ABSTRACT
The role of data stewardship satisfies various requirement for the users, employee or staff to provide necessary awareness in ensuring information security strategy take place accordingly. It relates to have properly understand the definition and standard across the organization in term of quality, accuracy, workflows, usage, compliance, format and attribute of content and metadata. Unfortunately, many organization have neglected the importance of data stewardship as the assistance for leveraging the valuable asset of data at the optimization capacity. One of advantages that can be generated automatically related to improve the awareness of relevant party within the environment in protecting the information assets based on policy implemented. This study identifies the relationship by accessing data stewardship with the awareness campaign strategy through security awareness domain and resources (SADAR) framework. The study compare between the utilization in the banking industry by using enterprise resource planning (ERP) and in the education with open platform of database management system (DBMS).
- E.F. Monk and B.J. Wagner, “Concept In Enterprise Resource Planning”. 4th Edition. United States of America: Cengage Learning, 2013.Google Scholar
- F. Mahar, S.I. Ali, A,K. Jumani, and M.O. Khan, “ERP System Implementation: Planning Management and Administration Issues”. Indian J. of Science and Technology 13(01): 1-22, 2020. DOI: 10.4028/www.scientific.net/AMR.338.152Google ScholarCross Ref
- A.R. Ahlan, M. Lubis, and A.R. Lubis, “Information Security Awareness at the Knowledge-Based Institution: Its Antecedents and Measures”. Inf. Systems International Con., pp. 361-373, Elsevier B.V. 2015. DOI: 10.1016/j.procs.2015.12.151Google Scholar
- J.A. O'Brien and Marakas, “Managing Infrastructure for Information”. New York: McGraw-Hill (9th edition), 2010.Google Scholar
- G. Vanderer, “Security Awareness and Social Responsibility”. 10th Jubilee IEEE Int. Symposium on Applied Computational Intelligence and Informatics, pp. 345-348, 2015.Google Scholar
- P.K. Sari and N. Trianasari, “Information Security Awareness Measurement with Confirmatory Factor Analysis”. Int. Symposium on Technology Management and Emerging Technologies, 218-223, 2014.Google ScholarCross Ref
- H.A. Kruger and W.D. Kearney. “A Prototype for Assessing Information Security Awareness”. Computers & Security, 25, 289-296, (2006).Google ScholarDigital Library
- Symantec. “Internet Security Threat Report Volume 24”, February 2019. White Paper.Google Scholar
- E. Riadi, “Statistik SEM - Structural Equation Modeling dengan LISREL”. Yogyakarta: ANDI Publisher, 2018.Google Scholar
- A. Ghasemi and S. Zahediasl. “Normality Tests for Statistical Analysis: A Guide for Non Statisticians”. Int. J. Endocrinol Metab. 10(2), 486-489, 2012.Google ScholarCross Ref
- D. Oztuna, A.H. Elhan and E. Tuccar. “Investigation of four different normality tests in terms of type 1 error rate and power under different distributions”. Turkish Journal of Medical Sciences 36(3), 171–6, 2006.Google Scholar
- H.J. Thode, “Testing for normality”. New York: Marcel Dekker; 2002.Google ScholarCross Ref
- D.J. Steinskog, “A cautionary note on the use of the Kolmogorov Smirnov test for normality”. American Meteor Soc. 135, 1151–1157, 2007. DOI: 10.1175/MWR3326.1Google Scholar
- C. Fornell and D.F. Larcker, “Evaluating structural equation models with unobservable variables and measurement error”. Journal of Marketing Research, 18, 39-50, 1981.Google ScholarCross Ref
- J.F. Hair, W.C. Black, B.J. Babin, and R.E. Anderson, “Multivariate data analysis”. (7th ed), Upper Saddle River, NJ: Pearson Prentice Hall, 2009.Google Scholar
- V. Grimm and S.F. Railsback, “Pattern-oriented modelling: a ‘multi-scope’ for predictive systems ecology”. Philos. Trans. R. Soc. B Biol. Sci. 367(1586), 298–310, 2012. DOI: 10.1098/rstb.2011.0180.Google ScholarCross Ref
- B. Edmonds, , “Different modelling purposes”. J. Artif. Soc. Soc. Simul. 22(3), 2019.Google ScholarCross Ref
- M. Guerini and A. Moneta, “A method for agent-based models validation”. J. Econ. Dyn. Control 82, 125–141, 2017. DOI: 10.1016/j.jedc.2017.06.001Google ScholarCross Ref
- G.T. Broeke and H. Tobi, “Mapping validity and validation in modelling for interdisciplinary research”. Qual. Quant. PMC7677449 Nov. 2020. DOI: 10.1007/s11135-020-01073-8Google Scholar
- S.A. Livingston, “Test Reliability-Basic Concepts. Research Memorandum ETS RM-18-01”. White Report 2018.Google Scholar
- R.H. Toczydlowski, , “Poor Data Stewardship will Hinder Global Genetic Diversity Surveillance”. Proceedings of the National Academy of Sciences 118(34): e2107934118, 2021. DOI: 10.1073/pnas.2107934118Google ScholarCross Ref
- M. Albani and I. Maggio. “Long time data series and data stewardship reference model”. Big Earth Data 4(4), Oct. 2020. DOI: 10.1080/20964471.2020.1800893Google Scholar
- G. Peng. “The State of Assessing Data Stewardship Maturity – An Overview”. Data Science Journal 17(44), 2018. DOI: 10.5334/dsj-2018-007Google Scholar
- M. Suchanek and R. Pergl. “Data Stewardship Wizard for Open Science”. Data a znalosti & WIKT 2018.Google Scholar
- R.R. Downs, R.E. Duerr, D.J. Hills and H.K. Ramapriyan. “Data Stewardship in the Earth Sciences”. D-Lib Magazine 21(7/8). DOI: 10.1045/july2015-downsGoogle ScholarCross Ref
Recommendations
An Information Security Awareness Program to Address Common Security Concerns in IT Unit
ITNG '14: Proceedings of the 2014 11th International Conference on Information Technology: New GenerationsEducated and trained people are critical success factor in any IT work environment to minimize threats or misuse of the organizational assets that may damage the growth, excellence, and efficiency of any business. However, humans are always the weakest ...
Toward an IT governance maturity self-assessment model using EFQM and CobiT
ICGDA '18: Proceedings of the International Conference on Geoinformatics and Data AnalysisIT governance is becoming an obligation today for organizations that want to align their IT with business. However, a method of analyzing the maturity of the information system governance, which is easy to apply and does not require any technical ...
Comments