cover
Contact Name
Taqwa Hariguna
Contact Email
taqwa@amikompurwokerto.ac.id
Phone
+62895422720524
Journal Mail Official
contact@ijiis.org
Editorial Address
Puri Mersi Baru, Jl.Martadireja II, Gang Sitihingil 3 Blok A No 2, Purwokerto Timur, Jawa Tengah
Location
Kota adm. jakarta pusat,
Dki jakarta
INDONESIA
IJIIS: International Journal of Informatics and Information Systems
Published by Bright Publisher
ISSN : -     EISSN : 25797069     DOI : https://doi.org/10.47738/ijiis
Core Subject : Science,
The IJIIS is an international journal that aims to encourage comprehensive, multi-specialty informatics and information systems. The Journal publishes original research articles and review articles. It is an open access journal, with free access for each visitor (ijiis.org/index.php/IJIIS/); meanwhile we have set up a robust online platform and use an online submission system to ensure the international visibility and the rigid peer review process. The journal staff is committed to a quick turnaround time both in regards to peer-review and time to publication.
Articles 5 Documents
Search results for , issue "Vol 5, No 3: September 2022" : 5 Documents clear
Integrating Big Data Technologies to Strengthen Network Security Awareness Hariguna, Taqwa
International Journal of Informatics and Information Systems Vol 5, No 3: September 2022
Publisher : International Journal of Informatics and Information Systems

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47738/ijiis.v5i3.137

Abstract

The Network Security Alarm Warning System (NSAWS) is a sophisticated, real-time, large-scale database management system designed to enhance cybersecurity by analyzing user identity data and access rights within the amassed information to detect potential threats and issue timely alarm notifications. This paper explores methods to bolster network attack prevention in a Big Data framework, starting with an overview of prevalent internet technologies in our country and their current applications. It then elaborates on the architecture, deployment strategies, and operational methodologies of the NSAWS, emphasizing the integration of fundamental security infrastructures like cloud computing platforms and firewalls. Following this, the traditional NSAWS is analyzed, and a simulation platform is tested to evaluate its performance in identifying and alerting network security threats. The results indicate that the NSAWS platform demonstrates exceptional accuracy and stability in its warning capabilities, effectively safeguarding network security by swiftly addressing potential vulnerabilities and threats. This paper underscores the importance of leveraging advanced technologies and robust security frameworks to fortify network defenses against evolving cyber threats, highlighting the NSAWS as a vital tool in maintaining and enhancing network security in an increasingly digital and interconnected world.
The Application of Computer BIM Technology in Prefabricated Construction Project Management Nan Li
International Journal of Informatics and Information Systems Vol 5, No 3: September 2022
Publisher : International Journal of Informatics and Information Systems

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47738/ijiis.v5i3.138

Abstract

The construction industry is a pillar industry of the national economy, and it occupies a pivotal position in our country's economic development. With the rapid development of the construction industry today, traditional construction methods can no longer satisfy the use of information, data and resources in the management of construction projects. It is necessary for BIM technology to be applied to the management of prefabricated construction projects. In order to expand the scope of application of BIM technology in construction projects and enhance people's trust, this paper studies the application of computer BIM technology in prefabricated construction project management. This article mainly uses theoretical analysis, comparative analysis and statistics to deepen the understanding of BIM technology, discovers the characteristics of traditional construction methods and construction methods supported by BIM technology, and studies the application in construction project management. The survey results show that the scope of application of BIM technology in our country's construction industry is becoming wider and wider. After five years of development, the application rate of BIM in most areas has increased by more than 10%.
Integrating Technology and Legal Strategies to Combat Evolving Money Laundering Tactics Hananto, Andhika Rafi
International Journal of Informatics and Information Systems Vol 5, No 3: September 2022
Publisher : International Journal of Informatics and Information Systems

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47738/ijiis.v3i1.93

Abstract

Money laundering has significantly advanced with the aid of technology, enabling perpetrators to exploit technological tools for criminal ease. This trend is compounded by the use of cross-border cash couriers, increasingly favored as a method for laundering illicit funds. International conventions and multilateral agreements acknowledge the vulnerability of cash courier operations to money laundering, yet current frameworks primarily offer detection guidelines rather than precise methods for direct recognition. Given that money laundering involves proceeds of crime, authorities must scrutinize and assess transactions to determine if criminal activity constitutes money laundering, distinct from customs violations.Moreover, the proliferation of innovative financial products and payment systems, including cryptocurrencies like Bitcoin, Litecoin, and other virtual currencies, as well as bearer negotiable instruments, has further facilitated money laundering opportunities. Research indicates that criminal tactics are outpacing legal frameworks, with technology infiltrating the strategies of money launderers and potentially overshadowing regulatory controls. Despite technology's neutral intent, its misuse challenges the traditional role of law enforcement.This qualitative study aims to analyze how legal frameworks can collaborate with technology to combat money laundering effectively. The hypothesis posits that the law can provide crucial guidance amid technological developments, while technology can prompt legal systems to adapt swiftly. By integrating these approaches, the research suggests that combating the evolution of money laundering becomes more formidable when law and technology converge.
Interior Design of Smart Home Based on Intelligent 3D Virtual Technology Wei Liu
International Journal of Informatics and Information Systems Vol 5, No 3: September 2022
Publisher : International Journal of Informatics and Information Systems

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47738/ijiis.v5i3.139

Abstract

With the development of society and the continuous advancement of technology, people's research on smart home products is gradually deepening. Compared with the past, smart homes are no longer out of reach, but actually penetrate into our lives. However, while continuously exploring the technology of smart home products, designers have not conducted in-depth research on the interactive mode of the control interface of smart home products. Based on this, the purpose of this article is to study the smart home interior design based on intelligent three-dimensional virtual technology. This article first analyzes the development and current situation of smart homes, and on this basis, combines three-dimensional virtual reality technology to research and analyze smart home systems (S H S). This article systematically elaborates the design of functional modules of the S H S based on intelligent 3D virtual reality technology and the method of converting 2D plane to 3D space coordinate. And use comparative analysis method, interview method and other research methods to carry out experimental research on the theme of this article. The research shows that compared with the traditional S H S, the S H S based on 3D virtual technology studied in this paper has higher feasibility.
A Systematic Review on Image Data Protection Methods Faraj Ali Alyaqobi; Nor Adnan Bin Yahaya
International Journal of Informatics and Information Systems Vol 5, No 3: September 2022
Publisher : International Journal of Informatics and Information Systems

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47738/ijiis.v5i3.136

Abstract

Securing data is the main goal of any data security system (DSS). Valuable data must be protected all the time and stored in a very highly secure data storage device. This need has become more critical due to the continuous growth of data size.  Furthermore, non-text data in the form of images, audio, and videos can now be transferred and processed easily and thus become part of sensitive data that needs to be protected. Since there is a need to secure and protect data in any form in order to keep them private and valid, it is expected that there would be many attempts already that have been proposed in the literature for this purpose. This paper reviews a group of these proposed strategies and methods that have been applied to different kinds of DSSs. Challenges and future trends of DSSs are also discussed. A number of main findings are grouped and organized as follows: (1) there are many different kinds of security techniques, each of which offers varying degrees of performance in terms of the amount of data and information that can be managed securely, (2) depending on the architecture of the proposed method, the tactics or strategies of the security system, the kinds of DSSs, as well as a few other factors, some methods are more appropriate for the storage of certain categories of data than others.

Page 1 of 1 | Total Record : 5