Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 40353 dokumen yang sesuai dengan query
cover
"This book constitutes selected papers from the 14th European, Mediterranean, and Middle Eastern Conference, EMCIS 2017, held in Coimbra, Portugal, in September 2017. EMCIS is focusing on approaches that facilitate the identification of innovative research of significant relevance to the IS discipline following sound research methodologies that lead to results of measurable impact. The 37 full and 16 short papers presented in this volume were carefully reviewed and selected from a total of 106 submissions. They are organized in sections on big data and Semantic Web; digital services, social media and digital collaboration; e-government; healthcare information systems; information systems security and information privacy protection; IT governance; and management and organizational issues in information systems."
Cham: Springer, 2017
004 INF
Buku Teks  Universitas Indonesia Library
cover
Hakikur Rahman, editor
"This book constitutes the proceedings of the 7th Mediterranean Conference on Information Systems, MCIS 2012, held in Guimaraes, Portugal, in September 2012. MCIS 2012 comprised theories, research, and practices based on knowledge management and innovations in organizations, society, and businesses. The 18 full papers presented in this volume were carefully reviewed and selected from 89 submissions. They are organized in topical sections on: emerging and innovative information systems, enterprise systems and enterprise engineering, Web 2.0 enabled business models, information quality management and data accuracy in innovative IS, and ICT applications in healthcare."
Berlin: [, Springer-verlag], 2012
e20409988
eBooks  Universitas Indonesia Library
cover
cover
Singapore: Springer, 2018
004 SOF
Buku Teks  Universitas Indonesia Library
cover
"Information security analytics gives you insights into the practice of analytics and, more importantly, how you can utilize analytic techniques to identify trends and outliers that may not be possible to identify using traditional security analysis techniques.
Information security analytics dispels the myth that analytics within the information security domain is limited to just security incident and event management systems and basic network analysis. Analytic techniques can help you mine data and identify patterns and relationships in any form of security data. Using the techniques covered in this book, you will be able to gain security insights into unstructured big data of any type.
The authors of information security analytics bring a wealth of analytics experience to demonstrate practical, hands-on techniques through case studies and using freely-available tools that will allow you to find anomalies and outliers by combining disparate data sets. They also teach you everything you need to know about threat simulation techniques and how to use analytics as a powerful decision-making tool to assess security control and process requirements within your organization. Ultimately, you will learn how to use these simulation techniques to help predict and profile potential risks to your organization."
Waltham, MA: Syngress, 2015
e20427024
eBooks  Universitas Indonesia Library
cover
"These four volumes (CCIS 297, 298, 299, 300) constitute the proceedings of the 14th International Conference on Information Processing and Management of Uncertainty in Knowledge-Based Systems, IPMU 2012, held in Catania, Italy, in July 2012. The 258 revised full papers presented together with six invited talks were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on fuzzy machine learning and on-line modeling, computing with words and decision making, soft computing in computer vision, rough sets and complex data analysis: theory and applications, intelligent databases and information system, information fusion systems, philosophical and methodological aspects of soft computing, basic issues in rough sets, 40th anniversary of the measures of fuziness, SPS11 uncertainty in profiling systems and applications, handling uncertainty with copulas, formal methods to deal with uncertainty of many-valued events, linguistic summarization and description of data; fuzzy implications: theory and applications, sensing and data mining for teaching and learning, theory and applications of intuitionistic fuzzy sets, approximate aspects of data mining and database analytics, fuzzy numbers and their applications, information processing and management of uncertainty in knowledge-based systems, aggregation functions, imprecise probabilities, probabilistic graphical models with imprecision: theory and applications, belief function theory: basics and/or applications, fuzzy uncertainty in economics and business, new trends in De Finetti's approach, fuzzy measures and integrals, multi criteria decision making, uncertainty in privacy and security, uncertainty in the spirit of Pietro Benvenuti, coopetition, game theory, and probabilistic approach."
Berlin : Springer-Verlag, 2012
e20410599
eBooks  Universitas Indonesia Library
cover
Laudon, Kenneth C., 1944-
Fortworter : The Dryden Press , 1995
005.04 LAU i
Buku Teks SO  Universitas Indonesia Library
cover
Ariawan Andi Suhandana
"Direktorat Jenderal Kelembagaan Iptek dan Dikti dalam melakukan tugas dan fungsi kelembagaan membutuhkan ketersedian data yang cepat dan akurat. Seiring dengan berjalannya waktu, kebutuhan akan sistem informasi pengelolaan data perguruan tinggi sangat diperlukan terutama data perguruan tinggi yang bermasalah, saat ini pengelolaan yang dilakukan dengan cara manual yang disimpan kedalam file excel yang tentu saja mempunyai keterbatasan yang sangat banyak. Hal tersebut mengakibatkan permasalahan dalam pengawasan proses dan permasalahan pada perguruan tinggi yang bermasalah. Untuk mengatasi permasalahan tersebut dibutuhkan perancangan sistem informasi perguruan tinggi bermasalah yang dapat memenuhi proses bisnis yang ada.
Dalam penilitian ini dilakukan perancangan Requirements sistem informasi yang memenuhi kebutuhan pengolahan yang ada saat ini. Perancangan ini menggunakan metode Rational Unified Process, dimana perancangan mengikuti workflow requirements dan dilakukan secara iteratif sebanyak 3 iterasi. Hasil penelitian berupa dokumen Requirement Artefact Set yang menjabarkan secara rinci kebutuhan dari sistem informasi pengolahan.

Directorate General of Institutional Affairs of Science, Technology and Higher Education in performing tasks and institutional functions requires the availability of data quickly and accurately. Along with the passage of time, the need for information systems of university data management is very necessary especially the data of colleges in violation. Currently, the management is manually stored into excel files which of course have a lot of limitations. This practice resulted in problems in the supervision of the process as well as the problems at the college in violation. To overcome these problems, it is required the design of information systems for problematic colleges that can meet existing business processes.
This research used the design of requirements information system that meets the existing processing needs. This design employs the Rational Unified Process method, where the design follows the workflow requirements and is done iteratively as much as 3 iterations. The results of the study are the Requirement Artefact Set document that elaborates in detail the needs of the problematic college information system."
Depok: Fakultas Ilmu Komputer Universitas Indonesia, 2016
TA-Pdf
UI - Tugas Akhir  Universitas Indonesia Library
cover
"This book constitutes the refereed proceedings of the 24th International Conference on Advanced Information Systems Engineering, CAiSE 2012, held in Gdansk, Poland, in June 2012. The 42 revised full papers, 2 full-length invited papers and 4 short tutorial papers, were carefully reviewed and selected from 297 submissions. The contributions have been grouped into the following topical sections, business process model analysis, service and component composition, language and models, system variants and configuration, process mining, ontologies, requirements and goal models, compliance, monitoring and prediction, services, case studies, business process design, feature models and product lines, and human factors."
Berlin: Springer-Verlag , 2012
e20406309
eBooks  Universitas Indonesia Library
cover
"The book gathers a collection of high-quality peer-reviewed research papers presented at the International Conference on Data and Information Systems (ICDIS 2017), held at Indira Gandhi National Tribal University, India from November 3 to 4, 2017. The book covers all aspects of computational sciences and information security. In chapters written by leading researchers, developers and practitioner from academia and industry, it highlights the latest developments and technical solutions, helping readers from the computer industry capitalize on key advances in next-generation computer and communication technology."
Singapore: Springer Singapore, 2019
e20501664
eBooks  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>