Journal of Information Technology and Cyber Security
Journal of Information Technology and Cyber Security (JITCS) is a refereed international journal whose focus is on exchanging information relating to Information Technology and Cyber Security in industry, government, and universities worldwide. The thrust of the journal is to publish papers dealing with the the design, development, testing, implementation, and/or management of Information Technology and Cyber Security, and also to provide practical guidelines in the development and management of these systems. The journal will publish papers in Information Technology and Cyber Security in the areas of, but not limited to: 1. Enterprise Systems (ES): o Enterprise Resource Planning, o Business Process Management, o Customer Relationship Management, o System Dynamics, o E-business and e-Commerce, o Marketing Analytics, o Supply Chain Management and Logistics, o Business Analytics and Knowledge Discovery, o Production Management, o Task Analysis, o Process Mining, o Discrete Event Simulation, o Service Science and Innovation, and o Innovation in the Digital Economy. 2. Information Systems Management (ISM): o Software Engineering, o Software Design Pattern, o System Analysis and Design, o Software Quality Assurance, o Green Technology Strategies, o Strategic Information Systems, o IT Governance and Audits, o E-Government, o IT Service Management, o IT Project Management, o Information System Development, o Research Methods of Information Systems, o Adoption and Diffusion of Information Technology, o Health Information Systems and Technology, o Accounting Information Systems, o Human Behavior in Information System, o Social Technical Issues and Social Inclusion, o Domestication of Information Technology, o ICTs and Sustainable Development, o Information System in developing countries, o Software metric and cost estimation, o IT/IS audit, and o IT Risk and Management. 3. Data Acquisition and Information Dissemination (DAID): o Open Data, o Social Media, o Knowledge Management, o Social Networks, o Big Data, o Web Services, o Database Management Systems, o Semantics Web and Linked Data, o Visualization Information, o Social Information Systems, o Social Informatics, o Spatial Informatics Systems, and o Geographical Information Systems. 4. Data Engineering and Business Intelligence (DEBI): o Business Intelligence, o Data Mining, o Intelligent Systems, o Artificial Intelligence, o Autonomous Agents, o Intelligent Agents, o Multi-Agent Systems, o Expert Systems, o Pattern Recognition, o Machine Learning, o Soft Computing, o Optimization, o Forecasting, o Meta-Heuristics, o Computational Intelligence, and o Decision Support Systems. 5. IT Infrastructure and Security (ITIS): o Information Security and Privacy, o Digital Forensics, o Network Security, o Cryptography, o Cloud and Virtualization, o Emerging Technologies, o Computer Vision and Image, o Ethics in Information Systems, o Human Computer Interaction, o Wireless Sensor Networks, o Medical Image Analysis, o Internet of Things, o Mobile and Pervasive Computing, o Real-time Systems and Embedded Systems, o Parallel and Distributed Systems, o Cyber attacks, o Machine learning mechanisms for cyber security, o Modern tools for improving cyber security, o Emerging trends in cyber security, o Cyber security in Internet of Things (IoT), and o Cyber security in Cloud.
Articles
5 Documents
Search results for
, issue
"Vol. 2 No. 1 (2024): January"
:
5 Documents
clear
Classification Techniques in Finding Malignant Breast Cancer Detection
Whardana, Adithya Kusuma;
Mufti, Abdul Latief;
Hermawan, Hendar;
Aziz, Umar Alfaruq Abdul
Journal of Information Technology and Cyber Security Vol. 2 No. 1 (2024): January
Publisher : Department of Information Systems and Technology, Faculty of Intelligent Electrical and Informatics Technology, Universitas 17 Agustus 1945 Surabaya
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30996/jitcs.8829
The most fundamental aspect of cancer is that it is marked by abnormal and uncontrolled cell growth, allowing it to spread to the surrounding areas of existing tissues. One of the most common cancers experienced by people in Indonesia, according to the Indonesian Ministry of Health, is breast cancer. The diagnosis of diseases, especially cancer, also requires a visual form that is later used as an image to determine the condition within the patient's organs. The use of mammography images is one implementation of X-rays aimed at revealing the structure of human bones and tissues. The use of images is also recognized in information technology in the field of digital image processing, which is useful for analyzing, enhancing, compressing, and reconstructing images using a collection of computational techniques. One application of digital image processing techniques for breast mammography images is recognizing the possibility of breast cancer through computer automation using classification methods supported by googlepredict.net architectures. The results obtained in this study use a dataset sourced from King Abdul Aziz University, totaling 2378 images. The method used in this research is Convolutional Neural Network (CNN), with the addition of the GoogleNet architecture. The convolution extraction method runs with the GoogleNet architecture, enhancing deep learning for optimal breast cancer recognition. The overall results of this study found an average precision value of 90%, recall of 92%, F-1 Score of 91.49%, and accuracy of 91.49%.
Agile Implementation for Inventory (Case study: Business Unit of Private University)
Swastyastu, Cempaka Ananggadipa;
Shanty, Ratna Nur Tiara;
Sari, Rika Puspita;
Wikanningrum, Anggit
Journal of Information Technology and Cyber Security Vol. 2 No. 1 (2024): January
Publisher : Department of Information Systems and Technology, Faculty of Intelligent Electrical and Informatics Technology, Universitas 17 Agustus 1945 Surabaya
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30996/jitcs.10060
The Unitomo Employee and Lecturer Business unit in the city of Surabaya, Indonesia, has several problems arising from the implementation of a manual system in the form of a paper-based system, which has the potential risks, such as 1) Damage and Risk of data loss, 2) Ineffectiveness in making reports; 3) Increased risk of human error caused by transaction volume, lack of management, and non-integration data; 4) Limited user accesses to the ledger, Time-consuming processes, and no collaboration. This research aims to overcome this problem by developing an inventory recording system using an Agile approach with the Scrum framework, PHP with the Slim 3 framework, MySQL, black box testing, and adding revenue and sales features as a difference from previous research. The research results show that the system developed was successful in helping Unitomo Business unit employees and lecturers overcome their problems, especially in monitoring the amount of inventory stock. The proposed system has features for recording incoming and outgoing goods transactions and sales and income reports. The use of the Agile Scrum method in software development helps teams in project planning and monitoring progress throughout the design process.
Efficiency in Cloud Computing through Serverless and Green Computing based on Microarchitecture
Fahira, Fahira;
Awangga, Rolly Maulana;
Gopikrishnan, Sundaram
Journal of Information Technology and Cyber Security Vol. 2 No. 1 (2024): January
Publisher : Department of Information Systems and Technology, Faculty of Intelligent Electrical and Informatics Technology, Universitas 17 Agustus 1945 Surabaya
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30996/jitcs.10479
PT Pelindo Multi Terminal is a subholding of PT Pelabuhan Indonesia (Persero), a State-Owned Enter-prise (SOE). PT Pelindo Multi Terminal carries out Kesehatan dan Keselamatan Kerja (K3) or Occupa-tional Health and Safety (OHS) monitoring, which currently still uses manual methods with paper. This method causes problems, such as delays in decision making and the inability to monitor events in real-time. This research aims to overcome these problems by proposing an application called "Portsafe+". Portsafe+ is developed using microservices architecture and micro frontend, with Progressive Web Apps (PWA) as the interface and Google Cloud Function as the backend. Portsafe+ was tested by measuring the response speed of the backend that responds to each request. The test results show that this application improves the response speed with 99% execution time of 880.37 ms. Based on the test results, Portsafe+ successfully overcomes the existing problems. The application of PWA technol-ogy facilitates access and improves the efficiency of OHS management compared to the previously used paper-based manual system.
Supervised Learning Methods Comparison for Android Malware Detection Based on System Calls Referring to ARM (32-bit/EABI) Table
Alhamri, Rinanza Zulmy;
Cinderatama, Toga Aldila;
Eliyen, Kunti;
Izzah, Abidatul
Journal of Information Technology and Cyber Security Vol. 2 No. 1 (2024): January
Publisher : Department of Information Systems and Technology, Faculty of Intelligent Electrical and Informatics Technology, Universitas 17 Agustus 1945 Surabaya
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30996/jitcs.10511
Android malware detection research is a topic that is still being developed. From all the detection techniques developed, dynamic analysis methods have become interesting because they trace the suspect application system calls. Based on the system calls, by utilizing machine learning, the suspect application can be classified as malware or benign. Comparing the machine learning methods is im-portant to determine what method is best to support malware detection. This article aims to explain more clearly and simply the way to conduct Android malware detection based on system calls step by step using classification. Furthermore, it presents the system calls sequence conversion referring to the arm(32-bit/EABI) table, which has 398 system calls (0-397) as features. It will provide a compari-son of several supervised machine-learning methods for classifying Android applications. This initial research is part of the other research that has the purpose of developing a malware detection system based on an Android application. This research can be used to develop the best machine learning to classify malware applications using a Support Vector Machine (SVM), Decision Tree (DT), K-Nearest Neighbour (KNN), and Naive Bayes (NB). The result can be concluded that the KNN method has the lowest performance in detecting Android malware apps, with an accuracy of only 0.50. In comparison, the NB method has an accuracy of only 0,69. SVM and DT models have similar accuracy and recall results of 0.79 and 0.75, respectively, but DT obtained higher precision and scores of 0.83 and 0.76, respectively. Although in this study, the classification performance of DT is better than SVM, based on comparison with the results of previous research, SVM is a suitable method for Android malware de-tection based on system calls. It is proven by the results of research comparisons that the SVM method is always the method with the highest accuracy score among other methods. For the next research, the SVM method can be used to develop a malware detection system for Android applications.
Identifying Dominant Actors of Ferdy Sambo's Case Network on Social Media X/Twitter Using Social Network Analysis for Public Relations Strategy
Prastiti, Novi;
Satoto, Budi Dwi;
Efendi, Moch Rizal
Journal of Information Technology and Cyber Security Vol. 2 No. 1 (2024): January
Publisher : Department of Information Systems and Technology, Faculty of Intelligent Electrical and Informatics Technology, Universitas 17 Agustus 1945 Surabaya
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30996/jitcs.10852
The Indonesian National Police (Polri) has experienced ups and downs in building a positive image in interacting with the public. This decline in trust is caused by the emergence of various issues that show the low performance of the police. In the Ferdy Sambo case study, the performance and integrity of the police is at stake and the sensitivity of the police to meet public expectations. One solution to im-prove the image is through an effective public relations strategy. However, to develop it, a deep un-derstanding of the characteristics and interaction patterns between social media through social net-work analysis is required. This research aims to identify influential X/Twitter actors in the case study of Inspector General Ferdy Sambo by applying the centrality method in Social Network User Analysis. The results of centrality analysis on the network show a wide variety of centrality levels. The @Zaindamai account dominates with the highest Degree Centrality value of 0.426829, indicating the number of connections in the network. The main role in disseminating information is held by @Zaindamai with the highest Betweenness Centrality value of 0.325748, indicating its role in connect-ing various networks. @Rizkynu46127931 stands out in Closeness Centrality with a high value of 0.497791, signifying quick and efficient access to all parts of the social network. In addition, @Rizkynu46127931 has significant influence in the network based on the highest Eigenvector Cen-trality of 0.245625. This centrality value forms the basis for formulating a more focused public relations strategy, improving the efficiency of communication with stakeholders, and designing a more concrete public relations plan.