ANALISIS PENERIMAAN (ACCEPTANCE) PENERAPAN INTERNET SEHAT DENGAN TECHNOLOGY ACCEPTANCE MODEL (TAM) (Studi Kasus Pada STMIK AMIKOM Yogyakarta)

Barka Satya, Riski Aditya

Intisari / Abstract


Pengertian konsep framework  policy internet sehat dalam konteks penelitian ini adalah menganalisa segala bentuk tingkat kepentingan dalam penggunaan internet pada lingkungan perguruan tinggi secara benar yang digunakan, sebagai suatu analisa dalam menentukan atau bagaimana menyusunnya, mengimplementasi, serta mengelolanya secara efektif dan efisien, agar tujuan pengoptimalan kinerja dapat tercapai.


Teks Lengkap:

PDF

Referensi


Adam, D. A, Nelson, R. R, and Todd, P. A. 1992. “Perceived Usefulness, Ease ofUse and Usage of Information Technology: A Replication”. ManagementInformation System Quarterly (16:2), pp. 227-250.

Adamson, Ivana and John Shine. 2003. “Extending the New Technology Acceptance Model to Measure the End User Information Systems Satisfaction in a Mandatory Environment: A Bank’s Treasury”. Technology Analysis and Strategic Management, Vol. 15 No. 4.

Ariasari, Fani. 2007. Panduan Praktis Bikin Blog dengan WordPress. Jakarta. Penerbit Mediakita

Azizul Kholis. 2002. Analisis Penerimaan (Acceptance) Penggunaan Personal Compute (PC) dengan Technology Acceptance Model (TAM) (Studi kasus pada perusahaan Perdagangan Kecil di KotaMedan), Tesis, Program Studi Magister Akuntansi Universitas Diponegoro (UNDIP), Semarang (tidak dipublikasikan).

Dancho Danchev,” Building and Implementing a Successful Information SecurityPolicy”.WindowSecurity.Com. 2003.

Davis, F.D. 1989. “Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology”, Management Information System Quarterly 13(3), pp 319-340.

Fal Sadikin M.”Framework untuk menyusun Network Policy untuk Instansi Pendidikan”.STMIK AMIKOM Yogyakarta,2009

Frederick M. Avolio and Steve Fallin.” Producing Your Network Security Policy”.Watchguard.com. July 2007.

H. Wainer and H. I. Braun, Test Validity, Hillsdale, N.J. : L. Erlbaum Associates, 1988.

Juniper Networks, Campus Networks Reference Architecture, Reference Architecture, Juniper Networks, Inc., 2010.

Bodnar H George and Hopwood S, (1995), Accounting Information System, Edisi Bahasa Indonesia, oleh Amir Abadi Yusuf dan Rudi M Tambunan, Buku Satu, Edisi Keenam, Penerbit Salemba Empat, Jakarta.

Darma, Gede Sri, (2000), “Employee Perception of The Impact of Information Technology Investment In Organization”, Gadjah Mada International Journal of Business, Vol. 02, pp. 185-211.

Davis, Fred. D, (1989), “Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology”, MIS Quarterly, pp. 318-340.

Dishaw, Mark T. Diane M. Strong and D. Brent Bandy, (2002), “Extending the Task-Technology Fit Model With Self-Efficacy Constructs”, Eight Americas Conference on Information System, pp. 1021-1027, http://aisel.iswold.org/

Featherman, Mauricio S. and Pavlou, Paul A. (2002) “Predicting E. Services Adoption : A perceived Risk Facets perspective”, Eight Americas Conference on Information System, pp. 1034-1046, http://aisel.isworld.org/

Fridenberg, L. (1995), Psychological Testing, Design, Analysis, and Use, Allyn and Bacon.

Hair, J.F, Anderson, RE, Tatham, R.L. dan Black, W.C. (1998), Multivariete Data Analysis, 5 th Edition, Upper Saddle River.


Refbacks

  • Saat ini tidak ada refbacks.