Susanto, Chayadi Oktomy Noto
Universitas Muhammadiyah Yogyakarta

Published : 4 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 4 Documents
Search

Perencanaan Strategis Sistem Informasi/ Teknologi Informasi pada Pusat Koperasi Industri Susu (PKIS) XYZ Susanto, Chayadi Oktomy Noto; Wurijanto, Tutut; Soebijono, Tony
Semesta Teknika Vol 18, No 2 (2015): NOVEMBER 2015
Publisher : Semesta Teknika

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Corporate awareness of the importance of technology’s support in supporting efficiently and effectively business activities is increase. It is also being pursued by PKIS XYZ to manage their business activities. PKIS XYZ experiencing problems which only able to manage 33,33% of their raw materials, while the rest should be managed by another company which incidentally is their competitor. This is certainly not profitable for the company. This research will analyse business processes in PKIS XYZ which are not optimal implemented. The findings obtained will be used as a material planning what technology to be applied in an attempt to optimize the business activities of the company. The output of this research is recommendation of future application portfolio that important to be applied in PKIS XYZ. Framework used in this study was Ward and Peppard, with SWOT and  Mc Farlands Strategic as a tool.
Perencanaan Strategis Sistem Informasi/ Teknologi Informasi pada Pusat Koperasi Industri Susu (PKIS) XYZ Chayadi Oktomy Noto Susanto; Tutut Wurijanto; Tony Soebijono
Semesta Teknika Vol 18, No 2 (2015): NOVEMBER 2015
Publisher : Universitas Muhammadiyah Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.18196/st.v18i2.1819

Abstract

Corporate awareness of the importance of technology’s support in supporting efficiently and effectively business activities is increase. It is also being pursued by PKIS XYZ to manage their business activities. PKIS XYZ experiencing problems which only able to manage 33,33% of their raw materials, while the rest should be managed by another company which incidentally is their competitor. This is certainly not profitable for the company. This research will analyse business processes in PKIS XYZ which are not optimal implemented. The findings obtained will be used as a material planning what technology to be applied in an attempt to optimize the business activities of the company. The output of this research is recommendation of future application portfolio that important to be applied in PKIS XYZ. Framework used in this study was Ward and Peppard, with SWOT and  Mc Farland's Strategic as a tool.
Security Assessment Using Nessus Tool to Determine Security Gaps on the Repository Web Application in Educational Institutions Chayadi Oktomy Noto Susanto; Kauka Noor Fathur Rizko; Dwijoko Purbohadi
Emerging Information Science and Technology Vol 1, No 2: May 2020
Publisher : Universitas Muhammadiyah Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (424.757 KB) | DOI: 10.18196/eist.128

Abstract

This research aims to determine security holes and risks that may arise in the educational institution’s repository web application. The repository web application contains research data, journals, articles, and papers from lecturers and students at the institution. This web application does not yet have documentation about security holes and risks in it. It causes a sense of concern on the part of educational institutions. Therefore, it is necessary to have a security assessment to conduct a risk-oriented assessment that might occur if an attack is attempted. The Vulnerability Assessment and Penetration Testing (VAPT) method was utilized to conduct a security assessment and test educational institutions’ repository web application. Several vulnerabilities found with the Nessus tool could still be exploited and resulted in findings in legal access rights when the researchers performed a test simulation on the repository web application. This research was used as a report to the educational institution, particularly as a material for the evaluation process to increase its web application security. This research was carried out within the educational institution environment. Hence, it did not fully describe the possibility of actual attacks originating from outside the educational institution environment.
Measurement of AI3, AI4, and DS4 IT Process Maturity Using the Cobit 4.1 Framework at KOMINFO Bantul Goldi Mahardika Muhammad; Chayadi Oktomy Noto Susanto; Aprilia Kurnianti
Emerging Information Science and Technology Vol 1, No 2: May 2020
Publisher : Universitas Muhammadiyah Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (363.956 KB) | DOI: 10.18196/eist.129

Abstract

This research discusses the condition of information technology at KOMINFO (DISKOMINFO) Bantul governance. This study aims to discover where has KOMINFO applied information technology governance properly. This research focuses only on IT processes. Only the AI3 IT process discussed how to generate and maintain the IT infrastructure. AI4 IT process discussed how to enable and use the IT infrastructure, and the last is the DS4 IT process that discussed how to ensure sustainable services. A questionnaire, an interview with employees of KOMINFO Bantul, and documentation were utilized to collect data. Data processing results were used to determine the maturity level of information technology governance at KOMINFO Bantul. After knowing the maturity level of the IT processes, then it was analyzed to measure the alignment between the TKTI current condition with the TKTI condition equipped with the COBIT framework.