Claim Missing Document
Check
Articles

Found 24 Documents
Search

IT Service Management System Measurement using ISO20000-1 and ISO15504-8: Developing a Solution-Mediated Process Assessment Tool to Enable Transparent and SMS Process Assessment Imam Asrowardi; Septafiansyah Dwi Putra; Eko Subyantoro; Norzaidi Haji Mohd Daud
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 5: October 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (663.074 KB) | DOI: 10.11591/ijece.v8i5.pp4023-4032

Abstract

Information technology is about not only hardware, software, communication infrastructure and communication infrastructure but also how to manage services. Information technology plays an increasingly important role in developing the structure and functions of public and private sectors. Service measurement plays an important role in IT service management (ITSM) that is one of the subfields of Services Computing science. ITSM is a big part of service science, a science field that combines computer science, operation research engineering, business strategy, management science, and organizational theory. Performance measurement from each of IT services is absolutely needed and is important in the continuous development of ITSM. These research provide good technical knowledge about the measuring ITSM with some requirements. In this paper we suggest the metrics in each service processes enables organizations to predict a direction for active process enhancement and to identify if the goal of process can achieve. This objective process metrics based on ISO/IEC 15504-8 and PRM ISO/IEC 20000-4 refinement. The output of this research, in the form of metrics and tools for any type organizational use.
PERSONNEL ATTENDANCE SYSTEM USING AN IOT-BASED FINGERPRINT (INTERNET OF THINGS) Stephani Yolanda; Tri Wahyudi sy; Yudi Setyawan; Imam Asrowardi
Jurnal TAM (Technology Acceptance Model) Vol 11, No 1 (2020): Jurnal TAM (Technology Acceptance Model)
Publisher : LPPM STMIK Pringsewu

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Attendance system in an institution is very important to implement. In fact, an attendance is a gauge of how performance, discipline, job achievement, salary/wages, and productivity of an employee, as well as general progress of the agency. Especially for agencies that have employees of ASN (State civil apparatus), attendance systems must be held to evaluate how ASN responsibilities to the legislation explaining the ASN. Thus, the creation of personnel attendance system using an IOT-based fingerprint (Internet Of Things), is a way of producing an appropriate and effective attendance device for ASN employees in an institution. The attendance device has the advantage of using the fingerprints of each employee in the process of the system, making it very effective to implement. In addition, the attendance process will automatically enter the employee data that does the attendance to the database, then can be accessed by the Web dashboard Using THE media Rest API. The creation of attendance device implements Scrum method, because this method is effectively applied in the creation of group projects. An evaluation of the device's performance was carried out using the SUS (System Usability Scale) method and resulted in a score of 75 out of 31 respondents. The rating is stated in the Good category and is suitable for use based on the results of the evaluation.
Aplikasi Pelaporan dan Monitoring Data Limbah B3 Pada Tempat Penyimpanan Sementara Berbasis Web di PT. PLN (Persero) Sektor Pengendalian Pembangkitan Bandar Lampung Ade Irma Rilyani; Imam Asrowardi; Kurniawan Saputra
Jurnal Inovtek Polbeng Seri Informatika Vol 3, No 2 (2018)
Publisher : P3M Politeknik Negeri Bengkalis

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (708.108 KB) | DOI: 10.35314/isi.v3i2.559

Abstract

Abstrack - PT. PLN (Persero) Sektor Pengendalian Pembangkitan Bandar Lampung has powerhouse unit that produces B3 waste (hazardous and toxic substance). This company has a job to keep the environment from production impact that was produced by managing B3 waste that was created by every single powerhouse unit. K3L sector office staff and LK2 powerhouse unit staff face difficulties in doing the data reporting process and monitoring of B3 waste that is done by directly visiting sector office and powerhouse unit due to the distance that should be taken is quire far and takes a long time. The purpose of this final project is to create a web-based B3 waste data reporting and monitoring application to ease the reporting process and monitoring B3 waste data. The method that is used in this final project is Rapid Application Development (RAD) with the stages of requirement planning, user design, construction and cutover. Keywords - application, B3 waste, monitoring, reporting.
Pengembangan Sistem Manajemen Keamanan Informasi (SMKI) Pada Pusat Data UPT Puskom Polinela Septafiansyah Dwi Putra; Imam Asrowardi; Eko Subyantoro
Jurnal Ilmiah ESAI Vol. 9 No. 2 (2015)
Publisher : Politeknik Negeri Lampung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25181/esai.v9i2.934

Abstract

In the implementation of ICT an educational institution, a data center is an ICT facility which is used as a placement, storage, and data and information processing. The ICT facilities are very risky at main business process when unmanaged appropriately. ISO27001 is an information security management system standard that can be used as a reference in designing a management of ICT facilities. This paper describes the design of an information security management system in a data center of State Polytechnics of Lampung (Polinela). This study begins by studying general description of the organization; defining the scope of the evaluation, and designing the tools. Expert judgment evaluation results show that the control of the recommended risk control is appropriate and can be applied to the locus of research.Key words : ISMS, security, information, management
Model Deteksi Dini Penyebaran Organisme Pengganggu Tanaman dengan Sistem SMS GATEWAY pada Kelompok Tani Eko Subyantoro; Imam Asrowardi
Jurnal Ilmiah ESAI Vol. 9 No. 2 (2015)
Publisher : Politeknik Negeri Lampung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25181/esai.v9i2.935

Abstract

Pest is an obstacle to world agriculture, spread can occur very quickly if too late to be controlled. The government has provided extension field as a builder of farmers in crop management field, pest management to monitor the progress of growth and yield of agricultural cultivation. The limited amount of extension is not proportional to the area of cultivation so that in case of pests likely to be too late to get information and also late in handling. Agricultural information system that is easily used by farmers to inform the incidence of pests and diseases.Through early detection system based on SMS Gateway can inform farmers pest attack by sending an SMS to the system, then the system automatically forward the information to the extension to be reviewed shortly. Besides instant information delivered agricultural office to get a recording of data spread of agricultural pests, so that the future can be taken preventive measures against the spread of plant pests. Keyword : Early detection, intruder plant organisms, information systems, SMS Gateway
Desain Aplikasi Business To Consumer untuk UKM Berbasis Cloud Computing Imam Asrowardi; Eko Subyantoro
Jurnal Ilmiah ESAI Vol 9 No 1 (2015)
Publisher : Politeknik Negeri Lampung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25181/esai.v9i1.944

Abstract

The importance of the role of Small and Medium Enterprises for Indonesia's economic growth give rise to the need of a business to consumer applications design that can run on cloud-based information technology infrastructure. The purpose of this research is to create an application design of business to consumer (b2c) of the SMEs to market their products which can be run on the Infrastructure as a Service (IAAS) cloud-based computing. The method used in this study is a system development life cycle (SDLC).Keywords: cloud, business, SME, SDLC
Desain Model Layanan Infrastruktur Berbasis Private Cloud Computing untuk Usaha Kecil Menengah Imam Asrowardi; Eko Subyantoro
Jurnal Ilmiah ESAI Vol 8 No 2 (2014)
Publisher : Politeknik Negeri Lampung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25181/esai.v8i2.960

Abstract

The importance of the role of Small and Medium Enterprises for Indonesian economic growth appears to create a design cloud-based information technology infrastructure. The purpose of this research is the creation of an infrastructure design that can be used by small and medium enterprises to market their products through cloud computing services. The method used in this study is the system development life cycle(SDLC).Key words: cloud, technology, information, Small and Medium scale Enterprises
Efektivitas Instrusion Detection System Pada Proxy Server XYZ dalam Mencegah Scanning Port oleh Hacker Imam Asrowardi; Eko Subyantoro
Jurnal Ilmiah ESAI Vol 8 No 1 (2014)
Publisher : Politeknik Negeri Lampung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25181/esai.v8i1.973

Abstract

Due to its crucial role, a proxy server needs to be well maintained to ensure its appropriate functions. One of the causes of failure access in proxy server is data manipulation done by irresponsible users that work by scanning, gaining access, maintaining access and covering track. The scanning process appears as an important step as it exposes the types of applications and services utilized in the server. The step is to manipulate four vulnerable points of proxy server related to the operating system, applications, program modules and configurations. In order to prevent the scanning process, it is important to utilize a mechanism which is able to detect and report any indications of intruding access in the proxy server aka intrusion detection system. This research is aimed at producing an application operated in the proxy server to report any indication of access intrusion. The research uses System Development Life Cycle (SDLC) method by applying analyzing, designing, implementing and assessing.Key words: proxy, server, ids, scanning
Penghitungan Suara Pilkada Gubernur Lampung dengan Metode Quick Count Berbasis SMS Imam Asrowardi; Eko Subyantoro; Tri Sandhika Jaya
Jurnal Ilmiah ESAI Vol 4 No 1 (2010)
Publisher : Politeknik Negeri Lampung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25181/esai.v4i1.1333

Abstract

General election is one of democracy party in Indonesia. Recently, local election also applies direct voting by the people. Quick count method was developed by using sampling data as comparison to find out the result of local elections rapidly. SMS can be used to deliver data directly to a computerized system so that the voting data with quick count method would be accumulated faster and presented automatically by the system. Besides, quick count data collection with SMS will also expand the processed data sampling. Keyword: SMS system, quick count, system, Automatic
Sistem Informasi Pajak Pph Pasal 21 Berbasis Sms Gateway Menggunakan Teknologi J2SE Imam Asrowardi; Halim Fathoni; Septafiansyah Dwi Putra
Jurnal Ilmiah ESAI Vol 4 No 3 (2010)
Publisher : Politeknik Negeri Lampung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25181/esai.v4i3.1346

Abstract

Sistem informasi pajak penghasilan yang masih berjalan masih menggunkan sistem yang manual yaitu dengan melalui telepon atau surat pos. Sehingga membutuhkan waktu yang cukup lama dan biaya yang tinggi untuk mengetahui besarnya pajak penghasilan suatu wajib pajak.  Untuk membantu menyelesaikan permasalahan tersebut,  maka dibuat sebuah program aplikasi yang dapat membantu permasalahan tersebut. Metode pelaksanaan yang digunakan dalam percobaan ini adalah studi kelayakan, desain basis data, pemrograman, pengujian, dan dokumentasi.  Berdasarkan pada hasil pengujian yang telah dilakukan yaitu pengujian dengan 12 sample yang diuji terdapat hanya satu kegagalan uji. Sehingga dapat dikatakan sistem ini dapat memenuhi kebutuhan wajib pajak dan layak untuk diimplementasikan.Keyword : sistem, pajak