Tata Kelola Dunia Maya dan Ancaman Kedaulatan Nasional

Indra Cahyadi
| Abstract views: 1017 | views: 998


Perkembangan teknologi internet memiliki potensi untuk mendorong pertumbuhan ekonomi suatu negara. Di sisi lain, teknologi internet juga turut meningkatkan jumlah dan bentuk ancaman terhadap kedaulatan suatu negara di dunia maya. Kedaulatan di dunia maya menjadi topik penting dalam pembahasan keamanan nasional maupun internasional, terutama setelah Edward Snowden mengungkapkan program pengawasan rahasia milik pemerintah Amerika Serikat. Artikel ini bertujuan untuk memahami perdebatan internasional mengenai tata kelola dunia maya dan mengidentifikasi tantangan dalam penegakan kedaulatan di dunia maya. Untuk itu, artikel ini membahas isu-isu terkait kedaulatan di dunia maya termasuk; konsep kedaulatan di dunia maya, tantangan dalam pembentukan tata pemerintahan dunia maya yang berdasarkan kesetaraan kedaulatan, serta strategi yang sudah dilakukan Indonesia dalam menegakan kedaulatan di dunia maya. Artikel ini berkesimpulan bahwa China dan Amerika Serikat telah menerapkan prinsip-prinsip kedaulatan untuk memandu tata pemerintahan dunia maya global, dan oleh karena itu Indonesia harus segera menyusul dan bertindak secara terintegrasi agar dapat melindungi dan menjaga kedaulatannya di dunia maya secara efisien.


keamanan cyber; kedaulatan nasional; keamanan nasional; tata kelola pemerintahan; cyber security; national sovereignty; national security; governance.



Barcomb, K. D., Krill, R., Mills R., dan Saville, M., Establishing cyberspace sovereignty, Prosiding 7th International Conference on Information Warfare and Security, Academic Conferences Limited, 2012.

Baseley-Walker, B., Transparency and confidence-building measures in cyberspace: towards norms of behaviour, Disarmament Forum Confronting Cyberconflict, Geneva: United Nations Institute for Disarmament Research (UNIDIR), 2011.

Cavelty, M. D. & Mauer V., Power and security in the information age: Investigating the role of the state in cyberspace, Routledge, 2016

Cornish, P., Livingstone, D., Clemente, D., dan Yorke, C., On Cyber Warfare, Chatham House, 2010.

Crawford, J., Chance, Order, Change: The Course of International Law, The Hague: Hague Academy of International Law, 2014.

Czosseck, C., dan Geers, K., Borders in cyberspace: can sovereignty adapt to the challenges of cyber security?, The Virtual Battlefield: Perspectives on Cyber Warfare, Vol.3, 2009.

Drissel, D., Contesting Internet governance: global dissent and disparities in the management of cyberspace resources, The Internet Society II: Advances in Education, Commerce & Governance Transactions on Information and Communication Technologies, Vol. 36, WIT Press, 2006.

Gourley, S. K. Cyber Sovereignty, Conflict and Cooperation in Cyberspace: The Challenge to National Security, 2013.

Koskenniemi, M.. From apology to utopia: the structure of international legal argument. Cambridge University Press, 2006.

Kurbalija, J., An Introduction to Internet Governance, 4Th Edition, DiploFoundation, 2010.

Lewis, J. A. dan Neuneck, G., The Cyber Index: International Security Trends and Realities, Geneva: United Nations Institute for Disarmament Research (UNIDIR), 2013.

Lyons, P. A., Cyberspace and the law: your rights and duties in the on-line world, Information Processing and Management, ed. Cavazos, E.A., Morin, G., Vol. 31, No. 6, 1995.

Nye Jr., J. S., The Regime Complex for Managing Global Cyber Activities, Global Commission on Internet Governance Paper Series No. 1, London: Global Commission on Internet Governance, 2014.

Olson, M., The Logic of Collective Action: Public Goods and the Theory of Groups, Cambridge: Harvard University Press, 1965.

Ostrom, E., Governing the Commons: The Evolution of Institutions for Collective Action, Cambridge: Cambridge University Press, 1990.

Radziwill, Y. Cyber-Attacks and the Exploitable Imperfections of International Law, Brill, 2015.

Ross, A., A Textbook of International Law, London: Longmans, Green & Co,1967.

Sarikakis, K., Mapping the ideologies of Internet policy, Ideologies of the Internet, Cresskill, Hampton Press, 2006.

Schmitt, M.N., Tallinn manual on the international law applicable to cyber warfare, Cambridge University Press, 2013.

Simma, B. (ed.), The Charter of the United Nations: a commentary, Vol. 2, Oxford: Oxford University Press, 2002.

Tsagourias, N., The Legal Status of Cyberspace, Chapters, 2015.

Ziolkowski, K. (ed.). Peacetime Regime for State Activities in Cyberspace, Tallinn: NATO CCD COE Publications, 2013.


Abbott, K. W. dan Snidal, D., “Hard and Soft Law in International Governance”, International Organization, Vol. 54, No. 3,2000.

Ajami, F., “The Arab spring at one”, Foreign Affairs, Vol. 91, No. 2, 2012.

Bradshaw, S., DeNardis, L., Hampson, F., Jardine, E., dan Raymond, M., “The Emergence of Contention in Global Internet Governance”, Global Commission on Internet Governance Paper Series, Vol.17, 2015.

Brown, G. D., “The Wrong Questions about Cyberspace”, Military Law Review, Vol. 217, No. 214, 2013.

Buchan, R., “Cyber attacks: unlawful uses of force or prohibited interventions?”, Journal of Conflict and Security Law, Vol. 17, No. 2, 2012.

Finnemore, M., “Cultivating International Cyber Norms”, America’s Cyber Future Security and Prosperity in the Information Age, Volume II, 2011.

Gittlen, S., “Surprise IP address system test creates a stir”, Network World, Vol. 15, No. 6, 1998.

Hamid, A. G., “Maritime Terrorism, the Straits of Malacca, and the Issue of State Responsibility”, Journal of International and Company Law, Vol. 15, 2006.

Jensen, E.T., “Cyber Sovereignty: The Way Ahead”, Texas Interntaional Law Journal, Vol. 50, 2015.

Jervis, R., “Cooperation Under the Security Dilemma”, World Politics, Vol. 30, No. 2, 1978.

Kanuck, S., “Sovereign Discourse on Cyber Conflict Under International Law”, Texas Law Review, Vol. 88, No. 7, 2010.

Kastenberg, J.E., “Non-Intervention and Neutrality in Cyberspace: An Emerging Principle in the National Practice of International Law”, Air Force Law Review, Vol. 64, 2009.

Kavanagh, C., “Cybersecurity, Sovereignty, and U.S. Foreign Policy”, American Foreign Policy Interests: The Journal of the National Committee on American Foreign Policy, Vol. 37, 2015.

Krasner, S. D., “Abiding sovereignty”, International Political Science Review, Vol. 22, No. 3, 2001.

Krekel, B., Adams, P., dan Bakos, G., “Occupying the information high ground: Chinese capabilities for computer network operations and cyber espionage”, International Journal of Computer Research, Vol. 21, No. 4, 2014.

Lampton, D. M., “Xi Jinping and the National Security Commission: policy coordination and political power”, Journal of Contemporary China, Vol. 24, No. 95, 2015.

Mueller, M., Schmidt, A. and Kuerbis, B., “Internet Security and Networked Governance in International Relations”, International Studies Review, Vol. 15, No. 1, 2013.

Glaser, C. L., “The Security Dilemma Revisited”, World Politics, Vol. 50, No. 1, 1997.

Perritt Jr. H.H., “Cyberspace and State Sovereignty”, Journal of International Legal Studies, Vol. 3, 1997.

Sonbuchner, S. P., “Master of your domain: should the US Government Maintain Control over the Internet’s Root”, Minnesota Journal of International Law, Vol. 17, 2008.

Stephen, H., “Revisiting the Estonian cyber attacks: digital threats and multinational responses”, Journal of Strategic Security, Vol. 4, No. 2, 2011.

Wriston, W.B., “Technology and Sovereignty”, Foreign Affairs, Vol. 67, 1988.

Yi. S., “Transform and construction: the design of national cybersecurity strategy and the capacity build in a post-Snowden age”, China Information Security, Vol. 5, 2014.


Heintschel von Heinegg, W., Legal Implications of Territorial Sovereignty, Prosiding 4th International Conference on Cyber Conflict (CYCON 2012), 2012.


Cave, D., It’s time for ICANN to go, http://www. salon.com/2002/07/02/gilmore_2/, diakses 28 Juli 2016.

Chandrasekaran, R., Internet reconfiguration concerns federal officials, The Washington Post,https://www.washingtonpost.com/archive/business/1998/01/31/internet- reconfiguration-concerns-federal-officials/ c98b71a0-8e4a-4aab-96f6-1868c81fe60c/, diakses 28 Juli 2016.

De Bossey, C., Report of the Working Group on Internet Governance, http://www.wgig.org/ docs/WGIGREPORT.pdf, diakses 20 Juli 2016.

Greenwald dan MacAskill, NSA Prism program taps in to user data of Apple, Google and Others, http://www.peacepalacelibrary.nl/ ebooks/files/356296245.pdf, diakses 7 Juli 2016.

GovCISRT, Profil, http://govcsirt.kominfo. go.id/tentangidgovcert/profil, diakses 21 Juli 2016.

Gross, D., Google quits censoring search in China, http://www.cnn.com/2010/TECH/03/22/ google.china/, diakses 7 Juli 2016.

Hayden, M., Ex-NSA chief: safeguards exist to protect Americans’ privacy, http://edition. cnn.com/2013/08/01/opinion/hayden-nsa- surveillance/, diakses 19 Juli 2016

ICANN, Overview and history of the IANA functions. SAC067. https://www.icann.org/ en/system/files/files/sac-067-en.pdf, diakses 28 Juli 2016.

Id CERT, Profil, http://www.cert.or.id/tentang- kami/id/ , diakses 21 Juli 2016.

Id SIRTII, Struktur organisasi, http://www.idsirtii.or.id/halaman/tentang/struktur- organisasi.html, diakses 21 Juli 2016.

Internet World Stats, Internet Users in the 20 Top Countries, http://www.internetworldstats.com/top20.htm, diakses 9 Oktober 2016.

International Telecommunication Union, ITU Facts and Figures 2016, http://www.itu. int/en/mediacentre/pages/2016-PR30.aspx, diakses 9 Oktober 2016.

Jason, L., Facebook, Twitter and Youtube are tools for diplomacy, http://www.huffingtonpost. com/jason-liebman/perspective-on-digital- di_b_416876.html, diakses 20 Juli 2016.

Kemenkominfo, Direktorat Jenderal Sumber Daya, Pos dan Informatika Kemekominfo, Tugas dan fungsi, http://kominfo.go.id/ index.php/node/711/Tugas+dan+Fungsi diakses 21 Juli 2016.

Kemenkominfo, Direktorat keamanan informasi Kemenkominfo, http://aptika.kominfo.go.id/ index.php/profile/direktoratkeamanan- informasi, diakses 21 Juli 2016.

Kessler, G., Wikileaks’s unveiling of secret State Department cables exposes US diplomacy, The Washington Post, http://www. washingtonpost.com/wp-dyn/content/ article/2010/11/28/AR2010112802395. html, diakses 7 Juli 2016.

Kruger, L.G., Internet Governance and the Domain Name System: issues for congress. Library of Congress: Congressional Research Service, http://www.davidellis.ca/wp-content/uploads/2012/05/kruger- internet-governance-2016.pdf, diakses 28 Juli 2016.

Lembaga Sandi Negara, Tugas dan Fungsi, http://www.lemsaneg.go.id/index.php/ profil/tugas-dan-fungsi/, diakses 21 Juli 2016.

Lieberthal, K. dan Jisi, W., Addressing U.S.- China Strategic Distrust, John L. Thornton China Center Monograph Series, Number 4, http://yahuwshua.org/en/ Resource-584/0330_china_lieberthal.pdf, diakses 20 Juli 2016.

Majelis Umum PBB, Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security, http://www.un.org/ga/search/view_doc. asp?symbol=A/70/174, diakses 8 Juli 2016.

NTIA, Department of Commerce , Verisign/ ICANN proposal in response to NTIA request root zone administrator proposal related to the IANA Functions Stewardship Transition, https://www.ntia.doc.gov/files/ntia/publications/root_zone_administrator_proposal relatedtoiana_functionsstefinal. pdf, diakses 19 Juli 2016.

NTIA, Department of Commerce, NTIA announces intent to transition key internet domain name functions, https://www. ntia.doc.gov/press-release/2014/ntia- announcesintent-transition-key-internet- domain-name-functions, diakses 21 Juli 2016.

Organization for Security and Cooperation in Europe (OSCE), Decision No. 1106 Initial Set of OSCE Confidence-Building Measures to Reduce the Risks of Conflict stemming from the use of information and communication technologies, http://www.osce.org/ pc/109168?download=true, diakses 30 Agustus 2016.

Philip S.C., ICANN@ 15: Born in the USA— But Will It Stay? http://www.circleid.com/ pdf/ICANN_at_15_Born_in_the_USA_ But_will_it_Stay.pdf, diakses 28 Juli 2016.

Pirker, B.. Territorial sovereignty and integrity:peacetime regime for state activities in cyberspace, http://www.peacepalacelibrary. nl/ebooks/files/356296245.pdf, diakses 28 Juli 2016.

Rekha, J., A Model for Internet Governance and Implications for India, Indian Institute of Management Ahmedabad, Research and Publication Department, http://icmrindia. vikalpa.com/assets/snippets/workingpaper pdf/8992574912015-03-23.pdf, diakses 28 Juli 2016.

Sanger, D., 2015, US decides to retaliate against China’s hacking, http://www.nytimes. com/2015/08/01/world/asia/us-decides-to-retaliate-against-chinas-hacking.html, diakses 19 Juli 2016.

Sanou, B., ICT Facts and Figures, https://www.itu.int/en/ITU-D/Statistics/Documents/facts/ICTFactsFigures2015.pdf, diakses 7 Juli 2016.

Schmidt, L., Perspective on 2015 DoD Cyber Strategy, RAND Corporation, Santa Monica CA, http://www.dtic.mil/cgi-bin/ GetTRDoc?AD=ADA621794, diakses 19 Juli 2016.

Segal, A., Cyberspace Governance: The Next Step, Council on Foreign Relations, http:// www.cfr.org/cybersecurity/cyberspace- governance-next-step/p24397, diakses 30 Agustus 2016.

Smith, G., Security Chief’s Cyberwar Testimony Seen As Veiled Threat To Enemies, The Huffington Post, http://www.huffingtonpost.com/2013/03/14/security- chief-cyberwar_n_2875516.html, diakses 19 Juli 2016.

World Economic Forum, The Reshaping of the World: Consequences for Society, Politics and Business. Annual Meeting, http://www3. weforum.org/docs/AM14/WEF_AM14_ Public_Report.pdf, diakses 19 Juli 2016.

Copyright (c) 2018 Jurnal Politica
Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.


  • There are currently no refbacks.