Klaim Artikel Anda
Verifikasi kepemilikan artikel akademik
Apakah artikel-artikel ini milik Anda?
Daftarkan diri Anda sebagai author untuk mengklaim artikel dan dapatkan profil akademik terverifikasi dengan fitur lengkap.
Badge Verifikasi
Profil terverifikasi resmi
Statistik Lengkap
H-index, sitasi, dan metrik
Visibilitas Tinggi
Tampil di direktori author
Kelola Publikasi
Dashboard artikel terpadu
Langkah-langkah Klaim Artikel:
- 1. Daftar akun author dengan email akademik Anda
- 2. Verifikasi email dan lengkapi profil
- 3. Login dan buka menu "Klaim Artikel"
- 4. Cari dan klaim artikel Anda
- 5. Tunggu verifikasi dari admin (1-3 hari kerja)
Menampilkan 1–3 dari 3 artikel
An Analysis of Factors Causing Incomplete Informed Con-sent Documentation in the Surgical Ward of RSUP Surakarta
Sri Surani
; Rizka Licia
International Journal of Public Health
Vol 2
, No 2
(2025)
Informed consent is a crucial component of medical records that ensures the legality and ethical compliance of medical procedures conducted on patients. At RSUP Surakarta, the completeness of informed consent documentation in the surgical ward has consistently failed to meet the national minimum service standard of 100%, with observed monthly completion rates ranging from 86% to 98% throughout 2024. This study aims to analyze the factors contributing to the incomplete documentation of informed c...
Sumber Asli
Google Scholar
DOI
Evaluation Of Informed Consent Form Completeness Using the 5M Method in General Surgery Patients
Syelvy Anggraeny Setyawati
; Rizka Licia
Journal of Health Sciences, Public Health and Pharmacy
Vol 2
, No 1
(2025)
Informed consent is a fundamental legal document in medical practice, ensuring that patients provide informed approval before undergoing medical procedures. The completeness of this document is crucial for legal compliance and patient safety, as incomplete or improperly filled out consent forms can lead to legal disputes and compromise patient well-being. This study aims to evaluate the completeness of informed consent forms for general surgery patients, employing the 5M method (Man, Money, Meth...
Sumber Asli
Google Scholar
DOI
Detection of Attacks in Computer Networks Using C4.5 Decision Tree Algorithm: An Approach to Network Security
Wahyu Wijaya Widiyanto
; Rizka Licia
International Journal of Information Engineering and Science
Vol 1
, No 4
(2024)
The detection of computer network attacks is becoming increasingly important as the complexity and frequency of cyber-attacks threatening information systems and network infrastructure continue to rise. These attacks may lead to severe consequences, including data breaches, service disruptions, and financial losses. To address these challenges, artificial intelligence techniques have become a major focus in the development of more effective, adaptive, and reliable intrusion detection systems. Am...
Sumber Asli
Google Scholar
DOI