Information Security Governance and Management Capability Assessment: A Lesson Learned from Directorate General of Taxes
Main Article Content
Abstract
Article Details
JPPI provides immediate open access to its content on the principle that making research freely available to the public to supports a greater global exchange of knowledge.
JPPI by MCIT/Kemenkominfo is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License. Permissions beyond the scope of this license may be available at https://kominfo.go.id/.
References
DAMA, DAMA-DMBOK2 Framework, V.2. DAMA International, 2017.
T. C. Zhiling, “Strategic value alignment for information security management: a critical success factor analysis,” Inf. & Comput. Secur., vol. 26, no. 2, pp. 150–170, Jan. 2018.
F. Piedrabuena, L. González, and R. Ruggia, “Enforcing data protection regulations within e-Government Master Data Management Systems,” in 17th International Conference on Enterprise Information Systems, ICEIS 2015, 2015, vol. 3, pp. 316–321.
T. Ioanna, “From theory to practice: guidelines for enhancing information security management,” Inf. & Comput. Secur., vol. 27, no. 3, pp. 326–342, Jan. 2019.
A. Da Veiga and J. H. P. Eloff, “An information security governance framework,” Inf. Syst. Manag., vol. 24, no. 4, pp. 361–372, 2007.
A. C. Johnston and R. Hale, “Improved Security Through Information Security Governance,” Commun. ACM, vol. 52, no. 1, pp. 126–129, Jan. 2009.
I. C. Vicente Aceituno, Information Security Management Maturity Model Handbook, v02 ed. Madrid, Spain: ISM3 Consortium, 2007.
P. Kusumah, S. Sutikno, and Y. Rosmansyah, “Model design of information security governance assessment with collaborative integration of COBIT 5 and ITIL (case study: INTRAC),” in 2014 International Conference on ICT For Smart Society (ICISS), 2014, pp. 1–6.
Y. Rimawati and S. Sutikno, “The assessment of information security management process capability using ISO/IEC 33072:2016 (Case study in Statistics Indonesia),” in 2016 International Conference on Information Technology Systems and Innovation (ICITSI), 2016, pp. 1–6.
S. Yulianto, C. Lim, and B. Soewito, “Information security maturity model: A best practice driven approach to PCI DSS compliance,” in 2016 IEEE Region 10 Symposium (TENSYMP), 2016, pp. 65–70.
S. M. Muthukrishnan and S. Palaniappan, “Security metrics maturity model for operational security,” in 2016 IEEE Symposium on Computer Applications Industrial Electronics (ISCAIE), 2016, pp. 101–106.
M. Carcary, K. Renaud, S. McLaughlin, and C. O’Brien, “A Framework for Information Security Governance and Management,” IT Prof., vol. 18, no. 2, pp. 22–30, Mar. 2016.
ISO, “Information technology -- Security techniques -- Systems Security Engineering -- Capability Maturity Model,” Geneva, CH, Oct. 2008.