Claim Missing Document
Check
Articles

Found 3 Documents
Search
Journal : jurnal Teknologi Informasi Magister

PENERAPAN DATA MINING MENGGUNAKAN ASSOCIATION RULES UNTUK MENDUKUNG STRATEGI PEMASARAN -, Nurjoko; Darmawan, Abdi
244-5567
Publisher : IBI Darmajaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The rapid growth of data accumulation has created the conditions for data-rich but information poor. Data mining is the mining m or discovery of new information by looking for certain patterns or rules of a number of large amounts of data are expected to treat the condition. By utilizing the data of prospective students and student data, is expected to yield information about the resources used by the candidate that can be used by management in making efforts associated with an increase in the number of students by choosing the appropriate media campaign through data mining techniques.The algorithm used is the a priori algorithm, the information displayed in the form of support and confidence value of each pattern is formed. Of tests on the data of prospective students and student data with the model Association rules generated some rules with a maximum value of confidence level of 81.1% for resources from newspapers and media level maximum value of 77.8% confidence sebesarb to resources through the media brosur.Saatini right promotional media for use by TIMP emasaran in recruiting new students are media newspapers and brochures with not ignore other promotional media. Keywords: data mining, Association rules, a priori algorithm, confidence, support
PERENCANAAN STRATEGIS SISTEM INFORMASI DAN TEKNOLOGI INFORMASI SI/TI PENDIDIK DAN TENAGA KEPENDIDIKAN (Studi Kasus: Pada Disdikbudpora Metro) Arifani, Irfan Nur; Darmawan, Abdi
244-5567
Publisher : IBI Darmajaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The Education, Culture , Youth and Sport Agency of Metro has not got a plan for main implementation for Information System /Information Technology so the information needed cannot be managed accurately. For that reason, it is really needed an IT-based system to produce precise and puctual information. This study is aimed at identifying data needs and information in formulating the policy and developing strategic information system plan in the educational agency. The main concept in designing this study is a methodology stated by John Ward and Joe Peppard. The steps start from analyzing internal business circumtance and external organization, IT internal analysis and it is continued by processing strategic indentification and doing future portofolio design. The analysis methods used in this study include SWOT, Critical Success Factor, Value Chain, PEST, and Mc Fardan Strategic Grid.The result of this study is a stratgic plan blue print which refers to the organization business plan based on the data derived from the analysis method. The information resulted is then to be used as an integrated method for administrative needs and public services. The strategic purpose is a prime service that can be used to increase the data management for maximizing functions of Educators and Educational Officers (PTK). They are supported with IT factors, IT roles to provide the qualified educational infra structures and develop IT application for improving the quality of educational management. The IT strategic plan produced can be used in planning the next strategic plan and give some priorities for activities to find the great results and are based on the aims to achieve.Keywords : Information System Strategic Plan, Ward and Peppard Method
AUDIT KEMANAN INFORMASI MENGGUNAKAN ISO 27002 PADA DATA CENTER PT.GIGIPATRA MULTIMEDIA Afandi, Herman; Darmawan, Abdi
244-5567
Publisher : IBI Darmajaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

PT. Giga Patra Multimedia Company is a private company which concentrates on Internet service providers, hosting sales and procurement of supplies and support equipment technology. Given the importance of enterprise information, then the information must be protected or secured by theentire personnel of the company. All information company that there must have backup and recovery baik. Sementara that goes with it, as long as the company PT.Giga Multimedia Patra stands have been some problems, among others, are often found to leak information and hackingwebsites terhadapa customers arriving at the web server. In addition, it is feared may propagate in the abuse informasi. Maka in perlukanya internal audit in the company PT.Giga Patra Multimedia. Types of audits are used in this research that uses an internal audit of security standards Iso27002: 2013. And some clauses yitu Security Human Resources (Clause 7), Access Control (Clause 9), elderly physic Safety and Environment (Clause 11), Management Communication and Oprasi 12) .With the security audit information on PT. Giga Multimedia Patra can find out the weaknesses of the system is the cause of information security problems which have occurred. Besides this audit can measure the level of security by PT. Giga Patra Multimedia. From the results of a security audit of information systems that have been done, it was concluded that in the field of HumanResource Security (Clause 7) yielded values 2.71 and maturity level in the field of Access Control (Clause 9) has a value of 2.75 and a maturity level and field of Physical Security Environment (Clause 11) security resources Manuia generate value maturity level of 2.75 is located on level 2(limited / repeatable) which means that security controls are under development, there have been limited documentation but no training and measuring the effectiveness of security controls, and field operational ( Clause 12) yielded values of 1.33 maturity level that is at the level of Level 2 (limited / repeatable) At this level, security controls are still in development and / or there is limited documentation to support the need. Expected PT. GIGA PATRA MULTIMEDIA can do the repair information system security management, rules, and procedures that the information system security threats related to information security can be minimized.Keywords : Audit, ISO 27002, audit kemanan data center,kemanan informasi