Analisis Hukum terhadap Klaim Greenwashing Akuntabilitas Hukum di Era Branding Berkelanjutan
(Budi Raharjo, Methodius Kossay)
DOI : 10.51903/sp9aj288
- Volume: 3,
Issue: 2,
Sitasi : 0 30-May-2025
| Abstrak
| PDF File
| Resource
| Last.23-Jul-2025
Abstrak:
Greenwashing poses significant challenges to sustainability initiatives in Indonesia, where weak regulatory frameworks and inconsistent enforcement exacerbate the issue. This study explores the interplay between greenwashing practices and legal regulations, aiming to identify gaps and propose solutions to address the problem. Employing a qualitative case study design, the research utilized document analysis, semi-structured interviews, and content observation to gather data from multiple stakeholders, including legal experts, industry practitioners, and consumer organizations. The findings reveal that 55% of sustainability claims in marketing materials lack verifiable evidence, highlighting transparency as a critical concern. Weak regulatory oversight and the absence of standardized definitions for terms like "sustainable" or "eco-friendly" further complicate the issue. The study identifies transparency, monitoring, and legal accountability as key themes requiring immediate attention. The research contributes to the existing literature by integrating legal perspectives with sustainable branding strategies, particularly in the context of developing countries. It also underscores the need for regulatory reforms that emphasize clear standards and stringent sanctions. Practical implications include recommendations for regulators to enhance oversight mechanisms and for companies to prioritize transparency to gain consumer trust. Future research should explore the effectiveness of standardized sustainability metrics and evaluate cross-country regulatory frameworks. This study offers a comprehensive foundation for addressing greenwashing and fostering authentic sustainability practices.
|
0 |
2025 |
Legal Issues in the Supervision and Enforcement of Professional Ethics for Advocates in Indonesia
(Budi Raharjo, Rengga Kusuma Putra, Methodius Kossay)
DOI : 10.51903/hakim.v3i1.2287
- Volume: 3,
Issue: 1,
Sitasi : 0 19-Feb-2025
| Abstrak
| PDF File
| Resource
| Last.23-Jul-2025
Abstrak:
The supervision and enforcement of the advocate code of ethics in Indonesia continue to face various challenges, impacting the effectiveness of the existing regulatory framework. The number of ethical violations committed by advocates has been increasing, from 120 cases in 2018 to 345 cases in 2023, with the most prevalent infractions including conflicts of interest, abuse of authority, and gratification. One of the primary factors contributing to the weak enforcement of the code of ethics is the limited oversight system, which remains confined to advocate organizations without the involvement of independent institutions. This study aims to analyze the effectiveness of the advocate supervision system in Indonesia, compare it with best practices in other countries, and identify measures that can be implemented to enhance accountability and transparency within the profession. The research employs a normative legal method with a comparative law approach and empirical studies. The analysis is conducted on existing regulations, case reports on violations, and interviews with key stakeholders, including advocates, clients, and legal observers. The findings reveal that only 40% of reported violations result in strict sanctions, while merely 10% of advocates found guilty of ethical misconduct face license revocation. Additionally, a survey of 500 respondents indicates that only 35% of the public is aware of the complaint procedures against advocates who breach ethical standards, highlighting the low level of transparency in the supervision system. This study contributes to the discourse by recommending the establishment of an independent institution to oversee advocates' compliance with ethical standards, as well as the increased utilization of digital technology in the supervision system. With more transparent and accountable oversight reforms, it is expected that ethical violations within the legal profession can be minimized, thereby strengthening public trust in Indonesia’s legal system
|
0 |
2025 |
Governance in the Digital Era: Analyzing the Adoption of E-Government Services in Local Authorities Through Quantitative Methods
(Rachmat Setyawan, Budi Raharjo, Jullita Dewayani)
DOI : 10.51903/jmi.v3i3.54
- Volume: 3,
Issue: 3,
Sitasi : 0 30-Dec-2024
| Abstrak
| PDF File
| Resource
| Last.23-Jul-2025
Abstrak:
The rapid digital transformation has significantly impacted public governance, particularly through the adoption of e-government systems. While numerous studies have highlighted the benefits of e-government at the national level, attention to its implementation at the local authority level remains limited. Local authorities face unique challenges, such as limited technological infrastructure, inadequate staff competencies, and varying levels of public trust. This study aims to identify the key factors influencing e-government adoption at the local level and evaluate its impact using a quantitative approach. Data were collected from 150 local authorities in urban and rural areas through structured surveys and analyzed using multiple linear regression. The study’s results indicate that digital infrastructure has the strongest influence on e-government adoption, with a regression coefficient of ? = 0.45 (p = 0.001). Staff competency (? = 0.35, p = 0.015) and public perception (? = 0.25, p = 0.045) also significantly contribute to adoption levels. Together, these three factors explain 65% of the variance in e-government adoption (R² = 0.65). These results align with the Technology Acceptance Model (TAM), which identifies perceived ease of use and perceived usefulness as key determinants of technology acceptance. This study contributes to the existing literature by focusing on the context of local authorities and providing empirical evidence on how infrastructure, staff competencies, and public perceptions influence e-government adoption. The results underscore the importance of improving technological infrastructure, investing in staff training, and promoting digital literacy among the public to accelerate digital transformation at the local level.
|
0 |
2024 |
Prediction and Detection of Scam Threats on Digital Platforms for Indonesian Users Using Machine Learning Models
(Budi Raharjo, Rudjiono, Yuli Fitrianto)
DOI : 10.51903/jtie.v3i3.208
- Volume: 3,
Issue: 3,
Sitasi : 0 25-Dec-2024
| Abstrak
| PDF File
| Resource
| Last.23-Jul-2025
Abstrak:
Scam threats on digital platforms continue to rise alongside the rapid adoption of technology in Indonesia. The unique characteristics of Indonesian digital users, such as low digital literacy and high social media usage, make them particularly vulnerable to various forms of scams, including phishing, impersonation, and emotional manipulation. This study aims to develop a machine learning-based model for predicting and detecting scams by identifying threat patterns within a local context. The methodology involves collecting a survey-based dataset from Indonesian digital users, capturing language patterns and user interaction behaviors. The dataset was processed through text-cleaning techniques, tokenization, normalization, and representation using TF-IDF and Word Embeddings. The machine learning models employed in this study are Random Forest and Support Vector Machine (SVM), evaluated using accuracy, precision, recall, and F1-score metrics. Hyperparameter tuning was conducted to optimize model performance, while k-fold cross-validation was utilized to minimize the risk of overfitting. The results indicate that the Random Forest model achieved the best performance, with an accuracy of 92.5%, precision of 90.7%, recall of 94.1%, and F1-score of 92.4%. The use of local datasets improved detection accuracy by 7.8% compared to global datasets, highlighting the critical importance of contextual representation in identifying scam patterns specific to Indonesia. The model was also effective in recognizing unique threat patterns, such as the use of informal language and manipulative phrases in scam messages. This study makes a significant contribution to the field of digital security by providing an effective machine learning-based approach to detecting scam threats in Indonesia. Moreover, the findings underscore the importance of developing local datasets and educating users as part of a holistic solution to enhance digital security. These insights emphasize the necessity of incorporating cultural and contextual factors into technology-driven approaches for combating scams in developing countries like Indonesia
|
0 |
2024 |
Reliability of Arduino Serial Communication Systems: A Case Study on the Application of Cyclic Redundancy Check (CRC)
(Budi Raharjo, Mars Caroline Wibowo)
DOI : 10.51903/jtie.v3i2.186
- Volume: 3,
Issue: 2,
Sitasi : 0 20-Aug-2024
| Abstrak
| PDF File
| Resource
| Last.23-Jul-2025
Abstrak:
In embedded systems, serial communication plays a crucial role in data transfer, particularly in Arduino-based projects. However, factors such as electromagnetic interference, noise, and signal degradation can compromise data integrity, leading to significant errors. Effective error detection systems are essential to ensure reliable data exchange. The Cyclic Redundancy Check (CRC) is one such method known for its ability to detect errors. Despite its potential, the practical application and impact of CRC on Arduino communication systems have not been extensively explored. This study implements CRC within Arduino serial communication by designing and developing software that integrates CRC for real-time error detection. The study rigorously tests this implementation in various scenarios to evaluate its performance, comparing data integrity with and without CRC. The results show that incorporating CRC significantly improves the reliability of data transmission in Arduino applications, enhancing error detection accuracy. This improvement strengthens existing systems and provides a solid foundation for developing more complex communication frameworks. The research advances reliable communication systems in embedded technologies. By demonstrating CRC's effectiveness in enhancing data integrity, the study offers valuable insights for developers and researchers seeking to improve serial communication across different applications.
|
0 |
2024 |
Error-Free Arduino Communication: Integrating Hamming Code for UART Serial Transmission
(Budi Raharjo, Fujiama Diapoldo Silalahi)
DOI : 10.51903/jtie.v3i2.187
- Volume: 3,
Issue: 2,
Sitasi : 0 19-Aug-2024
| Abstrak
| PDF File
| Resource
| Last.23-Jul-2025
Abstrak:
Serial communication is a fundamental method for data transfer in electronic devices, particularly in Arduino-based systems. However, existing protocols, such as Universal Asynchronous Receiver/Transmitter (UART), often lack robust error detection mechanisms, leading to potential data integrity issues. This study aims to address the knowledge gap regarding error detection in UART communication by implementing Hamming Code, a well-established method for detecting and correcting single-bit errors. The research employs a systematic approach, including data encoding before transmission and decoding with error correction at the receiver end. The results demonstrate that the integration of the Hamming Code significantly enhances the reliability of data transmission, reducing error rates and improving overall system performance. The implications of this research extend to various applications requiring high data integrity, such as industrial control systems and Internet of Things (IoT) devices. By providing a practical solution to the challenges of error detection in serial communication, this study contributes to the advancement of reliable communication systems in modern technology.
|
0 |
2024 |
Innovation In Project Management Utilizing Machine Learning Technology
(Joseph Teguh Santoso, Budi Raharjo)
DOI : 10.51903/jtie.v2i3.163
- Volume: 2,
Issue: 3,
Sitasi : 0 30-Dec-2023
| Abstrak
| PDF File
| Resource
| Last.23-Jul-2025
Abstrak:
The successful adoption of programmable machines for complex tasks opens up opportunities for productivity and more efficient communication, but also poses serious challenges in IT project management. This study aims to tackle the issue of high project failure rates caused by inadequate planning. It aims to assist project managers in enhancing their project planning by implementing real-time solutions through the utilization of machine learning (ML) algorithms and a user-friendly graphical interface. This research is divided into two key phases. The initial phase involves an examination of existing literature in the field of machine learning to identify relevant concepts applicable to project management. In the subsequent stage, two distinct types of ML algorithms, namely example-based learning and regression modeling, will be integrated into a user-friendly platform. This research develops a system that utilizes machine learning algorithms to assist project managers in real-time or near real-time through a user-friendly graphical interface, with a focus on improving project planning and risk mitigation. This research shows that machine learning algorithms provide positive results in overcoming human factors and preventing risks based on the experience of project managers.
|
0 |
2023 |
THREAT ATTRIBUTES HANGING IN THE WILD ANDROID
(Irda Yunianto, Mars Caroline Wibowo, Budi Raharjo)
DOI : 10.51903/jtie.v1i3.150
- Volume: 1,
Issue: 3,
Sitasi : 0 22-Dec-2022
| Abstrak
| PDF File
| Resource
| Last.23-Jul-2025
Abstrak:
Android is a complicated system that applications and component are usable and support for multiple work together, giving rise to highly complex interdependence relationships. Meanwhile, the Android environment is notable for being greatlty disparate and decentralized: different Operation System version is personalized and re-personalized by different parties about fast and used by whoever that can develop an application for that version. Android secure its explanation sources over an app sandbox and permissions model, where each application execution in this part can entrance only suspectible overall assets and another application component (value providers, services, activities, publication receivers) by the appropriate liscense.
This study uses Harehunter measurement to automatically detect Hare vulnerabilities in Android system applications. Harehunter and HareGuard performance evaluations were carried out in this study, both of which proved to be highly effective. The approach used here is divergent investigation, by searching all quoted, decompiled script, and obvious data for targeted attribute determination as an initial step, and running an XML parser. The outcome of this research show that the impact of Hares is very significant. The application of HareGuard in this study proved to be effective in detecting all attack applications that were made. Further evaluation of the performance impact on the minimum system host. For future research, to make Harehunter more effective, it is suggested to use a more qualified analyzer. So that this direction can be explored in more depth.
|
0 |
2022 |
VIRTUAL LABORATORY FOR VIRTUAL ANALYSIS IN TECHNICAL EDUCATION
(Budi Raharjo, Yuli Fitriyanto, Sumaryanto Sumaryanto)
DOI : 10.55606/jeei.v2i2.915
- Volume: 2,
Issue: 2,
Sitasi : 0 22-Jun-2022
| Abstrak
| PDF File
| Resource
| Last.19-Aug-2025
Abstrak:
Face-to-face technical instruction is subject to the existence of instrumentation and room. The fee, security, and listing can manner blockade to the administration directly in the laboratory. Virtual analysis can be adopted to increase the scholar's expertise by combining pre-laboratory for live analysis and serving approach to implementing that cannot be used securely personality. Virtual learning is applied in many areas, but questions are left over about how it should be used in engineering, this is an area that is mainly dependent on face-to-face laboratory and classroom settings.
The purpose of this research is to adapt the common virtual laboratory idea to special demands, Virtual laboratories are not intended to change face-to-face discipline but to add to class time and offer a useful reserve as required. In addition, the experimental development method in this study was carried out by 3 virtual platforms: “Lab-VIEW”, “MAT-LAB”, and “Unity”. The 1st form of the Helicopter-machine Virtual Laboratory was advanced at Lab-VIEW. Virtual laboratories offer a semi-hands-on experience in college learning that might overlook physical learning. It means a type of active learning method to be adopted in university.
The result of this research is a brief investigation of development possibilities in Unity. So that in the future, Unity exploration can be done further and in more detail. Scope This research consists of themes plated by Engineering Measurement Laboratory 1 learning. Engineering lectures might reflect these topics to carry out Virtual analysis in their laboratory and traditional classroom learning. The points that might advantage of the method consist of Mechanical Systems Laboratory, Energy Systems Laboratory, Thermodynamics, and Dynamics. It is hoped that this research will cocked the expansion of more Virtual analysis that increase engineering education in the future.
|
0 |
2022 |
PROTOTYPE APLIKASI BERBASIS MOBILE PADA SISTEM ADMINISTRASI TATA TERTIB PESERTA DIDIK MENGGUNAKAN SMS GATEWAY
(Sri Handoko, Budi Raharjo)
DOI : 10.55606/jupikom.v1i1.85
- Volume: 1,
Issue: 1,
Sitasi : 0 12-Nov-2021
| Abstrak
| PDF File
| Resource
| Last.19-Aug-2025
Abstrak:
The system used for the administrative management of the code of conduct on SMA Swadaya Surabaya are still semi-manual record-keeping and reporting that is used is still manual and only as Ms. Office only. And the notification of student violations to parents only by post. This has resulted in frequent errors in recording violations of conduct learners that is unsynchronized between the daily record-keeping violations committed students and the monthly reports made by BK. In addition, the creation of reports requires a long time. And also the difficulty of communication between the school with parents about violations of students. Based on the description of the conditions, then the research aims to design the system of the administration of the code of conduct learners using the SMS Gateway. The system is designed with PHP as programming language, and MySQL Database Server. The method development of the system that is used for the design of the system i.e. SDLC (System Development Life Cycle) consisting of planning systems, analysis systems, design systems, and implementation. The results obtained from this research that is the system of administration code of conduct learners using the SMS Gateway with Mobile Web-based that can help the process of recording and be reporting quick and accurate. This system can also be used as an intermediary of communication between the school and parents regarding violations were done by learners in school.
|
0 |
2021 |