首页 > 最新文献

2018 International Conference on Advanced Computer Science and Information Systems (ICACSIS)最新文献

英文 中文
The Determinant Factors of Individual Performance from Task Technology Fit and IS Success Model perspectives: a case of Public Procurement Plan Information System (SIRUP) 基于任务技术匹配和信息系统成功模型的个人绩效决定因素研究——以政府采购计划信息系统(SIRUP)为例
Alifiannisa Lawami Diar, P. Sandhyaduhita, N. Budi
As an effort to shorten supply chain and improve the efficiency, effectiveness, and transparency of the procurement process, Indonesian government created a public procurement plan information system (SIRUP) as a part of e-Procurement used by government institutions in Indonesia. This research was conducted to analyze the determinant factors of SIRUP implementation in Indonesia and its impact to procurement personnel performance by using modified research model from DeLone & McLean theory, Task Technology Fit (TTF) and Technology Acceptance Model (TAM). The research model was tested using Partial Least Square Structural Equation Modeling (PLS-SEM) approach with SmartPLS 3.0 software. The result of this research with 239 respondents shows that system quality, information quality, service quality, usage, user satisfaction, subjective norm, task characteristic and task technology fit become factors influencing SIRUP implementation toward procurement personnel performance. However, only task technology fit and user satisfaction dominantly affect the performance of procurement personnel. In the end, this research could be a feedback to Policy Institute for Procurement of Goods/Services (LKPP) as a main stakeholder of SIRUP in order to improve their system and service quality.
为了缩短供应链,提高采购过程的效率、有效性和透明度,印尼政府创建了一个公共采购计划信息系统(SIRUP),作为印尼政府机构使用的电子采购的一部分。本研究采用DeLone & McLean理论的修正研究模型、任务技术契合度(TTF)和技术接受度模型(TAM),分析SIRUP在印尼实施的决定因素及其对采购人员绩效的影响。利用SmartPLS 3.0软件,采用偏最小二乘结构方程建模(PLS-SEM)方法对研究模型进行检验。对239名受访者的调查结果表明,系统质量、信息质量、服务质量、使用情况、用户满意度、主观规范、任务特征和任务技术契合度成为影响SIRUP实施对采购人员绩效的因素。而影响采购人员绩效的主要因素只有任务技术契合度和用户满意度。最后,本研究可以反馈给作为SIRUP主要利益相关者的商品/服务采购政策研究所(LKPP),以改善其系统和服务质量。
{"title":"The Determinant Factors of Individual Performance from Task Technology Fit and IS Success Model perspectives: a case of Public Procurement Plan Information System (SIRUP)","authors":"Alifiannisa Lawami Diar, P. Sandhyaduhita, N. Budi","doi":"10.1109/ICACSIS.2018.8618148","DOIUrl":"https://doi.org/10.1109/ICACSIS.2018.8618148","url":null,"abstract":"As an effort to shorten supply chain and improve the efficiency, effectiveness, and transparency of the procurement process, Indonesian government created a public procurement plan information system (SIRUP) as a part of e-Procurement used by government institutions in Indonesia. This research was conducted to analyze the determinant factors of SIRUP implementation in Indonesia and its impact to procurement personnel performance by using modified research model from DeLone & McLean theory, Task Technology Fit (TTF) and Technology Acceptance Model (TAM). The research model was tested using Partial Least Square Structural Equation Modeling (PLS-SEM) approach with SmartPLS 3.0 software. The result of this research with 239 respondents shows that system quality, information quality, service quality, usage, user satisfaction, subjective norm, task characteristic and task technology fit become factors influencing SIRUP implementation toward procurement personnel performance. However, only task technology fit and user satisfaction dominantly affect the performance of procurement personnel. In the end, this research could be a feedback to Policy Institute for Procurement of Goods/Services (LKPP) as a main stakeholder of SIRUP in order to improve their system and service quality.","PeriodicalId":207227,"journal":{"name":"2018 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128279254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Progressive Learning Design Strategy to Improve Impact Maturity of Charity organizations 渐进式学习设计策略提高慈善组织影响成熟度
I. L. Laily, O. Komarudin, S. Fadhilah, A. Azurat
The effectiveness and efficiency of a charity organization can be achieved by applying information systems. In Indonesia, there are many small, informal, and even unregistered charity organization to serve many unfortunate people who are not covered by the government or well-established charity organization. Those small charity organization does not have enough capacity for human resource to develop and use the information system to provide good administration and good financial report. Development of information systems for charity organizations can be done uniformly to save development costs, but each organization can have different characters and needs. A high effort is needed to adapt and adjust an information system that has been used in other organizations. The development of a charity organization information system using the concept of software product line (SPL) can be done to form a charity organization information system that has a collection of features that can be selected according to the needs of each charity organization. The system that has been developed needs to be supported by learning strategies for users so that they can be used optimally. This research aims to create learning design through a progressive learning approach for the information systems. The feature collection on the developed information system was mapped onto an organizational development model, known as Impact Maturity Model (IMM) so that the features needed at each level of IMM were obtained. Intermediary learning is done through a case study of an information system in the form of a web application called Adaptive Information System for Charity organization (AISCO).
慈善组织的有效性和效率可以通过信息系统的应用来实现。在印度尼西亚,有许多小型的,非正式的,甚至未注册的慈善组织,为许多不被政府或成熟的慈善组织覆盖的不幸的人服务。这些小型慈善组织没有足够的人力资源来开发和使用信息系统来提供良好的管理和良好的财务报告。慈善组织的信息系统开发可以统一进行,以节省开发成本,但每个组织可以有不同的特点和需求。在其他组织中使用的信息系统需要很大的努力来适应和调整。利用软件产品线(software product line, SPL)的概念开发慈善组织信息系统,可以形成一个具有集合功能的慈善组织信息系统,可以根据各个慈善组织的需求进行选择。已开发的系统需要用户学习策略的支持,使其能够得到最佳的使用。本研究旨在透过渐进式学习方法,为资讯系统创造学习设计。将已开发信息系统上的特征集合映射到组织开发模型,即影响成熟度模型(IMM),从而获得IMM各层次所需的特征。中介学习是通过一个名为“慈善组织自适应信息系统”(AISCO)的网络应用程序形式的信息系统的案例研究来完成的。
{"title":"Progressive Learning Design Strategy to Improve Impact Maturity of Charity organizations","authors":"I. L. Laily, O. Komarudin, S. Fadhilah, A. Azurat","doi":"10.1109/ICACSIS.2018.8618208","DOIUrl":"https://doi.org/10.1109/ICACSIS.2018.8618208","url":null,"abstract":"The effectiveness and efficiency of a charity organization can be achieved by applying information systems. In Indonesia, there are many small, informal, and even unregistered charity organization to serve many unfortunate people who are not covered by the government or well-established charity organization. Those small charity organization does not have enough capacity for human resource to develop and use the information system to provide good administration and good financial report. Development of information systems for charity organizations can be done uniformly to save development costs, but each organization can have different characters and needs. A high effort is needed to adapt and adjust an information system that has been used in other organizations. The development of a charity organization information system using the concept of software product line (SPL) can be done to form a charity organization information system that has a collection of features that can be selected according to the needs of each charity organization. The system that has been developed needs to be supported by learning strategies for users so that they can be used optimally. This research aims to create learning design through a progressive learning approach for the information systems. The feature collection on the developed information system was mapped onto an organizational development model, known as Impact Maturity Model (IMM) so that the features needed at each level of IMM were obtained. Intermediary learning is done through a case study of an information system in the form of a web application called Adaptive Information System for Charity organization (AISCO).","PeriodicalId":207227,"journal":{"name":"2018 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128173560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Formal Verification of Divide and Conquer Key Distribution Protocol Using ProVerif and TLA+ 使用ProVerif和TLA+的分而治之密钥分发协议的形式化验证
Ridhwan Dewoprabowo, Muhammad Arzaki, Yanti Rusmawati
We conduct formal verification of the divide and conquer key distribution scheme (DC DHKE)–a contributory group key agreement that uses a quasilinear amount of exponentiations with respect to the number of communicating parties. The verification is conducted using both ProVerif and TLA+ as tools. ProVerif is used to verify the protocol correctness as well as its security against passive attacker; while TLA+ is utilized to verify whether all participants in the protocol retrieve the mutual key simultaneously. We also verify the ING and GDH.3 protocol for comparative purposes. The verification results show that the ING, GDH.3, and DC DHKE protocols satisfy the pre-meditated correctness, security, and liveness properties. However, the GDH.3 protocol does not satisfy the liveness property stating that all participants obtain the mutual key at the same time.
我们对分而治之的密钥分发方案(DC DHKE)进行了正式验证,这是一种贡献组密钥协议,它对通信方的数量使用拟线性的幂次计算。验证是使用ProVerif和TLA+作为工具进行的。ProVerif用于验证协议的正确性以及对被动攻击者的安全性;TLA+用于验证协议中的所有参与者是否同时检索到互密钥。为了比较,我们还验证了ING和GDH.3协议。验证结果表明,ING、GDH.3和DC DHKE协议满足预先考虑的正确性、安全性和活动性。然而,GDH.3协议不满足所有参与者同时获得互密钥的活动性。
{"title":"Formal Verification of Divide and Conquer Key Distribution Protocol Using ProVerif and TLA+","authors":"Ridhwan Dewoprabowo, Muhammad Arzaki, Yanti Rusmawati","doi":"10.1109/ICACSIS.2018.8618173","DOIUrl":"https://doi.org/10.1109/ICACSIS.2018.8618173","url":null,"abstract":"We conduct formal verification of the divide and conquer key distribution scheme (DC DHKE)–a contributory group key agreement that uses a quasilinear amount of exponentiations with respect to the number of communicating parties. The verification is conducted using both ProVerif and TLA+ as tools. ProVerif is used to verify the protocol correctness as well as its security against passive attacker; while TLA+ is utilized to verify whether all participants in the protocol retrieve the mutual key simultaneously. We also verify the ING and GDH.3 protocol for comparative purposes. The verification results show that the ING, GDH.3, and DC DHKE protocols satisfy the pre-meditated correctness, security, and liveness properties. However, the GDH.3 protocol does not satisfy the liveness property stating that all participants obtain the mutual key at the same time.","PeriodicalId":207227,"journal":{"name":"2018 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131932973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
2-Dimensional Homogeneous Distributed Ensemble Feature Selection 二维均匀分布集成特征选择
M. Alhamidi, D. M. S. Arsa, M. F. Rachmadi, W. Jatmiko
Big data can be seen from the number of its samples and features. The selection of the most representative feature is an important task in Uig data analysis to reduce the dimension. The feature selection method is used to handle this problem. In this research, a homogeneous distributed ensemble feature selection method with 2-dimensional partition is used as new approach of feature selection. The results showed that the proposed method can improve the accuracy from the other feature selection method with an increase of 2% for several datasets. In addition, it also speeds up the computation to almost two times faster.
从样本的数量和特征可以看出大数据。选择最具代表性的特征是大数据降维分析中的一项重要任务。采用特征选择方法来解决这一问题。本文提出了一种基于二维分割的均匀分布集成特征选择方法作为特征选择的新方法。结果表明,在多个数据集上,该方法比其他特征选择方法的准确率提高了2%。此外,它还将计算速度提高了近两倍。
{"title":"2-Dimensional Homogeneous Distributed Ensemble Feature Selection","authors":"M. Alhamidi, D. M. S. Arsa, M. F. Rachmadi, W. Jatmiko","doi":"10.1109/ICACSIS.2018.8618266","DOIUrl":"https://doi.org/10.1109/ICACSIS.2018.8618266","url":null,"abstract":"Big data can be seen from the number of its samples and features. The selection of the most representative feature is an important task in Uig data analysis to reduce the dimension. The feature selection method is used to handle this problem. In this research, a homogeneous distributed ensemble feature selection method with 2-dimensional partition is used as new approach of feature selection. The results showed that the proposed method can improve the accuracy from the other feature selection method with an increase of 2% for several datasets. In addition, it also speeds up the computation to almost two times faster.","PeriodicalId":207227,"journal":{"name":"2018 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114253230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
The Story Development of Penal Law Online News Articles Visualization 刑法网络新闻报道可视化的故事化发展
Aditio Pangestu, D. H. Widyantoro
Penal law online news articles develop a story about penal procedure activities over a longer period of time. The length and depth of the story can be such that it is difficult to track for readers. We present Law Vis, a visualization technique for exploring and communicating story developed by penal law online news articles. Law Vis shows a sequence of events in a story and first time that an event is reported. The sequence of event is showed together with complementary information or event entities such as time, location and actor. Law Vis further provides specific information for a specific event. Law Vis is used for tracking a story from a popular case. Law Vis can help track a story easily, but it still has trouble in search and filter events.
刑法网络新闻文章在较长一段时间内发展了关于刑事诉讼活动的故事。故事的长度和深度可能会让读者难以追踪。我们提出的法律Vis,一个可视化技术探索和交流故事发展的刑法在线新闻文章。法律vi显示了故事中的事件序列和事件第一次被报道。事件的顺序与时间、地点、参与者等补充信息或事件实体一起显示。Law Vis进一步为特定事件提供特定信息。Law Vis用于追踪热门案件的故事。Law Vis可以很容易地帮助追踪新闻,但在搜索和过滤事件方面仍然存在问题。
{"title":"The Story Development of Penal Law Online News Articles Visualization","authors":"Aditio Pangestu, D. H. Widyantoro","doi":"10.1109/ICACSIS.2018.8618210","DOIUrl":"https://doi.org/10.1109/ICACSIS.2018.8618210","url":null,"abstract":"Penal law online news articles develop a story about penal procedure activities over a longer period of time. The length and depth of the story can be such that it is difficult to track for readers. We present Law Vis, a visualization technique for exploring and communicating story developed by penal law online news articles. Law Vis shows a sequence of events in a story and first time that an event is reported. The sequence of event is showed together with complementary information or event entities such as time, location and actor. Law Vis further provides specific information for a specific event. Law Vis is used for tracking a story from a popular case. Law Vis can help track a story easily, but it still has trouble in search and filter events.","PeriodicalId":207227,"journal":{"name":"2018 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"1063 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122252566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Task-Technology Fit Approach to Evaluate Tourists' Purchase Intention in Open-Trip Marketplace Sites 任务-技术拟合方法评估开放旅游市场站点的游客购买意愿
Baskoro Pramudito Nugroho, M. R. Shihab, I. Budi
Nowadays, eTourism has a very promising development in Indonesia. This triggers the growth of various sites that provide a marketplace to buy and sell open-trip. Hence, this study aims to identify factors that influence tourists' intention in ordering open-trip package through open-trip marketplace sites using the approach of Task-Technology Fit theory. This study uses quantitative methods and uses questionnaires for data collection. The questionnaires obtained 57 respondents who booked through an open-trip marketplace sites. The collected data is then analyzed using Partial Least Square Structural Equational Modeling (PLS-SEM). This study found that Task-Technology Fit significantly affects tourists' intention to buy open-trip from open-trip marketplace sites. Then, this study showed that technology characteristics affects Task-Technology Fit, and website quality is a factor that influences technology characteristics. Moreover, this study also found that task significance is a factor that significantly affects task characteristics.
如今,印尼的旅游业发展非常有前景。这引发了各种网站的增长,这些网站提供了一个买卖开放旅行的市场。因此,本研究旨在运用任务-技术契合理论的方法,找出影响游客通过开放式旅行市场网站订购开放式旅行套餐意向的因素。本研究采用定量方法,采用问卷调查的方式进行数据收集。该问卷调查了57名通过开放式旅游市场网站预订的受访者。然后使用偏最小二乘结构方程模型(PLS-SEM)分析收集的数据。本研究发现,任务-技术契合度显著影响游客从开放式旅游市场网站购买开放式旅游的意愿。然后,本研究表明,技术特征影响任务-技术契合度,网站质量是影响技术特征的一个因素。此外,本研究还发现任务显著性是显著影响任务特征的因素。
{"title":"Task-Technology Fit Approach to Evaluate Tourists' Purchase Intention in Open-Trip Marketplace Sites","authors":"Baskoro Pramudito Nugroho, M. R. Shihab, I. Budi","doi":"10.1109/ICACSIS.2018.8618191","DOIUrl":"https://doi.org/10.1109/ICACSIS.2018.8618191","url":null,"abstract":"Nowadays, eTourism has a very promising development in Indonesia. This triggers the growth of various sites that provide a marketplace to buy and sell open-trip. Hence, this study aims to identify factors that influence tourists' intention in ordering open-trip package through open-trip marketplace sites using the approach of Task-Technology Fit theory. This study uses quantitative methods and uses questionnaires for data collection. The questionnaires obtained 57 respondents who booked through an open-trip marketplace sites. The collected data is then analyzed using Partial Least Square Structural Equational Modeling (PLS-SEM). This study found that Task-Technology Fit significantly affects tourists' intention to buy open-trip from open-trip marketplace sites. Then, this study showed that technology characteristics affects Task-Technology Fit, and website quality is a factor that influences technology characteristics. Moreover, this study also found that task significance is a factor that significantly affects task characteristics.","PeriodicalId":207227,"journal":{"name":"2018 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115768128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Recording of Law Enforcement Based on Court Decision Document Using Rule-based Information Extraction 基于规则信息提取的法院判决书执法记录
Firdaus Solihin, I. Budi
Recording of law enforcement needs to measure the extent to what the enforcement law has been carried out in accordance with applicable legal rules. This law enforcement record can be obtained by collecting, analyzing and concluding various legal cases from court decision documents. The number of court decision documents is vast and continues to grow at any time; it requires an extraction process of information that can be run automatically. The conditions of court decision documents that have different use of sentences and the use of word variations are challenges in the process of information extraction. This research proposed rule-based information extraction for court decision documents to exploring and developing the recording of law enforcement in Indonesia. The process uses three steps, identifying structure extraction, tokenization and extracting entities. This research use 150 court decision documents dataset and the experiment has produced 0.82, 0.96, 0.89, beside of average recall, precision, and f-score. This shows that rule-based information extraction can be implemented in the legal domain and supports the development of law enforcement records in Indonesia.
执法记录需要衡量执法法律在多大程度上按照适用的法律规则执行。这种执法笔录可以通过对法院判决书中各种法律案件的收集、分析和总结而获得。法院判决文书数量庞大,并随时在增长;它需要一个可以自动运行的信息提取过程。判决书中不同句式的使用情况和用词的变化是信息提取过程中的挑战。本研究提出了基于规则的法院判决文件信息提取,以探索和发展印度尼西亚的执法记录。该过程分为三个步骤:标识结构提取、标记化和实体提取。本研究使用150个法院判决文件数据集,实验结果分别为0.82,0.96,0.89,以及平均召回率,精度和f分。这表明,基于规则的信息提取可以在法律领域实施,并支持印度尼西亚执法记录的发展。
{"title":"Recording of Law Enforcement Based on Court Decision Document Using Rule-based Information Extraction","authors":"Firdaus Solihin, I. Budi","doi":"10.1109/ICACSIS.2018.8618187","DOIUrl":"https://doi.org/10.1109/ICACSIS.2018.8618187","url":null,"abstract":"Recording of law enforcement needs to measure the extent to what the enforcement law has been carried out in accordance with applicable legal rules. This law enforcement record can be obtained by collecting, analyzing and concluding various legal cases from court decision documents. The number of court decision documents is vast and continues to grow at any time; it requires an extraction process of information that can be run automatically. The conditions of court decision documents that have different use of sentences and the use of word variations are challenges in the process of information extraction. This research proposed rule-based information extraction for court decision documents to exploring and developing the recording of law enforcement in Indonesia. The process uses three steps, identifying structure extraction, tokenization and extracting entities. This research use 150 court decision documents dataset and the experiment has produced 0.82, 0.96, 0.89, beside of average recall, precision, and f-score. This shows that rule-based information extraction can be implemented in the legal domain and supports the development of law enforcement records in Indonesia.","PeriodicalId":207227,"journal":{"name":"2018 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130128238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Digital Investigation of Wireless Sensor Networks - IRIS Mote 无线传感器网络的数字化研究- IRIS Mote
Argianto Rahartomo, Ame Bochem, O. Alfandi
For forensically analyzing incidents, it is important to gather as much data about the incident as possible. In the case of WSNs, this means that data has to be extracted from the sensor nodes, when a compromise or other security incident occurs. Among the data to be extracted are the program running on the node, so it can be analyzed for tampering, as well as the log and configuration flash memory usually stored on a separate chip on the sensor node. In this paper we will present how to perform an extraction of RAM, program memory, and flash memory with their necessary tools, and steps. Finally, information about the compromise can be gathered from the node’s RAM, program, and flash memory especially if for example a vulnerability in the software running on the node was exploited, the (commonly small) RAM, program, and flash memory can be examined for anomalies.
为了对事件进行法医分析,收集尽可能多的事件数据是很重要的。在wsn的情况下,这意味着当发生泄漏或其他安全事件时,必须从传感器节点提取数据。要提取的数据中有节点上运行的程序,可以分析是否被篡改,还有通常存储在传感器节点上单独芯片上的日志和配置闪存。在本文中,我们将介绍如何使用必要的工具和步骤执行RAM,程序存储器和闪存的提取。最后,可以从节点的RAM、程序和闪存中收集有关危害的信息,特别是如果节点上运行的软件中的漏洞被利用,可以检查(通常很小的)RAM、程序和闪存是否异常。
{"title":"Digital Investigation of Wireless Sensor Networks - IRIS Mote","authors":"Argianto Rahartomo, Ame Bochem, O. Alfandi","doi":"10.1109/ICACSIS.2018.8618133","DOIUrl":"https://doi.org/10.1109/ICACSIS.2018.8618133","url":null,"abstract":"For forensically analyzing incidents, it is important to gather as much data about the incident as possible. In the case of WSNs, this means that data has to be extracted from the sensor nodes, when a compromise or other security incident occurs. Among the data to be extracted are the program running on the node, so it can be analyzed for tampering, as well as the log and configuration flash memory usually stored on a separate chip on the sensor node. In this paper we will present how to perform an extraction of RAM, program memory, and flash memory with their necessary tools, and steps. Finally, information about the compromise can be gathered from the node’s RAM, program, and flash memory especially if for example a vulnerability in the software running on the node was exploited, the (commonly small) RAM, program, and flash memory can be examined for anomalies.","PeriodicalId":207227,"journal":{"name":"2018 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132218349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data Governance Maturity Model (DGM2) Assessment in Organization Transformation of Digital Telecommunication Company: Case Study of PT Telekomunikasi Indonesia 数字电信公司组织转型中的数据治理成熟度模型(DGM2)评估——以印尼PT Telekomunikasi为例
Dimas Agung Saputra, Dika Handika, Y. Ruldeviyani
PT Telekomunikasi Indonesia (Telkom) has transformed the organization from a conventional telecommunication company to a digital telecommunication in 2016. The strategy in realizing this transformation is to become a hub or enabler in a digital ecosystem and this implementation requires governance to utilize data and information in around the Telkom Group. The purpose of this study is to analyze the Maturity Level of Data Governance implementation in the transformation of digital telecommunication organization, then from the result will develop policies recommendation for the future. The study use Data Governance Maturity Model (DGMM) from Stanford University. The results show that the implementation of Data Governance in Telkom has a Maturity Level with an average value of 3.5 for Foundation-Component, 4.13 for Project-Component, or the average value is 3,815. The highest maturity level of this assestment is on formalization-component, which is about determine the Data Governance structure. The study produce 17 points of recommendations for improving Telkom Group Data Governance Maturity Level
2016年,PT Telekomunikasi Indonesia (Telkom)将该组织从传统电信公司转变为数字电信公司。实现这一转变的战略是成为数字生态系统中的中心或推动者,而这一实现需要治理来利用电信集团周围的数据和信息。本研究的目的是分析数字电信组织转型中数据治理实施的成熟度水平,并根据研究结果提出未来的政策建议。本研究使用了斯坦福大学的数据治理成熟度模型(DGMM)。结果表明,电信企业实施数据治理的成熟度水平,基础组件的平均值为3.5,项目组件的平均值为4.13,平均为3815。该评估的最高成熟度级别是关于形式化组件的,它是关于确定数据治理结构的。该研究为提高电信集团数据治理成熟度水平提出了17点建议
{"title":"Data Governance Maturity Model (DGM2) Assessment in Organization Transformation of Digital Telecommunication Company: Case Study of PT Telekomunikasi Indonesia","authors":"Dimas Agung Saputra, Dika Handika, Y. Ruldeviyani","doi":"10.1109/ICACSIS.2018.8618255","DOIUrl":"https://doi.org/10.1109/ICACSIS.2018.8618255","url":null,"abstract":"PT Telekomunikasi Indonesia (Telkom) has transformed the organization from a conventional telecommunication company to a digital telecommunication in 2016. The strategy in realizing this transformation is to become a hub or enabler in a digital ecosystem and this implementation requires governance to utilize data and information in around the Telkom Group. The purpose of this study is to analyze the Maturity Level of Data Governance implementation in the transformation of digital telecommunication organization, then from the result will develop policies recommendation for the future. The study use Data Governance Maturity Model (DGMM) from Stanford University. The results show that the implementation of Data Governance in Telkom has a Maturity Level with an average value of 3.5 for Foundation-Component, 4.13 for Project-Component, or the average value is 3,815. The highest maturity level of this assestment is on formalization-component, which is about determine the Data Governance structure. The study produce 17 points of recommendations for improving Telkom Group Data Governance Maturity Level","PeriodicalId":207227,"journal":{"name":"2018 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133513419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
ICACSIS 2018 Welcome Message from the General Chairs ICACSIS 2018大会主席欢迎辞
{"title":"ICACSIS 2018 Welcome Message from the General Chairs","authors":"","doi":"10.1109/icacsis.2018.8618212","DOIUrl":"https://doi.org/10.1109/icacsis.2018.8618212","url":null,"abstract":"","PeriodicalId":207227,"journal":{"name":"2018 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131378033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2018 International Conference on Advanced Computer Science and Information Systems (ICACSIS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1