Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 7 dokumen yang sesuai dengan query
cover
Roqi Royyan
"Sistem Foreign Research Permit Online Application FRP OA merupakan sebuah sistem informasi yang digunakan untuk mempermudah Peneliti Asing dalam mengajukan izin penelitian di Kementerian Riset dan Teknologi sejak 4 Juli 2011 Namun sampai tahun 2013 masih banyak Peneliti Asing yang belum memanfaatkan sistem ini dan memilih mengirimkan berkasnya melalui surel faksimili maupun jasa kurir Penelitian ini dilakukan untuk mengetahui faktor faktor yang memengaruhi penggunaan kembali FRP OA oleh Peneliti Asing selaku pengguna sistem Model penelitian ini menggunakan kombinasi dari Expectation Confirmation Model ndash Information Technology ECM IT dan IS Success Model serta menambahkan variable interaction dan security privacy Data dikumpulkan dengan mengirim kuesioner ke smua pengguna FRP OA yang berjumlah 524 pengguna melalui media online Dari 524 keusioner yang dikirim penelitian ini mendapatkan sampel berjumlah 119 responden Data yang terkumpul kemudian diolah menggunakan Partial Least Square PLS Hasil penelitian ini menunjukkan bahwa kualitas informasi interaksi keamanan privasi serta kualitas sistem menjadi faktor yang memengaruhi digunakannya kembali FRP OA Dari hasil tersebut Bagian APP dapat fokus melakukan perbaikan FRP OA dengan mempertimbangkan keempat faktor yang memengaruhi Peneliti Asing dalam menggunakan kembali FRP OA.

Foreign Research Permit Online Application FRP OA is an information system utilized by the Ministry of Research and Technology to help foreign researchers to obtain research permit since July 4 2011 Unfortunately there were still many foreign researchers who did not utilize this system and prefer to send all of required documents by email facsimile or courier service in 2013 This research is focused to understand factors that affect the sustainability of the utilization of FRP OA by foreign researchers as end users The research used the combination of Expectation Confirmation Model Information Technology ECM IT IS Success Model and by adding interaction and security privacy variables Data collection was conducted by sending invitation to fill out questionnaire to all FRP OA rsquo s users with the amount of 524 users via online questionnaire This research acquired 119 responses from 524 questionnaires sent to the FRP OA rsquo s users The data collected were analyzed using Partial Least Square PLS The result of the research indicates that information quality interaction security privacy and system quality are factors that affect the continuity to use the FRP OA Based on these results the FRP Division could focus on improving the FRP OA by considering four factors that affect foreign researchers to continue using the FRP OA."
Depok: Fakultas Ilmu Sosial dan Ilmu Politik Universitas Indonesia, 2015
TA-pdf
UI - Tugas Akhir  Universitas Indonesia Library
cover
Insan Laksana Pribadi
"ABSTRAK
Internet of Things IoT merupakan salah satu teknologi yang sedang berkembang dimana memungkinkan setiap benda seperti alat kesehatan, mesin produksi, mobil, TV, benda lainnya dapat saling terhubung melalui internet. Namun, terdapat beberapa tantangan yang perlu menjadi perhatian semua pihak, salah satunya adalah potensi ancaman terhadap keamanan data dan privasi.Di Indonesia sendiri, sudah ada regulasi yang mengatur keamanan data dan transaksi elektronik. Regulasi tersebut antara lain PP No. 82 Tahun 2012, UU No. 11 Tahun 2008, dan Permen Kominfo No. 4 Tahun 2016. Namun ketiga regulasi tersebut tidak secara spesifik mengatur masalah keamanan data dan privasi pada layanan Internet of Things IoT . Sehingga di perlukan sebuah regulasi yang khusus mengatur masalah keamanan data dan privasi pada layanan IoT.Penelitian ini menggunakan metode Privacy Impact Assessment PIA dan mengambil salah satu domain IoT, yakni Smart Healthcare. Sebagai hasil dari penelitian, di dapat 5 faktor yang perlu di atur dalam regulasi terkait aspek keamanan data dan privasi pada layanan Internet of Things Smart Heathcare , yakni security compliance, device security, secure communication, virtualization security, dan application security. Untuk security compliance, di rekomendasikan untuk menerapkan sertifikasi ISO/TC 215 Health Informatics. Untuk aspek device security, direkomendasikan untuk menerapkan Trusted Computing Base TCB . Untuk aspek secure communication di haruskan menggunakan Virtual Private Network VPN . Untuk aspek virtualization security, di haruskan menerapkan beberapa mitigasi seperti provisioning, hardening, firewall, access control, dan IDPS. Dan untuk aspek application security, di haruskan untuk menerapkan beberapa mitigasi seperti secure programming, static code analysis, automated pentest, dan web application firewall.

ABSTRACT
Internet of Things IoT is one of the emerging technologies which allow any objects such as medical equipment, production machinery, cars, TVs, and other objects can be interconnected through the Internet. However, there are several challenges that need to be considerate of all parties, one of which is a potential threat to data security and privacy.In Indonesia, there are some existing regulations governing the security of data and electronic transactions. PP No. 82 Tahun 2012, UU No. 11 Tahun 2008, and Permen Kominfo No. 4 Tahun 2016 about Information Security Management System ISMS . However, these three regulations are not specifically control the issue of data security and privacy on the services of Internet of Things IoT . Thus, required a special regulation governing the data security and privacy on services of Internet of Things IoT .This research using Privacy Impact Assessment PIA methods and take one of the IoT domain, Smart Healthcare. As a result, there are 5 factors that need to be set in regulations related aspects of data security and privacy on the Internet of Things services Smart Heathcare security compliance, device security, secure communications, virtualization security, and application security. For security compliance, it 39 s recommended to apply ISO TC 215 Health Informatics. For the aspects of security devices, it is recommended to implement the Trusted Computing Base TCB . For secure communication aspects in required to use a Virtual Private Network VPN . For security aspects of virtualization, in required to apply some mitigation such as provisioning, hardening, firewalls, access control, and IDPS. And for aspects of application security, be required to implement some mitigation such as secure programming, static code analysis, automated pentest, and web application firewall."
2017
T46908
UI - Tesis Membership  Universitas Indonesia Library
cover
"This book features research work presented at the 2nd International Conference on Data Engineering and Communication Technology (ICDECT) held on December 15–16, 2017 at Symbiosis International University, Pune, Maharashtra, India. It discusses advanced, multi-disciplinary research into smart computing, information systems and electronic systems, focusing on innovation paradigms in system knowledge, intelligence and sustainability that can be applied to provide feasible solutions to varied problems in society, the environment and industry. It also addresses the deployment of emerging computational and knowledge transfer approaches, optimizing solutions in a variety of disciplines of computer science and electronics engineering."
Singapore: Springer Singapore, 2019
e20502820
eBooks  Universitas Indonesia Library
cover
Ejaz, Waleed
"This book introduces the concept of smart city as the potential solution to the challenges created by urbanization. The Internet of Things (IoT) offers novel features with minimum human intervention in smart cities. This book describes different components of Internet of Things (IoT) for smart cities including sensor technologies, communication technologies, big data analytics and security."
Switzerland: Springer Cham, 2019
e20502859
eBooks  Universitas Indonesia Library
cover
Danarto Tri Sasongko
"Penelitian terkait faktor-faktor yang memengaruhi penggunaan aplikasi uang elektronik masih didominasi oleh fase adopsi awal. Penelitian terhadap faktor-faktor yang memengaruhi kontinuitas penggunaan aplikasi uang elektronik terutama di Indonesia masih sedikit dan lebih banyak membahas tentang kinerja maupun kualitas aplikasi. Penelitian ini menggunakan kerangka kerja Expecation-Confirmation Model (ECM) untuk mengeksplorasi faktor Perceived Usefulness, Perceived Security & Privacy, Trust dan Satisfaction yang memengaruhi kontinuitas pengguna aplikasi uang elektronik. Selain itu, penelitian juga menyelidiki seberapa kuat pengaruh anteseden Perceived Security & Privacy, dan Trust yaitu Security Technology Protection, Security Rules & Policy, Security Responsibility Commitment, Coverage of Mobile Payment Context, dan Uncertainity Avoidance. Penelitian ini menggunakan pendekatan kuantitatif dengan sumber data berupa hasil survei yang dikumpulkan melalui kuesioner online dengan responden sebanyak 426 orang. Pengolahan data menggunakan metode Covariance- Based Structural Equation Modeling (CB-SEM) dengan bantuan aplikasi Amos 26.0. Hasil penelitian menunjukkan bahwa kontinuitas penggunaan aplikasi uang elektronik dipengaruhi secara kuat oleh Perceived Usefulness, Satisfaction dan Trust. Trust secara mayoritas dipengaruhi oleh Perceived Security & Privacy. Security Responsibility Commitment merupakan faktor penting yang harus ditingkatkan karena dapat memengaruhi Trust secara langsung maupun tidak langsung melalui Perceived Security & Privacy. Selain Security Responsibility Commitment, Perceived Security & Privacy juga dipengaruhi oleh Security Technology Protection dan Uncertainity Avoidance. Penelitian ini berkontribusi untuk meningkatkan pemahaman dan memberikan pedoman bagi peningkatan kontinuitas penggunaan aplikasi uang elektronik terutama di negara berkembang.

Researches related to the factors that influence the use of electronic money application are still dominated by the early adoption phase. Not many researches on the factors that affect the continuance use intention of electronic money in Indonesia, and mostly discusses only the performance and quality of applications. This study uses an Expecation-Confirmation Model (ECM) framework to explore the factors of Perceived Usefulness, Perceived Security & Privacy, Trust and Satisfaction that affect the continuance use intention of electronic money applications. In addition, this research also investigates how strong the antecedents of Perceived Security & Privacy and Trust namely Security Technology Protection, Security Rules & Policy, Security Responsibility Commitment, Coverage of Mobile Payment Context, and Uncertainity Avoidance. This study uses a quantitative approach with data sources are collected using online survey questionnaires with 426 respondents. Covariance-Based Structural Equation Modeling (CB-SEM) method with the help of the Amos 26.0 application are used for data processing.The results show that the continuance use intention of electronic money applications is strongly influenced by Perceived Usefulness, Satisfaction and Trust. Trust is largely influenced by Perceived Security & Privacy. Security Responsibility Commitment is an important factor that must be improved because it can affect trust directly or indirectly through Perceived Security & Privacy. Apart from Security Responsibility Commitment, Perceived Security & Privacy is also influenced by Security Technology Protection and Uncertainity Avoidance. This research contributes for increasing understanding and providing guidelines to increase the continuance use intention of electronic money applications, especially in developing countries."
Depok: Fakultas Ilmu Komputer Universitas Indonesia, 2021
TA-pdf
UI - Tugas Akhir  Universitas Indonesia Library
cover
"The book provides insights from the 2nd International Conference on Communication, Computing and Networking organized by the Department of Computer Science and Engineering, National Institute of Technical Teachers Training and Research, Chandigarh, India on March 29–30, 2018. The book includes contributions in which researchers, engineers, and academicians as well as industrial professionals from around the globe presented their research findings and development activities in the field of Computing Technologies, Wireless Networks, Information Security, Image Processing and Data Science. The book provides opportunities for the readers to explore the literature, identify gaps in the existing works and propose new ideas for research."
Singapore: Springer Singapore, 2019
e20502589
eBooks  Universitas Indonesia Library
cover
"This book introduces concepts and technologies of Intelligent Transportation Systems (ITS). It describes state of the art safety communication protocol called Dedicated Short Range Communication (DSRC), currently being considered for adoption by the USDOT and automotive industry in the US. However, the principles of this book are applicable even if the underlying physical layer protocol of V2X changes in the future, e.g. V2X changes from DSRC to cellular-based connectivity.
Fundamental ITS concepts include topics like global positioning system; Vehicle to Vehicle (V2V), Vehicle to Pedestrian (V2P), and Vehicle to Infrastructure (V2I) communications; human-machine interface; and security and privacy. Fundamental concepts are sometimes followed by the real-life test experimental results (such as in V2P Chapter) and description of the performance metrics used to evaluate the results. This book also describes equations and math used in the development of the individual parts of the system.
This book surveys current and previous publications for trending research in the ITS domain. It also covers state of the art standards that are in place for the DSRC in the US, starting from the application layer defined in SAE J2735 all the way to physical layer defined in IEEE 802.11.
The authors provide a detailed discussion on what is needed to extend the current standards to accommodate future needs of the vehicle communications, such as needs for future autonomous vehicles. Programs and code examples accompany appropriate chapters, for example, after describing remote vehicle target classification function a pseudo code and description is provided. In addition, the book discusses current topics of the technology such as spectrum sharing, simulation, security, and privacy.
The intended audience for this book includes engineering graduate students, automotive professionals/engineers, researchers and technology enthusiasts."
Switzerland: Springer Cham, 2019
e20502913
eBooks  Universitas Indonesia Library