cover
Contact Name
Perdana Wahyu Santosa
Contact Email
pwsantosa@gmail.com
Phone
+6281188809646
Journal Mail Official
info-its@sanscientific.com
Editorial Address
SAN Scientific Office 3 Point Building, 4th Floor, Jl. Tebet Raya No. 90, Jakarta Selatan, DKI Jakarta, Indonesia 12820
Location
Kota adm. jakarta selatan,
Dki jakarta
INDONESIA
Information Technology and Systems
ISSN : -     EISSN : 30311187     DOI : 10.58777/its
The Information Technology and Systems ITS, is an open access and peer reviewed journal whose avenue for scholarly work emphasizes using information technology, systems theory, and information analytics to study issues in the design, built, commercial, cultural, and natural contexts. The Journal offers a venue for scholarly study on applications of systems thinking, information systems, electronic business, data analytics, information sciences, information management, business intelligence, and complex adaptive systems in the application domains of business environment, health administration, built environment, cultural settings, and natural environment. The journal provides a platform for professionals in the field of IT to exchange their expertise and experiences. It aims to promote discussions on the design, development, implementation, management, and assessment of diverse IT applications among practitioners, researchers, managers, and IT policymakers.
Articles 5 Documents
Search results for , issue "Vol. 2 No. 1 (2024): November 2024" : 5 Documents clear
User Experience Analysis on the KMOB Depok Application Using the System Usability Scale Method Putra, Erich Eryana
Information Technology and Systems Vol. 2 No. 1 (2024): November 2024
Publisher : SAN Scientific

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58777/its.v2i1.298

Abstract

To improve services to the community, Depok City has developed technology by launching KMOB, this Android-based application has met the needs of the activities of the people of West Java, especially in the centralized city of Depok. The purpose of this study is to measure the level of user experience of the KMOB application and to produce recommendations for improvements to the KMOB application based on the results of the analysis using the system usability scale (SUS) method. The method used in this research is system usability scale (SUS), the data collection used is interviews, and the distribution of SUS questionnaires to 30 KMOB application users, which are sent via google form. The results showed that the KMOB application almost on the entire assessment scale had a good (positive) evaluation, namely on the attractiveness, perspicuity, efficiency, dependability, stimulation, and novelty assessment scale. KMOB application for Depok City was categorized as not meeting usability standards. Based on the usability evaluation, the SUS score is 44.5 with a not adjective rating including the "POOR" category and grade scale F, and is included in the marginal low category for acceptability ranges where the usability of the KMOB application for Depok City is still acceptable but with a low level of acceptance.
Designing a Web-Based Archive Management Application Using the Laravel Framework: A Case Study on a Recreational Park Ramadhani, Risky
Information Technology and Systems Vol. 2 No. 1 (2024): November 2024
Publisher : SAN Scientific

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58777/its.v2i1.300

Abstract

Effective archive management is one of the main needs in supporting organizational operations, including in recreational parks that have a high volume of administrative documents. This research aims to design and implement a web-based archive management application using the Laravel framework to improve efficiency in archive storage, management, and search. The research approach involves the stages of needs analysis, system design, application development, and trials on a real work environment in a recreational park. The results of the application design show that the use of Laravel as the main framework allows for the development of a responsive, secure, and easy-to-use system. The main features implemented include digital archive storage, grouping by category, keyword-based search, and role-based user access management. Testing using the black-box testing method shows that the system functions according to the designed specifications. Based on user feedback, this application is able to reduce the time of searching archives by up to 45% compared to the previous manual method. In conclusion, this Laravel-based archive management application provides a significant solution to improve the efficiency and security of document management in amusement parks. Further research is suggested to integrate the system with cloud computing technology to support more flexible access and higher scalability.
Analysis of TIX ID Application User Satisfaction in Depok City Using the End User Computing Satisfaction (EUCS) Method Wirdiyanto, Afri Wahyu
Information Technology and Systems Vol. 2 No. 1 (2024): November 2024
Publisher : SAN Scientific

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58777/its.v2i1.302

Abstract

TIX ID is an official application from PT Nusantara Elang Sejahtera, and was released to meet the needs of users among the people of Depok. The purpose of this study is to find out whether there is an influence of content, accurancy, format, ease of use and timeliness on the satisfaction of TIX ID application users and to find out whether there is an influence on the level of satisfaction of TIX ID application users as a medium for booking cinema tickets. The method used in this study is End User Computing Satisfaction (EUCS) which consists of five factors, namely: content, accuracy, form, ease of use, and timeliness. The data collection process was carried out by distributing questionnaires to people who use the TIX ID application in Depok. The sampling technique uses random sampling. The data processing method carried out in this study uses validity tests, reliability tests, and hypothesis tests processed using SPSS software. The results of hypothesis testing there are 4 variables that have an effect, namely accuracy, format, ease of, timeliness and there is 1 variable that has no effect, namely content. Based on the correlation analysis, R2 of 0.657 showed that the satisfaction variable could be explained by the variables content, accuracy, format, ease of use and timeliness of 65.7%
Network Security Strategy with VLANs and Access Control Lists: Case Studies and Implementation Djuanda, Dhafa Nugraha
Information Technology and Systems Vol. 2 No. 1 (2024): November 2024
Publisher : SAN Scientific

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58777/its.v2i1.305

Abstract

This research focuses on the design and implementation of network security strategies using Virtual Local Area Network (VLAN) and Access Control List (ACL) at PT Pegadaian Kalibata Branch. The background of this research is the increasingly urgent need for a network security system that is able to protect infrastructure from various complex cyber threats, especially for financial business entities. In an effort to improve network security, Virtual Local Area Networks (VLANs) are used to separate network traffic based on business needs, while Access Control Lists (ACLs) are implemented to set security rules in controlling network traffic. This study uses observation, interview, and literature study methods to collect relevant data. The results show that the implementation of Virtual Local Area Network (VLAN) and Access Control List (ACL) can effectively improve network security, reduce the risk of cyberattacks, and improve bandwidth efficiency. However, some challenges such as missing configurations and bandwidth limitations still have to be overcome to achieve optimal results. This research is expected to contribute to the development of a better network security system for PT Pegadaian and other financial organizations.
Analysis of the Implementation of Blockchain Technology in Optimizing Crypto Inventory Through the Supply Chain Management Method Amin, Roihanul Falakil
Information Technology and Systems Vol. 2 No. 1 (2024): November 2024
Publisher : SAN Scientific

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58777/its.v2i1.306

Abstract

This study examines how the application of the Supply Chain Management (SCM) method to cryptocurrency inventory management can be optimized with blockchain technology. It is believed that blockchain, which is known for being transparent, secure, and effective, will increase operational effectiveness and lower risks in the administration of cryptocurrency inventory. It focuses on five key factors, namely transparency, data security, transaction speed, operational efficiency, and cost reduction. The study looks at the potential effects of each blockchain feature on cryptocurrency inventory management. Questionnaires on cryptocurrency users, miners, and investors are used to collect relevant data, and literature. The findings show how the application of blockchain technology lowers operational costs, increases transparency, and speeds up transactions to dramatically improve the efficiency of crypto inventory management. The findings claim that the application of blockchain technology through Supply chain management (SCM) not only adds value in terms of security and reliability, but also allows cryptocurrency companies to respond to market demand more quickly. This study adds to our understanding of how blockchain technology is used in the digital finance industry, particularly as it relates to crypto asset inventory management

Page 1 of 1 | Total Record : 5