Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 3 dokumen yang sesuai dengan query
cover
Muhammad Ihsan Jalil
"Penelitian ini bertujuan untuk mengetahui pengaruh dari flow pada advergames terhadap purchase intention bagi para pemain game yang berasal dari generasi Z. Selain itu, tujuan lain dari penelitian ini adalah untuk menguji pengaruh dari lima prasyarat terjadinya flow, yaitu keterampilan, tantangan, interaktivitas, focused attention, dan telepresense pada pengaruh flow saat memainkan advergame. Sampel yang peneliti gunakan dalam penelitian ini merupakan penduduk Indonesia yang berasal dari generasi Z yang aktif bermain game dalam kurun waktu 6 bulan terakhir. Data penelitian ini dikumpulkan menggunakan media kuesioner daring dari Google form dan dilakukan dengan sampel sebanyak 244 responden yang berasal dari generasi Z dan secara aktif bermain game. Pengolahan data dalam penelitian ini dilakukan dengan metode structural equation (SEM) yang menunjukkan hasil bahwa flow akan berpengaruh terhadap purchase intention pada merek yang diiklankan menggunakan advergame bagi generasi Z.

This study aims to determine the effect of flow on advergames on purchase intention for game players who come from generation Z. In addition, another purpose of this study is to examine the effect of the five prerequisites for flow, namely skills, challenges, interactivity, focused attention. , and telepresense on the effect of flow when playing advergames. The sample that the researchers used in this study were Indonesian residents from Generation Z who were actively playing games in the last 6 months. This research data was collected using an online questionnaire from Google form and was conducted with a sample of 244 respondents who came from generation Z and actively played games. Data processing in this study was carried out using the structural equation (SEM) method which showed the results that flow would affect purchase intention on brands advertised using advergames for generation Z."
Depok: Fakultas Ekonomi dan Bisnis Universitas Indonesia, 2021
S-pdf
UI - Skripsi Membership  Universitas Indonesia Library
cover
Sosthene Bwigenge
"Nowadays, there is an exponential growth in information and communication technologies that influence mobile technologies and services utilization. These have had a pervasive impact on both society and our daily lives. In Rwanda, mobile technologies and services have become tools for accessing services in different social-economic business activities. Mobile technologies and services have become the place to store valuable information. Consequently, this makes mobile technologies and services targets for social engineering attacks that want to get unauthorized access to this information and use it for malicious purposes. Smishing attacks are common social engineering attacks that pose challenges to the utilization of mobile technologies and services. Therefore, smishing attack risks have negative effects on the perception of mobile technologies and service users. Both the Technology Acceptance Model and Routine Activity Theory have been used to assess smishing attack risks on mobile technologies and services. This study used both quantitative and qualitative methods to identify and examine how smishing attack risks negatively affect the perception of mobile technologies and service users. The researchers organized a survey of 400 respondents from four provinces of Rwanda and Kigali city. This study used Rwanda as the case study because Rwanda has fully adopted mobile technology and services to access services. The model, made up of 10 variables, has been used by this research study to identify how smishing attacks risk on mobile service quality resulted in a negative influence on the perception of mobile technology and service users. Data analysis results have found that one (Social Influence) of the variables is not significant. The remaining variables (Awareness, Perceived Usefulness, Service Quality, Perceived Security, Perceived Consequences, Perceived Vulnerability, Perceived Victimization, Satisfaction, and intention to use mobile devices) are significant. Based on international standards and best practices, this study created mobile information security management strategies to reduce the risks of smishing attacks on mobile service quality, improve and enhance service quality, enhance mobile information security, and increase the mobile device users’ satisfaction, perceived usefulness, and intention to use mobile devices in service delivery in Rwanda.

Mobile technology and services have become useful tools in service activities in Rwanda and store valuable information assets. This makes attacks targeted at them get unauthorized access to this information. Smishing is one of the attacks challenging the use of mobile technology and services. The risks of smishing attacks have negative effects on the perception of mobile technology and service users. The Technology Acceptance Model and Routine Activity Theory have been used to assess the smishing attack risks on mobile technology and services. This study used quantitative and qualitative methods to identify how smishing attack risks negatively affect the perception of mobile technologies and service users. 400 respondents from all corners of Rwanda. Rwanda was a case study because Rwanda has fully adopted mobile technology and services. The model, made up of 10 variables, has been used to identify how smishing attacks risk on mobile service quality and how they negatively influence the perception of mobile technology and service users. Data analysis results have found that one of the variables is not significant. The remaining variables are significant. Based on international standards and best practices, the author created mobile information security management strategies to reduce the risk of smishing attacks. "
Depok: Fakultas Ilmu Komputer Universitas Indonesia, 2021
T-pdf
UI - Tesis Membership  Universitas Indonesia Library
cover
Jamalipour, Abbas
"This textbook introduces Wireless Powered Communication Networks (WPCNs) as a promising paradigm to overcome the energy bottleneck suffered by traditional wireless communication networks, as well as emerging Internet-of-Things networks. It selectively spans a coherent spectrum of fundamental aspects in WPCNs, such as wireless energy transfer (WEH) techniques, radio frequency (RF) energy harvesting receiver model, simultaneous wireless information and power transfer (SWIPT), as well as the rate-energy tradeoff arising from the joint transmission of information and energy using the same waveform. It covers network models for WPCNs, including the baseline and dual-hop WPCN models and a variety of related extensions. This book further examines the key factors including throughput, fairness, and security that must be taken into account for impeccable operation of WPCNs. The new IoT applications are targeted as a key element in those factors. It will also include exercises and examples throughout the book, as well as their PLS solutions.
This is the first textbook examining the current research to provide a unified view of wireless power transfer (WPT) and information transmission in WPCNs from a physical layer security (PLS) perspective. Focused on designing efficient secure transmission schemes, analyzing energy evolvement process, and evaluating secrecy outage performance under different channel state information (CSI), the results presented in this book shed light on how to best balance security and throughput with prudent use of harvested energy in WCNs. It also provides an overview of the WPCNs by introducing the background of WPT, followed by a summary of the research conducted in the field. The authors describe the physical-layer security (PLS) problem in WPCNs, including the causes and the impacts of the problem on the performance of WPCNs. The authors extend the discussions by introducing the applications of WPCNs in the IoT.
From the Internet of Things (IoT) point of view, this textbook reviews the opportunities and challenges for the lately-emerged WPCN to seamlessly integrate into the IoT ecosystem. It specifically addresses the maximization problem of uplink and downlink sum-throughout in a dual-hop WPCN, while taking fairness among WPCN users as a constraint. The results provided in this book reveal valuable insights into improving the design and deployment of future WPCNs in the upcoming IoT environment.
This textbook targets advanced-level students studying wireless communications and research engineers working in this field. Industry engineers in mobile device and network development business with an interest in WPCNs and IoT, as well as their PLS solutions, will also find this book useful."
Switzerland: Springer Cham, 2019
e20502860
eBooks  Universitas Indonesia Library