Indonesia Cyber Security : Urgency To Establish Cyber Army In The Middle Of Global Terrorist Threat
DOI:
https://doi.org/10.18196/jiwp.2109Keywords:
Cyber Security, National Security, Human SecurityAbstract
This research focused on how on the year of 2030 Indonesia will gain better governance in order to countermeasures terrorist threats, fairer human rights in terms of privacy and security in information and technology, also stronger Indonesia’s national cyber security. Cases are taken firstly from nowadays Indonesia social conflict which started from the internet as society’s first source of information regardless the validity of information and secondly from Indonesia’s foreign policies towards private technology deals. By using the concept of cyber power and national security as paradigm, this research described how Indonesia going securely, equally, rapidly forward in line with globalization opportunities and technology dependencies. While minimizing invalid and provocative information as terrorist threat to Indonesia’s sovereignty and integrity by improving the security of intellectual and on-field assets by integrating academia, military aspects and people’s contribution to accelerate Indonesia’s national potential in cyber security.References
Asosiasi Penyelenggara Jasa Internet Indonesia. (2016). Penetrasi & Perilaku Pengguna Internet Indonesia. Polling Indonesia. Jakarta: Asosiasi Penyelenggara Jasa Internet Indonesia.
Austin, G. (2014). Cyber Policy in China. Cambridge: Polity Press.
Baldwin, D. A. (1997, January). The Concept of Security. Review of International Studies, 23(1), 5-26.
BBC. (2017). Russia’s Putin calls leaked Trump memos ‘utter nonsense’. Retrieved 04 09, 2017, from BBC News: http:// www.bbc.com/news/world-us-canada-38649169
Budiari, I. (2016). Anti-Ahok rally ends peacefully. Retrieved 04
, 2017, from The Jakarta Post: http://www.thejakartapost. com/news/2016/12/02/antiahok-rally-ends-peacefully. html
Clarke, R. A., & Knake, R. K. (2010). Cyber War: The Next Threat to National Security and What to Do About It. New York: Harper Collins.
Corera, G. (2017). Cybersecurity: Queen opens centre to protect against attacks. Retrieved 04 05, 2017, from BBC News: http://www.bbc.com/news/uk-38964996
Hawley, S. (2015). Jakarta on high alert after video threat from Islamic State. Retrieved 04 04, 2017, from ABC: http://www. abc.net.au/am/content/2015/ s4360874.htm
Hsu, D. F. (2013). Building a Secure and Sustainable Cyberspace Ecosystem. In D. F. Hsu, & D. Marinucci (Eds.), Advances in Cyber Security (pp. 1-33). New York: Fordham University Press.
ID-SIRTII. (2013b). Laporan 2013. ID-SIRTII. Jakarta: Direktorat Jendral Penyelenggaraan Pos dan Informatika Kementrian Komunikasi dan Informatika Republik Indonesia.
ID-SIRTII/CC. (2013a). Sejarah IdSIRTII/CC. Retrieved 04 02, 2017, from http://www.idsirtii. or.id/halaman/tentang/sejarahid -sirtii-cc.html
ID-SIRTII/CC. (2016). Cyber Jawara. Retrieved 04 02, 2017, from http://jawara.idsirtii.or.id/
Islamic World and Politics Vol.2. No.1 January-June 2018
Jervis, R. (1978). Cooperation Under the Security Dilemma. Robert Jervis, 30(2), 167-214.
Keck, Z. (2013). Yes, Edward
Snowden Is a Traitor. Retrieved 04 09, 2017, from The Diplomat: http://thediplomat. com/2013/12/yes-edward-snowden-is-a-traitor/ Kemp, S. (2017). Digital in 2017:
Global Overview. Retrieved 04 03, 2017, from we are social: http://wearesocial.com/ blog/2017/01/digital-in-2017-global-overview
Kertopati, S. N. (2013). Komunikasi Dalam Kinerja Intelijen Keamanan. Jakarta: PT. Gramedia Pustaka Utama. Lee, R. B. (2013). Improving Cyber Security. In D. F. Hsu, & D. Marinucci (Eds.), Advances in Cyber Security (pp. 37-59). New York: Fordham University Press.
Madu, L. (2008). Ambalat Netwar antara Indonesia - Malaysia, 2005: Refleksi Teoritis Mengenai Hubungan Internasional di Era Internet. In Global & Strategis (Vol. II). Yogyakarta: UPN Veteran.
Nye, J. J. (2010). Cyber Power. Cambridge: Belfer Center for Science and International Affairs.
Parameswaran, P. (2015). Indonesia’s Cyber Challenge Under Jokowi. Retrieved 04 02, 2017, from The Diplomat: http://thediplomat. com/2015/01/indonesias-cyber-
challenge-under-jokowi/
Parameswaran, P. (2016). Does Indonesia Need a New Cyber Agency? Retrieved 04 02, 2017, from The Diplomiat: http:// thediplomat.com/2016/09/ does-indonesia-need-a-newcyber -agency/
Parameswaran, P. (2017a). Is Indonesia Ready for New Cyber Agency? Retrieved 04 02, 2017, from The Diplomat: http://thediplomat.com/2017/02/ isindonesia-ready-for-newcyber-agency/
Parameswaran, P. (2017b). What Will a New Indonesia Cyber Agency Mean? Retrieved 04 03, 2017, from The Diplomat: http:// thediplomat.com/2017/01/ whatwill-a-new-indonesia-cyber-agency-mean/
Sangadji, R. (2016). Terrorist Santoso only obedient to IS, video reveals. Retrieved 04 04, 2017, from The Jakarta Post: https://translate. google.com/#id/en/dipimpin
Sefriani. (2011). Hukum Internasional Suatu Pengantar. Jakarta: Rajawali Pers.
Subcommittee on Intelligence, Emerging Threat and Capabilities. (2014). Information Technology and Cyber Operations: Modernization and Policy Issues
In A Changing National Security Environment. Committee On Armed Services House of Representative. Washington : U.S. Government Printing Office.
Syverson, P. (2013). Practical Vulnerabilities of the Tor Anonymity Network. In D. F. Hsu, & D. Marinucci (Eds.), Advances in Cyber Security (pp. 60-73). New York: Fordham University Press.
The Jakarta Post News Desk. (2016) . Buni Yani, uploader of Ahok’s blasphemy video, named suspect. Retrieved 04 02, 2017, from The Jakarta Post: http:// www. thejakartapost.com/ news/2016/11/23/buni-yaniuploader-of-ahoks-blashpemyvideo -named-suspect.html
Wibisono, M. (2015). Tantangan Diplomasi Multilateral. (M. Keliat, & M. Mas'oed, Eds.) Jakarta: LP3ES.
Widiartanto, Y. H. (2016). 2016, Pengguna Internet di Indonesia Capai 132 Juta. Retrieved 04 03, 2017, from Kompas.com: http://tekno.kompas.com/ read/2016/10/24/15064727/2016.pengguna.internet. di.indonesia.capai.132.juta.
Downloads
Issue
Section
License
License
Journal of Islamic World and Politics is licensed under an Attribution-ShareAlike 4.0 International (CC BY-SA 4.0) license. You are free to:
- Share — copy and redistribute the material in any medium or format
- Adapt — remix, transform, and build upon the material for any purpose, even commercially. This license is acceptable for Free Cultural Works.
The licensor cannot revoke these freedoms as long as you follow the license terms.
- Attribution — You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- ShareAlike — If you remix, transform, or build upon the material, you must distribute your contributions under the same license as the original.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Copyright
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under an Attribution-ShareAlike 4.0 International (CC BY-SA 4.0) that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).