Analysis of The Maturity Level of Cyber Security in The Context of Personal Data Protection for MSMEs in Depok City
DOI:
https://doi.org/10.59188/eduvest.v5i2.50822Keywords:
Cybersecurity, Personal Data Protection, MSMEs, ComplianceAbstract
This research explores the cybersecurity maturity level in the context of personal data protection for Micro, Small, and Medium Enterprises (MSMEs) in Depok City, Indonesia. The increased use of digital technology by MSMEs has raised concerns about personal data security and the vulnerability to cyberattacks. This study aims to develop an assessment tool that MSMEs can use to evaluate their compliance with the Personal Data Protection (PDP) Law and measure their readiness to face cybersecurity challenges. Through a combination of qualitative and quantitative methods, the study analyzes MSMEs' preparedness for cybersecurity and compliance with the PDP Law. The results reveal that while 60.2% of MSMEs manage personal data, a significant 93.5% have not complied with the PDP Law, exposing them to potential financial losses and cyber risks. The research emphasizes the need for MSMEs to adopt a simple yet effective cybersecurity framework to ensure data protection and compliance.
References
Antunes et al, (2021). Information Security and Cybersecurity Management: A Case Study with SMEs in Portugal. J. Cybersecur. Priv. 2021, 1, 219–238.
Badan Siber dan Sandi Negara, “Lanskap Keamanan Siber Indonesia 2022,” 2023.
Barker. E. Recommendation for Key Management – Part 1: General. NIST Spec. Publ. 800-57, no. May, pp. 1–142, 2016, [Online]. Available: http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57pt1r4.pdf.
Bountouni, N., Koussouris, S., Vasileiou, A., Kazazis, S. A. (2023, April). A Holistic Framework for Safeguarding of SMEs: A Case Study. Publish in: 2023 19th International Conference on the Design of Reliable Communication Networks (DRCN).
Creswell, J. W., Creswell, J. D. (2017). Research Design: Qualitative, Quantitative, and Mixed Methods Approaches. Sage Publications.
Fitzgerald (2017). Auditing Cyber Security: Evaluating Risk and Auditing Controls. Isaca, 2017.
Gheyle, N., Jacobs,T., “Content Analysis: a short overview,” Intern. Res. note. Retrievedfrom https//www. Res. net/profile/Niels_Gheyle/publication/32 1977528_Content_Analysis_a_short_overview/links/5a3bee680f7e9b10e23 bb2f9/C ontent-Analysis-a-short-overview. pdf, no. December, 2017, doi: 10.13140/RG.2.2.33689.31841.
Gracia, S. (2022). KemenKopUKM Perkuat Transformasi Digital UMKM. Stabilitas.Id. https://www.stabilitas.id/kemenkopukm-perkuat-transformasi-digital-umkm/
Hidranto, Firman (2022). UMKM Naik Kelas, UMKM Go Digital. https://indonesia.go.id/kategori/editorial/4618/umkm-naik-kelas-umkm-go-digital?lang=1?lang=1?lang=1?lang=1?lang=1?lang=1?lang=1?lang=1?lang=1?lang=1?lang=1?lang=1?lang=1?lang=1?lang=1?lang=1?lang=1?lang=1?lang=1?lang=1
Hisbuloh, M. H. (2022). Urgensi Rancangan Undang-Undang (Ruu) Perlindungan Data Pribadi. Jurnal Hukum UNISSULA.
ISO/IEC (2022). Information security, cybersecurity and privacy protection — Information security management systems — Requirements. https://www.iso.org/standard/27001
Jäntti, M. (2020). Studying Data Privacy Management in Small and Medium-Sized IT Companies.
Junior et al, (2023). Unaware, Unfunded and Uneducated: A Systematic Review of SME Cybersecurity
Kadeni, Srijani, N. (2020). Peran Umkm (Usaha Mikro Kecil Menengah) Dalam Meningkatkan Kesejahteraan Masyarakat. Quilibrium, Volume 8, Nomor 2, Juli 2020.
Kim, S., Nelson, J. G., Williams, R. S., Mixed-basis band-structure interpolation scheme applied to the fluorite-structure compounds NiSi2, AuAl2, AuGa2, and AuIn2, vol. 31, no. 6. 1985.
Kominfo (2022) .Transformasi Digital UMKM Jadi Prioritas Penguatan Fondasi Ekonomi. https://www.kominfo.go.id/content/detail/40915/transformasi-digital-umkm-jadi-prioritas-penguatan-fondasi-ekonomi/0/berita
Kosutic, D. (2012). 9 Steps to Cybersecurity The Manager’s Information Security Strategy Manual. EPPS Services Ltd, 2012.
Krippendorff, K., “Reliability in content analysis: Some common misconceptions and recommendations,” Hum. Commun. Res., vol. 30, no. 3, pp. 411–433, 2004, doi: 10.1093/hcr/30.3.411.
Kumparan.com (2022). Potensi Ekonomi Digital Indonesia Tembus Rp 4.531 Triliun di 2030. https://kumparan.com/kumparanbisnis/potensi-ekonomi-digital-indonesia-tembus-rp-4-531-triliun-di-2030-1yROcQEzYFo/full
Mirza, M. M. (2019). Audit Keamanan Sistem Informasi pada Dinas Komunikasi dan Informatika Kabupaten Bogor Menggunakan Standar ISO/IEC 27001:2013 dan COBIT 5.
Pratama, R. B. A. (2024). Perlindungan Hukum UMKM Internasional Untuk Kesejahteraan Masyarakat Berdasarkan Keadilan Sosial. Jurnal Ilmu Hukum, Vol.8 No.1, April 2024.
Pratiwi, F. (2020). Pengertian Audit : Manfaat, Jenis, dan Cara Melakukannya. https://www.harmony.co.id/blog/pengertian-audit-manfaat-jenis-dan-cara-melakukannya/
Republik Indonesia,”UU Nomor 27 Tahun 2022 Tentang Pelindungan Data Pribadi,” 2022.
Sabillon, R. Serra-Ruiz, J., Cavaller, V., Cano, J. A comprehensive cybersecurity audit model to improve cybersecurity assurance: The cybersecurity audit model (CSAM). doi:10.1109/INCISCOS.2017.20
Sarno, R., Iffano, I. (2009) Sistem Manajemen Keamanan Informasi. Surabaya: ITS Press, 2009.
Sarri, A., Paggio, V., & Bafoutsou, G. (2021). Cybersecurity for SMEs: Challenges and Recommendations.
Setiawati, I., Widyartati, P. Pengaruh Strategi Pemasaran Online Terhadap Peningkatan Laba Umkm. Strategi Komunikasi Pemasaran, 20, 2017, 1–5.
Shidiq, U. & Choiri, M., Metode Penelitian Kualitatif di Bidang Pendidikan, vol. 53, no. 9. 2019
Shojaifar et al, (2020). SMEs’ Confidentiality Concerns for Security Information Sharing
SIARAN PERS No. HM.4.6/303/SET.M.EKON.3/08/2023 (2023). Dorong UMKM Naik Kelas dan Go Export, Pemerintah Siapkan Ekosistem Pembiayaan yang Terintegrasi. https://www.ekon.go.id/publikasi/detail/5318/dorong-umkm-naik-kelas-dan-go-export-pemerintah-siapkan-ekosistem-pembiayaan-yang-terintegrasif
SIARAN PERS No. HM.4.6/88/SET.M.EKON.3/04/2021. Dukungan Pemerintah Bagi UMKM Agar Pulih di Masa Pandemi. https://ekon.go.id/publikasi/detail/2939/dukungan-pemerintah-bagi-umkm-agar-pulih-di-masa-pandemi
Simbolon, V. A. (2022). Bagaimana Nasib Pelaku UMKM Digital Pasca UU PDP Disahkan? kumparan.com https://kumparan.com/user-27112022045905/bagaimana-nasib-pelaku-umkm-digital-pasca-uu-pdp-disahkan-1zL12M0m3dR/2
Solms, R. V., Niekerk, J. V. From information security to cyber security. Computer &Security., vol. 38, pp. 97–102, 2013, doi: 10.1016/j.cose.2013.04.004.
Uprichard, E. (2013). Sampling: bridging probability and non-probability designs. International Journal of Asocial Research Methodology, 16 (1), pp. 1–11.
Whitman, M. E., Mattord, H. J. (2012). Principles of Information Security (Fourth Edition). Boston: Course Technology, 2012.
Wallang, et al, (2022). Cyber Security In Small And Medium Enterprises (SMEs): What’s Good Or Bad?
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Catur Agus Sulistyo, Gerry Firmansyah, Budi Tjahjono, Agung Mulyo Widodo

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.