cover
Contact Name
Khairul Muttaqin
Contact Email
khairulmuttaqin@unsam.ac.id
Phone
+6282276119180
Journal Mail Official
teknikinformatika@unsam.ac.id
Editorial Address
Jalan Prof.Dr. Syarief Thayeb, Meurandeh, Langsa - Aceh
Location
Kota langsa,
Aceh
INDONESIA
Jurnal Informatika dan Teknologi Komputer ( J-ICOM)
Published by Universitas Samudra
ISSN : 27752089     EISSN : 27747115     DOI : https://doi.org/10.33059/j-icom.v2i1.3417
Core Subject :
Jurnal J-ICOM (Jurnal Informatika dan Teknologi Komputer) dimaksudkan sebagai media kajian ilmiah hasil penelitian, pemikiran dan kajian analisis-kritis mengenai penelitian Rekayasa Sistem, Teknik Informatika/Teknologi Informasi, Manajemen Informatika dan Sistem Informasi. Sebagai bagian dari semangat menyebarluaskan ilmu pengetahuan hasil dari penelitian dan pemikiran untuk pengabdian pada Masyarakat luas dan sebagai sumber referensi akademisi di bidang Teknologi dan Informasi. Jurnal J-ICOM (Jurnal Informatika dan Teknologi Komputer) menerima artikel ilmiah dengan lingkup penelitian pada: Rekayasa Sistem Sistem Pakar Sistem Penunjang Keputusan Data Mining Kecerdasan Buatan Jaringan Komputer Teknik Komputer Pengolahan Citra Algoritma Genetik Perancangan Sistem Informasi Business Intelligence and Knowledge Management Database System Big Data Enterprise Computing Cloud Computing Technology Management Topik kajian lainnya yang relevan Dengan artikel yang memiliki sitasi primer dan tidak pernah dipublikasikan secara online atau versi cetak sebelumnya.
Articles 105 Documents
The Analisis Perilaku Dan Dampak Malware Ransomware Locky Metode Dinamis Framework Flarevm Sahrul, Sahrul ismail Usman
Jurnal Informatika dan Teknologi Komputer (J-ICOM) Vol 6 No 2 (2025): Jurnal Informatika dan Teknologi Komputer ( J-ICOM)
Publisher : E-Jurnal Universitas Samudra

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55377/j-icom.v6i2.10432

Abstract

Locky ransomware malware is a very dangerous malware and malware has the potential to encrypt all important victim data in exchange for ransom in return, this will be very detrimental to victims who do not know anything. Malware that is easy to infiltrate and enter at any time makes the system vulnerable, so there needs to be in-depth research on malware, namely behavioral analysis and the impact of malware to determine the characteristics of malware, considering that the more the prevention system develops, the more malware developers develop their malware so that it cannot be detected by the prevention system. By conducting dynamic analysis, malware will be run on the Windows 10 operating system and allowed to infect with the support of the flarevm framework which has complete security standards and tools to analyze the behavior and impact of malware, with the results of the analysis obtained it can be concluded that the locky ransomware malware has a tendency to add key or value behavior and uses internet protocols to send and receive files, namely TCP (Transmission Control Protocol).
The Pengalaman Pengguna Aplikasi E-Absensi Berbasis IOS dan Kinerja Pegawai fanro, fanro_2024
Jurnal Informatika dan Teknologi Komputer (J-ICOM) Vol 6 No 2 (2025): Jurnal Informatika dan Teknologi Komputer ( J-ICOM)
Publisher : E-Jurnal Universitas Samudra

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55377/j-icom.v6i2.10915

Abstract

Employee attendance is an obligation, regulated in Government Regulation No. 94 of 2021 Article 4 letter f. January 2 2023 ASN and NON ASN North Bengkulu Regency Government are required to carry out IOS-based digital attendance. Various problems were encountered, such as difficulty accessing the attendance website, the network often having problems, so that employee attendance times were not synchronized, so the North Bengkulu Regency Government continued to develop applications (up-grade). The use of e-attendance applications should prevent the emergence of bureaucratic pathologies such as fraud that occurs in manual attendance so as to improve the quality of service and employee performance. The urgency of research is the sub-district's role as an extension of government services to the local community. The research aims to determine the influence of IOS-based e-attendance application users on employee performance. The research method uses quantitative and qualitative methods. The research results show that the data is normally distributed (kolmogoro-smirnove test). The r value is 0.801, meaning there is a positive and significant relationship between iOS-based e-attendance user experience and performance of 0.801. The effective contribution of e-attendance user experience to employee performance is 64.20%, 30.80% is influenced by other factors.
Perancangan Strategis Blueprint Sistem Informasi menggunakan Metode Enterprise Architecture Planning Studi Kasus Universitas Kartamulia Purwakarta Divi Adiffia Freza Alana; Salim, Asep Yusapra; Putri, Rizqy Amalia; Mardiman; Basysyar, Fadhil Muhammad
Jurnal Informatika dan Teknologi Komputer (J-ICOM) Vol 6 No 2 (2025): Jurnal Informatika dan Teknologi Komputer ( J-ICOM)
Publisher : E-Jurnal Universitas Samudra

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55377/j-icom.v6i2.13216

Abstract

The increasing need for integrated information systems in higher education requires a strategic and structured architectural plan. Universitas Kartamulia Purwakarta faces challenges from fragmented systems among departments and the absence of a long-term roadmap for information technology development. This study aims to design a strategic information system blueprint using the Enterprise Architecture Planning (EAP) method to support the university’s core processes. A descriptive qualitative approach with a case study method was applied. Data were collected through interviews, observations, and document analysis. The EAP stages include Planning Initiation, Business Modeling, Current System Analysis, Data Architecture, Applications Architecture, Technology Architecture, and Implementation Planning. The results produce an integrated architecture blueprint covering key domains such as student admissions, academic processes, research, and student services. This blueprint provides a strategic foundation for aligning information systems with institutional goals and improving operational effectiveness. The proposed design strengthens the university’s digital transformation and supports the realization of an integrated, efficient, and competitive smart campus.
Pengembangan Aplikasi Pemanfaatan Barang Milik Negara Berbasis Website Menggunakan Metode Waterfall Nuril Qomaryah; Verdi Yasin; Anton Zulkarnain Sianipar
Jurnal Informatika dan Teknologi Komputer (J-ICOM) Vol 6 No 2 (2025): Jurnal Informatika dan Teknologi Komputer ( J-ICOM)
Publisher : E-Jurnal Universitas Samudra

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55377/j-icom.v6i2.10695

Abstract

Good management of State Property (BMN) is expected to be owned by every government agency, one of which is in the activity of borrowing goods. However, in the process, several obstacles were found, such as errors in recording goods due to manual processes, difficulties in searching for data, the length of time required to provide reports, frequent stock shortages, and difficulties in data processing. To overcome these problems, a BMN utilization information system has been built. Data was collected through interviews, observations, and literature studies. System development was carried out using the SDLC Waterfall method which consists of five stages, namely needs analysis, design, implementation, testing, and maintenance. System design was carried out using UML diagrams, such as use cases, activity diagrams, class diagrams, and mock-ups. Implementation was carried out using the PHP programming language with the Laravel framework and MySQL database. Testing was carried out using the black-box method and System Usability Scale with a test result score of 89.8 which means the application is suitable for use. A website-based BMN utilization application with the waterfall method and Laravel framework was produced from this study. From the research that has been conducted, it is concluded that the application that has been created is able to make it easier for agencies to manage BMN and is more optimal, especially borrowing activities and requests for inventory of goods become more effective and efficient.
Pengembangan Aplikasi Cerdas Untuk Pendukung Keputusan Pemilihan Saham Potensial Bagi Investor Pemula Veri Ilhadi; Ilham Sahputra; Sujacka Retno; Siti Fatimatun Zahro; Irvan Na’syakban
Jurnal Informatika dan Teknologi Komputer (J-ICOM) Vol 6 No 2 (2025): Jurnal Informatika dan Teknologi Komputer ( J-ICOM)
Publisher : E-Jurnal Universitas Samudra

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55377/j-icom.v6i2.13214

Abstract

This study develops an intelligent application to support decision-making in selecting potential stocks for novice investors. Stock selection is often a challenge for beginner investors due to limited experience, analytical skills, and understanding of a company's fundamental indicators. The developed Decision Support System (DSS) integrates two multi-criteria analysis methods: AHP (Analytic Hierarchy Process) and VIKOR (VIšekriterijumsko KOmpromisno Rangiranje). AHP is employed to systematically determine the criteria weights based on user preferences, addressing VIKOR’s limitation in subjective weight assignment. VIKOR is then used to rank stocks by identifying the best compromise solution. The application is user-friendly and utilizes eight fundamental indicators: PER, PBV, ROA, ROE, EPS, BVPS, DR, and DY. Functional testing using the black-box testing method showed that all application features work properly. Recommendation validation also confirmed that the application provides accurate suggestions, consistent with manual analysis using the AHP-VIKOR model.

Page 11 of 11 | Total Record : 105