Claim Missing Document
Check
Articles

Found 34 Documents
Search

Strategic Management for IT Services on Outsourcing Security Company Lydia Wijaya; Indra Kharisma Raharjana; Endah Purwanti
Journal of Information Systems Engineering and Business Intelligence Vol. 4 No. 1 (2018): April
Publisher : Universitas Airlangga

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (382.412 KB) | DOI: 10.20473/jisebi.4.1.46-56

Abstract

Information Technology (IT) is used by many organizations to enhance competitive advantage, but many outsource security firms have not used IT in their business processes. In this research, we will design Strategic Management for IT Services for outsourcing security company. We use an outsourcing security company as a case study of IT Strategy Management for IT Services development. The purpose of this study is to create an IT services strategy for security outsourcing companies. The framework used is the ITIL (Information Technology Infrastructure Library) framework service strategy in strategy management for IT services process. There are several steps taken in the making of the strategy: (a) Strategic assessment stage to analyzed internal and external factors of the company. (b) Strategy generation by creating the strategic plan. (c) Strategy execution to determine the tactical plan. And (d) strategy measurement and evaluation. This study produced the proposed IT service system that suits the needs of the company in the form of strategic, tactical plans and strategy measurement. This result can be used as the foundations of IT service development in outsourcing security company. In the process of this study, we work closely with stakeholders; every work product has been verified and validated by stakeholders.
The Continuance Intention of User’s Engagement in Multiplayer Video Games based on Uses and Gratifications Theory Ira Puspitasari; Elzha Odie Syahputra; Indra Kharisma Raharjana; Ferry Jie
Journal of Information Systems Engineering and Business Intelligence Vol. 4 No. 2 (2018): October
Publisher : Universitas Airlangga

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (575.69 KB) | DOI: 10.20473/jisebi.4.2.131-138

Abstract

One of the key success factors in video game industry, including multiplayer video game (MVG), is the user’s continuance intention. The MVG industry runs in a highly competitive market. Users can shift to another game as soon as they discover a slightly inconvenient issue. Thus, maintaining the user’s enthusiasm in playing MVG for a long time is challenging for most games. The solution to prolong the users’ engagement can be initiated by identifying all factors that facilitate the continuance use of playing MVG. This study applied uses and gratifications theory to examine seven variables (enjoyment, fantasy, escapism, social interaction, social presence, achievement, and self-presentation) and the moderating effects of age and gender on the MVG continuance intention. The data analysis and the model development were tested based on Partial Least Square method using the responses of 453 MVG users. The results revealed that enjoyment, fantasy, social interaction, achievement, and self-presentation significantly affected the continuance intention of playing MVG, with enjoyment being the strongest variable. The result also demonstrated the moderating effect of age and gender on the relation between independent variables and continuance intention. The results and findings offered additional insights into the system development to enhance the information system application.
Tool for Generating Behavior-Driven Development Test-Cases Indra Kharisma Raharjana; Fadel Harris; Army Justitia
Journal of Information Systems Engineering and Business Intelligence Vol. 6 No. 1 (2020): April
Publisher : Universitas Airlangga

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20473/jisebi.6.1.27-36

Abstract

Background: Testing using Behavior-Driven Development (BDD) techniques is one of the practices of Agile software development. This technique composes a test-case based on a use case scenario, for web application acceptance tests.Objective:  In this study, we developed a tool to generate test case codes from BDD scenario definitions to help and facilitate practitioners to conduct testing.Methods: The generated test case code is made according to the codeception framework format so that it can be directly executed by the tester. The procedure is performed as follows:  map the correlation of the language used in BDD (gherkin language) and the code syntax of the test code in the codeception framework, designed the GUIs in such a way that users can easily transform the Use Case Scenario, built the tool so that it can generate test cases codes. Evaluation is done by gathering respondents; ask to run the application and gathering feedback from respondents.Results: This tool can generate a codeception test-case file based on the BDD scenario. Generated test cases can be directly used on codeception tools. The results of the evaluation show that the tools can help entry-level programmers in developing automated tests.Conclusion: The tool can help user especially entry-level programmers to generate BDD test-case and make easy for the users for testing the web applications.
Information Technology Supplier Management in Hospitals Indra Kharisma Raharjana; Ayundha Puspadini; Eva Hariyanti
Bulletin of Electrical Engineering and Informatics Vol 7, No 2: June 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (241.196 KB) | DOI: 10.11591/eei.v7i2.694

Abstract

In this study, we developed a document for managing Information Technology suppliers in hospitals. This document is used to ensure the proper management of IT suppliers in the hospital. Products and services in Information Technology have characteristics and specifications that are always up to date, making it difficult for non-IT people to understand. Hospitals whose main business in the health sector is often lack of human resources who understand IT. Observations and interviews were conducted in Indonesian hospital, to identify the characteristics and problems in supplier management. Control Objectives for Information and Related Technologies (COBIT), Information Technology Infrastructure Library (ITIL) and government regulations on supplier management were reviewed and combined as a benchmark and guidance on how supplier management activities are carried out. The result of the process is a Standard Operating Procedure (SOP) document.    The parties involved in the supplier management process have evaluated the SOP document. From the results of the study, it is known that currently, the hospital is still focused on procedures procurement of goods and services that are government regulated. This study proposes some new activities that are not currently done by the hospital.
Incident and Service Request Management for Academic Information System based on COBIT Indra Kharisma Raharjana; Ibnu Ibadillah; Purbandini Purbandini; Eva Hariyanti
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 5: EECSI 2018
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (277.569 KB) | DOI: 10.11591/eecsi.v5.1619

Abstract

This paper explores application of Incident and Service Request Management for academic services. We are using Control Objectives for Information and Related Technologies (COBIT) framework as basis for determining the activities in Incident and Service Request Management. The COBIT itself is an IT governance framework included incident handling and service requests, also providing incident response and service request decisions. The software will be developed as a proof of concept that it brings benefits to academic service operations. For most academic services in university, encountered a problem such as incidents reports or a request for services are not immediately addressed, took a long time to respond, or even lost and left unreadable. It is a good idea to standardize incident management and plant it into academic information systems to enforce its application. In software development, we perform five development stages: requirement analysis, system design, stakeholder confirmation, system development, and system evaluation. In requirement analysis stages, we elicited features from activity describe in COBIT and customize it based on interviews and observation. We design use case diagram, use case scenario and database design in system design stages. In stakeholder confirmation stages, a meeting with the stakeholders held and discuss whether the system complies with the requirements or not. system adaptations are made to answer stakeholders concern. System development is conducted based on confirmed system design. Stakeholder evaluated after they follow the case simulation session. Stakeholders provide an evaluation of the system according to their role, based on their experience when using the system in the simulation session. User experience (UX) aspects are also evaluated based on user's interaction with the system. User experience results obtained meet all aspects, including useful, usable, desirable, findable, accessible, credible, and valuable. The evalu.
Applying IT Services Business Relationship Management on Security Outsource Company Indra Kharisma Raharjana; Susmiandri Susmiandri; Army Justitia
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 5: EECSI 2018
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (292.452 KB) | DOI: 10.11591/eecsi.v5.1622

Abstract

Most outsource security companies have not implemented information technology optimally. A company must implement information technology that is oriented to customers and stakeholders to be competitive. Outsourcing security companies need to apply a systematic approach for managing customer-oriented services. In this study, we implemented business relationship management based on Information Technology Infrastructure Library (ITIL) framework to develop a service strategy, especially for an outsourced security company. There are 5 stages of activities carried out, namely identifying stakeholders, defining business outcomes, establishing strategic and funding requirements, defining business cases, and validating business activity patterns. Verification and revision of customer requirement analysis are performed to validate and evaluate the results. The result of implementing business relationship management is the recommendations of four IT services that suits the organization. The four IT service recommendations are websites, CRM services, monitoring services, and ordering services. Business case documents for each service have been created to identify business impacts and risks.
Analysis of Electronic Medical Record Reception using Expanded Technology Acceptance Model Indra Kharisma Raharjana; Faisal Apriyana; Taufik Taufik
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 5: EECSI 2018
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (284.372 KB) | DOI: 10.11591/eecsi.v5.1634

Abstract

Information technology in the health sector has the potential to increase the quality of patient care by improving process efficiency, reducing errors and reducing costs. But this potential cannot be achieved if there is rejection from stakeholders. In this study, we examine the information technology acceptance model in the medical field. We use Moores's model that was developed from Davis's Technology Acceptance Model by adding the variables that determine the success of information technology acceptance. The variables are divided into two categories: information quality consisting of accuracy, content, timeliness, and format. The Enabling factors consisting technical support and self-efficacy. The case study was conducted among medical personnel at a Hospital in East Java. The subject of research is the use of the electronic medical record. Data were obtained through a questionnaire. Then the data is processed with Partial Least Squares algorithm using PLS software. As a result of the sixteen hypotheses proposed there are fourteen hypotheses accepted and the overall model deemed appropriate.
User Story Extraction from Online News with FeatureBased and Maximum Entropy Method for Software Requirements Elicitation Nafingatun Ngaliah; Daniel Siahaan; Indra Kharisma Raharjana
IPTEK The Journal for Technology and Science Vol 32, No 3 (2021)
Publisher : IPTEK, LPPM, Institut Teknologi Sepuluh Nopember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12962/j20882033.v32i3.11625

Abstract

Software requirements query is the frst stage in software requirements engineering. Elicitation is the process of identifying software requirements from various sources such as interviews with resource persons, questionnaires, document analysis, etc. The user story is easy to adapt according to changing system requirements. The user story is a semi-structured language because the compilation of user stories must follow the syntax as a standard for writing features in agile software development methods. In addition, user story also easily understood by end-users who do not have an information technology background because they contain descriptions of system requirements in natural language. In making user stories, there are three aspects, namely the who aspect (actor), what aspect (activity), and the why aspect (reason). This study proposes the extraction of user stories consisting of who and what aspects of online news sites using feature extraction and maximum entropy as a classifcation method. The systems analyst can use the actual information related to the lessons obtained in the online news to get the required software requirements. The expected result of the extraction method in this research is to produce user stories relevant to the software requirements to assist systems analysts in generating requirements. This proposed method shows that the average precision and recall are 98.21% and 95.16% for the who aspect; 87,14% and 87,50% for what aspects; 81.21% and 78.60% for user stories. Thus, this result suggests that the proposed method generates user stories relevant to functional software.
SISTEM DASHBOARD UNTUK PERSIAPAN AKREDITASI PROGRAM STUDI SARJANA BERDASARKAN STANDAR BAN-PT Aufa Akmal Raditya; Kartono -; Indra Kharisma Raharjana
Jurnal Sistem Informasi Vol 8, No 1 (2016)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (319.841 KB) | DOI: 10.36706/jsi.v8i1.2956

Abstract

Abstract Accreditation is a form of quality and feasibility assessment (evaluation) of higher education institutions or programs of studies conducted by independent organizations or institution outside the college. To achieve the desired value of universities accreditation and study programs have to adjust their internal conditions in accordance with the standards provided by the National Accreditation Board of Higher Education (BAN-PT). As a consideration to achieve the standards set by BAN-PT, accreditation preparation is necessary to determine whether the course or college meets the standards set by BAN-PT. Accreditation preparation system needs to be built using a dashboard system that can integrate the entire contents of the supporting datato acquire information about parts that are below the standards and that are already meet the standards in the evlauation process. This study aimed to examine whether the preparation of the accreditation system by using a dashboard system better than the preparation of accreditation system which has been done before. There are several stages in this study, namely the identification of needs, system design, system development, system testing, and system evaluation. The resultindicated that the intenal party of the study program could determine their assessment position within a certain period with ease through the dashboard system of accreditation preperation. Keywords: Accreditation, Dashboard, BAN-PT Standards Abstrak Akreditasi merupakan salah satu bentuk penilaian (evaluasi) mutu dan kelayakan institusi perguruan tinggi atau program studi yang dilakukan oleh organisasi atau badan mandiri di luar perguruan tinggi. Untuk mencapai nilai akreditasi yangdiinginkan maka perguruan tinggi serta program studiharus menyesuaikan kondisi internal mereka sesuai denganstandar yang telah diberikan oleh Badan Akreditasi Nasional Perguruan Tinggi (BAN-PT). Sebagaipertimbangan untuk mencapai standar yang ditentukan olehBAN-PT, maka diperlukan persiapan akreditasi untuk mengetahui apakahprogram studi atau perguruan tinggi tersebut sudah memenuhistandar yang ditetapkan oleh BAN-PT.Perlu dibangun sistem persiapan akreditasi dengan menggunakan sistem dashboard yang dapat mengintegrasikan keseluruhan isi data pendukung sehingga saat proses evaluasi didapatkan informasi mengenai bagian-bagian apa saja yang kurang maupun yang sudah memenuhi standar. Penelitian ini bertujuan untuk menguji apakah sistem persiapan akreditasi dengan menggunakan sistem dashboard lebih baik dibandingkan dengan sistem persiapan akreditasi yang selama ini dilakukan. Terdapat beberapa tahapan dalam penelitian ini, yaitu melakukan identifikasi kebutuhan, perancangan sistem, pembangunan sistem, pengujian sistem, dan evaluasi sistem. Hasil dari evaluasi sistem menunjukkan bahwa melalui sistem dashboard untuk persiapan akreditasi pihak internal program studi dapat mengetahui posisi penilaian mereka pada periode tertentu dengan mudah. Kata kunci : Akreditasi, Dashboard, Standar BAN-PT.
Security Aspect in Software Testing Perspective: A Systematic Literature Review Halim Wildan Awalurahman; Ibrahim Hafizhan Witsqa; Indra Kharisma Raharjana; Ahmad Hoirul Basori
Journal of Information Systems Engineering and Business Intelligence Vol. 9 No. 1 (2023): April
Publisher : Universitas Airlangga

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20473/jisebi.9.1.95-107

Abstract

Background: Software testing and software security have become one of the most important parts of an application. Many studies have explored each of these topics but there is a gap wherein the relation of software security and software testing in general has not been explored. Objective: This study aims to conduct a systematic literature review to capture the current state-of-the-art in software testing related to security. Methods: The search strategy obtains relevant papers from IEEE Xplore and ScienceDirect. The results of the search are filtered by applying inclusion and exclusion criteria. Results: The search results identified 50 papers. After applying the inclusion/exclusion criteria, we identified 15 primary studies that discuss software security and software testing. We found approaches, aspects, references, and domains that are used in software security and software testing. Conclusion: We found certain approach, aspect, references, and domain are used more often in software security testing   Keywords: Software security, Software testing, Security testing approach, Security threats, Systematic literature review