Evaluation of Information Security Management Based on ISO/IEC 27001 at Universitas Nasional Library (UNAS)
Main Article Content
Abstract
Article Details

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
How to Cite
References
AL-Dosari, K., & Fetais, N. (2023). Risk-management framework and information-security systems for small and medium enterprises (SMES): A meta-analysis approach. Electronics, 12(17), 3629. DOI 10.3390/electronics12173629
Aslan, Ö., Aktuğ, S. S., Ozkan-Okay, M., Yilmaz, A. A., & Akin, E. (2023). A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions. Electronics, 12(6), 1333. DOI 10.3390/electronics12061333
Bahrudin, M., & Firmansyah, F. (2018). Manajemen keamanan informasi di perpustakaan menggunakan Framework SNI ISO/IEC 27001. Media Pustakawan, 25(1), 43-50. DOI 10.37014/medpus.v25i1.191
Cheng, E. C., & Wang, T. (2022). Institutional strategies for cybersecurity in higher education institutions. Information, 13(4), 192. DOI 10.3390/ info13040192
Clarissa, S., & Wang, G. (2023). Assessing Information Security Management Using ISO 27001:2013 | Jurnal Indonesia Sosial Teknologi. DOI 10.59141/jist.v4i9.739
Creswell, J. W., & Creswell, J. D. (2017). Research design: Qualitative, quantitative, and mixed methods approaches. Sage publications. https://books.google.co.id/books?hl=en&lr=&id=335ZDwAAQBAJ
Dunn Cavelty, M., & Smeets, M. (2023). Regulatory cybersecurity governance in the making: The formation of ENISA and its struggle for epistemic authority. Journal of European Public Policy, 30(7), 1330-1352. DOI 10.1080/13501763.2023.2173274
Farid, G., Warraich, N. F., & Iftikhar, S. (2023). Digital information security management policy in academic libraries: A systematic review (2010–2022). Journal of Information Science, 01655515231160026. DOI 10.1177/01655515231160026
Fattah Ys, Moh. A., Parga Zen, B., & Wasitarini, D. E. (2024). Penerapan Sistem Manajemen Keamanan Informasi ISO 27001 pada Perpusnas RI dalam mendukung Keamanan Tata Kelola Teknologi Informasi. Cyber Security Dan Forensik Digital, 6(2), 76-82. DOI 10.14421/csecurity.2023.6.2.4190
Folorunso, A., Mohammed, V., Wada, I., & Samuel, B. (2024). The impact of ISO security standards on enhancing cybersecurity posture in organizations. World Journal of Advanced Research and Reviews, 24(1), 2582-2595. DOI 10.30574/wjarr.2024.24.1.3169
Galih, A. P. (2020). Keamanan Informasi (Information Security) Pada Aplikasi Perpustakaan IPusnas. AL Maktabah, 5(1), 10. DOI 10.29300/mkt.v5i1.3086
Ikenwe, I. J., & Udem, O. K. (2022). Innovative digital transformation for dynamic information service sustainability in university libraries in Nigeria. DOI 10.12775/FT.2022.004
International Organization for Standardization. (2013). ISO/IEC 27001:2013(en), Information technology—Security techniques—Information security management systems—Requirements. https://www.iso.org/obp/ui/#iso:std:iso-iec:27001:ed-2:v1:en
ISACA. (2019). COBIT | Control Objectives for Information Technologies, ISACA. https://www.isaca.org/resources/cobit
Jevelin, J., & Faza, A. (2023). Evaluation the Information Security Management System: A Path Towards ISO 27001 Certification. Journal of Information Systems and Informatics, 5(4), 1240-1256. DOI 10.51519/journalisi.v5i4.572
Mehmood, T. (2021). Does information technology competencies and fleet management practices lead to effective service delivery? Empirical evidence from e-commerce industry. International Journal of Technology Innovation and Management (IJTIM), 1(2), 14-41. DOI 10.54489/ijtim.v1i2.26
Miles, M. B., Huberman, A. M., & Saldaña, J. (2014). Qualitative Data Analysis: A Methods Sourcebook (3rd ed.). Arizona State University. https://books.google.co.id/books?id=p0wXBAAAQBAJ
Nugroho, A. R., & Legowo, N. (2022). Risk Assessment at it Company by Focusing on Information Security Area Using Iso 27001:2022. Syntax Literate ; Jurnal Ilmiah Indonesia, 7(12), 20307–20324. https://jurnal.syntaxliterate.co.id/index.php/syntax-literate/article/view/15349
Nur Fa’izi, M. B. (2024, October 17). Strategi Pentingnya Disaster Recovery Plan dalam IT Bisnis. https://cyberhub.id/pengetahuan-dasar/disaster-recovery-plan
Onunka, O., Onunka, T., Fawole, A. A., Adeleke, I. J., & Daraojimba, C. (2023). Library and information services in the digital age: Opportunities and challenges. Acta Informatica Malaysia, 7(1), 113-121. DOI 10.26480/aim.02.2023.113.121
Posthumus, S., & von Solms, R. (2004). A framework for the governance of information security. Computers & Security, 23 (8), 638-646. DOI 10.1016/j.cose.2004.10.006
Rahmat, D. (2019). Perencanaan Sistem Manajemen Keamanan Informasi Menggunakan Standar Sni Iso/Iec 27001: 2013. COMPUTING | Jurnal Informatika, 6 (2), 37-41. DOI 10.55222/computing.v6i2.203
Ruthven, I., Robinson, E., & McMenemy, D. (2023). The value of digital and physical library services in UK public libraries and why they are not interchangeable. Journal of Librarianship and Information Science, 55(4), 1143-1154. DOI 10.1177/09610006221127027
San Nicolas-Rocca, T., & Burkhard, R. J. (2019). Information Security in Libraries. Information Technology and Libraries, 38(2), 58–71. DOI 10.6017/ital.v38i2.10973
Spring, M., Faulconbridge, J., & Sarwar, A. (2022). How information technology automates and augments processes: Insights from Artificial‐Intelligence‐based systems in professional service operations. Journal of Operations Management, 68(6-7), 592-618. DOI 10.1002/joom.1215
Taherdoost, H. (2023). An overview of trends in information systems: Emerging technologies that transform the information technology industry. Taherdoost, H. (2023). An overview of trends in information systems: emerging technologies that transform the information technology industry. Cloud Computing and Data Science, 1-16. DOI 10.37256/ccds.4120231653
Wibowo, A. M. (n.d.). Business Continuity Plan & Disaster Recovery Plan.
Yusuf, A. M. (2016). Metode penelitian kuantitatif, kualitatif & penelitian gabungan. Prenada Media. https://books.google.co.id/books?id=RnA-DwAAQBAJ