cover
Contact Name
Fatqu Rizki
Contact Email
indexsasi@apji.org
Phone
+6285642100292
Journal Mail Official
indexsasi@apji.org
Editorial Address
Jalan Watunganten 1 No 1-6, Batursari, Mranggen Kab. Demak Jawa Tengah 59567
Location
Kab. demak,
Jawa tengah
INDONESIA
Jurnal Sistem Informasi dan Ilmu Komputer
ISSN : 29865158     EISSN : 29864976     DOI : 10.59581
Core Subject : Science,
Jurnal Sistem Informasi dan Ilmu Komputer berfokus pada publikasi hasil penelitian, kajian konseptual, dan pengembangan keilmuan di bidang Sistem Informasi dan Ilmu Komputer. Jurnal ini bertujuan menjadi media diseminasi ilmiah bagi akademisi, peneliti, dan praktisi dalam pengembangan serta penerapan teknologi informasi yang inovatif dan berkelanjutan. Ruang Lingkup Ruang lingkup jurnal mencakup, namun tidak terbatas pada, topik-topik berikut: Bidang Sistem Informasi Analisis dan Perancangan Sistem Informasi Manajemen Sistem Informasi Sistem Informasi Manajemen Sistem Enterprise (ERP, SCM, CRM) Sistem Pendukung Keputusan Business Intelligence dan Data Warehouse Tata Kelola Teknologi Informasi Audit dan Keamanan Sistem Informasi E-Government dan E-Business Bidang Ilmu Komputer Rekayasa Perangkat Lunak Kecerdasan Buatan (Artificial Intelligence) Machine Learning dan Deep Learning Data Mining dan Big Data Jaringan Komputer dan Keamanan Jaringan Internet of Things (IoT) Pengolahan Citra dan Visi Komputer Sistem Terdistribusi dan Cloud Computing Human-Computer Interaction (HCI)
Articles 169 Documents
Audit Sistem Informasi Absensi Menggunakan Cobit 5 (Studi Kasus ; PT. PLN Persero Binjai) Debby Ade prastiwi; Desiska Natalia Br purba; Farida hanum; Nurul qadarsih
Jurnal Sistem Informasi dan Ilmu Komputer Vol. 2 No. 2 (2024): Mei : Jurnal Sistem Informasi dan Ilmu Komputer
Publisher : International Forum of Researchers and Lecturers

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59581/jusiik-widyakarya.v2i3.3797

Abstract

The development of information systems is now widely used in the business world, both in the living environment and even in the work environment, such as the use of the attendance information system at PT PLN PERSERO. Attendance in an agency is an important factor in human resource management. Accurate and objective information regarding an employee's attendance can present the quality and productivity of performance, determine the size of performance allowances and the general level of employee discipline in the agency. The process of recording and reporting employee absences is a repetitive process that is used at certain times such as entry time, departure time and holidays. It is recommended that audits of this system be carried out periodically or annually, so that the expected level of maturity can be achieved, and as a whole, not just the attendance information system, so that all aspects of work operations can also be evaluated so as to improve employee performance in general. From the results of the maturity level assessment, several findings were obtained in each domain studied, namely with the EDM03 domain having a value of 3.00, it was found that information and data security problems needed to be improved, with the EMD05 domain having a value of 2.93, problems were found that there were no written regulations that could be used as a reference, with domain AP015 with a value of 3.13 found a problem that there was still a difference between cost allocation and actual costs with domain 1P012 with a value of 3.07, a problem was found that there were no risk response regulations available, with domain DSS02 with a value of 3.13 there were no written regulations that could be used as a reference.
Audit Sistem Informasi Pelayanan Bpjs Kesehatan Menggunakan Framework Cobit 5.0 Nurhafieza Nurhafieza; Dila Aulia Putri; Nurfadillah Nurfadillah; Evi Vusvitasari
Jurnal Sistem Informasi dan Ilmu Komputer Vol. 2 No. 2 (2024): Mei : Jurnal Sistem Informasi dan Ilmu Komputer
Publisher : International Forum of Researchers and Lecturers

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59581/jusiik-widyakarya.v2i2.3798

Abstract

BPJS Health is a legal entity formed to administer the health insurance program with the aim of protecting the entire community with affordable premiums and providing wider service coverage for the entire community. BPJS health services focus on first level health services (FKTP/first level health facilities). Due to the sensitive nature of health information stored and managed by BPJS Health, it is important to ensure that the information systems used are safe from cyber attacks and data leaks. The stages of a BPJS Health service audit are determining audit objectives, identifying services using the framework, capability level analysis, testing controls and evidence at the capability level, verifying results, and compiling audit results reports and recommendations. Audits carried out for services that focus on Process Domains DSS01 and DSS02. The measurement result is 2.5 because the value rounding index means the results are at level 3 (established process), that is, currently the processes in each process domain have been identified and standardized well so that the library service system is stable for implementation, while the expected level is at level 4 so there is a gap of 1.5. To be able to overcome the existing gap, a recommendation was made, namely to maximize the alignment of Company Operational Standards (SOP) with applicable policies.
Penerapan Metode Data Mining Market Basket Analysis Terhadap Data Penjualan Produk Pada Toko Dimsum Madani Menggunakan Algoritma Apriori Ahmad Syah Lubis; Shella Alivia Ahmad Siahaan; Nurul Nazli; Nita Syahputri
Jurnal Sistem Informasi dan Ilmu Komputer Vol. 2 No. 3 (2024): Agustus : Jurnal Sistem Informasi dan Ilmu Komputer
Publisher : International Forum of Researchers and Lecturers

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59581/jusiik-widyakarya.v2i3.3805

Abstract

Data mining is a technique for extracting new information from data warehouses, information is seen as very important and valuable because by mastering information it is easy to achieve a goal, this makes everyone compete to obtain information, as is the case with the Dimsum business at Dimsum Madani.toko. This is located on Jalan Lampu gg. Pelita 4, Brayan Bengkel, East Medan, the location is close to many Brayan Resident's Houses. This of course affects sales levels. Increasing daily sales activity results in an accumulation of sales transaction data that continues to increase, thereby burdening data storage. Unfortunately, this data is only stored without further processing. In fact, this data collection holds valuable information.This research uses Market Basket Analysis with the Apriori Algorithm to find association patterns based on consumer shopping behavior. The goal is to identify items that are often purchased together. The research results showed that the combination of Seaweed Dimsum with Tofu Skin Spring Rolls had the highest support value (50%) and the highest confidence (75%).
Peran Sistem Informasi Manajemen dalam Meningkatkan Kinerja Organisasi Fardan Ali Torabora Siregar; Muhammad Irwan Padli Nasution
Jurnal Sistem Informasi dan Ilmu Komputer Vol. 2 No. 3 (2024): Agustus : Jurnal Sistem Informasi dan Ilmu Komputer
Publisher : International Forum of Researchers and Lecturers

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59581/jusiik-widyakarya.v2i3.3849

Abstract

Improving organizational performance in the future requires the integration of information technology that not only plays a supporting role, but also as the main tool to ensure success in providing the best service to the community. The role of information technology in the work system has brought significant changes in the world of work, although the main challenge is to improve the competence of human resources which is crucial for the successful performance of government agencies. This systematic research adopted the Preferred Reporting Items for Systematic Reviews approach, by analyzing full articles in English and Bahasa Indonesia. With the implementation of an effective management information system, organizations can manage data and information more efficiently, which in turn enables more accurate and timely decision-making. This contributes significantly to increasing productivity, reducing operational costs, and responding more quickly to changes in the market or business environment. In addition, management information systems also play an important role in human resource management, inventory management, project management, and employee performance evaluation.
Optimalisasi Keamanan Data Pada Sistem Operasi Windows Melalui Penerapan Teknologi Kriptografi Modern Rakhmadi Rahman; Mulyadi Mulyadi; Alif Imran
Jurnal Sistem Informasi dan Ilmu Komputer Vol. 2 No. 3 (2024): Agustus : Jurnal Sistem Informasi dan Ilmu Komputer
Publisher : International Forum of Researchers and Lecturers

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59581/jusiik-widyakarya.v2i3.3868

Abstract

Data security is an important aspect of information systems, especially in the widely used windows operating system environment. Modern encryption technology offers a variety of ways to increase data protection from security threats. This method utilizes literature insights and comparative analysis of various cryptographic techniques applied to the Windows operating system. Data sources were obtained from academic journals, books and technical documents from Microsoft and cyber security institutions. This article describes various modern cryptographic techniques that can be applied to the Windows operating system, including symmetric and asymmetric algorithms and end-to-end encryption. Protocol implementation security. This research also examines the effectiveness of cryptographic techniques in overcoming cyber security threats and provides the best recommendations for improving data security. It also provides a comparative analysis of various cryptographic techniques implemented in Windows operating systems. This study shows that evaluating encryption techniques can help overcome cyber threats and provide optimal solutions to improve data security. Data sources were obtained from academic journals, books, and technical documents from Microsoft and cyber security.
Sistem Informasi Absensi Perangkat Desa di Kecamatan Bengkayang Rupina Rupina; Candra Gudiato
Jurnal Sistem Informasi dan Ilmu Komputer Vol. 2 No. 3 (2024): Agustus : Jurnal Sistem Informasi dan Ilmu Komputer
Publisher : International Forum of Researchers and Lecturers

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59581/jusiik-widyakarya.v2i3.3887

Abstract

Attendance and punctuality of employee attendance are often used as one indicators in employee performance assessment.Employee absenteeism has a big impact on work productivity in achieving company goals, especially in government agencies related to community services. Regarding the village apparatus in Bengkayang District, it is ONE of the government agencies that still carries out the attendance process manually so that data collection on attendance hours, entry hours, departure times, recapitulation of employee absences requires a relatively long time in the calculation and data search process. This manual attendance process is prone to causing incidents loss of data can affect the credibility of the data used to make employee absence reports. Based on these problems, something is needed employee attendance information system to manage data related to employee absences. The Employee Attendance Information System in this research was built using a qualitative method, where this method consists of the stages of problem analysis, system requirements, system requirements analysis, and system design. By implementing the village apparatus attendance information system in Bengkayang sub-district, it is hoped that it can help in managing employee attendance data and improve agency performance. Send feedback Side panels History Saved
Analisis Sentimen Terhadap Penutupan Tiktok Shop Dengan Metode Naive Bayes Riyan Fahmi Gunawan; Nurirwan Saputra; Ari Kusuma Wardana; Ahmad Riyadi
Jurnal Sistem Informasi dan Ilmu Komputer Vol. 2 No. 3 (2024): Agustus : Jurnal Sistem Informasi dan Ilmu Komputer
Publisher : International Forum of Researchers and Lecturers

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59581/jusiik-widyakarya.v2i3.3948

Abstract

Nowadays, advances in information and communication technology have had a major impact on various sectors of life, including in the field of trade and e-commerce. However, as it happens in the scope of social media, TikTok Shop is also dealing with challenges and changes. One of the issues that is sticking out and is currently hot is the permanent closure of the TikTok Shop feature that has occurred in Indonesia. This research will carry out several processes starting with data collection, then data labeling, data preprocessing, data sharing, weighting training data, using the Naive Bayes method, and ending with testing. In this study, the results of the implementation that has been made or built are discussed. The method used is the Naive Bayes Classifier Method to classify training data as much as 800 data, which is 80% of the total data. Then, testing is carried out using 200 testing data, which is 20% of the total data. The evaluation results show an accuracy value of 73%. In addition to the accuracy value, this research also recorded the precision, recall, and F1 score values. The classification that appears most often and contributes the highest in these values is the Positive classification as much as 420 data or 42% of the total data used..
Rancangan Data Warehouse Untuk Penunjang Sistem Informasi Eksekutif Pada Yayasan Ummu’l Quro di Depok Khairi Fadli Winata; Dedek Indra Gunawan
Jurnal Sistem Informasi dan Ilmu Komputer Vol. 2 No. 3 (2024): Agustus : Jurnal Sistem Informasi dan Ilmu Komputer
Publisher : International Forum of Researchers and Lecturers

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59581/jusiik-widyakarya.v2i3.3988

Abstract

The progression of the technology that is growing rapidly so as to give various concessions in every aspect of life .In an age of globalization business competition that is more strict , both in industry of providing goods and services , the success of an enterprise or organization is very dependent on technology information that can be provided a report on for an analysis .The reporting system considered static inflexible in exploring information in a system information to .Dynamic reporting instrument necessary so users can do data analysis to see the available data of various dimensions .The methodology that was used is to build data application the warehouse used the top down .The result of this is the creation of a truly peneliltian base data and it can be applied that can be used to do analysis on key aspects of information transaksional that occurs in units of education at the foundation ummu l quro depok one used as a support ktaking process The decision by the leader
Strategi Pengembangan Sistem Operasi Windows untuk Memperkuat Proteksi Windows terhadap Ancaman Malaware Rakhmadi Rahman; M. Faiz Ilyas; Muhammad Alfarizky Yusuf
Jurnal Sistem Informasi dan Ilmu Komputer Vol. 2 No. 2 (2024): Mei : Jurnal Sistem Informasi dan Ilmu Komputer
Publisher : International Forum of Researchers and Lecturers

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59581/jusiik-widyakarya.v2i2.3994

Abstract

Behind the widespread proliferation of malware, IT experts have developed robust security systems to minimize the risk of malware infection. In the Windows security system, numerous software solutions have been created to prevent malware threats, including Windows Defender, which serves as the core of Windows security, virus & threat protection, real-time protection, firewall & network protection, account protection, and many more. This study uses a qualitative approach based on literature review. The results indicate that by integrating machine learning technology, enhancing security features, and adopting a layered approach, the strategy for developing the Windows operating system has successfully strengthened protection against malware threats. These measures not only improve the ability to detect and respond to threats but also ensure that users can enjoy a safe and protected computing experience.
Peningkatan Keamanan Data dengan Kriptografi Modern pada Sistem Operasi Rakhmadi Rahman; Khumaedi Khumaedi; Nugrah Surya Pratama
Jurnal Sistem Informasi dan Ilmu Komputer Vol. 2 No. 4 (2024): November : Jurnal Sistem Informasi dan Ilmu Komputer
Publisher : International Forum of Researchers and Lecturers

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59581/jusiik-widyakarya.v2i3.3995

Abstract

In the current digital era, data security is a top priority for individuals, organizations, and businesses. Data is considered a valuable asset that needs to be protected from various security threats, especially in operating systems where data is stored (data at rest) and transmitted (data in motion) through networks. This research aims to enhance data security by implementing modern cryptographic methods. The cryptographic methods used include RC4, AES, and WPA3. Penetration testing is conducted to evaluate the effectiveness and efficiency of each cryptographic method. The research results show that the implementation of modern cryptography provides an additional layer of security against security threats to data in motion and data at rest within the operating system.

Page 10 of 17 | Total Record : 169