skip to main content
10.1145/3429789.3429833acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiconetsiConference Proceedingsconference-collections
research-article

Manage Assurance for Continuous Improvement Strategy in Rural Internet Service Case Study

Authors Info & Claims
Published:25 November 2020Publication History

ABSTRACT

ACM ISBN 978-1-4503-8771-2 The ultimate objective the research is to develop a recommendation guideline to manage assurance of the Internet service in rural areas, using a study case of service company with Internet product VSAT Quota Broadband Internet as the basis. To create such a guideline, the key factors for the improvement strategy have to be identified. This identification is based on qualitative research, assessment, gap and binary pass/fail analysis of the current situation especially in system availability, responsiveness to restore Internet service due to system incidents, and service quality using study case in service company VSAT Quota Broadband Internet operation. The analysis is done with respect to COBIT 2019, the major framework in IT management and governance. As a result of the current research, it is found out that good management of service request and incidence resolution is a key parameter to manage assurance. This result of framework analysis is verified by interview result of the key management persons of IT services for Internet provider in rural areas in Indonesia. Areas which still need improvements are also identified.

References

  1. Kementerian Komunikasi dan Informatika. 2020. Regulasi dan Infrastruktur Harus Iimbangi Percepatan Perubahan Budaya Digital. Retrieved May 1, 2020 from https://kominfo.go.id/content/detail/26444/regulasi-dan-infrastruktur-harus-imbangi-percepatan-perubahan-budaya-digital/0/berita_satkerGoogle ScholarGoogle Scholar
  2. Kementerian Komunikasi dan Informatika. 2020. Menkominfo Ajak Komunitas Telekomunikasi Sempurnakan Infrastruktur Digital. Retrieved June 1, 2020 from https://kominfo.go.id/content/detail/26867/menkominfo-ajak-komunitas-telekomunikasi-sempurnakan-infrastruktur-digital/0/berita_satker,Google ScholarGoogle Scholar
  3. Catherine McNally. 2020. 5 Best Rural Internet Providers 2020 | Reviews.org. Retrieved August 31, 2020 from https://www.reviews.org/Internet-service/best-Internet-for-rural-areas/Google ScholarGoogle Scholar
  4. Trevor Wheelwright. 2019. How Does Satellite Internet Work? Is it Right for You? Retrieved August 31, 2020 from https://www.reviews.org/Internet-service/satellite-Internet-work/Google ScholarGoogle Scholar
  5. ISACA. 2019. COBIT 2019 Framework: Governance and Management Objectives.Google ScholarGoogle Scholar
  6. Divisi Operasional Metrasat. 2018. Analisa Kepuasan Pelanggan Quota VSAT Broadband Internet.Google ScholarGoogle Scholar
  7. Iveth Tello, Christian Ruiz, and Sang Guun Yoo. 2018. Analysis of COBIT 5 Process "DSS02 - Manage Service Requests and Incidents" for the Service Desk Using Process Mining. In 2018 5th International Conference on eDemocracy and eGovernment, ICEDEG 2018, Institute of Electrical and Electronics Engineers Inc., Ambato, 304--310. DOI:https://doi.org/10.1109/ICEDEG.2018.8372335Google ScholarGoogle ScholarCross RefCross Ref
  8. ISACA. 2012. COBIT 5: A Business Framework for the Governance and Management of Enterprise IT.Google ScholarGoogle Scholar
  9. ISACA. 2019. COBIT 2019 Framework: Introduction and Methodology.Google ScholarGoogle Scholar
  10. Loai Al Omari, Paul H Barnes, and Grant Pitman. 2012. Optimising COBIT 5 for IT Governance: Examples from the Public Sector. Appl. Theor. Inf. Syst. Res. (2012), 2--14.Google ScholarGoogle Scholar
  11. Lynne Gerke and Gail Ridley. 2006. Towards an abbreviated COBIT framework for use in an Australian state public sector. In ACIS 2006 Proceedings - 17th Australasian Conference on Information Systems.Google ScholarGoogle Scholar
  12. M Huissoud. 2005. IT self-assessment project, current results and next steps. In Cypress EUROSAI IT working group, Cypress.Google ScholarGoogle Scholar
  13. E. Guldentops, W. Van Grembergen, and S. De Haes. 2002. Control and governance maturity survey: establishing a reference benchmark and a self-assessment tool. Inf. Syst. Control J. (2002), 632--635.Google ScholarGoogle Scholar
  14. Imam Asrowardi, Septafiansyah Dwi Putra, Eko Subyantoro, and Norzaidi Haji Mohd Daud. 2018. IT service management system measurement using ISO20000-1 and ISO15504-8: Developing a solution-mediated process assessment tool to enable transparent and SMS process assessment. Int. J. Electr. Comput. Eng. 8, 5 (2018), 4023--4032. DOI:https://doi.org/10.11591/ijece.v8i5.pp4023-4032Google ScholarGoogle Scholar
  15. Wang Gunawan, Engelina Prisca Kalensun, Ahmad Nurul Fajar, and Sfenrianto. 2018. Applying COBIT 5 in Higher Education. In IOP Conference Series: Materials Science and Engineering, Institute of Physics Publishing, 012108. DOI:https://doi.org/10.1088/1757-899X/420/1/012108Google ScholarGoogle ScholarCross RefCross Ref
  16. Gonçalo Rodrigues Cadete and Miguel Mira Da Silva. 2017. Assessing it governance processes using a COBIT5 model. In Lecture Notes in Business Information Processing, Springer Verlag, 447--460. DOI:https://doi.org/10.1007/978-3-319-65930-5_36Google ScholarGoogle Scholar
  17. Qiang Chen and Xin Peng Wan. 2014. Research and implementation of event handling of IT service. In Applied Mechanics and Materials, Trans Tech Publications Ltd, 2082--2085. DOI:https://doi.org/10.4028/www.scientific.net/AMM.513-517.2082Google ScholarGoogle Scholar
  18. Graciela Braga. 2016. How COBIT 5 Improves the Work Process Capability of Auditors, Assurance Professionals and Assessors. ISACA J. 1, (2016), 1--4. Retrieved August 31, 2020 from https://www.isaca.org/resources/isaca-journal/issues/2016/volume-1/how-cobit-5-improves-the-work-process-capability-of-auditors-assurance-professionals-and-assessorsGoogle ScholarGoogle Scholar
  19. Anna A. Kalenkova, Wil M.P. van der Aalst, Irina A. Lomazova, and Vladimir A. Rubin. 2017. Process mining using BPMN: relating event logs and process models. Softw. Syst. Model. 16, 4 (October 2017), 1019--1048. DOI:https://doi.org/10.1007/s10270-015-0502-0Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Jochen De Weerdt, Seppe K.L.M. Vanden Broucke, Jan Vanthienen, and Bart Baesens. 2012. Leveraging process discovery with trace clustering and text mining for intelligent analysis of incident management processes. In 2012 IEEE Congress on Evolutionary Computation, CEC 2012. DOI:https://doi.org/10.1109/CEC.2012.6256459Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Manage Assurance for Continuous Improvement Strategy in Rural Internet Service Case Study

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader