ANALISIS TINGKAT KEMAMPUAN TEKNOLOGI INFORMASI DAN KOMUNIKASI (TIK) KEMHAN DAN TNI DALAMMENGHADAPI ANCAMAN SIBER
Keywords:
Cyber Defense,Cyber Threat,ICT skill level, the Ministry of Defense and Armed Forces, Pertahanan Siber, Ancaman Siber, Tingkat kemampuan TIK, Kemhan dan TNIAbstract
Ministry of Defense and Armed Forces as a leading sector in terms of defense, not least in the field of cyber need to perform the steps related to cyber defense. The first step that needs to be done about thesecurity against cyber threats is aware of ICT readiness of the Ministry of Defense and Armed Forces in support of cyber defense. To identify the problems of cyber defense preparation can begin bylooking at the statistics of ICT in Indonesia.Of the identificationproblem generating some basic questions that must be answered include:how is the condition of ICT in the Ministry ofDefense and Armed Forces today,what are the factors that can predict the readiness of ICT in the Ministry of Defense and Armed forces,as to whether the model of ICT readiness in the Ministry of Defense and Armed Forces, what are the dominant variable in the preparation of ICT in the Ministry of Defense and Armed forces in support of cyber defense. The results were obtained formulations suitable model for the measurement of ICT readiness in the Ministry of Defense and Armed Forces based on the Technology Acceptance Model with frame-Organization-Technology Environment. There are five dominant variables in the model of ICT readiness of the Ministry of Defense and Armed Forces, namely: interest (Behavioural Intention), the benefits of the system (Perceived Usefulness), ease of system (Perceived Ease of Use), the pressure of competition (Competitive ressure), and the quality of the system (Perceived Service Quality ). From the results of research on ICT readiness in theMinistry of Defense and Armed Forces can be concluded that there are problems include low ICT readiness for cyber defense and lack of interest in the adoption of ICT. The results of this research can be used as input to the Ministry of Defense and Armed Forces Chief-related planning and cyber defense activities are also expected to be a reference for research and subsequent studies.
Downloads
References
1. Davis (1989); Davis, Bagozzi & Warshaw (1989); Sang, et al (2009),Hussein et al. (2011), Dwivedi et al. (2010) Perceived Usefulness
2. Kim (2012); Williams, Slade & Dwivedi (2014) Perceived Ease of Use
3. Trafimow, et al (2002); Kraft et al (2005) Perceived Behavioral Control
4. Parasuraman & Grewal (2000); Buckley (2003); Yoo & Park (2007); Takele & Zeleke (2013) Perceived Service Quality
5. Colquitt (2002); Chao-Min et al (2009); Workman, Bommer & Straub (2009) Procedural Justice
6. Alvi,Abbasi &Haider(2014); Jin & Zhong (2014); Lo &Riemenschneider (2011) Perceived Organizational Support
7. Allen (2007); Chen, Yung & Sun (2012); Khan, Awang & Ghouri (2014) Organizational Commitment
8. Azadegan& Teich (2010; Kretschmer Miravete & Pernías (2012) Competitive Pressure
9. Davis (1989); Hu, Al-Gahtani & Hu (2014); Gefen et al.(2003),Trust
10.Davis (1989);Venkatesh et al (2003) Behavioural Intention (Intention to use)
11.Gay (2012); Rehman, Esichaikul, & Kamal (2012);Potnis & Pardo (2011);Karunasena et al. (2011) e-Readines



