cover
Contact Name
Johan Reimon Batmetan
Contact Email
admin@ijite.jredu.id
Phone
+6282292373989
Journal Mail Official
admin@ijite.jredu.id
Editorial Address
Lingkungan IX Lansot Tomohon Selatan
Location
Unknown,
Unknown
INDONESIA
International Journal of Information Techonology and Education (IJITE)
Published by JR Education
ISSN : -     EISSN : 28098463     DOI : -
Core Subject : Science, Education,
Focus And Scope The International Journal of Information Technology and Education (IJITE) provides a distinctive perspective on the theory and best practices of information technology and education for a global audience. We encourage first-rate articles that provide a critical view on information technology and education– its effects, development, implementation, strategy, management, and policy. The scope of IJITE is following, but not limited to IT Governance Enterprise Architecture IT Service Management IT Project Management IT Audit User Experience Design IT Security System Analysis and Design Data and Information Management Multimedia System Augmented Reality and Virtual Reality Accelerators and 3D System Integration Distance Learning e-Learning m-Learning Games in Education Learning Media on Information Technology
Articles 103 Documents
Smartphone-Based Operating System Adoption Rate in Millennial Generation Jose L.G Amparo
International Journal of Information Technology and Education Vol. 1 No. 1 (2021): December 2021
Publisher : JR Education

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1787.523 KB)

Abstract

The development of Android into a smartphone operating system is the most widely used in the world. The Android system is an option for companies that want a low-cost operating system. This study was conducted to analyze whether the Android Operating System Comparison Lollipop, Marshmallow, and Nougat versions in terms of performance and user satisfaction. The research was conducted using a questionnaire as a research instrument. The research questionnaire distributed consisted of 10 questions. Based on data processing, the results obtained are 9 The number of respondents who use the Android Operating System v5.0 (Lollipop) with a value of 30%, while the number of respondents who use the Android Operating System V6.0 (Marshmallow) there are 10 respondents with a percentage value of 33.3% and those who use the Operating System. Android v7.0 (Nougat) has 11 respondents with a percentage value of 37.7.
Virtual Classroom Design for the Deaf Based on Cloud Computing Livia Maukar
International Journal of Information Technology and Education Vol. 1 No. 1 (2021): December 2021
Publisher : JR Education

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1067.438 KB)

Abstract

The development of information technology is growing rapidly, giving rise to various innovations that also change human behavior, especially in interaction and communication. Cloud Computing is a hot topic for today's technological developments. Persons with disabilities are people who have physical, mental, intellectual, or sensory limitations for a long period of time (Law No. 19 of 2011). Deaf and speech impaired people need signs or alarms that are visual in nature, either as picture symbols or in the form of lights. Currently, virtual classes have begun to be used as learning alternatives. Virtual class (virtual class) is a class based on the web, where teachers and students can interact anytime and anywhere without being limited by space and time. The purpose of making this design is so that the learning process for the deaf can run well. The method used is a collaborative Design Thinking method that collects many ideas from scientific disciplines to obtain a solution. Cloud computing can be used as a technological instrument that facilitates the construction of a good application for students with special needs. With the design thinking method, good applications can be produced and are able to produce a good learning process for students with special needs.
Comparative Study of Desktop-Based Antivirus Application Adoption Rate Baharuddin Mustahir, Julianto Mansa, Gabriel Tamboto
International Journal of Information Technology and Education Vol. 1 No. 1 (2021): December 2021
Publisher : JR Education

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1424.128 KB)

Abstract

Antivirus is a type of software that is used to secure, detect, and remove computer viruses from computer systems. Antivirus can be an application program that functions to detect and clean malicious programs. The purpose of this study was to measure the level of acceptance of antivirus programs running on desktop devices. In addition, it is expected to be able to apply and distinguish the performance of the 2 antiviruses for the identification, cleaning and deletion of a virus-infected file. The method used to determine the level of acceptance of an anti-virus is using the TAM acceptance model. The results of this study indicate that the majority of users have been able to use antivirus properly and will continue to use it in the future. The results of this study recommend that for desktop-based computer security processes it is better to use a trusted antivirus so that the computer security process becomes more effectively guaranteed.
Understanding Users To Adopt Cloud Computing Technology Brenda Karisoh, Hensy Watung, Putri Ante
International Journal of Information Technology and Education Vol. 1 No. 1 (2021): December 2021
Publisher : JR Education

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (343.26 KB)

Abstract

This research is entitled "Factors that influence users to adopt cloud computing technology" which aims to examine what factors influence users in adopting or using cloud computing. This study focuses on the variables of Security, Internet Connection Quality, Attitudes towards Use and also the two variables contained in the Technology Acceptance Model (TAM). This study takes a sample of users who have used cloud computing in Yogyakarta. Samples of respondents were taken using accidental sampling technique, from all available 150 questionnaires, which can be returned and processed as many as 116 samples. Tests were carried out using the SmartPLS ver 2.0 program. Of the six hypotheses tested in this study, it finally showed significant results. The hypothesis shows that all of the variables proposed in this study affect user behavior in using cloud computing services.
Measurement of Usability Online Storage in Cloud Computing for University Users I Wayan Yudha Saputra, Gilbert Watae, Nancy Runtukahu
International Journal of Information Technology and Education Vol. 1 No. 1 (2021): December 2021
Publisher : JR Education

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (305.072 KB)

Abstract

Cloud computing technology or often known as Cloud Computing is present as an impact of changes in the cultural environment and competitive ecosystem on Higher Education in the world, including Indonesia. Cloud computing is actually a combination of the use of computer technology ('computing') and Internet-based development ('cloud'). This research was conducted at Manado State University, the respondents themselves include lecturers and students. This study uses a use questionnaire that has aspects of effectiveness, efficiency and satisfaction. In collecting data the researchers used a questionnaire with the number in this study there were 21 respondents with 10 attributes of the questions asked. After collecting data, the analysis will be carried out using the Likert Scale method.
Analysis of Information Security Management Systems at University Bierhoff Parengkuan, Kenny Tatauhe , Fanny Worotijan
International Journal of Information Technology and Education Vol. 1 No. 1 (2021): December 2021
Publisher : JR Education

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (235.672 KB)

Abstract

One of the keys to the success of securing information systems is the vision and commitment of top management leaders. Security efforts or initiatives would be meaningless without them. In the absence of commitment from top management, the impact on data security investment. In addition, success is also determined such as the process of design, implementation, configuration, and use. For this reason, adequate standards and management are needed so that security can be carried out adequately. Competency standards can be carried out in accordance with TKTI if using National standards. Competency standards do not mean only the ability to complete a task, but are also based on how and why the task is done. In addition, the ISO standard which is an international standard can be applied using ISO 17799. Security operations management must fulfill several important things, namely control and protection, monitoring and auditing, as well as an understanding of threats and vulnerabilities.
Evaluation of Acceptance Model in E-Commerce Using TAM Calvin Kumajas, Dwiputri Pusung, Michella Undap
International Journal of Information Technology and Education Vol. 1 No. 1 (2021): December 2021
Publisher : JR Education

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (418.56 KB)

Abstract

Information technology has had an impact on human life, including business on the internet, namely E-Commerce which saves time and does not require large capital to promote products. and encouragement to make changes in the system so that technology acceptance increases and they can take advantage of it. This study uses the TAM method as a reference to evaluate the level of technology acceptance in e-commerce systems by system users or the whole community. The results of this study indicate that the majority of E-Commerce System users agree that this E-Commerce system helps them. The results of this study also show that e-commerce must pay attention to interest, perceived usefulness, perception and ease of use in implementing and developing e-commerce-based information systems.
Comparative Study of Android Smartphone-Based Antivirus Performance Using the TAM Method Franco Turangan, Diah Ayu Utari, Krina Mawuntu
International Journal of Information Technology and Education Vol. 1 No. 1 (2021): December 2021
Publisher : JR Education

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (492.613 KB)

Abstract

Android is a mobile phone that has many advantages. Android has many interesting features and applications. Because the need for Android smartphones continues to grow rapidly at the same time technology is also increasingly sophisticated. This also has a weakness, namely by the presence of people who are not responsible for damaging the Android OS, where they will spread malware, spyware, trojans, and other viruses. To damage and steal data from the victim's android smartphone. The purpose of this study is to know the performance of smartphones when using antivirus. The method used in this research is the TAM (Technology Acceptance Model) method. TAM is one of the models built to analyze and understand the factors that influence the acceptance of the use of computer technology. The results of this study indicate that the appearance of the Avast antivirus and Clean Master has an attractive design, easy to operate, and the features of Avast are easy to understand. While the use of Avast antivirus and Clean Master can save time in operation, meet needs, and is efficient and effective, and its convenience can make it easier for users to use this antivirus more flexible
Cyber Security Behavior of E-Commerce Application Users Hensy Watung, Leyri Nayoan, Avandi E. Untu
International Journal of Information Technology and Education Vol. 1 No. 1 (2021): December 2021
Publisher : JR Education

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1165.892 KB)

Abstract

E-Commerce technology is a business mechanism that works electronically by focusing on online business transactions and has the opportunity to build more human and personalized relationships with customers without depending on space and time. The purpose of this study was to determine to what extent, the influence of Cyber ​​Crime behavior on users of e-commerce applications that affect the level of trust of users of E-Commerce transaction services. The data used in this study is primary data. The data analysis method used is quantitative using a Likert scale. The population in this study was 30 respondents as the research sample, using google form. The results based on the analysis showed that e-commerce users bear a lot of the risk is added to the level of trust of E-Commerce users, making Cybercrime behavior is still very difficult to anticipate by users of E-Commerce transaction services, has a negative and significant effect
Cyber Security Analysis on Small Medium Enterprise's Online Shop Ahnes Montoh, I Gusti Ayu Mirahyanti, Tessa Rantung
International Journal of Information Technology and Education Vol. 1 No. 1 (2021): December 2021
Publisher : JR Education

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1832.987 KB)

Abstract

Competition in the increasingly competitive business world has resulted in people using technology or companies carrying out business strategies in order to win or survive in the world of e-commerce. This study aims to analyze matters related to cybercrime, especially regarding the threat from cybercrime itself to Yhummy online shop. This study specifically discusses how cybercrime occurs in the world of e-commerce, especially in the Yhummy online shop. This puts the attitude factor in each user's behavior or brainware that deviates from the rules of the technology world. The method used in this study is a survey method conducted on an online shop. The type of data used is primary data which is obtained directly from the answers of the Yhummy olshop owner and the respondent's questionnaire. Direct interviews to the owner of the Yhummy olshop and to respondents whose areas are still within reach. The sampling technique used was non-probability sampling using purposive sampling method. The results showed that the characteristics of online shopping respondents were dominated by women and had an age range of 16 to 25 years. Most of them are students or college students. The results of this study also show that the quality of trust from Yhummy olshop customers is very high. It can be seen that male consumers have a slightly lower percentage than women, this shows that male interest in online shops is not as great as female interest. However, it is possible that cybercrime cases can also be caused by men.

Page 1 of 11 | Total Record : 103