process attribute
Recently Published Documents


TOTAL DOCUMENTS

16
(FIVE YEARS 9)

H-INDEX

3
(FIVE YEARS 1)

Sociology ◽  
2021 ◽  
pp. 003803852110473
Author(s):  
Yongxuan Fu

By reconsidering Simmel’s concept of space, this article introduces space into the epistemological field of relational sociology to construct a relational spatiality based on relational sociology, demonstrating the continuity between spatial and relational approaches in the study of modernity. It first explains Simmel’s relational epistemology and the metropolis, and then constructs the relational spatiality vis-a-vis the two main viewpoints of contemporary relational sociology. Space is relational in nature because it is defined by iterative interactions between actors, which go beyond visible geographical cognition to sociologically express the living process people experience in fragmentary forms of social space. Furthermore, this relational spatiality, combined with Michel Foucault’s discourse, reveals the process attribute of space from the perspective of relational sociology, showing the possibility of a spatial epistemology based on relational sociology.


2021 ◽  
Vol 7 (1) ◽  
Author(s):  
Dea Valenska Gusman ◽  
Fajar Hari Prasetyo ◽  
K Adi

Abstrak—Keamanan informasi pada era digital sangat penting, sehingga menjadi masalah penting bagi perusahaan, organisasi, serta lembaga pemerintahan. Dinas Komunikasi serta Informatika Kabupaten Karawang didirikan berdasarkan Peraturan Daerah No.14 pada Tahun 2016 mengenai Pembentukan serta Susunan Perangkat Daerah Kabupaten Karawang. Pemanfaatan teknologi informasi sudah diterapkan dalam sistem keamanan informasi pemerintah Kabupaten Karawang. namun dalam mewujudkan hal itu, belum sepenuhnya berhasil dalam pengambilan nilai serta manfaatnya. Riset ini mempunyai tujuan untuk melakukan evaluasi keamanan sistem informasi yang telah diimplementasikan pada institusi untuk menilai level kapabilitas menggunakan domain DSS05 pada COBIT 5. Metode yang dipakai yaitu Assesment Process Activities COBIT 5 antara lain Initiation Programme, Define Problems and Opportunities, Data Collection, Data Validation serta Process Atribut Level. Hasil riset ini didapatkan nilai kapabilitas 3,4 (as is) serta 4.1 (to be) maka proses yang telah diimplementasikan secara garis besar tercapai. Pada domain DSS05 mendapatkan capaian sebesar 92% berarti pada proses atribut 3.1 process definition tercapai penuh, sehingga penilaian dapat dilanjutkan ke level berikutnya yaitu (PA) 3.2 Process Deployment.Abstract—Information security in the digital era is very important, so it becomes a critical problem for enterprise, organizations and governments. The Communication and Informatics Office of Karawang Regency was formed based on Peraturan Daerah No. 14 of 2016 concerning the Formation and Composition of the Karawang Regency Regional Apparatus. Information technology is already implememted in the information security system of the Karawang Regency government. However, in realizing this, the value and benefits have not been fully succeeded. This study aims to evaluate the security of information systems that have been implemented in institutions to assess Capability Level using the DSS05 domain at COBIT 5. The method used is the Assessment Process Activities of COBIT 5, including Initiation Program, Define Problems and Opportunities, Data Collection, Data Validation and Process Attribute Level. The results of this study obtained the capability value of 3,4 (as is) and 4.1 (to be) of the two values, so the process that has been implemented in outline is achieved. In the DSS05 domain, the achievement was 92%, meaning that the 3.1 process definition attribute process was fully achieved, so that the assessment could be continued to the next level, namely (PA) 3.2 Process Deployment.


2021 ◽  
Vol 3 (2) ◽  
pp. 101-106
Author(s):  
Muhammad Kamal Sani Firdaus

Kemungkinan adanya ancaman dan risiko TI (Teknologi Informasi) yang muncul seiring dengan penerapan IT Governance dapat menganggu proses bisnis yang berjalan. Hal ini penting bagi suatu perusahaan untuk menerapkan manajemen risiko TI. Dalam penerapannya, PLN P2B  didukung oleh Divisi Teknologi Informasi dan Telekomunikasi sebagai penyedia layanan TI. Diketahui permasalahan yang sedang dialami PLN P2B adalah insiden kehilangan data yang diakibatkan adanya kegagalan dalam migrasi data ketika PLN P2B mengupgrade server dari 3-node clusters menjadi 6-node clusters. Oleh karena itu, diperlukan adanya evaluasi terhadap manajemen risiko TI sesuai dengan standar yang ada. Penelitian ini bertujuan untuk mengetahui tingkat kapabilitas manajemen risiko TI menggunakan metodologi Process Assessment Model (PAM) COBIT 5 yang terdiri dari tahapan Initiation, Planning the Assesment, Briefing, Data Collection, Data Validation, Process Attribute Level dan Reporting the Result. Hasil dari penelitian ini menunjukan tingkat pengelolaan risiko dan pengoptimalan risiko saat ini berada pada level 3 (Established Process) dan berdasarkan hasil penilaian risiko terdapat 6 risk issue yang tingkat risikonya di atas batas risk appetite. Sehingga PLN P2B direkomendasikan untuk menerapkan dan mengemb    angkan DRP (Disaster Recovery Plan) berdasarkan kerangka kerja yang didesain untuk mengurangi dampak terhadap fungsi dan proses bisnis utamanya. Selain itu PLN P2B direkomendasikan menentukan dan mengimplementasikan langkah pengamanan fisik sesuai dengan persyaratan. Salah satunya dengan menempatkan database server di tempat yang aman. Dengan demikian diharapkan hasil penelitian ini dapat dijadikan bahan pertimbangan PLN P2B dalam melakukan perbaikan tata kelola TI agar dapat berjalan lebih optimal.


2020 ◽  
Vol 03 (01) ◽  
Author(s):  
Muhammad Shoaib ◽  
Hafiz Muhammad Sani ◽  
Mr. Amanullah

There is consensus among Muslim Ummah and Imams that, for an Islamic state, selection of the head of state is the most important and compulsory. Selection of leader would be such as who is pious, virtuous, scholar of Shariah, honest, wise and courageous so that the management/ administration of the state may be carried out justifiably. In Ahle Sunnah, it is obligatory for the noble creature of Almighty Allah to select leader (Imam) for themselves, otherwise all of them would be considered as sinners. The best way for the selection of Imam is “Khulafa-eRashideen”, in the light of which Muslim Ummah can choose Imam. The first and uttermost obligation of the elected Imam is to abide by religion. Beside other duties of Imam, include protection of the state, establishment of Shariah limits, propagation of Islamic mission and leading the Islamic state. In this research paper we are discussing Al-Mawardi’s concepts for the selection process, attribute and duties of the head of Islamic state.


2020 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Chris I. Enyinda ◽  
Abdullah Promise Opute ◽  
Akinola Fadahunsi ◽  
Chris H. Mbah

Purpose The purpose of this paper is to understand marketing–sales–service (M-S-S) interface from the point of how social media marketing (SMM) platforms are prioritized and associated business-to-business (B2B) sales process influence. This study also seeks to understand whether effective triadic alignment is achieved between marketing, sales and service. Design/methodology/approach This study combines literature review and the analytical hierarchy process model. In total, 30 M-S-S managers of a multinational electronics firm situated in Africa and the Middle East participated in this study. The authors collected data from M-S-S managers during training sessions on marketing, sales, service alignment and SMM role in sales process. Findings In their drive for customer orientation and improved organizational performance, marketing, sales and service managers view understanding the customer as the most important sales process attribute. Considered second most significant sales process attribute is needs discovery, whereas approaching the customer is ranked the least important. From the ratings of sales process attributes evaluation and rankings of SMM platform alternatives, the results show a significant hierarchical influence of Facebook, LinkedIn and Twitter on sales process. The results also show an enabling influence of SMM activity on M-S-S interface alignment. Research limitations/implications This study has a twofold limitation. First, it explored only one major B2B firm in the electronics industry. Second, only the African and Middle East settings are considered in this study. These limitations could be addressed in future research. Practical implications This paper provides practical insights into how M-S-S managers may leverage social media to enhance customer orientation and boost organizational performance. The use of SMM can help M-S-S managers of the focal firm to predict purchase behavior of customers more accurately and as a result effectively manage and improve sales performance. In that drive of using SMM-based competitive intelligence to deliver superior customer experience and enhance sales performance, B2B marketing-oriented firms can also leverage the interdependence (information sharing and involvement) in the M-S-S interface during the SMM activity to enhance triadic alignment. Originality/value This study contributes to the literature by developing a framework for modeling SMM influence on M-S-S and B2B sales process to deliver superior customer experience and drive business performance.


2020 ◽  
Vol 29 (04) ◽  
pp. 2050007
Author(s):  
Manuel Gall ◽  
Stefanie Rinderle-Ma

Ensuring the smooth and efficient execution of business processes requires a continuous process quality assessment and optimization. Process optimization exploits process attributes and their values, e.g. cost or duration of a process task, in order to derive, for example, control flow adaptations. The complexity of the analysis can range from a few to a plethora of attributes, e.g. machining times and sensor parameters in the manufacturing domain. Hence, it is crucial to support single and multiple users (e.g. process analysts) in visually exploring process attributes and their values. Specifically, comparing and assessing different visualization and interaction approaches with respect to their efficiency is required in order to offer the most suitable approach to users for a specific analysis task. However, such assessments are currently missing. To close this gap, this paper assesses three visualization and interaction approaches, i.e. 2D, 3D, and 3D with virtual reality (VR) support, based on a controlled experiment. We choose the process modeling standard Business Process Modeling and Notation (BPMN) as 2D approach. 3DViz is introduced as 3D approach with focus on attribute representation, and additionally augmented with VR. A statistically significant difference between the approaches can be observed with respect to their efficiency.


2019 ◽  
Vol 44 (2) ◽  
pp. 216-234 ◽  
Author(s):  
Geneviève Reid ◽  
Renée Sieber

Research on geospatial ontologies focuses on achieving interoperability by creating universal standards applied to data. We argue that universality through ontologies can potentially perpetuate homogenization of concepts, thus contributing to assimilation of Indigenous peoples. We cover the ways the conventional geospatial ontologies enable dichotomies between mental and physical concepts, reduce concepts during the classification process, attribute agency, and privilege ontological class over relationships. We further argue that the geospatial web and natural language processing should be inclusive of Indigenous people to ensure future access to geospatial technologies and to prevent further loss of Indigenous knowledge. We explore alternative approaches to universality such as hermeneutics and heuristics. These offer the potential for Indigenous geospatial ontologies considered as equal, instead of being reduced to fit within western concepts.


2018 ◽  
Vol 10 (2) ◽  
pp. 119-128
Author(s):  
Iik Muhamad Malik Matin ◽  
Arini Arini ◽  
Luh Kesuma Wardhani

ABSTRAK Data center pada sebuah institusi telah di amati dan dianalisa untuk mendapatkan deskripsi mengenai keamamanan informasinya. Data center pernah mengalami insiden keamanan informasi berupa Shell Injection. Akibatnya, beberapa situs web tidak dapat diakses beberapa saat. Insiden ini dapat memperngaruhi proses bisnis institusi. Untuk menghindari masalah ini di masa depan, diperlukan audit keamanan informasi. Audit ini dapat dilakukan dengan menggunakan framework COBIT 5. Dalam penelitian ini, audit keamanan indormasi dilakukan terhadap keamanan informasi data center dengan fokus pada proses APO13 (Manage Security) dan DSS05 (Manage Security Service). Penelitian ini Penelitian ini dilakukan melalui tahap Initiation, Planning the Assessment, Briefing, Data Collection, Data Validation, Process Attribute Level dan Reporting the Result. Hasil penelitian ini diketahui tingkat kemampuan APO13 dan DSS05 pada saat ini (As Is) bernilai 1,54 dan 1,68 atau pada level 2, yang berarti proses APO13 dan DSS05 telah dilakukan dan dipelihara sesuai dengan rencana kerja. Oleh karena itu tingkat berikutnya (to be) ditetapkan pada level 3. Untuk mencapai level 3, beberapa rekomendasi diberikan untuk menutupi gap yang telah ditentukan dalam proses APO13 dan DSS05. Data center harus membuat rencana kerja yang rinci, data center yang dikelola dengan baik dan memiliki standar yang jelas untuk diterapkan agar dapat mencapai tujuan bisnis   ABSTRACT A data center of an institution was observed and analyzed in order to get description about its information security.  The data center had ever experienced incidents of information security which is shell injection. As a result, some websites were not accessible for a moment. This incidents can affect business processes of the institution. In order to avoid this problem in the future, this institution needs information security audit. This audit can be done by using Framework COBIT 5. In this research,  an information security audit was conducted to Data Center Information Security by using Framework COBIT 5, focus on the process DSS05 (Manage Security Service) and APO13 (Manage Security). This research was conducted through some stages of initiation, planning the assessment, briefing, data collection, data validation, process attribute level and reporting the result. Form this research, the capability level of APO13 and DSS05 at this moment (as is) worth 1.54 and 1.68 or at level 2, which means process of APO13 and DSS05 had been done and maintained in accordance with the work plan. Therefore the next level (to be) set at level 3. In order to achieve level 3, some recommendations provided to cover the gap that has been determined in the process APO13 and DSS05. The data center have to make a detail work plan, well managed data center and have clear standard to be implemented in order to reach the business goal.How to Cite : Martin, I.M. Arini. Wardani, L. K. (2017). ANALISIS KEAMANAN INFORMASI DATA CENTER  MENGGUNAKAN COBIT 5. Jurnal Teknik Informatika, 10(2), 119-128. doi: 10.15408/jti.v10i2.7026Permalink/DOI: http://dx.doi.org/10.15408/jti.v10i2.7026


Sign in / Sign up

Export Citation Format

Share Document