The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The purpose of this study was to evaluate the application system TULIS in the Main Library of UIN Syarif Hidayatulllah Jakarta by using COBIT 5 framework focuses on the process of managing security (APO13) and managed security services and to know the gap and provide recommendations to top management of the Library. This study used Likert scale calculations. The results of this study are as score...
Information Technology (IT) is continuously evolving at faster rate and enterprises are always trying to keep pace with the changes. So do the threats. As the complexity of IT increase, the unprecedented threat environment and security challenges also have increased multi fold over the years. Security Managers are continuously having challenging task not only protecting their company but also convincing...
A structured environment of IT risk management can influence an improving the flexibility and adaptability of business processes and information technology, including information systems in a secure manner. As with all other technologies, the adoption of SOA involves risk. These risks often manifest themselves during an implementation of the SOA solution and arise mainly due to insufficient detail...
In this paper we discuss our experience of implementation of Data Loss Prevention (DLP) system at our University. The DLP system helps to analyze, control, monitor, block and protect data at the University. With the help of the DLP system and encryption we are able to protect and control the confidential data about our users, HR data, intellectual ownership data, legal and financial documentation,...
Zakat or better known as almsgiving is one of the major Islamic principles which is obligated to qualified Muslims. The almsgiving principle aims to assist the needy and eliminate poverty in the society whilst promoting the elimination of greed and selfishness among the Muslim community. The government also holds the responsibility of creating a zakat institution to ensure effective management of...
Until few years ago professional certifications were something that is good, but not necessary to have during employment process. That could be seen from the published job advertisements for variety of IT and information security professionals. In such job ads, there was first required specific experience in the subject area where no confirmation of that experience in form of professional certification...
The purpose of this study is to assess and measure Bushehr Customs electronic readiness. Bushehr customs is one of the biggest customs in the southern Iran whose electronic readiness reflects Iran customs electronic readiness. The study initially was validated based on an e-readiness model experienced by 9 countries. The model was studied through a primary research methodology including questionnaire...
Databases are the repositories of the most important and expensive information in the enterprise. With the increase in access to data stored in databases, the frequency of attacks against those databases has also increased. A database threat refers to an object, person or other entity that represents a risk of loss or corruption of sensitive data to an asset. Today, in many business organizations,...
Current public and private healthcare information technology initiatives have failed to achieve secure integration among providers. Applying the "keep it simple, stupid" principle offers key guidance for solving this problem.
In today's competitive job market, businesses will hire people with the relevant work experience, which creates quite a challenge for graduating students. Thus, graduating students also need experience to go with their degrees in order to be competitive in current job market. To better prepare our students, the Computer Information Technology program developed an experiential learning program called...
The advent of cloud computing in recent years has sparked an interest from different organizations, institutions and users to take its advantage. This is a result of the new economic model for the Information Technology (IT) that cloud computing promises. It promises a shift from an organization required to invest heavily for limited IT resources that are internally managed, to a model where the organization...
In this research a brief explanation about basic theory of security metrics is given. Implementation of security metrics are also explained. A future work of security metrics fields are given as a guide to other researcher to make an advanced research in the future. A description of security metrics with global taxonomy and classification are discussed.
This study demonstrated two open source applications that can readily be customized and used by organizations to improve compliance with password policies and to ensure the quality of passwords within organizations. The tools address both ends of the password spectrum, in that one tool consists of CGI server code used to generate secure random passwords, while the other tool exemplifies techniques...
In recent years, there have been many events about personal information disclosure. Almost everyday our personal data are threatened by the hackers and virus. This article systemically analyzes the ways by which the personal information is threatened and discusses about the ethics of personal information security; consequently proposes the measures to improve the personal information ethics and information...
Social institutions are critical to organization and stability. Governments, businesses, markets, military, schools, hospitals, families, and churches are all complex institutions that provide services through an elaborate system of social organization. These institutions are designed to provide specific services to their constituencies by acquiring resources, by converting those resources to services,...
In order to improve the IT services and make them more accessible, a lot of service supporting platforms are adopted the framework of ITIL. The service desks as the connector between the customers and platforms play a very essential role in the process of Service Support. Incident management is started from the service desh directly or indirectly. Incident management can help the customers to solve...
In this paper we examine the interdependencies and common points of failure (and attack) that plague commonly-used system and network hardware and software. The proposed approach requires not only generating inventories of acquiring organizations' equipment and software products, and clear and detailed descriptions of every link in the supply chain, but also the identification of common components...
Over the past few years, there has been increasing attention on how Information Technology (IT) supports good governance in Higher Education Institutions (HEI). It's obvious that communications and information technology provide ever-growing opportunities to improve institutional effectiveness and efficiency. The use of technology is driving significant changes in the way educational institutions...
The CERT® Resilience Management Model (CERT®-RMM) defines processes for managing operational resilience in complex, risk-evolving environments. The model encompasses and integrates activities from security, business continuity, and aspects of IT operations management. It provides a path for making operational resilience a repeatable, predictable, manageable, and improvable process over which an organization...
Generally, Customer Relationship Management (CRM) is essential and vital function of customer oriented marketing. Its function includes gathering and accumulating customer -related information in order to provide effective services. E-CRM concerns all forms of managing relationships with customers making use of Information Technology (IT). Aim of e-CRM system is to improve customer service, develop...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.