ISO 27001 As Information Security Solution In Society 5.0 Era: Systematic Literature Review
DOI:
10.33395/sinkron.v9i1.14448Keywords:
Era Society 5.0, ISO 27001, Information Security, Organization, Systematic Literature ReviewAbstract
In the era of Society 5.0, information security is an important issue along with the increasing use of technologies such as the Internet of Things (IoT), Artificial Intelligence (AI), and big data. ISO 27001 acts as a globally recognized standard framework for managing information security. The ISO 27001 standard provides a systematic framework for identifying, assessing, and managing information security risks so as to ensure the integrity, confidentiality, and availability of data in an organization. This research aims to evaluate the implementation of ISO 27001 as an information security solution in the Society 5.0 era through a systematic literature review. Using the Systematic Literature Review (SLR) method, this research collects and analyzes relevant literature to identify benefits, challenges, and recommendations related to the application of ISO 27001 in an era of increasingly integrated technology. The results showed that the implementation of ISO 27001 in the Society 5.0 era proved to make a significant contribution in improving organizational information security. This is done through a PDCA (Plan-Do-Check-Act) approach that integrates information security policies into business processes, strengthens risk management, technology infrastructure, and human resource competencies. In conclusion, the implementation of ISO 27001 in the Society 5.0 era not only improves information security, but also supports the achievement of operational efficiency and organizational sustainability amid rapid technological developments.
Downloads
References
Alexei, A. (2021). Ensuring Information Security in Public Organizations in the Republic of Moldova Through the Iso 27001 Standard. Journal of Social Sciences, IV(1)(March). https://doi.org/10.52326/jss.utm.2021.4(1).11
Amirinnisa, M., & Bisma, R. (2023). Analisis Penilaian Risiko Keamanan Informasi Berdasarkan Iso 27005 Untuk Persiapan Sertifikasi Iso 27001 pada Pemerintah Kota Madiun. Jeisbi, 04(04), 47–58.
Arini, A. (2019). Pendeteksian Dini Tingkat Kemanan Informasi Berbasis Iso 27001 : 2013 Menggunakan Metode Ahp (Analytical Hierarchy Process). Cyber Security Dan Forensik Digital, 2(2), 57–64. https://doi.org/10.14421/csecurity.2019.2.2.1480
Bakri, M., & Irmayana, N. (2017). Analisis Dan Penerapan Sistem Manajemen Keamanan Informasi Simhp Bpkp Menggunakan Standar Iso 27001. Jurnal Tekno Kompak, 11(2), 41. https://doi.org/10.33365/jtk.v11i2.162
Budi, E., Wira, D., & Infantono, A. (2021). Strategi Penguatan Cyber Security Guna Mewujudkan Keamanan Nasional di Era Society 5.0. Prosiding Seminar Nasional Sains Teknologi Dan Inovasi Indonesia (SENASTINDO), 3(December 2021), 223–234. https://doi.org/10.54706/senastindo.v3.2021.141
Carayannis, E. G., & Morawska-Jancelewicz, J. (2022). The Futures of Europe: Society 5.0 and Industry 5.0 as Driving Forces of Future Universities. Journal of the Knowledge Economy, 13(4), 3445–3471. https://doi.org/10.1007/s13132-021-00854-2
Culot, G., Nassimbeni, G., Podrecca, M., & Sartor, M. (2021). The ISO/IEC 27001 information security management standard: literature review and theory-based research agenda. TQM Journal, 33(7), 76–105. https://doi.org/10.1108/TQM-09-2020-0202
Fachrur Rozi, N. R., Agustav Wirabudi, A., & Arandiant Rozano, S. (2024). Chance Evaluation and Improvement of Get to Control Data Security Administration Based On ISO/IEC 27001 at Telkom University Jakarta Campus. International Journal of Science Education and Cultural Studies, 3(2), 1–26. https://doi.org/10.58291/ijsecs.v3i2.246
Fathurohman, A., & Witjaksono, R. W. (2020). Analysis and Design of Information Security Management System Based on ISO 27001: 2013 Using ANNEX Control (Case Study: District of Government of Bandung City). Bulletin of Computer Science and Electrical Engineering, 1(1), 1–11. https://doi.org/10.25008/bcsee.v1i1.2
Fattah Ys, M. A., Parga Zen, B., & Wasitarini, D. E. (2024). Penerapan Sistem Manajemen Keamanan Informasi ISO 27001 pada Perpusnas RI dalam mendukung Keamanan Tata Kelola Teknologi Informasi. Cyber Security Dan Forensik Digital, 6(2), 76–82. https://doi.org/10.14421/csecurity.2023.6.2.4190
Fauzia Anis Sekar Ningrum, Yudha Riwanto, Inggrid Yanuar Risca Pratiwi, & Muhammad Ainul Fikri. (2024). Analisis Keamanan Sistem Informasi Perguruan Tinggi Berbasis Indeks KAMI. Jurnal Informatika Polinema, 10(3), 437–444. https://doi.org/10.33795/jip.v10i3.5154
Haikal, H., Ananza, R. H., Darmawan, I., & Mulyana, R. (2019). Perancangan Tata Kelola Keamanan Informasi Sistem Pemerintahan Berbasis Elektronik (Spbe) Menggunakan Standar Iso 27001:2013 (Studi Kasus: Diskominfotik Kabupaten Bandung Barat) Design of Information Security Governance for E-Government Using Iso 27001:20. Perancangan Tata Kelola Keamanan Informasi Sistem Pemerintahan Berbasis Elektronik (Spbe) Menggunakan Standar Iso 27001:2013 (Studi Kasus: Diskominfotik Kabupaten Bandung Barat), 6(No.2), 8368–8374.
Jelita, L. D. A., Al Azam, M. N., & Nugroho, A. (2024). Evaluasi Keamanan Teknologi Informasi Menggunakan Indeks Keamanan Informasi 5.0 dan ISO/EIC 27001:2022. Jurnal SAINTEKOM, 14(1), 84–94. https://doi.org/10.33020/saintekom.v14i1.623
Justyna, Ż., & Abbas, A. A. (2021). Information Security in Information Systems Among Employees of Industrial Enterprises As Societies 5.0. System Safety: Human - Technical Facility - Environment, 3(1), 64–70. https://doi.org/10.2478/czoto-2021-0007
Kamal, M., Muhamad, M., Sudianto, Y., Fauzan, M. A., Anggito, Y., Yasin, W., & Hermawan, H. (2024). Information Technology Security Audit at the YDSF National Zakat Institution Using the ISO 27001 Framework. Jurnal Sisfokom (Sistem Informasi Dan Komputer), 13(1), 98–103. https://doi.org/10.32736/sisfokom.v13i1.1987
Kapoyos, J. M., Prasetyo, D. A., Gusnaldi, M. R., & Sinlae, F. (2023). Pentingnya Cybersecurity di Era Society 5.0. Pentingnya Cybersecuritydi Era Society 5.0, vol 1(5), 1344–1351. https://jurnal.intekom.id/index.php/njms/article/view/229/199
Kitsios, F., Chatzidimitriou, E., & Kamariotou, M. (2023). The ISO/IEC 27001 Information Security Management Standard: How to Extract Value from Data in the IT Sector. Sustainability (Switzerland), 15(7). https://doi.org/10.3390/su15075828
Lee, W. J., & Hwang, I. (2021). Sustainable information security behavior management: An empirical approach for the causes of employees’ voice behavior. Sustainability (Switzerland), 13(11), 1–23. https://doi.org/10.3390/su13116077
Mirtsch, M., Kinne, J., & Blind, K. (2021). Exploring the Adoption of the International Information Security Management System Standard ISO/IEC 27001: A Web Mining-Based Analysis. IEEE Transactions on Engineering Management, 68(1), 87–100. https://doi.org/10.1109/TEM.2020.2977815
Monev, V. (2020). Organisational Information Security Maturity Assessment Based on ISO 27001 and ISO 27002. 2020 34th International Conference on Information Technologies, InfoTech 2020 - Proceedings, September, 17–18. https://doi.org/10.1109/InfoTech49733.2020.9211066
Mu’izz, D. F. A., Kurniawan, P. M., Durunnafis, A., Yaqin, M. A., & Fauzan, A. C. (2023). Survei Pengukuran Usability Software Menggunakan Metode Systematic Literature Review. ILKOMNIKA: Journal of Computer Science and Applied Informatics, 5(3), 223–243. https://doi.org/10.28926/ilkomnika.v5i3.444
Muhamad Bisri Mustofa, Evin Luthfiah Dwiandrini, Indriani Agustin, M. Afief Esyarito, Mutiara Anggraeni, & Siti Wuryan. (2022). MEDIA MASSA DAN CYBER CRIME DI ERA SOCIETY 5.0 (Tinjauan Multidisipliner). Jurnal Prodi Komunikasi Dan Penyiaran Islam, 13(1), 77–98.
Phirke, A., & Ghorpade-Aher, J. (2019). Best practices of auditing in an organization using ISO 27001 standard. International Journal of Recent Technology and Engineering, 8(2 Special Issue 3), 691–695. https://doi.org/10.35940/ijrte.B1128.0782S319
Ramos Mamami, R. G., Cahuaya Ancco, R., & Llanqui Argollo, R. R. (2023). IT policy and information security management based on ISO 27001. Innovación y Software, 4(1), 96–106. https://doi.org/10.48168/innosoft.s11.a57
Ryanto, K., & Tundjungsari, V. (2024). Standardization of Information Security Management in the Banking Sector using the ISO 27001:2022 Framework. Journal La Multiapp, 5(4), 344–354. https://doi.org/10.37899/journallamultiapp.v5i4.1399
Sama, H., Licen, L., Saragi, J. S. D., Erline, M., Kelvin, K., Hartanto, Y., Winata, J., & Devalia, M. (2021). Studi Komparasi Framework Nist Dan Iso 27001 Sebagai Standar Audit Dengan Metode Deskriptif Studi Pustaka. Rabit : Jurnal Teknologi Dan Sistem Informasi Univrab, 6(2), 116–121. https://doi.org/10.36341/rabit.v6i2.1752
Sari, R. T. K., & Hindarto, D. (2023). Implementation of Cyber-Security Enterprise Architecture Food Industry in Society 5.0 Era. SinkrOn, 8(2), 1074–1084. https://doi.org/10.33395/sinkron.v8i2.12377
Sinaga, R., & Taan, F. (2024). Penerapan ISO/IEC 27001:2022 dalam Tata Kelola Keamanan Sistem Informasi: Evaluasi Proses dan Kendala. Nuansa Informatika, 18(2), 46–54. https://doi.org/10.25134/ilkom.v18i2.205
Soesanto, E., Kurniasih, F., Mutiara, P., & Afifi, S. T. (2023). Analisis Sistem manajemen keamanan informasi dengan standar ISO/IEC 27001 dan ISO/ICE 27002 pada PT Jasa Marga. Co-Creation : Jurnal Ilmiah Ekonomi Manajemen Akuntansi Dan Bisnis, 1(4), 155–164. https://doi.org/10.55904/cocreation.v1i4.700
Statista. (2022). Worldwide Internet of Things (IoT) Attacks. https://www.statista.com/statistics/1322216/worldwide-internet-of-things-attacks/ (accessed Sep. 28, 2024).
Sugianto, A. D. L., Samopa, F., & Astuti, H. M. (2020). Penilaian Dan Kontrol Risiko Terhadap Infrastruktur Dan Keamanan Informasi Berdasarkan Standar Iso/Iec 27001:2013 (Studi Kasus: Institut Teknologi Sepuluh Nopember). Sebatik, 24(1), 96–101. https://doi.org/10.46984/sebatik.v24i1.910
Sugiarto, I., Hasnah, S., Annas, A. N., Sundari, S., & Dhaniswara, E. (2023). Inovasi Pembelajaran Berbasis Teknologi Artificial Intelligences (AI) Pada Sekolah Kedinasan Di Era Revolusi Industri 4.0 Dan Society 5.O. Journal Of Social Science Research, 3(5), 10546–10555.
Sundari, P., & Wella, W. (2021). SNI ISO/IEC 27001 dan Indeks KAMI: Manajemen Risiko PUSDATIN (PUPR). Ultima InfoSys : Jurnal Ilmu Sistem Informasi, 12(1), 35–42. https://doi.org/10.31937/si.v12i1.1701
Troisi, O., Visvizi, A., & Grimaldi, M. (2023). Rethinking innovation through industry and society 5.0 paradigms: a multileveled approach for management and policy-making. European Journal of Innovation Management, 27(9), 22–51. https://doi.org/10.1108/EJIM-08-2023-0659
Tutik, T., Mutiah, N., & Rusi, I. (2022). ANALISIS DAN MANAJEMEN RISIKO KEAMANAN INFORMASI MENGGUNAKAN METODE FAILURE MODE AND EFFECTS ANALYSIS (FMEA) DAN KONTROL ISO/IEC 27001:2013 (Studi Kasus : Dinas Komunikasi dan Informatika Kabupaten Sambas). Coding Jurnal Komputer Dan Aplikasi, 10(02), 249. https://doi.org/10.26418/coding.v10i02.55082
Yahya, H., Aznur, M., Agnestesia, N., & Ikhwan, A. (2023). Analisis Keamanan Fisik Data Prodi Sistem Informasi UIN Sumatera Utara Medan Menggunakan Standar ISO 27001. Jurnal Penelitian Dan Pengkajian Ilmiah Eksakta, 2(1), 39–44. https://doi.org/10.47233/jppie.v2i1.675
Yuwono, S. T., Pratama, N., & Afifah, V. (2022). Re-Assessment Konsistensi Dokumen Kontrol Sertifikasi ISO 27001: 2013 (ISMS) di Bagian Komunikasi Satelit Monitoring PT. Bank BRI, TBK. Jurnal IKRAITH-Informatika, 6(2), 21–28. https://journals.upi-yai.ac.id/index.php/ikraith-informatika/article/download/1570/1285
Z.Adam. (2023). 85% of Cybersecurity Leaders Say Recent Attacks Powered by AI: Weekly Stat. CFO. https://www.cfo.com/news/cybersecurity-attacks-generative-ai-security-ransom/692176/ (accessed Sep. 28, 2024).
Downloads
How to Cite
Issue
Section
License
Copyright (c) 2025 Nurbojatmiko, Muhammad Sharhan Khatami Karimiyah, Nur Muhammad Asnadi, Rifka Anisyah

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.