scholarly journals Maturity Level Analysis of Inventory Information Systems Using COBIT 4.1 Framework at PT. MEDISTA UTAMA

Author(s):  
Susi Susilowati

PT. Medista Utama is a company engaged in the distribution of medical devices. We have implemented an information system in the inventory section that is used to control the movement of products in the company. The system used must be able to manage, convey and maintain information security properly. So it is necessary to carry out an audit that aims to evaluate the information system governance that is running and ensure that the existing procedures support the existing business processes in the company. The audits were conducted following the standards of the COBIT 4.1 Framework for IT governance. This study will focus on the Delivery Service and Support (DSS) domain to analyze several aspects of IT that are currently running in this company, from the level of system security used to the management carried out by the system. In this domain, the research is focused on the DS5, DS10, and DS11 sub-domains. From the research results it is known that DS5 is at the level of 1.3; DS10 and DS11 are at level 2 (Repetitive but Intuitive). The conclusion is the level of capability obtained from the inventory information system of PT. Medista Utama is still below the expected level. And many improvements are needed to maximize the company's performance to achieve the expected Maturity Level value.

Respati ◽  
2020 ◽  
Vol 15 (2) ◽  
pp. 37
Author(s):  
Febrian Destyanto ◽  
Kusrini Kusrini ◽  
Henderi Henderi

INTISARITata kelola sistem informasi menentukan tingkat pencapaian dari tujuan bisnis perusahaan. Semakin baik tata kelola sistem informasi berdampak pada keberhasilan mengelola proses dan tujuan bisnis dalam aspek akuntabilitas, resposibilitas dan transparansi. Model COBIT 4.1 digunakan untuk dapat mengukur tingkat keberhasilan suatu tata kelola sistem informasi sesuai dengan tujuan bisnis perusahaan. penelitian ini dilakukan untuk mengetahui tingkat kematangan tata kelola sistem informasi dari institut teknologi budi utomo dengan menggunakan perspektif internal dengan focus peningkatan dan pemeliharaan fungsionalitas proses bisnis pada model Balanced Scorecard sebagai alat untuk memetakan rencana strategis perusahaan, lalu dilakukan pengukuran tingkat kematangan menggunakan sub domain terpilih pada COBIT 4.1. Dari pemetaan Balanced Scorecard dan COBIT4.1 diperoleh sub domain PO2, PO3, AI2, AI4, dan AI7 yang digunakan untuk mengevaluasi tata kelola sistem informasi pada institut teknologi budi utomo berdasarkan model framework COBIT 4.1. Hasil pengukuran tingkat kematangan sub domain terpilih didapatkan hasil tingkat kematangan level 2 atau proses sudah dilakukan namun belum baku dan terdokumentasi secara terstruktur. Sedangkan tingkat kematangan yang diharapkan berada pada level 3 atau proses sudah terdefinisi baku dan terdokumentasi dengan struktur yang jelas dan baik. Hasil akhir dari penelitian berupa rekomendasi perbaikan untuk menuju tingkat kematangan yang diharapkan. Kata Kunci : Tingkat Kematangan, Balanced Scorecard (BSC), Perspektif Internal, COBIT 4.1, Tata Kelola Sistem Informasi ABSTRACTInformation system governance determines the level of achievement of the company's business goals. The better governance of information systems affects the success of managing business processes and objectives in aspects of accountability, resposibility and approval. The COBIT 4.1 model is used to measure the success of an information system governance in accordance with the company's business goals. This research was conducted to study the maturity level of information systems governance Institut Teknologi Budi Utomo using an internal perspective with a focus on improving and maintaining business process functionality in the Balanced Scorecard model as a tool to map out the company's strategic plan, then measuring the maturity level using sub domains obtained in COBIT 4.1. From the mapping of the Balanced Scorecard and COBIT4.1, PO2, PO3, AI2, AI4, and AI7 sub-domains are used to collect information systems governance at the utmost Budi technology institution based on the framework of the COBIT 4.1 model. The results of the measurement of the level of maturity of the sub domain are taken the level 2 maturity level results or the process has been carried out but not yet standardized and structured documented. While the expected level of maturity at level 3 or process is standard and documented with a clear and good structure. The final results of the study consisted of improvements to achieve the expected level of maturity. Keywords: Maturity Level, Balanced Scorecard (BSC), Internal Perspective, COBIT 4.1, Information System Governance


2019 ◽  
Vol 5 (2) ◽  
pp. 109-115
Author(s):  
Johanes Fernandes Andry ◽  
Gunawan Wang ◽  
Gusti Ngurah Suryantara ◽  
Devi Yurisca Bernanda

PT Hema Indonesia is manufacturing company established in 2001 and has continued to grow. Nowadays the company has supported business processes in various companies, such as the use of information systems. The purpose of this research is to get an overview of the performance of information systems in order to determine the extent of maturity level which is currently running, with a few aspects to consider such as effectiveness and, efficiency. Implementing IT governance, however, is a challenge to organizations. To ensure IT alignment with business goals use standard COBIT. The analytical tool used is the standard procedure COBIT issued by ISACA. In this paper the method to be used is COBIT 4.1. Coverage of Audit IT Domain are Plan Organize (PO), such as PO4, PO5, PO7 and PO8. The conclusion that can be drawn from the research that has been done is IT governance at the company has been done, although still run optimally within each IT process contained in the sub domain average on level repeatable and defined proses.


Author(s):  
Петр Юрьевич Филяк ◽  
Максим Константинович Постников ◽  
Семен Евгеньевич Федоров ◽  
Александр Григорьевич Остапенко ◽  
Андрей Петрович Преображенский

В условиях развития информационного общества (Knowledgeable society - KS) информационные системы стали неотъемлемой частью любой организации, даже самой малой, независимо от реализуемых ими бизнес-процессов. Такие информационные системы принято называть корпоративными информационными системами (КИС), или Corporate Information System (CIS). Особые требования при разработке КИС предъявляются к обеспечению их информационной безопасности, что может быть реализовано путем разработки КИС в защищенном исполнении. Технологии blockchain являются очень перспективными не только при применении их в традиционных сферах - производстве, сервисе, на транспорте, но и для решения проблем безопасности и информационной, в частности. Анализу данной проблемы и подходам к ее решению и посвящена данная статья. At present, in the context of the development of Knowledgeable society, information systems are at now an integral part of any organization, even the smallest, regardless of the business processes they implement. Such information systems are commonly referred to as Corporate Information Systems (CIS). Special requirements for the development of CIS are made to ensure their information security, which can be achieved by developing a protected version of the CIS. In this article is considered the analysis of this problem and approaches to its solution. Block Chain technologies are very promising not only when applying them in traditional spheres - manufacturing, service, transport, but also to solve security and information problems, in particular.


Author(s):  
Lani Mufadilah ◽  
Yusuf Amrozi

Zuper futsal field rental is a business entity engaged in the field of rental services that require the existence of an information system. Information systems in a company play an important role in the progress and management of a company as well as in the zuper rental system that is to be able to support and provide satisfactory services to each customer. The system that exists in some futsal fields in general is still simple with menual management, most of the problems that are often encountered are the process of recording data and transactions requiring a long time. The possibility of errors in writing a data and the security of the document is not guaranteed, because many lost documents will make it difficult for you to do a data search or report printing. Designing an application in the form of a program that functions to process and simplify business processes that occur on the Zuper futsal field, starting from the data processing of tenants, leasing transactions, to printing reports are expected to be the best solution to solve problems that exist in a business entity to support efficiency and the effectiveness of working on a field rental


Author(s):  
N. Baisholan ◽  
K.E. Kubayev ◽  
T.S. Baisholanov

Efficiency of business processes in modern organizations depends on the capabilities of applied information technologies. The article describes and analyzes the role and features of audit tools and other methodological tools and models in ensuring the quality and security of information systems. The standard’s principles are reviewed, as well as the importance of meeting business needs. In order to protect virtual values in a company’s system environment, the importance of using information security models is revealed. Practical proposals in risk management and information security in information technology are analyzed through the COBIT standard. Measures for protecting the information system of an organization from accidental, deliberate or fake threats are considered. The possibility of using one of the real information security models by the information recipient or provider in accordance with the requirements of external processes is reported. Furthermore, in connection with increase in the number of attack methods and techniques and development of their new tools and vectors, the need to improve and ways to ensure information security are being considered. The essential tasks of security audit are considered, and the stages of their implementation are described. With regard to security of information systems, an analytical model is proposed for determining vulnerability’s numerical value.


Author(s):  
Endang Kurniawan ◽  
Imam Riadi

  The objective of this research is to find out the level of information security in the academic information system to give recommendations improvements in information security management. The method used is qualitative research method, which data obtained based on the results of questionnaires distributed to respondents with the Guttmann scale. Based on the analysis results, 13 objective controls and 43 security controls were scattered in 3 clauses. From the analysis, it was concluded that the maturity level of information system security governance was 2.51, which means the level of maturity is still at level 2 but is approaching level 3 well defined.


2020 ◽  
Author(s):  
cici cahyanti

AbstractBCA is a national bank established in 1957 and has continued to grow. Nowadays the bank has supported business processes in various companies, such as the use of attendance information systems. During this system implementation, it has been running to support the procedures of attendance activities. The purpose of this research is to get an overview of the performance of information technology governance in order to determine the extent of maturity level which is currently running, with a few aspects to consider such as effectiveness and, efficiency. The conclusion that can be drawn from the research that has been done is IT governance at the BCA has been done, although still run optimally within each IT process contained in the sub domain Monitor Evaluate Assess (MEA) on average was at 3.0 (defined process) for sub domain DS1, DS5, DS10 and ME2.Keywords— Audit SI, Absensi, BCA, COBIT 4


Author(s):  
Hendra Alianto

Technological development that grows so rapidly and the mounting business competition force a company uses technology that can support the work activities quickly and precisely. At this time, the business processes run by XYZ Company is still done manually which hamper the running business processes. This research aims to analyze the company's current business processes, provide functional recommendations, and design an information system for sales, inventory, and purchasing goods that can support the company's operations. The research uses several methods such as literature study, analysis and design of information systems. The study produces an information system for sales, inventory, and purchases which is able to facilitate the transaction recording, up-to-date, and reliable. The results prove that the new system is able to help the company's performance in running several activities in sales, inventory records, and purchase monitoring to support business processes running more quickly and precisely. 


2021 ◽  
pp. 18-22
Author(s):  
Natalia Golovacheva ◽  

With the advent of information technologies, information systems have been widely used in organizations and enterprises. The use of information systems allows optimizing the workforce, automating all or part of business processes. However, the use of information systems requires the development of an information security system to minimize malicious attacks. To reduce the likelihood of malicious attacks, there are a large number of software and hardware-based information security tools. The complexity of computing the distribution of the components of information systems complicates the process of creating and configuring protection systems, the number of threats to security are increasing every year. For a timely response to information security incidents, including attacks, it is necessary to use information system security assessment tools to reduce the risks of security breaches. InfoWath statistics show the growth trend of various types of attacks, both from an external attacker and from an internal one. Therefore, one of the most important tasks is to correctly determine the security of information systems. The paper implements a mathematical model for assessing the security of an information system based on the selected methods. The architecture of the software package for assessing the security of the information system is formed.


2018 ◽  
Vol 1 (2) ◽  
pp. 1-17
Author(s):  
Soni Ayi Purnama

Utilization of information systems and information technology is needed in supporting business processes of a company, because the information system is one of the important things in the key to success of a company. Along with the development of information systems have an information system architecture model, where the information system architecture is necessary to plan the information system architecture to be built in the future, where the information system architecture as a spear to improve the competitiveness of a company with other companies.             PT. Ma'soem Arias is one of Pertamina lubricant distributor in West Java. The business activities carried out are to sell Pertamina lubricants to direct customers and direct lubricant procurement from Pertamina's producers. PT. Ma'soem Arias until now in carrying out its business process has not used the information system so needed an Enterprise Architecture planning for PT. Ma'soem Arias.Enterprise architecture model used in this research is by using Oracle Enterprise Architecture Framework (OEAF) model. The advantages of OEAF is to use object oriented concept, where the concept approaches the problem from the perspective of the object and not the perspective of the functional so it is easy to be understood. The method used is Oracle Architecture Development Process (OADP) method, where OADP method has several stages, ie from start of study about business architecture, architecture vision, current state architecture and future state architecture.The result of this research is recommendation of information system of PT. Ma'soem Arias is a blueprint for enterprise architecture planning that succeeds in defining 4 main business processes, the data architecture produces 24 entities, 4 applications and for its technological architecture produces technology architecture proposal.


Sign in / Sign up

Export Citation Format

Share Document