Cyber Diplomacy And Protection Measures Against Threats Of Information Communication Technology In Indonesia
DOI:
https://doi.org/10.18196/jiwp.v5i2.12242Keywords:
Cyber Diplomacy, Indonesia, Information Communication Technology, Protection, ThreatsAbstract
This article attempts to explain the forms of Indonesian cyber diplomacy related to the protection of the use of information technology. In this case, Indonesia as the fourth largest country in the world often gets cyber threats and attacks. This was then followed up with efforts to protect it domestically, but was constrained by threats from abroad.
The research method used in this study uses a qualitative descriptive analytical approach using the theoretical framework of cyber diplomacy and the concept of information and communication technology. The case analysis will explain the causes and effects of holding Indonesian cyber diplomacy based on secondary data. The author finds that the Indonesian government does not only use a legal approach through the ITE Law, but also culture, technological renewal, and diplomacy towards various countries.
References
Bisnis.com. Ancaman Siber Indonesia Terbanyak Kelima Se-Asia Pasifik. Retrived from https://teknologi.bisnis.com/read/20190306/84/896967/ancaman-siber-di-indonesia-terbanyak-kelima-se-asia-pasifik on 24 June 2021.
Badan Siber dan Sandi Negara. Building a National Soft-Power on Cyber Space Through Cyber Diplomacy. Retrived from https://bssn.go.id/building-a-national-soft-power-on-cyber-space-through-cyber-diplomacy/ on 24 June 2021.
Babbie, E. (2008). The Basics of Social Research. Belmont: Thomson Wadsworth.
Cahyadi, Indra. (2016) Cyber Governance and Threat of National Sovereignty. Politica. No. 7, Vol. 2.
Chotimah, Hidayat Chusnul; Iswardhana, Muhammad Ridha; Pratiwi Tiffany Setyo. (2019). Penerapan Military Confidence Building Measures dalam Menjaga Ketahanan Nasional Indonesia di Ruang Siber. Jurnal Ketahanan Nasional. Vol. 25. No. 3.
CNN Indonesia. (2019). 51 Negara Dukung turan Keamanan Siber Global. Retrived from https://www.cnnindonesia.com/teknologi/20181113075756-185-346044/51-negara-dukung-aturan-keamanan-dunia-siber-global on 25 June 2021.
CNN Indonesia. (2021). INFOGRAFIS: Rentetan Kebocoran Data di Indonesia Sejak 2020. Retrived from https://www.cnnindonesia.com/teknologi/20210523132216-188-645888/infografis-rentetan-kebocoran-data-di-indonesia-sejak-2020 on 25 June 2021.
Danuri, Muhammad dan Suharnawi. (2017). Tren Cyber Crime dan Teknologi Informasi di Indonesia. Infokam, No.2.
Direktorat Jenderal Peraturan Perundang-Undangan. Hukum Teknologi Informasi. Retrived from http://ditjenpp.kemenkumham.go.id/hukum-teknologi/668-dinamika-konvergensi-hukum-telematika-dalam-sistem-hukum-nasional.html on 24 June 2021.
Ersya, Muhammad Prima. (2017). Permasalahan Hukum dalam Menanggulangi Cyber Crime di Indonesia. Journal of Moral and Civic Education Edisi 2017.
Fahmi, Novrizal. (2018). Melawan Aksi Terorisme di Media Sosial: Penggunaan Tagar #KamiTidakTakut di Twitter. Jurnal Komunika. Vo.1. No.1.
Febriansyah, Ferry Irawan & Purwinatro, Halda Septiana. (2020). Pertanggungjawaban Pidana bagi Pelaku Ujaran Kebencian di Media Sosial. Jurnal Penelitian Hukum De Jure. Vol.20. No.2.
Harian Ekonomi Neraca. (2019). Menyikapi Positif Perkembangan Dunia Cyber. Retrived from http://www.neraca.co.id/article/87868/menyikapi-positif-perkembangan-dunia-cyber on 24 June 2021.
Hodzic, N. (2017). Cyber-Diplomacy: Framing the Transformation. Budapest: Central European University.
Ishak dan Dermawan, Deni. (2019). Teknologi Pendidikan. Bandung: PT. Remaja Rosdakarya.
Infokomputer. (2021). Pengguna Internet Indonesia Terbesar ke-4 di Dunia Ini Tantangannya. Retrived from https://infokomputer.grid.id/read/122756150/pengguna-internet-indonesia-terbesar-ke-4-di-dunia-ini-tantangannya on 24 June 2021.
Jawa Pos. (2019). Kaleidoskop 2019: Karena Berita Hoax Kerusuhan Wamena Pecah. Retrived from https://www.jawapos.com/nasional/28/12/2019/kaleidoskop-2019-karena-berita-hoax-kerusuhan-wamena-pecah/ on 24 June 2021.
Juditha, Christiany. (2018). Interaksi Komunikasi Hoax di Media Sosial serta Antisipasinya Hoax Communication Interactivity in Social Media and Anticipation. Jurnal Pekommas. Vol. 3. No. 1.
Junaedi, Fajar. (2010). Relasi Terorisme dan Media. Jurnal ASPIKOM. Vo.1. No.1.
Kementerian Komunikasi dan Informasi. (2018). Tingkatkan Koordinasi Proteksi Keamanan Siber di Indonesia. Retrived from https://kominfo.go.id/content/detail/14605/ciip-id-summit-2018-tingkatkankoordinasi-proteksi-keamanan-siberindonesia/0/sorotan_media on 25 June 2021.
Kementerian Luar Negeri Republik Indonesia. (2018). LAKIP Kemenlu.
Kittichaisaree, Kriangsak. (2017). Public International Law of Cyberspace. Switzerland: Springer International Publishing.
Kompas.com. (2020). Akankah Work From Home Jadi Tren Setelah Pandemi Covid-19 Berakhir?. Retrived from https://www.kompas.com/tren/read/2020/04/21/070400465/akankah-work-from-home-jadi-tren-setelah-pandemi-covid-19-berakhir-?page=all on 25 June 2021.
Kompas.com. (2021). 7 Kasus Kebocoran Data yang Terjadi Sepanjang 2020. Retrived from https://tekno.kompas.com/read/2021/01/01/14260027/7-kasus-kebocoran-data-yang-terjadi-sepanjang-2020?page=all on 25 Juni 2021.
Kompas.com. (2021). Jumlah Pengguna Internet Indonesia 2021 Tembus 202 Juta. https://tekno.kompas.com/read/2021/02/23/16100057/jumlah-pengguna-internet-indonesia-2021-tembus-202-juta. diakses pada 25 Juni 2021.
Kusumasari, Dita & Arfianto, S. (2020). Makna Teks Ujaran Kebencian Pada Media Sosial. Jurnal Komunikasi. Vol. 12. No. 1.
Liputan6.com. (2019). 50 Juta Ancaman Siber Diblokir di Indonesia Sepanjang 2018. Retrived from https://www.liputan6.com/tekno/read/3947074/50-juta-ancaman-siber-diblokir-di-indonesia-sepanjang-2018?utm_expid=.9Z4i5ypGQeGiS7w9arwTvQ.0&utm_referrer=https%3A%2F%2Fwww.google.com%2F on 25 June 2021.
Magdalena, Merry dan Setyadi, Maswigrantoro R. (2007). Cyberlaw, Tidak Perlu Takut. Yogyakarta: Penerbit Andi.
Makarim, Edmon. (2005). Pengantar Hukum Telematika – Suatu Kompilasi Kajian. Yogyakarta: Badan Penerbit FH UII.
Media Indonesia. (2019). Merajut Diplomasi Siber Indonesia. Retrived from https://mediaindonesia.com/read/detail/199360-merajut-diplomasi-siber-indonesia on 25 June 2021.
Ningrum, Dian Junita; Suryadi; Wardhana, Dian E.C. (2018). Kajian Ujaran Kebencian di Media. Jurnal Ilmiah Korpus. Vol.2. No.3.
Nuruzzaman, Muhammad. (2018). Terorisme Dan Media Sosialsisi Gelap Berkembangnya Teknologi Informasi Komunikasi. Jurnal Ilmiah Indonesia Syntax Literate. Vo. 3. No.9.
Okezone.com. (2021). Bikin Geger! Berikut 3 Kasus Kebocoran Data Pribadi di Indonesia. Retrived from https://nasional.okezone.com/read/2021/05/31/337/2418242/bikin-geger-berikut-3-kasus-kebocoran-data-pribadi-di-indonesia?page=1 on 25 June 2021.
Parestri, Awinditya. (2016). Negara Liliput dalam Persoalan Digital: Upaya-upaya Swiss Menghadapi Ancaman Keamanan Siber. Jurnal Analisis Hubungan Internasional. Vol. 5. No. 2.
Republika. (2021). Kominfo: Pengguna Internet Indonesia Terbesar ke-4 di Dunia. Retrived from https://www.republika.co.id/berita/qv56gb335/kominfo-pengguna-internet-indonesia-terbesar-ke4-di-dunia on 25 June 2021.
Rusman; Kurniawan, Deni; Riyana, Cepi. (2013). Pembelajaran Berbasis Teknologi Informasi dan Komunikasi; Mengembangkan Profesionalitas Guru. Jakarta: PT. Raja Grafindo Persada.
Samudra, Anton Hendrik. (2019). Modus Operandi dan Problematika Penanggulangan Tindak Pidana Penipuan Daring. Mimbar Hukum. Vol. 31. No.1.
Setiadi, Sucahyo, and Hasibuan, Z. (2012). An Overview of the Development Indonesia National Cyber Security. International Journal of Information Technology & Computer Science. Vol. 6.
Siagian, Lauder; Budiarto, Arief, Simatupang. (2018). Peran Keamanan Siber Dalam Mengatasi Konten Negatif Guna Mewujudkan Ketahanan Informasi Nasional. Jurnal Prodi Perang Asimetris. Vol. 4. No. 3
Suara.com. (2014). Membongkar Kecanggihan Pasukan Hacker Korea Utara. Retrived from https://www.suara.com/tekno/2014/12/24/073200/membongkar-kecanggihan-pasukan-hacker-korea-utara on 25 June 2021.
Sulaiman, Robintan. (2002). Cyber Crimes: Perspektif E-Commerce Crime. Tangerang: Pusat Bisnis Fakultas Hukum Universitas Pelita Harapan.
Sumenge, Melisa Monica.(2013). Penipuan Menggunakan Media Internet Berupa Jual Beli. Lex Crimen. Vol.II. No.4.
Tekno Kompas. (2012). Indonesia Bangun Pusat Investigasi Kejahatan "Cyber .Retrived from https://tekno.kompas.com/read/2013/04/30/15491539/indonesia.bangun.pusat.investigasi.kejahatan.quotcyberquot on 25 June 2021.
Wardiana, Wawan. (2002). Perkembangan Teknologi Informasi di Indonesia, Makalah Seminar dan Pameran Teknologi Informasi 2002. Bandung: Fakultas Teknik Unikom.
Downloads
Published
Issue
Section
License
License
Journal of Islamic World and Politics is licensed under an Attribution-ShareAlike 4.0 International (CC BY-SA 4.0) license. You are free to:
- Share — copy and redistribute the material in any medium or format
- Adapt — remix, transform, and build upon the material for any purpose, even commercially. This license is acceptable for Free Cultural Works.
The licensor cannot revoke these freedoms as long as you follow the license terms.
- Attribution — You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- ShareAlike — If you remix, transform, or build upon the material, you must distribute your contributions under the same license as the original.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Copyright
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under an Attribution-ShareAlike 4.0 International (CC BY-SA 4.0) that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).