Claim Missing Document
Check
Articles

Found 13 Documents
Search

Pengembangan DeanLEP Application pada Fakultas Sains dan Teknologi UIN Ar-Raniry Banda Aceh Dwitawati, Ima
CIRCUIT: Jurnal Ilmiah Pendidikan Teknik Elektro Vol 2, No 2 (2018): Edisi Agustus 2018
Publisher : PTE FTK UIN Ar-Raniry

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The existence of digital technology should be able to provide a positive and productive impact, rather than the passive and negative one. Technology is enabler that facilitates ubiquitous all human activities both for personal gains and for the public and professional interests. This study aims to develop the DeanLEP application of the Faculty of Science and Technology of UIN Ar-Raniry Banda Aceh. DeanLEP is an acronym for Dean Live Event Page Application that is used to assist the dean in monitoring all daily activities and performance in the faculty. Dean LEP Application contains information about the number of lecturers who teach in the current semester and academic year; recapitulation of active students, on leave students and alumni; lecturers research, lecturers ranks, employee permits and leave, study center, lecturers with additional assignments, guest lecturers and guest lectures, womens activities, and cooperatives. In addition to dynamic information updated at any time, Dean LEP Application also provides static information such as information on leaders, lecturers, staff, and contract workers of the faculty.
Pengembangan DeanLEP Application pada Fakultas Sains dan Teknologi UIN Ar-Raniry Banda Aceh Ima Dwitawati
CIRCUIT: Jurnal Ilmiah Pendidikan Teknik Elektro Vol 2, No 2 (2018)
Publisher : PTE FTK UIN Ar-Raniry

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22373/crc.v2i2.3702

Abstract

The existence of digital technology should be able to provide a positive and productive impact, rather than the passive and negative one. Technology is enabler that facilitates ubiquitous all human activities both for personal gains and for the public and professional interests. This study aims to develop the DeanLEP application of the Faculty of Science and Technology of UIN Ar-Raniry Banda Aceh. DeanLEP is an acronym for Dean Live Event Page Application that is used to assist the dean in monitoring all daily activities and performance in the faculty. Dean LEP Application contains information about the number of lecturers who teach in the current semester and academic year; recapitulation of active students, on leave students and alumni; lecturers' research, lecturers' ranks, employee permits and leave, study center, lecturers with additional assignments, guest lecturers and guest lectures, women's activities, and cooperatives. In addition to dynamic information updated at any time, Dean LEP Application also provides static information such as information on leaders, lecturers, staff, and contract workers of the faculty.
E-Human Resource Management Thought And Words - In The Human, Organization, Communication, and Technology Ima Dwitawati
Elkawnie: Journal of Islamic Science and Technology Vol 3, No 1 (2017)
Publisher : Universitas Islam Negeri Ar-Raniry Banda Aceh

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22373/ekw.v3i1.2747

Abstract

Human resource factor is a mainly asset in the enterprise, because it has a unique characteristic and will not easy to imitated by the competitor. To make a well management of human resource process and its development in the enterprise is important. Together with the coming of information era, then the utilization of information technology to manage and develop the human resource is really necessary. Its means the human resources which managed traditionally would be change by manage it electronically. In the other word, the term of human resource management (HRM) changed by electronic human resource management (e-HRM). Certainly, to develop and manage e-HRM continuously is not easy without the consideration of such factors that exist within it as: human, organization, communication, and technology factors. Therefore, in this article explained such factor that will encourage these four factors in e-HRM practice, with the result is the e-HRM well management, and finally will increase the human resource development in the enterprise. After the consideration of human, organization, communication and technology factor, then continue by analyzed ten of social theory and used it to encourage the e-HRM development perfectly, where the utilization of each social theory is adjusted with appropriate factor only. The social theories that used in this article are: 1) Attribution theory, 2) Act* theory, 3) Argumentation theory, 4) Contagion theory, 5) Cognitive dissonance theory, 6) Agenda setting theory, 7) Absorptive capacity theory, 8) Actor network theory, 9) Adaptive structuration theory, and 10) Administrative behavior theory. Furthermore, the last part of this article is an explanation of human, organization, ommunication, and technology factor, and how to make each factor will give an effective function in e-HRM practice by using the social theory style in order the development of e-HRM more effective, efficient, and increase continuously.
IMPLEMENTASI SISTEM INFORMASI PENDUKUNG AKREDITASI BERBASIS WEB PADA PRODI TEKNOLOGI INFORMASI UIN AR-RANIRY Hendri Ahmadian; Ima Dwitawati; Malahayati Malahayati
CYBERSPACE: Jurnal Pendidikan Teknologi Informasi Vol 3, No 2 (2019)
Publisher : UIN Ar-Raniry

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (326.148 KB) | DOI: 10.22373/cj.v3i2.6309

Abstract

The supporting documents for accreditation forms are the most important part in the accreditation submission process. Otherwise the process of finding and collecting documents supporting accreditation forms are still done manually. This study aims to design the information systems which supports web-based accreditation in Department of Information Technology  UIN Ar-Raniry. The designing process refered to regulation of National Accreditation Board for Higher Education and followed the latest instrument in 4.0 version. The application has namely SIDASI 4.0. The research method of this study is the Rapid Application Development (RAD) process which uses the PHP programming language and MYSQL as database engine. SIDASI 4.0 can only be accessed by users who have already registered and obtained an account as username and password. The SIDASI 4.0 have support the accreditation submission phase as the digital documentation forms.
IMPLEMENTASI ALGORITMA NAIVE BAYES DAN RANDOM FOREST DALAM MEMPREDIKSI PRESTASI AKADEMIK MAHASISWA UNIVERSITAS ISLAM NEGERI AR-RANIRY BANDA ACEH Bustami Yusuf; Muthmainna Qalbi; Basrul Basrul; Ima Dwitawati; Malahayati Malahayati; Mega Ellyadi
CYBERSPACE: Jurnal Pendidikan Teknologi Informasi Vol 4, No 1 (2020)
Publisher : UIN Ar-Raniry

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (231.132 KB) | DOI: 10.22373/cj.v4i1.7247

Abstract

Academic achievement is determined by two factors, namely internal factors originating from within the individual in this case students and external factors that come from outside the individual or things that are influenced by the environment. There are many ways to find an academic achievement, one of which uses data mining which aims to predict or classify data using a classification algorithm. This study aims to 1) find out how to apply the Naive Bayes algorithm to student achievement, and 2) see the accuracy of the Naive Bayes algorithm to student achievement. This type of research is secondary data in the form of student data obtained from the information technology center and the Ar-Raniry UIN database. This research uses Naive Bayes algorithm and random forest algorithm. The results obtained from this study indicate the highest correlation value in the initial IP variable of r = 0.783 and the leave variable has a very weak correlation level of r = 0.054. The accuracy value of Naive Bayes algorithm after cleaning is 78.0% and Random Forest algorithm variable is 76.7%.
Analisis Teknik Penyerangan Phishing Pada Social Engineering Terhadap Keamanan Informasi di Media Sosial Profesional Menggunakan Kombinasi Black Eye dan Setoolkit Sri Wahyuni; Irfan Murti Raazi; Ima Dwitawati
Jurnal Nasional Komputasi dan Teknologi Informasi (JNKTI) Vol 5, No 1 (2022): Februari 2022
Publisher : Program Studi Teknik Informatika, Fakultas Teknik. Universitas Serambi Mekkah

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32672/jnkti.v5i1.3962

Abstract

Abstrak - Di era teknologi yang kian maju dan berkembang luas seperti sekarang ini, informasi merupakan aset yang sangat perlu dilindungi oleh suatu organisai ataupun individu, informasi yang bersifat privasi penting untuk dilindungi agar tidak dapat diakses oleh pihak yang tidak berwenang. Penyerangan social engineering hingga saat ini masih terus meningkat, hal ini terjadi karena pelaku mengetahui bahwa rantai terlemah pada sistem keamanan jaringan itu sendiri ialah pengguna, sehingga perancangan sistem keamanan yang baik harus disertai pemahaman tentang penyerangan dan ancaman oleh pengguna itu sendiri. Adapun tujuan penulisan artikel ini untuk dapat menjelaskan teknik penyerangan dengan memanfaatkan manipulasi psikologis yang dilakukan berdasarkan bagaimana cara korban berpikir dan bertindak. Teknik penyerangan phishing email spoofing adalah salah satu jenis penyerangan social engineering yang dilakukan dengan menggabungkan black eye dan setoolkit. Sehingga dapat memberikan informasi terkait dalam mengambil tindakan dalam melakukan suatu hal tentang social engineering dan acamannya.Kata kunci : Social engginering, Phishing, Email Spoofing, Black Eye, Setoolkit Abstract - In the era of increasingly advanced and widespread technology as it is today, information is an asset that really needs to be protected by an organization or individual, information that is privacy is important to protect so that it cannot be accessed by unauthorized parties. Social engineering attacks are still increasing, this happens because the hacker know that the weakest chain in the network security system itself is the user, so that a good security system design must be accompanied by an understanding of attacks and threats by the users themselves. The purpose of writing this article is to be able to explain attack techniques by utilizing psychological manipulation that is carried out based on how the victim thinks and acts. Email spoofing phishing attack technique is one type of social engineering attack that is carried out by combining black eye and setoolkit. So that it can provide information related to taking action in doing something about social engineering and its threats.Keywords : Social engginering, Phishing, Email Spoofing, Black Eye, Setoolkit
Analisis Tentang Publikasi Ilmiah Bidang Teknologi Informasi dan Islam Ima Dwitawati; Aulia Sabri
JINTECH: Journal Of Information Technology Vol 1 No 2 (2020): Agustus 2020
Publisher : Prodi Teknologi Informasi UIN Ar-Raniry Bekerjasama dengan Pusat Penelitian dan Penerbitan LP2M Universitas Islam Negeri Ar-Raniry Banda Aceh

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (394.555 KB) | DOI: 10.22373/jintech.v1i2.594

Abstract

Penelitian ini merupakan penelitian yang difokuskan untuk menganalisis kajian ilmiah bidang teknologi informasi dan islam. Islam merupakan agama yang menyeluruh yang merupakan pedoman bagi muslim dalam menjalankan kehidupannya di muka bumi ini. Perkembangan teknologi informasi yang sangat pesat ditandai dengan dihasilkannya sejumlah penelitian dan publikasi ilmiah dalam bidang teknologi informasi dari berbagai sudut pandang dan merupakan hasil penelitian mandiri hanya bidang teknologi informasi saja maupun lintas disiplin ilmu. Namun demikian, ditemukan bahwa penelitian bidang teknologi informasi yang berkaitan dengan islam masih sulit untuk dikenali dan memerlukan upaya penelurusan lebih lanjut. Penelitian ini dihasilkan untuk menelusuri kajian dan publikasi ilmiah teknologi informasi dan islam. Hasilnya menunjukkan bahwa tema kajian ilmiah teknologi informasi dan islam ditemukan dalam sudut pandang yang beragam dan pemanfaatannya juga meliputi segala sisi profesional dan personal muslim. Dalam penelitian ini ditemukan 10 (sepuluh) kajian ilmiah yang memuat tema teknologi informasi dan islam.
Eksplorasi tentang Aplikasi Digital untuk Muslim Ima Dwitawati
JINTECH: Journal Of Information Technology Vol 2 No 2 (2021): Agustus 2021
Publisher : Prodi Teknologi Informasi UIN Ar-Raniry Bekerjasama dengan Pusat Penelitian dan Penerbitan LP2M Universitas Islam Negeri Ar-Raniry Banda Aceh

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (737.979 KB) | DOI: 10.22373/jintech.v2i2.1249

Abstract

Penelitian ini mengeksplorasi aplikasi yang tersedia pada Playstore dan juga Appstore yang berfungsi dalam memudahkan muslim dalam menjalankan kehidupan dan ibadahnya. Penelurusan aplikasi-aplikasi tersebut terdiri dari Qur’an digital, kiblat dan jadwal shalat, hadits digital, zakat, dan juga zikir dan do’a. Metode yang digunakan berupa studi literatur terhadap aplikasi-aplikasi tersebut berdasarkan jenis di atas. Selanjutnya, dilakukan inventarisasi nama aplikasi, kategori, jumlah unduh dan juga fitur yang tersedia. Hasil dari penelitian ini adalah sajian informasi tentang aplikasi-aplikasi digital dalam enam kategori di atas yang disertai dengan fitur lengkap dan juga kinerjanya berdasarkan jumlah unduh terbanyak. Ditemukan bahwa jumlah unduh terbanyak disebabkan oleh tersedianya kelengkapan fitur yang terdapat pada aplikasi-aplikasi yang ada.
COMPUTER-MEDIATED COMMUNICATION, ORGANIZATIONAL STRUCTURE AND CLIMATE TO INCREASE COMMITMENT IN KNOWLEDGE SHARING PROCESS: A RESEARCH FRAMEWORK ima dwitawati
JINTECH: Journal Of Information Technology Vol 2 No 1 (2021): Februari 2021
Publisher : Prodi Teknologi Informasi UIN Ar-Raniry Bekerjasama dengan Pusat Penelitian dan Penerbitan LP2M Universitas Islam Negeri Ar-Raniry Banda Aceh

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (748.63 KB) | DOI: 10.22373/jintech.v2i1.1479

Abstract

This research presented a research framework to study the computer mediated communication, organizational structure and climate to growth effective commitment as an attitude in knowledge sharing process. Its starting by the exploration of organization commitment and importance, following by putting the computer mediated communication, organizational structure, and climate and put this three components as independent variable. Then, continue by exploring the dependent variable in this research is organizational commitment in knowledge sharing process. The result is a research framework of this area which can be used to explore an actual case in an organization in various industries.
IMPLEMENTASI GAP ANALISIS DARI SISTEM PEMERINTAHAN BERBASIS ELEKTRONIK (SPBE) PADA KABUPATEN BENER MERIAH ima dwitawati
JINTECH: Journal Of Information Technology Vol 3 No 1 (2022): Februari 2022
Publisher : Prodi Teknologi Informasi UIN Ar-Raniry Bekerjasama dengan Pusat Penelitian dan Penerbitan LP2M Universitas Islam Negeri Ar-Raniry Banda Aceh

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (983.769 KB) | DOI: 10.22373/jintech.v3i1.1552

Abstract

This study presents a gap analysis of the implementation of Electronic-Based Government System (SPBE) in Bener Meriah Regency in 2021. The Gap Analysis was compiled based on the secondary data collection process in the form of the maturity level of the SPBE in Bener Meriah Regency which consists of the domains of policy, governance, management and SPBE services. The result of this research is a gap analysis which consists of a description of the area being analyzed, identification of the specific parts to be improved from the SPBE, the target achievement (desired state), the current state and an action plan based on the identification of the maturity level of SPBE process capabilities and technical functions