Data Security Analysis in Information Management in Digital Food Sovereignty Systems

Authors

  • Ida Ayu Dara Putri Amaranggani Universitas Bumigora
  • Lilik Widyawati Universitas Bumigora
  • Dadang Priyanto Universitas Bumigora
  • Galih Hendro Martono Universitas Bumigora

DOI:

https://doi.org/10.59934/jaiea.v4i3.1117

Keywords:

Data Security, Food Sovereignty, Information Management, Security Risk, Digital Systems

Abstract

The digital food sovereignty system represents an innovation in food information management, enhancing efficiency, transparency, and food security across various sectors. However, during its implementation, data security remains one of the most significant challenges that must be addressed to ensure the system’s continuity and reliability. This study aims to analyze data security aspects within the digital food sovereignty system, focusing on potential risks, vulnerabilities, and applicable mitigation strategies. A descriptive qualitative approach was employed, involving data collection through direct observation, stakeholder interviews, and literature reviews from relevant sources. The findings indicate that key challenges in data security include threats from cyberattacks, data breaches, and insufficient user awareness regarding the importance of information protection. To address these issues, strict security measures such as data encryption, multi-layered authentication, and regular system monitoring are essential. The analysis highlights that strengthening data security in digital food sovereignty systems requires a comprehensive approach that integrates technical solutions, policy development, and user education. This research is expected to contribute to the formulation of more effective security strategies that support the advancement of digital-based food sovereignty.

Downloads

Download data is not yet available.

References

Rachmayani, A. N. (2015). Kesiapan daerah mendukung pertanian modern. Jurnal Agribisnis Indonesia, 3(1), 45–60.

Popon, R. Y. (2023). Building a cyber security system in the archipelago capital (IKN) to support it. Kemhan RI.

Swajati, W. G. (2019). Strategi implementasi regulasi perlindungan data pribadi di Indonesia. Indonesiana, 1–26. https://www.indonesiana.id/read/6877/urgensi-regulasi-perlindungan-data-pribadi-di-indonesia.

Timisela, N. R., Dwidjono, H. D., & Hartono, S. (2014). Supply chain management and performance of local food sago agroindustry in Maluku Province: A structural equation models approach. Agritech, 34(2), 184–193. https://doi.org/10.22146/agritech.29676

Ummah, M. S. (2019). Pilar-pilar hukum progresif menyelami pemikiran Satjipto Rahardjo. Sustainability, 11(1), 1–14. https://doi.org/10.3390/su11010001

Downloads

Published

2025-06-15

How to Cite

Putri Amaranggani, I. A. D., Lilik Widyawati, Dadang Priyanto, & Galih Hendro Martono. (2025). Data Security Analysis in Information Management in Digital Food Sovereignty Systems. Journal of Artificial Intelligence and Engineering Applications (JAIEA), 4(3), 2134–2138. https://doi.org/10.59934/jaiea.v4i3.1117

Issue

Section

Articles