Claim Missing Document
Check
Articles

Found 26 Documents
Search

PENERAPAN KNOW YOUR CUSTOMER PRINCIPLE DALAM PENCEGAHAN RESIKO PADA PT.BNI SYARIAH BOGOR ., Rachmatullaily; Ramadhan, Fauzan
MONETER Vol 7 No 1 (2019): APRIL
Publisher : Fakultas Ekonomi dan Bisnis Universitas Ibn Kahldun Bogor

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (532.839 KB) | DOI: 10.32832/moneter.v7i1.2513

Abstract

Dalam dunia perbankan, nasabah menjadi sumber utama dari profit yang dikejar oleh pihak Bank.  Maka semakin banyak nasabah yang ada pada Bank tersebut maka semakin besar pula profit yang akan dihasilkan. Namun ayang harus kemabali diperhatikan oleh pihak bank adalah semakin banyaknasabah yang yang ada pada Bank tersebut juga meningkatkan resiko yang terjadi salah satu resio yang dapat terjadi adalah money laundry dan penipuan. Maka dari itu Bank Indonesia mewajibkan seluruh Bank yang ada di Indoneisa agar melakukan prinsip keahati - hatian dalam mencegah resikoterjadi tindakan money laundry dan penipuan oleh nasabahnya sendiri. Prinsip ini tertuang dalam PBI No. 3/1998. Prinsip ini pula dikenal dengan pengenalan nasabah atau know your customer principle.Prinsip kehati - hatian yang diterapkan oleh setiap Bank dalam rangka mengetahui identitas nasabah serta mengawasi arus transaksi nasabah. Kemudian dalam Praktek Kerja Lapanagan pada BankNegara Indonesia Syariah KCU Bogor dilakukan dengan mengamati bagaimana penerapan know your customer principle, mekanisme penerapan know your customer principle, serta hambatan yangdihadapi dalam penerapan know your customer principle yang dilakukan oleh frontlinner yaitu customer service dan teller. Secara garis besar mekanisme yang dilakukan dalam penerapan prinsipini adalah dengan dua cara yaitu dengan pemberian form dan pendekatan secara emosional kepada nasabah.
Analisis Penyisipan Pesan Terenkripsi Algoritma RSA Pada Gambar Dengan Pengujian PSNR Nurjaman, Asep Rizal; Ramadhan, Fauzan
Rekayasa Hijau : Jurnal Teknologi Ramah Lingkungan Vol 9, No 2 (2025)
Publisher : Institut Teknologi Nasional, Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26760/jrh.v9i2.123-133

Abstract

AbstrakKeamanan data digital menjadi tantangan dalam pengembangan sistem yang akan dikembangkan. Keamanan ini akan berbanding terbalik dengan kenyamanan. kriptografi merupakan salah satu teknik untuk mengamankan/mengacak data, namun jika hanya dilakukan pengacakan/pengamanan data, maka penyerang akan dengan mudah mencoba untuk melakukan dekripsi karena mengetahui pesannya teracak. Teknik lain yang bisa digunakan untuk mengamankan pesan adalah steganografi yang merupakan sebuah teknik untuk menyembunyikan informasi yang bersifat pribadi dengan sesuatu yang hasilnya tampak seperti informasi normal lainnya. Penelitian ini mencoba untuk menggabungkan antara kriptografi dan steganografi sehingga pesan yang terenkripsi akan disisipkan dalam sebuah gambar. Pengujian yang dilakukan dengan metode PSNR dimana kemiripan antara gambar asli dan gambar hasil penyisipan akan dihitung. Selain pengujian PSNR, skema yang dibangun akan diujikan dengan skema MITM Attack. Hasil penelitian menunjukkan bahwa nilai PSNR dari gambar yang disisipkan pesan terenkripsi > 50dB yang berarti tingkat kualitas gambar antara gambar asli dan gambar yang disisipkan dengan pesan terenkripsi sangat tinggi. Hasil pengujian skema menunjukkan jika gambar berhasil di ekstraksi, penyerang harus melakukan dekripsi dengan menebak kunci rahasia pengirim untuk bisa mendapatkan pesan aslinya. Penelitian ini dibatasi pada gambar berekstensi .png. Ukuran gambar, panjang pesan dengan kombinasi karakter pada pesan yang sangat mempengaruhi ukuran gambar hasil penyispan pesan terenkripsi.Kata kunci: Algoritma RSA, PSNR, Steganografi, Enkripsi, Dekripsi AbstractDigital data security is a challenge in developing the system to be developed. This security will be inversely proportional to convenience. Cryptography is one technique to secure data, but if only for securing data, the attacker will try to decrypt it. Another technique that can be used to secure messages is steganography which is a technique to hide personal information with something that looks like other normal information. This study tries to combine cryptography and steganography so that the encrypted message will be inserted into an image. Testing is done using the PSNR method where the similarity between the original image and the embedded image will be calculated. In addition to PSNR testing, the scheme that was built will be tested with the MITM Attack scheme. The results of the study showed that the PSNR value of the image inserted with the encrypted message was > 50dB which means the level of image quality between the original image and the image inserted with the encrypted message is very high. The results of the scheme test show that if the image is successfully extracted, the attacker must decrypt it by guessing the sender's secret key to be able to get the original message. This research is limited to images with the extension .png. Image size, message length with character combination in the message which greatly affects the size of the image resulting from the embedded encrypted message.Keywords: RSA Algorithm, PSNR, Steganography, Encryption, Decryption
POLA KOMUNIKASI DAKWAH IKATAN MAHASISWA MUHAMMADIYAH (IMM) DI MEDIA SOSIAL Suriati, Suriati; Suriyati, Suriyati; Nur, Makmur Jaya; Syargawir, Syargawir; Ramadhan, Fauzan
RETORIKA : Jurnal Kajian Komunikasi dan Penyiaran Islam Vol 7 No 2 (2025): Jurnal Retorika
Publisher : LP2M Universitas Islam Ahmad Dahlan Sinjai

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47435/retorika.v7i2.4165

Abstract

This study discusses the da'wah communication approach implemented by the Muhammadiyah Student Association (IMM) through the use of social media as a means of spreading Islamic messages. Applying a descriptive qualitative method, information was obtained through interviews with three key figures of IMM Sinjai Branch. The study results show that IMM actively produces da'wah content in the form of religious quotes, educational videos, and Islamic writings that are tailored to current digital media trends and the preferences of the younger generation. Social media platforms like Instagram, TikTok, and YouTube have become the primary choices due to their ability to reach audiences visually and interactively. The main challenges faced include the lack of enthusiasm among cadres towards da'wah content and the limited technical skills in content design. However, IMM demonstrates dedication through the organization of training, enhancement of digital literacy, and openness to public input to improve the quality of its preaching. This research emphasizes the need for a creative, contextual, and adaptive approach to preaching in response to the development of information technology to effectively target the younger generation
PERLINDUNGAN HUKUM KONSUMEN KARTU FLAZZ YANG DITERBITKAN OLEH BANK BCA Ramadhan, Fauzan; Ratnawati, Elfrida
UNES Law Review Vol. 5 No. 3 (2023)
Publisher : Universitas Ekasakti

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31933/unesrev.v5i3.347

Abstract

Technological developments have brought changes to payments in the form of cash in conventional metal and paper forms, which have now developed in the form of electronic payment instruments. The use of non-cash payment electronic money (FLAZZ) besides being able to facilitate transactions can also cause losses to the owner if the FLAZZ is lost or stolen. Transactions using e-money can be carried out without going through an authorization process such as a PIN (Personal Identification Number) so that e-money can be used easily by unauthorized persons. Bank Indonesia Regulation Number 20/6/PBI/2018 contains regulations related to financial compensation but are not clear and detailed, so these unclear regulations lead to different interpretations between institutions. The purpose of this paper is to find out the legal arrangements for electronic money owners in the event of a loss on an e-money card and to find out the responsibility of the bank as a provider of non-cash payment instruments for losses suffered by e-money. - the owner of the money card. The research method used in this paper is normative legal research method. Studies show that electronic money compensation can only be made if there is damage from the issuer. The bank is not responsible for losses to e-money owners due to user negligence that violates consumer protection principles. Banks as issuers of electronic money are not responsible for losses to FLAZZ owners where this rule violates the principle of consumer protection.
DIFFERENCES IN CATCH RESULTS USING WIRE TRAPS WITH DIFFERENT BAITS IN LAKE KELARI, MUARO JAMBI VILLAGE Lutfiany, Aurelia; Lisna, Lisna; Arfiana, Bs Monica; Fahrizal, Fahrizal; Ramadhan, Fauzan; Putinur, Putinur
Jurnal Perikanan Unram Vol 15 No 6 (2025): JURNAL PERIKANAN
Publisher : Universitas Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29303/jp.v15i6.2027

Abstract

This study aims to compare the fishing performance of wire traps (bubu kawat) using two different types of bait, namely oil palm fruit and coconut pulp, in Kelari Lake, Muaro Jambi. The research was conducted over a period of 20 days with two treatments and a total of 20 repetitions. Each treatment used 10 units of wire traps placed randomly at the study site. The observed parameters included fish species, number and weight of catches, and frequency of fish occurrence. The results showed that seven fish species were captured during the study, namely Nilem (Osteochilus vittatus), Kapiat (Puntioplites falcifer), Sebarau (Hampala ampalong), Tembakang (Helostoma temminckii), Gabus (Channa striata), Sepat (Trichopodus pectoralis), and Baung (Hemibagrus nemurus). Nilem was the most frequently caught species in both bait treatments, while Gabus had the lowest catch frequency. Statistically, there was no significant difference (P>0.05) in the number and weight of catches between the two bait types, although coconut pulp produced slightly higher catch numbers. Environmental parameters such as temperature, pH, and water depth were within the optimal range for freshwater fish, supporting the fishing activity. This study concludes that both bait types can be effectively used with wire traps, but oil palm fruit provides more consistent results for fishermen in Kelari Lake.
Prototipe Sistem Monitoring Parkir Mobil Berbasis Mikrokontroler Ramadhan, Fauzan; Nashrullah, Raflie; Bintoro, Jusuf
Autocracy: Jurnal Otomasi, Kendali, dan Aplikasi Industri Vol. 6 No. 01 (2019): Otomasi, Kendali, dan Aplikasi Industri
Publisher : LPPM Universitas Negeri Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Research car park monitoring system based on microcontroller is designing and making automatic monitoring system to reduce human power and more efficienting time at the time of parking in the building basement parking and .So that the user easily find a parking lot. This prototype uses an ultrasonic sensor to detect available parking slots. The method used in this tool is by sending data from the ultrasonic sensor to the microcontroller. If the ultrasonic sensor in the parking slot detects a vehicle, the microcontroller will send a command to the DC motor to be active. And the microcontroller always sends ultrasonic sensor data through Visual Basic on the PC monitor to give the available or no parking slot status. Tujuan penelitian Sistem Monitoring Parkir Mobil Berbasis Mikrokontroler adalah merancang dan membuat sistem pemantauan otomatis untuk mengurangi tenaga manusia dan lebih efiensikan waktu pada saat parkir di gedung parkir maupun basement. Sehingga user mudah mencari tempat parkir. Prototipe ini menggunakan sensor ultrasonik sebagai pendeteksi slot parkir yang tersedia. Metode yang digunakan pada alat ini yaitu dengan mengirimkan data dari sensor ultrasonik ke Mikrokontroler. Jika sensor ultrasonik di slot parkir mendeteksi adanya kendaraan maka Mikrokontroler akan mengirim perintah ke motor DC untuk aktif. Serta Mikrokontroler selalu mengirim data sensor ultrasonik melalui Visual Basic di monitor PC untuk memberi status tersedia atau tidaknya slot parkir.