Information System Security of Indonesia Terrestrial Border Control

Authors

DOI:

https://doi.org/10.21512/commit.v13i2.5529

Keywords:

Secure Information System, Custom, Immigration, and Quarantine (CIQ), Confidentiality, Integrity, and Availability (CIA), Integrated Cross-Border Post

Abstract

Today, Information Technology (IT) becomes an integral part of human life. IT boosts every sector, such as infrastructure, economics, agriculture, social, organization, and politics. The institutional systems are developed according to the specific business requirements, processes, flows, and security. Pos Lintas Batas Negara ‘integrated cross-border post’ (PLBN) is a designated authority consisting of the Custom, Immigration, and Quarantine (CIQ). Each section has a different Standard Operation Procedure (SOP). This research aims to develop a secure information system based on Confidentiality, Integrity, and Availability (CIA) concepts. The CIA is embedded in the ISO 27001 and McCumber Cube approach. The research focuses on the Secure Immigration Information System (SIIS). This research is conducted in the Wini immigration office. The researchers observe the immigration activities on the location, interview the immigration officers, and collect information. The researchers produce an effective, efficient, and security application prototype system.

Dimensions

Plum Analytics

Author Biographies

Fransiskus Mario Hartono Tjiptabudi, STIKOM Uyelindo Kupang

Information System Department

Raul Bernardino, STIKOM Uyelindo Kupang

Information System Department

References

A. A. Adams and R. McCrindle, Pandora’s box: Social and professional issues of the information age. John Wiley & Sons, 2008.

J. L. Bower and C. M. Christensen, “Disruptive technologies: Catching the wave,” Harvard Business Review, vol. 73, no. 1, pp. 43–53, 1995.

J. Heizer and B. Render, Operations management. New Jersey: Pearson, 2011.

C. M. Christensen, The innovator’s dilemma: When new technologies cause great firms to fail. Boston, MA, USA: Harvard Business School Press, 1997.

Y. Park and P. Hong, “The role of it for global firms in emerging markets,” International Journal of Business Information Systems, vol. 18, no. 4, pp. 490–505, 2015.

J. E. Smith and C. Ulu, “Technology adoption with uncertain future costs and quality,” Operations Research, vol. 60, no. 2, pp. 262–274, 2012.

M. Rhodes-Ousley, Information security: The complete reference. McGraw Hill Education, 2013.

C. Buchta, D. Meyer, A. Pfister, A. Mild, and A. Taudes, “Technological efficiency and organizational inertia: A model of the emergence of disruption,” Computational & Mathematical Organization Theory, vol. 9, no. 2, pp. 127–146, 2003.

E. Kremp and J. Mairesse, “Knowledge management, innovation, and productivity: A firm level exploration based on french manufacturing CIS3 data,” National bureau of economic research, Tech. Rep., 2004.

D. Lauren. (2017) Models of ethical behavior in business.[Online]. Available: ttps://bizfluent.com/

list-6406921-models-ethical-behavior-business.html

S. L. Alter, “How effective managers use information systems.” Harvard Business Review, vol. 54, no. 6, pp. 97–104, 1976.

M. Indra, “Urgensi pengelolaan wilayah perbatasan dalam kaitannya dengan kedaulatan Negara Kesatuan Republik Indonesia,” Jurnal Selat, vol. 1, no. 1, pp. 13–18, 2013.

F. Rani, “Strategi pemerintah Indonesia dalam meningkatkan keamanan wilayah perbatasan menurut perspektif sosial pembangunan,” Jurnal Transnasional, vol. 4, no. 01, pp. 1–17, 2012.

R. Mulyawan, “Implementasi kebijakan pembangunan bidang pertahanan di wilayah perbatasan antaranegara dalam konteks otonomi daerah (Studi kasus di wilayah perbatasan Indonesia dengan Timor Leste),” Jurnal Sosial Politik, vol. 2, no. 1, pp. 85–112, 2012.

Efendi, “Studi tentang pelayanan publik Pas Lintas Batas (PLB) Krayan Ba’Kelalan Malaysia Di Kantor Imigrasi kecamatan Krayan Kabupaten Nunukan,” EJournal Ilmu Administrasi Negara, vol. 3, no. 2, pp. 613–627, 2014.

L. M. Markus, “Toward a theory of knowledge reuse: Types of knowledge reuse situations and factors in reuse success,” Journal of Management Information Systems, vol. 18, no. 1, pp. 57–93, 2001.

International Organization for Standardization. ISO/IEC 27001:2013-Information technology Security techniques Information security management systems Requirements. [Online]. Available: https://bit.ly/1MspEIj

N. Vlajic. (2013) Computer science: Assessment and forensic - Introduction to information security. [Online]. Available: https://bit.ly/2lRqecQ

S. Aldossary and W. Allen, “Data security, privacy, availability and integrity in cloud computing: Issues and current solutions,” International Journal of Advanced Computer Science and Applications, vol. 7, no. 4, pp. 485–498, 2016.

A. Tchernykh, U. Schwiegelsohn, E. G. Talbi, and M. Babenko, “Towards understanding uncertainty in cloud computing with risks of confidentiality, integrity, and availability,” Journal of Computational Science, vol. In Press, 2016. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S1877750316303878

Y. Benslimane, Z. Yang, and B. Bahli, “Information security between standards, certifications and technologies: An empirical study,” in 2016 International Conference on Information Science and Security (ICISS). Pattaya, Thailand: IEEE, Dec. 19–22, 2016, pp. 1–5.

A. Tanovi´c and I. S. Marjanovic, “Development of a new improved model of iso 20000 standard based on recommendations from ISO 27001 standard,” in 2019 42nd International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO). Opatija, Croatia: IEEE, May 20–24, 2019, pp. 1503–1508.

C. C. Huang and K. J. Farn, “A study on e-Taiwan promotion information security governance programs with e-government implementation of information security management standardization.” IJ Network Security, vol. 18, no. 3, pp. 565–578, 2016.

I. H. Al-Mayahi and P. M. Sa’ad, “Information security policy development,” Journal of Advanced Management Science Vol, vol. 2, no. 2, pp. 135–139, 2014.

J. McCumber, “Information systems security: A comprehensive model,” in Proceedings of the 14th National Computer Security Conference. Washington DC: National Institute of Standards and Technology, Oct. 1–4, 1991, pp. 328–337.

W. V. Maconachy, C. D. Schou, D. Ragsdale, and D. Welch, “A model for information assurance: An integrated approach,” in Proceedings of the 2001 IEEE Workshop on Information Assurance and Security, vol. 310. New York: United States Military Academy, West Point. IEEE, June 5–6 2001.

R. Pressman and B. Maxim, Software engineering: A practioner’s approach. New York: McGraw-Hill, 2014.

H. Kashfi, “Software engineering challenges in cloud environment: Software development lifecycle perspective,” International Journal of Scientific Research in Computer Science, Engineering and Information Technology, vol. 2, no. 3, pp. 251–256, 2017.

P. A. V. Hall and J. C. F. Ramil, Managing the software enterprise: Software engineering and information systems in context. Cengage Learning EMEA, 2007.

T. R. Peltier, Information security risk analysis. Florida: CRC Press, 2010.

Y. Cherdantseva and J. Hilton, “A reference model of information assurance & security,” in 2013 International Conference on Availability, Reliability and Security. Regensburg, Germany: IEEE, Sept. 2–6, 2013, pp. 546–555.

R. Schwartz. (1997) The architecture of the domino web server, part 1. [Online]. Available: https://www.ibm.com/developerworks/lotus/library/ls-Architecture of the Domino Web Server Part1/index.html

Lotus Development Corporation. (2000) Inside notes: The architecture of notes and the domino server. [Online]. Available: http://www-12.lotus.com/ldd/doc/uafiles. nsf/70817c90542892178525695b0051105c/2e559b131d346a028525697c00652c2b/$FILE/InsideNotes.pdf

Downloads

Published

2019-10-30
Abstract 1651  .
PDF downloaded 721  .