cover
Contact Name
Yogi Saputra
Contact Email
yogi.saputra@ukri.ac.id
Phone
+6282218711136
Journal Mail Official
yogi.saputra@ukri.ac.id
Editorial Address
Jl. Terusan Halimun No.37, Lkr. Sel., Kec. Lengkong, Kota Bandung, Jawa Barat 40263
Location
Kota bandung,
Jawa barat
INDONESIA
Journal of Elektronik Sistem InformasI
ISSN : -     EISSN : 2988585X     DOI : https://doi.org/10.31848/jesii.v2i1
JESII: Journal of Elektronik Sistem InformasI Focus and scope IS include : 1. Bussiness Information System E-Bussiness Sosial Engineering E-Health Risk Management IS Project Management Technopreneur & Start Up Accounting/Fintech Technology ICT for Development E-government Information Systems Human Resources Analytics Social Media Customer Relationship Management Supply Chain Management ERP Configuration Business Process Management 2. Engineering Information System Information Technology Strategic Planning Expert System Decision Support System Business Intelligence Data Mining Knowledge Management New Technology Acceptance and Diffusion Audit SI/TI Geographic Information System (GIS) Human-Computer Interaction Web System and Technology Enterprise Architecture Data warehousing Corporate Application Integration IS Strategy, Management & Acquisition
Articles 46 Documents
Student Attendance Information System at SMKN with Web-Based QR Code Rojari, Fatima; Kelen, Yoseph Pius Kurniawan; Syarifuddin, Risald; Fallo, Kristoforus; Syahyadi, Asep Indra
JESII: Journal of Elektronik Sistem InformasI Vol 3 No 1 (2025): JOURNAL ELEKTRONIK SISTEM INFORMASI (JUNE)
Publisher : Departement Information Systems Universitas Kebangsaan Republik Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31848/jesii.v3i1.4034

Abstract

SMKN Kakuluk Mesak is a vocational high school located in Dua Laus Village, Kakuluk Mesak District, Belu Regency, East Nusa Tenggara Province, which prepares students to work in specific fields. Students can continue their education at SMK after completing their education at the junior high school level. The study period for SMK students is carried out for three to four years of learning, which is divided into three years of study at school and one year in the related industry department. SMKN Kakuluk Mesak has five majors: APAT, NKPI, WBE, TKPI, and APHPI. One of the problems at SMKN Kakuluk Mesak in terms of technology is the manual attendance and grading of students. Attendance and grades are recorded using books. Therefore, a web-based student attendance information system with QR code is needed to facilitate the student attendance process. This system is built using the waterfall method, which is a systematic and directed approach to developing software in which it is used step by step until it runs in order. This research resulted in a website-based student attendance information system with QR code that helps the school manage attendance data and students can view grades and attendance records anytime and anywhere. Keywords: Website; QR Code; Attendance; Waterfall
Implementation of Black-Box Testing on the Information System for the Smart Indonesia Card College Recommendation Sholehurrohman, Ridho; Qurrota A’yuni, Salsabila; Sakethi, Dwi; Sabda Ilman, Igit; Muhaqiqin, Muhaqiqin; taufik, rahman
JESII: Journal of Elektronik Sistem InformasI Vol 3 No 1 (2025): JOURNAL ELEKTRONIK SISTEM INFORMASI (JUNE)
Publisher : Departement Information Systems Universitas Kebangsaan Republik Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31848/jesii.v3i1.4038

Abstract

Testing on a system is carried out to determine whether a system that is built will run properly or if there are still bugs or errors that must be fixed. There are many methods in testing a system or software, one that is widely used by testers is the Black-box testing method. In this study the software that will be tested is an information system for the Smart Indonesia Card (KIP) Lecture Movement Ayo Lecture (GAK) recommendation information system. This information system is a system intended to provide information about the GAK program. In addition, this system is also expected to help optimize business processes in selecting applicants for KIP Lecture recommendations later. In implementing the GAK system, it is first necessary to test the system. System testing is one of the stages that cannot be eliminated in the development of a software. In testing, this system is tested using Black Box Testing in the hope of minimizing errors and ensuring that the system built has results that are in accordance with what is expected. With this test, it is expected that the quality of the software produced is in accordance with the expected function. Black-Box Testing, KIP College Recommendation, GAK Program, Information Systems
Audit Keamanan Aplikasi Presensi Human Resource Management System Menggunakan Framework Cobit 5 Acep Saepuloh, Acep Saepuloh; PARAMA YOGA, TITAN; Zamani, Fadli Emsa
JESII: Journal of Elektronik Sistem InformasI Vol 3 No 1 (2025): JOURNAL ELEKTRONIK SISTEM INFORMASI (JUNE)
Publisher : Departement Information Systems Universitas Kebangsaan Republik Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31848/jesii.v3i1.4041

Abstract

Information system security is a crucial aspect in the operation of a company, especially in managing employee data. To support the company's operational processes, PT Dekatama Centra uses a face verification-based attendance application to record employee attendance. However, like any other system, this application has potential security risks that need to be evaluated to ensure optimal data protection. This research aims to analyze the security level of the HRMS attendance application using the COBIT 5 framework, specifically in the APO13 (Manage Security) and DSS05 (Manage Security Service) domains. The research process was conducted through interviews, observations, and questionnaires, which were designed to measure the maturity level of the application security system based on the COBIT 5 assessment model. The audit results show that the maturity level of system security is still at the “Performed” level (Level 1), which means that the security process has been implemented but not well documented. Some aspects that still require improvement include user access management that must be strengthened with double authentication and access rights restrictions based on roles, protection against malware by improving network security systems and endpoint protection, and regular security monitoring by implementing a logging and monitoring system based on Securtiy Information and Event Management (SIEM). To overcome these problems, this research recommends implementing an Information Security Management System (ISMS) in accordance with the ISO/IEC 27001 standard, improving data encryption mechanisms, and increasing cybersecurity awareness for employees through continuous training programs. By implementing these recommendations, PT Dekatama Centra is expected to increase system resilience to cyber threats, maintain the confidentiality of employee data, and ensure the continuity of safer and more efficient company operations.
Optimization of Batik Motif Identification Using Canny Edge Detection Tamam, moh badri; Supriatin, Supriatin; Anwari, Anwari; Kusuma, Suteja Wira Dana
JESII: Journal of Elektronik Sistem InformasI Vol 3 No 1 (2025): JOURNAL ELEKTRONIK SISTEM INFORMASI (JUNE)
Publisher : Departement Information Systems Universitas Kebangsaan Republik Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31848/jesii.v3i1.4046

Abstract

Madura Batik has distinct characteristics in each of its regencies, differing in patterns, colors, and motifs. Therefore, this research employs digital image processing to identify the unique motifs of Madura Batik. The Canny edge detection method is implemented to recognize batik motifs by detecting edges in batik images. The color spaces used are RGB, HSV, and Lab, while the threshold values applied in the Canny operation are (500,500), (300,500), and (100,500). Based on several experiments conducted, the Lab color space with a threshold of (500,500) yields the best edge detection quality.
Digitalization of Restaurant Services: Android-Based Menu Ordering Application Setya Ningtyas, Ayu; Aminah, Siti; Tirtana, Arif; Nengsih, Titin Agustin
JESII: Journal of Elektronik Sistem InformasI Vol 3 No 1 (2025): JOURNAL ELEKTRONIK SISTEM INFORMASI (JUNE)
Publisher : Departement Information Systems Universitas Kebangsaan Republik Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31848/jesii.v3i1.4061

Abstract

Utilization of mobile application technology which can be one of the considerations for presenting information in various business actors because of its flexible and easy nature. One of them is the Betawi Babeh Sadeli Restaurant which is currently still implementing a manual ordering method, the waiter records the menu to be ordered, then delivers the order to the kitchen which requires a lot of time and effort. From these problems, the authors provide a solution for designing a food menu ordering application for Android-based mobile devices with the waterfall method. This study aims to design a real-time food menu ordering system for Android-based mobile devices using the waterfall method. The developed application streamlines the ordering process at the Betawi Babeh Sadeli Restaurant. Functionality testing results indicate that 92% of the application features functioned correctly, demonstrating its effectiveness and reliability.
Information Technology Risk Management of ABC Application At University Using ISO 31000:2018 Linggih Jaelani, Widi; Takwim, Ahsani; Sari, Titania; Wijayanti, Diyah; Fajri Pratama, Satrya
JESII: Journal of Elektronik Sistem InformasI Vol 3 No 1 (2025): JOURNAL ELEKTRONIK SISTEM INFORMASI (JUNE)
Publisher : Departement Information Systems Universitas Kebangsaan Republik Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31848/jesii.v3i1.4093

Abstract

Information technology (IT) plays a critical role in supporting operations and decision-making in higher education institutions. At Universitas Teknologi Bandung (UTB), reliance on IT systems for academic administration, online learning, and data management has increased the risk of security incidents such as clickjacking, unrestricted file uploads, cross-site scripting (XSS), misconfiguration, excessive data exposure, and server downtime. This study applies the ISO 31000:2018 risk management framework to systematically identify, assess, and analyze IT security risks in UTB’s information systems. Using a 5x5 risk matrix, risks were evaluated based on probability and impact, revealing that moderate risks dominate, primarily from clickjacking, XSS, unrestricted file upload, and server downtime incidents, while misconfiguration and excessive data exposure represent low-level risks requiring ongoing monitoring. Common causes include weak input/output validation, insecure system configurations, and inadequate access controls and data sanitization. Proposed mitigation efforts focus on rigorous source code review before publication, regular penetration testing every 3 to 6 months, and increased awareness of security policies and potential incidents. The findings aim to enhance IT risk management practices at UTB, contributing to stronger governance and the protection of institutional data amid growing digital transformation.
Technology Readiness and Acceptance Model in the Evaluation of the Singmanfaat System at the West Java Provincial Forestry Service Hawari, Muhammad; Manaf, Khaerul; Gunawan, Yanyan; Jamaludin, M. Rifqi Azkiya
JESII: Journal of Elektronik Sistem InformasI Vol 3 No 1 (2025): JOURNAL ELEKTRONIK SISTEM INFORMASI (JUNE)
Publisher : Departement Information Systems Universitas Kebangsaan Republik Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31848/jesii.v3i1.4101

Abstract

Using the Technology Readiness and Acceptance Model (TRAM) approach, the research investigates the readiness and acceptance of the SINGMANFAAT application among users working for the West Java Provincial Forestry Service. Optimism and insecurity were discovered to have a substantial influence regarding perceived utility and simplicity of use, according to the findings of the research that involved 88 employees. The only thing that was affected by innovativeness was the convenience of use; pain was not altered. According to the findings of the survey, enhancing user comfort and bolstering faith in data security are two of the most important factors in ensuring successful adoption of technology. The findings can serve as a reference for the implementation of information systems that are based on technology in government entities.
Implementation of Apriori Algorithm to Analyze Sales Transaction Patterns in Official E-Commerce Adam Nugraha, Yuki Rizki; Maftahuhillah, Alma Ariz; Nur Rachman, Andi; Fitriani, Euis Nur; Tarempa, Genta Nazwar
JESII: Journal of Elektronik Sistem InformasI Vol 3 No 1 (2025): JOURNAL ELEKTRONIK SISTEM INFORMASI (JUNE)
Publisher : Departement Information Systems Universitas Kebangsaan Republik Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31848/jesii.v3i1.4127

Abstract

The growth of e-commerce in Indonesia has driven dynamic changes in consumer behavior, especially in the purchasing patterns of fashion products. However, most businesses have not optimally utilized transaction data to design targeted marketing strategies. One of the main challenges is the inability to systematically recognize customer purchase patterns from complex and large transaction data. This research aims to apply the Apriori algorithm, specifically the FP-Growth method, in identifying recurring purchase patterns based on product combinations that are often purchased together at the Qeela Official store, an e-commerce-based fashion business. The data used includes 20,000 transactions during the period January to April 2024, which were sampled into 10,000 transactions according to the RapidMiner system limitations. The research stages include data transformation to binary format, conversion of attributes to binominal, application of the FP-Growth algorithm, and formation of association rules using minimum support parameters of 0.001 and minimum confidence of 0.5. The results show the existence of strong association patterns, such as SHORT PARASUT → SHORT CARGO with a confidence of 82.1% and a lift of 3.197. The insights provide a strong basis for decision-making in product bundling strategies, cross-selling implementation, automated recommendations, and stock management. The data mining approach used is proven to be relevant and applicable to improve marketing effectiveness and operational efficiency in e-commerce businesses, especially in the highly competitive fashion industry.
Web-Based Raw Material Inventory Forecasting System : Using Double Exponential Smoothing Method In Selera Baru Bakery Malika, Melda; Suseno, Endra; Mirantika, Nita
JESII: Journal of Elektronik Sistem InformasI Vol 2 No 1 (2024): JournaI of Elektronik Sistem InformasI - JESII (JUNE)
Publisher : Departement Information Systems Universitas Kebangsaan Republik Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31848/jesii.v2i1.3412

Abstract

Controlling raw material inventory is important in every production process, but Selera Baru Bakery has not received control over the raw material inventory procurement process, so business owner does not know when the right time to procure raw materials is. This causes bread production to be carried out in accordance with the availability of existing raw materials when the production process is carried out not based on sales needs. The production process that is not in accordance with these needs results in a shortage or excess stock so that the bread is moldy and not suitable for sale. Based on this condition, research is conducted using the Double Exponential Smoothing method with PHP programming language and MySQL uses database. System design uses UML and system development uses Waterfall, based on the categories of wheat raw materials, flour, yeast, sugar, eggs and margarine with alpha parameter testing of 0.2 showing effectiveness in using the Double Exponential Smoothing method with a MAPE value of less than 10%, this proves that the forecasting results are effective and accurate in controlling the raw material inventory procurement process in Selera Baru Bakery.
PARSING DOM Method Implementation for Web Scraping to Identify Pornographic Websites Al Amin, Muhammad Insan
JESII: Journal of Elektronik Sistem InformasI Vol 2 No 1 (2024): JournaI of Elektronik Sistem InformasI - JESII (JUNE)
Publisher : Departement Information Systems Universitas Kebangsaan Republik Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31848/jesii.v2i1.3414

Abstract

When utilized improperly, internet technology can be a source of illegal information. One such instance is when pornographic content is published online. One of the numerous solutions that have been developed for DNS, or what is also referred to as DNS blocking, is that it is still subject to modification and re-access. The issue can be resolved by utilizing web scraping techniques to identify keywords based on text content, extract information from the website, and retrieve information using the DOM Parsing method. This allows text content to be gathered as a source of information related to the site's content, and the TF-IDF method can be used to calculate each website's weight known as the pornographic website. This study develops a reliable technique for locating pornographic content on the internet, which may be used with parental controls or content filtering systems.