scholarly journals Manajemen Risiko Sistem Informasi Perpustakaan (Studi Kasus di Perpustakaan Universitas Gadjah Mada)

2016 ◽  
Vol 10 (2) ◽  
pp. 1
Author(s):  
Arif Nurochman

Library information systems and information assets administered to users become the backbone of library service with the support of information technology. Howevet the application of library information systems that grows rapidly may raise the riskthat causesfailures threatening librarians in assessing sources of risk threats. Risks may include events and conditions that lead to disruption in information services and the problem of the decision-making process evaluation although not documented in writing. Informants of this study consist of librarians who have social interaction with library information system. The method uses qualitative case study approach with in-depth interviews and direct observation.The results ofthe study identifies the riskin a hang of backup server is high, iThe purpose of this study is to describe the implementation of risk management in information systems at Gadjah Mada University Library using NISTSP 800-30 frame work and to determine factors that affect the implementation of risk management in information systems at the library. Risk management in information systems at Gadjah Mada University Library has been implemented to anticipate the various sources of risk threats by conducting risk assessment, risk mitigation and risk electricity is high, in security systems is high, in passwords is high, in authorization permission is moderate and in human resources is moderate. To reduce and eliminate the risk impact, Gadjah Mada University Library conducts risk mitigation by transferring the risk from a library information systemservers to PSDI (Center for Systems and Information Resources), while the risk evaluation of the activities is carried out continuously and consistently by the librarians to implement control and activities in risk mitigation to the extent acceptable to the library. Factors affectiig the implementation of risk management information systems at the Gadjah Mada University Library are influenced by the policies of the University, the perception of the library's head and human resources and technicalcapabilities in the fi eld of information technology.

2020 ◽  
Vol 7 (1) ◽  
pp. 34
Author(s):  
Muhammad Bayu Nugraha ◽  
Gyansar Pralebda ◽  
Renny Sari Dewi

The implementation of Information Systems (SI) and Information Technology (IT) has the aim that the performance of the University is fully effective and efficient. Information System Strategic Planning carried out by the implementation of SI and IT can provide results that are appropriate and meet the targets of XYZ University, a University that requires the effective application of IS / IT in order to improve efficiency and Human Resources that produce at XYZ University in full. By carrying out Information Systems Strategic Planning using Ward and Peppard methods can provide the results of an effective Strategic Information System Planning (ISSP) to assist the performance process at XYZ University


2020 ◽  
Vol 6 (7) ◽  
pp. 1317
Author(s):  
Yanuar Dharma Putra ◽  
Imron Mawardi

The results of this research are risk mitigation measures in the continuity of internal processes, human resources, technology and information. Risk mitigation on the internal processes is done by performing supervision based on employees job description, and implementation of sharia financing agreements with customers. Risk mitigation on human resources is done by providing moral guidance to employees. Risk mitigation in information technology is carried out by performing regular maintenance of computer software and hardware, as well as other devices that support Baitul Maal wa tamwil Sri Sejahtera business activities.


2021 ◽  
Vol 4 (2) ◽  
pp. 95-116
Author(s):  
Fauzan Effendi ◽  
Vince Ratnawati ◽  
Yesi Mutia Basri

The research aimed to analyze the suitability of local tax target setting with real potential, analyze strategies and factors that influence the optimization of the advertisement tax performance, swallow's nest tax, groundwater tax, and Non-Metal Mineral Tax in Pekanbaru City. The object of this study is the Pekanbaru City Regional Revenue Agency and four objects/subjects of local taxes studied in Pekanbaru City. The method used is qualitative with a case study approach. This research shows that the target setting of Advertising Tax, Swallow's Nest Tax, Groundwater Tax, and Non-Metal Mineral and Rock Tax has not been adjusted to the real potential. The performance reports of each Regional Tax studied were inadequate in relation to the strategies implemented, which made it difficult for the Regional Revenue Agency to make effective and efficient decisions. The factors that influence tax optimization are the inadequate organizational structure, updating of the taxation database, human resources, the use of information technology, strengthening regulations, and supporting infrastructure.Keywords: Local Tax; Target; Strategy; Constraints. AbstrakPenelitian bertujuan untuk menganalisis kesesuaian penetapan target pajak daerah dengan potensi ril, menganalisis strategi dan faktor-faktor yang mempengaruhi optimalisasi kinerja Pajak Reklame, Pajak Sarang Burung Walet, Pajak Air Tanah; dan Pajak  Mineral Bukan Logam di Kota Pekanbaru. Objek Penelitian ini adalah Aparatur Badan Pendapatan Daerah Kota Pekanbaru dan 4 objek/ Subjek pajak daerah yang diteliti di Kota Pekanbaru. Metode yang digunakan adalah kualitatif dengan pendekatan studi kasus. Penelitian ini menunjukkan bahwa penetapan target Pajak Reklame, Pajak Sarang Burung Walet, Pajak Air Tanah; dan Pajak  Mineral Bukan Logam dan batuan belum disesuaikan dengan potensi ril. Laporan kinerja masing-masing Pajak Daerah yang diteliti belum memadai terkait strategi yang telah dilakukan sehingga menyulitkan Badan Pendapatan Daerah dalam pengambilan keputusan yang efektif dan efisien. Faktor-faktor yang mempengaruhi optimalisasi pajak tersebut adalah belum memadainya struktur organisasi, pemutakhiran data base perpajakan, kondisi Sumber Daya Manusia, pemanfaatan teknologi informasi, Penguatan Regulasi dan sarana prasarana pendukung.Kata Kunci: Pajak Daerah; Target; Strategi; Kendala.  


The value of human resources in every commercial and industrial sector cannot be over-emphasized. Even in the age of automation, management of human resources has never been more significant or relevant. Information technology can help in management of human resources such that companies can make optimum utilization of skills and experience while keeping costs low. In this chapter, the authors touch upon the various aspects of human resource information systems and the usefulness of such in managing human relations across all levels of employment.


2011 ◽  
Vol 12 (1) ◽  
pp. 115-125 ◽  
Author(s):  
Sam Lubbe ◽  
Osden Jokonya

The relationship between Information Technology (IT) Governance, Risk Management and Compliance (GRC) and organisation business values continues to interest academics and practitioners (IT Governance Institute, 2003). Like governance, risk management and compliance generally, IT GRC is about the decision rights and accountabilities that encourage desirable behaviour in the use of IT (IT Governance Institute, 2003). A case study approach was used in an organisation with many business units. The organisation selected is a mining company, RioZim, situated in Zimbabwe. Data was collected from business units on IT issues and business values. The interviews centred on the IT GRC practices based on responsibility and authority for IT decision making. The results suggest that IT GRC does not adequately support business values. The study revealed that business values should drive IT GRC and IT GRC should be the responsibility of executives and all business units.


Author(s):  
N. Baisholan ◽  
K.E. Kubayev ◽  
T.S. Baisholanov

Efficiency of business processes in modern organizations depends on the capabilities of applied information technologies. The article describes and analyzes the role and features of audit tools and other methodological tools and models in ensuring the quality and security of information systems. The standard’s principles are reviewed, as well as the importance of meeting business needs. In order to protect virtual values in a company’s system environment, the importance of using information security models is revealed. Practical proposals in risk management and information security in information technology are analyzed through the COBIT standard. Measures for protecting the information system of an organization from accidental, deliberate or fake threats are considered. The possibility of using one of the real information security models by the information recipient or provider in accordance with the requirements of external processes is reported. Furthermore, in connection with increase in the number of attack methods and techniques and development of their new tools and vectors, the need to improve and ways to ensure information security are being considered. The essential tasks of security audit are considered, and the stages of their implementation are described. With regard to security of information systems, an analytical model is proposed for determining vulnerability’s numerical value.


Author(s):  
Rudy M Harahap ◽  
Andri Setiawan ◽  
Adi Subakti Kurniawan ◽  
Merlin Mulia

The success rate of information technology (IT) projects is still low. Based on one survey done in 1990s, only about 10% of software development project could be finished according to its planned budget and schedule. Another study in 1995 found that only 16.2% IT project succeed, and at the same time more than 31% IT projects were cancelled before finished. It has been found a lot of IT projects had been implemented with swelling budget. Although it is still debatable, one of the reasons of IT project implementation failure is because risk management in some IT projects is not implemented by the IT providers. The objectives of this research are to get knowledge and assess risks in implementing IT projects. This research also gives recommendations in mitigating IT project risks. In two projects that were used as sample of this research, it has been found some risks that could be happened in IT projects. That risks were then assessed based on the probability and its impact, and finally produced the recommendation for risk mitigation. All risks are described in the Risk Priority, moreover risk probability and impact is described in the probability-impact matrix from all of 4 levels. This research could improve the awareness of IT providers in Indonesia about the important of implementing IT risk management so that more IT projects in Indonesia could be run successfully.Keywords: Risk assessment, information technology project, impact, frequency


Author(s):  
Margaret Gakenia Kinyua ◽  
Fredrick Warui

Profitability is a key aspect of organization financial performance. Kenya SACCOs have been rated fastest growing SACCOs in Africa. However, this growth is largely attributed to growth in membership and penetration. On the other hand the sub sector has recorded irregular trend on the profitability over the last half a decade. Though past literature has tried to link financial risk management to profitability levels, a range of knowledge gaps remain undressed. The current study therefore sought to establish the effect of financial risk management on profitability targeting deposit-taking SACCOs in Nyeri County. To address this objective, the study targeted the following specific objectives; to examine the effect of credit mitigation, liquidity risk controls operational risk mitigation and finally compliance risk mitigation on profitability of deposit taking SACCOs in Nyeri County. Descriptive study design adopted targeting a population of 8 deposit-taking SACCOs. A census study approach was used to subject all the SACCOs to study. The respondents comprised of deposit taking SACCO managers or operational manager. Thus, in total, the study targeted 8 respondents from the management of the SACCOs. Questionnaires were adopted as a tool for data collection. The researcher administered questionnaires to the respondents by dropping to the respondent office and collected at convenient date agreed by both parties. Before undertaking the study, the researcher conducted a reliability test to assess the consistency of the tool using Cronbach’s Alpha. The study used descriptive and inferential statistic in summarizing the data. Under descriptive statistics, the researcher used mean and standard deviation. To test the significance of study variables, the researcher used Pearson correlation and simple linear regressions. The researcher adhered to research ethic during data collection period. The study findings are presented in charts and tables. The study found compliance risk control; liquidity risk control and operational risk control had significant effect on the performance of Saccos in Nyeri while credit risk control was found insignificant in predicting performance of Saccos in Nyeri County. The study recommends Saccos to intensify the compliance risk control, liquidity risk control and the operational risk control practices in enhancement of Sacco’s performance.  


2017 ◽  
Vol 6 (2) ◽  
pp. 33
Author(s):  
Arliyana Arliyana ◽  
Hafiz Riyadli

The role of information systems and information technology is indispensable in a variety of fields of work and human resources required to have good quality so it could use the technology appropriately. The library is space that contained a lot of catalogs needed for learning and teachingas media seek knowledge and insight for students and lecturer, then the required information system that can hold all the information about then added data quickly and accurately. Therefore, the library shoidbeable to capitaliz on the presence of information technology to improve the quality of its services. It takes a strategic planning of information systems/information technology that isusedas the basis for the construction of an idea information system and in accordance with user needs.Strategic planning of information systems at the Library STMIK Palangka Raya using the methodology Wardand Peppard (Ward, 2002). With the strategic planning of the library can analyze and evaluate theexisting potential of the entire surroundings of the library in order to develop them selves in accordance with the progress of informationand communication technology as well as libraries have a guide in theform of strategies that should be run in the field of informationtechnolog y to improve its performance.It has a good performance of the library will be able to provide acompetitive advantage for the Organization so that it can continue tocompete in today's global era.


Sign in / Sign up

Export Citation Format

Share Document