MERANCANG FRAMEWORK POLICY INTERNET SEHAT PERGURUAN TINGGI
Abstract
Understanding the concept of a healthy internet policy framework in the
context of this study is to analyze all forms of the level of interest in the use of
internet in the college environment is properly used, as an analysis in determining
or How to compile, Implementing, And Effectively And Efficiently manage, order
objective Optimization Performance can be achieved
Full Text:
PDF (Indonesian)References
Adam, D. A, Nelson, R. R, and Todd, P. A. 1992. “Perceived Usefulness, Ease
ofUse and Usage of Information Technology: A Replication”.
ManagementInformation System Quarterly (16:2), pp. 227-250.
Adamson, Ivana and John Shine. 2003. “Extending the New Technology
Acceptance Model to Measure the End User Information Systems
Satisfaction in a Mandatory Environment: A Bank’s Treasury”.
Technology Analysis and Strategic Management, Vol. 15 No. 4.
Azizul Kholis. 2002. Analisis Penerimaan (Acceptance) Penggunaan Personal
Compute (PC) dengan Technology Acceptance Model (TAM) (Studi kasus
pada perusahaan Perdagangan Kecil di KotaMedan), Tesis, Program
Studi Magister Akuntansi Universitas Diponegoro (UNDIP), Semarang
(tidak dipublikasikan).
Dancho Danchev,” Building and Implementing a Successful Information
SecurityPolicy”.WindowSecurity.Com. 2003.
Davis, F.D. 1989. “Perceived Usefulness, Perceived Ease of Use, and User
Acceptance of Information Technology”, Management Information System
Quarterly 13(3), pp 319-340.
Fal Sadikin M.”Framework untuk menyusun Network Policy untuk Instansi
Pendidikan”.STMIK AMIKOM Yogyakarta,2009
Frederick M. Avolio and Steve Fallin.” Producing Your Network Security
Policy”.Watchguard.com. July 2007.
H. Wainer and H. I. Braun, Test Validity, Hillsdale, N.J. : L. Erlbaum Associates,
Juniper Networks, Campus Networks Reference Architecture, Reference
Architecture, Juniper Networks, Inc., 2010.
K. Anderson, “Intelligence-based Threat Assessments for Information Networks
and Infrastructures,” White Paper of Network Risk Management, LLC,
L. Lymberopoulos, E. Lupu, and M. Sloman, “An Adaptive Policy Based
Framework for Network Services Management,” Journal of Network and
Systems Management, vol. 11, no. 3, pp. 277-303, 2003.
Legris, P., Ingham, J. And Collerette, P. 2003. “Why Do People Use Information
Technology? A Critical Review of the Technology Acceptance Model.”
Information and Management, 40(3). Pp 191-204
N. Feamster, A. Nayak, H. Kim, R. Clark, Y. Mundada, A. Ramachandran, and
M. bin Tariq, “Decoupling Policy from Configuration in Campus and
Enterprise Networks,” 17
th
IEEE Workshop on Local and Metro Area
Networks (LANMAN), May 2010
R. M. Weiers, Introduction to Business Statistics, 3
rd
edition, Pacific Grove, Calif.
: Duxbury Press, 1998
T. Benson, A. Akella, and D. Maltz, “Unraveling the Complexity of Network
Management,” 6
th
USENIX Symposium on Networked Systems Design
and Implementation, pp. 335-348, 2009.
Q. Hu and S. Ma, “Does Privacy Still Matter in the Area of Web 2.0? A
Qualitative Study of User Behavior Towards Online Social Networking
Activities”, Proceeding of Pacific Asis Conference on Information Systems
(PACIS), paper 2, pp. 591-602, 2010.
DOI: http://dx.doi.org/10.35671/telematika.v5i2.225
Refbacks
- There are currently no refbacks.

Telematika
ISSN 2442-4528 (online) | ISSN 1979-925X (print)
Published by : Universitas Amikom Purwokerto
Jl. Let. Jend. POL SUMARTO Watumas, Purwonegoro - Purwokerto Telp (0281) 623321 Fax (0281) 621662
Email: telematika@amikompurwokerto.ac.id
This work is licensed under a Creative Commons Attribution 4.0 International License.