Claim Missing Document
Check
Articles

Found 14 Documents
Search

Pengujian Kualitas Sistem Informasi Kesehatan Periksa.ID Berbasis Autentikasi Menggunakan Software Testing Life Cycle Salshabila, Andini Dwi; Sutanto, Imam; Hosizah, Hosizah; Pertiwi, Tria Saras
Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) Vol 10 No 2 (2026): APRIL 2026
Publisher : Lembaga Otonom Lembaga Informasi dan Riset Indonesia (KITA INFO dan RISET)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/jtik.v10i2.5477

Abstract

The advancement of information technology in the healthcare sector encourages hospitals to implement reliable and secure digital systems, one of which is the Periksa.id application. This application is used by doctors to record inpatient examination results and is now equipped with a fingerprint authentication feature. This study aims to evaluate the quality of the Periksa.id application using the Software Testing Life Cycle (STLC) method, which consists of six stages: requirement analysis, test planning, test case design, test environment setup, test execution, and test closure. The research was conducted at Soeharto Heerdjan Hospital over a period of three months with a total of 200 virtual users involved in the reliability testing. Testing was carried out on both functional and non-functional aspects, including response time, reliability, security, portability, as well as positive and negative testing, using tools such as JMeter, WAPT, and ZAP. The results showed that the application met over 85% of the software quality criteria, although several minor bugs and 12 security vulnerabilities (2 high, 10 medium) were identified and require improvement. This study contributes to the evaluation of web-based hospital application systems to enhance the efficiency of medical services and ensure secure patient data management.
Penerapan Penetration Testing pada Sistem EasyCart dalam Menghadapi Ancaman Keamanan Siber Fahrul Reza, Mochamad; Sutanto, Imam
Applied Information Technology and Computer Science (AICOMS) Vol 4 No 2 (2025)
Publisher : Pengelola Jurnal Politeknik Negeri Ketapang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58466/aicoms.v4i2.1937

Abstract

Information security in e-commerce applications is a crucial aspect in maintaining the integrity, confidentiality, and availability of user data. The method used is penetration testing with a black-box and grey-box approach, referring to the Penetration Testing Execution Standard (PTES) and the OWASP Top 10 framework for 2021. The testing was conducted through the seven PTES phases: Pre-engagement Interactions, Intelligence Gathering, Threat Modeling, Vulnerability Analysis, Exploitation, Post-Exploitation, and Reporting. The testing environment was run locally using tools such as Burp Suite, OWASP ZAP, Nikto, SQLMap, and Nmap. The testing results identified 20 vulnerabilities with high, medium, and low risk levels, including Cross-Site Scripting (XSS), SQL Injection, Broken Access Control, and Security Misconfiguration. Mitigation recommendations are based on ISO/IEC 27001:2022 controls, specifically Annex A.5 (information security policy), A.8 (asset management), and A.12 (operational security). This research contributes to the understanding and application of standards-based security testing in simulation applications, while emphasizing the importance of input validation, secure system configuration, and regular updates as mitigation measures against cyber threats.
Electronic Medical Record Security Assessment Using System Security Engineering–Capability Maturity Model (SSE-CMM) Febriyana, Vira; Sutanto, Imam; Hosizah, Hosizah; Ichwani, Arief
Jurnal Impresi Indonesia Vol. 4 No. 12 (2025): Jurnal Impresi Indonesia
Publisher : Riviera Publishing

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58344/jii.v4i12.7230

Abstract

The implementation of Electronic Medical Record (EMR) faces challenges regarding patient information privacy, making it essential to assess the maturity level of its security. This study aimed to conduct an EMR security assessment to evaluate current conditions against those expected to meet the ISO 27002:2022 standard. This qualitative research employed a case study design. Data were analyzed using the System Security Engineering–Capability Maturity Model (SSE-CMM) method and gap analysis. The assessment revealed that the current EMR security level is at the initial/ad hoc stage (level 1), with an average score of 1.06 and a gap of 1.94 from the target defined process level (level 3). Thus, EMR security remains in its early stages, necessitating improvements in formally documented policies and security procedures, which have yet to be implemented.
Implementation of Decentralized Systems in Electronic Election Applications Prayogo, Ario; Sutanto, Imam
Jurnal Ilmu Kepolisian Vol 19 No 3 (2025): Jurnal Ilmu Kepolisian Volume 19 Nomor 3 Tahun 2025
Publisher : Sekolah Tinggi Ilmu Kepolisian

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35879/jik.v19i3.695

Abstract

The e-voting system represents a digital innovation designed to enhance efficiency, transparency, and security in the election process. This research discusses the development of a blockchain-based e-voting system built on the Ethereum testnet (Sepolia), integrated with CodeIgniter 4, MySQL, and Tailwind CSS frameworks. The system was developed using the Prototyping method, enabling iterative improvement based on user feedback. The evaluation results indicate that each vote is successfully recorded on the blockchain through a smart contract, providing a verifiable transaction hash (tx_hash) as proof of authenticity. From a usability perspective, 73.7% of respondents stated that the system is easy to use, and 78.9% expressed willingness to adopt it. These findings demonstrate that the proposed blockchain-based e-voting system meets the criteria of usability, security, and user trust, showing strong potential for practical implementation at Esa Unggul University.