cover
Contact Name
Hindriyanto Dwi Purnomo
Contact Email
garuda@apji.org
Phone
+6285885852706
Journal Mail Official
ijiteb@uksw.edu
Editorial Address
Fakultas Teknologi Informasi Universitas Kristen Satya Wacana Jl. Notohamidjojo 1, Blotongan, Salatiga, Jawa Tengah, 50711
Location
Kota salatiga,
Jawa tengah
INDONESIA
International Journal of Information Technology and Business
ISSN : 26559293     EISSN : 2655495X     DOI : 10.24246
Core Subject : Science,
Information Technology Management Information System E-commerce Computational Intelligence Information Infrastructure Cyberspace Enterprise Resource Model Business Intelligence Diffusion and Future IT Network Management IoT Infrastructure
Articles 40 Documents
Application of the Aras Method in Problem Completion of Determining the Location of New Student Admission Prind Triajeng Pungkasanti; Henny Indriyawati; Susanto Susanto
International Journal of Information Technology and Business Vol. 4 No. 2 (2022): April: International Journal of Information Technology and Business
Publisher : Universitas Kristen Satya Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24246/ijiteb.422022.16-20

Abstract

During the screening of new students, each state and private institution is required to carry out promotion in order to obtain the number of students according to the predetermined target. Problems that often occur when determining the location of promotion, the New Student Admission Team (PMB) determine the location of promotions randomly without considering several factors that can affect the number of students who will join. This is often done mainly by private university such as Semarang University (USM). To overcome this, a system is needed to provide information for the New Student Admission Team (PMB) in making decisions on the location of USM promotions. This system applies the Additive Ratio Assessment (ARAS) method and criteria that can affect the number of students who will later register because the determination of the location of the promotion is right on target. Criteria and weights include: Distance (cost) with a weight of 30%, number of students (benefit) with a weight of 40%, school status (benefit) with a weight of 20%, and a source of information (benefit) with a weight of 10%. The programming language used by PHP and data bases uses MySQL. The final result of this study is a decision support system that can provide information to the PMB team about the location of the school that has the potential for USM promotion.
AES (Advanced Encryption Standard) and RSA (Rivest Shamir Adleman) Encryption on Digital Signature Document : A Literature Review: Watermarking, Digital Signature, AES, RSA, Literature Review Riko Yudistira
International Journal of Information Technology and Business Vol. 7 No. 1 (2024): November: International Journal of Information Techonology and Business
Publisher : Universitas Kristen Satya Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24246/ijiteb.712022.29-31

Abstract

Distributed digital documents, it can utilize cryptographic methods to provide confidentiality, data integrity, authentication and non repudiation services. Watermark in this case serves as authentic proof of ownership of the data or document, and its existence should not damage or change the contents or counter of digital data or digital documents. The RSA and AES encryption methods in digital signatures are appropriate to be taken as a reliable method. But a unique biometric key idea emerged, one of which was used to authenticate users.
Data Security and Privacy on Blockchain Technology Willson Mangoki
International Journal of Information Technology and Business Vol. 6 No. 1 (2023): November : International Journal of Information Technology and Business
Publisher : Universitas Kristen Satya Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24246/ijiteb.612023.21-25

Abstract

Healthcare is an aspect that possibly to use of blockchain technology, for example for historical treatment, health insurance and patient medical records. In health services, personal health data will be recorded in the form of a blockchain. This research explains its mechanism and implementation in the healthcare field. On the other hand, this study also discussed the vulnerability caused by the mechanism that applies in the blockchain.
Securing Text Messages Using E2EE (End-To-End Encryption) on Instant Messaging Applications Wasis Pancoro
International Journal of Information Technology and Business Vol. 6 No. 2 (2024): April: International Journal of Information Technology and Business
Publisher : Universitas Kristen Satya Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24246/ijiteb.622024.17-23

Abstract

With the development of technology in communication, many applications make it easy to send messages. security in sending messages is something that cannot be excluded. E2EE (End-to-end encryption) is one of the most encryption for securing messages. in the discussion of literature review produces information on how applications such as whatsApp, Skype, Facebook messenger, line and viber implement E2EE in encrypting text messages specifically.
Utilization of Optical Character Recognition Technology in Reading Identity Cards Hendradito Dwi Aprillian; Hindriyanto Dwi Purnomo; Hari Purwanto
International Journal of Information Technology and Business Vol. 4 No. 2 (2022): April: International Journal of Information Technology and Business
Publisher : Universitas Kristen Satya Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24246/ijiteb.422022.38-46

Abstract

Along with the times, the world of banking is also required to have growth in providing services to the public. The world of banking itself has a significant contribution in daily life. However, some deficiencies that arise due to the application of the procedures used are still often encountered. This situation can be seen from the number of customer self-registration data that is still done manually. Optical Character Recognition (OCR) technology on Citizenship Cards can be used to get the results of accuracy and speed and get the best reading results. The purpose of this study was to use Optical Character Recognition (OCR) technology in reading the Identity Card (KTP). The readings from OCR can be used to compare the size of the original, medium, and small images in color and grayscale images, so that the best results can be found in the processing of personal data on Identity Cards with Optical Character Recognition (OCR). This study resulted in the accuracy of reading grayscale Identity Card (KTP) data more accurately. Where the amount of 86.32% for the accuracy of the colored Identity Card (KTP) and 88.58% for the accuracy of the grayscale Identity Card (KTP).
Building a Mobile Reporting Dashboard System Based on Android Using Web Service Restful for Congregation Data Dody Ivana; Budi Susanto; Yuan Lukito
International Journal of Information Technology and Business Vol. 4 No. 2 (2022): April: International Journal of Information Technology and Business
Publisher : Universitas Kristen Satya Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24246/ijiteb.422022.01-15

Abstract

The development of the Church is increasingly growing marked by the increasing number of people who attend the church. The church needs to utilize technology in paying attention to spiritual growth in existing congregations. But to do that, there needs to be a system that can see data that is well visualized and can be used by the church. It is not easy to visualize data manually so a practical and portable system is needed. The purpose of this study is as a material consideration in seeing the development of the Church in the Church and improve efficiency without having to use a computer. The process of gathering congregational data comes from the data warehouse of the Indonesian Christian Church Synod in the Central Java Region which is obtained from the Church Information System called SISWA which is local in every church. The interface design process is also carried out using User Centered Design which is centered on the user. This system will be designed using Resrful web Service which has better capabilities than other web services. By building this system, it can facilitate the church in seeing the development of the church and can be taken into consideration in making decisions by the church.
Web-based Secure Degree Certificate Legalization System Using Advanced Encryption Standard Algorithm Henny Indriyawati; Titin Winarti; Vensy Vydia
International Journal of Information Technology and Business Vol. 7 No. 1 (2024): November: International Journal of Information Techonology and Business
Publisher : Universitas Kristen Satya Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24246/ijiteb.712024.17-21

Abstract

Degree certificate legalization system with encryption security feature using Advanced Encryption Standard (AES) in Semarang University has a purpose to support academic to do online document legalization through a system. The main problem which occurs in academic administration is a long document legalization process that causes an ineffective and inefficient legalization process. To solve the problem, a system that can encrypt a document for better security is required. This system is built with the Advanced Encryption Standard algorithm with a 128-bit sized key to encrypt confidential information inside the document. During the encryption process, this algorithm operates using 4x4 bit array blocks and passing many encryption processes for at least 10 (ten) times. The application is analyzed with object-oriented analysis and modeled with Unified Modeling Language.  The result of this research is a system which can secure document with AES algorithm with a 256-bit sized key. The security element in this algorithm will make easier to identify the owner of the document. The secured document is easily accessible through PHP-based web or available QR code. When decrypting the document, the application will activate the camera function and decrypt the information document.
Internet of Things Based Automatic Heigh Detection with Ultrasonic Sensor: Using SMS Gateway for Detection Information April Firman Daru
International Journal of Information Technology and Business Vol. 5 No. 1 (2022): November: International Journal of Information Technology and Business
Publisher : Universitas Kristen Satya Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24246/ijiteb.512022.08-13

Abstract

Man-made fish pond is an artificial pond filled with brackish water and located near seawater border to allow mixing with fresh water. These ponds were used as aquaculture for fish, shrimp, shellfish, and others. The success factors are determined by the quantity of brackish water in the pond. If the seawater level not reached 25cm-30cm above normal level, then the seawater can't be flowed into the river. In order to solve the problem, an Internet of Things based model is proposed to assist the onwer to obtain the seawater level information. This research utilized Arduino Uno microcontroller to control the sensor and communication module. This model able to send messages to owner in realtime. The main purpose of this model is to help fish pond owner to get seawater information easily without checking directly.
New TOEH+P Framework for the Adoption of Smart Patient Management System Strategies at an IVF (In Vitro Fertilization) Program Provider Hospital in Central Java Province Paminto Agung Christianto
International Journal of Information Technology and Business Vol. 5 No. 1 (2022): November: International Journal of Information Technology and Business
Publisher : Universitas Kristen Satya Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24246/ijiteb.512022.01-07

Abstract

77.7% of IVF patients have high levels of anxiety. To reduce the level of anxiety of IVF patients, hospitals and IVF patients need an intelligent system for handling IVF patients post embiro transfer. The combination of the TOEH framework and patient variables, the new TOEH+P framework becomes the strategy and indicator of assessing the readiness of the hospital before implementing the smart system.
Analysis of Data Aggregates of Social Demography Atmoko Nugroho
International Journal of Information Technology and Business Vol. 6 No. 1 (2023): November : International Journal of Information Technology and Business
Publisher : Universitas Kristen Satya Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24246/ijiteb.612023.26-30

Abstract

Social demographics in an area are often displayed in the form of aggregate data for all those who want social demographic data. But often the components displayed are not uniform between one region and another, after all, the relationship between the components is not explained. Therefore, the analysis is needed to determine the interrelationships between the components and to test the aggregate data that is displayed.

Page 2 of 4 | Total Record : 40