cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota malang,
Jawa timur
INDONESIA
TEKNOLOGI INFORMASI
Published by STMIK PRADYA PARAMITA
ISSN : -     EISSN : -     DOI : -
Core Subject : Science,
Arjuna Subject : -
Articles 132 Documents
RANCANGAN APLIKASI INDEKS KINERJA DOSEN PADA STAFFSITE STMIK PPKIA PRADNYA PARAMITA MALANG Widarti, Dinny Wahyu; Firdaus, Nasrul
JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi JURNAL TEKNOLOGI INFORMASI: Teori, Konsep dan Implementasi VOL 9 No. 2 Tahun 2018
Publisher : JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The IKAD Information System application at STIMATA is still done in the conventional way. Collecting Tridharma data for each lecturer such as teaching, research and dedication as well as questionnaire data from students, then entering data and entering the IKAD formula. So far, the calculation of IKAD uses Microsoft Excel. Then the secretary of the study program made a letter of IKAD by combining the calculation data of IKAD. Then the letter was distributed to the Lecturers through BAAK. Letters distributed to lecturers often settle for days in the BAAK room. The delay in the process of making IKAD makes each lecturer slow for self-introspection, so that in the next semester there has been no better progress.On the basis of the above problems, it is necessary to make the IKAD Application in Web-based STIMATA. This research was carried out with the SDLC method. The IKAD application will be placed on the staffsite.stimata.ac.id page.It is expected that by using the IKAD application it can reduce the entry processing time and ease of data calculation, and can produce lecturer report cards quickly, as well as graphical display of lecturers' achievement every semester
PENGARUH PEMANFAATAN TEKNOLOGI INFORMASI TERHADAP KINERJA PERUSAHAAN DENGAN KUALITAS SISTEM INFORMASI AKUNTANSI SEBAGAI VARIABEL INTERVENING Indriani, Milisa; Istutik, Istutik
JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi JURNAL TEKNOLOGI INFORMASI: Teori, Konsep dan Implementasi VOL 9 No. 2 Tahun 2018
Publisher : JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This study aims to examine the effect of information technology utilization on company performance with quality of accounting information system as an intermediate variable. The population of this research is all employees who work in Finna Golf & Country Club as many as 224 employees. Samples in this study were selected by using non probability sampling-purposive sampling. The number of samples are 31 respondents. Data obtained were analized using SmartPLS software version 2.0. The results of this study indicate three findings. First, there is positive effect between utilization of information technology on company performance. Second, there is positive effect between quality of accounting information systemon company performance. Three, there is a positive effect betweenutilization of information technology on quality of accounting information system.
SISTEM PENDUKUNG KEPUTUSAN UNTUK MENENTUKAN KUALITAS PELAYANAN PADA MALANG DORM HOSTEL MENGGUNAKAN METODE SIMPLE ADDITIVE WEIGHTING Purnamasari, Putri Indah; Marisa, Fitri
JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi JURNAL TEKNOLOGI INFORMASI: Teori, Konsep dan Implementasi VOL 9 No. 2 Tahun 2018
Publisher : JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The  expanding world  of  the  hospitality industry makes the  company have  to  compete tightly  to  keep  its business. Quality of  service from  a  company affects  the  level  of  customer satisfaction, If the  better the quality  of service then  the  level of customer satisfaction is higher.  Decision support system to  determine service quality at hostel dorm  hostel using SAW method can  help companies evaluate the quality of service that  has been  given.  The results of the  evaluation can  be  used to determine policies relating  to efforts to improve  service quality.  The results obtained from  the  calculation of the  weight  of the  criteria  assessment with the Fuzzy Simple Additive Weighting (SAW) method succeeded, thus obtaining the VAR score (the result of the assessment at Malang  Dorm Hostel exceeded the 4-5 star rating of the customer is good-very good.
IMPLEMENTASI KEAMANAN MIKROTIK MENGUNAKAN METODE SIMPLE PORT KNOCKING PADA SMAN 1 NGANTANG Firdaus, Nasrul; Fitriawan, Angga
JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi JURNAL TEKNOLOGI INFORMASI: Teori, Konsep dan Implementasi VOL 9 No. 2 Tahun 2018
Publisher : JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

A computer network is a group of computers or more that are connected to each other electronically.Network security is currently one of the most important and growing issues.Microtic security at SMAN 1 NGANTANG is still not fully considered, it makes the network administrator nervous about the Brute Force attack.SMAN 1 NGANTANG is a high school located in the poor district of Malang, SMAN 1 NGANTANG has services for students and teachers, namely wifi based on mikrotik.At present the security of mikrotik there has not been prioritized, even the microticists there are still vulnerable to attacks from those who do not have authorization.Because security has not been prioritized, mikrotik there is vulnerable to attacks from outside and inside.Therefore, researchers are interested in implementing the Simple Port Knocking method on the mikrotik server of SMAN 1 NGANTANG.Testing in this study using a router that uses a mikrotik operating system, this study will compare mikrotik without using Simple Port Knocking with mikrotik that use Simple Port Knocking and will be attacked by Brute Force. The results of this study are the comparison table of security mikrotik without using Simple Port Knocking and using Simple Port Knocking. Keywords: Mikrotik Security, Firewall, Simple Port Knocking, Brute Force Method, SMAN 1 NGANTANG
IMPLEMENTASI METODE K-MEANS CLUSTERING DALAM MENGELOMPOKKAN KOMPETENSI MAHASISWA Wardianto, Wardianto; Marisa, Fitri; Wijaya, Indra Dharma
JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi JURNAL TEKNOLOGI INFORMASI: Teori, Konsep dan Implementasi Vol 10 No 1 Tahun 2019
Publisher : JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Academic ability is the ability of a person who is included in the academic field with a measure can be in the form of value or so-called academic achievement. With this system helps in grouping students in their fields, and students can find out the competencies obtained based on the achievement index of the courses that have been determined. In making this system, researchers used Visual Studio 2012 and applied the K-Means Clustering algorithm method to get more accurate results in classifying student competencies. This system can be used for all departments, the testing is done at the Informatics Engineering Department of Malang Widyagama University. in this system uses the mysql database for storage. Based on the user test results that have been done, Based on the results of the user trials that have been conducted, of the 5 weighted values that have been determined, there is an average of the results of the trial which is 85.6% strongly agree with the existence of this system to find out the student competency group.It is expected that with this system. Can find out competency groups that are suitable for their fields, so that later they will produce graduates who are competent in accordance with their fields.Keywords : Competence, K-means Clustering, software visual
ISTEM INFORMASI PEMBERIAN BONUS UPAH DAN PENJADWALAN KARYAWAN MENGGUNAKAN METODE ALGORITMA GENETIKA Akbar, Ismail; Marisa, Fitri; Wijaya, Indra Dharma
JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi JURNAL TEKNOLOGI INFORMASI: Teori, Konsep dan Implementasi Vol 10 No 1 Tahun 2019
Publisher : JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

By following the development of the market and the needs of the community, it is increasingly needed a technology to improve the quality and results of its production with careful planning, in order to avoid the level of loss and reduce production in the company. This is experienced by companies UD. Muria PS who is engaged in animal husbandry. Which has several problems in scheduling employees to take their products. Which also has an impact on the gap between employees on the bonus wages they receive. By building a scheduling information system and providing bonus wages, this research uses php programming language and website-based programming and applies genetic algorithms in it to more easily manage employee schedules and provide bonus rewards fairly and evenly. This genetic algorithm process has a parameter of the vehicle, coolie, and time in the scheduling process. and schedule parameters in the employee bonus wage process. Based on the results of the user trial, the respondents strongly agree with the existence of this application. Which of the 14 respondents said it was feasible to apply to the company UD. Muria PS with a result of 87.37%. It is expected that with this application, employee scheduling and bonus wage issues can help solve it. Keywords: Scheduling, Bonus Salary, Genetic Algorithm, PHP
SISTEM PENGAMBILAN KEPUTUSAN PENENTUAN MUTASI PENDIDIK DAN TENAGA KEPENDIDIKAN MENGGUNAKAN METODE WEIGHTED PRODUCT (WP) PADA DINAS PENDIDIKAN KOTA MALANG Husni, Mochamad; Lestari, Elvira Verdhi
JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi JURNAL TEKNOLOGI INFORMASI: Teori, Konsep dan Implementasi Vol 10 No 1 Tahun 2019
Publisher : JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The Education Department of Malang City conduct a policy of mutation educators and educational personnel at the elementary school level by putting aside some aspects of relevance because of the shortage of employee causing conflict and various reasons candidates not doing of mutation, in addition to the a policy of mutation must continue to run the distribution of the quality of education. This study aims at the realization of a system that can help the field of Educators and Educational Personnel in Education Department of Malang City to provide solutions in the form of employee recommendations for further policy can be taken according to standard needs mutation. The decision support system method used in this research is the Weighted Product (WP) method in which each candidate of mutation will be determined based on the weight of the school data, employee data and the criteria data specified by the Education Department of Malang City, with calculations based on normalization (Wi) , multiplication until the powers of numbers to get the final rating (Vi). Data collection methods used were interviews and literature studies. The result of research of decision support system of determination of mutation of educator and educational personnel using method of Weighted Product (WP) at Malang Education Department built to give solution in the form  of recommendation of employees from each school who recommended most feasible proposed  to the a policy of mutation by the Education Department of Malang City. Keywords: Decision Support System, Employee Mutation, Education Department, Weighted Product Method, Elementary School
IMPLEMENTASI LOCATION BASED SERVICE PADA APLIKASI HALO TAMBAL BAN BERBASIS ANDROID DI KOTA MALANG Balandra, Daniel Dwi; Sujito, Sujito; Primandari, Liduina Asih
JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi JURNAL TEKNOLOGI INFORMASI: Teori, Konsep dan Implementasi Vol 10 No 1 Tahun 2019
Publisher : JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Leaks on vehicle tires experienced by motorists, and become an obstacle to vehicles when traveling, require motorists to push their vehicles to avoid excessive damage to the tires. In finding a tire service provider to fix tire leakage problems, sometimes the driver must push the vehicle without knowing where and how far to find a tire repair service provider. The HALO Tambal Ban application is an application that provides information about tire patch service providers. Application built to facilitate finding information about tire patch service providers, information about location, availability of services, operating hours, to tariffs imposed by tire patch service providers. To obtain information about the location of the nearest tire repair service provider from the application user, this research proposes to implement the Location Based Service feature on the HALO Tambal Ban application, to obtain more accurate location information. Using HTML5 and AngularJS programming languages, Ionic as a Framework, and firebase as database processing. In order to improve the accuracy of location data obtained by the application by implementing the Location Based Service feature on the HALO Tambal Ban application. Keywords: Tambal Ban, Android, Ionic, Location Based Service, Malang
PEMANFAATAN TEKNOLOGI USB DONGLE SERVER LINUX UNTUK PEMANFAATAN FLEKSIBILITAS IMPLEMENTASI APLIKASI SISTEM INFORMASI Affandi, Luqman; H, Dhebys Suryani
JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi JURNAL TEKNOLOGI INFORMASI: Teori, Konsep dan Implementasi Vol 10 No 1 Tahun 2019
Publisher : JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

In the construction of a computer software application it takes several stages such as the paths that exist in the Linear Sequential or Waterfall Development Model, prototype, Rapid Application Development (RAD) or other models. One of the stages of these models is that there is a program implementation stage, namely a process of installing an application that is being developed to the server computer or client user so that it can be used. The process of implementing an application must pay attention to the type of application being built, whether the application is desktop, web or mobile based, and each type has a different installation method. This makes it difficult for an application user to implement an application if they do not have sufficient knowledge in the computer field. One way that can be used to realize this is by making a USB dongle in which there are applications, servers, supporting programs and application settings. Program users do not need to install supporting programs and make arrangements. Keywords: USB, Linux, Information Systems
IMPLEMENTASI SISTEM KEAMANAN JARINGAN MENGGUNAKAN METODE PACKET FILTERING BERBASIS ASA 5520 PADA PT. XYZ Putra, Agung Triwicaksono; Setyowibowo, Sigit; Arifin, Samsul
JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi JURNAL TEKNOLOGI INFORMASI: Teori, Konsep dan Implementasi Vol 10 No 1 Tahun 2019
Publisher : JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

PT. XYZ is one of the fourth largest cigarette producers in Indonesia with a market share of 7%. Has more than 40 marketing offices spread throughout Indonesia. Every branch offices have sales that using public internet to upload and download data from headquarter server’s. Constraints faced by PT. XYZ that public server used for upload and download process was down due to attacker from external network, causing disruption to sales team activities. Sales team can’t achieve the target to visit 6427 outlets from total 64980 outlets. The purpose of this research is to develop a network security system environment that able to protect internal servers of PT. XYZ from the threat both internal network and extenal. This study implemented using packet filtering method that applied to CISCO ASA 5520 device. The network security system that already implemented are able to protect the server from unauthorized security threats so it does not interfere sales team's operations. Keywords: Network Security, Packet Filtering, ASA 5520