Evaluasi Kelembagaan dan Layanan Sistem Digital KKN Di Universitas XYZ Dengan Pendekatan Kerangka Tata Kelola Informasi
DOI:
https://doi.org/10.25078/nivedita.v1i2.4927Kata Kunci:
Evaluasi Sistem, Layanan Digital, KKN, Tata Kelola, Keamanan Informasi, COBIT 5Abstrak
Penelitian ini bertujuan untuk mengevaluasi sistem layanan digital Kuliah Kerja Nyata (KKN) di Universitas XYZ menggunakan pendekatan deskriptif kualitatif. Data diperoleh melalui wawancara mendalam, observasi teknis, dan analisis dokumen terhadap kebijakan internal, struktur tata kelola, serta kontrol keamanan sistem. Analisis dilakukan dengan menggunakan kerangka kerja COBIT 5, khususnya pada domain EDM (Evaluate, Direct and Monitor), APO (Align, Plan and Organize), dan BAI (Build, Acquire and Implement) untuk mengukur tingkat kapabilitas proses tata kelola dan pengelolaan keamanan informasi. Hasil penelitian menunjukkan bahwa sistem telah mengimplementasikan kontrol teknis dasar seperti protokol HTTPS, backup data rutin, dan manajemen hak akses berbasis peran. Namun, kelemahan ditemukan pada aspek tata kelola kelembagaan dan manajemen risiko, seperti belum tersedianya dokumen kebijakan formal, tidak adanya prosedur manajemen risiko, dan absennya struktur koordinasi yang terdokumentasi. Domain EDM dan sebagian domain APO serta BAI masih berada pada level kapabilitas rendah (Level 0–1), menunjukkan belum terstrukturnya proses inti secara institusional. Penelitian ini merekomendasikan penyusunan dokumen tata kelola TI, pembentukan komite pengarah TI, penguatan kontrol keamanan melalui autentikasi multi-faktor, serta pengembangan prosedur perubahan dan dokumentasi sistem yang sistematis, guna meningkatkan keandalan dan keberlanjutan sistem digital KKN di lingkungan universitas.
Unduhan
Referensi
M. H. Aziz and E. Tasrif, "Rancang Bangun Sistem Informasi KKN UNP Berbasis Web Menggunakan Framework Codeigniter," JAVIT: Jurnal Vokasi Informatika, pp. 131–136, Mar. 2022, doi: 10.24036/javit.v2i1.79.
M. A. Ade Saputra et al., "Sistem Informasi Manajemen KUKERTA Berbasis Web Pada UIN Jambi," 2021.
D. Y. Muthmainnah, V. Ilhadi, et al., "Audit of academic information system governance using COBIT 2019 (Case study: Subang University)," AIP Conf. Proc., vol. –, Art. no. 5.0253883, Apr. 2025.
ISACA, COBIT 5: A Business Framework for the Governance and Management of Enterprise IT, Rolling Meadows, IL: ISACA, 2012.
A. I. F. Wulandari et al., "The performance analysis of SIKITO LLDIKTI Region II system using COBIT 2019 framework: A case study," Int. J. Artif. Intell. Res., vol. 7, no. 2, pp. 111–121, 2024.
J. W. Creswell, Research Design: Qualitative, Quantitative, and Mixed Methods Approaches, 4th ed., Sage, 2016.
M. B. Miles, A. M. Huberman, and J. Saldaña, Qualitative Data Analysis: A Methods Sourcebook, 3rd ed., Sage, 2014.
ISACA, COBIT 5 Implementation, Rolling Meadows, IL: ISACA, 2012.
R. K. Yin, Case Study Research: Design and Methods, 6th ed., Sage Publications, 2018.
I. Benbasat, D. K. Goldstein, and M. Mead, "The Case Research Strategy in Studies of Information Systems," MIS Quarterly, vol. 11, no. 3, pp. 369-386, Sep. 1987.
S. De Haes and W. Van Grembergen, "IT Governance and Its Mechanisms," Information Systems Control Journal, vol. 1, pp. 27-33, 2004.
ISACA, COBIT 5: Enabling Processes, Rolling Meadows, IL: ISACA, 2012.
M. Q. Patton, Qualitative Research and Evaluation Methods, 4th ed., Sage Publications, 2015.
S. Kvale and S. Brinkmann, Interviews: Learning the Craft of Qualitative Research Interviewing, 3rd ed., Sage Publications, 2015.
J. P. Spradley, Participant Observation, Holt, Rinehart and Winston, 1980.
G. A. Bowen, "Document Analysis as a Qualitative Research Method," Qualitative Research Journal, vol. 9, no. 2, pp. 27-40, 2009.
K. Charmaz, Constructing Grounded Theory, 2nd ed., Sage Publications, 2014.
R. E. Stake, The Art of Case Study Research, Sage Publications, 1995.
V. Braun and V. Clarke, "Using Thematic Analysis in Psychology," Qualitative Research in Psychology, vol. 3, no. 2, pp. 77-101, 2006.
QSR International, NVivo Qualitative Data Analysis Software, Version 12, 2018.
N. K. Denzin, The Research Act: A Theoretical Introduction to Sociological Methods, Prentice Hall, 1989.
Y. S. Lincoln and E. G. Guba, Naturalistic Inquiry, Sage Publications, 1985.
ISACA, COBIT 5: Process Assessment Model (PAM) - Using COBIT 5, Rolling Meadows, IL: ISACA, 2013.
ISO/IEC, ISO/IEC 15504-2: Information Technology - Process Assessment - Part 2: Performing an Assessment, International Organization for Standardization, 2003.
R. Steinberg, COBIT 5 and Enterprise Governance of IT, John Wiley & Sons, 2013.
L. Gorgona, "CAT5: A Tool for Measuring the Maturity Level of Information Technology Governance Using COBIT 5 Framework," International Journal of Advanced Computer Science and Applications, vol. 7, no. 2, pp. 424-433, 2016.
S. De Haes, W. Van Grembergen, and R. S. Debreceny, "COBIT 5 and Enterprise Governance of Information Technology: Building Blocks and Research Opportunities," Journal of Information Systems, vol. 27, no. 1, pp. 307-324, 2013.
Unduhan
Diterbitkan
Cara Mengutip
Terbitan
Bagian
Lisensi
Hak Cipta (c) 2025 Journal Informatics Nivedita

Artikel ini berlisensiCreative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.