Cybersecurity Vulnerabilities at the Indonesia–Papua New Guinea Border: Securitization Asymmetry, Institutional Gaps, and Diplomatic Escalation
Abstract
This study aims to examine how cybersecurity vulnerabilities at the bilateral border between Indonesia and Papua New Guinea (PNG) create risks of diplomatic crises through institutional gaps and asymmetric threat perceptions. By adopting a qualitative research approach, and drawing on securitization theory and constructivism in IR, this article reveals four key findings. First, Indonesia and PNG lack formal bilateral agreements on cyber incident response and attribution procedures. Second, asymmetric securitization exists whereby Indonesia over-securitizes cyber threats while PNG under-securitizes them, creating misaligned threat perceptions. Third, the absence of shared norms prevents a coordinated bilateral response. Fourth, historical trust deficits facilitate rapid escalation from technical incidents to diplomatic crises. Theoretically, these findings demonstrate how securitization asymmetry operates at the bilateral level, and practically, they identify mechanisms for preventing cyber incidents from disrupting diplomatic stability in the Indo-Pacific.
KEYWORDS
Border; Cybersecurity Vulnerabilities; Indonesia; Papua New Guinea; Securitization Asymmetry
Downloads
References
Abrar, A. N. (2021). The role of collaborative journalism in westpapua a jubi and tirto case study. Pacific Journalism Review, 27(1–2), 119–131. https://doi.org/10.24135/pjr.v27i1and2.1174
Adeyeri, A., & Abroshan, H. (2024). Geopolitical Ramifications of Cybersecurity Threats: State Responses and International Cooperations in the Digital Warfare Era. Information. https://doi.org/https://doi.org/10.3390/info15110682
Alaeifar, P., Pal, S., Jadidi, Z., Hussain, M., & Foo, E. (2024). Current approaches and future directions for Cyber Threat Intelligence sharing: A survey. Journal of Information Security and Applications, 83, 103786. https://doi.org/10.1016/j.jisa.2024.103786
Albaheth, H. E. (2025). Cybercrime Risks in Cross-Border Investment Contracts: Legal Challenges and Regulatory Responses in Commercial and Investment Law. International Journal of Cyber Criminology, 19(1), 138–153. https://doi.org/10.5281/zenodo.476619107
Aria, N. (2025). The Power of Ideas: A Constructivist Reinterpretation of Security in International Relations. Journal of Social Sciences and Humanities, 2(3), 18–36. https://doi.org/10.62810/jssh.v2i3.120
Arslan, A. S. (2024). Neorealist Analysis of Security Dilemma in Cyberspace: A Quantitative Study. APSA Preprints. https://doi.org/https://doi.org/10.33774/apsa-2023-wvw2z-v6
ASEAN. (2025). ASEAN-IPR Regional Conference on Cybersecurity and the Role of Information Technology in Fostering a Culture of Peace in ASEAN. ASEAN Institute for Peace and Reconciliation (ASEAN-IPR). https://asean-aipr.org/activities/conferences/asean-ipr-regional-conference-on-cybersecurity-and-the-role-of-information-technology-in-fostering-a-culture-of-peace-in-asean
ASEAN. (2024). Blue Book 2024: European Union and the Association of Southeast Asian Nations (EU–ASEAN Partnership).
Asemki, Y., Nurmandi, A., & Muallidin, I. (2023). The Dynamics of Cyber-Activists in the Digital Era of Papua, Indonesia. Lecture Notes in Networks and Systems, 464, 377–388. https://doi.org/10.1007/978-981-19-2394-4_35
Berawi, M. A., Miraj, P., & Sidqi, H. (2017). Plastic degrading fungi Trichoderma viride and Aspergillus nomius isolated from Nouban, F. and Abazid, M. (2017). Plastic degrading fungi Trichoderma viride and Aspergillus nomius isolated from local landfill soil in Medan, Iopscience.Iop.Org,. Iopscience.Iop.Org, 8(February 2018), 68–74.
Bowen, G. A. (2017). Document Analysis as a Qualitative Research Method. Qualitative Research Journal, 9(2). https://doi.org/10.46743/2160-3715/1992.2039
Braun, V., & Clarke, V. (2021). Can I use TA? Should I use TA? Should I not use TA? Comparing reflexive thematic analysis and other pattern-based qualitative analytic approaches. Counselling and Psychotherapy Research, 21(1), 37–47.
Buchanan, B. (2017). The Cybersecurity Dilemma: Where Thucydides Meets Cyberspace. Council on Foreign Relations Blog. https://www.cfr.org/blog/cybersecurity-dilemma-where-thucydides-meets-cyberspace
Buchkovska, K. (2025). Cyber Diplomacy: Securing the (Digital) Future. Journal of Law and Politics, 6(1), 97–108. https://doi.org/10.69648/qpko3766
Busetti, S., & Scanni, F. M. (2025). Evaluating incident reporting in cybersecurity. From threat detection to policy learning. Government Information Quarterly, 42(1), 102000. https://doi.org/10.1016/j.giq.2024.102000
Buzan, B., Wæver, O., & de Wilde, J. (1998). Security: A New Framework for Analysis. Lynne Rienner Publishers.
CCB. (2021). Cybersecurity Strategy Belgium 2.0 2021-2025 (Issue May 2021). https://share.google/CsZKFy8Ai0kA9cJnZ
Central Bureau of Statistics of Papua Province. (2025). Perkembangan Ekspor dan Impor Provinsi Papua, Mei 2025. https://papua.bps.go.id/id/pressrelease/2025/07/01/1154/perkembangan-ekspor-dan-impor-provinsi-papua--mei-2025.html?utm_source=
Chaudhuri, A., Sarkar, S., & Bala, P. K. (2025). Thematic Exploration and Analysis of Cybersecurity Policies of Businesses: An NLP-Based Approach. Journal of Organizational Computing and Electronic Commerce, 35(2), 157–187. https://doi.org/10.1080/10919392.2024.2435115
CIRIS. (2024). Norm Cascade in International Relations. CIRIS Learning Center. https://www.ciris.info/learningcenter/norm-cascade-in-international-relations/
Communications Security Establishment Canada. (2024). National Cyber Threat Assessment 2025-2026.
Costa, G. Da. (2024). Indonesia, Papua New Guinea strengthen defense ties with training, border security initiatives. IP Defense Forum. https://ipdefenseforum.com/2024/08/indonesia-papua-new-guinea-strengthen-defense-ties-with-training-border-security-initiatives/
Darmastuti, S., Nidatya, N., Saraswati, D. P., & Rahmalia, A. N. (2026). Political Economy of Cross-Border Trade Between Indonesia and Malaysia: Local Product Opportunities and Challenges in West Kalimantan. JWP (Jurnal Wacana Politik), 11(1), 1-14.
De Mattos, C., Salciuviene, L., & Sanderson, S. (2025). Can conflict be a desirable step in trust-building within international strategic alliances? A systematic literature review and typology: Positive employment of conflicts in alliances. Journal of International Management, 31(2), 1-36. https://doi.org/10.1016/j.intman.2025.101234
Dept of Information & Communication Technology. (2023). National Cyber Security Strategy 2024 – 2030. Department of Information & Communications Technology, Papua New Guinea. https://www.ict.gov.pg/ncss/
Dunn, C. M. (2014). Breaking the Cyber-Security Dilemma: Aligning Security Needs and Removing Vulnerabilities. Science and Engineering Ethics, 20(3), 701–715. https://doi.org/10.1007/s11948-014-9551-y
Fixler, A. (2025, April 29). Shaping the Future of Cyber Diplomacy: Review for State Department Reauthorization – Written Testimony. https://www.fdd.org/analysis/2025/04/29/shaping-the-future-of-cyber-diplomacy/
FP Analytics. (2025). Ransomware Rising: Confronting the fastest-growing cybercrime through international cooperation. Digital Front Lines (Sub-Site Dari FP Analytics). https://digitalfrontlines.io/2025/09/03/ransomware-rising/
Grzybowski, J. (2019). The paradox of state identification: De facto states, recognition, and the (re-)production of the international. International Theory, 11(3), 241–263. https://doi.org/10.1017/S1752971919000113
Gunawan, B., Nurisnaeny, P. S., Kaprisma, H., & Ratmono, B. M. (2024). Border Security in Intelligence Perspective: A Bibliometric Analysis (1985-2022). Proceedings of the International Seminar on Border Region (INTSOB 2023), Intsob 2023, 28–38. https://doi.org/10.2991/978-2-38476-208-8_6
Habibie, S. Y., Rudiyanto, & Said, B. D. (2025). Navigating Asymmetric Interdependence: s Neoliberal Institutionalist Perspective on ASEAN-China Ties. International Journal of Progressive Sciences and Technologies (IJPSAT), 49(1), 1–10.
Harefa, F., & Supriyadi, A. A. (2025). Leadership strategies for enhancing border security in Papua: A collaborative approach to surveillance and threat management. Journal of National Paradigm-Based Resilience Strategy, 2(1), 1–16. https://doi.org/https://doi.org/10.61511/napbres.v2i1.2025.1731
Hutagalung, S. (2024, December 20). Asia-Pacific At A Crossroads: Addressing Conflict In Key Geopolitical Hotspots – Analysis. Eurasia Review. https://www.eurasiareview.com/20122024-asia-pacific-at-a-crossroads-addressing-conflict-in-key-geopolitical-hotspots-analysis/
Jervis, R. (1978). Cooperation Under the Security Dilemma. World Politics, 20(2), 167–214. https://doi.org/https://doi.org/10.2307/2009958
Johnson, B., & Ziogas, A. (2024, December 11). Instability in Pacific politics? Yes, but it’s stable instability. The Strategist (Australian Strategic Policy Institute). https://www.aspistrategist.org.au/instability-in-pacific-politics-yes-but-its-stable-instability/
Joshi, A., Moschetta, G., Winslow, E., Buys, W., & Herrmann, A. (2025). Global Cybersecurity Outlook 2025 (Issue January).
Kaifa, U., Yaseen, D. Z., & Muzaffar, D. M. (2025). A thematic analysis of Pakistan’s cybersecurity policies, regulations and implications. Journal of Climate and Community Development, 4(1), 39-54.
Kaneko, J. (2024). What constitutes bilateral intergovernmental technical cooperation in the financial-sector?: towards the development of a systematic methodology. Cogent Social Sciences, 10(1). https://doi.org/10.1080/23311886.2024.2404686
Karyotis, G., Paterson, I., & Judge, A. (2025). Understanding Securitization Success: A New Analytical Framework. International Studies Review, 27(1). https://doi.org/10.1093/isr/viaf006
Kello, L. (2017). The Security Dilemma of Cyberspace: Ancient Logic, New Problems. Lawfare (Lawfare Institute). https://www.lawfaremedia.org/article/security-dilemma-cyberspace-ancient-logic-new-problems
Kia, L. (2024). Papua New Guinea Makes Major Leap in Global Cybersecurity Rankings. Department of Information and Communications Technology, Papua New Guinea. https://www.ict.gov.pg/22922/
Korwa, J., & Rumabar, B. (2024). Challenges ahead for Indonesia-PNG cross-border cooperation. Devpolicy Blog, Development Policy Centre. https://devpolicy.org/challenges-ahead-for-indonesia-png-cross-border-cooperation-20240918/?utm_source=chatgpt.com
Lutfie, R. Z., & Suharjimantoro, S. (2025). Political Dynamics And Policy Implications Of Indonesia-Australia Border Management. JWP (Jurnal Wacana Politik), 10(1). https://doi.org/https://doi.org/10.24198/jwp.v10i1.59186
Mahroza, S., Priyanto, & Halkisy, M. (2022). Asymmetric Diplomacy and Securitization in The South China Sea. Andalas Journal of International Studies, 11(1), 94–107. https://doi.org/https://doi.org/10.25077/ajis.11.1.94-107.2022
Marles, R., Wong, P., Sugiono, & Sjamsoeddin, S. (2025, August 28). Joint Statement on the Ninth Australia-Indonesia Foreign and Defence Ministers’ 2+2 Meeting. Department of Defence, Australia. https://www.minister.defence.gov.au/statements/2025-08-28/joint-statement-ninth-australia-indonesia-foreign-defence-ministers-22-meeting
Metherall, N., Fretes, D. R. De, Mandibondibo, F., & Caucau, T. (2022). Assessing the Development Impact of the Sota Border Post Connecting Indonesia and Papua New Guinea. Papua Journal of Diplomacy and International Relations, 2(2). https://doi.org/10.31957/pjdir.v2i2.2209
Moniz, E. de A. (2025). The Journal of Academic Science Cybersecurity Governance in ASEAN: Building a Regional Cyber-Emergency Response Framework. The Journal of Academic Science, 2(11), 2356–2366.
Natanegara, A. H., Budiman, L., & Nidhal, M. (2023). Understanding the regulatory environment for ICT infrastructure in Papua New Guinea. Center for Indonesian Policy Studies, 16.
Ndubuisi, A. F. (2022). Cross-border jurisdiction challenges in prosecuting cybercrime syndicates targeting national financial and electoral systems. International Journal of Engineering Technology Research & Management, 6(11), 243–261.
Nugroho, Y. (2024, August 8). Indonesia’s National Data Centre Ransomware Attack: A Digital Governance Failure? Iseas Yusof Ishak Institute. https://fulcrum.sg/indonesias-national-data-centre-ransomware-attack-a-digital-governance-failure/
Nurisnaeny, P. S., Mubaroq, S. R., Kaprisma, H., Perdana, I. A., & Budiman, R. (2025). Developing an AI-Enhanced Maritime Border Security Framework: A Case Study of Indonesia-Malaysia Border at Sebatik Island. Sosiohumaniora, 26(3), 453–467. https://doi.org/10.24198/sosiohumaniora.v26i3.60820
Oppenheimer, H. (2023). The Failed Digital State Problem? Capacity Gaps and Managing Internet Externalities. https://share.google/inUHGQjjbwwLbOoIy
Oyadeyi, O. O., Oyadeyi, O. A., & Bello, R. O. (2024). Cybercrime in the Asia-Pacific Region: A Case Study of Commonwealth APAC Countries. Commonwealth Cyber Journal, June, 130–160.
Praditya, E., Maarif, S., Ali, Y., Saragih, H. J. R., Duarte, R., Suprapto, F. A., & Nugroho, R. (2023). National Cybersecurity Policy Analysis for Effective Decision-Making in the Age of Artificial Intelligence. Journal of Human Security, 19(2), 91–106.
Pugu, M. R., Yani, Y. M., & Wardhana, W. (2019). Pembangunan Infrastruktur Di Perbatasan Papua: Upaya Menjamin Human Security Dan Melawan Perdagangan Illegal Lintas Batas. Masyarakat Indonesia, 45(1), 76-92.
Pugu, M. R., & Pusung, M. (2025). Socio-Economic Dynamics at the Border: A Case Study of the Sota, Merauke Cross-Border Post and Its Implications for Cooperation with Papua New Guinea. Journal of Social Research, 4(10), 2637–2647. https://doi.org/https://doi.org/10.55324/josr.v4i9.2782
Putra, M. E. (2022). Review of the Internet Blocking Case in Papua in Cyber Law Perspective. Lampung Journal of International Law, 4(1), 47–52. https://doi.org/10.25041/lajil.v4i1.2524
Raditio, K.H., & Choiruzzad. (2024). Dynamics in the Indo-Pacific: From Geopolitics and Geoeconomics Perspectives (Eds). The Habibie Center (THC). https://share.google/j78Lm6qcuar85SH93
Radu, R. (2025). Countering Ransomware: Government Responses in a Comparative Perspective. International Conference on Cyber Conflict, CYCON, 14333, 91–108. https://doi.org/10.23919/CyCon65856.2025.11103717
Rainforest Rescue. (2025, August 7). Indonesia: The future of Papua hangs in the balance. Rainforest Rescue. https://www.rainforest-rescue.org/updates/14119/indonesia-the-future-of-papua-hangs-in-the-balance
Robinson, R. (2024, June 21). Cyber Diplomacy: A New Frontier in International Relations and Professional Practice. ComplexDiscovery. https://complexdiscovery.com/cyber-diplomacy-a-new-frontier-in-international-relations-and-professional-practice/
Rosert, E. (2024). Effects of international norms: A typology. Journal of International Political Theory, 20(1), 22–40. https://doi.org/10.1177/17550882231184275
Rupp, C., & Paulus, A. (2023). Official Public Political Attribution of Cyber Operations (Issue October).
Shaikh, R. K., Anjum, R., & Barkat, A. (2026). Cyber-Security Beyond Borders: Unraveling Cross-Jurisdictional Legal Complexities in Cyberspace. Advance Social Science Archive Journal, 05(01), 334–352. https://doi.org/https://doi.org/10.5281/zenodo.18301634
Silva, C. C. V., & Pereira, A. E. (2024). Securitization theory and its empirical application: a literature review. Revista de Sociologia e Politica, 32, 1-22. https://doi.org/10.1590/1678-98732432e019
Sjoberg, L., Constructivist, S. D., Approaches, C., Barkin, J. S., & Sjoberg, L. (2019). Book review: J. Samuel Barkin, Laura Sjoberg, International Relations’ Last Synthesis? Decoupling Constructivist and Critical Approaches, New York 2019, pp. 224. Polish Political Science Yearbook, 48(2), 375–376. https://doi.org/https://doi.org/10.15804/ppsy2019212
Souisa, H., & Renaldi, E. (2025, October 9). Indonesia urges respect for its sovereignty after Australia-PNG defence treaty. ABC News. https://www.abc.net.au/news/2025-10-10/indonesia-responded-pukpuk-defence-agreement-australia-png/105869738
Sumadinata, R. W. S., Achmad, W., & Riyadi, S. F. (2022). Indonesian Border Defense Policy: A Case Study on the Interoperability of the joint regional defense command. Central European Management Journal, 30, 886–895.
The European Union Agency for Cybersecurity. (2024). Best practices for cyber crisis management (Issue February). https://op.europa.eu/publication/manifestation_identifier/PUB_TP0523461ENN
The U.S. Intelligence Community. (2025). Annual Threat Assessment of the U.S. Intelligence Community 2025 (Issue March). https://www.dni.gov/files/ODNI/documents/assessments/ATA-2025-Unclassified-Report.pdf
Thumfart, J. (2022). The (Il)legitimacy of Cybersecurity. An Application of Just Securitization Theory to Cybersecurity based on the Principle of Subsidiarity. Applied Cybersecurity and Internet Governance, 1(1), 1–24. https://doi.org/10.5604/01.3001.0016.1093
Wallis, J., McNeill, H., Batley, J., & Powles, A. (2025). Security Cooperation in the Pacific Islands (J. Wallis, H. McNeill, J. Batley, & A. Powles (eds.)). Routledge.
Wendt, A. (1995). Constructing international politics. International security, 20(1), 71-81.
Wibowo, S. E., Hartono, A., Kiswanto, H., Primawanti, H., & Louerens, J. T. A. (2024). Securitization of Cyber Threats to the Indonesian Government:A Study of Cyber Defense Strategy. Global Political Studies Journal, 8(2), 97–108. https://doi.org/10.34010/gpsjournal.v8i2.13817
Wickham, D. (2025, May 2). Manele under threat: the political crisis in Solomon Islands. Devpolicy Blog, Development Policy Centre. https://devpolicy.org/manele-under-threat-the-political-crisis-in-solomon-islands-20250502/
Yuniar, A. (2025, September 8). Collaboration is the key to Indonesia cyber resilience: BSSN. GovInsider Asia. https://govinsider.asia/intl-en/article/collaboration-is-the-key-to-indonesia-cyber-resilience-bssn
Zhang, H., Yang, C., Deng, X., & Luo, C. (2025). How Authoritative Media and Personal Social Media Influence Policy Compliance Through Trust in Government and Risk Perception: Quantitative Cross-Sectional Survey Study. Journal of Medical Internet Research, 27, 1–16. https://doi.org/10.2196/64940
Published
Issue
Section
Copyright (c) 2026 Papua Journal of Diplomacy and International Relations

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.


















. 