Indonesia Cyber Security : Urgency To Establish Cyber Army In The Middle Of Global Terrorist Threat
Abstract
Keywords
Full Text:
PDFReferences
Asosiasi Penyelenggara Jasa Internet Indonesia. (2016). Penetrasi & Perilaku Pengguna Internet Indonesia. Polling Indonesia. Jakarta: Asosiasi Penyelenggara Jasa Internet Indonesia.
Austin, G. (2014). Cyber Policy in China. Cambridge: Polity Press.
Baldwin, D. A. (1997, January). The Concept of Security. Review of International Studies, 23(1), 5-26.
BBC. (2017). Russia’s Putin calls leaked Trump memos ‘utter nonsense’. Retrieved 04 09, 2017, from BBC News: http:// www.bbc.com/news/world-us-canada-38649169
Budiari, I. (2016). Anti-Ahok rally ends peacefully. Retrieved 04
, 2017, from The Jakarta Post: http://www.thejakartapost. com/news/2016/12/02/antiahok-rally-ends-peacefully. html
Clarke, R. A., & Knake, R. K. (2010). Cyber War: The Next Threat to National Security and What to Do About It. New York: Harper Collins.
Corera, G. (2017). Cybersecurity: Queen opens centre to protect against attacks. Retrieved 04 05, 2017, from BBC News: http://www.bbc.com/news/uk-38964996
Hawley, S. (2015). Jakarta on high alert after video threat from Islamic State. Retrieved 04 04, 2017, from ABC: http://www. abc.net.au/am/content/2015/ s4360874.htm
Hsu, D. F. (2013). Building a Secure and Sustainable Cyberspace Ecosystem. In D. F. Hsu, & D. Marinucci (Eds.), Advances in Cyber Security (pp. 1-33). New York: Fordham University Press.
ID-SIRTII. (2013b). Laporan 2013. ID-SIRTII. Jakarta: Direktorat Jendral Penyelenggaraan Pos dan Informatika Kementrian Komunikasi dan Informatika Republik Indonesia.
ID-SIRTII/CC. (2013a). Sejarah IdSIRTII/CC. Retrieved 04 02, 2017, from http://www.idsirtii. or.id/halaman/tentang/sejarahid -sirtii-cc.html
ID-SIRTII/CC. (2016). Cyber Jawara. Retrieved 04 02, 2017, from http://jawara.idsirtii.or.id/
Islamic World and Politics Vol.2. No.1 January-June 2018
Jervis, R. (1978). Cooperation Under the Security Dilemma. Robert Jervis, 30(2), 167-214.
Keck, Z. (2013). Yes, Edward
Snowden Is a Traitor. Retrieved 04 09, 2017, from The Diplomat: http://thediplomat. com/2013/12/yes-edward-snowden-is-a-traitor/ Kemp, S. (2017). Digital in 2017:
Global Overview. Retrieved 04 03, 2017, from we are social: http://wearesocial.com/ blog/2017/01/digital-in-2017-global-overview
Kertopati, S. N. (2013). Komunikasi Dalam Kinerja Intelijen Keamanan. Jakarta: PT. Gramedia Pustaka Utama. Lee, R. B. (2013). Improving Cyber Security. In D. F. Hsu, & D. Marinucci (Eds.), Advances in Cyber Security (pp. 37-59). New York: Fordham University Press.
Madu, L. (2008). Ambalat Netwar antara Indonesia - Malaysia, 2005: Refleksi Teoritis Mengenai Hubungan Internasional di Era Internet. In Global & Strategis (Vol. II). Yogyakarta: UPN Veteran.
Nye, J. J. (2010). Cyber Power. Cambridge: Belfer Center for Science and International Affairs.
Parameswaran, P. (2015). Indonesia’s Cyber Challenge Under Jokowi. Retrieved 04 02, 2017, from The Diplomat: http://thediplomat. com/2015/01/indonesias-cyber-
challenge-under-jokowi/
Parameswaran, P. (2016). Does Indonesia Need a New Cyber Agency? Retrieved 04 02, 2017, from The Diplomiat: http:// thediplomat.com/2016/09/ does-indonesia-need-a-newcyber -agency/
Parameswaran, P. (2017a). Is Indonesia Ready for New Cyber Agency? Retrieved 04 02, 2017, from The Diplomat: http://thediplomat.com/2017/02/ isindonesia-ready-for-newcyber-agency/
Parameswaran, P. (2017b). What Will a New Indonesia Cyber Agency Mean? Retrieved 04 03, 2017, from The Diplomat: http:// thediplomat.com/2017/01/ whatwill-a-new-indonesia-cyber-agency-mean/
Sangadji, R. (2016). Terrorist Santoso only obedient to IS, video reveals. Retrieved 04 04, 2017, from The Jakarta Post: https://translate. google.com/#id/en/dipimpin
Sefriani. (2011). Hukum Internasional Suatu Pengantar. Jakarta: Rajawali Pers.
Subcommittee on Intelligence, Emerging Threat and Capabilities. (2014). Information Technology and Cyber Operations: Modernization and Policy Issues
In A Changing National Security Environment. Committee On Armed Services House of Representative. Washington : U.S. Government Printing Office.
Syverson, P. (2013). Practical Vulnerabilities of the Tor Anonymity Network. In D. F. Hsu, & D. Marinucci (Eds.), Advances in Cyber Security (pp. 60-73). New York: Fordham University Press.
The Jakarta Post News Desk. (2016) . Buni Yani, uploader of Ahok’s blasphemy video, named suspect. Retrieved 04 02, 2017, from The Jakarta Post: http:// www. thejakartapost.com/ news/2016/11/23/buni-yaniuploader-of-ahoks-blashpemyvideo -named-suspect.html
Wibisono, M. (2015). Tantangan Diplomasi Multilateral. (M. Keliat, & M. Mas'oed, Eds.) Jakarta: LP3ES.
Widiartanto, Y. H. (2016). 2016, Pengguna Internet di Indonesia Capai 132 Juta. Retrieved 04 03, 2017, from Kompas.com: http://tekno.kompas.com/ read/2016/10/24/15064727/2016.pengguna.internet. di.indonesia.capai.132.juta.
DOI: https://doi.org/10.18196/jiwp.2109
Refbacks
- There are currently no refbacks.
Journal JIWP Indexed by:
Office:
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International (CC BY-SA 4.0) license.