Rini Au 2
Rini Au 2
Article History
Received March 7th, 2022
Revised June 28th, 2022
Accepted June 28th, 2022
Published August, 2022
Abstract— The food security, fisheries and agriculture services work with local government to help the community. In carrying out
its work, the government applies information technology to achieve the goals. Therefore, it is necessary to have an IT governance
design to ensure the alignment of the government’s objectives and the use of IT. Governance is an important asset to measure the
effectiveness and efficiency of work process improvement using IT. This research is conducted because there has never been an IT
governance design assessment. The analysis and design of IT governance at government agencies are carried out using the COBIT
2019 framework to measure the level of IT capability. The research method used is descriptive qualitative by conducting interviews
with influential government parties. This study obtained an IT governance design and detected important processes for the domains
used, namely EDM04, APO04, APO07, APO08, APO11, BAI03, BAI08, BAI10.
Keywords— information technology; IT governance design; effectiveness; efficiency; IT governance design assessment
IJID (International Journal on Informatics for Development), e-ISSN: 2549-7448
Vol. 11, No. 1, 2022, Pp. 152-161
This article is distributed under the terms of the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
See for details: https://creativecommons.org/licenses/by-nc-nd/4.0/
153
IJID (International Journal on Informatics for Development), e-ISSN: 2549-7448
Vol. 11, No. 1, 2022, Pp. 152-161
of these processes were conducted entirely based on the tips In Fig. 4, there are numerous strategies in designing an IT
in the COBIT 2019, given through the previous level [6]. It is governance device. In the first procedure, the authors did
shown in Fig. 4. interviews with stakeholders and made some observation at
the government office to apprehend the preliminary steps in
designing IT governance by way of identifying the existing
strategies in the office. This stage explored expert’s idea and
the employer's strategy, agency goals, profile, and issues
related to records and era, which was primarily based on the
layout criteria furnished through COBIT 2019. Secondly,
interviews were carried out with applicable stakeholders to
decide the preliminary scope of the governance system by
using layout thing 1 – design factor 4. Then, the 0.33 system
was used to identify upgrades to the initial scope of the
governance machine with the aid of considering aspects of
design issue 5 to layout element 11. At the final stage, the
Department of Food Security, Agriculture and Fisheries
identified some possibilities to improve the existing
governance system by bringing together all inputs from the
previous stage regarding the expected governance design.
The new design should accommodate all the inputs. Lastly,
conclusions were drawn from the layout phase which should
propose a layout of governance gadget for the employer [7].
This article is distributed under the terms of the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
See for details: https://creativecommons.org/licenses/by-nc-nd/4.0/
154
IJID (International Journal on Informatics for Development), e-ISSN: 2549-7448
Vol. 11, No. 1, 2022, Pp. 152-161
international standards, frameworks and quality practices suggestions for the issuance of SIUP in the field of fish
continuing the relevance of COBIT and guarantees that cultivation, and fish farming management;
COBIT continues its installed role because the • Monitoring, assessment and reporting inside the subject
overarching EGIT framework. of meal security in agriculture and fisheries;
• COBIT layout manual 2019: Designing data governance • Enhancing the great of human assets within the fields of
and era answers’ gives prescriptive how-to insights for meals protection, agriculture and fisheries;
COBIT users concerning EGIT device design. With its • Administration of food, agriculture and fishery
new idea of 'design factors', COBIT 2019 affords first- protection services; and
hand perception into the ones elements that can have an
• Implementation of different capabilities given through
effect on an EGIT device. This guide similarly covers
the mayor in accordance with his duties and features.
workflows for designing and tailored EGIT systems to
the company's unique context.
• COBIT Implementation manual 2019: Implementation 2.4 Governance and Management
and Optimization of records and technology Governance Governance and control in COBIT are grouped into five
solutions 'offers a roadmap for non-stop development of domains. Governance is grouped within the evaluation, lead,
the EGIT gadget. This implementation guide is logically and display (EDM) area. It includes: regulate the bodies,
intently associated with the design manual [11]. compare strategic alternatives, direct senior control on
selected strategic options and display approach fulfillment.
2.3 Agriculture and Fisheries Food Security Agency Management is grouped under 4 domains: Align, Plan, and
Arrange (APO). It addresses the overall business enterprise,
The food security service for agriculture and fisheries has strategy, and support sports for I&T. Builds, Accumulates
the project of assisting the mayor in carrying out authorities’ and Puts in force (BAI) addresses the definition, acquisition
affairs which are the regional authority and helping and implementation of I&T solutions and their integration in
obligations in the fields of meals protection, agriculture and enterprise procedures. Next, Shipping, Service, and Assist
fisheries. In carrying out the responsibilities of the Agriculture (DSS) handles the operational delivery and support of I&T
and Fisheries food security carrier, it contains out the services, including safety. Next, Monitoring, Evaluating and
subsequent functions: Assessing (MEA) addresses tracking of I&T overall
• Formulation and implementation of areas within the field performance and conformance with inner overall
of food availability, food lack of confidence, food performance objectives, internal manipulate objectives, and
distribution, meals reserves, diversification of outside requirements.
consumption and meals protection To meet the targets of governance and control, every
• Implementation of nearby rules within the field of meals employer wishes to establish, adjust, and keep a governance
availability, food insecurity, food distribution, meals system that is constructed from a number of components.
reserves, diversification of intake and food security; Components are elements that make contributions to the best
• Components of agricultural extension programs; operation of the company governance gadget of I&T, engage
• Improvement of meals protection, agriculture and fishery with every difference, ensuing in a holistic governance
infrastructure; system for I&T. Components can be of diverse sorts. The
• Pleasant control, distribution and control of the delivery most familiar is the method. However, the governance system
of plant seeds, farm animals’ seeds/seeds and animal additives also consist of organizational structure, rules and
fodder forage; procedures, records gadgets, lifestyle and behavior, skills and
capabilities and offerings, infrastructure and programs. Fig. 5
• Supervision of the use of agricultural and fishery centers
displays adaptations of the organizational structure of IT
• Development of production in the fields of agriculture Governance.
and fishery;
• Control and manage of plant and animal illnesses;
• Natural catastrophe manipulate and management;
• Development, processing and marketing of agricultural
and fishery merchandise;
• Implementation of agricultural extension;
• Granting of agricultural business licenses/technical
guidelines;
• Components of guidelines for the empowerment of small
fish farming businesses, hints for the issuance of SIUP
within the subject of fish cultivation, and control of fish
cultivation;
• Enforcing rules for empowering small fish farming
businesses, recommending the issuance of SIUP within
the area of fish farming, and control of fish farming;
• Implementation of assessment and reporting of fish
farming small enterprise empowerment guidelines, Figure 5. The organizational structure of IT governance
This article is distributed under the terms of the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
See for details: https://creativecommons.org/licenses/by-nc-nd/4.0/
155
IJID (International Journal on Informatics for Development), e-ISSN: 2549-7448
Vol. 11, No. 1, 2022, Pp. 152-161
Meanwhile, process describes a fixed practices and activities EG04 Finance Financial information quality
which can be organized every day to achieve a selected goal Customer-oriented service
EG05 Customer
culture
and convey fixed outputs that guide the achievement of Continuity and availability of
average IT-related goals. EG06 Customer
business services
Management information
EG07 Customer
Factors that can influence the design of a corporate quality
governance system and position it for success in the use of Optimization of internal
EG08 Intern
business process functionality
I&T can be seen in Fig.6 [12]. Optimization of business
EG09 Intern
process costs
Staff skills, motivation and
EG010 Intern
productivity
EG011 Intern Internal policy compliance
Managed digital transformation
EG012 Growth
program
Product and business
EG013 Growth
innovation
This article is distributed under the terms of the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
See for details: https://creativecommons.org/licenses/by-nc-nd/4.0/
156
IJID (International Journal on Informatics for Development), e-ISSN: 2549-7448
Vol. 11, No. 1, 2022, Pp. 152-161
F Regular audit findings or other assessment reports of poor IT However, IT is not seen as a driver of business process
performance or reported IT quality or service issues and service innovation.
G Hidden and rogue IT spending, that is, IT spending by user IT is seen as a driver for innovation in business
departments outside the control of normal IT investment processes and services. At this time, however, there is
Turn
decision mechanisms and approved budgets no critical reliance on IT for the running and continuity
H Duplication or overlap between various initiatives, or other of current business processes and services.
forms of wasted resources IT is critical to running and innovating an
Strategic
I Insufficient IT resources, staff with inadequate skills or staff organization's business processes and services.
burnout/dissatisfaction
J IT-enabled changes or projects often fail to meet business
requirements and are late or over budget 8. The sourcing model for IT —The sourcing model
K Reluctance of board individuals, executives or senior adopted by the company is classified as in Table 8.
management to engage with IT, or loss of commercial
enterprise sponsors committed to IT
L Complex IT operating models and/or unclear decision Table 8. The Sourcing Model for IT
mechanisms for IT-related decisions Source Model Description
M Too high IT costs The company requests third party services to provide
N Impeded or failed implementation of new initiatives or Outsourcing
IT services.
innovations caused by current IT architectures and systems The company maximizes the use of the cloud to
O The space between agency and technical knowledge, which Cloud
provide IT services to its users.
reasons organization clients and data and/or era specialists to A mixed model is applied, combining the other three
talk one-of-a-kind languages Hybrid
models to varying degrees.
P Regular issues with data quality and data integration across
multiple sources
Q High-stage stop-user computing, growing (among other 9. IT implementation methods —The methods adopted by
problems) a lack of oversight and exceptional control over the
the company can be classified as follows (Table 9).
programs being evolved and operated
R Enterprise departments enforce their own records answers
with very little involvement of the corporation's IT department Table 9. IT Implementation Methods
S Ignorance and/or non-compliance with privacy regulations IT Implementation
T Inability to exploit new technology or innovate using I&T Description
Method
The company uses Agile development work
Agile
methods for its software development
5. Threat landscape —The threat landscape in which the Companies use DevOps work methods for
company operates can be classified as shown in Table 5. DevOps
software creation, deployment, and operation
The company takes a more classic approach to
Table 5. Threat Landscape software development (waterfall) and
Traditional
separates software development from
Threat Landscape Description operations.
The company is operating below the threat Companies use a mix of traditional and
Normal
level that is considered normal Hybrid modern IT implementations, often referred to
Due to geopolitical situations, industry sectors as “bimodal IT.”
tall or certain profiles, companies operate in
environments with threats
10. Technology adoption strategy —Technology adoption
strategy can be classified as listed in Table 10.
6. Compliance requirements —Companies classifies
according to the categories listed in Table 6.
Table 10. Technology Adoption Strategy
Technology
Table 6. Compliance Requirements Adoption Description
Regulatory Strategy
Description
Environment Companies generally adopt new technologies as early
Companies are subject to a minimum set of First mover
Low compliance as possible and try to get a first mover advantage.
lower-than-average regular compliance Companies usually wait for new technologies to
requirements Follower
requirements. become mainstream and proven before adopting them.
Companies are subject to a series of regular Slow Companies are very late with the adoption of new
Normal compliance
compliance requirements that are common adopter technology.
requirements
across a wide range of industries.
Companies are subject to higher-than-average
High compliance
compliance requirements, most often related 11. Size —Two categories, as shown in Table 11, were
requirements identified for the design of the corporate governance
to industry sector or geopolitical conditions.
system.
7. The role of IT —It is classified as shown in Table 7.
Table 11. Size Categories
Company size Description
Table 7. The Role of IT Companies with more than 250 full-
Large company (Default)
IT Role Description time employees (FTE)
IT is not essential for the running and continuity of Small and medium enterprises Companies with 50 to 250 FTE
Support
business processes and services, or for their innovation.
When IT fails, there is a direct impact on the running
Factory
and continuity of business processes and services.
This article is distributed under the terms of the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
See for details: https://creativecommons.org/licenses/by-nc-nd/4.0/
157
IJID (International Journal on Informatics for Development), e-ISSN: 2549-7448
Vol. 11, No. 1, 2022, Pp. 152-161
This article is distributed under the terms of the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
See for details: https://creativecommons.org/licenses/by-nc-nd/4.0/
158
IJID (International Journal on Informatics for Development), e-ISSN: 2549-7448
Vol. 11, No. 1, 2022, Pp. 152-161
Staff skills, Knowledge, expertise Table 16. Determining the Level of Interest
EG13 motivation and AG13 and initiative for No. Domain IT Process Critical point
productivity business innovation The service related to informing
Managing human the availability of food
1 APO07
resources ingredients to the community is
The matching results are obtained, namely the selection of still inefficient.
eight alignment objectives with codes AG03, AG04, AG07, Poor quality of online
AG08, AG09, AG10, AG12, AG13 which will then be used 2 APO11 Managing quality information system for the
community.
in determining the IT process. Manage Incomplete online updated data
identification and on food accessibility,
3 BAI03
development
3.4 Identify IT Process solutions
Lack of public knowledge on
At this stage, re-matching was conducted between the Managing
4 APO08 how to apply the information
relationships
identified critical points and the IT process based on the provided.
alignment objectives which refer to the COBIT 2019 Limited quantity and quality of
guidelines. The matching results between the critical points Managing human resources capable of
5. BAI08
knowledge operating the information
and the IT process domain based on the 2019 COBIT technology
guidelines are shown in Table 15.
This article is distributed under the terms of the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
See for details: https://creativecommons.org/licenses/by-nc-nd/4.0/
159
IJID (International Journal on Informatics for Development), e-ISSN: 2549-7448
Vol. 11, No. 1, 2022, Pp. 152-161
Respondent
Table 18. Recommendation Lv. Lv. Lv. Lv. Lv. Lv. Lv. Lv. Lv.
Domain Framework Recommendation
1.1 2.1 2.2 3.1 3.2 4.1 4.2 5.1 5.2
Evaluating employee skills, conducting
employee background checks, and
APO07 COBIT 2019 R1 92 86 84 60 62 60 70 50 65
conducting supervision when recruiting
employees.
R2 90 87 82 65 64 62 68 50 55
Evaluating Service SOP, with learn
examples of service system Rata-rata 91 86 83 62 63 61 68 50 60
implementation good and learn from
APO11 COBIT 2019
mistakes or lack of service systems, so it
can serve as learning and reference for
service system upgrade. The scoring on the questionnaire was carried out by two
Designing the online service system that respondents who were selected based on the RACI mapping.
can be used later easily by the Several aspects of the problem, such as the lack of
community based on the SOP and build information conveyed to the public has begun to be resolved
BAI03 COBIT 2019
systematic online applications with the
help of application developers who are
by implementing recommended practices in order to be
experienced in the development process. upgraded to level 2. For instances, by posting information on
Utilizing other social media facilities updated stocks or prices of food, staples, etc. to the YouTube
such as Instagram, Facebook, and channel, and other social media platforms such as Instagram
APO08 COBIT 2019 YouTube in providing information on as well as by monitoring social media usage as a medium to
needs and updating information on food,
agriculture and fisheries.
deliver information to the public. The results of the analysis
Assessing each employee's ability show that the APO08 process is at level 2, and it can be
regarding information technology and concluded that the implementation of the recommended
assigning duties and obligations of solutions can increase the capability level from 1 to 2 in
BAI08 COBIT 2019 employees according to their abilities so accordance with the implementation target.
that each employee makes an
appropriate contribution in carrying out
tasks related to information technology.
4 CONCLUSION
3.8 Implementation The Department of Food Security, Agriculture and
Fisheries of Balangan Regency has carried out an Information
The implementation of the recommendations for Technology Governance Audit using the 2019 COBIT
improvement was focused on the APO08 domain process framework. Recommendations were given based on the
aiming to find out how it could impact the capability value. COBIT 2019 reference with the aim of improving
The initial stage in the implementation requires a time information technology governance at the department. The
schedule that aims to make the implementation run smoothly implementation of improvement for a period of 1 month was
and orderly. carried out to increase the capability level in the APO08
• Update Bio on Facebook and Instagram domain. It has done in accordance with the time schedule, and
• Assistance in manufacturing the there was an increase in the capability level in the APO08
• Pamphlet making domain, from previously level 1 to the current level 2.
• Post template creation
• Assistance in uploading videos on YouTube and posting
via social media
This article is distributed under the terms of the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
See for details: https://creativecommons.org/licenses/by-nc-nd/4.0/
160
IJID (International Journal on Informatics for Development), e-ISSN: 2549-7448
Vol. 11, No. 1, 2022, Pp. 152-161
AUTHOR’S CONTRIBUTION Sipil Kabupaten Tabanan ),” J. Ilm. Teknol. dan Komput., vol. 2,
no. 2, 2021.
Rini Audia is the first author conducting literature review [7] G. I. Belo, Y. T. Wiranti, and L. H. Atrinawati, “Perancangan Tata
of the previous research, data collection, analysis, Kelola Teknologi Informasi Menggunakan Cobit 2019 Pada PT
recommendations and implementation, while Bambang Telekomunikasi Indonesia Regional VI Kalimantan,” JUSIKOM
PRIMA (Jurnal Sist. Inf. Ilmu Komput. Prima), vol. 4, no. 1, pp.
Sugiantaro as the second author advises and manages the 23–30, 2020.
concept of the research. [8] A. Safitri, I. Syafii, and K. Adi, “Identifikasi Level Pengelolaan
Tata Kelola SIPERUMKIM Kota Salatiga berdasarkan COBIT
COMPETING INTEREST 2019,” J. RESTI (Rekayasa Sist. dan Teknol. Informasi), vol. 5, no.
Complying with the publication ethics of this journal, Rini 3, pp. 429–438, 2021, doi: 10.29207/resti.v5i3.3060.
Audia and Bambang Sugiantaro as the authors of this article [9] M. Adhisyanda Aditya, R. Dicky Mulyana, and A. Mulyawan,
“Perbandingan COBIT 2019 dan ITIL V4 Sebagai Panduan Tata
declare that this article is free from conflict of interest Kelola dan Management IT,” J. Comput. Bisnis, vol. 13, no. 2, pp.
(COI) or competing interest (CI). 100–105, 2019, [Online]. Available: http://www.jurnal.stmik-
mi.ac.id/index.php/jcb/article/view/206.
[10] A. S. Sukamto, H. Novriando, and A. Reynaldi, “Tata Kelola
ACKNOWLEDGMENT Teknologi Informasi Menggunakan Framework COBIT 2019
Thanks to the lecturers and classmates for their guidance (Studi Kasus: UPT TIK Universitas Tanjungpura Pontianak),” J.
Edukasi dan Penelit. Inform., vol. 7, no. 2, p. 210, 2021, doi:
and direction and also thanks to Department of Informatics, 10.26418/jp.v7i2.47859.
Faculty of Science and Technology, UIN Sunan Kalijaga
[11] S. Kasus et al., “Evaluasi E-Government Menggunakan
Yogyakarta for the support and facilitation of this research Framework COBIT 5,” vol. 5.
[12] A. Wijaya, “An Information Technology Governance Audit
Planning Calibration Laboratory Using COBIT 2019,” J.
REFERENCES Fasilkom, vol. 10, no. 3, pp. 241–247, 2020, doi:
10.37859/jf.v10i3.2272.
[1] C. Study and D. Pemasyarakatan, “Evaluation of E-Government [13] H. M. J. Saputra, A. I. N. F. Abdullah, D. B. Tandirau, E.
Using COBIT 5 Framework,” vol. 8, no. 2, pp. 74–83, 2020. Ramadhani, and L. H. Atrinawati, “Penyesuaian Sistem Tata
[2] ISACA, COBIT 2019 Framework Introduction and Methodology. Kelola Pada Institut Teknologi Kalimantan Dengan Menggunakan
2019. Cobit 2019,” JSI: Jurnal Sistem Informasi, vol. 12, no. 2, pp. 2060–
[3] F. Retrialisca, “Pengukuran Kesuksesan Sistem Informasi 2074, 2020, doi: 10.36706/jsi.v12i2.11582.
Berdasarkan D&M Model dan COBIT 5 (Studi Kasus: Universitas [14] M. A. Saputra and M. R. Redo, “Penerapan Framework Cobit 2019
Airlangga),” vol. 5, pp. 1–199, 2017. Untuk Perancangan Tata Kelola Teknologi Informasi Pada
[4] H. Bernika1, I. Kadek, and D. Nuryana2, “Perancangan Tata Perguruan Tinggi,” J. Sci. Soc. Res., vol. 4, no. 3, p. 352, 2021, doi:
Kelola Teknologi Informasi Menggunakan Kerangka Kerja 10.54314/jssr.v4i3.715.
COBIT 2019 (Studi Kasus: LPP RRI Madiun),” Jeisbi, vol. 02, no. [15] K. Wabang, Y. Rahma, A. P. Widodo, and F. Nugroho, “Tata
03, pp. 63–70, 2021. Kelola Teknologi Informasi Menggunakan Cobit 2019 Pada Psi
[5] A. Hanif, M. Giatman, and A. Hadi, “Komunikasi Dan Informatika Universitas Muria Kudus,” JURTEKSI (Jurnal Teknologi dan
Menggunakan Framework Cobit 5,” vol. 9, no. 1, pp. 94–101, Sistem Informasi) vol. VII, no. 3, pp. 275–282, 2021.
2020.
[6] I. G. Made, S. Dharma, I. G. Made, A. Sasmita, and I. M. Suwija,
“Evaluasi Dan Implementasi Tata Kelola Ti Menggunakan Cobit
2019 ( Studi Kasus Pada Dinas Kependudukan Dan Pencatatan
This article is distributed under the terms of the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
See for details: https://creativecommons.org/licenses/by-nc-nd/4.0/
161