CFP last date
20 December 2024
Reseach Article

Assessment of Information Security Readiness on Crowd funding System using KAMI Index 4.2

by Ariqah Adliana Siregar, Imam Riadi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 184 - Number 24
Year of Publication: 2022
Authors: Ariqah Adliana Siregar, Imam Riadi
10.5120/ijca2022922289

Ariqah Adliana Siregar, Imam Riadi . Assessment of Information Security Readiness on Crowd funding System using KAMI Index 4.2. International Journal of Computer Applications. 184, 24 ( Aug 2022), 35-41. DOI=10.5120/ijca2022922289

@article{ 10.5120/ijca2022922289,
author = { Ariqah Adliana Siregar, Imam Riadi },
title = { Assessment of Information Security Readiness on Crowd funding System using KAMI Index 4.2 },
journal = { International Journal of Computer Applications },
issue_date = { Aug 2022 },
volume = { 184 },
number = { 24 },
month = { Aug },
year = { 2022 },
issn = { 0975-8887 },
pages = { 35-41 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume184/number24/32463-2022922289/ },
doi = { 10.5120/ijca2022922289 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:22:19.667038+05:30
%A Ariqah Adliana Siregar
%A Imam Riadi
%T Assessment of Information Security Readiness on Crowd funding System using KAMI Index 4.2
%J International Journal of Computer Applications
%@ 0975-8887
%V 184
%N 24
%P 35-41
%D 2022
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Technological developments are multiplying. The charity currently has a crowdfunding service. This service helps simplify the user management process. Security is a crucial issue to support and guarantee funders. This study aims to evaluate and provide recommendations for crowdfunding services to run safely and smoothly using the KAMI Index 4.2. This research consists of several steps, starting with observations made at charitable institutions and continued through focus group discussion activities to assess crowdfunding services' level of information security. Based on the assessment results, crowdfunding services at charities obtained a completeness level score of 165 and maturity levels I to I+, which indicates that the charity is still in its initial condition and has not implemented information security standards in managing crowdfunding services. The analysis of the calculation results is used as the basis for developing recommendations. Recommendations proposed to increase the value are carried out by compiling and implementing information security at the charity.

References
  1. M. Yunella, A. D. Herlambang, and W. H. N. Putra, “Evaluation of Information Security Governance at the Malang City Communication and Information Office Using KAMI Index,” … Teknol. Inf. dan …, vol. 3, no. 10, pp. 9552–9559, 2020, [Online]. Available: http://j-ptiik.ub.ac.id/index.php/j-ptiik/article/view/6521.
  2. A. F. Manullang, C. Candiwan, and L. D. Harsono, “Information Security Assessment Using the Information Security Index (KAMI) at XYZ Institution,” Journal of Information Engineering and Educational Technology, vol. 1, no. 2. p. 73, 2017, doi: 10.26740/jieet.v1n2.p73-82.
  3. M. R. Slamet, F. Wulandari, and D. Amalia, “Assessment of Technology Security in Electronic Learning Systems Using the Information Security Index at Batam State Polytechnic,” J. Appl. Bus. Adm., vol. 3, no. 1, pp. 162–171, 2019, doi: 10.30871/jaba.v3i1.1305.
  4. T. Informatika, U. Sam, R. Manado, J. Kampus, and U. Bahu, “Implementation of KAMI Index At Sam Ratulangi University,” J. Tek. Inform., vol. 12, no. 1, 2017, doi: 10.35793/jti.12.1.2017.17869.
  5. F. H. Purwanto and M. Huda, “Measurement of XYZ College Information Security Level Using Information Security Index (KAMI) Based on ISO/IEC-27001:2013,” J. VOI (Voice Informatics), no. 4, pp. 31–40, 2019, [Online]. Available: https://voi.stmik-tasikmalaya.ac.id/index.php/voi/article/view/162.
  6. J. Tukad and B. No, “Information Technology Security Level Assessment Using Information Security Methods (WE) And Vulnerability Assessment,” Jutisi J. Ilm. Tek. Inform. dan Sist. Inf., vol. 9, pp. 173–184, 2020.
  7. T. E. WIJATMOKO, “Evaluation of Information Security Using the Information Security Index (KAMI) at the Regional Office of the Ministry of Law and Human Rights Diy,” Cyber Secur. dan Forensik Digit., vol. 3, no. 1, pp. 1–6, 2020, doi: 10.14421/csecurity.2020.3.1.1951.
  8. A. R. Riswaya, A. Sasongko, and A. Maulana, “Evaluation of Information Technology Security Governance Using KAMI Index for Preparation of Sni Iso/Iec 27001 Standard (Case Study: Stmik Mardira Indonesia),” J. Comput. Bisnis, Vol. 14, No. 1, Juni 2020, 10-18 ISSN 1978-9629, ISSN 2442-4943, vol. 14, no. 1, pp. 10–18, 2020.
  9. M. Ifas, “Analysis of Publications and Financial Statements Lazismu Based on PSAK No. 45 (Case Study of Lazismu Menteng, Central Jakarta),” J. Ekon. Islam, vol. 9, no. November 2018, pp. 46–74, 2018.
  10. R. A. Izdihar and T. Widiastuti, “The Role of the Surabaya Muhammadiyah Amil Zakat Institution (Lazismu) in Empowering Women MSMEs in Surabaya through the Utilization of Infaq and Shadaqah Funds,” J. Ekon. Syariah Teor. dan Terap., vol. 6, no. 3, p. 525, 2020, doi: 10.20473/vol6iss20193pp525-540.
  11. H. Hambali and P. Musa, “Analysis of Governance Security Management Information System Using Index Kami in Central Government Institution,” Angkasa J. Ilm. Bid. Teknol., vol. 12, no. 1, 2020, doi: 10.28989/angkasa.v12i1.563.
  12. D. Ariyadi, H. Kusbandono, and I. P. Astuti, "Recommended IT Infrastructure Improvements in Vocational Schools Based on Maturity Level Evaluation with the Cobit 4.1 Framework,"J-SAKTI (Jurnal Sains Komput. dan Inform., vol. 3, no. 1, p. 80, 2019, doi: 10.30645/j-sakti.v3i1.90.
  13. R. D. Pribadi, Y. Herry, A. I. Hadiana, and W. Witanti, "Measuring the Maturity Level of Information Technology Based on Itil V.3 at Jenderal Achmad Yani University,"J. Ilm. Teknol. Inf. Terap., vol. IV, no. 1, pp. 11–17, 2017.
  14. E. R. Pratama, Suprapto, and A. R. Perdanakusuma, "Evaluation of Information Technology Security System Governance Using the KAMI Index and ISO 27001: A Case Study of KOMINFO East Java Province,"J. Pengemb. Teknol. Inf. dan Ilmu Komput., vol. 2, no. 11, pp. 5911–5920, 2018, [Online]. Available: http://j-ptiik.ub.ac.id/index.php/j-ptiik/article/view/3465.
  15. N. Luh, P. Ning, and S. Putri, “E-Government Information Security Assessment Using the Information Security Index (Us) 4 . 0,"J. Teknol. Inf. dan Komput., vol. 6, no. 2, pp. 238–244, 2020.
  16. Y. C. Yuze, Y. Priyadi, and . C.,"Analysis of Information Security Management Systems Using ISO/IEC 27001: 2013 and Recommendations for System Models Using Data Flow Diagrams at the Directorate of Higher Education Information Systems,"J. Sist. Inf. Bisnis, vol. 6, no. 1, p. 38, 2016, doi: 10.21456/vol6iss1pp38-45.
  17. R. Umar, I. Riadi, and E. Handoyo, “Information System Security Analysis Based on COBIT 5 Framework Using Capability Maturity Model Integration (CMMI),”J. Sist. Inf. Bisnis, vol. 9, no. 1, p. 47, 2019, doi: 10.21456/vol9iss1pp47-54.
  18. N. A. Widodo and and A. F. R. , R. Rizal Isnanto, “Planning and Implementation of Information Security Management System Based on Iso/Iec 27001:2005 Standard (Case Study in a National Private Bank),” vol. 4, no. 1, pp. 60–66, 2016.
  19. A. C. D. Tinungki, S. R. Sentinuwo, and S. Karouw, "Analysis of the Maturity Level of Information Security Application of the Bitung City Government Using the KAMI Index (Case Study: Office of Communication and Informatics ..."Repo.Unsrat.Ac.Id, pp. 1–8, 2021, [Online]. Available: http://repo.unsrat.ac.id/2963/.
  20. W. Apriandari and A. Sasongko, “Analysis of Information Security Management Systems Using Sni Iso / Iec 27001: 2013 in the Regional Government of Sukabumi City (Case Study: At Diskominfo Sukabumi City),” Ilm. SANTIKA, vol. 8, no. 1, pp. 715–729, 2018.
  21. N. Matondang, I. N. Isnainiyah, and A. Muliawatic, "Information System Data Security Risk Management Analysis (Case Study: XYZ Hospital),"J. RESTI (Rekayasa Sist. dan Teknol. Informasi), vol. 2, no. 1, pp. 282–287, 2018, doi: 10.29207/resti.v2i1.96.
  22. W. C. Pamungkas and F. T. Saputra, "Evaluation of Information Security at SMA N 1 Sentolo Based on the Information Security Index (KAMI) ISO/IEC 27001:2013,"J. Sist. Komput. dan Inform., vol. 1, no. 2, p. 101, 2020, doi: 10.30865/json.v1i2.1924.
  23. M. I. Rosadi and L. Hakim, "Measurement and Evaluation of Yudharta University SIAKAD Security Using the KAMI Index,"Explor. IT J. Keilmuan Apl. Tek. Inform. Univ. Yudharta Pasuruan, vol. 7, no. 1, pp. 33–42, 2015.
  24. A. S. Anas, I. G. A. S. D. G. Utami, A. B. Maulachela, and A. Juliansyah, “KAMI index as an evaluation of academic information system security at XYZ university,” Matrix J. Manaj. Teknol. dan Inform., vol. 11, no. 2, pp. 55–62, 2021, doi: 10.31940/matrix.v11i2.2447.
  25. I. P. N. Hartawan and M. Sudarma, “ISMS Evaluation Using KAMI Index v.4 Based on ISO/IEC 27001:2013 (Case Study: Koperasi XYZ),” vol. 6, no. 2, pp. 4–7, 2021.
Index Terms

Computer Science
Information Sciences

Keywords

Evaluation Information KAMI Index Security Crowdfunding.