Search Results - "Setiadi, Farisya"
-
1
Harnessing E-Collaboration for Rural Tourism Recovery after COVID-19: Dual Analysis using SWOT and Porter’s Diamond Model
Published in Emerging science journal (01-08-2021)“…IT for rural tourism was in place before the COVID-19 pandemic emerged; however, the initiatives were intermittent and isolated. The effects of the pandemic…”
Get full text
Journal Article -
2
SUPPLY CHAIN MANAGEMENT BERBASIS LAYANAN: DESAIN DAN IMPLEMENTASI PROTOTIPE SISTEM
Published in Jurnal sistem informasi (Journal of information system) (Online) (23-10-2013)“…Supply Chain Management (SCM) adalah sebuah konsep pengaturan aliran proses perdagangan yang menghubungkan antara produsen, supplier, dan konsumen secara…”
Get full text
Journal Article -
3
COMPARATIVE STUDY OF ERP IMPLEMENTATION METHODOLOGY CASE STUDY: ACCELERATED SAP VS DANTES & HASIBUAN METHODOLOGY
Published in Jurnal sistem informasi (Journal of information system) (Online) (04-10-2013)“…Enterprise Resource Planning (ERP) system is a concept of enterprise system that describe the integration of the whole process in the organization. Study in…”
Get full text
Journal Article -
4
E-GOVERNMENT RISK MANAGEMENT ANALYSIS USING PERMENPAN RB NUMBER 5 OF 2020 AT COMMUNICATION AND INFORMATION OFFICE OF XYZ REGENCY
Published in JIPI (Jurnal Ilmiah Penelitian dan Pembelajaran Informatika) (30-05-2023)“…Teknologi Informasi (TI) sering dimanfaatkan oleh instansi pemerintah untuk mendukung pencapaian tujuan pemerintahan. Semakin tinggi penerapan TI pada instansi…”
Get full text
Journal Article -
5
EVALUATION OF SOFTWARE QUALITY FOR I-OFFICE PLUS APPLICATIONS USING ISO/IEC 25010 AND KANO MODEL
Published in JIPI (Jurnal Ilmiah Penelitian dan Pembelajaran Informatika) (30-05-2023)“…Perubahan pola kerja yang dilakukan perusahaan dengan tidak lagi menerapkan aturan seluruh pegawai bekerja dari kantor meningkatkan kebutuhan akan aplikasi…”
Get full text
Journal Article -
6
Measurement Level of Information Security Awareness for Employees Using KAB Model with Study Case at XYZ Agency
Published in 2022 1st International Conference on Software Engineering and Information Technology (ICoSEIT) (22-11-2022)“…XYZ Agency in its operations always maintains the security of its information. This research focuses on measuring the Information Security Awareness (ISA) of…”
Get full text
Conference Proceeding -
7
Detection of DDOS Attacks in IIoT Case Using Machine Learning Algorithms
Published in 2024 International Conference on Data Science and Its Applications (ICoDSA) (10-07-2024)“…Internet of Things has grown very large and fast over the past few years. One proof of the development of IoT is the use of Industrial Internet of Things in…”
Get full text
Conference Proceeding -
8
Evaluation and Recommendation for Scrum Implementation Improvement with Hybrid Scrum Maturity Model: A Case Study of A New Telco Product
Published in 2020 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS) (19-11-2020)“…In 2019, a telco company launched a new product for the youth. It has the tagline "Everything You Want" that gave young customers the freedom to bundle their…”
Get full text
Conference Proceeding -
9
Identification and Analysis of Factors Affecting E-survey Response Rate at Central Bureau of Statistics
Published in 2020 International Conference on Information Management and Technology (ICIMTech) (01-08-2020)“…Central Bureau of Statistics - BPS is a institution that carries out statistical activities. One of the strategic objectives is to increase response rates. BPS…”
Get full text
Conference Proceeding -
10
COMPARATIVE STUDY OF ERP IMPLEMENTATION METHODOLOGY CASE STUDY: ACCELERATED SAP VS DANTES HASIBUAN METHODOLOGY
Published in Jurnal sistem informasi (Journal of information system) (Online) (01-10-2013)“…Enterprise Resource Planning (ERP) system is a concept of enterprise system that describe the integration of the whole process in the organization. Study in…”
Get full text
Journal Article -
11
Identifying and Validating Components for National Cyber Security Framework
Published in 2018 Third International Conference on Informatics and Computing (ICIC) (01-10-2018)“…National Cyber Security (NCS) is an effort to safeguard nation's assets from loss caused by cyber threats and attacks. In order that NCS development can be…”
Get full text
Conference Proceeding -
12
SUPPLY CHAIN MANAGEMENT BERBASIS LAYANAN: DESAIN DAN IMPLEMENTASI PROTOTIPE SISTEM
Published in Jurnal sistem informasi (Journal of information system) (Online) (01-10-2013)“…Supply Chain Management (SCM) adalah sebuah konsep pengaturan aliran proses perdagangan yang menghubungkan antara produsen, supplier, dan konsumen secara…”
Get full text
Journal Article -
13
Determining components of national cyber security framework using Grounded Theory
Published in 2017 Second International Conference on Informatics and Computing (ICIC) (01-11-2017)“…National Cyber Security (NCS) is multi-disciplinary in nature and diverse in practice. This diversity leads to difficulty in developing a framework, because it…”
Get full text
Conference Proceeding -
14
Balanced E-Government security framework: An integrated approach to protect information and application
Published in 2013 International Conference on Technology, Informatics, Management, Engineering and Environment (01-06-2013)“…Utilization of Information and Communication Technology in government sector or E-Government has become an important part. Almost all activities and process in…”
Get full text
Conference Proceeding