Analysis of Information Security Readiness Using the Index KAMI
DOI:
https://doi.org/10.51454/decode.v4i3.602Keywords:
Index KAMI, Information Security, Information Security Framework, ISO 27001:2013, Measuring ReadinessAbstract
Hospitals are institutions that store sensitive data. Information security needs to be implemented and audited regularly. Evaluation of information security can use the KAMI Index to determine the readiness of the application of information technology in terms of information security. Research shows that PKU Muhammadiyah Surakarta scores 31 on the electronic system assessment and 356 on the five implementation aspects. These results indicate that PKU Muhammadiyah Surakarta is in a position to implement the framework, so it is necessary to develop both technical and non-technical to be more prepared to face the digitalization era. The results of this study indicate that the KAMI index can be used as a tool and method in measuring information security readiness towards ISO 27001:2013. Based on the evaluation of the level of information security at PKU Muhammadiyah Surakarta, it is in the high category with a score of 31. The assessment of the five aspects gets a score of 356, so it is still at the stage of fulfilling the basic framework and at maturity levels I+ to II. PKU Muhammadiyah Surakarta should regularly evaluate its information security to assess progress in the five key areas outlined in the ISO 27001/SNI information security standards.
References
Ahsan, M. M., & Siddique, Z. (2022). Industry 4.0 in Healthcare: A systematic review. International Journal of Information Management Data Insights, 2(1), 100079. https://doi.org/10.1016/j.jjimei.2022.100079
BSSN. (2021). Konsultasi dan Assessment Indeks KAMI. https://www.bssn.go.id/indeks-kami/
Fatima, A., & Colomo-Palacios, R. (2018). Security Aspects in Healthcare Information Systems: A Systematic Mapping. Procedia Computer Science, 138, 12–19. https://doi.org/10.1016/j.procs.2018.10.003
Nurhasanah, S., & Harahap, A. A. (2022). Evaluasi Tingkat Kesiapan Pengguna Sistem Single Sign On Pada Portal Universitas Alma Ata Menggunakan Metode Technology Readiness Index (TRI). Indonesian Journal of Business Intelligence (IJUBI), 5(1), 1. https://doi.org/10.21927/ijubi.v5i1.2126
Ratnasari, A., Harahap, A. A., Anshori, A. A., & Alam, M. (2021). Adopting task technology fit model on e-voting technology. International Journal of Informatics and Communication Technology (IJ-ICT), 10(2), 148-158. https://doi.org/10.11591/ijict.v10i2.pp148-158
Riadi, I., Riyadi Yanto, I. T., & Handoyo, E. (2020). Cyber Security Analysis of Academic Services based on Domain Delivery Services and Support using Indonesian E-Government Ratings (PEGI). Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control, 4, 263–270. https://doi.org/10.22219/kinetik.v5i4.1083
Rochmadi, T. (2019). Deteksi Bukti Digital Pada Adrive Cloud Storage Menggunakan Live Forensik. Cyber Security dan Forensik Digital, 2(2), 65-68. https://doi.org/10.14421/csecurity.2019.2.2.1455
Rochmadi, T., Wicaksono, Y., & Nisa, N. D. (2020). Digital evidence identification of Android device using live forensics acquisition on cloud storage (iDrive). International Journal of Computer Applications, 175(26), 40-43.
Savitri, R., Firmansyah, Dworo, & Hasibuan, M. S. (2024). Information Security Measurement using INDEX KAMI at Metro City. Journal of Applied Data Sciences, 5(1), 33–45. https://doi.org/10.47738/jads.v5i1.152
Siagian, S. (2016). Analisis Ancaman Keamanan Pada Sistem Informasi Manajemen Di Rumah Sakit Rimbo Medica Jambi 2015. Scientia Journal Stikes Prima Jambi, 4(4), 371–375.
Shojaei, P., Vlahu-Gjorgievska, E., & Chow, Y. W. (2024). Security and Privacy of Technologies in Health Information Systems: A Systematic Literature Review. Computers, 13(2), 41. https://doi.org/10.3390/computers13020041
Tawar, T., Riadi, I., Siregar, A. A., & Pratiwi, A. G. (2022). Security on Charity Crowdfunding Services using KAMI Index 4.1. Engineering Science Letter, 1(01), 15-19. https://doi.org/10.56741/esl.v1i01.61
Wibowo, R. M., & Sulaksono, A. (2021). Web vulnerability through Cross Site Scripting (XSS) detection with OWASP security shepherd. Indonesian Journal of Information Systems, 3(2), 149-159. https://doi.org/10.24002/ijis.v3i2.4192
Wijaya, Y. D. (2021). Evaluasi Kemananan Sistem Informasi Pasdeal Berdasarkan Indeks Keamanan Informasi (Kami) Iso/Iec 27001:2013. Jurnal Sistem Informasi Dan Informatika (Simika), 4(2), 115–130. https://doi.org/10.47080/simika.v4i2.1178
Xu, L., Jiang, C., Wang, J., Yuan, J., & Ren, Y. (2014). Information Security in Big Data: Privacy and Data Mining. Ieee Access, 2, 1149-1176. https://doi.org/10.1109/access.2014.2362522
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Suryanto Nugroho, Tri Rochmadi

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.