Social engineering has become serious phenomenon in the history of information security worldwide. Although this approach is widely used by criminals to exploit the human aspect as the security wea…
It professionals plays very important roles in supporting the use of t by people to improve their quality of life and productivity. On the other hand it professionals also can contribute to problem…
Malware (malicious software) has become the most serious security threats on the internet. There is a malware that is created to provide remote access to the victim computer by bypassing normal aut…
Trend of potential threats due to over exposure in social media continues to increase in line with users growth. Popularity of social media are driven by several important factors: online lifestyle…
Along with the growing of computer networks, many companies especially small medium enterprise (sme) are experiencing disruption to their computer network security. Sme need faster incident respons…
Information security standard is a standard for securing information and asset information in it with reference to iso 27001:2005, they call isms (information security management system), the it go…
Many web applications in indonesia are built not based on security in mind. Most of them do not have awareness about security and it reflected on their work as the developer of the web application.…
Organizational performance is one of the key success in satisfying the customer and determine the success or failure of the company. Considering the increasingly fierce competition among constructi…
Business organizations concerns with employee productivity. This kind of productivity is the main source of profitability and sustainability of business. This research will study the influence of e…
The purpose of this research is looking at the relationship between the factors of technical, financial and legal with enterprise value in mergers and acquisitions of coal companies in Indonesia ov…