TATA KELOLA REKAM MEDIS BERBASIS TEKNOLOGI INFORMASI DALAM PENANGANAN KERAHASIAAN DAN KEAMANAN DATA PASIEN DENGAN METODE KRIPTOGRAFI
Main Article Content
Abstract
Article Summary
Confidentiality and security of patient data in hospitals is very important and data protection is mandatory. In this study, a problem was found, namely that there was no guarantee of protecting the security and confidentiality of patient data which allowed the data to leak. This study aims to design an information technology-based medical record governance system to maintain the confidentiality and security of patient data. The research technique uses a qualitative methodology with a descriptive approach and collects data through observation, interviews and literature studies. While the waterfall method is used to develop the system through the stages of needs analysis, design, implementation and testing. The system design was carried out using Microsoft Visual Studio 2010 which was implemented using the AES (Advanced Encryption Standard) Rijndael cryptography algorithm. The results of the research that has been done are obtained that the existence of information technology-based medical record governance in handling the confidentiality and security of patient data using AES cryptography can increase the confidentiality and security of patient data in medical record management.
Downloads
Article Details

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
References
Wulandari, T., & Putra, D. M. (2020). Study Literature Riview Tentang Implementasi Pada Unit Keja Rekam Medis Rawat Jalan Dengan Metode HOT - Fit. Jurnal Administrasi Dan Informasi Kesehatan, 1(2), 157–170. http://ojs.stikeslandbouw.ac.id/index.php/ahi/article/view/167
Suci, N. N., Nugroho, N. B., & Murniyanti, S. (2018). Implementasi Kriptografi Untuk Keamanan Data Rekam Medis Di Klinik Pratama Siti Rahmah Menggunakan Metode Advanced Encryption Standard. Jurnal Cyber Tech, 1(10), 1–13. https://ojs.trigunadharma.ac.id/index.php/jct/article/view/3622
Pratiwi, R., Utami, L. C., Sakti, R. B., & Triase. (2022). Perancangan Keamanan Data Pesan Dengan Menggunakan Metode Kriptografi Caesar Cipher. Bulletin of Information Technology …, 3(4), 367–373. https://doi.org/https://doi.org/10.47065/bit.v3i4.420
Hulu, D., Nadeak, B. D., & Aripin, S. (2020). Implementasi Algoritma AES (Advanced Encryption Standard) Untuk Keamanan File Hasil Radiologi di RSU Imelda Medan. KOMIK (Konferensi …, 4, 78–86. https://doi.org/10.30865/komik.v4i1.2590
Permana, A. A., & Nurnaningsih, D. (2018). Rancangan Aplikasi Pengamanan Data Dengan Algoritma Advanced Encyption Standard (Aes). Jurnal Teknik Informatika, 11(2), 177–186. https://doi.org/10.15408/jti.v11i2.7811
Valdho Falensky, L., & Ineke Pakereng, M. A. (2022). Pengamanan Data Pasien Di UPT. Puskesmas Pujon Kalimantan Tengah Menggunakan Kriptografi Super Enkripsi. Jurnal Sains Komputer & Informatika (J-SAKTI, 6(2), 711–725. https://doi.org/http://dx.doi.org/10.30645/j-sakti.v6i2.484
Listiani, I., Nasution, M. S., Sari, W. I., & Nasution, A. B. (2022). Perancangan Keamanan Data Pasien Di Klinik Kecantikan Ratu Beauty Studio Menggunakan Metode Kriptografi RSA. Jurnal Informatika Teknologi Dan Sains, 4(4), 437–443. https://doi.org/10.51401/jinteks.v4i4.2173
Kandokang, L. R., Pekuwati, A. A., & Lede, P. A. L. (2023). PERANCANGAN SISTEM PENGAMANAN DATA PASIEN MENGGUNAKAN METODE KRIPTOGRAFI VIGENÈRE CIPHER. SATI: Sustainable Agricultural Technology Innovation, 1–9. https://ojs.unkriswina.ac.id/index.php/semnas-FST/article/view/385
Ridho, R., Bisri, C., & Harahap, A. M. (2023). Penerapan Kriptografi Enkripsi Dan Deskripsi Dalam Pendataan Pasien Klinik Mama Harfas Tembung Menggunakan Visual Basic. Jurnal Penelitian Dan …, 2(1), 30–33. https://doi.org/https://doi.org/10.47233/jppie.v2i1.676
Ferdiansyah, Id Hadiana, A., & Rakhmat Umbara, F. (2021). Penggunaan QR Code Berbasis Kriptografi Algoritma AES (Advanced Encryption Standard) Untuk Administrasi Rekam Medis. Journal of Information Technology, 3(2), 20–27. https://doi.org/10.47292/joint.v3i2.64.