https://ejournal.itn.ac.id/index.php/IJCOMIT/issue/feed International Journal of Computer Science and Information Technology 2025-04-23T20:00:12+07:00 Joseph Dedy Irawan ijcomit@itn.ac.id Open Journal Systems <p><strong>International Journal of Computer Science and Information Technology</strong><br>IJCOMIT is a journal of Computer Science and Informatics Engineering published by the Computer Science Department, Malang National Institute of Technology, Indonesia, this journal aims to accommodate research articles in the field of Computer Science and Informatics which include programming, interfacing, artificial intelligence, computer networks, cloud technology , embedded systems, image processing, databases, e-commerce, decision-making systems, as well as other fields relevant to Information Technology to publish scientific works in a wide audience.<br>e-ISSN : -<br><strong>Subjects:</strong> Computer Science &amp; Information Technology</p> https://ejournal.itn.ac.id/index.php/IJCOMIT/article/view/14171 DEVELOPMENT OF A WEB-BASED REGISTRATION SYSTEM AT THE TUNJUNGSEKAR SUBDISTRICT OFFICE 2025-04-23T19:53:02+07:00 Deddy Rudhistiar rudhistiar@lecturer.itn.ac.id Muhammad Hasan Wahyudi rudhistiar@lecturer.itn.ac.id Cornelia Luba Tara Boro rudhistiar@lecturer.itn.ac.id Siti Mutiara rudhistiar@lecturer.itn.ac.id Thesa Adi Saputra Yusri rudhistiar@lecturer.itn.ac.id <p>The Tunjungsekar subdistrict office regularly organizes various activities involving local participants. Currently, the registration process is conducted using Google Forms, which, while facilitating data collection, presents challenges such as duplicate registrations and difficulties in managing participant quotas. Additionally, participant data processing and activity summaries are still handled manually, reducing administrative efficiency. To address these issues, a web-based registration system was developed using PHP with the Laravel framework and a MySQL database. This system enables automatic validation to prevent duplicate registrations and allows for more effective participant quota management. Blackbox taesting shows that the system works, the system functions properly without significant bugs or errors. With this system, activity data management becomes more structured, participant records are more accurate, and administrative processes are more efficient. The implementation of this system is expected to support the digitalization of community services and enhance the community’s experience in accessing information and services more practically and systematically</p> 2025-04-23T19:47:51+07:00 Copyright (c) 2025 International Journal of Computer Science and Information Technology https://ejournal.itn.ac.id/index.php/IJCOMIT/article/view/13659 DEVELOPMENT OF INFORMATION SYSTEM FOR BOARDING HOUSES 2025-04-23T19:53:53+07:00 Betty Dewi Puspasari 810921002@gms.ndhu.edu.tw Joseph Dedy Irawan 810921002@gms.ndhu.edu.tw Ridho Arif Wicaksono 810921002@gms.ndhu.edu.tw Dimas Rizky Pratama 810921002@gms.ndhu.edu.tw Ahmad Bahrul Ilmi 810921002@gms.ndhu.edu.tw <p>The management of boarding houses through manual bookkeeping still faces many challenges, such as recording errors, difficulty in monitoring room availability, and inefficiencies in communication between the manager and tenants. boarding houses face these issues, which can potentially lead to conflicts due to misinformation regarding billing and room status.To address these problems, this study aims to develop a web-based boarding house management information system integrated with WhatsApp as a billing notification tool. This system is designed to reduce recording errors, improve room management efficiency, and facilitate communication between tenants and the boarding house manager.With the implementation of this system, it is expected that boarding house managers can easily access tenant data, monitor room status in real-time, and automate the billing process for tenants. The expected outcome of this system development is improved efficiency in boarding house management, increased data recording accuracy, and ease of monitoring and communication</p> 2025-04-23T19:50:19+07:00 Copyright (c) 2025 International Journal of Computer Science and Information Technology https://ejournal.itn.ac.id/index.php/IJCOMIT/article/view/13206 SECURITY ANALYSIS OF COLLEGE WEBSITES USING VULNERABILITY ASSESSMENT METHOD 2025-04-23T19:51:16+07:00 Dio Wahyu Saputra diowahyu64@gmail.com Risqy Siwi Pradini risqypradini@itsk-soepraoen.ac.id Mochammad Anshori moanshori@itsk-soepraoen.ac.id <p>Web application security, especially on college websites, is a critical aspect in maintaining data integrity and protecting users from cyber threats. This research evaluates the security of college websites using the vulnerability assessment method. By utilizing tools such as OWASP ZAP and penetration testing techniques, this research identifies weaknesses at various security layers, including vulnerabilities to Path Traversal attacks, SQL Injection, and deficiencies in the implementation of HTTP security header settings. The analysis shows that the main vulnerabilities are caused by a lack of input validation, inadequate security configuration, and the use of outdated software libraries. This research provides practical solutions such as strengthening security configurations, system updates, and implementing modern security policies to mitigate risks. These findings aim to enhance the security of college websites and create a safer online environment.</p> 2025-04-23T19:51:15+07:00 Copyright (c) 2025 International Journal of Computer Science and Information Technology https://ejournal.itn.ac.id/index.php/IJCOMIT/article/view/12872 IMPROVING END-TO-END ENCRYPTION SECURITY ON HTTP USING A GREGORIAN DAN JAVANESE CALENDAR-BASED KEY GENERATOR 2025-04-23T19:57:00+07:00 Eko Heri Susanto ekoheris@lecturer.itn.ac.id Yohanes Dwi Cahyono yohanes@poltekad.ac.id Riyant Budi S riyantb3@gmail.com <p>This research investigates an end-to-end encryption method with a dynamic key generator based on the conversion of the Gregorian calendar to the Javanese calendar to improve the security of the Hypertext Transfer Protocol (HTTP) and Hypertext Transfer Protocol Secure (HTTPS) protocols, which remain vulnerable to attacks. The research generates unique asymmetric keys down to the millisecond level without affecting the speed of the web server. However, this method has a downside: the data size (transfer size) doubles because the ciphertext encoding still uses hexadecimal</p> 2025-04-23T19:56:57+07:00 Copyright (c) 2025 International Journal of Computer Science and Information Technology https://ejournal.itn.ac.id/index.php/IJCOMIT/article/view/13101 UTILIZING RC5 ENCRYPTION TO OPTIMIZE CONTENT SECURITY IN WEB APPLICATIONS 2025-04-23T20:00:12+07:00 Wirpan Atmaja Putra wirfan.azillia28@gmail.com Alldino Allban Prakasa wirfan.azillia28@gmail.com <p>The rapid advancement of information and communication technology has led to an increased use of web applications, but also brought challenges in data security. The widely used HTTP protocol remains vulnerable to threats such as data theft and cyber-attacks. One solution to mitigate these issues is the use of client-side encryption methods, such as the RC5 algorithm, which provides high flexibility in encryption parameter configurations. This research analyzes the implementation of the RC5 algorithm in enhancing web application data security. A web application prototype utilizing RC5 encryption was developed and tested for encryption time, decryption time, and memory consumption. Test results indicate that the RC5 algorithm enhances data security without significantly compromising application performance. However, an increase in processing load was observed on low-specification devices. This study also highlights the importance of adjusting RC5 parameters to balance security and performance</p> 2025-04-23T20:00:08+07:00 Copyright (c) 2025 International Journal of Computer Science and Information Technology