cover
Contact Name
Desi Puspitasari
Contact Email
jicssnnmedia@gmail.com
Phone
+6288269134230
Journal Mail Official
jicssnnmedia@gmail.com
Editorial Address
Jalan Palem VII 18B Beringin Raya, Kec. Kemiling, Kota Bandar Lampung
Location
Kota bandar lampung,
Lampung
INDONESIA
Jurnal Ilmiah Computer Science
ISSN : -     EISSN : 30267145     DOI : https://doi.org/10.58602/jics
Jurnal Ilmiah Computer Science (JICS) is a periodical scientific journal that contains research results in the field of informatics and computer science from all aspects of theory, practice and application. Papers can be in the form of technical papers or surveys of recent developments research (state-of-the-art). Topics cover the following areas (but are not limited to): Artificial Intelligence Decision Support Systems Intelligent Systems Business Intelligence Machine Learning Data mining Network and Computer Security Optimization Soft Computing Software Engineering Pattern Recognition Information System
Articles 36 Documents
Implementation of the Geometric Mean Multi-Attribute Utility Theory (G-MAUT) in Determining the Best Honorary Employees Setiawansyah, Setiawansyah; Rahmanto, Yuri; Ulum, Faruk; Triyanto, Dedi
Jurnal Ilmiah Computer Science Vol. 3 No. 2 (2025): Volume 3 Number 2 January 2025
Publisher : PT. SNN MEDIA TECH PRESS

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58602/jics.v3i2.50

Abstract

Determining the best honorary employees is a strategic step to appreciate performance, increase motivation, and encourage productivity in the work environment. This process is carried out by evaluating employees based on certain criteria. The main problem in determining the best honorary employees is the lack of objectivity and transparency in the assessment process, which often leads to dissatisfaction among employees. Judgments that rely solely on subjective perceptions without considering measurable quantitative data can result in unfair decisions. The purpose of applying the Geometric Mean Multi-Attribute Utility Theory (G-MAUT) method in determining the best honorary employees is to provide a more objective, transparent, and accurate evaluation framework in decision-making. This method not only supports a fairer selection process, but also encourages increased motivation and performance among honorary employees. The results of the calculation of the final utility value carried out using the G-MAUT method, the results of the evaluation of eight honorary employees showed their performance ratings comprehensively. Honorary Employee F has the highest utility value of 0.6399, making it the best honorarium employee among all available alternatives. Followed by Honorary Employee A who was ranked second with a utility value of 0.4685, and Honorary Employee D in third place with a value of 0.3947. These results provide a clear picture of the order of employees based on their performance in various criteria that have been assessed.
Transforming Cybersecurity Practices: A Comprehensive Approach to Protecting Digital Banking Assets Zangana, Hewa; Mohammed, Harman Salih; Husain , Mamo Muhamad
Jurnal Ilmiah Computer Science Vol. 4 No. 1 (2025): Volume 4 Number 1 July 2025
Publisher : PT. SNN MEDIA TECH PRESS

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58602/jics.v4i1.51

Abstract

The rapid evolution of digital banking has introduced unprecedented security challenges, necessitating a proactive and comprehensive cybersecurity framework. This paper explores advanced strategies for safeguarding digital banking assets, integrating cutting-edge technologies such as artificial intelligence (AI), blockchain, and zero-trust architectures. By analyzing emerging threats, regulatory requirements, and best practices, this study presents a holistic approach to strengthening financial cybersecurity resilience. The findings emphasize the need for a dynamic, multi-layered security model that adapts to evolving cyber threats while ensuring compliance and user trust.
A Comparative Study of Encryption-Based Access Control Schemes in Ethereum, Hyperledger Fabric, and Corda Mandinyenya, Godwin; Malele, Vusumuzi
Jurnal Ilmiah Computer Science Vol. 4 No. 1 (2025): Volume 4 Number 1 July 2025
Publisher : PT. SNN MEDIA TECH PRESS

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58602/jics.v4i1.52

Abstract

Blockchain technology has emerged as a transformative solution for decentralized and immutable data storage, offering transparency and security across various industries. However, ensuring authorized data access remains a critical challenge in blockchain systems. Encryption-based access control mechanisms are pivotal in mitigating unauthorized access, yet their implementation varies significantly across different blockchain platforms. This study provides a comprehensive comparison of encryption-based access control schemes in three prominent blockchain platforms: Ethereum, Hyperledger Fabric, and Corda. The analysis focuses on their strengths, weaknesses, and suitability for various use cases, evaluating security, scalability, and usability. The findings reveal distinct trade-offs among the platforms, highlighting the need for tailored solutions based on specific application requirements. Future research directions, including hybrid access control models and post-quantum cryptography, are also discussed.
Design and Implementation of a Smart Contract-Based Consent Management Model for Secure Personal Data Sharing Mandinyenya, Godwin; Malele, Vusumuzi
Jurnal Ilmiah Computer Science Vol. 4 No. 1 (2025): Volume 4 Number 1 July 2025
Publisher : PT. SNN MEDIA TECH PRESS

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58602/jics.v4i1.53

Abstract

Emerging data-sharing paradigms demand robust mechanisms to ensure user consent is dynamically managed while preserving data sovereignty. This paper proposes a blockchain-driven consent management model that leverages smart contracts, offline storage, and a JavaScript/JSON front end to empower data owners in healthcare, finance, and identity management. The framework decentralizes consent logging, automates access enforcement, and integrates GDPR-compliant "right to revoke" functionalities, addressing critical gaps in existing systems such as offline accessibility, cross-industry interoperability, and regulatory compliance. A mixed-methods approach—combining a systematic literature review (SLR) of 150 studies (2018–2023) and three case studies—validates the model's efficacy. Performance benchmarks reveal sub-second consent updates, 99.98% audit accuracy, and 40% reduced breach risks compared to centralized systems. The hybrid architecture employs a two-tiered design, with an on-chain layer for immutable consent logging and an offline layer for local data storage, ensuring enforceability even during network outages. The front end, built using React.js and Ethers.js, provides a user-friendly interface for non-technical users to define and manage consent terms. Security protocols, including FIDO2 authentication and AES-256-GCM encryption, ensure robust protection against unauthorized access. Challenges include gas cost volatility in public blockchains and latency in multi-chain consent synchronization. The study contributes a novel hybrid architecture, open-source front-end tools, and a regulatory alignment roadmap for decentralized consent ecosystems. Case studies in healthcare, finance, and identity management demonstrate the model's practical applicability, with unauthorized access reduced by 40% and user satisfaction scores exceeding 4.7/5. Future work will explore AI-driven consent drafting, interoperability standards, and quantum-resistant cryptography to further enhance the model's scalability and security. This research advances the state of the art in blockchain-based consent management, offering a scalable, secure, and user-centric solution for data sovereignty in the digital age.
Blockchain Technology in AI-Driven Cybersecurity: Strengthening Trust in Financial and Digital Security Systems Zangana, Hewa
Jurnal Ilmiah Computer Science Vol. 4 No. 1 (2025): Volume 4 Number 1 July 2025
Publisher : PT. SNN MEDIA TECH PRESS

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58602/jics.v4i1.54

Abstract

Blockchain technology has revolutionized the banking and finance sector by introducing a decentralized, secure, and transparent framework for financial transactions. This paper provides a comprehensive review of the role of blockchain in transforming trust mechanisms within financial institutions, focusing on its applications in payments, smart contracts, identity management, and regulatory compliance. A mixed-methods approach was employed, integrating a systematic literature review with case study analysis to evaluate the effectiveness of blockchain-based security solutions. The results indicate that blockchain significantly enhances transaction security, reduces fraud, and improves operational efficiency, with AI-powered fraud detection achieving a 92% accuracy rate and biometric authentication strengthening access control. Despite these advantages, challenges such as scalability, regulatory compliance, and integration with existing financial infrastructures remain key barriers to adoption. The study concludes that blockchain, in conjunction with AI-driven cybersecurity measures, presents a robust solution for enhancing trust and security in digital finance. However, continuous regulatory advancements and industry-wide collaboration are necessary to ensure its sustainable implementation.
A Federated Architecture for Enhancing Security and Scalability in IoT-Cloud Integrated Systems Zangana, Hewa; Yazdeen , Abdulmajeed
Jurnal Ilmiah Computer Science Vol. 4 No. 1 (2025): Volume 4 Number 1 July 2025
Publisher : PT. SNN MEDIA TECH PRESS

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58602/jics.v4i1.55

Abstract

The exponential growth of the Internet of Things (IoT) and its integration with cloud computing has introduced significant challenges related to security, scalability, and data privacy. This paper proposes a novel federated architecture that leverages federated learning and distributed security mechanisms to enhance the resilience and scalability of IoT-cloud integrated systems. By decentralizing data processing and security enforcement, the architecture mitigates common attack vectors such as centralized point-of-failure, data leakage, and unauthorized access. The proposed system is designed with modular security components including lightweight encryption, dynamic trust management, and blockchain-inspired audit trails. A performance evaluation conducted through simulated environments and real-world IoT testbeds demonstrates improved latency, resource efficiency, and defense against cyber threats when compared to conventional centralized systems. This research contributes to the advancement of secure and scalable IoT-cloud infrastructures and offers a viable path for industrial and smart city deployments.

Page 4 of 4 | Total Record : 36