Claim Missing Document
Check
Articles

Found 3 Documents
Search

Perkembangan Digital Marketing Menggunakan Metode Systematic Literatur Review Tamin, Zulfiqar; Jhon Veri
Journal of Computers and Digital Business Vol. 3 No. 3 (2024)
Publisher : PT. Delitekno Media Madiri

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.56427/jcbd.v3i3.593

Abstract

Strategi digital marketing seperti SEO, SMM, Content Marketing, Email Marketing, Influencer Marketing, dan Affiliate Marketing diteliti menggunakan metode Systematic Literature Review (SLR). Meninjau berbagai literatur, penelitian ini bertujuan untuk memahami efektivitas dan penerapan masing-masing strategi dalam konteks bisnis yang berbeda. Hasil penelitian menunjukkan bahwa SEO tetap esensial untuk meningkatkan visibilitas online dan menarik lalu lintas organik ke situs web. SMM memainkan peran krusial dalam membangun hubungan dengan pelanggan dan meningkatkan brand awareness melalui platform media sosial. Content Marketing efektif dalam menciptakan nilai tambah bagi audiens dan memperkuat kredibilitas merek. Email Marketing, meskipun tradisional, masih unggul dalam personalisasi dan retensi pelanggan. Influencer Marketing semakin populer dengan memanfaatkan pengaruh individu berpengaruh untuk menarik perhatian audiens target. Affiliate Marketing menyediakan peluang kolaboratif antara perusahaan dan afiliasi untuk mendorong penjualan melalui komisi. Penelitian ini menyimpulkan bahwa kombinasi berbagai strategi digital marketing dapat memberikan keuntungan signifikan bagi bisnis dalam mencapai tujuan pemasaran mereka. Temuan ini menekankan pentingnya memahami karakteristik dan potensi setiap strategi untuk merancang kampanye pemasaran yang lebih efektif.
Optimalisasi Analisis Keamanan Menggunakan Acunetix Vulnerability Pada Rekam Medis Elektronik Tamin, Zulfiqar; Yuhandri, Y; Sumijan, S
Kesatria : Jurnal Penerapan Sistem Informasi (Komputer dan Manajemen) Vol 5, No 4 (2024): Edisi Oktober
Publisher : LPPM STIKOM Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/kesatria.v5i4.494

Abstract

The use of the internet and web applications has significantly increased across various sectors, including education, healthcare, finance, and entertainment. However, web applications are highly vulnerable to various types of cyberattacks, such as SQL Injection, Cross-Site Scripting (XSS), and code injection, which can threaten the confidentiality, availability, and integrity of data. In line with technological advancements, the 2022 Ministry of Health regulation mandates that all healthcare facilities in Indonesia implement Electronic Medical Records (EMR). Universitas Andalas Hospital (RS UNAND) has adhered to this policy by developing a web-based EMR system. This study aims to evaluate and analyze the security of the EMR application used at RS UNAND. The Vulnerability Assessment process in this study was conducted using the Acunetix Web Vulnerability Scanner tool, which is designed to identify and assess vulnerabilities in web applications. The results of the first scan revealed that the RS UNAND EMR application had significant vulnerabilities, with a threat level of 3 (high). This scan identified 573 alerts, including 1 high-level, 253 medium-level, 2 low-level, and 317 informational alerts. These issues were followed by a thorough recap and further analysis to determine optimization steps. Several major vulnerabilities identified included HTML Form Without CSRF Protection, User Credentials Sent in Clear Text, Directory Listing, Source Code Disclosure, Git Repository Found, Multiple Vulnerabilities Fixed in PHP Versions, and Slow HTTP Denial of Service Attack. Optimization measures were then taken through a comprehensive review of the source code and enhancements to the security features of the EMR application. After the optimization, the second scan showed a significant reduction in the threat level, with the RS UNAND EMR application dropping to threat level 1 (low), with 12 alerts, consisting of 0 high and medium-level alerts, 9 low-level alerts, and 3 informational alerts. This study underscores the importance of regular security assessments and the optimization of security features to protect sensitive data in electronic medical record systems.
Penerapan Algoritme Advanced Encryption Standard (AES-128) untuk Mengamankan File Rekam Medis Pasien Tamin, Zulfiqar; Hendrik, Billy
Jurnal KomtekInfo Vol. 12 No. 1 (2025): Komtekinfo
Publisher : Universitas Putra Indonesia YPTK Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35134/komtekinfo.v12i1.592

Abstract

In the era of Industry 4.0, which describes the current trend of digital transformation and advancements in information systems, data and information security is of paramount importance for today's internet users. Data breaches involving patient medical records are among the most damaging incidents, necessitating enhanced security measures. This is the background for the development of this application. The problem analysis conducted by the researchers focuses on data file security. One effective method to enhance the security of your data or files is through encryption, specifically using the AES-128 cryptographic algorithm. Given the critical need for information security today, this research aims to implement cryptography using the AES-128 algorithm for encrypting and decrypting data in file formats. This study is implemented in a Python-based application, enabling users to protect sensitive data files. The data is encrypted, and only those with the application and the encryption key can decrypt or access the files. Several tests on this application have successfully encrypted and decrypted patient medical records in PDF format. The purpose of this application is to provide enhanced security for confidential file contents, ensuring that unauthorized parties cannot access them. The application was tested by encrypting and decrypting files in PDF format, with encryption and decryption times measured in seconds. The conclusion drawn from the AES-128 file encryption and decryption is that the larger the file size, the longer the encryption and decryption processes take