Claim Missing Document
Check
Articles

Found 14 Documents
Search

Critical Success Factors Implementasi ERP PT Asuransi Kredit Indonesia Elke Cahya Putri; Rizal Fathoni Aji
The Indonesian Journal of Computer Science Vol. 13 No. 6 (2024): The Indonesian Journal of Computer Science (IJCS)
Publisher : AI Society & STMIK Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33022/ijcs.v13i6.4572

Abstract

Information technology plays a vital role in achieving corporate objectives, especially for organizations that rely on data integration through technology. Technology-based information systems assist in processing data into high-quality information. To support this, management must maintain the reliability of information, one way being the implementation of Enterprise Resource Planning (ERP). ERP helps enhance the reliability of information for decision-making. This study analyzes the Critical Success Factors (CSFs) in the implementation of ERP at PT Asuransi Kredit Indonesia (PT Askrindo). The primary focus is to identify relevant CSFs to ensure that ERP implementation aligns with the targets of corporate management and the Insurance Holding Company. This supports the shared information technology services initiative toward a single multi-tenant platform within the Insurance Holding environment. The research methods include a case study, literature review, categorization, and qualitative interviews. The results show that PT Askrindo must ensure the success of key factors at various stages of ERP implementation to achieve its goals
Perancangan Kapabilitas Security Operations Center di Public Cloud Computing Environment: Studi Kasus PT. XYZ Fadholi, M Ryan; Rizal Fathoni Aji
The Indonesian Journal of Computer Science Vol. 14 No. 4 (2025): The Indonesian Journal of Computer Science
Publisher : AI Society & STMIK Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33022/ijcs.v14i4.4945

Abstract

Cybersecurity has become a major challenge for financial institutions, including PT. XYZ. Although PT. XYZ has established a Security Operations Center (SOC) to safeguard its digital assets, the current SOC team lacks optimal capability to monitor the organization's newly adopted public cloud environment. This gap increases the risk of undetected cyberattacks targeting the cloud infrastructure. This study aims to develop recommendations for enhancing SOC capabilities in PT. XYZ’s public cloud environment using the Design Science Research (DSR) method. The initial SOC condition was analyzed through document review and observation. Capability gaps were identified through focus group discussions (FGD) guided by the SOC-CMM screening tool. The NIST Cybersecurity Framework (CSF) was then employed as the foundation for defining target capabilities. The study resulted in a set of 35 practical recommendations to improve the SOC team's capabilities, categorized according to the SOC-CMM domains.
A Comprehensive Case Study Rekomendasi Implementasi 11 Kontrol keamanan informasi baru ISO 27001:2022 di Perusahaan HealthTech XYZ: Studi Kasus Komprehensif tentang Meningkatkan Kepatuhan dan Keamanan Siber di HealthTech Company Suryo Wibowo, Bimantoro; Rizal Fathoni Aji
The Indonesian Journal of Computer Science Vol. 13 No. 4 (2024): The Indonesian Journal of Computer Science (IJCS)
Publisher : AI Society & STMIK Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33022/ijcs.v13i4.4166

Abstract

This study aims to recommend the implementation of new annex controls in ISO 27001:2022, guided by ISO 27002:2022, for PT XYZ. The research questions addressed are: (1) What are the existing gaps between PT XYZ's current information security controls and the requirements of ISO 27001:2022? (2) What specific recommendations can close these gaps? Using a qualitative case study approach, data were collected in May 2024 through purposive sampling, interviews, observations, and document analysis. Findings reveal that while some controls are partially implemented, others lack full documentation and SOPs. Detailed recommendations were provided to ensure compliance with updated standards, emphasizing formalization into SOPs. This study offers practical guidance for organizations transitioning to ISO 27001:2022, enhancing cybersecurity readiness and compliance with stringent data protection regulations.
Audit Keamanan Informasi Pemasok Pada Perusahaan Penyelenggara Sistem Pembayaran XYZ Mulyadi, Farroh Sakinah; Rizal Fathoni Aji
The Indonesian Journal of Computer Science Vol. 13 No. 4 (2024): The Indonesian Journal of Computer Science (IJCS)
Publisher : AI Society & STMIK Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33022/ijcs.v13i4.4167

Abstract

The relationship between companies and suppliers is one of the manifestations of the company's resource strategy to remain productive and competitive. However, suppliers also create information security risks, such as cybersecurity threats and data protection. To ensure the security of the company's information assets, PT XYZ implements an information security management system based on ISO / IEC 27001: 2022 for all company information assets, both managed by internal and external parties (suppliers). Therefore, this research aims to measure suppliers' criticality level with an information technology asset risk management approach. The company will evaluate the critical suppliers's information security control implementation through systematic monitoring processes such as audits and due diligence. The results of this study indicate that two suppliers at PT XYZ with a high level of criticality need to be audited, and three suppliers with a medium level of criticality need to conduct due diligence.