Claim Missing Document
Check
Articles

Found 2 Documents
Search

Penerapan Syariah Governance dan Kepercayaan Terhadap Loyalitas Nasabah dengan Pengujian Model SEM : Studi Empiris Pada Perbankkan Syariah di Yogyakarta Amalina Nur Arifah; Juwita Andriani; Khairina Eka Setyaputri
Jurnal Bisnis Mahasiswa Vol 3 No 3 (2023): Jurnal Bisnis Mahasiswa
Publisher : PT Aksara Indo Rajawali

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.60036/jbm.v3i3.141

Abstract

Penelitian ini bertujuan untuk menguji dan memperoleh bukti empiris mengenai pengaruh implementasi syariah governance dan kepuasan terhadap loyalitas nasabah. Objek dalam penelitian ini adalah perbankan syariah di Yogyakarta. Pengumpulan data menggunakan metode purposive sampling pada nasabah perbankan syariah di Yogyakarta. Sebanyak 215 responden digunakan sebagai sampel dalam penelitian ini. Alat analisis yang digunakan adalah analisis dengan program AMOS 22.0 Model Persamaan Struktural. Pengujian kualitas data yang digunakan dalam penelitian ini adalah uji konfirmatori faktor analisis dan second order model sedangkan pengujian hipotesis menggunakan metode analisis model struktural. Hasil penelitian menunjukkan bahwa variabel syariah governance berpengaruh positif signifikan terhadap kepercayaan dan kepercayaan berpengaruh positif signifikan terhadap loyalitas nasabah, akan tetapi variabel syariah governance berpengaruh tidak signifikan terhadap loyalitas nasabah.
Analisis forensik jaringan serangan ARP Spoofing menggunakan metode National Institute of Justice (NIJ) Latifah Iriani; Muhammad Nasir Hafizh; Khairina Eka Setyaputri
IT Explore: Jurnal Penerapan Teknologi Informasi dan Komunikasi Vol 4 No 2 (2025): IT-Explore Juni 2025
Publisher : Fakultas Teknologi Informasi, Universitas Kristen Satya Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24246/itexplore.v4i2.2025.pp150-160

Abstract

This study aims to identify evidence of Address Resolution Protocol (ARP) Spoofing attacks in the form of the attacker's and victim's Media Access Control (MAC) addresses, as well as the time of the attack. With the increasing use of computer networks, ARP Spoofing attacks have become a serious threat that can lead to data theft, communication interception, and service disruption. ARP Spoofing can serve as a means to launch more complex attacks, such as Denial of Service (DoS) and Man in the Middle (MITM), which can cripple network systems and steal sensitive information. This study utilizes the Wireshark tool to monitor network traffic, specifically ARP, and applies the National Institute of Justice (NIJ) method as a framework for forensic investigation. The NIJ method was chosen because it provides a systematic approach to identifying, collecting, analyzing, and reporting digital evidence, enabling enhanced attack mitigation and supporting legal aspects in network security investigations. The specific approaches used in this forensic analysis include log analysis, packet capture and analysis using Wireshark, and traffic correlation to identify attack patterns based on time and involved devices. The attack simulation was conducted on Personal Computer (PC) 1 and a routerboard, where communication between these two devices was redirected through the attacker. Based on the test results, it was found that every device in the network experienced ARP Spoofing attacks, which could be detected and analyzed using the NIJ method. The contribution of this study is to provide a more systematic approach to forensic network investigations using the NIJ method, which not only aids in attack detection but also establishes a strong foundation for mitigation actions and legal enforcement in computer network security.