cover
Contact Name
Aufa Rizka Azzumi
Contact Email
garuda@apji.org
Phone
+6281269402117
Journal Mail Official
Riyadi@apji.org
Editorial Address
Jalan Raya Ajibarang Km 1 , Kab. Banyumas, Provinsi Jawa Tengah, 53163
Location
Kab. banyumas,
Jawa tengah
INDONESIA
Ignite: Journal Islamic Global Network for Information Technology and Entrepreneurship
ISSN : 30252849     EISSN : 30252857     DOI : 10.59841
Information Technology, Management Information Systems, E-commerce, Computational Intelligence, Information Infrastructure, Cyberspace, Enterprise Resource Models
Articles 41 Documents
Teknik Virtualisasi Penyimpanan pada Google Drive Guna Meningkatkan Keamanan dan Isolasi dalam Infrastruktur TI Hatfina Rustamin; Afiqah Afiqah
Journal Islamic Global Network for Information Technology and Entrepreneurship Vol. 2 No. 3 (2024): July : Journal Islamic Global Network for Information Technology and Entreprene
Publisher : STIKes Ibnu Sina Ajibarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59841/ignite.v2i3.1598

Abstract

Storage virtualization has become a key data management technology in the digital age, providing an efficient and secure solution for growing storage needs. Google Drive has adopted this technology to optimize user data management, including designing a security architecture, implementing data encryption in transit and at rest, and managing encryption keys. Access control using two-factor authentication (2FA). A reliable data backup and recovery system ensures fast recovery in the event of an accident. The technology enables additional features such as deduplication, compression, and version control that increase storage efficiency and flexibility. As a result, Google Drive offers secure, efficient and reliable cloud storage that allows users to manage data from multiple devices, confident that their data is protected.
Relationships of Healthcare Communication, Emotional Support and Family Support on Hemodialysis Decisions Dwi Laksono, Rudy; Esah Siti Aisyah; Ana Rosyana; Ike Junita Triwardhani
Journal Islamic Global Network for Information Technology and Entrepreneurship Vol. 2 No. 3 (2024): July : Journal Islamic Global Network for Information Technology and Entreprene
Publisher : STIKes Ibnu Sina Ajibarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59841/ignite.v2i3.1635

Abstract

Hemodialysis is a primary therapy for patients with end-stage chronic kidney disease. This study aims to examine the relationship between healthcare communication, emotional support, and family support on patients' decisions to undergo hemodialysis. A cross-sectional survey method was employed, involving 77 patients at the Hemodialysis Unit of Dustira Hospital, Cimahi. The research instruments included structured questionnaires measuring variables such as healthcare communication, healthcare emotional support, family support, and consent decisions. Data were analyzed using SmartPLS software. The results showed that healthcare communication had a significant influence on emotional support (R = 0.640, p < 0.001) and family support (R = 0.611, p < 0.001). Healthcare communication also had a very strong and significant impact on patients' consent decisions (R = 0.663, p < 0.001). Although the emotional support from healthcare providers had a small impact on consent decisions (R = 0.034, p > 0.05), family support had a relatively small but greater influence (R = 0.108, p < 0.05). In conclusion, effective communication between healthcare providers and family support is crucial in the medical decision-making process for hemodialysis patients. Enhancing the quality of communication between healthcare providers and patients is essential to support better medical decisions and improve patient health outcomes.
Sertipikat Tanah VS Sertifikat Tanah: Analisis Data Penggunaan Istilah Produk Hukum di Media Sosial Ridho Darman
Journal Islamic Global Network for Information Technology and Entrepreneurship Vol. 2 No. 3 (2024): July : Journal Islamic Global Network for Information Technology and Entreprene
Publisher : STIKes Ibnu Sina Ajibarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59841/ignite.v2i3.1758

Abstract

The land title (in Indonesian: sertipikat) is a legal product issued by the Ministry of Agrarian Affairs and Spatial Planning/National Land Agency, while “sertifikat” (spelled with 'f' instead of 'p'), which is the standard term according to KBBI (Indonesian Dictionary). The number of social media users increases every year, resulting in a growing amount of data generated. Big data derived from social media can encompass public perception or societal behaviors. The significant benefits derived from social media analytics provide opportunities to explore and analyze data sources within social media. This study analyzes data from the social media platforms Twitter, Facebook, and Instagram to determine common terms used by the public regarding "sertipikat tanah" (land certificate) and "sertifikat tanah" (land certificate). These platforms were chosen because they provide open data. The use of uncommon terms among the public potentially hinders the government's intended objectives. The final results indicate that despite "sertipikat" being the official legal term, the public is more accustomed to using "sertifikat tanah." The comparison of usage between "sertipikat tanah" and "sertifikat tanah" on Facebook is 11% : 89%, on Instagram 38% : 62%, and on Twitter 70% : 30%, with the majority of "sertipikat tanah" usage on Twitter originating from government accounts.
Pengendalian Mutu Proses Pengemasan Ikan Tuna Skipjack (Katsuwonus Pelamis) Kaleng Metode Seven Tools Farra Debriana Verisca; A.S.F.Q.R Mubarok; B. Kusuma; A.W. Perdana
Journal Islamic Global Network for Information Technology and Entrepreneurship Vol. 2 No. 4 (2024): Journal Islamic Global Network for Information Technology and Entrepreneurship
Publisher : STIKes Ibnu Sina Ajibarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59841/ignite.v2i4.1971

Abstract

Skipjack tuna (Katsuwonus pelamis) is a pelagic species that migrates long distances and inhabits all tropical and subtropical waters in the world's oceans. Proper and efficient processing is required in order to maintain the quality of the fish and obtain maximum final product results. One form of processing skipjack tuna is canned tuna. The aim of this research is to analyze the quality control of the canned skipjack tuna packaging process. The method used is data analysis using the seven tools method, data is processed using flowchart, check sheets, fishbone diagrams, scatter diagrams, Pareto diagrams, control charts and managerial implications. The results of this research were that within 11 days of canned tuna production, 3 types of product defects were found. Defects consisted of 54.63% dented cans, 25.00% lid scratches, and 20.37% can body scratches. These defects are caused by various factors such as humans, machines, methods and materials. The results obtained during 11 days of observing the production process, on the control chart there were no points that passed the Upper Control Limit (UCL) or Lower Control Limit (LCL), showed that the canned tuna production process is within control limits.
Facial Landmarks and Face Detection in Python With OpenCv Supiyandi Supiyandi; Icha Miranti Irzan; Risma Hidayati; Rosa Prahasti; Natria Selina
Journal Islamic Global Network for Information Technology and Entrepreneurship Vol. 2 No. 4 (2024): Journal Islamic Global Network for Information Technology and Entrepreneurship
Publisher : STIKes Ibnu Sina Ajibarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59841/ignite.v2i4.2011

Abstract

Face detection and facial landmarks are an important technique in the field of computer vision with a wide range of potential applications, including expression recognition, security systems, and human-computer interaction. This study explores the implementation of facial landmarks detection using Python and OpenCV, focusing on the use of the Haar Cascade algorithm for face detection and the Local Binary Features (LBF) model for the identification of landmarks. The proposed method implements real-time detection via webcam, capable of recognizing 68 important points on the human face. The results show that the approach using OpenCV and LBF models has good accuracy in detecting and tracking facial features in different lighting conditions and viewing angles. This research contributes to the development of efficient and reliable facial detection methods, with wide application potential in the fields of computer vision, security, and behavioral analysis.
Sistem Pendukung Keputusan Pemilihan Siswa Terbaik Menggunakan Metode Multi-Attribute Utility Theory (MAUT): SD Islam Nurul Mubin NW Iwan Bongkot Saikin Saikin; Sofiansyah Fadli; Hairul Fahmi
Journal Islamic Global Network for Information Technology and Entrepreneurship Vol. 3 No. 1 (2025): Journal Islamic Global Network for Information Technology and Entrepreneurship
Publisher : STIKes Ibnu Sina Ajibarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59841/ignite.v3i1.2287

Abstract

Selection Optimal student selection can involve many considerations. The challenges faced in optimal student selection include the establishment of criteria that are explicit and objective criteria, accessibility of appropriate data to evaluate the student performance and qualifications, and ambiguity or disagreement surrounding the decisions made. This research aims to apply the Multi-Attribute Utility Theory Theory of Multi-Attribute Utility (MAUT) for the selection of exemplary students, thus facilitating the process for educational institutions, particularly student affairs departments, to identify the best students at the end of each semester. Results ranking showed that the first position was achieved by the student M. Qinan Hasan Al-Gazy with a final score of 0.65, the second position was achieved by student Rifqi Saputra with a final score of 0.62, the third position was achieved by student A. Gifari Pratama with a final score of 0.4854, and the fourth position was achieved by student Muh. Alfian with a final score of 0.25.
Evaluasi Program Internet Publik di Kota Tanjungpinang dalam Mendukung Inklusi Digital Fournely Aritasia Siahaan; Bismar Arianto; Ella Afnira
Journal Islamic Global Network for Information Technology and Entrepreneurship Vol. 3 No. 3 (2025): Juli : Journal Islamic Global Network for Information Technology and Entreprene
Publisher : STIKes Ibnu Sina Ajibarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59841/ignite.v3i3.2871

Abstract

This study aims to evaluate the implementation of the Public Internet Program in Tanjungpinang City in supporting digital inclusion. Based on the 2018-2023 Strategic Plan document from the target of 100 points, only 34 public wifi points were realized. The evaluation was carried out using the theory of William N Dunn (2003), using six indicators, namely, effectiveness, efficiency, adequacy, equity, responsiveness, and accuracy. This research uses a qualitative approach with data collection techniques through observation, interviews, and documentation of 12 informants. The results of this study indicate that the implementation of the program has been running but not optimal. This can be seen in the effectiveness indicator where the placement of access points is less strategic, because it is located in upper-class housing which generally already has its own internet access, then the network quality is less stable with the bandwidth provided of 20 Mbps through a scramble system where the ideal standard according to the IT perspective is 2 Mbps per user outside watching YouTube. In the efficiency indicator, from 2013-2023 the realization did not reach the target set at the beginning, then the lack of maintenance resulted in 8 internet points not working. The adequacy indicator has not been said to be optimal in meeting needs through value, opportunity, and method adjustment as evidenced by the fact that there is no national standard as a reference in program implementation and unclear location data collection. In the equity indicator, there is a mismatch in infrastructure facilities, small areas have not been reached, and there is 1 location point that is locked. The responsiveness indicator is good, but there is still low participation from the community. Finally, the accuracy indicator is directed towards the community, but the implementation is not in accordance with the needs, and has not reached the initial target.
Analisis Elastisitas Harga dan Pendapatan dalam Perspektif Ekonomi Konvensional dan Mikro Islam Zohya Azzura; Eka Christina Waruwu; Reni Ria Armayani Hasibuan
Journal Islamic Global Network for Information Technology and Entrepreneurship Vol. 3 No. 3 (2025): Juli : Journal Islamic Global Network for Information Technology and Entreprene
Publisher : STIKes Ibnu Sina Ajibarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59841/ignite.v3i3.2953

Abstract

This study aims to analyze price elasticity and income elasticity of products by integrating perspectives from conventional economics and Islamic microeconomics. In conventional economics, price and income elasticity are used to understand consumer demand sensitivity to changes in price and income. Meanwhile, Islamic microeconomics adds an ethical dimension, such as the prohibition of israf (wastefulness) and the importance of balanced consumption. The findings indicate that elasticity analysis is crucial not only for business strategies and economic policies but also must incorporate Islamic economic principles to promote sustainable and ethical consumption. This study suggests that integrating Islamic microeconomic values in elasticity analysis can enrich the understanding of consumer behavior and foster more inclusive economic policies.
Analisis Keamanan Database dalam Menghadapi Ancaman Kebocoran Data di Perusahaan Teknologi Informasi Nisa Alifatuzzahra
Journal Islamic Global Network for Information Technology and Entrepreneurship Vol. 3 No. 3 (2025): Juli : Journal Islamic Global Network for Information Technology and Entreprene
Publisher : STIKes Ibnu Sina Ajibarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59841/ignite.v3i3.2957

Abstract

Information technology companies rely heavily on databases to store critical data that is vulnerable to leaks that can be financially and reputationally detrimental. This study aims to analyze the effectiveness of database security mechanisms, especially encryption and access control, in preventing data leaks. The method used is a case study with a qualitative approach through observation and interviews at information technology companies, as well as technical analysis of database protection implementation. The results of the study show that to maintain data security, companies need to use end-to-end encryption and a biometric login system so that only authorized people can access it. Smart technology such as AI is also important for detecting threats quickly. In addition, using special tools to monitor devices and routinely test security helps reduce risks. No less important, providing security training to employees so that they are more vigilant and do not become a gap for data leaks. In this way, companies can be better prepared to face various threats in today's digital era.
Pengaruh Pembelajaran IPS Berbasis Masalah dengan Strategi Think Talk Write (TTW) terhadap Kemampuan Kognitif dan Keaktifan Siswa Kelas VIII SMPN 3 Srengat Kabupaten Blitar Sofi Ayu Nur Martasari; Nur Isroatul Khusna
Journal Islamic Global Network for Information Technology and Entrepreneurship Vol. 3 No. 3 (2025): Juli : Journal Islamic Global Network for Information Technology and Entreprene
Publisher : STIKes Ibnu Sina Ajibarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59841/ignite.v3i3.3085

Abstract

This research is based on the condition of students who are less enthusiastic and tend to be passive during learning. Students consider social studies to be boring and difficult, resulting in low student activeness. This low activeness affects students’ cognitive abilities. An effort that can be made is to create a fun learning atmosphere by using appropriate and interesting learning strategies, one of which is the Think Talk Write learning strategy. This strategy makes students active and more enthusiastic, so they achieve satisfying cognitive ability scores. The problem formulation in this research is how much influence the Think Talk Write strategy has on cognitive abilities, student activeness, and both in social studies subjects. This research uses a quantitative approach with a Quasy Experimental Design and a nonequivalent control group design. The sample consists of 29 students in the control class and 26 students in the experimental class. The sampling technique used is purposive sampling, with data collected through cognitive ability tests and student activeness sheets. Data analysis was performed using the Independent Sample T-Test and MANOVA. The results show that the Think Talk Write strategy influences students’ cognitive abilities and activeness, with a significance value of 0.000 < 0.05.