RECONSTRUCTION OF THE SCOPE SECURITY MANAGEMENT SYSTEM GOVERNMENT IN BONE REGENCY
DOI:
https://doi.org/10.30863/aldustur.v8i1.8877Keywords:
Reconstruction, Management System, Security, Law, Good GovernanceAbstract
The urgency of reconstructing the security management system within the scope of government in Bone Regency stems from the increasing complexity of governance and the evolving security challenges that threaten institutional stability and public trust. This study examines the legal foundation of the government security management system in Bone Regency, the concretization or practical implementation of the security management system, and the law enforcement of the government security management system in the region. Employing a normative-empirical legal study, this research utilizes a legislative approach, a case approach, and a conceptual approach. The legal materials analyzed include primary legal materials, secondary legal materials, and tertiary legal materials, with data collection methods consisting of observation, interviews, and documentation. Data processing and analysis are conducted through qualitative analysis to assess legal aspects and descriptive analysis to synthesize findings. The study reveals that while the security management system adheres to the principle of legality through standardized procedures based on existing laws and regulations, its practical implementation faces considerable obstacles. Limited infrastructure, technological constraints, and social disparities within institutions hinder comprehensive enforcement. Consequently, an urgent update to the security management system is necessary to foster preventive, responsive, and collaborative measures between leaders and security personnel, ensuring a more effective and resilient governance framework.
References
Article 1 Paragraph (1) of the Regulation of the Chief of the Republic of Indonesia National Police Number 24 of 2007 concerning the Security Management System for Organizations, Companies and/or Government Agencies/Institutions.
Article 4 of the Regulation of the Chief of the Republic of Indonesia National Police Number 24 of 2007 concerning the Security Management System of Organizations, Companies and/or Government Agencies/Institutions.
B. Wirawan, Social Theories in Three Paradigms, Jakarta: Raja Grafindo Persada 2015.
Bambang Niko Pasla, Law & Government Regulation Is: Definition According to Experts, https:// bnp.jambiprov.go.id/regulasi-adalah-pengertian-menurut-ahlinya/.
Dahrendorf, Ralf, Randall Collins, and Seeing Further. “Conflict and Critical Theories.†Conflict and Critical Theories, 2006, 211–41.
Deni Fredian & Fadlan Kalma, “The Urgency of the Birth of a Special Law for the Security Guard Professionâ€, Journal of Social Sciences and Humanities, Vol. 2, No. 8 June 2024
Edi Saputra Hasibuan, Police Law and Criminal Policy in Law Enforcement, Depok: PT Rajagrafindo Persada, 2021
Hootegem, Arno Van, Bart Meuleman, and Koen Abts. “Attitudes toward Asylum Policy in a Divided Europe: Diverging Contexts, Diverging Attitudes?†Frontiers in Sociology 5 (2020): 35.
Ikhsan (Security Guard Member of BRI Bank Watampone Branch Office), interview by the author, Branch Office BRI Watampone Bank.
Irwansyah (IAIN Bone Security Guard Commander), interview by the author, Campus 1 IAIN Bone.
Jonathan Wesley et al., "Law Enforcement Toward Security Units (Security guard) Performing Their Duties and Functions Based on Article 49 of the Indonesian Criminal Code (KUHP)," Lex Generalis Law Journal: Volume 04 No.2.
Lalu Husni, Introduction to Indonesian Employment Law, Jakarta: PT. Fajar Interpratama Offset, 2003.
Law Number 13 of 2003 concerning Manpower Article 88 Paragraph (1).
Makkarateng, Ma’adul Yaqien, and Lukman Arake. “The Islamic Perspective on Political Asylum: Analysis of The Rohingya Refugee Issue in Aceh, Indonesia.†Indonesian Journal of Islamic Literature and Muslim Society 9, no. 1 (2024).
Mirriam Budiharjo, Basics of Political Science, Jakarta: Gramedia Pustaka Utama, 1992.
Mus Muliadi (Security Squad Commander of The Novena Hotel), interview by the author, The Novena Hotel.
Rafdah Erviana (Security Guard Member of BRI Bank Watampone Branch Office), interview by the author, BRI Bank Watampone Branch Office.
Rahmat Hidayat, Emile Durkheim's Sociology of Education, Jakarta: PT. Rajagrafindo, 2014.
Regulation of the Republic of Indonesia National Police Number 4 of 2020 Concerning Self-Security Chapter I Article 1.
Roche, Sophie. Central Asian Intellectuals on Islam: Between Scholarship, Politics and Identity. Vol. 32. Walter de Gruyter GmbH & Co KG, 2021.
Security Journal (Indonesian Security Guard Media), Getting to Know the Security System in Hotels,https://jurnalsecurity.com/mengenal-sistem-keamanan-di-hotel/.
Sennewald, Charles A, and Curtis Baillie. Effective Security Management. Butterworth-Heinemann, 2020.
Soomro, Zahoor Ahmed, Mahmood Hussain Shah, and Javed Ahmed. “Information Security Management Needs More Holistic Approach: A Literature Review.†International Journal of Information Management 36, no. 2 (2016): 215–25.
Sudahnan, “The Authority of Security guard as Security Personnel in Companiesâ€, Journal of Law: Volume XVI No. 3.
Tri (Security Guard Member of The Novena Hotel), interview by the author, The Novena Hotel.
Werlinger, Rodrigo, Kirstie Hawkey, and Konstantin Beznosov. “An Integrated View of Human, Organizational, and Technological Challenges of IT Security Management.†Information Management & Computer Security 17, no. 1 (2009): 4–19.
Wong, Jony. Internet Marketing for Beginners. Elex Media Komputindo, 2013.
Downloads
Published
Issue
Section
License
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution-ShareAlike License (CC BY-SA 4.0) that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.

