Assesing Indonesia’s Cyber Capabilities: A New Paradigm of State Power
Keywords:cyber power, cyber security, power, cyber threats
Objective: Within international relations, power considered as a complex concept. It consists of at least two dimensions which are the scope and the domain. The rapid developments of information-technology among actors bring consequences on how the concept of power perceived in international politics. It limiting the scope and widening the domain at the same time.
Method: This paper aims to put assessment on Indonesia’s cyber power through qualitative method. Firstly, the paper begins with a brief overview on the rising number of cyber threats in global level and how some state actors react to the obstacles.
Result: As Joseph Nye mentioned that the shifting features of cyberspace decrease some of the power discrepancies among global politics actors, and create so-called the diffusion of power that epitomizes international relations in this century. Indonesia as one of the major countries in Southeast Asia Region is also inquired to respond such challenge by developing their cyber capabilities.
Conclusion: It concludes by analysing the aspects of cyber power in Indonesia through qualitative method and also proposing on how Indonesia can utilize the power effectively to face contemporary challenges.
Originality/Value: This paper then considers the development of cyber capacities in Indonesia as its respond to the international phenomenon.
Anderson, Elizabeth. Teenagers Spend 27 Hours A Week Online: How Internet Use Has Ballooned In The Last Decade, The Telegraph, 11 May 2015, http://www.telegraph.co.uk/finance/newsbysector/mediatechnologyandtelecoms/digital-media/11597743/Teenagers-spend-27-hours-a-week-online-how-internet-use-has-ballooned-in-the-last-decade.html Accessed on 9 Februari 2016, 12:00
ANSSI. “Information Systems Defence and Security: France’s Strategy”, http://www.ssi.gouv.fr/uploads/IMG/pdf/2011-02-
_Information_system_defence_and_security_-_France_s_strategy.pdf Accessed on 10 March 2016, 14:31
Cory,Bennett. “Study: Cyberattacks Up 48 Percent In 2014,” The Hill, 27 Oktober 2014, http://thehill.com/policy/cybersecurity/221936-study-cyber-attacks-up-48-percent-in-2014 Accessed on 9 February 2016 15:06;
Daily Mail. “Guess What Happens In An Internet Minute?”, http://www.dailymail.co.uk/sciencetech/article-2295703/What-happens-Internet-minute-6m-Facebook-pages-viewed-1-3m-YouTube-clips-downloaded-.html Accessed on 7 February 2016, 00:05
Harrison, V & Pagliery, J. “Nearly 1 Million New Malware Threats Released Every Day,” CNN International, http://money.cnn.com/2015/04/14/technology/security/cyber-attack-hacks-security/ Accessed on 9 February 2016, 15:14
Internet Live Stats. “Internet Users”, http://www.internetlivestats.com/internet-users/ Accessed on 7 February 2016, 11:37
Internet Live Stats. “Total Number of Websites,” http://www.internetlivestats.com/total-number-of-websites/ Accessed on 7 February 2016, 00:03
ITU. Global Cybersecurity Index, http://www.itu.int/en/ITU-D/Cybersecurity/Documents/WP-GCI-101.pdf Accessed on 9 March 2016, 19:00
Kelly, Kevin. (1994) Out of control: The new biology of machines, social systems and the economic world. Boston: Addison-Wesley.
Ministry of Foreign Affairs of the Russian Federation. “Information Security Doctrine of the Russian Federation”, http://archive.mid.ru//bdomp/ns-osndoc.nsf/1e5f0de28fe77fdcc32575d900298676/2deaa9ee15ddd24bc32575d9002c442b!OpenDocument Accessed on 10 March 2016 11:00
Morningstar, Chip and Farmer, Randall. (1990). "The Lessons of Lucasfilm's Habitat", presented at the First International Conference on Cyberspace (UT Austin, May 1990). Published in Cyberspace: First Steps, Michael Benedikt (ed.), MIT Press 1991. ISBN 0-262-02327-X.
Müller, Albert (2000). "A Brief History of the Biological Computer Laboratory (BCL)". Österreichische Zeitschrift für Geschichtswissenschaften. 11 (1): 9–30. (http://bcl.ece.illinois.edu/mueller/index.htm)
Nakashima, E & Warrick, J. “Stuxnet Was Work of U.S. and Israeli Experts, Official Say,” The Washington Post, 2 June 2012, https://www.washingtonpost.com/world/national-security/stuxnet-was-work-of-us-and-israeli-experts-officials-say/2012/06/01/gJQAlnEy6U_story.html Accessed on 9 Februari 2016 1:27
Nye, Joseph S. (2010). Cyber Power. Paper, Belfer Center for Science and International Affairs. Cambridge: Harvard Kennedy School.
Suler, John. (1996) The Psychology of Cyberspace, Overview and Guided Tour. New Jersey: Rider University (http://truecenterpublishing.com/psycyber/psycyber.html)
Sumadinata, R. W. S., Achmad, W., & Riyadi, S. F. (2022). Indonesian Border Defense Policy: A Case Study on the Interoperability of the joint regional defense command. Central European Management Journal, 30(4), 886–895. https://doi.org/10.57030/23364890.cemj.30.4.87
Suwadi, P., Manthovani, R., & Assyifa, A. K. (2023). Legal Comparison of Electronic Contract in Electronic Commerce Between Indonesia and the United States Based on the United Nations Commission on International Trade Law. Journal of Law and Sustainable Development, 11(3), e714. https://doi.org/10.55908/sdgs.v11i3.714
Shkromyda, V., Gnatiuk, T., Shkromyda, N., Vasylyuk, M., & Zorina, O. (2023). Organizational and Methodological Determinants of Integrated Reporting Development: A Case Study of Ukraine. Journal of Law and Sustainable Development, 11(3), e818. https://doi.org/10.55908/sdgs.v11i3.818
Timur, F. G. (2017). The Rise of Cyber Diplomacy-ASEAN's Perspective in Cyber Security. The Impact of Information Technology on Social and Political Dynamics (pp. 244-250). KnE Social Sciences.
Timur, F. G. (2020). Pemanfaatan IT-DRC sebagai Implementasi Cyber Security Pada Sistem Pemerintahan Berbasis Elektronik. Prosiding Seminar Nasional Sains Teknologi dan Inovasi Indonesia (SENASTINDO AAU) Vol. 1 No. 1, (pp. 307-314).
Traynor, Ian. “Russia Accused of Unleashing Cyberwar To Disable Estonia,” The Guardian, 17 May 2007, http://www.theguardian.com/world/2007/may/17/topstories3.russia Accessed on 9 Februari 2016, 13:32
Weber, Cynthia. (2005). International Relations Theory: A Critical Introduction (2nd). New York: Routledge
Wilson, E. J., (2008). Hard Power, Soft Power, Smart Power. ANNALS of the American Academy of Political and Social Sciences, Issue 616, pp. 110-124.
How to Cite
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Authors who publish with this journal agree to the following terms:
1. Authors who publish in this journal agree to the following terms: the author(s) authorize(s) the publication of the text in the journal;
2. The author(s) ensure(s) that the contribution is original and unpublished and that it is not in the process of evaluation by another journal;
3. The journal is not responsible for the views, ideas and concepts presented in articles, and these are the sole responsibility of the author(s);
4. The publishers reserve the right to make textual adjustments and adapt texts to meet with publication standards.
5. Authors retain copyright and grant the journal the right to first publication, with the work simultaneously licensed under the Creative Commons Atribuição NãoComercial 4.0 internacional, which allows the work to be shared with recognized authorship and initial publication in this journal.
6. Authors are allowed to assume additional contracts separately, for non-exclusive distribution of the version of the work published in this journal (e.g. publish in institutional repository or as a book chapter), with recognition of authorship and initial publication in this journal.
7. Authors are allowed and are encouraged to publish and distribute their work online (e.g. in institutional repositories or on a personal web page) at any point before or during the editorial process, as this can generate positive effects, as well as increase the impact and citations of the published work (see the effect of Free Access) at http://opcit.eprints.org/oacitation-biblio.html
• 8. Authors are able to use ORCID is a system of identification for authors. An ORCID identifier is unique to an individual and acts as a persistent digital identifier to ensure that authors (particularly those with relatively common names) can be distinguished and their work properly attributed.