The Effectiveness of Utilizing Unmanned Aerial Vehicle (Uav) Technology in Supporting Security Operations in the Indonesia–Malaysia Land Border Area
DOI:
https://doi.org/10.57235/aurelia.v5i1.7948Keywords:
UAV, Border Security Indonesian Army, Indonesia–Malaysia Border.Abstract
This study examines the effectiveness of utilizing Unmanned Aerial Vehicle (UAV) technology in supporting land border security operations along the Indonesia–Malaysia border. The research addresses the increasing complexity of transnational threats that challenge conventional surveillance methods and require adaptive defense strategies. The objective of this study is to analyze the contribution of UAVs to border security operations, identify implementation constraints, and formulate optimization strategies for sustainable utilization. A qualitative descriptive-analytical method was employed, with data collected through in-depth interviews, field observations, and document analysis involving military operational units, border security task forces, and local stakeholders in the Kalimantan border area. The findings indicate that UAVs significantly enhance early detection, real-time aerial surveillance, and tactical decision-making. However, their effectiveness remains constrained by limited operator capability, inadequate infrastructure, and restricted logistical and budgetary support. The study concludes that integrating UAV systems into command and control structures, improving operator competence, and strengthening intersectoral cooperation are essential to establishing a modern and adaptive border security system.
Downloads
References
Akbar, R., Saptono, T., & Supriyatno, M. (2019). Border security cooperation between Indonesia and Malaysia in land border management. Journal of Defense Policy Studies, 5(2), 45–59.
Aelenei, C. (2001). Frontiers and boundaries: Geopolitical and legal perspectives. Oxford University Press.
Anggraini, D. (2020). Transnational crime and border security challenges in Southeast Asia. International Journal of Security Studies, 8(1), 77–90.
Arifin, M. (2021). Border area management and national security challenges in Indonesia. Indonesian Journal of Public Policy, 6(3), 101–114.
Beni, M., Sadewo, F., & Manggu, B. (2021). Socio-economic interaction in Indonesia–Malaysia border communities. Journal of Border Studies, 4(2), 59–72.
BNPP. (2022). Indonesia national border profile report. National Border Management Agency.
Creswell, J. W., & Poth, C. N. (2018). Qualitative inquiry and research design: Choosing among five approaches (4th ed.). Sage Publications.
Denzin, N. K. (2017). The research act: A theoretical introduction to sociological methods. Routledge.
Firmandes, R., & Yuwono, T. (2017). The role of UAV technology in border surveillance and security operations. Defense Technology Review, 9(2), 133–145.
Guo, R. (2005). Cross-border resource management and geopolitical dynamics. Routledge.
Harefa, M., Widodo, P., & Supriyatno, M. (2019). Development disparity and border security challenges in Kalimantan. Journal of Regional Development, 7(1), 88–102.
Miles, M. B., Huberman, A. M., & Saldaña, J. (2014). Qualitative data analysis: A methods sourcebook (3rd ed.). Sage Publications.
Posen, B. R. (1994). The sources of military doctrine: France, Britain, and Germany between the World Wars. Cornell University Press.
Prasetyo, A. (2022). Asymmetric threats and border security responses in Indonesia. Journal of National Security Studies, 10(1), 41–56.
Putra, R. (2019). Revolution in military affairs and the transformation of defense technology. Journal of Strategic Studies, 3(2), 66–79.
Rahmansyah, L. (2019). Smuggling and illegal trade in Indonesia–Malaysia border regions. Southeast Asian Security Journal, 2(1), 22–35.
Robbins, S. P., & Coulter, M. (2018). Management (13th ed.). Pearson Education.
Saragih, J. (2020). UAV deployment challenges in Indonesian military operations. Indonesian Defense Review, 5(1), 93–108.
Scott, W. R. (2003). Organizations: Rational, natural, and open systems (5th ed.). Prentice Hall.
Steers, R. M. (1985). Organizational effectiveness: A behavioral view. Goodyear Publishing.
Subagyo, H. (2021). The role of Indonesian Army border task forces in territorial security. Military Operations Journal, 4(3), 51–64.
Sugiyono. (2019). Metode penelitian kualitatif, kuantitatif, dan R&D. Alfabeta.
Wangke, H. (2018). Indonesia–Malaysia land border governance and security dynamics. Journal of ASEAN Studies, 6(2), 144–158.
Wibowo, A. (2021). UAV applications in modern military surveillance. Defense Science Journal, 12(1), 29–44.
Yusuf, A. (2022). Institutional and operational constraints in UAV military adoption. Journal of Defense Management, 9(2), 73–89.
Downloads
Published
Issue
Section
Citation Check
License
- Authors certify that the work reported here has not been published before and contains no materials the publication of which would violate any copyright or other personal or proprietary right of any person or entity.
- Authors dont transfer or license the copyright of publishing to AURELIA: Jurnal Penelitian dan Pengabdian Masyarakat Indonesia Research to publish the article in any media format, to share, to disseminate, to index, and to maximize the impact of the article in any databases.
- Authors hereby dont agree to transfer a copyright for publishing to AURELIA: Jurnal Penelitian dan Pengabdian Masyarakat Indonesia a Publisher of the manuscript.
- Authors reserve the following:
- all proprietary rights other than copyright such as patent rights;
- the right to use all or part of this article in future works of our own such as in books and lectures;
- use for presentation in a meeting or conference and distributing copies to attendees;
- use for internal training by author's company;
- distribution to colleagues for their research use;
- use in a subsequent compilation of the author's works;
- inclusion in a thesis or dissertation;
- reuse of portions or extracts from the article in other works (with full acknowledgement of final article);
- preparation of derivative works (other than commercial purposes) (with full acknowledgement of final article); and
- voluntary posting on open web sites operated by author or author’s institution for scholarly purposes, but it should follow the open access license of Creative Common CC BY-NC License.










