Tata Kelola Keamanan Siber di Perusahaan Swasta Indonesia: Studi Kasus PT Bawi Kameloh Sukses Mandiri

Authors

  • Sinta Yunira Universitas Muhammadiyah Jakarta Author
  • Miftahul Ulum Universitas Muhammadiyah Jakarta Author

DOI:

https://doi.org/10.71417/jchi.v2i2.215

Keywords:

Tata Kelola, Keamanan Siber, Cyber Security Governance, Administrasi Ekspor-Impor, Perusahaan Swasta Indonesia

Abstract

Penelitian ini membahas tata kelola keamanan siber di perusahan swasta Indonesia, dengan fokus pada PT Bawi Kameloh Sukses Mandiri. Keamanan siber menjadi krusial dalam operasional administrasi perusahaan, khususnya yang berkaitan dengan surat-menyurat, laporan stok dan keuangan, serta dokumen ekspor-impor. Penelitian ini bertujuan untuk menganalisis implementasi kebijakan keamanan siber, praktik operasional, serta pemahaman dan kesadaran manajemen puncak dalam menjaga keamanan data perusahaan. Metode penelitian yang digunakan adalah deskriptif kualitatif dengan pendekatan studi kasus. Data dikumpulkan melalui wawancara mendalam dengan jajaran manajemen dan puncak, serta analisis dokumen internal perusahaan. Analisis menggunakan teori Cyber Security Governance, dengan memperhatikan praktik keamanan siber berdasarkan regulasi nasional dan standar internasional, seperti ISO 27001. Hasil penelitian menunjukkan bahwa PT Bawi Kameloh Sukses Mandiri telah menerapkan berbagai praktik keamanan siber, termasuk prosedur akses data, enkripsi dokumen, dan pelatihan kesadaran siber untuk manajemen. Namun, tantangan signifikan tetap ada, seperti keterbatasan infrastruktur, ketergantungan pada sistem digital pihak ketiga, dan variasi pemahaman antar unit terkait protokol keamanan. Penelitian ini menyimpulkan bahwa keberhasilan tata kelola keamanan siber sangat bergantung pada integrasi kebijakann formal, pelatihan rutin, dan pemantauan berkelanjutan, sehingga perusahaan dapat meminimalkan risiko kebocoran data dan gangguan operasional.

Downloads

Download data is not yet available.

References

Abdillah, A., Widianingsih, I., Buchari, R., & Nurasa, H. (2024). Big data security & individual (psychological) resilience: A review of social media risks and lessons learned from Indonesia. Array, 21, 100336. https://doi.org/10.1016/j.array.2024.100336

Aini, B., & Chen, M. (2025). Exploring barriers and developing strategies for implementing smart supply chain management with Delphi method and ISM-MICMAC. Research in Transportation Business & Management, 62, 101439. https://doi.org/10.1016/j.rtbm.2025.101439

Attatfa, A., Renaud, K., & Paoli, S. (2020). Cyber diplomacy: A systematic literature review. Procedia Computer Science, 176, 2923–2932. https://doi.org/10.1016/j.procs.2020.08.007

Fischerkeller, M., & Harknett, R. (2017). Deterrence is not a credible strategy for cyberspace. Orbis, 61(3), 381–393. https://doi.org/10.1016/j.orbis.2017.05.003

Glaser, M., Adrianto, L., Breckwoldt, A., Buhari, N., Deswandi, R., Ferse, S., Gorris, P., Paragay, S., Glaeser, B., Mohammad, N., Máñez, K., & Yanuarita, D. (2022). The governance of coastal and marine social–ecological systems: Indonesia and beyond. Dalam Science for the Protection of Indonesian Coastal Ecosystems (SPICE) (hlm. 265–307). Elsevier. https://doi.org/10.1016/B978-0-12-815050-4.00008-0

Hamid, S., & Huda, M. (2025). Mapping the landscape of government data breaches: A bibliometric analysis of literature from 2006 to 2023. Social Sciences & Humanities Open, 11, 101234. https://doi.org/10.1016/j.ssaho.2024.101234

Huda, M. (2024). Renewable energy diplomacy and transitions: An environmental peacebuilding approach. Environmental Innovation and Societal Transitions, 50, 100815. https://doi.org/10.1016/j.eist.2024.100815

Lewis, A. (2026). The Red Queen of cyberspace: The persistence of advanced persistent threats (APTs) explained through co-evolution. Technology in Society, 86, 103238. https://doi.org/10.1016/j.techsoc.2026.103238

Liu, S. (2025). Case studies of big data applications for IoT. Dalam Empowering IoT with Big Data Analytics. Elsevier. https://doi.org/10.1016/B978-0-443-21640-4.00010-7

Perdana, A., Arifin, S., & Quadrianto, N. (2025). Algorithmic trust and regulation: Governance, ethics, legal, and social implications blueprint for Indonesia's central banking. Technology in Society, 81, 102838. https://doi.org/10.1016/j.techsoc.2025.102838

Priharsari, D., Abedin, B., Burdon, S., Clegg, S., & Clay, J. (2023). National digital strategy development: Guidelines and lesson learnt from Asia Pacific countries. Technological Forecasting and Social Change, 196, 122855. https://doi.org/10.1016/j.techfore.2023.122855

Roche, E., & Blaine, M. (2014). International convention for the peaceful use of cyberspace. Orbis, 58(2), 307–321. https://doi.org/10.1016/j.orbis.2014.02.009

Ruohonen, J., Hyrynsalmi, S., & Leppänen, V. (2016). An outlook on the institutional evolution of the European Union cyber security apparatus. Government Information Quarterly, 33(4), 746–756. https://doi.org/10.1016/j.giq.2016.10.003

Runturambi, A., & Arifin, R. (2025). New patterns and trends of migration: Hybrid-crimes among Indonesian migrant workers in Southeast Asia. Regional Science Policy & Practice, 17(2), 100215. https://doi.org/10.1016/j.rspp.2025.100215

Setyowati, M. S., De Utami, N. S., Saragih, A. H., & Hendrawan, A. (2020). Blockchain technology application for value-added tax systems. Journal of Open Innovation: Technology, Market, and Complexity, 6(4), 156. https://doi.org/10.3390/joitmc6040156

Tissayakorn, K. (2025). Comparative analysis of E-government development status of ASEAN member states: Accomplishments and challenges. Sustainable Futures, 10, 101353. https://doi.org/10.1016/j.sftr.2025.101353

Vu, K. M. (2017). ICT diffusion and production in ASEAN countries: Patterns, performance, and policy directions. Telecommunications Policy, 41(10), 962–977. https://doi.org/10.1016/j.telpol.2017.04.005

Yudhoyono, A., Sukoco, B. M., Maharani, I., Putra, I. W. J. A., & Suhariadi, F. (2025). Bridging the gap: Indonesia’s research trajectory and national development through a scientometric analysis using SciVal. Journal of Open Innovation: Technology, Market, and Complexity, 11(2), 100505. https://doi.org/10.1016/j.joitmc.2025.100505

Published

2026-05-15

How to Cite

Tata Kelola Keamanan Siber di Perusahaan Swasta Indonesia: Studi Kasus PT Bawi Kameloh Sukses Mandiri. (2026). Jurnal Cendekia Hukum Indonesia, 2(2), 64-72. https://doi.org/10.71417/jchi.v2i2.215

Similar Articles

21-30 of 104

You may also start an advanced similarity search for this article.