You are on page 1of 9

Paper Aims Methods Type of object Features

for the /Characterizations/Functi


observation on discussed

Uchenna P. To achieve Study of recorded Industrial critical Human-involved systems


Daniel Ani, cybersecurity information and infrastructure have become more
et. Al 2016 assurance specific incident chaotic than ever,
within the descriptions, especially with the advent
industrial focusing on what of cyberspace. Successful
environment, malicious actions exploitation in
especially or activities were cyberspace is often
manufacturing engaged, attributed to the irregular
corresponding and/or deliberate human
effects, cascading misbehaviours.
impacts, and the
eventual
recipients of
impacts

Justin D To empirically Measures were Cyber behaviour Aggression, depression


Russell, et. Al establish the completed in a & iSECURE and trait anxiety are
2017 ability to group classroom positively and
measure the setting under the significantly correlated
dependent supervision of (each accounting for
variable of trained research about 3–5% of variance)
secure and assistants with the insecure
insecure behaviour scale,
behaviour suggesting that those
with anxiety, depression
and high aggression are
more likely to engage in
insecure cyber
behaviours

N. A. Sales To adapt Encryption Cyber-security Environmental law and


2013 various scheme and the as an the underlying economic
regulatory setup of a survey environmental principles it reflects thus
solutions— on important law problem provide an important
such as findings from framework to understand
monitoring research the tendency of some
and firms to neglect cyber-
surveillance to defence
detect
malicious
code,
hardening
vulnerable
targets, and
building
resilient and
recoverable
systems—for
the cyber-
security
context
R.S Provide a good A survey was Malware, Cyber security threats can
Weerasuriya,e example for conducted Ransomware, be occurred when these
t. Al 2019 how hazardous between the age Phishing, devices are used despite
it can be for groups of 15- 25 Password of taking proper security
the Sri Lankan Sri Lankan youth attacks measures
Youth if they
did not
manage their
computer and
Smartphone
systems and
social media
properly with a
proper
knowledge
about cyber
security

Ezhil Evaluate the Using the sources AIDS Trojan , Ransomware is


Kalaimannan, sufficiency of and frameworks Ransomware undoubtedly emerging as
et. Al 2016 cyber security to answer the a serious threat,
of the research challenge to home users,
consumer IoT questions are information security
standards’ explained professionals, researchers
requirements with the advent of
and gradation cybersecurity technology
and proliferation in
growth of the Internet of
Things.

Kes Olga To protect the the setup of a Cyber Security Stimulate improvement
Greuter, et. Al safety, survey on for Consumer of consumer IoT cyber
2022 security, and important security by comparing the
privacy of the findings from CSCIoT standard to a
consumer research question Internet of more elaborate
there has to be 1 (RESQ1) and Things (CSCIoT) professional standard
a sufficient research question (CSIACS) and other
threshold on 2 (RESQ2) is related work stating IoT
the legislation discussed security requirements
on the
cybersecurity
of consumer
IoT devices

M. D. Cavelty To protect the increased cyber-crime, The focus of research


2015 confidentiality, attention that cyber- necessarily shifts to
integrity, and hacktivism—the espionage, or contexts and conditions
availability of combination of other lesser that determine the
information hacking and forms of cyber- process by which key
and the activism—has incidents on a actors subject- timely
systems and gained in recent daily basis, cy- arrive at a shared
processes used years ber-incidents of understanding of how to
for the bigger con- centralize and
storage, proportions ultimately respond to a
processing, (cyber-terror or security threat.
and cyber-war)
transmission of
information
G.NIKHITA Focuses on Encryption the cyber Computer security is a
REDDY, et. challenges scheme, the security vast topic that is
Al 2016 faced by cyber message or techniques, becoming more
security on the information is ethics and the important because the
latest encrypted using trends changing world is becoming highly
technologies an encryption the face of interconnected, with
algorithm, turning cyber security. networks being used to
it into an carry out critical
unreadable cipher transactions.
text

Guido Interested in training set Computational The rapid rate of change


Cervone, et. privacy the containing a set of social science in cyber-technologies,
Al 2018 goal is to avoid tweets which had evolving legal and policy
individual data been labelled constraints, and rapid
being whether global information flow
compromised, containing fake are creating an
whereas the news or not environment in which
goal for those technical, pol- icy and
in social cyber- economic issues
security is the
use of phishing
as part of a
group-level
social influence
campaign.

C. L. Enhanced and Pragmatic computer The absence of concise,


Stevenson enriched focus qualitative science, broadly acceptable
2014 on research engineering, definition that captures
interdisciplinar approach to political studies, the multidimensionally of
y cybersecurity support the psychology, cybersecurity potentially
dialectics and definitional security studies, impedes technology
thereby will process management,
influence the education, and
approaches of sociology.
industry to
cybersecurity
challenges
Eko Budi, et. Strategi cyber pendekatan Penguatan Perkembangan teknologi
Al 2021 security yang kualitatif yang kelembagaan informasi dan komunikasi
harus mengacu pada cyber security secara positif telah
dilakukan makna, konsep, berkontribusi terhadap
Indonesia definisi, perkembangan ekonomi
untuk karakteristik, global dan berdampak
mewujudkan metafora, simbol, pada produktivitas,
keamanan dan deskripsi dari persaingan, dan
nasional di era suatu hal keterlibatan warga
society 5.0 negara yang lebih tinggi.

L. Siagian Mengatasi Teori-teori dalam Penyebaran Cyber security merupakan


2018 konten negatif memahami peran konten negatif tulang punggung
dunia maya cyber security seperti berita (backbone) dalam rangka
atau cyber di guna mengatasi bohong (hoax), mewujudkan suatu
Indonesia informasi konten hujatan, sistem ketahanan
menunjukkan negatif dalam propagan dan informasi yang tangguh
bahwa cyber mewujudkan agitasi dalam mengatasi
security ketahanan ancaman/serangan siber
menjadi tulang informasi
punggung nasional.
(backbound)

H. Ardiyanti Memetakan Menginisiasi sumber daya Data CIA yang


2014 prospek peraturan external system, menyebutkan kerugian
pengembanga perundang- manajemen yang disebabkan karena
n cyber- undangan yang sumber daya tindak kejahatan dengan
security di terkait dengan informasi. memanfaatkan maupun
Indonesia dan cyber-security di dunia cyber di
tantangannya. Indonesia telah mencapai
1,20% dari tingkat
kerugian akibat cyber-
crime yang terjadi di
dunia.

I. Ramadhan Memajukan Kerja sama Organisasi Aspek pengembangan


2019 teknologi multilateral ASEAN dapat kerja sama tidak hanya
dalam mendorong mewadahi kerja bertujuan untuk
mengantisipasi terciptanya sama melakukan pemetaan
ancaman Masyarakat multilateral terkait ancaman
cyber Ekonomi ASEAN untuk cyber
yang kondusif menjembatani . Organisasi ASEAN
kesenjangan dapat mewadahi kerja
teknologi yang sama multilateral untuk
ada di antara menjembatani
negara kesenjangan teknologi
anggotanya yang ada di antara
negara anggotanya

I Made Menyadarkan Studi literatur cyber security Banyaknya serangan


Suartana, et. kepada UMKM mengenai cyber- awarenesskepa siber yang menjadikan
Al 2022 akan bahaya security dan da UMKM UMKM sebagai target
nya cyber permasalahan serangan dikarenakan
security umum mengenai UMKM dinilai sebagai
tingkat keamanan target yang potensial
G. Rahmadi Menyadarkan Studi literatur cyber security Banyaknya serangan
2020 kepada UMKM mengenai cyber- awareness siber yang menjadikan
akan bahaya security dan kepada E- Lembaga E-commerce
nya cyber permasalahan commerce user sebagai target serangan
security umum mengenai dikarenakan target yang
tingkat keamanan potensial
Wahyu Beny Penataan negara yang Bidang Sinergitas dalam
Mukti regulasi tergabung Teknologi menghadapi ancaman
Setiyawan, et. di bidang sebagai anggota Informasi Cyber Warfare
Al 2020 teknologi ASEAN perlu merupakan sebuah
informasi agar mengembangkan keniscayaan dan
dapat kemampuan keharusan
mencakup power bagi Indonesia.
ruang lingkup teknologinya
teknologi tanpa
informasi mengesampingka
(Cyberspace n pentingnya
) yang sangat kerja sama antar
luas negara.

Ratnadi Akibat Menggunakan Pandemi virus Pandemi virus Covid-19


Hendra rendahnya pendekatan NPF covid 19 & telah mendorong
Wicaksana, security dalam riset-riset aktifitas percepatan transformasi
et. Al 2020 awareness mereka, masyarakat di digital sehingga
masyarakat di khususnya riset dunia digital menyebabkan terjadinya
masa pandemi, yang berkaitan disrupsi di segala bidang.
Kementerian dengan isu big
Kominfo, BSSN, data, social
Polri, Bank media, narasi
Indonesia (BI), kebijakan, strategi
Otoritas Jasa politik
Keuangan
(OJK) dan
berbagai unsur
berkolaborasi
untuk
meningkatkan
literasi dan
sosialisasi
kepada
masyarakat.

A. Admi 2020 menjadi simulasi yang ancaman siber, Konsep pola koordinasi
referensi merupakan keamanan siber, pemantauan
bagi bentuk elastic stack, dan respon insiden siber
perkembangan penelitian yang pemantauan di
fungsi bertujuan untuk jaringan setiap instansi
keamanan mencari pemerintah
siber guna gambaran Indonesia perlu
mendukung melalui diatur oleh BSSN
pelaksanaan sebuah sistem
tugas berskala kecil
instansi
pemerintah
dan
menjaga
ketahanan
siber nasional

Bakrie 2018 mengidentifika Global penyebaran Meningkatkan edukasi


si kebijakan, Cybersecurity konten ilegal, dan pengembangan
peraturan, Index (GCI) hate speech dan kapasitas sumber daya
roadmap (peta merupakan sejenisny manusia keamanan siber
jalan), yang survey yang dan sarana prasarana
mendukung dilakukan oleh penunjang kompetensi
Keamanan International keamanan siber.
Siber Telecommunicati
on Union (ITU)
untuk mengukur
komitmen
negaranegara
anggota ITU
terhadap
keamanan sibe

TOPIC : Awareness, training, and cases of Cybersecurity

3. The gaps/problems that are still not covered or discussed by the existing publication:

Based on your analysis, please explain what is the gaps, problems that still not covered by covered or
discussed by the existing publication, or the possibility of improvement (whether from the
feature/method/function/other perspective that possible to be elaborated from that topic.

Problems/gaps:

- Some of the articles didn’t mention why cybersecurity is happening in this modern world
since it’s important to know what is behind it
- The meaning of cybersecurity is somehow complicated and it’s hard for reader to
understand the basic definition of cybersecurity
- The survey data of cybersecurity accidents it’s not comprehensive as a result the reader
can’t imagine the result of the survey

Possibility of improvement:

- The writer should have made the full description about the specific things that they would
like to discuss cause some of them it’s too general
- The graph or illustration of the survey should have been easier to read in order to
delivered the message for the writer
- The language or terms should have been familiar for the reader to understand what this
paper talking about
References

[1] e. A. Uchenna P. Daniel Ani, "Review of cybersecurity issues in industrial critical


infrastructure: manufacturing in perspective," Journal of Cyber Security Technology, p. 74,
2016.
[2] e. A. Justin D Russell, "Self-reported secure and insecure cyber behaviour: factor structure
and associations with personality factors," Journal of Cyber Security Technology, p. 174,
2017.
[3] N. A. Sales, "REGULATING CYBER-SECURITY," vol. 107, p. 63, 2013.
[4] e. A. R.S Weerasuriya, "Cyber Security: An analysis on awareness on cyber security
among youth in Sri Lanka," p. 10, 2019.
[5] e. A. Ezhil Kalaimannan, "Influences on ransomware’s evolution and predictions for the
future challenges," Journal of Cyber Security Technology, p. 31, 2016.
[6] e. A. Kes Olga Greuter, "The baseline of global consumer cyber security standards for IoT:
quality evaluation," Journal of Cyber Security Technology, p. 26, 2022.
[7] M. D. Cavelty, "Cyber Security," p. 14, 2015.
[8] e. A. G.NIKHITA REDDY, "A STUDY OF CYBER SECURITY CHALLENGES AND
ITS EMERGNING TRENDS ON LATEST TECHNOLOGIES," p. 5, 2016.
[9] e. A. Guido Cervone, "Social Cyber-Security," p. 6, 2018.
[10] C. L. Stevenson, "Defining CyberSecurity," p. 21, 2014.
[11] e. A. Eko Budi, "Strategi Penguatan Cyber Security Guna Mewujudkan Keamanan
Nasional di Era Society 5.0," vol. 3, p. 12, 2021.
[12] L. Siagian, "PERAN KEAMANAN SIBER DALAM MENGATASI KONTEN NEGATIF
GUNA MEWUJUDKAN KETAHANAN INFORMASI NASIONAL," vol. 3, p. 18, 2018.
[13] H. Ardiyanti, "CYBER-SECURITY DAN TANTANGAN PENGEMBANGANNYA DI
INDONESIA," p. 16, 2014.
[14] I. Ramadhan, "STRATEGI KEAMANAN CYBER SECURITYDI KAWASAN ASIA
TENGGARA:SELF-HELP ATAU MULTILATERALISM?," vol. 3, p. 11, 2019.
[15] e. A. I Made Suartana, "abadimas197PENGENALAN PENTINGNYA CYBER
SECURITY AWARENESS PADA UMKM," vol. 5, p. 8, 2022.
[16] G. Rahmadi, "ANALISIS KESADARAN CYBER SECURITY PADA KALANGAN
PELAKU E-COMMERCE DI INDONESIA," p. 53, 2020.
[17] e. A. Wahyu Beny Mukti Setiyawan, "UPAYA REGULASI TEKNOLOGI INFORMASI
DALAM MENGHADAPI SERANGAN SIBER GUNA MENJAGA KEDAULATAN
NEGARA KESATUANREPUBLIK INDONESIA," vol. 3, p. 21, 2020.
[18] e. A. Ratnadi Hendra Wicaksana, " Studi Kebijakan Perlindungan Data Pribadi dengan
Narrative Policy Framework: Kasus Serangan Siber Selama Pandemi Covid-19," vol. 22, p.
16, 2020.
[19] A. Admi, "Penerapan Elastic StacksebagaiToolsAlternatifPemantauan Traffic Jaringan dan
HostpadaInstansi Pemerintahuntuk Memperkuat Keamanan dan Ketahanan Siber
Indonesia," vol. 5, p. 9, 2020.
[20] Bakrie, "PENGEMBANGAN KEAMANAN SIBER NASIONAL," p. 30, 2018.

You might also like