SlideShare a Scribd company logo
1 of 7
Http: //dinastirev.org/JIMT
Info@dinastirev.org
P-ISSN: 2686-5246, E-ISSN: 2686-4924
Doi/xxx/999/xxx
Submission Date: 01/09/2019, No. 1, Vol. 1, Issue 1, Sept 2019
Accepted Date: 11/09/2019,
Published Date: 21/09/2019, Page:1
IMPLEMENTATION OF INTERNAL CONTROL INFORMATION SYSTEM
IN TRAVELOKA COMPANY
*
Tashya Amaraesty
* Prof. Dr. Hapzi Ali, Ir, MM, CMA, MPM
* Mercu Buana University Menteng
Abstract
The development of information technology has changed the world to become easier and bring development and progress in all
fields. With the support of computer technology it is proven that the mechanismof long and repetitive work becomes effective
and efficient. Information systems play an important role in supporting the smooth work activities in an information, how to
organize data with a database systemthat has been supporting the performance of many agencies.
Writing Purpose This would like to know how much influence an information system is implemented in a company and what
are the strengths and weaknesses arising from the application of an information system in a traveloka company. This writing
uses a qualitative method with literauture studies in the field of Scientific Information Systems and Information Technology
(IT). Information is obtained from the artiker, module and the internet. Besides that, based on empirical experience and dire ct
observation on the object of research.
Keywords: Information System, Internal Control, Traveloka
1. Preliminary
Technological developments have changed the world more easily and brought development and progress in all
fields. With the support of computer technology proven from long and repetitive work to be effective and efficient.
The computer plays an important role in supporting the smooth work activities in an information, data method with
a database system that has been supporting the support of many institutions.
Information is very important for management in making decisions, information can be obtained from
information systems. The rapid development of information requires an institution to make changes in an existing
system, because the problems involved are growing.
Dependence on information systems in the modern era is something that is still shared by all groups. Utilization
of technology for information systems began to be complicated for use by companies starting, this proves that
multi-national class companies or fairly large companies only implement information systems.
One company that uses the information system is Traveloka, a traveloka company that uses smart phone
technology based on Android or I-phone OS to serve in the field of travel services, wherever and wherever the
information system supported by the organization or company provides assistance to customers or OS consumers .
This information system is connected to a large network that is the internet making it easier for companies from
customers or customers. With the internet the company has also been helped in expanding its reach.
This modern era puts selected technology as a tool for process automation so that it becomes an important factor
in managing business strategies. Computer-based information management systems with business strategies are a
diamond step to get a competitive advantage from success. But,of course there are advantages and benefits that can
be received by the system, still in essence that exists as flaws and weaknesses in the system, which can occur due to
internal and external factors. Weaknesses that can also occur due to Fraud that can be rejected modern information
systems. For this reason,a company or institution requests an apprenticeship permit to minimize shortcomings and
shortcomings of a system.
Http: //dinastirev.org/JIMT
Info@dinastirev.org
P-ISSN: 2686-5246, E-ISSN: 2686-4924
Doi/xxx/999/xxx
Submission Date: 01/09/2019, No. 1, Vol. 1, Issue 1, Sept 2019
Accepted Date: 11/09/2019,
Published Date: 21/09/2019, Page:2
2. Literature Review
Understanding the system
The system is a collection of elements that are interrelated and work together for a particular purpose.
Understanding the system according to Andri Kristanto (2008: 1) is a network of interrelated procedures,
coordinating together to carry out various activities or complete certain targets. Another case according to Budi
Sutedjo Dharma Oetomo (2006: 168), the system is a collection of elements that are interconnected with each other
that form a unity in an effort to achieve goals. Meanwhile according to Jogiyanto (2005: 1), a system is a collection
of elements - elements that integrate to achieve certain goals.
From the description above we can know about the system that compiles a collection of subsystems that
have a specific purpose, where within the subsystem there are certain tasks to become a unity in achieving a goal.
According Jogiyanto (2005: 4) the system has several characteristics as follows:
1. Has Components (components)
A system consists of several interconnected components, which are intended to work together to form a unity.
System components or system elements can form a subsystem or parts of the system that have the properties of the
system that make a particular system and affect the overall system process.
2. Has a System Limit (limit)
System boundary (boundary) is an area that is determined between the system with other systems or with the
external environment. This system limit allows a system to choose a place. System space limits the scope of the
system.
3. The existence of the environment outside the system
Environment outside the system is anything that exceeds the limits of the system that improves the operating
system.
4. Having Connections
Liaison is a media liaison between one subsystem with another subsystem, which uses resources - resources flow
from one subsystem to another subsystem. By connecting one subsystem, it can integrate with other subsystems to
form a single unit.
5. Has input (input)
Enter is the energy put into the system.
6. Has Output (output)
Output is the result of energy processed and classified into useful output and residual waste. Output can be input for
other systems.
7. Has a processor (process)
A system can have a processing part or the system itself as the processor. Processor that will convert input into
output.
8. Having goals (objectives) or goals (goals)
A system will definitely have a goal (goal) or target (objectives). If the system does not have a target, then the
system operation will be of no use. The system goal is to determine the input needed by the system and the output
produced by the system. The system can be said to be successful when it comes to goals and objectives.
Understanding Information
Information is one of the most important types of resources owned by an organization. Seeing the
importance of the role of information, information needs to be managed well in order to help an organization to
obtain quality information. According to Budi Sutedjo Dharma Oetomo (2006: 168) information is the result of
processing data obtained from each element of the system into a form that is easily understood and is relevant
knowledge needed by people separately to increase their understanding of the facts that exist. Meanwhile, according
to Azhar Susanto (2004: 18) information is the result of data processing that gives meaning and benefits.
From the above understanding it can be concluded that information is the result of data processing that
gives meaning or meaning and is useful or beneficial for the recipient of the information. According to Gelinas in
Http: //dinastirev.org/JIMT
Info@dinastirev.org
P-ISSN: 2686-5246, E-ISSN: 2686-4924
Doi/xxx/999/xxx
Submission Date: 01/09/2019, No. 1, Vol. 1, Issue 1, Sept 2019
Accepted Date: 11/09/2019,
Published Date: 21/09/2019, Page:3
Azhar Susanto (2004: 41) expresses his opinion about the characteristics of an information. These characteristics
are:
1. Effectiveness means information must be in accordance with the needs of users in supporting a business process,
including information must be presented in the right time, the right format so that it can be understood, consistent
with the previous format, the contents are in accordance with current needs and complete or in accordance with
needs and conditions.
2. Efficiency means that information is produced through the optimal use of resources.
3. Confidential means to pay attention to protection or protection of sensitive information from unauthorized parties.
4. Integrity means that the information generated must be the result of integrated data processing based on
applicable rules.
5. Availability means that the information needed must always be available whenever needed. For this reason,
security of information resources is needed.
6. Compliance means that the information generated must comply with laws or government regulations and have
responsibilities both internal and external parties of the company's organization.
7. Truth means that information has been presented by the information system correctly and can be trusted so that it
can be used by management to operate the company.
Understanding Information Systems
Information systems in a system include data entry (input) then processed through a model in data
processing and information results will be captured again as an input and so on so as to form an information cycle
that can be obtained from the information system as a special system in the organization to process the information.
At a glance the information system can be interpreted as a combination of people, facilities or technological tools,
media, procedures and control over certain activities that produce an information that can be utilized by the wearer.
According to Budi Sutedjo Dharma Oetomo (2006: 11) information systems can be defined as a collection of
elements that are interconnected with each other that form a single unit to integrate data, process and store and
distribute information. Another case with Al-Bahra Bin Ladjamudin (2005: 13) information systems are defined as a
set of organizational procedures that when implemented will provide information for decision makers and or for
controlling information. Then we can conclude that the information system is a unity of elements that interact with
each other systematically and orderly to create and shape the flow of information that supports decision making.
The information system activities are as follows:
1. Input, which describes an activity to provide data for the process.
2. Process, which describes how a data is processed to produce information that has added value.
3. Storage, which is an activity to maintain and store data.
4. Output, which is an activity to produce a report of an information process.
5. Control, which is an activity to ensure that the information system runs as expected.
While the information system components consist of:
1. Hardware (hardware), consisting of computers, printers, networks.
2. Software (software).
3. Data, is a basic component of information.
4. Human (user).
Definition of Fraud
Fraud includes various irregularities and illegal actions that are marked by intentional or wrong fraud. The
Institute of Internal Auditors (IIA) defines fraud as:
"Any illegal action marked by deception, concealment, or breach of trust This action does not depend on the threat
of violence or physical force. Fraud is committed by parties and organizations to obtain money, property or
services; to avoid payment or loss of services; or to secure personal or business benefits. "
Http: //dinastirev.org/JIMT
Info@dinastirev.org
P-ISSN: 2686-5246, E-ISSN: 2686-4924
Doi/xxx/999/xxx
Submission Date: 01/09/2019, No. 1, Vol. 1, Issue 1, Sept 2019
Accepted Date: 11/09/2019,
Published Date: 21/09/2019, Page:4
Another definition of cheating from the publication of the Practical Guide, which is sponsored by the American
Institute of Certified Public Accountants, and the Certified Fraud Examiner Association, states:
"Fraud is a deliberate act or omission that is designed to deceive others, resulting in victims suffering losses and / or
perpetrators achieving profits."
common characteristics of cheating:
1. Pressure can come from the needs that must be met by individuals by committing fraud. Often, the pressure
comes from significant finances, this problem may include the need to keep a job or get a bonus. Generally jobs
have large targets or other financial rewards can be obtained based on meeting certain performance goals. The
perpetrator has a desire to maintain his position in the organization and to maintain certain standards of life to
compete with his peers.
2. Opportunity is the ability to commit fraud and not be detected because the perpetrators do not want to be caught
in their actions, they have confidence that their activities will not be detected. Fraud opportunities exist because of
weak internal control, poor management, lack of board oversight, and / or through the use of one's position and
authority to override control. Failure to establish adequate procedures for detecting fraudulent activity also increases
the chances of fraud occurring. A process might be designed correctly for typical conditions, however, a window of
opportunity might arise creating a state so that control fails.
Internal control
Internal control is a process implemented by the board of directors, as well as all employees under their
direction with the aim of providing adequate guarantees for the achievement of control objectives. In general,
internal control is part of each system used as procedures and operational guidelines for companies or organizations
companies generally use an internal control system to direct company operations and prevent system misuse (ISSN-
1174 Emba Journal, A. Paul.)
The Committee of Sponsoring Organizations of the Treadway Commission (COSO) in 1992 issued a
definition of internal control. The COSO definition of internal control is as follows: Internal control system is a
process that involves the board of commissioners, management, and other personnel, which is designed to provide
adequate confidence about achieving the following three objectives:
• Effectiveness and efficiency of operations
• Reliability of financial reporting
• Compliance with applicable laws and regulations.
In the latest edition, COSO (2013: 3) defines internal control as follows:
"Internal control is a process, effected by an entity's boar of directors, manage- ment, and other personnel, designed
to provide reasonable assurance regarding the achievement of objectives relating to operations, reporting, and
compliance. "
Understanding internal control according to the COSO, it can be understood that internal control is a
process, because it penetrates the operational activities of the organization and is an internal part of basic
management activities. Internal control can only provide adequate confidence, not absolute confidence. This
confirms that no matter how well internal controls are designed and operated, they can only provide adequate
confidence, and cannot be fully effective in achieving internal control objectives even though they have been
designed and arranged in the best way possible. Even though the ideal internal control is well designed, but success
depends on competition and the constraints of the implementation that is inseparable from various limitations.
3. Method
The method of writing this article is a descriptive qualitative method and library research, where the author
obtained from modules, texts, or the internet, besides that based on empirical experience and direct research on
research objects in traveloka companies.
Http: //dinastirev.org/JIMT
Info@dinastirev.org
P-ISSN: 2686-5246, E-ISSN: 2686-4924
Doi/xxx/999/xxx
Submission Date: 01/09/2019, No. 1, Vol. 1, Issue 1, Sept 2019
Accepted Date: 11/09/2019,
Published Date: 21/09/2019, Page:5
4. Result And Discussion
Dependence on information systems in the modern era is something that is still felt by all circles. The use of
technology for information systems began to be used by start-up companies, this proves that not only multi-national
class companies or fairly large companies are implementing information systems. For example Traveloka, traveloka
companies utilize Android-based smart phone technology or OS I-phone to serve in the service sector, namely
travel, wherever and wherever information systems have been widely used by organizations or companies in
providing services to customers or consumers. This information system is connected to a large network, namely the
internet, making it easier for both the company and customers or consumers. With the internet the company is also
helped in expanding its reach. In this modern era the position of computer technology is seen as important as a tool
for automation of processes so that it becomes an essential factor in determining business strategies. combining
computer-based management information systems with business strategies is a diamond step to get a competitive
advantage from competitors.
However, behind the benefits, there are also problems that occur in this company both internally and
externally, such problems are, recently, there have been cases where accounts from traveloka can be broken by
parties who are not the account owners, which have an impact on user unrest , who are disadvantaged when opening
a traveloka account and email notification of traveloka bills on paylater payment method transactions through the
account carried out by unscrupulous persons, this is a criminal activity which is fraudulent behavior and has
violated the law this can also occur due to accidental application or omission of an existing system which includes
threats from the accounting information system.
This can happen where not the owner of a traveloka account can actually activate PayLater by entering
another name and data of another person or false data and then misusing the account by using the paylater
opportunity with the maximum limit to buy plane tickets or other after it appears the bill must paid by the original
owner of the traveloka account itself automatically even though the account owner does not feel ordered or activate
the PayLater.
This includes computer attacks, namely DNS Spoofing type spoofing. After the account owner is aware of
and reports to traveloka and traced, this can occur mostly because the email address is connected to Google, this can
be overcome by Sniffer by detecting the presence of smugglers in the network, cases this, initially the account
owner actually will not realize this because traveloka is functioning properly but after the transaction has occurred
suddenly there is an incoming bill via email that makes the account owner aware. This can happen also related to
trojans by stealing the password of the account and using cookies stuffing by hijacking the traveloka account, also
related to PHP Injection where the Hacker can make fake data and confirmed or trusted by the traveloka so that
there is an abuse of the account that harms the real account owner itself. Security attacks also occur namely
interception and modification and fabrication. This can also be dealt with by Traveloka to tighten security aspects of
computers such as Athentication, Integrity, Non-repudiation, Authority, Confithentiality, Privacy, Availability and
Access Control in order to minimize incidents like this.
In general, control is part of each system that is used as operational procedures and guidelines for a particular
company or organization. Companies generally use internal controls to direct the company's operations and prevent
system misuse. However, it must be stressed once again that no matter how well internal controls are designed and
operated, they can only provide adequate confidence, cannot be fully effective in achieving internal control
objectives even though they have been designed and arranged in the best way possible. Even though the ideal
internal control is well designed, but success depends on competition and the constraints of the implementation that
is inseparable from various limitations.
In its implementation too, many cases that occur in large traveloka companies are still not effective in
carrying out internal control, this case occurs when there is a breakdown of the traveloka paylater system that still
harms many people including me, how can the confidentiality of one's data be accessed and burglarized in such a
way as to cause financial losses suffered by the victims concerned. Of course in this case the traveloka must be able
to improve the components of internal control carried out, especially in terms of Risk Assessment and Control
Activities.
Http: //dinastirev.org/JIMT
Info@dinastirev.org
P-ISSN: 2686-5246, E-ISSN: 2686-4924
Doi/xxx/999/xxx
Submission Date: 01/09/2019, No. 1, Vol. 1, Issue 1, Sept 2019
Accepted Date: 11/09/2019,
Published Date: 21/09/2019, Page:6
At Traveloka company, ethics in the information society, the official traveloka account owner asks for
protection of account ownership by blocking ovo paylater that has been misused by account breakers, in identifying
company stakeholders providing solutions to change passwords and traveloka has blocked the paylater after that
traveloka gives the view that the account can be broken into because the email used by authorized users of the
account is connected by google, with the existence of the traveloka party suspected the possibility of being broken
because of it. This incident is clearly detrimental to the official traveloka user himself, because the right to use the
paylater cannot be reused due to being blocked by traveloka and the opportunity to use the paylater cannot be used.
The occurrence of paylater breakthroughs from irresponsible people, this shows that Traveloka has not
fulfilled 7 COBIT criteria (Effectiveness, Confidentiality, Integrity, Availability, Compliance and Reliable) in its
business field. Broadly speaking the Control Objective for Information and Related Technology (COBIT) at
Traveloka has been implemented but, the results are not good, please note traveloka has been handled structurally in
the System and Information Technology Division (DIVSI) headed by a Head of Division under the Directors, and
supervised by the financial services authority (OJK) but this is still lacking because account burglary cases can still
occur repeatedly.
For business risk management or Enterprise Risk Management (ERM), Traveloka forms a Division under the
Board of Directors that handles risks faced by the company or that may arise in the company. This division
conducts mapping, categorizing and making risk mitigation which is then evaluated and controlled continuously
every month, quarterly, semester and yearly. However, although Traveloka has implemented this, the paylater
incident according to the news, there are still many complaints the same thing.
5. Conclusion And Recommendation
Conclusion
In the implementation of the rampant cases that occur in large companies including traveloka in carrying
out internal control is still not effective, this case occurs when the traveloka paylater system pemboboaln that still
harms many people including the author himself, where the confidentiality of one's data can be accessed and
compromised in such a way that incur financial losses suffered by the victims concerned. Of course in this case the
traveloka must be able to improve the components of internal control carried out, especially in terms of Risk
Assessment and Control Activities.
Recommendation
In the case of cases like this need to be improved fraud detection, this can be minimized by tightening
security to log in from mobile phones or other gadgets by improving existing systems and tightening supervision of
internal controls of the traveloka company itself can help indicate fraud and minimize existing fraud, and improve
the application of COBIT, COSO and ERM in traveloka companies so that burglary events can be minimized until
they do not occur.
Refference
Http: //dinastirev.org/JIMT
Info@dinastirev.org
P-ISSN: 2686-5246, E-ISSN: 2686-4924
Doi/xxx/999/xxx
Submission Date: 01/09/2019, No. 1, Vol. 1, Issue 1, Sept 2019
Accepted Date: 11/09/2019,
Published Date: 21/09/2019, Page:7
Accounting Information for Internal Revenue Control. EMBA Journal - ISSN 2303-1174.
Information System and Internal Control Lecture Module 1-5 meetings by Prof. Dr. Ir. Hapzi Ali, MM, CMA
www.slideshare.net/mobile/MAYANIH1/sipi-mayanih-prof-hapzi-ali-sistem-informasi- implementasi-pada-pt-
karya-baru-jaya-persada-universitas-mercu-buana-2018-pdf (Accessed 5 October 2019, 12:04)
mediakonsumen.com/2019/05/08/surat-pembaca/account-paylater-traveloka-dibobol-hacker-korban-tetap-dib
Charge-billing (accessed 05 October 2019 at 09.41)
www.slideshare.net/HAJUINIZEIN/sipihajuinihafzi-ali-pendalian-internal-cosouniversitas-mercu-buana2018pdf
(Access 05 October 2019 At 09.45)
Halomoan Ompusunggu. (2002) Effects of Application of Accounting Information Systems On the Effectiveness of
the Implementation of the Internal Control System, ejornal maranatha
Ni Made Sudiaranti (2017) Effect of Human Resources Competence on Implementation Government Internal
Control Systems and Government Accounting Standards and Their Implications on the Quality of Local
Government Financial Statements. Journal of Udayana University
Poniman. 2004. Effects of Accounting Information on Managerial Performance with three Moderating Variables:
Empirical Study of Rural Bank Regional Bank Semarang in Semarang. Library of UNDIP.
Rahman, Syaiful., M. Nasir., Sri Handayani. 2007. Effect of Performance Measurement Systems Towards Clarity of
Roles, Psychological Empowerment and Managerial Performance (Partial Least Square Approach): Research
on Managers of Manufacturing Companies in Central Java. Accounting National Symposium X. Makassar.
Steffi Sigilipu (2013) Effects of Application of Management Accounting Information and Systems Performance
Measurement Against 1, No Managerial Performance. ejournal Unstrat Vol.3 No.1
Xu, Hongjiang. April 2009. Data Quality Issues for Accouting Information Sytems Implementation : System,
Stakeholders, and Organizational Factors. Journal of Technology Research. Vol. 1, Pp. 1-11.

More Related Content

What's hot

Application of Savings and Loan Cooperative Services
Application of Savings and Loan Cooperative ServicesApplication of Savings and Loan Cooperative Services
Application of Savings and Loan Cooperative ServicesYogeshIJTSRD
 
Ahlan, arshad, ajayi 2014 - it governance in a malaysian public institute o...
Ahlan, arshad, ajayi   2014 - it governance in a malaysian public institute o...Ahlan, arshad, ajayi   2014 - it governance in a malaysian public institute o...
Ahlan, arshad, ajayi 2014 - it governance in a malaysian public institute o...Binyamin Ajayi
 
Information system
Information systemInformation system
Information systemHiren Mistry
 
THE EFFECT OF SERVICE INFLUENCE FACTORS ON PERCEIVED USEFULNESS AND USE SATIS...
THE EFFECT OF SERVICE INFLUENCE FACTORS ON PERCEIVED USEFULNESS AND USE SATIS...THE EFFECT OF SERVICE INFLUENCE FACTORS ON PERCEIVED USEFULNESS AND USE SATIS...
THE EFFECT OF SERVICE INFLUENCE FACTORS ON PERCEIVED USEFULNESS AND USE SATIS...IAEME Publication
 
APEC Framework for Securing the Digital Economy
APEC Framework for Securing the Digital EconomyAPEC Framework for Securing the Digital Economy
APEC Framework for Securing the Digital EconomyETDAofficialRegist
 
DIGITALIZATION AND DIGITAL TRANSFORMATION IN TAKING THE OMAN ACADEMIC ACCREDI...
DIGITALIZATION AND DIGITAL TRANSFORMATION IN TAKING THE OMAN ACADEMIC ACCREDI...DIGITALIZATION AND DIGITAL TRANSFORMATION IN TAKING THE OMAN ACADEMIC ACCREDI...
DIGITALIZATION AND DIGITAL TRANSFORMATION IN TAKING THE OMAN ACADEMIC ACCREDI...IAEME Publication
 
An Empirical Study on the information systems in the Moroccan organizations: ...
An Empirical Study on the information systems in the Moroccan organizations: ...An Empirical Study on the information systems in the Moroccan organizations: ...
An Empirical Study on the information systems in the Moroccan organizations: ...INFOGAIN PUBLICATION
 
Introduction to information system
Introduction to information systemIntroduction to information system
Introduction to information systemAndino Maseleno
 
User participation in ERP Implementation: A Case-based Study
User participation in ERP Implementation: A Case-based StudyUser participation in ERP Implementation: A Case-based Study
User participation in ERP Implementation: A Case-based StudyEditor IJCATR
 
Business Information Systems by Patrick Linhart
Business Information Systems by Patrick LinhartBusiness Information Systems by Patrick Linhart
Business Information Systems by Patrick LinhartPatrick Linhart
 
What is information system\
What is information system\What is information system\
What is information system\Surya sidarta
 
Sociotechnical Management Model for Governance of an Ecosystem
Sociotechnical Management Model for  Governance of an Ecosystem Sociotechnical Management Model for  Governance of an Ecosystem
Sociotechnical Management Model for Governance of an Ecosystem IJMIT JOURNAL
 
Issues on Management and Governance of Data Security In HEIs
Issues on Management and Governance of Data Security In HEIsIssues on Management and Governance of Data Security In HEIs
Issues on Management and Governance of Data Security In HEIsijtsrd
 
Implementation of enterprise resource planning systems in kenyan public unive...
Implementation of enterprise resource planning systems in kenyan public unive...Implementation of enterprise resource planning systems in kenyan public unive...
Implementation of enterprise resource planning systems in kenyan public unive...Alexander Decker
 

What's hot (20)

Application of Savings and Loan Cooperative Services
Application of Savings and Loan Cooperative ServicesApplication of Savings and Loan Cooperative Services
Application of Savings and Loan Cooperative Services
 
Ahlan, arshad, ajayi 2014 - it governance in a malaysian public institute o...
Ahlan, arshad, ajayi   2014 - it governance in a malaysian public institute o...Ahlan, arshad, ajayi   2014 - it governance in a malaysian public institute o...
Ahlan, arshad, ajayi 2014 - it governance in a malaysian public institute o...
 
Information system
Information systemInformation system
Information system
 
THE EFFECT OF SERVICE INFLUENCE FACTORS ON PERCEIVED USEFULNESS AND USE SATIS...
THE EFFECT OF SERVICE INFLUENCE FACTORS ON PERCEIVED USEFULNESS AND USE SATIS...THE EFFECT OF SERVICE INFLUENCE FACTORS ON PERCEIVED USEFULNESS AND USE SATIS...
THE EFFECT OF SERVICE INFLUENCE FACTORS ON PERCEIVED USEFULNESS AND USE SATIS...
 
APEC Framework for Securing the Digital Economy
APEC Framework for Securing the Digital EconomyAPEC Framework for Securing the Digital Economy
APEC Framework for Securing the Digital Economy
 
DIGITALIZATION AND DIGITAL TRANSFORMATION IN TAKING THE OMAN ACADEMIC ACCREDI...
DIGITALIZATION AND DIGITAL TRANSFORMATION IN TAKING THE OMAN ACADEMIC ACCREDI...DIGITALIZATION AND DIGITAL TRANSFORMATION IN TAKING THE OMAN ACADEMIC ACCREDI...
DIGITALIZATION AND DIGITAL TRANSFORMATION IN TAKING THE OMAN ACADEMIC ACCREDI...
 
An Empirical Study on the information systems in the Moroccan organizations: ...
An Empirical Study on the information systems in the Moroccan organizations: ...An Empirical Study on the information systems in the Moroccan organizations: ...
An Empirical Study on the information systems in the Moroccan organizations: ...
 
MTP for MCA
MTP for MCAMTP for MCA
MTP for MCA
 
Introduction to information system
Introduction to information systemIntroduction to information system
Introduction to information system
 
User participation in ERP Implementation: A Case-based Study
User participation in ERP Implementation: A Case-based StudyUser participation in ERP Implementation: A Case-based Study
User participation in ERP Implementation: A Case-based Study
 
MTP for MCA
MTP for MCAMTP for MCA
MTP for MCA
 
Business Information Systems by Patrick Linhart
Business Information Systems by Patrick LinhartBusiness Information Systems by Patrick Linhart
Business Information Systems by Patrick Linhart
 
2012 final leadership survey with cover
2012 final leadership survey with cover2012 final leadership survey with cover
2012 final leadership survey with cover
 
What is information system\
What is information system\What is information system\
What is information system\
 
Sociotechnical Management Model for Governance of an Ecosystem
Sociotechnical Management Model for  Governance of an Ecosystem Sociotechnical Management Model for  Governance of an Ecosystem
Sociotechnical Management Model for Governance of an Ecosystem
 
Issues on Management and Governance of Data Security In HEIs
Issues on Management and Governance of Data Security In HEIsIssues on Management and Governance of Data Security In HEIs
Issues on Management and Governance of Data Security In HEIs
 
Accounting informationsystem
Accounting informationsystemAccounting informationsystem
Accounting informationsystem
 
Implementation of enterprise resource planning systems in kenyan public unive...
Implementation of enterprise resource planning systems in kenyan public unive...Implementation of enterprise resource planning systems in kenyan public unive...
Implementation of enterprise resource planning systems in kenyan public unive...
 
IT 2000 National IT Policy
IT 2000 National IT PolicyIT 2000 National IT Policy
IT 2000 National IT Policy
 
Mis9 ch03 ppt (2)
Mis9 ch03 ppt (2)Mis9 ch03 ppt (2)
Mis9 ch03 ppt (2)
 

Similar to IMPLEMENTATION OF INTERNAL CONTROL INFORMATION SYSTEM IN TRAVELOKA COMPANY

Artikel MIS, Hapzi Ali, Ulfa Nurhaliza, Dwi Alfianty Restu Fauzi, Rilnawati P...
Artikel MIS, Hapzi Ali, Ulfa Nurhaliza, Dwi Alfianty Restu Fauzi, Rilnawati P...Artikel MIS, Hapzi Ali, Ulfa Nurhaliza, Dwi Alfianty Restu Fauzi, Rilnawati P...
Artikel MIS, Hapzi Ali, Ulfa Nurhaliza, Dwi Alfianty Restu Fauzi, Rilnawati P...ulfa333
 
Article mis, hapzi ali, nur rizqiana, nanda suharti, nurul, anisa dwi, vin...
Article mis, hapzi ali, nur    rizqiana, nanda suharti, nurul, anisa dwi, vin...Article mis, hapzi ali, nur    rizqiana, nanda suharti, nurul, anisa dwi, vin...
Article mis, hapzi ali, nur rizqiana, nanda suharti, nurul, anisa dwi, vin...Heru Ramadhon
 
SI & PI, Priscilla M. Adeline K., Hapzi Ali, Implementation of Information Sy...
SI & PI, Priscilla M. Adeline K., Hapzi Ali, Implementation of Information Sy...SI & PI, Priscilla M. Adeline K., Hapzi Ali, Implementation of Information Sy...
SI & PI, Priscilla M. Adeline K., Hapzi Ali, Implementation of Information Sy...Priscilla Maria Adeline Kristianto
 
Corporate Policy Governance in Secure MD5 Data Changes and Multi Hand Adminis...
Corporate Policy Governance in Secure MD5 Data Changes and Multi Hand Adminis...Corporate Policy Governance in Secure MD5 Data Changes and Multi Hand Adminis...
Corporate Policy Governance in Secure MD5 Data Changes and Multi Hand Adminis...IOSR Journals
 
Article mis, hapzi ali, nur rizqiana, nanda suharti, nurul, anisa dwi, vini...
Article mis, hapzi ali, nur   rizqiana, nanda suharti, nurul, anisa dwi, vini...Article mis, hapzi ali, nur   rizqiana, nanda suharti, nurul, anisa dwi, vini...
Article mis, hapzi ali, nur rizqiana, nanda suharti, nurul, anisa dwi, vini...vinitanf
 
A Research Project PresentationOnline Policies for Enabling Fi.docx
A Research Project PresentationOnline Policies for Enabling Fi.docxA Research Project PresentationOnline Policies for Enabling Fi.docx
A Research Project PresentationOnline Policies for Enabling Fi.docxmakdul
 
Influence of User Ability On The Quality of Accounting Information System
Influence of User Ability On The Quality of Accounting Information SystemInfluence of User Ability On The Quality of Accounting Information System
Influence of User Ability On The Quality of Accounting Information SystemArnol Awal
 
Business Process Reengineering to build up an Information System for more fle...
Business Process Reengineering to build up an Information System for more fle...Business Process Reengineering to build up an Information System for more fle...
Business Process Reengineering to build up an Information System for more fle...Ferri Anwar
 
introductiontoinformationsystem-191011131621 (1).pdf
introductiontoinformationsystem-191011131621 (1).pdfintroductiontoinformationsystem-191011131621 (1).pdf
introductiontoinformationsystem-191011131621 (1).pdfpempherojovanbanda
 
Introduction to information system
Introduction to information systemIntroduction to information system
Introduction to information systemPROF.JITENDRA PATEL
 
[MU630] 003. Business Information System
[MU630] 003. Business Information System[MU630] 003. Business Information System
[MU630] 003. Business Information SystemAriantoMuditomo
 
research publish journal
research publish journalresearch publish journal
research publish journalrikaseorika
 
paper publication
paper publicationpaper publication
paper publicationrikaseorika
 
Influence User Involvement On The Quality Of Accounting Information System
Influence User Involvement On The Quality Of Accounting Information SystemInfluence User Involvement On The Quality Of Accounting Information System
Influence User Involvement On The Quality Of Accounting Information SystemArnol Awal
 
Accounting Information Systems Australasian 1st Edition Romney Solutions Manual
Accounting Information Systems Australasian 1st Edition Romney Solutions ManualAccounting Information Systems Australasian 1st Edition Romney Solutions Manual
Accounting Information Systems Australasian 1st Edition Romney Solutions Manualxexunidop
 
Running Head Information System .docx
Running Head Information System                                  .docxRunning Head Information System                                  .docx
Running Head Information System .docxwlynn1
 

Similar to IMPLEMENTATION OF INTERNAL CONTROL INFORMATION SYSTEM IN TRAVELOKA COMPANY (20)

Artikel MIS, Hapzi Ali, Ulfa Nurhaliza, Dwi Alfianty Restu Fauzi, Rilnawati P...
Artikel MIS, Hapzi Ali, Ulfa Nurhaliza, Dwi Alfianty Restu Fauzi, Rilnawati P...Artikel MIS, Hapzi Ali, Ulfa Nurhaliza, Dwi Alfianty Restu Fauzi, Rilnawati P...
Artikel MIS, Hapzi Ali, Ulfa Nurhaliza, Dwi Alfianty Restu Fauzi, Rilnawati P...
 
Article mis, hapzi ali, nur rizqiana, nanda suharti, nurul, anisa dwi, vin...
Article mis, hapzi ali, nur    rizqiana, nanda suharti, nurul, anisa dwi, vin...Article mis, hapzi ali, nur    rizqiana, nanda suharti, nurul, anisa dwi, vin...
Article mis, hapzi ali, nur rizqiana, nanda suharti, nurul, anisa dwi, vin...
 
SI & PI, Priscilla M. Adeline K., Hapzi Ali, Implementation of Information Sy...
SI & PI, Priscilla M. Adeline K., Hapzi Ali, Implementation of Information Sy...SI & PI, Priscilla M. Adeline K., Hapzi Ali, Implementation of Information Sy...
SI & PI, Priscilla M. Adeline K., Hapzi Ali, Implementation of Information Sy...
 
Corporate Policy Governance in Secure MD5 Data Changes and Multi Hand Adminis...
Corporate Policy Governance in Secure MD5 Data Changes and Multi Hand Adminis...Corporate Policy Governance in Secure MD5 Data Changes and Multi Hand Adminis...
Corporate Policy Governance in Secure MD5 Data Changes and Multi Hand Adminis...
 
D017141823
D017141823D017141823
D017141823
 
Article mis, hapzi ali, nur rizqiana, nanda suharti, nurul, anisa dwi, vini...
Article mis, hapzi ali, nur   rizqiana, nanda suharti, nurul, anisa dwi, vini...Article mis, hapzi ali, nur   rizqiana, nanda suharti, nurul, anisa dwi, vini...
Article mis, hapzi ali, nur rizqiana, nanda suharti, nurul, anisa dwi, vini...
 
A Research Project PresentationOnline Policies for Enabling Fi.docx
A Research Project PresentationOnline Policies for Enabling Fi.docxA Research Project PresentationOnline Policies for Enabling Fi.docx
A Research Project PresentationOnline Policies for Enabling Fi.docx
 
Development of Web-Based ISSS (Integration of Single Selling System) To Incre...
Development of Web-Based ISSS (Integration of Single Selling System) To Incre...Development of Web-Based ISSS (Integration of Single Selling System) To Incre...
Development of Web-Based ISSS (Integration of Single Selling System) To Incre...
 
Influence of User Ability On The Quality of Accounting Information System
Influence of User Ability On The Quality of Accounting Information SystemInfluence of User Ability On The Quality of Accounting Information System
Influence of User Ability On The Quality of Accounting Information System
 
Business Process Reengineering to build up an Information System for more fle...
Business Process Reengineering to build up an Information System for more fle...Business Process Reengineering to build up an Information System for more fle...
Business Process Reengineering to build up an Information System for more fle...
 
introductiontoinformationsystem-191011131621 (1).pdf
introductiontoinformationsystem-191011131621 (1).pdfintroductiontoinformationsystem-191011131621 (1).pdf
introductiontoinformationsystem-191011131621 (1).pdf
 
Introduction to information system
Introduction to information systemIntroduction to information system
Introduction to information system
 
[MU630] 003. Business Information System
[MU630] 003. Business Information System[MU630] 003. Business Information System
[MU630] 003. Business Information System
 
research publish journal
research publish journalresearch publish journal
research publish journal
 
paper publication
paper publicationpaper publication
paper publication
 
ugc journal
ugc journalugc journal
ugc journal
 
Influence User Involvement On The Quality Of Accounting Information System
Influence User Involvement On The Quality Of Accounting Information SystemInfluence User Involvement On The Quality Of Accounting Information System
Influence User Involvement On The Quality Of Accounting Information System
 
Accounting Information Systems Australasian 1st Edition Romney Solutions Manual
Accounting Information Systems Australasian 1st Edition Romney Solutions ManualAccounting Information Systems Australasian 1st Edition Romney Solutions Manual
Accounting Information Systems Australasian 1st Edition Romney Solutions Manual
 
Running Head Information System .docx
Running Head Information System                                  .docxRunning Head Information System                                  .docx
Running Head Information System .docx
 
Fit l07 introduction_is
Fit l07 introduction_isFit l07 introduction_is
Fit l07 introduction_is
 

Recently uploaded

VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...
VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...
VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...Call Girls in Nagpur High Profile
 
VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...
VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...
VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...dipikadinghjn ( Why You Choose Us? ) Escorts
 
03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptx03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptxFinTech Belgium
 
Indore Real Estate Market Trends Report.pdf
Indore Real Estate Market Trends Report.pdfIndore Real Estate Market Trends Report.pdf
Indore Real Estate Market Trends Report.pdfSaviRakhecha1
 
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best sexual serviceanilsa9823
 
(DIYA) Bhumkar Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(DIYA) Bhumkar Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(DIYA) Bhumkar Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(DIYA) Bhumkar Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
The Economic History of the U.S. Lecture 25.pdf
The Economic History of the U.S. Lecture 25.pdfThe Economic History of the U.S. Lecture 25.pdf
The Economic History of the U.S. Lecture 25.pdfGale Pooley
 
Booking open Available Pune Call Girls Talegaon Dabhade 6297143586 Call Hot ...
Booking open Available Pune Call Girls Talegaon Dabhade  6297143586 Call Hot ...Booking open Available Pune Call Girls Talegaon Dabhade  6297143586 Call Hot ...
Booking open Available Pune Call Girls Talegaon Dabhade 6297143586 Call Hot ...Call Girls in Nagpur High Profile
 
Top Rated Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...
Top Rated  Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...Top Rated  Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...
Top Rated Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...Call Girls in Nagpur High Profile
 
Gurley shaw Theory of Monetary Economics.
Gurley shaw Theory of Monetary Economics.Gurley shaw Theory of Monetary Economics.
Gurley shaw Theory of Monetary Economics.Vinodha Devi
 
Call Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...
Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...
Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...Pooja Nehwal
 
Basic concepts related to Financial modelling
Basic concepts related to Financial modellingBasic concepts related to Financial modelling
Basic concepts related to Financial modellingbaijup5
 
(ANIKA) Budhwar Peth Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANIKA) Budhwar Peth Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANIKA) Budhwar Peth Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANIKA) Budhwar Peth Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
20240429 Calibre April 2024 Investor Presentation.pdf
20240429 Calibre April 2024 Investor Presentation.pdf20240429 Calibre April 2024 Investor Presentation.pdf
20240429 Calibre April 2024 Investor Presentation.pdfAdnet Communications
 
VIP Call Girl Service Andheri West ⚡ 9920725232 What It Takes To Be The Best ...
VIP Call Girl Service Andheri West ⚡ 9920725232 What It Takes To Be The Best ...VIP Call Girl Service Andheri West ⚡ 9920725232 What It Takes To Be The Best ...
VIP Call Girl Service Andheri West ⚡ 9920725232 What It Takes To Be The Best ...dipikadinghjn ( Why You Choose Us? ) Escorts
 
The Economic History of the U.S. Lecture 20.pdf
The Economic History of the U.S. Lecture 20.pdfThe Economic History of the U.S. Lecture 20.pdf
The Economic History of the U.S. Lecture 20.pdfGale Pooley
 
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptxFinTech Belgium
 
Pooja 9892124323 : Call Girl in Juhu Escorts Service Free Home Delivery
Pooja 9892124323 : Call Girl in Juhu Escorts Service Free Home DeliveryPooja 9892124323 : Call Girl in Juhu Escorts Service Free Home Delivery
Pooja 9892124323 : Call Girl in Juhu Escorts Service Free Home DeliveryPooja Nehwal
 
Best VIP Call Girls Noida Sector 18 Call Me: 8448380779
Best VIP Call Girls Noida Sector 18 Call Me: 8448380779Best VIP Call Girls Noida Sector 18 Call Me: 8448380779
Best VIP Call Girls Noida Sector 18 Call Me: 8448380779Delhi Call girls
 

Recently uploaded (20)

VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...
VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...
VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...
 
VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...
VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...
VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...
 
03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptx03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptx
 
Indore Real Estate Market Trends Report.pdf
Indore Real Estate Market Trends Report.pdfIndore Real Estate Market Trends Report.pdf
Indore Real Estate Market Trends Report.pdf
 
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best sexual service
 
(DIYA) Bhumkar Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(DIYA) Bhumkar Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(DIYA) Bhumkar Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(DIYA) Bhumkar Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
The Economic History of the U.S. Lecture 25.pdf
The Economic History of the U.S. Lecture 25.pdfThe Economic History of the U.S. Lecture 25.pdf
The Economic History of the U.S. Lecture 25.pdf
 
Booking open Available Pune Call Girls Talegaon Dabhade 6297143586 Call Hot ...
Booking open Available Pune Call Girls Talegaon Dabhade  6297143586 Call Hot ...Booking open Available Pune Call Girls Talegaon Dabhade  6297143586 Call Hot ...
Booking open Available Pune Call Girls Talegaon Dabhade 6297143586 Call Hot ...
 
Top Rated Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...
Top Rated  Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...Top Rated  Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...
Top Rated Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...
 
Gurley shaw Theory of Monetary Economics.
Gurley shaw Theory of Monetary Economics.Gurley shaw Theory of Monetary Economics.
Gurley shaw Theory of Monetary Economics.
 
Call Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance Booking
 
Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...
Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...
Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...
 
Basic concepts related to Financial modelling
Basic concepts related to Financial modellingBasic concepts related to Financial modelling
Basic concepts related to Financial modelling
 
(ANIKA) Budhwar Peth Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANIKA) Budhwar Peth Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANIKA) Budhwar Peth Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANIKA) Budhwar Peth Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
20240429 Calibre April 2024 Investor Presentation.pdf
20240429 Calibre April 2024 Investor Presentation.pdf20240429 Calibre April 2024 Investor Presentation.pdf
20240429 Calibre April 2024 Investor Presentation.pdf
 
VIP Call Girl Service Andheri West ⚡ 9920725232 What It Takes To Be The Best ...
VIP Call Girl Service Andheri West ⚡ 9920725232 What It Takes To Be The Best ...VIP Call Girl Service Andheri West ⚡ 9920725232 What It Takes To Be The Best ...
VIP Call Girl Service Andheri West ⚡ 9920725232 What It Takes To Be The Best ...
 
The Economic History of the U.S. Lecture 20.pdf
The Economic History of the U.S. Lecture 20.pdfThe Economic History of the U.S. Lecture 20.pdf
The Economic History of the U.S. Lecture 20.pdf
 
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
 
Pooja 9892124323 : Call Girl in Juhu Escorts Service Free Home Delivery
Pooja 9892124323 : Call Girl in Juhu Escorts Service Free Home DeliveryPooja 9892124323 : Call Girl in Juhu Escorts Service Free Home Delivery
Pooja 9892124323 : Call Girl in Juhu Escorts Service Free Home Delivery
 
Best VIP Call Girls Noida Sector 18 Call Me: 8448380779
Best VIP Call Girls Noida Sector 18 Call Me: 8448380779Best VIP Call Girls Noida Sector 18 Call Me: 8448380779
Best VIP Call Girls Noida Sector 18 Call Me: 8448380779
 

IMPLEMENTATION OF INTERNAL CONTROL INFORMATION SYSTEM IN TRAVELOKA COMPANY

  • 1. Http: //dinastirev.org/JIMT Info@dinastirev.org P-ISSN: 2686-5246, E-ISSN: 2686-4924 Doi/xxx/999/xxx Submission Date: 01/09/2019, No. 1, Vol. 1, Issue 1, Sept 2019 Accepted Date: 11/09/2019, Published Date: 21/09/2019, Page:1 IMPLEMENTATION OF INTERNAL CONTROL INFORMATION SYSTEM IN TRAVELOKA COMPANY * Tashya Amaraesty * Prof. Dr. Hapzi Ali, Ir, MM, CMA, MPM * Mercu Buana University Menteng Abstract The development of information technology has changed the world to become easier and bring development and progress in all fields. With the support of computer technology it is proven that the mechanismof long and repetitive work becomes effective and efficient. Information systems play an important role in supporting the smooth work activities in an information, how to organize data with a database systemthat has been supporting the performance of many agencies. Writing Purpose This would like to know how much influence an information system is implemented in a company and what are the strengths and weaknesses arising from the application of an information system in a traveloka company. This writing uses a qualitative method with literauture studies in the field of Scientific Information Systems and Information Technology (IT). Information is obtained from the artiker, module and the internet. Besides that, based on empirical experience and dire ct observation on the object of research. Keywords: Information System, Internal Control, Traveloka 1. Preliminary Technological developments have changed the world more easily and brought development and progress in all fields. With the support of computer technology proven from long and repetitive work to be effective and efficient. The computer plays an important role in supporting the smooth work activities in an information, data method with a database system that has been supporting the support of many institutions. Information is very important for management in making decisions, information can be obtained from information systems. The rapid development of information requires an institution to make changes in an existing system, because the problems involved are growing. Dependence on information systems in the modern era is something that is still shared by all groups. Utilization of technology for information systems began to be complicated for use by companies starting, this proves that multi-national class companies or fairly large companies only implement information systems. One company that uses the information system is Traveloka, a traveloka company that uses smart phone technology based on Android or I-phone OS to serve in the field of travel services, wherever and wherever the information system supported by the organization or company provides assistance to customers or OS consumers . This information system is connected to a large network that is the internet making it easier for companies from customers or customers. With the internet the company has also been helped in expanding its reach. This modern era puts selected technology as a tool for process automation so that it becomes an important factor in managing business strategies. Computer-based information management systems with business strategies are a diamond step to get a competitive advantage from success. But,of course there are advantages and benefits that can be received by the system, still in essence that exists as flaws and weaknesses in the system, which can occur due to internal and external factors. Weaknesses that can also occur due to Fraud that can be rejected modern information systems. For this reason,a company or institution requests an apprenticeship permit to minimize shortcomings and shortcomings of a system.
  • 2. Http: //dinastirev.org/JIMT Info@dinastirev.org P-ISSN: 2686-5246, E-ISSN: 2686-4924 Doi/xxx/999/xxx Submission Date: 01/09/2019, No. 1, Vol. 1, Issue 1, Sept 2019 Accepted Date: 11/09/2019, Published Date: 21/09/2019, Page:2 2. Literature Review Understanding the system The system is a collection of elements that are interrelated and work together for a particular purpose. Understanding the system according to Andri Kristanto (2008: 1) is a network of interrelated procedures, coordinating together to carry out various activities or complete certain targets. Another case according to Budi Sutedjo Dharma Oetomo (2006: 168), the system is a collection of elements that are interconnected with each other that form a unity in an effort to achieve goals. Meanwhile according to Jogiyanto (2005: 1), a system is a collection of elements - elements that integrate to achieve certain goals. From the description above we can know about the system that compiles a collection of subsystems that have a specific purpose, where within the subsystem there are certain tasks to become a unity in achieving a goal. According Jogiyanto (2005: 4) the system has several characteristics as follows: 1. Has Components (components) A system consists of several interconnected components, which are intended to work together to form a unity. System components or system elements can form a subsystem or parts of the system that have the properties of the system that make a particular system and affect the overall system process. 2. Has a System Limit (limit) System boundary (boundary) is an area that is determined between the system with other systems or with the external environment. This system limit allows a system to choose a place. System space limits the scope of the system. 3. The existence of the environment outside the system Environment outside the system is anything that exceeds the limits of the system that improves the operating system. 4. Having Connections Liaison is a media liaison between one subsystem with another subsystem, which uses resources - resources flow from one subsystem to another subsystem. By connecting one subsystem, it can integrate with other subsystems to form a single unit. 5. Has input (input) Enter is the energy put into the system. 6. Has Output (output) Output is the result of energy processed and classified into useful output and residual waste. Output can be input for other systems. 7. Has a processor (process) A system can have a processing part or the system itself as the processor. Processor that will convert input into output. 8. Having goals (objectives) or goals (goals) A system will definitely have a goal (goal) or target (objectives). If the system does not have a target, then the system operation will be of no use. The system goal is to determine the input needed by the system and the output produced by the system. The system can be said to be successful when it comes to goals and objectives. Understanding Information Information is one of the most important types of resources owned by an organization. Seeing the importance of the role of information, information needs to be managed well in order to help an organization to obtain quality information. According to Budi Sutedjo Dharma Oetomo (2006: 168) information is the result of processing data obtained from each element of the system into a form that is easily understood and is relevant knowledge needed by people separately to increase their understanding of the facts that exist. Meanwhile, according to Azhar Susanto (2004: 18) information is the result of data processing that gives meaning and benefits. From the above understanding it can be concluded that information is the result of data processing that gives meaning or meaning and is useful or beneficial for the recipient of the information. According to Gelinas in
  • 3. Http: //dinastirev.org/JIMT Info@dinastirev.org P-ISSN: 2686-5246, E-ISSN: 2686-4924 Doi/xxx/999/xxx Submission Date: 01/09/2019, No. 1, Vol. 1, Issue 1, Sept 2019 Accepted Date: 11/09/2019, Published Date: 21/09/2019, Page:3 Azhar Susanto (2004: 41) expresses his opinion about the characteristics of an information. These characteristics are: 1. Effectiveness means information must be in accordance with the needs of users in supporting a business process, including information must be presented in the right time, the right format so that it can be understood, consistent with the previous format, the contents are in accordance with current needs and complete or in accordance with needs and conditions. 2. Efficiency means that information is produced through the optimal use of resources. 3. Confidential means to pay attention to protection or protection of sensitive information from unauthorized parties. 4. Integrity means that the information generated must be the result of integrated data processing based on applicable rules. 5. Availability means that the information needed must always be available whenever needed. For this reason, security of information resources is needed. 6. Compliance means that the information generated must comply with laws or government regulations and have responsibilities both internal and external parties of the company's organization. 7. Truth means that information has been presented by the information system correctly and can be trusted so that it can be used by management to operate the company. Understanding Information Systems Information systems in a system include data entry (input) then processed through a model in data processing and information results will be captured again as an input and so on so as to form an information cycle that can be obtained from the information system as a special system in the organization to process the information. At a glance the information system can be interpreted as a combination of people, facilities or technological tools, media, procedures and control over certain activities that produce an information that can be utilized by the wearer. According to Budi Sutedjo Dharma Oetomo (2006: 11) information systems can be defined as a collection of elements that are interconnected with each other that form a single unit to integrate data, process and store and distribute information. Another case with Al-Bahra Bin Ladjamudin (2005: 13) information systems are defined as a set of organizational procedures that when implemented will provide information for decision makers and or for controlling information. Then we can conclude that the information system is a unity of elements that interact with each other systematically and orderly to create and shape the flow of information that supports decision making. The information system activities are as follows: 1. Input, which describes an activity to provide data for the process. 2. Process, which describes how a data is processed to produce information that has added value. 3. Storage, which is an activity to maintain and store data. 4. Output, which is an activity to produce a report of an information process. 5. Control, which is an activity to ensure that the information system runs as expected. While the information system components consist of: 1. Hardware (hardware), consisting of computers, printers, networks. 2. Software (software). 3. Data, is a basic component of information. 4. Human (user). Definition of Fraud Fraud includes various irregularities and illegal actions that are marked by intentional or wrong fraud. The Institute of Internal Auditors (IIA) defines fraud as: "Any illegal action marked by deception, concealment, or breach of trust This action does not depend on the threat of violence or physical force. Fraud is committed by parties and organizations to obtain money, property or services; to avoid payment or loss of services; or to secure personal or business benefits. "
  • 4. Http: //dinastirev.org/JIMT Info@dinastirev.org P-ISSN: 2686-5246, E-ISSN: 2686-4924 Doi/xxx/999/xxx Submission Date: 01/09/2019, No. 1, Vol. 1, Issue 1, Sept 2019 Accepted Date: 11/09/2019, Published Date: 21/09/2019, Page:4 Another definition of cheating from the publication of the Practical Guide, which is sponsored by the American Institute of Certified Public Accountants, and the Certified Fraud Examiner Association, states: "Fraud is a deliberate act or omission that is designed to deceive others, resulting in victims suffering losses and / or perpetrators achieving profits." common characteristics of cheating: 1. Pressure can come from the needs that must be met by individuals by committing fraud. Often, the pressure comes from significant finances, this problem may include the need to keep a job or get a bonus. Generally jobs have large targets or other financial rewards can be obtained based on meeting certain performance goals. The perpetrator has a desire to maintain his position in the organization and to maintain certain standards of life to compete with his peers. 2. Opportunity is the ability to commit fraud and not be detected because the perpetrators do not want to be caught in their actions, they have confidence that their activities will not be detected. Fraud opportunities exist because of weak internal control, poor management, lack of board oversight, and / or through the use of one's position and authority to override control. Failure to establish adequate procedures for detecting fraudulent activity also increases the chances of fraud occurring. A process might be designed correctly for typical conditions, however, a window of opportunity might arise creating a state so that control fails. Internal control Internal control is a process implemented by the board of directors, as well as all employees under their direction with the aim of providing adequate guarantees for the achievement of control objectives. In general, internal control is part of each system used as procedures and operational guidelines for companies or organizations companies generally use an internal control system to direct company operations and prevent system misuse (ISSN- 1174 Emba Journal, A. Paul.) The Committee of Sponsoring Organizations of the Treadway Commission (COSO) in 1992 issued a definition of internal control. The COSO definition of internal control is as follows: Internal control system is a process that involves the board of commissioners, management, and other personnel, which is designed to provide adequate confidence about achieving the following three objectives: • Effectiveness and efficiency of operations • Reliability of financial reporting • Compliance with applicable laws and regulations. In the latest edition, COSO (2013: 3) defines internal control as follows: "Internal control is a process, effected by an entity's boar of directors, manage- ment, and other personnel, designed to provide reasonable assurance regarding the achievement of objectives relating to operations, reporting, and compliance. " Understanding internal control according to the COSO, it can be understood that internal control is a process, because it penetrates the operational activities of the organization and is an internal part of basic management activities. Internal control can only provide adequate confidence, not absolute confidence. This confirms that no matter how well internal controls are designed and operated, they can only provide adequate confidence, and cannot be fully effective in achieving internal control objectives even though they have been designed and arranged in the best way possible. Even though the ideal internal control is well designed, but success depends on competition and the constraints of the implementation that is inseparable from various limitations. 3. Method The method of writing this article is a descriptive qualitative method and library research, where the author obtained from modules, texts, or the internet, besides that based on empirical experience and direct research on research objects in traveloka companies.
  • 5. Http: //dinastirev.org/JIMT Info@dinastirev.org P-ISSN: 2686-5246, E-ISSN: 2686-4924 Doi/xxx/999/xxx Submission Date: 01/09/2019, No. 1, Vol. 1, Issue 1, Sept 2019 Accepted Date: 11/09/2019, Published Date: 21/09/2019, Page:5 4. Result And Discussion Dependence on information systems in the modern era is something that is still felt by all circles. The use of technology for information systems began to be used by start-up companies, this proves that not only multi-national class companies or fairly large companies are implementing information systems. For example Traveloka, traveloka companies utilize Android-based smart phone technology or OS I-phone to serve in the service sector, namely travel, wherever and wherever information systems have been widely used by organizations or companies in providing services to customers or consumers. This information system is connected to a large network, namely the internet, making it easier for both the company and customers or consumers. With the internet the company is also helped in expanding its reach. In this modern era the position of computer technology is seen as important as a tool for automation of processes so that it becomes an essential factor in determining business strategies. combining computer-based management information systems with business strategies is a diamond step to get a competitive advantage from competitors. However, behind the benefits, there are also problems that occur in this company both internally and externally, such problems are, recently, there have been cases where accounts from traveloka can be broken by parties who are not the account owners, which have an impact on user unrest , who are disadvantaged when opening a traveloka account and email notification of traveloka bills on paylater payment method transactions through the account carried out by unscrupulous persons, this is a criminal activity which is fraudulent behavior and has violated the law this can also occur due to accidental application or omission of an existing system which includes threats from the accounting information system. This can happen where not the owner of a traveloka account can actually activate PayLater by entering another name and data of another person or false data and then misusing the account by using the paylater opportunity with the maximum limit to buy plane tickets or other after it appears the bill must paid by the original owner of the traveloka account itself automatically even though the account owner does not feel ordered or activate the PayLater. This includes computer attacks, namely DNS Spoofing type spoofing. After the account owner is aware of and reports to traveloka and traced, this can occur mostly because the email address is connected to Google, this can be overcome by Sniffer by detecting the presence of smugglers in the network, cases this, initially the account owner actually will not realize this because traveloka is functioning properly but after the transaction has occurred suddenly there is an incoming bill via email that makes the account owner aware. This can happen also related to trojans by stealing the password of the account and using cookies stuffing by hijacking the traveloka account, also related to PHP Injection where the Hacker can make fake data and confirmed or trusted by the traveloka so that there is an abuse of the account that harms the real account owner itself. Security attacks also occur namely interception and modification and fabrication. This can also be dealt with by Traveloka to tighten security aspects of computers such as Athentication, Integrity, Non-repudiation, Authority, Confithentiality, Privacy, Availability and Access Control in order to minimize incidents like this. In general, control is part of each system that is used as operational procedures and guidelines for a particular company or organization. Companies generally use internal controls to direct the company's operations and prevent system misuse. However, it must be stressed once again that no matter how well internal controls are designed and operated, they can only provide adequate confidence, cannot be fully effective in achieving internal control objectives even though they have been designed and arranged in the best way possible. Even though the ideal internal control is well designed, but success depends on competition and the constraints of the implementation that is inseparable from various limitations. In its implementation too, many cases that occur in large traveloka companies are still not effective in carrying out internal control, this case occurs when there is a breakdown of the traveloka paylater system that still harms many people including me, how can the confidentiality of one's data be accessed and burglarized in such a way as to cause financial losses suffered by the victims concerned. Of course in this case the traveloka must be able to improve the components of internal control carried out, especially in terms of Risk Assessment and Control Activities.
  • 6. Http: //dinastirev.org/JIMT Info@dinastirev.org P-ISSN: 2686-5246, E-ISSN: 2686-4924 Doi/xxx/999/xxx Submission Date: 01/09/2019, No. 1, Vol. 1, Issue 1, Sept 2019 Accepted Date: 11/09/2019, Published Date: 21/09/2019, Page:6 At Traveloka company, ethics in the information society, the official traveloka account owner asks for protection of account ownership by blocking ovo paylater that has been misused by account breakers, in identifying company stakeholders providing solutions to change passwords and traveloka has blocked the paylater after that traveloka gives the view that the account can be broken into because the email used by authorized users of the account is connected by google, with the existence of the traveloka party suspected the possibility of being broken because of it. This incident is clearly detrimental to the official traveloka user himself, because the right to use the paylater cannot be reused due to being blocked by traveloka and the opportunity to use the paylater cannot be used. The occurrence of paylater breakthroughs from irresponsible people, this shows that Traveloka has not fulfilled 7 COBIT criteria (Effectiveness, Confidentiality, Integrity, Availability, Compliance and Reliable) in its business field. Broadly speaking the Control Objective for Information and Related Technology (COBIT) at Traveloka has been implemented but, the results are not good, please note traveloka has been handled structurally in the System and Information Technology Division (DIVSI) headed by a Head of Division under the Directors, and supervised by the financial services authority (OJK) but this is still lacking because account burglary cases can still occur repeatedly. For business risk management or Enterprise Risk Management (ERM), Traveloka forms a Division under the Board of Directors that handles risks faced by the company or that may arise in the company. This division conducts mapping, categorizing and making risk mitigation which is then evaluated and controlled continuously every month, quarterly, semester and yearly. However, although Traveloka has implemented this, the paylater incident according to the news, there are still many complaints the same thing. 5. Conclusion And Recommendation Conclusion In the implementation of the rampant cases that occur in large companies including traveloka in carrying out internal control is still not effective, this case occurs when the traveloka paylater system pemboboaln that still harms many people including the author himself, where the confidentiality of one's data can be accessed and compromised in such a way that incur financial losses suffered by the victims concerned. Of course in this case the traveloka must be able to improve the components of internal control carried out, especially in terms of Risk Assessment and Control Activities. Recommendation In the case of cases like this need to be improved fraud detection, this can be minimized by tightening security to log in from mobile phones or other gadgets by improving existing systems and tightening supervision of internal controls of the traveloka company itself can help indicate fraud and minimize existing fraud, and improve the application of COBIT, COSO and ERM in traveloka companies so that burglary events can be minimized until they do not occur. Refference
  • 7. Http: //dinastirev.org/JIMT Info@dinastirev.org P-ISSN: 2686-5246, E-ISSN: 2686-4924 Doi/xxx/999/xxx Submission Date: 01/09/2019, No. 1, Vol. 1, Issue 1, Sept 2019 Accepted Date: 11/09/2019, Published Date: 21/09/2019, Page:7 Accounting Information for Internal Revenue Control. EMBA Journal - ISSN 2303-1174. Information System and Internal Control Lecture Module 1-5 meetings by Prof. Dr. Ir. Hapzi Ali, MM, CMA www.slideshare.net/mobile/MAYANIH1/sipi-mayanih-prof-hapzi-ali-sistem-informasi- implementasi-pada-pt- karya-baru-jaya-persada-universitas-mercu-buana-2018-pdf (Accessed 5 October 2019, 12:04) mediakonsumen.com/2019/05/08/surat-pembaca/account-paylater-traveloka-dibobol-hacker-korban-tetap-dib Charge-billing (accessed 05 October 2019 at 09.41) www.slideshare.net/HAJUINIZEIN/sipihajuinihafzi-ali-pendalian-internal-cosouniversitas-mercu-buana2018pdf (Access 05 October 2019 At 09.45) Halomoan Ompusunggu. (2002) Effects of Application of Accounting Information Systems On the Effectiveness of the Implementation of the Internal Control System, ejornal maranatha Ni Made Sudiaranti (2017) Effect of Human Resources Competence on Implementation Government Internal Control Systems and Government Accounting Standards and Their Implications on the Quality of Local Government Financial Statements. Journal of Udayana University Poniman. 2004. Effects of Accounting Information on Managerial Performance with three Moderating Variables: Empirical Study of Rural Bank Regional Bank Semarang in Semarang. Library of UNDIP. Rahman, Syaiful., M. Nasir., Sri Handayani. 2007. Effect of Performance Measurement Systems Towards Clarity of Roles, Psychological Empowerment and Managerial Performance (Partial Least Square Approach): Research on Managers of Manufacturing Companies in Central Java. Accounting National Symposium X. Makassar. Steffi Sigilipu (2013) Effects of Application of Management Accounting Information and Systems Performance Measurement Against 1, No Managerial Performance. ejournal Unstrat Vol.3 No.1 Xu, Hongjiang. April 2009. Data Quality Issues for Accouting Information Sytems Implementation : System, Stakeholders, and Organizational Factors. Journal of Technology Research. Vol. 1, Pp. 1-11.