cover
Contact Name
Taufiq Iqbal
Contact Email
taufiq.iqbal@lembagakita.org
Phone
+6285277777449
Journal Mail Official
jtik@lembagakita.org
Editorial Address
Teuku Nyak Arief Street Number: 7b Lamnyong, Banda Aceh City, Aceh Province
Location
,
INDONESIA
Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi)
ISSN : -     EISSN : 25801643     DOI : https://doi.org/10.35870/jtik
Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi), e-ISSN: 2580-1643 is a free and open-access journal published by the Research Division, KITA Institute, Indonesia. JTIK Journal provides media to publish scientific articles from scholars and experts around the world related to Hardware Products, Software Products, IT Security, Mobile, Storage, Networking, and Review An application service. All published article URLs will have a digital object identifier (DOI).
Articles 801 Documents
Audit Keamanan untuk Mendeteksi Kerentanan dan Mitigasi pada Website UPT Integrated Laboratory (ILab) ITERA Berbasis OWASP Zed Attack Proxy (ZAP) Ilham Firman Ashari Ashari; Muhammad Affandi; Hendri Tri Putra; Muhammad Telaga Nur
Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) Vol 7 No 1 (2023): JANUARY-MARCH 2023
Publisher : KITA Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/jtik.v7i1.657

Abstract

Information technology now has many positive and negative effects on comfort. One of the negative effects of this technology is high level security attacks that can exploit various vulnerabilities and loopholes. Vulnerability testing (security audits) is therefore necessary to identify and overcome the vulnerabilities of the risks raised. The author is UPT Terpada Laboratory (Ilab) ITERA (https:http://ilab.itera.ac.id), a website maintained by his UPT Institute at the University of Technology Sumatra. This website contains all information about the labs of the University of Technology of Sumatra. Security audits are performed using the OWASP ZAP tool. A security check was performed on web ilab.itera.ac.id and the high priority alert results are: 1 vulnerability, medium priority warning: Three vulnerabilities, low priority warnings: Seven vulnerabilities and information: 3 vulnerabilities.
Preferensi Terhadap Marketplace Menggunakan Metode Simple Additive Weighting (SAW) (Studi Kasus: Shopee dan Tokopedia) Ellen Arnetta; Magdalena A. Ineke Pakereng
Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) Vol 7 No 1 (2023): JANUARY-MARCH 2023
Publisher : KITA Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/jtik.v7i1.660

Abstract

At this time technology has been growing, one of which is the development in the business world from tradional to digital. E-commerce as the main of contributor in Indonesia digital economy. Tokopedia and Shopee are two giants that dominate the Indonesia market. The researcher are interested in conducting research to determine customer interest and making choices to shop online. The method used in this research is SAW (Simple Additive Weighting) method and distributes questionnaires to marketplace users. The results obtained from Shopee's research have a preference value of 0.98 and Tokopedia's 0.91. These results show that the majority prefer to shop online using Shopee instead of Tokopedia.
Perancangan Sistem Informasi Persediaan Obat Berbasis Web di Poliklinik Wyata Guna Bandung Mohammad Arya Primasaji; Seliwati; Muthmainnah
Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) Vol 7 No 1 (2023): JANUARY-MARCH 2023
Publisher : KITA Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/jtik.v7i1.667

Abstract

The purpose of this study was to overcome the many calculation errors in inventory recording caused by recording the inventory manually, the frequent occurrence of delays in making drug inventory reports caused by the accumulation of incoming goods transaction data and outgoing goods data. The research method that we apply is SDLC (Analyze, Design System, Coding, Testing, and Implementation). Designed using PHP version 7 programming language with CodeIgniter 3 Framework, UI uses Bootstrap 4 and Javascript Library, for the database using Mysql database. While the Navigation Structure is used as the flow of a program and Flowchart is used to represent the flow of work processes between functions. The result of this research is to handle incoming and outgoing goods transactions to produce accurate inventory reports.
Pengkategorian Komentar Instagram Terhadap Layanan Akademik dan Non-Akademik Universitas Terbuka Rhini Fatmasari; Alda Zevana Putri Widodo; Valianda Farradillah Hakim; Windu Gata; Dedi Dwi Saputra
Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) Vol 7 No 1 (2023): JANUARY-MARCH 2023
Publisher : KITA Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/jtik.v7i1.669

Abstract

Instagram is one of the social media that has many users in Indonesia, where users are free to comment on whatever is going on, including being a form of online communication between campuses and their students. The number of topics and comments on an official Instagram account can be used as evaluation or learning material. The Open University is one of the campuses that has an official Instagram account with thousands of followers. In order to get an evaluation of academic and non-academic services, in this study a categorization analysis was carried out with 10,000 comment data taken from the official @univterbuka Instagram account. The data is categorized into 7 categories, then processed using 4 algorithms, namely SVM, Naïve Bayes, Random Forest and KNN. The highest accuracy in the category of teachers with the KNN method is 98.97% and the highest AUC is in the module category with the SVM method of 94.60%.
Sistem Informasi Booking Wedding Organizer Berbasis Website pada Max Entertaiment Kudus Sindhi Diah Ayu Palupi; Magdalena A. Ineke Pakereng
Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) Vol 7 No 1 (2023): JANUARY-MARCH 2023
Publisher : KITA Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/jtik.v7i1.671

Abstract

Wedding organizers are services that can assist in preparing and carrying out wedding events. Max Entertainment is one of the providers of wedding organizer packages in Kudus whose services are still done manually. The problem that often arises is the lack of information that can be a guide for making decisions on wedding receptions and planning costs (budget) that must be incurred by the bride and groom. Therefore, the author designed an information on ordering wedding organizer services which aims to make it easier for the bride and groom to make the process of ordering wedding organizer services and become a promotional event for Max Entertainment Kudus itself. The method applied in this research is the UML method which is useful as a guide in designing this system and Black Box Testing as a method of testing the system that has been built. The expected result in this research is the creation of a website-based wedding organizer information system so that it can be accessed by prospective wedding organizer customers to place orders.
Sistem Informasi Uji KIR Angkutan Umum Berbasis Android Menggunakan Metode Waterfall (Studi Kasus: Dinas Perhubungan Salatiga) Mellyuga Errol Wicaksono; Hindriyanto Dwi Purnomo
Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) Vol 7 No 1 (2023): JANUARY-MARCH 2023
Publisher : KITA Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/jtik.v7i1.682

Abstract

Testing or inspection towards a certain motor vehicle are often referred to as a KIR testing. KIR testing is commonly performed by Dinas Perhubungan, a government agency. Usability of KIR testing is to test a vehicle's technical eligibility to decide if a vehicle is either suitable to be used on the road or not. The main goal is to improve the safety for vehicle. On this research, information systems regarding KIR testing towards public transportation were being made. This system information were built on a smartphone using Android operating system. In designing and building applications using the waterfall method, and in testing application using the black box testing method. The data storage system in this study uses Firebase which has been integrated with the application. The result of this research will be an information system in the form of an Android application at Dinas Perhubungan in the City of Salatiga.
A Analisa Sentimen Terhadap Twitter IndihomeCare Menggunakan Perbandingan Algoritma Smote, Support Vector Machine, AdaBoost dan Particle Swarm Optimization Ferdian Syah; Hanif Fajrin; Abiyyu Nur Afif; Muhamad Rafi Saeputra; Dinda Mirranty; Dedi Dwi Saputra
Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) Vol 7 No 1 (2023): JANUARY-MARCH 2023
Publisher : KITA Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/jtik.v7i1.686

Abstract

Indihome is one of the largest internet service providers in Indonesia with an increasing number of subscribers every year. Indihome subscribers until the end of March 2022 were recorded at 8.7 million, growing 7.2 percent over the same period last year. However, over time, many customers have complained to IndiHome about slow internet access, sudden increases in billing and so on. Based on the description above, it is interesting to conduct research on the use of Indihome tweets which are the result of channeling opinions and comments on Twitter social media. This study uses the Smote method, Support vector machine, Adaboost and Particle swarm optimization so that the results can be compared with the level of accuracy. The results of this research show that by using the Smote method, Support vector machine obtained values of Accuracy 80.48, Precision 85.29, Recall 73.75 and AUC 0.907. As for the Smote, Support vector machine and AdaBoost methods, the Accuracy values are 80.21, Precision 85.01, Recall 73.36 and AUC 0.861. Finally, the results of the Smote and Particle swarm optimization methods obtained Accuracy values of 76.59, Precision 76.57, Recall 80.35 and AUC 0.868. Based on the research results, the Smote method and the Support vector machine (SVM) have the largest results and are considered effective with the existing dataset
Perancangan Kunci Kontak Sepeda Motor Menggunakan E-SIM dengan Jaringan RFID Laurensius Phillipus Ramawijaya; Dian Widiyanto Chandra
Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) Vol 7 No 1 (2023): JANUARY-MARCH 2023
Publisher : KITA Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/jtik.v7i1.687

Abstract

Nowadays, the motorcycle key is assumed to be too old-fashioned because it still uses physical metal, is easily eroded, and is loose. A driver's license (SIM) is a card that needs to be brought when driving. It used the driver as evidence that they have a driving permit from the police. On the other hand, identity cards such as SIMs already have RFID technology. However, this technology is rarely used correctly. This study aims to design a motorcycle security system using RFID and, likewise SIM card model as a motorcycle ignition key. The study showed that the system could perform or operate well. Motorcycle key using RFID as a dummy SIM makes people easier who are careless in putting their motorcycle keys.
Analisis Risiko Pinjaman dengan Metode Support Vector Machine, Artificial Neural Network dan Naïve Bayes Bandung Pernama; Hindriyanto Dwi Purnomo
Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) Vol 7 No 1 (2023): JANUARY-MARCH 2023
Publisher : KITA Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/jtik.v7i1.693

Abstract

Banking is an industrial institution that is influential in the economy of a country. Banks are engaged in finance that collect funds from the public in the form of deposits and distribute loans to the public. It is undeniable, that in making loans to the public, problems will inevitably arise, such as the borrower being late in making installment payments or misuse of funds for other purposes, the borrower failing to build his business, thereby hampering installment payments. In this study, we will predict loan risk using a machine learning approach using several methods such as Support Vector Machine (SVM), Artificial Neural Network (ANN), and Naive Bayes. From the results of research that has tested the three methods using cross validation, confusion matrix, and ROC curves, the Support Vector Machine (SVM) method, which is the method with the best results, is 92.0% accuracy, then the second method is Artificial Neural Network. (ANN) of 91.2% and the lowest accuracy is the Naïve Bayes method with an accuracy of 81.2%.
Perancangan dan Implementasi Sistem Informasi Gereja Kristen Jawa Plengkung Berbasis Web Menggunakan Framework CodeIgniter Donny Julianto Setiawan Halim; Ramos Somya
Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) Vol 7 No 1 (2023): JANUARY-MARCH 2023
Publisher : KITA Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/jtik.v7i1.695

Abstract

Information system is one of the thing that can be called as mandatory to be had by an institution right now. Gereja Kristen Jawa Plengkung (GKJP) is still using all of its record by traditional way. Data saved by tradisional way can caused a duplication of data called redundancy. With the existence of information system, activities in GKJP like data saving are expected to go well for the future. In the making of information system, waterfall is used as the research method for the development of information system. Waterfall usually has steps like (1) analytic, (2) design, (3) coding, (4) testing, (5) support. Based on the research and the testing that has been done, design and implementation of information system in Gereja Kristen Jawa Plengkung with Web as its base and the using of CodeIgniter Framework can be called success because it can fulfill the requirement suggested by the user.