REFERENCES
Abraham, R., Schneider, J. and vom Brocke, J. (2019) “Data governance: A conceptual framework, structured review, and research agenda,” International Journal of Information Management. Elsevier, 49(January), pp. 424–438. doi: 10.1016/j.ijinfomgt.2019.07.008.
Agrawal, M., Campoe, A. and Pierce, E. (2014) Information Security and IT Risk Management.
Alekh, S. (2018) “EU General Data Protection Regulation (GDPR),” arXiv, 2014(March 2014), pp. 45–62.
Almeida, R. et al. (2018) “A model for assessing COBIT 5 and ISO 27001
simultaneously,” Proceeding - 2018 20th IEEE International Conference on Business Informatics, CBI 2018, 1(July), pp. 60–69. doi: 10.1109/CBI.2018.00016.
Apriyanti, I. (2020) “The Urgency of Establishing Personal Data Protection Act and Financial Technology Act in Digital Era in order to Protect and Control the Privacy in Indonesia,” 130(Iclave 2019), pp. 345–356. doi: 10.2991/aebmr.k.200321.045.
Arman, A. A., Ramadhan, G. and Fajrin, M. (2015) “Design of data management guideline for open data implementation: (Case study in indonesia),” ACM International Conference Proceeding Series, 2015-Novem, pp. 17–23. doi: 10.1145/2846012.2846024.
Astuti, H. M. et al. (2017) “Risks Assessment of Information Technology Processes Based on COBIT 5 Framework: A Case Study of ITS Service Desk,” Procedia Computer Science.
Elsevier B.V., 124, pp. 569–576. doi: 10.1016/j.procs.2017.12.191.
Barrett, M. (2018) “Framework for improving critical infrastructure cybersecurity,”
Proceedings of the Annual ISA Analysis Division Symposium, 535, pp. 9–25.
Bier, V. (2017) Risk in Extreme Environments, Risk in Extreme Environments. doi:
10.4324/9781315557540.
Boateng, W. (2012) “Evaluating the Efficacy of Focus Group Discussion (FGD) in Qualitative Social Research,” International Journal of Business and Social Science, 3(7),
pp. 54–57. Available at: http://www.ijbssnet.com/journals/Vol_3_No_7_April_2012/6.pdf.
Crockett, K., Goltz, S. and Garratt, M. (2018) “GDPR Impact on Computational Intelligence Research,” Proceedings of the International Joint Conference on Neural Networks. IEEE, 2018-July, pp. 1–7. doi: 10.1109/IJCNN.2018.8489614.
Darmstadt, A. L. (2015) IT Security Risk Management in the Context of Cloud Computing, Springer Fachmedien Wiesbaden. doi: 10.1007/978-3-658-11340-7.
Dhillon, G., Syed, R. and Sá-Soares, F. de (2017) “Information security concerns in IT outsourcing: Identifying (in) congruence between clients and vendors,” Information and Management. Elsevier B.V., 54(4), pp. 452–464. doi: 10.1016/j.im.2016.10.002.
Dodge, J. (2020) “ENISA Threat Landscape Report : Data breach,” Health data management, 18(9). doi: 10.1201/9781315396743-35.
“DRAFT RANCANGAN UNDANG-UNDANG REPUBLIK INDONESIA TENTANG PELINDUNGAN DATA PRIBADI” (2018), 105(3), pp. 129–133. Available at:
https://webcache.googleusercontent.com/search?q=cache:BDsuQOHoCi4J:https://media.ne liti.com/media/publications/9138-ID-perlindungan-hukum-terhadap-anak-dari-konten- berbahaya-dalam- media-cetak-dan-ele.pdf+&cd=3&hl=id&ct=clnk&gl=id.
Eko (merdeka.com) (2020) Pembobolan Rekening Wartawan Senior, Polisi Bakal Periksa Commonwealth Bank | merdeka.com. Available at:
https://www.merdeka.com/peristiwa/pembobolan-rekening-wartawan-senior-polisi-bakal- periksa-commonwealth-bank.html (Accessed: November 16, 2020).
Fabisiak, L., Hyla, T. and Klasa, T. (2012) “Comparative Analysis of Information Security Assessment and Management Methods,” Studia i Materialy Polskiego Stowarzyszenia Zarzadzania Wiedza / Studies & Proceedings Polish Association for Knowledge Management, (60), pp. 55–70.
Greengard, S. (2018) “Weighing the impact of GDPR,” Communications of the ACM. doi:
10.1145/3276744.
Iqbal, A., Widyawan and Mustika, I. W. (2016) “COBIT 5 domain delivery, service and
support mapping for business continuity plan,” AIP Conference Proceedings, 1746. doi:
10.1063/1.4953970.
Lachaud, E. (2020) “ISO/IEC 27701 standard: Threats and opportunities for GDPR certification,” European Data Protection Law Review, 6(2), pp. 194–210. doi:
10.21552/edpl/2020/2/7.
Legowo, N. and Christian (2019) “Evaluation of Governance Information System Using Framework Cobit 5 in Banking Company,” ICSECC 2019 - International Conference on Sustainable Engineering and Creative Computing: New Idea, New Innovation,
Proceedings. IEEE, pp. 281–286. doi: 10.1109/ICSECC.2019.8907123.
Mahalle, A. et al. (2018) “Data Privacy and System Security for Banking and Financial Services Industry based on Cloud Computing Infrastructure,” Proceedings of the 2018 IEEE 22nd International Conference on Computer Supported Cooperative Work in Design, CSCWD 2018. IEEE, pp. 75–80. doi: 10.1109/CSCWD.2018.8465318.
Milne, G. R. et al. (2017) “Information Sensitivity Typology: Mapping the Degree and Type of Risk Consumers Perceive in Personal Data Sharing,” Journal of Consumer Affairs, 51(1), pp. 133–161. doi: 10.1111/joca.12111.
Nathan, A. J. and Scobell, A. (2020) “2020Data Breach Investigations Report,” Verizon.
doi: 10.1017/CBO9781107415324.004.
NIST (2020) Nist Privacy Framework: a Tool for Improving Privacy Through Enterprise Risk Management. Available at:
https://www.nist.gov/system/files/documents/2020/01/16/NIST Privacy Framework_V1.0.pdf.
OJK (2016) “Peraturan OJK 38/POJK.03/2016 tentang Penerapan Manajemen Risiko dalam Penggunaan Teknologi Informasi,” p. 61. Available at:
https://www.ojk.go.id/id/kanal/perbankan/regulasi/peraturan-ojk/Documents/Pages/POJK- tentang-Penerapan-Manajemen-Risiko-dalam-Penggunaan-Teknologi-Informasi-Oleh- Bank-Umum/POJK MRTI.pdf.
OJK (2020) “PERUBAHAN ATAS PERATURAN OTORITAS JASA KEUANGAN NOMOR 38/POJK.03/2016 TENTANG PENERAPAN MANAJEMEN RISIKO DALAM PENGGUNAAN TEKNOLOGI INFORMASI OLEH BANK UMUM,” ojk.go.id, 7(9), pp.
27–44.
van Ooijen, I. and Vrabec, H. U. (2019) “Does the GDPR Enhance Consumers’ Control over Personal Data? An Analysis from a Behavioural Perspective,” Journal of Consumer Policy. Journal of Consumer Policy, 42(1), pp. 91–107. doi: 10.1007/s10603-018-9399-7.
Pandit, H. J. et al. (2018) GDPRtEXT - GDPR as a Linked Data Resource, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer International Publishing. doi: 10.1007/978-3-319- 93417-4_31.
Permana, R. I. and Suroso, J. S. (2018) “Data Governance Maturity Assessment at PT.
XYZ. Case Study: Data Management Division,” Proceedings of 2018 International Conference on Information Management and Technology, ICIMTech 2018. IEEE, (September), pp. 15–20. doi: 10.1109/ICIMTech.2018.8528142.
Ponemon Institute (2019) “Cost of a data breach report,” IBM Security, p. 76. Available at:
https://www.ibm.com/downloads/cas/ZBZLY7KL.
Rass, S. (2020) Cyber-Security in Critical Infrastructures.
Roy, P. P. (2020) “A High-Level Comparison between the NIST Cyber Security
Framework and the ISO 27001 Information Security Standard,” 2020 National Conference on Emerging Trends on Sustainable Technology and Engineering Applications,
NCETSTEA 2020, 53, pp. 27001–27003. doi: 10.1109/NCETSTEA48365.2020.9119914.
S. De Haes, W. Van Grembergen, R. D. (2013) “COBIT 5 and Enterprise Governance of Information Technology: Building Blocks and Research Opportunities,” COBIT 5 and Enterprise Governance of Information Technology: Building Blocks and Research Opportunities, p. 25.
Scharfstein, M. and Gaurf (2013) “DAMA-DMBOK,” Journal of Chemical Information
and Modeling, 53(9), pp. 1689–1699. doi: 10.1017/CBO9781107415324.004.
Sharma, S. (2019) Data Privacy and GDPR Handbook, Data Privacy and GDPR Handbook. doi: 10.1002/9781119594307.
SHIPMAN, A. and WATKINS, S. (2020) “PRIVACY INFORMATION MANAGEMENT CONTROLS,” in ISO/IEC 27701:2019: An introduction to privacy information
management. doi: 10.2307/j.ctvsn3pnr.9.
Soenen, P. and Academy, Q. A. (2019) “Privacy Information Management with ISO 27701 Overview of the ISO 27701 Who should implement ISO 27701 ? GDPR certification ISO 27701 - an extension to ISO 27001,” (May 2018), pp. 1–17.
Soetomo, M. A. et al. (2020) “Manage Assurance for Continuous Improvement Strategy in Rural Internet Service Case Study,” pp. 0–5.
Sugiyono, P. D. (2016) “DAMA-DMBOK,” Journal of Chemical Information and Modeling, 53(9), pp. 1689–1699. doi: 10.1017/CBO9781107415324.004.
Torabi, S. A., Giahi, R. and Sahebjamnia, N. (2016) “An enhanced risk assessment
framework for business continuity management systems,” Safety Science. Elsevier Ltd, 89, pp. 201–218. doi: 10.1016/j.ssci.2016.06.015.
Tubke, A., Saavedra, P. A. D. T. and Gonzalez, J.-L. G. (2004) “Towards a first spin-off typology and a new concept for corporate spin-off research,” International Journal of Technology Transfer and Commercialisation, 3(3), p. 263. doi: 10.1504/ijttc.2004.005083.
W. Main, B. (2008) “Risk Assessment : A review of the fundamental principles,” Risk Management, 24(4), pp. 1–7.
Wangen, G., Hallstensen, C. and Snekkenes, E. (2018) “A framework for estimating information security risk assessment method completeness: Core Unified Risk Framework, CURF,” International Journal of Information Security. Springer Berlin Heidelberg, 17(6), pp. 681–699. doi: 10.1007/s10207-017-0382-0.
van Wyk, J. and Rudman, R. (2019) “COBIT 5 compliance: best practices cognitive
computing risk assessment and control checklist,” Meditari Accountancy Research, 27(5), pp. 761–788. doi: 10.1108/MEDAR-04-2018-0325.
Zhang, S. and Fever, H. Le (2013) “An Examination of the Practicability of COBIT Framework and the Proposal of a COBIT-BSC Model,” Journal of Economics, Business and Management, 1(4), pp. 391–395. doi: 10.7763/joebm.2013.v1.84.