scholarly journals ELECTRONIC DOCUMENT EXCHANGE AND DIGITIZATION OF THE ATTESTATION PROCESS RELATED TO SCIENTIFIC DEGREES

The paper describes the development of the "Complex-analytical information system of scientific degrees" for electronic document exchange and digitization of the attestation process for scientific degrees in the field of attestation of highly qualified scientific and scientific-pedagogical personnel, modules that make up the system, their functions, also information security of the system, requirements for functions performed by the system, client-server architecture of data processing in information system.

2019 ◽  
Vol 1 (2) ◽  
pp. 7-12
Author(s):  
Larissa Navia Rani ◽  
Hari Marfalino ◽  
Putri Asysyura Yuska

The rapid development of computer technology and information greatly helps work in storing, accessing to data processing becomes faster and easier, this has triggered various fields in utilizing this with the use of computer-based information systems, especially for intelligence units in western security police. The system that will be created uses access to the virtual host-based client server. Modeling used UML modeling, this system is built using PHP programming language and MYSQL database. The results of the study show that the information system designed can process criminal data and is able to be implemented at the research site..


Author(s):  
Rio Yunanto ◽  
M Munayah ◽  
Ony Widilestariningtyas

Yayasan Pembina masjid (YPM) Salman ITB is the foundation that manages the activities of religious service. The process of recording transactions in both of revenue and expenditure on the ledgers are still using Microsoft Office Excel as a tool for data processing. Financial statements prepared by the YPM Salman ITB is not fully using the islamic principles. For these problem the writer take the title "Design Of Financial Statement Accounting Information System Using Microsoft Visual Basic 2008 Software and MySQL Based Client Server" with islamic principles.


2019 ◽  
Vol 1 (2) ◽  
pp. 53-62
Author(s):  
Pramudhita Ferdiansyah ◽  
Subektiningsih Subektiningsih ◽  
Rini Indrayani

Evaluasi keamanan sistem informasi sangat diperlukan bagi sebuah organisasi, instansi, maupun perusahaan guna mencegah kebocoran data ataupun kerusakan sistem informasi. Penelitian ini dilakukan di sektor pendidikan pada lembaga UPTD XYZ di bawah kuasa Dinas Pendidikan Provinsi Daerah Istimewa Yogyakarta. Evaluasi kematangan dan tata kelola keamanan informasi diterapkan berdasarkan standar ISO/IEC 27001:2017 dengan menggunakan indeks keamanan informasi KAMI versi 4.0. Metode pengumpulan data dilakukan dengan cara observasi langsung dan interview terhadap penanggungjawab sistem informasi. Hasil yang didapatkan dari evaluasi untuk kebutuhan sistem elektronik sebesar 20, sedangkan tingkat kelengkapan informasi mendapatkan skor 245. Dari hasil tersebut dapat disimpulkan bahwa tingkat keamanan informasi masih sangat rendah dan diperlukan perbaikan sistem keamanan informasi dengan bekerja sama dengan pengembang keamanan informasi dari pihak ketiga. Information system security evaluation is indispensable for an organization, agency, or company to prevent data leakage or damage to information systems. This research was conducted in the education sector at the UPTD XYZ institution under the authority of the Yogyakarta Provincial Education Office. Information security maturity and governance evaluation is implemented based on ISO / IEC 27001: 2017 standard by using the WE information security index version 4.0. The data collection method is done by direct observation and interviews with the person in charge of the information system. The results obtained from the evaluation for electronic system requirements were 20, while the level of completeness of information got a score of 245. From these results it can be concluded that the level of information security is still very low and it is necessary to improve information security systems in collaboration with information security developers from third parties.


2019 ◽  
Vol 1260 ◽  
pp. 022007
Author(s):  
V I Potapov ◽  
O P Shafeeva ◽  
A S Gritsay ◽  
V V Makarov ◽  
O P Kuznetsova ◽  
...  

2020 ◽  
Vol 5 (3) ◽  
pp. 87
Author(s):  
Sujacka Retno ◽  
Novia Hasdyna ◽  
Mutasar Mutasar ◽  
Rozzi Kesuma Dinata

The management of Land and Building Certificates at Universitas Malikussaleh is still using a manual library in Biro Perlengkapan which contains some problem whereas it can be burned accidentally refers to fire case in 2017 in Rektorat Building at Universitas Malikussaleh. Given the problem faced by the staff in Biro Perlengkapan, the authors idea is to create a database-based data processing system, the authors designed an integrated information system which be able to anticipated such problem in the future and saving time to collecting important certificates such Land and Building Certificates at Universitas Malikussaleh and protecting them with Honey Encryption algorithm. The information system based on desktop and works as a client-server system. The result  of this research provide that the honey encryption algorithm can protect the data and it can solve the problem in management system of land and building certificates.


2018 ◽  
Vol 10 (2) ◽  
Author(s):  
A. Ivanova ◽  
K. Kharash ◽  
O. Olshevska ◽  
Y. Bortsova

Applications that provide online services are becoming more popular every day and a part of desktop apps respectively decrease. The search of information, processing documents, creating images and even user games find their place on the Internet. All these things are built on basis of the client-server data transfering model which nowadays is main for most of modern applications starting directly from the web segment ending with mobile devices.The problem should be talk about is low level of using online applications culture in favor of familiar desktop versions of data processing applications. In particular it’s about text-processing tools. Despite the part of web applications increase daily, the survey indicates that most part of researchers still prefer offline redactors for their work. Unfortunately this approach does not ensure user’s data from corruption, it doesn’t provide an opportunity to cooperate for joint work for researchers and bears lots of other risks which can be reduced by using online tools.Considering all the above the main topic of the article is the use of client-server model in the development of referative managers and some work-processes automatization. The client-server architecture, actual problems of science works processing sphere and some tools for text-processing are considered in the article.ONAFT Reference Manager project based on client-server architecture and developed to eliminate existing problems of the sphere will be mentioned as well.


Jurnal MIPA ◽  
2019 ◽  
Vol 8 (3) ◽  
pp. 126
Author(s):  
Mex U. Pesik ◽  
Yonathan Parassa

Ekowisata Wisata Bawah Laut adalah salah satu program studi di Politeknik Negeri Manado yang salah satu tujuannya adalah untuk mendukung dunia pariwisata di Indonesia Khususnya di Provinsi Sulawesi Utara. Pengolahan Data selam pada Program Studi Ekowisata Bawah Laut selama ini dilakukan dengan cara mencatat di buku.  Menyelam dimana, perangkat yang digunakan, waktu penyelaman dan hal lain yang menyangkut penyelaman dilakukan dengan cara mencatat.  Kebutuhan akan pengolahan data peyelaman berbasis komputer dirasakan sangat mendesak.  Selain untuk kebutuhan perekaman data, memproses dan dalam melaporkan kegiatan perkuliahan. Tujuan perancangan sistem informasi selam Program Studi Ekowisata Bawah Laut adalah merancang dan membuat sistem pengolahan data penyelaman berbasis komputer sehingga pengolahan data penyelaman yang selama ini dilakukan dengan cara mencatat di buku akan dilakukan dengan menggunakan aplikasi baik untuk merekam, memproses data dan menghasilkan informasi. Metode yang digunakan untuk membangun sistem menggunakan metode waterfall, dimulai dengan tahapan penetapan kebutuhan sistem, desain, implementasi dan pengujian unit, integrasi dan pengujian sistem kemudian tahapan operasi dan perawatan. Hasil dari penelitian ini adalah Perangkat Lunak Sistem informasi selam pada program studi ekowisata bawah laut Politeknik Negeri ManadoUnderwater Tourism Ecotourism is one of the study programs in the Manado State Polytechnic which one supports to support the world of tourism in Indonesia, especially in North Sulawesi Province. Diving Data Processing in the Underwater Ecotourism Study Program so far has been done by recovering in books. Diving where, equipment used, time diving and other things that save diving is done by recovering. The need for computer-based dive data processing was received very satisfactorily. In addition to the purposes of data recording, processing and reporting of lecture activities. The purpose of designing an information system for the Underwater Ecotourism Study Program is to organize and create a computer-based diving data processing system for data processing diving which has been done by updating books to be carried out using good applications to assist, process data and produce information. The method used to build the system using the waterfall method, starting with the stages of determining the system requirements, design, implementation and unit testing, integration and testing of the system begins the operation and maintenance stages. The results of this study are Dive Information System Software in the underwater ecotourism study program Manado State Polytechnic


Author(s):  
Alexander Georgievich Popov ◽  
Georgiy Aleksandrovich Popov ◽  
Mikhail Fedorovich Rudenko ◽  
Nickolai Dmitrievich Shishkin

This paper proposes a conceptual scheme of information security (IS) which comprises most existing IS systems. There are shown seven components describing IS process in the object protection model: requirements to IS support; the data protected; threats to the protected data; countermeasures to the threats; information system for the protected data processing; conditions facilitating or impeding IS process; object of protection. The diagram showing interrelations of the listed components has been given. The meanings of the entities "requirements", "Information system", "conditions", "object of protection" have been clarified; mechanisms for influencing IS process of such entities as "information system", "conditions", "object of protection" have been revealed. For the entity "requirements" there have been allocated seven classes of requirements to ensure information security; the main legislative and normative documents that define the content of these requirements for each class of requirements have been given. The approaches to measurability and assessment of the rate of requirements implementation have been described. It is stated that a number of elements in a wealth of elementary requirements are rather high, therefore, instead of the list of elementary requirements there are usually developed several generalized factors (probabilistic factor, time factor, expenses factor). IS systems oriented to these factors help to realize a more flexible IS technique, when cases of IS violation not leading to a substantial damage could be even neglected, and IS system will mainly focus on preventing most dangerous attempts to break IS.


Sign in / Sign up

Export Citation Format

Share Document