cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota adm. jakarta barat,
Dki jakarta
INDONESIA
ComTech: Computer, Mathematics and Engineering Applications
ISSN : 20871244     EISSN : 2476907X     DOI : -
The journal invites professionals in the world of education, research, and entrepreneurship to participate in disseminating ideas, concepts, new theories, or science development in the field of Information Systems, Architecture, Civil Engineering, Computer Engineering, Industrial Engineering, Food Technology, Computer Science, Mathematics, and Statistics through this scientific journal.
Arjuna Subject : -
Articles 64 Documents
Search results for , issue "Vol 5, No 2 (2014): ComTech" : 64 Documents clear
Pengukuran Manajemen Risiko Teknologi Informasi dengan Metode Octtave-S Hendarti, Henny; Maryani, Maryani
ComTech: Computer, Mathematics and Engineering Applications Vol 5, No 2 (2014): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v5i2.2336

Abstract

The purpose of this paper is to measure risks to identify company's assets and analyze risks, and to do strategic planning of security protection and minimize risk. Research used case study by reading materials dealing with the OCTAVE-S method. Observation was done directly to the relating parties through an interview, as well as using a questionnaire based on the OCTAVE-S method. The result obtained from this research is risk management of information technology in order to minimize the risks. Based on the findings obtained, it is expected company can identify potential risks and mitigate them efficiently and effectively.
Implementasi Balanced Scorecard pada Unit Usaha Kecil Menengah: Studi Kasus sebuah Restoran di Jakarta Widaningrum, Dyah Lestari; Kabul, Ivanaldy
ComTech: Computer, Mathematics and Engineering Applications Vol 5, No 2 (2014): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v5i2.2359

Abstract

Increasing competition requires companies both large and small, to be more productive and innovative, therefore, companies need to be supported by an effective performance measurement system. In this research, the implementation of a balanced scorecard in SMEs engaged in the management of a restaurant, for a chance to be more superior and to compete amid the rapid development of the restaurant sector. Strategic map based on four perspective of Balanced Scorecard was defined, completed with agreement of strategic objective and measurement. This implementation give evidence that even with many limitations on SMEs, they have developed balanced scorecard, with adjustment based on condition for strategic objective performance indicator, so this performance measurement evaluation process is applicable and able to achieve the main objective, to provide information for continuous improvement process.
Fasilitas Transit Transportasi Umum sebagai Media untuk Menciptakan Mobilitas dan Bagian Kota Jakarta yang Sehat Prawata, Albertus
ComTech: Computer, Mathematics and Engineering Applications Vol 5, No 2 (2014): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v5i2.2293

Abstract

Approximately 50% of Indonesia's population lives in cities. One of these towns is a metropolitan city of Jakarta, an area that has a population of over 14.1 million people. New residential areas are springing up in the suburbs of Jakarta due to the urban sprawl that is increasingly out of control. Thus the activities of traveling from home to work will be a major requirement, and this activity has given rise to problems such as traffic jam. In this study, the research conducted on the data of public transportation in Jakarta, which is followed by a literature review, from books, the internet and the results of a survey involving 130 respondents about the use of public and private transport in Jakarta. In addition to the survey, also conducted a comparative study to look directly into the field one factor supporting public transport, the MRT station in Singapore and TransJakarta bus stop on Jalan Sudirman, and do a comparison analysis. The purpose of this paper is to come up with new solutions in public transport facilities presenting a friendly and optimized for all the people of Jakarta. The method used was to collect data through surveys and literature studies.
A Reusable Software Copy Protection Using Hash Result and Asymetrical Encryption Wibisurya, Aswin; Adinugroho, Timothy Yudi
ComTech: Computer, Mathematics and Engineering Applications Vol 5, No 2 (2014): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v5i2.2215

Abstract

Desktop application is one of the most popular types of application being used in computer due to the one time install simplicity and the quick accessibility from the moment the computer being turned on. Limitation of the copy and usage of desktop applications has long been an important issue to application providers. For security concerns, software copy protection is usually integrated with the application. However, developers seek to reuse the copy protection component of the software. This paper proposes an approach of reusable software copy protection which consists of a certificate validator on the client computer and a certificate generator on the server. The certificate validator integrity is protected using hashing result while all communications are encrypted using asymmetrical encryption to ensure the security of this approach.
Perancangan Sistem Informasi Penjualan, Produksi dan Persediaan pada PT Triwarna Eka Multimedia Surja, Stephanie; Sanjaya, Lius Steven
ComTech: Computer, Mathematics and Engineering Applications Vol 5, No 2 (2014): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v5i2.2350

Abstract

The idea to design an information system in PT Triwarna Eka Multimedia arises because of the current information system is still very traditional and it has an enormous dependency to physical data. Designing of an information system in PT Triwarna Eka Multimedia is aimed to identify the organization needs in managing their business process operational related to current data of sales, production and inventory. The result from those processes is aimed to build an integrated system that can meet all of the organization?s needs in running their daily business process and facing the rivalry from the competitors. The method used in this paper is a survey, literature review, and analysis of current business processes in the company These needs will be documented by using unified modeling language. This information system makes all the current operational business activities easier with the more enhanced automation than the previous information system. This system will also minimize the data lost and human error, which is usually cause by the manual process and storage data of physical data.
Continuous Audit: Implementasi dan Pengendalian Berbasis Teknologi Informasi dalam Menjalankan Fungsi Audit yang lebih Efektif dan Efisien Hiererra, Siti Elda; Sarayar, Mario Octaviano Ignatius
ComTech: Computer, Mathematics and Engineering Applications Vol 5, No 2 (2014): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v5i2.2238

Abstract

Information Technology (IT) continues to transform how organizations function, communicate and do business with customers, partners and agents. Directors, audit committee, management and stakeholders sincerely hope their auditors more adept at using technology both in the field of audit (Audit Leveraging Technology) to develop a thorough understanding of how they control the company's processes and internal controls. The research methodology to be used is quantitative observation methodology, by collecting data from various data sources such as journals and literature on Continuous Auditing, both best practice (Practical Approach) as well as theoretical and raw concept of Continuous Auditing (Teorical Approach). Impact on the internal audit process and methodology by using Continuous Audit will be very revolutionary and a major impact on the development of the company's business and also the audit function which is run by the company.
Audit Domain Acquire And Implement dengan Cobit 4.1 pada PT Erajaya Swasembada Tbk Tjhin, Viany Utami
ComTech: Computer, Mathematics and Engineering Applications Vol 5, No 2 (2014): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v5i2.2373

Abstract

The main priority aspect of information and communication technologies is given to control mechanisms, both internal and external in enterprises. It ensures that the reports and the decisions received and generated by the management will support their decision-making. The decisions have honesty and high integrity based on the results of the audit conducted on systems of information and communication technology. The objective of this research is to deliver audit reports of information systems for management and make recommendations on the audit findings in PT Erajaya Swasembada Tbk. Business processes studied included sales, purchasing, finance, and the warehouse. The system used was "Erajaya Live Application Server" and ERP (Enterprise Resource Planning)-based. This research used thedomain of COBIT 4.1: Acquire and Implement. The domain included several sub-domains, which were:identify automated solutions (AI1), acquire and maintain application software (AI2), acquire and maintain technology infrastructure (AI3), enable operation and use (AI4), procure IT resources (AI5), manage changes (AI6), and install and accredit solutions and changes (AI7). Data were collected from interviewing IT Department, distributing questionnaires to respondents, and observing the business processes of this enterprise. Research obtained 57 audit findings on IT implementation. The results of process reference model formulation are 3 findings on AI1subdomain, 5 findings on AI2subdomain, 9 findings on AI3subdomain, 6 findings on AI4 subdomain, 11 findings on AI5subdomain, 13 findings pada AI6subdomain, and 10 findings on AI7subdomain. The level of maturity model of this domain, Acquire and Implement (AI), was found on level 3.
Analisis dan Pengukuran Tingkat Eksposur Resiko Teknologi Informasi dengan Metode Fmea Pada PT. Bank Central Asia, Tbk Kurniawan, Roy
ComTech: Computer, Mathematics and Engineering Applications Vol 5, No 2 (2014): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v5i2.2229

Abstract

The purpose of this paper is to help the PT. Bank Central Asia, Tbk in measuring the level of risk exposure and identify the need to control IT risk management at PT. Bank Central Asia, Tbk. Conducted research methodology, field observation, library research, interviews and gave questionnaires to the relevant parties, perform data analysis, as well as measuring the risk of using the approach of FMEA (Failure Mode and Effect Analysis). The results achieved in this study is to facilitate the management in making decisions related to the design, maintenance, and development of information technology at PT. Bank Central Asia, Tbk and also minimize the risk of the failure so that the utilization of existing information technology can provide more optimal results. The conclusion from this study is that there is a risk of potential failure that could hamper the existing business processes in PT. Bank Central Asia, Tbk. Highest risk or potential failure according to theRPN (Risk Priority Number) is a software and hardware damage, as well as the corrupted database due to the impact of operational risk.
Tap For Battle: Perancangan Casual Game Pada Smartphone Android Chowanda, Andry; Prabowo, Benard H.; Iglesias, Glen; Diansari, Marsella
ComTech: Computer, Mathematics and Engineering Applications Vol 5, No 2 (2014): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v5i2.2187

Abstract

Smartphones have become a necessity. Almost everyone uses a smartphone in a variety of activities. Both young and old are sure to utilize this technology, for a wide range of activities such as doing the work, doing school work or enjoying entertainment. The purpose of this research is to build a casual-action game with war theme. The game is built for Android smartphone that has multi touch screen capability. The research methods used in this research are data collection and analysis method including user analysis with questionnaire. Furthermore, IMSDD method is implemented for game design and development phase including system requirement analysis, system design, system implementation, finally system evaluation. In this research, we conclude that 83.9% participants enjoyed the game with touch-screen as the game control.
Evaluasi Sistem Informasi Penjualan pada PT. Techpac Indo Informatika Sari, Ratna
ComTech: Computer, Mathematics and Engineering Applications Vol 5, No 2 (2014): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v5i2.2279

Abstract

Technological development is one effort that was relied upon by the company for the implementation of the company's activities. Technological developments have led to changes in data processing by the company from a manual system to a mechanical, electromechanical, and then to electronic or computerized systems. PT. Techpac Indo Informatika is a company that engaged in software distribution. The purpose of this research is conducting an evaluation and control through sales information system, especially input and output control, tosupport and provide the accurate and real-time information in decision making for top management The methodology used in this study is descriptive research method with data collection techniques using literature study by studying scientific books and various literature that related with this paper, field study that consists of interviews, observation and system testing. The results of evaluation and control for sales application system are expected to improve the weaknesses and present the accuracy and real-time data that reliable and trustworthy.

Filter by Year

2014 2014


Filter By Issues
All Issue Vol. 16 No. 2 (2025): ComTech Vol. 16 No. 1 (2025): ComTech Vol. 15 No. 2 (2024): ComTech Vol. 15 No. 1 (2024): ComTech Vol. 14 No. 2 (2023): ComTech Vol. 14 No. 1 (2023): ComTech Vol. 13 No. 2 (2022): ComTech Vol. 13 No. 1 (2022): ComTech Vol. 12 No. 2 (2021): ComTech Vol. 12 No. 1 (2021): ComTech Vol. 11 No. 2 (2020): ComTech Vol 11, No 1 (2020): ComTech (Inpress) Vol. 11 No. 1 (2020): ComTech Vol 10, No 2 (2019): ComTech Vol. 10 No. 2 (2019): ComTech Vol 10, No 1 (2019): ComTech (In Press) Vol 10, No 1 (2019): ComTech Vol. 10 No. 1 (2019): ComTech Vol. 9 No. 2 (2018): ComTech Vol 9, No 2 (2018): ComTech Vol 9, No 2 (2018): ComTech Vol 9, No 1 (2018): ComTech Vol 9, No 1 (2018): ComTech Vol. 9 No. 1 (2018): ComTech Vol. 8 No. 4 (2017): ComTech Vol 8, No 4 (2017): ComTech Vol 8, No 4 (2017): ComTech Vol 8, No 3 (2017): ComTech Vol 8, No 3 (2017): ComTech Vol. 8 No. 3 (2017): ComTech Vol 8, No 2 (2017): ComTech Vol 8, No 2 (2017): ComTech Vol. 8 No. 2 (2017): ComTech Vol 8, No 1 (2017): ComTech Vol. 8 No. 1 (2017): ComTech Vol 8, No 1 (2017): ComTech Vol 7, No 4 (2016): ComTech Vol 7, No 4 (2016): ComTech Vol. 7 No. 4 (2016): ComTech Vol. 7 No. 3 (2016): ComTech Vol 7, No 3 (2016): ComTech Vol 7, No 3 (2016): ComTech Vol. 7 No. 2 (2016): ComTech Vol 7, No 2 (2016): ComTech Vol 7, No 2 (2016): ComTech Vol 7, No 1 (2016): ComTech Vol 7, No 1 (2016): ComTech Vol. 7 No. 1 (2016): ComTech Vol 6, No 4 (2015): ComTech Vol 6, No 4 (2015): ComTech Vol. 6 No. 4 (2015): ComTech Vol. 6 No. 3 (2015): ComTech Vol 6, No 3 (2015): ComTech Vol 6, No 3 (2015): ComTech Vol 6, No 2 (2015): ComTech Vol. 6 No. 2 (2015): ComTech Vol 6, No 2 (2015): ComTech Vol. 6 No. 1 (2015): ComTech Vol 6, No 1 (2015): ComTech Vol 6, No 1 (2015): ComTech Vol 5, No 2 (2014): ComTech Vol. 5 No. 2 (2014): ComTech Vol 5, No 2 (2014): ComTech Vol 5, No 1 (2014): ComTech Vol. 5 No. 1 (2014): ComTech Vol 5, No 1 (2014): ComTech Vol. 4 No. 2 (2013): ComTech Vol 4, No 2 (2013): ComTech Vol 4, No 2 (2013): ComTech Vol 4, No 1 (2013): ComTech Vol 4, No 1 (2013): ComTech Vol. 4 No. 1 (2013): ComTech Vol 3, No 2 (2012): ComTech Vol 3, No 2 (2012): ComTech Vol. 3 No. 2 (2012): ComTech Vol 3, No 1 (2012): ComTech Vol 3, No 1 (2012): ComTech Vol. 3 No. 1 (2012): ComTech Vol 2, No 2 (2011): ComTech Vol. 2 No. 2 (2011): ComTech Vol 2, No 2 (2011): ComTech Vol 2, No 1 (2011): ComTech Vol. 2 No. 1 (2011): ComTech Vol 2, No 1 (2011): ComTech Vol. 1 No. 2 (2010): ComTech Vol 1, No 2 (2010): ComTech Vol 1, No 2 (2010): ComTech Vol 1, No 1 (2010): ComTech Vol 1, No 1 (2010): ComTech Vol. 1 No. 1 (2010): ComTech More Issue