Information System Security of Indonesia Terrestrial Border Control
DOI:
https://doi.org/10.21512/commit.v13i2.5529Keywords:
Secure Information System, Custom, Immigration, and Quarantine (CIQ), Confidentiality, Integrity, and Availability (CIA), Integrated Cross-Border PostAbstract
Today, Information Technology (IT) becomes an integral part of human life. IT boosts every sector, such as infrastructure, economics, agriculture, social, organization, and politics. The institutional systems are developed according to the specific business requirements, processes, flows, and security. Pos Lintas Batas Negara ‘integrated cross-border post’ (PLBN) is a designated authority consisting of the Custom, Immigration, and Quarantine (CIQ). Each section has a different Standard Operation Procedure (SOP). This research aims to develop a secure information system based on Confidentiality, Integrity, and Availability (CIA) concepts. The CIA is embedded in the ISO 27001 and McCumber Cube approach. The research focuses on the Secure Immigration Information System (SIIS). This research is conducted in the Wini immigration office. The researchers observe the immigration activities on the location, interview the immigration officers, and collect information. The researchers produce an effective, efficient, and security application prototype system.
Plum Analytics
References
A. A. Adams and R. McCrindle, Pandora’s box: Social and professional issues of the information age. John Wiley & Sons, 2008.
J. L. Bower and C. M. Christensen, “Disruptive technologies: Catching the wave,” Harvard Business Review, vol. 73, no. 1, pp. 43–53, 1995.
J. Heizer and B. Render, Operations management. New Jersey: Pearson, 2011.
C. M. Christensen, The innovator’s dilemma: When new technologies cause great firms to fail. Boston, MA, USA: Harvard Business School Press, 1997.
Y. Park and P. Hong, “The role of it for global firms in emerging markets,” International Journal of Business Information Systems, vol. 18, no. 4, pp. 490–505, 2015.
J. E. Smith and C. Ulu, “Technology adoption with uncertain future costs and quality,” Operations Research, vol. 60, no. 2, pp. 262–274, 2012.
M. Rhodes-Ousley, Information security: The complete reference. McGraw Hill Education, 2013.
C. Buchta, D. Meyer, A. Pfister, A. Mild, and A. Taudes, “Technological efficiency and organizational inertia: A model of the emergence of disruption,” Computational & Mathematical Organization Theory, vol. 9, no. 2, pp. 127–146, 2003.
E. Kremp and J. Mairesse, “Knowledge management, innovation, and productivity: A firm level exploration based on french manufacturing CIS3 data,” National bureau of economic research, Tech. Rep., 2004.
D. Lauren. (2017) Models of ethical behavior in business.[Online]. Available: ttps://bizfluent.com/
list-6406921-models-ethical-behavior-business.html
S. L. Alter, “How effective managers use information systems.” Harvard Business Review, vol. 54, no. 6, pp. 97–104, 1976.
M. Indra, “Urgensi pengelolaan wilayah perbatasan dalam kaitannya dengan kedaulatan Negara Kesatuan Republik Indonesia,” Jurnal Selat, vol. 1, no. 1, pp. 13–18, 2013.
F. Rani, “Strategi pemerintah Indonesia dalam meningkatkan keamanan wilayah perbatasan menurut perspektif sosial pembangunan,” Jurnal Transnasional, vol. 4, no. 01, pp. 1–17, 2012.
R. Mulyawan, “Implementasi kebijakan pembangunan bidang pertahanan di wilayah perbatasan antaranegara dalam konteks otonomi daerah (Studi kasus di wilayah perbatasan Indonesia dengan Timor Leste),” Jurnal Sosial Politik, vol. 2, no. 1, pp. 85–112, 2012.
Efendi, “Studi tentang pelayanan publik Pas Lintas Batas (PLB) Krayan Ba’Kelalan Malaysia Di Kantor Imigrasi kecamatan Krayan Kabupaten Nunukan,” EJournal Ilmu Administrasi Negara, vol. 3, no. 2, pp. 613–627, 2014.
L. M. Markus, “Toward a theory of knowledge reuse: Types of knowledge reuse situations and factors in reuse success,” Journal of Management Information Systems, vol. 18, no. 1, pp. 57–93, 2001.
International Organization for Standardization. ISO/IEC 27001:2013-Information technology Security techniques Information security management systems Requirements. [Online]. Available: https://bit.ly/1MspEIj
N. Vlajic. (2013) Computer science: Assessment and forensic - Introduction to information security. [Online]. Available: https://bit.ly/2lRqecQ
S. Aldossary and W. Allen, “Data security, privacy, availability and integrity in cloud computing: Issues and current solutions,” International Journal of Advanced Computer Science and Applications, vol. 7, no. 4, pp. 485–498, 2016.
A. Tchernykh, U. Schwiegelsohn, E. G. Talbi, and M. Babenko, “Towards understanding uncertainty in cloud computing with risks of confidentiality, integrity, and availability,” Journal of Computational Science, vol. In Press, 2016. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S1877750316303878
Y. Benslimane, Z. Yang, and B. Bahli, “Information security between standards, certifications and technologies: An empirical study,” in 2016 International Conference on Information Science and Security (ICISS). Pattaya, Thailand: IEEE, Dec. 19–22, 2016, pp. 1–5.
A. Tanovi´c and I. S. Marjanovic, “Development of a new improved model of iso 20000 standard based on recommendations from ISO 27001 standard,” in 2019 42nd International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO). Opatija, Croatia: IEEE, May 20–24, 2019, pp. 1503–1508.
C. C. Huang and K. J. Farn, “A study on e-Taiwan promotion information security governance programs with e-government implementation of information security management standardization.” IJ Network Security, vol. 18, no. 3, pp. 565–578, 2016.
I. H. Al-Mayahi and P. M. Sa’ad, “Information security policy development,” Journal of Advanced Management Science Vol, vol. 2, no. 2, pp. 135–139, 2014.
J. McCumber, “Information systems security: A comprehensive model,” in Proceedings of the 14th National Computer Security Conference. Washington DC: National Institute of Standards and Technology, Oct. 1–4, 1991, pp. 328–337.
W. V. Maconachy, C. D. Schou, D. Ragsdale, and D. Welch, “A model for information assurance: An integrated approach,” in Proceedings of the 2001 IEEE Workshop on Information Assurance and Security, vol. 310. New York: United States Military Academy, West Point. IEEE, June 5–6 2001.
R. Pressman and B. Maxim, Software engineering: A practioner’s approach. New York: McGraw-Hill, 2014.
H. Kashfi, “Software engineering challenges in cloud environment: Software development lifecycle perspective,” International Journal of Scientific Research in Computer Science, Engineering and Information Technology, vol. 2, no. 3, pp. 251–256, 2017.
P. A. V. Hall and J. C. F. Ramil, Managing the software enterprise: Software engineering and information systems in context. Cengage Learning EMEA, 2007.
T. R. Peltier, Information security risk analysis. Florida: CRC Press, 2010.
Y. Cherdantseva and J. Hilton, “A reference model of information assurance & security,” in 2013 International Conference on Availability, Reliability and Security. Regensburg, Germany: IEEE, Sept. 2–6, 2013, pp. 546–555.
R. Schwartz. (1997) The architecture of the domino web server, part 1. [Online]. Available: https://www.ibm.com/developerworks/lotus/library/ls-Architecture of the Domino Web Server Part1/index.html
Lotus Development Corporation. (2000) Inside notes: The architecture of notes and the domino server. [Online]. Available: http://www-12.lotus.com/ldd/doc/uafiles. nsf/70817c90542892178525695b0051105c/2e559b131d346a028525697c00652c2b/$FILE/InsideNotes.pdf
Downloads
Published
Issue
Section
License
Authors who publish with this journal agree to the following terms:
a. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License - Share Alike that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
b. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
c. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.
USER RIGHTS
All articles published Open Access will be immediately and permanently free for everyone to read and download. We are continuously working with our author communities to select the best choice of license options, currently being defined for this journal as follows: Creative Commons Attribution-Share Alike (CC BY-SA)