Pancasila as a Paradigm for Modern Indonesia Defense
DOI:
https://doi.org/10.25273/she.v1i1.5856Keywords:
Pancasila, paradigm, defense, modern threat, cyberAbstract
Downloads
References
Chen, T. M. (2013). An assessment of the department of defense strategy for operating in cyberspace. Army War College Carlisle Barracks Pa Strategic Studies Institute.
Francis, D. (2013, March 13). The Coming Cyber Attack that could ruin your life. Retrieved April 18, 2019 from http://www.thefiscaltimes.com/Arti cles/2013/03/11/The-ComingCyber-Attack-that-Could-RuinYour-Life
Hikam, M. A. (Ed.). (2014). Menyongsong 2014-2019: memperkuat Indonesia dalam dunia yang berubah. CV. Rumah Buku.
Iasiello, E. (2013, June). Cyber attack: dullIasiello, E.(2013). cyber Attack: A dull to sahep foreign policy. 5th International COnference on Cyber Conflicts (pp.1-18). Tallin: NATO CCDOE Publications
Kompas. (2017, June 8). Serangan Cyber Makin Kencang Indonesia Sudah Siap. Retrieved April 18, 2019, from http://tekno.kompas.com/read/2017 /06/08/10050037/serangan.cyber.m akin.kencang.indonesia.sudah.siap.
Lindsay, J.R., 2013. Stuxnet and the limits of cyber warfare. Security Studies, 22(3), pp.365-404.
Loney, Matt. (2004, March 1). MarchUS software blew up rusian gas pipeline. Retrieved April 18, 2019 from Http://www.zdnet.com/ussoftware-blew-up-russian-gaspipeline-3039147917/
Mantra, IGN. (2012, Januari 20). 7 Negara ASEAN yang Paling Sering Kena Serangan Web. retrieved from http://inet.detik.com/read/2012/01/ 20/105656/1820779/323/7-negaraasean-yang-paling-sering-kenaserangan-web/
Middletown, A. (2015). Stuxnet: The World's First Cyber... Boomerang?. Interstate - Journal of International Affairs, Vol. 2015/2016 No.2. retrieved from http://www.inquiriesjournal.com/ar ticles/1343/stuxnet-the-worldsfirst-cyber-boomerang
Morgan, S. (2017). Cybercrime Report. Herjavec Group, October. Noor, A.R. (2015, November 27). Kerugian Akibat Kejahatan Cyber Tembus USD 150 Miliar. Retrieved April 18, 2019 from https://inet.detik.com/security/d3081840/kerugian-akibatkejahatan-cyber-tembus-usd-150miliar Penelitian Hukum Normatif.
Soerjono Soekanto, dan Sri Mamudji, 2004. Penelitian Hukum Normatif, Cetakan ke-8, PT. Raja Grafindo Persada, Jakarta
Peter Mahmud Marzuki. 2009. Penelitian Hukum. Jakarta: Kencana Prenada Media Group Rianto Adi, Metodologi Penelitian Sosial dan Hukum; edisi 1. Jakarta:Granit 2004
Richardson, J. (2011). Stuxnet as cyberwarfare: applying the law of war to the virtual battlefield. J. Marshall J. Computer & Info. L., 29, 1.
Russel, Allec. (2004, February 28). CIA plot led to huge blast in siberian gas pipeline. Retrieved April 18, 2019.
Saalbach, K. (2011). Cyberwar methods and practice. Available FTP: dirkkoentopp. com Directory: download File: saalbachcyberwar-methods-and-practice. pdf.
Saleem, M., & Hassan, J. (2009). " Cyber warfare", the truth in a real case. Project Report for Information Security Course, Linköping Universitetet, Sweden.
Schmitt, M. N. (2002). Wired warfare: Computer network attack and jus in bello. International Review of the Red Cross, 84(846), 365-399.
Setiyawan, A., & Wiwoho, J. Strengtening Indonesia’s Policy On National Cyber Security To Deal With Cyberwarfare Threat. Int'l & Comp. L. Rev, 32, 303. Soeharto.co (2013, April 29). retrieved 13 Maret 2019, from http://soeharto.co/1967-06-1sambutan-pejabat-presidensoeharto-pada-hari-lahirnyapancasila/
Soerjono Soekanto. (2011). Penelitian Hukum Normatif; Suatu Tinjauan Singkat. Rajawali Pers.
Walters, R. (2014). Cyber attacks on US companies in 2014. The Heritage Foundation.
Wignyosubroto, S. (2011). Keseragaman dalam Konsep Hukum, Tipe Kajian dan Metode Penelitian. Paper presented at lecturer for Law Doctoral Program, Sebelas Maret University.
Zetter, Kim (2014, March 11). An Unprecedented Look at Stuxnet, the World's First Digital Weapon. Retrieved Retrieved April 18, 2019 from https://www.wired.com/2014/11/co untdown-to-zero-day-stuxnet/
Downloads
Published
Issue
Section
License
With the receipt of the article by Editorial Board of the Social Sciences, Humanities and Education Journal (SHE Journal) and it was decided to be published, then the copyright regarding the article will be diverted to Social Sciences, Humanities and Education Journal (SHE Journal).
Social Sciences, Humanities and Education Journal (SHE Journal) hold the copyright regarding all the published articles and has the right to multiply and distribute the article under Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.Â
Copyright tranfer from the author to the journal is done through filling out the copyright transfer form by author. The form can be downloaded HERE.Â
Licensing Terms

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.