Claim Missing Document
Check
Articles

Found 2 Documents
Search

Analisis SWOT Dalam Pengembangan Produk Usaha Rumahan Donut’s Amira Wanti, Eny Trisno; Yunita, Tyna
Socius: Jurnal Penelitian Ilmu-Ilmu Sosial Vol 1, No 12 (2024): July
Publisher : Penerbit Yayasan Daarul Huda Kruengmane

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.5281/zenodo.12172668

Abstract

This research aims to determine the SWOT (Strength, Weakness, Opportunity, Threat) analysis of the MSME (Micro, Small and Medium Enterprise) "Donut's Amira) business owned by Mrs. Nopy which is located in Gabus, North Tambun. The business "Donut's Amira" is one of the MSMEs which operates in the culinary sector, especially donuts. This research uses a qualitative approach using data collected through interviews. It is hoped that this research can fulfill the author's curiosity regarding the SWOT analysis of the "Donut's Amira" business. Through this program, it is hoped that it can open up job opportunities for the community.
Pengaruh Keamanan Two Factor Authentication Terhadap Pencurian Data (Cyber Crime) Pada Media Sosial Aprilia, Tantri; Pitoyo, Bayu Seno; Fauzi, Achmad; Ramadhanti, Reifa Galih; Nurazizah, Rizty Dwi; Wanti, Eny Trisno; Nugroho, Muhammad Yusuf; Shawa, Bagus Naufal Putra; Prasetyo, Andhika Rifki
Madani: Jurnal Ilmiah Multidisiplin Vol 2, No 5 (2024): Madani, Vol. 2, No. 5 2024
Publisher : Penerbit Yayasan Daarul Huda Kruengmane

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.5281/zenodo.11496678

Abstract

Security management refers to effective and efficient steps that must be taken to carry out security efforts and prevent losses so that disturbances that can cause losses do not occur. In the 4.0 era, people are required to utilize the latest technology to make it easier to solve problems, including data security. Cybercriminals often steal and manipulate data. Various data security methods have been developed, one of which is two factor authentication (2FA) which is widely used on social media. Gen-Z's lack of awareness about data security often leads to data leaks or account hijacking. By using 2FA, this problem can be overcome and provide more protection against cyber threats. This research aims to determine the effect of two factor authentication security on data theft on social media. This research uses qualitative methods with data collected from previous research as reference material. The results of this research show that public awareness and enlightenment regarding cybercrime is related to the use of social media.