IT governance evaluation at the population and civil registry office in Kolaka district using COBIT 5 framework
Keywords:COBIT 5, Disdukcapil, DSS, IT Governance, Process Assessment Model
AbstractThe implementation of information technology is compulsory to fit organizational goals. This research aims to evaluate the quality of information technology services at the Population and Civil Registry Office at Kolaka District based on COBIT 5 Framework that focused on DSS (deliver, service and support) domain by measuring the Maturity Level using Process Assessment Model (PAM). The Population and Civil Registry Office is under the local government ‘s auspices which is essential in managing the population. The data collection method was done by distributing questionnaires and conducting interviews. This study used 8 (eight) respondents based on the RACI chart. This research was expected to reach level 3 (established process) to create IT governance that fits organizational goals and international standards. From the research result, it is known that the maturity level from the evaluation process conducted by COBIT 5 using the processes DSS-01, DSS-02, DSS-03, DSS-04, DSS-05, and DSS-06 were as follows: 2 processes were at level 1 (performed process), namely the DSS-05 and DSS-06 while the others (DSS-01, DSS-02, DSS-03, and DSS-04) were at level 2 (managed process).
J. F. Andry, "Performance Measurement of Information Technology Governance: A Case Study," Jurnal Sistem Informasi (Journal of Information System), vol. 12, no. 2, pp. 56-62, 2016.
H. Bin-Abbas and S. H. Bakry, "Assessment of IT governance in organizations: A simple integrated approach," Computers in Human Behavior, vol. 32, no. March, pp. 261-267, 2014.
S. C. B. Barbosa, I. A. Rodello and S. I. D. d. Pádua, "Performance measurement of information technology governance in brazilian financial institutions," JISTEM - Journal of Information Systems and Technology Management, vol. 11, no. 2, pp. 397-414, 2014.
J. F. Andry, "Audit of IT Governance Based on COBIT 5 Assessments: A Case Study," Jurnal Nasional Teknologi dan Sistem Informasi (TEKNOSI), vol. 2, no. 2, pp. 27-34, 2016.
Y. Ding, "Modelling continued use of information systems from a forward-looking perspective: Antecedents and consequences of hope and anticipated regret," Information & Management, vol. 55, no. 4, pp. 461-471, 2018.
P. Liu, O. Turel and C. Bart, "Board IT Governance in Context: Considering Governance Style and Environmental Dynamism Contingencies," Information Systems Management, vol. 36, no. 3, pp. 212-227, 2019.
I. ISACA, A Business Framework for the Governance and Management of Enterprise IT, Rolling Meadows, Illinois, United States: ISACA, 2012.
P. Zhang, K. Zhao and R. L. Kumar, "Impact of IT Governance and IT Capability on Firm Performance," Information Systems Management, vol. 33, no. 4, pp. 357-373, 2016.
R. A. Khther and M. Othman, "Cobit Framework as a Guideline of Effective it Governance in Higher Education: A Review," International Journal of Information Technology Convergence and Services (IJITCS), vol. 3, no. 1, pp. 21-29, 2013.
V. Jarsa and K. Christianto, "IT Governance Audit with COBIT 5 Framework on DSS Domain," Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control, vol. 3, no. 4, pp. 279-286, 2018.
J. F. Andry and A. K. Setiawan, "IT Governance Evaluation Using Cobit 5 Framework on the National Library," Jurnal Sistem Informasi (Journal of Information System), vol. 15, no. 1, pp. 10-17, 2019.
H. M. Astuti, F. A. Muqtadiroh, E. W. T. Darmaningrat and C. UtamiPutri, "Risks Assessment of Information Technology Processes Based on COBIT 5 Framework: A Case Study of ITS Service Desk," Procedia Computer Science, vol. 124, pp. 569-576, 2017.
R. Wijaya and J. F. Andry, "Performance measurement of JP soft application using COBIT 5 framework," Register: Jurnal Ilmiah Teknologi Sistem Informasi, vol. 3, no. 2, pp. 83-93, 2017.
D. Zeglat, W. AlRawabdeh, F. AlMadi and F. Shrafat, "Performance Measurements Systems: Stages of Development Leading to Success," Interdisciplinary Journal Of Contemporary Research In Business, vol. 4, no. 7, pp. 440-448, 2012.
I. W. S. Pramana, P. R. Iswardani and P. A. Mertasana, "IT GovernanceEvaluation of Hotel Warehouse Section Using the COBIT 5 Framework," International Journal of Engineering and Emerging Technology, vol. 3, no. 2, pp. 5-12, 2018.
T. Huygh and S. D. Haes, "Investigating IT Governance through the Viable System Model," Information Systems Management, vol. 36, no. 2, pp. 168-192, 2019.
I. M. Al-Zwyalif, "IT Governance and its Impact on the Usefulness of Accounting Information Reported in Financial Statements," International Journal of Business and Social Science, vol. 4, no. 2, pp. 83-94, 2013.
A. Mohseni, M. AhmadAliNezhad and S. A. Ghasempoori, "Model of requirements engineering for information technology governance based on the COBIT framework in public organizations using the REGIT method: Case study: Civil registration organization," in IEEE 4th International Conference on Knowledge-Based Engineering and Innovation (KBEI), Tehran, Iran, 2017.
J. F. Andry and H. Hartono, "Performance Measurement of IT Based on COBIT Assessment: A Case Study," Jurnal Sistem Informasi Indonesia (JSII), vol. 2, no. 1, pp. 1-13, 2017.
S. Ramlaoui and A. Semma, "Comparative study oComparative of COBIT with other IT Governance Frameworks," International Journal of Computer Science Issues (IJCSI), vol. 11, no. 6, pp. 95-101, 2014.
S. Ahriz, A. E. Yamami, K. Mansouri and M. Qbadou, "Cobit 5-Based Approach for IT Project Portfolio Management: Application to a Moroccan University," International Journal of Advanced Computer Science and Applications (IJACSA), vol. 9, no. 4, pp. 88-95, 2018.
O. Illoh, S. Aghili and S. Butakov, "Using COBIT 5 for Risk to Develop Cloud Computing SLA Evaluation Templates," in Service-Oriented Computing - ICSOC 2014 Workshops, Toumani F. et al (eds) ed., vol. 8954, Cham, Springer, 2015, pp. 236-249.
M. Wolden, R. Valverde and M. Talla, "The effectiveness of COBIT 5 Information Security Framework for reducing Cyber Attacks on Supply Chain Management System," IFAC-PapersOnLine, vol. 48, no. 3, pp. 1846-1852, 2015.
A. Joshi, L. Bollen, H. Hassink, S. D. Haes and W. V. Grembergen, "Explaining IT governance disclosure through the constructs of IT governance maturity and IT strategic role," Information & Management, vol. 55, no. 3, pp. 368-380, 2018.
I. ISACA, "COBIT Process Assessment Model (PAM): Using COBIT 5," ISACA, Rolling Meadows, Illinois, United States, 2013.
Please find the rights and licenses in Register: Jurnal Ilmiah Teknologi Sistem Informasi. By submitting the article/manuscript of the article, the author(s) agree with this policy. No specific document sign-off is required.
The non-commercial use of the article will be governed by the Creative Commons Attribution license as currently displayed on Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
2. Author(s)' Warranties
The author warrants that the article is original, written by stated author(s), has not been published before, contains no unlawful statements, does not infringe the rights of others, is subject to copyright that is vested exclusively in the author and free of any third party rights, and that any necessary written permissions to quote from other sources have been obtained by the author(s).
3. User/Public Rights
Register's spirit is to disseminate articles published are as free as possible. Under the Creative Commons license, Register permits users to copy, distribute, display, and perform the work for non-commercial purposes only. Users will also need to attribute authors and Register on distributing works in the journal and other media of publications. Unless otherwise stated, the authors are public entities as soon as their articles got published.
4. Rights of Authors
Authors retain all their rights to the published works, such as (but not limited to) the following rights;
Copyright and other proprietary rights relating to the article, such as patent rights,
The right to use the substance of the article in own future works, including lectures and books,
The right to reproduce the article for own purposes,
The right to self-archive the article (please read out deposit policy),
The right to enter into separate, additional contractual arrangements for the non-exclusive distribution of the article's published version (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal (Register: Jurnal Ilmiah Teknologi Sistem Informasi).
If the article was jointly prepared by more than one author, any authors submitting the manuscript warrants that he/she has been authorized by all co-authors to be agreed on this copyright and license notice (agreement) on their behalf, and agrees to inform his/her co-authors of the terms of this policy. Register will not be held liable for anything that may arise due to the author(s) internal dispute. Register will only communicate with the corresponding author.
Being an open accessed journal and disseminating articles for free under the Creative Commons license term mentioned, author(s) aware that Register entitles the author(s) to no royalties or other fees.
Register will publish the article (or have it published) in the journal if the article’s editorial process is successfully completed. Register's editors may modify the article to a style of punctuation, spelling, capitalization, referencing and usage that deems appropriate. The author acknowledges that the article may be published so that it will be publicly accessible and such access will be free of charge for the readers as mentioned in point 3.