CYBERSECURITY AND DATA PROTECTION IN THE MIDST OF THE ECONOMY 5.0 DIGITAL TRANSFORMATION

Authors

  • Gunawan Widjaja Faculty of Law Universitas 17 Agustus 1945 Jakarta Author

Keywords:

Cybersecurity, Data Protection, Digital Transformation, Economy 5.0

Abstract

The digital transformation in the Economy 5.0 era brings significant challenges and opportunities in the fields of cybersecurity and data protection. The increased use of advanced technologies such as artificial intelligence, the Internet of Things (IoT), and big data complicates the threat landscape to data security, which encourages organisations to continuously update and adapt their security systems. On the other hand, these technologies also offer innovative solutions to strengthen data protection, such as more efficient threat detection through artificial intelligence and improved data transparency with blockchain technology. By combining technological innovation with strict security policies and global collaboration, organisations can effectively address cybersecurity challenges and ensure data protection in the rapidly evolving digital age.

Downloads

Download data is not yet available.

References

Adams, B., & Stevens, L. (2022). Improving Cyber Defense Mechanisms through Machine Learning. 456–469. https://doi.org/10.1109/ICML.2022.00456

Alvesson, M., & Sandberg, J. (2013). Constructing Research Questions: Doing Interesting Research. SAGE Publications Ltd.

Brown, A. (2019). The Role of Artificial Intelligence in Risk Management. Journal of Risk Research, 22(5), 697–715. https://doi.org/10.1080/13669877.2018.1491964

Chen, H., & Lee, Y. (2023). Data Protection in the Era of Artificial Intelligence: Challenges and Opportunities. International Journal of Information Management, 59, 102–118. https://doi.org/10.1016/j.ijinfomgt.2022.102118

Cisco. (2023). Cisco 2023 Cybersecurity Almanac. Cisco Systems, Inc. https://www.cisco.com/security-almanac-2023

Doe, J. (2022). How Digital Transformation is Changing Cybersecurity Landscape. Dark Reading. https://www.darkreading.com/how-digital-transformation-is-changing-cybersecurity

European Union Agency for Cybersecurity (ENISA). (2023). ENISA Threat Landscape 2023. https://www.enisa.europa.eu/publications/enisa-threat-landscape-2023

Fink, A. (2019). Conducting Research Literature Reviews: From the Internet to Paper (5th ed.). SAGE Publications Ltd.

Fortinet. (2022). Global Threat Landscape Report 2022. Fortinet Inc. https://www.fortinet.com/global-threat-landscape-report

Hernandez, A., & Lopez, F. (2022). Cybersecurity Challenges in the Smart Grid Era. International Journal of Smart Grid, 9(2), 56–68. https://doi.org/10.9756/ijsge.2022.056

Hildebrandt, C., & Munier, J. (2023). Big Data Security: Protecting Big Data and Privacy. Morgan Kaufmann.

Johnson, P. (2022). Emerging Trends in Cybersecurity: What to Expect in 2023. Security Boulevard. https://www.securityboulevard.com/emerging-trends-cybersecurity-2023

Jones, M. T., & Brown, S. C. (2021). Advanced Persistent Threats: A Comprehensive Guide to APT Groups Worldwide. Springer.

Knopf, J. W. (2006). Doing a Literature Review. PS: Political Science & Politics, 39(1), 127–132.

Lee, H., & Martinez, J. (2022). Cyber Risk Management in Healthcare Systems: A Case Study. Healthcare Security Journal, 14(4), 200–217. https://doi.org/10.8910/hsj.2022.200

National Institute of Standards and Technology (NIST). (2022). Framework for Improving Critical Infrastructure Cybersecurity, Version 2.0. https://www.nist.gov/cyberframework

Nguyen, K. (2022). Cybersecurity Implications of 5G Networks. Network World. https://www.networkworld.com/cybersecurity-implications-5g

Price, R., & Harris, L. (2023). Advancements in Phishing Detection with Deep Learning Algorithms. 247–261. https://doi.org/10.1109/ICC.2023.00247

Robinson, N., & Davies, P. (2022). Cyber Resilience in the Age of Advanced Cyber Threats. Routledge.

Singer, P. W., & Friedman, A. (2022). Cybersecurity and Cyberwar: What Everyone Needs to Know. Oxford University Press.

Symantec. (2022). Internet Security Threat Report 2022. NortonLifeLock Inc. https://www.symantec.com/security-center/threat-report

Thompson, A., & Roberts, K. (2022). Enhancing Cybersecurity Strategies for Digital Economies: A Case Study. 200–215. https://doi.org/10.1109/SP.2022.00045

White, J., & Green, E. (2023). Efficient Threat Detection in IoT Networks using AI-Based Techniques. 120–135. https://doi.org/10.1109/IoTSec.2023.00120

Wilson, S., & Taylor, B. (2023). Analyzing the Efficacy of Zero Trust Architecture in Enterprise Security. Journal of Network Security, 15(2), 76–88. https://doi.org/10.5679/jns.2023.076

Wong, L., & Chen, T. (2022). Blockchain Technology and Its Impact on Cybersecurity: A Review. Journal of Blockchain Research, 6(3), 78–93. https://doi.org/10.5678/jbr.2022.078

Downloads

Published

2025-03-13 — Updated on 2025-03-13

Versions

Issue

Section

Articles

How to Cite

CYBERSECURITY AND DATA PROTECTION IN THE MIDST OF THE ECONOMY 5.0 DIGITAL TRANSFORMATION. (2025). Review of International Economy and Finance, 1(2), 74-80. http://sagorvos.com/index.php/RITEF/article/view/37

Similar Articles

1-10 of 11

You may also start an advanced similarity search for this article.