cover
Contact Name
-
Contact Email
stikomcki01@gmail.com
Phone
-
Journal Mail Official
stikomcki01@gmail.com
Editorial Address
Jl Radin Inten II Duren Sawit Seberang Pengadilan Tinggi Agama DKI Jakarta, Jakarta Timur
Location
Kota adm. jakarta pusat,
Dki jakarta
INDONESIA
CKI On Spot
ISSN : 19797044     EISSN : 25982990     DOI : -
Core Subject : Science,
Jurnal CKI on Spot diterbitkan oleh STIKOM CKI sejak 2016. Jurnal CKI on Spot memuat naskah hasil-hasil penelitian di bidang Teknologi Informasi dan Ilmu Komputer. Ruang lingkup Cki On Spot adalah sebagai berikut: Domain Specific Frameworks and Applications IT Management dan IT Governance e-Government e-Healthcare, e-Learning, e-Manufacturing, e-Commerce ERP dan Supply Chain Management Business Process Management Smart Systems Smart City Smart Cloud Technology Smart Appliances & Wearable Computing Devices Robotic Systems Smart Sensor Networks Information Infrastructure for Smart Living Spaces Intelligent Transportation Systems Models, Methods and Techniques Conceptual Modeling, Languages and design Software Engineering Information-centric Networking Human Computer Interaction Media, Game and Mobile Technologies Data Mining Information Retrievel Information Security Image Processing and Pattern Recognition Remote Sensing Natural Language Processing
Articles 8 Documents
Search results for , issue "Vol 9, No 1 (2016): CKI ON SPOT" : 8 Documents clear
SISTEM KEAMANAN JARINGAN KOMPUTER MENGGUNAKAN METODE WATCHGUARD FIREBOX PADA PT GUNA KARYA INDONESIA Sugiyono Sugiyono
CKI ON SPOT Vol 9, No 1 (2016): CKI ON SPOT
Publisher : STIKOM CKI

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (597.355 KB)

Abstract

Computer network security as part of an information system is very important to maintain the validity and integrity of data and ensure the availability of services for users, because  the computer network systems should be protected from all sorts of attacks and intrusion at temps or scanning by unauthorized parties. Computer connected to the network, there are many security threats that are larger than on the host or a computer disconnected anywhere, so by controlling network  security, the risk can be reduced, so that a network is designed as a data communication high way with  the aim of increasing access  to computer  systems, while  security is designed to control access, so that the provision of network security is a balancing act between open access with security. Firewalls are a means of controlling what information is allowed to get in and out of the local network and generally host or computer firewall connected to the internet and local LAN, and LAN access to the Internet only allowed through the firewall, so that with the help of the firewall can control security systems of computer networks of what is received and sent by the Internet and LAN. There are several types and methods in the firewall settings, through code firewall scan be built directly into the kernel, such as  aid ipfw adm user space makes it possible to change the type of network  traffic or by recording the types of network  traffic, so that method of setting the firewall can use aid equipment of  M400 watch guard.
KAJIAN PENERAPAN ENCODE DATA DENGAN BASE64 PADA PEMROGRAMAN PHP Dadang Iskandar Mulyana
CKI ON SPOT Vol 9, No 1 (2016): CKI ON SPOT
Publisher : STIKOM CKI

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

With the development of technology today and in order to obtain information quickly, information mealalui web site is the right media to fulfill this information and to design a website can use multiple programming languages one of which is PHP (Hypertext Prepocessor), because this script should be distributed in forms source, so it has some flaws and security vulnerabilities. Some drawbacks, one of which is a script can be easily copied, modified, or used in part / whole in other software without notice. In addition unencrypted scripts that make software that was built very vulnerable, because scripts can reveal some weaknesses of the software. Therefore, this study aimed to secure scripts from PHP (Hypertext Prepocessor) which will be distributed in order to awake the permissions and integrity, research using base64 algorithm by changing the structure of its index of plaintext when ciphertext attempted to be solved by breaking the code. Data modeling using stages in accordance flowchart that nothing has been described, with the way this protection, application developers who use the PHP programming language can hide php scripts that are not easily copied, modified partly / entirely by people who are not eligible and can secure the weakness of php application program flow, and makes one of the ways to secure information that was easily seen and can.Keywords: Base64, Encode,  PHP.
PERANCANGAN ARSITEKTUR INFORMASI UNTUK MENDUKUNG KEBERLANGSUNGAN PROSES BISNIS ENTERPRISE WIDE C Wardiyono
CKI ON SPOT Vol 9, No 1 (2016): CKI ON SPOT
Publisher : STIKOM CKI

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (390.876 KB)

Abstract

In running its business processes, an organization formed which describes the overall organizational structure of business units of the organization to execute the business functions and coordination in the achievement of organizational goals. But in its application sometimes lack the power tie or clear coordination among business units and among its functions for a wide range of interests. Egocentric locally in each business unit functions in effect on performance and interaction between information systems in each unit and function, resulting in data integration was not optimal and developed information system is not optimal. Besides this, the changes that occur in the system environment, for example the growth of an organization, competition, to seize the opportunity and other things can affect the performance of the information system. In this case the information system must be able to accommodate any changes that occur in the organization, so that the business processes of the organization can continue to run in accordance with its function. This paper will discuss the design of an integrated information architecture based on the relevance of each function within the organization, with the view that an information system is an integral basic components that have the same characteristics and do not separate. Each of these basic components are defined and analyzed linkage function, so as to overcome any problems that arise in the organization, and can accommodate perubahanperubahan happened. The model is expected to be built to current guidelines do in the future development of information systems. To complete the study of the research, in this paper comes to the discussion of case studies in a government agency.
PENGARUH PROFITABILITAS DAN KEBIJAKAN DEVIDEN TERHADAP NILAI PERUSAHAAN PADA PERUSAHAAN PERBANKAN YANG TERDAFTAR DI BEI TAHUN 2006 – 2010 Sri Lestari
CKI ON SPOT Vol 9, No 1 (2016): CKI ON SPOT
Publisher : STIKOM CKI

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (478.816 KB)

Abstract

The purpose of this research is to empirically study effect of net profitability and dividend policy either partially or simultaneously toward firm value. Ratio of profitability is Return on Equity (ROE) and ratio of dividend policy is Dividend Payout Ratio (DPR). Population of this research are banking firm that list in Indonesia Stock Exchange (IDX). The sample used purposive sampling method and result ten banking firms that used as samples in this research. Data for this research is secondary data. Independent variables for this research are ROE and DPR, and dependent variable is firm value. Method that use are classic assumptions test with multiple regression. Result of this research, the influence between ROE and DPR toward firm value are significant simultaneously. Partially, only ROE can explain significantly toward firm value, while DPR do not influence significantly.Keyword: ROE, DPR and firm value
PENERAPAN METODE SDLC UNTUK PERANCANGAN APLIKASI E-RENTAL MOBIL BERBASIS ANDROID PADA PT RAJAWALI PANCA UTAMA Muhammad Ali Machrus; Muryan Awaludin
CKI ON SPOT Vol 9, No 1 (2016): CKI ON SPOT
Publisher : STIKOM CKI

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (400.027 KB)

Abstract

The techonology is nowdays growing rapidly which developing all smart features and spesifications inside is in your hand as a phone celluar as communication-life mobility. Through sending, controlling and processing file or data in which by using mobile application on phone celluar availability. Also it is supporting by system operation which flourish now is called android. Car Rent is one of the way solution through traffic jams and air pollution if it is all full on seats. For convenience in service, it’s a system operation needed. In developing a system requires modeling concepts with supporting tool named flowchart and UML, to give design on the line of the information system. In Order for the development of directional system and raise the goal are required a system development method is SDLC method with waterfall approach. Once the system is made complete and running propely can be tested by black box method that is the test input on the application to be processed according to functional needs.
Pengaruh Kompensasi Terhadap Produktivitas Karyawan Di PT. Dwipa Manunggal Kontena Sumarsid Sumarsid
CKI ON SPOT Vol 9, No 1 (2016): CKI ON SPOT
Publisher : STIKOM CKI

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (422.572 KB)

Abstract

This study aims to determine how the compensation effect on the productivity of employees at PT. Dwipa Manuggal  containers.  Based  on  the  analysis  of  the  correlation  coefficient  r  value  of  0.904  obtained  thereby providing  compensation showed  a  very strong  and significant  relationship  0.000>  0.05  on  the  productivity  of employees at PT. Dwipa Manuggal containers, relations between the two variables and positive direction means that any increase or decrease in compensation will be followed by an increase or decrease in the productivity of employees  at  PT.  Dwipa  Manuggal  containers.  Based  on  the  analysis  of  the  results  obtained  determinant coefficient 81.7% means that compensation has contributed greatly to the rise and fall productivity of employees at PT. Dwipa Manuggal containers, while the remaining 28.3% is influenced by factors other than compensation not I researched include: job stress, motivation and leadership styles. Calculation analysis of hypothesis testing by t test (partial) obtained results that to> t table (11.181> 1.701) These results can be concluded that to> tα. As well  as  the  significant  value  of  0000  <5%  (0.000  <0.05).  Thus  the  null  hypothesis  (Ho)  is  rejected  and  the alternative hypothesis (Ha) is accepted on a real level (level of significance) of 0.05 indicates that the hypothesis that the writer suggested that allegedly exist between the compensation effect on the productivity of employees at PT. Dwipa Manuggal containers have been proven.
MONITORING CCTV DIGITAL SECARA ONLINE MELALUI INTERNET & MOBILE PHONE PADA JARINGAN WIRELESS LAN: STUDI KASUS PADAPT TIGA SINAR MANDIRI
CKI ON SPOT Vol 9, No 1 (2016): CKI ON SPOT
Publisher : STIKOM CKI

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1056.924 KB)

Abstract

One of the newest ways that we can directly monitor the event or to monitor the condition of the company's assets and the personal wealth is with the installation of CCTV Digital. Digital CCTV can be monitored with the Internet browser from any location in the world as long as there is Internet connection both in home and mobile Internet such as blackberry, androit and others. For all purposes will be success even it should be done setting Wireless LAN and Network Address Translation settings correctly on the Digital Video Recorder and Wifi Router is used. When everything is installed properly then the asset security and computer network security will be utilized and safe from hacker attacks..
ANALISIS PENILAIAN KINERJA PORTOFOLIO SAHAM DENGAN MENGGUNAKAN METODE SHARPE MEASURE DAN TREYNOR MEASURE PADA SAHAM-SAHAM INDEKS SEKTORAL YANG TERDAFTAR DI BURSA EFEK INDONESIA (BEI) PERIODE 2008-2010 Atik Budi Paryanti; Sri Lestari
CKI ON SPOT Vol 9, No 1 (2016): CKI ON SPOT
Publisher : STIKOM CKI

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (580.933 KB)

Abstract

The study of the research is about performance assesment analysis of stock portofolio evaluated by using Sharpe adn Treynor method in active stocks traded consistencely over three years, and those stocks represent industrial sectors classified in Indonesia Stock Exchange. Besides, the aim of the use of both methods in to find out result of measurement consistency comparison from each models in measuring stock portofolio performance in Indonesia Stock Exchange is that it can be found whether there is a model used as direction for investor in measuring stock portofolio performance as investation portofolio.According to the result of independent t-test, it can be explained that t-score is 3,230 and sig. Is 0,021(< 0,05), it can be concluded that there is difference between two portofolio performance, Sharpe and Treynor method, over the period of the research. The result of both method shows that measurment of Sharpe method is higher than measurment of Treynor method (0,3833 > 0,1285). Moreover, this result shows that investors and investors managers in evaluating portofolio performance view that Sharpe method is more approriate because this method is more effective in measuring or assessing stock portofolio performance that can be minimalized in whole risk sistematically or insistematically existed in stock portofolio combination.Key words : Optimal portofolio, Sharpe Measure, Treynor Measure.

Page 1 of 1 | Total Record : 8