Journal Informatic, Education and Management (JIEM)
https://jurnal.stmikiba.ac.id/index.php/jiem
<p><strong>Journal Title : Journal Informatic, Education and Management (JIEM)<br>ISSN : </strong><a href="https://issn.brin.go.id/terbit/detail/1564423416">2716-0696</a> (Online)<strong><br>DOI : </strong>by Crossref<strong><br>Editor in Chief : Riyan Maulana, S.Pd., M.Pd.<br>Managing Editor : Adi Ahmad, S.Kom., M.M.<br>Publisher : </strong>STMIK Indonesia Banda Aceh<strong><br>Frequency : </strong>Two issues per year (February and August)</p> <p><strong>Journal Informatic, Education and Management (JIEM) </strong>have gone through a peer review process, reviewed in a closed manner (blind review) by reviewers appointed by the Editorial Board according to their field of expertise.</p> <div style="font-size: 14px; text-align: justify;"> <div style="font-size: 14px; text-align: justify;"><strong>Office address:</strong> <p>Jl. Teuku Nyak Arief, Jeulingke, Kec. Syiah Kuala, Kota Banda Aceh, Aceh<br><strong style="text-align: justify;">Email:</strong> <em style="text-align: justify;">jiemstmik@gmail.com</em></p> </div> </div>STMIK Indonesia Banda Acehen-USJournal Informatic, Education and Management (JIEM)2716-0696Data Security Analysis in Electronic Health Information Systems
https://jurnal.stmikiba.ac.id/index.php/jiem/article/view/107
<p>This study aims to analyze data security in electronic health information systems (EHIS). With the increasing use of information technology in healthcare, data security issues are becoming increasingly important given the sensitivity of medical information. The research methodology involved an in-depth literature review as well as case study analysis on several hospitals that have implemented SIKE. Data analysis techniques included evaluation of system vulnerabilities, identification of potential threats, and assessment of data protection mechanisms in place. The results showed that despite various efforts to improve data security, there are still many vulnerabilities that can be exploited by irresponsible parties. The main threats include cyberattacks, data leakage, and unauthorized access. In addition, this study found that the implementation of security protocols such as data encryption, multi-factor authentication, and regular audits can significantly reduce these risks. However, this research has several limitations, including a limited sample of case studies that may not represent the entire SIKE landscape in Indonesia and limited access to internal hospital data. Nonetheless, this research makes a significant contribution in providing practical recommendations for SIKE managers to improve data security, as well as a basis for further research in this area.</p>Adi AhmadYusmanidarJuria HastutiMaudi HijriatinSarno
Copyright (c) 2025 Journal Informatic, Education and Management (JIEM)
2025-02-212025-02-217111110.61992/jiem.v7i1.107