The Complaint System Based on Whistleblowing Concept and Message Digest 5 Cryptographic Method for Regency Inspectorate Office in Polewali Mandar

Akhmad Qashlim(1), Mawar Mawar(2*), Muhammad Assiddiq(3)


(1) Universitas Al Asyariah Mandar
(2) Universitas Al Asyariah Mandar
(3) Universitas Al Asyariah Mandar
(*) Corresponding Author

Abstract


Inspectorate as an institution that supervises violations in government agencies or organizations. However, when individuals report a deviation, they often get into trouble because the identity of the reporter is not kept secret. So that in this research a complaint system is designed that uses the concept of whistleblowing with the cryptographic method. Where this method uses the Message Digest 5 (MD5) algorithm to lock or encrypt data so that the confidentiality of the reporting data can be maintained. In collecting data, it is done qualitatively, where data is collected through observation, interviews, and literature studies. This study resulted in a complaint system using the whistleblowing concept with the message digest 5 cryptographic method which was used at the Polewali Mandar Regency Inspectorate Office as a medium for reporting violations. With this complaint system, the reporter need not be afraid, because his identity will be encrypted using the Message Digest 5 algorithm.

Keywords


Description, Encryption, Cryptography, MD5 Method, Whistleblowing.

Full Text:

PDF

References


Zein & Adil, A. (2017). Aplikasi Media Bantu Pembelajaran Kriptografi dengan Menggunakan Algoritma Message Digest 5 (MD5). Jurnal Matrik, 15(2), 44. https://doi.org/10.30812/matrik.v15i2.33

Akhmad Qashlim. (2018). Integration of Information System Based on Supply Chain Management ( SCM ) for Pharmaceutical Warehouse in Mamasa Regency. 9(June), 1–8. https://doi.org/10.21512/comtech.v9i1.4027

Angelia Carissa, D. (2018). The Role of the Functional Position of Auditors on Improving the Performance of Bureaucrats in the Inspectorate of Central Java Province. Sumatera Law Review, 1(2), 251–266. https://doi.org/10.22216/soumlaw.v1i2.3718

Carollo, P. L., Pulcher, S., Guerci, M., & Ilmu, D. (2020). Whistleblowing as an essential practice for responsible management Writer. 1–21.

Dorset. (2017). Freedom of Speech: convey to the NHS incorporating Dorset HealthCare’s local system. 1–25.

Hu, D., & Wu, Z. (2015). Hidden Encryption: The Power, Trust, and Costs of Constitutional Collective Oversight. Hukum Indiana, 90, 281–287.

Karima, A., Diyatan, M. N., Informatika, T., Ilmu, F., Universitas, K., & Nuswantoro, D. (2016). Gost Cryptographic Algorithm With Implementation. 15(4), 292–302.

Melani, Y. I. (2019). Academic Service Complaint System Using Responsive Web Design. Sisfokom, 08(1), 39–45.

Mujito, M., & Bagus Susilo, A. (2016). File Cryptography Application Using Blowfish Method and Base64 Method at the Department of Population and Civil Registration of South Tangerang City. Jurnal Sisfokom (Sistem Informasi Dan Komputer), 5(2), 54. https://doi.org/10.32736/sisfokom.v5i2.39

Mulfag, M. R. P. (2017). Intention to Whistleblowing on Government Internal Auditor. Jurnal Sains Dan Seni ITS, 6(1), 51–66.

Polly Rossetti, Alex Mayes, A. M. (2017). System victim Experience, interests and rights of victims of crime in the criminal justice process. April.

Prasetyo, R., & Suryana, A. (2016). Data Security Application with AES Cryptographic Algorithm Technique and Desktop-Based SHA-1 Hash Function. Jurnal Sisfokom (Sistem Informasi Dan Komputer), 5(2), 61. https://doi.org/10.32736/sisfokom.v5i2.40

Qashlim, A Akhmad, Tandama, R., Khairat, U., Informasi, S., Al, U., Mandar, A., Informasi, S., Al, U., & Mandar, A. (2021). Hospital Information System Integration for Health Facilities and Referral Services. 406–412.

Rathi, N. T., Ronald, P. B., & Trotman, L. (2015). Poor Whistleblower Protection Conditions in India. 2014.

Yu, F., & Yin, H. (2021, April). Password Cracking of PDF 2.0 documents on GPU. In 2021 IEEE 6th International Conference on Computer and Communication Systems (ICCCS) (pp. 721-725). IEEE.

Sinaga, D., Jatmoko, C., Studi, P., Infromatika, T., Komputer, F. I., & Nuswantoro, U. D. (2018). Implementation of sha512 on 1.2 . file cryptography application. 978–979.

Su, S., & Lastri. (2019). Implementation of Messege Digest Algorithm 5 (MD5) and Secure Hash Algorithm (SHA-156) Data Encryption in Setya Aji Flower Farm Bandungan Agrotourism Employee Scheduling System. 5, 2019.

Sujitha Kamepalli & Sudharsan Reddy. (2020). Secure Hash Algorithm (SHA-512) Analysis for Encryption Process in College Web-Based Applications. 3, 120–127.

Tolle, H. (2017). Geotagging and Geofencing Based E-Complaint System Module Design. 11(3), 113–129.

Uddholm, J. H. (2016). Anonymous Javascript Cryptography and Cover Traffic in Cryptographic Applications and Anonymous Javascript Covers.


Article Metrics

Abstract view : 323 times
PDF - 26 times

DOI: https://doi.org/10.26714/jichi.v2i2.8033

Refbacks

  • There are currently no refbacks.


____________________________________________________________________________
Journal of Intelligent Computing and Health Informatics (JICHI)
ISSN 2715-6923 (print) | 2721-9186 (online)
Organized by
Department of Informatics
Faculty of Engineering
Universitas Muhammadiyah Semarang

W : https://jurnal.unimus.ac.id/index.php/ICHI
E : [email protected], [email protected]

View My Stats