Claim Missing Document
Check
Articles

Found 29 Documents
Search

Pengembangan Model Penilaian Kepatuhan Salah Satu Perguruan Tinggi Terhadap Standar ISO 27001:2022 Sinaga, Rudolf
Jurnal Teknik Informatika dan Sistem Informasi Vol 9 No 3 (2023): JuTISI
Publisher : Maranatha University Press

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28932/jutisi.v9i3.6850

Abstract

Information security systems are important for organizations, including universities, because they are a crucial aspect of today's digital world. In this context ISO 27001:2022 is an important standard. One of the universities in Jambi City  manages sensitive data, using various information systems such as student data, lecturers, finance, employees and research, this will certainly increase the complexity of information security system governance. The college also has an open academic community, consisting of students, alumni, faculty, and administrative staff, which provides opportunities for increased information system security risks, such as phishing and malware attacks. This study aims to develop an assessment model for the compliance of higher education organizations with ISO 27001:2022 standards and apply the model to one of the universities in Jambi City. Evaluations show that the universities has a high level of compliance with physical and environmental security, but areas such as information security policy, risk management, information assets, access control, network security, as well as security incident management require increased compliance. Recommendations for improvement and improvement are given for each area that requires more attention, according to the ISO 27001:2022 standard including the development of risk identification, risk management, identification of important information assets, protection of information assets, protection against network attacks, regular network security monitoring, procedures for developing effective event response, reporting of security events, and learning from events that occur. In conclusion, the development of one of the universities in Jambi City organization's compliance assessment model with the ISO 27001:2022 standard provides a comprehensive view of the level of compliance in various areas of information system security. Through the identification of weaknesses and the recommendations for improvement that are drafted, concrete steps can be taken to improve compliance and manage information system security more effectively.  
Penerapan Komputasi Kuantum dalam Kriptografi Modern dan Sistem Keamanan Digital Rudolf Sinaga; Uswatun Kasanah
Journal of New Trends in Sciences Vol. 1 No. 4 (2023): November : Journal of New Trends in Sciences
Publisher : CV. Aksara Global Akademia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59031/jnts.v1i4.779

Abstract

Quantum computing has emerged as a revolutionary paradigm, holding immense potential to solve complex problems that classical computing struggles to address. This study explores the application of quantum computing in cryptography, with a specific focus on two major quantum algorithms: Shor’s algorithm for large number factorization and Grover’s algorithm for unstructured database searching. The main objective of this research is to compare the performance of these quantum algorithms with classical cryptographic methods in terms of computational efficiency and time. Shor’s algorithm, which can factorize large numbers in polynomial time, presents a significant threat to the security of public-key cryptosystems such as RSA, which rely on the difficulty of factoring large numbers. On the other hand, Grover’s algorithm offers a quadratic speedup for searching unstructured databases, making it highly relevant for symmetric key cryptography systems like AES. In this study, simulations of both algorithms were conducted using quantum simulators to assess their speed and effectiveness in solving cryptographic challenges. The results demonstrate that quantum algorithms significantly reduce the computation time compared to classical methods, with Shor’s algorithm efficiently solving factorization problems and Grover’s algorithm accelerating key searching processes. However, while these quantum algorithms show promise in improving cryptographic systems, the implementation of large-scale quantum computers remains a challenge. This research highlights the potential of quantum computing to revolutionize data security and underscores the need for further development in quantum algorithms and the transition to quantum-resistant cryptographic systems to safeguard against the threat posed by quantum computers.
Segmentasi Pasien Berbasis K-Means dari Tanda-tanda Vital dan Demografi : Pendekatan Unsupervised Learning untuk Profil Risiko Klinis Renny Afriany; Rudolf Sinaga; Samsinar Samsinar
Jurnal ilmiah Sistem Informasi dan Ilmu Komputer Vol. 5 No. 3 (2025): November: Jurnal ilmiah Sistem Informasi dan Ilmu Komputer
Publisher : Lembaga Pengembangan Kinerja Dosen

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55606/juisik.v5i3.1811

Abstract

Digital transformation in the health system demands the use of clinical data more strategically to support evidence-based decision-making. This study aims to explore the application of the K-Means Clustering algorithm in patient segmentation based on a combination of vital signs (systolic and diastolic blood pressure) and demographic characteristics (age, weight, and gender). Data on 1,401 outpatients was obtained from the medical record system of a hospital in Indonesia, then processed through the stages of preprocessing, standardization, and dimensionality reduction using PCA. The results of the elbow method showed that the optimal number of clusters was 3 (k=3). Descriptive analysis showed that Cluster 0 consisted of 100% women with normal blood pressure (124/77 mmHg) and an average body weight of 55.6 kg; Cluster 1 consists of the majority of women with high blood pressure (160.8/98.8 mmHg); while Cluster 2 includes 100% of men with blood pressure leading to pre-hypertension (130.1/80.7 mmHg). PCA visualizations show fairly clear cluster separation, with Cluster 1 having the most clinically distinct characteristics. The conclusion of this study is that the K-Means-based unsupervised learning approach is effective in identifying latent risk patterns in patient populations, as well as the potential to support clinical risk mapping and preventive health policies. Future recommendations include the integration of this method in EMR systems and the expansion of studies on national datasets.
Meningkatkan Kompetensi Digital Guru SD melalui Pelatihan Desain Modul Ajar Kreatif dengan Canva di Kota Jambi Renny Afriany; Samsinar Samsinar; Rudolf Sinaga; Frangky Frangky; Ika Widyastuti
KREATIF: Jurnal Pengabdian Masyarakat Nusantara Vol. 5 No. 4 (2025): Jurnal Pengabdian Masyarakat Nusantara
Publisher : Pusat Riset dan Inovasi Nasional

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55606/kreatif.v5i4.8851

Abstract

This community service activity aims to improve the digital competence and creativity of elementary school teachers in Jambi City through training in making teaching modules using the Canva platform. The main problem faced by teachers is the limited ability to design digital teaching materials that are attractive and in accordance with the demands of the Independent Curriculum. The training was held at SD Negeri 176 Jambi City on July 30, 2025 with interactive lectures, direct demonstrations, and independent practice. Participants consisted of elementary school teachers from several schools in Jambi City. Training materials include an introduction to Canva, the basic principles of educational graphic design, the creation of learning outcomes-based learning modules, and the publication of design results. Evaluation is carried out through pre-test and post-test, observation of participant activities, and assessment of the digital teaching module products produced. The results of the evaluation showed a significant improvement in participants' understanding and skills, with more than 90% of participants experiencing an increase in scores, and 85% stating that they would use Canva regularly in the preparation of teaching materials. In addition, participants showed high enthusiasm and produced teaching modules that were creative and contextual to the needs of students. This activity contributes to strengthening pedagogic competence, digital literacy, and learning innovation in the basic education environment, as well as being a concrete step to support the digital transformation of education in Jambi City.
FT Pelatihan Pembuatan Evaluasi Pembelajaran dengan Menggunakan Google Formulir bagi Guru SDN 96/IV Kota Jambi Sinaga, Rudolf; Afriany, Renny; Samsinar, Samsinar
Jurnal ABDINUS : Jurnal Pengabdian Nusantara Vol 8 No 1 (2024): Volume 8 Nomor 1 Tahun 2024
Publisher : Universitas Nusantara PGRI Kediri

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29407/ja.v8i1.21813

Abstract

SD Negeri 96/IV is at Jalan Sunan Bonang RT. 32 Kel. Simpang III Sipin Kec. Kota Baru Jambi City. In the implementation of learning evaluation, teachers at this school apart from using the paper-based system, have also tried to use other media, such as Quiziz, and Google Forms. But in practice, it is still not used optimally, because the teachers have not gained good knowledge of the features and capabilities of each of these applications. Making learning evaluations is an important part of an effective learning process. Therefore, in the digital era, one of the most suitable media to use is Google Forms, because Google Forms can be used as a tool that can improve the quality and effectiveness in making learning evaluations or exam questions with several question models such as multiple choice, essay, and can add images and videos to the questions. Google Forms will also make it easier for teachers to collect and analyze exam data. Community service at this school was carried out in March 2023. Activities are carried out using presentation, training, and evaluation methods. The conclusions obtained through this community service activity are: 1. Improve teachers' understanding at SDN 96/IV about the features and capabilities of Google Forms, 2. Improve teachers' knowledge at SDN 96/IV in making learning evaluations using Google Forms.
Penerapan ISO/IEC 27001:2022 dalam Tata Kelola Keamanan Sistem Informasi: Evaluasi Proses dan Kendala Rudolf Sinaga; Frangky Taan
NUANSA INFORMATIKA Vol. 18 No. 2 (2024): Nuansa Informatika 18.2 Juli 2024
Publisher : FKOM UNIKU

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25134/ilkom.v18i2.205

Abstract

Implementing ISO/IEC 27001:2022 in information security management is crucial and timely due to the increasing cyber threats, the necessity for regulatory compliance, and the significance of information security as a competitive edge. The latest revision of this standard demands proper adaptation and implementation to ensure effective information security management across various organizations. This study examines the key components of ISO/IEC 27001:2022, including organizational context, leadership, planning, support, operations, performance evaluation, and improvement. It delves into the application of ISO/IEC 27001:2022 in security system governance, emphasizing how this standard can enhance risk management and information security within an organization. A case study on a logistics company adopting this standard was conducted to identify best practices, implementation challenges, and its impact on security and regulatory compliance. The study's findings demonstrate that implementing ISO/IEC 27001:2022 effectively improves an organization's information security posture by integrating security policies, procedures, and controls into business processes. These findings offer recommendations as practical guidelines for organizations aiming to strengthen their information security management through the adoption of globally recognized international standards.
ANALISIS TINGKAT KEPUASAN PETUGAS REKAM MEDIS ELEKTRONIK DENGAN PENDEKATAN END-USER COMPUTING SATISFACTION Zhenya, Zhenya Zeldha Elyzvania; Irwandi, Irwandi; Adha Taufik, Anvika; Sinaga, Rudolf
Journal of Hospital Administration and Management (JHAM) Vol 6 No 2 (2025): Journal of Hospital Administration and Management (JHAM)
Publisher : LPPM Universitas Awal Bros

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.54973/jham.v6i2.682

Abstract

The implementation of electronic recording systems like Electronic Medical Records (EMR) is expected to ease and accelerate service provision. However, EMR applications don't always fully support healthcare professionals in their duties. Therefore, an evaluation is crucial to identify system weaknesses. User satisfaction with electronic medical records is a key indicator of information system success. This study aimed to determine the satisfaction level of electronic medical record officers using the End-User Computing Satisfaction (EUCS) method, based on the dimensions of Content, Accuracy, Format, Ease of Use, and Timeliness. This descriptive quantitative study used a survey method, distributing questionnaires to 39 EMR user officers. Data analysis involved descriptive statistics and hypothesis testing using multiple linear regression. The results showed all variables were in the very satisfied category, with average values of Content 4.33, Accuracy 4.31, Format 4.35, Ease of Use 4.23, and Timeliness 4.27. The F-test also indicated that all five EUCS variables simultaneously had a significant effect on user satisfaction. Thus, it can be concluded that the EMR system at UPTD Koni Health Center has met end-user expectations regarding its operations. UPTD Koni Health Center is advised to continuously improve the quality of the EMR system, conduct ongoing evaluations and improvements in areas with a medium satisfaction level, and strategically plan EMR system development to support more efficient health services.
CyberBERT: A Semantic Search Framework for Security Terminologies Using Transformer Models Sinaga, Rudolf; Frangky
Global Science: Journal of Information Technology and Computer Science Vol. 1 No. 4 (2025): December: Global Science: Journal of Information Technology and Computer Scienc
Publisher : International Forum of Researchers and Lecturers

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70062/globalscience.v1i4.179

Abstract

: The rapid expansion of cybersecurity standards and threat intelligence frameworks has led to significant semantic fragmentation among security terminologies, hindering effective information retrieval and interoperability across systems. Traditional keyword-based search approaches are inadequate for capturing the contextual meaning of security terms, particularly within formal frameworks such as NIST, MITRE ATT&CK, and CWE. This study addresses this challenge by proposing CyberBERT, a transformer-based semantic search framework designed to align cybersecurity terminologies through deep contextual representation and ontology-driven reasoning. Research Objectives: The primary objective of this research is to develop a semantic retrieval model capable of understanding conceptual relationships between security terms beyond lexical similarity. Methodology: The proposed methodology fine-tunes a BERT-based model on the NIST Glossary corpus using a combination of masked language modeling and triplet loss objectives to generate discriminative semantic embeddings. These embeddings are further aligned with cybersecurity ontologies, including MITRE ATT&CK and CWE, to enhance semantic consistency and explainability. Semantic retrieval is performed using cosine similarity within a 768-dimensional embedding space and evaluated using Mean Reciprocal Rank (MRR) and Precision@K metrics. Results: Experimental results demonstrate that CyberBERT achieves an MRR of 0.832, outperforming domain-adapted baselines such as SecureBERT and CyBERT. The integration of ontology alignment improves semantic accuracy by over 6%, while robustness evaluations confirm resilience against adversarial linguistic perturbations. Visualization using t-SNE reveals coherent semantic clustering aligned with the five core NIST Cybersecurity Framework functions. Conclusions: In conclusion, CyberBERT effectively bridges semantic gaps across cybersecurity terminologies by combining transformer-based contextual learning with ontological reasoning. The framework offers a robust, interpretable, and scalable solution for semantic search, supporting improved interoperability and knowledge discovery in cybersecurity operations and standards harmonization.
Contextual Data Fusion and Explainable Analytics for Supporting Strategic Decision Making in Smart Information Systems Environments Priyo Wibowo; Rudolf Sinaga
International Journal of Computer Technology and Science Vol. 1 No. 1 (2024): International Journal of Computer Technology and Science
Publisher : Asosiasi Riset Teknik Elektro dan Infomatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62951/ijcts.v1i1.357

Abstract

The increasing complexity and heterogeneity of data in Smart Information Systems pose significant challenges for effective decision-making. While data fusion techniques have been widely adopted to integrate multiple data sources, traditional fusion approaches often fail to consider contextual information, resulting in limited interpretability and reduced decision relevance. This study proposes a contextual data fusion approach that integrates heterogeneous data sources with contextual attributes, including temporal, spatial, and operational context, to enhance decision accuracy and robustness. The research employs a computational and experimental methodology involving data preprocessing, context encoding, multi-level data fusion, and performance evaluation. Experimental results demonstrate that the proposed approach outperforms single-source analysis and non-contextual data fusion in terms of accuracy, precision, recall, and F1-score, with only a marginal increase in computational cost. The findings confirm that incorporating context into the data fusion process significantly improves the quality and reliability of analytical outcomes. This study contributes to the development of intelligent and data-driven systems by highlighting the critical role of contextual awareness in supporting transparent and effective decision-making in Smart Information Systems.