The Implication of Cyberspace Towards State Geopolitics
DOI:
https://doi.org/10.15575/politicon.v3i2.12660Keywords:
Geopolitics, cyberspace, state, cyber conflict, governanceAbstract
Massive technological advancements have influenced many dynamics of the nation's social, political, and economic changes. Geopolitical studies, as one of the studies that investigate the interaction between political dynamics and geography, are exposed to the implications of these technological developments. At the outset of its development, geopolitical studies discussed the state's strategies and policies for gaining influence in specific areas. Geopolitics is the study of a country's boundaries. The emergence of cyberspace, along with the advancement of technology, has implications for a country's geopolitical development. Geopolitical competition takes place not only in the physical realm, but also in cyberspace. The purpose of this article is to examine the shift in the geopolitical paradigm from physical to cyberspace. The authors examine how the existence of cyberspace can have a political impact, particularly geopolitical rivalries between countries, using geopolitics and cyberspace concepts. This scientific article investigates cyberspace phenomena and geopolitical studies using qualitative methods, particularly case study writing techniques. The author contends that geopolitics in cyberspace has no borders, based on the findings of this article's analysis. To avoid cyber conflicts, states must make cyberspace their political domain. Geopolitical rivalries between states in cyberspace can have real-world consequences. One of them is the use of technology to suppress other states' geopolitical policies. Because cyberspace is infinite, the state must develop governance so that the potential for cyber conflicts does not have physical consequences for the country's geopolitics. Given that almost all dynamics of state life have been integrated into information technology, the author concludes that cyberspace should be considered one of a state's geopolitical areas.References
Assaf, A., Moshkinov, D., & Group, “International Law in The Digital Age†Research and Study. (2020). Contesting sovereignty in cyberspace. International Cybersecurity Law Review, 1, 115–124. https://doi.org/Sovereignty · Cyberspace · Territory · Cyber-attack · Function theory
Blackwill, R. D., & Harris, J. M. (2017). War by Other Means: Geoeconomics and Statecraft. USA: Council on Foreign Relations.
Buzan, B., & Weaver, O. (2003). Regions and Powers. New York: Cambridge.
Cohen, S. B. (2015). Geopolitics: The Geography of International Relations. United Kingdom: Rowman & Littlefield.
Corn, G., & Taylor, R. (2017). Concluding Observations on Soverignty in Cyberspace. AJIL Unbound, 111, 282–283. https://doi.org/doi:10.1017/aju.2017.77
Cornish, P. (2015). Governing cyberspace through constructive ambiguity. Survival, 57(3), 153–176. https://doi.org/10.1080/00396338.2015.1046230
Cowen, D., & Smith, N. (2009). After geopolitics? From the geopolitical social to geoeconomics. Antipode, 41(1), 22–48. https://doi.org/10.1111/j.1467-8330.2008.00654.x
Creswell, J. (2014). Research Design: Qualitative, Quantitative and Mixed Methods Approaches (4th Eds). London: SAGE.
Deibert, R. (2015). The geopolitics of cyberspace after snowden. Current History, 114(768), 9–15. https://doi.org/10.1525/curh.2015.114.768.9
Do, Q., Shapiro, J. N., Elvidge, C. D., Abdel-jelil, M., Daniel, P., Baugh, K., Hansen-lewis, J., Zhizhin, M., & Bazilian, M. D. (2018). HHS Public Access. Energy Res Soc Sci, 44, 411–418. https://doi.org/10.1016/j.erss.2018.03.013.Terrorism
Dodds, K. (2007). Geopolitics: A Very Short Introduction. New York: Oxford Press.
Dodge, M., & Kitchin, R. (2001). Mapping Cyberspace. New York: Routledge.
Dunn-Cavelty, M. (2010). Cyber Threats. In M. Dunn-Cavelty & V. Mauer (Eds.), The Routledge Handbook of Security Studies. New York: Routledge.
Dunn-Cavelty, M., & Egloff, F. J. (2019). The Politics of Cybersecurity: Balancing Different Roles of The State. St. Antony’s International Review, 15(1), 37–57.
Dunn-Cavelty, M., & Wenger, A. (2020). Cyber Security Meets Security Politics: Complex Technology, Fragmented Politics, and Networked Science. Contemporary Security Policy, 41(1), 5–32.
Eldem, T. (2020). The Governance of Turkey’s Cyberspace: Between Cyber Security and Information Security. International Journal of Public Administration, 43(5), 452–465. https://doi.org/10.1080/01900692.2019.1680689
Fernández, D. P. (2020). Will the Internet fragment? Sovereignty, globalization and cyberspace. Revista Espanola de Ciencia Politica, 2020(53), 195–200. https://doi.org/10.1080/08109028.2018.1505877
Flint, C. (2016). Introduction to Geopolitics. In Introduction to Geopolitics. USA: Routledge.
Glen, C. M. (2014). Internet Governance: Territorializing Cyberspace? Politics & Politiy, 42(5), 635–637. https://doi.org/10.1111/polp.12093
Hammarberg, K., Kirkman, M., & De Lacey, S. (2016). Qualitative research methods: When to use them and how to judge them. Human Reproduction, 31(3), 498–501. https://doi.org/10.1093/humrep/dev334
Heinl, C. H. (2014). Regional Cybersecurity: Moving Toward a Resilient ASEAN Cybersecurity Regime. Asia Policy, 18(1), 131–159. https://doi.org/10.1353/asp.2014.0026
Henry, M. (2014). Australasian Airspace: Meteorology, and the Practical Geopolitics of Australasian Airspace, 1935-1940. In J. Beattie, E. O’Gorman, & M. Henry (Eds.), Climate, Science, and Colonization: Histories from Australia and New Zealand (pp. 234–249). USA: Palgrave Macmillan.
Isnarti, R. (2016). A Comparison of Neorealism, Liberalism, and Constructivism in Analysing Cyber War. Andalas Journal of International Studies (AJIS), 5(2), 151. https://doi.org/10.25077/ajis.5.2.151-165.2016
Jones, L., & Sage, D. (2010). New directions in critical geopolitics: An introduction. GeoJournal, 75(4), 315–325. https://doi.org/10.1007/s10708-008-9255-4
Kassab, H. S. (2014). In Search of Cyber Stability: International Relations, Mutually Assured Destruction and the Age of Cyber Warfare. In J.-F. Kremer & B. Muller (Eds.), Cyberspace and International Relations: Theory, Prospects and Challenges (pp. 59–76). Bonn: Springer.
Kausch, K. (2017). Cheap Havoc: How Cyber-Geopolitics Will Destabilize The Middle East.
Kelly, P. (2006). A Critique of Critical Geopolitics. Geopolitics, 11(1), 24–53. https://doi.org/10.1080/14650040500524053
Khanna, P. (2018). State sovereignty and self-defence in cyberspace. BRICS Law Journal, 5(4), 139–154. https://doi.org/10.21684/2412-2343-2018-5-4-139-154
Klinger, J. M. (2020). Critical Geopolitics of Outer Space. Geopolitics, 26(3), 661–665. https://doi.org/10.1080/14650045.2020.1803285
McKinder, H. J. (1998). The Geographical Pivot of History. In G. O. Tuathail, S. Dalby, & P. Routledge (Eds.), The Geopolitics Reader (pp. 27–31). London: Rouledge.
Merchant, E. K. (2015). Book Review: Global population: History, geopolitics, and life on earth. Global Public Health, 10(1), 129–131. https://doi.org/https://doi.org/10.1080/17441692.2014.976241
Mueller, M. L. (2019). Against Sovereignty in Cyberspace. International Studies Review, 0, 1–23. https://doi.org/10.1093/isr/viz044
Navari, C. (2013). Liberalism. In P. Williams (Ed.), Security Studies: An Introduction (2nd ed., pp. 32–47). New York: Routledge.
O Tuathail, G. (1996). Critical Geopolitics. London: Routledge.
Power, M. (2010). Geopolitics and “developmentâ€: An introduction. Geopolitics, 15(3), 433–440. https://doi.org/10.1080/14650040903500999
Public Private. (2019). Commodification of Cyber Capabilities: A Grand Cyber Arms Bazaar.
Ramadhan, I. (2017). Peran Institusi Internasional dalam Penanggulangan Ancaman Cyber. Populis, 2(4), 495–508.
Ramadhan, I. (2018). China’s Belt Road Initiative: Dalam Pandangan Teori Geopolitik Klasik. Intermestic: Journal of International Studies, 2(2), 139. https://doi.org/10.24198/intermestic.v2n2.3
Ramadhan, I. (2019). STRATEGI KEAMANAN CYBER SECURITY DI KAWASAN ASIA TENGGARA: SELF-HELP ATAU MULTILATERALISM? Jurnal Asia Pacific Studies, 3(1). https://doi.org/dx.doi.org/10.33541/japs.v3i1.1081
Ramadhan, I. (2020). Building Cybersecurity Regulation in Southeast Asia: A Challenge for the Association of Southeast Asian Nations (ASEAN). Journal of Social and Political Sciences, 3(4). https://doi.org/10.31014/aior.1991.03.04.230
Ramadhan, I., & Iskandar, J. A. (2020). Upaya Perimbangan Kekuatan Iran-Arab Saudi melalui Perang Suriah untuk Memenangi Kontestasi Geopolitik di Timur Tengah. Insignia: Journal of International Relations, 7(2), 105. https://doi.org/10.20884/1.ins.2020.7.2.2391
Ramadhan, I., & Pratiwi, M. (2020). Perluasan Kerja Sama Shanghai Cooperation Organization (SCO) Dalam Pandangan Teori Geopolitik McKinder. Frequency of International Relations, 2(1), 142–163.
Riordan, S. (2019). The Geopolitics of Cyberspace: a Diplomatic Perspective. Brill Research Perspectives in Diplomacy and Foreign Policy, 3(3), 1–84. https://doi.org/10.1163/24056006-12340011
Roselle, L., & Spray, S. (2012). Research and Writings in International Relations. Boston: Pearson Longman.
Schmitt, M. N., & Vihul, L. (n.d.). Sovereignty in Cyberspace: Lex Lata Vel Non? AJIL Unbound, 111, 213–218. https://doi.org/doi:10.1017/aju.2017.55
Sheldon, J. B. (2014). Geopolitics and Cyber Power: Why Geography Still Matters. American Foreign Policy Interests, 36(5), 286–293. https://doi.org/10.1080/10803920.2014.969174
Shen, Y. (2016). Cyber Sovereignty and the Governance of Global Cyberspace. Chinese Political Science Review, 1(1), 81–93. https://doi.org/10.1007/s41111-016-0002-6
Sieber, U., & Neubert, C.-W. (2017). Transnational Criminal Investigations in Cyberspace: Challenges to National Sovereignty. In M. Planck (Ed.), Max Planck Yearbook of United Nations Law Online (pp. 239–321). Netherland: Brill-Nijhoff.
Snyder, H. (2019). Literature review as a research methodology: An overview and guidelines. Journal of Business Research, 104(August), 333–339. https://doi.org/10.1016/j.jbusres.2019.07.039
Sobaruddin, D. P., Armawi, A., & Martono, E. (2017). Model Traffic Separation Scheme (TSS) Di Alur Laut Kepulauan Indonesia (AlKI) I Di Selat Sunda Dalam Mewujudkan Ketahanan Wilayah. Jurnal Ketahanan Nasional, 23(1), 104. https://doi.org/10.22146/jkn.22070
Spiegel, S. L. (2000). Traditional space vs. cyberspace: The changing role of geography in current international politics. Geopolitics, 5(3), 114–125. https://doi.org/10.1080/14650040008407694
Tsagourias, N. (2015). The Legal Status of Cyberspace. In N. Tsagourias & R. Buchan (Eds.), Research Handbook on International Law and Cyberspace (pp. 13–49). Cheltenham: Edward Elgar Publishing.
Wu, Z. (2018). Classical geopolitics, realism and the balance of power theory. Journal of Strategic Studies, 41(6), 786–823. https://doi.org/10.1080/01402390.2017.1379398
Zeng, J., Stevens, T., & Chen, Y. (2017). China’s Solution to Global Cyber Governance: Unpacking the Domestic Discourse of “Internet Sovereignty.†Politics & Politiy, 45(3), 432–464. https://doi.org/10.1111/polp.12202
Downloads
Published
How to Cite
Issue
Section
License
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution-ShareAlike 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).