Audit Sistem Informasi Aplikasi Fingerprint Menggunakan Cobit 5
DOI:
https://doi.org/10.30865/klik.v4i2.1086Keywords:
Audit; Absence; Cobit 5; GAP; Capability ModelAbstract
The existence of information technology is able to support organizations in providing accurate, relevant, fast information. By harmonizing organizational goals, organizational information systems/information technology can speed up the process of achieving organizational goals, but of course supervision and maintenance are needed so that the organization's IS/IT runs well. Information technology audit is a form of operational audit, but information technology audit whose main objective is to improve IT governance, operational audit of information resource management, effectiveness, efficiency, economics of the information system functional unit. Based on the identification of the problems that have been described, this research will discuss the calculation of the capability level in the fingerprint attendance application in the Honda Pandawa Lima Sejati work environment. :DSS 01(manage operations ), DSS03 (manage problem) The results of research on auditing information systems for fingerprint attendance applications using the COBIT 5 domain DSS 01 and DSS 03 framework, it can be concluded that auditing information systems Fingerprint at Pandawa Lima Dealers Using COBIT 5 has almost reached the expected target level, the results of data processing of the distribution of questionnaires into data obtained and the rating to level F has fulfilled, the scale of rounding off the capability model condition index is at level 4 of the company
Downloads
References
P. D. Driya, I. G. L. A. R. Putra, and I. M. A. Pradyana, “TEKNIK PENGUMPULAN DATA PADA AUDIT SISTEM INFORMASI DENGAN FRAMEWORK COBIT,” Inser. Inf. Syst. Emerg. Technol. J., vol. 2, no. 2, p. 70, Jan. 2022, doi: 10.23887/insert.v2i2.40235.
K. Marzuki, A. Setyanto, and A. Nasiri, “Audit Tata Kelola Teknologi Informasi Menggunakan Cobit 4 . 1 Domain Monitoring Evaluasi Pada Perguruan Tinggi Swasta,” Semin. Nas. Sist. Inf. dan Teknol. Inf., 2018.
A. Riyandi, A. Sudibyo, B. Wijonarko, M. Rinaldi, and M. F. Fahleyi, “Analisa Audit Sistem Informasi Perpustakaan Menggunakan Cobit Frame Work,” J. Sist. dan Teknol. Inf., vol. 8, no. 3, p. 296, 2020, doi: 10.26418/justin.v8i3.41167.
R. Nurul Wahidah, N. Lutfiyana, V. Fitria Ramadanti, P. Septiyo, and R. Drefiyanto, “Audit Sistem Informasi Absensi Mesin Fingerprint Pada PT. Metal Castindo Industritama Dengan Menggunakan Framework Cobit 5,” J. Sist. Inf., vol. 11, no. 2, pp. 51–57, 2022, doi: 10.51998/jsi.v11i2.482.
J. F. Andry, I. G. N. Suryantara, M. Kartin, and T. Alexander, “Audit Aplikasi Absensi Pegawai di BANK XYZ Menggunakan COBIT 5,” KALBISCIENTIA J. Sains dan Teknol., vol. 9, no. 2, pp. 7–17, 2022, doi: 10.53008/kalbiscientia.v9i2.361.
Iputu Agus Swastika, Audit Sistem Informasi dan Tata Kelola Teknologi Informasi, no. March. Yogyakarta: CV. ANDI OFFSET, 2016.
N. ANNET and J. Naranjo, Joni Dwi Pribadi, Fatkhur Rohman, Evi Suwarni, Kristoforus Raditya Pradana, Ciptari Queen Rachmad Oktavia Lestanti Khoiro Ummatin, vol. 85, no. 1. Surabaya, 2014.
I. bankir Indonesia, Pedoman dan Strategi Audit Intern Bank, 1st ed. jakarta, 2019.
J. N. U. J. Nurholis, “Audit Sistem Informasi Absensi Menggunakan Cobit 5,” J. Inf. Syst. Res., vol. 3, no. 4, pp. 404–409, 2022, doi: 10.47065/josh.v3i4.1787.
R. Wijaya, R. Novita, E. Jonatan, L. A. Novanto, and J. Hartanto, “Audit Sistem Absensi Online Menggunakan Framework COBIT 5 Pada Penyedia Akses Jaringan,” JBASE - J. Bus. Audit Inf. Syst., vol. 3, no. 2, pp. 21–31, 2020, doi: 10.30813/jbase.v3i2.2268.
W. C. Fandy Kurniawan, “Evaluasi Dan Peningkatan Tata Kelola Teknologi,” vol. 08, no. 02, pp. 1–8, 2022.
Y. T. Sianipar, N. W. Widiyanti, and A. T. Agustini, “Evaluasi Sistem Informasi Pengupahan PT. Tempu Rejo Menggunakan COBIT 5 Domain DSS,” AKTSAR J. Akunt. Syariah, vol. 1, no. 2, p. 187, 2018, doi: 10.21043/aktsar.v1i2.5096.
A. P. Rabhani et al., “Audit Sistem Informasi Absensi Pada Kejaksaan Negeri Kota Bandung Menggunakan Framework Cobit 5,” J. Sisfokom (Sistem Inf. dan Komputer), vol. 9, no. 2, pp. 275–280, 2020, doi: 10.32736/sisfokom.v9i2.890.
P. Khairani, M. L. Hamzah, M. Megawati, and M. Jazman, “Evaluasi Kinerja Sistem Informasi Elektronik Kinerja ASN (SI-EKA) Menggunakan Framework Cobit 5 Pada Kementerian Agama Kota Pekanbaru,” INTECOMS J. Inf. Technol. Comput. Sci., vol. 5, no. 1, pp. 8–18, 2022, doi: 10.31539/intecoms.v5i1.3693.
2013 Azhar susanto, “AUDIT SISTEM INFORMASI KEPEGAWAIAN PADA KONSULTAN HUKUM AM BADAR & AM BADAR,” IJIS-Indonesia J. Inf. Syst., vol. 4, no. April, pp. 69–76, 2019.
A. Angelia, N. Rahmah, and A. Yulianto, “Audit Sistem Informasi Absensi Pada Pt. Sunar Reka Artha Menggunakan Framework Cobit 5 Focus Domain Mea,” J. Inf. dan Komput., vol. 11, no. 1, pp. 138–148, 2023.
J. F. A. Honni1, Francka Sakti Lee2, M. Fauzi Isputrawan3, Isabelle Ivana Limawal4, “AUDIT APLIKASI PRESENSI PADA PERUSAHAAN INDUSTRI KOSMETIK MENGGUNAKAN COBIT 5,” Raden Ario Damar, vol. 7, no. 1, pp. 55–62, 2021, [Online]. Available: http://jurnal.kampuswiduri.ac.id/index.php/infoteh/article/view/153/131
Bila bermanfaat silahkan share artikel ini
Berikan Komentar Anda terhadap artikel Audit Sistem Informasi Aplikasi Fingerprint Menggunakan Cobit 5
ARTICLE HISTORY
Issue
Section
Copyright (c) 2023 Diaul Munir, Eva Zuraidah

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).