Just IT : Jurnal Sistem Informasi, Teknologi Informasi, dan Komputer https://jurnal.umj.ac.id/index.php/just-it <p style="font-size: 16px; text-align: justify;"><strong>Just IT: Jurnal Sistem Informasi, Teknologi Informasi dan Komputer</strong> is an Open Access Journal published by Informatics Engineering Department, Faculty of Engineering, Universitas Muhammadiyah Jakarta. The journal is a national journal (in Bahasa Indonesia) which published three times (since Vol 11) a year regularly, every <strong>September, January and</strong> <strong>May</strong>, and has been online since 2017.</p> <ul> <li style="font-size: 16px; text-align: justify;"><strong><a href="https://issn.brin.go.id/terbit/detail/1435969635" target="_blank" rel="noopener">p - ISSN : 2089 - 0256</a></strong></li> <li style="font-size: 16px; text-align: justify;"><strong><a href="https://issn.brin.go.id/terbit/detail/1488435016" target="_blank" rel="noopener">e - ISSN : 2598 - 3016</a></strong></li> </ul> <p style="font-size: 16px; text-align: justify;"><strong><strong>JUST IT: Jurnal Sistem Informasi, Teknologi Informasi dan Komputer</strong> </strong>has been acredited <strong>SINTA 5</strong> by Kementerian Riset Teknologi dan Pendidikan Tinggi (Ministry of Research, Technology and Higher Education) of Republic of Indonesia on 11th October 2019 <a href="https://sinta.kemdikbud.go.id/journals/profile/4991" target="_blank" rel="noopener">No. 28/E/KPT/2019.</a></p> <p style="font-size: 16px; text-align: justify;"><strong>JUST IT: Jurnal Sistem Informasi, Teknologi Informasi dan Komputer</strong> invite researchers and professional practitioners to send articles about research result or project development in information system, information technology and computer science field. </p> <p style="font-size: 16px; text-align: justify;"><strong><a title="Template Just IT" href="https://docs.google.com/document/d/1bY5e5VkZGVFLWkmlzf0nRG0B14FYiBGR/edit?rtpof=true&amp;sd=true&amp;tab=t.0" target="_blank" rel="noopener">Template <img src="https://jurnal.umj.ac.id/index.php/just-it/management/settings/context//public/site/images/retnani_latifah/https___assets.ifttt_.com_images_channels_709896750_icons_on_color_large_.png" alt="" width="30" height="10" /> for this journal</a> is available in the side bar or in author guidelines section (new revision for upcoming issue).</strong></p> <p style="font-size: 16px; text-align: justify;"><strong><strong>JUST IT: Jurnal Sistem Informasi, Teknologi Informasi dan Komputer</strong> </strong>is indexing by: <a href="https://scholar.google.co.id/citations?hl=id&amp;user=SsSw4KoAAAAJ&amp;view_op=list_works&amp;citft=1&amp;citft=2&amp;email_for_op=jurnal.justit%40ftumj.ac.id&amp;authuser=1&amp;gmla=AJsN-F6aVlJ7oTUfjoJNaA4kUJ1LiNrD3RaaO3mEkWSnzHd1ToyRcPz74ERg95jVpfhZxUH9betjZPuR_K3Rb9tGSV-dITYYQTFyG3Izj-BhD5BnJIreLCHTHOxKOGgA8WCPTVuZC-KQa7HMCHjy9BkI1gjxUVWpQ4gcC02jGXkOLjSprt4Ql28kDg2ca_LqT8aF9LIjT8yVvCSOxkNqvA4Fb6q5u3B8N2swx29zWbiPzb-yCZ-CWr3E9vlox5fNBtSgDGpPs9l7ITKXilCKTYPY7N4e0iqaMOZEA3XZeEXc7s2KDJhx9I8" target="_blank" rel="noopener">Google Scholar</a>, <a href="https://garuda.kemdikbud.go.id/journal/view/6729" target="_blank" rel="noopener">Garuda</a> and <a href="https://sinta.kemdikbud.go.id/journals/profile/4991">Sinta</a>.</p> <p style="font-size: 16px; text-align: justify;"> </p> Universitas Muhammadiyah Jakarta id-ID Just IT : Jurnal Sistem Informasi, Teknologi Informasi, dan Komputer 2089-0265 <p>Authors who publish with this journal agree to the following terms:</p><p> </p><ol><li>Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a <a href="https://creativecommons.org/licenses/by-nc/4.0/">Creative Commons Attribution License</a> that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.</li><li>Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.</li><li>Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See <a href="http://opcit.eprints.org/oacitation-biblio.html" target="_new">The Effect of Open Access</a>).</li></ol><p> </p><p><span>License Grant.</span> Subject to the terms and conditions of this License, Licensor hereby grants You a worldwide, royalty-free, non-exclusive, perpetual (for the duration of the applicable copyright) license to exercise the rights in the Work as stated below:</p><ol><li>to Reproduce the Work, to incorporate the Work into one or more Collections, and to Reproduce the Work as incorporated in the Collections;</li><li>to create and Reproduce Adaptations provided that any such Adaptation, including any translation in any medium, takes reasonable steps to clearly label, demarcate or otherwise identify that changes were made to the original Work. For example, a translation could be marked "The original work was translated from English to Spanish," or a modification could indicate "The original work has been modified.";</li><li>to Distribute and Publicly Perform the Work including as incorporated in Collections; and,</li><li>to Distribute and Publicly Perform Adaptations.</li><li>For the avoidance of doubt:i. <span>Non-waivable Compulsory License Schemes</span>. In those jurisdictions in which the right to collect royalties through any statutory or compulsory licensing scheme cannot be waived, the Licensor reserves the exclusive right to collect such royalties for any exercise by You of the rights granted under this License;ii. <span>Waivable Compulsory License Schemes</span>. In those jurisdictions in which the right to collect royalties through any statutory or compulsory licensing scheme can be waived, the Licensor waives the exclusive right to collect such royalties for any exercise by You of the rights granted under this License; and,iii. <span>Voluntary License Schemes</span>. The Licensor waives the right to collect royalties, whether individually or, in the event that the Licensor is a member of a collecting society that administers voluntary licensing schemes, via that society, from any exercise by You of the rights granted under this License.</li></ol><p>The above rights may be exercised in all media and formats whether now known or hereafter devised. The above rights include the right to make such modifications as are technically necessary to exercise the rights in other media and formats. Subject to Section 8(f), all rights not expressly granted by Licensor are hereby reserved.</p><p><span>Restrictions.</span> The license granted in Section 3 above is expressly made subject to and limited by the following restrictions:</p><ol><li>You may Distribute or Publicly Perform the Work only under the terms of this License. You must include a copy of, or the Uniform Resource Identifier (URI) for, this License with every copy of the Work You Distribute or Publicly Perform. You may not offer or impose any terms on the Work that restrict the terms of this License or the ability of the recipient of the Work to exercise the rights granted to that recipient under the terms of the License. You may not sublicense the Work. You must keep intact all notices that refer to this License and to the disclaimer of warranties with every copy of the Work You Distribute or Publicly Perform. When You Distribute or Publicly Perform the Work, You may not impose any effective technological measures on the Work that restrict the ability of a recipient of the Work from You to exercise the rights granted to that recipient under the terms of the License. This Section 4(a) applies to the Work as incorporated in a Collection, but this does not require the Collection apart from the Work itself to be made subject to the terms of this License. If You create a Collection, upon notice from any Licensor You must, to the extent practicable, remove from the Collection any credit as required by Section 4(b), as requested. If You create an Adaptation, upon notice from any Licensor You must, to the extent practicable, remove from the Adaptation any credit as required by Section 4(b), as requested.</li><li>If You Distribute, or Publicly Perform the Work or any Adaptations or Collections, You must, unless a request has been made pursuant to Section 4(a), keep intact all copyright notices for the Work and provide, reasonable to the medium or means You are utilizing: (i) the name of the Original Author (or pseudonym, if applicable) if supplied, and/or if the Original Author and/or Licensor designate another party or parties (e.g., a sponsor institute, publishing entity, journal) for attribution ("Attribution Parties") in Licensor's copyright notice, terms of service or by other reasonable means, the name of such party or parties; (ii) the title of the Work if supplied; (iii) to the extent reasonably practicable, the URI, if any, that Licensor specifies to be associated with the Work, unless such URI does not refer to the copyright notice or licensing information for the Work; and (iv) , consistent with Section 3(b), in the case of an Adaptation, a credit identifying the use of the Work in the Adaptation (e.g., "French translation of the Work by Original Author," or "Screenplay based on original Work by Original Author"). The credit required by this Section 4 (b) may be implemented in any reasonable manner; provided, however, that in the case of a Adaptation or Collection, at a minimum such credit will appear, if a credit for all contributing authors of the Adaptation or Collection appears, then as part of these credits and in a manner at least as prominent as the credits for the other contributing authors. For the avoidance of doubt, You may only use the credit required by this Section for the purpose of attribution in the manner set out above and, by exercising Your rights under this License, You may not implicitly or explicitly assert or imply any connection with, sponsorship or endorsement by the Original Author, Licensor and/or Attribution Parties, as appropriate, of You or Your use of the Work, without the separate, express prior written permission of the Original Author, Licensor and/or Attribution Parties.</li><li>Except as otherwise agreed in writing by the Licensor or as may be otherwise permitted by applicable law, if You Reproduce, Distribute or Publicly Perform the Work either by itself or as part of any Adaptations or Collections, You must not distort, mutilate, modify or take other derogatory action in relation to the Work which would be prejudicial to the Original Author's honor or reputation. Licensor agrees that in those jurisdictions (e.g. Japan), in which any exercise of the right granted in Section 3(b) of this License (the right to make Adaptations) would be deemed to be a distortion, mutilation, modification or other derogatory action prejudicial to the Original Author's honor and reputation, the Licensor will waive or not assert, as appropriate, this Section, to the fullest extent permitted by the applicable national law, to enable You to reasonably exercise Your right under Section 3(b) of this License (right to make Adaptations) but not otherwise.</li></ol><p><span>Representations, Warranties and Disclaimer</span></p><p>UNLESS OTHERWISE MUTUALLY AGREED TO BY THE PARTIES IN WRITING, LICENSOR OFFERS THE WORK AS-IS AND MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND CONCERNING THE WORK, EXPRESS, IMPLIED, STATUTORY OR OTHERWISE, INCLUDING, WITHOUT LIMITATION, WARRANTIES OF TITLE, MERCHANTIBILITY, FITNESS FOR A PARTICULAR PURPOSE, NONINFRINGEMENT, OR THE ABSENCE OF LATENT OR OTHER DEFECTS, ACCURACY, OR THE PRESENCE OF ABSENCE OF ERRORS, WHETHER OR NOT DISCOVERABLE. SOME JURISDICTIONS DO NOT ALLOW THE EXCLUSION OF IMPLIED WARRANTIES, SO SUCH EXCLUSION MAY NOT APPLY TO YOU.</p><p><span>Limitation on Liability.</span> EXCEPT TO THE EXTENT REQUIRED BY APPLICABLE LAW, IN NO EVENT WILL LICENSOR BE LIABLE TO YOU ON ANY LEGAL THEORY FOR ANY SPECIAL, INCIDENTAL, CONSEQUENTIAL, PUNITIVE OR EXEMPLARY DAMAGES ARISING OUT OF THIS LICENSE OR THE USE OF THE WORK, EVEN IF LICENSOR HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.</p><p><span>Termination</span></p><ol><li>This License and the rights granted hereunder will terminate automatically upon any breach by You of the terms of this License. Individuals or entities who have received Adaptations or Collections from You under this License, however, will not have their licenses terminated provided such individuals or entities remain in full compliance with those licenses. Sections 1, 2, 5, 6, 7, and 8 will survive any termination of this License.</li><li>Subject to the above terms and conditions, the license granted here is perpetual (for the duration of the applicable copyright in the Work). Notwithstanding the above, Licensor reserves the right to release the Work under different license terms or to stop distributing the Work at any time; provided, however that any such election will not serve to withdraw this License (or any other license that has been, or is required to be, granted under the terms of this License), and this License will continue in full force and effect unless terminated as stated above.</li></ol><p><span>Miscellaneous</span></p><ol><li>Each time You Distribute or Publicly Perform the Work or a Collection, the Licensor offers to the recipient a license to the Work on the same terms and conditions as the license granted to You under this License.</li><li>Each time You Distribute or Publicly Perform an Adaptation, Licensor offers to the recipient a license to the original Work on the same terms and conditions as the license granted to You under this License.</li><li>If any provision of this License is invalid or unenforceable under applicable law, it shall not affect the validity or enforceability of the remainder of the terms of this License, and without further action by the parties to this agreement, such provision shall be reformed to the minimum extent necessary to make such provision valid and enforceable.</li><li>No term or provision of this License shall be deemed waived and no breach consented to unless such waiver or consent shall be in writing and signed by the party to be charged with such waiver or consent.</li><li>This License constitutes the entire agreement between the parties with respect to the Work licensed here. There are no understandings, agreements or representations with respect to the Work not specified here. Licensor shall not be bound by any additional provisions that may appear in any communication from You. This License may not be modified without the mutual written agreement of the Licensor and You.</li><li>The rights granted under, and the subject matter referenced, in this License were drafted utilizing the terminology of the Berne Convention for the Protection of Literary and Artistic Works (as amended on September 28, 1979), the Rome Convention of 1961, the WIPO Copyright Treaty of 1996, the WIPO Performances and Phonograms Treaty of 1996 and the Universal Copyright Convention (as revised on July 24, 1971). These rights and subject matter take effect in the relevant jurisdiction in which the License terms are sought to be enforced according to the corresponding provisions of the implementation of those treaty provisions in the applicable national law. If the standard suite of rights granted under applicable copyright law includes additional rights not granted under this License, such additional rights are deemed to be included in the License; this License is not intended to restrict the license of any rights under applicable law.</li></ol><p><!-- Default Statcounter code for Jurnal JUST IT https://jurnal.umj.ac.id/index.php/just-it/index --><script type="text/javascript">// <![CDATA[ var sc_project=11472008; var sc_invisible=0; var sc_security="b2b43ade"; var scJsHost = "https://"; document.write("<sc"+"ript type='text/javascript' src='" + scJsHost+ "statcounter.com/counter/counter.js'></"+"script>"); // ]]></script></p><noscript>&amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;lt;div class="statcounter"&amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;gt;&amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;lt;a title="Web Analytics" href="https://statcounter.com/" target="_blank"&amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;gt;&amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;lt;img class="statcounter" src="https://c.statcounter.com/11472008/0/b2b43ade/0/" alt="Web Analytics"&amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;gt;&amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;lt;/a&amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;gt;&amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;lt;/div&amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;gt;</noscript><p><!-- End of Statcounter Code --></p> OPTIMISASI METODE PREDIKSI PADA DATA CUSTOMER ATTACK LIST https://jurnal.umj.ac.id/index.php/just-it/article/view/25573 <span style="vertical-align: inherit;"><span style="vertical-align: inherit;">Kunjungan pelanggan di bengkel resmi TOYOTA untuk servis terdata oleh sistem aplikasi. Pengelolaan data pelanggan /data </span></span><em><span style="vertical-align: inherit;"><span style="vertical-align: inherit;">seranganlist</span></span></em><span style="vertical-align: inherit;"><span style="vertical-align: inherit;"> diperlukan oleh tim </span></span><em><span style="vertical-align: inherit;"><span style="vertical-align: inherit;">perbaikan umum</span></span></em><span style="vertical-align: inherit;"><span style="vertical-align: inherit;"> , untuk melakukan tindak lanjut berupa konfirmasi pemberitahuan-penjadwalan servis selanjutnya. Proses ini sudah berjalan selama kurun waktu 2 tahun, namun hasil penjadwalan kedatangan kunjungan servis pelanggan belum sesuai dari total data pelanggan ( </span></span><em><span style="vertical-align: inherit;"><span style="vertical-align: inherit;">Attacklist</span></span></em><span style="vertical-align: inherit;"><span style="vertical-align: inherit;"> ) yang dikonfirmasi. Penelitian ini dilakukan untuk memprediksi variabel waktu servis, menggunakan metode eksplorasi jarak dan analisa data ( </span></span><em><span style="vertical-align: inherit;"><span style="vertical-align: inherit;">EDA</span></span></em><span style="vertical-align: inherit;"><span style="vertical-align: inherit;"> ), membuat model algoritma </span></span><em><span style="vertical-align: inherit;"><span style="vertical-align: inherit;">Linear Regression, Random Forest Regressor dan Gradient Boosting Regressor</span></span></em><span style="vertical-align: inherit;"><span style="vertical-align: inherit;"> yang digunakan untuk prediksi. Dengan menggunakan metodologi </span></span><em><span style="vertical-align: inherit;"><span style="vertical-align: inherit;">Cross-Industry Standard Process for Data Mining</span></span></em><span style="vertical-align: inherit;"><span style="vertical-align: inherit;"> ( </span></span><em><span style="vertical-align: inherit;"><span style="vertical-align: inherit;">CRISP-DM</span></span></em><span style="vertical-align: inherit;"><span style="vertical-align: inherit;"> ). Nilai prediksi yang dihasilkan oleh setiap model algoritma, untuk variabel rentang_hari (waktu servis selanjutnya) memiliki akurasi yang mendekati nilai aktual/sebenarnya. Sehingga penelitian ini merekomendasikan penggunaan model algoritma, yang dapat diterapkan pada sistem aplikasi yang ada. Sehingga optimalisasi data pelanggan/ </span></span><em><span style="vertical-align: inherit;"><span style="vertical-align: inherit;">Attacklist</span></span></em><span style="vertical-align: inherit;"><span style="vertical-align: inherit;"> bersinergi dengan proses bisnis yang berjalan.</span></span> Delly Asep Gustira Ardiansyah Dores Copyright (c) 2025 2025-08-21 2025-08-21 15 3 408 416 ANALISIS SISTEM PEMBAYARAN DAN ANTRIAN PADA WEBSITE CODASHOP https://jurnal.umj.ac.id/index.php/just-it/article/view/23075 <span style="vertical-align: inherit;"><span style="vertical-align: inherit;"><span style="vertical-align: inherit;"><span style="vertical-align: inherit;">Perkembangan teknologi memudahkan sistem pembayaran transaksi elektronik yang salah satunya melalui Web. Salah satu contoh Web top up adalah Codashop. Codashop adalah Web top up yang banyak digunakan para gamers untuk melakukan top up kredit game. Pada halaman utama Codashop terdapat semua game atau aplikasi yang bisa dilakukan top up. UI/UX pada codashop memiliki tampilan yang sederhana tetapi sedikit kurang menarik di kalangan para gamer dan pelanggan lainnya. Sistem pembayaran yang ada pada codashop memiliki banyak pilihan pembayaran mulai dari kartu kredit, E-Wallet dan Provider, namun permasalahan yang ada pada pembayaran codashop yaitu tidak memiliki fitur pembayaran yang mengakibatkan Web mengalami error jika terjadi penggunaan pada waktu yang bersamaan. Oleh karena itu, kelompok kami ingin mengusulkan sistem antrian di web Codashop. Diawali dengan menganalisis permasalahan menggunakan metode penelitian kualitatif, dilanjutkan dengan pengumpulan data melalui observasi dan kuisioner untuk tampilan UI, kemudian membuat analisis sistem berjalan dan sistem usulan dengan membuat use case diagram, activity diagram, dan membuat mock up untuk tampilan sistem antrian.</span></span></span></span> Muhammad Rayyan Ghifari Reihan Aditya Permata Bintang Muhammad Hably Nasrullah Ananda Rahman Hakim Copyright (c) 2025 2025-08-21 2025-08-21 15 3 417 – 423 417 – 423 PERBANDINGAN ALGORITMA NAIVE BAYES DAN C.45 DALAM DIAGNOSIS PENYAKIT PARU-PARU https://jurnal.umj.ac.id/index.php/just-it/article/view/24566 <p><span style="vertical-align: inherit;"><span style="vertical-align: inherit;">Penyakit paru-paru sangat berbahaya karena dapat menyebabkan kerusakan pernafasan dalam jangka pendek maupun panjang. Masalah yang sering terjadi misalnya terkena penyakit paru-paru karena kualitas udara yang tercemar/terkontaminasi, sehingga udara yang dihirup masyarakat banyak mengandung virus/bakteri. Timbulnya kesalahan diagnosis pada pasien menjadi permasalahan dalam penelitian ini. Adanya teknologi dapat memudahkan segala aktivitas, termasuk dalam bidang kesehatan. Penelitian ini bertujuan untuk mengetahui kinerja algoritma </span></span><em><span style="vertical-align: inherit;"><span style="vertical-align: inherit;">Naive Bayes</span></span></em><span style="vertical-align: inherit;"><span style="vertical-align: inherit;"> dan C4.5 sebagai perhitungan hasil diagnostik untuk mengklasifikasikan orang yang terkena penyakit paru-paru. Metode ekstraksi data yang digunakan dalam penelitian ini adalah algoritma Naive Bayes dan C4.5 untuk mengklasifikasikan hasil diagnosa penyakit paru-paru. Klasifikasi naif pada algoritma Bayes dilakukan dengan mentransformasikan kumpulan data yang menentukan frekuensi setiap nilai kelas dan metode klasifikasi pada algoritma C4. 5 dengan mentransformasikan fakta menjadi pohon keputusan sesuai aturan yang ada. Data yang digunakan dipenerapan kedua algoritma ini dari dataset pribadi yang terdiri dari total 325 record dengan 5 atribut. Hasil penelitian menunjukkan bahwa pengukuran kinerja algoritma Naive Bayes menggunakan matriks konfusi dengan validasi silang 10 kali lipat menghasilkan nilai akurasi sebesar 91,08%. Pengukuran kinerja yang sama juga dilakukan pada algoritma C4. 5 masing-masing menggunakan matriks konfusi dan validasi silang 10 kali lipat, menghasilkan nilai akurasi sebesar 89,23%. Hasil akurasi menunjukkan Algoritma Naive Bayes lebih unggul dibandingkan C4. 5 dengan selisih 1,85%. Kesimpulannya adalah algoritma Naive Bayes lebih baik dalam mengklasifikasikan hasil diagnosa penyakit paru.</span></span></p> Hidayatur Rakhmawati Afifah Sindyka Copyright (c) 2025 2025-08-21 2025-08-21 15 3 424 – 432 424 – 432 RISK ASSESMENT PENGENDALIAN KEAMANAN INFORMASI BERBASIS ISO/IEC 27001:2013 MENGGUNAKAN METODE FAILURE MODE AND EFFECTS ANALYSIS (FMEA) STUDI KASUS: TIM BRINESIA PT. BRI ASURANSI INDONESIA https://jurnal.umj.ac.id/index.php/just-it/article/view/26774 <p>Implementasi teknologi informasi tidak lepas dari risiko (<em>Information Technology Risk</em>) yang dapat berdampak pada pencapaian tujuan organisasi. Mengingat keterkaitannya yang tinggi dengan kemajuan teknologi, tim BRINESIA memiliki kewajiban untuk menjadi unit yang memerlukan perlindungan keamanan informasi guna menjaga kualitas keamanan data, termasuk aset-aset yang dimiliki. Untuk meminimalkan kemungkinan terjadinya kebocoran data, kerusakan, ketidakakuratan, ketidaktersediaan, atau gangguan lain terhadap informasi, penting untuk melakukan penilaian terhadap risiko. Terdapat berbagai metode yang dapat digunakan untuk menganalisis kemungkinan terjadinya kegagalan atau risiko. Salah satu metode yang banyak digunakan adalah FMEA (<em>Failure Mode &amp; Effect Analysis</em>), yang merupakan pendekatan terstruktur untuk mendeteksi dan memberi peringkat pada mode kegagalan dengan cara menilai <em>severity</em>, <em>occurrence</em>, dan <em>detection</em>, sehingga menghasilkan <em>Risk Priority Number</em> (RPN). Metode ini juga memberikan saran untuk mitigasi risiko sesuai dengan standar ISO/IEC 27001:2013. Penelitian ini mengidentifikasi level potensi mode <em>failure mode</em> pada informasi yang diurus oleh tim BRINESIA, menentukan prioritas risiko, serta menyediakan pedoman mitigasi risiko yang bermanfaat bagi tim BRINESIA dalam menerapkan kontrol keamanan informasi.</p><p><strong>Kata Kunci:</strong><strong> </strong><em>FMEA (Failure Mode &amp; Effect Analysis), Risk Priority Number, ISO/IEC 27001:2013, mitigasi </em><em>risiko</em>.</p> Winni Indah Kurnia Sari Syakur Khoiri Fajar Masya Copyright (c) 2025 2025-08-21 2025-08-21 15 3 433 – 441 433 – 441 APLIKASI ELECTRONIC SIGNATURE (eSign) DENGAN QR-CODE PADA PROGRAM STUDI TEKNIK INFORMATIKA UMJ BERBASIS WEB https://jurnal.umj.ac.id/index.php/just-it/article/view/27836 <p><em>Currently, the use of electronic signature is something that is often done, including in the academic realm at universities. The use of electronic signatures in the Informatics Engineering Study Program at Muhammadiyah University of Jakarta is still not computerized, starting from the application process it is still carried out on various platforms and the signing process uses separate software so there is no system or application that can be used. organize the process. The aim of designing this electronic signature application is to facilitate the electronic signing process within the scope of the Information Engineering Study Program, Muhammadiyah University of Jakarta, so that the submission and signing process can be carried out quickly in one application and the authenticity of the signature on which the document is signed can be proven to be genuine. The data collection methods used were literature studies, interviews and observations. The development method used is the Waterfall Method, where software development follows linear and sequential steps, thereby creating a structured and organized approach. Testing of the electronic signature application is carried out by carrying out black box testing and after testing it can be concluded that the application can run well and the electronic signature process can be more effective and efficient.</em></p> <p><em>&nbsp;</em></p> <p><strong><em>Keywords:</em></strong><em> electronic signature, Waterfall Method, application, effective and efficient</em></p> Risa Azzahra Zein Popy Meilina Ardiansyah Dores Sitti Nurbaya Ambo Copyright (c) 2025 2025-08-21 2025-08-21 15 3 442 454 RANCANG BANGUN APLIKASI MOBILE ANALISIS KESEHATAN KUKU MENGGUNAKAN AI GENERATIF DENGAN ALUR KERJA OTOMATIS https://jurnal.umj.ac.id/index.php/just-it/article/view/28476 <p><strong>Heatlh conditions can often be detected though external indicators such as fingernails, yet access to rapid expert analysis is frequently a barrier. This research aims to design and build a mobile health application capable of providing automated preliminary analysis of nail conditions using AI techonology. The system integrates a frontend application built with flutter with a backend architecture that utilizes Google Apps Script, Google Sheets as a trigger, and Google Drive for storage. The core functionality relies on an automated workflow built on the n8n platform, which processes user-uploaded nail images through the generative AI model, Google Gemini 1.5 Flash, to produce a visual analysis. The result of this research is a functional and efficient system where users can receive the analysis in the form of an Al-annotated nail image directly on their mobile device. The resulting application was then validated through a series of functional tests to ensure each stage of the automated workflow performed as expected. The testing showed the system successfully processed user input to generate analysis output accurately, thus deeming the application viable for use.</strong></p> Mohamad Yusuf Sendy Prayuda Bagas Indra Lesmana Jericho Rayhan Maulana Eka Aditiya Syamsir Alam Copyright (c) 2025 2025-08-21 2025-08-21 15 3 455 462 PERBANDINGAN ANALISIS SENTIMEN FASILITAS KAMPUS PADA APLIKASI TIKTOK DAN DAN INSTAGRAM FT UMJ https://jurnal.umj.ac.id/index.php/just-it/article/view/1760 <p>Sentiment analysis determines positive, negative, or neutral sentiments or opinions contained in the text, including social media analysis. The role of social media, such as the TikTok and Instagram applications in sentiment analysis is important because these applications are places where people talk openly about various things, including facilities on the FT UMJ campus. In this study, the author took data from feed uploads and for your page from previous research, with 4,758 Instagram followers, and 2,616 TikTok followers on the FT UMJ account. The goal is that the results can be used as evaluation material for the campus regarding campus and academic facilities, as well as social media for publication. The author uses the following four steps in conducting the research methodology; data collection, data preprocessing, sentiment analysis, and data classification using the Naïve Bayes method. The author also designed the system and appearance of the application. The results are that F-1 Score, Recall, and Precision on Instagram are higher for negative labels than on TikTok. The accuracy value on Instagram is 54%, which has a better performance than TikTok which has an accuracy value of 33%. Thus, Instagram can be recommended as a priority for development.</p> Afrahani Luthfiyah Rully Mujiastuti Copyright (c) 2025 2025-08-21 2025-08-21 15 3 463 – 475 463 – 475 SISTEM CERDAS CHATBOT UNTUK PEMBELAJARAN PEMROGRAMAN DENGAN MENGGUNAKAN NATURAL LANGUAGE PROCESSING https://jurnal.umj.ac.id/index.php/just-it/article/view/27823 <p>Sistem chatbot cerdas memanfaatkan teknologi pemrosesan bahasa alami (NLP) untuk membantu siswa belajar pemrograman, dengan membuat asisten virtual yang dapat berinteraksi dengan siswa secara natural saat belajar pemrograman. Pendekatan pemrosesan bahasa alami digunakan untuk membuat sistem chatbot yang dapat memahami pertanyaan dalam bahasa alami dan memberikan jawaban yang sesuai dengan konsep pemrograman, debugging, dan penyelesaian masalah koding.Pada penelitian ini dibuatlah sistem Chatbot yang dapat memudahkan pengguna dalam pencarian pembelajaran serta menjawab pertanyaan yang diinginkan terkait layanan pembelajaran pemrograman. Dengan menggunakan proses pengolahan bahasa natural, chatbot -dapat berinteraksi di dunia nyata seolah-olah sedang melakukan komunikasi dengan mentor sehingga membantu siswa mendapatkan informasi yang tepat mengenai pertanyaan dari pembelajaran. Metodologi penelitian yang digunakan dalam penelitian ini antara lain pengumpulan dataset percakapan pembelajaran pemrograman, preprocessing data, pembuatan model natural language processing, dan evaluasi performa sistem. Hasil pengujian menunjukkan bahwa 90,2% pengguna setuju bahwa chatbot dapat membantu menyelesaikan masalah pemrograman, 74,5% pengguna merasa chatbot dapat menggantikan peran mentor dalam memberikan bantuan. Selain itu, sistem menunjukkan kemampuan untuk memberikan penjelasan konsep pemrograman, memberikan contoh kode, dan membantu debugging secara interaktif dan mudah dipahami. Dari hasil pengujian yang telah dilakukan, dinyatakan bahwa chatbot ini mampu memberikan respons berdasarkan kata kunci sehingga&nbsp; dapat memberikan jawaban yang tepat.</p> Rita Dewi Risanty Muhaemin Alika Raisya Copyright (c) 2025 2025-08-21 2025-08-21 15 3 476 483 PENERAPAN METODE WEIGHTED PRODUCT (WP) DALAM SISTEM PENDUKUNG KEPUTUSAN AUDIT INTERNAL UNIVERSITAS HAYAM WURUK PERBANAS https://jurnal.umj.ac.id/index.php/just-it/article/view/23237 <p>Univeristas Hayam Wuruk Perbanas merupakan kampus swasta ternama di kota Surabaya dengan akreditasi A yang mewadahi mahasiswanya dengan keberagaman ORMAWA-nya. Salah satu kegiatan yang dilakukan dalam ORMAWA adalah audit internal ORMAWA. Audit internal diselenggarakan sebagai transparansi dan evaluasi kinerja terhadap kegiatan program kerja yang telah dilaksanakan, dan sebagai tindak validasi kepatuhan ORMAWA terhadap kebijakan dan regulasi yang telah ditetapkan oleh Univeristas dalam menjalankan suatu ORMAWA. Namun pada perhitungan hasil audit internal masih dilakukan secara manual sehingga keakuratannya masih diragukan. Untuk mendukung Universitas dan BEM dalam proses hasil audit internal lebih cepat dan lebih akurat, maka diperlukan sebuah sistem pendukung keputusan yang dapat membantu. Dalam pembuatan sistem pendukung keputusan, penelitian ini menerapkan metode <em>Weighted Product. </em>Dengan penggunaan sistem pendukung Keputusan hasil perhitungan perangkingan WP ditentukan nilai tertinggi menjadi keputusan akhir dari sistem.</p> Noventy Ayuning Fitri Heri Supriyanto Ari Cahaya Puspitaningrum Copyright (c) 2025 2025-08-21 2025-08-21 15 3 484 489 SEGMENTASI PEMEGANG KARTU KREDIT MELALUI KLASTERISASI K-MEANS MENGGUNAKAN BAHASA PEMROGRAMAN PYTHON https://jurnal.umj.ac.id/index.php/just-it/article/view/18765 <p>Dalam perkembangan ekonomi yang cepat, penggunaan kartu kredit telah menjadi sangat penting. Kartu kredit, sebagai instrumen pembayaran yang diterbitkan oleh bank, memberikan kemampuan kredit kepada pemiliknya untuk melakukan pembelian barang atau layanan. Namun, penggunaannya mengalami penurunan yang signifikan akibat perubahan pola hidup dan dampak pandemi Covid-19. Survei perbankan menunjukkan tren penurunan dalam transaksi kartu kredit, yang dipicu oleh pengurangan pendapatan masyarakat selama pandemi. Untuk mengatasi tantangan ini, bank perlu mengembangkan strategi bisnis yang efektif. Salah satu pendekatan yang dapat digunakan adalah klasterisasi dengan algoritma <em>K-Means</em>. Algoritma <em>K-Means</em> merupakan teknik klasterisasi yang efektif digunakan untuk mengelompokkan data dengan tujuan memaksimalkan kesamaan antara variabel sambil tetap mempertahankan perbedaan karakteristiknya. Dengan mengimplementasikan algoritma ini dalam bahasa pemrograman <em>Python</em>, bank dapat memperoleh pemahaman yang lebih mendalam tentang preferensi dan kebutuhan dari setiap segmen pemegang kartu kredit. Demikian, algoritma <em>K-Means</em> dapat membantu dalam pengembangan strategi bisnis yang lebih efektif untuk meningkatkan penggunaan kartu kredit, serta mendapatkan nasabah baru. Selain itu, algoritma ini juga bermanfaat dalam mengatasi dampak penurunan penggunaan kartu kredit yang disebabkan oleh perubahan pola hidup masyarakat dan pandemi Covid-19. Hasil dari penelitian ini adalah pengelompokan data pengguna kartu kredit menjadi tiga kelompok yang dapat digunakan sebagai panduan dalam merumuskan strategi bisnis perbankan.</p> Agil Haubi Zikri Rita Dewi Risanty Copyright (c) 2025 2025-08-21 2025-08-21 15 3 490 503