Audit Sistem Informasi Aplikasi Digipop OOH Menggunakan Framework Cobit 5
DOI:
https://doi.org/10.30865/klik.v4i2.1066Keywords:
Digipop; Audit; Cobit 5; GAP; Maturity LevelAbstract
Information system audits are carried out to identify and ensure that existing system procedures in the company function properly, using the Cobit 5 framework to audit information systems of Digipop OOH Application located at PT. Media Indra Buana because previously there had never been a comprehensive audit of the information system used by the company so that the operational services of the information system could not be ascertained in accordance or not with the standards of the company's needs. Research is collected by quantitative capability analysis. The audit results with the highest value, namely the DSS01 domain, received a Maturity Level value of 15.07 with a Fully Achievement value and a gap value of each DSS01.01 sub domain with gap value 10.42, DSS01.02 with gap value 11.33, DSS01.03 with gap value 11.11, DSS01.04 with gap value 11.00 and DSS01.05 with gap value 11.51 from the target level 4. While the DSS02 domain received a Maturity Level value of 10.84 with a Fully Achievement value and a gap value of each DSS02.01 sub domain with gap value 6.87, DSS02.02 with gap value 6.69, DSS02.03 with gap value 6.85, DSS02.04 with gap value 6.80, DSS02.05 with gap value 6.63, DSS02.06 with gap value 7.05 and DSS02.07 with gap value 6.97 from the target level 4. The results of GAP analysis obtained from DSS01 and DSS02 have reached the target level
Downloads
References
M. Jannah and B. Maula Sulthon, “Analisa Audit Sistem Informasi Barang atau Jasa Menggunakan COBIT 5.0,” KLIK Kaji. Ilm. Inform. dan Komput., vol. 2, no. 6, pp. 242–250, 2022, doi: 10.30865/klik.v2i6.400.
M. A. Mz, “Cobit 5 Untuk Tata Kelola Audit Sistem Informasi Perpustakaan,” J. Teknoinfo, vol. 15, no. 2, p. 67, 2021, doi: 10.33365/jti.v15i2.1078.
S. S. H. Wijaya and R. A. Aziz, “Audit Sistem Informasi Menggunakan Metode Framework Cobit 5,” J. Inform., vol. 19, no. 2, pp. 116–126, 2019, doi: 10.30873/ji.v19i2.1681.
R. Umar, I. Riadi, and E. Handoyo, “Analisis Keamanan Sistem Informasi Berdasarkan Framework COBIT 5 Menggunakan Capability Maturity Model Integration (CMMI),” J. Sist. Inf. Bisnis, vol. 9, no. 1, p. 47, 2019, doi: 10.21456/vol9iss1pp47-54.
A. J. Hall and S. Tommie, Information Technology Auditing and Assurance Audit dan Assurance Teknologi Informasi Edisi 2, 2nd ed. Jakarta: Salemba Empat, 2009.
HUTAHAEAN. Jeperson, Konsep Sistem Informasi, 1st ed., vol. 3. Yo: CV. Budi Utama, 2015.
R. I. Elisabet Yunaeti Anggraeni, PENGANTAR SISTEM INFORMASI, 1st ed. Yogyakarta: CV. Andi Offset, 2017.
M. S. Wahid Wachyu Adi Winarto, Audit sistem informasi, 1st ed. Pekalongan: PT. NASYA EXPANDING MANAGEMENT, 2022.
M. T. I Putu Agus Swastika, M.Kom, I Gusti Lanang Agung Raditya Putra, S.Pd., AUDIT SISTEM INFORMASI DAN TATA KELOLA TEKNOLOGI INFORMASI, 1st ed. Yogyakarta: CV. Andi Offset, 2016.
N. Ilma Atqiyak and D. Budi Santoso, “Audit Sistem Informasi Aplikasi Gramedia Digital Menggunakan Framework COBIT 5,” J. Indones. Sos. Teknol., vol. 3, no. 6, pp. 740–751, 2022, doi: 10.36418/jist.v3i6.440.
E. Zuraidah, AUDIT SISTEM INFORMASI DAN MANAJEMEN MENGGUNAKAN COBIT 5 DAN CASE STUDY, 1st ed., vol. 33, no. 1. Yogyakarta: TEKNOSAIN, 2022.
M. Faiz Zamzani, Idha Arifin Faiz, AUDIT INTERNAL, KONSEP DAN PRAKTIK. Yogyakarta: Gadjah Mada University Press, 2018.
M. P. Utami, A. P. Widodo, and K. Adi, “Evaluasi Kinerja Tata Kelola Teknologi Informasi pada Sistem Aplikasi Elektronik Program Keluarga Harapan dengan COBIT 5 Evaluation of Information Technology Governance Performance in Electronic Application Systems of the Family Hope Program with COBIT 5,” J. Komun. dan Inform., vol. 10, no. 1, pp. 24–32, 2021, doi: 10.31504/komunika.v9i1.3529.
R. Nurul Wahidah, N. Lutfiyana, V. Fitria Ramadanti, P. Septiyo, and R. Drefiyanto, “Audit Sistem Informasi Absensi Mesin Fingerprint Pada PT. Metal Castindo Industritama Dengan Menggunakan Framework Cobit 5,” J. Sist. Inf., vol. 11, no. 2, pp. 51–57, 2022, doi: 10.51998/jsi.v11i2.482.
D. A. O. Turang and M. C. Turang, “Analisis Audit Tata Kelola Keamanan Teknologi Informasi Menggunakan Framework Cobit 5 Pada Instansi X,” Klik - Kumpul. J. Ilmu Komput., vol. 7, no. 2, p. 130, 2020, doi: 10.20527/klik.v7i2.316.
T. Rahayu, N. Matondang, and B. Hananto, “Audit Sistem Informasi Akademik Menggunakan Metode Cobit 5,” J. Teknol. Inf. dan Pendidik., vol. 13, no. 1, pp. 117–123, 2020, doi: 10.24036/tip.v13i1.305.
J. M. Hudin, N. Anggraeny, and D. Prayudi, “Audit Sistem Informasi Inventory Pada PT. DP Utan Kayu Dengan Framework Cobit 4.1,” J. Repos., vol. 2, no. 10, pp. 1359–1367, 2020, doi: 10.22219/repositor.v2i10.1015.
M. N. Amalia, F. Akbar, I. Risdiani, A. Islaha, and N. Srilena, “Audit Sistem Informasi pada Perpustakaan ARS University Menggunakan Framework COBIT 5,” J. Sains dan Inform., vol. 6, no. 2, pp. 139–147, 2020, doi: 10.34128/jsi.v6i2.226.
R. W. Witjaksono, “Audit Sistem Informasi Akademik Universitas Telkom Menggunakan Framework COBIT 5 Domain DSS Untuk Optimasi Proses Service Delivery,” J. Rekayasa Sist. Ind., vol. 6, no. 1, 2019, doi: 10.25124/jrsi.v6i1.341.
Bila bermanfaat silahkan share artikel ini
Berikan Komentar Anda terhadap artikel Audit Sistem Informasi Aplikasi Digipop OOH Menggunakan Framework Cobit 5
ARTICLE HISTORY
Issue
Section
Copyright (c) 2023 Esra Novalina Panjaitan, Eva Zuraidah

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).