cover
Contact Name
Eva Khudzaeva
Contact Email
eva.khudzaeva@uinjkt.ac.id
Phone
+6282114627822
Journal Mail Official
aism.journal@uinjkt.ac.id
Editorial Address
Department of Information System, Faculty of Science and Technology, Universitas Islam Negeri Syarif Hidayatullah Jakarta Jl. Ir. H. Juanda No.95, Cempaka Putih, Ciputat Timur. Kota Tangerang Selatan, Banten 15412
Location
Kota tangerang selatan,
Banten
INDONESIA
Applied Information System and Management
ISSN : 26212536     EISSN : 26212544     DOI : 10.15408/aism
Core Subject : Education,
Arjuna Subject : -
Articles 8 Documents
Search results for , issue "Vol 3, No 2 (2020): Applied Information System and Management (AISM)" : 8 Documents clear
The Influence of Corporate Communication Strategy and Customer Value Creation Toward Creation of Reputation (Case Study) Syaifuddin Syaifuddin
Applied Information System and Management (AISM) Vol 3, No 2 (2020): Applied Information System and Management (AISM)
Publisher : Depart. of Information Systems, FST, UIN Syarif Hidayatullah Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15408/aism.v3i2.13627

Abstract

The objectives of this research are to know and to analyze corporate communication strategy, customer value creation, creation of corporate reputation and the influence of corporate communication strategy and customer value creation toward creation of corporate reputation. This research is descriptive and verificative with descriptive survey and explanatory with stratified random sampling. The amount of sample is 55 respondents. Data collection techniques are library data, observation, and questioner. Analysis data used is path analysis. Research results show that the corporate communication strategy and customer value creation influence the creation of reputation Len Industri Group is 53.7% simultaneously. The influence of corporate communication strategy to the creation of reputation is at 47.2% partially whereas the customer value creation does not significantly influence the creation of reputation is 5.1%.
Evaluasi Manajemen Risiko Teknologi Informasi Menggunakan Framework COBIT 5 (Studi Kasus: PT PLN P2B Jawa Bali) Muhammad Kamal Sani Firdaus
Applied Information System and Management (AISM) Vol 3, No 2 (2020): Applied Information System and Management (AISM)
Publisher : Depart. of Information Systems, FST, UIN Syarif Hidayatullah Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15408/aism.v3i2.8600

Abstract

Kemungkinan adanya ancaman dan risiko TI (Teknologi Informasi) yang muncul seiring dengan penerapan IT Governance dapat menganggu proses bisnis yang berjalan. Hal ini penting bagi suatu perusahaan untuk menerapkan manajemen risiko TI. Dalam penerapannya, PLN P2B  didukung oleh Divisi Teknologi Informasi dan Telekomunikasi sebagai penyedia layanan TI. Diketahui permasalahan yang sedang dialami PLN P2B adalah insiden kehilangan data yang diakibatkan adanya kegagalan dalam migrasi data ketika PLN P2B mengupgrade server dari 3-node clusters menjadi 6-node clusters. Oleh karena itu, diperlukan adanya evaluasi terhadap manajemen risiko TI sesuai dengan standar yang ada. Penelitian ini bertujuan untuk mengetahui tingkat kapabilitas manajemen risiko TI menggunakan metodologi Process Assessment Model (PAM) COBIT 5 yang terdiri dari tahapan Initiation, Planning the Assesment, Briefing, Data Collection, Data Validation, Process Attribute Level dan Reporting the Result. Hasil dari penelitian ini menunjukan tingkat pengelolaan risiko dan pengoptimalan risiko saat ini berada pada level 3 (Established Process) dan berdasarkan hasil penilaian risiko terdapat 6 risk issue yang tingkat risikonya di atas batas risk appetite. Sehingga PLN P2B direkomendasikan untuk menerapkan dan mengemb    angkan DRP (Disaster Recovery Plan) berdasarkan kerangka kerja yang didesain untuk mengurangi dampak terhadap fungsi dan proses bisnis utamanya. Selain itu PLN P2B direkomendasikan menentukan dan mengimplementasikan langkah pengamanan fisik sesuai dengan persyaratan. Salah satunya dengan menempatkan database server di tempat yang aman. Dengan demikian diharapkan hasil penelitian ini dapat dijadikan bahan pertimbangan PLN P2B dalam melakukan perbaikan tata kelola TI agar dapat berjalan lebih optimal.
Implementasi Kriptografi dengan Algoritma Advanced Encryption Standard (AES) 128 Bit dan Steganografi menggunakan Metode End of File (EOF) Berbasis Java Desktop pada Dinas Pendidikan Kabupaten Tangerang Anggraeni Eka Putri; Aghistina Kartikadewi; Lina Audina Abdul Rosyid
Applied Information System and Management (AISM) Vol 3, No 2 (2020): Applied Information System and Management (AISM)
Publisher : Depart. of Information Systems, FST, UIN Syarif Hidayatullah Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15408/aism.v3i2.14722

Abstract

Faktor keamanan data dalam proses pertukaran maupun penyimpanan data menjadi hal yang sangat penting untuk diperhatikan seiring dengan kerahasiaan atau pentingnya informasi tersebut. Pertukaran data sangat beresiko ketika pihak yang tidak berkepentingan dapat mengakses data tersebut. Mengingat pentingnya keamanan dan kerahasiaan data, maka dibutuhkan system keamanan pengiriman maupun penyimpanan data menggunakan teori penyamaran dalam bentuk sandi atau kode khusus. Teknik yang umum digunakan adalah dengan mengacak informasi dan menggantinya dengan sandi khusus yang telah ditetapkan yaitu kriptografi. Tetapi informasi yang diacak sering menimbulkan kecurigaan, maka dibutuhkan teknik lain yaitu dengan menyamarkan data ke dalam data lain yaitu steganografi. Teknik steganografi akan menyamarkan pesan dengan cara disisipkan dalam sebuah gambar digital. Kombinasi dari teknik kriptografi dan steganografi akan menghasilkan tingkat keamanan data yang sangat tinggi guna menjaga keamanan data tanpa mengubah gamabar secara visual.  Algoritma kriptografi yang akan digunakan adalah metode kriptografi Advanced Encryption Standard (AES) 128 bit dan teknik steganografi End Of File (EOF).
Development of Web-based Spatial Information System Tourism Industry Event Distribution (Case Study: DKI Jakarta) Muhammad Syaifullah Mahfudz; Zainul Arham; Eva Khudzaeva
Applied Information System and Management (AISM) Vol 3, No 2 (2020): Applied Information System and Management (AISM)
Publisher : Depart. of Information Systems, FST, UIN Syarif Hidayatullah Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15408/aism.v3i2.17986

Abstract

In recent years, the number and scope of events in the Asia and Middle East / North Africa region has increased significantly. Events are one of the things that attracts the attention of foreign tourists to come to visit a country as a tourist destination. Refers toMinister of Tourism Regulation Number 2 Year 2017on Guidelines for Venues for Meetings, Incentive Trips, Conventions and Exhibitions, explains that criteria and indicators are needed to increase the competitiveness of venues for meetings, incentive trips, conventions and exhibitions at the regional and global levels. This is done to increase the number of visits, length of stay, and expenditures for domestic and foreign tourists. Therefore, visual indicators or data are needed that can present the location of the event and a list of events in DKI Jakarta. From these problems, this study aims to produce a web-based spatial information system for the distribution of tourism industry events to map event locations in DKI Jakarta. The methodology used in collecting this data is the method of observation, interviews, and literature studies. While the system development methodology uses PHP and MySQL with the Rapid Application Development (RAD) approach and uses the Unified Modeling Language (UML) which is a tool for system description and design, as well as the Google Maps API for digital maps. The results of this study are in the form of a spatial information system that can display a map of the distribution of event locations in DKI Jakarta based on event data and event categories at the DKI Jakarta Tourism and Creative Economy Department. While the system development methodology uses PHP and MySQL with the Rapid Application Development (RAD) approach and uses the Unified Modeling Language (UML) which is a tool for describing and designing systems, as well as the Google Maps API for digital maps. The results of this study are in the form of a spatial information system that can display a map of the distribution of event locations in DKI Jakarta based on event data and event categories at the DKI Jakarta Tourism and Creative Economy Department. While the system development methodology uses PHP and MySQL with the Rapid Application Development (RAD) approach and uses the Unified Modeling Language (UML) which is a tool for describing and designing systems, as well as the Google Maps API for digital maps. The results of this study are in the form of a spatial information system that can display a map of the distribution of event locations in DKI Jakarta based on event data and event categories in the DKI Jakarta Tourism and Creative Economy Department.
Design and Analysis of Management Information System Qurban (SIMAQ) at PKPU Human Initiative, East Jakarta Oviani Viandari; Qurrotul Aini
Applied Information System and Management (AISM) Vol 3, No 2 (2020): Applied Information System and Management (AISM)
Publisher : Depart. of Information Systems, FST, UIN Syarif Hidayatullah Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15408/aism.v3i2.11025

Abstract

The establishment of the Pos Keadilan Peduli Umat (PKPU) Human Initiative as one of the non-governmental institutions. Concentration on humanitarian issues should have a public service standard such as a SIM (Management Information System) the goal is to fulfill role processing needs in channel qurban with modern management where more days the number of donors is getting more increase so that requires management to improve service quality. Therefore the writer analyzed and designed the Qurban Management Information System at PKPU Jakarta East. The method used in Job Training (PKL) is Rapid Application Development (RAD) through the Requirement Planning and Workshop Design stages with modeling Unified Modeling Language (UML) so as to produce analysis and design of Information Systems Qurban Management (SIMAQ), from the results of street vendors the authors analyze and design include: integrate donor data management starting from collection transactions up to reporting on distribution or distribution of qurban animals, the author designs starting from the use case diagram that will explain the sequence of activities performed by actors and systems to achieve the system needed, such as identification of actors, identification of use cases , design of use cases and use case narratives , activity diagrams, sequence diagrams, and class diagrams . Display of the system user interface qurban management information based on the duties and authority of each actor.
Model Satisfaction Users Measurement of Academic Information System Using End-User Computing Satisfaction (EUCS) Method Nur Aeni Hidayah; Elvi fetrina; Alvali Zaqi Taufan
Applied Information System and Management (AISM) Vol 3, No 2 (2020): Applied Information System and Management (AISM)
Publisher : Depart. of Information Systems, FST, UIN Syarif Hidayatullah Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15408/aism.v3i2.14516

Abstract

As concrete steps in order to realize the vision and mission of an organization or educational institution is to implement the system of academic information. The one factor that influences the success of the academic information system is the satisfaction of users.  The problems in the user satisfaction are also issues that cannot be denied and continue to be studied. In consequently, having measurements related to user satisfaction is required. This research is done to see how the user satisfaction of the existing system has been implemented and to know what factorshas influenced the system. The method used in this study is a quantitative method using the End User Computing Satisfaction (EUCS) model whereas 255 respondents are chosen as the sample for the study. The purposive sampling technique is usedand the PLS-SEM approach with tools Smart PLS 3.0 is used for analyzing the data.  This research consists of 7 hypotheses and 8 variables, namely Content, Accuracy, Format, Timeliness, Ease of Use, System Reliability, System Speed and End-User Satisfaction. The research finds out that the current level of end-user satisfaction is in satisfied level. Inferentially, of the 7 hypotheses tested, 2 of them were rejected and the other 5; Accuracy, System Reliability, Timeliness, Content and System Spee;are accepted.Through this research, it is hoped that later it could be used as a practical consideration and theoretical study in thefuture.
Penilaian Kematangan Proses Pengembangan Perangkat Lunak Menggunakan Capability Maturity Model Integration Roadmaps Muhammad Isa Wibisono; Karmilasari Karmilasari; Aang Subiyakto
Applied Information System and Management (AISM) Vol 3, No 2 (2020): Applied Information System and Management (AISM)
Publisher : Depart. of Information Systems, FST, UIN Syarif Hidayatullah Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15408/aism.v3i2.14530

Abstract

Pengembangan produk perangkat lunak merupakan salah satu faktor penting bagi organisasi untuk menghasilkan layanan produk digital yang berdampak pada digitalisasi proses pengembangannya. Banyak organisasi sistem informasi di Indonesia menghadapi tujuan itu dan berusaha mengevaluasi proses pengembangan perangkat lunak (PPL) dibuktikan dengan pembahasan penelitian tentang topik tingkat kematangan. Dalam penelitian ini dilakukan pada salah satu organisasi perusahaan telekomunikasi Indonesia sebagai penyedia produk digital. Hal ini bertujuan untuk menilai tingkat kematangan proses PPL saat ini sebagai titik awal peningkatan proses pengembangan organisasi untuk menghasilkan kualitas produk terbaik tanpa cacat. Organisasi perlu menilai dan mengevaluasi tingkat kematangan dalam meningkatkan dan kualitas produk serta analisis kematangan dapat digunakan untuk mengungkap kelemahan proses. Hasilnya, organisasi saat ini pada maturity level 2 (ML2) atau Managed, sedangkan untuk ML3 belum terpenuhi semua process area dengan pendekatan CMMI Roadmaps sebagai langkah berikutnya untuk mencapai maturity level 3 (ML3). Beberapa rekomendasi juga diusulkan untuk meningkatkan sisa process area yang belum memenuhi specific process.
Evaluasi Tata Kelola Teknologi Informasi Menggunakan COBIT 5 (Studi Kasus: Direktorat Jenderal Sumber Daya Air Kementerian Pekerjaan Umum dan Perumahan Rakyat RI) Richardy Affan Sojuangon Siregar
Applied Information System and Management (AISM) Vol 3, No 2 (2020): Applied Information System and Management (AISM)
Publisher : Depart. of Information Systems, FST, UIN Syarif Hidayatullah Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15408/aism.v3i2.7890

Abstract

Teknologi Informasi (TI) merupakan bagian yang tak terpisahkan dari upaya penerapan good governance sebagai langkah instansi dalam mencapai tujuan yang diharapkan. Direktorat Jenderal Sumber Daya Air (Ditjen SDA) sendiri memiliki kebijakan umum yang tertera pada Rencana Strategis 2015 – 2019 Ditjen SDA,  yaitu penataan dan penguatan sistem pengelolaan data dan informasi sumber daya air dilakukan secara terencana dan dikelola secara berkesinambungan dalam rangka pelayanan data dan informasi, baik ke dalam maupun ke luar Ditjen SDA. Fungsi pengelolaan teknologi informasi pada Ditjen SDA sendiri di lakukan oleh Subdirektorat Sistem Informasi dan Data (Subdit SISDA). Diketahui masih terdapat masalah dalam pengelolaan tata kelola TI oleh Subdit SISDA yaitu, kurang optimalnya pegawai dalam penggunaan TI dan juga kurangnya ketersedian informasi pada beberapa Aplikasi SISDA. Maka, perlu dilakukan suatu evaluasi tata kelola TI. Dalam penelitian ini menggunakan framework COBIT 5 dengan PAM (Process Assessment Model). Penelitian ini berfokus pada proses EDM04 (Ensure Resource Optimization) dan BAI04 (Manage Availablity and Capacity). Tujuan penelitian ini mengetahui capability level kondisi saat ini (as-is) dan kondisi yang di harapkan (to-be), kesenjangan (gap), serta memberikan rekomendasi pada Subdit SISDA. Hasil dari penelitian ini menunjukan kondisi saat ini proses EDM04 berada pada level 3 (Established Process) dan kondisi yang diharapkan berada pada level 5 (Optimising Process). Kemudian kondisi saat ini proses BAI04 berada pada level 2 (Managed Process) dan kondisi yang diharapkan berada pada level 4 (Predictable Process). Berdasarkan hasil tersebut, diketahui bahwa masing-masing proses memiliki gaps sebesar 2 antara as-is dan to-be, sehingga Subdit SISDA pada proses EDM04 direkomendasikan agar terlebih dahulu melakukan pelaksanaan aktivitas dan pemenuhan proses atribut work product pada level 4 (Predictable Process dan juga pada proses BAI04 direkomendasikan agar terlebih dahulu melakukan pelaksanaan aktivitas dan pemenuhan proses atribut work product pada level 3 (Established Process) sebagai solusi dari permasalahan yang ditemukan.

Page 1 of 1 | Total Record : 8


Filter by Year

2020 2020


Filter By Issues
All Issue Vol. 8 No. 2 (2025): Applied Information System and Management (AISM) Vol 8, No 1 (2025): Applied Information System and Management (AISM) Vol. 8 No. 1 (2025): Applied Information System and Management (AISM) Vol. 7 No. 2 (2024): Applied Information System and Management (AISM) Vol 7, No 2 (2024): Applied Information System and Management (AISM) Vol. 7 No. 1 (2024): Applied Information System and Management (AISM) Vol 6, No 2 (2023): Applied Information System and Management (AISM) Vol. 6 No. 2 (2023): Applied Information System and Management (AISM) Vol. 6 No. 1 (2023): Applied Information System and Management (AISM) Vol 6, No 1 (2023): Applied Information System and Management (AISM) Vol. 5 No. 2 (2022): Applied Information System and Management (AISM) Vol 5, No 2 (2022): Applied Information System and Management (AISM) Vol. 5 No. 1 (2022): Applied Information System and Management (AISM) Vol 5, No 1 (2022): Applied Information System and Management (AISM) Vol 4, No 2 (2021): Applied Information System and Management (AISM) Vol. 4 No. 2 (2021): Applied Information System and Management (AISM) Vol 4, No 1 (2021): Applied Information System and Management (AISM) Vol 3, No 2 (2020): Applied Information System and Management (AISM) Vol 3, No 1 (2020): Applied Information System and Management (AISM) Vol. 3 No. 1 (2020): Applied Information System and Management (AISM) Vol 2, No 2 (2019): Applied Information System and Management (AISM) Vol 2, No 1 (2019): Applied Information System and Management (AISM) Vol 1, No 2 (2018): Applied Information System and Management (AISM) Vol 1, No 1 (2018): Applied Information System and Management (AISM) More Issue