The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Before conduct data collecting, enumerators take a course and conduct simulation in the classroom. However, learning in the classroom often doesn't make the enumerators understand perfectly. To solve this problem, we can use 3D virtual game based training as a solution. During the training, enumerators will use 3D virtual learning environment to get more experience, engagement, and expertise. For...
Gamification could be used to increase employee's learning motivation in an online training environment. While in the business world, gamification could be implemented as a service in an enterprise information system which is used to engage employees to finish their work well. Since training is conducted to improve the quality of employees, the integration of gamification's implementation in training...
Choosing a course in e-learning required complex process. Recommendation is a way to help learner to decide of what course they will choose next. The common approach to course recommendation is using similar or past course experience satisfaction that commonly measured by rating. However, satisfaction in the open e-learning such as Massive Open Online Course (MOOC) also can be seen by rating and learner...
Learning with seorius game based virtual environments provide immersive and motivation. One aspect of learning is evaluation. But evaluation provides anxiety on the learner, as question that is too difficult. In this paper will describe how to generate questions in evaluation(quiz) based on bloom taxonomy with composition 25:50:25 for the types of questions C1, C2, and C3. The question generation...
Knowledge management system offers a solution to manage knowledge in an organization. This research focuses on design knowledge management system to capture and disseminate all knowledge in a postal services company. This research adopts the asean productivity organization (APO KM) as framework. The result shows that design knowledge management system score is 90,00% strongly agree in accordance with...
SCADA systems (Supervisory Control and Data Acquisition) as the smart grid control unit has been used in almost various industries around the world in terms of automation systems. Smart grid technology combines the energy and telecommunications infrastructure and Internet networks. SCADA system in order to function optimally, it is necessary to process the security of information technology governance...
One of the problems in the computer security system is port scanning attack. There are several detection systems have been developed to find out the occurrence of port scanning attack, one of them is anomaly detection method. A mechanism on how to implement the detection process in a more simple and effective way is a real serious challenge. In this paper, we design a simple implementation of anomaly...
Survey training in Statistics Indonesia is an important step in data collection process. Today, many recurrence survey trainings are cancelled by Statistics Indonesia due to cost saving. One solution to resume the training (at a lower cost) is to conduct it virtually. SLOODLE is an application that can combine Learning Management System (LMS) such as MOODLE with 3D Virtual Learning Environment (VLE)...
In this paper, we designed a mechanism to mitigate the existence of device fingerprinting process by utilizing personal HTTP proxy. For the purpose of detection and prevention of device fingerprinting, the proxy utilizes a two-stage filtering process; header-based filtering and content-based filtering. We define 6 values of attribute among with their weight based on the value of the highest entropy...
Android is one of the most popular open-source smartphone operating system and its access control permission mechanisms cannot detect any malware behavior. In this paper, new software behavior-based anomaly detection system is proposed to detect anomaly caused by malware. It works by analyzing anomalies on power consumption, battery temperature and network traffic data using machine learning classification...
This paper proposes a (new) method to detect malware in Android smartphones using API (application programming interface) classes. We use machine learning to classify whether an application is benign or malware. Furthermore, we compare classification precision rate from machine learning. This research uses 51 APIs package classes from 16 APIs classes and employs cross validation and percentage split...
One of the shortcomings of e-learning is user's involvement, one possible solution provided by the researchers is gamification. Evidence of the gamification's success can be seen in a web-based business to increase user engagement. This paper studies, analyzes and designs learning applications on smart phones with the inclusion of gamification. The design of learning application was made to support...
Digital rights management has become a solution for copyright owners to protect the content in any digital object that transacted over the internet or digital storage from the risk of modifications such save a copy, edit, and illegal transfer from the irresponsible or piracy[16]. In DRM, content owners may limit the use of documents through the provision of encryption, copy control modifications,...
Information is an asset, such as important business assets, has value to an organization and consequently must be well protected. In organizations, information becomes an important and must remain available, and its existence should be maintained from unauthorized access. The use of information by unauthorized parties could be used for negative purposes which would be detrimental to the organization...
Massive Open Online Courses (MOOCs) is the recent model of distance learning. MOOCs targeting unlimited participants and open access through website. Its main focus is the interaction between the user those are students, teachers and teaching assistants. MOOCs may well be an alternative to how education is delivered and consumed. This paper offers an analyzes how MOOCs can offer an alternative distance...
In the government agency IT implementation, information technology service and security factors are very important aspect to be considered. International Standardization Organization has published ISO20000 standard as a standard for information technology services management and ISO27001 standard for information security management system. This research described the design of IT service and information...
Management of information without regard to risk the achievement of enterprise goals can have an impact on organizational performance, financial loss or organization's credibility. The risk control for the negative effects and utilization of chance in achieving enterprise goals is called information security. Information security are generally solved by partial and limited. It also happens to INTRAC...
The cost function minimization is essential in finding a good model for linear regression. This paper works on prototyping and examining the minimizing cost function's two known algorithms for online predictive, namely gradient descent and normal equations. The data used in this paper are found in Open Data and split into three parts, training, test, and cross validation datasets. Empirical results...
E-learning has been used to help students in learning. But nowadays the problem in e-learning is the student's motivation and engagement. A study about engagement in e-learning said, students who rarely use e-learning get worse score than their friends who often use e-learning. A lot of methods have been used to motivate and improve student's engagement in using e-learning. One of the methods is by...
Single sign on (SSO) is a centralized authentication system where user acquires access to many services using one credential. However, Single Sign On has one fatal weakness. If one credential has been acquired by an attacker, the attacker can acquire access to many services. SAML SSO protocol, that widely studied also suffers this vulnerability. This research provides economic solution for such problem...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.