Barka Satya


Understanding the concept of a healthy internet policy framework in the
context of this study is to analyze all forms of the level of interest in the use of
internet in the college environment is properly used, as an analysis in determining
or How to compile, Implementing, And Effectively And Efficiently manage, order
objective Optimization Performance can be achieved

Full Text:

PDF (Indonesian)


Adam, D. A, Nelson, R. R, and Todd, P. A. 1992. “Perceived Usefulness, Ease

ofUse and Usage of Information Technology: A Replication”.

ManagementInformation System Quarterly (16:2), pp. 227-250.

Adamson, Ivana and John Shine. 2003. “Extending the New Technology

Acceptance Model to Measure the End User Information Systems

Satisfaction in a Mandatory Environment: A Bank’s Treasury”.

Technology Analysis and Strategic Management, Vol. 15 No. 4.

Azizul Kholis. 2002. Analisis Penerimaan (Acceptance) Penggunaan Personal

Compute (PC) dengan Technology Acceptance Model (TAM) (Studi kasus

pada perusahaan Perdagangan Kecil di KotaMedan), Tesis, Program

Studi Magister Akuntansi Universitas Diponegoro (UNDIP), Semarang

(tidak dipublikasikan).

Dancho Danchev,” Building and Implementing a Successful Information

SecurityPolicy”.WindowSecurity.Com. 2003.

Davis, F.D. 1989. “Perceived Usefulness, Perceived Ease of Use, and User

Acceptance of Information Technology”, Management Information System

Quarterly 13(3), pp 319-340.

Fal Sadikin M.”Framework untuk menyusun Network Policy untuk Instansi

Pendidikan”.STMIK AMIKOM Yogyakarta,2009

Frederick M. Avolio and Steve Fallin.” Producing Your Network Security

Policy” July 2007.

H. Wainer and H. I. Braun, Test Validity, Hillsdale, N.J. : L. Erlbaum Associates,

Juniper Networks, Campus Networks Reference Architecture, Reference

Architecture, Juniper Networks, Inc., 2010.

K. Anderson, “Intelligence-based Threat Assessments for Information Networks

and Infrastructures,” White Paper of Network Risk Management, LLC,

L. Lymberopoulos, E. Lupu, and M. Sloman, “An Adaptive Policy Based

Framework for Network Services Management,” Journal of Network and

Systems Management, vol. 11, no. 3, pp. 277-303, 2003.

Legris, P., Ingham, J. And Collerette, P. 2003. “Why Do People Use Information

Technology? A Critical Review of the Technology Acceptance Model.”

Information and Management, 40(3). Pp 191-204

N. Feamster, A. Nayak, H. Kim, R. Clark, Y. Mundada, A. Ramachandran, and

M. bin Tariq, “Decoupling Policy from Configuration in Campus and

Enterprise Networks,” 17


IEEE Workshop on Local and Metro Area

Networks (LANMAN), May 2010

R. M. Weiers, Introduction to Business Statistics, 3


edition, Pacific Grove, Calif.

: Duxbury Press, 1998

T. Benson, A. Akella, and D. Maltz, “Unraveling the Complexity of Network

Management,” 6


USENIX Symposium on Networked Systems Design

and Implementation, pp. 335-348, 2009.

Q. Hu and S. Ma, “Does Privacy Still Matter in the Area of Web 2.0? A

Qualitative Study of User Behavior Towards Online Social Networking

Activities”, Proceeding of Pacific Asis Conference on Information Systems

(PACIS), paper 2, pp. 591-602, 2010.



  • There are currently no refbacks.

Indexed by:       


ISSN 2442-4528 (online) | ISSN 1979-925X (print)
Published by : Universitas Amikom Purwokerto
Jl. Let. Jend. POL SUMARTO Watumas, Purwonegoro - Purwokerto Telp (0281) 623321 Fax (0281) 621662

Creative Commons License
This work is licensed under a  Creative Commons Attribution 4.0 International License.