Claim Missing Document
Check
Articles

Found 2 Documents
Search

Audit Procedures to Manage Information Systems Based on the DSS02 Domain in the COBIT5 Framework at Double - Six Luxury Hotel Seminyak Muhammad Sahi; Ida Ayu Gde Suwiprabayanti Putra; I Gusti Ayu Sri Melati
Applied Information System and Management (AISM) Vol 4, No 2 (2021): Applied Information System and Management (AISM)
Publisher : Depart. of Information Systems, FST, UIN Syarif Hidayatullah Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15408/aism.v4i2.19922

Abstract

Double-Six Luxury Hotel is currently implementing Information Technology (IT) to support the company's operations. However, there are obstacles in implementing IT, such as users who fail to log in or log out and there are disruptions to the network server caused by the disconnection of the fiber optic cable. Based on this, it is necessary to audit information system governance. This study using the COBIT 5 Framework with a conceptual method. This research focuses on the DSS (Delivery, Support, and Service) domain in the DSS02 process. The purpose of the study was to determine the current level of capability (as-is) and expected conditions (to-be), gaps, and provide recommendations regarding information system governance at Double-Six Luxury Hotels. The results of this study indicate that the current condition of the DSS02 process capability level is at level 2 (Managed Process) with a percentage of 67.5% in the Very Achieved (L) category where the process has been managed well but only most of it is not entirely and the expected conditions are at level 3 (Build Process). Based on these results, it is known that in the DSS02 process there is a gap of 1 between as-is and to-be, so the management in the DSS02 process is sure to carry out process definition and process development at level 3 (building process) to achieve the specified level target
ASOSIASI RULE MINING UNTUK REKOMENDASI PADA TRANSAKSI PEMINJAMAN BUKU MENGGUNAKAN FREQUENT PATTERN I Gusti Ayu Sri Melati; Rifky Lana Rahardian; I Made Lanang Putra Pringgadhan
Jurnal Tekinkom (Teknik Informasi dan Komputer) Vol 5 No 1 (2022)
Publisher : Politeknik Bisnis Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37600/tekinkom.v5i1.497

Abstract

The purpose of this study is to provide recommendations for grouping books at the ITB STIKOM Bali library, Jimbaran Campus. Currently, the placement of books in the ITB STIKOM Bali library, Jimbaran Campus, is still using a manual catalog. To make it easier for staff to manage books in the library, especially in terms of book data that can be borrowed, recommendations for grouping and placing books in the library are made based on the data on books that are most often borrowed together by library visitors obtained from previous borrowing data. This is done by data mining using the frequent pattern method. The use of this frequent pattern method is applied to the borrowing data of the ITB STIKOM Bali library at Jimbaran campus so that information or knowledge is obtained about recommendations for placing books that will be loaned to library members. This data mining processing is done using Weka software. The results of processing from the Association Rule data mining obtained 5 itemset combinations with confidence values ​​of 0.97, 0.96, 0.95. With the results of this data mining, the librarian obtains recommendations for grouping and placing books in the library through knowledge of the types of books that are most often borrowed.