Claim Missing Document
Check
Articles

Found 4 Documents
Search

Prototipe Virtual Tour Campus Menggunakan Metode 360 Degree Panning Satya Arisena Hendrawan; Diky Wardhani
BRITech, Jurnal Ilmiah Ilmu Komputer, Sains dan Teknologi Terapan Vol 2 No 1 (2020): Periode Juli
Publisher : Institute Teknologi dan Bisnis Bank Rakyat Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The benefits of using the internet to find articles or information can be easily accessed by anyone in various circles. In the field of information technology, many different ways of processing data, both in the form of text, images and sound, are developed using various interactive visual methods. So that it changes the presentation of information delivery used to stimulate thoughts, feelings, attention and knowledge that is more than the information presented (Suryani et al. 2018). This became the basis for research and changed the delivery of information about the BRI Institute campus and introduced it to the public in the form of a 360 panoramic image. This research uses the Multimedia Development Life Cycle method.
The Effect of Using End-to-End Encryption in Improving Data Security in Cloud Computing Satya Arisena Hendrawan; Legito; Muhammad Bitrayoga; Jatmiko Wahyu Nugroho; Arnes Yuli Vandika
International Journal of Health, Economics, and Social Sciences (IJHESS) Vol. 7 No. 1: January 2025
Publisher : Universitas Muhammadiyah Palu

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.56338/ijhess.v7i1.6941

Abstract

Cloud Computing offers various advantages, but also presents major challenges related to data security. End-to-end encryption (E2EE) is considered as a solution to mitigate threats to the security of data stored and processed in the cloud. This research aims to examine the effect of implementing E2EE encryption in improving data security in Cloud Computing. Using a qualitative approach with literature study and secondary data analysis, this research focuses on three main threat categories: data leakage, unauthorized access, and cyberattacks. The results show that E2EE encryption can reduce the incidence of data leakage by 80%, unauthorized access by 83.3%, and cyberattacks by 78.6%. Despite its effectiveness, E2EE encryption implementation faces challenges in encryption key management and potential degradation in system performance. Therefore, good key management and multifactor authentication are essential to ensure data security. This study concludes that although end-to-end encryption improves security, a thorough policy, including key management and access control, is needed to maximize data protection in Cloud Computing.
Metode End User Computing Satisfication untuk Analisis Kepuasan Pengguna E-Learning MyCyber Satya Arisena Hendrawan; Syifa Nurlaeli Muthmainnah
Innotech: Jurnal Ilmu Komputer, Sistem Informasi dan Teknologi Informasi Vol 2 No 1 (2025): Innotech Issue Januari 2025
Publisher : Universitas Siber Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

There is an error in the attendance recording, as well as a lack of notification features and replayable instructional videos. These issues impact user satisfaction and experience when engaging with the E-Learning of MyCyber. A study was conducted on the Indonesian Cyber University e-learning website to measure user satisfaction using the End User Computing Satisfaction (EUCS) method. Data collection was carried out through observation, literature review, and questionnaires. Partial analysis of user satisfaction from 80 active student respondents at Indonesian Cyber University revealed that 3 variables positively influenced user satisfaction: accuracy, ease of use, and timeliness, while content and format did not have a significant effect. Meanwhile, the simultaneous test results showed that the variables content, accuracy, format, ease of use, and timeliness influenced the satisfaction of users of the Indonesian Cyber University e-learning website by 83.8%. Recommendations for Indonesian Cyber University include improving and optimizing its e-learning website, particularly in content and information presentation, to enhance user satisfaction when using the E-Learning.
Analisa dan Perancangan E-Commerce Kerajinan Tangan Penyandang Disabilitas (Studi Kasus: Desa Krebet Ponorogo, Jawa Timur) Satya Arisena Hendrawan; Anang Martoyo; Diky Wardhani
Journal of Informatics and Advanced Computing (JIAC) Vol 2 No 2 (2021): Journal of Informatics and Advanced Computing
Publisher : Universitas Pancasila

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35814/jiac.v2i2.3262

Abstract

Lembaga Rumah Kasih Sayang telah memproduksi produk kreatif hasil kerajinan tangan penyandang disabilitas. Produk yang terjual pun tidak sesuai harapan yang diinginkan lembaga. Sebulan hanya ada 1 sampai 3 produk yang terjual dan itu pun konsumen membeli datang ke tempat atau titip ke saudara terdekat. Keberlangsungan adanya teknologi informasi sangat bermanfaat terutama di zaman saat ini. Manusia dapat menggunakan seperangkat smartphone dapat mengakses dan mendapatkan informasi serta dapat transaksi jual-beli. Telah terpikirkan oleh Lembaga Rumah Kasih Sayang (RKS) untuk menerapkan sistem informasi E-Commerce yang nantinya akan membantu memasarkan dan menjual produk tersebut. Tujuan penelitian ini adalah menganalisa dan merancang E-Commerce bagi Lembaga RKS sehingga dapat produktif. Sistem E-Commerce sudah berjalan dan itu mengalami perubahan dari sisi penjualan yang lebih meningkat.