Journal of Information Technology and Cyber Security https://jurnal.untag-sby.ac.id/index.php/jitsc en-US <p>Copyright Notice based on COPE (Committee on Publication Ethics) for JITCS: Journal of Information Technology and Cyber Security</p> <ol> <li class="show"> <p>Ownership and Copyright: 1.1. JITCS: Journal of Information Technology and Cyber Security respects the intellectual property rights of authors. The copyright for individual articles published in JITCS is retained by the respective authors, unless otherwise specified. 1.2. The articles published in JITCS are licensed under a <a title="CC-BY-NC-ND 4.0" href="https://creativecommons.org/licenses/by-nc-nd/4.0/deed.en" target="_blank" rel="noopener">Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License (CC BY-NC-ND 4.0)</a>, which permits others to remix, adapt, and build upon the work for non-commercial purposes, provided appropriate attribution is given to the original source and any modifications or adaptations are shared under the same license. 1.3. JITCS serves as the initial publisher of the articles, providing them with the first publication platform.</p> </li> <li class="show"> <p>Permissions and Usage 2.1. Readers are granted the right to read, download, copy, and print the published articles for personal and non-commercial use, as permitted under the CC BY-NC-ND 4.0 license. 2.2. Any use of the published content beyond personal and non-commercial purposes, including reproduction, distribution, or adaptation, requires prior written permission from the respective authors. 2.3. Requests for permissions to reproduce, distribute, or adapt content from JITCS should be directed to the journal's editorial office, and requests for permissions to use the authors' work should be directed to the respective authors.</p> </li> <li class="show"> <p>Attribution and Citation 3.1. Proper attribution and citation of the published work should be provided when using or referring to content from JITCS. This includes clearly indicating the authors, the title of the article, the journal name (JITCS), the volume/issue number, the publication year, and the article's DOI (Digital Object Identifier) when available. 3.2. When adapting or modifying the published content, proper attribution to the original source should be given, and the adapted or modified content should be shared under the same CC BY-NC-ND 4.0 license.</p> </li> <li class="show"> <p>Plagiarism and Copyright Infringement 4.1. JITCS considers plagiarism and copyright infringement as serious ethical violations. Authors are responsible for ensuring that their submitted work is original and does not infringe upon the copyright or intellectual property rights of others. 4.2. Any allegations of plagiarism or copyright infringement will be investigated promptly and thoroughly. If proven, appropriate actions, including rejection of the manuscript, retraction of the published article, or other corrective measures, will be taken.</p> </li> <li class="show"> <p>Open Access Licensing 5.1. JITCS supports open access publishing and encourages authors to consider publishing their work under the CC BY-NC-ND 4.0 license to promote the dissemination and use of knowledge in the field of information technology and cyber security. 5.2. The specific terms and conditions of the CC BY-NC-ND 4.0 license will be clearly indicated on the published articles.</p> </li> <li class="show"> <p>Policy Review This Copyright Notice will be periodically reviewed and updated to ensure its continued relevance and compliance with copyright laws, ethical standards, and open access principles in scholarly publishing. Any updates or revisions to the notice will be communicated to the relevant stakeholders.</p> </li> </ol> <p>By adhering to this Copyright Notice, JITCS aims to protect the rights of authors, promote proper attribution and citation practices, and facilitate the responsible and legal use of the published content in accordance with the CC BY-NC-ND 4.0 license.</p> sitimutrofin@untag-sby.ac.id (Siti) f.yulianto@untag-sby.ac.id (Fajar Yulianto, S.Kom) Thu, 22 Feb 2024 00:00:00 +0000 OJS 3.1.1.4 http://blogs.law.harvard.edu/tech/rss 60 Agile Implementation for Inventory (Case study: Business Unit of Private University) https://jurnal.untag-sby.ac.id/index.php/jitsc/article/view/10060 <p>The Unitomo Employee and Lecturer Business unit in the city of Surabaya, Indonesia, has several problems arising from the implementation of a manual system in the form of a paper-based system, which has the potential risks, such as 1) Damage and Risk of data loss, 2) Ineffectiveness in making reports; 3) Increased risk of human error caused by transaction volume, lack of management, and non-integration data; 4) Limited user accesses to the ledger, Time-consuming processes, and no collaboration. This research aims to overcome this problem by developing an inventory recording system using an Agile approach with the Scrum framework, PHP with the Slim 3 framework, MySQL, black box testing, and adding revenue and sales features as a difference from previous research. The research results show that the system developed was successful in helping Unitomo Business unit employees and lecturers overcome their problems, especially in monitoring the amount of inventory stock. The proposed system has features for recording incoming and outgoing goods transactions and sales and income reports. The use of the Agile Scrum method in software development helps teams in project planning and monitoring progress throughout the design process.</p> Cempaka Ananggadipa Swastyastu, Ratna Nur Tiara Shanty, Rika Puspita Sari, Anggit Wikanningrum ##submission.copyrightStatement## http://creativecommons.org/licenses/by-nc-nd/4.0 https://jurnal.untag-sby.ac.id/index.php/jitsc/article/view/10060 Sat, 03 Feb 2024 00:00:00 +0000