cover
Contact Name
Rahmat Hidayat
Contact Email
mr.rahmat@gmail.com
Phone
-
Journal Mail Official
rahmat@pnp.ac.id
Editorial Address
-
Location
Kota padang,
Sumatera barat
INDONESIA
JOIV : International Journal on Informatics Visualization
ISSN : 25499610     EISSN : 25499904     DOI : -
Core Subject : Science,
JOIV : International Journal on Informatics Visualization is an international peer-reviewed journal dedicated to interchange for the results of high quality research in all aspect of Computer Science, Computer Engineering, Information Technology and Visualization. The journal publishes state-of-art papers in fundamental theory, experiments and simulation, as well as applications, with a systematic proposed method, sufficient review on previous works, expanded discussion and concise conclusion. As our commitment to the advancement of science and technology, the JOIV follows the open access policy that allows the published articles freely available online without any subscription.
Arjuna Subject : -
Articles 1,172 Documents
Web Application Penetration Testing Using SQL Injection Attack Alanda, Alde; Satria, Deni; Ardhana, M.Isthofa; Dahlan, Andi Ahmad; Mooduto, Hanriyawan Adnan
JOIV : International Journal on Informatics Visualization Vol 5, No 3 (2021)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.5.3.470

Abstract

A web application is a very important requirement in the information and digitalization era. With the increasing use of the internet and the growing number of web applications, every web application requires an adequate security level to store information safely and avoid cyber attacks. Web applications go through rapid development phases with short turnaround times, challenging to eliminate vulnerabilities. The vulnerability on the web application can be analyzed using the penetration testing method. This research uses penetration testing with the black-box method to test web application security based on the list of most attacks on the Open Web Application Security Project (OWASP), namely SQL Injection. SQL injection allows attackers to obtain unrestricted access to the databases and potentially collecting sensitive information from databases. This research randomly tested several websites such as government, schools, and other commercial websites with several techniques of SQL injection attack. Testing was carried out on ten websites randomly by looking for gaps to test security using the SQL injection attack. The results of testing conducted 80% of the websites tested have a weakness against SQL injection attacks. Based on this research, SQL injection is still the most prevalent threat for web applications. Further research can explain detailed information about SQL injection with specific techniques and how to prevent this attack.
A Survey on Smart Campus Implementation in Malaysia Musa, Masitah; Ismail, Mohd Norasri; Md Fudzee, Mohd Farhan
JOIV : International Journal on Informatics Visualization Vol 5, No 1 (2021)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.5.1.434

Abstract

Universities around the world are actively implementing smart campuses. A smart campus is a campus environment capable of providing efficient technology and infrastructure in providing services to support and improve the teaching process, research, and student experience. It comprises initiatives to better support and enhances the better experience in the teaching and learning process and other services in the campus environment. To successfully implement the initiatives, a framework is required to define the scope of the implementation. Several universities in Malaysia are currently developing initiatives to implement their smart campus. This paper surveyed the literature and resources from universities in Malaysia to identify smart campus initiatives implemented following the smart campus domain. Due to the lack of resources available in the prominent database of indexed journal articles, the main source of review is based on official university sources such as official websites and so on. The result shows that all universities implemented all smart campus domains. Smart Management domain has the highest number of 58% of the overall initiatives. The second highest domain is Smart Learning at 13%, followed by Green Campus at 10%. We also identify that there is new domain of smart campus that was introduced. The new domain is Smart Research. Based on the survey, most universities in Malaysia are actively improving their work processes and the environment by implementing smart campus.
Big Healthcare Data: Survey of Challenges and Privacy Bin Jubeir, Mohammed; Ismail, Mohd Arfian; Kasim, Shahreen; Amnur, Hidra; Defni, -
JOIV : International Journal on Informatics Visualization Vol 4, No 4 (2020)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.4.4.246

Abstract

The last century witnessed a dramatic leap in the shift towards digitizing the healthcare workflow and moving to e-patients' records. Health information is consistently becoming more diverse and complex, leading to the so-called massive data. Additionally, the demand for big data analytics in healthcare organizations is increasingly growing with the aim of providing a wide range of unprecedented potentials that are considered necessary for the provision of meaningful information about big data and improve the quality of healthcare delivery. It also aims to increase the effectiveness and efficiency of healthcare organizations; provide doctors and care providers better decision-making information and help them in the early detection of diseases. It also assists in evidence-based medicine and helps to minimize healthcare cost. However, a clear contradiction exists between the privacy and security of big data and its widespread usage. In this paper, the focus is on big data with respect to its characteristics, trends, and challenges. Additionally, the risks and benefits associated with data analytics were reviewed.
Implementation SEMAR-IoT-Platform for Vehicle as a Mobile Sensor Network Panduman, Yohanes Yohanie Fridelin; Sukaridhoto, Sritrusta; Tjahjono, Anang; Budiarti, Rizqi Putri Nourma
JOIV : International Journal on Informatics Visualization Vol 4, No 4 (2020)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.4.4.425

Abstract

With the rapid development of IoT technology in various fields such as smart cities and industry 4.0, the need for wireless sensor network-based systems has increased, one of which is the concept of using a vehicle as a mobile sensor network or known as VaaMSN. Many developers use the IoT platform as a cloud computing service in developing the VaaMSN system. However, not all IoT platform service providers provide monitoring features on every device and provide information such as device location, purpose, condition. Therefore, this research aims to develop an IoT Platform that can receive data and provide information on each device, making it easier to process data and control devices.  Therefore, this research aims to develop an IoT platform called the SEMAR-IoT-Platform that able to received data and provide information on each device for easier data processing and control devices.  The SEMAR-IoT-Platform integrates Big Data, Data Analytics, Machine Learning, using the principles of Extract, Transfer, and Load (ETL) for data processing and provides communication services using HTTP-POST, MQTT, and NATS.  The test results show that the system has been successfully implemented to complement a simple IoT system with an average delay time of HTTP, NATS, and MQTT communications of less than 150ms for the data storage process, and for the data visualization process has an average delay time of less than 300ms.
Drivers of Cloud Computing Adoption in Small Medium Enterprises of Indonesia Creative Industry Gui, Anderes; Fernando, Yudi; Shaharudin, Muhammad Shabir; Mokhtar, Mazita; Karmawan, I Gusti Made; Suryanto, -
JOIV : International Journal on Informatics Visualization Vol 5, No 1 (2021)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.5.1.461

Abstract

Cloud computing is one of the enablers of Industrial Revolution 4.0 (IR.40). IR 4.0 is advantageous as it allows companies to increase performance and productivity. However, there are many enablers of IR 4.0, such as big data analytics, cloud computing, machine learning, and blockchain. However, the readiest to be used technology is cloud computing. While the advantages of cloud computing are well understood from the perspective of the literature and companies' point of view, the empirical evidence is still scarce. The research explores the drivers of cloud adoption between small and medium-sized enterprises (SMEs) in Indonesia. The study method is a quantitative method through e-survey data collection analyzed using IBM SPSS and Smart PLS software. The recognition of drivers will allow IT decision-makers to design the right platform for SMEs, increasing their company competitiveness. The findings revealed that cloud flexibility, perceived concern, privacy, relative advantage, perceived cost-benefit, quality of service, and top management support are among the top cloud adoption priorities that need to be improved in the creative industry to ensure the adoption of cloud computing more apparent. The study's contribution revealed that cloud computing is no longer at the infant stage in terms of adoption. Thus, the findings paved the way for scholars to undertake future research focusing on cloud computing implementation. Companies, on the other hand, can learn from this research by improving the adoption aspects.
Subjective Norms and Academic Dishonesty: A Decision Tree Algorithm Analysis Dewanti, Patriani Wahyu; Purnama, Ida Ayu; Sukirno, -; Parthasarathy, Karthikeyan
JOIV : International Journal on Informatics Visualization Vol 5, No 1 (2021)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.5.1.423

Abstract

Academic dishonesty becomes an exciting phenomenon to be examined. This research aimed to examine the effect of subjective norms on academic dishonesty. Data were collected from 426 accounting students from public and private universities in Yogyakarta, Indonesia. The data were analyzed with the J48 algorithm decision tree. The interest that happened in the low subjective norms node was divided into public universities and private universities. Based on the decision of tree visualization, male students with the more extended length of study in public universities tended to have lower subjective norms but higher academic dishonesty than their counterparts. The results were discussed, and recommendations were also provided to several relevant parties.
An Improved Flower Pollination Algorithm for Global and Local Optimization Kamboh, M. Iqbal; Mohd Nawi, Nazri Bin; Ramli, Azizul Azhar; Sukma, Fanni
JOIV : International Journal on Informatics Visualization Vol 5, No 4 (2021)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.5.4.738

Abstract

Meta-heuristic algorithms have emerged as a powerful optimization tool for handling non-smooth complex optimization problems and also to address engineering and medical issues. However, the traditional methods face difficulty in tackling the multimodal non-linear optimization problems within the vast search space. In this paper, the Flower Pollination Algorithm has been improved using Dynamic switch probability to enhance the balance between exploitation and exploration for increasing its search ability, and the swap operator is used to diversify the population, which will increase the exploitation in getting the optimum solution. The performance of the improved algorithm has investigated on benchmark mathematical functions, and the results have been compared with the Standard Flower pollination Algorithm (SFPA), Genetic Algorithm, Bat Algorithm, Simulated annealing, Firefly Algorithm and Modified flower pollination algorithm. The ranking of the algorithms proves that our proposed algorithm IFPDSO has outperformed the above-discussed nature-inspired heuristic algorithms.
Feature Selection Approach to Detect DDoS Attack Using Machine Learning Algorithms Azmi, Muhammad Aqil Haqeemi; Foozy, Cik Feresa Mohd; Sukri, Khairul Amin Mohamad; Abdullah, Nurul Azma; Hamid, Isredza Rahmi A.; Amnur, Hidra
JOIV : International Journal on Informatics Visualization Vol 5, No 4 (2021)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.5.4.734

Abstract

Distributed Denial of Service (DDoS) attacks are dangerous attacks that can cause disruption to server, system or application layer. It will flood the target server with the amount of Internet traffic that the server could not afford at one time. Therefore, it is possible that the server will not work if it is affected by this DDoS attack. Due to this attack, the network security environment becomes insecure with the possibility of this attack. In recent years, the cases related to DDoS attacks have increased. Although previously there has been a lot of research on DDoS attacks, cases of DDoS attacks still exist. Therefore, the research on feature selection approach has been done in effort to detect the DDoS attacks by using machine learning techniques. In this paper, to detect DDoS attacks, features have been selected from the UNSW-NB 15 dataset by using Information Gain and Data Reduction method. To classify the selected features, ANN, Naïve Bayes, and Decision Table algorithms were used to test the dataset. To evaluate the result of the experiment, the parameters of Accuracy, Precision, True Positive and False Positive evaluated the results and classed the data into attacks and normal class. Hence, the good features have been obtained based on the experiments. To ensure the selected features are good or not, the results of classification have been compared with the past research that used the same UNSW-NB 15 dataset. To conclude, the accuracy of ANN, Naïve Bayes and Decision Table classifiers has been increased by using this feature selection approach compared to the past research.
Relationship between Korean Informatics Curriculum and Textbook Learning Element Considering Compound Word Kim, Jaehong; Woo, Hosung; Kim, Jamee; Lee, WonGyu
JOIV : International Journal on Informatics Visualization Vol 5, No 4 (2021)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.5.4.731

Abstract

With the development of information and communication technology, countries around the world have strengthened their computer science curriculums. Korea also revised the informatics curriculum(The name of a subject related to computer science in Korea is informatics.) in 2015 with a focus on computer science. The purpose of this study was to automatically extract and analyze whether textbooks reflected the learning elements of the informatics curriculum in South Korea. Considering the forms of terms of the learning elements mainly comprised of compound words and the characteristics of Korean language, which makes natural language processing difficult due to various transformations, this study pre-processed textbook texts and the learning elements and derived their reflection status and frequencies. The terms used in the textbooks were automatically extracted by using the indexes in the textbooks and the part-of-speech compositions of the indexes. Moreover, this study analyzed the relevance between the terms by deriving confidence of other terms for each learning element used in the textbooks. As a result of the analysis, this study revealed that the textbooks did not reflect some learning elements in the forms presented in the curriculum, suggesting that the textbooks need to explain the concepts of the learning elements by using the forms presented in the curriculum at least once. This study is meaningful in that terms were automatically extracted and analyzed in Korean textbooks based on the words suggested by the curriculum. Also, the method can be applied equally to textbooks of other subjects.
Bridging Usability and Accessibility of User Authentication using Usable Accessed (UAce) for Online Payment Applications Mohamed, Juliana; Md Fudzee, Mohd Farhan; Ramli, Sofia Najwa; Ismail, Mohd Norasri; Defni, -
JOIV : International Journal on Informatics Visualization Vol 5, No 4 (2021)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.5.4.740

Abstract

Usability and accessibility are significant authentication aspects for online applications. Despite the fact that there are ongoing efforts to improve the interface design, some existing research only focuses on a single aspect of it. Thus, it is vital to investigate how to merge these two features into a practical and workable solution. This study presents a preliminary process for designing accessible and usable applications for online banking payment using Usable Accessed (UAce by adopting Design Science Research (DSR) as its methodology. The UAce standard considers attributes and characteristics from the user authentication. The standard establishes a development method and tool for assessing subjectively and quantitatively usable, as well as the user authentication while taking into account specific elements, qualities, and features. The DSR technique for developing highly usable and accessible interactive apps was utilized in designing this approach.

Page 27 of 118 | Total Record : 1172