Claim Missing Document
Check
Articles

Found 32 Documents
Search

PENGUKURAN RISIKO DAN EVALUASI KEAMANAN INFORMASI MENGGUNAKAN INDEKS KEAMANAN INFORMASI DI BKD XYZ BERDASARKAN ISO 27001 / SNI Tri Rochmadi; Ike Yunia Pasa
Cyber Security dan Forensik Digital Vol. 4 No. 1 (2021): Edisi Mei 2021
Publisher : Fakultas Sains dan Teknologi UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/csecurity.2021.4.1.2439

Abstract

Digitalisasi tidak bisa dihindari di era revolusi industri 4.0 termasuk di pemerintahan. Selain memberikan manfaat yang luar biasa pada sisi efisiensi dan efektiftas kerja, namun juga meninggalkan ancaman tentang data privasi atau keamanan informasi. Atas dasar ancaman yang dimungkinkan banyak terjadi akibat digitalisasi tersebut, maka perlu adanya pengukuran bagaimana keamanan informasi pada BKD XYZ agar bisa dijadikan evaluasi dan perbaikan. Hal ini dimaksudkan agar BKD XYZ bisa melindungi asset data dan informasi atau mencegah adanya serangan dari ancaman-ancaman yang mungkin saja terjadi. Metode yang digunakan dalam penelitian ini adalah dengan menggunakan Indeks KAMI sebagai tool pengukuran dan evaluasi keamanan informasi di BKD XYZ. Dari hasil penelitian yang dilakukan, bahwasanya BKD XYZ masih berada pada tingkat tidak layak untuk benar-benar bisa menerapkan keamanan informasi yang ideal. Sehingga dibutuhkan tindak lanjut sesuai rekomendasi perbaikan, agar BKD XYZ bisa mencapai kesiapan sertifikasi ISO 27001/SNI.
IDENTIFIKASI BARANG BUKTI DIGITAL PADA APLIKASI MI VIDEO MENGGUNAKAN METODE LIVE FORENSICS Dedy Hariyadi; Dedy Hariyadi; Ike Yunia Pasa
Seminar Nasional Informatika (SEMNASIF) Vol 1, No 1 (2018): Landscape Industri Internet Dampak Perilaku Marketing Indonesia
Publisher : Jurusan Teknik Informatika

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Saat ini perkembangan teknologi juga mempengaruhi tingkat kejahatan. Hal ini ditunjukan pertumbuhan barang bukti elektronik dan/atau digital yang ditangani oleh Kepolisian selalu meningkat dari tahun ke tahun. Bahkan beberapa kejahatan terinspirasi dari media internet, sebagai contoh kejahatan seksual. Ada beberapa pelaku tindak kejahatan seksual yang terinspirasi dari video yang pernah dilihatnya melalui sebuah ponsel cerdas. Penelitian ini mengusulkan metode analisis forensik untuk mengidentifikasi barang bukti digital dari aplikasi pemutar video.  
INSOURCING VERSUS OUTSOURCING: MOTIVASI, RISIKO DAN MITIGASI RISIKO (KASUS: SISTEM INFORMASI AKADEMIK DI SEBUAH PERGURUAN TINGGI SWASTA “PLS”) Ike Yunia Pasa
Jurnal Ilmiah Teknosains Vol 3, No 1/ Mei (2017): JiTek
Publisher : Universitas PGRI Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (263.098 KB) | DOI: 10.26877/jitek.v3i1/ Mei.1391

Abstract

Penelitian-penelitian terkait model pengadaan (outsourcing dan insourcing) banyak ditemukan di negara-negara maju dan sangat sedikit penelitian yang dilakukan di negara berkembang. Penelitian model pengadaan (outsourcing dan insourcing) ini dilakukan di negara berkembang yaitu indonesia dengan melihat berbagai motivasi, risiko dan mitigasi risiko yang menjadi pertimbangan pihak manajemen strategis dalam memutuskan menggunakan outsourcing maupun insourcing dalam pengembangan sistem informasi akademik (SIA) pada perguruan tinggi swasta “PLS”. Analisis data Model Miles&Huberman (1994) yang digunakan pada penelitian ini menghasilkan adanya dua temuan baru motivasi outsourcing berupa dukungan internal dan garansi sistem, satu temuan baru motivasi insourcing berupa trauma outsourcing, tiga temuan baru risiko outsourcing berupa penolakan orang dalam, lamanya waktu perbaikan sistem dan hak akses terbatas, tiga temuan baru risiko insourcing berupa perbedaan format script program, permasalahan biaya dan perlu fasilitas penunjang, tiga temuan baru mitigasi risiko outsourcing berupa dukungan ahli TI internal, pembentukan tim insourcing dan pembuatan sistem baru dan empat temuan baru mitigasi risiko insourcing berupa pembagian permodul, konversi sistem, mengikuti pedoman penjaminan mutu dan pelaporan secara berkala. Temuan mitigasi risiko insourcing akan sangat menarik bagi komunitas peneliti mitigasi risiko insourcing sistem informasi dikarenakan penelitian-penelitian yang secara spesifik langsung membahas mitigasi risiko insourcing masih sangat jarang ditemukan. 
Analisis Forensik Untuk Mendeteksi Pesan yang Disembunyikan pada Short Message Service Menggunakan Aplikasi Berlisensi Open Source Ike Yunia Pasa; Dedy Hariyadi
SMARTICS Journal Vol 6 No 2: SMARTICS Journal (Oktober 2020)
Publisher : Universitas PGRI Kanjuruhan Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21067/smartics.v6i2.4703

Abstract

Anti Forensic Techniques aim to complicate the process of investigating a crime. Hiding an SMS message with the aim or support of a crime can be categorized as an Anti Forensic technique. On smartphones with the MIUI operating system, it is equipped with features to block an SMS message and even hide an SMS message. The existence of a feature to hide SMS messages will complicate the investigation process if this feature uses to support crime. This research proposes a forensic analysis method to detect hidden SMS messages using open-source software. Differences in the process of retrieving digital evidence will affect the results of forensic analysis. So in this research to compare the results of the analysis of two digital forensic software to detect hidden messages.
Sistem Informasi Pembayaran Sekolah Pada SMK Widya Kutoarjo Berbasis Web Faizatun Karomah; Ike Yunia Pasa; Hamid Muhammad Jumasa
INTEK : Jurnal Informatika dan Teknologi Informasi Vol. 3 No. 2 (2020)
Publisher : Universitas Muhammadiyah Purworejo

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37729/intek.v3i2.842

Abstract

The school payment system at SMK Widya Kutoarjo is still handwritten. Data related to payments such as building management payments, uniform payments, book payments, and government assistance are kept in the form of files, making them less effective and efficient. The purpose of this study is to create a school payment information system, with the benefit of facilitating the process of managing school payment data and making it easier for parents to monitor student payment status. The school payment information system designed using Context Diagrams, Data Flow Diagrams (DFD), and Entity Relationship Diagrams (ERD) aim to help the payment process to be more effective in managing data.
Pengembangan Sistem Informasi Presensi Kehadiran Guru Menggunakan Model Sequential Linier Wahju Tjahjo Saputro; Ike Yunia Pasa; Wuri Setyowardani
INTEK : Jurnal Informatika dan Teknologi Informasi Vol. 4 No. 2 (2021)
Publisher : Universitas Muhammadiyah Purworejo

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37729/intek.v4i2.1698

Abstract

The manual attendance system currently running at SMK TKM Teknik Purworejo has not been able to produce fast and accurate data so it is not easy to monitor teacher attendance. Therefore, a computerized Teacher Presence System is needed to produce faster and more accurate data at SMK TKM Teknik Purworejo. In making the Presence Information System for Teacher Attendance at SMK TKM Teknik Purworejo the Sequential Linear or Classic Life Cycle Model or commonly referred to as the Waterfall model is used. Linear Sequential is an approach to systematic and sequential software development that starts at the system level and progresses throughout the analysis, design, code, and testing. The data collection procedure was carried out to collect the data needed in the study, in this case using the methods of observation, interviews, and documentation. The system built can provide various facilities such as the process of adding, changing, and deleting admin data, teacher data, permission type data. It also presents the process of updating general and school settings. There is also a facility to make an entry and exit presence, which is equipped with a photo of the presence and checking the IP connection used. And also displays attendance and permission reports.
Penerapan Metode SAW Pada Penentuan Penerima Beasiswa Lazizmu Ike Yunia Pasa; Nur Wachid Adi Prasetya; Ratih Hafsarah Maharrani
INTEK : Jurnal Informatika dan Teknologi Informasi Vol. 5 No. 1 (2022)
Publisher : Universitas Muhammadiyah Purworejo

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37729/intek.v5i1.1971

Abstract

Scholarships are awards in the form of financial aid to individuals or organizations for their work performance. Purworejo Muhammadiyah University (UMP) as an educational institution, also provides scholarships to its students. One of them is the Lazizmu scholarship. In the process, the campus needs to prioritize students according to their criteria. However, the accuracy of student selection is still low; therefore it is necessary to implement an efficient method to assist the selection process for the acceptance of the Lazizmu scholarship at UMP. This research aims to apply the calculation of the Simple Additive Weighting (SAW) method to the selection problem of the Lazizmu scholarship recipient, by conducting a test using a confusion matrix. The results of the confusion matrix test show that the level of accuracy in calculations using the Simple Additive Weighting (SAW) method is 80%, thus it can be developed into a decision support system to determine the acceptance of the Lazizmu scholarship at the Muhammadiyah University of Purworejo (UMP).
Pengaruh Faktor Sosial Dan Kognitif Terhadap Persepsi Kegunaan Magnetic Resonance Imaging Nurul Bahiyah; Ike Yunia Pasa
INTEK : Jurnal Informatika dan Teknologi Informasi Vol. 1 No. 2 (2018)
Publisher : Universitas Muhammadiyah Purworejo

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37729/intek.v1i2.91

Abstract

One of information technology developments used in health sector is body scanning technology. Magnetic Resonance Imageing (MRI) is a body scanning method that can check abnormal tis-sue and body cells. MRI is an advanced technology adopted at Yogyakarta hospitals. The pur-pose of this study is to determine the factors that influence the interest in using MRI technology because the use of MRI will not run maximally if there is resistance or rejection from the user.Predictor analysis of MRI usage perceptions on radiographers uses Technology Acceptance Model 2 (TAM2) approach. There are two factors that influence the perceptions of usability, namely social and cognitive factors. The social factors examined in this study are subjective and imaging norms, while the cognitive factors used are convenience factors. The results of the study show that the factors influencing the perception of usefulness are social factors, both subjective and imaging norms. Meanwhile, one of the cognitive factors (convenience factor) in this study does not significantly influence. The statistic test was performed using a regression method with SPSS 19 analyzer.
Audit Teknologi Informasi Bandung Techno Park Menggunakan Framework Cobit 5 Pada Domain EDM (Evaluate, Direct, And Monitor) Daniel Alexander Octavianus Turang; Delphine Yusticia Ratnasari; Ike Yunia Pasa
INTEK : Jurnal Informatika dan Teknologi Informasi Vol. 1 No. 2 (2018)
Publisher : Universitas Muhammadiyah Purworejo

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37729/intek.v1i2.92

Abstract

IT governance is needed as a guide to be used in the setting of the utilization of information technology in an organization. IT governance in organizations provides IT solutions that will be used to handle with related problems in organization, handle risks and also reduce operational costs. The research process design was conducted on COBIT 5, that is in the EDM domain (Evaluate, Direct, and Monitor) which focuses on on ensuring the achievement of organizational goals by governance framework setting and maintenance, ensure benefit delivery, risk optimisation, resource optimisation, and stakeholder transparacy. The results of the maturity level at level 1 for the EDM05 processes, level 2 for the EDM03 processes, while the EDM01, EDM02 and EDM01 processes were at level 3. The target set was level 4, where where the management of supervise and measure of things that have been met with the procedures, as well as taking action when the process does not run effectively.
Pendekatan Algoritma Apriori Pada Data Mining Untuk Menemukan Pola Belanja Konsumen Wahju Tjahjo Saputro; Ike Yunia Pasa
INTEK : Jurnal Informatika dan Teknologi Informasi Vol. 1 No. 1 (2018)
Publisher : Universitas Muhammadiyah Purworejo

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37729/intek.v1i1.97

Abstract

Data mining is often used in research-related pattern and knowledge of an information is stored in large-scale databases. Today many companies have large amounts of data was stored in the database. The large-scale databases are only used to generate tabular information fo the needs daily of managers. So it can be called rich data but poor information.Data mining has one assocation method that can generate certain patterns and knowledge of data have an assocate between two itemsets, so it has an if-then property. Algorithm used to produce assocation rule is called apriori.The result of research represent that the apriori algorithm can work optimally to generate pattern the sales transaction. This research represents transaction frequency{2,3} -> {28} has support 10.5%, confidence 66.6% and {7,8} -> {22} has support 10.5%, confidence 66.6%. Both of rules have frequencies often represent quite high with > 2.