Claim Missing Document
Check
Articles

Found 3 Documents
Search

Usability Testing of the AIS Mobile Application Using the User Centered Design Method for New Information Systems Students at UIN Syarif Hidayatullah Jakarta: Usability Testing Aplikasi AIS Mobile Menggunakan Metode User Centered Design pada Mahasiswa Baru Sistem Informasi UIN Syarif Hidayatullah Jakarta Fajar Mauludin, Bintang; Subiyakto, A’ang
Journal of Vocational Education and Information Technology (JVEIT) Vol. 4 No. 1 (2023): JVEIT : Vol 4 No 1 (2023)
Publisher : Lembaga Pengembangan dan Inovasi Universitas Dharmas Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.56667/jveit.v4i1.1047

Abstract

Many individuals all across the world now depend heavily on their smartphones in their daily lives. Building mobile applications gives the chance to connect with a very sizable and growing user base. Mobile applications have a large market potential due to their constantly growing user base. Icons on the phone screen make it simple and quick to access mobile applications. Users don't need to open a browser or type a website address in order to utilize an application; they simply need to click on the application icon. According to the results of the questionnaire given to 21 respondents, UIN Jakarta's AIS Mobile application scored 64.87% on usability. Due to this, the User Centered Design build method was used in this study to build the AIS website for UIN Syarif Hidayatullah Jakarta in order to increase the usability value of the website in the aspects of Learnability, Efficiency, Memorability, Error Prevention, and Satisfication Assessment.
Pengukuran Kepuasan Pengguna pada Website Dicoding Menggunakan Metode EUCS Tiohandra, Mufadha; Subiyakto, A’ang
POSITIF : Jurnal Sistem dan Teknologi Informasi Vol 10 No 1 (2024): Positif : Jurnal Sistem dan Teknologi Informasi
Publisher : P3M Politeknik Negeri Banjarmasin

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31961/positif.v10i1.1948

Abstract

Education is the basic right of every person and the current era of digitalization has increased access to education through the availability of the internet. Nowadays, education is not only limited to formal school channels where one has to go somewhere to receive education, but it can be done anywhere and anytime with the help of online platforms. One of the certified online learning platforms is Dicoding which provides training and materials in information technology, particularly in programming. Dicoding allows its users to improve their skills and knowledge in an interactive and self-directed way using a variety of available content related to the industry. In assessing the quality of the service provided, measures such as the End User Satisfaction Method (EUCS) are used which focuses on user satisfaction with content, accuracy, ease of use, aesthetics, and timeliness. As a result, users rated the service Under Review, i.e., better than they expected and they were able to achieve their learning outcomes with good satisfaction.
Quantitative Analysis of the Key Factors Driving Cybersecurity Awareness Among Information Systems Users Helmiawan, Muhammad Agreindra; Firmansyah, Esa; Herdiana, Dody; Akbar, Yopi Hidayatul; Subiyakto, A’ang; Rahman, Titik Khawa Abdul
Jurnal Teknik Informatika (Jutif) Vol. 6 No. 4 (2025): JUTIF Volume 6, Number 4, Agustus 2025
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2025.6.4.4861

Abstract

Cybersecurity threats are increasingly complex and widespread, posing significant risks to individuals and organizations. However, many studies tend to address the technological or behavioral aspects separately. The study uses a survey-based quantitative approach using PLS-SEM to analyze key factors that influence cybersecurity awareness, including demographics, training, psychological bias, and organizational culture. The findings suggest that several constructs-such as threat awareness, perceived risk, and education-significantly predict cybersecurity awareness and behaviour. Notably, the model yields an R² value of up to 0.703 with a strong path significance (p < 0.05), which underscores the robustness of the relationship. This study offers an integrated perspective on cybersecurity by bridging the psychological, educational, and organizational dimensions. It highlights cybersecurity awareness as a mediating construct that links upstream factors to secure user behavior-a relational structure that has not been explored in previous research.