cover
Contact Name
Erinda Anasia Agustin
Contact Email
jissismartpublisher@gmail.com
Phone
+6289526247010
Journal Mail Official
jissi@smartpublisher.id
Editorial Address
Jl. Kyai Sembung No. 43 Blorok, Kecamatan Brangsong, Kabupaten Kendal - Jawa Tengah 51371
Location
Kab. kendal,
Jawa tengah
INDONESIA
Jurnal Riset Sistem Informasi
ISSN : 30479029     EISSN : 30479010     DOI : 10.69714
Core Subject : Science, Education,
Jurnal Riset Sistem Informasi (JISSI) dengan 3047-9010, p-ISSN : 3047-9029 diterbitkan oleh Denasya Smart Publisher. Jurnal Riset Sistem Informasi(JISSI) memuat naskah hasil-hasil penelitian di bidang Sistem Informasi. Jurnal Riset Sistem Informasi (JISSI) berkomitmen untuk memuat artikel berbahasa Indonesia yang berkualitas dan dapat menjadi rujukan utama para peneliti dalam bidang ilmu Rekayasa Sistem, Teknologi Informasi, Sistem Informasi, Ilmu Komputer, Manajemen,Manajemen Informatika dan Bisnis. Jurnal ini terbit 1 tahun 4 kali (Januari, April, juli dan oktober).
Articles 107 Documents
RANCANG BANGUN SISTEM PENDING ONGKOS ANGKUT PADA DEPARTEMEN VERIFIKASI AKUNTANSI PT PUPUK SRIWIDJAJA PALEMBANG Erlin Lilis; Muhamad Son Muarie
Jurnal Riset Sistem Informasi Vol. 3 No. 1 (2026): Januari : Jurnal Riset Sistem Informasi
Publisher : CV. Denasya Smart Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.69714/bg3w5w79

Abstract

Financial document verification is an essential part of a company’s internal control system to ensure the accuracy, validity, and reliability of financial reporting. At PT Pupuk Sriwidjaja Palembang, the verification process for freight cost documents is still carried out manually using Google Spreadsheets, which causes several issues such as the loss of document history, difficulties in tracking document status, and delays in the verification process due to ineffective interdepartmental coordination. This study aims to design and develop an integrated Freight Cost Pending System to support a more structured and transparent document verification process. The research method applied is Object Oriented Analysis and Design (OOAD) with a prototype development approach. Data were collected through observation, informal interviews, documentation studies, and literature reviews. The results indicate that the developed system is able to record document status and history in real time, improve verification efficiency, minimize the risk of data loss, and strengthen coordination between the Accounting Verification Department and the Marketing and Sales Administration Department
FAKTOR DESAIN CHATBOT (TONE, AVATAR, EMOSI, DAN INTERAKTIVITAS) TERHADAP PENGALAMAN DAN KEPUASAN PENGGUNA: SYSTEMATIC LITERATURE REVIEW Nindy Viviva Asri; Devi Vara Pramudyta; Novita Fitriani
Jurnal Riset Sistem Informasi Vol. 3 No. 2 (2026): April : Jurnal Riset Sistem Informasi
Publisher : CV. Denasya Smart Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.69714/t8rsfj33

Abstract

The advancement of artificial intelligence has accelerated the adoption of chatbots across various sectors, including customer service, education, healthcare, and e-commerce. However, chatbot effectiveness is influenced not only by technical performance, but also by the quality of interaction shaped through conversational design and user experience. In practice, many chatbots still fail to meet user expectations due to limited empathy, unnatural responses, and rigid interaction structures, which negatively affect user satisfaction and trust. This study aims to examine the role of chatbot design elements, including tone of voice, avatar, emotional expression, and interactivity, in shaping user experience and perceptions of digital interaction quality. The research employs a systematic literature review using a Grounded Theory framework. Data were analyzed through initial coding, conceptual categorization, and the identification of core themes derived from the selected literature. The findings indicate that these four design elements are interrelated and collectively contribute to more human-centered and meaningful chatbot interactions. Empathetic tone of voice, context-appropriate avatars, relevant emotional expressions, and responsive interactivity consistently enhance user engagement, trust, and satisfaction. This study contributes a synthesized conceptual framework that highlights the integrative role of chatbot design elements in shaping user experience, providing a theoretical reference for human-centered chatbot development.
ANALISIS REPRESENTASI CHATBOT DALAM MEDIA SOSIAL, HIBURAN, DAN DAMPAKNYA TERHADAP BUDAYA DIGITAL Syifa Mauliddia; Dian Indri Eklesia Lumban Tobing; Dwi Anggita
Jurnal Riset Sistem Informasi Vol. 3 No. 1 (2026): Januari : Jurnal Riset Sistem Informasi
Publisher : CV. Denasya Smart Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.69714/jfhaj125

Abstract

The development of chatbots today has shaped new ways for humans to interact in an all-digital environment. Chatbots are no longer understood as tools that simply answer simple questions, but have evolved into entities that are present and play a role in various digital spaces, from education, mental health, social media, entertainment, to pop culture communities. This study presents an overview to understand how chatbots are represented, used, and interpreted in digital culture. The findings indicate that chatbots increasingly play a role in emotional and social aspects, and make important contributions to shaping people's digital experiences. Various studies highlight how chatbots can support the learning process, facilitate information navigation, and provide emotional support for their users. Overall, these findings confirm that chatbots have become a significant element in modern digital life and open new spaces for discussions about ethics, the need for more context-sensitive design, and the development of technology that centers the human experience.
EVALUASI TATA KELOLA INFRASTRUKTUR TEKNOLOGI INFORMASI PADA UMKM KULINER RYUDON CAFE & RESTO MENGGUNAKAN FRAMEWORK COBIT 2019 Vionetha Lavega; Vivian Vivian; Agnes Monica; Michella Valery; Calista Silvia Jaya; Dicky Pratama
Jurnal Riset Sistem Informasi Vol. 3 No. 2 (2026): April : Jurnal Riset Sistem Informasi
Publisher : CV. Denasya Smart Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.69714/e0tmf592

Abstract

The use of information technology (IT) in the culinary business sector has become increasingly essential to support service efficiency, transaction accuracy, and operational data security. Nevertheless, many micro, small, and medium enterprises (MSMEs) still experience limitations in implementing structured and well-documented IT governance. This study aims to evaluate the governance of IT infrastructure at Ryudon Cafe & Resto, an MSME in the culinary sector, using the COBIT 2019 framework. The evaluation focuses on four selected domains: DSS01 (Manage Operations), DSS02 (Manage Service Requests and Incidents), DSS05 (Manage Security), and BAI09 (Manage Assets). This research adopts a qualitative case study approach, with data collected through observations and interviews. The results indicate that IT operational activities have not been formally documented, service incidents are not systematically recorded, security controls are implemented informally, and IT asset management lacks an official inventory. These conditions suggest potential risks to operational continuity and information security. Based on the findings, several recommendations are proposed, including the development of standard operating procedures (SOPs), incident logging mechanisms, formal security policies, and structured IT asset inventories. The study demonstrates that COBIT 2019 can be effectively applied within MSME environments as a practical framework to strengthen IT governance and support sustainable organizational development.
TRANSFORMASI LAYANAN PERPUSTAKAAN SEKOLAH MENENGAH KEJURUAN MELALUI SISTEM INFORMASI BERBASIS WEB Rini Widyastuti; Gusmanila Gusmanila; Karmila Suryani; Ade Fitri Rahmadani; Ashabul Khairi
Jurnal Riset Sistem Informasi Vol. 3 No. 2 (2026): April : Jurnal Riset Sistem Informasi
Publisher : CV. Denasya Smart Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.69714/3h56r684

Abstract

The rapid advancement of information technology has driven significant changes in the management of school libraries, particularly in SMK that require efficient access to learning resources. This study addresses the limitations of manual library management at SMK Kartika 1–2 Padang, which resulted in data redundancy, slow information retrieval, and suboptimal reporting processes. The purpose of this research is to design and implement a web-based library information system that can systematically improve the quality and performance of library services. The study employed a system development research approach using the Waterfall model, encompassing requirements analysis, system design, implementation, and testing phases. Data collection was carried out through observation, interviews, and literature review. The results demonstrate that the developed system successfully integrates the management of book collections, member records, borrowing and returning transactions, and automated reporting within a single platform. The implementation of the system significantly enhances service efficiency by reducing processing time, minimizing data duplication, improving accuracy in transaction recording, and enabling faster access to library information for users. The main contribution of this research lies in providing a practical and applicable model of a web-based library information system that effectively improves operational efficiency and service quality in vocational school libraries.
IMPLEMENTASI SISTEM MONITORING KEAMANAN JARINGAN MENGGUNAKAN LOG ANALYSIS Rakhmadi Rahman; A.Nurul Sairah; Amanda Putri Heryanti
Jurnal Riset Sistem Informasi Vol. 3 No. 2 (2026): April : Jurnal Riset Sistem Informasi
Publisher : CV. Denasya Smart Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.69714/fqg13p25

Abstract

Network infrastructure security has become a crucial necessity due to the increasing complexity of cyber attacks such as Distributed Denial of Service (DDoS) and illegal intrusions that are difficult to detect conventionally. This study aims to build a comprehensive log monitoring system using the integration of Wazuh SIEM and Elastic Stack to collect, standardize, and identify threats in real-time within LAN/WAN network environments. The methodology follows the PPDIOO cycle (Prepare, Plan, Design, Implement, Operate, Optimize), which includes stages of agent installation on servers, configuration of detection rules, and testing through direct attack simulations. The results show that the system successfully identified 42 security threats with an accuracy rate of 95%. Furthermore, the system is capable of providing alert responses in less than 5 seconds while maintaining stable server performance with latency below 100ms. These findings prove that SIEM-based monitoring is significantly more efficient than traditional manual monitoring methods in terms of detection speed and data visibility. This integration of open-source solutions is proven reliable for proactively strengthening network defenses. For further development, it is recommended to integrate machine learning technology to automatically predict more complex threat patterns.
ANALISIS KEAMANAN JARINGAN WI-FI PUBLIK TERHADAP SERANGAN EVIL TWIN Rakhmadi Rahman; Nurhalisah Ramli; Alya Putri Rahmadani
Jurnal Riset Sistem Informasi Vol. 3 No. 2 (2026): April : Jurnal Riset Sistem Informasi
Publisher : CV. Denasya Smart Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.69714/vzqtrw67

Abstract

Public wireless networks (Wi‑Fi) are widely used in educational institutions, offices, and public areas due to their ease of access and flexibility. However, this convenience is accompanied by significant security risks, particularly Man‑In‑The‑Middle (MITM) attacks using the Evil Twin technique. This attack exploits fake access points that imitate legitimate networks to deceive users into connecting and transmitting sensitive data. This study aims to analyze the characteristics of Evil Twin attacks on public Wi‑Fi networks, evaluate the effectiveness of Deauthentication and Web Phishing techniques, and assess network monitoring tools in detecting traffic anomalies. The research method applied is an experimental approach using penetration testing in a controlled environment. Several tools such as Aircrack‑ng, Hostapd‑WPE, Wireshark, Zui, and Wi‑Fi Analyzer were utilized. The results indicate that Evil Twin attacks are highly effective in intercepting HTTP traffic and potentially compromising HTTPS sessions when users ignore digital certificate warnings. Monitoring based on metadata successfully detects abnormal traffic patterns, while the implementation of a Resilient Certificate Management System (RCMS) significantly improves network security by rejecting unauthorized certificates. This research provides practical recommendations for administrators and users to enhance public Wi‑Fi security.
IMPLEMENTASI HARDENING SERVER LINUX UNTUK MENGURANGI RISIKO SERANGAN SIBER Rakhmadi Rahman; Moh. Farel; Muhammad Dirga Sopan
Jurnal Riset Sistem Informasi Vol. 3 No. 2 (2026): April : Jurnal Riset Sistem Informasi
Publisher : CV. Denasya Smart Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.69714/c4atnn70

Abstract

Ubuntu 22.04 LTS Linux servers running default configurations are highly vulnerable to cyber threats including ransomware, cryptojacking, and SSH brute force attacks due to 22+ unnecessary open ports, active root login, and weak password authentication on standard port 22. This research implements systematic hardening through Agile Development methodology comprising 4 iterative phases (assessment, implementation, testing, audit) following CIS Ubuntu Linux Benchmark v2.0.0 guidelines. Results demonstrate Lynis security score improvement from 40/100 (medium risk) to 85/100 (good) representing +112.5% enhancement, 86.4% attack surface reduction (22→3 essential ports: SSH 2222, HTTP 80, HTTPS 443), and complete elimination of critical vulnerabilities. Brute force testing using Hydra (1000 attempts) achieved 95% mitigation within <30 seconds through Fail2Ban automated IP blocking via iptables rules. Defense-in-depth architecture comprises UFW default-deny firewall policy, SSH RSA 4096-bit key authentication, AIDE file integrity monitoring, and automated Lynis auditing via cron jobs. The implementation produces production-ready hardened servers with high availability, replicable Standard Operating Procedures (SOP), and addresses Indonesian cybersecurity research literature gaps.
ANALISIS KEAMANAN FILE SERVER BERBASIS LINUX TERHADAP AKSES TIDAK SAH Rakhmadi Rahman; Nurfaida Nurfaida; Muhammad Hasyim Rusmin
Jurnal Riset Sistem Informasi Vol. 3 No. 2 (2026): April : Jurnal Riset Sistem Informasi
Publisher : CV. Denasya Smart Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.69714/38pr8578

Abstract

In organizational environments, file servers function as centralized platforms for data storage and sharing, making system security a critical requirement. Inadequate security configurations may increase the risk of unauthorized access and data breaches. This study analyzes the security of a Linux-based file server through experimental testing of layered security mechanisms. The experiment was conducted on an Ubuntu Server configured with Samba and Network File System services. The applied security mechanisms include user and group management, Discretionary Access Control, Mandatory Access Control using AppArmor, and network access restrictions through a firewall. Security evaluation was performed using authorized and unauthorized access scenarios, including network scanning and authentication attempts. The results demonstrate that implementing layered security mechanisms significantly enhances protection against unauthorized access compared to basic permission settings alone. This research contributes practical guidance for strengthening Linux file server security in organizational environments.
SISTEM INFORMASI AUTOMATIC TANK GAUGE PADA PT PERTAMINA PATRA NIAGA INTEGRATED TERMINAL PALEMBANG Muhammad Fakhri Azfar; Gina Agiyani
Jurnal Riset Sistem Informasi Vol. 3 No. 2 (2026): April : Jurnal Riset Sistem Informasi
Publisher : CV. Denasya Smart Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.69714/1gbfa027

Abstract

Information systems play a vital role in supporting efficiency and accuracy in operational management with in the oil and gas industry. PT Pertamina Patra Niaga Integrated Terminal Palembang requires a system capable of ensuring real-time accuracy of fuel volume and quality data. This study aims to design an Automatic Tank Gauge (ATG) information system integrated with the monitoring and inventory control processes of fuel storage at the terminal. The research method involves system requirements analysis, field data collection, and the design of a system model based on ATG sensor technology connected to the company’s information system. The design results show that the ATG information system can provide automatic and accurate data on fuel volume, temperature, and density, thereby minimizing manual recording errors and supporting operational transparency. The implementation of this system is expected to improve inventory control effectiveness, accelerate decision-making, and strengthen overall terminal fuel management governance.

Page 10 of 11 | Total Record : 107