Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Muharman Lubis is active.

Publication


Featured researches published by Muharman Lubis.


information assurance and security | 2011

Information security awareness in university: Maintaining learnability, performance and adaptability through roles of responsibility

Abdul Rahman Ahlan; Muharman Lubis

As the 21st century approached, the current trend of technology product besides deliver the benefit on availability and accessibility on information, problem emerged regard information security. In order to analyze on how technology introduces new risks, it is necessary to discuss the technology lifecycle. Consider for instance the life cycle of technology as the diffusion of an innovation. Since technological innovations or IT solutions are being adopted to support business processes, the need to protect those IT solutions arises with its adoption. Accordingly, two important factors need much consideration in raising awareness are how organization influences significantly of end users attitude and how the organization has the regular assessment or evaluation to measure the effectiveness of IS awareness policy inside the organization.


international conference on information and communication technology | 2013

Privacy and trust in the Islamic perspective: Implication of the digital age

Muharman Lubis; Mira Kartiwi

In the name of Allah, most Gracious and most Merciful. The digital age is slowly degrading the limitation and common understanding of privacy and trust through digital life, which has open world concept. It has become normal procedure when the user must submit their personal details for digital service such as social networking, electronic commerce, personal hosting, etc. Meanwhile, to be able to revealing their privacy willingly, user put their trust on organization to use their data based on agreement. In this sense, user expects their privacy right to be protected securely and actively. The dilemma occurred due to commercialization, consumerism and legislation as interaction issues, which shift the focus of user to identify the importance of their personal data and organization to analyze the process of data management. On the other hand, Islam gave the basic understanding in privacy and trust that emphasize important factor in human determination and intention. This paper will focus on how to define the standard and limitation of the concept privacy and trust based on Islamic perspective in aligning with the implication of digital age related to interest, classification and purpose.


international conference on information and communication technology | 2010

Information and electronic transaction law effectiveness (UU-ITE) in Indonesia

Muharman Lubis; Fajri Achmad Maulana

Cyberlaw enforcement effectiveness is one of the instruments that can be used to evaluate the effect and performance of the initial goals and objective from UU ITE implementation. The question might arise regarding the effectiveness of UU ITE 11/2008 after being signed by legislative. Do the existing control sufficient to limit any possibility of damages to occur? And what kind of strategies has been performed to support the cyberlaw enforcement. Understanding the implication of the cyberlaw enforcement in the cyber communities will depict how well the strategy has accomplished.


international conference on information and communication technology | 2014

Privacy concern and perceived benefits towards privacy and election in Indonesia

Muharman Lubis; Mira Kartiwi

As technology becomes one part of human lives to solve various problem, electronic voting offer the tremendous benefit to the society to celebrate their right in electing candidate with their own choice freely and easily. Despite its advantages, this celebration has great risks, challenges and threats such as the privacy protection of voters, not only during the election but also before and after. The coercion to cash the votes, votes selling, intimidation to group of society, identity reveal on registration and data duplication are the example of privacy infringement that may lead to the national disaster. In this following decade, the technology tries to answer these issues by several kinds of protection method, although further study should be done to enhance the concreteness of solution offered. Therefore, the solution is not limited from technology perspective; configuration from different perspective can support the implementation, such as from legal regulation or from social campaign. Thus, this study explain and suggest the necessity to have social norm as the middleware between IT perspectives, while legal regulation as guidance in forming the alliance to deliver solution fundamentally for privacy infringement issue in election.


2017 5th International Conference on Cyber and IT Service Management (CITSM) | 2017

Assessing privacy and readiness of electronic voting system in Indonesia

Muharman Lubis; Mira Kartiwi; Yusuf Durachman

Indonesia as one of the country that adopts democracy, it is required to conduct elections freely and fairly by meeting the principles of direct, general and secret. Meanwhile, the use of ICT in the term of e-voting promise the end results can be obtained quickly and real-time in the delivery and tabulation process. The implementation of e-voting in Indonesia has begun in Jembrana District for the election of village heads, followed by many simulations based on initiative from BPPT in various location. This paper introduces an up-to date and discuss clear-cut solutions for multiple voting constraints and problem. It suggest some consideration to be taken care to prevent the majority of known problems with e-voting. Most importantly, the paper presents the recommendations which engage the citizen opinion and expert knowledge in the field to pinpoint the path to success in implementing e-voting in respect of political decision and economic challenges.


2016 International Conference on Informatics and Computing (ICIC) | 2016

Election fraud and privacy related issues: Addressing electoral integrity

Muharman Lubis; Mira Kartiwi

Nowadays, in a highly computerized system, people have tendency to have not expect privacy to be maintained and continue in its current form if individual control is required and monitored. Especially, in contemporary campaigns for higher office, the candidates often use mass media to deliver political message or having certain campaign developed by expert in the efficient use of providing personal information for the purpose of influencing the voters while some of them may be hidden or exploited by certain parties. Practically, it is impossible to have total control over personal information, once it has been collected and dispersed but it is possible to have privacy without control and vice versa. In election, huge amount of data is stored and transfer from multiple location to other numerous or single location to facilitate tabulation and calculation analysis. Thus, it is critical to conduct monitoring process to prevent crime such as theft, fraud and illegal use, to prevent unauthorized disclosure of confidential information, to comply with the obligation, law and regulation in avoiding discrimination, to maintain productivity and quality of service and to ensure integrity of the systems. This paper explores the election fraud and privacy related issues occurred during the election period in various countries to address the electoral integrity in Indonesia.


international conference on information and communication technology | 2014

Decision to casting a vote: An ordinal regression statistical analysis

Muharman Lubis; Mira Kartiwi

The aim of this paper is to explore on essential factors that influence the decision of eligible voters to cast their vote during the general election if it is conducted as electronic voting (e-voting) in Indonesia. It is Indonesian government plan to implement the electronic voting mechanism as a way to minimize the high cost of conducting general election. Thus, there has been call for research to assess the feasibility to implement such mechanism and identify any factors that influence the level of participation of the eligible voters in this important event. A number of demographic factors were analyze, such as gender, age, working, education and earnings influence. It is believe that the finding of this study will complement any earlier and ongoing study in the domain of privacy protection. A statistical analysis, namely ordinal regression, is used to measure the tendency and direction of the demographic data from citizen towards the social norm items.


international conference on user science and engineering | 2018

The PDCA Cycle of ISO/IEC 27005:2008 Maturity Assessment Framework

Rokhman Fauzi; Suhono Harso Supangkat; Muharman Lubis

Most of the IT risk management framework/standard has not been given the tools to assess the maturity level. In fact, this information provides the basis for evaluation, repair and improvement of IT risk management of the Organization. This research objective is to design a framework that can be used to assess the maturity level of PDCA Cycle in ISO/IEC 27005. The PDCA Cycle is the managerial approach of this standard. Therefore, PDCA Cycle can represent the IT risk management based on ISO/IEC 27005. The assessment framework consists of a model, method and assessment worksheet. The model covers four assessment area (Plan, Do, Check, and Act), detail of the assessment area (8 domains, 35 subdomains and 82 elements), metric and assessment criteria which are supported by the method and worksheet assessment. The model represents the maturity of all processes (Plan, Do, Check, and Act) based on the clauses of ISO/IEC 27005. This Framework gives an enhancement of the existing model of; (1) all processes representation, (2) metric definition, (3) method for identifying evidences and (4) detail elements to repair and improve.


TELKOMNIKA : Indonesian Journal of Electrical Engineering | 2018

Current state of personal data protection in electronic voting: Criteria and indicator for effective implementation

Muharman Lubis; Mira Kartiwi

The adoption of electronic voting has been done in various countries related to cost and time reduction operationally. On the other hand, recent publication has been informed several issues occurred such as technicality, reliability, security and privacy due to the compromised system were used. In small scale, there are certain group of people who want to exploit the vulnerabilities for their own benefit in the election, while in the greater scale, it can reduce public confidence to entrust the adoption of e-voting system to augment participation rate, to improve the quality of voting and to aid the political right effectively. This paper aims to investigate the characteristic of people demanding the legislative to address the criteria and indicator for effective implementation in electronic voting. By understanding the perception of voters in viewing current electoral regulation are essential to provide some ideas and opinions for better enhancement, either through recommendation and drafting related legislation to cater the needs.


Archive | 2018

Towards Achieving the Efficiency in Zakat Management System: Interaction Design for Optimization in Indonesia

Muharman Lubis; Anik Hanifatul Azizah

There is great potential in the Zakat Management System (ZMS) to increase social welfare that requires government attention. Using the appropriate technological advances to administer zakat process might improve the efficiency to optimize the potential. Therefore, several related factors must be considered such as human, environment, culture, language, literacy and regulation to improve the effectiveness of interaction and communication among stakeholders. This study discusses several journals and articles that focused on various problems faced by zakat institution in 5 (five) stages namely; planning, collecting, organizing, distributing and disbursing the zakat. The design for interaction can provide clear views of the system’s weaknesses to improve decision making by generating the proper strategy to produce an efficient process.

Collaboration


Dive into the Muharman Lubis's collaboration.

Top Co-Authors

Avatar

Mira Kartiwi

International Islamic University Malaysia

View shared research outputs
Top Co-Authors

Avatar

Abdul Rahman Ahlan

International Islamic University Malaysia

View shared research outputs
Top Co-Authors

Avatar

Fajri Achmad Maulana

International Islamic University Malaysia

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Yusri Arshad

Universiti Teknikal Malaysia Melaka

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Suhono Harso Supangkat

Bandung Institute of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge