An Analysis of Cybersecurity Policies and Practices in Public Administration

Authors

  • Aulia Ramdhani Arief University of Muhammdiyah Makassar, Indonesia

DOI:

https://doi.org/10.55885/jprsp.v2i2.211

Keywords:

Cybersecurity, Policies, Practices, Public Administration

Abstract

In this research, the purpose is to assess the major strong and weak points of cybersecurity policies and strategies in the chosen public administration organisation. The type of research used is the qualitative case study and as such, focuses on interviews and policy documents in line with cybersecurity laws and related reports from the selected experts. There is used themes that are grounded in the data to look at patterns that recurred regularly. As a conclusion it can be stated that the situation in an organization is quite good as it has a clear security policy, controls and regular training for its employees, but there are some issues with an access control, vulnerability assessment and penetration testing. The advancement in these areas will assist the organisation to safeguard data and avoid cyber attacks in future and make sure the organization understands that cybersecurity is not a definite state and the organisational bureaucracy has to embrace change in practices continually due to the dynamic threat.

References

Althunibat, A., Binsawad, M., Almaiah, M. A., Almomani, O., Alsaaidah, A., Al-Rahmi, W., & Seliaman, M. E. (2021). Sustainable applications of smart-government services: A model to understand smart-government adoption. Sustainability (Switzerland), 13(6). https://doi.org/10.3390/su13063028

Baena-Morales, S., Jerez-Mayorga, D., Delgado-Floody, P., & Martínez-Martínez, J. (2021). Sustainable development goals and physical education. A proposal for practice-based models. In International Journal of Environmental Research and Public Health (Vol. 18, Issue 4, pp. 1–18). MDPI AG. https://doi.org/10.3390/ijerph18042129

Bekkers, V. J., & Tummers, L. (Eds.). (2018). Innovation in the public sector. Sage. https://doi.org/10.1057/9780230307520

Bozkus Kahyaoglu, S., & Caliyurt, K. (2018). Cyber security assurance process from the internal audit perspective. Managerial auditing journal, 33(4), 360-376. https://doi.org/10.1108/MAJ-02-2018-1804

Chang, A. (Jasmine), El-Rayes, N., & Shi, J. (2022). Blockchain Technology for Supply Chain Management: A Comprehensive Review. FinTech, 1(2), 191–205. https://doi.org/10.3390/fintech1020015

Chowdhury, N., & Gkioulos, V. (2021). Cyber security training for critical infrastructure protection: A literature review. Computer Science Review, 40, 100361. https://doi.org/10.1016/j.cosrev.2021.100361

ElAlfy, A., Palaschuk, N., El-Bassiouny, D., Wilson, J., & Weber, O. (2020). Scoping the evolution of corporate social responsibility (CSR) research in the sustainable development goals (SDGS) era. In Sustainability (Switzerland) (Vol. 12, Issue 14). MDPI. https://doi.org/10.3390/su12145544

Georgiadou, A., Michalitsi-Psarrou, A., Gioulekas, F., Stamatiadis, E., Tzikas, A., Gounaris, K., Doukas, G., Ntanos, C., Ribeiro, L. L., & Askounis, D. (2021). Hospitals’ cybersecurity culture during the COVID-19 crisis. Healthcare (Switzerland), 9(10). https://doi.org/10.3390/healthcare9101335

Habibzadeh, H., Nussbaum, B. H., Anjomshoa, F., Kantarci, B., & Soyata, T. (2019). A survey on cybersecurity, data privacy, and policy issues in cyber-physical system deployments in smart cities. Sustainable Cities and Society, 50, 101660. https://doi.org/10.1016/j.scs.2019.101660

Hitchens, T., & Gallagher, N. W. (2019). Building confidence in the Cybersphere: a path to multilateral progress. Journal of Cyber Policy, 4(1), 4-21. https://doi.org/10.1080/23738871.2019.1599032

Jin, Q., Raza, S. H., Yousaf, M., Zaman, U., & Siang, J. M. L. D. (2021). Can communication strategies combat covid-19 vaccine hesitancy with trade-off between public service messages and public skepticism? Experimental evidence from Pakistan. Vaccines, 9(7). https://doi.org/10.3390/vaccines9070757

Johnson, G. A., & Vindrola-Padros, C. (2017). Rapid qualitative research methods during complex health emergencies: A systematic review of the literature. Social Science & Medicine, 189, 63-75. https://doi.org/10.1016/j.socscimed.2017.07.029

Kurniawan, R., Zailani, S. H., Iranmanesh, M., & Rajagopal, P. (2017). The effects of vulnerability mitigation strategies on supply chain effectiveness: risk culture as moderator. Supply Chain Management: An International Journal, 22(1), 1-15. https://doi.org/10.1108/SCM-12-2015-0482

Langheinrich, M. (2018). Privacy in Ubiquitous Computing. In Ubiquitous computing fundamentals (pp. 109-174). Chapman and Hall/CRC. https://doi.org/10.1201/9781420093612

Laurini, R. (2018). Information systems for urban planning: a hypermedia cooperative approach. Crc Press. https://doi.org/10.1201/9781315274713

Li, L., He, W., Xu, L., Ash, I., Anwar, M., & Yuan, X. (2019). Investigating the impact of cybersecurity policy awareness on employees’ cybersecurity behavior. International Journal of Information Management, 45, 13-24. https://doi.org/10.1016/j.ijinfomgt.2018.10.017

Oliveira, J. B., Jin, M., Lima, R. S., Kobza, J. E., & Montevechi, J. A. B. (2019). The role of simulation and optimization methods in supply chain risk management: Performance and review standpoints. Simulation Modelling Practice and Theory, 92, 17-44. https://doi.org/10.1016/j.simpat.2018.11.007

Perera, S., Jin, X., Maurushat, A., & Opoku, D. G. J. (2022). Factors Affecting Reputational Damage to Organisations Due to Cyberattacks. Informatics, 9(1). https://doi.org/10.3390/informatics9010028

Redden, J. (2018). Democratic governance in an age of datafication: Lessons from mapping government discourses and practices. Big Data & Society, 5(2), 2053951718809145. https://doi.org/10.1177/2053951718809145

Saura, J. R., Ribeiro-Soriano, D., & Palacios-Marqués, D. (2022). Assessing behavioral data science privacy issues in government artificial intelligence deployment. Government Information Quarterly, 39(4), 101679. https://doi.org/10.1016/j.giq.2022.101679

Szczepaniuk, E. K., Szczepaniuk, H., Rokicki, T., & Klepacki, B. (2020). Information security assessment in public administration. Computers & Security, 90, 101709. https://doi.org/10.1016/j.cose.2019.101709

Vitunskaite, M., He, Y., Brandstetter, T., & Janicke, H. (2019). Smart cities and cyber security: Are we there yet? A comparative study on the role of standards, third party risk management and security ownership. Computers & Security, 83, 313-331. https://doi.org/10.1016/j.cose.2019.02.009

Wirtz, B. W., & Weyerer, J. C. (2017). Cyberterrorism and cyber attacks in the public sector: How public administration copes with digital threats. International Journal of Public Administration, 40(13), 1085-1100. https://doi.org/10.1080/01900692.2016.1242614

Wong, L. W., Lee, V. H., Tan, G. W. H., Ooi, K. B., & Sohal, A. (2022). The role of cybersecurity and policy awareness in shifting employee compliance attitudes: Building supply chain capabilities. International Journal of Information Management, 66, 102520. https://doi.org/10.1016/j.ijinfomgt.2022.102520

Downloads

Published

2022-09-13

How to Cite

Arief, A. R. (2022). An Analysis of Cybersecurity Policies and Practices in Public Administration. Journal of Public Representative and Society Provision, 2(2), 88-100. https://doi.org/10.55885/jprsp.v2i2.211