Analisis bibliometrik tentang perkembangan keamanan informasi dalam konteks tata kelola IT di pemerintahan
Abstract
In the rapidly evolving digital era, information security has become a critical aspect of IT governance in government. This study aims to map the development and research trends related to information security within the context of IT governance in government through a bibliometric analysis. Data were collected using Publish or Perish with Google Scholar, employing the keyword "IT Governance" and covering the years 2010-2024. The analysis was conducted using VOSviewer for visualization. The results indicate two main clusters in this research area: e-government and information security management. The overlay and density visualizations highlight the most prominent research areas and their intensity. Trend analysis shows an increased focus on information security, the implementation of AI and IoT, and the role of leadership in IT governance. This study contributes to academia by identifying future research directions, to practitioners by understanding trends and best practices, and to policysmakers by developing effective policies. Using bibliometric analysis and visualization tools, this research reveals patterns, trends, and gaps in the literature, providing valuable contributions to the development of knowledge and practice in IT governance and information security in government.
Downloads
References
AL-Azazi, O. A. A. S., Norman, A. A., & Ghani, N. B. A. (2022). Bring Your Own Device Information Security Policy Compliance Framework: A Systematic Literature Review and Bibliometric Analysis (2017–2022). 2022 International Conference on Cyber Resilience (ICCR), 01–08.
Elis, D., Syarifuddin, M., Rasyid, Darmawati, P., Mediawati, P. E., & Rasyid, P. S. (2024). New trends and directions in local government finance research: A bibliometric analysis. Public and Municipal Finance. https://api.semanticscholar.org/CorpusID:270823195
Firmansyah, M., & Yuswanto, A. (2022). Knowledge management for information security incident handling at Security Operation Center of Jakarta Provincial Government. Monas: Jurnal Inovasi Aparatur. https://api.semanticscholar.org/CorpusID:255695553
Hassan, R. G., & Khalifa, O. O. (2016). E-Government—An information security perspective. International Journal of Computer Trends and Technology, 36, 1–9.
Khairi, A. S., Putrawan, P., Nugraha, R. K., & Ikhwan, A. (2023). Analysis Of Information Security It Governance With Cobit 5 Framework At PT. Indonesia Comnets Plus (ICON+) SUMBAGUT. Jurnal Penelitian Dan Pengkajian Ilmiah Eksakta. https://api.semanticscholar.org/CorpusID:261391653
Koibichuk, V., & Dotsenko, T. (2023). Content and Meaning of Financial Cyber Security: A Bibliometric Analysis. Financial Markets, Institutions and Risks. https://api.semanticscholar.org/CorpusID:258273912
Kuzior, A., & Sira, M. (2022). A Bibliometric Analysis of Blockchain Technology Research Using VOSviewer. Sustainability. https://api.semanticscholar.org/CorpusID:250374971
Masilela, L., & Nel, D. (2021). The role of data and information security governance in protecting public sector data and information assets in national government in South Africa. Africa’s Public Service Delivery and Performance Review. https://api.semanticscholar.org/CorpusID:234289250
Parkhomenko-Kutsevil, O. (2022). PROBLEMS OF INFORMATION SECURITY DURING MILITARY OPERATIONS AND HOSTILITIES. Public Management and Administration in Ukraine. https://api.semanticscholar.org/CorpusID:248954326
Ramlan, N. H. Y., & Hasibuan, Z. A. (2018). Information System Strategic Planning for Local Government Based on Business Model Canvas: A Case Study at Lebak Regency. Proceedings of the 2018 2nd High Performance Computing and Cluster Technologies Conference. https://api.semanticscholar.org/CorpusID:53035746
Rogerson, K. S., & Milton, D. (2013). A Policymaking Process “Tug-of-War”: National Information Security Policies in Comparative Perspective. Journal of Information Technology & Politics, 10, 462–476.
Tegethoff, T. M., Santa, R. A., Daú, G. L., & Cortes, J. (2023). Online security in e-government as an antecedent of cost-effectiveness and quality in business operations. Inf. Comput. Secur., 31, 125–144.
Triono, T., Darmayanti, R., Saputra, N. D., & Makwana, G. (2023). Open Journal System: Assistance and training in submitting scientific journals to be well-indexed in Google Scholar. Jurnal Inovasi Dan Pengembangan Hasil Pengabdian Masyarakat. https://api.semanticscholar.org/CorpusID:265418955
Copyright (c) 2024 Briyana Qusnul Kholifah, Syahiduz Zaman

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work’s authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal’s published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.



