The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The purpose of this study was to evaluate the application system TULIS in the Main Library of UIN Syarif Hidayatulllah Jakarta by using COBIT 5 framework focuses on the process of managing security (APO13) and managed security services and to know the gap and provide recommendations to top management of the Library. This study used Likert scale calculations. The results of this study are as score...
Sustainable technology means technology is capable of being maintained over a long span of time; independent of shifts in both hardware and software. Effective implementation and use of Health information Systems (HIS) for years to come is crucial as sustainable HIS. Numbers of studies have discussed various factors contributes towards barriers for successful implementation of HIS. However, very few...
It is critical and foremost to come up with the corresponding security requirements first which the following implementations are based on. However, previous security requirement elicitation work based on Common Criteria (CC) rarely addresses the detailed elicitation process of threats from specific functional requirements, which thus results in the widen gap between specific functional requirements...
The existence of increasingly more sophisticated and modern information systems and technologies which may enable an easier collection, storage, processing and dissemination of information is paramount for the good performance of an organization. However, the planning of such systems must be effective, thus enabling the definition of the envisaged future of the organization's information systems....
A hybrid cloud is a cloud computing environment in which an organization provides and manages some internal resources (private cloud) while the other resources are provisioned externally (public cloud). Rapid deployment of hybrid clouds for utility, cost, effectiveness and flexibility has made it necessary to assure the security and privacy of hybrid clouds as it transcends different domains. Further,...
Cloud computing has made a revolution in the way in which IT services are delivered to organizations. For organizations, have an effective and efficient IS migration process is important to ensure a successful process. Certainly, several migration processes have been proposed but we notice the lack of a general and well detailed migration process that ensures cloud migration and integrates an economic...
In the collaborative systems, in order to establish successful and protected collaboration, the trust management is first established between the participating entities and the trust score of each entity is calculated. This score is obtained based on the three trust criteria (satisfaction, reputation and recommendation) that are redefined and reused in our model: Tr-OrBAC. The evaluation of these...
The Information System Security Risk management (ISSRM) in organizations is ultimate for business success. ISSRM protects information availability, integrity, and privacy. However, this latter remains a difficult area to establish and maintain, especially in the environment of today's organizations where operations are conducted in a complex and interconnected context. The aim of this paper is to...
With the fast development of information and communication technologies over the past decade, Healthcare Information Technology (HIT) has been widely implemented for health stakeholders to access, modify, share Electronic Health Records (EHR) with a low cost of the facility, data and application maintenance. Due to the high value of healthcare data and lack of investment in cyber security, vulnerabilities...
Nowadays one of the key challenges we are witnessing in software design and implementation is the integration of several legacy systems in order to realize large scale applications that are strongly information-intensive. Practical examples can be found in several application domains, such as healthcare, where large-scale Health Information Systems are currently promoted and under implementation by...
Information systems security (ISS) is crucial in all and each of the services provided by organizations. Among the security measures, policies assume a central role in literature. However, there is a reduced number of empirical studies about the implementation of ISS policies and which are the critical success factors for its implementation. This paper contributes to mitigate this flaw by presenting...
Efforts to understand what goes on in the mind of an insider have taken a back seat to developing technical controls, yet insider threat incidents persist. We examine insider threat incidents with malicious intent and propose an explanation through a relationship between Dark Triad personality traits and the insider threat. Although Dark Triad personality traits have emerged in insider threat cases...
The Internet and Digital Economy track focuses on the ways in which the Internet affects people, groups, organizations, and societies (e.g., Markets, social networks), as well as fundamental issues in the development and operation of the Internet and Internet applications.
Integration of hospital information systems (HIS) is an important area and one the basic requirements of hospitals since it increases quality of care and at the same time reduces costs of creating, upgrading, updating and keeping up with technology and healthcare industry standards and information technology. Cloud computing with features like multitenancy, massive scalability, elasticity, pay as...
Until few years ago professional certifications were something that is good, but not necessary to have during employment process. That could be seen from the published job advertisements for variety of IT and information security professionals. In such job ads, there was first required specific experience in the subject area where no confirmation of that experience in form of professional certification...
Today, information systems are threatened not only by the opportunistic exploitation of particular technical weaknesses, but increasingly by targeted attacks that combine multiple vectors to achieve the attacker's objectives. Given the complexities involved, identifying the most appropriate measures to counteract the latter threats is highly challenging. In this paper, we introduce a novel simulation-optimization...
This study investigated how external influences motivate senior management to commit to information system security (ISS) by examining the mediating role of senior management between external influences and organizational change. Neo-institutional theory was used to examine normative, mimetic, and coercive mechanisms that affect ISS assimilation in organizations. Findings show senior management beliefs...
This paper examines the responsibilities and the required skills for Information Technology (IT) security professionals. Content analysis of relevant jobs postings helped identify four types of positions and the associated responsibilities and requisite skills. The identified skills were further analyzed to assess their consistency with the identified responsibilities. Finally, the Body of Knowledge...
This paper highlights the impact of e-learning system on the stakeholders, by identifying some challenges and guarantees for the platform. After a brief discussion of the particularities of the system, it exploits the potential in offering a better learning experience by categorizing certain vulnerabilities that might affect the system. The paper also focuses on the E-Learning system of Universiti...
This study investigates the physicians¡¦ perspective for the success of information systems (is), and the relationships between the user satisfactions and intellectual capital. We adopted a questionnaire survey for the purpose of outcome assessment. The results indicate that IS success is significantly related to intellectual capital (IC). With regard to IS quality, system quality has no significant...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.