January 2024
·
5 Reads
Procedia Computer Science
This page lists the scientific contributions of an author, who either does not have a ResearchGate profile, or has not yet added these contributions to their profile.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
January 2024
·
5 Reads
Procedia Computer Science
November 2023
·
135 Reads
·
3 Citations
SEIKO Journal of Management & Business
This paper explores the digital transformation of village head elections in Sukadana, Indonesia, with a focus on the implementation of database-driven technology. We examine the transition from traditional paper-based voting methods to electronic voting systems and the impact on voter participation, transparency, and the overall electoral process. We also analyze the results of this transformation, identify challenges encountered during the process, and draw lessons from this case study. Furthermore, we provide recommendations for other rural areas considering a similar digital shift. Our findings highlight a significant increase in voter participation, improved process transparency, and the potential for enhancing democracy at the village level. The success of this digital revolution in a rural context underscores the importance of a tailored approach to technology adoption in such settings, considering local needs and addressing security concerns.
October 2023
·
11 Reads
October 2023
·
22 Reads
The rapid advancement of technology can influence every individual, organization, and even government in the accurate, effective, and efficient delivery of information. The XYZ local government is a governmental institution that serves the community in the field of trade. Information related to the XYZ regional government is directly managed by the XYZ Regional Communication and Information Office (Diskominfo), an institution specializing in technology and informatics. Diskominfo leverages technological progress to disseminate information to the community of the XYZ region, particularly those involved in trade, through their website, with the goal of facilitating the acquisition of accurate, precise, and reliable data directly. With the evolution of technology, the security of a website assumes increasing importance, as it can prevent attacks from irresponsible entities that may disrupt the system and harm the website owner. During the analysis process, the author simulates the role of an attacker to identify security vulnerabilities and weaknesses present on the XYZ local government website. This entails an analysis of security gaps aimed at determining the level of risk and confidence in the website. In the examination of security vulnerabilities, the author identifies 42 alerts, categorized into four risk levels: 9 vulnerabilities with a high-risk level, 13 with a medium-risk level, 11 with a low-risk level, and 9 with an informational risk level.
August 2023
·
559 Reads
·
16 Citations
The rapid development of technology has impacted various aspects of life, including the way individuals, organizations, and governments deliver accurate, effective, and efficient information. XYZ local government, which is responsible for serving the community in the trade field, manages its information through the Communication and Information Agency (Diskominfo) of the XYZ region. Diskominfo employs technological advancements to provide the people of the XYZ region with direct access to accurate, precise, and reliable data through their website. However, the security of the website has become a crucial aspect to prevent attacks from malicious individuals that can cause damage to the system and harm the website owner. To analyze the website's security loopholes and vulnerabilities, the author performed a simulation of an attacker. The analysis aimed to evaluate the level of risk and confidence in the website. The results showed 42 alerts categorized into four risk levels: 9 vulnerabilities with a high-risk level, 13 vulnerabilities with a medium-risk level, 11 vulnerabilities with a low-risk level, and 9 vulnerabilities with an informational-risk level.
December 2021
·
238 Reads
·
1 Citation
Internetworking Indonesia Journal
Information technology (IT) has been widely applied in various aspects of life, one of them through the IT implementations in hospitals to carry out administrative activities that aim to facilitate data processing and make existing operational activities run more effectively and efficiently. In this case of Muhammadiyah Sumberrejo Islamic Hospital, which requires a server room that is useful as a data center for IT management. It has a long-term plan to develop fair distribution of service in the form of the room heating, ventilation, air conditioning (HVAC) system based on humidity and temperature standard. Thus, it is necessary to design a monitoring system to align with the contextual setting and requirements. In this study, a data center for the Hospital will be designed using the standard of TIA-942 humidity and temperature while the PPDIOO Network Life-Cycle Approach method used for the development process. The result will be in accordance with the HVAC arrangement within the room.
September 2021
·
1,324 Reads
·
5 Citations
Indonesian Journal of Electrical Engineering and Computer Science
p> The rapid development of information technology has made security become extremely. Apart from easy access, there are also threats to vulnerabilities, with the number of cyber-attacks in 2019 showed a total of 1,494,281 around the world issued by the national cyber and crypto agency (BSSN) honeynet project. Thus, vulnerability analysis should be conducted to prepare worst case scenario by anticipating with proper strategy for responding the attacks. Actually, vulnerability is a system or design weakness that is used when an intruder executes commands, accesses unauthorized data, and carries out denial of service attacks. The study was performed using the AlienVault software as the vulnerability assessment. The results were analysed by the formula of risk estimation equal to the number of vulnerability found related to the threat. Meanwhile, threat is obtained from analysis of sample walkthroughs, as a reference for frequent exploitation. The risk estimation result indicate the 73 (seventy three) for the highest score of 5 (five) type risks identified while later on, it is used for re-analyzing based on the spoofing, tampering, repudiation, information disclosure, denial of service, and elevation of prvilege (STRIDE) framework that indicated the network function does not accommodate the existing types of risk namely spoofing. </p
April 2021
·
1,023 Reads
·
8 Citations
Bulletin of Electrical Engineering and Informatics
Currently, cloud service providers have used a variety of operational mechanisms to support the company's business processes. Therefore, the services are stored on the company's server, which presents in the form of infrastructure, platform, software, and function. There are several vulnerabilities that have been faced in the implementation such as system failure, natural disasters, human errors, or attacks from unauthorized parties. In addition, the time of unavailability of services can be minimized by doing an LM, in which many servers have been used the containers to behave like a service provider. Actually, its existence replaces the virtual machine that requires more resources although the process only can be done through docker with checkpoint and restore in userspace (CRIU). In this research, LM processes are done to the docker container using CRIU by analyzing the quality of service (QoS), memory, and CPU usage. Thus, the simulation is carried out by establishing the LM using 2 (two) different platforms through scenarios with one and three containers respectively. The performance analysis results aim to examine several indicators in comparison with the achievable result to reduce problems that occurred in the cloud service.
January 2021
·
294 Reads
Internetworking Indonesia Journal
In container technology, the deployment process becomes more complicated, time-consuming, and has extensive resources, hence, there is a necessity for a faster and more practical process. A very familiar one used among IT engineers and technicians is Kubernetes. Meanwhile, the configuration management tool for deployment that widely known is Ansible, as an innovation machine that enables automation for cloud availability, configuration management, application deployment, intra-service orchestration, and other IT needs. This study analyses the performance of Ansible configuration management tools to deploy a Content Management System (CMS) platform that is WordPress and MySQL using Ubuntu 16.04 LTS as a management node and target deployment. The parameters used in this test are measured in terms of the time interval, CPU usage, memory usage, and configuration management. It also analyzed the deployment of the Ansible automation engine to develop Odoo Server using the Google Cloud Platform (GCP). The measurements of the Ansible configuration showed that nodes do not affect the time interval. On CPU usage, the more the number of nodes, the smaller the CPU usage. The memory (RAM) usage on the number of different nodes indicates that the results are unstable. Meanwhile, this study also compares the Ansible automation engine between manual and automation development.
December 2020
·
188 Reads
·
5 Citations
Auto repair is a series of activities that engage in the field of body repair and painting services of car and motorcycle. The ultimate goal is to provide the best service and quality standards to customers by running the proper response processes, which lead the increased customer satisfaction to be achieved. Importantly, every company required the security system and mechanism to maintain the existing system as an effort to protect and overcome problems related to data privacy, transactions and communication. This study explores the problem and challenges faced by the respected company to generate an access control matrix for logical and physical assets as well as service operation procedure. The focus primarily in the development of Security Operation Center (SOC) as the front gate of the company to offer various services to the customers. SOC is a key enabler for operators who aspire to differentiate themselves based on customer experience and demand. A successful SOC application can help operators to reduce the pressure and improve operational efficiency.
... This ensures that the processes in operation are transparent and comprehensible to each functional dimension of the process flow chart and the procedures outlined within it. Phase 3, Streamlining goal is to increase the efficiency, effectiveness, and adaptability of ongoing business operations by streamlining procedures by shortening processing times, standardising procedures, or upgrading procedures [28][29][30][31][32]. Phase 4, Measurements, and controls business processes involves looking at and measuring anticipated organisational goals to influence the direction of those processes [33][34][35]. Phase 5, Continuous improvement is carried out in the stages below with the aim of achieving the implementation of the next improvement process with various processes such as changing, deleting, adding processes, and so on. [36][37][38][39][40]. ...
November 2023
SEIKO Journal of Management & Business
... Advances in information [1] and communication [2] technology continue to grow over time [3]. This has led to significant changes in social [4], economic and political conditions [5]. ...
August 2023
... This model categorizes unknown binary samples as benign files or ransomware. The evaluation utilized a personal computer with a Core i5 CPU and 12GB RAM, testing on Windows 10 (64-bit) across two distinct operating systems [30]. ...
September 2021
Indonesian Journal of Electrical Engineering and Computer Science
... CRIU (Checkpoint Restore in Userspace, pronounced kree-oo) is a tool for checkpointing and restoring applications in GNU/Linux environments [11,9]. With CRIU, it is possible to stop an application, save the working memory on disk, and restore the state later. ...
April 2021
Bulletin of Electrical Engineering and Informatics
... Currently, the dangers related to digital security are increasingly real and disturbing. Valuable data and information can be easily accessed by unauthorized parties or interfered with by malicious actors [1]. According to NCSI, the condition of cyber security in Indonesia is in 84th position out of the total countries that have been audited by NCSI [2] . ...
December 2020
... Table 3 above highlights the value of integrating digital kecerdasan into a business that places a strong emphasis on technology. This integration has several positive effects that are significant for an organization's productivity and capacity to react to the continuously changing business environment [21][22][23][24][25][26][27][28][29][30][31][32][33][34]. ...
January 2019
Procedia Computer Science
... The backup and restore model in the relationship between DC and DRC that provides redundancy services for clients via the Internet (WAN) can be used to construct Cloud service parameters. The main challenge faced today by organization is how to make better use of accumulated knowledge and experience in developing the execution plan and implementation through real policy formulation, along with how to achieve optimal social impact with relatively limited public resources [44]. It is always best to have point of view derived from the network engineers and the emergency teams to avoid dropping data packets with reasonable latency, especially in the event of a disaster [45]. ...
January 2020
Indonesian Journal of Electrical Engineering and Computer Science