Analisis bibliometrik tentang perkembangan keamanan informasi dalam konteks tata kelola IT di pemerintahan

  • Briyana Qusnul Kholifah Program Studi Teknik Informatika, Universitas Islam Negeri Maulana Malik Ibrahim Malang
  • Syahiduz Zaman Program Studi Teknik Informatika, Universitas Islam Negeri Maulana Malik Ibrahim Malang
Keywords: IT governance; information security; e-government; bibliometric analysis; Publish or Perish; VOSviewer

Abstract

In the rapidly evolving digital era, information security has become a critical aspect of IT governance in government. This study aims to map the development and research trends related to information security within the context of IT governance in government through a bibliometric analysis. Data were collected using Publish or Perish with Google Scholar, employing the keyword "IT Governance" and covering the years 2010-2024. The analysis was conducted using VOSviewer for visualization. The results indicate two main clusters in this research area: e-government and information security management. The overlay and density visualizations highlight the most prominent research areas and their intensity. Trend analysis shows an increased focus on information security, the implementation of AI and IoT, and the role of leadership in IT governance. This study contributes to academia by identifying future research directions, to practitioners by understanding trends and best practices, and to policysmakers by developing effective policies. Using bibliometric analysis and visualization tools, this research reveals patterns, trends, and gaps in the literature, providing valuable contributions to the development of knowledge and practice in IT governance and information security in government.

Downloads

Download data is not yet available.

References

AL-Azazi, O. A. A. S., Norman, A. A., & Ghani, N. B. A. (2022). Bring Your Own Device Information Security Policy Compliance Framework: A Systematic Literature Review and Bibliometric Analysis (2017–2022). 2022 International Conference on Cyber Resilience (ICCR), 01–08.

Elis, D., Syarifuddin, M., Rasyid, Darmawati, P., Mediawati, P. E., & Rasyid, P. S. (2024). New trends and directions in local government finance research: A bibliometric analysis. Public and Municipal Finance. https://api.semanticscholar.org/CorpusID:270823195

Firmansyah, M., & Yuswanto, A. (2022). Knowledge management for information security incident handling at Security Operation Center of Jakarta Provincial Government. Monas: Jurnal Inovasi Aparatur. https://api.semanticscholar.org/CorpusID:255695553

Hassan, R. G., & Khalifa, O. O. (2016). E-Government—An information security perspective. International Journal of Computer Trends and Technology, 36, 1–9.

Khairi, A. S., Putrawan, P., Nugraha, R. K., & Ikhwan, A. (2023). Analysis Of Information Security It Governance With Cobit 5 Framework At PT. Indonesia Comnets Plus (ICON+) SUMBAGUT. Jurnal Penelitian Dan Pengkajian Ilmiah Eksakta. https://api.semanticscholar.org/CorpusID:261391653

Koibichuk, V., & Dotsenko, T. (2023). Content and Meaning of Financial Cyber Security: A Bibliometric Analysis. Financial Markets, Institutions and Risks. https://api.semanticscholar.org/CorpusID:258273912

Kuzior, A., & Sira, M. (2022). A Bibliometric Analysis of Blockchain Technology Research Using VOSviewer. Sustainability. https://api.semanticscholar.org/CorpusID:250374971

Masilela, L., & Nel, D. (2021). The role of data and information security governance in protecting public sector data and information assets in national government in South Africa. Africa’s Public Service Delivery and Performance Review. https://api.semanticscholar.org/CorpusID:234289250

Parkhomenko-Kutsevil, O. (2022). PROBLEMS OF INFORMATION SECURITY DURING MILITARY OPERATIONS AND HOSTILITIES. Public Management and Administration in Ukraine. https://api.semanticscholar.org/CorpusID:248954326

Ramlan, N. H. Y., & Hasibuan, Z. A. (2018). Information System Strategic Planning for Local Government Based on Business Model Canvas: A Case Study at Lebak Regency. Proceedings of the 2018 2nd High Performance Computing and Cluster Technologies Conference. https://api.semanticscholar.org/CorpusID:53035746

Rogerson, K. S., & Milton, D. (2013). A Policymaking Process “Tug-of-War”: National Information Security Policies in Comparative Perspective. Journal of Information Technology & Politics, 10, 462–476.

Tegethoff, T. M., Santa, R. A., Daú, G. L., & Cortes, J. (2023). Online security in e-government as an antecedent of cost-effectiveness and quality in business operations. Inf. Comput. Secur., 31, 125–144.

Triono, T., Darmayanti, R., Saputra, N. D., & Makwana, G. (2023). Open Journal System: Assistance and training in submitting scientific journals to be well-indexed in Google Scholar. Jurnal Inovasi Dan Pengembangan Hasil Pengabdian Masyarakat. https://api.semanticscholar.org/CorpusID:265418955

PlumX Metrics

Published
2024-12-31
How to Cite
Kholifah, B., & Zaman, S. (2024). Analisis bibliometrik tentang perkembangan keamanan informasi dalam konteks tata kelola IT di pemerintahan. Maliki Interdisciplinary Journal, 2(12), 180-192. Retrieved from https://urj.uin-malang.ac.id/index.php/mij/article/view/10959
Section
Articles