cover
Contact Name
Mira Maisura
Contact Email
jurnal.cyberspace@ar-raniry.ac.id
Phone
-
Journal Mail Official
jurnal.cyberspace@ar-raniry.ac.id
Editorial Address
Information Technology Education (PTI) Department administration office, Faculty of Education and Teacher Training (FTK) Building B 1st Floor, Ar-Raniry State Islamic University, Darussalam, Banda Aceh, 23111.
Location
Kota banda aceh,
Aceh
INDONESIA
Cyberspace: Jurnal Pendidikan Teknologi Informasi
ISSN : 25982079     EISSN : 25979671     DOI : -
Core Subject : Science, Education,
Cyberspace: Jurnal Pendidikan Teknologi Informasi is an open access, peer-reviewed journal that will consider any original scientific article that expands the field of information technology education and various other related applied computer sciences themes. The journal publishes articles of interest to Information technology teachers, researchers and practitioners. Manuscripts must be original and educationally interesting to the audience in the field. The goal is to promote concepts and ideas developed in this area of study by publishing relevant peer-reviewed scientific information and discussion. This will help information technology practitioners to advance their knowledge for greater benefit and output in their professional contexts.
Articles 7 Documents
Search results for , issue "Vol 2, No 1 (2018)" : 7 Documents clear
ANALYZING CLIENT-SIDE ENCRYPTION IMPLEMENTED IN CRYPTDB Mira Maisura
CYBERSPACE: Jurnal Pendidikan Teknologi Informasi Vol 2, No 1 (2018)
Publisher : UIN Ar-Raniry

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (439.257 KB) | DOI: 10.22373/cs.v2i1.2852

Abstract

Client side encryption has become one of the choice for data security in outsourced database as it is believed to provide more security than the server side encryption. It allows users to protect their data and prohibit access to that data from unauthorized user. Here, key use for encryption and decryption are all belong and known only to the user. On the other words, data stored in the database are all in encrypted form. CryptDB, a new cryptographic technique, where the system acts as a proxy to protect the communication between the application server and database server, implementing the idea. The aim of this study is to look into more detail about the encryption scheme implemented in CryptDB in 2 different case study, using SEARCH command with the condition given. The result of the study will present how the statement change with the act of proxy, and the encryption scheme implemented here.
DNS FILTERING: A CLEAN AND POSITIVE INTERNET ENVIRONMENT IN UIN AR-RANIRY BANDA ACEH Rusmansyah Rusmansyah; Hendy Mizuardy; Bustami Yusuf
CYBERSPACE: Jurnal Pendidikan Teknologi Informasi Vol 2, No 1 (2018)
Publisher : UIN Ar-Raniry

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (684.958 KB) | DOI: 10.22373/cs.v2i1.2502

Abstract

The rapid IT development has brought us to the different level of an era; information openness. The information is now easily accessed through the internet. It is believed that the internet comes with many things that benefited human life. Despite its advantages, the internet also will bring problems if it is improperly used. To cope with the problems, it is important to create a safe, clean, and positive internet environment. A positive internet program, initiated by Kemkominfo Indonesia, is actively distributed to achieve this goal. We observed whether this program is feasible to be applied in a university. Our experiment object is students in Universitas Islam Ar-raniry Banda Aceh. We found that most of the students, about more than 90%, believe that a positive internet environment is important to be implemented. Moreover, a positive internet environment also will give positive impact to their personality and behavior. To realize the implementation, we have compared DNS filtering products which are able to block negative-content websites. Form our experiments, we recommend that the university apply DNS Nawala because it performs better by blocking more than 40% tested negative websites, compared to the other tested DNS products. So regarding the opinion of the students, DNS Nawala is feasible to be implemented to realize a clean, safe, and positive internet environment
AN INFORMATION SYSTEM SUCCESS MODEL FOR CLOUD COMPUTING IN INFORMATION TECHNOLOGY PROJECT Zulfan Zulfan
CYBERSPACE: Jurnal Pendidikan Teknologi Informasi Vol 2, No 1 (2018)
Publisher : UIN Ar-Raniry

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (809.867 KB) | DOI: 10.22373/cs.v2i1.2661

Abstract

Cloud computing is becoming an attractive technology due to its dynamic scalability and effective usage of the resources, it can be utilized under circumstances where the availability of resources is limited. The main aim of this study is to develop an IS successful model for cloud computing in IT project environment. There were 38 respondents participated in this study. Data were collected by surveys and analyzed by SPSS. The findings of the study revealed that the system under study was quite successful on use of cloud computing in IT project assignment and very useful. In addition to all hypotheses in this study were interrelated.
STUDI EVALUASI PENGGUNAAN SOFTWARE BAJAKAN DI KALANGAN MAHASISWA FTK UIN AR-RANIRY Basrul Abdul Majid; Sari Vivianie; Bustami Yusuf
CYBERSPACE: Jurnal Pendidikan Teknologi Informasi Vol 2, No 1 (2018)
Publisher : UIN Ar-Raniry

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (538.174 KB) | DOI: 10.22373/cs.v2i1.2663

Abstract

The use of pirated computer software among univetrsity’s students today is very vulnerable. This is due to two factors, namely; 1) the lack of awareness of the students from type of software they use, 2) and also the lack of understanding of the students about halal-haram in using pirated software. In this study, the authors intends to know the awareness and understanding of computer users, especially among students of pirated software both in terms of impact, legal, or risk from the use of pirated software. The study involved 200 students of the Faculty of Tarbiyah and Teacher Training of Ar-raniry State Islamic University of Banda Aceh, as selected by random. The results of this study showed 36% of students do not understand about pirated software and almost 65% of students are not aware of the risks caused by the use of pirated software and the legal dangers of the use of pirated software. In addition 62% of students currently using pirated software want to switch to using original software or opensource software.
KENDALA DALAM IMPLEMENTASI E-GOVERNMENT PADA PEMERINTAH KABUPATEN PIDIE Rahmat Musfikar
CYBERSPACE: Jurnal Pendidikan Teknologi Informasi Vol 2, No 1 (2018)
Publisher : UIN Ar-Raniry

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (664.741 KB) | DOI: 10.22373/cs.v2i1.2746

Abstract

Nowadays, we are faced with technological era, where the use of information and communication technology in the world is growing rapidly. The government program to realize the application of technology information is E-Government. The implementation of E-Government in Indonesia is highly growing and there are laws and regulations on E-Government from Indonesia government. Currently, the Government of Indonesia has reached the stage of evaluation through E-Government Rating Indonesia. This study aimed to know the obstacles in implementing E-government in Pidie district government. This study used previous studies, frameworks and theories to create a suitable new model in Pidie District. To propose a new model, this study attempted to combine, synthesize and conduct a re-factor. The methodology used in this study is a quantitative approach by using questionnaire distribution technique to government employees. The method for sampling used is nonprobability technique namely purposive sampling. Data analysis technique used in this research is Partial Least Square (PLS). The technique used to test the hypothesis statistically is bootstrapping on the PLS. The hypothesis proposed in the study is that there were 3 obstacles in implementing e-government in Pidie district government. The results of this study shows that the obstacles that greatly affected the implementation of e-government in Pidie government was the organizational factor, while the other two factors, Human Resources (HR) and the infrastructure factor, did not show a significant effect.
REVIEW OF INFORMATION TECHNOLOGY UPDATE ON QUALITY CONTROL AND QUALITY ASSURANCE OF HALAL PRODUCTS Muhammad Ridwan Harahap
CYBERSPACE: Jurnal Pendidikan Teknologi Informasi Vol 2, No 1 (2018)
Publisher : UIN Ar-Raniry

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (400.554 KB) | DOI: 10.22373/cs.v2i1.2481

Abstract

Technological developments are very rapid but it does not necessarily with the renewal of information technology to the public due to the limited differences in public interest. Indonesia is one of the most populous countries in the world with the majority of the Muslim population. In line with that, the Muslim community highly upholds the values of Islamic teachings contained in the Qur'an one of the concept of Halalan Toyyiban. Information that is rarely accepted by the public is the halal principle of an industrial product, whether food, beverage, cosmetic or other manufacturing industries. This is also supported by the human lifestyle factors on goods from outside the country regardless of the origin of the goods. As a predominantly Muslim country, it is necessary to have simple and accurate information on the use of materials in an industrial product to determine the absence of an industrial product. One of them is the use of derived compounds or single compounds derived from pigs. From several research results that have been done, obtained the image pattern from the examination result of the sample. So that people can easily obtain information about the source of materials used in everyday life.
STUDI ANALISA INDEK KEPUASAN MAHASISWA PRODI PENDIDIKAN TEKNOLOGI INFORMASI UIN AR-RANIRY Bustami Yusuf
CYBERSPACE: Jurnal Pendidikan Teknologi Informasi Vol 2, No 1 (2018)
Publisher : UIN Ar-Raniry

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (619.087 KB) | DOI: 10.22373/cs.v2i1.2815

Abstract

The purpose of this study aims to analyze student satisfaction of Information Technology Education (ITE) Department, Faculty of Tarbiyah and Teacher Training, Ar-Raniry State Islamic University. The respondent are used all active students of ITE Department (N=460). This research uses quantitative, descriptive, and comparative method with Anova Test analysis based on lecturer, lecture, and year of class. The results of this study indicate that there are significant differences in student satisfaction either based on teaching lecturers (F=9,72, P>0.05), the courses taken (F = 6.639, p>0.05), or based on year of class(F=11.855, P>0.05). This research contributes as an initial evaluation material for department of ITE to improve the quality of student services.

Page 1 of 1 | Total Record : 7