Claim Missing Document
Check
Articles

Found 4 Documents
Search

Investigasi Cyberbullying pada WhatsApp Menggunakan Digital Forensics Research Workshop Imam Riadi; Sunardi; Panggah Widiandana
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 4 No 4 (2020): Agustus 2020
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (506.098 KB) | DOI: 10.29207/resti.v4i4.2161

Abstract

Cyberbullying in group conversations in one of the instant messaging applications is one of the conflicts that occur due to social media, specifically WhatsApp. This study conducted digital forensics to find evidence of cyberbullying by obtaining work in the Digital Forensic Research Workshop (DFRWS). The evidence was investigated using the MOBILedit Forensic Express tool as an application for evidence submission and the Cosine Similarity method to approve the purchase of cyberbullying cases. This research has been able to conduct procurement to reveal digital evidence on the agreement in the Group's features using text using MOBILedit. Identification using the Cosine method. Similarities have supported actions that lead to cyberbullying with different levels Improved Sqrt-Cosine (ISC) value, the largest 0.05 and the lowest 0.02 based on conversations against requests.
Implementation of the Jaccard Method in the WhatsApp Messenger Cyberbullying Investigation Analysis Using a Framework National Institute of Standards and Technology Panggah Widiandana; Imam Riadi; Sunardi
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 4 No 6 (2020): Desember 2020
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (712.01 KB) | DOI: 10.29207/resti.v4i6.2635

Abstract

The development of information technology is increasingly showing a great influence on human life. Based on the survey, it was stated that every year the users of the WhatsApp application grew very rapidly in 2015, 900 million users and in March 2020, it increased to 2000 million users. The data is straight-line with the increasing crime rate, one of which is cyberbullying which always increases every year. The purpose of research that has been carried out is to add references for investigators in conducting, including cases of cyberbullying. The National Institute of Standards and Technology (NIST) method is used to make it easier for researchers to conduct digital forensics on the evidence that has been obtained. The Jaccard method is used to identify evidence that has been obtained to obtain digital evidence to prove that cyberbullying has occurred. The results of research that have been done prove that the NIST method can simplify the process, in cyberbullying identity starting from the lifting of evidence to the reporting stage of evidence. The similarity jaccard method is able to identify cyberbullying with different levels, with the highest value of jaccard which is 0.21 (21%), and the lowest value obtained from a value of 0 (0%). The NIST method and the cyberbullying method can make it easier for investigators in cyberbullying cases.
Perancangan Database Point of Sales Apotek Dengan Menerapkan Model Data Relasional Rusydi Umar; Abdul Hadi; Panggah Widiandana; Fahmi Anwar; Muhammad Jundullah; Ahmad Ikrom
Query: Journal of Information Systems VOLUME: 03, NUMBER: 02, OCTOBER 2019
Publisher : Program Studi Sistem Informasi

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (327.013 KB)

Abstract

Database design is a process of designing data needed to support various system designs. The benefit of a database in Point of Sales drug sales in the Jogja Pharmacy enables storing, changing and returning all data quickly and easily. Problems in database design are different viewpoints from the designer, programmer and end-user. Because of that, the design is needed a methodology the process of designing a good database starting from procedures, techniques, tools and documentation. The database planning method used in Research and Development (R & D) and the database design method uses the Database Life Cycle (DBLC) variable research is POS pharmacy. Research aspects include requirement analysis, conceptual design, logical design and physical design. The final result of this research is to create 8 types of conceptual consists of drugs, drugs, customers, stores, users, detailed details, and temporary details.Keywords: database, apotek, POS, DBLC, relational data 
Mobile Forensics for Cyberbullying Detection using Term Frequency - Inverse Document Frequency (TF-IDF) Imam Riadi; Sunardi Sunardi; Panggah Widiandana
Jurnal Ilmiah Teknik Elektro Komputer dan Informatika Vol 5, No 2 (2019): December
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (554.761 KB) | DOI: 10.26555/jiteki.v5i2.14510

Abstract

The case of cyberbullying in Indonesia was ranked third in the world in 2015 and as much as 91% was experienced by children [1]. RSA Anti Fraud Command Center (AFCC) report reports that in 2015 45% of transactions were carried out through mobile channels, while 61% of fraud occurred through mobile devices [2]. WhatsApp in July 2019, 1.6 billion users access the WhatsApp messenger on a monthly basis [10]. The data opens a reference for investigators to better anticipate cybercrime actions that can occur in the whatsapp application because more users are using the application. In this study using the TF-IDF method in detecting cyberbullying that occurs in order to be able to add a reference for investigators. The conclusions that have been obtained from the simulation of conversations between four people in a whatsapp group get the results of the cyberbullying rate that the user "a" has a cyberbullying rate of 66.80%, the user "b" has a cyberbullying rate of 50%, the user "c" has a level cyberbullying is 33.19%, user "c" has a cyberbullying rate of 0% from the data proving that the TF-IDF method can help investigators detect someone who will commit cyberbullying actions but in its development a better way is needed when preprocessing so that the abbreviation or changing words can still be detected perfectly.