Journal of Information Technology and Cyber Security
Journal of Information Technology and Cyber Security (JITCS) is a refereed international journal whose focus is on exchanging information relating to Information Technology and Cyber Security in industry, government, and universities worldwide. The thrust of the journal is to publish papers dealing with the the design, development, testing, implementation, and/or management of Information Technology and Cyber Security, and also to provide practical guidelines in the development and management of these systems. The journal will publish papers in Information Technology and Cyber Security in the areas of, but not limited to: 1. Enterprise Systems (ES): o Enterprise Resource Planning, o Business Process Management, o Customer Relationship Management, o System Dynamics, o E-business and e-Commerce, o Marketing Analytics, o Supply Chain Management and Logistics, o Business Analytics and Knowledge Discovery, o Production Management, o Task Analysis, o Process Mining, o Discrete Event Simulation, o Service Science and Innovation, and o Innovation in the Digital Economy. 2. Information Systems Management (ISM): o Software Engineering, o Software Design Pattern, o System Analysis and Design, o Software Quality Assurance, o Green Technology Strategies, o Strategic Information Systems, o IT Governance and Audits, o E-Government, o IT Service Management, o IT Project Management, o Information System Development, o Research Methods of Information Systems, o Adoption and Diffusion of Information Technology, o Health Information Systems and Technology, o Accounting Information Systems, o Human Behavior in Information System, o Social Technical Issues and Social Inclusion, o Domestication of Information Technology, o ICTs and Sustainable Development, o Information System in developing countries, o Software metric and cost estimation, o IT/IS audit, and o IT Risk and Management. 3. Data Acquisition and Information Dissemination (DAID): o Open Data, o Social Media, o Knowledge Management, o Social Networks, o Big Data, o Web Services, o Database Management Systems, o Semantics Web and Linked Data, o Visualization Information, o Social Information Systems, o Social Informatics, o Spatial Informatics Systems, and o Geographical Information Systems. 4. Data Engineering and Business Intelligence (DEBI): o Business Intelligence, o Data Mining, o Intelligent Systems, o Artificial Intelligence, o Autonomous Agents, o Intelligent Agents, o Multi-Agent Systems, o Expert Systems, o Pattern Recognition, o Machine Learning, o Soft Computing, o Optimization, o Forecasting, o Meta-Heuristics, o Computational Intelligence, and o Decision Support Systems. 5. IT Infrastructure and Security (ITIS): o Information Security and Privacy, o Digital Forensics, o Network Security, o Cryptography, o Cloud and Virtualization, o Emerging Technologies, o Computer Vision and Image, o Ethics in Information Systems, o Human Computer Interaction, o Wireless Sensor Networks, o Medical Image Analysis, o Internet of Things, o Mobile and Pervasive Computing, o Real-time Systems and Embedded Systems, o Parallel and Distributed Systems, o Cyber attacks, o Machine learning mechanisms for cyber security, o Modern tools for improving cyber security, o Emerging trends in cyber security, o Cyber security in Internet of Things (IoT), and o Cyber security in Cloud.
Articles
5 Documents
Search results for
, issue
"Vol. 2 No. 2 (2024): July"
:
5 Documents
clear
Enhancing Project Management and Monitoring with Precedence Diagram and Earned Value Method: A Case Study in Construction
Rachmatullah, Sholeh;
Said, Badar;
Ramadhani, Nilam;
Alvionita, Vina
Journal of Information Technology and Cyber Security Vol. 2 No. 2 (2024): July
Publisher : Department of Information Systems and Technology, Faculty of Intelligent Electrical and Informatics Technology, Universitas 17 Agustus 1945 Surabaya
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30996/jitcs.11801
An increasing number of projects has created challenges in effectively planning, organizing, and maintaining projects. Project planning becomes a crucial aspect of project management, particularly for monitoring progress and efficiently allocating resources. This study aims to implement the precedence diagram and earned value methods to enhance project management and monitoring. The predence diagram method is used to estimate project completion time, while the earned value method tracks time and budget according to project progress. In this case study, project management activities at CV. Firman Syah are observed. The development process starts with data collection and requirements analysis (functional and non-functional), followed by system architecture design using use case diagrams and Data Flow Diagram (DFD). The database is implemented using MySQL, and the application runs on an Apache web server. Vue.js is used for front-end development, while Lumen is employed for back-end development. The results of Black Box testing indicate that the application is capable of predicting project completion time and associated costs, as well as managing project data.
Utilizing Prolog for Automatic Transformation of English Words
Barkah, Nida Muhliya;
Siregar, Maria Ulfah
Journal of Information Technology and Cyber Security Vol. 2 No. 2 (2024): July
Publisher : Department of Information Systems and Technology, Faculty of Intelligent Electrical and Informatics Technology, Universitas 17 Agustus 1945 Surabaya
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30996/jitcs.11936
Artificial Intelligence is a branch of computer science that focuses on developing systems that emulate human intelligence to execute commands or tasks by applying the concept of automatic reasoning. Automatic reasoning is the ability of a system to draw logical conclusions, make decisions, and solve problems independently, without human intervention, based on provided information or rules. The complexity of grammatical rules in English often causes difficulties in understanding and remembering them, hindering mastery of correct English structures. To address these challenges, this research uses automatic reasoning as the primary foundation for developing automatic transformation systems for English words—specifically, transforming singular nouns into plural forms and adjectives into adverbs of manner. The objective of this research is to apply grammatical rules during word transformation in Prolog. Furthermore, this study tests the effectiveness and accuracy of the process by evaluating the success rate of correct transformations. The system's performance is assessed by comparing the transformed words to their correct plural forms and corresponding adverbs of manner, based on predefined grammatical rules. This research does not involve participants directly but evaluates the system's performance on a set of predefined words. The results demonstrate that the system successfully transformed all tested words with 100% accuracy, effectively altering their structure. This indicates that the system is both effective and reliable for use in English language learning. Additionally, the system's high accuracy in handling various morphological transformations makes it a valuable tool for improving English grammar and writing skills.
Risk Management Analysis of Information Security in an Academic Information System at a Public University in Indonesia: Implementation of ISO/IEC 27005:2018 and ISO/IEC 27001:2013 Security Controls
Meitarice, Sonya;
Febyana, Lidya;
Fitriansyah, Aidil;
Kurniawan, Rahmad;
Nugroho, Riki Ario
Journal of Information Technology and Cyber Security Vol. 2 No. 2 (2024): July
Publisher : Department of Information Systems and Technology, Faculty of Intelligent Electrical and Informatics Technology, Universitas 17 Agustus 1945 Surabaya
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30996/jitcs.12099
An online academic information system is potentially exposed to various threats from internal and external sources, which may compromise the institution's objectives if not managed effectively and appropriately. Academic portals often experience issues such as server downtime and unauthorised access attempts. However, there is no specific documentation dedicated to managing these issues. This study aims to analyze risk management in information security for the academic portal of Universitas Riau, Indonesia. The study employs the International Organization for Standardization (ISO)/International Electrotechnical Commission (IEC) 27005:2018 standard and ISO/IEC 27001:2013 security controls, following four key stages: context establishment, risk assessment, risk treatment, and recommendations. The findings identify eight categories of information system assets, 30 identified threats, and 43 vulnerabilities, including two high-risk categories, 19 medium-risk categories, and 22 low-risk categories. Of the 43 vulnerabilities, 21 risks required risk modification, four required risk avoidance, and four required risk sharing. Fourteen risks, which can be managed through risk retention (acceptance of risk), fall under the category of risk acceptance. Furthermore, ISO/IEC 27001 suggests that implementing control recommendations can minimize and effectively address these risks. Nevertheless, this study focuses primarily on information security risks and does not extensively cover related areas such as data privacy, regulatory compliance, or operational risks. Future research can explore the effectiveness of training programs and awareness campaigns in reducing human-related risks, such as phishing and social engineering attacks.
The Waterfall Model in the Implementation of a Room Reservation Information System: A Case Study at a University
Setiawan, Akas Bagus;
Rizaldi, Taufiq
Journal of Information Technology and Cyber Security Vol. 2 No. 2 (2024): July
Publisher : Department of Information Systems and Technology, Faculty of Intelligent Electrical and Informatics Technology, Universitas 17 Agustus 1945 Surabaya
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30996/jitcs.12248
Politeknik Negeri Jember (National State of Jember Polytechnic), Indonesia, fully understand that infrastructure is one among various key factors to enhance the quality of the university. However, in the department of Information Technology, infrastructure management is a prominent issue. The primary cause of the issue appears to be a manual arrangement of room reservations, as room usage often crashes due to the scheduling mismatch. To tackle this issue, this study focuses on the development of a room reservation information system, known as “Sistem Informasi Peminjaman Ruangan dan Sarana Pembelajaran (SIPRu)”. The system is developed as an additional feature in the department website. It is developed using the Waterfall method, beginning with the requirements analysis (i.e., an identification of functional and non-functional requirements) and architectural processes design processes (i.e., the development of use case diagram, flowchart, data flow diagram, and database design). In this study, Laravel is used for the implementation, and black box testing is used to verify compliance with the functional requirements. During the testing process, 42 department stakeholders participated to validate the requirements and conduct user experience testing. The results indicated that the stakeholders have found the website to be sufficiently responsive to their needs. Furthermore, it is revealed that SIPRu is effective at assisting users in reserving rooms at the department of Information Technology, National State of Jember Polytechnic.
Dialect Classification of the Javanese Language Using the K-Nearest Neighbor
Filby, Brilliant;
Pujianto, Utomo;
Hammad, Jehad A. H.;
Wibawa, Aji Prasetya
Journal of Information Technology and Cyber Security Vol. 2 No. 2 (2024): July
Publisher : Department of Information Systems and Technology, Faculty of Intelligent Electrical and Informatics Technology, Universitas 17 Agustus 1945 Surabaya
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30996/jitcs.12213
Indonesia is rich in ethnic and cultural diversity, each reflected in its unique linguistic characteristics. One way to preserve the Javanese language is by conducting research on its dialects. This study aims to classify three main dialects in Java Island—East Java, Central Java, and West Java—using text data from online sources. The classification process includes preprocessing (tokenizing, case folding, and word weighting), data balancing with the Synthetic Minority Oversampling Technique (SMOTE), and classification using the K-Nearest Neighbor (K-NN) algorithm. This study highlights the importance of dialect recognition in supporting the preservation of the Javanese language and the development of linguistic technology applications. Testing using 10-fold cross-validation showed the best performance at , with an accuracy of 94.05%, precision of 95.83%, and recall of 94.44%. These findings significantly support computational linguistics research and the preservation of regional languages.