Effectiveness and Challenges of Cybercrime Law Enforcement in Bone Regency

Jumra Jumra(1), Gustika Sandra(2),


(1) Universitas Andi Sudirman
(2) Universitas Andi Sudirman

Abstract


This study analyzes the effectiveness of cybercrime law enforcement in Bone Regency, South Sulawesi, as a representation of non-metropolitan areas adapting to digital transformation. A qualitative case study design was employed, involving in-depth interviews with 15 key informants, limited participatory observations, and document reviews of legal and policy frameworks. The findings reveal that current regulations remain insufficiently adaptive to emerging digital crime modes such as deepfakes, AI-driven fraud, and data theft via encrypted applications. Moreover, inter-agency coordination remains suboptimal, characterized by delayed cross-jurisdictional communication, the absence of standardized operating procedures (SOPs), and the limited capacity of local cyber units. From a technical standpoint, law enforcement agencies face challenges including a shortage of digital forensic experts, inadequate budgets, and insufficient network infrastructure. On the community side, low digital literacy persists, reflected in delayed case reporting, misconceptions about third-party responsibility mechanisms, and weak awareness of personal data protection. Nevertheless, the study also identifies adaptive initiatives, including collaboration with local communities, stakeholder engagement, and the mobilization of available resources. These findings underscore the urgency of regularly updating regulations, strengthening technical capacity, and promoting inclusive digital literacy programs. Such measures are essential for reinforcing cyber law systems and ensuring resilience against digital crime in non-metropolitan regions.

Keywords


Law Enforcement; Cybercrime; Bone Regency; Digital Literacy; Institutional Coordination

Full Text:

PDF

References


Alam, R. G. G., Ibrahim, H., & Karas, I. R. (2023). Key Issues in Cybersecurity Implementation in Government Agencies: A Case Study in Jakarta Smart City. International Conference on Computing and Informatics, 3–16.

AllahRakha, N. (2024). Transformation of crimes (cybercrimes) in digital age. International Journal of Law and Policy, 2(2).

Andania, A., Irmawati, I., Nasaruddin, N., Syam, A. W., & Anugrahwati, A. (2025). Digital Transformation in Local Trade: A Study of Perceptions among E-Commerce Sellers and Consumers. International Journal of Marketing & Human Resource Research, 6(3), 623–646. https://doi.org/10.47747/ijmhrr.v6i3.2899

Anwary, I. (2022). The Role of Public Administration in combating cybercrime: An Analysis of the Legal Framework in Indonesia. International Journal of Cyber Criminology, 16(2), 216–227.

Babikian, J. (2023). Navigating legal frontiers: exploring emerging issues in cyber law. Revista Espanola de Documentacion Cientifica, 17(2), 95–109.

Bhakti, A., Sudirman, A., Sumadinata, R. W. S., & Bainus, A. (2024). State Defense Strategy in Facing Cyber Threats After Hacking Incidents on Government Institutions: A Case Study in Indonesia. Journal of Human Security, 20(1), 109–117.

Braithwaite, J. (2002). Rules and principles: A theory of legal certainty. Australasian Journal of Legal Philosophy, 27(2002), 47–82.

Brangetto, P., & Aubyn, M. K. S. (2015). Economic aspects of national cyber security strategies. Brangetto P., Aubyn MK-S. Economic Aspects of National Cyber Security Strategies: Project Report. Annex, 1(9–16), 86.

Braun, V., & Clarke, V. (2006). Using thematic analysis in psychology. Qualitative Research in Psychology, 3(2), 77–101. https://doi.org/10.1191/1478088706qp063oa

Ceballos Ferroglio, C. F., Ferro, G., & Neder, Á. E. (2024). Regulatory lag, efficiency, and performance. Lessons from a case study. Competition and Regulation in Network Industries, 25(1), 43–66.

Cohen, L. E., & Felson, M. (2015). Routine activity theory: A routine activity approach. In Criminology theory (pp. 313–321). Routledge.

Erikha, A., & Saptomo, A. (2024). Dilemma of Legal Policy to Address Cybercrime in the Digital Era. Asian Journal of Social and Humanities, 3(3), 499–507.

Fahmi, F. Z., & Mendrofa, M. J. S. (2023). Rural transformation and the development of information and communication technologies: Evidence from Indonesia. Technology in Society, 75, 102349.

Felix, A. O., Olabode, O. J., & Ayeni, J. K. (2023). The criminalization of the internet and cybercrime in general: A comprehensive study. Scientific and Practical Cyber Security Journal (SPCSJ), 7(3), 1–10.

Galinec, D., Možnik, D., & Guberina, B. (2017). Cybersecurity and cyber defence: national level strategic approach. Automatika: ?asopis Za Automatiku, Mjerenje, Elektroniku, Ra?unarstvo i Komunikacije, 58(3), 273–286.

Haron, H., Sajari, A., Dewanti, R., Ganesan, Y., & Gui, A. (2023). Digital transformation in community development of Malaysia and Indonesia. ICCD, 5(1), 232–242.

Imbaruddin, A. (2003). Understanding Institutional Capacity.

Imran, M. F. (2023). Preventing and Combating Cybercrime in Indonesia. International Journal of Cyber Criminology, 17(1), 223–235.

Judijanto, L., Dimas, P., Santosa, N., & Nastiar, M. F. (2025). Smart City Implementation in Indonesia: Trends, Challenges, and Opportunities. International Journal of Society Reviews (INJOSER), 3(1), 156–165.

Khan, H., & Moazzam, A. (2022). Interagency collaboration/coordination. Public Sector Reforms in Pakistan: Hierarchies, Markets and Networks, 153.

Lubis, M., & Maulana, F. A. (2010). Information and electronic transaction law effectiveness (UU-ITE) in Indonesia. Proceeding of the 3rd International Conference on Information and Communication Technology for the Moslem World (ICT4M) 2010, C–13.

Marikyan, D., & Papagiannidis, S. (2023). Protection motivation theory: A review. TheoryHub Book: This Handbook Is Based on the Online Theory Resource: TheoryHub, 78–93.

Miftachurohmah, N., Meisuri, L. J., Judijanto, L., & Lusianawati, H. (2023). Implications of Social Change in the Development of Information and Communication Technology in Asian Countries.

Möller, D. P. F. (2023). Cybersecurity in digital transformation. In Guide to cybersecurity in digital transformation: Trends, methods, technologies, applications and best practices (pp. 1–70). Springer.

Mushtaq, S., & Shah, M. (2025). Threats to the Digital Ecosystem: Can Information Security Management Frameworks, Guided by Criminological Literature, Effectively Prevent Cybercrime and Protect Public Data? Computers, 14(6), 219.

Odendaal, N. (2003). Information and communication technology and local governance: Understanding the difference between cities in developed and emerging economies. Computers, Environment and Urban Systems, 27(6), 585–607.

Peters, A., & Jordan, A. (2019). Countering the cyber enforcement gap: Strengthening global capacity on cybercrime. J. Nat’l Sec. L. & Pol’y, 10, 487.

Poe, L. (2021). Cybercrime in the age of digital transformation, rising nationalism and the demise of global governance. In Modern Police Leadership: Operational Effectiveness at Every Level (pp. 109–126). Springer.

Putra, T. H., & Firdaus, S. U. (2024). Law enforcement against cyber crime in electronic transactions in Indonesia. International Journal Of Multi Science, 4(03), 37–45.

Rahman, I., Muhtar, M. H., Mongdong, N. M., Setiawan, R., Setiawan, B., & Siburian, H. K. (2024). Harmonization of Digital laws and Adaptation Strategies in Indonesia focusing on E-Commerce and Digital transactions. Innovative: Journal Of Social Science Research, 4(1), 4314–4327.

Randy, A., Wiranto, S., Legowo, E., Widodo, P., Saragih, H. J. R., & Suwarno, P. (2023). Implementasi Kebijakan Pencegahan dan Pemberantasan Penyalahgunaan dan Peredaran Gelap Narkoba di Kabupaten Bone Guna Mendukung Keamanan Nasional. Jurnal Kewarganegaraan, 7(1), 255–262.

Satoto, E., & Santiago, F. (2025). Reconstruction of Indonesia’s Cyber Law System for Adaptive and Integrated Digital Crime Prevention in the Era of Technological Disruption. Greenation International Journal of Law and Social Sciences, 3(2), 309–317.

Setiadi, W. (2019). Institutional restructuring to sustain regulatory reform in indonesia. Hasanuddin Law Review, 5(1), 120–131.

Shaik, N., Chandana, B. H., Chitralingappa, P., & Sasikala, C. (2025). Protecting in the Digital Age: A Comprehensive Examination of Cybersecurity and Legal Implications. Next?Generation Systems and Secure Computing, 105–135.

Shami, A. Z. A., Saleem, M., & Ashraf, J. (2025). Cybercrime and digital evidence: Investigating the challenges and opportunities in prosecuting cybercrime and handling digital evidence. Research Consortium Archive, 3(2), 401–411.

Van de Hoven, J., Comandé, G., Ruggieri, S., Domingo-Ferrer, J., Musiani, F., Giannotti, F., Pratesi, F., & Stauch, M. (2021). Towards a digital ecosystem of trust: Ethical, legal and societal implications. Opinio Juris In Comparatione, 1/2021, 131–156.

Vasiliy, L., & Vladimir, F. (2020). Legal awareness in a digital society. Russian Law Journal, 8(1), 138–157.

Walters, R., & Novak, M. (2021). Cyber security, artificial intelligence, data protection & the law. Springer.

Widijowati, D. (2022). Legal Complexity in Dealing with Cyber Crime in Indonesia. Research Horizon, 2(6), 597–606.

Yin, R. K. (2018). Case Study Research and Applications: Design and Methods (Sixth Edition). SAGE Publications, Inc.




DOI: https://doi.org/10.34007/jehss.v8i2.2843

Refbacks

  • There are currently no refbacks.


Copyright (c) 2025 Journal of Education, Humaniora and Social Sciences (JEHSS)

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

Journal of Education, Humaniora and Social Sciences (JEHSS)

Publisher: Mahesa Research Center

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International Public License