Claim Missing Document
Check
Articles

Found 2 Documents
Search
Journal : Jurnal INSYPRO (Information System and Processing)

Evaluasi Kebergunaan Aplikasi Pemesanan Makanan Cepat Saji dengan System Usability Scale Fadlan, Muhammad; Julius
Jurnal INSYPRO (Information System and Processing) Vol 8 No 2 (2023)
Publisher : Prodi Sistem Informasi UIN Alauddin

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24252/insypro.v8i2.42312

Abstract

Fast food ordering apps have become an important element in the digital transformation of the food industry. The success of a food ordering application is not only determined by its functionality and features, but also by its level of usability. Usability evaluation is a key aspect in understanding the extent to which an application meets user needs and expectations. In order to increase user satisfaction with application use, this research aims to test the usability of a fast food ordering application using the System Usability Scale (SUS) approach. One of the important elements in this research is filling out a questionnaire carried out by respondents regarding the level of usefulness of the food ordering application. The research results show that the level of usefulness is at a SUS score of 83.08 which is included in the "Excellent" category in terms of Adjective Rating.
STUDI PERBANDINGAN AVALANCHE EFFECT PADA ALGORITMA KRIPTOGRAFI TRANSPOSISI UNTUK MENINGKATKAN KEAMANAN DATA Noviyantono, Endyk; Fadlan, Muhammad; Muhammad; Suprianto
Jurnal INSYPRO (Information System and Processing) Vol 9 No 1 (2024)
Publisher : Prodi Sistem Informasi UIN Alauddin

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24252/insypro.v9i1.46509

Abstract

Various cryptographic techniques have been used as a solution to maintain data security, one of which is the transposition technique which is included in the classic type of cryptography. This research aims to conduct a comparative study of two classic transposition techniques, namely Route Transposition and Rail Fence Transposition. Apart from that, this research aims to find out whether various classical transposition techniques are still relevant in the process of securing data in the current cyber era. In this research, comparative analysis was carried out based on the Avalanche Effect (AE) value. The research results show that the route transposition technique has the highest value compared to the rail fence transposition technique. However, based on the minimum standard AE value, it shows that the two techniques are still in a position below the minimum AE value, namely below 50%.