Claim Missing Document
Check
Articles

Found 3 Documents
Search
Journal : TELKOMNIKA (Telecommunication Computing Electronics and Control)

Risk assessment of information production using extended risk matrix approach Jaka Sembiring; Fitasari Wiharni
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 3: June 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i3.10050

Abstract

In many cases poor information quality appears mainly due to in-effectiveness of information management including information production and delivery. Where this situation poses a certain risk. A holistic information risk management model has been previously proposed. But the model has some limitations especially on risk calculation and risk priority ranking as the model does not consider existing control effectiveness. In this paper, a new risk assessment method is proposed in order to improve the model of total impact of risks and to improve the accuracy of risk priority ranking by modifying the extended risk matrix approach (RMA) where we take into account the existing control effectiveness. Using our approach by adding a new dimension on extended RMA. We are able to improve the accuracy (7.15%) and reduced the ambiguity (1.34) of assessment results on real cases illustration.
Application Development Risk Assessment Model Based on Bayesian Network Jaka Sembiring; Johan P. Sipayung; Arry A. Arman
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 16, No 3: June 2018
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v16i3.7288

Abstract

This paper describes a new risk assessment model for application development and its implementation. The model is developed using a Bayesian network and Boehm’s software risk principles. The Bayesian network is created after mapping top twenty risks in software projects with interrelationship digraph of risk area category. The probability of risk on the network is analyzed and validated using both numerical simulation and subjective probability from several experts in the field and a team of application developers. After obtaining the Bayesian network model, risk exposure is calculated using Boehm's risk principles. Finally, the implementation of the proposed model in a government institution is shown as a real case illustration.
Information Interchange Layer based on Classification of Information Use (IU) Albarda Albarda; Suhono Harso Supangkat; Kuspriyanto Kuspriyanto; Jaka Sembiring
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 12, No 2: June 2014
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v12i2.70

Abstract

Information characteristics in classification of IU directly related to aspects of information usage by user in enterprise to accomplish their activities. Feature extraction from information usage in three layer of enterprise management used as parameter for this characteristic. Characteristics and dimension applied to develop middle-ware system (called Information Interchange Layer) that bridges a common issue ie information silo, to optimize a services of information resources in enterprise