Claim Missing Document
Check
Articles

Found 5 Documents
Search

Analisis Faktor yang Mempengaruhi Keputusan Pembelian Terhadap Makanan Korea di Kota Batam Heru Wijayanto Aripradono; Elisna Levia
Jurnal Manajemen Bisnis Eka Prasetya Vol 10 No 1: Edisi Maret 2024
Publisher : LPPM STIE EKA PRASETYA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47663/jmbep.v10i1.418

Abstract

Budaya Korea semakin menyebar luas dalam kehidupan masyarakat Indonesia salah satunya dalam bidang kuliner. Makanan Korea adalah makanan tradisional yang berdasarkan pada teknik dan cara memasaknya budaya korea. Penelitian ini dilakukan untuk mengetahui faktor yang mempengaruhi keputusan pembelian makanan Korea di Kota Batam. Penelitian ini merupakan penelitian deskriptif dengan menggunakan metode kuantitatif. Pengumpulan data dilakukan dengan cara menyebarkan kuesioner dengan sampel sebanyak 100 orang dan teknik pengambilan sampel menggunakan metode nonprobability sampling dengan metode pengambilan sampelnya menggunakan incidental sampling dengan teknik analisis faktor yang dibantu dengan software SPSS. Hasil penelitian dan analisa faktor yang dilakukan menunjukan bahwa terdapat empat faktor yang mempengaruhi keputusan pembelian makanan Korea di Kota Batam, yaitu faktor kualitas pelayanan, faktor promosi, produk dan lokasi. Faktor tertinggi yang mempengaruhi keputusan pembelian makanan Korea di Kota Batam adalah faktor kualitas pelayanan dengan nilai of variance sebesar 43,907%.
Learn & Fun Chinese Class Sebagai Sistem Pengajaran Ilmu Mandarin yang Efektif dan Efisien Heru Wijayanto Aripradono; David Febrian
Jurnal Akuntansi, Manajemen dan Ilmu Ekonomi (Jasmien) Vol. 5 No. 01 (2024): Jurnal Akuntansi, Manajemen dan Ilmu Ekonomi (Jasmien) : September-November
Publisher : Cattleya Darmaya Fortuna

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.54209/jasmien.v5i01.645

Abstract

Currently, in Indonesia and several other countries, Mandarin is the second international language after English. This is because China's economy is growing rapidly. Apart from the economic perspective, China is also a source of investment from various countries, one of which is Indonesia. The aim of this research is to create more innovative, relevant and effective solutions. This research updates the game method "Fated Hànyǔ Card". The aim of this research is to identify and analyze the influence of the "Fated Hànyǔ Card" game method in improving Mandarin language learning. This study used qualitative research methods. Data collection techniques were carried out by means of observation and interviews, the data collected was analyzed thematically. The results of the research to improve learning Mandarin, namely the Fated Hànyǔ Card game, have proven to be able to increase students' understanding in learning Mandarin because it is considered interesting and fun by students.
Evaluasi Autentikasi Dua Faktor (2FA) TOTP Pada Perguruan Tinggi Menggunakan Vulnerability Assessment dan CIA Triad Heru Wijayanto Aripradono; Haeruddin; Kurnia Cantra
Jurnal E-Komtek (Elektro-Komputer-Teknik) Vol 8 No 2 (2024)
Publisher : Politeknik Piksi Ganesha Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37339/e-komtek.v8i2.2113

Abstract

Vulnerability exploitation in education websites often leads to data breaches, negatively impacting learning activities, notably higher education, which is highly susceptible to such attacks. This research evaluates the effectiveness of two-factor authentication in mitigating exploitability. To analyze issues further, vulnerability assessment tools, such as Burp Suite and ZAP, can explore website vulnerability and the CIA Triad framework (Confidentiality, Integrity, Availability). The analysis revealed three medium-level vulnerabilities and six low-level vulnerabilities; key topics such as CSRF (Cross-Site Request Forgery) and XSS (Cross-Site Scripting), compromise integrity, and MITM (Man-In-The-Middle) attacks threaten Confidentiality, these vulnerabilities indicate non-compliance with CIA Triad, mitigation strategy such are VPN (Virtual Private Network), and WAF (Web Application Firewall) were proposed. While two-factor authentication improves security, additional fixes and optimizations are required for its effective implementation in the education sector.
THE INFLUENCE OF ONLINE ENTREPRENEURSHIP TRAINING ON STUDENT ENTREPRENEURIAL INTEREST IN BATAM CITY Putra, Rio; Heru Wijayanto Aripradono
International Journal of Global Accounting, Management, Education, and Entrepreneurship Vol. 4 No. 2 (2024): International Journal of Global Accounting, Management, Education, and Entrepre
Publisher : Sekolah tinggi ilmu ekonomi pemuda

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.48024/ijgame2.v4i2.127

Abstract

Entrepreneurial interest is one of the important aspects of developing the entrepreneurial spirit in students. However, not all students have sufficient interest or skills to engage in entrepreneurial activities. Therefore, this study aims to explore efforts to increase students' entrepreneurial interest through online entrepreneurship training. This study used qualitative research methods. The data collection technique was carried out by a literature study. The data that has been collected is then analyzed using thematic analysis. The results show that entrepreneurship training helps foster entrepreneurial interest by providing knowledge, skills, inspiration, and a supportive environment to start and develop a business. With effective entrepreneurship training, it is expected that participants' interest in entrepreneurship will increase and encourage them to embark on an entrepreneurial journey with confidence and success. When students have a high interest in entrepreneurship, they tend to have a strong motivation to learn and develop the skills needed in the business world. High interest can also trigger creativity, the desire to create new solutions, and perseverance in facing the challenges that exist in the entrepreneurial world.
Ransomware Attack Analysis in Cybersecurity Stefanus Eko Prasetyo; Heru Wijayanto Aripradono; Ricardo
Jurnal E-Komtek (Elektro-Komputer-Teknik) Vol 9 No 1 (2025)
Publisher : Politeknik Piksi Ganesha Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37339/e-komtek.v9i1.2279

Abstract

Ransomware attacks have emerged as a significant threat to computer security in the digital age. This research aims to analyze ransomware attacks within the context of cybersecurity, specifically focusing on the impact of such attacks on an organization's database infrastructure. The study involves simulating ransomware attacks using techniques commonly employed by attackers in real-world scenarios. It includes a comprehensive literature review, case observations of previous ransomware attacks, and system simulations to understand the nature of these attacks and their potential consequences. The research highlights the need for effective mitigation strategies to safeguard critical organizational infrastructure and provide insights into strengthening defenses against ransomware. The findings of this study are expected to contribute to the development of more effective and sustainable cybersecurity strategies to address the growing complexity of cyber threats and ensure the operational continuity of organizations.Keywords: Ransomware attacks, Cybersecurity, Database infrastructure