Claim Missing Document
Check
Articles

Found 6 Documents
Search

Pengaruh Promosi Terhadap Keputusan Pembelian Konsumen pada PD Subur Makmur Semesta Furniture di Pondok Aren Tangerang Selatan Sukma Hadi; Ishlah Ramadhanti; Anang Tri Wahyudi; Saripudin Saripudin; Taswanda Taryo
Jurnal Ilmiah PERKUSI Vol 2, No 4 (2022): PERKUSI
Publisher : Universitas Pamulang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32493/j.perkusi.v2i4.25285

Abstract

Penelitian ini bertujuan untuk mengetahui pengaruh promosi terhadap keputusan pembelian pada PD Subur Makmur Semesta Furniture  di Pondok Aren Tangerang Selatan.Metode yang digunakan adalah explanatory research dengan sampel sebanyak 100 responden. Teknik analisis menggunakan analisis statistik dengan pengujian regresi, korelasi, determinasi dan uji hipotesis.Hasil penelitian ini variabel promosi diperoleh rata-rata skor sebesar 3,415 dengan kriteria baik. Variabel keputusan pembelian diperoleh rata-rata skor sebesar 3,840 dengan kriteria baik. Promosi berpengaruh signifikan terhadap keputusan pembelian  dengan persamaan regresi Y = 9,527 + 0,845X, dan nilai korelasi 0,774 atau kuat dengan determinasi 59,9%. Uji  hipotesis diperoleh signifikansi 0,000 < 0,05.
Peranan PT Pegadaian Area Tangerang Selatan Dalam Pembiayaan Produk Kreasi Untuk Penanganan Kredit Nasabah UMKM Serta Mengembangkan Usaha Nasabah Pelaku UMKM Kota Tangerang Selatan di Era Pandemi Covid-19 Fajar Yoga Pradana; Novan Nurviyaddin; Erni Nila Sari; Sulastri Sulastri; Taswanda Taryo
Jurnal Ilmiah PERKUSI Vol 2, No 2 (2022): PERKUSI
Publisher : Universitas Pamulang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32493/j.perkusi.v2i2.19605

Abstract

Jurnal ini mengulas tentang peranan PT Pegadaian Tangerang Selatan dalam pembiayaan produk kreasi untuk penanganan kredit nasabah UMKM serta mengembangkan usaha nasabah pelaku UMKM di era pandemi Covid 19. Penelitian ini bertujuan untuk mengetahui bagaimana peran dan fungsi PT Pegadaian sebagai lembaga perkreditan dalam upaya membantu dan mengembangkan usaha para nasabah. Jenis penelitian ini adalah penelitian kualitatif dengan mengambil lingkup penelitian pada peran pembiayaan produk kreasi dan dampak penyaluran kredit ditengah pandemi. Teknik pengambilan data yaitu teknik purposive dan triangulasi. PT Pegadaian sebagai salah satu BUMN memiliki peran dan fungsi antara lain berpartisipasi membantu program pemerintah dalam rangka meningkatkan kesejahteraan masyarakat kecil dan menengah khususnya pelaku UMKM melalui layanan produk pegadaian kreasi. Selain itu pegadaian Tangerang Selatan juga memberikan bantuan bantuan berupa penundaan kewajiban pembayaran selama 3 sampai 6 bulan. PT Pegadaian Tangerang Selatan juga aktif mengadakan pelatihan dan webinar untuk para nasabah dengan tujuan agar usaha mereka dapat terus maju dan berkembang).
Pengaruh Promosi dan Kualitas Produk Terhadap Keputusan Pembelian pada Marketplace Shopee Konsumen di Ciputat Sindy Saputri; Yansen Paseru; Risma Apriyani; Taryari Taryari; Taswanda Taryo
Jurnal Ilmiah PERKUSI Vol 2, No 3 (2022): PERKUSI
Publisher : Universitas Pamulang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32493/j.perkusi.v2i3.23902

Abstract

Penelitian ini bertujuan untuk mengetahui pengaruh promosi dan kualitas produk terhadap keputusan pembelian pada Marketplace Shopee konsumen di Ciputat.Metode yang digunakan adalah explanatory research dengan teknik analisis menggunakan analisis statistik dengan pengujian regresi, korelasi, determinasi dan uji hipotesis.Hasil penelitian ini promosi berpengaruh signifikan terhadap keputusan pembelian sebesar 40,8%, uji hipotesis diperoleh t hitung > t tabel atau (8,055 > 1,986). Kualitas produk berpengaruh signifikan terhadap keputusan pembelian sebesar 41,3%, uji  hipotesis diperoleh t hitung > t tabel atau (8,133 > 1,986). Promosi dan kualitas produk secara simultan berpengaruh signifikan terhadap keputusan pembelian dengan persamaan regresi Y = 11,439 + 0,354X1 + 0,370X2 dan kontribusi pengaruh sebesar 50,3%, uji hipotesis diperoleh F hitung > F tabel atau (47,083 > 2,700).
Pengembangan Keamanan Dan Jaringan Pada System Windows Mengunakan Metode Hardening (Studi Kasus : PT. Shiva Shakti Steel) Moh. Triyana Abbas; Taswanda Taryo; Murni Handayani
OKTAL : Jurnal Ilmu Komputer dan Sains Vol 1 No 11 (2022): OKTAL : Jurnal Ilmu Komputer Dan Sains
Publisher : CV. Multi Kreasi Media

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

In the current digital era, security and network are very important in a system to support all activities in the world of work, especially for offices. In this case the windows system at PT. Shiva Shakti Steel is currently still slow, supporting application performance feels slow, and network security is still vulnerable. PT. Shiva Shakti Steel is a company that uses technology and information, using the internet network on a windows system, which is expected to help management to process and present data and information effectively, quickly, and accurately. The purpose of his research is expected to accelerate the performance of the windows system, supporting applications and network security. In this study, the data analysis technique that the researcher uses is the hardening system method. Hardening system refers to providing various means of protection in a computer system. Protection is provided in multiple layers, and is often referred to as deep defense. Protecting in layers means protecting at host level, application level, operating system level. According to John D. Howard in his book "An Analysis of security incidents on the internet" states that: "Computer security is a preventive measure from attacks by computer users or irresponsible network accessors". Meanwhile, according to Gollmann in 1999 in his book "Computer Security" states that: "Computer security is related to selfprevention and detection of unrecognized intruders in computer systems". From the results of the analysis of vulnerability testing carried out, namely testing system and network security on windows systems using the hardening method at PT. Shiva Shakti Steel, it can be concluded that the hardening system method was chosen because this is the initial foundation for the system, so that it can solve some of the problems that exist in the system.
Analisis dan Implementasi Honeypot Honeyd Sebagai Low Interaction Terhadap Serangan Distributed Denial Of Service (DDOS) dan Malware Ubaidillah Ubaidillah; Taswanda Taryo; Achmad Hindasyah
Jurnal Teknologi Informasi dan Multimedia Vol. 5 No. 3 (2023): November
Publisher : Sekawan Institut

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35746/jtim.v5i3.405

Abstract

Every computer device connected to a wide computer network is vulnerable to security risks. These threats encompass vulnerabilities to data, information, resources, and services within the system. These threats include intrusion, eavesdropping, theft of vital data, as well as damage to the network system. These actions are carried out by parties who are not accountable, commonly referred to as intruders or attackers. One method to prevent or anticipate these malicious actions is by utilizing the honeyd Honeypot technique. The honeyd Honeypot adopts a low-interaction approach, which involves indirect interaction with attackers. This Honeypot serves as a decoy or simulated server intentionally presented as a target for attacks. The purpose of this Honeypot is to detect and analyze ongoing attacks. In this research, the honeyd Honeypot is implemented as a simulated server resembling an authentic server. This server provides various services and opens several ports deliberately prepared as attack targets, such as Port 139, and Port 21.The results of this research unveil the existence of attacks. Signs of these attacks include a surge in network traffic, reaching up to 100 Megabits above the normal level. Another indicator is a sudden spike in CPU usage, reaching 100%. The activities of these attacks can be analyzed through the installed Wireshark application on the Honeypot server. Information obtained from this analysis encompasses details about the attacker's activities, enabling more effective preventive, anticipatory, and corrective measures. These steps encompass securing the server, network system, and existing services.
Advanced Persistent Threats Analysis and Intrusion Detection Systems Evaluation Dedy Wibowo; Taswanda Taryo; Ferhat Aziz
International Journal Software Engineering and Computer Science (IJSECS) Vol. 5 No. 3 (2025): DECEMBER 2025
Publisher : Lembaga Komunitas Informasi Teknologi Aceh (KITA)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/ijsecs.v5i3.5770

Abstract

- Advanced Persistent Threats are significant cybersecurity threats that employ covert and strategically planned operations to achieve long-term unauthorized access and data exfiltration. PT XYZ, a logistics company with considerable operational and customer data, is more susceptible to APTs, which is why the company decided to implement Wazuh as an open-source SIEM platform for improved intrusion detection capabilities. We assessed how effectively this IDS-SIEM implementation could detect and respond to APT scenarios by analyzing multi-source logs from Wazuh, Sysmon, and endpoint telemetry across PT XYZ’s PC infrastructure between June 3-30, 2025—capturing 35,333 records in total. Simulated APT attacks were carried out using Atomic Red Team with detection mapping based on MITRE ATT&CK tactics. Most of the early stages of attack phases were identified by Wazuh particularly Initial Access and Execution phases where the system logged 1,060 true positives; 8,537 true negatives; 563 false positives; and 440 false negatives at an accuracy rate of 91%. Normal traffic detection results were good with a precision of 0.95, recall of 0.94 F1-score at the same value whereas attack detection had a precision value of 0.65 with a recall of 0.71 giving it an F1 score of 0.68 making macro-averaged metrics fall at values such as 0.80 for precision and 0.82 for recall which further brought the F1 score up to 0.81 while weighted averages peaked at 0.91.Our results indicate that an open-source SIEM like Wazuh can be used effectively for the detection of APTs in logistics operations when configured appropriately using MITRE ATT&CK-based threat simulations – hence having real-world applicability towards improving cybersecurity defenses within this sector.