cover
Contact Name
HENGKI TAMANDO SIHOTANG
Contact Email
hengki_tamando@yahoo.com
Phone
-
Journal Mail Official
editor.mantik@iocscience.org
Editorial Address
Perumahan Romeby Lestari Blok C, No C14 Deliserdang, Sumatera Utara, Indonesia
Location
Unknown,
Unknown
INDONESIA
Jurnal Mantik
ISSN : -     EISSN : 26854236     DOI : -
Jurnal Mantik (Manajemen, Teknologi Informatika dan Komunikasi) is a scientific journal in information systems/informati containing the scientific literature on studies of pure and applied research in information systems/information technology,Comptuer Science and management science and public review of the development of theory, method and applied sciences related to the subject. Jurnal Mantik Penusa is published by Institute of Computer Science (IOCS). Editors invite researchers, practitioners, and students to write scientific developments in fields related to information systems/information technology,Comptuer Science and management science). Jurnal Mantik is issued 4 (FOUR) times a year.
Arjuna Subject : -
Articles 2,151 Documents
Development of a Web-Based Online Library Information System at the National University Using the Waterfall Method: Development of a Web-Based Online Library Information System at the National University Using the Waterfall Method Heru Saputro; Iwan Wahyudin; Agus Iskandar
Jurnal Mantik Vol. 4 No. 1 (2020): May: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (847.812 KB)

Abstract

The definitions of Pustaka places or libraries are: Several source charts from schools to lectures have not escaped the info-info/knowledge from the library. In relation to the advancement of this technology makes: people to be able to mind effectively also efficient work. For example: conventional systematic generation is more computerized.From the utilization of a feature of the web connected online, the de also: increased levels of efficiency and effectiveness in the book Search and booking. This research designed a website based information system with PHP. From the results of research that has been implemented authors implement the results of the research on: Development of information Systems Web based Online Library of national universities using Waterfall method
Information System For Sale Of Muslim Clothes Based On E-Commerce Technology: Information System For Sale Of Muslim Clothes Based On E-Commerce Technology M. Subchan; Dedi Setiadi
Jurnal Mantik Vol. 4 No. 1 (2020): May: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (681.384 KB)

Abstract

The evolution that occurs on the internet is one of the most interesting phenomena in technological advancements that are happening now. One aspect that is arguably the main one in this evolution is the emergence of electronic commerce (e-commerce) in the business environment. E-commerce changes almost all the functions of the business area and every activity, from buying and selling to advertising. With the birth of E-commerce, it is easier for consumers to make buying and selling transactions without having to come to their place. Muslim clothes shop ayu fashion shops, established in 2012, is a shop that provides a variety of Muslim clothing. Muslim clothing that is sold in the ayu fashion shops stores includes several categories including Muslim, hijab, robe, and couple. The formulation of the problem in this study are (i) how to create information systems for selling Muslim clothing information systems assisted by e-commerce technology, (ii) How to test web-based ordering information media at ayu fashion Muslim clothing stores. The purpose of this study is (i) to create an information system for selling Muslim clothing information systems assisted by e-commerce technology, (ii) can produce web-based ordering information media testing at ayu fashion Muslim clothing stores. The research method used is a waterfall. Some conclusions that can be drawn from Muslim clothing stores and application of the system to the problems that exist in the design of e-commerce Information Systems at Muslim clothing stores ayu fashion shop are as follows: (i) Consumers can order products at these Muslim clothing stores anywhere that are connected with the internet network, consumers only need to register, log in, choose products and place an order, (ii) Designing an e-commerce in a Muslim clothing store ayu fashion shop can provide solutions to the problems faced by the ayu fashion shop Muslim fashion shop in the product sales process as well as product marketing solutions for companies, (iii) Testing of e-commerce information systems in Muslim clothing stores with results according to the needs or designs created.
Effect Of Work Satisfaction, Financial Compensation And Work Competency Of Employee Performance In PT Inter Wahana Nusantara Medan: Effect Of Work Satisfaction, Financial Compensation And Work Competency Of Employee Performance In PT Inter Wahana Nusantara Medan Reinaldo Kosasih; Welliam Welliam; Roynaldo Roynaldo; Holfian Daulat Tambun
Jurnal Mantik Vol. 3 No. 4 (2020): February: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (492.361 KB)

Abstract

This research was conducted at PT Inter Wahana Nusanatara Medan. The research objective is to obtain job satisfaction, financial compensation and competence on employee performance at PT Inter Wahana Nusanatara Medan. The population and sample in this study were 82 employees. The research method uses multiple linear regression analysis. The results of this study indicate the simultaneous work results of job satisfaction, financial compensation and work competence on employee performance at PT Inter Wahana Nusanatara Medan. Partially job satisfaction, financial compensation and work competence on employee performance at PT Inter Wahana Nusanatara Medan.
Bruteforce In The Hydra Process And Telnet Service Using The Naïve Bayes Method: Bruteforce In The Hydra Process And Telnet Service Using The Naïve Bayes Method Tarisno Amijoyo; Rusydi Umar; Anton Yudhana
Jurnal Mantik Vol. 4 No. 1 (2020): May: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (759.536 KB)

Abstract

Internet technology is increasingly developing, in accordance with the needs of an increasingly millennial society. The growth of internet technology has been accompanied by an increasing variety of attack techniques aimed at the media. BruteForce is one of the techniques of attack (hacking) against the internet network by hacking passwords from users who are active or inactive at that time. Through a process with a small application such as Hydra accompanied by telnet service, then hacking techniques with BruteForce can be run, to attack an internet network. The Hydra process and the telnet service referred to in the study are those that included a "wordlist" file containing user information and password data. The count to detect, whether entering the network is a BruteForce attack or just normal / normal network traffic, can be done with the Naïve Bayes theorem or the Naïve Bayes method. The purpose of the Naïve Bayes method, is to be able to distinguish and classify, which is attack traffic, which is normal / normal network traffic. The reason for using the Naïve Bayes method is that the formulation in this method is easier to calculate when classifying the type of network traffic. From the results of the classification, it can be used as a reference for a network administrator to be more careful and better understand how to protect and prevent attacks from hackers, especially those who use BruteForce hacking techniques. The hope of this research, can be understood and understood so that it can be very easy for a network administrator to distinguish between the two traffic on the network, whether it is attack traffic and / or normal / normal traffic that is through the display on the Wireshark tool.
Analysis Of The Influence Of Group Social Factors, Product Information, Risk Perception And Trust On On Purchasing Decisions (Case Study of Online Shopping Students of the Faculty of Economics, Lamongan Islamic University): Analysis Of The Influence Of Group Social Factors, Product Information, Risk Perception And Trust On On Purchasing Decisions (Case Study of Online Shopping Students of the Faculty of Economics, Lamongan Islamic University) Noer Rafikah Zulyanti
Jurnal Mantik Vol. 4 No. 1 (2020): May: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (180.929 KB)

Abstract

The development of information technology that is very fast including the internet turned out to have a major impact on all aspects that exist, no exception to developments in the business and marketing world. With the rapid development of technology, many people use the technology to make buying and selling transactions using the internet. The purpose of this study is to determine the partial and simultaneous influence between social group variables, product information, risk perception and trust in online purchasing decisions. The study was conducted at the Faculty of Economics, Lamongan Islamic University with a total population of 2300 students. With a simple random sampling and Slovin technique found a sample of 100 respondents. Data collection methods with Kuesionare. Data analysis tools used validity, reliability, multiple regression, coefficient of determination, t test and Test F. The test results found that all research instruments are valid and reliable. Because it is greater than r table and standard reability. Regression test obtained equation Y = 15.148 + 0.707X1 + 0.245X2 + 0.825X3 + 0.139X4. Determination coefficient of 0.591, which means 59 , 1%. While the t test is obtained tCalculate (X1) = 3.101> tTable = 1.994, tCalculate (X2) = 2.266> tTable = 1.994, tCalculate (X3) = 5.401> tTable = 1.994 and tCalculate (X4) = 2.553> tTable = 2.994 1,994 and F test Fcalculate = 8,247> FTabel = 2,49. It is concluded that there is a partial and simultaneous influence between social group variables, product information, risk perception and trust in online purchasing decisions. And the dominant variable is risk perception.
Analysis of Cash Flow Reports as a Measuring Tool For Financial Performance Effectiveness (Case Study of PT. Astra Agro Lestari Tbk.): Analysis of Cash Flow Reports as a Measuring Tool For Financial Performance Effectiveness (Case Study of PT. Astra Agro Lestari Tbk.) Erlyna Tri Rohmiatun
Jurnal Mantik Vol. 4 No. 1 (2020): May: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (345.019 KB)

Abstract

Corporate performance appraisal reports especially finance need to be done to determine the level of achievement and success of the company in carrying out its activities in order to empower the financial resources available. The type of data obtained from the secondary company data uploaded on the page //http:www.idx.co.id/ and //http:www.astra-agro.co.id/ in the form of financial statements, namely the balance sheet and income statement during the observation period in 2014 to 2018. The data analysis technique used was descriptive analysis technique. Purpose of this research is to know the cash flow analysis in assessing performance at PT. Astra Agro Lestari, Tbk during 2014-2018. Ratio analysis will be used in this study. Among these ratios are the ratio of cash flows (AK), ratio of cash to interest coverage (CKB), cash ratio to current debt (KHL), capital expenditure ratio (PM), ratio of Total Debt (HT). Calculation of ratio to a) years to years b) years to base, c) compared to similar industries. By using the calculation of the ratio method, the results are unfavorable so that it can be concluded that the performance of PT. Astra Agro Lestari Tbk. 2014 until 2018 using the calculation of the above ratio has an underperformance.
Design Of Online Shopping Application Based On Mobile Devices And Android Studio In PT. Midi Utama Indonesia: Design Of Online Shopping Application Based On Mobile Devices And Android Studio In PT. Midi Utama Indonesia Bakhtiar Rifai; Yesi Ratna Sari; Nanang Nuryadi
Jurnal Mantik Vol. 4 No. 1 (2020): May: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1035.407 KB)

Abstract

Self-service is an alternative place to shop. a special place that can meet the daily shopping needs of consumers. Product Ordering for customers remains a constraint if the distance of the place of residence with a minimarket are far apart, or lazy customers out due to rain. Of the few existing cases, Order and delivery system is still done over the phone. The way they have constraints, such customers do not know the Menu and price list that is in the minimart. This research aims to build the application so that the delivery Order and delivery information becomes quickly, accurately, and can Order the Products online via smartphones. This application was built using the software Android Studio as the manufacturer of the application and its data base for the management of SQLite. This application can help consumers to get information about the Product- markets are offered as well as facilitate consumers in the process of Ordering a Product and can help increase sales for companies.
Application of IP Security and Mac Address Filtering Authentication Methods to Build Encrypted Interconnection Networks: Application of IP Security and Mac Address Filtering Authentication Methods to Build Encrypted Interconnection Networks Mochamad Akbar Fajar Hidayat Putra; Ucuk Darusalam; Andri Aningsih
Jurnal Mantik Vol. 4 No. 1 (2020): May: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (913.702 KB)

Abstract

The development of the industry is happening very fast, Making the company must improve its resource capabilities, one of which is the technology used to be able to contribute to the company. Security issues become very important at this time, especially for companies that already have many branches in different locations that require high-performance security systems, because the network interconnections that occur between the head office and branch offices are very vulnerable to attacks from irresponsible parties, The use of IP Security and MAC Address Filtering authentication methods on network devices is very useful to be able to protect, verify and filter company data from enemies on the internet. IP Security authentication provides integrity between connections, then Filtering MAC Address can help the router task to be able to recognize users on the network, So that expected the combination between IP Security and Mac Address Filtering will provide security for every transfer and receive data from Headquarter to branch office, then the company doesn't have to worry about data package being robbed or manipulated by the irresponsible parties.
Development of National University Web-Based Digital Library Information System: Development of National University Web-Based Digital Library Information System Rahmat Aji Santoso; Agung Triayudi; Winarsih Winarsih
Jurnal Mantik Vol. 4 No. 1 (2020): May: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (773.705 KB)

Abstract

The library is one of the sources to acquire: science. In the library: There is a collection of collections in the field of good science in the form of: books, journals, Proceedings, & Thesis as well as other types of reading. With the development of information technology and the implementation of information systems in various aspects of life: there are also many libraries that utilize information technology as a tool in place to facilitate operational activities in the library. In the field of education, schools and colleges, libraries are: the one condition for college to stand. One of the colleges that have also utilized the information Technology Library is: National University. UNAS's library has also used information systems to manage books and other reading resources in the library. In addition, the process of borrowing and refunding and registration of members has been made also computerized with the presence of the library information system. Library members can also: Use the catalogue of books found in the columns in the library to search for the desired library title. Therefore, authors developed a "Digital Library" website based on: "Development of Digital Library Information System WEB based National University" so this makes it easier for members to be able to also access the library title from elsewhere, without having to come into the library.
Computer Technician Application Design in Household Based Part (BRT) Using the SDLC Method: Computer Technician Application Design in Household Based Part (BRT) Using the SDLC Method Fachri Muhammad; Fauziah Fauziah; Rini Rini
Jurnal Mantik Vol. 4 No. 1 (2020): May: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (536.961 KB)

Abstract

Along with the times, technological advances also have new standards and the best servants. Currently doing repairs to facilities on campus there are still many using manual reports so that the lack of the best service for facility improvement. Making computer technician applications in the household (BRT) at Universitas Nasional can assist technicians in receiving reports quickly and practically so that technicians can immediately improve facilities, especially lab facilities at Universitas Nasional. The results of this application can make a booking and without having to take care of a complicated administration and the user can receive a notification when it has finished doing service or repairs. The application is made using platform android so it's easy and fast because everyone must use an android smartphone. By making this, it is expected to make it easier for technicians in the household section to do the work and users can easily report the damage.

Page 18 of 216 | Total Record : 2151


Filter by Year

2019 2026


Filter By Issues
All Issue Vol. 9 No. 4 (2026): February: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 9 No. 3 (2025): November: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 9 No. 2 (2025): August: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 9 No. 1 (2025): May: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 8 No. 4 (2025): February: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 8 No. 3 (2024): November: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 8 No. 2 (2024): August: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 8 No. 1 (2024): May: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 7 No. 4 (2024): February: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 7 No. 3 (2023): November: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 7 No. 2 (2023): Agustus: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 7 No. 1 (2023): May: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 6 No. 4 (2023): February: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 6 No. 3 (2022): November: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 6 No. 2 (2022): August: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 6 No. 1 (2022): May: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 5 No. 4 (2022): February: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 5 No. 3 (2021): November: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 5 No. 2 (2021): Augustus: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 5 No. 1 (2021): May: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 4 No. 4 (2021): February: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 4 No. 3 (2020): November: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 4 No. 2 (2020): Augustus: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 4 No. 1 (2020): May: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 3 No. 4 (2020): February: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 3 No. 3 (2019): November: Manajemen, Teknologi Informatika dan Komunikasi (ManTIK) Vol. 3 No. 2 (2019): Augustus: Manajemen, Teknologi Informatiak dan Komunikasi (Mantik) Vol. 3 No. 1 (2019): May: Manajemen dan Informatika More Issue