Nuruzzaman, Muhammad Taufiq
Unknown Affiliation

Published : 10 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 10 Documents
Search

Data Search Process Optimization using Brute Force and Genetic Algorithm Hybrid Method Riwanto, Yudha; Nuruzzaman, Muhammad Taufiq; Uyun, Shofwatul; Sugiantoro, Bambang
IJID (International Journal on Informatics for Development) Vol. 11 No. 2 (2022): IJID December
Publisher : Faculty of Science and Technology, UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/ijid.2022.3743

Abstract

High accuracy and speed in data search, which are aims at finding the best solution to a problem, are essential. This study examines the brute force method, genetic algorithm, and two proposed algorithms which are the development of the brute force algorithm and genetic algorithm, namely Multiple Crossover Genetic, and Genetics with increments values. Brute force is a method with a direct approach to solving a problem based on the formulation of the problem and the definition of the concepts involved. A genetic algorithm is a search algorithm that uses genetic evolution that occurs in living things as its basis. This research selected the case of determining the pin series by looking for a match between the target and the search result. To test the suitability of the method, 100-time tests were conducted for each algorithm. The results of this study indicated that brute force has the highest average generation rate of 737146.3469 and an average time of 1960.4296, and the latter algorithm gets the best score with an average generation rate of 36.78 and an average time of 0.0642.
Evaluation of the Maturity Level of Information Technology Security Systems Using KAMI Index Version 4.2 (Case Study: Islamic Boarding Schools in Yogyakarta Special Region Province) Arromdoni, Bad’ul Hilmi; Nuruzzaman, Muhammad Taufiq; 'Uyun, Shofwatul; Sugiantoro, Bambang
IJID (International Journal on Informatics for Development) Vol. 12 No. 1 (2023): IJID June
Publisher : Faculty of Science and Technology, UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/ijid.2023.3987

Abstract

The development of information technology worldwide has changed very rapidly. There has been a data theft on the information system belonging to one of the most prominent Islamic Boarding Schools in the Yogyakarta area. Thus, special attention is needed to evaluate information technology security using the Information Security Index version 4.2. The research methods include extracting information, literature study, data collection, data validation, data analysis, and recommendations. The evaluation results are at the basic framework fulfilment level with a value of 343; the electronic system category has a low status with a value of 15 and 5 improvements; the governance category,  the risk management category,  the framework category,  the asset management category, and the information security technology category, have a maturity level II status with 12, five, eight, four, and eight recommendations respectively, while the supplement category for third party security areas with a value of 60%, securing cloud infrastructure services 56% and protecting personal data 61% with 14 recommendations.
Evaluation of IT Governance at Islamic Boarding Schools in the Special Region of Yogyakarta based on the COBIT 5 Framework Mardlian, M. Sa’id Abdurrohman Kunta; Nuruzzaman, Muhammad Taufiq; 'Uyun, Shofwatul; Sugiantoro, Bambang
IJID (International Journal on Informatics for Development) Vol. 11 No. 2 (2022): IJID December
Publisher : Faculty of Science and Technology, UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/ijid.2022.3988

Abstract

Nowdays,  almost all aspects of company operations are supported by information technology systems.  Many pesantren have utilized information technology in supporting operational activities such as: using computers, accessing the internet, having a website, and managing information technology systems. The purpose of this study is to implement the COBIT 5 framework in the DSS (Deliver, Service, Support) domain in evaluating information technology governance and calculate the capability level value and gap analysis at Islamic Boarding Schools. The results of the Capability Level Analysis in the COBIT 5 DSS Domain obtained from 42 Islamic Boarding Schools showed that DSS01, DSS02, and DSS03 on average were at level 2, DSS04, DSS05, DSS06 on average at level 1. The results of the Gap Analysis in the COBIT 5 DSS Domain show that in DSS01, DSS02, and DSS03 the average GAP is 3, in DSS04, DSS05, and DSS06 the average GAP is 4. The result shows that Information Technology Governance in Islamic Boarding Schools in the Special Region of Yogyakarta based on an assessment with the COBIT 5 Framework is still low status and needs to be improved, as evidenced by the low Capability Level Value and the high GAP Value.
Analysis of Factors Affecting the Students’ Acceptance Level of E-Commerce Applications in Yogyakarta Using Modified UTAUT 2 Candra, Dori Gusti Alex; Nuruzzaman, Muhammad Taufiq; 'Uyun, Shofwatul; Sugiantoro, Bambang; Pratiwi, Millati
IJID (International Journal on Informatics for Development) Vol. 12 No. 1 (2023): IJID June
Publisher : Faculty of Science and Technology, UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/ijid.2023.3990

Abstract

Yogyakarta is listed as the region with the highest number of residents engaging in e-commerce transactions. A total of 10.2% of the population are active e-commerce sellers, while 16.7% belong to the buyer category. Research by IDN Times showed that e-commerce application users have been dominated by students, with a percentage of 44.2%.  The purpose of this study is to analyze the factors that influence students’ level of acceptance of e-commerce applications in Yogyakarta using the modified UTAUT 2. This is quantitative research with multiple linear regression models using SPSS software version 25 with a sample size of 303 people. Data analysis in this study was conducted in a few steps, including descriptive analysis, validity test, reliability test, classical assumption test and hypothesis testing. The results of this study indicate that the student’s level of acceptance of e-commerce applications is within good criteria. The variables that have a positive effect on the behaviour intention (BI) are performance expectancy (PE), effort expectancy (EE), social influence (SI), facilitating conditions (FC), hedonic motivation (HM), habit (HB), price value (PV), perceived risk (PR), perceived security (PS), and trust (TR) are variables that negatively affect the variable behaviour intention (BI). All independent variables affect the dependent variable or behaviour intention (BI) with a total of 63.3% and the difference with a total of 36.7% is caused by other factors not examined by the researcher.
Comparison of K-Nearest Neighbor, Support Vector Machine, Random Forest, and C 4.5 Algorithms on Indoor Positioning System Astari, M Rizky; Nuruzzaman, Muhammad Taufiq; Sugiantoro, Bambang
IJID (International Journal on Informatics for Development) Vol. 12 No. 1 (2023): IJID June
Publisher : Faculty of Science and Technology, UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/ijid.2023.3991

Abstract

Today’s most common Positioning System applied is the Global Positioning System (GPS). Positioning System is considered accurate when outdoors, but it becomes a problem when indoors making it difficult to read the GPS signal. Many academics are actively working on indoor positioning solutions to address GPS's drawbacks. Because WiFi Access Point signals are frequently employed in multiple studies, they are used as research material. This study compares the classification algorithms KNN, SVM, Random Forest, and C 4.5 to see which algorithm provides more accurate calculations. The fingerprinting method was employed in the process of collecting signal strength data in each room of the Terpadu Laboratory Building at UIN Sunan Kalijaga using 30 rooms and a total dataset of 5,977 data. The data is utilized to run experiments to determine the location using various methods. According to the experimental data, the Random Forest algorithm achieves an accuracy rate of 83%, C4.5 81%, and KNN 80%, while the SVM method achieves the lowest accuracy rate of 57%.
Evaluasi Keamanan Sistem Informasi Dengan Indeks KAMI Dan COBIT 5 Di Pesantren Habibullah, Ricky; Nuruzzaman, Muhammad Taufiq; Mulyanto, Agus
Cyber Security dan Forensik Digital Vol. 7 No. 2 (2024): Edisi November 2024
Publisher : Fakultas Sains dan Teknologi UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/csecurity.2024.7.2.4576

Abstract

Penelitian ini bertujuan untuk mengevaluasi keamanan sistem informasi di pondok pesantren se-Kabupaten Jombang dengan menggunakan Indeks KAMI dan kerangka kerja COBIT 5. Sampel penelitian mencakup 10 pesantren yang dipilih secara purposive sampling, mewakili dari total populasi sebanyak 210 pesantren. Evaluasi dilakukan dengan mengumpulkan data melalui kuesioner yang mengukur tingkat kapabilitas pada enam domain utama COBIT 5, yaitu DSS01 (Mengelola Operasi), DSS02 (Mengelola Permintaan Layanan dan Insiden), DSS03 (Mengelola Masalah), DSS04 (Mengelola Keberlanjutan), DSS05 (Mengelola Layanan Keamanan), dan DSS06 (Mengelola Kontrol Proses Bisnis). Analisis menunjukkan bahwa sebagian besar pesantren berada pada Level 2 kapabilitas, yang mencerminkan implementasi praktik dasar keamanan informasi, namun belum optimal. Analisis Indeks KAMI mengungkapkan bahwa hanya sedikit pesantren yang memenuhi validitas Tingkat III, dengan mayoritas pesantren berada pada Tingkat II, menunjukkan perlunya perbaikan dalam tata kelola keamanan informasi. Temuan penelitian ini menegaskan pentingnya penguatan manajemen keamanan informasi melalui pelatihan, pengembangan kebijakan yang komprehensif, dan penerapan teknologi yang lebih canggih untuk memastikan integritas, kerahasiaan, dan ketersediaan data dalam mendukung operasional pendidikan. Kata kunci: Keamanan Informasi, Indeks KAMI, COBIT 5, Pondok Pesantren, Evaluasi Sistem. ----------------------------------- Abstract This study aims to evaluate the information system security in pondok pesantren across Jombang Regency using the KAMI Index and the COBIT 5 framework. The study sample consisted of 10 pesantren selected through purposive sampling, representing 10% of the total population of 210 pesantren. The evaluation was conducted by collecting data through questionnaires that assessed capability levels across six main domains of COBIT 5, namely DSS01 (Manage Operations), DSS02 (Manage Service Requests and Incidents), DSS03 (Manage Problems), DSS04 (Manage Continuity), DSS05 (Manage Security Services), and DSS06 (Manage Business Process Controls). The analysis revealed that most pesantren were at Capability Level 2, indicating the implementation of basic information security practices, though not yet optimal. The KAMI Index analysis showed that only a few pesantren met the validity criteria for Level III, with the majority positioned at Level II, highlighting the need for improvements in information security governance. These findings underscore the importance of strengthening information security management through training, comprehensive policy development, and the adoption of advanced technologies to ensure data integrity, confidentiality, and availability in supporting educational operations. Keywords: Information Security, KAMI Index, COBIT 5, Pondok Pesantren, System Evaluation
An Efficient Journal Articles Searching using Vector Space Model Algorithm Alvriyanto, Azis; Nuruzzaman, Muhammad Taufiq; Siregar, Maria Ulfah; Hidayat, Rahmat
IJID (International Journal on Informatics for Development) Vol. 9 No. 1 (2020): IJID June
Publisher : Faculty of Science and Technology, UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/ijid.2020.09104

Abstract

One of the main feature of digital library is a search engine which depends on keywords submitted by a user. However, in the traditional algorithm, the computation performance, searching speed, significantly relies on the number of journal articles stored in the databases. Some irrelevant search results also increase the speed of article searching process. To solve the problem, in this paper we propose vector space model (VSM) algorithm to search for relevant journal articles. The VSM algorithm considers a term frequency - inversed document frequency (TF-IDF). The VSM algorithm will be compared to the baseline algorithm namely traditional algorithm. Both algorithms will be evaluated using combination of keywords which can be a synonym, phrase, error typography, or suffix and prefix. By using the data consist of 635 journal articles, both algorithms are compared in terms of 11 evaluation criteria. The results show that VSM algorithm is able to obtain the intended journal at 5th rank on average as compared to the traditional algorithm which can obtain the intended journal at rank of 171st on average. Therefore, our proposed algorithm can improve the performance to accurately sort the journal articles based on the submitted keywords as compared to traditional algorithm.   
Factors Influencing 5G Adoption in Java: A Theory of Consumption Value and Stimulus-Organism-Response Approach Kesumahadi, Lisdianto Dwi; Nuruzzaman, Muhammad Taufiq; Sugiantoro, Bambang; Sumarsono , Sumarsono
Jurnal Ilmiah Teknik Elektro Komputer dan Informatika Vol. 11 No. 1 (2025): March
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26555/jiteki.v11i1.30557

Abstract

The rapid advancement of information and communication technology has led to a significant transformation in telecommunication networks, particularly with the introduction of 5G technology, which offers high speed, low latency, and extensive device connectivity. However, the adoption of 5G in Indonesia, particularly in Java, remains challenging due to unequal network distribution and disparities in purchasing power between urban and rural areas. This study examines the key factors influencing consumer acceptance of 5G services in Java using the Theory of Consumption Value (TCV) and Stimulus-Organism-Response (SOR) framework. A descriptive quantitative approach was applied, collecting primary data from 200 respondents through purposive sampling. Data were analyzed using Partial Least Squares Structural Equation Modeling (PLS-SEM). The findings reveal that Safety Affordance and Facilitation Conditions significantly influence consumption value, whereas Visibility Affordance and Guidance Affordance do not. These results highlight the importance of security perceptions and supporting infrastructure in 5G adoption. This study contributes to the theoretical understanding of technology adoption by integrating TCV and SOR in the context of 5G and provides practical recommendations for policymakers and service providers to enhance 5G implementation, particularly by addressing infrastructure gaps in rural areas.
Kesiapan Aparatur Sipil Negara (ASN) Terhadap Implementasi UU Pelindungan Data Pribadi (UU PDP): The Readiness of Civil Servants (ASN) for the Implementation of the Personal Data Protection Act (PDP Act) Nuruzzaman, Muhammad Taufiq; Wirawan, Adi; Muslimah, Ulfa Septi; Setyono, Yoga
Cyber Security dan Forensik Digital Vol. 8 No. 1 (2025): Edisi Mei 2025
Publisher : Fakultas Sains dan Teknologi UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/csecurity.2025.8.1.4999

Abstract

Undang-undang Pelindungan Data Pribadi (UU PDP) telah disahkan oleh DPR pada 17 Oktober 2022 lalu menjadi UU No 27 Tahun 2022 tentang Pelindungan Data Pribadi. Salah satu pasalnya menyebutkan bahwa UU ini akan mulai berlaku 2 tahun setelah diundangkan yaitu 17 Oktober 2024. Artinya, semenjak UU ini berlaku pada Oktober 2024 nanti, maka sanksi-sanksi terhadap pelanggaran UU ini juga akan berlaku. Mengingat status tersebut maka sudah selayaknya untuk UIN Sunan Kalijaga memperhatikan dengan baik implementasi UU PDP tersebut. Pada penelitian ini, pengetahuan dan persiapan para ASN di UIN Sunan Kalijaga akan disurvei dan dievaluasi. Dari sisi persiapan, afeksi ASN terhadap implementasi ini akan ditanyakan. Dari total ASN sebanyak 1009 orang, ada 152 responden yang menjawab dengan lengkap. Survei dilakukan pada November dan Desember 2024. Hasil dari survei menunjukkan bahwa secara umum responden dalam hal ini adalah ASN di UIN Sunan Kalijaga sudah cukup memahami tentang keberadaan dan konsekuensi dari UU PDP ini. Akan tetapi, mereka juga banyak yang menyatakan bahwa UIN Sunan Kalijaga sebagai institusi belum siap untuk menghadapi konsekuensinya. Oleh karena itu, perlu dilakukan sosialisasi ulang dan penambahan infrastruktur keamanan informasi agar tidak terkena jerat pidana maupun perdata di kemudian hari. Analisis data juga menunjukkan bahwa tidak ada perbedaan pengetahuan dan afeksi untuk beberapa kelompok responden sehingga kegiatan-kegiatan terkait implementasi UU PDP harus melibatkan semua pihak dan semua level jabatan. Kata kunci: Personal Data Protection Act, UIN Sunan Kalijaga, Information Security ------------------------------- Abstract The Personal Data Protection Act (PDP Act) was enacted by the Indonesian House of Representatives on October 17, 2022, becoming Law No. 27 of 2022 on Personal Data Protection. One of its articles states that the law will take effect two years after its promulgation, specifically on October 17, 2024. This means that starting from October 2024, the sanctions for violations of this law will also come into force. Given this status, it is imperative for UIN Sunan Kalijaga to carefully consider the implementation of the PDP Act. In this study, the knowledge and preparedness of civil servants (ASN) at UIN Sunan Kalijaga were surveyed and evaluated. Regarding preparedness, the affective response of the civil servants toward the implementation of this law was assessed. Out of a total of 1,009 civil servants, 152 respondents provided complete responses. The survey was conducted in November and December 2024. The results of the survey indicate that, in general, the respondents, who in this case are civil servants at UIN Sunan Kalijaga, have a reasonable understanding of the existence and implications of the PDP Act. However, many also expressed that UIN Sunan Kalijaga as an institution is not yet prepared to face its consequences. Therefore, further dissemination and the enhancement of information security infrastructure are necessary to avoid criminal or civil liabilities in the future. Data analysis also shows that there is no significant difference in knowledge or affective response across various groups of respondents. Hence, activities related to the implementation of the PDP Act must involve all parties and all levels of positions within the institution. Keywords: Personal Data Protection Act, UIN Sunan Kalijaga, Information Security
Performance Evaluation of Vehicular Ad Hoc Networks Considering Malicious Node Impact on Quality of Services Metrics Alfarizi, Naufal Faiz; Nuruzzaman, Muhammad Taufiq; Uyun, Shofwatul; Sugiantoro, Bambang; Abdullah, Mohd. Fikri Azli bin
JOIN (Jurnal Online Informatika) Vol 10 No 2 (2025)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15575/join.v10i2.1568

Abstract

Vehicular Ad Hoc Networks (VANETs), a subset of mobile ad hoc networks (MANETs), is essential for enabling communication between vehicles in intelligent transportation systems. However, their dynamic and decentralized nature exposes them to significant security threats, particularly from malicious nodes. Attacks such as black holes and wormholes can severely degrade network performance by causing packet loss and increasing end-to-end delays. This paper aims to evaluate the impact of malicious node behavior on VANET performance using key Quality of Service (QoS) parameters, including throughput, end-to-end delay, jitter, packet delivery ratio (PDR), and packet loss ratio (PLR). The specific objective is to analyze how black hole and wormhole attacks affect communication efficiency in VANET environments. The main contribution of this work lies in the integration of Simulation of Urban Mobility (SUMO) for realistic traffic scenario generation with Network Simulator 3 (NS-3) for detailed network performance evaluation. This approach enables comprehensive simulation of VANET behavior under attack conditions. The findings provide valuable insights into the vulnerabilities of VANETs and form a basis for the design of more robust and secure vehicular communication systems.