Adaptive Cyber Law Enforcement Strategies for Combating Digital Crime in Bone Regency

Gustika Sandra(1), Jumra Jumra(2),


(1) Universitas Andi Sudirman
(2) Universitas Andi Sudirman

Abstract


This study examines adaptive cyber law enforcement strategies to address digital crime in Bone Regency, a non-metropolitan area facing regulatory limitations, coordination challenges, and low digital literacy. A qualitative case study approach was employed through interviews with 15 stakeholders, including law enforcement officials, government representatives, legal practitioners, and academics, supplemented with observations and document analysis. The findings reveal four key issues: outdated regulations that do not cover emerging crimes such as deepfakes and encrypted fraud; weak inter-agency coordination caused by slow communication and the absence of standard procedures; limited technical capacity due to a shortage of digital forensic personnel and inadequate infrastructure; and low community awareness that increases vulnerability to cybercrime. Despite these obstacles, adaptive measures were identified, including collaboration with external institutions, local resource mobilization, and community-based education. The study recommends regulatory updates, capacity-building for law enforcement, standardized coordination mechanisms, and inclusive digital literacy programs. These strategies are essential to strengthen cyber law enforcement in non-metropolitan areas and inform policy at both local and national levels.

Keywords


Cyber Law Enforcement; Digital Crime; Inter-Agency Coordination; Technical Capacity; Digital Literacy

Full Text:

PDF

References


AllahRakha, N. (2024). Transformation of crimes (cybercrimes) in digital age. International Journal of Law and Policy, 2(2).

Anwary, I. (2022). The Role of Public Administration in combating cybercrime: An Analysis of the Legal Framework in Indonesia. International Journal of Cyber Criminology, 16(2), 216–227.

Babikian, J. (2023). Navigating legal frontiers: exploring emerging issues in cyber law. Revista Espanola de Documentacion Cientifica, 17(2), 95–109.

Banerjee, P., & Chau, P. Y. K. (2004). An evaluative framework for analysing e-government convergence capability in developing countries. Electronic Government, an International Journal, 1(1), 29–48.

Botelho, F. H. F. (2021). Accessibility to digital technology: Virtual barriers, real opportunities. Assistive Technology, 33(sup1), 27–34.

Deibert, R. J., & Rohozinski, R. (2010). Risking security: Policies and paradoxes of cyberspace security. International Political Sociology, 4(1), 15–32.

Dwiyanti, A. A. R., Syam, A., Irmawati, I., Mashuri, M., Andania, A., & Anugrawati, A. (2024). Village government strategy through digital education to increase information transparency and digitalization literacy in facing the challenge of the demographic bonus. TRansekonomika: Akuntansi, Bisnis dan Keuangan, 4(3), 335–342.

Erikha, A., & Saptomo, A. (2024). Dilemma of Legal Policy to Address Cybercrime in the Digital Era. Asian Journal of Social and Humanities, 3(3), 499–507.

Felix, A. O., Olabode, O. J., & Ayeni, J. K. (2023). The criminalization of the internet and cybercrime in general: A comprehensive study. Scientific and Practical Cyber Security Journal (SPCSJ), 7(3), 1–10.

Hidayat, M. N. F., Baharun, H., Aisyah, E. N., Zaini, A. W., Sanjani, M. A. F., & Hasanah, R. (2024). Bridging the Digital Divide: The Role of Public Relations in Enhancing Digital Inclusivity. 2024 10th International Conference on Education and Technology (ICET), 59–66.

Khan, H., & Moazzam, A. (2022). Interagency collaboration/coordination. Public Sector Reforms in Pakistan: Hierarchies, Markets and Networks, 153.

Marikyan, D., & Papagiannidis, S. (2023). Protection motivation theory: A review. TheoryHub Book: This Handbook Is Based on the Online Theory Resource: TheoryHub, 78–93.

Miles, M. B., Huberman, A. M., & Saldana, J. (2019). Qualitative data analysis: A methods sourcebook (fourth edit). SAGE Publications. https://us.sagepub.com/en-us/nam/qualitative-data-analysis/book246128

Mohammad Bani-Meqdad, M. A., Senyk, P., Udod, M., Pylypenko, T., & Sylkin, O. (2024). Cyber-Environment in the Human Rights System: Modern Challenges to Protect Intellectual Property Law and Ensure Sustainable Development of the Region. International Journal of Sustainable Development & Planning, 19(4).

Möller, D. P. F. (2023). Cybersecurity in digital transformation. In Guide to cybersecurity in digital transformation: Trends, methods, technologies, applications and best practices (pp. 1–70). Springer.

Mushtaq, S., & Shah, M. (2025). Threats to the Digital Ecosystem: Can Information Security Management Frameworks, Guided by Criminological Literature, Effectively Prevent Cybercrime and Protect Public Data? Computers, 14(6), 219.

Odendaal, N. (2003). Information and communication technology and local governance: Understanding the difference between cities in developed and emerging economies. Computers, Environment and Urban Systems, 27(6), 585–607.

Omweri, F. S. (2024). A systematic literature review of e-government implementation in developing countries: examining urban-rural disparities, institutional capacity, and socio-cultural factors in the context of local governance and progress towards SDG 16.6. International Journal of Research and Innovation in Social Science, 8(8), 1173–1199.

Peters, A., & Jordan, A. (2019). Countering the cyber enforcement gap: Strengthening global capacity on cybercrime. J. Nat’l Sec. L. & Pol’y, 10, 487.

Poe, L. (2021). Cybercrime in the age of digital transformation, rising nationalism and the demise of global governance. In Modern Police Leadership: Operational Effectiveness at Every Level (pp. 109–126). Springer.

Rahman, I., Muhtar, M. H., Mongdong, N. M., Setiawan, R., Setiawan, B., & Siburian, H. K. (2024). Harmonization of Digital laws and Adaptation Strategies in Indonesia focusing on E-Commerce and Digital transactions. Innovative: Journal Of Social Science Research, 4(1), 4314–4327.

Richards, N. U., & Eboibi, F. E. (2021). African governments and the influence of corruption on the proliferation of cybercrime in Africa: wherein lies the rule of law? International Review of Law, Computers & Technology, 35(2), 131–161.

Satoto, E., & Santiago, F. (2025). Reconstruction of Indonesia’s Cyber Law System for Adaptive and Integrated Digital Crime Prevention in the Era of Technological Disruption. Greenation International Journal of Law and Social Sciences, 3(2), 309–317.

Setiadi, W. (2019). Institutional restructuring to sustain regulatory reform in indonesia. Hasanuddin Law Review, 5(1), 120–131.

Shaik, N., Chandana, B. H., Chitralingappa, P., & Sasikala, C. (2025). Protecting in the Digital Age: A Comprehensive Examination of Cybersecurity and Legal Implications. Next?Generation Systems and Secure Computing, 105–135.

van de Hoven, J., Comandé, G., Ruggieri, S., Domingo-Ferrer, J., Musiani, F., Giannotti, F., Pratesi, F., & Stauch, M. (2021). Towards a digital ecosystem of trust: Ethical, legal and societal implications. Opinio Juris In Comparatione, 1/2021, 131–156.

Walters, R., & Novak, M. (2021). Cyber security, artificial intelligence, data protection & the law. Springer.

Widiarto, A. E., Hassan, M. S., Rusli, M. H. M., & Setiawan, E. B. (2025). The authority relationship of Central and Local Governments in forming laws and regulations: between Indonesia and Malaysia. Legality: Jurnal Ilmiah Hukum, 33(1), 148–167.

Widijowati, D. (2022). Legal Complexity in Dealing with Cyber Crime in Indonesia. Research Horizon, 2(6), 597–606.

Yin, R. K. (2013). Case Study Research: Design and Methods. Sage Publications.




DOI: https://doi.org/10.34007/jehss.v8i2.2842

Refbacks

  • There are currently no refbacks.


Copyright (c) 2025 Journal of Education, Humaniora and Social Sciences (JEHSS)

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

Journal of Education, Humaniora and Social Sciences (JEHSS)

Publisher: Mahesa Research Center

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International Public License