Peran Institusi Internasional Dalam Penanggulangan Ancaman Cyber

Authors

  • Iqbal Ramadhan Program Studi Hubungan Internasional Universitas Pertamina

DOI:

https://doi.org/10.47313/pjsh.v2i2.338

Abstract

This article describes about managing cyber threat by using the role of international institution. Cyber threat is borderless and state is hard to maintain its security in digital age. Managing cyber threat is not like arms control. It also cannot rely on realist’s self-help concept because the threat comes from state and non-state actor. In order to anticipate the threat, cooperation through international institution is very important. The state actor can share information and cooperate in managing the threat by using international institution. In South East Asia, ASEAN Economic Community must be supported by stable cyber environment. Indonesia and other members should work together to prevent any cyber threat that can jeopardize ASEAN Economic Community.

References

Buku

Aronso, D. Jonathan. (2005). Causes and consequences of the communication and Internet Revolution dalam John Baylis dan Steve Simth (ed). The Globalization of World Politics: An Introduction to International Relations. London: Oxford University Press

Bayliss, John dan Smith, Steve. (2005). The Globalization of World Politics. London: Oxford University Press.

Rourke, T. John. (2004). International Politics on the World Stage 10th ed. Boston: McGraw-Hill.

Jackson, Robert dan Sorensen, George.(2005). Pengantar Studi Hubungan Internasional. Yogyakarta: Pustaka Pelajar

Jurnal

Arquilla, John dan David Rondfelt. (1993). Cyberwar is Coming. Comparative Strategy 12(2)

Waltz, Kenneth. (1993). The Emerging Structure of International Politics. International Security 18 (2)

Riset

PwC Global, Managing Risk Cyber With Insurance, 2014.

Global Security Index 2014, International Telecommunication Union, 2015.

Majalah

ASEAN Cyber Security di MEA 2015 di CISO Magazine Edisi April 2015.

Situs Internet

http://www.nato.int/cps/en/natohq/topics_78170.htm, diakses 4 April 2016.

“Ada Spyware di Negosiasi Nuklir Iran”, http://www.ciso.co.id/2015/06/ada-spyware-di- negosiasi-nuklir-iran/, diakses 4 April 2016.

“Cyberattack Pentagons Joint Staff Email Take System Offline”, http://www.nbcnews.com/tech/security/cyberattack-pentagons-joint-staff- emails-take- system-offline-n405321, diakses, 7 April 2016.

“Cyberattack Pentagons Joint Staff Email Take System Offline”,http://www.nbcnews.com/tech/security/cyberattack-pentagons-joint-staff- emails-take-system-offline-n405321, diakses, 7 April 2016.

“International Hackers Threaten Repeat Cyber Attack Against Israel”, http://www.jewishexponent.com/headlines/2015/04/international-hackers- threaten- repeat-cyber-attack-against-israel, diakses 7 April 2016.

“Is Cybersecurity like arm control?”, http://www.huffingtonpost.com/joseph-nye/is- cybersecurity-like-arm-control_b_7302200.html, diakses 8 April 2016.

“Presiden Obama Pertimbangkan Sanksi Peretasan OPM”, http://www.ciso.co.id/2015/06/presiden-obama-pertimbangkan-sanksi-peretasan-opm/, diakses 4 April 2016.

“Safe Harbour Ditolak di Menit Terakhir”, www.ciso.co.id/2016/safe-harbour-ditolak-di-menit- terakhir/, diakses 14 April 2016.

“Statistik Pengguna Internet dan Media Sosial Terbaru 2015”, https://id.techinasia.com/talk/statistik-pengguna-internet-dan-media-sosial-terbaru-2015, diakses 19 April 2016.

Published

2017-12-31

Issue

Section

Articles