cover
Contact Name
Dede Surya Atmaja
Contact Email
desur.atmaja@kwikkiangie.ac.id
Phone
+622165307062
Journal Mail Official
jurnal.informatikabisnis@kwikkiangie.ac.id
Editorial Address
Jl. Yos Sudarso Kav 87, Sunter Jakarta 14350
Location
Kota adm. jakarta utara,
Dki jakarta
INDONESIA
Jurnal Informatika dan Bisnis
ISSN : 23019670     EISSN : 24775363     DOI : https://doi.org/10.46806/jib.v12i2
Core Subject : Economy, Science,
Jurnal Informasi dan Bisnis (JIB) adalah jurnal yang diterbitkan oleh Institut Bisnis dan Informatika Kwik Kian Gie dengan p-ISSN 2301-9670 dan e-ISSN 2477-5363. JIB terbit dua kali dalam setahun, yakni setiap Juni dan Desember, dan telah terbit dalam bentuk cetak (buku) dan elektronik (PDF). Fokus dan bidang di JIB meliputi: Informatika, Ekonomi, Bisnis, Manajemen, Manajemen Informatika, Informatika Ekonomi, Informatika Bisnis, Pembangunan Ekonomi, Informasi Akuntansi, Manajemen Informatika Produksi, Informatika Produksi, Distribusi Informatika, Informatika Konsumen. Kami mendorong pembaca dan penulis untuk mengirimkan artikel berisi ide atau kontribusi orisinal terbaik. Naskah bisa berupa artikel riset kuantitatif, artikel riset kualitatif, artikel review, short communication, metoda riset dan rancangan sistem, dengan syarat memiliki kebaruan dan bermanfaat secara praktis dan akademis.
Articles 178 Documents
ANALISIS PERBANDINGAN ALGORITMA KRIPTOGRAFI METODE DATA ENCRYPTION STANDARD DENGAN METODE ADVANCED ENCRYPTION SYSTEM : STUDI KASUS PADA PT. ONE STANDARD GROUP PTE LTD Akhmad Budi; Arabella Chicali
Jurnal Informatika dan Bisnis Vol. 8 No. 2 (2019): Edisi Desember 2019
Publisher : Institut Bisnis dan Informatika Kwik Kian Gie

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The security system within a company is the top priority, one of its application is in web media, where it exist various confidential information in it, such as user information on the company PT. One Standard Group PTE LTD must be kept confidential not to fall into unauthorized parties, therefore a security system to address the information security is needed. The security system of modern symmetric key cryptography algorithms is considered to be able to overcome these problems which are generally divided into two, namely Data Encryption Standard (DES) dan Advanced Encryption System (AES). From the two algorithms, the author makes comparisons to obtain a more efficient algorithm in terms of security and times. The method that the author used in this research is Extreme Programming Research Methodology, with a qualitative methodological analysis technique, and in data collection author uses direct observation and literature study. The system that the author created applies additional security for user information which will be directly stored with the AES method and the DES method and the system will display the processing time of both. The conclusion that the author can achieve from this thesis is AES method cryptographic algorithms are more secure than the DES method because the AES method has double protection, but from the time aspect efficiency, the DES method cryptographic algorithms are more efficient. Keyword: Data Security, Cryptographic, AES, DES
PENGEMBANGAN APLIKASI PENCARIAN REKOMENDASI ASISTEN LABORATORIUM KOMPUTER DENGAN METODE SIMPLE ADDITIVE WEIGHTING: STUDI KASUS : INSTITUT BISNIS DAN INFORMATIKA KWIK KIAN GIE Humdiana; Michael
Jurnal Informatika dan Bisnis Vol. 8 No. 2 (2019): Edisi Desember 2019
Publisher : Institut Bisnis dan Informatika Kwik Kian Gie

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Technological developments are growing day by day. The growing technology proves that human beings are able to create new things that can help in completing their work. With the development of technology, we can also be facilitated in taking decisions, such as in choosing human resources. This research is motivated by the absence of an objective calculation in the selection of computer lab assistants, the difficulty of determining the weight in the criteria of the selection of computer lab assistants, and the selection process that is still running manually. This research is done by using NoSql Firebase as a database, using Java and XML language, and Android Studio as tools to develop this application. Researchers apply the method of Simple Additive Weighting in searching for recommendations of computer lab assistants. Information gathering was done by field study, ie direct observation and interviews with the head of computer lab assistant, and literature study such as reading books, journals, and websites as supporting reference for this research. This application was created to implement the selection of computer lab assistants to be more objective and can assist in the search of computer lab assistant recommendations. Through the research process that has been done and the application development process that has been going on, the researcher concludes that the application that the researcher produces can provide the recommendation of computer lab assistants objectively and precisely, and get the weight on each criterion well. Keywords: Simple Additive Weighting Method, Computer Laboratory Assistant, Android
DESIGN AND IMPLEMENTATION INTERNET OF THINGS (IOT) ANDROID REMOTE-CONTROLLED QUADCOPTER Budi Berlinton Sitorus
Jurnal Informatika dan Bisnis Vol. 8 No. 2 (2019): Edisi Desember 2019
Publisher : Institut Bisnis dan Informatika Kwik Kian Gie

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This Internet of Things (IoT) is leading the path to the smart world with ubiquitous computing and networking to ease different tasks around users and provide other tasks, such as easy monitoring of different phenomena surrounding us. In this research, a Wi-Fi controlled remote quadcopter is designed and built, enhanced with computing and communication technologies and join the communication framework, meeting a variety of services based on machine-to-machine interactions using wired and wireless communication. A quadcopter can be made several ways, one of them is using a simple microcontroller. In this research, Remote quadcopter is built by components such as 2300KV brushless motor, 2 pairs of the propeller, 4 ESCs, 11mAh LippoBaterry, Gyro+accelerometer board, and other quadcopter components. As the controller to the quadcopter, the Arduino Uno R3 module is utilized. The results of the research are a remote quadcopter controlled by an Android Smartphone as a combination of Arduino UNO and Wi-Fi module. The current results open many possibilities for future development for features of the quadcopter. Keywords: IoT, Remote quadcopter, Arduino
APLIKASI KENCAN ONLINE UNTUK MEMPREDIKSI TINGKAT KECOCOKAN SUATU PASANGAN BERDASARKAN SKOR SPIRITUAL QUOTIENT DAN EMOTIONAL QUOTIENT DENGAN METODE FUZZY TSUKAMOTO Sigit Birowo; Samuel Septiano
Jurnal Informatika dan Bisnis Vol. 8 No. 2 (2019): Edisi Desember 2019
Publisher : Institut Bisnis dan Informatika Kwik Kian Gie

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Seiring dengan jaman yang semakin modern, pemanfaatkan media internet bukan lagi hanya sekedar mencari informasi semata. Penggunaan internet diera saat ini juga mengarah kepada hal-hal lain seperti mendapatkan hiburan, forum diskusi, serta dalam mencari relasi pertemanan maupun pasangan. Kesulitan dalam menentukan mencari pertemanan maupun pasangan dimedia online membuat pengguna akan mengalami kesulitan dan membutuhkan waktu yang lebih lama karena dalam menentukan kecocokan Untuk itu, diusulkan suatu aplikasi yang dapat menampilkan persentase kecocokan pasangan berdasarkan skor kecerdasan spiritual (Spiritual Quotient) dan kecerdasan emosional (Emotional Quotient) antar pasangan. Dengan logika fuzzy, persentase kecocokan dapat dikalkulasi dengan Fuzzy Inference System dengan metode Tsukamoto. Input yang dibutuhkan adalah skor SQ dan EQ pengguna. Basis pengetahuan dibangun dengan menggunakan kaidah produksi (IF-THEN). Fire strength yang diperoleh pada setiap aturan fuzzy untuk setiap selisih SQ dan EQ pada basis pengetahuan, kemudian dikomposisikan dengan menggunakan rata-rata terbobot. Hasil dari rata-rata terbobot ini merupakan output tingkat kecocokan pasangan. Kata kunci: Aplikasi Berbasis Web, Kencan Online, Kecerdasan Spiritual, Kecerdasan Emosional, Logika fuzzy, Fuzzy Inference System, Metode Tsukamoto.
PENGEMBANGAN APLIKASI ODOO DENGAN COMMAND LINE INTERFACE TERHADAP WAREHOUSE MANAGEMENT SYSTEM MENGGUNAKAN MODEL EXTREME PROGRAMMING: STUDI KASUS: PT INDOGUNA UTAMA Elis Sondang Dasawati; Brosky Samson Putra Halim
Jurnal Informatika dan Bisnis Vol. 8 No. 2 (2019): Edisi Desember 2019
Publisher : Institut Bisnis dan Informatika Kwik Kian Gie

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

In the ongoing system, ERP Odoo has been used. However, the data input process become longer. This data input process based on GUI (Graphical User Interface). Interaction that occurs between user and computer is very much, thus slowing the input process. Therefore, a CLI-based system (Command Line Interface) is made to receives the main input in the form of barcode.In the system that has been created, researcher uses weight information that contained in the LOT code. User only have to scan LOT code using barcode scanner device, and system will process the data.The CLI-based system make the data input process become faster, because the weight of goods information already contained in the LOT code. User only need to input the LOT code and the system will convert it to weight for each box. Keyword: Command Line Interface, Warehouse Management System, Enterprise Resource Planning, Extreme Programming.
PENERAPAN FUZZY DATABASE TAHANI PADA APLIKASI PEREKRUTAN KARYAWAN Budi Wasito; Hartawan Budiman
Jurnal Informatika dan Bisnis Vol. 8 No. 2 (2019): Edisi Desember 2019
Publisher : Institut Bisnis dan Informatika Kwik Kian Gie

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

PT XYZ is a company that provides consulting services, software, and hardware. In conducting its business PT XYZ requires human resources. The existence of human resources needs to make PT XYZ need to recruit employees. Currently, PT XYZ still uses a manual system in its recruitment process starting from the candidate selection process of employee, recording progress of candidate of the employee, process of data archiving of the candidate, until notification to parties related to the recruitment process. The absence of integration of employee candidate data files between recruiters causes refractions of each recruiter to be limited only to the recruiter candidate's data re-fertion. Psychotest process that is applied also still use application-based desktop application. This leads to a psychotest stage for an employee candidate who is outside the city to be performed by the service bureau. Keywords: Recruitment, Fuzzy Tahani, laravel
RANCANGAN SCREENING STRES KERJA DENGAN METODE FORWARD CHAINING BERBASIS ANDROID Levina; Sigit Birowo
Jurnal Informatika dan Bisnis Vol. 9 No. 1 (2020): Edisi Juni 2020
Publisher : Institut Bisnis dan Informatika Kwik Kian Gie

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

In this age of globalization, technology is developing drastically and globally. Technological advances in various fields have been used by humans to make work fast and efficient. This research was motivated by the problem of the lack of public knowledge about work stress, the difficulty of screening on oneself without meeting experts, and not having received an application for job stress screening. Researcher uses the theories of data, systems, and information systems. Researcher also writes information about screening and job stress. This research is developed using Android Studio as a tool and using the Java language to develop this application. Researchers applied the Forward Chaining method in determining the results of job stress screening. Informastion gathering was done by field study, direct observation and interviews with child and adolescent psychiatrist, Dr. dr. Surilena, SpKJ(K)., and literature study such as reading books, journals and website as supporting reference for this research. This application was made to carry out job stress screening based on knowledge from experts to detect the risk and help in conducting consultations between users and experts. Through step by step research and program development, researcher concludes that the application that researcher made can determine symptoms of job stress risk based on expert konwledges and conduct consultation between users and experts. Key words : Forward chaining, Screening, Job Stress, Android
APLIKASI PERENCANAAN STRATEGIS SISTEM INFORMASI MENGGUNAKAN FRAMEWORK WARD DAN PEPPARD PADA PT KODING NEXT INDONESIA Nata Nael; Elis Sondang Dasawati
Jurnal Informatika dan Bisnis Vol. 9 No. 1 (2020): Edisi Juni 2020
Publisher : Institut Bisnis dan Informatika Kwik Kian Gie

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Koding Next Indonesia is a company engaged in the field of programming courses. To get competitive m advantage a company must have a good strategic planning. Broadly speaking, this study aims to design an information system strategic planning along with a recommended application portfolio and to produce applications that can help Koding Next Indonesia in conducting strategic planning in the future. The framework used in conducting information systems strategic planning is the Ward and Peppard framework. In conducting data analysis methods used include SWOT Analysis, Value Chain Analysis and Five Forces Analysis used for analysis of internal and external business environments. The McFarlan portfolio is used to map application portfolios that currently exist and to map application recommendations. In the end, this research resulted in an information system strategy and application portfolio that will support the company in achieving its stated goals and produce an application that can help companies carry out strategic information systems planning in the future. Kata Kunci— Perencanaan Strategis Sistem Informasi, Ward and Peppard Model, Analisis SWOT, Analisis Five Forces, Analisis Value Chain
IMPLEMENTASI SISTEM PAKAR DALAM MEMPREDIKSI POTENSI SIFAT BULLYING SESEORANG MENGGUNAKAN METODE FORWARD CHAINING Sphensen Sander; Akhmad Budi
Jurnal Informatika dan Bisnis Vol. 9 No. 1 (2020): Edisi Juni 2020
Publisher : Institut Bisnis dan Informatika Kwik Kian Gie

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Technology developments are growing rapidly and give benefits in various aspects of human’s life, especially in education. The technological development in education can be used to predict bullying. This research is conducted because the society still underestimates the case of bullying, using manual way to know the potency of bullying, and some schools in Indonesia still have not given any test to predict the bullying among the students. The researcher aimed to design, construct and implement the expert system. The researcher uses system theory, experts, expert system, web, research method and bullying theory. In order to predict the potential of bullying, this research implements the forward chaining method. The data is collected by observing and interviewing counseling teacher from Santo Yoseph Senior High School, and by reading books, journals and websites as references to support this research. The researcher implements prototype model approach for this research. This Application is created in order to predict the potential of bullying in Santo Yoseph Senior High School students based on the phenomenon and calculation from the Counseling Teacher by using Forward Chaining method, and explaining the application process in the form of Use Case Diagram, use case description, sequence diagram, class diagram, entity relationship diagram and site map. The Application development is expected to be useful for Counseling Teacher in Santo Yoseph Senior High School to predict the potential of bullying among the students. Keyword : Forward chaining, bullying, expert system.
AUDIT TATA KELOLA TEKNOLOGI INFORMASI MENGGUNAKAN KERANGKA KERJA CONTROL OBJECTIVE FOR INFORMATION AND RELATED TECHNOLOGY (COBIT) VERSI 4.1 PADA DOMAIN ACQUIRE AND IMPLEMENT (STUDI KASUS: INSTITUT BISNIS DAN INFORMATIKA KWIK KIAN GIE) Abigail Angelica; Budi Wasito
Jurnal Informatika dan Bisnis Vol. 9 No. 1 (2020): Edisi Juni 2020
Publisher : Institut Bisnis dan Informatika Kwik Kian Gie

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Institut Bisnis dan Informatika Kwik Kian Gie has the main goal of "being one of the leading schools of business in Indonesia with regional and international insight with superior quality based on world-class university standards". One of the criteria to become a world-class university standard is to apply good IT governance to institutions. Therefore, it is necessary to hold a process of assessing the level of maturity of the information technology governance process, especially in the process that is being carried out. The measurement of the level of maturity is carried out using the Control Objective for Information and Related Technology (COBIT) version 4.1 framework in the Acquire and Implement domain by comparing the findings with the standard maturity level of COBIT. The results of this level of maturity assessment are the level of maturity at Institut Bisnis dan Informatika Kwik Kian Gie is still at level two or repeatable but intuitive. Therefore, there needs to be an improvement to increase the level of maturity to reach the criteria of a world-class university.

Page 11 of 18 | Total Record : 178