cover
Contact Name
Mesran
Contact Email
mesran.skom.mkom@gmail.com
Phone
+6282370070808
Journal Mail Official
mesran.skom.mkom@gmail.com
Editorial Address
Jalan sisingamangaraja No 338 Medan, Indonesia
Location
Kota medan,
Sumatera utara
INDONESIA
KLIK: Kajian Ilmiah Informatika dan Komputer
ISSN : -     EISSN : 27233898     DOI : -
Core Subject : Science,
Topik utama yang diterbitkan mencakup: 1. Teknik Informatika 2. Sistem Informasi 3. Sistem Pendukung Keputusan 4. Sistem Pakar 5. Kecerdasan Buatan 6. Manajemen Informasi 7. Data Mining 8. Big Data 9. Jaringan Komputer 10. Dan lain-lain (topik lainnya yang berhubungan dengan Teknologi Informati dan komputer)
Articles 561 Documents
The Implementation of Personal Data Protection Law on Information System Security Risks Using OCTAVE-S Gita Nurul Aini; Muhammad Jazman; Angraini; Mona Fronita
KLIK: Kajian Ilmiah Informatika dan Komputer Vol. 3 No. 6 (2023): Juni 2023
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/klik.v3i6.848

Abstract

This research focuses on the risk assessment and mitigation of the Hitmi system, an information system used by PT Perkebunan Nusantara (PTPN V) for calculating employee premiums. The study aims to identify and evaluate the risks associated with the system's information technology assets and provide risk mitigation recommendations in accordance with information security practices and the Personal Data Protection Act. The research methodology includes several stages: Planning, Data Collection, Analysis and Data Processing, and Final Phase. In the Planning Stage, the problem is identified through observations and interviews, and the research purpose is defined. The Data Collection Phase involves literature studies, observations, interviews, and the use of OCTAVE-S sheets to collect relevant data. The Analysis and Data Processing stage focuses on analyzing the collected data and processing it for conclusions and problem resolution. The OCTAVE-S framework is used to identify assets, vulnerabilities, and develop security strategies and plans. The results and discussion section presents the mapping of the OCTAVE-S analysis with the Personal Data Protection Act, identifying organizational information, and assessing organizational security practices. The risk impact assessment criteria are used to evaluate the risks, and the assets of the organization are identified. The assessment of security practices reveals areas of improvement and areas where good security practices are already implemented. Based on the findings, recommendations for risk mitigation are provided. These recommendations include security awareness and training programs for employees, improved resource allocation for security activities, regular updates to security policies, and the implementation of access control measures, incident management procedures, and encryption techniques.This research contributes to enhancing information security practices and reducing risks associated with the Hitmi system at PTPN V. The findings can guide the organization in implementing effective security controls, complying with the Personal Data Protection Act, and ensuring the confidentiality, integrity, and availability of sensitive data.
Penerapan Case Based Reasoning Dalam Memprediksi Masa Tunggu Kerja Calon Alumni Abdul Rahman; Pujianto; Joko Kuswanto
KLIK: Kajian Ilmiah Informatika dan Komputer Vol. 3 No. 6 (2023): Juni 2023
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/klik.v3i6.849

Abstract

Alumni are assets for an educational institution, can illustrate how the vision and mission of the alumni home institution are achieved. Educational institutions need to track their graduates, this is done as a source of information and to find out the absorption, process, and position of graduates in the world of work and assist government programs in mapping the needs of the world of work with competencies obtained from universities. In addition, to increase the accreditation of a university, college or department. So important is alumni data in the world of work, there is a need for a system to predict the waiting points for alumni to work. The purpose of this study is  to apply the Case Based Reasoning in predicting the waiting period of prospective alumni at Baturaja University using the K-Neareast Neigbor algorithm. Reasoning is based on 14 attributes with 10 rule bases. Based on the representation of the new case, the similarity value of the old case with the new case is 0.64
Implementasi Decision Tree C4.5 dalam Memilih Perguruan Tinggi Pendamping Program SMK Pusat Keunggulan Muhammad Raidinoor Pasha; Rahmat Rian Hidayat; Mohamad Ilyas Abas
KLIK: Kajian Ilmiah Informatika dan Komputer Vol. 3 No. 6 (2023): Juni 2023
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/klik.v3i6.852

Abstract

The Ministry of Education, Culture, Research and Technology, the Indonesian government issued an independent learning policy episode eight, namely vocational high schools (VHS) which are centers of excellence (VHS-COE). This policy is the government's commitment to improving the quality of Indonesia's human resources. One strategy for implementing the program is to present tertiary institutions as assistants to SMKs. An appropriate selection process is needed to find relevant tertiary institutions to become Assistant Vocational High Schools. However, the current selection process still uses a platform with limited access (Google Forms). These deficiencies can lead to bias so that one cannot determine which tertiary institution is appropriate to be appointed as a companion. Therefore it is necessary to build an information system using a decision analysis approach (decision tree C 4.5) to be used as a reference in determining the eligibility of universities participating in the program. The research method uses the Software Development Life Cycle (SDLC) which is modeled using sequence diagrams and algorithms based on criteria set by the Ministry of Education, Culture, Research and Technology. The results of this study are that the management of the SMK Directorate has a more comprehensive decision-making reference for assessing which tertiary institutions are appropriate in accompanying SMKs as centers of excellence because the output results from the program have a high degree of accuracy
Analysis of Smart Home Security System Design Based on Facial Recognition With Application of Deep Learning Rafly Athalla; Satria Mandala
KLIK: Kajian Ilmiah Informatika dan Komputer Vol. 3 No. 6 (2023): Juni 2023
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/klik.v3i6.855

Abstract

Currently, there is a rising interest in utilizing the Internet of Things (IoT) for Smart home systems. One crucial aspect of Smart home systems is their security capabilities, specifically the ability to conveniently lock and unlock doors or gates. The primary issue in smart home security systems lies in their low accuracy and image processing delays, which were observed to be approximately 65% - 70% in experiments conducted using the KNN and Decision Tree methods. This research proposes a Deep Learning approach that achieves an accuracy of over 80%. The methodology employed in this study consists of four key steps: 1. Conducting a literature review on Smart Home Security, 2. Developing an RNN model for face detection, 3. Creating a prototype for face detection in a smart home setting, and 4. Evaluating the developed prototype for smart homes. The experimental results demonstrate that the proposed prototype achieves an accuracy of 94.3%. Furthermore, the recall rate is 94.3%, the f1 score is 91.66%, and the precision is 94.8%.
Perancangan Arsitektur Sistem Informasi Menggunakan Togaf ADM Siska Nurul Marwiyah; Chandy Ophelia S; Suyanti
KLIK: Kajian Ilmiah Informatika dan Komputer Vol. 3 No. 6 (2023): Juni 2023
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/klik.v3i6.861

Abstract

SMA Negeri 4 Sarolangun has not implemented information systems in every field such as academics, administration, libraries and infrastructure. The activities carried out in each of these fields are assisted by computers and there is no integrated information system between one field and another. So that accessing data together in each field cannot be done, besides that the data processing system currently used causes the required data and information to be not timely due to the difficulty of accessing data and information. For this reason, it is necessary to design an enterprise architecture using TOGAF ADM. TOGAF ADM is a method that can be used to design enterprise architectures. Each stage in TOGAF ADM can be carried out correctly if the business processes that exist within the organization really must be understood and able to be identified completely and correctly. This enterprise architecture modeling provides guidance in creating blueprints for the development of information systems for data, applications, business, and technology.
Sentiment Analysis of Forest Fires on Social Media Networks Twitter Using the Long Short Term Memory (LSTM) Method Aziz Alfauzi Aziz; Warih Maharani
KLIK: Kajian Ilmiah Informatika dan Komputer Vol. 3 No. 6 (2023): Juni 2023
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/klik.v3i6.866

Abstract

The topic of forest fires is of significant interest on social media platforms. In this case, Twitter has been used by 11.8 million users as a means to spread information about forest fires. Twitter, a microblogging service launched on July 13, 2006, allows users to share information for free to themselves and others. Public sentiment related to forest fires can be analyzed through opinions and discussions on Twitter social media. This research aims to analyze the Sentiment of Forest Fires on Twitter Social Networks using the Long Short Term Memory (LSTM) Method. The research data was obtained by crawling the Twitter API using the keyword "forest fire." After crawling, 7,000 tweet texts were collected and labeled as "Negative" and "Positive." Through the preprocessing stage, using a 7,000 dataset, the TF-IDF accuracy of the developed LSTM model reached 68.14%. In addition, the GloVe expansion feature was performed with the Tweet corpus, which resulted in an increase in accuracy of 11.77% to 80.13% in the LSTM model. Meanwhile, the FastText expansion feature with the Common Crawl corpus also increased the accuracy by 11.99% to 80.59% on the LSTM model.
Analisa Manajemen Risiko Sistem Informasi Perpustakaan Menggunakan Metode Failure Mode Effect and Analysis (FMEA) Maisarah Assa'diyah; Tengku Khairil Ahsyar; M Afdal
KLIK: Kajian Ilmiah Informatika dan Komputer Vol. 3 No. 6 (2023): Juni 2023
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/klik.v3i6.867

Abstract

Public libraries that have implemented information technology in their business processes have a great responsibility in service and management because the visiting users are the general public. In implementing information technology, maintaining the security of user data, members, resources, and library information is very important. Digital libraries must have consideration of the risks and threats that may occur. The risks and threats that can occur are as follows server damage, hardware damage, staff negligence, loss, and natural disasters. The purpose of this research is to analyze risk management by identifying risks and measuring the level of risk from one of the Riau Province Library and Archives Services which already uses a library automation system, namely INLISLite. The method used to identify and assess risk is the Failure Mode Effect and Analysis (FMEA) method. Risk assessment is based on calculating the value of the Risk Priority Number (RPN) resulting from multiplying the level parameters severity, occurrence, and detection. Risk assessment is carried out based on the category list of asset components that support the running of the system, namely, hardware, software, data, people, and network. From the calculations that have been carried out, there are six categories of RPN levels, namely 1 score at a very high level, 3 scores at a high level, 2 scores at a medium level, 16 scores at a low level, and 1 score at a very low level. From the results of the RPN value that needs to be given recommendations for action, namely the RPN value which is at very high and high levels
Perancangan Ulang UI-UX Desain Website BKKBN Provinsi Sumatera Selatan dengan Metode Design Thinking Dea Salsa Bila; Dwi Rosa Indah
KLIK: Kajian Ilmiah Informatika dan Komputer Vol. 3 No. 6 (2023): Juni 2023
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/klik.v3i6.870

Abstract

Every year, the BKKBN website for South Sumatra Province experiences development from the center without conducting a direct survey of the website's feasibility with its users. At present, the South Sumatra Provincial BKKBN employees feel that the South Sumatra Provincial BKKBN website has an unattractive appearance and is not user-friendly. The appearance of the user interface and the user experience are things that must be considered when building a website. This display will affect the user's decision to reuse the website or not. This study designed the UI/UX design for the BKKBN website for South Sumatra Province using the design thinking method. Prior to designing, a website evaluation test will be carried out using the system usability scale (SUS) method to measure the usability value of the website. The results of the average test value using the system usability scale (SUS) can be said to be good and accepted by users if the test results are  68. This study found that the results of usability evaluation tests before design improvements were carried out had an average value of SUS 65, and after improvements were made, UI/UX design using the design thinking method resulted in an average SUS score of 81.5
Implementasi Metode Design Thinking Dalam Aplikasi Giwang Sumsel Iwan Mandala Putra; Dwi Rosa Indah
KLIK: Kajian Ilmiah Informatika dan Komputer Vol. 3 No. 6 (2023): Juni 2023
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/klik.v3i6.872

Abstract

Giwang Sumsel is an application from the Culture and Tourism Office of South Sumatra Province that aims to provide information, facilitate tourism, and help tourists explore South Sumatra Province. The Giwang Sumsel application has many complaints from users, ranging from display problems to information conveyed that does not meet user desires. Usability evaluation testing needs to be done to determine the usefulness of the application for users. The research conducted usability evaluation testing using the system usability scale (SUS) method and then redesigned based on user needs using the design thinking method. Usability evaluation testing using the system usability scale (SUS) method has an assessment score of 1–5 with an average value of 68 to be categorized as a good design. The design thinking method was used during the process of redesigning the UI/UX design of the Giwang Sumsel application because at each stage it always involves users, so the hope is that the results will be the same according to the needs of users. At this stage, testing of the improved design will be carried out using the single ease question (SEQ) method, which has an assessment score of 1–7, and if the average value obtained is 55, the design can be categorized as a good design. The test results prove that the usability evaluation of the design before improvement with the design thinking method gets an average SUS value of 41.6, and the design results after improvement with the design thinking method get an average value of 69.9 with the single ease question (SEQ) method
Evaluasi Usability Pada Sistem Informasi Beasiswa Menggunakan Metode Heuristic Evaluation dan Think Aloud Riska Ayuni; Tengku Khairil Ahsyar; Muhammad Luthfi Hamzah
KLIK: Kajian Ilmiah Informatika dan Komputer Vol. 3 No. 6 (2023): Juni 2023
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/klik.v3i6.873

Abstract

The scholarship information system needs to cover several aspects so that it can always maintain the superior quality of use and existing information, one of which is the usability aspect. Based on initial observations that have been made on the information system, there is user dissatisfaction such as sometimes errors when inputting data by staff, inconsistencies in some displays, no menu for forgotten password, no contact information, no help menu, parts of the site interface are difficult to understand. . The problem is related to usability. Usability evaluation is carried out to evaluate the system based on the level of effectiveness, efficiency and satisfaction. The purpose of this research was to evaluate the ease of use of the UIN Suska Riau Scholarship information system. The purpose of this evaluation is to see how easy the system is to use and to make recommendations about possible improvements. Data collection through observation, interviews, and questionnaires. in the heuristic evaluation method the data analysis method used is usability testing, and the data processing tool used is Statistical Product Solution (SPSS) Statistics 23 software from IMB Software. and 8 to 10 respondents for Think Aloud. For the evaluation of this study, two approaches were used, Heuristic Evaluation and Think Aloud. Heuristic Evaluation is used to evaluate the interface using a heuristic questionnaire, while Think Aloud is used to evaluate the use of the information system based on what the user says. At the Think Aloud data collection stage, each participant will carry out a task scenario to provide criticism or reveal the problems they are experiencing. The results of the data analysis succeeded in identifying identified gaps in the information system assessed in this study and providing recommendations for improvement. The results of the Heuristic Evaluation Analysis show that this system obtains a percentage score of 75%, which indicates a sufficient level of goodness for its users. However, there is a total of 25% where deficiencies are found in the system, it shows that this system is not good for its users. Then, through Think Aloud analysis, found up to 23 suggestions for improvement for the system being evaluated. Future research can further evaluate the implementation of these improvement recommendations