Claim Missing Document
Check
Articles

Found 3 Documents
Search

Pembuatan Game Edukasi Pengenalan Kue Tradisional Berbasis Android Rahayu, Syifaa Puspita; Subandi, Dipa; Qorahman, Opik; Rifki, Muhammad; Muttaqin, Aji Zaenal
Media Jurnal Informatika Vol 15, No 2 (2023): Media Jurnal Informatika
Publisher : Teknik Informatika Universitas Suryakancana Cianjur

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35194/mji.v15i2.3310

Abstract

Kue Tradisional adalah sebuah kekayaan dan warisan budaya nenek moyang kita, sayangnya kue Tradisional ini sudah mulai jarang ditemui. Dikarenakan popularitas kue Tradisional yang terus menurun akibat berkembanya jajanan modern yang pengiklanan dan penjualannya menggunakan teknologi digital sehingga mempunyai jangkauan yang luas dan sering kali menyasar generasi muda yang sangat bergantung pada teknologi digital. Dengan menggunakan konsep edukasi menggunakan teknologi digital, pembuatan game edukasi mengenai kue tradisional berbasis puzzle kata terwujud, sehingga dapat mengenalkan kue Tradisional kepada generasi muda dan anak-anak sehingga dapat meninggakatkan pamor kue tradisional, dengan pengaplikasian metode pengembagan system MDLC yang terdiri dari beberapa tahapan yaitu konsep, desain, pengumpulan materi, penyusunan, penyusunan, pembuatan, uji coba, dan distribusi. Pembuatan permainan edukasi dengan puzzle ini menggunakan sofware construct 2 sebagai alat untuk membuat permainan, dan hasil permainan edukasi. Dari hasil uji coba yang dilakukan didapatkan feedback dari pengguna pada tabel 5, sehingga game yang menggunakan metode permainan susun huruf ini di harapkan dapat menjadi salah satu media pembelajaran literasi digital bagi anak-anak.
A bibliometric analysis of the of cybersecurity policy research Qorahman, Opik; Akbar, Nova Nauval
Jurnal Informatio Vol 4, No 1 (2024): 2024
Publisher : Faculty of Communication, Padjadjaran University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24198/inf.v4i1.52033

Abstract

The cybersecurity policy is a fundamental framework for developing a robust defense strategy for an organization's digital landscape. It involves various critical steps, including classifying information based on sensitivity, implementing strict access control, encrypting data in transit and at rest, continuous security awareness training, an incident response plan for addressing security breaches, deploying network security measures such as firewalls and intrusion detection systems, and physical security protocols to protect data centers and infrastructure. The purpose of this study is to answer the following questions: How are articles on Cybersecurity Policy classified? What are the latest study trends in Cybersecurity Policy analysis? What are the most frequently published research topics? What are the potential areas for future research in Cybersecurity Policy analysis? This research used a quantitative-descriptive technique. This bibliometric analysis explores the extensive and dynamic domain of cybersecurity policy, examining academic outputs from various dimensions. Utilizing standardized methodologies, including Mendeley software, VOSviewer, and PoP, this study navigates the complex terrain of academic literature. The findings reveal major topics such as 'Cybersecurity policy,' 'Network security policy,' and 'Cybersecurity' emerge, illuminating both well-explored areas and less developed fields such as 'National cybersecurity' and 'Cyberspace.' These unexplored aspects present intriguing avenues for future research.
RANCANGBANGUN WEB EVALUASI PELATIHAN DI WIKA BETON MAJALENGKA MENGUNAKAN METODE WATERFALL Qorahman, Opik; Nurdiana, Nunu
SEMINAR TEKNOLOGI MAJALENGKA (STIMA) Vol 9 (2025): Seminar Teknologi Majalengka (STIMA) 9.0 Tahun 2025
Publisher : Universitas Majalengka

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

PT.WIJAYA KARYA MAJALENGKA often conducts training for its employees to improve their understanding of the latest knowledge related to their field. Training evaluations already exist, but they have not been digitized and are only in the form of paper surveys, which often result in damaged files, lost files, sorting errors, and delays that affect the speed of survey data and training certificate production. Due to these problems, an application is needed that can automatically manage survey data and create certificates, which can minimize errors from the limitations of paper-based survey evaluations in the creation of survey data and certificates. The method used is Waterfall, which applies a methodical and sequential approach, with stages that include requirements, design, implementation, verification, and maintenance. The creation of this web application simplifies and accelerates the e-certificate generation process, enabling it to be produced automatically. Additionally, this application provides a feature that allows certificates to be accessed and downloaded, and the application will be equipped with a survey data processing system that enables test results and survey results to be converted into Excel files.