cover
Contact Name
Tonni Limbong
Contact Email
jurnal.means@gmail.com
Phone
+6281267058001
Journal Mail Official
tonni.budidarma@gmail.com
Editorial Address
http://ejournal.ust.ac.id/index.php/Jurnal_Means/about/editorialTeam
Location
Kota medan,
Sumatera utara
INDONESIA
MEANS (Media Informasi Analisa dan Sistem)
ISSN : 25486985     EISSN : 25993089     DOI : -
Core Subject : Science,
Jurnal MEANS berdiri sejak Tahun 2016 dengan SK dari LIPI yaitu p-ISSN : 2548-6985 (Print) dan e-ISSN : 2599-3089 (Online) Terbit dua kali setiap Tahunnya yaitu Periode I Bulan Juni dan Periode II Bulan Desember Hasil Plagirisme Maksimal 25%, Lebih dari 25% Artikel Tidak Bisa Publish. Ruang lingkup publikasi ini adalah untuk bidang Ilmu Komputer seperti : 1. Sistem Informasi 2. Manajemen dan Audit Sistem Informasi 3. Aplikasi Dekstop 4. Web dan Mobile 5. Sistem Pendukung Keputusan 6. Sistem Pakar 7. Pembelajaran berbasis Komputer 8. Kriptografy 9. Bidang Ilmu Koputer yang lainnya.
Articles 16 Documents
Search results for , issue "Volume 4 Nomor 1" : 16 Documents clear
Aplikasi Pembelajaran Kriptograpi berbasis Mobile menggunakan Computer Assisted Instruction Hutahaean, Harvei Desmon; Hasugian, Paska Marto
MEANS (Media Informasi Analisa dan Sistem) Volume 4 Nomor 1
Publisher : LPPM UNIKA Santo Thomas Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (372.303 KB) | DOI: 10.54367/means.v4i1.310

Abstract

The source of science is still dominated by books, although with the internet students get information with diverse scientific fields, but actually the information comes from material in the book. To be able to master a material from a book, students must first be able to read and understand well. Nowadays software is growing very rapidly. The world of education has also used software to create interactive learning application methods with multimedia concepts. This can help overcome, the level of difficulty experienced by students, in order to be able to attract student learning interest, so that it can automatically improve the learning process to be more active and effective. Actually this method has been widely used and has good benefits in learning. As for the achievements of this study to assist students in learning and understanding the learning of data security techniques, this is a solution in several learning problems, namely an explanation that is too fast, a conducive atmosphere, time, learning media and student interest.
Pemetaan Tata Kelola IT Menggunakan Standarisasi Cobit 4.1 (Studi Kasus UKMC Palembang) Simbolon, Defrianti; Wijaya, Andri
MEANS (Media Informasi Analisa dan Sistem) Volume 4 Nomor 1
Publisher : LPPM UNIKA Santo Thomas Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (497.245 KB) | DOI: 10.54367/means.v4i1.496

Abstract

COBIT 4.1 is a standardization of framework mapping using a balanced scorecard that aims to implement information technology governance performance in UKMC. Information technology carried out in UKMC must be monitored and managed properly so as to avoid problems such as disrupted data security, data leakage, and organizational losses. Identification results obtained from COBIT 4.1 mapping obtained 21 sub domain processes that must be applied in UKMC such as PO (PO1, PO2, PO4, PO8, PO10), AI (AI, AI2, AI4, AI6, AI7), DS (DS1, DS2 , DS3, DS4 DS5, DS7, DS8, DS10, DS13), and ME (ME1, ME2). The sub domain of the process must be implemented and implemented in UKMC to support the achievement of the realization of good university governance and ensure that the information technology system that has been implemented in UKMC is aligned with the organization's goals so that the vision and mission of KSITK will run effectively and efficiently for UKMC development
Penerapan Algoritma Secure Hash Algorithm (SHA) Keamanan Pada Citra Sembiring, Hermansyah; Manik, Fuzy Yustika; Zaidah, Tengku
MEANS (Media Informasi Analisa dan Sistem) Volume 4 Nomor 1
Publisher : LPPM UNIKA Santo Thomas Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (533.186 KB) | DOI: 10.54367/means.v4i1.316

Abstract

Current information exchange is not only in the form of text, it can be an image or video. All of that can be done using computer network technology in the form of the internet. Through an internet connection, you can connect with many people. Cryptography aims for messages or images that cannot be seen by other parties who have no interest in the information. Messages or secured images can be data stored in secure computer memory or sent through computer networks. And can protect the confidentiality of images from various threats that arise. To maintain data security, SHA-256 is used when transforming data bytes into string hashes. The system built has been able to implement the SHA 256 algorithm which can change the original image file in the form of unknown files and encrypted images that are difficult to know the original image, unless read using an application that has been built. the image when encrypted and used again at the time of decryption with as many as 45 characters and may be in the form of numbers or letters. The SHA 256 process when encrypted in only one round, can be played with decryption.
Pemilihan Media Promosi STMIK Pelita Nusantara Medan dengan Metode Analytic Network Process (ANP) Sinaga, Bosker; Hasugian, Penda Sudarto
MEANS (Media Informasi Analisa dan Sistem) Volume 4 Nomor 1
Publisher : LPPM UNIKA Santo Thomas Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (377.673 KB) | DOI: 10.54367/means.v4i1.311

Abstract

Analytic Network Process (ANP) algorithm is used to find optimal alternatives from a set of alternatives with certain criteria. Selection or process is carried out by evaluating promotional media by distributing questionnaires to students to find out the media to be evaluated next by selecting 4 promotional media, determining criteria and sub criteria by distributing questionnaires to the Chairperson of STMIK Pelita Nusantara, Puket III Student and Promotion Section, and The Chairperson of the Promotion, then processes the data using Super Decisions Software 2.4.0. The highest rating results obtained from the analysis and discussion show that the Internet (0.329). from the results of the distributed questionnaire data processing to the management of STMIK Pelita Nusantara Medan, namely the Chairperson, the Third Bouquet and Promotion Section, and the Chairperson of Pelita Nusantara STMIK Promotion, and the application of the Analyst Network Process (ANP) method with the Super Decisions 2.4.0 Application producing cracking the highest media is the Internet (0.329), followed by School Visits (0.274), Radio (0.213), and Banners / Billboards (0.185).
Implementasi Metode Kriptografi Advanced Encryption Standard (AES) untuk Proteksi Pesan Audio Sihombing, Marto; Sitompul, Juliana Naftali; Putri, Tia Anggia
MEANS (Media Informasi Analisa dan Sistem) Volume 4 Nomor 1
Publisher : LPPM UNIKA Santo Thomas Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (559.432 KB) | DOI: 10.54367/means.v4i1.317

Abstract

This study is to solve the problem Cryptographic techniques used to protect and maintain the confidentiality of audio messages by changing audio messages into audio messages that cannot be played by doing the encryption process and can be played back after the audio message is decrypted. To protect audio messages, it is used in the process of encrypting and decrypting audio messages using the Advanced Encryption Standard (AES) method. The Advanced Encryption Standard (AES) uses symmetric key block passwords with varying key sizes of 128 bits, 192 bits, and 256 bits. The Advanced Encryption Standard (AES) method used is 128 bit key size and there are 10 rounds in the process of encryption and decryption. Audio messages that have been encrypted using the Advanced Encryption Standard (AES) method cannot be played by parties who do not know the key to encrypt and decrypt the audio message. Audio messages are protected and protected from irresponsible parties who want to damage or just listen to the audio message.
Dampak Penggunaan Game Online Terhadap Interaksi Sosial (Studi Kasus Mahasiswa UAJY) Pradipta, Aloysius Bagas; Ulfa, Marindah; Alexander, Leonardo; Sirait, Hema M; Danny, Alexander J
MEANS (Media Informasi Analisa dan Sistem) Volume 4 Nomor 1
Publisher : LPPM UNIKA Santo Thomas Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (323.803 KB) | DOI: 10.54367/means.v4i1.497

Abstract

Online games are entertainment media or playing media for children to adults. Online games have grown rapidly, especially in Indonesia. Online games are one of the most popular but have an impact on one's social interactions. The purpose of the research we conducted was to determine the effect of using online games on the FTI UAJY student social interactions and to find out the relationship between playing online games and the FTI UAJY student social interactions. The methodology we use is qualitative research, by taking samples from FTI UAJY students by distributing questionnaires and getting 239 active users of online game respondents. The results of the study know that online games influence student social interactions. Playing online games has a negative influence on the social interactions of FTI UAJY students. So that handling and control measures are needed. The handling and control measures are expected to emerge from the students themselves because only themselves can limit their activities such as playing online games with more positive activities.

Page 2 of 2 | Total Record : 16