cover
Contact Name
Fergyanto F. Gunawan
Contact Email
fgunawan@binus.edu
Phone
+62215345830
Journal Mail Official
-
Editorial Address
Jl. Kebun Jeruk Raya No. 27, Kemanggisan / Palmerah Jakarta Barat 11530
Location
Kota adm. jakarta barat,
Dki jakarta
INDONESIA
CommIT (Communication & Information Technology)
ISSN : 19792484     EISSN : 24607010     DOI : -
Core Subject : Science,
Journal of Communication and Information Technology (CommIT) focuses on various issues spanning: software engineering, mobile technology and applications, robotics, database system, information engineering, artificial intelligent, interactive multimedia, computer networking, information system audit, accounting information system, information technology investment, information system development methodology, strategic information system (business intelligence, decision support system, executive information system, enterprise system, knowledge management), e-learning, and e-business (e-health, e-commerce, e-supply chain management, e-customer relationship management, e-marketing, and e-government). The journal is published in affiliation with Research Directorate, Bina Nusantara University in online and free access mode.
Articles 478 Documents
EVALUASI MANAJEMEN PROYEK Suryanto, Suryanto; Gondodiyoto, Sanyoto; I, Desi N; Aryanto, Aryanto; Triana, Elis
CommIT (Communication and Information Technology) Journal Vol 3, No 2 (2009): CommIT Vol. 3 No. 2 Tahun 2009
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/commit.v3i2.520

Abstract

The purpose of this study was to evaluate the project management and make suggestions to the problems being faced by the company. Many companies or individuals working on a project basis (project based), but many of those who do not manage the project well, even with no management at all and let the project flow as it is. Therefore, it needs a proper guidance and methods to support a project management information system. The research method used is the method of data collection, covering literature from books, articles from the internet, and study the documentation to PT ACM through direct interviews with the parties concerned with the project. The data analysis technique used is based on the 9 knowledge areas and 5 stages in project management. The results are the company’s project is proposed to be closed (closing) so as not to increase corporate spending on the project. The conclusion of this scientific work is a project run by the 2 parties have a higher risk of failure.Keywords: evaluation, management, project
Information Technology Risk Measurement: Octave-S Method Harahap, Rudy M
CommIT (Communication and Information Technology) Journal Vol 5, No 1 (2011): CommIT Vol. 5 No. 1 Tahun 2011
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/commit.v5i1.556

Abstract

The purpose of this research are to identify the risk of IT in the company and make some recommendation to solve any risk happened in the company, and also to give the reference in measure the risk of IT in the company. Research Method used are book studies, field studies, and analysis techniques. Book studies by collecting the information from books and journal. Then, for field studies, it done by interview, and observation to the company. Analysis techniques done by qualitative approach and using the Octave-S (Operational Threat Asset and Vulnerability Evaluation) – S as the method to measure the risk of IT in the company. The result of this research will be a description of Information Technology in the company and give any risk happened in IT and mitigation activity through the risk in the company. Conclusion of the research are looking for three critical areas, such the awareness and security training, security strategy, security management, and disaster recovery.Index Terms - Risk Management, Information Technology, Octave-S method
PERANCANGAN SISTEM INFORMASI PENGADUAN PELANGGAN BAGIAN CATER PT PLN CABANG UPJ BEKASI KOTA Sutedjo, Eddy; Lie, Sui
CommIT (Communication and Information Technology) Journal Vol 1, No 2 (2007): CommIT Vol. 1 No. 2 Tahun 2007
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/commit.v1i2.476

Abstract

Article discusses the design of user complaint information system on Cater PLN Company Branch UPJ CityBekasi. The design systems consist of complaint acceptance module, scheduled module, field team determinationmodule, and complaint report module. This information system application program testing of user complaint isusing black-box testing method. Black-box testing method was done by giving a number of inputs to the applicationprogram that later processed suitable with the functional needs to produce the needed output. The research resultis the program able to give information about the complaint faster, accurate, and up to date compared to the use ofmanual document.Keywords: information system, customer
PENCITRAAN ALIRAN FLUIDA 3 MEDIUM DENGAN TOMOGRAFI ULTRASONIK Setiadji, Tatang Gunar; Hutagalung, Sutrisno Salomo
CommIT (Communication and Information Technology) Journal Vol 3, No 1 (2009): CommIT Vol. 3 No. 1 Tahun 2009
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/commit.v3i1.511

Abstract

In the imaging process, computer technology has a big role in reconstruction. This paper describes imaging the fluid flow imaging in three medium using ultrasonic tomography for reconstructing the cross sectional image. The image based on wave velocity in each medium and the time of flight are obtained from the measurements using transducer that placed around the pipe. Data collection is constructed into parallel form, then with the use of filtered back projection algorithm an image can be reconstructed. The resolution of image is limited by the number of data of each projection in order to obtain high accuracy of resolution. To increase image resolution, data is interpolated using computer with Matlab.Keywords: image reconstruction, three medium, ultrasonic tomography, filtered back projection
PENGEMBANGAN APLIKASI PERMAINAN SCRABBLE DUA BAHASA MENGGUNAKAN JAVA Masya, Fajar; Elvina, Elvina
CommIT (Communication and Information Technology) Journal Vol 4, No 2 (2010): CommIT Vol. 4 No. 2 Tahun 2010
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/commit.v4i2.547

Abstract

Game applications are favored by many computer users. The population of Indonesia, especially common people do not like playing games in a foreign language. Yet such games can be a fun learning media for foreign languages , especially English. Hence, we developed a game application using the concept of the game Scrabble. The design of this application uses a waterfall methodology, with application design modeling with UML diagrams (Unified Modelling Language) including Use Case Diagram, Activity Diagram, Statechart Diagram, Class Diagram and Sequence Diagram. In the implementation phase, Blue J software used to build the interface using the Java Development Kit (JDK) version jdk1.6.0_02 as the executor, as well as using the command prompt to call the results of execution. Tests on gaming applications are performed using the Black Box and White Box method. The product of this development is a single player game application, which uses two language options.Keywords: game applications, Scrabble, waterfall software engineering methodologies, UML (Unified Modeling Language), Java Programming.
INFORMATION SYSTEM STRATEGIC PLANNING WITH ENTERPRISE ARCHITECTURE PLANNING Astri, Lola Yorita; Gaol, Ford Lumban
CommIT (Communication and Information Technology) Journal Vol 7, No 1 (2013): CommIT Vol. 7 No. 1 Tahun 2013
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/commit.v7i1.580

Abstract

An integrated information system is needed in an enterprise to support businessprocesses run by an enterprise. Therefore, to develop information system can use enterprisearchitecture approach which can define strategic planning of enterprise information system. SMPNegeri 1 Jambi can be viewed as an enterprise because there are entities that should be managedthrough an integrated information system. Since there has been no unification of different elementsin a unity yet, enterprise architecture model using Enterprise Architecture Planning (EAP) isneeded which will obtain strategic planning of enterprise information system in SMP Negeri 1Jambi. The goal of strategic planning of information system with Enterprise Architecture Planning(EAP) is to define primary activities run by SMP Negeri 1 Jambi and support activities supportingprimary activities. They can be used as a basis for making data architecture which is the entities ofapplication architecture. At last, technology architecture is designed to describe technology neededto provide environment for data application. The plan of implementation is the activity plan madeto implemented architectures by enterprise.
KEAMANAN JARINGAN MENGGUNAKAN UNIFIED THREAT MANAGEMENT PADA SERVER BERBASISKAN LINUX Heru, Bambang; Benny, Benny; Defendy, Defendy; Hento, Wahyu
CommIT (Communication and Information Technology) Journal Vol 1, No 1 (2007): CommIT Vol. 1 No. 1 Tahun 2007
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/commit.v1i1.467

Abstract

UTM is an application which integrated many security features become a single hardware platform. The reasonbehind this research is to build a system that protects the network in St. Bellarminus school. Research method that hasbeen used in this research is spiral method, whereas the development of the application is continues and can be modifiedeasily if there is new version of the security tools implemented in the application, or if there is a better security tools to beused. The outcome of the system is very good, because it can protects the network: cross-platform firewall, IntrusionDetection System, Proxy Server, email protection against virus and spam. In conclusion, the application can producehigh effectiveness with low cost and this application is very useful in monitoring and configuring the network in St.Bellarminus school.Keywords: security network, unified threat management, anti virus, server, proxy, firewall
PENGGUNAAN KANBAN DALAM METODE JUST IN TIME PADA PRODUKSI Achmadi, Hendra
CommIT (Communication and Information Technology) Journal Vol 2, No 2 (2008): CommIT Vol. 2 No. 2 Tahun 2008
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/commit.v2i2.502

Abstract

Competition among textile companies is very heavy, especially when dealing with the WTC event in America. This caused a hard shock for the textile companies in Indonesia because many textile companies must divert their focus to local market. As we know, if most of textile companies divert their attention to domestic market, the next problem will happen is more companies entering to local or domestic market, so that more increasing the competition among textile companies. Competition occurs is price competition so that textile companies must continuously introspect themselves so they can compete, and the next is time. In an increasingly competitive world now caused it needs a new breakthrough, in time of samples creating and also textile production itself. The production amount resulted per day is large so that it must be absorbed by market. They can be marketed through a hypermarket or a traditional market. Therefore, the use of information technology is very useful for winning the competition among textile mill. Because the work of the textile industry also must obtain a new order that is done, it needs to make an existing production model of the new order (Just In Time); made to reduce the amount of stock that is stored, it will follow the Japanese style, which is called the Kanban system. In this system, the new company will produce if there is order.Keywords: kanban, textiles, just in time
PERANCANGAN SISTEM INFORMASI AKUNTANSI PEMBELIAN DAN PERSEDIAAN Purwoko, Purwoko
CommIT (Communication and Information Technology) Journal Vol 4, No 1 (2010): CommIT Vol. 4 No. 1 Tahun 2010
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/commit.v4i1.538

Abstract

Procurement and inventory is important activities in a company. Therefore it is the aim of this article to design an accounting information system for procurement and inventory of office supplies to help in fast and accurate planning and decision making. Methods used to collect required data and information is library research and field research. Design and analysis method used is analysis using Object Oriented Analysis and Design. From observation results it is obtained that transaction records in the company is still conducted manually and inefficient in keeping records of incoming and outgoing goods. It is concluded that a computerized procurement and inventory information system would help the management in decreasing faults and increasing the current system effectively.Keywords: accounting information system, procurement, inventory, office supplies.
QUESTDONE APPLICATION WITH SOCIAL NETWORKING FEATURES AS THE ACTUAL WORLD INTERACTION MEDIA ON ANDROID SMARTPHONE Sutoyo, Rhio; Yoshep, Michael; Susanto, Andrew; Kurniadinata, Adrian
CommIT (Communication and Information Technology) Journal Vol 6, No 2 (2012): CommIT Vol. 6 No. 2 Tahun 2012
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/commit.v6i2.570

Abstract

The purpose of this research is the design and implementation of an application that allows users to play and socialize at the same time and directly with the environment around the Android-based smart phone. This application is also expected to be a campaign media for a new product or specific event. The used method consists of two ways: the methods of analysis and design. The method of analysis includes the study of literatures, questionnaires, and comparisons with similar applications. The design method used for this research is Scrum. The obtained results are an application that helps users of Android-based smart phone to do social interaction and provide knowledge about the route that users will be addressed. It is also used as a new campaign media for entrepreneurs who want to promote a product or event. Furthermore, this application is also built with interesting but not complex design, thus allowing users to easily use it. The conclusions are this application provides experience for users to visit various places and can be a media campaign for a new product or specific event. It also becomes a tool of social interaction and useful for finding location of friends.Keywords: Applications; Social Networking; Interaction; Real World; Smartphone; Android

Filter by Year

2007 2025


Filter By Issues
All Issue Vol. 19 No. 1 (2025): CommIT Journal (in press) Vol. 18 No. 2 (2024): CommIT Journal Vol. 18 No. 1 (2024): CommIT Journal Vol. 17 No. 2 (2023): CommIT Journal Vol. 17 No. 1 (2023): CommIT Journal (In Press) Vol. 17 No. 1 (2023): CommIT Journal Vol. 16 No. 2 (2022): CommIT Journal Vol. 16 No. 1 (2022): CommIT Journal Vol. 15 No. 2 (2021): CommIT Journal Vol. 15 No. 1 (2021): CommIT Journal Vol 14, No 2 (2020): CommIT Vol. 14 No. 2 Tahun 2020 (IN PRESS) Vol 14, No 1 (2020): CommIT Vol. 14 No. 1 Tahun 2020 Vol. 14 No. 2 (2020): CommIT Journal Vol. 14 No. 1 (2020): CommIT Journal Vol 13, No 2 (2019): CommIT Vol. 13 No. 2 Tahun 2019 Vol 13, No 1 (2019): CommIT Vol. 13 No. 1 Tahun 2019 Vol. 13 No. 2 (2019): CommIT Journal Vol. 13 No. 1 (2019): CommIT Journal Vol 12, No 2 (2018): CommIT Vol. 12 No. 2 Tahun 2018 Vol 12, No 1 (2018): CommIT Vol. 12 No. 1 Tahun 2018 Vol. 12 No. 2 (2018): CommIT Journal Vol. 12 No. 1 (2018): CommIT Journal Vol 11, No 2 (2017): CommIT Vol. 11 No. 2 Tahun 2017 Vol 11, No 1 (2017): CommIT Vol. 11 No. 1 Tahun 2017 Vol. 11 No. 2 (2017): CommIT Journal Vol. 11 No. 1 (2017): CommIT Journal Vol 10, No 2 (2016): CommIT Vol. 10 No. 2 Tahun 2016 Vol 10, No 1 (2016): CommIT Vol. 10 No. 1 Tahun 2016 Vol. 10 No. 2 (2016): CommIT Journal Vol. 10 No. 1 (2016): CommIT Journal Vol 9, No 2 (2015): CommIT Vol. 9 No. 2 Tahun 2015 Vol 9, No 1 (2015): CommIT Vol. 9 No. 1 Tahun 2015 Vol. 9 No. 2 (2015): CommIT Journal Vol. 9 No. 1 (2015): CommIT Journal Vol 8, No 2 (2014): CommIT Vol. 8 No. 2 Tahun 2014 Vol 8, No 1 (2014): CommIT Vol. 8 No. 1 Tahun 2014 Vol. 8 No. 2 (2014): CommIT Journal Vol. 8 No. 1 (2014): CommIT Journal Vol 7, No 2 (2013): CommIT Vol.7 No. 2 Tahun 2013 Vol 7, No 1 (2013): CommIT Vol. 7 No. 1 Tahun 2013 Vol. 7 No. 2 (2013): CommIT Journal Vol. 7 No. 1 (2013): CommIT Journal Vol 6, No 2 (2012): CommIT Vol. 6 No. 2 Tahun 2012 Vol 6, No 1 (2012): CommIT Vol. 6 No. 1 Tahun 2012 Vol. 6 No. 2 (2012): CommIT Journal Vol. 6 No. 1 (2012): CommIT Journal Vol 5, No 2 (2011): CommIT Vol. 5 No. 2 Tahun 2011 Vol 5, No 1 (2011): CommIT Vol. 5 No. 1 Tahun 2011 Vol. 5 No. 2 (2011): CommIT Journal Vol. 5 No. 1 (2011): CommIT Journal Vol 4, No 2 (2010): CommIT Vol. 4 No. 2 Tahun 2010 Vol 4, No 1 (2010): CommIT Vol. 4 No. 1 Tahun 2010 Vol. 4 No. 2 (2010): CommIT Journal Vol. 4 No. 1 (2010): CommIT Journal Vol 3, No 2 (2009): CommIT Vol. 3 No. 2 Tahun 2009 Vol 3, No 1 (2009): CommIT Vol. 3 No. 1 Tahun 2009 Vol. 3 No. 2 (2009): CommIT Journal Vol. 3 No. 1 (2009): CommIT Journal Vol 2, No 2 (2008): CommIT Vol. 2 No. 2 Tahun 2008 Vol 2, No 1 (2008): CommIT Vol. 2 No. 1 Tahun 2008 Vol. 2 No. 2 (2008): CommIT Journal Vol. 2 No. 1 (2008): CommIT Journal Vol 1, No 2 (2007): CommIT Vol. 1 No. 2 Tahun 2007 Vol 1, No 1 (2007): CommIT Vol. 1 No. 1 Tahun 2007 Vol. 1 No. 2 (2007): CommIT Journal Vol. 1 No. 1 (2007): CommIT Journal More Issue