Claim Missing Document
Check
Articles

PHET Simulation sebagai Alat Bantu Siswa Sekolah Dasar dalam Proses Belajar Mengajar Mata Pelajaran Matematika Sylviani, Sisilia; Permana, Fahmi Candra; Utomo, Rio Guntur
Jurnal Pendidikan Multimedia (Edsence) Volume 2 No 1 (Juni 2020)
Publisher : Universitas Pendidikan Indonesia (UPI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.17509/edsence.v2i1.25184

Abstract

Dalam paper ini dibahas penggunaan Phet sebagai alat bantu dalam kegiatan belajar mengajar matematika khususnya materi pecahan. Phet merupakan simulasi yang dapat digunakan oleh guru dalam mengajarkan materi pecahan di kelas. Dengan menggunakan phet, siswa akan terlibat secara aktif dalam proses berpikir dan mengambil kesimpulan. Phet juga membuat materi yang dipelajari menjadi lebih menarik dan terlihat “nyata”. Dengan demikian, siswa dapat lebih tertarik dalam pembelajaran materi ini yang pada akhirnya akan memudahkan siswa dalam memahami materi tersebut.
Framework untuk Mendesain Sistem Massive Open Online Courses (MOOCs) untuk Universitas di Indonesia Utomo, Rio Guntur; Rosmansyah, Yusep
Jurnal Pendidikan Multimedia (Edsence) Volume 2 No 2 (Desember 2020)
Publisher : Universitas Pendidikan Indonesia (UPI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.17509/edsence.v2i2.29776

Abstract

Massive Open Online Courses (MOOCs) adalah model alternatif pembelajaran jarak jauh. MOOCs memberikan cara baru yang akan mengubah caranya pendidikan disampaikan dan dikonsumsi. Untuk melaksanakan MOOCs di Indonesia, diperlukan pedoman untuk menemukan desain sistem yang sesuai. Makalah ini menawarkan a kerangka kerja untuk merancang sistem MOOCs untuk universitas di Indonesia. Framework tersebut dirancang dengan menggunakan Design Science Research Methodology (DSRM) dan menggunakan model ADDIE sebagai dasar pengembangannya. Terakhir, framework yang telah dikembangkan akan menjadi acuan dasar merancang sistem MOOCs untuk universitas di Indonesia.
Developing an Instrument to Measure Information Assurance Implementation for eGovernment using Goal Question Metric Approach Utomo, Rio Guntur; Wills, Gary; Walters, Robert
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 6, No. 2, May 2021
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v6i2.1200

Abstract

The eGovernment initiative is aimed to improve government services to the public by improving the quality and availability of services that can be accessed regardless of time and place. Consequently, the services must always be available at any time, and any threat to the information and systems should receive attention to ensure business continuity in the event of an incident. Therefore, in implementing eGovernment, information assurance (IA) must be considered. To determine the extent to which IA implementation status to protect eGovernment services in Indonesia, it is necessary to measure the implementation using an instrument. The measurement instrument was developed using the Goal Question Metric (GQM) approach. The developed instrument was then used in a case study to test its effectiveness in measuring the IA implementation. From the results of the case study, it can be concluded that the IA measurement instrument for eGovernment was proven to be effective within Indonesian context.
Studi Kasus Pengukuran Implementasi Information Assurance untuk e-Government menggunakan Metode Goal Question Metric Rio Guntur Utomo
Infoman's : Jurnal Ilmu-ilmu Manajemen dan Informatika Vol. 15 No. 1 (2021): Infoman's
Publisher : STMIK Sumedang

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Internet technology has been used in various fields, such as business, government, health, and education, including government, which is often called electronic government or eGovernment. Indonesia is one of the countries that has implemented eGovernment. In its implementation, eGovernment services must always be available, and every threat to information and systems must receive attention to ensure business continuity in the event of an incident. Therefore, in implementing eGovernment, information assurance (IA) must be considered. To determine the extent to which IA implementation status to protect eGovernment services in Indonesia, it is necessary to measure the implementation using an instrument. The measurement instrument is developed from the IA framework using the Goal Question Metric (GQM) method. The results of the measurement show that the status of implementing IA for e Government in Indonesia is still not satisfactory
ANALYSIS AND DESIGN OF IT PROCUREMENT COMPANY ENTERPRISE ARCHITECTURE USING TOGAF ARCHITECTURE DEVELOPMENT METHOD (CASE STUDY: PT MITRA TELEMATIKA UTAMA) M Alvie Helmuzar; Rahmat Yasirandi; Rio Guntur Utomo
JIPI (Jurnal Ilmiah Penelitian dan Pembelajaran Informatika) Vol 7, No 4 (2022)
Publisher : STKIP PGRI Tulungagung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29100/jipi.v7i4.3247

Abstract

Business processes in the business world require companies to be able to manage information properly and the information needs of each interested party can be met quickly and accurately. The development of EA (Enterprise Architecture) in the company is a complex and challenging job. PT Mitra Telematika Utama has problems with accounting activities and bookkeeping activities. Planning the organizational information system architecture is a complex process, so the planning process must be managed with clear guidelines that aim to align the organization's business technology and public strategy to create maximum results for the organization. Designing an enterprise architecture model requires a framework to manage complex systems and align business with information technology that will be developed within the organization. TOGAF is a framework developed by The Open Group from 1995 to the present. TOGAF provides methods and tools used in planning, creating, designing, and managing the development and implementation of enterprise architecture. TOGAF provides a detailed method on how to build and manage and implement enterprise architecture and information systems called ADM (Architecture Development Method). TOGAF provides methods and tools used in planning, creating, designing, and managing the development and implementation of enterprise architecture. TOGAF provides a detailed method on how to build and manage and implement enterprise architecture and information systems called ADM (Architecture Development Method). TOGAF provides methods and tools used in planning, creating, designing, and managing the development and implementation of enterprise architecture. TOGAF provides a detailed method on how to build and manage and implement enterprise architecture and information systems called ADM (Architecture Development Method). So in planning the enterprise architecture, TOGAF ADM produces application architecture blueprints, business architectures, technology architectures, data architectures, and implementation roadmaps where these blueprints are useful as a reference when developing an enterprise architecture in this case at PT. Mitra Telematika Utama.          
ANALYSIS OF RELIGIOUS COURT INFORMATION SECURITY RISK MANAGEMENT USING THE OCTAVE ALLEGRO METHOD (CASE STUDY OF KEDIRI CITY) Cintya Risquna Risquna; Rahmat Yasirandi; Rio Guntur Utomo
JIPI (Jurnal Ilmiah Penelitian dan Pembelajaran Informatika) Vol 7, No 4 (2022)
Publisher : STKIP PGRI Tulungagung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29100/jipi.v7i4.3213

Abstract

Ease of access can be pros and cons for all information system applications, because it increases the possibility of someone hacking the information system. Therefore, a risk assessment or risk assessment of information systems is needed to identify and understand the risks involved in accessing them. One of the risk assessment methods that analyzes the risk profile of information assets using the OCTAVE Allegro method. The purpose of this study was to determine the results of the analysis of security risk management on information systems at the Religious Courts of the City of Kediri. The recommendation process is a follow-up to the risk assessment in the form of controls in ISO/IEC 27002:2013 which focuses on clause 9. Access Control. This research uses a literature study approach . The literature review was carried out by looking for references to information security risk management analysis using the OCTAVE Allegro method, research material books and research journals to assist in the preparation of this research proposal. The theory taken from the reference mainly refers to the OCTAVE Allegro method. Based on the results of the research conducted, the researchers got 10 areas of attention that will be given control recommendations based on ISO/IEC 27002:2013.
Energy Efficiency Analysis of Network Slicing Algorithm on WiFI Network Dimas Prakoso; Hilal Hudan Nuha; Rio Guntur Utomo
Indonesia Journal on Computing (Indo-JC) Vol. 7 No. 2 (2022): August, 2022
Publisher : School of Computing, Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34818/INDOJC.2022.7.2.642

Abstract

The 5G network generation is a modern innovation after it was first introduced by the New Generation Mobile Network (NGMN). The rapid development of mobile devices is marked by the number of companies launching mobile devices with the latest network connection technology, namely the 5G network. In addition, the rapid development of technology has led to an increase in the number of network requirements that are increasingly current. The development of network virtualization and software network functions is proposed as Network Slicing technology. Network Slicing can integrate and distribute independent network resources so that users get services with low latency and high-reliability requirements. The Network Slicing algorithm can reduce energy wastage when used and aims to divide and allocate network resources into several parts in proportion to the expected resource ratio or priority.
Technology Readiness Index of Agricultural Extension Officers in Bandung City, Indonesia, towards Digitalization of the “Buruan Sae” Program Parman Sukarno; Rahmat Yasirandi; Rio Guntur Utomo; Muhammad Al Makky; Ridha Muldina Negara; Sri Rezeki
agriTECH Vol 42, No 4 (2022)
Publisher : Faculty of Agricultural Technology, Universitas Gadjah Mada, Yogyakarta, Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/agritech.67535

Abstract

Currently, “Buruan Sae” is a leading program in Bandung City, during the pandemic, this program was used to solve the problem of food security for every community. The government also promotes every community to implement urban farming in the city. Meanwhile, digitization is a step that is expected to be carried out in the future. To prepare for the transformation in this direction, the initial step is to measure readiness. Therefore, this study aims to determine the readiness of Agricultural Extension Officers (AOE) in Bandung as a necessary initial step in assisting the digital transformation of the “Buran Sae” program. AOE from the Department of Food and Agriculture were used as the sample population considering that they are the “spearhead” of this program. Using the Technology Readiness Index (TRI) Model, the value obtained was 3.365, which can be categorized as Medium Technology Readiness group. The amount of Explorers group namely 37.5% indicated that the majority of extension officers will accept the technology quickly. Furthermore, no part of the population can completely resist technological change as implied by the absence of the Laggards group. In the future, the results are expected to become a fundamental basis for the Department of Food and Agriculture to achieve digital transformation and this program will continue to be the main answer to every community’s problem of food and agriculture.
Penerapan dan Pelatihan Sistem Smart Aquaculture untuk Budidaya Ikan dalam Biofloc di SEIN Farm Kota Bandung Parman Sukarno; Hilal Hudan Nuha; Novian Anggis Suwastika; Muhammad Al Makky; Dita Oktaria; Rio Guntur Utomo; Rahmat Yasirandi
Aksiologiya: Jurnal Pengabdian Kepada Masyarakat Vol 7 No 2 (2023): Mei
Publisher : Universitas Muhammadiyah Surabaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30651/aks.v7i2.11532

Abstract

Sekemala Integrated Farm (Sein Farm) merupakan bagian dari Unit Pelaksana Teknis (UPT) Pembibitan Tanaman Pangan, Hortikultura, dan Peternakan,  Dinas Ketahanan Pangan dan Pertanian (DKPP) Kota Bandung yang memiliki fungsi sebagai laboratorium umum (masyarakat) untuk kegiatan urban farming. Salah satu kegiatan urban farming adalah budidaya ikan dalam biofloc. Sein Farm memiliki biofloc sebanyak 55 unit untuk budidaya ikan tawar. Menjaga kualitas air dalam biofloc memiliki peran yang sangat krusial dalam keberhasilan budidaya ikan. Permasalahan yang dihadapi Sein Farm dalam budidaya ikan di biofloc adalah dengan keterbasan jumlah karyawan dalam kegiatan operasional sehari-hari untuk menjaga kualitas air. Integrasi teknologi Internet of Things (IoT) dan Artificial Intelligence (AI) memberikan solusi untuk otomatisasi kegiatan akuakultur termasuk untuk menjaga kualitas air, yang juga dikenal sebagai smart aquaculture. Dalam kegiatan pengabdian kepada masyarakat tim dari Fakultas Informatika Universitas Telkom membangun, menerapkan, melakukan alih teknologi, dan mengukur penerimaan solusi berbasis smart aquaculture kepada 16 pegawai operasional di Sein Farm. Dari hasil kegiatan tersebut, tujuan dari kegiatan masyarakat berhasil capai, yaitu berhasil membangun dan menerapkan smart aquaculture di Sein Farm, melakukan pelatihan untuk pengoperasian sistem, dan melakukan survey untuk penerimaan teknologi. Hasil dari survei menunjukkan 95% menjawab “setuju” dan “sangat setuju” terhadap penerapan smart aquaculture dalam membantu kegiatan operasional untuk menjaga kualitas air dalam budidaya ikan di biofloc.
Information Security Analysis in PT. XYZ Using ISO/IEC 27001:2013 Rivaldo Rizky Junior; Rio Guntur Utomo; Dita Oktaria
Jutisi : Jurnal Ilmiah Teknik Informatika dan Sistem Informasi Vol 12, No 1: April 2023
Publisher : STMIK Banjarbaru

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35889/jutisi.v12i1.1118

Abstract

As a company engaged in the field of information technology, problems with information leakage, data loss, and so on can pose detrimental threats, so a security standard is needed to prevent information security leaks from occurring. So the standard raised in this research is ISO 27001:2013. The method used in this research is interviews and observations of related employees and documents at PT. XYZ, the stages in this study refer to the standards in ISO 27001:2013. Currently, the company where this research was conducted does not yet have standards in accordance with ISO/IEC 27001:2013. Furthermore, this research is expected to improve the security system and also prevent security data leaks at PT. XYZ. As well as make recommendations or suggestions from the research results.Keywords: ISO/IEC 27001:2013; Information Security; Data Leak AbstrakSebagai perusahaan yang bergerak pada bidang teknologi informasi, permasalahan kebocoran informasi, kehilangan data, dan lain sebagainya dapat menimbulkan ancaman yang merugikan sehingga dibutuhkanlah suatu standar keamanan untuk mencegah terjadinya kebocoran keamanan informasi. Maka standar yang diangkat pada penilitian ini yaitu ISO 27001:2013. Metode yang digunakan pada penelitian kali ini adalah wawancara dan observasi terhadap pegawai terkait dan dokumen pada PT. XYZ. Tahapan pada penelitian ini merujuk dengan standar yang ada pada ISO 27001:2013. Saat ini perusahaan tempat penelitian ini dilakukan belum memiliki standar yang sesuai dengan ISO/IEC 27001:2013. Selanjutnya, penelitian ini diharapkan dapat meningkatkan sistem keamanan dan juga dapat mencegah kebocoran data keamanan pada PT. XYZ. Serta membuat rekomendasi atau saran dari hasil penelitian.