scholarly journals Pengukuran Resiko Teknologi Informasi dengan Pendekatan FRAP: Studi Kasus Pada PT Cowell Development, Tbk

Author(s):  
Iwan Kurniawan Widjaya

The article purposes are to analyze, identify, and measure the risks found in the use of information technology. The research method used are literature study and field study upon observations, interviews, documentation, and FRAP (facilitated Risk Analysis Process) approach to measure the risk of information technology. The results found are positive and negative findings in the use of information technology. The exixting weaknesses allow the potential risks that may occur. The conclusion is there are vulnerabilities found in the use of information technology that need several recommendations on those risks to improve performance andguarantee data protection and information from any risk arise.

Author(s):  
Hari Setiabudi Husni ◽  
Tan Willy Tandra ◽  
Ade Anugrah

The objective of this research is to evaluate sales information system that is ongoing in PT XYZ and to identify problems in sales system and also to recommend a renovation suggestion towards sales application so it goes well, accurate, and high-quality. The research method in this paper is including important data and information collecting, literature study and field research: observation, interview and questionnaire. The result is identified that sales information system controlling in PT XYZ still needs development especially in upgrading system and recruitment in IT division to supervise application system to avoid potential risks that will influence targeting company objective. 


Author(s):  
Harijanto Pangestu

In a tighter business competition, company in original VCD/DVD rental needs strategic planning system and information technology to win the competition. In order to fulfill the information, the company is doing the system analysis and information technology, and also suggesting a plan to system developing and company’s information technology. The research method is doing literature study, field research, and analysis method and system planning and strategic information technology based on the method by Tozer. The expected result is through strategic system planning and information technology, the company could choose the exact strategy in solving internal problems. 


2020 ◽  
Vol 1 (2) ◽  
pp. 89-96
Author(s):  
Nila Hardi ◽  
Henny Leidiyana

A computer is a tool created to facilitate human work. In this era of information technology has achieved very good progress from the manufacture of hardware and software. TB. Harapan Mulya II is a trading company engaged in the sale of building materials. System on TB. Harapan Mulya II uses a system that is still manual, starting from recording user data, goods, customers, suppliers, incoming goods, items out, goods orders and the process of making reports relating to inventory. Allows the occurrence of errors in managing inventory, so that it can cause inaccurate inventory data. The research method used to compile this thesis uses the method of software development (waterfall) and data collection techniques include: Observation, interviews and literature study. By making the design of this program is the best solution to overcome the problems that exist today, as well as with computerized inventory of goods in this company so that all activities undertaken are better than the previous system.   Keywords: Inventory, Program, Design   Abstrak   Komputer merupakan alat yang diciptakan untuk mempermudah pekerjaan manusia. Pada era sekarang ini teknologi informasi sudah mencapai kemajuan yang sangat baik dari pembuatan hardware maupun software nya. TB. Harapan Mulya II merupakan perusahaan dagang yang bergerak dibidang penjualan bahan bangunan. Sistem pada TB. Harapan Mulya II menggunakan sistem yang masih manual, mulai dari pencatatan data user, barang, customer, supplier, barang masuk, barang keluar, order barang dan proses pembuatan laporan yang berhubungan dengan persediaan barang. Memungkinkan terjadinya kesalahan dalam mengelola persediaan barang, sehingga dapat menyebabkan ketidak akuratan data persediaan yang ada. Metode penelitian yang digunakan untuk menyusun tugas akhir ini menggunakan metode pengembangan perangkat lunak (waterfall) dan teknik pengumpulan datanya meliputi: Observasi, wawancara dan studi pustaka. Dengan pembuatan perancangan program ini merupakan soulsi yang terbaik untuk mengatasi permasalahan yang ada saat ini, serta dengan terkomputerisasinya persediaan barang di perusahaan ini sehingga semua kegiatan yang dijalani menjadi lebih baik lagi dari sistem terdahulu   Kata kunci: Persediaan, Perancangan, Program


Author(s):  
Indrajani Indrajani

The purpose of this research is to analyze, design, and implement tuning for the funding database, which include data mart processing that will be used in the formation of analytical reports. The research method used is literature study from a variety of journals, books, e-books, and articles on the internet. Fact findingtechniques are also done by analyzing, collecting, and examining the documents, interviews, and observations. Other the research methods are also used to analyze and design database such as SQL tuning, Partitioning, and Indexing. The results obtained from this research is an implementation tuning for the funding database, in which if it is implemented, it will improve performance significantly. The conclusion is by implementing tuning for the funding database, it can help the bank to improve the performance of database system and decrease time to produce analytical reports.


2013 ◽  
Vol 437 ◽  
pp. 857-860
Author(s):  
Anderes Gui ◽  
Hasnah Haron ◽  
Cecilia Sabrina ◽  
Jerom Timoti ◽  
Mochamad Yusuf ◽  
...  

The purpose of this study was to determine how the application of information technology and the risks of what might happen. Research methods used include literature studies, field studies by conducting observations, interview and study documentation. The approach used to conduct risk management of information technology is a method of Facilitated Risk Analysis Process (FRAP). The results are the discovery of the risks of using information technology. The conclusions of this study demonstrate the application of information technology is good enough because it takes only a little improvement in information technology risk management.


2021 ◽  
Vol 1 (2) ◽  
Author(s):  
Hanafi Fajar ◽  
Esi Putri Silmina

The advancement of computerized-based information technology which is able to play an important role as a tool in archiving documents such as incoming and outgoing mail, data processing, and can help solve small problems to very complex problems or even in decision support. At the Puruk Cahu City Health Office, the archiving of incoming and outgoing letters is still manual with notes in the agenda book which makes it difficult to search for letter files. This aims to create a system for collecting incoming and outgoing mail to make it easier for mail archiving and mail search. The research method used is the method of observation, interviews, and literature study. With the integrated design of the archiving information system at the Puruk Cahu City Health Service Office, it will be able to help the performance of the Puruk Cahu City Health Office employees.


Author(s):  
Dandy Ashghor Dawudi ◽  
Kamidjan Kamidjan ◽  
Agus Sulton

This research takes the object of Sebening Syahadat by Diva SR, this work is a novel that tells the story of the journey ofa teenager named Sam who is in the process ofsearching for identity. The journey is filled with interesting twits and turns embelissed with a love story that is very suitable if consumed by the younger generation who are learning to find identit. This study aims to reveal the value motives that led Sam’s character in finding his identity, which expected to be a material for reflection for readers, especially young people who are in the process of discovering his identity, the scope of the problem in this study is to reveal the value motives that affect the character’s psyche. Sam is told to have a rascal character.The research method used in this study took a descriptive qualitative approach, data colletion used was a literature study technique with stages of reading, note taking, coding for futher analysis. The analysis technique used is qualitative descriptive analysis technique.The result of the research in this research process indicate that the mental process of Sam’s character influenced by several factors, including: a. Motives in cultural factors (Situasional Factors), b. The motive for love begins with admiration for the attitude of someone who is full of noble values of character, c. The motive of curiosity and fulfillment of his needs for true value.


CCIT Journal ◽  
2019 ◽  
Vol 12 (2) ◽  
pp. 138-148
Author(s):  
H. Abdul Hamid Arribathi ◽  
Dedeh Supriyanti ◽  
Lusyani Sunarya

Information technology is increasingly developing and has a positive impact on the world of education. The implementation of student counseling with a Knowledge Management System is one of the contributions of information technology in the world of education. Many benefits provided by the Student Counseling Knowledge Management System, in managing the knowledge needed by the counselor section to document student consultations. The development and implementation of a KMS counseling system costs more to employ professional staff to maintain and improve; KMS student counseling application; For this reason, it is necessary to design a Cloud Computing-based Student Counseling Knowledge Management System. The research method carried out in the first stage is to collect data and information about Knowledge Management and Student Counseling, and how to use it to create a Knowledge Management System Application, Student Counseling Based on cloud computing. Furthermore, conducting a literature study and literature review, system design is in the form of data architecture compounding, process design, network design, and user interface design. The design results of this system can facilitate educational institutions in conducting online cloud computing-based student counseling


Author(s):  
Marsel Eliaser Liunokas

Timorese culture is patriarchal in that men are more dominant than women. As if women were not considered in traditional rituals so that an understanding was built that valued women lower than men. However, in contrast to the article to be studied, this would like to see the priority of women’s roles in traditional marriages in Belle village, South Central Timor. The role of women wiil be seen from giving awards to their parents called puah mnasi manu mnasi. This paper aims to look at the meaning of the rituals of puah mnasi maun mnasi and the role and strengths that women have in traditional marriage rituals in the village of Belle, South Central Timor. The method used for this research is a qualitative research method using interview techniques with a number of people in the Belle Villa community and literature study to strengthen this writing. Based on the data obtained this paper shows that the adat rituals of puah mnasi manu mnasi provide a value that can be learned, namely respect for women, togetherness between the two families, and brotherhood that is intertwined due to customary marital affrairs.


2018 ◽  
Vol 1 (1) ◽  
pp. 128-133
Author(s):  
Selvi Selvi

Economic globalization between countries becomes commonplace. Differences in financial rules are used for many parties to practice the Basic Erosion and Shifting Profit (BEPS) which leads to state losses. In tackling it has been agreed to implement Automatic Exchange of Information (AEoI), which automatically converts data into large data in the field of taxation.The research method of this paper is a literature study which combines several related literature and global and national implications using secondary data.Drawing up the conclusion that AEoI challenges have been theoretically overcome by Indonesia as a developing country. However, practically mash has not been able to find out whether it can be overcome or not because Indonesia still has not implemented AEoI


Sign in / Sign up

Export Citation Format

Share Document