Claim Missing Document
Check
Articles

Found 4 Documents
Search

A Survey on Software Requirements Engineering in Information Technology Institutions Akbar, Muhammad Tulus; Siregar, Maria Ulfah
Elinvo (Electronics, Informatics, and Vocational Education) Vol. 9 No. 2 (2024): November 2024
Publisher : Department of Electronic and Informatic Engineering Education, Faculty of Engineering, UNY

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21831/elinvo.v9i2.70862

Abstract

Requirements engineering is a crucial phase in software development. In theory, requirements gathering should follow structured and systematic steps to ensure all requirements are complete, consistent, and clear. However, there is a lack of research in real-world contexts, particularly in small and medium-sized software development organizations, which often face challenges related to human resources, infrastructure, and financial constraints. This study aims to explore the practices of requirements engineering in software development agencies. A qualitative approach was used, employing a narrative (descriptive) research design. Data were gathered through interviews, observations, and documentation from six institutions involved in developing various types of software. The data were then analyzed using Yin's Five Cycle content analysis method, supported by Nvivo 12 software. The findings reveal that the time required for gathering requirements varies between institutions (four institutions take 1 week to 1 month, two take 1 to 3 months, and two take over 3 months). Regarding the analysts' backgrounds, all institutions consider requirements elicitation a critical stage in software development, leading them to hire analysts with IT educational backgrounds, most of whom possess significant work experience. This is further evidenced by the fact that all institutions consider staff experience when forming requirements analysis teams and assigning senior staff to specific roles. There is limited practical variation in the sources of requirements and elicitation techniques. All institutions rely on objectives, domain knowledge, stakeholders, and the operational environment as sources of requirements. As for elicitation techniques, they primarily use interviews, facilitated meetings, and document reviews.
Evaluasi Tingkat Kesiapan Keamanan Informasi Pada SMK XYZ Menggunakan Indeks KAMI Versi 4.2 Imtikhan Azmi, Himawan; tulus_akbar; Tasya Kumala Dewi, Bella; Sugiantoro, Bambang
Cyber Security dan Forensik Digital Vol. 7 No. 1 (2024): Edisi Bulan Mei Tahun 2024
Publisher : Fakultas Sains dan Teknologi UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/csecurity.2024.7.1.4422

Abstract

Keamanan informasi penting untuk diperhatikan agar kerahasiaan informasi, data, manusia dan alat pendukung terlindungi. Namun, bahaya ancaman dalam bidang TI mengintai penyelenggara sistem elektronik (PSE), kejahatan yang timbul tidak hanya menyerang organisasi besar, melainkan menyerang berbagai tingkatan,   ukuran, maupun tingkat kepentingan organisasi penyelenggara layanan TI. Oleh karena itu pentingnya melakukan evaluasi ke penyedia layanan informasi untuk memaksimalkan sumberdaya dalam menghadapi ancaman. Tujuan penelitian ini untuk melakukan evaluasi penyelenggaraan layanan TI  menggunakan Indeks KAMI pada SMK XYZ. Proses evaluasi dilakukan dengan pendekatan kuantitatif. Data dikumpulkan dari hasil wawancara dan observasi dari PSE. Data yang terkumpul kemudian di analisis menggunakan aplikasi Indeks KAMI 4.2. Hasilnya, SMK XYZ termasuk kategori Rendah dengan skor SE 14, dengan status kesiapan Tidak Layak dengan skor Tingkat Penerapan Standar ISO27001 sesuai Kategori SE yaitu 314. Skor tiap area yang dievaluasi yaitu Tata Kelola memperoleh skor 72 dengan tingkat kematangan valid Tingkat II, Pengelolaan Risiko memperoleh skor 15 dengan tingkat kematangan valid Tingkat I, Kerangka Kerja Keamanan Informasi memperoleh skor 91 dengan tingkat kematangan valid Tingkat II, Pengelolaan Aset memperoleh skor 78 dengan tingkat kematangan valid Tingkat I+, Teknologi dan Keamanan Informasi memperoleh skor 58 dengan tingkat kematangan valid Tingkat II, dan bagian terakhir adalah Suplemen sebagai bagian tambahan pengukuran dengan tiga aspek di dalamnya yaitu aspek Pengamanan Keterlibatan Pihak Ketiga memperoleh nilai 33%, aspek Pengamanan Layanan Infrastruktur Awan memperoleh nilai 33%, dan aspek Perlindungan Data Pribadi memperoleh nilai 67%. Hasil evaluasi kesiapan (kelengkapan dan kematangan) yang telah dilakukan menjadi perhatian untuk meningkatkan keamanan informasi pada area dilakukan. Kata kunci: Indeks KAMI, SMKI, Keamanan Informasi, ISO/IEC27001:2013 ---------------------------- Ensuring information security is imperative to safeguard the confidentiality of data, individuals, and supporting tools. However, persistent threats in the realm of Information Technology (IT) pose a constant risk to electronic system providers. These threats target organizations of diverse sizes, levels, and interests within the IT service domain. Consequently, evaluating information service providers becomes crucial for optimizing resources in countering potential threats. This study focuses on assessing IT service delivery using the KAMI Index at SMK XYZ, employing a quantitative approach. Data is gathered through interviews and observations within the electronic system provider context. The collected data is then analyzed using the OUR Index 4.2 application. The evaluation reveals that SMK XYZ falls into the Low category, scoring 14 in the SE index, indicating an Unfit readiness status with an ISO27001 Standard Implementation Level score of 314, aligning with the SE Category. Further analysis of specific areas shows varying maturity levels. Governance scores 72 at Level II, Risk Management scores 15 at Level I, Information Security Framework scores 91 at Level II, Asset Management scores 78 at Level I +, and Technology and Information Security scores 58 at Level II. The Supplement section, addressing additional measurement aspects, records scores of 33% for Securing Third Party Involvement, 33% for Securing Cloud Infrastructure Services, and 67% for Personal Data Protection. These findings underscore the need for enhanced information security measures within the evaluated context. Keywords: KAMI Index, SMKI, Information Security, ISO/IEC27001:2013.
Comparison of KNN and Random Forest Algorithms on E-Commerce Service Chatbot Zamakhsyari, Fardan; Makayasa, Bagas Adi; Hamami, R. Abudullah; Akbar, Muhammad Tulus; Cahyono, Andi; Amirullah, Amirullah; Hisyamuddin, Muhammad Zida; Siregar, Maria Ulfah
JISKA (Jurnal Informatika Sunan Kalijaga) Vol. 10 No. 1 (2025): January 2025
Publisher : UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/jiska.2025.10.1.100-109

Abstract

Technology has a profound influence on our lives, with the expansion of e-commerce being a significant outcome that warrants attention. Given the prevalence of smartphones equipped with messaging apps and fast networks, people often utilize these platforms to communicate with sellers, offering a convenient way for sellers to engage efficiently with a diverse customer base. Recognizing this trend, there is a need for digital transformation of services to improve operational efficiency. Thus, this study aimed to compare the efficiency of classification algorithms in e-commerce service chatbots. The researcher employed machine learning techniques, specifically KNN and Random Forest algorithms, in this case. To assess the feasibility of the application, the chatbot results will be tested using the confusion matrix method to determine accuracy. From this study, it was found that the KNN method, combined with calculating word weight using TF-IDF, produces an accuracy value of 71.4%, thus confirming its feasibility.
Sinergi Pemerintah dan Perguruan Tinggi: Strategi Relevan untuk Peningkatan Kualitas SDM Berkelanjutan Elfisa, Yesi; Akbar, Muhammad Tulus
Vox Populi: Jurnal Umum Pengabdian Kepada Masyarakat Vol 2 No 2 (2025): Vox Populi: Jurnal Umum Pengabdian Kepada Masyarakat
Publisher : PT. Meja Ilmiah Publikasi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70308/voxpopuli.v2i2.115

Abstract

Access to quality education is a fundamental right of every citizen and is guaranteed by the 1945 Constitution of Indonesia. To realize education that is both character-driven and aligned with local cultural values, structured regulations and appropriate policies are required to ensure alignment with established educational frameworks. This community service activity aims to explore and strengthen the collaboration between local government and higher education institutions in formulating strategies to sustainably improve the quality of human resources (HR). A descriptive qualitative approach was employed, gathering insights and perspectives from key stakeholders directly involved in the education sector. Data were collected through observation, interviews, and documentation, involving representatives from local government, education practitioners, academics, members of the Islamic Students Association (HMI) Bangko Branch, students from Universitas Merangin and IAI Syeh Maulana Qory, as well as independent local journalists. The involvement of various sectors was intended to enrich the discourse and produce applicable solutions to existing educational challenges. The findings highlight the need for synergy among all stakeholders to establish an inclusive, adaptive, and competitive education system. Through this collaborative approach, it is expected that the development of superior, creative, and globally competitive human resources can be achieved. This activity emphasizes the importance of transforming the education system by strengthening the collective role of all parties involved in order to respond effectively to the demands of globalization and societal change.