Analisis Konten dalam Strategi Keamanan Siber Kuwait Berdasarkan Teori Three Perspective Theory of Cyber Sovereignty
Abstract
This research seeks to analyze Kuwait's cybersecurity strategy in its cybersecurity document using content analysis methods in understanding the focus and approach taken by the Kuwait’s government. The theoretical framework used in this research uses Three Perspective Theory of Cyber Sovereignty which explains the division of layers in the context of sovereignty in cyberspace. The method used is a mixed method to determine which aspects and approaches are more dominant in the Kuwaiti government policy to manage cyber space in the country. Results of this study indicate that Kuwait tends to take policies that are in the exclusive layer. The main aspect is in terms of preventing threats that can exist through cyberspace. This shows that Kuwait's cyberspace policy tends to be exclusive, in the sense that the state must be present and regulate most of the cyberspace area.
References
Creswell, J. W. (2013). Research Design: Pendekatan Kualitatif, Kuantitatif dan Mixed. Terjemahan Fawaid, A. Yogyakarta: Pustaka Pelajar.
Hong, Yu & Goodnight, G. (2019). How to think about cyber sovereignty: the case of China. Chinese Journal of Communication, 13, 1-19. DOI: 10.1080/17544750.2019.1687536.
Senol, Mustafa & Karacuha, Ertugrul. (2020). Creating and Implementing an Effective and Deterrent National Cyber Security Strategy. Journal of Engineering, 2020, 1-19. DOI: https://doi.org/10.1155/2020/5267564.
Radon, Jenik. (2004). Sovereignty: A Political Emotion, Not A Concept. Stanford Journal of International Law, 40(195), 195-210.
Shen, Yi. (2016). Cyber Sovereignty and the Governance of Global Cyberspace. Chinese Political Science Review, 1, 81-93. DOI: 10.1007/s41111-016-0002-6.
Sugiyono, Sugiyono. (2013). Memahami Penelitian Kualitatif. Bandung: Alfabeta.
Yeli, Hao. (2017). A Three-Perspective Theory of Cyber Sovereignty. PRISM, 7(2), 109–115.
1. The author retains copyright and grants the journal the right of first publication with the work simultaneously licensed under a Creative Commons attribution license that allows others to share the work within an acknowledgment of the work’s authorship and initial publication of this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their websites) before and during submission, as it can lead to productive exchanges and earlier and more extraordinary citations of published works.