Klaim Artikel Anda
Verifikasi kepemilikan artikel akademik
Apakah artikel-artikel ini milik Anda?
Daftarkan diri Anda sebagai author untuk mengklaim artikel dan dapatkan profil akademik terverifikasi dengan fitur lengkap.
Badge Verifikasi
Profil terverifikasi resmi
Statistik Lengkap
H-index, sitasi, dan metrik
Visibilitas Tinggi
Tampil di direktori author
Kelola Publikasi
Dashboard artikel terpadu
Langkah-langkah Klaim Artikel:
- 1. Daftar akun author dengan email akademik Anda
- 2. Verifikasi email dan lengkapi profil
- 3. Login dan buka menu "Klaim Artikel"
- 4. Cari dan klaim artikel Anda
- 5. Tunggu verifikasi dari admin (1-3 hari kerja)
Menampilkan 1–7 dari 7 artikel
Marketing Mix dan Kewirausahaan
Jurnal Ekonomi, Bisnis dan Manajemen (EBISMEN)
Vol 4
, No 1
(2025)
Entrepreneurship plays a crucial role in economic growth, especially for small and medium enterprises (SMEs). One of the main factors for entrepreneurial success is the effective implementation of the marketing mix. This paper discusses the concept of the marketing mix in entrepreneurship by highlighting the 4P elements (Product, Price, Place, Promotion) which have evolved into 7P with the addition of People, Process, and Physical Evidence. The discussion includes the implementation of the marke...
Sumber Asli
Google Scholar
DOI
Framing Justice and Public Perception : A Discourse Analysis of the Agus Salim Donation Controversy in Online Media
The International Conference on Education, Social Sciences and Technology
Vol 3
, No 2
(2024)
This study explores the discourse surrounding the Agus Salim donation controversy, focusing on how media narratives and legal rhetoric shape public perception. Drawing on two primary sources—articles from Brilio.net and KapanLagi.com—the research employs critical discourse analysis to examine the framing of key events, including allegations of donation mismanagement, legal strategies, and the public's reaction to the case. The findings reveal how media outlets construct competing narratives, emp...
Sumber Asli
Google Scholar
DOI
Functional Testing of the JivaJoy Online Product Stock Management and Ordering System Software Using Black Box Testing
Jasmine Aulia Mumtaz
; Kinaya Khairunnisa Komariansyah
; Helena Dewi Hapsari
; Bima Julian Mahardhika
; Luthfi Dika Chandra
; Muhammad Rafi' Rusafni
; Wicaksono, Aditya
; Mindara, Gema Parasti
International Journal of Computer Technology and Science
Vol 2
, No 1
(2024)
This study focuses on black-box testing of JivaJoy software, an online product stock management and ordering system. The primary goal of this research is to evaluate the functionality and performance of the system's key features, including profile management, CRUD operations for admin and customer accounts, product stock management, shopping cart, order management, and AI counseling. Black-box testing was applied to assess whether these features meet expected operational standards and user requi...
Sumber Asli
Google Scholar
DOI
Analisis Kepuasan Pengguna Website Sekolah SMAN 1 Wangon Menggunakan Metode End User Computing Satisfaction (EUCS)
Fahmi An Naafi
; Fikri Aditnya Pratama
; Fauzan Dwicah Saputra
; Gilang Satria Mahardhika
; Ito Setiawan
Switch : Jurnal Sains dan Teknologi Informasi
Vol 2
, No 6
(2024)
This study aims to evaluate the level of user satisfaction with the website of SMAN 1 Wangon by applying the End User Computing Satisfaction (EUCS) method. This method assesses user satisfaction based on five main dimensions: system quality, information quality, service quality, end user, and individual benefits. Data collection was conducted through questionnaires distributed to students, teachers, and administrative staff. The results of the analysis show that overall user satisfaction is in a...
Sumber Asli
Google Scholar
DOI
Web Phishing Classification using Combined Machine Learning Methods
Journal of Computing Theories and Applications
Vol 1
, No 1
(2023)
Phishing is a crime that uses social engineering techniques, both in deceptive statements and technically, to steal consumers' personal identification data and financial account credentials. With the new Phishing machine learning approach, websites can be recognized in real-time. K-Nearest Neighbor(KNN) and Naïve Bayes (NB) are popular machine learning approaches. KNN and NB have their own strengths and weaknesses. By combining the two, deficiencies can be covered. So this study proposes to comb...
Sumber Asli
Google Scholar
DOI
19 Sitasi
Kedudukan Anak Angkat Yang Tidak Didaftarkan Sebagai Ahli Waris Orang Tua Angkat
Jurnal Akta Notaris
Vol 2
, No 1
(2023)
Penelitian ini bertujuan untuk mengetahui hak waris anak angkat yang tidak didaftarkan, pertimbangan orang tua angkat dalam memberikan harta warisan, serta perlindungan hukum yang tersedia bagi anak angkat yang tidak didaftarkan. Dalam masyarakat patrilineal atau matrilineal, jika orang tua tidak memiliki keturunan atau penerus keturunan, maka kemenakan bertali darah diangkat sebagai pengganti. Anak kemenakan ini diurus, dipelihara, dan diberikan pendidikan atas dasar rasa kekeluargaan dan perik...
Sumber Asli
Google Scholar
DOI
Upaya Peningkatan Kinerja Dan Pengembangan Kompetensi Menuju ASN Bertaraf Internasional
Jurnal Media Administrasi
Vol 6
, No 2
(2021)
Perkembangan zaman saat ini yang semakin global di tengah revolusi industry 4.0 dan Reformasi Birokrasi menuntut ASN memiliki kompetensi yang relevan dengan kemajuan zaman agar dapat memanfaatkan perubahan lingkungan menjadi suatu peluang dalam memberikan pelayanan dan perumusan kebijakan yang lebih berkualitas. Perubahan paradigma pengembangan kompetensi mampu mendukung terwujudnya Smart ASN untuk pemerintahan berkelas dunia. Reformasi Aparatur Sipil Negara merupakan salah satu upaya pemerintah...
Sumber Asli
Google Scholar
DOI