{"status":"ok","message-type":"work-list","message-version":"1.0.0","message":{"facets":{},"total-results":11072832,"items":[{"indexed":{"date-parts":[[2022,4,21]],"date-time":"2022-04-21T21:19:43Z","timestamp":1650575983637},"publisher-location":"2455 Teller Road,\u00a0Thousand Oaks\u00a0California\u00a091320\u00a0United States\u00a0","reference-count":0,"publisher":"SAGE Publications, Inc.","content-domain":{"domain":[],"crossmark-restriction":false},"published-print":{"date-parts":[[2009]]},"DOI":"10.4135\/9781452274966.n1","type":"book-chapter","created":{"date-parts":[[2013,3,1]],"date-time":"2013-03-01T19:40:59Z","timestamp":1362166859000},"page":"1-36","source":"Crossref","is-referenced-by-count":0,"title":["Introducing Information Systems Project Management"],"prefix":"10.4135","member":"179","container-title":["Information Systems Project Management"],"deposited":{"date-parts":[[2022,4,21]],"date-time":"2022-04-21T20:50:13Z","timestamp":1650574213000},"score":18.822927,"resource":{"primary":{"URL":"https:\/\/sk.sagepub.com\/books\/information-systems-project-management\/n1.xml"}},"issued":{"date-parts":[[2009]]},"references-count":0,"alternative-id":["10.4135\/9781452274966"],"URL":"https:\/\/doi.org\/10.4135\/9781452274966.n1","published":{"date-parts":[[2009]]}},{"indexed":{"date-parts":[[2023,7,18]],"date-time":"2023-07-18T10:32:39Z","timestamp":1689676359105},"reference-count":9,"publisher":"Informa UK Limited","issue":"4","license":[{"start":{"date-parts":[[2020,10,23]],"date-time":"2020-10-23T00:00:00Z","timestamp":1603411200000},"content-version":"unspecified","delay-in-days":41,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Information Systems Management"],"published-print":{"date-parts":[[2020,10,1]]},"DOI":"10.1080\/10580530.2020.1820640","type":"journal-article","created":{"date-parts":[[2020,9,12]],"date-time":"2020-09-12T12:34:00Z","timestamp":1599914040000},"page":"357-360","update-policy":"http:\/\/dx.doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":4,"title":["COVID and Opportunities for Information Systems Management Research"],"prefix":"10.1080","volume":"37","author":[{"given":"Egon","family":"Berghout","sequence":"first","affiliation":[{"name":"Department of Innovation Management & Strategy, University of Groningen, Groningen, The Netherlands"}]}],"member":"301","published-online":{"date-parts":[[2020,9,12]]},"reference":[{"key":"cit0001","unstructured":"AMS-IX. (2020, March 25). 17% traffic increase on the AMS-IX platform due to Corona\/COVID-19 crisis, AMS-IX News. Retrieved from https:\/\/www.ams-ix.net\/ams\/news\/17-traffic-increase-on-the-ams-ix-platform-due-to-corona-covid-19-crisis."},{"key":"cit0002","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.12.1.76.10122"},{"key":"cit0003","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2007.02.004"},{"key":"cit0004","unstructured":"Economist. (2020). The COVID-19 pandemic will be over by the end of 2021, says Bill Gates. The Economist, 18 August 2020."},{"key":"cit0005","unstructured":"ENISA. (2008). Web 2.0 security and privacy. ENISA - European Network and Information Security Agency. Retrieved from https:\/\/www.enisa.europa.eu\/publications\/copy_of_report\/at_download\/fullReport."},{"key":"cit0006","volume-title":"The global risk report","author":"WEF - World Economic Forum","year":"2020","edition":"15"},{"key":"cit0007","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2004.11045782"},{"key":"cit0008","unstructured":"WHO- World Health Organization. (2020, August 31). WHO coronavirus disease (COVID-19) dashboard. World Health Organization. Retrieved from https:\/\/covid19.who.int\/."},{"key":"cit0009","unstructured":"Yuan, E. S. (2020, April 1). A message to our users. ZOOM Blog. Retrieved from https:\/\/blog.zoom.us\/a-message-to-our-users\/."}],"container-title":["Information Systems Management"],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/10580530.2020.1820640","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,31]],"date-time":"2021-05-31T03:00:36Z","timestamp":1622430036000},"score":18.697643,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/10580530.2020.1820640"}},"issued":{"date-parts":[[2020,9,12]]},"references-count":9,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2020,10,1]]}},"alternative-id":["10.1080\/10580530.2020.1820640"],"URL":"https:\/\/doi.org\/10.1080\/10580530.2020.1820640","ISSN":["1058-0530","1934-8703"],"issn-type":[{"value":"1058-0530","type":"print"},{"value":"1934-8703","type":"electronic"}],"published":{"date-parts":[[2020,9,12]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uism20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uism20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2020-09-12","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]},{"indexed":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T17:19:14Z","timestamp":1723051154131},"reference-count":0,"publisher":"Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP","issue":"5","content-domain":{"domain":["www.ijitee.org"],"crossmark-restriction":true},"short-container-title":["IJITEE"],"abstract":"<jats:p>Usability and quality information has an important role in a website. To measure the use and quality of the information this research carries out on the pedulisehat website. Customer Relationship Management (CRM) uses chatbot. The variables used in this study are information quality and chatbot usage services. The results showed good results on the pedulisehat.id chatbot website, from the data collected produced two variable quality information with a yield of 77.8% and usability with a result of 63.1%. There is still a need to improve the quality of information and the use of the pedulisehat.id website.<\/jats:p>","DOI":"10.35940\/ijitee.e1994.039520","type":"journal-article","created":{"date-parts":[[2020,3,19]],"date-time":"2020-03-19T00:58:08Z","timestamp":1584579488000},"page":"53-57","update-policy":"http:\/\/dx.doi.org\/10.35940\/beiesp.crossmarkpolicy","source":"Crossref","is-referenced-by-count":0,"title":["Usabi lity and Quality Information in pedulisehat.id CRM u sing Chatbot"],"prefix":"10.35940","volume":"9","author":[{"name":"Information Systems Management Department, BINUS Graduate Program \u2013 Master of Information Systems Management, Bina Nusantara University, Jakarta","sequence":"first","affiliation":[]},{"family":"Sfenrianto","sequence":"first","affiliation":[]},{"given":"Raden Aditya Bayu","family":"Pratama","sequence":"additional","affiliation":[]},{"name":"Information Systems Management Department, BINUS Graduate Program \u2013 Master of Information Systems Management, Bina Nusantara University, Jakarta","sequence":"additional","affiliation":[]},{"given":"Arie","family":"Handoko","sequence":"additional","affiliation":[]},{"name":"Information Systems Management Department, BINUS Graduate Program \u2013 Master of Information Systems Management, Bina Nusantara University, Jakarta","sequence":"additional","affiliation":[]},{"given":"Bagus Afan","family":"Herlambang","sequence":"additional","affiliation":[]},{"name":"Information Systems Management Department, BINUS Graduate Program \u2013 Master of Information Systems Management, Bina Nusantara University, Jakarta","sequence":"additional","affiliation":[]}],"member":"21590","published-online":{"date-parts":[[2020,3,30]]},"container-title":["International Journal of Innovative Technology and Exploring Engineering"],"link":[{"URL":"http:\/\/www.ijitee.org\/wp-content\/uploads\/papers\/v9i5\/E1994039520.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,21]],"date-time":"2022-03-21T03:32:57Z","timestamp":1647833577000},"score":18.681458,"resource":{"primary":{"URL":"https:\/\/www.ijitee.org\/portfolio-item\/E1994039520\/"}},"issued":{"date-parts":[[2020,3,30]]},"references-count":0,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2020,3,30]]}},"URL":"https:\/\/doi.org\/10.35940\/ijitee.e1994.039520","ISSN":["2278-3075"],"issn-type":[{"type":"electronic","value":"2278-3075"}],"published":{"date-parts":[[2020,3,30]]}},{"indexed":{"date-parts":[[2022,4,4]],"date-time":"2022-04-04T09:47:24Z","timestamp":1649065644022},"publisher-location":"London","standards-body":{"name":"BSI British Standards","acronym":"BSI"},"reference-count":0,"publisher":"BSI British Standards","content-domain":{"domain":[],"crossmark-restriction":false},"DOI":"10.3403\/01300725u","type":"standard","created":{"date-parts":[[2015,6,10]],"date-time":"2015-06-10T03:19:14Z","timestamp":1433906354000},"source":"Crossref","is-referenced-by-count":0,"title":["Information security management"],"prefix":"10.3403","member":"1988","deposited":{"date-parts":[[2017,12,5]],"date-time":"2017-12-05T13:59:16Z","timestamp":1512482356000},"score":18.643345,"resource":{"primary":{"URL":"https:\/\/linkresolver.bsigroup.com\/junction\/resolve\/000000000001300725?restype=undated"}},"subtitle":["Specification for information security management systems"],"issued":{"date-parts":[[null]]},"references-count":0,"URL":"https:\/\/doi.org\/10.3403\/01300725u"},{"indexed":{"date-parts":[[2022,4,4]],"date-time":"2022-04-04T17:49:30Z","timestamp":1649094570870},"publisher-location":"London","standards-body":{"name":"BSI British Standards","acronym":"BSI"},"reference-count":0,"publisher":"BSI British Standards","content-domain":{"domain":[],"crossmark-restriction":false},"DOI":"10.3403\/00462623u","type":"standard","created":{"date-parts":[[2015,6,10]],"date-time":"2015-06-10T15:53:12Z","timestamp":1433951592000},"source":"Crossref","is-referenced-by-count":0,"title":["Information technology. Open systems interconnection. Structure of management information"],"prefix":"10.3403","member":"1988","deposited":{"date-parts":[[2017,12,5]],"date-time":"2017-12-05T14:31:51Z","timestamp":1512484311000},"score":18.548634,"resource":{"primary":{"URL":"https:\/\/linkresolver.bsigroup.com\/junction\/resolve\/000000000000462623?restype=undated"}},"subtitle":["Generic management information"],"issued":{"date-parts":[[null]]},"references-count":0,"URL":"https:\/\/doi.org\/10.3403\/00462623u"},{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T13:00:43Z","timestamp":1648904443984},"publisher-location":"London","standards-body":{"name":"BSI British Standards","acronym":"BSI"},"reference-count":0,"publisher":"BSI British Standards","content-domain":{"domain":[],"crossmark-restriction":false},"DOI":"10.3403\/01300725","type":"standard","created":{"date-parts":[[2013,12,10]],"date-time":"2013-12-10T16:30:00Z","timestamp":1386693000000},"approved":{"date-parts":[[1998,2,15]]},"source":"Crossref","is-referenced-by-count":0,"title":["Information security management"],"prefix":"10.3403","member":"1988","deposited":{"date-parts":[[2017,12,5]],"date-time":"2017-12-05T07:47:28Z","timestamp":1512460048000},"score":18.538282,"resource":{"primary":{"URL":"https:\/\/linkresolver.bsigroup.com\/junction\/resolve\/000000000001300725?restype=standard"}},"subtitle":["Specification for information security management systems"],"issued":{"date-parts":[[null]]},"references-count":0,"URL":"https:\/\/doi.org\/10.3403\/01300725"},{"indexed":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T17:19:48Z","timestamp":1723051188643},"reference-count":0,"publisher":"Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP","issue":"5","content-domain":{"domain":["www.ijitee.org"],"crossmark-restriction":true},"short-container-title":["IJITEE"],"abstract":"<jats:p>PELNI Medical Center is one of the oldest Medical Centers in Indonesia which in 2018 is already 100 years old. In providing good health services to the community, PELNI Medical Center also conducts education and training processes for its employees. The current training is conventional training, where the time and place of training can change because it adjusts to the conditions of existing services and patients. Besides, the costs required are quite a lot to meet the needs of the training that is held. Therefore, PELNI Medical Center wants an e-Learning system as a learning medium to overcome these problems and can facilitate the education and training process. The design of the e-Learning system is built using the method of designing Object-Oriented Analysis and Design with the Unified Process. As for the data collection techniques used, namely interviews and questionnaires. The expected results of the design of this e-Learning system are that it can be used as an educational medium in the education and training process at Pelni Medical Center, increase the ability of knowledge and independent learning in each of its users, and can facilitate the improvement and storage of learning materials applied at the PELNI Medical Center.<\/jats:p>","DOI":"10.35940\/ijitee.e2257.039520","type":"journal-article","created":{"date-parts":[[2020,3,19]],"date-time":"2020-03-19T01:55:23Z","timestamp":1584582923000},"page":"180-186","update-policy":"http:\/\/dx.doi.org\/10.35940\/beiesp.crossmarkpolicy","source":"Crossref","is-referenced-by-count":0,"title":["Designing E-learning Application to Enhance Education Effectiveness for PELNI Medical Center"],"prefix":"10.35940","volume":"9","author":[{"name":"Information Systems Management Department, BINUS Graduate Program \u2013 Master of Information Systems Management, Bina Nusantara University, Jakarta","sequence":"first","affiliation":[]},{"given":"Sfenrianto","family":"Sfenrianto*","sequence":"first","affiliation":[]},{"given":"Kevin","family":"Angriawan","sequence":"additional","affiliation":[]},{"name":"Information Systems Management Department, BINUS Graduate Program \u2013 Master of Information Systems Management, Bina Nusantara University, Jakarta","sequence":"additional","affiliation":[]},{"given":"Rahmat Ivan","family":"Aziz","sequence":"additional","affiliation":[]},{"name":"Information Systems Management Department, BINUS Graduate Program \u2013 Master of Information Systems Management, Bina Nusantara University, Jakarta","sequence":"additional","affiliation":[]},{"given":"Teguh","family":"Sugiyono","sequence":"additional","affiliation":[]},{"name":"Information Systems Management Department, BINUS Graduate Program \u2013 Master of Information Systems Management, Bina Nusantara University, Jakarta","sequence":"additional","affiliation":[]}],"member":"21590","published-online":{"date-parts":[[2020,3,30]]},"container-title":["International Journal of Innovative Technology and Exploring Engineering"],"link":[{"URL":"http:\/\/www.ijitee.org\/wp-content\/uploads\/papers\/v9i5\/E2257039520.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,21]],"date-time":"2022-03-21T03:34:09Z","timestamp":1647833649000},"score":18.535698,"resource":{"primary":{"URL":"https:\/\/www.ijitee.org\/portfolio-item\/E2257039520\/"}},"issued":{"date-parts":[[2020,3,30]]},"references-count":0,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2020,3,30]]}},"URL":"https:\/\/doi.org\/10.35940\/ijitee.e2257.039520","ISSN":["2278-3075"],"issn-type":[{"type":"electronic","value":"2278-3075"}],"published":{"date-parts":[[2020,3,30]]}},{"indexed":{"date-parts":[[2022,4,4]],"date-time":"2022-04-04T20:20:22Z","timestamp":1649103622037},"publisher-location":"London","standards-body":{"name":"BSI British Standards","acronym":"BSI"},"reference-count":0,"publisher":"BSI British Standards","content-domain":{"domain":[],"crossmark-restriction":false},"DOI":"10.3403\/00462623","type":"standard","created":{"date-parts":[[2013,12,10]],"date-time":"2013-12-10T16:46:14Z","timestamp":1386693974000},"approved":{"date-parts":[[1995,2,15]]},"source":"Crossref","is-referenced-by-count":0,"title":["Information technology. Open systems interconnection. Structure of management information"],"prefix":"10.3403","member":"1988","deposited":{"date-parts":[[2017,12,5]],"date-time":"2017-12-05T07:57:42Z","timestamp":1512460662000},"score":18.532835,"resource":{"primary":{"URL":"https:\/\/linkresolver.bsigroup.com\/junction\/resolve\/000000000000462623?restype=standard"}},"subtitle":["Generic management information"],"issued":{"date-parts":[[null]]},"references-count":0,"URL":"https:\/\/doi.org\/10.3403\/00462623"},{"indexed":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T17:28:32Z","timestamp":1723051712102},"reference-count":0,"publisher":"Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP","issue":"5","content-domain":{"domain":["www.ijrte.org"],"crossmark-restriction":true},"short-container-title":["IJRTE"],"abstract":"<jats:p>Commuter line (KRL) one of the better public transportation for commuter people in Indonesia especially in Jabodetabek (Jakarta, Bogor, Depok, Tangerang, Bekasi). Passenger satisfaction is the one of the service quality factor in KRL. There is no real time passenger information in both train and station, the situation make an unpredictable activity for passenger that want to use or wait the commuter line (KRL). Most of passenger cannot enter the train because the crowded passenger. KRL management cannot manage train capacity and train time management to meet passenger needs. This paper proposed a smart commuter line system to provide real time passenger information using IoT by count people using Markov Random Field framework and integrate all KRL enterprise system using SOA to support data integration.<\/jats:p>","DOI":"10.35940\/ijrte.e4976.018520","type":"journal-article","created":{"date-parts":[[2020,2,8]],"date-time":"2020-02-08T05:23:11Z","timestamp":1581139391000},"page":"485-488","update-policy":"http:\/\/dx.doi.org\/10.35940\/beiesp.crossmarkpolicy","source":"Crossref","is-referenced-by-count":0,"title":["Smart Commuter Line (KRL) using IoT and SOA in Indonesia"],"prefix":"10.35940","volume":"8","author":[{"name":"Information Systems Management Department, BINUS Graduate Program, Master of Information Systems Management, Bina Nusantara University Jakarta, Indonesia","sequence":"first","affiliation":[]},{"given":"B. Junedi","family":"Hutagaol*","sequence":"first","affiliation":[]},{"family":"Dennis","sequence":"additional","affiliation":[]},{"name":"Information Systems Management Department, BINUS Graduate Program, Master of Information Systems Management, Bina Nusantara University Jakarta, Indonesia","sequence":"additional","affiliation":[]},{"given":"Matius","family":"Richard","sequence":"additional","affiliation":[]},{"name":"Information Systems Management Department, BINUS Graduate Program, Master of Information Systems Management, Bina Nusantara University Jakarta, Indonesia","sequence":"additional","affiliation":[]},{"given":"Nilo","family":"Legowo","sequence":"additional","affiliation":[]},{"name":"Information Systems Management Department, BINUS Graduate Program, Master of Information Systems Management, Bina Nusantara University Jakarta, Indonesia","sequence":"additional","affiliation":[]}],"member":"21590","published-online":{"date-parts":[[2020,1,30]]},"container-title":["International Journal of Recent Technology and Engineering (IJRTE)"],"link":[{"URL":"https:\/\/www.ijrte.org\/wp-content\/uploads\/papers\/v8i5\/E4976018520.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,22]],"date-time":"2022-04-22T08:25:31Z","timestamp":1650615931000},"score":18.521101,"resource":{"primary":{"URL":"https:\/\/www.ijrte.org\/portfolio-item\/E4976018520\/"}},"issued":{"date-parts":[[2020,1,30]]},"references-count":0,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2020,1,30]]}},"URL":"https:\/\/doi.org\/10.35940\/ijrte.e4976.018520","ISSN":["2277-3878"],"issn-type":[{"type":"electronic","value":"2277-3878"}],"published":{"date-parts":[[2020,1,30]]}},{"indexed":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T17:29:11Z","timestamp":1723051751661},"reference-count":0,"publisher":"Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP","issue":"6","content-domain":{"domain":["www.ijrte.org"],"crossmark-restriction":true},"short-container-title":["IJRTE"],"abstract":"<jats:p>This study aims to determine the effect of Celebrity Endorser on elements of Brand Equity and its impact on purchasing decisions in one e-Commerce in Indonesia, Tokopedia. The number of samples in this study are 111 respondents who have used Tokopedia. The data collection method uses a questionnaire. In this study, Brand Equity itself divided into 4 dimensions hence the researchers look at the correlation between Celebrity Endorser and each dimension of Brand Equity, and purchase decision.<\/jats:p>","DOI":"10.35940\/ijrte.f7423.038620","type":"journal-article","created":{"date-parts":[[2020,4,10]],"date-time":"2020-04-10T05:54:31Z","timestamp":1586498071000},"page":"581-584","update-policy":"http:\/\/dx.doi.org\/10.35940\/beiesp.crossmarkpolicy","source":"Crossref","is-referenced-by-count":0,"title":["The Effect Celebrity Endorser and Brand Equity to Purchase Decision in E- Commerce Tokopedia"],"prefix":"10.35940","volume":"8","author":[{"name":"Information Systems Management Department, BINUS Graduate Program \u2013 Master of Information Systems Management, Bina Nusantara University, Jakarta","sequence":"first","affiliation":[]},{"given":"Yulyanty","family":"Chandra*","sequence":"first","affiliation":[]},{"given":"Roy","family":"Willis","sequence":"additional","affiliation":[]},{"name":"Information Systems Management Department, BINUS Graduate Program \u2013 Master of Information Systems Management, Bina Nusantara University, Jakarta","sequence":"additional","affiliation":[]},{"given":"Calvin","family":"Windoro","sequence":"additional","affiliation":[]},{"name":"Information Systems Management Department, BINUS Graduate Program \u2013 Master of Information Systems Management, Bina Nusantara University, Jakarta","sequence":"additional","affiliation":[]},{"family":"Sfenrianto","sequence":"additional","affiliation":[]},{"name":"Information Systems Management Department, BINUS Graduate Program \u2013 Master of Information Systems Management, Bina Nusantara University, Jakarta","sequence":"additional","affiliation":[]}],"member":"21590","published-online":{"date-parts":[[2020,3,30]]},"container-title":["International Journal of Recent Technology and Engineering (IJRTE)"],"link":[{"URL":"https:\/\/www.ijrte.org\/wp-content\/uploads\/papers\/v8i6\/F7423038620.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,29]],"date-time":"2022-03-29T08:17:35Z","timestamp":1648541855000},"score":18.521101,"resource":{"primary":{"URL":"https:\/\/www.ijrte.org\/portfolio-item\/F7423038620\/"}},"issued":{"date-parts":[[2020,3,30]]},"references-count":0,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2020,3,30]]}},"URL":"https:\/\/doi.org\/10.35940\/ijrte.f7423.038620","ISSN":["2277-3878"],"issn-type":[{"type":"electronic","value":"2277-3878"}],"published":{"date-parts":[[2020,3,30]]}},{"indexed":{"date-parts":[[2024,5,15]],"date-time":"2024-05-15T10:57:45Z","timestamp":1715770665918},"reference-count":0,"publisher":"Oxford University PressOxford","isbn-type":[{"value":"9780199546329","type":"print"},{"value":"9781383045253","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"published-print":{"date-parts":[[2009,1,29]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>To start off this book I shall first provide a broad introduction to a number of important terms and concepts. I will cover some basic definitions of data, information, and information systems, and then discuss the differences between transaction processing systems and management information systems. This will enable us to discuss the configurations of transaction and management systems that are commonly in use in organizations.<\/jats:p>","DOI":"10.1093\/oso\/9780199546329.003.0001","type":"book-chapter","created":{"date-parts":[[2023,11,6]],"date-time":"2023-11-06T00:24:25Z","timestamp":1699230265000},"page":"1-26","source":"Crossref","is-referenced-by-count":0,"title":["Management information systems"],"prefix":"10.1093","author":[{"given":"Hans Van Der","family":"Heijden","sequence":"first","affiliation":[]}],"member":"286","container-title":["Designing Management Information Systems"],"language":"en","link":[{"URL":"https:\/\/academic.oup.com\/book\/chapter-pdf\/52586395\/isbn-9780199546329-book-part-1.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,6]],"date-time":"2023-11-06T00:24:48Z","timestamp":1699230288000},"score":18.507444,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/book\/54790\/chapter\/422690168"}},"issued":{"date-parts":[[2009,1,29]]},"ISBN":["9780199546329","9781383045253"],"references-count":0,"URL":"https:\/\/doi.org\/10.1093\/oso\/9780199546329.003.0001","published":{"date-parts":[[2009,1,29]]}},{"indexed":{"date-parts":[[2022,3,29]],"date-time":"2022-03-29T10:22:45Z","timestamp":1648549365735},"publisher-location":"London","standards-body":{"name":"BSI British Standards","acronym":"BSI"},"reference-count":0,"publisher":"BSI British Standards","content-domain":{"domain":[],"crossmark-restriction":false},"DOI":"10.3403\/00289764u","type":"standard","created":{"date-parts":[[2015,6,10]],"date-time":"2015-06-10T15:53:12Z","timestamp":1433951592000},"source":"Crossref","is-referenced-by-count":0,"title":["Information technology. Open systems interconnection. Structure of management information"],"prefix":"10.3403","member":"1988","deposited":{"date-parts":[[2017,12,5]],"date-time":"2017-12-05T14:22:23Z","timestamp":1512483743000},"score":18.49036,"resource":{"primary":{"URL":"https:\/\/linkresolver.bsigroup.com\/junction\/resolve\/000000000000289764?restype=undated"}},"subtitle":["Definition of management information"],"issued":{"date-parts":[[null]]},"references-count":0,"URL":"https:\/\/doi.org\/10.3403\/00289764u"},{"indexed":{"date-parts":[[2025,10,26]],"date-time":"2025-10-26T14:11:11Z","timestamp":1761487871770},"reference-count":4,"publisher":"Informa UK Limited","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information Systems Management"],"published-print":{"date-parts":[[1997,1]]},"DOI":"10.1080\/10580539708907074","type":"journal-article","created":{"date-parts":[[2007,6,25]],"date-time":"2007-06-25T23:10:02Z","timestamp":1182813002000},"page":"42-47","source":"Crossref","is-referenced-by-count":4,"title":["RETHINKING STRATEGIC INFORMATION SYSTEMS"],"prefix":"10.1080","volume":"14","author":[{"given":"J. Lee","family":"Maier","sequence":"first","affiliation":[]}],"member":"301","reference":[{"key":"CIT0001","volume-title":"Strategic Information Systems","author":"Wiseman C.","year":"1988"},{"key":"CIT0002","volume-title":"Strategic Information Systems Competition Through Information Technologies","author":"Neumann S.","year":"1994"},{"key":"CIT0003","doi-asserted-by":"publisher","DOI":"10.1080\/10580539208906876"},{"key":"CIT0004","doi-asserted-by":"publisher","DOI":"10.1080\/10580539308906956"}],"container-title":["Information Systems Management"],"language":"en","link":[{"URL":"http:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/10580539708907074","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,12,13]],"date-time":"2016-12-13T23:16:13Z","timestamp":1481670973000},"score":18.48774,"resource":{"primary":{"URL":"http:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/10580539708907074"}},"issued":{"date-parts":[[1997,1]]},"references-count":4,"journal-issue":{"issue":"4","published-print":{"date-parts":[[1997,1]]}},"alternative-id":["10.1080\/10580539708907074"],"URL":"https:\/\/doi.org\/10.1080\/10580539708907074","ISSN":["1058-0530","1934-8703"],"issn-type":[{"value":"1058-0530","type":"print"},{"value":"1934-8703","type":"electronic"}],"published":{"date-parts":[[1997,1]]}},{"indexed":{"date-parts":[[2022,4,4]],"date-time":"2022-04-04T10:17:24Z","timestamp":1649067444532},"publisher-location":"London","standards-body":{"name":"BSI British Standards","acronym":"BSI"},"reference-count":0,"publisher":"BSI British Standards","content-domain":{"domain":[],"crossmark-restriction":false},"DOI":"10.3403\/30125022","type":"standard","created":{"date-parts":[[2013,11,13]],"date-time":"2013-11-13T21:18:06Z","timestamp":1384377486000},"approved":{"date-parts":[[2006,3,17]]},"source":"Crossref","is-referenced-by-count":0,"title":["Information security management systems"],"prefix":"10.3403","member":"1988","deposited":{"date-parts":[[2017,12,5]],"date-time":"2017-12-05T12:35:08Z","timestamp":1512477308000},"score":18.487183,"resource":{"primary":{"URL":"https:\/\/linkresolver.bsigroup.com\/junction\/resolve\/000000000030125022?restype=standard"}},"subtitle":["Guidelines for information security risk management"],"issued":{"date-parts":[[null]]},"references-count":0,"URL":"https:\/\/doi.org\/10.3403\/30125022"},{"indexed":{"date-parts":[[2022,4,5]],"date-time":"2022-04-05T10:49:48Z","timestamp":1649155788087},"publisher-location":"London","standards-body":{"name":"BSI British Standards","acronym":"BSI"},"reference-count":0,"publisher":"BSI British Standards","content-domain":{"domain":[],"crossmark-restriction":false},"DOI":"10.3403\/02217202","type":"standard","created":{"date-parts":[[2013,12,10]],"date-time":"2013-12-10T21:30:00Z","timestamp":1386711000000},"approved":{"date-parts":[[1999,5,15]]},"source":"Crossref","is-referenced-by-count":0,"title":["Information security management"],"prefix":"10.3403","member":"1988","deposited":{"date-parts":[[2017,12,5]],"date-time":"2017-12-05T12:47:28Z","timestamp":1512478048000},"score":18.471684,"resource":{"primary":{"URL":"https:\/\/linkresolver.bsigroup.com\/junction\/resolve\/000000000030039679?restype=standard"}},"subtitle":["Specification for information security management systems"],"issued":{"date-parts":[[null]]},"references-count":0,"URL":"https:\/\/doi.org\/10.3403\/02217202"},{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T12:15:53Z","timestamp":1767183353593},"reference-count":0,"publisher":"Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP","issue":"6","content-domain":{"domain":["www.ijrte.org"],"crossmark-restriction":true},"short-container-title":["IJRTE"],"abstract":"<jats:p>StartAja.com is an e-commerce designed to help connecting business people who have similar interests in certain business area. Currently, StartAja.com hasn\u2019t have digital marketing strategy yet to simplify keyword searches in promoting StartAja.com. This research\u2019s objective is to formulate a Search Engine Optimization (SEO) strategy. By using SEO, StartAja.com is expected to be the top ranked e-commerce in search engine websites. Research data are obtained through observing the interface and functionalities of StartAja.com, and also its promotion requirements. This research has discovered the right combination of keywords to be used in SEO, to help optimize the promotion of StartAja.com.<\/jats:p>","DOI":"10.35940\/ijrte.f7396.038620","type":"journal-article","created":{"date-parts":[[2020,4,10]],"date-time":"2020-04-10T09:54:27Z","timestamp":1586512467000},"page":"577-580","update-policy":"http:\/\/dx.doi.org\/10.35940\/beiesp.crossmarkpolicy","source":"Crossref","is-referenced-by-count":2,"title":["Search Engine Optimization (SEO) in Promoting E-Commerce Start Aja. Com"],"prefix":"10.35940","volume":"8","author":[{"name":"Information Systems Management Department, BINUS Graduate Program \u2013 Master of Information Systems Management, Bina Nusantara University, Jakarta","sequence":"first","affiliation":[]},{"given":"Adrian","family":"Kosasih","sequence":"first","affiliation":[]},{"given":"Lorio","family":"Purnomo","sequence":"additional","affiliation":[]},{"name":"Information Systems Management Department, BINUS Graduate Program \u2013 Master of Information Systems Management, Bina Nusantara University, Jakarta","sequence":"additional","affiliation":[]},{"given":"Oscar","family":"Sidanta","sequence":"additional","affiliation":[]},{"name":"Information Systems Management Department, BINUS Graduate Program \u2013 Master of Information Systems Management, Bina Nusantara University, Jakarta","sequence":"additional","affiliation":[]},{"family":"Sfenrianto","sequence":"additional","affiliation":[]},{"name":"Information Systems Management Department, BINUS Graduate Program \u2013 Master of Information Systems Management, Bina Nusantara University, Jakarta","sequence":"additional","affiliation":[]}],"member":"21590","published-online":{"date-parts":[[2020,3,30]]},"container-title":["International Journal of Recent Technology and Engineering (IJRTE)"],"link":[{"URL":"https:\/\/www.ijrte.org\/wp-content\/uploads\/papers\/v8i6\/F7396038620.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,29]],"date-time":"2022-03-29T12:17:20Z","timestamp":1648556240000},"score":18.463371,"resource":{"primary":{"URL":"https:\/\/www.ijrte.org\/portfolio-item\/F7396038620\/"}},"issued":{"date-parts":[[2020,3,30]]},"references-count":0,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2020,3,30]]}},"URL":"https:\/\/doi.org\/10.35940\/ijrte.f7396.038620","ISSN":["2277-3878"],"issn-type":[{"type":"electronic","value":"2277-3878"}],"published":{"date-parts":[[2020,3,30]]}},{"indexed":{"date-parts":[[2022,3,29]],"date-time":"2022-03-29T13:07:53Z","timestamp":1648559273541},"publisher-location":"London","standards-body":{"name":"BSI British Standards","acronym":"BSI"},"reference-count":0,"publisher":"BSI British Standards","content-domain":{"domain":[],"crossmark-restriction":false},"DOI":"10.3403\/30422686u","type":"standard","created":{"date-parts":[[2021,3,2]],"date-time":"2021-03-02T21:30:18Z","timestamp":1614720618000},"approved":{"date-parts":[[2021,3,2]]},"source":"Crossref","is-referenced-by-count":0,"title":["Requirements for bodies providing audit and certification of information security management systems"],"prefix":"10.3403","member":"1988","deposited":{"date-parts":[[2021,3,2]],"date-time":"2021-03-02T21:30:22Z","timestamp":1614720622000},"score":18.448189,"resource":{"primary":{"URL":"https:\/\/linkresolver.bsigroup.com\/junction\/resolve\/000000000030422686?restype=undated"}},"subtitle":["Privacy information management systems"],"issued":{"date-parts":[[null]]},"references-count":0,"URL":"https:\/\/doi.org\/10.3403\/30422686u"},{"indexed":{"date-parts":[[2024,3,11]],"date-time":"2024-03-11T23:04:37Z","timestamp":1710198277918},"reference-count":0,"publisher":"Informa UK Limited","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Management Information Systems"],"published-print":{"date-parts":[[2003,4]]},"DOI":"10.1080\/07421222.2003.11045744","type":"journal-article","created":{"date-parts":[[2017,5,18]],"date-time":"2017-05-18T19:18:20Z","timestamp":1495135100000},"page":"5-8","source":"Crossref","is-referenced-by-count":13,"title":["Information Systems Success"],"prefix":"10.1080","volume":"19","member":"301","published-online":{"date-parts":[[2014,12,23]]},"container-title":["Journal of Management Information Systems"],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/07421222.2003.11045744","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,7,16]],"date-time":"2018-07-16T15:14:08Z","timestamp":1531754048000},"score":18.433954,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/07421222.2003.11045744"}},"issued":{"date-parts":[[2003,4]]},"references-count":0,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2014,12,23]]},"published-print":{"date-parts":[[2003,4]]}},"alternative-id":["10.1080\/07421222.2003.11045744"],"URL":"https:\/\/doi.org\/10.1080\/07421222.2003.11045744","ISSN":["0742-1222","1557-928X"],"issn-type":[{"value":"0742-1222","type":"print"},{"value":"1557-928X","type":"electronic"}],"published":{"date-parts":[[2003,4]]}},{"indexed":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T01:26:18Z","timestamp":1648776378471},"publisher-location":"London","standards-body":{"name":"BSI British Standards","acronym":"BSI"},"reference-count":0,"publisher":"BSI British Standards","content-domain":{"domain":[],"crossmark-restriction":false},"DOI":"10.3403\/30354572","type":"standard","created":{"date-parts":[[2017,10,18]],"date-time":"2017-10-18T11:03:42Z","timestamp":1508324622000},"approved":{"date-parts":[[2017,10,17]]},"source":"Crossref","is-referenced-by-count":0,"title":["Information security management systems"],"prefix":"10.3403","member":"1988","deposited":{"date-parts":[[2017,12,5]],"date-time":"2017-12-05T09:45:47Z","timestamp":1512467147000},"score":18.420284,"resource":{"primary":{"URL":"https:\/\/linkresolver.bsigroup.com\/junction\/resolve\/000000000030354572?restype=standard"}},"subtitle":["Guidelines for information security risk management"],"issued":{"date-parts":[[null]]},"references-count":0,"URL":"https:\/\/doi.org\/10.3403\/30354572"},{"indexed":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T11:57:27Z","timestamp":1648814247028},"publisher-location":"London","standards-body":{"name":"BSI British Standards","acronym":"BSI"},"reference-count":0,"publisher":"BSI British Standards","content-domain":{"domain":[],"crossmark-restriction":false},"DOI":"10.3403\/00501622","type":"standard","created":{"date-parts":[[2013,12,10]],"date-time":"2013-12-10T21:46:14Z","timestamp":1386711974000},"approved":{"date-parts":[[1995,5,15]]},"source":"Crossref","is-referenced-by-count":0,"title":["Information technology. Open systems interconnection. Systems management"],"prefix":"10.3403","member":"1988","deposited":{"date-parts":[[2017,12,5]],"date-time":"2017-12-05T12:47:47Z","timestamp":1512478067000},"score":18.392855,"resource":{"primary":{"URL":"https:\/\/linkresolver.bsigroup.com\/junction\/resolve\/000000000000501622?restype=standard"}},"subtitle":["Test management function"],"issued":{"date-parts":[[null]]},"references-count":0,"URL":"https:\/\/doi.org\/10.3403\/00501622"}],"items-per-page":20,"query":{"start-index":0,"search-terms":"Management+information+systems"}}}