cover
Contact Name
Abdul Wahab Abdul Rahman
Contact Email
abdul.wahab@iiast-journal.org
Phone
0852778834017
Journal Mail Official
admin.ijcitsm@iiast-journal.org
Editorial Address
Premier Park 2 Ruko Blok B-11 Jl. Kampung Kelapa PLN Kel. Cikokol Kec. Tangerang, Tangerang, Provinsi Banten
Location
Kota tangerang,
Banten
INDONESIA
International Journal of Cyber and IT Service Management (IJCITSM)
ISSN : 27971325     EISSN : 2808554X     DOI : https://doi.org/10.34306/ijcitsm
Core Subject : Science,
International Journal of Cyber and Service Management (IJCITSM) is an international peer-reviewed journal that publishes high quality and refereed papers which reports original research and innovative applications in all areas of Computer Science, Informatics, Electronics Engineering, Communication Network and Information Technologies. Papers for publication in the journal are selected through rigorous peer review, to ensure originality, timeliness, relevance, and readability. The journal also seeks clearly written survey and review articles from experts in the field, to promote insightful understanding of the state-of-the-art and technology trends.
Articles 115 Documents
Securing Enterprises: Harnessing Blockchain Technology Against Cybercrime Threats Fallen Zidan; Dimas Nugroho; Baskara Adi Putra
International Journal of Cyber ​​and IT Service Management (IJCITSM) Vol. 3 No. 2 (2023): October
Publisher : International Institute for Advanced Science & Technology (IIAST)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34306/ijcitsm.v3i2.120

Abstract

 In the face of increasingly sophisticated cybercrime threats, large companies now need innovative solutions to protect their data and interests. Blockchain technology, which is based on the principles of decentralization and strong encryption, offers great potential in improving corporate cybersecurity. This research investigates the implementation of blockchain technology in the context of enterprise security by developing a blockchain-based dynamic system model. These findings make an important contribution in changing the way audits and general accounting operations are carried out, presenting fundamental changes in the profession. This new approach integrates blockchain technology into various aspects of cybersecurity, embracing innovation and creativity in the face of current challenges. By creating accurate computer models, this research brings a breakthrough in understanding system responses to employee fraud in corporate environments that adopt blockchain technology. This research aims to explore the potential of blockchain technology in improving corporate cybersecurity by identifying security gaps and designing effective updates, creating a safe and trustworthy digital environment for companies in this digital era. The findings of this research highlight the importance of integrating blockchain technology in auditing and general accounting operations, creating a foundation for the development of robust cybersecurity systems. In the context of companies using blockchain technology, this research reveals improved system responsiveness to employee fraud, indicating positive potential in mitigating security risks. This research provides a solid foundation for further development in the field of enterprise cybersecurity, inspiring innovation in protecting businesses and digital assets in a rapidly evolving cyberspace.
Data Mining Methods: K-Means Clustering Algorithms Mohammad Annas; Siti Norida Wahab
International Journal of Cyber ​​and IT Service Management (IJCITSM) Vol. 3 No. 1 (2023): April
Publisher : International Institute for Advanced Science & Technology (IIAST)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34306/ijcitsm.v3i1.122

Abstract

A data warehouse is a straightforward definition of a database. Data mining technology can be used to process mountains of data in databases to uncover new, fascinating, and useful information.Clustering is an approach to data gathering. As one technique for grouping data into clusters or groups, the K-Means Clustering Algorithm algorithm divides the data into those that share the cluster's traits and those that don't. data into groups, and data into groups, so that data into groups, and data into groups, so that data has the same traits is grouped in the same cluster. Other clusters are formed from data and clusters with distinct properties. additional categories. The knowledge/information gathered in the groups or clusters is helpful to policy consumers in the decision-making process.mact of making decisions.
K-Means and J48 Algorithms to Categorize Student Research Abstracts Lee Kyung Choi; Kim Beom Rii; Han Woo Park
International Journal of Cyber ​​and IT Service Management (IJCITSM) Vol. 3 No. 1 (2023): April
Publisher : International Institute for Advanced Science & Technology (IIAST)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34306/ijcitsm.v3i1.125

Abstract

 Text mining is a rapidly growing field in computer science that is used to extract meaningful information from text data. This information can be used for various applications, such as categorizing research abstracts based on their content. This study focuses on the use of text mining techniques. The goal was to determine which algorithm was more accurate in categorizing the research abstracts. The results of the study indicated that the J48 algorithm outperformed the K-Means algorithm in terms of accuracy. This suggests that the J48 algorithm is a more effective method for categorizing research abstracts based on their content. Additionally, the findings provide insight into the use of text mining techniques for categorizing research abstracts in specific fields, such as computer science. Overall, the study demonstrates the potential of text mining techniques for analyzing and categorizing large volumes of text data. As the field of text mining continues to grow, it is likely that more applications will emerge, making it easier to extract valuable information from unstructured text data. The findings of this study can be used to improve the efficiency and accuracy of text mining techniques, particularly for categorizing research abstracts in specific fields.
Apply the Search Engine Optimization (SEO) Method to determine Website Ranking on Search Engines Fifin Alfiana; Nimatul Khofifah; Tarisya Ramadhan; Nanda Septiani; Wahyuningsih Wahyuningsih; Nadia Nur Azizah; Nova Ramadhona
International Journal of Cyber ​​and IT Service Management (IJCITSM) Vol. 3 No. 1 (2023): April
Publisher : International Institute for Advanced Science & Technology (IIAST)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34306/ijcitsm.v3i1.126

Abstract

In today's digital age, the internet has become an essential tool for various activities, including business promotion. One effective way to promote your business online is by creating a website that offers useful information to visitors. However, simply having a website is not enough; it is crucial to ensure that your website ranks high on search engine results pages (SERPs) in order to attract more visitors. One of the most effective methods to optimize a website for search engines is through search engine optimization (SEO) techniques. These techniques aim to improve a website's visibility on SERPs by using various tactics, such as keyword research, content optimization, and link building. However, it is important to note that SEO optimization is not a one-time task but rather an ongoing process. It requires constant attention and effort to maintain high search engine rankings and ensure the continued success of your online business. By optimizing your website, you can improve its visibility on search engines, attract more visitors, and ultimately drive business growth. It is important to remain vigilant in implementing SEO techniques to maintain high search engine rankings and ensure the continued success of your online business.
E-Commerce Design with Business Model Canvas and to Increase Sales using Seo at A Food Store Dhiaulhaq Majeed; Havy Destiana; Indri Handayani; Aditya Ilham Setyobudi; Rizkq Maulansyah Altaufik
International Journal of Cyber ​​and IT Service Management (IJCITSM) Vol. 3 No. 2 (2023): October
Publisher : International Institute for Advanced Science & Technology (IIAST)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34306/ijcitsm.v3i2.130

Abstract

This research focuses on a food store that faces several problems, as it still uses manual methods such as a slow product ordering process. Currently, the seller has to manually determine the product price, check the stock availability, and confirm it to the customer, which causes the transaction time to be longer. In addition, there are issues with data recording errors and the risk of losing information on paper records that are also used manually. To overcome these problems, this food shop intends to build an e-commerce business through a website. The approach chosen is to utilize a content management system (CMS), specifically using WordPress as the CMS and for the method using the waterfall method. CMS allows the creation, organization, distribution, publication, and maintenance of corporate or institutional information without requiring expertise in HTML coding. WordPress is very easy to use and easy to access. The proposed solution involves analyzing business processes using the Business Model Canvas (BMC) approach and then building an e-commerce business by designing a website based on CMS, specifically WordPress. This e-commerce website will transform the conventional business model into an online business model, facilitate increased product sales, minimize data recording errors, and generate sales reports using a database for information storage. In creating a website using wordpress which is assisted by the waterfall method which hopes to have an interface and tools that can make it easier for users to use. In addition, this system will provide customers with an efficient online ordering experience and easy access to product information, thereby increasing the efficiency of the purchasing process.
The Development of Semantic Dictionary Prototype for the Balinese Language Cokorda Pramartha; I Made Yoga Mahendra; Gede Primahadi Wijaya Rajeg; I Wayan Arka
International Journal of Cyber ​​and IT Service Management (IJCITSM) Vol. 3 No. 2 (2023): October
Publisher : International Institute for Advanced Science & Technology (IIAST)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34306/ijcitsm.v3i2.132

Abstract

The Balinese language is the mother tongue that is used by the people who live in Bali for daily communication and social interaction. Currently, the Balinese language just like many other mother tongue languages in Indonesia is in the process of being abandoned by the younger generation for many reasons for instance it is because there are limited resources available on the Internet.  Semantic ontology has been chosen as the backbone of this system due to minimising the ambiguity of the translation using the keyword-based query.  The development utilises the prototyping system development approach by focusing on the involvement of the user at every stage of development.  The system has three main features namely semantic browsing, semantic searching, and antonym searching.  We carried out two types of evaluation (functional and non-functional) by involving 30 participants and the results show users perceive the usefulness and ease of use to be positive
Mitigation of Cyber Security Risk Threats During the Covid-19 Pandemic Kemian Dai; Ichell Laurant Kawaki; Lintang Dwi Sakti
International Journal of Cyber ​​and IT Service Management (IJCITSM) Vol. 3 No. 2 (2023): October
Publisher : International Institute for Advanced Science & Technology (IIAST)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34306/ijcitsm.v3i2.135

Abstract

 Cyber security mitigation is becoming an increasingly urgent aspect in today's digital era, in response to the threat of theft and disruption to information systems, software and hardware. The Covid-19 pandemic has exacerbated this situation by increasing the chances of success of cyberattacks, as the number and scope of such attacks increases. The impact of increasing levels of cyberattacks is the wider disruption to various sectors. This study aims to investigate cybersecurity issues that arose during the Covid-19 pandemic. Researchers analyzed the current conditions as well as cybercrime acts and various types of cyberattacks carried out during this period. In addition, this research also proposes a practical approach to mitigating the risk of cyber attacks that can be implemented by organizations. It is important for organizations to strengthen the protection of their data and critical assets by implementing a comprehensive cybersecurity approach. The results of this study present various techniques for detecting and avoiding cybercrime threats, even after the pandemic is over. By implementing this approach, damage caused by cyber attacks can be minimized, maintaining the integrity of an organization's data and systems. For future research, it is necessary to carry out further development in the field of cyber security by integrating the latest technologies such as artificial intelligence, blockchain, Internet of Things, and other technologies. In this way, efforts to mitigate cyber attacks can continue to be improved, maintaining the integrity and security of information systems in this ever-growing digital era. This research makes an important contribution to understanding and addressing cyber security issues during the pandemic and provides a foundation for further development in the future.
Basic Electricity and Electronics Subjects using Canva as a Learning Medium Avraam Ledentsov; Septy Fatmawati; Putri Seviawani
International Journal of Cyber ​​and IT Service Management (IJCITSM) Vol. 3 No. 2 (2023): October
Publisher : International Institute for Advanced Science & Technology (IIAST)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34306/ijcitsm.v3i2.136

Abstract

In today's ever-evolving educational landscape, the integration of innovative teaching methods and tools is essential to engage and educate students effectively. This research delves into the feasibility of employing Canva as a learning medium in Basic Electricity and Electronics courses, aiming to enhance the learning experience in these critical subjects. The study employed a structured questionnaire as its primary research instrument, targeting a diverse group of participants, including subject matter experts, educators, and students. The research focused on evaluating Canva's validity, reliability, and practicality within the context of pedagogy. The validation process, conducted by experts and educators, yielded an average validation score of 0.83, comfortably exceeding the established validity threshold (≥ 0.667). This substantiates Canva's categorization as a valid instructional medium for Basic Electricity and Electronics. The assessment of media reliability, measured using Cronbach's Alpha, produced a commendable score of 0.731, demonstrating high reliability. This underscores Canva's consistency as a valuable learning resource. Furthermore, practicality assessments by both teachers and students resulted in average scores of 90% and 86%, respectively. These scores affirm Canva's high practicality, making it a well-received and user-friendly tool in both teaching and learning contexts. In conclusion, this comprehensive evaluation highlights Canva as a suitable and effective addition to the Basic Electricity and Electronics curriculum. Its successful implementation represents a novel approach to enhancing engagement and comprehension among students in these subjects. The research contributes to the broader discourse on innovative pedagogical strategies and their potential to transform science and technology education. The findings support the notion that Canva serves as a valuable tool for educators seeking to create a dynamic and interactive learning environment in the realm of Basic Electricity and Electronics.
Application of Digital Technology Risk Management Models in Banking Institutions Reflecting The Digital Transformation of Indonesian Banking BLUEPRINT Kento Mazayo; Sri Agustina; Riska Asri
International Journal of Cyber ​​and IT Service Management (IJCITSM) Vol. 3 No. 2 (2023): October
Publisher : International Institute for Advanced Science & Technology (IIAST)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34306/ijcitsm.v3i2.137

Abstract

This article discusses trends in the use of digital technology in the banking industry that are occurring in the world, specifically in Indonesia. This study found that the use of digital technology (digitization) has made the global financial ecosystem change rapidly. This happens because people's demand for digital services continues to increase. This opens up opportunities for the banking industry to increase the number of customers and increase profits. However, on the other hand, there are a number of channels through which banking institutions have the potential to experience potential losses because cybercrime will continue to increase. The authors therefore suggest that banking institutions continue to seek to reinvent their risk management function, especially through the development of digital risk management, to protect themselves, their customers and their place in the market. In Indonesia, the Financial Services Authority (OJK) has actually created a blueprint and road map that helps the banking industry implement digitalization and develop digital risk management in a targeted and effective manner.
A Holistic Approach to Evaluating Wardah Cosmetics E-PR Impact on Brand Perception Amora Siregar; Devani Mutia Widiastuty
International Journal of Cyber ​​and IT Service Management (IJCITSM) Vol. 3 No. 2 (2023): October
Publisher : International Institute for Advanced Science & Technology (IIAST)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34306/ijcitsm.v3i2.138

Abstract

In the rapidly developing digital era, the role of internet media, especially through Cyber Public Relations (E-PR) practices, has become crucial for companies in building brand images and expanding market share. This study explores the influence of E-PR on the brand image of Wardah Cosmetics, a leading cosmetics company. Through a mixed method approach, this research explores the impact of E-PR on consumer perceptions of the Wardah brand. Data was collected through quantitative analysis which was then deepened with qualitative analysis. The research results show that Wardah's E-PR activities have a significant influence on its brand image. The main contribution of this research is to open new insights regarding Cyber Public Relations strategies in the context of the cosmetics industry. The finding that online search sites and social media play a central role in strengthening brand image suggests a new direction for PR practitioners. The implications of this research include strategic guidance for other cosmetic companies in utilizing E-PR effectively. The novelty of this research lies in its holistic approach that combines quantitative and qualitative analysis, opening the door for in-depth research on the relationship between E-PR and consumer perceptions. Thus, this research enriches the public relations literature and provides a basis for the future development of more sophisticated and targeted E-PR practices.

Page 7 of 12 | Total Record : 115