<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-1825785470790913032</id><updated>2024-10-04T19:07:53.498-07:00</updated><title type='text'>Information Systems Audit</title><subtitle type='html'>Computer Science in some years ago many people to call that, but in this time computer science is general. in this time many people to call specific. many specification in computer science. Computerization (now widely known is Information Technology), Information System Audit as a separate audit and is not a financial audit. Then conducted to examine the company&#39;s maturity level in IT governance.</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://ifaneffendy.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1825785470790913032/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://ifaneffendy.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/1825785470790913032/posts/default?start-index=26&amp;max-results=25&amp;redirect=false'/><author><name>FuN BloG</name><uri>http://www.blogger.com/profile/16775206851676147746</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='17' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiNe4GQeyeumZgiZ6GIvnJGQf4xRmjuSrBgZ_8mlepN2GOmKmg7kPUMEzQcZvhrEvUb9fRszE_ubYEYZS3Dc7eFaIVdSa27fYcwIeFr9DzaOUNRuNMu_5um5jeZhweTqA/s220/fun.jpg'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>37</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-1825785470790913032.post-6224265924694671061</id><published>2012-07-22T04:21:00.001-07:00</published><updated>2012-07-22T04:21:51.727-07:00</updated><title type='text'>COBIT 5</title><summary type="text">
COBIT pertama kali dirilis pada tahun 1996, versi sekarang, COBIT 5 diterbitkan pada tahun 2012.&amp;nbsp; COBIT 5 merupakan framework bisnis untuk tata kelola dan manajemen organisasi TI. Versi terbaru ini mencakup prinsip global yang telah diakui secara umum untuk meningkatkan kepercayaan dan nilai-nilai dari sistem informasi. COBIT 5 merupakan lanjutan dari COBIT 4.1 dimana terdapat integrasi </summary><link rel='replies' type='application/atom+xml' href='http://ifaneffendy.blogspot.com/feeds/6224265924694671061/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1825785470790913032/6224265924694671061?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1825785470790913032/posts/default/6224265924694671061'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1825785470790913032/posts/default/6224265924694671061'/><link rel='alternate' type='text/html' href='http://ifaneffendy.blogspot.com/2012/07/cobit-5.html' title='COBIT 5'/><author><name>FuN BloG</name><uri>http://www.blogger.com/profile/16775206851676147746</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='17' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiNe4GQeyeumZgiZ6GIvnJGQf4xRmjuSrBgZ_8mlepN2GOmKmg7kPUMEzQcZvhrEvUb9fRszE_ubYEYZS3Dc7eFaIVdSa27fYcwIeFr9DzaOUNRuNMu_5um5jeZhweTqA/s220/fun.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1825785470790913032.post-8428762378070961670</id><published>2012-01-30T08:04:00.000-08:00</published><updated>2012-01-30T08:06:23.653-08:00</updated><title type='text'>Business Service Management</title><summary type="text">
Business Service Management (BSM) adalah strategi dan
pendekatan untuk mengaktifkan komponen TI yang harus dikaitkan dengan tujuan bisnis.
Dengan cara ini dampak teknologi pada bisnis dan bagaimana perubahan dapat
mempengaruhi bisnis dan teknologi keduanya dapat diprediksi. Penciptaan layanan
terintegrasi termasuk katalog unit bisnis, proses dan layanan,
hubungan dan dependensi layanan TI. </summary><link rel='replies' type='application/atom+xml' href='http://ifaneffendy.blogspot.com/feeds/8428762378070961670/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1825785470790913032/8428762378070961670?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1825785470790913032/posts/default/8428762378070961670'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1825785470790913032/posts/default/8428762378070961670'/><link rel='alternate' type='text/html' href='http://ifaneffendy.blogspot.com/2012/01/business-service-management.html' title='Business Service Management'/><author><name>FuN BloG</name><uri>http://www.blogger.com/profile/16775206851676147746</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='17' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiNe4GQeyeumZgiZ6GIvnJGQf4xRmjuSrBgZ_8mlepN2GOmKmg7kPUMEzQcZvhrEvUb9fRszE_ubYEYZS3Dc7eFaIVdSa27fYcwIeFr9DzaOUNRuNMu_5um5jeZhweTqA/s220/fun.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgmot8m-fJqTdMSGnCA2tpbvdTqFOud_rr2HP5XsEj0EfpA6vaoaKzpjQy4JbgpDTLpfiCGm4I_eVTGVmw3T8JogjKLd7wF3pJhHgJBIvBa1ju43iAusviYRaV5I-hpTWit07h26TgEcEHw/s72-c/manajemen_TI_Continuum.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1825785470790913032.post-3296799439164733464</id><published>2012-01-03T11:42:00.000-08:00</published><updated>2012-01-03T11:52:10.204-08:00</updated><title type='text'>Merancang Sistem Pendukung terutama Portfolio Layanan</title><summary type="text">

Cara yang
paling efektif dalam mengelola semua aspek layanan melalui siklus hidup mereka
adalah dengan menggunakan sistem manajemen yang sesuai dan alat-alat untuk
mendukung dan mengotomatisasi proses yang efisien. Portofolio Layanan adalah sistem
manajemen yang paling penting digunakan untuk mendukung semua proses dan
menggambarkan suatu penyedia layanan dalam hal nilai bisnis. </summary><link rel='replies' type='application/atom+xml' href='http://ifaneffendy.blogspot.com/feeds/3296799439164733464/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1825785470790913032/3296799439164733464?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1825785470790913032/posts/default/3296799439164733464'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1825785470790913032/posts/default/3296799439164733464'/><link rel='alternate' type='text/html' href='http://ifaneffendy.blogspot.com/2012/01/merancang-sistem-pendukung-terutama.html' title='Merancang Sistem Pendukung terutama Portfolio Layanan'/><author><name>FuN BloG</name><uri>http://www.blogger.com/profile/16775206851676147746</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='17' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiNe4GQeyeumZgiZ6GIvnJGQf4xRmjuSrBgZ_8mlepN2GOmKmg7kPUMEzQcZvhrEvUb9fRszE_ubYEYZS3Dc7eFaIVdSa27fYcwIeFr9DzaOUNRuNMu_5um5jeZhweTqA/s220/fun.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhXmIm0h6JXUwGdq5YkaLuEV-cTQ5GWTWw3ElC59J4m_IRZ0iJkArp9yigUiPMl2Hqghxpi_88_JlaAdDNctJLJih_1sINN_p-EMP7sYQ8g1Rch9X1eou7sysdADjfPg_U1e8TTgIltscUO/s72-c/portofolio_layanan.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1825785470790913032.post-3449237425312606855</id><published>2011-09-10T20:21:00.000-07:00</published><updated>2012-01-03T11:42:46.847-08:00</updated><title type='text'>Mengidentifikasi Persyaratan Layanan (Service)</title><summary type="text">
Desain Layanan harus mempertimbangkan semua elemen layanan dengan mengambil pendekatan secara menyeluruh untuk sebuah pendekatan desain layanan baru dengan mempertimbangkan hubungan komponen dan pelayanan, serta memastikan bahwa layanan yang diberikan memenuhi fungsi dan kualitas bisnis layanan di segala bidang:

 Skalabilitas layanan untuk memenuhi kebutuhan masa depan, untuk mendukung tujuan </summary><link rel='replies' type='application/atom+xml' href='http://ifaneffendy.blogspot.com/feeds/3449237425312606855/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1825785470790913032/3449237425312606855?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1825785470790913032/posts/default/3449237425312606855'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1825785470790913032/posts/default/3449237425312606855'/><link rel='alternate' type='text/html' href='http://ifaneffendy.blogspot.com/2011/09/mengidentifikasi-persyaratan-service.html' title='Mengidentifikasi Persyaratan Layanan (Service)'/><author><name>FuN BloG</name><uri>http://www.blogger.com/profile/16775206851676147746</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='17' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiNe4GQeyeumZgiZ6GIvnJGQf4xRmjuSrBgZ_8mlepN2GOmKmg7kPUMEzQcZvhrEvUb9fRszE_ubYEYZS3Dc7eFaIVdSa27fYcwIeFr9DzaOUNRuNMu_5um5jeZhweTqA/s220/fun.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1825785470790913032.post-8384292516191659345</id><published>2011-03-22T22:17:00.000-07:00</published><updated>2011-03-22T22:59:07.192-07:00</updated><title type='text'>Risk IT Framework</title><summary type="text">Risk IT menyediakan end-to-end, pandangan yang komprehensif dari semua resiko yang berkaitan dengan penggunaan IT dan perlakuan yang sama pada manajemen resiko dari keksesuaian perkataan dan budaya diatas mengenai masalah operasional.Resiko adalah bagian alami dari cakupan bisnis. Jika dibiarkan tidak diatur, ketidakpastian dapat menyebar dengan cepat. Jika dikelola secara efektif, kerugian dapat</summary><link rel='replies' type='application/atom+xml' href='http://ifaneffendy.blogspot.com/feeds/8384292516191659345/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1825785470790913032/8384292516191659345?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1825785470790913032/posts/default/8384292516191659345'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1825785470790913032/posts/default/8384292516191659345'/><link rel='alternate' type='text/html' href='http://ifaneffendy.blogspot.com/2011/03/risk-it-framework.html' title='Risk IT Framework'/><author><name>FuN BloG</name><uri>http://www.blogger.com/profile/16775206851676147746</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='17' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiNe4GQeyeumZgiZ6GIvnJGQf4xRmjuSrBgZ_8mlepN2GOmKmg7kPUMEzQcZvhrEvUb9fRszE_ubYEYZS3Dc7eFaIVdSa27fYcwIeFr9DzaOUNRuNMu_5um5jeZhweTqA/s220/fun.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1825785470790913032.post-2807829871235761973</id><published>2011-03-08T22:21:00.000-08:00</published><updated>2011-03-08T22:40:30.722-08:00</updated><title type='text'>Kesalahan IT Penyebab Kerugian Perusahaan</title><summary type="text">Pada saat-saat sekarang ini dengan kemajuan Teknologi yang semakin berkembang sangat pesatnya sehingga semua orang dapat dengan leluasa mempelajari ataupun dengan melakukan berbagai kejahatan dengan memanfaatkan dunia cyber yang semakin canggih. Ternyata dalam konteks ini banyak kelemahan yang dapat ditimbulkan pada perusahaan. John N. Stewart, kepala keamanan dari Cisco telah melakukan survey  </summary><link rel='replies' type='application/atom+xml' href='http://ifaneffendy.blogspot.com/feeds/2807829871235761973/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1825785470790913032/2807829871235761973?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1825785470790913032/posts/default/2807829871235761973'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1825785470790913032/posts/default/2807829871235761973'/><link rel='alternate' type='text/html' href='http://ifaneffendy.blogspot.com/2011/03/kesalahan-it-penyebab-kerugian.html' title='Kesalahan IT Penyebab Kerugian Perusahaan'/><author><name>FuN BloG</name><uri>http://www.blogger.com/profile/16775206851676147746</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='17' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiNe4GQeyeumZgiZ6GIvnJGQf4xRmjuSrBgZ_8mlepN2GOmKmg7kPUMEzQcZvhrEvUb9fRszE_ubYEYZS3Dc7eFaIVdSa27fYcwIeFr9DzaOUNRuNMu_5um5jeZhweTqA/s220/fun.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1825785470790913032.post-3326839784564536855</id><published>2011-03-06T18:19:00.000-08:00</published><updated>2011-03-06T19:34:01.361-08:00</updated><title type='text'>Mimpi menjadi Auditor Sistem Informasi</title><summary type="text">Sepertinya untuk saat ini masih sangat  sulit bagi saya untuk menjadi seorang Auditor Profesional dibidang  Sistem Informasi. Karena saya sangat mengetahui dunia kerja saat ini  tidak serta merta membuka tenaga kerja yang belum berpengalaman dibidang  Audit Sistem Informasi seperti saya ini. Saya sadar bahwa masih harus  banyak belajar dan pengalaman lagi meskipun saya telah menekuni dan menyukai</summary><link rel='replies' type='application/atom+xml' href='http://ifaneffendy.blogspot.com/feeds/3326839784564536855/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1825785470790913032/3326839784564536855?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1825785470790913032/posts/default/3326839784564536855'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1825785470790913032/posts/default/3326839784564536855'/><link rel='alternate' type='text/html' href='http://ifaneffendy.blogspot.com/2011/03/mimpi-menjadi-auditor-sistem-informasi.html' title='Mimpi menjadi Auditor Sistem Informasi'/><author><name>FuN BloG</name><uri>http://www.blogger.com/profile/16775206851676147746</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='17' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiNe4GQeyeumZgiZ6GIvnJGQf4xRmjuSrBgZ_8mlepN2GOmKmg7kPUMEzQcZvhrEvUb9fRszE_ubYEYZS3Dc7eFaIVdSa27fYcwIeFr9DzaOUNRuNMu_5um5jeZhweTqA/s220/fun.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1825785470790913032.post-7462706287354727164</id><published>2011-03-02T17:05:00.000-08:00</published><updated>2011-03-02T17:22:37.646-08:00</updated><title type='text'>Fungsi Help Desk</title><summary type="text">Fungsi lain pada bagian operasional yang juga penting adalah help desk. Selain itu membantu pemakai akhir untuk mengenai hardware dan software, sering kali dibangun fungsi dukungan teknis (technical support) untuk membantu users:Menyediakan hardware/software bagi users, atau membantu menyelesaikan masalah hardware maupun software pemakai akhir.Memberikan pelatihan pemakaian hardware, software dan</summary><link rel='replies' type='application/atom+xml' href='http://ifaneffendy.blogspot.com/feeds/7462706287354727164/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1825785470790913032/7462706287354727164?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1825785470790913032/posts/default/7462706287354727164'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1825785470790913032/posts/default/7462706287354727164'/><link rel='alternate' type='text/html' href='http://ifaneffendy.blogspot.com/2011/03/fungsi-help-desk.html' title='Fungsi Help Desk'/><author><name>FuN BloG</name><uri>http://www.blogger.com/profile/16775206851676147746</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='17' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiNe4GQeyeumZgiZ6GIvnJGQf4xRmjuSrBgZ_8mlepN2GOmKmg7kPUMEzQcZvhrEvUb9fRszE_ubYEYZS3Dc7eFaIVdSa27fYcwIeFr9DzaOUNRuNMu_5um5jeZhweTqA/s220/fun.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1825785470790913032.post-1398245943777362895</id><published>2011-03-01T17:37:00.000-08:00</published><updated>2011-03-01T18:02:44.804-08:00</updated><title type='text'>Database Integrity</title><summary type="text">Integritas data (Everest, 1986) mengidentifikasikan ada 6 hal yang harus dilakukan oleh DA dan DBA untuk mengontrol aktivitas mereka, yaitu:a) Definition control: DA dan DBA menetapkan kontrol untuk memastikan bahwa database selalu sesuai dengan definisinya. DA mengembangkan dan menyebarluaskan standar definisi data yang telah dibuat dan melakukan pengawasan terhadap pencapaian standar tersebut.b</summary><link rel='replies' type='application/atom+xml' href='http://ifaneffendy.blogspot.com/feeds/1398245943777362895/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1825785470790913032/1398245943777362895?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1825785470790913032/posts/default/1398245943777362895'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1825785470790913032/posts/default/1398245943777362895'/><link rel='alternate' type='text/html' href='http://ifaneffendy.blogspot.com/2011/03/database-integrity.html' title='Database Integrity'/><author><name>FuN BloG</name><uri>http://www.blogger.com/profile/16775206851676147746</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='17' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiNe4GQeyeumZgiZ6GIvnJGQf4xRmjuSrBgZ_8mlepN2GOmKmg7kPUMEzQcZvhrEvUb9fRszE_ubYEYZS3Dc7eFaIVdSa27fYcwIeFr9DzaOUNRuNMu_5um5jeZhweTqA/s220/fun.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1825785470790913032.post-804176567686380231</id><published>2011-02-20T04:43:00.001-08:00</published><updated>2011-02-20T04:57:55.055-08:00</updated><title type='text'>Tugas DA dan DBA</title><summary type="text">Pemahaman yang baik terhadap tugas DA dan DBA karena alasan berikut:1. Jika DA dan DBA tidak bekerja baik, maka keamanan harta, keutuhan data, efektivitas dan efisiensi sistem pada lingkungan database dapat rusak berat.2. DA dan DBA merupakan sumber daya yang penting untuk memberikan informasi tentang kekuatan dan kelemahan lingkungan database, karena mereka merupakan pusat komunikasi antara </summary><link rel='replies' type='application/atom+xml' href='http://ifaneffendy.blogspot.com/feeds/804176567686380231/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1825785470790913032/804176567686380231?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1825785470790913032/posts/default/804176567686380231'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1825785470790913032/posts/default/804176567686380231'/><link rel='alternate' type='text/html' href='http://ifaneffendy.blogspot.com/2011/02/tugas-da-dan-dba.html' title='Tugas DA dan DBA'/><author><name>FuN BloG</name><uri>http://www.blogger.com/profile/16775206851676147746</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='17' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiNe4GQeyeumZgiZ6GIvnJGQf4xRmjuSrBgZ_8mlepN2GOmKmg7kPUMEzQcZvhrEvUb9fRszE_ubYEYZS3Dc7eFaIVdSa27fYcwIeFr9DzaOUNRuNMu_5um5jeZhweTqA/s220/fun.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1825785470790913032.post-4159370371789398942</id><published>2010-12-18T05:33:00.000-08:00</published><updated>2010-12-18T06:25:19.642-08:00</updated><title type='text'>Pengendalian Manajemen Sumber Data</title><summary type="text">Di dalam suatu sistem berbasis Teknologi Informasi, pengendalian sumber data (data resource management) yang baik adalah:user harus dapat berbagi data (data sharing among users).data harus tersedia untuk digunakan kapan saja, dimana pun, dan dalam bentuk apapun (sudah tentu dengan aturan akses/wewenang yang jelas).Sistem manajemen data harus menjamin adanya sistem sistem penyimpanan yang efisien,</summary><link rel='replies' type='application/atom+xml' href='http://ifaneffendy.blogspot.com/feeds/4159370371789398942/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1825785470790913032/4159370371789398942?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1825785470790913032/posts/default/4159370371789398942'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1825785470790913032/posts/default/4159370371789398942'/><link rel='alternate' type='text/html' href='http://ifaneffendy.blogspot.com/2010/12/pengendalian-manajemen-sumber-data.html' title='Pengendalian Manajemen Sumber Data'/><author><name>FuN BloG</name><uri>http://www.blogger.com/profile/16775206851676147746</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='17' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiNe4GQeyeumZgiZ6GIvnJGQf4xRmjuSrBgZ_8mlepN2GOmKmg7kPUMEzQcZvhrEvUb9fRszE_ubYEYZS3Dc7eFaIVdSa27fYcwIeFr9DzaOUNRuNMu_5um5jeZhweTqA/s220/fun.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1825785470790913032.post-3573511295582196866</id><published>2010-12-16T07:58:00.000-08:00</published><updated>2010-12-16T08:34:39.543-08:00</updated><title type='text'>Peran Auditor IT dalam IT governance</title><summary type="text">Peran auditor Teknologi Informasi sangat penting bagi keberhasilan pengelolaan TI dan audit, kontrol, dan keamanan Sistem Informasi masa depan. Memastikan kualitas, integritas, dan keaslian informasi yang paling penting auditor mengevaluasi sistem yang kompleks saat ini harus memiliki keterampilan teknis yang bagus untuk memahami metode yang berkembang dalam pemrosesan informasi. Sistem </summary><link rel='replies' type='application/atom+xml' href='http://ifaneffendy.blogspot.com/feeds/3573511295582196866/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1825785470790913032/3573511295582196866?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1825785470790913032/posts/default/3573511295582196866'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1825785470790913032/posts/default/3573511295582196866'/><link rel='alternate' type='text/html' href='http://ifaneffendy.blogspot.com/2010/12/peran-auditor-it-dalam-it-governance.html' title='Peran Auditor IT dalam IT governance'/><author><name>FuN BloG</name><uri>http://www.blogger.com/profile/16775206851676147746</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='17' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiNe4GQeyeumZgiZ6GIvnJGQf4xRmjuSrBgZ_8mlepN2GOmKmg7kPUMEzQcZvhrEvUb9fRszE_ubYEYZS3Dc7eFaIVdSa27fYcwIeFr9DzaOUNRuNMu_5um5jeZhweTqA/s220/fun.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1825785470790913032.post-3025539726978534443</id><published>2010-12-15T05:05:00.001-08:00</published><updated>2012-01-03T11:23:37.146-08:00</updated><title type='text'>Penilaian Resiko</title><summary type="text">
Penilaian resiko adalah dasar dari fungsi audit. Menentukan apakah audit/proyek harus dilakukan. Penilaian resiko membantu fungsi audit dalam mengembangkan jadwal audit dan proses perencanaan proyek audit. Hal ini juga meningkatkan kualitas, kuantitas, dan aksesibilitas perencanaan data seperti resiko, audit dan hasil, dan informasi anggaran proyek.

Penilaian resiko adalah teknik yang digunakan</summary><link rel='replies' type='application/atom+xml' href='http://ifaneffendy.blogspot.com/feeds/3025539726978534443/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1825785470790913032/3025539726978534443?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1825785470790913032/posts/default/3025539726978534443'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1825785470790913032/posts/default/3025539726978534443'/><link rel='alternate' type='text/html' href='http://ifaneffendy.blogspot.com/2010/12/penilaian-resiko.html' title='Penilaian Resiko'/><author><name>FuN BloG</name><uri>http://www.blogger.com/profile/16775206851676147746</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='17' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiNe4GQeyeumZgiZ6GIvnJGQf4xRmjuSrBgZ_8mlepN2GOmKmg7kPUMEzQcZvhrEvUb9fRszE_ubYEYZS3Dc7eFaIVdSa27fYcwIeFr9DzaOUNRuNMu_5um5jeZhweTqA/s220/fun.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhFRU7GFGGeVkwC0xwdIxc-48EwHIW0_qhfWSUzfG8LgeAhk3Snr7SPUg-GLXtzIsslkxcMI8P0T3qY3U-VwOGSLsMrIjNhp_UfmZJuzcJbqwGPMdzK4Mm97iukt3hCdQezyayDzQsnrA64/s72-c/siklus.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1825785470790913032.post-5220890928490090220</id><published>2010-12-15T05:05:00.000-08:00</published><updated>2012-01-03T11:23:02.560-08:00</updated><title type='text'>Penilaian Resiko</title><summary type="text">
Penilaian resiko adalah dasar dari fungsi audit. Menentukan apakah audit / proyek harus dilakukan. Penilaian Risiko membantu fungsi audit dalam mengembangkan jadwal audit dan proses perencanaan proyek audit. Hal ini juga meningkatkan kualitas, kuantitas, dan aksesibilitas perencanaan data seperti resiko, audit dan hasil, dan informasi anggaran proyek.

Penilaian resiko adalah teknik yang </summary><link rel='replies' type='application/atom+xml' href='http://ifaneffendy.blogspot.com/feeds/5220890928490090220/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1825785470790913032/5220890928490090220?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1825785470790913032/posts/default/5220890928490090220'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1825785470790913032/posts/default/5220890928490090220'/><link rel='alternate' type='text/html' href='http://ifaneffendy.blogspot.com/2010/12/penilaian-resiko_15.html' title='Penilaian Resiko'/><author><name>FuN BloG</name><uri>http://www.blogger.com/profile/16775206851676147746</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='17' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiNe4GQeyeumZgiZ6GIvnJGQf4xRmjuSrBgZ_8mlepN2GOmKmg7kPUMEzQcZvhrEvUb9fRszE_ubYEYZS3Dc7eFaIVdSa27fYcwIeFr9DzaOUNRuNMu_5um5jeZhweTqA/s220/fun.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1825785470790913032.post-2477085692597793464</id><published>2010-12-14T05:13:00.000-08:00</published><updated>2010-12-14T05:56:52.496-08:00</updated><title type='text'>Perlunya Kontrol dan Audit (part 2)</title><summary type="text">          Aplikasi Teknologi Informasi mungkin memberikan pengaruh terhadap kegiatan utama/fungsi dasar audit, yaitu dalam : audit evidence collection dan audit evidence evaluation.  Mengumpulkan bukti audit pada sistem berbasis Teknologi Informasi tentu lebih rumit. Auditor harus dapat mengumpulkan bukti yang dalam banyak hal yang tidak terdapat sistem manual, seperti perlunya test terhadap </summary><link rel='replies' type='application/atom+xml' href='http://ifaneffendy.blogspot.com/feeds/2477085692597793464/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1825785470790913032/2477085692597793464?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1825785470790913032/posts/default/2477085692597793464'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1825785470790913032/posts/default/2477085692597793464'/><link rel='alternate' type='text/html' href='http://ifaneffendy.blogspot.com/2010/12/perlunya-kontrol-dan-audit-part-2.html' title='Perlunya Kontrol dan Audit (part 2)'/><author><name>FuN BloG</name><uri>http://www.blogger.com/profile/16775206851676147746</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='17' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiNe4GQeyeumZgiZ6GIvnJGQf4xRmjuSrBgZ_8mlepN2GOmKmg7kPUMEzQcZvhrEvUb9fRszE_ubYEYZS3Dc7eFaIVdSa27fYcwIeFr9DzaOUNRuNMu_5um5jeZhweTqA/s220/fun.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1825785470790913032.post-8408116244644499188</id><published>2010-12-12T20:28:00.000-08:00</published><updated>2010-12-12T21:18:57.815-08:00</updated><title type='text'>Perlunya Kontrol dan Audit (part 1)</title><summary type="text">        Mengapa dengan adanya dukungan Teknologi Informasi, maka kebutuhan kontrol internal sistem yang makin baik dan perlunya audit makin meningkat? Salah satu komponen atau unsur Sistem Informasi ialah kontrol internal atau pengendalian intern (internal system controls). Terlebih lagi sistem berbasis Teknologi Informasi akan mempunyai potensi resiko yang makin besar. Resiko yang makin besar </summary><link rel='replies' type='application/atom+xml' href='http://ifaneffendy.blogspot.com/feeds/8408116244644499188/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1825785470790913032/8408116244644499188?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1825785470790913032/posts/default/8408116244644499188'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1825785470790913032/posts/default/8408116244644499188'/><link rel='alternate' type='text/html' href='http://ifaneffendy.blogspot.com/2010/12/perlunya-kontrol-dan-audit-part-1.html' title='Perlunya Kontrol dan Audit (part 1)'/><author><name>FuN BloG</name><uri>http://www.blogger.com/profile/16775206851676147746</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='17' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiNe4GQeyeumZgiZ6GIvnJGQf4xRmjuSrBgZ_8mlepN2GOmKmg7kPUMEzQcZvhrEvUb9fRszE_ubYEYZS3Dc7eFaIVdSa27fYcwIeFr9DzaOUNRuNMu_5um5jeZhweTqA/s220/fun.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1825785470790913032.post-5852231894840631673</id><published>2010-12-12T01:00:00.000-08:00</published><updated>2010-12-12T01:57:57.737-08:00</updated><title type='text'>Tujuan Audit Sistem Informasi</title><summary type="text">Audit objectives pada audit atas IT governance menurut COBIT ialah: effectiveness, confidentiality, data integrity, availability, efficiency, dan realibility. Sedangkan menurut Weber (1999) tujuan audit Teknologi Informasi (audit objectives) lebih ditekankan pada beberapa aspek penting, yaitu pemeriksaan dilakukan untuk dapat menilai:Apakah sistem komputerisasi suatu organisasi/perusahaan dapat </summary><link rel='replies' type='application/atom+xml' href='http://ifaneffendy.blogspot.com/feeds/5852231894840631673/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1825785470790913032/5852231894840631673?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1825785470790913032/posts/default/5852231894840631673'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1825785470790913032/posts/default/5852231894840631673'/><link rel='alternate' type='text/html' href='http://ifaneffendy.blogspot.com/2010/12/tujuan-audit-sistem-informasi.html' title='Tujuan Audit Sistem Informasi'/><author><name>FuN BloG</name><uri>http://www.blogger.com/profile/16775206851676147746</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='17' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiNe4GQeyeumZgiZ6GIvnJGQf4xRmjuSrBgZ_8mlepN2GOmKmg7kPUMEzQcZvhrEvUb9fRszE_ubYEYZS3Dc7eFaIVdSa27fYcwIeFr9DzaOUNRuNMu_5um5jeZhweTqA/s220/fun.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1825785470790913032.post-7335897364366623761</id><published>2010-12-11T04:55:00.000-08:00</published><updated>2010-12-11T08:00:19.408-08:00</updated><title type='text'>Audit Aplikasi Komputer</title><summary type="text">Audit terhadap sistem aplikasi klien dilakukan dalam beberapa pilihan, yaitu:- Quality AssuranceSalah satu pendekatan yang juga sering dilakukan ialah auditor menjadi  team member atau anggota tim pengembangan sistem (system development team). Mereka membantu tim untuk meningkatkan kualitas pengembangan sistem yang dibangun oleh para sistem analis, desainer dan programmer, dan akan </summary><link rel='replies' type='application/atom+xml' href='http://ifaneffendy.blogspot.com/feeds/7335897364366623761/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1825785470790913032/7335897364366623761?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1825785470790913032/posts/default/7335897364366623761'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1825785470790913032/posts/default/7335897364366623761'/><link rel='alternate' type='text/html' href='http://ifaneffendy.blogspot.com/2010/12/audit-aplikasi-komputer.html' title='Audit Aplikasi Komputer'/><author><name>FuN BloG</name><uri>http://www.blogger.com/profile/16775206851676147746</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='17' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiNe4GQeyeumZgiZ6GIvnJGQf4xRmjuSrBgZ_8mlepN2GOmKmg7kPUMEzQcZvhrEvUb9fRszE_ubYEYZS3Dc7eFaIVdSa27fYcwIeFr9DzaOUNRuNMu_5um5jeZhweTqA/s220/fun.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1825785470790913032.post-1012312059920488874</id><published>2010-12-03T03:23:00.000-08:00</published><updated>2010-12-11T08:01:54.705-08:00</updated><title type='text'>Audit Operasional (Operational Audit)</title><summary type="text">Dalam general information systems review (audit umum), auditor melakukan evaluasi terhadap IT governance, yaitu mengevaluasi kinerja unit atau fungsi Sistem Informasi (pusat/instalasi komputer) apakah telah dikelola dengan baik, apakah kontrol dalam pengembangan sistem secara keseluruhan sudah dilakukan dengan cukup, apakah sistem komputer telah dikelola dan dioperasikan dengan baik, serta apakah</summary><link rel='replies' type='application/atom+xml' href='http://ifaneffendy.blogspot.com/feeds/1012312059920488874/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1825785470790913032/1012312059920488874?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1825785470790913032/posts/default/1012312059920488874'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1825785470790913032/posts/default/1012312059920488874'/><link rel='alternate' type='text/html' href='http://ifaneffendy.blogspot.com/2010/12/audit-operasional-operational-audit.html' title='Audit Operasional (Operational Audit)'/><author><name>FuN BloG</name><uri>http://www.blogger.com/profile/16775206851676147746</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='17' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiNe4GQeyeumZgiZ6GIvnJGQf4xRmjuSrBgZ_8mlepN2GOmKmg7kPUMEzQcZvhrEvUb9fRszE_ubYEYZS3Dc7eFaIVdSa27fYcwIeFr9DzaOUNRuNMu_5um5jeZhweTqA/s220/fun.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1825785470790913032.post-24804149212151542</id><published>2010-12-01T20:18:00.000-08:00</published><updated>2010-12-11T08:03:06.723-08:00</updated><title type='text'>Prosedur Umum Audit</title><summary type="text">Kegiatan utama dalam pelaksanaan audit adalah pengumpulan dan evaluasi bukti audit (audit evidance and evidance evaluation). Audit evidance collection dan evidance evaluation dapat dilakukan dengan interview, questionnaires, controls flowcharts, dengan performance management tools, serta dengan alat bantu audit software. Pengujian juga dapatdilakukan dengan programming code review, test data and </summary><link rel='replies' type='application/atom+xml' href='http://ifaneffendy.blogspot.com/feeds/24804149212151542/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1825785470790913032/24804149212151542?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1825785470790913032/posts/default/24804149212151542'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1825785470790913032/posts/default/24804149212151542'/><link rel='alternate' type='text/html' href='http://ifaneffendy.blogspot.com/2010/12/prosedur-umum-audit.html' title='Prosedur Umum Audit'/><author><name>FuN BloG</name><uri>http://www.blogger.com/profile/16775206851676147746</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='17' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiNe4GQeyeumZgiZ6GIvnJGQf4xRmjuSrBgZ_8mlepN2GOmKmg7kPUMEzQcZvhrEvUb9fRszE_ubYEYZS3Dc7eFaIVdSa27fYcwIeFr9DzaOUNRuNMu_5um5jeZhweTqA/s220/fun.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1825785470790913032.post-2612932463740378216</id><published>2010-11-30T20:02:00.000-08:00</published><updated>2010-12-11T08:04:11.944-08:00</updated><title type='text'>Audit with computer</title><summary type="text">Audit with computer adalah pendekatan audit dengan menggunakan bantuan komputer dalam berbagai bentuk, misalnya: pengetikan laporan, penjadwalan, penyusunan rencana kerja audit, penyusunan kertas kerja pemeriksaan, dan lainnya. Sedangkan teknik audit berbantuan komputer, TABK (computer assisted audit techniques, CAATs) adalah lebih khusus lagi, yaitu menggunakan komputer dalam audit evidence </summary><link rel='replies' type='application/atom+xml' href='http://ifaneffendy.blogspot.com/feeds/2612932463740378216/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1825785470790913032/2612932463740378216?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1825785470790913032/posts/default/2612932463740378216'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1825785470790913032/posts/default/2612932463740378216'/><link rel='alternate' type='text/html' href='http://ifaneffendy.blogspot.com/2010/11/audit-with-computer.html' title='Audit with computer'/><author><name>FuN BloG</name><uri>http://www.blogger.com/profile/16775206851676147746</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='17' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiNe4GQeyeumZgiZ6GIvnJGQf4xRmjuSrBgZ_8mlepN2GOmKmg7kPUMEzQcZvhrEvUb9fRszE_ubYEYZS3Dc7eFaIVdSa27fYcwIeFr9DzaOUNRuNMu_5um5jeZhweTqA/s220/fun.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1825785470790913032.post-2238471194792081537</id><published>2010-11-29T21:26:00.000-08:00</published><updated>2010-12-11T08:04:29.924-08:00</updated><title type='text'>Audit Through the Computer</title><summary type="text">Dalam pendekatan audit ke sistem komputer (audit through the computer) auditor melakukan pemeriksaan langsung terhadap program-program dan file-file komputer pada audit Sistem Informasi berbasis Teknologi Informasi. Auditor menggunakan komputer (software bantu) atau dengan cek logika atau listing program (desk test on logic or program source code) untuk menguji logika program dalam rangka </summary><link rel='replies' type='application/atom+xml' href='http://ifaneffendy.blogspot.com/feeds/2238471194792081537/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1825785470790913032/2238471194792081537?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1825785470790913032/posts/default/2238471194792081537'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1825785470790913032/posts/default/2238471194792081537'/><link rel='alternate' type='text/html' href='http://ifaneffendy.blogspot.com/2010/11/audit-through-computer.html' title='Audit Through the Computer'/><author><name>FuN BloG</name><uri>http://www.blogger.com/profile/16775206851676147746</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='17' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiNe4GQeyeumZgiZ6GIvnJGQf4xRmjuSrBgZ_8mlepN2GOmKmg7kPUMEzQcZvhrEvUb9fRszE_ubYEYZS3Dc7eFaIVdSa27fYcwIeFr9DzaOUNRuNMu_5um5jeZhweTqA/s220/fun.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1825785470790913032.post-3835097165825451242</id><published>2010-11-29T06:12:00.000-08:00</published><updated>2010-12-11T08:05:17.529-08:00</updated><title type='text'>Panduan Audit Sistem Informasi di Indonesia</title><summary type="text">Panduan yang dipergunakan dalam Audit Sistem Informasi di Indonesia adalah Standar Atestasi, dan aturan-aturan yang dikeluarkan oleh organisasi profesi akuntansi (IAI di Indonesia, AICPA di USA, atau CICA untuk Kanada), maupun yang lebih khusus lagi, yaitu dari ISACA atau IIA. Model referensi sistem pengendalian intern (internal controls model/framework) lazimnya adalah COBIT. Audit objectives </summary><link rel='replies' type='application/atom+xml' href='http://ifaneffendy.blogspot.com/feeds/3835097165825451242/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1825785470790913032/3835097165825451242?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1825785470790913032/posts/default/3835097165825451242'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1825785470790913032/posts/default/3835097165825451242'/><link rel='alternate' type='text/html' href='http://ifaneffendy.blogspot.com/2010/11/panduan-audit-sistem-informasi-di.html' title='Panduan Audit Sistem Informasi di Indonesia'/><author><name>FuN BloG</name><uri>http://www.blogger.com/profile/16775206851676147746</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='17' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiNe4GQeyeumZgiZ6GIvnJGQf4xRmjuSrBgZ_8mlepN2GOmKmg7kPUMEzQcZvhrEvUb9fRszE_ubYEYZS3Dc7eFaIVdSa27fYcwIeFr9DzaOUNRuNMu_5um5jeZhweTqA/s220/fun.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1825785470790913032.post-6817421462420501333</id><published>2010-11-28T00:31:00.000-08:00</published><updated>2010-12-11T08:05:40.536-08:00</updated><title type='text'>Audit Sistem Informasi</title><summary type="text">Istilah EDP-Audit (electronic data processing audit), atau computer audit, kini lebih sering disebut dengan Audit Sistem Informasi (Information Systems Audit). Menurut Ron Weber (1999, p.10), &quot;EDP auditing is the process of collecting and evaluating evidance to determine wheter a computer systems safeguards assets, maintains data integrity, achieves organizational goals effectively, and consumes </summary><link rel='replies' type='application/atom+xml' href='http://ifaneffendy.blogspot.com/feeds/6817421462420501333/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1825785470790913032/6817421462420501333?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1825785470790913032/posts/default/6817421462420501333'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1825785470790913032/posts/default/6817421462420501333'/><link rel='alternate' type='text/html' href='http://ifaneffendy.blogspot.com/2010/11/audit-sistem-informasi.html' title='Audit Sistem Informasi'/><author><name>FuN BloG</name><uri>http://www.blogger.com/profile/16775206851676147746</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='17' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiNe4GQeyeumZgiZ6GIvnJGQf4xRmjuSrBgZ_8mlepN2GOmKmg7kPUMEzQcZvhrEvUb9fRszE_ubYEYZS3Dc7eFaIVdSa27fYcwIeFr9DzaOUNRuNMu_5um5jeZhweTqA/s220/fun.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1825785470790913032.post-6745220217483827066</id><published>2010-07-25T06:41:00.000-07:00</published><updated>2010-12-11T08:11:58.544-08:00</updated><title type='text'>Service Design Model</title><summary type="text">Delivery model optionsMain service delivery strategies:Insourcing This approach relies on utilizing internal organizational resources in the design, development,   transition, maintenance, operation and support of new, changed or revised services or data centre operations.OutsourcingThis Approach utilizes the resources of an external organization or organizations in a formal arrengement to </summary><link rel='replies' type='application/atom+xml' href='http://ifaneffendy.blogspot.com/feeds/6745220217483827066/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1825785470790913032/6745220217483827066?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1825785470790913032/posts/default/6745220217483827066'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1825785470790913032/posts/default/6745220217483827066'/><link rel='alternate' type='text/html' href='http://ifaneffendy.blogspot.com/2010/07/service-design-model.html' title='Service Design Model'/><author><name>FuN BloG</name><uri>http://www.blogger.com/profile/16775206851676147746</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='17' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiNe4GQeyeumZgiZ6GIvnJGQf4xRmjuSrBgZ_8mlepN2GOmKmg7kPUMEzQcZvhrEvUb9fRszE_ubYEYZS3Dc7eFaIVdSa27fYcwIeFr9DzaOUNRuNMu_5um5jeZhweTqA/s220/fun.jpg'/></author><thr:total>0</thr:total></entry></feed>