My Future, My Life, My Inspiration ^_^

Professional Ethics




Resume Journals / Articles about professional ethics in the IT world

Hey Everyone, How are you now? ^ _ ^
I hope everything is fine😀
Okey, now I will discuss and share some knowledge about the “Professional Ethics”
Professional Ethics you know?

In the journal I have gained via internet a few days ago, the journal was discussed about IT Professionalism Ethics is written by Sigit Prasetyo Nugroho its website: http://eghi ‘splace-ETHICS-JOURNAL-AND-PROFESSIONALISM-IT.htm. In my opinion, the ethics of IT professionalism is an obligation for a person to be owned and used as a guide in daily life whether it was at the office or home or wherever one is located must uphold professionalism and ethics. Ethics-related values or rules of behavior or the behavior of others to do any work. Ethics in a world of information technology such as Computer Ethics are very important needed to be a basic rule that must be understood for the users of computer or information technology, because the number of users of information technology is growing every time and information technology are increasingly developing more sophisticated so as to create a wide range of new products and new business opportunities.

Read the rest of this entry »

Noor Hadi Prayitno
Studies Program Information System, Syarif Hidayatullah State Islamic University Jakarta
Jln. Ir. No Juanda. 95 Ciputat, South Tangerang, Jakarta




On this occasion, I made a resume of the three journals in which to discuss about Data Mining. In this paper I attempt to explain the definition of data mining, development, algorithms used in data mining, and methods.
It turns out that data mining is the start of a new knowledge favored by the system analyst, system engginer, or for those information systems. The experts were still confused to enter or categorize data mining is the category of what science, many cases are using the science of data mining to solve world problems in the current database that organizations / companies are already applying the concept of data mining and need people who understand in depth about the data mining process may be very large databases.
Data Mining is the presence of background to the problem of data explosion experienced lately where many organizations have collected so many years of data (purchasing data, sales data, customer data, transaction data, etc.). Almost of all of the data is entered using a computer application used to handle the daily transactions that are mostly about OLTP (On Line Transaction Processing). Data mining is not only a problem of data mining on the transaction only. Research in the field of data mining are now venturing into advanced database systems such as object oriented databases, image / spatial databases, time-series data / temporal database, text (known as text mining), web (known as web mining) and multimedia database. Therefore to process so much data that it needed a method that is able to resolve the issue until the smallest to the point where there is no problem about the data.

Read the rest of this entry »

C H A PT E R 6
Knowledge Management in Practice

Knowledge management or knowledge sharing manifest themselves in many ways in the workplace; that may include ordinary events, such as facilitated meetings or informal conversations or more complex interactions that require information and communication technology. Under the aegis of ‘knowledge management’, there are three types of processes that are generally considered to be essential:

  1. finding or uncovering knowledge [Ehrlich, K., 2003, Learn, L., 2002, Zack,M., 1999],
  2. sharing knowledge [Ackerman et al., 2003], and
  3. the development of new knowledge [Argyris and Schon, 1978, 1996, Baumard, P., 1999, Harvard Business Review, 1998].

In the section of this paper will focus on these categories of practice and will give examples and references to each.

Read the rest of this entry »

Knowledge “Acts”

C H A PT E R 5
Knowledge “Acts”


Question asking and answering is a foundational process by which what people know tacitly becomes expressed, and hence, externalized as knowledge. To support such a view, we borrow from speech acts theory [Searle, J., 1969] that amongst others categorizes question asking as a form of a speech act. In adapting the theory, Hirschheim et al. [1995] describe types of speech acts that pertain to aspects of either Knowledge Management (KM), or Information Management (IM). They reason that IM addresses questions such as ‘Where,’ ‘Who,’ ‘When,’ and ‘What,’ while KM targets problems involving dynamic complexity, addressing solutions to questions such as ‘How’ and ‘Why.’ Quigley and Debons [1999] adopted a similar stance that considers information as texts that primarily answer ‘informative’ questions such as who, when, what, or where while knowledge is considered as texts that answer more ‘explanatory’ or ‘meaning related’ questions such as why or how.
Another category of questions, “What-if,” will also fall in the domain of knowledge activity. Since such questions necessitate predicting and prioritizing outcomes, attempts to address such “what-if ” questions will require integrating understanding of “what” with “why” and “how” to arrive at reasonable resolution.

Read the rest of this entry »

C H A PT E R 4
Conceptualizing Knowledge Emergence

Hey Everyone, Long Time No See No Discussing Because Yesterday I was on the Mid Test in My College ^_^

Now, I want post my Task it’s Summary of my textbook “Knowledge Management”, Let’s go reading and comment yep ^_^


A substantial body of research has been developed on the transmission of information within organizations, particularly R&D organizations.
The seminal work was that of Thomas J. Allen of MIT [Allen and Cohen, 1969, Allen,T., 1977] who conducted a number of studies relating to information flow in industrial and corporate R&D laboratories. Allen’s most ingenious contribution to the field was to seize upon the phenomenon that in many cases in the context of military R&D and procurement, the same contract is awarded to two different organizations to achieve the same end, typically in the case of a critical component of a larger system. Allen coined the term ‘Gatekeeper’ to describe the information flow stars that he discovered, the heavily connected nodes in the information flow pattern. The reason that he chose that term was that much of the development and project work that he investigated was classified military work, where there seemed to be something of a paradox, how was a team to be successful if it didn’t effectively connect with the world of information outside the organization? But how did it do that in a classified and communication restricted environment? What he discovered was that the information stars, the sociometric stars, were the answer to that paradox; they were the information channels through which external information reached the project team. Allen typically investigated what he termed his sociometric stars “Gatekeepers.” They oversaw and guarded the gates through which external information reached the projects. Indeed, one might say that they were not just the gatekeepers, they themselves were the gates.

Read the rest of this entry »


Hiiiiiiiii Everybody,  how are you?? hopefully, I’m sure everything is okay😀

Okay, now I will discuss about the n OLTP and OLTP

if you already know? or just never heard of it??

I’d known in college courses on database and Data WareHouse😀

well, I’ll share my little knowledge of OLTP and OLAP, consider and look carefully ^_^

Read the rest of this entry »

Nuclear Program in Iran proclaimed by developing certain skills, especially nuclear weapons and their military forces, suspected by the West (U.S.) to develop lethal weapons that eventually the West became strained. But the Iranian government insists its nuclear program is solely for peaceful purposes. Currently there are three separate Middle East war – Central Asia: Iraq, Afghanistan, Pakistan and Palestine. Where the object of an air strike Iran “pre-emptive strike” by the allied forces, then the entire region, from the Eastern Mediterranean to China’s western border with Afghanistan and Pakistan, will be volatile, which potentially will lead us to a World War III scenario. It is highly unlikely that the bombings, if they carry out, will only limit on Iran’s nuclear facilities as official statements claimed by the United States-NATO. What’s more likely is an all-out air attack, both military and civilian infrastructure including transportation systems, factories, public buildings.

Iran could trigger a nuclear arms race in the Middle East, such conditions would be more dangerous than the Cold War that occurred several decades ago. United States and its regional ally Israel have never ruled out military strikes against Iran over its controversial nuclear program.

But Russia has always insisted that the conflict can only be resolved through diplomacy, until the Russians appealed to UN member states to avoid a military conflict involving Iran’s nuclear program. But Iran’s efforts to revive the talks foundered because of the issues that the report of the International Atomic Energy Agency (IAEA) regarding Iran’s nuclear porgram there is nothing new, there is likely scenario is being played against iran.

All issues concerning Iran’s nuclear program, causing some of the country on alert to repel or rival Iran. Various concerns and debates have taken place, many of the State is ready to work together to help strive for conflicts or misunderstandings that can occur with damain deselesaikan and through dialogue.

Western countries have long suspected Iran is secretly developing nuclear weapons through nuclear program is run. But the Iranian government denies this. Iran asserted that its nuclear program is solely for peaceful purposes, namely as an energy for civilian purposes, nuclear is producing radio-isotopes to be used for medical and agricultural interests. Iran was forced to create its own nuclear fuel to be installed in the reactor. This is because Western countries are not willing to help Iran.

Source :


Get every new post delivered to your Inbox.

%d bloggers like this: