, J.O., ‘A Non-Linear Optimal Control Model for Illicit Drug Use and Terrorism Dynamics in Developing Countries with Time-Dependent Control Variables,’ Decision Analytics Journal, 8 (2023), 100281

Alhayani, Bilal, Sara Taher Abbas, Dawood Zahi Khutar, and Husam Jasim Mohammed, ‘WITHDRAWN: Best Ways Computation Intelligent of Face Cyber Attacks’, Materials Today: Proceedings, 2021

Amarini, Indriati, Yusuf Saefudin, Ika Ariani Kartini, Marsitiningsih Marsitiningsih, and Noorfajri Ismail, ‘Digital Transformation: Creating an Effective and Efficient Court in Indonesia’, Legality : Jurnal Ilmiah Hukum, 31.2 (2023), 266–84

Ampratwum, Godslove, Robert Osei-Kyei, and Vivian W.Y. Tam, ‘Exploring the Concept of Public-Private Partnership in Building Critical Infrastructure Resilience against Unexpected Events: A Systematic Review,’ International Journal of Critical Infrastructure Protection, 39 (2022), 100556

Ardiana, Meity, Adriano Adriano, Kurniadi Doni, and Yulianto Yulianto, ‘Corporate Criminal Liability in Procurement of Goods and Services in Hospital,’ Yuridika, 38.2 (2023), 399–414

Ariefulloh, Ariefulloh, Hibnu Nugroho, Angkasa Angkasa, and Riris Ardhanariswari, ‘Restorative Justice-Based Criminal Case Resolution in Salatiga, Indonesia: Islamic Law Perspective and Legal Objectives’, Ijtihad : Jurnal Wacana Hukum Islam Dan Kemanusiaan, 23.1 (2023), 19–36

Arifin, Ridwan, Sigit Riyanto, and Akbar Kurnia Putra, ‘Collaborative Efforts in ASEAN for Global Asset Recovery Frameworks to Combat Corruption in the Digital Era,’ Legality : Jurnal Ilmiah Hukum, 31.2 (2023), 329–43

Atiyah, Ghassan Adhab, Nazura Abdul Manap, and Saidatul Nadia Abd Aziz, ‘Legal Status of Cryptocurrency Circulation in Iraq: Lessons from the United Arab Emirates and the United States,’ Hasanuddin Law Review, 9.1 (2023), 1

Azhmyakov, Vadim, Erik I. Verriest, Moises Bonilla, and Stefan Pickl, ‘Optimal Control Methodology for the Counter-Terrorism Strategies: The Relaxation Based Approach’, Journal of the Franklin Institute, 359.13 (2022), 6690–6708

Bakry, Muammar, Abdul Syatar, Achmad Abubakar, Chaerul Risal, Ahmad Ahmad, and Muhammad Majdy Amiruddin, ‘Strengthening the Cyber Terrorism Law Enforcement in Indonesia: Assimilation from Islamic Jurisdiction’, International Journal of Criminology and Sociology, 10 (2021), 1267–76

Barry, Thomas, Jonathan Jona, and Naomi Soderstrom, ‘The Impact of Country Institutional Factors on Firm Disclosure: Cybersecurity Disclosures in Chinese Cross-Listed Firms’, Journal of Accounting and Public Policy, 41.6 (2022), 106998

Beechey, Matthew, Konstantinos G. Kyriakopoulos, and Sangarapillai Lambotharan, ‘Evidential Classification and Feature Selection for Cyber-Threat Hunting’, Knowledge-Based Systems, 226 (2021), 107120

Bolbot, Victor, Ketki Kulkarni, Päivi Brunou, Osiris Valdez Banda, and Mashrura Musharraf, ‘Developments and Research Directions in Maritime Cybersecurity: A Systematic Literature Review and Bibliometric Analysis’, International Journal of Critical Infrastructure Protection, 39 (2022), 100571

Brata, Al Fadilla Yoga, and Rakotoarisoa Maminiaina Heritiana Sedera, ‘The Implementing a Carbon Tax as a Means of Increasing Investment Value in Indonesia’, Journal of Sustainable Development and Regulatory Issues (JSDERI), 1.2 (2023), 39–50

Bullock, Jane A., George D. Haddow, and Damon P. Coppola, ‘Cybersecurity and Critical Infrastructure Protection’, in Introduction to Homeland Security (Elsevier, 2021), pp. 425–97

Burdon, Mark, and Lizzie Coles-Kemp, ‘The Significance of Securing as a Critical Component of Information Security: An Australian Narrative’, Computers & Security, 87 (2019), 101601

Cappai, Marco, ‘The Role of Private and Public Regulation in the Case Study of Crypto-Assets: The Italian Move towards Participatory Regulation’, Computer Law & Security Review, 49 (2023), 105831

Chang, Lennon Y.C., and Nicholas Coppel, ‘Building Cyber Security Awareness in a Developing Country: Lessons from Myanmar’, Computers & Security, 97 (2020), 101959

Chatzis, Petros, and Eliana Stavrou, ‘Cyber-Threat Landscape of Border Control Infrastructures’, International Journal of Critical Infrastructure Protection, 36 (2022), 100503

Cheryl, Barr-Kumarakulasinghe, Boon-Kwee Ng, and Chan-Yuan Wong, ‘Governing the Progress of Internet-of-Things: Ambivalence in the Quest of Technology Exploitation and User Rights Protection’, Technology in Society, 64 (2021), 101463

Choudhary, Sheraz Ahmad, Muhammad Azhar Khan, Abdullah Zafar Sheikh, Mohd Khata Jabor, Mohd Safarin bin Nordin, Abdelmohsen A. Nassani, and others, ‘Role of Information and Communication Technologies on the War against Terrorism and on the Development of Tourism: Evidence from a Panel of 28 Countries’, Technology in Society, 62 (2020), 101296

Cleary, Christopher, ‘Public-Private Partnerships: Security Organizations’, Encyclopedia of Security and Emergency Management, 2019, 1–7

Cross, M.K.D., ‘Counter-Terrorism & the Intelligence Network in Europe’, International Journal of Law, Crime and Justice, 72 (2023), 100368

Diaz Valdivia, Andres, ‘Between Decentralization and Reintermediation: Blockchain Platforms and the Governance of “Commons-Led†and “Business-Led†Energy Transitions’, Energy Research & Social Science, 98 (2023), 103034

Dong, Changyin, Yujia Chen, Hao Wang, Leizhen Wang, Ye Li, Daiheng Ni, and others, ‘Evaluating Impact of Remote-Access Cyber-Attack on Lane Changes for Connected Automated Vehicles’, Digital Communications and Networks, 2023

Fu, Lipeng, Xueqing Wang, Bingsheng Liu, and Ling Li, ‘Investigation into the Role of Human and Organizational Factors in Security Work against Terrorism at Large-Scale Events’, Safety Science, 128 (2020), 104764

Ge, Hui, Lei Zhao, Dong Yue, Xiangpeng Xie, Linghai Xie, Sergey Gorbachev, and others, ‘A Game Theory Based Optimal Allocation Strategy for Defense Resources of Smart Grid under Cyber-Attack’, Information Sciences, 652 (2024), 119759

Ginting, Jamin, and Patrick Talbot, ‘Fundraising Aspect of International Terrorism Organization in ASEAN: Legal and Political Aspects’, Lex Scientia Law Review, 7.1 (2023), 1–30

Homburger, Zine, ‘The Necessity and Pitfall of Cybersecurity Capacity Building for Norm Development in Cyberspace’, Global Society, 33.2 (2019), 224–42

IAIANI, Matteo, Alessandro TUGNOLI, Sarah BONVICINI, and Valerio COZZANI, ‘Analysis of Cybersecurity-Related Incidents in the Process Industry’, Reliability Engineering & System Safety, 209 (2021), 107485

Jaelani, Abdul Kadir, and Resti Dian Luthviati, ‘The Crime Of Damage After the Constitutional Court’s Decision Number 76/PUU-XV/2017’, Journal of Human Rights, Culture and Legal System, 1.1 (2021)

Kelemen, Barbara, and Alessandro Fergnani, ‘The Futures of Terrorism against China in the Greater Middle East’, Futures, 124 (2020), 102643

Kouloufakos, Triantafyllos, ‘Untangling the Cyber Norm to Protect Critical Infrastructures’, Computer Law & Security Review, 49 (2023), 105809

Kusumaningtyas, Reza Octavia, and James Kalimanzila, ‘The Impact of Tax Incentive on Increase Foreign Direct Investment’, Journal of Sustainable Development and Regulatory Issues (JSDERI), 1.2 (2023), 51–63

Lattanzio, Gabriele, and Yue Ma, ‘Cybersecurity Risk and Corporate Innovation’, Journal of Corporate Finance, 82 (2023), 102445

Lee, Claire Seungeun, and Ji Hye Kim, ‘Latent Groups of Cybersecurity Preparedness in Europe: Sociodemographic Factors and Country-Level Contexts’, Computers & Security, 97 (2020), 101995

Li, Yuchong, and Qinghui Liu, ‘A Comprehensive Review Study of Cyber-Attacks and Cyber Security; Emerging Trends and Recent Developments’, Energy Reports, 7 (2021), 8176–86

Macas, Mayra, Chunming Wu, and Walter Fuertes, ‘Adversarial Examples: A Survey of Attacks and Defenses in Deep Learning-Enabled Cybersecurity Systems’, Expert Systems with Applications, 238 (2024), 122223

Mahardika, Harryadin, Juliana French, and Agung Sembada, ‘Keep Calm and Eat Satay: Indonesia’s Consumption-Themed Signals of Defiance against Terrorism’, Australasian Marketing Journal, 26.3 (2018), 231–38

Masyhar, Ali, Muhammad Azil Maskur, Sri Redjeki Prasetyowati, Aldita Evan Prihama, Roy Priyono, and Ahmad Alif, ‘Digital Transformation of Youth Movement for Counter Radicalism’, 2022, p. 030010

Masyhar, Ali, Ali Murtadho, and Ahmad Zaharuddin Sani Ahmad Sabri, ‘The Driving Factors for Recidivism of Former Terrorism Convicts in Socio-Legal Perspective’, Journal of Indonesian Legal Studies, 8.1 (2023)

Mishra, Alok, Yehia Ibrahim Alzoubi, Memoona Javeria Anwar, and Asif Qumer Gill, ‘Attributes Impacting Cybersecurity Policy Development: An Evidence from Seven Nations’, Computers & Security, 120 (2022), 102820

Mohammadi, Mokhtar, Tarik A. Rashid, Sarkhel H.Taher Karim, Adil Hussain Mohammed Aldalwie, Quan Thanh Tho, Moazam Bidaki, and others, ‘A Comprehensive Survey and Taxonomy of the SVM-Based Intrusion Detection Systems’, Journal of Network and Computer Applications, 178 (2021), 102983

Motsch, William, Alexander David, Keran Sivalingam, Achim Wagner, and Martin Ruskowski, ‘Approach for Dynamic Price-Based Demand Side Management in Cyber-Physical Production Systems’, Procedia Manufacturing, 51 (2020), 1748–54

Niraja, K.S., and Sabbineni Srinivasa Rao, ‘WITHDRAWN: A Hybrid Algorithm Design for near Real Time Detection Cyber Attacks from Compromised Devices to Enhance IoT Security’, Materials Today: Proceedings, 2021

Nugraha, Yudhistira, and Andrew Martin, ‘Towards a Framework for Trustworthy Data Security Level Agreement in Cloud Procurement’, Computers & Security, 106 (2021), 102266

Okey, Ogobuchi Daniel, Ekikere Umoren Udo, Renata Lopes Rosa, Demostenes Zegarra Rodríguez, and João Henrique Kleinschmidt, ‘Investigating ChatGPT and Cybersecurity: A Perspective on Topic Modeling and Sentiment Analysis’, Computers & Security, 135 (2023), 103476

Plotnek, Jordan J., and Jill Slay, ‘Cyber Terrorism: A Homogenized Taxonomy and Definition’, Computers & Security, 102 (2021), 102145

QMN-Nguyen, Moon, ‘Media Presentations of Vietnam’s Cybersecurity Law: A Comparative Approach with Corpus-Based Critical Discourse Analysis’, Computer Law & Security Review, 50 (2023), 105835

Radomyski, Adam, and Paweł Bernat, ‘Contemporary Determinants of Organising Effective Protection of Civil Aviation Against Terrorism’, Transportation Research Procedia, 35 (2018), 259–70

Röell, Christiaan, Ellis Osabutey, Peter Rodgers, Felix Arndt, Zaheer Khan, and Shlomo Tarba, ‘Managing Socio-Political Risk at the Subnational Level: Lessons from MNE Subsidiaries in Indonesia’, Journal of World Business, 57.3 (2022), 101312

Safaei Pour, Morteza, Christelle Nader, Kurt Friday, and Elias Bou-Harb, ‘A Comprehensive Survey of Recent Internet Measurement Techniques for Cyber Security’, Computers & Security, 128 (2023), 103123

Saputra, Rian, Tiara Tiolince, Iswantoro Iswantoro, and Sanju Kumar Sigh, ‘Artificial Intelligence and Intellectual Property Protection in Indonesia and Japan’, Journal of Human Rights, Culture and Legal System, 3.2 (2023), 210–35

Seger Guttmann, Tali, Shaked Gilboa, and Judith Partouche-Sebban, ‘“I Live with Terror inside Meâ€: Exploring Customers’ Instinctive Reactions to Terror’, International Journal of Hospitality Management, 92 (2021), 102734

Septasari, Dita, ‘The Cyber Security and The Challenge of Society 5.0 Era in Indonesia’, Aisyah Journal Of Informatics and Electrical Engineering (A.J.I.E.E), 5.2 (2023), 227–33

Sepúlveda Estay, Daniel A., Rishikesh Sahay, Michael B. Barfod, and Christian D. Jensen, ‘A Systematic Review of Cyber-Resilience Assessment Frameworks’, Computers & Security, 97 (2020), 101996

Sholecha, Ema Mar’ati, Ahmat Saiful, Sheilla Yunika, Hariyanto Hariyanto, and Norhaiden Unsil, ‘Justice Collaborator’s Position and Function on Witness Protection’s Rights as a Suspect from the Perspective of Criminal Law in Indonesia’, Volksgeist: Jurnal Ilmu Hukum Dan Konstitusi, 2023, 131–43

Da Silva, Joseph, ‘Cyber Security and the Leviathan’, Computers & Security, 116 (2022), 102674

Spalek, Basia, and Salwa El-Awa, ‘Governance and Counter-Terrorism: Engaging Moderate and Non-Violent Extremist Movements in Combatting Jihadist-Linked Terrorism’, International Journal of Law, Crime and Justice, 72 (2023), 100367

Stacey, Patrick, Rebecca Taylor, Omotolani Olowosule, and Konstantina Spanaki, ‘Emotional Reactions and Coping Responses of Employees to a Cyber-Attack: A Case Study’, International Journal of Information Management, 58 (2021), 102298

Suryono, Ryan Randy, Indra Budi, and Betty Purwandari, ‘Detection of Fintech P2P Lending Issues in Indonesia’, Heliyon, 7.4 (2021), e06782

Tan, Sen, Peilin Xie, Josep M. Guerrero, Juan C. Vasquez, Yunlu Li, and Xifeng Guo, ‘Attack Detection Design for Dc Microgrid Using Eigenvalue Assignment Approach’, Energy Reports, 7 (2021), 469–76

Tauda, Gunawan A., Andy Omara, and Gioia Arnone, ‘Cryptocurrency: Highlighting the Approach, Regulations, and Protection in Indonesia and European Union’, BESTUUR, 11.1 (August) (2023), 1

Tian, Shu, Bo Zhao, and Resi Ong Olivares, ‘Cybersecurity Risks and Central Banks’ Sentiment on Central Bank Digital Currency: Evidence from Global Cyberattacks’, Finance Research Letters, 53 (2023), 103609

Uchendu, Betsy, Jason R.C. Nurse, Maria Bada, and Steven Furnell, ‘Developing a Cyber Security Culture: Current Practices and Future Needs’, Computers & Security, 109 (2021), 102387

Wardana, Dodi Jaya, Sukardi Sukardi, and Radian Salman, ‘Public Participation in the Law-Making Process in Indonesia’, Jurnal Media Hukum, 30.1 (2023), 66–77

Wei, Xingxing, ‘A Critical Evaluation of China’s Legal Responses to Cyberterrorism’, Computer Law & Security Review, 47 (2022), 105768

Yaacoub, Jean-Paul, Hassan Noura, Ola Salman, and Ali Chehab, ‘Security Analysis of Drones Systems: Attacks, Limitations, and Recommendations’, Internet of Things, 11 (2020), 100218




Citation Check