cover
Contact Name
HENGKI TAMANDO SIHOTANG
Contact Email
hengki_tamando@yahoo.com
Phone
-
Journal Mail Official
editor.mantik@iocscience.org
Editorial Address
Perumahan Romeby Lestari Blok C, No C14 Deliserdang, Sumatera Utara, Indonesia
Location
Unknown,
Unknown
INDONESIA
Jurnal Mantik
ISSN : -     EISSN : 26854236     DOI : -
Jurnal Mantik (Manajemen, Teknologi Informatika dan Komunikasi) is a scientific journal in information systems/informati containing the scientific literature on studies of pure and applied research in information systems/information technology,Comptuer Science and management science and public review of the development of theory, method and applied sciences related to the subject. Jurnal Mantik Penusa is published by Institute of Computer Science (IOCS). Editors invite researchers, practitioners, and students to write scientific developments in fields related to information systems/information technology,Comptuer Science and management science). Jurnal Mantik is issued 4 (FOUR) times a year.
Arjuna Subject : -
Articles 2,151 Documents
Digital File Identification Method Using Efficient Anonymous Fingerprinting: Digital File Identification Method Using Efficient Anonymous Fingerprinting Agustina Simangungsong
Jurnal Mantik Vol. 3 No. 3 (2019): November: Manajemen, Teknologi Informatika dan Komunikasi (ManTIK)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (575.087 KB)

Abstract

Fingerprinting method is one important class of engineering protection of intellectual property in digital form. This method is a cryptographic method that is applied to detect people to redistribute an item of data by allowing a merchant (merchant) to track a duplicate to be able to note the original purchaser. Buyers dishonest redistribute illegally item of data called a traitor (traitor). Information referred to as fingerprint identification, attached to the duplication of the original item data. For the development of an application it is necessary to illustrate the application of anonymous fingerprinting methods in the detection of identity of the file redistributed. Other than that, the software also provides a tutorial to assist understanding of the working procedures of anonymous fingerprinting method. The results of the tutorial section can also be saved into a text file.
Analysis of Seaweed Business Income Level at Rawing Mairori in Sarwandori Village, Yapen Regency: Analysis of Seaweed Business Income Level at Rawing Mairori in Sarwandori Village, Yapen Regency Daniel A. Dawan
Jurnal Mantik Vol. 3 No. 4 (2020): February: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (776.122 KB)

Abstract

Analysis of Operating Revenues Seaweed On Mairori in Kampung Sarwandori Rawing Yapen. Objective is to determine the level of income of seaweed products and to determine the factors that influence the level of income of seaweed products in businesses in the village Sarwandori Rawing Mairori Yapen. Results showed that the cost of production has twice earned total net income of Rp 2,352,542, -. Analysis of the income level of seaweed products in businesses in the village Sarwandori Rawing Mairori Yapen financially beneficial to the R / C ratio is2,442, While production levels to reach the breakeven point BEP is Rp 16 016, -. As for the factors that affect the level of seaweed products in businesses in the village Sarwandori Rawing Mairori Yapen namely Labor, Environment Weather / Climate, Capital, Selling Price.
Modeling of Inventory Application of Goods Islamic University of Kuantan Singingi: Modeling of Inventory Application of Goods Islamic University of Kuantan Singingi Febri Haswan
Jurnal Mantik Vol. 3 No. 4 (2020): February: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (375.78 KB)

Abstract

Kuantan Singingi Islamic University is located in Riau Province, Kuantan Singingi Regency, where currently inventory data processing has not used an application. Inventory data processing carried out by the BPAUK Section is still done manually so that the data processing becomes ineffective and inefficient. With the application, it can facilitate the BPAUK Section in processing inventory data. The method used in this research is observation, interview, literature, analysis, design or design using UML (Unified Modeling Language) modeling. The results of this study are an inventory data processing application at the Kuantan Singingi Islamic University which is expected to be implemented into the program, so as to increase the effectiveness and efficiency of work.
Security Of Dynamic Domain Name System Servers Against DDOS Attacks Using IPTABLE And FAIL2BA: Security Of Dynamic Domain Name System Servers Against DDOS Attacks Using IPTABLE And FAIL2BA Ibnu Muakhori; Sunardi Sunardi; Abdul Fadlil
Jurnal Mantik Vol. 4 No. 1 (2020): May: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (933.248 KB)

Abstract

Availability, integrity and confidentiality are the main objectives of information security and server security. These three elements are links that are interconnected in the concept of information protection.Distributed Denial of Service (DDoS) is an attack to make online services, networks and applications not available by flooding data traffic so that services is unvailable or availability aspects disrupted. This attack resulted in huge losses for institutions and companies engaged in online services and web-based applications being one of the main targets of attackers to carry out DDoS attacks. Countermeasures that take a long time and large recovery costs are a loss for the institution or company that owns the service due to loss of integrity. NDLC (Network Development Life Cycle) is a method that has stages namely analysis, design, simulation, prototyping, implementation, monitoring and management. The NDLC method used aim for the results obtained focused and detailed. Snort IDS applied on the DDNS server functions to record when there is a DDoS attack. Implemention fail2ban as realtime preventation tool on the server by configuring based on the rules applied to fail2ban. The results showed Snort IDS managed to detect DDoS attacks based on the rules applied to Snort IDS. Realtime prevention using Fail2ban successfully functions as a DDoS attack by blocking the attacker's IP Address.
Virus Detection In Windows 10 Using Nist Method And Smadav Application 13.4: Virus Detection In Windows 10 Using Nist Method And Smadav Application 13.4 Ahmad Fajar Sidiq; Anton Yudhana; Rusydi Umar
Jurnal Mantik Vol. 4 No. 1 (2020): May: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (760.335 KB)

Abstract

This research has a background in virus detection on a computer, because a virus is something that can damage and damage data on a computer, because the impact is very bad for the computer so that many anti-virus viruses develop and continue to be developed each year, the development of the virus first against anti-virus causes the impact of damage that is getting worse, the most severe is data loss, data is very important for a computer, in this study the authors use a method created by the National Institute of Standards and Technology (NIST), with this method will facilitate research carried out, the results of the study will be in the form of detection carried out by the Smadav software version 13.4.
IT-Helpdesk System Design With Waterfall Model (Case Study : Agung Podomoro Group): IT-Helpdesk System Design With Waterfall Model (Case Study : Agung Podomoro Group) Siti Nur Khasanah; Sandra Jamu Kuryanti; Hermanto Hermanto; Cep Adiwihardja
Jurnal Mantik Vol. 4 No. 1 (2020): May: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (431.626 KB)

Abstract

Agung Security Podomoro Group is a company that uses a lot of electronic inventory, so there are quite a lot of inventory problems that must be dealt with, as long as there is an inventory problem the user or admin of the location submits to Asset Management, by telephone, or other communication tools, then Asset management does and submit to Technical support. Due to the large number of inventory reports that are damaged often the handling of technical support is not handled properly. Therefore it is necessary to have a system that becomes a working benchmark that records damage reports accompanied by a history record so that if there is a similar damage it is easier to handle. In this study a Web-based Help Desk System was designed to deal with existing problems. The website is made based on PHP and uses a MySQL database. The development method that the author uses in designing the web-based Helpdesk System at Agung Podomoro use the Waterfall model.
Design of Small Business Licensing Information System PTSP Kelurahan Pulogadung Jakarta: Design of Small Business Licensing Information System PTSP Kelurahan Pulogadung Jakarta Dina Ayu Ariyani; Eva Zuraidah
Jurnal Mantik Vol. 4 No. 1 (2020): May: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (518.144 KB)

Abstract

The demand for better and more satisfying public services for the people is a need that must be met by the government. The One-Stop Integrated Service Office is a Pulogadung village government agency tasked with providing licensing services, one of which is the making of micro-small business licensing which is considered less effective and efficient because the process is still done manually. The purpose of this research is to create an information system for licensing and request for licensing recommendations at the Pulogadung Village PTSP Office on a web-based basis to provide better services. The system development model used is the waterfall method and structured analysis modeling. In making this information system there are two requirements analysis needed, namely, software analysis and system design analysis. This system is made with PHP, SQL, Javascript and to arrange website structure using HTML and CSS programming languages. With the web-based information system design in the Pulogadung Village PTSP Office, it is expected to provide convenience to the public who want to open a business in managing micro-small business permits. Besides that, employees can manage the application data submitted by the applicant quickly and accurately and transparently, this study using the waterfall methodology
Analysis of Mobile Based Activity Reporting Systems Using Usability Testing Methods and Use Questioners: Analysis of Mobile Based Activity Reporting Systems Using Usability Testing Methods and Use Questioners Wawan Darmawan; Sunardi Sunardi; Anton Yudhana
Jurnal Mantik Vol. 4 No. 1 (2020): May: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (386.578 KB)

Abstract

Reporting is a part that must be prepared, monitored and evaluated by the leader in this case the director, organizational activities often overlap with each other and reporting activities are not well documented. The purpose of this study is to analyze the usability of the Activity Reporting System application. In this study the authors used the Usability Testing and USE Questioner methods. The level of usability can determine the extent to which an application or product can be used by users to achieve their goals and how easy it is to use the application interface. Applications with a high level of usability will usually be liked by many users. Vice versa, if the usability level of an application is low it will eventually be left by the user. This study also uses a USE Questioner that includes four parameters namely usefulness, ease of use, ease of learning and satisfaction. Each parameter has several statements that will be given to the user to assess the usability level of the spkditpdpontren application. The results of this study note that the usability value before the recommendation for improvement is 47.58% with sufficient predicate and the usability value after the display improvement recommendation is 78.27% with a good predicate. The general conclusion is that the activity reporting system can make it easy for users to find information related to activities and evaluation and financial management of reporting transparency and accountability.
Des Triple Algorithm in Security Office Data Security Mayor Pematangsiantar: Des Triple Algorithm in Security Office Data Security Mayor Pematangsiantar Juli Wahyuni; Indra Gunawan; Ika Okta Kirana; Rafiqa Dewi; Solikhun Solikhun
Jurnal Mantik Vol. 3 No. 4 (2020): February: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (732.846 KB)

Abstract

In this era, technology is increasingly advanced and rapid, where data confidentiality is one of the things that is very important for a company. Employee data is data that is very important for the company. So it needs a system that can secure a database of employees from various types of hecker attacks or eavesdroppers who can steal and damage data. Cryptography is a science based on mathematical techniques that deal with information security such as data confidentiality. Triple DES algorithm is a development of DES algorithm, the algorithm used is the same, only in Triple DES algorithm, the encryption and decryption process is done 3 times. Triple DES also has three different keys. The three keys used can be mutually independent (K1 ? K2 ? K3) or only two keys are mutually independent and one other key is the same as the first key (K1 ? K2 and K3 = K1). This algorithm can generate encryption that cannot be read or understood by humans and results in the exact decryption of the initial plaintext input.
The Effect of Transformational Leadership and Knowledge Sharing on Employee Performance PBMTI Jepara: The Effect of Transformational Leadership and Knowledge Sharing on Employee Performance PBMTI Jepara Nur Hikmah; Nur Ahmad Budi Yulianto
Jurnal Mantik Vol. 4 No. 1 (2020): May: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (513.462 KB)

Abstract

This research objective is to obtain the influence of the Transformational Leadership, and knowledge sharing toward the employee performance of PBMTI Jepara. There were ten research samples of employees chosen by the method of disproportionate stratified sampling. The data was collected through the quetionnaire and then analised by using SmartPLS (Partial Least Square).The analysis result prooved that the transformationalleadership, and knowledge sharing have influence toward the performance which is prooved with the t statistic value about 3.093and 6.164 which all of them have the value bigger than 1.96. It means that the variable has the influence toward the performance of employee in PBMTI Jepara. Whereas, Meanwhile, to know the influence of exogenous variable toward the performance can be seen from each determination coefficient about - 0.255 and 0.604. This points out that the variable of transformational leadership has the negative influence toward the performance, whereas the other variables have the positive influence toward the performance. Hypotesis result indicate that the hypothesis 1is weren’t provide because toward the negative influence , but the hypothesis 2 were provide and to be significant impact compare on employee performance. The Goodness of fit as the model which is used to find out the influence of exogenous variable toward endogen variable has the value of 0.792 that can be seen at R square which means those three exogenous variables have the influence about 79.2 % toward the endogenous variable of performance and the rest is 20.8% from the other factors contribution.

Page 14 of 216 | Total Record : 2151


Filter by Year

2019 2026


Filter By Issues
All Issue Vol. 9 No. 4 (2026): February: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 9 No. 3 (2025): November: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 9 No. 2 (2025): August: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 9 No. 1 (2025): May: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 8 No. 4 (2025): February: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 8 No. 3 (2024): November: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 8 No. 2 (2024): August: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 8 No. 1 (2024): May: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 7 No. 4 (2024): February: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 7 No. 3 (2023): November: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 7 No. 2 (2023): Agustus: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 7 No. 1 (2023): May: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 6 No. 4 (2023): February: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 6 No. 3 (2022): November: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 6 No. 2 (2022): August: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 6 No. 1 (2022): May: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 5 No. 4 (2022): February: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 5 No. 3 (2021): November: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 5 No. 2 (2021): Augustus: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 5 No. 1 (2021): May: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 4 No. 4 (2021): February: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 4 No. 3 (2020): November: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 4 No. 2 (2020): Augustus: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 4 No. 1 (2020): May: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 3 No. 4 (2020): February: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 3 No. 3 (2019): November: Manajemen, Teknologi Informatika dan Komunikasi (ManTIK) Vol. 3 No. 2 (2019): Augustus: Manajemen, Teknologi Informatiak dan Komunikasi (Mantik) Vol. 3 No. 1 (2019): May: Manajemen dan Informatika More Issue