scholarly journals CHANGE BUSINESS MODEL OF ISLAMIC RELIGIOUS COLLEGE BUSINESS IN EAST JAVA BY BUILDING INTEGRATED ONLINE POLICY AND TECHNOLOGY SYSTEMS DURING THE COVID-19 PANDEMIC PERIOD

2020 ◽  
Vol 2 (1) ◽  
pp. 66-83
Author(s):  
Ilham M.said ◽  
Heri Cahyo Bagus Setiawan ◽  
Nuzulul Fatimah ◽  
Tatag Herbayu L

This study conducted an analysis and evaluation of business services activities P erguruan T Heigh under the Ministry of Religious Affairs in J awa T imur to create a model of an integrated online system to maximize kan activities of the service business during a pandemic covid 19. Enterprises college business has expanded rapid and during the pandemic covid has made changes to the service online, after the application of social distance in an effort to deal with the spread of the disease corona virus (Covid-19). Initially, an increase in people's interest to shop online was to buy necessities of life very high with many transaction processes. The aim is to provide effective and efficient services to all business transactions conducted online during the pandemic covid19. The methodology used is a qualitative research method with case studies and using purposive samples . The analytical approach used is interpretive analysis. The results of the research show that implementing an integrated online system is able to serve many business transaction processing activities which are greatly improved. So it can be concluded several things as follows: With an integrated online system through planning and organizing business systems can illustrate the various classifications of implementation of business services online business activities in order to facilitate all forms of business transaction processes quickly, effectively and efficiently during Covid-19. System integration of online ie business opportunities using technology that can deliver greater value for the business of the college that the college of business can be developed and can be maintained as well as helping people to meet their needs and facilitate online transactions.

2020 ◽  
Vol 10 (2) ◽  
pp. 381
Author(s):  
Mary Ismowati ◽  
Ahmad Hidayat Rahadian ◽  
Muhammad Ali Massyhury ◽  
Muhammad Rafi Suryadi

The aim of the study was to obtain a formulation of the implementation of the One-Stop Services Policy (PTSP) in the North Jakarta Administrative City, namely the implementation of Perda No. 12 of 2013, and the Implementation of Presidential Regulation No. 91 of 2017 concerning the acceleration of ease of doing business through the implementation of an information technology-based licensing system (OSS). The research method used a qualitative approach by conducting interviews with a number of informants to determine the conditions and phenomena of the implementation of PTSP policies in North Jakarta. The research involved two research members from students in the framework of thesis research. The results of the research show that implementers have understood their duties and functions, but in the smooth running of their duties, they are constrained by a lack of human resources both in quantity and quality, support for information technology equipment that is not up to date, including the availability of information technology personnel at the district and sub-district levels. Then the OSS policy according to PP No. 24/2018 has not been fully effective, because it has not been fully integrated with the existing licensing system in PM-PTSP DKI Jakarta, namely JakEVO. The main obstacle to policy implementation, namely in terms of human resources, employee status has not been transferred to functional positions so that it affects career ranks and motivation. In addition, there is no HR competency standard for services, for online system services are not implemented according to target. The solution to overcome the obstacles conceptually has not been done.


Author(s):  
Denis Trcek

Security as we perceive it today became a topic of research with the introduction of networked information systems, or networked ISs, in the early 1980s. In the mid-1990s the proliferation of the Internet in the business area exposed security as one of the key factors for successful online business, and the majority of efforts to provide it were focused on technology. However, due to lessons learned during this period, the paradigms have since changed, with increasing emphasis on human factors. It is a fact that security of networked ISs is becoming part of the core processes in all e-business environments. While data is clearly one of the key assets and has to be protected accordingly, ISs have to be highly integrated and open. Appropriate treatment of these contradictory issues is not a trivial task for managers of contemporary intelligent organizations. It requires new approaches, especially in light of new technologies.


2019 ◽  
Author(s):  
Ronal Watrianthos

Decision of running business is the result of interaction of several factors, namely the character of a person's personality and environmental influences. A family relationships, friends, relatives, educational environment, social rules in society and religious that can influence one's intentions running a business. Theory of Planned Behavior explains that the intention of doing online business among students is influenced by some variable such as attitudes, subjective norms, and perceive behavioral control. Furthermore, these three variables are influenced by several backgrounds which influence it, such as social, personal / individual background, and information. A number of research results show that the intention of doing online business for each students can vary depending on their social environment, age, gender, level of education, science, level of income, belief/ religion, or the influence of exposure to information which affects their experience, besides the influence of personality and the personal intellectuality of the student. These results of research show that the Theory of Planned Behavior have implications in explaining the phenomenon of intention to run online business among students


2009 ◽  
pp. 2115-2130
Author(s):  
Wei-Chuen Yau ◽  
G. S. V. Radha Krishna Rao

Web services enable the communication of application- to-application in a heterogeneous network and computing environment. The powerful functionality of Web services has given benefits to enterprise companies, such as rapid integrating between heterogeneous e-business systems, easy implementation of e-business systems, and reusability of e-business services. While providing the flexibility for e-business, Web services tend to be vulnerable to a number of attacks. Core components of Web services such as simple object access protocol (SOAP), Web services description language (WSDL), and universal description, discovery, and integration (UDDI) can be exploited by malicious attacks due to lack of proper security protections. These attacks will increase the risk of e-business that employs Web services. This chapter aims to provide a state-of-the-art view of Web services attacks and countermeasures. We examine various vulnerabilities in Web services and then followed by the analysis of respective attacking methods. We also discuss preventive countermeasures against such attacks to protect Web services deployments in e-business. Finally, we address future trends in this research area.


2013 ◽  
Vol 712-715 ◽  
pp. 3106-3111 ◽  
Author(s):  
Qi Feng Xiao ◽  
Yong Wang ◽  
Ying Wang

For numerous public security business systems, public security business's limitation of lack of system integration, uncentralized management, lower intelligence technology more prominent. Through the analysis of the relevant features of Emergency Disposal Platform (EDP) and the collaborative, think its collaboration with Multi - agent have a strong fit. For this reason, based on the multi-agent technology, the platform architecture of EDP in the cooperative model is proposed. The platform integrates video analysis, integrated monitor and rescue in EDP, and has more powerful perceptiveness, initiative, and self-adaptability. The paper adopts a management method of combining the centralization and distribution and classifies the functions of the agent and analyses what the members are and their cooperative relation. In addition, with the research on coordination mechanism by using of Blackboard Model and Contract Net Protocol, the MA cooperative operation control scheme on EDP is designed.


Author(s):  
Denis Trcek

Security became a topic of research with the introduction of networked information systems, or networked IS, in the early eighties. In the mid-nineties the proliferation of the Internet in the business area exposed security as one of the key factors for successful online business, and the majority of effort to provide it was focused on technology. However, due to lessons learned during this period, the paradigms have since changed, with increasing emphasis on human factors. It is a fact that security of information systems is becoming part of the core processes in all e-business environments. While data is clearly one of the key assets and has to be protected accordingly, IS have to be highly integrated and open. Appropriate treatment of these issues is not a trivial task for managers of intelligent enterprises and requires new approaches, especially in light of new technologies.


2021 ◽  
Vol 19 (2) ◽  
pp. 183-193
Author(s):  
Foluso Philip Adekanmbi ◽  
Wilfred Ukpere

This paper explores the impact of frugality and materialism on workplace deviant behaviors in business organizations. The investigation sample was drawn from selected business organizations (Stanbic IBTC Bank, Globacom Limited, International Alpha Limited, and Nextzon Business Services Firm) across the Ibadan and Lagos cities of Nigeria. This study espouses a quantitative research approach, and the study’s questionnaires were randomly dispersed. Out of 400 questionnaires, 323 questionnaires were useful for investigation, and the data obtained were analyzed using SPSS version 26. The research results show that the frugal are less likely to engage in workplace deviant behaviors, while materialists are more inclined to exhibit workplace deviant behaviors in business organizations. This paper further indicates that demographics (gender, marital status, and educational qualification) have a statistical effect on workplace deviant behavior. It was confirmed that frugality, materialism, and employee demographics significantly influenced workplace deviant behaviors in business organizations. Therefore, business organizations’ leadership and management should encourage frugality, thereby directly reducing employee workplace deviant behaviors. Besides, the main focus should be on reducing materialistic tendencies through periodic training and seminars on debt prevention, particularly among vulnerable employees who discourage workplace deviant behaviors. AcknowlendgmentThe authors acknowledge the Department of Industrial Psychology and People Management, College of Business and Economics, University of Johannesburg, under Professor Wilfred Ukpere, for funding this study and publishing it.


Sign in / Sign up

Export Citation Format

Share Document