REDESAIN KEBIJAKAN HUKUM KEAMANAN DAN KETAHANAN SIBER: STUDI KASUS SERANGAN SIBER PADA PUSAT DATA NASIONAL TAHUN 2024
Abstract
Keywords
Full Text:
PDFReferences
A. Buku
Cavelty, Myriam Dunn, The Politics of Cyber-Security (New York: Routledge, 2025).
Ellis, Evelyn, ed., The Principle of Proportionality in the Laws of Europe (Oxford: Hart Publishing, 1999).
Fischerkeller, Michael P., Emily O. Goldman, dan Richard J. Harknett, Cyber Persistence Theory: Redefining National Security in Cyberspace (New York: Oxford University Press, 2022).
Gani, Taufiq A., Kedaulatan Data Digital untuk Integritas Bangsa (Aceh: Syiah Kuala University Press, 2023).
Garg, Himani, M. Balasubramaniam, Ajay Kr Gupta, dan Jitendra Singh. “‘NIS’ a Network Investigation System.” Dalam Proceedings of Emerging Trends and Technologies on Intelligent Systems: ETTIS 2021. (Singapore: Springer Nature, 2022).
Goundar, Sam, Archana Purwar, dan Ajmer Singh, eds., Applications of Artificial Intelligence, Big Data and Internet of Things in Sustainable Development (Boca Raton: CRC Press, 2022).
Lord Acton. “Power Tends to Corrupt, and Absolute Power Corrupts Absolutely.” Dalam surat kepada Bishop Mandell Creighton, 3 April 1887, dikutip dalam Brian Martin, Information Liberation: Challenging the Corruptions of Information Power. (London: Freedom Press, 1998).
Marzuki, Peter Mahmud, Penelitian Hukum: Edisi Revisi (Jakarta: Kencana Prenada Media Group, 2005).
Moleong, Lexy J., Metodologi Penelitian Kualitatif (Bandung: Rosdakarya, 2000).
Muhaimin, Metode Penelitian Hukum (Mataram: Mataram University Press, 2020).
Muhammad, Abdulkadir, Hukum dan Penulisan Hukum (Bandung: Citra Aditya Bakti, 2004).
Nugroho, Catur, Cyber Society: Teknologi, Media Baru, dan Distrupsi Informasi (Jakarta: Kencana, 2020).
Pelizzo, Riccardo, dan Frederick Stapenhurst, Government Accountability and Legislative Oversight (New York: Routledge, 2013).
Reveron, Derek S., ed., Cyberspace and National Security: Threats, Opportunities, and Power in a Virtual World (Washington: Georgetown University Press, 2012).
Ridwan, H. R., Hukum Administrasi Negara (Jakarta: RajaGrafindo Persada, 2006).
Soekanto, Soerjono dan Sri Mamudji, Penelitian Hukum Normatif: Suatu Tinjauan Singkat, ed. 17 (Jakarta: Rajawali Pers, 2015).
Suratman dan Philip Dillah, Metode Penelitian Hukum (Bandung: Alfabeta, 2012).
B. Makalah dan Hasil Penelitian
Adma, Arinaldo, Yusuf Marsel Surbakti, dan Puspita Sari. “Transformasi Sistem Pertahanan Siber Indonesia dengan BSSN Sebagai Poros & Motor Penggerak Menuju Angkatan Siber Mandiri di Masa Depan.” Jurnal Kajian Stratejik Ketahanan Nasional 6, no. 1 (2023).
Admass, Wasyihun Sema, Yirga Yayeh Munaye, dan Abebe Abeshu Diro. “Cyber Security: State of The Art, Challenges and Future Directions.” Cyber Security and Applications 2 (2024).
Aji, M. Prakoso. “Sistem Keamanan Siber dan Kedaulatan Data di Indonesia dalam Perspektif Ekonomi Politik (Studi Kasus Perlindungan Data Pribadi).” Jurnal Politica 5, no. 2 (2022).
Aliane, Nadir, dan Saima Jamil. “Human Side of Digital Transformation: Hyper Connectedness and Collaboration.” International Journal of Operations and Quantitative Management 29, no. 1 (2023).
Ardipandanto, Aryojati. “Lemahnya Pengamanan Pusat Data Nasional Sementara Terhadap Serangan Siber.” Info Singkat 16, no. 13 (2024).
Brudner, Alan. “A Theory of Necessity.” Oxford Journal of Legal Studies 7, no. 3 (1987).
Chotimah, Hidayat Chusnul. “Tata Kelola Keamanan Siber dan Diplomasi Siber Indonesia di Bawah Kelembagaan Badan Siber dan Sandi Negara.” Jurnal Politica 10, no. 2 (2019).
Dandaura, E.S., dan U.M. Mbanaso. “The Cyberspace: Redefining A New World.” IOSR Journal of Computer Engineering 17, no. 3 (2015).
Disantara, Fradhana Putra. “Tripartite Collaborative Institutions: Skema Konvergensi Institusi Untuk Mewujudkan Ketahanan Siber Indonesia.” Istinbath: Jurnal Hukum 18, no. 2 (2021).
Hamzani, Ahmad Irwan, dkk. “Legal Research Method: Theoretical and Implementative Review.” International Journal of Membrane Science and Technology 10, no. 2 (2023).
Hathaway, Oona A., et al. “The Law of Cyber Attack.” California Law Review 100, no. 817 (2012).
Lanz, Zachary. “Cybersecurity Risk in US Critical Infrastructure: An Analysis of Publicly Available US Government Alerts and Advisories.” International Journal of Cybersecurity Intelligence & Cybercrime 5, no. 1 (2022).
Markopoulou, Dimitra, Vagelis Papakonstantinou, dan Paul De Hert. “The New EU Cybersecurity Framework: The NIS Directive, ENISA's Role and the General Data Protection Regulation.” Computer Law & Security Review 35, no. 6 (2019).
DOI: http://dx.doi.org/10.33331/rechtsvinding.v14i2.2155
Refbacks
- There are currently no refbacks.


