To see the other types of publications on this topic, follow the link: Java security.

Journal articles on the topic 'Java security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Java security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Zhang, Xiangmin. "Java Security." Library & Archival Security 16, no. 2 (June 2000): 5–20. http://dx.doi.org/10.1300/j114v16n02_02.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Oaks, Scott. "Java Security." EDPACS 27, no. 4 (October 1999): 15–16. http://dx.doi.org/10.1201/1079/43250.27.4.19991001/30274.4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Gong, Li. "Java Security Architecture Revisited." Queue 9, no. 9 (September 2011): 30–36. http://dx.doi.org/10.1145/2030256.2034639.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Gong, Li. "Java security architecture revisited." Communications of the ACM 54, no. 11 (November 2011): 48–52. http://dx.doi.org/10.1145/2018396.2018411.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chen, E. "Poison Java [data security]." IEEE Spectrum 36, no. 8 (August 1999): 38–43. http://dx.doi.org/10.1109/6.780997.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Gougher, R. A. "Grounded Look at Java Security." IEEE Software 15, no. 6 (November 1998): 124–25. http://dx.doi.org/10.1109/ms.1998.731176.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Koved, L., A. J. Nadalin, D. Neal, and T. Lawson. "The evolution of Java security." IBM Systems Journal 37, no. 3 (1998): 349–64. http://dx.doi.org/10.1147/sj.373.0349.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Markantonakis, Constantinos. "Java card technology and security." Information Security Technical Report 4 (January 1999): 26–27. http://dx.doi.org/10.1016/s1363-4127(99)80050-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

McClure, Ben. "Java kit gets better security." Computers & Security 17, no. 2 (January 1998): 158. http://dx.doi.org/10.1016/s0167-4048(97)82008-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Markantonakis, Constantinos. "Java card technology and security." Information Security Technical Report 3, no. 2 (January 1998): 82–89. http://dx.doi.org/10.1016/s0167-4048(98)80008-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Nichol, Sandy. "Java security bug found, patched." Computers & Security 18, no. 5 (January 1999): 434. http://dx.doi.org/10.1016/s0167-4048(99)80096-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Wallach, Dan S., Dirk Balfanz, Drew Dean, and Edward W. Felten. "Extensible security architectures for Java." ACM SIGOPS Operating Systems Review 31, no. 5 (December 1997): 116–28. http://dx.doi.org/10.1145/269005.266668.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Li Gong. "Java security: present and near future." IEEE Micro 17, no. 3 (1997): 14–19. http://dx.doi.org/10.1109/40.591650.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Meyer, Helen. "eSafe ups ante for Java, security." Computers & Security 17, no. 1 (January 1998): 57. http://dx.doi.org/10.1016/s0167-4048(97)80253-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

McClure, Ben. "Security companies hype up Java risks." Computers & Security 17, no. 3 (January 1998): 226. http://dx.doi.org/10.1016/s0167-4048(98)80331-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Herzog, Almut, and Nahid Shahmehri. "Performance of the Java security manager." Computers & Security 24, no. 3 (May 2005): 192–207. http://dx.doi.org/10.1016/j.cose.2004.08.006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Pandey, Swati. "INFORMATION FLOW SECURITY IN MULTITHREADED JAVA APPLICATIONS." International Journal of Advanced Research 5, no. 5 (May 31, 2017): 1146–57. http://dx.doi.org/10.21474/ijar01/4225.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Viega, John, Gary McGraw, Tom Mutdosch, and Edward W. Felten. "Statically Scanning Java Code: Finding Security Vulnerabilities." IEEE Software 17, no. 5 (September 2000): 68–74. http://dx.doi.org/10.1109/52.877869.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Hopwood, David. "A comparison between Java and ActiveX security." Network Security 1997, no. 12 (December 1997): 15–20. http://dx.doi.org/10.1016/s1353-4858(97)88552-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Hopwood, David. "A comparison between java and activeX security." Computers & Security 16, no. 6 (January 1997): 526. http://dx.doi.org/10.1016/s0167-4048(97)84702-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Menkus, Belden. "Java Raises Control, Audit, and Security Issues." EDPACS 24, no. 6 (December 1996): 11–16. http://dx.doi.org/10.1080/07366989609452286.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Caromel, Denis, and Julien Vayssière. "A security framework for reflective Java applications." Software: Practice and Experience 33, no. 9 (May 15, 2003): 821–46. http://dx.doi.org/10.1002/spe.528.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Deshmukh, A. A. "Data Security Analysis and Security Extension for Smart Cards Using Java Card." International Journal of Advanced Information Technology 2, no. 2 (April 30, 2012): 41–57. http://dx.doi.org/10.5121/ijait.2012.2204.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Debbabi, Mourad, Mohamend Saleh, Chamseddine Talhi, and Sami Zhioua. "Security Evaluation of J2ME CLDC Embedded Java Platform." Journal of Object Technology 5, no. 2 (2006): 125. http://dx.doi.org/10.5381/jot.2006.5.2.a2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Hannavi, Iin Endya, Minar Ferichani, Ernoiz Antriyandarti, and Susi Wuri Ani. "RURAL HOUSEHOLD FOOD SECURITY IN KUDUS CENTRAL JAVA." Jurnal Agribest 2, no. 2 (September 15, 2018): 179. http://dx.doi.org/10.32528/agribest.v2i2.1629.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

DAM, MADS, BART JACOBS, ANDREAS LUNDBLAD, and FRANK PIESSENS. "Security monitor inlining and certification for multithreaded Java." Mathematical Structures in Computer Science 25, no. 3 (December 17, 2014): 528–65. http://dx.doi.org/10.1017/s0960129512000916.

Full text
Abstract:
Security monitor inlining is a technique for security policy enforcement whereby monitor functionality is injected into application code in the style of aspect-oriented programming. The intention is that the injected code enforces compliance with the policy (security), and otherwise interferes with the application as little as possible (conservativity and transparency). Such inliners are said to be correct. For sequential Java-like languages, inlining is well understood, and several provably correct inliners have been proposed. For multithreaded Java one difficulty is the need to maintain a shared monitor state. We show that this problem introduces fundamental limitations in the type of security policies that can be correctly enforced by inlining. A class of race-free policies is identified that precisely characterizes the inlineable policies by showing that inlining of a policy outside this class is either not secure or not transparent, and by exhibiting a concrete inliner for policies inside the class which is secure, conservative and transparent. The inliner is implemented for Java and applied to a number of practical application security policies. Finally, we discuss how certification in the style of proof-carrying code could be supported for inlined programs by using annotations to reduce a potentially complex verification problem for multithreaded Java bytecode to sequential verification of just the inlined code snippets.
APA, Harvard, Vancouver, ISO, and other styles
27

Hatmoko, W., Radhika, R. Firmansyah, and A. Fathony. "Water security of river basins in West Java." IOP Conference Series: Earth and Environmental Science 419 (February 8, 2020): 012140. http://dx.doi.org/10.1088/1755-1315/419/1/012140.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Meyer, Helen. "Sun changes security framework for Java development kit." Computers & Security 17, no. 1 (January 1998): 58–59. http://dx.doi.org/10.1016/s0167-4048(97)80259-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Puryantoro, Puryantoro, and Hasbiadi Hasbiadi. "Analysis of Food Security Level of Urban and Rural Households in East Java Province." Buletin Penelitian Sosial Ekonomi Pertanian Fakultas Pertanian Universitas Haluoleo 23, no. 1 (April 30, 2021): 21. http://dx.doi.org/10.37149/bpsosek.v23i1.16734.

Full text
Abstract:
Food security is an issue that continues to roll because it is closely related to people's welfare. Not only urban but rural residents have also been targeted in various strategies to meet pagan needs. This study aimed to analyze household food security in both urban and rural areas in East Java. Data collection uses Susenas secondary data for 2016-2019 issued by BPS East Java. The share of food expenditure analyzes the data. The analysis results show that the population in East Java, both in urban and rural areas, is at the level of food security status because the share value of food expenditure is less than 60%. The share of urban food expenditure is lower than the share of rural food expenditure.
APA, Harvard, Vancouver, ISO, and other styles
30

Martínez, Salvador, Valerio Cosentino, and Jordi Cabot. "Model-based analysis of Java EE web security misconfigurations." Computer Languages, Systems & Structures 49 (September 2017): 36–61. http://dx.doi.org/10.1016/j.cl.2017.02.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Paul, Nathanael, and David Evans. "Comparing Java and .NET security: Lessons learned and missed." Computers & Security 25, no. 5 (July 2006): 338–50. http://dx.doi.org/10.1016/j.cose.2006.02.003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Wen, Ze Peng, Gong Liang Li, Yi Zheng Tao, and Guang Hong Yang. "Researches on JVMTI-Based Security Enhancement Techniques for Java Software." Advanced Materials Research 998-999 (July 2014): 1247–52. http://dx.doi.org/10.4028/www.scientific.net/amr.998-999.1247.

Full text
Abstract:
With the fast development of information technology, various software systems have been widely applied to production lines and office work. A lot of corporate data thus are stored and processed by these systems each day. Therefore, the security of the software systems is closely related to the data security and the core competitiveness of an enterprise. At present, Java becomes one of the most important programming languages of the enterprise application systems. Against its hidden risks that Trojans and Backdoors are easily implanted through decompilation, the author of this paper proposes a security enhancement technique based on JVMTI for Java software to effectively prevent the malicious users’ decompilation through encrypting the bytecode files, thereby enhancing the security of the software.
APA, Harvard, Vancouver, ISO, and other styles
33

Han, Li Fang, Ting Ting Hou, Kun Lun Gao, Nan Liu, and Bao Jiang Cui. "Research on Java Source Code Static Analysis Based on Taint Tracking." Applied Mechanics and Materials 602-605 (August 2014): 3846–49. http://dx.doi.org/10.4028/www.scientific.net/amm.602-605.3846.

Full text
Abstract:
Java applications have proliferated rapidly in recent years, and the security issue in the source code seems to bring a great threat which cannot be ignored. SQL injection and cross-site scripting vulnerabilities, path traversal, and so on are common Java security vulnerabilities. These vulnerabilities are usually caused by improper handling of user input and we call them input validation vulnerabilities [1].In this paper, we propose a Java source code analysis method based on the taint tracking. By means of vulnerability pattern match, we keep track of the introduction of tainted data and its propagation in different contexts, leading to comprehensive and accurate test results. Actually, we have applied this method to some of the open-source Java projects. Compared to other similar software, our technique presents good feasibility and superiority.
APA, Harvard, Vancouver, ISO, and other styles
34

Li, Ai Ning, Sheng Li Hu, Jin Qing Chi, and Peng Bo Wu. "Research on Information Security Transmission Mechanism of Hospital Management System." Applied Mechanics and Materials 701-702 (December 2014): 1004–7. http://dx.doi.org/10.4028/www.scientific.net/amm.701-702.1004.

Full text
Abstract:
Objectives: Solve the security problems on information transmission between different debarments in hospital management network system. Methods: Put forward a security transmission mechanism based on ECC and AES algorithm which using the hybrid encryption scheme combined with ECC and AES algorithm to ensure the safety of the information transmission process, using the ECC signature algorithm to achieve the identity authentication between different functional departments, using the hash function to realize the integrity authentication of information. Results: This mechanism has been implemented by Java programming and it could effectively ensure the security of information transmission which has been proved by practice. Conclusions: The algorithm of this security Mechanism has been implemented by using java language. Experimental results show that it is effective to keep the security of information transmission..
APA, Harvard, Vancouver, ISO, and other styles
35

Choirul, Nanda. "64 Bit Block Cipher Cryptography Design Based on Traditional Game Patterns with West Java." Jurnal Terapan Teknologi Informasi 3, no. 1 (October 25, 2019): 65–73. http://dx.doi.org/10.21460/jutei.2019.31.145.

Full text
Abstract:
Cryptography is a technique of securing data. To improve the security level, cryptography needs to be developed. Block Cipher Cryptography based on Traditional Game Pattern in West Java Bentengan is designed to make a new cryptography. This cryptography is designed by 4 process and 10 rounds. Testing is also done by Avalanche Effect the character changes reach up to 51,563%, so it can be an alternative in securing data.
APA, Harvard, Vancouver, ISO, and other styles
36

Pujiati, Sri, Amelia Pertiwi, Churun Cholina Silfia, Dewa Maulana Ibrahim, and Siti Hadiyati Nur Hafida. "ANALISIS KETERSEDIAAN, KETERJANGKAUAN DAN PEMANFAATAN PANGAN DALAM MENDUKUNG TERCAPAINYA KETAHANAN PANGAN MASYARAKAT DI PROVINSI JAWA TENGAH." Jurnal Sosial Ekonomi Pertanian 16, no. 2 (June 3, 2020): 123. http://dx.doi.org/10.20956/jsep.v16i2.10493.

Full text
Abstract:
AbstractFood security becomes an aspect that needs to be considered, especially when the population and degradation of agricultural land are increasing. Many variables that affect the measurement of the food security index, and what is often used is the availability, affordability, and utilization of food. This study aims to determine the effect of food availability, affordability, and utilization variables on the food security index. This study uses a correlational design and multiple regression analysis techniques. All regions in Central Java Province were the objects of this study, there are 35 districts/cities. The results from this study showed that the three variables did not significantly influence the increase of the food security index. The result shows that the current food security index has been influenced by other variables. Therefore, the government needs to examine more closely the new variables that affect the food security index in order to develop a strategy to improve the food security index in Central Java Province, especially in the era of the industrial revolution 4.0. Keywords: Food Security Index; Food Affordability; Food Availability; Food Utilization
APA, Harvard, Vancouver, ISO, and other styles
37

Oluwabukola, Otusile, Oludele Awodele, Chibueze Ogbonna, Ajaegbu Chigozirim, and Amarachi Anyaehie. "A Packet Sniffer (PSniffer) Application for Network Security in Java." Issues in Informing Science and Information Technology 10 (2013): 389–400. http://dx.doi.org/10.28945/1818.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Kumar, Sunil, and Jayant Shekhar. "Cloud Deployment with Java Implementation of Cloud Data Security Algorithm." International Journal of Private Cloud Computing Environment and Management 3, no. 2 (October 30, 2016): 19–26. http://dx.doi.org/10.21742/ijpccem.2016.3.2.03.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Mazuera-Rozo, Alejandro, Camilo Escobar-Velásquez, Juan Espitia-Acero, David Vega-Guzmán, Catia Trubiani, Mario Linares-Vásquez, and Gabriele Bavota. "Taxonomy of security weaknesses in Java and Kotlin Android apps." Journal of Systems and Software 187 (May 2022): 111233. http://dx.doi.org/10.1016/j.jss.2022.111233.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Koved, L., A. Nadalin, N. Nagaratnam, M. Pistoia, and T. Shrader. "Security challenges for Enterprise Java in an e-business environment." IBM Systems Journal 40, no. 1 (2001): 130–52. http://dx.doi.org/10.1147/sj.401.0130.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Merz, Matthias. "Enabling declarative security through the use of Java Data Objects." Science of Computer Programming 70, no. 2-3 (February 2008): 208–20. http://dx.doi.org/10.1016/j.scico.2007.07.005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Meyer, Helen. "Server -based Java security products help guard your enterprise flank." Computers & Security 18, no. 2 (January 1999): 153–54. http://dx.doi.org/10.1016/s0167-4048(99)80047-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Pironti, Alfredo, and Riccardo Sisto. "Provably correct Java implementations of Spi Calculus security protocols specifications." Computers & Security 29, no. 3 (May 2010): 302–14. http://dx.doi.org/10.1016/j.cose.2009.08.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Crégut, Pierre, and Cuihtlauac Alvarado. "Improving the Security of Downloadable Java Applications With Static Analysis." Electronic Notes in Theoretical Computer Science 141, no. 1 (December 2005): 129–44. http://dx.doi.org/10.1016/j.entcs.2005.02.033.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Martínez Pabón, Francisco Orlando, Jaime Caicedo Guerrero, Rodrigo Hernández Cuenca, Oscar Mauricio Caicedo Rendón, and Javier Alexander Hurtado Guaca. "SIM parameter-based security for mobile e-commerce settings." Ingeniería e Investigación 27, no. 2 (May 1, 2007): 56–64. http://dx.doi.org/10.15446/ing.investig.v27n2.14830.

Full text
Abstract:
Security requirements are more demanding in the e-commerce domain. However, mobile e-commerce settings not only insist on security requirements, they also require balance between security levels and hardware and usability device ability. These features require designing models having simple authentication and authorisation scheme which also ensures information integrity for each e-transaction. The Mobile and Wireless Applications’ Development Interest Group W@Pcolombia thus developed the P3SIM platform so that mobile applications might include SIM parameter-based security features. The P3SIM platform’s framework and compilation and simulation settings combines the advantages of identification provided by the SIM module with the security features provided by SATSA and Java Card APIs for Java ME environments, one of the most-used platforms for mobile application development. Developing an m-commerce-based prototype not only shows the platform's ability to operate in secure environments, it also shows its ability to comply with environmental security requirements.
APA, Harvard, Vancouver, ISO, and other styles
46

Lin, Jian Bing, and Jin An Zou. "The Protection Strategy of Data Security Based on JAVA Stream Filtering." Applied Mechanics and Materials 433-435 (October 2013): 1631–34. http://dx.doi.org/10.4028/www.scientific.net/amm.433-435.1631.

Full text
Abstract:
With the development of the computer network and communication technology, some important information is used to infringe upon by using the Internet and associated communications technology. The paper analyzes briefly the principle of the JAVA stream filtering and data security protection strategy on network of multi-level, then takes some safety measures for data protection by using the JAVA stream filter, mainly focuses on the network transmission of the socket data, in order to protect the security of data, and discussed some related problems of data encryption, finally gives the safety results.
APA, Harvard, Vancouver, ISO, and other styles
47

Mahdi, Hussain. "KERBEROS SECURITY EVALUATION." Diyala Journal of Engineering Sciences 1, no. 1 (September 1, 2008): 152–63. http://dx.doi.org/10.24237/djes.2008.01111.

Full text
Abstract:
Authentication of a person is an important task in many areas of day-to-day life including electronic commerce, system security and access control. We present Kerberos a client\server authentication protocol which can perform a secure communication over unsecured environments (internet). For example an e-bank application the client can log on in domain environment using password (single factor authentication) or a smart card running java card application in combine with PIN and the server is the banking hosted system at the bank. Smart card can enhance the security by storing the cryptographic key to perform dual factor authentication, it also can manage the encryption and decryption of the Kerberos keys on it rather then on the client workstation memory. A common methodology depends on the national standardizations is used to evaluate security of that authentication scenarios of Kerberos protocol.
APA, Harvard, Vancouver, ISO, and other styles
48

Agboola, Rihanat Bola, Zaharaddeen Salele Iro, Jamilu Awwalu, and Ibrahim Nasir Said. "Database security framework design using tokenization." Dutse Journal of Pure and Applied Sciences 8, no. 1b (May 6, 2022): 16–26. http://dx.doi.org/10.4314/dujopas.v8i1b.3.

Full text
Abstract:
One of the challenging tasks in database management system today is protecting sensitive data that are complex in the database system. Most organization opt for implementation of data encryption which is one of the most effective security control mechanism, but data encryption only render information unreadable to those that do not have the secret decryption key. The core issue with data encryption techniques is that, it is reversibly. In these regards, sensitive data need to be tokenized first before encrypting for better security. Therefore, this work is introducing tokenization technique. Tokenization means replacement or substitution of sensitive data with a token, as an additional technique on database system for protecting sensitive data in all higher institutions and other firms that deal with sensitive data. A database security framework using tokenization was design, implemented using NetBeans 8.1 IDE, Java Platform SE binary (jdk-8u91-windows-x64) and xampp-windows-x64-7.3.7-0-VC15 (Apache and MySQL), an official IDE for Java 8 and then encrypt the tokenized data using AES before storing it in server 127.0.0.1 a localhost phpMyAdmin Database tools and evaluated with other security systems (encoding, hashing and encryption) on student database. Results shows that tokenization technique has 95% capacity to protect sensitive data compare to other security systems.
APA, Harvard, Vancouver, ISO, and other styles
49

Agrawal, Richa, Dr Brajesh Kumar Singh, and Dr Lavkush Sharma. "Cryptography based Internet Security ATM System using Fingerprint for securing PIN." Journal of University of Shanghai for Science and Technology 23, no. 10 (October 9, 2021): 369–80. http://dx.doi.org/10.51201/jusst/21/10717.

Full text
Abstract:
Today, ATMs (automated teller machines) are used in a variety of ways, including: you can withdraw cash, transfer cash, check your balance, get an account summary, and more. The main component here is security, to maintain the security we prefer cryptography and biometrics. Cryptography is a state- of-the-art technique for increasing security. Using cryptography and biometrics together creates a bio cryptographic system. Since the private key is an important component of encryption, here one is the main task to secure the private [1] key. To overcome this issue, we use a biometric fingerprint image. However, biometrics cannot protect anyone’s fingerprint template because of the many suspected attacks. Therefore, we use a fuzzy vault system that combines cryptography [2] and biometrics [4] to ensure that only authorized users can use their passwords and PINs with the legal data. Keywords: Biometrics, Cryptography, Fuzzy vault system, IP security, Java Applets.
APA, Harvard, Vancouver, ISO, and other styles
50

Anandhiya, Anandhiya, Agus Arifin, and Istiqomah Istiqomah. "Pengaruh Ketahanan Pangan terhadap Rata-Rata Pengeluaran Masyarakat di Jawa Tengah." Jurnal Ilmiah Universitas Batanghari Jambi 21, no. 1 (February 8, 2021): 96. http://dx.doi.org/10.33087/jiubj.v21i1.1258.

Full text
Abstract:
Food security is included in the second Sustainable Development Goals (SDGs), namely to overcome poverty, improve quality of life and regional development. This study aims to analyze the effect of population, income per capita, rice production and poverty on the average per capita expenditure in Central Java Province in 2015-2019. The research method uses multiple linear regression with the penel data model. The results showed that the population and rice production had a significant effect on the average per capita expenditure in Central Java Province in 2015-2019. Meanwhile, income per capita and poverty not significant effect on average per capita expenditure in Central Java Province in 2015-2019.. The implication of government policy is to maintain food security in Indonesia and be able to reduce the population by streamlining the family planning program.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography