Claim Missing Document
Check
Articles

Found 2 Documents
Search

Analisis dan Perancangan Sales Monitoring System Menggunakan Metode Rapid Application Development Nurmiati, Evy; Azizah, Hafidh; Kamil, Musthafa
TIN: Terapan Informatika Nusantara Vol 6 No 3 (2025): August 2025
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/tin.v6i3.8110

Abstract

In this competitive digital era, companies are required to have information systems that can support quick and accurate decision making. PT. ABC is one of the companies facing several challenges in managing sales division activities, which are still carried out manually using spreadsheets. This causes difficulties in monitoring sales performance in real time, increases the risk of data duplication, and reduces the effectiveness of strategic decision making. This study aims to analyze and design a web-based sales monitoring system to support the company's strategic decision-making. The research method used is Rapid Application Development (RAD) with data collection methods including observation, interviews, and literature review, as well as PIECES analysis to evaluate the weaknesses of the current system, and the MoSCoW method to prioritize system features. The results of this research include a system design comprising an interactive dashboard, sales activity recording, team structure management, target setting, and structured reporting. The system is designed using the UML modeling language, which includes use cases, activity diagrams, sequence diagrams, and class diagrams, as well as a user interface prototype.
MULTI – FACTOR AUTHENTICATION DALAM MENINGKATKAN KEAMANAN PERANGKAT IOT TERHADAP SERANGAN SIBER: SYSTEMATIC LITERATURE REVIEW Azizah, Hafidh
POSITIF : Jurnal Sistem dan Teknologi Informasi Vol 12 No 1 (2026): Positif : Jurnal Sistem dan Teknologi Informasi
Publisher : P3M Politeknik Negeri Banjarmasin

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31961/positif.v12i2.14594

Abstract

Security aspects in the development and deployment of IoT devices are often crucial but overlooked. This is evident from the number of IoT devices that are faced with cyber threats due to suboptimal security systems. The reason for this problem is because during the development stage of IoT devices, some developers do not pay special attention to the implementation of strong security protocols. Based on these problems, this literature review aims to examine the extent to which Multi-Factor Authentication (MFA) can improve the security of IoT devices, especially in the face of increasingly complex cyber attacks. This literature review uses the Systematic Literature Review (SLR) method with the PRISMA framework approach to ensure a systematic and analytical review of related literature. Of the 155 journals traced with a time span of 2010 - 2024, 21 journals were obtained that met the predetermined eligibility criteria. Based on the results of the literature review, the implementation of Multi-Factor Authentication (MFA) on Internet of Things (IoT) devices is considered capable of mitigating and handling several security attack threats such as brute force attacks, Man-in-the-Middle (MITM), insider attacks, replay attacks, and other attacks.