cover
Contact Name
Erinda Anasia Agustin
Contact Email
jissismartpublisher@gmail.com
Phone
+6289526247010
Journal Mail Official
jissi@smartpublisher.id
Editorial Address
Jl. Kyai Sembung No. 43 Blorok, Kecamatan Brangsong, Kabupaten Kendal - Jawa Tengah 51371
Location
Kab. kendal,
Jawa tengah
INDONESIA
Jurnal Riset Sistem Informasi
ISSN : 30479029     EISSN : 30479010     DOI : 10.69714
Core Subject : Science, Education,
Jurnal Riset Sistem Informasi (JISSI) dengan 3047-9010, p-ISSN : 3047-9029 diterbitkan oleh Denasya Smart Publisher. Jurnal Riset Sistem Informasi(JISSI) memuat naskah hasil-hasil penelitian di bidang Sistem Informasi. Jurnal Riset Sistem Informasi (JISSI) berkomitmen untuk memuat artikel berbahasa Indonesia yang berkualitas dan dapat menjadi rujukan utama para peneliti dalam bidang ilmu Rekayasa Sistem, Teknologi Informasi, Sistem Informasi, Ilmu Komputer, Manajemen,Manajemen Informatika dan Bisnis. Jurnal ini terbit 1 tahun 4 kali (Januari, April, juli dan oktober).
Articles 80 Documents
APLIKASI SISTEM INFORMASI GEOGRAFIS LOKASI APOTEK DI MASAMBA BERBASIS ANDROID Emelinda Yuyun; Mukramin Mukramin; Muhlis Muhallim
Jurnal Riset Sistem Informasi Vol. 1 No. 3 (2024): Juli : Jurnal Riset Sistem Informasi
Publisher : CV. Denasya Smart Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.69714/npvk4k95

Abstract

The aim of this research is to design a Geographic Information System application for pharmacy locations in Masamba. Building a Geographic Information System application for pharmacy locations in Masamba. This research uses the Prototype research method. Data collection methods in this research are data documentation, observation, interviews and questionnaires. In designing the application, four diagrams from the Unified Modeling Language (UML) are used, namely Use Case Diagram, Activity Diagram, Sequence Diagram and Class Diagram. The software used to build this application is Android Studio as a design editor, XAMPP as a web server, and MySQL as a Database and Java as a programming language. The system has been tested using the black box testing method. This research produces an application that makes it easier and faster to search for pharmacies in Masamba. The feasibility of the system has been tested using the Likert Scale Method and based on the feasibility percentage value, this application is very suitable for use because it has a percentage value of 84.89%.
SISTEM INFORMASI AKUNTANSI PERENCANAAN ANGGARAN BIAYA KONTRUKSI PADA CV. TEGUH SEJAHTERA DENGAN METODE ACTIVITY BASED BUDGETING TAHUN 2023 Octavian Endra Saputra; Dendy Kurniawan
Jurnal Riset Sistem Informasi Vol. 1 No. 2 (2024): April : Jurnal Riset Sistem Informasi
Publisher : CV. Denasya Smart Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.69714/ejj5sn79

Abstract

A construction cost budget is needed to calculate a building or project with the costs required for materials and wages, as well as other costs related to the implementation of the building or project. CV Company. TEGUH SEJAHTERA is a company operating in the construction services sector. CV. TEGUH SEJAHTERA has handled various projects ranging from irrigation construction, buildings, roads, bridges, docks, and other construction services.  Activity Based Budgeting is a budget preparation process that focuses on improving the system used by the organization in order to produce value for customers and focuses on processes that are integral to an organization, as well as being a process of planning and controlling activities expected by the organization to achieve the budget. that is cost-effective and meets workloads in line with organizational goals and strategies. Using the Activity Based Budgeting method can help solve problems in planning budget costs on CV. TEGUH PROSPEROUS Kendal.
PERANCANGAN KEAMANAN JARINGAN PADA BANK SULSELBAR PAREPARE Rakhmadi Rahman; Julistio Fadjar Anugrah Sao
Jurnal Riset Sistem Informasi Vol. 1 No. 3 (2024): Juli : Jurnal Riset Sistem Informasi
Publisher : CV. Denasya Smart Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.69714/jq9f3955

Abstract

This research discusses the implementation of computer networks at Bank Sulselbar Parepare branch to improve operational efficiency and data security. Using the Cisco Packet Tracer application, network topology design involves the use of switches to manage data traffic, PCs for communication between devices, and servers connected to Cisco switches to ensure easy access to critical services. Static IP address settings ensure reliable connections, while firewalls on servers secure the network from unauthorized access and cyberattacks. Test results show significant improvements in network security and efficiency, as well as improved service quality and customer satisfaction. This implementation succeeded in meeting the objectives of improving operational performance and data security at the bank.
KEAMANAN JARINGAN PADA PERGURUAN TINGGI Muhammad Alfian; Rakhmadi Rahman
Jurnal Riset Sistem Informasi Vol. 1 No. 3 (2024): Juli : Jurnal Riset Sistem Informasi
Publisher : CV. Denasya Smart Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.69714/qgnbgv11

Abstract

This research analyzes the role of network security in higher education in the face of increasingly complex cyber threats. Using a literature study methodology, this research identified challenges such as malware attacks, phishing, DDoS, and hacking, as well as vulnerabilities such as resource limitations and lack of user awareness. Recommended preventive practices include the implementation of multifactor authentication systems, data encryption, and increased user awareness. The use of firewalls was also highlighted as an important component in protecting the college's digital assets. This research provides guidance for educational institutions to improve their network security infrastructure.
PENERAPAN SMART CONTRACT UNTUK PENGELOLAAN ASET DI INSTITUT TEKNOLOGI BACHARUDDIN JUSUF HABIBIE Syafira Fatwa; Rakhmadi Rahman
Jurnal Riset Sistem Informasi Vol. 1 No. 3 (2024): Juli : Jurnal Riset Sistem Informasi
Publisher : CV. Denasya Smart Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.69714/nfjvjr87

Abstract

This research explores the application of blockchain technology and smart contracts as an innovative solution to improve asset management at the Bacharuddin Jusuf Habibie Institute of Technology (ITH). By utilizing blockchain, this research aims to increase security, transparency and efficiency of asset management through decentralizing data storage and automating transaction execution. A comprehensive literature review and network design using Cisco tools were used to build a reliable and secure network infrastructure to support the implementation of blockchain technology. Conventional asset management processes often face challenges such as security risks, lack of transparency, and administrative inefficiencies. Blockchain offers a solution by providing a system that is resistant to change (immutability), decentralization, and automation through smart contracts. The results of this research show that the use of blockchain technology at ITH improves network connectivity, strengthens security measures, and simplifies the asset management process. Implementing firewalls and NAT in network design plays an important role in protecting data and maintaining system integrity. The study also identified several challenges, including the need for adequate staff training and infrastructure improvements to support this technology on an ongoing basis. Recommendations for future implementation include intensive training for staff regarding blockchain technology, improving network infrastructure, regular evaluation of already implemented systems, and adding layers of security to ensure optimal data protection. With these steps, it is hoped that ITH can maximize the benefits of blockchain technology in managing campus assets, as well as providing an example for other educational institutions in adopting this technological innovation.
FORENSIK JARINGAN UNTUK INVESTIGASI KEJAHATAN CYBER Rakhmadi Rahman; Gina Latifa Akmal
Jurnal Riset Sistem Informasi Vol. 1 No. 3 (2024): Juli : Jurnal Riset Sistem Informasi
Publisher : CV. Denasya Smart Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.69714/zxrv9q19

Abstract

This study investigates the application of Snort as an intrusion detection tool for addressing insider threats in network environments. The primary focus is on utilizing network forensic techniques to identify, analyze, and respond to suspicious activities conducted by internal users. The analysis method involves implementing Snort on a Linux platform to monitor network traffic in real-time and collect digital evidence that can be used in forensic investigations. The study successfully demonstrates that Snort is effective in detecting suspicious behavior patterns associated with insider threats, such as unauthorized access attempts and potentially malicious application usage. The digital evidence gathered by Snort aids in further forensic analysis, assisting in the identification of threat sources and facilitating a swift and appropriate response to security incidents. The discussion highlights the strengths and weaknesses of using Snort in the context of insider threat detection, emphasizing the importance of meticulous configuration and regular maintenance for optimal performance. The study concludes that employing Snort within a network forensic framework enhances an organization's ability to detect, analyze, and respond to insider threats, providing better protection for organizational assets and information from various internal cyber threats. This research lays the foundation for developing more effective security policies and improving cybersecurity awareness within organizations.
PENERAPAN RFID PADA SISTEM INFORMASI PENCATATAN PERSEDIAAN BARANG DI PT. PRIMA SEJATI SEJAHTERA KOTA BOYOLALI Bagus Sudirman; Ahmad Ashifuddin Aqham; Indra Ava Dianta; Aqnes Wulandari
Jurnal Riset Sistem Informasi Vol. 1 No. 2 (2024): April : Jurnal Riset Sistem Informasi
Publisher : CV. Denasya Smart Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.69714/q7cpsk72

Abstract

A system is a series of data or more than one component that is connected and interacts with each other to achieve certain goals (Sallaby & Kanedi 2020). Radio Frequency Identification or what is called RFID is a small electronic device consisting of a chip and an antenna. The aim of this research is to make data input easier, save time and produce more detailed and clear data. This type of research is qualitative descriptive research. The research results obtained regarding the use of the Radio Frequency Identification (RFID) system are that by scanning the Radio Frequency Identification (RFID) data it can be input automatically, there will be no double scans, and the data can be seen in detail and in detail.
MENINGKATKAN KEAMANAN EDGE COMPUTING DAN IOT DENGAN UBUNTU DARI ANCAMAN REAL-TIME Rakhmadi Rahman; Zulfattah, Abdul Khaliq; Haslinda Haslinda
Jurnal Riset Sistem Informasi Vol. 1 No. 4 (2024): Oktober : Jurnal Riset Sistem Informasi
Publisher : CV. Denasya Smart Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.69714/kw984551

Abstract

Using edge computing technology, this research aims to develop an Internet of Things (IoT) system that can detect and resolve phishing attacks in real-time. The system enhances cybersecurity by focusing on rapid detection and response to increasingly sophisticated and frequent phishing attacks. It collects and processes data from various sources, including emails, text messages, and network activity logs of IoT devices, enabling more accurate analysis and detection of different types of phishing attacks. The developed phishing detection model demonstrates high performance with 95% accuracy, 93% precision, 94% recall, and an f1-score exceeding 93.5%. Edge computing allows for local data processing, reducing latency and accelerating threat response. This approach also enhances security by eliminating the need to transmit data to a central server, thus minimizing data breach risks during transmission. The system is well-integrated, using secure communication protocols and implementing Zero Trust principles to ensure maximum security at every layer. High-load simulations demonstrate the system's scalability and resilience, proving its ability to handle large data volumes and simultaneous attacks. Ubuntu Core was chosen as the operating system due to its high security and efficiency, crucial for running IoT devices with limited computing resources. The study also emphasizes the importance of increasing user awareness of phishing threats through automated detection and continuous education, creating a holistic approach to phishing risk mitigation. By combining IoT, edge computing, and machine learning technologies, this research contributes significantly to developing effective and efficient cybersecurity solutions to address evolving phishing threats. The findings pave the way for implementing more robust and responsive security systems in an increasingly connected digital era.
PENGUJIAN PENETRASI JARINGAN MENGGUNAKAN OWASP ZAP DAN SQLMAP UNTUK MENGIDENTIFIKASI KERENTANAN KEAMANAN WEBSITE Rakhmadi Rahman; Fatkhur Razak, Danang
Jurnal Riset Sistem Informasi Vol. 1 No. 4 (2024): Oktober : Jurnal Riset Sistem Informasi
Publisher : CV. Denasya Smart Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.69714/e4rhmk70

Abstract

Web application security is becoming increasingly critical amidst increasing cyber threats that can result in data leakage and other losses. This research aims to identify and exploit security vulnerabilities in a web application using two popular tools, OWASP ZAP and SQLMAP. OWASP ZAP is used to find various vulnerabilities such as Cross-Site Scripting (XSS) and insecure configuration, while SQLMAP is focused on the detection and exploitation of SQL Injection vulnerabilities. Through a series of automated scans and in-depth analysis, this research successfully identified several vulnerabilities with medium and low risk levels. The test results show that both tools are effective in identifying vulnerabilities, providing important insights into mitigation steps that need to be taken to improve web application security. This research also emphasizes the importance of input validation and sanitization, the use of parameterized queries, and security configuration updates as key mitigation measures. The findings are expected to contribute to improved security practices in web application development and reduce the risk against cyberattacks.
IMPLEMENTASI DESIGN THINKING DALAM PERANCANGAN USER INTERFACE (UI) UNTUK SISTEM PENILAIAN PESERTA MAGANG PERUMDA TIRTA MUSI PALEMBANG Dhea Afnisyah Putri; Fathiyah Nopriani
Jurnal Riset Sistem Informasi Vol. 1 No. 4 (2024): Oktober : Jurnal Riset Sistem Informasi
Publisher : CV. Denasya Smart Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.69714/95h6cz24

Abstract

The management and assessment of internship participants are still done manually, namely by filling out paper forms which are then processed separately. This manual process results in various obstacles such as the potential for human error, delays in data processing, and difficulties in storing and managing assessment history. Digitalization of the internship assessment process is an urgent need for Perumda Tirta Musi Palembang. A website-based internship assessment system can be a solution that allows the entire assessment process to be carried out automatically and in an integrated manner. This system also allows for the availability of assessment history that is stored neatly and in a structured manner, which ultimately makes it easier for companies to select and evaluate prospective internship participants in the future. The results of the research are the design of a User Interface for the assessment system which is expected to increase efficiency, transparency, and accuracy in the internship assessment process. This design can be a reference for further development, making it easier for admins to manage assessment data, and assisting supervisors and interns in a more structured evaluation process.