Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Counter Cyber Terrorism Governance In Indonesia

View through CrossRef
Information and communication technology has a significant impact on various aspects. Its developments affect daily life, and also give a new color to the political-security dynamics, especially in Indonesia. This depends on the purpose of using information and communication technology, which if not regulated, will become a double-edged sword. The typology of threats is also increasingly varied and transforming, including in the context of security threats in the form of terrorism which involves many dimensions ranging from religion-based terrorism to cyber-based terrorism. The state's response to cyber terrorism as a new security threat phenomenon is examined in this paper in a balanced way using an inward-looking and outward-looking perspective. By using qualitative research methods and descriptive research types, the existing data related to what has been done by Indonesia are interpreted into the form of a governance conception in the context of countering cyber terrorism. Indonesia has identified domestic conditions to be able to optimize its resources. At the same time, Indonesia is also trying to improve its capabilities by conducting international cooperation. So that the governance of countering cyber terrorism in Indonesia still leaves several problems that need to be resolved, such as institutional barriers including organizational culture which is the key to coordination between institutions related to countering cyber terrorism in Indonesia.
Sunan Gunung Djati State Islamic University of Bandung
Title: Counter Cyber Terrorism Governance In Indonesia
Description:
Information and communication technology has a significant impact on various aspects.
Its developments affect daily life, and also give a new color to the political-security dynamics, especially in Indonesia.
This depends on the purpose of using information and communication technology, which if not regulated, will become a double-edged sword.
The typology of threats is also increasingly varied and transforming, including in the context of security threats in the form of terrorism which involves many dimensions ranging from religion-based terrorism to cyber-based terrorism.
The state's response to cyber terrorism as a new security threat phenomenon is examined in this paper in a balanced way using an inward-looking and outward-looking perspective.
By using qualitative research methods and descriptive research types, the existing data related to what has been done by Indonesia are interpreted into the form of a governance conception in the context of countering cyber terrorism.
Indonesia has identified domestic conditions to be able to optimize its resources.
At the same time, Indonesia is also trying to improve its capabilities by conducting international cooperation.
So that the governance of countering cyber terrorism in Indonesia still leaves several problems that need to be resolved, such as institutional barriers including organizational culture which is the key to coordination between institutions related to countering cyber terrorism in Indonesia.

Related Results

An Empirical Study on Cyber Crimes Against Women and Children in India
An Empirical Study on Cyber Crimes Against Women and Children in India
The aim of the study is to understand the Cyber-crimes against women and Children in India for a period of five years from 2017 to 2021. The study is based on Secondary data collec...
Macroeconomic volatility and terrorism incidents in Africa
Macroeconomic volatility and terrorism incidents in Africa
AbstractThis article investigates the impact of macroeconomic volatility on terrorism in 38 African economies spanning the period from 1980 to 2012, using available data. It examin...
Cyber operational risk scenarios for insurance companies
Cyber operational risk scenarios for insurance companies
Abstract Cyber Operational Risk: Cyber risk is routinely cited as one of the most important sources of operational risks facing organisations today, in various publications and ...
ANALYSIS OF INDONESIAN AND EUROPEAN UNION (EU) RELATIONSHIP STRATEGY OVERCOMING CYBER TERRORISM
ANALYSIS OF INDONESIAN AND EUROPEAN UNION (EU) RELATIONSHIP STRATEGY OVERCOMING CYBER TERRORISM
This research discusses Indonesian National Security in handling entry of malware caused by the attack including cyber terrorism. Utilization Technology Increasing information and ...
Cyber Espionage
Cyber Espionage
Cyberspace gives rise to risks as well as opportunities, and a prominent threat emerging from this domain is cyber espionage. Because no internationally and legally recognized defi...
The Role Of Pancasila Values In Dealing With The Rise Of Terrorism And Radicalism
The Role Of Pancasila Values In Dealing With The Rise Of Terrorism And Radicalism
Acts of terrorism mean using violence or the danger of violence and raising concerns with mass casualties and causing damage to public facilities. Meanwhile, radicalism is a view t...
The challenges of cybersecurity insurance development: The case of Latvia
The challenges of cybersecurity insurance development: The case of Latvia
Purpose. This paper aims to provide an overview of the current challenges of cybersecurity insurance, focusing on the identification of development constraints and opportunities an...

Back to Top