cover
Contact Name
Mira Maisura
Contact Email
jurnal.cyberspace@ar-raniry.ac.id
Phone
-
Journal Mail Official
jurnal.cyberspace@ar-raniry.ac.id
Editorial Address
Information Technology Education (PTI) Department administration office, Faculty of Education and Teacher Training (FTK) Building B 1st Floor, Ar-Raniry State Islamic University, Darussalam, Banda Aceh, 23111.
Location
Kota banda aceh,
Aceh
INDONESIA
Cyberspace: Jurnal Pendidikan Teknologi Informasi
ISSN : 25982079     EISSN : 25979671     DOI : -
Core Subject : Science, Education,
Cyberspace: Jurnal Pendidikan Teknologi Informasi is an open access, peer-reviewed journal that will consider any original scientific article that expands the field of information technology education and various other related applied computer sciences themes. The journal publishes articles of interest to Information technology teachers, researchers and practitioners. Manuscripts must be original and educationally interesting to the audience in the field. The goal is to promote concepts and ideas developed in this area of study by publishing relevant peer-reviewed scientific information and discussion. This will help information technology practitioners to advance their knowledge for greater benefit and output in their professional contexts.
Articles 86 Documents
PENERAPANA METODE NATIONAL INSTITUTE OF STANDARS AND TECHNOLOGY (NIST) DALAM ANALISIS FORENSIK DIGITAL UNTUK PENANGANAN CYBER CRIME Mulia Fitriana; Khairan AR AR; Jiwa Malem Marsya
CYBERSPACE: Jurnal Pendidikan Teknologi Informasi Vol 4, No 1 (2020)
Publisher : UIN Ar-Raniry

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (401.858 KB) | DOI: 10.22373/cj.v4i1.7241

Abstract

The development of technology is currently developing very quickly, this is directly proportional to releasing cyber crime. One crime that often occurs is the case of Pornography. This application is done using one of the very popular Instant Messenger (IM) applications, the WhatsApp application. But after the crime is committed next or sending evidence in the form of conversations, video recordings, images and others committed by the suspect using the WhatsApp application. Therefore, this study proposes to find evidence related to digital pornography. This research produced a forensic procedure in conducting an investigation of the WhatsApp application to obtain previously published evidence containing a conversation session, a list of contact numbers, a profile photo of the victim and others. This research was conducted by reading a backup file of the encrypted WhatsApp application database that stores the conversation session that has been released. This research uses the method (National Institute of Standards and Technology (NIST). This digital evidence can be obtained using one of the forensic tools namely WhtasApp Viewer. The results obtained in this study contain WhatsApp contents that have been available which can be found digitally in uncovering the crime of pornography that is happen.
ANALISA PROSES MIGRASI MYSQL NON-CLUSTER KE CLUSTER DALAM MENANGANI FAIL-OVER SISTEM AKADEMIK UNIVERSITAS SYIAH KUALA Alim Misbullah; Nazaruddin Nazaruddin; Rasudin Rasudin; Zulfan Zulfan
CYBERSPACE: Jurnal Pendidikan Teknologi Informasi Vol 4, No 1 (2020)
Publisher : UIN Ar-Raniry

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (525.299 KB) | DOI: 10.22373/cj.v4i1.7246

Abstract

Jumlah data akademik yang terus meningkat pada institusi perguruan tinggi perlu dikelola dengan efektif sehingga pengaksesan data melalui sistem informasi akademik menjadi lebih mudah dan cepat. Salah satu teknologi Database Management System (DBMS) yang masih sering digunakan pada institusi perguruan tinggi adalah MySQL. Umumnya, aplikasi MySQL yang digunakan untuk memproses query dari pengguna masih bersifat tunggal pada sebuah server sehingga overload akses pada waktu tertentu dapat menyebabkan sistem informasi menjadi tidak stabil bahkan sering mengalami timeout. Penelitian ini bertujuan untuk menganalisa proses migrasi MySQL non-cluster ke MySQL cluster dalam menangani fail-over sistem akademik. Hasil penelitian yang diperoleh yaitu berupa dokumen konfigurasi yang tepat pada MySQL cluster sehingga dapat digunakan secara umum pada berbagai MySQL server. Selain itu, load-balancing juga diuji dalam penelitian ini untuk mendistribusikan request antara MySQL server.
OVERVIEW OF PIRATED SOFTWARE ON CAMPUS: EDUCATORS' PERSPECTIVE Basrul Abdul Majid; Hendri Ahmadian
CYBERSPACE: Jurnal Pendidikan Teknologi Informasi Vol 4, No 2 (2020)
Publisher : UIN Ar-Raniry

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (586.291 KB) | DOI: 10.22373/cj.v4i2.7717

Abstract

This research was conducted in order to get an overview from the teaching staff on pirated software. The results acquired were an overview about pirated software, the use of pirated software, the price and willingness to switch to original software. In general, the perception of respondents stated that they knew about pirated software (66.67%), those who did not know (28.07%) and a small proportion were still in doubt (5.26%) regarding this matter. However, almost half of the respondents said that they did not know that the laptop used pirated software (49.12%) and those who knew about it are 21.05%. Small proportion of respondents (19.82%) are still in doubt whether their laptop uses pirated software or not. Respondents who agree (62.28%) original software is expensive, are willing to buy (72.81%) do not want to buy and are hesitant (20.18%). Respondents who disagreed (17.54%) original software was expensive, hesitant to obtain it legally (7.02%). The use of pirated software takes other people's rights (77.19%) and also violates the Copyright Law (79.82%) and disagrees (12.28%) on this. Respondents who were still in doubt were 10.53% and 7.89%. Respondents want to switch (72.81%), not willing (7.02%). The hesitation to move is 20.18%. Only a small proportion (27.19%) of respondents who do not know where to buy it, those who know (41.23%). Not sure where to get it (31.58%).
THE DEVELOPMENT OF E-MODULES PROBLEM BASED LEARNING USING GOOLE CLASSROOM FOR BASIC ELECTRICITY AND ELECTRONICS AT VOCATIONAL SCHOOL Hengraini Eka Putri; Usmeldi Usmeldi
CYBERSPACE: Jurnal Pendidikan Teknologi Informasi Vol 4, No 2 (2020)
Publisher : UIN Ar-Raniry

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (757.253 KB) | DOI: 10.22373/cj.v4i2.7861

Abstract

The purpose of this research is to produce a valid e-modules problem based learning using Google Classroom practical, and effective in basic electricity and electronics subjects. This e-modules problem based learning using Google Classroom is designed to improve student’s understanding so that it can improve students learning outcomes. The method in this study uses Research and Development (R&D) with 4-D development procedures (Define, Design, Develop, Desseminate). The data of analysis technique uses descriptive analysis techniques to describe the validity, practicality, and effectiveness of e-modules problem based learning using Google Classroom. The results obtained of this development research: The validity of e-modules problem based learning using Google Classroom is declared valid on the media and material aspects. The practicality of e-modules problem based learning using Google Classroom from teacher and student responses is stated to be very practical. The effectiveness of e-modules problem based learning using Google Classroom is stated to be effective in improve to learn the outcomes. Based on the findings of this study it is concluded that the e-modules problem based learning using Google Classroom is valid, practical, and effective to be used as a learning aid in basic electricity and electronics subjects.
DESIGNING SCHOOL INFORMATION SYSTEM OF GUPPI GALAWATI SENIOR HIGH SCHOOL IN SORONG REGENCY Iriene Surya Rajagukguk; Dewi Astuti
CYBERSPACE: Jurnal Pendidikan Teknologi Informasi Vol 5, No 1 (2021)
Publisher : UIN Ar-Raniry

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1053.983 KB) | DOI: 10.22373/cj.v5i1.7852

Abstract

At present the school is trying to become an educational institution that is able to serve the community in the delivery of information, one of which is the GUPPI Salawati High School, Sorong Regency. So far, the information about school information is still done manually by using banners, brochures and the latest information is still posted on the announcement board, even having to come directly to the school to get information. The method used in the development and design of this system is the Waterfall Method. The purpose of designing this information system is to facilitate those who need information about Salawati GUPPI high school.
REPLICATION OF COMPARATIVE METHODS FOR SINGLE DATABASE PERFORMANCE IN CENTOS OPERATION SYSTEM WITH MAXSCALE Merinda Lestandy; Mochammad Arif Hidayatullah; Amrul Faruq; Machmud Effendy; Muhammad Irfan
CYBERSPACE: Jurnal Pendidikan Teknologi Informasi Vol 4, No 2 (2020)
Publisher : UIN Ar-Raniry

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (723.844 KB) | DOI: 10.22373/cj.v4i2.7753

Abstract

Processing data in an institution or organization has become an activity or routine for each meeting. In processing data, of course there are various kinds of problems, ranging from missing data, either because of an error in entering data or the result of a system failure. To overcome these problems, in an agency or company must have data backup, so as to create problems that occur in the data, the institution still has data backup. To call, another method of database replication is used. From the test results obtained data on the value of RTA (Round Trip Average) that is the time required for one time sending and receiving data from the replication database is 5426.22 ms and for compilation service diagrams a query attack occurs with a percentage of 29% in the database applications that produce 1774.45 ms results and for service diagrams at a query attack percentage of 29% a single database estimates the server down.
DESIGN AND IMPLEMENTATION OF WEB SERVICES FOR THE INTEGRATION OF INFORMATION SYSTEMS FOR THE DISTRIBUTION OF COVID-19 CASES Ridwan Ridwan; Mira Maisura
CYBERSPACE: Jurnal Pendidikan Teknologi Informasi Vol 4, No 2 (2020)
Publisher : UIN Ar-Raniry

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1019.539 KB) | DOI: 10.22373/cj.v4i2.7936

Abstract

Several terms are used by the Government to collect data on the spread of covid-19's cases, namely People Under Surveillance (ODP), Patients Under Supervision (PDP), dead and positively infected. The Aceh government provides information on the spread of the covid-19 case through the official website media. Data of the cases are displayed daily based on the reports from districts / cities. District / city governments provide information based on reports from hospitals, health centers and from existing posts in each village. The unavailability of a data collection information system that can be used jointly in recording the spread of Covid-19 cases can lead to data duplication, because data collection is carried out according to individual needs. To overcome this problem, it is necessary to design and build a dissemination information system that can be used jointly between the village posts, sub-district offices, community health center (puskesmas) and hospitals. This research produces a website-based information system prototype for data collection on the spread of Covid-19 cases and API data services in the form of REST web services. Web Services are built using REST web services that generate request and response data using the JSON data format. The web services built can be used for integration with district / city and provincial government information systems, so that data changes can occur in real time.
SAFE ROUTING MODEL AND BALANCED LOAD MODEL FOR WIRELESS SENSOR NETWORK Julianto Agus Prabowo; Harry Dhika
CYBERSPACE: Jurnal Pendidikan Teknologi Informasi Vol 5, No 1 (2021)
Publisher : UIN Ar-Raniry

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (937.733 KB) | DOI: 10.22373/cj.v5i1.8420

Abstract

Wireless Sensor Networks (WSNs) play a very important role in providing realtime data access for Big Data and Internet. However, the open deployment, energy constraint, and lack of centralized administration make WSNs very vulnerable to various kinds of malicious attacks. In WSNs identifying malicious sensor devices and eliminating their sensed information plays a very important role for mission critical applications. Standard cryptography and authentication schemes cannot be directly used in WSNs because of the resource constraint nature of sensor devices. Thus, energy efficient and low latency methodology is required for minimizing the impact of malicious sensor devices. This paper presents a Secure and Load Balanced Routing (SLBR) scheme for heterogeneous clustered based WSNs. SLBR presents a better trust-based security metric that overcomes the problem when sensors keep oscillating from good to bad state and vice versa, and also SLBR balances load among CH. Thus, aids in achieving better security, packet transmission, and energy efficiency performance. Experiments are conducted to evaluate the performance of proposed SLBR model over existing trust-based routing model namely Exponential Cat Swarm Optimization (ECSO). The result attained shows SLBR model attains better performance than ECSO in terms of energy efficiency (i.e., network lifetime considering first sensor device death and total sensor device death), communication overhead, throughput, packet processing latency, malicious sensor device misclassification rate and identification.
THE DEVELOPMENT OF WEB BASED LEARNING MEDIA NETWORK AND COMPUTER BASIC AT SMK NEGERI 1 LEMBAH MELINTANG Fauzi Fauzi; Hasan Maksum
CYBERSPACE: Jurnal Pendidikan Teknologi Informasi Vol 4, No 2 (2020)
Publisher : UIN Ar-Raniry

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (832.193 KB) | DOI: 10.22373/cj.v4i2.7797

Abstract

The purpose of this research is to produce a valid web-based learning media, practical, and effective in basic computer and networking subjects. This web-based learning media is designed to improve student’s understanding so that it can improve to learn the outcomes. The method in this study uses Research and Development (R and D) with 4-D development procedures (Define, Design, Develop, Desseminate). The data of analysis technique uses descriptive analysis techniques to describe the validity, practicality, and effectiveness of web-based learning media. The results obtained of this development research: The validity of web-based learning media is declared valid on the media and material aspects. The practicality of web-based learning media from teacher and student responses is stated to be very practical. The effectiveness of web-based learning media is stated to be effective in improve to learn the outcomes. Based on the findings of this study it is concluded that the web-based learning media is valid, practical, and effective to be used as a learning aid in basic computer and network subjects.
THE PHENOMENON OF GOOGLE EFFECT, DIGITAL AMNESIA AND NOMOPHOBIA IN ACADEMIC PERSPECTIVE Nazaruddin Musa; Mohd Sobhi Ishak
CYBERSPACE: Jurnal Pendidikan Teknologi Informasi Vol 5, No 1 (2021)
Publisher : UIN Ar-Raniry

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1490.397 KB) | DOI: 10.22373/cj.v5i1.8219

Abstract

This study aims to determine the behavior and perceptions of students about Google Effect, Digital Amnesia, and Nomophobia syndromes, among students. For this purpose, a quantitative approach is used through an online survey method using Google Form. The number of samples is 110 out of a total population of 636 students of Library and Information Science of UIN Ar-Raniry Banda Aceh. Samples were taken randomly for 5 days. The results are as follows; 84.5 % of students have used smartphones as a reminder, 70.9 % used as their external memory. Meanwhile, 73.6 % feel confused by information overload,78.9 % feel annoyed by hyperlinks, 51 % feel more motivated to answer questions,59 % feel more confident in discussing new things when a smartphone in hand, 78,2 % said that a smartphone can help in understanding the material being taught. In terms of perception, students stated that nomophobia, digital amnesia, and the Google effect are common phenomena in the digital age, 59.1 %, 88.1 %, and 69.1 % respectively. Based on the findings, it is recommended that longitudinal research is needed to examine the long-term effects of this phenomenon to find out whether the high dependence on smart technology will strengthen or weaken the human brain's ability to think and take action independently since it is rarely activated?.