SECURING DEMOCRACY IN CYBERSPACE: VOTER DATA LEAKS IN INDONESIA'S 2024 ELECTION

I Putu Hadi Pradnyana, Rhesa Anggara Utama, Ni Wayan Ditha Sasmita

Abstract


This research examines the impact of voter data leaks on the essence of democracy, focusing on participation, accountability, and transparency. Using a descriptive qualitative method and secondary data sources, this research analyzes voter data breach incidents in Indonesia’s 2024 general election as case studies. The findings reveal that voter data breaches threaten public participation by reducing voters' sense of security and trust. Additionally, government accountability is undermined due to the failure to protect citizens' personal data, diminishing legitimacy and public trust. The transparency of the electoral process is also negatively affected, hindering the necessary verification and validation for fair and trustworthy election outcomes. The study concludes that proactive measures from the government are essential to enhance cybersecurity, including the development of stringent regulations, investment in advanced security technologies, and increased public awareness. These steps are crucial to protecting voter data, maintaining the integrity of democracy, and ensuring that every vote is counted honestly and transparently. Therefore, the security of voter data is key to preserving public trust and the essence of democracy in the digital age.

Keywords


data leaks; 2024 Indonesian election; cyber security; cyberspace; democracy.

Full Text:

PDF

References


Ahuja, V., & Shakeel, M. (2017). Twitter Presence of Jet Airways-Deriving Customer Insights Using Netnography and Wordclouds. Procedia Computer Science, 122, 17–24. https://doi.org/10.1016/j.procs.2017.11.336

Bawaslu. (2023). Tegaskan Dugaan Kebocoran Data Pemilih Bukan Dari Bawaslu, Bagja Minta KPU Segera Respon Sumber Data. https://www.bawaslu.go.id/id/berita/tegaskan-dugaan-kebocoran-data-pemilih-bukan-dari-bawaslu-bagja-minta-kpu-segera-respon

BBC Indonesia. (2023). Ratusan juta data pemilih dari situs KPU diduga diretas, apa akibatnya?. https://www.bbc.com/indonesia/articles/cgxpk9k3ye5o

Bowler Jr, G. M. (2010). Netnography: A method specifically designed to study cultures and communities online. The Qualitative Report, 15(5), 1270.

Brennen, J. and M. Perault (2021). How to increase transparency for political ads on social media, Brookings, https://www.brookings.edu/articles/how-to-increase-transparency-for-political-ads-on-social-media/.

Browning, Amy I. (2023). A Qualitative Analysis of the Relationship Between Cyberthreats and Democratic Backsliding. Cybersecurity Undergraduate Research. 7. https://digitalcommons.odu.edu/covacci-undergraduateresearch/2023spring/projects/7Bueermann, Gretchen & Dobrydowski, Daniel. (2023). From deepfakes to social engineering, here's what to know about elections, cybersecurity and AI. https://www.weforum.org/agenda/2023/11/elections-cybersecurity-ai-deep-fakes-social-engineering/

BSSN. (2021). Laporan tahunan ancaman siber di Indonesia 2020. National Cyber and Crypto Agency.

BSSN. (2023). Cybersecurity incidents in Indonesia: 2023 report. National Cyber and Crypto Agency.

CNBC Indonesia. (2023). 204 Juta Data Pemilih KPU Dibobol, Ancam Integritas Pemilu?. https://www.cnbcindonesia.com/tech/20231201110304-39-493711/204-juta-data-pemilih-kpu-dibobol-ancam-integritas-pemilu

CNN Indonesia. (2022). 1,3 Miliar Data SIM Card Diduga Bocor di Forum Gelap, Kominfo Bantah. https://www.cnnindonesia.com/teknologi/20220901122745-192-841874/13-miliar-data-sim-card-diduga-bocor-di-forum-gelap-kominfo-bantah.

Dahl, Robert A.. (1972). Polyarchy Participation and Opposition. London: Yale University Press.

DPR RI. (2023). 204 Juta DPT Pemilu Bocor, Sukamta Ingatkan KPU Tindaklanjuti Secara Serius. https://www.dpr.go.id/berita/detail/id/47962/t/204%20Juta%20DPT%20Pemilu%20Bocor,%20Sukamta%20Ingatkan%20KPU%20Tindaklanjuti%20Secara%20Serius

Fidler, David P., "The U.S. Election Hacks, Cybersecurity, and International Law" (2017). Articles by Maurer Faculty. 2607. http://www.repository.law.indiana.edu/facpub/2607

Goldman, E. (2022). The Constitutionality of Mandating Editorial Transparency. Hastings Law JournalHa. Vol. 75/5, https://repository.uclawsf.edu/cgi/viewcontent.cgi?article=3985&context=hastings_law_journal.Judge, Elizabeth F. and Pal, Michael. (2021). Voter Privacy and Big-Data Elections. Osgoode Hall Law Journal. 58(1). 1-55. https://digitalcommons.osgoode.yorku.ca/ohlj/vol58/iss1/1

Jakarta Post. (2021). Concerns raised at slow pace of data breach probe. https://www.thejakartapost.com/paper/2021/05/27/concerns-raised-at-slow-pace-of-data-breach-probe.html

Kanakia, Harshil, Shenoy, Giridhar & Shah, Jimit. (2019). Cambridge analytica a case study. Indian Journal of Science and Technology. Vol 12(29), DOI: 10.17485/ijst/2019/v12i29/146977, A

Kaspersky. (2023). Kaspersky experts report more than two critical cyber incidents per day in 2023. https://www.kaspersky.com/about/press-releases/kaspersky-experts-report-more-than-two-critical-cyber-incidents-per-day-in-2023

Kominfo. (2022). RUU PDP Jadi Dasar Pelindungan dan Keamanan Data Pribadi Warga. https://www.kominfo.go.id/content/detail/34654/ruu-pdp-jadi-dasar-pelindungan-dan-keamanan-data-pribadi-warga/0/berita_satker

Kompas. (2021). Kebocoran Data, Aplikasi PeduliLindungi Perlu Diaudit dan Perbaikan. https://www.kompas.com/tren/read/2021/09/05/163000865/kebocoran-data-aplikasi-pedulilindungi-perlu-diaudit-dan-perbaikan?page=all

Kompas. (2023). Penjelasan KPU Soal Dugaan Kebocoran Data Pemilih Ditunggu Publik. https://www.kompas.id/baca/polhuk/2023/12/03/penjelasan-kpu-soal-dugaan-kebocoran-data-pemilih-ditunggu-publik

Kozinets, R. V. (2015). Netnography. The International Encyclopedia of Digital Communication and Society. 1–8. https://doi.org/10.1002/9781118767771

KPU. (2023). Siaran Pers terkait Dugaan Kebocoran Data KPU. https://www.kpu.go.id/berita/baca/12118/siaran-pers-terkait-informasi-dugaan-kebocoran-data-milik-kpu

Krippendorff, K. (2023). Content Analysis: An Introduction to Its Methodology. Sage: Thousand Oaks

Kwak, Jin-ah & Cho, Sung. (2018). Analyzing Public Opinion with Social Media Data during Election Periods: A Selective Literature Review. Asian Journal for Public Opinion Research. 5. 285-301. 10.15206/ajpor.2018.5.4.285

Lessig, L. (1999). The Law of the Horse: What Cyberlaw Might Teach. Harvard Law Review. 113(2), 501–549. https://doi.org/10.2307/1342331

Manheim, Karl M. and Kaplan, Lyric. (2019). Artificial Intelligence: Risks to Privacy and Democracy (October 25, 2018). 21 Yale Journal of Law and Technology 106. https://ssrn.com/abstract=3273016

Moleong, Lexy J. (2012). Metode Penelitian Kualitatif. Bandung: PT Remaja Rosdakarya.

Morozov, Evgeny. (2013). To save everything, click here: the folly of technological solutionism. New York: Public Affairs

National Cyber Security Centre. (2016) Common Cyber Attacks: Reducing the Impact. London: GCHQ

Nye, Joseph S. (2021). Soft power: the evolution of a concept. Journal of Political Power. 14(1). 196-208. DOI: 10.1080/2158379X.2021.1879572

Perludem. (2023). Perludem Sayangkan Kebocoran DPT di KPU. https://perludem.org/2023/12/02/perludem-sayangkan-kebocoran-dpt-di-kpu/

Reuters. (2024). Cyber attack compromised Indonesia data centre, ransom sought. https://www.reuters.com/technology/cybersecurity/cyber-attack-compromised-indonesia-data-centre-ransom-sought-reports-antara-2024-06-24/

Rizal, Muhamad & Yani,Yanyan. (2016). Cybersecurity Policy and Its Implementation in Indonesia. Journal of ASEAN Studies. 4(1). 61-78. https://media.neliti.com/media/publications/70606-EN-cybersecurity-policy-and-its-implementat.pdf

Sakti, Rangga Eka & Nainggolan, Bestian. (2023). Understanding the Role of Social Media Toward Satisfaction of Government in Indonesia. JURNAL KOMUNIKASI INDONESIA. 12(1). DOI: 10.7454/jkmi.v12i1.1185

Schia, Niels Nagelhus & Gjesvik, Lars. (2020). Hacking democracy: managing influence campaigns and disinformation in the digital age. Journal of Cyber Policy. 5(3). 413-428. DOI: 10.1080/23738871.2020.1820060

Schneier, Bruce. (2015). Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World. W. W. Norton & Company: New York

Sugiyono. (2011). Metode Penelitian Kuantitatif, Kualitatif Dan R&D. Bandung: Alfabeta.

Suhaimin, Mohd Suhairi Md, et al. (2023). Social media sentiment analysis and opinion mining in public security: Taxonomy, trend analysis, issues and future directions. Journal of King Saud University - Computer and Information Sciences. 35(9). https://doi.org/10.1016/j.jksuci.2023.101776.

Stedmon, Nicholas. (2020). The Impact of Cyber Security Threats on the 2020 US Elections. 10.48550/arXiv.2012.08968.

Tempo. (2022). Cybersecurity Expert Confirms Validity of 105 Mln Leaked Indonesians Data. https://en.tempo.co/read/1631831/cybersecurity-expert-confirms-validity-of-105-mln-leaked-indonesians-data

Zhang, Xichen & Yadollahi, Mohammad Mehdi & Dadkhah, Sajjad & Isah, Haruna & Đức Phong, Lê & Ghorbani, Ali. (2022). Data breach: analysis, countermeasures and challenges. International Journal of Information and Computer Security. 19. 402. 10.1504/IJICS.2022.127169.




DOI: https://doi.org/10.33373/jtp.v8i2.6541

Refbacks

  • There are currently no refbacks.


 

Flag Counter

Web Analytics

View JTP Statistic

 

Office:

Department of Government Studies, Faculty of Social and Political Sciences, Universitas Riau Kepulauan

unit E

Jl. Pahlawan No. 99, Bukit Tempayan, Batu Aji, Kota Batam

Contact: (0778) 39275

e-mail: jurnaltriaspolitika2017@gmail.com 

________________________________________________________________________________________________________________________________

 

In Cooperation with:                     Powered By: 

   

 

 

Lisensi Creative Commons

Jurnal Trias Politika (JTP) is licensed under a Lisensi Creative Commons Atribusi 4.0 Internasional.