7 7 # " & " % %" 8 # 7 # . & # " # . " & % & "
." 9 # & 7 :" " " # " # . " & % & " " " , 8 "& " &
" 8" # 8 7 & & " & ! ## & "% ##"&" & # & " " # " # . " & 8" "
"; " " " # " " :" " & #" " " % " :" " & " C 5D
: #" # " & 8 ." % # 7 & & 7 :" " . " " " , " , +
-# & . " / ?/ "% %"& 77 @
II. 3 , 2 + , $3 1 /
A.
+ " "; " "## 7 # " # "## 7 7 . & .. #
9 ?#" &" @ " " " # " " # & & .7 ): 7 & #
"; " G " # . " .I . . .7 " "#"& % # & CBD C (D " " 7 "
".7 " % 7" &" : & . : " #" . C D 3 J : ? BBB@
# . " . " " " 7 & # & & " % " %" & ." "# & .7 .
# . " " " " 8 "; " : & " % ## & "% &
##"&" C 5D B. ! "
# . " & $ % & " ? $ @ ? 5@ #" $ % & K" " 7 ":" " #
: # " & 9 & "% . . " " 7 # 7 " % & & " #
"7 "; " & 7 & "; " L " 9
"; " L " :> & "% KC (D % & " & # " "7 7 & . & " .
% 7 " & & & : & " % :> & "% #
7 " " # 7 & ". " % "; " 8 " : &" " 4 7 &
&" 8" " % . C -D
$ #" % & # 7 & ## & "% ##"&" # : "
"; " & " % " " " 7 # 7 " % & & " # "7
"; " & 7 & "; " G " 9 "; " G
" :> & "% / #" % & : # . 8 4 77 ## & "% ##"&"
. . # " # . " & ? 7 7 # " " # . " @ # &" " & " % . # & 7
:> & "% # & " . . . . # 7 # . & " 4 &
&" 8" 77 7 " & C D $ % & 8 . > 7"& !
. % & ?E " " " F@ 77 ) " % & ?E " " " F@ # & # " 7 7
" , + - # . 8 4 8 " & % : % & . . # C D
C. #$ %
IV.3 12 / 2N
" " , ? " # & ,@ " : " & .7 : " " & 97 " &
"% " " # . " & " 7 # " %"& # . & .7 " " " # . .
. " . : " " 7 " :" " && # & .7 " 7 %" " " " 77 :
" . 8 "& & " # 7 # " " 8 % & " " #" : # # & # & 7 " # .
& " 8 . " " 8 7 8 : # " " 7 : "& " ) " " , 7 %" & " / ,
8 4 # 4 / : 77 "& " 0 :" / % 7. " "; " J : / " = .."
, .7 " "% : " O %"& . & 7 # " . & 77
8 % # # &" " " : 7 # " " & , & 7 8" "; " , :
= 7 %" " " & "#"& " & , 0"& # ," & & + " 7 & " , #" & "
H " " :." # " 7 & ## , . 4 & " "
7 & #"9 & : 8 " " . . ". J #"9 & " 8" "%
:> & " " " # " # " " 8" "% & "#"& " # 7 & " " &
"% " % "& # . #" & ## , #" & # & " # " 7 & & " 5 + " 7 & " " "
,
" 5 + " = & " " " ,
" & 7 8" ; & 8" , + # . 8 4 77 & 8" ; .
%" . && 8" " 7 . , # . .7 H "7. 7 "& & " " &
C 5D C (D
/ 0 7 "
" 8" ; "% 7 " %"& & . 7 8" 7 & & "7 " " & )
" 9 & & "%" " 7 " 7 & H " "% " & %"&
" & " 9 & " # 7 ) #" 7 " 7 & H " . " " & "%" " 97 &
7 & & 7 :" " . # / . 7 " " % ( 7 "& : 7 & C D . " :
. " : = & , 7 :" " / . " / 0 7 "
/ / ( 0 & " "
" 8" ; & " & " "& : " 7 " . " " % " :" " # " # . "
% && 7 : 7 " " % # " "#"& " 7 " 8" 7 & & "7 " " : "
. " " 7 : : " 7 " &" " 7 " " & " 7 " #
& " "& : " 7 & H " %"& . " " % " :" " # " # . " % && 7 :
7 " 97 & 7 & & 7 :" " . # / ( 0 & " " " % ( 7 "& : 7 & . "
: . " : - = & , 7 :" " / . " / ( 0 , " "
, & % / ( : " % - 0 = &
: - = & , 7 :" " / . " / ( 0 & " "
& &&
& '''' ()()()()
/ ( / #" : " & " " 7 "&
:> & "% & 7 5 (
/ ( 0 " " & " " 5 (
/ ( 5 / % 7 ".7 . : "
& " " 7 5 (
/ ( ( 9 &" %" 8 +,= (
/ ( - 3 %" 8 . " " ".7 %
& " " 7 (
/ ( , & & " " 7 " " (
/ ( 0 : &4 7 . 5 (
/ ( * , & 7 ) .7 " %" 8 (
/ - 0 & " %"&
" 8" ; ." "."; : " ".7 & # 7 " " # . " & " % :" " "
" &" 8" 7 & & "7 " " 7 & 7 " " # . " . " " % # " # . " & " " 4
&& 7 : 7 " " && & 8" & " 7 "& : " . " " " # . " & "
&& 7 "%" 7 # . & " . " " 97 & 7 & & 7 :" " . # / - . & " %"&
" % ( = "& : 7 & . " : . " : = & , 7 :" " / . " / - 0
& " %"&
, & % / - : " % 0 = &
: = & , 7 :" " / . " / ( 0 & " %"&
& ' & ' & '
& ' ()()()()
/ - = & " . 8 5 (
/ - 0 8 4 & & "%"
& " 5 (
/ - 5 0 7 " & " 5 (
/ - ( 0 " " "&
&& 5 (
/ - - 0 7 "& && 5 (
/ - 0 " "% & .
7 %"& (
/ - 0 " " # & # & " )
/ 0 : " 7 & &
" 8" ; . " " " # . " " " & " # " # . " 8" "
: " 7 & " 7 " & 8" 7 & & "7 " " #" . " " 77 7 " : "
7 & & " # . " 7 & : " ) & : " 7 &
" #" % " # . " & H " . "# % " # . " & H " . .
7 H & " # . " " # . " 7 & " " # H " .
97 & 7 & & 7 :" " . # / . : " 7 & & " % ( = "& : 7 & .
" : . " : = & , 7 :" " / . " / - 0 + " = & ,
, & % / - : " % 0 = &
: = & , 7 :" " / . " / 0 : " 7 & &
& ' & ' & '
& ' ()()()()
/
" & & "%" " .: "
: " 7 & 8" 7 "
:> & "%
(
/ , 7 & " # " # . " (
/ 5 0 7 ":" " " &&
7 "%" % # " (
/ ( 0 9& 7 " 5 (
/ - & :" " # " # . "
% && :" " " (
/ & " # . " (
" ( : * 8 9 2 % = & , 7 :" " . " / "% %"& 77
: * 9 2 % = & , 7 :" " . " / "% %"& 77
% / . "
% / . "
% / . "
% / . " ,,,, 97 &97 &97 &97 & 7 ".";7 ".";7 ".";7 ".";
/ * (
-/ 5 (
-/ 5 ( (
-/ ( - (
-/ - (
-/ (
-, & % . " / 0 7 " " & / P / P / 5 P / ( P
/ - "%" : . " Q ?5 P 5 P P 5 P 5@ < - Q * . & & " " # . " / 0
%"& H " &" / 5 0 = : . / ( 0 & " " / - 0 & " %"&
/ 0 : " 7 & & ? : * 9 2 % = & , 7 :" " . " / "% %"&
77 @ . : * 8 & 7"& # . 0"& # 9& " & ? #" 5@
V. , ,21
[1] F.H. Fadzil, H. Haron and M. Jantan, "Internal auditing practices and internal control System,” Managerial Auditing Journal, vol. 20, no 8, pp. 844-866, 2005.
[2] J. O. Polo and D. Oima, “Effect of Computerised Accounting Systems on Audit Risk Management in Public Enterprises: A Case of Kisumu County, Kenya,” International Journal of Education and Research, vol. 1, no. 5, pp. 1-10, 2013.
[3] A. Latif and N. Hanifi, “Analyzing IT Function Using COBIT 4.1 A Case Study of Malaysian Private University,” Journal of Economics, Business and Management, vol. 1, no. 4, pp. 406-408, 2013.
[4] W. V. Grembergen and S. D. Haes, “Enterprise Governance of Information Technology: Achieving Strategic Alignment and Value,” Springer, New York, 2009.
[5] R. A. Khther and M. Othman, “Cobit Framework as a Guideline of Effective IT Governance in Higher Education : A Review,” International Journal of Information Technology Convergence and Services, vol. 3, no. 1, pp. 21-29, 2013.
[6] D. Lacković, “Model for IT Governance Assessment in Banks Based on Integration of Control Function,” International Conference Active Citizenship by Management, Knowledge Management & Innovation, pp. 439-444, 2013.
[7] N. Rezaei, “The Evaluation of Implementing IT Governance Controls,” Journal of Applied Business and Finance Researches, vol. 2, Issue 3, pp. 82-89, 2013.
[8] S. D. Haes and W. V. Grembergen, “IT Governance and Its Mechanisms,” Information Systems Audit and Control Association. Available : www.isaca.org, 2004.
[9] J. A. Hall, “Information Technology Auditing and Assurance,” Third Edition, South-Western, Cengage Learning, 2011.
[10] D. D. Jacobson, “Revisiting IT Governance in the Light of Institutional Theory, In System Sciences,” 42nd Hawaii International Conference on IEEE, pp. 1-9, 2009.
[11] C. Meriyem, S. Adil and M. Hicham, “IT Governance Ontology Building Process : Example of developing Audit Ontology,” International Journal of Computer Techniques, vol. 2, Issue 1, pp. 134-141, 2015.
[12] H. A. Khaddash, R. A. Nawas and A. Ramadan,” Factors affecting the quality of Auditing: The Case of Jordanian Commercial Banks,” International Journal of Business and Social Science, vol. 4, no. 11, pp. 206-222, 2013.
[13] E. Maria and E. Haryani, “Audit Model Development of Academic Information System : Case Study on Academic Information System of Satya Wacana,” International Refereed Research Journal, vol. II, Issue 2, pp. 12-24, 2011.
[14] I. M. A. Zwyalif, “IT Governance and its Impact on the Usefulness of Accounting Information Reported in Financial Statements,” International Journal of Business and Social Science, vol. 4, no. 2, pp. 83-94, 2013.
[15] T. Sethibe, J. Campbell and C. McDonald, “IT Governance in Public and Private Sector Organisations: Examining the Differences and Defining Future Research Directions,” 18th Australasian Conference on Information Systems, pp. 833-843, 2007.
[16] K. Doughty, “IT Governance: Pass or Fail?,” Information Systems Control Journal 3, 2005.
[17] S. Khanyile and H. Abdullah, “COBIT 5: an evolutionary framework and only framework to address the governance and management of enterprise IT,” UNISA.
[18] ITGI: COBIT Mapping: Mapping ISO/IEC 17799:2005 with COBIT 4.0, p. 6, 2006. [19] ITGI: COBIT 4.1 Excerpt, p. 9, 2007.
[20] A. Pasquini, “COBIT 5 and the Process Capability Model. Improvements Provided for IT Governance Process,” Proceedings of FIKUSZ ’13 Symposium for Young Researchers, Published by Óbuda University, pp. 67-76, 2013.
[21] A. Amid and S. Moradi, ”A Hybrid Evaluation Framework of CMM and COBIT for Improving the Software Development Quality,” Journal of Software Engineering and Applications, pp. 280-288, 2013.
[22] ISACA: COBIT Five: A Business Framework for the Governance and Management of Enterprise IT, 2012.
[23] J. F. Andry, “Audit Tata Kelola TI Menggunakan Kerangka Kerja Cobit Pada Domain DS dan ME di Perusahaan Kreavi Informatika Solusindo,” Seminar Nasional Teknologi Informasi dan Komunikasi, pp. 287-294, 2016.