Studi Kasus Pengukuran Implementasi Information Assurance untuk e-Government menggunakan Metode Goal Question Metric


  • Rio Guntur Utomo Universitas Telkom


Information Assurance, eGovernment, Goal Question Metric


Internet technology has been used in various fields, such as business, government, health, and education, including government, which is often called electronic government or eGovernment. Indonesia is one of the countries that has implemented eGovernment. In its implementation, eGovernment services must always be available, and every threat to information and systems must receive attention to ensure business continuity in the event of an incident. Therefore, in implementing eGovernment, information assurance (IA) must be considered. To determine the extent to which IA implementation status to protect eGovernment services in Indonesia, it is necessary to measure the implementation using an instrument. The measurement instrument is developed from the IA framework using the Goal Question Metric (GQM) method. The results of the measurement show that the status of implementing IA for e Government in Indonesia is still not satisfactory


Download data is not yet available.


World Bank, “Technology & Development,” 2008.

OECD, “21St Century Technologies,” Futures, vol. 26, no. 9, pp. 944–963, 1998.

R. E. Indrajit, Electronic Government Konsep Pelayanan Publik Berbasis Internet dan Teknologi Informasi, vol. XIX. Aptikom, 2006.

B. W. Wirtz and P. Daiser, e-Government - Strategy Process Instruments. 2015.

Z. Ebrahim and Z. Irani, “E-government adoption: Architecture and barriers,” Bus. Process Manag. J., vol. 11, no. 5, pp. 589–611, 2005.

P. T. Jaeger and K. M. Thompson, “E-government around the world: Lessons, challenges, and future directions,” Gov. Inf. Q., vol. 20, no. 4, pp. 389–394, 2003.

S. Basu, “E?government and developing countries: an overview,” Int. Rev. Law, Comput. Technol., vol. 18, no. 1, pp. 109–132, 2004.

ISO/IEC, “ISO/IEC 27002:2013,” Iec, vol. 2013, p. 90, 2013.

E. A. Hibbard, Introduction to Information Assurance. 2009.

Y. Cherdantseva and J. Hilton, “A Reference Model of Information Assurance & Security,” 2013 Int. Conf. Availability, Reliab. Secur., no. SEPTEMBER, pp. 546–555, 2013.

C. J. May, J. Hammerstein, J. Mattson, and K. Rush, “Defense in Depth: Foundation for Secure and Resilient IT Enterprises,” 2006.

A. Rathmell, S. Daman, K. O’Brien, and A. Anhal, “Engaging the Board Corporate Governance and Information Assurance,” 2004.

R. G. Utomo, R. J. Walters, and G. B. Wills, “Factors affecting the implementation of information assurance for eGovernment in Indonesia,” in 2017 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017, 2018, pp. 225–230.

Z. Fang, “E-Government in Digital Era: Concept, Practice, and Development,” vol. 10, no. 2, pp. 1–22, 2002.

R. Schware, E-development from excitement to effectiveness. 2005.

V. Ndou, “E-Government for Developing Countries: Opportunities and Challenges,” EJISDC Electron. J. Inf. Syst. Dev. Ctries., vol. 18, no. 1, pp. 1–24, 2004.

G. Yanqing, “E-government: Definition, goals, benefits and risks,” 2010 Int. Conf. Manag. Serv. Sci. MASS 2010, pp. 9–12, 2010.

CNSS, “National Information Assurance Glossary,” CNSS Instr. No. 4009, vol. CNSSI No., no. 4009, 2010.

P. Liu, M. Yu, and J. Jing, “Information Assurance,” Handb. Inf. Secur. Inf. Warf. Soc. Leg. Int. Issues Secur. Found. Vol. 2, 2006.

V. R. Basili, G. Caldiera, and H. D. Rombach, “The Goal, Metric, and Question Approach,” In Encyclopedia of Software Engineering. 1994.

R. Yin, Case study research. Thousand Oaks, Calif.: Sage.

R. G. Utomo, G. Wills, and R. Walters, “A framework for factors influencing the implementation of information assurance for e-Government in Indonesia,” Int. J. Adv. Sci. Eng. Inf. Technol., vol. 10, no. 3, pp. 1025–1034, 2020.




How to Cite

Rio Guntur Utomo. (2021). Studi Kasus Pengukuran Implementasi Information Assurance untuk e-Government menggunakan Metode Goal Question Metric. Infoman’s : Jurnal Ilmu-Ilmu Manajemen Dan Informatika, 15(1), 89-98. Retrieved from