Claim Missing Document
Check
Articles

Found 4 Documents
Search

HRM Practices Across Different Cultures: An Evidence-Based Study In France And Egypt Bernandy, Marceli Putri; Wijaya , Anne Ivena; Lestiani, Dwi Indah; Husaini, Ravi; Saputra, Laurensius Herdimas; Oktavian, Fabian Nauval; Rahman, Muhammad Fajar Wahyudi
INTERNATIONAL JOURNAL OF ECONOMICS, MANAGEMENT, BUSINESS, AND SOCIAL SCIENCE (IJEMBIS) Vol. 4 No. 1 (2024): January 2024
Publisher : CV ODIS

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59889/ijembis.v4i1.349

Abstract

Human Resource Management (HRM) conceptually encompasses policies, practices and systems that influence employee behaviour, attitudes and performance. The comparative research of HRM between France and Egypt, countries from different continents, Europe and Africa, used the literature study method with a descriptive-qualitative approach. The results showed significant differences in HRM practices between the two countries. France has an intuitive recruitment approach with the use of multiple interview methods, while Egypt tends to use internal and informal recruitment. In development, France focuses on internal relations, while Egypt involves government initiatives. Regarding termination of employment, France has a collective policy (RC), while Egypt is unstable in the tourism sector. Performance appraisal in France is subjective, while in Egypt employees care more about procedural justice. The compensation system in France involves fixed and flexible salaries, while Egypt has government regulations. Occupational Safety and Health (OSH) regulations are stricter in France, reflecting cultural and labour law differences. Thus, cultural and legal differences create different frameworks in France and Egypt, influencing the implementation of HRM in each country.
ANALISIS PENGGUNAAN TEKNOLOGI ARTIFICIAL INTELLIGENCE TERHADAP PRODUKTIVITAS AKADEMIK MAHASISWA Putri, Ella Rosediana; Lestiani, Dwi Indah; Anindra, Nisya Kayla Putri; Yarbo, Aqeela Istighfarin; Syirfa, Atika Naylatan; Dewi, Renny Sari
Journal of Digital Business and Innovation Management Vol. 2 No. 2 (2023): December 2023
Publisher : Universitas Negeri Surabaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26740/jdbim.v2i2.57674

Abstract

Millennial students, born between 1981-1996, are often considered a generation that is sophisticated in technology, but is also faced with several challenges. They tend to rely too much on technology, lack initiative in completing tasks themselves, are distracted by many distractions, and are susceptible to health problems. Apart from that, social and environmental factors also influence their thinking patterns and interactions. In the educational context, the practice of assignment jockeying and plagiarism are serious issues. This research emerged as a response to developments in Artificial Intelligence (AI) technology, such as ChatGPT generation 3 from OpenAI, which can be expected to address the problems of task jockeying and plagiarism. The aim of this research is to scientifically examine the potential of AI in combating dishonest academic practices because no previous research has investigated the correlation between the use of AI and overcoming student assignment jockeying and plagiarism. In the world of education, assignment jockeying and plagiarism are serious problems that can undermine academic integrity. Utilizing Artificial Intelligence (AI) technology, such as ChatGPT from OpenAI, can be an interesting solution to address this problem. Therefore, this research aims to scientifically prove through research the enthusiasm of students in (a) doing coursework using AI without worrying about plagiarism and (b) being able to eradicate assignment jockeys.
Maturity Level Risk Assessment in Media Companies Using the ISO 27001 Framework Wijaya, Anne Ivena; Lestiani, Dwi Indah; Damayanti, Yeni Rosa; Sugiono, Adinda Ayu Putri; Huanggino, Sherissa Callista
Journal of Digital Business and Innovation Management Vol. 3 No. 1 (2024): June 2024
Publisher : Universitas Negeri Surabaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26740/jdbim.v3i1.59169

Abstract

This study aims to assess the maturity level of information security in media companies using the ISO 27001 framework. With the rapid growth of the media industry and increasing cyber security risks, media companies must ensure that their information security systems meet applicable international standards so that existing data can be properly protected. This article uses the PRISMA method, which analyzes sources from articles or papers found on Publish or Perish. The research focuses on article sources that discuss the application of the ISO 27001 framework in companies and the Maturity Level of media companies. The results show that applying the ISO 27001 framework in conducting Maturity Level Assessments in media companies is very important to improve information security and reduce the risk of data leakage. This research also provides an important understanding of the application of the ISO 27001 framework in the media industry and offers guidance for media companies to improve their security maturity level. The limitations of this research are IDN Media as a single case study, so the generalizability of the findings may be limited and the evaluation that only focuses on certain aspects, such as the use of SE, and does not cover all information security domains.
Social Engineering and Inter-Device Eavesdropping Using SCRCPY for Spoofing and Sniffing Wijaya, Anne Ivena; Damayanti, Yeni Rosa; Lestiani, Dwi Indah; Sugiono, Adinda Ayu Putri; Huanggino, Sherissa Callista; Rijal, Demas Muhammad; Dewi, Renny Sari
Sistemasi: Jurnal Sistem Informasi Vol 13, No 5 (2024): Sistemasi: Jurnal Sistem Informasi
Publisher : Program Studi Sistem Informasi Fakultas Teknik dan Ilmu Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32520/stmsi.v13i5.4223

Abstract

The rapid development of technology opens up new avenues for cybercriminals to carry out acts of social engineering and eavesdropping between devices. Social engineering refers to manipulation, influence, or deception used to gain control of a computer system. This technique is utilized by cybercriminals to steal sensitive information from their victims. This research focuses on analyzing social engineering and eavesdropping techniques between devices using SCRCPY, an Android screen control tool that allows remote control of Android devices from a computer. SCRCPY presents new opportunities for cybercriminals to launch spoofing and sniffing attacks, two common techniques used in social engineering attacks. This research explores various eavesdropping scenarios, analyzing interactions between devices and users, as well as security system responses to suspicious activity. The results show that SCRCPY can be used for various social engineering and eavesdropping attacks. Cybercriminals can use SCRCPY to gain control of a victim's Android device through the perpetrator's desktop computer. These findings indicate that social engineering attacks and eavesdropping between devices are becoming increasingly sophisticated and difficult to detect. Therefore, users need to increase their awareness of these risks and take steps to protect themselves. Keywords: Social engineering, SCRCPY, spoofing, sniffing, device security.