cover
Contact Name
Wahyuningdiah Trisari Harsanti Putri
Contact Email
wahyuningdiah.trisari@paramadina.ac.id
Phone
+6282111855673
Journal Mail Official
jitc@paramadina.ac.id
Editorial Address
Universitas Paramadina Jl. Raya Mabes Hankam No.Kav 9, Setu, Cipayung, Jakarta Timur 13880
Location
Kota adm. jakarta selatan,
Dki jakarta
INDONESIA
Jurnal Informatika & Teknologi Cerdas (JITC)
Published by Universitas Paramadina
ISSN : -     EISSN : 31097677     DOI : https://doi.org/10.51353/b2cvvm55
Jurnal Informatika & Teknologi Cerdas (JITC) dikelola dan diterbitkan oleh Program Studi Teknik Informatika, Universitas Paramadina. Jurnal ini memuat artikel hasil penelitian di bidang ilmu komputer dan informatika, mencakup topik seperti pengembangan perangkat lunak, aplikasi multimedia, jaringan komputer, sistem cerdas, dan sistem informasi manajemen. JITC terbit dua kali dalam setahun, yaitu pada bulan Juni dan Desember.
Articles 5 Documents
State of the Art: Tantangan dan Pentingnya Standarisasi Keamanan IoT dalam Berbagai Implementasi Awal, Sutan Muhammad Sadam; Darwis, Muhammad
Jurnal Informatika & Teknologi Cerdas Vol 1 No 1 (2025): Jurnal Informatika dan Teknologi Cerdas (JITC)
Publisher : Program Studi Teknik Informatika Universitas Paramadina

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51353/f86b1r67

Abstract

Standarisasi keamanan data di lingkungan IoT telah menjadi isu utama dengan adopsi teknologi IoT yang cepat. Penelitian ini memberikan gambaran tentang pentingnya standarisasi keamanan informasi untuk melindungi perangkat dan data IoT. Dengan standar keamanan yang jelas dan teruji, pengembang dapat merancang perangkat IoT dengan langkah keamanan yang konsisten. Perusahaan mendapatkan benefit dari investasi keamanan. Selain itu, standardisasi juga memungkinkan interoperabilitas perangkat IoT dari vendor yang berbeda, mengurangi risiko serangan, melindungi privasi pengguna, dan meningkatkan kepercayaan pengguna terhadap teknologi IoT. Penelitian ini juga menyatakan bahwa meskipun standar keamanan IoT sudah ada, penelitian dan pengembangan masih diperlukan untuk mengatasi ancaman keamanan baru yang hadir seiring dengan kemajuan teknologi IoT.
Optimasi Pengelolaan Data Pencarian Fasilitas Ekspedisi Berbasis Otomasi dengan Pendekatan Framework Waterfall Yulyanti, Eva; Shindy Yuliyatini; Imelda, Imelda
Jurnal Informatika & Teknologi Cerdas Vol 1 No 1 (2025): Jurnal Informatika dan Teknologi Cerdas (JITC)
Publisher : Program Studi Teknik Informatika Universitas Paramadina

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51353/9gcnrp75

Abstract

Information technology (IT) has become an integral part of everyday life and plays an important role in various aspects of modern society. With the rapid development of technology, IT has changed the way individuals and organizations communicate, work, and interact. PT XYZ, as a company engaged in logistics, faces a challenge in managing expedition facility search data. This study aims to automate the management of expedition facility search data using the Waterfall framework. The stages in Waterfall include stages such as needs analysis, design, implementation, testing and maintenance. The waterfall method is helpful because it provides a structured, clear, and organized process for project completion.
Sistem Prediksi Kelulusan Ujian Sertifikasi IT Dengan Metode Waterfall Firmansyah, Maulana; Halim, Nuciko Abdul; Imelda, Imelda
Jurnal Informatika & Teknologi Cerdas Vol 1 No 1 (2025): Jurnal Informatika dan Teknologi Cerdas (JITC)
Publisher : Program Studi Teknik Informatika Universitas Paramadina

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51353/hthtfb09

Abstract

This study aims to develop a prediction system for IT certification exam success to boost candidates' confidence and identify participants who require additional training at PT Brainmatics. The main issue is how to effectively utilize historical data to produce accurate predictions and support less confident participants in better preparing for the exam. The study employs the Waterfall method due to its systematic and structured approach. The prediction system utilizes variables such as educational background, work experience, and previous test results. The development stages include needs analysis, system design, implementation, testing, and maintenance. The results show that the system provides accurate predictions with a high degree of reliability. This system assists PT Brainmatics training institutions in identifying participants who need additional support and improving the quality of IT training and certification exams
Keamanan Data dalam Penggunaan IoT untuk Menghimpun dan Mengelola Big Data syahla, Syahla Nadya Putri Syabrina
Jurnal Informatika & Teknologi Cerdas Vol 1 No 1 (2025): Jurnal Informatika dan Teknologi Cerdas (JITC)
Publisher : Program Studi Teknik Informatika Universitas Paramadina

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51353/byaz2867

Abstract

In the era of rapid information system growth, the utilization of the Internet of Things (IoT) and Big Data has become a primary focus for modern companies. IoT devices, which are connected to the internet, play a crucial role in collecting, transmitting, and processing data from various sources. Meanwhile, Big Data describes large and diverse datasets that, if properly leveraged, can provide numerous benefits. However, with the increasing use of IoT and Big Data, the protection of information security becomes increasingly important. The aim of this study is to analyze the main challenges in data security related to the use of IoT for managing Big Data. The research method involves a literature review of various relevant national and international journal articles. The results indicate that the main challenges include extensive data collection, data security, individual identification, user control, and third-party data access. Therefore, a balanced integration of IoT technology, Big Data, and data security practices is key to ensuring business success and sustainability in this digital era.
Critical Analysis of Technological Intervention in the Humanitarian Crisis of Sudan and the UN Agencies Resistance Rabbani, Humaira Surya
Jurnal Informatika & Teknologi Cerdas Vol 1 No 1 (2025): Jurnal Informatika dan Teknologi Cerdas (JITC)
Publisher : Program Studi Teknik Informatika Universitas Paramadina

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51353/k5aefc22

Abstract

Sudan is a country that has been described by the UN as the worst humanitarian crisis in 2024. Technology became the tool for the human rights violations by the conflicting parties and gun for UN agencies working in Sudan to entangle the social disaster and food security by providing short term and long-term actions and solutions in many fields. The data collection in this paper was carried out using history and data analysis. The limitation of this study paper was the absence of a chance for the researcher to go directly to Sudan to get first-hand data. All data will likely be checked into reliable sources. From the results analysis data in the paper, it can be concluded that technological intervention in the human crisis has contributed and succeeded in many positive ways to being the last platform for the victims and on the contrary, being abused, and failed to open the Sudanese issue to the international community.

Page 1 of 1 | Total Record : 5