Claim Missing Document
Check
Articles

Exploring Trust, Privacy, and Security in Cloud Storage Adoption among Generation Z: An Extended TAM Approach Utomo, Rio Guntur; Yasirandi, Rahmat
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 9, No. 4, November 2024
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v9i4.2009

Abstract

The incorporation of cloud storage technology holds the promise of significantly enhancing efficiency in various sectors, particularly from the perspective of Generation Z, a demographic known for its meticulous consideration of technology acceptance factors, especially security. This research thoroughly examines the level of acceptance of cloud storage technology among Generation Z. By augmenting the Technology Acceptance Model (TAM) with five core factors and introducing three novel factors—Perceived Security, Perceived Privacy, and Trust—this study not only adheres to traditional acceptance models but also ventures into uncharted territories, marking a significant contribution to understanding technology acceptance. This study meticulously collected data from 408 Generation Z respondents who actively use cloud storage technology, employing an innovative questionnaire disseminated via an online platform. Through sophisticated PLS-SEM data analysis, the study confirmed the positive and significant impact of all tested hypotheses, underscoring the importance of attitudes, perceived benefits, and usability in fostering the intention to use cloud storage. Notably, the added dimensions of privacy and security emerged as critical in enhancing users' trust in cloud storage solutions. Furthermore, this study paves the way for future explorations into technology acceptance across diverse populations and settings, underscoring the critical role of security and privacy in shaping technology adoption decisions among emerging generations.
Information Security Risk Analysis of State-Owned Bank Information Technology (IT) Assets Using the Octave Allegro Method Tasya, Muhammad Azel; Suwawi, Dawam Dwi Jatmiko; Utomo, Rio Guntur
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 6, No 2 (2022): EDISI SEPTEMBER
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v6i2.504

Abstract

Utilization of Information Technology (IT) in companies today is an important element to support the effectiveness & efficiency of business processes. This research set PT ABC as a case study place. In utilizing its IT assets, the company has a division that is responsible for managing and managing the company's IT assets, namely the IT Asset division. The IT Asset Division of the Company has never conducted a security risk analysis on its IT assets. In helping companies to determine the level of information security of their IT assets, an analysis of the information security risks of these assets will be carried out. This study uses the OCTAVE Allegro method in analyzing the company's IT assets. OCTAVE Allegro consists of eight stages and is grouped into four phases. The research resulted in 5 risks from 7 IT assets which were analyzed and made into a Risk Register document. Furthermore, the researcher recommends ISO 27002:2014 control of the IT asset risk as a mitigation measure
Information Security Risk Analysis of State-Owned Bank Information Technology (IT) Assets Using the Octave Allegro Method Tasya, Muhammad Azel; Suwawi, Dawam Dwi Jatmiko; Utomo, Rio Guntur
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 6, No 2 (2022): EDISI SEPTEMBER
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v6i2.504

Abstract

Utilization of Information Technology (IT) in companies today is an important element to support the effectiveness & efficiency of business processes. This research set PT ABC as a case study place. In utilizing its IT assets, the company has a division that is responsible for managing and managing the company's IT assets, namely the IT Asset division. The IT Asset Division of the Company has never conducted a security risk analysis on its IT assets. In helping companies to determine the level of information security of their IT assets, an analysis of the information security risks of these assets will be carried out. This study uses the OCTAVE Allegro method in analyzing the company's IT assets. OCTAVE Allegro consists of eight stages and is grouped into four phases. The research resulted in 5 risks from 7 IT assets which were analyzed and made into a Risk Register document. Furthermore, the researcher recommends ISO 27002:2014 control of the IT asset risk as a mitigation measure
ANALYZING COMPARISON PERFORMANCE MODEL OF MACHINE LEARNING THROUGH DETECTION SQL INJECTION ATTACK Pratama, Rakha Satria; Irsan, Muhamad; Utomo, Rio Guntur
JIPI (Jurnal Ilmiah Penelitian dan Pembelajaran Informatika) Vol 9, No 4 (2024)
Publisher : STKIP PGRI Tulungagung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29100/jipi.v9i4.5637

Abstract

This research aims to compare Machine Learning models that effectively detect SQL Injection attacks in security systems. The dataset was col lected from the Kaggle resource published by Syed Saqlain Hussain Shah, the dataset with the highest upvotes in the SQL Injection category. The models developed include Support Vector Machine (SVM), K-Nearest Neighbor (KNN), and Logistic Regression (LR). The research process includes separating the data into 70% training and 30% test data, model training, testing model effectiveness, and implementing preventive measures against SQL Injection attacks. The research results show that the SVM model has an accuracy rate of 99.82%, precision of 99.88%, and recall (Sensitivity) of 99.34%. KNN obtained an accuracy rate of 79.28%, a precision of 98.38%, and a recall (Sensitivity) of 73.31%. LR obtained an accuracy rate of 98.99%, precision of 99.94%, and recall (Sensitivity) of 98.70%. Using a Machine Learning approach, this research improves system security against SQL Injection attacks.
INTEGRATING TAM WITH IDT: FACTORS AFFECTING USERS’ INTENTION TO USE NEW SOCIAL MEDIA APPS Rajagukguk, Vikka Dwi Nauli Haro; Utomo, Rio Guntur
JIPI (Jurnal Ilmiah Penelitian dan Pembelajaran Informatika) Vol 9, No 4 (2024)
Publisher : STKIP PGRI Tulungagung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29100/jipi.v9i4.5918

Abstract

Social media applications that continue to grow in society have made many companies innovate new social media applications. Behind this, application developers must know the factors that make their applications popular in order to maintain long-term use. This research aims to measure user intentions in using new social media applications as well as exploring and investigating potential factors that influence users in using new social media applications. The research method used is a quantitative approach by proposing a Technology Acceptance Model (TAM) with Innovation Diffusion Theory (IDT). Data collected was 424 respondents who had used new social media applications. From the results of the analysis of factors that influence users to want to use new social media applications namely Complexity, Observability, Perceived Compatibility , Perceived Enjoyment, Relative Advantage and Perceived Ease of Use. Apart from that, there is the influence of Observability, Perceived Compatibility, Perceived Enjoyment, Trialability, Perceived Usefulness, and the influence of Perceived Usefulness on Behavioral Intention to Use. From the results of this research analysis, it is known that the approach in the TAM and IDT models provides support that there are factors that influence users to use new social media applications. This research suggests further expanding the variables in TAM and IDT to find out more about the factors that influence users to use new social media applications, as well as looking for more indicators from the variables in this study to strengthen the validity and reliability of the research variables.
IMPLEMENTATION OF E-SERVICE QUALITY METHOD AND IMPORTANCE PERFORMANCE ANALYSIS (IPA) FOR SERVICE QUALITY ANALYSIS ON WATTPAD APPLICATION Raja, Arta Novrida Lumban; Utomo, Rio Guntur
JIPI (Jurnal Ilmiah Penelitian dan Pembelajaran Informatika) Vol 10, No 1 (2025)
Publisher : STKIP PGRI Tulungagung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29100/jipi.v10i1.5945

Abstract

Everyday life now requires mobile applications. One popular application is Wattpad, an online platform that allows users to read, write, and share stories for free, though some are also paid. With millions of users worldwide, Wattpad has become a trendy place for writers and readers to interact and enjoy literary works. However, with the rapid growth of Wattpad users, application managers need to ensure the quality of service they provide to users. This research involved 402 respondents who are active users of the Wattpad application. Given the importance of service quality in maintaining Wattpad's competitiveness in a competitive market and enhancing the user experience, this study applies the Importance of Performance Analysis (IPA) and E-Service Quality methods. Site Organization, Responsiveness, Reliability, User Friendliness, Personal Needs, and Efficiency are the six variables used to measure user perceptions. After data was collected through the distribution of questionnaires to Wattpad users, the data was analyzed using SPSS. The analysis results show that the level of user satisfaction with the services offered by the Wattpad application reaches 85%
Malware Detection pada Static Analysis Windows Portable Executable (PE) Menggunakan Support Vector Machine dan Decision Tree Qusyairi, Mohammad Mirza; Rio Guntur Utomo; Rahmat Yasirandi
CSRID (Computer Science Research and Its Development Journal) Vol. 15 No. 2: June 2023
Publisher : LPPM Universitas Potensi Utama

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22303/csrid-.15.2.2023.93-102

Abstract

Malware has become a major issue for computer system security today. Due to its ability to spread rapidly and negatively impact system performance, malware detection becomes crucial. One of the methods for malware detection is performing classification using Machine Learning, which learns the variable values of an application without executing it. In this study, the author evaluates the method of malware detection in the static analysis of Windows Portable Executable (PE) using Support Vector Machine (SVM) and Decision Tree. The author uses a dataset of PE files related to malware and safe applications from malware Using SVM and Decision Tree algorithms to classify the PE files as malware or not, determining the best machine learning algorithm for malware detection in PE files.
Customer satisfaction of urban farming application services: e-Buruan Sae Sukarno, Parman; Utomo, Rio Guntur; Yasirandi, Rahmat; Suwastika, Novian Anggis
JURNAL INFOTEL Vol 14 No 4 (2022): November 2022
Publisher : LPPM INSTITUT TEKNOLOGI TELKOM PURWOKERTO

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20895/infotel.v14i4.846

Abstract

This study evaluates the customer satisfaction model in adopting the Web 2.0-based e-Buruan Sae application. The e-Buruan Sae application is an interactive Web 2.0-based application used by the government and the people of Bandung City to manage urban farming activities. This research is quantitative correlational research and applies a research method based on Design Research Methodology (DRM). The stages of this research are the literature review stage with the output of research objectives, the initial empirical analysis stage with the outputs of the hypothesis and research model, the experimental stage for data collection, and the final empirical analysis stage with the output of the data analysis results. This study uses six variables to measure customer satisfaction: ease of use, service quality, interactivity, trust, customer satisfaction, and IT development. The results of empirical testing show that the ease of use and IT development variables do not affect the customer satisfaction variable. In contrast, the remaining variables have a positive effect on customer satisfaction. This research produces measurements to evaluate customer satisfaction on the Web 2.0-based urban farming application.
Dinamika Adopsi Pembayaran Digital: Studi Kasus Perkotaan tentang E-Money Menggunakan Model Penerimaan Teknologi Utomo, Rio Guntur; Yasirandi, Rahmat; Suwastika, Novian Anggis
JURNAL INFOTEL Vol 16 No 3 (2024): August 2024
Publisher : LPPM INSTITUT TEKNOLOGI TELKOM PURWOKERTO

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20895/infotel.v16i3.1174

Abstract

The utilization of e-money in Indonesia has surged, propelled by the expansion of digital payment platforms. Despite their growing prevalence, the dynamics of e-money acceptance within urban environments remain underexplored. This study innovatively extends the Technology Acceptance Model (TAM) by incorporating Perceived Security as a new variable, alongside traditional factors such as Perceived Usefulness, Perceived Ease of Use, Attitude Toward Using, Behavioral Intention to Use, and Facilitating Condition. The research focuses on Padang City, a representative urban landscape, where data was collected from 201 valid respondents through online platforms. Data analysis was conducted using Partial Least Squares Structural Equation Modeling (PLS-SEM). The integration of Perceived Security is a novel aspect of this study, reflecting its crucial role in the contemporary urban context of e-money utilization. Results reveal significant relationships among the studied variables, although the impacts of Facilitating Condition on Perceived Ease of Use and Perceived Usefulness on Behavioral Intention to Use were not supported. The findings underscore that positive attitude toward e-money significantly boost behavioral intentions to use it, primarily influenced by security perceptions and ease of use. These insights have substantial implications for policymakers and businesses focused on enhancing e-money adoption in urban settings. The study highlights the necessity of addressing user perceptions, particularly security, to foster broader acceptance. The limited influence of Facilitating Conditions suggests that improvements in infrastructure must be coupled with efforts to enhance user trust and ease of interaction with e-money platforms. This research contributes to the field by providing a deeper understanding of the factors driving e-money acceptance in urban areas, guiding targeted strategies for digital financial inclusion.
Penerapan dan Pelatihan Sistem Smart Aquaculture untuk Budidaya Ikan dalam Biofloc di SEIN Farm Kota Bandung Sukarno, Parman; Nuha, Hilal Hudan; Suwastika, Novian Anggis; Makky, Muhammad Al; Oktaria, Dita; Utomo, Rio Guntur; Yasirandi, Rahmat
Aksiologiya: Jurnal Pengabdian Kepada Masyarakat Vol 7 No 2 (2023): Mei
Publisher : Universitas Muhammadiyah Surabaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30651/aks.v7i2.11532

Abstract

Sekemala Integrated Farm (Sein Farm) merupakan bagian dari Unit Pelaksana Teknis (UPT) Pembibitan Tanaman Pangan, Hortikultura, dan Peternakan,  Dinas Ketahanan Pangan dan Pertanian (DKPP) Kota Bandung yang memiliki fungsi sebagai laboratorium umum (masyarakat) untuk kegiatan urban farming. Salah satu kegiatan urban farming adalah budidaya ikan dalam biofloc. Sein Farm memiliki biofloc sebanyak 55 unit untuk budidaya ikan tawar. Menjaga kualitas air dalam biofloc memiliki peran yang sangat krusial dalam keberhasilan budidaya ikan. Permasalahan yang dihadapi Sein Farm dalam budidaya ikan di biofloc adalah dengan keterbasan jumlah karyawan dalam kegiatan operasional sehari-hari untuk menjaga kualitas air. Integrasi teknologi Internet of Things (IoT) dan Artificial Intelligence (AI) memberikan solusi untuk otomatisasi kegiatan akuakultur termasuk untuk menjaga kualitas air, yang juga dikenal sebagai smart aquaculture. Dalam kegiatan pengabdian kepada masyarakat tim dari Fakultas Informatika Universitas Telkom membangun, menerapkan, melakukan alih teknologi, dan mengukur penerimaan solusi berbasis smart aquaculture kepada 16 pegawai operasional di Sein Farm. Dari hasil kegiatan tersebut, tujuan dari kegiatan masyarakat berhasil capai, yaitu berhasil membangun dan menerapkan smart aquaculture di Sein Farm, melakukan pelatihan untuk pengoperasian sistem, dan melakukan survey untuk penerimaan teknologi. Hasil dari survei menunjukkan 95% menjawab “setuju” dan “sangat setuju” terhadap penerapan smart aquaculture dalam membantu kegiatan operasional untuk menjaga kualitas air dalam budidaya ikan di biofloc.