p-Index From 2021 - 2026
7.803
P-Index
This Author published in this journals
All Journal Pixel : Jurnal Ilmiah Komputer Grafis Jurnal Al Bayan: Jurnal Jurusan Pendidikan Bahasa Arab Bianglala Informatika : Jurnal Komputer dan Informatika Akademi Bina Sarana Informatika Yogyakarta JURNAL MEDIA INFORMATIKA BUDIDARMA Syntax Literate: Jurnal Ilmiah Indonesia Applied Information System and Management MATRIK : Jurnal Manajemen, Teknik Informatika, dan Rekayasa Komputer Jurnal Manajemen Informatika dan Sistem Informasi Jurnal Informatika dan Rekayasa Elektronik Jambura Journal of Electrical and Electronics Engineering JISA (Jurnal Informatika dan Sains) Jurnal Abdi Insani JOURNAL OF INFORMATION SYSTEM RESEARCH (JOSH) Mitra Mahajana: Jurnal Pengabdian Masyarakat Journal of Informatics Management and Information Technology KLIK: Kajian Ilmiah Informatika dan Komputer Jurnal ABDIMAS Budi Darma Jurnal Ilmiah Teknik Mesin, Elektro dan Komputer (JURITEK) Ilmu Komputer untuk Masyarakat Jurnal Informatika Teknologi dan Sains (Jinteks) Jurnal Pengabdian Masyarakat Bidang Sains dan Teknologi Kreasi: Jurnal Inovasi dan Pengabdian Kepada Masyaraka Teknik: Jurnal Teknik Mesin, Elektro dan Ilmu Komputer Journal of Innovation and Sustainable Empowerment Innovative: Journal Of Social Science Research ETIK (Jurnal Elektronika Terapan dan Ilmu Komputer) Jurnal Pengabdian Bersama Masyarakat Indonesia Tadris al-'Arabiyyah: Jurnal Pendidikan Bahasa Arab dan Kebahasaaraban Jurnal Pengabdian Kepada Masyarakat Al-Amin SWAGATI: Journal of Community Service KOPEMAS JPEMAS: Jurnal Pengabdian Kepada Masyarakat Pekayunan
Claim Missing Document
Check
Articles

Audit Information Technology (IT) Governance Pada Sekolah Tinggi Manajemen Informatika Dan Komputer (STMIK) Lombok Menggunakan Framework COBIT 4.1 Maulana Ashari - STMIK Lombok
Bianglala Informatika Vol 3, No 2 (2015): Bianglala Inormatika 2015
Publisher : LPPM Universitas Bina Sarana Informatika

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (60.43 KB) | DOI: 10.31294/bi.v3i2.539

Abstract

Abstract – An implementation of information technology in an organization or an institution in the business process is a very valuable asset, where the role of information technology is able to change the performance of the workers or even the employees in an organization. Significant role of information technology is certainly to be balanced with appropriate governance and management, so that the losses that might occur can be avoided or minimized as much as possible it is necessary to audit the Information Technology (IT). This study describes how to conduct an audit of Information Technology (IT) Governance at using COBIT 4.1 framework. The purpose of this study is to assess the performance of Information Technology (IT) Governance using COBIT 4.1 framework to produce recommendations and improvements of Information Technology (IT) Governance in STMIK Lombok. The process of auditing Information Technology (IT) Governance at Sekolah Tinggi Manajemen Informatika dan Komputer (STMIK) Lombok is analyzed using COBIT 4.1 standard. Phase evaluation of Information Technology (IT) Governance by COBIT 4.1 default in five stages, such as identification of Business Goals, identification of Information Technology (IT) Goals, identification of Information Technology (IT) Process, Control Objectives identification and calculation of Maturity Level. With the audit of Information Technology (IT) Governance at Sekolah Tinggi Manajemen Informatika dan Komputer (STMIK) Lombok then obtained performance assessment of on going information technology process and recommendations for improvement of Information Technology (IT) Governance. Keywords: STMIK Lombok, Audit, Information Technology (IT) Governance, COBIT.4.1.   Abstrak – Penerapan teknologi informasi pada sebuah organisasi atau dalam proses bisnis suatu instansi adalah aset yang sangat berharga, dimana peranan teknologi informasi mampu mengubah kinerja para pekerja atau bahkan karyawan dalam sebuah organisasi. Peranan teknologi informasi yang signifikan ini tentu harus diimbangi dengan pengaturan dan pengelolaan yang tepat, sehingga kerugian-kerugian yang mungkin akan terjadi dapat dihindari atau diminimalisir semaksimal mungkin maka diperlukan audit Teknologi Informasi (TI). Penelitian ini memaparkan bagaimana melakukan audit Information Technology (IT) Governance pada Sekolah Tinggi Manajemen Informatika dan Komputer (STMIK) Lombok menggunakan framework COBIT 4.1. Tujuan dari penelitian ini adalah menilai kinerja Information Technology (IT) Governance menggunakan framework COBIT 4.1 sehingga menghasilkan rekomendasi dan perbaikan Information Technology (IT) Governance di STMIK Lombok.   Proses audit Information Technology (IT) Governance di STMIK Lombok dilakukan menggunakan standar COBIT 4.1. Tahap evaluasi Information Technology (IT) Governance menurut standar COBIT 4.1 ada 5 tahap yakni identifikasi Business Goals, identifikasi Information Technology (IT) Goals, identifikasi Information Technology (IT) Process, identifikasi Control Objectives, dan perhitungan Maturity Level. Dengan dilakukannya audit Information Technology (IT) Governance pada Sekolah Tinggi Manajemen Informatika dan Komputer (STMIK) Lombok maka didapatkan penilaian kinerja dari proses teknologi informasi yang sedang berjalan  serta rekomendasi perbaikan untuk meningkatkan kualitas Information Technology (IT) Governance. Kata kunci: STMIK Lombok, Information Technology (IT) Governance, COBIT.4.1.
Prototipe Alat Kirim Pesan Singkat Tindak Kejahatan sebagai Solusi Peningkatan Keamanan Berbasis Lokasi Wire Bagye; Maulana Ashari; Mohammad Taufan Asri Zaen
MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer Vol 19 No 1 (2019)
Publisher : LPPM Universitas Bumigora

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1162.392 KB) | DOI: 10.30812/matrik.v19i1.491

Abstract

Very rarely the crime can be done early help or handled by the security forces while the perpetrators are still at the scene of the crime. The effort to get help from crime by reporting to the police requires a relatively long time, which is between 30 minutes to 2 hours. To reduce the number of criminal acts and early relief efforts, a tool to send short messages of crime was developed. Development of tools implements the Arduino Uno R3 microcontroller as the main component for program storage. Location coordinates are obtained from the Ubox 160n GPS module. Short messages containing biodata and location coordinates will be sent by the GSM SIM900L module. The destination number will receive a message that can be used to trace the location of the crime through Googlemaps. This tool equipped with a battery that can be recharged with a cell phone charger making this tool portable, practical and efficient. Using this Alat kirim pesan singkat tindak kejahahatan is very time efficient. The sending of a crime message is done in a very short time. By tapping the message directly the Googlemaps application opens and displays the location of the crime.
Analisis Dan Implementasi Jaringan Komputer Brembuk.Net Sebagai RT/RW.Net Untuk Mendukung E-Commerce Pada Desa Masbagik Utara Ahmad Tantoni; Maulana Ashari; Mohammad Taufan Asri Zaen
MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer Vol 19 No 2 (2020)
Publisher : LPPM Universitas Bumigora

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (527.823 KB) | DOI: 10.30812/matrik.v19i2.591

Abstract

One of the districts that is the central of the economy is Masbagik. The population working in the trading sector as traders in Masbagik Utara Village is almost 70%. Along with the times, buying and selling activities are not only have been done conventionally, but also through e-Commerce. E-Commerce must be supported by adequate information technology infrastructure, namely internet connection in its business processes. Based on observations in the Masbagik Utara Village, businesses using internet connections from well-known ISPs in their business activities, and this is considered to be less economical in the e-Commerce activities. Therefore, research is conducted to analyze, design and implement rt / rw.net by giving the wifi network name "brembuk.net" which is expected to help provide a choice of solutions related to internet connection that will be used by e-Commerce businesses in Masbagik Utara village. The research uses PPDIOO method (Prepare, Plan, Design, Implement, Operate, Optimize). The implementation of the brembuk.net computer network as rt / rw.net to support e-Commerce is one of the way to access cheap and stable internet and unlimited quota to access the internet in doing business for online businesses in Masbagik Utara village.
Audit Tata Kelola Teknologi Informasi Menggunakan Framework Cobit 4.1 Khairul Imtihan; Muhamad Rodi; Maulana Ashari; Mohamad Taufan Asri Zaen; Khairan Marzuki
MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer Vol 21 No 2 (2022)
Publisher : LPPM Universitas Bumigora

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (273.91 KB) | DOI: 10.30812/matrik.v21i2.1569

Abstract

Penerapaan teknologi informasi pada sebuah organisasi atau dalam proses bisnis suatu instansi adalah aset yang sangat berharga, dimana peranan teknologi informasi mampu mengubah kinerja para pekerja atau karyawan. Penerapan teknologi informasi yang signifikan ini tentu harus diimbangi dengan pengaturan dan pengelolaan yang tepat, sehingga kerugian-kerugian yang mungkin akan terjadi dapat dihindari atau diminimalisir semaksimal mungkin maka di perlukan audit. Proses audit bertujuan untuk menilai kinerja teknologi informasi pada Dinas Kependudukan dan Pencatatan Sipil Lombok Tengah menggunakan Framework COBIT 4.1 yang terdiri dari 5 tahapan yakni identifikasi business goals, identifikasi information technology (IT) goald, identifikasi information technology (IT) process, identifikasi control objectives, dan perhitungan maturity level. Hasil proses audit berupa rekomendasi dan perbaikan teknologi informasi. Berdasarkan hasil audit didapatkan hasil penerapan information technology governance, rata-rata 3. Pada maturity level ini, secara keseluruhan proses penerapan IT governance berada pada skala 3, yaitu defined prosess, merupakan tahap dimana selurus proses telah didokumentasikan melalui pelatihan serta dilaksanakan sesuai dengan metode pengembangan sistem terkomputerisasi yang baik, namun belum ada evaluasi terhadap sistem tersebut sehingga mungkin akan terjadi penyimpangan, terdapat 12 information technology process berada pada level defined prosess dan 2 berada pada level repeatable.
Implementation of Data Mining on Tourist Visits Patterns on Lombok Island Tourism Objects Sofiansyah Fadli; Saikin Saikin; Maulana Ashari
JISA(Jurnal Informatika dan Sains) Vol 5, No 1 (2022): JISA(Jurnal Informatika dan Sains)
Publisher : Universitas Trilogi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31326/jisa.v5i1.1062

Abstract

Foreign tourists entering Indonesia in 2017 and 2018 have increased. From the data obtained on the website of the Ministry of Tourism (Kemenpar) the number of foreign tourists in 2017 was 14,039,799, while in 2018 there were 15,806.1, with a comparison of the number of tourists from the two years, the percentage increase in tourists was 12.58%. The data analysis approach using a classification model is a data analysis approach by studying the data and making predictions with the new data. in the classification model, there are many algorithms that can be applied in data analysis, one of which is the Decision Tree algorithm. This study aims to analyze the pattern of tourist visits based on the objects visited by the number of tourists visiting certain tourist objects. From the modeling using the Decesion Tree C4.5 Algorithm and the scenario of splitting the data into three parts, the highest accuracy value was obtained for splitting data of 80:20 for train and testing data and max depth 7, which obtained an accuracy of 94% for train data and 92% for data. testing. Modeling with the Boostrap Aggregating Method, the accuracy score obtained on training data is 93% and testing data is 92. percent. 3 accuracy results from using bagging reduce the accuracy of the C4.5 algorithm on the data training side from 94% to 93 percent, while the accuracy of testing data is still the same, namely 92%.
Implementation of the AHP-SMARTER Method in the Decision Support System for Giving Sanctions for Violation of Student Disciplines Sofiansyah Fadli; Maulana Ashari; Hasyim Asyari; Ahmad Susan Pardiansyah
JISA(Jurnal Informatika dan Sains) Vol 5, No 1 (2022): JISA(Jurnal Informatika dan Sains)
Publisher : Universitas Trilogi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31326/jisa.v5i1.1049

Abstract

Violations of school rules are often carried out by students, including lack of respect for teachers, students who are not on time, often late for class, skipping classes, jumping fences, smoking and not paying attention to the rules and other regulations in school. This study aims to build a decision support system for sanctions for violations of student discipline that has the ability to analyze each of the criteria and sub-criteria that have been determined by the school. In this case, students who violate school rules will be punished and given sanctions so as to provide an output value of priority intensity which results in a system that provides an assessment of violations against students. The method used in building this decision support system is by combining the Analytical Hierarchy Process (AHP) method and the Simple Multi Attribute Rating Technique Exploiting Rank (SMARTER) method. Weighting criteria using the AHP method and for ranking using the SMARTER method. The system created can be used to assist in processing data on violations of school rules. With this decision support system, it is hoped that policy makers will have no difficulty in determining what types of actions and sanctions will be given to students who violate school rules.
SPK LOKASI PEMBANGUNAN PERUMAHAN DI KABUPATEN LOMBOK TENGAH DENGAN METODE AHP Lalu Bintang Aryandhana; Sofiansyah Fadli; Maulana Ashari
Jurnal Ilmiah Teknik Mesin, Elektro dan Komputer Vol 2 No 2 (2022): Juli, Jurnal Ilmiah Teknik Mesin, Elektro dan Komputer
Publisher : Sekolah Tinggi Ilmu Ekonomi Trianandra

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55606/juritek.v2i2.324

Abstract

Decision Support System (DSS) is a system that can help someone in making decisions and is also an approach to support decision making on a particular problem. One of the methods in the decision support system is the Analytical Hierarchy Process (AHP) method, which is a method for making scientific and rational decisions to provide solutions to multi-criteria and complex problems with various alternatives. In this research, the author tries to apply the AHP method to determine the location of new housing developments in Lombok Tengah District. The criteria used for consideration are land conditions, facilities, social and economic conditions, and land availability. The results of this study can prove that DSS with the AHP method is able to assist developers in determining the choice of new housing development locations in Lombok Tengah District.
Pelatihan Penggunaan Aplikasi E-SMART bagi Karyawan Sekretariat Daerah Bagian Organisasi Sofiansyah Fadli; Sri Wahyuni Putri; Ahmad Tantoni; Maulana Ashari; Hairul Fahmi
Ilmu Komputer untuk Masyarakat Vol 3, No 1 (2022)
Publisher : Universitas Muslim Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33096/ilkomas.v3i1.1229

Abstract

Pada era revolusi ini perkembangan teknologi tidak dapat dipisahkan lagi dari kegiatan semua orang, baik dalam aktivitas harian maupun dalam melakukan pekerjaan. Oleh karena itu, agar tidak menghambat pekerjaan suatu perusahaan/instansi, mereka memanfaatkan perkembangan teknologi untuk merekap aktivitas pegawai. Aplikasi berbasis web ini bertujuan untuk mempermudah pegawai dalam mekukan perekapan aktivitas sehari-hari. Yang dikarenakan sebelumnya masih menggunakan perekapan secara manual dan sistem tersebut sudah tidak terpakai lagi, melihat kebutuhan dan pentingnya perekapan kegiatan bagi suatu instansi. Aplikasi berbasis web ini sangat memudahkan pegawai untuk merekap kegiatannnya selama di kantor seperti mengisi aktivitas utama pegawai, mengisi Sasaran Kerja Pegawai, mereview perilaku kerja pejabat struktural dibawahnya dan pejabat lain, serta masih ada lagi form yang disediakan untuk melaporkan atau merekomendasikan sesuai dengan tugas dan perannya masing-masing. Yang diharapkan dari aplikasi berbasis web ini, pegawai dapat menggunakan aplikasi sebaik mungkin dan dapat memudahkan pekerjaan serta membantu kinerja perusahaan khususnya dibidang Sumber Daya Manusia menjadi lebih cepat, baik dan lebih praktis.
DDoS ATTACK MITIGATION WITH INTRUSION DETECTION SYSTEM (IDS) USING TELEGRAM BOTS Mohammad Taufan Asri Zaen; Ahmad Tantoni; Maulana Ashari
JISA(Jurnal Informatika dan Sains) Vol 4, No 2 (2021): JISA(Jurnal Informatika dan Sains)
Publisher : Universitas Trilogi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31326/jisa.v4i2.1043

Abstract

 In the current IS/IT era, service to consumers is an absolute must to be prepared to survive in business competition. Physical and logical attacks with the aim of disrupting information technology services for individuals/agencies/companies or reducing the performance of IS/IT used. The development of IoT in the industrial revolution 4.0, which is all online, is a challenge in itself, from a negative point of view, all of them are able to carry out attacks on ISP servers, often carried out by hackers. DDoS (Distributed Denial of Service) attacks are the most common attacks. The development of software for DDoS attacks is very much on the internet, including UDP Unicorn software to attack very easily and can be done by anyone. Software for real-time monitoring of DDoS attacks, one of which is the Telegram bot. Telegram is a messaging system centered on security and confidentiality, while bots are computer programs that do certain jobs automatically. Telegram bot is free, lightweight and multiplatform. In the case study, this research contains 10 access points to the internet that will be mitigated from DDoS attacks. In this study, it was found that DDoS attacks caused traffic to become very high/congested by fulfilling upload traffic so that legitimate traffic users could not access the internet, connection to the internet was slow, the traffic was also unnatural, making it unable to connect to wireless devices and making Mikrotik  login page becomes unable to appear. The purpose of this study is to mitigate DDoS attacks with the help of telegram bots so as to facilitate the notification of DDoS attacks in the event of an attack so that it is fast to deal with and find the perpetrators of the attack. The conclusion of this study is that DDoS attacks using UDP unicorn software resulted in a traffic spike of 53.5 Mbps on the upload traffic side, causing traffic for legitimate/authenticated users to slow down. By using telegram bots to know DDoS attacks occur in real time with a success rate of attack detection up to 100% notifications on telegram bots. Mitigation of DDoS attacks takes steps to track users using the torch feature on the routerboard interface menu, trace internet connection lines using wired or wireless transmission media, and ensure always monitoring the proxy interface from winbox. 
RANCANGAN SISTEM INFORMASI KONVERSI MATA KULIAH MAHASISWA PINDAHAN DAN LANJUTAN (STUDI KASUS DI STMIK LOMBOK) Siti Musyarrofah; Maulana Ashari; sofiansyah fadli
JISA(Jurnal Informatika dan Sains) Vol 2, No 1 (2019): JISA(Jurnal Informatika dan Sains)
Publisher : Universitas Trilogi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31326/jisa.v2i1.493

Abstract

Lombok Institute of Information and Computer Management (STMIK) is one of the colleges in Central Lombok. In Higher Education there is a set of subjects given to participants in a period of education called the curriculum. Because the curriculum in each tertiary institution is different, a system that can equalize or convert courses is needed. Especially in supporting all lecture activities which in Higher Education must have a conversion system for equalizing subjects along with the number of effective semester credits takes up to two days, the head of study program is required to be able to produce or which is often referred to as a conversion term, both for advanced students and transfer students. The process of converting courses has not resulted in a decision that is a fast and appropriate decision for transfer student lectures. Based on the description above, the author intends to make a design entitled "The Design of Information Systems Conversion for Transfer and Advanced Students (Case Study of STMIK Lombok)".
Co-Authors Abdul Aziz, Lalu Agung Abdul Hafidz Bin Zaid Ahmad Ependi Ahmad Susan Pardiansyah Ahmad Tantoni Anhar Anhar Aryandhana, Lalu Bintang Assyifa Nurul Irwan Azizatur Rahmah Harahap Baiq Riska Nanda Pratiwi Baiq Wulandari Bilqis Salsabila Nurfaizah Damanhari Surya Rasyid Didik Sudyana Eka susanti Fadli, Sofiansyah Fahmi, Hairul Haerani, Kiki Hairul Fahmi Hakim, Madie Wire Hamdani, Zainal Basit Harta, Rio Danu Hasyim Asyari Hasyim Asyari Hengki Irawan Hidayat, Rahmat Hidayat Husnul Khotimah Ichwan Purwata Ihwan Mahmudi Ikhwani, Novita Susiana Ilhami, L. Tatang Arif Juaini Juaini Khairan marzuki Khairul Imtihan Kiki Haerani Lalu Bintang Aryandhana Lalu Haerul Fahmi Lalu Mutawalli Lalu Zaenul Haqiqi Maemun Saleh Maemun Saleh Mardi Mardi Maulaya, Rosendah Dwi Mirna Hidayati, Fitri Mohammad Taufan Asri Zaen Muh. Fahrorrozi Muhammad Fauzi Zulkarnaen Muhammad Hafizin Muhammad Husnaini Muhammad Syahid Ramadhon Mujib Abdurrahman Najamudin Najamudin Nitami, Dian Nizar Haris Novita Susiana Ikhwani Nur Hizbullah, Nur Pardiansyah, Ahmad S Putri Nur Giyawati Putri, Juliyantika Ayudita R. Nabila Zaty Shakila Raudah Raudah Rika Nurhaliza Riki, Lalu Riki Husada Rohati Rohati Rohati Rohati Rohati Rozak, Maulana Abdul Saeful Hamdi Saikin Saikin Septiani, Ria Shofiya Taqiyya Kamal Sita Susilawati Siti Halimatun Jannah Siti Khoirun Nabilatuz Zahro Siti Musyarrofah Sofian, Ahmad Ario Sofiansyah Fadli Sofiansyah Fadli Sri Wahyuni Putri Suhaini Suhaini Tantoni, Ahmad Tarandari, Sonia Wafiah Murniati Wahyuni Putri, Sri Wire Bagye Wire Bagye Yoke Suryadarma Yulia Arianti Zainal Basit Hamdani Zulkarnaen, Mohamad Fauzi