Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 5 dokumen yang sesuai dengan query
cover
Insan Laksana Pribadi
"ABSTRAK
Internet of Things IoT merupakan salah satu teknologi yang sedang berkembang dimana memungkinkan setiap benda seperti alat kesehatan, mesin produksi, mobil, TV, benda lainnya dapat saling terhubung melalui internet. Namun, terdapat beberapa tantangan yang perlu menjadi perhatian semua pihak, salah satunya adalah potensi ancaman terhadap keamanan data dan privasi.Di Indonesia sendiri, sudah ada regulasi yang mengatur keamanan data dan transaksi elektronik. Regulasi tersebut antara lain PP No. 82 Tahun 2012, UU No. 11 Tahun 2008, dan Permen Kominfo No. 4 Tahun 2016. Namun ketiga regulasi tersebut tidak secara spesifik mengatur masalah keamanan data dan privasi pada layanan Internet of Things IoT . Sehingga di perlukan sebuah regulasi yang khusus mengatur masalah keamanan data dan privasi pada layanan IoT.Penelitian ini menggunakan metode Privacy Impact Assessment PIA dan mengambil salah satu domain IoT, yakni Smart Healthcare. Sebagai hasil dari penelitian, di dapat 5 faktor yang perlu di atur dalam regulasi terkait aspek keamanan data dan privasi pada layanan Internet of Things Smart Heathcare , yakni security compliance, device security, secure communication, virtualization security, dan application security. Untuk security compliance, di rekomendasikan untuk menerapkan sertifikasi ISO/TC 215 Health Informatics. Untuk aspek device security, direkomendasikan untuk menerapkan Trusted Computing Base TCB . Untuk aspek secure communication di haruskan menggunakan Virtual Private Network VPN . Untuk aspek virtualization security, di haruskan menerapkan beberapa mitigasi seperti provisioning, hardening, firewall, access control, dan IDPS. Dan untuk aspek application security, di haruskan untuk menerapkan beberapa mitigasi seperti secure programming, static code analysis, automated pentest, dan web application firewall.

ABSTRACT
Internet of Things IoT is one of the emerging technologies which allow any objects such as medical equipment, production machinery, cars, TVs, and other objects can be interconnected through the Internet. However, there are several challenges that need to be considerate of all parties, one of which is a potential threat to data security and privacy.In Indonesia, there are some existing regulations governing the security of data and electronic transactions. PP No. 82 Tahun 2012, UU No. 11 Tahun 2008, and Permen Kominfo No. 4 Tahun 2016 about Information Security Management System ISMS . However, these three regulations are not specifically control the issue of data security and privacy on the services of Internet of Things IoT . Thus, required a special regulation governing the data security and privacy on services of Internet of Things IoT .This research using Privacy Impact Assessment PIA methods and take one of the IoT domain, Smart Healthcare. As a result, there are 5 factors that need to be set in regulations related aspects of data security and privacy on the Internet of Things services Smart Heathcare security compliance, device security, secure communications, virtualization security, and application security. For security compliance, it 39 s recommended to apply ISO TC 215 Health Informatics. For the aspects of security devices, it is recommended to implement the Trusted Computing Base TCB . For secure communication aspects in required to use a Virtual Private Network VPN . For security aspects of virtualization, in required to apply some mitigation such as provisioning, hardening, firewalls, access control, and IDPS. And for aspects of application security, be required to implement some mitigation such as secure programming, static code analysis, automated pentest, and web application firewall."
2017
T46908
UI - Tesis Membership  Universitas Indonesia Library
cover
"This book features research work presented at the 2nd International Conference on Data Engineering and Communication Technology (ICDECT) held on December 15–16, 2017 at Symbiosis International University, Pune, Maharashtra, India. It discusses advanced, multi-disciplinary research into smart computing, information systems and electronic systems, focusing on innovation paradigms in system knowledge, intelligence and sustainability that can be applied to provide feasible solutions to varied problems in society, the environment and industry. It also addresses the deployment of emerging computational and knowledge transfer approaches, optimizing solutions in a variety of disciplines of computer science and electronics engineering."
Singapore: Springer Singapore, 2019
e20502820
eBooks  Universitas Indonesia Library
cover
Danarto Tri Sasongko
"Penelitian terkait faktor-faktor yang memengaruhi penggunaan aplikasi uang elektronik masih didominasi oleh fase adopsi awal. Penelitian terhadap faktor-faktor yang memengaruhi kontinuitas penggunaan aplikasi uang elektronik terutama di Indonesia masih sedikit dan lebih banyak membahas tentang kinerja maupun kualitas aplikasi. Penelitian ini menggunakan kerangka kerja Expecation-Confirmation Model (ECM) untuk mengeksplorasi faktor Perceived Usefulness, Perceived Security & Privacy, Trust dan Satisfaction yang memengaruhi kontinuitas pengguna aplikasi uang elektronik. Selain itu, penelitian juga menyelidiki seberapa kuat pengaruh anteseden Perceived Security & Privacy, dan Trust yaitu Security Technology Protection, Security Rules & Policy, Security Responsibility Commitment, Coverage of Mobile Payment Context, dan Uncertainity Avoidance. Penelitian ini menggunakan pendekatan kuantitatif dengan sumber data berupa hasil survei yang dikumpulkan melalui kuesioner online dengan responden sebanyak 426 orang. Pengolahan data menggunakan metode Covariance- Based Structural Equation Modeling (CB-SEM) dengan bantuan aplikasi Amos 26.0. Hasil penelitian menunjukkan bahwa kontinuitas penggunaan aplikasi uang elektronik dipengaruhi secara kuat oleh Perceived Usefulness, Satisfaction dan Trust. Trust secara mayoritas dipengaruhi oleh Perceived Security & Privacy. Security Responsibility Commitment merupakan faktor penting yang harus ditingkatkan karena dapat memengaruhi Trust secara langsung maupun tidak langsung melalui Perceived Security & Privacy. Selain Security Responsibility Commitment, Perceived Security & Privacy juga dipengaruhi oleh Security Technology Protection dan Uncertainity Avoidance. Penelitian ini berkontribusi untuk meningkatkan pemahaman dan memberikan pedoman bagi peningkatan kontinuitas penggunaan aplikasi uang elektronik terutama di negara berkembang.
......Researches related to the factors that influence the use of electronic money application are still dominated by the early adoption phase. Not many researches on the factors that affect the continuance use intention of electronic money in Indonesia, and mostly discusses only the performance and quality of applications. This study uses an Expecation-Confirmation Model (ECM) framework to explore the factors of Perceived Usefulness, Perceived Security & Privacy, Trust and Satisfaction that affect the continuance use intention of electronic money applications. In addition, this research also investigates how strong the antecedents of Perceived Security & Privacy and Trust namely Security Technology Protection, Security Rules & Policy, Security Responsibility Commitment, Coverage of Mobile Payment Context, and Uncertainity Avoidance. This study uses a quantitative approach with data sources are collected using online survey questionnaires with 426 respondents. Covariance-Based Structural Equation Modeling (CB-SEM) method with the help of the Amos 26.0 application are used for data processing.The results show that the continuance use intention of electronic money applications is strongly influenced by Perceived Usefulness, Satisfaction and Trust. Trust is largely influenced by Perceived Security & Privacy. Security Responsibility Commitment is an important factor that must be improved because it can affect trust directly or indirectly through Perceived Security & Privacy. Apart from Security Responsibility Commitment, Perceived Security & Privacy is also influenced by Security Technology Protection and Uncertainity Avoidance. This research contributes for increasing understanding and providing guidelines to increase the continuance use intention of electronic money applications, especially in developing countries."
Depok: Fakultas Ilmu Komputer Universitas Indonesia, 2021
TA-pdf
UI - Tugas Akhir  Universitas Indonesia Library
cover
"The book provides insights from the 2nd International Conference on Communication, Computing and Networking organized by the Department of Computer Science and Engineering, National Institute of Technical Teachers Training and Research, Chandigarh, India on March 29–30, 2018. The book includes contributions in which researchers, engineers, and academicians as well as industrial professionals from around the globe presented their research findings and development activities in the field of Computing Technologies, Wireless Networks, Information Security, Image Processing and Data Science. The book provides opportunities for the readers to explore the literature, identify gaps in the existing works and propose new ideas for research."
Singapore: Springer Singapore, 2019
e20502589
eBooks  Universitas Indonesia Library
cover
"This book introduces concepts and technologies of Intelligent Transportation Systems (ITS). It describes state of the art safety communication protocol called Dedicated Short Range Communication (DSRC), currently being considered for adoption by the USDOT and automotive industry in the US. However, the principles of this book are applicable even if the underlying physical layer protocol of V2X changes in the future, e.g. V2X changes from DSRC to cellular-based connectivity.
Fundamental ITS concepts include topics like global positioning system; Vehicle to Vehicle (V2V), Vehicle to Pedestrian (V2P), and Vehicle to Infrastructure (V2I) communications; human-machine interface; and security and privacy. Fundamental concepts are sometimes followed by the real-life test experimental results (such as in V2P Chapter) and description of the performance metrics used to evaluate the results. This book also describes equations and math used in the development of the individual parts of the system.
This book surveys current and previous publications for trending research in the ITS domain. It also covers state of the art standards that are in place for the DSRC in the US, starting from the application layer defined in SAE J2735 all the way to physical layer defined in IEEE 802.11.
The authors provide a detailed discussion on what is needed to extend the current standards to accommodate future needs of the vehicle communications, such as needs for future autonomous vehicles. Programs and code examples accompany appropriate chapters, for example, after describing remote vehicle target classification function a pseudo code and description is provided. In addition, the book discusses current topics of the technology such as spectrum sharing, simulation, security, and privacy.
The intended audience for this book includes engineering graduate students, automotive professionals/engineers, researchers and technology enthusiasts."
Switzerland: Springer Cham, 2019
e20502913
eBooks  Universitas Indonesia Library