:: artikel ICT >> glosari

1.
Change Management
 

Planning, implementation, support and expansion of improvements in work and processes.

Change Management deals with changes in multiple dimensions i.e:

  1. Process
  2. Organization
  3. Policies
  4. Facilities
  5. Management
  6. IT infrastructure
  7. Systems
  8. Staffing

Sumber: Dr. Bennet Lientz, Professor of Mgnt Anderson Graduate School of Management, University of California, Los Angeles
(Dari Slaid Pembentangan, IT Benchmarking Workshop : Enhancing Value For Business )

2.
Government
 

(BM=Kerajaan) Refers to the entire executive branch of the state, or to the members of governments (i.e., ministers) selected by the legislature or appointed by the head of government to run the executive branch.

Sumber: World Bank Institute
(Dari Kertas Pembentangan SKN, Persidangan CIO 2004)

3.
IAM
 

Is a Management of Intellectual Assets in a manner that achieves maximum commercial value extraction.

About applying management models designed to add, extract value from intellectual assets
  
Concerned with the management of employee brainpower, ideas, knowledge, innovation and practices over and above intellectual property rights such as patents, trademarks, copyrights and other IPRs

4.
ICT
 

Teknologi Maklumat dan Komunikasi (Information and Communication Technology).

Ia merupakan teknologi yang membantu di dalam penyimpanan, perkongsian dan komunikasi maklumat di antara komputer yang dirangkaikan melalui sistem telekomunikasi. Contohnya, penggunaan sistem maklumat berpusat, penggunaan e-mel, IRC (Internet Relay Chat), web conferencing , VoIP (Voice Over Internet Protocol) dan lain - lain.

Boleh dipecahkan kepada 3 jenis teknologi :

1. Teknologi Komputer - penggunaan teknologi di dalam sistem pengkomputeran sama ada dalam bentuk perkakasan (hardware) atau perisian (software). Contohnya, perisian dan perkakasan yang memudahkan penyimpanan dan pemprosesan data di dalam sesebuah komputer.

2. Teknologi Telekomunikasi - penggunaan teknologi di dalam sistem telekomunikasi (i.e sistem komunikasi jarak jauh).

5.
ICT Security Incident
 

(BM=insiden keselamatan ICT ) Any unlawful, unauthorized or unacceptable action that involves a computer system or computer network. Such an action can be include any of the following events:

  1. Theft of trade secrets
  2. E-mail spam or harassment
  3. Unauthorised or unlawful intrusions into computing systems
  4. Embezzlement
  5. Posession or dissemination of child pornography
  6. Denial - of - service (DoS) attacks
  7. Tortious interference  of business relations
  8. Extortion
  9. Any unlawful action when the evidence of such action may be stored on computer media such as fraud, threats and traditional crimes.

Sumber: Incidents Response & Computer Forensics; 2nd Edition; Kevin Mandia, Chris Prosise & Matt Pepe

6.
ICT Strategic Plan
 
ICT Strategic Plan (ISP) is plan or blue print formulated for an organisation to develop and implement ICT which is aligned with the strategic direction of the organisation.
ISP will :
  1. Ensure that ICT projects are aligned with the organisation’s vision and strategy.
  2. Manage and control budget and expenditure.
  3. Plan and manage personnel.
  4. Respond to the forces of change.
  5. Avoid ad-hoc project implementation.
  6. Obtain support – top management, users, EPU, MAMPU, JBN.
(Dari Slaid Pembentangan, Mesyuarat ke-2 CIO Agensi Kerajaan Negeri Sabah)
7.
Information Security
 

(BM=Keselamatan Maklumat) Information Security draws upon the best practices and experience from multiple domains i.e:

  1. Standards
  2. Policies
  3. Administration
  4. Regulatory Compliance and Auditing 
  5. Incident Response
  6. Disaster Recovery
  7. Intrusion Detection and Monitoring
  8. Public Key Infrastructures
  9. Key Management
  10. Authorization Controls
  11. Access Controls
  12. Operation Controls
  13. Physical Security Controls Security Testing
  14. Virus Protection
  15. Security Testing
  16. Security Training and Awareness
  17. Software Development Practices

Sumber: The Complete Guide to Internet Security; Mark Merkow, CCP & James Brethaupt; AMACOM, 2000 (www.amacombooks.org)

8.
Intellectual Property (IP)
 

Intellectual property, often known as IP, allows people to own their creativity and innovation in the same way that they can own physical property. The owner of IP can control and be rewarded for its use, and this encourages further innovation and creativity to the benefit of us all.

In some cases IP gives rise to protection for ideas but in other areas there will have to be more elaboration of an idea before protection can arise. It will often not be possible to protect IP and gain IP rights (or IPRs) unless they have been applied for and granted, but some IP protection such as copyright arises automatically, without any registration, as soon as there is a record in some form of what has been created.

9.
Internet
 

internet - A collection of packet-switching networks that are physically interconnected by Internet Protocol (IP) gateways. These networks use protocols that allow them to function as a large composite network. Example of an internet is the Internet.

Internet - A wide area network connecting thousands of disparate networks in industry, education, government and research. The Internet Network uses TCP/IP as the standard for transmitting information.

Sumber: IBM Dictionary of Computing; 10th Edition; George McDaniel; McGraw-Hill; 1993 ( http://books.mcgraw-hill.com )

10.
Internet Protocol (IP)
 

A protocol used to route data from its source to its destination in an Internet environment.

Sumber: IBM Dictionary of Computing; 10th Edition; George McDaniel; McGraw-Hill; 1993
(http://books.mcgraw-hill.com)

11.
K-Public Service
 

K-public service is a public service where its constituents are well informed, intelligent; able to deliver the necessary services where and when they are needed; based on a readily accessible pool of shared information and knowledge that is available from anywhere at anytime.

Sumber: Asian Development Bank
(Dari Kertas Pembentangan SKN, Persidangan CIO 2004)

12.
K-Workers
 
K-workers are people who make full use of available information and knowledge to carry out their duties; able to learn, unlearn and relearn on a continuous basis; able to generate and share their information and knowledge.

Sumber: Asian Development Bank
(Dari Kertas Pembentangan SKN, Persidangan CIO 2004)

13.
King and Queen Bees
 

Senior business employees who hold onto power through their knowledge of business rules.

Sumber: Dr. Bennet Lientz, Professor of Mgnt Anderson Graduate School of Management, University of California, Los Angeles
(Dari Slaid Pembentangan, IT Benchmarking Workshop : Enhancing Value For Business )

14.
Quick Hits
 

Interim changes that pave the way for long term change and yield tangible benefits.

Quick Hits offers the flexibility to change pace and direction of change.It help to deal with cultural and political issues and reduce resistance.

Steps in Quick Hits implementation:

  1. Review current situation to see what is new
  2. Review issues and problems that surfaced earlier
  3. Review proposed changes developed earlier
  4. Encourage employees to discuss implementation and any questions or issues
  5. Plan the change implementation
  6. Implement Quick Hits changes
  7. Gather lessons learned
  8. Apply score cards

Sumber: Dr. Bennet Lientz, Professor of Mgnt Anderson Graduate School of Management, University of California, Los Angeles

15.
ROI
 

Return On Investment is a measure of the net income a firm is able to earn with the its total assets. Return on investment is calculated by dividing net profits after taxes by total assets.

Sumber: Resource Management System, Inc (RMS) (http://www.rms.net/lc_faq_other_roi.htm)

It is is a representation of the worth of a project or procurement in terms meaningful to decision makers. ROI is often stated as a monetary value (e.g., Net Present Value), a percentage (e.g., Internal Rate of Return), a time period (e.g., Payback Period), or a ratio (e.g., Benefit/Cost Ratio). Standard financial metrics are most common.

Sumber: Resource Management System, Inc (RMS)

16.
sgCERT
 

State Government Computer Emergency Response Team (sgCERT) ditubuhkan oleh kerajaan negeri di bawah State Government ICT Security Working Committee sebagai salah satu pasukan keselamatan ICT negeri Sabah.  Ia bertindak untuk menangani sebarang insiden keselamatan ICT (ICT security incidents) yang melibatkan sektor awam negeri Sabah dengan kerjasama Government Computer Emergency Response Team (gCERT) di MAMPU.

Selain itu, pasukan ini juga bertanggungjawab untuk memberikan kemudahan forensik bagi insiden keselamatan ICT yang berunsurkan jenayah. Di dalam ICT, forensik merupakan proses mengenalpasti, menganalisa, menyimpan dan mempersembahkan bukti - bukti digital di mahkamah.

17.
Shadow System
 

Formal or informal system (manual or automated) that departments create on their own.

Sumber: Dr. Bennet Lientz, Professor of Mgnt Anderson Graduate School of Management, University of California, Los Angeles
(Dari Slaid Pembentangan, IT Benchmarking Workshop : Enhancing Value For Business )

18.
SITC
 

Majlis Teknologi Maklumat Sabah (Sabah Information Technology Council) merupakan badan kerajaan yang ditubuhkan untuk merancang pembangunan dan pelaksanaan Teknologi Maklumat di negeri Sabah.

Ia diselaraskan dengan matlamat kerajaan persekutuan dan mempunyai struktur yang sama dengan Majlis Teknologi Maklumat Kebangsaan (NITC). Walau bagaimanapun, ia lebih memfokuskan kepada strategi pelaksanaan dan penggunaan IT yang optimum di seluruh negeri Sabah sebagai persediaan menghadapi persaingan ekonomi digital.

Unit Kemajuan IT Negeri (KIT) merupakan sekretariat bagi majlis ini.

19.
State Government ICT Security Working Committee
 

State Government ICT Security Working Committee merupakan jawatankuasa yang telah diberi kuasa oleh Suruhanjaya Teknologi Maklumat Sabah untuk menangani isu - isu keselamatan ICT di dalam sektor awam.

Ia dianggotai oleh tiga agensi utama, iaitu Jabatan Perkhidmatan Komputer Negeri , Unit Kemajuan IT Negeri dan K.K.I.P Sdn. Bhd. Sekretariat jawatakuasa ini Jabatan Perkhidmatan Komputer Negeri dan dipengerusikan oleh Pengarah jabatan terbabit.

20.
Strike Forces
 

Teams of employees that investigate process and work. They identify problems and issues so that employees support change.

Strike Forces are coordinated by the change management team. They are composed of small group across departments:

  1. one person (junior) who is involved in the work in the department.
  2. one person from enemy department i.e someone who wants the change from other department - heads the team
  3. people from other departments. 

Sumber: Dr. Bennet Lientz, Professor of Mgnt Anderson Graduate School of Management, University of California, Los Angeles

21.
TCO
 

Total Cost Ownership was originally developed in the late 1980s by the research firm Gartner to determine the cost of owning and deploying personal computers.

TCO consists of the costs, direct and indirect, incurred throughout the life cycle of an asset, including acquisition, deployment, operation, support and retirement.

Sumber: Dr. Bennet Lientz, Professor of Mgnt Anderson Graduate School of Management, University of California, Los Angeles
(Dari Slaid Pembentangan, IT Benchmarking Workshop : Enhancing Value For Business )

22.
TCP/IP
 

Transmission Control Protocol / Internet Protocol. A set of communication protocols that support peer-to-peer connectivity functions for both local and wide area networks.

Sumber: IBM Dictionary of Computing; 10th Edition; George McDaniel; McGraw-Hill; 1993 ( http://books.mcgraw-hill.com )

23.
Workarounds
 

Methods to get around problems in a system or process.

Sumber: Dr. Bennet Lientz, Professor of Mgnt Anderson Graduate School of Management, University of California, Los Angeles
(Dari Slaid Pembentangan, IT Benchmarking Workshop : Enhancing Value For Business )

         
       







Sabah
Aplikasi
JPKN
SSO
Keselamatan ICT
MoF
SGCERT
JPAN
JPAM
MAMPU
INSAN
Malaysia
 
 








 




 
Meja Bantuan
Jabatan Perkhidmatan Komputer Negeri
Tingkat 1 & 2, Blok A,
Wisma Kewangan, Beg Berkunci No. 2057
88999 KOTA KINABALU
 
Telefon: 088 219064
Faks: 088 215116
E-melhelpdesk.jpkn@sabah.gov.my

Majalah Online

NOTICE PENAFIAN


Jabatan Perkhidmatan Komputer Negeri Sabah tidak akan bertanggungjawab terhadap sebarang kerugian atau kerosakan yang dialami
disebabkan penggunaan sebarang maklumat yang terdapat di dalam laman web ini.

Hakcipta Terpelihara © 2016 Jabatan Perkhidmatan Komputer Negeri Sabah
Paparan terbaik menggunakan resolusi 1024 x 768 piksel, pelayar Internet Explorer 8, Mozilla Firefox & Google Chrome

Kemaskini terakhir: 27 Disember 2016