This research discusses the analysis of security strategy policies made by the Malaysian government in the protection and development of Malaysian cyberspace. This research will explain in detail the strategy of developing challenges as well as the aspects that support the Malaysian cyber space to be saved by the Malaysian cyber space. This research will further discuss the Malaysian security strategy through the official document of the Malaysian security strategy which will later be analyzed through the MAXQDA and GEPHI applications in order to classify the various categories that support it. This research will use the security concept published by Hao Yeli in Three - Perspective Theory of Cyber Sovereignty to classify ideas and data. This research finds that the security of the Malaysian system needs to be developed from both capacity and capability so that the government needs to work together with various related parties Keywords: Cyber Security, Cybersecurity Challenges, Soveignty Abstrak Penelitian ini membahas tentang analisis kebijakan strategi keamanan siber yang dibuat oleh pemerintah Malaysia dalam perlindungan dan pengembangan keamanan ruang siber Malaysia. Penelitian ini akan menjelaskan secara details strategi, tantangan serta aspek – aspek yang mendukung pengembangan ruang siber Malaysia guna mengamankan ruang siber Malaysia. Penelitian ini akan membahas lebih jauh strategi keamanan Malaysia melalui dokumen resmi strategi keamanan siber Malaysia yang nantinya akan di bedah melalui aplikasi MAXQDA dan GEPHI guna mengklasifikasikan berbagai kategori yang mendukung. Penelitian ini akan menggunakan konsep keamanan yang dipublikasikan oleh Hao Yeli dalam A Three – Perspective Theory of Cyber Sovereignty guna mengkasifikasikan gagasan dan data dengan menggunakan metode penelitian kuantitatif. Penelitian ini menemukan bahwa keamanan siber Malaysia perlu dikembangkan baik dari kapasitas maupun kapabilitas sehingga pemerintah Malasyaia perlu bekerjasama dengan berbagai pihak yang terkait. Kata kunci: Cyber Security, Tantangan Keamanan Cyber, Kedaulatan
Abstract Cybersecurity has attracted attention in the study of international relations. This issue is important because most of life is connected to cyberspace. This research analyzes Lebanon's cybersecurity strategy in its official cybersecurity documents. The theoretical framework used in this study is the Three Perspective Theory of Cyber Sovereignty. The theory is explaining the division of layers in the context of sovereignty in cyberspace. The method used in this research is quantitative research obtained through the MAXQDA and GEPHI. The applications that are used in this research are to provide evidence of data in the Lebanese national strategy document. The results of this study indicate that the Lebanese security strategy documents tend to be exclusive. The Lebanese government is more dominant in discussing matters that are administrative, theoretical, principal, and planning. Keywords: Cyber Security, Sovereignty, Strategy, Lebanon Abstrak cKeamanan siber merupakan salah satu isu yang menarik perhatian dalam studi hubungan internasional. Isu ini menjadi penting tatkala hampir sebagian besar unsur kehidupan terhubung ke ruang siber. Penelitian ini berupaya menganalisis strategi keamanan siber Lebanon dalam dokumen resmi kemananan sibernya. Kerangka teori yang digunakan dalam dalam penelitian ini menggunakan Three Perspective Theory of Cyber Sovereignity yang menjelaskan pembagian lapisan dalam konteks kedaulatan di ruang siber. Metode yang digunakan ialah metode penelitian kuantitatif yang diperoleh melalui aplikasi MAXQDA dan GEPHI untuk memberikan bukti data dalam menganalisis dokumen strategi keamanan nasional Lebanon. Hasil penelitian ini menunjukkan bahwa dokumen strategi keamanan siber Lebanon cenderung bersifat eksklusif. Pemerintah Lebanon lebih dominan membahas hal-hal yang bersifat administratif, teoretis, prinsipil dan perencanaan. Kata kunci: Keamanan Siber, Kedaulatan, Strategi, Lebanon
Along with the development of technology, cyber threats that occur in modern countries has been switched from traditional to non-traditional. That development of technology bears the advancement of science and bring a variety of the interstate. Currently, the country prioritizes in social, economic, law, security, defense and other aspect to Information and Communication Technology. Increasing the cyber threat of Qatar, the governance draws up National Cyber Security Strategy (NCSS) with the aim of building and maintaining a safe cyberspace for protecting national interest and preserves fundamental rights and Qatar’s community value. Collectively this aim gives protection and preparing cyber threats with proactive approach. This paper aims to deeply understand Qatar National Cyber Security Strategic by conducting a qualitative analysis of the context of document through the concept of sovereignty approach, nation and contained aspects. The description of aspects that can be seen from the data security relationship, technology development, policies, capabilities, strategic approaches, cyber threats and challenges. Qatar pays special attention to cybersecurity and protection of its vital national information infrastructure as dependence on Information and Communication Technology (ICT) and the internet grows in the country.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.