Strategi Keamanan Siber Korea Selatan
DOI:
https://doi.org/10.59141/jiss.v1i04.44Keywords:
Keamanan Ruang Siber, Korea Selatan, Strategi Keamanan SiberAbstract
Penelitian ini bertujuan untuk memahami dan menganalisa strategi keamanan siber Korea Selatan agar dapat diketahui tingkat keamanan dan peran tiap aspek strategi keamanan siber pada Korea Selatan selain itu juga bertujuan agar dapat dijadikan referensi oleh suatu negara untuk membangun maupun memperkuat strategi keamanan siber negaranya sehingga mencegah penyalahgunaan informasi maupun data tiap warga negara maupun data penting negara yang ada di dunia siber. Metode yang digunakan pada penelitian ini adalah metode kuantitatif dengan menganalisa penerapan konsep teori kedaulatan beserta aspek-aspeknya dan metode kuantitatif dengan memberikan hasil analisa data pola strategi dan realasi data keamanan siber Korea Selatan menggunakan aplikasi MAXQDA 2020, dan GEPHI 0.9.2. Hasil analisis kuantitatif penulis terhadap dokumen South Korea’s Cybersecurity Strategy dapat disimpulkan bahwa konteks strategi keamanan siber korea sealtan memiliki kecenderungan arah pada pengaturan negara terhadap aspek national cybersecurity, cybersecurity awarness, cyberspace threats, international rules, laws and regulation, cyber crisis nation-wide, cyber crime, serta cyber infrastructure dan bersifat terbuka.
References
Bjola, C., & Pamment, J. (2018). Countering online propaganda and extremism: The dark side of digital diplomacy. Routledge.
Dimas. (n.d.). (n.d.). Microsoft bangun pusat cyber di Korea. https://kriptologi.com/2016/03/09/microsoftbangun-pusat-cybersecurity-di-korea
Eoghan, C. (2001). Digital Evidence and Computer Crime. A Harcourt Science and Technology Company.
Howard, & J. D. (1995). An Analysis of Security Insidents of the Internet.
National Security Office of South Korea. (2019). International Telecommunication Union. Plano, & J. C. (2000). Kamus Hubungan Internasional. Abardin.
Soltani, F., Naji, S., & Amiri, R. E. (2015). Levels of Analysis in International Relations and Regional Security Complex Theory. Journal of Public Administration and Governance.
Sørensen, G., & Jackson, R. (2005). Pengantar Studi Hubungan Internasional. Yeli, H. (n.d.). A Three-Perspective Theory of Cyber Sovereignty. 2, 109–115.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2020 Dinanda Diadeska Diara
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution-ShareAlike 4.0 International. that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.