ANALYSIS OF INDONESIAN AND EUROPEAN UNION (EU) RELATIONSHIP STRATEGY OVERCOMING CYBER TERRORISM

Authors

  • IBAADURRAHMAN AZZAHIDI
  • FRANSISKA MARISTELLA JUNIANSE

DOI:

https://doi.org/10.51200/manu.v34i2.4767

Keywords:

peace study, policy overseas, Indonesia, computer-aided methods

Abstract

This research discusses Indonesian National Security in handling entry of malware caused by the attack including cyber terrorism. Utilization Technology Increasing information and communication development has changed pattern groups certain to do actions that harm the media and cyberspace, it is known as cyber-terrorism. This research discusses cooperation between Indonesia and the EU in the field of cyber security and the emergence of cyber-terrorism in Indonesia. This research uses the theory of Cyber Terrorism and National Security from Ryan Cooper as a framework think. Besides that, this research uses method qualitative use studies literature with several sources related. The results of this study show that the European Union Convention on Cyber Terrorism as Regime International has proven to encourage Indonesia to make a constitution about security for Cyber terrorism as stated in Article 21 of the ITE Law. Cyberterrorism is qualified as a transnational Crime which refers to Article 3 of the United Nations Conventions against Transnational crime.

Author Biographies

IBAADURRAHMAN AZZAHIDI

Master of International Relations Study Program,
Universitas Muhammadiyah Yogyakarta,
Brawijaya Street, Bantul, Yogyakarta, Indonesia

 

FRANSISKA MARISTELLA JUNIANSE

Master of International Relations Study Program,
Universitas Muhammadiyah Yogyakarta,
Brawijaya Street, Bantul, Yogyakarta, Indonesia

 

References

Anakotta, MY, & Disemadi, HS (2020). Continuing system development internal Indonesian National Security coping system legal framework crime terrorism. Journal National Security2, VI (1), 41–71.

Babys, Sam (2021). Threat war cyber in the digital era and Indonesian security solutions. Journal Oratio Directa, 3 (1), 425–442. https://ejurnal.ubk.ac.id/index.php/oratio/article/view/163

Banyász, P. (2014). Act as a spy - The Edward Snowden Case. Management teória, výučba a prax, (pp. 194-201). Liptovský Mikuláš.

BBC. (13 July 2018). Two twelve Russian syndicated on hack US election 2016. Retrieved from BBC News: https://www.bbc.com/news/world-us-canada44825345

Brenner, SW. (2002). Cyberterrorism. Asia Media, 29(3), 149–154. https://doi.org/10.1080/01296612.2002.11726680

Cisco. (20 December 2022). What is Malware? Obtained from Cisco: https://www.cisco.com/c/en/us/products/security/advanced-malwareprotection/what-ismalware.html#~related-topics

Commando, US C. (2018). Achieve and Maintain Vision Command Virtual World Excellence for US Cyber Command. Obtained from US Cyber Command: https://www.cybercom.mil/Portals/56/Documents/USCYBERCOM%20Vision%20April%202018.pdf

Command, UC (12 December 2021). Our history. Obtained from US Cyber Order: https://www.cybercom.mil/About/History/

Crumpler, W., & Lewis, JA (2019). Labor Gap Cyber security. CSIS,

Center for Strategic and International Studies.

Defence, D.O. (2018). Security Strategy Cyber Department Defense. Obtained from Department Defense, United States of America. https://media.defense.gov/2018/Sep/18/2002041658/-1/1/1/Cyberstrategysummaryfinal.Pdf

Defense. (2020). DoD Data Strategy. Taken from https://media.defense.gov/2020/Oct/08/2002514180/-1/-1/0/Dod-Data-Strategy.Pdf

Fidler, DP. (2016). Us Election Hacks, Cybersecurity, and International Law. American Journal of International Law (AJIL) No Bound, 110, 337-342.

Galinec, D., Možnik, D., & Guberina, B. (2017). Security Cyber and Defense Cyber: Approach National Level Strategy. Automats. Journal Control, Measurement, Electronics, Computing and Communication, 273286.

Ghernaouti, S. (2013). Cyber Power Crime, Conflict and Security in Cyberspace. EPFL Press.

Holsti, KJ, & Cliff, E. (1967). Political International: Framework Analysis. Prentice Hall.

Holsti, KJ, Monterichard, M., Msabaha, I., Robinson, TW, Shaw, T., & Home, TW. (2018). United States National Cyber Strategy. Obtained from the US White House: https://trumpwhitehouse.archives.gov/wp-content/uploads/2018/09/National-Cyber-Strategy.pdf

Home, W. (2011). International Strategy for Cyberspace: Prosperity, Security, and Openness in a Networked World. Retrieved from https://obamawhitehouse.archives.gov/sites/default/files/rssviewer/internationalstrateg yforcyberspace.pdf

Mintz, A., & Jr., KD. (2010). Understanding policy decisions overseas make. Cambridge University Press.

Patton, MQ, & Cochran, M. (2002). Usage guide methodology study qualitative. Officer MSF Research.

Research, CE. (20 October 2022). Fast facts hacking campaign President 2016 gained from CNN https://edition.cnn.com/2016/12/26/us/2016presidential-campaign-hacking-fast-facts/index.html

Ryan, Cooper, & Tauer. (2006). Programming for peace: Computer-aided methods for international conflict resolution and Prevention. In R. Trappl (Ed.), Paper Knowledge. Toward a Media History of Documents. Springer Netherlands. https://doi.org/10.1007/1-4020-4390-2

Sanger, DE. (13 December 2021). Hacker Russia breaks into Federal Agency, suspect US officials. Taken from The New York Times: https://www.nytimes.com/2020/12/13/us/politics/russian-hackers-usgovernment-treasury-commerce.html

Security, UD. (7 October 2016). Joint Statement of Department Security Home Affairs and Director's Office National Intelligence for Security election. Obtained from Department Security US Homeland: https://www.dhs.gov/news/2016/10/07/joint-statement-department-homeland-security-and-office-director-national

Statistics, CS. (15 October 2021). Statistics Cyber Security. Obtained from Statistics Cyber Security: https://purplesec.us/resources/cyber-security-statistics/

Warner, M. (2020). Decade First Command US Cyber. Hoover Institution Essays.

Wolfers, A. (1952). “National Security” as an Ambiguous Symbol. Political Science Quarterly, 67 (4), 481. https://doi.org/10.2307/2145138

Zylberberg, J. (2016). Why the nation reassembles: Restructuring policy abroad in the postwar world. Routledge.

Published

2023-12-31

How to Cite

IBAADURRAHMAN AZZAHIDI, & FRANSISKA MARISTELLA JUNIANSE. (2023). ANALYSIS OF INDONESIAN AND EUROPEAN UNION (EU) RELATIONSHIP STRATEGY OVERCOMING CYBER TERRORISM. MANU Jurnal Pusat Penataran Ilmu Dan Bahasa, 34(2), 1–16. https://doi.org/10.51200/manu.v34i2.4767
Total Views: 139 | Total Downloads: 69