cover
Contact Name
Terttiaavini
Contact Email
avini.saputra@yahoo.com
Phone
-
Journal Mail Official
avini.saputra@yahoo.com
Editorial Address
-
Location
Kota palembang,
Sumatera selatan
INDONESIA
Jurnal Informatika Global
ISSN : 2302500X     EISSN : 24773786     DOI : -
Core Subject : Science,
Journal of global informatics publish articles on architectures from various perspectives, covering both literary and fieldwork studies. The journal, serving as a forum for the study of informatics, system information, computer system, informatics management, supports focused studies of particular themes & interdisciplinary studies in relation to the subject. It has become a medium of exchange of ideas and research findings from various traditions of learning that have interacted in the scholarly manner as well become an effort to disseminate on computer research to the International community.
Arjuna Subject : -
Articles 7 Documents
Search results for , issue "Vol. 15 No. 3: Desember 2024" : 7 Documents clear
Strategi MOOC untuk Meningkatkan Potensi Bakat Masyarakat dalam Pendidikan Ilmu Komputer dengan ADDIE dan Design Thinking Moch Hari Purwidiantoro; Tinuk Agustin; Abdullah, Robi Wariyanto; Mochammad Luthfi Rahmadi
Jurnal Ilmiah Informatika Global Vol. 15 No. 3: Desember 2024
Publisher : UNIVERSITAS INDO GLOBAL MANDIRI

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36982/jiig.v15i3.4742

Abstract

The development of digital-based education such as Massive Open Online Course (MOOC) has expanded public access to quality education without limits. However, the main challenge in developing MOOCs, especially in the field of computer science, is how to meet the diverse needs of users and create interactive learning experiences that are relevant to the world of work and easy to understand in their use for all groups. This study aims to develop a MOOC strategy that can increase the potential of community talent through the application of the ADDIE method (Analysis, Design, Development, Implementation, Evaluation) and the Design Thinking approach. ADDIE provides a systematic framework in course development, while Design Thinking ensures development focuses on user needs. The initial stage of this study highlighted the needs analysis to understand the challenges and expectations of users in computer science courses. In the design and development phase, interactive learning modules and simulations were created that were designed to increase participant engagement. The course was tested through a prototype at the implementation stage, which was then improved based on user feedback. An evaluation was conducted to assess the effectiveness of the course in improving participant skills and satisfaction, with an overall average result of 4.09, indicating that the course is feasible to be implemented widely. Course satisfaction and effectiveness were the most prominent aspects, with an average score of 4.45 and a percentage of 27%. These findings suggest that the combination of ADDIE and Design Thinking methods is effective in developing MOOCs that can improve access and quality of computer science education for the wider community, particularly through an approach that is responsive to user needs.
Hukum dan Kebijakan Keamanan Siber: Tantangan Regulasi Perangkat IoT Anwar, Yatama Zahra; Sanmorino, Ahmad
Jurnal Ilmiah Informatika Global Vol. 15 No. 3: Desember 2024
Publisher : UNIVERSITAS INDO GLOBAL MANDIRI

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36982/jiig.v15i3.4773

Abstract

The Internet of Things (IoT) has impacted many sectors such as industry, health, and households, with the ability to connect physical objects to the internet network. However, this development is accompanied by major challenges related to cybersecurity, including the risk of data intrusion, cyberattacks, and privacy violations. One fundamental problem is the lack of uniform security standards, which causes various manufacturers' implementation differences. In addition, many IoT devices are not designed with security as a priority, making them vulnerable to attacks. Other challenges include the lack of user awareness of the importance of data security and the limitations of cross-country regulations in monitoring and enforcing IoT security laws. This article explores the challenges in cybersecurity regulation on IoT and offers policies that support increased security. The main contribution of this article is to provide insight into the problems of IoT regulation and provide practical solutions to reduce cyber risks on IoT devices. These solutions are expected to be a guide for policymakers in formulating dynamic regulations, under the development of IoT technology.
Analisis Prediksi Harga Beras Berbasis Kualitas Menggunakan Algoritma K-Nearest Neighbord Setiadi, Dedi; Efan
Jurnal Ilmiah Informatika Global Vol. 15 No. 3: Desember 2024
Publisher : UNIVERSITAS INDO GLOBAL MANDIRI

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36982/jiig.v15i3.4810

Abstract

Rice is an important element in improving national food security. There are several factors that affect the price of rice, including uncertain production. This study aims to predict the price of rice in the city of Pagar Alam using the K-Nearest Neighbor (K-NN) algorithm. The data used is rice price data from 2019 to 2023 obtained from the Pagar Alam City Trade Office. The resulting classification model is evaluated for its performance using various indicators such as accuracy, precision, and recall. The research process begins with a business understanding to identify factors that affect rice prices. Furthermore, data understanding was carried out on 240 rice data samples including the attributes of year, month, production, price, and type of rice. This data is processed using the K-NN method, which involves calculating the Euclidean distance between training data and testing data and testing accuracy through split data that the K-Nearest Neighbor method is effective in predicting rice prices with an accuracy of 95%, which shows that this model has a good ability to classify rice prices accurately. This research has been successful and can help the Trade Service in making decisions regarding rice prices and be a reference for similar research in the future.
Mitigasi Serangan DNS Cache Poisoning Pada Local Area Network Berbasis Routerboard Mikrotik Novianto, Dian; Tommy, Lukas; Japriadi, Yohanes Setiawan; Sujono
Jurnal Ilmiah Informatika Global Vol. 15 No. 3: Desember 2024
Publisher : UNIVERSITAS INDO GLOBAL MANDIRI

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36982/jiig.v15i3.4816

Abstract

Domain Name System (DNS) enables users to access websites via domain names, offering convenient navigation. However, criminals can exploit this convenience to redirect connections from user devices to fake servers for a variety of purposes. A form of attack known as DNS cache poisoning exploits vulnerabilities in the Domain Name System (DNS) to redirect connections from a legitimate website address to an illegitimate one. As a consequence of the fact that users of networked systems are typically unaware that they are accessing an illegitimate site, this attack can have a particularly damaging impact. Such incidents can give rise to several issues, including the theft of data, the distribution of malware, and other security threats. To address this issue, this study employs a firewall in conjunction with DoH (DNS over HTTPS) and the utilization of registered certificates. The Domain Name System over HTTPS (DoH) protocol encrypts DNS requests and responses, preventing third parties (such as attackers who manipulate DNS) from reading or modifying DNS requests. The data employed in this study is derived from a review of existing literature. Furthermore, this study employs the PPDIOO model (Preparation, Planning, Design, Implementation, Operation, and Optimization) for the development of the network. Furthermore, the Mikrotik RB951ui-2Hnd routerboard is employed in this study. The outcome is the implementation of a multifaceted security strategy that effectively mitigates DNS cache poisoning attacks by 100%, while simultaneously reducing CPU usage to 11.5%. This approach enhances the security and reliability of user search activities on the internet.
PERENCANAAN STRATEGIS SI/TI PADA TOKO “LATINA BAKERY” DENGAN MENGGUNAKAN METODOLOGI WARD AND PEPPARD Ariati, Nining; Amelia, Rizki; Waty, Rizka; Agnesia, Bella Rizki Dwi; Shela Agustini; Putri Oktariani
Jurnal Ilmiah Informatika Global Vol. 15 No. 3: Desember 2024
Publisher : UNIVERSITAS INDO GLOBAL MANDIRI

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36982/jiig.v15i3.4832

Abstract

The development of technology and information systems is currently growing very rapidly, most small, medium, and large organizations and companies have used it to support and facilitate their business processes. “Latina Bakery” is one of the business entities that is currently facing significant challenges in facing increasingly competitive market competition. Latina Bakery has implemented SI/TI to support the success of the store's vision and mission, but in its application, many of the systems used are still not effective and efficient. The main challenges faced lie in two fundamental aspects: First, limitations in the utilization of adequate technological infrastructure, and second, not optimal management and utilization of data to support business decision-making. This condition causes difficulties in adapting and competing amid market dynamics that continue to snowball. To overcome these problems, this research implements the Ward and Peppard methodology, a comprehensive approach consisting of: SWOT analysis (Strengths Weaknesses Opportunities, and Threats), Value Chain Analysis, McFarlan Analysis, and Five Forces Model Analysis. The main objective of this research is to produce an in-depth analysis to formulate an Information Systems and Information Technology (IS/TI) strategy aligned with the vision, mission, and business objectives. It can be a recommendation to move away from the business.
Klasifikasi Penyakit Daun pada Tebu dengan Pendekatan Algoritma K-Nearest Neighbors, Multilayer Perceptron dan Support Vector Machine Syaputra, Asep
Jurnal Ilmiah Informatika Global Vol. 15 No. 3: Desember 2024
Publisher : UNIVERSITAS INDO GLOBAL MANDIRI

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36982/jiig.v15i3.4856

Abstract

Sugarcane is a vital crop in Indonesia, serving as the primary raw material for sugar production. Unfortunately, leaf diseases in sugarcane often pose a serious threat, potentially causing significant economic losses. These diseases are typically characterized by leaf morphological changes, making early detection and accurate classification essential to prevent further spread. This study compares three algorithms for identifying sugarcane leaf diseases: K-Nearest Neighbors (KNN), Multilayer Perceptron (MLP), and Support Vector Machine (SVM). Each algorithm employs a different approach to recognize patterns and disease characteristics: SVM separates data by identifying the optimal hyperplane, KNN classifies based on the proximity of data to training data, while MLP, as an artificial neural network, can recognize more complex patterns. The deep learning model VGG16 was utilized for feature extraction from sugarcane leaf images to enhance classification accuracy. The dataset used comprises 8,200 images of sugarcane leaves, categorized into four classes: 2,050 images of Cercospora spot gray, 2,050 of common rust, 2,050 of northern blight, and 2,050 of healthy leaves. Each category was further divided into training and testing datasets in an 80:20 ratio, with 6,560 images for training and 1,640 images for testing. The results indicate that the MLP algorithm achieved the best performance, with accuracy, precision, and recall values of 97.4%. This establishes MLP as the most effective choice for classifying sugarcane leaf diseases.
Perancangan Knowledge Management System Resep Masakan Indonesia Menggunakan Model SECI Nugraha, Zahra Sabila; Wibowo, Ishma Tsabita; Maulana Asykari Muhammad; Yuni Sugiarti
Jurnal Ilmiah Informatika Global Vol. 15 No. 3: Desember 2024
Publisher : UNIVERSITAS INDO GLOBAL MANDIRI

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36982/jiig.v15i3.4885

Abstract

Indonesia is rich in diverse traditional culinary heritage, with recipes often passed down orally or as tacit knowledge, making it challenging to preserve and at risk of being lost. This study aims to design a knowledge management system (KMS) for managing, storing, and distributing Indonesian culinary recipes using the SECI model (Socialization, Externalization, Combination, and Internalization). The SECI model was selected for its ability to convert tacit knowledge into explicit knowledge that can be managed and disseminated through information systems. The research method includes needs analysis through literature review, observation, and interviews with culinary community members, along with a design review to understand the characteristics of traditional recipes. The system was developed using JavaScript and the Next.js framework to create a responsive user interface. Testing was conducted using the black-box method to evaluate system performance based on user needs. The results show that the KMS was well-received by users and effectively provided a platform for storing and distributing traditional recipes. This system serves not only as a repository but also as a digital ecosystem supporting the preservation of Indonesian culinary heritage. It is expected that the KMS will be a valuable tool in documenting and disseminating Indonesian culinary knowledge to the wider public, including younger generations and the international community. Further testing is needed to optimize the system for more effective support in preserving Indonesia’s culinary culture.

Page 1 of 1 | Total Record : 7