Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 4 dokumen yang sesuai dengan query
cover
Herry Prabowo
"[ABSTRAK
Keberhasilan dalam memberikan layanan informasi dapat memberikan dampak positif bagi organisasi dan masyarakat secara umum Dengan demikian investasi yang telah dilakukan oleh RSAB Harapan Kita dalam implementasi TI seharusnya sejalan dengan tujuan organisasi dan sesuai dengan harapan stakeholders RSAB Harapan Kita sudah memiliki tata kelola TI namum masih belum optimal harusnya dengan tata kelola TI ini RSAB bisa memenuhi harapan stakeholders Agar bisa mencapai harapan itu kita harus mengevaluasinya Penelitian ini bertujuan untuk mengevaluasi tata kelola TI di RSAB Harapan Kita dengan menggunakan COBIT 5 Langkah yang dilakukan adalah wawancara yang kemudian dipetakan pada proses cobit Dari beberapa sumber didapatlah permasalahan organisasi terkait tata kelola teknologi informasi lalu dipetakan ke proses cobit yang ada Dari pemetaan tersebut kemudian peneliti membuat kuisioner untuk mengukur tingkat kapabilitas kondisi saat ini dan target dari setiap permasalahan yang ada Kemudian peneliti membuat rekomendasi yang diberikan untuk menutupi gap tersebut berdasarkan kapabilitas dan usulan tata kelola yang dihasilkan berupa rancangan tata kelola TI yang perlu diterapkan pada masing masing proses TI Kata kunci Evaluasi Tata kelola TI COBIT 5 Kapabilitas ABSTRACT
Success in providing information services can provide a positive impact for organizations and society in general Thus investments made by RSAB Harapan Kita in IT implementation should in line with organizational objectives and in accordance with the expectations of stakeholders RSAB Hope We already have IT governance yet still not optimal should the IT governance is RSAB can meet the expectations of stakeholders In order to achieve that hope we have to evaluate this study aims to evaluate the IT governance in RSAB Harapan Kita using COBIT 5 Steps taken is the interview which is then mapped to the COBIT processes From several sources obtained organizational problems related information technology governance and mapped to existing COBIT processes From mapping is then researchers made a questionnaire to measure the level of capability of the current state and the target of any existing problems Then the researchers make recommendations provided to cover these gaps based capabilities and governance proposals that produced a draft of IT governance that need to be applied to each IT process Keywords Evaluation IT Governance COBIT 5 Capability;Success in providing information services can provide a positive impact for organizations and society in general Thus investments made by RSAB Harapan Kita in IT implementation should in line with organizational objectives and in accordance with the expectations of stakeholders RSAB Hope We already have IT governance yet still not optimal should the IT governance is RSAB can meet the expectations of stakeholders In order to achieve that hope we have to evaluate this study aims to evaluate the IT governance in RSAB Harapan Kita using COBIT 5 Steps taken is the interview which is then mapped to the COBIT processes From several sources obtained organizational problems related information technology governance and mapped to existing COBIT processes From mapping is then researchers made a questionnaire to measure the level of capability of the current state and the target of any existing problems Then the researchers make recommendations provided to cover these gaps based capabilities and governance proposals that produced a draft of IT governance that need to be applied to each IT process Keywords Evaluation IT Governance COBIT 5 Capability, Success in providing information services can provide a positive impact for organizations and society in general Thus investments made by RSAB Harapan Kita in IT implementation should in line with organizational objectives and in accordance with the expectations of stakeholders RSAB Hope We already have IT governance yet still not optimal should the IT governance is RSAB can meet the expectations of stakeholders In order to achieve that hope we have to evaluate this study aims to evaluate the IT governance in RSAB Harapan Kita using COBIT 5 Steps taken is the interview which is then mapped to the COBIT processes From several sources obtained organizational problems related information technology governance and mapped to existing COBIT processes From mapping is then researchers made a questionnaire to measure the level of capability of the current state and the target of any existing problems Then the researchers make recommendations provided to cover these gaps based capabilities and governance proposals that produced a draft of IT governance that need to be applied to each IT process Keywords Evaluation IT Governance COBIT 5 Capability]"
Fakultas Ilmu Komputer Universitas Indonesia, 2015
TA-PDF
UI - Tugas Akhir  Universitas Indonesia Library
cover
Artitis Undari
"Skripsi ini membahas tentang kesesuaian antara perencanaan dengan pelaksanaan pada Proyek digitalisasi Perpustakaan Fakultas Ilmu Pengetahuan Budaya, bagaimana kondisi infrastruktur serta Sumber Daya Manusianya. Penelitian ini adalah penelitian kualitatif dengan pendekatan studi kasus. Data-data yang dikumpulkan dianalisis dengan menggunakan teori tentang: aktivitas standar yang ada pada proyek digitalisasi, faktor-aktor yang harus diperhatikan dalam menilai sebuah perencanaan proyek, serta teori tentang parameter keberhasilan sebuah proyek. Hasil dari penelitian ini menunjukkan bahwa proyek Digitalisasi naskah dan skripsi tersebut telah berhasil dengan catatan khusus, serta menyarankan bahwa sebaiknya dilakukan perbaikan di masa mendatang.

Abstract
The Focus of this study is about the compatibility of planning and execution in Project Digitization Thesis and Manuscripts from Library of Faculty of Humanities University of Indonesia. This research is using the qualitative methods and case study approach. The data were analyzed using the theory of: Standard activity of Digitization Project, factors in assesing the project planning, and parameters of project. The result of this research shows that this project has success with specifically note, and researcher suggests that this library should improve this project in the future."
Depok: Fakultas Ilmu Pengetahuan dan Budaya Universitas Indonesia, 2009
S15245
UI - Skripsi Open  Universitas Indonesia Library
cover
Henczel, Susan
Munchen: Saur Verlag, 2001
025.52 HEN i
Buku Teks SO  Universitas Indonesia Library
cover
Dion Kristadi Leksono
"ABSTRAK
Perkembangan teknologi IPv6 mengalami peningkatan yang signifikan, terutama dengan semakin dekatnya era Internet of Things atau biasa disebut IOT. Seiring dengan proses peralihan dari versi 4 ke versi 6, terdapat celah keamanan yang rawan khususnya terhadap serangan maya yang memberi ancaman kepada perusahaan yang melakukan implementasi topologi jaringan IPv6.
Tujuan dari penelitian ini adalah membuat model penerimaan terhadap faktor yang berpengaruh pada perilaku individu dalam melakukan pengamanan pada topologi jaringan IPv6 dan melakukan analisis terhadap faktor-faktor yang mempengaruhi penerimaan individu dalam melakukan antisipasi keamanan pada topologi jaringan IPv6.
Penelitian ini dilakukan menggunakan metode kuantitatif menitikberatkan pada pengolahan statistik dengan teknik Structural Equation Modeling (SEM) terhadap hasil pengisian kuisioner oleh responden serta metode kualitatif dengan melakukan Focus Group Discussion (FGD) dan wawancara narasumber yang berlatar belakang praktisi, akademisi maupun perwakilan pemerintah.
Hasil penelitian menunjukkan bahwa pemahaman terhadap kelebihan-kelebihan IPv6 kepada pengguna maupun pengelola jaringan adalah prioritas pertama yang harus dilakukan dalam mendorong tindakan antisipasi keamanan pada topologi jaringan IPv6.

ABSTRACT
The evolution of IPv6 technology has become a worldwide trend and showed a significant increase, particularly with the near-coming era named Internet of Things or so-called IOT. Concomitant with the transition process from version 4 to version 6, there are open security hole that considered to be vulnerable, mainly against cyber attacks that poses a threat to companies implements IPv6 network topology.
The purpose of this research is to create a model of acceptance of the factors that influenced the behavior of individuals in providing security within IPv6 network topology and analysis of factors that affects the acceptance of individuals in anticipating security with regards to IPv6 network topology.
This study was conducted using both, quantitative method focuses on statistical processing on the result of questionnaire filled by respondents using Structural Equation Modeling (SEM), as well as qualitative method to conduct Focus Group Discussion (FGD) and interviews with various background such as: practitioners, academics and government representatives.
The results showed that the understanding of the advantages of IPv6 to the users or the network administrator is the first priority should be done in regards to encourage behavior of security anticipation on IPv6 network topology"
2016
TA-Pdf
UI - Tugas Akhir  Universitas Indonesia Library