Klaim Artikel Anda
Verifikasi kepemilikan artikel akademik
Apakah artikel-artikel ini milik Anda?
Daftarkan diri Anda sebagai author untuk mengklaim artikel dan dapatkan profil akademik terverifikasi dengan fitur lengkap.
Badge Verifikasi
Profil terverifikasi resmi
Statistik Lengkap
H-index, sitasi, dan metrik
Visibilitas Tinggi
Tampil di direktori author
Kelola Publikasi
Dashboard artikel terpadu
Langkah-langkah Klaim Artikel:
- 1. Daftar akun author dengan email akademik Anda
- 2. Verifikasi email dan lengkapi profil
- 3. Login dan buka menu "Klaim Artikel"
- 4. Cari dan klaim artikel Anda
- 5. Tunggu verifikasi dari admin (1-3 hari kerja)
Menampilkan 1–5 dari 5 artikel
Precision Healthcare: Leveraging Value Chain Analysis of Strategic Information Systems and Information Technology to Enhance Hospital Outcomes
Kamarudin, Kamarudin
Jurnal Riset Sistem dan Teknologi Informasi
Vol 3
, No 2
(2025)
In the healthcare digitalization era, leveraging strategic information systems (IS) and information technology (IT) through value chain analysis has emerged as a pivotal approach to enhance hospital outcomes. This study aims to develop a framework for integrating IS/IT strategies at Datu Sanggul Hospital, a Class C facility in South Kalimantan, to achieve precision healthcare delivery. The research methodology encompasses data collection via document studies, stakeholder interviews, and observat...
Sumber Asli
Google Scholar
DOI
Information System Strategy for Improving Academic Service Quality at UM Banjarmasin Through the Development of Academic Extension (ADEX) Innovation Application
Kamarudin, Kamarudin
Jurnal Riset Sistem dan Teknologi Informasi
Vol 3
, No 1
(2025)
This research program aims to enhance academic service quality at Universitas Muhammadiyah Banjarmasin (UM Banjarmasin) through the development of an innovative application called Academic Extension (ADEX). The initiative was driven by the need to improve efficiency and integration of academic services, addressing the current inadequate systems that fail to support effective academic management. The research methodology involved three key phases: needs analysis, application development, and fiel...
Sumber Asli
Google Scholar
DOI
Leveraging SWOT Analysis in IS/IT Strategy for Enhancing Hospital Quality
Kamarudin, Kamarudin
Jurnal Riset Sistem dan Teknologi Informasi
Vol 2
, No 2
(2024)
The research conducted at the Datu Sanggul Hospital in Rantau focuses on developing a strategic plan for enhancing the quality of healthcare services through Information System (IS) and Information Technology (IT) implementation. The study aims to address the challenges faced by the hospital in optimizing its Management Information System and Medical Record (SIM & RM) unit. By utilizing the Ward & Peppard framework, the research progresses through stages including problem formulation, da...
Sumber Asli
Google Scholar
DOI
1 Sitasi
DECISION SUPPORT SYSTEM IN IMPROVING THE QUALITY OF BANJARMASIN TOURISM, GET TOUR APPLICATION USING THE SAW METHOD
Farisi, Imam
; Kamarudin, Kamarudin
Jurnal Riset Sistem dan Teknologi Informasi
Vol 2
, No 1
(2024)
Tourism is an activity that is liked by many people, even tourism is one of the important needs, especially regarding socio-economic activities which are seen as having good prospects in the future. In South Kalimantan, especially the city of Banjarmasin, there are many good tourist attractions such as the historical mosque of Sultan Suriansyah, Siring Park, Banjarmaisn City, and culinary tours of Arab villages. Of the tourist attractions that have been mentioned, tourists are still confused in...
Sumber Asli
Google Scholar
DOI
OVERCOMING PROBLEMS COMBINATION OF SERVER AND CLIENT SIDE ENCRYPTION ON WEB CODE SECURITY USING THE SLICE CODE METHOD
Kamarudin, Kamarudin
; Akbar Maulana, Fajar
Jurnal Riset Sistem dan Teknologi Informasi
Vol 1
, No 2
(2023)
Web security protection that is carried out by some web developers is to protect the source code of web applications by encrypting the source code, both the source code that runs on the web server or the source code that runs on the client browser. Combining these two encryption technologies is a problem for web developers. If using server side encryption, the client side source code is not protected. However, if you use client-side encryption, the server source code becomes unreadable by the we...
Sumber Asli
Google Scholar
DOI
1 Sitasi