Claim Missing Document
Check
Articles

Found 2 Documents
Search

Influence of Business Process Maturity Model as a Business Architecture Planning Proposal Zaleha Fauziah; Dedeh Supriyanti; Sulistiawati
ADI Journal on Recent Innovation Vol. 2 No. 2 (2021): March
Publisher : ADI Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34306/ajri.v2i2.288

Abstract

This research is a part of previous research that succeeded in producing business model architecture planning, the purpose of this study was to develop previous research using the measurement method of business model maturity as a proposed business model architecture planning concept. By taking the same case study theme as the Tiara Payung Putra (TPP) company. TPP is known as a distributor company in cooperation with Pertamina (Bulk LPG Freight and Filling Station). TPP's main business activity is distributing goods in the form of LPG to 76 bases spread across Balaraja district. The current condition of the business model architecture illustrates the business activities that exist in the TPP. The main problems that occur in TPP are not integrating external systems with internal business activities in the company, and lack of IT resource support. For this reason, the Business Process Maturity Model is needed as a benchmark, which can be proposed as a business architecture planning concept. The business process maturity model process is supported by data validation obtained through respondents, namely business stakeholders in TPP, the process for validating the data by distributing the Assessment questionnaire consisting of 8 Parts the Business Process Assessment model, and 3 Parts for IT Application Readiness Assessment. support of the Enterprise Architecture Planning (EAP) Framework method which focuses on the business model architecture domain. The architecture of the business model illustrates how TPP carries out business activities and functions to achieve its objectives. The results of this study produce the proposed business model architecture planning concept in the form of Business Model Maturity Level Measurement, the IS / IT architecture concept, and the Business Architecture Planning roadmap, which are beneficial for the Tiara Payung Putra (TPP) company for the business model architectural planning
Enhancing Cybersecurity Information Sharing: A Secure and Decentralized Approach with Four-Node IPFS Zaleha Fauziah; Novi Putri Anggraini; Yulia Putri Ayu Sanjaya; Tarisya Ramadhan
International Journal of Cyber ​​and IT Service Management (IJCITSM) Vol. 3 No. 2 (2023): October
Publisher : International Institute for Advanced Science & Technology (IIAST)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34306/ijcitsm.v3i2.139

Abstract

The act of sharing cybersecurity information plays a proactive and collaborative role in bolstering organizational security through the exchange of data using a centralized repository service. However, the real-world application of centralized services comes with certain risks. It leaves organizations vulnerable to distributed denial-of-service (DDoS) attacks, leading to system failures and creating a single point of failure. Additionally, it opens the door to man-in-the-middle (MITM) attacks, potentially altering or pilfering exchanged information. These threats undermine user confidence in the confidentiality, integrity, and availability of their data. This study presents a secure solution, the design of a Cybersecurity Information Sharing (CyberShare) system that employs a private interplanetary file system (IPFS) network as a decentralized information storage solution. Unlike centralized storage, which relies on a single node, the CyberShare system utilizes a four-node IPFS network interconnected with swarm keys for authentication. This design enables users to store and share information securely from sender to recipient, eliminating the need for reliance on a central server and reducing the server load. An analysis of the proposed CyberShare system demonstrates its capability to ensure the confidentiality, integrity, and availability of cybersecurity information. By enhancing information security, CyberShare systems empower organizations to securely share and utilize cybersecurity data.