Claim Missing Document
Check
Articles

Found 14 Documents
Search

Risiko pengembangan perangkat lunak di indonesia: Temuan studi delphi Nuswantoro, Setio Ardy; Wahid, Fathul; Putro, Hanson Prihantoro
Teknologi: Jurnal Ilmiah Sistem Informasi Vol 10, No 1 (2020): January
Publisher : Universitas Pesantren Tinggi Darul 'Ulum (Unipdu) Jombang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26594/teknologi.v10i1.2066

Abstract

Proyek pengembangan perangkat lunak telah berhasil digunakan di berbagai bidang, tetapi persentase kegagalan masih cukup tinggi. Di Indonesia tingkat keberhasilan proyek hanya mencapai 50%. Penelitian ini bertujuan mengidentifikasi risiko pengembangan perangkat lunak dengan konteks Indonesia. Penelitian menjawab dua pertanyaan: (a) Apa risiko dalam proyek pengembangan perangkat lunak, dan (b) Apakah terdapat perbedaan tahap pengembangan perangkat lunak untuk risiko yang ditemukan. Metode Delphi digunakan untuk memperoleh pendapat ahli dengan serangkaian kuesioner berulang yang bertujuan untuk mencapai konsensus. Penelitian ini menggunakan metode Delphi dengan melibatkan 41 panelis dengan beragam latar belakang peran dalam proyek pengembangan perangkat lunak, penelitian ini menemukan 17 risiko berdasar konsensus panelis. Pemetaan risiko untuk setiap tahap pengembangan perangkat lunak (perencanaan, analisis, desain, pengembangan, implementasi, dan pemeliharaan) menemukan bahwa setiap tahap mempunyai risiko dominan yang bervariasi. Pada tahap perencanaan, risiko perencanaan sistem tidak jelas menjadi risiko yang paling mendominasi.  Software development projects have been used successfully in various fields, but failure percentage is still high. In Indonesia, project's success rate is only 50%. This research aims to identify software developments risk with Indonesia context. This research answered two questions. (a) What are the risks in a software development project; (b) Is there any difference stages of software development for the risk found. The Delphi method is used to obtain expert opinion by a series of repeated questionnaires aimed at reaching consensus. This research uses the Delphi method involving 41 panelists with various background of roles in software development projects. This study found 17 risks based on panelist consensus. Risk mapping for each sofware development stage, (planning, analysis, design, development, implementation, and maintenance) found that each stage has various dominant risks. At the planning stage, the risk of system planning is not clear to be the most dominating risk.
Risiko pengembangan perangkat lunak di indonesia: Temuan studi delphi Nuswantoro, Setio Ardy; Wahid, Fathul; Putro, Hanson Prihantoro
TEKNOLOGI: Jurnal Ilmiah Sistem Informasi Vol 10, No 1 (2020): January
Publisher : Universitas Pesantren Tinggi Darul 'Ulum (Unipdu) Jombang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26594/teknologi.v10i1.2066

Abstract

Proyek pengembangan perangkat lunak telah berhasil digunakan di berbagai bidang, tetapi persentase kegagalan masih cukup tinggi. Di Indonesia tingkat keberhasilan proyek hanya mencapai 50%. Penelitian ini bertujuan mengidentifikasi risiko pengembangan perangkat lunak dengan konteks Indonesia. Penelitian menjawab dua pertanyaan: (a) Apa risiko dalam proyek pengembangan perangkat lunak, dan (b) Apakah terdapat perbedaan tahap pengembangan perangkat lunak untuk risiko yang ditemukan. Metode Delphi digunakan untuk memperoleh pendapat ahli dengan serangkaian kuesioner berulang yang bertujuan untuk mencapai konsensus. Penelitian ini menggunakan metode Delphi dengan melibatkan 41 panelis dengan beragam latar belakang peran dalam proyek pengembangan perangkat lunak, penelitian ini menemukan 17 risiko berdasar konsensus panelis. Pemetaan risiko untuk setiap tahap pengembangan perangkat lunak (perencanaan, analisis, desain, pengembangan, implementasi, dan pemeliharaan) menemukan bahwa setiap tahap mempunyai risiko dominan yang bervariasi. Pada tahap perencanaan, risiko perencanaan sistem tidak jelas menjadi risiko yang paling mendominasi.  Software development projects have been used successfully in various fields, but failure percentage is still high. In Indonesia, project's success rate is only 50%. This research aims to identify software developments risk with Indonesia context. This research answered two questions. (a) What are the risks in a software development project; (b) Is there any difference stages of software development for the risk found. The Delphi method is used to obtain expert opinion by a series of repeated questionnaires aimed at reaching consensus. This research uses the Delphi method involving 41 panelists with various background of roles in software development projects. This study found 17 risks based on panelist consensus. Risk mapping for each sofware development stage, (planning, analysis, design, development, implementation, and maintenance) found that each stage has various dominant risks. At the planning stage, the risk of system planning is not clear to be the most dominating risk.
Implementasi dan Efektivitas E-Government dalam Meminimalisasi Penyebaran Covid-19 di Era New Normal Nur Azizah; Setio Ardy Nuswantoro
Anterior Jurnal Vol 21 No 1 (2021): Anterior Jurnal
Publisher : ​Institute for Research and Community Services Universitas Muhammadiyah Palangkaraya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33084/anterior.v21i1.2787

Abstract

Sejak kasus pertama Covid-19 di Indonesia terjadi pada 2 Maret 2020 hingga 1 Agustus 2020, telah menginfeksi 111.455 orang positif, 5.236 orang meninggal dan tingkat kesembuhan 68.975 orang. Melihat data penyebaran Covid-19 yang semakin mengkhawatirkan, penting bagi masyarakat untuk menghindari pertemuan fisik dengan kontak langsung, pertemuan publik dan padatnya penggunaan transformasi umum dalam upaya mengantisipasi masyarakat yang terinfeksi virus mematikan ini. Sejak kebijakan new normal mulai diterapkan demi menjaga kestabilan ekonomi sembari menyelamatkan kesehatan masyarakat yang berdampak pada proses penyebaran virus corona semakin tidak bisa diprediksi. Masyarakat menerapkan akselerasi kebijakan pelayanan berbasis teknologi berbasis e-government. Tujuan dari penelitian ini adalah dengan penerapan e-government di era new normal seperti saat ini menjadi pilar penting dalam mengurangi atau meminimalisasi penyebaran covid-19, dengan melembagakan hak-hak publik dalam mengetahui kinerja dan akuntabilias badan-badan publik, sehingga dapat berimbas kepada terwujudnya good governance atau tata kelola pemerintahan yang baik di setiap daerah, dimana konsep ini terdiri dari adanya transparansi, akuntabilitas, partisipasi, efektif dan efisien, responsif, dan kepastian hukum.
Mobile Learning Kreatif: Meretas Batasan Pembelajaran dalam Mata Kuliah Komunikasi dalam Advokasi: Creative Mobile Learning: Breaking Learning Boundaries in the Course of "Communication in Advocacy” Setio Ardy Nuswantoro
Bitnet: Jurnal Pendidikan Teknologi Informasi Vol. 8 No. 2 (2023): Bitnet: Jurnal Pendidikan Teknologi Informasi
Publisher : Institute for Research and Community Services Universitas Muhammadiyah Palangkaraya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33084/bitnet.v9i1.5366

Abstract

This study develops a mobile learning strategy in the course of "Communication in Advocacy" through the Research and Development (R&D) approach. Literature review indicates that mobile learning can enhance learning motivation, active participation, and accessibility to learning materials. In the context of this course, an integrated approach is needed to enable effective interaction among students and instructors, as well as to foster deep and critical communication skills. This research contributes to the development of mobile learning by designing engaging instructional strategies, ensuring synergistic curriculum integration, maintaining effective communication, and utilizing the latest technologies. The study has the potential to transform the paradigm of learning in the "Communication in Advocacy" course through the creative, critical, and innovative use of mobile learning.
Adopsi QRIS di Kalimantan: Analisis Empiris Berdasarkan Model UTAUT Rafii, Mohamad; Nuswantoro, Setio Ardy; Ulfi, Muhammad; Junaedi, Ahyar; Windiarti, Ika Safitri
Jurnal Teknik Vol 13, No 2 (2024): Juli - Desember 2024
Publisher : Universitas Muhammadiyah Tangerang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31000/jt.v13i2.12238

Abstract

Dengan menggunakan model Unified Theory of Acceptance and Use of Technology (UTAUT), penelitian ini menganalisa bagaimana penerimaan dari teknologi Quick Response Indonesia Standard (QRIS) oleh pengguna pembayaran digital di Kalimantan. Untuk mengevaluasi hubungan antara konstruk utama, Performance Expectancy (PE), Effort Expectancy (EE), Social Influence (SI), dan Facilitating Conditions (FC), terhadap Behavioral Intentions (BH) dan Use Behavior (UB), studi ini menggunakan pendekatan kuantitatif Structural Equation Modeling (SEM). Sampel 418 orang yang dipilih untuk pengumpulan data dipilih melalui survei online yang dikirim melalui Google Forms. Confirmatory Factor Analysis (CFA) digunakan untuk memverifikasi validitas dan reliabilitas instrumen pengukuran. Jika Average Variance Extracted (AVE) melebihi 0,5 dan nilai Cronbach’s Alpha melebihi 0,7, instrumen tersebut menunjukkan reliabilitas yang kuat. Hasil penelitian menunjukkan bahwa seluruh struktur memiliki reliabilitas yang tinggi. Kemudian ditemukan bahwa setiap konstruk utama memuliki pengaruh, baik langsung ataupun tidak langsung terhadap BH dan UB pada penggunaan teknologi QRIS. Studi ini memberikan wawasan empiris tentang penerimaan teknologi di Indonesia dan memberikan implikasi bagi para pemangku kepentingan yang ingin meningkatkan adopsi dan penggunaan sistem pembayaran digital.
Analisis Faktor-Faktor yang Mempengaruhi Niat Penggunaan QRIS di Kalangan Mahasiswa Kalimantan: Pendekatan UTAUT2 dan TAM Nuswantoro, Setio Ardy; Ulfi, Muhammad; Azizah, Nur
Kesatria : Jurnal Penerapan Sistem Informasi (Komputer dan Manajemen) Vol 5, No 3 (2024): Edisi Juli
Publisher : LPPM STIKOM Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/kesatria.v5i3.449

Abstract

Perkembangan teknologi, khususnya dalam pemanfaatan smartphone, telah mengubah lanskap transaksi digital di Indonesia, memfasilitasi partisipasi masyarakat dengan lebih efisien. Studi ini menginvestigasi adopsi Quick Response Code Indonesian Standard (QRIS) sebagai sistem pembayaran digital yang inovatif. Dengan mengaplikasikan Unified Theory of Acceptance and Use of Technology (UTAUT2) dan Technology Acceptance Model (TAM), penelitian ini menganalisis faktor-faktor yang mempengaruhi niat dan perilaku pengguna terhadap QRIS di kalangan mahasiswa Kalimantan dan survei online dilakukan terhadap 392 mahasiswa. Hasil analisis struktural menunjukkan konstruk model yang digunakan valid dan reliabel untuk dilakukan uji hipotesis. Hasil uji hipotesis menunjukkan bahwa Effort Expectancy, Social Influence, dan Price Value tidak berpengaruh terhadap niat dan penggunaan QRIS di Kalimantan. Facilitating Condition juga tidak berpengaruh secara langsung terhadap penggunaan QRIS, akan tetapi memiliki pengaruh tidak langsung melalui niat penggunaan QRIS.
Algoritma Deep Learning Untuk Pengenalan Gambar Jenis Daun: Deep Learning Algorithm for Leaf Type Image Recognition Azizah, Azizah; Nuswantoro, Setio Ardy; Jaya, Firman; Razaqi, Rahmat Shofan; Ansori, Ansori
Anterior Jurnal Vol. 23 No. 3 (2024): Anterior Jurnal
Publisher : ​Institute for Research and Community Services Universitas Muhammadiyah Palangkaraya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33084/anterior.v23i3.8199

Abstract

Image processing is a branch of informatics that deals with transforming one image into another using certain techniques. Deep learning algorithms have become one of the effective approaches to solving this problem. In this paper, we propose a deep learning algorithm that uses Convolutional Neural Networks (CNN) architecture to recognize leaf types based on a given leaf image. We outline the main steps in model development, including data pre-processing, CNN architecture selection, and model training. The experimental results show that the proposed deep learning algorithm can achieve a high level of accuracy in leaf-type image recognition. In this study, the CNN method is used to identify and classify objects in digital images, specifically leaves. The dataset used consists of 33 leaf classes, with a division of 16,500 data for training, 3,300 for validation, and 1,650 for testing. The training and validation processes were carried out in as many as 150 epochs, which resulted in the highest accuracy of 94% with the lowest loss of 0.28. While in the testing process, the accuracy value obtained reached 84%. The researched method, which integrates CNN with data augmentation and transfer learning, demonstrated superior performance with an accuracy of 94% in leaf type recognition. This outperforms other methods that rely solely on traditional CNN or do not utilize augmentation and transfer learning, which generally achieve lower accuracy rates. The combination of these techniques enables more robust feature extraction and better generalization, leading to more accurate and reliable classification results compared to other approaches.
Rancang Bangun Sistem Informasi Pendaftaran Siswa Baru Berbasis Web Nuswantoro, Setio Ardy; Suriansyah, S
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 6, No 2 (2022): EDISI SEPTEMBER
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v6i2.521

Abstract

The new student registration system at SMA 2 Muhammadiyah Palangkaraya is still done conventionally, the problem with using a manual system is that manual storage can result in damage or loss of new student registration data and takes a long time to make reports. Problems like this can be overcome by utilizing information technology such as a new student registration information system using the waterfall software development development method which includes the stages of planning, analysis, design, development, implementation, and maintenance. The new student registration system provides information on new student registration, the selection process for new student registration and reporting on the number of new student admissions
Rancang Bangun Sistem Informasi Pendaftaran Siswa Baru Berbasis Web Nuswantoro, Setio Ardy; Suriansyah, S
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 6, No 2 (2022): EDISI SEPTEMBER
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v6i2.521

Abstract

The new student registration system at SMA 2 Muhammadiyah Palangkaraya is still done conventionally, the problem with using a manual system is that manual storage can result in damage or loss of new student registration data and takes a long time to make reports. Problems like this can be overcome by utilizing information technology such as a new student registration information system using the waterfall software development development method which includes the stages of planning, analysis, design, development, implementation, and maintenance. The new student registration system provides information on new student registration, the selection process for new student registration and reporting on the number of new student admissions
Implementasi Wazuh-ELK-Suricata untuk Deteksi Privilege Escalation di Ubuntu Server Nuswantoro, Setio ardy; Ziaurrahman, M.; Miftahurrizqi, Miftahurrizqi; Achiril Haq, Muhammad; Rashid, Reza Athallah
Jurnal Saintekom : Sains, Teknologi, Komputer dan Manajemen Vol 15 No 2 (2025): September 2025
Publisher : STMIK Palangkaraya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33020/saintekom.v15i2.941

Abstract

Privilege escalation is one of the most critical cyberattacks because it enables adversaries with limited rights to gain full system control. Such attacks often act as gateways to larger data breaches, as seen in the 2016 Uber incident that exposed 57 million users’ personal data. This study implements and evaluates an open-source integrated intrusion detection system by combining Wazuh (HIDS), Suricata (NIDS), and the ELK Stack (Elasticsearch, Logstash, Kibana) on Ubuntu Server.Experiments were conducted through privilege escalation attack simulations using Metasploit, covering kernel exploits, misconfigurations, and software vulnerabilities. Findings reveal that the integrated system delivers broader detection compared to the default Wazuh configuration, capturing both host-level activities and network traffic. Quantitatively, a major difference was observed in response time: the integrated system detected and blocked malicious actions within 1–2 seconds, whereas the standalone system required 2–5 minutes and lacked automated blocking capabilities.Additionally, integration with the Kibana dashboard provided real-time, interactive visualization of threats, enabling administrators to trace attack patterns and respond swiftly. Overall, this research demonstrates that an integrative approach enhances detection accuracy, shortens response time, and significantly improves the quality of cybersecurity monitoring