Jurnal Respati Vol VIII Nomor 24 Nov 2013 ISSN 1907-2430 – Andi Dwi Riyanto

[PERENCANAAN SISTEM INFORMASI STRATEGIS PADA AMIK BSI PURWOKERTO]

Sistem Informasi pada sebuah Perguruan Tinggi pada saat ini telah menjad tren dan sudah umum digunakan. Namun, belum banyak Perguruan Tinggi yang memaksimalkannya. Pada penulisan tesis ini, penulis membuat perencanaan sistem informasi strategis pada AMIK BSI Purwokerto. Sistem informasi yang sudah ada, akan dimaksimalkan agar mampu memiliki kelebihan dan berpengaruh pada sisi fungsionalnya dimana fokus pembahasan dititik beratkan pada sisi penerimaan mahasiswa baru. Adapun metode analisis yang digunakan adalah metode Ward & Peppard fokus pada analisis SWOT.

Penelitian ini dilakukan dengan menggunakan metode Ward & Peppard dan metode penelitian Action research. Adapun tahapan-tahapan yang dilakukan meliputi identifikasi kebutuhan informasi, identifikasi faktor internal dan eksternal bisnis dan identifikasi faktor-faktor internal SI/TI. Penelitian menggunakan metode Action Research, dimana peneliti melakukan intervensi dan beberapa diskusi dilapangan.

Hasil penelitian antara lain sebuah portofolio yang dapat digunakan pada bagian penerimaan mahasiswa baru di AMIK BSI Purwokerto. Portofolio tersebut kemudian digunakan sebagai acuan guna membentuk sebuah rencana strategis masa depan TI jangka menengah.

Download : http://goo.gl/slCmiY, Penjadwalan

FCNS – 2. Planning For Security

Chapter Objectives :

*Recognize the importance of planning and describe the principal components of organizational planning.

*Know and understand the principal components of information security system  implementation planning as it functions within  the organizational planningscheme.

Successful organizations utilize planning involves:

  1. Employees
  2. Management
  3. Stockholders
  4. Other outside stakeholders
  5. Physical environment
  6. Political and legal environment
  7. Competitive environment
  8. Technological environment

Download : http://goo.gl/YYJyr8

SPIS – 3. Konsep (Komponen) Penting dalam Strategi SI/TI

Materi yang dibahas mencakup :

  1. Tujuan Perencanaan dan Formulasi Strategi SI/TI
  2. Faktor-faktor yang Mempengaruhi Pengembangan SI/TI
  3. Model Proses Perencanaan Strategi SI/TI
  4. Framework Proses Perencanaan SI/TI
  5. Jenis Luaran dari Proses Perencanaan SI/TI
  6. Evaluasi Perencanaan Strategis SI/TI

Download : http://goo.gl/hS6Tra

 

SPIS – 2. Pengembangan Strategi SITI

Yang dibahas pada bab ini :

  1. Definisi Strategi dan Kebijakan SI/TI
  2. Ruang Lingkup
  3. Tujuan Pengembangan Strategi dan Kebijakan SI/TI
  4. Fungsi Strategi
  5. Perkawinan antara DUNIA MANAJEMEN dan TEKNOLOGI INFORMATIKA
  6. Perlunya Strategi dalam SI/TI
  7. Tingkatan Strategi
  8. Pola Umum dalam Manajemen Strategis
  9. Proses dalam Pengembangan Strategi SI/TI

Download Materi : http://goo.gl/u9dQ6x

FCNS – 1. Introduction To The Management Of Information Security

Chapter Overview

The opening chapter establishes the foundation for understanding the field  of Information Security. This is accomplished by explaining the importance of information technology and defining who is responsible for protecting an organization’s information assets. In this chapter, the student will come to know and understand the definition and key characteristics of information security as well as the come to recognize the characteristics that differentiate information security management from general management.

 Chapter Objectives

When you complete this chapter, you will be able to:

  1. Recognize the importance of information technology and understand who is responsible for protecting an organization’s information assets
  2. Know and understand the definition and key characteristics of information security
  3. Know and understand the definition and key characteristics of leadership and management
  4. Recognize the characteristics that differentiate information security management from general management

 Introduction

Information technology is the vehicle that stores  and transports information—a company’s most valuable resource— from one business unit to another.

But what happens if the vehicle breaks  down,  even for a little  while?

As businesses have become  more fluid,  the concept of computer security has been replaced by the concept of information security.  Because this new concept covers  a broader range  of issues, from the protection of data to the protection of human resources, information security is no longer  the sole responsibility of a discrete group  of people  in the company; rather, it is the responsibility of every employee, and especially managers.

Organizations must realize that information security funding and planning decisions involve more than just technical managers:

Rather, the process should  involve three  distinct groups  of decision makers, or communities of interest:

  1. Information security managers and professionals
  2. Information technology managers and professionals
  3. Nontechnical business managers and professionals

These  communities of interest fulfill the following roles:

  1. The information security community protects the organization’s information assets from the many threats they face.
  2. The information technology community supports the business objectives of the organization by supplying and supporting information technology appropriate to the business’ needs.

The nontechnical general business community articulates and communicates organizational policy  and objectives and allocates resources to the other groups.

Material Download : http://goo.gl/0bK31o