cover
Contact Name
hendri
Contact Email
hendri
Phone
-
Journal Mail Official
hendri.chan@gmail.com
Editorial Address
-
Location
Kota banda aceh,
Aceh
INDONESIA
Cyberspace: Jurnal Pendidikan Teknologi Informasi
ISSN : 25982079     EISSN : 25979671     DOI : -
Core Subject : Science, Education,
Cyberspace Journal is an open access, peer-reviewed journal that will consider any original scientific article that expands the field of information technology education and various other related applied computer sciences themes. The journal publishes articles of interest to Information technology teachers, researchers and practitioners. Manuscripts must be original and educationally interesting to the audience in the field. The goal is to promote concepts and ideas developed in this area of study by publishing relevant peer-reviewed scientific information and discussion. This will help information technology practitioners to advance their knowledge for greater benefit and output in their professional contexts.
Arjuna Subject : -
Articles 5 Documents
Search results for , issue " Vol 2, No 1 (2018)" : 5 Documents clear
ANALYZING CLIENT-SIDE ENCRYPTION IMPLEMENTED IN CRYPTDB Maisura, Mira
CYBERSPACE: Jurnal Pendidikan Teknologi Informasi Vol 2, No 1 (2018)
Publisher : UIN Ar-Raniry

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (439.257 KB) | DOI: 10.22373/cs.v2i1.2852

Abstract

Client side encryption has become one of the choice for data security in outsourced database as it is believed to provide more security than the server side encryption. It allows users to protect their data and prohibit access to that data from unauthorized user. Here, key use for encryption and decryption are all belong and known only to the user. On the other words, data stored in the database are all in encrypted form. CryptDB, a new cryptographic technique, where the system acts as a proxy to protect the communication between the application server and database server, implementing the idea. The aim of this study is to look into more detail about the encryption scheme implemented in CryptDB in 2 different case study, using SEARCH command with the condition given. The result of the study will present how the statement change with the act of proxy, and the encryption scheme implemented here.
DNS FILTERING: A CLEAN AND POSITIVE INTERNET ENVIRONMENT IN UIN AR-RANIRY BANDA ACEH Rusmansyah, Rusmansyah; Mizuardy, Hendy; Yusuf, Bustami
CYBERSPACE: Jurnal Pendidikan Teknologi Informasi Vol 2, No 1 (2018)
Publisher : UIN Ar-Raniry

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (684.958 KB) | DOI: 10.22373/cs.v2i1.2502

Abstract

The rapid IT development has brought us to the different level of an era; information openness. The information is now easily accessed through the internet. It is believed that the internet comes with many things that benefited human life. Despite its advantages, the internet also will bring problems if it is improperly used. To cope with the problems, it is important to create a safe, clean, and positive internet environment. A positive internet program, initiated by Kemkominfo Indonesia, is actively distributed to achieve this goal. We observed whether this program is feasible to be applied in a university. Our experiment object is students in Universitas Islam Ar-raniry Banda Aceh. We found that most of the students, about more than 90%, believe that a positive internet environment is important to be implemented. Moreover, a positive internet environment also will give positive impact to their personality and behavior. To realize the implementation, we have compared DNS filtering products which are able to block negative-content websites. Form our experiments, we recommend that the university apply DNS Nawala because it performs better by blocking more than 40% tested negative websites, compared to the other tested DNS products. So regarding the opinion of the students, DNS Nawala is feasible to be implemented to realize a clean, safe, and positive internet environment
AN INFORMATION SYSTEM SUCCESS MODEL FOR CLOUD COMPUTING IN INFORMATION TECHNOLOGY PROJECT Zulfan, Zulfan
CYBERSPACE: Jurnal Pendidikan Teknologi Informasi Vol 2, No 1 (2018)
Publisher : UIN Ar-Raniry

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (809.867 KB) | DOI: 10.22373/cs.v2i1.2661

Abstract

Cloud computing is becoming an attractive technology due to its dynamic scalability and effective usage of the resources, it can be utilized under circumstances where the availability of resources is limited. The main aim of this study is to develop an IS successful model for cloud computing in IT project environment. There were 38 respondents participated in this study. Data were collected by surveys and analyzed by SPSS. The findings of the study revealed that the system under study was quite successful on use of cloud computing in IT project assignment and very useful. In addition to all hypotheses in this study were interrelated.
STUDI EVALUASI PENGGUNAAN SOFTWARE BAJAKAN DI KALANGAN MAHASISWA FTK UIN AR-RANIRY Abdul Majid, Basrul; Vivianie, Sari; Yusuf, Bustami
CYBERSPACE: Jurnal Pendidikan Teknologi Informasi Vol 2, No 1 (2018)
Publisher : UIN Ar-Raniry

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (538.174 KB) | DOI: 10.22373/cs.v2i1.2663

Abstract

The use of pirated computer software among univetrsity’s students today is very vulnerable. This is due to two factors, namely; 1) the lack of awareness of the students from type of software they use, 2) and also the lack of understanding of the students about halal-haram in using pirated software. In this study, the authors intends to know the awareness and understanding of computer users, especially among students of pirated software both in terms of impact, legal, or risk from the use of pirated software. The study involved 200 students of the Faculty of Tarbiyah and Teacher Training of Ar-raniry State Islamic University of Banda Aceh, as selected by random. The results of this study showed 36% of students do not understand about pirated software and almost 65% of students are not aware of the risks caused by the use of pirated software and the legal dangers of the use of pirated software. In addition 62% of students currently using pirated software want to switch to using original software or opensource software.
KENDALA DALAM IMPLEMENTASI E-GOVERNMENT PADA PEMERINTAH KABUPATEN PIDIE Musfikar, Rahmat
CYBERSPACE: Jurnal Pendidikan Teknologi Informasi Vol 2, No 1 (2018)
Publisher : UIN Ar-Raniry

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (664.741 KB) | DOI: 10.22373/cs.v2i1.2746

Abstract

Nowadays, we are faced with technological era, where the use of information and communication technology in the world is growing rapidly. The government program to realize the application of technology information is E-Government. The implementation of E-Government in Indonesia is highly growing and there are laws and regulations on E-Government from Indonesia government. Currently, the Government of Indonesia has reached the stage of evaluation through E-Government Rating Indonesia. This study aimed to know the obstacles in implementing E-government in Pidie district government. This study used previous studies, frameworks and theories to create a suitable new model in Pidie District. To propose a new model, this study attempted to combine, synthesize and conduct a re-factor. The methodology used in this study is a quantitative approach by using questionnaire distribution technique to government employees. The method for sampling used is nonprobability technique namely purposive sampling. Data analysis technique used in this research is Partial Least Square (PLS). The technique used to test the hypothesis statistically is bootstrapping on the PLS. The hypothesis proposed in the study is that there were 3 obstacles in implementing e-government in Pidie district government. The results of this study shows that the obstacles that greatly affected the implementation of e-government in Pidie government was the organizational factor, while the other two factors, Human Resources (HR) and the infrastructure factor, did not show a significant effect.

Page 1 of 1 | Total Record : 5