cover
Contact Name
Marlindia Ike Sari, S.T., M.T.
Contact Email
ike@tass.telkomuniversity.ac.id
Phone
+6281321405381
Journal Mail Official
ijait@tass.telkomuniversity.ac.id
Editorial Address
International Journal of Applied Information Technology (IJAIT) Fakultas Ilmu Terapan Universitas Telkom; Gd. Selaru Lt. 3 - Jl. Telekomunikasi No. 1 Bandung
Location
Kota bandung,
Jawa barat
INDONESIA
IJAIT (International Journal of Applied Information Technology)
Published by Universitas Telkom
ISSN : -     EISSN : 25811223     DOI : https://doi.org/10.25124/ijait
Core Subject : Science,
International Journal of Applied Information Technology covers a broad range of research topics in information technology. The topics include, but are not limited to avionics, bio medical instrumentation, biometric, computer network design, cryptography, data compression, digital signal processing, embedded system, enterprise information system, green energy & computing, interactive programming, internet of things, IT management and governance, IT-business strategic alignment, mobile and ubiquitous computing, monitoring system and techniques, multimedia processing, network security, power electronics, remote monitoring and sensing device, robotics and avionics, signal processing circuits, smart cities and smart grids, telecommunication devices & methods, telecommunication fundamentals.
Articles 8 Documents
Search results for , issue "Vol 3 No 02 (2019)" : 8 Documents clear
A Review on Information System Audit Using COBIT Framework Heru Nugroho
IJAIT (International Journal of Applied Information Technology) Vol 3 No 02 (2019)
Publisher : School of Applied Science, Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25124/ijait.v3i02.2114

Abstract

Information systems (IS) audit contains a proper review of risks associated along with the organization of information systems and processes. Also, an assessment of whether enough quality control will ensure the efficiency, effectiveness, integrity, and security of organization data and assets of the information system. An IS / IT audit is a coordinated process that specializes in high-risk areas in the organization. Selection of the areas can arise with the board of directors, the board of directors, audit committee, government agencies, or external audit organizations. Generally, it audits help organizations monitoring and evaluation of how the business is work and give protection to the interests of managers, workers, customers, and investors. Control Objectives for Information and related Technology (COBIT) is a detailed resource that consists of all the information organizations have to be compelled to adopt its governance and control framework. COBIT delivers good practices across all domains and process frameworks in an easily manageable and rational structure to assist in optimizing investments that support it. COBIT optimizes investments that support IT and ensure that IT successfully meets business requirements. In this paper, we find that paper about IT/IS audit using COBIT is had a different perspective. Base on the review from twenty papers, there is 85% with a title IT/IS Audit, but the content is about Maturity or Capability Level. The discussion paper is expected to provide new knowledge to other researchers who focused his research on the area of information systems audit. This paper is expected to provide new enlightenment that information system audit is different from the maturity/ capability level, which is also examined in the COBIT 4.1 framework.
FloNa: Children Educational App for Indonesian Endangered Species Based on Augmented Reality Amir Hasanudin Fauzi; Rahmadi Wijaya; Alfian Ghazali; Endra Wahyu Wardana; Ageng Prasetio; Neca Aqila
IJAIT (International Journal of Applied Information Technology) Vol 3 No 02 (2019)
Publisher : School of Applied Science, Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25124/ijait.v3i02.2292

Abstract

Indonesia has an enormous number of endangered species of flora (plants) as well as fauna (animals). Several factors influence endangered species such as lack of early education in this problem. Whereas, children, especially in school ages, have the most potential role in the future to solve this problem. To influence the behavior and attitudes of children towards wildlife, Conservation Education is the solution. By providing appropriate and effective conservation education, future conservation behavior can change in a positive direction. To address this opportunity, we proposed FloNa, a mobile app to educate children about Indonesian endangered species. FloNa is empowered by augmented reality to help children imagine and observe the real form of endangered plants and animals. Furthermore, we conducted experiments to analyze the efficiency of this app to overcome this problem. The alpha testing result shows that FloNa has a robust design and implementation. Moreover, from the beta testing result, we could conclude that FloNa could significantly support and promote endangered species conservation education for children in Indonesia.
Classification of E-Service in Indonesia Irna Yuniar; Anak Agung Gde Agung
IJAIT (International Journal of Applied Information Technology) Vol 3 No 02 (2019)
Publisher : School of Applied Science, Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25124/ijait.v3i02.2358

Abstract

E-service consists of various actors. Today, there is a wide range of actors involved. Public, private, and government connected in such complex way to create the e-service world we know today. However, the broad and complexity of the environment raises challenges for policy makers and regulators, such as tax. Until now, there is no tax regulation that specifically regulates trading activities using information technology, also known as an e-service. It operates globally without physical boundaries of a nation. However, rules can be different among nations. The initial step to make these rules is the classification of types of services using information technology, based on the business actors involved. Lack of classification raises problems, such as overlapping business segmentation, which may lead to inaccurate classification of the treatment. That is why a complete classification of e-service is needed. This study proposes a classification of e-service based on provider of the service, origin of goods and service, and the destination of goods and services in Indonesia. Research data obtained through literature studies and surveys of information technology-based service provider sites. We propose 27 categories of e-business classification, which can be used further, such as to cluster business and as a basis for regulation.
Zetcil: Game Mechanic Framework for Unity Game Engine Rikman Roedavan; Agus Pratondo; Rio Korio Utoro; Apriyanti Putri Sujana
IJAIT (International Journal of Applied Information Technology) Vol 3 No 02 (2019)
Publisher : School of Applied Science, Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25124/ijait.v3i02.2779

Abstract

Games are interactive multimedia products that require programming logic and graphic design capabilities in the development process. Game development using Unity Game Engine has become a primary subject in the Multimedia Engineering Technology study program, School of Applied Sciences, Telkom University. In the initial observation, it was found that more than 33% of students have difficulties in making a game using the C# language for Unity. The students understand the Game Design Pattern logic but having difficulty when applying it into programming codes. This research proposes Zetcil, a Game Mechanic Framework that simplifies the game development process for the Unity Game Engine. This framework turned most of the text-based programming commands into visual properties. Based on research for two years, it concluded that the Zetcil could increase 36% of student's confidence to develop games prototype rapidly.
Dissemination Application for Early Warning in a Community Tora Fahrudin; Kastaman Kastaman
IJAIT (International Journal of Applied Information Technology) Vol 3 No 02 (2019)
Publisher : School of Applied Science, Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25124/ijait.v3i02.2684

Abstract

The development of sensor technology for early warning at an affordable price makes it possible to be implemented in the community. Therefore, an application is needed to send this early warning information to community members and warning response centers in real-time by considering the distance from the location of the incident. So, in this research, we proposed a dissemination application for early warning in a community (DissApps). The application was build using Code Igniter Framework, MySQL database, Mapquests, and Wablas API. This application can be used for disseminating emergency response situations such as thievery, a natural disaster such as earthquake, flood, forest fire.
Dissemination Application for Early Warning in a Community Fahrudin, Tora; Kastaman, Kastaman
IJAIT (International Journal of Applied Information Technology) Vol 3 No 02 (2019)
Publisher : School of Applied Science, Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25124/ijait.v3i02.2684

Abstract

The development of sensor technology for early warning at an affordable price makes it possible to be implemented in the community. Therefore, an application is needed to send this early warning information to community members and warning response centers in real-time by considering the distance from the location of the incident. So, in this research, we proposed a dissemination application for early warning in a community (DissApps). The application was build using Code Igniter Framework, MySQL database, Mapquests, and Wablas API. This application can be used for disseminating emergency response situations such as thievery, a natural disaster such as earthquake, flood, forest fire.
A Security Analysis on OpenSIPS Gandeva Bayu Satrya; Muhammad Caesara Nicovandia
IJAIT (International Journal of Applied Information Technology) Vol 3 No 02 (2019)
Publisher : School of Applied Science, Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25124/ijait.v3i02.2503

Abstract

IP Telephony, Internet Telephony, Digital Phone or often also called VoIP (Voice Over Internet Protocol) is a technology that allows long-distance voice conversations with the Internet. The increasing number of VoIP users and other IP-based multimedia streaming services naturally raises security issues. Many users are likely to lose their privacy in communication. To overcome this security problem a security system must be implemented. Implementing a security system will use VPN Gateway using SSL and TLS encryption on the VoIP server. The VPN Gateway method is used to build a private network so that only certain users can use the private network. The TLS method is used to secure a user signaling session to the server. From the test results obtained that the VoIP server that uses VPN Gateway and TLS on the server can overcome the attacks e.g., eavesdropping, attacking authentication, teardown session, and denial of service.
A Security Analysis on OpenSIPS Satrya, Gandeva Bayu; Nicovandia, Muhammad Caesara
IJAIT (International Journal of Applied Information Technology) Vol 3 No 02 (2019)
Publisher : School of Applied Science, Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25124/ijait.v3i02.2503

Abstract

IP Telephony, Internet Telephony, Digital Phone or often also called VoIP (Voice Over Internet Protocol) is a technology that allows long-distance voice conversations with the Internet. The increasing number of VoIP users and other IP-based multimedia streaming services naturally raises security issues. Many users are likely to lose their privacy in communication. To overcome this security problem a security system must be implemented. Implementing a security system will use VPN Gateway using SSL and TLS encryption on the VoIP server. The VPN Gateway method is used to build a private network so that only certain users can use the private network. The TLS method is used to secure a user signaling session to the server. From the test results obtained that the VoIP server that uses VPN Gateway and TLS on the server can overcome the attacks e.g., eavesdropping, attacking authentication, teardown session, and denial of service.

Page 1 of 1 | Total Record : 8