Claim Missing Document
Check
Articles

Found 23 Documents
Search

Information Technology Supplier Management in Hospitals Indra Kharisma Raharjana; Ayundha Puspadini; Eva Hariyanti
Bulletin of Electrical Engineering and Informatics Vol 7, No 2: June 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (241.196 KB) | DOI: 10.11591/eei.v7i2.694

Abstract

In this study, we developed a document for managing Information Technology suppliers in hospitals. This document is used to ensure the proper management of IT suppliers in the hospital. Products and services in Information Technology have characteristics and specifications that are always up to date, making it difficult for non-IT people to understand. Hospitals whose main business in the health sector is often lack of human resources who understand IT. Observations and interviews were conducted in Indonesian hospital, to identify the characteristics and problems in supplier management. Control Objectives for Information and Related Technologies (COBIT), Information Technology Infrastructure Library (ITIL) and government regulations on supplier management were reviewed and combined as a benchmark and guidance on how supplier management activities are carried out. The result of the process is a Standard Operating Procedure (SOP) document.    The parties involved in the supplier management process have evaluated the SOP document. From the results of the study, it is known that currently, the hospital is still focused on procedures procurement of goods and services that are government regulated. This study proposes some new activities that are not currently done by the hospital.
Incident and Service Request Management for Academic Information System based on COBIT Indra Kharisma Raharjana; Ibnu Ibadillah; Purbandini Purbandini; Eva Hariyanti
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 5: EECSI 2018
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (277.569 KB) | DOI: 10.11591/eecsi.v5.1619

Abstract

This paper explores application of Incident and Service Request Management for academic services. We are using Control Objectives for Information and Related Technologies (COBIT) framework as basis for determining the activities in Incident and Service Request Management. The COBIT itself is an IT governance framework included incident handling and service requests, also providing incident response and service request decisions. The software will be developed as a proof of concept that it brings benefits to academic service operations. For most academic services in university, encountered a problem such as incidents reports or a request for services are not immediately addressed, took a long time to respond, or even lost and left unreadable. It is a good idea to standardize incident management and plant it into academic information systems to enforce its application. In software development, we perform five development stages: requirement analysis, system design, stakeholder confirmation, system development, and system evaluation. In requirement analysis stages, we elicited features from activity describe in COBIT and customize it based on interviews and observation. We design use case diagram, use case scenario and database design in system design stages. In stakeholder confirmation stages, a meeting with the stakeholders held and discuss whether the system complies with the requirements or not. system adaptations are made to answer stakeholders concern. System development is conducted based on confirmed system design. Stakeholder evaluated after they follow the case simulation session. Stakeholders provide an evaluation of the system according to their role, based on their experience when using the system in the simulation session. User experience (UX) aspects are also evaluated based on user's interaction with the system. User experience results obtained meet all aspects, including useful, usable, desirable, findable, accessible, credible, and valuable. The evalu.
CAUSES OF INEFFECTIVE IMPLEMENTATION OF IT GOVERNANCE IN RISK MANAGEMENT: A SYSTEMATIC LITERATURE REVIEW Ananda E S Setyadji; Arief R R Putrananda; Daffa H Permadi; Rais I Nustara; Reyhan B Pratama; Tegar A Masyhuda; Eva Hariyanti
JIKO (Jurnal Informatika dan Komputer) Vol 6, No 2 (2023): JIKO (Jurnal Informatika dan Komputer)
Publisher : Universitas Khairun

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33387/jiko.v6i2.6182

Abstract

Information Technology Governance is currently widely implemented in companies. One of the domains that can be of concern is risk management. The application of TKTI in this domain can help companies identify, evaluate, reduce, and manage risks related to their business to achieve company goals better. In this case, three frameworks can be considered, including NIST, ISO 27001, and Octave, but implementing these frameworks only sometimes goes as planned. This study aims to identify the factors that cause the ineffectiveness of implementing Information Technology Governance (ITG) in the risk management domain using the NIST, ISO 27001, and Octave frameworks. Through an analysis of existing literature and data processing, this study found that factors such as lack of understanding of the framework, lack of adequate resources, and implementation challenges play an essential role in ineffectiveness. This study concludes by providing valuable insights for organizations seeking to strengthen their risk management capabilities.
Penerapan Kerangka Kerja Keamanan Informasi di Rumah Sakit: Tinjauan Literatur Sistematis Iin Mardiyana; Eva Hariyanti; Novia Nurhasanah Arrasyid; Arum Tiyas Handayani; Kharristantie Sekarlangit Suryadewi; Fildzah Akhlaqulkarimah; Naurah Hedy Pramiyas
Jutisi : Jurnal Ilmiah Teknik Informatika dan Sistem Informasi Vol 12, No 2: Agustus 2023
Publisher : STMIK Banjarbaru

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35889/jutisi.v12i2.1260

Abstract

Hospitals are organizations that manage vital and complex data such as medical information and patient personal data that must be protected. The purpose of this paper is to analyze how IT security standards are implemented in hospitals in order to measure the level of maturity. Systematic Literature Review is the method used in this research. Of the 25 hospitals discussed in this paper, there are 3 standards and 8 models applied, namely ISO 27000 Family, COBIT, NIST, HDM, C2M2, HISMM, MD3M, PCMM, AHIMA, IMA and Fuzzy-ANP-TOPSIS integrated model. It was found that the implementation of models and standards for IT security has the same pattern, namely data collection, measuring the level of IT maturity and then providing recommendations for improvements based on measuring the level of IT maturity. While the difference between one model and another is in the domain, maturity attributes and the level or level of maturity used.Keywords: IT security standards; IT security model; Maturity level; Hospital AbstrakRumah sakit merupakan organisasi yang mengelola data vital dan kompleks seperti informasi medis dan data pribadi pasien yang harus dilindungi. Tujuan utama penulisan paper ini adalah untuk menganalisis bagaimana standar keamanan TI diimplementasikan di rumah sakit dalam rangka mengukur level kematangan. Systematic Literature Review adalah metode yang digunakan dalam penelitian ini. Dari 25 rumah sakit yang dibahas pada paper ini, terdapat 3 standar dan 8 model yang diterapkan, yaitu ISO 27000 Family, COBIT, NIST, HDM, C2M2, HISMM, MD3M, PCMM, AHIMA, IMA dan model terpadu Fuzzy-ANP-TOPSIS. Didapatkan temuan bahwa implementasi model maupun standar keamanan TI memiliki pola yang sama yaitu pengumpulan data, mengukur tingkat kematangan TI selanjutnya memberikan rekomendasi perbaikan berdasarkan pengukuran tingkat kematangan TI. Sedangkan perbedaan antara model yang satu dengan yang lainnya adalah pada domain, atribut kematangan dan level atau tingkat kematangan yang digunakan. 
Implementations of Artificial Intelligence in Various Domains of IT Governance: A Systematic Literature Review Eva Hariyanti; Made Balin Janeswari; Malvin Mikhael Moningka; Fikri Maulana Aziz; Annisa Rahma Putri; Oxy Setyo Hapsari; Nyoman Agus Arya Dwija Sutha; Yohannes Alexander Agusti Sinaga; Manik Prasanthi Bendesa
Journal of Information Systems Engineering and Business Intelligence Vol. 9 No. 2 (2023): October
Publisher : Universitas Airlangga

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20473/jisebi.9.2.305-319

Abstract

Background: Artificial intelligence (AI) has become increasingly prevalent in various industries, including IT governance. By integrating AI into the governance environment, organizations can benefit from the consolidation of frameworks and best practices. However, the adoption of AI across different stages of the governance process is unevenly distributed. Objective: The primary objective of this study is to perform a systematic literature review on applying artificial intelligence (AI) in IT governance processes, explicitly focusing on the Deming cycle. This study overlooks the specific details of the AI methods used in the various stages of IT governance processes. Methods: The search approach acquires relevant papers from Elsevier, Emerald, Google Scholar, Springer, and IEEE Xplore. The obtained results were then filtered using predefined inclusion and exclusion criteria to ensure the selection of relevant studies. Results: The search yielded 359 papers. Following our inclusion and exclusion criteria, we pinpointed 42 primary studies that discuss how AI is implemented in every domain of IT Governance related to the Deming cycle. Conclusion: We found that AI implementation is more dominant in the plan, do, and check stages of the Deming cycle, with a particular emphasis on domains such as risk management, strategy alignment, and performance measurement since most AI applications are not able to perform well in different contexts as well as the other usage driven by its unique capabilities. Keywords: Artificial Intelligence, Deming cycle, Governance, IT Governance domain, Systematic literature review
Evaluasi dan Desain Ulang Antarmuka Menggunakan Metode User Centered Design (UCD) pada Aplikasi Kampus Kita Tendik Zaman, Badrus; Nayottami, Inten Bajra; Hariyanti, Eva
J-Icon : Jurnal Komputer dan Informatika Vol 12 No 1 (2024): Maret 2024
Publisher : Universitas Nusa Cendana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35508/jicon.v12i1.13287

Abstract

The Kampus Kita Tendik application is a mobile-based application developed by Airlangga University to streamline and optimize the performance of Educational Personnel. From a usability perspective, the application exhibits several UI/UX issues, including inconsistent font placement and size, as well as a disorganized profile menu. Consequently, there is a need for research to redesign the application interface, aiming to deliver an intuitive user experience, ease of navigation, and enhanced functionality. The research methodology employed includes User Centered Design (UCD) for application design and System Usability Scale (SUS) for assessing application usability. Twenty respondents, comprising Educational Personnel, were engaged to evaluate both the initial design and the redesigned interface. The outcomes of this evaluation, conducted through UCD, demonstrate a marked improvement in application design quality. This is evidenced by the SUS score of 87.14, awarded an A+ grade, for the redesigned application—a significant increase from the initial SUS score of 65.57, which received a C grade.
Analisis Seleksi Fitur untuk Optimasi Metode Klasifikasi k-NN pada Studi Kasus Penilaian Kinerja Karyawan Tangkawarow, Irene; Hostiadi, Dandy Pramana; Fatonah, Nenden Siti; Mohammad Yazdi; Hariyanti, Eva
Jurnal Sistem dan Informatika (JSI) Vol 18 No 1 (2023): Jurnal Sistem dan Informatika (JSI)
Publisher : Direktorat Penelitian,Pengabdian Masyarakat dan HKI - Institut Teknologi dan Bisnis (ITB) STIKOM Bali

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30864/jsi.v18i1.593

Abstract

Model Klasifikasi banyak digunakan dalam rangka menganalisis dan menemukan jenis kategori kelas data. Salah satu bentuk pemanfaatan metode klasifikasi adalah mengklasifikasikan hasil penilaian pengukuran kinerja karyawan. Metode klasifikasi yang umum dan dapat digunakan antara lain adalah metode Decision Tree, Naive Bayes, -NN dan Random Forest. Namun tidak semua metode dapat menghasilkan performa yang baik dalam penilaian kinerja Karyawan. Sehingga perlu dilakukan optimasi misalnya melalui penggunaan seleksi fitur. Beberapa penelitian telah dilakukan optimasi metode klasifikasi melalui penggunaan metode seleksi fitur dalam penilaian kinerja karyawan. Namun optimasi ini dipengaruhi oleh karakteristik data yang digunakan. Tidak semua teknik seleksi fitur sesuai untuk meningkatkan hasil klasifikasi dan jumlah penggunaan fitur dapat mempengaruhi performa model klasifikasi. Penelitian ini mengusulkan teknik analisis penggunaan jumlah fitur pada data kinerja dosen melalui metode seleksi fitur ANOVA untuk meningkatkan performa model klasifikasi metode -NN. Tujuannya adalah untuk mendapatkan jumlah fitur yang terbaik dalam peningkatan performa metode klasifikasi -NN. Hasil penelitian menunjukkan bahwa jumlah fitur terbaik dari metode ANOVA adalah sejumlah 5 fitur dengan hasil akurasi klasifikasi -NN sebesar 0.839, precision 0.8323, recall 0.839 dan F1-score 0.833. Teknik analisis ini dapat digunakan oleh sebuah perusahaan dalam mengutamakan fitur terbaik dalam menilai kualitas kinerja karyawannya.
Analisis Perbandingan Metode Seleksi Fitur pada Model Klasifikasi Decission Tree untuk Deteksi Serangan di Jaringan Komputer Hariyanti, Eva; Hostiadi, Dandy Pramana; Anggreni; Yohanes Priyo Atmojo; I Made Darma Susila; Tangkawarow, Irene
Jurnal Sistem dan Informatika (JSI) Vol 18 No 2 (2024): Jurnal Sistem dan Informatika (JSI)
Publisher : Direktorat Penelitian,Pengabdian Masyarakat dan HKI - Institut Teknologi dan Bisnis (ITB) STIKOM Bali

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30864/jsi.v18i2.615

Abstract

Perkembangan informasi dan teknologi memerlukan teknik pengamanan yang tepat. Potensi terjadinya kebocoran data dan informasi di era digital sangat tinggi apabila tidak ditangani dengan serius. Beberapa serangan berbahaya yang terjadi adalah spam, Denial of Service Attack, ARP Poisoning, SQL Injection, U2L, R2L dan Probing. Penelitian sebelumnya telah mengenalkan pendekatan deteksi serangan berbahaya seperti menggunakan klasifikasi, klusterisasi dan analisis statistik. Namun analisis penggunaan fitur terbaik perlu dilakukan untuk mendapatkan hasil model klasifikasi yang optimal. Pada penelitian ini, menganalisis dan mencari metode seleksi fitur terbaik yang dapat diimplementasikan pada model klasifikasi berbasis machine learning untuk mendeteksi serangan di jaringan. Dataset yang digunakan adalah UNSW-NB15, dan dilakukan beberapa proses seperti data transformasi, Data normalisasi, seleksi Fitur dan Klasifikasi. Perbandingan teknik seleksi fitur yang digunakan antara lain ANOVA, UNIVARIATE dan ChiSquare. Tujuan penelitian ini adalah untuk meningkatkan akurasi, precision dan recall pada model klasifikasi Decision Tree. Hasil penelitian pengujian menunjukkan bahwa metode seleksi fitur terbaik dalam model klasifikasi adalah metode ANOVA dengan hasil nilai Area Under Curve sebesar 0.989, nilai F1-score adalah 0.999, akurasi deteksi adalah 0.999, nilai precission adalah 0.999 dan recall adalah 0.999. Hasil penelitian ini dapat digunakan untuk menyempurnakan model Intrusi Detection System berbasis machine learning.
Performance Analysis of Information Technology Services in Higher Education using COBIT 2019 Hariyanti, Eva; Nuzulita, Nania; Ranandha, Muhamad Erza; Indari, Ima Tri
Jurnal Sistem Informasi Bisnis Vol 15, No 1 (2025): Volume 15 Number 1 Year 2025
Publisher : Diponegoro University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14710/vol15iss1pp45-51

Abstract

Higher education institutions increasingly leverage information technology (IT) to improve their services. IT services are crucial in managing and supporting students, faculty, and staff. As IT governance evolves, measuring performance to identify potential service delivery issues becomes essential. This research adopts the COBIT 2019 framework, particularly the Deliver, Service, Support (DSS) domain, as a structured approach to assessing IT services' capability and maturity levels at a public university in Indonesia. The research methodology involves identifying measurement areas, collecting data, evaluating capability and maturity levels, validity testing, and providing recommendations. The study results show that the IT service maturity level of the university related to management practices in managed operations (DSS01), managed service requests and incidents (DSS02), and managed problems (DSS03) has reached level 3. Five activities in the IT service management have not been performed optimally: monitoring incidents and problems to improve task reliability, integrating key internal IT processes with outsourced service providers, comparing measures and plans with insurance policy requirements, evaluating physical modifications to IT sites to re-evaluate environmental risks, and including review knowledge in the service review meeting with the business customer. The validity results indicate that most of the measurement results align with the actual conditions of IT services, with an average validity score of 4.14. This study suggests specific improvements related to those five activities feasible for the university to implement to enhance its IT services.
Penyusunan Audit Program untuk Pengendalian Aplikasi Modul Human Resources pada Sistem Terintegrasi Utomo, Bagus Satriawan Wahju; Raharjana, Indra Kharisma; Hariyanti, Eva
MULTINETICS Vol. 1 No. 1 (2015): MULTINETICS Mei (2015)
Publisher : POLITEKNIK NEGERI JAKARTA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32722/multinetics.v1i1.1026

Abstract

Dengan mengandalkan teknologi informasi sebagai tulang punggung operasional perusahaan, aplikasi yang terlibat di dalamnya harus benar-benar dapat diandalkan dan tidak terdapat kesalahan ketika digunakan. Untuk mencapai hal tersebut, perlu adanya pengendalian aplikasi. Namun, pengendalian aplikasi memerlukan pedoman agar kegiatan tersebut sesuai dengan tujuan awal sehingga aplikasi berfungsi secara efektif dan efisien. Pedoman tersebut dapat berupa audit program yang berisi prosedur untuk melakukan pengendalian yang akan dijalankan. Audit program dapat disusun menggunakan kerangka utama yang dikemukakan oleh Bellino dan Hunt. Selanjutnya, audit program disesuaikan dengan fungsional Human Resources (HR) sebagai studi kasus. Fungsional HR yang digunakan adalah rekrutmen dan seleksi, pelatihan dan pengembangan, kompensasi dan evaluasi kinerja. Untuk memastikan audit program dapat digunakan secara umum, dilakukan pengujian menggunakan 1 fitur pada portal internal PT.Telekomunikasi Indonesia (Telkom) sebagai studi kasus. Portal internal Telkom memiliki beberapa fitur yang digunakan untuk menjalankan operasional HR. Fitur-fitur yang ada dipilih melalui proses perhitungan nilai resiko dengan melakukan penilaian resiko. Uji coba dilakukan dengan menyesuaikan possible test yang ada pada audit program menjadi actual test.