Claim Missing Document
Check
Articles

Found 7 Documents
Search

Prediksi Website Pemancing Informasi Penting Phising Menggunakan Support Vector Machine (SVM) Zuhri Halim
INFORMATION SYSTEM FOR EDUCATORS AND PROFESSIONALS : Journal of Information System Vol 2 No 1 (2017): INFORMATION SYSTEM FOR EDUCATORS AND PROFESSIONALS (Desember 2017)
Publisher : Lembaga Penelitian dan Pengabdian Masyarakat Universitas Bina Insani

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (646.134 KB)

Abstract

Abstrak: Perkembangan teknologi informasi dan komunikasi khususnya internet berdampak pada semua sektor kehidupan manusia tidak terkecuali dengan sektor perbankan dan keuangan. Selain memberikan dampak positif dengan dipermudahnya pelanggan dalam proses transaksi yang dapat dilakukan kapanpun dan di manapun tanpa dibatasi oleh ruang dan waktu menggunakan media internet, juga membawa potensi besar terhadap pihak-pihak yang tak bertanggungjawab untuk melakukan pencurian data dan informasi penting, salah satunya dengan teknik phishing, sehingga metode untuk mendeteksi serangan situs phishing memerlukan perhatian serius. Dalam penelitian ini penulis telah melakukan memberikan gambaran metode yang paling akurat untuk mendeteksi website phishing dengan membandingkan tiga metode antara lain Support Vector Machine, Naïve Bayes, dan Decision Tree menggunakan dataset publik dari UCI Machine Learning Repository (www.uci.edu) yang dioptimasi dengan feature selection dan diolah menggunakan program RapidMiner. Hasil penelitian menunjukan bahwa metode Decision Tree mempunyai tingkat akurasi sebesar 91,84%, metode Naïve Bayes sebesar 74,07% dan Support Vector Machine sebesar 92,34%. Hal ini menunjukan bahwa metode Support Vector Machine mempunyai tingkat akurasi yang paling tinggi.. Kata Kunci: Decision Tree, Naïve Bayes, Phishing, Support Vector Machine Abstract: The development of information and communication technologies, especially the Internet, have an impact in all sectors of human life with exception in the banking and financial sectors in addition to a positive impact to make essier customer in the transaction process that can do anytime and anywhere without being limited by space and time using the internet, it also brings great potential against parties not responsible for the theft of critical data and information, one of them with phishing techniques, so the method for detecting a phishing site requires serious attention. In this study the authors try to give an overview of the most accurate methods to detect phishing websites to compare three methods such as Support Vector Machine, Naïve Bayes, and Decision Tree using public datasets from the UCI Machine Learning Repository (www.uci.edu) optimized with feature selection and processed using RapidMiner program that showed Decision Tree has a accuracy rate of 91.84%, Naïve Bayes method amounted to 74.07% and Support Vector Machine by 92.34%. Hereby declare that the method of Support Vector Machine has the highest degree of accuracy. Keyword: Decision Tree, Naïve Bayes, Phishing, Support Vector Machine
Prediksi Website Pemancing Informasi Penting Phising Menggunakan Support Vector Machine (SVM) Zuhri Halim
INFORMATION SYSTEM FOR EDUCATORS AND PROFESSIONALS : Journal of Information System Vol 2 No 1 (2017): INFORMATION SYSTEM FOR EDUCATORS AND PROFESSIONALS (Desember 2017)
Publisher : Lembaga Penelitian dan Pengabdian Masyarakat Universitas Bina Insani

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (646.134 KB)

Abstract

Abstrak: Perkembangan teknologi informasi dan komunikasi khususnya internet berdampak pada semua sektor kehidupan manusia tidak terkecuali dengan sektor perbankan dan keuangan. Selain memberikan dampak positif dengan dipermudahnya pelanggan dalam proses transaksi yang dapat dilakukan kapanpun dan di manapun tanpa dibatasi oleh ruang dan waktu menggunakan media internet, juga membawa potensi besar terhadap pihak-pihak yang tak bertanggungjawab untuk melakukan pencurian data dan informasi penting, salah satunya dengan teknik phishing, sehingga metode untuk mendeteksi serangan situs phishing memerlukan perhatian serius. Dalam penelitian ini penulis telah melakukan memberikan gambaran metode yang paling akurat untuk mendeteksi website phishing dengan membandingkan tiga metode antara lain Support Vector Machine, Naïve Bayes, dan Decision Tree menggunakan dataset publik dari UCI Machine Learning Repository (www.uci.edu) yang dioptimasi dengan feature selection dan diolah menggunakan program RapidMiner. Hasil penelitian menunjukan bahwa metode Decision Tree mempunyai tingkat akurasi sebesar 91,84%, metode Naïve Bayes sebesar 74,07% dan Support Vector Machine sebesar 92,34%. Hal ini menunjukan bahwa metode Support Vector Machine mempunyai tingkat akurasi yang paling tinggi.. Kata Kunci: Decision Tree, Naïve Bayes, Phishing, Support Vector Machine Abstract: The development of information and communication technologies, especially the Internet, have an impact in all sectors of human life with exception in the banking and financial sectors in addition to a positive impact to make essier customer in the transaction process that can do anytime and anywhere without being limited by space and time using the internet, it also brings great potential against parties not responsible for the theft of critical data and information, one of them with phishing techniques, so the method for detecting a phishing site requires serious attention. In this study the authors try to give an overview of the most accurate methods to detect phishing websites to compare three methods such as Support Vector Machine, Naïve Bayes, and Decision Tree using public datasets from the UCI Machine Learning Repository (www.uci.edu) optimized with feature selection and processed using RapidMiner program that showed Decision Tree has a accuracy rate of 91.84%, Naïve Bayes method amounted to 74.07% and Support Vector Machine by 92.34%. Hereby declare that the method of Support Vector Machine has the highest degree of accuracy. Keyword: Decision Tree, Naïve Bayes, Phishing, Support Vector Machine
Ethics-Based Leadership in Managing Information Security and Data Privacy Zuhri Halim; Ngurah Pandji Mertha Agung Durya; Kraugusteeliana Kraugusteeliana; Suherlan Suherlan; Ayu Latifah Alfisyahrin
Jurnal Minfo Polgan Vol. 12 No. 2 (2023): Artikel Penelitian 2023
Publisher : Politeknik Ganesha Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33395/jmp.v12i2.13018

Abstract

In the advancing digital age, technological transformation has created endless opportunities for efficiency, innovation and connectivity. However, behind these advancements lie significant challenges related to information security and data privacy. Adverse data breaches and cyber-attacks have reminded us of the vulnerabilities inherent in today's digital environment. Therefore, protecting information security and data privacy has become a top priority for organisations around the world. This research aims to explore how ethical leaders can influence decision-making and practices related to information security and data privacy. This research is a literature review that adopts a qualitative method approach, which means it will analyse and interpret data by relying on information and text from various sources. The study results arrive at a statement that ethical leaders ensure that technical aspects and ethical values go hand in hand in making decisions related to information security and data privacy. Through ethics-based leadership, organisations are able to build a culture that cares about data privacy, create a secure and transparent environment for customers and users, and comply with increasingly stringent regulations. The trust of customers and business partners built through ethical practices in information and data management will be a competitive advantage for organisations in the ever-changing digital age.
Perancangan Sistem Informasi Fasilitas Fitness Gym Berbasis Website Menggunakan Codeigniter Muhammad Ridwan; Zuhri Halim
KLIK: Kajian Ilmiah Informatika dan Komputer Vol. 4 No. 1 (2023): Agustus 2023
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/klik.v4i1.1039

Abstract

In the era of advancing information technology, effective data and information processing is crucial. Especially in the fitness field, tools such as computers and web-based applications have become integral. This research aims to improve the methods used by Gym Predator. Using a waterfall technique approach consisting of five stages: requirements, design, implementation, testing, and maintenance, this research developed a web-based application using the CodeIgniter framework. This application is customized to the specific needs of Gym Predator. The findings are presented in the form of a website that not only meets the demands of the gym, but also enhances the user experience in finding information and using the gym's services. Continuous evaluation and enhancement of the website will increase user interactivity, provide clearer information, and improve navigation. The findings of this study not only contribute to designing and developing better gym websites, but also underscore the importance of positive user experience in the fitness industry.
Design and implementation of augmented reality technology in m-commerce based creative patents Zuhri Halim; Muhammad Fatkhur Rahman
Enrichment : Journal of Management Vol. 13 No. 3 (2023): August: Management Science And Field
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/enrichment.v13i3.1596

Abstract

This research became carried out on Jl. Narogong, Perum. Limus Pratama Regensi, Blok A No.27 – Cileungsi, West Java in June 2019 via interviewing Creative Patent owners due to the fact the advertising gadget for Creative Patent merchandise handiest uses social media and sales facts series is still guide. The purpose of this studies is to provide a sales software this is able to introduce and market merchandise efficaciously with augmented fact functions, assist in recapping orders to minimize communication mistakes and make it simpler to find product income statistics extra successfully. M-commerce programs built based on cellular programs for users and web sites for admins. The research methodology used is the intense programming method and is designed the use of the Unifield Modeling Language (UML). The results of testing records using a questionnaire tool show a median value of eighty four.Eight%. The conclusion of this observe M-commerce programs designed for mobile make it clean for Creative Patent clients to access records related to shopping for and promoting transactions whenever and anywhere they're.
Rancang Bangun Sistem Informasi Pengelolaan Data Pegawai Menggunakan Geolocation Berbasis Website Ananda Prasta; Zuhri Halim
KLIK: Kajian Ilmiah Informatika dan Komputer Vol. 4 No. 3 (2023): Desember 2023
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/klik.v4i3.1535

Abstract

The development of information technology has been highly significant, enabling users to access data or information quickly, effectively, and accurately. However, the company's data management system still relies on manual methods, including attendance and payroll systems, leading to administrative inefficiencies and an increased potential for errors in record-keeping and accounting. This research aims to design a web-based information system with geolocation technology, employing a waterfall methodology involving requirements analysis, design, implementation, testing, and maintenance. Developed using the Codeigniter framework, this web application is tailored to the company's specific needs while considering employee requirements. A new paradigm in human resource management encourages the creation of effective web-based solutions for employee payroll and attendance. Geolocation is implemented as a security measure, with a specific radius limitation. The web application development process follows a waterfall methodology, involving requirements analysis, design, implementation, testing, and maintenance. The application is expected to provide an innovative and practical solution for managing payroll and attendance while addressing the needs of employees. Therefore, the designed employee data management information system has successfully achieved its objectives and provides an integrated solution to enhance the employee data management process through the utilization of website-based geolocation.
Implementasi Business Intelligence Untuk Menganalisis dan Memvisualisasikan Data Penumpang Bus Transjakarta Menggunakan Tableau Anwar Hidayat; Zuhri Halim; Firman Noor Hasan
Kesatria : Jurnal Penerapan Sistem Informasi (Komputer dan Manajemen) Vol 4, No 3 (2023): Edisi Juli
Publisher : LPPM STIKOM Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/kesatria.v4i3.224

Abstract

The existence of transportation facilities such as the Transjakarta bus will make it easier for human activities to move from one place to another. This Transjakarta bus is used as an alternative choice of means of transportation by many people in Jakarta. Because Transjakarta buses use special lanes that allow faster travel. The purpose of this study is to analyze Transjakarta passenger data by implementing a Business Intelligence system to display the number of passengers by type of bus, the number of passengers by route, the most favorite type of bus, the total number of passengers, the average passenger and the top five bus routes. The research method used is dataset processing, namely data for Transjakarta bus passengers in 2021 sourced from data.jakarta.go.id and the data is processed using Tableau tools. The results of this research report are in the form of a dashboard, such as the number of passengers as many as 120,308,547 people and the average passenger is 81,676 people. It is hoped that reports made in the form of data visualization and dashboards can be used in decision making.