Claim Missing Document
Check
Articles

Found 7 Documents
Search

PENGARUH DIMENSI TRUST, KEAMANAN DAN PRIVASI TERHADAP KEPERCAYAAN PENGGUNA UNTUK LAYANAN CLOUD COMPUTING BERBASIS SOFTWARE AS SERVICE Haryani, Prita; Nugroho, Eko; Adhipta, Dani
JURNAL TEKNOLOGI TECHNOSCIENTIA Technoscientia Vol 8 No 1 Agustus 2015
Publisher : Lembaga Penelitian & Pengabdian Kepada Masyarakat (LPPM), IST AKPRIND Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (441.726 KB) | DOI: 10.34151/technoscientia.v8i1.189

Abstract

Cloud computing is one of latest innovation in the development of Internet-based computing technology. Cloud computing uses virtualization concepts that can be accessed via Internet, so can reduce the cost of Information Technology (IT) and facilitate IT service management. Service provided is multi-tenant so computing resources can be used together and adjusted to user needs (elasticity). Software as a Service (SaaS) is cloud computing services frequenly used. Security is a major problem in the development of cloud computing technology. Guarantee of security and privacy user data, it will raise trust of users to vendor.The study aims to analyze the factors can be effected trust of cloud computing user based on Software as a Service (SaaS). Samples that used are users who have been using cloud computing services based on Software as a Service (SaaS) more than three months. Instrument used is questionnaire and measured by scale Likert. There were 50 respondent in this study. The data analysis method used is Partial Least Square. Results of the study found that factors significantly affect user trust are ability, security and privacy of vendor.
PENGARUH DIMENSI TRUST, KEAMANAN DAN PRIVASI TERHADAP KEPERCAYAAN PENGGUNA UNTUK LAYANAN CLOUD COMPUTING BERBASIS SOFTWARE AS SERVICE Haryani, Prita; Nugroho, Eko; Adhipta, Dani
JURNAL TEKNOLOGI TECHNOSCIENTIA Technoscientia Vol 8 No 1 Agustus 2015
Publisher : Lembaga Penelitian & Pengabdian Kepada Masyarakat (LPPM), IST AKPRIND Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34151/technoscientia.v8i1.189

Abstract

Cloud computing is one of latest innovation in the development of Internet-based computing technology. Cloud computing uses virtualization concepts that can be accessed via Internet, so can reduce the cost of Information Technology (IT) and facilitate IT service management. Service provided is multi-tenant so computing resources can be used together and adjusted to user needs (elasticity). Software as a Service (SaaS) is cloud computing services frequenly used. Security is a major problem in the development of cloud computing technology. Guarantee of security and privacy user data, it will raise trust of users to vendor.The study aims to analyze the factors can be effected trust of cloud computing user based on Software as a Service (SaaS). Samples that used are users who have been using cloud computing services based on Software as a Service (SaaS) more than three months. Instrument used is questionnaire and measured by scale Likert. There were 50 respondent in this study. The data analysis method used is Partial Least Square. Results of the study found that factors significantly affect user trust are ability, security and privacy of vendor.
PEMANFAATAN PENCARIAN LITERATUR KEDOKTERAN CLINICALKEY (STUDI KASUS: FAKULTAS KEDOKTERAN UNIVERSITAS KRISTEN DUTA WACANA YOGYAKARTA) Irestrina Elmiradewi; I Wayan Mustika; Dani Adhipta
Berkala Ilmiah Kedokteran Duta Wacana Vol 2, No 2 (2017): BERKALA ILMIAH KEDOKTERAN DUTA WACANA
Publisher : Faculty of Medicine Universitas Kristen Duta Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (276.547 KB) | DOI: 10.21460/bikdw.v2i2.49

Abstract

Pendahuluan: ClinicalKey merupakan salah satu mesin pencarian kesehatan yang banyak memberikan informasi kredibel mengenai e-journal, ebook, drug monographs, guidelines, patient education, multimedia, first consult, procedures consult dan lainnya. Saat ini, ClinicalKey merupakan mesin pencarian kesehatan yang dilanggan oleh Fakultas Kedokteran Universitas Kristen Duta Wacana (FK UKDW). Menurut laporan usage report tahun 2014-2015 tingkat penggunaannya sangat rendah jika dibandingan dengan Fakultas Kedokteran lain sehingga FK UKDW memutuskan untuk meningkatkan sosialisasinya. Pada penelitian ini dikaji tingkat kepuasan pengguna ClinicalKey di FK UKDW. Metode: Penelitian ini merupakan penelitian kuantitatif dengan pendekatan korelasi. Pengambilan sampel secara random dengan pengumpulan data menggunakan kuesioner, analisis data bersifat kuantitatif statistik dengan menguji hipotesis yang telah ditetapkan. Model pengukuran kepuasan pengguna menggunakan model Technology Acceptance Model (TAM) dengan teknik analisis data menggunakan Structural Equation Modeling (SEM). Hasil: Dari 200 responden mahasiswa dan dosen di FK UKDW, terdapat 56.6% pengguna merasakan kemudahan dalam menggunakan ClinicalKey, 62.5% pengguna mempercayai ClinicalKey dapat meningkatkan performa, 63.5% pengguna merasa ClinicalKey bagus, 56,5% pengguna ingin terus menggunakan ClinicalKey, 63.5% pengguna cukup sering menggunakan ClinicalKey. Pengujian hipotesis pertama PEU berpengaruh signifikan terhadap PU (β=0.785, p
Evaluasi Kematangan Investasi SI/TI Menggunakan Kerangka ITIM (Studi Kasus Universitas Negeri Manado) Alfrina Mewengkang; Lukito Edi Nugroho; Dani Adhipta
Jurnal Nasional Teknik Elektro dan Teknologi Informasi Vol 2 No 4: November 2013
Publisher : Departemen Teknik Elektro dan Teknologi Informasi, Fakultas Teknik, Universitas Gadjah Mada

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (248.291 KB)

Abstract

IT investments can be profitable and also harmfull for the organization. To get the value of information technology (IT), it takes more than just an investment but also need IT intelligence itself. One way to assure the investment done properly and provides benefits to the Universitas Negeri Manado (UNIMA) is to measure the maturity level of IT investment management. This research measures the maturity level of IS/IT investment management at UNIMA using Information Technology Investment Management (ITIM) method. ITIM is commonly used for organizational improvement by providing a roadmap that agencies can use for improving their investment management processes by describing the critical process in each stage of maturity to simplify evaluation. The results of these measurements, the maturity level of IS/IT investment management at UNIMA is at level 1. There are several key processes that are not fulfilled for entry to level 2. By knowing a picture of the IT investment management today, recommendations to improve investment management processes can be given.
Page Load Time Speed Increase on Disease Outbreak Investigation Information System Website Rahmat Oktrifianto; Dani Adhipta; Warsun Najib
IJITEE (International Journal of Information Technology and Electrical Engineering) Vol 2, No 4 (2018): December 2018
Publisher : Department of Electrical Engineering and Information Technology,Faculty of Engineering UGM

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1020.179 KB) | DOI: 10.22146/ijitee.46599

Abstract

Outbreaks or extraordinary events often become an issue that occurs in Indonesia. Therefore, an outbreak investigation information system is required to collect, manage and analyze data quickly and accurately. On the other hand, challenges in data accessing processes in certain locations are still constrained by a slow internet connection. This paper conducted speed increase of a page load or site speed time from disease outbreaks investigation information system website.Page load time speed testing was carried out using Google Chrome Developer Tools and using simulation speeds of 2.5 Mbps. Testing time was carried out by dividing the time into three sections, morning hours, working hours and night hours. Implementation of page load time increase includes reducing HTTP requests, utilizing GZIP compression, performing code minification, setting browser chache, using CDN, and using other enhancement techniques.The results showed that after implementing an increase in page load time by turning off cache and using cache, there was an increase in site speed. When the browser cache was turned off, an average page load time increased of 54.79% from the previous time. Whereas when using the browser cache, page load time speed increased by 55.28% from the previous time.
Shoulder Surfing Resistant Text Based Graphical Password Schemes Using Color Nurul Kholisatul Ulya; Lukito Edi Nugroho; Dani Adhipta
Proceeding ISETH (International Summit on Science, Technology, and Humanity) 2015: Proceeding ISETH (International Conference on Science, Technology, and Humanity)
Publisher : Universitas Muhammadiyah Surakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Password is important information to access or enter a system. Alphanumeric is a text-based password system that is commonly used. Unfortunately, many users make a weak password that is easy to guess and vulnerable to various attacks such as brute-force, dictionary attack, guessing attack and others. To create a strong password is suggested to have a lot of variety and long, but it will be difficult to remember by the user. Graphical password is an alternative method that gives usability for the user. Based on psychological research, people are generally easy to remember or recognize an images, shapes and colors rather than text. This reinforces the researchers to develop this method. The main problem of graphical password isvulnerable to shoulder surfing. In this paper will be proposed scheme as graphical password text based that are resistant to shoulder surfing attacks using color.
Meningkatkan Mekanisme Keamanan Otorisasi Port dengan Metode Simple Port Knocking Tunneling Edy Haryanto; W Widyawan; Dani Adhipta
Prosiding Konferensi Nasional Penelitian Matematika dan Pembelajarannya 2016: Prosiding Konferensi Nasional Penelitian Matematika dan Pembelajarannya
Publisher : Universitas Muhammadiyah Surakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Port knocking merupakan teknik pertahanan yang digunakan untuk mencegah penyerang melakukan scanning guna mendapatkan informasi tentang kelemahan service yang berpotensi dieksploitasi. Port knocking merupakan sebuah metode otorisasi user berdasarkan firewall untuk melakukan komunikasi melalui port yang tertutup. Akan tetapi port knocking masih memiliki beberapa kelemahan seperti TCP replay, port scanning dan lain-lain. Penelitian ini mengusulkan sebuah metode menggunakan tunneling untuk meningkatkan keamanan, dan source port sequence untuk menyederhanakan proses otorisasi port knocking yang akan menghasilkan metode Port Knocking baru yang lebih sederhana dan lebihaman