Claim Missing Document
Check
Articles

Found 11 Documents
Search

Analisis Pengukuran Kinerja Teknologi Informasi Transaksi E-toll Menggunakan Metode IT Balanced Scorecard pada PT Jasa Marga Cabang Surabaya-Gempol Shiba, Sarah Hasna; Taniwijaya, Haryanto; Slamet, Slamet
Jurnal Sistem Informasi dan Komputerisasi Akuntansi (JSIKA) Vol 10, No 1 (2021)
Publisher : Jurnal Sistem Informasi Universitas Dinamika (JSIKA)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (2237.048 KB)

Abstract

Unit teknologi informasi memiliki peran yang sangat penting dalam mendukung proses bisnis pada suatu perusahaan, salah satunya adalah PT Jasa Marga. Unit teknologi informasi ini wajib memberikan dukungan kepada perusahaan yaitu mengolah dan menyampaikan informasi kepada seluruh elemen eksistensi dalam bentuk teknologi informasi. PT Jasa Marga sebagai penyedia jalan bebas hambatan telah memberlakukan pembayaran non-tunai yaitu Electronic Toll (E-toll). Tujuan dari penelitian ini adalah untuk melakukan pengukuran kinerja teknologi informasi transaksi E-toll pada PT Jasa Marga cabang Surabaya-Gempol dengan menggunakan metode IT Balanced Scorecard (IT BSC). IT BSC akan mengukur kinerja departemen TI dari empat perspektif, yaitu Kontribusi Instansi, Orientasi Pengguna, Penyempurnaan Operasional dan Orientasi Masa Depan. Hasil penelitian yang telah dilakukan menggunakan mix method yang menunjukkan bahwa PT Jasa Marga khususnya Tol Surabaya Gempol telah memenuhi 2 perspektif berkategori baik dan 2 perspektif berkategori cukup.
Analisis Pengukuran Kinerja Teknologi Informasi Transaksi E-toll Menggunakan Metode IT Balanced Scorecard pada PT Jasa Marga Cabang Surabaya-Gempol Shiba, Sarah Hasna; Taniwijaya, Haryanto; Slamet, Slamet
Jurnal Sistem Informasi dan Komputerisasi Akuntansi (JSIKA) Vol 10, No 1 (2021)
Publisher : Jurnal Sistem Informasi Universitas Dinamika

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Unit teknologi informasi memiliki peran yang sangat penting dalam mendukung proses bisnis pada suatu perusahaan, salah satunya adalah PT Jasa Marga. Unit teknologi informasi ini wajib memberikan dukungan kepada perusahaan yaitu mengolah dan menyampaikan informasi kepada seluruh elemen eksistensi dalam bentuk teknologi informasi. PT Jasa Marga sebagai penyedia jalan bebas hambatan telah memberlakukan pembayaran non-tunai yaitu Electronic Toll (E-toll). Tujuan dari penelitian ini adalah untuk melakukan pengukuran kinerja teknologi informasi transaksi E-toll pada PT Jasa Marga cabang Surabaya-Gempol dengan menggunakan metode IT Balanced Scorecard (IT BSC). IT BSC akan mengukur kinerja departemen TI dari empat perspektif, yaitu Kontribusi Instansi, Orientasi Pengguna, Penyempurnaan Operasional dan Orientasi Masa Depan. Hasil penelitian yang telah dilakukan menggunakan mix method yang menunjukkan bahwa PT Jasa Marga khususnya Tol Surabaya Gempol telah memenuhi 2 perspektif berkategori baik dan 2 perspektif berkategori cukup.
An enhanced classification framework for intrusions detection system using intelligent exoplanet atmospheric retrieval algorithm Slamet Slamet; Izzeldin Ibrahim Mohamed Abdelaziz
Bulletin of Electrical Engineering and Informatics Vol 11, No 2: April 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v11i2.3308

Abstract

Currently, many companies use data mining for various implementations. One form of implementation is intrusion detection system (IDS). In IDS, the main problem for nuisance network administrators in detecting attacks is false alerts. Regardless of the methods implemented by this system, eliminating false alerts is still a huge problem. To describe data traffic passing through the network, a database of the network security layer (NSL) knowledge discovery in database (KDD) dataset is used. The massive traffic of data sent over the network contains excessive and duplicated amounts of information. This causes the classifier to be biased, reduce classification accuracy, and increase false alert. To that end, we proposed a model that significantly improve the accuracy of the intrusion detection system by eliminating false alerts, whether they are false negative or false positive negative alerts. The results show that the proposed intelligent exoplanet atmospheric retrieval (INARA) algorithm has improved accuracy and is able to detect new attack types efficiently.
Intelligent Rule Firewall berbasis Linux menggunakan Association Rule Mining untuk Peningkatan Adaptive Response Attack slamet slamet; Norma Ningsih
Journal of Technology and Informatics (JoTI) Vol. 3 No. 1 (2021): Vol.3 No.1 (2021)
Publisher : Universitas Dinamika

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (330.285 KB) | DOI: 10.37802/joti.v3i1.188

Abstract

Kompleksitas jaringan dan kebutuhan transaksi bisnis yang berkembang membuat organisasi harus semakin terbuka terhadap dunia, sehingga potensi serangan dari dalam dan dari luar jaringannya semakin meningkat. Salah satu mekanisme perlindungan yang serius dan murah adalah dengan menerapkan firewall berbasis linux untuk menjaga pintu masuknya serangan. Fitur dasar firewall tidak efektif untuk menjaga serangan yang terjadi terus-menerus dan dinamis, sehingga diperlukan sistem firewall cerdas agar bisa adaptif terhadap jenis serangan dan kondusif terhadap kondisi paket terkini. Pada dasarnya, set firewall menerima atau menolak tindakan untuk paket secara default. Dalam paper ini, peneliti mengusulkan untuk menambahkan kecerdasan buatan pada firewall default. Log firewall sebagai representasi keluar masuknya trafik diolah menggunakan association rule mining. Hasilnya, (a) firewall mampu adaptif terhadap perilaku data di jaringan, (b) firewall mampu membuat sekaligus memperbaiki aturan kebijakan dirinya sendiri dan paket-paket anomali sehingga dapat diterapkan sebagai konfigurasi firewall yang efektif.
Pengujian Penetrasi pada Windows 10 menggunakan Model Penetration Testing Execution Standard (PTES) Delfan Azhar Andhika; Slamet; Norma Ningsih
Journal of Technology and Informatics (JoTI) Vol. 3 No. 2 (2022): Vol.3 No.2 (2022)
Publisher : Universitas Dinamika

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (357.844 KB) | DOI: 10.37802/joti.v3i2.222

Abstract

Windows 10 adalah sistem operasi yang digunakan oleh banyak orang, organisasi dan perusahaan. Windows 10 sendiri memiliki bug (kerentanan) saat pertama kali diinstal oleh pengguna. Bug (kerentanan) ini dapat mengganggu proses yang ada, beberapa pengaturan tidak berfungsi sebagaimana mestinya kemudian jika bug (kerentanan) digunakan untuk sesuatu yang tidak legal, juga dapat menyebabkan data tidak dapat diakses (ransomware), menghapus data pengguna hingga merusak sistem Windows 10 itu sendiri. Solusinya adalah dengan melakukan pengujian penetrasi pada sistem operasi Windows 10 dan menemukan bug (kerentanan) sesuai dengan metode yang digunakan yaitu model Penetration Testing Execution Standard (PTES), menggunakan tools yang sesuai tahapan pada model Penetration Testing Execution Standard (PTES). Hasil pengujian penetrasi menggunakan model Penetration Testing Execution Standard (PTES) menunjukkan bahwa dengan tools yang tepat, peneliti dapat mencari bug (kerentanan) yang ada pada sistem Windows 10 dan menambalnya.    
WORKSHOP JARKOM BERBASIS CISCO DAN MIKROTIK UNTUK PERSIAPAN UJI KOMPETENSI KEAHLIAN (UKK) BAGI GURU DAN MURID DI SMK KARTIKA 1 SURABAYA Slamet Slamet; Heri Pratikno; Yoppy Mirza Maulana
Share : Journal of Service Learning Vol. 7 No. 1 (2021): FEBRUARY 2021
Publisher : Institute of Research and Community Outreach - Petra Christian University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (511.618 KB) | DOI: 10.9744/share.7.1.1-7

Abstract

Uji Kompetensi Keahlian  (UKK) merupakan penilaian yang  diselenggarakan khusus bagi siswa SMK untuk mengukur pencapaian kompetensi siswa. UKK dilaksanakan di akhir masa studi oleh Lembaga  Sertifikasi Profesi atau satuan pendidikan terakreditasi bersama mitra dunia usaha dan industri. Hasil  UKK bagi peserta  didik akan menjadi indikator ketercapaian standar kompetensi lulusan. Sedangkan bagi stakeholder, hasil UKK dijadikan sumber informasi atas kompetensi yang dimiliki  calon tenaga kerja. Materi  UKK disusun berdasarkan skema sertifikasi sesuai dengan jenjang kualifikasi peserta uji yang memuat kemampuan melaksanakan pekerjaan spesifik, operasional, dan penjaminan mutu. Kendala yang sering terjadi yaitu tidak semua sekolah bisa menyiapkan peralatan sesuai standar industri. Kendala lain dalam persiapan pelaksanaan UKK adalah kemampuan guru yang tidak standar sebagai penguji atau pemateri internal dalam ujian-ujian UKK, sehingga kemampuan siswa dalam menerima materi dan menyelesaikan soal-soal UKK juga menjadi masalah. Untuk itu dilakukan pelatihan untuk membantu para guru produktif dan murid-murid SMK Kartika 1 Surabaya dalam meningkatkan pengetahuannya, khususnya terkait dengan materi jaringan berbasis Cisco dan Mikrotik. Hasil yang telah dicapai dalam pengabdian ini adalah pembuatan modul-modul latihan, pemberian materi secara konseptual dan praktik dalam sebuah workshop seperti setting dan simulasi peralatan, serta adanya peningkatan kemampuan peserta pelatihan terkait jaringan komputer guna mempersiapkan UKK di SMK Kartika 1 Surabaya.
PERTAHANAN PENCEGAHAN SERANGAN SOCIAL ENGINEERING MENGGUNAKAN TWO FACTOR AUTHENTICATION (2FA) BERBASIS SMS (SHORT MESSAGE SYSTEM) Slamet Slamet
SPIRIT Vol 14, No 2 (2022): Spirit
Publisher : LPPM ITB Yadika Pasuruan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53567/spirit.v14i2.260

Abstract

Advances in digital technology have made communication between humans faster and easier. On the other hand, a lot of personal information is available online through social media and services that do not have security measures in place to protect this information. Therefore, the communication system is very vulnerable and easily penetrated by intruder due to social engineering attacks. This attack aims to deceive individuals or companies by taking actions that benefit the attacker. The trick is to provide personal data such as PIN numbers, health records, and passwords. This attack phenomenon is one of the biggest challenges in maintaining the security of personal data because this attack model takes advantage of human nature which is easy to trust others. This paper provides an in-depth survey of high-success social engineering attacks, using a 2 Factor Authentication (2FA) model by examining user accounts, to detect and avoid attempted account fraud via SMS (Short Message System). Experimental results show that attack success can be reduced to 10% and aggressive intruders can be caught by 70% of users in forwarding user verification code.
Pelatihan jaringan komputer dan keamanannya bagi dosen dan mahasiswa Dili Institute of Technology (DIT) di Undika Surabaya Slamet Slamet
TEKMULOGI: Jurnal Pengabdian Masyarakat Vol 3, No 1 (2023): Mei 2023
Publisher : Universitas Pendidikan Indonesia (UPI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.17509/tmg.v3i1.58074

Abstract

The Dili Institute of Technology (DIT) is a non-profit, community-based educational organization that focuses on meeting the higher education and vocational training needs of young people, veterans of the resistance, and the children of veterans. It is dedicated to providing general education and training that will help the country become more technically and commercially skilled, creating a workforce that can satisfy the needs of the corporate, public, and community sectors in Timor Leste. Its mission is to provide high-quality education and training based on international standards at undergraduate and postgraduate levels, and in professional training. To prepare students to obtain good qualifications and professions that are adequate to meet constraints, especially those related to network management skills and security measures. Class lecturers and computer laboratory assistants only know the theory of using computers, but lack advanced skills about networks and security to teach students. To deal with this problem, it is necessary to provide understanding and practice to DIT lecturers and students regarding computer networks and their security. The preparation of activities is carried out directly in a participatory manner so that lecturers and students can understand and implement the use of computer networks and their security. The result is training and understanding of network fundamentals for lecturers to transfer their skills to students, while students can deepen their knowledge in the field of networks and security systems. Practical skills in implementing this security using special devices from Cisco and Mikrotik.
Workshop digital marketing dan implementasi media sosial untuk akselerasi penjualan bagi pelaku UMKM di kelurahan Kedung Baruk Surabaya Slamet Slamet; Siswo Martono
TEKMULOGI: Jurnal Pengabdian Masyarakat Vol 2, No 1 (2022): Mei 2022
Publisher : Universitas Pendidikan Indonesia (UPI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (650.25 KB) | DOI: 10.17509/tmg.v2i1.45389

Abstract

MSMEs have been proven to be able to encourage the country's economic progress. The existence of MSMEs cannot be eliminated or avoided from the nation's society today. Its existence is very useful in terms of distribution of community income. The problem that is often experienced by MSME actors is the lack of experience in managing their business. Many of the MSME players only focus on producing goods, but do not think about how to expand their business. The effect is that it is difficult to increase the business and the business that is carried out is running in place. In addition, the difficulty in distributing goods is a factor that causes the distribution of goods to be less widespread. This is because the perpetrators have not been able to do their marketing online and after that the average of these MSMEs experienced a decline in sales and distribution of goods. From the problems faced, an appropriate business development strategy is needed and the important role of the government. The internet technology-based coaching approach is carried out for MSME actors. The development of the internet supports progress in all aspects including business and business transactions using digital marketing and social media that can be used by MSME actors in increasing sales and developing their business. This community service activity is carried out for MSME actors, in Kedung Baruk Village, Surabaya. It is recorded that 17 MSMEs are engaged in food and beverage, handicrafts, grocery stores, printing, and fashion.
Penggunaan teknologi informasi untuk mengelola data imunisasi dan gizi pada posyandu Kureksari kecamatan Waru Sidoarjo Slamet Slamet; Siswo Martono; I Gusti Alit Widana P; Ferdiansyah Darmawan
TEKMULOGI: Jurnal Pengabdian Masyarakat Vol 2, No 2 (2022): November 2022
Publisher : Universitas Pendidikan Indonesia (UPI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (3066.047 KB) | DOI: 10.17509/tmg.v2i2.51042

Abstract

Posyandu is one of the main programs of the Government of Indonesia related to public health services, especially for the health of infants, toddlers and pregnant women. Routine activities carried out by posyandu include monitoring pregnant women, monitoring growth and providing immunizations for infants, toddlers and pregnant women. Posyandu is usually driven by selected cadres with guidance from health workers in their area. The Sakura Posyandu located in Kureksari Village, Waru District, Sidoarjo Regency has activities that empower and provide convenience to the community in obtaining basic health services. The main goal is to reduce maternal and infant mortality. In the management of immunization and nutrition data, the data input process is still carried out in two stages, namely by entering the cadres' books and maternal and child health books. This often results in redundancy and data loss, in addition to inefficient time and asynchronous data between the original and stored data. Therefore, it is necessary to apply immunization and nutrition data management at the Sakura Posyandu to facilitate the management of the data they have. As a result, the processing process becomes more efficient, there is no duplicate data and data retrieval becomes faster.