Main Article Content

Abstract

Indonesia’s digital health push has fostered an integrated telemedicine ecosystem centered on SATUSEHAT Mobile and major private platforms, intensifying cross-system clinical data exchange. This raises the salience of three dimensions: behavior (human factors), compliance (regulatory/standards alignment), and cyber resilience (prevent, respond, and recover). This study maps the evidence on these dimensions in Indonesia’s telemedicine context and develops a maturity evaluation model with baseline operational practices. We conducted a Systematic Literature Review guided by PRISMA, covering publications from 2020 to 2025 in major scholarly databases under inclusion criteria specific to Indonesian telemedicine. Eligible studies were extracted and analyzed qualitatively using NVivo, with open axial selective coding, to produce a thematic synthesis and a concept map across the three focal dimensions. The synthesis yields four theme clusters: (1) behavior & security literacy (credential hygiene, social engineering awareness, BYOD/remote access); (2) audit & operational compliance (logging/audit trails, breach reporting, adoption of standards/certifications); and (3) incident response & resilience (runbooks, backup/restore, failover, BCP/DRP testing). Key gaps include consent traceability across FHIR-based interoperability flows, end-to-end resilience indicators (e.g., integration MTTR, standardized failover tests), and comparative cross-platform assessments. Outputs comprise a behavior→compliance→resilience conceptual model, a maturity evaluation framework, and non-policy baseline operational practices.

Keywords

Telemedicine User Behavior Data Compliance Cyber Resilience SATUSEHAT Mobile

Article Details

How to Cite
Jaya, A. I., Kadarisman, S., & Agusiady, R. R. (2025). A Systematic Analysis of Telemedicine Behavior, Compliance and Cyber Resilience In Indonesia. Amkop Management Accounting Review (AMAR), 5(2), 1133–1145. https://doi.org/10.37531/amar.v5i2.3278

References

  1. A. Yi, M. Al-Emran, and K. Shaalan, "Theories in Cybersecurity Behavior Studies," MDPI Applied Sciences, vol. 13, no. 9, 2023. [Online]. Available: https://www.mdpi.com/2076-3417/13/9/5700/pdf
  2. Agusiady, R., Dwiputrianti, S., Kusumastuti, D., Sedarmayanti. (2021). Mewujudkan Good Corporate Governance – Tata Kelola Perushaan yang Baik, Di Era Industri 4.0 dan Masyarakat 5.0. ISBN: 978-623-02-3324-1. Deepublish Publisher.
  3. Agusiady, R., Sedarmayanti, Sunarsi, D., Mulyani. S., R. (2022). Manajemen Rumah Sakit. ISBN: 978-623-02-5066-8. Deepublish Publisher.
  4. Ajzen, I. (1991). The theory of planned behavior. *Organizational Behavior and Human Decision Processes, 50*(2), 179–211. https://doi.org/10.1016/0749-5978(91)90020-T
  5. Almansoori, A., Al-Emran, M., & Shaalan, K. (2023). Exploring the frontiers of cybersecurity behavior: A systematic review of studies and theories. Applied Sciences, 13(9), 5700. https://www.mdpi.com/2076-3417/13/9/5700
  6. Alodokter. Kebijakan Privasi (Privasi). Alodokter
  7. Ameen, A. H., & Mohammed, M. A. (2023). Dimensions of artificial intelligence techniques, blockchain, and cybersecurity in the Internet of Medical Things: Opportunities, Challenges, and Future Directions. *Journal of Intelligent Systems*, 32(3), 567–589. https://doi.org/10.1515/jisys-2022-0267
  8. American Psychological Association. (2017). Ethical principles of psychologists and code of conduct. https://www.apa.org/ethics/code
  9. Antara. (2023, 27 Februari). Kemenkes: Aplikasi PeduliLindungi jadi SatuSehat Mobile mulai 1 Maret. Antara News
  10. Argaw, S. T., Troncoso-Pastoriza, J. R., Lacey, D., & Flury, R. (2020). Cybersecurity of hospitals: Discussing the challenges and working towards mitigating the risks. BMC Medical Informatics and Decision Making, 20(1), 146. https://doi.org/10.1186/s12911-020-01161-7
  11. ASIS International. (2024, 26. Juni). Indonesia Refuses to Pay $8M Ransom in Data Center Cyberattack (insiden PDN). ASIS International
  12. AWS. (2025). Halodoc: Optimizing Resource Use for 20% Improvement on AWS Graviton3 (studi kasus). Amazon Web Services, Inc.
  13. Azwar, A. R., & Sirait, E. S. (2025). The legal framework for personal data protection amidst hospital competition. Proceedings of ICOSEND 2025. https://www.atlantis-press.com/article/126008670.pdf
  14. Bazeley, P., & Jackson, K. (2013). Qualitative Data Analysis with NVivo (2nd ed.). SAGE Publications.
  15. Boell, S. K., & Cecez-Kecmanovic, D. (2015). On being ‘systematic’ in literature reviews. Information Systems Journal, 25(4), 613–635. https://doi.org/10.1016/j.is.2014.07.001
  16. Booth, A., Sutton, A., & Papaioannou, D. (2016). Systematic approaches to a successful literature review (2nd ed.). Sage.
  17. Braun, V., & Clarke, V. (2006). Using thematic analysis in psychology. Qualitative Research in Psychology, 3(2), 77–101. https://doi.org/10.1191/1478088706qp063oa
  18. Creswell, J. W., & Poth, C. N. (2018). Qualitative inquiry and research design: Choosing among five approaches (4th ed.). Sage Publications.
  19. Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. *MIS Quarterly, 13*(3), 319–340. https://doi.org/10.2307/249008
  20. DeLone, W. H., & McLean, E. R. (2003). The DeLone and McLean model of information systems success: A ten-year update. *Journal of Management Information Systems, 19*(4), 9–30. https://doi.org/10.1080/07421222.2003.11045748
  21. Guest, G., Namey, E., & Chen, M. (2020). A simple method to assess thematic saturation. PLOS ONE, 15(5), e0232076.
  22. Haleem, A., Javaid, M., Singh, R. P., & Suman, R. (2021). Telemedicine for healthcare: Capabilities, features, barriers, and applications. Sensors International, 2, 100117. https://doi.org/10.1016/j.sintl.2021.100117
  23. Halodoc Blog. (2024, 6 September). How Halodoc Achieved ISO/IEC 27701:2019 Certification. Halodoc Blog
  24. Health Sector Coordinating Council. (2023). Health Industry Cybersecurity – Securing Telehealth and Telemedicine (HIC-STAT). healthsectorcouncil.org
  25. Hernandez-Jaimes, M. L., & Martinez-Cruz, A. (2023). Artificial intelligence for IoMT security: A review of intrusion detection systems, attacks, datasets, and Cloud–Fog–Edge architectures. *Journal of Biomedical Informatics*, 136, 104206. https://www.sciencedirect.com/science/article/pii/S254266052300210X
  26. Irwandy, I., Suharti, N., & Fadillah, R. (2024). Cybersecurity culture among healthcare workers in Indonesia. Research Square. https://www.researchsquare.com/article/rs-5421169/latest.pdf
  27. ISO/IEC 27001:2013 - Information Security Management Systems. ISO/IEC 27001:2022 - Information security management systems
  28. Jain, S., Ashok, P., & Prabhu, S. (2024). Emerging Technologies for Cybersecurity in Healthcare: Evaluating Risks and Implementing Standards. *IEEE Xplore*. https://ieeexplore.ieee.org/abstract/document/10803219/
  29. Jannink, K. J. B. (2025). How do the protection motivation theory and the self-determination theory influence healthcare employees' intention to perform safe cyber behaviour? http://essay.utwente.nl/105210/
  30. JBI. (2020). JBI manual for evidence synthesis. Scoping Reviews - Resources | JBI
  31. K. Hasegawa, N. O'Brien, and M. Prendergast, "Cybersecurity Interventions in Health Care Organizations in Low-and Middle-Income Countries: Scoping Review," JMIR, vol. 26, no. 1, 2024. [Online]. Available: https://www.jmir.org/2024/1/e47311/
  32. Kruse, C. S., Karem, P., Shifflett, K., Vegi, L., Ravi, K., & Brooks, M. (2017). Evaluating barriers to adopting telemedicine worldwide: A systematic review. Journal of Telemedicine and Telecare, 24(1), 4–12. https://doi.org/10.1177/1357633X16674087
  33. Kadarisman, S. dkk. (2020). The Impact of Human Resource Management Implementation in Business Strategy in Creating Sustainable Competitive Advantage. Proceedings of the 2nd Annual Conference on Blended Learning, Educational Technology and Innovation (ACBLETI 2020). https://www.atlantis-press.com/proceedings/acbleti-20/125957860
  34. Linkov, I., Trump, B. D., Keisler, J. M., & Collier, Z. A. (2018). Resilience and risk: Methods and application in environment, cyber, and social domains. Risk Analysis, 38(9), 1834–1845. https://doi.org/10.1111/risa.12991
  35. Liu, X. (2024). Data ownership in the AI-powered integrated health care. JMIR Medical Informatics, 12, e57754.
  36. Makarim, E. (2024). Telemedicine in the legal system in Indonesia. Dialogia Iuridica, 16(1).
  37. Miles, M. B., Huberman, A. M., & Saldaña, J. (2014). Qualitative Data Analysis: A Methods Sourcebook (3rd ed.). SAGE Publications.
  38. Monteiro, A. C. B., França, R. P., Arthur, R., & Iano, Y. (2021). An overview of the medical Internet of Things, artificial intelligence, and cloud computing employed in health care from a modern panorama. In *Healthcare Technology* (pp. xx–xx). Springer. https://link.springer.com/chapter/10.1007/978-3-030-75220-0_1
  39. OECD. (2020). Digital security and data protection in health: Building resilience and trust. OECD Publishing. https://doi.org/10.1787/9789264812003-en
  40. Ordonez, A. (2020). Cybersecurity in the healthcare industry (Honors thesis). DePauw University.
  41. P. K. Sari et al.,, "Information security behavior in health information systems: a review," Healthcare, vol. 10, no. 12, 2022. [Online]. Available: https://www.mdpi.com/2227-9032/10/12/2531
  42. P. K. Yeng, M. A. Fauzi, and B. Yang, "Human factors in cybersecurity compliance in paperless hospitals," MDPI Info, vol. 13, no. 7, 2022. [Online]. Available: https://www.mdpi.com/2078-2489/13/7/335
  43. Page, M. J., et al., (2021). PRISMA 2020 statement. PLOS Medicine, 18(3), e1003583.
  44. Parker, C. (2002). *The open corporation: Effective self-regulation and democracy*. Cambridge University Press. https://doi.org/10.1017/CBO9780511495194
  45. Rogers, R. W. (1975). A protection motivation theory of fear appeals and attitude change. *The Journal of Psychology, 91*(1), 93–114. https://doi.org/10.1080/00223980.1975.9915803
  46. Rogers, R. W. (1975). A protection motivation theory of fear appeals and attitude change. *The Journal of Psychology, 91*(1), 93–114.
  47. Roobini, S., Kavitha, M., & Sujaritha, M. (2022). Cybersecurity threats to IoMT-enabled healthcare systems. In *Cybersecurity in IoMT* (pp. xx–xx). Taylor & Francis. https://www.taylorfrancis.com/chapters/edit/10.1201/9781003256243-6
  48. Salas, J. A., et al., (2022). Guarding the digital health data as the front gate. Journal of Legal, Ethical & Regulatory Issues, 24(S4), 47–60.
  49. Saleh & Winata (2023). Indonesia's Cyber Security Strategy: Problems and Challenges – IJCAH Proceedings.
  50. Snigdha et al.,, 2025. Cybersecurity in Healthcare IT Systems: Business Risk Management and Data Privacy Strategies – TAJET Journal.
  51. Snyder, H. (2019). Literature reviews as a research methodology: An overview and guidelines. Journal of Business Research, 104, 333–339. https://doi.org/10.1016/j.jbusres.2019.07.039
  52. Suci, R. P., & Dhamanti, I. (2024). Cybersecurity dalam sistem informasi rumah sakit Indonesia. Journal Innovative. https://j-innovative.org/index.php/Innovative/article/download/12632/8537
  53. Sudarsana, I. P., & Ramli, K. (2023). Information security risk assessment using factor analysis of information risk (FAIR) in the healthcare sector: Scoping review. Jurnal Darma Agung, 31(4). https://jurnal.darmaagung.ac.id/index.php/jurnaluda/article/download/3236/3198
  54. Thomasian, N. M., & Adashi, E. Y. (2021). Cybersecurity in the Internet of Medical Things. *Clinical Therapeutics*, 43(1), 1–10. https://www.sciencedirect.com/science/article/pii/S2211883721000721
  55. Torraco, R. J. (2016). Writing integrative literature reviews: Using the past and present to explore the future. Human Resource Development Review, 15(4), 404–428. https://doi.org/10.1177/1534484316671606
  56. Tranfield, D., Denyer, D., & Smart, P. (2003). Towards a methodology for developing evidence-informed management knowledge by means of systematic review. British Journal of Management, 14(3), 207–222. https://doi.org/10.1111/1467-8551.00375
  57. Tyler, T. R. (1990). Why do people obey the law? Yale University Press.
  58. Undang-Undang Nomor 11 Tahun 2008 tentang Informasi dan Transaksi Elektronik (UU ITE).
  59. Wong, G., Greenhalgh, T., Westhorp, G., et al., (2013). RAMESES publication standards: Realist syntheses. BMC Medicine, 11(1), 21. https://doi.org/10.1186/1741-7015-11-21
  60. World Health Organization (WHO). (2021). Global strategy on digital health 2020–2025. World Health Organization. https://apps.who.int/iris/handle/10665/344249
  61. Xiao, Y., & Watson, M. (2019). Guidance on conducting a systematic literature review. Journal of Planning Education and Research, 39(1), 93–112. https://doi.org/10.1177/0739456X17723971
  62. Yeng, P. K., et al., (2022). Assessing the legal aspects of information security requirements for health care in 3 countries. JMIR Human Factors, 9(2). https://humanfactors.jmir.org/2022/2/e30050/
  63. Yeng, P. K., Fauzi, M. A., & Yang, B. (2022). A comprehensive assessment of human factors in relation to cybersecurity compliance of healthcare staff in a paperless hospital. Preprints. https://www.academia.edu/download/89549893/preprints202203.0247.v1.pdf
  64. Yuliaty, F. (2017). Employee Empowering Through Information Technology And Creativity In Organizations. International Journal Of Economic Perspectives. 11. 54–59.

Similar Articles

<< < 9 10 11 12 13 14 15 16 17 18 > >> 

You may also start an advanced similarity search for this article.