Claim Missing Document
Check
Articles

Found 11 Documents
Search

Risk Assessment Maturity Level of Academic Information System Using ISO 27001 System Security Engineering-Capability Maturity Model Nurbojatmiko Nurbojatmiko; Qurrotul Aini; Nabil Cahya Wasiqi; Muhammad Fitra Alfajri; Zahra Ulinnuha; Yuni Kurnia Purwati; Indah Kusuma Ayu; Natasya Aurora Yasmin
Journal of Applied Engineering and Technological Science (JAETS) Vol. 5 No. 2 (2024): Journal of Applied Engineering and Technological Science (JAETS)
Publisher : Yayasan Riset dan Pengembangan Intelektual (YRPI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37385/jaets.v5i2.2971

Abstract

Risk measurement from standard operating procedures implemented by an institution determines the level of maturity of a service system at that institution. The government's determination of the Tri Dharma of Higher Education consists of education and teaching, research, and community service. These activities must be implemented in the academic information system of every university in Indonesia. Appropriate and fast academic services depend on information technology and adequate and trained human resources (HR). Factors that influence information system security determine the stability of application services. The ISO/IEC 27001:2005 standard is an international benchmark for measuring the level of maturity and security risks of an application. Risk assessment in standard operating procedures in organizations can use the ISO/IEC 27001 standard. This research aims to determine the current level of Academic Information System (AIS) service by measuring maturity and security risks. Three clauses measure the maturity level of information security controls with the ISO 27001 System Security Engineering-Capability Maturity Model (SSE-CMM). These research respondents are educational work units at the Science and Technology Faculty in UIN Syarif Hidayatullah Jakarta. This research method uses quantitative research methods. This research results show the maturity level of information security in the academic information system based on three clauses as the embodiment of the stability of the academic administration activities services at the Science and Technology Faculty. The measurement results reveal that the average score of information security controls on AIS is 3.51, which means good or average standard processing has been carried out following procedures.
PERANCANGAN 3D PRINTED TACTILE PICTURE BOOKS UNTUK ANAK-ANAK TUNANETRA BERBASIS IoT Mahbubul Wathoni; Yasin Efendi; Nurbojatmiko Nurbojatmiko; Rabiatul Nurhasanah; Viesah Putra Alegra
Jurnal Holistika Vol 7, No 2 (2023)
Publisher : Universitas Muhammadiyah Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24853/holistika.7.2.155-161

Abstract

The development of Information and Communication Technology at this time is very rapid along with the development of computer technology which continues to increase in a short time. The integration between the components of networked computers will be able to provide quality, reliable, fast and secure functions and features in accordance with the required system. Along with the trend of using network technology that still pays attention to strategic and economic aspects for users, networked computerized systems now have a tendency to develop into systems that save resources by reducing the use of hardware.Perkembangan Teknologi Informasi dan Komunikasi pada saat ini sangat pesat seiring dengan perkembangan teknologi komputer yang terus meningkat dalam waktu singkat. Integrasi yang dimiliki antar komponennya komputer terhubung dengan jaringan akan mampu menyediakan fungsi dan fitur berkualitas, handal, cepat dan aman sesuai dengan sistem yang dibutuhkan. Seiring dengan adanya trend penggunaan teknologi jaringan yang tetap memperhatikan aspek strategis dan ekonomis bagi pengguna, sistem terkomputerisasi terhubung jaringan kini ada kecenderungan untuk berkembang menjadi sistem yang menghemat sumber daya dengan mengurangi penggunaan perangkat keras
Teknologi Artifical Intelligent Dalam Mengembangkan Kecerdasan Emosional Zulfitria, Zulfitria; Efendi, Yasin; Wathoni, Mahbubul; Nurbojatmiko, Nurbojatimko; Arif, Zainal
Tadarus Tarbawy : Jurnal Kajian Islam dan Pendidikan Vol 6, No 1 (2024): Tadarus Tarbawy : Jurnal Kajian Islam dan Pendidikan
Publisher : Universitas Muhammadiyah Tangerang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31000/jkip.v6i1.10277

Abstract

Artificial Intelligence (AI) technology is a breakthrough in the field of educational technology to facilitate learning. The wise and controlled use of technology can trigger the acceleration of education. The emergence of artificial intelligence technology can also instill an independent nature in students. Teachers are not burdened with such a dominant role, however, their duties are specific in the scope of providing enlightenment with substantial keywords. The basis of every use of technology for teachers is to continue to prioritize the essence of teaching, namely managing the morals and behavior of students. Students developing their emotional intelligence can take advantage of AI technology by sorting out the good things from the uses of AI so that educational technology can help them control and monitor their own learning, enabling them to live and work well in the future.
Information Security Evaluation of Data Centre Architecture Using COBIT 5 Nurbojatmiko, Nurbojatmiko; Irahman, Muhammad Shidqa; Nashikha, Ainun; Ramadhan, Raihan Lail
Sinkron : jurnal dan penelitian teknik informatika Vol. 8 No. 1 (2024): Articles Research Volume 8 Issue 1, January 2024
Publisher : Politeknik Ganesha Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33395/sinkron.v9i1.13224

Abstract

Pusat Teknologi Informasi dan Pangkalan Data (Pustipanda) UIN Jakarta is an institution in charge of managing all information systems and data management for UIN Jakarta. However, security issues are still one of the problems faced by Pustipanda today, such as data leaks, and websites that are often problematic. This research aims to assess the level of information security at the UIN Jakarta Pustipanda data centre using the COBIT 5 framework. Information security is very important in supporting organizational operations, especially facing cyber threats in the data centre environment. The research approach included document analysis, observation, and interviews with stakeholders at Pustipanda UIN Jakarta. Identification of information security weaknesses, assessment of compliance with security standards, and design of appropriate solutions are the subject of the research. It is hoped that the results will provide a comprehensive picture of information security in the data centre as well as concrete recommendations for improvement. The results of the research include an understanding of the status of information security at Pustipanda UIN Jakarta, as well as guidelines for improving information security in accordance with COBIT 5 principles. These efforts aim to reduce risk and protect the integrity, confidentiality, and availability of data in the data centre environment
Identifikasi Tujuan Tata Kelola Teknologi Informasi PLT FST UIN Jakarta Menggunakan Framework COBIT 2019 Aeni Hidayah, Nur; Nurbojatmiko; Ade Arfani, Mizan; Yuliwanda Anggi Kusumaatuti
Journal of Applied Computer Science and Technology Vol 5 No 1 (2024): Juni 2024
Publisher : Indonesian Society of Applied Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52158/jacost.v5i1.770

Abstract

Information technology (IT) has an important role in increasing efficiency and providing benefits to decision making in various sectors. IT governance is important for organizational sustainability and performance. This research focuses on the Integrated Laboratory Center (PLT) FST UIN Jakarta which still depends on external parties for IT governance, creating potential risks and uncertainty in its operations. Therefore, this research aims to analyze the implementation of COBIT 2019 as a guide in identifying IT governance objectives that suit the needs of PLT FST UIN Jakarta. The research method used in this research involves the COBIT 2019 theoretical approach, with a focus on the goal cascade concept. This approach enables a systematic translation process of stakeholders' needs for IT systems into more specific goals and appropriate strategic steps. The results show eight COBIT 2019 domains that are relevant to IT governance objectives in PLT, which include APO02 (Managed strategy), APO08 (Managed relationships), APO10 (Managed vendors), APO11 (Managed quality), BAI04 (Managed availability and capacity), DSS01 (Managed operations), DSS03 (Managed problems(, and MEA02 (Managed system of internal control) The recommendations resulting from this research are designed to improve the performance and maturity of IT processes at PLT FST UIN Jakarta in accordance with the IT governance objectives that have been identified. This is expected to provide a stronger foundation for managing and optimizing the use of IT to support operations and achieve organizational goals more effectively.
Load Balancing Techniques for Server Clustering in Cloud Environment: Systematic Literature Review Mayanda, Deara; Amaliah, Annisa Rizki; Raharja, Muhammad Ridwan Ali; Nurbojatmiko, Nurbojatmiko
Journal of Renewable Energy, Electrical, and Computer Engineering Vol. 4 No. 2 (2024): September 2024
Publisher : Institute for Research and Community Service (LPPM), Universitas Malikussaleh, Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29103/jreece.v4i2.14906

Abstract

The rapid development of cloud computing has a significant impact on increasing the workload on resources, which is often excessive and a major challenge in computing environments.  Load balancing is key to avoid overloading or underloading virtual machines, given the high user demand for service availability. There are several types of load balancing techniques, and this diversity poses its own challenges in selecting the optimal technique to address workload issues. This research presents a systematic literature review with PRISMA (Preferred Reporting Items for Systematic Reviews and Meta-Analyses) guidelines to identify various load balancing techniques for server clustering in a cloud computing environment. The purpose of this research is to review previous research on load balancing techniques for server clustering in cloud computing by categorizing based on problems, solutions, research methods, objects, and research results. Research that uses the experimental method will be reviewed again to categorize the research results based on the load balancing matrix, namely response time, make span, resource utilization, migration time, fault tolerance, throughput, and cost. Various publishers, such as IEEE, Elsevier, Springer, Wiley, MDPI and Hindawi were explored as data sources. The research conducted generates more information about load balancing techniques for clustering servers in cloud computing and allows other researchers to fill the current research gap.
PENGGUNAAN COBIT SEBAGAI FRAMEWORK MANAJEMEN RISIKO TI DI SEKTOR ASURANSI : PENDEKATAN SYSTEMATIC LITERATURE REVIEW Ramadhanti, Annisa; Nurbojatmiko
Jurnal Sistem Informasi dan Informatika (Simika) Vol. 8 No. 2 (2025): Jurnal Sistem Informasi dan Informatika (Simika)
Publisher : Program Studi Sistem Informasi, Universitas Banten Jaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47080/9n07q797

Abstract

This study aims to examine the impact of implementing the COBIT (Control Objectives for Information and Related Technology) framework on IT governance in various organizations, based on a review of relevant literature. COBIT is recognized as a comprehensive framework for effective IT governance and management. Based on the analysis of several recent scholarly publications, it is evident that the implementation of COBIT consistently leads to positive outcomes, including improved operational efficiency, enhanced IT risk control, better regulatory compliance, and higher quality of IT services. Additionally, COBIT supports organizations in identifying performance gaps and aligning IT strategies with business goals. These findings reinforce the core idea of this research—that COBIT serves as a strategic and effective tool for structured and sustainable IT governance. Therefore, the adoption of COBIT not only enhances a company’s IT capabilities but also provides added value in managerial decision-making through risk-based control mechanisms.
Ontology Modeling of The Nymphalidae Family Butterfly on Java Island Using the Methontology Nurbojatmiko, Nurbojatmiko; Yusri, Azizah Nurfauziah; Sulasiyah, Ismi Ana; Wulandari, Winda
Applied Information System and Management (AISM) Vol. 8 No. 2 (2025): Applied Information System and Management (AISM)
Publisher : Depart. of Information Systems, FST, UIN Syarif Hidayatullah Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15408/aism.v8i2.46692

Abstract

Indonesia, a mega-biodiverse nation with 53 national parks, including 12 on Java Island, hosts an immense variety of flora and fauna, particularly within the Nymphalidae butterfly family. However, the country's vast geographical complexity makes the understanding, classification, and management of information about these butterflies highly challenging, leading to fragmented and difficult-to-process data. This research aims to address this problem by constructing an ontology-based knowledge base to enable effective information reuse, integration, and semantic processing of Nymphalidae butterfly data from Java's national parks. The methodology employed the Methontology framework, which structured the development process into detailed stages: specification, conceptualization, formalization, implementation, and maintenance. The ontology was formally built using the Web Ontology Language (OWL) and the Resource Description Framework (RDF), with development and implementation carried out using the Protégé tool. Data integration and querying were facilitated through the application of semantic web standards, including SPARQL for retrieving information. The results yielded a structured semantic model for Nymphalidae butterflies in Java, comprising 7 classes, 4 object properties, and 4 data type properties. A critical evaluation using the HermiT Reasoner confirmed the ontology's logical consistency, proving the model to be sound. The primary contribution of this study is a validated, interoperable ontology that provides a standardized framework for organizing butterfly information, thereby facilitating better data sharing, integration, and knowledge management for biodiversity conservation and research efforts in Indonesia.
Peran Kepuasan dan Kemudahan terhadap sikap Pengguna E-Learning pada Sistem Informasi Akademik (AIS) Nurbojatmiko, Nurbojatmiko; Amrizal, Victor; Nanang, Herlino; Masruroh, Siti Ummi; Putri, Rizka Amalia
Jurnal Ilmiah FIFO Vol 15, No 1 (2023)
Publisher : Fakultas Ilmu Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22441/fifo.2023.v15i1.004

Abstract

Tujuan dari penelitian ini persepsi mahasiswa terhadap e-learning di Universitas Islam Negeri Syarif Hidayatullah dari sisi kepuasan dan kemudahan terhadap sikap pengguna E-Learning pada Sistem Informasi Akademik. Penelitian ini mengambil sampel mahasiswa Program Studi Teknik Informatika. Penelitian deskriptif ini dilakukan dengan menggunakan teknik kuesioner terhadap mahasiswa yang lebih mahasiswa teknik informatika Universitas Islam Negeri Syarif Hidayatullah. Penelitian ini menggunakan pendekatan kuantitatif purposive ransom sampling sebanyak 100 orang mahasiswa. Hasil analisis yang telah dilakukan menunjukkan 78% mahasiswa sistem e-learning, selebihnya hanya sekedar tahu dan cukup tahun dengan 16% dan 6%. Selain itu dari sisi kepuasan dan kemudahan terhadap sikap pengguna e-learning dapat di gambarkan bahwa akses terhadap ilmu pengetahua mempengaruhi kepuasan pengguna, begitu interaksi sosial dan efektifitas berpengaruh langsung terhadap penggunaan e-learning. Penelitian ini memberikan kontribusi pengetahuan tentang penggunaan e-learning pada institusi pendidikan dari kepuasan dan sikap pengguna. Dengan memperluas pemahaman tentang pengaruh sikap dan kepuasan serta kemudahan terhadap penggunan e-learning.
ISO 27001 As Information Security Solution In Society 5.0 Era: Systematic Literature Review Nurbojatmiko, Nurbojatmiko; Karimiyah, Muhammad Sharhan Khatami; Asnadi, Nur Muhammad; Anisyah, Rifka
Sinkron : jurnal dan penelitian teknik informatika Vol. 9 No. 1 (2025): Research Article, January 2025
Publisher : Politeknik Ganesha Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33395/sinkron.v9i1.14448

Abstract

In the era of Society 5.0, information security is an important issue along with the increasing use of technologies such as the Internet of Things (IoT), Artificial Intelligence (AI), and big data. ISO 27001 acts as a globally recognized standard framework for managing information security. The ISO 27001 standard provides a systematic framework for identifying, assessing, and managing information security risks so as to ensure the integrity, confidentiality, and availability of data in an organization. This research aims to evaluate the implementation of ISO 27001 as an information security solution in the Society 5.0 era through a systematic literature review. Using the Systematic Literature Review (SLR) method, this research collects and analyzes relevant literature to identify benefits, challenges, and recommendations related to the application of ISO 27001 in an era of increasingly integrated technology. The results showed that the implementation of ISO 27001 in the Society 5.0 era proved to make a significant contribution in improving organizational information security. This is done through a PDCA (Plan-Do-Check-Act) approach that integrates information security policies into business processes, strengthens risk management, technology infrastructure, and human resource competencies. In conclusion, the implementation of ISO 27001 in the Society 5.0 era not only improves information security, but also supports the achievement of operational efficiency and organizational sustainability amid rapid technological developments.