INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGY AND EDUCATION (IJITE)
Development of Electronic Business Management Information System at Trinita Elektro Manado Store
the purpose of the study was to determine the results of the development of an electronic business management information system and to produce a valid, practical, and efficient electronic business ma...
Professional and Pedagogic Competence of Lecturers of the Faculty of Engineering Universitas Negeri Manado
the four teacher competencies are very important and cannot be separated from one another. professional competence, pedagogic competence, social competence and personality competence. one compet...
Developing Virtual Web as Learning Media for Web Programming in SMK
the purposes of this research are (1) to generate virtual web as learning media subject specifically for web programming, (2) to find out the appropriateness of the product developed as a learni...
RFID Based Fuel Payment System Design
in the current era, technological developments are so rapid and there are not a few technologies that offer a variety of advantages, both in terms of the functionality of the technology or its effecti...
Usability Evaluation of the Android Operating System Using Use Questionnaire
usability aspects are used as a reference in measuring the level of usability of the android operating system. usability is important to use as an instrument to ensure an application can be useful acc...
IT Infrastructure Library Framework Approach to the Measurement of E-Government Maturity
this research was conducted to improve e-government services on the manado smart city application to the smart city and determine the level of readiness and feasibility of the manado smart city applic...
CCTV Architectural Design for Theft Detection Using Intruder Detection System
the human need for a monitoring system for certain places is increasing. in this regard, the computer laboratory belonging to the school is not free from security intruders. security bully or in engli...
Evaluation of Incident Management in University Using IT Infrastructure Library Framework
supporting the implementation of optimal services is a major need for organizations today. guaranteed service management and good security is one of the benchmarks. this study aims to measure the leve...
Design E-Office Application for Population Based on Cloud Computing
information and communication technology in the field of population e-office is very useful in supporting the process of data management, information, facts, distribution, and knowledge. the purpose o...
Understanding Usability Test of Operating Systems in University: Evidence From Indonesia
the operating system is the most important computer system software. currently, there are several operating systems that are so popular, including windows and macos. usability measurements were made b...
Understanding Cyber Crime Behavior on E-Commerce Application Users
e-commerce technology is a business mechanism that works electronically by focusing on online business transactions and has the opportunity to build more human and personalized relationships with cust...
Wireless Local Area Network Security Through Protocol Wireless Protected Access
this study discusses the security analysis of wireless local area network (wireless lan) in the community against external attacks on the wireless protected access (wpa), web proxy, and virtual privat...
A Survey Student Behaviors Computer Security: Evidence From University
in lectures, of course, students definitely need a computer, whether it's to make assignments or to play games. therefore, in using computers, students must maintain computer security from threats tha...
Mokobang SDGP Website Analysis and Design
valid and fast information is needed in everyday life. information will be an important element in the development of society today and in the future, but the high need for information is sometimes no...
Understanding of Information Security Behavior of Social Media Users Among Millennial Generation
the increasing use of social networks in indonesia is caused by the increasingly complete internet access facilities carried out by producers of communication service providers. this research aims to ...
The Impact of E-Health for Cancer Patients
e-health or electronic health is the use of information and communication technology including electronics, telecommunications, computers and informatics to process various types of medical informatio...
Student Information Security Awareness on the Use of ATM Machines
this study examines literature studies on security systems at automated teller machines which include pin security and forms of attacks on atm security. the method used in atm security is the use of a...
Understanding Users to Adopt Cloud Computing TECHNOLOGY
this research is entitled "factors that influence users to adopt cloud computing technology" which aims to examine what factors influence users in adopting or using cloud computing. this study focuses...
Measurement of Usability Online Storage in Cloud Computing for University Users
cloud computing technology or often known as cloud computing is present as an impact of changes in the cultural environment and competitive ecosystem on higher education in the world, including indone...
Analysis of Information Security Management Systems at University
one of the keys to the success of securing information systems is the vision and commitment of top management leaders. security efforts or initiatives would be meaningless without them. in the absence...
2