Analisis Tata Kelola Teknologi Informasi Menggunakan Framework Cobit 5 (Studi Kasus: STIKES Garuda Putih Jambi)
DOI:
https://doi.org/10.30865/mib.v5i1.2573Keywords:
IT Governance, IT Management, Process Capability, Cobit 5, STIKES Garuda PutihAbstract
The implementation of IT requires good IT governance mechanisms to conduct comprehensive oversight so that the business goals of an organization can truly be achieved effectively and efficiently. All levels of IT managers must understand that risk is uncertain and harms a goal to be achieved. Risk can be a big challenge for any organization or institution that must be able to perform risk management as best it can. With well-managed risk management, it will be able to protect IT assets and add value to IT management. STIKES Garuda Putih is one of the nonprofit organizations that operate in the field of health education. To ensure excellent service for all communities and stakeholders related to IT services, it is necessary to conduct IT governance analysis activities to see if it is working properly. The analysis activity will be done using the COBIT framework 5. In this study, the capability model as a measuring tool for respondents' answers from the questionnaire is made based on the cobit framework 5. Based on the results of the process maturity level analysis on IT management (capability) is in the 3.6 to 1.4 the gap, so that concluded that IT governance has been implemented, but there is still the domain must be improved to achieve the maximum level. It is recommended that SOPs and IT performance management achievement reports, IT risk management, IT management strategy improvement, and the need for an internal control structure of IT governance be establishedReferences
R. Umar, I. Riadi, and E. Handoyo, “Analisis Keamanan Sistem Informasi Berdasarkan Framework COBIT 5 Menggunakan Capability Maturity Model Integration (CMMI),†J. Sist. Inf. Bisnis, vol. 9, no. 1, p. 47, 2019, doi: 10.21456/vol9iss1pp47-54.
T. Rahayu, N. Matondang, and B. Hananto, “Audit Sistem Informasi Akademik Menggunakan Metode COBIT 5 ( Studi Kasus UPN Veteran Jakarta ) Metode Pengumpulan Data Alur Penelitian Metode Analisis Data,†J. Teknol. Inf. dan Pendidik., vol. 13, no. 305, 2020.
R. E. Putri, “Penilaian Kapabilitas Proses Tata Kelola TI Berdasarkan Proses DSS01 Pada Framework COBIT 5,†J. CoreIT, Vol.2, No.1, Juni 2016, 2016.
I. P. Rahayu and N. Agitha, “Analisis Tata Kelola Teknologi Informasi Menggunakan Kerangka Kerja COBIT 5 (studi Kasus : DISKOMINFO Lombok Barat),†J. Teknol. Informasi, Komputer, dan Apl. (JTIKA ), vol. 1, no. 2, pp. 131–140, 2019, doi: 10.29303/jtika.v1i2.23.
A. Hakim, H. Saragih, and A. Suharto, “Jurnal Sistem Informasi ( Journal of Information Systems ). 2 / 10 ( 2014 ), 83-86 DOI : http://dx.doi.org/10.21609/jsi.v10i2.390,†J. Sist. Inf., vol. 10, no. 2, pp. 83–86, 2014.
Y. A. P. Pardjo, “Manajemen Risiko Perusahaan,†Grow. Publ., 2017.
A. Wiraniagara and F. Wijaya, “Analisis Tata Kelola Teknologi Informasi Menggunakan Framework Cobit 5 Domain Deliver Support and Service ( Studi Kasus : Yayasan Eka Tjipta , Jakarta ),†Sebatik, vol. 5, pp. 663–671, 2019.
A. Makmur and M. Haming, “Analisis Tata Kelola Teknologi Informasi Pada Terminal Petikemas Makassar Menggunakan Framework Cobit 5,†CESJ Cent. Econ. Students …, vol. 1, no. 1, pp. 56–65, 2018, [Online]. Available: https://mail.jurnal.fe.umi.ac.id/index.php/CESJ/article/view/66.
M. Islamiah, “Tata kelola teknologi informasi (IT governance) menggunakan framework cobit 5: studi kasus Dewan Kehormatan Penyelenggara Pemilu (DKPP),†repository.uinjkt.ac.id, 2014.
H. Hilmawan, O. D. Nurhayati, and I. P. Windasari, “Analisis Tata Kelola Teknologi Informasi menggunakan Kerangka Kerja COBIT 5 pada AMIK JTC Semarang,†J. Teknol. dan Sist. Komput., vol. 3, no. 2, p. 247, 2015, doi: 10.14710/jtsiskom.3.2.2015.247-252.
H. T. Sihotang and J. R. Sagala, “Penerapan Tata Kelola Teknologi Informasi Dan Komunikasi Pada Domain Align, Plan and Organise (Apo) Dan Monitor, Evaluate and Assess (Mea) Dengan Menggunakan Framework Cobit 5 Studi Kasus: Stmik Pelita Nusantara Medan,†J. Mantik Penusa Desember, vol. 18, no. 2, pp. 2088–3943, 2015.
E. Ekowansyah, Y. H. Chrisnanto, and P. N. Sabrina, “Audit Sistem Informasi Akademik Menggunakan COBIT 5 di Universitas Jenderal Achmad Yani,†Pros. Semin. Nas. Komput. dan Inform. 2017 (ISBN 978 - 602 - 60250 - 1 -2), vol. 2017, pp. 201–206, 2017, [Online]. Available: http://www.senaski.unikom.ac.id/prosiding-file/201-206 erdis ekowansyah dkk 6 hal.pdf.
R. S. Sepita Sari, Syahril Rizal, “Penerapan FRAMEWORK COBIT 5 Pada Audit Tata Kelola Teknologi Informasi,†no. April, p. 8, 2014.
COBIT 5, “COBIT 5: Process Assessment Model (PAM),†Isaca, p. 144, 2013, [Online]. Available: https://drive.google.com/folderview?id=0B9yuuoKpwX3MczducjREdEhqdTA&usp=sharing.
ISACA, COBIT ® Process Assessment Model (PAM): Using COBIT ® 5. 2013.
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).