Encrypted Email For Local Government Information Security In South Sumatra

Authors

  • Ratu Mutialela Caropeboka Postgraduate Program of Bina Darma University Palembang, 2Q2C+63W, 9/10 Ulu, Seberang Ulu I District, Palembang City, South Sumatra, 30111, Indonesia
  • Januar Effendi Postgraduate Program of Bina Darma University Palembang, 2Q2C+63W, 9/10 Ulu, Seberang Ulu I District, Palembang City, South Sumatra, 30111, Indonesia
  • Isna Wijayani Postgraduate Program of Bina Darma University Palembang, 2Q2C+63W, 9/10 Ulu, Seberang Ulu I District, Palembang City, South Sumatra, 30111, Indonesia
  • Rahma Santhi Zinaida Postgraduate Program of Bina Darma University Palembang, 2Q2C+63W, 9/10 Ulu, Seberang Ulu I District, Palembang City, South Sumatra, 30111, Indonesia

DOI:

https://doi.org/10.35877/454RI.jinav1395

Keywords:

Information Security, encrypted email, cipher expert human resource, official encryption equipment

Abstract

This study obtains an overview of the conditions of the encryption email management workflow among local governments in South Sumatra. The workflow for managing email encryption for regular official news has been going very well. Meanwhile, the workflow for managing encryption of emails for confidential news is still experiencing problems, especially for local governments that do not have cipher expert personnel and official cipher equipment from the BSSN. In addition, this study also illustrates that the application of information security theory in the use of encrypted emails for confidential news between local governments in South Sumatra is not optimal. The main obstacle faced is that there are still local governments that do not have cipher expert personnel and official cipher equipment from the BSSN. The quality of the workflow is measured by looking at the fulfillment of the main elements contained in the Standard Operating Procedures (SOP) of the encryption email management workflow. The quality of using email encryption for information security is carried out by analyzing the fulfillment of the elements contained in the information security theory.

References

Al-Shehri, Y., & Clarke, N. L. (2012). Information security awareness and culture (Vol. 6). Lulu Press Morrisville, NC, USA.

Ardipandanto, A., & Budiman, A. (2018). Dinamika Pelaksanaan Urusan di Bidang Persandian Pemerintah Daerah. Yayasan Pustaka Obor Indonesia.

Bisaso, P. M. (2022). A web-based information security awareness and training system. Makerere University.

Bryan, L. L. (2020). Effective information security strategies for small business. International Journal of Cyber Criminology, 14(1), 341–360.

Budiman, A. (2016). Urgensi Pengaturan Persandian Di Pemerintah Daerah. Majalah Info Singkat: Pemerintah Dalam Negri, 17.

Choi, S., Martins, J. T., & Bernik, I. (2018). Information security: Listening to the perspective of organisational insiders. Journal of Information Science, 44(6), 752–767.

Eppich, W. J., Gormley, G. J., & Teunissen, P. W. (2019). In-depth interviews. In Healthcare Simulation Research (pp. 85–91). Springer.

Hwang, I., Wakefield, R., Kim, S., & Kim, T. (2021). Security awareness: The first step in information security compliance behavior. Journal of Computer Information Systems, 61(4), 345–356.

Khairi, H. (2018). Dinamika pelaksanaan urusan di bidang persandian pemerintah daerah. Yayasan Pustaka Obor Indonesia.

Leyland, P., & Anthony, G. (2016). Textbook on administrative law. Oxford University Press.

Lidster, W. W., & Rahman, S. S. M. (2018). Obstacles to implementation of information security governance. 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), 1826–1831.

Mulyadi, M. (2016). Metode penelitian praktis: Kuantitatif dan kualitatif. Jakarta: Publica Press.

Pamungkas, R. W. P., & Khalida, R. (2019). Fishbone Kerangka Pembuatan Peta Jalan (Roadmap) Badan Persandian. JURNAL MEDIA INFORMATIKA BUDIDARMA, 3(1), 54–58.

Rahardjo, B. (2017). Keamanan Informasi. PT Insan Infonesia.

Ridwan, R., Jaya, M., & Rusdi, R. (2020). Pengelolaan Persandian Dalam Menjaga Informasi Rahasia Negara Pada Pemerintah Kabupaten Bungo. KEMUDI: Jurnal Ilmu Pemerintahan, 4(2), 177–212.

Riinawati, R. (2021). Pengantar Teori Manajemen Komunikasi dan Organisasi. Pustaka Baru Press.

Rosalin, S., Rahayu, K. S., Edityastono, L., & Yuliawan, R. (2022). Administrasi Perkantoran Berbasis Teknologi Informasi. Universitas Brawijaya Press.

Sedarmayanti. (2018). Komunikasi Pemerintahan. PT Refika Aditama.

Simamora, P. R. T. (2021). Komunikasi Organisasi. Yayasan Kita Menulis.

St-Hilaire, W. A. (2021). Digital Risk Governance: Security Strategies for the Public and Private Sectors. Springer.

Suherman, S. (2017). Efektivitas Keamanan Informasi dalam Menghadapi Ancaman Social Engineering. Peperangan Asimetris, 3(1).

Sya’bany, M. (2015). Strategi Pengamanan Surat Rahasia Berbasis Sumber Daya Persuratan. Jurnal Kajian Informasi & Perpustakaan, 3(2), 253–270.

Whitman, M. E., & Mattord, H. J. (2021). Principles of information security. Cengage learning.

Zulfia, A., Adawiyah, R., Hidayanto, A. N., & Budi, N. F. A. (2019). Measurement of Employee Information Security Awareness Using the Human Aspects of Information Security Questionnaire (HAIS-Q): Case Study at PT. PQS. 2019 5th International Conference on Computing Engineering and Design (ICCED), 1–5.

Downloads

Published

2022-12-23

How to Cite

Caropeboka, R. M. ., Effendi, J., Wijayani, I., & Zinaida, R. S. . (2022). Encrypted Email For Local Government Information Security In South Sumatra. JINAV: Journal of Information and Visualization, 3(2), 109–120. https://doi.org/10.35877/454RI.jinav1395

Issue

Section

Articles