Enterprise Information System Planning Using TOGAF Architecture Development Method on XYZ College

Author(s):  
Agun Guntara ◽  
Asep Saeppani ◽  
Irfan Fadil ◽  
Fidi Supriadi
2018 ◽  
Vol 3 (1) ◽  
pp. 17
Author(s):  
Dede Irmayanti ◽  
Budi Permana

Perencanaan arsitektur enterprise Sistem Informasi Dinas Tenaga Kerja, Sosial, dan Transmigrasi (Disnakersostrans) Kabupaten Purwakarta dirancang dengan menggunakan kerangka kerja The Open Group Architecture Framework (TOGAF) dengan metode Architecture Development Method (ADM). Penggunaan kerangka kerja TOGAF ADM digunakan sebagai acuan dalam merencanakan suatu arsitektur enterprise sistem informasi sehingga dapat dibangun suatu sistem informasi dan teknologi informasi yang saling terintegrasi dan selaras dengan kebutuhan aktivitas bisnis organisasi khususnya dalam pelayanan terhadap masyarakat. Pengumpulan data dilakukan dengan cara wawancara dan melakukan pengamatan langsung terhadap organisasi. Alat bantu analisis yang digunakan yaitu metode Unified Modelling Language (UML) dan metode Value Chain. Perencanaan arsitektur enterprise ini bertujuan untuk membangun sistem informasi dan teknologi informasi yang selaras dengan proses bisnis yang ada di Disnakersostrans Kabupaten Purwakarta. Hasil dari penelitian ini berupa blue print arsitektur bisnis, arsitektur data, arsitektur aplikasi yang menghasilkan lima aplikasi lama yaitu IPK, SIMPKH, SIMDA, SISKOTKLN dan TKA online dan dua puluh tiga aplikasi baru. Serta menghasilkan arsitektur teknologi berupa arsitektur jaringan sebagai acuan dalam pembangunan sistem lebih lanjut, sehingga dapat menunjang proses bisnis yang ada di Disnakersostrans Kabupaten Purwakarta.      Kata kunci: TOGAF, ADM, arsitektur enterprise, sistem informasi, blue print The enterprise information system architecture planning of Manpower, Social and Transmigration Office (Disnakersostrans) of Purwakarta is designed using The Open Group Architecture Framework (TOGAF) with Architecture Development Method (ADM). The TOGAF ADM framework is used as a reference in planning an enterprise information system architecture so that it can build an information system and information technology that is integrated and aligned with the needs of the organization's business activities especially in the service to the community. Data collection is done by interview and direct observation to the organization. Analytical tools used are Unified Modeling Language (UML) and Value Chain method. Enterprise architecture planning is aimed to build information systems and information technology in harmony with existing business processes in the Disnakersostrans Purwakarta. The results of this research are the blue print of business architecture, data architecture, application architecture that produces five old applications namely IPK, SIMPKH, SIMDA, SISKOTKLN and TKA online and twenty three new applications. As well as produce technology architecture in the form of network architecture as a reference in further development of the system, so it can support the existing business processes in the Office of Disnakersostrans Purwakarta.Keywords: TOGAF, ADM, enterprie architect, information system, blue print


2017 ◽  
Vol 8 (3) ◽  
Author(s):  
Ova Nurisma Putra

Abstract. West Java Provincial Health Office still faces difficulties in managing information, especially in medical records. Recording and reporting of malnutrition are still done in some stages starting from collecting data from village midwives, puskesmas, Regency/City Health Office then Provincial Health Office and forwarded to the the central office. It is necessary to manage information through service system by utilizing Cloud Computing based on information technology. This research uses The Open Group Architecture Framework (TOGAF) approach in Architecture Development Method (ADM), from Architecture Capability Iteration to  Architecture Development Iteration. Monitoring and Evaluation (M & E) are two integrated activities in the context of controlling a program. The results of this research are planning a medical record information system architecture and monitoring malnutrition based on Cloud Computing with the name of M2Rec (Medical Record and Monitoring) in the form of integrated recommendation and development between current information system and proposed information system architecture.Keywords: togaf adm, medical record and monitoring, cloud computing Abstrak. Perencanaan Arsitektur Sistem Informasi Rekam Medis dan Monitoring Gizi Buruk Berbasis Cloud Computing. Dinas Kesehatan Propinsi Jawa Barat masih mengalami kesulitan dalam pengelolaan informasi yang baik, terutama pada proses rekam medis, pencatatan dan pelaporan gizi buruk masih dilakukan secara bertingkat mulai pengumpulan data dari bidan desa, puskesmas, Dinas Kesehatan Kabupaten/Kota kemudian Dinas Kesehatan Propinsi dan diteruskan ke pusat. Sehingga perlu diupayakan pengelolaan informasi melalui sistem pelayanan dengan memanfaatkan teknologi informasi berbasis Cloud Computing. Penelitian ini menggunakan pendekatan framework The Open Group Architecture Framework (TOGAF) Architecture Development Method (ADM), yaitu iterasi ke satu pada Architecture Capability Iteration daniterasi ke dua pada Architecture Development Iteration. Monitoring dan Evaluasi (M&E) merupakan dua kegiatan terpadu dalam rangka pengendalian suatu program. Hasil dari penelitian ini adalah perencanaan arsitektur sistem informasi rekam medis dan monitoring gizi buruk berbasis Cloud Computing dengan nama M2Rec (Medical Record and Monitoring) yang berupa rekomendasi integrasi dan pengembangan antara sistem informasi berjalan saat ini dengan arsitektur sistem informasi yang diusulkan.Kata kunci: togaf adm, medical record and monitoring, cloud computing.


Author(s):  
Valeriy Fedorovich Shurshev ◽  
Iurii Gostiunin

The article considers the problem of damage evaluation in case of failure of the information system. There have been analyzed the practical methods of assessing damage. It has been stated that the methods can reveal the dependence of the damage on the downtime of the information system, but they are unable to evaluate reputation, administrative or any other consequences. An algorithm is proposed by which specialists can conduct a comparative assessment of damage in case of failure of various information systems using expert information. Applying the proposed algorithm to different information systems, it is possible to determine the most critical systems and, on this basis, effectively plan operational impacts to increase the level of service availability.


2018 ◽  
Vol 18 (3) ◽  
pp. 333-338
Author(s):  
E. A. Vitenburg ◽  
A. A. Levtsova

Introduction. Production processes quality depends largely on the management infrastructure, in particular, on the information system (IS) effectiveness. Company management pays increasingly greater attention to the safety protection of this sphere. Financial, material and other resources are regularly channeled to its support. In the presented paper, some issues on the development of a safety enterprise information system are considered.Materials and Methods. Protection of the enterprise IS considers some specific aspects of the object, and immediate threats to IT security. Within the framework of this study, it is accepted that IS are a complex of data resources. A special analysis is resulted in determining categories of threats to the enterprise information security: hacking; leakage; distortion; loss; blocking; abuse. The connection of these threats, IS components and elements of the protection system is identified.  The requirements of normative legal acts of the Russian Federation and international standards regulating this sphere are considered. It is shown how the analysis results enable to validate the selection of the elements of the IS protection system.Research Results. A comparative analysis of the regulatory literature pertinent to this issue highlights the following. Different documents offer a different set of elements (subsystems) of the enterprise IS protection system. To develop an IS protection program, you should be guided by the FSTEC Order No. 239 and 800-82 Revision 2 Guide to ICS Security.Discussion and Conclusions. The presented research results are the basis for the formation of the software package of intellectual support for decision-making under designing an enterprise information security system. In particular, it is possible to develop flexible systems that allow expanding the composition  of the components (subsystems).


Sign in / Sign up

Export Citation Format

Share Document