cover
Contact Name
Muhammad Syafiq
Contact Email
yppijurnal@gmail.com
Phone
+6282170781263
Journal Mail Official
yppijurnal@gmail.com
Editorial Address
Jalan Tuanku Tambusai, Pekanbaru, Riau - Indonesia
Location
Unknown,
Unknown
INDONESIA
Information Technology Studies Journal
ISSN : -     EISSN : 30326621     DOI : https://doi.org/10.62207
Core Subject : Science,
The journal covers a wide range of topics related to information system design, development, implementation, and management. It encompasses areas such as information systems development methodologies, database management systems, information technology infrastructure, enterprise systems, decision support systems, information systems security and privacy, human-computer interaction, and ethical and social implications of information systems.
Articles 18 Documents
THE ROLE OF ROBOTICS AND AUTOMATION IN INDUSTRY 4.0 TRANSFORMATION Loso Judijanto
Information Technology Studies Journal (ITECH) Vol. 2 No. 1 (2025): Information Technology Studies Journal (ITECH)
Publisher : Penelitian dan Pengembangan Ilmu

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62207/ht155m85

Abstract

Industry 4.0 transformation has driven the adoption of robotics and automation, but challenges in implementation are still a significant obstacle for many companies. This research aims to identify and analyze the main challenges faced in the application of robotics technology in the industrial sector. This study focuses on grouping technical, economic, regulatory, social and security challenges that hinder the adoption of robotics in the context of industry 4.0. This research uses a Systematic Literature Review (SLR) approach to collect and analyze data from relevant scientific articles, with strict inclusion and exclusion criteria. Analysis was carried out using the PRISMA framework to ensure transparency and validity of the results. Research findings show that the main challenges in robotics implementation include system interoperability, high implementation costs, regulatory uncertainty, social resistance to automation, and cybersecurity risks. The impact of these challenges can hinder innovation and efficiency in the industry. The results of this research provide important insights for practitioners and policy makers to design effective mitigation strategies in facing the challenges of robotics adoption. In addition, this research also contributes to the development of technology adoption theory in industry 4.0 by providing an evidence-based analysis of the obstacles faced.
THE APPLICATION OF QUANTUM COMPUTING IN CYBERSECURITY AND DATA ENCRYPTION Loso Judijanto
Information Technology Studies Journal (ITECH) Vol. 2 No. 1 (2025): Information Technology Studies Journal (ITECH)
Publisher : Penelitian dan Pengembangan Ilmu

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62207/s2mtr790

Abstract

The development of quantum computing poses serious challenges to cyber security, especially in data encryption based on classical algorithms such as RSA and ECC. This research analyzes the impact of quantum computing on cybersecurity and identifies mitigation solutions such as Post-Quantum Cryptography (PQC) and Quantum Key Distribution (QKD). Using a Systematic Literature Review (SLR) approach based on the PRISMA method, this research examines literature from databases such as Scopus, Web of Science and IEEE Xplore. Analysis shows that quantum algorithms, especially Shor's Algorithm, can break asymmetric encryption efficiently, thereby encouraging the development of PQC and QKD. However, there are gaps in the practical implementation of these solutions that need to be further investigated. The research results emphasize the urgency of transitioning to encryption systems that are resistant to quantum threats, especially for critical sectors. These findings contribute to the development of cybersecurity theory and practice, while encouraging collaboration between academics, practitioners and policymakers to accelerate the adoption of stronger security systems.
IMPLEMENTATION OF E-COMMERCE CERAMIC SHOP USING APPLICATION PROGRAMMING INTERFACE WITH JSON WEB TOKEN AUTHENTICATION Mepa Kurniasih; Agung Alam Putra; Eka Anggara
Information Technology Studies Journal (ITECH) Vol. 2 No. 2 (2025): Information Technology Studies Journal (ITECH)
Publisher : Penelitian dan Pengembangan Ilmu

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62207/zw47xy62

Abstract

CV. Apuy Stone is a ceramic and granite distribution company located in Serang, Banten. One of the problems faced is the accumulation of goods in the warehouse due to a mismatch between customer demand and the amount of available stock. Often, products that customers are interested in are not available, while other products pile up and remain unsold for a long time. Based on these conditions, the purpose of this Internship Lecture is to design an information system-based solution that can help the company manage inventory more efficiently. The methods used include direct field observation, interviews with related parties, and analysis of sales transaction data for the past two years. The author built a web-based application using the Laravel framework and MySQL database that aims to process sales data and provide recommendations on inventory. This application is designed to identify products with a low turnover rate (slow-moving) and products with a high level of demand, and assist management in planning more targeted procurement of goods. The results of the system implementation show an increase in accuracy in decision-making related to stock management and a decrease in the number of items piling up unsold. In conclusion, the information system developed can be an effective tool in inventory control based on historical sales data. The benefits of compiling this KKP are directly felt by the company in the form of warehouse operational efficiency, as well as contributing to the development of information technology solutions in the world of small and medium businesses.
DIGITIZING LOCAL LANGUAGES THROUGH AUDIO: AN APPLICATION FOR TRANSLATING INDONESIAN INTO THE PAPUAN MEE TRIBE LANGUAGE Usman Arfan; Margaretha Yanuar Douw
Information Technology Studies Journal (ITECH) Vol. 2 No. 2 (2025): Information Technology Studies Journal (ITECH)
Publisher : Penelitian dan Pengembangan Ilmu

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62207/sw63ar05

Abstract

The preservation of local languages is a significant challenge in the face of globalization and the dominance of national languages. One practical effort that can be undertaken is the utilization of digital technology to document and disseminate indigenous languages. This study aims to develop a web-based application capable of translating text from Indonesian into the Mee language of Papua, complemented by audio features using native speaker recordings. The system was developed using the Waterfall model, starting from requirements analysis, system design, implementation, and testing. The use case diagram illustrates the interaction between users and the system, consisting of two main actors: general users and administrators. Users can input Indonesian words to receive translations in Mee, along with audio output. Administrators have the authority to manage vocabulary data, upload audio files, and synchronize text with the corresponding recordings. The user interface design emphasizes simplicity while reflecting the cultural values of Papua. System testing, performed using black-box methods, confirms that all functional features operate correctly. Evaluation results also indicate the system is user-friendly and holds great potential in supporting the digital preservation of the Mee language.
THE ROLE OF EXPLAINABLE ARTIFICIAL INTELLIGENCE IN INCREASING TRUST IN AUTONOMOUS SYSTEMS Farid W
Information Technology Studies Journal (ITECH) Vol. 2 No. 2 (2025): Information Technology Studies Journal (ITECH)
Publisher : Penelitian dan Pengembangan Ilmu

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62207/4e3pny85

Abstract

The rapid development of autonomous systems across various sectors highlights the importance of building user trust, particularly given the "black box" nature of many Artificial Intelligence (AI) systems. Explainable Artificial Intelligence (XAI) has emerged as a crucial solution to address this challenge by improving the understandability, transparency, and accountability of AI models. This study presents a systematic literature review (SLR) to map publication trends, research methods, theories used, and application domains of XAI in the context of user trust in autonomous systems. By analyzing 30 relevant articles from the Scopus and Web of Science databases between 2020 and 2025, the study finds a consistent increase in academic interest in XAI and trust. Experimental/scenario-based methods and surveys are the most frequently used approaches, while Trust Theory and Technology Acceptance Model (TAM) are the dominant theoretical frameworks. The results show that XAI significantly improves user trust, especially when explanations are tailored to the user's context and characteristics. However, the effectiveness of XAI varies depending on the type of explanation and application domain. This study fills this literature gap by providing a comprehensive mapping and highlighting the mechanisms by which XAI can enhance trust, offering practical guidance for autonomous system developers. Limitations of the study include the database coverage and time period. Future research is recommended to conduct longitudinal analysis, multi-domain empirical testing, and integrate user psychological factors for a more holistic understanding and development of optimal XAI designs.
IMPLEMENTATION OF COMBINATION METHOD ON PASSWORD FOR USER ACCESS IN BANK OPERATIONAL ENVIRONMENT R Fitria Rachmawati
Information Technology Studies Journal (ITECH) Vol. 2 No. 2 (2025): Information Technology Studies Journal (ITECH)
Publisher : Penelitian dan Pengembangan Ilmu

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62207/9q75cv13

Abstract

The development of information and communication technology has now progressed so rapidly and become an inseparable part of human life. The use of this technology has driven rapid business growth, because various information can be easily obtained and presented sophisticatedly, such as compiling electronic documents, performing calculations, sending and reading e-mails, searching for all kinds of information on the internet, and chatting are daily activities that utilize information and communication technology. These positive impacts do not always last well, on the other hand, other parties have thoughts that with bad intentions seek profit by breaking the law. This study explains the scope of information system ethics in terms of the use of passwords as a support for privacy security for system users in the bank's operational environment. The theory used in this study covers the scope of information system ethics, theories related to passwords used in the bank's operational environment. The results of this study are expected to provide deeper knowledge to the general public, and especially in the bank's operational environment, about the importance of information system ethics in terms of implementing combination methods on passwords for user access in the bank's operational environment.
IMPLEMENTATION OF DATA MINING IN DIGITAL LIBRARIES Achmad Ardiansyah
Information Technology Studies Journal (ITECH) Vol. 2 No. 2 (2025): Information Technology Studies Journal (ITECH)
Publisher : Penelitian dan Pengembangan Ilmu

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62207/4kawnb40

Abstract

The development of information technology has driven a significant transformation in digital library systems, where the management and presentation of information now increasingly rely on the use of complex data. This study aims to examine the application of digital library techniques.data miningin analyzing and predicting user behavior to increase effectiveness personalized information retrieval in digital libraries. By using the approachnarrative reviewThis study identified and synthesized literature from various reputable databases such as Scopus, Web of Science, IEEE Xplore, and SpringerLink over the period 2010 - 2025. The results of the analysis indicate that the technique clustering, classification, association rules, and predictive modeling is the most commonly used method to understand user behavior patterns and build adaptive recommendation systems. The integration of these various algorithms has been shown to improve the relevance of information searches, user engagement, and satisfaction with digital library services. This study also highlights research gaps related to the limitations of empirical studies and methodological variations that hinder the generalizability of the results. Theoretically, this research contributes to the development of the concept of information seeking behavior and information systems success model, while practically providing direction for library managers in implementing data-driven strategies to improve service quality. Further research is recommended to explore the integration of data-driven techniques.artificial intelligence And machine learning, longitudinal evaluation of personalized retrieval, and implementation/cross-platform data mining in order to expand the effectiveness and reach of recommendation systems at the global level.
ALGORITMA TERINSPIRASI KUANTUM UNTUK MENINGKATKAN KEAMANAN KRIPTOGRAFI Mepa Kurniasih
Information Technology Studies Journal (ITECH) Vol. 2 No. 3 (2025): Information Technology Studies Journal (ITECH)
Publisher : Penelitian dan Pengembangan Ilmu

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62207/97ewmh95

Abstract

Eskalasi kapabilitas komputasi dan ancaman dari algoritma kuantum, seperti algoritma Shor dan Grover, telah memicu urgensi untuk mengevaluasi kembali ketahanan arsitektur kriptografi klasik. Permasalahan utama terletak pada kerentanan ruang kunci (key space) tradisional terhadap serangan heuristik serta keterbatasan algoritma evolusioner konvensional yang sering terjebak dalam optimum lokal. Artikel ini bertujuan untuk meninjau secara mendalam potensi integrasi Quantum-Inspired Evolutionary Algorithms (QIEA) sebagai solusi hibrida dalam memperkuat keamanan kriptografi. Melalui metode tinjauan naratif terhadap literatur dari pangkalan data Scopus dan Web of Science (2021-2026), studi ini menganalisis mekanisme representasi Q-bit dan Quantum Rotation Gates dalam proses pencarian kunci. Hasil analisis menunjukkan bahwa penggunaan prinsip superposisi memungkinkan eksplorasi ruang kunci yang luas secara simultan tanpa peningkatan beban komputasi secara linear. Studi ini mengusulkan sebuah kerangka kerja sistem kriptografi adaptif yang mencakup empat pilar integrasi: eksplorasi ruang kunci berbasis Q-bit, optimasi parameter pada Elliptic Curve Cryptography (ECC), penguatan S-Box pada Advanced Encryption Standard (AES), serta deteksi dini kelemahan kunci secara evolusioner. Sebagai kontribusi teoritis, model ini menawarkan transformasi dari keamanan statis menuju sistem pertahanan yang adaptif dan tangguh terhadap berbagai skenario serangan siber di masa depan.

Page 2 of 2 | Total Record : 18