Claim Missing Document
Check
Articles

Found 29 Documents
Search

Evaluation of Information Technology Governance Maturity Using COBIT 2019: Study of a Telecommunication Company Muhamad Rendi Novrian; Dazki, Erick
INOVTEK Polbeng - Seri Informatika Vol. 10 No. 2 (2025): Juli
Publisher : P3M Politeknik Negeri Bengkalis

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35314/r54e5n79

Abstract

The development of information technology drives the need for effective IT governance, especially in the telecommunications sector, which faces challenges such as 5G, Iot, and strict regulations. This research aims to evaluate the maturity level of IT governance at PT Wahana Sukses Makmur and identify gaps against the COBIT 2019 standard to support business strategy. Quantitative methods were used through structured questionnaires to 15 respondents selected by purposive sampling, as well as internal document analysis. The data was analysed using the COBIT 2019 toolkit and triangulated to increase validity. The results show that IT governance maturity is at levels 1 and 2, far from the level 4 target in domains APO13, APO07, and DSS01. Recommendations include the formulation of risk-based information security policies, the development of an IT HR competency roadmap based on organisational needs, and continuous digitisation of operational processes. This research faced limitations in the number of respondents and access to certain internal documents, which affected the depth of analysis. The contribution of the research lies in the holistic evaluative approach based on COBIT 2019 in the real context of the Indonesian telecommunications sector, as well as practical implications in strategic decision-making related to IT governance.
Enhancing Donation-Based Crowdfunding with Togaf & AI: Sustainability Case Study at Foundation XYZ Prasetyo, Muhammad Teguh; Dazki, Erick
Indonesian Interdisciplinary Journal of Sharia Economics (IIJSE) Vol 8 No 2 (2025): Sharia Economics
Publisher : Sharia Economics Department Universitas KH. Abdul Chalim, Mojokerto

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31538/iijse.v8i2.6924

Abstract

Crowdfunding has emerged as a crucial mechanism for expanding financial accessibility, particularly for projects focused on sustainability. However, the success of foundation-based crowdfunding largely depends on trust and transparency. This study aims to investigate the role of these factors in influencing donor confidence and campaign success. Utilizing a mixed-method approach, the research combines qualitative and quantitative data analysis. The study was conducted on active crowdfunding campaigns within sustainability-focused foundations, employing surveys, interviews, and platform data analytics to assess stakeholder engagement, financial transparency, and campaign effectiveness. The findings reveal that transparent fund management significantly impacts donor trust, with campaigns demonstrating clear financial accountability attracting more sustained contributions. Additionally, the study identifies the importance of effective communication and measurable impact reporting in fostering a supportive crowdfunding ecosystem. The research provides actionable recommendations for foundation-based giving organizations and sustainable entrepreneurs to strengthen transparency and stakeholder involvement, ultimately enhancing donor confidence and community support for sustainability initiatives.
A Literature-Based Heat Matrix for Quantifying Inter-Domain Correlations within the ISO/IEC 27002:2013 Framework Dazki, Erick; Indrajit, Richardus Eko; Dio F, Januponsa
Jurnal Teknik Informatika (Jutif) Vol. 6 No. 4 (2025): JUTIF Volume 6, Number 4, Agustus 2025
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2025.6.4.5203

Abstract

The problem of managing information security controls is complex because the domains outlined in standards like ISO/IEC 27002 rarely operate in isolation; they have intricate interdependencies that are often overlooked. This oversight can lead to fragmented security controls, inefficient resource allocation, and weaknesses in overall security governance. To address this issue, this paper proposes a literature-based heat matrix methodology, building on ISO/IEC 27002:2013 while referencing the updated 2022 guidance, NIST SP 800-53 Revision 5, and COBIT 2019. The primary goal is to assign numerical correlation values to the fourteen domains of ISO/IEC 27002:2013, providing a structured approach to visualize and understand their interrelationships. The methodology involves a comprehensive literature review and is complemented by expert validation from experienced practitioners to refine the correlation scores. The result is an illustrative 14x14 matrix that demonstrates how numeric inter-domain correlations can reveal critical overlaps and guide strategic decision-making. A new five-tier correlation scale is introduced to aid interpretation, clarifying whether two domains have very low, low, moderate, high, or very high levels of interdependency. This approach offers a significant impact on the field of informatics and computer science by enabling organizations to move beyond siloed security management. By recognizing these correlations, organizations can allocate resources more effectively, enhance holistic risk management, and strengthen security governance. The heat matrix serves as a practical tool for practitioners and managers to identify domain pairs that require close coordination, ultimately leading to more coherent policy frameworks and a more robust security posture.
TOGAF-Based Business Architecture Design for FinLy in Innovation and Monetization of AI-Based Digital Financial Services Karjadi, Markus; Indrajit, Richardus Eko; Dazki, Erick
TEPIAN Vol. 6 No. 3 (2025): September 2025
Publisher : Politeknik Pertanian Negeri Samarinda

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51967/tepian.v6i3.3413

Abstract

This study aims to design a business architecture for FinLy, a digital startup focused on the development and monetization of AI-based financial products. The approach follows the TOGAF Architecture Development Method (ADM), with particular emphasis on the Architecture Vision, Business Architecture, and Opportunities & Solutions phases. Employing a Design Science Research methodology, the architectural models are constructed using ArchiMate, Business Model Canvas, and Business Capability Mapping. Findings demonstrate that FinLy’s business architecture effectively maps four core capability domains to ten revenue streams that align with its digital monetization strategy. Evaluation results indicate that the architecture is modular, adaptive, and strategically aligned. The novelty of this research lies in the end-to-end integration of the TOGAF framework, generative AI technologies, and digital monetization mechanisms within the context of financial product design. As such, FinLy serves as a reference model for financial startups seeking to establish a capability-based enterprise architecture supported by cloud-native tools like Figma, Google Cloud Platform, and Oracle Database. This work contributes to the advancement of business architecture frameworks that are both technically efficient and capable of delivering personalized, adaptive, and commercially sustainable services in the digital era
Enterprise Architecture Planning for the Coffee Shop Sector Using ADM at Big Coffee Signature Budiman, Christopher Winson; Indrajit, Richardus Eko; Dazki, Erick
TEPIAN Vol. 6 No. 3 (2025): September 2025
Publisher : Politeknik Pertanian Negeri Samarinda

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51967/tepian.v6i3.3444

Abstract

The coffee shop industry in Indonesia is experiencing rapid growth, along with the increasing demand for more innovative and efficient customer experiences. To maintain competitiveness and improve operational efficiency, coffee shop companies need to utilize technology in a structured manner. This study aims to design and develop an Enterprise Architecture (EA) model that can be applied to Big Coffee Signature in order to align business strategy with the technology used. In this study, the TOGAF and ArchiMate frameworks are used to design an enterprise architecture that is integrated with online ordering systems, digital payments, customer management, and raw material stock management. Through the implementation of EA, Big Coffee Signature can optimize the use of technology to improve operations and provide better customer experience. The application systems used, such as the Smart Ordering System, Multichannel Payment System, and Inventory Management System, are integrated to improve efficiency, transparency, and convenience for customers. This study also shows that by integrating third-party platforms such as GoFood and GrabFood, companies can expand their market reach and provide greater convenience for customers in placing orders. The results of the study show that the implementation of a structured EA can provide significant benefits in terms of operational efficiency, aligning technology with business needs, and improving customer service. The suggestions provided, such as further development of the customer loyalty system, utilization of AI for service personalization, and development of a cloud-based POS system, are expected to help Big Coffee Signature to increase the competitiveness and sustainability of their business.  
Business Architecture Design in Indonesia’s Property Development Industry Veronika, Maria; Dazki, Erick; Indrajit, Eko
TEPIAN Vol. 6 No. 3 (2025): September 2025
Publisher : Politeknik Pertanian Negeri Samarinda

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51967/tepian.v6i3.3449

Abstract

In the highly complex Indonesian property development industry, companies require a robust framework to effectively integrate diverse business and technological elements. This study addresses this need by designing a comprehensive business architecture model utilizing an Enterprise Architecture approach and ArchiMate modeling language. The research began by employing Business Model Canvas (BMC) to identify and analyze four primary revenue streams for property development companies: property sales, leasing income, hospitality income, and revenue from the retail and entertainment sectors. For each of these streams, a detailed business architecture model was constructed using ArchiMate, meticulously mapping the intricate relationships between key components such as business actors, business processes, supporting applications, data, and underlying system technologies. The resulting four business architecture models visually articulate the value flows and critical interconnections within each revenue stream. These models provide valuable insights, demonstrating how property developers can strategically manage, optimize, and align their operations with overarching business objectives. This research makes a significant contribution to the understanding and application of Enterprise Architecture within the property industry. It showcases the potential of ArchiMate to create more structured, integrated, and strategically aligned business models. The findings are intended to serve as a practical reference for property development companies in Indonesia, guiding them in the design and management of their business models to enhance competitiveness and drive sustainable growth in a dynamic market.
The Art of Customization: Text-to-Image Tools in Video Production Wilson, Wilson; Yohannis, Alfa; Dazki, Erick
TEPIAN Vol. 6 No. 3 (2025): September 2025
Publisher : Politeknik Pertanian Negeri Samarinda

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51967/tepian.v6i3.3461

Abstract

As technology progresses, the need for tailored experiences is reshaping video editing, particularly due to the new content demands arising from social media. The advent of Artificial Intelligence (AI) has introduced significant advantages, such as enhanced workflow efficiency, cost reduction, and the generation of high-quality materials. However, professionals in the creative sector still express concerns about issues related to security, privacy, and the fear that AI might supplant human jobs. These worries, along with the potential loss of creative autonomy, can be mitigated through concise training that educates users on the capabilities of AI. By mastering these tools, creators can utilize AI to streamline their processes while preserving their artistic integrity. A comparison of various recently launched AI text-to-image applications reveals notable disparities in both accuracy and quality. Additionally, discussions with industry professionals indicate that those who have successfully incorporated AI into their workflows strongly endorse specific software that has significantly boosted their productivity. This suggests that, when implemented thoughtfully and with the right tool selection, AI can serve as a valuable resource in the realm of innovative and personalized video production
Sentiment Analysis On The Presidential Threshold Policy In Elections As A Principle Of Democracy Jovi Andreas, Jovianus Abel; Dazki, Erick
JHSS (JOURNAL OF HUMANITIES AND SOCIAL STUDIES) Vol 8, No 2 (2024): JHSS (Journal of Humanities and Social Studies)
Publisher : UNIVERSITAS PAKUAN

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33751/jhss.v8i2.9444

Abstract

Indonesia is a country that adheres to a presidential system of government. Elections are the basis of a democratic country in its implementation. Democracy is the government of reason by the people, for the people, and of the people, hence the people have the highest position in a democracy. The existence of a threshold is controversial in political dynamics because it is considered as a suppression of democratic values. Sentiment analysis is used to evaluate public assumptions about the application of the threshold by filling out a questionnaire that will be filled by subjects who have attitudes towards politics. Naïve Bayes and SVM are the methods used in solving sentiment analysis classification. Data collected through Twitter crawling is integrated with 1500 data from public assumptions about the presidential threshold. Naïve Bayes and SVM methods will be used to classify comment data. Through testing and classification, 784 comments were obtained which will be used as training data. The accuracy obtained from processing is 75.13% for Naïve Bayes and 83.29% for SVM. 
IT Governance through Mathematical Modeling: A Quantitative Assessment of Maturity Using Factor Analysis and Structural Equation Modeling Indrajit, Richardus Eko; Dazki, Erick; Kurniawan, Rido Dwi; Dio F, Januponsa
Jurnal Teknik Informatika (Jutif) Vol. 6 No. 5 (2025): JUTIF Volume 6, Number 5, Oktober 2025
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2025.6.5.5201

Abstract

IT Governance (ITG) ensures an organization's technological capabilities align with its business strategy. Although frameworks like COBIT 2019 offer structured guidelines, many assessment techniques rely on qualitative measures, which can compromise objectivity. This paper proposes a novel quantitative approach that integrates Factor Analysis (FA) and Structural Equation Modeling (SEM) to measure IT Governance maturity. By mapping each COBIT 2019 domain—EDM, APO, BAI, DSS, and MEA—onto a latent construct, organizations gain empirical insights into their governance status. Exploratory and confirmatory factor analyses validate these domains, while SEM reveals the magnitude and significance of each domain's impact on overall IT Governance maturity. A real-world example from a financial services company, "FinServEU," demonstrates how this framework can prioritize improvements, enhance regulatory compliance, and promote continuous monitoring. The results highlight that quantitative ITG modeling provides a reliable basis for informed decision-making and optimal resource allocation, bridging the gap between broad qualitative assessments and actionable strategies. This approach is crucial for the field of informatics and computer science, as it offers a robust, reproducible, and objective framework for evaluating a key aspect of digital transformation, ensuring that technological progress is guided by sound, data-driven principles.