cover
Contact Name
Johan Reimon Batmetan
Contact Email
admin@ijite.jredu.id
Phone
+6282292373989
Journal Mail Official
admin@ijite.jredu.id
Editorial Address
Lingkungan IX Lansot Tomohon Selatan
Location
Unknown,
Unknown
INDONESIA
International Journal of Information Techonology and Education (IJITE)
Published by JR Education
ISSN : -     EISSN : 28098463     DOI : -
Core Subject : Science, Education,
Focus And Scope The International Journal of Information Technology and Education (IJITE) provides a distinctive perspective on the theory and best practices of information technology and education for a global audience. We encourage first-rate articles that provide a critical view on information technology and education– its effects, development, implementation, strategy, management, and policy. The scope of IJITE is following, but not limited to IT Governance Enterprise Architecture IT Service Management IT Project Management IT Audit User Experience Design IT Security System Analysis and Design Data and Information Management Multimedia System Augmented Reality and Virtual Reality Accelerators and 3D System Integration Distance Learning e-Learning m-Learning Games in Education Learning Media on Information Technology
Articles 226 Documents
The Impact of e-Health for Cancer Patients Batmetan, John Reimon; Yusuf, Yusnia; Idjie, Elyis Y. C; Ruma, Satin La
International Journal of Information Technology and Education Vol. 1 No. 2 (2022): March 2022
Publisher : JR Education

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62711/ijite.v1i2.39

Abstract

E-Health or Electronic Health is the use of information and communication technology including electronics, telecommunications, computers and informatics to process various types of medical information, to carry out clinical services (diagnose or therapy), administration and education. In E-health the distance factor is not an issue because all activities are carried out through a data connection and in real time. This study discusses the community's analysis of the use of e-Health. This study aims to analyze the impact and influence of convenience and benefit factors on cancer patients using the Technology Acceptance Model (TAM) method. The results of this study indicate that users show positive benefits when using e-health applications. The results of this study also show that e-health has these positive benefits for respondents so they want to continue to use e-health services. Users also get the ease of use which also affects the interest (behavioral intention) in using the E-Health application because the ease of use increases the effectiveness of users
Wireless Local Area Network Security through Protocol Wireless Protected Access Kumajas, Sondy; Sasukul, Julius; Siwi, Alexander; Saruan, Hellena
International Journal of Information Technology and Education Vol. 1 No. 2 (2022): March 2022
Publisher : JR Education

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62711/ijite.v1i2.41

Abstract

This study discusses the security analysis of Wireless Local Area Network (Wireless LAN) in the Community against external attacks on the Wireless Protected Access (WPA), Web Proxy, and Virtual Private Network (VPN) protocols, used to attack LAN. Three types of software are used as attackers, namely, Network Stumbler, Aircrack and Wireshark attackers. The software is used on the laptop at a distance of 5m to 25m from the Wireless LAN access point. From the experimental results, it can be seen that the fastest response time by the WPA Protocol was given by the Network Stumbler attacker, followed by Aircrack and Wireshark.
CCTV Architectural Design for Theft Detection using Intruder Detection System Kembuan, Eddy D.R.E; Batmetan, Johan Reimon; Daud, Metsi; Tarandung, Iszach R P
International Journal of Information Technology and Education Vol. 1 No. 2 (2022): March 2022
Publisher : JR Education

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62711/ijite.v1i2.42

Abstract

The human need for a monitoring system for certain places is increasing. In this regard, the computer laboratory belonging to the school is not free from security intruders. Security bully or in English is usually called "intruder". Intruders can be thieves, vandals, or security intruders. In this paper, we will examine the design of the school computer laboratory CCTV architecture to examine the results of the implementation of an intruder detection system design that uses a CCTV architecture with SMK N 1 Tondano as its location and observes places and areas that are allowed. The results of this study are the formulation of the effect on performance in detecting intruders at SMK N 1 Tondano which we got through direct observation and interviews and with theoretical support from books, journals, internet and other sources.
RFID Based Fuel Payment System Design Komansilan, Trudi; Chirtoffel, Michaell; Duke , Abdul Fajar; Omega, Marcelliano
International Journal of Information Technology and Education Vol. 1 No. 2 (2022): March 2022
Publisher : JR Education

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62711/ijite.v1i2.44

Abstract

In the current era, technological developments are so rapid and there are not a few technologies that offer a variety of advantages, both in terms of the functionality of the technology or its effectiveness, which of course all aim to make it easier for users, namely humans themselves. One example is RFID. This system has been widely applied both to identify an item, as a security system, and a toll payment system as well as arriving at an educational institution. The purpose of this research is to design a BBM payment system at gas stations based on RFID. Of course this aims to overcome some of the problems that occur and develop in the location. In this system, a card will be used as an RFID tag which will later be used as a payment medium that will be detected on a device that already attached to the refueling machine. This research uses the sprint design method which is the development of the design thinking method. That way by using the sprint design method in which there are stages of approach to the user, it is hoped that they can find the main problems faced and be able to design a solution that is able to overcome the existing problems.
Mokobang SDGP Website Analysis and Design Moningkey,, Efraim R S; Triyono, Mochamad Bruri; Priyanto
International Journal of Information Technology and Education Vol. 1 No. 2 (2022): March 2022
Publisher : JR Education

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62711/ijite.v1i2.45

Abstract

Valid and fast information is needed in everyday life. Information will be an important element in the development of society today and in the future, but the high need for information is sometimes not balanced with the presentation of adequate information. Often with the development of current information systems, SDGP Mokobang requires an identifier in the digital world that can also be used for promotion. In the development of SDGP Mokobang has never built a website that becomes a school information portal. By using the prototype method this research can be done quickly and according to the wishes of the user.
Design e-Office Application for Population based on Cloud Computing Kembuan, Eddy D.R.E; Batmetan, Johan Reimon
International Journal of Information Technology and Education Vol. 1 No. 2 (2022): March 2022
Publisher : JR Education

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62711/ijite.v1i2.46

Abstract

Information and communication technology in the field of population e-office is very useful in supporting the process of data management, information, facts, distribution, and knowledge. The purpose of this research is to build a population e-office application that can produce time, cost and energy effectiveness. This research was developed using an open source-based online administration service administration system method with a cloud computing approach, so that it can be used to collect community data, business permits, recommendations, and administrative handling related to the community in the village. The results of this study indicate that in the existing village administration service system in general, the community and village officials deal with data through applications available for each of these sections separately. The exchange of data between departments, if needed, is still based on paper notes that are delivered from one section to another, it is hoped that this will not happen again with this research. A structured public service administration system architecture can be managed by this system and allows data to be shared in the system.
A Survey Student Behaviors Computer Security: Evidence from University Palilingan, Verry Ronny; Rorong, Reski M; Yeremia, Undap E.B; Tambaani, Gerry T
International Journal of Information Technology and Education Vol. 1 No. 2 (2022): March 2022
Publisher : JR Education

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62711/ijite.v1i2.47

Abstract

In lectures, of course, students definitely need a computer, whether it's to make assignments or to play games. Therefore, in using computers, students must maintain computer security from threats that can damage a system on a computer. The purpose of the study was to determine student behavior in maintaining computer security from existing threats. The results of the study were taken from a sample of students in the PTIK Department at UNIMA. The results of this study indicate that 91.3% of respondents stated that their computer system had an error and 8.7% of respondents stated that their computer system had never had an error.
Evaluation of Incident Management in University using IT Infrastructure Library Framework Batmetan, Johan Reimon; Mamonto, Julita Veronica; Muyu, Ronaldo
International Journal of Information Technology and Education Vol. 1 No. 2 (2022): March 2022
Publisher : JR Education

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62711/ijite.v1i2.48

Abstract

Supporting the implementation of optimal services is a major need for organizations today. Guaranteed service management and good security is one of the benchmarks. This study aims to measure the level of incident management security at the Manado State University Computer Center. Incident Management is an intrinsic IT process that is visible to both customers and businesses. An organization proactively implements a sound IT service management framework such as ITIL v3 so as to maintain the desired Quality of Service (QoS). Data analysis uses Likert scale calculations and refers to aspects of maturity.
Student Information Security Awareness on the Use of ATM Machines Komansilan, Trudi; Kumajas, Sondy C.; Pinatik, Triska
International Journal of Information Technology and Education Vol. 1 No. 2 (2022): March 2022
Publisher : JR Education

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62711/ijite.v1i2.49

Abstract

This study examines literature studies on security systems at automated teller machines which include PIN security and forms of attacks on ATM security. The method used in ATM security is the use of a PIN to be able to access and make transactions through ATM machines. PIN security is carried out using a cryptographic process (encryption and decryption) using the Triple DES standard (data encryption standard). The use of ATMs is inseparable from the need to maintain a security system at ATMs. This document describes the use of DES and Triple DES cryptographic methods. Currently there are various threats that attack security in the use of ATMs such as skimming, phishing.
IT Infrastructure Library Framework Approach to the Measurement of e-Government Maturity Batmetan, Johan Reimon; Nur, Muhammad; Turang, Omega S.M.; Sumampouw, Merry M.
International Journal of Information Technology and Education Vol. 1 No. 2 (2022): March 2022
Publisher : JR Education

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62711/ijite.v1i2.51

Abstract

This research was conducted to improve E-Government services on the Manado smart city application to the smart city and determine the level of readiness and feasibility of the Manado smart city application using the ITIL method in the service design domain and transmission service using the Information Technology Infrastructure Library (ITIL) framework. The purpose of this study is to measure the level of marturity of the smart city and help the Manado city government in knowing the maturity level of Manado City towards a smart city. The research method used is the method of measuring the level of marturity using the ITIL framework. The results of this study show that this smart city application can be used at any time, especially at the Manado command center which can monitor the activities of each vehicle and various problems that cause congestion and can be seen from human resources for the usefulness of this application, there are still many who do not know and feel results, impact and benefits of this smart application. Many residents or residents of Manado do not use this smart city application technology.

Page 3 of 23 | Total Record : 226