Legal and Technological Approaches to Cybercrime Risk Mitigation: A Case Study of Cyber Law and Cybersecurity Implementation in Southeast Asia

Authors

  • Seri Mughni Sulubara Muhammadiyah Mahakarya Aceh University
  • Virdyra Tasril Medan State Polytechnic
  • Nurkhalisah Muhammadiyah Mahakarya Aceh University

DOI:

https://doi.org/10.33830/osc.v3i1.7023

Keywords:

Legal and Technological Approaches, Cybercrime Risk Mitigation, Cyber Law, Cybersecurity, Southeast Asia

Abstract

This study examines the integration of legal and technological approaches in mitigating the risks of cybercrime, with a focus on the implementation of cyber law regulations and cybersecurity technology in the Southeast Asian region. The study uses normative research methods and case studies, examining various legal policies, regulations, and technological security practices in ASEAN countries. The research findings indicate that the increasing threat of cybercrime necessitates the harmonization of cross-border legal regulations and the implementation of adaptive and collaborative cybersecurity technologies. However, there are significant challenges related to the imbalance in technological capacity and law enforcement among countries, as well as limitations in regional coordination. The study emphasizes the importance of synergy between a strong legal framework, enhanced technical capacity, and inter-state cooperation to create a secure and resilient digital ecosystem against cybercrime threats. Strategic recommendations are provided to strengthen policy harmonization, develop cybersecurity infrastructure, and enhance awareness and capacity among law enforcement agencies in Southeast Asia.

References

[1] G. Sarkar and S. K. Shukla, “Behavioral analysis of cybercrime: Paving the way for effective

policing strategies,” J. Econ. Criminol., vol. 2, no. September, p. 100034, 2023, doi:

10.1016/j.jeconc.2023.100034.

[2] S. M. Sulubara, H. Fauzi, B. Muslim, M. F. Ferdiansyah, and M. Musmulyadi, “Judi Online Sebagai

Cybercrime Serta Tantangan Penegakan Hukum Pidana di Era Digital : Antara Regulasi ,

Pembuktian , dan Ancaman Cybercrime,” J. Ris. Rumpun Ilmu Sos. Polit. dan Hum., vol. 4, no. 2,

pp. 539–552, 2025, doi: https://doi.org/10.55606/jurrish.v4i2.4990.

[3] S. M. Sulubara, V. Tasril, and Nurkhalisah, Perlindungan Hukum Tindak Pidana Cybercrime

Dalam Cyberlaw Di Indonesia: Perkembangan Tekhnologi Dan Tantangan Hukum Dalam

Mewujudkan Cybersecurity, Edisi Pert. Kartasura, Sukoharjo: Tahta Media, 2025.

[4] S. M. Sulubara and V. Tasril, “Legal Protection Of Cybercrime Crimes From Ransomware Attacks

And Evaluation Of The Cyber Security And Resilience Bill 2025 In Indonesia ’ S Defense,” LEGA

LATA J. Ilmu Huk., vol. 10, no. December, pp. 287–297, 2025, doi: 10.30596/dll.v10i2.25786.

[5] F. R. Seri Mughni Sulubara, Hidayati Purnama Lubis, Nanci Yosepin Simbolon, Teori Hukum

Perdata (Studi Kasus: Transaksi E-Commerce Shopee Paylater, Edisi Pert. CV. Tahta Media

Group, 2024.

[6] A. A. Seri Mughni Sulubara, “Legalitas Fintech Peer To Peer Lending Pinjaman Online dalam

Aspek Hukum Konvensional,” MANDUB J. Polit. Sos. Huk. dan Hum., vol. 2, no. 2, pp. 177–187,

2024, doi: https://doi.org/10.59059/mandub.v2i2.1184.

[7] Seri Mughni Sulubara, Yury Ulandary, Riska Riska, and Desi Purnama Sari, “Gen Z Wajib Tau!

Edukasi dan Penguatan Pasal-Pasal UUD 1945 bagi Generasi Z (Pasca Milenal) bagi Siswa-Siswi

SMA Negeri 4 Takengon,” Karunia Jurnal Has. Pengabdi. Masy. Indones., vol. 2, no. 4, pp. 96–

109, 2023, doi: 10.58192/karunia.v2i4.1552.

[8] I. Seri Mughni Sulubara, “Regulasi dan Lisensi Mengenai Perlindungan Hukum Investor di

Platform Fintech Peer-To-Peer Lending dalam Hukum Konvensional,” J. Hukum, Polit. dan Ilmu

Sos., vol. 3, no. 4, pp. 431–442, 2024, doi: https://doi.org/10.55606/jhpis.v3i4.4499.

[9] H. Azrica and S. M. Sulubara, “Legalitas Transaksi E Commerce Dalam Platfortm Shopee Ditinjau

Dalam Kitab Undang-Undang Hukum Perdata (Burgerlijk Wetboek), Undang-Undang Nomor: 8

Tahun 1999 Tentang Perlindungan Konsumen Dan Persfektif Fiqih Muamalah,” Hakim J. Ilmu

Huk. dan Sos., vol. 1, no. 3, pp. 1–23, 2023, doi: https://doi.org/10.51903/hakim.v1i3.1305.

[10] S. M. Sulubara, H. P. Lubis, and N. Y. Simbolon, “Legal Review of Electronic Commerce-Based

Buying and Selling on the Shopee Platform Against Consumers Using Shopee PayLater,”

Proceeding IROFONIC 2024, vol. Proceeding, no. 02, pp. 392–402, 2024.

[11] S. M. Sulubara, H. P. Lubis, and N. Y. Simbolon, “Legality Of Shopee Paylater Payments For

Shopee Platform E-Commerce Transactions In Conventional Law,” Deleg. J. Ilmu Huk., vol. 9, no.

2, pp. 247–256, 2024, doi: 10.30596/dll.v9i2.20414.

[12] S. M. Sulubara, “Menyajikan Berbagai Insiden Cybercrime yang Terjadi di Indonesia , Termasuk

Pencurian Data dan Peretasan Situs Web Pemerintah,” Konsensus J. Ilmu Polit. dan Komun., vol.

1, no. 6, pp. 199–206, 2024, doi: https://doi.org/10.62383/konsensus.v1i6.692.

[13] Seri Mughni Sulubara, “Perlindungan Data Pribadi dalam Kasus Ransomware : Apa Kata

Hukum ?,” Eksekusi J. Ilmu Huk. dan Adm. Negara, vol. 2, no. November, pp. 426–434, 2024, doi:

https://doi.org/10.55606/eksekusi.v2i4.1823.

[14] Y. Li and Q. Liu, “A comprehensive review study of cyber-attacks and cyber security; Emerging

trends and recent developments,” Energy Reports, vol. 7, pp. 8176–8186, 2021, doi:

10.1016/j.egyr.2021.08.126.

[15] M. Zainuddin and A. D. Karina, “Penggunaan Metode Yuridis Normatif dalam Membuktikan

Kebenaran pada Penelitian Hukum,” Smart Law J., vol. 2, no. 2, pp. 114–123, 2023, [Online].

Available: https://journal.unkaha.com/index.php/slj/article/view/26

[16] K. Chimmanee and S. Jantavongso, “Digital forensic of Maze ransomware: A case of electricity

distributor enterprise in ASEAN,” Expert Syst. Appl., vol. 249, no. PB, p. 123652, 2024, doi:

10.1016/j.eswa.2024.123652.

[17] B. Kaulu, G. Kaulu, and P. Chilongo, “Factors influencing customers’ intention to adopt e-banking:

a TAM and cybercrime perspective using structural equation modelling,” J. Money Bus., vol. 4, no.

1, pp. 38–53, 2024, doi: 10.1108/jmb-01-2024-0007.

[18] G. Onwuadiamu, “Cybercrime in criminology; A systematic review of criminological theories,

methods, and concepts,” J. Econ. Criminol., vol. 8, no. February, p. 100136, 2025, doi:

10.1016/j.jeconc.2025.100136.

[19] N. Khadam et al., “How to punish cyber criminals: A study to investigate the target and

consequence based punishments for malware attacks in UK, USA, China, Ethiopia & Pakistan,”

Heliyon, vol. 9, no. 12, 2023, doi: 10.1016/j.heliyon.2023.e22823.

[20] D. Wright and R. Kumar, “Assessing the socio-economic impacts of cybercrime,” Soc. Impacts,

vol. 1, no. 1–2, p. 100013, 2023, doi: 10.1016/j.socimp.2023.100013.

[21] N. Khadam et al., “How to punish cyber criminals: A study to investigate the target and

consequence based punishments for malware attacks in UK, USA, China, Ethiopia & Pakistan,”

Heliyon, vol. 9, no. 12, p. e22823, 2023, doi: 10.1016/j.heliyon.2023.e22823.

[22] R. Nugraha, “Perspektif Hukum Indonesia (Cyberlaw) Penanganan Kasus Cyber di Indonesia,” J.

Ilm. Huk. Dirgant., vol. 11, no. 2, pp. 44–56, 2021.

[23] S. N. Fitri, “Politik Hukum Pembentukan Cyber Law Undang-Undang Informasi dan Transaksi

Elektronik di Indonesia,” J. Justisia J. Ilmu Hukum, Perundang-undangan dan Pranata Sos., vol.

7, no. 1, p. 104, 2022, doi: 10.22373/justisia.v7i1.12719.

[24] Murthada Murthada and Seri Mughni Sulubara, “Implementasi Hak Asasi Manusia di Indonesia

berdasarkan Undang-Undang Dasar 1945,” Dewantara J. Pendidik. Sos. Hum., vol. 1, no. 4, pp.

111–121, 2022, doi: 10.30640/dewantara.v1i4.426.

[25] B. Handoyo, H. MZ, I. Rahma, and Asy’ari, “Tinjaun Yuridis Penegakkan Hukum Kejahatan Cyber

Crime Studi Implementasi Undang-Undang Nomor 11 Tahun 2008,” MAQASIDI J. Syariah dan

Huk., vol. 4, no. 1, pp. 40–55, 2024, doi: 10.47498/maqasidi.v4i1.2966.

[26] M. S. Akub, “Pengaturan Tindak Pidana Mayantara (Cyber Crime) Dalam Sistem Hukum

Indonesia,” Al-Ishlah J. Ilm. Huk., vol. 21, no. 2, pp. 85–93, 2020, doi: 10.33096/aijih.v21i2.19.

[27] R. S. B. Pansariadi and N. Soekorini, “Tindak Pidana Cyber Crime dan Penegakan Hukumnya,”

Binamulia Huk., vol. 12, no. 2, pp. 287–298, 2023, doi: 10.37893/jbh.v12i2.605.

[28] C. Wei-Jung, “Cyberstalking and law enforcement,” Procedia Comput. Sci., vol. 176, pp. 1188–

1194, 2020, doi: 10.1016/j.procs.2020.09.115.

[29] Z. Wang, H. Zhu, P. Liu, and L. Sun, “Social engineering in cybersecurity: a domain ontology and

knowledge graph application examples,” Cybersecurity, vol. 4, no. 1, 2021, doi: 10.1186/s42400-

021-00094-6.

[30] M. A. Ferrag et al., “Generative AI in cybersecurity: A comprehensive review of LLM applications

and vulnerabilities,” Internet Things Cyber-Physical Syst., vol. 5, no. October 2024, pp. 1–46, 2025,

doi: 10.1016/j.iotcps.2025.01.001.

[31] K. Achuthan, S. Khobragade, and R. Kowalski, “Cybercrime through the public lens: a longitudinal

analysis,” Humanit. Soc. Sci. Commun., pp. 1–16, 2025, doi: 10.1057/s41599-025-04459-x.

[32] D. H. Elsayed, T. H. Ismail, and E. A. Ahmed, “The impact of cybersecurity disclosure on banks ’

performance : the moderating role of corporate governance in the MENA region,” Futur. Bus. J.,

vol. 10, no. 1, pp. 1–15, 2024, doi: 10.1186/s43093-024-00402-9.

[33] K. Pipyros and S. Liasidou, “A new cybersecurity risk assessment framework for the hospitality

industry: techniques and methods for enhanced data protection and threat mitigation,” Worldw.

Hosp. Tour. Themes, 2025, doi: 10.1108/WHATT-12-2024-0296.

[34] C. Hu, T. Wu, C. Liu, and C. Chang, “Joint contrastive learning and belief rule base for named

entity recognition in cybersecurity,” Cybersecurity, vol. 7, no. 1, 2024, doi: 10.1186/s42400-024-

00206-y.

[35] M. A. Hossain and M. S. Islam, “Enhanced detection of obfuscated malware in memory dumps: a

machine learning approach for advanced cybersecurity,” Cybersecurity, vol. 7, no. 1, 2024, doi:

10.1186/s42400-024-00205-z.

[36] A. Tomas, D. Vicente, L. D. Marcos, and O. A. Tevar, “Factors influencing employee compliance

with information security policies : a systematic literature review of behavioral and technological

aspects in cybersecurity,” Futur. Bus. J., 2025, doi: 10.1186/s43093-025-00452-7.

[37] M. H. Shah, P. Jones, and J. Choudrie, “Cybercrimes prevention: promising organisational

practices,” Inf. Technol. People, vol. 32, no. 5, pp. 1125–1129, 2019, doi: 10.1108/ITP-10-2019-

564.

[38] A. Alyami, D. Sammon, K. Neville, and C. Mahony, “Critical success factors for Security

Education, Training and Awareness (SETA) programme effectiveness: an empirical comparison of

practitioner perspectives,” Inf. Comput. Secur., vol. 32, no. 1, pp. 53–73, 2024, doi: 10.1108/ICS08-2022-0133.

[39] N. N. Cele and S. Kwenda, “Do cybersecurity threats and risks have an impact on the adoption of

digital banking? A systematic literature review,” J. Financ. Crime, vol. 32, no. 1, pp. 31–48, 2024,

doi: 10.1108/JFC-10-2023-0263.

[40] B. S. von Skarczinski, A. Dreißigacker, and F. Teuteberg, “Toward enhancing the information base

on costs of cyber incidents: implications from literature and a large-scale survey conducted in

Germany,” Organ. Cybersecurity J. Pract. Process People, vol. 2, no. 2, pp. 79–112, 2022, doi:

10.1108/ocj-08-2021-0020.

[41] R. van Wegberg, J. J. Oerlemans, and O. van Deventer, “Bitcoin money laundering: mixed results?:

An explorative study on money laundering of cybercrime proceeds using bitcoin,” J. Financ.

Crime, vol. 25, no. 2, pp. 419–435, 2018, doi: 10.1108/JFC-11-2016-0067.

Downloads

Published

27-12-2025