Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 32183 dokumen yang sesuai dengan query
cover
cover
Buana Jaya
"ABSTRAK
Seiring dengan berkembangnya sistem komputer yang terhubung melalui jaringan internet dan semakin meningkatnya individu maupun organisasi yang memiliki ketergantungan untuk mendapatkan informasi dan melakukan komunikasi melalui internet, menjadikan isu sekuriti sebagai hal yang perlu mendapatkan perhatian khusus. Salah satu pemanfaatan internet adalah e-commerce yang secara luas digunakan untuk menggantikan model perdagangan tradisional saat ini.
Dalam e-commerce dibutuhkan jaminan akan kerahasiaan informasi yang dikirimkan (confidentiality), keutuhan dan keaslian informasi (integrity), keabsahan pengiriman informasi (authentication) dan pengakuan terhadap informasi yang dikirim sehingga tidak dapat disangkal (non repudiation) merupakan syarat mutlak yang harus dipenuhi.
Teknologi saat ini yang dapat memenuhi aspek sekuriti diatas adalah Infrastruktur Kunci Publik yang menggunakan sepasang kunci yaitu kunci pribadi (private key) dan kunci publik (public key) dalam melakukan proses enkripsi dan dekripsi suatu pesan (message). Kunci publik yang dimiliki dapat diketahui oleh setiap orang yang membutuhkan dalam jaringan komunikasi. Sedangkan kunci pribadi hanya diketahui dan disimpan oleh pemilik kunci itu sendiri.
PT. Telkom sebagai salah satu penyedia layanan jasa telekomunikasi di Indonesia berupaya menjadi pihak ketiga (third party) yang menjamin kebutuhan pengguna internet terhadap pertukaran informasi. Dengan membuat layanan yang disebut I-Trust untuk Infrastruktur Kunci Publik menjadikan PT. Telkom sebagai CA (Certification Authority) yang menandatangani secara elektronik sertifikat digital. Untuk proses identifikasi dan otentifikasi terhadap subcriber (user) dari sertifikat digital yang diberikan wewenang oleh CA, PT. Telkom bekerja sarna dengan perusahaan atau organisasi menjadi Registration Authority (RA).
Pada penulisan tesis ini bertujuan untuk menerapkan infrastruktur kunci publik pada suatu perusahaan e-commerce (PT. X) sebagai Registration Authority (RA) untuk meningkatkan competitive advantage dan menciptakan entry barrier terhadap kompetitor dan dilakukan analisa kunci keberhasilan penerapan infrastruktur kunci publik.
Untuk analisa sistem sekuriti jaringan menggunakan tahapan yang ada pada Security Policy Development Life Cycle (SPDLC) dan untuk analisa kondisi eksternal perusahaan dilakukan menggunakan Competitive Force Model (Porter).

ABSTRACT
The explosive growth in computer systems and their interconnections via internet has increased the dependence of both organizations and individuals of the information stored and communicated using this system. This in turn has led to a heightened awareness of the security issue. E-commerce is one of the most popular business model using the internet infrastructure.
In e-commerce, the widespread use of this systems, need more assurance to ensure only intended recipient are able to read the information (confidentiality), to guarantee the information was not altered during transmission (integrity), to validate the information by sender (authenticity), and to prevent the sender from denying involvement in that information (non- repudiation).
One of the technology that can fulfill all of security requirements mentioned above is Public Key Infrastructure that using a pair of key, public key and private key. These keys are used in encryption and decryption process of a massage. Anything encoded with one key can only be decoded by it's counterpart. Each user keeps one key secret and publishes the other.
PT Telkom as one of the telecommunication provider in Indonesia, is trying to become the third party to ensure this information exchange by deploying the I-TRUST service for Public Key Infrastructure. This has made PT Telkom as CA (Certification Authority) whose signed digital certificate electronically. PT Telkom as CA, has to coordinate with other party as its Registration Authority (RA) to do the identification and authentication of the subscriber's digital certificate.
The objective of this thesis is to show the implementation of public key infrastructure on an e-commerce company as Registration Authority (RA) to improve it's competitive advantage and create entry barrier to it's competitor, and analyze the key success of implementation of public key infrastructure.
Security Policy Development Life Cycle method is used to analyze network security system and Competitive Force Model (Porter) is used to analyze external condition of the company."
Jakarta: Fakultas Ilmu Komputer Universitas Indonesia, 2002
T40357
UI - Tesis Membership  Universitas Indonesia Library
cover
Jamalipour, Abbas
"A significant and convenient approach to detection and analysis of biological, environmental and agricultural items is the harnessing of features in widely available smartphones to create field-deployable scientific instruments, allowing measurements to be made onsite and in real-time. This book will cover a number of self-contained smartphone instruments with the particular focus on spectroscopic-based measurements. Measurement and analysis on precision of such low-cost instrumentations are provided to compare with more expensive commercial equipment.
This book also discusses some limitations, possible recommendations and scopes for further instrumentations using smartphones and other smart devices. Particularly, the opportunity to integrate the devices into the global Internet-of-Things (IoT) platform will be discussed.
Researchers and instrumentation designers in optical and photonic sensing, smart and IoT-based sensing, biological and environmental analysts, agricultural, and food quality researchers (and public health authorities) will find this book useful as reference. Students in science and engineering disciplines for teaching and educational purposes will also find this book useful as a secondary textbook."
Switzerland: Springer Cham, 2019
e20502883
eBooks  Universitas Indonesia Library
cover
Ghina Yustika Adinegara
"Perkembangan teknologi internet telah menggeser lingkup media. Seiring dengan kemudahan mengakses internet dan media sosial melalui handphone dan website, terbuka membawa lebih banyak kesempatan bagi audiens untuk lebih sering mengonsumsi berita. Karena itu, konvergensi media secara bertahap dapat membawa dampak bagi jurnalisme. Faktor-faktor seperti perubahan di ruang berita, konsumsi media yang lebih tinggi, dan konvergensi media dapat mengarah pada proses churnalisme. Dengan mengakui kurangnya pengetahuan mengenai dampak dari churnalisme di Indonesia, penelitian ini akan mencoba untuk membahas pengaruh churnalisme terhadap berita online di Indonesia dan relevansinya dengan pengaruh situs microblogging seperti Twitter. Penelitian ini bertujuan untuk membahas lebih lanjut mengenai kasus Justice for Audrey yang merupakan salah satu kasus fenomenal dari disinformasi.

The development of technology has shifted the media landscape. As the internet and social media could be accessed through mobile and laptop screens, it brings more opportunities for the audience to consume news more often. Therefore, the media convergence gradually brings the impact on journalism. Factors such as increasing media consumption and citizen journalism has led to the churning process. Considering the effects of churnalism have not been identified as a topic matter in Indonesia, this paper will attempt to discuss the influence of churnalism on online news in Indonesia and it relevance on the influence of microblogging sites such as Twitter. This paper aims to investigate further Justice for Audrey, as one of the phenomenal misleading information.
"
Depok: Fakultas Ilmu Sosial dan Ilmu Politik Universitas Indonesia, 2020
MK-Pdf
UI - Makalah dan Kertas Kerja  Universitas Indonesia Library
cover
Gao, Yue
"This SpringerBrief discusses the applications of spare representation in wireless communications, with a particular focus on the most recent developed compressive sensing (CS) enabled approaches. With the help of sparsity property, sub-Nyquist sampling can be achieved in wideband cognitive radio networks by adopting compressive sensing, which is illustrated in this brief, and it starts with a comprehensive overview of compressive sensing principles. Subsequently, the authors present a complete framework for data-driven compressive spectrum sensing in cognitive radio networks, which guarantees robustness, low-complexity, and security.
Particularly, robust compressive spectrum sensing, low-complexity compressive spectrum sensing, and secure compressive sensing based malicious user detection are proposed to address the various issues in wideband cognitive radio networks. Correspondingly, the real-world signals and data collected by experiments carried out during TV white space pilot trial enables data-driven compressive spectrum sensing. The collected data are analysed and used to verify our designs and provide significant insights on the potential of applying compressive sensing to wideband spectrum sensing.
This SpringerBrief provides readers a clear picture on how to exploit the compressive sensing to process wireless signals in wideband cognitive radio networks. Students, professors, researchers, scientists, practitioners, and engineers working in the fields of compressive sensing in wireless communications will find this SpringerBrief very useful as a short reference or study guide book. Industry managers, and government research agency employees also working in the fields of compressive sensing in wireless communications will find this SpringerBrief useful as well."
Switzerland: Springer Cham, 2019
e20502870
eBooks  Universitas Indonesia Library
cover
Gui, Guan
"This SpringerBrief introduces the basics of wireless powered communication networks (WPCNs). In particular, the background and concept of WPCNs are briefly discussed. Moreover, this brief provides an extensive study of the recent developments in this area from an optimization perspective. Wireless powered communication network (WPCN) is a new network paradigm for IoT, where wireless devices (WDs) are powered by radio frequency (RF) based wireless power transfer (WPT) to eliminate the need for recharging or replacing the batteries manually and to prolong their lifetime.In this context, the brief also discusses some optimization problems for state-of-the-art scenarios of wireless powered communication networks.
The target audiences for this SpringerBrief are researchers, engineers, and undergraduate and graduate-level students, who are studying or working in wireless powered communication networks and its performance optimization."
Switzerland: Springer Cham, 2019
e20502878
eBooks  Universitas Indonesia Library
cover
Brehmer, Johannes
"This monograph develops a framework for modeling and solving utility maximization problems in nonconvex wireless systems. The first part develops a model for utility optimization in wireless systems. The model is general enough to encompass a wide array of system configurations and performance objectives. Based on the general model, a set of methods for solving utility maximization problems is developed in the second part of the book. The development is based on a careful examination of the properties that are required for the application of each method. This part focuses on problems whose initial formulation does not allow for a solution by standard methods and discusses alternative approaches. The last part presents two case studies to demonstrate the application of the proposed framework. In both cases, utility maximization in multi-antenna broadcast channels is investigated."
Berlin: [, Springer], 2012
e20418198
eBooks  Universitas Indonesia Library
cover
"The Handbook of Antenna Technologies aims to present the rapid development of antenna technologies, particularly in the past two decades, and also showcasing the newly developed technologies and the latest applications. The handbook will provide readers with the comprehensive updated reference information covering theory, modeling and optimization methods, design and measurement, new electromagnetic materials, and applications of antennas. The handbook will widely cover not only all key antenna design issues but also fundamentals, issues related to antennas (transmission, propagation, feeding structure, materials, fabrication, measurement, system, and unique design challenges in specific applications). This handbook will benefit the readers as a full and quick technical reference with a high-level historic review of technology, detailed technical descriptions and the latest practical applications."
Singapore: Springer Singapore, 2019
e20510221
eBooks  Universitas Indonesia Library
cover
"Wireless networking technologies are witnessed to become the integral part of industry, business, entertainment and daily life. Encyclopedia of Wireless Networks is expected to provide comprehensive references to key concepts of wireless networks, including research results of historical significance, areas of current interests, and growing directions in the future wireless networks. It can serve as a valuable and authoritative literature for students, researchers, engineers, and practitioners who need a quick reference to the subjects of wireless network technology and its relevant applications. "
Switzerland: Springer Cham, 2019
e20503330
eBooks  Universitas Indonesia Library
cover
Firmansyah
"ABSTRAK
Penelitian ini bertujuan untuk menjelaskan konsep knowledge sharing dalam jaringan komunikasi yang dilakukan oleh organisasi, dalam meningkatkan kapasitas pengetahuan tacit dan explicit para anggotanya guna kesiapan menghadapi kemajuan teknologi informasi dan komunikasi. Objek penelitian ini adalah Iprahumas, yaitu organisasi profesi yang menaungi dan hanya beranggotakan pranata humas di seluruh Indonesia. Iprahumas merupakan mitra kerja Kementerian Komunikasi dan Informatika sebagai instansi Pembina Jabatan Fungsional Pranata Humas di Indonesia. Iprahumas mempunyai peran yang strategis dalam mendukung tugas dan fungsi profesi pranata humas untuk melakukan pelayanan informasi dan kehumasan pemerintah. Sebaran anggota Iprahumas di seluruh Indonesia juga menjadi pendukung dalam diseminasi narasi tunggal maupun membangun partisipasi publik. Penelitian ini menggunakan teori-teori yang menjelaskan konsep knowledge sharing dan teori jaringan komunikasi. Penelitian ini menggunakan paradigma post-positivist dengan pendekatan penelitian campuran (mix method) dimana kualitatif sebagai metode utama. Teknik pengumpulan data didapatkan melalui wawancara mendalam, observasi, kuesioner, dan studi literatur. Hasil penelitian menunjukkan bahwa dari efektivitas pengelolaan aktivitas knowledge sharing yang sudah dilaksanakan oleh Iprahumas, penerapan identity, reflect, share, dan apply belum dilakukan secara maksimal. Begitu pula dengan bentuk jaringan komunikasi anggota Iprahumas dalam efektivitas organisasi knowledge sharing. Dari jaringan komunikasi yang diteliti, mayoritas hubungan ikatan yang terjadi dalam jaringan komunikasi anggota Iprahumas bersifat satu arah. Jaringan komunikasi aktivitas knowledge sharing terkait tema umum maupun tema-tema knowledge sharing existing di Iprahumas cenderung tidak menyebar dan dapat berdampak pada kurang efektifnya penyebaran pengetahuan yang merata antar anggota.

ABSTRACT
This study aims to explain the concept of knowledge sharing in communication networks carried out by organizations, in increasing the tacit and explicit knowledge capacity of its members for readiness to face the advancement of information and communication technology. The object of this research is Iprahumas, which is a professional association that houses and only consists of public relations institutions throughout Indonesia. Iprahumas is a working partner of the Ministry of Communication and Informatics as a Public Relations Institution Position Trustee agency in Indonesia. Iprahumas has a strategic role in supporting the duties and functions of the public relations institution profession to provide information and public relations services to the government. The distribution of members of Iprahumas throughout Indonesia has also become a supporter in the dissemination of a single narrative and in building public participation. This study uses theories that explain the concept of knowledge sharing and communication network theory. This study uses a post-positivist paradigm with a mixed research approach where qualitative is the main method. Data collection techniques were obtained through in-depth interviews, observation, questionnaires, and literature studies. The results showed that from the effectiveness of the management of knowledge sharing activities that have been carried out by Iprahumas, the application of identity, reflect, share and apply has not been done to the fullest. This is also the case with the communication network of Iprahumas members in the effectiveness of knowledge sharing organizations. From the communication network under study, the majority of the bond relationships that occur in the Iprahumas member communication network are one-way. The communication network of knowledge sharing activities related to common themes and existing knowledge sharing themes at Iprahumas tends not to spread and can have an impact on the ineffectiveness of knowledge sharing that is evenly distributed among members."
Depok: Fakultas Ilmu Sosial dan Ilmu Politik Universitas Indonesia, 2020
T-Pdf
UI - Tesis Membership  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>