cover
Contact Name
Prastyadi Wibawa Rahayu
Contact Email
prastyadiwibawa@undhirabali.ac.id
Phone
+6281-246-863-337
Journal Mail Official
jurnaljutik@undhirabali.ac.id
Editorial Address
Jl. Raya Padang Luwih, tegaljaya, Dalung, Kuta Utara, Badung, Bali
Location
Kab. badung,
Bali
INDONESIA
JUTIK : Jurnal Teknologi Informasi dan Komputer
ISSN : 2442241X     EISSN : 25285211     DOI : -
Jurnal Teknologi Informasi dan Komputer berisi tulisan yang diangkat dari hasil penelitian di bidang teknologi informasi dan komputer. Jurnal ini merupakan sarana bagi peneliti di bidang ilmu teknologi informasi dan komputer untuk mempublikasikan karya-karya penelitiannya. Redaksi penyunting jurnal Teknologi Informasi dan Komputer terdiri dari dosen-dosen yang terkait bidang ilmu teknologi informasi dan komputer dalam konsentrasi antara lain : Rekayasa Perangkat Lunak, Sistem Informasi, Jaringan dan Keamanan Komputer, Pengolahan Citra, Multimedia dan Kecerdasan Buatan, dan konsentrasi lainnya terkait bidang ilmu teknologi informasi dan komputer.
Arjuna Subject : -
Articles 458 Documents
IMPLEMENTASI SISTEM INFORMASI MONITORING DAN EVALUASI TENANT INBIS STIKI INDONESIA I Putu Agus Eka Darma Udayana; Ni Putu Eka Kherismawati
Jurnal Teknologi Informasi dan Komputer Vol 5, No 2 (2019): Jurnal Teknologi Informasi dan Komputer
Publisher : LPPM Universitas Dhyana Pura

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (743.331 KB)

Abstract

ABSTRACTInkubator Bisnis (INBIS) is an institution to commercialize the results of research, innovation and creativity of universities. The main task of INBIS is to provide business space, assistance, monitoring and evaluation, access to capital, and network access. To achieve these objectives, monitoring and evaluation was carried out by the monitoring and evaluation team. The results of the monitoring and evaluation process are recorded in a hard copy file of monitoring and evaluation tenants. The monitoring file is not effective and efficient to see the report on monitoring and evaluating tenants when needed in an urgent time. With the importance of the report, monitoring and evaluation tenant information system was developed to record the results of tenant monitoring and evaluation, and later the report will be an evaluation material for INBIS performance, both from the stages of recruitment, assistance, and monitoring and evaluation. The system developed will manage tenant data, monitoring and evaluation team data, incubator data, and produce reports on the results of monitoring and evaluation tenants. To test all existing modules on the system, black box testing was carried out and to see how the user system responses developed were used usability testing.Keywords: Monitoring And Evaluation, Information Systems, Tenant, INBIS.ABSTRAKInkubator bisnis (INBIS) merupakan lembaga yang berfungsi sebagai wadah komersialisasi hasil penelitian, inovasi dan kreativitas perguruan tinggi. Tugas utama INBIS adalah menyediakan ruang usaha, pendampingan, monitoring dan evaluasi, akses permodalan, serta akses jejaring. Dengan adanya program tersebut diharapkan perguruan tinggi bisa menghasilkan produk inovasi yang siap bersaing di industri sebagai perusahaan pemula berbasis teknologi. Untuk mencapai tujuan tersebut dilaksanakan proses monitoring dan evaluasi yang dilaksanakan oleh tim monev. Hasil proses monitoring dan evaluasi tersebut direkam dalam file hard copy berupa catatan hasil monitoring dan evaluasi tenant. Pada implementasinya berkas tersebut kurang efektif dan efisien untuk melihat report monitoring dan evaluasi tenant ketika dibutuhkan dalam waktu yang mendesak. Mengingat pentingnya keberadaan laporan tersebut, maka dikembangkan sebuah sistem informasi monitoring dan evaluasi tenant untuk melakukan pencatatan hasil monitoring dan evaluasi tenant, serta nantinya laporan tersebut akan menjadi bahan evaluasi terhadap kinerja INBIS, baik dari tahapan rekrutmen, pendampingan, serta monitoring dan evaluasi. Sistem yang dikembangkan nantinya akan mengelola data tenant, data tim monev, data inkubator, serta menghasilkan laporan hasil monitoring dan evaluasi tenant. Untuk menguji semua modul yang ada pada sistem telah bekerja sesuai dengan rancangan dilakukanlah pengujian black box dan untuk melihat bagaimana tanggapan user sistem yang dikembangkan digunakan pengujian usability testing.Kata Kunci : Monitoring Dan Evaluasi, Sistem Informasi, Tenant, INBIS.
PREDIKSI CITRA MAKANAN MENGGUNAKAN CONVOLUTIONAL NEURAL NETWORK UNTUK MENENTUKAN BESARAN KALORI MAKANAN I Putu Agus Eka Darma Udayana; Putu Gede Surya Cipta Nugraha
Jurnal Teknologi Informasi dan Komputer Vol 6, No 1 (2020): Jurnal Teknologi Informasi dan Komputer
Publisher : LPPM Universitas Dhyana Pura

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (979.274 KB)

Abstract

ABSTRACTDeep learning is a subfield of machine learning which its development has been significantly increased recently. One example of the application deep learning method is the implementation of computer vision to recognize an image. In this research, the authors focus on the application of deep learning to recognize food images. Food recognition is also useful in many popular lifestyle applications such as calorie counting applications or diet-related applications. In this research, the CNN method is proposed to recognize the image of commonly consumed food by Indonesian people. This technique consists of 3 main phases, first preprocessing or normalizing of food image input data by wrapping and cropping, second the formation of models and system training, and the last is pra-training for system testing. The experiment focused on the implementation of the CNN method to recognize food images for developed calorie counter applications. This research uses 50 food image data for testing each food category with an average accuracy of 86% and the system can determine the number of food calories based on a calorie database in the system.Keywords: Convolution Neural Network (CNN), Deep Learning, Food Prediction, Food Calorie.ABSTRAKDeep Learning adalah bidang keilmuan baru pada machine learning yang akhir-akhir ini berkembang sangat pesat. Salah satu contoh penerapan metode deep learning adalah implementasi komputer vision untuk mengenali sebuah gambar. Pada penelitian ini, penulis fokus pada penerapan deep learning untuk mengenali citra makanan. Pengenalan makanan juga berguna dalam banyak aplikasi gaya hidup populer seperti aplikasi penghitung kalori atau aplikasi yang berhubungan dengan diet. Pada penelitian ini diusulkan metode CNN untuk mengenali citra makanan yang umum dikonsumsi oleh masyarakat Indonesia. Teknik ini terdiri dari 3 tahap utama, pertama preprocessing atau menormalkan data input citra makanan dengan melakukan wrapping dan cropping, kedua pembentukan model dan pelatihan sistem, dan yang terakhir adalah melakukan prapelatihan untuk pengujian sistem. Percobaan difokuskan pada bagaimana metode CNN dapat digunakan sebagai metode untuk mengenali citra makanan sehingga dapat digunakan untuk mengembangkan aplikasi penghitung kalori. Pada penelitian ini digunakan 50 data citra makanan untuk pengujian setiap kategori makanan dengan rata-rata akurasi sebesar 86% dan sistem dapat menentukan besaran kalori makanan sesuai dengan database kalori pada sistem.Kata Kunci : Convolution Neural Network (CNN), Deep Learning, Prediksi Citra Makanan, KaloriMakanan.
SISTEM INFORMASI SKRIPSI STMIK PRIMAKARA BERBASIS WEBSITE MENGGUNAKAN FRAMEWORK LARAVEL I Gede Nyoman T.A. Panji Wijaksana; I Putu Satwika; I Nyoman Yudi Anggara Wijaya
Jurnal Teknologi Informasi dan Komputer Vol 6, No 2 (2020): Jurnal Teknologi Informasi dan Komputer
Publisher : LPPM Universitas Dhyana Pura

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (692.497 KB)

Abstract

ABSTRACTThe registration process for the final assignment done manually without computer support,the commission needs to manually recapitalize the registrant students, which makes the registrationprocess take a long time. This study discusses the design and construction of the minithesisinformation system at STMIK Primakara. This research was conducted with a qualitative approach,and used the waterfall Software Development Life Cycle (SDLC) method. The design process used inthis study uses the Unified Modeling Language (UML), and uses the Laravel framework as a backendand the VueJs framework as a frontend. This research succeeded in designing and building aninformation system at STMIK Primakara which was used to register and manage students taking finalassignments. From the results of interviews conducted with minithesis commissions and students takingfinal assignments, the system can help simplify the registration process.Keywords: Laravel, Vuejs, Minithesis, Information Systems, UML, SDLC.ABSTRAKDalam proses pendaftaran mata kuliah tugas akhir yang dilakukan secara manual komisi perlumelakukan rekap mahasiswa pendaftar secara manual, yang membuat proses pendaftaran memerlukanwaktu yang cukup lama. Penelitian ini membahas mengenai perancangan dan pembangunan sisteminformasi skripsi Sekolah Tinggi Manajemen Informatika dan Komputer (STMIK) Primakara.Penelitian ini dilakukan dengan pendekatan kualitatif, serta menggunakan metode SoftwareDevelopment Life Cycle (SDLC) model waterfall. Proses perancangan yang digunakan dalampenelitian ini menggunakan bahasa pemodelan Unified Modeling Language (UML), sertamenggunakan framework Laravel sebagai backend dan framework VueJs sebagai frontend. Pelitian iniberhasil merancang dan membangun sistem informasi pada STMIK Primakara yang digunakan untukmelakukan pendaftaran dan pengelolaan mahasiswa yang mengambil mata kuliah tugas akhir. Darihasil wawancara yang dilakukan dengan komisi skripsi dan mahasiswa yang mengambil mata kuliahtugas akhir, sistem dapat membantu mempermudah proses pendaftaran.Kata Kunci : Laravel, Vuejs, Tugas Akhir, Sistem Informasi, UML, SDLC.
MODEL KNOWLEDGE MANAGEMENT SYSTEM PADA PERGURUAN TINGGI DENGAN STRUCTURAL EQUATION MODELLING (SEM) Ni Luh Ayu Kartika Yuniastari Sarja
Jurnal Teknologi Informasi dan Komputer Vol 5, No 1 (2019): Jurnal Teknologi Informasi dan Komputer
Publisher : LPPM Universitas Dhyana Pura

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (620.416 KB)

Abstract

ABSTRACTknowledge management system(KMS) is an information system that support knowledge management activities in universities . KMS isvery necessary to facilitate acces and utilization order for implenentationmodelcan be made in the form of a model. build KMS model can be made in the form of a model. build KMS model can be made in the form of a model. build KMS modelcan be made in the form of a model. build KMS model can be made in the form of a model. build KMS model can be made in the form of a model. build KMS modelcan be made in the form of a model. build KMS model can be made in the form of a model. build KMS model can be made in the form of a model. build KMS model can be made in the form of a model. build KMS modelcan be made in the form of a model. build KMS model can be made in the form of a model. build KMS modelcan be made in the form of a model. build KMS model can be made in the form of a model. build KMS modelcan be made in the form of a model. build KMS modelcan be made in the form of a model. build KMS model can be made in the form of a model. build KMS modelcan be made in the form of a model. build KMS model can be made in the form of a model. build KMS modelcan be made in the form of a model. build KMS modelcan be made in the form of a model. build KMS modelcan be made in the form of a model. build KMS model can be made in the form of a model. build KMS modelcan be made in the form of a model. build KMS modelcan be made in the form of a model. build KMS modelcan be made in the form of a model. build KMS modelcan be made in the form of a model. build KMS model can be made in the form of a model. build KMS modelcan be made in the form of a model. build KMS model can be made in the form of a model. build KMS modelcan be made in the form of a model. build KMS model and test the model that has been built. and test the model that has been built. and test the model that has been built. and test the model that has been built. and test the model that has been built. and test the model that has been built. and test the model that has been built. and test the model that has been built. and test the model that has been built. and test the model that has been built. and test the model that has been built. and test the model that has been built. and test the model that has been built. and test the model that has been built. and test the model that has been built. and test the model that has been built. and test the model that has been built. and test the model that has been built. and test the model that has been built. and test the model that has been built. and test the model that has been built. and test the model that has been built. and test the model that has been built. and test the model that has been built. and test the model that has been built. This This This knowledge management system knowledge management systemknowledge management systemknowledge management system knowledge management systemknowledge management system knowledge management system knowledge management systemknowledge management systemknowledge management systemknowledge management system knowledge management systemknowledge management system knowledge management systemknowledge management system model was built to provide a more complete understanding model was built to provide a more complete understanding model was built to provide a more complete understanding model was built to provide a more complete understanding model was built to provide a more complete understanding model was built to provide a more complete understanding model was built to provide a more complete understanding model was built to provide a more complete understanding model was built to provide a more complete understanding model was built to provide a more complete understanding model was built to provide a more complete understanding model was built to provide a more complete understanding model was built to provide a more complete understanding model was built to provide a more complete understanding model was built to provide a more complete understanding model was built to provide a more complete understanding model was built to provide a more complete understanding model was built to provide a more complete understanding model was built to provide a more complete understanding model was built to provide a more complete understanding model was built to provide a more complete understanding model was built to provide a more complete understanding model was built to provide a more complete understanding model was built to provide a more complete understanding model was built to provide a more complete understanding model was built to provide a more complete understanding model was built to provide a more complete understanding model was built to provide a more complete understanding model was built to provide a more complete understanding model was built to provide a more complete understanding model was built to provide a more complete understanding model was built to provide a more complete understanding model was built to provide a more complete understanding model was built to provide a more complete understanding model was built to provide a more complete understanding of the utilization of the utilization of the utilization of the utilization of the utilization of the utilization of the utilization of the utilization of the utilization of the utilization of the utilization of the utilization of the utilization knowledge management system knowledge management systemknowledge management systemknowledge management system knowledge management systemknowledge management system knowledge management system knowledge management systemknowledge management systemknowledge management systemknowledge management system knowledge management systemknowledge management system knowledge management systemknowledge management system s in higher education. To find out the s in higher education. To find out the s in higher education. To find out the s in higher education. To find out the s in higher education. To find out the s in higher education. To find out the s in higher education. To find out the s in higher education. To find out the s in higher education. To find out the s in higher education. To find out the s in higher education. To find out the s in higher education. To find out the s in higher education. To find out the s in higher education. To find out the s in higher education. To find out the s in higher education. To find out the s in higher education. To find out the s in higher education. To find out the s in higher education. To find out the s in higher education. To find out the s in higher education. To find out the s in higher education. To find out the s in higher education. To find out the s in higher education. To find out the s in higher education. To find out the s in higher education. To find out the compatibility in the implementation o compatibility in the implementation o compatibility in the implementation ocompatibility in the implementation o compatibility in the implementation o compatibility in the implementation o compatibility in the implementation o compatibility in the implementation ocompatibility in the implementation o compatibility in the implementation o compatibility in the implementation o compatibility in the implementation o compatibility in the implementation ocompatibility in the implementation o compatibility in the implementation o compatibility in the implementation ocompatibility in the implementation ocompatibility in the implementation of the model with real environment, a test of f the model with real environment, a test of f the model with real environment, a test of f the model with real environment, a test of f the model with real environment, a test of f the model with real environment, a test of f the model with real environment, a test of f the model with real environment, a test of f the model with real environment, a test of f the model with real environment, a test of f the model with real environment, a test of f the model with real environment, a test of f the model with real environment, a test of f the model with real environment, a test of f the model with real environment, a test of f the model with real environment, a test of f the model with real environment, a test of f the model with real environment, a test of f the model with real environment, a test of f the model with real environment, a test of f the model with real environment, a test of f the model with real environment, a test of f the model with real environment, a test of f the model with real environment, a test of f the model with real environment, a test of f the model with real environment, a test of f the model with real environment, a test of f the model with real environment, a test of f the model with real environment, a test of f the model with real environment, a test of f the model with real environment, a test of was carried out. Testing is done so that the model in accordance with environmental was carried out. Testing is done so that the model in accordance with environmental was carried out. Testing is done so that the model in accordance with environmental was carried out. Testing is done so that the model in accordance with environmental was carried out. Testing is done so that the model in accordance with environmental was carried out. Testing is done so that the model in accordance with environmental was carried out. Testing is done so that the model in accordance with environmental was carried out. Testing is done so that the model in accordance with environmental was carried out. Testing is done so that the model in accordance with environmental was carried out. Testing is done so that the model in accordance with environmental was carried out. Testing is done so that the model in accordance with environmental was carried out. Testing is done so that the model in accordance with environmental was carried out. Testing is done so that the model in accordance with environmental was carried out. Testing is done so that the model in accordance with environmental was carried out. Testing is done so that the model in accordance with environmental was carried out. Testing is done so that the model in accordance with environmental was carried out. Testing is done so that the model in accordance with environmental was carried out. Testing is done so that the model in accordance with environmental was carried out. Testing is done so that the model in accordance with environmental was carried out. Testing is done so that the model in accordance with environmental was carried out. Testing is done so that the model in accordance with environmental was carried out. Testing is done so that the model in accordance with environmental was carried out. Testing is done so that the model in accordance with environmental was carried out. Testing is done so that the model in accordance with environmental was carried out. Testing is done so that the model in accordance with environmental was carried out. Testing is done so that the model in accordance with environmental was carried out. Testing is done so that the model in accordance with environmental was carried out. Testing is done so that the model in accordance with environmental was carried out. Testing is done so that the model in accordance with environmental was carried out. Testing is done so that the model in accordance with environmental was carried out. Testing is done so that the model in accordance with environmental was carried out. Testing is done so that the model in accordance with environmental was carried out. Testing is done so that the model in accordance with environmental was carried out. Testing is done so that the model in accordance with environmental was carried out. Testing is done so that the model in accordance with environmental was carried out. Testing is done so that the model in accordance with environmental was carried out. Testing is done so that the model in accordance with environmental was carried out. Testing is done so that the model in accordance with environmental was carried out. Testing is done so that the model in accordance with environmental was carried out. Testing is done so that the model in accordance with environmental was carried out. Testing is done so that the model in accordance with environmental was carried out. Testing is done so that the model in accordance with environmental was carried out. Testing is done so that the model in accordance with environmental was carried out. Testing is done so that the model in accordance with environmental was carried out. Testing is done so that the model in accordance with environmental was carried out. Testing is done so that the model in accordance with environmental was carried out. Testing is done so that the model in accordance with environmental was carried out. Testing is done so that the model in accordance with environmental was carried out. Testing is done so that the model in accordance with environmental was carried out. Testing is done so that the model in accordance with environmental was carried out. Testing is done so that the model in accordance with environmental was carried out. Testing is done so that the model in accordance with environmental was carried out. Testing is done so that the model in accordance with environmental was carried out. Testing is done so that the model in accordance with environmental was carried out. Testing is done so that the model in accordance with environmental was carried out. Testing is done so that the model in accordance with environmental was carried out. Testing is done so that the model in accordance with environmental conditions. Testing is done using the Structural Equation Modeling (SEM) model. The research conditions. Testing is done using the Structural Equation Modeling (SEM) model. The research conditions. Testing is done using the Structural Equation Modeling (SEM) model. The research conditions. Testing is done using the Structural Equation Modeling (SEM) model. The research conditions. Testing is done using the Structural Equation Modeling (SEM) model. The research conditions. Testing is done using the Structural Equation Modeling (SEM) model. The research conditions. Testing is done using the Structural Equation Modeling (SEM) model. The research conditions. Testing is done using the Structural Equation Modeling (SEM) model. The research conditions. Testing is done using the Structural Equation Modeling (SEM) model. The research conditions. Testing is done using the Structural Equation Modeling (SEM) model. The research conditions. Testing is done using the Structural Equation Modeling (SEM) model. The research conditions. Testing is done using the Structural Equation Modeling (SEM) model. The research conditions. Testing is done using the Structural Equation Modeling (SEM) model. The research conditions. Testing is done using the Structural Equation Modeling (SEM) model. The research conditions. Testing is done using the Structural Equation Modeling (SEM) model. The research conditions. Testing is done using the Structural Equation Modeling (SEM) model. The research conditions. Testing is done using the Structural Equation Modeling (SEM) model. The research conditions. Testing is done using the Structural Equation Modeling (SEM) model. The research conditions. Testing is done using the Structural Equation Modeling (SEM) model. The research conditions. Testing is done using the Structural Equation Modeling (SEM) model. The research conditions. Testing is done using the Structural Equation Modeling (SEM) model. The research conditions. Testing is done using the Structural Equation Modeling (SEM) model. The research conditions. Testing is done using the Structural Equation Modeling (SEM) model. The research conditions. Testing is done using the Structural Equation Modeling (SEM) model. The research conditions. Testing is done using the Structural Equation Modeling (SEM) model. The research conditions. Testing is done using the Structural Equation Modeling (SEM) model. The research conditions. Testing is done using the Structural Equation Modeling (SEM) model. The research conditions. Testing is done using the Structural Equation Modeling (SEM) model. The research conditions. Testing is done using the Structural Equation Modeling (SEM) model. The research conditions. Testing is done using the Structural Equation Modeling (SEM) model. The research conditions. Testing is done using the Structural Equation Modeling (SEM) model. The research conditions. Testing is done using the Structural Equation Modeling (SEM) model. The research conditions. Testing is done using the Structural Equation Modeling (SEM) model. The research conditions. Testing is done using the Structural Equation Modeling (SEM) model. The research conditions. Testing is done using the Structural Equation Modeling (SEM) model. The research conditions. Testing is done using the Structural Equation Modeling (SEM) model. The research conditions. Testing is done using the Structural Equation Modeling (SEM) model. The research conditions. Testing is done using the Structural Equation Modeling (SEM) model. The research conditions. Testing is done using the Structural Equation Modeling (SEM) model. The research conditions. Testing is done using the Structural Equation Modeling (SEM) model. The research conditions. Testing is done using the Structural Equation Modeling (SEM) model. The research conditions. Testing is done using the Structural Equation Modeling (SEM) model. The research conditions. Testing is done using the Structural Equation Modeling (SEM) model. The research conditions. Testing is done using the Structural Equation Modeling (SEM) model. The research conditions. Testing is done using the Structural Equation Modeling (SEM) model. The research conditions. Testing is done using the Structural Equation Modeling (SEM) model. The research conditions. Testing is done using the Structural Equation Modeling (SEM) model. The research conditions. Testing is done using the Structural Equation Modeling (SEM) model. The research conditions. Testing is done using the Structural Equation Modeling (SEM) model. The research conditions. Testing is done using the Structural Equation Modeling (SEM) model. The research conditions. Testing is done using the Structural Equation Modeling (SEM) model. The research conditions. Testing is done using the Structural Equation Modeling (SEM) model. The research conditions. Testing is done using the Structural Equation Modeling (SEM) model. The research conditions. Testing is done using the Structural Equation Modeling (SEM) model. The research conditions. Testing is done using the Structural Equation Modeling (SEM) model. The research conditions. Testing is done using the Structural Equation Modeling (SEM) model. The research conditions. Testing is done using the Structural Equation Modeling (SEM) model. The research conditions. Testing is done using the Structural Equation Modeling (SEM) model. The research conditions. Testing is done using the Structural Equation Modeling (SEM) model. The research conditions. Testing is done using the Structural Equation Modeling (SEM) model. The research conditions. Testing is done using the Structural Equation Modeling (SEM) model. The research method used refer method used refermethod used refermethod used refermethod used refermethod used refermethod used refer method used refermethod used refermethod used refer s to the information system research framework. The results of this study can s to the information system research framework. The results of this study can s to the information system research framework. The results of this study can s to the information system research framework. The results of this study can s to the information system research framework. The results of this study can s to the information system research framework. The results of this study can s to the information system research framework. The results of this study can s to the information system research framework. The results of this study can s to the information system research framework. The results of this study can s to the information system research framework. The results of this study can s to the information system research framework. The results of this study can s to the information system research framework. The results of this study can s to the information system research framework. The results of this study can s to the information system research framework. The results of this study can s to the information system research framework. The results of this study can s to the information system research framework. The results of this study can s to the information system research framework. The results of this study can s to the information system research framework. The results of this study can s to the information system research framework. The results of this study can s to the information system research framework. The results of this study can s to the information system research framework. The results of this study can s to the information system research framework. The results of this study can s to the information system research framework. The results of this study can s to the information system research framework. The results of this study can s to the information system research framework. The results of this study can s to the information system research framework. The results of this study can s to the information system research framework. The results of this study can s to the information system research framework. The results of this study can s to the information system research framework. The results of this study can s to the information system research framework. The results of this study can s to the information system research framework. The results of this study can s to the information system research framework. The results of this study can s to the information system research framework. The results of this study can s to the information system research framework. The results of this study can s to the information system research framework. The results of this study can s to the information system research framework. The results of this study can s to the information system research framework. The results of this study can s to the information system research framework. The results of this study can s to the information system research framework. The results of this study can s to the information system research framework. The results of this study can s to the information system research framework. The results of this study can s to the information system research framework. The results of this study can s to the information system research framework. The results of this study can s to the information system research framework. The results of this study can be concluded that the KMS model in higher education consists of three constructs, namely be concluded that the KMS model in higher education consists of three constructs, namely be concluded that the KMS model in higher education consists of three constructs, namely be concluded that the KMS model in higher education consists of three constructs, namely be concluded that the KMS model in higher education consists of three constructs, namely be concluded that the KMS model in higher education consists of three constructs, namely be concluded that the KMS model in higher education consists of three constructs, namely be concluded that the KMS model in higher education consists of three constructs, namely be concluded that the KMS model in higher education consists of three constructs, namely be concluded that the KMS model in higher education consists of three constructs, namely be concluded that the KMS model in higher education consists of three constructs, namely be concluded that the KMS model in higher education consists of three constructs, namely be concluded that the KMS model in higher education consists of three constructs, namely be concluded that the KMS model in higher education consists of three constructs, namely be concluded that the KMS model in higher education consists of three constructs, namely be concluded that the KMS model in higher education consists of three constructs, namely be concluded that the KMS model in higher education consists of three constructs, namely be concluded that the KMS model in higher education consists of three constructs, namely be concluded that the KMS model in higher education consists of three constructs, namely be concluded that the KMS model in higher education consists of three constructs, namely be concluded that the KMS model in higher education consists of three constructs, namely be concluded that the KMS model in higher education consists of three constructs, namely be concluded that the KMS model in higher education consists of three constructs, namely be concluded that the KMS model in higher education consists of three constructs, namely be concluded that the KMS model in higher education consists of three constructs, namely be concluded that the KMS model in higher education consists of three constructs, namely be concluded that the KMS model in higher education consists of three constructs, namely be concluded that the KMS model in higher education consists of three constructs, namely be concluded that the KMS model in higher education consists of three constructs, namely be concluded that the KMS model in higher education consists of three constructs, namely be concluded that the KMS model in higher education consists of three constructs, namely be concluded that the KMS model in higher education consists of three constructs, namely be concluded that the KMS model in higher education consists of three constructs, namely be concluded that the KMS model in higher education consists of three constructs, namely be concluded that the KMS model in higher education consists of three constructs, namely be concluded that the KMS model in higher education consists of three constructs, namely be concluded that the KMS model in higher education consists of three constructs, namely be concluded that the KMS model in higher education consists of three constructs, namely be concluded that the KMS model in higher education consists of three constructs, namely be concluded that the KMS model in higher education consists of three constructs, namely be concluded that the KMS model in higher education consists of three constructs, namely be concluded that the KMS model in higher education consists of three constructs, namely be concluded that the KMS model in higher education consists of three constructs, namely be concluded that the KMS model in higher education consists of three constructs, namely be concluded that the KMS model in higher education consists of three constructs, namely be concluded that the KMS model in higher education consists of three constructs, namely be concluded that the KMS model in higher education consists of three constructs, namely be concluded that the KMS model in higher education consists of three constructs, namely be concluded that the KMS model in higher education consists of three constructs, namely be concluded that the KMS model in higher education consists of three constructs, namely be concluded that the KMS model in higher education consists of three constructs, namely be concluded that the KMS model in higher education consists of three constructs, namely be concluded that the KMS model in higher education consists of three constructs, namely regulation, KMS and strategy. In the construct, there are construct elements, namely regulation, KMS and strategy. In the construct, there are construct elements, namely regulation, KMS and strategy. In the construct, there are construct elements, namely regulation, KMS and strategy. In the construct, there are construct elements, namely regulation, KMS and strategy. In the construct, there are construct elements, namely regulation, KMS and strategy. In the construct, there are construct elements, namely regulation, KMS and strategy. In the construct, there are construct elements, namely regulation, KMS and strategy. In the construct, there are construct elements, namely regulation, KMS and strategy. In the construct, there are construct elements, namely regulation, KMS and strategy. In the construct, there are construct elements, namely regulation, KMS and strategy. In the construct, there are construct elements, namely regulation, KMS and strategy. In the construct, there are construct elements, namely regulation, KMS and strategy. In the construct, there are construct elements, namely regulation, KMS and strategy. In the construct, there are construct elements, namely regulation, KMS and strategy. In the construct, there are construct elements, namely regulation, KMS and strategy. In the construct, there are construct elements, namely regulation, KMS and strategy. In the construct, there are construct elements, namely regulation, KMS and strategy. In the construct, there are construct elements, namely regulation, KMS and strategy. In the construct, there are construct elements, namely regulation, KMS and strategy. In the construct, there are construct elements, namely regulation, KMS and strategy. In the construct, there are construct elements, namely regulation, KMS and strategy. In the construct, there are construct elements, namely regulation, KMS and strategy. In the construct, there are construct elements, namely regulation, KMS and strategy. In the construct, there are construct elements, namely regulation, KMS and strategy. In the construct, there are construct elements, namely regulation, KMS and strategy. In the construct, there are construct elements, namely regulation, KMS and strategy. In the construct, there are construct elements, namely regulation, KMS and strategy. In the construct, there are construct elements, namely regulation, KMS and strategy. In the construct, there are construct elements, namely regulation, KMS and strategy. In the construct, there are construct elements, namely regulation, KMS and strategy. In the construct, there are construct elements, namely regulation, KMS and strategy. In the construct, there are construct elements, namely regulation, KMS and strategy. In the construct, there are construct elements, namely regulation, KMS and strategy. In the construct, there are construct elements, namely regulation, KMS and strategy. In the construct, there are construct elements, namely regulation, KMS and strategy. In the construct, there are construct elements, namely regulation, KMS and strategy. In the construct, there are construct elements, namely regulation, KMS and strategy. In the construct, there are construct elements, namely regulation, KMS and strategy. In the construct, there are construct elements, namely regulation, KMS and strategy. In the construct, there are construct elements, namely regulation, KMS and strategy. In the construct, there are construct elements, namely regulation, KMS and strategy. In the construct, there are construct elements, namely regulation, KMS and strategy. In the construct, there are construct elements, namely regulation, KMS and strategy. In the construct, there are construct elements, namely regulation, KMS and strategy. In the construct, there are construct elements, namely regulation, KMS and strategy. In the construct, there are construct elements, namely regulation, KMS and strategy. In the construct, there are construct elements, namely regulation, KMS and strategy. In the construct, there are construct elements, namely regulation, KMS and strategy. In the construct, there are construct elements, namely regulation, KMS and strategy. In the construct, there are construct elements, namely regulation, KMS and strategy. In the construct, there are construct elements, namely regulation, KMS and strategy. In the construct, there are construct elements, namely regulation, KMS and strategy. In the construct, there are construct elements, namely regulation, KMS and strategy. In the construct, there are construct elements, namely regulation, KMS and strategy. In the construct, there are construct elements, namely regulation, KMS and strategy. In the construct, there are construct elements, namely regulation, KMS and strategy. In the construct, there are construct elements, namely regulation, KMS and strategy. In the construct, there are construct elements, namely process, people and software. The results of the model evaluation show that regulatory process, people and software. The results of the model evaluation show that regulatory process, people and software. The results of the model evaluation show that regulatory process, people and software. The results of the model evaluation show that regulatory process, people and software. The results of the model evaluation show that regulatory process, people and software. The results of the model evaluation show that regulatory process, people and software. The results of the model evaluation show that regulatory process, people and software. The results of the model evaluation show that regulatory process, people and software. The results of the model evaluation show that regulatory process, people and software. The results of the model evaluation show that regulatory process, people and software. The results of the model evaluation show that regulatory process, people and software. The results of the model evaluation show that regulatory process, people and software. The results of the model evaluation show that regulatory process, people and software. The results of the model evaluation show that regulatory process, people and software. The results of the model evaluation show that regulatory process, people and software. The results of the model evaluation show that regulatory process, people and software. The results of the model evaluation show that regulatory process, people and software. The results of the model evaluation show that regulatory process, people and software. The results of the model evaluation show that regulatory process, people and software. The results of the model evaluation show that regulatory process, people and software. The results of the model evaluation show that regulatory process, people and software. The results of the model evaluation show that regulatory process, people and software. The results of the model evaluation show that regulatory process, people and software. The results of the model evaluation show that regulatory process, people and software. The results of the model evaluation show that regulatory process, people and software. The results of the model evaluation show that regulatory process, people and software. The results of the model evaluation show that regulatory process, people and software. The results of the model evaluation show that regulatory process, people and software. The results of the model evaluation show that regulatory process, people and software. The results of the model evaluation show that regulatory process, people and software. The results of the model evaluation show that regulatory process, people and software. The results of the model evaluation show that regulatory process, people and software. The results of the model evaluation show that regulatory process, people and software. The results of the model evaluation show that regulatory process, people and software. The results of the model evaluation show that regulatory process, people and software. The results of the model evaluation show that regulatory process, people and software. The results of the model evaluation show that regulatory process, people and software. The results of the model evaluation show that regulatory process, people and software. The results of the model evaluation show that regulatory process, people and software. The results of the model evaluation show that regulatory process, people and software. The results of the model evaluation show that regulatory process, people and software. The results of the model evaluation show that regulatory process, people and software. The results of the model evaluation show that regulatory process, people and software. The results of the model evaluation show that regulatory process, people and software. The results of the model evaluation show that regulatory process, people and software. The results of the model evaluation show that regulatory process, people and software. The results of the model evaluation show that regulatory process, people and software. The results of the model evaluation show that regulatory process, people and software. The results of the model evaluation show that regulatory process, people and software. The results of the model evaluation show that regulatory process, people and software. The results of the model evaluation show that regulatory process, people and software. The results of the model evaluation show that regulatory process, people and software. The results of the model evaluation show that regulatory process, people and software. The results of the model evaluation show that regulatory process, people and software. The results of the model evaluation show that regulatory process, people and software. The results of the model evaluation show that regulatory process, people and software. The results of the model evaluation show that regulatory process, people and software. The results of the model evaluation show that regulatory process, people and software. The results of the model evaluation show that regulatory process, people and software. The results of the model evaluation show that regulatory constructs and strategies have a significant influence on KMS. constructs and strategies have a significant influence on KMS. constructs and strategies have a significant influence on KMS. constructs and strategies have a significant influence on KMS. constructs and strategies have a significant influence on KMS. constructs and strategies have a significant influence on KMS. constructs and strategies have a significant influence on KMS. constructs and strategies have a significant influence on KMS. constructs and strategies have a significant influence on KMS. constructs and strategies have a significant influence on KMS. constructs and strategies have a significant influence on KMS. constructs and strategies have a significant influence on KMS. constructs and strategies have a significant influence on KMS. constructs and strategies have a significant influence on KMS. constructs and strategies have a significant influence on KMS. constructs and strategies have a significant influence on KMS. constructs and strategies have a significant influence on KMS. constructs and strategies have a significant influence on KMS. constructs and strategies have a significant influence on KMS. constructs and strategies have a significant influence on KMS. constructs and strategies have a significant influence on KMS. constructs and strategies have a significant influence on KMS. constructs and strategies have a significant influence on KMS. constructs and strategies have a significant influence on KMS. constructs and strategies have a significant influence on KMS. constructs and strategies have a significant influence on KMS. constructs and strategies have a significant influence on KMS. constructs and strategies have a significant influence on KMS.
RANCANG BANGUN COACHING LOG SEBAGAI LAPORAN KEMAJUAN TENAN INBIS STIKI INDONESIA I Gede Totok Suryawan; Gede Dana Pramitha
Jurnal Teknologi Informasi dan Komputer Vol 5, No 2 (2019): Jurnal Teknologi Informasi dan Komputer
Publisher : LPPM Universitas Dhyana Pura

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (954.774 KB)

Abstract

ABSTRACTThis paper discusses the design and development of the coahcing log tenant system of INBIS STIKI Indonesia. Coaching log is an accompaniment record recorded in a hard copy file that contains data on tenants, coaches, mentoring records, assignments from coaches to tenants, and results of previous assignments given by coaches to tenants. This hard copy coaching log file cannot be used effectively especially in seeing the development of tenants from time to time or the progress reports of tenants. To solve this problem in this study a web-based log coaching system has been developed which has tenant data management features, data coaches, making mentoring schedules, providing timetables for mentors, coaching logs by coaches, coaching logs by tenants. The system design model used in this study uses the Unified Modeling Language (UML) model, system development using the laravel framework, and testing using the blackbox testing method. Based on the results of testing all the features that are owned by this log coaching system can function properly. And the system developed can help INBIS STIKI Indonesia in managing the process of assisting tenants.Keywords: Information System, Coaching Log, Business Incubator. Tenant, CoachABSTRAKPaper ini membahas tentang perancangan dan pengembangan sistem coahcing log tenan INBIS STIKI Indonesia. Coaching log merupakan catatan pendampingan yang direkam dalam sebuah file hard copy yang berisi tentang data tenan, coach, catatan pendampingan, tugas dari coach kepada tenan, serta hasil tugas sebelumnya yang diberikan oleh coach kepada tenan. File hard copy coaching log ini belum bisa digunakan secara efektif khususnya dalam melihat perkembangan tenan dari waktu ke waktu atau laporan kemajuan tenan. Untuk menyelesaikan masalah tersebut pada penelitian ini telah dikembangan sistem coaching log berbasis web yang memiliki fitur pengelolaan data tenan, data coach, pembuatan jadwal pendampingan, pemberian jadwal pendampingan kepada tenan, coaching log oleh coach, coaching log oleh tenan. Model perancangan sistem yang digunakan dalam penelitian ini menggunakan model Unified Modeling Language (UML), pengembangan sistem menggunakan framework laravel, dan pengujian menggunakan metode blackbox testing. Berdasarkan hasil pengujian semua fitur yang dimiliki oleh sistem coaching log ini secara fungsional bisa berjalan dengan baik. Dan sistem yang dikembangkan bisa membantu INBIS STIKI Indonesia dalam mengelola proses pendampingan tenan.Kata Kunci : Sistem Informasi, Coaching Log, Inkubator Bisnis, Tenan, Pendamping
KOREKSI UJIAN ESSAY OTOMATIS DENGAN TEXT MINING PADA E-LEARNING STIKOM BALI Ida Bagus Ketut Surya Arnawa
Jurnal Teknologi Informasi dan Komputer Vol 5, No 2 (2019): Jurnal Teknologi Informasi dan Komputer
Publisher : LPPM Universitas Dhyana Pura

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (560.914 KB)

Abstract

ABSTRACTOne of the most important things in the world of education is evaluation in the learning process. The purpose of conducting an evaluation process is to find out the extent to which students understanding a material that has been delivered. There are several ways that can be done in conducting an evaluation, one of them is by giving exam questions to measure students' abilities. STIKOM Bali has implemented online evaluation through e-learning system. The evaluation model developed in the form of essay exam questions where students are asked to input answers to each question. But in its implementation the lecturer is still experiencing difficulties and requires more time in correcting the answers to the exam questions. This can affect the decline in objectivity in the assessment. The efforts that need to be made to overcome these problems need to be developed techniques that can automatically correct the results of essay exams using the Rabin Karp algorithm. The results obtained from the development of automatic correction techniques using the Rabin Karp algorithm are that they have succeeded in making automatic corrections to the results of the essay exam by matching the answers of students with the answer key using parsing-gram and hashing. The final score of the essay exam is a number from 1 to 100.Keywords: Rabin-Karp, automatic correction, essay.ABSTRAKSalah satu hal yang terpenting dalam dunia pendidikan adalah evaluasi dalam proses pembelajaran. Adapun tujuan melakukan proses evaluasi adalah untuk mengetahui sejauh mana pemahaman mahasiswa dalam menyerap/memahami suatu materi yang telah disampaikan. Ada beberapa cara yang dapat dilakukan dalam melakukan evaluasi salah satunya dengan memberikan soal ujian guna untuk mengukur kemampuan mahasiswa. STIKOM Bali sudah menerapkan evaluasi online melalui sistem e-learning. Model evaluasi yang dikembangkan berupa soal ujian essay dimana mahasiswa diminta menginputkan jawaban pada masing-masing soal. Namun dalam implementasinya dosen masih mengalami kesulitan dan membutuhkan waktu yang lebih dalam melakukan koreksi jawaban dari soal ujian. Hal ini dapat mempengaruhi penurunan objektifitas dalam penilaian. Adapun upaya yang perlu dilakukan untuk menanggulangi permasalan tersebut perlu dikembangkan teknik yang dapat mengkoreksi otomatis hasil ujian essay dengan menggunakan algoritma Rabin Karp. Hasil yang didapat dari pengembangan teknik koreksi otomatis menggunakan algoritma Rabin Karp yaitu sudah berhasil melakuakan koreksi secara otomatis hasil ujian essay dengan cara mencocokan jawaban mahasiswa dengan kunci jawaban menggunakan parsing -gram dan hashing. Nilai akhir dari penilaian ujian essay berupa angka dari 1 sampai 100.Kata Kunci : Rabin-Karp, koreksi otomatis,essay.
PENGUKURAN KUALITAS LAMAN WEBSITE UNIVERSITAS DHYANA PURA MENGGUNAKAN METODE WEBQUAL 4.0 Gabriel Firsta Adnyana; Agus Tommy Adi Prawira Kusuma
Jurnal Teknologi Informasi dan Komputer Vol 5, No 3 (2019): Jurnal Teknologi Informasi dan Komputer
Publisher : LPPM Universitas Dhyana Pura

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (494.437 KB)

Abstract

ABSTRACT Website is a form of electronic media that is published through an internet network connectionthat can be accessed without knowing the time and place. The website www.undhirabali.ac.id is awebsite that provides news information about academic activities in the form of teaching and learningactivities (KBM). However, the problem that occurs so far is that there are still problems in terms ofquality of use such as search content (searching) does not function properly, from the quality ofinformation the existence of news content that is rarely updated, from the quality of service interactionssuch as the number of old news that is not found can be accessed. To find out the quality of a Website itis necessary to measure. By measuring the quality of a Website, it can be known the user's perception ofthe Website. There are 4 (four) main dimensions of WebQual 4.0, namely Usability, Information Quality,Service Interaction, and Overal Impression. WebQual Method 4.0. is an instrument that assesses thequality of a website according to the perspective of the end user. This research was conducted at theUniversity of Dhyana Pura Badung-Bali. This research was conducted using a questionnaire and thedata collection method used was random sampling. The population of this research is lecturers, studentsand administrative staff. In this study, the testing method used to test the relationship between variablesfrom Webqual 4.0 to user satisfaction is the quantitative descriptive method approach by means of ChiSquare testing. From the results of the study it can be concluded that the best quality of use is that thewebsite provides clear interaction while the worst is that the website has no competition, then the bestquality of information is providing a reliable website while the worst is the website does not providedetailed information and the best quality of service interaction that is website provides security whilethe worst is that website does not provide convenience to deliver feedback and the four variablesWebqual 4.0, namely quality of use, quality of information and quality of service interaction have apositive and significant effect on user satisfaction (user satisfaction).Keywords: Webqual, Website, Information Services, Random Sampling and Teaching and LearningActivities (KBM). ABSTRAK Website merupakan salah satu bentuk media elektronik yang dipublikasi melalui koneksijaringan internet yang dapat diakses tanpa mengenal waktu dan tempat. Website www.undhirabali.ac.idmerupakan website yang memberikan pelayanan informasi berita seputar kegiatan akademik berupakegiatan belajar mengajar (KBM). Namun permasalahan yang terjadi selama ini yaitu masih terdapatmasalah dari segi kualitas kegunaan seperti konten pencarian (searching) tidak berfungsi dengan baik,dari kualitas informasi adanya konten-konten berita yang jarang diupdate, dari kualitas interaksipelayanan seperti banyaknya ditemukan berita-berita lama yang tidak bisa diakses. Untuk mengetahuikualitas sebuah Website maka perlu dilakukan pengukuran. Dengan melakukan pengukuran kualitassuatu Website dapat diketahui persepsi pengguna terhadap Website tersebut. Terdapat 4 (empat) dimensiutama WebQual 4.0, yaitu Usability, Information Quality, Service Interaction, dan Overal Impression.Metode WebQual 4.0. merupakan instrument yang menilai kualitas suatu website menurut perspektifpengguna akhir. Penelitian ini dilakukan di lingkungan Universitas Dhyana Pura Badung-Bali.Penelitian ini dilakukan dengan menggunakan kuesioner dan metode pengambilan data yang digunakanadalah random sampling. Populasi dari penelitian ini adalah dosen, mahasiswa dan tenaga administrasi. Dalam penelitian ini, metode pengujian yang digunakan untuk menguji hubungan antar variabel dari Webqual 4.0 terhadap kepuasan pengguna (user satisfaction) adalah dengan pendekatan metodedeskriptif kuantitatif yaitu dengan cara pengujian Chi Square. Dari hasil penelitian dapat disimpulkanbahwa kualitas kegunaan yang paling baik yaitu website menyediakan interaksi yang jelas sedangkanyang paling buruk yaitu website tidak memiliki kompetisi, kemudian kualitas informasi yang paling baikyaitu menyediakan website yang dapat dipercaya sedangkan yang paling buruk yaitu website tidakmenyediakan informasi yang detail serta kualitas interaksi pelayanan yang paling baik yaitu websitememberikan keamanan sedangkan yang paling buruk yaitu website tidak memberikan kemudahan untukmenyampaikan umpan balik (feedback) dan keempat variabel Webqual 4.0, yaitu kualitas kegunaan,kualitas informasi dan kualitas interaksi pelayanan berpengaruh positif dan signifikan terhadap kepuasanpengguna (user satisfaction).Kata Kunci: Webqual, Website, Layanan Informasi,Random Sampling dan Kegiatan Belajar Mengajar(KBM)
PERANCANGAN SISTEM INFORMASI EKSEKUTIF BERBASIS WEB PADA UPT LABORATORIUM HAYATI PERTANIAN BALI UNTUK PENENTUAN PENYAKIT PADA BIBIT TANAMAN Agus Purwanto; Anggun Nugroho; Shofwan Hanief
Jurnal Teknologi Informasi dan Komputer Vol 6, No 2 (2020): Jurnal Teknologi Informasi dan Komputer
Publisher : LPPM Universitas Dhyana Pura

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (410.59 KB)

Abstract

ABSTRACTNursery varieties of plants carried out by the UPT Laboratory of Biological Services of the Gianyar Agriculture Office is one of the stages of developing plant seeds which will then be given to farmers for cultivation. The problem that occurs at this time is in the process of breeding there is often a disease attack caused by a variety of factors, and this often occurs repeatedly so that what must be done to deal with the problems in the germ of the disease becomes inefficient. This is because there is no documentation that can provide information about diseases, disease categories and their management. With the presence of documented input data based on technology, disease information can be displayed either per item or seedling variety, disease category, and several other information as needed. With the existence of an executive information system, managers, especially the head of the UPT, can monitor the diseases of the seeds so that they can be handled based on data that has been inputted or even conduct research on the disease and how to overcome them so that it enriches the insight and knowledge of the head of the UPT for tackling the seeds, thereby being able to direct UPT staff in the laboratory and field to execute according to documented information. This system will be developed based on the web so that it can be accessed from anywhere, because the nursery process is not only done at one point. The results of this study are a system design that can provide information on seeds and diseases that attack the seedlings and how to overcome them based on data that has been entered.Keywords : Nursery, UPT Laboratorium Hayati Pertanian Bali, EISABSTRAKPembibitan varietas tanaman yang dilakukan oleh UPT Laboratorium Hayati Dinas Pertanian Gianyar merupakan salah satu tahapan pengembangan bibit tanaman yang selanjutnya akan diberikan kepada petani untuk dibudidayakan. Permasalahan yang terjadi saat ini adalah pada proses pembibitan sering terjadi serangan penyakit yang disebebkan oleh berbagai macam faktor, dan hal ini sering berulang terjadi sehingga apa yang harus dilakukan untuk penangana permasalahan pada bibit penyakit tersebut manjadi tidak efisien. Hal ini dikarenakan tida adanya dokumentasi yang dapat memberikan informasi tentang penyakit, kategori penyakit serta penanggulangannya. Dengan adanya data inputan yang terdokumentasi berbasis teknologi akan dapat ditampilkan informasi penyakit baik per item atau varietas bibit, kategori penyakit, dan beberapa informasi lainnya sesuai dengan kebutuhan. Dengan adanya sebuah sistem informasi eksekutif, para pengelola khususnya kepala UPT dapat memonitor penyakit pada bibit sehingga dapat dilakukan penanganan berdasarkan data yang sudah diinput atau bahkan melakukan penelitian terhadap penyakit dan cara penanggulangannya sehingga memperkaya wawasan dan pengetahuan kepala UPT untuk penanggulangan bibit, dengan demikian dapat mengarahkan para staf UPT di laboratorium dan lapangan untuk mengeksekusi sesuai dengan informasi yang telah terdokumentasi. Sistem ini akan dikembangkan berbasis web agar dapat diakses dari mana saja, karena proses pembibitan tidak hanya dilakukan di satu titik. Hasil dari penelitian ini adalah sebuah perancangan system yang dapat memberikan informasi bibit dan penyakit-penyakit yang menyerang pada bibit tsb dan cara penanggulangannya berdasarkan data yang telah dimasukkan.Kata Kunci : Pembibitan, UPT Laboratorium Hayati Pertanian Bali, SIE
ANALISA TINGKAP KESIAPAN PENERAPAN KEAMANAN TEKNOLOGI INFORMASI DALAM PELAKSANAAN e-GOVERNMENT BERBASIS INDEKS KEAMANAN INFORMASI (KAMI) STUDI KASUS PEMERINTAH KOTA KEDIRI I Gede Putu Krisna Juliharta
Jurnal Teknologi Informasi dan Komputer Vol 5, No 1 (2019): Jurnal Teknologi Informasi dan Komputer
Publisher : LPPM Universitas Dhyana Pura

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (866.097 KB)

Abstract

ABSTRACT e-Governement in Indonesia is a must this time. Good E-Governments certainly have the ability to provide good information to the public and fulfill aspects of confidentiality, integrity and availability, Kediri in East Java is one of the government that use e-Government. To measure these three aspects the system must be measured. Indeks KAMI (Keamanan Informasi) is an application that is used as a tool to analyze and evaluate the level of readiness (completeness and maturity) for implementing information security in an organization in accordance with SNI ISO / IEC 27001 criteria. Government of Kediri the score for the electronic system category was 20, for the governance assessment the score was 75, risk management score 18, the information security framework was 58, asset management 74, and the application of security and information technology had a value of 83, and the results measurement says the City Government of Kediri needs to improve the system management.Keywords: Index, KAMI , Security, Information TechnologyABSTRAK Penerapan e-Governement dalam tata kelola Pemerintahan di Indonesia saat ini merupakan sebuah keharusan. E-Governement yang baik tentu memiliki kemampuan untuk memberikan Informasi yang baik kepada masyarakat dan memenuhi aspek kerahasiaan (confidentiality), keutuhan (integrity) dan ketersediaan (availability), Pemerintah Kota (Pemkot) Kediri adalah salah lembaga pemerintah yang menggunakan e-Government. Untuk mengukur ketiga aspek tersebut sistem haruslah diukur. Indeks KAMI (Keamanan Informasi) merupakan aplikasi yang digunakan sebagai alat bantu untuk menganalisa dan mengevalusi tingkat kesiapan (kelengkapan dan kematangan) penerapan keamanan informasi di sebuah organisasi sesuai dengan kriteria pada SNI ISO/IEC 27001. Untuk Pemkot Kediri didapatkan skor kategori sistem elektronik (SE) adalah 20, untuk penilaian tata kelola skornya adalah 75, pengelolaan resiko skornya 18, kerangka kerja keamanan informasi nilainya 58, pengelolaan asset 74, dan penerapan teknologi keamanan dan informasi memiliki nilai 83, dan hasil pengukuran menyebutkan Pemkot Kediri perlu meningkatkan system pengelolaan system yang dimiliki.Kata Kunci : indeks, KAMI, keamanan, teknologi informas
REDAKSI JUTIK REDAKSI JUTIK
Jurnal Teknologi Informasi dan Komputer Vol 5, No 1 (2019): Jurnal Teknologi Informasi dan Komputer
Publisher : LPPM Universitas Dhyana Pura

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (80.67 KB)

Abstract

REDAKSI JUTIK

Page 11 of 46 | Total Record : 458


Filter by Year

2015 2026


Filter By Issues
All Issue Vol. 12 No. 1 (2026): JUTIK : Jurnal Teknologi Informasi dan Komputer, Edisi April 2026 Vol. 11 No. 2 (2025): JUTIK : Jurnal Teknologi Informasi dan Komputer, Edisi Oktober 2025 Vol. 11 No. 1 (2025): JUTIK : Jurnal Teknologi Informasi dan Komputer, Edisi April 2025 Vol. 10 No. 4 (2024): JUTIK : Jurnal Teknologi Informasi dan Komputer, Edisi Desember 2024 Vol. 10 No. 3 (2024): Jurnal Teknologi Informasi dan Komputer Vol. 10 No. 2 (2024): Jurnal Teknologi Informasi dan Komputer Vol. 10 No. 1 (2024): Jurnal Teknologi Informasi dan Komputer Vol. 9 No. 6 (2023): Jurnal Teknologi Informasi dan Komputer Vol. 9 No. 5 (2023): Jurnal Teknologi Informasi dan Komputer Vol. 9 No. 4 (2023): Jurnal Teknologi Informasi dan Komputer Vol. 9 No. 3 (2023): Jurnal Teknologi Informasi dan Komputer Vol. 9 No. 2 (2023): Jurnal Teknologi Informasi dan Komputer Vol 9, No 2 (2023): Jurnal Teknologi Informasi dan Komputer Vol. 9 No. 1 (2023): Jurnal Teknologi Informasi dan Komputer Vol 9, No 1 (2023): Jurnal Teknologi Informasi dan Komputer Vol 8, No 4 (2022): Jurnal Teknologi Informasi dan Komputer Vol 8, No 3 (2022): Jurnal Teknologi Informasi dan Komputer Vol 8, No 2 (2022): Jurnal Teknologi Informasi dan Komputer Vol 8, No 1 (2022): Jurnal Teknologi Informasi dan Komputer Vol 7, No 4 (2021): Jurnal Teknologi Informasi dan Komputer Vol. 7 No. 3 (2021): Jurnal Teknologi Informasi dan Komputer Vol 7, No 3 (2021): Jurnal Teknologi Informasi dan Komputer Vol 7, No 2 (2021): Jurnal Teknologi Informasi dan Komputer Vol 7, No 1 (2021): Jurnal Teknologi Informasi dan Komputer Vol 6, No 3 (2020): Jurnal Teknologi Informasi dan Komputer Vol 6, No 2 (2020): Jurnal Teknologi Informasi dan Komputer Vol 6, No 1 (2020): Jurnal Teknologi Informasi dan Komputer Vol 5, No 3 (2019): Jurnal Teknologi Informasi dan Komputer Vol 5, No 2 (2019): Jurnal Teknologi Informasi dan Komputer Vol 5, No 1 (2019): Jurnal Teknologi Informasi dan Komputer Vol 4, No 2 (2018): Jurnal Teknologi Informasi dan Komputer Vol 4, No 1 (2018): Jurnal Teknologi Informasi dan Komputer Vol 3, No 2 (2017): Jurnal Teknologi Informasi dan Komputer Vol 3, No 1 (2017): Jurnal Teknologi Informasi dan Komputer Vol 2, No 2 (2016): Jurnal Teknologi Informasi dan Komputer Vol 2, No 1 (2016): Jurnal Teknologi Informasi dan Komputer Vol 1, No 2 (2015): Jurnal Teknologi Informasi Dan Komputer Vol 1, No 1 (2015): Jurnal Teknologi Informasi dan Komputer More Issue