https://jurnal.stmikiba.ac.id/index.php/jiem/issue/feedJournal Informatic, Education and Management (JIEM)2025-02-21T10:06:28+00:00Adi Ahmadaudiest@gmail.comOpen Journal Systems<p><strong>Journal Title : Journal Informatic, Education and Management (JIEM)<br>ISSN : </strong><a href="https://issn.brin.go.id/terbit/detail/1564423416">2716-0696</a> (Online)<strong><br>DOI : </strong>by Crossref<strong><br>Editor in Chief : Riyan Maulana, S.Pd., M.Pd.<br>Managing Editor : Adi Ahmad, S.Kom., M.M.<br>Publisher : </strong>STMIK Indonesia Banda Aceh<strong><br>Frequency : </strong>Two issues per year (February and August)</p> <p><strong>Journal Informatic, Education and Management (JIEM) </strong>have gone through a peer review process, reviewed in a closed manner (blind review) by reviewers appointed by the Editorial Board according to their field of expertise.</p> <div style="font-size: 14px; text-align: justify;"> <div style="font-size: 14px; text-align: justify;"><strong>Office address:</strong> <p>Jl. Teuku Nyak Arief, Jeulingke, Kec. Syiah Kuala, Kota Banda Aceh, Aceh<br><strong style="text-align: justify;">Email:</strong> <em style="text-align: justify;">jiemstmik@gmail.com</em></p> </div> </div>https://jurnal.stmikiba.ac.id/index.php/jiem/article/view/107Data Security Analysis in Electronic Health Information Systems2025-02-21T10:06:28+00:00Adi Ahmadaudiest@gmail.comYusmanidaryusmanidar@stiapen.ac.idJuria Hastutijuriahastuti@stiapen.ac.idMaudi Hijriatinmaudihjriatin@stiapen.ac.idSarnosarnosm07@gmail.com<p>This study aims to analyze data security in electronic health information systems (EHIS). With the increasing use of information technology in healthcare, data security issues are becoming increasingly important given the sensitivity of medical information. The research methodology involved an in-depth literature review as well as case study analysis on several hospitals that have implemented SIKE. Data analysis techniques included evaluation of system vulnerabilities, identification of potential threats, and assessment of data protection mechanisms in place. The results showed that despite various efforts to improve data security, there are still many vulnerabilities that can be exploited by irresponsible parties. The main threats include cyberattacks, data leakage, and unauthorized access. In addition, this study found that the implementation of security protocols such as data encryption, multi-factor authentication, and regular audits can significantly reduce these risks. However, this research has several limitations, including a limited sample of case studies that may not represent the entire SIKE landscape in Indonesia and limited access to internal hospital data. Nonetheless, this research makes a significant contribution in providing practical recommendations for SIKE managers to improve data security, as well as a basis for further research in this area.</p>2025-02-21T09:57:32+00:00Copyright (c) 2025 Journal Informatic, Education and Management (JIEM)