Syntax Literate: Jurnal Ilmiah Indonesia p�ISSN: 2541-0849

e-ISSN: 2548-1398

Vol. 7, No. 3, Maret 2022

 

VENDOR LOCK ANALYSIS IN SUBSURFACE DATA MANAGEMENT IN XYZ ORGANIZATION AND ITS IMPACT ON STATE DATA SOVEREIGNTY

 

Zulfikar, Mohammad Achmad Amin Soetomo, Soebowo Musa

Swiss German University, Indonesia

Email[email protected][email protected], [email protected]

 

Abstract

Vendor lock-in is a situation where users of a product depend on one provider and cannot switch to another provider without large costs and a long time (Opara-Martins, Sahandi, & Tian, 2016). So, there is a potential monopoly that can be done by vendors. Oil and gas data processing in the XYZ Organization, especially for subsurface data processing, tends to lead to vendor lock practices where the management of subsurface data is very dependent on the application used at this time, the data used is not open and applies internationally so that there is a vendor lock where the processed data cannot be used after the expiration date. It is also at risk of data ownership where XYZ organization and other institutions cannot easily process the data because the standard data used is limited to the applications currently used. The vendor lock has the potential to disrupt state data sovereignty because the control of data processing only depends on certain vendors.�

 

Keywords: data sovereignty; vendor lock; integration and interoperability; PPDM

 

Introduction

Oil and gas are one of the strategic and vital non-renewable natural resources that play an important role in the supply of industrial raw materials and the fulfillment of domestic energy needs (Law No. 22 of 2001) so that their management must provide the greatest prosperity and welfare impact for the people. In line with Article 33 paragraph (3) of the 1945 Constitution of the Republic of Indonesia which states that the earth, water, and natural resources contained therein are controlled by the state and used for the greatest prosperity of the people (Khan, Amyotte, & Amin, 2020).

This includes oil and gas data as stated in the Regulation of the Minister of Indonesia�s Ministry of Energy and Mineral Resources Number 7 of 2019 concerning the Management and Utilization of Oil and Gas Data, it is explained that oil and gas data belongs to the State of the Republic of Indonesia and is controlled by the Government (Umam, Nugraha, & Fathoni, 2019). The management and utilization of the data itself aim to support; a) preparation and determination of work area; b) formulation of technical policies; c) implementation and supervision of exploration and exploitation activities, and d) research and development as well as other activities to support investment in upstream oil and gas business activities.

The same regulation explained that all parties have a responsibility on data and information to always maintain its confidentiality and will not disclose or divulge it to anyone who is not entitled to it. In addition, the processing of oil and gas data and information should not be monopolized by certain parties by conducting vendor locks so that the processed data cannot be used after the membership contract period for the use of a system ends because this is contrary to Article 5 of the Minister of Energy and Mineral Resources No. 7 of 2019 (Dillon, Wu, & Chang, 2010).

(Barrera-Rey, 1997) in his research found that data sharing carried out by oil and gas companies shows that this is made by companies and the government gives better results and is by current conditions. This is positive because the company can avoid exploration failures and market failures. The Directorate General of Oil and Gas of the Ministry of Energy and Mineral Resources (2020) in its 2020 Performance Report said that through the Minister of Energy and Mineral Resources No. 7/2019 the government has encouraged open access to data for investors. In addition, the government has also played an active role in providing new data from the completion of the 2D seismic data acquisition of the 32,200 km Open Area (Oktaviani, Siregar, Sarkawi, & Novianti, 2020).

In connection with data processing on oil and gas, especially subsurface data at the XYZ Organization, it is an activity to provide a very important source of information in decision making. Decisions taken in planning and implementing oil and gas exploration and exploitation activities cannot be separated from the results of analysis based on subsurface data to then become the basis for making decisions on aspects of energy security (Ge & Helfert, 2008). In producing quality and reliable supervision over the planning and implementation of Exploration and Production (E&P) activities, a system is needed that can directly access subsurface data generated by the activities of the Contractors of Production Sharing Contract such as studies, surveys, and exploration and exploitation drilling. The data collected, namely well data, needs to be used for the continuity of the main business processes in the XYZ Organization such as Approval For Expenditure, Work Planning & Budgeting, Place Into Services, production supervision, asset recording, and others in order to carry out the XYZ Organization's main tasks. All of these data need to be integrated with each other using a data model that uses open standards so as to avoid vendor lock conditions.

Vendor lock-in is a situation where users of a product depend on one provider and cannot switch to another provider without large costs and a long time (Opara-Martins et al., 2016). So, there is a potential monopoly that can be done by vendors. According to the researcher's observations, oil and gas data processing at the XYZ Organization, especially for Subsurface data processing, has a tendency to lead to vendor lock practices.

This can be seen from the emergence of advanced application procurement initiatives by utilizing a data management platform that has been established using an application for 4 (four) years for the Subsurface Data Management System (SDMS). The procurement initiative is in the form of Procurement of Exploration Integrated Database Application Services where this work requires the use of applications sourced from the same provider.

Refer to Press Release of Professional Petroleum Data Management (PPDM) (2020), The Ministry of Energy and Mineral Resources (ESDM) has suggested the use of PPDM in standardizing data management in Indonesia by stating that the transition of the standard data model to PPDM version 3.9 and using it as a basis to explain information requirements (Kozman, 2013).

The conditions described in the background above can put the XYZ Organization in a vendor lock trap due to the following conditions:

1.   XYZ organization no longer has the freedom to access oil and gas data because of its dependence on certain products

2.   XYZ organization cannot choose applications freely due to dependence on the data standards used

3.   XYZ organization finds it difficult to develop and create new initiatives because it is limited to innovations provided by certain vendors

4.   The XYZ organization as a representative of the government is limited in terms of mastery of oil and gas data which indicates the threat of state data sovereignty

5.   Opening opportunities for fraud in procurement initiative practices

Therefore, the researcher wants to study further the consequences of vendor lock treatment on the subsurface database management system in XYZ Organization and determine alternative solutions to prevent vendor lock on XYZ organization.

 

Research Methods

Based on the background, existing phenomena and research objectives along with literature review, this research methods will be following step below:

1.   Determination of the problem to be investigated in the form of potential vendor locks in the management of the Subsurface Data Management System

2.   Literature review to obtain various supporting data related to the problem being researched in order to gain insight and research basis

3.   Identify the presence of Vendor Lock in the subsurface database management system and propose alternative solutions

4.   Conducting data source collection

5.   Analyzing the results of the Forum Group Discussion using a risk matrix assessment

The population in this study is the IT team, principal subsurface data management and the end users in Jakarta. The sampling technique or method used in this research is purposive sampling. Purposive sampling is sampling with certain considerations (Sugiyono, 2018).

The number of samples in this study were 13 peoples. In addition, data collection obtained through expert justification, several parties will be involved in the data collection process those who are directly involved in the management of the Subsurface Data Management System.

Primary data were obtained using the following data collection techniques:

a)   Interviews, interviews are conducted to obtain information and data from certain individuals for information purposes. As for the informants, the interview aims to obtain information about personal self, potential, willingness and ability to "empower" from individuals (Koentjaraningrat, 1977). Researchers have prepared a number of guiding questions to ask the informants face-to-face (directly) in order to get answers or explanations from the informants who were given orally. Researchers record answers and explanations and then collect them as research data according to the purpose and focus of the research

b)  Focus Group Discussions (FGDs) A great way to bring together people with similar experiences or backgrounds to discuss a topic of particular interest. Several parties that will be involved in the data collection process include: IT team, principle subsurface data management and end users with a total of 3 (three) FGD participants.

Secondary data is obtained by conducting a literature study to support, complete and improve primary data, both internally and from various sources, both report data and other published data.

 

Results and Discussion

1.   Data Collection

At this stage the data collection was carried out through the interview process as input for this thesis research. Interviews will be conducted through discussion sessions with the Division Head of Strategic Management and Information Technology, Department of Data Management and Information Systems Team, User, and Principles of the Subsurface Data Management System software.

a. Discussion with the Division Head of Strategic Management and Information Technology Based on discussions with the Division Head of Strategic Management and Information Technology, Bapak Rendra Utama, the following conclusions as below:

1)  The procurement of the Subsurface Database Management System (SDMS) application is intended to support the continuation of the process of collecting and managing subsurface data. The SDMS application will provide users with easy access to verified subsurface data through an interface for processing and analyzing subsurface data in carrying out the evaluation, recommendation, and analysis process for fast, efficient, and accurate decision making.

2)  This data management application will then supply data that is used by the data processing application to carry out further analysis activities

3)  The keyword as a main concern in managing this subsurface data is the data model. The data model used must be able to provide flexibility for various applications to use it so that the database is not locked only in certain applications.

 

b.   Discussion with the Head of the Department of Data Management and Information Systems. Based on discussions with the Head of the Department of Data Management and Information Systems, Bapak Virgo Eka Hartanto, the following conclusions as below:

1)  As a continuation of the procurement of subsurface data management tools based on an integrated solution framework (applications and databases) to support the function of monitoring and controlling upstream oil and gas business activities, especially those related to the evaluation of national oil and gas resources and reserves, and help make it easier for investors to obtain information on Subsurface data that will be offered by Oil and Gas.

2)  Compliance with government policies through the Minister of Energy and Mineral Resources Regulation No. 7 of 2019, namely carrying out data administration using the established catalog standards.

c.   Discussion with the User from Reserve Exploitation and Evaluation Studies Department Based on discussions with User from Reserve Exploitation and Evaluation Studies Department. Bapak Fajril Ambia, the following conclusions as below:

1)  Model data used can be accessed using any application as long as the user has SQL skills. The challenge is how to find out the metadata that applies to model data. With this condition, it can be said that is not a vendor lock.

2)  For information that most of the systems in the international world come from Schlumberger, IHS, Halliburton and other major principles where one of the user countries is the UK which is very concerned with data. Norway itself uses its contracts every seven years where the last year is used for data migration to the new system that won the procurement,

3)  Prosource from Schlumberger is the most convenient to use compare to Haliburton and IHS, especially in the features it provides is quite complete.

d.   Discussion with Petrosys Malaysia, Principle of Subsurface Data Management System Discussion with a Geoscience Data Manager, Ibu Mazlina Khalid, the following discussion as below:

Situation where cost of changing to a different vendor or service provider is so high that the client is basically client is stuck with the original vendor or service provider. This creates problem with the client where it lacks of freedom to choose a better product or services, lack of flexibility to negotiate prices and better services due to non-existent competitors which affects interoperability issue (Ahlgren, Hidell, & Ngai, 2016). Vendor lock possibly happens when client has financial pressure, under staffed or can�t afford business operation to be interrupted due to changes.

�     Eg: a customer bought a product and that product require a specific services that is sourced from the same vendor. If the vendor services or product decline in quality, the customer has to almost accept the low quality product as switching to a different vendor is too much hassle or costly. Vendor-lock in usually creates issues with integration as it is pretty much a closed concept whereby vendor has more control than the client most times.

�     Eg: If you are locked into certain cloud provider, when the time comes to move databases during cloud migration which involves moving data to a totally different type of environment which requires a different data reformatting.  Possible additional costs incurred as the need to hire extra staff to support the migration work.

 

e.   Discussion with Katalyst Data Management Kuala Lumpur, Principle of Subsurface Data Management System Discussion with an Asia Pasific Director, Bapak Robert Siahaan, the following discussion as below:

Vendor Lock is the occurrence of a monopoly on a product where the customer becomes dependent on the vendor providing the product. This vendor lock also results in a limited product or system flexibility in terms of interoperability with other systems. In terms of data impact, actually, it is in terms of data access where the existence of the data is in our control, but in terms of access to the data, we must use applications made by the vendor with standard data formats that are not common. For now, the Open standard can be used as a solution to avoid vendor locks, but it is also necessary to think about how many vendors or principles follow it so that the open standard itself does not become a lock at some point in the future. Need to explore other solutions such as OSDU open-source community. In other countries, rules for using open standards are not mandatory. The use of data standards is left to the user but in practice, companies use these open standards. Actually, above the implementation of the standard itself, there is something more important, namely data governance, which includes data quality, hierarchy, rules, and RACI.

 

f.    Discussion with IHS Markit Singapure, Principle of Subsurface Data Management System Discussion with an Enterprise Data Management (EDM) Team, Kok Mun Ho, the following discussion as below:

Vendor Lock is the data is vendor locked by proprietary format application that only can be consumed by the particular software.� If we want to use other applications, we need to do export and data migration.� There are two reasons at least, first obviously for a commercial reason to ensure they continue to sell the license, and the second one is perhaps when they build the software, they never think to do exchange the data.� This is not only happening in oil and gas but also in other industries that often monopolize one or two big industries. Vendor lock-in is common in the IT industry.

There is no other country except Indonesia that the vendor lock is governed by the government because usually there is up to the operator to decide what system they want to use. IHS never switch to standard PPDM, his standard data is dynamic. IHS can support what the customer needs, if you want the PPDM standard, it can be done, and if you want to use OSDU, he can do it too, IHS is flexible to do that. IHS does not build a base on the PPDM system and also does not OSDU. In fact, for open standard subsurface management, apart from PPDM, there are others that are more popular, namely OSDU, but this OSDU we have to do it with cloud technology while PPDM plays on-premise. The only thing that we want to do is go to the cloud.

 

g.   Focus Group Discussion with Department of Data Management and Information Systems Team, the following discussion as below:

1)  The database as a data source, if you apply the principle of data storage in accordance with the rules of writing a database, it can be said that it has certain standards, in this case the SDMS that has been built since 2017 using Oracle has followed these rules, so far it can be said that the data can be used because Its database format uses a standard database in general (Abu-Libdeh, Princehouse, & Weatherspoon, 2010).

2)  When we talk about application, it is specifically intended only for certain data models, so only this application can read the data model, therefore it is necessary to provide understanding/training in terms of using this database.

3)  Here the problem arises when the organization wants to use other applications because the data is a proprietary model that can only be read by previous applications. To be able to use the data in this database, data migration must be carried out into the new data model used by the new application that will be used. So this is a potential vendor lock where there is dependence on application providers in terms of database use because the data model used is the provider's proprietary. This factor causes the organization to always carry out a license every year. In this case, the provider has a bargaining position in service offerings and pricing, while the organization as a customer has no other choice.

4)  Vendor lock is a situation where the information in the database can only be used for a limited time only through certain applications belonging to the provider while the data model used is not public.

5)  Referring to lewis 2013 research on the need for interoperability in cloud computing, it can be stated that standards are important to be able to connect one application to another, the analogy is that English is not an international language so that everyone can connect with one another in the same language.

As stated in the Ministerial Regulation no. 7: 2019 and its derivatives, that the standard used is an internationally accepted, general and open standard which then in the Ministry of Energy and Mineral Resources Decree/SE stated that the standard used is PPDM.

6)  In terms of managing SDMS data, the data referred to is state-owned data which is controlled by the government in its management. When there is a vulnerability to the availability of the data where there is dependence on the vendor, it means that there has been a problem with state data sovereignty.

7)  Vendor Lock on SDMS actually no longer talks about whether there is potential, but in fact vendor lock has already occurred. It can be seen in licensing procurement where the organization does not have extensive price bargaining because there are no competitors with the standard model in use at that time.

8)  Talking about vendor locks, of course we will talk about standards where the standards used should be standards that are agreed upon and can be accepted by many parties. One of the experiences was when an integrated operating system project was implemented for the first time where an acceptable data transfer standard was chosen, namely Prodml based on ISO 15926, which is essentially interoperability. Moreover, if the data being processed concerns the interests of the state, standards are very important in order to avoid vendor locks.

 

2.   Data Analysis

1)  Define Scope on Wells Module Only

Based on the Decree of the Secretary-General of the Ministry of Energy and Mineral Resources Number 013 K/03/SJD/2019 concerning Metadata Standards for the Administration of Upstream Oil and Gas Data, the Well data are as follow:

 

Table 1

Well Data

1.      Well data

 

1.1   Well Summary

Areas, wells, business associate licenses and authorizations, facilities, stratigraphy, coordinate systems.

2.      Well Logs

2.1   Print Well Log

Areas, wells, business associate licenses and authorizations, records product and information management

2.2   Digital Image Well Log

Areas, wells, business associate licenses and authorizations, records product and information management

2.3   Digital Well Log

Areas, wells, business associate licenses and authorizations, records product and information management

3.      Well Report

3.1   Print Well Report

Areas, wells, business associate licenses and authorizations, facilities, records product and information management

3.2   Digital Image Well Report

Areas, wells, business associate licenses and authorizations, facilities, records product and information management

3.3   Digital Well Report

Areas, wells, business associate licenses and authorizations, facilities, records product and information management

4.      Well Seismic Profile

4.1   Well Seismic Profile Digital

Areas, business associate licenses and authorizations, wells, seismic, records product and information management

4.2   Well Seismic Profile Dara Stored in Media

Areas, business associate licenses and authorizations, wells, seismic, records product and information management

 

2)  Mapping data the PPDM Standard

This activity is to map data types from data with data standards to PPDM data standards so that the level of compliance with PPDM open data standards can be known as required by applicable regulations. The steps are taken in mapping this data are as follows:

�     PPDM-Mapping Table based on regulation

�     Making PPDM View based on Mapping

�     Migration of data from PPDM staging to PPDM scheme

3)  PPDM Data Mapping

Based on the Decree of the Ministry of Energy and Mineral Resources regarding the Metadata Catalogue Standard for Oil and Gas and assessment data available in SDMS, a data mapping of data types between PPDM is made as follows:

1.   Basin

2.   Working Area

3.   Field Information

4.   2D Seismic Summary

5.   2D Seismic Field Digital Data

6.   2D Seismic Processed Data

7.   2D Seismic Field Digital

8.   2D Seismic Proc Digital

9.   2D Seismic Nav Digital

10.  3D Seismic Summary

11.  3D Seismic Field Digital Data

12.  3D Seismic Proc Digital Data

13.  3D Seismic Nav Digital

14.  Well Summary

15.  Digital Image Well Log

16.  Digital Well Log

17.  Digital Well Report

18.  Well Seismic Digital

19.  Well Samples

20.  Well Core Samples

21.  Digital Technical Report

 

Figure 1

Example of PPDM - data mapping

 

Then the creation of 16 data types in the SDMS master data to be mapped to PPDM is also carried out. Data Type this is a data type that is generally needed in SDMS. The 16 data types are as follows:

1.   Working Area

2.   Well Summary

3.   Borehole Summary

4.   Marker

5.   Log datafile

6.   Log Channel

7.   Deviation Survey

8.   Survey 2D

9.   Survey 3D

10.     Seismic Datafile

11.     Check shot Data

12.     Check shot Header

13.     Production Monthly

14.     Production Daily

15.     Perforation

16.     Document

 

Figure 2

Example of PPDM mapping data

 

4)  Oracle View

Based on the previous list of data types, 16 MDM VIEWs and 21 PPDM VIEWs were created in the XYZ_SDMS scheme as a data source from which later this data will be extracted from VIEW to PPDM Staging. The list of Oracle VIEWs created is as follows:

 

 

Figure 3

Oracle View

5)  Schema Database

There are 2 oracle schemas related to those created in the SDMS database, namely schema PPDM39 and PPDM Staging schemes.� The PPDM STAGING scheme is a scheme that functions as a temporary scheme. All required data from SDMS has been exported to this schema based on Oracle VIEW which have been made previously. The source of the schema data comes from the XYZ_SDMS schema.� If you see, this scheme is less than the number of VIEWs created in the past, this is because there are multiple views that represent the same data type to only 22 VIEW whose data is exported to 22 tables in PPDM Staging.

 

Figure 3

PPDM Stagging Schema

 

3.   Risk Assessment Vendor Lock Analysis In Subsurface Data Management And Its Impact On State Data Sovereignty

Results According to the assessment, the use of subsurface data management software might result in vendor-locks, which has a negative impact on state data security. This is then examined using a risk matrix by distributing questionnaires to 12 experts with more than ten years of experience in the oil and gas business. 91.7 percent of the experts who completed the poll agreed that there was a potential vendor lock on the usage of subsurface data management software, while 8.3 percent disagreed.

Figure 5

The Number Of Experts Who Stated That There Is A

Potential Vendor Lock On The Subsurface Data Management System

 

Question �In your opinion, is there a potential vendor lock in the use of subsurface data management software?�

As shown on Figure 5, the risk analysis is performed on the potential dangers that may arise if the software that potentially cause this vendor-lock is continued to be utilized by the 91.7 percent of experts who concur that there is a potential vendor lock. Risk analysis is determined using the findings of the key person's (expert's) rationale based on the risk rating value (risk rating). The results of the mapping (risk map) produce a risk rating of each critical factor (Figure 5).

 

a.   Risk Assessment � Data Sovereignty

Figure 6 shows that the risk factor that has the highest risk rating value of 25 (extreme) and must be stopped, where the possibility of occurrence is very high and has a very dangerous impact on the country's data sovereignty. This extreme or very high occurs in scenarios of potential theft of state secret data and information. This means that this function must be a major concern, because it is included in a very high risk. For the scenario of a country that does not have full power over data access, having a risk rating of 20 (very high) is a condition that must receive serious attention, where in practice the database is fully owned by the state but in terms of data access, the state does not have the flexibility to choose applications because The database uses a standard data model that is not common (closed) which can only use certain applications. Meanwhile for the third scenario, namely the disruption of state data availability, it has a risk rating of 12 which has a probability of occurring, but the impact is quite risky, this also needs attention because as the impact of this vendor lock, data availability will be disrupted.

 

Figure 4

Risk Assessment � Data Sovereignty

 

Remarks:

Disruption of availability of state data = Disruption of state data availability Potential for theft of state secret data and information = There is a potential for theft of state data and information confidentiality Does not have full power over data access = Do not have full access to state data This potential vendor lock does not only threaten the sovereignty of state data but can threaten the operations of domestic companies operating in the same industry, therefore a risk analysis is carried out on the potential risks for the company's operations as follows.

 

b.  Risk Assessment � Company Operations

Figure 7 shows that the highest risk rating value of 20 (very high) occurs in the scenario of State Dependence on certain vendors due to Limited and inflexible software selection. This means that this function must be a major concern, because it is included in the very high risk if the use of this software continues. For the next scenario, namely the company's low bargain positioning against vendors and the high cost of migration between vendors, having a risk rating of 16 (very high risk) is in a condition that must be given serious attention, where the company's inability to bargain with vendors is crucial and the high cost of migration that must be used. According to the experts, these four scenarios have a high probability of happening and have an impact that is difficult for the company to handle.

 

Figure 7

�Risk Assessment � Company Operations

Remarks:

Adanya ketergantungan terhadap vendor tertentu = There is dependence on certain vendors Adanya keterbatasan dan flexibilitas dalam pemilihan software = There are limitations and flexibility in software selection Rendahnya daya tawar terhadap vendor = low bargaining power against vendors Mahalnya biaya migrasi = The high cost of migration.

From the results of the risk analysis using the risk matrix above, a new risk matrix can be created to see how much impact it will have if a vendor lock occurs on the use of subsurface data management software in the Oil and Gas Industry in Indonesia.

c.   Risk Assessment of Vendor Lock Potential

Figure 8 shows that vendor-lock clearly threatens state data sovereignty and has the highest risk rating value of 18.78 (very high risk). As for the risk to the company's operations, it has a value that is not much different from the risk value of 18 (very high risk). Therefore, from the results of the risk assessment, it can be seen that the use of software that has the potential for vendor lock must be stopped and anticipated from the start.

 

Figure 5 �

Risk Assessment of Vendor Lock Potential

 

4.   Validation

This thesis validation is divided into two sections. The first is a Focus Group Discussion (FGD) aimed at the XYZ Organization staff. The goal of this FGD is to collect feedback on risk assessments model and analysing the validate the likelihood of threats found through threat modelling. The second validation step is to conduct interviews with practitioner participants to solicit recommendations and comments on the study thesis model, specifically risk assessment.

�     Based on the results of the FGD conducted with the IT team, Bapak Virgo Eka Hartanto, Bapak Adhi Setiawan, and Ibu Tamara Nurila, the following conclusions were obtained:

a)   The potential for a vendor lock to occur is very possible and has actually occurred, therefore it is necessary to take a preventive measure in accordance with the regulations

b)  The risk from the risk matrix is a bit exaggerated, but it is true that the existence of a vendor lock can threaten the sovereignty of state data.

c)   The Indonesian government, through the Ministry of Energy and Mineral Resources, has issued regulations regarding the prohibition of vendor locks and requires the use of open international PPDM standards to avoid the use of closed data standards that lead to vendor locks.

�     Based on the interview results with Ibu Mazlina Khalid, the following conclusions were obtained:

a)   Vendor lock causes data to be managed in silos so that if business units do not communicate on the same platform or standard, it will be difficult to identify trusted data sources to analyse and report across business units that benefit the organization as a whole.

b)  The main benefit of an open standards data platform is that it supports integration between different service providers, business areas through common supported formats, data workflows, references and technologies.

c)   The only problem is for legacy app providers as it will be costly and time consuming to implement this standard.

�     Based on the interview results with Kok Mun Ho, the following conclusions were obtained:

a)   Vendor locks are common in IT and not just in the oil and gas industry

b)  For open standard subsurface management, apart from PPDM which works on on-premise, there is a more popular one, namely cloud-based OSDU.

�     Based on the interview results with Bapak Robert Siahaan, the following conclusions were obtained:

a)   The effect of vendor lock on data sovereignty is in the limited access to the data we have this is because the dependence on the applicable standards is not common.

b)  For now, Open standards can be used as a solution to avoid vendor locks, one of which is PPDM, but other solutions need to be explored further, such as the OSDU open-source cloud community.

 

Conclusion

Based on the results of the research on mapping data to PPDM data standards, it is known that data migration with standard cannot necessarily be directly mapped between tables to PPDM standards. The first thing to do is create a staging area by creating an oracle view database. Then the staging area is mapped to the PPDM table.

The standard data used in the SDMS application currently can only be accessed using the application. The PPDM open data standard as required by the ESDM ministerial regulation. Thus, it can be concluded that with data standards has the potential for vendor lock.

Refer to the risk analysis, the Vendor Lock poses a threat risk to the availability of oil and gas data and a risk of compliance with regulations attached to oil and gas data processing so the vendor lock has the potential to disrupt state data sovereignty due to access and control of data processing only depends on certain vendors.� The international open data standards for subsurface data processing can prevent vendor lock as it supports integration and interoperability between disparate service providers with the use of a common standard data model.

 

 

 

 

 

 

BIBLIOGRAFI

 

Abu-Libdeh, Hussam, Princehouse, Lonnie, & Weatherspoon, Hakim. (2010). RACS: a case for cloud storage diversity. Proceedings of the 1st ACM Symposium on Cloud Computing, 229�240. Google Scholar

 

Ahlgren, Bengt, Hidell, Markus, & Ngai, Edith C. H. (2016). Internet of things for smart cities: Interoperability and open data. IEEE Internet Computing, 20(6), 52�56. Google Scholar

 

Barrera-Rey, Fernando. (1997). The benefits of information sharing in petroleum exploration: an R&D; approach to the study of the United Kingdom continental shelf. Oxford Institute for Energy Studies. Google Scholar

 

Dillon, Tharam, Wu, Chen, & Chang, Elizabeth. (2010). Cloud computing: issues and challenges. 2010 24th IEEE International Conference on Advanced Information Networking and Applications, 27�33. Ieee. Google Scholar

 

Ge, Mouzhi, & Helfert, Markus. (2008). Data and information quality assessment in information manufacturing systems. International Conference on Business Information Systems, 380�389. Springer. Google Scholar

 

Khan, Faisal I., Amyotte, Paul R., & Amin, Md Tanjin. (2020). Advanced methods of risk assessment and management: An overview. Methods in Chemical Process Safety, 4, 1�34. Google Scholar

 

Kozman, J. B. (2013). Developing Information Management Competency for Oil and Gas Operations. SPE Asia Pacific Oil and Gas Conference and Exhibition. OnePetro. Google Scholar

 

Oktaviani, Anggi, Siregar, Jannes Parulian, Sarkawi, Dahlia, & Novianti, Deny. (2020). Implementation Of Profile Matching Method In Assessment Of Employee Performance In Directorate General Of Oil And Gas. Jurnal Riset Informatika, 2(2), 83�90. Google Scholar

 

Opara-Martins, Justice, Sahandi, Reza, & Tian, Feng. (2016). Critical analysis of vendor lock-in and its impact on cloud computing migration: a business perspective. Journal of Cloud Computing, 5(1), 1�18. Google Scholar

 

Umam, Mukhamad Faeshol, Nugraha, Husin Setia, & Fathoni, Ahmad. (2019). The Geothermal Capacity-Building Initiatives by The Ministry of Energy and Mineral Resources. PROCEEDINGS, The 7th Indonesia International Geothermal Convention & Exhibition (IIGCE). Google Scholar

 

 

 

 

 

Copyright holder:

Zulfikar, Mohammad Achmad Amin Soetomo, Soebowo Musa (2022)

 

First publication right:

Syntax Literate: Jurnal Ilmiah Indonesia

 

This article is licensed under: