scholarly journals Implementasi Algoritma RC4 pada Sistem Pengamanan Dokumen Digital Soal Ujian

2021 ◽  
Vol 6 (3) ◽  
pp. 171-177
Author(s):  
Fauziyah Suwarsita Febriyani ◽  
Arief Arfriandi

The development of science and technology has led to changes in the use of documents in life to become digital data. However, this can cause problems, namely regarding data security and confidentiality. To increase security and confidentiality can be done with cryptographic algorithm RC4. The research method uses the Waterfall method. The result of this research is a website that can secure document files with * doc extension using the RC4 algorithm. The test was carried out using the blackbox test and the CrackStation test for encryption testing. The results of the test show that the website can run well and successfully implements the RC4 algorithm.

2020 ◽  
Vol 11 (2) ◽  
pp. 161-170
Author(s):  
Rochman Hadi Mustofa

AbstractBig Data has become a significant concern of the world, along with the era of digital transformation. However, there are still many young people, especially in developing countries, who are not yet aware of the security of their big data, especially personal data. Misuse of information from big data often results in violations of privacy, security, and cybercrime. This study aims to determine how aware of the younger generation of security and privacy of their big data. Data were collected qualitatively by interviews and focus group discussions (FGD) from. Respondents were undergraduate students who used social media and financial technology applications such as online shopping, digital payments, digital wallet and hotel/transportation booking applications. The results showed that students were not aware enough and understood the security or privacy of their digital data, and some respondents even gave personal data to potentially scam sites. Most students are not careful in providing big data information because they are not aware of the risks behind it, socialization is needed in the future as a step to prevent potential data theft.


Author(s):  
I Gede Pasek Pramana

This research aims to analyze about the significance of the Constitutional Court Decision No.46/PUU-VIII/2010 the position of anak astra in Bali customary law. The research method used is a normative study by selecting the type of statue approach and the conceptual approach. Sources of legal materials that were examined in this study consisted of primary legal materials and secondary legal materials and techniques were analyzed with the description, systematic, evaluation and argumentation. Based on the perspective ( review ) Constitutional Court Decision No. 46/PUU-VIII/2010, anak astra have a civil relationship with her biological father and his family along can be proved by science and technology and / or other evidence according to the law. The juridical consequences of the Constitutional Court Decision No. 46/PUU-VIII/2010 to the norms of Bali customary law about anak astra Bali is must conform to the directions of law in the Decision of the Constitutional Court.


2016 ◽  
Vol 9 (2) ◽  
pp. 45-59
Author(s):  
Claudia Bobâlcă ◽  
Oana Ţugulea

AbstractThe purpose of the research is to identify the factors affecting online satisfaction. As a research method, we applied a quantitative survey based on a questionnaire. The sample consists of 532, students at Faculty of Economics and Business Administration, aged between 19-26 years, who buy online various products from the Internet. In order to identify the dimensions of online satisfaction, we used exploratory factor analysis with SPSS 17.0, with Principal Components as extraction type and Varimax as rotation method. Nine dimensions of online satisfaction were identified, namely: products corresponding to the online description, good price, comfort, easily accessible information, personal data security, good design, support, personalization, and website awareness.


2020 ◽  
Vol 16 (1) ◽  
pp. 1
Author(s):  
Shubham Shrimali ◽  
Aadarsh Kumar ◽  
K.John Singh
Keyword(s):  

2021 ◽  
Vol 31 (1) ◽  
pp. 130
Author(s):  
Muhammad Rijal Fadli

Philosophy and science are human efforts in understanding the concepts and methods of a scientific discipline. The changing times and developments have ushered the philosophy of a configuration by showing how the "tree of knowledge" grows and branches fruitfully from each of the disciplines, to break away from the trunk of its philosophy, develop and follow its methodological trends. This research method uses the hermeneutic method in explaining the reality that occurs with elements of interpretation and description. The results of the research can be described that the study of the relationship between philosophy and science has progressed so intensely. Philosophy and science are indispensable for their presence during the development of science and technology which is marked by the sharpening of scientific specialization, because by studying philosophy scientists are expected to be aware of their limitations so as not to be trapped into intellectual arrogance. It is impossible to counter-discourse developing science and technology, but rather to reduce the negative impact of the technology itself. In the era of the industrial revolution 4.0 and Society 5.0, the community groups are very heterogeneous, so it is very risky to the problems faced regarding the development of technology and can change the mindset of life into a more sophisticated pattern of life with the power of technology such as robots and the internet. So the science that is used as an axiological milestone in directing and controlling the development of science and technology in a positive way for the benefit of mankind and its environment is philosophy and science. 


2020 ◽  
Vol 4 (3) ◽  
pp. 1-10
Author(s):  
Naim BAFTIU

Cryptography is an old idea and science, but its approach exists and plays a large role in modernization today. Conventional cryptographic techniques form the basis of today's cryptographic algorithm. The different categories of algorithms have their respective features; internally, in performance and implementation. Cryptographic schemes and mechanisms have undergone continuous improvement. The application of cryptography has grown increasingly, ranging from limited use in state institutions to widespread use by private individuals and companies. The increased use of the Internet has significantly influenced the nature of applications and the way we communicate. Data security dictates the use of different cryptographic techniques. For this reason, we analyze in detail the various coding techniques by evaluating their performance and efficiency. Regarding the new paradigms in cryptography there are also new cryptographic schemes whose application requires detailed study and analysis. The classical cryptography algorithm is the oldest algorithm that was used long before the cryptographic system was discovered. Currently, the system has been widely applied to secure data, and using new methods in a way to improve existing methods. In this thesis the use of cryptographic methods using the C # programming language will be discussed.


2015 ◽  
Vol 14 (10) ◽  
pp. 6184-6189
Author(s):  
Himanshu Gupta ◽  
Kapil Chauhan

In today's society, data security is the big problem for every business organization or an individual. Most found threat is theft of personal data and information. With time digital data become more prevalent, personnel try to secure their information by using highly encrypted passwords and authentication identities, but, the misuse and theft of these security measures are rising in lot of theft cases Taking advantage of security flaws in authentication identities ends up in cards being duplicated or counterfeited and hence misused. This increasing fight with cyber security has been the sole reason of  making  biometric security systems, the  important area of concern is that how do  one can implement the biometric security for increasing of data security.  First unique feature which is found different in every human is Fingerprints; Humans have used fingerprints for personal identification. Presently, most of the organisation use  fingerprint recognition for authentication process  it is one of the oldest and most commonly used biometrics, with high accuracy & generally easy and efficient and fast.  In this paper we propose the idea to use fingerprint recognition along with the user authentication password or to access the data or information. Since the only person who can access information is the person linked to it, no thief can gain access. It also makes your data, very hard for cyber criminals to hack into.


Sign in / Sign up

Export Citation Format

Share Document