Claim Missing Document
Check
Articles

Found 4 Documents
Search

Implementation of COBIT 5 Framework in IT Management at UNISM Library Kurniawan, Muhamad; Sabrina, Nabila Khalilah; Maulina, Riska; Sabrila, Trifebi Shina; Latif, Abdul; Lindawati, Ratna
INSTALL: Information System and Technology Journal Vol 1 No 3 (2024): INSTALL : Information System and Technology Journal
Publisher : LPPM Universitas Sari Mulia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33859/install.v1i3.799

Abstract

In general, COBIT 5 is a framework that helps to focus on Governance and management which includes 2 main areas, namely Governance and Management. So that this study applies the COBIT 5 framework to a library institution at Sari Mulia University. In this study, we used COBIT 5 domains, namely EDM04 (Ensure Resource Optimization) and DSS02 (Manage Service Requests and Incidents), both of which focused on optimizing resources (IT) as well as managing service requests and incidents. This study uses methods that include qualitative and quantitative approaches by collecting data through interviews and surveys. The results show that the implementation of COBIT 5 can improve the efficiency of IT resource use as well as improve the response to IT service incidents. The average level of IT maturity is at level 3 (Established), although there are some gaps that need to be addressed to reach the optimal level. This research provides important insights for libraries in optimizing IT governance to support better services.
Creating 3D Animations for Seasonal Flood Education Ramadhani, Amanda Putri Ramadhani; Maulina, Riska; Delakamin, Putri Ika; Sabrila, Trifebi Shina
INSTALL: Information System and Technology Journal Vol 2 No 2 (2025): INSTALL : Information System and Technology Journal
Publisher : LPPM Universitas Sari Mulia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33859/install.v2i2.980

Abstract

Seasonal flooding is a routine problem in Banjarmasin City which is triggered by high rainfall and poor waste management. The lack of public awareness in maintaining environmental cleanliness has also worsened this condition. This research aims to develop educational media in the form of 3D animations that explain the causes, impacts, and solutions of seasonal floods. The production method includes three main stages: pre-production, production, and post-production, using the Blender software as well as the BlenderKit add-on. The final result is in the form of an educational animation video that describes the process of flooding and preventive actions that can be taken by the community. Preliminary evaluations show that these animations are effective in conveying educational messages and raising environmental awareness. This media is expected to support environmental campaigns by the government and educational institutions.
Design and Build Planning for the Integration of LAN/WAN/WiFi Network Systems with Centralized Management and Network Monitoring System Maulina, Riska; Kalistowen Bie; Excel Daud; Hardi Yanti
INSTALL: Information System and Technology Journal Vol 2 No 2 (2025): INSTALL : Information System and Technology Journal
Publisher : LPPM Universitas Sari Mulia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33859/install.v2i2.994

Abstract

This study discusses the design of the integration of LAN, WAN, and WiFi network systems with centralized management and the implementation of Network Monitoring System (NMS) in Building E of Sari Mulia University with an area of ±600 m². The initial state of the network that is still running separately, without clear segmentation and without real-time monitoring, leads to limited network visibility, connectivity disruptions, and uneven WiFi distribution. This study aims to design and develop an integrated network system that combines LAN, WAN, and WiFi infrastructures with centralized management and NMS to improve network performance, security, and management efficiency. The method used is the network design method which includes needs analysis, network architecture design, device implementation and configuration, and system performance testing. Network integration is carried out through the implementation of a managed switch-based backbone, Virtual Local Area Network (VLAN) segmentation, strengthening security using firewalls and VPNs, and continuous network monitoring using NMS. The design results show an increase in connection stability, network security, and infrastructure management efficiency, with a ≥99.5% uptime and even WiFi coverage throughout the building, so that this system design is considered feasible to be applied as an integrated network solution in the educational institution environment.
QR Code Payment Security Against Phishing Attacks Using HMAC Cryptographic Model and Tokenization Angella Maretmy; maulina, riska; Zapiratun Nisa; Erwenda Tri Hapsari; Hardi Yanti
INSTALL: Information System and Technology Journal Vol 2 No 2 (2025): INSTALL : Information System and Technology Journal
Publisher : LPPM Universitas Sari Mulia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33859/install.v2i2.997

Abstract

The implementation of the Indonesian Standard Quick Response Code (QRIS) has driven the growth of cashless payment systems in Indonesia through interoperability and expanded financial inclusion. However, the QRIS security mechanism still has limitations, particularly due to the use of CRC16-CCITT as the sole data integrity check. CRC16 is not designed to withstand intentional data manipulation, thus opening up opportunities for QR Code substitution-based phishing attacks and undetected transaction amount manipulation. This study aims to evaluate a hybrid security model that combines Hash-based Message Authentication Code (HMAC) with the SHA-256 algorithm and dynamic tokenization to improve QR Code payment security. The method used is an experimental approach based on software simulation by comparing the existing CRC16-based system with the proposed system based on HMAC-SHA256 and tokenization. Testing was conducted through several attack scenarios, including transaction amount manipulation and replay attacks. The test results show that the CRC16 mechanism has a high detection failure rate, where the manipulated QR Code is still considered valid as long as the checksum is recalculated correctly. In contrast, the HMAC-SHA256 mechanism is able to consistently detect all payload changes due to the use of a secret key. Dynamic tokenization has also proven effective in preventing the reuse of expired QR Codes without disrupting the user experience. In conclusion, the integration of HMAC-SHA256 and dynamic tokenization significantly improves the resilience of the QR Code payment system against phishing attacks and data manipulation, and has the potential to become the basis for strengthening the security of QRIS in the future.