https://journal.stmiki.ac.id/index.php/jimik/issue/feedJurnal Indonesia : Manajemen Informatika dan Komunikasi2026-01-10T00:00:00+00:00Muhammad Walimuhammadwali@stmiki.ac.idOpen Journal Systems<div class="row featurette"> <div class="col-md-7"> <h1 class="display-5 fw-bold text-body-emphasis lh-1 mb-3">Jurnal Indonesia : Manajemen Informatika dan Komunikasi</h1> <p><strong>Jurnal Indonesia : Manajemen Informatika dan Komunikasi, </strong>with ISSN <a href="https://issn.brin.go.id/terbit/detail/1588133662" target="_blank" rel="noopener">2723-7079</a> (Online) and <a href="https://issn.brin.go.id/terbit/detail/20210429482304847" target="_blank" rel="noopener">2776-8074</a> (Print) published by Lembaga Penelitian dan Pengabdian Kepada Masyarakat (LPPM) <a href="https://stmiki.ac.id/" target="_blank" rel="noopener">STMIK Indonesia Banda Aceh</a>. Jurnal Indonesia: Manajemen Informatika dan Komunikasi is a scholarly publication dedicated to advancing the fields of information technology and communication management in Indonesia. The journal serves as a platform for researchers, academicians, practitioners, and policymakers to share their insights, knowledge, and expertise in these domains. This journal is a peer-reviewed online journal dedicated to high-quality research publications focused on research, implementation.</p> <div class="d-grid gap-2 d-md-flex justify-content-md-start"><a class="btn btn-primary btn-lg px-2 me-md-1" href="https://journal.stmiki.ac.id/index.php/jimik/about/submissions">Submit Manuscript</a> <a class="btn btn-warning btn-lg px-2 me-md-1" href="https://journal.stmiki.ac.id/index.php/jimik/information/authors">Author Guidelines</a></div> </div> <div class="col-md-5"> <div id="carouselExample" class="carousel slide" data-ride="carousel"> <div class="carousel-inner"> <div class="carousel-item active"><!-- Replace the following image source with your actual image URL --> <img class="d-block w-100" style="max-width: 100%;" src="https://journal.stmiki.ac.id/public/journals/1/journalThumbnail_en_US.jpg" alt="Jurnal Teknologi dan Pendidikan"></div> <!-- Add more carousel items if needed --></div> </div> </div> </div>https://journal.stmiki.ac.id/index.php/jimik/article/view/1639Forecasting Harga Saham PT. ABCD Menggunakan Algoritma Fuzzy Time Series2025-10-31T03:56:46+00:00Muchamad Izzul Khaqizzkhaq0312@gmail.comArif Faizinarifusan@yudharta.ac.idAhmad Zulham Fahamsyah Havyzulham92@yudharta.ac.id<p>High stock price fluctuations pose a significant challenge for investors and analysts in determining investment strategies. Price dynamics influenced by economic, political, and psychological market factors require forecasting methods that can accommodate uncertainty and non-linear historical data patterns. This study applies Cheng's Fuzzy Time Series algorithm to predict the stock price of PT. ABCD by going through the stages of universe set formation, interval determination, fuzzification, fuzzy logic relationship formation, and defuzzification to obtain prediction results. The method implementation was carried out using two approaches: manual calculation using Microsoft Excel and automatic calculation using the Orange application. The results show that Cheng's method is able to produce predictions very close to the actual value, with an accuracy level measured using the Mean Absolute Percentage Error (MAPE) indicator of 0.058787% on both platforms. The consistency of the results between Excel and Orange proves the reliability of Cheng's method, so it can be used as a reference in supporting investment decision-making in the Indonesian capital market.</p>2026-01-10T00:00:00+00:00Copyright (c) 2025 Muchamad Izzul Khaq, Arif Faizin, Ahmad Zulham Fahamsyah Havyhttps://journal.stmiki.ac.id/index.php/jimik/article/view/1625Analisis Kelemahan Fitur Cloud pada Access Point Berbasis Cloud2025-10-31T03:56:54+00:00Kaiva Alby Aufinantakaivaalbyu38@gmail.com<p>This study aims to identify and analyze vulnerabilities of Cloud features in Access Points through an experimental approach. Cloud features in Access Points include network resource management, storage, data processing, and internet-based device management services used to monitor device traffic, update firmware, and perform centralized configuration. The research began with the design of Access Point configurations, followed by a simulation of a Man-in-the-Middle (MITM) attack using the SSL Strip method. Testing was conducted using a Ruijie Reyee RG-EW1200 Access Point with the support of Bettercap software on the Kali Linux operating system and a Windows virtual machine. The research process involved identifying Cloud features of the device, collecting technical documentation, executing SSL Strip attack simulations, and analyzing discovered vulnerabilities. Experimental results revealed specific vulnerabilities in the Cloud security system of the Access Point, including data leakage of Password, SSID, IP, Serial Number, Network Name, Device Type, Firmware Version, MAC Address, Forward Mode, Access Point Status, and Port Status, which were then analyzed to provide mitigation recommendations. These findings are expected to serve as a reference for enhancing security of Cloud features in network devices, particularly centralized management-based Access Points.</p>2026-01-10T00:00:00+00:00Copyright (c) 2025 Kaiva Alby Aufinanta