cover
Contact Name
Rijois Iboy Erwin Saragih
Contact Email
rijoissaragih@gmail.com
Phone
+6282163892782
Journal Mail Official
rijoissaragih@gmail.com
Editorial Address
Jl. Karya Bakti Gg. Dame No. 95, kelurahan Indra Kasih, Kecamatan Medan Tembung, Sumatera Utara
Location
Kota medan,
Sumatera utara
INDONESIA
International Journal of Information System and Innovative Technology
ISSN : -     EISSN : 29647207     DOI : https://doi.org/10.63322/ijisit
Core Subject : Science,
IJISIT (International Journal of Information System and Innovative Technology) is a peer-reviewed journal in Applied Information Technology published twice a year in June and December and organized by the PT Geviva Edukasi Trans Teknologi. Focus & Scope International Journal of Information System & Innovative Technology aims to publish original research results on the implementation of the information systems. International Journal of Information System & Innovative Technology covers a broad range of research topics in information technology. The topics include but are not limited to avionics. 1. Artificial Intelligence and Soft Computing 2. Computer Science and Information Technology 3. Telecommunication System and Security 4. Digital Signal, Image and Video Processing 5. Automation, Instrumentation and Control Engineering 6. Internet of Things, Big Data and Cloud Computing
Articles 5 Documents
Search results for , issue "Vol. 2 No. 2 (2023): December" : 5 Documents clear
Voter Data Management Application for Legislative Candidate Saragih, Rijois I. E.
International Journal of Information System and Innovative Technology Vol. 2 No. 2 (2023): December
Publisher : Geviva Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.63322/c739bg69

Abstract

This research introduces a cutting-edge "Voter Data Management Application" tailored for legislative candidates, incorporating the principles of Extreme Programming (XP) to elevate its development and deployment processes. In the dynamic realm of political campaigns, effective voter data management is pivotal for strategizing, targeting, and engaging with constituents. The application embraces XP methodologies to ensure rapid and adaptive development, fostering continuous feedback, collaboration, and responsiveness to evolving campaign dynamics. The XP approach is integrated into the software development life cycle, emphasizing practices such as pair programming, frequent releases, and continuous integration. This not only accelerates the application's time-to-market but also allows for seamless adjustments in response to emerging campaign needs. The iterative nature of XP enhances the adaptability of the Voter Data Management Application, ensuring that it remains aligned with the evolving requirements of legislative campaigns. Key functionalities of the application include efficient data entry for demographic details, voting history, and issue preferences, creating a centralized repository for streamlined access. Advanced analytics tools, developed and refined iteratively, provide dynamic insights into voter behavior, enabling candidates to tailor their messages and outreach strategies. The XP-driven development process also reinforces the application's security measures, ensuring robust protection of sensitive voter information and compliance with privacy regulations. The "Voter Data Management Application" not only serves as a powerful resource for legislative candidates but also displays the benefits of applying Extreme Programming methodologies to political technology. By combining efficient voter data management with agile and collaborative development practices, this application contributes to a more informed and engaged electorate, fostering a democratic process that is responsive to the needs of the constituents. 
Mining for Success: Personalized Learning Paths through Educational Data Analysis Sitanggang, Delima; Iboy Erwin Saragih, Rijois
International Journal of Information System and Innovative Technology Vol. 2 No. 2 (2023): December
Publisher : Geviva Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.63322/dk592976

Abstract

This research addresses the research problem of leveraging educational data mining techniques to create personalized learning paths for individual students based on their unique learning styles, preferences, and strengths. The study aims to investigate whether tailoring educational experiences using mined data leads to enhanced academic performance, increased engagement, and a more positive learning experience compared to traditional, non-personalized approaches. Methodologically, the research employs data-driven analyses of diverse student datasets, integrating variables such as academic performance, learning preferences, and individual strengths. The study explores the effectiveness of personalized learning paths facilitated by educational data mining in various educational settings. Ethical considerations related to data privacy and responsible use of mined information are also systematically addressed throughout the research. Results from this research contribute valuable insights into the efficacy of personalized learning strategies driven by data mining, offering implications for educational practices and curriculum design. The study provides a comprehensive examination of the benefits and challenges associated with implementing personalized learning paths, and the results have the potential to inform educational institutions, policymakers, and educators on optimizing learning environments.
User-Centric Security Education and Awareness for Web Users Simanjuntak, Thandy
International Journal of Information System and Innovative Technology Vol. 2 No. 2 (2023): December
Publisher : Geviva Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.63322/t97ch871

Abstract

In an era marked by ubiquitous digital interactions, the security of web users becomes paramount in safeguarding sensitive information and mitigating the risks associated with cyber threats. This research addresses the problem of the persistently high incidence of online security breaches, often attributed to inadequate user awareness and education. The study aims to investigate the effectiveness of user-centric security education and awareness programs in enhancing the online safety practices of individuals, ensuring they are equipped with the necessary knowledge and skills to protect their personal information and navigate the digital landscape securely. The research problem centers around the need to understand how various user demographics respond to different forms of security education, the retention of knowledge over time, and the potential influence of corporate culture on individuals' security practices. Source: This paper examines the role and value of information security awareness efforts in defending against social engineering attacks. It categorizes the different social engineering threats and tactics used in targeting employees and explores approaches to defend against such attacks. The research aims to determine the effectiveness of user-centric security education and awareness programs in mitigating social engineering attacks by categorizing different threats and tactics used to target employees. To address the persistent issue of online security breaches and the lack of user awareness and education, this research aims to investigate the effectiveness of user-centric security education and awareness programs in enhancing the online safety practices of individuals. The research problem focuses on understanding how different user demographics respond to various forms of security education, the retention of knowledge over time, and the potential impact of corporate culture on individuals' security practices.
Public Safety and CCTV: The Impact of Societal Views Sutanto, Yulius
International Journal of Information System and Innovative Technology Vol. 2 No. 2 (2023): December
Publisher : Geviva Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.63322/60af2f44

Abstract

This research addresses the pivotal role of societal perceptions in influencing the acceptance and effectiveness of CCTV surveillance for enhancing public safety. The study aims to answer the research question: How do public attitudes shape the efficacy of CCTV systems in promoting public safety and security? The research investigates the complex relationship between public sentiment and the practical outcomes of CCTV surveillance. It delves into the challenges and opportunities arising from varying societal attitudes towards the deployment of surveillance technologies in public spaces. A mixed-methods approach will be employed, combining quantitative surveys to gauge public perceptions and qualitative interviews to capture nuanced views. The research will collect data from diverse demographics to ensure a comprehensive understanding of how different societal groups perceive and respond to CCTV surveillance. This research contributes to the existing literature by offering a nuanced exploration of the impact of societal attitudes on the effectiveness of CCTV systems. The findings aim to inform policymakers, urban planners, and security professionals on the importance of aligning surveillance strategies with public expectations, ultimately enhancing the overall success of public safety initiatives. The mixed-methods approach provides a robust and comprehensive analysis, enriching the understanding of the intricate interplay between societal perceptions and the practical outcomes of CCTV surveillance
Safeguarding the Virtual Realm: Exploring Measures to Address Security and Privacy Concerns in the Rapid Growth of Telecommunication Networks Silitonga, Joe Laksamana
International Journal of Information System and Innovative Technology Vol. 2 No. 2 (2023): December
Publisher : Geviva Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.63322/czdy3a83

Abstract

This research addresses the pivotal role of societal perceptions in influencing the acceptance and effectiveness of CCTV surveillance for enhancing public safety. The study aims to answer the research question: How do public attitudes shape the efficacy of CCTV systems in promoting public safety and security? The research investigates the complex relationship between public sentiment and the practical outcomes of CCTV surveillance. It delves into the challenges and opportunities arising from varying societal attitudes towards the deployment of surveillance technologies in public spaces. A mixed-methods approach will be employed, combining quantitative surveys to gauge public perceptions and qualitative interviews to capture nuanced views. The research will collect data from diverse demographics to ensure a comprehensive understanding of how different societal groups perceive and respond to CCTV surveillance. This research contributes to the existing literature by offering a nuanced exploration of the impact of societal attitudes on the effectiveness of CCTV systems. The findings aim to inform policymakers, urban planners, and security professionals on the importance of aligning surveillance strategies with public expectations, ultimately enhancing the overall success of public safety initiatives. The mixed-methods approach provides a robust and comprehensive analysis, enriching the understanding of the intricate interplay between societal perceptions and the practical outcomes of CCTV surveillance

Page 1 of 1 | Total Record : 5