Claim Missing Document
Check
Articles

Found 2 Documents
Search

Dinamika Harga BBM: Dampaknya Terhadap Ekonomi Nasional dan Daya Beli Masyarakat Edy Soesanto; Thomas Komansilan; Natasha Salsabillah
Jupiter: Publikasi Ilmu Keteknikan Industri, Teknik Elektro dan Informatika Vol. 3 No. 1 (2025): Januari: Publikasi Ilmu Keteknikan Industri, Teknik Elektro dan Informatika
Publisher : Asosiasi Riset Ilmu Teknik Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61132/jupiter.v3i1.686

Abstract

The fluctuation of fuel prices (BBM) significantly impacts the national economy and public purchasing power. This study examines the dynamic relationship between fuel price adjustments, economic growth, inflation, and the socioeconomic conditions of society. The findings reveal that an increase in fuel prices often triggers a domino effect, including rising transportation and production costs, ultimately affecting consumer prices and reducing purchasing power. Conversely, the decline in fuel prices provides a short-term boost to public spending but may challenge government revenue if fuel subsidies increase. Policy recommendations include balancing fuel price adjustments with measures to protect vulnerable groups and maintain economic stability.
Implementasi Keamanan Cyber Berbasis Nilai Nilai Kebangsaan UUD 1945 di Era Digital Best Practice di Perusahaan Pertamina Thomas Komansilan; Edy Soesanto; Natasha Salsabillah
Saturnus : Jurnal Teknologi dan Sistem Informasi Vol. 2 No. 3 (2024): Juli : Saturnus : Jurnal Teknologi dan Sistem Informasi
Publisher : Asosiasi Riset Teknik Elektro dan Informatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61132/saturnus.v2i3.116

Abstract

The advancement of digital technology has brought about significant progress across various sectors, while simultaneously introducing new risks, particularly in the realm of cybersecurity. Cybersecurity has become a critical concern for companies, including energy giants like Pertamina. In the context of Indonesia, adherence to cybersecurity within Pertamina must align with relevant legal frameworks, such as the 1945 Constitution (UUD 1945). This research aims to explore optimal approaches to implementing cybersecurity within Pertamina, with a focus on the legal underpinnings of the 1945 Constitution. Key attention is directed towards Article 27, paragraph (3) of the Constitution, which guarantees universal access to education, including information security training for employees—a crucial element in thwarting cyber threats. Furthermore, Article 28, paragraph (1) of the 1945 Constitution, safeguarding freedom of association, can be interpreted to endorse collaboration between Pertamina and external entities, like cybersecurity institutions and regulatory bodies, to bolster cyber defense capabilities. Integration of cutting-edge security technology is paramount, aligning with the principles outlined in Article 33, paragraph (2) of the 1945 Constitution, emphasizing the preservation of natural resources. This extends to safeguarding Pertamina's data and digital infrastructure through measures like encryption technology, robust network security protocols, and effective intrusion detection systems. By heeding the legal foundations provided by the 1945 Constitution, the implementation of cybersecurity at Pertamina must be comprehensive, encompassing employee education, technological upgrades, and collaborative efforts with external stakeholders. Such measures aim to mitigate cyber risks, safeguard operational interests, and shield sensitive information from evolving threats in today's digital landscape. Additionally, Law Number 11 of 2008 plays a crucial role in governing information technology and electronic transactions in Indonesia. This legislation grants legal validity to electronic documents, signatures, and transactions, while also ensuring information security and user privacy. It imposes criminal penalties for illicit activities in the realm of information technology, fostering a secure environment for electronic transactions and upholding user rights in the digital age.