cover
Contact Name
Andi Wahju Rahardjo Emanuel
Contact Email
andi.wre@it.maranatha.edu
Phone
-
Journal Mail Official
jutisi@it.maranatha.edu
Editorial Address
-
Location
Kota bandung,
Jawa barat
INDONESIA
Jurnal Teknik Informatika dan Sistem Informasi
ISSN : 24432210     EISSN : 24432229     DOI : -
Jurnal Teknik Informatika dan Sistem Informasi (JuTISI) adalah Jurnal Ilmiah yang dibangun oleh Fakultas Teknologi Informasi, Universitas Kristen Maranatha untuk memberikan sarana bagi para akademisi dan peneliti untuk mempublikasikan karya-karya ilmiah di khalayak luas. Jurnal ini merupakan penggabungan dari Jurnal Teknik Informatika dan Jurnal Sistem Informasi yang terbit terakhir pada tahun 2014. JuTISI diterbitkan dalam 3 edisi setiap tahun mulai pada tahun 2015, yaitu pada bulan: April, Agustus, dan Desember.
Articles 18 Documents
Search results for , issue " Vol 3 No 1 (2017): JuTISI" : 18 Documents clear
HALAMAN BELAKANG Redaksi, JuTISI
Jurnal Teknik Informatika dan Sistem Informasi Vol 3 No 1 (2017): JuTISI
Publisher : Maranatha University Press

Show Abstract | Original Source | Check in Google Scholar | Full PDF (311.244 KB) | DOI: 10.28932/jutisi.v3i1.666

Abstract

Ini adalah halaman belakang JuTISI April 2017
Tata Kelola pada Perguruan Tinggi Menggunakan Control Objective for Information & Related Technology (COBIT) 5 asriyanik, asriyanik; Hendayun, Mokhamad
Jurnal Teknik Informatika dan Sistem Informasi Vol 3 No 1 (2017): JuTISI
Publisher : Maranatha University Press

Show Abstract | Original Source | Check in Google Scholar | Full PDF (492.366 KB) | DOI: 10.28932/jutisi.v3i1.665

Abstract

A College needs a good governance in implementation of information technology, especially which related with information security because information is an important asset. Framework which can be used for the preparation of information security governance is COBIT 5 from ISACA. The first  step to start the preparation of the governance using COBIT is mapping between the goal of college with enterprise goals (EG), IT Related Goals and domain process COBIT 5. From 15 colleges that have been accredited in West Java (15 Januari 2015), produced 13 EG related for college accreditation A, B and 10 for college accreditation EG C. For a sample in process capability assessment of information security governance, we used Universitas Muhammadiyah Sukabumi (UMMI) as the research object, which is an accredited college C, and EG focused on optimization of business process functionality associated with the alignment of IT goals of IT and business strategy, and 10 processes, i.e EDM01, EDM01, APO01, APO02, APO03, APO05, APO07, APO08, BAI01, BAI02. From the results obtained capability assessment process UMMI value of 7 is on level 0, ie the value of the attribute <15-50% and 3 process closer to fulfillment level 1, ie the interval> 50-85%. Gap analysis results, it turns out that making such UMMI lack of work products (evidence / result) of activities of governance processes deemed to have been executed. To meet the achievement level, it is recommended to perform compliance on each best practice and work products, and can be initiated by creating a guide to information security.
Implementasi Metode Performance untuk Aplikasi Pemesanan Jasa Paket Dokumentasi (Studi Kasus : Quill Photo) Ramadhani, Safila Marina; Adelia, Adelia
Jurnal Teknik Informatika dan Sistem Informasi Vol 3 No 1 (2017): JuTISI
Publisher : Maranatha University Press

Show Abstract | Original Source | Check in Google Scholar | Full PDF (1177.013 KB) | DOI: 10.28932/jutisi.v3i1.664

Abstract

Quill Photo is a private business that offers photography services which still has many obstacles. Customers could only book the documentation service manually, by cell phone (to call or send a short text message to the institution). Administrator have constraints in data processing where the process is still done manually. Human Resources Development (HRD) experienced difficulty in confirming the schedule to the administrator, showing the photos to the customer, and determining the fastest performance of crew. The Logistics Section has a difficult thingto ship the photos. The execution of sending photos ineffective and inefficient when the number of the photos to be sent over quota. Therefore, the web-based application built with one method approach to Performance is expected to facilitate all users to perform activities relating to Quill Photo easily, especially for HRD which is in scheduling photo sessions and measuring the fastest performance of crew.
Analisis Digital Forensik pada File Steganography (Studi kasus : Peredaran Narkoba) Saputra, Agung Purnama; widiyasono, nur
Jurnal Teknik Informatika dan Sistem Informasi Vol 3 No 1 (2017): JuTISI
Publisher : Maranatha University Press

Show Abstract | Original Source | Check in Google Scholar | Full PDF (1258.106 KB) | DOI: 10.28932/jutisi.v3i1.663

Abstract

Kemajuan teknologi selain membawa dampak positif juga membawa dampak negatif, beberapa contoh organized crime termasuk aktivitas yang mengarah pada terorisme dan perdagangan ilegal seperti narkotika, telah teridentifikasi memanfaatkan teknik steganography untuk berkomunikasi dan menyampaikan pesan-pesan diantara kelompoknya. Steganografi  merupakan  seni  dan  ilmu  menulis  atau  menyembunyikan pesan  tersembunyi  dengan  cara  tertentu  sehingga  selain  si  pengirim  dan  si penerima,  tidak  ada  seorang  pun  yang  mengetahui  atau  menyadari  bahwa  ada suatu  pesan  rahasia. maka peran digital forensik sebagai metode pembuktian suatu kasus kejahatan secara digital menjadi sangat penting, Digital forensik adalah penggunaan teknik analisis dan investigasi untuk mengidentifikasi, mengumpulkan, memeriksa dan menyimpan bukti/informasi yang secara magnetis tersimpan/disandikan pada komputer atau media penyimpanan digital sebagai alat  bukti dalam mengungkap kasus kejahatan yang dapat dipertanggungjawabkan secara hukum. Maksud dan tujuan dari penulisan tugas akhir ini adalah untuk menjelaskan cara menemukan bukti digital yang tersembunyi menggunkan teknik steganografi, sehingga informasi yang diperoleh merupakan sebuah fakta yang akurat sesuai peruntukannya. Terdapat banyak tools yang dapat digunakan dalam kasus forensik untuk memeriksabarang bukti, namun dalam penelitian ini tools yang digunakan adalah WinHex dan InvisibleSecrets.
EVALUASI ALGORITMA RUNUT BALIK DAN SIMULATED ANNEALING PADA PERMAINAN SUDOKU Rahayu, Dyah Sulistyowati; Suryapratama, Arie; Amongsaufa, Azka Zulham; Koloay, Bheli Isya Kurniawan
Jurnal Teknik Informatika dan Sistem Informasi Vol 3 No 1 (2017): JuTISI
Publisher : Maranatha University Press

Show Abstract | Original Source | Check in Google Scholar | Full PDF (678.637 KB) | DOI: 10.28932/jutisi.v3i1.662

Abstract

Sudoku is one of the popular puzzle games in many countries. How to solve this game is being the Non Polynomial Completeness problem. Because of that, a lot of research has been done to find the most effective algorithm completing Sudoku. This study presents the evaluation of algorithm in completing the Sudoku 2 x 2 and 3 x 3. The most common algorithm is brute force and backtracking. There is also simulated annealing algorithm. The evaluation is done by comparing the step of each algorithm to solve the Sudoku and also their running time. The result of this evaluation shows the differences of each algorithm characteristic in solving this Sudoku problem. By comparing the result of this study, the most effective algorithm can be chosen. Based on the test, concluded that the backtracking algorithm is more effective than the simulated annealing algorithm which the value reach 50%.
Pengembangan Sistem Informasi Penjadwalan dan Manajemen Keuangan Kegiatan Seminar dan Sidang Skripsi/Tugas Akhir (Studi Kasus Program Studi Sistem Informasi UNIKOM) Wibawa, Julian Chandra; F., Muhammad Rajab
Jurnal Teknik Informatika dan Sistem Informasi Vol 3 No 1 (2017): JuTISI
Publisher : Maranatha University Press

Show Abstract | Original Source | Check in Google Scholar | Full PDF (1352.024 KB) | DOI: 10.28932/jutisi.v3i1.661

Abstract

Saat ini penerapan teknologi informasi banyak dimanfaatkan dalam berbagai bidang, tidak terkecuali pada bidang pendidikan. Pada sebuah instansi pendidikan tentunya sangat membutuhkan sistem informasi dalam mengatur kegiatan akademik yang cepat, efektif, efisien, akurat untuk meningkatkan standar mutu pendidikan pada instansi pendidikan tersebut. Kegiatan akademik, terutama pada kegiatan penjadwalan dan manajemen keuangan untuk seminar dan sidang tugas akhir / skripsi di Program studi Sistem Informasi UNIKOM perlu didukung oleh sistem infomasi berbasis teknologi informasi yang dapat memudahkan kegiatan tersebut. Permasalahan yang terjadi saat ini antara lain pembuatan jadwal yang memakan waktu yanglama dan sering kali terjadi bentrok, hingga proses perhitungan honorarium yang masih dilakukan secara manual sehingga beresiko terjadinya kesalahan perhitungan. Penelitian diawali dengan studi literatur, pengumpula data, perancangan, pengujian, dan penyajian perangkat lunak. Dengan adanya SISPMK (Sistem Informasi Penjadwalan dan Manajemen Keuangan) dapat membantu kegiatan penjadwalan kegiatan seminar dan sidang skripsi  / tugas akhir menjadi lebih mudah, meminimalisir resiko terjadinya bentrok antar dosen maupun ruangan kelas dan perhitungan honorarium dan pelapoan keuangan kegiatan seminar dan sidang skripsi  / tugas akhirmenjadi lebih cepat. Kata Kunci— Sistem Informasi, Penjadwalan, Manajemen Keuangan, Skripsi dan Tugas Akhir.
Performance Analysis of NFS Protocol Usage on VMware ESXi Datastore Panca, Billy Susanto
Jurnal Teknik Informatika dan Sistem Informasi Vol 3 No 1 (2017): JuTISI
Publisher : Maranatha University Press

Show Abstract | Original Source | Check in Google Scholar | Full PDF (953.341 KB) | DOI: 10.28932/jutisi.v3i1.660

Abstract

Hypervisor virtualization that uses bare metal architecture allows to allocate and provide resources for each created virtual machines. Resources such as: CPU and memory, can be added or upgraded anytime to the host hardware (virtualization server) to be able to create more virtual machines. However, upgrading the hard drive size cannot be done anytime if there are already have data or virtual machine that has fully operated on the host hardware, related to the raid system and the establishment of hard drive partition.Upgrading hard drive size on virtualization server can be done by using NFS protocol on NAS server. VSphere ESXi able to use NFS protocol and store the virtual disk that is used by virtual machine as guest operating system on network storage besides using local hard drive (host hardware hard drive). When the virtual machine want to run the guest operating system, it will request to write/read virtual disk there is stored on NAS by using NFS protocol through the network.In this research, measurements has been taken on data communication performance due the usage of NFS as virtual machine’s datastore in addition to local hard drive usage on server’s device. Measurements were performed by sending various data size from client to server (virtual machine) and measure write/read speed on server’s cache memory and hard drive, and measure RTT (Round-trip Time) delay between client-server. The testing has been conducted on virtual machines that use local drive and NFS as virtual disk datastore.
IMPLEMENTASI TWO FACTOR AUTHENTICATION DAN PROTOKOL ZERO KNOWLEDGE PROOF PADA SISTEM LOGIN Sudiarto Raharjo, Willy; E.K. Ratri, Ignatia Dhian; Susilo, Henry
Jurnal Teknik Informatika dan Sistem Informasi Vol 3 No 1 (2017): JuTISI
Publisher : Maranatha University Press

Show Abstract | Original Source | Check in Google Scholar | Full PDF (1001.856 KB) | DOI: 10.28932/jutisi.v3i1.659

Abstract

Abstract — This paper describes a login system utilizing Two Factor Authentication and Zero Knowledge Proof using Schnorr NIZK. The proposed system is designed to prevent password leak when being sent over insecure network or when used in an untrusted devices. Zero Knowledge Proof is used  for maintaining the confidentiality of the password and Two Factor Authentication is used to secure login process on untrusted devices. The proposed system has been tested and initial results indicates that such system is able to secure the login process without leaking the user’s password. Keywords— Authentication, Security, Two Factor Authentication, Password, Zero Knowledge Proof
Analisis Penerapan Single Page Application Menggunakan Teknologi AJAX dan REST API (Studi Kasus :Sistem Informasi Reservasi Wisma Tamu UKSW) Azhari, Adib Luqman; Tanone, Radius -
Jurnal Teknik Informatika dan Sistem Informasi Vol 3 No 1 (2017): JuTISI
Publisher : Maranatha University Press

Show Abstract | Original Source | Check in Google Scholar | Full PDF (959.802 KB) | DOI: 10.28932/jutisi.v3i1.658

Abstract

Developments of web for information system today are really popular. We can access the system from anywhere by internet connection. This paper focus on design of the web application that using Single Page Application concept. Using AJAX technology the application will provide an interactive user experience, also the effective and efficiency usage of bandwith also be considered. The result of this paper shows that implement Single Page Application concept still make the web bandwith usage effective and efficient if accessible by user. Keywords— Single Page Application, AJAX, REST API.
Perancangan Desain Interface E-Learning Berbasis Web dengan Pendekatan Kansei Engineering Isa, Indra Griha Tofik; Hadiana, Ana
Jurnal Teknik Informatika dan Sistem Informasi Vol 3 No 1 (2017): JuTISI
Publisher : Maranatha University Press

Show Abstract | Original Source | Check in Google Scholar | Full PDF (919.725 KB) | DOI: 10.28932/jutisi.v3i1.657

Abstract

Human Computer Interaction is how to make a good communication between computer and user. In its development, not only focused on usability aspect and technical, but also how to make product more persuasive in psychological aspect. Kansei Engineering (KE) comes to fulfill the product designing which involves user’s psychological or affective factors. There are several KE method in designing product, one of them is Kansei Engineering Type I which is involved in this research. The purpose in this research is to know some psychological factors related with web based interface e-learning design and how to make web based e-learning guideline matrix recommendation by Kansei Engineering Type I.  10 web based e-learning specimens, 20 Kansei Words and 30 participants are involved in the research.

Page 1 of 2 | Total Record : 18