p-Index From 2020 - 2025
5.875
P-Index
This Author published in this journals
All Journal Seminar Nasional Aplikasi Teknologi Informasi (SNATI) Jurnal Buana Informatika Jurnal Edukasi dan Penelitian Informatika (JEPIN) JAKPP : Jurnal Analisis Kebijakan & Pelayanan Publik Sistemasi: Jurnal Sistem Informasi Sinkron : Jurnal dan Penelitian Teknik Informatika Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Prosiding Seminar Nasional Sains dan Teknologi Terapan JIPI (Jurnal Ilmiah Penelitian dan Pembelajaran Informatika) Reformasi : Jurnal Ilmiah Ilmu Sosial dan Ilmu Politik Journal of Local Government Issues JISKa (Jurnal Informatika Sunan Kalijaga) Journal of Information Systems and Informatics PERSPEKTIF Mobile and Forensics Jurnal Teknologi Dan Sistem Informasi Bisnis JATI (Jurnal Mahasiswa Teknik Informatika) Jurnal Mediasosian : Jurnal Ilmu Sosial dan Administrasi Negara Automata Reswara: Jurnal Pengabdian Kepada Masyarakat TIN: TERAPAN INFORMATIKA NUSANTARA Lumbung Inovasi: Jurnal Pengabdian Kepada Masyarakat Jurnal Riset dan Aplikasi Mahasiswa Informatika (JRAMI) Kawanua International Journal of Multicultural Studies Andalas International Journal of Socio-Humanities (AIJOSH) Jurnal Ilmiah Kampus Mengajar Journal of Vocational, Informatics and Computer Education Jurnal INFOTEL Journal of Geosciences and Applied Geology Journal of Civil Engineering and Vocational Education Al-Mizan : Jurnal Ekonomi Syariah Jurnal Ilmiah Insan Mulia Journal of Elementary Education Research Jurnal Geosaintek Indonesian State Law Review (ISLRev) SJIS E-Jurnal Akuntansi
Claim Missing Document
Check
Articles

Website Database Development for Radyakartiyasa using the Directus Headless CMS Irdina, Mutiara; Luthfi, Ahmad
Sistemasi: Jurnal Sistem Informasi Vol 14, No 6 (2025): Sistemasi: Jurnal Sistem Informasi
Publisher : Program Studi Sistem Informasi Fakultas Teknik dan Ilmu Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32520/stmsi.v14i6.5512

Abstract

Kawadenan Radyakartiyasa, under the auspices of the Karaton Ngayogyakarta Hadiningrat, plays a vital role in cultural preservation and the management of historical tourism destinations. To broaden the reach of information and enhance the promotion of cultural events and Kagungan Dalem heritage sites, a website database was developed as the core foundation of the digital information system. The development process adopted the Agile methodology with the Scrum framework, involving sprint planning to prioritize collections, daily scrums to synchronize progress, sprint reviews to evaluate outcomes, and sprint retrospectives to improve processes. The system was built using the Directus Headless CMS, which decouples the backend and frontend, enabling non-technical teams to manage content efficiently while supporting cross-platform integration. The resulting system includes core collections such as Navigation, Destination Index, Event Index, Hero Banner, FAQ, and other supporting collections, all designed to systematically accommodate information and support multilingual display. These features significantly improve content management efficiency by accelerating information updates, reducing data redundancy, and simplifying content organization in multiple languages. Inter-collection integration ensures consistent information across all website pages, enabling users to quickly and systematically access the data they need. Collection endpoint testing was conducted using Postman to verify that all functions operate according to design specifications and support more organized content management.
Influence of Occupational Health and Safety Risk On Human Resources on Project Continuity (Case Study: Muhammadiyah University Education Hospital Semarang) Ariyanto, Ariyanto; Wakit, Ahmat; Luthfi, Ahmad
CIVED Vol. 10 No. 3 (2023): September 2023
Publisher : Universitas Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24036/cived.v10i3.44

Abstract

This type of research uses a quantitative descriptive approach, namely describing and analyzing the problems found. Quantitative research is based on primary data and secondary data. This research aims to determine the positive influences between: (1). Employee performance influences work safety. (2). Worker awareness influences work safety. (3). Workers' health influences work safety. On the Semarang Muhammadiyah University Teaching Hospital Construction Project. The results of this research show that work safety has a positive and significant effect of 89.9% on employee performance, and worker health on project sustainability. With the help of SmartPLS3.0 software
Analisis  Model UTAUT Untuk Mengetahui Tingkat Penerimaan Teknologi Mahasiswa Pada Aplikasi Kahoot Fitri Amaliyah Batubara; Sitti Hajerah Hasyim; Aprilianti Nirmala S; Nurzabrina Anugrani; Ahmad Luthfi; Ibrahim Al khalil
Journal of Vocational, Informatics and Computer Education Vol 2, No 1 (2024): Juni 2024
Publisher : PT. Lontara Digitech Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61220/voice.v2i1.30

Abstract

Teknologi dan internet telah menjadi pendorong utama dalam globalisasi pendidikan, memungkinkan adopsi platform pembelajaran online seperti Kahoot. Penelitian ini menggunakan Model Unified Theory of Acceptance and Use of Technology (UTAUT) sebagai kerangka kerja untuk menganalisis penerimaan dan penggunaan aplikasi Kahoot oleh mahasiswa di Universitas Negeri Makassar. Metode penelitian yang diterapkan adalah pendekatan kuantitatif dengan menggunakan desain cross-sectional, dan data dikumpulkan melalui kuesioner dari 76 responden.Hasil penelitian mengungkapkan bahwa mahasiswa menunjukkan respon positif terhadap manfaat dan kemudahan penggunaan Kahoot. Namun, terdapat variabilitas dalam pandangan terkait dukungan lingkungan, persepsi guru, dan niat pengguna, menggambarkan kompleksitas adopsi teknologi ini di lingkungan pendidikan. Rekomendasi penelitian mencakup pengembangan dukungan lingkungan yang lebih baik, pelatihan bagi dosen dan mahasiswa, serta evaluasi infrastruktur teknologi guna meningkatkan efektivitas pemanfaatan Kahoot dan teknologi pembelajaran di Universitas Negeri Makassar. Temuan ini memberikan wawasan berharga untuk pengembangan pendidikan berbasis teknologi dan inovasi di era digital.
Tasks of the Drafter of Legislation in Forming Regional Regulations (Study of the Implementation of Government Regulation Number 59 of 2015) Ahmad Luthfi
Indonesian State Law Review Vol. 1 No. 2 (2019): Indonesian State Law Review, April 2019
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15294/islrev.v1i2.22973

Abstract

The formation of regional regulations can involve drafters of laws and regulations in accordance with Article 98 of Law number 12 of 2011 concerning Formation of Legislation and strengthened by Government Regulation number 59 of 2015 concerning Participation of Drafters of Legislation in Forming Legislation and the builder. This study aims to describe the tasks of drafting laws and regulations in the formation of regional regulations and the influence of drafters of statutory regulations at the Regional Office of the Ministry of Law and Human Rights in Central Java on the formation of quality regional regulations. The research method uses qualitative research and an empirical juridical approach. Primary data obtained from interviews and observations, secondary data obtained from documents and photographs. The results of this study indicate that the Drafter of Legislation can follow every stage of the process of forming regional regulations in accordance with the mandate of the applicable law and is further confirmed through a cooperation agreement between the authorized agencies. The participation of Drafters of Legislation in the formation of regional regulations does not affect whether the regional regulations made are legal or not.
Analisis Hasil Akuisisi Digital Forensic pada Perangkat Komunikasi Motorola Lex11 Hasanah, Nur Uswatun; Luthfi, Ahmad
JEPIN (Jurnal Edukasi dan Penelitian Informatika) Vol 11, No 1 (2025): Volume 11 No 1
Publisher : Program Studi Informatika

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26418/jp.v11i1.90935

Abstract

Keamanan komunikasi dalam lingkungan militer memainkan peran krusial dalam melindungi kerahasiaan informasi strategis. Dalam konteks ini, ponsel menjadi alat utama untuk pertukaran informasi terutama untuk TNI, dengan Aplikasi WAVE Mobile Communicator yang menjadi salah satu platform komunikasi yang digunakan. Dengan pertumbuhan ancaman siber yang terus berkembang, penting untuk membandingkan keamanan aplikasi ini pada dua jenis perangkat yang umum digunakan: ponsel hybrid dan ponsel konvensional. Ponsel hybrid, seperti Motorola LEX L11a yang digunakan oleh Tentara Nasional Indonesia (TNI), memiliki kemampuan untuk menggunakan beberapa jenis teknologi komunikasi, sementara ponsel konvensional hanya terbatas pada satu jenis teknologi. Penelitian ini bertujuan untuk menganalisis dan membandingkan keamanan Aplikasi WAVE Mobile Communicator pada kedua jenis perangkat tersebut menggunakan pendekatan digital forensik. Melalui pendekatan digital forensik yang didasarkan pada prinsip-prinsip keamanan komunikasi militer dan standar industri, penelitian ini akan mengeksplorasi kelemahan potensial dan tingkat kerentanan pada aplikasi tersebut. Metodologi ini mencakup akuisisi data forensik dari kedua jenis perangkat, analisis struktur aplikasi, serta identifikasi dan evaluasi potensi kerentanan keamanan. Penelitian ini juga akan memperhatikan kendala teknis yang mungkin mempengaruhi keamanan aplikasi pada masing-masing jenis perangkat. Hasil dari penelitian ini diharapkan memberikan pemahaman yang lebih baik tentang perbandingan keamanan Aplikasi WAVE Mobile Communicator pada ponsel hybrid dan konvensional, serta mengidentifikasi area di mana satu jenis perangkat mungkin memiliki keunggulan keamanan dibandingkan dengan yang lain. Informasi ini akan bermanfaat dalam pengembangan strategi keamanan komunikasi militer yang lebih efektif dan responsif terhadap ancaman siber yang terus berkembang.
Go Delivery in Producing Online-Based Police Records (SKCK) to Achieve South Sumatra Polda Service Performance Luthfi, Ahmad; Sobri, Kgs M.; Lionardo , Andries; Putra, Raniasa
PERSPEKTIF Vol. 13 No. 3 (2024): PERSPEKTIF July
Publisher : Universitas Medan Area

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31289/perspektif.v13i3.11596

Abstract

This study aims to examine and deploy an online document delivery service, named "GO DELIVERY," for processing Police Record Certificates (SKCK) at the South Sumatra Regional Police. The research follows an information technology-based system development approach, encompassing analysis, design, implementation, and evaluation phases. The analysis phase involves studying the manual SKCK process at the South Sumatra Regional Police and identifying encountered issues. Subsequently, in the design phase, a GO DELIVERY system is conceptualized, enabling applicants to submit SKCK applications online through a designated platform. Implementation entails developing the necessary applications and infrastructure to efficiently and securely support document delivery services. Finally, an evaluation assesses the GO DELIVERY service's efficacy in enhancing SKCK processing efficiency and quality. Results indicate that implementing GO DELIVERY has indeed enhanced service performance, reducing SKCK acquisition time, increasing applicant satisfaction, and optimizing resource utilization at the South Sumatra Regional Police. These findings provide a foundation for similar service development across governmental bodies, ultimately enhancing overall public service efficiency and effectiveness.
Pengembangan Kerangka Kerja Akuisisi Forensik Perangkat Bergerak Produk Xiaomi pada Fitur Second Space Berdasarkan SNI/ISO 27037:2014 Fakhriansyah, Amru Rizal; Luthfi, Ahmad
JURNAL INFOTEL Vol 16 No 2 (2024): May 2024
Publisher : LPPM INSTITUT TEKNOLOGI TELKOM PURWOKERTO

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20895/infotel.v16i2.1091

Abstract

Abstract — In conducting digital forensic activities, it must follow the rules of SOP procedures or frameworks as a reference. One of the acquisition frameworks used in digital forensics practice is ISO 27037:2014, which contains specific guidelines related to digital forensic investigation activities. On the other hand, mobile cellular is one of the branches of digital forensics that is always developing, but with the large variety of mobile devices today, ISO 27037: 2014 has not provided specific standards in the digital forensics process on mobile devices that have special features that are different from ordinary mobile devices. One of the special features provided by Xiaomi vendor developers that gives users access to cloning and creating new space in one mobile phone is called second space or second space. With this, it will be a problem for investigators when conducting forensic processes because the data acquisition process will produce 2 extraction results from one mobile device, but the SNI ISO 27037: 2014 standard has not regulated the validity of digital evidence obtained from these special features. This research will develop a framework in conducting the investigation process on Xiaomi mobile devices, because currently only Xiaomi mobile devices have a second room feature. By paying attention to the existing problems, this research will develop a framework in carrying out the acquisition process on xiaomi mobile devices on the special features of the second room based on SNI ISO 27037: 2014. It is hoped that this research can help investigators, especially DEFR (Digital Evidence First Responder) and can be a reference that can be used in the process of searching for electronic evidence that is in accordance with SNI ISO 27037: 2014 and can be accounted for in court.
The Pedagogical Role of Islamic Religious Teachers in Guiding Students’ Self-Control in Secondary Schools Ahmad Luthfi
Sufiya Journal of Islamic Studies Vol. 2 No. 1 (2025): Sufiya Journal of Islamic Studies
Publisher : Yayasan Bayt Shufiya Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This study aims to analyze the pedagogical role of Islamic religious teachers in guiding students’ self-control at Madrasah Aliyah Zakiyun Najah, located in Firdaus Village, Sei Rampah District, Serdang Bedagai Regency. The research employs a field study method with a descriptive-analytical narrative approach. Primary data were obtained through direct observation and in-depth interviews with Islamic religious teachers and seventh-grade students as key informants. Data analysis was conducted through stages of reduction, categorization, and narrative interpretation to reveal the pedagogical meaning of the implemented teaching practices. The findings indicate that Islamic religious teachers play a strategic role through three main approaches: habituation of moral values, demonstration of moral exemplarity in daily behavior, and the application of educational sanctions that emphasize character formation. These approaches contribute to the development of students’ religious character, internal discipline, and the ability to regulate emotions and actions in accordance with Islamic ethical norms.
The Role of Industry Sensitivity in Moderating The Effect of Environmental, Social, and Governance (ESG) on Financial Distress Ahmad Luthfi; Sari Atmini
E-Jurnal Akuntansi Vol. 35 No. 6 (2025)
Publisher : Fakultas Ekonomi dan Bisnis Universitas Udayana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24843/EJA.2025.v35.i06.p07

Abstract

This study aims to analyze and obtain empirical evidence on the effect of Environmental, Social, and Governance (ESG) on financial distress, and the role of industry sensitivity in strengthening the effect of ESG on financial distress. The research sample selected through purposive sampling consist of 108 Morningstar Sustainalytics rated companies listed on the Indonesia Stock Exchange in 2024. The results of the data analysis utilizing Moderated Regression Analysis (MRA) exhibit that ESG has a significant negative effect on financial distress, suggesting that the higher the ESG performance, the lower the risk of financial distress. However, contrary to the proposed hypothesis, industry sensitivity significantly weakens the negative effect of ESG on financial distress. Keywords: ESG; Financial Distress; Industry Sensitivity; Z-Score; ESG Rating.
Analisis Forensik Ransomware Pada Sistem Berbasis Linux dengan Pendekatan Perbandingan Disk Dirgantoro, Revandho Vianuara; Luthfi, Ahmad
TIN: Terapan Informatika Nusantara Vol 6 No 6 (2025): November 2025
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/tin.v6i6.8341

Abstract

This study aims to analyze the impact of Monti ransomware infection on Linux operating systems through a digital forensic approach based on artefacts and metadata. The investigation was conducted in an isolated laboratory environment using physical hardware, employing RAM acquisition and disk imaging methods on two system states: before and after infection. The ransomware execution was triggered by the monti.elf binary located in the temporary /tmp direktori, initiating encryption of operational files within the /Documents direktori. The analysis utilized Sleuthkit tools, focusing on file system structures, inode metadata, timestamps, and artefact distribution. Findings indicate that Monti employs an in-place encryption technique, replacing file contents without altering inode or block location. Key artefacts identified include encrypted files (.puuuk, .monti), ransom notes (readme.txt), execution logs (result.txt), and the ransomware binary (monti.elf). All artefacts share identical timestamps, suggesting automated execution within a single session. Validation was performed through comparative analysis of clean and infected systems, entropy measurements, and examination of TOR-based communication structures embedded in the ransom notes. These findings confirm that Monti operates as part of a Ransomware-as-a-Service (RaaS) ecosystem, with a structured and efficient infection pattern. This research contributes to the mapping of Monti ransomware artefacts and the development of forensic investigation methodologies tailored for Linux environments.
Co-Authors Abdul Aziz Achmad Yusuf Agung Firmansyah, Rico AHMAD FAISOL Ahmad Zamzami Ahmat Wakit Aini, Hana Nur Amali, Adityal Chisabul Amitama, Emilia Bunga Anggraini, Friska Aprilianti Nirmala S Apriyani, Mirna Ariwibisono, FX Ariyanto Ariyanto Bambang Sugiantoro Bin Wallang, Muslimin Dedy Afrizal Denny Vitasari Dewa, Chandra Kusuma Dhomas Hatta Fudholi diana, ros Didik Sudyana Dila Erlianti Dirgantoro, Revandho Vianuara Ekareesakul, Kittipan Eko Yuli Handoko Erinaldi, Erinaldi Fachrudin, Kurnia Arfiansyah Fadlullah, Shandy Yusril Fakhriansyah, Amru Rizal Fawzan, Ihsan fFaizal, Arif Fiasari, Sinta Nur Fitri Amaliyah Batubara Hafrida, Lis Halim, Muhammad Yusuf Hananfajri, Muhammad Hardika Dwi Hermawan Hasanah, Nur Uswatun Hijeriah, E. Maznah Hildawati Hildawati, Hildawati I Made Arie Widyasthana Wartana Putra Ibrahim Al khalil Ildrem Syafri Imam Riadi Indriasari, Ratna Irdina, Mutiara Kasnelly, Sri Khair, Otti Ilham Kholid Haryono Kurniawan, Andang Kusuma Dewa, Chandra Latif Syaipudin Lian Agustina Setiyaningsih Lionardo , Andries M. Said Marisa Permatasari, Marisa Maulana, Bagus Andrai Mawarni, Dinda Iga Meutia, Adinda Muhammad, Aldila Syariz Munawwaroh, Nasywa Zunaibatul Munjayyanah, Munjayyanah Mustikarini, Monika Grace Nilma, Nilma Nur Widiyasono, Nur Nurhalisa, Sabrina Nuril Anwar, Nuril Nurzabrina Anugrani Pakkaja, Ryan Alghazali Paputungan, Irving Vitra Poespitohadi, Wibisono Pratama, Syahrul Pravitasari, Norma Prayoga, Diki Priwibowo, Aqge Purnamasari, Rika Afriyanti Putra, I Made Arie Widyasthana Wartana Ramadani, Erika Ramadiniyati, Suci Raniasa Putra Rika Handayani Rike Nursafitri Rini, Belinda Septia Rizky Achmad Almayda Almayda Rosa, Nauviana Pita Salwa, Nikmatus Sari Atmini Shaleha, Annisa Amalia Sitti Hajerah Hasyim Sobri, Kgs M. Sopaheluwakan, Ardhasena Sri Widayati Sumarni Sumarni Suroningsih Suroningsih, Suroningsih susi susi Tuharea, Ibnu Rohan Widarta, Agung Eka Yosika, Diana Rosa Yudi prayudi Zainul’ID, Ahmad Bagus Zikri Wahyuzi Zubizaretta, Zaid Dzulkarnain