scholarly journals The Octave Allegro Method in Risk Management Assessment of Educational Institutions

2020 ◽  
Vol 2 (2) ◽  
pp. 167-179
Author(s):  
Jane Hom ◽  
Boonsri Anong ◽  
Kim Beom Rii ◽  
Lee Kyung Choi ◽  
Kenita Zelina

Risk management is useful in overcoming various problems such as not optimal business processes, the company’s reputation down, financial loss, or bankruptcy of a company. In the application of information systems, most organizations or companies have not noticed the importance of information systems security as well as the assets and impacts that arise. For that, the risk management assessment is used in reducing the errors that occur in the information system of the company's business processes. The risk management assessment is applied to the information system along with its assets in evaluating the possibilities of menaces and vulnerabilities. The Risk management assessment analysis is applied to the academic information system in universities. The result of the risk assessment is the results of recommendations on the stages that need to be done in protecting the assets of information systems and information systems themselves.

2014 ◽  
Vol 4 (1) ◽  
Author(s):  
JOŽE ŠREKL ◽  
ANDREJKA PODBREGAR

A company should pay much attention to information systems security. It is necessary to secure the support system of the organization if we want continuity and effectiveness of business. In addition to providing security through technological precautions to prevent intrusion and abuse, it is necessary to pay more attention to the vulnerability and threats caused by the engaged users. Here we refer to unintentional threats, as a result of faulty workmanship or lack of knowledge of the information system. It is important to strive to reduce the possibility of causing the occurrence of incidents which are the result of improper use of information technology, which is due to ignorance. An organization shall consider and identify vulnerabilities of the system and threats to it. We confront the growing amounts of information in electronic form. Ensuring security of information systems (IS) in the workplace involves many steps that a company must adopt and carry out. The vulnerability of the systems is being examined, whereas the form of the new age of terrorism, cyber- terrorism, is being presented. This paper deals with ways of reducing risks and increasing safety and security of IS. It presents possible ways of ensuring the safe use of IS. Key words:Information system, management, safety, security.


Author(s):  
Lani Mufadilah ◽  
Yusuf Amrozi

Zuper futsal field rental is a business entity engaged in the field of rental services that require the existence of an information system. Information systems in a company play an important role in the progress and management of a company as well as in the zuper rental system that is to be able to support and provide satisfactory services to each customer. The system that exists in some futsal fields in general is still simple with menual management, most of the problems that are often encountered are the process of recording data and transactions requiring a long time. The possibility of errors in writing a data and the security of the document is not guaranteed, because many lost documents will make it difficult for you to do a data search or report printing. Designing an application in the form of a program that functions to process and simplify business processes that occur on the Zuper futsal field, starting from the data processing of tenants, leasing transactions, to printing reports are expected to be the best solution to solve problems that exist in a business entity to support efficiency and the effectiveness of working on a field rental


Author(s):  
N. Baisholan ◽  
K.E. Kubayev ◽  
T.S. Baisholanov

Efficiency of business processes in modern organizations depends on the capabilities of applied information technologies. The article describes and analyzes the role and features of audit tools and other methodological tools and models in ensuring the quality and security of information systems. The standard’s principles are reviewed, as well as the importance of meeting business needs. In order to protect virtual values in a company’s system environment, the importance of using information security models is revealed. Practical proposals in risk management and information security in information technology are analyzed through the COBIT standard. Measures for protecting the information system of an organization from accidental, deliberate or fake threats are considered. The possibility of using one of the real information security models by the information recipient or provider in accordance with the requirements of external processes is reported. Furthermore, in connection with increase in the number of attack methods and techniques and development of their new tools and vectors, the need to improve and ways to ensure information security are being considered. The essential tasks of security audit are considered, and the stages of their implementation are described. With regard to security of information systems, an analytical model is proposed for determining vulnerability’s numerical value.


Author(s):  
Susi Susilowati

PT. Medista Utama is a company engaged in the distribution of medical devices. We have implemented an information system in the inventory section that is used to control the movement of products in the company. The system used must be able to manage, convey and maintain information security properly. So it is necessary to carry out an audit that aims to evaluate the information system governance that is running and ensure that the existing procedures support the existing business processes in the company. The audits were conducted following the standards of the COBIT 4.1 Framework for IT governance. This study will focus on the Delivery Service and Support (DSS) domain to analyze several aspects of IT that are currently running in this company, from the level of system security used to the management carried out by the system. In this domain, the research is focused on the DS5, DS10, and DS11 sub-domains. From the research results it is known that DS5 is at the level of 1.3; DS10 and DS11 are at level 2 (Repetitive but Intuitive). The conclusion is the level of capability obtained from the inventory information system of PT. Medista Utama is still below the expected level. And many improvements are needed to maximize the company's performance to achieve the expected Maturity Level value.


2016 ◽  
Vol 7 (1) ◽  
Author(s):  
Ari Tunggul Sri Christanto ◽  
Rachel Kurniawati

Abstract. Atma Jaya Yogyakarta University Library is one of the supporting units in academic activities. Currently the library has been using information systems to improve services to users and increase the effectiveness of business processes, in terms of dealing with the circulation of books. There are facts that the search of library book collection has not been optimal and there has not been a history facility for borrowing books by the users. Those problems can be solved by the use of Service Oriented Architecture (SOA), which integrates web service on android. The results of this study are android-based applications that implement Service Oriented Architecture (SOA) using web services to integrate the academic information system, library information system and employee information system. So that the exchange of data and information can run more easily and quickly.Keywords: Service Oriented Architecture, Android, Web Service, Book Collection, Library  Abstrak. Perpustakaan Universitas Atma Jaya Yogyakarta adalah salah satu unit pendukung dalam kegiatan akademis. Saat ini perpustakaan telah menggunakan sistem informasi untuk meningkatkan layanan kepada pengguna dan meningkatkan efektifitas proses bisnisnya, termasuk dalam hal menangani masalah sirkulasi buku. Namun terdapat permasalahan yaitu belum optimalnya pencarian koleksi buku perpustakaan dan belum ada fasilitas histori peminjaman buku oleh anggota. Permasalahan tersebut dapat diselesaikan dengan penggunaan Service Oriented Architecture, yaitu mengintegrasikan web service pada android. Hasil dari penelitian ini adalah aplikasi berbasis android yang menerapkan Service Oriented Architecture menggunakan web service untuk mengintegrasikan sistem informasi akademik, sistem informasi perpustakaan dan sistem informasi kepegawaian, sehingga pertukaran data dan informasi dapat semakin mudah dan cepat.Kata Kunci: Service Oriented Architecture, Android, Web Service, Koleksi Buku, Perpustakaan


2014 ◽  
Vol 3 (1) ◽  
pp. 336-349
Author(s):  
Bichanga Walter Okibo ◽  
Obara Brigit Ochiche

With the popularity of internet applications, many organizations are facing unprecedented security challenges. Security techniques and management tools have caught a lot of attention from both academia and practitioners. However, there is lacking a theoretical framework for the challenges facing information security management in higher learning institutions. Thus this research looked into the challenges facing information systems security management in higher learning institutions. The study was guided by understanding the major challenges facing Information Systems Security Management and establishing the extent of the use of Information Systems Security Management in higher learning institutions. The study used descriptive survey design. It targeted information systems projects managers, administrators or top management and other users (staff) of the systems in key departments. Systematic sampling strategy was used. Descriptive statistics of SPSS were used to analyze the data. Factor analysis technique was used to identify the major challenges that affect management of an institution’s information system security. Pearson’s Chi-Square was used to test the relationships that exist between the categorical variables. The study found out that system vulnerability, computer crime and abuse, environmental security and financial backing/security are key challenges institutions of higher learning are experiencing in the management of their information systems. The study recommends the implementation of new policies and procedures to guide information system security. Programs for monitoring and evaluating information systems security in relation to performance indicators should be put in place. Institutions should invest heavily in developing their staff through training programmes such as seminars, workshops and conferences to further develop staff skills and abilities on information systems security issues.


Sign in / Sign up

Export Citation Format

Share Document