Claim Missing Document
Check
Articles

Found 6 Documents
Search
Journal : IJISTECH

Human Resources Development In Increasing Employee Performance In (Case Study PT. Ars Indo Jaya Perkasa) Susan Rachmawati; B Bilgah; Mety Titin Herawaty; A Asep; Nurul Aisyah; Arman Syah Putra
IJISTECH (International Journal of Information System and Technology) Vol 5, No 6 (2022): April
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v5i6.201

Abstract

The background of this research is how to find out how to develop human resources in a company that aims to improve employee performance. Therefore, this research focuses on a company that wants to improve employee performance in order to improve the company so that it grows and develops. The method given in this study is to use a literature review and use a survey tool conducted on 100 employees, in a company. Therefore, the data obtained are real data. The problem raised in this study is how to find out what variables can affect the company's performance variables. Therefore, with a trial run with a survey, it can be seen what variables affect other variables so that it can be a suggestion for improvement in the company in this research. The purpose of this study is how to determine the development of human resources in a company in order to improve employee performance at PT. ARS INDO JAYA PERKASA the results of the research are several variables with human resources can improve employee performance in a company as an asset, the company will continue to grow in the future.
FTK Image For Forensic Data Processing In Forensic Tools Rachmat Suryadithia; Witriana Endah Pangesti; Muhammad Faisal; Aji Nurrohman; W Wibisono; Arman Syah Putra
IJISTECH (International Journal of Information System and Technology) Vol 5, No 6 (2022): April
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v5i6.199

Abstract

The background of this research is how the use of a software can help find forensic data, which is needed so that the tool used is the right tool in helping forensic problems. The method used in this study is the NIJ method using 5 stages in a process of determining the answer. The first stage is preparation, the second stage in collecting data, the third is testing and the fourth stage is analyzing and the last is the reporting stage with the five stages. The direction of the research will be clearer. The problem raised in this research is how to find evidence using FTK images software. Using this software, you can search for the desired forensic data so that it can be proven that there is forensic evidence. The purpose of this study is how to prove data, especially photo data, can be used as forensic data that can be used as evidence, by using the right tools, namely the existing FTK images software, with the software, it can help parties in proving, especially in terms of forensics
Forensic Data Analysis on Smartphone Memory Android Operating System Using Framework GRR Arman Syah Putra; Muji Santoso; I Iwan; M Mudrika; Bambang Harianto; Popon Handayani
IJISTECH (International Journal of Information System and Technology) Vol 6, No 1 (2022): June
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v6i1.226

Abstract

The background of this research is how to find out and search for hidden data that has been deleted on a hidden smartphone device so that it can be used as evidence of the crime, especially in cybercrimes. The method used in this study uses the four-step method, namely, the first stage is collecting data, the second stage is looking for data, the third stage is analyzing data and the fourth stage is reporting the existence of these four stages, the method will be able to help research. The problem raised in this research is how to find evidence on a smartphone that was deleted by the users of, the crime so that the data can be returned and can make evidence as evidence of a crime. The purpose of this study is to find evidence on a smartphone and test whether the data is really the data you are looking for so that it can be used as evidence in cybercrimes.
The Relationship of Salary And Annual Bonus To Employee Performance In Export Import Companies Heriston Sianturi; Idah Yuniasih; Teni Agustina; Rooswhan Budhi Utomo; S Sriyanto; Arman Syah Putra
IJISTECH (International Journal of Information System and Technology) Vol 6, No 1 (2022): June
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v6i1.227

Abstract

The background of scientific writing is how to find out the relationship between annual bonus salaries and employee performance do these three variables have a significant relationship or not, therefore with this research it will be known whether the variables can be related to the company even better. The method in this study uses a quantitative method by conducting a survey of 100 employees at an import-export company and conducting a literature review study in order to find research problems that can be raised with very high novelty carried out by researchers. The problem raised in this study is there is a relationship between salary and employee performance then is there a relationship between annual bonuses and employee performance with the 2 hypotheses, it will be sought to find out whether the two variables and other variables are related to each other significantly. This study produces data, namely, there is a very significant relationship between salary and employee performance which has a significant value of 0.003 and there is a significant relationship between annual bonuses and employee performance which has a significant value of 0.002 with this value, the independent and dependent variables have a significant relationship very significant.
National Institute of Standards And Technology (NINST) Method for Cyber Crime Using Forensic Data on Smartphone Imam Zaenuddin; Yosua Novembrianto Simorangkir; Arman Syah Putra
IJISTECH (International Journal of Information System and Technology) Vol 6, No 1 (2022): June
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v6i1.222

Abstract

The background of this research is how to use the NIST method on crimes that use forensic data on smartphones, using the NIST method it will be known whether the method is the right one to use in case solving methods, especially in cybercrime cases. The method used in this study is to use the ethnic method which consists of the collection, examination, analysis, and reporting. With these 4 methods, it can be used to find out which data is used as crime data on smartphones that have been checked. The problem raised in this study is how to find out data that has been lost on a smartphone by using that data and using ethnic methods so that it can open the veil of crime in cyberspace. The purpose of this study is how to find the right data to be used as evidence, as evidence of crime using ethnic methods on smartphones.
Investigations Using The Whatsapp Application By Analyzing Evidence of Crime In Conversation Data P Priyono; Bilal Abdul Wahid; P Priatno; Risdiandri Iskandar; Ali Akbar; Arman Syah Putra
IJISTECH (International Journal of Information System and Technology) Vol 6, No 1 (2022): June
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v6i1.223

Abstract

The background of this research is to find evidence in an application called WhatsApp by analyzing data in the form of conversations or chats from 2 people who are suspected of having their conversations contain suspicious words, therefore by analyzing their conversations, errors or violations will be known conducted. The method used in this study uses the latest waterfall concept, which has been modified in order to help find answers to the problems raised. The problem raised in this study is to find evidence in the conversations carried out in the WhatsApp application. The purpose of this research is to find strong evidence so that it can be used as evidence in court and save suspicious conversation data.