BUKU AJARTATA KELOLA TEKNOLOGI INFORMASI

Penulis

  • Francka Sakti Lee, Johanes Fernandes Andry, Setiawansyah Penulis

Kata Kunci:

BUKU AJAR TATA KELOLA TEKNOLOGI INFORMASI

Abstrak

Buku ini memberikan panduan komprehensif tentang tata kelola teknologi informasi (IT governance) yang sangat penting bagi eksekutif dan manajer di organisasi abad ke-21, baik yang berskala kecil maupun besar. Mengingat konvergensi antara manajemen bisnis dan manajemen IT yang semakin menonjol di era ekonomi informasi, buku ini menjelaskan bagaimana keputusan terkait teknologi informasi harus dibuat dan dipantau. Khususnya, buku ini menekankan pada penanganan risiko keamanan informasi yang menjadi perhatian utama dalam lingkungan bisnis modern. Manajemen risiko menjadi isu yang semakin krusial dalam tata kelola IT, terutama di sektor keuangan dan perbankan yang harus mematuhi berbagai regulasi, seperti pedoman risiko FRC di Inggris, Undang-Undang Sarbanes–Oxley di Amerika Serikat, dan kerangka kerja Basel 2/3 yang dikeluarkan oleh Bank of International Settlements (BIS). Buku ini menjelaskan bagaimana organisasi di berbagai sektor dapat menerapkan tata kelola IT yang efektif untuk mengelola risiko operasional dan proyek IT, serta menjaga keamanan komputer. Hal ini relevan tidak hanya di sektor swasta tetapi juga di sektor publik. Seiring dengan pertumbuhan ekonomi informasi yang pesat, muncul ancaman baru dalam dunia maya yang menantang organisasi di seluruh dunia. Standar manajemen keamanan informasi internasional, seperti ISO/IEC 27001, menjadi kerangka kerja yang penting untuk menjawab tantangan ini. Buku ini menguraikan praktik terbaik terbaru yang dimuat dalam standar ISO/IEC 27000, dan bagaimana kepatuhan terhadap standar tersebut dapat membantu perusahaan menunjukkan respons yang tepat terhadap risiko keamanan informasi di era digital.

Referensi

A.P., G., & Priyadi, Y. (2019). Rekomendasi Pemodelan Sistem Manajemen Keamanan Informasi Menggunakan ISO/IEC 27001:2013 dan DFD pada PT. XYZ. Jurnal Sistem Dan Informatika, 13, 59–71. https://jsi.stikom-bali.ac.id/index.php/jsi/article/view/213

Aditya, A. R. M., Putri, A. W. O. K., Musthofa, D. L., & Widodo, P. (2022). Serangan Hacking Tools sebagai Ancaman Siber dalam Sistem Pertahanan Negara (Studi Kasus: Predator). Global Political Studies Journal, 6(1), 35–46. https://doi.org/10.34010/gpsjournal.v6i1.6698

Ahmad, Z., Shahid Khan, A., Wai Shiang, C., Abdullah, J., & Ahmad, F. (2021). Network intrusion detection system: A systematic study of machine learning and deep learning approaches. Transactions on Emerging Telecommunications Technologies, 32(1), 1–29. https://doi.org/10.1002/ett.4150

Alberto, J., & Karyati, C. M. (2023). Perancangan Sistem Manajemen Keamanan Informasi (SMKI) Berdasarkan ISO 27001:2022 (Studi Kasus Data Center Dinas Komunikasi dan Informatika Kota Tangerang Selatan). Jurnal Ilmiah Komputer & Sistem Informasi, 22(4), 493–503. https://doi.org/10.32409/jikstik.22.4.3447

Alexei, A. (2021). Ensuring Information Security in Public Organizations in the Republic of Moldova Through the ISO 27001 Standard. Journal of Social Sciences, IV(1), 84–94. https://doi.org/10.52326/jss.utm.2021.4(1).11

Alonge, C. Y., Arogundade, O. T., Adesemowo, K., Ibrahalu, F. T., Adeniran, O. J., & Mustapha, A. M. (2020). Information Asset Classification and Labelling Model Using Fuzzy Approach for Effective Security Risk Assessment. 2020 International Conference in Mathematics, Computer Engineering and Computer Science, ICMCECS 2020. https://doi.org/10.1109/ICMCECS47690.2020.240911

Amani, T., Vidiyastutik, E. D., & Hudzafidah, K. (2017). Dampak Teknologi Informasi Terhadap Audit Internal. In Unej E-Proceeding (pp. 58–66). https://doi.org/10.33395/juripol.v3i2.10865

Andini, M. D., Amirullah, M., & Muchtar, H. N. (2020). Penggunaan Aplikasi Virtual Private Network (VPN) Point To Point Tunneling Protocol (PPTP) Dalam Mengakses Situs Terblokir. Supremasi Hukum: Jurnal Penelitian Hukum, 29(2), 148–166. https://doi.org/10.33369/jsh.29.2.148-166

Anggraini, R. I., & Ma’arif, M. S. (2022). Talent Management Challenges in a Pandemic Covid-19: a Literature Review. International Journal of Education, Psychology and Counseling, 7(47), 19–27. https://doi.org/10.35631/ijepc.747003

Anshori, F. A., Suprapto, & Perdanakusuma, A. R. (2019). Perencanaan Keamanan Informasi Berdasarkan Analisis Risiko Teknologi Informasi Menggunakan Metode OCTAVE dan ISO 27001 (Studi Kasus Bidang IT Kepolisian Daerah Banten). Jurnal Pengembangan Teknologi Informasi Dan Ilmu Komputer, 3(2), 1701–1707. https://j-ptiik.ub.ac.id/index.php/j-ptiik/article/view/4551

Anteryd, F. (2015). Information Classification in Swedish Governmental Agencies Analysis of Classification Guidelines. University of Skovde. http://www.diva-portal.se/smash/get/diva2:851843/FULLTEXT01.pdf

Archibong, U., Kline, R., Eshareturi, C., & Mcintosh, B. (2015). Disproportionality in NHS Disciplinary Proceedings. British Journal of Healthcare Management, 25(4), 6. https://www.magonlinelibrary.com/doi/full/10.12968/bjhc.2018.0062

Aurabillah, B., Putri, L. A., Fadhlilla, N. C., & Wulansari, A. (2024). Implementasi Framework Iso 27001 Sebagai Proteksi Keamanan Informasi Dalam Pemerintahan (Systematic Literature Review). JATI (Jurnal Mahasiswa Teknik Informatika), 8(1), 454–460. https://doi.org/10.36040/jati.v8i1.8736

Aurelia, P. N., Dilliana, S. M., Lamawitak, P. L., & Sanga, K. P. (2022). Pengaruh Audit Internal Dan Efektifitas Pengendalian Internal Terhadap Deteksi Fraud Pada Perumda Air Minum Wair Pu’an Kabupaten Sikka. Co-Creation : Jurnal Ilmiah Ekonomi Manajemen Akuntansi Dan Bisnis, 1(3), 119–127. https://doi.org/10.55904/cocreation.v1i3.520

Bahrami, L., Safaie, N., & Hamidi, H. (2021). Effect of Motivation, Opportunity and Ability on Human Resources Information Security Management Considering the Roles of Attitudinal, Behavioral and Organizational Factors. International Journal of Engineering, 34(12), 2624–2635. https://doi.org/10.5829/IJE.2021.34.12C.07

Bast, C., & Yeh, K. H. (2024). Emerging Authentication Technologies for Zero Trust on the Internet of Things. Symmetry, 16(8). https://doi.org/10.3390/sym16080993

Beckers, K. (2015). Pattern and Security Requirements Engineering-Based Establishment of Security Standards (1st ed.). Springer Cham. https://doi.org/10.1007/978-3-319-16664-3

Bergström, E., Karlsson, F., & Åhlfeldt, R. M. (2020). Developing an information classification method. Information and Computer Security, 29(2), 209–239. https://doi.org/10.1108/ICS-07-2020-0110

Budianto, E. W. H. (2023). Pemetaan Penelitian seputar Bank CIMB Niaga Syariah dan Konvensional: Studi Bibliometrik VOSviewer dan Literature Review. BANCO (Jurnal Manajemen Dan PEebankan Syariah), 5(1), 30. https://doi.org/10.35905/banco._v5i1.4987

Calder, A., & Watkins, S. (2015). IT Governance, An International Guide to Data Security and ISO27001/ISO27002. In KoganPage (6th ed.). KoganPage. http://scioteca.caf.com/bitstream/handle/123456789/1091/RED2017-Eng-8ene.pdf?sequence=12&isAllowed=y%0Ahttp://dx.doi.org/10.1016/j.regsciurbeco.2008.06.005%0Ahttps://www.researchgate.net/publication/305320484_SISTEM_PEMBETUNGAN_TERPUSAT_STRATEGI_MELESTARI

Carnahan, S., Agarwal, R., & Campbell, B. (2016). The Effect of Firm Compensation Structures on the Mobility and Entrepreneurship of Extreme Performers. Strategic Management Journal, 37(12), 2521–2542. https://doi.org/10.1002/smj

Carnevale, J. B., & Hatak, I. (2020). Employee adjustment and well-being in the era of COVID-19: Implications for human resource management. Journal of Business Research, 116, 183–187. https://doi.org/10.1016/j.jbusres.2020.05.037

Chanana, N., & Sangeeta. (2021). Employee engagement practices during COVID-19 lockdown. Journal of Public Affairs, 21(4), 1–8. https://doi.org/10.1002/pa.2508

Civicus. (2000). Handling the Media Site map : Toolkit for handling the media. In World Alliance for Citizen Participation. http://www.civicus.org/new/media/Handling the Media.pdf

Collins, P., & Golding, A. (2024). An Implied Term of Procedural Fairness During Disciplinary Processes: Into Contracts of Employment and Beyond? Industrial Law Journal, 53(2), 125–156. https://doi.org/10.1093/indlaw/dwad030

Danuasmo, S., Nazuarsyah, N., & Ginting, R. B. (2023). Rancang Bangun Jaringan Wireless Lan dan Internet Berbasis Cloud pada Universitas Bina Bangsa Getsempena. Cyberspace: Jurnal Pendidikan Teknologi Informasi, 7(1), 15–24. https://doi.org/10.22373/cj.v7i1.16865

Darwis, D., Solehah, N. Y., & Dartnono, D. (2021). Penerapan Framework Cobit 5 Untuk Audit Tata Kelola Keamanan Informasi Pada Kantor Wilayah Kementerian Agama Provinsi Lampung. TELEFORTECH: Journal of Telematics and Information Technology, 1(2), 38–45. https://doi.org/10.33365/tft.v1i2.1005

Dewi, S., Riyadi, F., Suwastitaratu, T., & Hikmah, N. (2020). Keamanan Jaringan Menggunakan VPN (Virtual Private Network) Dengan Metode PPTP (Point To Point Tunneling Protocol) Pada Kantor Desa Kertaraharja Ciamis. EVOLUSI : Jurnal Sains Dan Manajemen, 8(1), 128–13. https://doi.org/10.31294/evolusi.v8i1.7658

Ehrentraut, C., Ekholm, M., Tanushi, H., Tiedemann, J., & Dalianis, H. (2018). Detecting Hospital-Acquired Infections: A Document Classification Approach Using Support Vector Machines And Gradient Tree Boosting. Health Informatics Journal, 24(1), 24–42. https://doi.org/10.1177/1460458216656471

Fachriandi, B., & Dirgahayu, T. (2021). Kepedulian Keamanan Informasi Di Pemerintahan: Praktik Manajemen Dan Dampaknya. Jurnal Manajemen Informatika (JAMIKA), 11(1), 72–87. https://doi.org/10.34010/jamika.v11i1.4584

Fana, M., Pérez, S. T., & Fernández-Macías, E. (2020). Employment impact of Covid-19 crisis: from short term effects to long terms prospects. Journal of Industrial and Business Economics, 47(3), 391–410. https://doi.org/10.1007/s40812-020-00168-5

Fauzan, M. (2010). Penerapan Access Control Sebagai Salah Satu Ladang Minyak Duri. Indonesian Journal of Criminology, 7(1), 151–173. https://www.neliti.com/publications/4187/penerapan-access-control-sebagai-salah-satu-strategi-pencegahan-kejahatan-situas

Fauziah, Y., Computing, C., & On, S. S. (2014). Tinjauan Keamanan Sistem pada Teknologi Cloud Computing. Jurnal Informatika, 8(1), 870–883. https://doi.org/10.26555/jifo.v8i1.a2087

Fisher, E., Thomas, R. S., Higgins, M. K., Williams, C. J., Choi, I., & McCauley, L. A. (2022). Finding the right candidate: Developing hiring guidelines for screening applicants for clinical research coordinator positions. Journal of Clinical and Translational Science, 6(1), 1–7. https://doi.org/10.1017/cts.2021.853

Gazit, N., Ben-Gal, G., & Eliashar, R. (2023). Using Job Analysis for Identifying the Desired Competencies of 21st-Century Surgeons for Improving Trainees Selection. Journal of Surgical Education, 80(1), 81–92. https://doi.org/10.1016/j.jsurg.2022.08.015

Ge, L., Sarhani, M., Voß, S., & Xie, L. (2021). Review of Transit Data Sources Potentials, Challenges and Complementarity. Sustainability (Switzerland), 13(1–37). https://doi.org/10.3390/su132011450

Hapsari, R. D., & Pambayun, K. G. (2023). Ancaman Cybercrimedi Indonesia: Sebuah Tinjauan Pustaka Sistematis. Jurnal Konstituen, 5(1), 1–17. https://doi.org/10.33701/jk.v5i1.3208

Hendriyati, L. (2021). Pengaruh Online Travel Agent terhadap Pemesanan Kamar di Hotel Mutiara Malioboro Yogyakarta. Media Wisata, 17(1). https://doi.org/10.36276/mws.v17i1.145

Hikam, M. L. B., Dewi, F., & Praditya, D. (2024). Analisis Manajemen Risiko Informasi Menggunakan Iso/Iec 27005:2018 (Studi Kasus: Pt.Xyz). JIPI (Jurnal Ilmiah Penelitian Dan Pembelajaran Informatika), 9(2), 728–734. https://doi.org/10.29100/jipi.v9i2.4709

Hoepner, A. G. F., Majoch, A. A. A., & Zhou, X. Y. (2021). Does an Asset Owner’s Institutional Setting Influence Its Decision to Sign the Principles for Responsible Investment? Journal of Business Ethics, 168(2), 389–414. https://doi.org/10.1007/s10551-019-04191-y

Howell, G., Franklin, J. M., Sritapan, V., Scarfone, M., & Carfone, K. (2013). Guidelines for Managing the Security of Mobile Devices in the Enterprise. In NIST Special Publication 800-124, Revision 1. National Institute of Standards and Technology. https://doi.org/10.6028/NIST.SP.800-124r2

Hudianto, S., Stevanus, K., & Lie-Lie, T. (2023). Mengajar Secara Profesional Disertai Otoritas Ilahi Dengan Bercermin Pada Yesus Dan Implementasinya Bagi Guru Pak Masa Kini. BONAFIDE: Jurnal Teologi Dan Pendidikan Kristen, 4(2), 275–294. https://doi.org/10.46558/bonafide.v4i2.139

ISO. (2022). International Standard ISO/IEC 27001:2022 Third Edition. In ISO/IEC. ISO.org. https://www.itref.ir/uploads/editor/2ef522.pdf

Jauhary, H., Pratiwi, G. E., Salim, A. Z., & Fitroh, F. (2022). Penerapan ISO27001 dalam Menjaga dan Meminimalisir Risiko Keamanan Informasi : Literatur Review. Media Jurnal Informatika, 14(1), 43–49. https://doi.org/10.35194/mji.v14i1.1581

Jikrillah, S., Ziyad, M., & Stiadi, D. (2021). Analisis Manajemen Risiko Terhadap Keberlangsungan Usaha Umkm Di Kota Banjarmasin. In Jwm (Jurnal Wawasan Manajemen) (Vol. 9, Issue 2, pp. 134–141). https://doi.org/10.20527/jwm.v9i2.24

Katura, R. (2023). Information Classification in Information Security Management and its Challenges. In Lulea University of Technology. Lulea University of Technology. https://ltu.diva-portal.org/smash/record.jsf?pid=diva2%3A1749497&dswid=4596

Kazemzadeh, R. B. (2022). Investigating the impact of implementation ISO 9000 on Inventory of Supply Chain. 9(1), 189–203. https://doi.org/10.22091/JEMSC.2022.7795.1164

Khraisat, A., & Alazab, A. (2021). A Critical Review Of Intrusion Detection Systems In The Internet Of Things: Techniques, Deployment Strategy, Validation Strategy, Attacks, Public Datasets And Challenges. Cybersecurity, 4(18), 1–27. https://doi.org/10.1186/s42400-021-00077-7

Kitsios, F., Chatzidimitriou, E., & Kamariotou, M. (2022). Developing a Risk Analysis Strategy Framework for Impact Assessment in Information Security Management Systems: A Case Study in IT Consulting Industry. Sustainability (Switzerland), 14(3). https://doi.org/10.3390/su14031269

Kristin, V. E., & Irhandayaningsih, A. (2023). Identifikasi Peran Subject Specialist pada Perpustakaan Perguruan Tinggi: Sebuah Systematic Literature Review. Anuva: Jurnal Kajian Budaya, Perpustakaan, Dan Informasi, 7(2), 313–324. https://doi.org/10.14710/anuva.7.2.313-324

Lee, L., & Sawyer, R. (2019). IT General Controls Testing: Assessing the Effectiveness of User Access Management. AIS Educator Journal, 14(1), 15–34. https://doi.org/10.3194/1935-8156-14.1.15

Lima, R., Silva, M. J. F., Salvado, A. F., & Couto, P. (2021). Construction Information Classification Systems Adapted To Sustainability: International Experience. International Conference Coonstruction Energy Environment & Sustainabiity, 1–8. https://secclass.pt/wp-content/uploads/2022/01/CEES2021-Paper-ID10_VF.pdf

Loginova, M. (2023). Differences in the Procedure for Termination of Employment Relations on Different Grounds. Uzhhorod National University Herald. Series: Law, 79(2), 182–186. https://doi.org/10.24144/2307-3322.2023.79.2.27

Machmudi, M. A. (2019). Peran Teknologi Informasi dalam Usaha Meraih Kesempatan Masa Depan Organisasi. Jurnal TRANSFORMASI, 15(1), 87–95. https://doi.org/10.56357/jt.v15i1.187

Manakhova, I., Levchenko, E., Bekher, V., & Bystrov, A. (2020). Quality of Human Resources and Personnel Security Risk Management in Digital Economy. Quality - Access to Success, 21(175), 74–79. https://openurl.ebsco.com/results?sid=ebsco:ocu:record&bquery=IS+1582-2559+AND+VI+21+AND+IP+175+AND+DT+2020

Mantra, I. (2016). The Modeling of Information Security Classification With Risk Value Assesment Factor to Good Information Governance on The Indonesia Higher Education Sector. Jurnal Teknik Informatika Dan Sistem Informasi, 3(1), 12–22. https://doi.org/10.35957/jatisi.v3i1.60

Maryanto, A. L., Azam, M. N. Al, & Nugroho, A. (2022). Evaluasi Manajemen Keamanan Informasi Pada Perusahaan Pemula Berbasis Teknologi Menggunakan Indeks KAMI. Jurnal Simantec, 11(1), 1–12. https://doi.org/10.21107/simantec.v11i1.14099

Maulani, I. E., Herdianto, T., Syawaludin, D. F., & Laksana, M. O. (2023). Penerapan Teknologi Blockchain Pada Sistem Keamanan Informasi. Jurnal Sosial Teknologi, 3(2), 99–102. https://doi.org/10.59188/jurnalsostech.v3i2.634

Maydianto, & Ridho, M. R. (2018). Rancang Bangun Sistem Informasi Point of Sale dengan Framework CodeIgniter pada CV Powershop. Jurnal Comasie, 4(2), 50–59. https://ejournal.upbatam.ac.id/index.php/comasiejournal/article/view/3173

Miller, A. L. (2022). Fixed Term Contracts: An exploration of employment conditions in Japanese universities. International Journal of Higher Education Pedagogies, 3(3), 48–61. https://doi.org/10.33422/ijhep.v3i3.216

Munoz-Ausecha, C., Gómez, J. E. G., Ruiz-Rosero, J., & Ramirez-Gonzalez, G. (2023). Asset Ownership Transfer and Inventory Using RFID UHF TAGS and Ethereum Blockchain NFTs. Electronics (Switzerland), 12(6), 1–20. https://doi.org/10.3390/electronics12061497

Musyarofah, S. R., & Bisma, R. (2021). Analisis Kesenjangan Sistem Manajemen Keamanan Informasi (SMKI) Sebagai Persiapan Sertifikasi ISO/IEC 27001:2013 pada Institusi Pemerintah. Teknologi: Jurnal Ilmiah Sistem Informasi, 11(1), 1–15. https://doi.org/10.26594/teknologi.v11i1.2152

Muthaiyah, S., & Zaw, T. O. K. (2018). ISO / IEC 27001 Implementation in SMEs : Investigation on Management of Information Assets. Indian Journal of Public Health Research and Development, 9(12), 2631–2637. https://doi.org/10.5958/0976-5506.2018.02112.5

Nallusamy, S. (2021). Performance Measurement on Inventory Management and Logistics Through Various Forecasting Techniques. 17(2), 216–228. https://doi.org/10.23940/ijpe.21.02.p6.

Nurillah, R. A., & Trihandoyo, A. (2024). Analisis Faktor-Faktor Keamanan Informasi Perusahaan Dalam Penerapan Bring Your Own Device (BYOD). IKRA-ITH Informatika : Jurnal Komputer Dan Informatika, 8(2), 136–145. https://doi.org/10.37817/ikraith-informatika.v8i2.2973

Nurjoko, N. (2017). Sistem Informasi Pengolahan Data Barang Untuk Sertifikasi Iso 9001:2008 Pada PT. Tunas Baru Lampung. Tbk. Jurnal Sistem Informasi & Telematika, 8(1), 82–97. https://doi.org/10.36448/jsit.v8i1.870

Nurul, S., Anggrainy, S., & Aprelyani, S. (2022). Faktor-Faktor Yang Mempengaruhi Keamanan Sistem Informasi: Keamanan Informasi, Teknologi Informasi Dan Network (Literature Review Sim). Jurnal Ekonomi Manajemen Sistem Informasi, 3(5), 564–573. https://doi.org/10.31933/jemsi.v3i5.992

Pamungkas, W. C., & Saputra, F. T. (2020). Evaluasi Keamanan Informasi Pada SMA N 1 Sentolo Berdasarkan Indeks Keamanan Informasi (KAMI) ISO/IEC 27001:2013. Jurnal Sistem Komputer Dan Informatika (JSON), 1(2), 101. https://doi.org/10.30865/json.v1i2.1924

Paramita, S., Siregar, S. A., Damanik, R. A., & Dedi Irawan, M. (2022). Analisis Manejemen Resiko Keamanan Data Sistem Informasi Berdasarkan Indeks Keamanan Informasi (KAMI) ISO 27001:2013. Bulletin of Information Technology (BIT), 3(4), 374–379. https://doi.org/10.47065/bit.v3i4.421

Parra, C., González-Prida, V., Candón, E., De la Fuente, A., Martínez-Galán, P., & Crespo, A. (2021). Integration of Asset Management Standard ISO55000 with a Maintenance Management Model. Lecture Notes in Mechanical Engineering, 14, 189–200. https://doi.org/10.1007/978-3-030-64228-0_17

Pranata, E. J., & Nuruzzaman, M. T. (2022). Optimasi Keamanan Informasi Menggunakan Manajemen Indeks Keamanan Informasi KAMI) Studi Kasus: IBISA Purworejo. Cyber Security Dan Forensik Digital, 5(1), 32–45. https://doi.org/10.14421/csecurity.2022.5.1.3482

Putri, H. A., Djibran, N., & Tulloh, R. (2023). Implementation Of Next-Generation Firewalls To Protect Applications From Malware Attacks. Jurnal Indonesia Sosial Teknologi, 4(11), 1961–1970. https://doi.org/10.59141/jist.v4i11.797

Rahmawan, B. A., & Mafruhat, A. Y. (2023). Pengaruh Cryptocurrency terhadap Aktivitas Ekonomi: Sebuah Tinjauan Pustaka Sistematis. Jurnal Riset Ilmu Ekonomi Dan Bisnis (JRIEB), 3(1), 61–68. https://doi.org/10.29313/jrieb.v3i1.1974

Rekawaningtyas, S. J., Fauziyah, F., & Whendasmoro, R. G. (2024). Sistem Informasi Pengelolaan Sertifikasi ISO Pada PT Nqa Indonesia Berbasis Web. Jurnal SITECH : Sistem Informasi Dan Teknologi, 6(2), 141–148. https://doi.org/10.24176/sitech.v6i2.11779

Riana, E., Sulistyawati, M. E. S., & Putra, O. P. (2023). Analisis Tingkat Kematangan (Maturity Level) Dan PDCA (Plan-Do-Check-Act) Dalam Penerapan Audit Sistem Manajemen Keamanan Informasi Pada PT Indonesia Game Menggunakan Metode ISO 27001:2013. Journal of Information System Research (JOSH), 4(2), 632–640. https://doi.org/10.47065/josh.v4i2.2552

Rizqiyah, R. N., Kriyantono, R., & Sujoko, A. (2021). Manajemen Media Relations Dalam Meningkatkan Citra Positif Dan Reputasi Perusahaan Di Era Artificial Intelligence. Metacommunication: Journal of Communication Studies, 6(1), 53–66. https://doi.org/10.20527/mc.v6i1.10135

Setyanto, E., Hidayat, T., & Diyah, I. A. (2024). Manajemen Organisasi (Ruang Karya (ed.); 1st ed.). Ruang Karya. http://repository.stietribhakti.ac.id/957/1/Manajemen Organisasi.pdf

Sihotang, B. K., Sumarno, S., & Damanik, B. E. (2020). Implementasi Access Control List Pada Mikrotik dalam Mengamankan Koneksi Internet Koperasi Sumber Dana Mutiara. JURIKOM (Jurnal Riset Komputer), 7(2), 229–234. https://doi.org/10.30865/jurikom.v7i2.2010

Silva, R. F. Da, AndradeMelani, A. H. D. A. M., Michalski, M. A. D. C., Souza, G. F. M. De, Nabeta, S. I., & Hamaji, F. H. (2020). Defining maintenance performance indicators for asset management based on iso 55000 and balanced scorecard: A hydropower plant case study. 30th European Safety and Reliability Conference, ESREL 2020 and 15th Probabilistic Safety Assessment and Management Conference, PSAM 2020, June, 371–378. https://doi.org/10.3850/978-981-14-8593-0

Silviah, R., Fawzi, R., & Rizky, R. I. (2022). Literature Review Manajemen Informasi: Database, Teknologi Dan Brainware. Jurnal Ilmu Hukum, Humaniora Dan Politik, 2(3), 347–357. https://doi.org/10.38035/jihhp.v2i3.1053

Soyipov, K. (2024). Features of Termination of an Employment Contract at the Initiative of the Employer: Uzbekistan’s Case. International Journal of Law and Policy, 2(2), 1–16. https://doi.org/10.59022/ijlp.153

Sturdy, S., Miller, F., Hogarth, S., Armstrong, N., Chakraborty, P., Cressman, C., Dobrow, M., Flitcroft, K., Grossman, D., Harris, R., Hoebee, B., Holloway, K., Kinsinger, L., Krag, M., Löblová, O., Löwy, I., Mackie, A., Marshall, J., O’Hallahan, J., … Zappa, M. (2020). Half a Century of Wilson & Jungner: Reflections on the Governance of Population Screening. Wellcome Open Research, 5(158), 1–17. https://doi.org/10.12688/wellcomeopenres.16057.2

Sulistyowati, & Handayani, I. D. (2023). Implementation of Building Information Modelling (Bim) for Road Infrastructure in the Design Phase. Teknika, 18(1), 68–76. https://doi.org/10.26623/teknika.v18i1.5601

Suryawijaya, T. W. E. (2023). Memperkuat Keamanan Data melalui Teknologi Blockchain: Mengeksplorasi Implementasi Sukses dalam Transformasi Digital di Indonesia. Jurnal Studi Kebijakan Publik, 2(1), 55–68. https://doi.org/10.21787/jskp.2.2023.55-68

Syani, M., Tresna, R. M., Firdaus, E. A., & Nugraha, F. F. (2022). Penerapan Network Access Control Autentikasi Internal Network Security Protokol 802.1 X. Jurnal Nuansa Informatika, 16(2), 77–86. https://doi.org/10.25134/nuansa.v16i2.5800

Takahindangen, W. C., Rotinsulu, D. C., & Tumilaar, R. L. H. (2021). Analisis Perbedaan Pengeluaran Konsumsi Pengemudi Ojek Online Grab Sebelum dan Sesudah Menjadi Pengemudi Ojek Online di Kota Manado. Jurnal Berkala Ilmiah Efisiensi, 21(01), 37–46. https://ejournal.unsrat.ac.id/index.php/jbie/article/view/34726

Tampi, S. S., Raharjo, S., & Sholeh, M. (2019). Perancangan Jaringan Komputer pada Rumah Sakit Soedarsono Darmosoewito di Batam. Jurnal JARKOM, 7(1), 44–59. https://ejournal.akprind.ac.id/index.php/jarkom/article/view/2272

Wahyudi, E., Luthfi, E. T., & Efendi, M. M. (2019). Wireless Penetration Testing Method To Analyze WPA2-PSK System Security And Captive Portal. Jurnal Explore STMIK Mataram, 9(1), 1–7. https://doi.org/10.35200/explore.v9i1.32

Wijoseno, B. A., & Widhiyaastuti, I. G. A. A. D. (2023). Jerat Pidana Terhadap Pelaku Peretas Sistem Komputer Secara Ilegal (Hacker) Dalam Perpsektif Hukum Pidana Indonesia. Jurnal Kertha Desa, 11(3), 2031–2041. https://ejurnal.stmik-budidarma.ac.id/index.php/jurikom/article/view/2010

Wong, S.-C. (2020). Competency Definitions, Development and Assessment: A Brief Review. International Journal of Academic Research in Progressive Education and Development, 9(3), 95–114. https://doi.org/10.6007/ijarped/v9-i3/8223

Ys, M. A. F., Zen, B. P., & Wasitarini, D. E. (2023). Penerapan Sistem Manajemen Keamanan Informasi ISO 27001 pada Perpusnas RI dalam mendukung Keamanan Tata Kelola Teknologi Informasi. Cyber Security Dan Forensik Digital, 6(2), 76–82. https://doi.org/10.14421/csecurity.2023.6.2.4190

Yunan, A., & Nugraha, E. (2021). Integrasi Manajemen Kualitas ISO di Perusahaan Badan Usaha Milik Negara. Jurnal Value: Jurnal Manajemen Dan Akuntansi, (Online), 18(3), 1. https://www.e-journal.umc.ac.id/index.php/VL/article/view/4947

Zhu, Z., & Xu, X. (2020). User-Centered Information Provision of Cyber-Physical Machine Tools. Procedia CIRP, 93(March), 1546–1551. https://doi.org/10.1016/j.procir.2020.04.091

Diterbitkan

2025-04-30