KEAMANAN DATA SEBAGAI PILAR STRATEGIS PERCEPATAN TRANSFORMASI DIGITAL PEMERINTAH KOTA MAKASSAR

Erni Salijah, Abdul Basid, Aswar Annas

Abstract


Di tengah perkembangan era digital, risiko kebocoran data kian meningkat dengan karakter yang semakin rumit, sehingga berpotensi mengganggu aspek kerahasiaan, keakuratan, dan aksesibilitas informasi. Urgensi masalah keamanan data dan informasi di Kota Makassar dalam konteks percepatan transformasi digital mencerminkan perlunya respons proaktif untuk melindungi kerahasiaan, integritas, dan ketersediaan data dari ancaman yang semakin kompleks. Tujuan penelitian ini adalah untuk mengidentifikasi upaya yang dilakukan pemerintah dalam meningkatkan keamanan informasi, serta untuk memetakan hambatan yang dihadapinya. Studi ini menggunakan pendekatan kualitatif, dengan mengumpulkan data melalui beberapa teknik, termasuk wawancara, dokumentasi, dan observasi. Informan kunci terdiri dari para pejabat dan staf di Dinas Komunikasi dan Informatika Kota Makassar yang memiliki pemahaman yang mendalam tentang kebijakan, praktik, dan infrastruktur terkait keamanan data dan informasi. Temuan utama dari upaya pemerintah Kota Makassar dalam meningkatkan efektivitas keamanan data dan informasi meliputi empat aspek krusial yaitu penguatan infrastruktur keamanan, pelatihan pegawai, sosialisasi publik, serta monitoring dan evaluasi berkala. Tantangan utama yang dihadapi termasuk evolusi ancaman siber, keterbatasan anggaran, kurangnya kesadaran pegawai, kompleksitas regulasi, dan integrasi sistem. Rekomendasi untuk mengatasi tantangan tersebut mencakup penerapan prinsip keamanan berlapis, manajemen anggaran berbasis risiko, peningkatan pelatihan, pematuhan regulasi, dan desain sistem yang mendukung integrasi. Mengadopsi pendekatan berbasis risiko dan standar internasional juga dapat membantu meningkatkan keamanan, membangun kepercayaan publik, dan mendukung transformasi digital yang aman dan efisien di Kota Makassar.


Keywords


Keamanan data; Upaya pemerintah; Transformasi digital; Kebijakan publik; Layanan publik

Full Text:

PDF

References


Aldifansa, R., Wicaksono, N. D., Nurfadilah, A. H., Santoso Gunawan, A. A., & Edbert, I. S. (2023). Surveying the Impact of National Identity Card Data Leak to the Security and Serenity in Indonesia. Proceeding - International Conference on Information Technology and Computing 2023, ICITCOM 2023, 12–16. https://doi.org/10.1109/ICITCOM60176.2023.10442727

Alharbi, A. S., Halikias, G., Rajarajan, M., & Yamin, M. (2021). A review of effectiveness of Saudi E-government data security management. International Journal of Information Technology (Singapore), 13(2), 573–579. https://doi.org/10.1007/s41870-021-00611-3

Arunprasath, S., & Annamalai, S. (2024). Improving patient centric data retrieval and cyber security in healthcare: privacy preserving solutions for a secure future. Multimedia Tools and Applications, 18253. https://doi.org/10.1007/s11042-024-18253-5

Baharuddin, T. (2020). Keterbukaan Informasi Publik: Studi Pada Keberhasilan Pemerintah Daerah Kabupaten Luwu Utara 2019. Journal of Governance and Local Politics, 2(2), 151–163. https://doi.org/10.47650/jglp.v2i2.133

Chadwick, D. W., Fan, W., Costantino, G., de Lemos, R., Di Cerbo, F., Herwono, I., … Wang, X. S. (2020). A cloud-edge based data security architecture for sharing and analysing cyber threat information. Future Generation Computer Systems, 102, 710–722. https://doi.org/10.1016/j.future.2019.06.026

Chen, X., Tang, X., & Xu, X. (2023). Digital technology-driven smart society governance mechanism and practice exploration. Frontiers of Engineering Management, 10(2), 319–338. https://doi.org/10.1007/s42524-022-0200-x

Chen, Y., kumara, E. K., & Sivakumar, V. (2023). RETRACTED ARTICLE: Investigation of finance industry on risk awareness model and digital economic growth. Annals of Operations Research, 326(s1), 15. https://doi.org/10.1007/s10479-021-04287-7

Crossler, R. E., Johnston, A. C., Lowry, P. B., Hu, Q., Warkentin, M., & Baskerville, R. (2013). Future directions for behavioral information security research. Computers and Security, 32(June), 90–101. https://doi.org/10.1016/j.cose.2012.09.010

Culot, G., Nassimbeni, G., Podrecca, M., & Sartor, M. (2021). The ISO/IEC 27001 information security management standard: literature review and theory-based research agenda. TQM Journal, 33(7), 76–105. https://doi.org/10.1108/TQM-09-2020-0202

Farrand, B., & Carrapico, H. (2022). Digital sovereignty and taking back control: from regulatory capitalism to regulatory mercantilism in EU cybersecurity. European Security, 31(3), 435–453. https://doi.org/10.1080/09662839.2022.2102896

Fatir, M. D. (2019, April 2). Dinas Kominfo Makassar libatkan Badan Siber dan Sandi Negara. Antaranews.Com. Retrieved from https://makassar.antaranews.com/berita/117769/dinas-kominfo-makassar-libatkan-badan-siber-dan-sandi-negara

Fisdian Adni, D., Rusadi, S., & Baharuddin, T. (2024). Adaptive Policy in Website-Based Digitization of Government Public Services: A Thematic Analysis. Journal of Local Government Issues, 7(1), 54–67. https://doi.org/10.22219/logos.v7i1.29404

Golightly, L., Wnuk, K., Shanmugan, N., Shaban, A., Longstaff, J., & Chang, V. (2022). Towards a Working Conceptual Framework: Cyber Law for Data Privacy and Information Security Management for the Industrial Internet of Things Application Domain. Proceedings - 2022 International Conference on Industrial IoT, Big Data and Supply Chain, IIoTBDSC 2022, 86–94. https://doi.org/10.1109/IIoTBDSC57192.2022.00027

Haghighi, M. S., Farivar, F., Jolfaei, A., Asl, A. B., & Zhou, W. (2023). Cyber Attacks via Consumer Electronics: Studying the Threat of Covert Malware in Smart and Autonomous Vehicles. IEEE Transactions on Consumer Electronics, 3297965. https://doi.org/10.1109/TCE.2023.3297965

Hodapp, D. (2022). Interoperability in the era of digital innovation : An information systems research agenda. Journal of Information Technology, 0(0), 1–21. https://doi.org/10.1177/02683962211064304

Hoffmann, R., Napiórkowski, J., Protasowicki, T., & Stanik, J. (2020). Risk based approach in scope of cybersecurity threats and requirements. Procedia Manufacturing, 44(2019), 655–662. https://doi.org/10.1016/j.promfg.2020.02.243

Hoofnagle, C. J., Sloot, B. van der, & Borgesius, F. Z. (2019). The European Union general data protection regulation: What it is and what it means. Information and Communications Technology Law, 28(1), 65–98. https://doi.org/10.1080/13600834.2019.1573501

IBM. (2025). Cost of a Data Breach. Retrieved from https://www.ibm.com/reports/data-breach

Ibrahim, A. H. H., Baharuddin, T., & Wance, M. (2023). Bibliometric Analysis of E-Government and Trust : A Lesson for Indonesia. Jurnal Borneo Administrator, 19(3), 269–284. https://doi.org/10.24258/jba.v19i3.1303

Isabella, Agustian, E., Baharuddin, T., & Ibrahim, A. H. H. (2025). Bridging E-Government With Digital Literacy: a Literature Review. Journal of Governance and Regulation, 14(1 (special issue)), 361–371. https://doi.org/10.22495/jgrv14i1siart12

Isabella, Alfitri, Saptawan, A., Nengyanti, & Baharuddin, T. (2024). Empowering Digital Citizenship in Indonesia : Navigating Urgent Digital Literacy Challenges for Effective Digital Governance. Journal of Governance and Public Policy, 11(2), 142–155. https://doi.org/https://doi.org/10.18196/jgpp.v11i2.19258

Kang, H., & Deng, J. (2023). A cross encryption scheme for data security storage in cloud computing environment. International Journal of Internet Protocol Technology, 16(1), 1–10. https://doi.org/10.1504/IJIPT.2023.129745

Kristensen, K., & Andersen, K. N. (2023). C-suite Leadership of Digital Government. Digital Government: Research and Practice, 4(1), 3580000. https://doi.org/10.1145/3580000

Link, A. N. (2019). Technology transfer at the US National Institute of Standards and Technology. Science and Public Policy, 46(6), 906–912. https://doi.org/10.1093/scipol/scz038

Mohd, N., & Yunos, Z. (2020). Mitigating insider threats: A case study of data leak prevention. European Conference on Information Warfare and Security, ECCWS, 2020-June, 599–605. https://doi.org/10.34190/EWS.20.004

Padden, M., & Öjehag-Pettersson, A. (2021). Protected how? Problem representations of risk in the General Data Protection Regulation (GDPR). Critical Policy Studies, 15(4), 486–503. https://doi.org/10.1080/19460171.2021.1927776

Pham, T. H., Phan, T. A., Trinh, P. A., Mai, X. B., & Le, Q. C. (2023). Information security risks and sharing behavior on OSN: the impact of data collection awareness. Journal of Information, Communication and Ethics in Society, 2024. https://doi.org/10.1108/JICES-06-2023-0076

Ren, S., Chen, D., Tao, Y., Xu, S., Wang, G., & Yang, Z. (2022). Intelligent terminal security technology of power grid sensing layer based upon information entropy data mining. Journal of Intelligent Systems, 31(1), 817–834. https://doi.org/10.1515/jisys-2022-0117

Salahudin, S., Nurmandi, A., & Loilatu, M. J. (2020). How to Design Qualitative Research with NVivo 12 Plus for Local Government Corruption Issues in Indonesia? Jurnal Studi Pemerintahan, 11(3), 369–398. https://doi.org/10.18196/jgp.113124

Sarkar, S., & Das, S. (2022). Fuzzy based security risk assessment of e-government data centre in Indian context. Electronic Government, 18(3), 354–380. https://doi.org/10.1504/EG.2022.123838

Scupola, A., & Mergel, I. (2022). Co-production in digital transformation of public administration and public value creation: The case of Denmark. Government Information Quarterly, 39(1), 101650. https://doi.org/10.1016/j.giq.2021.101650

Sharma, R., Fantin, A. R., Prabhu, N., Guan, C., & Dattakumar, A. (2016). Digital literacy and knowledge societies: A grounded theory investigation of sustainable development. Telecommunications Policy, 40(7), 628–643. https://doi.org/10.1016/j.telpol.2016.05.003

Sharma, S., Rahaman, V., & Sinha, G. R. (2021). Big Data Analytics in Cognitive Social Media and Literary Texts: Theory and Praxis. Big Data Analytics in Cognitive Social Media and Literary Texts: Theory and Praxis, 1–300. https://doi.org/10.1007/978-981-16-4729-1

Vrhovec, S., & Markelj, B. (2018). Relating mobile device use and adherence to information security policy with data breach consequences in hospitals. Journal of Universal Computer Science, 24(5), 634–645.

Xia, L., Semirumi, D. T., & Rezaei, R. (2023). A thorough examination of smart city applications: Exploring challenges and solutions throughout the life cycle with emphasis on safeguarding citizen privacy. Sustainable Cities and Society, 98, 104771. https://doi.org/10.1016/j.scs.2023.104771

Yuan, Y. P., Dwivedi, Y. K., Tan, G. W. H., Cham, T. H., Ooi, K. B., Aw, E. C. X., & Currie, W. (2023). Government Digital Transformation: Understanding the Role of Government Social Media. Government Information Quarterly, 40(1), 101775. https://doi.org/10.1016/j.giq.2022.101775




DOI: https://doi.org/10.31764/jiap.v13i2.36656

Refbacks

  • There are currently no refbacks.


JIAP (Jurnal Ilmu Administrasi Publik)
 

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

JIAP (Jurnal Ilmu Administrasi Publik) terindeks di:

        

 EDITOR'S OFFICIAL: