p-Index From 2021 - 2026
9.933
P-Index
This Author published in this journals
All Journal Dinamik Seminar Nasional Aplikasi Teknologi Informasi (SNATI) Jurnal Pendidikan Teknologi dan Kejuruan Bulletin of Electrical Engineering and Informatics Jurnal Teknologi Informasi dan Ilmu Komputer Jurnal Edukasi dan Penelitian Informatika (JEPIN) PROCEEDING IC-ITECHS 2014 SMATIKA E-Dimas: Jurnal Pengabdian kepada Masyarakat Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Jurnal CoreIT Indonesian Journal of Artificial Intelligence and Data Mining JOURNAL OF APPLIED INFORMATICS AND COMPUTING Jurnal Teknoinfo Technomedia Journal KOMPUTIKA - Jurnal Sistem Komputer Komputasi: Jurnal Ilmiah Ilmu Komputer dan Matematika Jurnal Tekno Kompak Building of Informatics, Technology and Science Indonesian Journal of Electrical Engineering and Computer Science JOURNAL OF INFORMATION SYSTEM RESEARCH (JOSH) Journal of Computer System and Informatics (JoSYC) Jurnal Teknik Informatika (JUTIF) JTIKOM: Jurnal Teknik dan Sistem Komputer Jurnal Informatika dan Rekayasa Perangkat Lunak Jurnal Ilmiah Infrastruktur Teknologi Informasi Jurnal Teknologi dan Sistem Informasi Journal Social Science And Technology For Community Service Jurnal Teknologi Pendidikan : Jurnal Penelitian dan Pengembangan Pembelajaran Bulletin of Computer Science Research Journal of Informatics Management and Information Technology KLIK: Kajian Ilmiah Informatika dan Komputer AKM: Aksi Kepada Masyarakat Jurnal WIDYA LAKSMI (Jurnal Pengabdian Kepada Masyarakat) Jurnal Ilmiah Sistem Informasi Akuntansi (JIMASIA) Journal of Engineering and Information Technology for Community Service Jurnal Ilmiah Edutic : Pendidikan dan Informatika Malcom: Indonesian Journal of Machine Learning and Computer Science Jurnal Pengabdian Masyarakat Bangsa Bulletin of Informatics and Data Science Jurnal Ilmiah Computer Science Journal of Information Technology, Software Engineering and Computer Science Management of Information System Journal JUSTINDO (Jurnal Sistem dan Teknologi Informasi Indonesia)
Claim Missing Document
Check
Articles

Found 10 Documents
Search
Journal : PROCEEDING IC-ITECHS 2014

The Future of Enterprise Systems Integrating Metaverse, Web 3.0, and Extended Reality Setiawan, Randi; Sulistiani, Heni
IC-ITECHS Vol 5 No 1 (2024): IC-ITECHS
Publisher : LPPM STIKI Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32664/ic-itechs.v5i1.1561

Abstract

The convergence of emerging technologies such as the metaverse, Web 3.0, and extended reality (XR) is poised to reshape the landscape of enterprise systems, offering unprecedented opportunities for innovation and user experience. This paper explores the transformative potential of these technologies within the context of enterprise systems, focusing on their implications for user interaction, data management, business processes, and collaboration. We delve into the unique features of each technology and how they can be integrated into existing enterprise systems to enhance user engagement, streamline workflows, and foster new business models. Furthermore, we analyze the challenges and ethical considerations associated with implementing these cutting-edge technologies, highlighting the need for responsible development and ethical guidelines. Ultimately, this paper aims to shed light on the exciting future of enterprise systems as they embrace the transformative power of the metaverse, Web 3.0, and XR, paving the way for a more immersive, interconnected, and innovative business landscape.
SOA-Based IT Infrastructure Planning Strategy to Optimize Network Management in Companies Putri, Nanda Aulia; Umami, Nila Niswatun; Sulistiani, Heni; Amelia, Siska
IC-ITECHS Vol 5 No 1 (2024): IC-ITECHS
Publisher : LPPM STIKI Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32664/ic-itechs.v5i1.1608

Abstract

This research aims to develop a Service Oriented Architecture (SOA)-based information technology (IT) infrastructure planning strategy to optimize network management in the company. In the increasingly complex digital context, companies require flexible and integrated IT infrastructure to enhance operational efficiency. The methodology used includes stakeholder needs analysis and mapping of network management functions based on the FCAPS reference. (Fault, Configuration, Accounting, Performance, Security). Through interviews and observations of the current infrastructure conditions, this research found that the implementation of SOA can enhance interoperability between applications and simplify the management of IT resources. The resulting design includes logical and physical topologies aimed at improving the reliability and security of the network management system. It is expected that the implementation of this strategy will enhance service performance and provide added value to the company in facing dynamic business challenges.
Advamcement of Technology and ITS Impact on Modern Society Maheswari, Diva Afirlia; Syakuru, Nazwa; Rahmadany, Loisha Adellia; Sulistiani, Heni
IC-ITECHS Vol 5 No 1 (2024): IC-ITECHS
Publisher : LPPM STIKI Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32664/ic-itechs.v5i1.1609

Abstract

This study explores the rapid advancements in technology and their impact on modern society, focusing on sectors such as communication, healthcare, education, transportation, and entertainment. It examines the positive contributions of technological innovations while addressing challenges like cybersecurity threats, privacy concerns, and automation. The research employs qualitative analysis, integrating data from various academic sources. The findings reveal that technological advancements significantly improve efficiency and accessibility, but ethical considerations are crucial for sustainable progress.
Improving Network Security: Protection Strategies in the Digital Age Andre, Muhammad Fabio; Alfarizi, Ferdian; Falssava, Jossa Neka; Sulistiani, Heni
IC-ITECHS Vol 5 No 1 (2024): IC-ITECHS
Publisher : LPPM STIKI Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32664/ic-itechs.v5i1.1622

Abstract

Network security is an important factor in protecting data in the digital era. Threats such as DDoS attacks and malware can damage information systems. This article discusses network protection strategies, including the use of firewalls, encryption, VPNs, and Zero Trust Security. In addition, the implementation of multi-factor authentication and user awareness are also identified as crucial mitigation measures. By utilizing technologies such as artificial intelligence, threat detection can be done more efficiently. This research aims to provide practical solutions to improve network security and reduce the risk of cyber attacks.
The Role of Software Engineering in Digital Transformation of Industry 4.0 naufal, wandi; Dimas, Novario; Tauhid, Naufal; Sulistiani, Heni
IC-ITECHS Vol 5 No 1 (2024): IC-ITECHS
Publisher : LPPM STIKI Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32664/ic-itechs.v5i1.1623

Abstract

Industry 4.0 is characterized by the adoption of advanced technologies that are changing the way companies operate, interact with customers, and produce products. One of the key factors in the success of digital transformation in this era is software engineering. Innovative and flexible software is the foundation for the implementation of technologies such as the Internet of Things (IoT), artificial intelligence (AI), big data, and automation that support modern industrial operations. This article discusses the critical role of software engineering in accelerating the adoption of Industry 4.0, with a focus on developing software that supports interoperability, scalability, and security in an ever-evolving digital ecosystem. It also discusses the challenges faced by software developers, including the need for new skills, integration of legacy systems, and management of big data generated by devices and sensors. With the right software engineering approach, companies can harness the full potential of Industry 4.0 technologies to improve operational efficiency, productivity, and innovation.(Furstenau et al., 2020)
Mengoptimalkan Bisnis dengan IoT: Solusi Cerdas untuk Masa Depan Anwar, Rian; Sulistiani, Heni
IC-ITECHS Vol 5 No 1 (2024): IC-ITECHS
Publisher : LPPM STIKI Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32664/ic-itechs.v5i1.1625

Abstract

internet of Things (IoT) telah menjadi teknologi yang sangat relevan dalam mengoptimalkan bisnis di berbagai sektor. Penelitian ini bertujuan untuk mengeksplorasi bagaimana IoT dapat meningkatkan efisiensi operasional, mengurangi biaya, serta memberikan wawasan lebih dalam untuk pengambilan keputusan berbasis data dalam bisnis. Melalui survei dan wawancara dengan para profesional di industri yang telah mengadopsi IoT, penelitian ini menemukan bahwa penggunaan IoT di berbagai bidang seperti manufaktur, logistik, dan ritel memberikan manfaat yang signifikan dalam meningkatkan produktivitas, pengelolaan sumber daya, dan pengalaman pelanggan. Namun, tantangan utama yang dihadapi adalah masalah keamanan data dan integrasi dengan sistem yang ada. Penelitian ini menyimpulkan bahwa meskipun tantangan tersebut ada, potensi besar IoT dalam mengoptimalkan bisnis memberikan keunggulan kompetitif yang signifikan bagi perusahaan yang dapat mengelolanya dengan baik.
ERP Effectiveness in Improving Production Efficiency Alfikri, Valbian; Anwar, Adi Khairul; Prananta, Gery; Sulistiani, Heni
IC-ITECHS Vol 5 No 1 (2024): IC-ITECHS
Publisher : LPPM STIKI Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32664/ic-itechs.v5i1.1626

Abstract

This research specifically investigates how the implementation of ERP systems impacts the operational performance of manufacturing companies. By analyzing the literature and conducting case studies, this research uncovers potential efficiency improvements in various aspects, including reduced production time, optimized use of resources, and improved data quality. The results of this study are expected to provide valuable recommendations for manufacturing companies in implementing ERP effectively and achieving competitive advantage.
IT Infrastructure Security Optimization Strategies for Today's Organizations Sulistiani, Heni; Antoni, Kevin Rizki; Nunyai, Reiza Fahlevi
IC-ITECHS Vol 5 No 1 (2024): IC-ITECHS
Publisher : LPPM STIKI Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32664/ic-itechs.v5i1.1627

Abstract

Information technology (IT) infrastructure security is one of the top priorities for organizations in the digital age. The rapid adoption of technologies such as cloud computing, the Internet of Things (IoT), and artificial intelligence has presented great opportunities for innovation, but also increased the risk of cyberattacks, data theft, and system vulnerabilities. This research aims to identify and develop IT infrastructure security optimization strategies that can enhance the protection of an organization's digital assets. The approach used includes risk analysis, implementation of a comprehensive security framework, and adoption of advanced defense technologies such as encryption, next-generation firewalls, and artificial intelligence-based threat detection systems. The results show that an integrated, adaptive strategy supported by solid policies can improve system resilience while supporting operational flexibility. Thus, this research provides practical recommendations for organizations to build an IT infrastructure that is secure, resilient, and ready to face future challenges.
System Security Testing Using The Penetration Testing Method on The Palapa Vocational School Library Website Koswara, Wawan; Sulistiani, Heni; Ramadhan, Surya
IC-ITECHS Vol 5 No 1 (2024): IC-ITECHS
Publisher : LPPM STIKI Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32664/ic-itechs.v5i1.1663

Abstract

The Palapa Library utilizes its website as the primary platform for providing information and services to users. However, the presence of vulnerabilities in the website poses significant threats to data and system security. This study aims to identify and analyze vulnerabilities on the Palapa Library website using the Penetration Testing method based on the NIST SP 800-115 standard. This method involves four stages: planning, discovery, attack, and reporting. The testing results identified two major vulnerabilities: sensitive information disclosure and SQL Injection. Once the vulnerabilities were identified, their severity levels were assessed using the Common Vulnerability Scoring System (CVSS) version 3.1. CVSS provides scores for the vulnerabilities, helping prioritize remediation efforts from the highest to the lowest risk. Based on the assessment results, appropriate remediation measures were developed to enhance the security of the Palapa Library website. This study is expected to serve as a reference for preventing similar security threats in the future and assisting other institutions facing similar challenges in improving the security of their information systems.
Risk Analysis of Computer Network Security Focusing on Phishing Attacks in Fintech Platform Sangha, Zahra Kharisma; Sulistiani, Heni
IC-ITECHS Vol 5 No 1 (2024): IC-ITECHS
Publisher : LPPM STIKI Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32664/ic-itechs.v5i1.1687

Abstract

The advancement of Science and Technology, particularly in Information Technology such as the internet, has significantly facilitated individuals in achieving their life goals quickly, either through legal or illegal means. One prominent threat is phishing, which employs social engineering techniques to deceive users by impersonating authoritative entities. Phishing targets various industries, with the fintech platform sector being one of the primary targets. The main factors contributing to phishing in fintech platform services include users' lack of knowledge, psychological factors, and insufficient privacy protection on social networks. Therefore, computer network security is a critical measure to prevent phishing attacks on fintech platform services. This research employs a qualitative method with a descriptive approach.
Co-Authors Ade Dwi Putra Adelia Pratiwi Adhie Thyo Priandika Admi Syarif Ady Chandra Agung Saputra Agus Irawan Agus Irawan Agustina, Intan Ahmad Ari Aldino Ahmad Fawaiq Suwanan Ahmad Januar Amriyansah Aidil Akbar Akbar, Muhammad Fadil Alfarizi, Ferdian Alfikri, Valbian Alita, Debby Alvi Suhartanto Alvinan Virgilia Andi Nurkholis Andika, Rio Andre, Muhammad Fabio Ani Sesanti Antoni, Kevin Rizki Anwar, Adi Khairul Anwar, Rian Aprian Nuriansah Ari Sulistiyawati Arief Aryudi Syidik Arif Munandar Arshad, Muhammad Waqas Arsi Hajizah Auliya R. Isnain Bagastian, Bagastian Bagus Miftaq Hurohman Bambang Dwi Setyarto Benhouzer N.P Pasaribu Budi Santosa Budi Santosa Cici Dian Paramita Damayanti Damayanti Damayanti Damayanti Damayanti, Damayanti Darwanto, Imam Dedi Darwis Dewantoro, Fajar Dimas, Novario Donaya Pasha Eka Lisna Rahmadani Eko Bagus Fahrizqi Eko Putro, Dimas Elin Gusbriana Elvano Delisa Mega Erliyan Redy Susanto Esy Ervina Yanti Evi Dwi Wahyuni Falssava, Jossa Neka Fatmawati Isnaini Fatriana, Nina Ferico Octaviansyah Pasaribu, Ahmad Fikri Hamidy Gaib Wiwaha, Gigant Geri Marizki Greessheilla Phylosta P.B Gunawan, Rakhmat Dedi Hamdan Sobirin, Muhammad Hati, Clifansi Remi Siwi hendri eka pratama Hendrik Saputra Heru Setiawan I Gede Heri Susanto Ikbal Yasin Ikbal Yasin Ilham Muhammad Ghoffar Imam Ahmad Imam Ahmad Inonu, Onassis Yusuf Ismail, Izudin Ismail, Izzudin Isnain, Auliya Rahman Istiana, Winda Iwan Purwanto Izka, Ade Adyatna Izudin Ismail Juarsa, Doris Khairun Nisa Khoirunnisa, Yosi Koswara, Wawan Kurnia Muludi M. Sholahuddin Al-Ayyubi Magda, Kardita Maheswari, Diva Afirlia Maulida Waya Inayah Mauludi, Ilham Moenir Megawaty, Dyah Ayu Mehta, Abhishek Meutia Kartika Arisandi Miswanto Miswanto Muhammad Fahmi Fudholi Muhammad Syahril Muhaqiqin muhaqiqin naufal, wandi Neneng Neneng Nirwana Hendrastuty Nitami Evita Inonu Nosa, Sania Media Nova Evrilia Nunyai, Reiza Fahlevi Palupiningsih, Pritasari Parjito Parjito Pasha, Donaya Pinangkis, Alif Danang Prananta, Gery Prasetio, Mugi Prastowo, Kukuh Adi Pratama, Farhan Rizki Priskilia Lovika Prita Dellia Putra Hermana, BP Putri, Nanda Aulia Qadhli Jafar Adrian Qadli Jafar Adrian R Metha, Abhishek Rahayu, Masnia Rahmadany, Loisha Adellia Ramadhan, Surya Reflan Nuari Rendy Ramadhan Retno Triana Reza Kumala Dewi Rido Febriansyah Rika Mersita Rika Mersita Riska Amalia Rohaniah Rohaniah Rojat, Muhamad Randyka Ryan Randy Suryono S. Samsugi Sandi, Yeris Ari Sangha, Zahra Kharisma Sanjaya, Ival Sari, Priskila Lovika Sebastian, Dicky Fernanda Setiawan, Randi Setiawansyah Setiawansyah Setyani, Tria Shynta Octriana Siska Amelia, Siska Siska Febriani Sitna Hajar Hadad Styawati Styawati Suaidah Suaidah Sufiatul Maryana Sufiatul Maryana Sugianto, Rudi Susanti Susanti Syakuru, Nazwa Tauhid, Naufal Tazul Tazul Antoni Umami, Nila Niswatun Untoro Adji Very Hendra Saputra Very Hendra Saputra Waqas Arshad, Muhammad Warsito Warsito Wayan Kresna Yogi Swara yasin, ikbal Yasinta Ismi Yasinta Ismi HS Yosi Khoirunnisa Yulia Indriani Yuliani, Asri Yunita Yunita Yunita Yunita Yuri Rahmanto Yusra Fernando Zaenal Abidin Zofaisal Hamid, Pratama