Cybersecurity Regulations in Aviation Digital Transformation: Cross-Border Perspectives from Indonesia and Russia

Authors

  • Gevan Naufal Wala Universitas Jambi, Jambi, Indonesia
  • Lazarev Viktor Antonovich University of Civil Aviation, Sankt Petersburg, Rusia

DOI:

https://doi.org/10.38035/sijet.v2i4.305

Keywords:

Cybersecurity Regulation, Aviation Digital Transformation, Cross-Border Policy, Indonesia-Russia Comparison, Aviation Security

Abstract

Digital transformation in the global aviation industry has brought increasingly complex cybersecurity challenges, especially to critical aviation infrastructure. This study aims to compare the aviation cybersecurity regulatory frameworks in Indonesia and Russia through a comparative analysis of cross-country policies. The research method uses a comparative qualitative approach with content analysis of the official regulatory documents of both countries, including Indonesia's ITE Law and Russia's Federal Law on Information Security. The results show that Indonesia implements a multi-stakeholder approach with coordination between BSSN and the Ministry of Transportation, while Russia adopts a state-centric model with strong integration into the national defense system. A gap analysis identified weaknesses in technical implementation in Indonesia and limitations in transparency in Russia. This study recommends harmonizing technical standards, establishing a bilateral joint working group, and creating information-sharing mechanisms to enhance Indonesia-Russia cooperation in addressing aviation cyber threats.

References

Anderson, R., & Moore, T. (2006). The economics of information security. Science, 314(5799), 610-613.

Baumann, M., & Weidmann, N. B. (2021). Cyberwar: The nature of conflicts in the digital age. Journal of Conflict Resolution, 65(7-8), 1231-1256.

Brooker, P. (2020). Civil aircraft cybersecurity threats: An overview. Journal of Aerospace Information Systems, 17(4), 154-167.

Bueger, C., & Liebetrau, T. (2021). Critical infrastructure security: A conceptual framework. Security Dialogue, 52(5), 427-445.

Choucri, N. (2012). Cyberpolitics in international relations. MIT Press.

Federal Security Service of Russian Federation. (2019). Requirements for information security of critical infrastructure. Moscow: FSB Press.

Finifter, M., Akhawe, D., & Wagner, D. (2013). An empirical study of vulnerability rewards programs. Proceedings of the 22nd USENIX Security Symposium, 273-288.

Government of Indonesia. (2020). Presidential Regulation No. 82 of 2020 on National Cyber Security Strategy. Jakarta: State Secretariat.

International Civil Aviation Organization. (2019). Aviation cybersecurity strategy. Montreal: ICAO.

International Civil Aviation Organization. (2022). Manual on information security. Montreal: ICAO Document 9985.

Kaspersky Lab. (2021). Cybersecurity in aviation: Threats and solutions. Moscow: Kaspersky Lab.

Kshetri, N. (2020). The evolution of cyber-insurance industry and market: An institutional analysis. Telecommunications Policy, 44(6), 101983.

Ministry of Transport of Russian Federation. (2020). Aviation security regulations in digital era. Moscow: Ministry of Transport Press.

Ministry of Transportation Indonesia. (2021). Regulation on information system security in civil aviation. Jakarta: Ministry of Transportation.

National Cyber and Crypto Agency Indonesia. (2022). National cyber security index 2022. Jakarta: BSSN.

Perlroth, N. (2021). This is how they tell me the world ends: The cyberweapons arms race. Bloomsbury Publishing.

Pernik, P., Wojtkowiak, J., & Verschoor-Kirss, A. (2020). Cybersecurity of critical infrastructure: A comparative analysis. Tallinn: NATO Cooperative Cyber Defence Centre of Excellence.

Prislan, K., & Slak, B. (2021). A comparative analysis of cybersecurity strategies in selected countries. Cybersecurity, 4(1), 1-15.

Rao, B., & Gopi, A. G. (2016). The societal impact of commercial drones. Technology in Society, 45, 83-90.

Rid, T. (2013). Cyber war will not take place. Oxford University Press.

Rothrock, R. A., Kaplan, J., & Van Der Oord, F. (2018). The board's role in managing cybersecurity risks. MIT Sloan Management Review, 59(2), 12-15.

Safa, N. S., Von Solms, R., & Furnell, S. (2016). Information security policy compliance model in organizations. Computers & Security, 56, 70-82.

Saydjari, O. S. (2018). Engineering trustworthy systems: Get cybersecurity design right the first time. McGraw-Hill Education.

Singer, P. W., & Friedman, A. (2014). Cybersecurity and cyberwar: What everyone needs to know. Oxford University Press.

Yusuf, A., & Hidayat, T. (2021). Challenges of implementing cybersecurity regulations in Indonesian aviation sector. Journal of Transportation Security, 14(3-4), 145-162.

Published

2025-10-10

How to Cite

Wala, G. N., & Antonovich, L. V. (2025). Cybersecurity Regulations in Aviation Digital Transformation: Cross-Border Perspectives from Indonesia and Russia. Siber International Journal of Education Technology (SIJET), 2(4), 188–199. https://doi.org/10.38035/sijet.v2i4.305