Open Access. Powered by Scholars. Published by Universities.®

Library and Information Science Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer and Systems Architecture

Audit

Publication Year
File Type

Articles 1 - 2 of 2

Full-Text Articles in Library and Information Science

The Effect Of Information Technology Audit For E-Health Of Indonesia Using Itil Framework V.3 Domain Service Design, Eva Mufidah, Ilham M, Anis Eliyana, Tanti Handriana, Indrianawati Usman Nov 2020

The Effect Of Information Technology Audit For E-Health Of Indonesia Using Itil Framework V.3 Domain Service Design, Eva Mufidah, Ilham M, Anis Eliyana, Tanti Handriana, Indrianawati Usman

Library Philosophy and Practice (e-journal)

This study explain about E-Health Surabaya is a web-based health service technology application that is used to help people register as patients in hospitals and health centers. Although its function is very useful, there are also people who still do not understand how to use this application, there are also some shortcomings that cause inconvenience in its use. So that research is conducted in which the application uses ITIL V.3 framework with Domain Service Design to conduct an audit of the maturity level of this E-Health Surabaya Web Application. ITIL (Information Technology Infrastructure Technology) is a framework used to manage …


Technology Safety Audit In Computer Laboratories Using Iso/Iec 17799 : 2005 (Case Study: Ftk Uin Sunan Ampel Surabaya), Muqoffi Khosyatulloh, Nurul Fariidhotun Nisaa, Ilham, M. Kom Dec 2019

Technology Safety Audit In Computer Laboratories Using Iso/Iec 17799 : 2005 (Case Study: Ftk Uin Sunan Ampel Surabaya), Muqoffi Khosyatulloh, Nurul Fariidhotun Nisaa, Ilham, M. Kom

Library Philosophy and Practice (e-journal)

Management audit is very important for assessment of their information technology management to gain efficient and effective business running process. Information technology security as an effort of internal controlling for risk and threat security minimization, is mainly considered due to all learning and lecturing administration activities use information technology. Allso, the implementation of a number of computer labs to facilitate learning processes and access to information in order to support the lectures and personal development of students To find out how secure technology information is, it is then requiring an audit to make sure everything run based on procedure. Management …