-
Application of TAM model to the use of information technology
Authors:
Harryanto,
Muchriana Muchran,
Ansari Saleh Ahmar
Abstract:
The purpose of this research is to see the application of modified TAM model by entering the experiential variable as a moderation variable to see one's intention in the use of technology especially internet banking. Data obtained through the distribution of questionnaires to customers. The study population is bank customers registered as users of internet banking services. The sample selection us…
▽ More
The purpose of this research is to see the application of modified TAM model by entering the experiential variable as a moderation variable to see one's intention in the use of technology especially internet banking. Data obtained through the distribution of questionnaires to customers. The study population is bank customers registered as users of internet banking services. The sample selection used a simple random sampling technique. Hypothesis testing using Partial Least Square (PLS) method through AMOS program. The results showed that the proposed five hypotheses, two significant and three insignificant. Perceived ease of use is significantly related to perceived usefulness. Per-ceived usefulness is not significantly related to intention to use. Perceived ease of use is significantly related to intention to use moderated by experience and not significantly correlated with intention to use moderated by the Experience.
△ Less
Submitted 13 January, 2019;
originally announced January 2019.
-
Implementing DMZ in Improving Network Security of Web Testing in STMIK AKBA
Authors:
Akbar Iskandar,
Elisabet Virma,
Ansari Saleh Ahmar
Abstract:
The aims of this research are to design and to implement network security system in internal web testing using DeMilitarized Zone Method and Microtic Router on Siakad server of STMIK AKBA. Data analysis techniques that possible to use is descriptive method. The significances of the study are 1) to avoid the attack of cracker who intend to access the system without permissions and 2) to improve net…
▽ More
The aims of this research are to design and to implement network security system in internal web testing using DeMilitarized Zone Method and Microtic Router on Siakad server of STMIK AKBA. Data analysis techniques that possible to use is descriptive method. The significances of the study are 1) to avoid the attack of cracker who intend to access the system without permissions and 2) to improve network securityon web testing services on Siakad server of STMIK AKBA. The data are obtained by having literature review and observation. Literature review assists the researchers to collect the theory on DeMilitarised Zone Method and the previous studies which were used as comparison to the recent study. Obervation was carried out directly to the field to observe the running system. Based on the results and discussion, it is shown that the aplication of DeMilitarized Zone Method on microtic can secure the web testing on Siakad server of STMIK AKBA and can maintain the whole series of online services that are available in the server.
△ Less
Submitted 13 January, 2019;
originally announced January 2019.
-
Digital Signature Security in Data Communication
Authors:
Robbi Rahim,
Andri Pranolo,
Ronal Hadi,
Rasyidah,
Heri Nurdiyanto,
Darmawan Napitupulu,
Ansari Saleh Ahmar,
Leon Andretti Abdillah,
Dahlan Abdullah
Abstract:
Authenticity of access in very information are very important in the current era of Internet-based technology, there are many ways to secure information from irresponsible parties with various security attacks, some of technique can use for defend attack from irresponsible parties are using steganography, cryptography or also use digital signatures. Digital signatures could be one of solution wher…
▽ More
Authenticity of access in very information are very important in the current era of Internet-based technology, there are many ways to secure information from irresponsible parties with various security attacks, some of technique can use for defend attack from irresponsible parties are using steganography, cryptography or also use digital signatures. Digital signatures could be one of solution where the authenticity of the message will be verified to prove that the received message is the original message without any change, Ong-Schnorr-Shamir is the algorithm are used in this research and the experiment are perform on the digital signature scheme and the hidden channel scheme.
△ Less
Submitted 5 November, 2018;
originally announced November 2018.