Claim Missing Document
Check
Articles

Found 3 Documents
Search
Journal : INFORMATIKA

Analisa Perancangan Sistem Informasi Inventory dengan Metode FIFO (First In First Out) pada Usaha Dagang Retail Sumaryanto; Setiyo Prihatmoko; Purwati
Informatika: Jurnal Teknik Informatika dan Multimedia Vol 2 No 1 (2022): Mei : JURNAL TEKNIK INFORMATIKA DAN MULTIMEDIA
Publisher : LPPM Politeknik Pratama Kendal

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (583.5 KB) | DOI: 10.51903/informatika.v2i1.136

Abstract

Inventory Information System in a retail trading business plays a fairly important role, especially if the goods sold consist of various types and with a fairly high turnover rate. One of the problems that often arise in an inventory system is that the number and condition of goods available in the warehouse cannot be known with certainty. This can result in goods being stored in the warehouse for too long, excessive, lacking or even running out of inventory. Besides, the use of a good inventory system is expected to reduce the risk of loss or misuse of inventory, because each type of goods has been classified regularly and allows it to be checked at any time. In short, management will be able to quickly and easily find out the existence and changes in the inventory of goods in the event of a purchase and sale of goods.
Teknik Perancangan Pendukung Keputusan dengan Metode Analytical Hierarchy Process (AHP) Untuk Menentukan Bantuan Sosial Masyarakat Dampak Dari Covid 19 Sumaryanto; Purwati; Setiyo Prihatmoko
Informatika: Jurnal Teknik Informatika dan Multimedia Vol 2 No 2 (2022): Oktober : JURNAL TEKNIK INFORMATIKA DAN MULTIMEDIA
Publisher : LPPM Politeknik Pratama Kendal

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51903/informatika.v2i2.180

Abstract

Permasalahan umum yang terjadi dalam pelaksanaan Bantuan Sosial Masyarakat yang bersumber dari Pemerintah dalam implementasinya menentukan atau memilih masyarakat penerima Bantuan Sosial Masyarakat tidak begitu tepat sasaran sesuai kriteria-kriteria penerima. Program Bantuan Sosial Masyarakat dilakukan karena adanya dampak pandemi Covid-19 yang mengharuskan Pemerintah mengalokasikan dana untuk bidang penanggulangan bencana, darurat dan mendesak untuk menangani dan menanggulangi dampak dari pandemi Covid-19 terhadap perekonomian masyarakat dalam hal ini pemerintah membuat kebijakan berbentuk Bantuan Sosial Masyarakat yang pelaksanaannya supaya tepat sasaran di masyarakat. Supaya dalam penyaluran bantuan Sosial Masyarakat tepat sasaran maka perlu adanya perancangan sistem dalam menentukan pendukung keputusan dengan metode Analytical Hierarchy Process. Kata Kunci: Bantuan Sosial Masyarakat, Pendukung Keputusan, Analytical Hierarchy Process.
ANALISIS IMPLEMENTASI CYBER SECURITY PADA SISTEM INFORMASI INVENTORY DI PERUSAHAAN DAGANG Sumaryanto Sumaryanto; Purwati Purwati; Setiyo Prihatmoko
Informatika: Jurnal Teknik Informatika dan Multimedia Vol. 5 No. 2 (2025): Oktober : JURNAL TEKNIK INFORMATIKA DAN MULTIMEDIA
Publisher : LPPM Politeknik Pratama Kendal

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51903/informatika.v5i2.1396

Abstract

Digital transformation in the business world has driven trading companies to utilize inventory information systems to improve operational efficiency and stock data accuracy. However, along with the increasing dependence on digital systems, serious challenges related to data and system security have emerged, especially in facing cyber threats. This study aims to analyze the implementation of cybersecurity in the inventory information system of a trading company, in order to evaluate the extent of protection applied to data and infrastructure. The research method used is a qualitative approach with data collection techniques through observation, interviews, and documentation studies at a trading company. The results show that the implementation of cybersecurity in the inventory information system is still not optimal, characterized by weak access controls, the absence of an intrusion detection system, and a lack of documented security policies. This study provides recommendations such as the implementation of role-based access control, strengthening data encryption, as well as the development of security policies and regular training for system users. With improved cybersecurity implementation, companies are expected to minimize the risk of system disruptions and protect critical data from both external and internal threats.