Cybersecurity Regulations in Aviation Digital Transformation: Cross-Border Perspectives from Indonesia and Russia
DOI:
https://doi.org/10.38035/sijet.v2i4.305Keywords:
Cybersecurity Regulation, Aviation Digital Transformation, Cross-Border Policy, Indonesia-Russia Comparison, Aviation SecurityAbstract
Digital transformation in the global aviation industry has brought increasingly complex cybersecurity challenges, especially to critical aviation infrastructure. This study aims to compare the aviation cybersecurity regulatory frameworks in Indonesia and Russia through a comparative analysis of cross-country policies. The research method uses a comparative qualitative approach with content analysis of the official regulatory documents of both countries, including Indonesia's ITE Law and Russia's Federal Law on Information Security. The results show that Indonesia implements a multi-stakeholder approach with coordination between BSSN and the Ministry of Transportation, while Russia adopts a state-centric model with strong integration into the national defense system. A gap analysis identified weaknesses in technical implementation in Indonesia and limitations in transparency in Russia. This study recommends harmonizing technical standards, establishing a bilateral joint working group, and creating information-sharing mechanisms to enhance Indonesia-Russia cooperation in addressing aviation cyber threats.
References
Anderson, R., & Moore, T. (2006). The economics of information security. Science, 314(5799), 610-613.
Baumann, M., & Weidmann, N. B. (2021). Cyberwar: The nature of conflicts in the digital age. Journal of Conflict Resolution, 65(7-8), 1231-1256.
Brooker, P. (2020). Civil aircraft cybersecurity threats: An overview. Journal of Aerospace Information Systems, 17(4), 154-167.
Bueger, C., & Liebetrau, T. (2021). Critical infrastructure security: A conceptual framework. Security Dialogue, 52(5), 427-445.
Choucri, N. (2012). Cyberpolitics in international relations. MIT Press.
Federal Security Service of Russian Federation. (2019). Requirements for information security of critical infrastructure. Moscow: FSB Press.
Finifter, M., Akhawe, D., & Wagner, D. (2013). An empirical study of vulnerability rewards programs. Proceedings of the 22nd USENIX Security Symposium, 273-288.
Government of Indonesia. (2020). Presidential Regulation No. 82 of 2020 on National Cyber Security Strategy. Jakarta: State Secretariat.
International Civil Aviation Organization. (2019). Aviation cybersecurity strategy. Montreal: ICAO.
International Civil Aviation Organization. (2022). Manual on information security. Montreal: ICAO Document 9985.
Kaspersky Lab. (2021). Cybersecurity in aviation: Threats and solutions. Moscow: Kaspersky Lab.
Kshetri, N. (2020). The evolution of cyber-insurance industry and market: An institutional analysis. Telecommunications Policy, 44(6), 101983.
Ministry of Transport of Russian Federation. (2020). Aviation security regulations in digital era. Moscow: Ministry of Transport Press.
Ministry of Transportation Indonesia. (2021). Regulation on information system security in civil aviation. Jakarta: Ministry of Transportation.
National Cyber and Crypto Agency Indonesia. (2022). National cyber security index 2022. Jakarta: BSSN.
Perlroth, N. (2021). This is how they tell me the world ends: The cyberweapons arms race. Bloomsbury Publishing.
Pernik, P., Wojtkowiak, J., & Verschoor-Kirss, A. (2020). Cybersecurity of critical infrastructure: A comparative analysis. Tallinn: NATO Cooperative Cyber Defence Centre of Excellence.
Prislan, K., & Slak, B. (2021). A comparative analysis of cybersecurity strategies in selected countries. Cybersecurity, 4(1), 1-15.
Rao, B., & Gopi, A. G. (2016). The societal impact of commercial drones. Technology in Society, 45, 83-90.
Rid, T. (2013). Cyber war will not take place. Oxford University Press.
Rothrock, R. A., Kaplan, J., & Van Der Oord, F. (2018). The board's role in managing cybersecurity risks. MIT Sloan Management Review, 59(2), 12-15.
Safa, N. S., Von Solms, R., & Furnell, S. (2016). Information security policy compliance model in organizations. Computers & Security, 56, 70-82.
Saydjari, O. S. (2018). Engineering trustworthy systems: Get cybersecurity design right the first time. McGraw-Hill Education.
Singer, P. W., & Friedman, A. (2014). Cybersecurity and cyberwar: What everyone needs to know. Oxford University Press.
Yusuf, A., & Hidayat, T. (2021). Challenges of implementing cybersecurity regulations in Indonesian aviation sector. Journal of Transportation Security, 14(3-4), 145-162.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Gevan Naufal Wala, Lazarev Viktor Antonovich

This work is licensed under a Creative Commons Attribution 4.0 International License.
Copyright :
Authors who publish their manuscripts in this journal agree to the following conditions:
- Copyright in each article belongs to the author.
- The author acknowledges that the Siber International Journal of Education Technology (SIJET) has the right to be the first to publish under a Creative Commons Attribution 4.0 International license (Attribution 4.0 International CC BY 4.0).
- Authors can submit articles separately, arrange the non-exclusive distribution of manuscripts that have been published in this journal to other versions (for example, sent to the author's institutional repository, publication in a book, etc.), by acknowledging that the manuscript has been published for the first time at Siber International Journal of Education Technology (SIJET).





















