Protecting Victims of Cybercrime in the Maritime Sector: Legal Challenges and the Absence of Specific Cybersecurity Laws in Indonesia
Abstract
Keywords
Full Text:
PDFReferences
Dissertation:
Miranda Silgado, David. Cyber-Attacks: A Digital Threat Reality Affecting the Maritime Industry. Dissertation, World Maritime University, 2018.
Journal:
Ahmad, Atif, Kevin C. Desouza, Sean B. Maynard, Humza Naseer, and Richard L. Baskerville. "How integration of cyber security management and incident response enables organizational learning." Journal of the Association for Information Science and Technology 71, no. 8 (2020): 939-953.
Al-Amaireh, M. A. A. M. "The Role of Cybersecurity in Enhancing the Effectiveness of Law Against Cybercrimes." Revista de Gestão Social e Ambiental 18, no. 8 (2024): e06508-e06508.
Alenezi, Mohammed N., Haneen Alabdulrazzaq, Abdullah A. Alshaher, and Mubarak M. Alkharang. "Evolution of malware threats and techniques: A review." International journal of communication networks and information security 12, no. 3 (2020): 326-337.
Alkhalil, Zainab, Chaminda Hewage, Liqaa Nawaf, and Imtiaz Khan. "Phishing attacks: A recent comprehensive study and a new anatomy." Frontiers in Computer Science 3 (2021): 563060.
Androjna, Andrej, Tanja Brcko, Ivica Pavic, and Harm Greidanus. "Assessing cyber challenges of maritime navigation." Journal of Marine Science and Engineering 8, no. 10 (2020): 776.
Ashraf, Imran, Yongwan Park, Soojung Hur, Sung Won Kim, Roobaea Alroobaea, Yousaf Bin Zikria, and Summera Nosheen. "A survey on cyber security threats in IoT-enabled maritime industry." IEEE Transactions on Intelligent Transportation Systems 24, no. 2 (2022): 2677-2690.
Babikian, John. "Navigating legal frontiers: exploring emerging issues in cyber law." Revista Espanola de Documentacion Cientifica 17, no. 2 (2023): 95-109.
Barnes, Paul, and Richard Oloruntoba. "Assurance of security in maritime supply chains: Conceptual issues of vulnerability and crisis management." Journal of international Management 11, no. 4 (2005): 519-540.
Basta, Alfred, Nadine Basta, Waqar Anwar, and Mohammad Ilyas Essar. Open-source Security Operations Center (SOC): A Complete Guide to Establishing, Managing, and Maintaining a Modern SOC. John Wiley & Sons, 2024.
Ben Farah, Mohamed Amine, Elochukwu Ukwandu, Hanan Hindy, David Brosset, Miroslav Bures, Ivan Andonovic, and Xavier Bellekens. "Cyber security in the maritime industry: A systematic survey of recent advances and future trends." Information 13, no. 1 (2022): 22.
Benvenisti, Eyal. "Upholding democracy amid the challenges of new technology: what role for the law of global governance?." European Journal of International Law 29, no. 1 (2018): 9-82.
Caytas, Joanna Diane. "The unconquerable domain of discretion in Kelsen’s pure theory of law." Washington Undergraduate Law Review 6, no. 1 (2012): 1-46.
Cheng, Le, Jiaxuan Qiu, and Yi Yang. "Constructing cybersecurity discourse via deconstructing legislation." International Journal of Legal Discourse 8, no. 2 (2023): 273-297.
Clavijo Mesa, Maria Valentina, Carmen Elena Patino-Rodriguez, and Fernando Jesus Guevara Carazas. "Cybersecurity at Sea: A Literature Review of Cyber-Attack Impacts and Defenses in Maritime Supply Chains." Information 15, no. 11 (2024): 710.
D’Arcy, John, Idris Adjerid, Corey M. Angst, and Ante Glavas. "Too good to be true: Firm social performance and the risk of data breach." Information Systems Research 31, no. 4 (2020): 1200-1223.
Dimakopoulou, Anastasia, and Konstantinos Rantos. "Comprehensive Analysis of Maritime Cybersecurity Landscape Based on the NIST CSF v2. 0." Journal of Marine Science and Engineering 12, no. 6 (2024): 919.
Eccles, Robert G., Scott C. Newquist, and Roland Schatz. "Reputation and its risks." Harvard Business Review 85, no. 2 (2007): 104.
Elegbe, Ifeoluwa. "Cybercrime legislation: A comparative analysis of legal frameworks, policy responses and recommendations." International Journal of Education and Social Science Research 7, no. 02 (2024): 199-207.
Erstad, Erlend, Rory Hopcraft, Avanthika Vineetha Harish, and Kimberly Tam. "A human-centred design approach for the development and conducting of maritime cyber resilience training." WMU Journal of Maritime affairs 22, no. 2 (2023): 241-266.
Farber, Shai. "Trauma, truth, and testimony: analysing terrorism survivors’ victim impact statements." International Journal of Comparative and Applied Criminal Justice (2024): 1-19.
Fenton, Adam James. "Preventing catastrophic cyber–physical attacks on the global maritime transportation system: A case study of hybrid maritime security in the Straits of Malacca and Singapore." Journal of Marine Science and Engineering 12, no. 3 (2024): 510.
Finley, Ian B., and Nicholas Harkiolakis. "Cybersecurity policies and supporting regulations for maritime transportation system in the USA." International Journal of Teaching and Case Studies 9, no. 2 (2018): 89-108.
Flowers, Angelyn, Sherali Zeadally, and Acklyn Murray. "Cybersecurity and US legislative efforts to address cybercrime." Journal of Homeland Security and Emergency Management 10, no. 1 (2013): 29-55.
Giannakoulias, Alkiviadis. "NIS 2 Directive: implications for system and infrastructure security." Master's thesis, Πανεπιστήμιο Πειραιώς, 2023.
Giannopoulos, Georgios A. "The application of information and communication technologies in transport." European journal of operational research 152, no. 2 (2004): 302-320.
Harrish, L. Sree, I. Monisha, and G. Kavi Bharathi. "A Study on Kelsen's Pure Theory of Law." Issue 1 Indian JL & Legal Rsch. 5 (2023): 1.
Hartmann, Julia, Sebastian Forkmann, Sabine Benoit, and Stephan C. Henneberg. "A consumer perspective on managing the consequences of chain liability." Journal of Supply Chain Management 58, no. 4 (2022): 58-89.
Healy, Deirdre. "Exploring victims’ interactions with the criminal justice system." Ireland Department of justice and equality report (2019).
Humayun, Mamoona, N. Zaman Jhanjhi, Ahmed Alsayat, and Vasaki Ponnusamy. "Internet of things and ransomware: Evolution, mitigation and prevention." Egyptian Informatics Journal 22, no. 1 (2021): 105-117.
Imran, Mohammad Fadil. "Cyber Criminology: An analysis of the Indonesian and the United States Police Perception." International Journal of Cyber Criminology 17, no. 2 (2023): 250-261.
Kapalidis, Chronis, Stavros Karamperidis, Tim Watson, and Georgios Koligiannis. "A vulnerability centric System of Systems Analysis on the maritime transportation sector most valuable assets: Recommendations for port facilities and ships." Journal of Marine Science and Engineering 10, no. 10 (2022): 1486.
Kavallieratos, Georgios, and Sokratis Katsikas. "Managing cyber security risks of the cyber-enabled ship." Journal of Marine Science and Engineering 8, no. 10 (2020): 768.
Koss, Mary P. "Restoring rape survivors: Justice, advocacy, and a call to action." Annals of the New York Academy of Sciences 1087, no. 1 (2006): 206-234.
Macfarlane, Rory. "Cyber-risk in shipping and its management." In Ship Operations, pp. 69-83. England: Informa Law from Routledge, 2020.
Mai-inji, A. Y., K. E. Ukhurebor, and L. O. Babatope. "Impending maritime cyberspace threats: An educational research perspective." Journal of Infrastructure, Policy and Development 8, no. 8 (2024): 4146.
Malone, Iris, Anastasia Strouboulis, and National Counterterrorism Innovation. “Technology, and Education Center”. Emerging Risks in the Marine Transportation System (MTS), 2001–2021. Reports, Projects, and Research, no. 27. 2022.
Melnyk, Oleksiy, Oleksandr Drozdov, and Serhii Kuznichenko. "Cybersecurity in Maritime Transport: An International Perspective on Regulatory Frameworks and Countermeasures." Lex Portus 11 (2025): 7.
Mohsendokht, Massoud, Huanhuan Li, Christos Kontovas, Chia-Hsun Chang, Zhuohua Qu, and Zaili Yang. "Decoding dependencies among the risk factors influencing maritime cybersecurity: Lessons learned from historical incidents in the past two decades." Ocean Engineering 312 (2024): 119078.
Moore, Tyler. "The economics of cybersecurity: Principles and policy options." International Journal of Critical Infrastructure Protection 3, no. 3-4 (2010): 103-117.
Nganga, Allan, George Nganya, Margareta Lützhöft, Steven Mallam, and Joel Scanlan. "Bridging the gap: Enhancing maritime vessel cyber resilience through security operation centers." Sensors 24, no. 1 (2023): 146.
Nganga, Allan, Margareta Lützhöft, Joel Scanlan, and Steven Mallam. "Timely Maritime Cyber Threat Resolution in a Multi-Stakeholder Environment." CYBER 2022 : The Seventh International Conference on Cyber-Technologies and Cyber-Systems. (2022): 86-92.
Oruc, Aybars, Nabin Chowdhury, and Vasileios Gkioulos. "A modular cyber security training programme for the maritime domain." International Journal of Information Security 23, no. 2 (2024): 1477-1512.
Pandey, Shipra, Rajesh Kumar Singh, Angappa Gunasekaran, and Anjali Kaushik. "Cyber security risks in globalized supply chains: conceptual framework." Journal of Global Operations and Strategic Sourcing 13, no. 1 (2020): 103-128.
Pascoe, Daniel, and Marie Manikis. "Making sense of the victim’s role in clemency decision making." International Review of Victimology 26, no. 1 (2020): 3-28.
Perera, Srinath, Xiaohua Jin, Alana Maurushat, and De-Graft Joe Opoku. "Factors affecting reputational damage to organisations due to cyberattacks." In Informatics, vol. 9, no. 1, p. 28. Multidisciplinary Digital Publishing Institute, 2022.
Qian, Xu. "Redefining International Law Paradigms: Charting Cybersecurity, Trade, and Investment Trajectories within Global Legal Boundaries." The Journal of World Investment & Trade 25, no. 3 (2024): 295-333.
Safitra, Muhammad Fakhrul, Muharman Lubis, and Hanif Fakhrurroja. "Counterattacking cyber threats: A framework for the future of cybersecurity." Sustainability 15, no. 18 (2023): 13369.
Senarak, Chalermpong. "Port cyberattacks from 2011 to 2023: a literature review and discussion of selected cases." Maritime Economics & Logistics 26, no. 1 (2024): 105-130.
Symes, Steve, Eddie Blanco-Davis, Tony Graham, Jin Wang, and Edward Shaw. "Cyberattacks on the Maritime Sector: A Literature Review." Journal of Marine Science and Application 23, no. 4 (2024): 689-706.
Tahmasebi, Meysam. "Cyberattack Ramifications, The Hidden Cost of a Security Breach." Journal of Information Security 15, no. 2 (2024): 87-105.
Walton, Beatrice A. "Duties Owed: Low-Intensity Cyber Attacks and Liability for Transboundary Torts in International Law." Yale LJ 126 (2016): 1460.
Weaver, Gabriel A., Brett Feddersen, Lavanya Marla, Dan Wei, Adam Rose, and Mark Van Moer. "Estimating economic losses from cyber-attacks on shipping ports: An optimization-based approach." Transportation Research Part C: Emerging Technologies 137 (2022): 103423.
Zimba, Aaron, Zhaoshun Wang, and Mumbi Chishimba. 2019. “Addressing Crypto-Ransomware Attacks: Before You Decide Whether To-Pay or Not-To.” Journal of Computer Information Systems 61 (1): 53–63.
Regulation:
Law Number 11 of 2008 on Electronic Information and Transactions
Law Number 17 of 2008 on Shipping
Law Number 19 of 2016 on Amendments to Law Number 11 of 2008 on Electronic Information and Transactions (ITE Law).
DOI: http://dx.doi.org/10.26532/jph.v12i1.46945
Refbacks
- There are currently no refbacks.

This work is licensed under a Creative Commons Attribution 4.0 International License.
Jurnal Pembaharuan Hukum Indexed by :
![]() | Jurnal Pembaharuan Hukum | |
Faculty of Law, Unissula | Copyright of Jurnal Pembaharuan Hukum | |
Jalan Kaligawe Raya KM.4, Terboyo Kulon, Genuk, | ISSN 2580-3085 (Online) ISSN 2355-0481 (Print) | |
Semarang, Central Java, Indonesia, 50112 | JPH is licensed under a |