Claim Missing Document
Check
Articles

Found 8 Documents
Search

Analysis of Information Technology Governance Implementation in Consulting Firms Using the COBIT Framework Approach: A Literature Review Mirza, Arvin Muhammad; Wirani, Yekti; Sucahyo, Yudho Giri
Sebatik Vol. 29 No. 1 (2025): June 2025
Publisher : STMIK Widya Cipta Dharma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46984/sebatik.v29i1.2610

Abstract

Information Technology (IT) governance is a critical element in supporting the achievement of an organization’s or company’s strategic objectives and ensuring the effective and efficient utilization of IT resources. Consulting firms, as the entities that prioritize delivering optimal services to their clients or partners, require a structured and well-implemented IT governance to support improvements in their business service quality. The effectiveness of IT governance implementation can be more accurately measured through the use of internationally recognized standard frameworks, such as the COBIT framework. This study aims to analyze existing literature that discusses the implementation of IT governance in consulting firms using the COBIT framework approach. This study is conducted through a literature review of relevant academic publications. The findings of this study are expected to contribute to a deeper understanding of IT governance practices in the consulting service sector and serve as a reference for the development of more effective strategies to strengthen IT governance implementation.
Evaluasi Kapabilitas dan Perancangan Tata Kelola TI Menggunakan COBIT 2019: Sekretariat Kabinet Ontoreza, Afrianda Gaza; Wirani, Yekti; Sucahyo, Yudho Giri
The Indonesian Journal of Computer Science Vol. 13 No. 4 (2024): The Indonesian Journal of Computer Science (IJCS)
Publisher : AI Society & STMIK Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33022/ijcs.v13i4.4145

Abstract

E-government is the utilization of ICT applications to provide government services that enhance service delivery to be transparent, efficient, and effective. In Indonesia, the policy for managing e-government is regulated through Presidential Regulation No. 95 of 2018 concerning the Electronic-Based Government System (SPBE). This study was conducted in the Cabinet Secretariat (Setkab) with an SPBE evaluation results index that can still be optimized, particularly for the governance domain, which achieved a score of 2.90. Organizationally, Setkab does not yet have an information technology governance document. The research aims to conduct an evaluation of the capability level and formulate IT governance recommendations using COBIT 2019 framework. Assessment and design are carried out in accordance with Setkab's objectives, 13 processes are identified that are still below organizational expectations or below maturity level 3. IT governance recommendations are formulated to support the organization's strategic plan and increase the SPBE achievement index at Setkab.
Perancangan Manajemen Risiko Teknologi Informasi Sekretariat Kabinet Republik Indonesia Budiman, Wahyu Arief; Wirani, Yekti; Sucahyo, Yudho Giri
The Indonesian Journal of Computer Science Vol. 13 No. 4 (2024): The Indonesian Journal of Computer Science (IJCS)
Publisher : AI Society & STMIK Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33022/ijcs.v13i4.4171

Abstract

The Cabinet Secretariat of the Republic of Indonesia (Setkab) as a government institution that is responsible for managing cabinet management needs to implement information technology risk management effectively. In line with the Regulation of the Minister for Empowerment of State Apparatus and Bureaucratic Reform (PermenPAN RB) number 5 of 2020 concerning Guidelines for Risk Management of Electronic-Based Government Systems (SPBE), it is necessary to have a design for handling information technology risks. However, Setkab has not yet implemented information technology risk management, resulting in information technology-related risks are not being identified. This study aims to develop a design for information technology risk management that is suitable for the needs and context of Setkab. The method used in the study is qualitative, collecting data through interviews, document analysis, and observation of information technology risks in the Setkab environment. Data analysis uses thematic analysis method. In developing the design for information technology risk management for Setkab, ISO 31000:2018 standard will be used as the main framework, then referring to ISO/IEC 27005:2022, as guidelines for risk assessment and risk treatment activities, and ISO/IEC 27002:2022 as the information security control reference. This research found 340 risk scenarios, 93 of which needed to be mitigated and 247 risks were acceptable. This research produced a risk management design using a combination of ISO 31000:2018 as a general guide for the risk management framework, ISO/IEC 27005:2022 for guidelines on the information technology risk management process, and ISO/IEC 27002:2022 for determining recommendations for risk treatment controls that is expected to help Setkab manage information technology risks systematically.
Apakah Pendidikan TI Penting? Studi Tentang Kesadaran dan Perilaku Kebersihan Siber di Indonesia Almadina, Nazela Ulhaqy; Sucahyo, Yudho Giri; Yazid, Setiadi
Syntax Literate Jurnal Ilmiah Indonesia
Publisher : Syntax Corporation

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36418/syntax-literate.v10i10.62249

Abstract

Latar belakang penelitian ini didasarkan pada meningkatnya ancaman keamanan siber di Indonesia yang menempati posisi teratas sebagai target serangan siber global pada tahun 2024. Penelitian ini bertujuan untuk mengevaluasi perbedaan kesadaran dan perilaku kebersihan siber antara individu dengan latar belakang pendidikan Teknologi Informasi (TI) dan non-TI. Dengan menggunakan kerangka kerja Cyber Hygiene Inventory (CHI), 402 data responden dianalisis melalui uji Mann-Whitney U dan uji Korelasi Pearson. Hasil menunjukkan bahwa terdapat perbedaan signifikan pada kesadaran dan perilaku kebersihan siber antara kelompok yang dengan latar belakang pendidikan bidang TI dan bidang non-TI. Sementara itu, analisis terhadap hubungan antara latar belakang pendidikan TI dan non-TI dengan kebersihan siber menunjukkan bahwa kedua hal tersebut memiliki hubungan namun dengan tingkat yang lemah. Dapat dikatakan bahwa kegiatan kerja sehari hari lebih besar pengaruhnya dibandingkan latar belakang Pendidikan. Implikasi penelitian ini memberikan dasar bagi organisasi, institusi pendidikan, dan lembaga pelatihan untuk mengembangkan program peningkatan kesadaran keamanan siber yang disesuaikan dengan latar belakang pendidikan peserta, serta mendorong pengembangan kebijakan keamanan siber yang lebih efektif di Indonesia.
Governance for Handling Fake News: Structural Modeling Approach Andriansyah, Azis; Makarim, Edmon; Sucahyo, Yudho Giri; Setyobudi, Chairul Muriman
International Journal of Artificial Intelligence Research Vol 7, No 1.1 (2023)
Publisher : Universitas Dharma Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29099/ijair.v7i1.1.1105

Abstract

The main aim of this research was to evaluate the effectiveness of government intervention in addressing the issue of Internet-based fake news, which poses a significant threat to national security. The study utilized statistical methods and employed a survey approach to gather data from a sample population. Simple random sampling was used as the sampling technique, and interviews were conducted with selected individuals who had relevant insights from organizations such as the national police, BSSN, Kemenkominfo, and BIN. The collected data was analyzed using the Partial Least Square (PLS) model with the assistance of the WarpPLS package.The findings of the study indicated a strong correlation between effective governance in combating the spread of fake news and the enhancement of national resilience. This implies that implementing robust and strategic governance practices is crucial for fostering a resilient nation. The study emphasizes the importance of government intervention in countering Internet-based fake news to protect national security. By addressing this issue effectively, governments can contribute to the overall resilience of the nation. The research highlights the significance of proactive measures and informed decision-making in tackling the challenges posed by fake news in the digital era
Model Tata Kelola TI Universitas Swasta Jakarta Nirmala, Indah Dwijayanthi; Sucahyo, Yudho Giri
MULTINETICS Vol. 1 No. 1 (2015): MULTINETICS Mei (2015)
Publisher : POLITEKNIK NEGERI JAKARTA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32722/multinetics.v1i1.1036

Abstract

Meningkatnya peran teknologi informasi maka investasi di bidang teknologi Informasi semakin besar dan semakin kompleks dalam pengelolaannya. Oleh karena itu dibutuhkan suatu tata kelola teknologi informasi yang sesuai dengan kebutuhan organisasinya. Saat ini, Universitas di Indonesia sebagai salah satu bentuk organisasi membutuhkan suatu tata kelola teknologi informasi yang baik, agar investasi teknologi informasinya dapat berjalan dengan baik. Penulisan ini membuat suatu tata kelola teknologi informasi untuk universitas dengan menggunakan gabungan model tata kelola teknologi informasi model Van Grembergen, Weil dan Ross, AS-8015 dan COBIT 5. Dalam membangun model ini, dilakukan analisa dari beberapa dokumen penelitian karya ilmiah secara kualitatif  dengan pendekatan grounded theory, dalam menentukan kriteria yang tepat dan benar untuk membentuk sebuah model tata kelola teknologi informasi pada universitas, dan dilakukan validasi model ke beberapa universitas. Hasil dari kajian model tersebut nantinya adalah usulan model tata kelola teknologi informasi pada universitas swasta di jakarta. Model ini diharapkan dapat memberikan kontribusi untuk tata kelola TI pada universitas dengan menekankan aktivitas-aktivitas identifikasi tujuan, akusisi TI, identifikasi TI, estimasi biaya anggaran, dan pengelolaan SDM.
Assessment of IT Governance Capability Level Using the COBIT 2019 Framework: A Case Study of XYZ Institution Amry, Anshari; Wirani, Yekti; Sucahyo, Yudho Giri
JEPIN (Jurnal Edukasi dan Penelitian Informatika) Vol 11, No 2 (2025): Volume 11 No 2
Publisher : Program Studi Informatika

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26418/jp.v11i2.95073

Abstract

XYZ Institution recognizes Information Technology (IT) as a strategic enabler essential for achieving organizational objectives and advancing its digital transformation objectives. IT governance plays a critical role in ensuring alignment between the utilization of IT and the achievement of strategic objectives. In today"™s digital era, the presence of structured, measurable, and strategically aligned IT governance has become essential to support both operations and business goal attainment. To address this issue, the study adopts an IT governance capability level assessment approach based on the COBIT 2019 framework. The methods used include Design Factors and Goals Cascade to identify the relevant Governance and Management Objectives (GMO) tailored to the organization"™s characteristics. Following this mapping, a capability level assessment is conducted using process activity parameters defined in COBIT 2019. The results indicate that most IT governance areas have achieved a satisfactory level of capability. Four processes (EDM02, APO12, DSS04, DSS06) achieved Capability Level 5, indicating optimized performance. Eleven processes (EDM04, APO02, APO03, APO04, APO05, APO08, BAI01, BAI02, BAI03, BAI08, BAI11) achieved Capability Level 4, reflecting established and managed practices. One process (BAI05) is currently at Level 3, highlighting an opportunity that can be further developed to align with higher-performing areas. This study contributes theoretically by providing a reference for future research on IT governance capability assessment using COBIT 2019, and practically by offering recommendations to enhance IT governance practices within financial institutions. Furthermore, this study provides example of targeted recommendations for enhancing IT governance in areas requiring improvement, with the aim of supporting the XYZ Institution strategic goals. This study contributes theoretically by providing a reference.
The Art of Internet Mapping: A Comprehensive Guide to Regional Internet Topology Mapping at the Autonomous System Level Witono, Timotius; Yazid, Setiadi; Sucahyo, Yudho Giri
Journal of Information Systems Engineering and Business Intelligence Vol. 10 No. 2 (2024): June
Publisher : Universitas Airlangga

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20473/jisebi.10.2.191-205

Abstract

Background: Internet topology is studied more by researchers on global internet coverage compared to limited regional coverage. However, some studies also see the importance of studying internet topology in certain countries or regions. The internet performance of a country or region can be influenced by the structure of its internet topology, and research on internet topology can contribute to improving internet topology in that region. Objective: This research initially carried out internet topology mapping in a limited region, then used experience from each step in conducting internet topology mapping to create a comprehensive guide on procedures for internet topology mapping at the autonomous system (AS) level in certain regional areas. Methods: Internet topology mapping is carried out by inferring relationships between ASes through an inference process against border gateway protocol (BGP) table dumps, while the internet topology mapping method chosen is passive mapping. Results: The entire series of steps involved in the regional internet topology mapping process have been successfully outlined in a detailed guide as a result of this research. Evaluation of the research results was carried out by implementing the application of this comprehensive guide and also through assessments from experts in related fields regarding the results of this research. The results of both evaluations showed that the research results were appropriate. Conclusion: This research provides a comprehensive guide for mapping internet topology in specific regional areas, consisting of nine sequential steps grouped into four major steps. This guide can be used to assist similar research efforts in other regional areas as well as provide further knowledge regarding studies in this field. This research is different from previous studies, because it provides a comprehensive guide to the internet topology mapping process, which has not been available in previous studies.   Keywords: Internet Topology Mapping, Regional Internet Topology, Autonomous System, Border Gateway Protocol