Browsing by Author "Yuliani, SY"
Now showing 1 - 2 of 2
Results Per Page
Sort Options
- ItemA FUZZY AHP DECISION SUPPORT SYSTEM FOR THE ELECTION (E-VOTING)(Solid State Technology Volume: 63 Issue: 4, 2020) Yuliani, SY; Rahmansyah, Septian; Kamaluddin, Iqbal; Midiawan, Raden FriskyAdvanced technology provides an easy way to carry out various activities. An example is the E-voting application, a voting method, and counting votes in general elections using electronic devices. E-voting is a relatively new technology to support the implementation of democratic parties. In the implementation of conventional voting, mistakes often occur caused by human error. This project aims to design E-Voting for the election of the Chair of the Engineering Student Association using the AHP method. The benefit of this E-Voting is that we do not need to print ballot papers, so it supports the green technology program. Voting is also easy to do because only by touching the image mark on the touch panel represents the ballot. Thus, it is considered possible to facilitate persons with disabilities by using additional electronic features on the same device.
- ItemINFORMATION SYSTEM SECURITY ANALYSIS AT PT. TELKOM USING KAMI INDEX(International Journal of Psychosocial Rehabilitation, Vol.24, Issue 02, 2020) Yuliani, SY; Heryono, Heri; Rosita, Ai; Zulpratita, Ulil Surtia; Angga Laksana, Eka; Sulianta, Feriby the development of information technology, it provides convenience way for every individual or institution to perform its duties and functions. Information security used by institutions must be maintained, yet they can manage and further they can avoid failure. Therefore it is important to assess the relevant institutions to determine the level of maturity and completeness of information security. The assessment carried out was by using the Information Security Index (KAMI) issued by the Ministry of Communication and Information that has fulfilled the requirements and aspects of information security that refer to ISO 27001. Currently, PT Telekomunikasi Indonesia (TELKOM) has implemented information technology. At PT TELKOM there are well-implemented access controls including security or supervision of important work locations (server room, archive space); only employees are given a username and password to access it and also have implemented security to detect and prevent network access usage (including network wireless).