Claim Missing Document
Check
Articles

Found 4 Documents
Search

Pengembangan Sistem Customer Relationship Management (CRM) Berbasis Web Dengan Workflow Dinamis Untuk Peningkatan Proses Penjualan Fadilah, Muhamad Akbar; Ratna Yulika Go; Hermansyah; Imam Sutanto
The Indonesian Journal of Computer Science Vol. 14 No. 5 (2025): The Indonesian Journal of Computer Science
Publisher : AI Society & STMIK Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33022/ijcs.v14i5.4840

Abstract

The limitations of conventional static and inflexible Customer Relationship Management (CRM) systems have resulted in significant challenges in adapting to the specific needs of various types of businesses, with PerFormance being restricted in terms of flexibility to adapt to market changes. After implementing a CRM system with a static Workflow, PT Rintis Sejahtera recorded significant improvements, such as a 35% increase in customer request handling speed and a 28% increase in customer satisfaction. This research aims to develop a web-based CRM system with dynamic Workflows that can enhance operational Efficiency and effectiveness, allowing it to adapt to future changes. The study focuses on implementing web technologies to design and develop a CRM system capable of adjusting Workflows according to the specific needs of the user company. The research methodology used in this study includes the PIECES framework and the Waterfall model. The PIECES approach covers aspects such as PerFormance, InFormation, Economics, Control, Efficiency, and Service, which are applied to analyze and design a better CRM system. Additionally, the Waterfall method is used to ensure that each stage of system development, from requirements analysis to testing, is carried out sequentially and systematically. The combination of these two methods aims to produce a functional system that meets user expectations. The results of the study show that the web-based CRM system with dynamic Workflows successfully improved operational Efficiency and effectiveness by 50% in customer request handling speed and 45% in customer satisfaction. System testing was conducted using the Black Box Testing method, with the evaluated indicators focusing on the Expected Results of each system function, such as respone speed, the ability to manage dynamic Workflows, and user satisfaction levels. The test results indicate that the system is fully functional and meets all expected requirements.
Rancang Bangun Sistem HRIS Berbasis Web dengan Metode Extreme Programming (Studi Kasus: PT Cleasindo Soultamajaya) Ahmad Rudianto; Imam Sutanto
IKRA-ITH Informatika : Jurnal Komputer dan Informatika Vol. 9 No. 3 (2025): IKRAITH-INFORMATIKA Vol 9 No 3 November 2025
Publisher : Fakultas Teknik Universitas Persada Indonesia YAI

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37817/ikraith-informatika.v9i3.5673

Abstract

Penelitian ini adalah untuk merancang dan membangun Sistem Informasi Sumber Daya Manusia (HRIS)berbasis web di PT Cleasindo Soultamajaya menggunakan metode Extreme Programming (XP). Metode XPdipilih karena mendukung pengembangan sistem yang fleksibel dan kolaboratif antara tim pengembang danpengguna. Sistem HRIS ini membantu perusahaan membuat laporan dan mengelola izin, cuti, absensi, dan datalainnya. Analisis kebutuhan, perancangan, implementasi, dan pengujian adalah seluruh proses pengembangansistem. Hasil pengujian menunjukkan bahwa sistem ini dapat membantu dalam mengelola SDM dengan lebihefisien. Namun, hasil uji System Usability Scale (SUS) menunjukkan bahwa sistem masih memilikikekurangan, terutama dalam hal antarmuka pengguna dan navigasi. Oleh karena itu, sistem HRIS ini dapatmembantu operasional perusahaan; namun, diperlukan perbaikan tambahan agar lebih mudah digunakan dankonsisten secara visual dan fungsional.Kata kunci : Sistem Informasi Sumber Daya Manusia, HRIS, Extreme Programming, PengujianKegunaan, Pengelolaan Sumber Daya Manusia.
Penerapan Pentesting pada EasyCart untuk Menghadapi Ancaman Keamanan Siber Mochamad Fahrul Reza; Imam sutanto
IKRA-ITH Informatika : Jurnal Komputer dan Informatika Vol. 10 No. 1 (2026): IKRAITH-INFORMATIKA Vol 10 No 1 Maret 2026
Publisher : Fakultas Teknik Universitas Persada Indonesia YAI

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37817/ikraith-informatika.v10i1.5707

Abstract

Perkembangan e-commerce di era digital telah meningkatkan risiko keamanan siber, menjadikan aplikasie-commerce target utama serangan karena menyimpan data sensitif pengguna. Penelitian ini bertujuanmelakukan evaluasi keamanan sistematis pada EasyCart, sebuah aplikasi e-commerce berbasis Angular,Node.js, Express, dan SQLite. Evaluasi dilakukan melalui metode penetration testing berdasarkan standarPenetration Testing Execution Standard (PTES) yang mencakup tujuh tahapan utama, dengan analisiskerentanan mengacu pada OWASP Top 10. Hasil pengujian menunjukkan bahwa EasyCart memilikibeberapa kerentanan kritis, seperti injeksi SQL, cross-site scripting (XSS), dan broken access control.Penelitian ini juga menyajikan hasil perbandingan keamanan sebelum dan sesudah mitigasi diterapkanuntuk menilai efektivitas perbaikan. Pendekatan ini terbukti efektif dalam mengidentifikasi kerentanan dandiharapkan dapat berkontribusi pada pengembangan sistem e-commerce yang lebih aman dan andal.Kata kunci : keamanan siber, penetration testing, e-commerce, OWASP Top 10, PTES.
KEAMANAN TRANSMISI DATA PADA SISTEM IOT MELALUI PENERAPAN METODE CHECKSUM SHA-256, AES-128 UNTUK PENCEGAHAN DATA TAMPERING I Putu, I Putu Bayu Krisna Priastawan; Nugroho budhisantosa; Popong Setiawati; Imam Sutanto
STORAGE: Jurnal Ilmiah Teknik dan Ilmu Komputer Vol. 4 No. 4 (2025): November
Publisher : Yayasan Literasi Sains Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55123/storage.v4i4.6428

Abstract

MQTT is a communication protocol in IoT that operates using a publish-subscriber scheme, where the publisher sends data to the broker and the data is forwarded to subscribers that are subscribed to the respective topic. Protecting data from cyberattack threats is one of the critical aspects, particularly against manipulation attempts such as data tampering attacks that can make it inaccurate and even potentially produce false information. Therefore, methods such as the SHA-256 checksum, the salt technique, and AES-128 can be utilized to prevent data tampering threats. Based on the testing results, the average detection and prevention rate of data tampering attacks reached 100%, and the average amount of data successfully received by the subscriber was 94% of the total topic data transmissions during the testing. The developed security system is not yet perfect, because the system can only prevent attacks on the subscriber side. To fully prevent data tampering attack, additional security measures such as TLS, SSL, or using port 8883 on MQTT are required so that communication can take place privately.