OPTIMIZING IT GOVERNANCE FOR ENHANCED SECURITY IN SMART CITIES

Authors

  • Agustinus Fritz Wijaya Universitas Kristen Satya Wacana
  • Merryana Lestari Universitas Bunda Mulia
  • Fricilia Angelica Universitas Bunda Mulia

DOI:

https://doi.org/10.33480/jitk.v11i1.6639

Keywords:

data privacy , data security, information technology governance, risk management, smart cities

Abstract

The rapid digitization of urban environments through technologies such as the Internet of Things (IoT), cloud computing, and big data analytics has significantly transformed modern cities into smart cities. However, this transformation has raised critical concerns regarding the security and privacy of citizen data. Prior studies have explored various IT governance models, yet there remains a gap in their contextual application to the dynamic and complex nature of smart cities. This research addresses that gap by examining the strategic role of Information Technology (IT) governance in enhancing data security and privacy in smart city initiatives. Through a literature review and analysis of case studies, this study identifies key IT governance frameworks and best practices, and adapts them to the unique operational, regulatory, and infrastructural demands of smart cities. The findings reveal that aligning IT governance with institutional policies, risk management, and legal compliance significantly strengthens urban digital resilience. Moreover, the incorporation of real-time monitoring systems, encryption protocols, and structured incident response plans is found to be effective in mitigating cyber threats. The novelty of this study lies in its integrated model that combines governance principles with smart city-specific risk contexts, offering a strategic roadmap for policymakers. This research contributes to the development of adaptive governance strategies that not only ensure compliance and security but also build public trust in digital urban services. Limitations of the study include the reliance on secondary data and the need for empirical validation, which will be addressed in future research through pilot implementations and stakeholder engagement.

Downloads

Download data is not yet available.

References

A. F. Wijaya, T. M. Surya Mulyana, and G. J. Liunard, “Desain User Experience (UX) Pada Website Smart City untuk Meningkatkan Aksesibilitas Layanan Publik,” J. Teknol. dan Manaj. Ind. Terap., vol. 4, no. 2, pp. 69–75, 2025, doi: 10.55826/jtmit.v4i2.582.

I. Ullah, D. Adhikari, X. Su, F. Palmieri, C. Wu, and C. Choi, “Integration of data science with the intelligent IoT (IIoT): current challenges and future perspectives,” Digit. Commun. Networks, Mar. 2024, doi: 10.1016/j.dcan.2024.02.007.

I. Lee, “Analysis of Insider Threats in the Healthcare Industry: A Text Mining Approach,” Inf., vol. 13, no. 9, 2022, doi: 10.3390/info13090404.

K. Khalil Ishak et al., “Smart Cities’ Cybersecurity and IoT: Challenges and Future Research Directions,” IAENG Int. J. Comput. Sci., vol. 51, no. 7, pp. 725–737, 2024, [Online]. Available: https://www.iaeng.org/IJCS/issues_v51/issue_7/IJCS_51_7_03.pdf

I. Fernandez De Arroyabe and J. C. Fernandez de Arroyabe, “The severity and effects of Cyber-breaches in SMEs: a machine learning approach,” Enterp. Inf. Syst., vol. 17, no. 3, 2023, doi: 10.1080/17517575.2021.1942997.

C. Liu and M. A. Babar, “Corporate cybersecurity risk and data breaches: A systematic review of empirical research,” Aust. J. Manag., 2024, doi: 10.1177/03128962241293658.

D. I. Sukmawan, D. Putra, and S. K. Pertahanan, “Hacker, Fear, and Harm: Data Breaches and National Security Peretas, Ketakutan, dan Kerugian: Pelanggaran Data dan Keamanan Nasional.”

A. Issaoui, J. Örtensjö, and M. S. Islam, “Exploring the General Data Protection Regulation (GDPR) compliance in cloud services: insights from Swedish public organizations on privacy compliance,” Futur. Bus. J., vol. 9, no. 1, Dec. 2023, doi: 10.1186/s43093-023-00285-2.

Seun Solomon Bakare, Adekunle Oyeyemi Adeniyi, Chidiogo Uzoamaka Akpuokwe, and Nkechi Emmanuella Eneh, “Data Privacy Laws And Compliance: A Comparative Review Of The Eu Gdpr And Usa Regulations,” Comput. Sci. IT Res. J., vol. 5, no. 3, pp. 528–543, Mar. 2024, doi: 10.51594/csitrj.v5i3.859.

G. Comandè and G. Schneider, “Differential Data Protection Regimes in Data-Driven Research: Why the GDPR is More Research-Friendly Than You Think,” Ger. Law J., vol. 23, no. 4, pp. 559–596, 2022, doi: 10.1017/glj.2022.30.

M. Biasin and A. Delle Foglie, “Blockchain and Smart Cities for Inclusive and Sustainable Communities: A Bibliometric and Systematic Literature Review,” Aug. 01, 2024, Multidisciplinary Digital Publishing Institute (MDPI). doi: 10.3390/su16156669.

S. Adeoye, “Advancing Smart Cities through Modern Technologies: A Holistic Review of Applications, Challenges, and Opportunities,” Adv. Internet Things, vol. 15, no. 02, pp. 33–60, 2025, doi: 10.4236/ait.2025.152003.

M. Babar and M. Sohail Khan, “ScalEdge: A framework for scalable edge computing in Internet of things–based smart systems,” Int. J. Distrib. Sens. Networks, vol. 17, no. 7, 2021, doi: 10.1177/15501477211035332.

E. Al-Qtiemat and Z. Al-Odat, “Examining Cloud Security: Identifying Risks And The Implemented Mitigation Strategies,” J. Theor. Appl. Inf. Technol., vol. 15, no. 7, 2024, [Online]. Available: www.jatit.org

D. U. Maheswari S, “Cybersecurity Challenges In Fintech: Assessing Threats And Mitigation Strategies For Financial Institutions,” Educ. Adm. Theory Pract., vol. 30, no. 5, pp. 1063–1071, 2024, doi: 10.53555/kuey.v30i5.3010.

G. Sartor, “The impact of the General Data Protection Regulation (GDPR) on artificial intelligence,” STOA | Panel Futur. Sci. Technol., 2020, doi: 10.2861/293.

R. Asif, S. R. Hassan, and G. Parr, “Integrating a Blockchain-Based Governance Framework for Responsible AI,” Mar. 01, 2023, MDPI. doi: 10.3390/fi15030097.

K. Al Zaabi, K. AL Hammadi, and M. El Khatib, “Highlights on Program Governance through AI and Blockchain,” Int. J. Bus. Anal. Secur., vol. 3, no. 1, pp. 91–101, May 2023, doi: 10.54489/ijbas.v3i1.203.

E. Tan, S. Mahula, and J. Crompvoets, “Blockchain governance in the public sector: A conceptual framework for public management,” Gov. Inf. Q., vol. 39, no. 1, Jan. 2022, doi: 10.1016/j.giq.2021.101625.

D. Z. Alotaibe, “IoT Security Model for Smart Cities based on a Metamodeling Approach,” Eng. Technol. Appl. Sci. Res., vol. 14, no. 3, pp. 14109–14118, Jun. 2024, doi: 10.48084/etasr.7132.

I. Widiyastuti, ST., MT, D. Nupikso, N. A. Putra, and V. A. Intanny, “Smart Sustainable City Framework: Usulan Model Kota Cerdas Yang Berkelanjutan dan Integratif,” J. PIKOM (Penelitian Komun. dan Pembangunan), vol. 22, no. 1, p. 13, Jul. 2021, doi: 10.31346/jpikom.v22i1.3297.

M. Salman Jabbar Sangaji, P. Zorayya Priyanti Noor, and S. Navasari, “Analisis Kebijakan Jakarta Smart City Menuju Masyarakat Madani,” J. Gov. Insight, vol. 1, no. 2, 2021, doi: 10.47030/jgi.v1i1.53.

I. Adhicandra, F. N. Khasanah, M. Muhammadiah, S. Sabri, and C. H. Maharaja, “The Impact of Integrating Internet of Things (IoT) Technology in Learning on Class Management Efficiency,” J. Comput. Sci. Adv., vol. 2, no. 3, pp. 136–157, Jul. 2024, doi: 10.70177/jsca.v2i3.928.

V. Bastidas, I. Reychav, A. Ofir, M. Bezbradica, and M. Helfert, “Concepts for Modeling Smart Cities: An ArchiMate Extension,” Bus. Inf. Syst. Eng., vol. 64, no. 3, pp. 359–373, 2022, doi: 10.1007/s12599-021-00724-w.

H. Zhu, L. Shen, and Y. Ren, “How can smart city shape a happier life? The mechanism for developing a Happiness Driven Smart City,” Sustain. Cities Soc., vol. 80, May 2022, doi: 10.1016/j.scs.2022.103791.

A. T. Polcumpally, K. K. Pandey, A. Kumar, and A. Samadhiya, “Blockchain governance and trust: A multi-sector thematic systematic review and exploration of future research directions,” Jun. 30, 2024, Elsevier Ltd. doi: 10.1016/j.heliyon.2024.e32975.

M. Schmitt and P. Koutroumpis, “Cyber Shadows: Neutralizing Security Threats with AI and Targeted Policy Measures,” J. IEEE Trans. Artif. Intell., vol. 0, no. 0, Jan. 2025, doi: 10.1109/TAI.2025.3527398.

O. Richard Arogundade, “Strategic Security Risk Management in Cloud Computing: A Comprehensive Examination and Application of the Risk Management Framework,” Iarjset, vol. 11, no. 1, pp. 45–55, 2023, doi: 10.17148/iarjset.2024.11105.

M. Talebkhah, A. Sali, M. Marjani, M. Gordan, S. J. Hashim, and F. Z. Rokhani, “IoT and Big Data Applications in Smart Cities: Recent Advances, Challenges, and Critical Issues,” IEEE Access, vol. 9, pp. 55465–55484, Jan. 2021, doi: 10.1109/ACCESS.2021.3070905.

P. Goswami, N. Faujdar, S. Debnath, A. K. Khan, and G. Singh, “Investigation on storage level data integrity strategies in cloud computing: classification, security obstructions, challenges and vulnerability,” Dec. 01, 2024, Springer Science and Business Media Deutschland GmbH. doi: 10.1186/s13677-024-00605-z.

A. A. Nugraha and A. H. Nasyuha, “Integrating ISO 27001 and Indonesia’s Personal Data Protection Law for Data Protection Requirement Model,” J. Inf. Syst. Informatics, vol. 6, no. 2, pp. 1052–1069, 2024, doi: 10.51519/journalisi.v6i2.754.

G. Manrique Rueda, M.-C. Therrien, and J. Préval, “Smart Cities Governance: Governance Models for Sustainable Smart Cities,” Preprints.org, Jun. 2024, doi: 10.20944/preprints202406.1481.v1.

I. Nastjuk, S. Trang, and E. I. Papageorgiou, “Smart cities and smart governance models for future cities: Current research and future directions,” Dec. 01, 2022, Springer Science and Business Media Deutschland GmbH. doi: 10.1007/s12525-022-00609-0.

J. F. Andry, “Performance Measurement of Information Technology Governance: a Case Study,” J. Sist. Inf., vol. 12, no. 2, p. 57, 2016, doi: 10.21609/jsi.v12i2.477.

E. Rumaseb, S. Sulistiyani, and L. G. Payasan, “the Role of Ai (Artificial Intelligence) for Alzheimer: a Systematic Review,” JITK (Jurnal Ilmu Pengetah. dan Teknol. Komputer), vol. 10, no. 3, pp. 672–679, 2025, doi: 10.33480/jitk.v10i3.6154.

M. Lestari and A. Fritz, “Optimizing Government Resource Management for Smart Cities : A Framework-Based Approach,” Int. J. Eng. Inf. Syst., vol. 8, no. 12, pp. 13–20, 2024, [Online]. Available: http://ijeais.org/wp-content/uploads/2024/12/IJEAIS241203.pdf

M. Lestari, A. F. Wijaya, and M. M. D. Chandra, “Enterprise Architecture Model for Smart Government Implementation,” J. Inf. Syst. Informatics, vol. 7, no. 1, pp. 78–96, 2025, doi: 10.51519/journalisi.v7i1.978.

R. Meiyanti, Y. Jumaryadi, R. Fajriah, and B. Priambodo, “Architecture of Smart Tourism Application: a Developing Countries’ Perspective a Case Study in Indonesia,” JITK (Jurnal Ilmu Pengetah. dan Teknol. Komputer), vol. 10, no. 2, pp. 295–303, 2024, doi: 10.33480/jitk.v10i2.5381.

M. N. Fadilla, N. Wilantika, and A. Gandhi, “Understanding the Continuance of Electronic Payments Usage After Covid-19: a Survey in Indonesia,” JITK (Jurnal Ilmu Pengetah. dan Teknol. Komputer), vol. 10, no. 2, pp. 231–240, 2024, doi: 10.33480/jitk.v10i2.5492.

I. Vicenovie Oisina Situmeang, W. Harkandi Kencana, K. Januar Rahmawati, H. Setio Nugroho, and A. Yankie Lubis, “Pemanfaatan Aplikasi Dan Tingkat Pengetahuan Smart Government Terpadu Untuk Perubahan Perilaku Masyarakat Utilization Of Smart Government Integrated Applications And Knowledge Level Of Changing Community Behavior,” J. Magister Ilmu Komun., vol. 9, no. 1, pp. 147–162, 2023, [Online]. Available: http://journal.ubm.ac.id/

Downloads

Published

2025-08-15

How to Cite

[1]
A. F. Wijaya, M. Lestari, and F. Angelica, “OPTIMIZING IT GOVERNANCE FOR ENHANCED SECURITY IN SMART CITIES”, jitk, vol. 11, no. 1, pp. 44–54, Aug. 2025.