Claim Missing Document
Check
Articles

Found 23 Documents
Search

Information Technology Governance Between Iso 38500, Risk It and Val It in Private University Zein, Afrizal; Farizy, Salman; Suharyanto, Eko; Tristianto, Chrisantus; Marwati, Fingki
Journal of Information System, Technology and Engineering Vol. 2 No. 3 (2024): JISTE
Publisher : Yayasan Gema Bina Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61487/jiste.v2i3.82

Abstract

This study explores the application of the ISO 38500, Risk IT, and Val IT frameworks in improving IT governance at the university. ISO 38500 provides general guidance for IT management by boards of directors, while Risk IT focuses on IT risk management and Val IT focuses on managing the value of IT investments. Qualitative research methods were used, including interviews with key stakeholders at Pamulang University. The research results show that the integration of the ISO 38500, Risk IT, and Val IT frameworks has helped universities optimize strategic decision-making regarding IT. Implementation of this framework increases transparency, accountability and holistic IT risk management across the university. However, challenges faced include a lack of deep understanding of the framework and the need to ensure consistency in implementation. Recommendations for the university include more intensive training for staff, strengthening communication between different units, and developing performance metrics that align with the university's strategic goals. This research makes an important contribution to the practical understanding of implementing effective IT governance in higher education environments, by highlighting the benefits and challenges of integrating the ISO 38500, Risk IT, and Val IT frameworks.
Implementation Of Mobile Web Applications Using Balanced Scorecard KPI Formulation Suharto, Agus; Zein, Afrizal
Journal of Information System, Technology and Engineering Vol. 2 No. 4 (2024): JISTE
Publisher : Yayasan Gema Bina Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61487/jiste.v2i4.111

Abstract

Implementation of mobile web applications has become a key factor in improving organizational performance in the digital era. This research examines the application of the Balanced Scorecard (BSC) model in the formulation of Key Performance Indicators (KPI) for mobile web applications to increase operational effectiveness and efficiency. The Balanced Scorecard, developed by Kaplan and Norton, is a managerial tool that integrates multiple performance perspectives financial, customer, internal processes, and learning and growth in one comprehensive framework. This study focuses on how KPIs designed based on the BSC model can be used to assess and monitor the performance of mobile web applications. The implementation process begins with identifying the organization's strategic objectives and establishing relevant KPIs for each BSC perspective. Next, this research evaluates how these KPIs are applied in the context of mobile web applications and their impact on application performance and user satisfaction. The results of this research show that the use of BSC-based KPIs can increase visibility of mobile web application performance, assist in identifying areas of improvement, and support better strategic decision making. This research also identifies challenges that may be faced in implementing the BSC model in the context of mobile technology and provides recommendations to overcome these challenges.
Drafting of IT Outsourcing Risk Management Policy Proposal with IT Outsourcing Risk Management Framework and Cobit Zein, Afrizal
Journal of Information System, Technology and Engineering Vol. 3 No. 1 (2025): JISTE
Publisher : Yayasan Gema Bina Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61487/jiste.v3i1.130

Abstract

The design of a proposed Information Technology (IT) outsourcing risk management policy is essential in facing the complexity and uncertainty associated with using third-party services. This policy aims to protect organisational assets, ensure operational continuity, and minimise the impact of risks that may arise from outsourcing relationships. In this study, we develop a risk management framework that integrates IT outsourcing risk management principles with the COBIT (Control Objectives for Information and Related Technologies) standard. This framework includes risk identification, analysis, mitigation, and continuous monitoring and evaluation. Through this approach, organisations can improve control and visibility of risks faced in IT outsourcing. The results of this study indicate that implementing a comprehensive risk management policy not only strengthens information security but also improves the effectiveness and efficiency of business processes involving IT outsourcing. Hopefully, this proposed policy can provide practical guidance for organisations in managing risks and maximising the value of IT outsourcing.