cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota bandar lampung,
Lampung
INDONESIA
Jurnal Informatika
ISSN : -     EISSN : -     DOI : -
Core Subject : Science,
Arjuna Subject : -
Articles 10 Documents
Search results for , issue " Vol 14, No 2 (2014): Jurnal Informatika" : 10 Documents clear
EVALUATION OF MANAGEMENT NETWORK SECURITY USING SEKCHECK NETWORK EVALUATOR Syahri, Rizal; W, Cholil; Q, Widiyati
Jurnal Informatika Vol 14, No 2 (2014): Jurnal Informatika
Publisher : IIB Darmajaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The Utilization of Information Technology in business has become a significant part in supporting the business process. The implementation of IT has been implemented as a value chain system which support the business transaction from first level process till documentation, its result a report which could mark the decision making process in manager level. Indeed the information which is the output of the system has a very important role in the process business; therefore the procedure and mechanism how to protect that information also need a special courtesy. There are several tools which has been use as security evaluator both inn system and network. This paper has concern about one of those tools, the tools called Sekcheck Network Evaluator Security Evaluator. This tools has function to analyze the current system in awareness of user in information security substances especially assessment of user role and activities in a network. The papers will analyze the assessments process by Sekcheck Network Evaluator and how the result is and how to accomplish it with Information Technology Audit process that will influence to the factors of awareness and risk level of information security from user perspective. At the end this could use as consideration input for managers to optimize user awareness about security of information in business.Keywords: Business transaction system, Information Security, Awareness, Assessment, Network, application Sekcheck Network Evaluator security evaluator
SISTEM REPOSITORY BERITA DAN GAMBAR PADA HARIAN UMUM LAMPUNG POST arkhiansyah, yuni
Jurnal Informatika Vol 14, No 2 (2014): Jurnal Informatika
Publisher : IIB Darmajaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The development of technology which is very fast force us to equalize with the performance of technology, therefore we are charged to be able to create an application which are useful and beneficial for people. It is proved with the increasing of the use of computer technology even gadgets. PT. Masa Kini Mandiri (Lampung Post) especially in the documentation section need an application to scan data of news and picture for simplifying the data management. Data of news and picture which are still placed in folder shared will be impact in losing or redudancy of the data, both news or picture. Repository or warehouse is needed for the saving or documentation interest of a manuscript or picture in PT. Masa Kini Mandiri (Lampung Post) especially in documentation section, therefore if those data are needed in certain time in the future, it can be used as it should.Therefore the repository system of news and picture is needed to accommodate the data, news or picture which are alrealy published by Lampung Post daily newspaper. While the manuscript and picture that are in formed of file can be saved by repository system, so it can simplify in searching those data, news or picture in the future.Keywords : Repository, Newspaper, Picture, File, Folder Shared
AUDIT KEHADIRAN DOSEN PADA PUSAT LAYANAN PERKULIAHAN DAN PELAPORAN (PLPP) DI IBI DARMAJAYA MENGGUNAKAN FRAME WORK COBIT 4.1. -, Amnah
Jurnal Informatika Vol 14, No 2 (2014): Jurnal Informatika
Publisher : IIB Darmajaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This research was undertaken in order to find out the punctuality of the lecturers’ teaching at IBI Darmajaya from which its evaluation was conducted by the lecturing and reporting service center. During this time, the activity related to the audit of the punctuality of the lecturers’ teaching had not been done. Therefore, the researcher believed that this was an opportunity in conducting the research in the lecturing and reporting service center. The audit was carried out as a measure of the successfulness of the implementation of the discipline of the human resource and the result of the socialization towards the lecturers in the beginning of each semester prior to the lecturing activity. The results of these activities were expected to help the involved division map the lecturers who were much disciplined and the lecturers who had a lack of discipline in order to take a good solution for both. The audit activity was interviewing the head of the related bureau and the head of the lecturing and reporting service center and distributing questionnaires with two levels. The first level was for the users (the students) and the second level was for the management divisions (the administrative bureau of academic and student affairs, the head of lecturing and reporting service center and the chairman of the department of IBI Darmajaya).Keywords: Audit, Maturity, Users
PUSTAKA SANDI KLASIK BERBASIS COMPONENT OBJECT MODEL (COM) Amin, M. Miftakul
Jurnal Informatika Vol 14, No 2 (2014): Jurnal Informatika
Publisher : IIB Darmajaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Security and confidentiality are important issues that need serious attention in the era of information technology. Cryptography is one technique for securing data and information. In cryptography, the data is disguised in such a way that even if the data can be read, it can not be understood by those who do not have the authority. Data that has not undergone encoding known as The term plaintext, and after camouflaged with an encryption method, then it will turn plaintext into ciphertext. In general, a system equipped with a password to restrict only certain parties were entitled to enter into the system. If the password can be solved or known by an unauthorized person, then the data or information that is in the system is threatened. This research aims to develop a library classical password that can be used as an attempt to realize the aspect of information security in access control, by utilizing the technology component object model (COM). From the results of tests performed can be seen that the COM libraries are packed in COM DDL can be used by a variety of programming languages fairly easily.Keywords— cryptography, component object model (COM)
SISTEM PENDUKUNG KEPUTUSAN UNTUK PENENTUAN DOSEN PENGAJAR MENGGUNAKAN TECHNIQUE FOR ORDER PREFERENCE BY SIMILARITY TO IDEAL SOLUTION (TOPSIS) DI STISIPOL DHARMA WACANA METRO Widyawati, Apri Candra
Jurnal Informatika Vol 14, No 2 (2014): Jurnal Informatika
Publisher : IIB Darmajaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

STISIPOL DHARMA WACANA evaluate the performance of qualified lecturers and have good skills useful for the determination of the subjects that are taught each semester. Constraints faced is a the lack of system specifically to provide support for the Head of Department at the Department of Public Administration in the decision making. In addition, the supporting data is needed as a basis for decision making comes from part or another agency that the decision making process takes a long time. Based on these constraints, required a method for determining the course lecturer uses a method that is technique for Order Preference by Similarity to Ideal Solution (TOPSIS). The criteria in determining lecturer in the DHARMA STISIPOL Discourse is the assessment of the Department, BAAK, and a questionnaire from students. This research resulted in Decision Support system as recommendations for decision makers determining lecturer membuthkan subjects so that not a long time.Keywords: Decision Support, TOPSIS, Lecturer Course
AUDIT SISTEM INFORMASI AKADEMIK MENGGUNAKAN FRAMEWORK COBIT 4.1 (STUDI KASUS IBI DARMAJAYA) Purwati, Neni
Jurnal Informatika Vol 14, No 2 (2014): Jurnal Informatika
Publisher : IIB Darmajaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Academic Information System Management that is not managed properly will result in low quality of service, low levels of customer satisfaction / student, so it can affect the level of stakeholder confidence in the institutions. The foregoing can be addressed by monitoring / evaluation periodically the implementation SIAKAD. With the monitoring of the implementation process SIAKAD expected to improve any shortcomings and weaknesses of the current system become better and in accordance with business objectives institutions. Methods used are the stages of auditing information systems, namely : Planning, Fieldwork, Reporting, Follow-up. Tool use is Framework COBIT (Control Objectives for Information and Related Technology) issued by ISACA (Information Systems Audit and Control Association). Based on the result of the calculation on any IT processes contained in the domain of Planning and Organization (PO) and Delivery and Support (DS) normally located at level 3 (defined process), so that the whole IT can achieve the level of desired doneness (expected maturity level) in level 4 (manage) then all procedures required in each process should be met. To achieve level 4 (manage) then each IT process must have a written standard procedures and communicated to all parties involved in the academic information system, that is to the managers and users of the system. Such procedures should be documented and updated periodically. From the results of the gap between the maturity level of IT governance is now at a level of maturity to be achieved, it is known in the domain PO and DS priority repairs done at the PO7 (managing IT human resources).Keywords: Audit, Information Systems, COBIT 4.1
ANALISIS WEBSITE E-GOVERNMENT PROVINSI BENGKULU MENGGUNAKAN WEBQUAL 4.0 -, Diana
Jurnal Informatika Vol 14, No 2 (2014): Jurnal Informatika
Publisher : IIB Darmajaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Analysis of the quality of the e-government website is very important to be studied. WebQual 4.0 is a method used to measure the quality of a website based on user perception. Parameter WebQual 4.0 consists of usability, quality of information, and service interactions. The data collection is done by distributing questionnaires to 30 students in the province of Bengkulu. Website sampled is website Bengkulu province. The study of Bengkulu province website indicates that the respondents agree with the usability of the website, of sufficient quality and do not agree to the service interaction. Assessment of the overall Bengkulu website is of sufficient quality. Based on the results of questionnaires usability gained 3.92 score, the quality of information obtained score 3:00, 2:47 score obtaining service interaction, and the overall gain score 3:13.Keywords: websites, e-government, WebQual 4.0, usability, quality of information, interaction services
SISTEM INFORMASI PENJUALAN PADA GERAI PONSEL SURYA INDAH -, Nurbaiti
Jurnal Informatika Vol 14, No 2 (2014): Jurnal Informatika
Publisher : IIB Darmajaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

If a mobile phone outlets only sell hems in quantiies so there is no problemwhich is related whit accounting report. However, if the outlet providing all the hems in full and in a large quantity, it so will have difficulty in the process of provide profit and loss. Thus the need for a system that can resolve the issue. This study will be made through an application system that is able to provide the reports required by the owner of the phone booth’s report related to inventory and financial statements. From the results of this research can be concluded, that the system can knowing the accurate and fast, and the system can determine the remaining stock of existing items.Keywords :Information Systems, phone booth, Reports.
SISTEM PENDUKUNG KEPUTUSAN PEMBERIAN SANKSI PELANGGARAN KEDISIPILAN SISWA PADA SMK PGRI I KEDONDONG Ipnuwati, Sri
Jurnal Informatika Vol 14, No 2 (2014): Jurnal Informatika
Publisher : IIB Darmajaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Violation of school rules is often done by the students, among others, the increasingly widespread irregularities norms of religious and social life which is manifested in the form of lack of respect for teachers, less disciplined with time and did not heed the order and regulations of the school, and others. This study builds a decision-making system sanctioning the violation of discipline that has the ability to analyze where each of the criteria in this regard and alternative assessment factors. In this case the students who violate the rules will be sanctioned or point giving priority output intensity value that results in a system that provides an assessment of the student. This decision support system to help make an assessment of each student, to change the criteria and point value changes. It is useful to facilitate decision-making on issues related to discipline. Applications that are created can be used to assist in data processing violations of school discipline, especially the violation of students at SMK PGRI I kedondong the District Kedondong Pesawaran District Lampung Province, and can simplify and accelerate data processing, the student disciplinary violations. With the decision support system is expected to relevant officials would have no difficulty in determining the student who commits an offense (indiscipline) school and for students who violate Rather, they will be sanctioned or point.Keywords: SPK, Violation, Discipline.
RANCANG BANGUN PENGENDALI PERALATAN LISTRIK PADA GEDUNG MENGGUNAKAN JARINGAN NIRKABEL Sudibyo, Novi Herawadi
Jurnal Informatika Vol 14, No 2 (2014): Jurnal Informatika
Publisher : IIB Darmajaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Controllers electrical equipment in buildings that have a lot of space require great strength, compounded with a level human error, which can cause bad impact. Viewing from the situation to motivate people to make a controller that can be used to the monitoring and control all the equipment available in each room utilizing existing computer network electrical equipment is installed in a building can be monitored and controlled from long range without having to see one by one to each room is in the building.Keyword : Computer Network, Electronic Equipment, Programming.

Page 1 of 1 | Total Record : 10