<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE root>
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:ali="http://www.niso.org/schemas/ali/1.0/" article-type="research-article" dtd-version="1.2" xml:lang="en"><front><journal-meta><journal-id journal-id-type="publisher-id">RUDN Journal of Studies in Literature and Journalism</journal-id><journal-title-group><journal-title xml:lang="en">RUDN Journal of Studies in Literature and Journalism</journal-title><trans-title-group xml:lang="ru"><trans-title>Вестник Российского университета дружбы народов. Серия: Литературоведение. Журналистика</trans-title></trans-title-group></journal-title-group><issn publication-format="print">2312-9220</issn><issn publication-format="electronic">2312-9247</issn><publisher><publisher-name xml:lang="en">Peoples’ Friendship University of Russia named after Patrice Lumumba (RUDN University)</publisher-name></publisher></journal-meta><article-meta><article-id pub-id-type="publisher-id">44342</article-id><article-id pub-id-type="doi">10.22363/2312-9220-2025-30-1-186-198</article-id><article-id pub-id-type="edn">URUQPH</article-id><article-categories><subj-group subj-group-type="toc-heading" xml:lang="en"><subject>JOURNALISM</subject></subj-group><subj-group subj-group-type="toc-heading" xml:lang="ru"><subject>Журналистика</subject></subj-group><subj-group subj-group-type="article-type"><subject>Research Article</subject></subj-group></article-categories><title-group><article-title xml:lang="en">Enduring Cybersecurity and Transitional Justice Aftermath of West Papua and Papua’s Internet Shutdown in 2019</article-title><trans-title-group xml:lang="ru"><trans-title>Обеспечение кибербезопасности и правосудия  переходного периода после отключения интернета  в Западном Папуа - Новой Гвинее в 2019 году</trans-title></trans-title-group></title-group><contrib-group><contrib contrib-type="author"><contrib-id contrib-id-type="orcid">https://orcid.org/0009-0001-1588-8052</contrib-id><name-alternatives><name xml:lang="en"><surname>Pramesti</surname><given-names>Adelisca</given-names></name><name xml:lang="ru"><surname>Прамешти</surname><given-names>Аделиска</given-names></name></name-alternatives><bio xml:lang="en"><p>Master’s Student in the Defense Management Program, Department of Defense Management</p></bio><bio xml:lang="ru"><p>магистр программы «Управление обороной», департамент управления обороной</p></bio><email>pramesti.adelisca@gmail.com</email><xref ref-type="aff" rid="aff1"/></contrib><contrib contrib-type="author"><contrib-id contrib-id-type="orcid">https://orcid.org/0000-0002-9644-9245</contrib-id><name-alternatives><name xml:lang="en"><surname>Almubaroq</surname><given-names>Hikmat Z.</given-names></name><name xml:lang="ru"><surname>Альмубарок</surname><given-names>Хикмат Закки</given-names></name></name-alternatives><bio xml:lang="en"><p>Head of the Master’s Program in Defense Management, Department of Defense Management</p></bio><bio xml:lang="ru"><p>руководитель магистерской программы по управлению обороной, департамент управления обороной</p></bio><email>zakkyauri94@gmail.com</email><xref ref-type="aff" rid="aff1"/></contrib><contrib contrib-type="author"><contrib-id contrib-id-type="orcid">https://orcid.org/0000-0003-4375-5246</contrib-id><name-alternatives><name xml:lang="en"><surname>Herawati</surname><given-names>Aloysia V.</given-names></name><name xml:lang="ru"><surname>Херавати</surname><given-names>Алоизия Вира</given-names></name></name-alternatives><bio xml:lang="en"><p>Researcher, Teacher Researcher in Pedagogy, Lecturer, Faculty of Law</p></bio><bio xml:lang="ru"><p>научный сотрудник, преподаватель-исследователь в области педагогики, юридический факультет</p></bio><email>vira@staff.ubaya.ac.id</email><xref ref-type="aff" rid="aff2"/></contrib><contrib contrib-type="author"><contrib-id contrib-id-type="orcid">https://orcid.org/0000-0001-6005-2505</contrib-id><contrib-id contrib-id-type="spin">8571-8231</contrib-id><name-alternatives><name xml:lang="en"><surname>Bulgarova</surname><given-names>Bella A.</given-names></name><name xml:lang="ru"><surname>Булгарова</surname><given-names>Белла Ахмедовна</given-names></name></name-alternatives><bio xml:lang="en"><p>PhD in Philology, Associate Professor, Department of Mass Communication, RUDN University; Professor, Department of Digital Media, College of Arts, Alnoor University</p></bio><bio xml:lang="ru"><p>кандидат филологических наук, доцент кафедры массовых коммуникаций, Российский университет дружбы народов; профессор кафедры цифровых медиа, Колледж гуманитарных наук, Университет Альнур</p></bio><email>bulgarova-ba@rudn.ru</email><xref ref-type="aff" rid="aff3"/><xref ref-type="aff" rid="aff4"/></contrib></contrib-group><aff-alternatives id="aff1"><aff><institution xml:lang="en">The Republic of Indonesia Defense University</institution></aff><aff><institution xml:lang="ru">Университет обороны</institution></aff></aff-alternatives><aff-alternatives id="aff2"><aff><institution xml:lang="en">University of Surabaya</institution></aff><aff><institution xml:lang="ru">Университет Сурабая</institution></aff></aff-alternatives><aff-alternatives id="aff3"><aff><institution xml:lang="en">RUDN University</institution></aff><aff><institution xml:lang="ru">Российский университет дружбы народов</institution></aff></aff-alternatives><aff-alternatives id="aff4"><aff><institution xml:lang="en">Alnoor University</institution></aff><aff><institution xml:lang="ru">Университет Альнур</institution></aff></aff-alternatives><pub-date date-type="pub" iso-8601-date="2025-04-16" publication-format="electronic"><day>16</day><month>04</month><year>2025</year></pub-date><volume>30</volume><issue>1</issue><issue-title xml:lang="en"/><issue-title xml:lang="ru"/><fpage>186</fpage><lpage>198</lpage><history><date date-type="received" iso-8601-date="2025-05-24"><day>24</day><month>05</month><year>2025</year></date></history><permissions><copyright-statement xml:lang="en">Copyright ©; 2025, Pramesti A., Almubaroq H.Z., Herawati A.V., Bulgarova B.A.</copyright-statement><copyright-statement xml:lang="ru">Copyright ©; 2025, Прамешти А., Альмубарок Х.З., Херавати А.В., Булгарова Б.А.</copyright-statement><copyright-year>2025</copyright-year><copyright-holder xml:lang="en">Pramesti A., Almubaroq H.Z., Herawati A.V., Bulgarova B.A.</copyright-holder><copyright-holder xml:lang="ru">Прамешти А., Альмубарок Х.З., Херавати А.В., Булгарова Б.А.</copyright-holder><ali:free_to_read xmlns:ali="http://www.niso.org/schemas/ali/1.0/"/><license><ali:license_ref xmlns:ali="http://www.niso.org/schemas/ali/1.0/">https://creativecommons.org/licenses/by-nc/4.0</ali:license_ref></license></permissions><self-uri xlink:href="https://journals.rudn.ru/literary-criticism/article/view/44342">https://journals.rudn.ru/literary-criticism/article/view/44342</self-uri><abstract xml:lang="en"><p>The Internet shutdown in West Papua and Papua, in 2019 as an example of the Ministry of Communications and Informatics of the Republic of Indonesia failure to balance national security and digital freedoms. The Internet shutdown was suppress and control the flow of information has been criticized as an authoritarian strategy that undermines human rights and digital freedoms, further deepening mistrust between the state and citizens. The Ministry needs to refrain from abusing their powers and ensure that cybersecurity regulations do not violate civil liberties, as excessive restrictions weaken democratic values. Emphasized the Ministry’s failure to comply with cybersecurity standards, which has led to human rights violations and manipulation of perceptions of national security, ultimately damaging Indonesia’s reputation. Finally, the article highlights the value of long-term relationships in transitional justice, justifying the need for a human-centered approach to institutional transformation within the framework of national cybersecurity initiatives. This article highlights the importance of transparency, accountability, and the protection in preventing future abuses. This article calls for a reevaluation of cybersecurity practices for digital freedoms, emphasizing the necessity of transparent and inclusive policies that reflect democratic principles.</p></abstract><trans-abstract xml:lang="ru"><p>Отключение интернета в Западном Папуа и Новой Гвинее рассматривается как пример неспособности министерства связи и информатизации Республики Индонезия сбалансировать национальную безопасность и цифровые свободы. Отключение интернета подверглось критике как авторитарная стратегия, которая подрывает права человека и цифровые свободы, создавая и углубляя недоверие между государством и гражданами. Государству (в данном случае министерству) необходимо воздержаться от злоупотребления своими полномочиями и гарантировать, что правила кибербезопасности не нарушат гражданские свободы, поскольку чрезмерные ограничения ослабляют демократические ценности. Показывается несоблюдение государством (министерством) стандартов кибербезопасности, что привело к нарушениям прав человека и манипулированию восприятием национальной безопасности, а в конечном итоге нанесло ущерб репутации Индонезии. Подчеркивается ценность долгосрочных отношений в переходном правосудии, обосновывается необходимость подхода, ориентированного на человека, институциональной трансформации в рамках национальных инициатив по кибербезопасности, важность прозрачности, подотчетности и защиты в предотвращении будущих злоупотреблений. Авторы призывают к переоценке практик кибербезопасности для цифровых свобод, указывая на необходимость прозрачной и инклюзивной политики, отражающей демократические принципы.</p></trans-abstract><kwd-group xml:lang="en"><kwd>media</kwd><kwd>human rights</kwd><kwd>digital freedom</kwd><kwd>Indonesia</kwd><kwd>communication</kwd><kwd>cybersecurity standards</kwd><kwd>mediasafety</kwd></kwd-group><kwd-group xml:lang="ru"><kwd>СМИ</kwd><kwd>права человека</kwd><kwd>цифровая свобода</kwd><kwd>Индонезия</kwd><kwd>коммуникация</kwd><kwd>стандарты кибербезопасности</kwd><kwd>медиабезопасность</kwd></kwd-group><funding-group/></article-meta></front><body></body><back><ref-list><ref id="B1"><label>1.</label><mixed-citation>Aulund, M.L. (2012). Transitional justice for Papua: Lessons to be learned from Indonesian experiences? [Master’s thesis in the Theory and Practice of Human Rights]. University of Oslo. https://www.duo.uio.no/handle/10852/34051</mixed-citation></ref><ref id="B2"><label>2.</label><mixed-citation>Davis, L. (2009). Transitional justice and security system reform. Initiative for Peacebuilding Paper. International Centre for Transitional Justice. https://www.peacewomen.org/assets/file/Resources/NGO/recon_transjusticessr_ictj_2009.pdf</mixed-citation></ref><ref id="B3"><label>3.</label><mixed-citation>De Gregorio, G., &amp; Stremlau, N. (2020). Internet shutdowns and the limits of law. International Journal of Communication, 14, 4224–4243. https://ssrn.com/abstract=3622928</mixed-citation></ref><ref id="B4"><label>4.</label><mixed-citation>Glasius, M., &amp; Michaelsen, M. (2018). Illiberal and authoritarian practices in the digital sphere: Prologue. International Journal of Communication, 12, 3795–3813. https://ijoc.org/index.php/ijoc/article/view/8899/2459</mixed-citation></ref><ref id="B5"><label>5.</label><mixed-citation>Hadi, I.S., Arfani, R.N., &amp; Ikhwan, H. (2022). Dynamics of People, State, and Cyber Power in the Internet Shutdown Policy at Papua and West Papua in 2019. In 3rd International Media Conference 2021 (pp. 234–248). Atlantis Press. https://doi.org/10.2991/assehr.k.220705.025</mixed-citation></ref><ref id="B6"><label>6.</label><mixed-citation>Ireton, C., &amp; Posetti, J. (Eds.). (2018). Journalism, fake news &amp; disinformation: Handbook for journalism education and training. United Nations Educational, Scientific and Cultural Organization.</mixed-citation></ref><ref id="B7"><label>7.</label><mixed-citation>Lee, A. (2020). Online hoaxes, existential threat, and Internet shutdown: A case study of securitization dynamics in Indonesia. Journal of Indonesian Social Sciences and Humanities, 10(1), 17–34. https://ejournal.brin.go.id/jissh/article/view/8650/6664</mixed-citation></ref><ref id="B8"><label>8.</label><mixed-citation>Liaropoulos, A. (2015). A human-centric approach to cybersecurity: Securing the human in the era of cyberphobia. Journal of Information Warfare, 14(4), 15–24.</mixed-citation></ref><ref id="B9"><label>9.</label><mixed-citation>Lowrie, J. (2015). Cybersecurity: A primer of U.S. and international legal aspects. In T.A. Johnson (Ed.), Cybersecurity: Protecting critical infrastructures from Cyber attack and cyber warfare (pp. 199–251). CRC Press.</mixed-citation></ref><ref id="B10"><label>10.</label><mixed-citation>Pavlova, P. (2020). Human Rights-based Approach to Cybersecurity: Addressing the Security Risks of Targeted Groups. Peace Human Rights Governance, 4(3), 391–418. https://doi.org/10.14658/PUPJ-PHRG-2020-3-4</mixed-citation></ref><ref id="B11"><label>11.</label><mixed-citation>Riebe, T., &amp; Reuter, C. (2019). Dual-Use and Dilemmas for Cybersecurity, Peace and Technology Assessment. In C. Reuter (Ed.), Information Technology for Peace and Security (pp. 165–183). Wiesbaden: Springer Vieweg. https://doi.org/10.1007/978-3-658-25652-4_8</mixed-citation></ref><ref id="B12"><label>12.</label><mixed-citation>Ryng, J., Guicherd, G., Saman, J.A., Choudhury, P., &amp; Kellett, A. (2022). Internet Shutdowns: A Human Rights Issue. The RUSI Journal, 167(4/5), 50–63. https://doi.org/10.1080/03071847.2022.2156234</mixed-citation></ref><ref id="B13"><label>13.</label><mixed-citation>Shah, N. (2021). (Dis)information Blackouts: Politics and Practices of Internet Shutdowns. International Journal of Communication, 15, 2693–2709. https://ijoc.org/index.php/ijoc/article/view/13977/3466</mixed-citation></ref><ref id="B14"><label>14.</label><mixed-citation>Snyder, H. (2019). Literature review as a research methodology: An overview and guidelines. Journal of Business Research, 104, 333–339. https://doi.org/10.1016/j.jbusres. 2019.07.039</mixed-citation></ref><ref id="B15"><label>15.</label><mixed-citation>Thumfart, J. (2024). Digital Rights and the State of Exception. Internet Shutdowns from the Perspective of Just Securitization Theory. Journal of Global Security Studies, 9(1).https://doi.org/10.1093/jogss/ogad024</mixed-citation></ref><ref id="B16"><label>16.</label><mixed-citation>Wagner, B. (2018). Understanding Internet Shutdowns: A Case Study from Pakistan. International Journal of Communication, 12(1), 22. https://ijoc.org/index.php/ijoc/article/view/8545</mixed-citation></ref><ref id="B17"><label>17.</label><mixed-citation>Zartman, I.W. (2008). Negotiation and conflict: Essays on theory and practice. Routledge.</mixed-citation></ref></ref-list></back></article>
