Fadhlirrahman Baso
Universitas Negeri Makassar

Published : 15 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 15 Documents
Search

End-to-End Encryption Security Analysis on Telegram for User Message Protection Fadhlirrahman Baso; Ayu Hasnining; Haekal Febriansyah Ramadhan; Auralia Putri Nurani; Fadillah Muhlis
Information Technology Education Journal Vol. 4, No. 3, August (2025)
Publisher : Jurusan Teknik Informatika dan Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59562/intec.v4i3.9847

Abstract

This study systematically reviews the credibility of artificial intelligence (AI)–based authentic assessment in evaluating numeracy achievement among early-grade primary students. The growing use of AI in educational assessment—ranging from automated scoring to adaptive feedback—has raised questions regarding its validity, reliability, and fairness. Using a qualitative descriptive approach through a systematic literature review, this study synthesizes eighteen high-quality publications issued between 2020 and 2025 from major academic databases. Thematic analysis identifies three interrelated findings. First, algorithmic accuracy must be complemented by human validation to prevent bias and preserve contextual meaning. Second, collaboration between teachers and AI systems enhances interpretive credibility and fosters reflective learning practices. Third, integrating AI ethics and literacy within primary school curricula is essential to ensure fair and transparent assessment outcomes. The results indicate that credible AI-based evaluation depends not solely on computational precision but also on socially grounded interpretation supported by ethical and pedagogical principles. Theoretically, this study reinforces Vygotsky’s social constructivist perspective and the Assessment for Learning (AfL) paradigm, positioning AI as a cognitive scaffold that enables reflective interaction among students, teachers, and technology. Practically, it offers implications for educational policy in Indonesia’s Merdeka Curriculum, emphasizing teacher training, ethical guidelines, and algorithmic transparency to promote equitable digital learning ecosystems. This study uniquely integrates AI assessment credibility with the context of early numeracy, providing original insights and advancing theoretical discourse on ethical, human-centered, and contextually responsive digital assessment practices in primary education.
Mama Loundry: Optimizing Mobile Based Administration Processes for Laundry Businesses Fadhlirrahman Baso; Fariz Ramlan; Tessa` Labennu; Indah Febriyani Asril; Hartini Ramli
Journal of Embedded Systems, Security and Intelligent Systems Vol 4, No 2 (2023): November 2023
Publisher : Program Studi Teknik Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59562/jessi.v4i2.1165

Abstract

The laundry application is a mobile application that acts as a service provider resource to its customers. This application is a mobile application and therefore it was developed to facilitate the handling of user problems that are often faced by system administrators, such as: facilitating administrative processes via a smartphone without using a computer because we know that computers are relatively very expensive and consume a lot of electricity. This application is equipped with functions such as order management, customer management and order history. The method used is the SDLC model prototyping method used to quickly gather specific information about user information requirements. Keywords: laundry, app, mobile, android studio, java
DIGITAL PRIVACY PROTECTION: APPLYING STEGANOGRAPHY IN TEXT MESSAGES Fadhlirrahman Baso
Journal of Embedded Systems, Security and Intelligent Systems Vol 5, No 1 (2024): March 2024
Publisher : Program Studi Teknik Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59562/jessi.v5i1.2233

Abstract

Digital privacy protection has become a crucial priority in today's digital age, given the increasing risks of personal data leaks. Steganography, as a technique of concealing messages within other media, emerges as an innovative solution to safeguard text messages from unauthorized access. This article examines the implementation of steganography, specifically the Least Significant Bit (LSB) method, in protecting user's personal data. Through experiments conducted on the pelock.com website, this method successfully embedded text messages into images without compromising visual transparency. This success demonstrates the potential of steganography, especially LSB, as an effective tool in securing confidential information. Detailed implementation steps and test results indicate that steganography can serve as an additional layer in maintaining data confidentiality in the complex and evolving digital environment. The research also identifies potential avenues for further development, including the integration of artificial intelligence to enhance overall data security.
Development Monitoring Information System Based on Website and Whatsapp Gateway at Sd Telkom Makassar Al Imran; M. Syahid Nur Wahid; Fadhlirrahman Baso; A. Fadil
Journal of Embedded Systems, Security and Intelligent Systems Vol 5, No 3 (2024): November 2024
Publisher : Program Studi Teknik Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59562/jessi.v5i3.5193

Abstract

The research aims to determine the results of developing a monitoring system based on a website and WhatsApp gateway at SD Telkom Makassar, as well as to evaluate the system's performance using ISO/IEC 25010 standards. This research uses the Research and Development (R&D) approach. The development model applied is the prototype model. Data was collected through interviews and questionnaires. The system was implemented with several technologies, including the Laravel framework, MySQL, and WhatsApp gateway. The system testing used ISO/IEC 25010, covering 8 aspects: (1) Functional suitability aspect fulfilled 134 out of 134 total features, scoring 100% and categorized as suitable. (2) The Usability aspect achieved a percentage score of 96.3%, classified as very good. (3) The Performance efficiency aspect received a grade of B with a performance percentage of 82%. (4) Reliability aspect achieved a metric score of 100%. (5) The Maintainability aspect met the criteria of instrumentation, consistency, and simplicity. (6) The Portability aspect achieved a perfect score with no errors. (7) Compatibility aspect scored well with no errors. (8) The Security aspect was at Vulnerability Level 0 (safe). The developed system successfully met the ISO/IEC 25010 testing standards, this qualifying as a reliable information system
Hubungan Tingkat Kesadaran Pengguna terhadap Cybercrime dan Pengaplikasian Fitur Peringatan Phishing dan Malware Pada Google Browser Fadhlirrahman Baso; Muhammad Rahmat Ramadan
Journal of Embedded Systems, Security and Intelligent Systems Vol 5, No 3 (2024): November 2024
Publisher : Program Studi Teknik Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59562/jessi.v5i3.5527

Abstract

The high number of cybercrime cases shows the need for user awareness to avoid various crimes on the internet. This research aims to determine whether there is a relationship between the level of user awareness of cybercrime threats and the level of application of the phishing and malware warning features on the google browser. The researcher uses a quantitative approach. Data was obtained from questionnaires and analyzed using the Pearson coefficient correlation method. By using this method, a positive correlation coefficient value was found between the two variables. The positive correlation coefficient value indicates that there is a relationship between the two variables.