cover
Contact Name
Johan Reimon Batmetan
Contact Email
admin@ijite.jredu.id
Phone
+6282292373989
Journal Mail Official
admin@ijite.jredu.id
Editorial Address
Lingkungan IX Lansot Tomohon Selatan
Location
Unknown,
Unknown
INDONESIA
International Journal of Information Techonology and Education (IJITE)
Published by JR Education
ISSN : -     EISSN : 28098463     DOI : -
Core Subject : Science, Education,
Focus And Scope The International Journal of Information Technology and Education (IJITE) provides a distinctive perspective on the theory and best practices of information technology and education for a global audience. We encourage first-rate articles that provide a critical view on information technology and education– its effects, development, implementation, strategy, management, and policy. The scope of IJITE is following, but not limited to IT Governance Enterprise Architecture IT Service Management IT Project Management IT Audit User Experience Design IT Security System Analysis and Design Data and Information Management Multimedia System Augmented Reality and Virtual Reality Accelerators and 3D System Integration Distance Learning e-Learning m-Learning Games in Education Learning Media on Information Technology
Articles 226 Documents
Measurement of Usability and Adoption Rate in Academic Information Systems Jufrike Kamu, Charly Himpong, Ralph Pascoal
International Journal of Information Technology and Education Vol. 1 No. 1 (2021): December 2021
Publisher : JR Education

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1180.572 KB)

Abstract

E-learning is widely used as a learning medium that utilizes computer technology, computer networks or the Internet. Indonesia is the 8th country for e-learning users based on the total e-learning market each year, which is 25%. Student. The purpose of this research is to make the system more effective and efficient so that many students find it easy to collect data and re-register at SIA UNIMA, provide solutions to make SIA into an integrated system and an appropriate design in the UNIMA Campus Academic Information System. The method used to determine the level of acceptance of the Academic information system used at UNIMA can be analyzed using the TAM model. The results of this study indicate that the majority of students have been able to use e-learning well and will continue to use it in the future. The results of this study recommend that the learning process is better using e-learning so that the learning process becomes more effective.
Cloud Computing-Based Electric Payment System Application Design Gledis S. R Mamuaya, Litania M. Walangitan, Sutari N. Sumoked
International Journal of Information Technology and Education Vol. 1 No. 1 (2021): December 2021
Publisher : JR Education

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1355.891 KB)

Abstract

Cloud Computing technology is a new paradigm in the delivery of computing services. Cloud Computing has many advantages compared to conventional systems. This article discusses cloud computing architecture in general and some examples of the implementation of cloud computing services and their benefits in electricity payments. The purpose of this study is to design a cloud computing-based electricity payment system. The method used in this research is the design thinking method. The results of this study indicate that the resulting design is good enough to be applied to a cloud computing-based electricity payment system
Usability Testing on Desktop-based Operating Systems with University Users Ronaldo Muyu, Christy Poluakan, Undap E.B Yeremia
International Journal of Information Technology and Education Vol. 1 No. 1 (2021): December 2021
Publisher : JR Education

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1052.901 KB)

Abstract

The operating system is the most important computer system software. Currently, there are several operating systems that are so popular, including Windows and MacOS. Usability measurements were made between the Windows and MacOS operating systems. This study aims to measure the comparison of usage between Windows and Mac operating systems in lectures at Manado State University. In this study using a questionnaire with 13 questions asked and 25 respondents received, then analyzed the data using a Guttman measuring scale. The results show that the Windows operating system is more widely used with a much higher percentage than MacOS. The results of this study also prefer the Windows operating system with 84.61% while MacOS with 11.38%. Because from the point of view of popularity among Manado University students, many use Windows because it is considered easier and the applications provided for free are different from the prepaid MacOS.
Information Security Analysis Using ITIL Framework in Domain Operation Services Anastasya Putri Maramis, Clara Kristianti Rondonuwu, Steva Ngantung
International Journal of Information Technology and Education Vol. 1 No. 1 (2021): December 2021
Publisher : JR Education

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1751.492 KB)

Abstract

Information is one of the important assets for related companies/agencies. Information Security is the protection of information from various kinds of threats that can damage, disrupt, and reduce the performance of a company/related agency. Information security at SMK Negeri 1 Kakas currently has to be very carefully considered because if information can be accessed by irresponsible people, the accuracy of the information will be doubted and will even cause other problems. The purpose of this study is to measure or analyze how large and safe the level of information security in the State Vocational High School 1 Kakas is. The method used in this research is the Information Technology Infrastructure Library version 3 (ITIL V3) method. ITIL is a set consisting of Service Design, Service Transition, Service Operation. In this case the author focuses on Service operation. The results of this study indicate that the level of information security is good, privacy can be maintained, risk management is not good, and there is good trust in all parties in SMK Negeri 1 Kakas.
Comparative Study of Antivirus Adoption Rates on Smartphone-Based Operating Systems Christinne M. T. P. Subagyo, Mersy. E. L. Sumangkut, Yunitha R. Sumarandak
International Journal of Information Technology and Education Vol. 1 No. 1 (2021): December 2021
Publisher : JR Education

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1339.876 KB)

Abstract

Anti-Virus development is growing rapidly. Some are paid and some are free. With the increasing number of Anti-Virus applications, smartphone users are faced with several choices of Anti-Virus applications. Not all smartphone users know how to work and the advantages and disadvantages of each Anti-Virus. The purpose of this study is to determine the advantages and disadvantages of 360 Security and CM Security. The benefit of this research is that it makes it easier for smartphone users to choose the right Anti-Virus application on their respective smartphones. This research will use interview, observation, analysis and design methods. The results of this study are data that can be used by smartphone users as a reference and comparison of 360 Security and CM Security.
Understanding Usability Test of Operating Systems in University: Evidence from Indonesia Muyu, Ronaldo; Poluakan, Christy; Yeremia, Undap E.B
International Journal of Information Technology and Education Vol. 1 No. 2 (2022): March 2022
Publisher : JR Education

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (134.18 KB) | DOI: 10.62711/ijite.v1i2.29

Abstract

The operating system is the most important computer system software. Currently, there are several operating systems that are so popular, including Windows and macOS. Usability measurements were made between the Windows and macOS operating systems. This study aims to measure the comparison of usage between Windows and Mac operating systems in lectures at the University. This study used a questionnaire with 13 questions asked and 250 respondents received, then analyzed the data using a Guttman measuring scale. The results show that the Windows operating system is more widely used with a much higher percentage than MacOS. The results of this study also prefer the Windows operating system with 84.61% while MacOS with 11.38%. Because starting in terms of popularity among university students, many use Windows because it is considered easier and the applications provided for free are different from prepaid MacOS
Understanding Cyber Crime Behavior on E-Commerce Application Users Batmetan, Johan Reimon; Watung, Hensy; Nayoan, Leyri; Untu, Avandi E.
International Journal of Information Technology and Education Vol. 1 No. 2 (2022): March 2022
Publisher : JR Education

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (106.18 KB) | DOI: 10.62711/ijite.v1i2.30

Abstract

E-Commerce technology is a business mechanism that works electronically by focusing on online business transactions and has the opportunity to build more human and personalized relationships with customers without depending on space and time. The purpose of this study was to determine to what extent, the influence of Cyber ​​Crime behavior of users of e-commerce applications affects the level of trust of the users of E-Commerce transaction services. The data used in this study are primary data. The data analysis method used is quantified using a Likert scale. The population in this study was 30 respondents as the research sample, using the Google form. The results, based on the analysis showed that e-commerce users bear a lot of risks is added to the level of trust of E-Commerce users, making Cybercrime behavior is still very difficult to anticipate by users of E-Commerce transaction services, has a negative and significant effect. The results of this study conclude that the behavior of users in e-commerce is still low with the level of trust is not good and they are still worried about the risks of cybercrime they face
Usability Evaluation of The Android Operating System Using Use Questionnaire Kilis, Billy M.H.; Mamonto, Julita; Legesan, Hizkia; Sagai, Zachary
International Journal of Information Technology and Education Vol. 1 No. 2 (2022): March 2022
Publisher : JR Education

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (108.738 KB) | DOI: 10.62711/ijite.v1i2.34

Abstract

Usability aspects are used as a reference in measuring the level of usability of the Android operating system. Usability is important to use as an instrument to ensure an application can be useful according to user needs. This study aims to evaluate the usability of the Android operating system for users at universities. This study uses a use questionnaire that has aspects of effectiveness, efficiency, and satisfaction. Researchers used questionnaires with respondents at universities using the Android operating system for smartphone devices with 13 attributes of the questions asked. After obtaining the data, further analysis was carried out using the Likert scale method to obtain the percentage of usability values ​​on the Android operating system at the University. Usability measurement results show that all attributes have usability by the user, the average value is above 3, so it can be said that the android operating system used by the user already has a good usability aspect value. This study concludes that the android operating system with users at universities has a good adoption rate caused by easier use, ease to learn, and a good level of user satisfaction.
Developing Virtual Web as Learning Media for Web Programming in SMK Sorongan, Dedi; Mose, Yuliana; Berikang, Reonaldy A
International Journal of Information Technology and Education Vol. 1 No. 2 (2022): March 2022
Publisher : JR Education

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (535.304 KB) | DOI: 10.62711/ijite.v1i2.35

Abstract

The purposes of this research are (1) to generate virtual web as learning media subject specifically for web programming, (2) to find out the appropriateness of the product developed as a learning medium, and (3) to determine the effectiveness of the use of the e-learning for web programming subject. This research was through three stages: (1) the initial product development refers to the steps developed by Ivers& Barron namely Decide, Design, Develop, and Evaluate, (2) the testing ofthe product refers to the design of the test developed by Alessi&Trollip namely alpha testing, beta testing, and validating, and (3) the test ofthe effectiveness of using virtual web for the subjects of web programming by comparing the gain of pretest / posttest experiment group at XA TKJ class that uses virtual web, and the control class XB TKJ who do not use virtual web. Technical data analysis to the eksperiment product (test) using descriptive statistical in the form of statement very good, good, less good, less, much less which is converted in to quantitatif data at scale 5. The average result assesment categorizing ussing the assesment criteria by Widoyoko.The result of this research is a e-learning which is used speciallyfor web programming subject.The results of alpha testing phase, beta testing and summative test show that the e-learning is in the category of "very good" that deserves to be used. Effectiveness test results through a pretest / posttes show an increase in the mean score of the experiment class of 37.50 which is greater than the control class that the increase only amounted to 30.16, it can be concluded that there is an increase of learning outcomes for using e-learning
Understanding of Information Security Behavior of Social Media Users Among Millennial Generation Djamen, Arje Cerullo; Lumapow, Harol R.; Lengkong , Jeffry Sony Junus; Rotty, Viktory Nicodemus Joufree
International Journal of Information Technology and Education Vol. 1 No. 2 (2022): March 2022
Publisher : JR Education

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62711/ijite.v1i2.38

Abstract

The increasing use of social networks in Indonesia is caused by the increasingly complete internet access facilities carried out by producers of communication service providers. This research aims to explain the information security behavior of the millennial generation of social media users. The population used in this research is the millennial generation. The sample used in this research is the millennial generation. Analysis using the Likert scale method. The results of this study show that social media has a significant and positive influence on social media security among the millennial generation. The results of this study also show that the behavior of the millennial generation in the context of information security is aware that information security is very important to pay attention to. In addition, this finding also shows that the millennial generation realizes that social media plays an important role in the communication and interactions that they undergo and realizes that there is a risk in the information contained in social media. This study suggests the millennial generation to keeps paying attention to information security when using social media.

Page 2 of 23 | Total Record : 226