Analisis Konten dalam Strategi Keamanan Siber Kuwait Berdasarkan Teori Three Perspective Theory of Cyber Sovereignty
This research seeks to analyze Kuwait's cybersecurity strategy in its cybersecurity document using content analysis methods in understanding the focus and approach taken by the Kuwait’s government. The theoretical framework used in this research uses Three Perspective Theory of Cyber Sovereignty which explains the division of layers in the context of sovereignty in cyberspace. The method used is a mixed method to determine which aspects and approaches are more dominant in the Kuwaiti government policy to manage cyber space in the country. Results of this study indicate that Kuwait tends to take policies that are in the exclusive layer. The main aspect is in terms of preventing threats that can exist through cyberspace. This shows that Kuwait's cyberspace policy tends to be exclusive, in the sense that the state must be present and regulate most of the cyberspace area.
Creswell, J. W. (2013). Research Design: Pendekatan Kualitatif, Kuantitatif dan Mixed. Terjemahan Fawaid, A. Yogyakarta: Pustaka Pelajar.
Hong, Yu & Goodnight, G. (2019). How to think about cyber sovereignty: the case of China. Chinese Journal of Communication, 13, 1-19. DOI: 10.1080/17544750.2019.1687536.
Senol, Mustafa & Karacuha, Ertugrul. (2020). Creating and Implementing an Effective and Deterrent National Cyber Security Strategy. Journal of Engineering, 2020, 1-19. DOI: https://doi.org/10.1155/2020/5267564.
Radon, Jenik. (2004). Sovereignty: A Political Emotion, Not A Concept. Stanford Journal of International Law, 40(195), 195-210.
Shen, Yi. (2016). Cyber Sovereignty and the Governance of Global Cyberspace. Chinese Political Science Review, 1, 81-93. DOI: 10.1007/s41111-016-0002-6.
Sugiyono, Sugiyono. (2013). Memahami Penelitian Kualitatif. Bandung: Alfabeta.
Yeli, Hao. (2017). A Three-Perspective Theory of Cyber Sovereignty. PRISM, 7(2), 109–115.