cover
Contact Name
Johan Reimon Batmetan
Contact Email
admin@ijite.jredu.id
Phone
+6282292373989
Journal Mail Official
admin@ijite.jredu.id
Editorial Address
Lingkungan IX Lansot Tomohon Selatan
Location
Unknown,
Unknown
INDONESIA
International Journal of Information Techonology and Education (IJITE)
Published by JR Education
ISSN : -     EISSN : 28098463     DOI : -
Core Subject : Science, Education,
Focus And Scope The International Journal of Information Technology and Education (IJITE) provides a distinctive perspective on the theory and best practices of information technology and education for a global audience. We encourage first-rate articles that provide a critical view on information technology and education– its effects, development, implementation, strategy, management, and policy. The scope of IJITE is following, but not limited to IT Governance Enterprise Architecture IT Service Management IT Project Management IT Audit User Experience Design IT Security System Analysis and Design Data and Information Management Multimedia System Augmented Reality and Virtual Reality Accelerators and 3D System Integration Distance Learning e-Learning m-Learning Games in Education Learning Media on Information Technology
Articles 226 Documents
Cross-site Scripting Reflected as A Risk High-Level Attack on University Website Dina Demhi; Olivia E.S Liando; John Reimon Batmetan
International Journal of Information Technology and Education Vol. 1 No. 3 (2022): June 2022
Publisher : JR Education

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The era of digitalization is an era where information can be exchanged quickly and easily. This has contributed to improving the standard of human life for the better in all areas of life. The web is a technological innovation that changes the provision of information, services, and displays significantly. This allows for better interaction between service providers and their users. In general, universities use the website as a medium of information and media to support lecture activities and as campus promotions. However, many websites at universities do not yet have a strong level of security or protection, giving rise to opportunities for theft and manipulation of university data. XSS is an attack by inserting malicious code in the form of javascript through the input form that aims to steal cookies and then use these cookies to enter the web legally. The purpose of this study is to find out what risks will be posed by XSS to the website, especially the website used by Manado State University. This research method is carried out in 4 stages, namely software installation, vulnerability testing, presentation of the results of testing and solutions for website vulnerabilities.The results obtained through this study contained several vulnerabilities on Manado State University website which were obtained using OWASP tools. In addition to obtaining vulnerabilities on the website, solutions are also provided to overcome these vulnerabilities.
Internet Security Threats and Risks for Alpha Generation in Indonesia Natasya Misnawati Sikki; Olivia E.S Liando; John Reimon Batmetan
International Journal of Information Technology and Education Vol. 1 No. 3 (2022): June 2022
Publisher : JR Education

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The Internet can be a wonderful place for learning, shopping, playing games, and connecting with our friends. Unfortunately, there are also predators, identity thieves, and so on online, that might try us. To be safe online, it is important for us and our children to be aware of the dangers. The purpose of this research is to find out how dangerous and how big the influence of the internet is on minors. Here the researcher uses quantitative methods to formulate Internet strategies for minors. The results of this research can be formulated that the use of the internet for minors is very dangerous because there are many negative impacts of the internet that can make children lazy, minors can use the internet with the assistance of parents and make the internet a means of learning for children to grow and develop. With this, it can be said that the role of parents is very important for children when using the internet so that no dangerous things can be accessed by children when using the internet.
Cloud Security Adoption Factors in Educational Institutions Olivia E.S Liando; Marshel R. Kapahang; John Reimon Batmetan Batmetan
International Journal of Information Technology and Education Vol. 1 No. 3 (2022): June 2022
Publisher : JR Education

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

In recent years, cloud computing technology has emerged as one of the technologies that are currently hot or often used both in the world of work, online shopping (E-Commerce), and the world of education. Before we use any technology, we must first understand the security system that exists in that technology, including the security system in Cloud Computing Technology. In the world of education today, many schools and universities have implemented Cloud Computing Technology in learning systems and database storage. Currently, Cloud Computing provides 3 different services such as Saas, PaaS, and IaaS which can be used by organizations as private, public, and, Hybrid. Security is the main concern so that there is no data theft in the world of Education. This journal was created using the Literature Study by searching from several selected journals that already exist as knowledge, in order to better understand the Cloud Computing security system.
Boundary Value Analysis and Decision Table Testing Methods in Software Testing Enjelina Sianturi
International Journal of Information Technology and Education Vol. 1 No. 3 (2022): June 2022
Publisher : JR Education

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Product quality is very important in the software development industry. The quality of the resulting product is strongly influenced by software testing before a software is deployed to customers. If a software has passed the test, it will be able to minimized the occurrence of obstacles when the software is used or operated. There are many software testing methods that can be used, from the black type to box testing and types of white box testing. in this study, a method of the black box testing type is used, namely boundary value analysis and decision table testing. The sample form being tested is part of the software used for the management of pension funds for a pension fund management institution employee. The sample form being tested is the periodic pension benefit claim submission form. then the test is carried out using the boundary value method analysis and decision table testing. Based on the business process rules of entry and form validation, a test scenario and data are created to be used for testing. After going through the testing process, the results showed that there were still things that needed to be improved on the sample form.
Implementation of Cloud Computing Technology for Vocational Higher Schools Brandon Lee Judas
International Journal of Information Technology and Education Vol. 1 No. 3 (2022): June 2022
Publisher : JR Education

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The development of technology is so very fast, it requires every individual and institution to follow it. Such as the use of cloud computing whose use is currently very broad. In the world of education, the use of cloud computing is very useful for teachers and students in terms of learning in the classroom and outside the classroom. The Gafe application stored in the cloud provides a large selection of office applications, chat and others. This system will try to be implemented in SMK 1 Sorong City which is currently still using the manual system. This system allows teachers and students to communicate with each other and interact with each other
Design And Implementation Of Web-Based E-Learning At Smk Negeri 1 Tondano Liando, Olivie E. S; Muyu, Ronaldo; Mewengkang, Alfrina; Kembuan, Djubir R.E
International Journal of Information Technology and Education Vol. 1 No. 4 (2022): September 2022
Publisher : JR Education

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62711/ijite.v1i4.70

Abstract

In the midst of the current COVID-19 pandemic, the utilization of online learning support facilities has not been optimal because there is no e-learning application at SMK Negeri 1 Tondano. Based on the existing conditions, the learning process through e-learning technology with an internet connection allows learning to be carried out more easily. This study aims to design and implement web-based e-learning at SMK Negeri 1 Tondano. The research method used is Scrum which is one of the derivative development methods of Agile Development. The results of this study indicate that the existence of e-learning applications can make it easier for teachers to provide materials and assignments and students can easily access learning materials and do assignments/exams given by the teacher. Using the Scrum method can make it easier to create applications.
Digital Business Model for CREATIVE INDUSTRIES Palilingan, Verry Ronny; Batmetan, Johan Reimon
International Journal of Information Technology and Education Vol. 1 No. 4 (2022): September 2022
Publisher : JR Education

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62711/ijite.v1i4.72

Abstract

Digital business plays a significant role in industry 4.0. Many companies rely on information technology to connect customers, employees and run their management. Many digital startups are growing very fast in Indonesia but do not have a strong and good business model to maintain sustainability. This study aims to develop a way of analyzing a digital startup's business model so that it becomes a profitable startup. The method used in this study is a method of analyzing business models using a lean canvas. The results of this study show that lean canvas can produce a strong and sustainable business model for digital startup significantly. This study concluded that lean canvas is very good for building a business model on digital startup
Model Enterprise Architecture for Information Technology Services in Universities Batmetan, Johan Reimon
International Journal of Information Technology and Education Vol. 1 No. 4 (2022): September 2022
Publisher : JR Education

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62711/ijite.v1i4.73

Abstract

Enterprise Architecture Documents are very important in the development of Information Technology systems in an institution. The Enterprise Architecture contains a strategic plan for the development of ICT and the services that will be run by the system. The preparation of the IS/IT strategic plan at Universitas Negeri Manado is a step in aligning information systems and technology in accordance with the Universitas Negeri Manado business processes and strategies. The method used in this research is descriptive qualitative research using primary and secondary data and building an information technology enterprise architecture using the TOGAF framework model. Collecting data with interviews, documentation, questionnaires, and direct observation of the organization. The analysis used is the Value Chain, SWOT, PEST, Porter's Five Force, and Critical Success Factor (CSF) methods. The results of this study are the form or formulation of the Enterprise Architecture strategic plan of IS/IT in accordance with the Universitas Negeri Manado, in the form of data architecture, applications, and technology to support the business processes of Universitas Negeri Manado.
Legal Review of Cryptocurrency as A New Method in The Crime of Money Laundering Diana Darmayanti Putong
International Journal of Information Technology and Education Vol. 1 No. 4 (2022): September 2022
Publisher : JR Education

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62711/ijite.v1i4.74

Abstract

The continuation of the electronic media that is widely discussed today is virtual money, commonly known as cryptocurrency. Cryptocurrency can also be referred to as an unformed commercial object; actually in digital form which can be used in electronic transactions. This study aims to analyze the existence of virtual money (cryptocurrency) in stock trading in Indonesia and to find out the responsibilities of money laundering offenders who use virtual money (cryptocurrency) in stock trading. The research method used is normative legal research. The results show that the existence of virtual money (cryptocurrency) in stock trading in Indonesia when used as currency unification, transact, trade or as a means of payment with businesses in this case, especially stock trading in Indonesia can be said to be invalid in terms of Law Number 7. 2011 concerning Currency. Users of virtual money (cryptocurrency) in Indonesia are quite widely used in business, which can be seen in Indonesia itself that virtual money (cryptocurreny) such as Bitcoin and Centcoin are circulating. Then, the responsibility of the perpetrators of money laundering who use virtual money (Cryptocurrency) in stock trading, where this action has a very negative impact on the Indonesian State, especially in terms of business because people who have committed these crimes take advantage of technological advances unwise so that the perpetrators can be ensnared based on Law No. 8 of 2010 concerning the prevention and eradication of the crime of money laundering
Development and Implementation of Web Based Fault Monitoring System, case study: PT. PLN (Persero) Tondano Customer Service Unit Quido Conferti Kainde
International Journal of Information Technology and Education Vol. 1 No. 4 (2022): September 2022
Publisher : JR Education

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62711/ijite.v1i4.75

Abstract

PLN ULP Tondano has several divisions in which there is the Engineering Division or Distribution Section. Within this division, there are several jobs that are carried out on a daily basis, one of which is monitoring and managing current disturbances that occur around the dependent area. However, technical monitoring even to collect data in order to view daily data is very difficult because office employees have to input what has been reported by field workers, and then the data will be returned again for execution. This is what really slows down the performance because the techniques used are still manual and old. Due to this, the monitoring and archiving process takes a very long time. This also results in the possibility of existing data being lost because the data is still inputted manually and there is no backup file that can be used if the data disappears at any time. In addition, field officers are also overwhelmed to find out data that is only input manually and firstly which could hamper existing performance.

Page 5 of 23 | Total Record : 226