cover
Contact Name
Rahmat Hidayat
Contact Email
mr.rahmat@gmail.com
Phone
-
Journal Mail Official
rahmat@pnp.ac.id
Editorial Address
-
Location
Kota padang,
Sumatera barat
INDONESIA
JOIV : International Journal on Informatics Visualization
ISSN : 25499610     EISSN : 25499904     DOI : -
Core Subject : Science,
JOIV : International Journal on Informatics Visualization is an international peer-reviewed journal dedicated to interchange for the results of high quality research in all aspect of Computer Science, Computer Engineering, Information Technology and Visualization. The journal publishes state-of-art papers in fundamental theory, experiments and simulation, as well as applications, with a systematic proposed method, sufficient review on previous works, expanded discussion and concise conclusion. As our commitment to the advancement of science and technology, the JOIV follows the open access policy that allows the published articles freely available online without any subscription.
Arjuna Subject : -
Articles 12 Documents
Search results for , issue "Vol 2, No 4-2 (2018): Cyber Security and Information Assurance" : 12 Documents clear
A Review on Cloud Computing Security Marry Teo; Hairulnizam Mahdin; Lee Jia Hwee; Haezel Ann Dicken; Tay Xin Hui; Teng Mee Ling; Mohd Sanusi Azmi
JOIV : International Journal on Informatics Visualization Vol 2, No 4-2 (2018): Cyber Security and Information Assurance
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (843.857 KB) | DOI: 10.30630/joiv.2.4-2.171

Abstract

Cloud computing is a technology that maintain the data and application by using the central remote server with the internet connection. By utilizing cloud computing, user can reduce their costs as they no need to purchase their own hardware and software. However cloud computing still has many issues concerning securities, such as privacy issues, loss of data and stolen of data. Some security issues over cloud services including confidentiality, integrity, availability, privacy and attacks are concerned by the users. This paper reviews some of the issues and its current solutions.
Blockchain-Based Electronic Voting Protocol Clement Chan Zheng Wei; Chuah Chai Wen
JOIV : International Journal on Informatics Visualization Vol 2, No 4-2 (2018): Cyber Security and Information Assurance
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1046.855 KB) | DOI: 10.30630/joiv.2.4-2.174

Abstract

Current electronic voting protocol require a centralized system to control the whole procedure from ballot inputs to result outputs and election monitoring. Meanwhile, blockchain technology provide a decentralized system which open across the whole network of untrusted participants. Applying blockchain technology into electronic voting protocol through a proper architecture can instil characteristic such as data confidentiality, data integrity and data authenticity. In this paper, we going to discuss a proposed method on how to leverage the advantages from blockchain into electronic voting protocol. This blockchain-based electronic voting protocol promise to provide a secure electronic election process given the proposed system works. We implement a protocol using blockchain to turn election protocol into an automated control system without relying any single point of entity. Lastly, we discuss the characteristics of our proposed blockchain-based electronic voting protocol in this paper. However, there are also emerging challenges and limitations awaiting to overcome. This paper gives a comprehensive overview of our proposed protocol.
Smart Indoor Home Surveillance Monitoring System Using Raspberry Pi Lee Han Keat; Chuah Chai Wen
JOIV : International Journal on Informatics Visualization Vol 2, No 4-2 (2018): Cyber Security and Information Assurance
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (3167.197 KB) | DOI: 10.30630/joiv.2.4-2.172

Abstract

Internet of Things (IoTs) are internet computing devices which are connected to everyday objects that can receive and transmit data intelligently. IoTs allow human to interact and control everyday objects wirelessly to provide more convenience in their lifestyle. The Raspberry Pi is a small, lightweight and cheap single board computer that can fit on human’s palm. Security plays a big role in a home. People concern about security by preventing any intruders to enter their home. This is to prevent loss of privacy and assets. The closed-circuit television (CCTV) is one of the device used to monitor the secured area for any intruders. The use of traditional CCTV to monitor the secured area have three limitations, which are requiring a huge volume of storage to store all the videos regardless there are intruders or not, does not notify the users immediately when there are motions detected, and users must always check the CCTV recorded videos regularly to identity any intruders. Therefore, a smart surveillance monitoring system is proposed to solve this problem by detecting intruders and capturing image of the intruder. Notifications will also be sent to the user immediately when motions are detected. This smart surveillance monitoring system only store the images of the intruders that triggered the motion sensor, making this system uses significantly less storage space. The proposed Raspberry Pi is connected with a passive infrared (PIR) motion sensor, a webcam and internet connection, the whole device can be configured to carry out the surveillance tasks. The objectives of this project are to design, implement and test the surveillance system using the Raspberry Pi. This proposed surveillance system provides the user with live stream of video feed for the user. Whenever a motion is detected by the PIR motion sensor, the web camera may capture an image of the intruder and alert the users (owners) through Short Message Service (SMS) and email notifications. The methodology used to develop this system is by using the object-oriented analysis and design (OOAD) model.
Data Model and Software Architecture for Business Process Model Generator Ivaylo Kamenarov; Katalina Grigorova
JOIV : International Journal on Informatics Visualization Vol 2, No 4-2 (2018): Cyber Security and Information Assurance
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1783.405 KB) | DOI: 10.30630/joiv.2.4-2.176

Abstract

This paper describes the internal data model for a business process generator. Business process models are stored in an Event-driven process chain notation that provides a natural way to link the individual elements of a process. There is a software architecture that makes it easy to communicate with users as well as external systems.
A Review of Live Survey Application: SurveyMonkey and SurveyGizmo Maisaarah Abd Halim; Cik Feresa Mohd Foozy; Isredza Rahmi; Aida Mustapha
JOIV : International Journal on Informatics Visualization Vol 2, No 4-2 (2018): Cyber Security and Information Assurance
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (815.835 KB) | DOI: 10.30630/joiv.2.4-2.170

Abstract

Live survey application is being used to get opinion from others. There are several types of live survey monkey that currently popular such as SurveyMonkey and Survey Gizmo. These live survey application will be compared in several types of features to identify which is suitable for education purpose. The comparison will be on the advantage and disadvantage of both applications, the security issues and solution on how to solve the issues. Three (3) phases involve in the research methodology such as searching, identify and the result of the comparison. The output of this paper is a comparison table that can be used for educational purpose.
Estimation of Danger Signs in Regional Complaint Data Yao Lin; Tsunenori Mine; Kohei Yamaguchi; Sachio Hirokawa
JOIV : International Journal on Informatics Visualization Vol 2, No 4-2 (2018): Cyber Security and Information Assurance
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1402.8 KB) | DOI: 10.30630/joiv.2.4-2.177

Abstract

Government 2.0 activities have become very attractive and popular. Using the platforms to support the activities, anyone can anytime report issues in a city on the Web and share the reports with other people. Since a variety of reports are posted, officials in the city management section have to give priorities to the reports. However, it is not easy task for the officials to judge the importance of the reports because importance judgments vary depending on the officials, and consequently the agreement rate becomes low. To remedy the low agreement rate problem of human judgment, it is necessary to create an intelligent agent which supports finding reports with high priorities. Hirokawa et al. employed the Support Vector Machine (SVM) with a word Feature Selection method (SVM+FS) to detect signs of danger from posted reports because the signs of danger is one of high priority issues to be dealt with. However they did not compare the SVM+FS method with other conventional machine learning methods and it is not clear if the SVM+FS method has better performance than the other methods. This paper explores methods for detecting the signs of danger through comprehensive experiments to develop an intelligent agent which supports officials in the city management sections. We explores conventional machine learning methods: SVM, Random Forest, Naïve Bayse using conventional word vectors, an LDA-based document vector, and word embedding by Word2Vec and compared the best method with SVM+FS. Experimental results illustrate the superiority of SVM+FS and invoke the importance of using multiple data sets when evaluating the methods of detecting signs of danger.
E-Raser: File Shredder Application With Content Replacement by Using Random Words Function Nur Farah Aqilah Mohd Nahar; Nurul Hidayah Ab Rahman; Kamarudin Malik Mohammad
JOIV : International Journal on Informatics Visualization Vol 2, No 4-2 (2018): Cyber Security and Information Assurance
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (986.311 KB) | DOI: 10.30630/joiv.2.4-2.175

Abstract

Data shredding indicates a process of irreversible file destruction while file shredder is the program designed to render computer-based files unreadable by implementing overwriting method to destroy data in the content of a file. The addressable problem with existence of file recovery tools is it may lead to data leakage, exploitation or dissemination from an unauthorized person. Thus, this study proposed a file shredding application named E-Raser which replacing the content of the file using random words function algorithm. A file shredder application named E-Raser was developed to shred Microsoft Word documents with (.doc) or (.docx) format. The implemented algorithm replaced the original content of the files with uninformative words provided by the application. After rewriting phase is complete, shredding process take place to make the file unrecoverable. Object Oriented Software Development was used as the methodology to develop this application. As a result, E-Raser achieved the objectives to add, remove, rewrite, display and shred files. Also, E-Raser is significantly facilitates users to securely dispose their file, protect the confidentiality and privacy of the file’s content.
Network Quality Assesment of Wireless Communication Based on Mobility Issue D. Mahjabeen; M. A. Rashid; S. B. Mohamed
JOIV : International Journal on Informatics Visualization Vol 2, No 4-2 (2018): Cyber Security and Information Assurance
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (900.04 KB) | DOI: 10.30630/joiv.2.4-2.178

Abstract

Up-gradation of wireless communication system is mainly based on some critical attributes like speed, coverage, interoperability, reliability, cost, security etc. This paper looks potential approaches to network quality analysis based on mobility. In this paper, focus is given to determine handover latency, vital property of mobility. This paper presents simulation to investigate handover effects-handover latency in homogeneous and heterogeneous environment using network simulator NCTUns 6.0 and simulator version 2 (NS-2) respectively for different generations of wireless communication. Also simulation is performed to find out the handover latency with respect to mobile node’s speed and then the results are compared with each other for performance analysis. The obtained results show that advanced generations of wireless communication provides low handover latency as well as higher mobility support which leads to better network performance and seamless connectivity.
Radio Frequency Identification (RFID) Based Car Parking System Muhammad Syamil Mazlan; Isredza Rahmi A Hamid; Hazalila Kamaludin
JOIV : International Journal on Informatics Visualization Vol 2, No 4-2 (2018): Cyber Security and Information Assurance
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1268.221 KB) | DOI: 10.30630/joiv.2.4-2.173

Abstract

Radio Frequency Identification (RFID) technology is widely used in various applications such as attendance system, tracking system, monitoring system or parking system. Currently, the existing parking system used manual entrance through security guard to access the premise. Therefore, the company need to hire security guard to monitor the premise. In addition, the security guards need to monitor all movement of vehicle or person that enter or leave the premise. As a result, unauthorized vehicle or person can easily access the building. To address this problem, we proposed a parking system using RFID technology that can monitor vehicle’s movement that enter or leave the specific area or place by scanning the RFID tag. The potential benefit is it can improve security for both security guards and users. Besides that, this parking system can facilitate access control for users and improve traffic flow during peaks period. There are five modules in the proposed parking systems which are user registration, vehicle registration, RFID tag, staff and report generation. 
A Paradigm Shift on the role of CIO’s in Cloud and IOT based Organizations Jipson George Thoomkuzhy; Mohammed Nazeh
JOIV : International Journal on Informatics Visualization Vol 2, No 4-2 (2018): Cyber Security and Information Assurance
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (965.24 KB) | DOI: 10.30630/joiv.2.4-2.187

Abstract

Cloud computing and IOT has transformed the way organizations across industries work. This review paper researched the role of the global CIO regarding their key employment capacities and their basic abilities and competencies which are required all together for a CIO to accomplish unrivaled hierarchical execution of the future business condition. The discoveries of this review will give insight to five key employment capacities and the basic competencies which we accept are fundamental to the role of the global CIO in the present and future business condition. The discoveries will additionally show that the global CIO role is winding up progressively and is key in driving development, hierarchical change and technological change. Consequently, the global CIO should be a visionary vital leader with eminent relational abilities and business keenness and the capacity to team up evenly over the central business capacities and with key business accomplices.About Six CIO interviews directed by the CIO Executive Council were investigated and reviewed as far as past journals which had recognized various key employment capacities and basic abilities and competencies for the role of a global CIO.The role of the Chief Information officer (CIO) has turned out to be progressively testing and mind-boggling as data correspondences innovation has turned out to be essential for most organizations. To date, there has been little research which has exactly inspected the roles and the basic competencies of the global CIO. An online overview of CIOs affirmed the significance of CIO competencies and highlighted the basic ones. An arrangement of the basic competencies of CIOs was analyzed in this review.The key discoveries demonstrate that the role of the global CIOs has progressed toward becoming progressively business engaged and vital in cloud and IOT based organizations. Eventually, how a CIO leads and deals with his/her ICT staff will enormously impact how effective a CIO is in the role. Be that as it may, the CIO still requires the knowledge of key innovation skills so, individual information or access to additional abilities is also essential in their role

Page 1 of 2 | Total Record : 12