Skip to main content
Skip to main navigation menu
Skip to site footer
Current
Archives
Article template
Call for paper
About
About the Journal
Submissions
Editorial Team
Privacy Statement
Contact
Search
Search
Register
Login
Home
/
Archives
/
Vol 1 No 1 (2014)
DOI:
https://doi.org/10.33555/acmit.v1i1
Published:
2019-03-18
Articles
WS-Security on PRODML
Bobby Suryajaya
9-34
PDF
Risk Assessment of Core Banking System Replacement based on ISACA Framework
Fenty Simanjuntak, Bobby Suryajaya
35-45
PDF
Implementation: Information Security Management System (ISMS) ISO 27001:2005 at Perbanas University
IGN Mantra
46-58
XYZ Web App Information Security Management Risk Assessment
Meily Meily
59-89
PDF
Wireless access point protection from un-authorized user in an office environment
Ignasius Irawan Budi P
90-98
PDF
In Search of Code Ethics Principles for IT Professionals in Indonesia
Carlia Isneniwati
98-111
PDF
Improving Productivity of Radiology Department
Herry Ahmadi
112-120
PDF
How Sweet and Ripe are the Fruits? Data Mining Techniques for Classifying and Predicting ‘Quick-Wins’ Direct Capital Investment in Indonesia as One Approach to Business intelligence Orientation and Knowledge Management Scenarios of Indonesian Enterprises
Ali Fauzi
121-131
PDF
Conceptual Risk on System Migration Framework
Nicsen Nicsen, Mohammad A. Amin Soetomo
132-145
PDF
Enhancing Web Security through Infrastructure Design
Muhammad Salahuddien Manggalanny
146-158
PDF
Language
Bahasa Indonesia
English
Information
For Readers
For Authors
For Librarians