Claim Missing Document
Check
Articles

Business Intelligence Based on Kimball Nine-Steps Methodology for Monitoring the Feasibility of Goods in Market I Putu Agus Eka Pratama; I Made Sunia Raharja
International Journal of Advances in Data and Information Systems Vol. 4 No. 2 (2023): October 2023 - International Journal of Advances in Data and Information System
Publisher : Indonesian Scientific Journal

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25008/ijadis.v4i2.1301

Abstract

Consumer protection is of great concern to the Government of Indonesia through the supervision of goods on the market by the Department of Industry and Trade in each province. The Bali Provincial Office of Industry and Trade has transactional data from various data sources but has not been able to optimize it to support monitoring of goods circulating in the market. This research designs and implements a Data Warehouse-based Business Intelligence system using the Kimball Nine-Steps Methodology and Pentaho BI tools, to facilitate the storage and processing of goods data on the market, and monitor their feasibility. The results of this research show that the system can assist the Bali Province Industry and Trade Office in monitoring the feasibility of goods circulating in the market through the selection process for determining query priorities and query modes, as well as supporting decision-making processes and determining business strategies.
Pengujian High Availability pada Asynchronous DNS Berbasis Restknot menggunakan Algoritma Round Robin I Putu Agus Eka Pratama; Putu Veda Andreyana; Putu Ramaditya Nurjana
Jurnal Indonesia : Manajemen Informatika dan Komunikasi Vol. 5 No. 1 (2024): Jurnal Indonesia : Manajemen Informatika dan Komunikasi (JIMIK)
Publisher : Lembaga Penelitian dan Pengabdian Kepada Masyarakat (LPPM) AMIK Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/jimik.v5i1.582

Abstract

The existence of the Domain Name System (DNS) through the role of the DNS Record, functions to translate domain addresses into IP addresses. High availability is an absolute condition so that the service from the DNS Server is still available and running well. To make this happen, it is necessary to have an asynchronous API on the DNS server and data management on the DNS record. This research designs and implements RESTKnot as an asynchronous API on DNS Server for DNS record management, accompanied by high availability testing using Load Balancing techniques and the Round Robin (RR) algorithm. The test results show that RESTKnot can help the DNS record management process dynamically, where DNS records can be made through the RESTKnot API and RESTKnot CLI, to be sent to the RESTKnot agent and executed by Knot DNS. The test results also show that RESTKnot can realize high availability through a ten-time system access test scenario, where heavy traffic on the first web server can be immediately diverted to the second web server to achieve high availability.
Analisa Pola Penjualan Berbasis Data Warehouse Menggunakan Metode ETL dan OLAP (Studi Kasus: Restoran Khayangan Kuliner) Pratama, I Putu Agus Eka; I Komang Wahyu Hadi Permana
TEMATIK Vol 10 No 1 (2023): Tematik : Jurnal Teknologi Informasi Komunikasi (e-Journal) - Juni 2023
Publisher : LPPM POLITEKNIK LP3I BANDUNG

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.38204/tematik.v10i1.1317

Abstract

Sebagai salah satu restoran yang terdampak pandemi Covid19, Khayangan Kuliner mengalami penurunan penjualan serta perubahan pada pola penjualannya. Permasalahan utama pada penelitian ini yaitu Khayangan Kuliner belum memiliki sistem berbasis Teknologi Informasi (TI) untuk memudahkan proses analisis data dan menyederhanakan laporan bisnis mereka. Untuk itu, penelitian ini bertujuan membantu Khayangan Kuliner di dalam menyediakan sistem Data Warehouse untuk memudahkan mereka menganalisa data, mengetahui pola penjualan di masa pendemi, menentukan strategi penjualan, serta pengambilan keputusan. Langkah-langkah yang dilakukan di dalam penelitian meliputi pengumpulan data, pembuatan data multi dimensi, desain Data Warehouse, implementasi, pengujian, analisa, kesimpulan, dan dokumentasi. Penelitian ini menggunakan kombinasi metode On-Line Analytical Processing (OLAP) dan metode Extraction, Tranformation, Loading (ETL). Implementasi Data Warehouse menggunakan Talend Data Integration dan Tableau, untuk mendukung integrasi data pada semua jenis file, serta menghasilkan analisa dan laporan. Data dari sumber data diubah menjadi data multi dimensi untuk memudahkan proses analisa data. Hasil pengujian menunjukkan bahwa di masa pandemi (September 2021), menu makanan yang paling banyak terjual adalah gule dengan pembelian langsung di tempat. Report yang ditampilkan oleh sistem, membantu restoran Khayangan Kuliner di dalam melakukan analisa pola penjualan serta meningkatkan strategi penjualan dan pengambilan keputusan.
Smart Security Risk Management pada Bali Smart Island menggunakan OSINT, OTGv4.2, dan ISO 31000:2018 Pratama, I Putu Agus Eka
TEMATIK Vol. 10 No. 2 (2023): Tematik : Jurnal Teknologi Informasi Komunikasi (e-Journal) - Desember 2023
Publisher : LPPM POLITEKNIK LP3I BANDUNG

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The integration of web-based services and information on Bali Smart Island, on the one hand, provides convenience, but on the other hand raises issues of threats and risks related to system, data, and information security. Current security testing only uses OWASP and OSINT but is not accompanied by risk assessment and risk management. This research conducted security testing on the Bali Smart Island domain using a combination of OSINT and OWASP Testing Guide (OTGv4.2) accompanied by ISO 31000:208 risk assessment and risk management. The research uses experimental methodology with Proof of Concept (PoC) using the Harvester tool in the target domain. The test results measure the level of risk, accompanied by recommendations. The final results of the research show that the combination of OSINT, OTGv4.2, and ISO 31000:2018, can provide the best and most effective solution for information technology security risk management guidelines on the Bali Smart Island, through security testing, assessing security test results, evaluation, and providing recommendations post-evaluation system improvements. In the future, this research can be continued by using a combination of other tools and methods for web security.
Data Mining Association Rules Menggunakan Algoritma Apriori untuk Menemukan Pola Pembelian Wisatawan pada Pasar Seni Guwang Bali Pratama, I Putu Agus Eka
TEMATIK Vol. 10 No. 2 (2023): Tematik : Jurnal Teknologi Informasi Komunikasi (e-Journal) - Desember 2023
Publisher : LPPM POLITEKNIK LP3I BANDUNG

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

As one of the art markets of interest to tourists, the Guwang Art Market in Gianyar Regency, Bali, has purchased transaction data that has not been utilized optimally to help traders understand consumer purchasing patterns and the relationship between items as a basis for decision making. For this reason, in this research, DAMIARPRI was designed and implemented as a web-based system using Data Mining Association Rules and the Apriori Algorithm to manage consumer purchasing transaction data at the Guwang Art Market. This research uses the Design Science Research Methodology (DSRM) research methodology, with case study qualitative research methods, as well as the BlackBox Testing testing method. The research results show that the system can show information on consumer purchasing patterns and the relationship between items, where the items most frequently purchased by tourists are men's beach pants, followed by men's beach t-shirts and men's beach sandals, with a support value of 3% and confidence of 100%. Based on this, traders at the Guwang Art Market can make decisions to add these items to increase income. In the future, it is hoped that the system can be further developed according to user needs.
Manajemen Risiko Teknologi Informasi Terkait Manipulasi dan Peretasan Sistem pada Bank XYZ Tahun 2020 Menggunakan ISO 31000:2018 Pratama, I Putu Agus Eka; Pratika, Made Toby Sathya
Jurnal Telematika Vol. 15 No. 2 (2020)
Publisher : Yayasan Petra Harapan Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61769/telematika.v15i2.333

Abstract

PT XYZ is the largest private bank in Indonesia which was founded in 1955. The use of Information Technology (IT) at XYZ Bank has changed the mindset of the public in transactions. This can be seen from the ease with which online shopping and non-cash payments are made using the application. Along with the use of IT at XYZ Bank, it is necessary to pay attention to the risks that result from using IT. Risk is the possibility of an event occurring in making a decision. To meet the strategic objectives of using IT, a company must implement risk management called Enterprise Risk Management (ERM). Currently XYZ Bank has used the Operational Risk Management Framework (ORMF). This research will try to implement risk management using the ISO 31000: 2018 framework related to IT problems faced by XYZ Bank in 2020. The method used is the assessment process in ISO 31000: 2018 which includes risk identification, risk analysis, and risk evaluation. This research has obtained results in the form of a large enough chance of the problem to recur and it is necessary to reduce the risk impact. From this research, it is hoped that a conclusion can be drawn regarding the need for a review regarding the problems faced so that the business objectives of XYZ Bank can be achieved. PT XYZ adalah bank swasta terbesar di Indonesia yang berdiri pada tahun 1955. Penggunaan Teknologi Informasi (TI) pada Bank XYZ telah mengubah pola pikir masyarakat dalam bertransaksi. Hal ini terlihat dengan mudahnya belanja secara daring dan juga pembayaran secara nontunai menggunakan aplikasi. Seiring dengan penggunaan TI di Bank XYZ, perlu diperhatikan risiko yang diakibatkan dari penggunaan TI. Risiko adalah kemungkinan terjadinya suatu kejadian dalam pengambilan suatu keputusan. Untuk memenuhi tujuan strategis penggunaan TI, suatu perusahaan harus menerapkan manajemen risiko yang bernama Enterprise Risk Management (ERM). Saat ini Bank XYZ telah menggunakan Operational Risk Management Framework (ORMF). Penelitian ini akan mencoba untuk menerapkan manajemen risiko menggunakan framework ISO 31000:2018 terkait dengan permasalahan TI yang dihadapi oleh Bank XYZ di tahun 2020. Metode yang digunakan adalah dengan proses penilaian yang ada pada ISO 31000:2018 yang meliputi identifikasi risiko, analisis risiko, dan evaluasi risiko. Penelitian ini memperoleh hasil berupa peluang terjadinya kembali permasalahan tersebut cukup besar, sehingga perlu dilakukan pengurangan dampak risiko. Dari penelitian ini, diharapkan dapat diperoleh kesimpulan mengenai perlunya peninjauan ulang terkait masalah-masalah yang dihadapi, sehingga tujuan bisnis dari Bank XYZ dapat tercapai.
Implementation of E-HRM (Electronic Human Resource Management) with Zoho Application: A Case Study Krisnadinatha, I Gede Arya; Suarjaya, I Made Agus Dwi; Pratama, I Putu Agus Eka
JITTER : Jurnal Ilmiah Teknologi dan Komputer Vol 4 No 3 (2023): JITTER, Vol.4, No.3 December 2023
Publisher : Program Studi Teknologi Informasi, Fakultas Teknik, Universitas Udayana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24843/JTRTI.2023.v04.i03.p08

Abstract

Electronic Human Resource Management (e-HRM) is an information system that handles problems related to human resource management in an organization (company). The problem raised in this research is the company's limitations in the management of existing Human Resources (HR), with a proposed solution in the form of an integrated Human Resource management information system. In implementing this e-HRM system using tools from a third party, namely Zoho, Zoho is a platform that allows HRD / Personnel to carry out human resource management starting with the recruitment or outsourcing process and continuing with the process of managing existing human resource data in the company. From the research that has been done, the results that the use of modules contained in Zoho can help companies company by 83.22% in conducting employee management.
Evaluasi Keamanan TI pada PT. Bumi Lestari Bali (ecoBali Recycling) Geovaldo, I Putu Hendra; Suarjaya, I Made Agus Dwi; Pratama, I Putu Agus Eka
JITTER : Jurnal Ilmiah Teknologi dan Komputer Vol 3 No 1 (2022): JITTER, Vol.3, No.1, April 2022
Publisher : Program Studi Teknologi Informasi, Fakultas Teknik, Universitas Udayana

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (189.95 KB) | DOI: 10.24843/JTRTI.2022.v03.i01.p15

Abstract

Penelitian bertujuan untuk mengevaluasi kematangan keamanan teknologi informasi (TI) berada pada level berapa dalam penerapan layanan sistem informasi pada PT. Bumi Lestari Bali (ecoBali Recycling). PT. Bumi Lestari Bali (ecoBali Recycling) adalah perusahaan yang berfokus memaksimalkan daur ulang, mengurangi jumlah sampah ke Tempat Pembuangan Akhir dan mempromosikan pengomposan. EcoBali Recycling menjamin pembuangan sisa residu hanya di fasilitas legal. Dalam penelitian yang dilakukan menerapkan metode kualitatif dan kuantitaif dengan beberapa tahapan mulai dari wawancara, kusioner dan studi dokumen. Penelitian terfokus pada keamanan teknologi informasi. Proses TI yang didapat adalah EDM04, APO07, DSS05. Proses pemilihan domain dimulai dari identifikasi tujuan bisnis, identifikasi tujuan TI, identifikasi proses TI dan analisis tingkat..kepentingan berdasarkan titik kritis yang ditemukan dari tahap observasi dan wawancara. Hasil tingkat kapabilitas proses TI yang didapat untuk current capability pada instansi yaitu established process sedangkan target yang diinginkan instansi adalah predictable process.
The Testing for Information Gathering Using OWASP Testing Guide v4 (Case Study : Udayana University SIMAK-NG Application) Daniswara, Rasendriya Revo; Sasmita, Gusti Made Arya; Pratama, I Putu Agus Eka
JITTER : Jurnal Ilmiah Teknologi dan Komputer Vol 1 No 1 (2020): JITTER, Vol.1, No.1, August 2020
Publisher : Program Studi Teknologi Informasi, Fakultas Teknik, Universitas Udayana

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1084.624 KB)

Abstract

Web Application is the most used platform to develope an information system. The increased of web application technology is comparible as the risk, therefore web application must be tested first to make sure there is no risk or security issues on that application before it’s launch to public. Penetration testing is a method that test the web application security risk. The first step to do penetration testing is testing for information gathering, it is used help the tester to known the specification and vulnerability of the application. This study will implement testing for information gathering to Udayana University SIMAK-NG (Academic Information System) Application using OWASP Testing Guide Version 4 framework to known there is any security issues on that application. there are ten things that were tested, that is from OTG-INFO-001 until OTG-INFO-010 and the result is seven test get positif value.
Implementation of Security Information and Event Management (SIEM) for Monitoring IT Assets Using Alienvault OSSIM (Case Study: Udayana University Information Resources Unit) Anam, Fahri Choirul; Sasmita, Gusti Made Arya; Pratama, I Putu Agus Eka
JITTER : Jurnal Ilmiah Teknologi dan Komputer Vol 4 No 3 (2023): JITTER, Vol.4, No.3 December 2023
Publisher : Program Studi Teknologi Informasi, Fakultas Teknik, Universitas Udayana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24843/JTRTI.2023.v04.i03.p03

Abstract

One way that can be done to analyze cyber security equipment is by monitoring the logs it generates. Meanwhile, to be able to analyze the logs generated from each equipment requires a long time and has a high level of difficulty. When the management of the cyber security system is not going right, it causes the failure of the cyber security system. So a defense mechanism is needed on managing the log called Security Information and Event Management (SIEM) using Alienvault OSSIM tools. Threat Monitoring or monitoring of security threats in the Cyber world, is used to analyze, evaluate, and monitor network threats and as an end point for organizations to provide evidence of security threats, such as network intrusions, data exfiltration, ransomware and other malware attacks. The limitations of the problems carried out in this study were limited to Threat Monitoring using Alienvault OSSIM. There are 6 servers at the Udayana University Information Resources Unit (USDI) that are being monitored. Monitoring was carried out for 3 months. There were 230,622 Events or events that were collected as a whole. IT assets that have the most logs during monitoring are owned by DNS Servers with a total of 200,424 Events. There are 11 Event Names and 34 event logs that are discussed. The log is packaged in the form of a report along with an explanation, of course it can assist administrators in evaluating their IT assets. There is also an email notification feature using Gmail. Overall there are no attacks that are so significant with the low risk category. Alienvault OSSIM is proven to be able to carry out monitoring processes in real time properly and can help USDI to monitor the activities of its IT assets.
Co-Authors Adhigamika, Dewa Putu Surya Adinatha, Dewa Gde Eka Krisna Altry David Purba Anak Agung Bagus Arya Wiradarma Anam, Fahri Choirul Andreyana, Putu Veda Anindya, Tabina Dea Arista, I Putu Gede Eka Yuda Arya Widyaningrat, Made Gunawan Assegaf, Achmad Jefri Ayu Wirdiani Bernard, Rey Budi Rahardjo Butarbutar, Ryan Timothy Benget Daulat Daniswara, Rasendriya Revo Debora, Uli Rindu Dewa Gede Kesuma Yoga Dharmawangsa, I Dewa Gede Govindha Dharmesta, Putu Adhika Dwi Chayani, Ni Kadek Chita Dwi Putra Githa Efraim William Solang Gede Rasben Dantes Geovaldo, I Putu Hendra Gusti Agung Ayu Putri Gusti Made Arya Sasmita Hrikesa, I Gusti Ngurah Agung Agie I Gede Agus Pradipta I Gusti Agung Made Wirautama I Gusti Ayu Triwayuni I Ketut Adi Purnawan I ketut Gede Darma Putra I Komang Wahyu Hadi Permana I Made Adhiarta Wikantyasa I Made Agus Dwi Suarjaya I Made Candiasa I Made Oka Widyantara I Made Sunia Raharja I Made Sunia Raharja I Made Sunia Raharja, I Made Sunia I Nyoman Gunantara I Nyoman Piarsa I Putu Gede Eka Yuda Arista I Wayan Gus Arisna Ida Bagus Kade Taruna Irianto Yohanes Sampe Isna Wanda Robiulla Johan Tamin Kevin Christopher Bakkara Krisnadinatha, I Gede Arya Lampung, Pramayota Fane'a Linawati Linawati Linawati Liukae, Herry Daniel Prasetia Mahaputra, Putu Andre Maharani, Ni Putu Berliana Mahawardana, Putu Pasek Okta Meilani, Ni Putu Cindy Mohammad Ernico Suryo Wicaksono Muhammad Syakurrahman NI Kade Mega Handayani Ni Made Ika Marini Mandenni nugraha, gemara adiyasa parahita Nurjana, Putu Ramaditya Pramayota Fane'a Lampung Pratika, Made Toby Sathya pratiwi, Dewa Ayu gandhi Prawira, I Gede Denis Yuda Purniawan, I Made Arta Putra, I Putu Bayu Aditya Putra, Yogiswara Dharma Putu Adhika Dharmesta Putu Adhika Dharmesta Putu Bayu Suarnata Wahyu Putra Putu Ramaditya Nurjana Putu Veda Andreyana Putu Veda Andreyana Radityawan, I Wayan Ananta Reyhan Todo Noer Yamin Riani, Dinda Sasmita, Gusti Arya Sasmita, Gusti Made Arya Satriya, Rizki Dwi Syakurrahman, Muhammad Theca Difa Yulian Syahputri Wati, Ni Luh Made Adi Dharma Wibowo, I Kadek Tribuana Tungga Wicaksono, Mohammad Ernico Suryo Wiradarma, Anak Agung Bagus Arya Wiranatha, A. A. Kt. Agung Cahyawan Yogiswara Dharma Putra