Yuni Suryaningsih (11211326), Analisis Keamanan dan Efisiensi Proses Pemesanan Tiket WhatsApp pada Sea Leader Marine dengan COBIT 5
Sea Leader Marine merupakan penyedia jasa transportasi wisata menuju Kepulauan Seribu yang memanfaatkan aplikasi WhatsApp sebagai media utama dalam proses pemesanan tiket. Meskipun metode ini memberikan kemudahan komunikasi dan efisiensi biaya, terdapat potensi permasalahan terkait keamanan informasi serta belum optimalnya dokumentasi formal tata kelola Teknologi Informasi (TI). Penelitian ini bertujuan untuk menganalisis tingkat tata kelola TI pada layanan pemesanan tiket berbasis WhatsApp dengan menggunakan kerangka kerja COBIT 5. Delapan subdomain COBIT 5 yang digunakan adalah EDM01, APO01, APO13, BAI04, DSS01, DSS02, DSS05, dan MEA03. Penelitian ini menggunakan pendekatan mixed methods, yaitu menggabungkan metode kualitatif dan kuantitatif. Data kualitatif diperoleh melalui wawancara dengan pihak internal perusahaan, sedangkan data kuantitatif dikumpulkan melalui kuesioner yang diisi oleh 65 responden. Hasil analisis menunjukkan bahwa beberapa subdomain, seperti DSS05 dan MEA03, masih berada pada tingkat kapabilitas yang belum optimal, khususnya dalam aspek pengelolaan keamanan layanan dan pemenuhan persyaratan eksternal. Rekomendasi yang diajukan meliputi penyusunan kebijakan TI tertulis, penguatan kontrol keamanan informasi, serta pelaksanaan evaluasi dan audit secara berkala. Temuan penelitian ini diharapkan dapat menjadi acuan bagi Sea Leader Marine dalam meningkatkan kualitas tata kelola TI, khususnya pada proses pemesanan tiket digital melalui WhatsApp.
Kata kunci: Tata Kelola TI, WhatsApp, COBIT 5, Keamanan Informasi, Sea Leader Marine.
Yuni Suryaningsih (11211326), Analysis of Security and Efficiency in WhatsApp Ticket Booking Process at Sea Leader Marine Using COBIT 5
Sea Leader Marine is a tourism transportation service provider to the Thousand Islands that utilizes WhatsApp as the primary medium for ticket reservations. While this method offers convenience and cost efficiency, potential issues remain regarding information security and the lack of formal documentation for Information Technology (IT) governance. This study aims to analyze the level of IT governance in WhatsApp-based ticket reservation services using the COBIT 5 framework. The eight COBIT 5 subdomains applied are EDM01, APO01, APO13, BAI04, DSS01, DSS02, DSS05, and MEA03. This research employs a mixed-methods approach, combining qualitative and quantitative methods. Qualitative data were obtained through interviews with internal company representatives, while quantitative data were gathered through questionnaires completed by 65 respondents. The analysis revealed that certain subdomains, such as DSS05 and MEA03, remain at less-than-optimal capability levels, particularly in service security management and compliance with external requirements. Recommended actions include developing formal IT policies, strengthening information security controls, and conducting regular evaluations and audits. The findings of this study are expected to serve as a reference for Sea Leader Marine in improving IT governance quality, especially in the digital ticket reservation process via WhatsApp.
Keywords: IT Governance, WhatsApp, COBIT 5, Information Security, Sea Leader Marine.
File_7 Lampiran-lampiran
Full Laporan Tugas Akhir
[1] E. V. Herlianti and R. B. Sanjaya, “Dampak Positif Pariwisata Terhadap Budaya, Ekonomi, Dan Lingkungan Di Kasepuhan Cipta Mulya,” Kritis, vol. 31, no. 2, pp. 132–149, 2022, doi: 10.24246/kritis.v31i2p132-149.
[2] S. Priyanto, “Integrasi Sistem Informasi Transportasi Untuk Meningkatkan Aksesibilitas Destinasi Wisata Di Kota Sabang,” Pros. Semin. Nas. …, no. November 2016, pp. 245–252, 2018, [Online]. Available: http://jurnal.unismabekasi.ac.id/index.php/sinergi/article/download/1374/1236
[3] S. Adelita and R. Khadijah, “Perkembangan Teknologi Informasi dan Komunikasi di Industri Perjalanan Wisata dan Dampaknya Kepada Solo Traveler Perempuan di Indonesia,” vol. 4, no. 2, pp. 82–101, 2024.
[4] Undang-Undang RI Nomor 10 Tahun 2009 Tentang Kepariwisataan, “Kementerian Pariwisata RI,” pp. 1–24, 2009.
[5] T. Pipit Muliyah, Dyah Aminatun, Sukma Septian Nasution, Tommy Hastomo, Setiana Sri Wahyuni Sitepu, “済無No Title No Title No Title,” J. GEEJ, vol. 7, no. 2, 2020.
[6] “Sea Leader Marine.” [Online]. Available: https://www.sealeadermarine.com/about
[7] S. P. Wijaya, S. Hariyanto, and K. Kunci, “Perancangan Chatbot dengan Metode Natural Language Processing ( NLP ) dalam Proses Booking Order di Carwash,” vol. 5, no. 1, pp. 33–45, 2020.
[8] WhatsApp Business, “WhatsApp Business Trust and Safety.” Accessed: Apr. 28, 2025. [Online]. Available: https://business.WhatsApp.com/trust-and-safety?lang=id_ID
[9] UNMAHA, “Keamanan Data dalam Cloud Computing: Tata Kelola dan Kepatuhan.” Accessed: Apr. 28, 2025. [Online]. Available: https://blog.unmaha.ac.id/keamanan-data-dalam-cloud-computing-tata-kelola-dan-kepatuhan/
[10] Alamisharia, “Waspada Kebocoran Data di Internet.” Accessed: Apr. 28, 2025. [Online]. Available: https://alamisharia.co.id/blogs/cara-mengatasi-kebocoran-data-di-internet/
[11] L. Puad and R. L. Budiarti, “IMPLEMENTATION OF MOBILE-CLOUD TECHNOLOGY IN THE PLANTATION INDUSTRY ( CASE STUDY : CASSAVA PLANTATION AT PT SENTOSA GROUP ),” no. 2019, 2022.
[12] ISACA, COBIT 5: A Business Framework for the Governance and Management of Enterprise IT. 2018. [Online]. Available: https://books.google.co.id/books?id=1iLKVlOIg9EC&lpg=PA1&hl=id&pg=PA1#v=onepage&q&f=false
[13] L. G. Toyner and S. Sfenrianto, “Information System Security Evaluation Using Cobit 5 Framework,” J. Inf. Syst. Manag., vol. 4, no. 2, pp. 147–157, 2023, doi: 10.24076/joism.2023v4i2.992.
[14] T. P. Y. Titan, R. Y. Rakhman Alamsyah, and S. Silkillah Adwa, “Audit Keamanan Sistem Informasi Menggunakan Cobit 5 di PT. Paramita Surya Makmur Plastika,” J. Account. Inf. Syst., vol. 6, no. 1, pp. 75–88, 2023, doi: 10.32627/aims.v6i1.680.
[15] N. Zainuddin and N. Ningsih, “Evaluasi Keamanan Sistem Informasi Akademik (Siakad) Menggunakan Framework Cobit 5 Pada Universitas Sembilanbelas November Kolaka,” vol. 1, no. 1, pp. 1–5, 2023.
[16] T. Handayani and B. V. Christioko, “Audit Sistem Informasi menggunakan Framework Cobit 5 pada LPPM Universitas Semarang,” IJCIT (Indonesian J. Comput. Inf. Technol., vol. 8, no. 1, pp. 49–54, 2023, doi: 10.31294/ijcit.v8i1.11843.
[17] K. Kurniawan, K. A. Achmad, and S. A. Mugitama, “Analysis Using COBIT 5 Framework ( Case Study : PLANT Division PT Pamapersada Nusantara ),” vol. 8, no. April, pp. 1–14, 2023, doi: 10.34818/indojc.2023.8.1.686.
[18] Achmad Mukhlis, Baiq Laila Alfila, and Aliya Zhafira Wastuyana, “Ancaman dan Langkah Pengamanan Sistem Informasi Menggunakan Metode Systematic Literature Review,” J. Ilm. Sist. Inf. dan Ilmu Komput., vol. 3, no. 2, pp. 143–152, 2023, doi: 10.55606/juisik.v3i2.496.
[19] A. Duwila, A. Khairan, S. Lutfi, A. Arief, and S. N. Kapita, “Audit Sistem Keamanan Informasi SIMAK UNKHAIR Menggunakan COBIT 5 (Studi Kasus SIMAK Universitas Khairun),” J. Jar. dan Teknol. Inf., vol. 3, no. 1, pp. 114–120, 2023, doi: 00.0000/jati.
[20] H. Kusbandono, D. Ariyadi, and T. Lestariningsih, “Ebook - Tata Kelola Teknologi Informasi,” pp. 1–134, 2019.
[21] M. Hanif Fakhrurroja, S.Si., Tata kelola teknologi informasi (, vol. 3, no. C. 2018.
[22] M. S. Nalenan, “Analisis Tata Kelola Sistem Informasi Manajemen Rumah Sakit Umum Daerah Prof. Dr. W. Z. Johannes Kupang Menggunakan Cobit 5 Framework,” HOAQ (High Educ. Organ. Arch. Qual. J. Teknol. Inf., vol. 12, no. 2, pp. 90–102, 2023, doi: 10.52972/hoaq.vol12no2.p90-102.
[23] ISACA, “COBIT®5 - Foundation,” 12 Feb. Accessed: Apr. 11, 2025. [Online]. Available: https://www.slideshare.net/slideshow/cobit5-foundation-courseware/44575013?from_action=download_slide&slideshow_id=44575013&index=15#1
[24] C. N. Damanik, M. Mustikasari, and A. Suroso, “Analisis Tata Kelola Sistem Informasi di Perusahaan Pengelola Kawasan Industri Menggunakan Domain EDM Pada Kerangka Kerja COBIT 5,” J. Inform. J. Pengemb. IT, vol. 6, no. 3, pp. 175–180, 2021, doi: 10.30591/jpit.v6i3.3027.
[25] J. Nainggolan, “Analisis Perbandingan Framework COBIT 5.0 Dengan ITIL Dalam Mengaudit Sistem Informasi,” J. Ilm. Ilmu Terap. Univ. Jambi, vol. 5, no. 1, pp. 76–85, 2021, doi: 10.22437/jiituj.v5i1.13722.
[26] B. Nadhiroh, O. Purwaningrum, and S. Mukaromah, “Studi Literatur : Framework Cobit 5 Dalam Tata Kelola,” J. Teknol. Inf. dan Komun. SCAN, vol. XVI, no. ISSN 2686-6099, 2021, [Online]. Available: http://www.ejournal.upnjatim.ac.id/index.php/scan/article/view/2598/1858
[27] ISACA, Cobit 5 Business Framework, vol. 23, no. 3. 2019. [Online]. Available: http://repo.darmajaya.ac.id/5361/1/Isaca-COBIT 5 Framework A Business Framework for the Governance and Management of Enterprise IT-Isaca %282012%29.pdf
[28] A. P. P. dan B. Soewito, “Pentingnya ISO 27001 sebagai Standard Keamanan Informasi didalam Perusahaan,” 17 Nov. Accessed: May 16, 2025. [Online]. Available: https://mti.binus.ac.id/2021/11/17/pentingnya-iso-27001-sebagai-standard-keamanan-informasi-didalam-perusahaan/
[29] A. NUNN, “What Is ISO 27001:2013? A Guide for Businesses,” Jan 18. [Online]. Available: https://auth0.com/blog/what-is-iso-27001-2013-a-guide-for-businesses/
[30] W. U. in St. Louis, “Confidentiality, Integrity, and Availability: The CIA Triad.” [Online]. Available: https://informationsecurity.wustl.edu/guidance/confidentiality-integrity-and-availability-the-cia-triad/
[31] A. H. Harahap, C. Difa Andani, A. Christie, D. Nurhaliza, and A. Fauzi, “Pentingnya Peranan CIA Triad Dalam Keamanan Informasi dan Data Untuk Pemangku Kepentingan atau Stakholder,” J. Manaj. dan Pemasar. Digit., vol. 1, no. 2, pp. 73–83, 2023.
[32] A. K. Lab., “Apa itu Keamanan Siber? Jenis, Ancaman, dan Kiat-Kiat Keamanan Siber.” [Online]. Available: https://id.kaspersky.com/resource-center/definitions/what-is-cyber-security
[33] I. G. Indonesia, “Metrik dan Indikator Kinerja COBIT: Pengertian dan Manfaat,” 8/05/2024. [Online]. Available: http://itgid.org/insight/artikel-cobit/metrik-dan-indikator-kinerja-cobit-pengertian-dan-manfaat/
[34] B. Agustiara, C. A. Purba, E. S. Sinamo, and Z. Z. Novianti, “JICN : Jurnal Intelek dan Cendikiawan Nusantara JICN : Jurnal Intelek dan Cendikiawan Nusantara,” pp. 4376–4380, 2024.
[35] ISACA, A Business Framework for the Governance and Management of Enterprise IT. 2011. [Online]. Available: http://linkd.in/ISACAOfficial
[36] Q. E. Team, “Apa itu WhatsApp Business API? Kenali Benefit, Fitur, dan Harganya,” April 28, 2025. [Online]. Available: https://www.qiscus.com/id/blog/WhatsApp-business-api/
[37] H. Herwin and K. Andesa, “Implementation of Push Notification for Monitoring Motor Vehicle Tax Payments (Case Study: Samsat Siak),” J. Teknol. Dan Open Source, vol. 6, no. 1, pp. 110–119, 2023, doi: 10.36378/jtos.v6i1.3059.