Claim Missing Document
Check
Articles

Found 2 Documents
Search

Object Oriented Analysis and Design Aplikasi Pasar Online: TONPASAR Dimas Irmansyah; Aliya Zhafira Wastuyana; Elizabeth Alda Hermanto; Anindo Saka Fitri
JURNAL PENELITIAN SISTEM INFORMASI (JPSI) Vol. 2 No. 1 (2024): FEBRUARI : JURNAL PENELITIAN SISTEM INFORMASI
Publisher : Institut Teknologi dan Bisnis (ITB) Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.54066/jpsi.v2i1.1454

Abstract

As time goes by, traditional markets are starting to be abandoned by society because of the existence of modern markets, namely supermarkets, minimarkets and e-commerce. However, many goods can only be obtained in traditional markets and many of these goods are basic needs of society. Therefore, an application is needed that can facilitate traditional markets so that sellers and buyers are no longer abandoned, namely online market applications. The main aim of designing this application is to help traditional market sellers who were previously affected by a lack of buyers. Apart from that, this application can also benefit parties other than sellers, namely traditional market buyers who previously had problems accessing traditional markets or other obstacles. The design of this online market application uses the Object Oriented Analysis and Design (OOAD) method. By designing this application, it will really help traditional market sellers who were previously affected by a lack of buyers.
Ancaman dan Langkah Pengamanan Sistem Informasi Menggunakan Metode Systematic Literature Review Achmad Mukhlis; Baiq Laila Alfila; Aliya Zhafira Wastuyana
Jurnal ilmiah Sistem Informasi dan Ilmu Komputer Vol. 3 No. 2 (2023): Juli : Jurnal ilmiah Sistem Informasi dan Ilmu Komputer
Publisher : Lembaga Pengembangan Kinerja Dosen

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55606/juisik.v3i2.496

Abstract

This research aims to analyze security threats that occur in information systems and ways to overcome them. The method used in this research is Systematic Literature Review, where articles related to security threats in information systems are collected and analyzed qualitatively. The results show that there are various kinds of security threats in information systems, such as hacking, sabotage, espionage, and others. These threats can damage data, steal information, or disrupt system integrity. To overcome these threats, prevention and treatment efforts are needed. Prevention is done to prevent damage, loss, or theft of data, while treatment is done if data has already been attacked. Some ways to improve information system security include improving HR knowledge related to cyber threats, implementing readiness certification, and adopting security domains from other countries. Mapping the types of cyberattacks and selecting appropriate security technologies are also important. Some other efforts include regular operating system updates, applying encryption to data, controlling access, using firewall technology, and implementing standard operating procedures (SOPs) and privacy policies. This research can serve as a guide in developing effective policies and measures in maintaining information system security.