Claim Missing Document
Check
Articles

Exploring Trust, Privacy, and Security in Cloud Storage Adoption among Generation Z: An Extended TAM Approach Utomo, Rio Guntur; Yasirandi, Rahmat
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 9, No. 4, November 2024
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v9i4.2009

Abstract

The incorporation of cloud storage technology holds the promise of significantly enhancing efficiency in various sectors, particularly from the perspective of Generation Z, a demographic known for its meticulous consideration of technology acceptance factors, especially security. This research thoroughly examines the level of acceptance of cloud storage technology among Generation Z. By augmenting the Technology Acceptance Model (TAM) with five core factors and introducing three novel factors—Perceived Security, Perceived Privacy, and Trust—this study not only adheres to traditional acceptance models but also ventures into uncharted territories, marking a significant contribution to understanding technology acceptance. This study meticulously collected data from 408 Generation Z respondents who actively use cloud storage technology, employing an innovative questionnaire disseminated via an online platform. Through sophisticated PLS-SEM data analysis, the study confirmed the positive and significant impact of all tested hypotheses, underscoring the importance of attitudes, perceived benefits, and usability in fostering the intention to use cloud storage. Notably, the added dimensions of privacy and security emerged as critical in enhancing users' trust in cloud storage solutions. Furthermore, this study paves the way for future explorations into technology acceptance across diverse populations and settings, underscoring the critical role of security and privacy in shaping technology adoption decisions among emerging generations.
Information Security Risk Analysis of State-Owned Bank Information Technology (IT) Assets Using the Octave Allegro Method Tasya, Muhammad Azel; Suwawi, Dawam Dwi Jatmiko; Utomo, Rio Guntur
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 6, No 2 (2022): EDISI SEPTEMBER
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v6i2.504

Abstract

Utilization of Information Technology (IT) in companies today is an important element to support the effectiveness & efficiency of business processes. This research set PT ABC as a case study place. In utilizing its IT assets, the company has a division that is responsible for managing and managing the company's IT assets, namely the IT Asset division. The IT Asset Division of the Company has never conducted a security risk analysis on its IT assets. In helping companies to determine the level of information security of their IT assets, an analysis of the information security risks of these assets will be carried out. This study uses the OCTAVE Allegro method in analyzing the company's IT assets. OCTAVE Allegro consists of eight stages and is grouped into four phases. The research resulted in 5 risks from 7 IT assets which were analyzed and made into a Risk Register document. Furthermore, the researcher recommends ISO 27002:2014 control of the IT asset risk as a mitigation measure
Information Security Risk Analysis of State-Owned Bank Information Technology (IT) Assets Using the Octave Allegro Method Tasya, Muhammad Azel; Suwawi, Dawam Dwi Jatmiko; Utomo, Rio Guntur
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 6, No 2 (2022): EDISI SEPTEMBER
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v6i2.504

Abstract

Utilization of Information Technology (IT) in companies today is an important element to support the effectiveness & efficiency of business processes. This research set PT ABC as a case study place. In utilizing its IT assets, the company has a division that is responsible for managing and managing the company's IT assets, namely the IT Asset division. The IT Asset Division of the Company has never conducted a security risk analysis on its IT assets. In helping companies to determine the level of information security of their IT assets, an analysis of the information security risks of these assets will be carried out. This study uses the OCTAVE Allegro method in analyzing the company's IT assets. OCTAVE Allegro consists of eight stages and is grouped into four phases. The research resulted in 5 risks from 7 IT assets which were analyzed and made into a Risk Register document. Furthermore, the researcher recommends ISO 27002:2014 control of the IT asset risk as a mitigation measure
ANALYZING COMPARISON PERFORMANCE MODEL OF MACHINE LEARNING THROUGH DETECTION SQL INJECTION ATTACK Pratama, Rakha Satria; Irsan, Muhamad; Utomo, Rio Guntur
JIPI (Jurnal Ilmiah Penelitian dan Pembelajaran Informatika) Vol 9, No 4 (2024)
Publisher : STKIP PGRI Tulungagung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29100/jipi.v9i4.5637

Abstract

This research aims to compare Machine Learning models that effectively detect SQL Injection attacks in security systems. The dataset was col lected from the Kaggle resource published by Syed Saqlain Hussain Shah, the dataset with the highest upvotes in the SQL Injection category. The models developed include Support Vector Machine (SVM), K-Nearest Neighbor (KNN), and Logistic Regression (LR). The research process includes separating the data into 70% training and 30% test data, model training, testing model effectiveness, and implementing preventive measures against SQL Injection attacks. The research results show that the SVM model has an accuracy rate of 99.82%, precision of 99.88%, and recall (Sensitivity) of 99.34%. KNN obtained an accuracy rate of 79.28%, a precision of 98.38%, and a recall (Sensitivity) of 73.31%. LR obtained an accuracy rate of 98.99%, precision of 99.94%, and recall (Sensitivity) of 98.70%. Using a Machine Learning approach, this research improves system security against SQL Injection attacks.
INTEGRATING TAM WITH IDT: FACTORS AFFECTING USERS’ INTENTION TO USE NEW SOCIAL MEDIA APPS Rajagukguk, Vikka Dwi Nauli Haro; Utomo, Rio Guntur
JIPI (Jurnal Ilmiah Penelitian dan Pembelajaran Informatika) Vol 9, No 4 (2024)
Publisher : STKIP PGRI Tulungagung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29100/jipi.v9i4.5918

Abstract

Social media applications that continue to grow in society have made many companies innovate new social media applications. Behind this, application developers must know the factors that make their applications popular in order to maintain long-term use. This research aims to measure user intentions in using new social media applications as well as exploring and investigating potential factors that influence users in using new social media applications. The research method used is a quantitative approach by proposing a Technology Acceptance Model (TAM) with Innovation Diffusion Theory (IDT). Data collected was 424 respondents who had used new social media applications. From the results of the analysis of factors that influence users to want to use new social media applications namely Complexity, Observability, Perceived Compatibility , Perceived Enjoyment, Relative Advantage and Perceived Ease of Use. Apart from that, there is the influence of Observability, Perceived Compatibility, Perceived Enjoyment, Trialability, Perceived Usefulness, and the influence of Perceived Usefulness on Behavioral Intention to Use. From the results of this research analysis, it is known that the approach in the TAM and IDT models provides support that there are factors that influence users to use new social media applications. This research suggests further expanding the variables in TAM and IDT to find out more about the factors that influence users to use new social media applications, as well as looking for more indicators from the variables in this study to strengthen the validity and reliability of the research variables.
IMPLEMENTATION OF E-SERVICE QUALITY METHOD AND IMPORTANCE PERFORMANCE ANALYSIS (IPA) FOR SERVICE QUALITY ANALYSIS ON WATTPAD APPLICATION Raja, Arta Novrida Lumban; Utomo, Rio Guntur
JIPI (Jurnal Ilmiah Penelitian dan Pembelajaran Informatika) Vol 10, No 1 (2025)
Publisher : STKIP PGRI Tulungagung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29100/jipi.v10i1.5945

Abstract

Everyday life now requires mobile applications. One popular application is Wattpad, an online platform that allows users to read, write, and share stories for free, though some are also paid. With millions of users worldwide, Wattpad has become a trendy place for writers and readers to interact and enjoy literary works. However, with the rapid growth of Wattpad users, application managers need to ensure the quality of service they provide to users. This research involved 402 respondents who are active users of the Wattpad application. Given the importance of service quality in maintaining Wattpad's competitiveness in a competitive market and enhancing the user experience, this study applies the Importance of Performance Analysis (IPA) and E-Service Quality methods. Site Organization, Responsiveness, Reliability, User Friendliness, Personal Needs, and Efficiency are the six variables used to measure user perceptions. After data was collected through the distribution of questionnaires to Wattpad users, the data was analyzed using SPSS. The analysis results show that the level of user satisfaction with the services offered by the Wattpad application reaches 85%
Malware Detection pada Static Analysis Windows Portable Executable (PE) Menggunakan Support Vector Machine dan Decision Tree Qusyairi, Mohammad Mirza; Rio Guntur Utomo; Rahmat Yasirandi
CSRID (Computer Science Research and Its Development Journal) Vol. 15 No. 2: June 2023
Publisher : LPPM Universitas Potensi Utama

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22303/csrid-.15.2.2023.93-102

Abstract

Malware has become a major issue for computer system security today. Due to its ability to spread rapidly and negatively impact system performance, malware detection becomes crucial. One of the methods for malware detection is performing classification using Machine Learning, which learns the variable values of an application without executing it. In this study, the author evaluates the method of malware detection in the static analysis of Windows Portable Executable (PE) using Support Vector Machine (SVM) and Decision Tree. The author uses a dataset of PE files related to malware and safe applications from malware Using SVM and Decision Tree algorithms to classify the PE files as malware or not, determining the best machine learning algorithm for malware detection in PE files.
Penerapan dan Pelatihan Sistem Smart Aquaculture untuk Budidaya Ikan dalam Biofloc di SEIN Farm Kota Bandung Sukarno, Parman; Nuha, Hilal Hudan; Suwastika, Novian Anggis; Makky, Muhammad Al; Oktaria, Dita; Utomo, Rio Guntur; Yasirandi, Rahmat
Aksiologiya: Jurnal Pengabdian Kepada Masyarakat Vol 7 No 2 (2023): Mei
Publisher : Universitas Muhammadiyah Surabaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30651/aks.v7i2.11532

Abstract

Sekemala Integrated Farm (Sein Farm) merupakan bagian dari Unit Pelaksana Teknis (UPT) Pembibitan Tanaman Pangan, Hortikultura, dan Peternakan,  Dinas Ketahanan Pangan dan Pertanian (DKPP) Kota Bandung yang memiliki fungsi sebagai laboratorium umum (masyarakat) untuk kegiatan urban farming. Salah satu kegiatan urban farming adalah budidaya ikan dalam biofloc. Sein Farm memiliki biofloc sebanyak 55 unit untuk budidaya ikan tawar. Menjaga kualitas air dalam biofloc memiliki peran yang sangat krusial dalam keberhasilan budidaya ikan. Permasalahan yang dihadapi Sein Farm dalam budidaya ikan di biofloc adalah dengan keterbasan jumlah karyawan dalam kegiatan operasional sehari-hari untuk menjaga kualitas air. Integrasi teknologi Internet of Things (IoT) dan Artificial Intelligence (AI) memberikan solusi untuk otomatisasi kegiatan akuakultur termasuk untuk menjaga kualitas air, yang juga dikenal sebagai smart aquaculture. Dalam kegiatan pengabdian kepada masyarakat tim dari Fakultas Informatika Universitas Telkom membangun, menerapkan, melakukan alih teknologi, dan mengukur penerimaan solusi berbasis smart aquaculture kepada 16 pegawai operasional di Sein Farm. Dari hasil kegiatan tersebut, tujuan dari kegiatan masyarakat berhasil capai, yaitu berhasil membangun dan menerapkan smart aquaculture di Sein Farm, melakukan pelatihan untuk pengoperasian sistem, dan melakukan survey untuk penerimaan teknologi. Hasil dari survei menunjukkan 95% menjawab “setuju” dan “sangat setuju” terhadap penerapan smart aquaculture dalam membantu kegiatan operasional untuk menjaga kualitas air dalam budidaya ikan di biofloc.
TRANSFER AND PAYMENT APPLICATIONS SERVICE QUALITY: THE MODIFIED E-SERVQUAL AND IMPORTANCE-PERFORMANCE ANALYSIS Erlandya, Moch Rizky Gumelar; Utomo, Rio Guntur; Yasirandi, Rahmat
JIPI (Jurnal Ilmiah Penelitian dan Pembelajaran Informatika) Vol 10, No 3 (2025)
Publisher : STKIP PGRI Tulungagung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29100/jipi.v10i3.6423

Abstract

Innovation and technological progress have significantly impacted various sectors, notably Indonesia's financial and banking industry. This sector has seen remarkable growth, particularly with the rise of digitalization. A prominent development in this context is financial technology, or fintech, which has emerged to address needs and issues not sufficiently met by traditional banking services in Indonesia. Among fintech innovations, Transfer and Payment technologies have become increasingly popular. Despite these technologies' benefits, they are frequently criticized for various usage-related issues. This study uses the Modified E-Servqual and Importance Performance Analysis (IPA) methods to evaluate the service quality of Transfer and Payment applications in Indonesia. It aims to assess user perceptions and expectations, identify areas for improvement, and determine which service dimensions require enhancement. The research involved 400 respondents who used Transfer and Payment applications. To ensure reliability, the Kuder-Richardson (KR-21) formula is applied to the measurement tool, while descriptive analysis and IPA are utilized to evaluate and map service quality. Findings reveal that user perceptions of the Transfer and Payment applications are rated as ‘good,’ with an average score of 4.01 out of 5.00 (80%). User expectations are slightly lower, at 3.93 out of 5.00 (79%), but still categorized as ‘good.’ However, several attributes fall short of user expectations, particularly in Reliability, Personal Needs, User Friendliness, and Responsiveness.
COMPARATIVE ANALYSIS OF SERVICE QUALITY IN TRAVELAGENT APPLICATIONS USING E-SERVQUAL AND IPA Febrianti, Amalia Rizki; Utomo, Rio Guntur; Yasirandi, Rahmat
JIPI (Jurnal Ilmiah Penelitian dan Pembelajaran Informatika) Vol 10, No 3 (2025)
Publisher : STKIP PGRI Tulungagung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29100/jipi.v10i3.6415

Abstract

This research compares the service quality of travel agent applications, which are KAI Access and Traveloka, in booking train tickets using the E-Service Quality and Importance Performance Analysis (IPA) methods. This service quality is measured based on seven dimensions of E-Service Quality, including efficiency, fulfillment, reliability, privacy, responsiveness, compensation, and contact. Data were collected through questionnaires from 340 respondents who use the KAI Access and Traveloka applications to book train tickets. The collected data were then analyzed descriptively using the Importance Performance Analysis (IPA) technique to identify priority attributes for improvement based on user satisfaction and importance levels. Based on the Gap Analysis and evaluation of 340 respondents, both the KAI Access and Traveloka apps require improvements as they still need to meet user expectations. The service quality of KAI Access and Traveloka shows significant differences across various dimensions measured by the E-Servqual and Importance Performance Analysis (IPA) methods. The research results are expected to provide recommendations for both applications to improve service quality and user satisfaction. The comparison of service quality is also expected to provide insights into the strengths and weaknesses of each application in providing train ticket booking services.