Perbandingan Framework COBIT2019 dan TOGAF dalam Manajemen Keamanan Informasi
DOI:
https://doi.org/10.37985/jer.v6i2.2156Keywords:
Manajemen Keamanan Informasi, COBIT2019, TOGAF, Literature ReviewAbstract
Manajemen Keamanan Informasi (Information Security Management) adalah salah satu aspek penting dalam mendukung organisasi di era digital. Penelitian ini bertujuan untuk mengevaluasi efektivitas, kesesuaian, dan cakupan masing-masing framework dalam mendukung standar manajemen keamanan informasi. Framework seperti COBIT2019 dan TOGAF menawarkan pendekatan yang berbeda tetapi saling melengkapi untuk penerapan standar keamanan informasi. Analisis tersebut didasarkan pada literatur review, tinjauan teori, dan implementasi di berbagai organisasi. Penelitian diharapkan dapat membantu organisasi memilih dan mengintegrasikan framework yang paling sesuai dengan kebutuhan dan situasi organisasi. Studi ini juga membantu meningkatkan pemahaman teoritis dan praktis tentang penerapan standar manajemen keamanan informasi berbasis framework.
Downloads
References
Amstrong, P., & Levis, R. (2020). Strategic security governance frameworks: A comparative study of COBIT and TOGAF. Cybersecurity Journal, 15(2), 101–115.
Clarkson, P. (2021). The role of COBIT and TOGAF in enhancing organizational resilience. Journal of Information Security and Applications, 58, 102–117.
Dewi, G. K., & Achjari, D. (2021). Analisis keamanan sistem informasi Universitas X. ABIS: Accounting and Business Information Systems Journal, 9(1), 1–14.
Green, D. (2021). Aligning business goals with security architecture: A guide to TOGAF and COBIT. Business IT Review, 33(1), 55–72.
Hidayat, A., & Pratama, Y. (2022). Evaluasi framework COBIT dalam meningkatkan keamanan informasi di perusahaan multinasional. Jurnal Teknologi Informasi, 12(3), 78–88.
ISACA. (2019). COBIT 2019 framework: Governance and management objectives. ISACA Press.
IT Governance Institute. (2021). Integrating COBIT with enterprise frameworks. ITGI Press.
Johnson, M., Smith, R., & Taylor, L. (2020). Comparative analysis of COBIT 2019 and TOGAF in information security management. Journal of Information Systems Management, 37(4), 245–256.
Kitchenham, B. (2004). Procedures for performing systematic reviews. Keele University Technical Report.
Okoli, C., & Schabram, K. (2010). A guide to conducting a systematic literature review of information systems research. Journal of Information Technology, 28(1), 5–28.
Parinduri, A. F. K., & Hartono, J. (2023). Evaluasi penerapan tata kelola teknologi informasi (TI) menggunakan framework COBIT 2019 (studi kasus pada Perguruan Tinggi Harapan Maju). ABIS: Accounting and Business Information Systems Journal, 11(3), 225–239.
Puspitasari, E. Y., & Achjari, D. (2018). Evaluasi perencanaan manajemen teknologi informasi dengan pendekatan COBIT 5 framework (studi pada Dinas Komunikasi dan Informatika Kabupaten Pringsewu). ABIS: Accounting and Business Information Systems Journal, 6(3), 1–15.
Rahayu, S., & Ahmad, T. (2022). Optimalisasi tata kelola TI dengan COBIT dan TOGAF. Jurnal Sistem dan Teknologi Informasi, 8(4), 200–210.
Smith, J., & Brown, P. (2021). Integrating TOGAF and COBIT 2019 for holistic security governance. International Journal of IT Governance and Security, 12(1), 34–47.
Suryani, E., & Ramadhan, R. (2021). Arsitektur TI untuk penguatan keamanan informasi menggunakan TOGAF. Jurnal Rekayasa Sistem Informasi, 5(2), 101–115.
Telkom Indonesia. (2022). Perancangan tata kelola teknologi informasi berbasis COBIT 2019. Jurnal Teknik Informatika, 14(3), 22–34.
The Open Group. (2018). TOGAF and risk management: Case studies. The Open Group Publications.
The Open Group. (2018). TOGAF® standard, version 9.2. The Open Group.
Webster, J., & Watson, R. T. (2002). Analyzing the past to prepare for the future: Writing a literature review. MIS Quarterly, 26(2), xiii–xxiii.
White, R. (2020). Enterprise architecture and information security: Practical insights from TOGAF and COBIT integration. Springer Press.
Wilson, J. (2022). COBIT 2019 and TOGAF synergy for cybersecurity implementation. Technology and Policy Journal, 9(3), 44–59.
Downloads
Published
How to Cite
License
Copyright (c) 2025 Fajri Nugraha, Billy Hendrik

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution-ShareAlike 4.0 International License that allows others to share the work with an acknowledgement of the works authorship and initial publication in this journal.Â
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journals published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).