•  
  •  
 

Abstract

Development of Internet technology has the potential to boost economic growth of a country. On the other hand, Internet technology also increases the amount and form of threat to the sovereignty of a state in the virtual world. Sovereignty in cyberspace become an important topic in the discussion of national and international security. In the context of the definition of space was no longer relevant in the light confined to the Regional Land, Sea, and Air. Developments Period increasingly cradles State with indulgence will ease in accessing information technology, which is certainly without successfully taking on the role that space-Maya also as jurisdictions absolute as part of sovereignty rather than a State, so that abstentions his State of understanding of space-Maya should be reexamined by countries, not merely the regulation of virtual space, but the space-virtual (Cyberspace) is an area that must be managed and utilized its own independently by the state and poured back (amendment) 1945.

Bahasa Abstract

Perkembangan teknologi internet memiliki potensi untuk mendorong pertumbuhan ekonomi suatu negara. Di sisi lain, teknologi internet juga turut meningkatkan jumlah dan bentuk ancaman terhadap kedaulatan suatu negara di dunia maya. Kedaulatan di dunia maya menjadi topik penting dalam pembahasan keamanan nasional maupun internasional. Dalam konteks Definisi ruang tidaklah lagi relevan jika dipandang hanya terbatas kepada Wilayah Darat, Laut, dan Udara. Perkembangan Zaman kian membuai Negara dengan kemanjaan akan kemudahan dalam mengakses Teknologi Informasi, yang tentunya tanpa berhasil mengambil peran bahwa Ruang-Maya juga merupakan sebagai wilayah yurisdiksi mutlak sebagai bagian kedaulatan daripada suatu Negara, sehingga abstain nya Negara dalam memaknai Ruang-Maya perlu dikaji ulang oleh negara, bukan hanya sebatas regulasi bagi pengguna ruang maya, akan tetapi Ruang-maya (Cyberspace) merupakan suatu wilayah yang harus dikelola dan dimanfaatkan sendiri secara mandiri oleh Negara serta dituangkan kembali (amandemen) UUD 1945.

Kata kunci: keamanan cyber, kedaulatan Negara, keamanan nasional, tata kelola pemerintahan, perlindungan terhadap masyarakat.

References

Artikel

Glaser, C. L., “The Security Dilemma Revisited”, World Politics, Vol. 50, No. 1, 1997.

Jervis, R., “Cooperation Under the Security Dilemma”, World Politics, Vol. 30, No. 2, 1978.

Krasner, S. D., “Abiding sovereignty”, International Political Science Review, Vol. 22, No. 3, 2001.

Lampton, D. M., “Xi Jinping and the National Security Commission: policy coordination and political power”,Journal of Contemporary China, Vol. 24, No. 95, 2015.

Sonbuchner, S. P., “Master of your domain: should the US Government Maintain Control over the Internet’s Root”, Minnesota Journal of International Law, Vol. 17, 2008.

Yi, S. “Transform and construction: the design of nationalcybersecurity strategy and the capacity build in a post-Snowden age”, China Information Security, Vol. 5, 2014.

Buku

Edi Atmaja, AP. “Kedaulatan Negara Di Ruang Maya: Kritik UU ITE Dalam Pemikiran Satjipto Rahardjo”, Jurnal Opinio Juris. Vol. 16. Ed. Mei-September 2014, hlm. 48-50.

Lewis, J. A. dan Neuneck, G., The Cyber Index: International Security Trends and Realities, Geneva: United Nations Institute for Disarmament Research (UNIDIR), 2013.

Nye Jr., J. S., The Regime Complex for Managing Global Cyber Activities, Global Commission on Internet Governance Paper Series No. 1, London: Global Commission on Internet Governance, 2014.

Olson, M., The Logic of Collective Action: Public Goods and the Theory of Groups, Cambridge: Harvard University Press, 1965, hlm. 76.

Ostrom, E., Governing the Commons: The Evolution of Institutions for Collective Action, Cambridge: Cambridge University Press, 1990.

Internet

De Bossey, C., Report of the Working Group on Internet Governance, http://www.wgig.org/docs/WGIGREPORT.pdf, diakses 3 Februari 2020.

GovCISRT, Profil, http://govcsirt.kominfo.go.id/tentangidgovcert/profil, diakses 3 Februari 2020.

Greenwald dan MacAskill, NSA Prism program taps into user data of Apple, Google and Others, http://www.peacepalacelibrary.nl/ebooks/files/356296245.pdf, diakses 1 Februari 2020.

Hayden, M., Ex-NSA chief: safeguards exist to protect Americans’ privacy, http://edition.cnn.com/2013/08/01/opinion/hayden-nsa-surveillance/, diakses 2 Februari 2020.

ICANN, Overview and history of the IANA functions. SAC067. https://www.icann.org/en/system/files/files/sac-067-en.pdf , diakses 3 Februari 2020.

Id CERT, Profil, http://www.cert.or.id/tentang-kami/id/, diakses 3 Februari 2020.

Id SIRTII, struktur organisasi, http://www.idsirtii.or.id/halaman/tentang/strukturorganisasi.html., diakses 3 Februari 2020.

International Telecommunication Union, ITU Facts and Figures 2016, http://www.itu.int/en/mediacentre/pages/2016-PR30.aspx, diakses 3 Februari 2020.

Internet World Stats, Internet Users in the 20 Top Countries, http://www.internetworldstats.com/top20.htm, diakses 3 Februari 2020.

Kemenkominfo, Direktorat Jenderal Sumber Daya, Pos dan Informatika Kemekominfo, Tugas dan fungsi, http://kominfo.go.id/index.php/node/711/Tugas+dan+Fungsi, diakses 3 Feburari 2020.

Lembaga Sandi Negara, Tugas dan Fungsi,http://www.lemsaneg.go.id/index.php/profil/tugas-dan-fungsi/, diakses 3 Februari 2020.

Lieberthal, K, dan Jisi, W., “Addressing U.S.-China Strategic Distrust”, John L. Thornton China Center Monograph Series, Number 4, http://yahuwshua.org/en/Resource-584/0330_china_lieberthal.pdf, diakses 3 Februari 2020.

NTIA, Department of Commerce, Verisign/ICANN proposal in response to NTIA request root zone administrator proposal related to the IANA Functions Stewardship Transition, https://www.ntia.doc.gov/files / ntia /publications/root_zone_administrator_proposalrelat dtoiana_functionsstefinal.pdf, diakses 2 Februari 2020.

Peranan Negara Dalam UUD 1945,https://www.esaunggul.ac.id/peranan-negara-dalam-undang-undang-dasar-1945/, diakses pada tanggal 14 November 2019.

Sanger, D., 2015, US decides to retaliate against China’shacking, http://www.nytimes.com/2015/08/01/world/asia/us-decides-to-retaliate-against-chinas-hacking.html, diakses 2 Februari 2020.

Sanou, B., ICT Facts and Figures, https://www.itu.int/en/ITUD/Statistics/Documents/facts/ICTFactsFigures2015.pdf, diakses 4 Februari 2020.

Schmidt, L., Perspective on 2015 DoD Cyber Strategy, SantaMonica CA: RAND Corporation, http://www.dtic.mil/cgibin/GetTRDoc?AD=ADA621794, diakses 2 Februari 2020.

Smith, G., “Security Chief’s Cyberwar Testimony Seen AsVeiled Threat To Enemies”, The Huffington Post, http://www.huffingtonpost.com/2013/03/14/securitychiefcyberwar_n_2875516.html, diakses 4 Februari 2020.

World Economic Forum, The Reshaping of the World: Consequences for Society, Politics and Business. Annual Meeting,http://www3.weforum.org/docs/AM14/WEF_AM14_Public_Report.pdf, diakses 3 Februari 2020.

Share

COinS