Asyifa Putri Triandari


Are all the information stored in digital libraries, both information in the form of collections or user personal data, guaranteed security? This article discusses the threats to information security in digital libraries and their prevention. This study uses a qualitative method with a research library technique, namely research that refers to previous studies, several expert opinions, and other reliable sources obtained by the author by digitally reviewing the research results. The research conducted shows that information security threats in digital libraries do not attack programs or applications that are used to manage information only, but also physical objects to store the information. Examples of information security threats to digital libraries are malware which consists of various types. The easiest way to keep information that is stored safely is by backing up (duplicating information). However, backup alone is not enough. It is necessary to improve the performance of librarians or other training managers by including various national and international events. Not only human resources, but various devices used in digital libraries also need to be updated so that the system that is run is not easily disturbed. In addition, digital libraries should in some time hold simulations of conceding information, so that when such unexpected incidents occur, libraries can take appropriate steps so that the impact that occurs is not more widespread.


Digital Library, Lnformation Security, Their Prevention

Full Text:



Aji, R. 2016. "Digitalisasi Era Tantangan Media (Analisis Kritis Kesiapan Fakultas Dakwah dan Komunikasi Menyongsong Era Digital)." Islamic Communication Journal.

Ali, I. 2012. "Kejahatan Terhadap Informasi (Cybercrime) dalam Konteks Perpustakaan Digital." April. Accessed December 18, 2021.

Allili, M.S., N. Casemajor, and A. Talbi. 2019. "Image Copy Detection and Evolution Visualisation Using Three Graphs."

Anday, A., E. Francese, H. C. Huurdeman, M. Yilmaz, and D. Zengenene. 2012. "Information Security Issues in a Digital Library Environment: A Literature Review." 117-137.

Arms, W. Y. 2000. "Access Management and Security." In Digital Library (MIT Press). Accessed December 23, 2021.

Badan Pengembangan Bahasa. 2016. "Digital." Accessed December 2021.

—. 2016. Perpustakaan. Accessed December 2021.

Basuki, S. n.d. "Ilmu Pengantar Perpustakaan."

BPPTIK. 2014. "Keamanan Informasi." Artikel, March. Accessed December 20, 2021.

BSN. 2020. "Laporan Kinerja Pusat Data dan Sitem Informasi (PUSDATIN)." Accessed April 8, 2022.

—. 2014. "Teknologi Informasi - Teknik Keamanan - Sistem Manajemen Keamanan Informasi - Gambaran Umum dan Kosakata."

Cambridge Dictionary. 2021. Digital. Accessed December 2021.

Dhillon, G. 2017. "What to do Before and After a Cybersecurity Breach?" Accessed April 10, 2022.

Eslahi, M., R. Salleh, and N. B. Anuar. 2012. "Bots and Botnets: An Overview of Characteristics, Detection, and Challenges." IEEE International Conference of Control System, Computing, and Engineeriing. Penang: ResearchGate. Accessed April 6, 2022.

Fang, Weidong, Wei Chen, Wuxiong Zhang, Jun Pei, Weiwei Gao, and Guohui Wang. 2020. "Digital Signature Scheme for Information Non-repudiation in Blockchain: A state of the art review." EURASIP Journal on Wireless Communications and Networking. Accessed April 9, 2022.

Fox, Edward, and N. ElSherbiny. 2011. "Security and Digital Libraries." April: 151-158. Accessed December 2021. doi:10.5772/15762.

Galih, Aulia Puspaning. 2020. "Keamanan Informasi (Information Security) pada Aplikasi Perpustakaan iPusnas." June. Accessed April 11, 2022.

GeeksforGeeks. 2021. What is Information Security? October 31. Accessed December 19, 2021.

Gustifa, R. 2017. "Malware." April. Accessed December 23, 2021.

Hadadi, Al. 2017. "Pengertian Teknologi serta Definisi Teknologi Menurut Para Ahli." July. Accessed December 17, 2021.

Hatzivasilis, G. 2020. "Password Management: How Secure Is Your Login Process." Model-driven Simulation and Training Environments for Cybersecurity (MSTEC 2020) (ResearchGate). Accessed April 10, 2022.

Hien, N. L., and T. O. Nguyen. 2015. "A Copy Detector Method Based on SCAM and PPCHECKER." the Sixth International Symposium (ResearchGate). Accessed April 10, 2022.

Humas BSN. 2020. "BSN Dukung PPATK dalam Penerapan SNI ISO/IEC 27001:2013 ." Accessed April 7, 2022.

IFLA. 2015. "Statement on Privacy in the Library Environment." (International Federation of Library Associations and Institutions) 1-2. Accessed December 22, 2022.

Imaji, Asibi. 2019. "Ransomware Attacks: Critical Analysis, Threats, and Prevention Methods." (ResearchGate). Accessed April 7, 2022.

Kean, Danuta. 2017. Ransomware Attack Paralysis St Louis Libraries as Hackers Demand Bitcoins. The Guardian. Accessed April 8, 2022.

Kersh, N. 2020. "Adware." Accessed April 6, 2022.

Kurniawan, Kresna Pradiva. 2018. "Pengertian Keamanan Informasi." November. Accessed December 20, 2021.

Liu, Leian, Zuanxing Yin, Haitao Lin, and Yuli Shen. 2012. "Research and Design of Rootkit Detection Method." 2012 International Conference on Medical Physics and Biomedical Engineering. ResearchGate. 852-857. Accessed April 7, 2022. doi:10.1016/j.phpro.2012.05.145.

Najoan, Xaverius. 2020. "Analisis Aspek Keamanan dalam Menghadapi Rootkit Berbasis Mesin Virtual (VMBR)." Accessed December 23, 2021.

Namanya, Anitta Patience, Andrea J. Cullen, Irfan Awan, and Jules Pagna Diss. 2018. "The Worldof Malware: An Overview." 2018 IEEE 6th International Conference on Future Internet of Things and Cloud (FiCloud). Barcelona: ResearchGate. Accessed December 23, 2021. doi:10.1109/FiCloud.2018.00067.

Olufohunsi, Temitope. 2019. "Data Encryption." (ResearchGate). Accessed April 9, 2022.,algorithm%20(Bassel).

Ramdhani, Abdullah, Muhammad Ali Ramdhani, and Abdusy Syakur Amin. 2014. "Writing a Literature Review Research Paper: A step-by-step approach." International Journal of Basics and Applied Sciences (Insan Akademika Publications). Accessed May 26, 2022.

Rashad, A. F. 2016. "Contoh Kasus Kriptografi di Kehidupan Nyata yang Terjadi pada Tahun 2014/2015." Accessed April 9, 2022.

Rivalina, Rahmi, and Oos M. Anwas. 2013. "Teknologi Informasi dan Komunikasi dalam Optimalisasi Peprustakaan." Jurnal Teknodik 17. Accessed December 17, 2021.

Safitri, Tiara Hilda. 2017. "Pustakawan Profesional di Era Digital." Jurnal Kepustakwanan dan Masyarakat Membaca 33. Accessed December 2021.

Solichin, Achmad. 2010. "Digital Watermarking untuk Melindungi Informasi Multimedia." (ResearchGate). Accessed April 10, 2022.

Sulaiman, Oris Krianto, Mohamad Ihwani, and Salman Fajar Rizki. n.d. "Model Keamanan Informasi Berbasis Tanda Tangan Digital dengan Data Encryption Standard (DES) Algorithm." Jurnal Nasional Informatika dan Tekologi Jaringan 1: 14-19. Accessed April 10, 2022. doi:10.30743/infotekjar.v1i1.82.

Syafnidawaty. 2020. Apa Itu Repository? Universitas Raharja. November. Accessed December 23, 2021.

—. 2020. "Digital." May. Accessed December 19, 2021.

—. 2020. Literature Riview. Universitas Raharja. October. Accessed May 26, 2022.


Wahdah, Siti. 2020. "Perpustakaan Digital, Koleksi Digital dan Undang-Undang Hak Cipta." Pustaka Karya: Jurnal Ilmiah Ilmu Perpustakaan dan Informasi 8: 26-36.

Wulandari, Dian. 2012. "Jaringan Perpustakaan Digital di Indonesia: Hambatan dan Wacana Pengembangannya." April. Accessed April 7, 2022.,GARUDA%20(Garba%20Rujukan%20Digital).

Zimerman, Martin. 2009. "Protect Your Library's Computers." emerald. doi:10.1108/03074801011044070.



  • There are currently no refbacks.

Copyright (c) 2022 VISI PUSTAKA: Buletin Jaringan Informasi Antar Perpustakaan

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

Address :

Contact person : 

WA Number

081327669994 PURNOMO