Best 18 wheeler accident lawyer, offshore accident attorney, construction truck accident lawyer, best motorcycle attorney, spectrum business fiber, flagstar wholesale, meso law firm, mesothelioma compensation for family members, automotive accident lawyers

INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGY AND EDUCATION (IJITE)

Development of Electronic Business Management Information System at Trinita Elektro Manado Store

the purpose of the study was to determine the results of the development of an electronic business management information system and to produce a valid, practical, and efficient electronic business ma...

Professional and Pedagogic Competence of Lecturers of the Faculty of Engineering Universitas Negeri Manado

 the four teacher competencies are very important and cannot be separated from one another. professional competence, pedagogic competence, social competence and personality competence. one compet...

Developing Virtual Web as Learning Media for Web Programming in SMK

the purposes of this research are (1)  to generate virtual web as learning media subject specifically for web programming, (2) to find out the appropriateness of the product developed as a learni...

RFID Based Fuel Payment System Design

in the current era, technological developments are so rapid and there are not a few technologies that offer a variety of advantages, both in terms of the functionality of the technology or its effecti...

Usability Evaluation of the Android Operating System Using Use Questionnaire

usability aspects are used as a reference in measuring the level of usability of the android operating system. usability is important to use as an instrument to ensure an application can be useful acc...

IT Infrastructure Library Framework Approach to the Measurement of E-Government Maturity

this research was conducted to improve e-government services on the manado smart city application to the smart city and determine the level of readiness and feasibility of the manado smart city applic...

CCTV Architectural Design for Theft Detection Using Intruder Detection System

the human need for a monitoring system for certain places is increasing. in this regard, the computer laboratory belonging to the school is not free from security intruders. security bully or in engli...

Evaluation of Incident Management in University Using IT Infrastructure Library Framework

supporting the implementation of optimal services is a major need for organizations today. guaranteed service management and good security is one of the benchmarks. this study aims to measure the leve...

Design E-Office Application for Population Based on Cloud Computing

information and communication technology in the field of population e-office is very useful in supporting the process of data management, information, facts, distribution, and knowledge. the purpose o...

Understanding Usability Test of Operating Systems in University: Evidence From Indonesia

the operating system is the most important computer system software. currently, there are several operating systems that are so popular, including windows and macos. usability measurements were made b...

Understanding Cyber Crime Behavior on E-Commerce Application Users

e-commerce technology is a business mechanism that works electronically by focusing on online business transactions and has the opportunity to build more human and personalized relationships with cust...

Wireless Local Area Network Security Through Protocol Wireless Protected Access

this study discusses the security analysis of wireless local area network (wireless lan) in the community against external attacks on the wireless protected access (wpa), web proxy, and virtual privat...

A Survey Student Behaviors Computer Security: Evidence From University

in lectures, of course, students definitely need a computer, whether it's to make assignments or to play games. therefore, in using computers, students must maintain computer security from threats tha...

Mokobang SDGP Website Analysis and Design

valid and fast information is needed in everyday life. information will be an important element in the development of society today and in the future, but the high need for information is sometimes no...

Understanding of Information Security Behavior of Social Media Users Among Millennial Generation

the increasing use of social networks in indonesia is caused by the increasingly complete internet access facilities carried out by producers of communication service providers. this research aims to ...

The Impact of E-Health for Cancer Patients

e-health or electronic health is the use of information and communication technology including electronics, telecommunications, computers and informatics to process various types of medical informatio...

Student Information Security Awareness on the Use of ATM Machines

this study examines literature studies on security systems at automated teller machines which include pin security and forms of attacks on atm security. the method used in atm security is the use of a...

Understanding Users to Adopt Cloud Computing TECHNOLOGY

this research is entitled "factors that influence users to adopt cloud computing technology" which aims to examine what factors influence users in adopting or using cloud computing. this study focuses...

Measurement of Usability Online Storage in Cloud Computing for University Users

cloud computing technology or often known as cloud computing is present as an impact of changes in the cultural environment and competitive ecosystem on higher education in the world, including indone...

Analysis of Information Security Management Systems at University

one of the keys to the success of securing information systems is the vision and commitment of top management leaders. security efforts or initiatives would be meaningless without them. in the absence...

2

Search Research and Publications

CARI TULISAN is a scientific publication indexing site that helps everyone find research results and relevant data from papers, journals, books, research reports, and so on. Collected from various repositories, it makes scattered scientific research easily searchable.
All articles and content on this site are copyrighted works of the relevant authors that have been published as a result of scientific research. CARI TULISAN never distributes and supports pirated content.