ICMST 2019 August, 1 2019
ANALYSIS AND DESIGN OF INFORMATION TECHNOLOGY GOVERNANCE
Table 2. Domain AI
Code Process
AI1 Identification of automatic solution AI2 Obtain and maintain application
software
AI3 Obtain and maintain technology infrastructure
AI4 Enables work and uses it AI5 Obtain IT resources AI6 Manage changes
AI7 Install and accreditation and change solutions
In Deliver and Support (DS) domain there are 13 process, can be seen in table 3:
Table 3. Domain DS
Code Process
DS1 Define and manage service levels DS2 Manage third party services DS3 Manage performance and capacity DS4 Manage service continuity
DS5 Ensuring system security DS6 Identify and allocate costs DS7 Educate and train users
DS8 Managing service desk and incident DS9 Manage configuration
DS10 Manage problems DS11 Manage data
DS12 Manage the physical environment DS13 Manage operations
In Monitor and Evaluate (ME) domain there are 4 process, can be seen in table 4:
Table 4. Domain ME
Code Process
ME1 Monitoring and evaluating IT performance
ME2 Internal control monitoring and evaluation
ME3 Ensuring compliance with external needs
ME4 Providing information technology governance
There are several research from previous researchers who became reference in this study to make Information Technology (IT) Governance document, research The Indonesian Ministry of Health's Pusdiklat apparatus currently implements IT governance using COBIT 4.1 as its guideline (Kristiana, 2016). For research in university there is COBIT 4.1 framework as one of the references for analyzing the conditions of IT governance, especially PO and AI domains conducted at the Lombok School of Information and Computer Management with the COBIT 4.1 framework and has provided recommendations for improvements to IT governance (Ashari, 2015).
Domain DS1 usage as a self-assessment of the customer scope, providing recommendations for improving IT governance. Between IT governance and IT master planning are interconnected, because IT parent planning can be a guide and direct IT planning and implementation to be aligned with the strategies and objectives of the university (Sadikin, Hardi and Haji, 2014). And also COBIT 4.1 especially DS1 domain can be use for manage the service in system, The application of IT governance uses deliver and support (DS) as one of the domains for IT management to be better in the future (Hanum, no date). (Lesmono and Erica, 2018) said in their paper that,The research was conducted at PT. IMI which provides recommendations for IT governance in managing IT more intensively by using Domain DS1 as a reference to see the level of maturity. The conclusion is COBIT 4.1 especially DS1 domain can e used in every instantion like university.
2. BASIC THEORY AND METHODOLOGY This study uses a qualitative method, meaning that the information delivered later in descriptive form, guided by COBIT 4.1.
ICMST 2019 August, 1 2019 2.1 INFORMATION TECHNOLOGY (IT)
PROCESS ANALYSIS
The main characteristics in COBIT 4.1 are there are several domains grouped according to their information technology objectives, including Plan and Organize (PO), Acquire and Imlement (AI), Deliver and Support (DS), Monitor and Evaluate (ME). Each domain has its own sub-domain and a total of thirty- four (34) IT processes. Each domain has its own uses.
2.2 CONTROL OBJECTIVE FOR INFORMATION AND RELATED TECHNOLOGY (COBIT) 4.1
COBIT 4.1 is an information technology (IT) governance framework and supporting tools that enable managers to bring together the distance between control needs, technical issues and business risks. COBIT enables policy making and good practice for IT control through organizations (Couture, Evans and Polster, 2004). The application of IT governance using the COBIT 4.1 framework can be done referring to the research paper owned (Fauzan and Latifah, 2015)
2.3 INFORMATION TECHNOLOGY (IT) GOVERNANCE
IT governance is the responsibility of the executive and the board of directors, and consists of leadership, organizational structure, and processes that ensure that IT in the company supports and expands from the organization's strategy and organizational goals (Couture, Evans and Polster, 2004).
2.3.1. MANUAL DOCUMENT
Manual documents are documents that are used to identify incidents or risks that have the potential to give damage or failure to the system (Couture, Evans and Polster, 2004).
2.3.2. GUIDELINE
Guidelines are used to help show stakeholders the objectives of business processes that are carried out to support activities or activities (Couture, Evans and Polster, 2004).
2.3.3. PROCEDURE
Procedure is a document that functions as a guide to the flow of activities carried out by stakeholders, and determines the responsibilities of each stakeholder in activities or activities at the right time, and ensures that the activities carried out are appropriate (Couture, Evans and Polster, 2004).
2.3.4. POLICY
The policy has a function to determine how and when IT strategic planning is carried out, the contents of this document include roles, responsibilities, exclusion processes, compliance approaches, and references to procedures, and guidelines (Couture, Evans and Polster, 2004).
2.3.5. FORM
In its use, the form functions to record data tracks or record data from all activities in the business process covering: input, process and output of the system in any form (Couture, Evans and Polster, 2004).
2.4 STAGES OF PREPARING INFORMATION TECHNOLOGY (IT) DOCUMENTS
The search for various theories, methods and models for making IT governance documents was carried out with literature studies. In making IT governance documents are carried out with various channels so that the documents that are created later can be in accordance with the existing SKEM information system services.
3. RESULT AND DISCUSSION
3.1. Information Technology (IT) Documents for Information System SKEM
The results of this study are the formation of information technology governance documents consisting of manual documents, guidelines, procedures, policies and forms for each information system (SI) of the Student Extracurricular Credit Unit (SKEM). As we can see in table 5.
Table 5. IT Governance document in IS SKEM Document
type
Description Code total Manual
document
SKEM’s manual document
DM 1
Guideline
1. Student
extracurricular credit unit (SKEM)
PN 4
Document type
Description Code total for the Indonesian
cement international university
2. SKEM
information system management policy 3. Guide to monitoring activities at the directorate of student affairs &
alumni
4. Guide to see student activity reports for guardian lecturers
Procedure
1. Procedure for submitting activities and verification of activities
2. Monitoring and evaluation
procedures for SI SKEM
PD
Policy
1. Student
extracurricular credit unit (SKEM) for the Indonesian cement
international university
2. SKEM
information system management policy
KJ
Form
1. Activity
submission form and activity verification
2. Activity list form 3. Detailed reports on student activities 4. Student activity report form at the directorate of student affairs 5. A list of activities for all students at the directorate of student affairs 6. Form a list of students submitting activities to guardian lecturers 7. Student activity report form for guardian lecturers
FR
ICMST 2019 August, 1 2019 3.2 Information Technology (IT) Documents for
Tracer Study
The results of this study are the formation of information technology governance documents consisting of manual documents, guidelines, procedures, policies and forms for each information in tracer study. As we can see in table 6.
Table 6. IT Governance document in tracer study Document
type
description Code total Manual
document
Tracer Study’s manual document
DM 1
Guideline
1. Guide to the use of tracer studies 2. Guide to non- active alumni accounts
PN 2
Procedure
1. Procedure for collecting student alumni
2. Procedure for limiting access rights of student alumni
PD 2
Policy Tracer Study’s policy KJ 1
Form
1. Questionnaire (form) tracer study 2. The Chancellor's Decree regarding the graduation of international cement students at the Indonesian judiciary in the odd semester of the academic year 2018/2019
FR 2
4. CONCLUSIONS
Based on the research that has been done, there are some conclusions. As follows:
a. This IT governance document is expected to be compiled and applied to all existing systems at ABC University so that it is useful in assisting business processes.
b. This document on information technology governance (IT) can be applied to simplify and improve the technical flow of activities in a system.
c. Stakeholders are also facilitated by the existence of IT governance documents because all
process processes in the system can be identified through the IT SI SKEM governance document and tracer study.
Suggestions that can be given by the writer for the next researcher are: The scope of research can be carried out in other directorates that already have a system but do not have an IT governance document and making documents more detailed starting from the offline process and the online process carried out by the system.
Thus the conclusions and suggestions that can be made by the next researcher to improve the quality of the research, hopefully the suggestions given can be input and consideration by future researchers and the community.
REFERENCES
Ashari, M. (2015) ‘Governance Information
Technology (IT) Audit at the Lombok Institute of Information and Computer Management (STMIK) Using the COBIT 4 Framework. 1 ', Bianglala Informatika, 3 (2), pp. 1–9.Couture, R., Evans, S. G. and Polster, A. (2004) COBIT 4.1.
Fauzan, R. and Latifah, R. (2015) ‘Information Technology Governance Audit to Control Quality Management Using (Case Study: PT Nikkatsu Electric Works) ', Journal of Information Engineering and Information Systems, 1, pp. 235–244.
Hanum, A. N. (no date) ‘IT GOVERNANCE IN BANKING DOMAIN DELIVER & SUPPORT (DS) USING MATURITY MODEL COBIT 4. 1 (Case Study in Semarang City Region Banking) ’, 1, pp. 1–10.
Kristiana, 2016 (2016) ‘a’, XIII (2), pp. 71–79.
Lesmono, I. D. and Erica, D. (2018) ‘Information Technology Governance Using the Cobit Method 4. 1 (Case Study: PT. IMI) ', 10 (1).
Sadikin, M., Hardi, H. and Haji, W. H. (2014) "IT Governance Self Assessment in Higher Education Based on COBIT Case Study:
University of Mercu Buana", Journal of Advanced Management Science, 2 (1), pp. 83–
87. doi: 10,12720 / joams.2.2.83-87.