International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064

Downloads: 105 | Views: 173

Research Paper | Information Technology | Indonesia | Volume 4 Issue 4, April 2015

The Designing of Measurement Instrument for Information Technology Risk Assessment as a Risk Management Strategy Recommendation at SBUPE Bandung

Yudi Priyadi | Suhardi [3]

Abstract: Portal Express Strategic Business Unit, furthermore called SBUPE. In carry out its services, SBUPE is using Barcode at tracing and tracking system to identify and as media in data storage relate to delivered packets. Barcode is using to track and trace system at SBUPE, is used in logistic and currier services. So that obtained features at Barcode, also has adopted to that unit work pattern. SBUPE is faced to local courier service competition with global companies, which had successful to use goods shipment tracing technology with calculate the risk from its services treatment application. Until now, the track and trace system at SBUPE is not having instrument to do an information technology risk management, that is conducted process by IT managers to adjust operational activity and finance cost spending, in reach the profit with protect the IT system and data which support its organization mission. In this report has carried out a designing as tool, for provide a recommendation at that unit management level with to do risk mitigation, is directed to an incident handling. SBUPE can be applied the strategy based four quadrant that are to do risk transfer to other (quadrant IV), to avoid a risk (quadrant III), to less negative effect of risk (quadrant II), to receive some or all of risk consequences (quadrant I). From designing results, has suggested doing incident handling process and information technology audit, in based data sources of reconciliation result among written documentation with situation when field study, as condition validity to do risk mitigation strategy.

Keywords: Information Technology Risk Management ITRM, Risk Mitigation, Risk Assesment, Audit

Edition: Volume 4 Issue 4, April 2015,

Pages: 3058 - 3063

How to Download this Article?

Type Your Valid Email Address below to Receive the Article PDF Link

Verification Code will appear in 2 Seconds ... Wait