it department
Recently Published Documents


TOTAL DOCUMENTS

269
(FIVE YEARS 86)

H-INDEX

13
(FIVE YEARS 3)

2022 ◽  
Vol 5 (1) ◽  
pp. 1-5
Author(s):  
Agus Riyan Saputra ◽  
Zakaria Wahab ◽  
Muchsin Saggaf Shihab ◽  
Marlina Widiyanti

This study was conducted to determine service quality and customer satisfaction on the BRImo application on customer loyalty at PT Bank Rakyat Indonesia (Persero), Tbk Sekayu branch office. The population in this study were all customers at PT. Bank Rakyat Indonesia (Persero), Tbk Sekayu Branch Office, as many as 850 customers in the K1 customer category, which focuses on BRImo users in 2020-2021. The sample used in this study was 123 respondents with purposive sampling techniques. The multiple linear regression analysis results show that service quality has a positive and significant effect on customer loyalty. Customer satisfaction has a positive and significant effect on customer loyalty. The results of this study are expected. PT Bank Rakyat Indonesia (Persero), Tbk can improve the application network regularly and provide additional employees in the IT department so that customers can always use the BRImo application at any time. In addition, the increase in the appearance and needs of customers in the BRImo application service can be further improved so that customers can be more efficient in conducting transactions using only smartphones without the need to come directly to the BRI bank.


2022 ◽  
Vol 35 (1) ◽  
pp. 0-0

Value Stream Mapping (VSM) is a useful tool for depicting the flow of materials and information in manufacturing and service processes. It is known as one of the most popular lean methods to identify bottlenecks, reduce cycle time, and improve current processes. Although VSM has been extensively used in manufacturing, there are limited studies that applied VSM in non-manufacturing environments. In this study, we present an application of VSM to improve Software Development Life Cycle (SDLC) process in an IT firm. The current process flows (as-is) are mapped to identify non-value-added activities as well as areas for improvement. Based on the analysis of the current state map, we propose recommendations, action plans, and a future state map (to-be-process). We estimate that, with the new process changes, IT project delivery time can be reduced from 210.5 days to 137.5 days – a 34.7% reduction in the software development life cycle process. This provides a powerful base for IT project management and enables the IT department to meet its expected project turnaround time.


2021 ◽  
Vol 29 (2) ◽  
pp. 52-64
Author(s):  
Bjarne Erik Roscher ◽  
◽  
Volker Nissen ◽  

Companies are more and more dependent on information technology (IT) and the buzzword digitization is present everywhere. Some companies are inventing new business models based on disruptive innovation supported by information technology. Others adapt these business models as followers. All these new business processes and underlying information technology need to be managed, serviced, and supported by IT organizations to ensure business continuity. Traditionally heads of the IT department have been fully responsible for all aspects of IT usage in the company – including IT cost, IT governance, IT & process planning and implementation and IT operation. This results in the fact that there is a need of more intensive business-IT alignment to ensure the adequacy of the overall IT architecture in a company and ensure the economic value contribution of IT as a whole. In the last two decades researchers have investigated the area of CIO effectiveness by doing empirical research looking at IT roles/tasks, interaction and strategic importance of IT, personal background of CIOs. As a side effect some researchers have constructed and used demographic variables both as control and causal variables. This article looks on the comparability and the source of such demographic data especially on the case of Gender information and highest academic title. It also discusses the question if survey results could be compared with representative datasets to evaluate validity of the sample and responses of empirical studies.


ITNOW ◽  
2021 ◽  
Vol 63 (4) ◽  
pp. 29-29
Author(s):  
◽  
James Turing
Keyword(s):  

Abstract For many years, the BCS IT department has been sending old, unwanted and wiped devices to the Turing Trust. We share an update from Founder and CEO James Turing.


2021 ◽  
Author(s):  
◽  
David J Clarke

<p>This research looks at the motivation for using non-sanctioned technologies within a business context; that is, using Information Technology (IT) systems other than those provided (or approved) by the IT department. In this research, the non-sanctioned IT systems of primary interest are the internet based applications, but also includes personally owned hardware devices such as laptops, tablets and smartphones. This qualitative study used the key informant approach to gain an understanding of the subject using a semi-structured interview format. The results show that employees in knowledge based roles are choosing their own technology tools when they believe that they give them better functionality or flexibility over those offered and approved by the traditional IT department. Graduates and other millennial employees are found to be using non-sanctioned systems more frequently than older workers; millennials are also far more likely to use whatever application or device they want, regardless of the source or what corporate IT policies stated. The use of these non-sanctioned technologies should be a source concern to IT management because many of these can circumvent the organisations security and data management governance policies, giving the potential for data loss or unwanted exposure, regulatory compliance failure or have undesirable legal implications. The results also suggest that IT departments do not have the resources to keep up with the rate of change in technology. At the same time, the users of their services are able to obtain technology solutions from a range of other sources. This may mean a change in the role of the IT department as it loses its position as the technology gatekeeper.</p>


2021 ◽  
Author(s):  
◽  
David J Clarke

<p>This research looks at the motivation for using non-sanctioned technologies within a business context; that is, using Information Technology (IT) systems other than those provided (or approved) by the IT department. In this research, the non-sanctioned IT systems of primary interest are the internet based applications, but also includes personally owned hardware devices such as laptops, tablets and smartphones. This qualitative study used the key informant approach to gain an understanding of the subject using a semi-structured interview format. The results show that employees in knowledge based roles are choosing their own technology tools when they believe that they give them better functionality or flexibility over those offered and approved by the traditional IT department. Graduates and other millennial employees are found to be using non-sanctioned systems more frequently than older workers; millennials are also far more likely to use whatever application or device they want, regardless of the source or what corporate IT policies stated. The use of these non-sanctioned technologies should be a source concern to IT management because many of these can circumvent the organisations security and data management governance policies, giving the potential for data loss or unwanted exposure, regulatory compliance failure or have undesirable legal implications. The results also suggest that IT departments do not have the resources to keep up with the rate of change in technology. At the same time, the users of their services are able to obtain technology solutions from a range of other sources. This may mean a change in the role of the IT department as it loses its position as the technology gatekeeper.</p>


2021 ◽  
Vol 2 ◽  
pp. 125-131
Author(s):  
Martin Wallner ◽  
Tomáš Peráček

Data has become one of the most valuable resources for companies. The large data volumes of Big Data projects allow institutions the application of various data analysis methods. Compared to older analysis methods, which mostly have an informative function, predictive and prescriptive analysis methods allow foresight and the prevention of future problems and errors. This paper evaluates the current state of advanced data analysis in Austrian industrial companies. Furthermore, it investigates if the advantages of complex data analyses can be monetarized and if cooperate figures such as the turnover or company size influence the answers of the survey. For that reason, a survey among industrial companies in Austria was performed to assess the usage of complex data analysis methods and Big Data. It is shown that small companies use descriptive and diagnostic analysis methods, while big companies use more advanced analytical methods. Companies with a high turnover are also more likely to perform Big Data projects. On an international comparison for most Austrian industrial companies, Big Data is not the main focus of their IT department. Also, modern data architectures are not as extensively implemented as in other countries of the DACH region. However, there is a clear perception by Austrian industrial companies that forward-looking data analysis methods will be predominant in five years.


2021 ◽  
Vol 23 (4) ◽  
pp. 1-22
Author(s):  
Miguel Eduardo Torres-Moreno ◽  
Jairo Hernán Aponte-Melo

Over the last decades, the role of the IT department within an organization has gradually gained importance. Technology has permeated all areas within organizations and nowadays is the cornerstone of almost all business processes. Thus, business-IT alignment (BITA) is considered an essential success factor for almost any organization. Consequently, the evaluation and improvement of this alignment have been a growing concern among researchers and organizations. This study assessed the BITA maturity in a Colombian university, applying Luftman’s SAM (Strategic Alignment Maturity) model. The conducted assessment collected, analyzed, and contrasted perceptions of business and IT personnel. Similarly, we investigated the personnel’s perceptions at the strategic, functional, and operational levels regarding the SAM factors. Furthermore, we compared our results with other BITA assessments in educational institutions, Latin American organizations, and worldwide results. Finally, we drew some conclusions that can be useful for practitioners who seek to apply Luftman’s assessment.


2021 ◽  
Vol 1 (2) ◽  
pp. 62-74
Author(s):  
Kevin Suwandi ◽  
Johan Setiawan

Objective – To analyze the relationship between a company’s information security approach/culture with its information security governance capabilities based on COBIT 5 framework and provide recommendations that can be used to improve the company's information security capabilities per COBIT 5 standard. Methodology – The research uses qualitative and quantitative methods by conducting interviews and distributing questionnaires to 3 members of the IT Department at PT XYZ. Findings – The research found that the measured COBIT 5 processes (APO13 and DSS05) failed to reach the expected target (level 4), with each DSS05 and APO13 can only reach level 1 and 2 respectively. In addition, several flaws were also found in the company’s information security culturethat may have contributed directly or indirectly to the current state of the company’s information security capabilities. Novelty – In this study, the researchers expand the previous study on information security culture conducted in 2010 by performing a security audit on a company's IT department to analyze the connection between corporate culture, especially information security culture and the capability level of information security governance. The company thus can make improvements or corrections to its information security approach/culture based on the recommendations provided with COBIT 5 framework. Keywords: Capability Level; COBIT; Governance; Information Security Culture. 


Author(s):  
Ignatius Novianto Hariwibowo ◽  
Clara Hetty Primasari ◽  
Chandra Hananto

This study aims to evaluate the alignment of the application of information technology (IT) with the company's business practices. This study uses COBIT 4.1. to assess the maturity of technology adoption and to explore factors that hinder the alignment of IT implementation with the business. The maturity level of technology application describes IT management in the company's overall business activities. The higher the maturity level, the clearer and more structured the role of IT and business will be. This research uses a case study method at PT. SAE (in Central Java Province). The result of this research is that PT. SAE has reached the defined process level. At this stage, the company already has standard IT management procedures, but not all business activities and not yet detailed. This problem is due to lack of strategic support from top management to achieve business goals with the help of IT. Therefore, the company needs to improve the function and role of the head of the IT department at PT. SAE.


Sign in / Sign up

Export Citation Format

Share Document