cover
Contact Name
Fata Nidaul Khasanah
Contact Email
lppmp@ubharajaya.ac.id
Phone
+6285647212938
Journal Mail Official
jiforty.tif@ubharajaya.ac.id
Editorial Address
Jl. Perjuangan No.81, Marga Mulya, Kec. Bekasi Utara, Kota Bks, Jawa Barat 17143
Location
Kota adm. jakarta selatan,
Dki jakarta
INDONESIA
Journal of Informatics and Information Security
ISSN : -     EISSN : 27224058     DOI : https://doi.org/10.31599
Core Subject : Science,
Jurnal ini berisi tentang karya ilmiah hasil penelitian bidang ilmu komputer yang bertemakan: Artificial Intelligence, Blockchain Technology, Business Intelligence, Cloud Computing, Computer Architecture, Computer Vision, Database Systems, Deep Learning, Human Computer Interaction, Digital Forensic, Internet of Things, IT Security, Machine Learning, Networking, Semantic Web, Sistem Terdistribusi, Systems Engineering, Wireless Network.
Articles 111 Documents
Sistem Informasi Pengelolaan Zakat Dan Infaq Menggunakan Metode RAD Aida Fitriyani; Rafika Sari; Sulhan Faiz
Journal of Informatic and Information Security Vol. 2 No. 2 (2021): Desember 2021
Publisher : Program Studi Informatika, Fakultas Ilmu Komputer Universitas Bhayangkara Jakarta Raya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31599/j2d68x15

Abstract

Yayasan Masjid Miftahul Jannah Cibitung is one of the organizations engaged in religious worship, which has developed and always wants to keep up with the developing information technology. So far, the area of mosque administration still feels difficult to do because it uses a manual format. This has attracted the author to research and develop a web-based mosque information system. Therefore, the researcher proposes a web-based information system that will replace data collection and distribution of zakat and infaq management financial funds at the Baitul Maal Masjid Miftahul Jannah by using a web-based information system. The purpose of this research is to design and build an information system needed by Baitul Maal officers by using the Rapid Application Development method as a development method. The supporting software used in designing this youth information system is PHP and MySQL database. The final result of this research is that the existence of this information system can assist Baitul Maal officers in processing data recording and funding transactions of incoming and outgoing funds. And can reduce the risk of loss and damage to activity data because this application data that has been inputted will be stored in the database server.
Perancangan Aplikasi Top Up Game Menggunakan Algoritma Collaborative Filtering Berbasis Website Dery Ramadhan; Kusdarnowo Hantoro; Asep Ramdhani Mahbub
Journal of Informatic and Information Security Vol. 5 No. 1 (2024): Juni 2024
Publisher : Program Studi Informatika, Fakultas Ilmu Komputer Universitas Bhayangkara Jakarta Raya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31599/ss3eqq71

Abstract

This research aims to design a game top-up application that utilizes collaborative filtering algorithms as a recommendation method, with a website-based platform. The primary focus is to leverage artificial intelligence to analyze user purchasing patterns and provide personalized and relevant top-up recommendations. The Waterfall development method is employed to ensure that the application development process is structured, from requirement analysis to implementation. Application performance evaluation is conducted to measure the effectiveness of the collaborative filtering algorithm in providing accurate recommendations and enhancing user satisfaction. It is hoped that the results of this research will make a positive contribution to improving game top-up services and strengthening the online gaming experience for users.
Implementasi Algoritma Simple Additive Weighting Berbasis Web Untuk Penentuan Calon Penerima Beasiswa Elfri Kartini Hutabarat; Mugiarso; Rafika Sari; Rasim
Journal of Informatic and Information Security Vol. 5 No. 1 (2024): Juni 2024
Publisher : Program Studi Informatika, Fakultas Ilmu Komputer Universitas Bhayangkara Jakarta Raya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31599/5ndeg237

Abstract

Technology aids humans in performing activities such as accessing information in all fields, particularly in education. One implementation adopted by educational institutions is the student information system. As an educational institution, SMK Yadika 13 Tambun runs a scholarship program. The school's selection process is still manual, conducted through document requirements. Consequently, the selection process takes a long time due to the high number of applicants. Only those meeting the criteria receive scholarships. The large number of applicants and the limited scholarship quota make it challenging for the school to manually screen documents. The research objective is to determine prospective scholarship recipients at SMK Yadika 13 Tambun and implement the Simple Additive Weighting method in a decision support system that can provide alternatives in determining scholarship recipients. The Simple Additive Weighting algorithm can be applied in determining scholarship recipients. This algorithm can serve as an exemplary calculation method as it can identify alternatives for each attribute. Subsequently, a ranking system is devised to select the best alternatives. The system developed can assist SMK Yadika 13 Tambun Bekasi in determining scholarship recipients more efficiently and systematically, thereby reducing errors in the selection process.
Optimizing Random Forest Models for Early Detection of Defects in Steel Tri Surawan; Adhitio Satyo Bayangkari Karno; Widi Hastomo; Reza Fitriansyah; Ahmad Eko Saputro; Indra Bakti
Journal of Informatic and Information Security Vol. 5 No. 1 (2024): Juni 2024
Publisher : Program Studi Informatika, Fakultas Ilmu Komputer Universitas Bhayangkara Jakarta Raya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31599/amqxgn78

Abstract

In the manufacturing sector, steel plate defects are a severe issue that may result in significant losses for a company's finances and image. The purpose of this study is to evaluate how well three machine learning algorithms detect steel plate flaws. The accuracy, area under the ROC curve (ROC-AUC), and Log-Loss of the method were used to assess its performance using a dataset that was downloaded from www.kaggle.com. Based on the findings, the Random-Forest algorithm performed best overall, having the lowest Log-Loss of 0.9327, an accuracy of 0.6722, and an AUC value of 0.9222. Research using other algorithms is still very open to be carried out to get better results. Research utilizing other algorithms is still very much open to be conducted in order to get better outcomes.
Implementasi Data Mining Untuk Menentukan Produk Buku Komik Terlaris Pada Toko Arivpedia Menggunakan Algoritma Apriori Muhammad Iqbal Iffahuddin; Achmad Noeman; Prio Kustanto; Mayadi
Journal of Informatic and Information Security Vol. 5 No. 1 (2024): Juni 2024
Publisher : Program Studi Informatika, Fakultas Ilmu Komputer Universitas Bhayangkara Jakarta Raya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31599/2gd01j83

Abstract

How to use transaction data at the arivpedia store selling the best-selling comic book products. Implementing the a priori algorithm to determine the best-selling comic book product pattern in the application to be tested. From this research, according to the analysis and implementation that has been made, the results of an a priori algorithm implementation system are found to determine the best-selling comic book products. With this system at the Arivpedia Store, it helps managers to calculate sales transaction data which is very easy to use. The application of data mining with the a priori algorithm is considered very efficient and can accelerate the process of forming product association patterns from sales transaction data at the Arivpedia store used in the test.
Rancang Bangun Aplikasi Prototype Sistem Penjualan Kopi Berbasis Mobile (Study Kasus: Kedai Cuan) Luri Sesy Apriyani; Diah Aryani; Ahmad Fathurrozi
Journal of Informatic and Information Security Vol. 5 No. 1 (2024): Juni 2024
Publisher : Program Studi Informatika, Fakultas Ilmu Komputer Universitas Bhayangkara Jakarta Raya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31599/jfz9pc41

Abstract

One of the shops in Tangerang that is attractive to young people because of its relatively cheap price is Kedai Cuan, this shop offers various types of coffee with a comfortable atmosphere. The absence of an application that can increase Kedai Cuan's online sales has led to a decline in sales, as shown by the current sales report. In addition, customers still have difficulty finding information about the available menu, and customers still have to place orders and make payments manually. This research aims to build an Android-based online sales system needed to speed up the sales process at Kedai Cuan with a system development method using the prototype method and the React Native framework JavaScript programming language and Supabase database so that it is hoped that this application can make it easier for owners and customers to buy and sell online and increase sales.
Keamanan Internet Untuk Anak Dibawah Usia 17 Tahun Muhammad Azwin Rifai; Reggya Ahmad Armansyah; Muhammad Riza Hashbillah
Journal of Informatic and Information Security Vol. 5 No. 2 (2024): Desember 2024
Publisher : Program Studi Informatika, Fakultas Ilmu Komputer Universitas Bhayangkara Jakarta Raya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31599/pf56qp88

Abstract

Internet security for children under the age of 17 has become an increasingly important issue in line with the rapid development of digital technology. This research aims to identify the risks faced by children when accessing the internet and to explore solutions that can be implemented to protect them from online threats. The method used in this research is the Quantitative Descriptive Research Method with Questionnaire Surveys and Literature Studies, focusing on the analysis of internet dangers, understanding of internet safety, and the roles of parents, educators, and related parties in protecting children in the online world. The research results show that despite various measures being implemented and the level of understanding of internet safety among children and teenagers in this study, there are still many issues in ensuring the safety of children when they use the internet. This research suggests the development of artificial intelligence (AI)-based technology to monitor children's online activities, raising awareness among parents and educators about the importance of supervision, and the need for stricter government policies. With the collaboration of various parties, it is hoped that a safer digital environment for children will be created.
Analisis Ancaman Phishing Terhadap Penggunaan E-Commerce Di Indonesia Al Fadillah, M Azmi; Ramadhan, Mochammad Guntur; Ariefiandi, Mohammad Erza
Journal of Informatic and Information Security Vol. 5 No. 2 (2024): Desember 2024
Publisher : Program Studi Informatika, Fakultas Ilmu Komputer Universitas Bhayangkara Jakarta Raya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31599/aes6yw36

Abstract

This research investigates the threat of phishing in the context of e-commerce in Indonesia. Phishing is a fraud technique aimed at stealing sensitive information from users through various methods such as fake emails, counterfeit websites, and link manipulation. In Indonesia, the e-commerce sector accounts for 32% of phishing cases. The method used in this research is qualitative narrative analysis, employing data collection through literature review and distribution of questionnaires. The primary objective of this study is to raise user awareness of phishing threats, identify users' ability to recognize phishing indicators, and disseminate preventive approaches. The results of the study indicate that many users are still unaware of phishing indicators, making them vulnerable to attacks. However, the study also found that 53% of trained users were able to identify phishing sites. This research highlights the importance of user education and the implementation of security measures. Recommendations include ongoing training for users, the use of email filters, the implementation of digital fingerprint indicators, and the application of One Time Password (OTP) systems. In conclusion, to address the phishing threat in Indonesia's e-commerce sector, a combination of enhanced user awareness, the adoption of more advanced security technologies, and collaboration among various stakeholders is needed.
Otomatisasi Penjadwalan Pemberian Pakan Ikan Menggunakan Fuzzy Logic Rules Based System Hantoro, Kusdarnowo
Journal of Informatic and Information Security Vol. 5 No. 2 (2024): Desember 2024
Publisher : Program Studi Informatika, Fakultas Ilmu Komputer Universitas Bhayangkara Jakarta Raya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31599/f1h59d54

Abstract

This study aims to design and build an efficient and effective automatic feeding device for comet fish. This tool is designed to overcome the problem of inaccuracy in the time and amount of manual feeding, as well as maintaining the quality of pond water. The method used is to combine a microcontroller system, water level sensor, and servo motor to regulate the dose and time of feeding. The results of the study show that this tool is able to provide food automatically according to the program, so that it can increase fish growth and maintain pond cleanliness. In providing scheduled comet fish feed, the method used in this study is the Rule Based System which is used as an automatic comet fish feeding schedule.  
Efektivitas Cyber Law dalam Menanggulangi Pelanggaran Cybersecurity Widurizky, Desinta; Simatupang, Elisabet; Rahmadani, Nadiyah; Auliasyah, Syifa Rahma
Journal of Informatic and Information Security Vol. 5 No. 2 (2024): Desember 2024
Publisher : Program Studi Informatika, Fakultas Ilmu Komputer Universitas Bhayangkara Jakarta Raya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31599/v5120385

Abstract

In the growing digital era, information security information security is very crucial. This research explores the effectiveness of Cyber Law implementation in overcoming cyber security violations at Bhayangkara University, Greater Jakarta. Bhayangkara University, Greater Jakarta. By using quantitative research method quantitative research method, data was collected through distributing questionnaires to 295 respondents from informatics study program students. This research identified challenges faced, including the public's low understanding of Cyber Law and the lack of socialization in the university environment. Analysis result analysis showed that while there is an increased awareness of the importance of Cyber Law, there are still shortcomings in the application of sanctions and the protection of personal data. personal data protection. The Waterfall method was used to design a structured security system, ensuring each stage of development is optimized. This research provides recommendations to improve the understanding and application of Cyber Law to strengthen cybersecurity among university students.

Page 8 of 12 | Total Record : 111