cover
Contact Name
Fauji Nurdin ST. Mudo
Contact Email
kangdensus88@gmail.com
Phone
+6285246960680
Journal Mail Official
mambang@unism.ac.id
Editorial Address
Jl. Pramuka No.02 Kelurahan Pemurus Luar Kecamatan Banjarmasin Timur Kota Banjarmasin Kalimantan Selatan
Location
Kota banjarmasin,
Kalimantan selatan
INDONESIA
INSTALL: Information System and Technology Journal
Published by Universitas Sari Mulia
ISSN : -     EISSN : 30481597     DOI : https://doi.org/ 10.33859/install
Core Subject : Science, Education,
The Focus and Scope of this Journal is related to : Information system Information Technology Business commerce Management technology Business Technology
Articles 40 Documents
Analysis of the Utilization of TikTok Content as a Coping Strategy to Reduce Stress Among Final-Year Students Using a Classification Method Husna Karima; Zulfadhilah, Muhammad; Prastya, Septyan Eka; Pratiwi, Evi Lestari
INSTALL: Information System and Technology Journal Vol 2 No 3 (2025): INSTALL : Information System and Technology Journal
Publisher : LPPM Universitas Sari Mulia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33859/install.v2i3.991

Abstract

Stress represents a prevalent psychological challenge among final- year university students, particularly during thesis completion. Academic pressure, social demands, and future uncertainty trigger stress that negatively impacts mental health. Social media, especially TikTok, is increasingly utilized as a coping mechanism to reduce stress through entertainment, educational, and motivational content. This study aims to analyze TikTok content utilization as a coping strategy for stress reduction among final-year students using a classification method. This quantitative research employed a survey approach with a population of 342 active TikTok users among final- year students at Sari Mulia University. Data were collected through an online questionnaire covering variables including content type, duration, features used, and psychological indicators such as anxiety, emotions, escapism, and coping effectiveness. Data preprocessing included one-hot encoding, SMOTE, and normalization, followed by classification using Support Vector Machine with RBF kernel optimized through GridSearchCV. Results revealed very high correlations among psychological variables (r ≈ 0.93–1.00), while correlations between content type and stress reduction were relatively low (0.00–0.15). Some pure entertainment content showed negative correlations with psychological improvement. The SVM model achieved high classification accuracy of approximately 94%. This study demonstrates that TikTok can serve as a short-term stress coping tool for final-year students, though its effectiveness depends heavily on the type of content consumed. Educational and motivational content shows greater potential for stress reduction compared to pure entertainment content. This research contributes to understanding digital mental health support mechanisms and provides insights for developing healthier media consumption strategies among university students.
Planning and Building a Reliable, Secure, and Scalable Corporate Network Hafi Ilmiyanor, Akhmad; Azmi, Muhammad; Delakamin, Putri Ika; Nisa, Zapiratun
INSTALL: Information System and Technology Journal Vol 2 No 2 (2025): INSTALL : Information System and Technology Journal
Publisher : LPPM Universitas Sari Mulia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33859/install.v2i2.993

Abstract

The development of information and communication technology is driving the increasing need for reliable, secure, and scalable corporate network infrastructure, especially in higher education institutions. Building E of Sari Mulia University as a new facility to support academic and operational activities need network system that is able to provide fast, stable, and secure data connectivity. This research discusses the planning and construction of an integrated corporate network in Building E, Sari Mulia University. The methods used include network needs analysis, network architecture design, infrastructure implementation, system configuration and security, and network testing and documentation. The design results show that the network built is able to provide stable wired and wireless connectivity, support centralized network management, and ensure data security through the implementation of network segmentation, firewalls, and Virtual Private Network (VPN). In addition, the resulting network design is scalable so that it can be developed according to the needs of the university in the future. Thus, the designed corporate network is expected to be able to support academic and operational activities optimally and support the digital transformation of Universitas Sari Mulia in a sustainable manner.
Design and Build Planning for the Integration of LAN/WAN/WiFi Network Systems with Centralized Management and Network Monitoring System Maulina, Riska; Kalistowen Bie; Excel Daud; Hardi Yanti
INSTALL: Information System and Technology Journal Vol 2 No 2 (2025): INSTALL : Information System and Technology Journal
Publisher : LPPM Universitas Sari Mulia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33859/install.v2i2.994

Abstract

This study discusses the design of the integration of LAN, WAN, and WiFi network systems with centralized management and the implementation of Network Monitoring System (NMS) in Building E of Sari Mulia University with an area of ±600 m². The initial state of the network that is still running separately, without clear segmentation and without real-time monitoring, leads to limited network visibility, connectivity disruptions, and uneven WiFi distribution. This study aims to design and develop an integrated network system that combines LAN, WAN, and WiFi infrastructures with centralized management and NMS to improve network performance, security, and management efficiency. The method used is the network design method which includes needs analysis, network architecture design, device implementation and configuration, and system performance testing. Network integration is carried out through the implementation of a managed switch-based backbone, Virtual Local Area Network (VLAN) segmentation, strengthening security using firewalls and VPNs, and continuous network monitoring using NMS. The design results show an increase in connection stability, network security, and infrastructure management efficiency, with a ≥99.5% uptime and even WiFi coverage throughout the building, so that this system design is considered feasible to be applied as an integrated network solution in the educational institution environment.
Design of Information Technology Infrastructure Integration as Support Academic Sevice at a University Nursandi, Muhammad; Ramadhani, Amanda Putri; Maretmy, Angella; Septian, Daniel Marvelino
INSTALL: Information System and Technology Journal Vol 2 No 3 (2025): INSTALL : Information System and Technology Journal
Publisher : LPPM Universitas Sari Mulia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33859/install.v2i3.995

Abstract

The rapid growth of digital academic services requires universities to develop reliable, scalable, and integrated information technology infrastructures. This study focuses on the design and planning of the IT infrastructure for Building E at Universitas Sari Mulia, aiming to support both academic and administrative activities while integrating seamlessly with the existing campus network. The research applies a design and development method, encompassing technical analysis, network architecture design, detailed system design, and conceptual validation. The Building E infrastructure includes six main rooms, with a server room functioning as the central local network management node. A three-tier network architecture core, distribution, and access layers is implemented to ensure efficient management, traffic segmentation, and direct interaction with end users. The integration plan considers inter-building connectivity, network security, and operational workflow to maintain stability and reliability while accommodating future expansion. The proposed design enhances network performance, simplifies maintenance, ensures centralized data management, and provides reliable digital services for students, faculty, and administrative staff. Conceptual validation confirms that the design aligns with technical requirements, security standards, and institutional policies. The study establishes a strategic foundation for developing a smart campus environment, ensuring that Building E contributes significantly to the university’s digital transformation and long-term academic excellence.
Optimizing Network Performance Through the Integration of SDN (Software-Defined Networking) Systems in Universities Sabrina, Nabila Khalilah; Made Suliana, I; Rahman , Sultan Nur; Pepriyani , Nor Lintang; Royd , Ivan Cavanneva
INSTALL: Information System and Technology Journal Vol 2 No 3 (2025): INSTALL : Information System and Technology Journal
Publisher : LPPM Universitas Sari Mulia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33859/install.v2i3.996

Abstract

The advancement of information technology in higher education requires a reliable network infrastructure to support academic, research, and administrative activities. This study aims to design a computer network infrastructure for Building E at Sari Mulia University using the Waterfall model. The research includes needs analysis, system design, simulation-based implementation with Cisco Packet Tracer, and performance evaluation. The needs analysis identifies user requirements, devices, and applications to ensure the network supports high-speed internet, central server connectivity, and e-learning systems. The proposed design uses a hierarchical topology with core, distribution, and access layers, along with VLANs to optimize data traffic and reduce congestion. The simulation results showed that the network design performed as expected, with a success rate of 90-95%. However, improvements are needed, particularly in the wireless network (WLAN), where coverage was insufficient in certain areas due to limited access points and physical barriers. In conclusion, the network design effectively supports the university's academic and administrative needs, with room for growth and future technology integration.
QR Code Payment Security Against Phishing Attacks Using HMAC Cryptographic Model and Tokenization Angella Maretmy; maulina, riska; Zapiratun Nisa; Erwenda Tri Hapsari; Hardi Yanti
INSTALL: Information System and Technology Journal Vol 2 No 2 (2025): INSTALL : Information System and Technology Journal
Publisher : LPPM Universitas Sari Mulia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33859/install.v2i2.997

Abstract

The implementation of the Indonesian Standard Quick Response Code (QRIS) has driven the growth of cashless payment systems in Indonesia through interoperability and expanded financial inclusion. However, the QRIS security mechanism still has limitations, particularly due to the use of CRC16-CCITT as the sole data integrity check. CRC16 is not designed to withstand intentional data manipulation, thus opening up opportunities for QR Code substitution-based phishing attacks and undetected transaction amount manipulation. This study aims to evaluate a hybrid security model that combines Hash-based Message Authentication Code (HMAC) with the SHA-256 algorithm and dynamic tokenization to improve QR Code payment security. The method used is an experimental approach based on software simulation by comparing the existing CRC16-based system with the proposed system based on HMAC-SHA256 and tokenization. Testing was conducted through several attack scenarios, including transaction amount manipulation and replay attacks. The test results show that the CRC16 mechanism has a high detection failure rate, where the manipulated QR Code is still considered valid as long as the checksum is recalculated correctly. In contrast, the HMAC-SHA256 mechanism is able to consistently detect all payload changes due to the use of a secret key. Dynamic tokenization has also proven effective in preventing the reuse of expired QR Codes without disrupting the user experience. In conclusion, the integration of HMAC-SHA256 and dynamic tokenization significantly improves the resilience of the QR Code payment system against phishing attacks and data manipulation, and has the potential to become the basis for strengthening the security of QRIS in the future.
Design and Implementation of Integrated Digital Infrastructure to Support Smart Campus: Case Study of Building E of Sari Mulia University Kurniawan, Muhamad; Mikhael Neta Yahu; Erwenda Tri Hapsari; Adella Adriani
INSTALL: Information System and Technology Journal Vol 2 No 3 (2025): INSTALL : Information System and Technology Journal
Publisher : LPPM Universitas Sari Mulia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33859/install.v2i3.998

Abstract

The rapid growth of information technology has forced universities to develop an integrated, reliable, and secure digital infrastructure to support academic and administrative activities. This research discusses the design and implementation of Integrated Digital System Infrastructure (ISDT) in Building E of Sari Mulia University as a prototype for the development of Smart Campuses. This research adopts a structured and sequential implementation methodology, ranging from needs analysis, field surveys, system architecture design, procurement, deployment of physical infrastructure, device installation, network configuration and security, to comprehensive testing and post-implementation monitoring. The infrastructure deployed includes fiber optic backbones, VLAN-based network segmentation, Layer 3 switching, Wi-Fi 6 access points, enterprise servers, mini-data centers, and integrated monitoring and security systems. The results of the study show that the implementation of ISDT successfully provides stable connectivity, improved network performance, centralized system management, and improved security. The study shows that a systematic implementation approach can effectively support the integration and scalability of digital services, and can serve as a reference model for the development of similar infrastructure in other university buildings.
Analysis of Factors Influencing Purchase Decisions of Paldo Coffee BTS Edition Products (Case Study of BTS Fans) Amanda, Fadila
INSTALL: Information System and Technology Journal Vol 2 No 2 (2025): INSTALL : Information System and Technology Journal
Publisher : LPPM Universitas Sari Mulia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33859/install.v2i2.1001

Abstract

Paldo coffee is a ready-to-drink coffee originating from Korea and consists of two flavor variants, namely americano and coffee latte which are packaged in contemporary bottles, where this drink is suitable for all circles, especially millennials, especially the ARMY fandom. The type of research used is quantitative research by distributing questionnaires via Google Form to consumers who have purchased BTS Paldo coffee products at least once or more. The purpose of this study is to analyze what factors influence BTS fans in buying BTS's Paldo coffee products. The results showed that the brand ambassador and brand image became the dominant factor for BTS fans in buying BTS paldo coffee with a loading factor value of 67.941%.
Simulation of End-to-End Secure Channels in Digital Payment Systems Using TLS 1.3 Combined with Client-Side AES-GCM Encryption Neta Yahu, Mikhael; Septian, Daniel Marvelino; Daud, Excel
INSTALL: Information System and Technology Journal Vol 2 No 3 (2025): INSTALL : Information System and Technology Journal
Publisher : LPPM Universitas Sari Mulia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33859/install.v2i3.1002

Abstract

The rapid growth of digital payment systems and online transaction services has intensified the need for stronger mechanisms to protect sensitive user data from interception, leakage, and unauthorized access. Although Transport Layer Security (TLS) is widely adopted to secure communication channels, it primarily protects data during transmission and does not fully address risks arising from compromised servers or application-layer vulnerabilities. This study proposes and simulates an end-to-end secure channel architecture that integrates client-side encryption using the Advanced Encryption Standard in Galois/Counter Mode (AES-GCM) with the TLS 1.3 protocol to provide layered security. A web-based simulation was developed using HTML, CSS, and JavaScript with the Web Crypto API to illustrate the complete workflow, including client-side key generation, application-layer encryption, TLS 1.3 handshake, secure channel establishment, transport-layer encryption, and server-side processing. The simulation also implements a zero-knowledge mode, ensuring that the server does not possess the client-side encryption key and therefore cannot decrypt sensitive data at the application layer. The experimental results indicate that separating cryptographic keys between the application layer and the transport layer significantly enhances confidentiality and minimizes the impact of key compromise or server-side breaches. Furthermore, the visualization provided by the simulation helps clarify the interaction between client-side encryption and TLS 1.3 mechanisms, making it a useful educational and analytical tool. Overall, this study demonstrates that combining AES-GCM-based client-side encryption with TLS 1.3 offers a robust and practical approach for securing digital payment systems and other applications requiring high levels of data protection.
Development of a COBIT 5 EDM Domain–Based IT Governance Audit Website for Evaluating Maturity Level Harahap, Risna Ariyasari; Alfiannur, Muhammad Rama; Akbar, Suraya; Rosdayanti
INSTALL: Information System and Technology Journal Vol 2 No 3 (2025): INSTALL : Information System and Technology Journal
Publisher : LPPM Universitas Sari Mulia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33859/install.v2i3.1004

Abstract

Digital transformation requires organizations to ensure that information technology governance aligns with strategic objectives and is capable of delivering measurable value. This study aims to develop an information technology governance audit website based on the COBIT 5 framework, specifically within the Evaluate, Direct, and Monitor (EDM) domain, as an instrument for evaluating maturity levels. The method used is Research and Development (R&D) with an Agile approach, encompassing the stages of exploration, design, development, and system evaluation. The system is developed using ReactJS on the frontend, Laravel with a REST API on the backend, and MySQL as the database. The website provides features such as role-based user management, EDM01–EDM05 assessment instruments, maturity level calculation on a scale of 0–5, gap analysis, dashboard visualization, and audit report export in PDF format. The results of Black Box Testing and User Acceptance Testing indicate that the system functions according to requirements and is capable of producing structured, integrated, and well-documented maturity level evaluations. This website is expected to improve the efficiency, transparency, and accuracy of IT governance audit processes in supporting organizational strategic decision-making.

Page 4 of 4 | Total Record : 40