Articles

Found 15 Documents
Search

EMPLOYEE PERFORMANCE MEASUREMENT IN TELEWORKING USING BALANCED SCORECARD Arso, Sunu Sugi; Sfenrianto, Sfenrianto; Wahyudi, Mochamad
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 6: December 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (594.25 KB) | DOI: 10.11591/ijece.v8i6.pp5178-5184

Abstract

Key Performance Indicator (KPI) must be aligned with the development of the organization. PT. Mitra Intregrasi Informatika (MII) in its development decided to change the traditional way of work to modern telework. This encourages companies to adjust employee?s KPI from the traditional way of work turns in to telework. In order to perform KPI measurement of its employees based on teleworking, this research uses balanced scorecard method approach that is by taking into account financial, customer, and internal business process and learning and growth perspective. The results of this study are the design proposal KPI employees to accommodate telework at the company. Then KPI employee test results showed an increase in the average value of the employee KPI of 0.295 points (9.47%) of the old KPI. Thus, it is recommended to the company to implement the employee KPI.
KLASIFIKASI SISWA SMK BERPOTENSI PUTUS SEKOLAH MENGGUNAKAN ALGORITMA DECISION TREE, SUPPORT VECTOR MACHINE DAN NAIVE BAYES nurajijah, nurajijah; Ningtyas, Dwi Arum; Wahyudi, Mochamad
Jurnal Khatulistiwa Informatika Vol 7, No 2 (2019): Periode Desember 2019
Publisher : Universitas Bina Sarana Informatika Kampus Kota Pontianak

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31294/jki.v7i2.6839

Abstract

Dropping out of school in Vocational High School students is an educational problem that must be found out the causes, so that it does not happen again in the future. The purpose of this study is to classify student data so that it can be predicted that students who have the potential to drop out of school use the Decision Tree, Naive Bayes and Support Vector Machine algorithms. Then determine which algorithm is the best. The results showed that the Support Vector Machine algorithm was the best with an accuracy of 93.77% and Area Under the Curve of 0.990.
IMPLEMENTASI WIDE AREA NETWORK MENGGUNAKAN TEKNOLOGI VPN BERBASISKAN IP MULTI PROTOCOL LABEL SWITCHING (MPLS) : STUDI KASUS PADA KAMPUS BINA SARANA INFORMATIKA Wahyudi, Mochamad
Paradigma - Jurnal Komputer dan Informatika Vol 9, No 1 (2007): Periode Januari
Publisher : AMIK BSI Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31294/p.v9i1.1150

Abstract

Wide Area Network (WAN) dipergunakan untuk menghubungkan jaringan-jaringan Local Area Network (LAN) satu dengan lainnya yang berdekatan maupun yang berjauhan dan menggunakan protokol yang sama atau berbeda-beda. Teknologi yang dapat dipergunakan untuk dapat menghubungkan WAN, antara lain: Dial Up, Leased Line, VSAT, X.25, Frame Relay, Virtual Private Network (VPN) dan lain-lain. Sedangkan teknologi terbaru yang saat ini sedang dikembangkan untuk membangun jaringan WAN yang baik (realible) dan permanen adalah Virtual Private Network (VPN) berbasis IP Multi Protocol Label Switch (VPN IP MPLS). VPN IP MPLS ini adalah suatu layanan komunikasi data any to any connections berbasis IP Multi Protocol Label Switch dengan menggunakan peralatan (hardware) dari perusahaan Cisco (berupa Cisco Router dan Cisco Switch Catalist). Kampus Bina Sarana Informatika (BSI) menggunakan teknologi VPN IP MPLS untuk menghubungkan seluruh kampusnya yang terdiri dari 35 lokasi yang tersebar dibeberapa kota yang ada di Indonesia. Kampus BSI menerapkan sistem domain berbasis sistem Operasi Windows Server 2003 untuk semua untuk yang ada dan menjalankan aplikasi online yang disebut dengan intranet.bsi.ac.id serta beberapa aplikasi lain. Untuk menghubungkan seluruh Kampus BSI jaringan global (internet), semua Kampus BSI terhubung melalui saluran Leased Line sebesar 2.048 Kbps yang terdapat pada Kampus BSI Menara Salemba yang berfungsi sebagai Backhole. 
KOMBINASI STANDAR ISO17799, SSE-CMM UNTUK PENGUKURAN TINGKAT KEMATANGAN KEAMANAN SISTEM INFORMASI PENJADWALAN Haidir, Ali; Wahyudi, Mochamad
Jurnal Informatika Vol 3, No 1 (2016): Jurnal INFORMATIKA
Publisher : LPPM Universitas BSI

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (415.591 KB) | DOI: 10.31311/ji.v3i1.315

Abstract

Abstract - Bina Sarana Informatika is one of the largest educational institutions now have to process the data with a large number. The data were processed by the existing scheduling system scheduling information, is still very vulnerable to attack or destruction committed by people who are not responsible nor caused by system failures. This study examines the level of information security in the course scheduling Bina Sarana Informatika to get accurate measurement results, and to determine the level of system security scheduling information useful as input in improving the quality of information systems security. Using qualitative research methods, that is by distributing a questionnaire that contains a list of questions based on ISO 17799 on the implementation of information security management consisting of 11 clauses. The data is processed using the results of the questionnaire maturity level to get the level of maturity of information security. This research resulted in the existing clause of 11, the average was at the level of unity (Initial / ad hoc). The conclusion that can be is that the security of information systems at the BSI scheduling still needs improvement. But there are some clauses that already meet the standards of ISO 17799, the sixth clause of management and organizational communication and seventh clause of access control.Kata Kunci: ISO 17799, Security Of Informations System, SSE-CMM. Abstrak - Bina Sarana Informatika merupakan salah satu institusi pendidikan terbesar saat ini yang harus mengolah data dengan jumlah yang banyak. Data yang diolah oleh bagian penjadwalan yang ada pada sistem informasi penjadwalan, masih sangat rentan oleh penyerangan atau perusakan yang dilakukan oleh  orang yang tidak bertanggung jawab maupun yang disebabkan oleh kegagalan sistem. Penelitian ini mengkaji tingkat keamanan informasi pada bagian penjadwalan perkuliahan Bina Sarana Informatika untuk mendapatkan hasil pengukuran yang akurat, dan untuk mengetahui tingkat keamanan sistem informasi penjadwalan yang berguna sebagai masukan dalam usaha peningkatan kualitas keamanan sistem informasi. Dengan menggunakan metode penelitian kualitatif, yaitu  dengan cara penyebaran kuisioner yang berisi daftar pertanyaan berdasarkan ISO 17799 tentang pelaksanaan manajemen keamanan informasi yang terdiri dari 11 klausa. Data hasil kuesioner diolah menggunakan maturity level untuk mendapatkan tingkat kematangan keamanan informasi. Penelitian ini menghasilkan bahwa dari 11 klausa yang ada, rata-rata berada pada level kesatu (Initial/ad hoc). Kesimpulan yang di dapat adalah bahwa keamanan sistem informasi di bagian penjadwalan BSI masih perlu perbaikan. Namun ada beberapa klausa yang sudah memenuhi standar  ISO 17799, yaitu klausa keenam tentang manajemen komunikasi dan organisasi serta klausa ketujuh tentang kontrol akses.Kata Kunci: ISO 17799, Keamanan Sistem Informasi, SSE-CMM.
Analisa Kelayakan Sistem Informasi Monitoring Listrik di PT AHM Plant3 Ardi, Yahya Mara; Wahyudi, Mochamad
JURNAL TEKNIK KOMPUTER Vol 3, No 2 (2017): JURNAL TEKNIK KOMPUTER AMIK BSI
Publisher : AMIK BSI Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (612.146 KB) | DOI: 10.31294/jtk.v3i2.1845

Abstract

Kemajuan teknologi yang semakin pesat di segala bidang kehidupan, membawa dampak yang besar bagi dunia industri. Beragam teknologi informasi kini digunakan untuk meningkatkan produktivitas produksi di setiap perusahaan, seperti penggunaan robot dalam proses produksi. Dalam prosesnya, robot serta mesin-mesin produksi tersebut membutuhkan listrik, listrik adalah salah satu bentuk energi yang tidak dapat dilihat, namun dapat dirasakan. Dalam penggunaannya, perusahaan berusaha menggalakkan karyawannya agar selalu hemat listrik, selain akan berdampak pemanasan global, listrik juga mampu menurunkan keuntungan perusahaan. Pemakaian listrik yang berlebihan dapat mengakibatkan biaya yang harus dikeluarkan perusahaan setiap bulannya menjadi semakin besar. PT AHM Plant3 adalah salah satu perusahaan otomotif terbesar di Indonesia, dan perusahaan ini juga sangat peduli terhadap lingkungan dan efisiensi pemakaian. Untuk menanggulangi masalah tersebut, PT AHM Plant3 dibuatlah sebuah sistem informasi listrik yang dikenal dengan nama Power Logic System rancangan PT Schneider Electric. Untuk mengetahui kualitas serta kelayakan sistem tersebut, dipergunakanlah sebuah framework evaluasi kualitas ISO 9126. Dengan menggunakan uji T berdasar pada kuesioner yang disebar pada beberapa sample diharapkan sistem informasi listrik dapat berguna dan memberikan manfaat bagi perusahaan.
KNOWLEDGE MANAGEMENT SYSTEM PADA DIVISI LALU LINTAS ANGKUTAN JALAN DISHUBKOMINFO KOTA PONTIANAK MENGGUNAKAN METODE SPESIFIC ACTION DAN PENDEKATAN AFTER ACTION REVIEW BERBASIS WEB DAN MOBILE APPLICATION Agustini, Syarifah Putri; Wahyudi, Mochamad
Jurnal Khatulistiwa Informatika Vol 3, No 1 (2015): Periode Juni 2015
Publisher : AMIK BSI Pontianak

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1208.871 KB)

Abstract

A good traffic system will create a condusive social condition which results the establishment of order and comfort on the street. To be able in creating a good traffic system. As the result, there is a need of of trained and fast-moving team in handling the traffic matter, in this case is a team responsible in the implementation of the traffic is Dinas Perhubungan Komunikasi dan Informatika Kota Pontianak/Dishubkominfo (Department of Communication and informatics). However, the realization of the implementation of a good traffic system is considered less optimal because of the lack of knowledge distribution among area of institution. The knowledge possessed only by some particular personnels in the form of personal experience. This kind of knowlede is called as tacit knowledge because of its invisible or unmeasured characteristic so that it easily die out or gone. It is the reason that constrain the distribution of knowledge in the area of institution. As the result, it will slow down institution’s performance in serving the people. It needs knowledge management system that can bind the tacit knowledge and document it into an explicit knowledge (visible or measured knowledge) and can be learned by other people which is Knowledge Management System (KMS). The KMS that will be developed is web and mobile application-based by using Specific Action method. Specific Action method used is developed by using After Action Review approach in such a way that it is provided to be able to capture specific action applied by the user to be reviewed further by the expertise and concluded into a new form of knowledge.
PERANCANGAN DATA WAREHOUSE PADA PERPUSTAKAAN BINA SARANA INFORMATIKA Supriyatna, Adi; Wahyudi, Mochamad
Seminar Nasional Aplikasi Teknologi Informasi (SNATI) 2012
Publisher : Jurusan Teknik Informatika, Fakultas Teknologi Industri, Universitas Islam Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Perkembangan teknologi yang sangat cepat saat ini membuat perusahaan dan pelaku bisnis harus dapat beradaptasi dengan cepat, kebutuhan akan informasi dan koneksi data untuk update informasi tidak mengenal waktu dan tempat. Pada tingkat manajemen, informasi menjadi salah satu acuan dalam proses pengambilan keputusan. Diperlukannya suatu bentuk dukungan pengolahan data yang berbeda dari bentuk pengolahan data transaksional yang memungkinkan pimpinan memperoleh informasi yang akurat dan dalam waktu yang cepat, sehingga akan melahirkan kemandirian dalam memperoleh informasi. Tujuan dari penelitian ini adalah untuk membangun suatu pangkalan data yang dapat digunakan oleh pimpinan untuk menganalisa dan mengambil keputusan secara tepat, serta membuat sebuah aplikasi yang dapat menganalisa informasi secara mendalam pada subyek subyek yang diinginkan dan adanya kemudahan untuk mendapatkan bentuk laporan yang diinginkannya secara lebih mandiri. Nine-Step Kimball merupakan salah satu metode yang digunakan dalam membangun data warehouse yang didalamnya terdapat proses Extraction, Transformation, Loading yang merupakan salah satu bagian penting dari pembangunan data warehouse. Hasil dari peneliltian ini adalah terciptanya sebuah pangkalan data dan aplikasinya yang dapat digunakan untuk dilakukan analisa terhadap informasi transaksional yang terjadi pada perpustakaan yang digunakan sebagai pendukung proses pengambilan keputusan oleh pimpinan.
ANALISIS HUBUNGAN SISTEM INFORMASI AKADEMIK DAN KOMPETENSI TEKNIS TERHADAP EFEKTIVITAS KERJA KARYAWAN Wahyudi, Mochamad
Paradigma - Jurnal Komputer dan Informatika Vol 12, No 1 (2010): Vol. 12 Nomor 1, Maret 2010
Publisher : AMIK BSI Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1832.214 KB) | DOI: 10.31294/p.v12i1.3470

Abstract

Bina Sarana Informatika (BSI) campus has an academic information system which is used as a working tool for the staffs at the Bureau for Academic Administration and Student Affair (BAAK). The use of this system requires a particular skill from each staff which is influenced by the technical competency of each user. So far, the problem which occurs concerning the system is that it has not been utilized maximally by the staffs of BAAK in their efforts on providing precise and fast services to all academicians of Bina Sarana Informatika. In this paper, the writer studies on whether there is correlation between the academic information system and technical competency of the system users towards the staffs’ working effectiveness at BAAK BSI. This research uses two independent variables and one dependent variable. The study is carried out at BAAK BSI with population and samples are the whole staffs at BAAK BSI at about 40 people. The instrument used for this study is linkert scale questionnaire, of which validity and reliability has been tested using Chi Square (c2) to see whether or not the data distribution is normal. To test the hypothesis, the writer uses simple linier regression analysis with two variables to test the first and second research hypotheses. To test the third research hypothesis, the writer uses multiple linier regression analysis. All research data is also tested using multy-colinierity and autocorrelation. The purpose of this study is to find out how great is the effect of academic information system towards staffs working effectiveness; the technical competency towards staffs working effectiveness; and academic information system and technical competency towards staffs working effectiveness. Keywords: academic information system, working effectiveness, technical competency
KAJIAN PENERAPAN SISTEM INFORMASI KARYAWAN BERBASIS WEB BERDASARKAN PENDEKATAN TAM Wahyudi, Mochamad
Paradigma - Jurnal Komputer dan Informatika Vol 11, No 3 (2009): Periode September 2009
Publisher : Universitas Bina Sarana Informatika

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (193.107 KB) | DOI: 10.31294/p.v11i3.4731

Abstract

The purposes of this study are to find the dominant factors which correlate and influence the level of technology acceptance, particularly Web-Based Employee Information System to its end users, of which are the employees of Bina sarana Informatika (BSI), and to know how an accepted model of new technology in a form of Web-Based Employee Information System is emplemented in a tertiary education institution.The Web-Based Employee Information System used in this study is one of information systems implemented by BSI, all of which were web-based designed that require an internet browser, such as: Internet Explorer or Mozilla Firefox. It is computer-accessible to employees both from within or outside BSI campus since the system is connected with local computer network via both intranet as well as internet facilities. This Web-based Employee Information System, which is stored in a webserver of the Internet, has a domain address “bsi.ac.id” and it is accessible via BSI website at http://www.bsi.ac.id. Some facilities available are: employee data processing, academic service, prospective students information, courses and programs, Jabatan Fungsional Dosen.The instrument for this study is questioner with Semantic Differential Scale ranging from 1 to 7, representing answers ranging from ‘extremely disagree’ to ‘extremely agree’. This study also makes use of both Technology Accepted Model (TAM) to describe the relationship between factors influencing the use of Web-Base Employee Information System and Structural Equation Modelling (SEM) to analyse data. The software used are AMOS and SPSS for Mindows 16.0.1 version.The result of this study is useful for identifying and putting in mind the role of Web-Based Employee Information System, which is accessible at http://www.bsi.ac.id, as a facility to support employees’ working accomplishment.Key words : Web-Based Employee Information System, Technology Accepted Model (TAM), Structural Equations Modelling (SEM), Analysis of MOment Structure (AMOS)
KAJIAN PENGGUNAAN PACKET FILTERING FIREWALL MENGGUNAKAN CISCO IP ACCESS CONTROL LIST Sutoyo, Imam; Wahyudi, Mochamad
Paradigma - Jurnal Komputer dan Informatika Vol 11, No 3 (2009): Periode September 2009
Publisher : Universitas Bina Sarana Informatika

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (121.191 KB) | DOI: 10.31294/p.v11i3.4732

Abstract

A computer network has become a necessity for any organization implementing a computer-based information system. Hence, keeping the security aspect is important to maintain the network performance so as to provide optimum service to its users and to be up against any attacks especially when it is connected to the Internet. This paper is intended to give input to computer network administrators who implement IP Access Control List (ACL) network security system as firewall. Itdiscusses the strengths and vulnerabilities of packet filtering firewall using Cisco IP Access Control List (ACL). The findings of this study will give computer network administrators better understanding on implementing Packet filtering firewall with Cisco IP ACL and comprehending the potential security holes due to its vulnerabilities.Keywords : Vulnerabilities, Packet Filtering Firewall, Cisco IP Access Control List (ACL), Cracker