Claim Missing Document
Check
Articles

Found 11 Documents
Search

Analisa Kepuasan Pelanggan Event Organizer XYZ menggunakan Metode Service Quality Putra, Andriyan Dwi
Jurnal Teknologi Informasi RESPATI Vol 13, No 2 (2018)
Publisher : Universitas Respati Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (216.926 KB) | DOI: 10.35842/jtir.v13i2.231

Abstract

INTISARIKepuasan adalah alat ukur yang paling konkrit untuk mengetahui tingkat kenyamanan terhadap pelayanan yang diberikan, baik pelayanan yang diberikan dari individu ke individu, maupun grup/ perusahaan ke individu, atau bisa juga dari individu ke grup/ perusahaan.  Untuk mencapai kepuasan tersebut bisa dilakukan dengan 2 pilihan, dengan proses sederhana atau dengan proses yang kompleks. Pencapaian kepuasan dilakukan agar pelanggan mendapatkan kenyamanan sesuai dengan yang diharapkan. Kompetisi antar penyedia layanan Outbound sangatlah ketat khususnya di daerah Yogyakarta, maka dari itu diperlukanlah pengukuran terhadap service atau layanan sejauh mana pelanggan merasakan kenyamanan dan kepuasan setelah menggunakan service dari penyedia layanan Event Organizer. Tujuannya tidak lain adalah dapat bersaing dengan penyedia layanan Event Organizer lain. Metode kuisioner dipilih untuk mengukur kenyamanan/ kepuasan pelanggan terhadap layanan yang diberikan oleh penyedia Layanan Event Organizer , dengan harapan hasil/ informasi yang didapatkan berupa informasi yang nyata/ real bukan berupa asumsi. Metode yang selanjutnya digunakan untuk mengukur tingkat kepuasan adalah Metode Service Quality, metode ini dirasa paling tepat untuk mengukur tingkat kepuasan pelanggan, karena metode Service Quality didalamnya mengukur kualitas layanan yaitu tangible, responsiveness, realibility, assurance dan emphaty.Kata Kunci: Kepuasan Pelanggan, Outbound, Metode Service Quality.
AUDIT KEAMANAN SISTEM INFORMASI KANTOR BAPPEDA KABUPATEN SLEMAN Putra, Andriyan Dwi; Winarno, Wing Wahyu; Huizen, Roy Rudolf
Jurnal Teknologi Informasi RESPATI Vol 10, No 30 (2015)
Publisher : Universitas Respati Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35842/jtir.v10i30.126

Abstract

ABSTRAKPencegahan dapat menghindarkan dari timbulnya kejahatan, kerugian yang besar, atau biaya yang besar dalam upaya melakukan deteksi terhadap sistem informasi yang rentan terhadap celah keamanan (security hole) sistem informasi. Untuk mengelola risiko yang mungkin terjadi terhadap sistem informasi BAPPEDA Kabupaten Sleman, perlu dilakukan audit sistem informasi dalam konteks risiko, guna mengurangi kerugian kerugian yang mungkin terjadi pada sistem informasi BAPPEDA Kabupaten Sleman. Metode OCTAVE-S digunakan dalam penelitian ini karena metode tersebut mampu mengelola risiko dan mengenali tingkat risiko yang mungkin terjadi pada sebuah sistem informasi. Dan berdasarkan analisa OCTAVE-S maka mendapatkan hasil bahwa masih ada beberapa praktek keamanan yang perlu mendapatkan perhatian khusus yaitu sistem crash dan kode berbahaya pada bagian sistem 22,67% faktor kesengajaan pada akses fisik rata- rata 21% , akses jaringan rata- rata 24,51%, dan masalah pihak ketiga pada faktor lainnya sebesar 15,17%. Dengan hasil tersebut, maka dibuatlah saran/ rekomendasi pengamanan rekomendasi/ saran pemantauan dan audit keamanan fisik, rekomendasi/ saran pengamanan sistem informasi, rekomendasi terkait akses jaringan dan kebijakan masalah pihak ketiga. Dengan harapan dapat membantu pihak BAPPEDA mengurangi tingkat resiko yang dihadapi.Kata Kunci— Audit, BAPPEDA Sleman, OCTAVE-S
Analisis Malicious Software Trojan Downloader Pada Android Menggunakan Teknik Reverse Engineering (Studi Kasus: Kamus Kesehatan v2.apk) Putra, Andriyan Dwi; Santoso, Joko Dwi; Ardiansyah, Ipung
Building of Informatics, Technology and Science (BITS) Vol 4 No 1 (2022): June 2022
Publisher : Forum Kerjasama Pendidikan Tinggi

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1094.745 KB) | DOI: 10.47065/bits.v4i1.1515

Abstract

The development of smartphone technology with the Android platform has made very rapid progress. Smartphones help and facilitate daily human work such as communicating, shopping, and financial transactions. However, because android is an open- source system, anyone can easily develop android applications that can be downloaded on the android app market. Including applications that have been inserted by malware by application developers, one of which is the Trojan downloader malware. The analysis was carried out by implementing the Trojan downloader malware infection in the health dictionary application using the reverse engineering method. Trojan downloader malware infection uses metasploit framework tools. The application will be infected with the payload created from the metasploit framework. This study will analyze the health dictionary application before and after being infected with the Trojan downloader malware using the reverse engineering method. The results of the analysis on the health dictionary application found that the difference in the size of the application was 10.17 MB, which previously was 10.05 MB. Of course, by changing the file size, the SHA256 hashing changes automatically. In the permissions section, it was found that there were only 9 permissions before being infected, but after being infected, we found 18 additional permissions, bringing the total to 27 permissions
Implementasi VPN Menggunakan Metode Point to Point Tunneling Protocol Andriani, Ria; Sa’di, Ahmad; Putra, Andriyan Dwi
Building of Informatics, Technology and Science (BITS) Vol 4 No 1 (2022): June 2022
Publisher : Forum Kerjasama Pendidikan Tinggi

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (654.653 KB) | DOI: 10.47065/bits.v4i1.1611

Abstract

The XYZ office is a government agency covering various fields, ranging from government, economy, development, people's welfare, community life development and public service affairs. However, work activities in agencies were disrupted due to the COVID-19 pandemic which caused the government to impose a Large-Scale Social Restriction (PSBB) policy to suppress the spread of this virus, resulting in agency workers having to work from home. Therefore we need an appropriate means to be able to support these activities. One of them is making a technology design by implementing a VPN on a proxy router with the PPTP (Point to Point Tunnelling Protocol) method so that it can make it easier for employees to communicate without thinking about location. In addition, users can still remotely access the local network even though they are outside the office network. more secure. Based on the results of testing the network security at the XYZ Office before using the VPN Server, it proved that the wiretapping attackers could still obtain data in the form of website login information, proxy logins, or view data contents when exchanging data. Meanwhile, when the user connects to the VPN Server, the eavesdropper cannot see the contents of the data in it, then with the implementation of a VPN with the PPTP method, employees who are working from home can connect and communicate well with each other, with that work and information exchange will become more flexible and faster
Implemantasi Autentikasi Hotspot Menggunakan Radius Server Mikrotik Router Pada Rumah Sakit Misi Lebak Gonzaga, Alexander; Putra, Andriyan Dwi
Intechno Journal : Information Technology Journal Vol. 5 No. 2 (2023): December
Publisher : Universitas Amikom Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24076/intechnojournal.2023v5i2.644

Abstract

The Lebak misi hospital area currently mostly using wireless networks where usage is increasing and bandwidth is uneven. Between one user and another and the admin only provides password protection for existing access points. which will cause instability between one user and another, therefore the author uses the Radius server as a bandwidth divider as well as security with user authentication and adding a QR code to the authentication. and the author uses the NDLC (Network Development Life Circle) method. As a reference for the radius server configuration using a proxy router. and the results obtained are the percentage of user bandwidth before using the server radius of 0.99Mbps on download and upload of 1.19Mbps for smartphones on laptops of 6.72Mbps for download and upload of 2.21Mbps then after using the radius of the server the average bandwidth speed using user and password of 0.75Mbps for download and 0.80Mbps upload and the success status is very good, all devices can authenticate. and those who can use a QR code of 0.36Mbps for download and 0.44Mbps for Upload with a poor success status because some devices are not compatible for authentication using a QR code by scanning webqr.com.
DETEKSI TRAFIC PADA JUMLAH KENDARAAN YANG LEWAT DI YOU SEE INDONESIA MENGGUNAKAN METODE YOLOV8 Subekti, Janji Nur; Putra, Andriyan Dwi
Information System Journal Vol. 7 No. 02 (2024): Information System Journal (INFOS)
Publisher : Universitas Amikom Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24076/infosjournal.2024v7i02.1736

Abstract

Yousee Indonesia menghadapi tantangan dalam mengukur lalu lintas kendaraan untuk visibilitas iklan. Menggunakan teknologi AI YOLOv8. Metode ini melibatkan pengumpulan data melalui Roboflow, anotasi data dengan kotak pembatas, dan pelatihan model dengan YOLOv8 nano. Dataset dibagi menjadi 70% pelatihan, 20% validasi, dan 10% pengujian. Hasil pelatihan menunjukkan bahwa performa model bervariasi antar kelas, dengan grafik Recall-Confidence menunjukkan penurunan nilai dan Precision-Confidence menunjukkan peningkatan nilai seiring peningkatan confidence. Meskipun rata-rata F1-score mencapai 84%, evaluasi menunjukkan kesulitan model dalam mendeteksi objek dan memprediksi label dengan tepat, khususnya untuk kelas ‘bus’ dan ‘truk’. Implementasi YOLOv8 memungkinkan pengumpulan data trafik yang akurat untuk analisis pola lalu lintas dan strategi iklan yang lebih efektif.
Supervised Machine Learning Model untuk Prediksi Penyakit Hepatitis Putra, Andriyan Dwi; Nurani, Dwi; Dewi, Melany Mustika; Rahmi, Alfie Nur; Supriatin
The Indonesian Journal of Computer Science Vol. 13 No. 2 (2024): The Indonesian Journal of Computer Science (IJCS)
Publisher : AI Society & STMIK Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33022/ijcs.v13i2.3817

Abstract

Hepatitis menjadi salah satu penyakit mematikan yang diakibatkan karena peradangan yang terjadi pada organ hati manusia. Hepatitis seringkali disebabkan karena infeksi virus dan gaya hidup yang tidak sehat. Hepatitis bahkan bisa menular apabila dikaitkan dengan infeksi dari adanya virus tertentu. Hepatitis perlu dideteksi secara dini dan diantisipasi sedini mungkin sehingga tidak mengakibatkan adanya penyakit komplikasi yang lebih serius yang bahkan dapat mengakibatkan terjadinya kematian. Perkembangan teknologi informasi dan komunikasi yang terus berkembang hingga saat ini memungkinkan penyakit hepatitis untuk dapat dikenali dan diprediksi. Salah satunya menggunakan teknologi pembelajaran mesin. Pada penelitian ini, metode supervised learning yang menerapkan algoritma Naïve Bayes dan KNearest Neighbor digunakan untuk memprediksi adanya penyakit hepatitis. Dengan menggunakan dataset yang diunduh secara langsung dari halaman website UCI Machine Learning Repository, Naïve Bayes menghasilkan nilai akurasi sebesar 91.67% dengan nilai presisi dan recall mencapai 95%, Sedangkan penggunaan K-Nearest Neighbor menghasilkan nilai akurasi sebesar 95.8%, dengan adanya perbedaan nilai presisi dan recall sebesar 1%, menunjukkan bahwa penggunaan pervised machine learning model berdasarkan algoritma Naïve Bayes dan K-Nearest Neighbor memiliki potensi untuk digunakan dalam pengembangan berbagai sistem terutama untuk prediksi penyakit hepatitis.
Enhancing Website Security Using Vulnerability Assessment and Penetration Testing (VAPT) Based on OWASP Top Ten Rohmaniah, Diana; Ashari, Wahid Miftahul; Lukman, Lukman; Putra, Andriyan Dwi
Journal of Applied Informatics and Computing Vol. 9 No. 2 (2025): April 2025
Publisher : Politeknik Negeri Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30871/jaic.v9i2.9069

Abstract

Website security is one of the main concerns in the digital era, given the increasing potential for cyber threats. This research aims to improve website security by using the Vulnerability Assessment and Penetration Testing (VAPT) method that refers to the OWASP Top Ten standard. The applied method includes four main stages: information gathering, vulnerability scanning, exploitation, and reporting. The results showed that there were several successfully exploited vulnerabilities, such as Clickjacking, Improper HTTP to HTTPS Redirection, Directory Listing, and Sensitive Information Disclosure, which were classified based on the OWASP Top Ten. The severity of the vulnerabilities was analyzed using Common Vulnerabilities and Exposures (CVE), Common Weakness Enumeration (CWE), and Common Vulnerability Scoring System (CVSS). The analysis results show that some vulnerabilities have high severity after considering the factual conditions of the system. This research provides specific remediation recommendations to address these vulnerabilities, such as the implementation of security headers, deletion of sensitive configuration files, and dependency updates. With this approach, the research is expected to contribute to improving website security and provide effective mitigation guidelines.
Perancangan Prototype Pelampung Keselamatan Elektrik dengan Algoritma Proportional Integral Derivative Untuk Kestabilan di Air Kusrini, Kusrini; Pramono, Eko; Muktafin, Elik Hari; Setiaji, Bayu; Putra, Andriyan Dwi
Journal of Information System Research (JOSH) Vol 6 No 1 (2024): Oktober 2024
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/josh.v6i1.6021

Abstract

This research addresses the need for a water rescue device capable of autonomously moving towards a survival position while being remotely controlled. The main problem investigated is how to design an electric safety buoy that can move stably in currents and waves while being operated remotely using Internet of Things (IoT) technology. Data were collected through prototype testing under various load and control range conditions. The research method involves designing and implementing a control system based on the Arduino Uno microcontroller, with a Proportional-Integral-Derivative (PID) algorithm to maintain buoy stability, and an RF communication module for remote control up to 500 meters. The test results show that the buoy can achieve an average speed of 1.35 m/s at 100% throttle with an 80 kg load and maintain stability in various water conditions. The standard deviation of speed indicates minimal variation between tests, demonstrating good movement stability. This research contributes to the development of IoT-based safety devices, enhancing the effectiveness of water rescue operations. With the use of a PID algorithm, the buoy can automatically adjust direction and speed, making it more responsive to remote control commands and able to withstand dynamic water conditions.
Pengembangan Keterampilan Dasar Pemrograman bagi Siswa SMA N 2 Bantul sebagai Persiapan di Era Digital Putra, Andriyan Dwi; Nur'aini; Ashari, Wahid Miftahul; Sismoro, Heri; Kuswanto, Jeki
Tanggap Masyarakat untuk Aksi dan Sinergi Vol. 1 No. 02 (2025): Volume 01 Nomor 02 - Juni 2025
Publisher : TAM Global Insights - PT. Treeta Amanah Mandiri Group

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Pelatihan Internet of Things (IoT) di SMA Negeri 2 Bantul dilaksanakan sebagai respons terhadap rendahnya literasi teknologi dan keterampilan digital siswa, serta keterbatasan tenaga pengajar dan sumber belajar di bidang IoT. Kegiatan ini bertujuan untuk meningkatkan kompetensi dasar siswa dalam memahami dan mengaplikasikan teknologi IoT melalui pendekatan pembelajaran interaktif, praktik langsung, serta pengembangan proyek mini. Metode pelaksanaan meliputi tahap persiapan, pelaksanaan inti, dan evaluasi, dengan dukungan modul pembelajaran cetak dan digital, video tutorial, serta sesi pendampingan intensif. Hasil evaluasi menunjukkan bahwa 68,3% siswa merasa puas dan 25,5% cukup puas terhadap pelatihan yang diberikan. Pelatihan ini terbukti mampu meningkatkan minat dan pemahaman siswa terhadap IoT, serta memperlihatkan pentingnya sinergi antara sekolah dan perguruan tinggi dalam mendukung transformasi pendidikan berbasis teknologi. Kegiatan ini diharapkan menjadi model pelatihan yang dapat direplikasi di sekolah lain untuk mendorong literasi teknologi sejak dini.