It professionals plays very important roles in supporting the use of t by people to improve their quality of life and productivity. On the other hand it professionals also can contribute to problem…
Malware (malicious software) has become the most serious security threats on the internet. There is a malware that is created to provide remote access to the victim computer by bypassing normal aut…
Along with the growing of computer networks, many companies especially small medium enterprise (sme) are experiencing disruption to their computer network security. Sme need faster incident respons…
The core banking system selection process for banks is rarely to be conducted. But, the bank someday will need to replace the legacy core banking system after several years due to the aging system …
The agility of IT is required to perform fast response to the business needs whereas the day to day IT operational consist of multiple and complex systems. IT maintains hundred systems that running…
With the growth of the internet, the number of web applications is also growing. Many web applications are becoming more and more important to the stakeholders that they cannot afford downtime. The…
The massive distributions of sms spam gives nuisance to the subscribers and also potential loss to the service providers. In indonesia, sms spam is also increasing due to the cost, which is getting…
The goals of the thesis knew the effect of knowledge management system, knowing the most dominant factors and determine the effect of each variable KMS working simultaneously to increase the perfor…
B.y.o.d. (bring your own device) is an emerging trend where employees bring personal mobile devices to the workplace and access corporate resources such as email, documents, reports, together with …
In an modern organization with working Information System components a Database is often the key for a successful Decision making, business related choices, often customer related choices and most …