Claim Missing Document
Check
Articles

Found 2 Documents
Search
Journal : The Indonesian Journal of Computer Science

Data Governance Improvement Strategy for Peer-to-Peer Lending Sharia in Indonesia: Study Case PT ABC Priastomo, Ristyo Yogi; Ruldeviyani, Yova; Gunawan, Adi; Al Haq, Muhammad Hezby; Utami, Aisyah Nurlita
The Indonesian Journal of Computer Science Vol. 13 No. 6 (2024): The Indonesian Journal of Computer Science (IJCS)
Publisher : AI Society & STMIK Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33022/ijcs.v13i6.4233

Abstract

Abstract—Financial Technology (fintech) is a company that supervised by the Indonesian Financial Services Authority (OJK) and fintech associations which has strict regulations. Well-defined data management can support organizations to comply with mandatory regulations. This research was conducted on a sharia peer-to-peer lending fintech in Indonesia with the aim of solving data governance problems in organizations by measure of Data Governance Maturity Level to get recommendations strategies to improve the implementation of data governance in the organization. The measurement was carried out using IBM Data Governance Maturity Model Framework. After validation and finalization of the assessment, the results showed that the average score was 2.47. It's shown that currently at the Managed level. Some domains need to be improved in the future, data value creation, data organizational structure and awareness, data policies and rules and data stewardship.
Cybersecurity Improvement Design in Critical Infrastructure PT XYZ Case Study Gunawan, Adi; Rizal Fathoni Aji
The Indonesian Journal of Computer Science Vol. 12 No. 6 (2023): The Indonesian Journal of Computer Science (IJCS)
Publisher : AI Society & STMIK Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33022/ijcs.v12i6.3624

Abstract

Prevention of cyber attacks is an important factor that organizations need to do to support maximum business process continuity. One of the important factors needed is the protection of data and information assets by the critical infrastructure owned. This paper discusses increasing the capacity of critical infrastructure at XYZ organization. The NIST CSF framework is a benchmark assessment tool for critical infrastructure capacity at PT XYZ. The results obtained from the assessment are used to make recommendations for controls related to critical infrastructure. The risk assessment found 107 risk scenarios that led to 11 recommendations for critical infrastructure improvement areas. Prioritization of the resulting recommendations is expected to increase the resilience and capacity of critical infrastructure at PT XYZ in the face of current and future cyber threats.