scholarly journals Three Perspective Theory of Cyber Sovereignty dalam Strategi Keamanan Siber Singapura

2021 ◽  
Vol 21 (2) ◽  
pp. 171-184
Author(s):  
Muawwan Muawwan

Abstract   The escalation of cyber threats in Singapore has prompted the country to intensify its cyberspace security protection. Singapore then implemented numerous strategies by collaborating across agencies and actors to obtain a protective cyberspace security system. This research aimed at figuring out Singapore Cyber Security Strategy (SCSS) documents comprehensively throughout textual analysis based on qualitative approach of an emerging-dominant elements in documents such as actor, instrument, politic, economy, research, and collaboration which were cooperated within actors. The author also fulfilled this analysis using qualitative approach to measure the data relation and the big picture of SCSS documents. Finally, the author found that Singapore’s strategy in applications and infrasctructure aspects, the government intervened them intensively. Singapore, one of the highest technological expertise countries in Southeast Asia, was fuflnerable getting the threats or attacks. So, this country was regulating an excellent cyber system and infrastructure to proctect their cyber management system secure. Meanwhile, Singapore’s policy in core aspects was a transfer due to the fact that Singapore was multi-ethnical and multi-culturalism country. Thus, Singapore’s strategy for ideological aspects was not regulated significantly in SCSS documents.   Keywords: Cyber Security Strategy, Data Relation, Sovereignty   Abstrak   Eskalasi ancaman terhadap ruang siber yang terjadi di Singapura telah mendorong negara tersebut untuk meningkatkan proteksi keamanan ruang sibernya. Singapura kemudian menerapkan berbagai strategi dengan cara menjalin kerjasama lintas instansi dan aktor untuk memperoleh sistem keamanan ruang siber yang lebih protektif. Tulisan ini bermaksud untuk memahami dokumen Singapore Cyber Security Strategy (SCSS) secara komprehensif dengan melakukan analisis kontekstual berdasarkan pendekatan kualitatif terhadap sejumlah unsur yang dominan muncul di dalam dokumen seperti aktor, instrument, politik, ekonomi, penelitian, dan kolaborasi yang dibangun di antara para aktor. Penulis juga melengkapi analisis ini dengan pendekatan kuantitatif untuk mengukur relasi data dan kecenderungan yang tergambar dari dokumen SCSS tersebut. Hasilnya, penulis menemukan bahwa pada level strategi di sektor application dan infrastruktur, pemerintah Singapura memiliki intervensi penuh dalam mengatur seluruh aktivitas di kedua aspek tersebut. Sebagai salah satu negara yang cukup signifikan di dalam pengelolaan teknologinya di kawasan Asia Tenggara, maka Singapura secara eksklusif berupaya membangun sistem dan infrastruktur siber yang mumpuni untuk melindungi tata kelola ruang siber mereka dari berbagai ancaman. Berbeda pada aspek core yang bersifat lebih terbuka (transfer) lantaran banyak dipengaruhi oleh multietnis dan multikulturalisme. Sehingga proteksi terhadap hal-hal yang bersifat ideologis tidak banyak diatur di dalam dokumen SCSS.   Kata kunci: Kedaulatan, Relasi Data, Strategi Keamanan Siber

2021 ◽  
Vol 21 (1) ◽  
pp. 69-84
Author(s):  
Putri Bilqis Oktaviani ◽  
Anggraeni Silvia

This research discusses the analysis of security strategy policies made by the Malaysian government in the protection and development of Malaysian cyberspace. This research will explain in detail the strategy of developing challenges as well as the aspects that support the Malaysian cyber space to be saved by the Malaysian cyber space. This research will further discuss the Malaysian security strategy through the official document of the Malaysian security strategy which will later be analyzed through the MAXQDA and GEPHI applications in order to classify the various categories that support it. This research will use the security concept published by Hao Yeli in Three - Perspective Theory of Cyber ​​Sovereignty to classify ideas and data. This research finds that the security of the Malaysian system needs to be developed from both capacity and capability so that the government needs to work together with various related parties   Keywords: Cyber Security, Cybersecurity Challenges, Soveignty   Abstrak   Penelitian ini membahas tentang analisis kebijakan strategi keamanan siber yang dibuat oleh pemerintah Malaysia dalam perlindungan dan pengembangan keamanan ruang siber Malaysia. Penelitian ini akan menjelaskan secara details strategi, tantangan serta aspek – aspek yang mendukung pengembangan ruang siber Malaysia guna mengamankan ruang siber Malaysia. Penelitian ini akan membahas lebih jauh strategi keamanan Malaysia melalui dokumen resmi strategi keamanan siber Malaysia yang nantinya akan di bedah melalui aplikasi MAXQDA dan GEPHI guna mengklasifikasikan berbagai kategori yang mendukung. Penelitian ini akan menggunakan konsep keamanan yang dipublikasikan oleh Hao Yeli dalam A Three – Perspective Theory of Cyber Sovereignty guna mengkasifikasikan gagasan dan data dengan menggunakan metode penelitian kuantitatif. Penelitian ini menemukan bahwa keamanan siber Malaysia perlu dikembangkan baik dari kapasitas maupun kapabilitas sehingga pemerintah Malasyaia perlu bekerjasama dengan berbagai pihak yang terkait.   Kata kunci: Cyber Security, Tantangan Keamanan Cyber, Kedaulatan


2016 ◽  
Vol 4 (1) ◽  
pp. 61 ◽  
Author(s):  
Muhamad Rizal ◽  
Yanyan Yani

The purpose of state defense is to protect and to save the integrity of the Unitary State of the Republic of Indonesia, the sovereignty of the state, as well as its security from all kinds of threats, whether they are military or non-military ones. One of the non-military threats that potentially threatens the sovereignty and security of the nation-state is the misuse of technology and information in cyberspace. The threat of irresponsible cyber attacks can be initiated by both state and non-state actors. The actors may be an individual, a group of people, a faction, an organization, or even a country. Therefore, the government needs to anticipate cyber threats by formulating cyber security strategies and determining comprehensive steps to defend against cyber attacks; its types and the scale of counter-measures, as well as devising the rules of law. 


2014 ◽  
pp. 471-514
Author(s):  
Catherine B. Lotrionte

This chapter discusses the nature of cyber threats against government and private computer systems, describing some steps the government has taken and the challenges involved in protecting those systems. The chapter argues that a national security approach for cyber security policy is the most promising option for preventing these cyber threats while operating within the domestic legal framework. After a review of the President's constitutional authorities to protect the nation from traditional threats, the chapter concludes that the President has some power to monitor Internet communications in transit within the United States when the communications threaten the welfare of the nation. The chapter recommends that this authority be augmented by Congressional action through legislation. The President's powers in cyber security, even given Congressional support, however, are still restrained by the protections the Fourth Amendment provides for traditional forms of communication and individual privacy. Although there is limited Fourth Amendment precedent in the area of cyber security, the well-established exceptions to the Fourth Amendment requirements, based on consent, special governmental needs and the reasonableness of the search or seizure, provide a legal basis for executive branch action to protect critical infrastructures and their computer systems. As the Courts have long held, these exceptions allow the government to conduct searches or seizures without being bound by all of the requirements of the Fourth Amendment. If the government develops its cyber security policy in line with these exceptions, this chapter argues the government can both protect critical computer systems and operate within Fourth Amendment doctrine that recognizes the legitimacy of privacy in electronic communications.


2018 ◽  
Vol 1 (2) ◽  
pp. 251
Author(s):  
Yulia Anggraini

Abstract: This research was motivated by the development of sukuk in Indonesia from an international perspective in 2016 which gave positive results. Where Indonesia is the big issuer of sukuk with a total issuance of USD 10, 5 billion from the total issuance of sukuk by the government from all over the world. In the midst of the development of sukuk instruments, there are also instruments such as green bonds that offer investments in environmental development. With the presence of green bonds as investment instruments in the environment, a sharia investment instrument has emerged which has the same concentration as a green bond. The instrument is then called green sukuk. Indonesia is listed as a pioneer in the issuance of green bonds in the Southeast Asia region. The purpose of this study is to identify the potential of sukuk green publishing in Indonesia to strengthen Indonesia's position in the global sharia financial market. This study uses a qualitative approach using historical methods. الملخص: يتم تحفيز هذا البحث من خلال نظرة إيجابية من المنظور الدولي حول تطوير الصكوك في إندونيسيا في عام 2016. حيث تعد إندونيسيا المصدر الكبير للصكوك بإجمالي ,510 دولارات أمريكية من إجمالي إصدارات الصكوك من قبل الحكومة من جميع أنحاء العالم. في خضم تطوير أدوات الصكوك، هناك أدوات مثل green bond  التي تقدم استثمارات في التنمية البيئية.بعد وجود هذه الأدوات كأداة استثمار في البيئة ، تظهر أداة استثمار الشريعة التي لها نفس تركيز له  يسمى الصكوك الخضراء green sukuk. ومن هنا تم إدراج إندونيسيا كرائد في إصدار السندات الخضراء في منطقة جنوب شرق آسيا. الغرض من هذه الدراسة هو تحديد إمكانات النشر الأخضر للصكوك في إندونيسيا لتعزيز مكانة إندونيسيا في السوق المالية الشرعية العالمية. تستخدم هذه الدراسة منهجًا كميًا باستخدام الطريقة التاريخية.. Abstrak: Penelitian ini dilatar belakangi oleh adanya perkembangan sukuk di Indonesia dari kacamata internasional pada tahun 2016 yang memberikan hasil positif. Dimana Indonesia merupakan the big issuer sukuk dengan total penerbitan USD 10, 5 Milyar dari total penerbitan sukuk oleh pemerintah dari seluruh dunia. Ditengah perkembangan instrumen sukuk telah hadir juga instrumen berupa green bond yang menawarkan investasi pada pembangunan lingkungan. Dengan hadirnya green bond sebagai instrumen investasi pada lingkungan telah muncul sebuah instrumen investasi syariah yang konsentrasinya sama dengan green bond. Instrumen tersebut kemudian disebut green sukuk. Indonesia tercatat sebagai pionir dalam penerbitan obligasi hijau di kawasan Asia Tenggara. Tujuan  dari penelitian ini adalah mengidentifikasi potensi penerbitan green sukuk di Indonesia memperkokoh posisi Indonesia di pasar keuangan syariah global. Penelitian ini menggunakan pendekatan kualitatif dengan menggunakan metode historis.


Author(s):  
Aki-Mauri Huhtinen ◽  
Tommi Kangasmaa ◽  
Arto Hirvelä

Securing society is a central task of the state. In the present day as well as in the future, knowledge and information are ever more closely tied to electronic data transfer. Finland's published Cyber Security Strategy depicts how the government safeguards electronic data transfer, that is, information security against different threat and risk scenarios. Cyber Security Strategy was introduced 2013 and has provided guidance to all governmental actors how to implement security activities to be able to respond to increased security threats in networks. Visuality has increasing importance in strategic communications, not least because it is faster than the written word and globally distributed via social media. Relatedly, camera drones are becoming increasingly important tools in the security economy, especially when it comes to enhancing military capability through combat cameras. The main challenge facing society is that the cyber domain in general, and social media in particular, is moving out of the control of the nation-state.


Author(s):  
Ahmad Nabi Ahmadi

Need for cyber security framework to protect the evolving ICT Infrastructure and Cyberspace in the modern information society does not need any emphasis. Given the importance of cyber space for country development, many countries have invested large amount of money for cyber space application. Since, based on official documents, Afghanistan is in the process of integrating ICT into its critical information infrastructure, to this end, the country may face various challenges including cyber security. Due to various potential threats and risks to Afghanistan cyber security, a comprehensive cyber security infrastructure and strategy is necessary. Accordingly, Afghanistan has introduced an ICT security law. However, nowadays internet is involving great portion of government and nongovernment sections. The country must introduce a comprehensive and appropriate cybersecurity framework and strategy to tackle all of the issues and risks related to this arena. With the introduction of different ICT based technologies in the country, Afghanistan is moving towards embracing electronic culture in its day-to-day dealings. As these technologies are becoming popular and being widely used, it is important to put in place technological infrastructure and legal frameworks, which will safeguard the private and enterprise data flowing through these ICT based infrastructures. The aim of this paper is to propose a comprehensive cybersecurity framework for Afghanistan’s cyberspace in order to protect and assure data, information and IT infrastructure security in cyberspace, enhance capacities to prevent and response to cyber threats, protect the nation from the risk and vulnerability, damage from modern cyber threats and incidents through a variety of standardized institutional structures, policies and procedures, and eventually establish and achieve a Safe – Secure and Resilient cyber space for the government, businesses and citizens of Afghanistan.


2021 ◽  
Vol 21 (2) ◽  
pp. 195-208
Author(s):  
Alfonsus Maria de Liguori Sakunab ◽  
Anggraeni Silvia

Abstract   Cybersecurity has attracted attention in the study of international relations. This issue is important because most of life is connected to cyberspace. This research analyzes Lebanon's cybersecurity strategy in its official cybersecurity documents. The theoretical framework used in this study is the Three Perspective Theory of Cyber Sovereignty. The theory is explaining the division of layers in the context of sovereignty in cyberspace. The method used in this research is quantitative research obtained through the MAXQDA and GEPHI. The applications that are used in this research are to provide evidence of data in the Lebanese national strategy document. The results of this study indicate that the Lebanese security strategy documents tend to be exclusive. The Lebanese government is more dominant in discussing matters that are administrative, theoretical, principal, and planning.   Keywords: Cyber Security, Sovereignty, Strategy, Lebanon   Abstrak   cKeamanan siber merupakan salah satu isu yang menarik perhatian dalam studi hubungan internasional. Isu ini menjadi penting tatkala hampir sebagian besar unsur kehidupan terhubung ke ruang siber. Penelitian ini berupaya menganalisis strategi keamanan siber Lebanon dalam dokumen resmi kemananan sibernya.  Kerangka teori yang digunakan dalam dalam penelitian ini menggunakan Three Perspective Theory of Cyber Sovereignity yang menjelaskan pembagian lapisan dalam konteks kedaulatan di ruang siber. Metode yang digunakan ialah metode penelitian kuantitatif yang diperoleh melalui aplikasi MAXQDA dan GEPHI untuk memberikan bukti data dalam menganalisis dokumen strategi keamanan nasional Lebanon. Hasil penelitian ini menunjukkan bahwa dokumen strategi keamanan siber Lebanon cenderung bersifat eksklusif. Pemerintah Lebanon lebih dominan membahas hal-hal yang bersifat administratif, teoretis, prinsipil dan perencanaan.   Kata kunci: Keamanan Siber, Kedaulatan, Strategi, Lebanon


2012 ◽  
pp. 308-351
Author(s):  
Catherine B. Lotrionte

This chapter discusses the nature of cyber threats against government and private computer systems, describing some steps the government has taken and the challenges involved in protecting those systems. The chapter argues that a national security approach for cyber security policy is the most promising option for preventing these cyber threats while operating within the domestic legal framework. After a review of the President’s constitutional authorities to protect the nation from traditional threats, the chapter concludes that the President has some power to monitor Internet communications in transit within the United States when the communications threaten the welfare of the nation. The chapter recommends that this authority be augmented by Congressional action through legislation. The President’s powers in cyber security, even given Congressional support, however, are still restrained by the protections the Fourth Amendment provides for traditional forms of communication and individual privacy. Although there is limited Fourth Amendment precedent in the area of cyber security, the well-established exceptions to the Fourth Amendment requirements, based on consent, special governmental needs and the reasonableness of the search or seizure, provide a legal basis for executive branch action to protect critical infrastructures and their computer systems. As the Courts have long held, these exceptions allow the government to conduct searches or seizures without being bound by all of the requirements of the Fourth Amendment. If the government develops its cyber security policy in line with these exceptions, this chapter argues the government can both protect critical computer systems and operate within Fourth Amendment doctrine that recognizes the legitimacy of privacy in electronic communications.


2018 ◽  
Vol 4 (3) ◽  
pp. 145
Author(s):  
Mahendro Bhirowo ◽  
Fauzia Gustarina Cempaka Timur ◽  
Mardi Siswoyo

<p><span style="font-size: medium;"><span style="font-family: Times New Roman;"><span>E</span><span lang="EN-US">-Government is a government administration system that plays a vital role in the international global communication, and greatly determines the progress of a state. However, the government administration system that utilizes Information and Communication Technology may be exposed to threats, especially threats originating from cyberspace. This research was carried out with the aim to analyze Brunei Darussalam's E-Government strategy in overcoming cyber threats. This study uses descriptive qualitative research methods accompanied by data obtained from the presentations and interviews during the overseas field study visits in Brunei Darussalam by the representatives of the Ministry of Foreign Affairs and Trade (MOFAT), IT Protective Security Services (ITPSS), and the Prime Minister’s Office (PMO) of Brunei Darussalam, as part of a research related to Brunei Darussalam's e-Government strategy in overcoming cyber threats. The results of this study indicate that the Brunei Darussalam’s e-Government strategy in overcoming cyber threats was carried out by focusing on citizen-centric service delivery in stages. It begins with the establishment of a law on computer abuse in 2000, followed by the establishment of Brunei National Computer Emergency Response Team (BruCERT) in 2004, introduction of Internet Ethics and Cyber Security Awareness Program in 2009, and the development of a national cyber security framework in 2014. All are integrated into a common policy coined as Brunei Insight 2035. This can be an input for the implementation of e-Government in Indonesia, in order to improve the equality and openness of access to information and communication in Indonesia, without neglecting the principles of security and comfort in communicating and obtaining information.</span></span></span></p>


2017 ◽  
Vol 3 (1) ◽  
pp. 87-95
Author(s):  
Nikola Protrka ◽  
Kristijan Marić ◽  
Mihael Plećaš

Abstract The development of the information and communication technology (ICT), regardless of its many advantages, unfortunately has its disadvantage - the abuse of the cyberworld. The global character of cyberspace is specific in terms of national legislation and its view of specificities. Some countries adopted the recommendation of the Convention on Cybercrime of the Council of Europe (Official Gazette NN-MU 9/02, 4/04) and amended their national legislation, whereas others kept implementing their criminal law solutions, which are outdated and cannot reach the level of this type of criminal offences. Consequently, governments are inclined to cooperate and exchange information about this type of crime due to the fact that the criminal offender may be anywhere, and the offence itself can take place at a great distance from the offender. In September 2015, the government of the Republic of Croatia adopted the National Cyber Security Strategy and the Action Plan for the Implementation of the National Cyber Security Strategy, the first allencompassing strategy of the Republic of Croatia on cyber security. The paper also focuses on the role of the Police College in the Action Plan for the Implementation of the National Cyber Security Strategy.


Sign in / Sign up

Export Citation Format

Share Document