Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 214845 dokumen yang sesuai dengan query
cover
cover
Washington: DC Westphalia Press, an imprint of the Policy Studies Organization, 2017
003.5 ISS
Buku Teks SO  Universitas Indonesia Library
cover
Nabila Rizka Febrina
"Penelitian ini berfokus pada Strategi Nasional dan Kerjasama Kawasan di Sektor Siber. Studi atas 3 Negara Baltik: Lithuania, Estonia, Latvia, berdasarkan faktor-faktor dalam strategi nasional yang paling dikenal, yaitu: faktor hukum, faktor organisasi dan teknis, faktor kegiatan peningkatan kapasitas di masing-masing negara, dan faktor kerjasama tersebut di kawasan, yaitu Baltik. Dalam Studi ini juga dieksplorasi pentingnya penunjukan badan resmi untuk memimpin tugas keamanan siber di tingkat nasional dan pembentukan Tim Respons Insiden Komputer (CIRT) untuk memerangi serangan siber yang menargetkan ruang siber nasional. Penelitian ini menggunakan metode kualitatif dengan memanfaatkan data kualitatif dan data kuantitatif untuk mendukung rancangan penelitian studi kasus. Dalam penelitian ini digunakan Regional Security Complex Theory (RSCT) oleh Barry Buzan dan beberapa konsep, yaitu: konsep keamanan nasional, dan konsep sektor siber. Hasil penelitian literatur menunjukkan bahwa 3 Negara Baltik, yaitu Lithuania, Estonia, Latvia memiliki strategi nasional terkait sektor siber dan memiliki berbagai kerjasama di Kawasan Baltik dalam sektor siber karena ketiga negara menganggap bahwa keamanan siber sangat mendesak dan signifikan sebagai bagian dari keamanan dan ketahanan nasional dan regional baik di kawasan Baltik maupun wilayah Uni Eropa secara menyeluruh. Faktor hukum, organisasi dan teknis, kegiatan peningkatan kapasitas, dan kerjasama siber di kawasan Baltik sampai batas tertentu menjadi pembeda kesuksesan Lithuania, Estonia dan Latvia.

This research focuses on the National Strategy and Regional Cooperation in the Cyber Sector. Study of 3 Baltic Countries: Lithuania, Estonia, Latvia, based on the most recognized factors in the national strategy, namely: legal factors, organizational and technical factors, factors of capacity building activities in each country, and these cooperation factors in the region, namely the Baltic. The Study also explores the importance of appointing an official body to lead cybersecurity tasks at the national level and establishing a Computer Incident Response Team (CIRT) to combat cyberattacks targeting national cyberspace. This study uses a qualitative method by utilizing qualitative data and quantitative data to support the case study research design. In this research, the Regional Security Complex Theory (RSCT) by Barry Buzan and several concepts are used, namely: the concept of national security, and the concept of the cyber sector. The results of the literature research show that the 3 Baltic States, namely Lithuania, Estonia, Latvia have national strategies related to the cyber sector and have various collaborations in the Baltic Region in the cyber sector because the three countries consider that cybersecurity is very urgent and significant as part of national security and resilience and regionally both in the Baltic region and the European Union region as a whole. Legal, organizational and technical factors, capacity building activities, and cyber cooperation in the Baltic region are to some extent differentiating the success of Lithuania, Estonia and Latvia."
Jakarta: Sekolah Kajian Stratejik dan Global Universitas Indonesia, 2023
T-pdf
UI - Tesis Membership  Universitas Indonesia Library
cover
Marsyanda Syifa Adiba
Depok: Fakultas Ilmu Sosial dan Ilmu Politik Universitas Indonesia, 2019
S-Pdf
UI - Skripsi Membership  Universitas Indonesia Library
cover
Farahdina Fairuz Iftinan
"Perang siber adalah bentuk globalisasi kejahatan yang dilakukan oleh aktor yang berkuasa. Tesis ini menggunakan pendekatan kualitatif untuk menjelaskan bagaimana kebijakan cyber defense dan cyber security di Indonesia dan kesiapan Indonesia dalam menghadapi kejahatan perang siber global. Studi ini melibatkan 3 lembaga narasumber dari Kementerian Pertahanan, Kepolisian RI, dan Badan Siber dan Sandi Negara. Pengumpulan data dilakukan dengan tatap muka dan daring. Tesis ini menggunakan perspektif teori pilihan rasional dan kebijakan publik sebagai pijakan analisis. Teori pilihan rasional digunakan untuk menjelaskan bahwa aktor melakukan kejahatan melihat dari keuntungan dan kerugian yang didapatkan dari kejahatan yang dilakukan. Teori kebijakan publik memberikan penjelasan bagaimana tahapan pembuatan kebijakan agar menghasilkan kebijakan yang efektif dengan tujuan yang ingin dicapai. Hasil penelitian ini menunjukkan bahwa Indonesia masih memiliki banyak kekurangan pada cyber security<, cyber defense, dan kebijakannya. Berdasarkan analisis teori pilihan rasional, Indonesia berpotensi besar untuk diserang secara global dikarenakan lemah dan rentannya sistem keamanan dan pertahanan siber di Indonesia. Sehingga aktor penyerang akan mendapatkan keuntungan yang maksimal dan kerugian yang minimal. Dibutuhkan pembentuka kebijakan cyber security dan cyber defense sesuai dengan tahapan teori kebijakan publik, agar cyber security dan cyber defense dapat dijalankan dengan efektif. Temuan studi ini berkontribusi pada pembentukan kebijakan cyber security dan cyber defense yang komprehensif dan relevan sehingga dapat menghadapi kejahatan perang siber global.

Cyber warfare is a form of crime globalization perpetrated by powerful actors. This thesis uses a qualitative approach to explain how cyber defense and cyber security policies in Indonesia and Indonesia's readiness to face global cyber war crimes. This study involves three resource institutions that are the Ministry of Defense, the Indonesian National Police, and the National Cyber and Crypto Agency. Data collection was conducted both offline and online. This thesis uses the perspectives of rational choice theory and public policy as the basis of analysis. Rational choice theory explains that actors commit crimes by weighing the benefits and disadvantages of their crimes. Public policy theory describes the stages of policy-making to produce effective policies with the expected objectives. The results of this study indicate that Indonesia still has many shortcomings in cyber security, cyber defense, and its policies. Based on the analysis of rational choice theory, Indonesia has a high potential to be attacked globally due to the weak and vulnerable cyber security and defense systems in Indonesia. Thus, attacking actors will gain maximum benefits with minimal losses. It is necessary to formulate cyber security and cyber defense policies according to the stages of public policy theory so that cyber security and cyber defense can be implemented effectively. The findings of this study contribute to the formation of comprehensive and relevant cyber security and cyber defense policies to face global cyber war crimes."
Depok: Fakultas Ilmu Sosial dan Ilmu Politik Universitas Indonesia, 2024
T-pdf
UI - Tesis Membership  Universitas Indonesia Library
cover
Feline Cloramidine
"Penelitian ini menganalisis hubungan antara rivalitas geopolitik AS-Cina dan pengaruhnya terhadap proses formulasi norma siber global PBB (UN GGE dan UN OEWG) tepatnya setelah tahun 2017-2021. Sejak awal Cina mendapatkan kemerdekaannya di tahun 1949 hingga saat ini, hubungan yang terjalin antara AS dengan Cina selalu diwarnai oleh konflik dan kompetisi, termasuk dalam domain siber. AS berkeinginan untuk mempertahankan posisi hegemoninya (status quo) dengan mengajukan pendekatan multi-stakeholder dalam tata kelola domain siber. Sementara Cina berkeinginan untuk menghapus hegemoni AS dengan cara mengubah pendekatan tata kelola domain siber menjadi pendekatan multilateral. Tulisan ini menggunakan metode kualitatif dengan analisis dari data-data primer layaknya sumber utama dan hasil wawancara bersama narasumber ahli, juga data-data sekunder dari penelitian-penelitian terdahulu. Selanjutnya, berdasarkan variabel-variabel teori konstruktivisme dalam keamanan siber, tesis ini menemukan bahwa: 1) status AS dan Cina sebagai great power merupakan salah satu faktor utama yang menghambat terbentuknya norma siber hingga saat ini; dan 2) kecenderungan negara-negara dalam mengembangkan kapabilitas sibernya, yang berpotensi terhadap perkembangan insiden siber di antara negara-negara membuat pengaruh dari norma siber yang sudah ada menjadi berkurang.

This study analyzes the relationship between the US-China geopolitical rivalry and its influence on the formulation process of the UN global cyber norms (UN GGE and UN OEWG) in 2017-2021. Since the beginning of China's independence in 1949 until now, the relationship between the US and China has always been colored by conflict and competition, including in the cyber domain. The US wants to maintain its hegemonic position (status quo) by proposing a multi-stakeholder approach in cyber governance. Meanwhile, China wants to abolish US hegemony by changing the cyber governance approach to a multilateral approach. This paper uses a qualitative method with analysis from primary data such as primary sources and the results of interviews with expert sources, as well as secondary data from previous studies. Furthermore, based on the variables of constructivism theory in cybersecurity, this thesis finds that: 1) the status of the US and China as great powers is one of the main factors that hinder the formation of cyber norms until now; and 2) the tendency of countries to develop their cyber capabilities, which has the potential to affect the development of cyber incidents among countries to reduce the influence of existing cyber norms.
"
Depok: Fakultas Ilmu Sosial dan Ilmu Politik Universitas Indonesia, 2024
T-pdf
UI - Tesis Membership  Universitas Indonesia Library
cover
Adityarachman Sofiar
"Penelitian ini bertujuan untuk menjelaskan urgensi dampak kegiatan blue economy di Laut Baltik, khususnya dampak terhadap lingkungan dan masyarakat di negara-negara Skandinavia. Pemanfaatan sumber daya yang ada di Laut Baltik secara berlebihan dapat memberikan dampak negatif terhadap lingkungan. Fokus penelitian mengkaji pembangunan berkelanjutan mengenai blue economy di negara Skandinavia. Penelitian ini memberikan gambaran mengenai dampak ekonomi, sosial, dan lingkungan. Penelitian ini mengidentifikasi tantangan utama yang dihadapi industri maritim di negara-negara Skandinavia, termasuk kebutuhan akan perencanaan dan pengelolaan sumber daya bersama, pelestarian alam, serta perlindungan lingkungan laut. Untuk memahami fenomena sosial yang kompleks peneliti menggunakan metode penelitian kualitatif yang melibatkan pengumpulan dan analisis data non-numerik. Dalam mengeksplorasi penerapan blue economy di negara-negara Skandinavia berdarasakan EU blue economy akan menggunakan Teori Regional Security Complex Theory dan konsep Common Pool Resource. Teori dan konsep yang digunakan bertujuan untuk menjelaskan interaksi multi level antara negara-negara Skandinavia untuk mencapai tujuan bersama. Temuan penelitian ini berpendapat bahwa blue economy di negara-negara Skandinavia yang berbatasan dengan Laut Baltik dapat membawa manfaat yang signifikan baik bagi industri maritim maupun masyarakat luas.

This research aims to explain the urgency of the impact of blue economy activities in the Baltic Sea, especially the impact on the environment and society in Scandinavian countries. Excessive use of the resources in the Baltic Sea can have a negative impact on the environment. The research focus examines sustainable development regarding the blue economy in Scandinavian countries. This research provides an overview of the economic, social and environmental impacts. This research identifies the main challenges facing the maritime industry in Scandinavian countries, including the need for planning and management of shared resources, nature conservation and protection of the marine environment. To understand complex social phenomena researchers use qualitative research methods which involve the collection and analysis of non-numerical data. In exploring the application of the blue economy in Scandinavian countries based on the EU blue economy, we will use the Regional Security Complex Theory and the Common Pool Resource concept. The theories and concepts used aim to explain multi-level interactions between Scandinavian countries to achieve common goals. The findings of this research argue that the blue economy in Scandinavian countries bordering the Baltic Sea can bring significant benefits to both the maritime industry and society at large."
Jakarta: Sekolah Kajian Stratejik dan Global Universitas Indonesia, 2024
T-pdf
UI - Tesis Membership  Universitas Indonesia Library
cover
Nurul Biandra Promoeriezky Sendjaja
"ABSTRAK
Teknologi informasi dan komunikasi dimanfaatkan secara signifikan dalam kegiatan sehari-hari, sehingga infrastruktur kritis Inggris kini bergantung pada kondisi dalam lingkungan cyberspace. Hal ini tidak hanya memberikan manfaat, tetapi juga dapat menimbulkan ancaman yang dapat mempengaruhi stabilitas keamanan nasional. Oleh karena itu cyber security menjadi salah satu prioritas tertinggi dalam kebijakan keamanan nasional Inggris. Namun regulasi cyber security di Inggris sering kali mengundang perdebatan dan tentangan dari berbagai pihak. Penelitian ini bertujuan untuk mengkonstruksi pro dan kontra masyarakat terhadap regulasi tersebut serta menganalisis penyebab regulasi cyber security di Inggris bertentangan dengan prinsip HAM. Analisis dalam penelitian ini menggunakan teori keamanan dan teori masyarakat informasi dengan metode penelitian hukum normatif dan pendekatan kualitatif. Hasil dari penelitian ini menunjukkan bahwa regulasi cyber security di Inggris tidak mencerminkan nilai kebebasan individu serta dapat bersifat positif dan negatif di saat yang bersamaan. Di satu sisi bertujuan untuk melindungi kemanan seluruh warganya dari kejahatan serius dan di sisi lain tujuan tersebut diwujudkan melalui peraturan yang mencederai hak fundamental individu.

ABSTRACT
Information and communication technology utilized significantly in daily activities, so that critical infrastructures in the UK now dependent on conditions in cyberspace. It rsquo s not only bring advantages, but also could pose threats that affect national security. Therefore cyber security becomes one of the highest priorities in national security policy of the UK. Cyber security regulations in the UK are often invite debate and opposition from various parties. This study aimed to construct the pros and cons of the regulation and analyze the causes of its contrary to the principles of Human Rights. The analysis in this study uses security theory and the theory of the information society with normative legal research methods and qualitative approaches. The results of this study indicate that the regulation of cyber security in the UK do not reflect the values of individual freedom and could be positive and negative at the same time. On the one hand aims to protect the security of all citizens from serious crime and on the other hand this objective is manifested through regulations that harm the fundamental rights of individuals."
2017
T-Pdf
UI - Tesis Membership  Universitas Indonesia Library
cover
Pakpahan, Victoria M.
"The development of technology has brought us to a world with much efficiency in many activities covering information exchange, economic, and social activities. The growing network is now connecting people all over the world-indiviuals, corporation, goverment institutions, even crime organization-with many types of device ranging from mobile phone, television, personal computer, to public infrastructure. A more interconnected world does not come with only advantages and opportunities, new threats are emerging in the virtual domain which we called as the cyberspace. This article elaborates the cyberspace with its threats form the wide scope of global context with the case study of Indonesia in particular. THe aim of this article is to introduce the needs of growing strategic management in cyber security. It also discusses cyberthreats as many people still do not aware of those threats and to generate thinkging over the importance of strategic management in cyber security, including an applicable strategy as we need a comprehensive reactive and proactive approach to tackle this issue in international relations today. Domestically, Indonesia also needs to further develop its cyber diplomacy to further anticipate any possible cyber disruptions to its national interest."
Jakarta: The Ary Suta Center, 2018
330 ASCSM 40 (2018)
Artikel Jurnal  Universitas Indonesia Library
cover
"The development of technology has brought us to a world with much efficiency in many activities covering information exchange, economic, and social activities. The growing network is now connecting people all over the world-indiviuals, corporation, goverment institutions, even crime organization-with many types of device ranging from mobile phone, television, personal computer, to public infrastructure. A more interconnected world does not come with only advantages and opportunities, new threats are emerging in the virtual domain which we called as the cyberspace. This article elaborates the cyberspace with its threats form the wide scope of global context with the case study of Indonesia in particular. THe aim of this article is to introduce the needs of growing strategic management in cyber security. It also discusses cyberthreats as many people still do not aware of those threats and to generate thinkging over the importance of strategic management in cyber security, including an applicable strategy as we need a comprehensive reactive and proactive approach to tackle this issue in international relations today. Domestically, Indonesia also needs to further develop its cyber diplomacy to further anticipate any possible cyber disruptions to its national interest."
Jakarta: The Ary Suta Center, 2018
330 ASCSM 40 (2018)
Artikel Jurnal  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>