The Hospitality industry is increasingly improving its services to be able to grow as a tourism sector grows. The indication of the growth of the industry can be seen from the rise of international chains that enter or participate in developing their business in Indonesia. In principle, the Chain Hotel is a group of Hotels that is a hotel chain with services that are equal after star hotel equivalence. For that hotel owners who will join a chain of hotels that have been formulated by the chain hotels and usually refer to standards that apply globally / globally. The terms of information technology, chain hotels have implemented standards that follow World standards. This is a technology that is leading to the information system. This is a concern of every hospital industry player to implement. Thus this research is expected to provide infrastructure standards for hotels, especially according to the appropriate ANSI / TIA / EIA standards. The Research Methodology used a continuous development improvement cycle where the cycle is formed into 4 stages, namely Research Formulation and Requirements Analysis, Problem Design and Solutions, Analysis and Discussion of Formulation of Solutions and Suggestions in Framework of Continuous Improvement. The results of this study formulate a template and the contents of a network infrastructure project document in the form of a structured caling system (SCS) and ANSITIA /EIA
XYZ University is one of the universities that has used information technology to create quality service for students and the entire academic community. This Information technology service is managed by Information Technology and Communication Center (PUSTIK) which is responsible to carry out the development, management, service, and maintaining the security of information and communication technology. Good information technology governance should be able to maintain information security. Therefore, it is necessary to evaluate information system security especially the security of academic information systems. This information system security evaluation uses Keamanan Informasi (KAMI) Index which refers to the ISO/IEC 27001:2013 standard to be able to determine the maturity level of information security. An evaluation of five areas of the KAMI Index shows the Information Security Risk Management area gets the lowest score at 10 out of a total of 72. The result of the KAMI Index dashboard shows that the maturity level of each area of information security is at levels I and I+ with a total score of 166. This means that the level of completeness of implement ISO 27001:2013 standard is in the inadequate category.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.