{"title":"印尼电子政务系统安全成熟度模型的实施策略","authors":"Tashia Indah Nastiti","doi":"10.22441/incomtech.v12i3.15214","DOIUrl":null,"url":null,"abstract":"The security maturity level of Indonesia's e-Government system needs to be evaluated to determine the current status of security implementations and to plan for overall system security improvements. In general, the maturity model describes how a system consisting of humans and devices performs their duties. These capabilities include effective leadership and governance, level of awareness of implementers, and capabilities of existing tools. This study aims to create a strategy in implementing the security maturity model in the e-Government system in Indonesia. The research method uses a mix method, namely qualitative and quantitative methods. The qualitative method aims to obtain the Critical Success Factors Implementation of the security maturity model, and the quantitative method is used to analyze the results of the Critical success factor validation using SPSS. The strategy for the Security maturity model is based on the PDCA (Plan-Do-Check-Act) Model.","PeriodicalId":123793,"journal":{"name":"InComTech : Jurnal Telekomunikasi dan Komputer","volume":"4 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Strategy for Implementation of the Security Maturity Model in e-Government Systems in Indonesia\",\"authors\":\"Tashia Indah Nastiti\",\"doi\":\"10.22441/incomtech.v12i3.15214\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The security maturity level of Indonesia's e-Government system needs to be evaluated to determine the current status of security implementations and to plan for overall system security improvements. In general, the maturity model describes how a system consisting of humans and devices performs their duties. These capabilities include effective leadership and governance, level of awareness of implementers, and capabilities of existing tools. This study aims to create a strategy in implementing the security maturity model in the e-Government system in Indonesia. The research method uses a mix method, namely qualitative and quantitative methods. The qualitative method aims to obtain the Critical Success Factors Implementation of the security maturity model, and the quantitative method is used to analyze the results of the Critical success factor validation using SPSS. The strategy for the Security maturity model is based on the PDCA (Plan-Do-Check-Act) Model.\",\"PeriodicalId\":123793,\"journal\":{\"name\":\"InComTech : Jurnal Telekomunikasi dan Komputer\",\"volume\":\"4 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-12-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"InComTech : Jurnal Telekomunikasi dan Komputer\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.22441/incomtech.v12i3.15214\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"InComTech : Jurnal Telekomunikasi dan Komputer","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.22441/incomtech.v12i3.15214","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Strategy for Implementation of the Security Maturity Model in e-Government Systems in Indonesia
The security maturity level of Indonesia's e-Government system needs to be evaluated to determine the current status of security implementations and to plan for overall system security improvements. In general, the maturity model describes how a system consisting of humans and devices performs their duties. These capabilities include effective leadership and governance, level of awareness of implementers, and capabilities of existing tools. This study aims to create a strategy in implementing the security maturity model in the e-Government system in Indonesia. The research method uses a mix method, namely qualitative and quantitative methods. The qualitative method aims to obtain the Critical Success Factors Implementation of the security maturity model, and the quantitative method is used to analyze the results of the Critical success factor validation using SPSS. The strategy for the Security maturity model is based on the PDCA (Plan-Do-Check-Act) Model.