Southeast Asia's Cyber Security Strategy: Multilateralism or Self-help
DOI:
https://doi.org/10.34306/itsdi.v4i2.581Keywords:
Security Studies, Southeast Asia, Neorealist, Cyber SecurityAbstract
In terms of security research, cyber security is fundamentally a recent problem. When all facets of political, military, economic, social, and cultural life are connected to cyberspace, this problem occurs. Cyberterrorism, cybercrime, and cyberwar are all potential concerns in cyberspace. This threat cannot be separated from Southeast Asia, one of the main regions in the globe with a strong rate of economic expansion. This study aims to analyze the best approach for preserving cyber security in Southeast Asia. Neoliberalism and neorealism are common to mainstream methodologies scholars utilize to address the study subject. Simply put, ASEAN nations must advance their technology capacities while not underestimating the value of international cooperation.
Downloads
References
D. Marina, N. K. Pandjaitan, N. Hasanah, and G. P. Cesna, “Analysis of Lifestyle and Consumer Attitude Towards Intention to Purchase a Personal Car During Pandemic,” APTISI Trans. Manag., vol. 7, no. 1, pp. 15–34, 2023.
L. A. Faza, P. M. Agustini, S. Maesaroh, A. C. Purnomo, and E. A. Nabila, “Motives For Purchase of Skin Care Product Users (Phenomenology Study on Women in DKI Jakarta),” ADI J. Recent Innov., vol. 3, no. 2, pp. 139–152, 2022.
Y. K. Dwivedi et al., “Artificial Intelligence (AI): Multidisciplinary perspectives on emerging challenges, opportunities, and agenda for research, practice and policy,” Int. J. Inf. Manage., vol. 57, p. 101994, 2021.
U. Rahardja, Q. Aini, Y. I. Graha, and M. R. Tangkaw, “Gamification Framework Design of Management Education and Development in Industrial Revolution 4.0,” in Journal of Physics: Conference Series, 2019, vol. 1364, no. 1, p. 12035.
T. Stadelmann, M. Braschler, and K. Stockinger, “Introduction to applied data science,” in Applied Data Science, Springer, 2019, pp. 3–16.
J. Paschen, “Investigating the emotional appeal of fake news using artificial intelligence and human contributions,” J. Prod. Brand Manag., 2019.
A. Nurhayati and F. Frencius, “Mapping perception of consumer antivirus software with multidimensional scaling method,” APTIKOM J. Comput. Sci. Inf. Technol., vol. 4, no. 3, pp. 91–95, 2019.
Y. Duan, J. S. Edwards, and Y. K. Dwivedi, “Artificial intelligence for decision making in the era of Big Data–evolution, challenges and research agenda,” Int. J. Inf. Manage., vol. 48, pp. 63–71, 2019.
R. J. Sipahutar, A. N. Hidayanto, U. Rahardja, and K. Phusavat, “Drivers and Barriers to IT Service Management Adoption in Indonesian Start-up Based on the Diffusion of Innovation Theory,” in 2020 Fifth International Conference on Informatics and Computing (ICIC), 2020, pp. 1–8.
N. F. Syed, S. W. Shah, R. Trujillo-Rasua, and R. Doss, “Traceability in supply chains: A Cyber security analysis,” Comput. Secur., vol. 112, p. 102536, 2022.
E. Ukwandu et al., “Cyber-security challenges in aviation industry: A review of current and future trends,” Information, vol. 13, no. 3, p. 146, 2022.
A. Corallo, M. Lazoi, M. Lezzi, and A. Luperto, “Cybersecurity awareness in the context of the Industrial Internet of Things: A systematic literature review,” Comput. Ind., vol. 137, p. 103614, 2022.
D. Ghelani, “Cyber security, cyber threats, implications and future perspectives: A Review,” Authorea Prepr., 2022.
J. Kaur and K. R. Ramkumar, “The recent trends in cyber security: A review,” J. King Saud Univ. Inf. Sci., vol. 34, no. 8, pp. 5766–5781, 2022.
A. Reeves, P. Delfabbro, and D. Calic, “Encouraging employee engagement with cybersecurity: How to tackle cyber fatigue,” SAGE open, vol. 11, no. 1, p. 21582440211000050, 2021.
N. Chowdhury and V. Gkioulos, “Cyber security training for critical infrastructure protection: A literature review,” Comput. Sci. Rev., vol. 40, p. 100361, 2021.
R. Al Nafea and M. A. Almaiah, “Cyber security threats in cloud: Literature review,” in 2021 International Conference on Information Technology (ICIT), 2021, pp. 779–786.
I. H. Sarker, M. H. Furhad, and R. Nowrozy, “Ai-driven cybersecurity: an overview, security intelligence modeling and research directions,” SN Comput. Sci., vol. 2, pp. 1–18, 2021.
H. S. Lallie et al., “Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic,” Comput. Secur., vol. 105, p. 102248, 2021.
R. V. Yohanandhan, R. M. Elavarasan, P. Manoharan, and L. Mihet-Popa, “Cyber-physical power system (CPPS): A review on modeling, simulation, and analysis with cyber security applications,” IEEE Access, vol. 8, pp. 151019–151064, 2020.
S. Acharya, Y. Dvorkin, H. Pandzic, and R. Karri, “Cybersecurity of smart electric vehicle charging: A power grid perspective,” IEEE Access, vol. 8, pp. 214434–214453, 2020.
A. Corallo, M. Lazoi, and M. Lezzi, “Cybersecurity in the context of industry 4.0: A structured classification of critical assets and business impacts,” Comput. Ind., vol. 114, p. 103165, 2020.
E. Guustaaf, U. Rahardja, Q. Aini, H. W. Maharani, and N. A. Santoso, “Blockchain-based Education Project,” Aptisi Trans. Manag., vol. 5, no. 1, pp. 46–61, 2021.
S. Porru, A. Pinna, M. Marchesi, and R. Tonelli, “Blockchain-oriented software engineering: challenges and new directions,” in 2017 IEEE/ACM 39th International Conference on Software Engineering Companion (ICSE-C), 2017, pp. 169–171.
R. Widhawati, A. Khoirunisa, N. P. L. Santoso, and D. Apriliasari, “Secure System Medical Record with Blockchain System: Recchain Framework,” in 2022 International Conference on Science and Technology (ICOSTECH), 2022, pp. 1–8.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 Anggy Giri Prawiyogi, Alwiyah

This work is licensed under a Creative Commons Attribution 4.0 International License.