scholarly journals Green Information Technology in Indonesia– A Systematic Literature Review

2021 ◽  
Vol 0 (7) ◽  
pp. 78
Author(s):  
Zahra Nurkarima Budiwati Attori ◽  
Udisubakti Ciptomulyono ◽  
Satria Fadil Persada
2019 ◽  
Vol 10 (1) ◽  
pp. 34 ◽  
Author(s):  
Juan Luis Rubio ◽  
Magdalena Arcilla

One of the main points when implementing the Information Technology Infrastructure Library (ITIL) is which order the processes must be implemented. In the systematic literature review (SLR) developed, it is possible to find references about strategies and factors that ease the implementation of the ITIL, static sequences for the processes to be implemented, and recommendations about the first process to implement, but it is rather complicated to find references that explicitly define the order (adapted to a specific company) of the processes to be implemented. Thus, once it is shown that there is no methodology/algorithm providing a sequence of ITIL processes specifically adapted for each company, an algorithm to solve this problem is presented: The algorithm has a deep mathematical basis and returns a sequence of ITIL processes to optimize the efforts during implementation, so the company implementing the ITIL gets the closest to the competitors. The optimization is made considering parameters such as staff, age of the company, IT size, industry, etc. Thus, the sequence proposed is specific for each company. Finally, a comparative of the sequence obtained (from the proposed algorithm) with sequences discovered in the SLR is presented and applied to a real case.


2021 ◽  
Vol 12 (2) ◽  
pp. 138-156
Author(s):  
Indrika Dwi Rahma Suryani ◽  
Elia Kurniawati ◽  
Gracia Angelina Nawang Wulan ◽  
Hikmah Cahya Dinniah

So many cases of fraud have accured in Indonesia as well as the world today has entered the digital era. This study aims to determine with the development of information technology their role in audit practice in detecting fraud in Indonesia. The method used in this research is a systematic literature review using secondary data derived from literature and online media. The results of this study indicate that currently many techniques are used in detecting fraud by employing information technology such as general audit software, computer forensics, DFM (Digital Forensic Model) and whistleblowing systems that are now shifthing to digitization.


2017 ◽  
Vol 29 (1) ◽  
pp. 27-41 ◽  
Author(s):  
Waleed Mugahed Al-rahmi ◽  
Akram M. Zeki ◽  
Norma Alias ◽  
Ali Ali Saged

2016 ◽  
Vol 78 (4-3) ◽  
Author(s):  
Lizawati Salahuddin ◽  
Zuraini Ismail ◽  
Wardah Zainal Abidin

The implementation of health information technology (IT) is one of the strategy to improve patient safety due to medical errors. Nevertheless, inappropriate use of health IT may have serious consequences to the quality of care and patient safety. Most of the previous studies have been focused on the sociotechnical factors contributed to health IT related errors. Little focus has been given on the use behavior that influence the safety of health IT adoption. In order to address this gap, this study investigates the use behavior that influence the safety of health IT adoption. Systematic literature review was conducted to identify articles pertinent to safety of health IT. Science Direct, Medline, EMBASE, and CINAHL database were searched for reviews relevance articles. A total of 23 full articles were reviewed to extract use behavior that influence the safety of health IT adoption. Workarounds, adhere to procedure, vigilant action, and copy and paste behavior were discerned as the significance use behavior that influence health IT safety adoption. This study may be of significance in providing useful information on how to safely practice health IT adoption.  


2020 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Caroline de Oliveira Orth ◽  
Antônio Carlos Gastaud Maçada

Purpose This paper aims to investigate how the literature has been addressing the relationships between corporate fraud and executive behavior and corporate fraud and information technology (IT) controls. Design/methodology/approach A systematic literature review was performed following the planning phases proposed by Levy and Ellis (2006), illuminated by the research onion, developed by Saunders et al. (2007). Findings The main findings of the studies analyzed refer basically to models to assess the risk of fraud. These risks originate from the market, from the organization itself or from individuals and also from their relationship networks. Subsequently, the main risks identified by the authors were classified according to their origin, the main theories approached and the “solutions” for the risks presented by the authors as the product of their work. Research limitations/implications It should be noted that this study is not free of limitations, of which two stand out: the full body of articles on the subject was certainly not evaluated. Although the search has been systematic and judicious both by the combination of keywords for the searches, as well as by the use of the main databases and also by the rigor in the description of the procedures and the analysis of the articles in the light of Research Onion was based on the authors’ knowledge that may have been limited in some respect. Practical implications As a practical implication, there is the relationship of red flags and their classification by origin, as they can be very useful for planning the work of internal and external auditors. Social implications It is considered that this work can be a starting point for scholars who are interested in the corporate fraud phenomenon, given that the data was collected and organized systematically. Originality/value The analysis of the articles in relation to Research Onion shed light on the main philosophical and methodological characteristics of the studies. Also, regarding the relationships between corporate fraud and IT controls, existing scientific research appears to be limited. Searches for the terms information technology and information systems were extended, as well as search strings tested with the terms data governance and IT governance without results. This fact demonstrates that there may be (as far as the results have reached) a vast area of research on corporate fraud in the field of systems knowledge and information technology.


Sign in / Sign up

Export Citation Format

Share Document