Miftah Farid(1*), Ajeng Ayu Adhisty(2),

(1) Universita Islam Negeri Alauddin Makassar
(2) Universitas Gadjah Mada Yogyakarta
(*) Corresponding Author


In the current security concept, there are some changes to the current security object. This is due to the increasingly broad understanding of security objects.  This study examines the emergence of cyber issues as a new threat to state security. Cyber actions in the virtual world are developing along with the rapid technology development. Moreover, the state policy on cyber issues is considered as a new threat to individual security. The development of that state security issue is being debated among the theoreticians of international security studies. The concept of securitization explains the phenomenon of cyber issues and receives the attention of many states. Securitization carried out by the United States on Cybercrime issues becomes the initial trigger in viewing cyber actions as a new threat to state security. The object of this paper is more focused on State policy in dealing with cyber threats. Afterward, state policy in facing the cyber threat is seen from the perspective of human security from UNDP. Therefore, there is a debate about the desired security object. State actions to reach state security are then considered as individual privacy security. So, international security now does not only focus on state objects but also on individual, environment, economy, and identity. Thus, every action taken in securing an object does not pose a threat to other security objects.

Keywords: Cybercrime, State Security, Human Security, Securitization

Full Text:



Adoption of Convention on Cybercrime. (2001). The American Journal of International Law.

Bambauer, D. E. (2013). Privacy versus security. Journal of Criminal Law and Criminology.

Brunstetter, D., & Braun, M. (2011). The Implications of Drones on the Just War Tradition. Ethics and International Affairs.

Buzan, B., & Hansen, L. (2007). International Security: Widening Security. SAGE library of international relations.

Buzan, B., & Hansen, L. (2009). The evolution of international security studies. The Evolution of International Security Studies.

D.Valiquet. (2011). Cybercrime Issues. Canada: Parliamentary Information and Research Service (Library of Parliament).

Hudson, N. F. (2013). “Human security.†In Critical Approaches to Security An introduction to theories and methods. New York: Routledge.

Infrastructure, C. (2009). Cyberspace Policy Review. Security.

Kello, L. (2013). The meaning of the cyber revolution: Perils to theory and statecraft. International Security.

Newman, E. (2010). Critical human security studies. Review of International Studies.

Peoples, C., & Vaughan-Williams, N. (2010). Critical security studies: An introduction. Critical Security Studies: An Introduction.

Ritchie, N. (2011). Rethinking Security : a critical amalysios of the startegic Defence and Security Review. International Affairs (Royal Institute of International Affairs), 87(2), 355–376.

S.B.Spancer. (2002). Security vs Privacy. In Denver University Law (78th ed.). Denver.

S.W.Branner, J. (2007). Cybercrime Havens : Challanges and Sollutions. Business Law Today, 17(2), 48–51.

Storlie, C., Anderson, B., Wiel, S. Vander, Quist, D., Hash, C., & Brown, N. (2014). Stochastic identification of Malware with dynamic traces. Annals of Applied Statistics.

United Nations. (2016). Human Security Handbook. United Nations trust Fund of Human Security.

Waisova, S. (2003). Human Security - The Contemporary Paradigm? Perspective, (20), 58–72.


Journal Terindex di Garuda

Office Address:
Lembaga Penelitian dan Pengabdian Kepada Masyarakat
Republic of Indonesia Defense University
Jl. Salemba Raya No.14, Paseban,Jakarta Pusat, Daerah Khusus Ibukota Jakarta 10440, Indonesia

Lisensi Creative Commons
Jurnal Pertahanan: Media Informasi tentang Kajian dan Strategi Pertahanan yang Mengedepankan Identity, Nasionalism dan Integrity is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.