BUKU AJARTATA KELOLA TEKNOLOGI INFORMASI
Kata Kunci:
BUKU AJAR TATA KELOLA TEKNOLOGI INFORMASIAbstrak
Buku ini memberikan panduan komprehensif tentang tata kelola teknologi informasi (IT governance) yang sangat penting bagi eksekutif dan manajer di organisasi abad ke-21, baik yang berskala kecil maupun besar. Mengingat konvergensi antara manajemen bisnis dan manajemen IT yang semakin menonjol di era ekonomi informasi, buku ini menjelaskan bagaimana keputusan terkait teknologi informasi harus dibuat dan dipantau. Khususnya, buku ini menekankan pada penanganan risiko keamanan informasi yang menjadi perhatian utama dalam lingkungan bisnis modern. Manajemen risiko menjadi isu yang semakin krusial dalam tata kelola IT, terutama di sektor keuangan dan perbankan yang harus mematuhi berbagai regulasi, seperti pedoman risiko FRC di Inggris, Undang-Undang Sarbanes–Oxley di Amerika Serikat, dan kerangka kerja Basel 2/3 yang dikeluarkan oleh Bank of International Settlements (BIS). Buku ini menjelaskan bagaimana organisasi di berbagai sektor dapat menerapkan tata kelola IT yang efektif untuk mengelola risiko operasional dan proyek IT, serta menjaga keamanan komputer. Hal ini relevan tidak hanya di sektor swasta tetapi juga di sektor publik. Seiring dengan pertumbuhan ekonomi informasi yang pesat, muncul ancaman baru dalam dunia maya yang menantang organisasi di seluruh dunia. Standar manajemen keamanan informasi internasional, seperti ISO/IEC 27001, menjadi kerangka kerja yang penting untuk menjawab tantangan ini. Buku ini menguraikan praktik terbaik terbaru yang dimuat dalam standar ISO/IEC 27000, dan bagaimana kepatuhan terhadap standar tersebut dapat membantu perusahaan menunjukkan respons yang tepat terhadap risiko keamanan informasi di era digital.
Referensi
A.P., G., & Priyadi, Y. (2019). Rekomendasi Pemodelan Sistem Manajemen Keamanan Informasi Menggunakan ISO/IEC 27001:2013 dan DFD pada PT. XYZ. Jurnal Sistem Dan Informatika, 13, 59–71. https://jsi.stikom-bali.ac.id/index.php/jsi/article/view/213
Aditya, A. R. M., Putri, A. W. O. K., Musthofa, D. L., & Widodo, P. (2022). Serangan Hacking Tools sebagai Ancaman Siber dalam Sistem Pertahanan Negara (Studi Kasus: Predator). Global Political Studies Journal, 6(1), 35–46. https://doi.org/10.34010/gpsjournal.v6i1.6698
Ahmad, Z., Shahid Khan, A., Wai Shiang, C., Abdullah, J., & Ahmad, F. (2021). Network intrusion detection system: A systematic study of machine learning and deep learning approaches. Transactions on Emerging Telecommunications Technologies, 32(1), 1–29. https://doi.org/10.1002/ett.4150
Alberto, J., & Karyati, C. M. (2023). Perancangan Sistem Manajemen Keamanan Informasi (SMKI) Berdasarkan ISO 27001:2022 (Studi Kasus Data Center Dinas Komunikasi dan Informatika Kota Tangerang Selatan). Jurnal Ilmiah Komputer & Sistem Informasi, 22(4), 493–503. https://doi.org/10.32409/jikstik.22.4.3447
Alexei, A. (2021). Ensuring Information Security in Public Organizations in the Republic of Moldova Through the ISO 27001 Standard. Journal of Social Sciences, IV(1), 84–94. https://doi.org/10.52326/jss.utm.2021.4(1).11
Alonge, C. Y., Arogundade, O. T., Adesemowo, K., Ibrahalu, F. T., Adeniran, O. J., & Mustapha, A. M. (2020). Information Asset Classification and Labelling Model Using Fuzzy Approach for Effective Security Risk Assessment. 2020 International Conference in Mathematics, Computer Engineering and Computer Science, ICMCECS 2020. https://doi.org/10.1109/ICMCECS47690.2020.240911
Amani, T., Vidiyastutik, E. D., & Hudzafidah, K. (2017). Dampak Teknologi Informasi Terhadap Audit Internal. In Unej E-Proceeding (pp. 58–66). https://doi.org/10.33395/juripol.v3i2.10865
Andini, M. D., Amirullah, M., & Muchtar, H. N. (2020). Penggunaan Aplikasi Virtual Private Network (VPN) Point To Point Tunneling Protocol (PPTP) Dalam Mengakses Situs Terblokir. Supremasi Hukum: Jurnal Penelitian Hukum, 29(2), 148–166. https://doi.org/10.33369/jsh.29.2.148-166
Anggraini, R. I., & Ma’arif, M. S. (2022). Talent Management Challenges in a Pandemic Covid-19: a Literature Review. International Journal of Education, Psychology and Counseling, 7(47), 19–27. https://doi.org/10.35631/ijepc.747003
Anshori, F. A., Suprapto, & Perdanakusuma, A. R. (2019). Perencanaan Keamanan Informasi Berdasarkan Analisis Risiko Teknologi Informasi Menggunakan Metode OCTAVE dan ISO 27001 (Studi Kasus Bidang IT Kepolisian Daerah Banten). Jurnal Pengembangan Teknologi Informasi Dan Ilmu Komputer, 3(2), 1701–1707. https://j-ptiik.ub.ac.id/index.php/j-ptiik/article/view/4551
Anteryd, F. (2015). Information Classification in Swedish Governmental Agencies Analysis of Classification Guidelines. University of Skovde. http://www.diva-portal.se/smash/get/diva2:851843/FULLTEXT01.pdf
Archibong, U., Kline, R., Eshareturi, C., & Mcintosh, B. (2015). Disproportionality in NHS Disciplinary Proceedings. British Journal of Healthcare Management, 25(4), 6. https://www.magonlinelibrary.com/doi/full/10.12968/bjhc.2018.0062
Aurabillah, B., Putri, L. A., Fadhlilla, N. C., & Wulansari, A. (2024). Implementasi Framework Iso 27001 Sebagai Proteksi Keamanan Informasi Dalam Pemerintahan (Systematic Literature Review). JATI (Jurnal Mahasiswa Teknik Informatika), 8(1), 454–460. https://doi.org/10.36040/jati.v8i1.8736
Aurelia, P. N., Dilliana, S. M., Lamawitak, P. L., & Sanga, K. P. (2022). Pengaruh Audit Internal Dan Efektifitas Pengendalian Internal Terhadap Deteksi Fraud Pada Perumda Air Minum Wair Pu’an Kabupaten Sikka. Co-Creation : Jurnal Ilmiah Ekonomi Manajemen Akuntansi Dan Bisnis, 1(3), 119–127. https://doi.org/10.55904/cocreation.v1i3.520
Bahrami, L., Safaie, N., & Hamidi, H. (2021). Effect of Motivation, Opportunity and Ability on Human Resources Information Security Management Considering the Roles of Attitudinal, Behavioral and Organizational Factors. International Journal of Engineering, 34(12), 2624–2635. https://doi.org/10.5829/IJE.2021.34.12C.07
Bast, C., & Yeh, K. H. (2024). Emerging Authentication Technologies for Zero Trust on the Internet of Things. Symmetry, 16(8). https://doi.org/10.3390/sym16080993
Beckers, K. (2015). Pattern and Security Requirements Engineering-Based Establishment of Security Standards (1st ed.). Springer Cham. https://doi.org/10.1007/978-3-319-16664-3
Bergström, E., Karlsson, F., & Åhlfeldt, R. M. (2020). Developing an information classification method. Information and Computer Security, 29(2), 209–239. https://doi.org/10.1108/ICS-07-2020-0110
Budianto, E. W. H. (2023). Pemetaan Penelitian seputar Bank CIMB Niaga Syariah dan Konvensional: Studi Bibliometrik VOSviewer dan Literature Review. BANCO (Jurnal Manajemen Dan PEebankan Syariah), 5(1), 30. https://doi.org/10.35905/banco._v5i1.4987
Calder, A., & Watkins, S. (2015). IT Governance, An International Guide to Data Security and ISO27001/ISO27002. In KoganPage (6th ed.). KoganPage. http://scioteca.caf.com/bitstream/handle/123456789/1091/RED2017-Eng-8ene.pdf?sequence=12&isAllowed=y%0Ahttp://dx.doi.org/10.1016/j.regsciurbeco.2008.06.005%0Ahttps://www.researchgate.net/publication/305320484_SISTEM_PEMBETUNGAN_TERPUSAT_STRATEGI_MELESTARI
Carnahan, S., Agarwal, R., & Campbell, B. (2016). The Effect of Firm Compensation Structures on the Mobility and Entrepreneurship of Extreme Performers. Strategic Management Journal, 37(12), 2521–2542. https://doi.org/10.1002/smj
Carnevale, J. B., & Hatak, I. (2020). Employee adjustment and well-being in the era of COVID-19: Implications for human resource management. Journal of Business Research, 116, 183–187. https://doi.org/10.1016/j.jbusres.2020.05.037
Chanana, N., & Sangeeta. (2021). Employee engagement practices during COVID-19 lockdown. Journal of Public Affairs, 21(4), 1–8. https://doi.org/10.1002/pa.2508
Civicus. (2000). Handling the Media Site map : Toolkit for handling the media. In World Alliance for Citizen Participation. http://www.civicus.org/new/media/Handling the Media.pdf
Collins, P., & Golding, A. (2024). An Implied Term of Procedural Fairness During Disciplinary Processes: Into Contracts of Employment and Beyond? Industrial Law Journal, 53(2), 125–156. https://doi.org/10.1093/indlaw/dwad030
Danuasmo, S., Nazuarsyah, N., & Ginting, R. B. (2023). Rancang Bangun Jaringan Wireless Lan dan Internet Berbasis Cloud pada Universitas Bina Bangsa Getsempena. Cyberspace: Jurnal Pendidikan Teknologi Informasi, 7(1), 15–24. https://doi.org/10.22373/cj.v7i1.16865
Darwis, D., Solehah, N. Y., & Dartnono, D. (2021). Penerapan Framework Cobit 5 Untuk Audit Tata Kelola Keamanan Informasi Pada Kantor Wilayah Kementerian Agama Provinsi Lampung. TELEFORTECH: Journal of Telematics and Information Technology, 1(2), 38–45. https://doi.org/10.33365/tft.v1i2.1005
Dewi, S., Riyadi, F., Suwastitaratu, T., & Hikmah, N. (2020). Keamanan Jaringan Menggunakan VPN (Virtual Private Network) Dengan Metode PPTP (Point To Point Tunneling Protocol) Pada Kantor Desa Kertaraharja Ciamis. EVOLUSI : Jurnal Sains Dan Manajemen, 8(1), 128–13. https://doi.org/10.31294/evolusi.v8i1.7658
Ehrentraut, C., Ekholm, M., Tanushi, H., Tiedemann, J., & Dalianis, H. (2018). Detecting Hospital-Acquired Infections: A Document Classification Approach Using Support Vector Machines And Gradient Tree Boosting. Health Informatics Journal, 24(1), 24–42. https://doi.org/10.1177/1460458216656471
Fachriandi, B., & Dirgahayu, T. (2021). Kepedulian Keamanan Informasi Di Pemerintahan: Praktik Manajemen Dan Dampaknya. Jurnal Manajemen Informatika (JAMIKA), 11(1), 72–87. https://doi.org/10.34010/jamika.v11i1.4584
Fana, M., Pérez, S. T., & Fernández-Macías, E. (2020). Employment impact of Covid-19 crisis: from short term effects to long terms prospects. Journal of Industrial and Business Economics, 47(3), 391–410. https://doi.org/10.1007/s40812-020-00168-5
Fauzan, M. (2010). Penerapan Access Control Sebagai Salah Satu Ladang Minyak Duri. Indonesian Journal of Criminology, 7(1), 151–173. https://www.neliti.com/publications/4187/penerapan-access-control-sebagai-salah-satu-strategi-pencegahan-kejahatan-situas
Fauziah, Y., Computing, C., & On, S. S. (2014). Tinjauan Keamanan Sistem pada Teknologi Cloud Computing. Jurnal Informatika, 8(1), 870–883. https://doi.org/10.26555/jifo.v8i1.a2087
Fisher, E., Thomas, R. S., Higgins, M. K., Williams, C. J., Choi, I., & McCauley, L. A. (2022). Finding the right candidate: Developing hiring guidelines for screening applicants for clinical research coordinator positions. Journal of Clinical and Translational Science, 6(1), 1–7. https://doi.org/10.1017/cts.2021.853
Gazit, N., Ben-Gal, G., & Eliashar, R. (2023). Using Job Analysis for Identifying the Desired Competencies of 21st-Century Surgeons for Improving Trainees Selection. Journal of Surgical Education, 80(1), 81–92. https://doi.org/10.1016/j.jsurg.2022.08.015
Ge, L., Sarhani, M., Voß, S., & Xie, L. (2021). Review of Transit Data Sources Potentials, Challenges and Complementarity. Sustainability (Switzerland), 13(1–37). https://doi.org/10.3390/su132011450
Hapsari, R. D., & Pambayun, K. G. (2023). Ancaman Cybercrimedi Indonesia: Sebuah Tinjauan Pustaka Sistematis. Jurnal Konstituen, 5(1), 1–17. https://doi.org/10.33701/jk.v5i1.3208
Hendriyati, L. (2021). Pengaruh Online Travel Agent terhadap Pemesanan Kamar di Hotel Mutiara Malioboro Yogyakarta. Media Wisata, 17(1). https://doi.org/10.36276/mws.v17i1.145
Hikam, M. L. B., Dewi, F., & Praditya, D. (2024). Analisis Manajemen Risiko Informasi Menggunakan Iso/Iec 27005:2018 (Studi Kasus: Pt.Xyz). JIPI (Jurnal Ilmiah Penelitian Dan Pembelajaran Informatika), 9(2), 728–734. https://doi.org/10.29100/jipi.v9i2.4709
Hoepner, A. G. F., Majoch, A. A. A., & Zhou, X. Y. (2021). Does an Asset Owner’s Institutional Setting Influence Its Decision to Sign the Principles for Responsible Investment? Journal of Business Ethics, 168(2), 389–414. https://doi.org/10.1007/s10551-019-04191-y
Howell, G., Franklin, J. M., Sritapan, V., Scarfone, M., & Carfone, K. (2013). Guidelines for Managing the Security of Mobile Devices in the Enterprise. In NIST Special Publication 800-124, Revision 1. National Institute of Standards and Technology. https://doi.org/10.6028/NIST.SP.800-124r2
Hudianto, S., Stevanus, K., & Lie-Lie, T. (2023). Mengajar Secara Profesional Disertai Otoritas Ilahi Dengan Bercermin Pada Yesus Dan Implementasinya Bagi Guru Pak Masa Kini. BONAFIDE: Jurnal Teologi Dan Pendidikan Kristen, 4(2), 275–294. https://doi.org/10.46558/bonafide.v4i2.139
ISO. (2022). International Standard ISO/IEC 27001:2022 Third Edition. In ISO/IEC. ISO.org. https://www.itref.ir/uploads/editor/2ef522.pdf
Jauhary, H., Pratiwi, G. E., Salim, A. Z., & Fitroh, F. (2022). Penerapan ISO27001 dalam Menjaga dan Meminimalisir Risiko Keamanan Informasi : Literatur Review. Media Jurnal Informatika, 14(1), 43–49. https://doi.org/10.35194/mji.v14i1.1581
Jikrillah, S., Ziyad, M., & Stiadi, D. (2021). Analisis Manajemen Risiko Terhadap Keberlangsungan Usaha Umkm Di Kota Banjarmasin. In Jwm (Jurnal Wawasan Manajemen) (Vol. 9, Issue 2, pp. 134–141). https://doi.org/10.20527/jwm.v9i2.24
Katura, R. (2023). Information Classification in Information Security Management and its Challenges. In Lulea University of Technology. Lulea University of Technology. https://ltu.diva-portal.org/smash/record.jsf?pid=diva2%3A1749497&dswid=4596
Kazemzadeh, R. B. (2022). Investigating the impact of implementation ISO 9000 on Inventory of Supply Chain. 9(1), 189–203. https://doi.org/10.22091/JEMSC.2022.7795.1164
Khraisat, A., & Alazab, A. (2021). A Critical Review Of Intrusion Detection Systems In The Internet Of Things: Techniques, Deployment Strategy, Validation Strategy, Attacks, Public Datasets And Challenges. Cybersecurity, 4(18), 1–27. https://doi.org/10.1186/s42400-021-00077-7
Kitsios, F., Chatzidimitriou, E., & Kamariotou, M. (2022). Developing a Risk Analysis Strategy Framework for Impact Assessment in Information Security Management Systems: A Case Study in IT Consulting Industry. Sustainability (Switzerland), 14(3). https://doi.org/10.3390/su14031269
Kristin, V. E., & Irhandayaningsih, A. (2023). Identifikasi Peran Subject Specialist pada Perpustakaan Perguruan Tinggi: Sebuah Systematic Literature Review. Anuva: Jurnal Kajian Budaya, Perpustakaan, Dan Informasi, 7(2), 313–324. https://doi.org/10.14710/anuva.7.2.313-324
Lee, L., & Sawyer, R. (2019). IT General Controls Testing: Assessing the Effectiveness of User Access Management. AIS Educator Journal, 14(1), 15–34. https://doi.org/10.3194/1935-8156-14.1.15
Lima, R., Silva, M. J. F., Salvado, A. F., & Couto, P. (2021). Construction Information Classification Systems Adapted To Sustainability: International Experience. International Conference Coonstruction Energy Environment & Sustainabiity, 1–8. https://secclass.pt/wp-content/uploads/2022/01/CEES2021-Paper-ID10_VF.pdf
Loginova, M. (2023). Differences in the Procedure for Termination of Employment Relations on Different Grounds. Uzhhorod National University Herald. Series: Law, 79(2), 182–186. https://doi.org/10.24144/2307-3322.2023.79.2.27
Machmudi, M. A. (2019). Peran Teknologi Informasi dalam Usaha Meraih Kesempatan Masa Depan Organisasi. Jurnal TRANSFORMASI, 15(1), 87–95. https://doi.org/10.56357/jt.v15i1.187
Manakhova, I., Levchenko, E., Bekher, V., & Bystrov, A. (2020). Quality of Human Resources and Personnel Security Risk Management in Digital Economy. Quality - Access to Success, 21(175), 74–79. https://openurl.ebsco.com/results?sid=ebsco:ocu:record&bquery=IS+1582-2559+AND+VI+21+AND+IP+175+AND+DT+2020
Mantra, I. (2016). The Modeling of Information Security Classification With Risk Value Assesment Factor to Good Information Governance on The Indonesia Higher Education Sector. Jurnal Teknik Informatika Dan Sistem Informasi, 3(1), 12–22. https://doi.org/10.35957/jatisi.v3i1.60
Maryanto, A. L., Azam, M. N. Al, & Nugroho, A. (2022). Evaluasi Manajemen Keamanan Informasi Pada Perusahaan Pemula Berbasis Teknologi Menggunakan Indeks KAMI. Jurnal Simantec, 11(1), 1–12. https://doi.org/10.21107/simantec.v11i1.14099
Maulani, I. E., Herdianto, T., Syawaludin, D. F., & Laksana, M. O. (2023). Penerapan Teknologi Blockchain Pada Sistem Keamanan Informasi. Jurnal Sosial Teknologi, 3(2), 99–102. https://doi.org/10.59188/jurnalsostech.v3i2.634
Maydianto, & Ridho, M. R. (2018). Rancang Bangun Sistem Informasi Point of Sale dengan Framework CodeIgniter pada CV Powershop. Jurnal Comasie, 4(2), 50–59. https://ejournal.upbatam.ac.id/index.php/comasiejournal/article/view/3173
Miller, A. L. (2022). Fixed Term Contracts: An exploration of employment conditions in Japanese universities. International Journal of Higher Education Pedagogies, 3(3), 48–61. https://doi.org/10.33422/ijhep.v3i3.216
Munoz-Ausecha, C., Gómez, J. E. G., Ruiz-Rosero, J., & Ramirez-Gonzalez, G. (2023). Asset Ownership Transfer and Inventory Using RFID UHF TAGS and Ethereum Blockchain NFTs. Electronics (Switzerland), 12(6), 1–20. https://doi.org/10.3390/electronics12061497
Musyarofah, S. R., & Bisma, R. (2021). Analisis Kesenjangan Sistem Manajemen Keamanan Informasi (SMKI) Sebagai Persiapan Sertifikasi ISO/IEC 27001:2013 pada Institusi Pemerintah. Teknologi: Jurnal Ilmiah Sistem Informasi, 11(1), 1–15. https://doi.org/10.26594/teknologi.v11i1.2152
Muthaiyah, S., & Zaw, T. O. K. (2018). ISO / IEC 27001 Implementation in SMEs : Investigation on Management of Information Assets. Indian Journal of Public Health Research and Development, 9(12), 2631–2637. https://doi.org/10.5958/0976-5506.2018.02112.5
Nallusamy, S. (2021). Performance Measurement on Inventory Management and Logistics Through Various Forecasting Techniques. 17(2), 216–228. https://doi.org/10.23940/ijpe.21.02.p6.
Nurillah, R. A., & Trihandoyo, A. (2024). Analisis Faktor-Faktor Keamanan Informasi Perusahaan Dalam Penerapan Bring Your Own Device (BYOD). IKRA-ITH Informatika : Jurnal Komputer Dan Informatika, 8(2), 136–145. https://doi.org/10.37817/ikraith-informatika.v8i2.2973
Nurjoko, N. (2017). Sistem Informasi Pengolahan Data Barang Untuk Sertifikasi Iso 9001:2008 Pada PT. Tunas Baru Lampung. Tbk. Jurnal Sistem Informasi & Telematika, 8(1), 82–97. https://doi.org/10.36448/jsit.v8i1.870
Nurul, S., Anggrainy, S., & Aprelyani, S. (2022). Faktor-Faktor Yang Mempengaruhi Keamanan Sistem Informasi: Keamanan Informasi, Teknologi Informasi Dan Network (Literature Review Sim). Jurnal Ekonomi Manajemen Sistem Informasi, 3(5), 564–573. https://doi.org/10.31933/jemsi.v3i5.992
Pamungkas, W. C., & Saputra, F. T. (2020). Evaluasi Keamanan Informasi Pada SMA N 1 Sentolo Berdasarkan Indeks Keamanan Informasi (KAMI) ISO/IEC 27001:2013. Jurnal Sistem Komputer Dan Informatika (JSON), 1(2), 101. https://doi.org/10.30865/json.v1i2.1924
Paramita, S., Siregar, S. A., Damanik, R. A., & Dedi Irawan, M. (2022). Analisis Manejemen Resiko Keamanan Data Sistem Informasi Berdasarkan Indeks Keamanan Informasi (KAMI) ISO 27001:2013. Bulletin of Information Technology (BIT), 3(4), 374–379. https://doi.org/10.47065/bit.v3i4.421
Parra, C., González-Prida, V., Candón, E., De la Fuente, A., Martínez-Galán, P., & Crespo, A. (2021). Integration of Asset Management Standard ISO55000 with a Maintenance Management Model. Lecture Notes in Mechanical Engineering, 14, 189–200. https://doi.org/10.1007/978-3-030-64228-0_17
Pranata, E. J., & Nuruzzaman, M. T. (2022). Optimasi Keamanan Informasi Menggunakan Manajemen Indeks Keamanan Informasi KAMI) Studi Kasus: IBISA Purworejo. Cyber Security Dan Forensik Digital, 5(1), 32–45. https://doi.org/10.14421/csecurity.2022.5.1.3482
Putri, H. A., Djibran, N., & Tulloh, R. (2023). Implementation Of Next-Generation Firewalls To Protect Applications From Malware Attacks. Jurnal Indonesia Sosial Teknologi, 4(11), 1961–1970. https://doi.org/10.59141/jist.v4i11.797
Rahmawan, B. A., & Mafruhat, A. Y. (2023). Pengaruh Cryptocurrency terhadap Aktivitas Ekonomi: Sebuah Tinjauan Pustaka Sistematis. Jurnal Riset Ilmu Ekonomi Dan Bisnis (JRIEB), 3(1), 61–68. https://doi.org/10.29313/jrieb.v3i1.1974
Rekawaningtyas, S. J., Fauziyah, F., & Whendasmoro, R. G. (2024). Sistem Informasi Pengelolaan Sertifikasi ISO Pada PT Nqa Indonesia Berbasis Web. Jurnal SITECH : Sistem Informasi Dan Teknologi, 6(2), 141–148. https://doi.org/10.24176/sitech.v6i2.11779
Riana, E., Sulistyawati, M. E. S., & Putra, O. P. (2023). Analisis Tingkat Kematangan (Maturity Level) Dan PDCA (Plan-Do-Check-Act) Dalam Penerapan Audit Sistem Manajemen Keamanan Informasi Pada PT Indonesia Game Menggunakan Metode ISO 27001:2013. Journal of Information System Research (JOSH), 4(2), 632–640. https://doi.org/10.47065/josh.v4i2.2552
Rizqiyah, R. N., Kriyantono, R., & Sujoko, A. (2021). Manajemen Media Relations Dalam Meningkatkan Citra Positif Dan Reputasi Perusahaan Di Era Artificial Intelligence. Metacommunication: Journal of Communication Studies, 6(1), 53–66. https://doi.org/10.20527/mc.v6i1.10135
Setyanto, E., Hidayat, T., & Diyah, I. A. (2024). Manajemen Organisasi (Ruang Karya (ed.); 1st ed.). Ruang Karya. http://repository.stietribhakti.ac.id/957/1/Manajemen Organisasi.pdf
Sihotang, B. K., Sumarno, S., & Damanik, B. E. (2020). Implementasi Access Control List Pada Mikrotik dalam Mengamankan Koneksi Internet Koperasi Sumber Dana Mutiara. JURIKOM (Jurnal Riset Komputer), 7(2), 229–234. https://doi.org/10.30865/jurikom.v7i2.2010
Silva, R. F. Da, AndradeMelani, A. H. D. A. M., Michalski, M. A. D. C., Souza, G. F. M. De, Nabeta, S. I., & Hamaji, F. H. (2020). Defining maintenance performance indicators for asset management based on iso 55000 and balanced scorecard: A hydropower plant case study. 30th European Safety and Reliability Conference, ESREL 2020 and 15th Probabilistic Safety Assessment and Management Conference, PSAM 2020, June, 371–378. https://doi.org/10.3850/978-981-14-8593-0
Silviah, R., Fawzi, R., & Rizky, R. I. (2022). Literature Review Manajemen Informasi: Database, Teknologi Dan Brainware. Jurnal Ilmu Hukum, Humaniora Dan Politik, 2(3), 347–357. https://doi.org/10.38035/jihhp.v2i3.1053
Soyipov, K. (2024). Features of Termination of an Employment Contract at the Initiative of the Employer: Uzbekistan’s Case. International Journal of Law and Policy, 2(2), 1–16. https://doi.org/10.59022/ijlp.153
Sturdy, S., Miller, F., Hogarth, S., Armstrong, N., Chakraborty, P., Cressman, C., Dobrow, M., Flitcroft, K., Grossman, D., Harris, R., Hoebee, B., Holloway, K., Kinsinger, L., Krag, M., Löblová, O., Löwy, I., Mackie, A., Marshall, J., O’Hallahan, J., … Zappa, M. (2020). Half a Century of Wilson & Jungner: Reflections on the Governance of Population Screening. Wellcome Open Research, 5(158), 1–17. https://doi.org/10.12688/wellcomeopenres.16057.2
Sulistyowati, & Handayani, I. D. (2023). Implementation of Building Information Modelling (Bim) for Road Infrastructure in the Design Phase. Teknika, 18(1), 68–76. https://doi.org/10.26623/teknika.v18i1.5601
Suryawijaya, T. W. E. (2023). Memperkuat Keamanan Data melalui Teknologi Blockchain: Mengeksplorasi Implementasi Sukses dalam Transformasi Digital di Indonesia. Jurnal Studi Kebijakan Publik, 2(1), 55–68. https://doi.org/10.21787/jskp.2.2023.55-68
Syani, M., Tresna, R. M., Firdaus, E. A., & Nugraha, F. F. (2022). Penerapan Network Access Control Autentikasi Internal Network Security Protokol 802.1 X. Jurnal Nuansa Informatika, 16(2), 77–86. https://doi.org/10.25134/nuansa.v16i2.5800
Takahindangen, W. C., Rotinsulu, D. C., & Tumilaar, R. L. H. (2021). Analisis Perbedaan Pengeluaran Konsumsi Pengemudi Ojek Online Grab Sebelum dan Sesudah Menjadi Pengemudi Ojek Online di Kota Manado. Jurnal Berkala Ilmiah Efisiensi, 21(01), 37–46. https://ejournal.unsrat.ac.id/index.php/jbie/article/view/34726
Tampi, S. S., Raharjo, S., & Sholeh, M. (2019). Perancangan Jaringan Komputer pada Rumah Sakit Soedarsono Darmosoewito di Batam. Jurnal JARKOM, 7(1), 44–59. https://ejournal.akprind.ac.id/index.php/jarkom/article/view/2272
Wahyudi, E., Luthfi, E. T., & Efendi, M. M. (2019). Wireless Penetration Testing Method To Analyze WPA2-PSK System Security And Captive Portal. Jurnal Explore STMIK Mataram, 9(1), 1–7. https://doi.org/10.35200/explore.v9i1.32
Wijoseno, B. A., & Widhiyaastuti, I. G. A. A. D. (2023). Jerat Pidana Terhadap Pelaku Peretas Sistem Komputer Secara Ilegal (Hacker) Dalam Perpsektif Hukum Pidana Indonesia. Jurnal Kertha Desa, 11(3), 2031–2041. https://ejurnal.stmik-budidarma.ac.id/index.php/jurikom/article/view/2010
Wong, S.-C. (2020). Competency Definitions, Development and Assessment: A Brief Review. International Journal of Academic Research in Progressive Education and Development, 9(3), 95–114. https://doi.org/10.6007/ijarped/v9-i3/8223
Ys, M. A. F., Zen, B. P., & Wasitarini, D. E. (2023). Penerapan Sistem Manajemen Keamanan Informasi ISO 27001 pada Perpusnas RI dalam mendukung Keamanan Tata Kelola Teknologi Informasi. Cyber Security Dan Forensik Digital, 6(2), 76–82. https://doi.org/10.14421/csecurity.2023.6.2.4190
Yunan, A., & Nugraha, E. (2021). Integrasi Manajemen Kualitas ISO di Perusahaan Badan Usaha Milik Negara. Jurnal Value: Jurnal Manajemen Dan Akuntansi, (Online), 18(3), 1. https://www.e-journal.umc.ac.id/index.php/VL/article/view/4947
Zhu, Z., & Xu, X. (2020). User-Centered Information Provision of Cyber-Physical Machine Tools. Procedia CIRP, 93(March), 1546–1551. https://doi.org/10.1016/j.procir.2020.04.091