{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,12,4]],"date-time":"2024-12-04T05:27:33Z","timestamp":1733290053738,"version":"3.30.1"},"reference-count":17,"publisher":"AIP Publishing","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1063\/5.0241585","type":"proceedings-article","created":{"date-parts":[[2024,12,3]],"date-time":"2024-12-03T18:00:35Z","timestamp":1733248835000},"page":"020014","source":"Crossref","is-referenced-by-count":0,"title":["Application of factor analysis methods to the development of system performance measurement models in company"],"prefix":"10.1063","volume":"3148","author":[{"given":"Wahyu","family":"Sardjono","sequence":"first","affiliation":[]},{"given":"Muhammad","family":"Tohir","sequence":"additional","affiliation":[]},{"given":"Achmad","family":"Cholidin","sequence":"additional","affiliation":[]}],"member":"317","reference":[{"key":"10.1063\/5.0241585_c1","unstructured":"Coe, M. J. 2005 TRUST SERVICES: A better way to evaluate I.T. controls. Journal of Accountancy 199 4 69\u201375"},{"key":"10.1063\/5.0241585_c2","doi-asserted-by":"publisher","DOI":"10.4018\/jcit.2005100108"},{"key":"10.1063\/5.0241585_c3","doi-asserted-by":"publisher","DOI":"10.2753\/JEC1086-4415130301"},{"key":"10.1063\/5.0241585_c4","doi-asserted-by":"crossref","unstructured":"Lee, H. S., & Kim, J. W. 2010 Student User Satisfaction with Web-based Information Systems in Korean Universities. International Journal of Business and Management 62","DOI":"10.5539\/ijbm.v5n1p62"},{"key":"10.1063\/5.0241585_c5","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.109032"},{"key":"10.1063\/5.0241585_c6","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2018.04.015"},{"key":"10.1063\/5.0241585_c7","doi-asserted-by":"crossref","unstructured":"H. Rais, R. A. Awad, and J. L. Jr, \"Memory forensic analysis of a programmable logic controller in industrial control systems,\" Forensic Science International: Digital Investigation, vol. 40, 2022","DOI":"10.1016\/j.fsidi.2022.301339"},{"key":"10.1063\/5.0241585_c8","doi-asserted-by":"crossref","unstructured":"R. Kaur, D. Gabrijel\u010di\u010d and T. Klobu\u010dar 2023 Artificial intelligence for cybersecurity: Literature review and future research directions Information Fusion 93","DOI":"10.1016\/j.inffus.2023.101804"},{"key":"10.1063\/5.0241585_c9","doi-asserted-by":"crossref","unstructured":"L. Johnson, Security Controls Evaluation, Testing, and Assessment Handbook (Second Edition), Academic Press, 2020.","DOI":"10.1016\/B978-0-12-818427-1.00008-2"},{"key":"10.1063\/5.0241585_c10","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2022.100571"},{"key":"10.1063\/5.0241585_c11","doi-asserted-by":"publisher","DOI":"10.1007\/s00146-018-0812-1"},{"key":"10.1063\/5.0241585_c12","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2019.12.003"},{"key":"10.1063\/5.0241585_c13","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-017-0882-1"},{"key":"10.1063\/5.0241585_c14","doi-asserted-by":"crossref","unstructured":"D. Wu, A. Ren, W. Zhang and J. Terpenny, \"Cybersecurity for digital manufacturing,\" Journal of Manufacturing Systems, vol. 48, no. C, pp. 3\u201312, 2018.","DOI":"10.1016\/j.jmsy.2018.03.006"},{"key":"10.1063\/5.0241585_c15","doi-asserted-by":"crossref","unstructured":"L. Xu and E. Tomai, \"A survey on security analysis of machine learning-oriented hardware and software intellectual property,\" High-Confidence Computing, vol. 3, no. 2, 2023.","DOI":"10.1016\/j.hcc.2023.100114"},{"key":"10.1063\/5.0241585_c16","doi-asserted-by":"crossref","unstructured":"A. Corallo and M. Lezzi, \"Cybersecurity in the context of industry 4.0,\" Computers in Industry, vol. 114, 2019.","DOI":"10.1016\/j.compind.2019.103165"},{"key":"10.1063\/5.0241585_c17","doi-asserted-by":"publisher","DOI":"10.1016\/j.hitech.2023.100455"}],"event":{"name":"THE 2ND INTERNATIONAL CONFERENCE OF MATHEMATICS EDUCATION, LEARNING, AND APPLICATION","location":"Jember, Indonesia"},"container-title":["AIP Conference Proceedings","THE 2ND INTERNATIONAL CONFERENCE OF MATHEMATICS EDUCATION, LEARNING, AND APPLICATION"],"original-title":[],"link":[{"URL":"https:\/\/pubs.aip.org\/aip\/acp\/article-lookup\/doi\/10.1063\/5.0241585","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,3]],"date-time":"2024-12-03T18:01:26Z","timestamp":1733248886000},"score":1,"resource":{"primary":{"URL":"https:\/\/pubs.aip.org\/aip\/acp\/article-lookup\/doi\/10.1063\/5.0241585"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1063\/5.0241585","relation":{},"ISSN":["0094-243X"],"issn-type":[{"value":"0094-243X","type":"print"}],"subject":[],"published":{"date-parts":[[2024]]}}}