SEKURITISASI ISU ANCAMAN PENYALAHGUNAAN DATA DIGITAL PENGGUNA APLIKASI TIKTOK DI AMERIKA SERIKAT TAHUN 2020-2023

SYAFITRI, NATASYA RIDA and Azhar, Azhar and Aulia, Nurul (2023) SEKURITISASI ISU ANCAMAN PENYALAHGUNAAN DATA DIGITAL PENGGUNA APLIKASI TIKTOK DI AMERIKA SERIKAT TAHUN 2020-2023. Undergraduate thesis, Sriwijaya University.

[thumbnail of RAMA_84201_07041281924044.pdf] Text
RAMA_84201_07041281924044.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (3MB) | Request a copy
[thumbnail of RAMA_84201_07041281924044_TURNITIN.pdf] Text
RAMA_84201_07041281924044_TURNITIN.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (6MB) | Request a copy
[thumbnail of RAMA_84201_07041281924044_0027046505_0022129307_01_front_ref.pdf] Text
RAMA_84201_07041281924044_0027046505_0022129307_01_front_ref.pdf - Accepted Version
Available under License Creative Commons Public Domain Dedication.

Download (666kB)
[thumbnail of RAMA_84201_07041281924044_0027046505_0022129307_02.pdf] Text
RAMA_84201_07041281924044_0027046505_0022129307_02.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (156kB) | Request a copy
[thumbnail of RAMA_84201_07041281924044_0027046505_0022129307_03.pdf] Text
RAMA_84201_07041281924044_0027046505_0022129307_03.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (126kB) | Request a copy
[thumbnail of RAMA_84201_07041281924044_0027046505_0022129307_04.pdf] Text
RAMA_84201_07041281924044_0027046505_0022129307_04.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (243kB) | Request a copy
[thumbnail of RAMA_84201_07041281924044_0027046505_0022129307_05.pdf] Text
RAMA_84201_07041281924044_0027046505_0022129307_05.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (685kB) | Request a copy
[thumbnail of RAMA_84201_07041281924044_0027046505_0022129307_06_ref.pdf] Text
RAMA_84201_07041281924044_0027046505_0022129307_06_ref.pdf - Bibliography
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (124kB) | Request a copy
[thumbnail of RAMA_84201_07041281924044_0027046505_0022129307_07_lamp.pdf] Text
RAMA_84201_07041281924044_0027046505_0022129307_07_lamp.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (2MB) | Request a copy

Abstract

After the cold war ended, there were developments in the form of threats to the national security of a country. Social media is present as an instrument that has the potential to pose threats on the non-traditional security spectrum. As a hegemonic country, the United States is one of the countries with a very high level of social media usage, so this sparks an opening for threats to the national security of the United States through the Information and Communication Technology (ICT) sector. The popularity of the TikTok application created by ByteDance Limited (ByteDance Ltd.), a company from China, in Uncle Sam's country has undoubtedly raised concerns in the United States, especially regarding how digital data belonging to users in the United States is used by this short video sharing application. This research uses qualitative research methods by utilizing secondary data such as books, journals, reports, articles, print media, online news outlet, and official United States Government websites as supporting material in understanding the securitization process regarding the threat of misuse of TikTok application users' digital data by the United States in its country. Through various dimensions and indicators in securitization theory by Barry Buzan, Ole Waever, and Jaap de Wilde, the United States has carried out a securitization process through securitization actors who bring a non-strategic issue into a strategic issue by emphasizing the existence of threats to an entity to produce extraordinary action as evidenced by the birth of regulations that bind TikTok in the United States.

Item Type: Thesis (Undergraduate)
Uncontrolled Keywords: Amerika Serikat, Penyalahgunaan Data Digital, Sekuritisasi, TikTok, Tiongkok
Subjects: E History America > E151 United States (General)
E History America > E183.7-183.9 Diplomatic history. Foreign and general relations.
H Social Sciences > H Social Sciences (General)
J Political Science > JZ International relations
J Political Science > JZ International relations > JZ6360-6377 Non-military coercion
Divisions: 07-Faculty of Social and Politic Science > 84201-International Relations (S1)
Depositing User: Natasya Rida Syafitri
Date Deposited: 05 Dec 2023 06:31
Last Modified: 05 Dec 2023 06:31
URI: http://repository.unsri.ac.id/id/eprint/131784

Actions (login required)

View Item View Item