Maturity Evaluation of Information Technology Governance in PT DEF Using Cobit 5 Framework
DOI:
https://doi.org/10.25126/jitecs.20172123Abstract
Information technology governance is used to guide and control an organization in achieving the goals that had been planned in advance. PT DEF is a company which utilises information technology to support its business processes. Nevertheless, it indeed requires an IT governance that can be beneficial as a reference for IT activities in order to run properly. This research intends to conduct an audit of information technology governance based on the COBIT 5 framework domain, which is DSS (Deliver, Service, and Support) domain in the process of DSS03 (Manage Problems). According to the research results, the values that have been obtained from the process of DSS03 capability level was 64.66%, that is regarded as Partially Achieved. Capability level will be used as a reference in seeking gap contained in the domain of DSS03 process. Furthermore, these would be able to make recommendations aimed at increasing the value of the expected maturity. This research contributes to the evaluation results and recommendations to improve the capability level on the DSS03 domain, hence PT DEF can upgrade its IT governance by using DSS03 process.
References
R. Fauzan, R. Latifah, P. S. Informasi, F. Teknik, and U. K. Indonesia, “Audit Tata Kelola Teknologi Informasi Untuk Mengontrol Manajemen Kualitas Menggunakan ( Studi Kasus : PT Nikkatsu Electric Works ),†J. Tek. Inform. dan Sist. Inf., vol. 1, pp. 235–244, 2015.
D. S. Kerr and U. S. Murthy, “Information & Management The importance of the CobiT framework IT processes for effective internal control over financial reporting in organizations : An international survey,†Inf. Manag., vol. 50, no. 7, pp. 590–597, 2013.
M. A. Putri, I. Aknuranda, and W. F. Mahmudy, “Development of a Conceptual Framework to Determine Improvement of IT Governance using COBIT 5 and AHP-GA,†Adv. Res. Circuits Syst. Int. Conf. Malaysia, pp. 1–6.
R. Gomes, “The Main Benefits Of Cobit In A High Public Educational Institution - A Case Study,†Pacific Asia Conf. Inf. Syst., 2009.
A. Syamsudin and E. T. Lutfi, “Evaluasi Tingkat Kematangan Tata Kelola Teknologi Informasi Stain Kediri Menggunakan Framework COBIT 5,†Semin. Nas. Teknol. Inf. dan Multimed. 2014 STMIK AMIKOM Yogyakarta, pp. 1–5, 2014.
S. M. Mutu, T. Kapabilitas, and S. Guttman, “Evaluasi dan Perbaikan Kualitas Pelayanan Menggunakan COBIT 5 Domain APO ( APO11 ),†vol. 3, 2008.
ISACA, COBIT 5 : The Framework. USA: IT Governance Institute, 2012.
M. A. Putri, V. A. Lestari, and I. Aknuranda, “Audit of Information Technology Governance Using COBIT 4.1: Case Study in PT. XY,†Int. Conf. Ind. Internet Things (ICIIOT), Bandung,Indonesia, pp. 1–7.
T. Mataracioglu and S. Ozkan, “Governing Information Security in Conjunction With COBIT and ISO 27001,†Int. J. Netw. Secur. Its Appl., pp. 1–5.
H. Purba, “Study of IT Governance Development Use Cobit 4 . 1 and AHP at Education Institution ( Case Study : Adventist University of Indonesia ),†J. Teknol. Inf. Dan Komun., vol. 2, 2009.
ISACA, COBIT 4.1. IT Governance Institute, 2007.
E. W. N. Bernroider and M. Ivanov, “IT project management control and the Control Objectives for IT and related Technology ( CobiT ) framework,†Int. J. Proj. Manag., vol. 29, pp. 325–336, 2011.
Isaca, “COBIT 5 : The Framework - Exposure Draft,†USA IT Gov. Inst., p. 86, 2011.
ISACA, Process Assessment Model (PAM): Using COBIT 5. USA: IT Governance Institute, 2012.
Downloads
Published
How to Cite
Issue
Section
License
 Creative Common Attribution-ShareAlike 3.0 International (CC BY-SA 3.0)
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).