A Java Based Multi-tier Architecture For Enterprise Computing: A Case Study From An University Academic Information System

Author(s):  
Shiuh-Sheng Yu ◽  
Wen-Chin Chen
Author(s):  
Sandra Irawan ◽  
Susan Foster ◽  
Kerry Tanner

Under the scenario of contingent authority innovation-decision, organisation managers make the initial decision to adopt an innovation and mandate its use to the employees. Although accelerating adoption by the employees, the ensuing stages of implementation are often problematic partly due to its non-voluntary nature. Utilising an interpretive case study, this research aimed to explore the nature of the mandated adoption and implementation of an Academic Information System (AIS) for academics in an Indonesian University. Gallivan’s (2001b) framework for innovation adoption and implementation was modified and then applied as a lens to investigate the case. The results indicated that the mediating factors (i.e., managerial interventions, subjective norms, and facilitating conditions) played a vital role in reducing the resistance resulting from the authoritarian approach to mandating usage. Based on the findings, contributions were made by extending the existing framework and providing insights for the university executives regarding the pre- and post- implementation managerial interventions.


Most of modeling in information system used case study. The academic information system also can use the case study method. In a higher education institution who has implemented the Education 3.0 concept, the modeling of academic information system must be combined the method with a suitable framework with Education 3.0 concept. This research will propose the most suitable research framework for modeling of academic information system in higher education institution who has implemented Education 3.0 concept.


2015 ◽  
Vol 77 (22) ◽  
Author(s):  
Ahmadiar Ahmadiar ◽  
Sayed Muchallil

In the last decades, some extensive research explored new algorithms and protocols how to secure data or user information using password and username. There are new methods such as biometrics. The drawback of this method is that it needs other hardware or device. On the other hand, the username and password combination to authenticate user identity has been widely used because cheap and user-friendly. The latter method has some weakness such as dictionary attack, brute force or other method. The purpose of this research to find out the weakness of freshmen chosen password to protect their identity in the Academic Information System. The experiment is done in a public university in Indonesia. This research carried on around 12 faculties and 102 departments. The freshmen at this university is around 6499 students. The sampling method is population, so that all the freshmen student account investigated. The first scenario is to find out how many students use the same password as username. The second scenario is a dictionary attack on some freshmen account that cannot be found on the first scenario. The result of this experiment about 60% to 75% of freshmen’s password in each faculty can be guessed because the students used the same username and password. Other method used in this research has been revealed more password from freshmen.  


Author(s):  
Arfan Sansprayada ◽  
Kartika Mariskhana

Abstract—The need for information system development in a company is a basic requirement that must be met by each company in order to run its business processes properly. This is the basic key in a company in order to provide maximum results to find as many profits or profits. Application development or requirements in the application also provide speed for employees to carry out their activities to work properly and optimally. The development of the era requires that companies must be productive and have innovations so that the business wheel of the company can run well. This is based on the development of technology that is so fast that it requires special expertise in its application. This research is expected to be able to help some problems that exist in a company. Where its application can make it easier for employees to carry out their respective duties and roles in order to maximize their potential. For companies, the application of this application can accommodate the company's business wheels so that they can be properly and correctly documented .   Keywords : Systems, Information, Applications


Sign in / Sign up

Export Citation Format

Share Document