Memperluas Agenda Studi Keamanan Nasional: Politik, Hukum dan Strategi

Binsar Simorangkir


National security is the first and foremost responsibility of a nation. A nation is
considered a strong nation once it is able to secure the livelihood of the people and the
wellbeing of the nation itself. Yet the world is evolving quickly and new technologies and
innovations bring about new threats and opportunities towards national security. This
article aims to describe the expansion of politics, laws, and strategies within the study of
national security. Content analysis method will be used in this article. From more than
20 articles referenced here, it can be summarized that changes in strategic environment
is heavily affected by the latest industrial revolution, the industry 4.0. Thus, this brings
about new challenges such as cyber threats. The researcher then concluded that these
threats could affect a nation strategically. These threats then focused on political threats
of collective security, current law threats which requires cyber law, and strategic threats
which is cyber security.
Keywords: National Security, Strategy, Politic, Law

Full Text:



Amaritasari, I. (2015). Keamanan Nasional dalam Konsep dan Standar Internasional.

Jurnal Keamanan Nasional.

Amitav Mallik. (2004). Technology and 21st Century a Demand-Side Perspective (Issue 20).

As-Saber, S. N., Srivastava, A., & Hossain, K. (2006). Information Technology Law and Egovernment

: 1(1).

Barry Buzan, 1991. People, States and Fear: an Agenda for International Security Studies in the

Post-Cold War. Boulder: Lynne Rienner Publisher.

Barry Buzan & Lenen Hensen. 2009. The Evolution of International Security Studies. United

Kingdom: Cambridge University Press.

Darmono, 2010. Keamanan Nasional: Sebuah Konsep dan Sistem keamanan Bagi Bangsa Indonesia, Sekretariat Jendral dewan ketahanan Nasional, Jakarta.

David Mutimer. 1999. Beyond Strategy: Critical Thinking and the New Security Studies, dalam

Contemporary Security and Strategy, Craig A Snyder (ed), London: Macmillan Press Ltd.

Gultom, R. A. G. (2017). Membangun kemampuan siber dan persandian nasional guna

mengantisipasi tantangan keamanan siber di era globalisasi informasi dalam rangka

melindungi keutuhan dan kedaulatan NKRI.

Gareth Evans and Bruce Grant, 1992. Australia’s Foreign Relations in The World of 1990’s,

Melbourne, Melbourne University Press.

Ghernaouti, Solange. 2013. Cyber Power : Crime, Conflict and Security in Cyberspace.

Lausanne: EPFL Press.

Halimatus Sakdiyah. 2010. “Trafficking perempuan dan anak sebagai isu ancaman keamanan

non tradisional bagi Indonesia. Dalam skripsi Mahasiswa UMM jurusan Hubungan


Jack C. Plano dan Ray Olton 1985, The International Relation Dictionary, California

ABC-Clio Inc.

James N.Rosenau, 1976, World Politics: An Introduction to International Relations, New

York, Free pers.

Julio Tomas Pinto. 2007. Keamanan nasional-Antara Ancaman Internal dan eksternal


Mas’oed, Mochtar. 1989. Studi Hubungan Internasional, Tingkat Analisis dan Teorisasi.

Yogyakarta: Pusat antar Universitas studi Sosial UGM.

Nagy, J., Oláh, J., Erdei, E., Máté, D., & Popp, J. (2018). The role and impact of industry

0 and the internet of things on the business strategy of the value chain-the case of

Hungary. Sustainability (Switzerland), 10.

Perwita, Anak Agung Banyu & Yani, Yanyan A. 2005. Pengantar Ilmu Hubungan

Internasional. Bandung: Rosdakarya.

Perwita, Anak Agung Banyu. 2006. Hakikat Prinsip dan Tujuan Pertahanan-Keamanan

Negara, dalam Tim Propatria Institute, Mencari Format Komprehensif Sistem Pertahanan

dan Keamanan Negara. Jakarta: Propatria.

Perwita, Anak Agung Banyu. Dinamika Keamanan Dalam Hubungan Internasional dan

Implikasinya Bagi Indonesia. Bandung: Universitas Katholik Parahyangan, 2008

Prinsloo, J., Sinha, S., & von Solms, B. (2019). A review of industry 4.0 manufacturing process

security risks. Applied Sciences (Switzerland), 9(23).

Septa, Albert Alfa. “Ancaman Keamanan Australia Pada Masa Pemerintahan John

Howard: 2001-2007.” Jurnal Analisis Hubungan Internasional Vol. 7 No. 2, Mei 2018.

Sitompul, Josua. 2012. Cyberspace, Cybercrimes, Cyberlaw: Tinjauan Aspek Hukum

Pidana. Jakarta: PT. Tatanusa.

Sujarweni, V. Wiratna. 2014. Metode Penelitian: Lengkap, Praktis, dan Mudah Dipahami.

Yogyakarta: Pustaka Baru Press.

Timmers, P. (2019). Ethics of AI and Cybersecurity When Sovereignty is at Stake. Minds

and Machines, 29(4).

T.May Rudi, 2002, Studi STRATEGIS: Dalam transformasi Sistem Internasional Pasca Perang




  • There are currently no refbacks.

Ethics in Publishing

Publishing ethics refers to COPE (Commitee on Publication Ethics) and Regulation of the Head of LIPI Number 5 of 2014 concerning the Code of Ethics for Scientific Publications.

This statement outlines the ethical behavior expected of all parties. The parties are related and obedient in their respective positions and roles: authors, editorial board, peer reviewers, and publishers, who are involved in publishing articles in this journal.

Authors create articles. Authors should read the policies that apply to their contributions and the author's guidelines. Once a submission has reached the review stage, authors are not allowed to withdraw it. The author accepts editorial decisions voluntarily.

Editorial Board
The editor consists of the chief editor and staff as a unit. Editors grade manuscripts on intellectual merit alone, regardless of the author's rank, title, skin color, gender, sexual orientation, religion, ethnicity, nationality, or political philosophy. Corresponding authors, reviewers, potential reviewers, other editorial advisers, and publishers, as appropriate, are the only parties to whom any editor and editorial staff may divulge information about manuscripts that have been submitted. The editor chooses which article to publish. When reaching a choice, the editor can consult with other editors or reviewers.

Peer Reviewers

Peer review provides an assessment of the articles submitted by the editor. The reviewer's assessment results assist the editor in editing the assessment and can also help the author improve the article through the editorial communication with the author. Any selected reviewer who believes they lack the skills necessary to evaluate a manuscript or realizes that doing so quickly is impossible should notify the editor and withdraw from the review process. The review must be carried out impartially. It would be inappropriate to criticize the author personally. Referees must clearly state their position and provide evidence to support them. Any manuscript sent to you for review should be treated with confidentiality. They cannot be discussed or shown to anyone without the editor's permission. Reviewers must indicate related published work that the author still needs to cite. Suitable quotations must support any claim that specific observations, deductions, or arguments have been recorded. Any significant overlap or resemblance between the manuscript under consideration and other published material of which the reviewer has direct knowledge must be communicated to the editor.


The publisher is the institution that publishes the journal. Universitas Pertahanan Press under the Universitas Pertahanan Republik Indonesia, publisher of this Journal of Defense Diplomacy. Moral and ethical obligations as publishers are aware of and take their duties and responsibilities seriously during and throughout the publication process. For publishing journals, publishers work closely with editorial boards to facilitate communication with other journals and publishers.

Alamat Dewan Redaksi:
Alamat: Jl. Salemba Raya No.14, RT.3/RW.6, Kenari, Kec. Senen,
Kota Jakarta Pusat, Daerah Khusus Ibukota Jakarta 10430

Creative Commons License
Jurnal Diplomasi Pertahanan is licensed under a Creative Commons Attribution 4.0 International License.

 View My StatCounter