Evaluation of Village Information System Maturity Using the KAMI Index: A Case Study of Indraloka Mukti Village and Its Significance in Information Security Readiness
DOI:
https://doi.org/10.38035/dijemss.v6i1.3509Keywords:
Evaluation, Village, Security System, ISO/IEC 27001, KAMI IndexAbstract
Information systems are important in managing village data and information, including population data, correspondence administration, and other public services. One of the villages that implemented an information system is Indraloka Mukti village in the Way Kenanga sub-district, Tulang Bawang Barat district. With the implementation of information technology, various risks emerge that can threaten the security of information systems. Considering the importance of information systems in village operations, it is necessary to identify, evaluate, and manage risks to existing information systems. The measuring tool in this research is the KAMI Index (Information Security). The results of the assessment of information security readiness in Indraloka Mukti Village using the KAMI Index show that the electronic system received a score of 17 and is included in the "High" Category; Information security received a score of 90 out of 645, falling within the "Inadequate" Level of Readiness to meet ISO/IEC 270001 standards. All parts of the information security system must be updated, with the lowest maturity level at Level I and the highest at level I+.References
Badan Siber dan Sandi Negara, “Peraturan Badan Siber dan Sandi Negara Nomor 8 Tahun 2020 Tentang Sistem Pengamanan Dalam Penyelenggaraan Sistem Elektronik,” p. 20, 2020.
D. Dwi Prasetyowati, I. Gamayanto, and S. wibowo, “Evaluasi Manajemen Keamanan Informasi Menggunakan Indeks KAMI Berdasarkan ISO/IEC 27001:2013 pada Politeknik Ilmu Pelayaran Semarang Evaluation of Information Security Management Using KAMI Based on ISO / IEC 27001: 2013: The case of Politeknik Ilmu Pelay,” ? 65 Journal of Information System, vol. 4, no. 1, pp. 65–75, 2019.
D. I. Khamil, “Evaluasi Tingkat Kesiapan Keamanan Informasi Menggunakan Indeks Kami 4.2 dan ISO/IEC 27001:2013 (Studi Kasus?: Diskominfo Kabupaten Gianyar),” JATISI (Jurnal Teknik Informatika dan Sistem Informasi), vol. 9, no. 3, pp. 1948–1960, 2022, doi: 10.35957/jatisi.v9i3.2310.
D. Rusdianto and F. Firmansyah, “Analisis Pemanfaatan Web Sistem Informasi Desa Di Desa Dukuh Kecamatan Ibun Kab Bandung,” Jurnal Sistem Informasi, J-SIKA, vol. 4, no. 1, 2022.
F. Sulistyowati, H. S. Tyas, M. C. C. R. Dibyorini, and C. Puspitosari, “Pemanfaatan Sistem Informasi Desa (SID) untuk Mewujudkan Smart Village di Kalurahan Panggungharjo DIY (Utilization of Sistem Informasi Desa (SID) to Realize Smart Village in Kalurahan Panggungharjo, Sewon, Bantul, DI Yogyakarta),” JURNAL IPTEKKOM Jurnal Ilmu Pengetahuan & Teknologi Informasi, vol. 23, no. 2, pp. 213–226, 2021, doi: 10.17933/iptekkom.23.2.2021.213-226.
Febrianto, “Panduan Fasilitasi Replikasi dan Pelembagaan Pengembangan Sistem Informasi Desa (SID),” pp. 1–34, 2021.
H. Taherdoost, “How to Conduct an Effective Interview; A Guide to Interview Design in Research Study,” 2022. [Online]. Available: www.elvedit.com
I. Shammugam, G. N. Samy, P. Magalingam, N. Maarop, S. Perumal, and B. Shanmugam, “Information security threats encountered by Malaysian public sector data centers,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 21, no. 3, pp. 1820–1829, 2021, doi: 10.11591/ijeecs.v21.i3.pp1820-1829.
J. L. Sandoval, L. Andrade-Arenas, D. Hernandez Celis, and M. Cabanillas-Carbonell, “Enterprise information security risks: a systematic review of the literature,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 31, no. 3, pp. 1589–1604, 2023, doi: 10.11591/ijeecs.v31.i3.pp1589-1604.
L. D. A. Jelita, M. N. Al Azam, and A. Nugroho, “Evaluasi Keamanan Teknologi Informasi Menggunakan Indeks Keamanan Informasi 5.0 dan ISO/EIC 27001:2022,” Jurnal SAINTEKOM, vol. 14, no. 1, pp. 84–94, Mar. 2024, doi: 10.33020/saintekom.v14i1.623.
L. N. Amali, M. R. Katili, S. Suhada, L. Hadjaratie, and H. Mardlatillah, “Technology Acceptance Model in Government Context: A Systematic Review on the Implementation of IT Governance in a Government Institution,” Jurnal Online Informatika, vol. 7, no. 1, p. 80, Jun. 2022, doi: 10.15575/join.v7i1.853.
M. A. Adinata, R. E. Putera, and K. Kusdarini, “PENYELENGGARAAN SISTEM PEMERINTAHAN BERBASIS ELEKTRONIK DI LINGKUNGAN PEMERINTAH KOTA BATAM,” Dialogue: Jurnal Ilmu Administrasi Publik, vol. 6, no. 1, pp. 2685–3582, 2024, doi: 10.14710/dialogue.v6.i1.22071.
M. B. R. Burhan and A. Syazili, “Perancangan Sistem Informasi Indeks KAMI,” Journal of Computer and Information Systems Ampera, vol. 2, no. 3, pp. 208–227, 2021, doi: 10.51519/journalcisa.v2i3.119.
M. H. Koniyo, I. A. D. Giriantari, M. Sudarma, and N. M. A. E. D. Wirastuti, "Electronic Government system measurement model: a systematic testing of e-government implementation," Indonesian Journal of Electrical Engineering and Computer Science, vol. 32, no. 2, pp. 845–856, Nov. 2023, doi: 10.11591/ijeecs.v32.i2.pp845-856.
M. Matitah, S. Arifin, S. Sumarto, and W. Widiyanto, “Confronting E-Government Adoption in Indonesian Local Government,” Journal of Indonesian Legal Studies, vol. 6, no. 2, pp. 279–306, 2021, doi: 10.15294/jils.v6i2.47795.
N. Zainuddin, W. W. Winarno, N. Ningsi, Y. P. Pasrun, and M. Muliyadi, “It governance evaluation at the population and civil registry office in Kolaka district using COBIT 5 framework,” Register: Jurnal Ilmiah Teknologi Sistem Informasi, vol. 6, no. 2, pp. 86–95, 2020, doi: 10.26594/register.v6i2.1728.
P. Sundari and W. Wella, “SNI ISO/IEC 27001 dan Indeks KAMI: Manajemen Risiko PUSDATIN (PUPR),” Ultima InfoSys?: Jurnal Ilmu Sistem Informasi, vol. 12, no. 1, pp. 35–42, 2021, doi: 10.31937/si.v12i1.1701.
R. Dewantara and B. Sugiantoro, “Evaluasi Manajemen Keamanan Informasi Menggunakan Indeks Keamanan Informasi (KAMI) pada Jaringan (Studi Kasus: UIN Sunan Kalijaga Yogyakarta),” Jurnal Teknologi Informasi dan Ilmu Komputer, vol. 8, no. 6, p. 1137, 2021, doi: 10.25126/jtiik.2021863123.
R. Fiati, Widowati, and D. M. K. Nugraheni, “Service quality model analysis on the acceptance of information system users’ behavior,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 30, no. 1, pp. 444–450, Apr. 2023, doi: 10.11591/ijeecs.v30.i1.pp444-450.
R. W. Anwar, A. Zainal, and S. Iqbal, “Systematic literature review on designing trust-based security for WSNs,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 14, no. 3, pp. 1395–1404, 2019, doi: 10.11591/ijeecs.v14.i3.pp1395-1404.
R. Y. Rahman and M. S. Hasibuan, “Evaluasi Keamanan Informasi Pada Sman 1 Tanggamus Menggunakan Indeks Kami Versi 4.2,” Jurnal Fasilkom, vol. 13, no. 2, pp. 181–187, 2023.
S. Yuliani, N. T. Ramadhini, A. I. Gustisyaf, and A. Wahyudin, “Asesmen Keamanan Informasi Menggunakan Indeks Kami,” Naratif?: Jurnal Nasional Riset, Aplikasi dan Teknik Informatika, vol. 2, no. 1, pp. 1–5, 2020, doi: 10.53580/naratif.v2i1.76.
T. Ariyadi, I. Irham, and E. F. Cahyadi, “An Evaluation of Wireless Network Security with Penetration Testing Method at PT PLN UP2D S2JB,” Jurnal Infotel, vol. 16, no. 1, pp. 120–135, 2024, doi: 10.20895/infotel.v16i1.1057.
Y. A. Singgalen, “Strategic Planning of Morotai Tourism Village Information System (SIDEWITA) Using Ward and Peppard Method,” Journal of Information Systems and Informatics, vol. 5, no. 1, pp. 134–149, 2023, doi: 10.51519/journalisi.v5i1.442.
Y. A. Singgalen, H. D. Purnomo, and I. Sembiring, “Exploring MSMEs Cybersecurity Awareness and Risk Management?: Information Security Awareness,” IJCCS (Indonesian Journal of Computing and Cybernetics Systems), vol. 15, no. 3, p. 233, Jul. 2021, doi: 10.22146/ijccs.67010.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Firmansyah Tri Wahyudi, Muhammad Said Hasibuan

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish their manuscripts in this journal agree to the following conditions:
- The copyright on each article belongs to the author(s).
- The author acknowledges that the Dinasti International Journal of Education Management and Social Science (DIJEMSS) has the right to be the first to publish with a Creative Commons Attribution 4.0 International license (Attribution 4.0 International (CC BY 4.0).
- Authors can submit articles separately, arrange for the non-exclusive distribution of manuscripts that have been published in this journal into other versions (e.g., sent to the author's institutional repository, publication into books, etc.), by acknowledging that the manuscript has been published for the first time in the Dinasti International Journal of Education Management and Social Science (DIJEMSS).