Delineating the Degree of 'Pervasiveness' in Pervasive Information Systems: An Assessment Framework and Design Implications

Author(s):  
Panos E. Kourouthanassis ◽  
George M. Giaglis ◽  
Dimitrios C. Karaiskos
Author(s):  
Guntoro Guntoro ◽  
Loneli Costaner ◽  
Musfawati Musfawati

<p class="Abstract">Perkembangan teknologi informasi yang begitu pesat memberikan dampak positif dalam berbagai bidang, salah satunya adalah teknologi internet. Website menjadi alternatif bagi institusi dalam mempromosikan kepada masyarakat umum. Website juga mudah diakses oleh banyak orang, yang tidak kenal tempat maupun waktu. Dengan adanya kemudahan tersebut, banyak instansi membangun web server tanpa memperhatikan apakah web server yang dibangun sesuai dengan standar keamanan atau tidak, apakah sistem yang dibangun sudah aman atau ada gangguan. Universitas Lancang Kuning mempunyai web server yang berisi banyak sistem informasi dan dokumen yang dipublikasi bagi pengguna. Salah satu sistem yang paling krusial adalah sistem Open Journal System (OJS). Menurut informasi dari PDPT Universitas Lancang Kuning, bahwa sistem Open Journal System (OJS) sudah dua kali terjadi cracking. Kerusakan terhadap OJS ini mengakibatkan data yang terdapat pada sistem OJS hilang, bahkan author sering komlain kepada pengelola jurnal. Pengujian terhadap web server sangatlah penting dilakukan, pengujian ini bertujuan untuk menguji apakah web server sudah aman atau belum dari tindak kejahatan para hacker. Dalam pengujian penetrasi ada beberapa metode yang sering dipakai seperti Information Systems Security Assessment Framework (ISSAF), OWASP. Pada penelitian ini digunakan metode ISSAF dan OWASP versi 4. Metode penelitian yang digunakan pada penelitian ini diantaranya adalah studi literatur, pengumpulan data, pengujian penetrasi menggunakan metode ISSAF dan OWASP, dan analisa dan laporan. Adapun tujuan penelitian ini adalah bagaimana menganalisis keamanan sistem Open Journal System (OJS) menggunakan metode ISSAF dan OWASP pada Universitas Lancang Kuning. Berdasarkan pengujian yang telah dilakukan menggunakan metode ISSAF dan OWASP, sistem OJS Universitas Lancang tergolong aman, karena tidak mampu untuk ditembus. Walaupun OJS Universitas Lancang Kuning tergolong aman, serangan bisa saja terjadi dari dalam institusi.</p>


This chapter provides a deeper understanding of IT governance frameworks and their adoption, drawing on established information systems theories. A mixed two-stage approach using quantitative and qualitative studies is used to examine the feasibility of developing an IT governance assessment framework based on COBIT to assess IT governance in a specific context. The first step seeks to identify key COBIT best practices within organizations. A survey of 20 large organizations in the MENA region was adopted. In the second phase, a case study used to explore the factors that influence the adoption of the adapted IT governance assessment framework.


2012 ◽  
Vol 3 (4) ◽  
pp. 33-46
Author(s):  
Tiia Stén ◽  
Jan M. Pawlowski ◽  
Henri Pirkkalainen

The goal of this paper is to recommend suitable competence assessment instruments and methods for assessing globalization competence in the Information Systems domain. This is done by matching globalization competences with suitable competence assessment methods. The results of the analysis indicate that the most applicable competence assessment methods for assessing globalization competences in the Information Systems domain are written format assessments (especially essays), candidate self-reports, live interactions (especially group work), and computer simulations. The validity of the outcome is confirmed through a mixed method of document analysis and expert interviews by analyzing and evaluating the assessment methods of Finnish higher education courses in the Information Systems field. Finally, a preliminary comparison between Finnish and Japanese assessment methods is conducted.


Author(s):  
Amee P. Shah

In this paper, I present accent-related variations unique to Asian-Indian speakers of English in the United States and identify specific speech and language features that contribute to an “Indian accent.” I present a model to answer some key questions related to assessment of Indian accents and help set a strong foundation for accent modification services.


1984 ◽  
Vol 1 (1) ◽  
pp. 175-185
Author(s):  
Michael E. D. Koenig

2020 ◽  
Vol 64 (1) ◽  
pp. 6-16 ◽  
Author(s):  
Sarah M. Meeßen ◽  
Meinald T. Thielsch ◽  
Guido Hertel

Abstract. Digitalization, enhanced storage capacities, and the Internet of Things increase the volume of data in modern organizations. To process and make use of these data and to avoid information overload, management information systems (MIS) are introduced that collect, process, and analyze relevant data. However, a precondition for the application of MIS is that users trust them. Extending accounts of trust in automation and trust in technology, we introduce a new model of trust in MIS that addresses the conceptual ambiguities of existing conceptualizations of trust and integrates initial empirical work in this field. In doing so, we differentiate between perceived trustworthiness of an MIS, experienced trust in an MIS, intentions to use an MIS, and actual use of an MIS. Moreover, we consider users’ perceived risks and contextual factors (e. g., autonomy at work) as moderators. The introduced model offers guidelines for future research and initial suggestions to foster trust-based MIS use.


Sign in / Sign up

Export Citation Format

Share Document