cover
Contact Name
Sopiyan Dalis
Contact Email
sopiyan.spd@bsi.ac.id
Phone
+6281380852868
Journal Mail Official
jurnal.paradigma@bsi.a.cid
Editorial Address
Jl. Kramat Raya No.98, Kwitang, Kec. Senen, Kota Jakarta Pusat, DKI Jakarta 10450
Location
Kota adm. jakarta barat,
Dki jakarta
INDONESIA
Paradigma
ISSN : 14105063     EISSN : 25793500     DOI : http://dx.doi.org/10.31294/p
Core Subject : Science,
The first Paradigma Journal was published in 2006, with the registration of the ISSN from LIPI Indonesia. The Paradigma Journal is intended as a media for scientific studies of research, thought and analysis-critical issues on Computer Science, Information Systems and Information Technology, both nationally and internationally. The scientific article refers to theoretical review and empirical studies of related sciences, which can be accounted and disseminated nationally and internationally. Paradigma Journal accepts scientific articles research at: Expert Systems, Information Systems, Web Programming, Mobile Programming, Games Programming, Data Mining, and Decision Support Systems.
Articles 347 Documents
DAMPAK NEGATIF DUNIA MAYA DALAM BAGI PERKEMBANGAN TEKNOLOGI INFORMASI DI INDONESIA Eni Irfiani
Paradigma Vol 10, No 2 (2008): Periode April 2008
Publisher : LPPM Universitas Bina Sarana Informatika

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31294/p.v10i2.17055

Abstract

The need of using computers that are connected one with another in 1969 opens a path to global interaction between users through internet technology. Internet development also influences the development of information technology in Indonesia. Up to 4.2 million people of Indonesia have made use of the internet. On one hand, it is useful for users. On the other hand, it opens possibilities for cyber crimes. Yet Indonesia has not had any force of law governing cyber crimes.
SIX SIGMA STATISTIK DENGAN MINITAB DAN EXCEL Herlawati Herlawati
Paradigma Vol 10, No 1 (2008): Periode Januari 2008
Publisher : LPPM Universitas Bina Sarana Informatika

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31294/p.v10i1.17050

Abstract

Most companies, nowadays, are applying the six sigma approach to support the quality control of their products. The term six sigma is taken from statistic terms six and sigma. Six means number 6 and sigma means a symbol for a standard deviation. In other words, the standard deviation in use is 6s, meaning that to produce products with 0.002 per one million defect opportunity; the accepted limit of tolerance is 6 times as much as the standard deviation. The existence of noise factor theory which causes shift of mean to the right about 1.5s with 4.4 per one million defect opportunity (DPMO), initiate a number of practitioners to change the term six sigma with 3.4 DPMO, even though it is still controversial. Since most six sigma users are industries with great amount of products, which requires high level of accuracy and speed, thus the use of computer is inevitable. The most common six sigma software programs are Minitab and Excel. Nonetheless, software is only a means. IT is important to understand the essence of statistics so that not only enterprises (industry, trade, and the kind) but also service provider (education, medical, consultant, and etcetera) can apply it for quality control.
CYBER LAW INDONESIA,ANTARA KEBUTUHAN ATAU PELENGKAP Sidik Sidik
Paradigma Vol 10, No 2 (2008): Periode April 2008
Publisher : LPPM Universitas Bina Sarana Informatika

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31294/p.v10i2.17056

Abstract

The use of internet technology affects greatly toward its users. It is seen clearly on the increasing number of internet users in big cities in Indonesia and other parts of the world. This triggers various motives of users from good to malicious attempts for crimes. Therefore, a set of identified regulation in a form of Cyber Law and its enforcement is an urgency to take action against internet abuse done by lawbreaker users.
SENI KRIPTOGRAFI DAN ALGORITMA ENKRIPSI DATA SEDERHANA DENGAN MENGGUNAKAN VISUAL BASIC 6.0 Nandang Iriadi
Paradigma Vol 10, No 1 (2008): Periode Januari 2008
Publisher : LPPM Universitas Bina Sarana Informatika

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31294/p.v10i1.17051

Abstract

Cryptography is essential in information system. It provides information with a guarantee in its accuracy and secrecy. Cryptography can prevent deception in e-commerce and protect the legality of a financial transaction. It keeps identity originality and keeps an identity a secret. It also prevents acts of damaging documents and protects them from competitors or irresponsible parties. On the contrary, many of cryptography products on the markets do not emphasize on safety level. Many of those are not designed by cryptographers but by technical engineers who do not view cryptography as the essential part. A secure system cannot be designed only by “giving/attaching” cryptography inside but by knowing the procedures inside the system starting from its concept until it is attached on.             Millions of Rupiahs has been spent for computer security. Yet it seems ineffectual since computers are still insecure. A powerful and weak cryptography product looks alike. Two e-mail encryption products look the same. One is secure while the other is fragile. After being tested, both programs have specification similarities. Only there is one with security holes. A well-experienced cryptographer and criminals can only see this discrepancy.
PENGGUNAAN METODE PEMROGRAMAN BERORIENTASI OBJEK (OBJECT ORIENTED PROGRAMMING) PADA BAHASA PEMROGRAMAN Priatno Priatno
Paradigma Vol 10, No 2 (2008): Periode April 2008
Publisher : LPPM Universitas Bina Sarana Informatika

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31294/p.v10i2.17057

Abstract

The bigger a system applied in a company or an institution the greater the problems it causes. Such condition requires an establishment and development of computer based programming as one alternative solution to the problems. Object Oriented Programming is a programming application, which is widely used among programmers when they build a programming application to solve problems faced by a computerized system.
ANALISA ALGORITMA DENGAN TABEL KEBENARAN OUTPUT PADA LOGIKA LOOPING DALAM PROGRAM APLIKASI BAHASA PEMROGRAMAN PASCAL VERSI 7.0 Rini Nuraini
Paradigma Vol 10, No 1 (2008): Periode Januari 2008
Publisher : LPPM Universitas Bina Sarana Informatika

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31294/p.v10i1.17052

Abstract

Repetition is considered a tiring and boring activity for human. Thus is not so for a machine. One of the superiorities of this machine called computer over human being is the ability to execute repeated commands without getting tired. The repetition or loop can run until it reaches its set condition. Logic is a form of reasoning. Algorithm is a series of procedures or instructions to solve a problem. Analysis is a study on a certain language to examine carefully the language structure by breaking it up into smaller parts that easier to learn, and therefore to draw a conclusion. Pascal is one of computer language programs. Language program is instructions or commands that are understood by the computer to execute certain tasks. These tasks are the application programs, which are designed by using one of the computer language programs. Visualization helps define a concept. Therefore, the writer uses flowcharts to visualize the concept. Flowchart is a series of symbols used to explain either the logic or the undergoing program.
Pelajaran dari Kasus Onel de Guzman: Telaah Kolaborasi antara Worm I Love You dengan Trojan Barok Happy Chandraleka
Paradigma Vol 10, No 2 (2008): Periode April 2008
Publisher : LPPM Universitas Bina Sarana Informatika

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31294/p.v10i2.17058

Abstract

Many applications belong to malicious software, such as virus, worm, Trojan horse, Trojan mule, email bomb, and malicious script. However, the prominent ones are virus, worm, and Trojan horse. Each of these software bears different characteristics and manner. Most malicious software attacks are individual ones. Integrated attacks, collaboration between one malicious software with another, seldom happen. This article describes collaboration between I Love You worm with Trojan Barok, both of which are made by Onel de Guzman, a student from Manila.