Computer Network Security in E-Commerce Businesses (A Case Study of the 2020 Tokopedia Data Breach)
Keywords:
Cloud Computing, Digital Transformation, Digital Productivity, Data Security, Real-time AccessAbstract
The rapid development of digital activities in the modern era demands a way for humans to carry out various digital activities. Under these conditions, cloud computing has emerged as a paradigmatic solution that supports digital transformation by providing data storage services, application processing, and online collaboration. This study is to analyze the use of cloud computing in supporting various dimensions of digital activities and identify its strategic benefits and challenges. In addition, this digital technology is equipped with advanced security, multi-factor authentication, and role-based access management that can minimize data security risks. This study applies a systematic literature review with a qualitative approach that focuses on scientific publications and the latest industry reports (2019–2024). This study shows that cloud computing significantly supports digital activities through increased infrastructure scalability, accessibility of services from anywhere, efficiency of operational costs based on pay-per-use, and acceleration of innovation with ready-to-use services (such as AI and Big Data). However, challenges remain in the aspects of cybersecurity, the complexity of multi-cloud management, and dependence on service providers. This study confirms that cloud computing not only functions as a technology enabler, but also as a strategic pillar in building digital competitiveness in the modern era. The implications suggest that organizations need to formulate a robust cloud strategy, strengthen governance, and address security challenges to maximize its value and benefits.
References
[1] A. Kadir, Pengenalan Sistem Informasi. Yogyakarta: Andi Offset, 2018.
[2] R. Abdulloh, Keamanan Sistem Informasi. Bandung: Informatika, 2017.
[3] M. S. Wahyudi dan A. Nugroho, “Analisis Keamanan Sistem Informasi pada Aplikasi E-Commerce,” Jurnal Teknologi Informasi dan Ilmu Komputer (JTIIK), vol. 8, no. 2, pp. 215–222, 2021.
[4] S. R. Putra dan D. M. Khairina, “Evaluasi Keamanan Jaringan Menggunakan Firewall dan Intrusion Detection System,” Jurnal Ilmiah Teknologi Informasi, vol. 6, no. 1, pp. 45–53, 2020.
[5] R. A. Prasetyo, “Keamanan Data dan Privasi Pengguna dalam Sistem E-Commerce,” Jurnal Sistem Informasi, vol. 15, no. 2, pp. 89–98, 2019.
[6] Y. H. Wibowo dan A. F. Ramadhan, “Analisis Risiko Keamanan Informasi pada Platform E-Commerce di Indonesia,” Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi), vol. 5, no. 4, pp. 642–649, 2021.
[7] Kominfo Republik Indonesia, Keamanan Siber dan Perlindungan Data Pribadi di Indonesia. Jakarta: Kementerian Komunikasi dan Informatika, 2020.
[8] Badan Siber dan Sandi Negara (BSSN), Laporan Tahunan Keamanan Siber Indonesia. Jakarta: BSSN, 2020.
[9] Tokopedia, “Pernyataan Resmi Terkait Isu Keamanan Data Pengguna,” Tokopedia Official Blog, 2020.
[10] A. Hidayat dan N. Sari, “Pengaruh Keamanan Sistem terhadap Kepercayaan Pengguna E-Commerce,” Jurnal Manajemen Informatika, vol. 9, no. 1, pp. 33–41, 2020.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Dhifa Dharma Rafadhani, Dinda Pratiwi, Nabila Sayidina (Penulis)

This work is licensed under a Creative Commons Attribution 4.0 International License.
Creative Commons Attribution 4.0 International (CC BY 4.0).


This work is licensed under a