cover
Contact Name
Fitria
Contact Email
lp4mjurin@gmail.com
Phone
+6287899062000
Journal Mail Official
lp4mjurin@gmail.com
Editorial Address
Institut Informatika dan Bisnis Darmajaya jl.ZA Pagar Alam no.93 Bandar Lampung
Location
Kota bandar lampung,
Lampung
INDONESIA
Jurnal Informatika
ISSN : 16933877     EISSN : 24071544     DOI : http://dx.doi.org/10.30873/ji.v20i2
Core Subject : Science,
Jurnal Informatika. Jurnal Informatika adalah jurnal cetak dan elektronik sebagai media untuk mempublikasikan hasil penelitian dan pemikiran kalangan akademisi, peneliti dan praktisi bidang informatika. Jurnal Informatika Terbit 2 kali dalam setahun yaitu Bulan Juni dan Desember dengan No. ISSN : 1693-3877 dan No. e-ISSN : 2407-1544.
Articles 308 Documents
Klasifikasi Kelayakan Permintaan Pinjaman Pensiun Menggunakan Metode K-Nearest Neighbors (K-NN) Sarisstia, Tika; Setiawan, Herri; Permatasari, Indah
Jurnal Informatika Vol 25 No 2 (2025): Jurnal Informatika
Publisher : Institut Informatika Dan Bisnis Darmajaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

 The loan eligibility assessment for retired employees is a crucial process requiring quick and accurate evaluation to support sound credit decision-making. This research develops a pension loan eligibility classification system using the K-Nearest Neighbors (K-NN) method at Bank BTPN Palembang. The dataset consists of 240 retired customers with attributes including Pension Salary, Loan Amount, 70% Salary, Monthly Installment, Remaining Salary, Credit History, Age, and Target Label. Data preprocessing includes duplicate removal, normalization, encoding, and train-test splitting. The optimal k value is determined using the Elbow method. Experimental results show that K-NN with k = 5 achieves an accuracy of 95.83%. Precision values reach 0.92 for the Eligible class and 1.00 for the Ineligible class, while recall scores are 1.00 and 0.92, with F1-scores of 0.96 for both classes. The confusion matrix indicates 45 correct classifications out of 48 test cases, with only 3 misclassifications. These results demonstrate that the K-NN method effectively supports objective loan eligibility assessments in the financial sector.
Klasterisasi Penyakit pada Data Klaim Rujukan Tingkat Lanjut BPJS Kesehatan Menggunakan Algoritma Density-Based Spatial Clustering of Application with Noise Rivai, Muklas; Huda, Misbahul; Rosni; Dewi, Karina Sylfia
Jurnal Informatika Vol 25 No 2 (2025): Jurnal Informatika
Publisher : Institut Informatika Dan Bisnis Darmajaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Over time and with the advancement of technology, an increasing number of disease-claim submissions have been received by Badan Penyelenggara Jaminan Sosial (BPJS) for Health, causing data accumulation to the point that the dataset can now be categorized as Big Data. One of the challenges of Big Data is that it cannot be processed using conventional methods, thus requiring specialized approaches such as data clustering. The purpose of this study is to determine the optimal number of clusters and to analyze the characteristics of the cluster groups. The type of data used is secondary data obtained from the BPJS Health database. The data used consists of claim data from Fasilitas Kesehatan Rujukan Tingkat Lanjutan (FKRTL) under BPJS Health from January 2019 to December 2020. The variables used include childbirth, accidents, catastrophic diseases, and other diseases. The stages of the clustering process include data normalization, parameter determination, application of the Density-Based Spatial Clustering of Application with Noise (DBSCAN) algorithm, and evaluation of cluster results using the silhouette index. The results of the clustering analysis on FKRTL claim data based on the International Statistical Classification of Diseases and Related Health Problems, 10th Revision (ICD-10), show that there are three clusters and one noise cluster, with an average silhouette index of 0.6595942, indicating that the model has a medium structure. Cluster 1 consists of two members with dominant claim categories being accidents and other diseases, cluster 2 consists of 27 members with childbirth as the dominant claim category, cluster 3 consists of four members with catastrophic diseases and other diseases as the dominant claim categories, and the noise cluster consists of one member with childbirth as the dominant claim category.
Implementasi Paralel Bubble Sort dengan Menggunakan MPICH2 dan Perbandingannya dengan Implementasi Sekuensial Rosani, Erna; Imaculata Inriani, Maria; Asmara, Jimi
Jurnal Informatika Vol 25 No 2 (2025): Jurnal Informatika
Publisher : Institut Informatika Dan Bisnis Darmajaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

 This research is motivated by the need for efficient sorting algorithms for large amounts of data. The objective of this research is to implement the Bubble Sort algorithm in parallel using MPICH2 and compare its performance with sequential implementations. The research method involved testing parallel and sequential Bubble Sort programs on datasets of varying sizes (10, 100, 1,000, 10,000, and 100,000 elements). The experimental results show that parallel Bubble Sort performs better than sequential Bubble Sort, especially for large amounts of data. The speed-up achieved was 4.44 times faster on a dataset of 100,000 elements. However, for small data sets, sequential Bubble Sort is more efficient due to the communication overhead between processes in parallel Bubble Sort.
A Sistem Informasi Layanan Kesehatan Berbasis Web Mobile (Studi Kasus Pukesmas BIHA Lampung Barat): Sistem informasi Susilowati, Tri; Taufik, Taufik; Hartati, Sri
Jurnal Informatika Vol 25 No 2 (2025): Jurnal Informatika
Publisher : Institut Informatika Dan Bisnis Darmajaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

 Public Health Centers (Puskesmas) serve as primary healthcare facilities responsible for delivering comprehensive medical services to the community, including promotive, preventive, curative, and rehabilitative efforts. However, in many regions, information management and service administration are still conducted manually. Activities such as patient registration in logbooks, storing physical records, and sharing announcements through limited media remain common practices. These conventional methods often lead to several issues, including delays in providing information, difficulties in retrieving data, potential record loss, and reduced efficiency in health service delivery. Such conditions do not align with the Regulation of the Minister of Health of the Republic of Indonesia No. 31 of 2019, which mandates every Puskesmas to implement an information system to support health service management. Therefore, this study aims to design and develop a Web Mobile-Based Health Service Information System that can be accessed easily anytime and anywhere. The system development process adopts the System Development Life Cycle (SDLC) methodology, which includes six stages: planning, requirement analysis, system design, implementation, testing, and maintenance. The system is developed using PHP, MySQL, HTML, and Bootstrap, resulting in a responsive, userfriendly, and interactive web-based mobile application. The developed system provides several core features, including online patient registration, doctor schedule information, general health services (dental, maternal and child health, laboratory), Puskesmas profile, and a community complaint submission form. Based on testing using the Black Box Testing method, all system functionalities work properly and meet user requirements. The implementation of this system enhances service speed, efficiency, and transparency, while supporting the government’s initiative for healthcare digitalization at the primary service level.
Evaluasi Sistem Informasi Permohonan Elektronik Menggunakan Metode Pieces Destinaya, Irtiyah Daniyah; Wulandari, Siska; Irawan, Debi; Gunawan, Syam; Iqbal, Muhammad
Jurnal Informatika Vol 25 No 2 (2025): Jurnal Informatika
Publisher : Institut Informatika Dan Bisnis Darmajaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

 Advances in digitization within government institutions have encouraged the development of more efficient and transparent electronic services. This study aims to evaluate the Electronic Application Information System (SIMPEL) of the Constitutional Court of the Republic of Indonesia using the PIECES framework. This study involved 112 respondents, consisting of Applicants/Community (53.6%), Civil Servants (20.5%), Advocates/Legal Representatives (17%), and other user categories (8.9%). The method used was quantitative descriptive with data collection through online surveys and statistical analysis using SPSS version 26.0. The results showed that the Economy dimension received the highest score of 4.26, while the Control dimension received the lowest score of 3.75, indicating the need to improve system security. In practical terms, these findings confirm the need to strengthen two-factor authentication (2FA), tighten access control, and optimize file validation to minimize the risk of data leaks and unauthorized access. This research contributes to the development of digital public services that are more secure, efficient, and user-oriented, as well as enriching the evaluation of e-government systems in Indonesia.
Integrasi Blockchain dan Algoritma Kriptografi Untuk Perlindungan Data Pribadi: Tinjauan Literatur Sistematis 2021- 2025 Mubarak, Roy; Riadi, Imam; Sutikno, Tole
Jurnal Informatika Vol 25 No 2 (2025): Jurnal Informatika
Publisher : Institut Informatika Dan Bisnis Darmajaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

 Personal data has become a highly valuable asset in the rapidly evolving digital era. However, the increasing reliance on digital technology also poses serious cybersecurity threats, including data breaches, hacking, and misuse of personal information. Increasingly frequent data leaks in social media applications, e-wallets, and ecommerce platforms highlight the urgency of protecting user privacy. Despite the implementation of stricter regulations such as the GDPR in Europe and the Personal Data Protection Act (PDPA) in Indonesia, personal data security remains a significant challenge. This study aims to identify and analyse variables that contribute to improving personal data security amidst cyber threats in the digital era. The variables examined include: objects, frameworks, methods, and tools used. The approach used in this study was a systematic literature review using the PRISMA method, which examined 85 papers from three major databases (Google Scholar, IEEE, and Springer) between 2021 and 2025. The results show a trend of integrating blockchain technology with cryptography, smart contracts, and artificial intelligence to strengthen personal data protection and ensure compliance with global privacy regulations. This research concludes that blockchain has significant potential to address cyber threats and could become an innovative solution for future personal data protection. This article also outlines current research contributions and the development direction needed in the field of blockchain-based data security and cryptographic techniques.
Melindungi Integritas Data: Audit Kepatuhan Cobit 5 Untuk Sistem Accurate 5 Eka Putri, Aliffia; Agus Prasetyo Utomo; Mariana, Novita
Jurnal Informatika Vol 25 No 2 (2025): Jurnal Informatika
Publisher : Institut Informatika Dan Bisnis Darmajaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

 This study aims to assess the effectiveness and compliance level of information security controls in the Accurate 5 system using the COBIT 5 framework. The evaluation focuses on data protection mechanisms such as access management, encryption, and activity monitoring, which are aligned with the COBIT 5 domains (APO, BAI, DSS, and MEA). Data were collected through a 13-item questionnaire, interviews, and system documentation analysis. The results indicate that the effectiveness of security controls achieved an average score of 4.18, while compliance with COBIT 5 reached an average score of 4.08. This study contributes by providing a practical compliance audit model for IT-based organizations to enhance data integrity and strengthen information security governance.
Pengembangan Sistem Keamanan Kendaraan Bermotor Berbasis Fingerprint Dengan Mikrokontroler Yudi Abdul Syawari, Muhammad; Aji Wijaya, Ryan; Hartono, Hartono; Apriando , Rama
Jurnal Informatika Vol 25 No 2 (2025): Jurnal Informatika
Publisher : Institut Informatika Dan Bisnis Darmajaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

 Motorcycle theft is one of the eight most frequent types of crime in Indonesia in 2024, with a total of 19,057 reported cases. Based on data from Pusiknas Bareskrim Polri, 38,438 cases of motorcycle theft were recorded from January to November 2023. This condition indicates that the existing vehicle security systems are still unable to provide optimal protection, as conventional systems such as ignition keys and alarms are easily bypassed by criminals. Therefore, a more advanced, personalized, and highly protective security solution is needed. This study aims to develop a fingerprint-based motorcycle security system that can only be accessed by registered users and to design a prototype that integrates a fingerprint sensor with a microcontroller as the main control unit. The research method used is the prototyping method, which includes identifying system requirements, designing the initial hardware and software, developing the prototype, conducting functional testing, and evaluating the system. The main components used include a fingerprint sensor, a microcontroller, and actuators as the mechanism for the vehicle locking system. The test results show that all components and features of the system function as designed. The registration and deletion of the master fingerprint operate accurately as the main authentication mechanism. User management features—such as adding and deleting user fingerprints—also function properly, demonstrating the system’s capability to recognize and verify biometric data accurately. In addition, the mechanism for opening the motorcycle seat or storage compartment through fingerprint authentication operates smoothly and consistently. Overall, the developed system performs stably and accurately, providing a higher level of security compared to conventional systems. This proves that biometric technology based on fingerprint authentication is effective for implementation as a modern and efficient motorcycle security solution.