scholarly journals APLIKASI SECRET CHATTING DENGAN MENGIMPLEMENTASIKAN ALGORITMA CAESAR CIPHER

Author(s):  
Erick Irwansyah ◽  
Maryaningsih Maryaningsih ◽  
Yode Arliando

ABSTRAKPerkembangan dunia teknologi sangat pesat, sehingga mengubah sudut pandang manusia dalam berkomunikasi dampak dari perkembangan teknologi tersebut adalah terciptanya aplikasi chatting, yang memungkinkan manusia untuk melakukan pertukaran informasi melalui jaringan internet secara langsung dan instan. Dalam melakukan pertukaran informasi manusia membutuhkan sebuah fitur yang bisa menjamin informasi yang ia pertukarkan agar tidak bisa dibaca oleh orang-orang yang tidak memiliki wewenang. Salah satu cara melakukan pengamanan data adalah dengan menkripsi pesan tersebut. Enkripsi dilakukan untuk merubah teks biasa (plaintext) menjadi teks yang tidak bisa dibaca dan difahami oleh manusia makna pesan tersebut (ciphertext). Maka diterapkan salah satu algoritma enkripsi yaitu Algoritma Caesar cipher. Pengujian dilakukan pada dua perangakat smart phone dan personal computer dalam suatu jaringan wifi, hasil pengujian sistem yang dibangun menujukan aplikasi chatting dapat melakukan pengamanan pesan. ABSTRACTThe Development of technological world is very rapid, it changes the point of view of humans in communication, the impact of the development of these technologies is the creation of chat applications, which enable humans to exchange information through the internet network directly and instantly. In exchanging human information requires a feature that can guarantee the information so that it cannot be read by people who do not have the authority. One way to safeguard data is to encrypt the message. Encryption is done to change plain text (plaintext) into text that cannot be read and understood by humans the meaning of the message (ciphertext). Then applied one encryption algorithm, the Caesar cipher algorithm. Tests carried out on two smart phone devices and personal computers in a Wi-Fi network, the results of testing the system that was built showed the chat application can do security.

2020 ◽  
Vol 41 (1) ◽  
pp. 5-42
Author(s):  
Eleonora Lima

This article examines the cultural impact of personal computers in Italian literature in the first decade of their mass diffusion (from the mid-1980s to the second half of the 1990s) through the analysis of four texts written by some of the most respected writers of the time: Primo Levi’s article “Personal Golem” (1985), Umberto Eco’s novel Il pendolo di Foucault (1988), Francesco Leonetti’s novel Piedi in cerca di cibo (1995), and Daniele Del Giudice’s story “Evil Live” (1997). More than simply addressing the advent of personal computers, what these texts have in common is the use of religious images and metaphors in order to make sense of the new technology. This study aims at showing how this frame of reference served the four writers in expressing the contradictions inherent to the machine. Bulky and tangible because of its hardware, but animated by an elusive and mysterious software, the personal computer was perceived at the same time as a dull office appliance and a threatening virtual entity. Finally, by showing how timely and well-informed these literary works on the impact of PCs are, this article wants to make the case for considering the role of literature in shaping computer culture.


Author(s):  
José Manuel Ortega Egea ◽  
Manuel Recio Menedez

This chapter examines the impact of the Internet and related technologies on global marketing activities (global e-marketing), under consideration of the following aspects: • Special implications for multinational corporations (MNCs) and small and medium-sized companies (SMCs) • Distinction between business-to-consumer (B2C) and business-to-business (B2B) markets • Role of the Internet as a complementary or supplementary marketing channel In order to clarify the special characteristics and challenges involved in global e-marketing practices, the authors have carried out a review of related empirical and conceptual research. The following conclusions can be drawn with regard to the characteristics of reviewed studies: 1. Due to the global nature of the Internet, relatively little research explicitly accounts for the differences between domestic and global e-marketing practices. Further research is needed on issues directly related to the Internet “global reach.” 2. Relatively more studies analyze global Internet marketing from a theoretical point of view. Academics are recently recognizing the need to carry out empirical research, both in B2C and B2B online environments.


Author(s):  
Richard W. Pew ◽  
Principal Scientist

The paper will discuss two major themes. A new field, is often initially championed by a small set of visionaries. There are many individuals who qualify as HCI visionaries. I will mention the impact of only three, Vannevar Bush, J.C.R. Licklider, and Douglas Englebart. Second, while considerable progress has been made in understanding what makes computers hard to use and in developing methodologies that support making them easier to use, the pace of technological change has been so rapid that just when we think we have a handle on it, the technology changes and we have a new set of problems. I will touch on several eras: the batch processing era, the time-sharing era, the personal computer era, the internet era, and the handheld-wireless era that is merging into the ubiquitous computing era.


Author(s):  
Firas A. Abdulatif ◽  
Maan Zuhiar

<p>Cloud computing is a new term to provide application and hardware as service over the internet. Demand for cloud has increased dramatically in recent years. However, a major drawback for cloud adoption is lack of security so that we will try to solve some security issues related to cloud storage by design and implement a secure system to store privet data in cloud storage. This secure system provide secure login to cloud by using third parity authentication (smart phone) and one time password depend on chaotic system to prevent unauthorized people from get access to cloud and modified AES algorithms to encrypt the data in the cloud storage.</p>


Author(s):  
Mohammad Hamed Aledamat

The study aimed to identify the degree of exercise of educational supervisors in the Directorate of the first Zarqa education for electronic supervision from their point of view, and to identify the impact of sex, educational qualification, and area of ​​specialization, and experience in this, and the study used the descriptive survey method, and the tool was a questionnaire, distributed The results of the study showed that the degree of educational supervisors in Zarqa First Educational Directorate for the concept of electronic supervision of the tool as a whole; obtained an average of (3.55 out of 5) with a grade of (medium). ), And p At the level of the axes; the reality of the practice of electronic supervision, the highest average (3.95), with a rating (high) followed by the axis of the requirements of electronic supervision with an average (3.61), and thirdly, the importance of electronic supervision with an average (3.50), and finally the axis of obstacles to the use of electronic supervision with an average (The results showed that there are statistically significant differences due to the effect of sex in the field of the practice of electronic supervision and in favor of males, and the absence of statistically significant differences attributed to the other variables. In light of the results, the study recommended a set of recommendations, the most important of which are: Training workshops for educational supervisors on how to employ computer technologies in educational supervision and benefit from the services provided by the Internet and free sites such as Google Drive and others.


Author(s):  
Alexandru Tarna ◽  

The protection of fundamental rights has become an axiom that no longer requires the luxury of argumentation. From another point of view, the protection of human rights on the Internet is only emerging. This is all the more so, as the internet plays an important role in people’s daily lives and in all aspects of human society. The impact of the Internet on social, economic and cultural activity is also growing. The scientific research will be devoted to the following aspects related to meetings and participations in the digital space in the Republic of Moldova: (1) freedom to choose web pages, applications or other services for setting up, joining, mobilizing and participating in groups and social assemblies; (2) the right to peaceful online protest; (3) freedom to use available online tools to participate in local, national and global public policy debates, legislative initiatives and public elections.


10.28945/3344 ◽  
2009 ◽  
Author(s):  
Michelle W. L. Fong

This research paper assesses the impact of ICTs (which includes the Internet, mobile phone, pager, personal computer, and telephone) on Gross National Income (GNI) per capita in developing countries in 2005. It found a significant relationship between GNI per capita (in PPP international dollar) and adoption of each ICT (mobile phone, personal computer, and telephone) but not for Internet technology adoption. In addition, it identifies factors that developing countries need to consider in the adoption and application of ICTs for economic development.


Author(s):  
John P. Robinson ◽  
Meyer Kestnbaum ◽  
Andrew Kohut

One measure of the impact of the personal computer is in terms of its time displacement of other activities; mass media generally are considered a prime candidate given the on-line profusion of information and entertainment services. This article compares the daily mass media habits and other leisure activities of heavy, light and non users of personal computers and on-line services based on 1994-95 and 1997 national surveys. No significant or consistent evidence of time displacement of mass media was found. Indeed, heavier computer usage was associated with significantly greater use of print media and other cultural uses of free time, even after multivariate adjustment. It was concluded that at this early stage of diffusion, personal computers may have more in common with “time enhancing” home appliances (like the telephone, automobile and washing machine) than with television. Nonetheless, more complete time-diary studies are needed to identify the full temporal effects of the personal computer, much as they did for television.


Author(s):  
José Manuel Ortega Egea ◽  
Manuel Recio Menedez

This chapter examines the impact of the Internet and related technologies on global marketing activities (global e-marketing), under consideration of the following aspects: • Special implications for multinational corporations (MNCs) and small and medium-sized companies (SMCs) • Distinction between business-to-consumer (B2C) and business-to-business (B2B) markets • Role of the Internet as a complementary or supplementary marketing channel In order to clarify the special characteristics and challenges involved in global e-marketing practices, the authors have carried out a review of related empirical and conceptual research. The following conclusions can be drawn with regard to the characteristics of reviewed studies: 1. Due to the global nature of the Internet, relatively little research explicitly accounts for the differences between domestic and global e-marketing practices. Further research is needed on issues directly related to the Internet “global reach.” 2. Relatively more studies analyze global Internet marketing from a theoretical point of view. Academics are recently recognizing the need to carry out empirical research, both in B2C and B2B online environments.


Sign in / Sign up

Export Citation Format

Share Document