The use of information technology in government processes will increase the efficiency, effectiveness, transparency, and accountability of government administration. Utilization of IT within an organization requires a system to manage IT better as well as the required audit of information technology that can be run in accordance as the expected. IT Audit is an important matter that must be carried out within an organization, also including the Government Institution Region X which utilize the technology of information as supporting the process of the public servicing. The audit of information technology is carried out with the purpose of fixing the critical point or problems that often occur in the process within the institution. As the result of study using the framework of COBIT 5, it shows the level of capability of five IT processes selected are at a lower level, namely APO07 at the level 2, EDM04 at the level 1, DSS01 at the level 1, BAI01 at the level 1, and APO08 at the level 1, whereas the expectation of capabilities of the organization’s leader is at the level 4. The results of the audit of information technology that has been made, shows the difference of the level of gap between the current maturity level with the maturity level based on the organization’s leader. In this study, will be getting suggestions and improvement recommendations according to the framework of COBIT 5 and ITIL 2011. Agus Ade Muliyana Krisna | Gusti Made Arya Sasmita | Gusti Agung Ayu Putri "Improvement of IT Governance (Case Study: Government Institution Region X)" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-6 , October 2020, URL: https://www.ijtsrd.com/papers/ijtsrd33496.pdf Paper Url: https://www.ijtsrd.com/engineering/information-technology/33496/improvement-of-it-governance-case-study-government-institution-region-x/agus-ade-muliyana-krisna
Strategic alignment is a conviction that is considered extremely important in understanding how organizations can apply their arrangement of information technology (IT) into substantial boosts in achievement. To attain alignment advantage, Information Technology Infrastructure Library (ITIL) prepares a framework of best practice approch for IT Service Management in all countries and Control Objectives for Information and Related Technology (COBIT) is an IT governance framework and aiding toolset that permits managers to stretch the gap between control prerequisites, technical matters and business risks. The purpose of this paper is to recognize how COBIT can complement ITIL to attain Business-IT Alignment.
From IT service management to IT service governance: An ontological approach ...IJECEIAES
Some companies have achieved better performance as a result of their IT investments, while others have not, as organizations are interested in calculating the value added by their IT. There is a wide range of literature that agrees that the best practices used by organizations promote continuous improvement in service delivery. Nevertheless, overuse of these practices can have undesirable effects and unquantified investments. This paper proposed a practical tool formally developed according to the DSR design science approach, it addresses a domain relevant to both practitioners and academics by providing IT service governance (ITSG) domain model ontology, concerned with maximizing the clarity and veracity of the concepts within it. The results revealed that the proposed ontology resolved key barriers to ITSG process adoption in organizations, and that combining COBIT and ITIL practices would help organizations better manage their IT services and achieve better business-IT alignment.
A case study of using the hybrid model of scrum and six sigma in software dev...IJECEIAES
The world of software engineering is constantly discovering new ways that lead to an increase in team performance in the production of software products and, at the same time, brings the customer's further satisfaction. With the advent of agile methodologies in software development, these objectives have been considered more seriously by software teams and companies. Due to their very nature, agile methodologies have the potential to be integrated with other methodologies or specific managerial approaches defined in line with agility objectives. One of the cases is Six Sigma, which is used in organizations by focusing on organizational change and process improvement. In the present study, attempts were made to present the hybrid software development approach, including Scrum, as the most common agile and Six Sigma methodology. This approach was practically used in a case study, and the obtained results were analyzed. The results of this evaluation showed that this hybrid method could lead to the increased team performance and customer satisfaction. However, besides these two achievements, an increase in the number of re-works, number of defects discovered, and the duration of the project implementation were also observed. These cases are in line with the main objectives of Scrum and Six Sigma and are justifiable and acceptable due to achieving those objectives.
Evaluation of the E Government Quality of Services Case Study X City Governmentijtsrd
The application of Information Technology in government is not only based on the desire to create a more efficient government, but also to improve the public access to information and the quality of services developed by the government. This study measures the extent of the quality of citizens' aspirations service at Badung Communication and Information website. The method used is the E Govqual method, since it was created specifically to assess government owned websites. E Govqual itself has 22 attributes which are divided into five variables namely Ease of Use, Trust, Reliability, Content and Appearance of Information, and Citizen Support. The data collected were analyzed using the Importance Performance Analysis IPA method in order to obtain indicators that are in need of improvement or to be maintained based on users perceptions and expectations. The result of the analysis shows that the citizens' aspirations service at Badung Communication and Information website is still not in accordance to the users expectations. This is shown by the suitability value of 100 , which is 81 and the average result of the gap value of 0, which is 0.84. There are 10 attributes of the main improvements to the citizens' aspirations service at Badung Communication and Information website. Dela Handayani | I Ketut Adi Purnawan | Gusti Made Arya Sasmita "Evaluation of the E-Government Quality of Services (Case Study: X City Government)" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-4 , June 2020, URL: https://www.ijtsrd.com/papers/ijtsrd30854.pdf Paper Url :https://www.ijtsrd.com/engineering/information-technology/30854/evaluation-of-the-egovernment-quality-of-services-case-study-x-city-government/dela-handayani
Several efforts have been made to measure the government performance at national and sub-national levels. Our effort build on an existing framework for measuring service delivery. Though the previous tool, which has been applied to study the select federal government ministries includes supply side governance and accountability indicators, there is, however, a need to also incorporate demand side indicators to capture community satisfaction from publicly provided services. In this study, an effort has been made to formulate an augmented index and by using survey data, application of this index on three public sector entities has been analyzed. Results show that this approach has the benefit of validating supply and demand side information and perceptions.
Employees Adoption of E-Procurement System: An Empirical StudyIJMIT JOURNAL
Today, organizations are investing a lot in their IT infrastructure and reengineering their business processes by digitizing firms. If organizational employees will not optimum utilize its IT infrastructure, the productivity gain reduced enormously. In Uttarakhand e-procurement system implemented by public sector under e-governance integrated mission mode projects. So, there is need to find the determinants which influence employee’s adoption and uses of e-procurement systems. This research study assesses the organizational and individual determinants that influence the use of e-procurement system in Uttarakhand public sector. This study provides managers with the valuable information to take intervention programs to achieve greater acceptance and usage of e-procurement system. Data collected for this study by the means of a survey conducted in Uttarakhand state in 2011. A total 1200 questionnaire forms were distributed personally and online to employees using e-procurement system in Uttarakhand.
Information Technology Supplier Management in HospitalsjournalBEEI
In this study, we developed a document for managing Information Technology suppliers in hospitals. This document is used to ensure the proper management of IT suppliers in the hospital. Products and services in Information Technology have characteristics and specifications that are always up to date, making it difficult for non-IT people to understand. Hospitals whose main business in the health sector is often lack of human resources who understand IT. Observations and interviews were conducted in Indonesian hospital, to identify the characteristics and problems in supplier management. Control Objectives for Information and Related Technologies (COBIT), Information Technology Infrastructure Library (ITIL) and government regulations on supplier management were reviewed and combined as a benchmark and guidance on how supplier management activities are carried out. The result of the process is a Standard Operating Procedure (SOP) document. The parties involved in the supplier management process have evaluated the SOP document. From the results of the study, it is known that currently, the hospital is still focused on procedures procurement of goods and services that are government regulated. This study proposes some new activities that are not currently done by the hospital.
Strategic alignment is a conviction that is considered extremely important in understanding how organizations can apply their arrangement of information technology (IT) into substantial boosts in achievement. To attain alignment advantage, Information Technology Infrastructure Library (ITIL) prepares a framework of best practice approch for IT Service Management in all countries and Control Objectives for Information and Related Technology (COBIT) is an IT governance framework and aiding toolset that permits managers to stretch the gap between control prerequisites, technical matters and business risks. The purpose of this paper is to recognize how COBIT can complement ITIL to attain Business-IT Alignment.
From IT service management to IT service governance: An ontological approach ...IJECEIAES
Some companies have achieved better performance as a result of their IT investments, while others have not, as organizations are interested in calculating the value added by their IT. There is a wide range of literature that agrees that the best practices used by organizations promote continuous improvement in service delivery. Nevertheless, overuse of these practices can have undesirable effects and unquantified investments. This paper proposed a practical tool formally developed according to the DSR design science approach, it addresses a domain relevant to both practitioners and academics by providing IT service governance (ITSG) domain model ontology, concerned with maximizing the clarity and veracity of the concepts within it. The results revealed that the proposed ontology resolved key barriers to ITSG process adoption in organizations, and that combining COBIT and ITIL practices would help organizations better manage their IT services and achieve better business-IT alignment.
A case study of using the hybrid model of scrum and six sigma in software dev...IJECEIAES
The world of software engineering is constantly discovering new ways that lead to an increase in team performance in the production of software products and, at the same time, brings the customer's further satisfaction. With the advent of agile methodologies in software development, these objectives have been considered more seriously by software teams and companies. Due to their very nature, agile methodologies have the potential to be integrated with other methodologies or specific managerial approaches defined in line with agility objectives. One of the cases is Six Sigma, which is used in organizations by focusing on organizational change and process improvement. In the present study, attempts were made to present the hybrid software development approach, including Scrum, as the most common agile and Six Sigma methodology. This approach was practically used in a case study, and the obtained results were analyzed. The results of this evaluation showed that this hybrid method could lead to the increased team performance and customer satisfaction. However, besides these two achievements, an increase in the number of re-works, number of defects discovered, and the duration of the project implementation were also observed. These cases are in line with the main objectives of Scrum and Six Sigma and are justifiable and acceptable due to achieving those objectives.
Evaluation of the E Government Quality of Services Case Study X City Governmentijtsrd
The application of Information Technology in government is not only based on the desire to create a more efficient government, but also to improve the public access to information and the quality of services developed by the government. This study measures the extent of the quality of citizens' aspirations service at Badung Communication and Information website. The method used is the E Govqual method, since it was created specifically to assess government owned websites. E Govqual itself has 22 attributes which are divided into five variables namely Ease of Use, Trust, Reliability, Content and Appearance of Information, and Citizen Support. The data collected were analyzed using the Importance Performance Analysis IPA method in order to obtain indicators that are in need of improvement or to be maintained based on users perceptions and expectations. The result of the analysis shows that the citizens' aspirations service at Badung Communication and Information website is still not in accordance to the users expectations. This is shown by the suitability value of 100 , which is 81 and the average result of the gap value of 0, which is 0.84. There are 10 attributes of the main improvements to the citizens' aspirations service at Badung Communication and Information website. Dela Handayani | I Ketut Adi Purnawan | Gusti Made Arya Sasmita "Evaluation of the E-Government Quality of Services (Case Study: X City Government)" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-4 , June 2020, URL: https://www.ijtsrd.com/papers/ijtsrd30854.pdf Paper Url :https://www.ijtsrd.com/engineering/information-technology/30854/evaluation-of-the-egovernment-quality-of-services-case-study-x-city-government/dela-handayani
Several efforts have been made to measure the government performance at national and sub-national levels. Our effort build on an existing framework for measuring service delivery. Though the previous tool, which has been applied to study the select federal government ministries includes supply side governance and accountability indicators, there is, however, a need to also incorporate demand side indicators to capture community satisfaction from publicly provided services. In this study, an effort has been made to formulate an augmented index and by using survey data, application of this index on three public sector entities has been analyzed. Results show that this approach has the benefit of validating supply and demand side information and perceptions.
Employees Adoption of E-Procurement System: An Empirical StudyIJMIT JOURNAL
Today, organizations are investing a lot in their IT infrastructure and reengineering their business processes by digitizing firms. If organizational employees will not optimum utilize its IT infrastructure, the productivity gain reduced enormously. In Uttarakhand e-procurement system implemented by public sector under e-governance integrated mission mode projects. So, there is need to find the determinants which influence employee’s adoption and uses of e-procurement systems. This research study assesses the organizational and individual determinants that influence the use of e-procurement system in Uttarakhand public sector. This study provides managers with the valuable information to take intervention programs to achieve greater acceptance and usage of e-procurement system. Data collected for this study by the means of a survey conducted in Uttarakhand state in 2011. A total 1200 questionnaire forms were distributed personally and online to employees using e-procurement system in Uttarakhand.
Information Technology Supplier Management in HospitalsjournalBEEI
In this study, we developed a document for managing Information Technology suppliers in hospitals. This document is used to ensure the proper management of IT suppliers in the hospital. Products and services in Information Technology have characteristics and specifications that are always up to date, making it difficult for non-IT people to understand. Hospitals whose main business in the health sector is often lack of human resources who understand IT. Observations and interviews were conducted in Indonesian hospital, to identify the characteristics and problems in supplier management. Control Objectives for Information and Related Technologies (COBIT), Information Technology Infrastructure Library (ITIL) and government regulations on supplier management were reviewed and combined as a benchmark and guidance on how supplier management activities are carried out. The result of the process is a Standard Operating Procedure (SOP) document. The parties involved in the supplier management process have evaluated the SOP document. From the results of the study, it is known that currently, the hospital is still focused on procedures procurement of goods and services that are government regulated. This study proposes some new activities that are not currently done by the hospital.
IS/IT Capability and Strategic Information System Planning (SISP) SuccessIJMIT JOURNAL
Successful planning of Information Systems (SISP) is perhaps going to be more problematic in today’s world of rapid change and uncertainty. SISP is a cornerstone of the information system discipline and very little attention has been paid to its success based on the resource based view of the firm (RBV).This paper provides a model for IT capability and strategic information system planning success, by considering environmental and organizational factors that may influence this relationship in a contingency model. A review of existing IT capability and SISP literature is given to identify the opportunities in building successful SISP. A model is developed by hypothesizing IT capability as independent variable leads to SISP success as dependent variable; in which organizational & environmental influences are considered as moderating variables. The control variables are firm size, firm structure, and industry type. The study proposes a model to conceptualize the relationship between IT capabilities and SISP success and contingency factors moderating that relationship. This paper explains the ways of exploiting IT capabilities as specialized and integrated knowledge of the firm in IT area to create a more successful SISP. The researchers believe that the aim to build a model for SISP success based on RBV theory is important because this new perspective will be helpful for gaining a superior assessment and better underpinning of the SISP from a knowledge based perspective.
Requirement analysis method of e commerce websites development for small-medi...ijseajournal
Along with the growth of the Internet, the trend shows that e-commerce have been growing significantly in
the last several years. This means business opportunities for small-medium enterprises (SMEs), which are
recognized as the backbone of the economy. SMEs may develop and run small to medium size of particular
e-commerce websites as the solution of specific business opportunities. Certainly, the websites should be
developed accordingly to support business success. In developing the websites, key elements of e-commerce
business model that are necessary to ensure the success should be resolved at the requirement stage of the
development. In this paper, we propose an enhancement of requirement analysis method found in
literatures such that it includes activities to resolve the key elements. The method has been applied in three
case studies based on Indonesia situations and we conclude that it is suitable to be adopted by SMEs.
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Service-oriented computing has created new requirements for information systems development processes
and methods. The adoption of service-oriented development requires service identification methods
matching the challenge in enterprises. A wide variety of service identification methods (SIM) have been
proposed, but less attention has been paid to the actual requirements of the methods. This paper provides
an ethnographical look at challenges in service identification based on data from 14 service identification
sessions, providing insight into the practice of service identification. The findings identified two types of
service identification sessions and the results can be used for selecting the appropriate SIM based on the
type of the session.
Agent-SSSN: a strategic scanning system network based on multiagent intellige...IJERA Editor
This article reports a development of a strategic scanning system network prototype system based on multi agent
system and ontology, called Agent-SSSN, for developing business intelligent strategies. This is a cooperative
approach to integrate the knowledge of experts in business intelligent system. The approach presented in this
chapter is targeted towards using ontologies. The use of ontologies in MAS environment enables agent to share
a common set of concept about context, expert user profiles and other domain elements while interacting with
each other. In this paper, we focus especially on the modeling of the system Multi-Agents using O-MaSE
(Organization-based Multiagent Systems Engineering Methodology) and a conceptual diagram of the ontology
database.
An effective pre processing algorithm for information retrieval systemsijdms
The Internet is probably the most successful distributed computing system ever. However, our capabilities
for data querying and manipulation on the internet are primordial at best. The user expectations are
enhancing over the period of time along with increased amount of operational data past few decades. The
data-user expects more deep, exact, and detailed results. Result retrieval for the user query is always
relative o the pattern of data storage and index. In Information retrieval systems, tokenization is an
integrals part whose prime objective is to identifying the token and their count. In this paper, we have
proposed an effective tokenization approach which is based on training vector and result shows that
efficiency/ effectiveness of proposed algorithm. Tokenization on documents helps to satisfy user’s
information need more precisely and reduced search sharply, is believed to be a part of information
retrieval. Pre-processing of input document is an integral part of Tokenization, which involves preprocessing
of documents and generates its respective tokens which is the basis of these tokens probabilistic
IR generate its scoring and gives reduced search space. The comparative analysis is based on the two
parameters; Number of Token generated, Pre-processing time.
Perceived significance of information security governance to predict the info...Irfaan Bahadoor
Abstract
Purpose – Information security is a growing concern in society, across businesses and government. As the offshore IT services market continues to grow providing numerous benefits, there are also perceived risks with respect to the quality of information security delivered in the supply chain. This paper aims to examine, as a case, the perceptions of Indian software services provider (service provider) employees with respect to information security governance and its impact on information security service quality that is delivered to customers.
Design/methodology/approach – The paper provides a framework built upon the existing
dimensions and instruments for total quality management and service quality, suitably modified to reflect the context of information security. SmartPLS, a structural equation modelling technique, has been used to analyse field survey data collected from across various Indian cities and companies.
Findings – Significant finding is that information security governance in an IT outsourcing company providing software services has a highly significant impact on the information security service quality,which can be predicted.The paper also establishes that there is a positive relationship collectively between elements of information security governance and information security service quality.
Research limitations/implications – Since data used in this study were taken solely from the responses of employees of outsourced service companies in India, it does not show if this translates into service improvements as perceived by the customer.
Practical implications – Information security governance should be made an integral part of corporate governance and is an effective strategic technique, if software outsourcing business enterprises want to achieve a competitive edge, provide client satisfaction and create trust.
Originality/value – The paper presents empirical data validation of the connection between information security governance and quality of service.
Relationship Between Organizational Factors, Technological Factors and Enterp...IJMIT JOURNAL
There are three stages of Enterprise Resource planning System (ERP) Implementation; which are preimplementation, mid- implementation and post-implementation. In pre-implementation stage the pervious
researchers found that it fail in Organizational and Technological factors. Therefore, this research studies
the Technological Factors availability and the Organizational Factor readiness at Greater Amman
Municipality (GAM) Case study. The statistical results showed that there are availability of the
Organizational factor (Organizational Objectives and Services, Organization culture, and Business
process) for success of ERP system, and indicate the technological infrastructure is available og GAM.
There are three stages of Enterprise Resource planning System (ERP) Implementation; which are preimplementation,
mid- implementation and post-implementation. In pre-implementation stage the pervious
researchers found that it fail in Organizational and Technological factors. Therefore, this research studies
the Technological Factors availability and the Organizational Factor readiness at Greater Amman
Municipality (GAM) Case study. The statistical results showed that there are availability of the
Organizational factor (Organizational Objectives and Services, Organization culture, and Business
process) for success of ERP system, and indicate the technological infrastructure is available og GAM.
The measurement of maturity level of information technology service based on ...TELKOMNIKA JOURNAL
Institutions are currently progressing on IT development and maximization in order to advance for good IT governance. Lack of comprehensive requirements analysis of IT utilization may lead to hindrances within IT development from achieving effective outcomes. This quantitative study employs control objective for information & related technology (COBIT 5) business framework to assess and identify the maturity level of IT service, primarily within the domain of delivery, service, and support (DSS). Data were obtained through questionnaire, observation, and documentation. The result reveals that the average maturity level of IT service is in level 3 (established); by which the study recommends for enhancements and upgrades in IT performance and service within the scope of compliance and IT service application and support.
IS/IT Capability and Strategic Information System Planning (SISP) SuccessIJMIT JOURNAL
Successful planning of Information Systems (SISP) is perhaps going to be more problematic in today’s world of rapid change and uncertainty. SISP is a cornerstone of the information system discipline and very little attention has been paid to its success based on the resource based view of the firm (RBV).This paper provides a model for IT capability and strategic information system planning success, by considering environmental and organizational factors that may influence this relationship in a contingency model. A review of existing IT capability and SISP literature is given to identify the opportunities in building successful SISP. A model is developed by hypothesizing IT capability as independent variable leads to SISP success as dependent variable; in which organizational & environmental influences are considered as moderating variables. The control variables are firm size, firm structure, and industry type. The study proposes a model to conceptualize the relationship between IT capabilities and SISP success and contingency factors moderating that relationship. This paper explains the ways of exploiting IT capabilities as specialized and integrated knowledge of the firm in IT area to create a more successful SISP. The researchers believe that the aim to build a model for SISP success based on RBV theory is important because this new perspective will be helpful for gaining a superior assessment and better underpinning of the SISP from a knowledge based perspective.
Requirement analysis method of e commerce websites development for small-medi...ijseajournal
Along with the growth of the Internet, the trend shows that e-commerce have been growing significantly in
the last several years. This means business opportunities for small-medium enterprises (SMEs), which are
recognized as the backbone of the economy. SMEs may develop and run small to medium size of particular
e-commerce websites as the solution of specific business opportunities. Certainly, the websites should be
developed accordingly to support business success. In developing the websites, key elements of e-commerce
business model that are necessary to ensure the success should be resolved at the requirement stage of the
development. In this paper, we propose an enhancement of requirement analysis method found in
literatures such that it includes activities to resolve the key elements. The method has been applied in three
case studies based on Indonesia situations and we conclude that it is suitable to be adopted by SMEs.
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Service-oriented computing has created new requirements for information systems development processes
and methods. The adoption of service-oriented development requires service identification methods
matching the challenge in enterprises. A wide variety of service identification methods (SIM) have been
proposed, but less attention has been paid to the actual requirements of the methods. This paper provides
an ethnographical look at challenges in service identification based on data from 14 service identification
sessions, providing insight into the practice of service identification. The findings identified two types of
service identification sessions and the results can be used for selecting the appropriate SIM based on the
type of the session.
Agent-SSSN: a strategic scanning system network based on multiagent intellige...IJERA Editor
This article reports a development of a strategic scanning system network prototype system based on multi agent
system and ontology, called Agent-SSSN, for developing business intelligent strategies. This is a cooperative
approach to integrate the knowledge of experts in business intelligent system. The approach presented in this
chapter is targeted towards using ontologies. The use of ontologies in MAS environment enables agent to share
a common set of concept about context, expert user profiles and other domain elements while interacting with
each other. In this paper, we focus especially on the modeling of the system Multi-Agents using O-MaSE
(Organization-based Multiagent Systems Engineering Methodology) and a conceptual diagram of the ontology
database.
An effective pre processing algorithm for information retrieval systemsijdms
The Internet is probably the most successful distributed computing system ever. However, our capabilities
for data querying and manipulation on the internet are primordial at best. The user expectations are
enhancing over the period of time along with increased amount of operational data past few decades. The
data-user expects more deep, exact, and detailed results. Result retrieval for the user query is always
relative o the pattern of data storage and index. In Information retrieval systems, tokenization is an
integrals part whose prime objective is to identifying the token and their count. In this paper, we have
proposed an effective tokenization approach which is based on training vector and result shows that
efficiency/ effectiveness of proposed algorithm. Tokenization on documents helps to satisfy user’s
information need more precisely and reduced search sharply, is believed to be a part of information
retrieval. Pre-processing of input document is an integral part of Tokenization, which involves preprocessing
of documents and generates its respective tokens which is the basis of these tokens probabilistic
IR generate its scoring and gives reduced search space. The comparative analysis is based on the two
parameters; Number of Token generated, Pre-processing time.
Perceived significance of information security governance to predict the info...Irfaan Bahadoor
Abstract
Purpose – Information security is a growing concern in society, across businesses and government. As the offshore IT services market continues to grow providing numerous benefits, there are also perceived risks with respect to the quality of information security delivered in the supply chain. This paper aims to examine, as a case, the perceptions of Indian software services provider (service provider) employees with respect to information security governance and its impact on information security service quality that is delivered to customers.
Design/methodology/approach – The paper provides a framework built upon the existing
dimensions and instruments for total quality management and service quality, suitably modified to reflect the context of information security. SmartPLS, a structural equation modelling technique, has been used to analyse field survey data collected from across various Indian cities and companies.
Findings – Significant finding is that information security governance in an IT outsourcing company providing software services has a highly significant impact on the information security service quality,which can be predicted.The paper also establishes that there is a positive relationship collectively between elements of information security governance and information security service quality.
Research limitations/implications – Since data used in this study were taken solely from the responses of employees of outsourced service companies in India, it does not show if this translates into service improvements as perceived by the customer.
Practical implications – Information security governance should be made an integral part of corporate governance and is an effective strategic technique, if software outsourcing business enterprises want to achieve a competitive edge, provide client satisfaction and create trust.
Originality/value – The paper presents empirical data validation of the connection between information security governance and quality of service.
Relationship Between Organizational Factors, Technological Factors and Enterp...IJMIT JOURNAL
There are three stages of Enterprise Resource planning System (ERP) Implementation; which are preimplementation, mid- implementation and post-implementation. In pre-implementation stage the pervious
researchers found that it fail in Organizational and Technological factors. Therefore, this research studies
the Technological Factors availability and the Organizational Factor readiness at Greater Amman
Municipality (GAM) Case study. The statistical results showed that there are availability of the
Organizational factor (Organizational Objectives and Services, Organization culture, and Business
process) for success of ERP system, and indicate the technological infrastructure is available og GAM.
There are three stages of Enterprise Resource planning System (ERP) Implementation; which are preimplementation,
mid- implementation and post-implementation. In pre-implementation stage the pervious
researchers found that it fail in Organizational and Technological factors. Therefore, this research studies
the Technological Factors availability and the Organizational Factor readiness at Greater Amman
Municipality (GAM) Case study. The statistical results showed that there are availability of the
Organizational factor (Organizational Objectives and Services, Organization culture, and Business
process) for success of ERP system, and indicate the technological infrastructure is available og GAM.
The measurement of maturity level of information technology service based on ...TELKOMNIKA JOURNAL
Institutions are currently progressing on IT development and maximization in order to advance for good IT governance. Lack of comprehensive requirements analysis of IT utilization may lead to hindrances within IT development from achieving effective outcomes. This quantitative study employs control objective for information & related technology (COBIT 5) business framework to assess and identify the maturity level of IT service, primarily within the domain of delivery, service, and support (DSS). Data were obtained through questionnaire, observation, and documentation. The result reveals that the average maturity level of IT service is in level 3 (established); by which the study recommends for enhancements and upgrades in IT performance and service within the scope of compliance and IT service application and support.
empirical study on the status of moroccan information systems and proposition...INFOGAIN PUBLICATION
Today, the function of the chief information officer (CIO) has become part of the flow charts of many Moroccan companies [1]. Based on this statement, we did an empirical study in the first part of this work on the state of information systems (IS) Moroccan to know their strengths and weaknesses. The aim of the second part is to propose an approach based on the IT (information technology) frameworks helping CIOs to form their own repository of good practices to be applied in order to have good IT governance.
The implementation of IT governance is important to lead and evolve the information system in agreement with stakeholders. This requirement is seriously amplified at the time of digital area considering all the new technologies that has been lunched recently (Big DATA, Artificial Intelligence, Machine Learning, Deep learning...). Thus, without a good rudder, every company risks getting lost in a sea endless and unreachable goals.
This paper aims to provide decision-making system that allow professionals to choose IT governance framework suitable to desired criteria and their importance based on a multi-criteria analysis method (WSM), we did implement a case study based on our analysis in a Moroccan company. Moreover, we present better understanding of IT Governance aspects such as standards and best practices.
Our article goes into a global objective that aims to build an integrated generated meta-model for better approach of IT Governance.
CRITICAL SUCCESS FACTORS FOR INFORMATION TECHNOLOGY INFRASTRUCTURE LIBRARY IM...ijait
In recent years, market competitions and internal efficiency requirements derived many Information
Technology (IT) functions to shift their paradigms from IT asset management to IT service management
(ITSM). Consequently, a growing number of public and private organizations are implementing the ITIL
(IT Infrastructure Library) “best practice” as a framework for improving IT service management
processes. This paper presents an exploratory in-depth case study of two public service organizations in
the kingdom of Saudi Arabia deemed successfully implemented ITIL V3 processes. The case studies identify
several critical success factors (CSF) associated with ITIL implementation success. These CSF are then
compared with factors identified in the literature to shed light on success factors and challenges to offer a
learning experience for organizations currently undergoing or planning ITIL implementation.
Insights and guidance on IT governance strategy, risk management and implementation of resources through interactive sessions and mini-case studies.
Establish an IT Governance Framework
Ensure that enterprise’s IT investment is in line with
its strategic objectives.
Learn to manage enterprise risk
Discuss how to manage resources , budget utilization
and resource allocation
Identify how to manage performance, return on investments and avoidance of idle investments .
GOVERNING INFORMATION SECURITY IN CONJUNCTION WITH COBIT AND ISO 27001IJNSA Journal
In this paper, after giving a brief definition of Information Security Management Systems (ISMS), ISO 27001, IT governance and COBIT, pros and cons of implementing only COBIT, implementing only IS0 27001 and implementing both COBIT and ISO 27001 together when governing information security in enterprises will be issued.
IT governance in the public sector: a conceptual modelRiri Kusumarani
IT governance in the public sector: a conceptual model
Tonelli, Adriano Olímpio, et al. "It governance in the public sector: a conceptual model." Information Systems Frontiers (2015): 1-18.
This is a summary of Control Objectives for Information and related Technology audit framework. Anyone can understand COBIT-19 framework within few slides. COBIT was published by ITGI, a nonprofit research entity created by ISACA
Proposal of a Framework of Lean Governance and Management of Enterprise ITMehran Misaghi
Technology and Information are vital to the success of companies.
To leverage the successes in IT projects, companies have at their
disposal, references globally accepted as good practices (COBIT,
ITIL, PMBOK, ISO, TOGAF, etc.). In spite of this, it is still great
the magnitude of spending on IT projects poorly designed or
improperly implemented. This paper presents a brief description
of standards and good practices related to governance and
management of enterprise IT, defines the Lean Thinking, Lean IT, the Processes Management, the Portfolio, Program and Project
Management, and the Work System Theory, and highlights the
purpose of them, showing their characteristics and suggests a
Framework of Lean Governance and Management of Enterprise
IT, by demonstrating how the standards and good practices
presented can work together, because it advocates that the Lean
Thinking, the Process, Portfolio, Program, and Project
Management, and the Work System Theory complement the
standards and good practices of Governance and Management of
Enterprise IT with an approach not referenced in these standards
and good practic
‘Six Sigma Technique’ A Journey Through its Implementationijtsrd
The manufacturing industries all over the world are facing tough challenges for growth, development and sustainability in today’s competitive environment. They have to achieve apex position by adapting with the global competitive environment by delivering goods and services at low cost, prime quality and better price to increase wealth and consumer satisfaction. Cost Management ensures profit, growth and sustainability of the business with implementation of Continuous Improvement Technique like Six Sigma. This leads to optimize Business performance. The method drives for customer satisfaction, low variation, reduction in waste and cycle time resulting into a competitive advantage over other industries which did not implement it. The main objective of this paper ‘Six Sigma Technique A Journey Through Its Implementation’ is to conceptualize the effectiveness of Six Sigma Technique through the journey of its implementation. Aditi Sunilkumar Ghosalkar "‘Six Sigma Technique’: A Journey Through its Implementation" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64546.pdf Paper Url: https://www.ijtsrd.com/other-scientific-research-area/other/64546/‘six-sigma-technique’-a-journey-through-its-implementation/aditi-sunilkumar-ghosalkar
Edge Computing in Space Enhancing Data Processing and Communication for Space...ijtsrd
Edge computing, a paradigm that involves processing data closer to its source, has gained significant attention for its potential to revolutionize data processing and communication in space missions. With the increasing complexity and data volume generated by modern space missions, traditional centralized computing approaches face challenges related to latency, bandwidth, and security. Edge computing in space, involving on board processing and analysis of data, offers promising solutions to these challenges. This paper explores the concept of edge computing in space, its benefits, applications, and future prospects in enhancing space missions. Manish Verma "Edge Computing in Space: Enhancing Data Processing and Communication for Space Missions" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64541.pdf Paper Url: https://www.ijtsrd.com/computer-science/artificial-intelligence/64541/edge-computing-in-space-enhancing-data-processing-and-communication-for-space-missions/manish-verma
Dynamics of Communal Politics in 21st Century India Challenges and Prospectsijtsrd
Communal politics in India has evolved through centuries, weaving a complex tapestry shaped by historical legacies, colonial influences, and contemporary socio political transformations. This research comprehensively examines the dynamics of communal politics in 21st century India, emphasizing its historical roots, socio political dynamics, economic implications, challenges, and prospects for mitigation. The historical perspective unravels the intricate interplay of religious identities and power dynamics from ancient civilizations to the impact of colonial rule, providing insights into the evolution of communalism. The socio political dynamics section delves into the contemporary manifestations, exploring the roles of identity politics, socio economic disparities, and globalization. The economic implications section highlights how communal politics intersects with economic issues, perpetuating disparities and influencing resource allocation. Challenges posed by communal politics are scrutinized, revealing multifaceted issues ranging from social fragmentation to threats against democratic values. The prospects for mitigation present a multifaceted approach, incorporating policy interventions, community engagement, and educational initiatives. The paper conducts a comparative analysis with international examples, identifying common patterns such as identity politics and economic disparities. It also examines unique challenges, emphasizing Indias diverse religious landscape, historical legacy, and secular framework. Lessons for effective strategies are drawn from international experiences, offering insights into inclusive policies, interfaith dialogue, media regulation, and global cooperation. By scrutinizing historical epochs, contemporary dynamics, economic implications, and international comparisons, this research provides a comprehensive understanding of communal politics in India. The proposed strategies for mitigation underscore the importance of a holistic approach to foster social harmony, inclusivity, and democratic values. Rose Hossain "Dynamics of Communal Politics in 21st Century India: Challenges and Prospects" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64528.pdf Paper Url: https://www.ijtsrd.com/humanities-and-the-arts/history/64528/dynamics-of-communal-politics-in-21st-century-india-challenges-and-prospects/rose-hossain
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...ijtsrd
Background and Objective Telehealth has become a well known tool for the delivery of health care in Saudi Arabia, and the perspective and knowledge of healthcare providers are influential in the implementation, adoption and advancement of the method. This systematic review was conducted to examine the current literature base regarding telehealth and the related healthcare professional perspective and knowledge in the Kingdom of Saudi Arabia. Materials and Methods This systematic review was conducted by searching 7 databases including, MEDLINE, CINHAL, Web of Science, Scopus, PubMed, PsycINFO, and ProQuest Central. Studies on healthcare practitioners telehealth knowledge and perspectives published in English in Saudi Arabia from 2000 to 2023 were included. Boland directed this comprehensive review. The researchers examined each connected study using the AXIS tool, which evaluates cross sectional systematic reviews. Narrative synthesis was used to summarise and convey the data. Results Out of 1840 search results, 10 studies were included. Positive outlook and limited knowledge among providers were seen across trials. Healthcare professionals like telehealth for its ability to improve quality, access, and delivery, save time and money, and be successful. Age, gender, occupation, and work experience also affect health workers knowledge. In Saudi Arabia, healthcare professionals face inadequate expert assistance, patient privacy, internet connection concerns, lack of training courses, lack of telehealth understanding, and high costs while performing telemedicine. Conclusions Healthcare practitioners telehealth perceptions and knowledge were examined in this systematic study. Its collection of concerned experts different personal attitudes and expertise would help enhance telehealths implementation in Saudi Arabia, develop its healthcare delivery alternative, and eliminate frequent problems. Badriah Mousa I Mulayhi | Dr. Jomin George | Judy Jenkins "Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in Saudi Arabia: A Systematic Review" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64535.pdf Paper Url: https://www.ijtsrd.com/medicine/other/64535/assess-perspective-and-knowledge-of-healthcare-providers-towards-elehealth-in-saudi-arabia-a-systematic-review/badriah-mousa-i-mulayhi
The Impact of Digital Media on the Decentralization of Power and the Erosion ...ijtsrd
The impact of digital media on the distribution of power and the weakening of traditional gatekeepers has gained considerable attention in recent years. The adoption of digital technologies and the internet has resulted in declining influence and power for traditional gatekeepers such as publishing houses and news organizations. Simultaneously, digital media has facilitated the emergence of new voices and players in the media industry. Digital medias impact on power decentralization and gatekeeper erosion is visible in several ways. One significant aspect is the democratization of information, which enables anyone with an internet connection to publish and share content globally, leading to citizen journalism and bypassing traditional gatekeepers. Another aspect is the disruption of conventional media industry business models, as traditional organizations struggle to adjust to the decrease in advertising revenue and the rise of digital platforms. Alternative business models, such as subscription models and crowdfunding, have become more prevalent, leading to the emergence of new players. Overall, the impact of digital media on the distribution of power and the weakening of traditional gatekeepers has brought about significant changes in the media landscape and the way information is shared. Further research is required to fully comprehend the implications of these changes and their impact on society. Dr. Kusum Lata "The Impact of Digital Media on the Decentralization of Power and the Erosion of Traditional Gatekeepers" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64544.pdf Paper Url: https://www.ijtsrd.com/humanities-and-the-arts/political-science/64544/the-impact-of-digital-media-on-the-decentralization-of-power-and-the-erosion-of-traditional-gatekeepers/dr-kusum-lata
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...ijtsrd
This research investigates the nexus between online discussions on Dr. B.R. Ambedkars ideals and their impact on social inclusion among college students in Gurugram, Haryana. Surveying 240 students from 12 government colleges, findings indicate that 65 actively engage in online discussions, with 80 demonstrating moderate to high awareness of Ambedkars ideals. Statistically significant correlations reveal that higher online engagement correlates with increased awareness p 0.05 and perceived social inclusion. Variations across colleges and a notable effect of college type on perceived social inclusion highlight the influence of contextual factors. Furthermore, the intersectional analysis underscores nuanced differences based on gender, caste, and socio economic status. Dr. Kusum Lata "Online Voices, Offline Impact: Ambedkar's Ideals and Socio-Political Inclusion - A Study of Gurugram District" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64543.pdf Paper Url: https://www.ijtsrd.com/humanities-and-the-arts/political-science/64543/online-voices-offline-impact-ambedkars-ideals-and-sociopolitical-inclusion--a-study-of-gurugram-district/dr-kusum-lata
Problems and Challenges of Agro Entreprenurship A Studyijtsrd
Noting calls for contextualizing Agro entrepreneurs problems and challenges of the agro entrepreneurs and for greater attention to the Role of entrepreneurs in agro entrepreneurship research, we conduct a systematic literature review of extent research in agriculture entrepreneurship to overcome the study objectives of complications of agro entrepreneurs through various factors, Development of agriculture products is a key factor for the overall economic growth of agro entrepreneurs Agro Entrepreneurs produces firsthand large scale employment, utilizes the labor and natural resources, This research outlines the problems of Weather and Soil Erosions, Market price fluctuation, stimulates labor cost problems, reduces concentration of Price volatility, Dependency on Intermediaries, induces Limited Bargaining Power, and Storage and Transportation Costs. This paper mainly devoted to highlight Problems and challenges faced for the sustainable of Agro Entrepreneurs in India. Vinay Prasad B "Problems and Challenges of Agro Entreprenurship - A Study" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64540.pdf Paper Url: https://www.ijtsrd.com/other-scientific-research-area/other/64540/problems-and-challenges-of-agro-entreprenurship--a-study/vinay-prasad-b
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...ijtsrd
Disclosure is a process through which a business enterprise communicates with external parties. A corporate disclosure is communication of financial and non financial information of the activities of a business enterprise to the interested entities. Corporate disclosure is done through publishing annual reports. So corporate disclosure through annual reports plays a vital role in the life of all the companies and provides valuable information to investors. The basic objectives of corporate disclosure is to give a true and fair view of companies to the parties related either directly or indirectly like owner, government, creditors, shareholders etc. in the companies act, provisions have been made about mandatory and voluntary disclosure. The IT sector in India is rapidly growing, the trend to invest in the IT sector is rising and employment opportunities in IT sectors are also increasing. Therefore the IT sector is expected to have fair, full and adequate disclosure of all information. Unfair and incomplete disclosure may adversely affect the entire economy. A research study on disclosure practices of IT companies could play an important role in this regard. Hence, the present research study has been done to study and review comparative analysis of total corporate disclosure of selected IT companies of India and to put forward overall findings and suggestions with a view to increase disclosure score of these companies. The researcher hopes that the present research study will be helpful to all selected Companies for improving level of corporate disclosure through annual reports as well as the government, creditors, investors, all business organizations and upcoming researcher for comparative analyses of level of corporate disclosure with special reference to selected IT companies. Dr. Vaibhavi D. Thaker "Comparative Analysis of Total Corporate Disclosure of Selected IT Companies of India" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64539.pdf Paper Url: https://www.ijtsrd.com/other-scientific-research-area/other/64539/comparative-analysis-of-total-corporate-disclosure-of-selected-it-companies-of-india/dr-vaibhavi-d-thaker
The Impact of Educational Background and Professional Training on Human Right...ijtsrd
This study investigated the impact of educational background and professional training on human rights awareness among secondary school teachers in the Marathwada region of Maharashtra, India. The key findings reveal that higher levels of education, particularly a master’s degree, and fields of study related to education, humanities, or social sciences are associated with greater human rights awareness among teachers. Additionally, both pre service teacher training and in service professional development programs focused on human rights education significantly enhance teacher’s knowledge, skills, and competencies in promoting human rights principles in their classrooms. Baig Ameer Bee Mirza Abdul Aziz | Dr. Syed Azaz Ali Amjad Ali "The Impact of Educational Background and Professional Training on Human Rights Awareness among Secondary School Teachers" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64529.pdf Paper Url: https://www.ijtsrd.com/humanities-and-the-arts/education/64529/the-impact-of-educational-background-and-professional-training-on-human-rights-awareness-among-secondary-school-teachers/baig-ameer-bee-mirza-abdul-aziz
A Study on the Effective Teaching Learning Process in English Curriculum at t...ijtsrd
“One Language sets you in a corridor for life. Two languages open every door along the way” Frank Smith English as a foreign language or as a second language has been ruling in India since the period of Lord Macaulay. But the question is how much we teach or learn English properly in our culture. Is there any scope to use English as a language rather than a subject How much we learn or teach English without any interference of mother language specially in the classroom teaching learning scenario in West Bengal By considering all these issues the researcher has attempted in this article to focus on the effective teaching learning process comparing to other traditional strategies in the field of English curriculum at the secondary level to investigate whether they fulfill the present teaching learning requirements or not by examining the validity of the present curriculum of English. The purpose of this study is to focus on the effectiveness of the systematic, scientific, sequential and logical transaction of the course between the teachers and the learners in the perspective of the 5Es programme that is engage, explore, explain, extend and evaluate. Sanchali Mondal | Santinath Sarkar "A Study on the Effective Teaching Learning Process in English Curriculum at the Secondary Level of West Bengal" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd62412.pdf Paper Url: https://www.ijtsrd.com/humanities-and-the-arts/education/62412/a-study-on-the-effective-teaching-learning-process-in-english-curriculum-at-the-secondary-level-of-west-bengal/sanchali-mondal
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...ijtsrd
This paper reports on a study which was conducted to investigate the role of mentoring and its influence on the effectiveness of the teaching of Physics in secondary schools in the South West Region of Cameroon. The study adopted the convergent parallel mixed methods design, focusing on respondents in secondary schools in the South West Region of Cameroon. Both quantitative and qualitative data were collected, analysed separately, and the results were compared to see if the findings confirm or disconfirm each other. The quantitative analysis found that majority of the respondents 72 of Physics teachers affirmed that they had more experienced colleagues as mentors to help build their confidence, improve their teaching, and help them improve their effectiveness and efficiency in guiding learners’ achievements. Only 28 of the respondents disagreed with these statements. With majority respondents 72 agreeing with the statements, it implies that in most secondary schools, experienced Physics teachers act as mentors to build teachers’ confidence in teaching and improving students’ learning. The interview qualitative data analysis summarized how secondary school Principals use meetings with mentors and mentees to promote mentorship in the school milieu. This has helped strengthen teachers’ classroom practices in secondary schools in the South West Region of Cameroon. With the results confirming each other, the study recommends that mentoring should focus on helping teachers employ social interactions and instructional practices feedback and clarity in teaching that have direct measurable impact on students’ learning achievements. Andrew Ngeim Sumba | Frederick Ebot Ashu | Peter Agborbechem Tambi "The Role of Mentoring and Its Influence on the Effectiveness of the Teaching of Physics in Secondary Schools in the South West Region of Cameroon" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64524.pdf Paper Url: https://www.ijtsrd.com/management/management-development/64524/the-role-of-mentoring-and-its-influence-on-the-effectiveness-of-the-teaching-of-physics-in-secondary-schools-in-the-south-west-region-of-cameroon/andrew-ngeim-sumba
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...ijtsrd
This study primarily focuses on the design of a high side buck converter using an Arduino microcontroller. The converter is specifically intended for use in DC DC applications, particularly in standalone solar PV systems where the PV output voltage exceeds the load or battery voltage. To evaluate the performance of the converter, simulation experiments are conducted using Proteus Software. These simulations provide insights into the input and output voltages, currents, powers, and efficiency under different state of charge SoC conditions of a 12V,70Ah rechargeable lead acid battery. Additionally, the hardware design of the converter is implemented, and practical data is collected through operation, monitoring, and recording. By comparing the simulation results with the practical results, the efficiency and performance of the designed converter are assessed. The findings indicate that while the buck converter is suitable for practical use in standalone PV systems, its efficiency is compromised due to a lower output current. Chan Myae Aung | Dr. Ei Mon "Design Simulation and Hardware Construction of an Arduino-Microcontroller Based DC-DC High-Side Buck Converter for Standalone PV System" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64518.pdf Paper Url: https://www.ijtsrd.com/engineering/mechanical-engineering/64518/design-simulation-and-hardware-construction-of-an-arduinomicrocontroller-based-dcdc-highside-buck-converter-for-standalone-pv-system/chan-myae-aung
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadikuijtsrd
Energy becomes sustainable if it meets the needs of the present without compromising the ability of future generations to meet their own needs. Some of the definitions of sustainable energy include the considerations of environmental aspects such as greenhouse gas emissions, social, and economic aspects such as energy poverty. Generally far more sustainable than fossil fuel are renewable energy sources such as wind, hydroelectric power, solar, and geothermal energy sources. Worthy of note is that some renewable energy projects, like the clearing of forests to produce biofuels, can cause severe environmental damage. The sustainability of nuclear power which is a low carbon source is highly debated because of concerns about radioactive waste, nuclear proliferation, and accidents. The switching from coal to natural gas has environmental benefits, including a lower climate impact, but could lead to delay in switching to more sustainable options. “Carbon capture and storage” can be built into power plants to remove the carbon dioxide CO2 emissions, but this technology is expensive and has rarely been implemented. Leading non renewable energy sources around the world is fossil fuels, coal, petroleum, and natural gas. Nuclear energy is usually considered another non renewable energy source, although nuclear energy itself is a renewable energy source, but the material used in nuclear power plants is not. The paper addresses the issue of sustainable energy, its attendant benefits to the future generation, and humanity in general. Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku "Sustainable Energy" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64534.pdf Paper Url: https://www.ijtsrd.com/engineering/electrical-engineering/64534/sustainable-energy/paul-a-adekunte
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...ijtsrd
This paper aims to outline the executive regulations, survey standards, and specifications required for the implementation of the Sudan Survey Act, and for regulating and organizing all surveying work activities in Sudan. The act has been discussed for more than 5 years. The Land Survey Act was initiated by the Sudan Survey Authority and all official legislations were headed by the Sudan Ministry of Justice till it was issued in 2022. The paper presents conceptual guidelines to be used for the Survey Act implementation and to regulate the survey work practice, standardizing the field surveys, processing, quality control, procedures, and the processes related to survey work carried out by the stakeholders and relevant authorities in Sudan. The conceptual guidelines are meant to improve the quality and harmonization of geospatial data and to aid decision making processes as well as geospatial information systems. The established comprehensive executive regulations will govern and regulate the implementation of the Sudan Survey Geomatics Act in all surveying and mapping practices undertaken by the Sudan Survey Authority SSA and state local survey departments for public or private sector organizations. The targeted standards and specifications include the reference frame, projection, coordinate systems, and the guidelines and specifications that must be followed in the field of survey work, processes, and mapping products. In the last few decades, there has been a growing awareness of the importance of geomatics activities and measurements on the Earths surface in space and time, together with observing and mapping the changes. In such cases, data must be captured promptly, standardized, and obtained with more accuracy and specified in much detail. The paper will also highlight the current situation in Sudan, the degree to which survey standards are used, the problems encountered, and the errors that arise from not using the standards and survey specifications. Kamal A. A. Sami "Concepts for Sudan Survey Act Implementations - Executive Regulations and Standards" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd63484.pdf Paper Url: https://www.ijtsrd.com/engineering/civil-engineering/63484/concepts-for-sudan-survey-act-implementations--executive-regulations-and-standards/kamal-a-a-sami
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...ijtsrd
The discussions between ellipsoid and geoid have invoked many researchers during the recent decades, especially during the GNSS technology era, which had witnessed a great deal of development but still geoid undulation requires more investigations. To figure out a solution for Sudans local geoid, this research has tried to intake the possibility of determining the geoid model by following two approaches, gravimetric and geometrical geoid model determination, by making use of GNSS leveling benchmarks at Khartoum state. The Benchmarks are well distributed in the study area, in which, the horizontal coordinates and the height above the ellipsoid have been observed by GNSS while orthometric heights were carried out using precise leveling. The Global Geopotential Model GGM represented in EGM2008 has been exploited to figure out the geoid undulation at the benchmarks in the study area. This is followed by a fitting process, that has been done to suit the geoid undulation data which has been computed using GNSS leveling data and geoid undulation inspired by the EGM2008. Two geoid surfaces were created after the fitting process to ensure that they are identical and both of them could be counted for getting the same geoid undulation with an acceptable accuracy. In this respect, statistical operation played an important role in ensuring the consistency and integrity of the model by applying cross validation techniques splitting the data into training and testing datasets for building the geoid model and testing its eligibility. The geometrical solution for geoid undulation computation has been utilized by applying straightforward equations that facilitate the calculation of the geoid undulation directly through applying statistical techniques for the GNSS leveling data of the study area to get the common equation parameters values that could be utilized to calculate geoid undulation of any position in the study area within the claimed accuracy. Both systems were checked and proved eligible to be used within the study area with acceptable accuracy which may contribute to solving the geoid undulation problem in the Khartoum area, and be further generalized to determine the geoid model over the entire country, and this could be considered in the future, for regional and continental geoid model. Ahmed M. A. Mohammed. | Kamal A. A. Sami "Towards the Implementation of the Sudan Interpolated Geoid Model (Khartoum State Case Study)" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd63483.pdf Paper Url: https://www.ijtsrd.com/engineering/civil-engineering/63483/towards-the-implementation-of-the-sudan-interpolated-geoid-model-khartoum-state-case-study/ahmed-m-a-mohammed
Activating Geospatial Information for Sudans Sustainable Investment Mapijtsrd
Sudan is witnessing an acceleration in the processes of development and transformation in the performance of government institutions to raise the productivity and investment efficiency of the government sector. The development plans and investment opportunities have focused on achieving national goals in various sectors. This paper aims to illuminate the path to the future and provide geospatial data and information to develop the investment climate and environment for all sized businesses, and to bridge the development gap between the Sudan states. The Sudan Survey Authority SSA is the main advisor to the Sudan Government in conducting surveying, mappings, designing, and developing systems related to geospatial data and information. In recent years, SSA made a strategic partnership with the Ministry of Investment to activate Geospatial Information for Sudans Sustainable Investment and in particular, for the preparation and implementation of the Sudan investment map, based on the directives and objectives of the Ministry of Investment MI in Sudan. This paper comes within the framework of activating the efforts of the Ministry of Investment to develop technical investment services by applying techniques adopted by the Ministry and its strategic partners for advancing investment processes in the country. Kamal A. A. Sami "Activating Geospatial Information for Sudan's Sustainable Investment Map" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd63482.pdf Paper Url: https://www.ijtsrd.com/engineering/information-technology/63482/activating-geospatial-information-for-sudans-sustainable-investment-map/kamal-a-a-sami
Educational Unity Embracing Diversity for a Stronger Societyijtsrd
In a rapidly changing global landscape, the importance of education as a unifying force cannot be overstated. This paper explores the crucial role of educational unity in fostering a stronger and more inclusive society through the embrace of diversity. By examining the benefits of diverse learning environments, the paper aims to highlight the positive impact on societal strength. The discussion encompasses various dimensions, from curriculum design to classroom dynamics, and emphasizes the need for educational institutions to become catalysts for unity in diversity. It highlights the need for a paradigm shift in educational policies, curricula, and pedagogical approaches to ensure that they are reflective of the diverse fabric of society. This paper also addresses the challenges associated with implementing inclusive educational practices and offers practical strategies for overcoming barriers. It advocates for collaborative efforts between educational institutions, policymakers, and communities to create a supportive ecosystem that promotes diversity and unity. Mr. Amit Adhikari | Madhumita Teli | Gopal Adhikari "Educational Unity: Embracing Diversity for a Stronger Society" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64525.pdf Paper Url: https://www.ijtsrd.com/humanities-and-the-arts/education/64525/educational-unity-embracing-diversity-for-a-stronger-society/mr-amit-adhikari
Integration of Indian Indigenous Knowledge System in Management Prospects and...ijtsrd
The diversity of indigenous knowledge systems in India is vast and can vary significantly between different communities and regions. Preserving and respecting these knowledge systems is crucial for maintaining cultural heritage, promoting sustainable practices, and fostering cross cultural understanding. In this paper, an overview of the prospects and challenges associated with incorporating Indian indigenous knowledge into management is explored. It is found that IIKS helps in management in many areas like sustainable development, tourism, food security, natural resource management, cultural preservation and innovation, etc. However, IIKS integration with management faces some challenges in the form of a lack of documentation, cultural sensitivity, language barriers legal framework, etc. Savita Lathwal "Integration of Indian Indigenous Knowledge System in Management: Prospects and Challenges" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd63500.pdf Paper Url: https://www.ijtsrd.com/management/accounting-and-finance/63500/integration-of-indian-indigenous-knowledge-system-in-management-prospects-and-challenges/savita-lathwal
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...ijtsrd
The COVID 19 pandemic has highlighted the crucial need of preventive measures, with widespread use of face masks being a key method for slowing the viruss spread. This research investigates face mask identification using deep learning as a technological solution to be reducing the risk of coronavirus transmission. The proposed method uses state of the art convolutional neural networks CNNs and transfer learning to automatically recognize persons who are not wearing masks in a variety of circumstances. We discuss how this strategy improves public health and safety by providing an efficient manner of enforcing mask wearing standards. The report also discusses the obstacles, ethical concerns, and prospective applications of face mask detection systems in the ongoing fight against the pandemic. Dilip Kumar Sharma | Aaditya Yadav "DeepMask: Transforming Face Mask Identification for Better Pandemic Control in the COVID-19 Era" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64522.pdf Paper Url: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/64522/deepmask-transforming-face-mask-identification-for-better-pandemic-control-in-the-covid19-era/dilip-kumar-sharma
Streamlining Data Collection eCRF Design and Machine Learningijtsrd
Efficient and accurate data collection is paramount in clinical trials, and the design of Electronic Case Report Forms eCRFs plays a pivotal role in streamlining this process. This paper explores the integration of machine learning techniques in the design and implementation of eCRFs to enhance data collection efficiency. We delve into the synergies between eCRF design principles and machine learning algorithms, aiming to optimize data quality, reduce errors, and expedite the overall data collection process. The application of machine learning in eCRF design brings forth innovative approaches to data validation, anomaly detection, and real time adaptability. This paper discusses the benefits, challenges, and future prospects of leveraging machine learning in eCRF design for streamlined and advanced data collection in clinical trials. Dhanalakshmi D | Vijaya Lakshmi Kannareddy "Streamlining Data Collection: eCRF Design and Machine Learning" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd63515.pdf Paper Url: https://www.ijtsrd.com/biological-science/biotechnology/63515/streamlining-data-collection-ecrf-design-and-machine-learning/dhanalakshmi-d
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
2. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD33496 | Volume – 4 | Issue – 6 | September-October 2020 Page 849
and maturity levels. The result of this research is that the IT
maturity level at Institution in Region X is 2.48 which falls
into the category level 2 (managed process) [3].
The research conducted by I Putu Ade Ambara Putra, I Made
Sukarsa, and I Putu Agung Bayupati which aims to measure
work IT management company PT. X using the framework
COBIT 4.1. The results of this research are the current
maturity level condition is at level 3 and the expected
condition is to reach the level 5, then a recommendation is
made to minimize the maturity level of gap, also given
suggestions taken from the high control objectives COBIT
3rd edition [4].
The research conducted by I Ketut Adi Purnawanaims to
arrange guidelines for information technology governance
PT. X uses the COBIT framework. The results ofthisresearch
and analyze show thatthelevel ofmanagementawarenessof
PT. X is at a sufficient level and the current maturity level is
at the level 3 (defined process) and the expected maturity
level is at the level 5 (optimized) [5].
3. RESEARCH METHOD
Stages are conducted in this study literature, the search of
critical point, identify the purpose of business, identify the
purpose of IT, identify the purpose of IT processes, data
processing, data analysis, data test, and improvement
suggestions if necessary. The research stages can be seen at
Figure 1.
Figure 1 Research Stages
Research stages conducted at the Department of Population
and Civil Registration Badung regency which beganwiththe
study literature where the auditor studying the framework
of the audit that will be used and learn about the Institution
to be audited. The next step is to find critical points in the
institution being audited through interviewsanddata onthe
aspirations and complaints of the existing community. After
getting the data, then performed mapping to business
objectives according to the framework COBIT 5. The next to
identify business goals and do the mapping to the IT goals in
the framework COBIT 5 uses a reference to the framework
COBIT 5. After getting the results of IT goals, then identify
the mapping to the IT processes according to framework
COBIT 5. After obtaining the IT process through the
identification of the IT process, the next step is to make a
questionnaire on the level of importance that is distributed
to relevant stakeholders, especially high-ranking institution
responsible for the institution’s business processes.
The results of the interest level questionnaire are used to
conclude the level of importance,namelythemostimportant
IT process that will be carried out further assessment with
an assessment of capability level. The next step is to create a
capability level questionnaire that will be distributed to
respondents and the results of the capability level will be
compared to the expected capability, namely the capability
level according to institution officials, so that a gap will be
found between the two results. The gap obtained will be
analyzed and given suggested improvement.Thefinal stepis
to draw conclusion from the audit research.
4. CONCEPTS AND THEORIES
4.1. Audit
Audit is a process of collecting and evaluating evidence of
information that can be measured on an economic entity
which made a competent and independent to be able to
determine and report the suitability of the information with
the criteria that have been set. Auditing should be carried
out by an independent and competent person [6]. In short,
an audit is a comparison between conditions that occurwith
predetermined criteria.
4.2. Information Technology Audit
Information Technology Audit is a form of operational audit,
but it’s now recognized as a separate type of audit with the
main objective of improving IT governance. Information
technology audit is an operational audit of resource
management information, namely the effectiveness,
efficiency, and economics of the information system
functional unit in an institution. With the introduction of
COBIT, now the objective of auditing is not only limited to
the classical concept, but now it is effectiveness, efficiency,
confidentially, integrity, availability, compliance with
policies, and reliability of information technology[7].
4.3. IT Governance
IT Governance is a structure of relationshipandprocessesto
regulate and control the organization which aims to achieve
the purpose of the organization which has been determined
by increasing the value and still balancing the risks with the
value that is obtained from the application of IT and
processes. The point of Information TechnologyGovernance
is how to manage the use of IT in order to produce output
that is optimal in the organization, helping the process of
decision-making and help the processofsolvingtheproblem
[8].
4.4. COBIT 5
COBIT is a standard guide to information technology
management practices. The COBIT standard is a considered
as a complete standard and has comprehensive coverage as
an audit framework. COBIT supports IT governance by
providing a framework for managing IT alignment with
3. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD33496 | Volume – 4 | Issue – 6 | September-October 2020 Page 850
businesses. COBIT is developed regularly by ISACA. This
COBIT, there are several domains that are used for the audit
processes [6].
4.5. ITIL 2011
The Information Technology Infrastructure Library(ITIL) is
a framework that describes best practices in the application
of information technology service management. ITIL
provides a series of process and function models that can be
used as a guide in efforts to align IT processes and business
processes, especially those related to IT service
management. There are five stages of the ITIL process,
namely Service Strategy, Service Design, Service Transition,
Service Operation, and Continual Service Improvement [9].
5. RESULT AND DISCUSSION
5.1. Identification of Business Goals
Identification of business objectives is the first step to determine the IT process that will be audited, in this process a mapping
of the critical point of Government Institution Region X against business objectives according to COBIT 5. Mapping results
between critical points and business objectives according to COBIT 5 can be seen at the table 1.
Table1.Mapping Critical Points with Business Goals
Critical Points No Business Purpose
The role of officers who are considered less than optimal in serving the
community in terms of managing population administration.
14
Operational and staff
productivity
The response of population administration service officers via telephone
is considered non-optimal by the community.
14
Operational and staff
productivity
Lack of public information regarding the requirements and flow of
population administration services.
11
Optimization of business
process functionality
The lack of accuracy operator in putting the data so that can be found the
occurrence of errors in inputting data.
14
Operational and staff
productivity
The process of population administration service is relatively long. 11
Optimization of business
process functionality
Obstruction of population administration services because the central
service network connection is sometimes disconnected.
11
Optimization of business
process functionality
The unavailability of an online population administration service system. 7
Business service
continuity and availability
Applicant still incomplete to bring the data supporting so the delay of
service is occurred.
11
Optimization of business
process functionality
Table 1 is a mapping of critical points with business objectives in Government Institution Region X based on the COBIT 5
framework.
5.2. Identification of IT Goals
The mapping results obtained in business goals with a critical point are going to be carried out by mapping of business goals
with IT goals based on the COBIT 5 framework with the following results.
Table2Mapping business goals and IT goals
No. Business Purpose IT Goals
7 Business service continuity and availability 4, 10, 14
11 Optimization of business process functionality 1, 7, 8, 9, 12
14 Operational and staff productivity 8, 16
Table 2 is a mapping of business goals with IT goals based on the COBIT 5 framework. There are 10 IT goals obtained from the
mapping results.
5.3. Identification of IT process
After mapping between IT goals with business goals of organization, the next step is to identify IT processinCOBIT5.Withthe
reference of obtained IT goals, the chosen domain processes at COBIT 5 which has linkages Primary (P). Table 3 is the IT
process from the COBIT 5 framework obtained.
4. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD33496 | Volume – 4 | Issue – 6 | September-October 2020 Page 851
Table3 Mapping IT Goals with the IT processes
No. IT Goals
IT Process
EDM APO BAI DSS MEA
1 Alignment of IT and business strategy
01
02
01
02
03
05
07
08
01
02
- -
4 Managed IT-related business risk -
10
12
13
01
06
01
02
03
04
05
06
01
02
03
7 Delivery of IT services in line with business requirements 05
02
08
09
10
11
02
03
04
06
01
02
03
04
06
01
8 Adequate use of applications, information and technology solutions - 4
05
07
- -
9 IT agility 04
01
03
04
10
08 - -
10 Security of information, processing infrastructure and applications -
12
13
06 05 -
12
Enablement and support of business processes by integrating
applications and technology into business processes
- 08
02
07
- -
14 Availability of reliable and useful information for decision making. -
09
13
04,
10
03
04
-
16 Competent and motivated business and IT personnel 04
01
07
- - -
Table 3 represent 34 IT processes, the results of the mapping of IT goals with IT processes based on the COBIT 5 framework.
Table 4 is a summary of the results of the mapping of IT goals with the IT processes.
Table4.IT Processes related to IT Goals
Domain Sub Domain
EDM 01 02 04 05
APO
01 02 03 04 05 07
08 09 10 11 12 13
BAI
01 02 03 04 05 06 07
08 10
DSS 01 02 03 04 05 06
MEA 01 02 03
5.4. Results of Questionnaire Level of Interest
Questionnaire level of Interest referstotheframework COBIT5toolkit2managementawarenessdiagnostic,thisquestionnaire
aims to find out the opinions of top-level management at the Government Institution Region X of theexistingITprocesses.The
five processes that have the highest value will be selected as processes to be carried out in a more detailed audit. The table
below is the result of search importance on IT processes in Government Institution Region X.
Table5 Importance Level of IT Process Results
Domain Proses TI
APO07 Manage human resources
EDM04 Ensure resource optimization
DSS01 Manage operations
BAI01 Manage programs and projects
APO08 Manage relationship
5. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD33496 | Volume – 4 | Issue – 6 | September-October 2020 Page 852
5.5. Results of the Capability Level Questionnaire
The results of the questionnaire capability levels obtained after the processing of the questionnaire capability level that has
been distributed to the respondents who have been determined are used to determine the capability level of IT Process of
Government Institution Region X. Table 6 is the result of the maturity level questionnaire in the APO07 process.
Table 6 APO07 Process Questionnaire Results
Respondent
Maturity Level Process
Lv. Lv. Lv. Lv. Lv. Lv. Lv. Lv. Lv.
1.1 2.1 2.2 3.1 3.2 4.1 4.2 5.1 5.2
1 80 95 80 80 90 80 80 80 95
2 90 80 85 80 85 80 80 80 80
3 90 83 90 90 87 82 75 87 85
4 90 85 90 80 85 75 80 85 85
5 87 84 85 82 80 80 83 86 84
6 85 85 83 80 82 82 80 85 87
Average 87 85 86 82 85 80 80 84 86
Table 6 is the results of the questionnaire maturity level that is given to the respondents on APO07 process. The results
obtained from the APO07 is at the level 2, since the value of the average of the ratings of the respondents i.e. 85 on the
questionnaire level 2.1.
Table 6 Results Questionnaire Process EDM04
Respondent
Maturity Level Process
Lv. Lv. Lv. Lv. Lv. Lv. Lv. Lv. Lv.
1.1 2.1 2.2 3.1 3.2 4.1 4.2 5.1 5.2
1 80 90 95 80 80 90 80 80 80
2 85 80 80 80 85 80 80 80 80
3 75 82 83 83 80 75 70 75 77
4 70 80 80 85 85 75 75 80 80
5 80 85 82 87 84 80 80 80 82
6 79 82 80 85 82 80 80 82 80
Average 78 83 83 83 83 80 78 80 80
Table 7 is the results of a questionnaire maturity level that is given to the respondents onEDM04process.Theresultsobtained
from the EDM04 is at the level 1, due to the value of the average of the ratings of respondents i.e. 78 on the questionnaire level
1.
Table 7 Results of the DSS01 Process Questionnaire
Respondent
Maturity Level Process
Lv. Lv. Lv. Lv. Lv. Lv. Lv. Lv. Lv.
1.1 2.1 2.2 3.1 3.2 4.1 4.2 5.1 5.2
1 95 95 80 80 80 80 80 90 90
2 80 80 80 85 85 80 75 80 85
3 83 85 85 86 85 84 82 85 83
4 80 80 80 85 85 80 80 80 85
5 85 84 80 87 80 85 80 82 87
6 82 85 85 85 85 82 78 86 85
Average 84 85 82 85 83 82 79 84 86
Table 8 is the result of the questionnaire of maturity level that is given to the respondent on DSS01 process. The results
obtained from the DSS01 is at the level 1, because the value of the average ratings of respondents i.e. 84 on the questionnaire
level 1.
Table 8 BAI01 Process Questionnaire Results
Respondent
Maturity Level Process
Lv. Lv. Lv. Lv. Lv. Lv. Lv. Lv. Lv.
1.1 2.1 2.2 3.1 3.2 4.1 4.2 5.1 5.2
1 20 15 30 30 15 15 10 10 15
2 14 10 20 20 15 15 15 15 15
3 15 12 20 16 12 15 15 15 16
Average 16 12 23 22 14 15 13 13 15
Table 9 is the results of the maturity level questionnaire that is given to the respondents on BAI01 process. The results
obtained from the BAI01 is at the level 1, because the value of the average ratings of respondents i.e. 16 on the questionnaire
level 1.
6. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD33496 | Volume – 4 | Issue – 6 | September-October 2020 Page 853
Table 9 APO08 Process Questionnaire Results
Respondent
Maturity Level Process
Lv. Lv. Lv. Lv. Lv. Lv. Lv. Lv. Lv.
1.1 2.1 2.2 3.1 3.2 4.1 4.2 5.1 5.2
1 75 65 60 15 50 50 50 60 55
2 70 70 70 20 50 60 50 50 50
3 72 70 62 30 60 50 50 50 60
Average 72 68 64 22 53 53 50 53 55
Table 10 is the results of the maturity level questionnaire that is given to the respondents on APO08 process. The results
obtained from the APO08 is at the level 1, because the value of average ratings of respondents i.e.72onthequestionnairelevel
1.
5.6. Gap Level Analysis
The gap level analysis is carried out by looking at the condition of the maturity level of the existing IT processes in the current
Institution (Current Capability) by distributing a questionnaire and the comparing it with the expected IT process conditions
(Expected Capability) by the Institution.
Table 10 Gap Level of Capability Level Process
Proses TI Current Capability (CC) Expected Capability (EC) GAP (EC-CC)
APO07 2 4 2
EDM04 1 4 3
DSS01 1 4 3
BAI01 1 4 3
APO08 1 4 3
Table 11 is the current maturity level (current capability), the maturity level according to the head oftheInstitution (expected
capability), and the gap. Based on the distribution of the capability level of IT processes at the Institution had an average
capability level 1 which can be interpreted that the Institution is already running processes and processes implemented have
succeeded in achieving its goals.
5.7. Recommendations for Suggestion and Improvement
The gap from the process of determining the capability level at Government Institution RegionXisusedtodeterminethesteps
for changing the current maturity with the maturity expected by the institution. This audit research uses two frameworks as
suggestions and recommendations, namely COBIT 5 and ITIL 2011. The use of the two frameworks is expected to expand the
scope of suggestions and recommendations also to reach all the problems in detail that are generated based on various
guidelines in helping institution achieve the expected maturity level and improving institution performance. Increasing each
maturity level is done in a structured and gradual manner. Here are suggestions andrecommendationsonimprovementstoIT
processes at the Government Institution Region X.
Table 11 APO07 Process Suggestions and Recommendations
APO07 Process Improvement
Explanation
Providing and evaluating the human resources needed to fulfill the population administration
service process.
Recommendations
Providing technical guidance on a regular basis and targeted to all employees to improve
knowledge and quality of employees. (ITIL 2011 Service Design, Capacity Management, p.158).
Evaluating employee’s performance once a month and the results of the evaluation process
used to develop a plan to improve employee subordinate’s performance to be applied and
instructed directly, focus, and discipline. (COBIT 5 Enabling Process, APO07 Communicate
management objectives and direction, p.86).
Cooperate in holding workshops on population administration services with sources from the
Central Government to each employee at least once a year. The delivery of material in the
workshop must be clear and consistent, in order to encourage the development of knowledge
and employee performance. (COBIT 5 Enabling Process, APO07 Maintain the enablers of the
management system, p.85).
Providing awards which is a kind of scholarship to improve career paths to employees who
have good performance and discipline also as a form of appreciation from institution to
increase the motivation of other employees in order to improve their performances. (COBIT 5
Enabling process, APO07 Communicate Management Objectives and Direction, p.86).
Table 12 Provides recommendations and improvements to address gaps in the capability level of the APO07 process, namely
regarding managing human resources which refers to the framework COBIT5:EnablingProcessandITIL 2011 ServiceDesign.
7. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD33496 | Volume – 4 | Issue – 6 | September-October 2020 Page 854
Table 12 EDM04 Process Suggestions and Recommendations
EDM04 Process Improvement
Explanation The capacity of the resources of Government Institution Region X is met.
Recommendations
Providing resources, such as employees who are competent in accordance with the field as
well as other resources, such as computers, internet, electricity, and the rooms were
adequate for the implementation of inputting the data on population administration
running well, and able to minimize mistakes. Information in the form of guidelines is also
provided before data entry begins, so that it can be carried out properly. (ITIL 2011Service
Strategy, Demand Management, p.245).
Improving the ability of employees to conduct direct supervision and regularly, so that
employees carry out services in inputting data can be monitored, when there are errors and
irregularities in the inputting data on population administration can be implemented
immediately. (COBIT 5 Enabling Process, EDM04 Evaluate resource management, p.44).
Designing SOP regarding employee qualifications in operating population administration
data entry, SOP contains job description, duties, responsibilities, authorities, education, and
experiences that each employee has for the sake of good service. (COBIT 5 Enabling Process,
EDM04 Evaluate resource management, p.44).
Table 13 is a recommendation for suggestions and improvements to overcome the gap in the capability level of the EDM04
process, namely regarding to ensure resource optimization, which referstotheframework COBIT5:EnablingProcessandITIL
2011 Service Strategy.
Table 13 DSS01 Process Suggestions and Recommendations
DSS01 process improvement
Explanation
The population administration service is carried out, monitored, and reported in accordance
with established policies.
Recommendations
Managing the schedule service operations in accordance with the procedures established
policies and to ensure that all data processing requirements needed services in a timely
manner, in order to provide results in accordance with service standards. (ITIL 2011, Service
Operations, Event Management, p.58).
Evaluating policies and procedures of population administration services that can impede
the course of settlement administration services that can be implemented immediately, so
that services become more optimal. (COBIT 5 Enabling process, DSS01 Monitor IT
Infrastructure, p.174).
Making a daily schedule of population administration service processes and determine
service process can be consistent, measurable, and can optimize the availability of resources.
(COBIT 5 Enabling process, DSS01 Perform Operational Procedures, p.174).
Making report or daily routine reports on the process of settlement administration services.
Reports or daily routine reports on the service process are used in order to facilitate the
evaluation and reporting process for population administration services. (COBIT 5 Enabling
process, DSS01 Monitor IT Infrastructure, p.174).
Table 14 is a recommendation for suggestions and improvements to overcome the gap in the capability level of the DSS01
process, namely regarding to manage operations, which refers to the framework COBIT 5: Enabling Process and ITIL 2011
Service Operations.
Table 14 BAI01 Process Suggestions and Recommendations
BAI01 process improvement
Explanation
Designing a system service population administration is online and provide a source of
power that is in accordance with the plan of the institution.
Recommendations
Coordinate with the online service system developer regarding the flow, requirements,
system design, and menu of each service in the online service system. (ITIL 2011, Service
Design, Design Coordination, p86).
Making indicators of the success of the online service system and it is recommended to
create a menu of community aspirations and live chat that can be accessed by the public to
facilitate interaction, resulting in feedback or responses from the community in determining
indicators of the success of the online service system. (COBIT 5 Enabling Process, BAI01 Plan
Projects, p.124).
Determining the standard source of power that is needed to be able to support the needs of
system service online, such as the Internet are stable, the computer with specs are adequate,
and operators who meet the qualifications in order to be able to provide benefits in
accordance with expectations. (COBIT 5 Enabling Process, BAI01 Manage projects resources
and work packages, p.126).
8. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD33496 | Volume – 4 | Issue – 6 | September-October 2020 Page 855
Creating a special user for institution leaders to be able to log in to the online service system
that functions to track population documents and monitor the development of service
processes in the online service system. (COBIT 5 Enabling Process, BAI01 Manage
stakeholder engagement, p.122).
Coordinate is routine with employees services online to make sure the results of the
indicators of the success of the system services online according to the plan which is
expected to institution and the public. In addition, the results can be used as a review to
improve future services. (COBIT 5 Enabling Process, BAI01 Plan Projects, p.124).
Defining with clear about roles and responsibilities for the procurement and management of
source power to the employees of the service online, so that when the case an obstacle and
problems in source power system services online can be immediately followed up and
resolved. (COBIT 5 Enabling Process, BAI01 Manage project resources and work packages,
p.126).
Table 15 provides recommendations for suggestions and improvements to address gaps in the capability level of the BAI01
process, namely regarding to manage programs and projects, which refers to the framework COBIT 5: Enabling Process and
ITIL 2011 Service Design.
Table 15 SAPO08 Process Suggestions and Recommendations
APO08 Process improvement
Explanation Have a strategy in delivering data and service information through websites and social media.
Recommendations
Forming a special team in analyzing community needs on the use of websites and social media in
the delivery of data and service information to be used as a review in implementing innovative
data and information service delivery strategies, in order to improve performance. (ITIL 2011,
Service Strategy, Demand Management, p.245).
Coordinating with the employee in charge of managing the websites and social media, in order to
be able to increase interaction and communication in the community actively in an easily
understood in accordance with the standards and procedures. (COBIT 5 Enabling Process,
APO08 Manage the business relationship, p.91).
Coordinating regularly with employees to review the current technology trends and future use
by the public, so that the application of technology in the delivery of data and information
services to the appropriate target. (COBIT 5 Enabling process, APO08 Identify opportunities,
risks and constraints for IT to enhance the business, p.91).
Conducting community satisfaction surveys through websites and social media regularly to find
out people’s satisfaction and opinions regarding the delivery of data and service information, and
to ensure that any problems are followed up and the use of technology used can be continuously
improved. (COBIT 5 Enabling Process, APO08 Manage the business relationship, p.91).
Table 16 provides recommendations and improvements toaddressthegapinthecapabilitylevel oftheAPO08process,namely
regarding managing relationships, which refers to the framework COBIT 5: Enabling Process and ITIL 2011 Service Strategy.
6. CONCLUSION
The conclusion that can be drawn based on the discussions
that have been described from research audits of
Information Technology at the Government Institution
Region X is done by identifying the critical point were
obtained from interviews in directly with senior Institution
and aspirations of the public on the website of the
Institution, identifying the purpose of business, identify the
purpose of IT, and the identification of IT process. The
methods used in the collection of data that interview and
questions in the form of questionnaire the level of interest
and capabilities are further analyzed to obtain the results
that are needed. The results of the implementation of the
audit using the framework COBIT 5 produces five IT
processes that are at the level of the lowest based on the
calculation of the questionnaire capability level, namely,
among others APO07 about managing human resources
were at level 2 with a gap 1 and the rest are at level 1 with a
gap 3 of them, EDM04 about to ensure resource
optimization, DSS01 on managing operations, BAI01 on
managing programs and projects, and APO08 on managing
relationships. Results have shown the gapbetweenthegoals
that are expected by the institution with the current state is
arranged with amount of suggestionsandrecommendations
for improvement level on each process. Giving
recommendations suggestionsandimprovementarecarried
out by referring to the framework COBIT 5 and ITIL 2011, is
expected to reach the level of process that is expected by the
Institution.
7. REFERENCES
[1] H. Setiawan and K. Mustofa, “Metode Audit Tata Kelola
Teknologi Informasi di InstansiPemerintahIndonesia,”
J. IPTEKKOM J. Ilmu Pengetah. Teknol. Inf., vol. 15, no. 1,
p. 1, 2013, doi: 10.33164/iptekkom.15.1.2013.1-16.
[2] N. P. S. Merta Suryani, G. M. A. Sasmita, and I. K. A.
Purnawan, “Audit of accounting information system
using COBIT 4.1 focus on deliver and support domain,”
J. Theor. Appl. Inf. Technol., vol. 78, no. 3, pp. 456–463,
2015.
[3] A. David Purba, I. K. Adi Purnawan, and I. P. Agus Eka
Pratama, “Audit Keamanan TI Menggunakan Standar
ISO/IEC 27002 dengan COBIT 5,” J. Ilm. Merpati
(Menara Penelit. Akad. Teknol. Informasi),vol.6,no.3,p.
148, 2018, doi: 10.24843/jim.2018.v06.i03.p01.
9. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD33496 | Volume – 4 | Issue – 6 | September-October 2020 Page 856
[4] I. P. A. B. I Putu Ade Ambara Putra, I Made Sukarsa,
“Audit TI Kinerja Manajemen PT. X Dengan Frame
Work Cobit 4.1,” Lontar Komput., vol. 6, no. 1, pp. 13–
24, 2015.
[5] I. K. A. Purnawan, “Pedoman Tata Kelola Teknologi
Informasi Menggunakan It Governance Design Frame
Work (Cobit) Pada PT. X,” Lontar Komput. J. Ilm. Teknol.
Inf., vol. 6, no. 3, p. 200, 2015, doi:
10.24843/lkjiti.2015.v06.i03.p07.
[6] P. Juliantari, G. R. Dantes, and D. G. H. Divayana,
“Analysis of E-Government Governance in Bangli
District’s Government Using the COBIT 5 Framework,”
Adv. Soc. Sci. Educ. Humanit. Res., vol. 394, no. Icirad
2019, pp. 347–353, 2020, doi:
10.2991/assehr.k.200115.057.
[7] Y. F. Rio Kurnia Candra, Imelda Atastina, “Audit
Teknologi Informasi menggunakan Framework COBIT
5 Pada Domain DSS (Delivery, Service, and Support)
(Studi Kasus : iGracias Telkom University),” e-
Proceeding Eng., vol. 9, no. 1, pp. 1129–1144, 2015,
[Online]. Available:
https://jurnaldigit.org/index.php/DIGIT/article/view/
137/97.
[8] A. H. Syadiah, “Audit Aplikasi Zahir di PT Radisa
Mahardi Rekatama Menggunakan Framework COBIT
5,” Anal. Apl. “Line” Pada Pengguna. Teknol. Inf. dan
Komun., vol. 2, no. 1, pp. 159–163, 2016, doi:
10.1017/CBO9781107415324.004.
[9] R. E. Putri, “Penilaian Kapabilitas Proses Tata Kelola TI
Berdasarkan Proses DSS01 Pada Framework COBIT5,”
J. CoreIT, vol. 2, no. 1, pp. 41–54, 2016.