Login

APLIKASI DOMESTIK SEBAGAI INSTRUMEN KEDAULATAN DIGITAL DAN KEAMANAN NASIONAL: STUDI STRATEGIS ATAS PENDEKATAN TIONGKOK

Vol. 4 No. 01 (2025): JIMR : Journal Of International Multidisciplinary Research:

Andi Anggun Ainul Khaliq Asbullah (1), Imam Fadhil Nugraha (2)

(1) Universitas Hasanuddin, Indonesia
(2) Universitas Hasanuddin, Indonesia
Fulltext View | Download

Abstract:

The development of information and communication technology has encouraged countries to build new defense strategies to deal with non-traditional threats, including threats to digital sovereignty. China is one country that actively develops and utilizes domestic digital apps as a strategic instrument to protect national security and limit foreign influence in cyberspace. This research aims to analyze how China's strategy of using domestic applications functions as a digital defense fortress and an instrument of sovereignty in the face of global cyber geopolitical dynamics. This research uses a qualitative approach with a descriptive narrative method and literature review. The results show that banning foreign platforms, developing domestic applications, and digital payment systems are part of China's overall strategy in controlling domestic data and information flows. The conclusion of this research confirms that China is not only building technological independence, but also creating a closed and controlled cyberspace as an effort to maintain digital sovereignty and prevent external intervention in national stability China's domestic apps.

References

Abdurrohim, M., & Tayibnapis, R. G. (2022). CHINA DIGITAL SILK ROAD AND INDONESIA DIGITAL TRANSFORMATION. MANDALA: Jurnal Ilmu Hubungan Internasional, 212-213.

Amoo, O. O., Atadoga, A., Abrahams, T. O., & et.al. (2024). THE LEGAL LANDSCAPE OF CYBERCRIME: A REVIEW OF CONTEMPORARY ISSUES IN THE CRIMINAL JUSTICE SYSTEM. World Journal of Advanced Research and Reviews, 214.

Cheung, T. M. (2018). THE RISE OF CHINA AS A CYBERSECURITY INDUSTRIAL POWER: BALANCING NATIONAL SECURITY, GEOPOLITICAL, AND DEVELOPMENT PRIORITIES. Journal of Cyber Policy, 5-11.

Creemers, R. (2023). CYBERSECURITY LAW AND REGULATION IN CHINA: SECURING THE SMART STATE. China Law and Society Review, 132.

Creemers, R. (2023). The Chinese Conception of Cybersecurity: A Conceptual, Institutional, and Regulatory Genealogy. Journal of Contemporary China, 175-176.

Cronin, A. K. (2023). HOW PRIVATE TECH COMPANIES ARE RESHAPING GREAT POWER COMPETITION. The Kissinger Center Papers.

Drinhausen, K., & Lee, J. (2021, June 15). THE CCP IN 2021: SMART GOVERNANCE, CYBER SOVEREIGNTY AND TECH SUPREMACY. Retrieved from MERICS (Mercator Institute for China Studies)

Fitzgerald, R., Wu, X., & Sandel, a. T. (2022). CHINESE SOCIAL MEDIA: TECHNOLOGY, CULTURE, AND CREATIVITY. Discourse, Context & Media, 1.

Great Wall China Education Consultant. (2022). THE STORY OF CHINA'S GREAT FIREWALL, THE WORLD'S MOST SOPHISTICATED CENSORSHIP SYSTEM. Retrieved June 9, 2025, from Great Wall China Education Consultant.

Harwit, E. (2014). THE RISE AND INFLUENCE OF WEIBO (MICROBLOGS) IN CHINA. Asian Survey, 1085.

Kaloudis, M. (2024). DIGITAL SOVEREIGNTY AS A WEAPON OF DIPLOMACY IN CYBER WARFARE IN DEMOCRACIES. In National Security in the Digital and Information Age (p. 5). London: IntechOpen.

Melnik, J. (2019). CHINA’S “NATIONAL CHAMPIONS”: ALIBABA, TENCENT, AND HUAWEI. Education About Asia, Association for Asian Studies., 28-33.

Nababan, E. O., Basri, F., Lubis, Z. A., & dkk. (2024). THE GREAT FIREWALL: ANALISIS MENDALAM TENTANG SENSOR DAN PENGAWASAN INTERNET DI CHINA ERA MASA KINI. Journal of Politics and Democracy Studies (JPDS), 139.

Safitr, M. F., Lubis, M., & Fakhrurroja, d. H. (2023). COUNTERATTACKING CYBER THREATS: A FRAMEWORK FOR THE FUTURE OF CYBERSECURITY. Sustainability, 9.

Sharma, A. (2025). CYBER WARS: A PARADIGM SHIFT FROM MEANS TO ENDS. Retrieved from NATO Cooperative Cyber Defence Centre of Excellence : https://ccdcoe.org/uploads/2018/10/00_VirtualBattlefield.pdf