Evaluasi Tata Kelola Teknologi Informasi di Perpustakaan Perguruan Tinggi dengan COBIT 5
Main Article Content
Abstract
The COBIT 5 framework can be implemented in all organizations or enterprises. This study analyzes and finds the maturity level of IT governance in the XYZ Library. Libraries have a role in encouraging the efficiency and effectiveness of the learning process. The IT governance element in COBIT 5 aims to get results from evaluating stakeholders' needs, conditions and choices. Survey and in-person interviews are methods of obtaining data and information from the IT governance process at the XYZ Library. The COBIT 5 domains used are evaluated, direct, and monitored (EDM) and align, plan and organize (APO) domains. The results of the evaluation that have been carried out show the findings of gaps in the process domain EDM01 with a value of 2.34 and EDM04 with a gap of 2.25. While in the process domain, APO01 with a gap of 2.13, and APO07 with a gap of 2.34. With the average value of the entire gap at the level of 2.26, the findings of the XYZ Library with the process domains EDM01, EDM04, APO01, and APO07 show that the process is managed and the results are determined, controlled, and maintained (Managed). For further research, we can add more process domains both in the Governance and Management areas so that the audit process with the COBIT 5 framework can be carried out comprehensively.
Article Details

This work is licensed under a Creative Commons Attribution 4.0 International License.
References
[2] Tzu-Chieh Lin, & Wang, K. J. (2021). Project-based maturity assessment model for smart transformation in Taiwanese enterprises. PLoS ONE, 16, 1–19. https://doi.org/10.1371/journal.pone.0254522
[3] Cláudia, A., Mira, M., Pereira, R., & Gonçalves, M. (2020). Using agile methodologies for adopting COBIT. Information Systems, Volume 101, 101496. https://doi.org/10.1016/j.is.2020.101496
[4] Plant, O. H., Hillegersberg, J. Van, & Aldea, A. (2022). Rethinking IT governance: Designing a framework for mitigating risk and fostering internal control in a DevOps environment. International Journal of Accounting Information Systems, 45, 100560. https://doi.org/10.1016/j.accinf.2022.100560
[5] Maci, F., Martinez, B., & Fonseca, I. L. (2021). Strategic IT alignment Projects. Towards Good Governance Francisco. Computer Standards & Interfaces, 76(October 2020), 103514. https://doi.org/10.1016/j.csi.2021.103514
[6] Al-matari, O. M. M., Helal, I. M. A., Mazen, S. A., & Elhennawy, S. (2021). Adopting security maturity model to the organizations ’ capability model. Egyptian Informatics Journal, 22(2), 193–199. https://doi.org/10.1016/j.eij.2020.08.001
[7] Varga, S., Brynielsson, J., & Franke, U. (2021). Cyber-threat perception and risk management in the Swedish financial sector. Computers & Security, 105, 102239. https://doi.org/10.1016/j.cose.2021.102239
[8] Tan, E., Mahula, S., & Crompvoets, J. (2022). Blockchain governance in the public sector : A conceptual framework for public management. Government Information Quarterly, 39(1), 101625. https://doi.org/10.1016/j.giq.2021.101625
[9] Naim, A. B., Wibawa, A. S., Yude, A. K., Akbar, B. K., Naim, A. B., Wibawa, A. S., Yude, A. K., Akbar, B. K., Rahmadani, V. S., Shihab, M. R., Ranti, B., Rahmadani, V. S., Shihab, M. R., & Ranti, B. (2022). Changes in IT governance and its impact on organizational business process: Case study at Indonesia Supreme Audit Institution (BPK). Procedia Computer Science, 197(2021), 734–742. https://doi.org/10.1016/j.procs.2021.12.195
[10] Zainuddin, N., & Winarno, W. W. (2020). IT governance evaluation at the population and civil registry office in Kolaka district using COBIT 5 framework. Jurnal Ilmiah Teknologi Sistem Informasi, 6(2), 86–95. https://doi.org/10.26594/register.v6i2.1728
[11] Trisnadewi, et al. (2022). IT Governance Audit at District X Communications and Information Office Using COBIT 5. JITE (Journal of Informatics and Telecommunication Engineering), 5, 360–370. https://doi.org/10.31289/jite.v5i2.6183
[12] Riadi, Imam, S., & Handoyo, E. (2019). Security Analysis of GRR Rapid Response Network using COBIT 5 Framework. Lontar Komputer, 10(1), 29–39. https://doi.org/10.24843/LKJITI.2019.v10.i01.p04
[13] Sunil, B. (2016). Performance measurement metrics for IT governance. ISACA Journal, 6, 21-27.
[14] Al-matari, O. M. M., Helal, I. M. A., Mazen, S. A., & Elhennawy, S. (2021). Adopting security maturity model to the organizations ’ capability model. Egyptian Informatics Journal, 22(2), 193–199. https://doi.org/10.1016/j.eij.2020.08.001
[15] Alaeddini, M., & Amini, M. M. (2019). Integrating COBIT with a hybrid group decision ‑ making approach for a business ‑ aligned IT roadmap formulation. In Information Technology and Management. Springer US. https://doi.org/10.1007/s10799-019-00305-0
[16] Amali, L. N., Katili, M. R., Suhada, S., & Hadjaratie, L. (2020). The measurement of maturity level of information technology service based on COBIT 5 framework. TELKOMNIKA Telecommunication, Computing, Electronics and Control, 18(1), 133–139. https://doi.org/10.12928/TELKOMNIKA.v18i1.10582
[17] Magnusson, J., Koutsikouri, D., & Päivärinta, T. (2020). Efficiency creep and shadow innovation : enacting ambidextrous IT Governance in the public sector. European Journal of Information Systems, 29(4), 329–349. https://doi.org/10.1080/0960085X.2020.1740617
[18] Wyk, J. Van, & Rudman, R. (2019). COBIT 5 compliance : best practices cognitive computing risk assessment and control checklist. Meditari Accountancy Research, 27(5), 761–788. https://doi.org/10.1108/MEDAR-04-2018-0325