Geopolitics Quarterly

Geopolitics Quarterly

Interpreting the Role of State, Non-State, and International Organization to form Cybersecurity Governance in Southeast Asia

Document Type : Original Article

Authors
1 Ph.D. Candidate International Relations Department UNPAD and Lecturer at IR Department Universitas Pertamina, Indonesia.
2 Full Professor International Relations Department, Universitas Padjadjaran, Bandung, Indonesia.
3 Associate Professor, International Relations Department, Universitas Padjadjaran, Bandung, Indonesia.
Abstract
Abstract
Southeast Asia is a region undergoing economic development and technological advancement. This region's economic growth is supported by the digital world, which contributes in the form of a digital economy. However, as the digital economy grows, cyberspace lacks stable cyber security governance. As a result, this area is extremely vulnerable to all types of cyber threats. The author intends to interpret the role of state actors, non-state actors, and international organizations in developing cybersecurity governance in Southeast Asia through this article. In a conceptual framework, the preparation of regional governance must involve collaboration across actors due to their distinct functions. Such governance can maintain cyber security while also accommodating stakeholders in the Southeast Asian region through multi-sectoral collaboration. Therefor, the authors argued that the collaboration between state, non-state, and regional organization are needed to overcome cyber threats. In addition, regional cybersecurity governance should be a turning point to make more secure cyber space in Southeast Asia.
Keywords

Subjects


  1. Acharya, A (2012). “Ideas, Norms, and Regional Orders.” In International Relations Theory and Regional Transformation, edited by T V Paul, 210–32. United Kingdom: Cambridge University Press.
  2. Alhammadi, A (2022). “The Neorealism and Neoliberalism behind International Relations during Covid-19.” World Affairs 185 (1): 147–75. https://doi.org/10.1177/00438200211065128.
  3. Aljunied, S.M.A (2020). “The Securitization of Cyberspace Governance in Singapore.” Asian Security 16 (3): 343–62. https://doi.org/10.1080/ 14799 855.2019.1687444.
  4. Anshori, M.F; Ananda Ramadhan, R (2019). “Kepentingan Singapura Pada Keamanan Siber Di Asia Tenggara Dalam Singapore International Cyber Week.” Padjadjaran Journal of International Relations 1 (1): 39. https://doi.org/10.24198/padjir.v1i1.21591.
  5. Archer, C (2001). International Organizations. 3rd ed. London: Routledge.
  6. ASEAN-UP. 2019. “Overview of E-Commerce in Southeast Asia [Market Analysis].” 2019. https://aseanup.com/overview-of-e-commerce-in-southeast-asia/.
  7. ASEAN. (2008). “ASEAN Charter.” 2008. https://asean.org/wp-content/uploads/images/archive/publications/ASEAN-Charter.pdf.
  8. ———(2018). “Treaty of Amity and Cooperation.” 2018. https://asean-aipr.org/wp-content/uploads/2018/07/Treaty-of-Amity-and-Cooperation-in-Southeast-Asia-1976-TAC.pdf.
  9.  ———(2019). “The ASEAN-Japan Cybersecurity Capacity Building Centre (AJCC BC).” 2019. https://asean2019.go.th/en/infographic/the-asean-japan-cybersecurity-capacity-building-centre-ajcc-bc/.
  10. ——— (2021a). “ASEAN Cybersecurity Cooperation Strategy.” ASEAN.
  11. ——— (2021b). “ASEAN LEADERS’ STATEMENT ON CYBER- SECURITY COOPERATION.” 2021. http://setnas-asean.id/site/ uploads/document/document/5b04cdc25d192-asean-leaders-statement-on-cybersecurity-cooperation.pdf.
  12. Baggott, S.S; Joost, R.S (2020). “A Risk Analysis Framework for Cyber Security and Critical Infrastructure Protection of the U.S. Electric Power Grid.” Risk Analysis 40 (9): 1744–61. https://doi.org/10.1111/risa.13511.
  13. Borelli, M (2017). “ASEAN Counter - Terrorism Weaknesses.” Internatio- nal Centre for Political Violence and Terrorism Research 9 (9): 14–20.
  14. Borzel, T (2016). “Theorizing Regionalism: Cooperation, Integration, and Governance.” In The Oxford Handbook of Comparative Regionalism, edited by Tanja A Borzel and Thomas Risse. United Kingdom: Oxford University Press.
  15. Buzan, B; Weaver, O; Wilde, J.D (1998). Security: A New Framework of Analysis. Colorado: Lynne Rienner.
  16. Cavelty, M.D; Egloff, F.J (2019). “The Politics of Cybersecurity: Balancing Different Roles of the State.” St Antony’s International Review 15 (1): 37–57.
  17. CCDCOE (2022). “ASEAN Cyber Developments: Centre of Excellence for Singapore, Cybercrime Convention for the Philippines, and an Open-Ended Working Group for Everyone.” 2022. https://ccdcoe.org/incyder-articles/asean-cyber-developments-centre-of-excellence-for-singapore-cybercrime-convention-for-the-philippines-and-an-open-ended-working-group-for-everyone/.
  18. Chandra, G.N (2021). “Indonesia at Highest Risk Level of Cyber Threat: TrendMicro.” Jakarta Globe. 2021. https://jakartaglobe.id/tech/indonesia-at-highest-risk-level-of-cyber-threat-trendmicro.
  19. Chang, L (2017). “Cyber Crime and Cybersecurity in ASEAN.” 2017. https://www.researchgate.net/publication/318474107.
  20. Creswell, J (2014). Research Design: Qualitative, Quantitative and Mixed Methods Approaches (4th Eds). London: SAGE.
  21. ———  (2015). Reserach Design: Qualitative, Quantitatve and Mix Methods Design (5th Eds). 5th ed. London: SAGE.
  22. Düll, A; Schoch, A; Straub, M (2018). “Cybersecurity in the European Union.” Central and Eastern European EDem and EGov Days 331: 313–23. https://doi.org/10.24989/ocg.v331.26.
  23. Dunn-Cavelty, M (2010). “Cyber-Threats.” In The Routledge Handbook of Security Studies, edited by Myriam Dunn-Cavelty and Victor Mauer, 180–89. New York: Rouledge.
  24. E-Trade for All (2018). “ASEAN: E-Commerce Set to Dominate the Region in 2019.” 2018. https://etradeforall.org/asean-e-commerce-set-to-dominate-the-region-in-2019/.
  25. Eggenschwiler, J (2020). “Expert Commissions and Norms of Responsible Behaviour in Cyberspace: A Review of the Activities of the GCSC.” Digital Policy, Regulation and Governance 22 (2): 93–107. https://doi.org/10.1108/DPRG-03-2019-0019.
  26. Farid, M; Adhisty, A.A (2019). “State Action as an Individual Security Threat in Case of Cybercrime Securitization.” Jurnal Pertahanan 5 (3): 77. https://doi.org/10.33172/jp.v5i3.589.
  27. Feng, J (2018). “On The Cusp.” 2018. https://www.imf.org/external/ pubs/ft/fandd/2018/09/pdf/aseandigital-economy-infographic-feng.pdf.
  28. Feraru, A.S (2016). “ASEAN Decision-Making Process: Before and after the ASEAN Charter.” Asian Development Policy Review 4 (1): 26–41. https://doi.org/10.18488/journal.107/2016.4.1/107.1.26.41.
  29. Foque, R; Steenbergen, J (2005). “Regionalism: A Constitutional Framework for Global Challenges.” In Global Politics of Regionalism: Theory and Practice, edited by Mary Farrell, Bjorn Hettne, and Luk Van Langenhove. London: Pluto Press.
  30. Gerard, K (2018). “ASEAN as a ‘Rules-Based Community’: Business as Usual.” Asian Studies Review 42 (2): 210–28. https://doi.org/10.1080/ 10357823.2018.1444016.
  31. Gioulekas, F; Stamatiadis, E; Tzikas, A; Gounaris, K; Georgiadou, A; Michalitsi-Psarrou, A; Doukas, G; et al (2022). “A Cybersecurity Culture Survey Targeting Healthcare Critical Infrastructures.” Healthcare 10: 1–19.
  32. Guarda, N.D (2015). “Governing the Ungovernable: International Relations, Transnational Cybercrime Law, and the Post-Westphalian Regulatory State.” Transnational Legal Theory 6 (1): 211–49. https://doi.org/10.1080/20414005.2015.1042226.
  33. Gultom, R.A.G; Supriyadi, A.A; Kustana, T (2018). “A Strengthening Asean Cyber Cooperation in Countering Cyber Terrorist Groups Activities on the Internet by Implementing the Six-Ware Cyber Security Framework.” International Journal of Management & Information Technology 13: 3288–3300. https://doi.org/10.24297/ijmit.v13i0.7624.
  34. Harper, N; Tempra, N (2020). “Drug Trafficking in the Golden Triangle: The Myanmar Problem and ASEAN Effectiveness.” Jurnal Sentris 1 (1): 116–24. https://doi.org/10.26593/sentris.v1i1.4171.116-124.
  35. Heinl, C.H (2014). “Regional Cybersecurity: Moving Toward a Resilient ASEAN Cybersecurity Regime.” Asia Policy 18 (1): 131–59. https://doi.org/10.1353/asp.2014.0026.
  36. Hofman, S.C; Merand, F (2012). “Regional Organization a La Carte: The Effects of Institutional Elasticity.” In International Relations Theory and Regional Transformation, edited by T V Paul, 133–57. United Kingdom: Cambridge University Press.
  37. Holzleitner, M.T; Reichl, J (2017). “European Provisions for Cyber Security in the Smart Grid – an Overview of the NIS-Directive.” Elektrotechnik Und Informationstechnik 134 (1): 14–18. https://doi.org/ 10.1007/s00502-017-0473-7.
  38. IBM Security (2019). “Cost of Data Breach Record.”
  39. INTERPOL (2020). “ASEAN Cyberthreat Assessment 2020.”
  40. ITU. (2018). “Global Cybersecurity Index 2018.” https://www.itu.int/dms_ pub/itu-d/opb/str/D-STR-GCI.01-2018-PDF-E.pdf.
  41. Jakobi, A.P (2016). “Non-State Actors and Global Crime Governance: Explaining the Variance of Public-Private Interaction.” British Journal of Politics and International Relations 18 (1): 72–89. https://doi.org/ 10.1111/ 1467-856X.12064.
  42. Kassab, H.S (2014). “In Search of Cyber Stability: International Relations, Mutually Assured Destruction and the Age of Cyber Warfare.” In Cyberspace and International Relations: Theory, Prospects and Challenges, edited by Jan-Frederik Kremer and B Muller, 59–76. Bonn: Springer.
  43. Kausch, K (2017). “Cheap Havoc: How Cyber-Geopolitics Will Destabilize the Middle East.” United States.
  44. Krause, T; Ernst, R; Klaer, B; Hacker, I; Henze, M (2021). “Cybersecurity in Power Grids: Challenges and Opportunities.” Sensors 21 (18): 1–19. https://doi.org/10.3390/s21186225.
  45. Krisman, K (2013). “A Secure Connection: Finding the Form of ASEAN Cyber Security Cooperation.” JAS (Journal of ASEAN Studies) 1 (1): 41. https://doi.org/10.21512/jas.v1i1.60.
  46. Lacy, M; Prince, D (2018). “Securitization and the Global Politics of Cybersecurity.” Global Discourse 8 (1): 1–16. https://doi.org/https://doi. org/10.1080/23269995.2017.1415082.
  47. Maglaras, L; Janicke, H; Ferrag, M.A (2022). “Cybersecurity of Critical Infrastructures: Challenges and Solutions.” Sensors 22 (14): 2–5. https://doi.org/10.3390/s22145105.
  48. Manley, M (2015). “Cyberspace’s Dynamic Duo: Forging a Cybersecurity Public-Private Partnership.” Journal of Strategic Security 8 (5): 85–98. https://doi.org/10.5038/1944-0472.8.3S.1478.
  49. Manopo, B.Y.W; Sari, D.A.A (2015). “Asean Regional Forum: Realizing Regional Cyber Security in Asean Region.” Belli Ac Pacis 1 (1): 44–51. https://jurnal.uns.ac.id/belli/article/view/27366.
  50. McAfee. (2014). “The Economic Impact of Cybercrime and Cyber Espionage.” California.
  51. Mizan, N.S.M; Ma’arif, M.Y; Mohd Satar, N.S; Shahar, S.M (2019). “CNDS-Cybersecurity: Issues and Challenges in ASEAN Countries.” International Journal of Advanced Trends in Computer Science and Engineering 8 (October): 113–19. https://doi.org/https://doi.org/ 10.30534/ ijatcse/2019/1781.42019.
  52. Mok, Sh.Y (2020). “ASEAN and Transnational Crime: Gains and Challenges in Tackling Drug Trafficking.” Wimaya 1 (01): 31–38. https://doi.org/10.33005/wimaya.v1i01.13.
  53. Morgado, N (2023). “How Can Geopolitical Agents Restrain an Emerging Power’s Global and Regional Leadership? Evidence from Brazil.” Geopolitics Quarterly 18 (68): 268–98.
  54. Nagyfejeo, E (2021). “EU’s Emerging Strategic Cyber Culture(S).” Policing: A Journal of Policy and Practice 15 (1): 79–102. https://doi.org/ 10.1093/police/pay092.
  55. Nasu, H (2019). The Legal of Authority of ASEAN as Security Institution. England: Cambridge.
  56. National Security Council (2020). “Malaysia Cyber Security Strategy 2020-2024.” Putrajaya.
  57. Navari, C (2013). “Liberalism.” In Security Studies: An Introduction, edited by Paul Williams, 2nd ed., 32–47. New York: Routledge.
  58. Nengsi, F (2019). “The Women’s Participation in Digital Economy in ASEAN.” Journal of Islamic World and Politics 3 (1): 516–36. https://doi.org/10.18196/jiwp.3128.
  59. Noor, E (2015). “Strategic Governance of Cyber Security : Implications for East Asia.” In Navigating Change: ASEAN-Japan Strategic Partnership in East Asia and in Global Governance, edited by Rizal Sukma and Y Soeya, 150–63. Japan: JCIE.
  60. ———(2020). “Positioning ASEAN in Cyberspace.” Asia Policy 15 (2): 107–14. http://asiapolicy.nbr.org.
  61. Nye Jr, J (2011). The Future of Power. New York: Perseus Group.
  62. Oktaviani, P.B; Silvia, A (2021). “Strategi Keamanan Siber Malaysia.” Jurnal Kajian Ilmiah 21 (1): 69–84. https://doi.org/10.31599/jki.v21i1.447.
  63. Papp, Daniel S, and D Albert. 2001. Information Age: Anthology (Eds). USA: CCRP.
  64. Progoulakis, I; Nikitakos, N; Rohmeyer, P; Bunin, B; Dalaklis, D; Karamperidis, S (2021). “Perspectives on Cyber Security for Offshore Oil and Gas Assets.” Journal of Marine Science and Engineering 9 (2): 1–27. https://doi.org/10.3390/jmse9020112.
  65. Radu, R (2015). “Power Technology and Powerful Technologies: Global Governmentality and Security in the Cyberspace.” In Cyberspace and International Relations: Theory, Prospects and Challenges, edited by Jan Frederik Kremer and Benedikt Muller, 3–20. Bonn: Springer.
  66. Ramadhan, I (2017). “Peran Institusi Internasional Dalam.” Populis 2 (4): 495–508.
  67. ———(2020). “Cyber-Terrorism in the Context of Proselytizing, Coordination, Security, and Mobility.” Islamic World and Politics 4 (2): 185–203. https://doi.org/10.18196/jiwp.4252.
  68. Ritchie, J; Spencer, L (2002). “Qualitative Data Analysis for Applied Policy Research.” In Analyzing Qualitative Data, edited by Alan Bryman and Robert G Burgess, 173–94. London: Routledge.
  69. Roselle, L; Spray, Sh (2012). Research and Writing in International Relations. Boston: Pearson Longman.
  70. Salsabila, A.S; Fikri, M.D; Andika, M.S; Harahap, N.A (2020). “Potential and Threat Analysis towards Cybersecurity in South East Asia.” Journal of ASEAN Dynamics and Beyond 1 (1): 1–12.
  71. Snyder, H (2019). “Literature Review as a Research Methodology: An Overview and Guidelines.” Journal of Business Research 104 (August): 333–39. https://doi.org/10.1016/j.jbusres.2019.07.039.
  72. Soderbaum, F (2016). “Old, New, and Comparative Regionalism: The History and Scholarly Development of the Field.” In The Oxford Handbook of Comparative Regionalism, edited by Tanja A Borzel and Thomas Risse. United Kingdom: Oxford University Press.
  73. Subono, N.I; Kosandi, M (2019). “The Regionalism Paradox in the Fight against Human Trafficking: Indonesia and the Limits of Regional Cooperation in ASEAN.” Journal of Leadership, Accountability and Ethics 16 (2): 89–98.
  74. Sudirman, A; Sari, D.S (2017). “Membangun Keamanan Regional Di Asean Dalam Menanggulangi Ancaman Terorisme.” Jurnal Wacana Politik 2 (1): 22–32. https://doi.org/10.24198/jwp.v2i1.11276.
  75. Suzuki, S (2021). “Can ASEAN Offer a Useful Model? Chairmanship in Decision-Making by Consensus.” Pacific Review 34 (5): 697–723. https://doi.org/10.1080/09512748.2020.1727553.
  76. Tanczer, L.M; Brass, I; Carr, M (2018). “CSIRTs and Global Cybersecurity: How Technical Experts Support Science Diplomacy.” Global Policy 9 (November): 60–66. https://doi.org/10.1111/1758-5899.12625.
  77. Tran Dai, C; Gomez, M.A (2018). “Challenges and Opportunities for Cyber Norms in ASEAN.” Journal of Cyber Policy 3 (2): 217–35. https://doi.org/10.1080/23738871.2018.1487987.
  78. Varga, G (2020). “Global Cybercrime Report: Which Countries Are Most at Risk?” 2020. https://seon.io/resources/global-cybercrime-report/.
  79. Veicy, H (2022). “The Policies of Russian Regionalism and the Eurasian Economic Union.” Geopolitics Quarterly 18 (68): 2023–2177.
  80. Velasco, J.Ch (2022). “Sino-ASEAN Geopolitical Relations through International Student Mobility: Manifestations of Soft Power through Education.” Geopolitics Quarterly 18 (68): 412–29.
  81. Wahyuni, R.A.E; Waluyo, S.D; Simatupang, H (2021). “STRENG- THENING THE CYBER DEFENSE CENTER OF THE MINISTRY OF DEFENCE OF THE REPUBLIC OF INDONESIA (PUSDATIN KEMHAN) TO SUPPORT THE INDONESIAN DEFENSE DIPLOMACY IN CYBER DEFENSE SECURITY COOPERATION IN ASEAN.” Jurnal Pertahanan 7 (3): 511–25.
  82. Watanabe, S (2020). “Strategic Analysis of Capacity Building for the Cyber Security of the United States in Asia.” Jurnal Asia Pacific Studies 4 (2): 100–111. https://doi.org/10.33541/japs.v4i2.2800.
  83. Willi, Y; Pütz, M; Müller, M (2018). “Towards a Versatile and Multidimensional Framework to Analyse Regional Governance.” Environment and Planning C: Politics and Space 36 (5): 775–95. https://doi.org/10.1177/2399654418760859.
  84. Wilner, A.S; Luce, H; Ouellet, E; Williams, O; Costa, N (2022). “From Public Health to Cyber Hygiene: Cybersecurity and Canada’s Healthcare Sector.” International Journal 76 (4): 522–43. https://doi.org/10.1177/ 00207020211067946.
  85. Yadav, H; Gour, Sh (2014). “Cyber Attacks: An Impact on Economy to an Organization.” International Journal of Information & Computation Technology 4 (9): 937–40.
  86. Yazid, S; Septiyana, I (2019). “The Prospect of ASEAN Migration Governance.” Journal of Indonesian Social Sciences and Humanities 9 (2): 95–112. https://doi.org/10.14203/jissh.v9i2.155.
  87. Yuniar, R.W (2017). “Uber Rival Grab Rolls Out Indonesia Investment Plan.” 2017. https://www.wsj.com/articles/uber-rival-grabtaxi-rolls-out-indonesia-investment-plan-1486012764.
  88. Yusuf, M.S (2022). “Optimalisasi Layanan Publik Badan Intelijen Negara Dalam Perspektif Global Cybersecurity Index.” Al Ulum Jurnal Sains Dan Teknologi 7 (1): 21–26. https://doi.org/10.31602/ajst.v7i1.5643.
  89. Zahiroh, M.Y (2020). “Cybersecurity Awareness and Digital Skills on Readiness for Change in Digital Banking.” Li Falah: Jurnal Studi Ekonomi Dan Bisnis Islam 5 (2): 53. https://doi.org/10.31332/lifalah.v5i2.2271.
Volume 20, Issue 2
Spring 2024
Pages 255-278

  • Receive Date 26 July 2022
  • Revise Date 21 November 2023
  • Accept Date 30 November 2023