cover
Contact Name
Jonhariono Sihotang
Contact Email
jonharyono25@gmail.com
Phone
+6281322445478
Journal Mail Official
editorjmi@journals.joninstitute.org
Editorial Address
Perumahan Romeby Lestari Blok BB, Deliserdang, Sumatera Utara, Indonesia
Location
Unknown,
Unknown
INDONESIA
Jurnal Manajemen Informatika Medicom (JMI)
ISSN : 23378697     EISSN : 29639964     DOI : 10.35335/jmi
The Jurnal Manajemen Informatika Medicom (JMI) is published periodically (twice a year, namely March and September) with the aim of disseminating research results in the field of technology and information to academics, practitioners, students, and others. JMI accepts submissions of research articles in the fields of Computer Science, technology and information written in Indonesian or English. Authors must state that articles submitted to JMI have not been submitted or have been published in other journals.
Articles 5 Documents
Search results for , issue "Vol. 11 No. 1 (2024): Maret: Informatics Management" : 5 Documents clear
Development of Contract Management SOP with it Service Providers Supplier Based on the Framework Cobit 5 and ITIL V3 Hospital Case Study Dr Ramelan Navy Puspadini, Yundha
Jurnal Manajemen Informatika Medicom (JMI) Vol. 11 No. 1 (2024): Maret: Informatics Management
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/jmi.v11i1.48

Abstract

RSAL Dr. Ramelan is a naval hospital in Surabaya. It is currently developing its Management Information Systems (MIS) with the supplier of IT (Information Technology) service providers. Problems arose when the management change interfere with MIS development. The current management wanted to change MIS supplier before the development process is completed. This can cause financial and time losses. The process of supplier selection, negotiation, contracting and fulfillment control of supplier contracts to always fit the needs of the business is conducted at the Supplier Management. This study aims to make a reference to the management of IT service provider suppliers contracts in the form of SOP (Standard Operating Procedure) which is based on the COBIT 5 framework domain APO10 Manage Supplier and ITIL V3 Supplier Management. Formulation of IT service providers supplier contract management in RSAL Dr. Ramelan SOP document is carried out in four stages. The first stage is the observation of IT services in RSAL Dr. Ramelan. The second stage is the stage of the analysis. This stage is to identify COBIT 5 Manage Supplier and ITIL V3 Supplier Management activities and mapping the activities. Having formed a new activity, adjustments are made to the Regulation of the President of the Republic of Indonesia No. 54 of 2010 concerning the Procurement of Goods and Services. In the third stage, SOP document preparation is done by decomposition of these activities to become sequential action steps. The last stage is the stage of evaluation and improvement, which begins with the verification done in RSAL Dr. Ramelan, then the improvement is done based on the results of verification. The result of this study is an IT service providers supplier contract management SOP document that has been tailored to the condition in RSAL Dr. Ramelan. From the result of the evaluation, it is known that the SOP produced was still in need for improvement in terms of grammar, role and order activity. The SOP document that has been evaluated before has been corrected and improved based on the feedback given by RSAL Dr. Ramelan.
System Quality Development and Analysis Seminar Management Information Web-Based in Department of Education Electronic Engineering and Information Kusaini, Ghofarudin
Jurnal Manajemen Informatika Medicom (JMI) Vol. 11 No. 1 (2024): Maret: Informatics Management
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/jmi.v11i1.49

Abstract

This study aims to: 1) develop a web-based seminar management information system. 2) determine the quality level of the web-based seminar management information system developed. The research method used in this study is Research and Development (R&D) with a waterfall development model that refers to the rules of software engineering Pressman (2010). The stages that are passed are communication (communication), planning (planning), modeling (modeling), construction (construction), and distribution (deployment). Software quality analysis is carried out by adopting the ISO 25010 standard, namely aspects of functional suitability, performance efficiency, compatibility, usability, reliability, security, maintainability, and portability. The results of this study are 1) the seminar management information system was built using the PHP programming language and the Postgre database. The frameworks used are CodeIgniter and AdminLTE (Bootstrap). This information system has 7 levels of users, namely administrator, committee (committee), reviewer, main speaker (presenter), second speaker (non-presenter), participant (audience), and visitor (guest). 2) the results of the analysis of software quality by adopting the ISO 25010 standard are as follows: (1) function suitability aspects with 100% success; (2) the performance efficiency aspect obtained a Yslow score of 92.97 (grade A); (3) the compatibility aspect can run well on the 4 tested web mails; (4) the usability aspect obtained a raw SUS score of 73.00, acceptability ranges with acceptable results, grade scale with C results, and adjective ratings with good results; (5) reliability aspect with 100% result; (6) security aspect with the result of security vulnerability being at level 1 (low); (7) maintainability aspect with maintainability index result 90.81 (high category); (8) the portability aspect can run well on the 5 web browsers tested.
Development and Analysis Report Information System Quality Web-Based Student Learning Outcomes at SMK Negeri 1 Banyumas Zahro, Avidah Amalia
Jurnal Manajemen Informatika Medicom (JMI) Vol. 11 No. 1 (2024): Maret: Informatics Management
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/jmi.v11i1.50

Abstract

The purpose of this study was to develop an information system for reporting student learning outcomes at SMK Negeri 1 Banyumas, knowing the level of quality of the information system reporting student learning outcomes based on quality testing in accordance with ISO 25010 standards. The method used in this study was Research and Development (R&D). The development of this information system is carried out in 4 stages according to the waterfall method, namely the analysis stage, the design stage, the coding or implementation stage and the testing stage. The results of this study are 1) a web-based student learning outcome report information system developed with the Codeigniter 3.0 framework. and has the main features to import, manage, print, and display student report cards. 2) the test results show that the information system has met the ISO 25010 standard in aspects (1) functional suitability runs 100% and has a value of X=1; (2) performance efficiency can load pages in 3.2 seconds, PageSpeed ​​performance of 94% (grade A) and YSlow of 90% (grade A); (3) usability, the percentage value is 84.69%; (4) security, with the level of vulnerability to attacks at level 1 (low); (5) reliability, with 100% session, hits and pages results; (6) maintainability has a maintainability index value of 68.28; (7) portability ran successfully on 5 different desktop browsers tested without error. PageSpeed ​​performance of 94% (grade A) and YSlow of 90% (grade A); (3) usability, the percentage value is 84.69%; (4) security, with the level of vulnerability to attacks at level 1 (low); (5) reliability, with 100% session, hits and pages results; (6) maintainability has a maintainability index value of 68.28; (7) portability ran successfully on 5 different desktop browsers tested without error. PageSpeed ​​performance of 94% (grade A) and YSlow of 90% (grade A); (3) usability, the percentage value is 84.69%; (4) security, with the level of vulnerability to attacks at level 1 (low); (5) reliability, with 100% session, hits and pages results; (6) maintainability has a maintainability index value of 68.28; (7) portability ran successfully on 5 different desktop browsers tested without error.
Bandwidth Management Design Analysis for Computer Network Infrastructure at SMKN 1 Abdya Herlina, Elvi
Jurnal Manajemen Informatika Medicom (JMI) Vol. 11 No. 1 (2024): Maret: Informatics Management
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/jmi.v11i1.51

Abstract

The need for internet in the learning process has a very significant role so that in its use it is necessary to regulate access and manage bandwidth well for the smooth internet access. This research was conducted to analyze the differences in bandwidth management design for computer network infrastructure in the old design and the new design at SMKN 1 ABDYA. This study aims to see how to analyze the difference in delay and throughput in the bandwidth management design of old and new computer networks. In this study using qualitative research methods where the data obtained by means of observation, interviews and documentation. This research uses the Wireshark version 2.6 application. 6 to see the use of delay and throughput on the bandwidth management design of old and new computer networks. Based on the results of the calculation of the use of delay and throughput using the Wireshark 2.6.6 application, there is a significant difference between the use of delay and throughput in the design of bandwidth management for the old computer network and the design of bandwidth management for the new computer network.
Analysis of Lapan Security Access Based on Firewall Log in Center Eight Subakti, Adityo Jaya
Jurnal Manajemen Informatika Medicom (JMI) Vol. 11 No. 1 (2024): Maret: Informatics Management
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/jmi.v11i1.52

Abstract

Analysis of Network Security Access Space Agency Based Firewall Log In LAPAN Center. Supervisor LIPUR SUGIYANTA, Ph.D and Drs. BACHREN ZAINI, M.Pd. Increased Denial Of Service attacks, and other types of computer network interference, making security an important issue to be considered by all those who take advantage of the presence of the virtual world today. LAPAN Center system along with the information contained within is no exception contained attacks on access computer network security. Such attacks can be prevented at an early stage by analyzing at each access that will go on network security in LAPAN. This research at Analysis of Network Access to know and learn access of network security in firewall log LAPAN Center. This research was conducted with several stages of observation and interviews to employees of LAPAN Center infrastructure. After the stage of observation and interviews, the researchers conducted further data collection and analysis of firewall logs. The study states that the analysis of security access network based firewall log in LAPAN Center in the form of six messages that occur when a network will pass through the firewall. It can be concluded that by doing some analysis phases of network security access based firewall log in LAPAN Center produces a record of every incident inside the firewall logs. The study states that the analysis of security access network based firewall log in LAPAN Center in the form of six messages that occur when a network will pass through the firewall. It can be concluded that by doing some analysis phases of network security access based firewall log in LAPAN Center produces a record of every incident inside the firewall logs. The study states that the analysis of security access network based firewall log in LAPAN Center in the form of six messages that occur when a network will pass through the firewall. It can be concluded that by doing some analysis phases of network security access based firewall log in LAPAN Center produces a record of every incident inside the firewall logs.

Page 1 of 1 | Total Record : 5