Manajemen Risiko: Pendekatan BPRIM pada Proses Bisnis Administrasi Kependudukan

Main Article Content

Ainus Sukma El Diana Putri
Indri Sudanawati Rozas
Mohammad Khusnu Milad

Abstract

Risk management within an organization is important. The risk cannot be left alone, because in the end it will get bigger and have a bad impact on the organization. Risk management is an attempt to identify vulnerabilities and threats to information sources used by an organization. This study aims to see the results of the implementation of risk management in the electronic-based population administration business process, named POEDAK (Population Administration Online Services), in Gresik district. In this study, a risk analysis was carried out using the risk register and risk analysis using BPRIM. This risk analysis is carried out to determine the category of each existing risk, as well as to see the results of the analysis from the risk register and BPRIM. From the risk analysis that has been carried out using the risk register and BPRIM, the results obtained from the risk register and the depiction of the risk diagram using BPRIM are stated that with reference to BPMN POEDAK there are 16 risk codes. From the 16 risk codes, there are 12 risks in the low level category and 4 risks in the important level category. Where the risk is in the low category, namely the risk with the risk code R4, R5, R6, R7, R8, R9, R10, R11, R12, R14, R15, and R16. Meanwhile, the risks that fall into the important category are risks with codes R1, R2, R3, and R13.
 

Article Details

How to Cite
Putri, A. S. E. D., Rozas, I. S., & Milad, M. K. (2021). Manajemen Risiko: Pendekatan BPRIM pada Proses Bisnis Administrasi Kependudukan. JUSIFO (Jurnal Sistem Informasi), 7(2), 51-64. https://doi.org/10.19109/jusifo.v7i2.9409
Section
Articles

How to Cite

Putri, A. S. E. D., Rozas, I. S., & Milad, M. K. (2021). Manajemen Risiko: Pendekatan BPRIM pada Proses Bisnis Administrasi Kependudukan. JUSIFO (Jurnal Sistem Informasi), 7(2), 51-64. https://doi.org/10.19109/jusifo.v7i2.9409

References

Altuhhova, O., Matulevičius, R., & Ahmed, N. (2013). An Extension of Business Process Model and Notation for Security Risk Management. International Journal of Information System Modeling and Design, 4, 93–113. https://doi.org/10.4018/ijismd.2013100105

Candra, R. M., Sari, Y. N., Iskandar, I., & Yanto, F. (2019). Sistem Manajamen Risiko Keamanan Aset Teknologi Informasi Menggunakan ISO 31000:2018. Jurnal CoreIT: Jurnal Hasil Penelitian Ilmu Komputer Dan Teknologi Informasi, 5(1), 19–28. http://ejournal.uin-suska.ac.id/index.php/coreit/article/view/8200

Chapman, R. J. (2012). Simple Tools and Techniques for Enterprise Risk Management. In Simple Tools and Techniques for Enterprise Risk Management. John Wiley and Sons. https://doi.org/10.1002/9781118467206

Kementerian Pendayagunaan Aparatur Negara dan Reformasi Birokrasi. (2011). Permenpan RI, Nomor 12 Tahun 2011 (pp. 1–3). Kementerian Pendayagunaan Aparatur Negara dan Reformasi Birokrasi. https://peraturan.bpk.go.id/Home/Details/132860/permen-pan-rb-no-12-tahun-2011

Krisantoso, G., AP, I., & Fajar, M. (2015). Penerapan Business Process Modeling Notation (BPMN) untuk Memodelkan Kebutuhan Sistem Proses Penyuntingan Tulisan pada Website Jurnal JTRISTE. https://www.researchgate.net/publication/308698308_PENERAPAN_BUSINESS_PROCESS_MODELING_NOTATION_BPMN_UNTUK_MEMODELKAN_KEBUTUHAN_SISTEM_PROSES_PENYUNTINGAN_TULISAN_PADA_WEBSITE_JURNAL_JTRISTE

Mahardika, K. B., Wijaya, A. F., & Cahyono, A. D. (2019). Manajemen Risiko Teknologi Informasi Menggunakan ISO 31000:2018 (Studi Kasus: CV. XY). Sebatik, 23(1), 277–284. https://doi.org/10.46984/sebatik.v23i1.572

Marcinkowski, B., & Kuciapski, M. (2012). A Business Process Modeling Notation Extension for Risk Handling (A. Cortesi, N. Chaki, K. Saeed, & S. Wierzchoń (eds.); pp. 374–381). Springer Berlin Heidelberg. https://link.springer.com/chapter/10.1007%2F978-3-642-33260-9_32

Rikhardsson, P., Best, P., Green, P., & Rosemann, M. (2006). Business Process Risk Management, Compliance and Internal Control: A Research Agenda. https://www.researchgate.net/publication/5092796_Business_Process_Risk_Management_Compliance_and_Internal_Control_A_Research_Agenda

Sienou, A., Lamine, E., & Pingaud, H. (2008). A Method for Integrated Management of Process-risk. GRCIS 2008. https://www.researchgate.net/publication/228627418_A_Method_for_Integrated_Management_of_Process-risk

Sienou, A., Lamine, E., Pingaud, H., & Karduck, A. (2009). Aspects of the BPRIM language for risk driven process engineering. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 5872 LNCS, 172–183. https://doi.org/10.1007/978-3-642-05290-3_28

Suriadi, S., Weiß, B., Winkelmann, A., Ter, A., Adams, M., Conforti, R., Fidge, C., La Rosa, M., Ouyang, C., Pika, A., Rosemann, M., & Wynn, M. (2014). Current Research in Risk-aware Business Process Management-Overview, Comparison, and Gap Analysis. Communications of the Association for Information Systems, 34. https://doi.org/10.17705/1CAIS.03452

Susilo, L. J., & Kaho, V. R. (2018). Manajemen Risiko Berbasis ISO 31000:2018 (Panduan untuk Risk Leaders dan Risk Practitioners). PT. Grasindo.

Thabet, R., Boufaied, A., Lamine, E., Bork, D., Korbaa, O., & Pingaud, H. (2020). AdoBPRIM: Towards a new healthcare risk-aware business process management tool. Proceedings of the 13th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC) 2020, 498–505. https://doi.org/10.5220/0008977604980505

Thabet, R., Lamine, E., Boufaied, A., Bork, D., & Korbaa, O. (2020). Formal Specification, Implementation, and Evaluation of the AdoBPRIM Approach | Request PDF. Americas Conference on Information Systems (AMCIS) 2020. https://www.researchgate.net/publication/343627413_Formal_Specification_Implementation_and_Evaluation_of_the_AdoBPRIM_Approach

Viyanto, R. A., Latuihamallo, O. S., Tua, F. M., Gui, A., & Suryanto, S. (2013). Manajemen Risiko Teknologi Informasi: Studi Kasus pada Perusahaan Jasa. ComTech: Computer, Mathematics and Engineering Applications, 4(1), 43–54. https://doi.org/10.21512/COMTECH.V4I1.2682