p-Index From 2021 - 2026
5.047
P-Index
This Author published in this journals
All Journal Scan : Jurnal Teknologi Informasi dan Komunikasi Jurnal Informatika dan Teknik Elektro Terapan Jurnal Sistem Informasi dan Bisnis Cerdas Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) INTECOMS: Journal of Information Technology and Computer Science JURNAL TEKNOLOGI DAN OPEN SOURCE JSiI (Jurnal Sistem Informasi) Progresif: Jurnal Ilmiah Komputer Jurnal Manajemen Informatika dan Sistem Informasi JATI (Jurnal Mahasiswa Teknik Informatika) Jifosi Nusantara Science and Technology Proceedings Computer Science (CO-SCIENCE) Jurnal Nasional Holistic Science Konstelasi: Konvergensi Teknologi dan Sistem Informasi Prosiding Seminar Nasional Teknik Elektro, Sistem Informasi, dan Teknik Informatika (SNESTIK) Journal of Artificial Intelligence and Engineering Applications (JAIEA) Jurnal Publikasi Ilmu Komputer dan Multimedia Jurnal Sistem Informasi dan Bisnis Cerdas JUSIFOR : Jurnal Sistem Informasi dan Informatika Prosiding Seminar Nasional Rekayasa Teknologi Industri dan Informasi ReTII Jurnal Sistem Informasi dan Ilmu Komputer Jurnal Rekayasa Sistem Informasi dan Teknologi Sagita Academia Journal Router : Jurnal Teknik Informatika dan Terapan Merkurius: Jurnal Riset Sistem Informasi dan Teknik Informatika Neptunus: Jurnal Ilmu Komputer dan Teknologi Informasi Saturnus: Jurnal Teknologi dan Sistem Informasi Router : Jurnal Teknik Informatika dan Terapan Journal of Golden Generation Multidisciplinary Jurnal Nasional Teknologi Informasi dan Aplikasinya
Claim Missing Document
Check
Articles

Analisis Manajemen Risiko Teknologi Informasi pada Dinkominfo Surabaya Menggunakan Metode Failure Mode and Effect Analysis (FMEA) Fidyah Salsabila Putri Sillehu; Marisca Amanda Hidayat; Raihana Sakhi Aswanda; Audrey Septya Rosanti; Agung Brastama Putra; Amalia Anjani Arifiyanti
Merkurius : Jurnal Riset Sistem Informasi dan Teknik Informatika Vol. 3 No. 4 (2025): Juli : Merkurius : Jurnal Riset Sistem Informasi dan Teknik Informatika
Publisher : Asosiasi Riset Teknik Elektro dan Informatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61132/merkurius.v3i4.947

Abstract

The use of information technology (IT) in the government sector requires structured risk management to ensure the continuity of public services. The Department of Communication and Information Technology (Dinkominfo), as a digital service provider, faces various potential risks such as network disruptions, hardware failures, and cyberattacks that could interfere with daily operations. This study employs the Failure Mode and Effect Analysis (FMEA) method to identify, analyze, and formulate strategies to mitigate existing IT risks. Through the FMEA approach, each potential failure is evaluated based on its severity, occurrence, and detection capability, which are then used to calculate a Risk Priority Number (RPN). The analysis reveals that the highest RPN values are associated with information system errors, hardware failures, and network overloads. As mitigation measures, the study recommends conducting regular system audits, upgrading network capacity, and performing preventive maintenance on devices. This approach demonstrates that FMEA is an effective method for managing IT risks within government institutions.
Analisis Keamanan Website E-learning ILMU2 Menggunakan Metode Open Web Application Security Project ZAP (OWASP ZAP) Shalsabila Titanie Harianto; Zahrah Aliyah Rachman; Aliyyah Nabiilah Farahdita; Fahryan Putra Ramadi; Agung Brastama; Siti Mukaromah
Neptunus: Jurnal Ilmu Komputer Dan Teknologi Informasi Vol. 3 No. 3 (2025): Agustus : Neptunus : Jurnal Ilmu Komputer Dan Teknologi Informasi
Publisher : Asosiasi Riset Teknik Elektro dan Informatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61132/neptunus.v3i3.887

Abstract

The development of e-learning platforms has transformed the landscape of education by providing flexible and accessible learning methods. However, security threats targeting web-based applications pose significant risks to the confidentiality, integrity, and availability of academic data. This research aims to analyze the security vulnerabilities of the ILMU2 e-learning website at UPN “Veteran” Jawa Timur using the Web Application Security Project Zed Attack Proxy (OWASP ZAP) methodology. The study applies a black-box testing approach to simulate attacks and identify potential weaknesses in the website's security mechanisms. Expected findings include the identification of vulnerabilities such as cross-site scripting (XSS), SQL injection, and security misconfigurations. The results are intended to provide insights for improving the security posture of the ILMU2 platform and contribute to the broader discourse on securing educational technology in higher education institutions.
Implementasi Hak Akses untuk Meningkatkan Keamanan Manajemen Hotel ABC Berbasis Database MySQL Sukma, Wahyu Nisfu Melati; Kotalima, Rikha Maisya; Gazani, Hisyam Abiansyah; Fitri, Anindo Saka; Putra, Agung Brastama
Prosiding Seminar Nasional Teknik Elektro, Sistem Informasi, dan Teknik Informatika (SNESTIK) 2025: SNESTIK V
Publisher : Institut Teknologi Adhi Tama Surabaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31284/p.snestik.2025.7370

Abstract

Sistem manajemen hotel memerlukan pengelolaan data yang efektif dan aman untuk melindungi informasi sensitif seperti data tamu, transaksi, dan informasi pribadi lainnya. Penelitian ini mengimplementasikan mekanisme hak akses berbasis MySQL guna meningkatkan keamanan sistem manajemen hotel. Desain  hak akses dikembangkan berdasarkan peran staf hotel, meliputi manajer, resepsionis, dan tamu, yang masing-masing diberikan hak akses sesuai kebutuhan operasionalnya. Implementasi dilakukan menggunakan perintah SQL seperti GRANT dan REVOKE melalui terminal CMD untuk memastikan pengelolaan hak akses yang sesuai. Hasil pengujian menunjukkan bahwa penerapan hak akses yang terstruktur dapat mengurangi risiko pelanggaran keamanan, meningkatkan efisiensi operasional, dan memperkuat kepercayaan pengguna terhadap sistem. Penelitian ini memberikan kontribusi signifikan terhadap pengembangan sistem manajemen berbasis database dengan fokus pada keamanan data.
Analisis dan Penerapan Manajemen Risiko Keamanan Sistem Informasi di RSUD XYZ Menggunakan Metode OCTAVE Allegro Al-Ghiffari, Syafiq; Bahri, Elsa Maya; Permatasari, Reisa; Putra, Agung Brastama
Prosiding Seminar Nasional Teknik Elektro, Sistem Informasi, dan Teknik Informatika (SNESTIK) 2025: SNESTIK V
Publisher : Institut Teknologi Adhi Tama Surabaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31284/p.snestik.2025.7157

Abstract

Penggunaan teknologi informasi sangat penting bagi operasional rumah sakit, namun memiliki risiko yang mengancam kelangsungan bisnis jika tidak dikelola dengan baik. Penelitian ini menilai risiko keamanan informasi di RSUD XYZ dengan menggunakan kerangka kerja OCTAVE Allegro, dengan fokus pada aset informasi penting seperti data pasien dan rekam medis elektronik (EMR). Analisis menyoroti integritas sebagai kebutuhan keamanan utama untuk aset-aset ini. Temuan utama mengungkapkan bahwa kepercayaan dan reputasi pelanggan merupakan area yang paling kritis dalam penilaian risiko, dengan strategi mitigasi yang disesuaikan berdasarkan tingkat risiko. Ancaman berisiko tinggi membutuhkan mitigasi segera, ancaman berisiko sedang membutuhkan tindakan terencana, dan ancaman berisiko rendah dikelola melalui pemantauan berkala. Strategi mitigasi yang diusulkan meliputi otentikasi dua faktor, enkripsi data, dan pelatihan keamanan karyawan. Penelitian ini memberikan pemahaman yang komprehensif tentang manajemen risiko aset informasi dan menawarkan solusi praktis untuk meningkatkan keamanan dan efisiensi operasional RSUD XYZ. 
ANALISIS DATA PENCARI KERJA DI DINAS PERINDUSTRIAN TENAGA KERJA KOTA SURABAYA DENGAN MENGGUNAKAN EDA DAN PCA Dewi Safitri, Triyatul; Anjani Arifiyanti, Amalia; Brastama Putra, Agung
JATI (Jurnal Mahasiswa Teknik Informatika) Vol. 9 No. 4 (2025): JATI Vol. 9 No. 4
Publisher : Institut Teknologi Nasional Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36040/jati.v9i4.13929

Abstract

Ketidakseimbangan dalam penyaluran tenaga kerja di Kota Surabaya menjadi tantangan bagi Dinas Perindustrian dan Tenaga Kerja Kota Surabaya. Pencari kerja mempunyai latar belakang yang beragam seperti tingkat pendidikan, usia pengalaman kerja dan kondisi lainnya yang dapat mempengaruhi kesiapan dari pencari kerja. Penelitian ini bertujuan untuk menganalisis data pencari kerja di Dinas Perindustrian dan Tenaga Kerja Kota Surabaya menggunakan Exploratory Data Analysis (EDA) dan Principal Component Analysis (PCA). EDA digunakan untuk mengidentifikasi pola dan karakteristik pencari kerja berdasarkan faktor – faktor seperti usia, tingkat pendidikan, pengalaman kerja, status pernikahan, status disabilitas, dan lainnya. PCA diterapkan untuk mereduksi dimensi data serta menemukan faktor utama yang berkontribusi terhadap kesiapan kerja. Hasil penelitian ini menunjukkan bahwa reduksi dimensi menghasilkan PC 1, PC2 dan PC 3 yang menjelaskan total varians terbesar dalam data. Faktor dominan yang mempengaruhi pengelompokkan pencari kerja adalah terdapat 3 komponen utama yang mempunyai korelasi yang cukup besar terhadap pembentukan pengelompokan pencari kerja adalah nama program studi dengan nilai varians paling tinggi pertama yaitu 97,2%, diikuti oleh kombinasi faktor usia, pengalaman kerja, status pernikahan, jumlah anak dan status disabilitas dengan varians 1,51% serta faktor pengalaman kerja, tingkat pendidikan, sertifikat mendapatkan varians 1,04%.
Pengembangan Aplikasi Manajemen Litabmas Pendanaan Mandiri dengan Pendekatan Hierarchical Model-View-Controller (HMVC) Wahyuni, Eka Dyar; Afandi, Mohamad Irwan; Putra, Agung Brastama
Computer Science (CO-SCIENCE) Vol. 4 No. 1 (2024): Januari 2024
Publisher : LPPM Universitas Bina Sarana Informatika

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31294/coscience.v4i1.2965

Abstract

In higher education, overseeing the execution of litabmas activities is a challenging and error-prone task, particularly when done manually through the physical submission of documents. Information is not always readily available, archives are frequently lost or even damaged, and tracing Litabmas external responsibility (articles, journals, patents/IPRs, etc.) from earlier periods can be challenging. This article describes how the Waterfall approach was used to construct the Litabmas management application. The Hierarchical Model-View-Controller (HMVC) technique is used to build the code architecture during the coding process. By reducing intermodular dependencies, this method makes it easier for a team to design an application. This application was developed to facilitate the management of the full cycle of Litabmas activity implementation for users, from generating Litabmas master data to initiating the Litabmas period, submitting proposals, conducting evaluations, and reporting Litabmas outputs and outcomes. The application has been tested using the black box method, and as a result, 23 use cases from six levels of users —administrator, head of institutional research, researcher, reviewer, auditor, and general visitor access rights —have been generated. All of these usecase have 100% of the expected output produced by the application.
Analisis Risiko Keamanan Siber Website Peken Surabaya Menggunakan Standar ISO 27005:2019 dan OWASP ZAP Cynthia Widya Lestari; Nurul Izzah; Puti Tsabita Najwa Arief; Muhammad Ananda Giovanny R; Agung Brastama Putra
Saturnus: Jurnal Teknologi dan Sistem Informasi Vol. 3 No. 3 (2025): Juli: Saturnus: Jurnal Teknologi dan Sistem Informasi
Publisher : Asosiasi Riset Teknik Elektro dan Informatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61132/saturnus.v3i3.983

Abstract

The rapid growth of information technology has driven digital transformation in various sectors, including micro, small, and medium enterprises (MSMEs), the backbone of the Indonesian economy. In response to the challenges and opportunities of digitalization, the Surabaya City Government launched the Peken e-commerce platform on October 31, 2021. This platform aims to help MSMEs market their products online, expand market reach, and increase competitiveness. However, the use of digital systems also presents new challenges, particularly in terms of cybersecurity. Dependence on technology opens the door to various threats that can compromise data confidentiality, integrity, and availability. This study aims to analyze and evaluate information security risks on the Peken Surabaya website using a risk management approach based on the ISO/IEC 27005:2019 standard. The analysis method involves identifying information assets, recognizing potential threats, identifying vulnerabilities, and assessing risk levels based on the likelihood of occurrence and impact. To support the analysis, technical testing was also conducted using the Open Web Application Security Project Zed Attack Proxy (OWASP ZAP) tool. The research results indicate that most of the risks faced by Peken Surabaya are moderate to very high. These risks include Distributed Denial of Service (DDoS) attacks, user data leaks, and the lack of a two-factor authentication (2FA) system. Based on these findings, a risk management strategy was developed using the Risk Modification, Risk Sharing, Risk Retention, and Risk Avoidance approaches. Furthermore, this study recommends security controls based on ISO/IEC 27005 and OWASP Top 10 to enhance system protection. These findings emphasize the importance of implementing international standards-based risk management in maintaining the continuity and security of digital public services, particularly those supporting the MSME sector in the digital era.
Penerapan Metode Time Series Dalam Forecasting Penjualan Pada “Nasi Goreng Bacot” Bagas Adil Putrajaya; Agung Brastama Putra; Rizka Hadiwiyanti
Neptunus: Jurnal Ilmu Komputer Dan Teknologi Informasi Vol. 2 No. 3 (2024): Agustus: Neptunus: Jurnal Ilmu Komputer Dan Teknologi Informasi
Publisher : Asosiasi Riset Teknik Elektro dan Informatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61132/neptunus.v2i3.244

Abstract

The restaurant industry in Indonesia has experienced significant growth, driving the need for data-driven strategies to remain competitive. This study aims to apply and compare time series methods in forecasting sales at "Nasi Goreng Bacot" restaurant. The methods used are Simple Moving Average (SMA), Weighted Moving Average (WMA), and Single Exponential Smoothing (SES), with a focus on sales data from the year 2023.The research results indicate that SMA provides the most accurate predictions, with a Mean Absolute Error (MAE) value of 296.67, Mean Squared Error (MSE) of 129055.6, and Mean Absolute Percentage Error (MAPE) of 3.02%. WMA and SES, although useful in certain data conditions, show higher error rates in this case. This study confirms the effectiveness of SMA in the context of stable and less fluctuating restaurant sales data. With these results, restaurants can plan their inventory of raw materials and workforce more efficiently, reduce waste, and improve customer satisfaction.
Design and Construction of a Web-Based MSME E-Marketplace Application Using the Agile Method (Case Study: Kepanjenlor Village, Blitar City) Jannah, Ayu Roudhotul; Putra, Agung Brastama; Wibowo, Nur Cahyo
Holistic Science Vol. 5 No. 2 (2025): Jurnal Nasional Holistic Sciences
Publisher : Lembaga Riset Mutiara Akbar NOMOR AHU-0003295.AH.01.07 TAHUN 2021

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.56495/hs.v5i2.1227

Abstract

MSMEs play a vital role in the local economy, yet many MSMEs in Kepanjenlor Village, Blitar City, have not utilized digital technology for product promotion and sales. This study aims to design and build a web-based e-marketplace application to support online product marketing. The approach used is the Agile method with iterative stages: planning, design, development, testing, deployment, and review. System data was obtained through observation and interviews, with design using UML and Figma, implementation using Laravel, and testing using the Black Box Testing method achieving an accuracy score of 92%. The result is an e-marketplace application that supports registration, login, product catalog, ordering, and MSME data management features. This application has been tested and received a positive response, and is considered capable of meeting the digitalization needs of MSMEs in Kepanjenlor Village, Blitar City.
Implementation of Enhanced Spray Routing Protocol for VDTN On Surabaya Smart City Scenario Agussalim; Agung Brastama Putra
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 7 No 4 (2023): August 2023
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29207/resti.v7i4.4494

Abstract

The application of smart-city, which promises better city management in helping to improve people's quality of life, is still inhibited due to the high cost of infrastructure investment. In several Smart Cities, it takes at least $ 30 - 40 billion to convert a conventional town into a smart city, including for data collection infrastructure. Alternatively, low-power wide-area networks (LPWANs) could be considered, but they need more bandwidth to serve data transmission in a smart city. Vehicle Delay Tolerant Network (VDTN) is one part of DTN that employs vehicles as a communication infrastructure that allows communication in challenging conditions and could make it an alternative network for Data Collection in a Smart City. This paper proposes a Surabaya Smart City scenario with VDTN as data collection. The scenario consists of 40 wireless sensors and 50 to 200 vehicles (car and bus) with five Road Side Units that forward data from the sensor to the monitoring server. Furthermore, to increase the VDTN performance, we improve our proposed routing protocol, Spray and Hop Distance (SNHD), with two sprays method (Adaptive and Simple) and data collection support from multiple sources and destinations. The evaluation was carried out using a simulation-based comparison with an increase in the number of vehicles to determine the impact of vehicle density on data collection performance in terms of delivery probability, latency average, and overhead ratio. Based on the simulation results, the simple spray method in SNHD and A-SNHD outperformed the well-known VDTN routing protocol, i.e., Epidemic and Spray and Wait. Furthermore, when the number of cars increases from 50 to 200, the performance of VDTN does not increase significantly as the density of the network increases. It means that VDTN only requires a small number of vehicles to be used as a low-cost alternative network for smart cities.
Co-Authors Abdul Rezha Efrat Najaf Afif Ghani Zahran Agussalim Agussalim, Agussalim Ahmad Mustofa.K.Pasya Al-Ghiffari, Syafiq Aliyyah Nabiilah Farahdita Amalia Anjani Arifiyanti Angga Zakaria Ardiansyah, Vangga Mahyudin Arista Pratama Audrey Septya Rosanti Audy Fitri Ariani Aufa, Taqiyuddin Ahmad Al Ayu Ithriah, Syurfah Bagas Adil Putrajaya Bahri, Elsa Maya Cahyo Wibowo, Nur Canang Cita Gemilang Chairunnisa, Zulfa Firnanda Chilmi, Farid Cynthia Widya Lestari Dewi Safitri, Triyatul Dhian Satria Yudha Kartika Eka Wahyudinarti Eliezer M Putra S EMILIA ROSA Fahryan Putra Ramadi Falah, Nailul Feby Dwiputra Setyawan Fidyah Salsabila Putri Sillehu Firnanda Putri, Adelia Fitri, Anindo Saka Gazani, Hisyam Abiansyah Hanafi, Rizwan Hanafi, Rizwan Haq, Ahmad Nashirul Hilal Abdullah Hilal Abdullah Jannah, Ayu Roudhotul Kotalima, Rikha Maisya Kusumantara, Prisa Marga Lestari, Farah Putri Marisca Amanda Hidayat Maulana, Abdullah Mohamad Irwan Afandi Mohamad Riza Ramadhani Oding Mohammad Bintang Fajar Muhammad Ananda Giovanny R Muhammad Januar Pribadi Muhammad Rizky Rahmatul Anam Murtadho Yanwar, Ringgo Najma Choirun Nisa Nugroho, Budi Nugroho, Budi Nur Hayati, Siti Nurul Izzah Permatasari, Reisa Priambodo, Bangkit Puti Tsabita Najwa Arief Putri Andini Rachmatika Ragil, Sandi Raihana Sakhi Aswanda Ramdhan Ariansyah Rima Tsaniyah Amilatus Sholihah Rivaldy, Adriano Femaz Rizka Hadiwiyanti Rizka Hadwiyanti Rizki Akbar, Rizki Safitri Pradhistya Suwandi Seftin Fitri Ana Wati Shalsabila Titanie Harianto Shofiyyatul Badriyyah Sukma, Wahyu Nisfu Melati Tri Luhur Indayanti Sugata Wahyu Imam Syafii Wahyu Wicaksono Wahyuni, Eka Dyar Wajendra Dewi, Marylda Salma Wibowo, Annisa Raudya Wibowo Wibowo, Nur Cahyo Windy Fadhilah Susanti Wuryanto, Kevin Yohanes Wuryanto Yessy Arye Yustraini Yuli Pratiwi, Ela Zahrah Aliyah Rachman Zahrah Hayat Arka Putri