Claim Missing Document
Check
Articles

Pengaruh Customer Engagement Melalui Media Sosial terhadap Kepercayaan Merek (Studi Kasus : Instagram Shopee) Odytri Caesar Mahayani; Ismiarta Aknuranda; Ari Kusyanti
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 4 (2019): April 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (735.86 KB)

Abstract

Trust in brands can be grown from the reciprocal relationship in an engagement interaction. Customer engagement through social media is an attempt by a company to keep in touch with its customers through social media facilities. According to a survey Instagram is a social media with the highest involvement value. Shopee is one of the most popular marketplaces in Indonesia. Compared to other marketplaces, from March to May 2018 the number of Shopee followers on Instagram is very high, and in terms of Shopee engagement also has the highest level of engagement. Therefore this study aims to see whether customer engagement by Shopee through Instagram social media has been able to create trust in the Shopee brand. There are 4 variables used in this study in the effort to establish customer engagement. Data collection is done online by distributing questionnaires to followers of Shopee Indonesia Instagram accounts who have interacted with giving, commenting, and reposting Shopee Indonesia Instagram accounts at least 3 times to 100 respondents. This study aims to find a relationship from the existence of customer engagement to brand trust partially and simultaneously using multiple linear regression analysis. Based on the results of the analysis that has been done partially, of the four variables 3 of them have a significant influence on the trust of the Shopee brand. While the results of the analysis are simultaneously known all variables together influence the brand trust.
Implementasi Privacy Module Menggunakan Algoritme Enkripsi Trivium Pada SNMPL8 Dimas Dwi Radhityo; Ari Kusyanti; Widhi Yahya
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 4 (2019): April 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (750.517 KB)

Abstract

Device management is needed when more internet of things (IoT) devices are connected in a network. One of the device management protocols is SNMP. But SNMP generates large data. Therefore there is a monitoring system that developed for effectivity in generating data called SNMPL8. On the other hand, SNMPL8 did not focus on security functions. One of the security functions for monitoring systems is the SNMPv3's Privacy Module. However, the Privacy Module still using CBC-DES algorithm that is not recommended by NIST, so a replacement algorithm is needed. One of the candidates is Trivium algorithm that designed for constrained devices. Therefore, this study uses the Trivium algorithm adopted on the SNMPv3's Privacy Module for network monitoring systems. Based on the getResponse testing, the Privacy Module requires 17.28 ms to generate keystream and 2.76 ms for the encryption process. The difference in memory at implementation is 176 Bytes, while the difference in the total data package is 769 Bytes.
Implementasi Algoritme BLAKE2b untuk Pengecekan Integritas File Pramasita Gustiarum; Ari Kusyanti; Mahendra Data
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 4 (2019): April 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (990.891 KB)

Abstract

File is an object on a computer that stores data and information that can be read by a program on a computer. On computers, files are stored in storage, such as hard drives, DVDs, flash disks and so on. Other than being stored, files can also be moved, shared, changed and duplicated. From these processes, protecting file integrity is very important because these processes can affect data or information stored in it. Possibility of threats in that processes might be corrupted data, data unwantedly modify or file carries hidden data for criminal purposes. Therefore, there is need for a mechanism to check integrity of the data using cryptographic techniques, called hashing. Hashing is a technique to generate unique values from a string and this unique what we called hash value or digest. In this study, BLAKE2b hash function is used as data integrity validation of a file. The experiment in this study includes, timing BLAKE2b to validate .txt file format, which given result of average 18.60s for 500 KB file in size. Next results of BLAKE2b process time are compared with MD5 and the results obtained in this experiment are average of 15.85s and 18.30s for each algorithm, it can be concluded that BLAKE2b is working slightly faster than MD5. Lastly, avalanche test of BLAKE2b gives an average probability of 0.589.
Analisis Kinerja Algoritme Speck Pada Keamanan File Teks Karmila Dewi Sulistyowati; Ari Kusyanti; Mahendra Data
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 4 (2019): April 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1175.564 KB)

Abstract

SPECK published by NSA in 2013 as a new block cipher algorithm. This cipher has 10 variations based on block and key sizes, which it has its own characteristics for its encryption and decryption process. This research aimed to analyze the performance of SPECK to secure text file by performing encryption and decryption processes. There were two experiments conducted, first is to analyzed performance of 3 variations of SPECK, such as SPECK128/128, SPECK128/192 and SPECK128/256. These variations was chosen because of previous research that utilized the AES algorithm to secure data where AES has 3 variations based on key lengths, such as AES-128, AES-192 and AES-256. The results obtained from this experiment were the longer the key used, the faster the encryption and decryption process on the system. Second experiment is to analyzed variations of file sizes, such as 50 KB, 100 KB, 150 KB, 200 KB, 250 KB and 300 KB. The results obtained were the larger the file size used will took longer time to process. Afterwards, the results were put in Kruskal-Wallis and Post Hoc tests to be analyzed and concluded with each change of 50 KB in file size will produce a significant time difference.
Implementasi Algoritme SPECK Block Cipher dan Shamir's Secret Sharing Pada File Teks Novita Krisma Diarti; Ari Kusyanti; Mahendra Data
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 4 (2019): April 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1141.02 KB)

Abstract

Formal letter is one example of processing important data that contains text files, therefore security is needed to protect the file. Security in files aimed so that only certain people can access the contents of the file. Encryption is one of technique to secure file in cryptography. Cryptography has many algorithms that can be used for encryption process. In this study, two algorithms in cryptography use to secure file, called SPECK block cipher algorithm and Shamir's secret sharing. SPECK block cipher algorithm is used for data encryption and decryption, while Shamir's secret sharing algorithm is used to share confidential data on files. Both algorithms are used to protect text files in order to maintain data security from irresponsible people. Testing involves three file sizes, such as size 4 KB with contents 3, 8, and 13 lines. Results show average of 9.433 s, 91.938 s, and 619.036 s respectively for mentioned file contents. Average results of CPU usage are 7.058%, 25.855% and 31.095% respectively for mentioned file contents. Lastly, average results of the amount of RAM usage are 377.277 MB, 414.283 MB, 440.231 MB respectively for each file contents.
Implementasi Algoritme AES Pada Pengiriman Data Sensor DHT11 Menggunakan Protokol Komunikasi HTTP Aulia Rizqy Pratama; Mochammad Hannats Hanafi Ichsan; Ari Kusyanti
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 4 (2019): April 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (878.625 KB)

Abstract

HTTP is a network protocol on the TCP / IP application layer that is used for communication or data exchange between the server and the client. There is a weakness in the HTTP protocol where the data or information transfer does not have a security or encryption process which can endanger the information or data sent on a network. There is already a development to overcome security issues on the HTTP protocol, namely by using the HTTPS protocol. However, the HTTPS protocol consumes a lot of memory and drains a lot of resources in processing so it is not recommended to be implemented in embedded systems. This study proposes to use one of the existing cryptographic algorithms implemented on the HTTPS protocol, which is the AES algorithm which plays a role in data encryption in the HTTPS protocol which fulfills the confidentiality. In this study using Arduino Uno as a microcontroller used to process DHT11 and NI Labview sensor data to display the output of the system. HTTP server and encryption process are implemented in Arduino IDE and HTTP client and decryption process at NI Labview. From the test results obtained the average value of encryption and decryption processing time is 13.048 milliseconds with the average delivery delay on the HTTP protocol by 0.091073 seconds. From the test results concluded that the AES algorithm can be implemented to secure the data transfer from the DHT11 sensor using the HTTP protocol.
Implementasi Algoritme Grain 128 Pada Proses Pengiriman Data Menggunakan Raspberry Pi 3 Moh. Afif Ma'ruf; Ari Kusyanti; Adhitya Bhawiyuga
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 4 (2019): April 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1211.836 KB)

Abstract

Internet of Things (IoT) is one of positive effects in development of new technology in modern communication networks. Data leakage is negative impact of security and confidentiality issues. This issues must be considered, so that unauthorized parties cannot access or modify contents of the data. From these problems a cryptographic technique is needed to secure data. One algorithm that can be used is Grain 128. Grain 128 is a stream cipher algorithm that has a high speed performance with very low memory and power. The client and server communication media used TCP/IP protocol. Raspberry Pi 3 used as a client or gateway that sends files, then encrypts files when sent and laptop as server that will decrypt when files are received. There are 5 experiments to ensure system can run properly. In this study, experiments carried out include functional testing, test vector validation, encryption and decryption, security and performance testing. In functional testing, result showed that all functionality is valid. In keystream test vector validation, keystream first generated and compared with test vector in official paper released, from this experiment results show keystream generated is valid. In encryption and decryption test, system can run and received file, contents of the file cannot be read while sending. In security testing the data sent cannot be sniffed using Wireshark. In performance testing, 5 different file formats with the extension DOCX, PPT, XLSX, TXT, and PDF was tested. The experiment carried out 30 times and average delivery result was 47.1 seconds. Files with PDF format have the fastest execution time average of 43.4 seconds.
Implementasi Algoritme BLAKE2S pada Protokol MQTT Sandy Ramadhan Wijaya; Ari Kusyanti; Widhi Yahya
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 4 (2019): April 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (781.239 KB)

Abstract

Message Queue Telemetry Transport (MQTT) is a protocol with a publish-subscribe architecture for Internet of Things (IoT) that designed to be a lightweight protocol when applied. MQTT also a protocol with low bandwidth usage because of the small size transmitted data. To secure the integrity of transmitted data from alteration, substitution, and insertion, an integrity checking mechanism of the received data is required. Because the received data could affect the results of data processing like storing data to the database and decision making by the control unit. Although MQTT can be applied using Secure Sockets Layer (SSL), but SSL requires a lot of resources. As an alternative to the SSL's implementation, Message Authentication Code (MAC) is used in this study for an integrity checking mechanism. There is a MAC algorithm that has been widely used, such as the HMAC-MD5 and HMAC-SHA1 algorithms. However, the MD5 and SHA1 algorithms are insecure because they are vulnerable to second preimage and collision attacks. So as an alternative BLAKE2S algorithm is used because it is resistant to second preimage and collision attack attacks. Based on the test result of the implemented BLAKE2S algorithm to systems with the MQTT protocol, the system knows if there is an alteration, substitution, and insertion of the received data with an average of memory usage overhead only 0.0041 MB in the publisher side and 0.0044 MB in the subscriber side.
Implementasi Algoritme Poly1305-AES pada Protokol MQTT Tista Pamungkas Ragil Alit; Ari Kusyanti; Widhi Yahya
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 4 (2019): April 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (864.135 KB)

Abstract

Message Queuing Transport Telemetry (MQTT) is one of the Internet of Things (IoT) protocols specifically designed for communication between machines that have characteristics that can be used at low power, uses small bandwidth, connectivity in packet delivery and protocols using this technology to publish- subscribe. The MQTT protocol only provides authentication security for security which defaults do not guarantee the security of data in transmission so that data privacy and data integrity are problems in the implementation of the protocol. Therefore, the application of the Message Authentication Code (MAC) method uses the Poly1305-AES algorithm based on block ciphers. Based on testing, the Poly1305-AES algorithm has an increase in memory usage of 0.013MB to publishers and 0.028MB to customers and the Poly1305-AES algorithm can support changes, insertions and substitution data. This study presents the results of the Poly1305-AES algorithm which has a pretty good performance based on the value of increasing memory usage and resistance to attacks.
Implementasi Algoritme SHA-256 Menggunakan Protokol MQTT pada Budidaya Ikan Hias Yogi Anugrah; Mochammad Hannats Hanafi Ichsan; Ari Kusyanti
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 4 (2019): April 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (525.565 KB)

Abstract

Message Queue Telemetry Transport (MQTT) is one of the communication protocols used in the Internet of Things (IoT) device. The MQTT protocol is often used because this protocol requires low resources and the small size of the data sent. Although Secure Socket Layer (SSL) can be applied to secure the MQTT protocol, it requires large processing resources. Therefore another solution is needed that does not burden the system such as implementing the HMAC algorithm. The commonly used HMAC algorithm comes from hash algorithms such as SHA-1. But the SHA-1 algorithm has been declared unsafe and vulnerable to brute force and collision attacks. Therefore the SHA-256 algorithm is used as an update of SHA-1 which is resistant to brute force and collision attacks. Based on the system security testing that has been applied using HMAC-SHA256, the system can find out if there is a change, substitution, or data insertion. While the performance of HMAC-SHA256 was obtained from a performance test consisting of testing the making of HMAC-SHA256 and testing memory usage. The average time needed to make HMAC-SHA256 is 604,958 ms in the publisher and 606,703 ms in the subscriber. Increased memory usage without and when using HMAC-SHA256 for 0,0078 MB in the publisher and 0,0082 MB on the subscriber.
Co-Authors Adam Syahputra Adhitya Bhawiyuga Aditya Bhawiyuga Aditya Rachmadi Admaja Dwi Herlambang Agung Pambudi Agung Setia Budi Ahmad Faiz Ajeng Nurrohmah Alan Maulana Hamid Aldila Amalia Saufika Alex Sandro Irawan Ali Arifin Ami Fajar Hikmah Andhika Brahmana Putra Andi Reza` Perdanakusuma Andy Jaya Hartanto Angger Ramadhan Aniela Cahya Ningroem Apriyanto Tobing Arimbi Dewayanti Arsana Yudistira Arya Seta Bagaswara Aryo Pinandito Atika Baladina Audi Fauzan Septano Aulia Rizqy Pratama Bagus Priyambada Bagus Satria Wiguna Bhaskara Vito Tarigan Candra Emelia Fransisca Cindy Farah Safira Dany P Kartikasari Dany Primanita Kartikasari David Christanto Dian Astika Rini Dimas Dwi Radhityo Dita Nurina Malinda Dwi Qunita Putri Ambeq Paramarta Enrico Dimas Darmawan Evi Oktavia Kurniawati Fairuz Risky Yusniasari Fani Madina Fanny Aulia Rifki Fariz Andri Bachtiar Fariz Andri Bakhtiar Fida Royani Firlhi Kurniawan Firman Eko Purnomo Fitra Abdurrachman Bachtiar Fitra Firdaus Fredianto Fredianto Gibran Akbaromi Luhkito Hadyan El Aufar Halimah Septya Mikayla Hanaria Rotua Tampubolon Harin Puspa Ayu Catherina Helmy Rafi Nawawi Heru Nurwarsito Hilman Adi Kartika Himawat Aryadita I Putu Agrahita Wiguna Indriyana Liliasari Rahma Yusvi Irfan Arif Afandi Iskar Maulana Ismiarta Aknuranda Ivan Faturahman Iwi Suharti Izzati Dalilah Jihad Kamilullah Julio Dimitri Fredrik Kalbuadi Joyoputro Karmila Dewi Sulistyowati Kasyful Amron Kasyful Amron Khusnatul Mukaromah Lina Andreina Luqman Hakim Yumnun Lutfi Fanani Luthfi Maulana M. Ali Fauzi Mabda Amnesti Hananto Maharani Essraningtiyas Mahendra Data Mega Noviany Mega Shero Gayatrie Mochamad Chandra Saputra Mochammad Hannats Hanafi Ichsan Mochammad Valdi Fuadi Moh. Afif Ma'ruf Moh. Ahsani Taqwim Mohammad Fachry Muhammad Adi Wijaya Muhammad Alvian Syahputra Muhammad Faizal Ismail Muhammad Iqbal Rofi'i Muhammad Isfa Hany Muhammad Khatib Barokah Muhammad Nurul Fanani Muhammad Thareq Parsaulian Beyri Muhammad Wahyu Rizqi Pratama Muhammad Zainul Mubarok Nadya Puspitasari Ngr. Putu Raka Novandra Asta Nico F. Sitorus Niken Hendrakusma Wardani Ninscha Adisti Oktivianet Novia Dwi Setyaningrum Novita Krisma Diarti Nungki Dwi Prastanti Nur Azizah Mutmainnah Nuretha Hevy Purwaningtyas Nurjannah Nurjannah Nurma Abadi Firjatulloh Nurovi Andiyani Nurul Syamsi Ekowati Odytri Caesar Mahayani Okta Dwi Ariska Olivia Very Noorlinda Panji Mansyur Ansyah Pramasita Gustiarum Pramukantoro, Eko Sakti Primantara Hari Trisnawan Puspita Ainunnazahah Rafi Fajar Hidayat Raka Kurnia Novriantama Rakhmadhany Primananda Randyka Rusniantoro Ratna Khansa Anantika Retno Indah Rokhmawati Retno Nizma'urrahmi Reza Andria Siregar Reza Andria Siregar Richie Mahfud Ahmed Sambora Rifa Izza Nurlita Rika Mardatilla Rivai Fansuri Nasution Rizal Dismantoro Rizka Amalia Kurniawati Rizki Nanda Mustaqim Rohbi Visdya Harris Chandra Sabriansyah Rizqika Akbar Sandy Ramadhan Wijaya Sara Yosephina Sartika Amalia Sastra Ginata Sepdiyah Ayu Ningrum Septian Visiano Handoko Suhadak Akbar Supraptoa Supraptoa Syahifudin Shahid Syahmi Rifqi Hudha Perwira Tista Pamungkas Ragil Alit Widhi Yahya Wijaya Kurniawan Winda Ayu Safitri Yazid Yazid Yoga Rizwan Priyatna Yogi Anugrah Yohanes Heryka Febriarso Yulius Adi Pratama Yuniar Siska Fatmala Yusi Tyroni Mursityo Yustiyana April Lia Sari Zuroul Mufarokah