{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T00:07:41Z","timestamp":1755907661437,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,9,22]],"date-time":"2023-09-22T00:00:00Z","timestamp":1695340800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,9,22]]},"DOI":"10.1145\/3629378.3629444","type":"proceedings-article","created":{"date-parts":[[2023,12,28]],"date-time":"2023-12-28T16:35:57Z","timestamp":1703781357000},"page":"537-544","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Aligning IT Asset Management at XYZ University with Infocom Standard and COBIT 2019 BAI09 Domain: Assessment and Design"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-1918-1716","authenticated-orcid":false,"given":"Marcha Salsabila","family":"Afiani","sequence":"first","affiliation":[{"name":"Department of Information Systems, School of Industrial and Systems Engineering, Telkom University, Indonesia"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2973-9215","authenticated-orcid":false,"given":"Muharman","family":"Lubis","sequence":"additional","affiliation":[{"name":"Department of Information Systems, School of Industrial and Systems Engineering, Telkom University, Indonesia"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-8694-0134","authenticated-orcid":false,"given":"Ari Fajar","family":"Santoso","sequence":"additional","affiliation":[{"name":"Department of Information Systems, School of Industrial and Systems Engineering, Telkom University, Indonesia"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-9555-2321","authenticated-orcid":false,"given":"Muhammad Fakhrul","family":"Safitra","sequence":"additional","affiliation":[{"name":"Department of Information Systems, School of Industrial and Systems Engineering, Telkom University, Indonesia"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2023,12,28]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.1007\/978-3-642-28314-7_22"},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings of the 3rd International Conference on Electronics, Communications and Control Engineering (pp. 21-25)","author":"Akrim","year":"2020","unstructured":"Akrim, Lubis, M., & Lubis, A. R. (2020, April). Classification of Tajweed Al-Qur'an on Images Applied Varying Normalized Distance Formulas. In Proceedings of the 3rd International Conference on Electronics, Communications and Control Engineering (pp. 21-25)."},{"key":"e_1_3_2_1_3_1","first-page":"0","article-title":"Research on IT Internal Control: Based on the Analysis of COBIT 5","volume":"01","author":"Lin J.","year":"2021","unstructured":"B. Lin, J. Cao, and Wei Shu, \u201cResearch on IT Internal Control: Based on the Analysis of COBIT 5,\u201d J. Jiangxi Univ. Financ. Econ. 01, vol. 0, no. 01, p. 411, 2021.","journal-title":"J. Jiangxi Univ. Financ. Econ."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.33387\/jiko"},{"key":"e_1_3_2_1_5_1","first-page":"0","article-title":"Research on IT Internal Control: Based on the Analysis of COBIT 5","volume":"01","author":"Lin J.","year":"2021","unstructured":"B. Lin, J. Cao, and Wei Shu, \u201cResearch on IT Internal Control: Based on the Analysis of COBIT 5,\u201d J. Jiangxi Univ. Financ. Econ. 01, vol. 0, no. 01, p. 411, 2021.","journal-title":"J. Jiangxi Univ. Financ. Econ."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.29207\/resti.v4i4.2265D"},{"unstructured":"D. Henriques R. F. Pereira R. Almeida and M. Mira da Silva \"IT governance enablers in relation to IoT implementation: a systematic literature review \" Digit. Policy Regul. Gov. v.","key":"e_1_3_2_1_7_1"},{"key":"e_1_3_2_1_8_1","first-page":"1","volume-title":"2019 7th International Conference on Cyber and IT Service Management (CITSM) (Vol. 7","author":"Lubis M.","year":"2019","unstructured":"Lubis, M., Witjaksono, W., & Azizah, A. H. (2019, November). Implementation of enterprise resource planning (ERP) using integrated model of extended technology acceptance model (TAM) 2: case study of PT. Toyota Astra motor. In 2019 7th International Conference on Cyber and IT Service Management (CITSM) (Vol. 7, pp. 1-6). IEEE."},{"key":"e_1_3_2_1_9_1","first-page":"2","volume-title":"Conf. Comput. Informatics Eng. IC2IE","author":"Ishlahuddin P. W.","year":"2020","unstructured":"A. Ishlahuddin, P. W. Handayani, K. Hammi, and F. Azzahro, \"Analysing IT Governance Maturity Level using COBIT 2019 Framework: A Case Study of Small Size Higher Education Institute (XYZ-edu),\" 2020 3rd Int. Conf. Comput. Informatics Eng. IC2IE 2020, pp. 2."},{"key":"e_1_3_2_1_10_1","volume-title":"Proceeding of the 3rd International Conference on Information and Communication Technology for the Moslem World (ICT4M) 2010 (pp. C-13)","author":"Lubis M.","year":"2010","unstructured":"Lubis, M., & Maulana, F. A. (2010, December). Information and electronic transaction law effectiveness (UU-ITE) in Indonesia. In Proceeding of the 3rd International Conference on Information and Communication Technology for the Moslem World (ICT4M) 2010 (pp. C-13). IEEE."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1016\/j.procs.2016.09.253"},{"key":"e_1_3_2_1_12_1","volume-title":"Jakarta","author":"Kemenristekdikti","year":"2017","unstructured":"Kemenristekdikti, \u201cTata kelola teknologi informasi di lingkungan kementerian riset, teknologi, dan pendidikan tinggi,\u201d Jakarta, 2017."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.24246\/aiti.v15i2.107-114"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1109\/CITSM56380.2022.9935926"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1109\/IAC.2016.7905720"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.1109\/WorldS450073.2020.9210362"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.21609\/jsi.v15i1.790"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.1080\/10580530902794786"},{"volume-title":"Journal of physics: conference series (Vol. 1007, No. 1","author":"Hakim L.","unstructured":"Hakim, L., Kusumasari, T. F., & Lubis, M. (2018, April). Text mining of UU-ITE implementation in Indonesia. In Journal of physics: conference series (Vol. 1007, No. 1, p. 012038). IOP Publishing.","key":"e_1_3_2_1_19_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_20_1","DOI":"10.1109\/HICSS.2006.234"},{"unstructured":"Surendro Kridanto. 2009. Development of Information System Master Plan. Informatics Bandung.","key":"e_1_3_2_1_21_1"},{"key":"e_1_3_2_1_22_1","volume-title":"Atas da Conferencia da Associacao Portuguesa de Sistemas de Informacao","author":"Bianchi R. D.","year":"2018","unstructured":"I. S. Bianchi and R. D. Sousa, \u201cIT governance maturity in higher education: A study in Brazilian and Portuguese Universities,\u201d in Atas da Conferencia da Associacao Portuguesa de Sistemas de Informacao, 2018, vol. 2018\u2013October."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_23_1","DOI":"10.1109\/ICCED46541.2019.9161120"},{"key":"e_1_3_2_1_24_1","first-page":"90","volume-title":"Proceedings - 3rd International Conference on Information Management, Innovation Management and Industrial Engineering, ICIII 2010","volume":"4","author":"Wu W.","year":"2010","unstructured":"Y. Wu and W. Yun, \u201cInformation based on strengthening the awareness and promotion of information technology,\u201d in Proceedings - 3rd International Conference on Information Management, Innovation Management and Industrial Engineering, ICIII 2010, 2010, vol. 4, pp. 88\u201390."},{"volume-title":"analisis dan perancangan proses manajemen risiko ti menggunakan kerangka kerja cobit 2019 di pt inti (persero)","author":"al Hakim R.","unstructured":"N. al Hakim, R. Fauzi, and I. Santosa, \u201canalisis dan perancangan proses manajemen risiko ti menggunakan kerangka kerja cobit 2019 di pt inti (persero),\u201d eProceedings of Engineering, vol. 7, no. 3, 2020.","key":"e_1_3_2_1_25_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_26_1","DOI":"10.1145\/3592307.3592323"},{"key":"e_1_3_2_1_27_1","volume-title":"COBIT 2019 Governance and Management Objectives (ISACA)., COBIT 2019 Governance and Management Objectives (ISACA).","author":"ISACAISACA.","year":"2019","unstructured":"ISACAISACA. (2019). COBIT 2019 Governance and Management Objectives (ISACA)., COBIT 2019 Governance and Management Objectives (ISACA). 2019."},{"volume-title":"Analisis Tata Kelola Teknologi Informasi Menggunakan Framework Cobit 5 (Studi Kasus: STIKES Garuda Putih Jambi)","author":"Samsinar R.","unstructured":"S. Samsinar, R. Sinaga, andR. Afriany, \u201cAnalisis Tata Kelola Teknologi Informasi Menggunakan Framework Cobit 5 (Studi Kasus: STIKES Garuda Putih Jambi),\u201d jurnal media informatika budidarmA, vol. 5, no. 1, pp. 138\u2013148, 2021.","key":"e_1_3_2_1_28_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_29_1","DOI":"10.1109\/ICBASE51474.2020.00064."},{"volume-title":"Proc. - 2019 Int. Semin. Intell. Technol. Its Appl. ISITIA.","author":"Prasetyawan","unstructured":"N. Prasetyawan, Endroyono, and S. M. S. Nugroho, \u201cMaturity Level Analysis of Governance and Integration IT of Simkeuda in Pamekasan Regency Using COBIT 4.1,\u201d Proc. - 2019 Int. Semin. Intell. Technol. Its Appl. ISITIA.","key":"e_1_3_2_1_30_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_31_1","DOI":"10.1109\/CITSM.2018.8674062"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_32_1","DOI":"10.1051\/matecconf\/201821804016"},{"doi-asserted-by":"crossref","unstructured":"Lubis F. S. Lubis M. & Hakim L. (2022 December). Investigation of Netizen Sentiment Analysis Toward The Controversy of Information and Electronic Transaction Law. In 2022 Seventh International Conference on Informatics and Computing (ICIC) (pp. 1-7). IEEE.","key":"e_1_3_2_1_33_1","DOI":"10.1109\/ICIC56845.2022.10006918"},{"key":"e_1_3_2_1_34_1","volume-title":"The effect of a SECoS in crude palm oil forecasting to improve business intelligence. Bulletin of Electrical Engineering and Informatics, 9(4), 1604-1611","author":"Al-Khowarizmi A. K.","year":"2020","unstructured":"Al-Khowarizmi, A. K., Nasution, I. R., Lubis, M., & Lubis, A. R. (2020). The effect of a SECoS in crude palm oil forecasting to improve business intelligence. Bulletin of Electrical Engineering and Informatics, 9(4), 1604-1611."},{"key":"e_1_3_2_1_35_1","volume-title":"Architecture model of information technology infrastructure based on service quality at government institution. Procedia Computer Science, 161, 841-850","author":"Widjajarto A.","year":"2019","unstructured":"Widjajarto, A., Lubis, M., & Yunan, U. (2019). Architecture model of information technology infrastructure based on service quality at government institution. Procedia Computer Science, 161, 841-850."},{"key":"e_1_3_2_1_36_1","volume-title":"2013 5th International Conference on Information and Communication Technology for the Muslim World (ICT4M) (pp. 1-6). IEEE.","author":"Lubis M.","year":"2013","unstructured":"Lubis, M., & Kartiwi, M. (2013, March). Privacy and trust in the Islamic perspective: Implication of the digital age. In 2013 5th International Conference on Information and Communication Technology for the Muslim World (ICT4M) (pp. 1-6). IEEE."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_37_1","DOI":"10.1007\/978-981-19-7660-5_23"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_38_1","DOI":"10.1145\/3592307.3592329"},{"key":"e_1_3_2_1_39_1","volume-title":"Counterattacking Cyber Threats: A Framework for the Future of Cybersecurity. Sustainability, 15(18), 13369","author":"Safitra M. F.","year":"2023","unstructured":"Safitra, M. F., Lubis, M., & Fakhrurroja, H. (2023). Counterattacking Cyber Threats: A Framework for the Future of Cybersecurity. Sustainability, 15(18), 13369."},{"key":"e_1_3_2_1_40_1","volume-title":"Open-up International Market Opportunities: Using the OSINT Crawling and Analyzing Method. SEIKO: Journal of Management & Business, 6(1), 923-931","author":"Safitra M. F.","year":"2023","unstructured":"Safitra, M. F., & Abdurrahman, L. (2023). Open-up International Market Opportunities: Using the OSINT Crawling and Analyzing Method. SEIKO: Journal of Management & Business, 6(1), 923-931."},{"key":"e_1_3_2_1_41_1","volume-title":"2023 9th International Conference on Computer and Communication Engineering (ICCCE) (pp. 311-316)","author":"Maulana F.","year":"2023","unstructured":"Maulana, F., Fajri, H., Safitra, M. F., & Lubis, M. (2023, August). Unmasking log4j's Vulnerability: Protecting Systems against Exploitation through Ethical Hacking and Cyberlaw Perspectives. In 2023 9th International Conference on Computer and Communication Engineering (ICCCE) (pp. 311-316). IEEE."}],"event":{"acronym":"ICIBE 2023","name":"ICIBE 2023: 2023 the 9th International Conference on Industrial and Business Engineering","location":"Beijing China"},"container-title":["Proceedings of the 2023 9th International Conference on Industrial and Business Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3629378.3629444","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3629378.3629444","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T15:20:54Z","timestamp":1755876054000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3629378.3629444"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,22]]},"references-count":41,"alternative-id":["10.1145\/3629378.3629444","10.1145\/3629378"],"URL":"https:\/\/doi.org\/10.1145\/3629378.3629444","relation":{},"subject":[],"published":{"date-parts":[[2023,9,22]]},"assertion":[{"value":"2023-12-28","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}