Integrasi Faktor Manusia dalam Tata Kelola Keamanan Siber Berbasis Cloud: Studi Pengembangan Framework

Authors

  • Kevin Maulana Firdaus Universitas Negeri Surabaya

DOI:

https://doi.org/10.70038/jentik.v3i3.194

Keywords:

cybersecurity, governance, cloud computing, human factors, framework

Abstract

This study aims to develop a cloud-based cybersecurity governance framework that integrates human factors as a central element. A qualitative approach with a conceptual framework development design was employed through literature review, needs analysis, People–Process–Technology model design, and conceptual implementation simulation. The results indicate that integrating human factors, governance processes, and technical controls into a unified framework provides a more holistic and adaptive approach to cybersecurity management in digital organizations. The proposed framework positions humans as active actors in the security system, supported by policies, standard operating procedures, and cloud security technologies. This study contributes theoretically to the development of cybersecurity governance research and practically serves as an initial reference for organizations in designing human-centered cybersecurity strategies in cloud environments.

References

R. von Solms and J. van Niekerk, “From information security to cyber security,” Computers & Security, vol. 38, pp. 97–102, 2013.

M. A. Sasse, S. Brostoff, and D. Weirich, “Transforming the ‘weakest link’: A human/computer interaction approach to usable and effective security,” BT Technology Journal, vol. 19, no. 3, pp. 122–131, 2001.

Setya Hadi, H. (2025). INTERNET OF THING (IOT): PRINSIP DAN IMPLEMENTASINYA.

K. Parsons, A. McCormac, M. Butavicius, M. Pattinson, and C. Jerram, “The human aspects of information security questionnaire (HAIS-Q): Two further validation studies,” Computers & Security, vol. 66, pp. 40–51, 2017.

Setya Hadi, H., & AZIZAH, M. (2024). PERANCANGAN SISTEM ANTRIAN DENGAN SPEECH RECOGNITION BERBASIS WEB PADA PUSKESMAS GASAN GADANG KAB. PADANG PARIAMAN. Jurnal Manajemen Teknologi Informatika, 2(3), 154-160.

ISO/IEC 27001:2022, Information Security, Cybersecurity and Privacy Protection Information Security Management Systems Requirements, International Organization for Standardization, 2022.

National Institute of Standards and Technology, Framework for Improving Critical Infrastructure Cybersecurity, Version 1.1, NIST, Gaithersburg, MD, USA, 2018.

B. Schneier, Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World, New York, NY, USA: W. W. Norton & Company, 2015.

Hadi, H. S., Yahyan, W., & Sabriani, M. (2025). Penerapan UML dan Metode Waterfall pada Sistem Pelacakan Sertifikat Tanah Berbasis Web. Journal of Informatics Management and Information Technology, 5(3), 292-301.

Cloud Security Alliance, Security Guidance for Critical Areas of Focus in Cloud Computing, v4.0, Cloud Security Alliance, 2017.

Verizon, 2023 Data Breach Investigations Report, Verizon Enterprise, 2023.

A. Behl and K. Behl, Cyberwar: The Next Threat to National Security and What to Do About It, Oxford, UK: Oxford University Press, 2017.

P. P. Tallon, “Do you see what I see? The search for consensus among executives’ perceptions of IT business value,” European Journal of Information Systems, vol. 17, no. 4, pp. 306–325, 2008.

S. Flowerday and R. von Solms, “Trust: An element of information security,” Information Management & Computer Security, vol. 13, no. 4, pp. 288–297, 2005.

D. McLeod and R. Schell, Management Information Systems, 12th ed., Boston, MA, USA: Pearson Education, 2014.

rahul vandra and H. S. Hadi, “WEB-BASED TOURISM INFORMATION SYSTEM IN BUNGUS TELUK KABUNG SUB-DISTRICT OFFICE”, JENTIK, vol. 2, no. 2, pp. 109-116, Aug. 2024.

Mulawarman Munsyir, S. E., SI, S., Kom, M., Hadi, H. S., Kom, S., Kom, M., ... & Vandika, A. Y. (2024). Algoritma dan Pemrograman: Pendekatan Komprehensif. YPAD Penerbit.

Downloads

Published

2025-12-30

How to Cite

Firdaus, K. M. . (2025). Integrasi Faktor Manusia dalam Tata Kelola Keamanan Siber Berbasis Cloud: Studi Pengembangan Framework. Jurnal Manajemen Teknologi Informatika, 3(3), 190 - 198. https://doi.org/10.70038/jentik.v3i3.194