Claim Missing Document
Check
Articles

Found 23 Documents
Search

Perbandingan Sistem Informasi Edukasi dan Dukungan Pasien Yang Tepat Untuk Perawatan Pasien Home Care Renny Afriany; Samsinar Samsinar; Rudolf Sinaga
ARUMAS Vol 1 No 1 (2024): Jurnal Penelitian Administrasi Rumah Sakit
Publisher : STIKES Garuda Putih

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

In home care patient care, patient education and support information systems play an important role in providing appropriate information and support to patients and their families. This information system can be accessed by patients and their families anytime and anywhere, thereby increasing the effectiveness of care. There are various patient education and support information systems available on the market. Each system has its own advantages and disadvantages. Therefore, it is important to compare these systems to determine the most appropriate system for treating home care patients. From these results and discussion, it can be concluded that each platform has its own advantages and disadvantages. The best choice depends on the Home Care patient's individual preferences and specific needs. The level of ease of access, service response, and availability of complete medical information are the main factors in choosing a suitable platform to be used as a home care referral platform.
Penerapan ISO/IEC 27001:2022 dalam Tata Kelola Keamanan Sistem Informasi: Evaluasi Proses dan Kendala Sinaga, Rudolf; Taan, Frangky
NUANSA INFORMATIKA Vol. 18 No. 2 (2024): Nuansa Informatika 18.2 Juli 2024
Publisher : FKOM UNIKU

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25134/ilkom.v18i2.205

Abstract

Implementing ISO/IEC 27001:2022 in information security management is crucial and timely due to the increasing cyber threats, the necessity for regulatory compliance, and the significance of information security as a competitive edge. The latest revision of this standard demands proper adaptation and implementation to ensure effective information security management across various organizations. This study examines the key components of ISO/IEC 27001:2022, including organizational context, leadership, planning, support, operations, performance evaluation, and improvement. It delves into the application of ISO/IEC 27001:2022 in security system governance, emphasizing how this standard can enhance risk management and information security within an organization. A case study on a logistics company adopting this standard was conducted to identify best practices, implementation challenges, and its impact on security and regulatory compliance. The study's findings demonstrate that implementing ISO/IEC 27001:2022 effectively improves an organization's information security posture by integrating security policies, procedures, and controls into business processes. These findings offer recommendations as practical guidelines for organizations aiming to strengthen their information security management through the adoption of globally recognized international standards.
Information System Security Audit Based on the DSS05 Framework Cobit 5 at Higher Education XX Sinaga, Rudolf; Samsinar, Samsinar; Afriany, Renny
BERKALA SAINSTEK Vol 9 No 1 (2021)
Publisher : Universitas Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.19184/bst.v9i1.20361

Abstract

Currently, information has become a commodity or basic need, it can even be said that we are already in an "information-based social" era. It is undeniable that the ability to access and ensure the availability of information quickly and accurately has become a very essential component for an organization, whether in the form of social or commercial organizations, educational institutions such as universities, government agencies, and individuals. Various channels were created to regulate access rights to information, to prevent unauthorized people from accessing it, to minimize losses for the owner of the information. Based on the results of interviews with the research object of XX college, there are still frequent disruptions to information system security such as attacks on servers that result in server downtime, attacks on institutional e-mails that result in being unable to receive or even send e-mails, and other disturbances. This certainly harms information services at the tertiary institution, therefore an information system security audit is required. This study aims to measure the level of information system security capabilities using the Cobit 5 framework in the APO13 and DSS05 domains. Based on the results of the audit, it was found that the GAP value was 3.6 for the APO13 domain or at level 1 while 3.4 for the GAP DSS05 value or at level 2, it can be concluded that the information system security maturity level is still very low so that it needs improvement. It is recommended to make SOPs and documentation of maintenance, control, and periodic security evaluation, install an antivirus that has high and up to date protection accuracy, and make regular maintenance reports both on software and hardware.
Information Technology Governance Audit at XYZ College Using COBIT Framework 2019 Samsinar, Samsinar; Sinaga, Rudolf
BERKALA SAINSTEK Vol 10 No 2 (2022)
Publisher : Universitas Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.19184/bst.v10i2.30325

Abstract

Reliable and up-to-date information services are one of the parameters for the achievement of an organization's performance, including for a university, which is currently required to be able to adapt to technological advances to produce graduates who can master information technology to support the competence of their respective fields. The curriculum changes launched by the current government are also proof that the application of information technology in higher education is a must. Seeing this, universities have a difficult task, especially at the implementation stage of implementing information technology, because they must prepare not only infrastructure but also human resources who can develop good information system governance. Therefore it is necessary to carry out an IT governance audit. From the results of observations made, XYZ College has utilized information technology in academic services and other information services. However, it was found that information technology governance does not yet have a standard so that it is considered not to be able to meet the desired goals, and instead will cause various problems including uncontrolled operational costs and other problems. The purpose of this study is to measure the performance of information technology governance at XYZ College using the COBIT 2019 framework. Based on the results of an audit conducted from 7 EGIT components, namely processes, organizational structure, information flow and items, people skills and competencies, policies and procedures, culture, ethical behavior, and service infrastructure and application are on average at level 3, it can be concluded that the application of information technology has been running, the infrastructure is adequate but does not have good governance procedures or standards. It is recommended that XYZ Higher Education make standards for information technology governance as well as periodic evaluations of the use of all components of information technology, both software, hardware, and brainware.
Fuzzy Employee Placement Suitability Assessment using Mamdani Fuzzy Method Afriany, Renny; Sinaga, Rudolf; Samsinar, Samsinar
BERKALA SAINSTEK Vol 10 No 2 (2022)
Publisher : Universitas Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.19184/bst.v10i2.30280

Abstract

For a company, employees are the spearhead for the company because they have a function as Customer Service, customer satisfaction is obtained after interacting with the company through the performance of its employees. Employees are expected to meet all customer needs with the applicable regulations in the company and become a source of income for the company. To get reliable employees, one way is to assess the suitability of their placement in the appropriate position. With the assessment of the suitability of positioning, companies can consider and determine the provision of rewards, promotions, punishments, training, coaching, counseling, or transfers for their employees. The choice of method used to assess the suitability of employee placement in a company is Fuzzy Mamdani. With the Fuzzy Mamdani method, a system that is completely measurable and human assessments that tend to be immeasurable can be bridged. Assessment of the suitability of employee placement using the resulting fuzzy method, is expected to be an alternative solution for companies to give positions to their employees.
Analisis Segmentasi Pasien Berdasarkan Persepsi Kualitas Pelayanan dengan Algoritma Clustering Frangky, Frangky; Sinaga, Rudolf; Raihansyah, M.
Explorer Vol 5 No 1 (2025): January 2025
Publisher : Forum Kerjasama Pendidikan Tinggi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/explorer.v5i1.1818

Abstract

Patient segmentation based on perceptions of service quality is a crucial step in improving patient experiences, optimizing resources, and enhancing healthcare service quality. However, understanding patients' needs and priorities in depth poses a challenge, particularly for hospitals serving populations with diverse demographic backgrounds. This study aims to cluster patients in a private hospital in Jambi City based on their perceptions of service quality using the K-Means algorithm. Data were collected from a 2022-2023 survey, covering patient demographics and perceptions of service quality. The data were processed through preprocessing steps, including missing value imputation, normalization, and encoding. The optimal number of clusters was determined using the Elbow and Silhouette Score methods. The results revealed three main clusters with distinct characteristics. The first cluster (34.29%) includes patients prioritizing service speed and procedural ease. The second cluster (46.12%) consists of patients who emphasize staff competence and cost fairness as their main priorities. The third cluster (19.59%) comprises patients with higher educational backgrounds who are more critical of facility quality and complaint handling. Evaluation using the Davies-Bouldin index demonstrated good cluster separation (score -0.645). This study concludes that patient segmentation based on perceptions of service quality can serve as a foundation for strategic decision-making to improve hospital service quality. Recommendations for future research include applying other algorithms such as DBSCAN, integrating sentiment analysis, and employing a hybrid approach to predict patient needs. These approaches are expected to provide a deeper understanding and more effective personalization of patient care.
Pelatihan Pemanfaatan Artificial Inteligence dalam Membuat Media Pembelajaran N, Renny Afriany; Sinaga, Rudolf; Samsinar, Samsinar; Frangky, Frangky
Jurnal ABDINUS : Jurnal Pengabdian Nusantara Vol 9 No 2 (2025): Volume 9 Nomor 2 Tahun 2025
Publisher : Universitas Nusantara PGRI Kediri

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29407/ja.v9i2.24911

Abstract

Education in Indonesia faces challenges in adopting modern technology, particularly in developing effective and engaging learning media. Teachers in the Cross-School Learning Community of Cluster II Anggrek in Jambi City still use conventional methods that are less adaptive to student needs. The utilization of AI technology such as Gamma AI can help create more efficient, innovative, and interactive learning media. The training was carried out systematically with four main modules: Introduction to Gamma AI, Creating Presentations, Tips and Tricks, and Evaluation and Application. The methods used included demonstrations, hands-on practice, interactive discussions, and evaluation of training outcomes. The activity involved 30 teacher participants from the community and was conducted on July 16, 2024, at the SD Negeri 96 Kota Jambi hall. This training successfully improved teachers' competencies in utilizing Gamma AI to create more engaging and interactive learning media. Teachers were able to save time in creating materials, use data for personalized learning, and enhance student engagement through AI-based content. The main output of the activity was the improvement of learning quality in schools within the community and the strengthening of teachers' digital competencies.
Pengembangan Model Penilaian Kepatuhan Salah Satu Perguruan Tinggi Terhadap Standar ISO 27001:2022 Rudolf Sinaga
Jurnal Teknik Informatika dan Sistem Informasi Vol 9 No 3 (2023): JuTISI
Publisher : Maranatha University Press

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28932/jutisi.v9i3.6850

Abstract

Information security systems are important for organizations, including universities, because they are a crucial aspect of today's digital world. In this context ISO 27001:2022 is an important standard. One of the universities in Jambi City  manages sensitive data, using various information systems such as student data, lecturers, finance, employees and research, this will certainly increase the complexity of information security system governance. The college also has an open academic community, consisting of students, alumni, faculty, and administrative staff, which provides opportunities for increased information system security risks, such as phishing and malware attacks. This study aims to develop an assessment model for the compliance of higher education organizations with ISO 27001:2022 standards and apply the model to one of the universities in Jambi City. Evaluations show that the universities has a high level of compliance with physical and environmental security, but areas such as information security policy, risk management, information assets, access control, network security, as well as security incident management require increased compliance. Recommendations for improvement and improvement are given for each area that requires more attention, according to the ISO 27001:2022 standard including the development of risk identification, risk management, identification of important information assets, protection of information assets, protection against network attacks, regular network security monitoring, procedures for developing effective event response, reporting of security events, and learning from events that occur. In conclusion, the development of one of the universities in Jambi City organization's compliance assessment model with the ISO 27001:2022 standard provides a comprehensive view of the level of compliance in various areas of information system security. Through the identification of weaknesses and the recommendations for improvement that are drafted, concrete steps can be taken to improve compliance and manage information system security more effectively.  
Modifikasi Algoritma Caesar Chiper Dengan Menambahkan Key Untuk Peningkatan Keamanan Sinaga, Rudolf; Frangk
CSRID (Computer Science Research and Its Development Journal) Vol. 15 No. 2: June 2023
Publisher : LPPM Universitas Potensi Utama

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This article discusses the modification of the Caesar Cipher algorithm by adding a key as a way to increase its security. Caesar Cipher is one of the classic algorithms used to encrypt messages by shifting each letter in the original message 3 times, where the shift is 3 times as the key used. However, even though Caesar Cipher is relatively simple and easy to implement, this algorithm is vulnerable to brute force attacks because it only has 26 possible shift ciphers. Therefore, the authors propose a modification by adding a key to this algorithm. In this modification, keys are added to each letter of the original message before it is shifted, thus making the resulting shift patterns more complex and difficult to solve. The test results show that modifying the Caesar Cipher algorithm with the addition of a key can improve message security. However, the author also realizes that although the addition of keys can improve security, this algorithm still has other weaknesses such as being vulnerable to frequency analysis attacks. Therefore, the authors conclude that this modification can only improve Caesar Cipher's security to a certain level and still needs to be combined with other encryption techniques to achieve better security.
Data Mining untuk Evaluasi Kualitas Layanan Persalinan: Studi Komparatif RapidMiner dan SPSS Irwandi, Irwandi; Samsinar, Samsinar; Sinaga, Rudolf
ARUMAS Vol 2 No 1 (2025): Jurnal Administrasi Rumah Sakit
Publisher : STIKES Garuda Putih

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52741/ars.v2i1.102

Abstract

Improving the quality of maternity services is a strategic priority in the health system. With the development of technology, data mining has become an effective approach to evaluate the quality of big data-based services. This study aims to compare the performance of two data mining tools—RapidMiner and SPSS—in analyzing labor service data to assess the effectiveness, efficiency, and ease of interpretation of the analysis results. A quantitative approach was used as a method with a comparative design of 500 childbirth data from hospitals. Data were analyzed using RapidMiner with Decision Tree and K-Means algorithms, as well as SPSS with logistic regression and correlation tests. The indicators assessed include prediction accuracy, processing time, and ease of use. The results of the analysis showed that RapidMiner achieved a prediction accuracy of 85.4% and was able to cluster with a silhouette coefficient of 0.65. The processing time is about 12 minutes. SPSS shows an accuracy of 81.2% with a faster processing time of 8 minutes. Significant factors found include the mother's age, complications, and type of delivery. RapidMiner excels in predictive analysis and big data processing, while SPSS is more efficient for conventional statistical analysis. A combination of the two is recommended to obtain more comprehensive service evaluation results. The integration of data mining in health information systems needs to be strengthened to support data-based policies in improving the quality of maternity services.