This Author published in this journals
All Journal Seminar Nasional Aplikasi Teknologi Informasi (SNATI) Jurnal Buana Informatika Jurnal Edukasi dan Penelitian Informatika (JEPIN) JAKPP : Jurnal Analisis Kebijakan & Pelayanan Publik Sistemasi: Jurnal Sistem Informasi Sinkron : Jurnal dan Penelitian Teknik Informatika Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Prosiding Seminar Nasional Sains dan Teknologi Terapan JIPI (Jurnal Ilmiah Penelitian dan Pembelajaran Informatika) Reformasi : Jurnal Ilmiah Ilmu Sosial dan Ilmu Politik JISKa (Jurnal Informatika Sunan Kalijaga) Technologia: Jurnal Ilmiah Journal of Information Systems and Informatics Majalah Ilmiah Warta Dharmawangsa PERSPEKTIF Mobile and Forensics Jurnal Teknologi Dan Sistem Informasi Bisnis JATI (Jurnal Mahasiswa Teknik Informatika) Jurnal Mediasosian : Jurnal Ilmu Sosial dan Administrasi Negara Automata Reswara: Jurnal Pengabdian Kepada Masyarakat TIN: TERAPAN INFORMATIKA NUSANTARA International Journal Of Science, Technology & Management (IJSTM) Journal of Software Engineering Ampera Lumbung Inovasi: Jurnal Pengabdian Kepada Masyarakat Jurnal Riset dan Aplikasi Mahasiswa Informatika (JRAMI) Kawanua International Journal of Multicultural Studies Andalas International Journal of Socio-Humanities (AIJOSH) Jurnal Ilmiah Kampus Mengajar Journal of Vocational, Informatics and Computer Education Jurnal INFOTEL West Science Social and Humanities Studies Jurnal Sains, Nalar, dan Aplikasi Teknologi Informasi Journal of Geosciences and Applied Geology Journal of Civil Engineering and Vocational Education Al-Mizan : Jurnal Ekonomi Syariah Jurnal Ilmiah Insan Mulia Journal of Elementary Education Research Jurnal Geosaintek Indonesian State Law Review (ISLRev) Sufiya Journal of Islamic Studies E-Jurnal Akuntansi
Claim Missing Document
Check
Articles

Analisis  Model UTAUT Untuk Mengetahui Tingkat Penerimaan Teknologi Mahasiswa Pada Aplikasi Kahoot Fitri Amaliyah Batubara; Sitti Hajerah Hasyim; Aprilianti Nirmala S; Nurzabrina Anugrani; Ahmad Luthfi; Ibrahim Al khalil
Journal of Vocational, Informatics and Computer Education Vol 2, No 1 (2024): Juni 2024
Publisher : PT. Lontara Digitech Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61220/voice.v2i1.30

Abstract

Teknologi dan internet telah menjadi pendorong utama dalam globalisasi pendidikan, memungkinkan adopsi platform pembelajaran online seperti Kahoot. Penelitian ini menggunakan Model Unified Theory of Acceptance and Use of Technology (UTAUT) sebagai kerangka kerja untuk menganalisis penerimaan dan penggunaan aplikasi Kahoot oleh mahasiswa di Universitas Negeri Makassar. Metode penelitian yang diterapkan adalah pendekatan kuantitatif dengan menggunakan desain cross-sectional, dan data dikumpulkan melalui kuesioner dari 76 responden.Hasil penelitian mengungkapkan bahwa mahasiswa menunjukkan respon positif terhadap manfaat dan kemudahan penggunaan Kahoot. Namun, terdapat variabilitas dalam pandangan terkait dukungan lingkungan, persepsi guru, dan niat pengguna, menggambarkan kompleksitas adopsi teknologi ini di lingkungan pendidikan. Rekomendasi penelitian mencakup pengembangan dukungan lingkungan yang lebih baik, pelatihan bagi dosen dan mahasiswa, serta evaluasi infrastruktur teknologi guna meningkatkan efektivitas pemanfaatan Kahoot dan teknologi pembelajaran di Universitas Negeri Makassar. Temuan ini memberikan wawasan berharga untuk pengembangan pendidikan berbasis teknologi dan inovasi di era digital.
Tasks of the Drafter of Legislation in Forming Regional Regulations (Study of the Implementation of Government Regulation Number 59 of 2015) Ahmad Luthfi
Indonesian State Law Review Vol. 1 No. 2 (2019): Indonesian State Law Review, April 2019
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15294/islrev.v1i2.22973

Abstract

The formation of regional regulations can involve drafters of laws and regulations in accordance with Article 98 of Law number 12 of 2011 concerning Formation of Legislation and strengthened by Government Regulation number 59 of 2015 concerning Participation of Drafters of Legislation in Forming Legislation and the builder. This study aims to describe the tasks of drafting laws and regulations in the formation of regional regulations and the influence of drafters of statutory regulations at the Regional Office of the Ministry of Law and Human Rights in Central Java on the formation of quality regional regulations. The research method uses qualitative research and an empirical juridical approach. Primary data obtained from interviews and observations, secondary data obtained from documents and photographs. The results of this study indicate that the Drafter of Legislation can follow every stage of the process of forming regional regulations in accordance with the mandate of the applicable law and is further confirmed through a cooperation agreement between the authorized agencies. The participation of Drafters of Legislation in the formation of regional regulations does not affect whether the regional regulations made are legal or not.
Analisis Hasil Akuisisi Digital Forensic pada Perangkat Komunikasi Motorola Lex11 Hasanah, Nur Uswatun; Luthfi, Ahmad
JEPIN (Jurnal Edukasi dan Penelitian Informatika) Vol 11, No 1 (2025): Volume 11 No 1
Publisher : Program Studi Informatika

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26418/jp.v11i1.90935

Abstract

Keamanan komunikasi dalam lingkungan militer memainkan peran krusial dalam melindungi kerahasiaan informasi strategis. Dalam konteks ini, ponsel menjadi alat utama untuk pertukaran informasi terutama untuk TNI, dengan Aplikasi WAVE Mobile Communicator yang menjadi salah satu platform komunikasi yang digunakan. Dengan pertumbuhan ancaman siber yang terus berkembang, penting untuk membandingkan keamanan aplikasi ini pada dua jenis perangkat yang umum digunakan: ponsel hybrid dan ponsel konvensional. Ponsel hybrid, seperti Motorola LEX L11a yang digunakan oleh Tentara Nasional Indonesia (TNI), memiliki kemampuan untuk menggunakan beberapa jenis teknologi komunikasi, sementara ponsel konvensional hanya terbatas pada satu jenis teknologi. Penelitian ini bertujuan untuk menganalisis dan membandingkan keamanan Aplikasi WAVE Mobile Communicator pada kedua jenis perangkat tersebut menggunakan pendekatan digital forensik. Melalui pendekatan digital forensik yang didasarkan pada prinsip-prinsip keamanan komunikasi militer dan standar industri, penelitian ini akan mengeksplorasi kelemahan potensial dan tingkat kerentanan pada aplikasi tersebut. Metodologi ini mencakup akuisisi data forensik dari kedua jenis perangkat, analisis struktur aplikasi, serta identifikasi dan evaluasi potensi kerentanan keamanan. Penelitian ini juga akan memperhatikan kendala teknis yang mungkin mempengaruhi keamanan aplikasi pada masing-masing jenis perangkat. Hasil dari penelitian ini diharapkan memberikan pemahaman yang lebih baik tentang perbandingan keamanan Aplikasi WAVE Mobile Communicator pada ponsel hybrid dan konvensional, serta mengidentifikasi area di mana satu jenis perangkat mungkin memiliki keunggulan keamanan dibandingkan dengan yang lain. Informasi ini akan bermanfaat dalam pengembangan strategi keamanan komunikasi militer yang lebih efektif dan responsif terhadap ancaman siber yang terus berkembang.
Go Delivery in Producing Online-Based Police Records (SKCK) to Achieve South Sumatra Polda Service Performance Luthfi, Ahmad; Sobri, Kgs M.; Lionardo , Andries; Putra, Raniasa
PERSPEKTIF Vol. 13 No. 3 (2024): PERSPEKTIF July
Publisher : Universitas Medan Area

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31289/perspektif.v13i3.11596

Abstract

This study aims to examine and deploy an online document delivery service, named "GO DELIVERY," for processing Police Record Certificates (SKCK) at the South Sumatra Regional Police. The research follows an information technology-based system development approach, encompassing analysis, design, implementation, and evaluation phases. The analysis phase involves studying the manual SKCK process at the South Sumatra Regional Police and identifying encountered issues. Subsequently, in the design phase, a GO DELIVERY system is conceptualized, enabling applicants to submit SKCK applications online through a designated platform. Implementation entails developing the necessary applications and infrastructure to efficiently and securely support document delivery services. Finally, an evaluation assesses the GO DELIVERY service's efficacy in enhancing SKCK processing efficiency and quality. Results indicate that implementing GO DELIVERY has indeed enhanced service performance, reducing SKCK acquisition time, increasing applicant satisfaction, and optimizing resource utilization at the South Sumatra Regional Police. These findings provide a foundation for similar service development across governmental bodies, ultimately enhancing overall public service efficiency and effectiveness.
Pengembangan Kerangka Kerja Akuisisi Forensik Perangkat Bergerak Produk Xiaomi pada Fitur Second Space Berdasarkan SNI/ISO 27037:2014 Fakhriansyah, Amru Rizal; Luthfi, Ahmad
JURNAL INFOTEL Vol 16 No 2 (2024): May 2024
Publisher : LPPM INSTITUT TEKNOLOGI TELKOM PURWOKERTO

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20895/infotel.v16i2.1091

Abstract

Abstract — In conducting digital forensic activities, it must follow the rules of SOP procedures or frameworks as a reference. One of the acquisition frameworks used in digital forensics practice is ISO 27037:2014, which contains specific guidelines related to digital forensic investigation activities. On the other hand, mobile cellular is one of the branches of digital forensics that is always developing, but with the large variety of mobile devices today, ISO 27037: 2014 has not provided specific standards in the digital forensics process on mobile devices that have special features that are different from ordinary mobile devices. One of the special features provided by Xiaomi vendor developers that gives users access to cloning and creating new space in one mobile phone is called second space or second space. With this, it will be a problem for investigators when conducting forensic processes because the data acquisition process will produce 2 extraction results from one mobile device, but the SNI ISO 27037: 2014 standard has not regulated the validity of digital evidence obtained from these special features. This research will develop a framework in conducting the investigation process on Xiaomi mobile devices, because currently only Xiaomi mobile devices have a second room feature. By paying attention to the existing problems, this research will develop a framework in carrying out the acquisition process on xiaomi mobile devices on the special features of the second room based on SNI ISO 27037: 2014. It is hoped that this research can help investigators, especially DEFR (Digital Evidence First Responder) and can be a reference that can be used in the process of searching for electronic evidence that is in accordance with SNI ISO 27037: 2014 and can be accounted for in court.
The Pedagogical Role of Islamic Religious Teachers in Guiding Students’ Self-Control in Secondary Schools Ahmad Luthfi
Sufiya Journal of Islamic Studies Vol. 3 No. 1 (2025): Sufiya Journal of Islamic Studies
Publisher : Yayasan Bayt Shufiya Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This study aims to analyze the pedagogical role of Islamic religious teachers in guiding students’ self-control at Madrasah Aliyah Zakiyun Najah, located in Firdaus Village, Sei Rampah District, Serdang Bedagai Regency. The research employs a field study method with a descriptive-analytical narrative approach. Primary data were obtained through direct observation and in-depth interviews with Islamic religious teachers and seventh-grade students as key informants. Data analysis was conducted through stages of reduction, categorization, and narrative interpretation to reveal the pedagogical meaning of the implemented teaching practices. The findings indicate that Islamic religious teachers play a strategic role through three main approaches: habituation of moral values, demonstration of moral exemplarity in daily behavior, and the application of educational sanctions that emphasize character formation. These approaches contribute to the development of students’ religious character, internal discipline, and the ability to regulate emotions and actions in accordance with Islamic ethical norms.
The Role of Industry Sensitivity in Moderating The Effect of Environmental, Social, and Governance (ESG) on Financial Distress Ahmad Luthfi; Sari Atmini
E-Jurnal Akuntansi Vol. 35 No. 6 (2025)
Publisher : Fakultas Ekonomi dan Bisnis Universitas Udayana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24843/EJA.2025.v35.i06.p07

Abstract

This study aims to analyze and obtain empirical evidence on the effect of Environmental, Social, and Governance (ESG) on financial distress, and the role of industry sensitivity in strengthening the effect of ESG on financial distress. The research sample selected through purposive sampling consist of 108 Morningstar Sustainalytics rated companies listed on the Indonesia Stock Exchange in 2024. The results of the data analysis utilizing Moderated Regression Analysis (MRA) exhibit that ESG has a significant negative effect on financial distress, suggesting that the higher the ESG performance, the lower the risk of financial distress. However, contrary to the proposed hypothesis, industry sensitivity significantly weakens the negative effect of ESG on financial distress. Keywords: ESG; Financial Distress; Industry Sensitivity; Z-Score; ESG Rating.
Analisis Forensik Ransomware Pada Sistem Berbasis Linux dengan Pendekatan Perbandingan Disk Dirgantoro, Revandho Vianuara; Luthfi, Ahmad
TIN: Terapan Informatika Nusantara Vol 6 No 6 (2025): November 2025
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/tin.v6i6.8341

Abstract

This study aims to analyze the impact of Monti ransomware infection on Linux operating systems through a digital forensic approach based on artefacts and metadata. The investigation was conducted in an isolated laboratory environment using physical hardware, employing RAM acquisition and disk imaging methods on two system states: before and after infection. The ransomware execution was triggered by the monti.elf binary located in the temporary /tmp direktori, initiating encryption of operational files within the /Documents direktori. The analysis utilized Sleuthkit tools, focusing on file system structures, inode metadata, timestamps, and artefact distribution. Findings indicate that Monti employs an in-place encryption technique, replacing file contents without altering inode or block location. Key artefacts identified include encrypted files (.puuuk, .monti), ransom notes (readme.txt), execution logs (result.txt), and the ransomware binary (monti.elf). All artefacts share identical timestamps, suggesting automated execution within a single session. Validation was performed through comparative analysis of clean and infected systems, entropy measurements, and examination of TOR-based communication structures embedded in the ransom notes. These findings confirm that Monti operates as part of a Ransomware-as-a-Service (RaaS) ecosystem, with a structured and efficient infection pattern. This research contributes to the mapping of Monti ransomware artefacts and the development of forensic investigation methodologies tailored for Linux environments.
Strategi Pengembangan Literasi Digital bagi Pembelajar Dewasa: Kasus PKBM Cakra dalam Pencegahan Hoaks dan Judi Online Hermawan, Hardika Dwi; Luthfi, Ahmad; Zamzami, Ahmad; Rini, Belinda Septia; Fadlullah, Shandy Yusril
Jurnal Ilmiah Kampus Mengajar Vol. 5, No. 2, Oktober 2025
Publisher : Asosiasi Lembaga Pendidikan Tenaga Kependidikan Perguruan Tinggi Muhammadiyah Aisyiyah

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.56972/jikm.v5i2.269

Abstract

Kurangnya literasi digital menjadikan masyarakat rentan terhadap hoaks dan judi online yang memicu keresahan sosial, termasuk di Desa Cipaku. Survei dan wawancara terhadap warga belajar PKBM Cakra menunjukkan bahwa 83,3% responden pernah mengalami atau mengetahui penyebaran hoaks, 80,6% menyatakan keluarga atau orang terdekat mudah mempercayai berita hoaks, serta 86% mengetahui orang di sekitarnya menggunakan platform judi online. Posisi pengabdian ini menekankan pentingnya literasi digital sebagai strategi preventif untuk meningkatkan ketahanan masyarakat terhadap informasi palsu dan praktik judi daring. Metode yang digunakan mencakup tahapan persiapan, pelaksanaan, dan evaluasi dampak. Kegiatan meliputi pelatihan literasi digital berupa pembuatan poster kampanye anti-hoaks dan judi online, pelatihan STEM Project, pengembangan media pembelajaran berbasis Android, serta pendirian UMS Literacy Corner. Hasil utama menunjukkan peningkatan kesadaran warga dalam mengenali hoaks dan bahaya judi online, serta tersedianya produk inovatif sebagai sarana edukasi berkelanjutan. Luaran pengabdian meliputi video dokumentasi, publikasi pada konferensi internasional dan media massa, buku, serta hak cipta.
Investigation of Fake Insider Threats on Private Cloud Computing Services Dwi Kurnia Wibowo; Ahmad Luthfi; Nur Widiyasono
International Journal of Science, Technology & Management Vol. 3 No. 5 (2022): September 2022
Publisher : Publisher Cv. Inara

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46729/ijstm.v3i5.613

Abstract

Cloud-based services are service system mechanisms used by companies or organizations in conducting computerized and integrated transactions in a computer network. A service system must of course be balanced with a level of security. This is used to anticipate cyber crimes that have the potential to occur. Cloud-based services themselves are usually offered by a Cloud Service Provider (CSP). CSPs are generally configured so that they are accessible on the public internet for their services. Companies that prioritize data security want a system that is safe from a series of cyber crimes. Private cloud computing scheme is a solution that can be implemented as an alternative. The problem that occurs is the possibility of MITC (Man in the Cloud) attacks that infiltrate and manipulate identities so that they are detected as fake insider threats on cloud systems. This thesis aims to carry out threat analysis with the Man in the Cloud attack technique on private cloud computing services based on a study of the ISO 27032 standard. Reports and documentation of the results of the analysis are expected to become recommendations for the cybersecurity investigation and management process related to threats to cloud services with private schemes cloud computing.
Co-Authors Abdul Aziz Achmad Yusuf Afriyanti, Rafika Agung Firmansyah, Rico AHMAD FAISOL Ahmad Zamzami Ahmat Wakit Aini, Hana Nur Amali, Adityal Chisabul Amitama, Emilia Bunga Anggraini, Friska Aprilianti Nirmala S Apriyani, Mirna Ariwibisono, FX Bambang Sugiantoro Dedy Afrizal Denny Vitasari Dhomas Hatta Fudholi diana, ros Didik Sudyana Dila Erlianti Dina Purnama Sari Dirgantoro, Revandho Vianuara Dwi Kurnia Wibowo Eko Yuli Handoko Erinaldi, Erinaldi Fachrudin, Kurnia Arfiansyah Fadlullah, Shandy Yusril Fakhriansyah, Amru Rizal Fawzan, Ihsan fFaizal, Arif Fiasari, Sinta Nur Fitri Amaliyah Batubara Hafrida, Lis Halim, Muhammad Yusuf Hananfajri, Muhammad Hardika Dwi Hermawan Hasanah, Nur Uswatun Hijeriah, E. Maznah Hildawati Hildawati, Hildawati I Made Arie Widyasthana Wartana Putra Ibrahim Al khalil Ildrem Syafri Imam Riadi Indriasari, Ratna Irdina, Mutiara Karomah, Siti Kasnelly, Sri Khair, Otti Ilham Kholid Haryono Kurniawan, Andang Kusuma Dewa, Chandra Latif Syaipudin Lian Agustina Setiyaningsih Lionardo , Andries M. Said Marisa Permatasari, Marisa Maulana, Bagus Andrai Mawarni, Dinda Iga Meutia, Adinda Muhammad, Aldila Syariz Munawwaroh, Nasywa Zunaibatul Munjayyanah, Munjayyanah Mushaffa Asadilah, Ikhwan Alfi Mustikarini, Monika Grace Nilma, Nilma Nur Widiyasono Nur Widiyasono, Nur Nur ‘Azah Nurhalisa, Sabrina Nuril Anwar, Nuril Nurzabrina Anugrani Pakkaja, Ryan Alghazali Paputungan, Irving Vitra Poespitohadi, Wibisono Pratama, Syahrul Pravitasari, Norma Prayoga, Diki Purnamasari, Rika Afriyanti Putra, I Made Arie Widyasthana Wartana Ramadani, Erika Ramadiniyati, Suci Raniasa Putra Rika Handayani Rike Nursafitri Rini, Belinda Septia Rizky Achmad Almayda Almayda Romadhona, Frendi Yusroni Rosa, Nauviana Pita Salwa, Nikmatus Santicho, Desylo Sari Atmini Shaleha, Annisa Amalia Sitti Hajerah Hasyim Sobri, Kgs M. Sopaheluwakan, Ardhasena Sri Widayati Sumarni Sumarni Suroningsih Suroningsih, Suroningsih susi susi Tito Yuwono, Tito Tuharea, Ibnu Rohan Ulfa, Anisa Rifai Widarta, Agung Eka Yosika, Diana Rosa Yudi prayudi Zainul’ID, Ahmad Bagus Zikri Wahyuzi Zubizaretta, Zaid Dzulkarnain