Filter By Year

1945 2024


Found 23,342 documents
Search Information

An Analysis of the Effects on Application of Management Accounting Information Systems and Quality Management Accounting Information Widia Astuty
KUMPULAN JURNAL DOSEN UNIVERSITAS MUHAMMADIYAH SUMATERA UTARA Vol 7, No 3 (2015): An Analysis of the Effects on Application of Management Accounting Information S
Publisher : KUMPULAN JURNAL DOSEN UNIVERSITAS MUHAMMADIYAH SUMATERA UTARA

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The study aims Drove empirically; (!J the influence of the business environment for the al?plication of management accounting information systems; (ii) the intDnce o ethics on the application of management accounting information systems; iii the influence of organizational culture on the implementation of management accounting ifll·mation systems; allCI (iv) the effect of the ap lication of management accounting information system n the uali of management accounting information. Th motivation of this study due to a phenomenon of having an integration on management accounting information system whereby the information generated is not qualified, as well as the uncertainty of business environment, ethics and organizational culture which are yet to have optimal conditions. The method used is explanatory research with a survey approach, using a statistical tool of SEM Partial Linear Regression, with the aif,I to obtain facts concerning the occurance ofyhenomena, seek actual and systematic information on th application of management accounting information systems, and the ual' of accounting informatio management. The results showed that all variable of the business environment, ethics, organizational culture affect the application of accounting information management system; and the application of management accounting information system affects the quality of information management accounting.
Birokrasi Masa Depan dengan Menggunakan Information Technology (Global Network) Perubahan Sikap dalam Mengadopsi Information Technology dan E-Government Kaiman Turnip
JKAP (Jurnal Kebijakan dan Administrasi Publik) 2003: JKAP VOLUME 7 NOMOR 1, TAHUN 2003
Publisher : Magister Administrasi Publik

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/jkap.8426

Abstract

in process
Mapping Information Asset Profile In The Implementation Of Risk Management Information System Using Octave Allergo Haeruddin, .
JITE (JOURNAL OF INFORMATICS AND TELECOMMUNICATION ENGINEERING) Vol 3, No 1 (2019): EDISI JULI
Publisher : Universitas Medan Area

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (325.369 KB) | DOI: 10.31289/jite.v3i1.2601

Abstract

The development of information systems that are very fast nowadays, encourages every organization to follow in order to escalate the competition. The technology that is widely used today is web-based technology. Apart from being easily accessible and used, this technology is vulnerable to any attacks; so using this information system will bring access risks by those who are not authorized. Therefore, risk management is something that needs to be considered in an organization to minimize the risks that will arise. Mapping the information asset profile can help Universitas Internasional Batam to evaluate, manage risks, and protect assets from the risks that will occur. The researcher used OCTAVE Allergo method in mapping and measuring Information Systems at Universitas Internasional Batam, consists of Academic Information Systems, Academic Portals, Registration Information Systems, Financial Information Systems, HR Information Systems. From the results of this study, Universitas Internasional Batam finds out which impact areas are the most effected: the reputation and customers trust, recognize the information of critical assets, mitigate assets that have high risks, in order to minimize unwanted risks.
Integration of Information System Success Models to Explain End User Satisfaction of Debtor Information Systems La Ode Sugianto; Arif Hartono; Novia Permatasari; Ika Farida Ulfah
AFRE (Accounting and Financial Review) Vol 2, No 1 (2019): July
Publisher : Postgraduate Program Merdeka University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26905/afr.v2i1.3260

Abstract

Acceptance Models by Davis (1988). This study integrates the information system quality variable, information quality variable, and end-user satisfaction variable from Information System Success. The population in this study were all employees user SID of the financial institution, the samples were 166 employees of finance institution. The sampling technique was nonprobability sampling with purposive sampling. The type of data was primary data by the method of questionnaire data collection. This research uses Structural Equation Model to analysis the method and analysis tool used was PLS. The results of this study show that information system quality significantly affects the perceived usefulness, information system quality significantly affects the perceived ease of use, information quality significantly affects the perceived usefulness, information quality significantly affects the perceived ease of use, information quality significantly affects the end-user satisfaction, perceived ease of use significantly affects the perceived usefulness, perceived usefulness significant affects the end-user satisfaction, and perceived ease of use significantly affects the end-user satisfaction. But, the examine the information quality didn’t significantly affect end-user satisfaction. DOI: https://doi.org/10.26905/afr.v2i1.3260
Design Information Consentpasiment Competition Of Desktop Based Dental Poly Information System In Palkesmas Talagabodas Bandung Yudhi Yanuar; Lilis Emalia; Novia Surya Ghani
IJISTECH (International Journal of Information System and Technology) Vol 3, No 1 (2019): November
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (624.434 KB) | DOI: 10.30645/ijistech.v3i1.32

Abstract

The research aims to know the design of system information completeness of charging the informed consent of the patient's Poly. teeth to use microsoft Visual Studio 2010 in UPT Puskemas Talagabodas the city of Bandung. The research method used is the method of qualitative techniques of collecting data field studies, interviews, the library and browsing the internet. Methods of use is a waterfall. From a study found no problems, namely : The process of completwness analysis  of charging the informed consent is still not running, The informed consent in Poly. teeth are not filled with complete, the lack of socialization of the creation and filling the informed consent, especially in Poly. teeth. The advice is give, namely :  start to do the analysis of the completeness of charging the informed consent in accordance with SOP,  the medical records that there can be re-socialization  back about the creation and filling the informed consent to all staff of other medical right to send out the,  should the institution has a system information that can rock the performance of staff medical records more effective in terms of analyzing the completeness of the informed consent and facilitate the creation of the,quipment.
THE INFLUENCE OF THE QUALITY ACCOUNTING INFORMATION SYSTEM TO THE QUALITY OF ACCOUNTING INFORMATION - EVIDENCE IN INDONESIA Puspitawati, Lilis; Anggadini, Sri Dewi
Majalah Ilmiah UNIKOM Vol. 17 No. 1 (2019): Majalah Ilmiah Unikom
Publisher : Universitas Komputer Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (526.063 KB) | DOI: 10.34010/miu.v17i1.2228

Abstract

Managers as stakeholders use accounting strategic management in implementing their business strategy. The essence of strategic management accounting is to create satisfaction for its customers which is known as the concept of value chain analysis. Currently the implementation of strategic management accounting has used information technology known as Accounting Information systems. Accounting Information systems produce Accounting Information that managers use in making strategic decisions in any company. This study used descriptive and verificative methods. Respondents in this study were 60 functional managers SOEs in Bandung Indonesia. Quality data tested by Validity and Reliability test. Statistical tests use structural equation model-PLS. Results of this study is Accounting Information Systems have a significant effect on the of accounting information on SOEs in Bandung City -Indonesia Keywords : Quality of Accounting Information Systems, Quality of Accounting Information, State Owner Enterprises
Am I Information Literate? and How Library Support My Information Needs? Ernawati, Endang
Humaniora Vol 1, No 1 (2010): Humaniora
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/humaniora.v1i1.2155

Abstract

Article clarifies information literacy (IL) implementation that is recognizing information needs, finding information, valuing, selecting information, creating new information and presenting it to get some inputs, applied in Cornel University, Dayton University, North Sumatera University, Duta Wacana University, and Bina Nusantara University. Data were collected by library research. It can be concluded that IL implementation in some mentioned universities have met the IL standards, IL is needed to develop students? knowledge, skills, and performance, some IL have applied in the formal teaching activity, so that it needs to be researched so that all parties are satisfied and the goal of study can be achieved.
Impelementation of Information Technology Service Management at Data And Information System Center of XYZ University Irfandhi, Kornelius; Indrawati, Ariani; Alexandra, Dwykie; Wanandi, Krisantus; Harisky, Yanuari; Liawatimena, Suryadiputra
ComTech: Computer, Mathematics and Engineering Applications Vol 7, No 1 (2016): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v7i1.2220

Abstract

Information Technology (IT) is increasingly progressing. Nowadays, the success of a business of the organization/company is highly dependent on the IT infrastructure used. Therefore, organizations/companies have to manage their IT service to be optimal to their customers. Looking at this matter and the increasing dynamics of XYZ University, then Data and Information System Center (Pusdatin) - an IT provider of XYZ University began implementing IT Service Management (ITSM) from 2013 using the latest version of Information Technology Infrastructure Library (ITIL), namely ITIL v3 as a framework for implementing ITSM in its business processes. However, along the way, there are still some problems happen in Pusdatin in order that ITSM can actually support and align with the objectives of XYZ University. Through this paper, the authors want to explain how the implementation of ITSM at Pusdatin, identify the problems related to the implementation of ITSM, and provide the solutions for each problem. The methods used are direct observation to Pusdatin, conductan interview with the Head of Pusdatin and Staff of Pusdatin, and also perform a literature review of books and papers that discuss about ITIL. The result of this research is that ITSM process of Pusdatin generally works quite well but there are still some shortcomings because ITSM is not 100% implemented in all areas.
Application Of Information Session Information System As Media Submission Of Final Results Comprehensive Session Leonard, James; Damanik, Dian Maharani; Amrikhasanah, Oktika Gita
ADI Journal on Recent Innovation Vol. 1 No. 1 (2019): September
Publisher : ADI Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (580.029 KB) | DOI: 10.34306/ajri.v1i1.16

Abstract

Good information that is based on data that has been processed properly so as to generate useful communication. The trial assessment system has 3 parts, but the system is not mutually integrated because 2 of them can already be accessed online while the examiner's assessment system still uses the local network. In the grading system, the examiner has a session news information system that is useful for conveying the final results of the session to the trial participants. This is because as technology advances are utilized as well as possible by educational institutions in this case namely universities to be used in a comprehensive session of thesis students or final assignments. Therefore, development is carried out on the examiner's assessment system so that it can be accessed online, where there is a trial news information system. The research was conducted using the method of observation, interviews and literature to maximize this research. The trial news information system is a very important system when a comprehensive trial process takes place. This is because the news information system of the hearing has information about the grades, grades and status obtained by the trial participants. This certainly becomes very vital in the trial assessment system. The display that will be developed in the examiner's rating system will be user friendly, making it easier for the board of examiners to use it. Even though the system was developed but did not change the original flow of the examiner's assessment system so that the board of examiners could adjust well to the new system, along with the news information system of the trial. With the existence of a hearing news information system, it makes the comprehensive trial process perfect and the trial assessment system becomes integrated again as before.
ANALYSIS OF ROUTER ATTACK WITH SECURITY INFORMATION AND EVENT MANAGEMENT AND IMPLICATIONS IN INFORMATION SECURITY INDEX CITRA ARFANUDIN; Bambang Sugiantoro; Yudi Prayudi
Cyber Security dan Forensik Digital Vol. 2 No. 1 (2019): Edisi Mei 2019
Publisher : Fakultas Sains dan Teknologi UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (324.204 KB) | DOI: 10.14421/csecurity.2019.2.1.1388

Abstract

Information security is a need to secure organizational information assets. The government as the regulator issues an Information Security Management System (ISMS) and Information Security Index (US) as a measure of information security in the agency of a region. Security Information and Event Management (SIEM) is a security technology to secure information assets. SIEM is expected to provide information on attacks that occur on the router network and increase the value of the Indeks KAMI of government agencies. However, the use of SIEM is still questionable whether it can recognize a router attack and its impact on the value of our index. This research simulates attacks on routers with 8 attacks namely Mac Flooding, ARP-Poisoning, CDP Flooding, DHCP Starvation, DHCP Rogue, SYN Flooding SSH Bruteforce and FTP Bruteforce. 8 types of attacks followed by digital forensic analysis using the OSCAR method to see the impact on routers and SIEM. Also measured is index KAMI before and after the SIEM to be able to measure the effect of SIEM installation on the value of index KAMI. It was found that the use of SIEM to conduct security monitoring proved successful in identifying attacks, but not all were recognized by SIEM. SIEM only recognizes DHCP Starvation, DHCP Rogue, SSH Bruteforce and FTP Bruteforce. Mac Flooding, ARP-Poisoning, CDP Flooding, SYN Flooding attacks are not recognized by SIEM because routers do not produce logs. Also obtained is the use of SIEM proven to increase our index from the aspect of technology

Page 11 of 2335 | Total Record : 23342