Claim Missing Document
Check
Articles

Found 14 Documents
Search

Consumer Protection Law In Electronic Transactions: Between Rights And Obligations In The Digital Era Widia, Windi Pangestu; Sakmaf, Marius S.; Jumiran; Husain
Mawaddah: Jurnal Hukum Keluarga Islam Vol 2 No 2 (2024): November
Publisher : Program Studi Hukum Keluarga Islam

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52496/mjhki.v2i2.45

Abstract

The digital age has given birth to electronic transactions (e-commerce) that offer convenience, speed, and broad access. However, it also opens up potential risks for consumers, such as fraud, data theft, and other violations of consumer rights. This research analyses laws and regulations, government regulations, legal theories, and expert opinions to discuss efforts to improve the effectiveness of consumer legal protection in electronic transactions. This research reveals findings related to consumer protection in electronic transactions contained in Law Number 8 Year 1999 on Consumer Protection and other laws and regulations. Consumers have the right to obtain information that is not misrepresented and covers all aspects, choose the product or service they want, get a fair price, guarantee the quality of the product or service, compensation for losses, and protection of personal data. Efforts to improve the effectiveness of consumer legal protection in electronic transactions require continuous updating and refinement of regulations, improving consumer digital literacy, socialising applicable regulations, increasing the capacity of law enforcement officials, facilitating consumer access to report violations, implementing more specific regulations for e-commerce, building an effective complaint system, and utilising technology for supervision and educationtechnology for monitoring and education.
The Impact of Changing Gender Roles on the Dynamics of Family Law in the Modern Era Muhammad Husni Abdulah Pakarti; Edy Saputra; Husain; Lexy Fatharany Kurniawan; Nahdia Nazmi
Yinyang: Jurnal Studi Islam Gender dan Anak Vol. 19 No. 1 (2024)
Publisher : Pusat Studi Gender dan Anak (PSGA) IAIN Purwokerto

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24090/yinyang.v19i1.9513

Abstract

The role of gender in society has undergone significant changes in recent decades. Social transformation, economic advancements, and the increasing advocacy for gender equality have influenced the dynamics of family law. This research aims to analyze the impact of changing gender roles on family law dynamics in the context of the modern era. In this case study, the researcher will examine how changes in gender roles affect child custody, roles in marriage and divorce, and other legal implications using a qualitative approach by collecting data from various sources, such as literature reviews, documentation, and analysis of related legal cases. Data analysis will be conducted using a comparative descriptive approach to identify changes occurring in family law and its relation to changing gender roles. The results of this study indicate that changes in gender roles within family law have significant impacts in the modern era. These changes include the expected roles of husbands and wives in marriage, child custody after divorce, as well as legal protection against gender discrimination and access to fair legal services. Although challenges still exist, it is important for society and the legal system to support these changes and address existing barriers. Thus, marital and divorce relationships can become more balanced, fair, and consider the best interests of the couples and children involved.
Analisis Dan Implementasi Algoritma Bcrypt Dengan Affine Cipher Untuk Pengamanan Password Pada Aplikasi Web: Analysis And Implementation Of Bcrypt Algorithm With Affine Cipher For Password Security In Web Applications Nugroho Dwi Aji; Tomi Tri Sujaka; Husain; Ondi Asroni; Kurniadin Abd. Latif
Cyber Security dan Forensik Digital Vol. 8 No. 1 (2025): Edisi Mei 2025
Publisher : Fakultas Sains dan Teknologi UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/csecurity.2025.8.1.5076

Abstract

Teknologi informasi saat ini semakin berkembang dengan berkembangnya teknologi tersebut membuat segala kalangan dapat mengakses aplikasi web, hal tersebut menjadikan keamanan pada aplikasi web harus di perhatikan. Salah satu teknik yang dapat digunakan sebagai pengamanan pada aplikasi web yaitu menerapkan algoritma kriptografi pada password. Penelitian ini bertujuan untuk menganalisis dan mengimplementasi algoritma kriptografi bcrypt dengan affine cipher yang akan di modifikasi dengan menggunakan algoritma ROT13 untuk pengamanan password pada aplikasi web. Penelitian dilakukan dengan menggunakan metode pengembangan sistem yaitu Secure Sistem Development Life Cycle (SSDLC) yang meliputi Reqirements analysis, Desain, Development, dan Testing menggunakan bruteforce dan sniffing. Hasil penelitian ini menunjukkan bahwa analisis dan implementasi algoritma bcrypt dengan affine cipher untuk pengamanan password pada aplikasi web sesuai rancangan. Uji coba menunjukkan bahwa dengan menerapkan algoritma bcrypt dan affine cipher yang telah dimodifikasi menggunakan algoritma ROT13 akan memperlambat dari serangan bruteforce. Sedangkan implementasi pada pengiriman kredensial dari frontend menuju backend menunjukkan kredensial tidak dapat dilakukan serangan sniffing menggunakan wireshark. Kesimpulan dari penelitian ini bahwa menerapkan algoritma kriptografi bcrypt dan affine cipher yang telah dimodifikasi menggunakan algoritma ROT13 akan menambahkan lapisan keamanan pada sistem yang dapat menghambat serangan bruteforce dan menghentikan serangan sniffing. Penelitian ini juga menyarankan penggunaan kriptografi bcrypt dan affine cipher yang telah dimodifikasi menggunakan algoritma ROT13 sebagai lapisan pengamanan pada sistem. Kata kunci: Affine cipher, Bcrypt,  Kriptografi, Password, Pengamanan, ROT13. ------------------ Information technology is currently growing with the development of this technology making all circles able to access web applications, this makes security in web applications must be considered. One technique that can be used as security in web applications is applying cryptographic algorithms to passwords. This research aims to analyze and implement the bcrypt cryptographic algorithm with affine cipher which will be modified using the ROT13 algorithm for password security in web applications. The research was conducted using the system development method, namely Secure System Development Life Cycle (SSDLC) which includes Reqirements analysis, Design, Development, and Testing using brute-force and sniffing. The results of this research show that the analysis and implementation of the bcrypt algorithm with affine cipher for password security in web applications are as designed. The test shows that by applying bcrypt and affine cipher algorithms that have been modified using the ROT13 algorithm will slow down brute-force attacks. While the implementation on sending credentials from the front-end to the back-end shows that credentials cannot be sniffed using wireshark. The conclusion of this research is that applying bcrypt and affine cipher cryptographic algorithms that have been modified using the ROT13 algorithm will add a layer of security to the system that can inhibit brute-force attacks and stop sniffing attacks. This research also suggests the use of bcrypt and affine cipher cryptography that has been modified using the ROT13 algorithm as a security layer on the system. Keywords: Affine cipher, Bcrypt, Cryptography, Password, Security, ROT13.
Building a Just Law: The Role of Legal Professional Ethics in Indonesia Muttaqien, Muhammad Syahrul; Yubaidi, Ahmad; Abdulah Pakarti, Muhammad Husni; Husain; Hassan Bello, Abdulmajeed Bolade
Mawaddah: Jurnal Hukum Keluarga Islam Vol 3 No 1 (2025): Mei
Publisher : Program Studi Hukum Keluarga Islam

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52496/mjhki.v3i1.24

Abstract

The professionalism of a legal professional is not only due to being competent, intellectual and successful in his field as a law enforcement officer, but the behavioral aspect is also part of the assessment that must be had in implementing the Code of Ethics or Legal Professional Ethics to uphold law and justice. However, if we look at the existing reality, there are still many legal practitioners who do not comply with the Code of Ethics for the Legal Profession. The research method in this journal uses normative juridical, which uses library-based secondary data sources. The results of this research are that the Code of Ethics for the Legal Profession must be obeyed (forced) even if it is not officially used as a regulation. Because Legal Professional Ethics has an important role in law enforcement which is also a manifestation of efforts to realize better law.
IMPLEMENTASI PENGGUNAAN HAPROXY LOAD BALANCING DAN FAIL2BAN PADA SERVER MENGGUNAKAN VIRTUAL PRIVATE SERVER Maulid Putra Perdana; Marzuki, Khairan; Ondi Asroni; Husain; Lillik Widyawati; Lalu Zazuli AzharMardedi
Jurnal Manajemen Informatika dan Sistem Informasi Vol. 8 No. 2 (2025): MISI Juni 2025
Publisher : LPPM STMIK Lombok

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36595/misi.v8i2.1593

Abstract

Seiring meningkatnya kebutuhan layanan berbasis web, performa dan keamanan server menjadi aspek krusial dalam pengelolaan infrastruktur jaringan. Beban yang tinggi pada server dapat menyebabkan penurunan kinerja hingga kegagalan layanan (server down). Oleh karena itu, diperlukan sistem Load Balancing untuk mendistribusikan lalu lintas secara merata dan sistem keamanan tambahan untuk melindungi server dari ancaman serangan. Penelitian ini menganalisis penerapan Load Balancing menggunakan HAProxy dengan algoritma Round Robin untuk meningkatkan kinerja server serta penerapan Fail2Ban sebagai sistem keamanan dalam mencegah seseorang yang mencoba login berulang kali pada Virtual Private Server (VPS). Metode penelitian yang digunakan adalah Network Development Life Cycle (NDLC), yang mencakup analisis kebutuhan, desain sistem, simulasi prototype. Pengujian dilakukan dengan Apache JMeter untuk mengukur kinerja server dan simulasi percobaan login gagal dilakukan dengan PuTTy untuk menguji efektivitas Fail2Ban. Hasil penelitian menunjukkan bahwa HAProxy load balancing berhasil mendistribusikan beban secara merata, meningkatkan ketersediaan layanan, dan mengurangi waktu respons. Selain itu, penerapan Fail2Ban terbukti efektif dalam mendeteksi serta memblokir alamat IP yang berulang kali gagal melakukan login, sehingga meningkatkan keamanan server. Penelitian ini memberikan kontribusi dalam optimalisasi performa dan keamanan server berbasis VPS, yang dapat diterapkan pada berbagai layanan web seperti e- commerce, blog, sistem perusahaan, maupun sekolah.
Addressing the Black-Box Challenge: Confidence Index Approach to Grading of Open-Ended Assessments in Accounting Education Husain
Journal of Education Technology Vol. 9 No. 1 (2025): February
Publisher : Universitas Pendidikan Ganesha

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.23887/jet.v9i1.92673

Abstract

Traditional grading systems have long been a common practice in the world of cross-disciplinary education, but they face challenges such as limited scalability, inconsistencies in assessment, and a lack of personalized feedback. This condition encourages the emergence of an alternative in the form of an automatic assessment system based on artificial intelligence (AI). Although promising, this approach is not without problems, especially regarding the transparency and reliability of assessments which are often referred to as the "black box" effect. This study aims to address this effect through the integration of the trust index into the AI assessment system, in order to provide more interpreted assessment results in the context of accounting education. This research is a quantitative study with a supervised machine learning approach. The AI model is trained to evaluate students' open-ended answers on several accounting subjects. Data was collected from students' answer scripts and compared to the results of human assessments. The analysis was conducted to see the relationship between AI scores and human assessment scores based on trust and experience levels. The results showed that the use of trust indexes significantly improved the consistency and reliability of assessment results, with a positive correlation between high trust scores and the suitability of AI assessment results with human assessments. However, variations were also found in some subjects, suggesting that the effectiveness of AI is influenced by the specific characteristics of the material. The conclusions of this study show that the integration of trust indexes into AI scoring systems can improve the transparency and accuracy of assessments. However, a hybrid approach that combines AI and human appraiser engagement is still necessary to ensure efficiency, educational integrity, and fairness in the assessment process. The implications of this study emphasize the need for adaptive automatic appraisal development strategies, especially in the context of accounting education. However, the results of the study cannot be generalized widely because they are limited to the context of accounting education only.
The Influence of Cross-Interest Learning in Economics Subjects on the Growth Of Students' Entrepreneurial Interest at SMAN 11 Pangkep Husain; Muh. Yahya; Devilla, Rego
Jurnal PAJAR (Pendidikan dan Pengajaran) Vol. 8 No. 2 (2024): March
Publisher : Laboratorium Program Studi Pendidikan Guru Sekolah Dasar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33578/pjr.v8i2.9042

Abstract

In the current era, learners must have the ability to be able to adapt to changes that occur in the education component. One of these demolitions is in the 2013 curriculum in which there are specialization subjects. This study aims to find out how the influence of cross-interest learning in economics students on the growth of entrepreneurial interest of SMAN 11 Pangkep students. This research is a type of descriptive quantitative research. The population and sample of this study are grade XI science students totaling 26 students for the 2021/2022 academic year. Data collection techniques are carried out by distributing questionnaires and documentation. Analysis techniques use descriptive statistics and inferential statistical analysis. The results showed that there was a significant influence of cross-interest learning (X) on the growth of entrepreneurial interest (Y) in grade VI IPA students of SMA Negeri 11 Pangkep, where a probability value of 0.04 < 0.05 was obtained and a calculated t value of 2.122 > 1.714. Thus, it is concluded that cross-interest learning of economics subjects needs efforts made by principals and teachers so as to be able to increase the growth of students' entrepreneurial interest after graduation considering the importance of entrepreneurial spirit in this country.
Model Prediksi Penjadwalan Produksi Energi Terbarukan dengan Algoritma XGBoost dan Analisis Interpretatif Menggunakan SHAP M. Safii; Husain; Ika Okta Kirana; Sasha Aiko Leana; Yuli Indahwati Gultom
Jurnal Sistem Informasi Triguna Dharma (JURSI TGD) Vol. 4 No. 4 (2025): EDISI JULI 2025
Publisher : STMIK Triguna Dharma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53513/jursi.v4i4.11443

Abstract

Penjadwalan produksi energi terbarukan adalah kegiatan untuk menyeimbangkan antara pasokan dan permintaan energi dalam siklus sistem energi berkelanjutan. Berbagai jenis energi terbarukan seperti hidro, angin, matahari, dan lainnya akan melalui pemodelan prediktif dari jadwal produksi menggunakan algoritma Extreme Gradient Boosting (XGBoost) yang dikombinasikan dengan pendekatan interpretabilitas model menggunakan SHapley Additive exPlanations (SHAP). Penelitian ini menggunakan data sekunder dengan parameter Tahun, Negara, Energi Surya, Energi Angin, Energi Hidro, Energi Terbarukan Lainnya, dan Total Energi Terbarukan. Pemodelan menunjukkan bahwa energi angin dan energi matahari memiliki prediksi produksi yang meningkat ketika nilai fitur tinggi dan energi angin memiliki efek negatif ketika nilai fitur rendah. Penelitian ini memiliki kontribusi yang signifikan terhadap faktor yang mempengaruhi penjadwalan dan juga berpeluang untuk penerapan sistem cerdas dalam pengambilan keputusan sektor energi. Hasil penelitian ini dapat menjadi dasar untuk merumuskan strategi manajemen energi berkelanjutan yang memiliki potensi untuk mengintegrasikan kecerdasan buatan dan transparansi model dalam kebijakan energi terbarukan.
Politik Hukum Pengaturan Ahli Waris Pengganti dalam Pasal 185 Kompilasi Hukum Islam: Analisis Normatif dan Implikasinya Terhadap Sistem Kewarisan di Indonesia Fu’ad, Asep; Rosadi, Aden; Saepullah, Usep; Husain
al-Battar: Jurnal Pamungkas Hukum Vol. 1 No. 3 (2024): Desember
Publisher : Yayasan Cendekia Gagayunan Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.63142/e3fj4d24

Abstract

This research aims to analyze the concept of substitute heirs in Article 185 of the Compilation of Islamic Law (KHI) and its implications for the inheritance system in Indonesia. This research uses a normative juridical method with a legal political approach. This approach is used to explore the legal and policy background behind the arrangement of substitute heirs in KHI. The results show that although classical Islamic law, especially the Syafi'i school, does not recognize the concept of substitute heirs, KHI adopts a more inclusive approach. Article 185 of the KHI grants inheritance rights to descendants of heirs who have died before the testator, which is a political legal effort to achieve social justice in the context of Indonesian inheritance. Although this arrangement aims to create social justice, findings show that there are challenges in its acceptance in the community. Many Indonesians still hold strong customs and traditional understandings in the inheritance system. Therefore, more intensive socialization is needed to bridge the gap between the positive law and the local community's understanding of the prevailing inheritance system.
IMPLEMENTASI CHATBOT PADA TELEGRAM UNTUK MENDETEKSI SPAM MENGGUNAKAN METODE XGBOOST Juliyanto, Fery; Husain; Lilik Widyawati; Khairan Marzuki; I Made Yadi Dharma
Jurnal Manajemen Informatika dan Sistem Informasi Vol. 8 No. 2 (2025): MISI Juni 2025
Publisher : LPPM STMIK Lombok

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36595/misi.v8i2.1681

Abstract

Meningkatnya pemakaian aplikasi Telegram sebagai sarana komunikasi mendorong kebutuhan akan sistem otomatis yang bisa mendeteksi pesan spam secara langsung, karena pesan spam dapat mengganggu kenyamanan pengguna dan bahkan menyebabkan kerugian. Studi ini bertujuan untuk merancang dan menerapkan chatbot di Telegram untuk mengidentifikasi pesan spam dengan metode XGBoost. Proses pengembangan mengikuti langkah-langkah CRISP-DM, yang mencakup business understanding, data preparation, modeling, evaluation, dan deployment. Dataset terbagi menjadi dua bagian, yaitu data pelatihan dan data pengujian, untuk mengukur kinerja model. Model XGBoost dilatih menggunakan data training dan diuji dengan data testing pada tiga skenario pembagian proporsi, yaitu 70% - 30%, 80% - 20%, dan 90% - 10%, guna menghitung tingkat akurasi dalam mengklasifikasikan pesan sebagai spam atau non spam (ham). Hasil penerapan menunjukkan bahwa chatbot mampu mengenali pesan spam dengan baik dan dapat melakukan tindakan seperti memberikan peringatan, menghapus pesan spam, serta memblokir pengirim jika ada pengulangan pesan spam yang sama lebih dari dua kali. Oleh karena itu, sistem ini dapat mempertahankan kenyamanan komunikasi di platform Telegram dengan cara yang otomatis dan fleksibel. Tingkat akurasi tertinggi yang diraih dari semua pengujian adalah 0.9656 atau 96.57%. Rata-rata precision untuk pesan ham dan spam adalah 96% dan 97%, recall masing-masing sebesar 96% dan 97%, serta F1-score masing-masing 96% dan 97%. Matriks kebingungan pada setiap skenario menunjukkan akurasi yaitu 94.86% (70% - 30%), 94.42% (80% - 20%), dan 94.87% (90% - 10%). Kontribusi utama dari studi ini adalah hadirnya sistem chatbot berbasis XGBoost yang terintegrasi dalam aplikasi Telegram, yang dapat mendeteksi dan menangani pesan spam secara langsung. Sistem ini membantu menciptakan suasana komunikasi yang lebih aman, nyaman, dan secara otomatis terhindar dari gangguan spam.