Strengthening Cybersecurity: A Comparative Analysis of Agile Governance in Preventing Data Leakage in Indonesia and Malaysia

Authors

  • Rasya Raditya Hariana International Program of Government Affairs and Administration, Universitas Muhammadiyah Yogyakarta, Indonesia
  • Efriza Nur Hadi International Program of Government Affairs and Administration, Universitas Muhammadiyah Yogyakarta, Indonesia
  • Adinda Putri Jamal Department of International Relations, Universitas Muhammadiyah Yogyakarta, Indonesia

Keywords:

Cybersecurity Governance, Data Protection, Policy Adaptation

Abstract

This research examines the implementation of Agile Governance in mitigating data breaches to strengthen cybersecurity by comparing strategies between Indonesia and Malaysia. As digital transformation accelerates, the risk of cyber threats, including data breaches, continues to increase. Using a comparative approach, this research analyzes the six key principles of Agile Governance: Good Enough Governance, Business-Driven, People-Focused, Based on Quick Wins, Systematic and Adaptive Approach, and Simple Design and Continuous Improvement. Findings show that Malaysia exhibits a more comprehensive cybersecurity framework, supported by early enacted regulations such as the Personal Data Protection Act (PDPA) of 2010, coordinated policies under the National Cyber Security Agency (NACSA), and structured response mechanisms such as MyCERT. In contrast, despite having implemented the Personal Data Protection Act (PDP Act) by 2022 and the role of the National Cyber and Crypto Agency (BSSN), Indonesia still faces regulatory gaps, weak inter-agency coordination, and inadequate infrastructure. This study highlights Malaysia's proactive stance in cybersecurity policy development and resource allocation, contrasting with Indonesia's continued improvements in digital security regulations and public awareness initiatives. The findings of this study suggest that Indonesia can adopt Malaysia's strategic regulatory approach and improve institutional coordination to enhance its cybersecurity resilience. This research contributes to the policy discussion to improve the national cybersecurity framework and calls for further studies on the effectiveness of policy implementation in reducing data breaches.

References

AD-INS. (2023). Memahami Kebocoran Data: Jenis, Penyebab & Dampaknya. AD-INS. https://www.ad-ins.com/id/our-story/kisah-adins/memahami-kebocoran-data-jenis-penyebab-dan-dampaknya/

Admin Aptika. (2022, October 13). Menkominfo: Keamanan Data Tanggung Jawab Seluruh Pemangku Kepentingan. KOMINFO. https://aptika.kominfo.go.id/2022/10/menkominfo-keamanan-data-tanggung-jawab-seluruh-pemangku-kepentingan/

Akoum, M., & Bu Hazzaa, H. (2019, October 21). A Data Governance Framework - The Foundation for Data Management Excellence. Day 2 Tue, October 22, 2019. https://doi.org/10.2118/198593-MS

Annur, C. M. (2022, September 13). Indeks Keamanan Siber Indonesia Peringkat ke-3 Terendah di Antara Negara G20. Databoks. https://databoks.katadata.co.id/teknologi-telekomunikasi/statistik/40085035d61073f/indeks-keamanan-siber-indonesia-peringkat-ke-3-terendah-di-antara-negara-g20

Azmi, I. M. A. G., & Zulhuda, S. P. W. J. S. (2012). Data leak, critical information infrastructure and the legal options: what does wikileaks teach us? International Journal of Cyber-Security and Digital Forensics, 1(3), 226–231.

Busri, Ihyani Malik, & Nur Wahid. (2023). Implementasi Agile Governance pada Reformasi Birokrasi 4.0 di Puslatbang KMP LAN Kota Makassar. Jurnal Administrasi Publik, 19(1), 85–119. https://doi.org/10.52316/jap.v19i1.134

Creswell, J. W. (2014). Research Design: Qualitative, Quantitative, and Mixed Methods Approaches (4th ed.). SAGE.

Dicoding Intern. (2023, May 17). Cyber Security: Pengertian, Jenis, dan Ancamannya. Dicoding. https://www.dicoding.com/blog/cyber-security-pengertian-jenis-dan-ancamannya/

digwatch. (2020, August). Malaysia Cybersecurity Strategy. Digwatch. https://dig.watch/resource/malaysia-cybersecurity-strategy

Fadli, M. R. (2021). Memahami desain metode penelitian kualitatif. HUMANIKA, 21(1), 33–54. https://doi.org/10.21831/hum.v21i1.38075

Firhansyah, M. (2021, February 15). Agile Governance dalam Perspektif Pelayanan Publik Propartif. OMBUDSMAN. https://ombudsman.go.id/artikel/r/artikel--agile-governance-dalam-perspektif-pelayanan-publik-propartif

Haris, A. (2024, June 5). 7 Fungsi CyberSecurity Malaysia. Log Masuk. https://logmasuk.my/cybersecurity-malaysia/

Harruma, I. (2022, September 16). Badan Siber dan Sandi Negara: Sejarah, Tugas dan Fungsinya. KOMPAS.Com. https://nasional.kompas.com/read/2022/09/16/05050021/badan-siber-dan-sandi-negara--sejarah-tugas-dan-fungsinya

Hidayat, R. (2020, August 11). Tiga Model Pembentukan Otoritas Independen Perlindungan Data Pribadi. Hukum Online.

Id-SIRTII/CC. (2018). Sejarah Id-SIRTII/CC. Id-SIRTII/CC. https://idsirtii.or.id/halaman/tentang/sejarah-id-sirtii-cc.html#:~:text=Menteri%20Komunikasi%20dan%20Informatika%20dalam%20hal%20ini%20menunjuk,melakukan%20pengawasan%20keamanan%20jaringan%20telekomunikasi%20berbasis%20protokol%20internet.

Indonesia.Go.Id. (2024, September 13). Masa Depan Ekonomi Digital Indonesia, Strategi Menuju 2030. Indonesia.Go.Id. https://indonesia.go.id/kategori/editorial/8497/masa-depan-ekonomi-digital-indonesia-strategi-menuju-2030?lang=1

JDIH BPK. (2022). Undang-undang (UU) Nomor 27 Tahun 2022 Tentang Pelindungan Data Pribadi. https://peraturan.bpk.go.id/Details/229798/uu-no-27-tahun-2022

Kementrian Digital Malaysia. (2010). UU Malaysia PDP 2010 • Perlindungan Data Pribadi. https://www.pdp.gov.my/ppdpv1/en/akta/pdp-act-2010/

Kurniawan, D. I., Maulana, A., & Wicaksono, I. (2021). AGILE GOVERNANCE SEBAGAI BENTUK TRANSFORMASI INOVASI PEMERINTAH DAERAH. Repository UNMUH Jember, 1–9. http://repository.unmuhjember.ac.id/9842/10/10.%20Artikel.pdf

Limanseto, H. (2023, December 4). Siapkan Guideline bagi Transformasi Digital, Pemerintah Segera Luncurkan Buku Putih Strategi Nasional Pengembangan Ekonomi Digital Indonesia 2030. KEMENTERIAN KOORDINATOR BIDANG PEREKONOMIAN REPUBLIK INDONESIA. https://www.ekon.go.id/publikasi/detail/5531/siapkan-guideline-bagi-transformasi-digital-pemerintah-segera-luncurkan-buku-putih-strategi-nasional-pengembangan-ekonomi-digital-indonesia-2030

Loviana, K. (2022). Cybersecurity and Cyber Resilience in Indonesia: Challenges and Opportunities. Center for Digital Society (CfDS), 1–5. https://cfds.fisipol.ugm.ac.id/wp-content/uploads/sites/1423/2022/05/Commentaries-Cybersecurity-and-Cyber-Resilience-in-Indonesia-English-2.pdf

Luna, A. J. H. de O., Kruchten, P., & Moura, H. (2015). Agile Governance Theory: conceptual development. 12th International Conference on Management of Technology and Information, 1–22. https://www.researchgate.net/publication/277141416_Agile_Governance_Theory_conceptual_development

Majlis Keselamatan Negara. (2020, October 19). Kerajaan lancar Strategi Keselamatan Siber Malaysia RM1.8 bilion. Majlis Keselamatan Negara. https://www.mkn.gov.my/web/ms/2020/10/19/kerajaan-lancar-strategi-keselamatan-siber-malaysia-rm1-8-bilion/

Muhamad, N. (2023, November 29). Indeks Keamanan Siber Indonesia Tertinggi ke-5 di ASEAN 2023. Databoks. https://databoks.katadata.co.id/teknologi-telekomunikasi/statistik/5bf8dbfb3998ee8/indeks-keamanan-siber-indonesia-tertinggi-ke-5-di-asean-2023#:~:text=Sementara%20itu%2C%20Malaysia%20dikukuhkan%20sebagai,peringkat%20ke%2D22%20secara%20global

Muñoz, J. L. R., Ojeda, F. M., Jurado, D. L. A., Peña, P. F. P., Carranza, C. P. M., Berríos, H. Q., Molina, S. U., Farfan, A. R. M., Arias-Gonzáles, J. L., & Vasquez-Pauca, M. J. (2022). Systematic Review of Adaptive Learning Technology for Learning in Higher Education. Eurasian Journal of Educational Research, 2022(98), 221–233. https://doi.org/10.14689/ejer.2022.98.014

Mutiarin, D., Wahdania C.S, N., & Misran. (2022). Formulation of e-Participation design in realizing agile government based on technology and information: A case study in Indonesia. International Conference on Public Organization (ICONPO 2021), 209 (Iconpo 2021), 207–214. https://www.atlantis-press.com/proceedings/iconpo-21/125970944

MyCERT. (2025). MyCERT: Peranan dan Tanggungjawab. MyCERT. https://www.mycert.org.my/portal/full?id=d8032294-04b2-4ba0-9e46-62c898bb4983

mydx.my. (2025). Department of Personal Data Protection. Mydx.My. https://mydx.my/directory/view/department-of-personal-data-protection#:~:text=Jabatan%20Perlindungan%20Data%20Peribadi%20%28JPDP%29%20is%20Malaysia%27s%20independent,Protection%20Act%202010%20%28PDPA%29%20and%20its%20associated%20regulations.

NACSA. (2024a). CYBER SECURITY ACT 2024 (ACT 854). NACSA. https://www.nacsa.gov.my/act854.php

NACSA. (2024b). National Cyber Security Agency (NACSA), Malaysia. Kementrian Digital Malaysia. https://www.nacsa.gov.my/

National Security Council. (2020). Malaysia Cyber Security Strategy 2020-2024. https://asset.mkn.gov.my/web/wp-content/uploads/sites/3/2019/08/MalaysiaCyberSecurityStrategy2020-2024Compressed.pdf

Oluwatoyin, F. A., & Adesola, O. A. (2024). Advancing Cybersecurity Governance: Adaptive Resilience and Strategic Third-Party Risk Management in Financial Services. World Journal of Advanced Research and Reviews, 24(2), 293–302. https://doi.org/10.30574/wjarr.2024.24.2.3312

Pillay, L., & Gowindasamy, M. (2024). People, processes, and technology in cybersecurity: Malaysian insights. In Recent Research in Management, Accounting and Economics (RRMAE) (pp. 633–635). Routledge. https://doi.org/10.4324/9781003606642-139

Prem, K. T. (2025). Implementing Adaptive Data Governance: A Technical Perspective. International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 11(1), 454–462. https://doi.org/10.32628/CSEIT25111244

Razi, F., Tuasikal, H., & Pratiwi Markus, D. (2024). Implementation and Challenges of the Personal Data Protection Law in Indonesia. Jurnal Indonesia Sosial Teknologi, 5(12), 6015–6021. https://doi.org/10.59141/jist.v5i12.1285

Rizkil, M., Herawati, A. R., & Santoso, S. (2024). Protection of Personal Data in the Use of Digital ID Cards against Misuse of Data from Cyber Hack. Journal La Sociale, 5(2), 471–478. https://doi.org/10.37899/journal-la-sociale.v5i2.1132

Rochman, F. (2024, January 8). Kemenkominfo latih lebih 24 juta orang tentang literasi digital. ANTARA. https://www.antaranews.com/berita/3905859/kemenkominfo-latih-lebih-24-juta-orang-tentang-literasi-digital#google_vignette

Shahul Ikram, N. A. H. (2024). DATA BREACHES EXIT STRATEGY: A COMPARATIVE ANALYSIS OF DATA PRIVACY LAWS. Malaysian Journal of Syariah and Law, 12(1), 135–147. https://doi.org/10.33102/mjsl.vol12no1.458

Sodiq, M. D., Supono, S., Hendri, F., & Ningsih, E. M. (2024). Kebijakan dan Regulasi Spionase Siber di Indonesia. Ideas: Jurnal Pendidikan, Sosial, Dan Budaya, 10(4), 1183. https://doi.org/10.32884/ideas.v10i4.1909

Suprastiyo, A., Warsono, H., & Astuti, R. S. (2023). Agile Governance Aplikasi Dalam Pelayanan Publik (N. Rismawati, Ed.). Widina Bhakti Persada. https://repository.penerbitwidina.com/media/publications/560156-agile-governance-aplikasi-dalam-pelayana-54702dbc.pdf

Surfshark. (2025, January 28). Data Breach Statistics Globally. https://surfshark.com/research/data-breach-monitoring

SWA. (2025, February 25). Bermitra dengan Komdigi dan BSSN, Platform Pencegahan Kejahatan Siber Resmi Diluncurkan. SWA. https://swa.co.id/read/456877/bermitra-dengan-komdigi-dan-bssn-platform-pencegahan-kejahatan-siber-resmi-diluncurkan

Vania, H. F. (2022, April 13). Kenalan Yuk dengan 4 Pilar Literasi Digital. Katadata.Co.Id. https://katadata.co.id/infografik/625689fbd47ce/kenalan-yuk-dengan-4-pilar-literasi-digital

Yogar, B. N. A., Mutiarin, D., & Eko Saputro, M. N. C. (2023). Jogja Smart Service as a Digital Public Services: Based on Agile Governance Perspective. INFOTECH : Jurnal Informatika & Teknologi, 4(1), 105–113. https://doi.org/10.37373/infotech.v4i1.562

Zaydi, M., Maleh, Y., Zaydi, H., Khourdifi, Y., Nassereddine, B., & Bakouri, Z. (2024). Agile security and compliance integration. In Agile Security in the Digital Era (pp. 68–91). CRC Press. https://doi.org/10.1201/9781003478676-4

Downloads

Published

2025-03-27

How to Cite

Rasya Raditya Hariana, Efriza Nur Hadi, & Adinda Putri Jamal. (2025). Strengthening Cybersecurity: A Comparative Analysis of Agile Governance in Preventing Data Leakage in Indonesia and Malaysia. Agile Governance and Innovation Measurement Journal, 2(1), 40–58. Retrieved from https://agim.umy.ac.id/index.php/agim/article/view/23

Issue

Section

Articles

Most read articles by the same author(s)

Obs.: This plugin requires at least one statistics/report plugin to be enabled. If your statistics plugins provide more than one metric then please also select a main metric on the admin's site settings page and/or on the journal manager's settings pages.