cover
Contact Name
Fata Nidaul Khasanah
Contact Email
lppmp@ubharajaya.ac.id
Phone
+6285647212938
Journal Mail Official
jiforty.tif@ubharajaya.ac.id
Editorial Address
Jl. Perjuangan No.81, Marga Mulya, Kec. Bekasi Utara, Kota Bks, Jawa Barat 17143
Location
Kota adm. jakarta selatan,
Dki jakarta
INDONESIA
Journal of Informatics and Information Security
ISSN : -     EISSN : 27224058     DOI : https://doi.org/10.31599
Core Subject : Science,
Jurnal ini berisi tentang karya ilmiah hasil penelitian bidang ilmu komputer yang bertemakan: Artificial Intelligence, Blockchain Technology, Business Intelligence, Cloud Computing, Computer Architecture, Computer Vision, Database Systems, Deep Learning, Human Computer Interaction, Digital Forensic, Internet of Things, IT Security, Machine Learning, Networking, Semantic Web, Sistem Terdistribusi, Systems Engineering, Wireless Network.
Articles 9 Documents
Search results for , issue "Vol. 5 No. 2 (2024): Desember 2024" : 9 Documents clear
Keamanan Internet Untuk Anak Dibawah Usia 17 Tahun Muhammad Azwin Rifai; Reggya Ahmad Armansyah; Muhammad Riza Hashbillah
Journal of Informatic and Information Security Vol. 5 No. 2 (2024): Desember 2024
Publisher : Program Studi Informatika, Fakultas Ilmu Komputer Universitas Bhayangkara Jakarta Raya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31599/pf56qp88

Abstract

Internet security for children under the age of 17 has become an increasingly important issue in line with the rapid development of digital technology. This research aims to identify the risks faced by children when accessing the internet and to explore solutions that can be implemented to protect them from online threats. The method used in this research is the Quantitative Descriptive Research Method with Questionnaire Surveys and Literature Studies, focusing on the analysis of internet dangers, understanding of internet safety, and the roles of parents, educators, and related parties in protecting children in the online world. The research results show that despite various measures being implemented and the level of understanding of internet safety among children and teenagers in this study, there are still many issues in ensuring the safety of children when they use the internet. This research suggests the development of artificial intelligence (AI)-based technology to monitor children's online activities, raising awareness among parents and educators about the importance of supervision, and the need for stricter government policies. With the collaboration of various parties, it is hoped that a safer digital environment for children will be created.
Analisis Ancaman Phishing Terhadap Penggunaan E-Commerce Di Indonesia Al Fadillah, M Azmi; Ramadhan, Mochammad Guntur; Ariefiandi, Mohammad Erza
Journal of Informatic and Information Security Vol. 5 No. 2 (2024): Desember 2024
Publisher : Program Studi Informatika, Fakultas Ilmu Komputer Universitas Bhayangkara Jakarta Raya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31599/aes6yw36

Abstract

This research investigates the threat of phishing in the context of e-commerce in Indonesia. Phishing is a fraud technique aimed at stealing sensitive information from users through various methods such as fake emails, counterfeit websites, and link manipulation. In Indonesia, the e-commerce sector accounts for 32% of phishing cases. The method used in this research is qualitative narrative analysis, employing data collection through literature review and distribution of questionnaires. The primary objective of this study is to raise user awareness of phishing threats, identify users' ability to recognize phishing indicators, and disseminate preventive approaches. The results of the study indicate that many users are still unaware of phishing indicators, making them vulnerable to attacks. However, the study also found that 53% of trained users were able to identify phishing sites. This research highlights the importance of user education and the implementation of security measures. Recommendations include ongoing training for users, the use of email filters, the implementation of digital fingerprint indicators, and the application of One Time Password (OTP) systems. In conclusion, to address the phishing threat in Indonesia's e-commerce sector, a combination of enhanced user awareness, the adoption of more advanced security technologies, and collaboration among various stakeholders is needed.
Otomatisasi Penjadwalan Pemberian Pakan Ikan Menggunakan Fuzzy Logic Rules Based System Hantoro, Kusdarnowo
Journal of Informatic and Information Security Vol. 5 No. 2 (2024): Desember 2024
Publisher : Program Studi Informatika, Fakultas Ilmu Komputer Universitas Bhayangkara Jakarta Raya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31599/f1h59d54

Abstract

This study aims to design and build an efficient and effective automatic feeding device for comet fish. This tool is designed to overcome the problem of inaccuracy in the time and amount of manual feeding, as well as maintaining the quality of pond water. The method used is to combine a microcontroller system, water level sensor, and servo motor to regulate the dose and time of feeding. The results of the study show that this tool is able to provide food automatically according to the program, so that it can increase fish growth and maintain pond cleanliness. In providing scheduled comet fish feed, the method used in this study is the Rule Based System which is used as an automatic comet fish feeding schedule.  
Efektivitas Cyber Law dalam Menanggulangi Pelanggaran Cybersecurity Widurizky, Desinta; Simatupang, Elisabet; Rahmadani, Nadiyah; Auliasyah, Syifa Rahma
Journal of Informatic and Information Security Vol. 5 No. 2 (2024): Desember 2024
Publisher : Program Studi Informatika, Fakultas Ilmu Komputer Universitas Bhayangkara Jakarta Raya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31599/v5120385

Abstract

In the growing digital era, information security information security is very crucial. This research explores the effectiveness of Cyber Law implementation in overcoming cyber security violations at Bhayangkara University, Greater Jakarta. Bhayangkara University, Greater Jakarta. By using quantitative research method quantitative research method, data was collected through distributing questionnaires to 295 respondents from informatics study program students. This research identified challenges faced, including the public's low understanding of Cyber Law and the lack of socialization in the university environment. Analysis result analysis showed that while there is an increased awareness of the importance of Cyber Law, there are still shortcomings in the application of sanctions and the protection of personal data. personal data protection. The Waterfall method was used to design a structured security system, ensuring each stage of development is optimized. This research provides recommendations to improve the understanding and application of Cyber Law to strengthen cybersecurity among university students.
Pengembangan Sistem Presensi Dosen Berbasis Geolocation Untuk Meningkatkan Akurasi Dan Efisiensi Pencatatan Kehadiran Perkuliahan Dani Yusuf; Siti Setiawati
Journal of Informatic and Information Security Vol. 5 No. 2 (2024): Desember 2024
Publisher : Program Studi Informatika, Fakultas Ilmu Komputer Universitas Bhayangkara Jakarta Raya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31599/k3hnv805

Abstract

This study aims to develop and implement a faculty attendance system based on geolocation, utilizing GPS technology for automatic recording of faculty attendance. This system is expected to enhance efficiency, accuracy, and transparency in the attendance process, as well as facilitate the management of faculty attendance data by administrators. The method used in this research is the prototype development method, which allows for iterative system development based on user feedback. The system development process includes needs identification, prototype design, development of the geolocation-based attendance application, system testing, as well as revisions and improvements to the prototype. The results of initial testing indicate that this attendance system successfully records faculty attendance time and location accurately using GPS technology, while also enabling administrators to monitor attendance reports in real-time. This research is expected to contribute to the utilization of geolocation technology to improve academic administration efficiency and provide practical solutions in managing faculty attendance in higher education institutions.
Manajemen Risiko Keamanan Siber dalam Implementasi Teknologi 5G di Universitas Bhayangkaraya Jakarta Raya Muhammad Rafi Wijaya; Dimas Setiawan; Malik Alfauziy Hermawan; Nabil Surya Adjhari
Journal of Informatic and Information Security Vol. 5 No. 2 (2024): Desember 2024
Publisher : Program Studi Informatika, Fakultas Ilmu Komputer Universitas Bhayangkara Jakarta Raya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31599/a17ent36

Abstract

The 5G arrange innovation offers noteworthy openings to back advanced change over different segments, counting higher instruction. This ponder analyzes cybersecurity chance administration within the usage of 5G innovation on campus, centering on foundation preparation, understudy discernments, and hazard moderation measures. The research was conducted employing a writing survey and a study of understudies from the Staff of Computer Science at Universitas Bhayangkara Jakarta Raya. The discoveries uncover that whereas 5G innovation gives high-speed network and moo inactivity to encourage shrewd campus improvement, critical challenges stay, counting lacking framework, inadequately chance evaluations, and the require for cybersecurity preparing. Most respondents recognize the significance of individual information security and request clear security arrangements and superior security measures. This think about suggests upgrading innovative framework, conducting comprehensive hazard assessments, and powers cybersecurity preparing and mindfulness programs to maximize the benefits of 5G whereas relieving its dangers.
Manajemen Keamanan Data Dalam Era Tansformasi Digital Dan Cloud Computing Pandu, Rafie Mahesa; Muttaqin, Hudan Aghil; Dias, Dias Satrio Ajie Widodo
Journal of Informatic and Information Security Vol. 5 No. 2 (2024): Desember 2024
Publisher : Program Studi Informatika, Fakultas Ilmu Komputer Universitas Bhayangkara Jakarta Raya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31599/f4h0nv04

Abstract

Digital transformation has driven the use of cloud computing technology in various sectors, including business and entertainment. However, the implementation of this technology poses significant data security challenges. This study aims to analyze the application of cloud computing technology in digital platforms such as Instagram, WhatsApp, TikTok, Netflix, and Spotify, as well as the security challenges faced. Using a qualitative descriptive approach, the study identifies security strategies used to protect user data, including encryption, access management, and real-time monitoring. The findings reveal that collaboration between cloud service providers and users is key to addressing security threats in the era of digital transformation. 
Analisis Keamanan Data Pribadi Pada Pengguna E-Commerce Shopee Terhadap Ancaman Data Pribadi Tata Arya Cahyaaty; Indra Wijaya; Muhamad Dafin Al Dzky; Handika Gita Prasojo; Septian Hadi Prakoso
Journal of Informatic and Information Security Vol. 5 No. 2 (2024): Desember 2024
Publisher : Program Studi Informatika, Fakultas Ilmu Komputer Universitas Bhayangkara Jakarta Raya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31599/mdpf3g55

Abstract

This study discusses the protection of personal data on e-commerce platform Shopee, as the increasing use of e-commerce services makes data security issues increasingly important. With a qualitative descriptive approach, this study relied on literature analysis and secondary data to assess the implementation of security measures, such as data encryption and two-factor authentication (2FA). The results show that although Shopee has taken fairly good protective measures, there are still 28.26% of respondents who do not fully understand its security policies. The research also provides a number of recommendations to increase user awareness and strengthen security policies at Shopee as well as other e-commerce platforms.
Perancangan dan Implementasi Fitur Pencairan Cepat pada Website Akademik Fakultas Arifin, Muhammad Khoirul; Sari, Rafika
Journal of Informatic and Information Security Vol. 5 No. 2 (2024): Desember 2024
Publisher : Program Studi Informatika, Fakultas Ilmu Komputer Universitas Bhayangkara Jakarta Raya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31599/dvqd2c53

Abstract

In the digital era, ease of information access plays a crucial role in the effectiveness of an academic website. The Faculty of Psychology at Universitas Bhayangkara Jakarta Raya faces challenges in providing quick and efficient access to information for users. This internship report aims to design and implement a quick search feature on the faculty’s website to enhance user experience. The methods used include observation, interviews, and literature studies to understand user needs and technical system development. The implementation of a JSON-based search feature allows for faster and more accurate information retrieval. Testing results show that this feature improves search efficiency by up to 90%, with high user satisfaction based on conducted surveys. Future development may include integration with a more complex database system and the addition of filtering features to improve search result relevance

Page 1 of 1 | Total Record : 9