Pub Date : 2020-04-08DOI: 10.35134/KOMTEKINFO.V7I2.1394
Rima Liana Gema, Mutiana Pratiwi, S. Lusinia, Devi Kartika, Ulya Ilhami Arsyah
The use of computers in people's lives is growing as is the case with companies that provide scholarships for the children of employees who work at the company. The scholarship selection system is still done manually so it is ineffective and inefficient and requires a long time. By using a new system design to assist in data processing of spare part goods, producing a desired system a system is created. In this study the authors used the method of field research, interviews, library research and laboratory research, in conducting analysis using UML (Unified Model Language). The new system will be implemented later to improve the quality of information generated so that these designs can be useful for the company concerned.
{"title":"Employee Scholarship Acceptance By Applying The Mfep Method","authors":"Rima Liana Gema, Mutiana Pratiwi, S. Lusinia, Devi Kartika, Ulya Ilhami Arsyah","doi":"10.35134/KOMTEKINFO.V7I2.1394","DOIUrl":"https://doi.org/10.35134/KOMTEKINFO.V7I2.1394","url":null,"abstract":"The use of computers in people's lives is growing as is the case with companies that provide scholarships for the children of employees who work at the company. The scholarship selection system is still done manually so it is ineffective and inefficient and requires a long time. By using a new system design to assist in data processing of spare part goods, producing a desired system a system is created. In this study the authors used the method of field research, interviews, library research and laboratory research, in conducting analysis using UML (Unified Model Language). The new system will be implemented later to improve the quality of information generated so that these designs can be useful for the company concerned.","PeriodicalId":403738,"journal":{"name":"Jurnal KomtekInfo","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128909772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-04-08DOI: 10.35134/KOMTEKINFO.V7I2.1377
F. Firdaus, Nico Alvio Maiyendra, Ritna Wahyuni
Ads that will be created and displayed must have a good, unique appearance that can attract the attention of consumers and be dynamic in accordance with the fields managed by the company. Website as a medium of promotion and information has enormous benefits. First, consumers do not need to come directly to the store to see and choose the items they want to buy. Second, in terms of financial consumers can save costs incurred, if the store location is far away. The product ordering target is stronger, not only for certain regions. There is no promotion done by Karang Setio Batik Studio, either in the promotion of television advertising, radio or website, making this household industry less well known and visited by many people. And also in the transaction process is still manually with the opportunity to come to the store. Because it needs to be overcome by promoting and providing information using promotional media and website-based information, and also makes it easier to conduct transactions between stores and customers. And it can be concluded that the old system used is not effective and will cause the process carried out will take time and place so that makes employee performance less efficient and effective and results in reports that are not accurate and accurate. This research was conducted by applying a framework or research method that starts from identification of problems, problem analysis, set goals, study literature, collecting data, system design, system testing, and system implementation. By utilizing the development of technology and functions of internet promotion and website-based information as one of the marketing strategies in business development at Karang Karang Setio.
{"title":"Website Designing As A Media For Promotion And Information On Karang Setio Batik(Perancangan Website Sebagai Media Promosi Dan Informasi Pada Batik Karang Setio)","authors":"F. Firdaus, Nico Alvio Maiyendra, Ritna Wahyuni","doi":"10.35134/KOMTEKINFO.V7I2.1377","DOIUrl":"https://doi.org/10.35134/KOMTEKINFO.V7I2.1377","url":null,"abstract":"Ads that will be created and displayed must have a good, unique appearance that can attract the attention of consumers and be dynamic in accordance with the fields managed by the company. Website as a medium of promotion and information has enormous benefits. First, consumers do not need to come directly to the store to see and choose the items they want to buy. Second, in terms of financial consumers can save costs incurred, if the store location is far away. The product ordering target is stronger, not only for certain regions. There is no promotion done by Karang Setio Batik Studio, either in the promotion of television advertising, radio or website, making this household industry less well known and visited by many people. And also in the transaction process is still manually with the opportunity to come to the store. Because it needs to be overcome by promoting and providing information using promotional media and website-based information, and also makes it easier to conduct transactions between stores and customers. And it can be concluded that the old system used is not effective and will cause the process carried out will take time and place so that makes employee performance less efficient and effective and results in reports that are not accurate and accurate. This research was conducted by applying a framework or research method that starts from identification of problems, problem analysis, set goals, study literature, collecting data, system design, system testing, and system implementation. By utilizing the development of technology and functions of internet promotion and website-based information as one of the marketing strategies in business development at Karang Karang Setio.","PeriodicalId":403738,"journal":{"name":"Jurnal KomtekInfo","volume":"24 9","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141215886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-04-08DOI: 10.35134/KOMTEKINFO.V7I2.1392
H. Yanto, Febri Hadi
Network security is an important factor in guaranteeing data. Guaranteed security can avoid losses caused by attacks that occur in the network. Administrators play an important role in maintaining data or file security, but administrators cannot at all times monitor the security of the network. This problem can be overcome by adding a system for data traffic detection or called IDS. IDS will be linked by SMS Alert so that administrators can receive notifications of interruptions on the network. In this study, researchers conduct analysis and testing of problems that arise so that it will produce a system that is able to detect attacks or disruptions on the network quickly and can provide warnings to network administrators, so that administrators can take steps to anticipate these disruptions. Attacks can be detected from the pattern of attacks that are in the IDS rule so that intruders who try to enter will be detected and the system will send an SMS notification to the administrator.
{"title":"Intruder Detection Monitoring System in Computer Networks Using Snort Based Sms Alert (Sistem Monitoring Deteksi Penyusup Dalam Jaringan Komputer Menggunakan Snort Berbasis Sms Alert)","authors":"H. Yanto, Febri Hadi","doi":"10.35134/KOMTEKINFO.V7I2.1392","DOIUrl":"https://doi.org/10.35134/KOMTEKINFO.V7I2.1392","url":null,"abstract":"Network security is an important factor in guaranteeing data. Guaranteed security can avoid losses caused by attacks that occur in the network. Administrators play an important role in maintaining data or file security, but administrators cannot at all times monitor the security of the network. This problem can be overcome by adding a system for data traffic detection or called IDS. IDS will be linked by SMS Alert so that administrators can receive notifications of interruptions on the network. In this study, researchers conduct analysis and testing of problems that arise so that it will produce a system that is able to detect attacks or disruptions on the network quickly and can provide warnings to network administrators, so that administrators can take steps to anticipate these disruptions. Attacks can be detected from the pattern of attacks that are in the IDS rule so that intruders who try to enter will be detected and the system will send an SMS notification to the administrator.","PeriodicalId":403738,"journal":{"name":"Jurnal KomtekInfo","volume":"37 9","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141215829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-31DOI: 10.37034/jsisfotek.v2i1.21
Angga Putra Juledi, Sarjon Defit, Yuhandri Yunus
Crimes in minors are a series of guardian actions or negligence by parents who endanger or pose a dangerous threat to the child. The purpose of this study is to implement Data Mining, Association rule, andthe FP-Growth Algorithm in cases of crime of minors so that they can extract knowledge and important and interesting information from the database. The data source used is raw data that has not been processed andis a crime data on minors which is summarized in the form of a report from the West Sumatra Regional Police. The results of this study are in the form of software by analyzing data collected using the FP-Growth Algorithm and using the concept of FP-Tree development in searching for Frequent Itemset, for testing the results carried out with applications that have been designed namely the Php programming language. The results of testing are obtained from associations of crime cases that often occur in minors. So it can be seen that data mining using the Fp-Growth Algorithm can be used to analyze cases of crime in minors as a consideration for the police in order to know the ins and outs of crime in children so that it can assist the investigation process.
{"title":"Analisis Tingkat Kejahatan Pada Anak Dibawah UmurMenggunakan Metode Fp-Growth","authors":"Angga Putra Juledi, Sarjon Defit, Yuhandri Yunus","doi":"10.37034/jsisfotek.v2i1.21","DOIUrl":"https://doi.org/10.37034/jsisfotek.v2i1.21","url":null,"abstract":"Crimes in minors are a series of guardian actions or negligence by parents who endanger or pose a dangerous threat to the child. The purpose of this study is to implement Data Mining, Association rule, andthe FP-Growth Algorithm in cases of crime of minors so that they can extract knowledge and important and interesting information from the database. The data source used is raw data that has not been processed andis a crime data on minors which is summarized in the form of a report from the West Sumatra Regional Police. The results of this study are in the form of software by analyzing data collected using the FP-Growth Algorithm and using the concept of FP-Tree development in searching for Frequent Itemset, for testing the results carried out with applications that have been designed namely the Php programming language. The results of testing are obtained from associations of crime cases that often occur in minors. So it can be seen that data mining using the Fp-Growth Algorithm can be used to analyze cases of crime in minors as a consideration for the police in order to know the ins and outs of crime in children so that it can assist the investigation process.","PeriodicalId":403738,"journal":{"name":"Jurnal KomtekInfo","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126667013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-01-14DOI: 10.35134/komtekinfo.v7i1.66
Risa Nadia Ernes
This study was conducted to design a security system on a locker by implementing multiple security using bluetooth media on the mobile phone and the keypad so that it can improve the security of a good value. The system is built to design, create and implement the components of a system that includes a microcontroller as process controllers, mobile phones (Bluetooth) based on android and bluetooth module HC-05 as the sender and recipient of the data series that serve as the first security in the form of a data connection and keypad as the security of both the locker system. Both security serves as input into a double security system. This system has outputs that can display information, the activation open the door and close the door and buzzer as a marker that the password is incorrect.The results showed a tool created to function properly and can be expanded to a larger scale.
{"title":"Application In Locker Security System With Double Bluetooth Media Using Microcontroller And Basic Programming Language(Aplikasi Sistem Double Security Pada Locker Dengan Media Bluetooth Menggunakan Mikrokontroler Dan Bahasa Pemrograman Basic)","authors":"Risa Nadia Ernes","doi":"10.35134/komtekinfo.v7i1.66","DOIUrl":"https://doi.org/10.35134/komtekinfo.v7i1.66","url":null,"abstract":"This study was conducted to design a security system on a locker by implementing multiple security using bluetooth media on the mobile phone and the keypad so that it can improve the security of a good value. The system is built to design, create and implement the components of a system that includes a microcontroller as process controllers, mobile phones (Bluetooth) based on android and bluetooth module HC-05 as the sender and recipient of the data series that serve as the first security in the form of a data connection and keypad as the security of both the locker system. Both security serves as input into a double security system. This system has outputs that can display information, the activation open the door and close the door and buzzer as a marker that the password is incorrect.The results showed a tool created to function properly and can be expanded to a larger scale.","PeriodicalId":403738,"journal":{"name":"Jurnal KomtekInfo","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116430238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-01-14DOI: 10.35134/komtekinfo.v7i1.61
Mardison, Syafrika Deni Rizki, Larissa Navia Rani, Agung Ramadhanu, R. Witri
Healthy food menu for toddlers is selected based on criteria that have been determined by Puskesmas Sasak Ranah Pasisie. The selection of healthy food menus for toddlers is carried out by the institution as the selection of healthy foods for toddlers. The selection of toddler food menus still uses traditional methods that have not been systemized. With these problems, a decision support system is applied using the La Raelite Elimination Et Choix method. This method is able to give subjective and inuitive considerations of the criteria factors that are considered important influences on alternative choices. Decision Support System is a computer technology solution that can be used to support decision making that is complex in problem solving in an organization, in order to be able to determine the selection of the best competitive and superior healthy food menu from the many toddler food menus then the process of selecting a healthy toddler food menu that determines the optimal alternative is fast and efficient.
{"title":"(Implementation of the Electre (Elimination Et Choix Traduisan La Realite) Method in a Healthy Food Menu Decision Support System for Toddlers in the Sasak Area Health Center Pasisie Using the Php And Databse Mysql Programming Language)","authors":"Mardison, Syafrika Deni Rizki, Larissa Navia Rani, Agung Ramadhanu, R. Witri","doi":"10.35134/komtekinfo.v7i1.61","DOIUrl":"https://doi.org/10.35134/komtekinfo.v7i1.61","url":null,"abstract":"Healthy food menu for toddlers is selected based on criteria that have been determined by Puskesmas Sasak Ranah Pasisie. The selection of healthy food menus for toddlers is carried out by the institution as the selection of healthy foods for toddlers. The selection of toddler food menus still uses traditional methods that have not been systemized. With these problems, a decision support system is applied using the La Raelite Elimination Et Choix method. This method is able to give subjective and inuitive considerations of the criteria factors that are considered important influences on alternative choices. Decision Support System is a computer technology solution that can be used to support decision making that is complex in problem solving in an organization, in order to be able to determine the selection of the best competitive and superior healthy food menu from the many toddler food menus then the process of selecting a healthy toddler food menu that determines the optimal alternative is fast and efficient.","PeriodicalId":403738,"journal":{"name":"Jurnal KomtekInfo","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114411549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-01-14DOI: 10.35134/komtekinfo.v7i1.63
Julius Santony
Minutiae is part of the fingerprint, which is the point where the fingerprint line stops or branches, which can be observed by scanning at a resolution of 500 pp. a fingerprint has minutiae that range from 50-100 pieces scattered throughout the surface of the fingerprint. To clarify the fingerprint can be done by extracting the minutiae contained in the fingerprint. With this extraction process, fingerprint images can be clarified, so identification of a fingerprint will be easy to do. This research extracts minutiae objects in the fingerprint image, so that the fingerprint line object can be seen clearly. The first stage in this research is object detection and edge detection using morphological methods. The next step is the extraction of minutiae objects with the gabor filter and minutiae extraction . The results obtained can display the fingerprint line of the fingerprint image clearly. From the results of testing 10 fingerprint images proved that the minutiae object in the image can be extracted, so that the fingerprint line of the image is clearer than the original image.
{"title":"Minutea Object Extraction in Fingerprint Image Using Morphological Methods and Gabor Filters (Ekstraksi Objek Minutea Pada Citra Sidik Jari Dengan Metode Morfologi dan Gabor Filter)","authors":"Julius Santony","doi":"10.35134/komtekinfo.v7i1.63","DOIUrl":"https://doi.org/10.35134/komtekinfo.v7i1.63","url":null,"abstract":"Minutiae is part of the fingerprint, which is the point where the fingerprint line stops or branches, which can be observed by scanning at a resolution of 500 pp. a fingerprint has minutiae that range from 50-100 pieces scattered throughout the surface of the fingerprint. To clarify the fingerprint can be done by extracting the minutiae contained in the fingerprint. With this extraction process, fingerprint images can be clarified, so identification of a fingerprint will be easy to do. This research extracts minutiae objects in the fingerprint image, so that the fingerprint line object can be seen clearly. The first stage in this research is object detection and edge detection using morphological methods. The next step is the extraction of minutiae objects with the gabor filter and minutiae extraction . The results obtained can display the fingerprint line of the fingerprint image clearly. From the results of testing 10 fingerprint images proved that the minutiae object in the image can be extracted, so that the fingerprint line of the image is clearer than the original image.","PeriodicalId":403738,"journal":{"name":"Jurnal KomtekInfo","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131070695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-01-14DOI: 10.35134/KOMTEKINFO.V7I1.1191
Muhammad Reza Putra, A. Bakar
This paper will explain in details on data reports preliminary on dataset, how the pre-processing data mainly for data cleaning and reduction process applied to a dataset. The dataset that will be used is number of visitors to Taiwan by their residence and purpose.Dataset which is obtained based on kaggle, findings from Scraped from Taiwan Tourism Bureau. The surveys have been carried out using Foreign visitor data covers all foreign visitors directly arrived in Taiwan through the airports, ports and land.
{"title":"Data Preprocessing: Case Study on monthly number of visitors to Taiwan by their residence and purpose","authors":"Muhammad Reza Putra, A. Bakar","doi":"10.35134/KOMTEKINFO.V7I1.1191","DOIUrl":"https://doi.org/10.35134/KOMTEKINFO.V7I1.1191","url":null,"abstract":"This paper will explain in details on data reports preliminary on dataset, how the pre-processing data mainly for data cleaning and reduction process applied to a dataset. The dataset that will be used is number of visitors to Taiwan by their residence and purpose.Dataset which is obtained based on kaggle, findings from Scraped from Taiwan Tourism Bureau. The surveys have been carried out using Foreign visitor data covers all foreign visitors directly arrived in Taiwan through the airports, ports and land.","PeriodicalId":403738,"journal":{"name":"Jurnal KomtekInfo","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115198886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-01-14DOI: 10.35134/komtekinfo.v7i1.64
Zefriyenni, Yogi Wiyandra, Firna Yenila
Billboard tax calculations conducted by the Revenue, Financial and Asset Management Agency (DPPKA) Kab. Dharmasraya still uses a manual system so that performance is not optimal. The research conducted aims to optimize the calculation of advertisement tax and provide fast service time for ad users and taxpayers. With this research, it is expected to be able to assist the DPPKA in calculating the advertisement tax effectively and efficiently. The research methods used are field research, library research and laboratories. So that a new system analysis is produced by using tools such as Use Case Diagrams, Sequence Diagrams, Class Diagrams, Activity Diagrams and Deployment Diagrams.
{"title":"Reclamation Tax Calculation at Revenue Service, Regional Financial and Asset Management (Dppkad) Pariaman City(Perhitungan Pajak Reklamepada Dinas Pendapatan, Pengelola Keuangan Dan Aset Daerah (Dppkad) Kota Pariaman)","authors":"Zefriyenni, Yogi Wiyandra, Firna Yenila","doi":"10.35134/komtekinfo.v7i1.64","DOIUrl":"https://doi.org/10.35134/komtekinfo.v7i1.64","url":null,"abstract":"Billboard tax calculations conducted by the Revenue, Financial and Asset Management Agency (DPPKA) Kab. Dharmasraya still uses a manual system so that performance is not optimal. The research conducted aims to optimize the calculation of advertisement tax and provide fast service time for ad users and taxpayers. With this research, it is expected to be able to assist the DPPKA in calculating the advertisement tax effectively and efficiently. The research methods used are field research, library research and laboratories. So that a new system analysis is produced by using tools such as Use Case Diagrams, Sequence Diagrams, Class Diagrams, Activity Diagrams and Deployment Diagrams.","PeriodicalId":403738,"journal":{"name":"Jurnal KomtekInfo","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126261906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-01-14DOI: 10.35134/komtekinfo.v7i1.67
Fajrin Rizaldi, A. Gusman, Ulya Mega Wahyuni
BMKGsoft is a website owned by BMKG that is used to enter certain data obtained. Governance is a structure of relationships and processes to direct and control the organization to achieve its objectives. In thisstudy using the COBIT framework (Control objectives for information and related technologies) version 5, the selected domain in the study was the EDM, APO, DSS, and MEA domains. In the research done overall the average obtained is 2.96 with a maturity scale is on a scale of 3.
{"title":"BMKG soft Quality Measurement Using COBIT Framework 5 Case Study: Teluk Bayur Maritime Meteorological Station (Pengukuran Kualitas BMKGsoft Menggunakan Framework COBIT 5 Studi Kasus : Stasiun Meteorologi Maritim Teluk Bayur)","authors":"Fajrin Rizaldi, A. Gusman, Ulya Mega Wahyuni","doi":"10.35134/komtekinfo.v7i1.67","DOIUrl":"https://doi.org/10.35134/komtekinfo.v7i1.67","url":null,"abstract":"BMKGsoft is a website owned by BMKG that is used to enter certain data obtained. Governance is a structure of relationships and processes to direct and control the organization to achieve its objectives. In thisstudy using the COBIT framework (Control objectives for information and related technologies) version 5, the selected domain in the study was the EDM, APO, DSS, and MEA domains. In the research done overall the average obtained is 2.96 with a maturity scale is on a scale of 3.","PeriodicalId":403738,"journal":{"name":"Jurnal KomtekInfo","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127193669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}