Bambang Sugiantoro
Universitas Islam Negeri Sunan Kalijaga

Published : 4 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 4 Documents
Search

ANALISIS KESIAPAN PENGIMPLEMENTASIAN EDUROAM DI UIN SUNAN KALIJAGA Maria Ulfah Siregar; Alifah Amalia; Bambang Sugiantoro
JURNAL TEKNIK INFORMATIKA Vol 13, No 1 (2020): JURNAL TEKNIK INFORMATIKA
Publisher : Department of Informatics, Universitas Islam Negeri Syarif Hidayatullah

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (195.248 KB) | DOI: 10.15408/jti.v13i1.11889

Abstract

This research is based on the existence of Eduroam in academia world which offers the easiness on managing data through internet. Inevitably, UIN Sunan Kalijaga as one of big campus in terms of number of population of academicians and the usage of internet in its area, has not joined in a group of institutions that implemented Eduroam. Through this research we aim to give brainstorming to academicians of UIN Sunan Kalijaga of the existence of Eduroam, then we will conclude the feasibility of implementing Eduroam on UIN Sunan Kalijaga. As guidances for this research are two hypotheses that we built. Our research method is conducting survey and interview to two domestic institutions which implemented Eduroam. It is followed by distributing online internal questionnare in UIN Sunan Kalijaga to do the brainstorming and collecting data. These data then were analyzed statistically to get the descriptive statistic, correlation and proved the hypotheses. Based on our analysis, it is found that there is a strong relation between the knowledge of Eduroam and the intention to join Eduroam, and a strong relation between the frequency of the usage of internet and the intention to join Eduroam. Therefore, we claim that it is feasible to implement Eduroam on UIN Sunan Kalijaga, by first improving the quality and quantity of the internet connection facilities on UIN Sunan Kalijaga.
DATA VISUALISASI SEBAGAI PENDUKUNG INVESTIGASI MEDIA SOSIAL Suwito Pomalingo; Bambang Sugiantoro; Yudi Prayudi
ILKOM Jurnal Ilmiah Vol 11, No 2 (2019)
Publisher : Teknik Informatika Fakultas Ilmu Komputer Univeristas Muslim Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33096/ilkom.v11i2.443.143-151

Abstract

Social media is an application that can make everyone interact with each other and can consume information by sharing content quickly, efficiently and real time. Various kinds of information about someone's activities that we can find on social media, making social media can help to conduct investigations. Some research, using visualization with several graph methods to facilitate the process of analyzing data on social media that is so abundant. But the data used only comes from one social media, while there is still a lot of information on other social media that can be used as data sources for analysis purposes. In this study visualization using the directed graph method will be carried out, then calculate the value of network property and the value of centrality to find out which nodes have many activities which will be carried out in depth searches to find patterns of interaction or activity. Based on the results of the calculated centrality, it is found that on Twitter and Instagram accounts there are many interactions, this can be seen in the value of the indegree and outdegree node. Based on the results of the analysis in this study, information that is important for investigating social media is obtained, such as information about user profiles, posts, comments, preferred social media pages, location, and timestamp, all of which are connected by a line that shows the relationship between the node.
Penerapan Metode Motion Graphic Pada Video Animasi Prosedur Kerja Praktek Study kasus (Teknik Informatika UAD) Muhamad Fadli; Bambang Sugiantoro; Ika Arfiani
Jurnal Pendidikan Multimedia (Edsence) Volume 4 No 1 (Juni 2022)
Publisher : Universitas Pendidikan Indonesia (UPI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.17509/edsence.v4i1.45264

Abstract

Kerja Praktek merupakan matakuliah wajib yang harus diselesaikan oleh mahasiswa. Pada pelaksanaan kerja praktek, banyak mahasiswa yang tidak mengerti prosedur pada mata kuliah ini karena sumber informasi yang selama ini digunakan, hanya penjelasan secara langsung dikelas dan pada saat bimbingan. Hal ini dapat menghambat praktik mahasiswa untuk menyelesaikan mata kuliah tepat waktu. penelitian ini, melakukan pembuatan video animasi Motion Graphic mengenai prosedur mata kuliah praktek, untuk mempermudah mahasiswa memahami prosedur pada praktek mata kuliah. Penelitian ini menggunakan rancangan dari pemodelan air terjun(waterfall). Pemodelan air terjun merupakan metode pendekatan desain sekuensial yang linier atau berurut untuk bidang-bidang teknik. Model air terjun ini melakukan kebutuhan sistem, rancangan sistem, implementasi, dan pengujian sistem hingga perawatan. Video animasi yang di rancang pada penelitian ini, dikembangkan menggunakan metode animasi Motion Graphic, yakni potongan-potongan rekaman digital yang di padukan dengan ilusi gerak dan gambar. Hasil penelitian ini berupa video animasi Motion Graphic, yang telah di uji menggunakan Blackbox Test dan System Usability Scale(SUS), dimana pada pengujian Blackbox Test memperoleh nilai 100% atau layak digunakan, serta pada pengujian System Usability Scale(SUS) memperoleh nilai sebesar 71 yang berarti Dapat diterima atau layak digunakan.
PERAN ETHICAL HACKING DALAM MEMERANGI CYBERTHREATS Qorry Aina Fitroh; Bambang Sugiantoro
JURNAL ILMIAH INFORMATIKA Vol 11 No 01 (2023): Jurnal Ilmiah Informatika (JIF)
Publisher : LPPM Universitas Putera Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33884/jif.v11i01.6593

Abstract

The efforts to digitize and optimize various things in the modern world will certainly highlight issues related to cybersecurity such as data breaches, security breaches, and so on. Ethical hacking and its need in the future cannot be avoided. Ethical hacking technology is spreading in almost every aspect of life, especially the computer industry, which requires protection of important data and must be handled with the right technology. Ethical hacking aims to find vulnerabilities in security systems and discover potential data breaches. This contrasts with the common understanding of hacking, which is black hat hackers who damage systems with malicious intent and steal data and infect viruses. Ethical hacking is a way to combat and neutralize black hat hackers. Teaching ethical hacking is preparing professionals in the information security field with the tools and skills to combat and prevent cybersecurity threats. Teaching inexperienced people in information security with aggressive methods can be viewed as both beneficial and harmful. This is because the same methods are used by malicious hackers hence educating professionals in information security may be perceived as enhancing malicious hackers. Using the literature study method, this article discusses various issues related to ethical hacking.