Search Results - "Hariyanti, Eva"

  • Showing 1 - 10 results of 10
Refine Results
  1. 1
  2. 2

    Penyusunan Panduan Pengelolaan Keamanan Informasi Untuk Firewall Configuration Berdasarkan Kerangka Kerja PCI DSS v.3.1 dan COBIT 5 by Santoso, Bagus Puji, Hariyanti, Eva, Wuryanto, Eto

    “…Abstrak — Keamanan informasi merupakan bagian dari sebuah sistem yang sangat penting untuk dijaga validitas dan integritas data serta menjamin ketersediaan…”
    Get full text
    Journal Article
  3. 3

    Pembangunan Tools Audit Sistem Informasi Berdasarkan COBIT 5 pada Domain Align, Plan, And Organize (APO) by Faizin, Mukhammad Ilham Nur, Hariyanti, Eva, Zaman, Badrus

    “…Abstrak—Perkembangan teknologi informasi (TI) yang pesat mendorong penerapan proses tata kelola TI untuk dapat mencapai tujuannya. Untuk mengetahui…”
    Get full text
    Journal Article
  4. 4

    Information security vulnerability prediction based on business process model using machine learning approach by Hariyanti, Eva, Djunaidy, Arif, Siahaan, Daniel

    Published in Computers & security (01-11-2021)
    “…•Task-based Vulnerability Prediction (TbVP) for business process in CWE dictionary.•A new prediction method for high-level vulnerabilities in business process…”
    Get full text
    Journal Article
  5. 5

    MODEL PENGEMBANGAN DASHBOARD UNTUK MONITORING DAN EVALUASI KINERJA PERGURUAN TINGGI by Hariyanti, Eva, Werdiningsih, Indah, Surendro, Kridanto

    “…Tujuan utama dari penelitian ini adalah merancang model pengembangan dashboard untuk kebutuhan perguruan tinggi. Dashboard adalah aplikasi sistem informasi…”
    Get full text
    Journal Article
  6. 6

    Adaptive modeling for security vulnerability propagation to predict the impact of business process redesign [version 1; peer review: awaiting peer review] by Djunaidy, Arif, Hariyanti, Eva, Siahaan, Daniel

    Published in F1000 research (2023)
    “…Background: Business process redesign (BPR) is typical in organizations and is followed by adaptive maintenance on supporting applications. However, BPR leads…”
    Get full text
    Journal Article
  7. 7

    Pembangunan Tools Audit Sistem Informasi Berdasarkan COBIT 5 pada Domain Align, Plan, And Organize (APO) by Mukhammad Ilham Nur Faizin, Eva Hariyanti, Badrus Zaman

    “…Fast growth of information technology (IT) encourages the implementation of IT governance processes to achieve its purposes. To determine its achievement,…”
    Get full text
    Journal Article
  8. 8

    Penyusunan Panduan Pengelolaan Keamanan Informasi Untuk Firewall Configuration Berdasarkan Kerangka Kerja PCI DSS v.3.1 dan COBIT 5 by Bagus Puji Santoso, Eva Hariyanti, Eto Wuryanto

    “…Abstrak — Keamanan informasi merupakan bagian dari sebuah sistem yang sangat penting untuk dijaga validitas dan integritas data serta menjamin ketersediaan…”
    Get full text
    Journal Article
  9. 9

    A Conceptual Model for Information Security Risk Considering Business Process Perspective by Hariyanti, Eva, Djunaidy, Arif, Siahaan, Daniel Oranova

    “…Information security risk assessment (ISRA) and modeling has become a prominent topic in the last decade. ISRA methods have been developed by many researchers,…”
    Get full text
    Conference Proceeding
  10. 10

    Incident and Service Request Management for Academic Information System based on COBIT by Raharjana, Indra Kharisma, Ibadillah, Ibnu, Purbandini, Hariyanti, Eva

    “…This paper explores application of Incident and Service Request Management for academic services. We are using Control Objectives for Information and Related…”
    Get full text
    Conference Proceeding