Analisis Konten dalam Strategi Keamanan Siber Kuwait Berdasarkan Teori Three Perspective Theory of Cyber Sovereignty

  • Afrizal Fajri Universitas Paramadina


This research seeks to analyze Kuwait's cybersecurity strategy in its cybersecurity document using content analysis methods in understanding the focus and approach taken by the Kuwait’s government. The theoretical framework used in this research uses Three Perspective Theory of Cyber Sovereignty which explains the division of layers in the context of sovereignty in cyberspace. The method used is a mixed method to determine which aspects and approaches are more dominant in the Kuwaiti government policy to manage cyber space in the country. Results of this study indicate that Kuwait tends to take policies that are in the exclusive layer. The main aspect is in terms of preventing threats that can exist through cyberspace. This shows that Kuwait's cyberspace policy tends to be exclusive, in the sense that the state must be present and regulate most of the cyberspace area.


Bartelson, Jens. (2006). The Concept of Sovereignty Revisited. European Journal of International Law, 17(2), 463-474.

Creswell, J. W. (2013). Research Design: Pendekatan Kualitatif, Kuantitatif dan Mixed. Terjemahan Fawaid, A. Yogyakarta: Pustaka Pelajar.

Hong, Yu & Goodnight, G. (2019). How to think about cyber sovereignty: the case of China. Chinese Journal of Communication, 13, 1-19. DOI: 10.1080/17544750.2019.1687536.

Senol, Mustafa & Karacuha, Ertugrul. (2020). Creating and Implementing an Effective and Deterrent National Cyber Security Strategy. Journal of Engineering, 2020, 1-19. DOI:

Radon, Jenik. (2004). Sovereignty: A Political Emotion, Not A Concept. Stanford Journal of International Law, 40(195), 195-210.

Shen, Yi. (2016). Cyber Sovereignty and the Governance of Global Cyberspace. Chinese Political Science Review, 1, 81-93. DOI: 10.1007/s41111-016-0002-6.

Sugiyono, Sugiyono. (2013). Memahami Penelitian Kualitatif. Bandung: Alfabeta.
Yeli, Hao. (2017). A Three-Perspective Theory of Cyber Sovereignty. PRISM, 7(2), 109–115.
How to Cite
FAJRI, Afrizal. Analisis Konten dalam Strategi Keamanan Siber Kuwait Berdasarkan Teori Three Perspective Theory of Cyber Sovereignty. Insignia: Journal of International Relations, [S.l.], p. 66-80, feb. 2021. ISSN 2597-9868. Available at: <>. Date accessed: 01 mar. 2021. doi:

Most read articles by the same author(s)

Obs.: This plugin requires at least one statistics/report plugin to be enabled. If your statistics plugins provide more than one metric then please also select a main metric on the admin's site settings page and/or on the journal manager's settings pages.