Comparison analysis of basic job competencies in industries based on needs analysis

2021 ◽  
Vol 6 (2) ◽  
pp. 1-25
Author(s):  
Daejoong Kim
2008 ◽  
Author(s):  
Cara B. Fausset ◽  
Andrew K. Mayer ◽  
Wendy A. Rogers ◽  
Arthur D. Fisk

2008 ◽  
Author(s):  
Mariane Lebeau ◽  
Kathy Darte ◽  
Juan Cargnello
Keyword(s):  

2009 ◽  
Author(s):  
Margaux M. Price ◽  
Richard Pak ◽  
Hendrik Muller ◽  
Aideen Stronge ◽  
Jesse Breedlove

2011 ◽  
Author(s):  
Sara E. McBride ◽  
Wang-Chin Tsai ◽  
Camilla C. Knott ◽  
Wendy A. Rogers

Epigram ◽  
2019 ◽  
Vol 16 (2) ◽  
pp. 99-110
Author(s):  
I Made Wijana ◽  
Anak Agung Putri Suardani ◽  
I Gede Made Karma

This research aims to produce prototype of computer-based business mathematics teaching materials to improve student achievement of Accounting Department, Politeknik Negeri Bali (PNB). In this research, to reach the target of teaching materials of computer-based business mathematics, the development using Borg and Gall method with some modifications into five steps: needs analysis and curriculum majoring in accounting, initial product development, education expert validation, small group trial , and large group trials. Trial of small group and large group by involving first semester student of Diploma IV Managerial Accounting Study Program, Accounting Department, PNB. Based on curriculum analysis and needs analysis, teaching materials are developed in the form of modules with Microsoft Excel application and the result of the initial product are five modules with topics of Formula, Linear and Non Linear Functions, Interest Calculation, Annuity, and Linear Programming. Education expert validation using five aspects resulted in an average score of 4.13 (good). Trial of the teaching materials by measuring student perceptions using three aspects for small groups resulted in an average score of 3.81 (good) and for large groups resulted in an average score of 4.23 (good). Furthermore, results of evaluation in large groups indicate a significant increase in mean of student scores from before and after using computer-based Business Mathematics teaching materials 


CCIT Journal ◽  
2019 ◽  
Vol 12 (2) ◽  
pp. 149-157
Author(s):  
Dewi Immaniar Desrianti ◽  
Giandari Maulani ◽  
Dana Krisdiana

The tight competition between schools in the era of globalization today, requires that the school Ivory Serpong Sower SDK to do the marketing strategy as attractive as possible, in order to enhance the new prospective learner interests as well as improve the quality of and professionalism in the management of the school. It is a promotional effort is used to market products or services to the public, so that they are more familiar with or know the product or service being marketed. Current media information and promotions that use the SDK Sower Ivory Serpong still be printed in the form of banners, brochures and more, so there are still many who have not yet learned about SDK Sower Gading Serpong. The purpose of this research is to inform and promote school SDK Sower Ivory Serpong. Based on a needs analysis is required of media promotion in the form of a video profile, to support information and promotion more attractive and effective by using the software Adobe Premier and Adobe Photoshop. Research methods used namely collecting data through observation, interviews and literature studies, Media Production and concept i.e. preproduction, production and postproduction. Through the design of Video media Profile of this SDK Sower Ivory Serpong can better known to many people and attracting parents to enroll his son in schools � SDK Sower Ivory Serpong


2019 ◽  
Vol 1 (2) ◽  
pp. 25-33
Author(s):  
Mei Ling Phang ◽  
Swee Huay Heng

Information sharing has become prevalent due to the expansion of social networking in this 21st century. However, electronic devices are vulnerable to various kinds of attacks. Information might be disclosed, modified and accessed by an unauthorised third party which consequently leads to the breach of confidentiality, integrity and availability of the information. Therefore, it is of utmost importance to employ the technology of cryptography and steganography to protect information assets. Cryptography and steganography have weaknesses when they are working alone. Therefore, crypto-steganography, the combination of cryptography and steganography are introduced to overcome the weaknesses in order to provide a double layer of security and protection. This paper provides a general overview of steganography and cryptography as well as a comparison analysis of different crypto-steganographic schemes. A secure crypto-steganographic system for healthcare is then developed with the implementation and integration of the secure crypto-steganographic scheme proposed by Juneja and Sandhu. This healthcare system enables users to store and deliver message in a more secure way while achieving the main goals of both cryptography and steganography.


Sign in / Sign up

Export Citation Format

Share Document