Abstract :
The rising cybersecurity threats have made Security Operation Centers (SOCs) essential for Indonesian finance companies to protect sensitive data and ensure regulatory compliance. This study explores factors influencing SOC adoption, implementation challenges, and strategies to improve adoption rates. Using a mixed-method approach, it combines survey data and interviews with cybersecurity professionals. Findings reveal that subjective norms and top management support are key drivers, while budget constraints and a lack of skilled personnel pose significant challenges. Recommendations include strengthening management support, leveraging norms, investing in training, and optimizing vendor selection. The study offers practical and theoretical insights for enhancing cybersecurity resilience, with future research suggesting longitudinal studies, cross-sector analysis, and regulatory compliance exploration.
Keywords :
Cybersecurity, Security Operations Center (SOC), Technology Acceptance Model (TAM), Technology Adoption, Theory of Planned Behavior (TPB)References :
- Alam, S. S. (2012). Intention to Use Renewable Energy: Mediating role of Attitude. Energy Research Journal, 3(2), 37–44. https://doi.org/10.3844/erjsp.2012.37.44
- Alharbi, S. A. (2020). A qualitative study on security operations centers in saudi arabia: Challenges and research directions. Journal of Theoretical and Applied Information Technology, 98(24), 3972–3982. www.jatit.org
- Atmojo, T. A., Prabowo, H., So, I. G., & Abdinagoro, S. B. (2019). Improving information security performance: the role of management support and security operation center. International Journal of Recent Technology and Engineering, 8(2), 4880–4886. https://doi.org/10.35940/ijrte.B3653.078219
- Bandara, U. C., & Amarasena, T. S. M. (2018). Impact of Relative Advantage, Perceived Behavioural Control and Perceived Ease of Use on Intention to Adopt with Solar Energy Technology in Sri Lanka. Proceedings of the Conference on the Industrial and Commercial Use of Energy, ICUE, 2018-October. https://doi.org/10.23919/ICUE-GESD.2018.8635706
- BBC News Indonesia. (2024). Pusat Data Nasional Sementara lumpuh akibat ransomware, mengapa instansi pemerintah masih rentan terhadap serangan siber? https://www.bbc.com/indonesia/articles/cxee2985jrvo
- Cheng, E. W. L. (2019). Choosing between the theory of planned behavior (TPB) and the technology acceptance model (TAM). Educational Technology Research and Development, 67(1), 21–37. https://doi.org/10.1007/s11423-018-9598-6
- Furnell, S. M., Clarke, N., Werlinger, R., Hawkey, K., & Beznosov, K. (2009). An integrated view of human, organizational, and technological challenges of IT security management. Information Management & Computer Security, 17(1), 4–19. https://doi.org/10.1108/09685220910944722
- Hasan, S., Godhuli, E. R., Rahman, M. S., & Mamun, M. A. Al. (2023). The adoption of conversational assistants in the banking industry: is the perceived risk a moderator? Heliyon, 9(9), e20220. https://doi.org/10.1016/j.heliyon.2023.e20220
- IBM Security. (2024). X-Force Threat Intelligence Index 2024.
- (2023). Perjalanan Kasus BSI, dari Gangguan Layanan sampai “Hacker” Minta Tebusan. https://money.kompas.com/read/2023/05/17/072027926/perjalanan-kasus-bsi-dari-gangguan-layanan-sampai-hacker-minta-tebusan?page=all
- Lai, P. (2017). The literature review of technology adoption models and theories for the novelty technology. Journal of Information Systems and Technology Management, 14(1), 21–38. https://doi.org/10.4301/s1807-17752017000100002
- Li, X., Dai, J., Zhu, X., Li, J., He, J., Huang, Y., Liu, X., & Shen, Q. (2023). Mechanism of attitude, subjective norms, and perceived behavioral control influence the green development behavior of construction enterprises. Humanities and Social Sciences Communications, 10(1), 1–13. https://doi.org/10.1057/s41599-023-01724-9
- Li, Y., & Liu, Q. (2021). A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments. Energy Reports, 7, 8176–8186. https://doi.org/10.1016/j.egyr.2021.08.126
- Lloyd, G. (2020). The business benefits of cyber security for SMEs. Computer Fraud & Security.
- Majid, M., & Ariffi, K. (2019). Success Factors for Cyber Security Operation Center (SOC) Establishment. https://doi.org/10.4108/eai.18-7-2019.2287841
- Michail, A. (2015). Security Operations Centers – A Business Perspective. 94. http://dspace.library.uu.nl/bitstream/handle/1874/315912/Security Operations Centers – A Business Perspective.pdf
- Miloslavskaya, N. (2016). Security operations centers for information security incident management. Proceedings – 2016 IEEE 4th International Conference on Future Internet of Things and Cloud, FiCloud 2016, January, 131–138. https://doi.org/10.1109/FiCloud.2016.26
- Peraturan Bank Indonesia Nomor 2 Tahun 2024 (2024).
https://www.bi.go.id/id/publikasi/peraturan/Pages/PBI_022024.aspx
- Shankar Bhosale, S. (2021). Research Paper on Cyber Security. June.
- Yigitbasioglu, O. M. (2015). The role of institutional pressures and top management support in the intention to adopt cloud computing solutions. Journal of Enterprise Information Management, 28(4), 579–594.
https://doi.org/10.1108/JEIM-09-2014-0087