KEAMANAN DATA SEBAGAI PILAR STRATEGIS PERCEPATAN TRANSFORMASI DIGITAL PEMERINTAH KOTA MAKASSAR
Abstract
Di tengah perkembangan era digital, risiko kebocoran data kian meningkat dengan karakter yang semakin rumit, sehingga berpotensi mengganggu aspek kerahasiaan, keakuratan, dan aksesibilitas informasi. Urgensi masalah keamanan data dan informasi di Kota Makassar dalam konteks percepatan transformasi digital mencerminkan perlunya respons proaktif untuk melindungi kerahasiaan, integritas, dan ketersediaan data dari ancaman yang semakin kompleks. Tujuan penelitian ini adalah untuk mengidentifikasi upaya yang dilakukan pemerintah dalam meningkatkan keamanan informasi, serta untuk memetakan hambatan yang dihadapinya. Studi ini menggunakan pendekatan kualitatif, dengan mengumpulkan data melalui beberapa teknik, termasuk wawancara, dokumentasi, dan observasi. Informan kunci terdiri dari para pejabat dan staf di Dinas Komunikasi dan Informatika Kota Makassar yang memiliki pemahaman yang mendalam tentang kebijakan, praktik, dan infrastruktur terkait keamanan data dan informasi. Temuan utama dari upaya pemerintah Kota Makassar dalam meningkatkan efektivitas keamanan data dan informasi meliputi empat aspek krusial yaitu penguatan infrastruktur keamanan, pelatihan pegawai, sosialisasi publik, serta monitoring dan evaluasi berkala. Tantangan utama yang dihadapi termasuk evolusi ancaman siber, keterbatasan anggaran, kurangnya kesadaran pegawai, kompleksitas regulasi, dan integrasi sistem. Rekomendasi untuk mengatasi tantangan tersebut mencakup penerapan prinsip keamanan berlapis, manajemen anggaran berbasis risiko, peningkatan pelatihan, pematuhan regulasi, dan desain sistem yang mendukung integrasi. Mengadopsi pendekatan berbasis risiko dan standar internasional juga dapat membantu meningkatkan keamanan, membangun kepercayaan publik, dan mendukung transformasi digital yang aman dan efisien di Kota Makassar.
Keywords
Full Text:
PDFReferences
Aldifansa, R., Wicaksono, N. D., Nurfadilah, A. H., Santoso Gunawan, A. A., & Edbert, I. S. (2023). Surveying the Impact of National Identity Card Data Leak to the Security and Serenity in Indonesia. Proceeding - International Conference on Information Technology and Computing 2023, ICITCOM 2023, 12–16. https://doi.org/10.1109/ICITCOM60176.2023.10442727
Alharbi, A. S., Halikias, G., Rajarajan, M., & Yamin, M. (2021). A review of effectiveness of Saudi E-government data security management. International Journal of Information Technology (Singapore), 13(2), 573–579. https://doi.org/10.1007/s41870-021-00611-3
Arunprasath, S., & Annamalai, S. (2024). Improving patient centric data retrieval and cyber security in healthcare: privacy preserving solutions for a secure future. Multimedia Tools and Applications, 18253. https://doi.org/10.1007/s11042-024-18253-5
Baharuddin, T. (2020). Keterbukaan Informasi Publik: Studi Pada Keberhasilan Pemerintah Daerah Kabupaten Luwu Utara 2019. Journal of Governance and Local Politics, 2(2), 151–163. https://doi.org/10.47650/jglp.v2i2.133
Chadwick, D. W., Fan, W., Costantino, G., de Lemos, R., Di Cerbo, F., Herwono, I., … Wang, X. S. (2020). A cloud-edge based data security architecture for sharing and analysing cyber threat information. Future Generation Computer Systems, 102, 710–722. https://doi.org/10.1016/j.future.2019.06.026
Chen, X., Tang, X., & Xu, X. (2023). Digital technology-driven smart society governance mechanism and practice exploration. Frontiers of Engineering Management, 10(2), 319–338. https://doi.org/10.1007/s42524-022-0200-x
Chen, Y., kumara, E. K., & Sivakumar, V. (2023). RETRACTED ARTICLE: Investigation of finance industry on risk awareness model and digital economic growth. Annals of Operations Research, 326(s1), 15. https://doi.org/10.1007/s10479-021-04287-7
Crossler, R. E., Johnston, A. C., Lowry, P. B., Hu, Q., Warkentin, M., & Baskerville, R. (2013). Future directions for behavioral information security research. Computers and Security, 32(June), 90–101. https://doi.org/10.1016/j.cose.2012.09.010
Culot, G., Nassimbeni, G., Podrecca, M., & Sartor, M. (2021). The ISO/IEC 27001 information security management standard: literature review and theory-based research agenda. TQM Journal, 33(7), 76–105. https://doi.org/10.1108/TQM-09-2020-0202
Farrand, B., & Carrapico, H. (2022). Digital sovereignty and taking back control: from regulatory capitalism to regulatory mercantilism in EU cybersecurity. European Security, 31(3), 435–453. https://doi.org/10.1080/09662839.2022.2102896
Fatir, M. D. (2019, April 2). Dinas Kominfo Makassar libatkan Badan Siber dan Sandi Negara. Antaranews.Com. Retrieved from https://makassar.antaranews.com/berita/117769/dinas-kominfo-makassar-libatkan-badan-siber-dan-sandi-negara
Fisdian Adni, D., Rusadi, S., & Baharuddin, T. (2024). Adaptive Policy in Website-Based Digitization of Government Public Services: A Thematic Analysis. Journal of Local Government Issues, 7(1), 54–67. https://doi.org/10.22219/logos.v7i1.29404
Golightly, L., Wnuk, K., Shanmugan, N., Shaban, A., Longstaff, J., & Chang, V. (2022). Towards a Working Conceptual Framework: Cyber Law for Data Privacy and Information Security Management for the Industrial Internet of Things Application Domain. Proceedings - 2022 International Conference on Industrial IoT, Big Data and Supply Chain, IIoTBDSC 2022, 86–94. https://doi.org/10.1109/IIoTBDSC57192.2022.00027
Haghighi, M. S., Farivar, F., Jolfaei, A., Asl, A. B., & Zhou, W. (2023). Cyber Attacks via Consumer Electronics: Studying the Threat of Covert Malware in Smart and Autonomous Vehicles. IEEE Transactions on Consumer Electronics, 3297965. https://doi.org/10.1109/TCE.2023.3297965
Hodapp, D. (2022). Interoperability in the era of digital innovation : An information systems research agenda. Journal of Information Technology, 0(0), 1–21. https://doi.org/10.1177/02683962211064304
Hoffmann, R., Napiórkowski, J., Protasowicki, T., & Stanik, J. (2020). Risk based approach in scope of cybersecurity threats and requirements. Procedia Manufacturing, 44(2019), 655–662. https://doi.org/10.1016/j.promfg.2020.02.243
Hoofnagle, C. J., Sloot, B. van der, & Borgesius, F. Z. (2019). The European Union general data protection regulation: What it is and what it means. Information and Communications Technology Law, 28(1), 65–98. https://doi.org/10.1080/13600834.2019.1573501
IBM. (2025). Cost of a Data Breach. Retrieved from https://www.ibm.com/reports/data-breach
Ibrahim, A. H. H., Baharuddin, T., & Wance, M. (2023). Bibliometric Analysis of E-Government and Trust : A Lesson for Indonesia. Jurnal Borneo Administrator, 19(3), 269–284. https://doi.org/10.24258/jba.v19i3.1303
Isabella, Agustian, E., Baharuddin, T., & Ibrahim, A. H. H. (2025). Bridging E-Government With Digital Literacy: a Literature Review. Journal of Governance and Regulation, 14(1 (special issue)), 361–371. https://doi.org/10.22495/jgrv14i1siart12
Isabella, Alfitri, Saptawan, A., Nengyanti, & Baharuddin, T. (2024). Empowering Digital Citizenship in Indonesia : Navigating Urgent Digital Literacy Challenges for Effective Digital Governance. Journal of Governance and Public Policy, 11(2), 142–155. https://doi.org/https://doi.org/10.18196/jgpp.v11i2.19258
Kang, H., & Deng, J. (2023). A cross encryption scheme for data security storage in cloud computing environment. International Journal of Internet Protocol Technology, 16(1), 1–10. https://doi.org/10.1504/IJIPT.2023.129745
Kristensen, K., & Andersen, K. N. (2023). C-suite Leadership of Digital Government. Digital Government: Research and Practice, 4(1), 3580000. https://doi.org/10.1145/3580000
Link, A. N. (2019). Technology transfer at the US National Institute of Standards and Technology. Science and Public Policy, 46(6), 906–912. https://doi.org/10.1093/scipol/scz038
Mohd, N., & Yunos, Z. (2020). Mitigating insider threats: A case study of data leak prevention. European Conference on Information Warfare and Security, ECCWS, 2020-June, 599–605. https://doi.org/10.34190/EWS.20.004
Padden, M., & Öjehag-Pettersson, A. (2021). Protected how? Problem representations of risk in the General Data Protection Regulation (GDPR). Critical Policy Studies, 15(4), 486–503. https://doi.org/10.1080/19460171.2021.1927776
Pham, T. H., Phan, T. A., Trinh, P. A., Mai, X. B., & Le, Q. C. (2023). Information security risks and sharing behavior on OSN: the impact of data collection awareness. Journal of Information, Communication and Ethics in Society, 2024. https://doi.org/10.1108/JICES-06-2023-0076
Ren, S., Chen, D., Tao, Y., Xu, S., Wang, G., & Yang, Z. (2022). Intelligent terminal security technology of power grid sensing layer based upon information entropy data mining. Journal of Intelligent Systems, 31(1), 817–834. https://doi.org/10.1515/jisys-2022-0117
Salahudin, S., Nurmandi, A., & Loilatu, M. J. (2020). How to Design Qualitative Research with NVivo 12 Plus for Local Government Corruption Issues in Indonesia? Jurnal Studi Pemerintahan, 11(3), 369–398. https://doi.org/10.18196/jgp.113124
Sarkar, S., & Das, S. (2022). Fuzzy based security risk assessment of e-government data centre in Indian context. Electronic Government, 18(3), 354–380. https://doi.org/10.1504/EG.2022.123838
Scupola, A., & Mergel, I. (2022). Co-production in digital transformation of public administration and public value creation: The case of Denmark. Government Information Quarterly, 39(1), 101650. https://doi.org/10.1016/j.giq.2021.101650
Sharma, R., Fantin, A. R., Prabhu, N., Guan, C., & Dattakumar, A. (2016). Digital literacy and knowledge societies: A grounded theory investigation of sustainable development. Telecommunications Policy, 40(7), 628–643. https://doi.org/10.1016/j.telpol.2016.05.003
Sharma, S., Rahaman, V., & Sinha, G. R. (2021). Big Data Analytics in Cognitive Social Media and Literary Texts: Theory and Praxis. Big Data Analytics in Cognitive Social Media and Literary Texts: Theory and Praxis, 1–300. https://doi.org/10.1007/978-981-16-4729-1
Vrhovec, S., & Markelj, B. (2018). Relating mobile device use and adherence to information security policy with data breach consequences in hospitals. Journal of Universal Computer Science, 24(5), 634–645.
Xia, L., Semirumi, D. T., & Rezaei, R. (2023). A thorough examination of smart city applications: Exploring challenges and solutions throughout the life cycle with emphasis on safeguarding citizen privacy. Sustainable Cities and Society, 98, 104771. https://doi.org/10.1016/j.scs.2023.104771
Yuan, Y. P., Dwivedi, Y. K., Tan, G. W. H., Cham, T. H., Ooi, K. B., Aw, E. C. X., & Currie, W. (2023). Government Digital Transformation: Understanding the Role of Government Social Media. Government Information Quarterly, 40(1), 101775. https://doi.org/10.1016/j.giq.2022.101775
DOI: https://doi.org/10.31764/jiap.v13i2.36656
Refbacks
- There are currently no refbacks.
JIAP (Jurnal Ilmu Administrasi Publik)

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
JIAP (Jurnal Ilmu Administrasi Publik) terindeks di:
EDITOR'S OFFICIAL:









