p-Index From 2019 - 2024
15.885
P-Index
This Author published in this journals
All Journal International Journal of Electrical and Computer Engineering ComEngApp : Computer Engineering and Applications Journal Lontar Komputer: Jurnal Ilmiah Teknologi Informasi JURNAL SISTEM INFORMASI BISNIS Techno.Com: Jurnal Teknologi Informasi Jurnal Buana Informatika Perfecting a Video Game with Game Metrics Jurnal Informatika Jurnal Sarjana Teknik Informatika Jurnal Ilmiah Teknik Elektro Komputer dan Informatika (JITEKI) Prosiding Seminar Nasional Sains Dan Teknologi Fakultas Teknik Jurnal Teknik Elektro CommIT (Communication & Information Technology) Jurnal Ilmiah Kursor Proceeding of the Electrical Engineering Computer Science and Informatics Jurnal Teknologi Informasi dan Ilmu Komputer Telematika Jurnal Edukasi dan Penelitian Informatika (JEPIN) JUITA : Jurnal Informatika Scientific Journal of Informatics Seminar Nasional Informatika (SEMNASIF) ELINVO (Electronics, Informatics, and Vocational Education) Annual Research Seminar Khazanah Informatika: Jurnal Ilmu Komputer dan Informatika Register: Jurnal Ilmiah Teknologi Sistem Informasi Proceeding of the Electrical Engineering Computer Science and Informatics Edu Komputika Journal Format : Jurnal Imiah Teknik Informatika Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) RABIT: Jurnal Teknologi dan Sistem Informasi Univrab SISFOTENIKA Journal of Information Technology and Computer Science (JOINTECS) INTENSIF: Jurnal Ilmiah Penelitian dan Penerapan Teknologi Sistem Informasi JIKO (Jurnal Informatika dan Komputer) JIEET (Journal of Information Engineering and Educational Technology) Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control CogITo Smart Journal IT JOURNAL RESEARCH AND DEVELOPMENT JOURNAL OF APPLIED INFORMATICS AND COMPUTING JURNAL REKAYASA TEKNOLOGI INFORMASI JURNAL TEKNIK INFORMATIKA DAN SISTEM INFORMASI JURNAL INSTEK (Informatika Sains dan Teknologi) ILKOM Jurnal Ilmiah Jiko (Jurnal Informatika dan komputer) Matrik : Jurnal Manajemen, Teknik Informatika, dan Rekayasa Komputer CYBERNETICS Digital Zone: Jurnal Teknologi Informasi dan Komunikasi IJID (International Journal on Informatics for Development) J-SAKTI (Jurnal Sains Komputer dan Informatika) JIPI (Jurnal Ilmiah Penelitian dan Pembelajaran Informatika) ABDIMAS: Jurnal Pengabdian Masyarakat EDUMATIC: Jurnal Pendidikan Informatika jurnal teknik informatika dan sistem informasi Jurnal Mantik NUKHBATUL 'ULUM : Jurnal Bidang Kajian Islam Jutisi: Jurnal Ilmiah Teknik Informatika dan Sistem Informasi JISKa (Jurnal Informatika Sunan Kalijaga) Buletin Ilmiah Sarjana Teknik Elektro Mobile and Forensics Journal of Innovation Information Technology and Application (JINITA) Journal of Education Informatic Technology and Science Jurnal Bumigora Information Technology (BITe) Jurnal Teknologi Informatika dan Komputer Jurnal FASILKOM (teknologi inFormASi dan ILmu KOMputer) Jurnal Computer Science and Information Technology (CoSciTech) Phasti: Jurnal Teknik Informatika Politeknik Hasnur J-SAKTI (Jurnal Sains Komputer dan Informatika) Jurnal Saintekom : Sains, Teknologi, Komputer dan Manajemen Techno Engineering Science Letter Journal of Novel Engineering Science and Technology Jurnal Informatika: Jurnal Pengembangan IT
Claim Missing Document
Check
Articles

Training on how to use Social Media Wisely and Ethically Herman Herman; Imam Riadi; Dikky Praseptian M; Faiz Isnan Abdurrachman; Syahrani Lonang
ABDIMAS: Jurnal Pengabdian Masyarakat Vol. 5 No. 2 (2022): ABDIMAS UMTAS: Jurnal Pengabdian Kepada Masyarakat
Publisher : LPPM Universitas Muhammadiyah Tasikmalaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (803.308 KB) | DOI: 10.35568/abdimas.v5i2.2686

Abstract

Nowadays, the behavior of users in social media arguably represent human behavior in the real world. Training on how to use social media wisely and ethically to young ages is needed to grow the good behavior. Based on a preliminary study, the ages of students in SMK Kesehatan Binatama is considered a terget of such training. 15 years old dominates with 63.6% followed by 16 years old with 29.3% according to age which has the highest penetration rate of social media users reaching 99.16%, namely ages 13-18 years. The activeness of students in social media reaches 99%. The number of hours students use social media where 10.1 % stated between 0-2 hours, 40.4% stated 2-5 hours, 36.4% stated 5-10 hours and 11.1 % more than 10 hours. Knowledge training on social media has been carried out several times but must continue to be carried out along with the development of social media technology and the shift in the age of its users. Training activities with wise and ethical materials using social media have been successfully held with the expected results. Participants' knowledge and insight, namely students can increase with information regarding what can and should not be done when using social media, information about hoaxes and cyberbullying and the ITE Law can be understood properly. The survey results also show an increase in the knowledge provided from the criteria of understanding to criteria of very understanding with an increase from the average score on the pre-test 2.96 with a percentage of 59.2% to the average score on the post-test 3.64 with a percentage of 72.8%.
Analysis of Remote Access Trojan Attack using Android Debug Bridge Deco Aprilliansyah; Imam Riadi; Sunardi
IJID (International Journal on Informatics for Development) Vol. 10 No. 2 (2021): IJID December
Publisher : Faculty of Science and Technology, UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/ijid.2021.2839

Abstract

The security hole in the android operating system sometimes not realized by users such as malware and exploitation by third parties to remote access. This study conducted to identify the vulnerabilities of android operating system by using Ghost Framework. The vulnerability of the android smartphone are found by using the Android Debug Bridge (ADB) with the exploitation method as well as to analyze the test results and identify remote access Trojan attacks. The exploitation method with several steps from preparing the tools and connecting to the testing commands to the testing device have been conducted. The result shows that android version 9 can be remote access by entering the exploit via ADB. Some information has been obtained by third parties, enter and change the contents of the system directory can be remote access like an authorized to do any activities on the device such as opening lock screen, entering the directory system, changing the system, etc.
Analisis Penggunaan Metode ACPO (Association of Chief Police Officer) pada Forensik WhatsApp Riski Yudhi Prasongko; Anton Yudhana; Imam Riadi
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 6, No 2 (2022): EDISI SEPTEMBER
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v6i2.520

Abstract

The development of smartphone technology is increasing, causing cyber crime to increase from year to year. One of the smartphone applications used by criminals is WhatsApp. The WhatsApp application is one of the most widely used insta messaging applications, especially in Indonesia. Violations such as hate speech, defamation, and fraud are common on the WhatsApp social network. This study was conducted with the aim of finding forensic evidence of cyberbullying behavior on the WhatsApp insta messaging application using the Association of Chiefs of Police (ACPO) method. This forensic phase involves planning, arresting, analyzing and presenting to search for digital evidence of cybercrimes using Belkasoft Evidence Center and HashMyFiles software. Digital evidence on smartphones can be found using case scenarios with 13 parameters that have been generated. The results of this study indicate that the Belkasoft Evidence Center digital forensic software is 81.92%, while HashMyfiles can detect the authenticity of digital evidence 79.96%.
PERAN STRATEGIS SCRUM MASTER PADA PENGEMBANGAN PERANGKAT LUNAK PERPUSTAKAAN SEKOLAH BERBASIS ANDROID Agung Wahyudi; Sunardi Sunardi; Imam Riadi
JIPI (Jurnal Ilmiah Penelitian dan Pembelajaran Informatika) Vol 7, No 3 (2022)
Publisher : STKIP PGRI Tulungagung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29100/jipi.v7i3.2994

Abstract

Kebutuhan akan fleksibilitas dan akses yang cepat menjadikan aplikasi berbasis mobile semakin banyak digunakan, termasuk dalam bidang pendidikan dan literasi. Penelitian ini bertujuan untuk mengkaji penerapan metode Scrum dalam pengembangan perangkat lunak mobile dengan mengkaji peran strategis Scrum Master. Scrum dikenal sebagai metode pengembangan aplikasi yang dinamis dan adaptif. Adapun tahapan dalam Scrum terdiri dari fase analisis kebutuhan sistem, design sistem, pengujian sistem, dan penerimaan produk. Metode penelitian yang digunakan adalah kualitatif dengan teknik wawancara sebagai cara pengumpulan data. Hasil wawancara kemudian direduksi, dianalisis dengan analisis dari literature, kemudian disajikan, dan disimpulkan. Penelitian ini dilakukan di SMA Negeri 88 Jakarta sebagai lokasi penerapan aplikasi perpustakaan online berbasis Android. Hasil dari penelitian ini menunjukkan bahwa peran strategis Scrum Master diantaranya adalah mengelola ekspektasi roles, perubahan resistensi, menepati jadwal, permintaan perubahan yang mendesak, dan pendistribusian tim. Peran strategis ini menjadi dasar untuk penunjukan atau pemilihan Scrum Master hendaknya mempertimbangkan dan dikualifikasi berdasarkan poin-poin tersebut
Steganografi Video Digital dengan Algoritma LSB (Least Significant Bit) dan Rijndael Imam Riadi; Sunardi; Dwi Aryanto
Journal of Innovation Information Technology and Application (JINITA) Vol 2 No 2 (2020): JINITA, December 2020
Publisher : Politeknik Negeri Cilacap

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (767.109 KB) | DOI: 10.35970/jinita.v2i2.361

Abstract

Steganography is the science and art of hiding information so that confidential information cannot be known by others, except the sender and receiver. This research is designed to create a steganography system on video with mp4 format. The message is inserted in one of the video frames, first encrypted with the Rijndael algorithm. The method of inserting messages in the video frame is the Least Significant Bit (LSB) method. Extraction of frames on video using ffmpeg software. Qualitative testing used to identify changes in video frames with human senses. Quantitative testing was carried out by testing six videos with different resolutions, while there were five inserted messages with varying Byte lengths. The frame that has been inserted with a message is measured for noise with the Peak Signal to Noise Ratio (PNSR). The test results show that the LSB method cannot be used for message insertion whose Byte size is greater than the capacity of the cover video. There is a change in image quality if the size of the inserted message bytes is getting bigger.
Analisis Penggunaan Metode ACPO (Association of Chief Police Officer) pada Forensik WhatsApp Riski Yudhi Prasongko; Anton Yudhana; Imam Riadi
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 6, No 2 (2022): EDISI SEPTEMBER
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v6i2.520

Abstract

The development of smartphone technology is increasing, causing cyber crime to increase from year to year. One of the smartphone applications used by criminals is WhatsApp. The WhatsApp application is one of the most widely used insta messaging applications, especially in Indonesia. Violations such as hate speech, defamation, and fraud are common on the WhatsApp social network. This study was conducted with the aim of finding forensic evidence of cyberbullying behavior on the WhatsApp insta messaging application using the Association of Chiefs of Police (ACPO) method. This forensic phase involves planning, arresting, analyzing and presenting to search for digital evidence of cybercrimes using Belkasoft Evidence Center and HashMyFiles software. Digital evidence on smartphones can be found using case scenarios with 13 parameters that have been generated. The results of this study indicate that the Belkasoft Evidence Center digital forensic software is 81.92%, while HashMyfiles can detect the authenticity of digital evidence 79.96%.
Vigenère Cipher Algorithm Optimization for Digital Image Security using SHA512 Imam Riadi; Abdul Fadlil; Fahmi Auliya Tsani
Lontar Komputer : Jurnal Ilmiah Teknologi Informasi Vol 13 No 2 (2022): Vol. 13, No. 2 August 2022
Publisher : Institute for Research and Community Services, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24843/LKJITI.2022.v13.i02.p02

Abstract

One of the popular cryptographic algorithms is the Vigenère Cipher. This algorithm is included in classical cryptographic algorithms, so its capabilities are limited to text-type data. Through this research, this research try to modify the Vigenère Cipher so that it can be used on digital image media. The improvement is performed using ASCII code as a Vigenère table and the key generated by the SHA512 hash technique with salt. The encryption and decryption process was carried out on ten jpg and ten png files and showed a 100% success rate. Speed and memory consumption tests on the encryption process by comparing it with the AES algorithm show that AES excels in speed with 409,467 Mb/s while Vigenère wins in memory consumption by utilizing only 5,0007 Kb for every Kilobytes of the processed digital image file.
Mobile Device Security Evaluation using Reverse TCP Method Imam Riadi; Sunardi; Deco Aprilliansyah
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 7, No. 3, August 2022
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v7i3.1433

Abstract

Security evaluation on Android devices is critical so that users of the operating system are protected from malware attacks such as remote access trojans that can steal users' credential data. Remote access trojan (RAT) attacks can be anticipated by detecting vulnerabilities in applications and systems. This study simulates a remote access trojan attack by exploiting it until the Attacker gains full access to the victim's device. The episode is carried out with several steps: creating a payload, installing applications to the victim's device, connecting listeners, and performing exploits to retrieve important information on the victim's device. Test material using Android 12, problems occurred when trying to install the application because a harmful warning will appear from Play Protect due to not using the latest version of privacy protection which causes the application to be indicated as malware and the like. On Android 11, the application injected with the backdoor was successfully installed on the device and successfully accessed by the attacker. Attackers also get vital information, including system information, contacts, call logs, messages, and full access to the victim's device system directory. Based on this research, it is expected that Android device users constantly update the Android version on the device they are using.
Penerapan Algoritma K-Means pada Pengelompokan Data Pendaftar Bantuan Biaya Pendidikan Abdul Fadlil; Imam Riadi; Yana Mulyana
Jurnal Teknologi Informatika dan Komputer Vol 8, No 2 (2022): Jurnal Teknologi Informatika dan Komputer
Publisher : Universitas Mohammad Husni Thamrin

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37012/jtik.v8i2.1261

Abstract

Universitas Muhammadiyah Tasikmalaya merupakan salah satu perguruan tinggi yang mendapatkan bantuan biaya pendidikan untuk mahasiswa penerima program Kartu Indonesia Pintar Kuliah (KIP-Kuliah) disetiap tahunnya. Program ini diperuntukan bagi lulusan SMA/SMK/sederajat dari keluarga miskin/rentan miskin/afirmasi yang memiliki keinginan untuk melanjutkan belajar ke jenjang yang lebih tinggi. Hasil dari evaluasi pelaksanaan dalam penetapan data penerimaannya terdapat masalah karena data pendaftar masih banyak yang berasal dari keluarga mampu, disamping itu jumlah kuota yang diberikan oleh pemerintah sebanyak 30 kuota, jauh lebih sedikit daripada jumlah pendaftar yang berjumlah 191, sehingga harus ada metode yang dapat mengoptimalkan pengelompokan data pendaftar terlebih dahulu agar penetapan penerima bantuan biaya pendidikan KIP-Kuliah tepat sasaran. dalam penelitian ini penulis menggunakan metode Kmeans untuk pengelompokan data pendaftar dengan jumlah klaster sebanyak 3 (K=3). Hasil dari penelitian ini yaitu klaster C0 sebanyak 109 data (57,1%), klaster C1 sebanyak 52 data (27,2%), dan klaster C2 sebanyak 30 data (15,7%). Hasil dari sebaran data pada masing-masing kelompok, penulis merekomendasikan klaster C0 sebagai data kelompok yang dipertimbangkan, klaster C1 sebagai kelompok yang tidak layak dan klaster C2 sebagai kelompok yang layak mendapatkan bantuan biaya pendidikan / KIP-Kuliah.
Security on Charity Crowdfunding Services using KAMI Index 4.1 Tawar; Imam Riadi; Ariqah Adliana Siregar; Adiniah Gustika Pratiwi
Engineering Science Letter Vol. 1 No. 01 (2022): Engineering Science Letter
Publisher : The Indonesian Institute of Science and Technology Research

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (474.972 KB) | DOI: 10.56741/esl.v1i01.61

Abstract

Technological developments are multiplying. The ABC charity currently has a crowdfunding service. This service helps simplify the user management process. Security is a crucial issue to support and guarantee funders. This research aims to evaluate and provide recommendations for crowdfunding services to run safely and smoothly using the KAMI Index 4.1. This research consists of several steps, starting with observations made at charitable institutions. The following process is through focus group discussion activities to assess the level of information security of crowdfunding services. The analysis of the calculation results is used as the basis for developing recommendations. Based on the assessment results, crowdfunding services at charities obtained scores of I to I+, this indicates that the charity is still in its initial condition and has not yet implemented information security standards in managing crowdfunding services. Recommendations proposed to increase the value are carried out by compiling and implementing information security at the charity.
Co-Authors Abdul Fadlil Abdul Fadlil Abdullah Hanif Abdullah Hanif Achmad Nugrahantoro Achmad Syauqi Ade Elvina Adiniah Gustika Pratiwi Agung Wahyudi Agus Wijayanto Agus Wijayanto Ahmad Azhar Kadim Ahmad Luthfi Ahmad, Muhammad Sabri Aini, Fadhilah Dhinur Aji, Sukma Al Amany, Sarah Ulfah Anshori, Ikhwan Anton Yudahana Anton Yudhana Anton Yudhana ANWAR, FAHMI anwar, nuril Arif Wirawan Muhammad Arif Wirawan Muhammad Arif Wirawan Muhammad, Arif Wirawan Ariqah Adliana Siregar Arizona Firdonsyah Asno Azzawagama Firdaus Aulia, Aulia Aulyah Zakilah Ifani Bashor Fauzan Muthohirin Basir, Azhar Bernadisman, Dora Budin, Shiha Busthomi, Iqbal Deco Aprilliansyah Deco Aprilliansyah Dewi Astria Faroek Dewi Estri Jayanti Dikky Praseptian M Dwi Aryanto Eddy Irawan Aristianto Eko Brillianto Eko Handoyo Ervin Setyobudi Fadhilah Dhinur Aini Fadhilah Dhinur Aini Fahmi Anwar Fahmi Auliya Tsani Faiz Isnan Abdurrachman Fanani, Galih Fauzan Natsir Fauzan, Fauzan Firdonsyah, Arizona Fitriyani Tella Furizal Furizal Galih Fanani Galih Pramuja Inngam Fanani Guntur Maulana Zamroni Guntur Maulana Zamroni, Guntur Maulana Hafizh, Muhammad Nasir Hanif, Abdullah Helmiyah, Siti Herman Herman Herman Herman Yuliansyah Hidayati, Anisa Nur Himawan I Azmi Ikhsan Zuhriyanto Ikhwan Anshori Imam Mahfudl Nasrulloh Iqbal Busthomi Irhas Ainur Rafiq Irhash Ainur Rafiq Iwan Tri Riyadi Yanto, Iwan Tri Riyadi Izzan Julda D.E Purwadi Putra Jamalludin Jamalludin Jamalludin, Jamalludin Joko Triyanto Kusuma, Ridho Surya Luh Putu Ratna Sundari M Rosyidi Djou M. Rosyidi Djou M.A. Khairul Qalbi Miladiah Miladiah Miladiah, Miladiah Muflih, Ghufron Zaida Muh. Hajar Akbar Muhamad Caesar Febriansyah Putra, Muhamad Caesar Febriansyah Muhammad Abdul Aziz Muhammad Abdul Aziz Muhammad Fauzan Gustafi Muhammad Ihya Aulia Elfatiha Muhammad Irwan Syahib Muhammad Yanuar Efendi Muhammad Zulfadhilah Murni Murni Mushab Al Barra Mustafa Mustafa Mustafa Mustafa NANNY NANNY Nasrulloh, Imam Mahfudl Nur Hamida Siregar Nur Widiyasono, Nur Nuril Anwar, Nuril Panggah Widiandana Prakoso, Danar Cahyo Purwanto Purwanto Purwono Purwono, Purwono Putri Annisa Raharja, Pradana Ananda Rahmat Ardila Dwi Yulianto Ramadhani, Erika Ramansyah Ramansyah Rauli, Muhamad Ermansyah Rauli, Muhamad Ermansyah Ridho Surya Kusuma Rio Widodo Riski Yudhi Prasongko Roni Anggara Putra Rusydi Umar Rusydi Umar Rusydi Umar Ruuhwan Ruuhwan Sahiruddin Sahiruddin Shiha Budin Sri Winiarti Sri Winiati Sugandi, Andi Sunardi - Sunardi Sunardi sunardi sunardi Sunardi, Sunardi Suprihatin Suprihatin Supriyanto Supriyanto Syahrani Lonang Syarifudin, Arma Takdir Ruslan Tawar Tri Lestari Tri Lestari Tri Sudinugraha Triyanto, Joko Tuska Abe Umar, Rusdy Verry Noval Kristanto W, Yunanri Wasito Sukarno Wicaksono Yuli Sulistyo Wicaksono Yuli Sulistyo WIDODO, RIO Winiati, Sri Wisnu Pranoto Yana Mulyana Yana Safitri Yudi Kurniawan Yudi prayudi Yuliansyah, Herman Yuliansyah, Herman