SWOT Analysis in Determining POLRI Organizational Resource Strategies to Anticipate the Development of Cyber Crime in the Framework of Maintaining National Security

Authors

  • Azis Andriansyah School of Strategic and Global Studies, University of Indonesia
  • Edmon Makarim School of Strategic and Global Studies, University of Indonesia
  • Yudho Giri Sucahyo School of Strategic and Global Studies, Universitas Indonesia, Indonesia
  • Chairul Muriman Setyabudi School of Strategic and Global Studies, Universitas Indonesia, Indonesia

DOI:

https://doi.org/10.1229/tecempresarialjournal.v18i1.191

Keywords:

SWOT, Organizational Resources, Cybercrime.

Abstract

The purpose of this research is to formulate appropriate alternative organizational resource strategies and policies for the Republic of Indonesia Police to anticipate the development of cyber-crime in order to maintain Kamdagri using the SWOT (Strength, Weakness, Opportunity, Threat) analysis method. The SWOT analysis is carried out using the IFE (Internal Factor Evaluation) matrix which describes the strengths and weaknesses of POLRI and the EFE (External Factor Evaluation) matrix which outlines the opportunity and threat factors and the IE (Internal External) matrix which shows the current position of Indonesian Police Agency. The last is the determination of strategic choices that can be made based on the strategic position of the Republic of Indonesia Police organization. The strategic choices suggested in this study are to make policies at the national strategic level in the short to long term, increase human resource capacity in the short term and form a team of experts and make performance evaluations for handling cyber cases in the medium term.

References

Al-Khater, W. A., Al-Maadeed, S., Ahmed, A. A., Sadiq, A. S., & Khan, M. K. (2020). Comprehensive review of cybercrime detection techniques. IEEE Access, 8, 137293-137311.

Anderson, R., Barton, C., Bölme, R., Clayton, R., Ganán, C., Grasso, T., ... & Vasek, M. (2019). Measuring the changing cost of cybercrime.

Barn, R., & Barn, B. (2016). An Ontological Representation of a Taxonomy for cybercrime. In Proceedings of the 24th European Conference on Information Systems (ECIS 2016), Istanbul, Turkey, 12–15 June 2016.

Black, A., Lumsden, K., & Hadlington, L. (2019). ‘Why Don’t You Block Them?’Police Officers’ Constructions of the Ideal Victim When Responding to Reports of Interpersonal Cybercrime. Online Othering: Exploring Digital Violence and Discrimination on the Web, 355-378.

Bossler, A. M., & Berenblum, T. (2019). Introduction: new directions in cybercrime research. Journal of Crime and Justice, 42(5), 495-499.

Buil-Gil, D., Miró-Llinares, F., Moneva, A., Kemp, S., & Díaz-Castaño, N. (2021). Cybercrime and shifts in opportunities during COVID-19: a preliminary analysis in the UK. European Societies, 23(sup1), S47-S59.

Cascavilla, G., Tamburri, D. A., & Van Den Heuvel, W. J. (2021). Cybercrime threat intelligence: A systematic multi-vocal literature review. Computers & Security, 105, 102258.

Chang, Y. C. (2012). Cybercrime in the Greater China Region: Regulatory Responses and Crime Prevention across the Taiwan Strait. Edward Elgar Publishing.

Culp III, K., Eastwood, C., Turner, S., Goodman, M., & Ricketts, K. G. (2016). Using a SWOT analysis: Taking a look at your organization [2016].

Fahlevi, M., Saparudin, M., Maemunah, S., Irma, D., & Ekhsan, M. (2019). Cybercrime business digital in Indonesia. In E3S Web of Conferences (Vol. 125, p. 21001). EDP Sciences.

Gurel, M., & TAT, M. (2017) SWOT Analysis: A Theoretical Review. The Journal of International Social Research, 10(1).

Hawdon, J., Parti, K., & Dearden, T. E. (2020). Cybercrime in America amid COVID-19: The initial results from a natural experiment. American Journal of Criminal Justice, 45(4), 546-562.

ICMEC. (2017). Online Grooming of Children for Sexual Purposes: Model Legislation & Global Review; International Centre for Missing & Exploited Children: Alexandria, VA, USA,

Jeyaraj, K. L., Muralidharan, C., Senthilvelan, T., & Deshmukh, S. G. (2012). Application of SWOT and Principal Component Analysis in a Textile Company-A Case Study. International Journal of Engineering Research and Development, 1(9), 46-54.

Kshetri, N. (2019). Cybercrime and cybersecurity in Africa. Journal of Global Information Technology Management, 22(2), 77-81.

McGuire, M. (2019). It Ain't What It Is, It's the Way That They Do It? Why We Still Don't Understand Cybercrime. In The Human Factor of Cybercrime (pp. 3-28). Routledge.

McGuire, M., & Dowling, S. (2013). Cyber Crime: A Review of the Evidence. Summary of key Findings and Implications. Home Office Research report, 75, 1-35.

Monteith, S., Bauer, M., Alda, M., Geddes, J., Whybrow, P. C., & Glenn, T. (2021). Increasing Cybercrime Since the Pandemic: Concerns for Psychiatry. Current psychiatry reports, 23, 1-9.

Namugenyi, C., Nimmagadda, S. L., & Reiners, T. (2019). Design of a SWOT Analysis Model and Its Evaluation in Diverse Digital Business Ecosystem Contexts. Procedia Computer Science, 159, 1145-1154.

Nichifor, E., Lixăndroiu, R. C., Sumedrea, S., Chițu, I. B., & Brătucu, G. (2021). How can SMEs Become More Sustainable? Modelling the M-Commerce Consumer Behaviour with Contingent Free Shipping and Customer Journey’s Touchpoints Optimisation. Sustainability, 13(12), 6845.

Ommani, A. R. (2011). Strengths, Weaknesses, Opportunities and Threats (SWOT) Analysis for Farming System Businesses Management: Case of Wheat Farmers of Shadervan District, Shoushtar Township, Iran. African Journal of Business Management, 5(22), 9448.

Paoli, L., Visschers, J., Verstraete, C., & Van Hellemont, E. (2018). The impact of cybercrime on Belgian businesses. Intersentia.

PAYNe, B. K., & Hadzhidimova, L. (2020). Disciplinary and Interdisciplinary Trends in Cybercrime Research: An Examination. International Journal of Cyber Criminology, 14(1), 81-105.

Phadermrod, B., Crowder, R. M., & Wills, G. B. (2019). Importance-performance analysis based SWOT analysis. International Journal of Information Management, 44, 194-203.

Phillips, K., Davidson, J. C., Farr, R. R., Burkhardt, C., Caneppele, S., & Aiken, M. P. (2022). Conceptualizing Cybercrime: Definitions, Typologies and Taxonomies. Forensic Sciences, 2(2), 379-398.

Polit, D. F., & Beck, C. T. (2004). Nursing Research: Principles and Methods. Lippincott Williams & Wilkins.

Sammut-Bonnici, T., & Galea, D. (2015) SWOT Analysis, Chapter Published in: Wiley Encyclopedia of Management, John Wiley & Sons Ltd. DOI: 10.1002/9781118785317.WEOM120103.

Sarre, R., Lau, L. Y. C., & Chang, L. Y. (2018). Responding to cybercrime: current trends. Police practice and research, 19(6), 515-518.

Viano, E. C. (2017). Cybercrime, Organized Crime, and Societal Responses. Int. approaches, Basel, 1103.

Wow Essay (2009), Top Lycos Networks, Available at: http://www.wowessays.com/dbase/ab2/nyr90.shtml

Downloads

Published

2023-05-17

How to Cite

Andriansyah, A., Makarim, E., Sucahyo, Y. G., & Setyabudi, C. M. (2023). SWOT Analysis in Determining POLRI Organizational Resource Strategies to Anticipate the Development of Cyber Crime in the Framework of Maintaining National Security. TEC EMPRESARIAL, 18(1), 464–477. https://doi.org/10.1229/tecempresarialjournal.v18i1.191