Claim Missing Document
Check
Articles

Found 3 Documents
Search

The WIRELESS COMPUTER NETWORK MANAGEMENT SECURITY ANALYSIS Setyantoro, Dwipo; Afifah, Vivi; Hasibuan, Rika Astuti; Aprilia, Novi; Sari, Novi Permata
JITK (Jurnal Ilmu Pengetahuan dan Teknologi Komputer) Vol 7 No 2 (2022): JITK Issue February 2022
Publisher : LPPM Nusa Mandiri

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1211.463 KB) | DOI: 10.33480/jitk.v7i2.2786

Abstract

The use of a wireless computer network in some institutions has become a very flexible option to connect all users of the existing computer network in the institution. This flexibility also has the disadvantage that anyone with a network password can take advantage of the wireless network. The possibility of threats to information security is very large, such as the presence of intruders on the network. Therefore, it is necessary to manage wireless networks that pay attention to information security issues on the network. The Directorate General of New, Renewable Energy and Energy Conservation at the Ministry of Energy and the Human Resources Republic of Indonesia was chosen as the research location given that computer network users in this institution are diverse and have also used The Dude MikroTik application to manage wireless computer networks, which are instruments to analyze information security. in this institution. The analysis was conducted to identify the activities and effectiveness of information security management in this institution. This study concludes that the use of The Dude MikroTik application is quite helpful in analyzing information security on wireless computer networks in this institution.
IMPLEMENTATION OF BLOCKCHAIN TECHNOLOGY IN SCHOOLS Natalie, Regina Yoantika; Yani, Yuli; Ridwan, Ahmad; Setyantoro, Dwipo; Hikmah, Nurul
Jurnal Ilmiah Global Education Vol. 4 No. 4 (2023): JURNAL ILMIAH GLOBAL EDUCATION, Volume 4 Nomor 4, Desember 2023
Publisher : LPPM Institut Pendidikan Nusantara Global

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55681/jige.v4i4.1466

Abstract

The purpose of this study was to determine the level of understanding of schools with blockchain technology. The method used in this research is a literature study approach. Data collection through library research. Based on research data, researchers understand that the application of blockchain-based technology in schools plays a very important role because it makes it easier for teachers to teach, makes it easy for students to understand the material with a simple design, and makes teaching more effective and can control students well. Apart from this, blockchain makes it easy for transactions to pay school finances quickly and all data is recorded neatly without having to record it one by one.
Pengembangan Antarmuka Pengguna (User Interface) Sistem Pengelolaan Beasiswa Berbasis Website dengan Pendekatan Cognitive Walkthrough Tasya, Selviana; Setyantoro, Dwipo
IKRA-ITH Informatika : Jurnal Komputer dan Informatika Vol. 9 No. 2 (2025): IKRAITH-INFORMATIKA Vol 9 No 2 Juli 2025
Publisher : Fakultas Teknik Universitas Persada Indonesia YAI

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37817/ikraith-informatika.v9i2.4388

Abstract

An effective user interface (UI) is crucial in a web-based scholarshipmanagement system to ensure a good user experience and easy accessibility toinformation. However, many users still encounter difficulties using the existingsystem, necessitating a better design. This study aims to evaluate and improve theuser interface of the scholarship management system using the CognitiveWalkthrough approach. The Cognitive Walkthrough approach is used to identifyusability issues in the user interface. A prototype of the design solution was thentested through usability testing involving seven evaluators and five different taskscenarios using Maze. The results show that all evaluators were able to completethe task scenarios with a category 1 rating (no issues), although four evaluators experienced minor issues in task scenarios 1 and 2. Evaluators were slightlyconfused when searching for the latest requirements information and the ineffectiveuse of buttons. By implementing the suggested improvements based on the findingsfrom the Cognitive Walkthrough, the user interface in the scholarship managementsystem can be significantly enhanced, facilitating users in accessing the requiredinformation.