Widjaya, Iwan Kurniawan
Unknown Affiliation

Published : 2 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 2 Documents
Search

Change Management: Dampak Perubahan Dengan Adanya Implementasi IT Widjaya, Iwan Kurniawan
ComTech: Computer, Mathematics and Engineering Applications Vol 1, No 2 (2010): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v1i2.2649

Abstract

Technology improvement has brought much changes in how businesses and organizations have to run properly in global competitions. But the most important thing is the changing in organizations and people who will operate with the integrations systems. Resistance always happens in every implementations and it will be the main problems in every company. In this paper, it will be explored more in details about the cause and effect from the changes that will happens before and after the implementations, including how to utilize the result of the implementations in order to get the benefits for the business. Another important things are including the strategy and planning of changes that should be effectively implemented and given the maximum contributions to support the future development and synergy with business planning. This paper is also given the guidance about how to act and do some preventive actions in managing better ways in setting up the planning of changes in implementations of Information Technology and systems in the best ways. 
Pengukuran Resiko Teknologi Informasi dengan Pendekatan FRAP: Studi Kasus Pada PT Cowell Development, Tbk Widjaya, Iwan Kurniawan
ComTech: Computer, Mathematics and Engineering Applications Vol 3, No 1 (2012): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v3i1.2387

Abstract

The article purposes are to analyze, identify, and measure the risks found in the use of information technology. The research method used are literature study and field study upon observations, interviews, documentation, and FRAP (facilitated Risk Analysis Process) approach to measure the risk of information technology. The results found are positive and negative findings in the use of information technology. The exixting weaknesses allow the potential risks that may occur. The conclusion is there are vulnerabilities found in the use of information technology that need several recommendations on those risks to improve performance andguarantee data protection and information from any risk arise.