A Framework for Factors Influencing the Implementation of Information Assurance for e-Government in Indonesia
World Bank, “Technology & Development,” Global Economic Prospects 2008: Technology Diffusion in the Developing World, 2008.
V. Ndou, “E-Government for Developing Countries: Opportunities and Challenges,” EJISDC Electron. J. Inf. Syst. Dev. Ctries., vol. 18, no. 1, pp. 1–24, 2004.
H. Wang and B. L. Rubin, “Embedding e-finance in e-government: a new e-government framework,” Electron. Gov. an Int. J., vol. 1, no. 4, pp. 362–373, 2004.
S. Cohen and W. Eimicke, “The Future of E-Government: A Project of Potential Trends and Issues,” in Proceedings of the 36th Hawaii International Conference on System Sciences (HICSS-36), 2002, vol. 5, no. January, p. 146b (1-10).
I. S. Sipatuhar and Sutaryo, “Faktor-Faktor Penentu Implementasi E-Government Pemerintah Daerah di Indonesia,” Simp. Nas. Akunt. XIX, pp. 24–27, 2016.
Presiden Republik Indonesia, “Kebijakan dan Strategi Nasional Pengembangan E-Government,” Instruksi Presiden Republik Indonesia Nomor 3 Tahun 2003. 2003.
P. T. Jaeger and K. M. Thompson, “E-government around the world: Lessons, challenges, and future directions,” Gov. Inf. Q., vol. 20, no. 4, pp. 389–394, 2003.
S. Basu, “E‐government and developing countries: an overview,” Int. Rev. Law, Comput. Technol., vol. 18, no. 1, pp. 109–132, 2004.
ISO/IEC 27001, “ISO/IEC 27001:2013,” no. September 2014, 2015.
E. A. Hibbard, Introduction to Information Assurance. 2009.
Y. Cherdantseva and J. Hilton, “A Reference Model of Information Assurance & Security,” Proc. 8th ARES Conf. 2013 (ARES 2013), pp. 1–11, 2013.
C. J. May, J. Hammerstein, J. Mattson, and K. Rush, “Defense in Depth: Foundation for Secure and Resilient IT Enterprises,” 2006.
A. Rathmell, S. Daman, K. O’Brien, and A. Anhal, “Engaging the Board Corporate Governance and Information Assurance,” 2004.
A. M. Rugman and S. Collinson, “International Culture,” Int. Bus., pp. 129–158, 2006.
R. Schware, E-development from excitement to effectiveness. 2005.
Z. Fang, “E-Government in Digital Era : Concept , Practice , and Development,” vol. 10, no. 2, pp. 1–22, 2002.
CNSS, “National Information Assurance Glossary,” CNSS Instr. No. 4009, vol. CNSSI No., no. 4009, 2010.
P. Liu, M. Yu, and J. Jing, “Information Assurance,” Handb. Inf. Secur. Inf. Warf. Soc. Leg. Int. Issues Secur. Found. Vol. 2, 2006.
C. Lambrinoudakis, S. Gritzalis, F. Dridi, and G. Pernul, “Security requirements for e-government services: A methodological approach for developing a common PKI-based security policy,” Comput. Commun., vol. 26, no. 16 SPEC., pp. 1873–1883, 2003.
S. Alfawaz, L. May, and K. Mohanak, “E-government security in developing countries : A managerial conceptual framework,” Inf. Syst. Manag., no. March, pp. 26–28, 2007.
P. Upadhyaya, S. Shakya, and M. Pokharel, “Security Framework for E-Government Implementation in Nepal,” J. Emerg. Trends Comput. Inf. Sci., vol. 3, no. 7, pp. 1074–1078, 2012.
F. Setiadi, Y. G. Sucahyo, and Z. A. Hasibuan, “Balanced E-Govemment Security Framework: An Integrated Approach to Protect Information and Application,” in Proceedings of 2013 International Conference on Technology, Informatics, Management, Engineering and Environment, TIME-E 2013, 2013.
T. K. Priyambodo and Y. Prayudi, “Information security strategy on mobile device based egovernment,” ARPN J. Eng. Appl. Sci., vol. 10, no. 2, pp. 652–660, 2015.
S. Wang and Y. Sun, “Research on information security assurance system of E-government,” Proc. - 2009 Int. Conf. Comput. Intell. Softw. Eng. CiSE 2009, 2009.
G. Karokola, S. Kowalski, and L. Yngström, “Secure e-Government Services: Towards A Framework for Integrating IT Security Services into e-Government Maturity Models,” in Information Security South Africa (ISSA) 2011, 2011.
D. A. Booth, The Standard for Information Assurance for Small and Medium Sized (IASME), no. 2.3. The IASME Consortium Ltd and David A. Booth 2013, 2013.
ISACA, COBIT 5 for Assurance. Rolling Meadows, IL 60008 USA: ISACA, 2013.
C. V. Bullen and J. F. Rockart, “A primer on critical success factors,” Work. Pap., no. 69, pp. 1–64, 1981.
G. Bunker, “Technology is not enough: Taking a holistic view for information assurance,” Inf. Secur. Tech. Rep., vol. 17, no. 1–2, pp. 19–25, 2012.
MICT, National Information Assurance Policy 2.0, no. 2.0. 2014., 2014.
C. Cope, “10 Principles for Effective Information Assurance,” 2015.
D. A. Wicaksono, “E-Government in Indonesia : the Opportunities and Challenges,” Development, pp. 1–2, 2003.
J. S. Djumadal, “Implementasi E-Government, Sebuah Harapan Penuh Tantangan Di Provinsi Daerah Istimewa Yogyakarta,” in Konferensi dan Temu Nasional Teknologi Informasi dan Komunikasi untuk Indonesia, 2008.
L. Hardjaloka, “Studi Penerapan E-Government di Indonesia dan Negara Lainnya Sebagai Solusi Pemberantasan Korupsi di Sektor Publik,” RechtsVinding, vol. 3, no. 3, 2014.
H. Ardiyanti, “Cyber-security dan tantangan pengembangannya di indonesia,” Politica, vol. 5, no. dinamika masalah politik dalam negeri dan hubungan internaisonal, pp. 95–110, 2014.
B. D. Anggono, “E-Government Indonesia: Strategi Penyelenggaraan Data Center Pemerintah Indonesia,” 2015.
L. Operananta, “Cyber security: Indonesia’s Challenges and Opportunities to move forward.” 2015.
R. G. Utomo, R. J. Walters, and G. B. Wills, “Factors affecting the implementation of information assurance for eGovernment in Indonesia,” in 2017 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017, 2018.
R. Burge, “Lincolnshire Police Information Assurance Strategy, Standards and Working Practices,” no. June, p. 59, 2014.
M. A. Khalil, B. D. Lanvin, and V. Chaudhry, “The E-Government Handbook for Developing Countries,” AProject InfoDev Cent. Democr. Technol., no. November, 2002.
V. Venkatesh and S. A. Brown, “Bridging the Qualitative–Quantitative Divide: Guidelines for Conducting Mixed Methods Research in Information Systems,” MIS Q. Vol. X No. X, pp. 1-XX/Forthcoming 2012–2013, vol. X, no. X, pp. 1–34, 2013.
J. Recker, Scientific research in information systems: a beginner's guide. Springer Science & Business Media, 2012.
C. Anderson, “Presenting and evaluating qualitative research,” Am. J. Pharm. Educ., vol. 74, no. 8, 2010.
J. Lazar and J. Preece, “Social considerations in online communities: Usability, sociability, and success factors,” Cogn. Digit. world, no. October, pp. 1–46, 2002.
M. Saunders, P. Lewis and A. Thornhill, Research Methods for Business Students. Pearson, New York., 2009.
A.. Bhattacherjee, Social Science Research: principles, methods, and practices, vol. 9. 2012.
G. Guest, A. Bunce, and L. Johnson, “How Many Interviews Are Enough?,” Field methods, vol. 18, no. 1, pp. 59–82, 2006.
A. K. Romney, S. C. Weller, and W. H. Batchelder, “Culture as Consensus: A Theory of Culture and Informant Accuracy,” Am. Anthropol., vol. 88, no. 2, pp. 313–338, 1986.
Y. Rogers, H. Sharp, and J. Preece. Interaction Design: Beyond Human-Computer Interaction. Wiley., 2011.
R. Garland, “The mid-point on a rating scale: Is it desirable?,” Res. Note 3, vol. 2, pp. 66–70, 1991.
Y. Cherdantseva, “Secure * BPMN - a graphical extension for BPMN 2 . 0 based on a Reference Model of Information Assurance & Security,” no. December, 2014.
A. Field, Discovering Statistics Using SPSS, vol. 81, no. 1. 2013.
A. Banerjee, U. Chitnis, S. Jadhav, J. Bhawalkar and S. Chaudhury, "Hypothesis testing, type I and type II errors", Industrial Psychiatry Journal, vol. 18, no. 2, p. 127, 2009. Available: 10.4103/0972-6748.62274.
F. Faul, E. Erdfelder, A. Buchner, and A.-G. Lang, “Statistical power analyses using G*Power 3.1: Tests for correlation and regression analyses,” Behav. Res. Methods, vol. 41, no. 4, pp. 1149–1160, 2009.
V. Braun and V. Clarke, “Using thematic analysis in psychology,” Qual. Res. Psychol., vol. 3, no. 2, pp. 77–101, 2006.
R. G. Utomo, G. B. Wills and R. J. Walters, "Towards Confirming an Information Assurance Framework for eGovernment in Indonesia," 2018 International Conference on ICT for Smart Society (ICISS), Semarang, 2018.
CESG, “The Information Assurance Maturity Model and Assessment Framework,” no. 2.1, 2015.
C. Tannahill, “Information Assurance Strategy NHS Lanarkshire,” no. 4, 2013.
Lazar, J., & Preece, J., 2002. Social considerations in online communities: Usability, sociability, and success factors.
R. G. Utomo, G. B. Wills and R. J. Walters, "Investigating Factors in Information Assurance Implementation: Towards Developing an Information Assurance Framework for eGovernment in Indonesia," 2018 International Conference on Information Technology Systems and Innovation (ICITSI), Bandung - Padang, Indonesia, 2018.
A. Bryman, “Qualitative Data Analysis Qualitative Data,” Soc. Res. methods, pp. 564–589, 2012.
- There are currently no refbacks.
Published by INSIGHT - Indonesian Society for Knowledge and Human Development