Claim Missing Document
Check
Articles

Found 31 Documents
Search

PENGUKURAN MATURITY LEVEL COBIT 5 DAN DOMAIN DSS (DELIVER, SERVICE, AND SUPPORT) PADA REGULASI SANDBOX OJK KLASTER AGGREGATOR Nur Lela sari; Candiwan Candiwan; Helni Mutiarsih Jumhur; Soeparwoto Dharmoputra; Maya Ariyanti
JATISI (Jurnal Teknik Informatika dan Sistem Informasi) Vol 8 No 2 (2021): JATISI (Jurnal Teknik Informatika dan Sistem Informasi)
Publisher : Lembaga Penelitian dan Pengabdian pada Masyarakat (LPPM) STMIK Global Informatika MDP

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35957/jatisi.v8i2.843

Abstract

With the fast development of the internet and fintech, people have problems in making decisions for choosing the right fintech service or product because currently many of the same services are offered with various applications or web services. Thus, the aggregator cluster Digital Financial Innovation (IKD) service appears at the Financial Services Authority (OJK) to be a solution for users in problems for faster and more precise decision making by conducting site / application comparisons to select the desired service. This research focuses on the aggregator cluster IKD because the fintech sector is the most popular with the community regarding the benefits offered by the sample on services of cermati.com dan lifepal.. The Sandbox regulation is a trial space to assess the reliability of business processes, business models, financial instruments, and governance. organizers, especially in the field of digital financial innovation, including the IKD cluster aggregator. In order for financial products to have a certain status in running their business, they must follow the Sandbox Regulation testing stages so that the OJK as a financial supervisory institution can provide protection for consumers. This study uses qualitative methods with interview data collection techniques. The results of the study were analyzed using Maturity Level COBIT 5 with the DSS (deliver, service, support) selected domain in the sub-domain manage problems and manage business process control for IT management. The results showed that the aggregator cluster based on the selected sample was appropriate in implementing Sandbox Regulation based on 5 stages. The results of the maturity level for the deepening stage are 4.2, the scenario testing stage is 3, the testing and trial stage is 3.3, the improvement stage is 3.2 and the assessment stage is 2.9. The result of maturity level domain manage problem is 3.8 (4), which means that it has entered the predictable level where the process has met the attributes of process measurement and process control, while the domain of manage business process control is 3.3 (3) which means that it has entered an established level where the process has met the process attributes definition and process deployment. Keywords— Regulasi Sandbox, Aggregator, Cluster, Fintech, Maturity Level
Analysis of Factors Affecting Continuance Usage Intention of Linkaja Applications Nurul Reskyana; Candiwan Candiwan
Almana : Jurnal Manajemen dan Bisnis Vol 4 No 1 (2020): April
Publisher : Program Studi Manajemen, Fakultas Ekonomi, Universitas Langlangbuana

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (825.164 KB) | DOI: 10.36555/almana.v4i1.1292

Abstract

In 2019 PT Fintek Karya Nusantara launched the LinkAja Application which migrated from the T-Cash. As a product of BUMN that has network support throughout Indonesia, LinkAja should be able to become the number one e-wallet player because it has a great opportunity to reach a bigger market share compared to other e-wallet applicators. However, based on LinkAja Application, user data has not reached the target and there is a gap between the realization of the user and the active user of the Application. This study aims to analyze the factors that influence the continuance intention to use LinkAja in terms of gender using the Theory of DOI and Trust Building Framework. Researchers used the SEM and PLS methods in analyzing data. The results of the study stated that reputation is the most influence on trust, followed by variable mobility, security, and customization. The trust variable positively influences the continuance intention, while a higher perceived risk variable will reduce the intention to continue using the LinkAja application. Also, the effect of Mobility and Reputation on Trust is higher for male than female customers, while the effect of Customization and Security on Trust is higher for women than for men.
Analisis Budaya Keamanan Informasi di Puskesmas Kota Bandung Syaza Syauqina; Puspita Kencana Sari; Adhi Prasetio; Candiwan Candiwan
Jurnal Kesehatan Vokasional Vol 4, No 2 (2019): Mei
Publisher : Sekolah Vokasi Universitas Gadjah Mada

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (484.128 KB) | DOI: 10.22146/jkesvo.44409

Abstract

Background : The use of information systems today has become a necessity in organizations, including in the health sector due to the large amount of patient data that must be managed. 95% of Bandung City citizens are entitled to health facility services in all health facilities that have been partnered with BPJS Kesehatan, one of which is the Puskesmas. In its service, the Puskesmas manages patient health data using computer-based SIM Puskesmas, thus personal health information is vulnerable to information security threats both from internal and external. Therefore, Puskesmas need to build information security to reduce the level of security violations and maintain the health information of their patients.Objective : The purpose of this study was to determine the factors that significantly influence the Culture of Information Security in Bandung Public Health Center.Methods : The research method used is a quantitative method with PLS-SEM data analysis technique using WarpPLS 6.0 software. The technique used is Model Evaluation consisting of Measurement Models, Structural Models and Hypothesis Testing. This research data uses primary data taken through questionnaires to 154 employees who were sampledResults : Based on the characteristics of the respondents it can be seen that the majority of health center employees are women, the highest age is 19-29 years, the most positions are Administration / Medical Records, Education of employees is S1, lenght of work of Employees is 1-5 years. In the information management process, the Puskesmas has used Computer Based. The Puskesmas has an Information Security Policy. Based on the Evaluation Model, it can be seen that the model is fit, because it meets the Rule of Thumb criteria.Conclusion : Based on the results of the Model Evaluation and Hypothesis Testing, it can be seen that the variables that influence the Information Security Culture in Bandung City Health Center are Management, Change Management, Knowledge, Soft Issue-Workplace Independent and Attitude.Keywords :  Information Security Culture, Healthcare, PLS-SEM.
Asesmen Keamanan Informasi Menggunakan Indeks Keamanan Informasi (KAMI) pada Institusi XYZ Astri F. Manullang; Candiwan Candiwan; Listyo Dwi Harsono
JIEET (Journal of Information Engineering and Educational Technology) Vol. 1 No. 2 (2017)
Publisher : Universitas Negeri Surabaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26740/jieet.v1n2.p73-82

Abstract

Abstrak” Perkembangan teknologi informasi memberikan kemudahan bagi setiap institusi dalam menjalankan tugas dan fungsinya. Institusi yang menerapkan teknologi informasi harus menjaga keamanan informasi yang dimiliki agar pengelolaanya dapat dilakukan dengan cepat dan akurat sehingga dapat menghindari terjadinya kegagalan atau pelanggaran. Institusi XYZ pada saat ini telah menerapkan teknologi informasi, tetapi informasi yang dimiliki belum dilindungi dengan baik. Pada institusi XYZ terdapat akses kontrol yang belum dilaksanakan dengan baik diantaranya kurang keamanan atau pengawasan lokasi kerja penting (ruang server, ruang arsip) sehingga siapa saja bebas untuk melakukan akses, kemudian pada institusi XYZ belum menerapkan pengamanan untuk mendeteksi dan mencegah penggunaan akses jaringan (termasuk jaringan nirkabel). Oleh karena itu penting melakukan asesmen terhadap institusi XYZ untuk mengetahui tingkat kematangan dan kelengkapan keamanan informasinya. Asesmen dilakukan menggunakan Indeks Keamanan Informasi (KAMI) yang dikeluarkan oleh Departemen Komunikasi dan Informasi yang telah memenuhi syarat dan aspek keamanan informasi yang mengacu pada ISO 27001. Metode yang digunakan adalah metode kualitatif yaitu Indeks KAMI sebagai alat ukur untuk menilai sistem manajemen keamanan informasi institusi XYZ. Hasil penilaian Indeks KAMI pada Institusi XYZ menunjukkan tingkat ketergantungan terhadap Sistem Elektronik tergolong tinggi dan status kesiapan dalam manajemen keamanan informasi tidak layak dan berada pada level I-I+ dimana level ini masih berada pada kondisi awal penerapan keamanan informasi. Sehingga Institusi XYZ harus melakukan perbaikan dan peningkatan kontrol keamanan dengan pembuatan kebijakan dan prosedur keamanan informasi yang sesuai dengan kondisi TI/SI  dengan memperhatikan kesiapan, sumber daya yang dimiliki untuk mendapatkan penerapan sistem manajemen keamanan informasi yang efektif dan efisien. 
The Role of Trust Toward Continuance Usage Intention: of Mobile payment with Gender as Moderation Sontya Laurence; Candiwan
E-Bisnis : Jurnal Ilmiah Ekonomi dan Bisnis Vol 13 No 1 (2020): Jurnal Ilmiah Ekonomi dan Bisnis
Publisher : STEKOM PRESS

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51903/e-bisnis.v13i1.170

Abstract

The growth of financial technology is filled by digital wallet competition in the industry, one of the most known digital payment in Indonesia is OVO. Even so, the obstacles that OVO has can make users switch to another mobile payment provider. This research aims to analyze the impact on continuance usage intention by customers’ trust, and examine factors that influence trust in terms of gender moderation, the theories developed in this study are Innovation Diffusion Theory and Trust Building Framework. The method used to process data in this study are SEM and PLS. The findings of this research state that continuance usage intention is positively influenced by trust. Trust is significantly influenced by reputation, followed by customization, security, and mobility.
Perancangan Business Model Canvas Dan Rekomendasi Perancangan Website Dengan Unified Modelling Language Pada Unit Bisnis Klinik Hewan Virgin Pet Care Denpasar I Nyoman Prana Jaya Semedi; Rina Djunita Pasaribu; Candiwan Candiwan
SEIKO : Journal of Management & Business Vol 4, No 3 (2022)
Publisher : Program Pascasarjana STIE Amkop Makassar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37531/sejaman.v4i3.2437

Abstract

Abstrak Pada penelitian ini metode yang digunakan adalah metode kualitatif. Data primer dikumpulkan melalui wawancara kepada narasumber yaitu pemilik klinik, pelanggan klinik, karyawan klinik dan mitra klinik. Sedangkan untuk data sekunder dikumpulkan melalui artikel, penelitian terdahulu, buku-buku, dan jurnal referensi yang terkait dengan topik penelitian. Arus pendapatan Klinik Hewan Virgin Pet Care masih terbatas pada jasa pelayanan perawatan kesehatan hewan peliharaan. Hal tersebut membuat klinik rentan mengalami penurunan pendapatan ketika terjadi kondisi yang kurang menguntungkan. Hasil rekomendasi untuk perusahaan adalah melalui penambahan proses bisnis baru dengan melakukan kegiatan penjualan produk untuk hewan peliharaan melalui website. Proses penjualan produk kemudian dirancang menggunakan Unified Modelling Language (UML) yang dilanjutkan dengan perancangan desain mock up user interface. Hasil penelitian ini diharapkan dapat dijadikan rekomendasi terhadap kegiatan bisnis dari Klinik Hewan Virgin Pet Care khususnya dalam memperoleh pendapatan. Selain itu, penelitian ini dapat dijadikan arahan dalam implementasi proses bisnis klinik. Implementasi rekomendasi proses bisnis yang baru diharapkan dapat memberikan kesempatan yang lebih bagi klinik dalam memperoleh pendapatan secara optimal. Kata Kunci: Klinik Hewan, BMC, UML, SWOT. Abstract In this study the method used is a qualitative method. Primary data was collected through interviews with the respondent, such as clinic owners, clinic customers, clinic employees and clinic partners. Meanwhile, secondary data was collected through articles, previous research, books, and reference journals related to the research topic. Virgin Pet Care Veterinary Clinic's revenue stream is still limited to pet health care services. This makes the clinic vulnerable to a decrease in income when unfavorable conditions occur. This condition makes the clinic must have other sources of income in order to maintain its income rate.Through the results of the analysis carried out, the recommendations for the company are obtained through the addition of new business processes by selling products for pets through the website. Sales of these products are divided into sales of products for animal needs and pet data registration. The product selling process was designed using the Unified Modeling Language (UML) followed by the design of a user interface mock up. The results of this study are expected to be used as recommendations for the business activities of the Virgin Pet Care Veterinary Clinic, especially in obtaining income. In addition, this research can be used as a guide in the implementation of business processes of the clinic. The implementation of the new business process recommendations is expected to provide more opportunities for clinics to earn optimally. Keywords: Veterinary Clinic, BMC, UML, SWOT
Information Security Assessment Using ISO/IEC 27001:2013 Standard on Government Institution Akmal Zaifullah Maingak; Candiwan Candiwan; Listyo Dwi Harsono
TRIKONOMIKA Vol 17 No 1 (2018): June Edition
Publisher : Faculty of Economics and Business, University of Pasundan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (737.829 KB) | DOI: 10.23969/trikonomika.v17i1.1138

Abstract

The purpose of this research is to determine the existing gap to achieve ISO/IEC 27001:2013 certification and determine the maturity level of the information system owned by X Government Institution. The information system of X Government Institution would be assessed based on 14 clauses contained in ISO/IEC 27001: 2013. The method used is qualitative method, data collection and data validation with triangulation technique (interview, observation, and documentation). Data analysis used gap analysis and to measure the maturity level of this research used CMMI (Capability Maturity Model for Integration). The result of the research showed that information security which had been applied by X Government Institution was at level 1 (Initial) which meant there was evidence that the institution was aware of problems that needed to be overcome, unstandardized process, and tended to handle the problem individually or by case.
The Impact of Perceived Surveillance on Continuance Usage Intention of Voice Assistants Roja Abdussami; Candiwan
Syntax Literate Jurnal Ilmiah Indonesia
Publisher : Syntax Corporation

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36418/syntax-literate.v8i9.13590

Abstract

Voice assistants (VAs) are devices that utilize AI, machine learning, and NLP to facilitate users to perform diverse tasks verbally. VAs also have a unique feature that allows them to be “always on” so that every sound generated in their background can be analyzed and start interacting with users when they recognize their wake-up command, for instance, “Hey Siri” or “Okay Google”, which implies that VAs have to be listening to users at all time. This raises the issue of privacy in the form of perceived surveillance. This study aims to assess how perceived surveillance affects the continuance usage intention of VAs in Indonesia with the addition of personal information disclosure as a mediator. Surveillance effect model was utilized to measure perceived surveillance. The model was calculated using PLS-SEM based on online survey data (N=222) distributed over social media. It was revealed that perceived surveillance affects the continuance usage intention of VAs negatively and is partially mediated by personal information disclosure. The result also affirmed that trust, perceived risk, and prior negative experiences are predictors of perceived surveillance. Therefore, VA companies should be mindful of how their customers’ continuance usage intention is affected by how much perceived surveillance they feel.
ANALISIS BUDAYA KEAMANAN INFORMASI DI RUMAH SAKIT DI KOTA BANDUNG Farisha Pratami Tallei; Puspita Kencana Sari; Candiwan .; Adhi Prasetio
In Search (Informatic, Science, Entrepreneur, Applied Art, Research, Humanism) Vol 18 No 1 (2019): In Search
Publisher : LPPM UNIBI

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37278/insearch.v18i1.150

Abstract

Penelitian menganalisis faktor-faktor yang memengaruhi budaya keamanan informasi di RumahSakit di Kota Bandung. Penelitian ini menggunakan kuesioner yang disebarkan ke rumah sakit yangterdaftar di Badan Penyelenggara Jaminan Sosial Kesehatan (BPJS) sebanyak 169 kuesioner.Penelitian menggunakan sampel sejumlah rumah sakit di Kota Bandung. Metode penelitian adalahmetode kuantitatif dengan teknik analisis data Partially Least Square Structural Equation Modelling(PLS-SEM). Data penelitian adalah data primer melalui kuisioner kepada pegawai rumah sakit.Berdasarkan penelitian terdahulu, budaya keamanan informasi dipengaruhi oleh berbagai faktor danbudaya organisasi secara keseluruhan. Penelitian diharapkan memberikan wawasan tentang budayadan perilaku keamanan informasi di rumah sakit Kota Bandung dan mendukung strategi e-kesehatannasional oleh Kementerian Kesehatan Republik Indonesia. Penelitian ini dimulai dengan jumlahvariabel sebanyak 14, yaitu management, workplace capabilities, risk and response factors,operational management, change management, organisational culture, knowledge, securitycompliance, security behavior, soft issues – workplace independent, training and awareness,information security policies, perceived security threat dan attitude. Namun, yang berpengaruhterhadap Information Security Culture (ISC) adalah organisational culture, knowledge, informationsecurity policies, perceived security threat dan attitude.
KAPASITAS KEWIRAUSAHAAN MELALUI PENGEMBANGAN USAHA BERBASIS DIGITAL BAGI PEKERJA MIGRAN INDONESIA SALIMAH TAIWAN Sary, Fetty Poerwita; Tricahyono, Dodie; Candiwan, Candiwan
Sebatik Vol. 27 No. 2 (2023): Desember 2023
Publisher : STMIK Widya Cipta Dharma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46984/sebatik.v27i2.2300

Abstract

Pengembangan kompetensi kewirausahaan merupakan salah satu aspek penting bagi sumber daya manusia. Hal ini juga disadari oleh Pekerja Migran Indonesia (PMI) di Taiwan untuk meningkatkan kompetensi tersebut saat kembali ke Indonesia serta meningkatkan kapabilitas digital agar dapat beradaptasi dengan perkembangan teknologi. Salah satu cara yang efektif untuk membangun kompetensi adalah dengan memanfaatkan platform digital. Bekerjasama dengan Salimah Taiwan, kegiatan pengabdian masyarakat (abdimas) ini bertujuan untuk mengembangkan kompetensi PMI yang merupakan anggota Salimah Taiwan. Metode yang digunakan dalam kegiatan abdimas ini terdiri dari enam tahap, yaitu Training Need Analysis (TNA), pembuatan materi, pelatihan, assesment, evaluasi dan pembuatan aplikasi. Luaran dari abdimas ini adalah pelatihan dan pengembangan aplikasi Salimah E-Course yang dapat digunakan dan diunduh oleh PMI. Implementasi kegiatan ini telah menunjukkan hasil positif. Melalui materi pelatihan yang diberikan terdapat peningkatan rata-rata kompetensi sebesar 17,85%. Sementara itu hasil evaluasi menunjukan feedback yang baik. Saran untuk kelanjutan kegiatan  ini adalah perlunya memberikan pelatihan tambahan kepada para PMI agar mereka dapat termotivasi untuk belajar mandiri. Pelatihan tambahan ini dapat membantu mereka dalam mengembangkan kompetensi secara berkelanjutan dan mengikuti perkembangan teknologi. Selain itu, pengembangan materi pembelajaran tambahan juga dibutuhkan untuk memenuhi kebutuhan dan permintaan PMI. Dengan demikian, hal tersebut dapat memberikan manfaat yang lebih besar bagi PMI dalam meningkatkan kompetensi kewirausahaan dan mempersiapkan PMI dalam menghadapi tantangan masa depan.