Claim Missing Document
Check
Articles

Found 8 Documents
Search

The Development of 5G Technology and Its Implications For The Industry Elan Maulani, Isma; Amalia Johansyah, Citra
Devotion : Journal of Research and Community Service Vol. 4 No. 2 (2023): Devotion: Journal of Research and Community Service
Publisher : Green Publisher Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36418/devotion.v4i2.416

Abstract

The development of 5G technology is very important in today's technological world. These technologies are bringing about significant changes in the way we interact with the digital world and are changing the way we use technology. The speed offered by 5G technology makes it possible to carry out data transfers very quickly, opening up opportunities for new applications and services in various sectors. The implications of the development of 5G technology on industry are huge and can affect various aspects, such as productivity, efficiency, and innovation. In the production sector, 5G technology makes it possible to speed up the production process and increase efficiency by using industrial technology 4.0. Within the service sector, 5G technology makes it possible to provide faster and high-quality services, such as more stable and faster video streaming services. On the other hand, the development of 5G technology also carries implications that must be considered, such as security and privacy issues. The speed offered by 5G technology makes it easier to carry out attacks and access personal data. Therefore, it is important for the industry to ensure that the 5G technology used meets the established security standards. The development of 5G technology brings significant changes in the industry and opens up new opportunities in various sectors. The implications of the development of 5G technology are huge and affect productivity, efficiency, and innovation. However, it is important for the industry to ensure that the 5G technology used meets established security standards to avoid security and privacy concerns.
Development of E-Commerce Website Recommender System Using Collaborative Filtering and Deep Learning Techniques Oga Laksana, Medika; Elan Maulani, Isma; Munawaroh, Siti
Devotion : Journal of Research and Community Service Vol. 4 No. 2 (2023): Devotion: Journal of Research and Community Service
Publisher : Green Publisher Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36418/devotion.v4i2.417

Abstract

Recommender system or recommendation system is becoming an increasingly important technology on e-commerce websites to help users find products that suit their preferences. However, the growing number of users and products makes finding the right product difficult. Therefore, this study aims to develop a recommender system on e-commerce websites using collaborative filtering and deep learning techniques. Collaborative filtering is used to find similarities between users based on their preferences, while deep learning is used to improve the performance of the recommender system in generating more accurate recommendations. The test method is carried out by comparing the performance of the recommender system developed with the recommender system that already exists on the e-commerce website. The results of the test show that the recommender system developed is able to provide recommendations that are more accurate and more in line with user preferences compared to the existing recommender system.
Bug Bounty Hunting: A Case Study of Successful Vulnerability Discovery and Disclosure Elan Maulani, Isma; Anggraeni, Riska
Devotion : Journal of Research and Community Service Vol. 4 No. 8 (2023): Devotion: Journal of Research and Community Service
Publisher : Green Publisher Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59188/devotion.v4i6.486

Abstract

This research is a case study on bug bounty hunting as a successful approach to finding and uncovering vulnerabilities in software. The purpose of this study is to understand the effectiveness of bug bounty hunting and its benefits in improving company security. Qualitative research methods were used by analyzing data from bug bounty programs that were successful in finding significant vulnerabilities. The results showed that bug bounty hunting proved to be effective in capturing various types of vulnerabilities, including web application vulnerabilities, network protocol vulnerabilities, hardware security vulnerabilities, and mobile app vulnerabilities. Security researchers play a critical role in the success of the bug bounty hunt, with their expertise in bug hunting and deep understanding of the technology. The benefits of bug bounty hunting include increased software security, cost efficiency, and increased company reputation for security and credibility. However, challenges such as finding hidden vulnerabilities and coordinating with enterprises need to be overcome. Recommendations include strengthening collaboration between enterprises and security researchers, establishing effective communication channels, and proactively responding to vulnerability reports.
Implementation Of Object-Oriented Programming With Pyqt: Development Of Calculation Application Elan Maulani, Isma; Azis, Irfan; Cahya, Melani Nur; Komarudin, Komarudin; sagita, Ahmad bahar
Devotion : Journal of Research and Community Service Vol. 5 No. 1 (2024): Devotion: Journal of Research and Community Service
Publisher : Green Publisher Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59188/devotion.v5i1.679

Abstract

This practical report discusses the implementation of object-oriented programming using PyQt in developing calculation applications. The discussion includes application development steps, object structure, and responsive user interface integration. The development method used incorporates object-oriented programming concepts to increase modularity and maintainability of the code. The resulting calculation application is able to provide an interactive and efficient user experience. It is hoped that the results of this practicum can be a reference for students of object-oriented programming and application development using PyQt
Menggali Potensi Komunikasi Nonverbal dalam Interaksi Manusia pada Pola Komunikasi Lingkaran Humam Ramadhan, Fatih; Faizatuz Zuhriyah, Nabila; Siti Marlina, Nina; Elan Maulani, Isma
Edunity Kajian Ilmu Sosial dan Pendidikan Vol. 2 No. 2 (2023): Edunity : Social and Educational Studies
Publisher : PT Publikasiku Academic Solution

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1719.707 KB) | DOI: 10.57096/edunity.v2i2.64

Abstract

Komunikasi nonverbal merupakan aspek penting dalam interaksi manusia. Tidak menggunakan kata-kata, tetapi gerakan tubuh, ekspresi wajah, nada suara, dan bahasa tubuh dapat memberikan informasi yang sama pentingnya dengan kata-kata. Tujuan dari penelitian ini adalah untuk menggali potensi komunikasi nonverbal dalam interaksi manusia. Metode penelitian yang digunakan adalah studi literatur, observasi, wawancara, eksperimen, dan kajian kasus. Dalam studi literatur, peneliti mengumpulkan informasi terkait teori-teori, konsep, dan model terkait komunikasi nonverbal. Observasi dilakukan pada orang-orang yang sedang berinteraksi untuk mengamati gerakan tubuh, ekspresi wajah, nada suara, dan bahasa tubuh yang digunakan dalam interaksi. Wawancara dilakukan dengan narasumber yang ahli dalam bidang komunikasi nonverbal atau dengan orang-orang yang memiliki pengalaman dalam berinteraksi dengan orang lain. Eksperimen dilakukan dengan mengatur situasi tertentu dan meminta partisipan untuk berinteraksi. Dalam kajian kasus, peneliti mempelajari interaksi manusia dalam konteks tertentu, seperti dalam bisnis, pendidikan, atau hubungan interpersonal. Hasil penelitian menunjukkan bahwa komunikasi nonverbal dapat mempengaruhi cara kita berkomunikasi dengan orang lain, bahkan dapat membantu memperkuat atau memperlemah pesan yang disampaikan. Dengan memahami dan menguasai komunikasi nonverbal, kita dapat meningkatkan keterampilan komunikasi kita dalam berbagai situasi. Penelitian ini memberikan pemahaman yang lebih luas tentang pentingnya komunikasi nonverbal dalam kehidupan sehari-hari.
Evaluasi Efektivitas Sistem Deteksi Intrusi Dalam Menjamin Keamanan Jaringan Elan Maulani, Isma; faisal umam, Aldo
Jurnal Sosial Teknologi Vol. 3 No. 8 (2023): Jurnal Sosial dan Teknologi
Publisher : CV. Green Publisher Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59188/jurnalsostech.v3i8.907

Abstract

Keamanan jaringan sangat penting dalam era digital yang terus berkembang. Ancaman serangan siber yang kompleks dan tak terduga dapat mengakibatkan kerugian yang signifikan, termasuk pencurian data sensitif dan gangguan pada infrastruktur kritis. Oleh karena itu, penting untuk memiliki sistem deteksi intrusi IDS yang efektif guna menjaga keamanan jaringan. Penelitian ini bertujuan untuk mengevaluasi efektivitas IDS dalam memastikan keamanan jaringan. IDS berperan sebagai garis pertahanan pertama dalam mendeteksi aktivitas mencurigakan atau yang tidak diinginkan dalam jaringan. Dengan mendeteksi dan merespons serangan dengan cepat, IDS dapat membantu mengurangi dampak serangan serta melindungi sumber daya jaringan yang berharga. Namun, dalam memilih dan mengimplementasikan IDS, perlu mempertimbangkan faktor seperti sensitivitas dan spesifisitas deteksi, efisiensi penggunaan sumber daya, dan kemampuan mendeteksi serangan yang semakin canggih. Penelitian ini menggunakan pendekatan kualitatif dengan melibatkan pemilihan sampel organisasi yang menggunakan IDS. Data dikumpulkan melalui wawancara mendalam dengan pemangku kepentingan seperti administrator jaringan, analis keamanan, dan manajer TI.
The Role Of Digital Marketing For Micro, Small And Medium Enterprises In The Era Of The Asean Economic Community Alifah, Nur; Rohmat Hidayat, Agus; Elan Maulani, Isma
Journal of Comprehensive Science Vol. 2 No. 1 (2023): Journal of Comprehensive Science (JCS)
Publisher : Green Publisher Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59188/jcs.v2i1.177

Abstract

Today's technology continues to grow and users begin to feel the benefits of using the internet. Some feel dependence on the presence of the Internet, including the activities of Micro, Small and Medium Enterprises (MSMEs) using information technology in their business, especially in the era of the ASEAN Economic Community (AEC). The purpose of this study is to describe in general the impact of digital marketing on SME sales in Batam City. This research is qualitative in nature and uses a triangular model that combines structured interview methods, in-depth interviews and observations of MSMEs participants who actively participate in Market Community Improvement Services – Cooperatives and SMEs in the City. From the results of the study it can be seen that digital marketing facilitates communication and direct interaction between MSME players and consumers, increasing market share, increasing the visibility of MSME players and increasing sales.
Cross-site scripting (xss) vulnerability in the cirebon district health service web system Elan Maulani, Isma; Kholipah, Siti Ainul; Rihadatul Aisy, Mamduh
Jurnal Indonesia Sosial Teknologi Vol. 5 No. 5 (2024): Jurnal Indonesia Sosial Teknologi
Publisher : Publikasi Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59141/jist.v5i5.1085

Abstract

In an era of rapid growth in information technology, the enormous benefits generated are also accompanied by significant security risks. This research was conducted by an independent security researcher, Isma Elan Maulani, to identify and analyze security vulnerabilities on the Cirebon District Health Service website. The focus of the research centered on the "Search" page, where the main finding was the presence of a Cross-Site Scripting (XSS) vulnerability. XSS opens up the potential for attackers to insert and execute JavaScript scripts within web pages, threatening the security and integrity of data. Tests involving custom input successfully proved that JavaScript scripts could be executed without any sanitization or protection. These findings show the urgency to improve the security of the Cirebon District Health Service website. Recommended remedial steps involve implementing effective input sanitation, more rigorous validation of user input data, and implementing stricter security policies. Collaboration with authorities and cybersecurity researchers is recommended to gain additional insights and more comprehensive solutions. Digital security is not only the responsibility of developers, but also a collective obligation to create a safer and more secure online environment for all users.