462 research outputs found

    ALIH KODE LAN CAMPUR KODE SAJRONE PAGELARAN WAYANG KULIT PURWA KANTHI LAKON WAHYU MAKUTHARAMA DENING KI PURBO ASMORO

    Get PDF
    Basa sajrone pagelaran wayang kulit dumadi saka pirang-pirang perangan basa Jawa kang ora saragam lan nduweni tujuwan tartamtu. Olah basa kang dumadi saka pirang-pirang ragam basa mau bisa ditemokake ing sajrone pagelaran wayang kulit lakon Wahyu Makutharama dening Ki Purbo Asmoro. Ancase panliten iki, yaiku (1) mangerteni wujud alih kode lan campur kode sajrone pagelaran wayang kulit lakon Wahyu Makutharama dening Ki Purbo, (2) mangerteni guna alih kode lan campur kode sajrone pagelaran. Panliten iki nggunakake tintingan sosiolinguistik mligine bab alih kode lan campur kode. Kagiyatan panliten iki nggunakake metodhe dheskriptif kualitatif. Dhata sajrone panliten iki dikumpulake kanthi cara nyimak video lan nyathet utawa nranskrip.Asile panliten iki yaiku nuduhake wujud alih kode sajrone pagelaran wayang kulit lakon Wahyu Makutharama dening Ki Purbo kang kaperang dadi 2, yaiku situasional lan metaforis. Alih kode situasional, yaiku alih kode kang disebabake anane wong katelu, lan swasana kang owah. Alih kode metaforis, yaiku alih kode kang disababake topik kang owah. Dene Campur kode kaperang dadi 5, yaiku tembung, tembung rangkep, frasa, klausa, idiom. Adhedhasar gunane alih kode kaperang dadi 6, yaiku kanggo ngluhurake dhiri pribadi, ngajeni wong katelu, mernahake, gegojegan, mejang. Campur kode nduweni 11 guna, yaiku ngluhurake dhiri pribadi, ngajeni wong kang dijak guneman, ngluhurake drajate wong kang lagi diomongke, mbangetake kahanan, gegojegan, ngraketake swasana, nggampangake ukara, ngendahke ukara, kanggo ngalembana, ndhelikake sasmita gendhing, pasemon.Tembung-tembung wigati: Alih Kode, Campur Kode, Sosiolinguistik

    A process model for implementing information systems security governance

    Get PDF
    Purpose; ; ; ; ; The frequent and increasingly potent cyber-attacks because of lack of an optimal mix of technical as well as non-technical IT controls has led to increased adoption of security governance controls by organizations. The purpose of this paper, thus, is to construct and empirically validate an information security governance (ISG) process model through the plan “do “check “act (PDCA) cycle model of Deming.; ; ; ; ; Design/methodology/approach; ; ; ; ; This descriptive research using an interpretive paradigm follows a qualitative methodology using expert interviews of five respondents working in the ISG domain in United Arab Emirates (UAE) to validate the theoretical model.; ; ; ; ; Findings; ; ; ; ; The findings of this paper suggest the primacy of the PDCA Deming cycle for initiating ISG through a risk-based approach assisted by industry-wide best practices in ISG. Regarding selection of ISG frameworks, respondents preferred to have ISO 27K supported by NIST as the core framework with other relevant ISG frameworks/standards forming the peripheral layer. The implementation focus of the ISG model is on mapping ISO 27K/NIST IT controls relevant IT controls selected from ISG frameworks from a horizontal and vertical perspective. Respondents asserted the automation of measurement and control mechanism through automation to assist in the feedback loop of the PDCA cycle.; ; ; ; ; Originality/value; ; ; ; ; The validated model helps academics and practitioners gain insight into the methodology of the phased implementation of an information systems governance process through the PDCA model, as well as the positioning of ITG and ITG frameworks in ISG. Practitioners can glean valuable insights from the empirical section of the research where experts detail the success factors, the sequential steps and justification of these factors in the ISG implementation process

    An Optimized Dynamic Process Model of IS Security Governance Implementation

    Get PDF
    The year 2011 has witnessed a lot of high profiles data breaches despite the availability of IS security and governance controls, frameworks, standards and models for organisations to choose from; and the technical advances made in intrusion prevention and detection. Taking this issue into account the objective of this paper is to identify and analyse the weaknesses in the IS security defences of organisations from a holistic perspective, and propose a dynamic IS security governance process model for the implementation of appropriate controls and mechanisms for optimised IS security. Optimization is achieved through the strategic overlap of security and governance frameworks implemented in a prioritized phased manner for efficiency and effectiveness in cost, time and effort. The paper starts with the analysis of data breaches to identify the weaknesses in the organisational information system. This is followed by the analysis of recommended requirements and dimensions of effective IS security architecture, IS governance, concepts and models to identify relevant frameworks used in IS security and governance. Thereafter, the best practices for implementing the model is evaluated and finally the frameworks and IS entities are integrated into an optimized Information Systems Security and Governance (ISSG) process model

    Development of K-12 Lessons Plans that Integrate Construction Engineering and Mathematics and Align with Educational Standards

    Get PDF
    This research project works towards the integration of the fields of (a) math education, (b) construction engineering and (c) architecture for the Interdisciplinary Graduate Study program. These three topic areas are integrated into a single project which involves the development of several lesson plans, with the goal of teaching K-12 students, through hands-on interactive activities, about the design, construction, and operation of buildings within the built environment. These lessons plans serve several purposes, specifically (1) to introduce students to the concepts of architecture and construction engineering, particularly how these fields encourage sustainability and comfort in the built environment, and (2) teach students how the math they are learning in the classroom is directly applicable to these fields. The lesson plans also align with the core standards and provide more resources to the educational field since resources on the discussed topics are not widely available. This project specifically focuses on the development of lesson plans for the 9th-grade level or Algebra I

    STRATEGI DIPLOMASI EKONOMI INDONESIA-CHINA DALAM UPAYA MEMPERKUAT PEREKONOMIAN INDONESIA DI MASA PANDEMI COVID-19

    Get PDF
    This research aims to examine Indonesia's economic diplomacy strategies during the COVID-19 pandemic. The global outbreak of the virus since late 2019 has had widespread implications, particularly in the field of economics. The economic sector in Indonesia has become increasingly unstable due to the pandemic. Similarly, China, as a hegemonic power, has experienced a decline in its economic sector. China's economic paralysis has had a significant impact on the global trade system. Consequently, Indonesia has chosen China as the focus of its economic diplomacy efforts. This study utilizes a descriptive methodology with a qualitative approach, employing the concept of economic diplomacy. Economic diplomacy is an official diplomatic activity that focuses on a nation's economic interests in the international arena. The research findings shed light on Indonesia's strategies in conducting economic diplomacy through collaboration with China, with a specific focus on Trade, Tourism, and Investment (TTI). The government's accuracy in selecting and implementing these strategies to stabilize the country's economy is crucial and has a profound influence on both the economic conditions and the welfare of its citizens

    POLA PERILAKU PREVENTIF MEROKOK PADA REMAJA (Studi Deskriptif Kualitatif remaja pada keluarga perokok di Kelurahan Sampung Kecamatan Kawedanan Kabupaten Magetan)

    Get PDF
    ABSTRAK Nicho Yoga Pratama. D0310048. Skripsi. Fakultas Ilmu Sosial Dan Politik Universitas Sebelas Maret Surakarta. 2010. POLA PERILAKU PREVENTIF MEROKOK PADA REMAJA (Studi Deskriptif Kualitatif remaja di dalam keluarga perokok di Kelurahan Sampung Kecamatan Kawedanan Kabupaten Magetan). Masalah merokok kususnya pada kalangan remaja saat ini memang sudah tidak menjadi rahasia umum lagi dikalangan masyarakat. Mereka seolah tidak mempedulikan bahkan tidak merasa sungkan lagi untuk merokok bersama orang yang lebih tua bahkan orang tuanya sendiri. Banyak alasan yang melatarbelakangi mengapa remaja merokok, diantaranya adalah kurangnya pengetahuan secara mendalam akan akibatnya, mengikuti kebiasaan di lingkungannya seperti orang tua dan teman pergaulan, serta terpengaruh oleh iklan-iklan rokok. Penelitian ini ingin mengungkap perilaku preventif merokok pada remaja. Penelitian ini merupakan penelitian deskriptif kualitatif . Penelitian ini bertujuan untuk mengetahui karakteristik sosial ekonomi remaja yang tidak merokok, faktor-faktor yang mempengaruhi remaja supaya tidak merokok dan mengetahui perilaku preventif merokok kususnya remaja pada keluarga perokok. dan teman pergaulan yang merokok. Subyek penelitian ini mencakup keluarga perokok dan teman sebaya yang merokok, serta respondennya adalah remaja tidak merokok. Pengambilan sampel penelitian dilakukan dengan teknik maximum variation sampling dan purposive sampling. Teknik pengumpulan datanya melalui observasi, wawancara mendalam dan dokumentasi sedangkan. Analisa data yang digunakan adalah analisis interaktif yang meliputi pengumpulan data, reduksi data, penyajian data, dan penarikan kesimpulan. Hasil penelitian ini menunjukkan bahwa faktor lingkungan keluarga, lingkungan pergaulan yang menyebabkan remaja tidak merokok. Menurut reponden dalam penelitian ini sadar akan bahaya serta efek yang ditimbulkan oleh rokok. Oleh karena itu mereka sadar akan pentingnya menjaga kesehatan tubuh sejak remaja salah satunya dengan tidak merokok. Upaya mereka supaya tidak merokok salah satunya dengan tindakan preventif. ( kata kunci : remaja, preventif, merokok) ABSTRACT Nicho Yoga Pratama. D0310048. THESIS. THE FACULTY OF SOCIAL SCIENCES AND POLITICS OF SEBELAS MARET UNIVERSITY SURAKARTA. 2015 PREVENTIVE BEHAVIOURAL PATTERN OF SMOKING ON TEENAGERS ( A Descriptive qualitative research on teenagers in smoker family in sampung district, kawedanan Magetan Problems dealing with smoking currently especially for teenagers has become a public secret in our society. They did not care to this case, even they do not give a respect to their own parents’ advice. There are so many reasons that led teenagers became a smoker, such as, the less of deep knowledge of the effect of smoking to their health, following the bad habit of their society especially their parents and friends and influenced by the smoking advertisement. This study aimed to reveal the preventive behaviour of smoking among teenangers. This research is a qualitative descriptive study. The aim of this research is to identify the characteristics of teenagers’ social and economic who did not smoke, the factors which influence the teenagers to avoid smoking and the preventive behavior especially teenager in the smoker family and their friend who did not smoke. This is a qualitative descriptive research. The subject of this research covers the smoker family and their friends who smoke and the teenagers who did not smoke set as respondents. The sample is taken by using maximum variation sampling and purposive sampling. The data are obtained by observation, interview and documentation technique. The method of analyzing the data is interactive analysis which covers collecting the data, reducing the data, serving the data and drawing the conclusion. The result of this study shows that the teenagers who did not smoke is affected by their family and society environment. According to the respondents from this research, they are aware about the effect of smoking. Therefore, they know the necessity of keeping their health by avoiding smoking since early. Their effort to not smoking can be called as a preventive action. (keywords : teenagers, preventive, smoking

    Information technology audit: systems alignment and effectiveness measures

    Get PDF
    Information technology audit has proven to be a relatively new, less researched and rapidly expanding field among large, medium and even small businesses (commercial and non-commercial organisations). The implementation rate has grown rapidly and presents a huge growth market for audit consultants due to the need for transparency and compliance with regulation (for example: Sarbanes Oxley Act) and the need to be competitive in the marketplace. The audit process is being conducted mainly by consultants following a traditional process but using different proprietary approaches and mostly done manually. The purpose of this study is to present a scientific method to attach a purely measurement focus to the auditing process so as to provide an auditing as well as a quantitative outcome of the performance to the various IS entities that are audited using a novel automated method that can save organisations considerable resources in terms of time, cost and effort. The nature of the topic directed the researcher to three domains of information system (IS) namely studies on IS measurement, IT governance and software engineering. These areas provided information on the nature of IS measurement and the models used; the process of auditing/measurement and the corresponding frameworks used; the principles and methodology of measurement of IS entities; and measurement models used both in the software engineering and information systems domain. The review of the literature gave rise to the research question and the COBIT-GQM (Control Objectives for Information Technology Audit) – Goal Question Metrics) model. The research question that had emerged out of the four propositions “How can an IT audit or governance framework be used to measure the effectiveness of IS entities in a scientific manner using customised and goal oriented metrics” along with the nature of data sought (positivist), guided the researcher to qualitative research using multiple case studies to test the theoretical model (grounded theory) that had emerged out of the literature review. The theoretical model was automated (with a front end interface and a back-end database) and initially tested for usability issues. Then the common COBIT control objective that was obtained through an initial survey was entered into the database along with a set of questions and metrics (developed by the researcher by following the given GQM guidelines). This application that was demonstrated, and given for evaluation in four organisations gave rise to expected and surprising results. While the respondents expressed their desire to incorporate a customised and goal oriented measurement perspective to their IT audit/performance functions, that would save them time, effort and cost, numerous suggestions were provided that need to be incorporated into the model to make it fully functional. Notable among them are the need to embed a multiple contextual qualifying layer, incorporating benchmarking feature to the model, and the need to link this with the maturity model. These were incorporated into the model and a comprehensive model incorporating all the suggestions was created. The qualitative case study method being used here more to evaluate a theory, provided a sound base for future studies to generate hypothesis that can be evaluated using quantitative survey methods for the model to be generalised. IT auditing being a relatively new, less researched, conventional and high growth oriented field, the use of an innovative, comprehensive, automated and scientific method of audit and measurement method will satisfy the implied need for organisations to incorporate the diverse audit/measurement/ control/standards into one comprehensive method and this research is a major step in this direction. Since the new model is comprehensive and can be automated organisations can economise in terms of time, cost and effort. Irrespective of the nature of economic cycle the need for economising in terms of cost, time and effort is universal for all organisations

    The Challenges of Sharia Pawnshops in Indonesia in The Era of The Industrial Revolution 4.0

    Get PDF
    ABSTRACTThe development of the Islamic financial system in Indonesia is marked by the establishment of various Islamic financial institutions and the issuance of various sharia-based financial instruments. Essentially, Islamic financial institutions are different from conventional financial institutions, in terms of mechanisms, objectives, powers, scope, and responsibilities. The provisions and discourses contained in classical fiqh on Rahn are then adapted to modern economic developments and synergized with the needs of today's society. With the majority of the Muslim population, it is not difficult for Sharia Pawnshops in Indonesia to develop their business. Sharia pawnshops are expected to be able to conduct campaigns to the public about the use of sharia-based products. However, there are still various problems in developing sharia pawnshops in Indonesia. And, an analysis needs to conduct to uncover obstacles and find solutions in an effort to develop sharia pawnshops. The type of the research was normative legal research using a qualitative descriptive approach. The study indicates that Sharia Pawnshops are one of the financial institutions that provide effective alternative funding for the community. The growth of pawnshop profits which continues to grow in the era of the industrial revolution 4.0 and during the Covid-19 pandemic is one indicator of the success of sharia pawnshop management. In addition, sharia pawnshops can prove that they can prioritize Islamic moral values during the rapid development of financial institutions in Indonesia. However, from all of this, there are problems that need to be evaluated to improve the performance of sharia pawnshops in the future.Keywords: Sharia Pawnshops, Pawn Products, and The Industrial Revolution 4.0.ABSTRAKBerkembangnya sistem keuangan syariah di Indonesia ditandai dengan didirikannya berbagai lembaga keuangan syariah dan diterbitkannya berbagai instrumen keuangan berbasis syariah. Secara esensial, lembaga keuangan syariah berbeda dengan lembaga keuangan konvensional, baik dalam mekanisme, tujuan, kekuasaan, ruang lingkup, serta tanggungjawabnya.  Ketentuan  dan  wacana-wacana  yang  terdapat dalam fikih klasik tentang rahn kemudian disesuaikan dengan perkembangan perekonomian modern dan disinergikan dengan kebutuhan masyarakat saat ini. Dengan mayoritas penduduk muslim, tidak sulit bagi Pegadaian Syariah di Indonesia untuk mengembangkan bisnisnya. Pegadaian syariah diharapkan mampu melakukan kampanye kepada masyarakat tentang penggunaan produk-produk berbasis syariah. Namun tetap terdapat berbagai problematika dalam mengembangkan pegadaian syariah di Indonesia, untuk mengungkap kendala dan mencari solusi sebagai upaya perkembangan pegadaian syariah, perlu dilakukan sebuah analisis.  Jenis penelitian ini adalah penelitian hukum normatif dengan menggunakan pendekatan deskriptif kualitatif. Hasil penelitian ini menujukkan bahwa Pegadaian Syariah sebagai salah satu lembaga keuangan yang memberikan alternatif pendanaan yang efektif bagi masyarakat. Pertumbuhan laba pegadaian yang terus tumbuh di era revolusi industri 4.0 dan di masa pandemi Covid-19 menjadi salah satu indikator keberhasilan pengelolaan pegadaian syariah. Selain itu, pegadaian syariah mampu membuktikan bahwa mereka mampu mengedepankan nilai-nilai moral Islam di tengah pesatnya perkembangan lembaga keuangan di Indonesia. Namun dari semua hal tersebut, masih terdapat permasalahan yang akan terus dievaluasi guna meningkatkan kinerja pegadaian syariah di masa yang akan datang.Kata Kunci: Pegadaian Syariah, Produk Pegadaian, dan Revolusi Industri 4.0

    Bypassing Multiple Security Layers Using Malicious USB Human Interface Device

    Get PDF
    The Universal Serial Bus (USB) enabled devices acts as a trusted tool for data interchange, interface, and storage for the computer systems through Human Interface Devices (HID) namely the keyboard, mouse, headphone, storage media and peripherals that use the USB port. However, with billions of USB enabled devices currently in use today, the attacker’s potential to seamlessly leverage this device to perform malicious activities by bypassing security layers presents serious risk to systems administrators. The paper thus presents a comprehensive review of the multiple attacks that can be leveraged using USB devices and the corresponding vulnerabilities including countermeasures. This is followed by the demonstration of five attacks to validate the threat and the associated vulnerabilities by bypassing four security layers namely (1) two server operating system (OS) controls, (2) one group policy control, and (3) antivirus. The attack was performed by plugging in a USB that is connected with the Arduino Micro board to install three differently crafted malwares into the victim machine (Windows Server 2012). As a result, the Arduino device that has been programmed to act like a Human Interaction Device (HID) was able to bypass all the four layers successfully, with execution on the first three layers. The attack-vulnerability theoretical model, the demonstration of the five attacks, and the subsequent analysis of the attacks provide academics with multiple domains (countermeasures) for further research, as well as practitioners to focus on critical IT controls
    • …
    corecore