cover
Contact Name
Stanislaus Riyanta
Contact Email
sitjournal09@gmail.com
Phone
-
Journal Mail Official
adminjurnal@sitjournal.com
Editorial Address
Jln. Dr. Sutomo, No. 9, Pasar Baru, Jakarta Pusat
Location
Kota adm. jakarta pusat,
Dki jakarta
INDONESIA
Security Intelligence Terrorism Journal (SITJ)
ISSN : -     EISSN : 30637473     DOI : https://doi.org/10.70710/sitj
Core Subject : Social,
Security Intelligence Terrorism Journal (SITJ) is a leading journal focused on the role of intelligence and secretive agencies in international relations and counterterrorism
Articles 5 Documents
Search results for , issue "Vol. 1 No. 1 (2024)" : 5 Documents clear
Enhancing Security through Intelligent Threat Detection and Response: The Integration of Artificial Intelligence in Cyber-Physical Systems Al Waro'i, Muhammad Nur Abdul Latif
Security Intelligence Terrorism Journal (SITJ) Vol. 1 No. 1 (2024)
Publisher : Pusat Studi Politik dan Kebijakan Strategis Indonesia (POLKASI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70710/sitj.v1i1.1

Abstract

Cyber-Physical Systems (CPS) play a crucial role in critical industries such as manufacturing, transportation, energy, and healthcare by integrating the physical and digital worlds. However, the complexity and interconnectivity of CPS with the global network increase their vulnerability to cyber-attacks. This research explores the benefits of implementing artificial intelligence (AI) in the context of cyber-physical systems (CPS) to detect and respond to security threats. This study uses machine learning and deep learning techniques to analyze sensor data and system threats. The data analysis methods encompass predictive modeling and evaluating AI algorithms' performance in detecting threats. The research data is obtained from relevant literature reviews and secondary data analysis. The research findings indicate that integrating AI in CPS can enhance the success rate of threat detection, prompt response, and accuracy in threat identification. By enabling the system to learn from previous experiences, AI can reduce the number of false positives and false negatives while providing automated real-time responses to threats without human intervention. The research concludes that AI has great potential to enhance security in CPS by providing more efficient and effective solutions to address increasingly complex cyber threats. The findings of this study are expected to provide insights and recommendations that can be applied in developing CPS security systems in the future.
Terrorism as a Transnational Crime that Threatens Indonesia Marzio, Aldy
Security Intelligence Terrorism Journal (SITJ) Vol. 1 No. 1 (2024)
Publisher : Pusat Studi Politik dan Kebijakan Strategis Indonesia (POLKASI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70710/sitj.v1i1.3

Abstract

This paper aims to (1) analyze Indonesia's vulnerability against terrorism; and (2) analyze efforts to counter-terrorism in Indonesia. In compiling this paper, the author collected secondary data in the form of written documentaries, namely mass media articles, journal articles and relevant books. The study results indicate that terrorism is a transnational crime with a major threat to the nation and state. In Indonesia there have been several acts of suicide bombing terrorism in the name of religious teachings. Suicide bomb terrorists consider this to be a sacred duty that is obligatory and of great benefit to their group. Indonesia's vulnerability to terrorism is determined by demographic, geographic, economic and ideological factors. Advances in information and communication technology and the increase in the number of internet users in Indonesia can also provide opportunities for cyberterrorism to occur. In carrying out counter-terrorism, the Indonesian government implements pre-emptive, preventive and repressive efforts. One of the counter-terrorism programs that raises pros and cons in Indonesian society is the involvement of the TNI. According to the author, the TNI should only be involved in counter-terrorism assistance if the National Police and BNPT experience difficulties or obstacles. A military counter-terrorism approach has the potential to violate human rights, especially against parties who are merely suspected of having been exposed to radical ideology.
An Academic Analysis of Digital Transformation: A Comprehensive Review of Literature and Business Strategies Fadhlurrahman, Muhammad Alfi
Security Intelligence Terrorism Journal (SITJ) Vol. 1 No. 1 (2024)
Publisher : Pusat Studi Politik dan Kebijakan Strategis Indonesia (POLKASI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70710/sitj.v1i1.4

Abstract

The idea of digital transformation has an impact on many different facets of business. The goal of this study is to examine how digital transformation affects businesses, industries, and society as a whole, with a particular emphasis on business models, operational procedures, and customer experience. To examine the definitions, components, pillars, and important facets of digital transformation, this study uses a literature review methodology. The review's findings show that using digital technology to modernize corporate processes and improve productivity, responsiveness, and creativity is included in the concept of digital transformation. The components of digital transformation are also described in this study, including business models, digital platforms, employee experience, customer experience, and operational procedures within the organization. The customer experience, business models, and operational procedures of the organization are the three primary pillars of digital transformation. In addition, there are five essential components of digital transformation: value, data, customers, competition, and innovation. In a connected and quickly evolving business environment, digital transformation is becoming more and more significant, and firm executives need to have a long-term vision to take advantage of the potential.
False Reality: Deepfakes in Terrorist Propaganda and Recruitment Al Waro'i, Muhammad Nur Abdul Latif
Security Intelligence Terrorism Journal (SITJ) Vol. 1 No. 1 (2024)
Publisher : Pusat Studi Politik dan Kebijakan Strategis Indonesia (POLKASI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70710/sitj.v1i1.5

Abstract

Deepfake technology, which leverages artificial intelligence to create hyper-realistic digital fabrications, has emerged as a significant threat across various domains, notably in terrorism. This review critically examines the exploitation of deepfakes in terrorist propaganda and recruitment, presenting a systematic analysis of the technical mechanisms behind their creation and detection, historical and contemporary propaganda methods, and their psychological impacts on audiences. The study identifies key advancements in deepfake detection technologies, such as ensemble learning and convolutional neural networks, which are crucial in distinguishing real from synthetic media. Furthermore, the review highlights the importance of public awareness and psychological resilience as vital countermeasures against deepfake manipulation. Despite technological advancements, significant challenges remain, including the development of real-time detection systems capable of operating in diverse and uncontrolled environments and a comprehensive understanding of the psychological processes affected by deepfake propaganda. The review underscores the urgent need for robust policy frameworks and international cooperation to address the ethical, legal, and security implications of deepfake technology. By integrating technical, psychological, and policy perspectives, this study provides a holistic understanding of deepfake technology's role in modern terrorism and offers insights for developing effective countermeasures. The comprehensive approach aims to contribute to the creation of robust strategies to mitigate the misuse of deepfake technology, ensuring a safer and more trustworthy digital environment.
Strategies For Addressing The Spillover Effect Of Mosaic Warfare In The South China Sea Conflict To Achieve National Security Stability Alwi, Muhamad Bashori; Suhanda, Chairi; Setiawan, Dany; Ricky, Muchamad; Hadawang, Rusdyanto
Security Intelligence Terrorism Journal (SITJ) Vol. 1 No. 1 (2024)
Publisher : Pusat Studi Politik dan Kebijakan Strategis Indonesia (POLKASI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70710/sitj.v1i1.6

Abstract

The South China Sea is a strategic area rich in natural resources and a crucial international shipping and trade route, making it a focal point of territorial disputes between China, the Philippines, Vietnam, Malaysia, Brunei, and Taiwan. This conflict escalates tensions and the potential spillover effects of mosaic warfare that can impact Indonesia's national security and stability. This journal analyzes the strategic implications of the South China Sea conflict for Indonesia, exploring defensive and proactive strategies to mitigate risks and enhance national resilience. This research uses a qualitative descriptive approach based on historical analysis and content analysis, successfully identifying key areas of concern such as increased maritime security risks, the need for enhanced military capabilities, and the importance of regional and international cooperation. Proposed strategies include increased diplomatic engagement, strengthening defense capabilities, intelligence and security technology cooperation, and diversifying economic and trade routes. Indonesia must adopt a multifaceted and proactive strategy to protect its interests amidst regional instability, strengthen diplomatic relations within ASEAN and globally, enhance military and surveillance capabilities, and ensure economic resilience against potential disruptions in maritime trade routes. Public education and adherence to international law are also crucial for maintaining regional peace and security.

Page 1 of 1 | Total Record : 5