Claim Missing Document
Check
Articles

Found 20 Documents
Search

Utilization of Kahoot Learning Games as Interactive Learning Media Imam Riadi; Sunardi Sunardi; M. Ihya A. Elfatih; Ariful Aziz; Amirul Mumin
ABDIMAS: Jurnal Pengabdian Masyarakat Vol. 5 No. 1 (2022): ABDIMAS UMTAS: Jurnal Pengabdian Kepada Masyarakat
Publisher : LPPM Universitas Muhammadiyah Tasikmalaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1910.349 KB) | DOI: 10.35568/abdimas.v5i1.1778

Abstract

The world of education certainly cannot be separated from teaching and learning activities. Educators are required to be able to make the learning atmosphere feel fun and exciting. Educators are required to be able to take advantage of existing learning media, whether it's modules, worksheets, or electronic books to be optimized as learning support tools both in the inside and outside the classroom. Effective, conducive, and creative learning in this modern era has changed the style and process of learning. Outbreak of the covid-19 requires teaching and learning activities to be carried out remotely relying on internet technology. Kahoot is a web-based learning media which in its operation involves educators and students to interact and conduct interactive learning in the form of games, quizzes, surveys, and polls. The use of Kahoot as a learning media is considered appropriate because both students and educators have been confirmed as active internet users. The use of the internet for learning can also brighten the view that the digital world is increasingly sophisticated, educate students to surf the internet wisely, and learning activities teaching is not always monotonous and boring.
Analisis Keamanan Sistem Informasi Akademik Menggunakan Open Web Application Security Project Framework Muh. Amirul Mu'min; Abdul Fadlil; Imam Riadi
JURNAL MEDIA INFORMATIKA BUDIDARMA Vol 6, No 3 (2022): Juli 2022
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/mib.v6i3.4099

Abstract

Information system security is one of the important things in the development of technology to protect comprehensive and structured data or information. The Academic Information System (SIA) has a service to receive requests in the form of HTTP or HTTPS protocol website pages from clients called browsers. Intruders can hack websites without the owner's knowledge. This research was conducted to find the vulnerability of SIA STIKES Guna Bangsa Yogyakarta. The framework used is the Open Web Application Security Project (OWASP) which is usually used to evaluate systems or applications. The tools used are WhoIs, SSL Scan, Nmap, and OWASP Zap. The results obtained were finding 12 vulnerabilities with four vulnerabilities at the medium level, namely Absence of Anti-CSRF Tokens, Cross-Domain Misconfiguration, Missing Anti-clickjacking Header, and Vulnerable JS Library, six at the low level namely Cookie Without Secure Flag, Cookie without SameSite Attribute, Cross-Domain JavaScript Source File Inclusion, Server Leaks Information via "X-Powered-By" HTTP Response Header Field(s), Timestamp Disclosure – Unix,  and X-Content-Type-Options Header Missing, and two at the informational level namely Content-Type Header Missing and Information Disclosure - Suspicious Comments. 
Literasi Digital: Meningkatkan Kesadaran Keamanan Internet di Kalangan Siswa SMP Fathir; Alamin, Zumhur; Amirul Mu'min, Muhammad; Ilmih, Muhammad
SEWAGATI: Jurnal Pengabdian kepada Masyarakat Vol 3 No 3 (2024): Sewagati: Jurnal Pengabdian kepada Masyarakat
Publisher : Sarau Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61461/sjpm.v3i3.84

Abstract

The growing functionality of the internet makes it accessible to all. Recently, several studies have shown that most internet users are teenagers. The development of social media worldwide indirectly has a big influence on internet usage for teenagers. The focus of this service is to increase internet safety awareness among junior high school students, in terms of several aspects and activity patterns of using social media in adolescents. sufficient knowledge of things that should be done and not related to safety in using social media The research was conducted to students of SMPN 9 SATAP which is in Wora village, Wera District. The results showed that SMPN 9 SATAP students in general were able to determine the use of the internet properly, both for learning facilities and entertainment functions such as social media, where student interaction time in direct interaction in daily life and interaction time on social media was balanced and in accordance with their portions. It can also be seen that the students of SMPN 9 SATAP have not been able to know about the basics of computer recognition, such as the functions of the keyboard keys.
PELATIHAN MARKETPLACE SHOPEE UNTUK PENINGKATAN KETERAMPILAN PENJUALAN ONLINE Mu'min, Muhammad Amirul; Safitri, Yana; Alamin, Zumhur; Sa’adati, Yuan; Fathir, Fathir
Taroa: Jurnal Pengabdian Masyarakat Vol 4 No 1 (2025): Januari
Publisher : LPPM IAI Muhammadiyah Bima

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52266/taroa.v4i1.3849

Abstract

Pelatihan pemberdayaan masyarakat merupakan salah satu langkah strategis untuk meningkatkan keterampilan dan pengetahuan masyarakat tentang marketplace online, khususnya bagi pelaku usaha. Berdasarkan latar belakang tersebut, program ini bertujuan memberikan pemahaman tentang konsep dan praktik penggunaan marketplace sebagai upaya meningkatkan peluang ekonomi di era digital. Metode pelatihan meliputi penyampaian materi, diskusi interaktif, dan pendampingan langsung antara pemateri dan peserta. Hasilnya menunjukkan peningkatan signifikan pada pemahaman peserta, di mana sebelumnya dari 34 peserta, hanya 1 orang yang memiliki akun marketplace online, 2 orang yang memahami konsepnya, dan 31 peserta masih awam. Setelah pelatihan, 12 peserta memahami marketplace online, sementara 22 peserta membutuhkan pendampingan lebih lanjut yang dilakukan melalui diskusi interaktif. Rekomendasi ke depan adalah mengembangkan program pelatihan yang lebih berfokus pada peningkatan keterampilan kerja dan kewirausahaan untuk pelaku usaha dalam memastikan keberlanjutan pemberdayaan masyarakat secara lebih terarah dan berkelanjutan.
Analisis dan Pengujian Kerentanan Website Menggunakan OWASP ZAP Pramuja Inngam Fanani, Galih; Muhammad Amirul Mu’min; Tristanti, Novi
Jurnal Riset Sistem dan Teknologi Informasi Vol. 3 No. 1 (2025): Jurnal Riset Sistem dan Teknologi Informasi (RESTIA)
Publisher : Universitas Aisyiyah Surakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30787/restia.v3i1.1886

Abstract

Penggunaan internet sedang meningkat, dengan situs web seperti mesin pencari, e-commerce, media sosial, dan portal berita yang sering diakses. Namun, situs web ini sering memiliki celah keamanan yang dapat dieksploitasi untuk ancaman siber. Oleh karena itu penelitian ini bertujuan untuk meningkatkan ketahanan web terhadap serangan siber dan memastikan pengalaman pengguna yang lebih aman, lebih andal dan data pengguna terlindungi. OWASP ZAP adalah alat keamanan yang banyak digunakan yang membantu organisasi mengidentifikasi dan mengatasi kerentanan dalam aplikasi web. Alat ini menawarkan fitur seperti pemindaian otomatis, kemampuan pengujian manual, dan fungsionalitas pelaporan yang komprehensif. Analisis kerentanan berbasis OWASP ZAP membantu mengidentifikasi tingkat keamanan aplikasi web melalui metode pemindaian pasif dan aktif, mendeteksi celah keamanan seperti injeksi SQL, skrip lintas situs, dan konfigurasi yang tidak aman. Temuan kerentanan seperti A01, A03, A04, A05, A06, A08, dan A09 yang mencakup ancaman seperti Cross-Site Scripting (XSS), Clickjacking, dan Man-in-the-Middle menyoroti pentingnya penerapan langkah-langkah mitigasi untuk melindungi keamanan situs web. Penerapan solusi seperti konfigurasi header keamanan (CSP, HSTS, dan X-Frame Options) serta perlindungan terhadap data sensitif sangat penting untuk mencegah eksploitasi. Sehingga dalam pencegahannya diperlukan penerapan protokol enkripsi, pembaruan perangkat lunak secara berkala, pelaksanaan penilaian kerentanan, dan pelatihan karyawan tentang praktik terbaik keamanan siber  
Mobile Forensic Analysis on IMO Messenger Application Using ACPO and NIJ Frameworks Safitri, Yana; Firmansyah, Firmansyah; Mu’min, Muhammad Amirul
Insect (Informatics and Security): Jurnal Teknik Informatika Vol. 11 No. 1 (2025): Maret 2025
Publisher : Universitas Muhammadiyah Sorong

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33506/insect.v10i2.4052

Abstract

The need for efficient digital forensic tools has become increasingly urgent with the rapid development of digital communication platforms. This study aims to compare forensic frameworks on the Android application IMO Messenger, focusing on the Association of Chiefs of Police (ACPO) and the National Institute of Justice (NIJ) frameworks. The research utilizes the forensic tools MOBILEdit Forensic Express and Autopsy. The primary objective of the study is to gather evidence related to a body-shaming case. The findings show that MOBILEdit Forensic Express Pro achieved a 100% extraction rate, while Autopsy managed only 3.33%. By adhering to the guidelines established by ACPO and NIJ, the data extraction process was conducted following legitimate and accountable procedures. The use of certified tools and appropriate methods ensured that the extracted data remained accurate, valid, and reliable. These findings contribute to advancing knowledge in mobile forensics for addressing cyberbullying, providing valuable insights for investigators.
Perspektif Hukum dan Teknologi Dalam Menjaga Rahasia Digital: Memahami Prinsip Dasar Keamanan Mu'min, Muhammad Amirul; Sahrul Ramadhan; Munir Husen; Hadijah; Yana Safirti; Khairunnisa
SEWAGATI: Jurnal Pengabdian kepada Masyarakat Vol 4 No 1 (2025): SEWAGATI: Jurnal Pengabdian kepada Masyarakat
Publisher : Sarau Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61461/sjpm.v4i1.116

Abstract

Perlindungan data pribadi menjadi isu penting di era digital yang semakin rentan terhadap penyalahgunaan informasi. Minimnya literasi masyarakat terkait keamanan data pribadi menimbulkan risiko kebocoran informasi yang dapat berdampak negatif secara sosial maupun hukum. PKM ini bertujuan untuk meningkatkan kesadaran dan pemahaman masyarakat terhadap pentingnya menjaga keamanan data pribadi serta mengenalkan aspek regulatif yang melindungi informasi individu. Metode yang digunakan berupa kegiatan PKM dalam bentuk penyuluhan interaktif yang disampaikan secara langsung kepada peserta dengan pendekatan edukatif dan praktis. Hasil kegiatan menunjukkan peningkatan pemahaman peserta mengenai konsep dasar data pribadi, risiko penyalahgunaan informasi, serta urgensi penerapan perilaku yang aman dalam membagikan data di platform digital. Selain itu, peserta juga memahami keberadaan dan fungsi regulasi hukum seperti Undang-Undang Perlindungan Data Pribadi dalam memberikan perlindungan secara legal. PKM ini berkontribusi dalam memperkuat literasi keamanan digital masyarakat serta membangun fondasi edukatif untuk mitigasi risiko kebocoran data pribadi di masa depan. Nilai praktis dari kegiatan ini terletak pada penerapan langsung pengetahuan dalam kehidupan digital sehari-hari yang semakin kompleks.
PEMBERDAYAAN DESA MELALUI PENGENALAN DAN WORKSHOP SISTEM INFORMASI DESA BERBASIS OPENSID Alamin, Zumhur; Missouri, Randitha; Mutmainah, Siti; Fathir, Fathir; Sutriawan, Sutriawan; Amirul Mu'min, Muhammad
Taroa: Jurnal Pengabdian Masyarakat Vol 4 No 2 (2025): Juli
Publisher : LPPM IAI Muhammadiyah Bima

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52266/taroa.v4i2.4080

Abstract

Teknologi informasi memberikan dampak signifikan termasuk dalam penyelenggaraan pelayanan publik tingkat desa. Kegiatan pengabdian kepada masyarakat ini mendalami pengaruh transformasi desa digital melalui pengenalan dan implementasi Sistem Informasi Desa (SID) di desa Kalajena Kecamatan Wera Kabupaten Bima. Tujuan kegiatan ini adalah meningkatkan literasi digital komponen desa, mengidentifikasi potensi perubahan dalam efisiensi administratif desa, transparansi pemerintahan desa, dan partisipasi aktif masyarakat dalam pengambilan keputusan melalui adopsi teknologi informasi. Dalam pelaksanaan kegiatan, digunakan metode pendekatan partisipatif yang melibatkan interaksi secara intensif bersama perangkat desa dan masyarakat. Tahapan di mulai dengan sesi pengenalan konsep SID sebagai landasan teoritis, dilanjutkan dengan proses implementasi openSID secara offline atau pada jaringan komputer lokal dan uji coba implementasi secara online. Tahapan implementasi online berkaitan dengan penyewaan hosting dan melakukan pendaftaran domain. Selanjutnya, pelatihan praktis pengoperasian SID yang bertindak sebagai admin untuk perangkat desa, kemudian pengoperasian SID sebagai pengunjung kepada masyarakat desa. Hasil dari kegiatan ini menggambarkan peningkatan pemahaman serta kesadaran perangkat desa dan masyarakat akan potensi transformasi melalui penggunaan SID. Penerapan SID mampu menghasilkan efisiensi dalam proses administratif desa, meningkatkan transparansi dalam penyampaian informasi pemerintahan desa, serta mendorong partisipasi aktif masyarakat dalam berbagai proses pengambilan keputusan dalam penerapan kebijakan desa.
Security Analysis of XYZ Academic Information System Using Information System Security Assessment Framework (ISSAF) Muhammad Amirul Mu'min; Yana Safitri; Sabarudin Saputra
Jurnal Pengembangan Sains dan Teknologi Vol. 1 No. 2 (2025): Juli 2025
Publisher : Yayasan Ran Edu Center

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.63866/jpst.v1i2.76

Abstract

Academic information system security is a crucial aspect in the development of technology and information today, especially in maintaining structured and comprehensive data from various threats. Academic Information System (AIS) XYZ which provides services based on HTTP or HTTPS protocols is vulnerable to hacker attacks through security holes that may not be realized by the website owner. This study aims to identify and analyze security vulnerabilities in the AIS and provide recommendations for improvements to improve the level of system security. Using the ISSAF method to evaluate system security. The tools used in the analysis include Whois, SSL Scan, Nmap, OWASP Zap, and LOIC to detect and test vulnerabilities on the website. From this study, 12 vulnerabilities were found, consisting of four medium level vulnerabilities, six in moderate vulnerabilities, and two information level vulnerabilities. In improving system security, it is recommended to make improvements to the vulnerabilities found, especially at high and medium levels, and to implement regular security monitoring to prevent future attacks.
Trends and Impact of the Viola-Jones Algorithm: A Bibliometric Analysis of Face Detection Research (2001-2024) Wijaya, Setiawan Ardi; Famuji, Tri Stiyo; Mu'min, Muhammad Amirul; Safitri, Yana; Tristanti, Novi; Dahmani, Abdennasser; Driss, Zied; Sharkawy, Abdel-Nasser; Al-Sabur, Raheem
Scientific Journal of Engineering Research Vol. 1 No. 1 (2025): March
Publisher : PT. Teknologi Futuristik Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.64539/sjer.v1i1.2025.8

Abstract

The Viola-Jones algorithm remains a cornerstone in computer vision, particularly for object and face detection. This bibliometric study provides a comprehensive analysis of the algorithm’s academic impact and research trends, encompassing publication patterns, citation metrics, influential authors, and co-occurrence of keywords. The findings indicate a significant rise in research outputs and citations between 2016 and 2020, reflecting the algorithm's sustained relevance and application in various domains. Network visualization maps further reveal the algorithm's integration with diverse fields, including machine learning, image processing, and neural networks, emphasizing its versatility and adaptability to emerging technological challenges. Key research contributions include advancements in hybrid approaches, combining the Viola-Jones framework with techniques such as convolutional neural networks and HOG-SVM for improved detection accuracy. However, limitations such as computational inefficiency and sensitivity to environmental factors persist, presenting opportunities for innovation. This study concludes by highlighting future research directions, such as integrating deep learning and edge computing to enhance algorithmic performance in real-time and complex scenarios. This study provides a valuable reference for researchers and practitioners aiming to extend the Viola-Jones algorithm’s capabilities and applications by consolidating existing knowledge and identifying research gaps.