ANALYSIS OF INDONESIAN AND EUROPEAN UNION (EU) RELATIONSHIP STRATEGY OVERCOMING CYBER TERRORISM
DOI:
https://doi.org/10.51200/manu.v34i2.4767Keywords:
peace study, policy overseas, Indonesia, computer-aided methodsAbstract
This research discusses Indonesian National Security in handling entry of malware caused by the attack including cyber terrorism. Utilization Technology Increasing information and communication development has changed pattern groups certain to do actions that harm the media and cyberspace, it is known as cyber-terrorism. This research discusses cooperation between Indonesia and the EU in the field of cyber security and the emergence of cyber-terrorism in Indonesia. This research uses the theory of Cyber Terrorism and National Security from Ryan Cooper as a framework think. Besides that, this research uses method qualitative use studies literature with several sources related. The results of this study show that the European Union Convention on Cyber Terrorism as Regime International has proven to encourage Indonesia to make a constitution about security for Cyber terrorism as stated in Article 21 of the ITE Law. Cyberterrorism is qualified as a transnational Crime which refers to Article 3 of the United Nations Conventions against Transnational crime.
References
Anakotta, MY, & Disemadi, HS (2020). Continuing system development internal Indonesian National Security coping system legal framework crime terrorism. Journal National Security2, VI (1), 41–71.
Babys, Sam (2021). Threat war cyber in the digital era and Indonesian security solutions. Journal Oratio Directa, 3 (1), 425–442. https://ejurnal.ubk.ac.id/index.php/oratio/article/view/163
Banyász, P. (2014). Act as a spy - The Edward Snowden Case. Management teória, výučba a prax, (pp. 194-201). Liptovský Mikuláš.
BBC. (13 July 2018). Two twelve Russian syndicated on hack US election 2016. Retrieved from BBC News: https://www.bbc.com/news/world-us-canada44825345
Brenner, SW. (2002). Cyberterrorism. Asia Media, 29(3), 149–154. https://doi.org/10.1080/01296612.2002.11726680
Cisco. (20 December 2022). What is Malware? Obtained from Cisco: https://www.cisco.com/c/en/us/products/security/advanced-malwareprotection/what-ismalware.html#~related-topics
Commando, US C. (2018). Achieve and Maintain Vision Command Virtual World Excellence for US Cyber Command. Obtained from US Cyber Command: https://www.cybercom.mil/Portals/56/Documents/USCYBERCOM%20Vision%20April%202018.pdf
Command, UC (12 December 2021). Our history. Obtained from US Cyber Order: https://www.cybercom.mil/About/History/
Crumpler, W., & Lewis, JA (2019). Labor Gap Cyber security. CSIS,
Center for Strategic and International Studies.
Defence, D.O. (2018). Security Strategy Cyber Department Defense. Obtained from Department Defense, United States of America. https://media.defense.gov/2018/Sep/18/2002041658/-1/1/1/Cyberstrategysummaryfinal.Pdf
Defense. (2020). DoD Data Strategy. Taken from https://media.defense.gov/2020/Oct/08/2002514180/-1/-1/0/Dod-Data-Strategy.Pdf
Fidler, DP. (2016). Us Election Hacks, Cybersecurity, and International Law. American Journal of International Law (AJIL) No Bound, 110, 337-342.
Galinec, D., Možnik, D., & Guberina, B. (2017). Security Cyber and Defense Cyber: Approach National Level Strategy. Automats. Journal Control, Measurement, Electronics, Computing and Communication, 273286.
Ghernaouti, S. (2013). Cyber Power Crime, Conflict and Security in Cyberspace. EPFL Press.
Holsti, KJ, & Cliff, E. (1967). Political International: Framework Analysis. Prentice Hall.
Holsti, KJ, Monterichard, M., Msabaha, I., Robinson, TW, Shaw, T., & Home, TW. (2018). United States National Cyber Strategy. Obtained from the US White House: https://trumpwhitehouse.archives.gov/wp-content/uploads/2018/09/National-Cyber-Strategy.pdf
Home, W. (2011). International Strategy for Cyberspace: Prosperity, Security, and Openness in a Networked World. Retrieved from https://obamawhitehouse.archives.gov/sites/default/files/rssviewer/internationalstrateg yforcyberspace.pdf
Mintz, A., & Jr., KD. (2010). Understanding policy decisions overseas make. Cambridge University Press.
Patton, MQ, & Cochran, M. (2002). Usage guide methodology study qualitative. Officer MSF Research.
Research, CE. (20 October 2022). Fast facts hacking campaign President 2016 gained from CNN https://edition.cnn.com/2016/12/26/us/2016presidential-campaign-hacking-fast-facts/index.html
Ryan, Cooper, & Tauer. (2006). Programming for peace: Computer-aided methods for international conflict resolution and Prevention. In R. Trappl (Ed.), Paper Knowledge. Toward a Media History of Documents. Springer Netherlands. https://doi.org/10.1007/1-4020-4390-2
Sanger, DE. (13 December 2021). Hacker Russia breaks into Federal Agency, suspect US officials. Taken from The New York Times: https://www.nytimes.com/2020/12/13/us/politics/russian-hackers-usgovernment-treasury-commerce.html
Security, UD. (7 October 2016). Joint Statement of Department Security Home Affairs and Director's Office National Intelligence for Security election. Obtained from Department Security US Homeland: https://www.dhs.gov/news/2016/10/07/joint-statement-department-homeland-security-and-office-director-national
Statistics, CS. (15 October 2021). Statistics Cyber Security. Obtained from Statistics Cyber Security: https://purplesec.us/resources/cyber-security-statistics/
Warner, M. (2020). Decade First Command US Cyber. Hoover Institution Essays.
Wolfers, A. (1952). “National Security” as an Ambiguous Symbol. Political Science Quarterly, 67 (4), 481. https://doi.org/10.2307/2145138
Zylberberg, J. (2016). Why the nation reassembles: Restructuring policy abroad in the postwar world. Routledge.
Downloads
Published
How to Cite
Issue
Section
License
All right reserved. No part of this publication can be reproduced without prior written permission of the copyright holder. The written permission of the copyright holder must be obtained before any parts of this publication is stored in a retrieval system of any nature.
Requests for permission to duplicate an article, review or part of this journal should be addressed to the Chief Editor, MANU, Centre for the Promotion of Knowledge and Language Learning, Universiti Malaysia Sabah, Jalan UMS, 88400 Kota Kinabalu, Sabah, Malaysia.