Claim Missing Document
Check
Articles

Found 26 Documents
Search

Penerapan ISO/IEC 27001:2022 dalam Tata Kelola Keamanan Sistem Informasi: Evaluasi Proses dan Kendala Sinaga, Rudolf; Taan, Frangky
NUANSA INFORMATIKA Vol. 18 No. 2 (2024): Nuansa Informatika 18.2 Juli 2024
Publisher : FKOM UNIKU

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25134/ilkom.v18i2.205

Abstract

Implementing ISO/IEC 27001:2022 in information security management is crucial and timely due to the increasing cyber threats, the necessity for regulatory compliance, and the significance of information security as a competitive edge. The latest revision of this standard demands proper adaptation and implementation to ensure effective information security management across various organizations. This study examines the key components of ISO/IEC 27001:2022, including organizational context, leadership, planning, support, operations, performance evaluation, and improvement. It delves into the application of ISO/IEC 27001:2022 in security system governance, emphasizing how this standard can enhance risk management and information security within an organization. A case study on a logistics company adopting this standard was conducted to identify best practices, implementation challenges, and its impact on security and regulatory compliance. The study's findings demonstrate that implementing ISO/IEC 27001:2022 effectively improves an organization's information security posture by integrating security policies, procedures, and controls into business processes. These findings offer recommendations as practical guidelines for organizations aiming to strengthen their information security management through the adoption of globally recognized international standards.
Information System Security Audit Based on the DSS05 Framework Cobit 5 at Higher Education XX Sinaga, Rudolf; Samsinar, Samsinar; Afriany, Renny
BERKALA SAINSTEK Vol 9 No 1 (2021)
Publisher : Universitas Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.19184/bst.v9i1.20361

Abstract

Currently, information has become a commodity or basic need, it can even be said that we are already in an "information-based social" era. It is undeniable that the ability to access and ensure the availability of information quickly and accurately has become a very essential component for an organization, whether in the form of social or commercial organizations, educational institutions such as universities, government agencies, and individuals. Various channels were created to regulate access rights to information, to prevent unauthorized people from accessing it, to minimize losses for the owner of the information. Based on the results of interviews with the research object of XX college, there are still frequent disruptions to information system security such as attacks on servers that result in server downtime, attacks on institutional e-mails that result in being unable to receive or even send e-mails, and other disturbances. This certainly harms information services at the tertiary institution, therefore an information system security audit is required. This study aims to measure the level of information system security capabilities using the Cobit 5 framework in the APO13 and DSS05 domains. Based on the results of the audit, it was found that the GAP value was 3.6 for the APO13 domain or at level 1 while 3.4 for the GAP DSS05 value or at level 2, it can be concluded that the information system security maturity level is still very low so that it needs improvement. It is recommended to make SOPs and documentation of maintenance, control, and periodic security evaluation, install an antivirus that has high and up to date protection accuracy, and make regular maintenance reports both on software and hardware.
Information Technology Governance Audit at XYZ College Using COBIT Framework 2019 Samsinar, Samsinar; Sinaga, Rudolf
BERKALA SAINSTEK Vol 10 No 2 (2022)
Publisher : Universitas Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.19184/bst.v10i2.30325

Abstract

Reliable and up-to-date information services are one of the parameters for the achievement of an organization's performance, including for a university, which is currently required to be able to adapt to technological advances to produce graduates who can master information technology to support the competence of their respective fields. The curriculum changes launched by the current government are also proof that the application of information technology in higher education is a must. Seeing this, universities have a difficult task, especially at the implementation stage of implementing information technology, because they must prepare not only infrastructure but also human resources who can develop good information system governance. Therefore it is necessary to carry out an IT governance audit. From the results of observations made, XYZ College has utilized information technology in academic services and other information services. However, it was found that information technology governance does not yet have a standard so that it is considered not to be able to meet the desired goals, and instead will cause various problems including uncontrolled operational costs and other problems. The purpose of this study is to measure the performance of information technology governance at XYZ College using the COBIT 2019 framework. Based on the results of an audit conducted from 7 EGIT components, namely processes, organizational structure, information flow and items, people skills and competencies, policies and procedures, culture, ethical behavior, and service infrastructure and application are on average at level 3, it can be concluded that the application of information technology has been running, the infrastructure is adequate but does not have good governance procedures or standards. It is recommended that XYZ Higher Education make standards for information technology governance as well as periodic evaluations of the use of all components of information technology, both software, hardware, and brainware.
Fuzzy Employee Placement Suitability Assessment using Mamdani Fuzzy Method Afriany, Renny; Sinaga, Rudolf; Samsinar, Samsinar
BERKALA SAINSTEK Vol 10 No 2 (2022)
Publisher : Universitas Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.19184/bst.v10i2.30280

Abstract

For a company, employees are the spearhead for the company because they have a function as Customer Service, customer satisfaction is obtained after interacting with the company through the performance of its employees. Employees are expected to meet all customer needs with the applicable regulations in the company and become a source of income for the company. To get reliable employees, one way is to assess the suitability of their placement in the appropriate position. With the assessment of the suitability of positioning, companies can consider and determine the provision of rewards, promotions, punishments, training, coaching, counseling, or transfers for their employees. The choice of method used to assess the suitability of employee placement in a company is Fuzzy Mamdani. With the Fuzzy Mamdani method, a system that is completely measurable and human assessments that tend to be immeasurable can be bridged. Assessment of the suitability of employee placement using the resulting fuzzy method, is expected to be an alternative solution for companies to give positions to their employees.
Analisis Segmentasi Pasien Berdasarkan Persepsi Kualitas Pelayanan dengan Algoritma Clustering Frangky, Frangky; Sinaga, Rudolf; Raihansyah, M.
Explorer Vol 5 No 1 (2025): January 2025
Publisher : Forum Kerjasama Pendidikan Tinggi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/explorer.v5i1.1818

Abstract

Patient segmentation based on perceptions of service quality is a crucial step in improving patient experiences, optimizing resources, and enhancing healthcare service quality. However, understanding patients' needs and priorities in depth poses a challenge, particularly for hospitals serving populations with diverse demographic backgrounds. This study aims to cluster patients in a private hospital in Jambi City based on their perceptions of service quality using the K-Means algorithm. Data were collected from a 2022-2023 survey, covering patient demographics and perceptions of service quality. The data were processed through preprocessing steps, including missing value imputation, normalization, and encoding. The optimal number of clusters was determined using the Elbow and Silhouette Score methods. The results revealed three main clusters with distinct characteristics. The first cluster (34.29%) includes patients prioritizing service speed and procedural ease. The second cluster (46.12%) consists of patients who emphasize staff competence and cost fairness as their main priorities. The third cluster (19.59%) comprises patients with higher educational backgrounds who are more critical of facility quality and complaint handling. Evaluation using the Davies-Bouldin index demonstrated good cluster separation (score -0.645). This study concludes that patient segmentation based on perceptions of service quality can serve as a foundation for strategic decision-making to improve hospital service quality. Recommendations for future research include applying other algorithms such as DBSCAN, integrating sentiment analysis, and employing a hybrid approach to predict patient needs. These approaches are expected to provide a deeper understanding and more effective personalization of patient care.
Pelatihan Pemanfaatan Artificial Inteligence dalam Membuat Media Pembelajaran N, Renny Afriany; Sinaga, Rudolf; Samsinar, Samsinar; Frangky, Frangky
Jurnal ABDINUS : Jurnal Pengabdian Nusantara Vol 9 No 2 (2025): Volume 9 Nomor 2 Tahun 2025
Publisher : Universitas Nusantara PGRI Kediri

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29407/ja.v9i2.24911

Abstract

Education in Indonesia faces challenges in adopting modern technology, particularly in developing effective and engaging learning media. Teachers in the Cross-School Learning Community of Cluster II Anggrek in Jambi City still use conventional methods that are less adaptive to student needs. The utilization of AI technology such as Gamma AI can help create more efficient, innovative, and interactive learning media. The training was carried out systematically with four main modules: Introduction to Gamma AI, Creating Presentations, Tips and Tricks, and Evaluation and Application. The methods used included demonstrations, hands-on practice, interactive discussions, and evaluation of training outcomes. The activity involved 30 teacher participants from the community and was conducted on July 16, 2024, at the SD Negeri 96 Kota Jambi hall. This training successfully improved teachers' competencies in utilizing Gamma AI to create more engaging and interactive learning media. Teachers were able to save time in creating materials, use data for personalized learning, and enhance student engagement through AI-based content. The main output of the activity was the improvement of learning quality in schools within the community and the strengthening of teachers' digital competencies.
Modifikasi Algoritma Caesar Chiper Dengan Menambahkan Key Untuk Peningkatan Keamanan Sinaga, Rudolf; Frangk
CSRID (Computer Science Research and Its Development Journal) Vol. 15 No. 2: June 2023
Publisher : LPPM Universitas Potensi Utama

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22303/csrid-.15.2.2023.156-166

Abstract

This article discusses the modification of the Caesar Cipher algorithm by adding a key as a way to increase its security. Caesar Cipher is one of the classic algorithms used to encrypt messages by shifting each letter in the original message 3 times, where the shift is 3 times as the key used. However, even though Caesar Cipher is relatively simple and easy to implement, this algorithm is vulnerable to brute force attacks because it only has 26 possible shift ciphers. Therefore, the authors propose a modification by adding a key to this algorithm. In this modification, keys are added to each letter of the original message before it is shifted, thus making the resulting shift patterns more complex and difficult to solve. The test results show that modifying the Caesar Cipher algorithm with the addition of a key can improve message security. However, the author also realizes that although the addition of keys can improve security, this algorithm still has other weaknesses such as being vulnerable to frequency analysis attacks. Therefore, the authors conclude that this modification can only improve Caesar Cipher's security to a certain level and still needs to be combined with other encryption techniques to achieve better security.
Data Mining untuk Evaluasi Kualitas Layanan Persalinan: Studi Komparatif RapidMiner dan SPSS Irwandi, Irwandi; Samsinar, Samsinar; Sinaga, Rudolf
ARUMAS Vol 2 No 1 (2025): Jurnal Administrasi Rumah Sakit
Publisher : STIKES Garuda Putih

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52741/ars.v2i1.102

Abstract

Improving the quality of maternity services is a strategic priority in the health system. With the development of technology, data mining has become an effective approach to evaluate the quality of big data-based services. This study aims to compare the performance of two data mining tools—RapidMiner and SPSS—in analyzing labor service data to assess the effectiveness, efficiency, and ease of interpretation of the analysis results. A quantitative approach was used as a method with a comparative design of 500 childbirth data from hospitals. Data were analyzed using RapidMiner with Decision Tree and K-Means algorithms, as well as SPSS with logistic regression and correlation tests. The indicators assessed include prediction accuracy, processing time, and ease of use. The results of the analysis showed that RapidMiner achieved a prediction accuracy of 85.4% and was able to cluster with a silhouette coefficient of 0.65. The processing time is about 12 minutes. SPSS shows an accuracy of 81.2% with a faster processing time of 8 minutes. Significant factors found include the mother's age, complications, and type of delivery. RapidMiner excels in predictive analysis and big data processing, while SPSS is more efficient for conventional statistical analysis. A combination of the two is recommended to obtain more comprehensive service evaluation results. The integration of data mining in health information systems needs to be strengthened to support data-based policies in improving the quality of maternity services.
ANALYSIS OF SECURITY CHALLENGES IN REST API IN EDGE COMPUTING-BASED IOT ECOSYSTEM: A REVIEW Sinaga, Rudolf; Samsinar, Samsinar; Fatima, Soomal; Frangky, Frangky
JIKO (Jurnal Informatika dan Komputer) Vol 8, No 2 (2025)
Publisher : Universitas Khairun

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33387/jiko.v8i2.10097

Abstract

REST APIs are the backbone of data communication in the Internet of Things (IoT)-based edge computing ecosystem because they are lightweight and flexible. However, the REST architecture's openness and the edge devices' limited resources give rise to security challenges such as MITM, spoofing, and replay attacks. This study aims to identify the key challenges of REST API security in IoT edge environments, evaluate the limitations of conventional solutions such as TLS and RSA/ECDSA algorithms, and explore the potential of Post-Quantum Signature-based digital authentication approaches (PQS). Through a comprehensive narrative literature review of 43 peer-reviewed publications (2020-2025), this research reveals two key findings: the results show that TLS generates significant overhead in memory and energy, while classical algorithms do not resist quantum threats. PQS schemes such as Falcon and Dilithium have proven more efficient and secure in limited devices. The study concludes that PQS-based lightweight authentication approaches have strong prospects for implementation in future REST API gateway architectures, particularly in supporting electronic-based governance systems (SPBEs).
A Comprehensive Study of Ethical Frameworks, Privacy Concerns, and Technological Implications for Secure Distributed Systems Sinaga, Rudolf; Frangky Frangky
Systematic Literature Review Journal Vol. 1 No. 4 (2025): October: Systematic Literature Review Journal
Publisher : International Forum of Researchers and Lecturers

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70062/slrj.v1i4.150

Abstract

This systematic literature review examines the philosophy of science approaches to user security in distributed devices, such as IoT and Federated Learning. The review was conducted in response to the exponential growth of connected devices and the increasing security threats, including cyberattacks, data breaches, and unauthorized access. As distributed systems become more complex, traditional security approaches, such as cryptography and differential privacy, are often insufficient to address the ethical, philosophical, and contextual challenges that arise in these ecosystems. Distributed devices, especially in IoT and Federated Learning contexts, rely on vast amounts of personal data. This data, often stored or processed in decentralized environments, creates significant risks to user privacy and system integrity. As the number of connected devices grows, security risks multiply, creating challenges in maintaining user trust, privacy, and overall system resilience. Conventional techniques, such as encryption, only focus on technical aspects, often neglecting the deeper philosophical dimensions, such as the nature of knowledge, privacy, and fairness in these systems. These gaps highlight the need for a more nuanced approach that incorporates philosophical perspectives into security frameworks. This study uses a systematic literature review method based on the PICOC (Population, Intervention, Comparison, Outcome, Context) framework to analyze the relevance of epistemology, ontology, and ethics in strengthening system security. By examining the foundational principles of how knowledge is constructed (epistemology), what entities exist in the system (ontology), and the ethical considerations around data and user privacy (ethics), the review provides a comprehensive understanding of how philosophical concepts can be integrated into the design and implementation of security systems in distributed environments. The results reveal that epistemological principles, such as the verification and validation of data sources and models, can significantly improve the reliability and trustworthiness of distributed systems.