Street vendors are some of informal sector business actors who are directly related to city government policy. Illegal street vendors as one type of street vendors often get ill-treatment from the city government. It is because in running the business, street vendors occupy public space, such as sidewalks and shoulders, so they are disciplined. Through this phenomena, this study aimed to analyze (1) survival strategy done by street vendors and (2) reasons by street vendors in using public space as a place to trade. Those objectives were further described by employing qualitative descriptive method with data collection technique through interviews and observations. Once the data have been collected, they were analyzed qualitatively interactively. From the research results, it can be concluded. First, being a street vendor for low-level society is the only option and is the most viable way to sustain their lives. Some street vendors do survival strategy in order to meet the needs of everyday life. Second, street vendors use public spaces such as roadsides and sidewalks because (1) there are limitations which make them impossible to occupy locations with obligations to pay, (2) roads and sidewalks are strategic places to peddle merchandise; and (3) lack of attention from government to the needs and welfare of street vendors.
AbstrakArtikel ini membahas kontribusi modal sosial terhadap peningkatan kesejahteraan pedagang kaki lima (PKL). Penelitian dilakukan di Kota Semarang. Wilayah PKL yang diteliti adalah jalan Menteri Soepeno. Pemerintah Kota Semarang merelokasi PKL di wilayah Jalan Pahlawan ke jalan Menteri Supeno sebagai bagian dari upaya untuk mewujudkan Kota Semarang sebagai pusat perdagangan dan jasa berskala internasional. Hasil penelitian menunjukkan pentingnya peran modal sosial bagi pedagang kaki lima untuk bertahan di masa-masa sulit seperti relokasi. PKL yang dipindahkan ke jalan Menteri Soepeno dapat menerima kebijakan pemkot dan berdaptasi secara sosial dan ekonomi dengan lingkungan baru. Modal sosial, utamanya trust dan networking berkontribusi dalam meningkatkan kesejahteraan pedagang. Untuk meningkatkan kesejahteraan PKL, pemerintah kota perlu mendukung dan mengembangkan modal sosial yang telah mereka miliki.AbstractThis article discusses the contribution of social capital to the welfare of street vendors (PKL). The study was conducted in the city of Semarang. The subject of study is the street vendors in Menteri Soepeno Street Semarang. Semarang city government relocate the street vendors in the area from Jalan Pahlawan to Menteri Supeno as part of its effort to realize the Semarang city as a center of international trade and services. The result shows the importance of the role of social capital for street traders has to survive in difficult times such as relocation. PKL transferred to the road Soepeno Minister can receive local government policies and adapt socially and economically to the new environment. Social capital, particularly trust and networking contribute to improve the welfare of traders. This study concludes that to improve the welfare of street vendors, the city government needs to support and develop the street vendors social capital. 2013 Universitas Negeri Semarang
Information technology is a very important part of a company or institution. The information system itself is expected to provide better benefits for companies or institutions. However, along with technological developments are often misused by some irresponsible parties that can lead to threats of the use of technology. Information system security is very important for institutions to maintain information optimally and safely. The existence of a security problem triggers a procedure to control access rights in an information system. A good information system is an information system that can be assessed at a security level, so that it can provide comfort for users. COBIT 5 as an information technology security control standard. Whereas to achieve the standard level of achievement CMMI is needed in information technology security. The combination of the two standards in the information system is able to provide a level of achievement of information technology. The results obtained from the maturity value are 4,458 which means the institutions are at the Managed and Measurable level. This level, institutions are increasingly made aware of technological developments. Institutions have implemented the quantification concept in each process, and are always monitored and controlled for performance. Information system security at this level is good, it's just that it still needs innovation and development to be ready, fast and right in handling security threats.
<p>Efek negatif dari polusi udara terhadap kesehatan manusia banyak diteliti termasuk polusi akibat sistem transportasi. Emisi kendaraan bermotor menghasilkan Benzena, Toluena dan Xylena (BTX) yang merupakan bahan kimia yang bersifat karsinogenik dan petugas pintu tol merupakan kelompok berisiko terpajan BTX. Penelitian bertujuan mengetahui risiko kesehatan akibat pajanan BTX pada petugas pintu tol. Desain penelitian adalah <em>cross-sectional</em> dengan pendekatan Analisis Risiko Kesehatan Lingkungan (ARKL) dan faktor-faktor antropometri. Hasil penelitian menunjukkan pada pintu tol rata-rata konsentrasi (mean<span style="text-decoration: underline;">+</span>SD) benzena sebesar 0,00167<span style="text-decoration: underline;">+</span>0,000056 mg/m<sup>3</sup>, toluena sebesar 0,00124<span style="text-decoration: underline;">+</span>0.000049 mg/m<sup>3</sup> dan xylena sebesar 0,00147<span style="text-decoration: underline;">+</span>0,000063 mg/m<sup>3</sup> sedangkan pada kantor administrasi konsentrasi tidak terdeteksi oleh alat (<em>Method Detection Limit</em>). Rata-rata risiko non karsinogenik (RQ) BTX pada petugas pintu tol lebih tinggi secara signifikan dibandingkan dengan rata-rata RQ BTX petugas administrasi. Risiko kesehatan non karsinogenik dan karsinogenik belum menunjukkan adanya risiko kesehatan yang signifikan. Upaya pencegahan berupa pengelolaan manajemen risiko untuk pengendalian risiko bahan berbahaya di lingkungan perlu ditingkatkan.</p><p> </p><p><strong>Kata Kunci:</strong> Pintu Tol, Benzena, Toulena, Xylena</p><p> </p><p>The researches of BTX (Benzene, Toluene and Xylene) related to the health impacts have been done and published in any publications. One of the risk groups is toll gate’s workers who have been exposed every day with BTX. The design of this study is cross-sectional with Environmental Health Risk Analysis to determine the magnitude of health risks of BTX on the toll gate. The results showed at the toll workers’s respondents have benzene concentration 0.00167+0.000056 mg/m<sup>3</sup>, toluene 0.00124+0.000049 mg/m<sup>3</sup> and xylene 0.00147+0,000063 mg/m<sup>3</sup> respectively, while in the administrative office’s respondents, BTX was undetectable (Minimum Detection Limit). The average RQ of toll gate respondents was significantly higher than administrative office’s respondents. In conclusion, the risk of all workers have the RQ ≤ 1. Non carcinogenic and carcinogenic health risks to all toll gate’s workers recently have not shown any risk yet. Nevertheless, risk management system should be developed and improved.</p><p> </p><p><strong>Keywords</strong>: Toll Gate, Benzene, Toulene, Xylene</p>
Safe academic services are the most important part of universities. The security of academic services is very important to maintain information optimally and safely. Along with the development of technology, academic information services are often misused by some irresponsible parties that can cause threats. To prevent these things from happening, it is necessary to know the extent of governance of higher education academic information system security by evaluating. So the research was conducted to determine the maturity of the security of Higher Education academic information service security by using the COBIT 5 framework in the DSS05 domain. The DSS05 domain in COBIT 5 is a good framework for use in implementing and evaluating the security of academic information services. Meanwhile, to determine the achievement of the evaluation of the security level of academic information systems, the Indonesian e-government ranking (PEGI) method is required. The combination of the COBIT 5 framework in the DSS05 domain using the PEGI method in academic information security service is able to provide a level of achievement in the form of Customer Value. The results of the COBIT 5 framework analysis of the DSS05 domain using the PEGI method get a score of 3.50 so that the quality of academic information service security evaluation achievement is at a very good level. At this level, universities are increasingly open to technological development. Higher education has applied the concept of quantification in every process, and has always been monitored and controlled for its performance in the security of academic information systems.
Connection from the Internet is required to always be maintained under any conditions, but not always connectivity will run smoothly, lots of crowds or problems that require connections do not run smoothly. Application of security systems to overcome all problems and difficulties, both technical and non-technical which can affect system performance. GRR Rapid Response is the answer to internet network security. GRR asks for a client-server model, agents installed on the machine (client) to be able to communicate with the Grr server to access and provide unique client IDs. After setting this active and running, the server can send a request to the client who collects information, and the client sends a response to the request. After Grr is made, it is necessary to do a system evaluation and evaluation. The COBIT 5 framework is a good standard for determining the level of maturity of network security. The maturity level obtained is 2.899 can be decided at an institutional maturity level defined. The level of support the institution has agreed to, supports and supports all activities related to network security.
A secure academic information system is part of the college. The security of academic information systems is very important to maintain information optimally and safely. Along with the development of technology, academic information systems are often misused by some irresponsible parties that can cause threats. To prevent these things from happening, it is necessary to know the extent to which the security of the academic information system of universities is conducted by evaluating. So the research was conducted to determine the Maturity Level on the governance of the security of University Ahmad Dahlan academic information system by using the COBIT 5 framework on the DSS05 domain. The DSS05 domain on COBIT 5 is a good framework to be used in implementing and evaluating related to the security of academic information systems. Whereas to find out the achievement of evaluation of academic information system security level, CMMI method is needed. The combination of the COBIT 5 framework on the DSS05 domain using the CMMI method in academic information system security is able to provide a level of achievement in the form of a Maturity Level value. The results of the COBIT 5 framework analysis of the DSS05 domain use the CMMI method to get a Maturity level of 4,458 so that it determines the achievement of the evaluation of academic information systems at the tertiary level is Managed and Measurable. This level, universities are increasingly open to technological developments. Universities have applied the quantification concept in each process, and are always monitored and controlled for performance in the security of academic information systems.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.