Claim Missing Document
Check
Articles

Found 5 Documents
Search

STRATEGI PEMASARAN PT. PRIMAGRAPHIA DIGITAL: ANALISIS KINERJA DI LINGKUNGAN PLATFORM MARKETPLACE Suryanto, Yohan
Khazanah Multidisiplin Vol 5, No 1 (2024): Khazanah Multidisiplin
Publisher : UIN Sunan Gunung Djati Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15575/kl.v5i1.34198

Abstract

Penelitian ini bertujuan untuk menganalisis faktor-faktor yang mempengaruhi fluktuasi penjualan PT. Primagraphia Digital di marketplace selama tahun 2022. Melalui pendekatan deskriptif kualitatif, data diperoleh dari wawancara dengan lima informan internal perusahaan. Hasil penelitian menunjukkan bahwa fluktuasi penjualan dipengaruhi oleh berbagai faktor, termasuk perubahan selera konsumen, kondisi pasar, dan kualitas layanan. Faktor-faktor musiman seperti bulan Ramadhan dan Idul Fitri juga memiliki dampak signifikan. Penelitian ini menyimpulkan bahwa perusahaan perlu terus melakukan evaluasi dan penyesuaian strategi pemasaran untuk mengatasi fluktuasi penjualan dan mempertahankan pertumbuhan yang stabil dalam jangka panjang.
CRYPTOGRAPHIC PROTOCOL SECURITY IN NATIONAL ENCRYPTION APPLICATIONS Widodo, Agung; Suryanto, Yohan
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 2 (2023): JUTIF Volume 4, Number 2, April 2023
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2023.4.2.744

Abstract

In the era of digital transformation, information exchange, especially confidential and strategic information has become the most vital aspect for almost all organizations. Various bad precedents regarding classified and strategic information leaks in Indonesia have become a slap in the face that must be acknowledge and answered with effective solutions. In 2020, XYZ Agency developed a file encryption application (ABC Application) to address the challenge of securing confidential information, especially those transmitted on electronic channels. Until 2022, the ABC Application has been implemented in a limited scope and its implementation is planned to be expanded nationally. After 2 years of operation, the XYZ Agency has conducted a study on the security of the algorithm used in ABC Application, but unfortunately has not conducted an in-depth study regarding the security of the protocol suite used in the Application. In this research, a security analysis of ABC application protocol suites, namely the registration protocol, user verification, key generation, and key request for the encryption-decryption process protocol was conducted through formal verification approach using the Scyther Tool. The analysis focuses on aspects of guaranteeing confidentiality of information and authentication with four criteria, namely secrecy, aliveness, synchronization, and agreement. The experimental results showed that these protocols meet the security criteria for the transmitted confidential information but have general weaknesses in the authentication aspect, especially for synchronization and agreement criteria. Based on these weaknesses, technical recommendations are proposed that are able to overcome the identified weaknesses.
Design of Information Security Risk Management Framework Based on a Risk Profiling Study in the Healthcare Sector Dewi, Amalia Fitri; Suryanto, Yohan
MULTINETICS Vol. 8 No. 1 (2022): MULTINETICS Mei (2022)
Publisher : POLITEKNIK NEGERI JAKARTA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32722/multinetics.v8i1.4532

Abstract

The healthcare sector is currently becoming one of the paramount targets for cyberattacks. The utilization of information technology in the healthcare sector triggers the emergence of its varied vulnerabilities. Information security risk management is considered one of obligatory jobs for healthcare sector organizations. This study aims at constructing an information security risk management framework in the healthcare sector based on a study of its existing risk profile. This research employed qualitative method. Based on risk profiling results, the healthcare sector had two critical assets, namely electronic health records and Internet of Medical Things. These assets had high sensitivity, however, had numerous vulnerabilities that were prone to exploitations. In order to overcome this, an information security risk management framework consisting of four stages is proposed, namely Risk Profiling, Risk Level Assessment, Risk Treatment, and Monitoring. Risk Profiling is a vital stage in the risk management process. This stage is performed to produce an overview of the information security risk profile resulted from critical assets owned by the organization and the condition of cyberspace in the information security in the healthcare sector. The proposed framework is cyclical as the risk profile in the healthcare sector is dynamic. Thus, monitoring changes in the organization's risk profile is imperative. The proposed framework design was tested in Puskesmas XYZ which is  kind of health care facility agencies. The resul of the testing is there are seven risks in the information security contex. There are three High Level riskd and four Medium Level risks. All the risks are reduced by applying some controls. The result of the evaluation of proposed framework state that it has described the sequence of security risk management stage, all activities in information security risk management are includes, and the proposed framework can be applied to health care facilities.
STRATEGI PEMASARAN PT. PRIMAGRAPHIA DIGITAL: ANALISIS KINERJA DI LINGKUNGAN PLATFORM MARKETPLACE Suryanto, Yohan
Khazanah Multidisiplin Vol. 5 No. 1 (2024): Khazanah Multidisiplin
Publisher : UIN Sunan Gunung Djati Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15575/kl.v5i1.34198

Abstract

Penelitian ini bertujuan untuk menganalisis faktor-faktor yang mempengaruhi fluktuasi penjualan PT. Primagraphia Digital di marketplace selama tahun 2022. Melalui pendekatan deskriptif kualitatif, data diperoleh dari wawancara dengan lima informan internal perusahaan. Hasil penelitian menunjukkan bahwa fluktuasi penjualan dipengaruhi oleh berbagai faktor, termasuk perubahan selera konsumen, kondisi pasar, dan kualitas layanan. Faktor-faktor musiman seperti bulan Ramadhan dan Idul Fitri juga memiliki dampak signifikan. Penelitian ini menyimpulkan bahwa perusahaan perlu terus melakukan evaluasi dan penyesuaian strategi pemasaran untuk mengatasi fluktuasi penjualan dan mempertahankan pertumbuhan yang stabil dalam jangka panjang.
Comparative Analysis and Design of Cybersecurity Maturity Assessment Methodology Using NIST CSF, COBIT, ISO/IEC 27002 and PCI DSS Sulistyowati, Diah; Handayani, Fitri; Suryanto, Yohan
JOIV : International Journal on Informatics Visualization Vol 4, No 4 (2020)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.4.4.482

Abstract

Data or Information security in today's digital era is crucial in every organization that needs to pay attention. Management of organizational information is one of the components in realizing Good Corporate Governance. The measure of an adequate level of protection is an indicator of the cybersecurity awareness aspects of an organization's business processes in the short, medium, and long term, especially in the field that deals with information and communication technology (ICT). To make this happen, it requires a security standard that is appropriate and follows its needs to help organizations know the maturity level of cybersecurity in protecting its information security. The ABC organization is one of the Government agencies that manage the critical infrastructure and Indonesian digital economies. The organization has currently implemented several international security standards through its planning, implementation, evaluation document, and ICT activities.  However, based on the national information security readiness assessment, information security management readiness results are still not optimal. In this study, an analysis of the NIST, ISO 27002, COBIT, and PCI DSS security standards has been carried out, which are ABC organizational security standards in managing ICT by assigned tasks and functions. Furthermore, the analysis result is used as materials for drafting a cybersecurity maturity framework through the four standard approaches that have become the basis for ICT management. The proposed concept of twenty-one integrated cybersecurity categories is expected to be a capital in measure ICT management performance in ABC organizations.