NATIONAL DEFENSE MODEL BASED ON DATA SOVEREIGNTY: STRATEGY TO OVERCOME THREATS IN DIGITAL ERA

  • januar arief martharaharja indonesia defense university
  • romie oktovianus bura
Keywords: Data Sovereignty, National Defense and Security, Digital Era, Cyber Threats

Abstract

ABSTRACT

 

Threats to national defense and security always develop along with technological advancements. The threat does not only come from the real world which involves physical attacks, but can also come from cyberspace in the form of attacks on the security of state data. The purpose of this research is to develop a national defense model based on the concept of data sovereignty to overcome various threats that come from the digital world. The type of this research is descriptive qualitative with research data in the form of secondary data collected using literature studies and analyzed using qualitative techniques. The model of national defense based on data sovereignty illustrates the components needed to shape national defense. These components consist of policy, institutional, law enforcement, and various other components that contribute to building data sovereignty.

 

Keywords: Data Sovereignty, National Defense and Security, Digital Era, Cyber Threats

Author Biography

januar arief martharaharja, indonesia defense university
faculty defense of technology

References

Arianto, A. R., & Anggraini, G. (2019). Membangun Pertahanan Dan Keamanan Siber Nasional Indonesia Guna Menghadapi Ancaman Siber Global Melalui Indonesia Security Incident Response Team On Internet Infrastructure (ID-SIRTII). Jurnal Pertahanan & Bela Negara, 9(1), 13–29.
Gultom, R., Midhio, W., Silitonga, T., & Pudjiatmoko, S. (2018, March). Introducing the Six-Ware Cyber Security Framework Concept to Enhancing Cyber Security Environment. In ICCWS 2018 13th International Conference on Cyber Warfare and Security (p. 262). Academic Conferences and publishing limited.
Parks, R. C., & Duggan, D. P. (2011). Principles of cyberwarfare. IEEE Security & Privacy, 9(5), 30-35.
BSSN. (2018). 2018 Honeypot project BSSN-IHP. Jakarta Selatan.
Bungin, B. (2017). Metodologi Penelitian Kuantitatif. Jakarta: PT Fajar Interpratama Mandiri.
Cahyadi, I. (2016). Tata Kelola Dunia Maya Dan Ancaman Kedaulatan Nasional. Politica, 7(2), 210–232.
Creswell, J. W. (2014). Research Design: Quantitative and QUalitative APproach. London: Sage Publishing.
Craswell, J.W. (2018). Research Design; Qualitative, Quantitative and Mixed Methods Approaches. London: SagePublication
Crotty, M. (1998). The Foundations of Social Research: Meaning and Perspective in the Research Process. London: SagePublication
Denzin, NK. dan Lincoln, YS. (2018). Sage handbook of Qualitative Research, London: SagePublication
Bernard, HR. (2006). Research Methods in Antropology. Qualitative and Quantitative Approaches. Toronto: Altamira
MTAN. (2018). Materi Trilogi Penelitian Sosial. Surabaya: MTAN
Tracy, SJ. (2013). Qualitative Research Methods. UK: Wiley Blackwell.
Taylor, SJ, Bogdan, R., and DeVault, ML. (2016) Qualitaive Research Methods, UK: Wiley Blackwell
Taylor, PC., and Wallace, J. (2017). Qualitative Research in Postmodern Times. Netherlands: Springer
Franedya, R. (2018). Kerugian Akibat Kejahatan Siber Mencapai Rp 8.160 T/Tahun. Retrieved from www.cnbcindonesia.com website: https : // www.cnbcindonesia.com / tech / 20180222063411-37-5062 / kerugian-akibat-kejahatan-siber-mencapai-rp-8160-t-tahun
Gewati, M. (2019). RI Rugi Rp 478,8 Triliun akibat Serangan Siber, DPR Siapkan RUU KKS. Retrieved from nasional.kompas.com website: https://nasional.kompas.com/read/2019/08/12/13454311/ri-rugi-rp-4788-triliun-akibat-serangan-siber-dpr-siapkan-ruu-kks?page=all
Hummel, P., Braun, M., Augsberg, S., & Dabrock, P. (2018). Sovereignty And Data Sharing. ITU Journal, 2(23).
Husain, A. (2019). Ketahanan dasar lingkungan. Makassar: CV Sah Media.
Jazuli, A. (2016). Pembangunan Pertahanan Dan Keamanan Demi Penegakan Hukum Di Indonesia: Kewibawaan Suatu Negara. Jurnal Penelitian Hukum, 16(2), 187–199.
McAfee.com. (2019). McAfee labs threats report. Retrieved from https://www.mcafee.com/enterprise/en-us/assets/reports/rp-quarterly-threats-aug-2019.pdf
Prasetia, A. (2019). Jokowi: Lindungi Kedaulatan Data Tanpa Kompromi, Siapkan Regulasi! Retrieved from news.detik.com website: https://news.detik.com/berita/d-4667990/jokowi-lindungi-kedaulatan-data-tanpa-kompromi-siapkan-regulasi
Raco, J. R. (2013). Metode penelitian kualitatif. Jakarta: Grasindo.
Rahmawati, I. (2017). Analisis Manajemen Risiko Ancaman Kejahatan Siber (Cyber Crime) Dalam Peningkatan Cyber Defense. Jurnal Pertahanan & Bela Negara, 7(2), 51–66.
Rizal, M., & Yani, Y. M. (2016). Cybersecurity Policy and Its Implementation in Indonesia. Journal of ASEAN Studies, 4(1), 61–78.
Saputera, M. Y. (2015). Pengaruh Cyber Security Strategy Amerika Serikat Menghadapi Ancaman Cyber Warfare. JOM FISIP, 2(2), 1–14.
Silalahi, U. (2009). Metode Penelitian Sosial. Bandung: PT. Refika Aditama.
Tedyyana, A., & Supria. (2018). Perancangan Sistem Pendeteksi Dan Pencegahan Penyebaran Malware Melalui SMS Gateway. Jurnal Inovtel Polbeng, 3(1), 34–40.
European Commission. A Digital Single Market Strategy for Europe. Communication from the Commission to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions. Available online: https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX: 52015DC0192 (accessed on 20 November 2018).
Bundesministerium für Verkehr und digitale Infrastruktur. Eigentumsordnung für Mobilitätsdaten? Eine Studie aus technischer, ökonomischer und rechtlicher Perspektive. Published in 2017. Available online: https: // www.bmvi.de / SharedDocs / DE / Publikationen / DG / eigentumsordnung-mobilitaetsdaten.html (accessed on 20 November 2018).
Smart City Charter: Making digital Transformation at the Local Level Sustainable. Scientific Support: Federal Institute for Building, Urban Affairs and Spatial Development (BBSR), Division I 5—Digital Cities, Risk Prevention and Transportation, Stephan Günthner. Available online: https : // www.bbsr.bund.de / BBSR / EN / Publications / SpecialPublication / 2017/smart-city-charta-de-eng.html (accessed on 20 November 2018).
Die Bundesregierung (The German Gouvernement). Deutsche Nachhaltigkeitsstrategie—Neuauflage. 2016. Available online: https : // www.bundesregierung.de / Content / Infomaterial/BPA/Bestellservice/Deutsche_Nachhaltigkeitsstrategie_Neuauflage_2016.pdf?__blob=publicationFile&v=23 (accessed on 20 November 2018).
Schieferdecker, I.; Bruns, L.; Cuno, S.; Flügge, M.; Isakovic, K.; Klessmann, J.; Kraft, V.; Lämmel, P.; Stadtkewitz, D.; Tcholtchev, N.; et al. Urbane Datenräume—Möglichkeiten von Datenaustausch und Zusammenarbeit im Urbanen Raum. pp. 1–275, Published in June 2018. Available online: https : // cdn0.scrvt. com / fokus / 774af17bdc0a18cd / 69f7a401c168 / UDR_Studie_062018.pdf ( accessed on 20 November 2018 ).
Greater London Authority. Data for London: A City Data Strategy. 2016. Available online: https://files.datapress.com/london/dataset/data-for-london-a-city-data-strategy/2016-03-01T09 : 46 : 23/London%20City%20Data%20Strategy%20March%202016.pdf ( accessed on 21 November 2018 ).
PwC Study. Datenaustausch als wesentlicher Bestandteil der Digitalisierung. 2017. Available online: https : // www.pwc.de / de / digitale-transformation / studie-datenaustausch-digitalisierung.pdf (accessed on 22 November 2018).
Schwerpunktinitiative Digitale Information der Allianz der deutschenWissenschaftsorganisation—Forschungsdaten. Available online: https : // www.allianzinitiative.de / de / archiv / forschungsdaten (accessed on 22November 2018).
Deutsche Forschungsgemeinschaft. Leitlinien zum Umgang mit Forschungsdaten. Available online: http://www. dfg.de/download/pdf/foerderung/antragstellung/forschungsdaten/richtlinien_forschungsdaten.pdf (accessed on 22 November 2018).
Kuzev, P.;Wangermann, T. Repräsentatives Dateneigentum. Ein zivilgesellschaftliches Bürgerrecht; Konrad-Adenauer-Stiftung e.V.: Berlin, Germany, 2018.
Published
2021-03-31
Section
Articles