The Complaint System Based on Whistleblowing Concept and Message Digest 5 Cryptographic Method for Regency Inspectorate Office in Polewali Mandar
(1) Universitas Al Asyariah Mandar
(2) Universitas Al Asyariah Mandar
(3) Universitas Al Asyariah Mandar
(*) Corresponding Author
Abstract
Keywords
Full Text:
PDFReferences
Zein & Adil, A. (2017). Aplikasi Media Bantu Pembelajaran Kriptografi dengan Menggunakan Algoritma Message Digest 5 (MD5). Jurnal Matrik, 15(2), 44. https://doi.org/10.30812/matrik.v15i2.33
Akhmad Qashlim. (2018). Integration of Information System Based on Supply Chain Management ( SCM ) for Pharmaceutical Warehouse in Mamasa Regency. 9(June), 1–8. https://doi.org/10.21512/comtech.v9i1.4027
Angelia Carissa, D. (2018). The Role of the Functional Position of Auditors on Improving the Performance of Bureaucrats in the Inspectorate of Central Java Province. Sumatera Law Review, 1(2), 251–266. https://doi.org/10.22216/soumlaw.v1i2.3718
Carollo, P. L., Pulcher, S., Guerci, M., & Ilmu, D. (2020). Whistleblowing as an essential practice for responsible management Writer. 1–21.
Dorset. (2017). Freedom of Speech: convey to the NHS incorporating Dorset HealthCare’s local system. 1–25.
Hu, D., & Wu, Z. (2015). Hidden Encryption: The Power, Trust, and Costs of Constitutional Collective Oversight. Hukum Indiana, 90, 281–287.
Karima, A., Diyatan, M. N., Informatika, T., Ilmu, F., Universitas, K., & Nuswantoro, D. (2016). Gost Cryptographic Algorithm With Implementation. 15(4), 292–302.
Melani, Y. I. (2019). Academic Service Complaint System Using Responsive Web Design. Sisfokom, 08(1), 39–45.
Mujito, M., & Bagus Susilo, A. (2016). File Cryptography Application Using Blowfish Method and Base64 Method at the Department of Population and Civil Registration of South Tangerang City. Jurnal Sisfokom (Sistem Informasi Dan Komputer), 5(2), 54. https://doi.org/10.32736/sisfokom.v5i2.39
Mulfag, M. R. P. (2017). Intention to Whistleblowing on Government Internal Auditor. Jurnal Sains Dan Seni ITS, 6(1), 51–66.
Polly Rossetti, Alex Mayes, A. M. (2017). System victim Experience, interests and rights of victims of crime in the criminal justice process. April.
Prasetyo, R., & Suryana, A. (2016). Data Security Application with AES Cryptographic Algorithm Technique and Desktop-Based SHA-1 Hash Function. Jurnal Sisfokom (Sistem Informasi Dan Komputer), 5(2), 61. https://doi.org/10.32736/sisfokom.v5i2.40
Qashlim, A Akhmad, Tandama, R., Khairat, U., Informasi, S., Al, U., Mandar, A., Informasi, S., Al, U., & Mandar, A. (2021). Hospital Information System Integration for Health Facilities and Referral Services. 406–412.
Rathi, N. T., Ronald, P. B., & Trotman, L. (2015). Poor Whistleblower Protection Conditions in India. 2014.
Yu, F., & Yin, H. (2021, April). Password Cracking of PDF 2.0 documents on GPU. In 2021 IEEE 6th International Conference on Computer and Communication Systems (ICCCS) (pp. 721-725). IEEE.
Sinaga, D., Jatmoko, C., Studi, P., Infromatika, T., Komputer, F. I., & Nuswantoro, U. D. (2018). Implementation of sha512 on 1.2 . file cryptography application. 978–979.
Su, S., & Lastri. (2019). Implementation of Messege Digest Algorithm 5 (MD5) and Secure Hash Algorithm (SHA-156) Data Encryption in Setya Aji Flower Farm Bandungan Agrotourism Employee Scheduling System. 5, 2019.
Sujitha Kamepalli & Sudharsan Reddy. (2020). Secure Hash Algorithm (SHA-512) Analysis for Encryption Process in College Web-Based Applications. 3, 120–127.
Tolle, H. (2017). Geotagging and Geofencing Based E-Complaint System Module Design. 11(3), 113–129.
Uddholm, J. H. (2016). Anonymous Javascript Cryptography and Cover Traffic in Cryptographic Applications and Anonymous Javascript Covers.
Article Metrics
Abstract view : 308 timesPDF - 24 times
DOI: https://doi.org/10.26714/jichi.v2i2.8033
Refbacks
- There are currently no refbacks.
____________________________________________________________________________
Journal of Intelligent Computing and Health Informatics (JICHI)
ISSN 2715-6923 (print) | 2721-9186 (online)
Organized by
Department of Informatics
Faculty of Engineering
Universitas Muhammadiyah Semarang
W : https://jurnal.unimus.ac.id/index.php/ICHI
E : jichi.informatika@unimus.ac.id, ahmadilham@unimus.ac.id