dc.contributor.author | Rizal, Muhamad | de |
dc.contributor.author | Yani, Yanyan M. | de |
dc.date.accessioned | 2019-07-23T10:38:55Z | |
dc.date.available | 2019-07-23T10:38:55Z | |
dc.date.issued | 2016 | de |
dc.identifier.issn | 2338-1353 | de |
dc.identifier.uri | https://www.ssoar.info/ssoar/handle/document/63214 | |
dc.description.abstract | The purpose of state defense is to protect and to save the integrity of the Unitary State
of the Republic of Indonesia, the sovereignty of the state, as well as its security from all
kinds of threats, whether they are military or non-military ones. One of the nonmilitary threats that potentially threatens the sovereignty and security of the nationstate is the misuse of technology and information in cyberspace. The threat of irresponsible cyber attacks can be initiated by both state and non-state actors. The actors may be an individual, a group of people, a faction, an organization, or even a country. Therefore, the government needs to anticipate cyber threats by formulating cyber security strategies and determining comprehensive steps to defend against cyber attacks; its types and the scale of counter-measures, as well as devising the rules of law. | de |
dc.language | en | de |
dc.subject.ddc | Politikwissenschaft | de |
dc.subject.ddc | Political science | en |
dc.subject.ddc | Publizistische Medien, Journalismus,Verlagswesen | de |
dc.subject.ddc | News media, journalism, publishing | en |
dc.subject.other | Cybe-attacks threats; cyber security strategies | de |
dc.title | Cybersecurity policy and its implementation in Indonesia | de |
dc.description.review | begutachtet (peer reviewed) | de |
dc.description.review | peer reviewed | en |
dc.source.journal | Journal of ASEAN Studies | |
dc.source.volume | 4 | de |
dc.publisher.country | MISC | |
dc.source.issue | 1 | de |
dc.subject.classoz | Friedens- und Konfliktforschung, Sicherheitspolitik | de |
dc.subject.classoz | Peace and Conflict Research, International Conflicts, Security Policy | en |
dc.subject.classoz | interaktive, elektronische Medien | de |
dc.subject.classoz | Interactive, electronic Media | en |
dc.subject.thesoz | Datensicherheit | de |
dc.subject.thesoz | data security | en |
dc.subject.thesoz | neue Medien | de |
dc.subject.thesoz | new media | en |
dc.subject.thesoz | Informationstechnologie | de |
dc.subject.thesoz | information technology | en |
dc.subject.thesoz | Internet | de |
dc.subject.thesoz | Internet | en |
dc.subject.thesoz | Kommunikationstechnologie | de |
dc.subject.thesoz | communication technology | en |
dc.subject.thesoz | Bedrohung | de |
dc.subject.thesoz | threat | en |
dc.subject.thesoz | Sicherheitspolitik | de |
dc.subject.thesoz | security policy | en |
dc.subject.thesoz | Kriminalität | de |
dc.subject.thesoz | criminality | en |
dc.subject.thesoz | Verbrechensbekämpfung | de |
dc.subject.thesoz | crime fighting | en |
dc.subject.thesoz | Recht | de |
dc.subject.thesoz | law | en |
dc.identifier.urn | urn:nbn:de:0168-ssoar-63214-4 | |
dc.rights.licence | Creative Commons - Namensnennung, Nicht-kommerz. 4.0 | de |
dc.rights.licence | Creative Commons - Attribution-NonCommercial 4.0 | en |
internal.status | formal und inhaltlich fertig erschlossen | de |
internal.identifier.thesoz | 10057861 | |
internal.identifier.thesoz | 10039324 | |
internal.identifier.thesoz | 10047425 | |
internal.identifier.thesoz | 10040528 | |
internal.identifier.thesoz | 10039942 | |
internal.identifier.thesoz | 10037879 | |
internal.identifier.thesoz | 10037376 | |
internal.identifier.thesoz | 10034531 | |
internal.identifier.thesoz | 10036972 | |
internal.identifier.thesoz | 10040087 | |
dc.type.stock | article | de |
dc.type.document | Zeitschriftenartikel | de |
dc.type.document | journal article | en |
dc.source.pageinfo | 61-78 | de |
internal.identifier.classoz | 10507 | |
internal.identifier.classoz | 1080404 | |
internal.identifier.journal | 631 | |
internal.identifier.document | 32 | |
internal.identifier.ddc | 320 | |
internal.identifier.ddc | 070 | |
dc.description.pubstatus | Veröffentlichungsversion | de |
dc.description.pubstatus | Published Version | en |
internal.identifier.licence | 32 | |
internal.identifier.pubstatus | 1 | |
internal.identifier.review | 1 | |
internal.pdf.wellformed | true | |
internal.pdf.encrypted | false | |