cover
Contact Name
Andri Nofiar.
Contact Email
garuda@apji.org
Phone
+6285885852706
Journal Mail Official
febri@apji.org
Editorial Address
Perum Cluster G11 Nomor 17 Jl. Plamongan Indah, Kadungwringin, Pedurungan, Semarang, Provinsi Jawa Tengah, 50195
Location
Kota semarang,
Jawa tengah
INDONESIA
Saturnus: Jurnal Teknologi dan Sistem Informasi
ISSN : 30319935     EISSN : 30319943     DOI : 10.61132
Core Subject : Science,
Saturnus : Jurnal Teknologi dan Sistem Informasi memuat naskah hasil-hasil penelitian di bidang Teknologi, dan Sistem Informasi
Articles 81 Documents
Implementasi Keamanan Cyber Berbasis Nilai Nilai Kebangsaan UUD 1945 di Era Digital Best Practice di Perusahaan Pertamina Thomas Komansilan; Edy Soesanto; Natasha Salsabillah
Saturnus : Jurnal Teknologi dan Sistem Informasi Vol. 2 No. 3 (2024): Juli : Saturnus : Jurnal Teknologi dan Sistem Informasi
Publisher : Asosiasi Riset Teknik Elektro dan Informatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61132/saturnus.v2i3.116

Abstract

The advancement of digital technology has brought about significant progress across various sectors, while simultaneously introducing new risks, particularly in the realm of cybersecurity. Cybersecurity has become a critical concern for companies, including energy giants like Pertamina. In the context of Indonesia, adherence to cybersecurity within Pertamina must align with relevant legal frameworks, such as the 1945 Constitution (UUD 1945). This research aims to explore optimal approaches to implementing cybersecurity within Pertamina, with a focus on the legal underpinnings of the 1945 Constitution. Key attention is directed towards Article 27, paragraph (3) of the Constitution, which guarantees universal access to education, including information security training for employees—a crucial element in thwarting cyber threats. Furthermore, Article 28, paragraph (1) of the 1945 Constitution, safeguarding freedom of association, can be interpreted to endorse collaboration between Pertamina and external entities, like cybersecurity institutions and regulatory bodies, to bolster cyber defense capabilities. Integration of cutting-edge security technology is paramount, aligning with the principles outlined in Article 33, paragraph (2) of the 1945 Constitution, emphasizing the preservation of natural resources. This extends to safeguarding Pertamina's data and digital infrastructure through measures like encryption technology, robust network security protocols, and effective intrusion detection systems. By heeding the legal foundations provided by the 1945 Constitution, the implementation of cybersecurity at Pertamina must be comprehensive, encompassing employee education, technological upgrades, and collaborative efforts with external stakeholders. Such measures aim to mitigate cyber risks, safeguard operational interests, and shield sensitive information from evolving threats in today's digital landscape. Additionally, Law Number 11 of 2008 plays a crucial role in governing information technology and electronic transactions in Indonesia. This legislation grants legal validity to electronic documents, signatures, and transactions, while also ensuring information security and user privacy. It imposes criminal penalties for illicit activities in the realm of information technology, fostering a secure environment for electronic transactions and upholding user rights in the digital age.
Implementasi Penerapan Resiko Keamanan Industri 4.0 Berbasis Nilai Nilai Kebangsaan UUD 1945 dalam Proses Produksi PT.Toyota Astra Indonesia Muhammad Rifda H; Edy Soesanto; Titan Shafrial Chaesar H; Teta Wahyu Sibero T
Saturnus : Jurnal Teknologi dan Sistem Informasi Vol. 2 No. 3 (2024): Juli : Saturnus : Jurnal Teknologi dan Sistem Informasi
Publisher : Asosiasi Riset Teknik Elektro dan Informatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61132/saturnus.v2i3.118

Abstract

Industrial safety is an important aspect in maintaining a safe work environment and in accordance with applicable legal regulations. In the context of manufacturing companies such as PT. Toyota Astra Indonesia, implementing industrial safety is crucial to ensure the production process runs smoothly and safely for its workers. This article discusses the implementation of industrial security based on the 1945 Constitution (UUD 1945) in the production process of PT. Toyota Astra Indonesia. Industrial security implementation steps carried out by PT. Toyota Astra Indonesia includes the implementation of strict work safety standards, supervision of the use of work equipment, employee training on safety, and regular audits to ensure compliance with regulations contained in UUD No. 1 of 1970 concerning Work Safety. Apart from that, the company also pays attention to environmental protection aspects in its production process in supervision so as to integrate work safety with environmental sustainability. In the context of the 1945 Constitution, the implementation of industrial security at PT. Toyota Astra Indonesia includes a company's code of ethics in (UUD No. 40 of 2007 Article 74), policies and compliance with the law, health and safety policies at work, and Corporate Social Responsibility (CSR) policies directed at ensuring that workers' rights are respected. guaranteed in the 1945 Constitution to be fulfilled properly. In this way, the company ensures that a safe and conducive work environment is the right of every worker in accordance with applicable legal provisions. By implementing industrial security based on the 1945 Constitution, PT. Toyota Astra Indonesia not only ensures compliance with legal regulations, but also supports the country by contributing to providing automotive capabilities and maintaining the company's reputation and increasing overall productivity. In addition, the integration of job security and environmental protection also reflects the company's commitment to sustainability and corporate social responsibility.
Pengaruh Perkembangan Teknologi Digital terhadap Peran Notaris Muhammad Fariz Fadlillah
Saturnus : Jurnal Teknologi dan Sistem Informasi Vol. 2 No. 3 (2024): Juli : Saturnus : Jurnal Teknologi dan Sistem Informasi
Publisher : Asosiasi Riset Teknik Elektro dan Informatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61132/saturnus.v2i3.121

Abstract

This study aims to determine the influence of digital technology development on the role of notaries, as well as the challenges faced by notaries in dealing with digital technology development. This research uses qualitative research methods. The research data was obtained through in-depth interviews with notaries, legal observers, and users of notary services. The data obtained was analyzed using thematic analysis method. The results showed that the development of digital technology has brought positive and negative influences to the role of notaries. The positive influences include: 1) Increasing the efficiency and effectiveness of notary work 2) Reaching a wider community 3) Improving the quality of notary services. The negative influences include: 1) The emergence of new challenges for notaries 2) Raising the potential for legal violations. This research concludes that the development of digital technology has changed the role of notaries. Notaries are required to continue to innovate and improve their competence in order to face these challenges.
Manajemen Proyek Sistem Informasi Untuk Pengembangan MDA Content Archive Platform Ifrah Ayyuna
Saturnus : Jurnal Teknologi dan Sistem Informasi Vol. 2 No. 3 (2024): Juli : Saturnus : Jurnal Teknologi dan Sistem Informasi
Publisher : Asosiasi Riset Teknik Elektro dan Informatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61132/saturnus.v2i3.126

Abstract

This document is a project proposal plan for the creation or development of applications by PT. Multi Development Application (MDA) through the MDA Content Archive Platform (CAP) solution which accommodates and optimizes paper-based, digital data storage (Application Optimized Storage) for the benefit of banking organizations, the private sector, government, educational institutions and all kinds of business entities, which have The desire to realize a real form of cooperation in efforts to protect data or archives that have high historical value, so that the data or archives are safe and not easily damaged.
Teknologi Sebagai Kegiatan Manusia Dalam Era Modern Kehidupan Masyarakat Faisal Tamimi; Siti Munawaroh
Saturnus : Jurnal Teknologi dan Sistem Informasi Vol. 2 No. 3 (2024): Juli : Saturnus : Jurnal Teknologi dan Sistem Informasi
Publisher : Asosiasi Riset Teknik Elektro dan Informatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61132/saturnus.v2i3.157

Abstract

This research examines Technology as a Human Activity in the Modern Era of Community Life, technology is something that we cannot avoid in the current era of modernization, all human activities using technology have progressed very rapidly. By using this sophisticated technology, humans in the modern era can make it easier to do work. At first technology developed gradually along with the progress of culture and civilization. Because technology is a rapidly advancing cultural development, humans develop technology more quickly. Because technology provides structure for human activity, it can be said that technology does not simply assist human activity, but also reshapes it, creating new activities that define the self, community, and good. Moral-ethical decisions, social relationships, space, time, perception, and self-concept. Transformation through technological advances For example, when complex new instruments or techniques are used in medical practice, it not only changes what doctors do but also how people think about health, disease, and medical care. Social and moral life is influenced by the technological devices we appraise. They enhance human worldviews, social practices, organizations, values, and lifestyles. Nowadays, it is difficult to be truly active in making technological decisions while technological devices are most often imposed on us, forcing many things on us. Apart from having a positive impact, the development of this technology also has a negative impact which can hinder direct interaction between people, where people already have a lot of indirect interaction, everyone is already dependent on technology, especially smartphones and social media, all activities already involves social media, be it news, business, learning and others.
Audit Sistem Informasi Absensi Karyawan Berbasis Cobit 4.1 Nadila Ayudiapasa; Pujiani Pujiani; Ratna Cantika
Saturnus : Jurnal Teknologi dan Sistem Informasi Vol. 2 No. 3 (2024): Juli : Saturnus : Jurnal Teknologi dan Sistem Informasi
Publisher : Asosiasi Riset Teknik Elektro dan Informatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61132/saturnus.v2i3.171

Abstract

Employee attendance information systems are an important component in human resource (HR) management in various organizations. Auditing attendance system information is necessary to ensure that the system runs effectively and efficiently, and complies with applicable regulations and policies. COBIT 4.1 (Control Objectives for Information and Associated Technologies) is an audit framework that can be used to deploy attendance information systems. This research aims to conduct an audit of the employee attendance information system using the COBIT 4 framework. This audit was carried out to evaluate the effectiveness of internal control, compliance with regulations, and operational efficiency of the employee attendance information system at XYZ company. The research method used is a combination of qualitative and quantitative, including interviews, observation and testing. The research results show that in general the employee attendance information system has been running well, but there are still several findings related to control and compliance weaknesses that need to be improved. The recommendations provided include improving access rights management, monitoring activities, as well as improving procedures and documentation.
Audit Sistem Informasi: Perbandingan Kinerja Sistem Operasi Windows 7 dan Windows 10 Widya Natasya; Nezha Febriyan; Zihan Sari; Dinda Firdawati Simamora
Saturnus : Jurnal Teknologi dan Sistem Informasi Vol. 2 No. 3 (2024): Juli : Saturnus : Jurnal Teknologi dan Sistem Informasi
Publisher : Asosiasi Riset Teknik Elektro dan Informatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61132/saturnus.v2i3.180

Abstract

This research aims to audit information system performance by comparing two versions of the Windows operating system, namely Windows 7 and Windows 10. The method used includes testing various performance parameters such as boot time, memory usage, disk access speed, power efficiency, system stability, and performance. multitasking. The research results show that Windows 10 has significant performance improvements compared to Windows 7 in various aspects tested, especially in power efficiency and disk access speed.
Penerapan Metode Clustering Kecemasan Anak Terhadap Bullying Setia Ningsih; Yani Maulita; Husnul Khair
Saturnus : Jurnal Teknologi dan Sistem Informasi Vol. 2 No. 3 (2024): Juli : Saturnus : Jurnal Teknologi dan Sistem Informasi
Publisher : Asosiasi Riset Teknik Elektro dan Informatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61132/saturnus.v2i3.182

Abstract

Bullying is a verbal or non-verbal bullying activity through the media (cyber bullying) or directly, carried out by a child or group of children against other children. Aggressive behavior such as bullying among teenagers results in problems such as anxiety. The problem at SMKN 2 Binjai in 2024 is the difficulty of identifying children's anxiety about bullying disorders because there is no strong reference as evidence for cases of bullying carried out by perpetrators against victims. So research is needed to cluster gender, type of bullying and children's anxiety levels, with many parties still not monitoring children's activities enough to see how big the impact is on children who experience bullying. The aim of this research is to determine gender, type of bullying and different levels of anxiety among children who experience bullying. Based on the results of grouping bullying cases using the K-Means algorithm, 3 clusters and 3 iterations were obtained, where cluster 1 contained 9 data. , cluster 2 has 4 data and cluster 3 has 7 data, so it can be concluded that bullying cases tend to occur in women who experience types of bullying in the form of cyber and psychological with a mild level of anxiety.
Sistem Monitoring Suhu Dan Kelembaban Pada Ruang Server Berbasis Internet Of Things : (Studi Pada Rumah Sakit Roemani Muhammadiyah Semarang) Farhan Afif Ilmi; Dani Sasmoko; Iman Saufik Suasana; Sulartopo Sulartopo; Toni Wijanarko Adi Putra
Saturnus : Jurnal Teknologi dan Sistem Informasi Vol. 2 No. 3 (2024): Juli : Saturnus : Jurnal Teknologi dan Sistem Informasi
Publisher : Asosiasi Riset Teknik Elektro dan Informatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61132/saturnus.v2i3.186

Abstract

Temperature and humidity are inseparable from server rooms. This is important because server rooms consist of computers that provide services 24 hours a day without stopping. After collecting all the supporting data, the author found that the temperature was too high and the humidity did not meet the standard, causing the computer to not function properly. The author finally created a tool that can monitor the temperature and humidity in the server room and applied it to the server room of Roemani Muhammadiyah Hospital in Semarang. The tool works by reading the temperature and humidity using a DHT22 sensor. After the data is read, the ESP32 will process the data, which will then be sent to a database and stored. The data can be viewed directly from anywhere. The tool not only monitors but also performs other functions, such as turning on the AC/fan when the temperature rises above the predetermined limit and sending notifications via Telegram to the staff so that they can take further action.This device will help the staff because all information about temperature and humidity will be recorded well, so the staff does not need to check the server room all the time.
Perancangan Arsitektur Enterprise Menggunakan Framework TOGAF ADM Pada SMAN 3 Sidoarjo Valent Aderiandra; Siti Mukaromah; Doddy Ridwandono
Saturnus : Jurnal Teknologi dan Sistem Informasi Vol. 2 No. 3 (2024): Juli : Saturnus : Jurnal Teknologi dan Sistem Informasi
Publisher : Asosiasi Riset Teknik Elektro dan Informatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61132/saturnus.v2i3.201

Abstract

Currently, SMAN 3 Sidoarjo does not have an enterprise architecture and integrated data. To increase the utilization of IT and IS at SMAN 3 Sidoarjo, development through enterprise architecture is needed. The essence of this proposal is to plan an architectural effort as an aid to improving IS and IT at SMAN 3 Sidoarjo in the future. The method used is The Open Group Architecture Framework – Architecture Development Method (TOGAF ADM). The information obtained utilizes qualitative research obtained from observations, document studies and interviews. The continued impact of this research is business architecture, data architecture, application architecture, and technology architecture. The selected design content includes application portfolio catalog, application/organization matrix, logical data diagram and computer network diagram. It is believed that this recommendation can be a reference for improving or developing IS and IT at SMAN 3 Sidoarjo to realize the vision and mission of SMAN 3 Sidoarjo through business architecture, information systems architecture and technology architecture..