{"title":"Cyber Diplomacy And Protection Measures Against Threats Of Information Communication Technology In Indonesia","authors":"Muhammad Ridho Iswardhana","doi":"10.18196/jiwp.v5i2.12242","DOIUrl":null,"url":null,"abstract":"This article attempts to explain the forms of Indonesian cyber diplomacy related to the protection of the use of information technology. In this case, Indonesia as the fourth largest country in the world often gets cyber threats and attacks. This was then followed up with efforts to protect it domestically, but was constrained by threats from abroad.The research method used in this study uses a qualitative descriptive analytical approach using the theoretical framework of cyber diplomacy and the concept of information and communication technology. The case analysis will explain the causes and effects of holding Indonesian cyber diplomacy based on secondary data. The author finds that the Indonesian government does not only use a legal approach through the ITE Law, but also culture, technological renewal, and diplomacy towards various countries.","PeriodicalId":113411,"journal":{"name":"Journal of Islamic World and Politics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Islamic World and Politics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.18196/jiwp.v5i2.12242","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
This article attempts to explain the forms of Indonesian cyber diplomacy related to the protection of the use of information technology. In this case, Indonesia as the fourth largest country in the world often gets cyber threats and attacks. This was then followed up with efforts to protect it domestically, but was constrained by threats from abroad.The research method used in this study uses a qualitative descriptive analytical approach using the theoretical framework of cyber diplomacy and the concept of information and communication technology. The case analysis will explain the causes and effects of holding Indonesian cyber diplomacy based on secondary data. The author finds that the Indonesian government does not only use a legal approach through the ITE Law, but also culture, technological renewal, and diplomacy towards various countries.