Muhammad Jazman
Universitas Islam Negeri Sultan Syarif Kasim Riau, Pekanbaru

Published : 4 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 4 Documents
Search

Cybersecurity Supply Chain Risk Management Using NIST SP 800-161r1 Rahmi Aulia Astri; Muhammad Jazman; Syaifullah; Eki Saputra
KLIK: Kajian Ilmiah Informatika dan Komputer Vol. 3 No. 6 (2023): Juni 2023
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/klik.v3i6.799

Abstract

Supply chain security issues were related to the product life cycle in an information system so it can harm the success of a company. Nowadays, there has been a paucity of analytical and decision-support tools used to analyze security supply chains. The purpose of this research was to determine the maturity level of supply chain risk management so that the research results can provide mitigation and optimize decision support to minimize supply chain risk in a company. The stages of this research started with a literature study, identification of the problem, data collection, and data analysis. Data collection was carried out using a questionnaire with a Likert scale referring to NIST SP 800-161r1. Data analysis was performed using descriptive statistics to describe the maturity level of cyber security supply chain risk management. The results showed that the level of maturity in cybersecurity supply chain risk management using NIST SP 800-161 was at level 3, namely the Defined level. These findings provide recommendations for companies to improve the contingency plan aspect because it had a score with the lowest gap, especially in every product change activity carried out in the system
The Implementation of Personal Data Protection Law on Information System Security Risks Using OCTAVE-S Gita Nurul Aini; Muhammad Jazman; Angraini; Mona Fronita
KLIK: Kajian Ilmiah Informatika dan Komputer Vol. 3 No. 6 (2023): Juni 2023
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/klik.v3i6.848

Abstract

This research focuses on the risk assessment and mitigation of the Hitmi system, an information system used by PT Perkebunan Nusantara (PTPN V) for calculating employee premiums. The study aims to identify and evaluate the risks associated with the system's information technology assets and provide risk mitigation recommendations in accordance with information security practices and the Personal Data Protection Act. The research methodology includes several stages: Planning, Data Collection, Analysis and Data Processing, and Final Phase. In the Planning Stage, the problem is identified through observations and interviews, and the research purpose is defined. The Data Collection Phase involves literature studies, observations, interviews, and the use of OCTAVE-S sheets to collect relevant data. The Analysis and Data Processing stage focuses on analyzing the collected data and processing it for conclusions and problem resolution. The OCTAVE-S framework is used to identify assets, vulnerabilities, and develop security strategies and plans. The results and discussion section presents the mapping of the OCTAVE-S analysis with the Personal Data Protection Act, identifying organizational information, and assessing organizational security practices. The risk impact assessment criteria are used to evaluate the risks, and the assets of the organization are identified. The assessment of security practices reveals areas of improvement and areas where good security practices are already implemented. Based on the findings, recommendations for risk mitigation are provided. These recommendations include security awareness and training programs for employees, improved resource allocation for security activities, regular updates to security policies, and the implementation of access control measures, incident management procedures, and encryption techniques.This research contributes to enhancing information security practices and reducing risks associated with the Hitmi system at PTPN V. The findings can guide the organization in implementing effective security controls, complying with the Personal Data Protection Act, and ensuring the confidentiality, integrity, and availability of sensitive data.
Vector Tile Server In Geographic Information System In Bapenda Pekanbaru City Desy Herlina Citra; Muhammad Jazman; Anofrizen; M Afdal; Arief Rahman
KLIK: Kajian Ilmiah Informatika dan Komputer Vol. 3 No. 6 (2023): Juni 2023
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/klik.v3i6.907

Abstract

The Regional Revenue Agency (Bapenda) is an organization primarily focused on regional taxation matters. Bapenda City of Pekanbaru used WebGIS to view spatial data related to taxes. The WebGIS system used in Bapenda is desktop-based. The users of this system must engage directly with GIS hardware in order to get information about taxes, which is a disadvantage of this system. Furthermore, the WebGIS utilized by Bapenda currently relies on WMS (Web Map Service). However, due to the extensive data processing requirements, WMS is not deemed suitable. WMS may result in broken labels, causing confusion among users, and it also has limitations when it comes to styling capabilities. This study's goal is to recommend the use of GIS, specifically the GeoServer and PostGIS programs, for efficient data storage table administration and map digitalization. A Geographic Information System using a Vector Tile Server is the end result of this system. Gaining access to a spatial data infrastructure that works with Vector Tile Server is considered to be beneficial since it will allow spatial data to be presented and styled without placing a heavy load on the client. Implementing GIS, especially GeoServer and PostGIS applications, may make it easier for Pekanbaru City to audit and collect taxes, which will make these responsibilities easier for Pekanbaru City Bapenda.
Analisis Sentimen pada Ulasan Aplikasi Maxim di Google Play Store dengan K-Nearest Neighbor Restu Ramadhan; M Afdal; Inggih Permana; Muhammad Jazman
JURIKOM (Jurnal Riset Komputer) Vol 10, No 3 (2023): Juni 2023
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/jurikom.v10i3.6396

Abstract

Online transportation is an innovation in emerging technology to solve various problems that arise in conventional public transportation such as in the ease of ordering, availability, and digitization of payments. Maxim is an online transportation company that has been operating since 2018 in Indonesia. As the number of users of the maxim application increases, demands for the quality of application service also increase. In the Google Play Store, reviews and information about an app are stored in text form. One of the processes of extracting text mining information in the text category is Sentiment Analysis to see the tendency of a sentiment or opinion whether it is positive, neutral, or negative at the Maxim application user reviews. The sentiment classification process using the K-NN algorithm produces accuracy, precision, and recall of 90.23%; 90.23%; and a recall value of 72.38% with an experiment using 90% training data, 10% test data, and a value of k = 5.