Claim Missing Document
Check
Articles

Found 4 Documents
Search
Journal : Journal of Information System, Technology and Engineering

Designing Information Technology Governance in the Data Management Process Using Cobit Framework V 4.1 At the Pamulang University IT Center Zein, Afrizal
Journal of Information System, Technology and Engineering Vol. 2 No. 3 (2024): JISTE
Publisher : Yayasan Gema Bina Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61487/jiste.v2i3.81

Abstract

This paper explores the implementation of Information Technology (IT) governance in the data management process using the Control Objectives for Information and Related Technologies (COBIT) framework version 4.1 at the IT Center of Pamulang University.  The study begins by providing an overview of the COBIT framework and its relevance to IT governance in educational settings. It then delves into the specific application of COBIT V 4.1 in the context of data management processes at Pamulang University IT Center. This includes the identification of key control objectives and control practices within the COBIT framework that are applicable to data management, such as data governance, data quality management, data security, and data lifecycle management. Furthermore, the paper discusses the methodology used for implementing COBIT V 4.1 in the data management process, including the steps involved in assessing current practices, identifying areas for improvement, and designing governance structures and processes. It highlights the importance of collaboration between IT professionals, data stewards, and organizational leadership in ensuring the successful implementation of IT governance practices. The findings of the study reveal the benefits of adopting COBIT V 4.1 in the data management process at Pamulang University IT Center, including improved data quality, enhanced data security, and increased accountability and transparency in data handling practices.
Information Technology Governance Between Iso 38500, Risk It and Val It in Private University Zein, Afrizal; Farizy, Salman; Suharyanto, Eko; Tristianto, Chrisantus; Marwati, Fingki
Journal of Information System, Technology and Engineering Vol. 2 No. 3 (2024): JISTE
Publisher : Yayasan Gema Bina Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61487/jiste.v2i3.82

Abstract

This study explores the application of the ISO 38500, Risk IT, and Val IT frameworks in improving IT governance at the university. ISO 38500 provides general guidance for IT management by boards of directors, while Risk IT focuses on IT risk management and Val IT focuses on managing the value of IT investments. Qualitative research methods were used, including interviews with key stakeholders at Pamulang University. The research results show that the integration of the ISO 38500, Risk IT, and Val IT frameworks has helped universities optimize strategic decision-making regarding IT. Implementation of this framework increases transparency, accountability and holistic IT risk management across the university. However, challenges faced include a lack of deep understanding of the framework and the need to ensure consistency in implementation. Recommendations for the university include more intensive training for staff, strengthening communication between different units, and developing performance metrics that align with the university's strategic goals. This research makes an important contribution to the practical understanding of implementing effective IT governance in higher education environments, by highlighting the benefits and challenges of integrating the ISO 38500, Risk IT, and Val IT frameworks.
Implementation Of Mobile Web Applications Using Balanced Scorecard KPI Formulation Suharto, Agus; Zein, Afrizal
Journal of Information System, Technology and Engineering Vol. 2 No. 4 (2024): JISTE
Publisher : Yayasan Gema Bina Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61487/jiste.v2i4.111

Abstract

Implementation of mobile web applications has become a key factor in improving organizational performance in the digital era. This research examines the application of the Balanced Scorecard (BSC) model in the formulation of Key Performance Indicators (KPI) for mobile web applications to increase operational effectiveness and efficiency. The Balanced Scorecard, developed by Kaplan and Norton, is a managerial tool that integrates multiple performance perspectives financial, customer, internal processes, and learning and growth in one comprehensive framework. This study focuses on how KPIs designed based on the BSC model can be used to assess and monitor the performance of mobile web applications. The implementation process begins with identifying the organization's strategic objectives and establishing relevant KPIs for each BSC perspective. Next, this research evaluates how these KPIs are applied in the context of mobile web applications and their impact on application performance and user satisfaction. The results of this research show that the use of BSC-based KPIs can increase visibility of mobile web application performance, assist in identifying areas of improvement, and support better strategic decision making. This research also identifies challenges that may be faced in implementing the BSC model in the context of mobile technology and provides recommendations to overcome these challenges.
Drafting of IT Outsourcing Risk Management Policy Proposal with IT Outsourcing Risk Management Framework and Cobit Zein, Afrizal
Journal of Information System, Technology and Engineering Vol. 3 No. 1 (2025): JISTE
Publisher : Yayasan Gema Bina Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61487/jiste.v3i1.130

Abstract

The design of a proposed Information Technology (IT) outsourcing risk management policy is essential in facing the complexity and uncertainty associated with using third-party services. This policy aims to protect organisational assets, ensure operational continuity, and minimise the impact of risks that may arise from outsourcing relationships. In this study, we develop a risk management framework that integrates IT outsourcing risk management principles with the COBIT (Control Objectives for Information and Related Technologies) standard. This framework includes risk identification, analysis, mitigation, and continuous monitoring and evaluation. Through this approach, organisations can improve control and visibility of risks faced in IT outsourcing. The results of this study indicate that implementing a comprehensive risk management policy not only strengthens information security but also improves the effectiveness and efficiency of business processes involving IT outsourcing. Hopefully, this proposed policy can provide practical guidance for organisations in managing risks and maximising the value of IT outsourcing.