Claim Missing Document
Check
Articles

Found 25 Documents
Search

OPTIMALISASI TATA KELOLA KEUANGAN DESA MELALUI PENDEKATAN PEMBANGUNAN ZONA INTEGRITAS DESA (ZIDES) DI TAPULAGA KECAMATAN SOROPIA KABUPATEN KONAWE Wahyuniati Hamid; Juharsah; Laode Asfahyadin Aliddin; Sujono; Sinarwaty
J-ABDI: Jurnal Pengabdian kepada Masyarakat Vol. 4 No. 5: Oktober 2024
Publisher : Bajang Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Tata kelola keuangan desa memainkan peran krusial dalam mendukung pembangunan dan kesejahteraan masyarakat desa. Pelatihan Tata Kelola Keuangan Desa melalui pendekatan Pembangunan Zona Integritas Desa (ZIDES) dilaksanakan di Desa Tapulaga, Kecamatan Soropia, untuk meningkatkan transparansi, akuntabilitas, dan efektivitas pengelolaan keuangan desa. Kegiatan ini dilakukan dalam tiga tahap: perencanaan, pelaksanaan, dan evaluasi. Pada tahap perencanaan, dilakukan identifikasi pemahaman aparat desa dan masyarakat mengenai tata kelola keuangan, serta penyusunan materi dan jadwal pelatihan. Tahap pelaksanaan mencakup sosialisasi prinsip-prinsip ZIDES, penguatan sistem pengawasan, serta praktik melalui studi kasus dan simulasi. Dalam kegiatan ini juga melibatkan mahasiswa sehingga dapat menjadi media pembelajaran bagi mahasisiwa tersebut. Hasil pelatihan menunjukkan peningkatan pemahaman dan keterampilan aparatur desa dalam pengelolaan keuangan, dengan adanya perbaikan dalam sistem pengawasan internal dan integrasi antar sektor desa. Antusiasme dan partisipasi peserta sangat tinggi dalam mengikuti kegiatan. Pelatihan ini diharapkan dapat mendukung Desa Tapulaga untuk menjadi desa pesisir yang lebih maju, sejahtera untuk pembangunan desa mandiri berkelanjutan.
WORKSHOP MANAJEMEN USER DAN BANDWIDTH DENGAN ROUTER MIKROTIK UNTUK SISWA KELAS XII JURUSAN TKJ SMK N1 SUNGAILIAT Putra, Rendy Rian Chrisna; Dian Novianto; Wijaya, Benny; Setiawan Japriadi, Yohanes; Tommy, Lukas; Sujono; Brososaputro, Goenawan
Jurnal Pengabdian Masyarakat Berbasis Teknologi Vol 5 No 2 (2024): Volume 5, Nomor 2, Oktober 2024
Publisher : ISB Atma Luhur

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Dalam pengembangan dan peningkatan keterampilan dan kemampuan siswa yang ada di Indonesia terkhususnya di Bangka Belitung pada saat ini, dirasa perlu untuk melalukan pelatihan terhadap kemampuan kejuruan yang ada. Pada hal ini dikuhuskan pada jurusan Teknik Komputer dan Jaringan (TKJ). Dimana TKJ merupakan salah satu jurusan dengan minat yang tinggi pada Tingkat SMA. Diharapkan dengan adanya pelatihan ini dapat memberikan lebih banyak pilihan terhadap siswa Ketika lulus nanti. Selain itu kegiatan ini mererapkan metode ceramah dan diskusi serta pemecahan masalah yang ada yang didasari pada materi-materi pengembangan atau advance yang diperlukan. Hasil dari kegiatan ini adalag peningkatan kemampuan dan keterampilan siswa terhadap materi-materi yang ada pada TKJ. Kegiatan ini dilakukan selama 2 hari dan diikuti sekita 17 orang siswa. Dari hasil pemantauan terhadap kegiatan pengabdian masyarkat ini dapat ditarik Kesimpulan bahwa kegiatan seperti ini sangat diperlukan untuk kebutuhan terhadap menghadapi tantangan kedepannya
Mitigasi Serangan DNS Cache Poisoning Pada Local Area Network Berbasis Routerboard Mikrotik Novianto, Dian; Tommy, Lukas; Japriadi, Yohanes Setiawan; Sujono
Jurnal Ilmiah Informatika Global Vol. 15 No. 3: Desember 2024
Publisher : UNIVERSITAS INDO GLOBAL MANDIRI

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36982/jiig.v15i3.4816

Abstract

Domain Name System (DNS) enables users to access websites via domain names, offering convenient navigation. However, criminals can exploit this convenience to redirect connections from user devices to fake servers for a variety of purposes. A form of attack known as DNS cache poisoning exploits vulnerabilities in the Domain Name System (DNS) to redirect connections from a legitimate website address to an illegitimate one. As a consequence of the fact that users of networked systems are typically unaware that they are accessing an illegitimate site, this attack can have a particularly damaging impact. Such incidents can give rise to several issues, including the theft of data, the distribution of malware, and other security threats. To address this issue, this study employs a firewall in conjunction with DoH (DNS over HTTPS) and the utilization of registered certificates. The Domain Name System over HTTPS (DoH) protocol encrypts DNS requests and responses, preventing third parties (such as attackers who manipulate DNS) from reading or modifying DNS requests. The data employed in this study is derived from a review of existing literature. Furthermore, this study employs the PPDIOO model (Preparation, Planning, Design, Implementation, Operation, and Optimization) for the development of the network. Furthermore, the Mikrotik RB951ui-2Hnd routerboard is employed in this study. The outcome is the implementation of a multifaceted security strategy that effectively mitigates DNS cache poisoning attacks by 100%, while simultaneously reducing CPU usage to 11.5%. This approach enhances the security and reliability of user search activities on the internet.
Kajian Yuridis Peran Tentara Nasional Indonesia (TNI) Dalam Operasi Militer Selain Perang (OMSP) terkait Penanggulangan Tindak Pidana Terorisme Ikhwan Syahdi; Sujono
Indonesian Journal of Multidisciplinary Sciences (IJoMS) Vol. 3 No. 2 (2024): Indonesian Journal of Multidisciplinary Sciences (IJoMS)
Publisher : CV. Era Digital Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59066/ijoms.v3i2.1039

Abstract

The issue of the involvement of the Indonesian National Army in handling criminal acts of terrorism which will be accommodated through law has sparked public concern about the possibility of a shift in the mechanism for handling terrorism in Indonesia from a criminal justice model that prioritizes law enforcement, to a war model that prioritizes the deployment of military capacity. The title of this research is a Juridical Study of the Role of the Indonesian National Army (TNI) in Military Operations Other Than War (OMSP) Related to Countering Criminal Terrorism. Problem formulation: What is the legal review of the role of the Indonesian National Army (TNI) in military operations other than war related to handling criminal acts of terrorism based on applicable laws and regulations? What is the legal position and constraints of the Indonesian National Army in dealing with acts of terrorism? The research was carried out using a normative juridical approach. The data used is primary, secondary and tertiary data. Data analysis was carried out qualitatively and based on the results of the analysis, conclusions were then drawn using a deductive approach. The conclusion of this research is that through military operations other than war, the role of the TNI is not only limited to the military dimension, but also expands its function as a security guard in situations that threaten national order, although its position in the context of civil and military law is often debated. The TNI can operate under coordination with the police in accordance with Law no. 5 of 2018 concerning Eradication of Criminal Acts of Terrorism. However, this regulation has a weakness, namely that there is no operational mechanism that regulates the implementation of TNI assistance tasks.
Evaluation of organic farming field schools in Gunung Kidul Regency, special region of Yogyakarta Damayanti, Era Rizqi; Sujono; Nurlaela, Siti

Publisher : Fakultas Pertanian Universitas Yudharta Pasuruan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35891/agx.v15i2.4170

Abstract

????????????????????????????????????????????????: ???????????????????????????????????????? ???????? ???????????????????? ???????????????????????? ???????????????????????????????????????? ???????????????????? ???????? ???????? ???????????????????????????????? ???????? ???????????????? ???????????????????????? ???????????????????? ???????????????????????????????????????????????????? ???????????? ???????? ???????????????? ???????? ???????????????????????????? ???????????? ???????????????????????????? ???????? ???????????????????? ???????????????????????????? ???????? ???????????? ????????????????????????. ???????????????? ???????????????????? ???????????????? ???????? ???????????????????????????????????? ???????????? ???????????????????????????????????????????????????? ???????? ???????????????????????????? ???????????????????????????? ???????????????????? ???????????????????????????? ???????????????????? ???????? ???????????? ???????????????????? ???????????????????????????????????????? ???????????????????? (????????????????????????????, ????????????????????, ????????????????????????????, ????????????????????????????, ????????????????????????????), ???????????? ???????????????????????????????????? ???????? ???????????????????????????????? ???????????? ???????????????????????????????? ???????????????????????????? ???????????????????????????????????????????????????????? ???????? ???????????? ???????????????????????????????????????????????????? ???????? ???????????????????????????? ???????????????????????????? ???????????????????? ????????????????????????????, ???????????????????????????????????? ???????????????? ???????????????? ???? ???????????????????????????? ???????????????????????? ???????? ???????????? ???????????????????????????????????????????????????? ???????? ???????????????????????????? ???????????????????????????? ???????????????????? ????????????????????????????, ???????????? ???????????????????????????????????????????? ???????????????????????? ???????????????? ???????????? ???????? ???????????????????????????? ???????? ???????????????????????????????????? ????????????????????????????????. ????????????????????????: ???????????????? ???????????????????????????????? ???????????????????????? ???????? ???????? ???????????????????????????????????? ???????????????????????????? ???????????????????????????????????????????????????? ???????? ???????????????????????????? ???????????????????????????? ???????????????????? ???????????????????????????? ???????????????? ???? ???????????????????????? ???????? 50 ????????????????????????????. ???????????? ???????????????????????????????? ???????????????????????????????? ???????? ???????? ???????????????????????????????????? ????????????????????????????????????, ???????????????????????????????????? ????????????????????????????????????, ???????????????????????? ???????????????????? ????????????????????????????. ???????????????? ???????????????????????????????? ???????????????????? ???????????????????????????????? ???????????????????????? ???????????????????????????????????????? ???????????????? ????????????????????????????????. ????????????????????????????: ???????????? ???????????????????????????? ???????????????????????? ???????????????? ???????????? ???????????????????????????????????????????????????????? ???????? ???????????? ???????????????????????????? ???????????????????????????? ???????????????????? ???????????????????????? ???????? ???????????????????????????????????? ???????????????????????????????????? ???????????? ???????????????? ???????????????????????????????????????????? ???????????????? ???? ???????????????????? ???????????????????????????????????????? ???????????????????? ???????? 83.98% ???????????? ???? ???????????????????????????????????????????????? ???????????????????? ???????? 0.000 ???????? ???????????? ???????????????????????? ????-????????????????. ????????????????????????????????????????????????????????, ???????????? ???????????????????????????????????????????????????? ???????? ???????????? ???????????????????????????????????????????????????????? ???????? ???????????????????????????? ???????????????????????????? ???????????????????? ???????????????????????????? ???????? ???????????????????????????????????????? ???????? ???????????????????????????????? ????????????????????????????, ???????????????????????? ????????????, ???????????????????????????????????? ????????????????????, ???????????????????????????? ????????????????????????????????????????, ???????????????????? ???????? ???????????????????????? ????????????????????????????????????????????????????, ???????????? ???????????????????????????????????????????????? ???????????????????? ???????? ????????????????????????????, ???????? ???????????????? ???????? ???????????????????????????????? ????????????????????????????, ???????????????????????? ???????????? ???????????????? ???????? ???????????????????????? ???????????????????????? ???????????? ???????????? ???????????????? ???????? ???????????????????????????????????????????????? ???????????????????????????????????? ????????????????????????????. ????????????????????????????????????, ???????????? ???????????????? ???????? ???????????????????????????????????????????????? ???????????????????????????????????? ???????????????????????????? ???????????????????????????? ???????????? ???????????????????????????????????????????????????? ???????? ???????????????????? ???????????????????????? ????????????????????????????????????????????????????????. ???????????????? ???????????????????? ???????????????? ???????????? ???????????????? ???????? ???????????????????????????????????????????????? ???????????????????????????????????? ???????????????????????????? ???????? ???????? ???????????????????????????????????? ???????????????????????? ???????? ???????????????????????????????????????????? ???????????? ???????????????????????????????????????????????????? ???????? ???????????????????????????? ???????????????????????????? ???????????????????? ????????????????????????????. ????????????????????????????????????????: ???????????? ???????????????????????????? ???????????????????????????? ???????????????????? ???????????????????????? ???????? ???????????????????????????????????? ???????????????????????????????????? ???????? ???????????????? ???????????????????????????????????? ???????????? ???????????????????????????????????????????????????????? ???????????????????????????????????????? ???????? ???????????????????????????????? ???????????? ???????????????????????????????? ????????????????????????????, ???????????????????? ???????????????????????????????????? ???????????????????????????????????????? ???????? ???????????? ???????????????? ???????? ???????????????????????????????????????????????? ???????????????????????????????????? ????????????????????????????.
Parallel Hybrid Particle Swarm-Grey Wolf Algorithms for Optimal Load-Shedding in An Isolated Network Sujono; Priyadi, Ardyono; Pujiantara, Margo; Purnomo, Mauridhi Hery
Jurnal Nasional Pendidikan Teknik Informatika : JANAPATI Vol. 13 No. 1 (2024)
Publisher : Prodi Pendidikan Teknik Informatika Universitas Pendidikan Ganesha

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.23887/janapati.v13i1.76093

Abstract

In distribution networks integrated with distributed generation (DG), disconnection from the main grid reduces the power supply significantly. The power imbalance between DG generation and load degrades network stability. This paper proposes a hybrid parallel Particle Swarm Optimization - Grey Wolf Optimizer (PSGWO) algorithm for load shedding optimization. This optimization aims to reduce the DG power not absorbed by the remaining loads and maintain the voltage within the specified limits. The performance of PSGWO is tested on an IEEE 33 bus radial distribution system, considering loading levels of 80% to 140% of the baseload. At a 100% loading level, PSGWO showed the best performance, with a load shedding of 2.2297 MW and a voltage deviation of 0.0049. These values are the smallest compared to the results of the standard PSO and GWO algorithms. The PSGWO algorithm remains superior and converges faster than standard PSO and GWO at all loading levels.
Rekonstruksi Media Digital Berbasis QR Code Upaya Meningkatkan Kualitas Pembelajaran PAI Pada Siswa SMPN 3 Jombang emi; Zakiyyudin; Chusnul Chotimah; Sujono
Akademika Vol 18 No 2 (2024): Akademika
Publisher : Universitas Islam Lamongan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30736/adk.v18i2.2345

Abstract

Penelitian ini bertujuan merekonstruksi media digital berbasis QR Code menjadi media pembelajaran interaktif pada mata pelajaran Pendidikan Agama Islam (PAI) dan sebagai alternatif bagi guru untuk meningkatkan pemahaman siswa serta kualitas pembelajaran. Metode yang digunakan adalah Research And Development (R&D) dengan model ADDIE (Analysis, Design, Development, Implementation, Evaluation). Data dikumpulkan melalui observasi, angket, wawancara, dan dokumentasi, serta dianalisis secara kualitatif dan kuantitatif. Subyek penelitian adalah siswa kelas VIII SMPN 3 Jombang. Hasil penelitian menunjukkan media ini mendapatkan skor rata-rata 96% dari validator materi dan 93% dari validator media, sehingga dinyatakan sangat layak. Respon siswa terhadap efektivitas media mencapai skor rata-rata 72,90%, menunjukkan media QR Code efektif dan interaktif dalam pembelajaran
LEGAL CERTAINTY REGARDING THE IMPLEMENTATION OF GOVERNMENT REGULATION NUMBER 77 OF 2019 CONCERNING THE PREVENTION OF TERRORISM CRIMINAL ACTS AND PROTECTION OF INVESTIGATORS, PUBLIC PROSECUTORS, JUDGES AND CORRECTION OFFICERS Sidhiwaskita, I Gusti Agung Bagas; Sujono
JILPR Journal Indonesia Law and Policy Review Vol. 6 No. 2 (2025): Journal Indonesia Law and Policy Review (JILPR), February 2025
Publisher : International Peneliti Ekonomi, Sosial dan Teknologi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.56371/jirpl.v6i2.377

Abstract

Terrorism poses a threat and intimidation to national security, as acts of terrorism constitute actions that create the greatest danger to human rights. To anticipate the issue of terrorism crimes, Indonesia, as a rule of law state, has the obligation and responsibility to live safely, peacefully, and prosperously, as outlined in the constitutional mandate of the 1945 Constitution of the Republic of Indonesia. Therefore, further research will be conducted on the legal certainty of the implementation of Government Regulation Number 77 of 2019 concerning the prevention of terrorism crimes and the protection of investigators, public prosecutors, judges, and correctional officers, and the roles of the National Counterterrorism Agency (BNPT) and Detachment 88 in the prevention and eradication of terrorism crimes. The research method used is normative juridical. The research findings indicate that the implementation of Government Regulation 77/2019 as the execution of Law 5/2018 provides legal certainty for investigators, public prosecutors, judges, and correctional officers in combating and preventing terrorism crimes, as Government Regulation 77/2019 serves as the basis for all actions in counterterrorism. BNPT plays a role in prevention, protection, and deradicalization efforts, as well as in enforcement and capacity building, including international cooperation in addressing terrorism challenges. Detachment 88's role is to investigate reports of terrorist activities, arrest individuals or groups confirmed to be members of terrorist networks that could endanger the integrity and security of the Republic of Indonesia. The research results suggest that improvements should be made by legalizing material criminal penalties that include aggravated criminal threats in cases of attacks against law enforcement officers handling terrorism crimes, and the government should establish a new Special Law concerning the Protection and Counterterrorism of investigators, public prosecutors, judges, and correctional officers in Laws, Regulations, Government Regulations, and Regulations of the Ministry of Law and Human Rights.
LEGAL CONSIDERATIONS OF JUDGES IN APPLYING CRIMINAL SANCTIONS TO PERPETRATORS OF THE CRIMINAL ACTS OF MINING WITHOUT A PERMIT Sandjaya, Alfath; Sujono
JILPR Journal Indonesia Law and Policy Review Vol. 6 No. 2 (2025): Journal Indonesia Law and Policy Review (JILPR), February 2025
Publisher : International Peneliti Ekonomi, Sosial dan Teknologi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.56371/jirpl.v6i2.378

Abstract

The judge's legal considerations regarding the criminal case of illegal mining in Decision Number 17/Pid.B/LH/2023/Pn.Tdn and Decision Number 119/Pid.Sus-LH/2024/PN.Tdn that the judge in sentencing the defendant is linked to the theory of the legal system, namely: the aspect of the legal structure has not been running optimally due to weak coordination between institutions, limited human resources and technology in supervising mining areas, and the presence of certain officers involved in corrupt practices that hinder the process of strict law enforcement. From the aspect of legal substance, Law Number 3 of 2020 concerning Amendments to Law Number 4 of 2009 concerning Mineral and Coal Mining does not clearly state the minimum sentence. Therefore, the judge is given the freedom to impose a sentence, unless the law specifically states the regulations that are at least, as short as possible, and as light as possible. From the aspect of legal culture, society is often still permissive towards illegal mining practices, especially in areas that depend on the mining sector as their main source of income. Therefore, legal reform in the mining sector must be carried out comprehensively so that criminalization can truly be an effective instrument in suppressing the number of illegal mining in Indonesia.
URGENSI PENGELOLAAN RUANG UDARA DALAM MENJAMIN KEAMANAN NASIONAL DITINJAU DALAM PERSPEKTIF HUKUM Putu Sugiartha, I Gede; Sujono
MALA IN SE: Jurnal Hukum Pidana, Kriminologi, dan Viktimologi Vol. 2 No. 1 (2025): MALA IN SE: Jurnal Hukum Pidana, Kriminologi Dan Viktimologi (April)
Publisher : YAYASAN PENDIDIKAN DAN PELAYANAN KESEHATAN RAHMAT HUSADA

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The state has full and exclusive sovereignty over its airspace. A sovereign state has the right to regulate flight routes and secure its airspace, considering the strategic nature of airspace for defense and security. Violations of Indonesian airspace by both civil and state aircraft often occur. The problem studied is how to regulate and enforce the law against violations of state sovereignty according to international law and Indonesian national law. The research method used is normative legal research with a statute approach, historical approach, conceptual approach, and comparative approach. The results of the study are presented in analytical descriptive form. The results of the study conclude that both international and national law are not firm in determining the parameters of the legal status of an aircraft, whether a state aircraft or a civil aircraft. This can cause serious problems related to the laws that should apply to the aircraft. Another important thing that needs attention is the absence of firm regulations regarding the vertical limits of airspace sovereignty. Conditions and problems in airspace require regulations regarding comprehensive integrated airspace management into an integrated effort in planning, utilizing, controlling, and supervising airspace as a single area with land and sea space and space within the earth. It is necessary to review the applicable laws and whether their implementation has been maximized and the violators have been given sanctions so that it does not happen again. Therefore, the author is very interested in discussing the urgency of airspace management in ensuring national security reviewed from a legal perspective so that violations do not occur again and strict sanctions are given so that they can be a deterrent effect for violators.