cover
Contact Name
Robbi Rahim
Contact Email
usurobbi85@zoho.com
Phone
+62818639363
Journal Mail Official
saga@mediadigitalpublikasi.com
Editorial Address
JL. Kenari 18 No. 421 Desa/Kelurahan. Kenangan, Kec. Percut Sei Tuan, Kab. Deli Serdang, Kab. Deli Serdang, Provinsi Sumatera Utara, 20226, Indonesia
Location
Kota medan,
Sumatera utara
INDONESIA
SAGA: Journal of Technology and Information Systems
ISSN : -     EISSN : 29858933     DOI : https://doi.org/10.58905/saga
SAGA: Journal of Technology and Information Systems, a premier peer-reviewed academic international journal dedicated to the advancement of knowledge and research in the field of technology and information systems. Our journal is committed to publishing high-quality, original research that explores the intersection of technology and information systems in the contemporary world. We publish four issues (February, May, August, November) per year and welcome submissions from researchers at all career levels and from any geographic location. Our scope is divided into two sections, each containing twenty areas of focus Technology and Information Systems We are committed to promoting diversity and inclusivity in our editorial process and encourage submissions from underrepresented groups. Our rigorous peer review process ensures that only the most impactful and rigorous research is published in our journal.
Articles 5 Documents
Search results for , issue "Vol. 2 No. 3 (2024): August 2024" : 5 Documents clear
Determining the Best Web Designer Using the SMARTER Method (Case Study: Website Development Service Provider) Patria, Lintang; Sitompul, Bernad J. D.; Marbun, Nasib
SAGA: Journal of Technology and Information System Vol. 2 No. 3 (2024): August 2024
Publisher : CV. Media Digital Publikasi Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58905/saga.v2i3.286

Abstract

This research aims to solve the problem of determining the best Web Designer objectively for website development service business activists. In this research, the author offers SMARTER as a decision support system method to produce a ranking of the best Web Designer alternatives to be selected by decision makers. The alternatives selected as the best Web Designer in this study consist of 5 candidates (AX1, AX2, AX3, AX4, and AX5). The criteria used in the process of determining the best Web Designer in this study are communication, ability to design websites, discipline, and loyalty. The results of the application of the SMARTER method in this study recommend alternative AX3 to the decision maker to be selected as the best web designer who is entitled to a reward
Sentiment Analysis on Erspo Jersey in X Using Machine Learning Algorithms Andi Asrida Reskinah. D; Najib, Marhawati; Muhammad Ashdaq
SAGA: Journal of Technology and Information System Vol. 2 No. 3 (2024): August 2024
Publisher : CV. Media Digital Publikasi Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58905/saga.v2i3.334

Abstract

This research conducts a sentiment analysis on Erspo jerseys using machine learning algorithms on the X platform. The objective is to identify the public's sentiment and compare the performance of three algorithms: Naïve Bayes, K-Nearest Neighbor (KNN), and Support Vector Machine (SVM). Data was collected through web scraping of tweets between January and September 2024, containing keywords related to Erspo. Using a lexicon-based approach, the preprocessing steps involved cleaning, tokenizing, normalizing, and labeling data into positive, negative, and neutral sentiments. Results show that the Naïve Bayes algorithm provided the highest accuracy in sentiment classification, followed by SVM and KNN. Positive sentiment primarily centered on product loyalty, while negative sentiment largely criticized jersey design and quality. The findings offer important insights for Erspo stakeholders to refine marketing strategies and product improvements. This study highlights the potential of machine learning in analyzing consumer opinions at scale, making it a valuable tool for real-time consumer feedback analysis.
Implementation of Fundamental Analytical Dashboard and Stock Price Forecasting of ADRO, ANTM, INCO with Arima Approach Najib, Marhawati; Nur Aulia Cahyani; Syamsu Alam
SAGA: Journal of Technology and Information System Vol. 2 No. 3 (2024): August 2024
Publisher : CV. Media Digital Publikasi Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58905/saga.v2i3.335

Abstract

This study aims to compare the financial performance of ADRO, ANTM, and INCO and project the stock prices using fundamental analysis and the ARIMA approach. The background of this study is based on the phenomenon of herding behavior and overconfidence of investors who often ignore fundamental analysis in making investment decisions. This study adopts a quantitative method using financial ratio data and historical stock prices and a qualitative method through visualization in the form of an analytical dashboard. The results of the study show that ADRO has an advantage in terms of profitability, INCO stands out in liquidity, and ANTM experiences fluctuations in financial performance. The ARIMA model can project the stock prices of the three companies by showing a positive trend for INCO and ANTM, while ADRO tends to be stable. The analytical dashboard developed helps investors understand financial performance and stock price projections, thus supporting more accurate investment decision-making.
Clustering of Generation X and Generation Y Communities in Cybersecurity Using the K-Means Algorithm (Case Study of Depok City, West Java) Wibowo, Adhitya Eka; Agung Triayudi
SAGA: Journal of Technology and Information System Vol. 2 No. 3 (2024): August 2024
Publisher : CV. Media Digital Publikasi Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58905/saga.v2i3.357

Abstract

This research aims to explore the differences in understanding and awareness of cybersecurity between Generation X and Generation Y in Depok City, West Java. The K-Means algorithm is used to group communities based on characteristics relevant to cybersecurity. The results of the study show that there are significant differences in understanding and behavior related to cybersecurity between the two generations. Generation X tends to be more cautious in using technology and has a better knowledge of cybersecurity risks, while Generation Y is more proficient in using digital devices and applications but pays less attention to security aspects. Factors that affect the level of cybersecurity awareness in both generation groups include knowledge of cyber threats, education, and demographic factors. The findings of this research can help stakeholders in increasing awareness and knowledge about cybersecurity and developing better solutions to protect users from cyber threats
Comparative Analysis of Performance of the Encryption and Decryption Times of Cryptography Made Yoga Mahardika; Agung Triayudi
SAGA: Journal of Technology and Information System Vol. 2 No. 3 (2024): August 2024
Publisher : CV. Media Digital Publikasi Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58905/saga.v2i3.359

Abstract

 Cryptography is the study of mathematical techniques to maintain information security, including the encryption process to protect data and decryption to return it to a readable form. The Rivest Shamir Adleman (RSA) algorithm and Elliptic Curve Cryptography (ECC) are two asymmetric key algorithms that are often used. RSA relies on large number factorization for security, while ECC uses elliptic curves that require more complex computation but are more efficient in resource usage. This study aims to compare the performance of the two algorithms in terms of encryption and decryption time, and analyze efficiency based on various key sizes and data amounts. The research method includes measuring encryption and decryption time with different data inputs using RSA and ECC at various key sizes. Experiments were conducted with data inputs of 128-bit to 512-bit and testing was conducted to measure the speed of each algorithm in the same situation. The results showed that RSA was faster in the encryption process than decryption, while ECC had a faster decryption time than encryption. However, the overall processing time for ECC is longer than RSA, especially when the key size is increased. These results provide insight into the advantages and disadvantages of each algorithm, which can be used as a basis for consideration in selecting algorithms for security applications that require high efficiency.

Page 1 of 1 | Total Record : 5