Now What? Using Your Maturity Assessment to Achieve Business Goals

2014 ◽  
pp. 184-193
2019 ◽  
Vol 5 (2) ◽  
pp. 109-115
Author(s):  
Johanes Fernandes Andry ◽  
Gunawan Wang ◽  
Gusti Ngurah Suryantara ◽  
Devi Yurisca Bernanda

PT Hema Indonesia is manufacturing company established in 2001 and has continued to grow. Nowadays the company has supported business processes in various companies, such as the use of information systems. The purpose of this research is to get an overview of the performance of information systems in order to determine the extent of maturity level which is currently running, with a few aspects to consider such as effectiveness and, efficiency. Implementing IT governance, however, is a challenge to organizations. To ensure IT alignment with business goals use standard COBIT. The analytical tool used is the standard procedure COBIT issued by ISACA. In this paper the method to be used is COBIT 4.1. Coverage of Audit IT Domain are Plan Organize (PO), such as PO4, PO5, PO7 and PO8. The conclusion that can be drawn from the research that has been done is IT governance at the company has been done, although still run optimally within each IT process contained in the sub domain average on level repeatable and defined proses.


Author(s):  
Katherine Cullerton ◽  
Jean Adams ◽  
Martin White

The issue of public health and policy communities engaging with food sector companies has long caused tension and debate. Ralston and colleagues’ article ‘Towards Preventing and Managing Conflict of Interest in Nutrition Policy? An Analysis of Submissions to a Consultation on a Draft WHO Tool’ further examines this issue. They found widespread food industry opposition, not just to the details of the World Health Organization (WHO) tool, but to the very idea of it. In this commentary we reflect on this finding and the arguments for and against interacting with the food industry during different stages of the policy process. While involving the food industry in certain aspects of the policy process without favouring their business goals may seem like an intractable problem, we believe there are opportunities for progress that do not compromise our values as public health professionals. We suggest three key steps to making progress.


Author(s):  
Shengju Yang

In order to solve the trust problems between users and cloud computing service providers in cloud computing services, the existing trust evaluation technology and access control technology in the cloud computing service are analyzed. And the evaluation index of cloud computing is also analyzed. Users can calculate the relevant indicators of cloud computing service according to their own business goals, and choose the appropriate cloud computing services according to their own trust need. In addition, the reliability assessment method of users based on the service process is proposed. Cloud computing access control system can be used for user credibility evaluation, and it can handle user access requests according to user's creditability. In the study, a cloud computing service trust evaluation tool is designed, and the modeling and architecture designs of trust evaluation are also given. The effectiveness of the method is verified by experiments on cloud computing service evaluation methods.


Sign in / Sign up

Export Citation Format

Share Document