cover
Contact Name
Maria Lamury
Contact Email
ejaict@sgu.ac.id
Phone
+622129779596
Journal Mail Official
ejaict@sgu.ac.id
Editorial Address
Directorate of Academic Research and Community Services Swiss German University The Prominence Office Tower Jl. Jalur Sutera Barat No. 15 Alam Sutera, Tangerang 15143
Location
Kota tangerang,
Banten
INDONESIA
Journal of Applied Information, Communication and Technology
ISSN : 23551771     EISSN : 27234827     DOI : https://doi.org/10.33555/
Core Subject : Science,
Journal of Applied Information, Communication and (eJAICT) welcomes full research papers in the area of Information and Communication Technology (ICT). The journal publishes review and research result on the frontier research, development, and application in the scope of ICT. The scope of the journal includes but not limited to: 1. Computer Network and Telecommunication 2. Wireless & Mobile Computing 3. Internet Technology 4. Multimedia System 5. Software Engineering 6. Computer Science 7. Information System and Knowledge Management 8. Data Analytics and Data Mining 9. Cyber and Computer Security
Articles 5 Documents
Search results for , issue "Vol. 5 No. 2 (2018)" : 5 Documents clear
Gamification: Classification of the Users Based on Player Types and Motivations Tunggawan, Edwin
Journal of Applied Information, Communication and Technology Vol. 5 No. 2 (2018)
Publisher : Swiss German University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33555/ejaict.v5i2.48

Abstract

A comparison between two methods to understand the players’ behavior in games. The first one is the player types model by Richard Bartle, and the second is the motivations model by Nick Yee. It’s concluded that Yee’s model is better when the developers need a more detailed understanding on their users, while Bartle’s model is better to use when the developers need to classify the users in a quicker and simpler way.
Research of Web Real-Time Communication - the Unified Communication Platform using Node.js Signaling Server Damayanti, Florensia Unggul
Journal of Applied Information, Communication and Technology Vol. 5 No. 2 (2018)
Publisher : Swiss German University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33555/ejaict.v5i2.54

Abstract

The way of people communicate has been changed from generation. With rapid innovation of technology and the improvement of computer technology, smartphone, tablet and etc., the traditional communication is confronted. However, unified communication born and Web Real-Time Communication as a part of the innovation of communication technology, enhance the way peoples share their thought, feeling and information, in real-time and different place. This research offers an educational foundation and applied research of WebRTC, to leverage unified communication, through WebSocket node.js as the signalling protocol. A system of web real-time communication developed at the end of research to give an understanding and view of the opportunity given by WebRTC technology, such as leverage online distance-learning with a real-time communication, healthcare video conferencing, online video conference, self-service customer care and corporate online meeting.
Forensic Analysis of Artifacts of Giant Instant Messaging “WhatsApp” in Android Smartphone Ghannam, Hussein Abed
Journal of Applied Information, Communication and Technology Vol. 5 No. 2 (2018)
Publisher : Swiss German University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33555/ejaict.v5i2.55

Abstract

WhatsApp is a giant mobile instant message IM application with over 1billion users. The huge usage of IM like WhatsApp through giant smart phone “Android” makes the digital forensic researchers to study deeply. The artefacts left behind in the smartphone play very important role in any electronic crime, or any terror attack. “WhatsApp” as a biggest IM in the globe is considered to be very important resource for information gathering about any digital crime. Recently, end-to-end encryption and many other important features were added and no device forensic analysis or network forensic analysis studies have been performed to the time of writing this paper. This paper explains how can we able to extract the Crypt Key of “WhatsApp” to decrypt the databases and extract precious artefacts resides in the android system without rooting the device. Artefacts that extracted from the last version of WhatsApp have been analysed and correlate to give new valuable evidentiary traces that help in investigating. Many hardware and software tools for mobile and forensics are used to collect as much digital evidence as possible from persistent storage on android device. Some of these tools are commercial like UFED Cellebrite and Andriller, and other are open source tools such as autopsy, adb, WhatCrypt. All of these tools that forensically sound accompanied this research to discover a lot of artefacts resides in android internal storage in WhatsApp application.
Collecting Malware in Swiss German University with Low Energy and Cost Computer Marcello, Mario
Journal of Applied Information, Communication and Technology Vol. 5 No. 2 (2018)
Publisher : Swiss German University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33555/ejaict.v5i2.57

Abstract

The malware spreads massively in Indonesia. The security in Information Technology doesn’t seem to become a top priority for Indonesian. The use of pirated software is still high, although it is the biggest threat and entrance for the malwares to attacks. This paper shows how to collect a spreading malware in a system to know the malware trends that exist. So, the owner may know the malware trends inside his system and he can countermeasure the attacks. To collect the malwares, I use the Dionaea, the honeypot to collect malware and implement it to Raspberry Pi. Raspberry Pi is a small, low cost and low energy consumption computer. By using Raspberry Pi to collect malware, we can minimize budget, save the energy and space.
Strategies to Reduce Rework in Software Development on IT Organization Case Study of: PT. XYZ Kurniawan, Nurul Kholis
Journal of Applied Information, Communication and Technology Vol. 5 No. 2 (2018)
Publisher : Swiss German University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33555/ejaict.v5i2.58

Abstract

Today’s world, developing an application that meets exactly the need of organizational business is getting tougher and more challenging, with the additional complexity of business flow and the increasing and diversity of the data that an organization has. In addition, the customers are more demanding than before in term of using an information system or software application and within an instant result which gives an extra pressure for those who work as an application developer. Rework of the software application tends to contain very negative impact to the company because it is impacting the cost for the organization. This paper is trying to resolve the problem that causes a lot of rework occurred in the case study provided. By finding out the root cause of the problem, the literature study is conducted in order to have some recommendations to be applied to the case study given. After having a discussion by conducting interview session with the expert, the result in form of a recommendation is then defined. As the final result, it is decided that the best and most appropriate recommendation to be applied is by implementing System Configuration Management (SCM) and the SMC tools chosen is Team Foundation Server or usually called as TFS.

Page 1 of 1 | Total Record : 5