Claim Missing Document
Check
Articles

Found 4 Documents
Search
Journal : JAKSTIK Journal

INFORMATION SYSTEMS DESIGN AND IMPLEMENTATION PROBLEMS ON Rahayu RN Noveandini
JAKSTIK Journal Vol 3, No 1 (2003): Journal
Publisher : STMIK Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Various efforts have been undertaken by universities to improve academic quality control. This effort is intended to improve the quality of education. Evaluation of the monitoring process is carried out continuously and continuous in the end will be able to fix the quality of education. One of the efforts is to build information systems design exam. With the availability of information systems exam is expected that users can perform a variety of analysis and also can provide a more accurate exam. Development of information system design is intended as a first step in increasing the academic quality of universities.
Database encryption USING Transparent Data Encryption Rahayu Noveandini Noveandini
JAKSTIK Journal Vol 3, No 2 (2003): Journal
Publisher : STMIK Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ABSTRACTThe development of global data communications network providing challenges in data andinformation security. Sharing of methods are used to maintain the confidentiality of data,either from application or database level. There are three basic types of encryption, namelymanual, semi-transparent, and transparent. Transparent Data Encryption is one type ofencryption that has advantages in ease of the user because the user does not need to doencryption and decryption process management data directly because the database has to doit. This research will discuss the workings of Transparent Data Encryption, superiority, andits implementation in the encryption database. From this discussion of the benefits of EFTcan be known, such as performance degradation due to lack of data encryption and ease ofimplementation offered to the user.
SMS APPLICATION FOR DESIGNING PATIENT REGISTRATION ONE IN HOSPITALS Rahayu Noveandini
JAKSTIK Journal Vol 5, No 1 (2006): JOURNAL
Publisher : STMIK Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Technology exists to provide easiness of a problem faced by the community. One technology that is widely used and very popular by the current mobile phone users are SMS (Short Message Service). With SMS, it has many applications are implemented based on current SMS, such as quis, polls, forums, even for business applications as well as ordering products. At this writing, they invented a concept of patient information services to facilitate patients who want to go to a hospital, which consists of three types of service concepts, namely: patient registration service registration information, service information and service schedule doctor's advice and inputs for the improvement of health services disuatu TSB hospitals by patients. With the concept of this service, patients can register without having to go directly to a hospital, quite simply sending an SMS to the service of this information, it will automatically direct response by the patient's information services in a hospital using an SMS service infrastructure. Registration procedure is the same as in ordinary, only can be done anytime and from anywhere. 
SECURITY ENGINEERING USING DATA ONLINE TRANSACTIONS ON cryptography Rahayu Noveandini
JAKSTIK Journal Vol 5, No 2 (2006): JOURNAL
Publisher : STMIK Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

E-commerce is a means to conduct financial transactions online. Facility has grown rapidly since the beginning of its use in 1970. When is e-commerce is only about the commercial documents like purchase orders or invoices electronically. Now e-commerce has included credit card transactions, enterprise resource planning, and others. One method of securing the network is the use of technology, Secure Socket Layer (SSL). This technology allows the client to build a secure and encrypted connection with the server. In addition there is also a Digital Certificate technology allows a client to know whether the site's pages are accessible genuine or fake. Both technologies are then put together to facilitate e-commerce to be safe and prevent users from feeling anxious. There are several things that must be prepared to secure e-commerce. From the server side is the availability SSL technology, Digital Certificate, encrypting data, and so forth. To be able to use this technology, there are certain steps that must be taken lankah. While the readiness of the client side of client / server capabilities to rival browsers such as browser capabilities in running SSL.   Many of the lurking threat of e-commerce users. One is phishing. These crimes take advantage of the use of fake websites to deceive users of e-commerce so that when the user accesses such sites important information can be stolen from him by the offender. This crime other than relying on technology also relies on a user's attention ketidakhati in accessing e- commerce site.   Actually, the safety factor of e-commerce does not only depend on the sophistication of the technology used, but more emphasis on prudence and accuracy of e-commerce users in keeping the information themselves, and notice what he had access to the internet. Technology that determines it is safe or not was not only the technology that is used, but also the readiness of human resources in use.Â