p-Index From 2021 - 2026
11.304
P-Index
This Author published in this journals
All Journal Jurnal EECCIS Jurnal Informatika dan Teknik Elektro Terapan Jurnal Ilmiah FIFO JURNAL MEDIA INFORMATIKA BUDIDARMA MATRIK : Jurnal Manajemen, Teknik Informatika, dan Rekayasa Komputer The IJICS (International Journal of Informatics and Computer Science) JURIKOM (Jurnal Riset Komputer) Building of Informatics, Technology and Science Jurnal Manajemen Informatika dan Sistem Informasi Jurnal Informatika dan Rekayasa Elektronik Zonasi: Jurnal Sistem Informasi Jurnal Teknologi Informasi, Komputer, dan Aplikasinya (JTIKA ) JISA (Jurnal Informatika dan Sains) Jurnal Abdi Insani JOURNAL OF INFORMATION SYSTEM RESEARCH (JOSH) Journal of Computer System and Informatics (JoSYC) Jurnal Sistem Komputer dan Informatika (JSON) Infotek : Jurnal Informatika dan Teknologi RESOLUSI : REKAYASA TEKNIK INFORMATIKA DAN INFORMASI Bulletin of Computer Science Research Journal of Informatics Management and Information Technology KLIK: Kajian Ilmiah Informatika dan Komputer JUTECH : Journal Education and Technology BEES: Bulletin of Electrical and Electronics Engineering Jurnal Ilmiah Teknik Mesin, Elektro dan Komputer (JURITEK) Jurnal Teknik Informatika dan Elektro (JURTIE) Jurnal Informatika Teknologi dan Sains (Jinteks) Jurnal Pengabdian Masyarakat Bidang Sains dan Teknologi Teknik: Jurnal Teknik Mesin, Elektro dan Ilmu Komputer Journal of Artificial Intelligence and Digital Business Innovative: Journal Of Social Science Research ETIK (Jurnal Elektronika Terapan dan Ilmu Komputer) Journal of Research and Publication Innovation Jurnal Pengabdian Bersama Masyarakat Indonesia KOPEMAS JPEMAS: Jurnal Pengabdian Kepada Masyarakat Pekayunan
Claim Missing Document
Check
Articles

MANAJEMEN RISIKO KEAMANAN ASET TEKNOLOGI INFORMASI MENGGUNAKAN ISO 31000:2018 PADA KANTOR LURAH PRAPEN Trisnadi, Yudi; Zaen, Mohammad Taufan Asri; Bagye, Wire
Jurnal Informatika Teknologi dan Sains (Jinteks) Vol 7 No 4 (2025): EDISI 26
Publisher : Program Studi Informatika Universitas Teknologi Sumbawa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51401/jinteks.v7i4.6007

Abstract

Kantor Lurah Prapen merupakan salah satu instansi pemerintah dalam penyelenggaraan administrasi dan pelayanan masyarakat. Dimana, Kantor Lurah Prapen menghadapi keterbatasan dalam sumber daya TI dan pengelolaan risiko yang belum optimal, terdapat potensi kebocoran data akibat kurangnya sistem keamanan yang memadai, rendahnya kesadaran pegawai terhadap ancaman keamanan TI seperti malware atau phishing, serta belum adanya kebijakan keamanan TI yang terstruktur. Framework ISO 31000 dapat membantu organisasi dalam mengidentifikasi, menganalisis, serta memberikan rekomendasi pengelolaan terhadap risiko sehingga lebih efektif. Berdasarkan hasil identifikasi risiko ditemukan 30 risiko yang mungkin dapat terjadi. Analisa dan evaluasi tingkat risiko di bagi menjadi 3 level yaitu High, Medium dan Low. Berdasarkan hasil evaluasi deiketahui 3 risiko berada pada level High yang berarti risiko membutuhkan penangnan secepat mungkin, 18 risiko pada level medium yang berarti risiko membutuhkan penanganan dan 9 risiko level Low dimana risiko dapat dihindari atau diatasi oleh kantor Kelurahan Prapen. Berdasarkan hasil penelitian diharapkan kantor lurah prapen dapat menangani risiko yang memiliki level High dengan cepat dimana risiko tersebut dapat menyebabkan kerugian yang cukup besar dan dapat menghambat proses bisnis kantor lurah Prapen. Adapun risiko yang berada pada level Medium dapat dilakukan penanganan serta mitigasi, sehingga dapat mengurangi tingkat kerugian dan dampak dari risiko tersebut.
EVALUASI PENERAPAN E-PUSKESMAS MENGGUNAKAN METODE HOT-FIT Suharjo, Darji Darmo; Zaen, Mohammad Taufan Asri; Saikin
Jurnal Informatika Teknologi dan Sains (Jinteks) Vol 7 No 4 (2025): EDISI 26
Publisher : Program Studi Informatika Universitas Teknologi Sumbawa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51401/jinteks.v7i4.6192

Abstract

e-Puskesmas merupakan sistem informasi kesehatan yang merupakan hasil kerjasama antara Puskesmas dan PT. Infokes Indonesia, dan telah diterapkan di 29 puskesmas di kabupaten Lombok Tengah. e-Puskesmas memiliki fitur yang beragam dan sangat membantu dalam melakukan pelayanan dan mencatat hasil pemeriksaan pasien. Namun pada Puskesmas Sengkol sering terjadi beberapa kendala diantaranya seperti masalah jaringan, kurangnya perangkat serta pengguna yang masih kurang dalam memahami penggunaan sistem. Maka dari itu perlu dilakukan sebuah evaluasi terhadap penerapan sistem e-Puskesmas menggunakan model HOT-Fit, yang terdiri dari 4 variabel yaitu Human, Organization, Technology dan Net Benefit, untuk mengetahui faktor apa saja yang berpengaruh secara signifikan terhadap penggunaan e-Puskesmas di puskesmas sengkol. Pada penelitian ini ditemukan 15 hipotesis, 4 hipotesis ditolak dan 11 hipotesis diterima, kemudian terdapat 2 indikator yang berpengaruh secara negatif terhadap variabel lingkungan, organisasi, dan manfaat. Namun di luar itu variabel System Quality, Information Quality, Service Quality, berpengaruh positif dan secara bersama-sama berpengaruh terhadap Variabel System Use, User Statisfaction, Structure. dan Variabel System Use, User Statisfaction, dan Structure secara bersama-sama berpengaruh terhadap variabel Net Benefit.
ANALISIS KEAMANAN JARINGAN KOMPUTER PADA PERANGKAT LAYER 2 DAN LAYER 3 Yuliadi, Yuliadi; Tantoni, Ahmad; Zaen, Mohammad Taufan Asri
Jurnal Informatika Teknologi dan Sains (Jinteks) Vol 7 No 4 (2025): EDISI 26
Publisher : Program Studi Informatika Universitas Teknologi Sumbawa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51401/jinteks.v7i4.6731

Abstract

Pada Layer 2 Data Link Layer, perangkat seperti access point dan switch rentan terkena ancaman serangan dari internal seperti MAC flooding, VLAN hopping dan ARP spoofing yang dapat menyebabkan penyusupan data. Sedangkan pada Layer 3 Network Layer terdapat perangkat router rentan terhadap serangan seperti DoS/DDoS, IP spoofing, serta pemanipulasian routing table yang dapat mengganggu konektivitas antarjaringan sehingga attacker dapat mengalihkan lalu lintas ke pihak yang tidak sah. Berbagai teknik mitigasi untuk mengatasi ancaman pada layer 2 dan layer 3 ini telah dikembangkan untuk mengatasi ancaman tersebut, seperti penerapan Firewall, Dynamic ARP Inspection, Port Security, Access Control List (ACL) dan IPSec. Akan tetapi, dalam pengimplementasi keamanan ini masih ada yang kurang tepat dan belum optimal sehingga sering kali masih menyisakan celah keamanan yang dapat dimanfaatkan oleh attacker untuk melakukan serangan.Berdasarkan kondisi tersebut, diperlukan analisis mendalam mengenai keamanan infrastruktur hadware jaringan komputer pada perangkat Layer 2 dan Layer 3 untuk mengidentifikasi potensi ancaman serta penerapan mekanisme keamanan. Analisis ini diharapkan dapat menjadi referensi dalam meningkatkan keamanan jaringan serta mendukung terciptanya infrastruktur digital yang dapat di handalkan dan keamanan yang tinggi.
DDoS ATTACK MITIGATION WITH INTRUSION DETECTION SYSTEM (IDS) USING TELEGRAM BOTS Zaen, Mohammad Taufan Asri; Tantoni, Ahmad; Ashari, Maulana
JISA(Jurnal Informatika dan Sains) Vol 4, No 2 (2021): JISA(Jurnal Informatika dan Sains)
Publisher : Universitas Trilogi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31326/jisa.v4i2.1043

Abstract

 In the current IS/IT era, service to consumers is an absolute must to be prepared to survive in business competition. Physical and logical attacks with the aim of disrupting information technology services for individuals/agencies/companies or reducing the performance of IS/IT used. The development of IoT in the industrial revolution 4.0, which is all online, is a challenge in itself, from a negative point of view, all of them are able to carry out attacks on ISP servers, often carried out by hackers. DDoS (Distributed Denial of Service) attacks are the most common attacks. The development of software for DDoS attacks is very much on the internet, including UDP Unicorn software to attack very easily and can be done by anyone. Software for real-time monitoring of DDoS attacks, one of which is the Telegram bot. Telegram is a messaging system centered on security and confidentiality, while bots are computer programs that do certain jobs automatically. Telegram bot is free, lightweight and multiplatform. In the case study, this research contains 10 access points to the internet that will be mitigated from DDoS attacks. In this study, it was found that DDoS attacks caused traffic to become very high/congested by fulfilling upload traffic so that legitimate traffic users could not access the internet, connection to the internet was slow, the traffic was also unnatural, making it unable to connect to wireless devices and making Mikrotik  login page becomes unable to appear. The purpose of this study is to mitigate DDoS attacks with the help of telegram bots so as to facilitate the notification of DDoS attacks in the event of an attack so that it is fast to deal with and find the perpetrators of the attack. The conclusion of this study is that DDoS attacks using UDP unicorn software resulted in a traffic spike of 53.5 Mbps on the upload traffic side, causing traffic for legitimate/authenticated users to slow down. By using telegram bots to know DDoS attacks occur in real time with a success rate of attack detection up to 100% notifications on telegram bots. Mitigation of DDoS attacks takes steps to track users using the torch feature on the routerboard interface menu, trace internet connection lines using wired or wireless transmission media, and ensure always monitoring the proxy interface from winbox. 
Penggunaan Metode Techique for Order Preference by Similarity to Ideal Solution (TOPSIS) untuk Evaluasi Kinerja Dosen oleh Mahasiswa (Studi Kasus: STMIK Lombok) Fadli, Sofiansyah; Zaen, Mohammad Taufan Asri
JISA(Jurnal Informatika dan Sains) Vol 1, No 1 (2018): JISA(Jurnal Informatika dan Sains)
Publisher : Universitas Trilogi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31326/jisa.v1i1.295

Abstract

In general the lecturers performance evaluation is a routinity of a College institute for improving internal quality on an ongoing basis as well as the improvement of the status of accreditation. Performance evaluation activities specifically lecturer at STMIK Lombok funded on each period, that is the end of each semester, the lecturers assessment process performed by the students. The results of this performance assessment will be use to improve the performance of evaluation material and any lecturer who was elected as a lecturer with the best performance will be given the award. To assist in the assessment process, a system that capable to support the decision of the performance assessment of lecturers needed. The purpose of this research is to evaluate the performance of Lecturers by students at STMIK Lombok. The decision-making process aided by a computerized decision support system in expectation that subjectivity in decision-making can be minimised. Decision support systems can be used as a tool for evaluating the performance of the lecturers, so hopefully it can help the policy makers in decision-making, to get objective information about the performance of lecturers based on specified criteria.
Application of the DeLone and McLean Success Model to the SEMAIK Website: A Case Study in Central Lombok Rozi, Fatrul; Fadli, Sofiansyah; Zaen, Mohammad Taufan Asri
JISA(Jurnal Informatika dan Sains) Vol 8, No 2 (2025): JISA(Jurnal Informatika dan Sains)
Publisher : Universitas Trilogi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31326/jisa.v8i2.2554

Abstract

 In In the digital age, the use of information technology in public services, including population administration, is crucial. To facilitate access to online population services, the Population and Civil Registration Office of Central Lombok Regency provides the SEMAIK website. Nonetheless, several issues persist, particularly in system quality and service quality. System performance often becomes unstable, with the website slowing down when many users submit service requests simultaneously, while service responsiveness is also frequently delayed. These issues highlight the need for a more comprehensive evaluation of the platform. This study aims to quantitatively assess the effectiveness of the SEMAIK website using the DeLone and McLean Information System Success Model. Data were collected through questionnaires distributed to 126 respondents and analyzed using the SEM-PLS approach. The findings indicate that information quality positively influences system use but does not significantly affect user satisfaction. Meanwhile, service quality, system quality, and system use all show positive effects on user satisfaction. Additionally, although system use does not significantly contribute to net benefits, user satisfaction demonstrates a strong positive effect on net benefits. The model also meets the criteria for good model fit based on the goodness-of-fit assessment. However, the results suggest that aspects related to information quality and system use require improvement, as their effects on user satisfaction and net benefits are not yet optimal. These findings provide concrete recommendations for enhancing the SEMAIK website to ensure more effective and reliable digital public services.
Application of Information Gain to Select Attributes in Improving Naïve Bayes Accuracy in Predicting Customer's Payment Capability Herfandi, Herfandi; Zaen, Mohammad Taufan Asri; Yuliadi, Yuliadi; Julkarnain, M.; Hamdani, Fahri
JISA(Jurnal Informatika dan Sains) Vol 4, No 2 (2021): JISA(Jurnal Informatika dan Sains)
Publisher : Universitas Trilogi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31326/jisa.v4i2.1044

Abstract

The customer is the main factor in the running of PT. XYZ. A good understanding of customers is very important for predicting the capability of customers to pay. The implementation of credit collectibility is used to determine the quality of customer credit, one of which is the customer's capability to pay interest and principal on time. While manually, it is very difficult to accurately predict the capability of customer credit payments. Data mining techniques with the Naïve Bayes algorithm were chosen to classify customers to be able to find patterns, analyze and predict, because they have good performance, are efficient, and simple. The Naïve Bayes algorithm has a weakness in terms of sensitivity to many attributes, so the accuracy is low. Based on the problem stated, his study will apply the Information Gain method to select the most influential attribute on the label in order to increase the accuracy of the Naïve Bayes algorithm. This research produces a new dataset with seven attributes: TENOR, SALARY, DOWN PAYMENT, INSTALLMENT, APPROVAL, OTR CLASS, AGE with Labels: Status and Id: Id number based on the Information Gain method. The dataset comparison process with 995 data records showed an increase in accuracy, precision, and AUC using the new dataset compared to the old dataset, but in the t-Test test with an alpha value = 0.05 there is a difference but not significant. In the evaluation process, performance experienced a significant increase in the use of new datasets with the following percentages of performance improvement: accuracy = 8%, precision = 18.42%, recall = 17.65% and AUC= 0.057%. The results of this study obtained AUC of 0.876, accuracy of 87.88%, precision of 61.90%, and recall of 76.47%, and classified into good classification. 
Prototipe Alat Kirim Pesan Singkat Tindak Kejahatan sebagai Solusi Peningkatan Keamanan Berbasis Lokasi Wire Bagye; Maulana Ashari; Mohammad Taufan Asri Zaen
MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer Vol. 19 No. 1 (2019)
Publisher : Universitas Bumigora

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/matrik.v19i1.491

Abstract

Very rarely the crime can be done early help or handled by the security forces while the perpetrators are still at the scene of the crime. The effort to get help from crime by reporting to the police requires a relatively long time, which is between 30 minutes to 2 hours. To reduce the number of criminal acts and early relief efforts, a tool to send short messages of crime was developed. Development of tools implements the Arduino Uno R3 microcontroller as the main component for program storage. Location coordinates are obtained from the Ubox 160n GPS module. Short messages containing biodata and location coordinates will be sent by the GSM SIM900L module. The destination number will receive a message that can be used to trace the location of the crime through Googlemaps. This tool equipped with a battery that can be recharged with a cell phone charger making this tool portable, practical and efficient. Using this Alat kirim pesan singkat tindak kejahahatan is very time efficient. The sending of a crime message is done in a very short time. By tapping the message directly the Googlemaps application opens and displays the location of the crime.
Analisis Dan Implementasi Jaringan Komputer Brembuk.Net Sebagai RT/RW.Net Untuk Mendukung E-Commerce Pada Desa Masbagik Utara Ahmad Tantoni; Maulana Ashari; Mohammad Taufan Asri Zaen
MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer Vol. 19 No. 2 (2020)
Publisher : Universitas Bumigora

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/matrik.v19i2.591

Abstract

One of the districts that is the central of the economy is Masbagik. The population working in the trading sector as traders in Masbagik Utara Village is almost 70%. Along with the times, buying and selling activities are not only have been done conventionally, but also through e-Commerce. E-Commerce must be supported by adequate information technology infrastructure, namely internet connection in its business processes. Based on observations in the Masbagik Utara Village, businesses using internet connections from well-known ISPs in their business activities, and this is considered to be less economical in the e-Commerce activities. Therefore, research is conducted to analyze, design and implement rt / rw.net by giving the wifi network name "brembuk.net" which is expected to help provide a choice of solutions related to internet connection that will be used by e-Commerce businesses in Masbagik Utara village. The research uses PPDIOO method (Prepare, Plan, Design, Implement, Operate, Optimize). The implementation of the brembuk.net computer network as rt / rw.net to support e-Commerce is one of the way to access cheap and stable internet and unlimited quota to access the internet in doing business for online businesses in Masbagik Utara village.
Audit Tata Kelola Teknologi Informasi Menggunakan Framework Cobit 4.1 Khairul Imtihan; Muhamad Rodi; Maulana Ashari; Mohamad Taufan Asri Zaen; Khairan Marzuki
MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer Vol. 21 No. 2 (2022)
Publisher : Universitas Bumigora

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/matrik.v21i2.1569

Abstract

Penerapaan teknologi informasi pada sebuah organisasi atau dalam proses bisnis suatu instansi adalah aset yang sangat berharga, dimana peranan teknologi informasi mampu mengubah kinerja para pekerja atau karyawan. Penerapan teknologi informasi yang signifikan ini tentu harus diimbangi dengan pengaturan dan pengelolaan yang tepat, sehingga kerugian-kerugian yang mungkin akan terjadi dapat dihindari atau diminimalisir semaksimal mungkin maka di perlukan audit. Proses audit bertujuan untuk menilai kinerja teknologi informasi pada Dinas Kependudukan dan Pencatatan Sipil Lombok Tengah menggunakan Framework COBIT 4.1 yang terdiri dari 5 tahapan yakni identifikasi business goals, identifikasi information technology (IT) goald, identifikasi information technology (IT) process, identifikasi control objectives, dan perhitungan maturity level. Hasil proses audit berupa rekomendasi dan perbaikan teknologi informasi. Berdasarkan hasil audit didapatkan hasil penerapan information technology governance, rata-rata 3. Pada maturity level ini, secara keseluruhan proses penerapan IT governance berada pada skala 3, yaitu defined prosess, merupakan tahap dimana selurus proses telah didokumentasikan melalui pelatihan serta dilaksanakan sesuai dengan metode pengembangan sistem terkomputerisasi yang baik, namun belum ada evaluasi terhadap sistem tersebut sehingga mungkin akan terjadi penyimpangan, terdapat 12 information technology process berada pada level defined prosess dan 2 berada pada level repeatable.
Co-Authors Abdul Gofur Ahmad Farijan Ahmad Tantoni Akram, Muh. Saiful Aliy Nauval Hanafi Andikasari, Devi Anitarakhmi Handaratri Apriani, Yanti Arif Maulana, Arif Asep Yunandy Ayu Lestari Baiq Daniatan Janiah Baiq Dea Zualina Baiq Sri Damanyanti Wiradarma Baiq Sri Mardiani Chaerun Hadiyan Syah Chalvin Bebby Febrianto Damanyanti Wiradarma, Baiq Sri Dedy Sofian MZ Dian Nitami Dodi Siregar Dodi Siregar EFENDI, GUNAWAN Eri Sasmita Susanto Erlin Windia Ambarsari Fadli, Sofiansyah Fahmi, Hairul Fahri Hamdani Falah Husni Fredy Windana Haerani, Kiki Hairul Fahmi Hairul Fahmi Hairul Fahmi Hamdani, Zainal Basit Hammid Muammar Robbani Al Faruq Handayani, Yudiana Tutik Hanif Priabdul Aziz Herfandi Herfandi Hifni, Hifni Husnul Khotimah Ichwan Purwata Idham Idham Indi Febriana Suhriani Istiqlal, Alamullah Julkarnaen Julkarnaen Julkarnain, M. Jumaryadi, Yuwan Khairan marzuki Khairul Imtihan Khairunnazri Khairunnisak Khalid, Syam Basri Kiki Haerani L Dita Putra LALU GALUH FIRMAN SIHABULLAH Lalu Mutawalli Leni Sefvia M. Julkarnain M. Saiful Akram Maemun Saleh Mansur Mardi Mardi Marzuki Adami Maulana Ashari Mega Tazayyun Mesran, Mesran Mirna Hidayati, Fitri Muammar Patoni Muh Nawawi Muhamad Hariadi Muhammad Fauzi Zulkarnaen Muhammad Irwan Suryadi Mulyanto, Yudi Mustakim Mustakim Musthofa Luthfi Al Manfaluty NABILA OPER Natasya, Nenti Aulia Nawassyarif Nitami, Dian Nora Dery Sofya Novita Susiana Ikhwani Piandari, Reski Pratama, Walidi Wahyu Putra, L Dita Putri, Juliyantika Ayudita Reflan Revife Purba Rizal Mahendra Rizal, Samsu Rodianto, Rodianto Rosika, Herliana Rozi, Fatrul Rusdan Rusdan Ryadi Putra Ryan Suarantalla Saepul Bahri Safira, Azzahrah Maulya Safwan Sihab Saikin Saikin Sansul Yasmi Sari, Kadek Dwijayanti Komala Septia, Laili Setiawansyah Setiawansyah Siti Fatmah Siti Patimah Az-zaen Sofiansyah Fadli Sofya, Nora Dery Sonia Sonia Sopian Sumardi Sri Agustiani Br Siburian Suharjo, Darji Darmo Suhriani, Indi Febriana Sunaryo Sunaryo Syahadatul Intihan Tantoni, Ahmad Tedi Irawan Trisnadi, Yudi Uyunun Lusiana W, Yunanri Wafiah Murniati Wahyu Ramadhan Wijono Wijono Wire Bagye Wire Bagye Yudi Pratama Yuliadi Yuliadi Yuliadi Yuliadi Yusroaini, Yusroaini Zainal Basit Hamdani Zulkhaeri, Zulkhaeri