Claim Missing Document
Check
Articles

Found 8 Documents
Search
Journal : Journal on Pustaka Cendekia Informatika

Analisis Kinerja Fungsional pada Aplikasi Mobile JKN Melalui Pengujian Black Box Testing Ratna Santika; Santi Febrianti; Sam’un Hakeki; Udan; Yusup Supriyanto; Zidan Fajar Abdillah; Subhanjaya Angga Atmaja
Journal on Pustaka Cendekia Informatika Vol. 3 No. 1 (2025): Journal on Pustaka Cendekia Informatika: Volume 3 Nomor 1 February - May 2025
Publisher : PT Pustaka Cendekia Group

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70292/pctif.v3i1.47

Abstract

Digital transformation in Indonesia's health sector has accelerated significantly since the implementation of the National Health Insurance (JKN) program by BPJS Kesehatan, particularly through the Mobile JKN application. This application aims to simplify public access to health services and information; however, various technical issues are still frequently encountered. This study aims to evaluate the functional performance of the Mobile JKN application using the Black Box Testing method, specifically the Equivalence Partitioning and Boundary Value Analysis techniques. The research adopts a qualitative descriptive approach through participatory observation of the latest version of the application. The testing focuses on core features such as registration, login, healthcare service registration, and user data modification. Test results are categorized into three outcomes: fully functional, partially functional, and non-functional. The findings show that most features operate properly and as expected, while the system also consistently rejects invalid inputs. This research contributes theoretically to the literature on e-health software testing and provides practical recommendations for developers and policymakers to enhance the quality of BPJS Kesehatan’s digital services.
Penerapan Black Box Testing Menggunakan Teknik Equivalence Partitioning pada Sistem Informasi Akademik (SIAKAD) Kampus UKRI Destyan Fadillah Akbar; Leo Restu Septian Rhaka Nugraha; Prayogi Nur Aldi; Alif Prambudi Fadillah Akbar; Farid Zia Ulhaq; Subhanjaya Angga Atmaja
Journal on Pustaka Cendekia Informatika Vol. 3 No. 1 (2025): Journal on Pustaka Cendekia Informatika: Volume 3 Nomor 1 February - May 2025
Publisher : PT Pustaka Cendekia Group

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70292/pctif.v3i1.49

Abstract

Digital transformation in higher education demands the reliability of academic information systems in supporting administrative and academic processes for students in an independent and efficient manner. The Academic Information System (SIAKAD) serves as a vital tool in managing student academic data, including login, payment, attendance, document printing, as well as leave applications and account data changes. This study aims to evaluate the functionality of the SIAKAD at Universitas Kebangsaan Republik Indonesia (UKRI) from the students’ perspective using the black box testing method with the Equivalence Partitioning technique. The study employs a descriptive qualitative approach, with data collection techniques including direct observation and documentation of system testing results based on valid and invalid inputs. The testing results indicate that all core features function as expected; input validation, notifications, and user interaction flows operate properly and consistently. These findings contribute to the development of web- based academic systems, particularly in the application of efficient testing techniques focused on user experience. This study also opens avenues for further exploration into system performance, security, and testing for other user roles in the future.
Penerapan Black Box Testing pada Website Cobalt.tools untuk Pengujian Fungsionalitas Pengunduhan Media M. Sunandi; Devan Zulfangga; Dede Ardiansah; Muhammad Rasyid Shiddiq; Siti Rahmah; Subhanjaya Angga Atmaja
Journal on Pustaka Cendekia Informatika Vol. 3 No. 1 (2025): Journal on Pustaka Cendekia Informatika: Volume 3 Nomor 1 February - May 2025
Publisher : PT Pustaka Cendekia Group

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70292/pctif.v3i1.55

Abstract

This study aims to assess the core functionalities of Cobalt.tools in supporting cross-platform media downloads using the Black Box Testing approach and the Equivalence Partitioning technique. The research employs a descriptive quantitative design, focusing on testing 11 scenarios involving download and configuration features. Each scenario was evaluated based on the alignment between system input and output without examining the internal code structure. Data were collected manually through direct observation and recorded in a test table, then analyzed using quantitative descriptive techniques to measure functional success rates. The results show that all major features of the site operated as expected, with a 100% success rate, confirming the hypothesis regarding the platform’s functional reliability. These findings affirm the effectiveness of Black Box Testing in user interface-based system evaluation. This study contributes to the literature on web-based system testing and offers practical insights for developers seeking to enhance application stability and user experience. Future research is recommended to explore aspects such as security, integration, and system performance on a broader scales.
Pengujian Black Box pada Fitur Pendaftaran Online RSUD Kota Bandung dengan Teknik Boundary Value Analysis Cahya Purnama Aji; Azhar Havis; Ridwan; Piqri Nabila Mulia; Subhanjaya Angga Atmaja
Journal on Pustaka Cendekia Informatika Vol. 3 No. 1 (2025): Journal on Pustaka Cendekia Informatika: Volume 3 Nomor 1 February - May 2025
Publisher : PT Pustaka Cendekia Group

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70292/pctif.v3i1.56

Abstract

Software testing is an important process in ensuring the quality and reliability of a system. This study aims to evaluate the online registration feature on the official website of the Bandung City Hospital using the Black Box Testing technique with the Boundary Value Analysis (BVA) approach. The BVA technique was chosen because it is effective in identifying software defects that may occur in input boundary values, which are often the source of critical errors in the system. Testing focused on several important inputs in the registration process, such as the population registration number (NIK), BPJS card number, and cellphone number. The test results showed that the system was able to handle most of the boundary values ​​well, but there were several inconsistencies in input validation that could result in registration failure. These findings indicate the importance of implementing systematic and in-depth testing methods to improve system reliability, especially in digital-based public services.
Analisis Kerentanan Web Menggunakan ZAP oleh Checkmarx pada Situs Kuliah Daring LMS Universitas Kebangsaan Republik Indonesia: Penelitian Mughni Al Muzaki; Reksi Zender Perdian; Rohman Fajar; Saripah; Syifa Khofifah; Subhanjaya Angga Atmaja
Journal on Pustaka Cendekia Informatika Vol. 3 No. 1 (2025): Journal on Pustaka Cendekia Informatika: Volume 3 Nomor 1 February - May 2025
Publisher : PT Pustaka Cendekia Group

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70292/pctif.v3i1.63

Abstract

This study aims to conduct a security analysis on the online lecture site using the ZAP (Zed Attack Proxy) tool version 2.16.1, developed by OWASP and distributed by Checkmarx. The method used is black-box testing with an active scanning approach to identify security vulnerabilities that may exist in the application. The scanning process was carried out on all main pages and site resources, paying attention to various aspects such as HTTP headers, session management, JavaScript library usage, and other security configurations. The results of the scanning process showed 14 potential vulnerabilities classified into four risk levels: high (1 finding), medium (4 finding), low (6 finding), and informational (3 finding). The most significant findings were the use of a vulnerable (outdated) JavaScript library, the absence of a content security policy (CSP), and deficiencies in the implementation of important HTTP headers such as X-Frame-Options, Strict-Transport-Security, and X-Content-Type-Options. In addition, weaknesses in cookie attributes and the use of external JavaScript files without adequate source control were also found. Based on these results, a series of recommendations were developed that adhere to OWASP standards, including updating software libraries, reconfiguring security headers, strengthening session management, and implementing more secure cache policies.
Pengujian Black Box Shopee PayLater dengan Boundary Value, Equivalence Partitioning, dan Use Case: Penelitian Aji Nata Sobari; Arya Nugraha; Haekal Abdullah Ali Akbar Fajar Ramadhan; Muhammad Lukman Abdurahman; Muhammad Supyan; Trisna Prawijaya; Subhanjaya Angga Atmaja
Journal on Pustaka Cendekia Informatika Vol. 3 No. 1 (2025): Journal on Pustaka Cendekia Informatika: Volume 3 Nomor 1 February - May 2025
Publisher : PT Pustaka Cendekia Group

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70292/pctif.v3i1.64

Abstract

Buy Now Pay Later (BNPL) services such as Shopee PayLater have transformed consumer transaction patterns by offering convenience and flexibility in shopping. However, systems like this also carry high risks if not accompanied by adequate software testing. This article presents a study aimed at evaluating the reliability of the Shopee PayLater system using the Black Box Testing approach with Boundary Value Analysis (BVA) and Equivalence Partitioning (EP) techniques, combined with user-based use case scenarios. This method allows for testing various input variations, especially at boundary values and data structure validity. Out of 14 test cases executed, 11 successfully detected input errors accurately, while the remaining 3 failed to handle certain conditions, such as character length and OTP format. The Defect Removal Efficiency (DRE) obtained was 21.43%, indicating that the effectiveness of testing can still be improved. Overall, this approach has proven to enhance testing coverage and detect relevant potential errors in digital financial systems.
Pengujian Aplikasi KAI Access Menggunakan Black Box Testing Boundary Value Analysis (BVA) Miftah Nur Rohman; Rahman Fauza; Denita Alhamdina Putri Arisandi; Nabila Desiana; Aliya Tazkiya Fajriyati; Chris Hendry Choong; Subhanjaya Angga Atmaja
Journal on Pustaka Cendekia Informatika Vol. 3 No. 1 (2025): Journal on Pustaka Cendekia Informatika: Volume 3 Nomor 1 February - May 2025
Publisher : PT Pustaka Cendekia Group

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70292/pctif.v3i1.48

Abstract

This study aims to evaluate the functionality of the KAI Access application using Black Box Testing methods, specifically Boundary Value Analysis (BVA) and Graph-based Testing. The testing was conducted on key features such as registration, login, KAI Pay activation, and local ticket booking. The results indicate that while most features function as expected, there are notable issues—such as the lack of character limits in the email input field. This approach provides a comprehensive overview of the application's reliability and identifies areas that need improvement to enhance the quality of service.
Analisis Kerentanan Web Menggunakan ZAP oleh Checkmarx pada Website FIKSI (Fakultas Ilmu Komputer dan Sistem Informasi) Universitas Kebangsaan Republik Indonesia M. Abie Rafdi Fauzy; Restu Rahmat Fajri; Rian Hidayat; Salsabila Rosnie; Thomas Aldi Fikri; Subhanjaya Angga Atmaja
Journal on Pustaka Cendekia Informatika Vol. 3 No. 1 (2025): Journal on Pustaka Cendekia Informatika: Volume 3 Nomor 1 February - May 2025
Publisher : PT Pustaka Cendekia Group

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70292/pctif.v3i1.68

Abstract

This study aims to identify and analyze security vulnerabilities in faculty web applications using the Zed Attack Proxy (ZAP) automated tool developed by OWASP and now managed by Checkmarx. Using a descriptive quantitative approach, a scan was conducted on the public domain cdnjs.cloudflare.com which has a technical structure similar to the faculty web system. The scan results found four vulnerabilities, namely: use of a vulnerable JavaScript library (moment.js) (high risk), insecure Cross-Origin Resource Sharing (CORS) configuration (medium risk), suspicious comments in the code (informational risk), and inappropriate cache settings (informational risk). These findings are analyzed based on the OWASP Top 10 categories, and are complemented by mitigation recommendations for each risk. In addition, a visualization of the distribution of alerts is presented based on the level of risk and confidence. The results of this study emphasize the importance of routine scanning and manual validation in maintaining the security of higher education institution web applications.
Co-Authors A. A. H. Ahmad Almulqu Adhinda Adeliana Putri Aida Sucia Aji Nata Sobari Al Afif Abdurrahman Aldi Tamangunde Alif Prambudi Fadillah Akbar Aliya Tazkiya Fajriyati Alya Mustika Anandha Pramudhita Arya Abdul Mughni Arya Nugraha Arya Sultansyah Asgar Maulana Astri Sri Rahayu Azhar Havis Cahya Purnama Aji Chintya Racheysa Hazna Chris Hendry Choong Danti Rosdianti Dede Ardiansah Denita Alhamdina Putri Arisandi Destyan Fadillah Akbar Devan Zulfangga Eki Muhammad Heris Elsa Nur Aripin Farid Zia Ulhaq Firmansyah Firmansyah Haekal Abdullah Ali Akbar Fajar Ramadhan Haqiqy Hakim Hendri Purnandi Hendri Purnandi Heri Bani Jumawan Idham Nurcahya Muharam Ihsan Alfazri Ikhsan Akbar Muslim Iqbal Yudiana Iwan Eka Putra Khairunnisa Dwi Wahyuningtyas Laksamana Raihan N Leo Restu Septian Rhaka Nugraha M. Abie Rafdi Fauzy M. Ridho M. Sunandi Miftah Nur Rohman Mughni Al Muzaki Muhamad Aditya Suhendar Muhamad Ardho Surya Leksana Muhamad Ghozali Muhamad Nabil Arrafi Muhammad Ghozali Muhammad Lukman Abdurahman Muhammad Rasyid Shiddiq Muhammad Supyan Nabila Desiana Neng Eva Masliah Nurwijayanti Padjrin Fauzi Piqri Nabila Mulia Prayogi Nur Aldi Putra, Iwan Eka Raafi Syarahil Azhar Rahman Fauza Rahmat Hidayat Ratna Santika Reksi Zender Perdian Restu Rahmat Fajri Rian Hidayat Ridwan Rifa Vida Zahrani Risnawati Agustin Hutabarat Rizqia Noerlidha Rohman Fajar Ruth Rize Paas Megahati S Salsabila Rosnie Sam’un Hakeki Sandi Sandi Rosandi Saobandri, Ridwan Saripah Sindi Meilani Sinduano siti rahmah Siti Salwa Az’Zahra Suminar Suminar Syifa Khofifah Thomas Aldi Fikri Tiara Putri Latifani Dianata Trisna Prawijaya Tuti Rohayati Udan Yusup Supriyanto Zidan Fajar Abdillah