Search Results - "Hariyanti, Eva"
-
1
Implementations of Artificial Intelligence in Various Domains of IT Governance: A Systematic Literature Review
Published in Journal of information systems engineering and business intelligence (01-11-2023)“…Background: Artificial intelligence (AI) has become increasingly prevalent in various industries, including IT governance. By integrating AI into the…”
Get full text
Journal Article -
2
Penyusunan Panduan Pengelolaan Keamanan Informasi Untuk Firewall Configuration Berdasarkan Kerangka Kerja PCI DSS v.3.1 dan COBIT 5
Published in Journal of information systems engineering and business intelligence (29-10-2016)“…Abstrak — Keamanan informasi merupakan bagian dari sebuah sistem yang sangat penting untuk dijaga validitas dan integritas data serta menjamin ketersediaan…”
Get full text
Journal Article -
3
Pembangunan Tools Audit Sistem Informasi Berdasarkan COBIT 5 pada Domain Align, Plan, And Organize (APO)
Published in Journal of information systems engineering and business intelligence (05-11-2015)“…Abstrak—Perkembangan teknologi informasi (TI) yang pesat mendorong penerapan proses tata kelola TI untuk dapat mencapai tujuannya. Untuk mengetahui…”
Get full text
Journal Article -
4
Information security vulnerability prediction based on business process model using machine learning approach
Published in Computers & security (01-11-2021)“…•Task-based Vulnerability Prediction (TbVP) for business process in CWE dictionary.•A new prediction method for high-level vulnerabilities in business process…”
Get full text
Journal Article -
5
MODEL PENGEMBANGAN DASHBOARD UNTUK MONITORING DAN EVALUASI KINERJA PERGURUAN TINGGI
Published in JUTI (Jurnal Ilmiah Teknologi Informasi) (online) (01-01-2011)“…Tujuan utama dari penelitian ini adalah merancang model pengembangan dashboard untuk kebutuhan perguruan tinggi. Dashboard adalah aplikasi sistem informasi…”
Get full text
Journal Article -
6
Adaptive modeling for security vulnerability propagation to predict the impact of business process redesign [version 1; peer review: awaiting peer review]
Published in F1000 research (2023)“…Background: Business process redesign (BPR) is typical in organizations and is followed by adaptive maintenance on supporting applications. However, BPR leads…”
Get full text
Journal Article -
7
Pembangunan Tools Audit Sistem Informasi Berdasarkan COBIT 5 pada Domain Align, Plan, And Organize (APO)
Published in Journal of information systems engineering and business intelligence (01-10-2015)“…Fast growth of information technology (IT) encourages the implementation of IT governance processes to achieve its purposes. To determine its achievement,…”
Get full text
Journal Article -
8
Penyusunan Panduan Pengelolaan Keamanan Informasi Untuk Firewall Configuration Berdasarkan Kerangka Kerja PCI DSS v.3.1 dan COBIT 5
Published in Journal of information systems engineering and business intelligence (01-10-2016)“…Abstrak — Keamanan informasi merupakan bagian dari sebuah sistem yang sangat penting untuk dijaga validitas dan integritas data serta menjamin ketersediaan…”
Get full text
Journal Article -
9
A Conceptual Model for Information Security Risk Considering Business Process Perspective
Published in 2018 4th International Conference on Science and Technology (ICST) (01-08-2018)“…Information security risk assessment (ISRA) and modeling has become a prominent topic in the last decade. ISRA methods have been developed by many researchers,…”
Get full text
Conference Proceeding -
10
Incident and Service Request Management for Academic Information System based on COBIT
Published in 2018 5th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI) (01-10-2018)“…This paper explores application of Incident and Service Request Management for academic services. We are using Control Objectives for Information and Related…”
Get full text
Conference Proceeding