Digital sovereignty in the Global South: Indonesia’s cyber governance between global power and national autonomy
Main Article Content
Abstract
Indonesia’s national cybersecurity policy is confronting a critical challenge amid an increasingly hegemonic global digital architecture and geopolitical competition. In this context, states are often compelled to adopt international regulatory standards that may undermine national data sovereignty. This article examines how Indonesia can formulate a sovereign cybersecurity policy within an asymmetric global digital governance structure characterized by technological dependency and the dominance of global actors that limit national policy autonomy. Employing a qualitative–interpretive approach with a strategic policy analysis design, the study reveals that global digital governance reproduces structural power asymmetries between advanced economies as technology producers and developing countries as technology consumers and regulatory subjects. These asymmetries facilitate new forms of digital penetration through algorithmic control, infrastructure dependency, and the expanding influence of transnational technology corporations, thereby threatening not only technical security but also data sovereignty and epistemic independence. This article introduces OGDS (One Gate Data System) as an integrated policy framework that synthesizes governance, resilience, ethics, and diplomacy. By reframing digital self-reliance as a political and normative project, OGDS positions Indonesia not merely as a passive adopter of global standards but as a potential architect of a sovereign and ethical digital order grounded in the values of Pancasila.
Downloads
Article Details

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
This open-access article is distributed under a Creative Commons Attribution (CC-BY) 4.0 license.
You are free to: Share — copy and redistribute the material in any medium or format. Adapt — remix, transform, and build upon the material for any purpose, even commercially. The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms: Attribution — You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
No additional restrictions You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
How to Cite
Share
References
Badan Siber dan Sandi Negara (BSSN). (2023). Laporan Tahunan Keamanan Siber Nasional 2022–2023. Jakarta: BSSN.
Bradshaw, S., Millard, C., & Walden, I. (2022). Cross-Border Data Flows: The Regulation of Data Exports from the EU and Beyond. Oxford Internet Institute. https://www.oii.ox.ac.uk/publications/.
Castells, M. (2001). The Internet Galaxy: Reflections on the Internet, Business, and Society. Oxford University Press.
Couldry, N., & Mejias, U. A. (2019). The Costs of Connection: How Data Is Colonizing Human Life and Appropriating It for Capitalism. Stanford University Press.
Deibert, R. (2009). Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace. MIT Press.
DeNardis, L. (2014). The Global War for Internet Governance. Yale University Press.
DeNardis, L. (2020). The Internet in Everything: Freedom and Security in a World with No Off Switch. Yale University Press.
Dolowitz, D. P., & Marsh, D. (2000). Learning from Abroad: The Role of Policy Transfer in Contemporary Policy-Making. Governance, 13(1), 5–23. https://doi.org/10.1111/0952-1895.00121
Fernández Franco, S., Graña, J. M., & Rikap, C. (2024). Dependency in the digital age? The experience of Mercado Libre in Latin America. Development and Change, 55(3), 429–464. https://doi.org/10.1111/dech.12839
Floridi, L. (2013). The Ethics of Information. Oxford University Press.
Kementerian Komunikasi dan Informatika Republik Indonesia. (2021). Evaluasi SPBE dan Rencana Pusat Data Nasional. Jakarta: Kominfo.
Mahoney, J. G. (2022). China’s Rise as an Advanced Technological Society and the Rise of Digital Orientalism. Journal of Chinese Political Science, 27(4), 687–705. https://doi.org/10.1007/s11366-022-09811-6
Microsoft. (2022). Digital Defense Report 2022. https://www.microsoft.com/en- us/security/business/microsoft-digital-defense-report
Morozov, E. (2011). The Net Delusion: The Dark Side of Internet Freedom. PublicAffairs.
Nye, J. S. (2021). Soft Power and Great Power Competition in the Digital Age. Foreign Affairs. https://www.foreignaffairs.com/articles/2021-02-12/soft-power-and-great-power- competition-digital-age
OECD. (2022). Cybersecurity and the Human Factor. OECD Publishing. https://www.oecd.org/digital/ (laporan).
Peraturan Presiden Republik Indonesia Nomor 82 Tahun 2022 tentang Perlindungan Infrastruktur Informasi Vital.
Peraturan Presiden Republik Indonesia Nomor 95 Tahun 2018 tentang Sistem Pemerintahan Berbasis Elektronik (SPBE).
Pohle, J., & Thiel, T. (2020). Digital sovereignty. Internet Policy Review, 9(4). https://doi.org/10.14763/2020.4.1532
Sutrisno, A., & Nugroho, Y. (2020). Kedaulatan data dalam tata kelola ekonomi digital di Indonesia. Jurnal Ilmu Sosial dan Ilmu Politik, 24(1), 1–15. https://doi.org/10.22146/jsp.50760
The Economist. (2017, May 6). The world’s most valuable resource is no longer oil, but data. Retrieved from https://www.economist.com
UNCTAD. (2021). Digital Economy Report 2021: Cross-Border Data Flows and Development. United Nations Conference on Trade and Development. https://unctad.org/system/files/official-document/der2021_en.pdf
Undang-Undang Republik Indonesia Nomor 27 Tahun 2022 tentang Perlindungan Data Pribadi.
Zuboff, S. (2019). The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power. PublicAffairs.