cover
Contact Name
Abdul Wahab Abdul Rahman
Contact Email
abdul.wahab@iiast-journal.org
Phone
0852778834017
Journal Mail Official
admin.ijcitsm@iiast-journal.org
Editorial Address
Premier Park 2 Ruko Blok B-11 Jl. Kampung Kelapa PLN Kel. Cikokol Kec. Tangerang, Tangerang, Provinsi Banten
Location
Kota tangerang,
Banten
INDONESIA
International Journal of Cyber and IT Service Management (IJCITSM)
ISSN : 27971325     EISSN : 2808554X     DOI : https://doi.org/10.34306/ijcitsm
Core Subject : Science,
International Journal of Cyber and Service Management (IJCITSM) is an international peer-reviewed journal that publishes high quality and refereed papers which reports original research and innovative applications in all areas of Computer Science, Informatics, Electronics Engineering, Communication Network and Information Technologies. Papers for publication in the journal are selected through rigorous peer review, to ensure originality, timeliness, relevance, and readability. The journal also seeks clearly written survey and review articles from experts in the field, to promote insightful understanding of the state-of-the-art and technology trends.
Articles 9 Documents
Search results for , issue "Vol. 3 No. 2 (2023): October" : 9 Documents clear
Securing Enterprises: Harnessing Blockchain Technology Against Cybercrime Threats Fallen Zidan; Dimas Nugroho; Baskara Adi Putra
International Journal of Cyber ​​and IT Service Management (IJCITSM) Vol. 3 No. 2 (2023): October
Publisher : International Institute for Advanced Science & Technology (IIAST)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34306/ijcitsm.v3i2.120

Abstract

 In the face of increasingly sophisticated cybercrime threats, large companies now need innovative solutions to protect their data and interests. Blockchain technology, which is based on the principles of decentralization and strong encryption, offers great potential in improving corporate cybersecurity. This research investigates the implementation of blockchain technology in the context of enterprise security by developing a blockchain-based dynamic system model. These findings make an important contribution in changing the way audits and general accounting operations are carried out, presenting fundamental changes in the profession. This new approach integrates blockchain technology into various aspects of cybersecurity, embracing innovation and creativity in the face of current challenges. By creating accurate computer models, this research brings a breakthrough in understanding system responses to employee fraud in corporate environments that adopt blockchain technology. This research aims to explore the potential of blockchain technology in improving corporate cybersecurity by identifying security gaps and designing effective updates, creating a safe and trustworthy digital environment for companies in this digital era. The findings of this research highlight the importance of integrating blockchain technology in auditing and general accounting operations, creating a foundation for the development of robust cybersecurity systems. In the context of companies using blockchain technology, this research reveals improved system responsiveness to employee fraud, indicating positive potential in mitigating security risks. This research provides a solid foundation for further development in the field of enterprise cybersecurity, inspiring innovation in protecting businesses and digital assets in a rapidly evolving cyberspace.
E-Commerce Design with Business Model Canvas and to Increase Sales using Seo at A Food Store Dhiaulhaq Majeed; Havy Destiana; Indri Handayani; Aditya Ilham Setyobudi; Rizkq Maulansyah Altaufik
International Journal of Cyber ​​and IT Service Management (IJCITSM) Vol. 3 No. 2 (2023): October
Publisher : International Institute for Advanced Science & Technology (IIAST)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34306/ijcitsm.v3i2.130

Abstract

This research focuses on a food store that faces several problems, as it still uses manual methods such as a slow product ordering process. Currently, the seller has to manually determine the product price, check the stock availability, and confirm it to the customer, which causes the transaction time to be longer. In addition, there are issues with data recording errors and the risk of losing information on paper records that are also used manually. To overcome these problems, this food shop intends to build an e-commerce business through a website. The approach chosen is to utilize a content management system (CMS), specifically using WordPress as the CMS and for the method using the waterfall method. CMS allows the creation, organization, distribution, publication, and maintenance of corporate or institutional information without requiring expertise in HTML coding. WordPress is very easy to use and easy to access. The proposed solution involves analyzing business processes using the Business Model Canvas (BMC) approach and then building an e-commerce business by designing a website based on CMS, specifically WordPress. This e-commerce website will transform the conventional business model into an online business model, facilitate increased product sales, minimize data recording errors, and generate sales reports using a database for information storage. In creating a website using wordpress which is assisted by the waterfall method which hopes to have an interface and tools that can make it easier for users to use. In addition, this system will provide customers with an efficient online ordering experience and easy access to product information, thereby increasing the efficiency of the purchasing process.
The Development of Semantic Dictionary Prototype for the Balinese Language Cokorda Pramartha; I Made Yoga Mahendra; Gede Primahadi Wijaya Rajeg; I Wayan Arka
International Journal of Cyber ​​and IT Service Management (IJCITSM) Vol. 3 No. 2 (2023): October
Publisher : International Institute for Advanced Science & Technology (IIAST)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34306/ijcitsm.v3i2.132

Abstract

The Balinese language is the mother tongue that is used by the people who live in Bali for daily communication and social interaction. Currently, the Balinese language just like many other mother tongue languages in Indonesia is in the process of being abandoned by the younger generation for many reasons for instance it is because there are limited resources available on the Internet.  Semantic ontology has been chosen as the backbone of this system due to minimising the ambiguity of the translation using the keyword-based query.  The development utilises the prototyping system development approach by focusing on the involvement of the user at every stage of development.  The system has three main features namely semantic browsing, semantic searching, and antonym searching.  We carried out two types of evaluation (functional and non-functional) by involving 30 participants and the results show users perceive the usefulness and ease of use to be positive
Mitigation of Cyber Security Risk Threats During the Covid-19 Pandemic Kemian Dai; Ichell Laurant Kawaki; Lintang Dwi Sakti
International Journal of Cyber ​​and IT Service Management (IJCITSM) Vol. 3 No. 2 (2023): October
Publisher : International Institute for Advanced Science & Technology (IIAST)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34306/ijcitsm.v3i2.135

Abstract

 Cyber security mitigation is becoming an increasingly urgent aspect in today's digital era, in response to the threat of theft and disruption to information systems, software and hardware. The Covid-19 pandemic has exacerbated this situation by increasing the chances of success of cyberattacks, as the number and scope of such attacks increases. The impact of increasing levels of cyberattacks is the wider disruption to various sectors. This study aims to investigate cybersecurity issues that arose during the Covid-19 pandemic. Researchers analyzed the current conditions as well as cybercrime acts and various types of cyberattacks carried out during this period. In addition, this research also proposes a practical approach to mitigating the risk of cyber attacks that can be implemented by organizations. It is important for organizations to strengthen the protection of their data and critical assets by implementing a comprehensive cybersecurity approach. The results of this study present various techniques for detecting and avoiding cybercrime threats, even after the pandemic is over. By implementing this approach, damage caused by cyber attacks can be minimized, maintaining the integrity of an organization's data and systems. For future research, it is necessary to carry out further development in the field of cyber security by integrating the latest technologies such as artificial intelligence, blockchain, Internet of Things, and other technologies. In this way, efforts to mitigate cyber attacks can continue to be improved, maintaining the integrity and security of information systems in this ever-growing digital era. This research makes an important contribution to understanding and addressing cyber security issues during the pandemic and provides a foundation for further development in the future.
Basic Electricity and Electronics Subjects using Canva as a Learning Medium Avraam Ledentsov; Septy Fatmawati; Putri Seviawani
International Journal of Cyber ​​and IT Service Management (IJCITSM) Vol. 3 No. 2 (2023): October
Publisher : International Institute for Advanced Science & Technology (IIAST)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34306/ijcitsm.v3i2.136

Abstract

In today's ever-evolving educational landscape, the integration of innovative teaching methods and tools is essential to engage and educate students effectively. This research delves into the feasibility of employing Canva as a learning medium in Basic Electricity and Electronics courses, aiming to enhance the learning experience in these critical subjects. The study employed a structured questionnaire as its primary research instrument, targeting a diverse group of participants, including subject matter experts, educators, and students. The research focused on evaluating Canva's validity, reliability, and practicality within the context of pedagogy. The validation process, conducted by experts and educators, yielded an average validation score of 0.83, comfortably exceeding the established validity threshold (≥ 0.667). This substantiates Canva's categorization as a valid instructional medium for Basic Electricity and Electronics. The assessment of media reliability, measured using Cronbach's Alpha, produced a commendable score of 0.731, demonstrating high reliability. This underscores Canva's consistency as a valuable learning resource. Furthermore, practicality assessments by both teachers and students resulted in average scores of 90% and 86%, respectively. These scores affirm Canva's high practicality, making it a well-received and user-friendly tool in both teaching and learning contexts. In conclusion, this comprehensive evaluation highlights Canva as a suitable and effective addition to the Basic Electricity and Electronics curriculum. Its successful implementation represents a novel approach to enhancing engagement and comprehension among students in these subjects. The research contributes to the broader discourse on innovative pedagogical strategies and their potential to transform science and technology education. The findings support the notion that Canva serves as a valuable tool for educators seeking to create a dynamic and interactive learning environment in the realm of Basic Electricity and Electronics.
Application of Digital Technology Risk Management Models in Banking Institutions Reflecting The Digital Transformation of Indonesian Banking BLUEPRINT Kento Mazayo; Sri Agustina; Riska Asri
International Journal of Cyber ​​and IT Service Management (IJCITSM) Vol. 3 No. 2 (2023): October
Publisher : International Institute for Advanced Science & Technology (IIAST)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34306/ijcitsm.v3i2.137

Abstract

This article discusses trends in the use of digital technology in the banking industry that are occurring in the world, specifically in Indonesia. This study found that the use of digital technology (digitization) has made the global financial ecosystem change rapidly. This happens because people's demand for digital services continues to increase. This opens up opportunities for the banking industry to increase the number of customers and increase profits. However, on the other hand, there are a number of channels through which banking institutions have the potential to experience potential losses because cybercrime will continue to increase. The authors therefore suggest that banking institutions continue to seek to reinvent their risk management function, especially through the development of digital risk management, to protect themselves, their customers and their place in the market. In Indonesia, the Financial Services Authority (OJK) has actually created a blueprint and road map that helps the banking industry implement digitalization and develop digital risk management in a targeted and effective manner.
A Holistic Approach to Evaluating Wardah Cosmetics E-PR Impact on Brand Perception Amora Siregar; Devani Mutia Widiastuty
International Journal of Cyber ​​and IT Service Management (IJCITSM) Vol. 3 No. 2 (2023): October
Publisher : International Institute for Advanced Science & Technology (IIAST)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34306/ijcitsm.v3i2.138

Abstract

In the rapidly developing digital era, the role of internet media, especially through Cyber Public Relations (E-PR) practices, has become crucial for companies in building brand images and expanding market share. This study explores the influence of E-PR on the brand image of Wardah Cosmetics, a leading cosmetics company. Through a mixed method approach, this research explores the impact of E-PR on consumer perceptions of the Wardah brand. Data was collected through quantitative analysis which was then deepened with qualitative analysis. The research results show that Wardah's E-PR activities have a significant influence on its brand image. The main contribution of this research is to open new insights regarding Cyber Public Relations strategies in the context of the cosmetics industry. The finding that online search sites and social media play a central role in strengthening brand image suggests a new direction for PR practitioners. The implications of this research include strategic guidance for other cosmetic companies in utilizing E-PR effectively. The novelty of this research lies in its holistic approach that combines quantitative and qualitative analysis, opening the door for in-depth research on the relationship between E-PR and consumer perceptions. Thus, this research enriches the public relations literature and provides a basis for the future development of more sophisticated and targeted E-PR practices.
Enhancing Cybersecurity Information Sharing: A Secure and Decentralized Approach with Four-Node IPFS Zaleha Fauziah; Novi Putri Anggraini; Yulia Putri Ayu Sanjaya; Tarisya Ramadhan
International Journal of Cyber ​​and IT Service Management (IJCITSM) Vol. 3 No. 2 (2023): October
Publisher : International Institute for Advanced Science & Technology (IIAST)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34306/ijcitsm.v3i2.139

Abstract

The act of sharing cybersecurity information plays a proactive and collaborative role in bolstering organizational security through the exchange of data using a centralized repository service. However, the real-world application of centralized services comes with certain risks. It leaves organizations vulnerable to distributed denial-of-service (DDoS) attacks, leading to system failures and creating a single point of failure. Additionally, it opens the door to man-in-the-middle (MITM) attacks, potentially altering or pilfering exchanged information. These threats undermine user confidence in the confidentiality, integrity, and availability of their data. This study presents a secure solution, the design of a Cybersecurity Information Sharing (CyberShare) system that employs a private interplanetary file system (IPFS) network as a decentralized information storage solution. Unlike centralized storage, which relies on a single node, the CyberShare system utilizes a four-node IPFS network interconnected with swarm keys for authentication. This design enables users to store and share information securely from sender to recipient, eliminating the need for reliance on a central server and reducing the server load. An analysis of the proposed CyberShare system demonstrates its capability to ensure the confidentiality, integrity, and availability of cybersecurity information. By enhancing information security, CyberShare systems empower organizations to securely share and utilize cybersecurity data.
Transforming PT Pertamina with Cybersecurity, File Security, and Essential Items Rama Azhari; Agita Nisa Salsabila
International Journal of Cyber ​​and IT Service Management (IJCITSM) Vol. 3 No. 2 (2023): October
Publisher : International Institute for Advanced Science & Technology (IIAST)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34306/ijcitsm.v3i2.140

Abstract

Considering the threat posed by cyberattacks, terrorist acts, and security breaches, it is imperative to implement an effective security policy to safeguard important items. Cybersecurity is yet another important topic covered in this study. PT Pertamina is a company that relies heavily on computer networks and information technology. Cyberattack defense and computer system security are critical components of PT Pertamina's operating performance. Consequently, to stop cyberattacks, data theft, and the leakage of private information, an efficient cyber security plan must be put into place. This paper also focuses on file security. Financial data, customer information, and contract agreements are just a few of the crucial items that PT Pertamina maintains and keeps track of. It is essential to protect these files to stop illegal access, data theft, and other threats to the business's operations. This essay will examine many tactics and approaches that PT Pertamina might use to implement file security, cyber security, and vital objects. It is hoped that this paper will act as a guide for PT Pertamina and other similar businesses in safeguarding their valuable assets against security-related internal and external threats.

Page 1 of 1 | Total Record : 9