Claim Missing Document
Check
Articles

Found 4 Documents
Search

Course Attendance Mobile for Monitoring Student’s Activity Rijois I. E. Saragih; Thandy Simanjuntak
International Journal of Information System and Innovative Technology Vol. 1 No. 2 (2022): December
Publisher : Geviva Edukasi Trans Teknologi

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (435.42 KB)

Abstract

The learning and teaching process is an important activity to achieve learning objectives. However, in practice it often happens that the process does not run as it should. One important component in the learning and teaching process is attendance. The discipline of student attendance shows that they have a good interest in their studies and needs to be recorded so that attendance data is stored and presented properly. Manual attendance recording is a problem of effectiveness and efficiency. This research proposes a system for monitoring student attendance using mobile applications. The results of the study show that it is easier and faster for students to take attendance and easier for teachers to recap student attendance and also become the basis for decision making when giving final grades.
Anticipating Cybersecurity on Artificial Intelligence Thandy Simanjuntak
International Journal of Information System and Innovative Technology Vol. 2 No. 1 (2023): June
Publisher : Geviva Edukasi Trans Teknologi

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

As artificial intelligence (AI) continues to revolutionize various sectors, the intersection of AI and cybersecurity has emerged as a critical frontier. This paper delves into the realm of "Anticipating Cybersecurity on Artificial Intelligence," exploring the challenges, opportunities, and strategies inherent in safeguarding AI systems against an evolving landscape of cyber threats. With AI playing an increasingly pivotal role in decision-making, automation, and data analysis, the security of AI systems becomes paramount to ensuring the integrity and trustworthiness of their outcomes. This paper investigates various dimensions of anticipating cybersecurity concerns in AI, including identifying potential vulnerabilities, developing proactive defense mechanisms, and fostering collaboration between AI and cybersecurity experts. Through an in-depth analysis of recent case studies and trends, we highlight the importance of pre-emptive measures to thwart adversarial attacks, data poisoning, and model manipulations. Moreover, we explore the role of explainable AI in enhancing cybersecurity transparency and the potential for leveraging AI techniques to enhance intrusion detection and threat mitigation. By delving into these interconnected aspects, this paper not only underscores the urgency of addressing cybersecurity within AI but also emphasizes the necessity of anticipating future threats to ensure the continued success and trustworthiness of AI technologies. In sum, this study contributes to the discourse surrounding AI cybersecurity, shedding light on strategies to anticipate and counteract threats, and fostering a holistic approach to secure the AI-driven future.
Anticipating Cybersecurity on Artificial Intelligence Thandy Simanjuntak
International Journal of Information System and Innovative Technology Vol. 2 No. 1 (2023): June
Publisher : Geviva Edukasi Trans Teknologi

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

As artificial intelligence (AI) continues to revolutionize various sectors, the intersection of AI and cybersecurity has emerged as a critical frontier. This paper delves into the realm of "Anticipating Cybersecurity on Artificial Intelligence," exploring the challenges, opportunities, and strategies inherent in safeguarding AI systems against an evolving landscape of cyber threats. With AI playing an increasingly pivotal role in decision-making, automation, and data analysis, the security of AI systems becomes paramount to ensuring the integrity and trustworthiness of their outcomes. This paper investigates various dimensions of anticipating cybersecurity concerns in AI, including identifying potential vulnerabilities, developing proactive defense mechanisms, and fostering collaboration between AI and cybersecurity experts. Through an in-depth analysis of recent case studies and trends, we highlight the importance of pre-emptive measures to thwart adversarial attacks, data poisoning, and model manipulations. Moreover, we explore the role of explainable AI in enhancing cybersecurity transparency and the potential for leveraging AI techniques to enhance intrusion detection and threat mitigation. By delving into these interconnected aspects, this paper not only underscores the urgency of addressing cybersecurity within AI but also emphasizes the necessity of anticipating future threats to ensure the continued success and trustworthiness of AI technologies. In sum, this study contributes to the discourse surrounding AI cybersecurity, shedding light on strategies to anticipate and counteract threats, and fostering a holistic approach to secure the AI-driven future.
User-Centric Security Education and Awareness for Web Users Thandy Simanjuntak
International Journal of Information System and Innovative Technology Vol. 2 No. 2 (2023): December
Publisher : Geviva Edukasi Trans Teknologi

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

In an era marked by ubiquitous digital interactions, the security of web users becomes paramount in safeguarding sensitive information and mitigating the risks associated with cyber threats. This research addresses the problem of the persistently high incidence of online security breaches, often attributed to inadequate user awareness and education. The study aims to investigate the effectiveness of user-centric security education and awareness programs in enhancing the online safety practices of individuals, ensuring they are equipped with the necessary knowledge and skills to protect their personal information and navigate the digital landscape securely. The research problem centers around the need to understand how various user demographics respond to different forms of security education, the retention of knowledge over time, and the potential influence of corporate culture on individuals' security practices. Source: This paper examines the role and value of information security awareness efforts in defending against social engineering attacks. It categorizes the different social engineering threats and tactics used in targeting employees and explores approaches to defend against such attacks. The research aims to determine the effectiveness of user-centric security education and awareness programs in mitigating social engineering attacks by categorizing different threats and tactics used to target employees. To address the persistent issue of online security breaches and the lack of user awareness and education, this research aims to investigate the effectiveness of user-centric security education and awareness programs in enhancing the online safety practices of individuals. The research problem focuses on understanding how different user demographics respond to various forms of security education, the retention of knowledge over time, and the potential impact of corporate culture on individuals' security practices.