cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota pematangsiantar,
Sumatera utara
INDONESIA
IJISTECH (International Journal Of Information System & Technology)
ISSN : 25807250     EISSN : -     DOI : -
Core Subject : Science,
IJISTECH (International Journal Of Information System & Technology) is published with both online and print versions. The journal covers the frontier issues in the computer science and their applications in business, industry and other subjects. The computer science is a branch of engineering science that studies computable processes and structures. It contains theories for understanding computing systems and methods; computational algorithms and tools; methodologies for testing of concepts. The subjects covered by the journal include artificial intelligence, bioinformatics, computational statistics, database, data mining, financial engineering, hardware systems, imaging engineering, internet computing, networking, scientific computing, software engineering, and their applications etc.
Arjuna Subject : -
Articles 394 Documents
The Impact of Employees’ Information Security Awareness on Information Security Behaviour Melissa Indah Fianty
IJISTECH (International Journal of Information System and Technology) Vol 6, No 5 (2023): February
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v6i5.280

Abstract

Internal threats have been a hot topic in information security for several years. According to a 2018 Insider Threat Reports survey, 51% of users are more concerned about internal carelessness and negligence than 47% about external attacks. The availability of information has a vital role for companies today, including confidentiality and integrity in supporting company performance. Users or employees are an essential factor in many information security breaches. This study aims to determine whether security education & training, information security awareness, employee relations, employee accountability, organizational culture, and national culture significantly affect Information System Security Behavior. The sample of this research is employees who work at PT Infracom Technology. Sampling was carried out using the Likert Scale method, and data collection was carried out using questionnaires distributed directly to employees as many as 72 respondents. The statistical method uses Linear Regression Analysis, with statistical tests to test the hypothesis. The results showed a direct and significant influence between security training and education factors, information security awareness, employee relations, and employee responsibility. The most influential variable was employee accountability.
Effect of Distribution Resources Planning (DRP) Method on Supply Chain Management (SCM) Yuli Setiawannie; Nita Marikena
IJISTECH (International Journal of Information System and Technology) Vol 6, No 5 (2023): February
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v6i5.288

Abstract

PT. Growth Asia is an industrial company in the iron and steel foundry sector. It is well known for its export orientation as a supplier of wear-resistant parts to the international market, especially in gold and copper mining. This steel product will be used for planning distribution activities in mining, with the primary raw material, namely scrap (old iron or scrap iron) obtained from domestic suppliers, which is then processed into finished products, namely selections (mining tools), and distributed to the distribution center. namely Gorontalo, Maluku, Papua, and South Kalimantan. Fulfilling consumer demand for the product is not timely; this occurs due to problems in the distribution schedule at the distribution center to each city that is a consumer of PT. Growth Asia. Based on these problems, the purpose of this study is to determine the factors that cause non-smooth distribution, determine distribution scheduling planning using the Distribution Resources Planning (DRP) method and its effect on supply chain management method that can be proposed to deal with this problem is Distribution Resources Planning (DRP). With DRP, companies can initiate distribution scheduling more accurately and, at the same time, achieve production stability. The results of distribution planning and scheduling with the DRP method can reduce the total frequency of orders from 20 orders to 13 demands, and distribution costs have decreased by 13%, from IDR 39,610,000 to IDR 26,159,000.
Congregational Information System and Inventory of GKI Harapan Abepura, Papua Albert T. Wairara; Remuz MB Kmurawak; Yokelin Tokoro; Samuel Mandowen
IJISTECH (International Journal of Information System and Technology) Vol 6, No 5 (2023): February
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v6i5.281

Abstract

Gereja Kristen Injili Harapan Abepura Papua processes data by conventionally collecting congregational and inventory data and recapitulating it in Microsoft Excel. This process causes the data not to be up-to-date, the process of adding inefficient data and data that is vulnerable to lose. Information systems are solutions in data management.  A Data and inventory system was created to help the process of efficient data management at GKI Harapan. The waterfall is used to develop the system, consisting of requirements, design, testing, integration, and maintenance.  System Modeling Methods using UML with PHP programming language using codeigniter framework and MySQL as database. The research results in system development have been carried out well and are used at GKI Harapan Abepura.
Virtual Restaurant as an Alternative Restaurant and Butchery Tour during the Covid-19 Pandemic Era Tutut Herawan; Wisnu Febri Wardana
IJISTECH (International Journal of Information System and Technology) Vol 6, No 5 (2023): February
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v6i5.289

Abstract

World has never faced such a hard time like this Covid-19 Pandemic, and so do Tourism. This turbulent situation shifted the living of the human race. Travel habit is now changing due to health protocols, technology brings the answer. The virtual tour is an alternative for businesses and communities to meet their needs. This draws attention to discussing virtual tours in the culinary industry/restaurants, Stirling Steaks & Butchery, and Tenderbest Makcik Tuckshop in Singapore in this paper. In advance, we believed that it is the new era of technology where everything is virtual, and so do tourism.
Learning Game Application Development: Crime Scene Investigation (CSI) Erika Ramadhani
IJISTECH (International Journal of Information System and Technology) Vol 6, No 6 (2023): April
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/.v6i6.294

Abstract

Digital forensic learning media has been developed as a computer-based application. The development of game-based applications that can be used to improve cognitive learning outcomes has been tested over a period of time. The research was conducted using the ADDIE research and development method. The ADDIE method consists of five stages, namely analysis, design, development, implementation, and evaluation. The purpose of the study was to find out if this software has been successfully developed and whether it is a useful learning tool for digital forensics.
An Narative Review on Achieving Data Governance in Indonesia Amidst Data Security Challenges Widia Febriyani; Tien Fabrianti Kusumasari; Muharman Lubis
IJISTECH (International Journal of Information System and Technology) Vol 6, No 6 (2023): April
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/.v6i6.295

Abstract

This article discusses strategies to achieve good data governance in Indonesia amidst data security challenges, including data security cases that have occurred in Indonesia. According to the IT Governance Institute (ITGI) in 2021, only 34% of companies in Indonesia have implemented good data governance standards. This indicates a gap in understanding between organizations, as they have not fully realized and understood the importance of data governance. This study used a narrative review as a methodology to evaluate relevant studies related to this topic. The findings show the importance of sustainable data governance and cybersecurity, but only a small portion of organizations in Indonesia have implemented data governance strategies or data intelligence solutions. This article highlights strategies to improve data security in data governance in Indonesia through a better understanding of information security practices. The Data Management Association (DAMA) International Guide to the Data Management Body of Knowledge (DMBOK) concept is used as a conceptual framework for this research. This article provides significant information on strategies to improve security practices in data governance and the safe use of data, which can improve economic well-being.
Realignment Matrix of Digital Campus Master Plan based on Digital Transformation Maturity Assessment Yanuar Firdaus Arie Wibowo; Dawam Dwi Jatmiko Suwawi; Amarilis Putri Yanuarifiani; Widia Febriyani
IJISTECH (International Journal of Information System and Technology) Vol 6, No 6 (2023): April
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/.v6i6.296

Abstract

The previous research that created a framework for evaluating the level of digital maturity and digital transformation in higher education is a valuable resource for universities when revising their Digital Campus Master Plan (DCMP). DCMP is an integral part of a university's life cycle and is derived from their Strategic Plan. The strategic planning within DCMP should be reviewed regularly and adapted to the latest changes in digital maturity and digital transformation within the university. A university's level of digital maturity is a measure of their readiness to incorporate digital technology and information technology into their campus. The goal of a digital transformation in universities is not only to implement technology but to also develop new strategies and methods of working that positively impact the university experience for students (digital journey). The digital transformation maturity assessment is crucial in helping universities align or restructure their DCMP or Information Technology Master Plan (ITMP). The outcome of this research is a matrix that will guide the digital transformation planning team in realigning or redeveloping the DCMP.
Application of Augmented Reality Technology in E-Commerce Web Applications N Nurjamiyah; Anisa Putri; Marina Elsera
IJISTECH (International Journal of Information System and Technology) Vol 6, No 6 (2023): April
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/.v6i6.290

Abstract

Augmented Reality (AR), is a technology that uses the concept of combining real reality with virtual reality in real time. Augmented Reality is not the same as virtual reality capable of replacing real-world reality, but it is useful for adding or supplementing. With a 3-dimensional object inserted in the target object marker which is a special image or pattern which has been inserted by 3D image, it can be detected by the application and display a 3-dimensional image in real-time. Android smartphones can allow for AR development that can be accessed by many users and it is very easy to use. AR can be used to display products in 3 dimensions on websites of e-commerce. Augmented Reality can be used to make it easier for buyers to interact directly with products in a real way in the virtual world. The method used to design the CV.Sukses Group website was to use the MDLC (Multimedia Development Life Cycle) method which consisted of concept, design, material collecting, assembly, testing, and distribution. The results of this research were in the form of e-commerce websites, AR applications, and 3-dimensional objects. The purpose of this final project was to develop an Augmented Reality application aimed at buyers who wanted to interact directly with CV.Sukses Group products. This application was created with Unity and Vuforia Engine as AR application development tools. For websites built using a WordPress CMS. The application of Augmented Reality-based technology on the CV.Sukses Group e-commerce website could read markers on product images that would display 3-dimensional models on the screen of android devices in real-time.
Selection of Independent Curriculum Implementation with the TOPSIS Method Enok Tuti Alawiah; Dwi Andini Putri
IJISTECH (International Journal of Information System and Technology) Vol 6, No 6 (2023): April
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/.v6i6.291

Abstract

The government implements learning with a new paradigm called the independent curriculum. The government gives flexibility to schools to choose three implementation paths, namely Independent Learning, Independent Change and Independent Sharing. However, schools have difficulties in determining the appropriate model. This study aims to help schools decide on the most ideal independent curriculum implementation model to be implemented in schools. The research method uses TOPSIS, which is a decision support method that can help solve multi-criteria problems by providing results that are closest to the ideal. The results of the study show that respondents chose the Independent Changing path for the implementation of an independent curriculum in educational units by considering the readiness of educational units, the availability of information technology and the teacher's desire to change
Pregnancy Disease Diagnostic Expert System With Certainty Factor Method Embun Fajar Wati; Elvi Sunita Perangin-Angin; Budi Sudrajat
IJISTECH (International Journal of Information System and Technology) Vol 6, No 6 (2023): April
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/.v6i6.292

Abstract

Lack of knowledge and information about diseases in pregnancy can delay pregnant women from knowing there are diseases in their pregnancy. Diseases that attack a woman's womb need to be examined by an expert, while experts for this disease are still rare and require a lot of money. In order for the initial diagnosis to be carried out by pregnant women, a solution is proposed in the form of an expert system for diagnosing pregnant women's diseases using the Certainty Factor (CF) method based on the symptoms felt by pregnant women. The research stages used in this study used 4 steps, namely data collection consisting of disease data and symptom data, disease data and symptoms, as well as patient data, symptoms and weights, data analysis using the certainty factor method, validation and evaluation. Diagnostic results that are not in accordance with the CF calculation of around 37.5%, while the results in accordance with the CF calculation were 11 patients or 62.5%.