cover
Contact Name
Hapnes Toba
Contact Email
hapnestoba@it.maranatha.edu
Phone
+6222-2012186
Journal Mail Official
hapnestoba@it.maranatha.edu
Editorial Address
Fakultas Teknologi dan Rekayasa Cerdas Universitas Kristen Maranatha Jl. Prof. Drg. Suria Sumantri No. 65 Bandung
Location
Kota bandung,
Jawa barat
INDONESIA
JuTISI (Jurnal Teknik Informatika dan Sistem Informasi)
ISSN : 24432210     EISSN : 24432229     DOI : https://doi.org/10.28932/jutisi
Core Subject : Science,
Paper topics that can be included in JuTISI are as follows, but are not limited to: • Artificial Intelligence • Business Intelligence • Cloud & Grid Computing • Computer Networking & Security • Data Analytics • Datawarehouse & Datamining • Decision Support System • E-Systems (E-Gov, E-Health, E-Commerce, etc.) • Enterprise System (SCM, ERP, CRM) • Human-Computer Interaction • Image Processing • Information Retrieval • Information System • Information System Audit • Enterprise Architecture • Knowledge Management • Machine Learning • Mobile Computing & Application • Multimedia System • Open Source System & Technology • Semantic Web & Web 2.0
Articles 479 Documents
Multi Objective Optimization on the Basic of Ratio Analysis untuk Pemilihan Pestisida Sukamto Sukamto; Randi Andria Nugrah
Jurnal Teknik Informatika dan Sistem Informasi Vol 9 No 2 (2023): JuTISI
Publisher : Maranatha University Press

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28932/jutisi.v9i2.6355

Abstract

The use of pesticides in agriculture plays a role in preventing and reducing diseases in chili plants. Pesticides for chili plants are quite widely spread on the market and have the advantages of each product offered to farmers, so farmers must be more careful and understanding in choosing pesticides to be used in preventing chili plant diseases. For that we need a decision support system (SPK). The data used in this research are 10 types of pesticides as an alternative. While the criteria are determined based on the agriculture and food service, namely price, classification, number of diseases eradicated, method of action, shelf life, and formulation concentration. Data analysis uses the MOORA method to support decision making for farmers in providing an assessment of the best pesticides on chili plants. The research results obtained for the three best pesticides are Tridex 80 WP, Lamzeb 85 WP, and Ziflo 76 WG.
Penggunaan Framework Cobit 2019 dalam Evaluasi Tata Kelola Teknologi Informasi Senna Kristiawan Gouwnalan; Andeka Rocky Tanaamah
Jurnal Teknik Informatika dan Sistem Informasi Vol 9 No 2 (2023): JuTISI
Publisher : Maranatha University Press

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28932/jutisi.v9i2.6373

Abstract

Kospin Jasa is a savings and loan cooperative founded in the 1970s by several small entrepreneurs. It is established to overcome difficulties in obtaining capital loans because businesses are still managed traditionally. Therefore, on December 13, 1973, Mr. HA Djuanaid (Alm), a national cooperative leader, met and agreed to establish a savings and loan cooperative. With the rapid development of information technology, companies/organizations have the opportunity to increase productivity. The application of information technology supports increased competitiveness with competitors. Management of information technology should then be audited. Typically, the necessary controls are provided by COBIT. This article is here to discuss information technology management which impacts cost overruns. This paper collects data through library research using qualitative methods. The results obtained are in the form of an IT governance design plan and are taken from COBIT 2019
Prediksi Gender Berdasarkan Nama Bahasa Indonesia Menggunakan Long Short Term Memory Arya Mulya Kusuma; Harisatul Aulia; Muhammad Alfaris Oktavian; Muhammad Rizky Akbar; Putri Patricia; Abdiansah Abdiansah
Jurnal Teknik Informatika dan Sistem Informasi Vol 9 No 2 (2023): JuTISI
Publisher : Maranatha University Press

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28932/jutisi.v9i2.6404

Abstract

Gender prediction is a form of prediction programme that outputs a gender type. In the research conducted in this case study, we used input in the form of text names of Indonesian people. Nowadays, there are many names of people that sometimes sound quite ambiguous and make us confused whether this person is MEN or WOMEN. From this case study we are looking for ways to use the Long short term memory method to predict and classify the names of Indonesian people to find out their gender based only on the name with the aim of improving science and looking for new innovations to support future research. The research limitations are the names used are Indonesian names because the dataset used is a dataset of Indonesian names and also the gender we classify is only 2 types of gender, namely MEN and WOMEN. The accuracy comparison of the training results of the baseline programme and the modified programme is the accuracy for the baseline programme of around 0.93, while the accuracy for the modified programme is around 0.90. The results showed an increase in accuracy after experimenting with testing data on the modified programme, which was 0.96.
Analisis Komparatif Pengukuran Kemiripan Artikel Ilmiah menggunakan Jaccard dan Levenshtein serta Blocking Muhammad Rizqi Nur; Gandhi Surya Buana; Nur Aini Rakhmawati
Jurnal Teknik Informatika dan Sistem Informasi Vol 9 No 2 (2023): JuTISI
Publisher : Maranatha University Press

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28932/jutisi.v9i2.6414

Abstract

Paper search engines have made it easier for academics to conduct literature reviews. However, easy doesn't mean accurate. For certain niche topics, search results often aren’t quite good. Snowballing can be done to overcome this, but it is limited to the initial articles owned, especially the author's access when the article was written. As an alternative, paper databases provide recommendations for relevant articles of an article, but it’s limited to that database. A tool to search for similar articles without relying on a specific database would be very helpful, but before that, the appropriate method for measuring article similarity needs to be determined. This research aims to measure article similarity based on title, author, and keywords using Weighted Jaccard Measure and Levenshtein distance and evaluate it. This study also compares performance by adding blocking with overlap blocking and stop word removal. The Jaccard evaluation results are quite poor, but the Levenshtein + Jaccard evaluation results are decent. In addition, it was found that emphasizing weighting on the title produces the best results. Overlap blocking and stop words removal increases processing time instead. Overlap blocking can reduce the number of measurements by almost half with an overlap of 1, but overlaps above 1 will discard many pairs that should be similar. Removing stop words improves Jaccard and Levenshtein performance but requires threshold adjustment.
Penggunaan Metode meCUE 2.0 dalam Mengukur Pengalaman Pengguna pada Aplikasi ”OYO” Joosten Joosten; Fandi Halim; Albion Myron; Freddy Tumbur Halomoan Marpaung
Jurnal Teknik Informatika dan Sistem Informasi Vol 9 No 2 (2023): JuTISI
Publisher : Maranatha University Press

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28932/jutisi.v9i2.6427

Abstract

This research was conducted to measure user experience on the OYO hotel booking application. User experience was measured by the meCUE 2.0 method which uses a Likert scale of 7. Then there are 10 instruments consisting of usefullness, usability, visual aesthetics, status, commitment, positive emotions, negative emotions, product loyalty, intention to use, and overall evaluation. The tool for processing survey data is the meCUE questionnaire which aims to see the possibility of a comprehensive end-user rapid assessment. Questionnaire links are distributed online and are needed in retrieving survey data. After collecting survey data, the measurement results obtained from 10 instruments were 5.20 (usefullness), 5.67 (usability), 5.33 (visual aesthetics), 4.27 (status), 2.90 (commitment), 4 .66 (positive emotions), 2.66 (negative emotions), 3.58 (product loyalty), 3.85 (intention to use) and 3.33 (overall evaluation). The results are considered quite good overall.
Implementasi Metode MinMax untuk Mengendalikan Persediaan Produk pada Perusahaan Pakaian Anakling Product Inventory At Umkm Babyje Probolinggo Wicaksono, Arief Bagus; Wardhanie, Ayouvi; Sudarmaningtyas, Pantjawati
Jurnal Teknik Informatika dan Sistem Informasi Vol 10 No 1 (2024): JuTISI
Publisher : Maranatha University Press

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28932/jutisi.v10i1.6493

Abstract

Babyje is a Micro, Small, Medium Enterprises that produces children's clothing with a variety of raw materials. Additionally, in the production process, Babyje has Bill of Material data for each of its products. Therefore, product inventory management and raw material requirement planning are important stages in the production process. However, Babyje experienced product supply problems due to unstable market demand. In July 2022 the Babyje experienced stockouts and overstocks with the same percentage, namely 50%, while in August they tended to experience overstocks with a percentage of 80% and in September tended to experience stockouts with a percentage of 70%. This phenomenon can increase storage costs and hinder buyer demand. This study uses the waterfall method for software development and the min max method for product inventory control. The purpose of this research is to produce a product inventory control application using the min max method. The results of implementing the application with the min max method can remind the business when it is the right time to restock, as well as provide recommendations for the number of orders that must be restocked. Based on the results of black box testing with a total of 120 test cases carried out by 2 user roles, all functionality goes well with a 100% success rate, and for user acceptance testing, all user roles have accepted applications with an acceptance percentage of 100%. The results of this application can calculate the difference between the number of orders that should be the number of orders suggested through the system. From the results of these calculations, there is a relative error in system calculations with a percentage of 14.02%.
Tinjauan: Information Technology Governance Berdasarkan Control Objectives for Information and Related Technology Maulana, Yoppy Mirza
Jurnal Teknik Informatika dan Sistem Informasi Vol 9 No 3 (2023): JuTISI
Publisher : Maranatha University Press

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28932/jutisi.v9i3.6494

Abstract

Information technology governance (ITG) is organizational management that aims to ensure the implementation of IT is carried out effectively and efficiently in realizing organizational goals. ITG in ensuring the implementation of IT, through measuring the effectiveness and efficiency of business processes, use of resources, risk management, and improvement of organizational performance. Therefore, ITG has now become the focus of organizational leaders in general and is the core of IT success in organizations. Meanwhile, the success of ITG in an organization is largely determined by the alignment between IT and organizational goals. This alignment can be realized by planning ITG. In making ITG planning, a framework is needed, namely COBIT. Therefore, ITG planning is important for the organization, so that the implementation of IT can be maximized and provide benefits for the organization. On this basis, a narrative review was carried out to explore the ITG planning research based on the COBIT 5 lifecycle. In exploring this research, it is based on formulation planning, implementation, and evaluation. The results of the narrative review which is based on research for the 2018 to 2023 period resulted in a formulation plan but not yet an implementation and evaluation plan. In planning the formulation is only limited to providing recommendations but is not accompanied by an implementation and evaluation plan of the recommendations. For this reason, the results of this narrative review can be used as a basis for further research on ITG planning based on the COBIT 5 lifecycle.
Perancangan Rencana Keberlangsungan Bisnis dalam Manajemen Risiko Layanan Teknologi Informasi Handoko, Handoko; Elly, Elly
Jurnal Teknik Informatika dan Sistem Informasi Vol 9 No 3 (2023): JuTISI
Publisher : Maranatha University Press

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28932/jutisi.v9i3.6539

Abstract

Universitas Mikroskil is one of the universities in Medan City that implements information technology in its business processes such as academic services for lecturers, students, education staff, administration and student data storage, lecturers, education staff,, and so on, financial processes, lecture processes, academic guidance, lecture scheduling, student attendance attendance, study plan card filling, schedule announcements, exam announcements, grade announcements, admissions, library management and so on. Seeing the many processes at Universitas Mikroskil, a disaster management plan is needed that can be used at the managerial level to anticipate the occurrence of unwanted things such as loss of important data or documents, viruses on computers or servers, and so on. The purpose of this study is to analyze and assess the risks and impacts of risks at Universitas Mikroskil. Furthermore, a business continuity plan is prepared based on an analysis of business risks and impacts to overcome information technology that is constrained by the disaster risk that occurs. Risk assessment on two natural threats has Vital criticality. The risk assessment on the three human threats has 1 Critical-Mission criticality, 1 Vital criticality, and 1 Minor criticality. The risk assessment on three infrastructure threats has 1 Critical-Mission criticality, and 2 Vital criticality. Risk assessment on three IT system threats has 2 Critical-Mission criticality, and 1 Vital criticality. From 8 operational activities, there are 5 Critical-Mission services, 2 Vital services, 1 Important service.
Manfaat, Tantangan, Dampak Sistem Perencanaan Sumberdaya Perusahaan Dalam Organisasi: Tinjauan Literatur Sitematis Sanjaya, Daniel Robi; Febriandi, Agistra; Widodo, Aris Puji
Jurnal Teknik Informatika dan Sistem Informasi Vol 9 No 3 (2023): JuTISI
Publisher : Maranatha University Press

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28932/jutisi.v9i3.6543

Abstract

Enterprise Resource Planning (ERP) systems provide extensive benefits, challenges, and impacts to the entire enterprise. ERP systems help companies to share and transfer data and information across functional units within and outside the company aiming to achieve different goals. One such aspect is the investment in ERP system implementation. ERP systems collect, record, integrate, manage, and transmit data and information across functional units of the company. In this paper, we follow the Systematic Literature Review (SLR) research method to explore the benefits, challenges, and impacts of ERP system implementation with a literature review conducted using the methodology guide from Kitchenham et al. This method conducts a systematic review consisting of three stages: planning, implementation, and reporting. The conclusion in this study is that there are benefits, challenges and impacts in an integrated ERP system to improve processes and product quality, reduce production cycle time, and improve the decision-making process then there are challenges of security risks and functionality limitations and there are impacts such as reducing time when processing data, increasing efficiency when used and providing high-quality services.
Analisis Malware Aquvaprn.exe Untuk Investigasi Sistem Operasi Dengan Metode Memory Forensics Aditya, Hafish Naufal; Widiyasono, Nur; Rahmatulloh, Alam
Jurnal Teknik Informatika dan Sistem Informasi Vol 10 No 2 (2024): JuTISI
Publisher : Maranatha University Press

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28932/jutisi.v10i2.6562

Abstract

In today's digital age, data has become a valuable asset. Various techniques are used to steal personal data that could potentially be misused by irresponsible parties. The object used in this study is AQUVAPRN.exe, which is a type of malware known as a Remote Access Trojan (RAT). When this malware runs, the creator of the malware can access personal data from the infected operating system without the user's knowledge. AQUVAPRN.exe works in the background when an application is executed, creating several processes such as modifying the registry, creating files, reading files, and making continuous internet connections to a specific IP address without the user's knowledge. The result obtained from the AQUVAPRN.exe malware is an IP address of 109.51.76.80, with the domain located in Lisbon, Portugal, and has an MD5 hash value of 55c2c12970cda52f58bfad7b8c7d37d5. It is also known that the AQUVAPRN.exe malware uses an anti-reverse engineering technique, specifically obfuscation, which obstructs or hinders the malware from being analyzed or reverse-engineered to determine the code used to create the malware. The PID of the AQUVAPRN.EXE process is 8332 with a virtual tool (Virtual Address) of 0x8e0f57042080.