Pancasila as a Paradigm for Modern Indonesia Defense

Sulistyorini Sulistyorini


This study aims to see the relevance of Pancasila values as a defense paradigm in Indonesia in dealing with modern threats. This research uses doctrinal methods with statue approach. The pancasila values able to unite, collaborate with all the elements in order to achieve and realize the goals of the State of Indonesia. Pancasila values still need to be held firmly and realized in the all aspects of the Indonesian people’s life. Pancasila is a defense paradigm that has been tested in the Indonesian people struggle history in facing threats from within and outside the country. Pancasila as a defense paradigm is still very relevant to be used to deal with various forms of threats both conventional threats and modern threats as we are currently facing


Pancasila; paradigm; defense; modern threat; cyber

Full Text:



Chen, T. M. (2013). An assessment of the department of defense strategy for operating in cyberspace. Army War College Carlisle Barracks Pa Strategic Studies Institute.

Francis, D. (2013, March 13). The Coming Cyber Attack that could ruin your life. Retrieved April 18, 2019 from cles/2013/03/11/The-ComingCyber-Attack-that-Could-RuinYour-Life

Hikam, M. A. (Ed.). (2014). Menyongsong 2014-2019: memperkuat Indonesia dalam dunia yang berubah. CV. Rumah Buku.

Iasiello, E. (2013, June). Cyber attack: dullIasiello, E.(2013). cyber Attack: A dull to sahep foreign policy. 5th International COnference on Cyber Conflicts (pp.1-18). Tallin: NATO CCDOE Publications

Kompas. (2017, June 8). Serangan Cyber Makin Kencang Indonesia Sudah Siap. Retrieved April 18, 2019, from /06/08/10050037/serangan.cyber.m akin.kencang.indonesia.sudah.siap.

Lindsay, J.R., 2013. Stuxnet and the limits of cyber warfare. Security Studies, 22(3), pp.365-404.

Loney, Matt. (2004, March 1). MarchUS software blew up rusian gas pipeline. Retrieved April 18, 2019 from Http://

Mantra, IGN. (2012, Januari 20). 7 Negara ASEAN yang Paling Sering Kena Serangan Web. retrieved from 20/105656/1820779/323/7-negaraasean-yang-paling-sering-kenaserangan-web/

Middletown, A. (2015). Stuxnet: The World's First Cyber... Boomerang?. Interstate - Journal of International Affairs, Vol. 2015/2016 No.2. retrieved from ticles/1343/stuxnet-the-worldsfirst-cyber-boomerang

Morgan, S. (2017). Cybercrime Report. Herjavec Group, October. Noor, A.R. (2015, November 27). Kerugian Akibat Kejahatan Cyber Tembus USD 150 Miliar. Retrieved April 18, 2019 from Penelitian Hukum Normatif.

Soerjono Soekanto, dan Sri Mamudji, 2004. Penelitian Hukum Normatif, Cetakan ke-8, PT. Raja Grafindo Persada, Jakarta

Peter Mahmud Marzuki. 2009. Penelitian Hukum. Jakarta: Kencana Prenada Media Group Rianto Adi, Metodologi Penelitian Sosial dan Hukum; edisi 1. Jakarta:Granit 2004

Richardson, J. (2011). Stuxnet as cyberwarfare: applying the law of war to the virtual battlefield. J. Marshall J. Computer & Info. L., 29, 1.

Russel, Allec. (2004, February 28). CIA plot led to huge blast in siberian gas pipeline. Retrieved April 18, 2019.

Saalbach, K. (2011). Cyberwar methods and practice. Available FTP: dirkkoentopp. com Directory: download File: saalbachcyberwar-methods-and-practice. pdf.

Saleem, M., & Hassan, J. (2009). " Cyber warfare", the truth in a real case. Project Report for Information Security Course, Linköping Universitetet, Sweden.

Schmitt, M. N. (2002). Wired warfare: Computer network attack and jus in bello. International Review of the Red Cross, 84(846), 365-399.

Setiyawan, A., & Wiwoho, J. Strengtening Indonesia’s Policy On National Cyber Security To Deal With Cyberwarfare Threat. Int'l & Comp. L. Rev, 32, 303. (2013, April 29). retrieved 13 Maret 2019, from

Soerjono Soekanto. (2011). Penelitian Hukum Normatif; Suatu Tinjauan Singkat. Rajawali Pers.

Walters, R. (2014). Cyber attacks on US companies in 2014. The Heritage Foundation.

Wignyosubroto, S. (2011). Keseragaman dalam Konsep Hukum, Tipe Kajian dan Metode Penelitian. Paper presented at lecturer for Law Doctoral Program, Sebelas Maret University.

Zetter, Kim (2014, March 11). An Unprecedented Look at Stuxnet, the World's First Digital Weapon. Retrieved Retrieved April 18, 2019 from untdown-to-zero-day-stuxnet/

Article Metrics

Abstract has been read : 171 times
PDF file viewed/downloaded: 0 times



  • There are currently no refbacks.

Copyright (c) 2020 Social Sciences, Humanities and Education Journal (SHE Journal)

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.