Pub Date : 2017-08-01DOI: 10.1109/CAIPT.2017.8320751
Sanghyun Lee, B. Lee
Sharing economy companies such as Airbnb and Uber have experienced exponential growth in popularity in recent years. The sharing economy is an emergent economic-technological phenomenon fostered by the developments in Information Technology. The paper attempts to address the problem of regulation in sharing economy in the field of home-sharing. Based on the results from interviews with the regulators in the central and provincial governments of Korea and the Public Policy Managers of Airbnb, we identify and suggest policy considerations and strategies for sharing economy in Korea. Our results not only help in understanding the policy developments in the field of sharing economy, but also help in developing the required robust policy and legal framework to support and strengthen the sharing economy in Korea.
{"title":"Policy development of sharing economy in Korea: Case of home-sharing","authors":"Sanghyun Lee, B. Lee","doi":"10.1109/CAIPT.2017.8320751","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320751","url":null,"abstract":"Sharing economy companies such as Airbnb and Uber have experienced exponential growth in popularity in recent years. The sharing economy is an emergent economic-technological phenomenon fostered by the developments in Information Technology. The paper attempts to address the problem of regulation in sharing economy in the field of home-sharing. Based on the results from interviews with the regulators in the central and provincial governments of Korea and the Public Policy Managers of Airbnb, we identify and suggest policy considerations and strategies for sharing economy in Korea. Our results not only help in understanding the policy developments in the field of sharing economy, but also help in developing the required robust policy and legal framework to support and strengthen the sharing economy in Korea.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130540295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-08-01DOI: 10.1109/CAIPT.2017.8320668
Van-Quyet Nguyen, Sinh-Ngoc Nguyen, Kyungbaek Kim
Software-Defined Networking (SDN) is promised as future of Internet which provides centralized network management. It provides detail information of underlay routers and makes a decision based on the global view of the current network. However, in the case of occurring unexpected natural disasters such as earthquakes or typhoons, the network infrastructure faces many challenges such as links and devices failures. Therefore, how to recover the network quickly under disaster situations is particularly essential for reliable SDN. In this paper, we propose a novel approach to enable disaster resilient SDN networks with location trustiness. We first present a method for calculating the trustiness of a location based on multimodal information including earthquake events and disaster sensor data. Then, we design a system to support disaster resilient SDN based on location-trustiness. To evaluate the feasibility of the proposed system, we simulate the responses to the network which affected by earthquake events. The results show that our approach reduces the recovering time significantly.
{"title":"Enabling disaster-resilient SDN with location trustiness","authors":"Van-Quyet Nguyen, Sinh-Ngoc Nguyen, Kyungbaek Kim","doi":"10.1109/CAIPT.2017.8320668","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320668","url":null,"abstract":"Software-Defined Networking (SDN) is promised as future of Internet which provides centralized network management. It provides detail information of underlay routers and makes a decision based on the global view of the current network. However, in the case of occurring unexpected natural disasters such as earthquakes or typhoons, the network infrastructure faces many challenges such as links and devices failures. Therefore, how to recover the network quickly under disaster situations is particularly essential for reliable SDN. In this paper, we propose a novel approach to enable disaster resilient SDN networks with location trustiness. We first present a method for calculating the trustiness of a location based on multimodal information including earthquake events and disaster sensor data. Then, we design a system to support disaster resilient SDN based on location-trustiness. To evaluate the feasibility of the proposed system, we simulate the responses to the network which affected by earthquake events. The results show that our approach reduces the recovering time significantly.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116056696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-08-01DOI: 10.1109/CAIPT.2017.8320695
H. Medyawati, B. Setiawan, Imam Ahmad Trinugroho, Ega Hegarini
Food distribution is one of the main problems to achieve a stable food security in Indonesia. Geographical differences and poor transportation system in Indonesia induce a high complexity challenges to implement a good food distribution system that can suitable with Indonesia characteristic. The purpose of this research is designing geographical information system (GIS) to analyze food distribution in Indonesia. GIS can visualize the entire data layer into a map which is easier to analyze. Indonesia consists of 34 provinces that spread over many island, each has specific geographical profile and transportation problems. This can be used as data layers with other instruments which related with food distribution in Indonesia. Designing GIS is part of developing food distribution system which produce prototype of the system. Prototyping approach is being used to evaluate the designing result of GIS with analyzing features for food distribution in Indonesia. Final result for this research is a set of rules that can be implemented into food distribution system that can create a stable food security in Indonesia, for all of the provinces.
{"title":"A geographical information system design for analyzing food distribution in Indonesia","authors":"H. Medyawati, B. Setiawan, Imam Ahmad Trinugroho, Ega Hegarini","doi":"10.1109/CAIPT.2017.8320695","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320695","url":null,"abstract":"Food distribution is one of the main problems to achieve a stable food security in Indonesia. Geographical differences and poor transportation system in Indonesia induce a high complexity challenges to implement a good food distribution system that can suitable with Indonesia characteristic. The purpose of this research is designing geographical information system (GIS) to analyze food distribution in Indonesia. GIS can visualize the entire data layer into a map which is easier to analyze. Indonesia consists of 34 provinces that spread over many island, each has specific geographical profile and transportation problems. This can be used as data layers with other instruments which related with food distribution in Indonesia. Designing GIS is part of developing food distribution system which produce prototype of the system. Prototyping approach is being used to evaluate the designing result of GIS with analyzing features for food distribution in Indonesia. Final result for this research is a set of rules that can be implemented into food distribution system that can create a stable food security in Indonesia, for all of the provinces.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116617991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-08-01DOI: 10.1109/CAIPT.2017.8320746
Seung-Seok Kang, Ye-Eun Chae, Seunguk Yeon
Self-driving car is a rapid evolving technology and becomes one of the hot research topics. Car-to-infrastructure or car-to-car communication provides many benefits to both car drivers and self-driving logics. VANET (Vehicular ad hoc networks) is classified as a special case of MANET. In order to communicate between cars and road infrastructures, VANET needs an ad hoc routing algorithm. This paper compares and analyzes the performance of the popular ad hoc routing algorithms in VANET. This paper uses ns-3 network simulator and SUMO for modeling the real traffic road and cars. The simulation results indicates that AODV provides a reasonable performance and adapts well for driving at high speed.
自动驾驶汽车是一项快速发展的技术,已成为研究热点之一。车对基础设施或车对车通信为汽车驾驶员和自动驾驶逻辑提供了许多好处。VANET (Vehicular ad hoc network)是MANET的一个特例。为了在汽车和道路基础设施之间进行通信,VANET需要一种自组织路由算法。本文比较分析了VANET中常用的自组织路由算法的性能。本文使用ns-3网络模拟器和SUMO对真实交通道路和车辆进行建模。仿真结果表明,AODV具有合理的性能,能很好地适应高速行驶。
{"title":"VANET routing algorithm performance comparison using ns-3 and SUMO","authors":"Seung-Seok Kang, Ye-Eun Chae, Seunguk Yeon","doi":"10.1109/CAIPT.2017.8320746","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320746","url":null,"abstract":"Self-driving car is a rapid evolving technology and becomes one of the hot research topics. Car-to-infrastructure or car-to-car communication provides many benefits to both car drivers and self-driving logics. VANET (Vehicular ad hoc networks) is classified as a special case of MANET. In order to communicate between cars and road infrastructures, VANET needs an ad hoc routing algorithm. This paper compares and analyzes the performance of the popular ad hoc routing algorithms in VANET. This paper uses ns-3 network simulator and SUMO for modeling the real traffic road and cars. The simulation results indicates that AODV provides a reasonable performance and adapts well for driving at high speed.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125051215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-08-01DOI: 10.1109/CAIPT.2017.8320733
A. C. Prihandoko, H. Ghodosi
This research aims to construct a content distribution protocol that preserves the content provider's security and users' privacy. The protocol can improve Digital Rights Management (DRM) that is required to provide balanced protection for the content provider and the users in a content distribution system. The concept of oblivious transfer (OT) is utilized to fulfill the DRM requirement. The OT concept allows a sender to securely send a set of information to a receiver in such a way that, at the end of the protocol, the receiver cannot learn more than he was supposed to learn, while the sender cannot determine what the receiver has learned. Assuming that tamper-proof device exists, the constructed protocol achieves perfect security for the content provider and privacy for the users. This oblivious content distribution ultimately enables DRM to be a privacy-aware protection system. The system does not merely focus on content providers' rights, but also seriously considers users' privacy protection.
{"title":"Oblivious content distribution system to advantage digital rights management","authors":"A. C. Prihandoko, H. Ghodosi","doi":"10.1109/CAIPT.2017.8320733","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320733","url":null,"abstract":"This research aims to construct a content distribution protocol that preserves the content provider's security and users' privacy. The protocol can improve Digital Rights Management (DRM) that is required to provide balanced protection for the content provider and the users in a content distribution system. The concept of oblivious transfer (OT) is utilized to fulfill the DRM requirement. The OT concept allows a sender to securely send a set of information to a receiver in such a way that, at the end of the protocol, the receiver cannot learn more than he was supposed to learn, while the sender cannot determine what the receiver has learned. Assuming that tamper-proof device exists, the constructed protocol achieves perfect security for the content provider and privacy for the users. This oblivious content distribution ultimately enables DRM to be a privacy-aware protection system. The system does not merely focus on content providers' rights, but also seriously considers users' privacy protection.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129228290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-08-01DOI: 10.1109/CAIPT.2017.8320736
Alexander Setiawan, A. Wibowo, Andy Susilo
In the era of globalization increasingly advanced enterprise engaged in the sale of concrete iron will execute business processes by using software, hardware, networking, and others. Judging from the condition and the current reality of this company did not rule out the occurrence of the risk due to the problems in terms of data security, data integrity, hard disk damage, IT business continuity process. In this research conducted a risk analysis of the entire area of IT and business processes within the company. As for the area to be analyzed by means of analyzing the business continuity that is based on the Standard ISO 27002: 2005 chapter 14, and analyze IT Domain and perform risk assessment and risk mitigation. The risks are found is their dependence on outsourced programmers who acts as a consultant, so rarely do risk assessment in IT companies, the unavailability of a Disaster Recovery Plan and IT Security Plan, an evaluation of the permissions are less common, and no one specifically designated for IT management, lack of training or, and the absence of a standard or framework. The results of this risk analysis can help companies recognize and avoid the risks of what might happen and can avoid the danger of business continuity, so that the company can take action to prevent or deal with the risks that would happen.
{"title":"Risk analysis on the development of a business continuity plan","authors":"Alexander Setiawan, A. Wibowo, Andy Susilo","doi":"10.1109/CAIPT.2017.8320736","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320736","url":null,"abstract":"In the era of globalization increasingly advanced enterprise engaged in the sale of concrete iron will execute business processes by using software, hardware, networking, and others. Judging from the condition and the current reality of this company did not rule out the occurrence of the risk due to the problems in terms of data security, data integrity, hard disk damage, IT business continuity process. In this research conducted a risk analysis of the entire area of IT and business processes within the company. As for the area to be analyzed by means of analyzing the business continuity that is based on the Standard ISO 27002: 2005 chapter 14, and analyze IT Domain and perform risk assessment and risk mitigation. The risks are found is their dependence on outsourced programmers who acts as a consultant, so rarely do risk assessment in IT companies, the unavailability of a Disaster Recovery Plan and IT Security Plan, an evaluation of the permissions are less common, and no one specifically designated for IT management, lack of training or, and the absence of a standard or framework. The results of this risk analysis can help companies recognize and avoid the risks of what might happen and can avoid the danger of business continuity, so that the company can take action to prevent or deal with the risks that would happen.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121129655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-08-01DOI: 10.1109/CAIPT.2017.8320714
Windi Eka Yulia Retnani, Beny Prasetyo, Yofanda Putra Prayogi, M. Nizar, R. Abdul
Usability Testing is the extent to which a product can be used by a particular user to achieve a defined target with effectiveness, efficiency and achieve satisfaction of use in a particular context. 5 Criteria possessed usability testing that is learnability, efficiency, memorability, error, and satisfaction. Library.unej.ac.id is a website owned by Jember University Library. This paper discusses the measurement of user satisfaction in accessing the library website. The process of measuring user satisfaction in this study using Guttmann method used to compile the questions that exist in the questionnaire. Respondents for each level are divided into 3 classes, ie lay users, active users, and skilled users. The results of this study obtained customer satisfaction 86.76% for answers found, and 13.34% for answers not found. There is 1 criteria that can be improved to improve the quality of the library website is the error criteria with the highest percentage of answers not found at 23%.
{"title":"Usability testing to evaluate the library's academic web site","authors":"Windi Eka Yulia Retnani, Beny Prasetyo, Yofanda Putra Prayogi, M. Nizar, R. Abdul","doi":"10.1109/CAIPT.2017.8320714","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320714","url":null,"abstract":"Usability Testing is the extent to which a product can be used by a particular user to achieve a defined target with effectiveness, efficiency and achieve satisfaction of use in a particular context. 5 Criteria possessed usability testing that is learnability, efficiency, memorability, error, and satisfaction. Library.unej.ac.id is a website owned by Jember University Library. This paper discusses the measurement of user satisfaction in accessing the library website. The process of measuring user satisfaction in this study using Guttmann method used to compile the questions that exist in the questionnaire. Respondents for each level are divided into 3 classes, ie lay users, active users, and skilled users. The results of this study obtained customer satisfaction 86.76% for answers found, and 13.34% for answers not found. There is 1 criteria that can be improved to improve the quality of the library website is the error criteria with the highest percentage of answers not found at 23%.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123177981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-08-01DOI: 10.1109/CAIPT.2017.8320708
Gayatri Dwi Santika
Forecasting of the future load is important because of dramatic changes occurring in the electricity consumption lifestyle. Several algorithms have been suggested for solving this problem. This paper introduces a new modified fuzzy neural system approach for short term load forecasting. By using two phase on Fuzzy Inference system and Genetic algorithm for optimization, weight can improve the accuracy of electricity load forecasting. The relationship external factors like temperature, humidity, price load, Gross Domestic Product and load is identified with a case study for a particular region. Data for a monthly load of five years has been used. The accuracy algorithm has been validated using Root Mean Square Error (RMSE). The result RMSE is 0.78 it is shown that our proposed method is feasible.
{"title":"Enabling external factors for consumption electricity forecasting using hybrid genetic algorithm and fuzzy neural system","authors":"Gayatri Dwi Santika","doi":"10.1109/CAIPT.2017.8320708","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320708","url":null,"abstract":"Forecasting of the future load is important because of dramatic changes occurring in the electricity consumption lifestyle. Several algorithms have been suggested for solving this problem. This paper introduces a new modified fuzzy neural system approach for short term load forecasting. By using two phase on Fuzzy Inference system and Genetic algorithm for optimization, weight can improve the accuracy of electricity load forecasting. The relationship external factors like temperature, humidity, price load, Gross Domestic Product and load is identified with a case study for a particular region. Data for a monthly load of five years has been used. The accuracy algorithm has been validated using Root Mean Square Error (RMSE). The result RMSE is 0.78 it is shown that our proposed method is feasible.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125682933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-08-01DOI: 10.1109/CAIPT.2017.8320675
J. Seo, H. Lee
Due to the development of the IoT era, the evolution of smart devices, and the proliferation of SNS, the amount of data generated is increasing. The vast amount of data generated by this is called big data. Analysis of big data is an important key to read current social trends. By finding out social issues, companies and countries can prepare to solve problems first. Statistical software should be used to analyze big data. In this paper, we use R to provide users with statistical information on air pollution, which is currently the most problematic in Korea.
{"title":"A study on statistical map of air pollution in Korea using R","authors":"J. Seo, H. Lee","doi":"10.1109/CAIPT.2017.8320675","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320675","url":null,"abstract":"Due to the development of the IoT era, the evolution of smart devices, and the proliferation of SNS, the amount of data generated is increasing. The vast amount of data generated by this is called big data. Analysis of big data is an important key to read current social trends. By finding out social issues, companies and countries can prepare to solve problems first. Statistical software should be used to analyze big data. In this paper, we use R to provide users with statistical information on air pollution, which is currently the most problematic in Korea.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126662704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-08-01DOI: 10.1109/CAIPT.2017.8320681
Kartika Rianafirin, M. T. Kurniawan
The development of Information Technology (IT) causing the increase of IT role in running the organization business activities. IT must provide optimal service for the organization business in terms of security when data transactions occur. Implementation of IT infrastructure security must be in accordance with the standards or best practices. In fact, the security management infrastructure of cable network existing at Yayasan Kesehatan (Yakes) Telkom Bandung is still not in accordance with the standards related to the implementation of wired infrastructure security as a network service. The design of security cable network infrastructure at Yakes Telkom in accordance to ISO / IEC 27000 series standard and using Network Development Life Cycle (NDLC) method. The NDLC method used is cyclical to support continuous development. The Security design of cable network infrastructure discussed is about the implementation of communication security technology, web protection optimization using proxy server, monitoring application optimization used by activating logging feature, and recommendation of port optimization on server. The results of test in this study produce the design of network security that is ideal for Yakes Telkom.
{"title":"Design network security infrastructure cabling using network development life cycle methodology and ISO/IEC 27000 series in Yayasan Kesehatan (Yakes) Telkom Bandung","authors":"Kartika Rianafirin, M. T. Kurniawan","doi":"10.1109/CAIPT.2017.8320681","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320681","url":null,"abstract":"The development of Information Technology (IT) causing the increase of IT role in running the organization business activities. IT must provide optimal service for the organization business in terms of security when data transactions occur. Implementation of IT infrastructure security must be in accordance with the standards or best practices. In fact, the security management infrastructure of cable network existing at Yayasan Kesehatan (Yakes) Telkom Bandung is still not in accordance with the standards related to the implementation of wired infrastructure security as a network service. The design of security cable network infrastructure at Yakes Telkom in accordance to ISO / IEC 27000 series standard and using Network Development Life Cycle (NDLC) method. The NDLC method used is cyclical to support continuous development. The Security design of cable network infrastructure discussed is about the implementation of communication security technology, web protection optimization using proxy server, monitoring application optimization used by activating logging feature, and recommendation of port optimization on server. The results of test in this study produce the design of network security that is ideal for Yakes Telkom.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"305 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124351409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}