cover
Contact Name
Zulfah Zulfah
Contact Email
zulfahasni670@gmail.com
Phone
+6282271279237
Journal Mail Official
zulfahasni670@gmail.com
Editorial Address
Jl. Sisingamangaraja, Bangkinang Kota, Kampar, Riau
Location
Kab. kampar,
Riau
INDONESIA
Journal on Pustaka Cendekia Informatika
ISSN : 29871883     EISSN : 29871891     DOI : https://doi.org/10.70292/pctif.v2i3
Core Subject : Engineering,
Journal on Pustaka Cendekia Informatika (PCIF) is published by the PT PUSTAKA CENDEKIA GROUP (NOMOR : AHU-012686.AH.01.30.Tahun 2023) in helping academics, researchers, and practitioners to disseminate their research results. PCIF is a double blind peer-reviewed journal dedicated to publishing quality research results in the fields of Informatics Engineering. All publications in the PCIF Journal are open access which allows articles to be available online for free without any subscription. PCIF is a national journal with P-ISSN: 2987-1883 e-ISSN: 2987-1891. Journal of Pustaka Cendekia Informatika (PCIF) publishes articles periodically three times a year May, September, January. PCTIF uses Turnitin plagiarism checks, Mendeley for reference management and supported by Crossref (DOI) for identification of scientific paper.
Articles 20 Documents
Search results for , issue "Vol. 3 No. 1 (2025): Journal on Pustaka Cendekia Informatika: Volume 3 Nomor 1 February - May 2025" : 20 Documents clear
Analisis dan Perancangan Aplikasi E-Commerce Paradise Pet Shop Center Berbasis Web Adli Saputra; Deddy Gusman; Safni Marwa
Journal on Pustaka Cendekia Informatika Vol. 3 No. 1 (2025): Journal on Pustaka Cendekia Informatika: Volume 3 Nomor 1 February - May 2025
Publisher : PT Pustaka Cendekia Group

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70292/pctif.v3i1.50

Abstract

Petshop as of one part of business in the pet also are required to develop in application of technology.With the implementation of the technologies in of business process would be helpful petshop to improve their performance.The most business is a pet shop selling food and accessories for pets.But now there have been several business own a pet grooming shop, sterile and pet care.The method in this study is the spiral method of the System Development Life Cycle (SDLC) for system development.This method helps in website-based systems analysis and planning.For the planning of the system, Unifield Modeling Language (UML).
Perancangan Sistem Penilaian Kinerja Karyawan Raihan Rizky Nurfadila; T.M. Aditya Ramadhan; Amir Rozy Sinaga; Wasis Haryono
Journal on Pustaka Cendekia Informatika Vol. 3 No. 1 (2025): Journal on Pustaka Cendekia Informatika: Volume 3 Nomor 1 February - May 2025
Publisher : PT Pustaka Cendekia Group

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70292/pctif.v3i1.51

Abstract

Employee performance assessment using Key Performance Indicators (KPI) is an effective method to measure individual contributions toward organizational goals. This report presents the development of a web-based application system that facilitates efficient KPI measurement, analysis, and reporting. The system features KPI data input, performance evaluation, and detailed reports for individual and team performance analysis. Testing results demonstrate that the application improves accuracy, transparency, and simplifies data-driven decision-making. With this system’s implementation, companies are expected to enhance employee performance and achieve strategic objectives optimally.
Penerapan Black Box Testing pada Website Cobalt.tools untuk Pengujian Fungsionalitas Pengunduhan Media M. Sunandi; Devan Zulfangga; Dede Ardiansah; Muhammad Rasyid Shiddiq; Siti Rahmah; Subhanjaya Angga Atmaja
Journal on Pustaka Cendekia Informatika Vol. 3 No. 1 (2025): Journal on Pustaka Cendekia Informatika: Volume 3 Nomor 1 February - May 2025
Publisher : PT Pustaka Cendekia Group

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70292/pctif.v3i1.55

Abstract

This study aims to assess the core functionalities of Cobalt.tools in supporting cross-platform media downloads using the Black Box Testing approach and the Equivalence Partitioning technique. The research employs a descriptive quantitative design, focusing on testing 11 scenarios involving download and configuration features. Each scenario was evaluated based on the alignment between system input and output without examining the internal code structure. Data were collected manually through direct observation and recorded in a test table, then analyzed using quantitative descriptive techniques to measure functional success rates. The results show that all major features of the site operated as expected, with a 100% success rate, confirming the hypothesis regarding the platform’s functional reliability. These findings affirm the effectiveness of Black Box Testing in user interface-based system evaluation. This study contributes to the literature on web-based system testing and offers practical insights for developers seeking to enhance application stability and user experience. Future research is recommended to explore aspects such as security, integration, and system performance on a broader scales.
Pengujian Black Box pada Fitur Pendaftaran Online RSUD Kota Bandung dengan Teknik Boundary Value Analysis Cahya Purnama Aji; Azhar Havis; Ridwan; Piqri Nabila Mulia; Subhanjaya Angga Atmaja
Journal on Pustaka Cendekia Informatika Vol. 3 No. 1 (2025): Journal on Pustaka Cendekia Informatika: Volume 3 Nomor 1 February - May 2025
Publisher : PT Pustaka Cendekia Group

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70292/pctif.v3i1.56

Abstract

Software testing is an important process in ensuring the quality and reliability of a system. This study aims to evaluate the online registration feature on the official website of the Bandung City Hospital using the Black Box Testing technique with the Boundary Value Analysis (BVA) approach. The BVA technique was chosen because it is effective in identifying software defects that may occur in input boundary values, which are often the source of critical errors in the system. Testing focused on several important inputs in the registration process, such as the population registration number (NIK), BPJS card number, and cellphone number. The test results showed that the system was able to handle most of the boundary values ​​well, but there were several inconsistencies in input validation that could result in registration failure. These findings indicate the importance of implementing systematic and in-depth testing methods to improve system reliability, especially in digital-based public services.
Analisis Kerentanan Web Menggunakan ZAP oleh Checkmarx pada Situs Kuliah Daring LMS Universitas Kebangsaan Republik Indonesia: Penelitian Mughni Al Muzaki; Reksi Zender Perdian; Rohman Fajar; Saripah; Syifa Khofifah; Subhanjaya Angga Atmaja
Journal on Pustaka Cendekia Informatika Vol. 3 No. 1 (2025): Journal on Pustaka Cendekia Informatika: Volume 3 Nomor 1 February - May 2025
Publisher : PT Pustaka Cendekia Group

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70292/pctif.v3i1.63

Abstract

This study aims to conduct a security analysis on the online lecture site using the ZAP (Zed Attack Proxy) tool version 2.16.1, developed by OWASP and distributed by Checkmarx. The method used is black-box testing with an active scanning approach to identify security vulnerabilities that may exist in the application. The scanning process was carried out on all main pages and site resources, paying attention to various aspects such as HTTP headers, session management, JavaScript library usage, and other security configurations. The results of the scanning process showed 14 potential vulnerabilities classified into four risk levels: high (1 finding), medium (4 finding), low (6 finding), and informational (3 finding). The most significant findings were the use of a vulnerable (outdated) JavaScript library, the absence of a content security policy (CSP), and deficiencies in the implementation of important HTTP headers such as X-Frame-Options, Strict-Transport-Security, and X-Content-Type-Options. In addition, weaknesses in cookie attributes and the use of external JavaScript files without adequate source control were also found. Based on these results, a series of recommendations were developed that adhere to OWASP standards, including updating software libraries, reconfiguring security headers, strengthening session management, and implementing more secure cache policies.
Pengujian Black Box Shopee PayLater dengan Boundary Value, Equivalence Partitioning, dan Use Case: Penelitian Aji Nata Sobari; Arya Nugraha; Haekal Abdullah Ali Akbar Fajar Ramadhan; Muhammad Lukman Abdurahman; Muhammad Supyan; Trisna Prawijaya; Subhanjaya Angga Atmaja
Journal on Pustaka Cendekia Informatika Vol. 3 No. 1 (2025): Journal on Pustaka Cendekia Informatika: Volume 3 Nomor 1 February - May 2025
Publisher : PT Pustaka Cendekia Group

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70292/pctif.v3i1.64

Abstract

Buy Now Pay Later (BNPL) services such as Shopee PayLater have transformed consumer transaction patterns by offering convenience and flexibility in shopping. However, systems like this also carry high risks if not accompanied by adequate software testing. This article presents a study aimed at evaluating the reliability of the Shopee PayLater system using the Black Box Testing approach with Boundary Value Analysis (BVA) and Equivalence Partitioning (EP) techniques, combined with user-based use case scenarios. This method allows for testing various input variations, especially at boundary values and data structure validity. Out of 14 test cases executed, 11 successfully detected input errors accurately, while the remaining 3 failed to handle certain conditions, such as character length and OTP format. The Defect Removal Efficiency (DRE) obtained was 21.43%, indicating that the effectiveness of testing can still be improved. Overall, this approach has proven to enhance testing coverage and detect relevant potential errors in digital financial systems.
Pengujian Aplikasi KAI Access Menggunakan Black Box Testing Boundary Value Analysis (BVA) Miftah Nur Rohman; Rahman Fauza; Denita Alhamdina Putri Arisandi; Nabila Desiana; Aliya Tazkiya Fajriyati; Chris Hendry Choong; Subhanjaya Angga Atmaja
Journal on Pustaka Cendekia Informatika Vol. 3 No. 1 (2025): Journal on Pustaka Cendekia Informatika: Volume 3 Nomor 1 February - May 2025
Publisher : PT Pustaka Cendekia Group

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70292/pctif.v3i1.48

Abstract

This study aims to evaluate the functionality of the KAI Access application using Black Box Testing methods, specifically Boundary Value Analysis (BVA) and Graph-based Testing. The testing was conducted on key features such as registration, login, KAI Pay activation, and local ticket booking. The results indicate that while most features function as expected, there are notable issues—such as the lack of character limits in the email input field. This approach provides a comprehensive overview of the application's reliability and identifies areas that need improvement to enhance the quality of service.
Analisis Kerentanan Web Menggunakan ZAP oleh Checkmarx pada Website FIKSI (Fakultas Ilmu Komputer dan Sistem Informasi) Universitas Kebangsaan Republik Indonesia M. Abie Rafdi Fauzy; Restu Rahmat Fajri; Rian Hidayat; Salsabila Rosnie; Thomas Aldi Fikri; Subhanjaya Angga Atmaja
Journal on Pustaka Cendekia Informatika Vol. 3 No. 1 (2025): Journal on Pustaka Cendekia Informatika: Volume 3 Nomor 1 February - May 2025
Publisher : PT Pustaka Cendekia Group

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70292/pctif.v3i1.68

Abstract

This study aims to identify and analyze security vulnerabilities in faculty web applications using the Zed Attack Proxy (ZAP) automated tool developed by OWASP and now managed by Checkmarx. Using a descriptive quantitative approach, a scan was conducted on the public domain cdnjs.cloudflare.com which has a technical structure similar to the faculty web system. The scan results found four vulnerabilities, namely: use of a vulnerable JavaScript library (moment.js) (high risk), insecure Cross-Origin Resource Sharing (CORS) configuration (medium risk), suspicious comments in the code (informational risk), and inappropriate cache settings (informational risk). These findings are analyzed based on the OWASP Top 10 categories, and are complemented by mitigation recommendations for each risk. In addition, a visualization of the distribution of alerts is presented based on the level of risk and confidence. The results of this study emphasize the importance of routine scanning and manual validation in maintaining the security of higher education institution web applications.
Analisis Supply Chain Management Pada Penjualan Perumahan Unit Syariah Mengunakan Metode Swot Dan Qspm Heru Winarno; Muhamad Suhaemi; M. Bob Anthony; Rosihin
Journal on Pustaka Cendekia Informatika Vol. 3 No. 1 (2025): Journal on Pustaka Cendekia Informatika: Volume 3 Nomor 1 February - May 2025
Publisher : PT Pustaka Cendekia Group

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70292/pctif.v3i1.82

Abstract

Amyra Synergy Karya atau lebih dikenal dengan Askar Properti Syariah adalahperusahaan properti yang sangat memperhatikan dengan akad konsep syariah dalampemilikan rumah. Saat ini banyaknya pengusaha melakukan ekspansi proyek perumahanbaru. Hal ini akan menimbulkan persaingan yang ketat antara satu proyek perumahandengan proyek perumahan lainnya. Adapun permasalahan mengenai supply chain adalahfluktuasi harga material dan ketidakstabilan ekonomi, yang dapat memengaruhi harga jualunit serta daya beli konsumen. Developer perumahan syariah juga harus menghadapipersaingan dengan proyek perumahan konvensional, yang sering kali menawarkan skemapembayaran lebih fleksibel dan cepat. Penelitian ini menggunakan metode SWOT danQuantitative Strategic Planning Matrix (QSPM) dengan tujuan untuk mengetahuihambatan mengenai strategi supply chain pada penjualan perumahan unit syariah di PT.Amyra Synergy Karya dan alternatif strategi utama mengenai supply chain pada penjualanperumahan unit syariah. Hasil pada penelitian ini adalah hambatan yang dihadapi PT.Amyra Synergy Karya adalah sistem supply chain tidak memiliki kejelasan dalam alurdistribusi bahan bangunan, pemilihan mitra pengembang dan pemasok kurang optimalyang berdampak pada kualitas, ketidakstabilan harga bahan bangunan dapat menghambatproses pembangunan, dan kurangnya kepercayaan masyarakat terhadap pengembang barudi bidang perumahan syariah. Berdasarkan hasil metode QSPM daya tarik relatif dalampenjualan perumahan adalah mengimplementasikan audit berkala pada proses supply chainuntuk mengidentifikasi dan menyelesaikan masalah sebelum menjadi besar.
Analisis Kinerja Jaringan Internet di Lingkungan Akademik dengan Pendekatan Quality of Service (QoS): Studi Kasus di Universitas Pamulang Jiyan Suhada; Hari Setyawan; Kelvin Andrean
Journal on Pustaka Cendekia Informatika Vol. 3 No. 1 (2025): Journal on Pustaka Cendekia Informatika: Volume 3 Nomor 1 February - May 2025
Publisher : PT Pustaka Cendekia Group

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70292/pctif.v3i1.83

Abstract

The availability of reliable and high-quality internet networks is critical in supporting the learning process in higher education institutions. This study aims to analyze the quality of the internet network at Universitas Pamulang using the Quality of Service (QoS) method to improve learning performance. The research was conducted by measuring QoS parameters, including throughput, delay, packet loss, and jitter at various network points within the campus area. Data collection methods were carried out using network measurement tools and simulations of various network load scenarios. The research results show that the internet network performance at Universitas Pamulang varies significantly in quality across different locations. The measurement results indicate an average throughput of 4.94 bps, an average delay of 0 ms, an average jitter of 0, and an average packet loss of 11.46, based on TIPHON standards. Overall, the QoS index of the internet network at Universitas Pamulang is 2.75. Recommendations for improvements include increasing bandwidth capacity, optimizing network configuration, and implementing more efficient traffic management

Page 2 of 2 | Total Record : 20