cover
Contact Name
Nurul Hidayah
Contact Email
nurul@ubibanyuwangi.ac.id
Phone
+6282334205575
Journal Mail Official
nurul@ubibanyuwangi.ac.id
Editorial Address
Jalan Kampus Bumi Cempokosari No.40, Dusun Cempokasari, Sarimulyo, Kec. Cluring, Kabupaten Banyuwangi, Jawa Timur 68482
Location
Kab. banyuwangi,
Jawa timur
INDONESIA
Jurnal Nasional Teknik Industri, Sistem Informasi dan Teknik Informatika
ISSN : -     EISSN : 28292693     DOI : -
Jurnal TINSIKA provides a forum for publishing the original research articles from contributors related to embedded system and control, processor and IC design, network and infrastructure, and computing algorithms. The scope ofTINSIKA is as follows: embedded system based on microcomputer/microcontroller; distributed systems; cloud computing; sensor network and IoT; computer networks and security; algorithms and artificial intelligence; computer vision and pattern recognition, and mobile computing. Sofware Engineering Information System Bussiness Process Engineering Management Science and Operational Research Distribution and Logistic Management Supply Chain management Business and Management (Performance Management, Strategic Management, Human Resource Management, Marketing Management) Decision science in business and management
Articles 42 Documents
RANCANG BANGUN SISTEM INFORMASI PENYEWAAN RUMAH DI KOTA BANYUWANGI MENGGUNAKAN METODE RESEARCH & DEVELOPMENT BERBASIS WEB Sugiarto, Markus; Andayaningtyas, Novi; Akbar, Raden Ilham
Jurnal Teknik Industri, Sistem Informasi dan Teknik Informatika Vol. 3 No. 1 (2024): Jurnal Teknik Industri, Sistem Informasi, dan Teknik Informatika
Publisher : Universitas Bakti Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The advancement of Information and Communication Technology (ICT) in Indonesia has led to a significant increase in the demand for rental housing, in line with urbanization growth. This research employs the Research and Development (R&D) method to develop an efficient web-based application for house hunting. The objective is to enhance the quality of life by providing a solution to house seekers, enabling them to search for and rent homes efficiently. With this application, house hunters can access information about rental properties without the need for physical visits, saving time and effort. Thus, this research makes a valuable contribution to improving the quality of life for urbanizing communities and addressing the challenges in house hunting.
Insider Threats: The Analysis using Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE) Hakim, Luqman
Jurnal Teknik Industri, Sistem Informasi dan Teknik Informatika Vol. 3 No. 1 (2024): Jurnal Teknik Industri, Sistem Informasi, dan Teknik Informatika
Publisher : Universitas Bakti Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

A good document management can lead to a good management of cybersecurity [1] specially to prevent ransomware. Ransomware is one of the cybersecurity threats that locks the computer via encryptions and one of the ways to prevent ransomware is to detect the existence of insider threats [2]. In a study, insider threats are defined as people who work in the company, have access to the system and take intentional or unintentional actions that affect the IT system [3]. According to Ponemon Institute data, the frequency of insider threats went up 47% between 2018 and 2020, and the cost of these occurrences raised to $11.45 million. The study additionally showed that it usually takes organizations 77 days to contain an event regarding an insider threat. The statistics are concerning, and organizations need to be ready to deal with this threat [4]. For the recent years (2020 to 2022), it was increased again by 44% [5]. A study suggests that one factor in insider threats is user habits / behaviour [6]. This is what underlies this research and writing to determine user behaviour in these small companies so that they can determine whether an insider threat really exists or not by conducting a risk assessment [7].