Claim Missing Document
Check
Articles

Found 3 Documents
Search
Journal : Journal Software, Hardware and Information Technology

Sistem Informasi Pengenalan Tanaman Menggunakan QR Code Scanner Firmansyah Ibrahim; Zulkarnaim Masyhur; Khaerunsituncu Khaerunsituncu
Journal Software, Hardware and Information Technology Vol 1 No 1 (2021)
Publisher : Jurusan Sistem Informasi Universitas Islam Negeri Alauddin Makassar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24252/shift.v1i1.4

Abstract

There are many different kinds of plants that can be found anywhere, but we don't know precisely what types and uses they are, so it's good for us to understand these plants. The purpose of this research is to make it easier to find out about plants by designing and building an information system about plant qualifications using QR Code technology combined with the Website application. This type of research used in this research is a qualitative method. Qualitative methods are research methods that are descriptive and tend to use analysis. Process and meaning (subject perspective) are emphasized more in qualitative methods. While the data collection methods used were observation, interviews and literature study. The application planning method used is a waterfall. In contrast, the testing technique used by the author is Black Box testing. The results of this research are in the form of a web-based plant recognition information system to make it easier for administrators to provide information and make it easier for visitors to get plant information. Based on the test results, it can be concluded that this system is running according to the common objectives.
Studi Literatur Keamanan dan Privasi Data Sistem Cloud Computing Pada Platform Google Drive Zulkarnaim Masyhur; Adhy Rizaldy; Patmayanti Kartini
Journal Software, Hardware and Information Technology Vol 1 No 2 (2021)
Publisher : Jurusan Sistem Informasi Universitas Islam Negeri Alauddin Makassar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24252/shift.v1i2.15

Abstract

In today's era, we can do mobilization activities anytime and anywhere. Especially with the cloud computing system that makes it easy to interact from one computer to another without consuming a lot of money. This allows us to access data and information from computers or accounts that are connected. Google Drive is a data storage and synchronization service provided by Google. Where every user can use cloud computing in the form of file sharing and editing collaboration. The purpose of this paper is to find out how the challenges and solutions for data security and user privacy are on the Google Drive platform.
Internet of Things (IoT): Security, Threats and Countermeasures Zulkarnaim Masyhur; Firmansyah Ibrahim; Didit Hermawan
Journal Software, Hardware and Information Technology Vol 2 No 2 (2022)
Publisher : Jurusan Sistem Informasi Universitas Islam Negeri Alauddin Makassar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24252/shift.v2i2.31

Abstract

Internet of Things (IoT) is a technology that is very popular lately and is starting to get busy in Indonesia, marked by various cellphone manufacturers building an IoT ecosystem. IoT can help connect objects such as sensors, vehicles, hospital instruments, household appliances and others. However, connecting these smart devices to the internet network causes various data security problems because internet technology and communication protocols have not been specifically designed to support IoT devices. The leakage of data security through the commercialization of IoT devices, causes privacy problems, threats of cyber-attacks, and organized crime. This paper aims to educate about how data security attacks in IoT and how to overcome them. To achieve this goal, we first discuss various well-known IoT reference models and define security in the context of IoT. Second, identify and classify various IoT attacks and threats. Third, described methods of countermeasures against IoT attacks. In the end, it provides some tips on securing IoT devices.