Show simple item record

[journal article]

dc.contributor.authorRizal, Muhamadde
dc.contributor.authorYani, Yanyan M.de
dc.date.accessioned2019-07-23T10:38:55Z
dc.date.available2019-07-23T10:38:55Z
dc.date.issued2016de
dc.identifier.issn2338-1353de
dc.identifier.urihttps://www.ssoar.info/ssoar/handle/document/63214
dc.description.abstractThe purpose of state defense is to protect and to save the integrity of the Unitary State of the Republic of Indonesia, the sovereignty of the state, as well as its security from all kinds of threats, whether they are military or non-military ones. One of the nonmilitary threats that potentially threatens the sovereignty and security of the nationstate is the misuse of technology and information in cyberspace. The threat of irresponsible cyber attacks can be initiated by both state and non-state actors. The actors may be an individual, a group of people, a faction, an organization, or even a country. Therefore, the government needs to anticipate cyber threats by formulating cyber security strategies and determining comprehensive steps to defend against cyber attacks; its types and the scale of counter-measures, as well as devising the rules of law.de
dc.languageende
dc.subject.ddcPolitikwissenschaftde
dc.subject.ddcPolitical scienceen
dc.subject.ddcPublizistische Medien, Journalismus,Verlagswesende
dc.subject.ddcNews media, journalism, publishingen
dc.subject.otherCybe-attacks threats; cyber security strategiesde
dc.titleCybersecurity policy and its implementation in Indonesiade
dc.description.reviewbegutachtet (peer reviewed)de
dc.description.reviewpeer revieweden
dc.source.journalJournal of ASEAN Studies
dc.source.volume4de
dc.publisher.countryMISC
dc.source.issue1de
dc.subject.classozFriedens- und Konfliktforschung, Sicherheitspolitikde
dc.subject.classozPeace and Conflict Research, International Conflicts, Security Policyen
dc.subject.classozinteraktive, elektronische Mediende
dc.subject.classozInteractive, electronic Mediaen
dc.subject.thesozDatensicherheitde
dc.subject.thesozdata securityen
dc.subject.thesozneue Mediende
dc.subject.thesoznew mediaen
dc.subject.thesozInformationstechnologiede
dc.subject.thesozinformation technologyen
dc.subject.thesozInternetde
dc.subject.thesozInterneten
dc.subject.thesozKommunikationstechnologiede
dc.subject.thesozcommunication technologyen
dc.subject.thesozBedrohungde
dc.subject.thesozthreaten
dc.subject.thesozSicherheitspolitikde
dc.subject.thesozsecurity policyen
dc.subject.thesozKriminalitätde
dc.subject.thesozcriminalityen
dc.subject.thesozVerbrechensbekämpfungde
dc.subject.thesozcrime fightingen
dc.subject.thesozRechtde
dc.subject.thesozlawen
dc.identifier.urnurn:nbn:de:0168-ssoar-63214-4
dc.rights.licenceCreative Commons - Namensnennung, Nicht-kommerz. 4.0de
dc.rights.licenceCreative Commons - Attribution-NonCommercial 4.0en
internal.statusformal und inhaltlich fertig erschlossende
internal.identifier.thesoz10057861
internal.identifier.thesoz10039324
internal.identifier.thesoz10047425
internal.identifier.thesoz10040528
internal.identifier.thesoz10039942
internal.identifier.thesoz10037879
internal.identifier.thesoz10037376
internal.identifier.thesoz10034531
internal.identifier.thesoz10036972
internal.identifier.thesoz10040087
dc.type.stockarticlede
dc.type.documentZeitschriftenartikelde
dc.type.documentjournal articleen
dc.source.pageinfo61-78de
internal.identifier.classoz10507
internal.identifier.classoz1080404
internal.identifier.journal631
internal.identifier.document32
internal.identifier.ddc320
internal.identifier.ddc070
dc.description.pubstatusVeröffentlichungsversionde
dc.description.pubstatusPublished Versionen
internal.identifier.licence32
internal.identifier.pubstatus1
internal.identifier.review1
internal.pdf.wellformedtrue
internal.pdf.encryptedfalse


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record