MANAJEMEN PERTAHANAN DAN IMPLIKASINYA TERHADAP KEDAULATAN NEGARA

Authors

  • Aris Sarjito UNIVERSITAS PERTAHANAN REPUBLIK INDONESIA
  • Hikmat Zakky Almubaroq UNIVERSITAS PERTAHANAN REPUBLIK INDONESIA

Abstract

Manajemen pertahanan mengacu pada proses, kebijakan, dan prosedur yang terlibat dalam pengelolaan sumber daya dan kegiatan sektor pertahanan suatu negara. Ini mencakup kegiatan yang berkaitan dengan perencanaan, akuisisi, penyebaran, operasi, dan pemeliharaan kemampuan militer. Manajemen pertahanan berimplikasi signifikan terhadap kedaulatan negara karena berkaitan erat dengan kemampuan suatu negara dalam mempertahankan perbatasannya dan menjunjung tinggi keutuhan wilayahnya. Manajemen pertahanan yang efektif membutuhkan fokus yang kuat pada strategi, alokasi sumber daya, dan kesiapan operasional. Ini melibatkan koordinasi berbagai pemangku kepentingan, termasuk militer, instansi pemerintah dan entitas sektor swasta. Dalam banyak kasus, manajemen pertahanan diperumit oleh pertimbangan politik, yang terkadang bertentangan dengan prioritas militer. Manajemen pertahanan juga berimplikasi pada kedaulatan negara dalam hal dampaknya terhadap hubungan internasional. Kebijakan dan kemampuan pertahanan suatu negara dapat meningkatkan atau mengurangi kedudukannya dalam komunitas internasional. Misalnya, negara dengan militer yang kuat dan cakap mungkin berada dalam posisi yang lebih baik untuk menegosiasikan perjanjian perdagangan yang menguntungkan atau berpartisipasi dalam upaya pemeliharaan perdamaian internasional. Di sisi lain, negara dengan sektor pertahanan yang lemah atau tidak stabil mungkin akan mengalami kerugian dalam negosiasi internasional, atau rentan terhadap ancaman eksternal. Secara keseluruhan, manajemen pertahanan yang efektif sangat penting untuk menjaga kedaulatan negara dan memastikan keamanan nasional. Ini membutuhkan keseimbangan antara prioritas militer dan pertimbangan politik dan harus diupayakan dengan perspektif jangka panjang. Negara-negara yang memprioritaskan manajemen pertahanan dan berinvestasi dalam pengembangan kemampuan militernya lebih siap untuk mempertahankan kedaulatannya dan menegaskan posisi mereka dalam komunitas global.

References

Amaghionyeodiwe, L. A. (2017). Risk Management Framework (RMF) and the Implementation Challenges. Proceedings of the Northeast Business & Economics Association.

Aning, K., Jaye, T., & Atuobi, S. (2008). The role of private military companies in US-Africa policy. Review of African Political Economy, 35(118), 613-628.

Asmoro, N., et al. (2022). Management of national security in analysis and threat assessment of Indonesian sovereignty. Universitas Pertahanan Republik Indonesia.

Bermúdez Tapia, M. (2020). The influence of military strength on national sovereignty in international relations. Revista Científica General José María Córdova, 18(30), 291-306. http://dx.doi.org/10.21830/19006586.568

Birkeland, B. (2019). Space: The Final Next Frontier. Minn. L. Rev., 104, 2061.

Brown, C., & Ainley, K. (2009). Understanding international relations. Macmillan International Higher Education.

Bucur-Marcu, H., Fluri, P., & Tagarev, T. (2010). Defence management: An introduction. Univerza v Ljubljani, Fakulteta za družbene vede.

Change, M. S. S. I. C. (2017). Climate change.

Cheney, R. B. (1989). Defense management: Report to the president. Department of Defense.

Christiansson, M. (2010). Solidarity and Sovereignty: The Two-Dimensional Game of Swedish Security Policy. Connections, 10(1), 1–23. http://www.jstor.org/stable/26326231

Cilli, M., Parnell, G. S., Cloutier, R., & Zigh, T. (2015). A systems engineering perspective on the revised defense acquisition system. Systems Engineering, 18(6), 584-603.

Cohen, W. S. (1997). Report of the quadrennial defense review. DIANE Publishing.

Connors, C. L., & Malloy, M. A. (2007, April). Practical Challenges Facing Communities of Interest in the NetCentric Department of Defense. In Fourth International Conference on Information Technology (ITNG'07) (pp. 271-276). IEEE.

Daras, N. J. (2018). Cyber-security and Information Warfare. Nova Science Publishers, Incorporated.

Eichenberg, R. C., & Stoll, R. (2003). Representing defense: Democratic control of the defense budget in the United States and Western Europe. Journal of Conflict Resolution, 47(4), 399-422.

Fjeldstad, Ø. D., Snow, C. C., Miles, R. E., & Lettl, C. (2012). The architecture of collaboration. Strategic Management Journal, 33(6), 734-750.

Fraga-Lamas, P., Fernández-Caramés, T. M., Suárez-Albela, M., Castedo, L., & González-López, M. (2016). A review on internet of things for defense and public safety. Sensors, 16(10), 1644.

Frields, J. (1995). National industrial security program operating manual supplement. Department of Defense, Washington, DC.

Gallagher, K. P. (2009). Economic globalization and the environment. Annual Review of Environment and Resources, 34, 279-304.

Gates, R. M. (2009). National defense strategy. DIANE Publishing.

Gerginova, T. (n.d.). Different determinations of the concept for national security.

Guide, A. (2001). Project management body of knowledge (PMBOK® guide). Project Management Institute, 11, 7-8.

Harrison, K., & Boyd, T. (2018). The state and sovereignty. In Understanding Political Ideas and Movements (pp. 16-36). Manchester University Press.

Johnson, T. A. (Ed.). (2015). Cybersecurity: Protecting critical infrastructures from cyber attack and cyber warfare. CRC Press.

Kennedy, P. S. J., Tobing, S. J. L., & Lumbantoruan, R. (2017). Manajemen Anggaran Pertahanan Nasional. Koesrianti.

Koesrianti. (2013). International Cooperation Among States in Globalized Era: The Decline of State Sovereignty. Indonesian Law Review, 3, 267.

Krasner, S. D. (2009). Power, the state, and sovereignty: Essays on international relations. Routledge.

Krepinevich Jr, A. F. (2010). National security strategy in an era of growing challenges and resource constraints. Center for Strategic and Budgetary Assessments.

Leklem, E. J. (2021). The South Korean military's peacekeeping missions: A story of effectiveness. In The Routledge Handbook of Civil-Military Relations (pp. 189-201). Routledge.

Makinda, S. M. (1996). Sovereignty and International Security: Challenges for the United Nations. Global Governance, 2(2), 149–168. http://www.jstor.org/stable/27800134

Mori, S. (2018). US defense innovation and artificial intelligence. Asia-Pacific Review, 25(2), 16-44.

Muram, F. U., & Javed, M. A. (2021, March). Drone-based risk management of autonomous systems using contracts and blockchain. In 2021 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER) (pp. 679-688). IEEE.

Murray, W. (1997). Thinking about revolutions in military affairs.

Orchowski, L. M., Gidycz, C. A., & Raffle, H. (2008). Evaluation of a sexual assault risk reduction and self-defense program: A prospective analysis of a revised protocol. Psychology of Women Quarterly, 32(2), 204-218.

Pion-Berlin, D. (2009). Defense organization and civil-military relations in Latin America. Armed Forces & Society, 35(3), 562-586.

Pyszczynski, T., Greenberg, J., & Solomon, S. (1999). A dual-process model of defense against conscious and unconscious death-related thoughts: An extension of terror management theory. Psychological Review, 106(4), 835.

Rahmawati, I. (2017). The analysis of cyber crime threat risk management to increase cyber defense. Jurnal Pertahanan & Bela Negara, 7(2), 37-52.

Rizescu, A., & Tileagă, C. (2017). The effects of globalization on the transformation of organizational management. Journal of Defense Resources Management, 8(1), 135-140.

Tagarev, T. (2006). Introduction to program-based defense resource management. Connections, 5(1), 55-70.

Tagarev, T. (2009). Capabilities-based planning for security sector transformation. Information & Security: An International Journal, 24.

Terziev, V., Madanski, V., & Kanev, D. (2017). Entry opportunities in the Bulgarian military-educational system and ensuring of civil rights. Proceedings of SOCIOINT.

Thakur, R. (2002). Intervention, sovereignty and the responsibility to protect: Experiences from ICISS. Security Dialogue, 33(3), 323–340. http://www.jstor.org/stable/26298083

Thoms, O. N., & Ron, J. (2007). Do human rights violations cause internal conflict?. Human Rights Quarterly, 29, 674.

Warren, D. R. (1998). Defense management challenges facing DOD in implementing defense reform initiatives. General Accounting Office Washington DC Accounting and Financial Management Division.

White, J. R., & Clear, T. (2003). Terrorism: An introduction. Wadsworth Thomson Learning.

Downloads

Published

2023-07-03