Ditemukan 26978 dokumen yang sesuai dengan query
"The book shows a way of providing more refined methods of information flow control that allow for granting access to information or resources by taking in consideration the former or further information flow in a business process requesting this access. The methods proposed are comparatively easy to apply and have been proven to be largely machine-executable by a prototypical realisation. As an addition, the methods are extended to be also applicable to BPEL-defined workflows that make use of grid services or cloud services."
Dordrecht, Netherlands: Springer, 2012
e20406903
eBooks Universitas Indonesia Library
Eisenschitz, Tamara S.
London: Library Association Publishing, 1993
025.523 EIS i
Buku Teks Universitas Indonesia Library
Putri Fauziah Romadhona
"Sebagai salah satu perusahaan yang bergerak di bidang teknologi, bisnis dari PT XYZ sangat bergantung pada teknologi dan keamanan informasi. Dalam mengamankan informasi, data, dan aset penting perusahaan, PT XYZ menerapkan pengamanan fisik yaitu Physical Access Control System (PACS). Sistem ini diimplementasi untuk melindungi bisnis dan aset perusahaan dari vandalisme, pencurian, dan pelanggaran, khususnya membatasi akses ke fasilitas organisasi yang memerlukan tingkat keamanan dan perlindungan yang lebih tinggi. Namun tingginya kasus insiden yang terjadi pada PACS menjadi kekhawatiran pihak manajemen perusahaan. Padahal tingkat ketergantungan organisasi terhadap keamanan fisik terutama pada PACS sangat tinggi. Insiden-insiden terkait PACS dengan sumber ancaman yang sama kerap terjadi berulang kali tanpa ada pemantauan yang memadai. Maka dari itu, penelitian ini bertujuan untuk melakukan evaluasi manajemen risiko terhadap Physical Access Control System PT XYZ. Pada penelitian ini digunakan beberapa seri standar ISO/IEC 27000 yang dapat membantu penelitian dalam menganalisis risiko dan melengkapi proses dalam mengevaluasi manajemen risiko di organisasi. Standar yang digunakan antara lain ISO/IEC 27001, ISO/IEC 27002, dan ISO/IEC 27005. Penelitian ini merupakan penelitian kualitatif dengan metode pengumpulan data secara studi literatur, dokumen, wawancara, observasi dan Focus Group Discussion. Hasil yang diperoleh dari penelitian ini adalah profil risiko dari PACS dengan total 54 skenario risiko keamanan informasi yang terdiri dari 44 skenario yang tidak diterima, dan 10 skenario risiko diterima. Adapun manfaat dari penelitian ini adalah dihasilkannya rekomendasi penanganan risiko keamanan informasi berdasarkan hasil evaluasi risiko keamanan informasi yang mengacu pada rekomendasi kontrol berdasarkan ISO/IEC 27002 dan diimplementasikan dalam bentuk dokumen Statement of Applicability (SoA).
As a technology company, the business of PT XYZ is highly dependent on technology and information security. In securing information, data, and important company assets, PT XYZ applies a physical security system, namely the Physical Access Control System (PACS). This system is implemented to protect the company’s business and assets from vandalism, theft, and breaches, specifically by restricting access to organizational facilities that require a higher level of security and protection. However, the high occurrence of incidences in PACS is a concern for company management, due to the organization's high level of dependence on physical security, especially PACS. Incidents related to PACS with the same source of threat often occur repeatedly without adequate monitoring. Therefore, this study aims to evaluate the risk management of PT XYZ's Physical Access Control System. In this research, several series of ISO/IEC 27000 standards are used to assist the study in analyzing risk and completing the process of risk management evaluation in organizations. The standards used include ISO/IEC 27001, ISO/IEC 27002, and ISO/IEC 27005. This research is qualitative research with data collection methods of literature studies, documents, interviews, observations, and Focus Group Discussions. The result of this study is the risk profile of PACS with a total of 54 information security risk scenarios consisting of 44 unacceptable scenarios and 10 acceptable risk scenarios. The benefit of this research is the production of recommendations for handling information security risks based on the results of the evaluation of information security risks that refer to control recommendations based on ISO/IEC 27002 and implemented in the form of a Statement of Applicability (SoA) document."
Jakarta: Fakultas Ilmu Komputer Universitas Indonesia, 2022
TA-pdf
UI - Tugas Akhir Universitas Indonesia Library
Barnett, Robert W.
Washington: Pergamon-Brasseys, 1984
355.033 052 BAR b
Buku Teks Universitas Indonesia Library
London: Westview Press, 1984
327.174 ARM
Buku Teks Universitas Indonesia Library
Calder, Alan
London: kogan page limited, 2005
005.8 CAL b (1)
Buku Teks Universitas Indonesia Library
Artikel Jurnal Universitas Indonesia Library
Ahern, Charles A.
"Firmly grounded in the principles of neuropsychology, Beyond individual differences analyzes both successful and unproductive learning in terms of the brain’s organizing processes, that is, its unconscious sifting, selecting, and meaning-making that enable students to incorporate and build on what they’ve learned in the past. At the same time, it explores the learning situations that cause organization to break down and offers several preventive strategies.
"
New York: Springer, 2011
e20395989
eBooks Universitas Indonesia Library
Stanford, CA: Walter H. Shorenstein Asia-Pacific Research Center ; Baltimore, MD : Brookings Institution [distributor, 2011
327.519 05 BEY
Buku Teks Universitas Indonesia Library
"Food is the main basic need of human, because of that fulfillment of human need of food has to be fulfilled. So it can fulfill that need, then government institution, Food Security Agency (BKP) is formed so it can monitor fulfillment of food need of society. The goals of this writing are to develop food security information system that provides dashboard facility based on business intelligence, to develop food security information system that can give fast, precise and real time information about food security, to develop decision-making support system for chairman in food security institution. Data is obtained from questionnaires to 51 respondents that are chairmen in Food Security Agency. Data is analyzed with SWOT analysis method for business environment and IT balanced scorecard (IT BSC) for IS/IT environment. The result of analysis of food security information system in Food Security Agency can help chairman in decision-making by presenting information about dashboard that gives fast, precise and real time information. It can be concluded that development of information is successfully done."
621 COMMIT 8 (1-2) 2014
Artikel Jurnal Universitas Indonesia Library