The Measurement Of Corporate IT Security Against The Internal Perspective

Isi Artikel Utama

Johanes Fernandes Andry
Febryanto Kurniawan

Abstrak

Technology is growing the impact of this technological advances, the Information Technology world at the company is competing to perform a good performance for the company. The level of security in the system in the company becomes important to note because the company has thousands of useful data for the company. The relationship between IT and business processes is closely related to each other and need each other. So in this study pharmaceutical companies located in Jakarta will make measurements of their IT security level and performance of the company's performance. Results maturity level obtained on the DS5 is 1.4, DS7 is 1, DS10 is 1.7, DS11 is 2, and DS13 is 1.8. TI can be concluded that DS5 and DS7 are still initial / ad-Hoc while DS10, DS11, & DS13 are still repeatable but intuTIive. Expected level is Level 3 for the company. IT can be concluded that IT governance in this company in terms of security has effectiveness but not yet maximally in the purpose of its business process, hence this research done to become evaluation company to improve their IT governance.

Rincian Artikel

Bagaimana Mengutip
Andry, J., & Kurniawan, F. (2018). The Measurement Of Corporate IT Security Against The Internal Perspective. Technomedia Journal, 3(1), 44-57. https://doi.org/https://doi.org/10.5281/zenodo.1409445
Bagian
Artikel
Biografi Penulis

Johanes Fernandes Andry, Universitas Bunda Mulia

Johanes Fernande Andry adalah dosen sistem informasi, universitas bunda mulia, jakarta

Febryanto Kurniawan, Universitas Bunda Mulia

Students information systems at bunda mulia university

Referensi

[1] Jairak, K., Praneetpolgrang. P., 2013, Applying IT Governance Balanced Scorecard and Importance-Performance Analysis for Providing IT Governance Strategy in University, Information Management and Computer Security, Vol. 21, pp.228-249.
[2] Mukherjee, S., 2017, Collaborative Governance Strategies for a Strategic Offshore IT Outsourcing Engagement, Journal of Global Operations and Strategic Sourcing, Vol. 10, pp.255-278.
[3] Barbosa, S. C. B., Rodello. I. A., and dePadua. S. I. D., 2014 , Performance Measurement Of information Technology Governance in Brazilian Financial Institutions, Journal of Information Systems and Technology Management, Vol. 11, pp. 397-414.
[4] Kachouri, M., and Jarboui, A., 2017, Exploring the Relation Between Corporate Reporting and Corporate Governance Effectiveness, Journal of Financial Reporting and Accounting, Vol. 15, pp.347-366.
[5] Tannady, H., and Maimury, Y., 2018, Increasing the Efficiency and Productivity in the Production of Low Voltage Switchboard Using Resource Constrained Project Scheduling, Journal of Industrial Engineering and Management, pp. 2013-0953.
[6] Almutairi, A. H., and Alruwaili, A. H., 2012, Security in Database System, Global Journal of Computer Science and technology network, web and Security, Vol. 12, issue 17.
[7] Windirya, D. H., Tanuwijaya, H., and Sutomo, E., 2017 , Security Information System Information Installation Of Management Information System Of Bangil Rsud Based On Iso 27002, Journal System information and computer accounting, Vol. 3, pp.2338-137.
[8] Karanja, E., and Zaveri, J., 2014, Ramifications of the Sarbanes Oxley (SOX) Act on IT governance, International Journal of Accounting and Information Management, Vol. 22, pp.134-145.
[9] Charuenporn, P., and Intakosum, S., 2012, Qos-Security Metrics Based on ITIL and COBIT Standard for Measurement Web Services, Journal of Universal Computer Science, Vol.18:6, pp. 775-797.
[10] Mehralian, G., Nazari, J. A., and Ghasemzadeh, P., 2018, The effects of knowledge creation process on organizational performance using the BSC approach: the mediating role of intellectual capital , Journal of Knowledge Management.
[11] Zafarina, A. Y., Arif, M., and Mulyana, R., 2016 , Analysis And Design Of It Governance Using Cobit 4.1 Domain Plan And Organise (Po) And Acquire And Implement (Ai): Case Study Pt Xyz, Journal of Information Systems, Vol.12.
[12] Andry, J. F., and Christianto, K., 2018, Audit Mengunakan COBIT 4.1 dan COBIT 5 dengan Case study, Teknosain, Edition-1, ISBN: 978-602-6324-95-5.
[13] Andry, J. F., 2017, Performance Measurement of IT Based on COBIT Assessment: A Case Study Performance Measurement of IT Based on COBIT Assessment: A Case Study, Journal System Information Indonesia, Vol. 2, pp. 2460 - 6839.
[14] ICASA: COBIT 4.1, 2007, Framework Control Objectives Management Guidelines Maturity Models, IT Governance Institute, ISBN 1-933284-72-2.
[15] Heavy, C., and Murphy, E., 2012 , Integrating the Balanced Scorecard with Six Sigma, The TQM Journal, Vol. 24, pp. 108-122.
[16] Park. S. , Lee. H. , and Chae. S. W. 2017 , Rethinking balanced scorecard (BSC) measures: formative versus reflective measurement models, International Journal of Productivity and Performance Management, Vol. 66.
[17] Khomba, J. K., 2015, Conceptualization of the Balanced Scorecard (BSC) model: A critical review on its validity in Africa, International Journal of Commerce and Management, Vol. 25, pp.424-441.
[18] Schaub, J., Hirsch, B., and Sohn, M., 2014, Functional Fixation and the Balanced Scorecard: Adaption of BSC user's judgment processes , Journal of Accounting and Organizational Change, Vol. 10, pp.540-566.
[19] Carminati, B., Ferrari, E., and Perego, A., 2008, A Decentralized Security Framework for Web-Based Social Networks, International Journal of Information Security and Privacy, Vol. 2.
[20] Pardini, D. J., Heinisch, A. M. C., and Parreiras, F. S., 2017, Cyber Security Governance And Management For Smart Grids In Brazilian Energy Utilities, Journal of Information Systems and Technology Managemen, Vol. 14, pp. 385-400.
[21] Akhirina, T. Y., Arif, S. M., and Ramahtika., 2016, Evaluation Of Information Technology Security In Pt Indotama Partner Logistics Using Information Security Index, journal Technology and Information Systems, Vol. 2, pp. 2476 - 8812.
[22] Pradini, T., and Andry, J. F., 2018, Sistem Informasi Audit Front Office di Word Hotel menggunakan COBIT Framework 4.1, Information Journal of Computer and Information Technology, Vol. 2.
[23] Wiyati, R. K., 2015, Penggunaan IT Balanced Scorecard Untuk Pengukuran Kinerja Teknologi Informasi Pada Stikom Bali, Jurnal Sistem Dan Informatika, Vol. 10, No. 1, Nopember.
[24] Tonelli, A. O., Bermejo, P. H. D. S., and Zambalde, A. L., 2014, Using The Bsc For Strategic Planning Of It (Information Technology) In Brazilian Organizations, Journal of Information Systems and Technology Management, Vol. 11, No.2 , pp. 361-378.
[25] Rahardja, U., Harahap, E. P., Suciani, A. (2017). Media Viewboard Sebagai Klasifikasi Jumlah Surat Keputusan Online Pada Perguruan Tinggi, Technomedia Journal (TMJ), Vol. 2, No.1, pp. 69-81.