cover
Contact Name
Maria Lamury
Contact Email
ejaict@sgu.ac.id
Phone
+622129779596
Journal Mail Official
ejaict@sgu.ac.id
Editorial Address
Directorate of Academic Research and Community Services Swiss German University The Prominence Office Tower Jl. Jalur Sutera Barat No. 15 Alam Sutera, Tangerang 15143
Location
Kota tangerang,
Banten
INDONESIA
Journal of Applied Information, Communication and Technology
ISSN : 23551771     EISSN : 27234827     DOI : https://doi.org/10.33555/
Core Subject : Science,
Journal of Applied Information, Communication and (eJAICT) welcomes full research papers in the area of Information and Communication Technology (ICT). The journal publishes review and research result on the frontier research, development, and application in the scope of ICT. The scope of the journal includes but not limited to: 1. Computer Network and Telecommunication 2. Wireless & Mobile Computing 3. Internet Technology 4. Multimedia System 5. Software Engineering 6. Computer Science 7. Information System and Knowledge Management 8. Data Analytics and Data Mining 9. Cyber and Computer Security
Articles 5 Documents
Search results for , issue "Vol. 7 No. 1 (2020)" : 5 Documents clear
Leak in OpenSSL Yapri, Jason; Hananto, Rinkel
Journal of Applied Information, Communication and Technology Vol. 7 No. 1 (2020)
Publisher : Swiss German University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33555/ejaict.v7i1.70

Abstract

The term “hacker” has been spread around the world and has always been considered as a threat when we use the internet. We often hear hackers deface websites’ contents and break into system to steal private and confidential information, such as account’s username and password, credit card numbers and others. This is definitely an unethical behavior of irresponsible people who mostly aims to gain profit. However the term hacker, on the contrary actually originates from an expert computer technicians who tries to access the system to debug and fix security problems of the system. Nowadays there are dozens of websites out there and some of those websites have low level of security. Hacker can easily break through their system and steal their private confidential data but just because these websites have low level security, that doesn’t mean that it is ethical to break into someone’s system and read their data. It goes the same when someone entering other people’s house because the door was left open by the owner. As web development grows rapidly, security has become an essential part to make the website more secure and reliable. This is when a group of people decided to make a collaborative project on the implementation of SSL (Secure Socket Layer) and TLS (Transport Layer Security) that is available to be used by everyone. This project is called as OpenSSl and has been used by most of the websites in the internet today. What if this OpenSSL, which has been trusted and implemented by 2/3rd of the websites all around the world can be breached? Definitely it will attract dozens of hackers all around the world to do something unimaginably dangerous.
The Lack of Enforcement of the DRM Policy Oliver, Stefanus; Winarta, Tommy
Journal of Applied Information, Communication and Technology Vol. 7 No. 1 (2020)
Publisher : Swiss German University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33555/ejaict.v7i1.73

Abstract

In this digital era, numerous copyrighted items such as music and movies can be enjoyed online. However, our activities in enjoying those entertainments are also limited by the copyright law. Some contents are also protected by Digital Rights Management, which makes sure that the user who purchases the item is the only person who has the right to enjoy the content. All of these rules are obviously made to make sure that everything is in order. Therefore, those illegal activities can be brought to justice. However, the lack of communication might present an ambiguity to the users, and those users might unconsciously do illegal things that are previously forbidden. Other than that, the law itself has its own limitation in the aspect of execution and enforcement, causing pirated versions of a content can be found easily on the internet. This paper is going to review the current condition of the execution of the law regarding the DRM protected contents.
Privacy in Social Media Hirawan, Jeffry; Rasyid, Itmam Al
Journal of Applied Information, Communication and Technology Vol. 7 No. 1 (2020)
Publisher : Swiss German University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33555/ejaict.v7i1.76

Abstract

Nowadays social networks become very common. People use social media to keep people in touch, businesses, organizations, and many more. The information you share with your friends in the social media allows them easily to keep in touch with you. However beside friends, colleges, relatives, there are many people that are interested in the private information on social media. Identity thieves, scam artists, debt collectors, stalkers, companies use social networks to gather information. Companies that use social networks for getting information about people are intended to personalize their services for the users and to sell to advertisement. In this paper we will discuss the advantage and disadvantage of using social media and what kind of information is safe to post and how to protect it.
Bildbox! – Virtual Photo Booth that implements Augmented Reality Leeson, Marchelno; Purnama, James; Galinium, Maulahikmah
Journal of Applied Information, Communication and Technology Vol. 7 No. 1 (2020)
Publisher : Swiss German University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33555/jaict.v7i1.104

Abstract

The purpose of this research is to develop a self-service photo booth that implements augmented reality which is named as BildBox! where it allows the user of this product to try on different costumes virtually. There will be discussion on the Business Analysis that is conducted in this research to know the potential of the product as well as discussing the features that are implemented in the product. The development of the product’s software will be using Unity game engine and the depth image is taken by using Microsoft’s Kinect v2 depth camera. Aside from the discussions mentioned above, there will be also charts shown from the results of the surveys conducted. In the end, there will be a conclusion drawn from the survey results.
Development of Mobile Sales Force System for an Automotive Aftermarket Company Michelle, Nastassja; Galinium, Maulahikmah; Eng, Kho I
Journal of Applied Information, Communication and Technology Vol. 7 No. 1 (2020)
Publisher : Swiss German University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33555/jaict.v7i1.112

Abstract

The aftermarket automotive company has a set of documents that is called Customer Information Folder (CIF). The CIF is used by the salesmen to record every activity, observation and sales made with their customers. Currently, the CIF is a pile of papers, in which paper misplacement can occur and data can be mixed up, and salesmen must return to the office at the end of the day to write down what they have done. The objective of this research is to create a mobile sales force system with a web application back-end that can help the company handle customer data and the system can also assist in managing others such as sales, orders, stocks and commissions. Based on request from the company, an ERP system is planned to be developed, starting from customer data (CIF / SFA), orders, stocks and commissions, which are developed for this research. The result of this research shows that the new system can help provide and manage data relating to customers, orders, stocks and commissions. Secondly, the new system can reduce paper usage by half through the simulation. Thirdly, the new system can provide organized, accurate and trustworthy data. Fourthly, the new system can help the Sales Department and company owner in determining sales trends and buying trends. Lastly, the new system is shown to have fulfilled user expectation as there are positive gaps between expectation and perception.

Page 1 of 1 | Total Record : 5