cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kab. jombang,
Jawa timur
INDONESIA
Register: Jurnal Ilmiah Teknologi Sistem Informasi
ISSN : 25030477     EISSN : 25023357     DOI : -
Core Subject : Science,
Register: Jurnal Ilmiah Teknologi Sistem Informasi published by the Department of Information Systems Unipdu Jombang. Register published twice a year, in January and July, Registerincludes research in the field of Information Technology, Information Systems Engineering, Intelligent Business Systems, and others. Editors invite research lecturers, the reviewer, practitioners, industry, and observers to contribute to this journal.
Arjuna Subject : -
Articles 7 Documents
Search results for , issue "Vol 7, No 2 (2021): July" : 7 Documents clear
Electronic document authenticity verification of diploma and transcript using smart contract on Ethereum blockchain Chaniago, Nero; Sukarno, Parman; Wardana, Aulia Arif
Register: Jurnal Ilmiah Teknologi Sistem Informasi Vol 7, No 2 (2021): July
Publisher : Information Systems - Universitas Pesantren Tinggi Darul Ulum

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26594/register.v7i2.1959

Abstract

Ethereum is one of the oldest examples of blockchain technology provides a system that converts centralized storage to distributed and records transactions by way of decentralized and not by a centralized system and can be verified by each node, therefore it is suitable for storing fingerprints from official diploma documents and transcripts that are published. Smart contract is needed for making contract transactions to Ethereum with programming code, so contracts such as diplomas and transcripts uploaded on the Ethereum blockchain can distribute and produce diploma validation and the authenticity of transcripts with transaction hash, consensus, and comply with ERC-721 token standardization. The results showed that a sample of 5 electronic documents in pdf format with a transaction speed of 1 second on each file that were published and secured with Ethereum blockchain technology can be easily verified for authenticity, the system proposed and developed by us takes in consideration invalid and failure cases by giving the necessary feedback to the user.
Use of online applications in maintaining MSMEs performance during the COVID-19 pandemic Nurlinda, Nurlinda; Sinuraya, Junus; Asmalidar, Asmalidar; Hassan, Rahayu; Supriyanto, Supriyanto
Register: Jurnal Ilmiah Teknologi Sistem Informasi Vol 7, No 2 (2021): July
Publisher : Information Systems - Universitas Pesantren Tinggi Darul Ulum

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26594/register.v7i2.2223

Abstract

This study aims to see whether there are differences in sales made by offline/conventional and online MSMEs to discover alternative media transactions to survive and increase sales during the COVID-19 period. This research is an exploratory study on MSMEs players who sell Rujak Sentir at Simpang Jodoh, Percut Sei Tuan, Deli Serdang District, Indonesia. The data source in this research is primary data by collecting data using a questionnaire on 50 samples of Rujak Sentir MSMEs merchants. Data were analyzed using statistical descriptive analysis of the Wilcoxon Signed Rank Test. The final analysis of data shows that the apply of online applications can be an alternative for MSMEs in maintaining and improving performance throughout the COVID-19 pandemic. The usage of this research practice is to give input to related parties regarding other options that can be utilized by enterprises throughout the Coronavirus widespread so that in the future, MSMEs are ready to face uncertainties that arise due to external factors. In addition to this, this research will be a recommendation regarding technical guidance that can be carried out by the local government in fostering MSMEs.
Whats drive someone to share their knowledge? Indonesia virtual community case Satria, Deki
Register: Jurnal Ilmiah Teknologi Sistem Informasi Vol 7, No 2 (2021): July
Publisher : Information Systems - Universitas Pesantren Tinggi Darul Ulum

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26594/register.v7i2.2142

Abstract

A virtual community is one form of Community of Practices that resides on the internet. This community consists of people who share problems or interests in specific topics. A lot of knowledge comes from this kind of community where the members shared their knowledge voluntarily. Knowledge itself is a valuable resource that gives the owner have an advantage. This research tried to observe what are the driver of this behavior. Knowing these variables could help the organization in defining knowledge sharing system functionality. The variables collected using PRISMA Systematic Literature Review (SLR) protocols, and the hypotheses tested using Partial Least Squares Structural Equation Modeling (PLS-SEM). From this research, we observed that self-efficacy and supporting others significantly influence someone to share their knowledge.
Advanced detection Denial of Service attack in the Internet of Things network based on MQTT protocol using fuzzy logic Budiana, Mochamad Soebagja; Negara, Ridha Muldina; Irawan, Arif Indra; Larasati, Harashta Tatimma
Register: Jurnal Ilmiah Teknologi Sistem Informasi Vol 7, No 2 (2021): July
Publisher : Information Systems - Universitas Pesantren Tinggi Darul Ulum

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26594/register.v7i2.2340

Abstract

Message Queuing Telemetry Transport (MQTT) is one of the popular protocols used on the Internet of Things (IoT) networks because of its lightweight nature. With the increasing number of devices connected to the internet, the number of cybercrimes on IoT networks will increase. One of the most popular attacks is the Denial of Service (DoS) attack. Standard security on MQTT uses SSL/TLS, but SSL/TLS is computationally wasteful for low-powered devices. The use of fuzzy logic algorithms with the Intrusion Detection System (IDS) scheme is suitable for detecting DoS because of its simple nature. This paper uses a fuzzy logic algorithm embedded in a node to detect DoS in the MQTT protocol with feature selection nodes. This paper's contribution is that the nodes feature selection used will monitor SUBSCRIBE and SUBACK traffic and provide this information to fuzzy input nodes to detect DoS attacks. Fuzzy performance evaluation is measured against changes in the number of nodes and attack intervals. The results obtained are that the more the number of nodes and the higher the traffic intensity, the fuzzy performance will decrease, and vice versa. However, the number of nodes and traffic intensity will affect fuzzy performance.
E-commerce website service quality and customer loyalty using WebQual 4.0 with importance performances analysis, and structural equation model: An empirical study in Shopee Wijaya, I Gusti Ngurah Satria; Triandini, Evi; Kabnani, Ezra Tifanie Gabriela; Arifin, Syamsul
Register: Jurnal Ilmiah Teknologi Sistem Informasi Vol 7, No 2 (2021): July
Publisher : Information Systems - Universitas Pesantren Tinggi Darul Ulum

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26594/register.v7i2.2266

Abstract

The rapid growth of business models in the form of online shops, Business to Consumer (B2C) and the Consumer to Consumer (C2C) concept, has an impact in the form of intense competition between online business owners. It is not easy to find a solution to this problem. The owner must provide good or even excellent service by improving the website quality so that customers can achieve satisfaction and loyalty. This research aimed to specify the influence of website quality on customer loyalty with satisfaction as an e-commerce website moderation variable and to investigate the WebQual 4.0 attributes that affect this relationship of the model. This study used 104 respondents of Shopee Consumer and analyzed with the WebQual with Importance Performance Analysis (IPA) method and Structural Equation Model (SEM). The result is that the service quality variable significantly influence e-commerce website customer satisfaction variable, customer satisfaction variable has no significant effect on e-commerce website customer loyalty variables, and website service quality variable significantly influence e-commerce website customer loyalty variable. The attributes of WebQual 4.0 that need to be considered by e-commerce management to impact the level of user satisfaction and customer loyalty are “design by the type of website”, “provide simple-to-understand information”, “provide information following the format”, “feel safe to complete transactions”, “the website makes the positive/absolute experience for me”, and “provide detailed information”. The research implications can be taken into consideration for e-commerce management.
Development of conceptual framework for cyber fraud investigation Hidayati, Anisa Nur; Riadi, Imam; Ramadhani, Erika; Al Amany, Sarah Ulfah
Register: Jurnal Ilmiah Teknologi Sistem Informasi Vol 7, No 2 (2021): July
Publisher : Information Systems - Universitas Pesantren Tinggi Darul Ulum

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26594/register.v7i2.2263

Abstract

The increase in the number of internet users in Indonesia as much as 175.4 million as recorded in the Datareportal.com report and 4.83 billion globally, impact the increase in the number of cyber fraud cases. Data states that 96% of fraud cases are not resolved due to fraud methods carried out online and make it difficult for legal officers to obtain evidence. Previous fraud investigation research mainly focused on fraud detection, so this research focuses on submitting a framework for investigating cyber fraud cases. The cyber fraud case requires a new framework for investigation because in this fraud case, there is digital evidence that is very prone to be damaged, lost, or modified, which makes this case unsolved. This research aims to develop a framework that is expected to help auditors to uncover cases of cyber fraud so that resolved cyber fraud cases can increase. The method used in making this framework uses Jabareen's conceptual framework development method, which consists of 6 stages, namely, Mapping the selected data source, extensive reading and categorizing of the chosen data, Identifying and naming objects, Deconstructing and categorizing the concept, Integrating concept, Synthesis, resynthesis. And make it all sense. The framework for cyber fraud investigation uses 22 digital forensic frameworks and eight frameworks for fraud audit investigations. The results of developing a framework using the Jabareen method resulted in 8 stages, integrating various concepts selected from digital forensics and fraud audits. Evaluation of framework development was carried out by giving limited questionnaires to practitioners and academics, which produced 89% for the feasibility value and needs of the framework and 67% there is no need for changes to the framework being developed.
Simulation of TOPSIS calculation in Discrepancy-Tat Twam Asi evaluation model Divayana, Dewa Gede Hendra; Suyasa, P. Wayan Arta
Register: Jurnal Ilmiah Teknologi Sistem Informasi Vol 7, No 2 (2021): July
Publisher : Information Systems - Universitas Pesantren Tinggi Darul Ulum

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26594/register.v7i2.2196

Abstract

This research’s main objective was to provide information related to the simulation of each calculation stage of the TOPSIS method used in the Discrepancy-Tat Twam Asi evaluation model. The TOPSIS method is used to find dominant indicators in the Discrepancy-Tat Twam Asi evaluation model that determines the effectiveness of blended learning in ICT Vocational Schools. This research used a quantitative approach. The questionnaires were used as a data collection tool in this study. Questionnaires were distributed to 20 respondents (teachers and students at several ICT Vocational Schools in Bali, Indonesia) for initial data needs and distributed to fourexperts to obtain data on the TOPSIS calculation effectiveness results. The analysis technique in this research was carried out by comparing the percentage of effectiveness test results with the standards. The results of this research showed that the simulation of TOPSIS method calculation in the Discrepancy-Tat Twam Asi evaluation model had run more effectively, as indicated by score was 93.13%. The simulation results showed the dominant indicator that determines the effectiveness of the blended learning implementation was I-2 (the existence of academic community support).

Page 1 of 1 | Total Record : 7