cover
Contact Name
Ardi Susanto
Contact Email
ardisusanto@poltektegal.ac.id
Phone
-
Journal Mail Official
informatika.ejournal@poltektegal.ac.id
Editorial Address
Gedung B, Politeknik Harapan Bersama, Jl Mataram No 9 Pesurungan Lor Kota Tegal
Location
Kota tegal,
Jawa tengah
INDONESIA
Jurnal Informatika: Jurnal Pengembangan IT
ISSN : 24775126     EISSN : 25489356     DOI : https://doi.org/10.30591
Core Subject : Science,
The scope encompasses the Informatics Engineering, Computer Engineering and information Systems., but not limited to, the following scope: 1. Information Systems Information management e-Government E-business and e-Commerce Spatial Information Systems Geographical Information Systems IT Governance and Audits IT Service Management IT Project Management Information System Development Research Methods of Information Systems Software Quality Assurance 2. Computer Engineering Intelligent Systems Network Protocol and Management Robotic Computer Security Information Security and Privacy Information Forensics Network Security Protection Systems 3. Informatics Engineering Software Engineering Soft Computing Data Mining Information Retrieval Multimedia Technology Mobile Computing Artificial Intelligence Games Programming Computer Vision Image Processing, Embedded System Augmented/ Virtual Reality Image Processing Speech Recognition
Articles 15 Documents
Search results for , issue "Vol 9, No 1 (2024)" : 15 Documents clear
Analisis Risiko IT untuk Pemanfaatan Tools Genogram pada Health care sukmadiningtyas, sukmadiningtyas; Fathoni, M Yoka
Jurnal Informatika: Jurnal Pengembangan IT Vol 9, No 1 (2024)
Publisher : Politeknik Harapan Bersama

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30591/jpit.v9i1.6418

Abstract

This research analysis the genogram tool uses to record a person's health history as a medium for supporting health. This research analyzes the risks that might occur in a polyclinic if a genogram tool is implemented. The analysis process is through a risk identification process then a risk assessment using the COBIT for Risk IT method as IT resource mapping, then qualitative analysis as a method of mapping possibilities and impacts according to FGDs with organizations which can be used as a guide in assessing risks. level. Meanwhile, bow tie analysis is a risk mapping method that allows risk recovery so that it can serve as a guide for recovery. The results of risk analysis using the Genogram tool show several conditions, namely low probability but high level of impact, low probability but medium impact, and high probability of impact.
Rancang Bangun Aplikasi Keuangan Untuk Mengatur Jumlah Pengeluaran Pribadi Berbasis Android Hastedi, Dimas Rian
Jurnal Informatika: Jurnal Pengembangan IT Vol 9, No 1 (2024)
Publisher : Politeknik Harapan Bersama

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30591/jpit.v9i1.5980

Abstract

Not everyone is able to manage their finances well. Consumptive lifestyles and lack of awareness about the importance of managing finances make a person unable to escape financial problems. In an effort to reduce the impact of existing problems, everyone should have the awareness and effort to manage their finances by recording their financial expenses regularly. In modern times and the rapid development of technology like today, almost everyone has a mobile device at least one Android device. By utilizing existing technology, various things can be done using only their Android devices such as shopping, communicating with someone even though it is quite far away or even to record financial activities. By identifying and collecting data and interviews from related problems, this research aims to be a solution for someone in managing their finances by recording every financial activity in an existing application and making the use of stationery and books to record and recap every expense can be abandoned. With this application, a person can easily record finances anytime and anywhere without fear of losing the notes that have been made. As a result, it is hoped that eating will become wiser and know how much and where the money is spent so that the record can be used as a picture of a person in controlling their money.
Implementasi Smart Helmet Cabinet pada Penyimpanan Helm Berbasis Mobile QR Code Abdahu, Muhammad Raymount; Ristian, Uray; Hasfani, Hirzen
Jurnal Informatika: Jurnal Pengembangan IT Vol 9, No 1 (2024)
Publisher : Politeknik Harapan Bersama

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30591/jpit.v9i1.6593

Abstract

The use of Smart Helmet Cabinet in helmet storage based on Mobile QR Code has been implemented as an innovative solution to overcome the problem of safe and efficient helmet storage. By utilizing QR Code technology, authentication on the system facilitates users in the process of helmet storage and retrieval, as well as ensuring storage security. In addition, several challenges such as the need for reliable access authentication and reduction of access delay are the main focus to improve the effectiveness and reliability of the system. This research discusses the implementation of the Smart Helmet Cabinet by highlighting the benefits as well as potential future developments in improving user experience and security of stored helmets. The ESP32-CAM is used to scan the QR Code to authenticate user access, while the ESP32 NodeMCU controls the relay to open the door of the locker. The test results show that the average delay time for adding locker access is about 4.73 seconds, while access authentication using QR Code takes about 5.99 seconds. The implemented Smart Helmet Cabinet system is able to determine which lockers are given access and identify users by using QR Code as access authentication on the lockers
Pengumpulan Informasi pada Situs Web Dengan Menyusun Kerangka Kerja Keamanan Siber NIST Wibowo, Dega Surono; Nishom, M.; Abidin, Taufiq
Jurnal Informatika: Jurnal Pengembangan IT Vol 9, No 1 (2024)
Publisher : Politeknik Harapan Bersama

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30591/jpit.v9i1.6536

Abstract

In the current era, the rapid development of websites has made them one of the most significant modern information media. Website creation is not only focused on the design and information presented, but also focuses on security aspects. The presence of security on a website is very important, considering the need to protect the data and information contained therein. Information Gathering is one method used to test a website's security. This information gathering is the earliest stage to obtain ownership and other sensitive information. This research aims to conduct security testing of the oase.poltektegal.ac.id website using tools in the form of penetration testing software; then, the testing results are entered into the cybersecurity framework issued by N.I.S.T. The test results obtained and adjusted to N.I.S.T. Cybersecurity are that the oase.poltektegal.ac.id website has vulnerabilities in the form of CVE-2003-1418 (apache webserver vulnerability), CVE-2005-3299 (PHP vulnerability), CVE-2010-4344 ( Buffer Overflow Vulnerability), CVE-2007-6750 (XSS). The solution to this vulnerability is updating the software and closing unused ports. These results will be used as a benchmark in creating or improving similar websites to increase awareness and vigilance in achieving cyber resilience
Optimalisasi Penggunaan Sensor Pada Sistem Penyiraman Tanaman Kangkung Menggunakan Metode WSN Patriana, Ari; Arip, Arip; Fauzi, Willy Muhammad
Jurnal Informatika: Jurnal Pengembangan IT Vol 9, No 1 (2024)
Publisher : Politeknik Harapan Bersama

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30591/jpit.v9i1.5811

Abstract

Water spinach is one of the agricultural products that is often consumed by Indonesian people, so it has very high market demand. However, there are still many farmers who use the traditional method of watering plants by carrying water so that it does not increase plant productivity. This is also a problem because farmers are at risk of developing MSDs (musculoskeletal disorders). To support high market demand, technology is needed that can help farmers in the process of watering plants with high effectiveness and efficiency. In this research, optimization of the use of sensors was carried out using WSN (Wireless Sensor Network) to overcome the problem of increasing scale on large areas of land to be able to monitor park land and control the watering process. This system uses several sensors, including a water pressure sensor, waterflow sensor, soil pH sensor and soil moisture sensor. Apart from that, this research also created a warning system and recommendation system to help farmers in making decisions regarding plantation management. Farmers can monitor garden land and control watering from anywhere via the web application that has been created

Page 2 of 2 | Total Record : 15