cover
Contact Name
Muhammad Taufiq Nuruzzaman
Contact Email
m.taufiq@uin-suka.ac.id
Phone
+6287708181179
Journal Mail Official
jiska@uin-suka.ac.id
Editorial Address
Teknik Informatika, Fak. Sains dan Teknologi, UIN Sunan Kalijaga Jln. Marsda Adisucipto No 1 55281 Yogyakarta
Location
Kab. sleman,
Daerah istimewa yogyakarta
INDONESIA
JISKa (Jurnal Informatika Sunan Kalijaga)
ISSN : 25275836     EISSN : 25280074     DOI : -
JISKa (Jurnal Informatika Sunan Kalijaga) adalah jurnal yang mencoba untuk mempelajari dan mengembangkan konsep Integrasi dan Interkoneksi Agama dan Informatika yang diterbitkan oleh Departemen Teknik Informasi UIN Sunan Kalijaga Yogyakarta. JISKa menyediakan forum bagi para dosen, peneliti, mahasiswa dan praktisi untuk menerbitkan artikel penelitiannya, mengkaji artikel dari para kontributor, dan teknologi baru yang berkaitan dengan informatika dari berbagai disiplin ilmu
Arjuna Subject : -
Articles 7 Documents
Search results for , issue "Vol. 8 No. 3 (2023): September 2023" : 7 Documents clear
Klasifikasi Sentimen Masyarakat Terhadap Proses Pemindahan Ibu Kota Negara (IKN) Indonesia pada Media Sosial Twitter Menggunakan Metode Naïve Bayes Moch. Reinaldy Destra Fachreza; Suhartono Suhartono; M. Ainul Yaqin
JISKA (Jurnal Informatika Sunan Kalijaga) Vol. 8 No. 3 (2023): September 2023
Publisher : UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/jiska.2023.8.3.243-251

Abstract

Some time ago, the House of Representatives passed Law (UU) Number 3 of 2022 concerning the National Capital City on January 18, 2022. Then, President Joko Widodo officially signed the IKN Law on February 15, 2022. Thus, the Indonesian capital will be moved to Penajam Paser Utara Regency and Kutai Kartanegara Regency, East Kalimantan Province. The public's response to the decision varies; many respond with supportive sentiments, but some react with unsupportive ideas. Nowadays, there are many ways to observe information collected on social media. Various responses submitted through social media can be used as sentiment classification research data. The Naïve Bayes method is commonly used for this type of research. Data was collected between February 15-25, 2023, with as many as 500 tweets. This research uses the Gaussian Naïve Bayes type because of the independence assumption made by this method. Features that do not significantly contribute to the classification can be ignored, thus reducing the impact of irrelevant features. This study aims to measure public sentiment on Twitter towards the process of moving the nation's capital. The system created provides the best trial results at 80% feature usage with 82.0% accuracy, 76.9% precision, and 100% recall.
Analisis Bibliometrik Publikasi Isu Kebocoran Data Menggunakan VOSviewer Hanissa Rizki Kurnia; Aisyah Zahrah; Elvia Ichsazene Dina Adha; Nur Aini Rakhmawati
JISKA (Jurnal Informatika Sunan Kalijaga) Vol. 8 No. 3 (2023): September 2023
Publisher : UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/jiska.2023.8.3.231-242

Abstract

Data leakage can harm individuals who experience it, such as identity theft, financial fraud, or even physical security threats. This study aims to analyze scientific publications and research activities in data leakage using bibliometric techniques by involving quantitative analysis using a set of journals as reference sources. The literature for this study was obtained using Publish or Perish software with the keyword "data leakage" and a search result limit of 500. Furthermore, from these results, 85 journals relevant to the research topic were selected for visualization using VOSviewer software. The results showed that the highest number of data leakage publications occurred in 2021, namely 30 journals published that year. Based on the results of the bibliometric analysis conducted, it is known that there are 9 clusters based on keywords and 19 clusters based on author. The most frequently researched keywords include personal data, privacy, data leakage, legal protection, security, cryptography, encryption, and description. On the other hand, some keywords are rarely discussed in publications, namely, air transportation, electronics, and Caesar.
Klasifikasi Tingkat Kerusakan Sektor Pasca Bencana Alam Menggunakan Metode MULTIMOORA Berbasis Web Aniss Fatul Fu'adah; Agung Teguh Wibowo Almais; A’la Syauqi
JISKA (Jurnal Informatika Sunan Kalijaga) Vol. 8 No. 3 (2023): September 2023
Publisher : UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/jiska.2023.8.3.222-230

Abstract

During 2020-2021, 10,152 disasters occurred in Indonesia, significantly impacting the affected sectors. The recovery of these sectors needs to be done as quickly as possible to maintain human survival. This study aims to analyze the factors that affect sector damage after natural disasters in Indonesia and measure the classification accuracy. The data used in this research is data from the Regional Disaster Management Agency of Malang City in 2020. This study developed a web-based Decision Support System (DSS) using The Multiplicative Form Integrated MOORA (MULTIMOORA) method. This method is the result of the development of the MOORA method by adding a complete multiplication form to the MOORA method. In this study, the MULTIMOORA method was used to classify the level of damage to sectors after natural disasters. The results showed that using the MULTIMOORA method in this DSS resulted in an accuracy rate of 84% and was included in the good enough category.
Pembuatan Ergonomic Mechanical Keyboard untuk Mengurangi Cidera Tangan Menggunakan Teknologi Arduino Muhammad Akbar Maulana
JISKA (Jurnal Informatika Sunan Kalijaga) Vol. 8 No. 3 (2023): September 2023
Publisher : UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/jiska.2023.8.3.175-185

Abstract

In our daily lives, computers and keyboards are essential tools for both work and gaming. However, despite the variety of keyboards available on the market, few consider the comfort and needs of individual users. To solve this issue, a mechanical keyboard that can be adjusted in width, shape, and positioning is required to lessen hand injuries when used for extended periods. This research produces a mechanical keyboard hardware prototype using Arduino as the main component. The device will be connected to an electronic circuit and use C Language as supporting software. Tests were conducted to compare existing keyboards on the market related to function tests, compatibility, usability, and performance tests. The results show that all hardware components function perfectly at 98% capacity.
COBIT 2019 Implementation for Enhancing IT Governance in Educational Institutions Gilberth Wattimury; Ahmad Faza
JISKA (Jurnal Informatika Sunan Kalijaga) Vol. 8 No. 3 (2023): September 2023
Publisher : UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/jiska.2023.8.3.210-221

Abstract

This study explores the application of COBIT 2019 in assessing IT governance at Yayasan Bunda Hati Kudus, a prominent educational institution. The research uses the Planning, Field Work, Reporting, and Follow-Up stages to leverage the Gallegos' framework. Findings reveal that Yayasan Bunda Hati Kudus operates at IT governance level two, employing COBIT 2019 domains BAI04, BAI05, and BAI11. Notably, the organization faces challenges in implementing IT across campuses, requiring remedies for decentralized systems, operational disruptions, and unmet needs. The study underscores COBIT's efficacy in addressing IT-related challenges and governance implementation. The novelty lies in adapting COBIT 2019 to assess IT governance within an educational context, offering tailored insights for enhancing capability levels and aligning IT strategies with organizational priorities.
Rancang Bangun Aplikasi Pengadaan Barang dan Jasa Universitas Negeri XYZ dengan Metode Extreme Programming Muhammad Galih Wonoseto; Arman Maulana; Mahfud Asyari
JISKA (Jurnal Informatika Sunan Kalijaga) Vol. 8 No. 3 (2023): September 2023
Publisher : UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/jiska.2023.8.3.186-198

Abstract

The Indonesian government has provided the LKPP application in procuring goods and services for government agencies. However, several procurement processes at XYZ State University still do not use the LKPP application. Some of the reasons that are often stated are that the goods available in LKPP are not complete and the location of suppliers in LKPP is outside the city and the province. It is required to create an application for them at XYZ State University to promote digitization and transparency in procuring products and services at XYZ University. This application development uses the extreme programming method. This research succeeded in identifying the functionality requirements required in e-purchasing applications. The results of this research were able to realize 91.6% of all the necessary features. Some features that can be recognized include dashboard features, user access rights sharing features, goods/services requirements features, goods/services offering features, goods/services offer approval features, payment features, and specification features. The feature that has not been fulfilled is the direct purchase feature. The applications produced in this research may be adapted at universities or other government agencies.
Pemodelan Proses Bisnis Kuliah Online MOOCs menggunakan BPMN (Studi Kasus alison.com) Sumarsono Sumarsono; Dodi Saputro; Aulia Faqih Rifai
JISKA (Jurnal Informatika Sunan Kalijaga) Vol. 8 No. 3 (2023): September 2023
Publisher : UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/jiska.2023.8.3.199-209

Abstract

Online lectures have been recognized for their existence in independent learning. However, many still don't know the scope of the business process, from the account registration process to taking exams. This article discusses business process modeling using Business Process Modeling Notation (BPMN) in online lectures on the international standard ALISON MOOC models. This research aims to overview the process and business model of MOOC online lectures with ALISON. This type of research is descriptive qualitative, which describes objective conditions based on facts the researcher found in the field. Data is collected through literature study, problem analysis, and business process modeling. This research results in modeling the online college business process at ALISON. The business process elements, from course registration to the exam implementation, are mapped in detail using the BPMN standard. Through modeling using BPMN, the process of creating an account, participant profile, course selection, course registration, learning media, completing assignments and exams, and obtaining a certificate can be described. This article provides helpful information for users interested in business process modeling and its notation in the ALISON online course.

Page 1 of 1 | Total Record : 7