Claim Missing Document
Check
Articles

Found 18 Documents
Search

IDENTIFIKASI BARANG BUKTI DIGITAL PADA APLIKASI MI VIDEO MENGGUNAKAN METODE LIVE FORENSICS Dedy Hariyadi; Dedy Hariyadi; Ike Yunia Pasa
Seminar Nasional Informatika (SEMNASIF) Vol 1, No 1 (2018): Landscape Industri Internet Dampak Perilaku Marketing Indonesia
Publisher : Jurusan Teknik Informatika

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Saat ini perkembangan teknologi juga mempengaruhi tingkat kejahatan. Hal ini ditunjukan pertumbuhan barang bukti elektronik dan/atau digital yang ditangani oleh Kepolisian selalu meningkat dari tahun ke tahun. Bahkan beberapa kejahatan terinspirasi dari media internet, sebagai contoh kejahatan seksual. Ada beberapa pelaku tindak kejahatan seksual yang terinspirasi dari video yang pernah dilihatnya melalui sebuah ponsel cerdas. Penelitian ini mengusulkan metode analisis forensik untuk mengidentifikasi barang bukti digital dari aplikasi pemutar video.  
Analisis Forensik Untuk Mendeteksi Pesan yang Disembunyikan pada Short Message Service Menggunakan Aplikasi Berlisensi Open Source Ike Yunia Pasa; Dedy Hariyadi
SMARTICS Journal Vol 6 No 2: SMARTICS Journal (Oktober 2020)
Publisher : Universitas PGRI Kanjuruhan Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21067/smartics.v6i2.4703

Abstract

Anti Forensic Techniques aim to complicate the process of investigating a crime. Hiding an SMS message with the aim or support of a crime can be categorized as an Anti Forensic technique. On smartphones with the MIUI operating system, it is equipped with features to block an SMS message and even hide an SMS message. The existence of a feature to hide SMS messages will complicate the investigation process if this feature uses to support crime. This research proposes a forensic analysis method to detect hidden SMS messages using open-source software. Differences in the process of retrieving digital evidence will affect the results of forensic analysis. So in this research to compare the results of the analysis of two digital forensic software to detect hidden messages.
Sistem Informasi Pembayaran Sekolah Pada SMK Widya Kutoarjo Berbasis Web Faizatun Karomah; Ike Yunia Pasa; Hamid Muhammad Jumasa
INTEK : Jurnal Informatika dan Teknologi Informasi Vol. 3 No. 2 (2020)
Publisher : Universitas Muhammadiyah Purworejo

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37729/intek.v3i2.842

Abstract

The school payment system at SMK Widya Kutoarjo is still handwritten. Data related to payments such as building management payments, uniform payments, book payments, and government assistance are kept in the form of files, making them less effective and efficient. The purpose of this study is to create a school payment information system, with the benefit of facilitating the process of managing school payment data and making it easier for parents to monitor student payment status. The school payment information system designed using Context Diagrams, Data Flow Diagrams (DFD), and Entity Relationship Diagrams (ERD) aim to help the payment process to be more effective in managing data.
Pengembangan Sistem Informasi Presensi Kehadiran Guru Menggunakan Model Sequential Linier Wahju Tjahjo Saputro; Ike Yunia Pasa; Wuri Setyowardani
INTEK : Jurnal Informatika dan Teknologi Informasi Vol. 4 No. 2 (2021)
Publisher : Universitas Muhammadiyah Purworejo

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37729/intek.v4i2.1698

Abstract

The manual attendance system currently running at SMK TKM Teknik Purworejo has not been able to produce fast and accurate data so it is not easy to monitor teacher attendance. Therefore, a computerized Teacher Presence System is needed to produce faster and more accurate data at SMK TKM Teknik Purworejo. In making the Presence Information System for Teacher Attendance at SMK TKM Teknik Purworejo the Sequential Linear or Classic Life Cycle Model or commonly referred to as the Waterfall model is used. Linear Sequential is an approach to systematic and sequential software development that starts at the system level and progresses throughout the analysis, design, code, and testing. The data collection procedure was carried out to collect the data needed in the study, in this case using the methods of observation, interviews, and documentation. The system built can provide various facilities such as the process of adding, changing, and deleting admin data, teacher data, permission type data. It also presents the process of updating general and school settings. There is also a facility to make an entry and exit presence, which is equipped with a photo of the presence and checking the IP connection used. And also displays attendance and permission reports.
Penerapan Metode SAW Pada Penentuan Penerima Beasiswa Lazizmu Ike Yunia Pasa; Nur Wachid Adi Prasetya; Ratih Hafsarah Maharrani
INTEK : Jurnal Informatika dan Teknologi Informasi Vol. 5 No. 1 (2022)
Publisher : Universitas Muhammadiyah Purworejo

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37729/intek.v5i1.1971

Abstract

Scholarships are awards in the form of financial aid to individuals or organizations for their work performance. Purworejo Muhammadiyah University (UMP) as an educational institution, also provides scholarships to its students. One of them is the Lazizmu scholarship. In the process, the campus needs to prioritize students according to their criteria. However, the accuracy of student selection is still low; therefore it is necessary to implement an efficient method to assist the selection process for the acceptance of the Lazizmu scholarship at UMP. This research aims to apply the calculation of the Simple Additive Weighting (SAW) method to the selection problem of the Lazizmu scholarship recipient, by conducting a test using a confusion matrix. The results of the confusion matrix test show that the level of accuracy in calculations using the Simple Additive Weighting (SAW) method is 80%, thus it can be developed into a decision support system to determine the acceptance of the Lazizmu scholarship at the Muhammadiyah University of Purworejo (UMP).
Pengaruh Faktor Sosial Dan Kognitif Terhadap Persepsi Kegunaan Magnetic Resonance Imaging Nurul Bahiyah; Ike Yunia Pasa
INTEK : Jurnal Informatika dan Teknologi Informasi Vol. 1 No. 2 (2018)
Publisher : Universitas Muhammadiyah Purworejo

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37729/intek.v1i2.91

Abstract

One of information technology developments used in health sector is body scanning technology. Magnetic Resonance Imageing (MRI) is a body scanning method that can check abnormal tis-sue and body cells. MRI is an advanced technology adopted at Yogyakarta hospitals. The pur-pose of this study is to determine the factors that influence the interest in using MRI technology because the use of MRI will not run maximally if there is resistance or rejection from the user.Predictor analysis of MRI usage perceptions on radiographers uses Technology Acceptance Model 2 (TAM2) approach. There are two factors that influence the perceptions of usability, namely social and cognitive factors. The social factors examined in this study are subjective and imaging norms, while the cognitive factors used are convenience factors. The results of the study show that the factors influencing the perception of usefulness are social factors, both subjective and imaging norms. Meanwhile, one of the cognitive factors (convenience factor) in this study does not significantly influence. The statistic test was performed using a regression method with SPSS 19 analyzer.
Audit Teknologi Informasi Bandung Techno Park Menggunakan Framework Cobit 5 Pada Domain EDM (Evaluate, Direct, And Monitor) Daniel Alexander Octavianus Turang; Delphine Yusticia Ratnasari; Ike Yunia Pasa
INTEK : Jurnal Informatika dan Teknologi Informasi Vol. 1 No. 2 (2018)
Publisher : Universitas Muhammadiyah Purworejo

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37729/intek.v1i2.92

Abstract

IT governance is needed as a guide to be used in the setting of the utilization of information technology in an organization. IT governance in organizations provides IT solutions that will be used to handle with related problems in organization, handle risks and also reduce operational costs. The research process design was conducted on COBIT 5, that is in the EDM domain (Evaluate, Direct, and Monitor) which focuses on on ensuring the achievement of organizational goals by governance framework setting and maintenance, ensure benefit delivery, risk optimisation, resource optimisation, and stakeholder transparacy. The results of the maturity level at level 1 for the EDM05 processes, level 2 for the EDM03 processes, while the EDM01, EDM02 and EDM01 processes were at level 3. The target set was level 4, where where the management of supervise and measure of things that have been met with the procedures, as well as taking action when the process does not run effectively.
Pendekatan Algoritma Apriori Pada Data Mining Untuk Menemukan Pola Belanja Konsumen Wahju Tjahjo Saputro; Ike Yunia Pasa
INTEK : Jurnal Informatika dan Teknologi Informasi Vol. 1 No. 1 (2018)
Publisher : Universitas Muhammadiyah Purworejo

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37729/intek.v1i1.97

Abstract

Data mining is often used in research-related pattern and knowledge of an information is stored in large-scale databases. Today many companies have large amounts of data was stored in the database. The large-scale databases are only used to generate tabular information fo the needs daily of managers. So it can be called rich data but poor information.Data mining has one assocation method that can generate certain patterns and knowledge of data have an assocate between two itemsets, so it has an if-then property. Algorithm used to produce assocation rule is called apriori.The result of research represent that the apriori algorithm can work optimally to generate pattern the sales transaction. This research represents transaction frequency{2,3} -> {28} has support 10.5%, confidence 66.6% and {7,8} -> {22} has support 10.5%, confidence 66.6%. Both of rules have frequencies often represent quite high with > 2.
Identifikasi Barang Bukti Percakapan Aplikasi Dual Apps Whatsapp Pada Ponsel Xiaomi Menggunakan Metode NIST Mobile Forensics Dedy Hariyadi; Dedy Hariyadi; Ike Yunia Pasa
INTEK : Jurnal Informatika dan Teknologi Informasi Vol. 1 No. 1 (2018)
Publisher : Universitas Muhammadiyah Purworejo

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37729/intek.v1i1.101

Abstract

Mobile Forensics is a scientific branch of Digital Forensics related to the handling of digital evidence on mobile devices. The growth of mobile devices technologies such as smartphones need quite unique and adaptive handling with technological developments. Technological innovations in mobile devices should be handled thoroughly. As an example of Dual Apps new features launched by Xiaomi also need to be identification of digital traces. Dual Apps feature allows 1 phone to have 2 accounts on 1 social media app. Using the NIST Mobile Forensics method to identify digital evidences left behind by the Dual Apps ecosystem.
Teknologi Pembelajaran Pada Sekolah Dasar Dalam Rangka Meningkatkan Kemampuan Penguasaan Teknologi Informasi dan Komunikasi Arum Ratnaningsih; Wahju Tjahjo Saputro; Ike Yunia Pasa; Murhadi Murhadi
INTEK : Jurnal Informatika dan Teknologi Informasi Vol. 3 No. 1 (2020)
Publisher : Universitas Muhammadiyah Purworejo

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37729/intek.v3i1.479

Abstract

The problem faced by elementary school teachers in Era 4.0 is the use of technology in the learning and administration process. Facts in schools there are still many teachers who do not have the expertise, skills, and skills in preparing to learn. This is reflected in the very little knowledge that teachers have about learning technology, the low level of teacher innovation in computer utilization, the low ability and interest of teachers in computer software and applications, and the impact of the internet that provides everything instantly. The purpose of community service activities is to meet the needs of students and teachers in the learning process so that learning activities become more effective and efficient. The method used in community service with a priority scale. This is because the problems in these service activities are limited to the use and use of technology for learning activities and supporting teacher administration. The types of programs implemented in this training activity include the Microsoft Word Program, Microsoft Excel Program, Open Shoot Program, Hypercam Program, and e-Learning Program. The results of community service training activities are able to make teaching materials using Microsoft Word, create video learning media using Open Shoot, manage learning materials from the internet using Hypercam, manage learning materials, learning media, and evaluate learning using Elearning, and process Student daily grades using Microsoft Excel.