Jurnal Manajemen Informatika Medicom (JMI)
https://journals.joninstitute.org/index.php/JMI
<p>The Jurnal Manajemen Informatika Medicom (JMI) diterbitkan secara berkala (satu tahun dua kali yaitu Maret dan September) dengan tujuan untuk menyebarluaskan hasil riset bidang teknologi dan informasi kepada para akademisi, praktisi, mahasiswa, dan lain-lain. Jurnal Manajemen Informatika Medicom (JMI) menerima kiriman artikel hasil riset bidang Ilmu Komputer, teknologi dan informasi yang ditulis dalam Bahasa Indonesia atau Bahasa Inggris. Penulis harus menyatakan bahwa artikel yang dikirim ke Jurnal Manajemen Informatika Medicom (JMI) tidak dikirimkan atau telah dipublikasi dalam jurnal yang lain.</p>Institute of Computer Science (IOCS)en-USJurnal Manajemen Informatika Medicom (JMI)2337-8697Development of Contract Management SOP with it Service Providers Supplier Based on the Framework Cobit 5 and ITIL V3 Hospital Case Study Dr Ramelan Navy
https://journals.joninstitute.org/index.php/JMI/article/view/48
<p>RSAL Dr. Ramelan is a naval hospital in Surabaya. It is currently developing its Management Information Systems (MIS) with the supplier of IT (Information Technology) service providers. Problems arose when the management change interfere with MIS development. The current management wanted to change MIS supplier before the development process is completed. This can cause financial and time losses. The process of supplier selection, negotiation, contracting and fulfillment control of supplier contracts to always fit the needs of the business is conducted at the Supplier Management. This study aims to make a reference to the management of IT service provider suppliers contracts in the form of SOP (Standard Operating Procedure) which is based on the COBIT 5 framework domain APO10 Manage Supplier and ITIL V3 Supplier Management. Formulation of IT service providers supplier contract management in RSAL Dr. Ramelan SOP document is carried out in four stages. The first stage is the observation of IT services in RSAL Dr. Ramelan. The second stage is the stage of the analysis. This stage is to identify COBIT 5 Manage Supplier and ITIL V3 Supplier Management activities and mapping the activities. Having formed a new activity, adjustments are made to the Regulation of the President of the Republic of Indonesia No. 54 of 2010 concerning the Procurement of Goods and Services. In the third stage, SOP document preparation is done by decomposition of these activities to become sequential action steps. The last stage is the stage of evaluation and improvement, which begins with the verification done in RSAL Dr. Ramelan, then the improvement is done based on the results of verification. The result of this study is an IT service providers supplier contract management SOP document that has been tailored to the condition in RSAL Dr. Ramelan. From the result of the evaluation, it is known that the SOP produced was still in need for improvement in terms of grammar, role and order activity. The SOP document that has been evaluated before has been corrected and improved based on the feedback given by RSAL Dr. Ramelan. </p>Yundha Puspadini
Copyright (c) 2024 Jurnal Manajemen Informatika Medicom (JMI)
2024-03-302024-03-301111610.35335/jmi.v11i1.48System Quality Development and Analysis Seminar Management Information Web-Based in Department of Education Electronic Engineering and Information
https://journals.joninstitute.org/index.php/JMI/article/view/49
<p>This study aims to: 1) develop a web-based seminar management information system. 2) determine the quality level of the web-based seminar management information system developed. The research method used in this study is Research and Development (R&D) with a waterfall development model that refers to the rules of software engineering Pressman (2010). The stages that are passed are communication (communication), planning (planning), modeling (modeling), construction (construction), and distribution (deployment). Software quality analysis is carried out by adopting the ISO 25010 standard, namely aspects of functional suitability, performance efficiency, compatibility, usability, reliability, security, maintainability, and portability. The results of this study are 1) the seminar management information system was built using the PHP programming language and the Postgre database. The frameworks used are CodeIgniter and AdminLTE (Bootstrap). This information system has 7 levels of users, namely administrator, committee (committee), reviewer, main speaker (presenter), second speaker (non-presenter), participant (audience), and visitor (guest). 2) the results of the analysis of software quality by adopting the ISO 25010 standard are as follows: (1) function suitability aspects with 100% success; (2) the performance efficiency aspect obtained a Yslow score of 92.97 (grade A); (3) the compatibility aspect can run well on the 4 tested web mails; (4) the usability aspect obtained a raw SUS score of 73.00, acceptability ranges with acceptable results, grade scale with C results, and adjective ratings with good results; (5) reliability aspect with 100% result; (6) security aspect with the result of security vulnerability being at level 1 (low); (7) maintainability aspect with maintainability index result 90.81 (high category); (8) the portability aspect can run well on the 5 web browsers tested.</p>Ghofarudin Kusaini
Copyright (c) 2024 Jurnal Manajemen Informatika Medicom (JMI)
2024-03-302024-03-3011171310.35335/jmi.v11i1.49Development and Analysis Report Information System Quality Web-Based Student Learning Outcomes at SMK Negeri 1 Banyumas
https://journals.joninstitute.org/index.php/JMI/article/view/50
<p>The purpose of this study was to develop an information system for reporting student learning outcomes at SMK Negeri 1 Banyumas, knowing the level of quality of the information system reporting student learning outcomes based on quality testing in accordance with ISO 25010 standards. The method used in this study was Research and Development (R&D). The development of this information system is carried out in 4 stages according to the waterfall method, namely the analysis stage, the design stage, the coding or implementation stage and the testing stage. The results of this study are 1) a web-based student learning outcome report information system developed with the Codeigniter 3.0 framework. and has the main features to import, manage, print, and display student report cards. 2) the test results show that the information system has met the ISO 25010 standard in aspects (1) functional suitability runs 100% and has a value of X=1; (2) performance efficiency can load pages in 3.2 seconds, PageSpeed performance of 94% (grade A) and YSlow of 90% (grade A); (3) usability, the percentage value is 84.69%; (4) security, with the level of vulnerability to attacks at level 1 (low); (5) reliability, with 100% session, hits and pages results; (6) maintainability has a maintainability index value of 68.28; (7) portability ran successfully on 5 different desktop browsers tested without error. PageSpeed performance of 94% (grade A) and YSlow of 90% (grade A); (3) usability, the percentage value is 84.69%; (4) security, with the level of vulnerability to attacks at level 1 (low); (5) reliability, with 100% session, hits and pages results; (6) maintainability has a maintainability index value of 68.28; (7) portability ran successfully on 5 different desktop browsers tested without error. PageSpeed performance of 94% (grade A) and YSlow of 90% (grade A); (3) usability, the percentage value is 84.69%; (4) security, with the level of vulnerability to attacks at level 1 (low); (5) reliability, with 100% session, hits and pages results; (6) maintainability has a maintainability index value of 68.28; (7) portability ran successfully on 5 different desktop browsers tested without error.</p>Avidah Amalia Zahro
Copyright (c) 2024 Jurnal Manajemen Informatika Medicom (JMI)
2024-03-302024-03-30111142010.35335/jmi.v11i1.50Bandwidth Management Design Analysis for Computer Network Infrastructure at SMKN 1 Abdya
https://journals.joninstitute.org/index.php/JMI/article/view/51
<p>The need for internet in the learning process has a very significant role so that in its use it is necessary to regulate access and manage bandwidth well for the smooth internet access. This research was conducted to analyze the differences in bandwidth management design for computer network infrastructure in the old design and the new design at SMKN 1 ABDYA. This study aims to see how to analyze the difference in delay and throughput in the bandwidth management design of old and new computer networks. In this study using qualitative research methods where the data obtained by means of observation, interviews and documentation. This research uses the Wireshark version 2.6 application. 6 to see the use of delay and throughput on the bandwidth management design of old and new computer networks. Based on the results of the calculation of the use of delay and throughput using the Wireshark 2.6.6 application, there is a significant difference between the use of delay and throughput in the design of bandwidth management for the old computer network and the design of bandwidth management for the new computer network.</p>Elvi Herlina
Copyright (c) 2024 Jurnal Manajemen Informatika Medicom (JMI)
2024-03-302024-03-30111212510.35335/jmi.v11i1.51Analysis of Lapan Security Access Based on Firewall Log in Center Eight
https://journals.joninstitute.org/index.php/JMI/article/view/52
<p>Analysis of Network Security Access Space Agency Based Firewall Log In LAPAN Center. Supervisor LIPUR SUGIYANTA, Ph.D and Drs. BACHREN ZAINI, M.Pd. Increased Denial Of Service attacks, and other types of computer network interference, making security an important issue to be considered by all those who take advantage of the presence of the virtual world today. LAPAN Center system along with the information contained within is no exception contained attacks on access computer network security. Such attacks can be prevented at an early stage by analyzing at each access that will go on network security in LAPAN. This research at Analysis of Network Access to know and learn access of network security in firewall log LAPAN Center. This research was conducted with several stages of observation and interviews to employees of LAPAN Center infrastructure. After the stage of observation and interviews, the researchers conducted further data collection and analysis of firewall logs. The study states that the analysis of security access network based firewall log in LAPAN Center in the form of six messages that occur when a network will pass through the firewall. It can be concluded that by doing some analysis phases of network security access based firewall log in LAPAN Center produces a record of every incident inside the firewall logs. The study states that the analysis of security access network based firewall log in LAPAN Center in the form of six messages that occur when a network will pass through the firewall. It can be concluded that by doing some analysis phases of network security access based firewall log in LAPAN Center produces a record of every incident inside the firewall logs. The study states that the analysis of security access network based firewall log in LAPAN Center in the form of six messages that occur when a network will pass through the firewall. It can be concluded that by doing some analysis phases of network security access based firewall log in LAPAN Center produces a record of every incident inside the firewall logs.</p>Adityo Jaya Subakti
Copyright (c) 2024 Jurnal Manajemen Informatika Medicom (JMI)
2024-03-302024-03-30111263110.35335/jmi.v11i1.52