Claim Missing Document
Check
Articles

Found 15 Documents
Search

Design of an Audit Instrument for the Internship Information System (IIS) Based on COBIT 2019 (A Case Study at Universitas XYZ) Syirfa, Atika Naiylatan; Dewi, Renny Sari; Wibawa, Rindu Puspita
Journal of Digital Business and Innovation Management Vol. 4 No. 2 (2025): December 2025-Article in Press
Publisher : Universitas Negeri Surabaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The Internship Information System (IIS) at XYZ University plays a key role in managing student internship administration but faces challenges such as data access issues, inaccurate information, and delayed updates. The transition to a new system occurred without evaluating IIS performance, risking similar problems in the future. This study aims to design an audit working paper based on COBIT 2019’s Monitor, Evaluate, and Assess (MEA) domain to systematically evaluate IIS performance, control, and compliance aspects. A qualitative case study approach was applied, using interviews, observations, and document analysis at the Directorate of Cooperation, Information Technology, and Data Center. The results indicate weaknesses in performance monitoring, control documentation, and compliance reporting. The proposed audit working paper, consisting of process documents, checklists, and audit steps, is applicable as an internal audit tool. This study concludes that the MEA domain of COBIT 2019 is effective as a foundation for developing audit instruments for information systems in higher education.
Development of Audit Working Papers and Maturity Levels for Helpdesk Information Technology Governance Using COBIT 2019 in the DSS Domain: (A Case Study of XYZ University) Zahroh, Syifa'ul Aini; Dewi, Renny Sari; Wibawa, Rindu Puspita
Journal of Digital Business and Innovation Management Vol. 4 No. 2 (2025): December 2025-Article in Press
Publisher : Universitas Negeri Surabaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The implementation of the helpdesk information system at University XZY in Surabaya plays a crucial role in supporting the management of complaints from students and academic staff. However, several issues have been identified, including inadequate user data verification mechanisms, potential privacy violations due to open access to complaint reports by other users, and the absence of a structured incident resolution report. These challenges impact the performance and integrity of the information system. To address these problems, this study aims to design an audit working paper using the COBIT 2019 framework, specifically focusing on DSS02 (Managed Service Requests and Incidents), DSS03 (Managed Problems), and DSS04 (Managed Continuity) to evaluate and improve the system. The findings indicate that all three domains are at capability level 3 (Defined), which implies that processes are documented but not yet measured consistently. This study produces an audit working paper, improvement recommendations, and an implementation cost estimation, which can serve as a strategic reference for university XYZ in enhancing the quality, security, and sustainability of its helpdesk system.
Audit Tata Kelola Teknologi Informasi pada Pengukuran Kinerja dan Kapasitas Bandwith berdasarkan Cobit 4.1 Sayekti, Widya; Ermawati, Juliana; Dewi, Renny Sari
Jurnal Teknologi Informasi dan Ilmu Komputer Vol 7 No 1: Februari 2020
Publisher : Fakultas Ilmu Komputer, Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Universitas Internasional Semen Indonesia (UISI) di Gresik adalah merupakan perguruan tinggi yang berada di bawah naungan Yayasan Semen Indonesia Tbk. Teknologi informasi (TI) yang ada pada Universitas Internasional Semen Indonesia mempunyai bagian yang berada di Direktorat Information and Communication Tecnology (ICT). Tugas dan fungsi dari divisi ICT meliputi berbagai masalah tentang teknologi informasi. Direktorat ICT memiliki tugas pokok yaitu mengelola, memelihara, menjaga dan memastikan  program, perangkat keras, perangkat lunak hingga jaringan komputer. Berdasarkan pembagian fokus penelitian, maka penulis membatasi riset ini hanya pada pengelolaan kapasitas bandwidth internet di UISI. Penelitian ini didasari pada kerangka kerja Control Objective for Information and related Technology (COBIT) 4.1 terutama pada sub proses DS 3. Data diperoleh melalui wawancara terhadap Direktorat ICT dan inspeksi menggunakan tools Speedtest.net. Hasil dari penelitian ini, tingkat kematangan menggunakan COBIT 4.1 pada sub proses DS 3 adalah  2.9 (skala 5), artinya proses yang dilakukan secara berkala namun tidak ada panduan formal dan aturan yang menjadi standar, sedangkan pada tingkat kepatuhan yaitu sebesar 11.6 persen karena tidak adanya laporan, pengecekan dan kontrol. AbstractInternational Semen Indonesia University (UISI) in Gresik is a university under the auspices of the Semen Indonesia Tbk Foundation. Information technology (IT) at the International University of Semen Indonesia has a section in the Information and Communcation Tecnology (ICT) Directorate. The tasks and functions of the ICT division include various problems regarding information technology. The ICT Directorate has the main task of managing, maintaining, maintaining and ensuring programs, hardware, software to computer networks. Based on the division of research focus, the authors limit this research only to the management of internet bandwidth capacity in UISI. This research is based on the Objective for Information and related Technology (COBIT) framework 4.1, especially in the DS 3 sub-process. Data was obtained through interviews with the ICT Directorate and inspection using Speedtest.net tools. The results of this study, the level of maturity using COBIT 4.1 on the DS 3 sub-process is 2.9 (scale 5), meaning that the process is carried out periodically but there are no formal guidelines and rules that become standard, while the level of compliance is 11.6 percent due to absence reports, checks and controls.
Analisis Tingkat Kematangan Pendistribusian Ruang Kelas dengan Framework COBIT 4.1 Menggunakan Domain DS10 Muthoharoh, Imroatul; Dwipa, Elfara Fraksi; Dewi, Renny Sari
Jurnal Teknologi Informasi dan Ilmu Komputer Vol 6 No 6: Desember 2019
Publisher : Fakultas Ilmu Komputer, Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (2193.325 KB) | DOI: 10.25126/jtiik.2019661502

Abstract

Audit TI adalah bentuk suatu pengendalian atau pengawasan dari infrastruktur teknologi informasi yang dilakukan meliputi keseluruhannya, atau secara singkat dapat dikenal sebagai proses evaluasi dari semua kegiatan  TI dalam organisasi. Auditor TI adalah orang yang melakukan audit, yang memiliki tugas yaitu mengumpulkan bukti-bukti melalui wawancara, survei, observasi, dan review dokumentasi. Terdapat dua macam data, yaitu data primer dan data sekunder. Data primer diperoleh melalui observasi atau wawancara, sedangkan data sekunder diperoleh dari jurnal ilmiah, e-book, dan lain-lain. Alur penelitian yang akan dilaksanakan dalam pengelolaan masalah pendistribusian kelas di UISI (Universitas Internasional Semen Indonesia). Hasil yang didapatkan adalah nilai compliance 8.125 persen dan maturity level yang berada di tingkat 1 yaitu senilai 1.6 (skala 5). Hal ini menunjukkan bahwa UISI masih belum memanfaatkan TI dengan baik dan secara maksimal. AbstractIT audit is a form of control or supervision of the information technology infrastructure that is carried out covering the whole, or briefly can be known as the evaluation process of all IT activities in the organization. IT auditors are people who conduct audits, who have the task of collecting evidence through interviews, surveys, observations, and documentation reviews. There are two types of data, namely primary data and secondary data. Primary data is obtained through observation or interview, while secondary data is obtained from scientific journals, e-books, and others. The flow of research that will be carried out in the management of class distribution problems in UISI (University International of Semen Indonesia). The results obtained are 8.125 percent compliance value and level 1 maturity level which is worth 1.6 (scale 5). This shows that UISI still does not utilize IT properly and optimally.
Social Engineering and Inter-Device Eavesdropping Using SCRCPY for Spoofing and Sniffing Wijaya, Anne Ivena; Damayanti, Yeni Rosa; Lestiani, Dwi Indah; Sugiono, Adinda Ayu Putri; Huanggino, Sherissa Callista; Rijal, Demas Muhammad; Dewi, Renny Sari
Sistemasi: Jurnal Sistem Informasi Vol 13, No 5 (2024): Sistemasi: Jurnal Sistem Informasi
Publisher : Program Studi Sistem Informasi Fakultas Teknik dan Ilmu Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32520/stmsi.v13i5.4223

Abstract

The rapid development of technology opens up new avenues for cybercriminals to carry out acts of social engineering and eavesdropping between devices. Social engineering refers to manipulation, influence, or deception used to gain control of a computer system. This technique is utilized by cybercriminals to steal sensitive information from their victims. This research focuses on analyzing social engineering and eavesdropping techniques between devices using SCRCPY, an Android screen control tool that allows remote control of Android devices from a computer. SCRCPY presents new opportunities for cybercriminals to launch spoofing and sniffing attacks, two common techniques used in social engineering attacks. This research explores various eavesdropping scenarios, analyzing interactions between devices and users, as well as security system responses to suspicious activity. The results show that SCRCPY can be used for various social engineering and eavesdropping attacks. Cybercriminals can use SCRCPY to gain control of a victim's Android device through the perpetrator's desktop computer. These findings indicate that social engineering attacks and eavesdropping between devices are becoming increasingly sophisticated and difficult to detect. Therefore, users need to increase their awareness of these risks and take steps to protect themselves. Keywords: Social engineering, SCRCPY, spoofing, sniffing, device security.