p-Index From 2020 - 2025
11.831
P-Index
This Author published in this journals
All Journal IAES International Journal of Artificial Intelligence (IJ-AI) IJCCS (Indonesian Journal of Computing and Cybernetics Systems) JURNAL SISTEM INFORMASI BISNIS Jurnal Peternakan Integratif Elkom: Jurnal Elektronika dan Komputer Journal of Education and Learning (EduLearn) Jurnal Ilmiah Teknik Elektro Komputer dan Informatika (JITEKI) Prosiding SNATIF Jurnal Teknologi Informasi dan Ilmu Komputer Jurnal Transformatika JUITA : Jurnal Informatika Scientific Journal of Informatics Khazanah Informatika: Jurnal Ilmu Komputer dan Informatika InfoTekJar : Jurnal Nasional Informatika dan Teknologi Jaringan JOIN (Jurnal Online Informatika) JOIV : International Journal on Informatics Visualization AdBispreneur Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) International Journal of Artificial Intelligence Research JIKO (Jurnal Informatika dan Komputer) JURNAL MEDIA INFORMATIKA BUDIDARMA Information System for Educators and Professionals : Journal of Information System SELAPARANG: Jurnal Pengabdian Masyarakat Berkemajuan JURNAL TEKNIK INFORMATIKA DAN SISTEM INFORMASI MATRIK : Jurnal Manajemen, Teknik Informatika, dan Rekayasa Komputer Jurnal Nasional Pendidikan Teknik Informatika (JANAPATI) Jurnal Informatika Aptisi Transactions on Management JIPI (Jurnal Ilmiah Penelitian dan Pembelajaran Informatika) Aptisi Transactions on Technopreneurship (ATT) EDUMATIC: Jurnal Pendidikan Informatika Building of Informatics, Technology and Science Jurnal Mnemonic Journal Sensi: Strategic of Education in Information System Indonesian Journal of Electrical Engineering and Computer Science Abdimasku : Jurnal Pengabdian Masyarakat Computer Science and Information Technologies Jurnal Bumigora Information Technology (BITe) Aiti: Jurnal Teknologi Informasi Infotech: Journal of Technology Information Jurnal Teknologi Informasi dan Komunikasi Jurnal Teknik Informatika (JUTIF) Indonesian Journal of Applied Research (IJAR) Journal of Applied Data Sciences JOINTER : Journal of Informatics Engineering Jurnal Indonesia : Manajemen Informatika dan Komunikasi Journal of Information Technology (JIfoTech) Edutik : Jurnal Pendidikan Teknologi Informasi dan Komunikasi Magistrorum et Scholarium: Jurnal Pengabdian Masyarakat Jurnal Rekayasa elektrika Jurnal INFOTEL SmartComp Jurnal Indonesia : Manajemen Informatika dan Komunikasi Blockchain Frontier Technology (BFRONT) Scientific Journal of Informatics JuTISI (Jurnal Teknik Informatika dan Sistem Informasi)
Claim Missing Document
Check
Articles

STUDI LITERATUR : PERBANDINGAN SSL, SET, SEP BERDASARKAN END-USER IMPLEMENTATION REQUIREMENTS Lina, Tirsa Ninia; Sembiring, Irwan; Purnomo, Hindriyanto Dwi
Prosiding SNATIF 2017: Prosiding Seminar Nasional Teknologi dan informatika (BUKU 2)
Publisher : Prosiding SNATIF

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

AbstrakSistem pembayaran elektronik (e-payment) dianggap sebagai tulang punggung e-commerce. Agar diterima secara luas metode pembayaran di seluruh dunia, sistem e-payment harus mengikuti protokol keamanan yang efisien yang menjamin keamanan yang tinggi untuk transaksi online. Secure Socket Layer (SSL) dan Secure Electronic Transaction (SET) merupakan dua protokol yang  banyak dibahas untuk mengamankan pembayaran kartu kredit online. Namun, SSL maupun SET telah gagal dalam implementasi pada pengguna akhir, sehingga munculah protokol Secure Electronic Payment (SEP) yang merupakan protokol e-payment yang aman dan efisien yang menawarkan lapisan tambahan perlindungan bagi cardholder dan merchant. Tujuan penulisan ini untuk menentukan protokol mana yang paling cocok untuk keamanan e-payment berdasarkan perbandingan pada end-user implementation requirements. Metode yang digunakan berupa studi literatur dengan melihat karya terkait yang membahas mengenai protokol SSL, SET, SEP yang selanjutnya akan dilakukan perbandingan. Hasil yang didapatkan dari perbandingan protokol keamanan e-payment SSL, SET, dan SEP berdasarkan faktor end-user implementation requirements (usability, flexibility, affordability, reliability, availability, interoperability) yaitu bahwa protokol SEP yang memenuhi syarat dan paling cocok untuk diterapkan dalam keamanan e-payment. Kata kunci: SSL, SET, SEP, security requirements of e-payment, end-user implementation requirements
Pemanfaatan Metode Association Rules dan Holt-Winter Multiplicative untuk Meningkatkan Peluang Penjualan Obat Pertanian Setiawan, Dwi; Sediyono, Eko; Sembiring, Irwan
JSINBIS (Jurnal Sistem Informasi Bisnis) Vol 10, No 1 (2020): Volume 10 Nomor 1 Tahun 2020
Publisher : Universitas Diponegoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (662.236 KB) | DOI: 10.21456/vol10iss1pp46-55

Abstract

The competition level between companies on executing product marketing is rapidly increasing, so the companies have to understand the importance of correlation between external environments of company with consumer’s needs. One of the efforts that can be done is by utilizing data warehouse and the application of infrastructure in information and technology field. This research combined Association Rules  method to extracting pattern and finding every possibility that potential to increase sales and Holt-Winter Multiplicative method to estimate the alteration of trend on the seasonal data. After passed through data processing process by using RapidMiner tools, information that consists of correlation pattern between rule that describe the comparison of product and the sales working area and season that affects the product sale. The pattern used by company to know which product is often purchased by customer. Besides that, this research produces changing trend data of PT ABC’s product that generated by result of previous data comparison with forecast data. Based on value of error rate Mean Absolute Percentage Error (MAPE) in estimating forecast result on the PT ABC’s sales transaction data during 3 years, it shows good level of accuracy. Result of data test, by considering rule that formed and forecast result so the company can control and manage product in order to avoid incorrect sales. This thing will effect on repression of operational cost and PT ABC can identify available opportunities to increase sale of agricultural medicine.
AUDIT INTERNAL KEAMANAN SISTEM INFORMASI KEUANGAN STEKOM MENGGUNAKAN ACUNETIX TOOLS DENGAN STANDART SMKI Robby Andika Kusumajaya; Irwan Sembiring
JURNAL TEKNOLOGI INFORMASI DAN KOMUNIKASI Vol 8 No 2 (2017): September
Publisher : UNIVERSITAS STEKOM

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51903/jtikp.v8i2.179

Abstract

Security becomes very important in the financial information system, the information security policy should be good and should include several procedures, such as property management, human resources management, physical and environmental safeguards, security logical security, information technology operational security and related incident handling procedures With information systems. Therefore it is necessary to evaluate the security of information systems to ensure information security, especially procedures implemented in accordance with ISO / IEC 27001 procedures. The Information Security Management System (SMKI) becomes a common standard in providing a way that should be implemented in the implementation of security concepts Information from the management aspects of information systems and network security. To measure the threat level of an information system using Acunetix software. With the application of standard ISO / IEC 27001 can protect aspects of information security that is confidentiality, integrity and availability. The purpose of conducting an audit can provide an appropriate way to the security of information systems residing in STEKOM institutions
ANALISIS BISNIS CENDERAMATA DAN JASA PERJALANAN WISATA MENGGUNAKAN BUSINESS MODEL CANVAS (BMC) DAN METODE PIECES Yerik Afrianto Singgalen; Eko Sediyono; Irwan Sembiring
AdBispreneur : Jurnal Pemikiran dan Penelitian Administrasi Bisnis dan Kewirausahaan Vol 6, No 2 (2021): AdBispreneur : Jurnal Pemikiran dan Penelitian Administrasi Bisnis dan Kewirausa
Publisher : Departemen Ilmu Administrasi Bisnis, Fakultas Ilmu Sosial dan Ilmu Politik, UNPAD

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24198/adbispreneur.v6i2.33663

Abstract

The use of information technology in the marketing of souvenirs and travel services based on the e-commerce concept can reach a wider market share via the internet. In the context of Micro, Small, and Medium Enterprises, the dynamics of entrepreneurship are holistic, so they need to be studied contextually. This article aims to analyze the business processes of Souvenirs and Travel Services that are carried out conventionally using the Business Model Canvas to determine the strengths, weaknesses, threats, and opportunities. Then analyze the aspects of Performance, Information, Economic, Control, Efficiency, and Services in Souvenirs and Travel Services businesses. This research uses descriptive qualitative methods. The data collection techniques used were in-depth interviews, observation, and document study. Meanwhile, data processing uses triangulation techniques. This study indicates that the adoption of information technology can support the operations of MSMEs in reducing marketing costs and providing convenience in terms of transactions and communication via digital platforms. Adopt the e-Commerce concept through the WordPress application, especially using the WooCommerce plugin and 3CX Live Chat on the website has made the transaction process and communication easier between sellers and consumers. The convergence between traditional and digital businesses can improve the performance of MSMEs.Pemanfaatan teknologi informasi dalam pemasaran bisnis cenderamata dan jasa perjalanan wisata berdasarkan konsep e-commerce dapat menjangkau pangsa pasar yang lebih luas melalui internet. Dalam konteks Usaha Mikro Kecil Menengah (UMKM), dinamika berwirausaha bersifat holistik sehingga perlu dikaji secara konstekstual. Artikel ini bertujuan menganalisis proses bisnis cenderamata dan jasa perjalanan wisata yang dilakukan secara konvensional menggunakan Business Model Canvas (BMC) untuk mengetahui kelebihan, kelemahan, ancaman dan peluang. Kemudian mengidentifikasi dan menganalisis aspek Performance, Information, Economic, Control, Efficiency, and Services (PIECES) pada usaha cenderamata dan jasa perjalanan wisata yang telah mengadopsi konsep e-commerce. Penelitian ini menggunakan metode kualitatif deskriptif. Hasil penelitian ini menunjukkan bahwa adopsi teknologi informasi dapat mendukung operasional UMKM dalam mereduksi biaya pemasaran serta memberikan kemudahan dalam hal transaksi maupun komunikasi melalui platform digital. Adopsi konsep e-commerce melalui aplikasi WordPress, khususnya penggunaan plugin WooCommerce dan 3CX Live Chat dalam website CV. Xindotour  telah memudahkan proses transaksi dan komunikasi antara penjual dan konsumen. 
Exploring MSMEs Cybersecurity Awareness and Risk Management : Information Security Awareness Yerik Afrianto Singgalen; Hindriyanto Dwi Purnomo; Irwan Sembiring
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 15, No 3 (2021): July
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.67010

Abstract

The use of information technology in the management of Micro, Small, and Medium Enterprises (MSMEs) is not limited to business performance and productivity but also aspects of data security and transactions using various mobile, website, and desktop-based applications. This article offers an idea to explore cybersecurity awareness and risk management of MSME actors who adopt information technology. The research method used is qualitative with a case study approach in the Coffeeshop X business and the Y Souvenir business in Salatiga City, Central Java, Indonesia. The data collection technique used in-depth interviews, observation, and document studies. These findings indicate that Cybersecurity Awareness, especially information security awareness, can be reviewed based on knowledge, attitudes, and behavior. Risk management can be review based on supply risk, operational risk, and customer risk. Cybersecurity Awareness and Risk Management in MSMEs is holistic and cannot be generalized, so it needs to be discussed contextually based on case studies. In the context of Coffeeshop X and Souvenir Y, the level of Cybersecurity Awareness (knowledge, attitude, behavior) is not always linear. In addition, risk management is more dominant in the customer risk dimension, compared to supply risk and operational risk. 
Characterization and comparation test of chicken eggs strain isa brown and hyline brown in different areas Setiawan Hakim; Yusuf Leonard Henuk; Hamdan .; Iskandar Sembiring; Hasnudi .
Jurnal Peternakan Integratif Vol 5, No 2 (2017)
Publisher : Universitas Sumatera Utara

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (352.203 KB)

Abstract

This study aims to determine the characterization and comparative test of exterior and interior qualities including egg weight, eggshell thickness, egg shape, air cavity and interior including high albumin, egg yolk, and haugh egg unit from egg strain Isa Brown and Hyline Brown in different areas of Deli Serdang and Langkat regencies, North Sumatra Province in June-July 2017. The eggs used in this study were 400 eggs divided by 100 Isa Brown and 100 Hyline Brown from Denai Village, Pantai Labu Subdistrict, Regency Deli Serdang, then 100 Isa Brown and 100 Hyline Brown from Sei Limbat Village, Kecamatan Selesai, Langkat District. Each egg is collected directly from the chicken and then measured against the exterior and interior. The results showed that the characterization and comparative test of chicken eggs consumption of strains of Isa Brown and Hyline Brown in different regions had results(thit> ttable) with t test on comparative test I1: H1 and I2: H2 meaning egg of different strain showed different result also on egg weight parameter, shapeegg, shell weight, air cavity, egg white index, haugh unit, egg yolk index and yolk color. The comparative test I1: I2 showed no significant differences (thit <ttabel) on egg weight, shell thickness, shell weight, egg white index, haugh unit and egg yolk index, but showed significantly different (titable) results in egg shape, air cavity and yolk color, meaning there is environmental influence but not significant to other quality of egg with same strain in different region. In the H1: H2 comparative test the results were not significantly different (thit <ttabel) on all parameters except the color of egg yolks, meaning that no environmental or strain effect produced eggs of the same quality in different regions.
Analysis of the Factors that Influence the Mud Farmer Income in Sorkam Barat Subdistrict,Tapanuli Tengah District Sandry Lanovela Pasaribu; Yusuf Leonard Henuk; Hasnudi .; Iskandar Sembiring; Nurzainah Ginting
Jurnal Peternakan Integratif Vol 6, No 3 (2018)
Publisher : Universitas Sumatera Utara

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (576.421 KB)

Abstract

Buffalo cattle are one of the commodities that function as a source of animal protein for the community, as savings, additional income, as labor and manure can be used as fertilizer while providing a source of profit / income for farmers.The purpose of the study was to determine the income of mud buffalo farmers and the factors that influence income in the West Sorkam District, Tapanuli Tengah District. The study was conducted in May-August 2018 using primary data. The method used in data collection is interviewing respondents with the Census Method and analyzed with Multiple Linear Regression using SPSS 16 application tools. The results showed that the income of mud buffalo farmers in West Sorkam District was influenced simultaneously by the business scale, breeders' age, farmer experience, the number of family and labor dependents with R square valued at 0.986 (98%). The results of the study showed that the business scale and the number of workers gave a significant influence (P <0.05) on the income of mud buffalo farmers. The income of buffalo farmers in West SorkamSubdistrict is diverse, with the smallest income being Rp. 370,000/ year with a scale of 2 cattle and the largest is Rp. 68,805,000/ year with a livestock business scale of 47 tails.
Evaluasi Jaringan dan Interaksi Tim Sukses Pileg Tahun 2019 Melalui Social Network Analysis (SNA) Nining Fitriani; Irwan Sembiring; Kristoko Dwi Hartomo
InfoTekJar : Jurnal Nasional Informatika dan Teknologi Jaringan Vol 4, No 2 (2020): InfoTekJar Maret
Publisher : Universitas Islam Sumatera Utara

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30743/infotekjar.v4i2.2348

Abstract

The 2019 elections in Indonesia was slightly different from the previous elections because the elections were held simultaneously. It made more difficult for the community to make their choices. Public was faced with a larger number of candidates who were not necessary known as legislative candidates’ socialization is very important. This research discussed the process of network formation and network structure that was formed. Data collection was carried out through observation, interviews and questionnaires with 50 respondents as research samples. The data obtained were processed using the UCINET tool which was then analyzed using Social Network Analysis (SNA). The results showed that the process of network formation occurred because of interpersonal contact between actors, the experiences of being a successful team and relationships history between actors. The network structure formed was closed with a high level of communication density that is 0,976. It was meant that all actors made communication each other intensively. The actor who became the network booster was actor id#02 which always appears in every click that was formed.
Review : Algoritma Kriptografi Sistem Keamanan SMS di Android Maya Sari; Hindriyanto Dwi Purnomo; Irwan Sembiring
Journal of Information Technology Vol 2 No 1 (2022): Journal of information Technology
Publisher : Institut Shanti Bhuana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46229/jifotech.v2i1.292

Abstract

Abstract— The use of smartphones is very widespread in today's society. Android is widely liked by various circles of users as well as among smartphone manufacturers with its very interesting features. However, even though this smartphone technology has many features, users still have special considerations for SMS (Short Message Service) email. Unfortunately, this SMS feature has limitations, only in the security of exchanging confidential information, this system is needed to provide secure information exchange via Android-based SMS. Therefore, it is necessary to secure it using cryptographic methods and a high level of security is required. In this study, we will compare three cryptographic algorithms, namely AES (Advanced Encryption Standard), RSA (Rivest Shamir Adleman), and TEA (Tiny Encryption Algorithm) which is carried out by comparing the characteristics of the encryption algorithm, the results of which will be used for an Android-based SMS security system with better security. higher. Based on the findings of the review it can be concluded that TEA (Tiny Encryption Algorithm) is the best algorithm for this work for an SMS security system on Android.
Review : Algoritma Kriptografi Sistem Keamanan SMS di Android Maya Sari; Hindriyanto Dwi Purnomo; Irwan Sembiring
Journal of Information Technology Vol 2 No 1 (2022): Journal of information Technology
Publisher : Institut Shanti Bhuana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46229/jifotech.v2i1.292

Abstract

Abstract— The use of smartphones is very widespread in today's society. Android is widely liked by various circles of users as well as among smartphone manufacturers with its very interesting features. However, even though this smartphone technology has many features, users still have special considerations for SMS (Short Message Service) email. Unfortunately, this SMS feature has limitations, only in the security of exchanging confidential information, this system is needed to provide secure information exchange via Android-based SMS. Therefore, it is necessary to secure it using cryptographic methods and a high level of security is required. In this study, we will compare three cryptographic algorithms, namely AES (Advanced Encryption Standard), RSA (Rivest Shamir Adleman), and TEA (Tiny Encryption Algorithm) which is carried out by comparing the characteristics of the encryption algorithm, the results of which will be used for an Android-based SMS security system with better security. higher. Based on the findings of the review it can be concluded that TEA (Tiny Encryption Algorithm) is the best algorithm for this work for an SMS security system on Android.
Co-Authors Abas Sunarya, Po Ade Iriani Adi Setiawan Adriyanto Juliastomo Gundo Agus Sugiarto Agustinus, Ari Alamsyah, Ferry Andriana, Myra April Lia Hananto Apriliasari, Dwi Ardaneswari, Awanda Arthur, Christian Astawa, I Wayan Aswin Dew Ayu Sanjaya, Yulia Putri Bayu Setyanto Pamungkas Budhi Kristianto Budi Santoso Budi, Reza Setya Cahyaningtyas, Christian Daniawan, Benny Danny Manongga Danny Sebastian Dedy Prasetya Kristiadi Dwi Hosanna Bangkalang Dwi Setiawan Edi Suharyadi Efendy, Rifan Eko Sediono Eko Sediyono Eleazer Gottlieb Julio Sumampouw Elmanda, Vonda Erick Alfons Lisangan Esti Zakia Darojat Evangs Mailoa Evi Maria Faturahman, Adam Fauzi Ahmad Muda Fian Yulio Santoso Florentina Tatrin Kurniati Gallen cakra adhi wibowo Gerry Santos Lasatira Ginting, Jusia Amanda Girinzio, Iqbal Desam Gudiato, Candra Hamdan . Hany Makaruku, Yulian Hasnudi . Henderi Henderi . Hendry Hendry, - Henuk, Yusuf Leonard Hindriyanto Dwi Purnomo Huda, Baenil Ignatius Agus Supriyono Ilham Hizbuloh Indrastanti Ratna Widiasari Iwan Setiawan Iwan Setiawan Iwan Setyawan Joko Listiawan Sukowati Joko Siswanto Joko Siswanto Jonas, Dendy Julians, Adhe Ronny Juneth Manuputty Krismiyati Kristoko D Hartomo Kristoko Dwi Hartomo Kusumajaya, Robby Andika Limbong, Josua Josen Alexander Madawara, Herdin Yohnes Manongga, Daniel H.F Manongga, Daniel H.F. Manongga, Daniel HF Marsyel Sampe Asang Marvelino, Matthew Mau, Stevanus Dwi Istiavan Maya Sari Merryana Lestari Migunani Migunani Mira Mira Mira Mohammad Ridwan Muhamad Yusup Nanle, Zeze Nazmun Nahar Khanom Nina Setiyawati Ninda Lutfiani Nining Fitriani Novita Dewi Susanti Nugroho, Samuel Danny Nurtino, Tio Nuryadi, Didik Nurzainah Ginting Pamungkas, Bayu Setyanto Phillnov Yohanes Pinontoan Pinontoan, Phillnov Yohanes Priatna , Wowon Purbaratri, Winny Purnama Harahap, Eka Purnomo, Hidriyanto Dwi Putra, Yonathan Rahadi Qurotul Aini Qurotul Aini Rahardja.,M.T.I.,MM, Dr. Ir. Untung Raymond Elias Mauboy Rimes Jopmorestho Malioy Roy Rudolf Huizen Saian, Septovan Dwi Suputra Sandry Lanovela Pasaribu Santoso, Nuke Puji Lestari Sediyono, Eko - Setiawan Hakim Sri Ngudi Wahyuni Sri Ngudi Wahyuni, Sri Ngudi Sri Yulianto Joko Prasetyo Suharyadi Sulistio Sulistio Sumampouw, Eleazer Gottlieb Julio Supriadi, Candra Suryantara, I Gusti Ngurah Sutarto Wijono Suwijo Danu Prasetyo Teady Matius Surya Mulyana, Teady Matius Teguh Wahyono Theopillus J. H. Wellem Tintien Koerniawati Tirsa Ninia Lina Tomasoa, Lyonly Tri Wahyuningsih Tri Wahyuningsih Tukino, Tukino Untung Rahardja Untung Rahardja Wibowo, Mars Caroline Wijaya, Angga Zakharia Wiwien Hadikurniawati Yerik Afrianto Singgalen Yessica Nataliani Yohan Maurits Indey Yohnes Madawara, Herdin Yulian Hany Makaruku