cover
Contact Name
Fergyanto F. Gunawan
Contact Email
fgunawan@binus.edu
Phone
+62215345830
Journal Mail Official
-
Editorial Address
Jl. Kebun Jeruk Raya No. 27, Kemanggisan / Palmerah Jakarta Barat 11530
Location
Kota adm. jakarta barat,
Dki jakarta
INDONESIA
CommIT (Communication & Information Technology)
ISSN : 19792484     EISSN : 24607010     DOI : -
Core Subject : Science,
Journal of Communication and Information Technology (CommIT) focuses on various issues spanning: software engineering, mobile technology and applications, robotics, database system, information engineering, artificial intelligent, interactive multimedia, computer networking, information system audit, accounting information system, information technology investment, information system development methodology, strategic information system (business intelligence, decision support system, executive information system, enterprise system, knowledge management), e-learning, and e-business (e-health, e-commerce, e-supply chain management, e-customer relationship management, e-marketing, and e-government). The journal is published in affiliation with Research Directorate, Bina Nusantara University in online and free access mode.
Articles 8 Documents
Search results for , issue "Vol 5, No 1 (2011): CommIT Vol. 5 No. 1 Tahun 2011" : 8 Documents clear
Design Simulation Program of Runway Capacity Using Genetic Algorithm At Soekarno-Hatta Airport Saragih, Hoga; Wibowo, Indra Sulistyo; Utomo, Wisnu Darjono Tulodo
CommIT (Communication and Information Technology) Journal Vol 5, No 1 (2011): CommIT Vol. 5 No. 1 Tahun 2011
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/commit.v5i1.552

Abstract

The purposes of this research are to calculate the capacity of runway with runway capacity simulation software using Genetic Algorithm, and to analyze the efforts which have more profound effect.The result of the hourly runway capacity with the mathematical calculation is 42 operations for arrival only, 110 operations for departure only and 64 operations for mix. To enhance the runway capacity, some strategies are researched, such as reduction of separation to meet criteria set by FAA’s rule, addition of the exit taxiway, addition of the runway according to master plan of Soekamo-Hatta Airport and changing the runway utilization strategies. Out of the four strategies, the most efficient solution is changing the runway utilization strategies (with capacity increase of 35,9 %) and reduction in separation (with capacity increase of 34,4 %). However, the addition of runway has the highest capacity increase, that is 53,9 %..Key Words: genetic algorithm, simulation, runway capacity.
Analysis and Design: Accounting Information System in Purchasing and Supplying Noerlina, Noerlina; Johan, Johan; Yoswara, Yuliana
CommIT (Communication and Information Technology) Journal Vol 5, No 1 (2011): CommIT Vol. 5 No. 1 Tahun 2011
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/commit.v5i1.553

Abstract

The purpose of the research are the purchase and material supply process are the main process of the company and it will determine the operational company, so it needs an accounting information system to help them in the planning and taking the best decision. Research methods used are data and information collected which using the analysis and design method. This method needs to support the design of accounting information system in the company. The result are there’s still any weaknesses happened that will hamper the operational company.Index Terms - Analysis and Design, Accounting Information System, Purchasing, Supply.
Information Technology Risk Assessment: Octave-S Approach Gunawan, Bambang; Merry, Merry; Nelly, Nelly
CommIT (Communication and Information Technology) Journal Vol 5, No 1 (2011): CommIT Vol. 5 No. 1 Tahun 2011
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/commit.v5i1.549

Abstract

Purpose of the research is to identify the risk of IT in the company, to assess all the risk, and take security actions to solve the problem. Research methods used are data collection method and analysis method. Data collection is conducted with literature review and field studies by interview and observation. Analysis is conducted using Operationally Critical Threat, Asset, and Vulnerability (OCTAVE)-S method. The expected result is the risk identification in IT of the company.Index Terms - IT, Risk Assessment, Octave-S
Auditing Information System : Delivery Product Service Purwoko, Purwoko
CommIT (Communication and Information Technology) Journal Vol 5, No 1 (2011): CommIT Vol. 5 No. 1 Tahun 2011
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/commit.v5i1.554

Abstract

Purpose of the research is to ensure the securities of information system asset and to ensure if informa-tion system support the operational and data collected was valid. Research method that used in this research were library studies and field studies. Field studies such an observation, questioner, and inter-view. the expected result are founding the weakness of security management control, operational man-agement control, input control, and output control of risk happened in the company. Conclusion of this research are the system on the company work good and there’s no potential risk happened and make an impact to the delivery process of information system.Index Terms - Auditing Information system, Delivery product process.
Control Evaluation Information System Savings Sutedjo, Eddy; Yulianty, Yulianty; Kurniawan, Iwan
CommIT (Communication and Information Technology) Journal Vol 5, No 1 (2011): CommIT Vol. 5 No. 1 Tahun 2011
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/commit.v5i1.550

Abstract

The purpose of this research is to evaluate the control of information system savings in the banking and to identify the weaknesses and problem happened in those saving systems. Research method used are book studies by collecting data and information needed and field studies by interview, observation, questioner, and checklist using COBIT method as a standard to assess the information system control of the company. The expected result about the evaluation result that show in the problem happened and recommendation given as the evaluation report and to give a view about the control done by the company. Conclusion took from this research that this banking company has met standards although some weaknesses still exists in the system.Index Terms - Control Information System, Savings
Design and Analysis: Payroll of Accounting Information System Suryanto, Suryanto
CommIT (Communication and Information Technology) Journal Vol 5, No 1 (2011): CommIT Vol. 5 No. 1 Tahun 2011
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/commit.v5i1.555

Abstract

Purpose of the research are to analyze, design, and recommended the payroll of accounting information system that support the internal control to solve the problem. Research methods used are book studies, field studies, and design studies. Fields studies done by survey and interview. The expected result are to give a review about the payroll of accounting information system in the ongoing business process of company and to solve all the weakness in the payroll system, so the company can use the integrated information system in counting of the payroll. Conclusion that can take from the research are there’s some manipulation risk of attendance data and documentation of form still using a manual system and simple data backup. Then, there’s also manipulation risk in allowance cash system and all the report that include in the payroll.Index Terms - Accounting Information System, Payroll
Information Technology Investment Strategy Planning: Balance Scorecard Approach Hendarti, Henny; Kurniawan, Iwan
CommIT (Communication and Information Technology) Journal Vol 5, No 1 (2011): CommIT Vol. 5 No. 1 Tahun 2011
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/commit.v5i1.551

Abstract

Purpose of this research are to prepare the IT investment strategy using Balanced Scorecard approach in the company where the appropriate planning of this IT investment strategy can maximize the competitive benefit in the company, and it also to recommended a strategy of IT investment that can be implemented and measure the rate of return from the IT investment in the company. Research Method used book studies, field studies, and analysis system. Book studies from the books and journal. Field studies done by observation, interview, and questioner, and analysis system done by analyzed the ongoing system in the company. The result from this analysis is a recommendation in investment IT such as sales module, payment module, and report module. Then for the conclusion, this information technology investment planning can be develop to another investment implementation such authorized website of the company and using PDA (Personal Digital Assistant)Index Terms - Planning, Information Technology, Investment, Balance Scorecard
Information Technology Risk Measurement: Octave-S Method Harahap, Rudy M
CommIT (Communication and Information Technology) Journal Vol 5, No 1 (2011): CommIT Vol. 5 No. 1 Tahun 2011
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/commit.v5i1.556

Abstract

The purpose of this research are to identify the risk of IT in the company and make some recommendation to solve any risk happened in the company, and also to give the reference in measure the risk of IT in the company. Research Method used are book studies, field studies, and analysis techniques. Book studies by collecting the information from books and journal. Then, for field studies, it done by interview, and observation to the company. Analysis techniques done by qualitative approach and using the Octave-S (Operational Threat Asset and Vulnerability Evaluation) – S as the method to measure the risk of IT in the company. The result of this research will be a description of Information Technology in the company and give any risk happened in IT and mitigation activity through the risk in the company. Conclusion of the research are looking for three critical areas, such the awareness and security training, security strategy, security management, and disaster recovery.Index Terms - Risk Management, Information Technology, Octave-S method

Page 1 of 1 | Total Record : 8


Filter by Year

2011 2011


Filter By Issues
All Issue Vol. 17 No. 2 (2023): CommIT Journal Vol. 17 No. 1 (2023): CommIT Journal (In Press) Vol. 17 No. 1 (2023): CommIT Journal Vol. 16 No. 2 (2022): CommIT Journal Vol. 16 No. 1 (2022): CommIT Journal Vol. 15 No. 2 (2021): CommIT Journal Vol. 15 No. 1 (2021): CommIT Journal Vol 14, No 2 (2020): CommIT Vol. 14 No. 2 Tahun 2020 (IN PRESS) Vol 14, No 1 (2020): CommIT Vol. 14 No. 1 Tahun 2020 Vol. 14 No. 2 (2020): CommIT Journal Vol. 14 No. 1 (2020): CommIT Journal Vol 13, No 2 (2019): CommIT Vol. 13 No. 2 Tahun 2019 Vol 13, No 1 (2019): CommIT Vol. 13 No. 1 Tahun 2019 Vol. 13 No. 2 (2019): CommIT Journal Vol. 13 No. 1 (2019): CommIT Journal Vol 12, No 2 (2018): CommIT Vol. 12 No. 2 Tahun 2018 Vol 12, No 1 (2018): CommIT Vol. 12 No. 1 Tahun 2018 Vol. 12 No. 2 (2018): CommIT Journal Vol. 12 No. 1 (2018): CommIT Journal Vol 11, No 2 (2017): CommIT Vol. 11 No. 2 Tahun 2017 Vol 11, No 1 (2017): CommIT Vol. 11 No. 1 Tahun 2017 Vol. 11 No. 2 (2017): CommIT Journal Vol. 11 No. 1 (2017): CommIT Journal Vol 10, No 2 (2016): CommIT Vol. 10 No. 2 Tahun 2016 Vol 10, No 1 (2016): CommIT Vol. 10 No. 1 Tahun 2016 Vol. 10 No. 2 (2016): CommIT Journal Vol. 10 No. 1 (2016): CommIT Journal Vol 9, No 2 (2015): CommIT Vol. 9 No. 2 Tahun 2015 Vol 9, No 1 (2015): CommIT Vol. 9 No. 1 Tahun 2015 Vol. 9 No. 2 (2015): CommIT Journal Vol. 9 No. 1 (2015): CommIT Journal Vol 8, No 2 (2014): CommIT Vol. 8 No. 2 Tahun 2014 Vol 8, No 1 (2014): CommIT Vol. 8 No. 1 Tahun 2014 Vol. 8 No. 2 (2014): CommIT Journal Vol. 8 No. 1 (2014): CommIT Journal Vol 7, No 2 (2013): CommIT Vol.7 No. 2 Tahun 2013 Vol 7, No 1 (2013): CommIT Vol. 7 No. 1 Tahun 2013 Vol. 7 No. 2 (2013): CommIT Journal Vol. 7 No. 1 (2013): CommIT Journal Vol 6, No 2 (2012): CommIT Vol. 6 No. 2 Tahun 2012 Vol 6, No 1 (2012): CommIT Vol. 6 No. 1 Tahun 2012 Vol. 6 No. 2 (2012): CommIT Journal Vol. 6 No. 1 (2012): CommIT Journal Vol 5, No 2 (2011): CommIT Vol. 5 No. 2 Tahun 2011 Vol 5, No 1 (2011): CommIT Vol. 5 No. 1 Tahun 2011 Vol. 5 No. 2 (2011): CommIT Journal Vol. 5 No. 1 (2011): CommIT Journal Vol 4, No 2 (2010): CommIT Vol. 4 No. 2 Tahun 2010 Vol 4, No 1 (2010): CommIT Vol. 4 No. 1 Tahun 2010 Vol. 4 No. 2 (2010): CommIT Journal Vol. 4 No. 1 (2010): CommIT Journal Vol 3, No 2 (2009): CommIT Vol. 3 No. 2 Tahun 2009 Vol 3, No 1 (2009): CommIT Vol. 3 No. 1 Tahun 2009 Vol. 3 No. 2 (2009): CommIT Journal Vol. 3 No. 1 (2009): CommIT Journal Vol 2, No 2 (2008): CommIT Vol. 2 No. 2 Tahun 2008 Vol 2, No 1 (2008): CommIT Vol. 2 No. 1 Tahun 2008 Vol. 2 No. 2 (2008): CommIT Journal Vol. 2 No. 1 (2008): CommIT Journal Vol 1, No 2 (2007): CommIT Vol. 1 No. 2 Tahun 2007 Vol 1, No 1 (2007): CommIT Vol. 1 No. 1 Tahun 2007 Vol. 1 No. 2 (2007): CommIT Journal Vol. 1 No. 1 (2007): CommIT Journal More Issue