Handout
MANAJEMEN SISTEM INFORMASI (MSI) Oleh : SOLIKIN WS., M.T.
[email protected] handout MSI Poltekpos Indonesia
Kuliah Pengganti Kelas 2A Senin, 13 Okt 2008 Pk. 08.00 – 9.30 wib Ruang : ?
handout MSI Poltekpos Indonesia
Kuliah Pengganti Kelas 2C Senin, 14 Okt 2008 Pk. 11.00 – 12.30 wib Ruang : ? Tdk jd
handout MSI Poltekpos Indonesia
SOLIKIN
Email :
[email protected] Atau
[email protected] Blog www.solikinws.wordpress.com handout MSI Poltekpos Indonesia
Materi dpt di Unduh
www.iqrosol.wordpress.com
handout MSI Poltekpos Indonesia
Tujuan 1.
2.
Mahasiswa memahami konsep pengelolaan SI dan mampu melakukan analisis kebutuhan sumber daya Mahasiswa mampu menentukan kegiatan yang diperlukan dalam mengelola SI handout MSI Poltekpos Indonesia
Lingkup 1.
2.
3.
4.
Memberikan pengertian dan pengetahuan tentang kegiatan yang perlu dilakukan dalam mengelola SI Memahami jenis, fungsi, struktur dan peran SI pada suatu organisasi Dapat melakukan analisis dan penetapan kebutuhan dalam pengelolaan sumberdaya agar SI dapat beroperasi secara optimal Dapat menggunakan framework-framework pengembangan dan pengelolaan SI handout MSI Poltekpos Indonesia
Buku Pustaka 1.
2.
3.
4.
MIS, Managing the digital firm, Kenneth C Laudon, Prentice Hall 2002 Managing IT, E. Wainright Martin, Prentice Hall 2002 MIS:Managing IT in the Business Enterprise, James A. O’Brien. Mc Graww Hill, 2004 Information System, The foundation of EBusiness, Steven Alter, 4thed, Prentice Hall, 2002 handout MSI Poltekpos Indonesia
MRT (Mass Rapid Transit) Singapore
handout MSI Poltekpos Indonesia
handout MSI Poltekpos Indonesia
handout MSI Poltekpos Indonesia
handout MSI Poltekpos Indonesia
handout MSI Poltekpos Indonesia
handout MSI Poltekpos Indonesia
handout MSI Poltekpos Indonesia
handout MSI Poltekpos Indonesia
handout MSI Poltekpos Indonesia
MRT
Mass Rapid Transit (MRT) di Singapura adalah sebuah layanan kereta penumpang ber-AC yang modern, dengan stasiun pemberhentian di seluruh negeri.
Terdapat tiga jalur utama – jalur NorthSouth dari Marina Bay ke Jurong East, jalur East-West dari Changi Airport/Pasir Ris ke Boon Lay, dan jalur North-East dari Harbour Front ke Punggol. handout MSI Poltekpos Indonesia
MRT Dari pusat kota, perjalanan dengan MRT ke stasiun Changi Airport hanya selama 27 menit. Layanan kereta dari stasiun Changi Airport beroperasi dengan frekuensi rata-rata 12 menit dan jam layanannya adalah sebagai berikut: Stasiun Changi Airport ke stasiun City Hall Kereta pertama: Pukul 05.31 (Senin sampai Sabtu), pukul 05.59 (Minggu dan hari libur) Kereta terakhir: Pukul 23.18 (setiap hari)
handout MSI Poltekpos Indonesia
MRT Stasiun City Hall ke stasiun Changi Airport Kereta pertama: Pukul 06.09 (Senin sampai Sabtu), pukul 06.45 (Minggu dan hari libur) Kereta terakhir: Pukul 00.03 (setiap hari) Tarif untuk sekali perjalanan dari stasiun Changi Airport ke stasiun City Hall adalah SGD 1.40. Demi kenyamanan wisatawan, kereta yang melayani stasiun Changi Airport menyediakan rak bagasi dan ruang bebas di setiap gerbong.
handout MSI Poltekpos Indonesia
RATIS Rail Travel Information System (RATIS) mengumumkan informasi jadwal kedatangan dan tujuan kereta. Informasi ini ditampilkan di layar plasma di peron, dan di panel LED di area. Silahkan membaca tujuan kereta di RATIS atau mendengarkan pengumuman dalam kereta untuk memastikan Anda naik kereta yang tepat ke tujuan Anda. Jika Anda naik kereta yang menuju stasiun Pasir Ris, Anda harus turun di stasiun pergantian Tanah Merah, lalu naik ke kereta menuju stasiun Changi Airport. Frekuensi Kereta beroperasi dengan interval antara dua setengah menit dan delapan menit dari pukul 05.30 pagi sampai 00.30 malam setiap hari. Periksalah di stasiun MRT yang handout bersangkutan untuk mendapat MSI Poltekpos Indonesia jadwal kedatangan/keberangkatan yang tepat.
Tiket Tiket Bepergian dengan MRT sangat murah, dengan biaya mulai dari SGD 0.80 sampai maksimal SGD 1.70. Selain menggunakan tunai, Anda dapat membayar tiket MRT dan bis dengan kartu ez-link. Kartu ini dapat dibeli atau diisi ulang di setiap kantor penjualan tiket TransitLink yang terletak di sebagian besar stasiun MRT dan tempat pergentian bis. Setiap kartu untuk dewasa dijual dengan isi minimal SGD 10 ditambah biaya deposit SGD 5. Untuk informasi lebih lanjut, hubungilah telepon TransitLink: 1 800-336 8900 (bebas pulsa di Singapura) atau kunjungi situs web SMRT handout MSI Poltekpos Indonesia
MRT Singapore dikelola oleh siapa? Kapan di bangunnya Kaitan dg IT? Dst
Handout MSI Poltek Pos
handout MSI Poltekpos Indonesia
Materi 1. 2. 3. 4. 5.
IS Overview IS Role in The Enterprises WSF IT IL IS Architectures
handout MSI Poltekpos Indonesia
IT IL (Information Technology Infrastructure Library) Solikin, M.T.
[email protected] handout MSI Poltekpos Indonesia
IT IL
handout MSI Poltekpos Indonesia
Alignment of the IT Plan with the Organizational Plan
The Relationship between Business, IS an IT Strategies
handout MSI Poltekpos Indonesia
IT IL
Pustaka Infrastruktur Teknologi Informasi) adalah suatu rangkaian konsep dan teknik pengelolaan infrastruktur, pengembangan, serta operasi teknologi informasi (TI). Nama ITIL dan IT Infrastructure Library merupakan merek dagang terdaftar dari Office of Government Commerce (OGC) Britania Raya. ITIL memberikan deskripsi detil tentang beberapa praktik TI penting dengan daftar cek, tugas, serta prosedur yang menyeluruh yang dapat disesuaikan dengan segala jenis organisasi TI. handout MSI Poltekpos Indonesia
IT IL
Walaupun dikembangkan sejak dasawarsa 1980-an, penggunaan ITIL baru meluas pada pertengahan 1990an dengan spesifikasi versi keduanya (ITIL v2) yang paling dikenal dengan dua set bukunya yang berhubungan dengan ITSM (IT Service Management), yaitu Service Delivery (Antar Layanan) dan Service Support (Dukungan Layanan) Pada 30 Juni 2007, OGC menerbitkan versi ketiga ITIL (ITIL v3) yang intinya terdiri dari lima bagian dan lebih menekankan pada pengelolaan siklus hidup layanan yang disediakan oleh teknologi informasi
handout MSI Poltekpos Indonesia
IT IL
Is a set of best practices and guidelines that define an integrated, process-based approach for managing information technology services. ITIL can be applied across almost every type of IT environment The Information Technology Infrastructure Library (ITIL) is a set of concepts and techniques for managing information technology (IT) infrastructure, development, and operations handout MSI Poltekpos Indonesia
IT IL
ITIL began in the 1980s as an attempt by the British government to develop an approach for efficient and cost-effective use of its many IT resources . ITIL is a proven set of guidance and best practices developed in the late 1980's by the United Kingdom Central Computer and Telecommunications Agency (CCTA) ITIL stresses service quality and focuses on how IT services can be efficiently and cost-effectively provided and supported. In the ITIL framework, the business units within an organization who commission and pay for IT services (e.g. Human Resources, Accounting), are considered to be "customers" of IT services. The IT organization is considered to be a service provider for the customers
handout MSI Poltekpos Indonesia
Organizations can benefit in several important ways from IT IL: 1. 2. 3. 4. 5. 6. 7.
IT services become more customer-focused The quality and cost of IT services are better managed The IT organization develops a clearer structure and becomes more efficient IT changes are easier to manage There is a uniform frame of reference for internal communication about IT IT procedures are standardized and integrated Demonstrable and auditable performance measurements are defined handout MSI Poltekpos Indonesia
ITIL details
ITIL takes a process-based approach to managing and providing IT services; IT activities are divided into processes, each of which has three levels 1. 2.
3.
Strategic: An organization's objectives are determined, along with an outline of methods to achieve the objectives. Tactical: The strategy is translated into an appropriate organizational structure and specific plans that describe which processes have to be executed, what assets have to be deployed, and what the outcome(s) of the processes should be. Operational: The tactical plans are executed. Strategic objectives are achieved within a specified time.
handout MSI Poltekpos Indonesia
Each of these areas is a set of best practices: 1.
2.
3.
4.
Configuration Management: Best practices for controlling production configurations (for example, standardization, status monitoring, asset identification). By identifying, controlling, maintaining and verifying the items that make up an organization's IT infrastructure, these practices ensure that there is a logical model of the infrastructure. Incident Management: Best practices for resolving incidents (any event that causes an interruption to, or a reduction in, the quality of an IT service) and quickly restoring IT services. These practices ensure that normal service is restored as quickly as possible after an incident occurs. Problem Management: Best practices for identifying the underlying cause(s) of IT incidents in order to prevent future recurrences. These practices seek to proactively prevent incidents and problems. Change Management: Best practices for standardizing and authorizing the controlled implementation of IT changes. These practices ensure that changes are implemented with minimum adverse impact on IT services, and that they are traceable.
handout MSI Poltekpos Indonesia
Each of these areas is a set of best practices: 5.
6.
7.
Configuration Management: Best practices for controlling production configurations (for example, Availability Management: Best practices for maintaining the availability of IT services guaranteed to a customer (for example, optimizing maintenance and design measures to minimize the number of incidents). These practices ensure that an IT infrastructure is reliable, resilient, and recoverable. Financial Management: Best practices for understanding and managing the cost of providing IT services (for example, budgeting, IT accounting, charging). These practices ensure that IT services are provided efficiently, economically, and cost-effectively. Service Level Management: Best practices for ensuring that agreements between IT and IT customers are specified and fulfilled. These practices ensure that IT services are maintained and improved through a cycle of agreeing, monitoring, reporting, and reviewing IT services
handout MSI Poltekpos Indonesia
Figure 1 depicts the above processes, showing how the Service Desk function serves as the single point of contact for the various service management processes
handout MSI Poltekpos Indonesia
IT IL and information security
IT IL seeks to ensure that effective information security measures are taken at strategic, tactical, and operational levels. Information security is considered an iterative process that must be controlled, planned, implemented, evaluated, and maintained IT IL breaks information security down into: 1. Policies - overall objectives an organization is attempting to achieve 2. Processes - what has to happen to achieve the objectives 3. Procedures - who does what and when to achieve the objectives 4. Work instructions - instructions for taking specific actions handout MSI Poltekpos Indonesia
It defines information security as a complete cyclical process with continuous review and improvement, as illustrated in Figure 2:
handout MSI Poltekpos Indonesia
As some organizations look at Implementation and Monitoring as a single step, ITIL's Information Security Process can be described as a seven step process 1. 2.
3.
4.
5. 6. 7.
Using risk analysis, IT customers identify their security requirements. The IT department determines the feasibility of the requirements and compares them to the organization's minimum information security baseline. The customer and IT organization negotiate and define a service level agreement (SLA) that includes definition of the information security requirements in measurable terms and specifies how they will be verifiably achieved. Operational level agreements (OLAs), which provide detailed descriptions of how information security services will be provided, are negotiated and defined within the IT organization. The SLA and OLAs are implemented and monitored. Customers receive regular reports about the effectiveness and status of provided information security services. The SLA and OLAs are modified as necessary handout MSI Poltekpos Indonesia
As some organizations look at Implementation and Monitoring as a single step, ITIL's Information Security Process can be described as a seven step process 1. 2.
3.
4.
5. 6. 7.
Using risk analysis, IT customers identify their security requirements. The IT department determines the feasibility of the requirements and compares them to the organization's minimum information security baseline. The customer and IT organization negotiate and define a service level agreement (SLA) that includes definition of the information security requirements in measurable terms and specifies how they will be verifiably achieved. Operational level agreements (OLAs), which provide detailed descriptions of how information security services will be provided, are negotiated and defined within the IT organization. The SLA and OLAs are implemented and monitored. Customers receive regular reports about the effectiveness and status of provided information security services. The SLA and OLAs are modified as necessary handout MSI Poltekpos Indonesia
Service level agreements The SLA is a key part of the ITIL information security process. It is a formal, written agreement that documents the levels of service, including information security, that IT is responsible for providing. The SLA should include key performance indicators and performance criteria. Typical SLA information security statements should include: handout MSI Poltekpos Indonesia
Service level agreements 1. 2. 3. 4. 5. 6. 7.
Permitted methods of access Agreements about auditing and logging Physical security measures Information security training and awareness for users Authorization procedure for user access rights Agreements on reporting and investigating security incidents Expected reports and audits
handout MSI Poltekpos Indonesia
Service level agreements
In addition to SLAs and OLAs, ITIL defines three other types of information security documentation: 1.
Information security policies: ITIL states that security policies should come from senior management and contain: 1. 2. 3.
2.
3.
Objectives and scope of information security for an organization Goals and management principles for how information security is to be managed Definition of roles and responsibilities for information security
Information security plans: describes how a policy is implemented for a specific information system and/or business unit. Information security handbooks: operational documents for day-to-day usage; they provide specific, detailed working instructions. handout MSI Poltekpos Indonesia
Ten ways ITIL can improve information security 1.
2.
3.
4.
5.
ITIL keeps information security business and service focused. Too often, information security is perceived as a "cost center" or "hindrance" to business functions. With ITIL, business process owners and IT negotiate information security services; this ensures that the services are aligned with the business' needs. ITIL can enable organizations to develop and implement information security in a structured, clear way based on best practices. Information security staff can move from "fire fighting" mode to a more structured and planned approach. With its requirement for continuous review, ITIL can help ensure that information security measures maintain their effectiveness as requirements, environments, and threats change. ITIL establishes documented processes and standards (such as SLAs and OLAs) that can be audited and monitored. This can help an organization understand the effectiveness of its information security program and comply with regulatory requirements (for example, HIPAA or Sarbanes Oxley). ITIL provides a foundation upon which information security can build. It requires a number of best practices - such as Change Management, Configuration Management, and Incident Management - that can significantly improve information security. For example, a considerable number of information security issues are caused by inadequate change management, such as misconfigured servers. handout MSI Poltekpos Indonesia
Ten ways ITIL can improve information security 6.
7.
8.
9. 10.
ITIL enables information security staff to discuss information security in terms other groups can understand and appreciate. Many managers can't "relate" to lowlevel details about encryption or firewall rules, but they are likely to understand and appreciate ITIL concepts such as incorporating information security into defined processes for handling problems, improving service, and maintaining SLAs. ITIL can help managers understand that information security is a key part of having a successful, well-run organization. The organized ITIL framework prevents the rushed, disorganized implementation of information security measures. ITIL requires designing and building consistent, measurable information security measures into IT services rather than after-thefact or after an incident. This ultimately saves time, money, and effort. The reporting required by ITIL keeps an organization's management well informed about the effectiveness of their organization's information security measures. The reporting also allows management to make informed decisions about the risks their organization has. ITIL defines roles and responsibilities for information security. During an incident, it's clear who will respond and how they will do so. ITIL establishes a common language for discussing information security. This can allow information security staff to communicate more effectively with internal and external business partners, such as an organization's outsourced security services
handout MSI Poltekpos Indonesia
Implementing ITIL
1. 2. 3. 4. 5.
ITIL enables information security staff to discuss information security in terms Critical factors for successful ITIL implementation include: Full management commitment and involvement with the ITIL implementation A phased approach Consistent and thorough training of staff and management Making ITIL improvements in service provision and cost reduction sufficiently visible Sufficient investment in ITIL support tools handout MSI Poltekpos Indonesia
Conclusion
Information security measures are steadily increasing in scope, complexity, and importance. It is risky, expensive, and inefficient for organizations to have their information security depend on cobbledtogether, homegrown processes. ITIL can enable these processes to be replaced with standardized, integrated processes based on best practices. Though some time and effort are required, ITIL can improve how organizations implement and manage information security handout MSI Poltekpos Indonesia
Itil Assessments & Implementation Services
handout MSI Poltekpos Indonesia
Core Processes:
The planning, delivery and support of IT Services are divided into ten core processes within ITIL. These ten processes are distributed into two groups, one that focuses on Service Support and the other which focuses on Service Delivery. Service Support encompasses the operational processes that enable an IT organization to implement a stable IT infrastructure, while Service Delivery deals with the planning, realization, continuation of services, and optimizing the cost performance of IT services handout MSI Poltekpos Indonesia
10 Core IT Service Management processes: 1. 2. 3.
4.
5.
Incident Management Timely coordination, diagnosis, correction, and restoration of interrupted IT services. Availability Management Optimizing and ensuring the availability of IT services to support business objectives. Problem Management Identifying and permanently removing the root causes of actual and potential problems. Capacity Management Optimizing the capacity of IT resources and services in alignment with business requirements. Change Management Maximizing the business benefits of infrastructure change while reducing risk of making changes. handout MSI Poltekpos Indonesia
10 Core IT Service Management processes: 6.
7. 8. 9. 10.
IT Service Continuity Management Ensuring the availability and rapid restoration of IT services in the event of a disaster. Configuration Management Establishing control of critical IT configuration items Financial Management Measuring, controlling and recovering costs of IT service. Release Management Improving release, distribution and maintenance processes of configuration items. Service Level Management Establishing, reporting on, and maintaining the delivery of agreed upon IT services levels to customers. handout MSI Poltekpos Indonesia
10 Core IT Service Management processes: 6.
7. 8. 9. 10.
IT Service Continuity Management Ensuring the availability and rapid restoration of IT services in the event of a disaster. Configuration Management Establishing control of critical IT configuration items Financial Management Measuring, controlling and recovering costs of IT service. Release Management Improving release, distribution and maintenance processes of configuration items. Service Level Management Establishing, reporting on, and maintaining the delivery of agreed upon IT services levels to customers. handout MSI Poltekpos Indonesia
Introduction to IT Infrastructure Library - ITIL Service Management Processes Framework
handout MSI Poltekpos Indonesia
View of Tools aligned to and used in support of the ITIL framework
CMDB=Configuration Management Database The CMDB will se serve as the blueprint for how the entire IT infrastructure is structured, how vario ious CIs — hardware, software, incidents, agreements, service levels, docucumentation, and soon — are related, and how the entire metasystem functioions.
handout MSI Poltekpos Indonesia
Network Management System (NMS) is a combination of hardware and software used to monitor and administer network
ITIL V3
handout MSI Poltekpos Indonesia
Five essential core books represent basic ITIL Service Lifecycle elements 1. 2. 3. 4. 5.
Service Strategy: Creating the set of services that help achieve business objectives. Service Design: Designing services, from technical and business perspective. Service Transition: How to change live production infrastructure, implementing the needed services. Service Operation: Day-to-day IT business, operating. A place to start if you are new to ITIL. Continual Service Improvement: Evaluating and improving services in support of business goals.
handout MSI Poltekpos Indonesia
handout MSI Poltekpos Indonesia
handout MSI Poltekpos Indonesia
ITSM
ITSM (Information Technology Service Management, Manajemen Layanan Teknologi Informasi) adalah suatu metode pengelolaan sistem teknologi informasi (TI) yang secara filosofis terpusat pada perspektif konsumen layanan TI terhadap bisnis perusahaan ITSM berfokus pada proses dan karenanya terkait dan memiliki minat yang sama dengan kerangka kerja dan metodologi gerakan perbaikan proses (seperti TQM, Six Sigma, Business Process Management, dan CMMI) handout MSI Poltekpos Indonesia
ITSM
Disiplin ini tidak mempedulikan detil penggunaan produk suatu pemasok tertentu atau detil teknis suatu sistem yang dikelola, melainkan berfokus pada upaya penyediaan kerangka kerja untuk menstrukturkan aktivitas yang terkait dengan TI dan interaksi antara personil teknis TI dengan pengguna teknologi informasi ITSM umumnya menangani masalah operasional manajemen teknologi informasi (kadang disebut operations architecture, arsitektur operasi) dan bukan pada pengembangan teknologinya sendiri
handout MSI Poltekpos Indonesia
ITSM
Contohnya, proses pembuatan perangkat lunak komputer untuk dijual bukanlah fokus dari disiplin ini, melainkan sistem komputer yang digunakan oleh bagian pemasaran dan pengembangan bisnis di perusahaan perangkat lunak-lah yang merupakan fokus perhatiannya Banyak pula perusahaan non-teknologi, seperti pada industri keuangan, ritel, dan pariwisata, yang memiliki sistem TI yang berperan penting, walaupun tidak terpapar langsung kepada konsumennya handout MSI Poltekpos Indonesia
ITSM
Sesuai dengan fungsi ini, ITSM sering dianggap sebagai analogi disiplin ERP pada TI, walaupun sejarahnya yang berakar pada operasi TI dapat membatasi penerapannya pada aktivitas utama TI lainnya seperti manajemen portfolio TI dan rekayasa perangkat lunak
handout MSI Poltekpos Indonesia
CMMI
Capability Maturity Model Integration atau CMMI (bahasa Indonesia: Integrasi Model Kematangan Kemampuan) adalah suatu pendekatan perbaikan proses yang memberikan unsur-unsur penting proses efektif bagi organisasi. Praktik-praktik terbaik CMMI dipublikasikan dalam dokumen-dokumen yang disebut model, yang masing-masing ditujukan untuk berbagai bidang yang berbeda Saat ini terdapat dua bidang minat yang dicakup oleh model CMMI: development (pengembangan) dan acquisition (akuisisi). Versi terkini CMMI adalah versi 1.2 dengan dua model yang tersedia yaitu CMMI-DEV (CMMI for Development) yang dirilis pada Agustus 2006 dan ditujukan untuk proses pengembangan produk dan jasa, serta CMMI-ACQ (CMMI for Acquisition) yang dirilis pada November 2007 dan ditujukan untuk manajemen rantai suplai, akuisisi, serta proses outsourcing di pemerintah dan industri
handout MSI Poltekpos Indonesia
CMMI
Capability Maturity Model Integration atau CMMI (bahasa Indonesia: Integrasi Model Kematangan Kemampuan) adalah suatu pendekatan perbaikan proses yang memberikan unsur-unsur penting proses efektif bagi organisasi. Praktik-praktik terbaik CMMI dipublikasikan dalam dokumen-dokumen yang disebut model, yang masing-masing ditujukan untuk berbagai bidang yang berbeda Saat ini terdapat dua bidang minat yang dicakup oleh model CMMI: development (pengembangan) dan acquisition (akuisisi). Versi terkini CMMI adalah versi 1.2 dengan dua model yang tersedia yaitu CMMI-DEV (CMMI for Development) yang dirilis pada Agustus 2006 dan ditujukan untuk proses pengembangan produk dan jasa, serta CMMI-ACQ (CMMI for Acquisition) yang dirilis pada November 2007 dan ditujukan untuk manajemen rantai suplai, akuisisi, serta proses outsourcing di pemerintah dan industri
handout MSI Poltekpos Indonesia
CMMI
Terlepas model mana yang dipilih oleh suatu organisasi, praktik-praktik terbaik CMMI harus disesuaikan oleh masingmasing organisasi tergantung pada sasaran bisnisnya. Organisasi tidak dapat memperoleh sertifikasi CMMI, melainkan dinilai dan diberi peringkat 1-5. Hasil pemeringkatan penilaian ini dapat dipublikasikan jika dirilis oleh organisasi penilainya handout MSI Poltekpos Indonesia
Understanding Systems from Business Viewpoint
Amazon.com : An Evolving Business Models The Need for Frameworks and Models The Work System Framework Work System Principles Relationships Beetwen Work Systems and IS The Principle Based Systems Analysis Method Measurement Work System Performance
Clasification Related to
handout MSI Poltekpos Indonesia
Amazon.com : An Evolving Business Models (Work System Snapshot, Amazon.com provides a different way to shop for books)
handout MSI Poltekpos Indonesia
The Work System Framework
The Customer The Product and Services The Business Process The Participant The Information The Technology Context Infrastructure handout MSI Poltekpos Indonesia
The Customer People
who use and receive direct benefit from the products and services handout MSI Poltekpos Indonesia
The Product and Services
The combination of physical things information and services that the work system produces for to customer handout MSI Poltekpos Indonesia
The Business Process
The sets of the steps or activities that are performed within the work system
handout MSI Poltekpos Indonesia
The Participant People
who perform the work step in the business process
handout MSI Poltekpos Indonesia
The Information The
information used by the participants to perform their work
handout MSI Poltekpos Indonesia
The Technology The
hardware, software and the other tools and equipment used by the participants handout MSI Poltekpos Indonesia
Context The
organizational, competitive, technical and regulatory realm within which the work system operates handout MSI Poltekpos Indonesia
Infrastructure Is
share human and technical resources that the work system rellies on even through these resources exist and are managed outside of it. handout MSI Poltekpos Indonesia
handout MSI Poltekpos Indonesia
Tugas-2
Tugasnya perorangan Waktunya : 1 minggu Kirim ke :
[email protected] Uraian Tugas :
Tetapkan 1 jenis org/perusahaan Setiap mhs tdk boleh org yg sama Buat WSF-nya :
WSF Institusi WSF Unit/Sub min 2 sub/unit
Diketik menggunakan tools tertentu handout MSI Poltekpos Indonesia
Materi UTS 1. 2. 3. 4. 5.
MRT IT IL ITSM+CMMI WSF Open or Close : surprise!
handout MSI Poltekpos Indonesia