A CYBERSECURITY FRAMEWORK FOR ACADEMIC INFORMATION SYSTEMS IN HIGHER EDUCATION

Authors

  • syawal kurnia putra Universitas Islam Negeri Alauddin Makassar Author
  • Baso Marannu Badan Riset Inovasi Nasional, Indonesia Author

Keywords:

Keamanan siber, sistem informasi akademik, pendidikan tinggi, kerangka kerja

Abstract

Transformasi digital di perguruan tinggi menempatkan sistem informasi akademik sebagai komponen penting dalam pelaksanaan layanan pendidikan. Namun, meningkatnya ancaman siber terhadap data akademik mengungkapkan kelemahan serius dalam tata kelola keamanan informasi. Penelitian ini bertujuan untuk merancang kerangka kerja keamanan siber yang sesuai dengan karakteristik dan kebutuhan perguruan tinggi, berdasarkan pendekatan kualitatif. Data tersebut diperoleh melalui wawancara mendalam dengan manajer TI, dosen, dan pakar keamanan siber dari tiga universitas di Indonesia. Temuan menunjukkan bahwa ketidaksiapan kelembagaan dalam hal kebijakan, budaya keamanan, dan kontrol teknis adalah penyebab utama kerentanan yang tinggi. Hasil ini diperkuat oleh penelitian sebelumnya yang menunjukkan pentingnya integrasi antara aspek teknis dan non-teknis dalam keamanan informasi pendidikan. Penelitian ini menawarkan kerangka kerja keamanan siber berbasis konteks lokal yang relevan untuk diterapkan di perguruan tinggi

Downloads

Download data is not yet available.

References

Akpabio, E. S., Akeju, K. F., & Omotoso, K. O. (2025). E-agriculture and food security in developing countries: beaming the searchlight on Nigeria. Smart Agricultural Technology, 10, 100689. https://doi.org/https://doi.org/10.1016/j.atech.2024.100689

Alhadidi, I., Nweiran, A., & Hilal, G. (2024). The influence of Cybercrime and legal awareness on the behavior of university of Jordan students. Heliyon, 10(12), e32371. https://doi.org/https://doi.org/10.1016/j.heliyon.2024.e32371

Alotaibi, B. A., Abbas, A., Azeem, M. I., Shahbaz, P., ul Haq, S., & Nayak, R. K. (2025). Role of risk perception and climate change beliefs in adoption of climate-resilient agricultural practices in Saudi Arabia. Climate Services, 38, 100552. https://doi.org/https://doi.org/10.1016/j.cliser.2025.100552

Alsmadi, I., & Zarour, M. (2015). Building an Islamic financial information system based on policy managements. Journal of King Saud University - Computer and Information Sciences, 27(4), 364–375. https://doi.org/https://doi.org/10.1016/j.jksuci.2014.11.001

Atzori, M., Calò, E., Caruccio, L., Cirillo, S., Polese, G., & Solimando, G. (2024). Evaluating password strength based on information spread on social networks: A combined approach relying on data reconstruction and generative models. Online Social Networks and Media, 42, 100278. https://doi.org/https://doi.org/10.1016/j.osnem.2024.100278

Brown, D., Batra, G., Zafar, H., & Saeed, K. (2024). Reducing fraud in organizations through information security policy compliance: An information security controls perspective. Computers & Security, 144, 103958. https://doi.org/https://doi.org/10.1016/j.cose.2024.103958

Chapagain, K., Aboelnga, H. T., Babel, M. S., Ribbe, L., Shinde, V. R., Sharma, D., & Dang, N. M. (2022). Urban water security: A comparative assessment and policy analysis of five cities in diverse developing countries of Asia. Environmental Development, 43, 100713. https://doi.org/https://doi.org/10.1016/j.envdev.2022.100713

Dağlı, E., Reyhan, F. A., & Kırca, A. Ş. (2025). Effectiveness of training for student midwives with jigsaw technique on respectful maternity care: A randomized controlled experimental study. Nurse Education in Practice, 85, 104381. https://doi.org/https://doi.org/10.1016/j.nepr.2025.104381

Deja, M., Rak, D., & Bell, B. (2021). Digital transformation readiness: perspectives on academia and library outcomes in information literacy. The Journal of Academic Librarianship, 47(5), 102403. https://doi.org/https://doi.org/10.1016/j.acalib.2021.102403

Edelenbos, J., van Popering-Verkerk, J., Taanman, M., & Stouten, M. (2025). Multilevel governance in times of COVID-19 pandemic. Patterns of legitimacy and governance capacity. Urban Governance, 5(1), 94–102. https://doi.org/https://doi.org/10.1016/j.ugj.2025.02.001

Ekren, E., Hall, R. E., Pierdolla, E., Barnes, V., Jarzombek-Torralva, A., Morrish, D., & Martinez-Prather, K. (2025). Crime prevention through environmental design in public school career and technical education facilities: Principals’ perceptions of security enhancement. Safety Science, 185, 106781. https://doi.org/https://doi.org/10.1016/j.ssci.2025.106781

Emezue, C. N., Enriquez, M., Dougherty, D. S., Bullock, L. F. C., & Bloom, T. L. (2021). Rural young males’ acceptance & receptiveness to technology-based interventions for dating violence prevention: A qualitative descriptive study. Journal of Adolescence, 92, 137–151. https://doi.org/https://doi.org/10.1016/j.adolescence.2021.08.012

Fouzi, N. F. R., Aziz, H. A., & Yaakub, N. (2024). Systematic review of chemical safety and chemical security risk management approach. Process Safety and Environmental Protection, 183, 676–686. https://doi.org/https://doi.org/10.1016/j.psep.2024.01.035

Hossain, S. T., Yigitcanlar, T., Nguyen, K., & Xu, Y. (2025). Cybersecurity in local governments: A systematic review and framework of key challenges. Urban Governance, 5(1), 1–19. https://doi.org/https://doi.org/10.1016/j.ugj.2024.12.010

Karimi-Ghartemani, S., Khani, N., & Nasr Isfahani, A. (2022). A qualitative analysis and a conceptual model for organizational stupidity. Journal of Organizational Change Management, 35(3), 441–462. https://doi.org/https://doi.org/10.1108/JOCM-04-2021-0099

Kavak, A. (2024). Impact of information security awareness on information security compliance of academic library staff in Türkiye. The Journal of Academic Librarianship, 50(5), 102937. https://doi.org/https://doi.org/10.1016/j.acalib.2024.102937

Liu, H., Guo, S., Liu, C., Du, F., Li, B., & Hong, J. (2025). Case study of natural convection topology optimization based on finite volume method. Case Studies in Thermal Engineering, 66, 105697. https://doi.org/https://doi.org/10.1016/j.csite.2024.105697

Mehrolia, S., Alagarsamy, S., & Indhu Sabari, M. (2021). Moderating effects of academic involvement in web-based learning management system success: A multigroup analysis. Heliyon, 7(5), e07000. https://doi.org/https://doi.org/10.1016/j.heliyon.2021.e07000

Mohammed, A. B., Maqableh, M., Qasim, D., & AlJawazneh, F. (2024). Exploring the factors influencing academic learning performance using online learning systems. Heliyon, 10(11), e32584. https://doi.org/https://doi.org/10.1016/j.heliyon.2024.e32584

Moussa, L. G., Mohan, M., Pitumpe Arachchige, P. S., Rathnasekara, H., Abdullah, M., Jaffar, A., Montenegro, J. F., Kale, A., Heng, J., King, ShaliniA. L., Daneil, R., Al-Awadhi, T., El Kenawy, A., & Abulibdeh, A. (2025). Impact of water availability on food security in GCC: Systematic literature review-based policy recommendations for a sustainable future. Environmental Development, 54, 101122. https://doi.org/https://doi.org/10.1016/j.envdev.2024.101122

Mulahuwaish, A., Qolomany, B., Gyorick, K., Abdo, J. B., Aledhari, M., Qadir, J., Carley, K., & Al-Fuqaha, A. (2025). A survey of social cybersecurity: Techniques for attack detection, evaluations, challenges, and future prospects. Computers in Human Behavior Reports, 18, 100668. https://doi.org/https://doi.org/10.1016/j.chbr.2025.100668

Parambil, M. M. A., Rustamov, J., Ahmed, S. G., Rustamov, Z., Awad, A. I., Zaki, N., & Alnajjar, F. (2024). Integrating AI-based and conventional cybersecurity measures into online higher education settings: Challenges, opportunities, and prospects. Computers and Education: Artificial Intelligence, 7, 100327. https://doi.org/https://doi.org/10.1016/j.caeai.2024.100327

Ragab, M., Alghamdi, B. M., Alakhtar, R., Alsobhi, H., Maghrabi, L. A., Alghamdi, G., Nooh, S., & AL-Ghamdi, A. A.-M. (2025). Enhancing cybersecurity in higher education institutions using optimal deep learning-based biometric verification. Alexandria Engineering Journal, 117, 340–351. https://doi.org/https://doi.org/10.1016/j.aej.2025.01.012

Rocha-Jiménez, T., Torres, I., Cabieses, B., López-Cevallos, D. F., & Mercado-Órdenes, M. (2025). Intersectionality, racism, and mental health of migrants arriving at borders in Latin America: a qualitative study based on in-depth interviews with key informants of the cases of Ecuador and Chile. The Lancet Regional Health - Americas, 44, 101040. https://doi.org/https://doi.org/10.1016/j.lana.2025.101040

Saadé, R. G., Hao, L., & Kuusiholma, T. (2025). Global governance & aerospace – The need for a management-integrated air and space education paradigm. Journal of Space Safety Engineering. https://doi.org/https://doi.org/10.1016/j.jsse.2025.04.003

Salih, S., Husain, O., Hamdan, M., Abdelsalam, S., Elshafie, H., & Motwakel, A. (2025). Transforming education with AI: A systematic review of ChatGPT’s role in learning, academic practices, and institutional adoption. Results in Engineering, 25, 103837. https://doi.org/https://doi.org/10.1016/j.rineng.2024.103837

Takaoka, A., Zytaruk, N., Davis, M., Matte, A., Johnstone, J., Lauzier, F., Marshall, J., Adhikari, N., Clarke, F. J., Rochwerg, B., Lamontagne, F., Hand, L., Watpool, I., Porteous, R. K., Masse, M.-H., D’Aragon, F., Niven, D., Heels-Ansdell, D., Duan, E., … Cook, D. J. (2022). Monitoring and auditing protocol adherence, data integrity and ethical conduct of a randomized clinical trial: A case study. Journal of Critical Care, 71, 154094. https://doi.org/https://doi.org/10.1016/j.jcrc.2022.154094

Yuan, S., Reniers, G., & Yang, M. (2025). Dynamic and integrated safety and security barrier management: A new framework to manage major event risks in chemical plants. Journal of Loss Prevention in the Process Industries, 96, 105632. https://doi.org/https://doi.org/10.1016/j.jlp.2025.105632

Downloads

Published

2025-05-20

How to Cite

A CYBERSECURITY FRAMEWORK FOR ACADEMIC INFORMATION SYSTEMS IN HIGHER EDUCATION. (2025). Journal of Educational Research and Community Service, 1, 210-217. https://journal.nabaedukasi.com/index.php/jercs/article/view/29

Similar Articles

11-20 of 53

You may also start an advanced similarity search for this article.