cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota semarang,
Jawa tengah
INDONESIA
JURNAL SISTEM INFORMASI BISNIS
Published by Universitas Diponegoro
ISSN : 20883587     EISSN : 25022377     DOI : -
Core Subject : Economy, Science,
JSINBIS merupakan jurnal ilmiah dalam bidang Sistem Informasi bisnis fokus pada Business Intelligence. Sistem informasi bisnis didefinisikan sebagai suatu sistem yang mengintegrasikan teknologi informasi, orang dan bisnis. SINBIS membawa fungsi bisnis bersama informasi untuk membangun saluran komunikasi yang efektif dan berguna untuk membuat keputusan yang tepat waktu dan akurat. Business intelligence sebagai dasar pengembangan dan aplikasi SINBIS menjadi kerangka kerja teknologi informasi yang sangat penting untuk membuat agar organisasi dapat mengelola, mengembangkan dan mengkomunikasikan aset dalam bentuk informasi dan pengetahuan. Dengan demikian SINBIS merupakan kerangka dasar dalam pengembangan perekonomian berbasis pengetahuan.
Arjuna Subject : -
Articles 305 Documents
Aplikasi Sistem Pakar untuk Diagnosa Penyakit Hipertiroid dengan Metode Inferensi Fuzzy Mamdani Kamsyakawuni, Ahmad; Gernowo, Rachmad; Sarwoko, Eko Adi
JSINBIS (Jurnal Sistem Informasi Bisnis) Vol 2, No 2 (2012): Volume 2 Nomor 2 Tahun 2012
Publisher : Universitas Diponegoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1022.805 KB) | DOI: 10.21456/vol2iss2pp058-066

Abstract

Medical  diagnosis  is  a  complex  issue  that  is  influenced  by  various  factors  and  settlement  involving  all  the  capabilities  of  experts, including expert intuition owned. Diagnosis of thyroid disease is difficult,  because the symptoms of thyroid disease can vary greatly, depending  on  the  ups  and  downs  of  thyroid  hormones.  This  study  applies  an  expert  system  for  diagnosis  of  hyperthyroidism  using Mamdani fuzzy inference methods. Expert system expertise needed to gain knowledge from the experts in resolving hyperthyroidism diagnosis  while  Mamdani  fuzzy  inference  is  used  for  the  processing  of  knowledge  in  order  to  obtain  the  consequence  or  conclusion which is the result of diagnosis. The process ofMamdani fuzzy inference in this study began with the formation of fuzzy set continued with the application process implications functions, then the composition rule and ending with defuzzyfication process. An expert system for the diagnosis of hyperthyroidism that has been applied with a symptom score of the input data, the results of the blood t ests TSHs level and FT4 levels, output data in the form of diagnosis, the diagnosis has been successfully  for tested the input data, with an accuracy of 95.45%.Keywords: Expert systems; Fuzzy inference Mamdani; Hyperthyroidism
Sistem Auto Recommendation Objek Wisata Menggunakan Metode SAW Murti, Alif Catur; Chamid, Ahmad Abdul
JSINBIS (Jurnal Sistem Informasi Bisnis) Vol 8, No 1 (2018): Volume 8 Nomor 1 Tahun 2018
Publisher : Universitas Diponegoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (397.406 KB) | DOI: 10.21456/vol8iss1pp9-16

Abstract

The tourism sector is a complex multidimensional sector, which has an influence over the interrelation of other sectors in tourism activities and now the tourism sector is concerned by the government. Every tourist who will visit the tourist sites must have some consideration. The fact that today is happening is a lot of tourists who are disappointed because the destination is not in accordance with what they want. Seeing that the media campaign that is currently done is still not efficient, so Auto Recommendation System is needed which is capable to do visualized in digital mapping, and the system built can show the automatic recommendation of tourist destinations in accordance with the wishes of tourists. Auto Recommendation System is a system that implements Simple Additive Weighting (SAW) method. The results of this research factors other than the value of weight given by tourists, is the value factor owned by each alternative for each criteria, because the higher the value owned by the higher the higher the value of the final ranking obtained by the alternative. The end result of the SAW method is in the form of alternative ranking of existing tourism objects. Based on the results of these rankings the system also produces output in the form of location maps along with detailed information of the tourism object. Religious tourism Sunan Kudus and Sunan Muria became the recommended tourist attraction with first and second priority.
Penilaian Risiko Aplikasi Web Menggunakan Model DREAD Suprihanto, Didit; Prahasto, Toni; Sugiharto, Aris
JSINBIS (Jurnal Sistem Informasi Bisnis) Vol 3, No 2 (2013): Volume 3 Nomor 2 Tahun 2013
Publisher : Universitas Diponegoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (352.913 KB) | DOI: 10.21456/vol3iss2pp59-66

Abstract

Application that  is developed by web based, beside has surplus in WWW technology, it has susceptibility side that can be threat too. Susceptibility generate risk and can bring out big trouble even effect big disadvantage. The goal of this research is design and build document risk assessment system of threat level and prevention advice. It use DREAD model as method to solve trouble by giving qualified information. This information are used to produce risk level in web application. The result of this research is web application risk assessment system by using DREAD model to know risk threat level and equate perception of web threat risk to application developer, minimize of threat risk and maximize performance of web application.   Keywords : DREAD model, web threat risk, web risk assessment system
Analisis Keamanan Sistem Informasi Berdasarkan Framework COBIT 5 Menggunakan Capability Maturity Model Integration (CMMI) Umar, Rusydi; Riadi, Imam; Handoyo, Eko
JSINBIS (Jurnal Sistem Informasi Bisnis) Vol 9, No 1 (2019): Volume 9 Nomor 1 Tahun 2019
Publisher : Universitas Diponegoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (4214.301 KB) | DOI: 10.21456/vol9iss1pp47-54

Abstract

Information technology is a very important part of a company or institution. The information system itself is expected to provide better benefits for companies or institutions. However, along with technological developments are often misused by some irresponsible parties that can lead to threats of the use of technology. Information system security is very important for institutions to maintain information optimally and safely. The existence of a security problem triggers a procedure to control access rights in an information system. A good information system is an information system that can be assessed at a security level, so that it can provide comfort for users. COBIT 5 as an information technology security control standard. Whereas to achieve the standard level of achievement CMMI is needed in information technology security. The combination of the two standards in the information system is able to provide a level of achievement of information technology. The results obtained from the maturity value are 4,458 which means the institutions are at the Managed and Measurable level. This level, institutions are increasingly made aware of technological developments. Institutions have implemented the quantification concept in each process, and are always monitored and controlled for performance. Information system security at this level is good, it's just that it still needs innovation and development to be ready, fast and right in handling security threats.
Review: Implementasi Holap Untuk Optimasi Query Sistem Basis Data Terdistribusi Dengan Pendekatan Algoritma Genetik Syaifudin, Rahmad; Selo, Selo; Hartanto, Rudy
JSINBIS (Jurnal Sistem Informasi Bisnis) Vol 4, No 3 (2014): Volume 4 Nomor 3 Tahun 2014
Publisher : Universitas Diponegoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (338.281 KB) | DOI: 10.21456/vol4iss3pp164-171

Abstract

Distributed Database is one of database that is under control of the Database Management System (DBMS) was focused on storage devices are separated from one and another. Optimization data query on distributed database system not be separated from data processing methods that used. Then for fast query optimization this database need some required methods that can optimize it. Hybrid online analytical processing (HOLAP) or often to call Hybrid-OLAP is one of technology for optimization query on distributed database. Genetic Algorithm is one of algorithm for heuristic searching was based on the mechanisms of biological evolution. Process of genetic algorithm is combining a selection process, using a crossover operator and mutation to get the best solution. From the reviews about implementation HOLAP with Genetic Algorithm approach was expected being used as a basis research on HOLAP implementation for query optimization on distributed database with genetic algorithm approach. Keywords : Query Optimization; Distributed database; HOLAP; OLAP; Genetetic algorithm.
Analisis Sistem Manajemen Keamanan Informasi Menggunakan ISO/IEC 27001 : 2013 Serta Rekomendasi Model Sistem Menggunakan Data Flow Diagram pada Direktorat Sistem Informasi Perguruan Tinggi Yuze, Yuni Cintia; Priyadi, Yudi; Candiwan, Candiwan
JSINBIS (Jurnal Sistem Informasi Bisnis) Vol 6, No 1 (2016): Volume 6 Nomor 1 Tahun 2016
Publisher : Universitas Diponegoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (725.713 KB) | DOI: 10.21456/vol6iss1pp38-45

Abstract

The importance of information and the possible risk of disruption, therefore the universities need to designed and implemented of the information security.  One of the standards that can be used to analyze the level of information security in the organization is ISO/IEC 27001 : 2013 and this standard has been prepared to provide requirements for establishing, implementing, maintaining and continually improving an information security management system. The objective of this research is to measure the level of information security based on standard ISO/IEC 27001: 2013 and modeling systems for information security management. This research uses descriptive qualitative approach, data collection and validation techniques with tringulasi (interview, observation and documentation). Data was analyzed using gap analysis and to measure the level of maturity this research uses SSE-CMM (Systems Security Engineering Capability Maturity Model). Based on the research results, Maturity level clause Information Security Policy reaches level 1 (Performed-Informally), clause Asset Management reaches level 3 (Well-Defined), clause Access Control reaches level 3 (Well-Defined), clause Physical and Environmental Security reaches level 3 (Well-Defined), clause Operational Security reaches level 3 (Well-Defined), Communication Security clause reaches the level 2 (Planned and Tracked). Based on the results of maturity level discovery of some weakness in asset management in implementing the policy. Therefore, the modeling system using the flow map and CD / DFD focused on Asset Management System.
The Prediction of Bandwidth On Need Computer Network Through Artificial Neural Network Method of Backpropagation Mekongga, Ikhthison; Gernowo, Rahmat; Sugiharto, Aris
JSINBIS (Jurnal Sistem Informasi Bisnis) Vol 2, No 2 (2012): Volume 2 Nomor 2 Tahun 2012
Publisher : Universitas Diponegoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (971.992 KB) | DOI: 10.21456/vol2iss2pp098-107

Abstract

The need for bandwidth has been increasing recently. This is because the development of internet infrastructure is also increasing so that we need an economic and efficient provider system. This can be achieved through good planning and a proper system. The prediction of the bandwidth consumption is one of the factors that support the planning for an efficient internet service provider system. Bandwidth consumption is predicted using ANN. ANN is an information processing system which has similar characteristics as the biologic al neural network.  ANN  is  chosen  to  predict  the  consumption  of  the  bandwidth  because  ANN  has  good  approachability  to  non-linearity.  The variable used in ANN is the historical load data. A bandwidth consumption information system was built using neural networks  with a backpropagation algorithm to make the use of bandwidth more efficient in the future both in the rental rate of the bandwidth and in the usage of the bandwidth.Keywords: Forecasting, Bandwidth, Backpropagation
Penilaian Implementasi e-Government di PUSTEKOM Kemendikbud berbasis metode PEGI Rahayu, Puji
JSINBIS (Jurnal Sistem Informasi Bisnis) Vol 7, No 2 (2017): Volume 7 Nomor 2 Tahun 2017
Publisher : Universitas Diponegoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (475.228 KB) | DOI: 10.21456/vol7iss2pp139-145

Abstract

According to the Survey UN (United Nations) in 2014, e-government and innovation can provide major opportunities to transform the public administration becomes a tool of sustainable development, provide services more transparent and more accountable. Formerly, the development of government services can be done with a variety of channels, either through online services, big data, social media, mobile applications, or cloud computing, have expanded our perception of e-government services. The research aims to assess the level of achievement of e-Government implementation in the Ministry of Education and Culture of the Republic of Indonesia. Assessment is measured by the Indonesian e-Government Rating framework. The data in this research are obtained by qualitative approach and descriptive data analysis. The finding of this research that the implementation of  e-Government in Ministry of Education and Culture in the category of "Very Good". Based on such an assessment, given the recommendation:  assemblying policies Governance of ICT, aligning the ICT Master Plan by principle of ICT Governance, fulfilling documents related to human Resources of ICT and the application documents, the standardization of domain labeling and e-education, completing information systems/ technogy of management and organizational design, assemblying the development plan of e-education content, and development plans of information system and information technology.
Teknologi Geolocation Berbasis Android dengan Metode K-Means untuk Pemetaan UMKM di Kabupaten Jepara Azizah, Noor; Widiastuti, Nur Aeni
JSINBIS (Jurnal Sistem Informasi Bisnis) Vol 8, No 2 (2018): Volume 8 Nomor 2 Tahun 2018
Publisher : Universitas Diponegoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (25.618 KB) | DOI: 10.21456/vol8iss2pp218-224

Abstract

Micro, Small and Medium Enterprises (MSMEs) are industrial sectors that are very important to sustain the economy of Jepara Regency. There are 18,695 Small and Medium Enterprises (SMEs) in Jepara Regency in 2016, including wood carving, troso weaving, chopper brass (monel) jewelry, sculpture, rattan crafts, calligraphy, and reliefs. The number of SMEs in Jepara makes buyers or tourists have many choices in buying products of varying quality and competitive prices. In addition, sometimes they are also confused in finding the location of SMEs. Therefore, this application is made to solve these problems by making an application that provides location-based information center industrial services. This application is expected to facilitate tourists in finding the location of the industry to be addressed. Geolocation technology is used to identify real-world geographic locations that can be applied to the Android operating system. So this application provides store description services, product photos, and maps. SMEs are presented in the application in the map using the k-mean algorithm. The parameters used are the type of industry, number of employees, turnover per year, tools used. For the clustering have 3 categories, there are namely small, medium and large. The advantages of this algorithm can group data according to the similarity of data used in one group and minimize the same data between groups and cannot process data that is a missing value.
Sistem Informasi Pendukung Keputusan Terhadap Mutu Lulusan dengan Metode Fuzzy Model Tsukamoto Ghozali, Ahmad Lubis; Mustafid, Mustafid; Farikhin, Farikhin
JSINBIS (Jurnal Sistem Informasi Bisnis) Vol 4, No 2 (2014): Volume 4 Nomor 2 Tahun 2014
Publisher : Universitas Diponegoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (921 KB) | DOI: 10.21456/vol4iss2pp87-95

Abstract

The importance of graduate information systems to support leadership in taking a decision related to the development of alumni, so that should make for a graduate information systems implemented in the form of web portals. Analysis of the data processed by the method of OLAP (Online Analytical Processing), KPI (Key Performance Indicators) graduates, and data mining to extract and transform data holds the data will be stored in the warehouse. The process of data analysis using OLAP and Fuzzy method to determine the parameters of the model Tsukamoto graduate performance and quality of college graduates. The process of data analysis is represented in the form of tables, graphs, and dashboards, then used as a prop for academic results. OLAP analysis result data processed using the fuzzification, inference, and defuzzification to produce quality graduates index. These findings form a web-based information systems graduate portal with content features alumni and stakeholders as a graduate performance indicators that can be accessed through an Internet connection. The information system produces graduates index KPI performance and quality of graduates graduated as a decision support by the leadership and the head of the research program carried out at the University, KPI graduates to indicate that the parameters of the specific level of quality graduates and overall views of the dimensions of the year and course of study, such as in 2011 the level of quality of graduates of IT course overall "Good", TM course as a whole "Good", TP courses overall "Good". Keywords: Information systems graduates; OLAP, KPI graduates; Tsukamoto Fuzzy Logic model

Page 5 of 31 | Total Record : 305


Filter by Year

2011 2023