E-GOVERNMENT SECURITY GOVERNANCE SYSTEM USING COBIT 2019 (APPLICATION STUDY ON AGENCY X)
e-Government or also known as Sistem Pemerintahan Berbasis Elektronik (SPBE) is needed to create clean, effective, transparent and accountable governance as well as to improve quality and to make reliable public services. e-Government is one of the programs under the Bureaucratic Reform which beg...
Saved in:
Main Author: | |
---|---|
Format: | Theses |
Language: | Indonesia |
Online Access: | https://digilib.itb.ac.id/gdl/view/46275 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Institut Teknologi Bandung |
Language: | Indonesia |
Summary: | e-Government or also known as Sistem Pemerintahan Berbasis Elektronik (SPBE) is needed
to create clean, effective, transparent and accountable governance as well as to improve
quality and to make reliable public services. e-Government is one of the programs under the
Bureaucratic Reform which began in 2010. Bureaucratic Reform is an effort of the government
to make fundamental reforms and changes to the system of governance. e-Government in
Indonesia is based on Presidential Regulation Number 95 of 2018 about Sistem Pemerintahan
Berbasis Elektronik. Prior to this regulation, e-Government had been carried out individually
by the Ministry, Institution and Local Government. This resulted in the e-Government not being
integrated. The Presidential Regulation was made to integrate the implementation of the e-
Government in the Ministries, Institutions and Regional Governments. The problem is that
some derivative regulations do not yet exist, so the implementation of e-Government is
constrained.
One of the unregulated derivative regulation is the regulation about e-Government Security.
The absence of regulation about e-Government Security make the implementation of
information security at the e-Government cannot be carried out or must be carried out
independently by each Ministry, Institution, and Regional Government. This will affect the
achievement of the main objectives of the e-Government implementation based on the
Presidential Regulation. To answer this need, this Thesis aims to provide input on performance
management and the e-Government Security governance system. This thesis is expected to
fulfill the adequacy of the e-Government Security (control design) through the e-Government
Security governance system. The result of this thesis is also expected to provide steps to
measure the effectiveness of the regulation (control effectiveness) of the governance system
through e-Government Security performance management.
This thesis uses type 5 of Design Research Methodology (DRM) with. The results of this study
are the e-Government Security governance system taken from 28 main models of COBIT 2019.
The 28 main models were taken using the Critical Success Factor (CSF) and risks from the
entire COBIT 2019 core model. The components governed by this governance system consist
of six parts. The six parts are 1) Process and Information Flow; 2) Organizational Structure;
3) People, Skills and Competencies; 4) Policy and Procedure; 5) Culture, Ethics and Behavior;
and 6) Services, Infrastructure and Applications. Furthermore, performance management for
this governance system consists of capability and maturity levels. The capability and maturity
level are derived from COBIT Performance Management (CPM) based on Capability Maturity
Model Integration (CMMI). Performance management in this Thesis can be used to expand the
4
evaluation of the processes in the e-Government Evaluation Guidelines issued by the Ministry
of PAN & RB.
As an evaluation step for the design, the measurement experiment was carried out at Agency
X. The measurement experiment was carried out specifically at the Pusat Data dan TIK. Pusat
Data dan TIK is the leading sector of information technology at Agency X. The results of the
measurement experiment found that the purpose of developing the e-Government Security
governance system which measured using a performance management system established in
this Thesis is clear, possible to be applied and needed in the agency. In addition, the results of
the measurement experiment can also be used by Agency X as an initial step to make
improvements related to the implementation of e-Government Security carried out by Agency
X. |
---|