• Tidak ada hasil yang ditemukan

STUDENTS AND ALUMNI OF ABC UNIVERSITY

Dalam dokumen 2019 (Halaman 166-171)

ICMST 2019 August, 1 2019

ANALYSIS AND DESIGN OF INFORMATION TECHNOLOGY GOVERNANCE

Table 2. Domain AI

Code Process

AI1 Identification of automatic solution AI2 Obtain and maintain application

software

AI3 Obtain and maintain technology infrastructure

AI4 Enables work and uses it AI5 Obtain IT resources AI6 Manage changes

AI7 Install and accreditation and change solutions

In Deliver and Support (DS) domain there are 13 process, can be seen in table 3:

Table 3. Domain DS

Code Process

DS1 Define and manage service levels DS2 Manage third party services DS3 Manage performance and capacity DS4 Manage service continuity

DS5 Ensuring system security DS6 Identify and allocate costs DS7 Educate and train users

DS8 Managing service desk and incident DS9 Manage configuration

DS10 Manage problems DS11 Manage data

DS12 Manage the physical environment DS13 Manage operations

In Monitor and Evaluate (ME) domain there are 4 process, can be seen in table 4:

Table 4. Domain ME

Code Process

ME1 Monitoring and evaluating IT performance

ME2 Internal control monitoring and evaluation

ME3 Ensuring compliance with external needs

ME4 Providing information technology governance

There are several research from previous researchers who became reference in this study to make Information Technology (IT) Governance document, research The Indonesian Ministry of Health's Pusdiklat apparatus currently implements IT governance using COBIT 4.1 as its guideline (Kristiana, 2016). For research in university there is COBIT 4.1 framework as one of the references for analyzing the conditions of IT governance, especially PO and AI domains conducted at the Lombok School of Information and Computer Management with the COBIT 4.1 framework and has provided recommendations for improvements to IT governance (Ashari, 2015).

Domain DS1 usage as a self-assessment of the customer scope, providing recommendations for improving IT governance. Between IT governance and IT master planning are interconnected, because IT parent planning can be a guide and direct IT planning and implementation to be aligned with the strategies and objectives of the university (Sadikin, Hardi and Haji, 2014). And also COBIT 4.1 especially DS1 domain can be use for manage the service in system, The application of IT governance uses deliver and support (DS) as one of the domains for IT management to be better in the future (Hanum, no date). (Lesmono and Erica, 2018) said in their paper that,The research was conducted at PT. IMI which provides recommendations for IT governance in managing IT more intensively by using Domain DS1 as a reference to see the level of maturity. The conclusion is COBIT 4.1 especially DS1 domain can e used in every instantion like university.

2. BASIC THEORY AND METHODOLOGY This study uses a qualitative method, meaning that the information delivered later in descriptive form, guided by COBIT 4.1.

ICMST 2019 August, 1 2019 2.1 INFORMATION TECHNOLOGY (IT)

PROCESS ANALYSIS

The main characteristics in COBIT 4.1 are there are several domains grouped according to their information technology objectives, including Plan and Organize (PO), Acquire and Imlement (AI), Deliver and Support (DS), Monitor and Evaluate (ME). Each domain has its own sub-domain and a total of thirty- four (34) IT processes. Each domain has its own uses.

2.2 CONTROL OBJECTIVE FOR INFORMATION AND RELATED TECHNOLOGY (COBIT) 4.1

COBIT 4.1 is an information technology (IT) governance framework and supporting tools that enable managers to bring together the distance between control needs, technical issues and business risks. COBIT enables policy making and good practice for IT control through organizations (Couture, Evans and Polster, 2004). The application of IT governance using the COBIT 4.1 framework can be done referring to the research paper owned (Fauzan and Latifah, 2015)

2.3 INFORMATION TECHNOLOGY (IT) GOVERNANCE

IT governance is the responsibility of the executive and the board of directors, and consists of leadership, organizational structure, and processes that ensure that IT in the company supports and expands from the organization's strategy and organizational goals (Couture, Evans and Polster, 2004).

2.3.1. MANUAL DOCUMENT

Manual documents are documents that are used to identify incidents or risks that have the potential to give damage or failure to the system (Couture, Evans and Polster, 2004).

2.3.2. GUIDELINE

Guidelines are used to help show stakeholders the objectives of business processes that are carried out to support activities or activities (Couture, Evans and Polster, 2004).

2.3.3. PROCEDURE

Procedure is a document that functions as a guide to the flow of activities carried out by stakeholders, and determines the responsibilities of each stakeholder in activities or activities at the right time, and ensures that the activities carried out are appropriate (Couture, Evans and Polster, 2004).

2.3.4. POLICY

The policy has a function to determine how and when IT strategic planning is carried out, the contents of this document include roles, responsibilities, exclusion processes, compliance approaches, and references to procedures, and guidelines (Couture, Evans and Polster, 2004).

2.3.5. FORM

In its use, the form functions to record data tracks or record data from all activities in the business process covering: input, process and output of the system in any form (Couture, Evans and Polster, 2004).

2.4 STAGES OF PREPARING INFORMATION TECHNOLOGY (IT) DOCUMENTS

The search for various theories, methods and models for making IT governance documents was carried out with literature studies. In making IT governance documents are carried out with various channels so that the documents that are created later can be in accordance with the existing SKEM information system services.

3. RESULT AND DISCUSSION

3.1. Information Technology (IT) Documents for Information System SKEM

The results of this study are the formation of information technology governance documents consisting of manual documents, guidelines, procedures, policies and forms for each information system (SI) of the Student Extracurricular Credit Unit (SKEM). As we can see in table 5.

Table 5. IT Governance document in IS SKEM Document

type

Description Code total Manual

document

SKEM’s manual document

DM 1

Guideline

1. Student

extracurricular credit unit (SKEM)

PN 4

Document type

Description Code total for the Indonesian

cement international university

2. SKEM

information system management policy 3. Guide to monitoring activities at the directorate of student affairs &

alumni

4. Guide to see student activity reports for guardian lecturers

Procedure

1. Procedure for submitting activities and verification of activities

2. Monitoring and evaluation

procedures for SI SKEM

PD

Policy

1. Student

extracurricular credit unit (SKEM) for the Indonesian cement

international university

2. SKEM

information system management policy

KJ

Form

1. Activity

submission form and activity verification

2. Activity list form 3. Detailed reports on student activities 4. Student activity report form at the directorate of student affairs 5. A list of activities for all students at the directorate of student affairs 6. Form a list of students submitting activities to guardian lecturers 7. Student activity report form for guardian lecturers

FR

ICMST 2019 August, 1 2019 3.2 Information Technology (IT) Documents for

Tracer Study

The results of this study are the formation of information technology governance documents consisting of manual documents, guidelines, procedures, policies and forms for each information in tracer study. As we can see in table 6.

Table 6. IT Governance document in tracer study Document

type

description Code total Manual

document

Tracer Study’s manual document

DM 1

Guideline

1. Guide to the use of tracer studies 2. Guide to non- active alumni accounts

PN 2

Procedure

1. Procedure for collecting student alumni

2. Procedure for limiting access rights of student alumni

PD 2

Policy Tracer Study’s policy KJ 1

Form

1. Questionnaire (form) tracer study 2. The Chancellor's Decree regarding the graduation of international cement students at the Indonesian judiciary in the odd semester of the academic year 2018/2019

FR 2

4. CONCLUSIONS

Based on the research that has been done, there are some conclusions. As follows:

a. This IT governance document is expected to be compiled and applied to all existing systems at ABC University so that it is useful in assisting business processes.

b. This document on information technology governance (IT) can be applied to simplify and improve the technical flow of activities in a system.

c. Stakeholders are also facilitated by the existence of IT governance documents because all

process processes in the system can be identified through the IT SI SKEM governance document and tracer study.

Suggestions that can be given by the writer for the next researcher are: The scope of research can be carried out in other directorates that already have a system but do not have an IT governance document and making documents more detailed starting from the offline process and the online process carried out by the system.

Thus the conclusions and suggestions that can be made by the next researcher to improve the quality of the research, hopefully the suggestions given can be input and consideration by future researchers and the community.

REFERENCES

Ashari, M. (2015) ‘Governance Information

Technology (IT) Audit at the Lombok Institute of Information and Computer Management (STMIK) Using the COBIT 4 Framework. 1 ', Bianglala Informatika, 3 (2), pp. 1–9.Couture, R., Evans, S. G. and Polster, A. (2004) COBIT 4.1.

Fauzan, R. and Latifah, R. (2015) ‘Information Technology Governance Audit to Control Quality Management Using (Case Study: PT Nikkatsu Electric Works) ', Journal of Information Engineering and Information Systems, 1, pp. 235–244.

Hanum, A. N. (no date) ‘IT GOVERNANCE IN BANKING DOMAIN DELIVER & SUPPORT (DS) USING MATURITY MODEL COBIT 4. 1 (Case Study in Semarang City Region Banking) ’, 1, pp. 1–10.

Kristiana, 2016 (2016) ‘a’, XIII (2), pp. 71–79.

Lesmono, I. D. and Erica, D. (2018) ‘Information Technology Governance Using the Cobit Method 4. 1 (Case Study: PT. IMI) ', 10 (1).

Sadikin, M., Hardi, H. and Haji, W. H. (2014) "IT Governance Self Assessment in Higher Education Based on COBIT Case Study:

University of Mercu Buana", Journal of Advanced Management Science, 2 (1), pp. 83–

87. doi: 10,12720 / joams.2.2.83-87.

Dalam dokumen 2019 (Halaman 166-171)