Claim Missing Document
Check
Articles

Found 2 Documents
Search
Journal : TELKOMNIKA (Telecommunication Computing Electronics and Control)

Enhance interval width of crime forecasting with ARIMA model-fuzzy alpha cut Yaya Sudarya Triana; Astari Retnowardhani
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 3: June 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i3.12233

Abstract

With qualified data or information a better decision can be made. The interval width of forecasting is one of data values to assist in the selection decision making process in regards to crime prevention. However, in time series forecasting, especially the use of ARIMA model, the amount of historical data available can affect forecasting result including interval width forecasting value. This study proposes a combination technique, in order to get get a better interval width crime forecasting value. The propose combination technique between ARIMA model and Fuzzy Alpha Cut are presented. The use of variation alpha values are used, they are 0.3, 0.5, and 0.7. The experimental results have shown the use of ARIMA-FAC with alpha=0.5 is appropriate. The overall results obtained have shown the interval width crime forecasting with ARIMA-FAC is better than interval width crime forecasting with 95% CI ARIMA model.
Security risk analysis of bring your own device system in manufacturing company at Tangerang Astari Retnowardhani; Raziv Herman Diputra; Yaya Sudarya Triana
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 2: April 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i2.10165

Abstract

Nowadays information system has become popular used for help effectiveness and efficiency operation on a company. Bring Your Own Device (BYOD) system is a growing trend in corporate environment, where employees could access the system from anywhere. BYOD system is system information development using some technology like a Virtual Private Networks (VPN) or using some application to make the client on outside network office can access to inside networks with remote system. The remote system has strength to help employees working anywhere and anytime, that could make some issue for a security thing. The security issue that can be happen is unauthorized access and lost some important of company information. XYZ company as a manufacturing company in Tangerang, Indonesia has been used BYOD system in their company. They want to improve the security of the system with do risk analysis, with the aim to protect the internal data. The risk analysis use Cybersecurity Framework NIST will assist organizations to understand the risk of BYOD system. The analysist results obtained by the use of cybersecurity analysis on BYOD system in XYZ company are found some improvement need to develop in terms of security system recommended. According to the stages of respond with the analysis using Cybersecurity NIST framework and ISO/IEC 27002:2013.