Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 9 dokumen yang sesuai dengan query
cover
Isnen Nuril Fajar
Depok: Fakultas Teknik Universitas Indonesia, 1998
S39481
UI - Skripsi Membership  Universitas Indonesia Library
cover
Stallings, William
New Jersey: Prentice Hall International, 1998
005.13 STA h
Buku Teks  Universitas Indonesia Library
cover
Stallings, William
New Jersey: Prentice-Hall, 2001
004.22 STA b
Buku Teks SO  Universitas Indonesia Library
cover
Purser, Michael
Workingham, England: Addison-Wesley, 1986
005.71 PUR d
Buku Teks  Universitas Indonesia Library
cover
Markley, Richard W.
London: Prentice-Hall, 1990
001.64 MAR d
Buku Teks SO  Universitas Indonesia Library
cover
Markley, Richard W.
London: Prentice-Hall, 1990
001.64 MAR d
Buku Teks SO  Universitas Indonesia Library
cover
Musfiah Saidah
Abstrak :
Tesis ini membahas peran aktor yang terlibat dalam  mewujudkan kedaulatan data di Indonesia dengan melihat keterkaitan dan relasi  manusia dan non manusia dalam praktiknya melibatkan teknologi. Selain itu, penelitian ini menggunakan konsep kedaulatan data untuk memahami pengolahan informasi yang sesuai dengan praktik, hukum dan kebutuhan suatu negara. Penelitian ini menggunakan pendekatan kualitatif dengan paradigma postpositivis. Metode penelitian ini yaitu multi-metode dengan menggunakan strategi penelitian studi kasus (case study) dan penelitian aksi (action research) dengan Soft System Methodology (SSM). Temuan dari penelitian ini menunjukkan kedaulatan data di Indonesia disebabkan oleh lima hal yaitu kognisi, regulasi, infrastruktur, ekonomi dan kepercayaan. Berdasarkan model yang terbentuk diketahui jika dalam penerapan kedaulatan data perlu ditetapkan klasifikasi yang jelas antara data pribadi dan data publik yang boleh disampaikan dan yang di rahasiakan. Terdapat sebuah jaringan antara aktor manusia dan aktor non-manusia untuk membentuk kedaulatan data dengan berorientasi pada nilai ekonomi dan keamanan data. Dalam upaya perwujudannya diperlukan regulasi yang mengatur aturan penerapan dan jaminan keamanan terhadap data.
This thesis discusses the role of actors involved in realizing data sovereignty in Indonesia by looking at the relationships and relationships of humans and non-humans in practice involving technology. Besides, this study uses the concept of data sovereignty to understand information processing by the practice, law, and needs of a country. This research uses a qualitative approach with a postpositivist paradigm. This research method is multi-method using case study and action research with Soft System Methodology (SSM). The findings of this study indicate the sovereignty of data in Indonesia is caused by five things namely cognition, regulation, infrastructure, economy, and trust. Based on the model formed, it is known that in the application of data sovereignty, it is necessary to establish clear classifications between private data and public data that may be submitted and which are kept confidential. There is a network between human actors and non-human actors to form data sovereignty oriented towards economic value and data security. It is needed regulations that regulate the rules of application and guarantee of security against data.
Depok: Fakultas Ilmu Sosial dan Ilmu Politik Universitas Indonesia, 2019
T55341
UI - Tesis Membership  Universitas Indonesia Library
cover
Fakultas Teknik Universitas Indonesia, 1993
S38650
UI - Skripsi Membership  Universitas Indonesia Library
cover
Abstrak :
This 16th International Conference on Information Technology - New Generations (ITNG), continues an annual event focusing on state of the art technologies pertaining to digital information and communications. The applications of advanced information technology to such domains as astronomy, biology, education, geosciences, security and health care are among topics of relevance to ITNG. Visionary ideas, theoretical and experimental results, as well as prototypes, designs, and tools that help the information readily flow to the user are of special interest. Machine Learning, Robotics, High Performance Computing, and Innovative Methods of Computing are examples of related topics. The conference features keynote speakers, the best student award, poster award, service award, a technical open panel, and workshops/exhibits from industry, government and academia.
Switzerland: Springer Nature, 2019
e20505426
eBooks  Universitas Indonesia Library