cover
Contact Name
Rijois Iboy Erwin Saragih
Contact Email
rijoissaragih@gmail.com
Phone
+6282163892782
Journal Mail Official
rijoissaragih@gmail.com
Editorial Address
Jl. Karya Bakti Gg. Dame No. 95, kelurahan Indra Kasih, Kecamatan Medan Tembung, Sumatera Utara
Location
Kota medan,
Sumatera utara
INDONESIA
International Journal of Information System and Innovative Technology
ISSN : -     EISSN : 29647207     DOI : https://doi.org/10.63322/ijisit
Core Subject : Science,
IJISIT (International Journal of Information System and Innovative Technology) is a peer-reviewed journal in Applied Information Technology published twice a year in June and December and organized by the PT Geviva Edukasi Trans Teknologi. Focus & Scope International Journal of Information System & Innovative Technology aims to publish original research results on the implementation of the information systems. International Journal of Information System & Innovative Technology covers a broad range of research topics in information technology. The topics include but are not limited to avionics. 1. Artificial Intelligence and Soft Computing 2. Computer Science and Information Technology 3. Telecommunication System and Security 4. Digital Signal, Image and Video Processing 5. Automation, Instrumentation and Control Engineering 6. Internet of Things, Big Data and Cloud Computing
Articles 35 Documents
Improve Student Learning Environment with MyClassRoom (MCR) and Cloud Storage Collaboration Saragih, Rijois I. E.
International Journal of Information System and Innovative Technology Vol. 2 No. 1 (2023): June
Publisher : Geviva Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.63322/sa56ab22

Abstract

Pandemic has changed the process of education in the world, it leads to a better approach of learning through an online environment. Unfortunately, most educational institutions are still using conventional approaches in their learning system, in fact, information technology has been growing continuously nowaday, especially mobile applications. This paper presents a collaboration between myclassroom application and google drive to improve student learning environment, especially in providing materials, attendance, assignments and grades based on mobile. This study used a design-based research methodology with a waterfall application development process and a questionnaire to collect feedback from one hundred and twenty-one students on the features and content of myclassroom. The myclassroom application was successfully developed using the Model View Controller concept with databases and google drive collaboration. The application testing has confirmed that myclassroom has been successfully developed and works properly. The result shows that the student learning environment has improved by up to 95%.
Analysis Quality of Service (QoS) on Ad Hoc Networks with Network Simulator Version 3 (NS-3) Rahmadani, Rahmadani; Supiyandi, Supiyandi; Lia Kristina , Manalu
International Journal of Information System and Innovative Technology Vol. 2 No. 1 (2023): June
Publisher : Geviva Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.63322/d45hd543

Abstract

QoS (Quality of Service) results for throughput, packet loss and delay as well as data transfer process performance tests were carried out with the NS-3 simulator based on the number of nodes that are continuously added according to the scenario on the ad hoc network. The scenario of adding nodes is carried out in stages starting from 10 nodes, increasing to 20 nodes, up to 40 nodes. The results of the analysis and measurements obtained for throughput produce an average value of 3.1872 Kbps so that it is included in the good category. The packet loss parameter produces an average value of 3.48% which is included in the good category and the delay parameter produces an average value of 6,824 ms which is also included in the good category. The final results of the ad hoc network simulation process with NS-3 are presented in graphical view
Analysis of 5G-Enabled Internet of Things (IoT) with AI: Enabling Smart and Connected Environments Silitonga, Joe Laksamana; Saragih, Rijois I. E.
International Journal of Information System and Innovative Technology Vol. 2 No. 1 (2023): June
Publisher : Geviva Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.63322/4rnsxz08

Abstract

The convergence of 5G technology and artificial intelligence (AI) has the potential to reshape the landscape of the Internet of Things (IoT), paving the way for innovative applications in smart and con-nected environments. This research paper explores the synergy be-tween 5G and AI in the context of IoT, focusing on the transforma-tive impact on various sectors such as healthcare, industrial auto-mation, and smart cities. Through a comprehensive review of exist-ing literature and empirical analysis, this paper highlights the key challenges, opportunities, and technical advancements that arise when integrating 5G and AI technologies within IoT ecosystems. The study contributes to a deeper understanding of the implications of this convergence and offers insights into the future direction of research and development in this dynamic field
Anticipating Cybersecurity on Artificial Intelligence Simanjuntak, Thandy
International Journal of Information System and Innovative Technology Vol. 2 No. 1 (2023): June
Publisher : Geviva Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.63322/273wdm25

Abstract

As artificial intelligence (AI) continues to revolutionize various sectors, the intersection of AI and cybersecurity has emerged as a critical frontier. This paper delves into the realm of "Anticipating Cybersecurity on Artificial Intelligence," exploring the challenges, opportunities, and strategies inherent in safeguarding AI systems against an evolving landscape of cyber threats. With AI playing an increasingly pivotal role in decision-making, automation, and data analysis, the security of AI systems becomes paramount to ensuring the integrity and trustworthiness of their outcomes. This paper investigates various dimensions of anticipating cybersecurity concerns in AI, including identifying potential vulnerabilities, developing proactive defense mechanisms, and fostering collaboration between AI and cybersecurity experts. Through an in-depth analysis of recent case studies and trends, we highlight the importance of pre-emptive measures to thwart adversarial attacks, data poisoning, and model manipulations. Moreover, we explore the role of explainable AI in enhancing cybersecurity transparency and the potential for leveraging AI techniques to enhance intrusion detection and threat mitigation. By delving into these interconnected aspects, this paper not only underscores the urgency of addressing cybersecurity within AI but also emphasizes the necessity of anticipating future threats to ensure the continued success and trustworthiness of AI technologies. In sum, this study contributes to the discourse surrounding AI cybersecurity, shedding light on strategies to anticipate and counteract threats, and fostering a holistic approach to secure the AI-driven future.
CCTV-Based Safety Monitoring in family Environments Sutanto, Yulius
International Journal of Information System and Innovative Technology Vol. 2 No. 1 (2023): June
Publisher : Geviva Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.63322/ebcbqv53

Abstract

The proliferation of Closed-Circuit Television (CCTV) systems has ushered in a new era of safety monitoring, extending its reach beyond public spaces into private family environments. This research paper delves into the emerging trend of CCTV-based safety monitoring within family settings. With the primary objective of enhancing household safety, this study investigates the implementation, effectiveness, ethical considerations, and potential implications of integrating CCTV technology into the domestic sphere. The paper begins by exploring the motivations behind adopting CCTV systems for family safety, addressing concerns such as child supervision, elder care, home security, and accident prevention. It examines the range of available CCTV technologies tailored for residential use, from basic monitoring setups to advanced features like real-time alerts, two-way communication, and facial recognition. A critical analysis of the effectiveness of CCTV-based safety monitoring in family environments is conducted, focusing on its impact on crime prevention, accident mitigation, and overall situational awareness. This analysis takes into account both quantitative data, such as crime statistics and accident rates, as well as qualitative data through surveys and interviews with households employing CCTV systems. Ethical considerations are a central theme of this research, as the intrusion into personal privacy is a significant concern when implementing surveillance technology within the family setting. The paper discusses the ethical implications of constant monitoring, potential breaches of trust, and the challenges of striking a balance between safety and individual autonomy. The legal frameworks surrounding CCTV use within homes are explored, highlighting the varying regulations across different jurisdictions. Furthermore, the study explores the psychological and social implications of introducing surveillance technology within the familial context. It examines the effects on family dynamics, communication patterns, and the mental well-being of household members, including children and teenagers. Ultimately, this research paper aims to provide a comprehensive overview of the growing trend of CCTV-based safety monitoring in family environments. By examining its benefits, challenges, and broader impacts, it contributes to the ongoing discourse on the integration of surveillance technology into private spaces. The findings of this study can guide policymakers, technology developers, and families in making informed decisions about the implementation of CCTV systems while upholding the values of safety, privacy, and familial harmony.
Voter Data Management Application for Legislative Candidate Saragih, Rijois I. E.
International Journal of Information System and Innovative Technology Vol. 2 No. 2 (2023): December
Publisher : Geviva Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.63322/c739bg69

Abstract

This research introduces a cutting-edge "Voter Data Management Application" tailored for legislative candidates, incorporating the principles of Extreme Programming (XP) to elevate its development and deployment processes. In the dynamic realm of political campaigns, effective voter data management is pivotal for strategizing, targeting, and engaging with constituents. The application embraces XP methodologies to ensure rapid and adaptive development, fostering continuous feedback, collaboration, and responsiveness to evolving campaign dynamics. The XP approach is integrated into the software development life cycle, emphasizing practices such as pair programming, frequent releases, and continuous integration. This not only accelerates the application's time-to-market but also allows for seamless adjustments in response to emerging campaign needs. The iterative nature of XP enhances the adaptability of the Voter Data Management Application, ensuring that it remains aligned with the evolving requirements of legislative campaigns. Key functionalities of the application include efficient data entry for demographic details, voting history, and issue preferences, creating a centralized repository for streamlined access. Advanced analytics tools, developed and refined iteratively, provide dynamic insights into voter behavior, enabling candidates to tailor their messages and outreach strategies. The XP-driven development process also reinforces the application's security measures, ensuring robust protection of sensitive voter information and compliance with privacy regulations. The "Voter Data Management Application" not only serves as a powerful resource for legislative candidates but also displays the benefits of applying Extreme Programming methodologies to political technology. By combining efficient voter data management with agile and collaborative development practices, this application contributes to a more informed and engaged electorate, fostering a democratic process that is responsive to the needs of the constituents. 
Mining for Success: Personalized Learning Paths through Educational Data Analysis Sitanggang, Delima; Iboy Erwin Saragih, Rijois
International Journal of Information System and Innovative Technology Vol. 2 No. 2 (2023): December
Publisher : Geviva Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.63322/dk592976

Abstract

This research addresses the research problem of leveraging educational data mining techniques to create personalized learning paths for individual students based on their unique learning styles, preferences, and strengths. The study aims to investigate whether tailoring educational experiences using mined data leads to enhanced academic performance, increased engagement, and a more positive learning experience compared to traditional, non-personalized approaches. Methodologically, the research employs data-driven analyses of diverse student datasets, integrating variables such as academic performance, learning preferences, and individual strengths. The study explores the effectiveness of personalized learning paths facilitated by educational data mining in various educational settings. Ethical considerations related to data privacy and responsible use of mined information are also systematically addressed throughout the research. Results from this research contribute valuable insights into the efficacy of personalized learning strategies driven by data mining, offering implications for educational practices and curriculum design. The study provides a comprehensive examination of the benefits and challenges associated with implementing personalized learning paths, and the results have the potential to inform educational institutions, policymakers, and educators on optimizing learning environments.
User-Centric Security Education and Awareness for Web Users Simanjuntak, Thandy
International Journal of Information System and Innovative Technology Vol. 2 No. 2 (2023): December
Publisher : Geviva Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.63322/t97ch871

Abstract

In an era marked by ubiquitous digital interactions, the security of web users becomes paramount in safeguarding sensitive information and mitigating the risks associated with cyber threats. This research addresses the problem of the persistently high incidence of online security breaches, often attributed to inadequate user awareness and education. The study aims to investigate the effectiveness of user-centric security education and awareness programs in enhancing the online safety practices of individuals, ensuring they are equipped with the necessary knowledge and skills to protect their personal information and navigate the digital landscape securely. The research problem centers around the need to understand how various user demographics respond to different forms of security education, the retention of knowledge over time, and the potential influence of corporate culture on individuals' security practices. Source: This paper examines the role and value of information security awareness efforts in defending against social engineering attacks. It categorizes the different social engineering threats and tactics used in targeting employees and explores approaches to defend against such attacks. The research aims to determine the effectiveness of user-centric security education and awareness programs in mitigating social engineering attacks by categorizing different threats and tactics used to target employees. To address the persistent issue of online security breaches and the lack of user awareness and education, this research aims to investigate the effectiveness of user-centric security education and awareness programs in enhancing the online safety practices of individuals. The research problem focuses on understanding how different user demographics respond to various forms of security education, the retention of knowledge over time, and the potential impact of corporate culture on individuals' security practices.
Public Safety and CCTV: The Impact of Societal Views Sutanto, Yulius
International Journal of Information System and Innovative Technology Vol. 2 No. 2 (2023): December
Publisher : Geviva Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.63322/60af2f44

Abstract

This research addresses the pivotal role of societal perceptions in influencing the acceptance and effectiveness of CCTV surveillance for enhancing public safety. The study aims to answer the research question: How do public attitudes shape the efficacy of CCTV systems in promoting public safety and security? The research investigates the complex relationship between public sentiment and the practical outcomes of CCTV surveillance. It delves into the challenges and opportunities arising from varying societal attitudes towards the deployment of surveillance technologies in public spaces. A mixed-methods approach will be employed, combining quantitative surveys to gauge public perceptions and qualitative interviews to capture nuanced views. The research will collect data from diverse demographics to ensure a comprehensive understanding of how different societal groups perceive and respond to CCTV surveillance. This research contributes to the existing literature by offering a nuanced exploration of the impact of societal attitudes on the effectiveness of CCTV systems. The findings aim to inform policymakers, urban planners, and security professionals on the importance of aligning surveillance strategies with public expectations, ultimately enhancing the overall success of public safety initiatives. The mixed-methods approach provides a robust and comprehensive analysis, enriching the understanding of the intricate interplay between societal perceptions and the practical outcomes of CCTV surveillance
Safeguarding the Virtual Realm: Exploring Measures to Address Security and Privacy Concerns in the Rapid Growth of Telecommunication Networks Silitonga, Joe Laksamana
International Journal of Information System and Innovative Technology Vol. 2 No. 2 (2023): December
Publisher : Geviva Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.63322/czdy3a83

Abstract

This research addresses the pivotal role of societal perceptions in influencing the acceptance and effectiveness of CCTV surveillance for enhancing public safety. The study aims to answer the research question: How do public attitudes shape the efficacy of CCTV systems in promoting public safety and security? The research investigates the complex relationship between public sentiment and the practical outcomes of CCTV surveillance. It delves into the challenges and opportunities arising from varying societal attitudes towards the deployment of surveillance technologies in public spaces. A mixed-methods approach will be employed, combining quantitative surveys to gauge public perceptions and qualitative interviews to capture nuanced views. The research will collect data from diverse demographics to ensure a comprehensive understanding of how different societal groups perceive and respond to CCTV surveillance. This research contributes to the existing literature by offering a nuanced exploration of the impact of societal attitudes on the effectiveness of CCTV systems. The findings aim to inform policymakers, urban planners, and security professionals on the importance of aligning surveillance strategies with public expectations, ultimately enhancing the overall success of public safety initiatives. The mixed-methods approach provides a robust and comprehensive analysis, enriching the understanding of the intricate interplay between societal perceptions and the practical outcomes of CCTV surveillance

Page 2 of 4 | Total Record : 35