Jurnal Indonesia : Manajemen Informatika dan Komunikasi https://journal.stmiki.ac.id/index.php/jimik <div class="row featurette"> <div class="col-md-7"> <h1 class="display-5 fw-bold text-body-emphasis lh-1 mb-3">Jurnal Indonesia : Manajemen Informatika dan Komunikasi</h1> <p><strong>Jurnal Indonesia : Manajemen Informatika dan Komunikasi, </strong>with ISSN <a href="https://issn.brin.go.id/terbit/detail/1588133662" target="_blank" rel="noopener">2723-7079</a> (Online) and <a href="https://issn.brin.go.id/terbit/detail/20210429482304847" target="_blank" rel="noopener">2776-8074</a> (Print) published by Lembaga Penelitian dan Pengabdian Kepada Masyarakat (LPPM) <a href="https://stmiki.ac.id/" target="_blank" rel="noopener">STMIK Indonesia Banda Aceh</a>. Jurnal Indonesia: Manajemen Informatika dan Komunikasi is a scholarly publication dedicated to advancing the fields of information technology and communication management in Indonesia. The journal serves as a platform for researchers, academicians, practitioners, and policymakers to share their insights, knowledge, and expertise in these domains. This journal is a peer-reviewed online journal dedicated to high-quality research publications focused on research, implementation.</p> <div class="d-grid gap-2 d-md-flex justify-content-md-start"><a class="btn btn-primary btn-lg px-2 me-md-1" href="https://journal.stmiki.ac.id/index.php/jimik/about/submissions">Submit Manuscript</a> <a class="btn btn-warning btn-lg px-2 me-md-1" href="https://journal.stmiki.ac.id/index.php/jimik/information/authors">Author Guidelines</a></div> </div> <div class="col-md-5"> <div id="carouselExample" class="carousel slide" data-ride="carousel"> <div class="carousel-inner"> <div class="carousel-item active"><!-- Replace the following image source with your actual image URL --> <img class="d-block w-100" style="max-width: 100%;" src="https://journal.stmiki.ac.id/public/journals/1/journalThumbnail_en_US.jpg" alt="Jurnal Teknologi dan Pendidikan"></div> <!-- Add more carousel items if needed --></div> </div> </div> </div> en-US <!-- Copyright Notice --> <div id="copyrightNotice"> <p>Authors who publish with this journal agree to the following terms:</p> <ol> <li>Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" rel="noopener"><strong>Creative Commons Attribution License (CC-BY 4.0)</strong></a> that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.</li> <li>Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.</li> <li>Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.</li> </ol> <p style="margin-top: 15px;"><strong>License:</strong> All articles are licensed under <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" rel="noopener"> <img style="vertical-align: middle; border: 0; height: 31px;" src="https://mirrors.creativecommons.org/presskit/buttons/88x31/png/by.png" alt="CC BY 4.0"> </a></p> </div> muhammadwali@stmiki.ac.id (Muhammad Wali) jimik@stmiki.ac.id (Cut Nelly) Sat, 10 Jan 2026 00:00:00 +0000 OJS 3.1.2.4 http://blogs.law.harvard.edu/tech/rss 60 Forecasting Harga Saham PT. ABCD Menggunakan Algoritma Fuzzy Time Series https://journal.stmiki.ac.id/index.php/jimik/article/view/1639 <p>High stock price fluctuations pose a significant challenge for investors and analysts in determining investment strategies. Price dynamics influenced by economic, political, and psychological market factors require forecasting methods that can accommodate uncertainty and non-linear historical data patterns. This study applies Cheng's Fuzzy Time Series algorithm to predict the stock price of PT. ABCD by going through the stages of universe set formation, interval determination, fuzzification, fuzzy logic relationship formation, and defuzzification to obtain prediction results. The method implementation was carried out using two approaches: manual calculation using Microsoft Excel and automatic calculation using the Orange application. The results show that Cheng's method is able to produce predictions very close to the actual value, with an accuracy level measured using the Mean Absolute Percentage Error (MAPE) indicator of 0.058787% on both platforms. The consistency of the results between Excel and Orange proves the reliability of Cheng's method, so it can be used as a reference in supporting investment decision-making in the Indonesian capital market.</p> Muchamad Izzul Khaq, Arif Faizin, Ahmad Zulham Fahamsyah Havy Copyright (c) 2025 Muchamad Izzul Khaq, Arif Faizin, Ahmad Zulham Fahamsyah Havy https://creativecommons.org/licenses/by/4.0 https://journal.stmiki.ac.id/index.php/jimik/article/view/1639 Sat, 10 Jan 2026 00:00:00 +0000 Analisis Kelemahan Fitur Cloud pada Access Point Berbasis Cloud https://journal.stmiki.ac.id/index.php/jimik/article/view/1625 <p>This study aims to identify and analyze vulnerabilities of Cloud features in Access Points through an experimental approach. Cloud features in Access Points include network resource management, storage, data processing, and internet-based device management services used to monitor device traffic, update firmware, and perform centralized configuration. The research began with the design of Access Point configurations, followed by a simulation of a Man-in-the-Middle (MITM) attack using the SSL Strip method. Testing was conducted using a Ruijie Reyee RG-EW1200 Access Point with the support of Bettercap software on the Kali Linux operating system and a Windows virtual machine. The research process involved identifying Cloud features of the device, collecting technical documentation, executing SSL Strip attack simulations, and analyzing discovered vulnerabilities. Experimental results revealed specific vulnerabilities in the Cloud security system of the Access Point, including data leakage of Password, SSID, IP, Serial Number, Network Name, Device Type, Firmware Version, MAC Address, Forward Mode, Access Point Status, and Port Status, which were then analyzed to provide mitigation recommendations. These findings are expected to serve as a reference for enhancing security of Cloud features in network devices, particularly centralized management-based Access Points.</p> Kaiva Alby Aufinanta Copyright (c) 2025 Kaiva Alby Aufinanta https://creativecommons.org/licenses/by/4.0 https://journal.stmiki.ac.id/index.php/jimik/article/view/1625 Sat, 10 Jan 2026 00:00:00 +0000