cover
Contact Name
M. Miftach Fakhri
Contact Email
fakhri@diginus.id
Phone
+6282348761241
Journal Mail Official
fajarb@diginus.id
Editorial Address
Antang, Makassar, South Sulawesi, Indonesia
Location
Kota makassar,
Sulawesi selatan
INDONESIA
Journal of Progressive Information, Security, Computer and Embedded System
ISSN : 2986724X     EISSN : 29867258     DOI : https://doi.org/10.61255/pisces
Focus and Scope, PISCES scientific journal encompasses all aspects of the latest outstanding research and developments in the field of Computer science including: Artificial intelligence, Data science, Databases, Computer performance analysis, Computer security and cryptography, Computer networks, Parallel and distributed systems, Microcontroller, Internet of Things, Software engineering.
Articles 4 Documents
Search results for , issue "Vol. 3, No. 2 September (2025)" : 4 Documents clear
Pengembangan Sistem Informasi Berbasis Android pada SMA Negeri 17 Gowa Surahman, M. Nurmuhajirin; Mappeasse, Muhammad Yusuf; Ashadi, Ninik Rahayu
Progressive Information, Security, Computer, and Embedded System Vol. 3, No. 2 September (2025)
Publisher : Sakura Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This research aims to (1) Knowing the results of testing on the development of school information systems at SMA Negeri 17 Gowa, and (2) assess the effectiveness and practicality of the developed school information system at SMA Negeri 17 Gowa. This type of research is Research & Development (R&D). The development was carried out using the prototype model. The results obtained from the research are a system that can be used by the community and students of SMA 17 Gowa. This system has undergone software testing using ISO 25010, encompassing several aspects such as (1) Functional Suitability, achieving a score of 95.83% (very suitable); (2) Performance Efficiency, based on software testing using performance overlay tools, the average GPU and UI (CPU) usage indicators showed a green line, indicating normal results; (3) Compatibility, where multiple applications running simultaneously showed that both could operate well; (4) Usability, tested with 30 respondents using a random sampling method, achieved a score of 86.58%, categorized as very good; (5) Reliability, in tests covering good operational levels of the system and ease of access; (6) Maintainability, the testing showed that the system is in a very good category; (7) Portability, in this aspect, testing on several types of smartphones with different Android versions ran well without issues; (8) Security, testing yielded a security score of 65/100. The conclusion from these results is that the software has passed system evaluation and is deemed suitable, ready to be handed over to users and put into use.
Analisis dan Pencarian Bukti Forensik Digital pad Aplikasi Media Sosial X Menggunakan Metode Static Forensic Paisal, Destyfaini; Sidin, Udin Sidik; Fajar B, Muhammad
Progressive Information, Security, Computer, and Embedded System Vol. 3, No. 2 September (2025)
Publisher : Sakura Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This study discusses the application of static digital forensic methods to analyze evidence of cybercrime on the social media platform X. The research is based on a simulated case involving violations of Indonesia’s Electronic Information and Transactions Law (UU ITE), specifically concerning the distribution of pornographic content, hate speech, cyberbullying, and the spread of hoax X. The investigation was conducted by seizing the suspect’s devices, including a laptop and a 15GB flash drive, which were then xamined using FTK Imager and Autopsy forensic tools. The acquisition process was carried out using FTK Imager to create a digital image while maintaining data integrity through MD5 and SHA-1 hash verification. The subsequent analysis was conducted using Autopsy to identify hidden files, deleted files, file system structures, and relevant metadata. The investigation uncovered various types of digital evidence such as illicit images, social media activity logs, SQLite database files, email artifacts, and user activity data directly linked to the suspect’s X  account. The findings indicate that static forensic methods are effective in preserving original data during investigation. Furthermore, the forensic tools used in this study proved capable of systematically identifying, extracting, and processing digital evidence accurately. This research contributes to the field of cybercrime law enforcement, particularly in supporting the process of proving digital-based crimes committed through social media platforms.
Pengembangan Database Sistem Penilaian dengan Manajemen Akses Terjadwal dan Verifikasi OTP Email Muhammad Agung; Husda, Baso Riadi
Progressive Information, Security, Computer, and Embedded System Vol. 3, No. 2 September (2025)
Publisher : Sakura Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The rapid advancement of information technology has driven academic services to require increasingly reliable and secure systems, particularly in the assessment domain, which plays a crucial role in the learning process. This study was initiated based on findings of security issues in an existing academic grading system at a higher education institution, including unauthorized changes to student grades and vulnerabilities caused by outdated frameworks. This research aims to develop a grading system database design equipped with scheduled access management and One-Time Password (OTP) email verification to enhance the security of assessment processes. The study employs a Research and Development (R&D) approach aligned with the System Development Life Cycle (SDLC) prototyping model. The results indicate that the newly designed database using PostgreSQL successfully supports access restriction based on assessment schedules, while the integration of OTP verification effectively prevents unauthorized account usage. System testing by a supervisor demonstrated that almost all key features operated with “fully successful” status. Therefore, the developed product is considered effective in resolving security issues within academic grading systems and can serve as a reference for similar system development efforts in higher education institutions.
Implementasi Aplikasi RememberMe sebagai Media Pengingat Tugas Berbasis Digital Arham, Arham; Sahwan, M. Afif; Salma, Salma; Ananda, Sukma Riski
Progressive Information, Security, Computer, and Embedded System Vol. 3, No. 2 September (2025)
Publisher : Sakura Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This study aims to develop a digital reminder application that helps users manage their daily schedules and activities more efficiently. The application is designed using the waterfall method, which includes the stages of analysis, design, implementation, testing, and maintenance. Testing was conducted using the black box method to ensure that all functions operate according to user needs. The results show that the application works well, delivers timely notifications, and can be used practically to support time management.

Page 1 of 1 | Total Record : 4