Legal and Technological Approaches to Cybercrime Risk Mitigation: A Case Study of Cyber Law and Cybersecurity Implementation in Southeast Asia
DOI:
https://doi.org/10.33830/osc.v3i1.7023Keywords:
Legal and Technological Approaches, Cybercrime Risk Mitigation, Cyber Law, Cybersecurity, Southeast AsiaAbstract
This study examines the integration of legal and technological approaches in mitigating the risks of cybercrime, with a focus on the implementation of cyber law regulations and cybersecurity technology in the Southeast Asian region. The study uses normative research methods and case studies, examining various legal policies, regulations, and technological security practices in ASEAN countries. The research findings indicate that the increasing threat of cybercrime necessitates the harmonization of cross-border legal regulations and the implementation of adaptive and collaborative cybersecurity technologies. However, there are significant challenges related to the imbalance in technological capacity and law enforcement among countries, as well as limitations in regional coordination. The study emphasizes the importance of synergy between a strong legal framework, enhanced technical capacity, and inter-state cooperation to create a secure and resilient digital ecosystem against cybercrime threats. Strategic recommendations are provided to strengthen policy harmonization, develop cybersecurity infrastructure, and enhance awareness and capacity among law enforcement agencies in Southeast Asia.References
[1] G. Sarkar and S. K. Shukla, “Behavioral analysis of cybercrime: Paving the way for effective
policing strategies,” J. Econ. Criminol., vol. 2, no. September, p. 100034, 2023, doi:
10.1016/j.jeconc.2023.100034.
[2] S. M. Sulubara, H. Fauzi, B. Muslim, M. F. Ferdiansyah, and M. Musmulyadi, “Judi Online Sebagai
Cybercrime Serta Tantangan Penegakan Hukum Pidana di Era Digital : Antara Regulasi ,
Pembuktian , dan Ancaman Cybercrime,” J. Ris. Rumpun Ilmu Sos. Polit. dan Hum., vol. 4, no. 2,
pp. 539–552, 2025, doi: https://doi.org/10.55606/jurrish.v4i2.4990.
[3] S. M. Sulubara, V. Tasril, and Nurkhalisah, Perlindungan Hukum Tindak Pidana Cybercrime
Dalam Cyberlaw Di Indonesia: Perkembangan Tekhnologi Dan Tantangan Hukum Dalam
Mewujudkan Cybersecurity, Edisi Pert. Kartasura, Sukoharjo: Tahta Media, 2025.
[4] S. M. Sulubara and V. Tasril, “Legal Protection Of Cybercrime Crimes From Ransomware Attacks
And Evaluation Of The Cyber Security And Resilience Bill 2025 In Indonesia ’ S Defense,” LEGA
LATA J. Ilmu Huk., vol. 10, no. December, pp. 287–297, 2025, doi: 10.30596/dll.v10i2.25786.
[5] F. R. Seri Mughni Sulubara, Hidayati Purnama Lubis, Nanci Yosepin Simbolon, Teori Hukum
Perdata (Studi Kasus: Transaksi E-Commerce Shopee Paylater, Edisi Pert. CV. Tahta Media
Group, 2024.
[6] A. A. Seri Mughni Sulubara, “Legalitas Fintech Peer To Peer Lending Pinjaman Online dalam
Aspek Hukum Konvensional,” MANDUB J. Polit. Sos. Huk. dan Hum., vol. 2, no. 2, pp. 177–187,
2024, doi: https://doi.org/10.59059/mandub.v2i2.1184.
[7] Seri Mughni Sulubara, Yury Ulandary, Riska Riska, and Desi Purnama Sari, “Gen Z Wajib Tau!
Edukasi dan Penguatan Pasal-Pasal UUD 1945 bagi Generasi Z (Pasca Milenal) bagi Siswa-Siswi
SMA Negeri 4 Takengon,” Karunia Jurnal Has. Pengabdi. Masy. Indones., vol. 2, no. 4, pp. 96–
109, 2023, doi: 10.58192/karunia.v2i4.1552.
[8] I. Seri Mughni Sulubara, “Regulasi dan Lisensi Mengenai Perlindungan Hukum Investor di
Platform Fintech Peer-To-Peer Lending dalam Hukum Konvensional,” J. Hukum, Polit. dan Ilmu
Sos., vol. 3, no. 4, pp. 431–442, 2024, doi: https://doi.org/10.55606/jhpis.v3i4.4499.
[9] H. Azrica and S. M. Sulubara, “Legalitas Transaksi E Commerce Dalam Platfortm Shopee Ditinjau
Dalam Kitab Undang-Undang Hukum Perdata (Burgerlijk Wetboek), Undang-Undang Nomor: 8
Tahun 1999 Tentang Perlindungan Konsumen Dan Persfektif Fiqih Muamalah,” Hakim J. Ilmu
Huk. dan Sos., vol. 1, no. 3, pp. 1–23, 2023, doi: https://doi.org/10.51903/hakim.v1i3.1305.
[10] S. M. Sulubara, H. P. Lubis, and N. Y. Simbolon, “Legal Review of Electronic Commerce-Based
Buying and Selling on the Shopee Platform Against Consumers Using Shopee PayLater,”
Proceeding IROFONIC 2024, vol. Proceeding, no. 02, pp. 392–402, 2024.
[11] S. M. Sulubara, H. P. Lubis, and N. Y. Simbolon, “Legality Of Shopee Paylater Payments For
Shopee Platform E-Commerce Transactions In Conventional Law,” Deleg. J. Ilmu Huk., vol. 9, no.
2, pp. 247–256, 2024, doi: 10.30596/dll.v9i2.20414.
[12] S. M. Sulubara, “Menyajikan Berbagai Insiden Cybercrime yang Terjadi di Indonesia , Termasuk
Pencurian Data dan Peretasan Situs Web Pemerintah,” Konsensus J. Ilmu Polit. dan Komun., vol.
1, no. 6, pp. 199–206, 2024, doi: https://doi.org/10.62383/konsensus.v1i6.692.
[13] Seri Mughni Sulubara, “Perlindungan Data Pribadi dalam Kasus Ransomware : Apa Kata
Hukum ?,” Eksekusi J. Ilmu Huk. dan Adm. Negara, vol. 2, no. November, pp. 426–434, 2024, doi:
https://doi.org/10.55606/eksekusi.v2i4.1823.
[14] Y. Li and Q. Liu, “A comprehensive review study of cyber-attacks and cyber security; Emerging
trends and recent developments,” Energy Reports, vol. 7, pp. 8176–8186, 2021, doi:
10.1016/j.egyr.2021.08.126.
[15] M. Zainuddin and A. D. Karina, “Penggunaan Metode Yuridis Normatif dalam Membuktikan
Kebenaran pada Penelitian Hukum,” Smart Law J., vol. 2, no. 2, pp. 114–123, 2023, [Online].
Available: https://journal.unkaha.com/index.php/slj/article/view/26
[16] K. Chimmanee and S. Jantavongso, “Digital forensic of Maze ransomware: A case of electricity
distributor enterprise in ASEAN,” Expert Syst. Appl., vol. 249, no. PB, p. 123652, 2024, doi:
10.1016/j.eswa.2024.123652.
[17] B. Kaulu, G. Kaulu, and P. Chilongo, “Factors influencing customers’ intention to adopt e-banking:
a TAM and cybercrime perspective using structural equation modelling,” J. Money Bus., vol. 4, no.
1, pp. 38–53, 2024, doi: 10.1108/jmb-01-2024-0007.
[18] G. Onwuadiamu, “Cybercrime in criminology; A systematic review of criminological theories,
methods, and concepts,” J. Econ. Criminol., vol. 8, no. February, p. 100136, 2025, doi:
10.1016/j.jeconc.2025.100136.
[19] N. Khadam et al., “How to punish cyber criminals: A study to investigate the target and
consequence based punishments for malware attacks in UK, USA, China, Ethiopia & Pakistan,”
Heliyon, vol. 9, no. 12, 2023, doi: 10.1016/j.heliyon.2023.e22823.
[20] D. Wright and R. Kumar, “Assessing the socio-economic impacts of cybercrime,” Soc. Impacts,
vol. 1, no. 1–2, p. 100013, 2023, doi: 10.1016/j.socimp.2023.100013.
[21] N. Khadam et al., “How to punish cyber criminals: A study to investigate the target and
consequence based punishments for malware attacks in UK, USA, China, Ethiopia & Pakistan,”
Heliyon, vol. 9, no. 12, p. e22823, 2023, doi: 10.1016/j.heliyon.2023.e22823.
[22] R. Nugraha, “Perspektif Hukum Indonesia (Cyberlaw) Penanganan Kasus Cyber di Indonesia,” J.
Ilm. Huk. Dirgant., vol. 11, no. 2, pp. 44–56, 2021.
[23] S. N. Fitri, “Politik Hukum Pembentukan Cyber Law Undang-Undang Informasi dan Transaksi
Elektronik di Indonesia,” J. Justisia J. Ilmu Hukum, Perundang-undangan dan Pranata Sos., vol.
7, no. 1, p. 104, 2022, doi: 10.22373/justisia.v7i1.12719.
[24] Murthada Murthada and Seri Mughni Sulubara, “Implementasi Hak Asasi Manusia di Indonesia
berdasarkan Undang-Undang Dasar 1945,” Dewantara J. Pendidik. Sos. Hum., vol. 1, no. 4, pp.
111–121, 2022, doi: 10.30640/dewantara.v1i4.426.
[25] B. Handoyo, H. MZ, I. Rahma, and Asy’ari, “Tinjaun Yuridis Penegakkan Hukum Kejahatan Cyber
Crime Studi Implementasi Undang-Undang Nomor 11 Tahun 2008,” MAQASIDI J. Syariah dan
Huk., vol. 4, no. 1, pp. 40–55, 2024, doi: 10.47498/maqasidi.v4i1.2966.
[26] M. S. Akub, “Pengaturan Tindak Pidana Mayantara (Cyber Crime) Dalam Sistem Hukum
Indonesia,” Al-Ishlah J. Ilm. Huk., vol. 21, no. 2, pp. 85–93, 2020, doi: 10.33096/aijih.v21i2.19.
[27] R. S. B. Pansariadi and N. Soekorini, “Tindak Pidana Cyber Crime dan Penegakan Hukumnya,”
Binamulia Huk., vol. 12, no. 2, pp. 287–298, 2023, doi: 10.37893/jbh.v12i2.605.
[28] C. Wei-Jung, “Cyberstalking and law enforcement,” Procedia Comput. Sci., vol. 176, pp. 1188–
1194, 2020, doi: 10.1016/j.procs.2020.09.115.
[29] Z. Wang, H. Zhu, P. Liu, and L. Sun, “Social engineering in cybersecurity: a domain ontology and
knowledge graph application examples,” Cybersecurity, vol. 4, no. 1, 2021, doi: 10.1186/s42400-
021-00094-6.
[30] M. A. Ferrag et al., “Generative AI in cybersecurity: A comprehensive review of LLM applications
and vulnerabilities,” Internet Things Cyber-Physical Syst., vol. 5, no. October 2024, pp. 1–46, 2025,
doi: 10.1016/j.iotcps.2025.01.001.
[31] K. Achuthan, S. Khobragade, and R. Kowalski, “Cybercrime through the public lens: a longitudinal
analysis,” Humanit. Soc. Sci. Commun., pp. 1–16, 2025, doi: 10.1057/s41599-025-04459-x.
[32] D. H. Elsayed, T. H. Ismail, and E. A. Ahmed, “The impact of cybersecurity disclosure on banks ’
performance : the moderating role of corporate governance in the MENA region,” Futur. Bus. J.,
vol. 10, no. 1, pp. 1–15, 2024, doi: 10.1186/s43093-024-00402-9.
[33] K. Pipyros and S. Liasidou, “A new cybersecurity risk assessment framework for the hospitality
industry: techniques and methods for enhanced data protection and threat mitigation,” Worldw.
Hosp. Tour. Themes, 2025, doi: 10.1108/WHATT-12-2024-0296.
[34] C. Hu, T. Wu, C. Liu, and C. Chang, “Joint contrastive learning and belief rule base for named
entity recognition in cybersecurity,” Cybersecurity, vol. 7, no. 1, 2024, doi: 10.1186/s42400-024-
00206-y.
[35] M. A. Hossain and M. S. Islam, “Enhanced detection of obfuscated malware in memory dumps: a
machine learning approach for advanced cybersecurity,” Cybersecurity, vol. 7, no. 1, 2024, doi:
10.1186/s42400-024-00205-z.
[36] A. Tomas, D. Vicente, L. D. Marcos, and O. A. Tevar, “Factors influencing employee compliance
with information security policies : a systematic literature review of behavioral and technological
aspects in cybersecurity,” Futur. Bus. J., 2025, doi: 10.1186/s43093-025-00452-7.
[37] M. H. Shah, P. Jones, and J. Choudrie, “Cybercrimes prevention: promising organisational
practices,” Inf. Technol. People, vol. 32, no. 5, pp. 1125–1129, 2019, doi: 10.1108/ITP-10-2019-
564.
[38] A. Alyami, D. Sammon, K. Neville, and C. Mahony, “Critical success factors for Security
Education, Training and Awareness (SETA) programme effectiveness: an empirical comparison of
practitioner perspectives,” Inf. Comput. Secur., vol. 32, no. 1, pp. 53–73, 2024, doi: 10.1108/ICS08-2022-0133.
[39] N. N. Cele and S. Kwenda, “Do cybersecurity threats and risks have an impact on the adoption of
digital banking? A systematic literature review,” J. Financ. Crime, vol. 32, no. 1, pp. 31–48, 2024,
doi: 10.1108/JFC-10-2023-0263.
[40] B. S. von Skarczinski, A. Dreißigacker, and F. Teuteberg, “Toward enhancing the information base
on costs of cyber incidents: implications from literature and a large-scale survey conducted in
Germany,” Organ. Cybersecurity J. Pract. Process People, vol. 2, no. 2, pp. 79–112, 2022, doi:
10.1108/ocj-08-2021-0020.
[41] R. van Wegberg, J. J. Oerlemans, and O. van Deventer, “Bitcoin money laundering: mixed results?:
An explorative study on money laundering of cybercrime proceeds using bitcoin,” J. Financ.
Crime, vol. 25, no. 2, pp. 419–435, 2018, doi: 10.1108/JFC-11-2016-0067.
Downloads
Published
Conference Proceedings Volume
Section
License
Copyright (c) 2025 Seri Mughni Sulubara, Virdyra Tasril, Nurkhalisah

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

