Claim Missing Document
Check
Articles

Found 3 Documents
Search
Journal : Proceeding of the Electrical Engineering Computer Science and Informatics

Incident and Service Request Management for Academic Information System based on COBIT Indra Kharisma Raharjana; Ibnu Ibadillah; Purbandini Purbandini; Eva Hariyanti
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 5: EECSI 2018
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (277.569 KB) | DOI: 10.11591/eecsi.v5.1619

Abstract

This paper explores application of Incident and Service Request Management for academic services. We are using Control Objectives for Information and Related Technologies (COBIT) framework as basis for determining the activities in Incident and Service Request Management. The COBIT itself is an IT governance framework included incident handling and service requests, also providing incident response and service request decisions. The software will be developed as a proof of concept that it brings benefits to academic service operations. For most academic services in university, encountered a problem such as incidents reports or a request for services are not immediately addressed, took a long time to respond, or even lost and left unreadable. It is a good idea to standardize incident management and plant it into academic information systems to enforce its application. In software development, we perform five development stages: requirement analysis, system design, stakeholder confirmation, system development, and system evaluation. In requirement analysis stages, we elicited features from activity describe in COBIT and customize it based on interviews and observation. We design use case diagram, use case scenario and database design in system design stages. In stakeholder confirmation stages, a meeting with the stakeholders held and discuss whether the system complies with the requirements or not. system adaptations are made to answer stakeholders concern. System development is conducted based on confirmed system design. Stakeholder evaluated after they follow the case simulation session. Stakeholders provide an evaluation of the system according to their role, based on their experience when using the system in the simulation session. User experience (UX) aspects are also evaluated based on user's interaction with the system. User experience results obtained meet all aspects, including useful, usable, desirable, findable, accessible, credible, and valuable. The evalu.
Applying IT Services Business Relationship Management on Security Outsource Company Indra Kharisma Raharjana; Susmiandri Susmiandri; Army Justitia
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 5: EECSI 2018
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (292.452 KB) | DOI: 10.11591/eecsi.v5.1622

Abstract

Most outsource security companies have not implemented information technology optimally. A company must implement information technology that is oriented to customers and stakeholders to be competitive. Outsourcing security companies need to apply a systematic approach for managing customer-oriented services. In this study, we implemented business relationship management based on Information Technology Infrastructure Library (ITIL) framework to develop a service strategy, especially for an outsourced security company. There are 5 stages of activities carried out, namely identifying stakeholders, defining business outcomes, establishing strategic and funding requirements, defining business cases, and validating business activity patterns. Verification and revision of customer requirement analysis are performed to validate and evaluate the results. The result of implementing business relationship management is the recommendations of four IT services that suits the organization. The four IT service recommendations are websites, CRM services, monitoring services, and ordering services. Business case documents for each service have been created to identify business impacts and risks.
Analysis of Electronic Medical Record Reception using Expanded Technology Acceptance Model Indra Kharisma Raharjana; Faisal Apriyana; Taufik Taufik
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 5: EECSI 2018
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (284.372 KB) | DOI: 10.11591/eecsi.v5.1634

Abstract

Information technology in the health sector has the potential to increase the quality of patient care by improving process efficiency, reducing errors and reducing costs. But this potential cannot be achieved if there is rejection from stakeholders. In this study, we examine the information technology acceptance model in the medical field. We use Moores's model that was developed from Davis's Technology Acceptance Model by adding the variables that determine the success of information technology acceptance. The variables are divided into two categories: information quality consisting of accuracy, content, timeliness, and format. The Enabling factors consisting technical support and self-efficacy. The case study was conducted among medical personnel at a Hospital in East Java. The subject of research is the use of the electronic medical record. Data were obtained through a questionnaire. Then the data is processed with Partial Least Squares algorithm using PLS software. As a result of the sixteen hypotheses proposed there are fourteen hypotheses accepted and the overall model deemed appropriate.