Claim Missing Document
Check
Articles

Found 40 Documents
Search

Penerapan Metode ADAM Pada Proses Investigasi Layanan Private Cloud Computing Widiyasono, Nur; Riadi, Imam; Luthfi, Ahmad
JEPIN (Jurnal Edukasi dan Penelitian Informatika) Vol 2, No 1 (2016): Volume 2 No 1
Publisher : Program Studi Informatika

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (622.532 KB) | DOI: 10.26418/jp.v2i1.15501

Abstract

Layanan Private Cloud Computing memiliki potensi terjadinya penyalahgunaan yang dilakukan oleh internal di dalam perusahaan, sebagai contoh kasus yang yang terjadi di RSIA XYZ. Penyalahgunaan tersebut terjadi dikarenakan adanya kelemahan sistem yang digunakan ,ataupun sebab lain. Proses akuisisi data pada layanan cloud computing penanganannya tidaklah sama dikarenakan jenis dan karakteristik layanan cloud computing tersebut. Isu mengenai masalah realibilitas data atau bagaimana proses data digital evidence didapatkan, pada persidangan akan menjadi perhatian khusus bagi majelis hakim, sehingga untuk menangani masalah tersebut digunakanlah metode ADAM (The Advance Data Acquisition Model), sayangnya metode tersebut belum pernah dilakukan evaluasi secara independen. Penelitian ini menggunakan metode ADAM di dalam melakukan investigasi kasus pada layanan private cloud computing dan telah berhasil 100% menerapkannya, kemudian kontribusi pada penelitian ini telah menemukan penyebab potensi terjadinya penyalahgunaan layanan aplikasi owncloud tersebut.   Kata kunci— Akusisi, ADAM, Cloud, Forensik, Investigasi
Analisis SIM Card Cloning Terhadap Algoritma Random Number Generator Anwar, Nuril; Riadi, Imam; Luthfi, Ahmad
Jurnal Buana Informatika Vol 7, No 2 (2016): Jurnal Buana Informatika Volume 7 Nomor 2 April 2016
Publisher : Universitas Atma Jaya Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (282.98 KB) | DOI: 10.24002/jbi.v7i2.493

Abstract

Abstract. Crime in telecommunication sector has increased prevalently, especially with the use of mobile phone which is detrimental both for customers and the providers. In the GSM security system, several weaknesses are found concerning data security outside the network. SIM card clone is part of the security problem in which the data can be transferred to SIM card cloning media. SIM card cloning research can be presented in the form of SRES analysis algorithms A3 and A8 RAND to get Ki Auc for further analysis on SIM card cloning. To test the performance of SIM card cloning, testing parameters such as due under test (DUT) and trial and error are employed. The conclusion of this study is that the SIM card cloning method can occur when Auc Ki is obtained by downloading a crack a8 RAND Random Number Generator analysis algorithms A3 sign SIM card to match the SRES response to the Auc Ki along with supporting data contained in SIM card clones.Keywords: SIM card cloning, Random Number Generator (RAND), Sign Response (SRES).Abstrak. Kejahatan di sektor telekomunikasi kian marak akhir-akhir ini khususnya mobile phone yang merugikan baik bagi customer maupun provider seluler. Pada sistem keamanan GSM, ditemukan beberapa kelemahan di sisi pengamanan data di luar jaringan. SIM card clone adalah bagian dari masalah keamanan pada device SIM card dengan data SIM card yang dapat dipindahkan ke media SIM card cloning. Penelitian SIM Card Cloning ini disajikan berupa analisis algoritma A3 SRES, dan A8 RAND untuk mendapatkan Ki AUc untuk selanjutnya dilakukan analisis SIM Card Cloning. Untuk menguji performa SIM card cloning digunakan parameter pengujian seperti Due Under Test (DUT) dan Trial and Error. Kesimpulan dari penelitian ini didapatkan bahwa metode SIM Card Cloning dapat terjadi bilamana AUc Ki diperoleh dengan melakukan crack A8 Random Number Generator RAND sedang analisis algoritma SIM card dengan mencocokkan A3 Sign Respons SRES terhadap AUc Ki beserta data pendukung yang terdapat pada SIM card hasil kloning. Kata kunci: SIM card cloning, Random Number Generator (RAND), Sign Respons (SRES).
Pemanfaatan Teori Semantic Web pada Pengembangan Intelligent Learning Management System (ILMS) Ahmad Luthfi
Seminar Nasional Aplikasi Teknologi Informasi (SNATI) 2006
Publisher : Jurusan Teknik Informatika, Fakultas Teknologi Industri, Universitas Islam Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This paper emphasizes integration of the Semantic Web technologies in intelligent learning systems by giving a method for an Intelligent Learning Management System (ILMS) architecture named Multitutor. This system is a Web-based environment for the development the e-Learning courses and for the use of them by the students. Multitutor is designed as a Web-classroom client-server system, ontologically founded, and is built using modern intelligent and Web-related technologies. This system enables the teachers to develop tutoring systems for any course. The teacher has to define the metadata of the course: chapters, the lessons and the tests set, and also the references of the learning materials.Keyword: Semantic Web, Learning Management System, Ontology
Perancangan Aplikasi Ayo BerAksi Dengan Metode Design Thinking Rizky Achmad Almayda Almayda; Ahmad Luthfi
AUTOMATA Vol. 3 No. 2 (2022)
Publisher : AUTOMATA

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Salah satu upaya untuk mengangkat nilai-nilai sosial dalam pemberantasan korupsi adalah dengan membuat aplikasi-aplikasi pemberantasan korupsi seperti laporan pengaduan, suap dan gratifikasi. Tahapan yang dianggap penting dalam merancang sebuah aplikasi dimulai dengan merancang antarmuka pengguna (UI) dan pengalaman pengguna (UX). Pengguna akan melihat desain antarmuka dan cara berinteraksi dengan aplikasi sebagai kesan awal penilaian UI/UX. Metodologi yang digunakan dalam melakukan perancangan adalah metode “design thinking”, metode ini dikenal sebagai proses berpikir komprehensif yang berkonsentrasi pada penciptaan solusi yang diawali dengan proses empati terhadap kebutuhan tertentu yang berpusat pada manusia. Pengujian aplikasi “Ayo BerAksi” dilakukan oleh project manager dan pihak BBKP Belawan yaitu dengan pengujian digital prototyping. Walaupun para pengguna sasaran menganggap bahwa aplikasi “Ayo BerAksi” ini merupakan aplikasi yang sangat bermanfaat dan telah memenuhi kebutuhannya, namun masih memiliki beberapa kendala yang dapat dijadikan sebagai masukan dan perbaikan. Kesimpulan dalam jurnal ini adalah perancangan desain UI/UX menerapkan metode design thinking yang mempunyai beberapa tahapan dimulai dari proses empathize, define, ideate, prototype, dan test yang terstruktur dengan baik.
Instrumen Evaluasi Framework Investigasi Forensika Digital Menggunakan SNI 27037:2014 Didik Sudyana; Bambang Sugiantoro; Ahmad Luthfi
JISKA (Jurnal Informatika Sunan Kalijaga) Vol. 1 No. 2 (2016): September 2016
Publisher : UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (50.213 KB) | DOI: 10.14421/jiska.2016.12-03

Abstract

Hal penting yang harus diperhatikan oleh setiap petugas investigator forensika digital dalam menjalankan aktivitas forensika digital adalah diikutinya setiap tahapan dan prosedur dalam forensika digital. Tahapan tersebut dikenal dengan istilah frameworks ataupun SOP investigasi. Tahapan dalam proses forensika digital harus sesuai dengan aturan hukum dan juga mekanisme yang tepat.  Namun framework investigasi yang berkembang saat ini ternyata masih terdapat kekurangan dimana ada tahapan-tahapan yang diatur dalam standar yang berlaku seperti SNI 27037:2014, ternyata tidak diatur dalam framework tersebut. Sehingga ketika tahapan tersebut terlewatkan dalam proses investigasi, tentu akan menjadi sebuah masalah dan bisa digugat di pengadilan serta dibatalkannya hasil investigasi yang dilakukan terkait adanya prosedur yang tidak dilaksanakan. Oleh karena itu dilakukan penelitian dengan melakukan identifikasi terhadap ketentuan dan proses penting dalam dokumen SNI 27037:2014 untuk kemudian menghasilkan instrument evaluasi yang dapat digunakan oleh penyidik atau praktisi forensika digital untuk melakukan penyesuaian atau evaluasi terhadap framework yang digunakan selama ini.
Pelatihan Computational Thinking bagi Mahasiswa melalui CSUnplugged sebagai Penguatan Dasar-Dasar Pemrograman Hermawan, Hardika Dwi; Vitasari, Denny; Luthfi, Ahmad; Rike Nursafitri; Shaleha, Annisa Amalia; Rosa, Nauviana Pita; Hananfajri, Muhammad
Lumbung Inovasi: Jurnal Pengabdian kepada Masyarakat Vol. 9 No. 3 (2024): September
Publisher : Lembaga Penelitian dan Pemberdayaan Masyarakat (LITPAM)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36312/linov.v9i3.2001

Abstract

Dalam era digital, pemahaman mengenai pemrograman dan konsep berpikir komputasional menjadi semakin penting bagi mahasiswa. Kurangnya pemahaman awal tentang konsep-konsep pemrograman dan rasa takut terhadap mata kuliah dasar pemrograman bagi mahasiswa Teknik Kimia menjadi masalah utama. Metode alternatif seperti CSUnplugged, yang mengajarkan konsep pemrograman tanpa komputer, dapat menjadi solusi efektif. Kegiatan pengabdian ini bertujuan untuk memperkenalkan metode CSUnplugged kepada mahasiswa Teknik Kimia, mengatasi hambatan dalam belajar pemrograman, dan meningkatkan keterampilan berpikir komputasional. Pelatihan ini dilakukan dalam tiga tahap: persiapan, pelaksanaan, dan evaluasi, dengan menggunakan permainan yang mengajarkan dasar-dasar komputasi seperti Abstraksi, Algoritma, dan Logika. Hasil evaluasi menunjukkan bahwa mahasiswa yang berpartisipasi memiliki pemahaman yang meningkat terhadap konsep-konsep pemrograman dan keterampilan berpikir komputasional. Rata-rata mahasiswa menyelesaikan soal dan permainan dengan skor 60%, dengan 81% dari mereka menyatakan setuju bahwa metode ini efektif. Kegiatan ini mendukung pencapaian Sustainable Development Goals (SDGs) dalam pendidikan berkualitas dan inovasi. Hasil pelatihan menunjukkan potensi besar dari metode CSUnplugged dalam meningkatkan keterampilan komputasi yang esensial untuk masa depan mahasiswa. Training in Computational Thinking for University Students through CSUnplugged as Strengthening Basic Programming Fundamentals Abstract In the digital era, understanding programming and computational thinking concepts is increasingly important for students. A lack of initial understanding of programming concepts and fear of basic programming courses are major issues for Chemical Engineering students. Alternative methods like CSUnplugged, which teaches programming concepts without using computers, can be an effective solution. This community service activity aims to introduce the CSUnplugged method to Chemical Engineering students, address barriers to learning programming, and enhance computational thinking skills. The training was conducted in three stages: preparation, implementation, and evaluation, using games that teach the basics of computation such as Abstraction, Algorithms, and Logic. The evaluation results show that participating students improved their understanding of programming concepts and computational thinking skills. On average, students completed tasks and games with a score of 60%, with 81% agreeing that the method is effective. This activity supports the achievement of Sustainable Development Goals (SDGs) in quality education and innovation. The training results demonstrate the significant potential of the CSUnplugged method in enhancing computational skills essential for students' future success.
Integration of TAM and DeLone and McLean Models to Evaluate the Quality of NAMPAH Applications Diana, Ros; Paputungan, Irving Vitra; Luthfi, Ahmad
Jurnal Teknologi Dan Sistem Informasi Bisnis Vol 6 No 4 (2024): Oktober 2024
Publisher : Prodi Sistem Informasi Universitas Dharma Andalas

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47233/jteksis.v6i4.1583

Abstract

Waste banks are an important solution in environmental management, one of which is the NAMPAH application. NAMPAH is an Android-based digitalization innovation. Along with its implementation, several problems were discovered in terms of application use, especially related to the use of application systems and services. Based on this, researchers focus on system evaluation of system success. This research uses the Technology Acceptance Model (TAM) and the DeLone and McLean IS Success Model which aims to evaluate the system regarding system use. Data processing in this research used the Smart PLS 4 tool. From the research results it was found that several variables were determining factors in user satisfaction, including perceived ease of use, perceived usefulness, information quality and system quality. However, system quality is not significant to perceived usefulness. Meanwhile, service quality has an average value below the testing standards so it is not significant to user satisfaction and perceived ease of use.
Optimization of Education System Implementation in Aceh Besar Regency Putra, I Made Arie Widyasthana Wartana; Luthfi, Ahmad; Amali, Adityal Chisabul; Nurhalisa, Sabrina
REFORMASI Vol 14, No 1 (2024)
Publisher : Universitas Tribhuwana Tunggadewi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33366/rfr.v14i1.5877

Abstract

In some developed countries, education is one of the main problems in increasing human resource capacity, especially in Indonesia. The principle of decentralization allows the government to create independent laws that give local governments the authority to manage all aspects of education. This study aims to determine the implementation of the education system in Aceh Besar Regency. This study uses a qualitative approach to understand the optimization of the implementation of the education system in Aceh Besar District. Data were collected through interviews, observation, and analysis of data from various literature and previous research. The research findings show that the Aceh Besar District government has taken systematic steps in formulating policies, developing programs, implementing, and monitoring and evaluating education programs. Some of the main programs implemented include the Mobilizer School Program, data-based planning, implementation of the Independent Curriculum, and development of educational facilities and infrastructure. Monitoring and evaluation is carried out through periodic assessments, collecting feedback from stakeholders, and field visits. The evaluation results show an increase in student and teacher performance, as well as the positive impact of the implementation of the policy.AbstrakDi beberapa negara maju pendidikan menjadi salah satu masalah utama dalam meningkatkan kapasitas sumber daya manusia, khususnya di Negara Indonesia. Asas desentralisasi memungkinkan pemerintah untuk membuat undang-undang mandiri yang memberikan wewenang kepada pemerintah daerah untuk mengelola semua aspek pendidikan. Penelitian ini bertujuan untuk mengetahui penyelenggaraan sistem pendidikan di Kabupaten Aceh Besar. Penelitian ini menggunakan pendekatan kualitatif untuk memahami optimalisasi penyelenggaraan sistem pendidikan di Kabupaten Aceh Besar. Data dikumpulkan melalui wawancara, observasi, dan analisis data dari berbagai literatur dan penelitian terdahulu. Temuan penelitian menunjukkan bahwa pemerintah Kabupaten Aceh Besar telah melakukan langkah-langkah sistematis dalam merumuskan kebijakan, menyusun program, mengimplementasikan, serta melakukan monitoring dan evaluasi terhadap program-program pendidikan yang dijalankan. Beberapa program utama yang diimplementasikan antara lain Program Sekolah Penggerak, perencanaan berbasis data, implementasi Kurikulum Merdeka, dan pengembangan sarana dan prasarana pendidikan. Monitoring dan evaluasi dilakukan melalui penilaian berkala, pengumpulan feedback dari stakeholder, dan kunjungan lapangan. Hasil evaluasi menunjukkan peningkatan kinerja siswa dan guru, serta dampak positif dari implementasi kebijakan tersebut.
Prediction of Student Performance Based on Behavior using E-Learning During the Covid-19 Pandemic using Support Vector Machine Widarta, Agung Eka; Luthfi, Ahmad; Kusuma Dewa, Chandra
Sinkron : jurnal dan penelitian teknik informatika Vol. 8 No. 1 (2024): Articles Research Volume 8 Issue 1, January 2024
Publisher : Politeknik Ganesha Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33395/sinkron.v9i1.12857

Abstract

The COVID-19 crisis has profoundly impacted many sectors globally, including education, necessitating the shift from traditional in-person learning to independent or online learning through various digital platforms. The integrity of e-learning can be ensured by leveraging e-learning behavioral data. The objective of this research is to develop a novel data model to navigate the educational challenges of the COVID-19 era. Previous studies employed the Support Vector Machine (SVM) technique to predict student performance in an e-learning setting, yet they failed to contrast different SVM kernels and their outcomes. In contrast, this study uses SVM and compares three types of kernels: Radial, Polynomial, and Linear. The dataset used for this research was procured from X-API-Edu-Data. The SVM technique was utilized in a unique way to process the data, which comprised 17 variables and 40 observations. Notably, all 17 variables were character variables, with only four being numeric. Two variables, Raisedhands and Discussion, were selected for analysis due to their key role in effective learning and their association with student performance in an e-learning environment. The evaluation of the model was performed using the Topic variable, which represents the subjects in the dataset. The research findings revealed a marked improvement in accuracy compared to earlier studies. Among the three SVM kernels tested - Radial, Polynomial, and Linear, the Polynomial kernel demonstrated superior accuracy with a score of 0.9979. Therefore, the Polynomial model was deemed most appropriate for analyzing the Topic variable. In conclusion, the study indicates that the application of the e-learning method, specifically during the COVID-19 pandemic, proved highly effective in forecasting student performance.
Citizens' Intention to Use E-Government Services in Local Government by Integrating UTAUT, TPB, and TAM Model Afrizal, Dedy; Luthfi, Ahmad; Bin Wallang, Muslimin; Hildawati, Hildawati; Ekareesakul, Kittipan
Journal of Local Government Issues Vol. 7 No. 2 (2024): September
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/logos.v7i2.32437

Abstract

In contemporary society, the widespread adoption of information and communication technologies has become integral to meeting daily needs. E-Government leverages these technologies to deliver efficient and secure services to citizens, particularly at the local government level. However, existing literature lacks comprehensive exploration into citizen preferences for utilizing e-government services, especially those offered by local governments. Addressing this gap, this study investigates citizen intentions to use e-government, focusing on the application system provided by local governments. Our research framework integrates three established models (UTAUT, TAM, and TPB) and employs empirical validation through a structured questionnaire. Data collection involved 97 respondents from diverse cities/regencies. Rigorous reliability and validity assessments were conducted on the questionnaire, with analysis performed using structural equation modeling (SEM). The findings underscore the significant influence of citizens' attitudes toward e-government, shaped by factors such as effort expectancy, facilitating conditions, and perceived risk. Furthermore, a positive and significant relationship between attitude and Intention to use revealed. This research contributes to a deeper understanding of citizen behavior towards e-government services, offering insights crucial for enhancing service delivery and citizen engagement at the local level.
Co-Authors Abdul Aziz Achmad Yusuf Agung Firmansyah, Rico AHMAD FAISOL Aini, Hana Nur Amali, Adityal Chisabul Amitama, Emilia Bunga Anggraini, Friska Apriyani, Mirna Ariwibisono, FX Bambang Sugiantoro Bin Wallang, Muslimin Dedy Afrizal Denny Vitasari Dewa, Chandra Kusuma Dhomas Hatta Fudholi diana, ros Didik Sudyana Dila Erlianti Ekareesakul, Kittipan Eko Yuli Handoko Erinaldi, Erinaldi Fachrudin, Kurnia Arfiansyah Fawzan, Ihsan fFaizal, Arif Fiasari, Sinta Nur Hafrida, Lis Halim, Muhammad Yusuf Hananfajri, Muhammad Hardika Dwi Hermawan Hijeriah, E. Maznah Hildawati Hildawati, Hildawati I Made Arie Widyasthana Wartana Putra Ildrem Syafri Imam Riadi Indriasari, Ratna Kasnelly, Sri Khair, Otti Ilham Kholid Haryono Kurniawan, Andang Kusuma Dewa, Chandra Latif Syaipudin Lian Agustina Setiyaningsih M. Said Marisa Permatasari, Marisa Maulana, Bagus Andrai Mawarni, Dinda Iga Meutia, Adinda Muhammad, Aldila Syariz Munawwaroh, Nasywa Zunaibatul Munjayyanah, Munjayyanah Mustikarini, Monika Grace Nilma, Nilma Nur Widiyasono, Nur Nurhalisa, Sabrina Nuril Anwar, Nuril Pakkaja, Ryan Alghazali Paputungan, Irving Vitra Poespitohadi, Wibisono Pratama, Syahrul Pravitasari, Norma Prayoga, Diki Priwibowo, Aqge Purnamasari, Rika Afriyanti Putra, I Made Arie Widyasthana Wartana Ramadani, Erika Ramadiniyati, Suci Rika Handayani Rike Nursafitri Rizky Achmad Almayda Almayda Rosa, Nauviana Pita Salwa, Nikmatus Shaleha, Annisa Amalia Sopaheluwakan, Ardhasena Sri Widayati Sumarni Sumarni Suroningsih Suroningsih, Suroningsih susi susi Tuharea, Ibnu Rohan Wahyuzi, Zikri Widarta, Agung Eka Yosika, Diana Rosa Yudi prayudi Zainul’ID, Ahmad Bagus Zubizaretta, Zaid Dzulkarnain