International Research and Academic scholar society

IRASS Journal of Economics and Business Management

Issue-1(December), Volume-1 2024

1. Understanding Information Security on Cloud Computing
4

Firzah Hafiz Deandra*, Sherly,...
Universitas Sumatera Utara, Medan, Indonesia

As cloud computing becomes increasingly prevalent, ensuring robust information security is essential to protect sensitive data from evolving cyber threats, especially in shared cloud infrastructures where unique vulnerabilities arise. This study aims to explore the impact of information security on cloud computing through a systematic literature review of articles sourced from reputable databases such as Science Direct, Emerald Insight, MDPI, and Taylor & Francis. The findings highlight that cloud security is anchored in securing systems, infrastructure, user authentication, and networks. Advanced techniques like the Attack Defense Model, Graph Neural Networks, and Homomorphic Encryption are used to address threats, while user behavior and strong architectural designs are critical factors. Continuous evaluation and anomaly detection further enhance security in cloud environments. This research contributes to understanding the relationship between information security and cloud computing, offering practical strategies for organizations and cloud service providers to mitigate risks, build trust, and ensure data protection in the cloud.

2. Information Technology Audit in the Midst of the Digital Revolution: I...
7

Nada Cuary1
Universitas Sumatera Utara, Medan, Indonesia

Information Technology (IT) Audit is an important element in maintaining the security and effectiveness of information systems in modern businesses that increasingly rely on technology. With the implementation of new technologies such as cloud computing, Mobile Device Management (MDM), and the Internet of Things (IoT), the need for effective IT audits is increasingly urgent to identify and mitigate risks. The study highlights the role of IT audits in ensuring compliance with data privacy regulations, such as GDPR, as well as in building organizational awareness of data protection. The findings show that while technologies like ERP offer efficiency, proper controls are indispensable to protecting information assets. With a proactive approach, IT auditors can provide recommendations for improving systems and support organizations in creating a strong data protection culture.

3. Implementation of Information Technology Audit in Improving Company Op...
7

Bill Cheristian Sebayang*, Cri...
Universitas Sumatera Utara, Medan, Indonesia

The rapid development of information technology (IT) has encouraged companies to adopt IT audits to improve information security and operational efficiency. IT audits are important to ensure that a company's IT systems operate safely and in accordance with applicable standards, such as COBIT and ISO 27001. This study uses a mixed method approach that combines qualitative and quantitative methods. Data were collected through in-depth interviews with auditors and IT managers and questionnaires distributed to 100 companies in Indonesia that have implemented IT audits for at least two years. Qualitative analysis was conducted using thematic methods, while quantitative data were analyzed using descriptive statistics, Pearson correlation, and linear regression. The results showed that the implementation of IT audits contributed to increased information security, with 85% of companies reporting a reduced risk of data breaches. In addition, 78% of companies stated that IT audits also improved operational efficiency, such as reduced downtime and improved system management. These findings underscore the importance of IT audits as a strategic tool in managing risk and improving company performance in the digital era.

4. The Influence of Information Security Factors On The Continuance Use o...
7

Evita Christina Zeffanya.P*, N...
Universitas Sumatera Utara, Medan, Indonesia

This study investigates the impact of information security factors on the continuance use of GoPay as an electronic payment instrument in Indonesia, utilizing the Expectation Confirmation Model (ECM) as the theoretical framework. The ECM posits that users' satisfaction and continued use are influenced by their initial expectations and the perceived performance of the service. This research explores how perceived security, data protection, and privacy measures affect user satisfaction and their intention to continue using GoPay. A quantitative method was employed to gather data from GoPay users, with the results analyzed to assess the relationship between security perceptions and the continued use of the platform. The findings are expected to provide valuable insights into how information security influences digital wallet usage in Indonesia.

5. Open Source Security Information Management System Supporting IT Secur...
16

Nadiyah Salsabil*, Geby Patric...
Universitas Sumatera Utara, Medan, Indonesia

As digital transformation accelerates, information security has become a top priority for organizations seeking to protect sensitive data from cyber threats. A Security Information Management System (SIMS) plays a critical role in enabling organizations to systematically manage and sustain their information security efforts. This research explores the implementation of an open-source SIMS to support IT security audits, focusing on the system's effectiveness, efficiency, and adaptability to evolving cyber threats. The advantages of open-source software, including transparency, flexibility, and cost reduction, are examined in the context of its use in security audits. A case study was conducted to evaluate the performance of an opensource SIMS within a specific organizational environment. Findings indicate that open-source solutions can provide adequate support for IT security audit processes, ensuring compliance with security standards while facilitating risk identification and mitigation. The study concludes that adopting an open-source SIMS can be an effective and economical alternative for organizations looking to enhance their information security management.