Mobile and Forensics http://journal2.uad.ac.id/index.php/mf <div id="content"> <div id="group"> <div id="content"> <div id="group"> <div class="member"> <div id="journalDescription"> <div id="journalDescription"> <div id="journalDescription"> <div id="journalDescription"> <div id="content"> <div id="group"> <div id="content"> <div id="group"> <div class="member"> <div id="journalDescription"> <div id="journalDescription"> <div id="journalDescription"> <div id="journalDescription"> <div id="content"> <div id="group"> <div id="content"> <div id="group"> <div id="content"> <div id="group"> <div id="content"> <div id="group"> <div class="member"> <div id="journalDescription"> <div id="journalDescription"> <div id="journalDescription"> <div id="journalDescription"> <div id="content"> <div id="group"> <div id="content"> <div id="group"> <div class="member"> <div id="journalDescription"> <div id="journalDescription"> <div id="journalDescription"> <div id="journalDescription"> <div id="content"> <div id="group"> <div id="content"> <div id="group"> <div class="member"> <div id="journalDescription"> <div id="journalDescription"> <div id="journalDescription"> <div id="journalDescription"> <div id="content"> <div id="group"> <div id="content"> <div id="group"> <div class="member"> <div id="journalDescription"> <div id="journalDescription"> <div id="journalDescription"> <div id="journalDescription"> <div id="content"> <div id="group"> <div id="content"> <div id="group"> <div class="member"> <div id="content"> <div id="group"> <div id="content"> <div id="group"> <div class="member"> <div id="journalDescription"> <div id="journalDescription"> <div id="journalDescription"> <div id="journalDescription"> <div id="content"> <div id="group"> <div id="content"> <div id="group"> <div class="member"> <div id="journalDescription"> <div id="journalDescription"> <div id="journalDescription"> <div id="journalDescription"> <div id="content"> <div id="group"> <div id="content"> <div id="group"> <div id="content"> <div id="group"> <div id="content"> <div id="group"> <div class="member"> <div id="journalDescription"> <div id="journalDescription"> <div id="journalDescription"> <div id="journalDescription"> <div id="content"> <div id="group"> <div id="content"> <div id="group"> <div class="member"> <div id="journalDescription"> <div id="journalDescription"> <div id="journalDescription"> <div id="journalDescription"> <div id="content"> <div id="group"> <div id="content"> <div id="group"> <div class="member"> <div id="journalDescription"> <div id="journalDescription"> <div id="journalDescription"> <div id="journalDescription"> <div id="content"> <div id="group"> <div id="content"> <div id="group"> <div class="member"> <div id="journalDescription"> <div id="journalDescription"> <div id="journalDescription"> <div id="journalDescription"> <div id="content"> <div id="group"> <div id="content"> <div id="group"> <div class="member"> <div id="journalDescription"> <div id="journalDescription"> <div id="journalDescription"> <div id="journalDescription"> <div id="content"> <div id="group"> <div id="content"> <div id="group"> <div class="member"> <div id="journalDescription"> <div id="journalDescription"> <div id="journalDescription"> <div id="journalDescription"> <div id="content"> <div id="group"> <div id="content"> <div id="group"> <div id="content"> <div id="group"> <div id="content"> <div id="group"> <div class="member"> <div id="journalDescription"> <div id="journalDescription"> <div id="journalDescription"> <div id="journalDescription"> <div id="content"> <div id="group"> <div id="content"> <div id="group"> <div class="member"> <div id="journalDescription"> <div id="journalDescription"> <div id="journalDescription"> <div id="journalDescription"> <div id="content"> <div id="group"> <div id="content"> <div id="group"> <div class="member"> <div id="journalDescription"> <div id="journalDescription"> <div id="journalDescription"> <div id="journalDescription"> <div id="content"> <div id="group"> <div id="content"> <div id="group"> <div class="member"> <div id="journalDescription"> <div id="journalDescription"> <div id="journalDescription"> <div id="journalDescription"> <div> <p><strong>Mobile and Forensics (MF)</strong>, ISSN: <a href="https://portal.issn.org/resource/ISSN/2656-6257" target="_blank" rel="noopener">2656-6257</a> E-ISSN:<a href="https://portal.issn.org/resource/ISSN/2714-6685" target="_blank" rel="noopener">2714-6685</a> ,is a international peer-reviewed open access journal organized by the Department of Magister Informatika, Universitas Ahmad Dahlan. It is a <strong>semi-annual journal</strong> published in <strong>March and September.</strong> The main objective of the publication is to create a platform to publish original articles, researches results, case studies, and book reviews related to the field of Mobile Technology and Digital Forensics. The editorial board welcomes original contributions of the author in English which never been published or under consideration for publication in any other publication. All publications are available in full text and are free to download.</p> </div> </div> </div> <table class="m_1585562839703316051image_block" style="width: 100%;" border="0" cellspacing="0" cellpadding="10"> <tbody> <tr> <td> <div style="line-height: 10px;" align="center"><img style="height: auto; display: block; border: 0; max-width: 225px; width: 50%;" src="http://journal2.uad.ac.id/public/site/images/aazhari/screenshot-2025-05-21-184701-removebg-preview.png" alt="" width="225" /></div> </td> </tr> </tbody> </table> <table style="width: 100%;" border="0" cellspacing="0" cellpadding="0"> <tbody> <tr> <td style="text-align: center; width: 100%; padding: 0 10px 5px 10px;"> <h2 style="margin: 0; color: #555; direction: ltr; font-family: Arial,Helvetica,sans-serif; font-size: 21px; font-weight: bold; letter-spacing: normal; line-height: 120%; text-align: left; margin-top: 0; margin-bottom: 0;">Mobile and Forensics</h2> </td> </tr> </tbody> </table> <table style="word-break: break-word; width: 100%;" border="0" cellspacing="0" cellpadding="0"> <tbody> <tr> <td style="padding: 0 10px 5px 10px;"> <div style="color: #101112; direction: ltr; font-family: Arial,Helvetica,sans-serif; font-size: 16px; font-weight: 400; letter-spacing: 0; line-height: 120%; text-align: left;"> <p style="margin: 0;"><em>Open Access <img src="https://cfp.iaesprime.com/BEEI/open.png" alt="" /> </em></p> </div> </td> </tr> </tbody> </table> <table style="word-break: break-word; width: 100%;" border="0" cellspacing="0" cellpadding="0"> <tbody> <tr> <td style="padding: 0 10px 0 10px;"> <div style="color: #101112; direction: ltr; font-family: Georgia,Times,'Times New Roman',serif; font-size: 16px; font-weight: 400; letter-spacing: 0; line-height: 140%; text-align: left;"> <p style="margin: 0;">Publisher:Universitas Ahmad Dahlan (UAD)<br />ISSN: 2656-6257 E-ISSN:2714-6685<br />Subject area:</p> </div> </td> </tr> </tbody> </table> <table style="width: 100%;" border="0" cellspacing="0" cellpadding="5"> <tbody> <tr> <td> <div align="left"> <div style="text-decoration: none; display: inline-block; color: #000; background-color: transparent; border-radius: 15px; width: auto; font-weight: 400; padding-top: 0; padding-bottom: 0; font-family: Arial,Helvetica,sans-serif; font-size: 10px; text-align: center; word-break: keep-all; border: 1px solid #257633;"><span style="padding-left: 5px; padding-right: 5px; font-size: 10px; display: inline-block; letter-spacing: normal;"> <span style="word-break: break-word;">Computer Science: Cybersecurity and Computer forensics</span></span></div> <div style="text-decoration: none; display: inline-block; color: #000; background-color: transparent; border-radius: 15px; width: auto; font-weight: 400; padding-top: 0; padding-bottom: 0; font-family: Arial,Helvetica,sans-serif; font-size: 10px; text-align: center; word-break: keep-all; border: 1px solid #257633;"><span style="padding-left: 5px; padding-right: 5px; font-size: 10px; display: inline-block; letter-spacing: normal;"><span style="word-break: break-word;">Computer Science: Computer Networks and Communications</span></span></div> <div style="text-decoration: none; display: inline-block; color: #000; background-color: transparent; border-radius: 15px; width: auto; font-weight: 400; padding-top: 0; padding-bottom: 0; font-family: Arial,Helvetica,sans-serif; font-size: 10px; text-align: center; word-break: keep-all; border: 1px solid #257633;"><span style="padding-left: 5px; padding-right: 5px; font-size: 10px; display: inline-block; letter-spacing: normal;"><span style="word-break: break-word;">Computer Science: Artificial intelligence</span></span></div> <div style="text-decoration: none; display: inline-block; color: #000; background-color: transparent; border-radius: 15px; width: auto; font-weight: 400; padding-top: 0; padding-bottom: 0; font-family: Arial,Helvetica,sans-serif; font-size: 11px; text-align: center; word-break: keep-all; border: 1px solid #257633;"><span style="padding-left: 5px; padding-right: 5px; font-size: 10px; display: inline-block; letter-spacing: normal;"><span style="word-break: break-word; line-height: 0p;">Computer Science: Image Processing &amp; computer vision</span></span></div> <div style="text-decoration: none; display: inline-block; color: #000; background-color: transparent; border-radius: 15px; width: auto; font-weight: 400; padding-top: 0; padding-bottom: 0; font-family: Arial,Helvetica,sans-serif; font-size: 10px; text-align: center; word-break: keep-all; border: 1px solid #257633;"><span style="padding-left: 5px; padding-right: 5px; font-size: 10px; display: inline-block; letter-spacing: normal;"><span style="word-break: break-word;">Computer Science: Internet of Things</span></span></div> <div style="text-decoration: none; display: inline-block; color: #000; background-color: transparent; border-radius: 15px; width: auto; font-weight: 400; padding-top: 0; padding-bottom: 0; font-family: Arial,Helvetica,sans-serif; font-size: 10px; text-align: center; word-break: keep-all; border: 1px solid #257633;"><span style="padding-left: 5px; padding-right: 5px; font-size: 10px; display: inline-block; letter-spacing: normal;"><span style="word-break: break-word;">Computer Science: Computer Science (miscellaneous)</span></span></div> <div style="text-decoration: none; display: inline-block; color: #000; background-color: transparent; border-radius: 15px; width: auto; font-weight: 400; padding-top: 0; padding-bottom: 0; font-family: Arial,Helvetica,sans-serif; font-size: 10px; text-align: center; word-break: keep-all; border: 1px solid #257633;"><span style="padding-left: 5px; padding-right: 5px; font-size: 10px; display: inline-block; letter-spacing: normal;"><span style="word-break: break-word;">Engineering: Software Engineering</span> </span></div> <div style="text-decoration: none; display: inline-block; color: #000; background-color: transparent; border-radius: 15px; width: auto; font-weight: 400; padding-top: 0; padding-bottom: 0; font-family: Arial,Helvetica,sans-serif; font-size: 10px; text-align: center; word-break: keep-all; border: 1px solid #257633;"><span style="padding-left: 5px; padding-right: 5px; font-size: 10px; display: inline-block; letter-spacing: normal;"> <span style="word-break: break-word;">Engineering: Electronics Engineering</span></span></div> </div> </td> </tr> </tbody> </table> <table style="border-collapse: collapse; width: 100%;" border="0"> <tbody> <tr> <td style="width: 24%; padding-left: 10px; padding-top: 15px;"><a style="outline: 0;" href="http://journal2.uad.ac.id/index.php/mf/submission/wizard" target="_blank" rel="noopener" data-saferedirecturl="http://journal2.uad.ac.id/index.php/mf/submission/wizard"> <img style="height: auto; display: block; border: 0; max-width: 135px; width: 100%;" src="https://cfp.iaesprime.com/BEEI/submit.png" alt="" width="135" /> </a></td> <td style="width: 76%; padding-left: 10px; padding-top: 15px;"><a style="outline: 0;" href="https://docs.google.com/document/d/1Fz_SHzAGe4RrB1wFwSawENCSFCwGSU73/edit?usp=sharing&amp;ouid=104327450475612404767&amp;rtpof=true&amp;sd=true" target="_blank" rel="noopener" data-saferedirecturl="https://iaescore.com/gfa/beei.docx"> <img style="height: auto; display: block; border: 0; max-width: 135px; width: 100%;" src="https://cfp.iaesprime.com/BEEI/docx.png" alt="" width="135" /> </a></td> </tr> </tbody> </table> <div id="additionalHomeContent"> <p> </p> <h2 style="margin: 0; color: #555; direction: ltr; font-family: Arial,Helvetica,sans-serif; font-size: 21px; font-weight: bold; letter-spacing: normal; line-height: 120%; text-align: left; margin-top: 0; margin-bottom: 0;">Journal Review Timeline</h2> <h2 style="margin: 0; color: #555; direction: ltr; font-family: Arial,Helvetica,sans-serif; font-size: 21px; font-weight: bold; letter-spacing: normal; line-height: 120%; text-align: left; margin-top: 0; margin-bottom: 0;"> </h2> <div style="display: flex; gap: 25px; font-family: Arial, sans-serif;"> <div style="text-align: center;"> <div style="font-size: 24px; font-weight: bold;">5 days</div> <div>Time to first decision</div> </div> <div style="text-align: center;"> <div style="font-size: 24px; font-weight: bold;">14 days</div> <div>Review time</div> </div> <div style="text-align: center;"> <div style="font-size: 24px; font-weight: bold;">20 days</div> <div>Submission to acceptance</div> </div> <div style="text-align: center;"> <div style="font-size: 24px; font-weight: bold;">13 days</div> <div>Acceptance to publication</div> </div> </div> </div> <div id="additionalHomeContent"> <p> </p> <p><strong>Mobile Forensics has been cited by <a href="https://www.scopus.com/results/results.uri?src=dm&amp;sort=plf-f&amp;st1=%22Mobile+and+Forensics%22&amp;st2=%22Mob.+Forensics%22&amp;sid=0bc95bcb81b6dd3473c4963df21dafee&amp;sot=b&amp;sdt=b&amp;sl=54&amp;s=%28REF%28%22Mobile+and+Forensics%22%29+OR+REF%28%22Mob.+Forensics%22%29%29&amp;cl=t&amp;ss=plf-f&amp;ws=r-f&amp;ps=r-f&amp;cs=r-f&amp;origin=resultslist&amp;zone=queryBar&amp;sessionSearchId=0bc95bcb81b6dd3473c4963df21dafee&amp;limit=10" target="_blank" rel="noopener">SCOPUS Journal (Need Login)</a>: </strong></p> <ul> <li><strong>Emerging Science Journal (Q1)</strong></li> <li><strong>Clinical Practice and Epidemiology in Mental Health (Q2)</strong></li> <li><strong>Journal of Robotics and Control (Q3)</strong></li> <li><strong>Applied Computer Science (Q3)</strong></li> <li><strong>European Journal of Pure and Applied Mathematics (Q3)</strong></li> <li><strong>International Journal of Electrical and Computer Engineering Systems (Q3)</strong></li> <li><strong>International Journal on Smart Sensing and Intelligent Systems (Q3)</strong></li> <li><strong>International Journal of Sustainable Development and Planning (Q3)</strong></li> <li><strong>International Journal of Safety and Security Engineering (Q3)</strong></li> <li><strong>Advances in Intelligent Systems and Computing (Q4)</strong></li> <li><strong>Journal of Applied Data Sciences</strong></li> <li><strong>AIP Conference Proceedings</strong></li> <li><strong>ACM International Conference Proceeding Series</strong></li> <li><strong>International Conference on Engineering, Science and Advanced Technology, ICESAT </strong></li> <li><strong>International Conference on Artificial Intelligence in Information and Communication, ICAIIC </strong></li> <li><strong>International Conference on Cybernetics and Intelligent Systems, ICORIS</strong></li> <li><strong>International Conference on Science in Information Technology, ICSITech</strong></li> <li><strong>International Jordanian Cybersecurity Conference, IJCC</strong></li> </ul> <div id="journalDescription"> <div id="journalDescription"> <div> <p><iframe style="border: 0px #ffffff none;" src="https://author.my.id/widget/statistik.php?sinta=8108&amp;gs=NDzfOxEAAAAJ&amp;sc=20" name="statistik" width="800px" height="115px" frameborder="0" marginwidth="0px" marginheight="0px" scrolling="no"></iframe></p> </div> </div> </div> <p><iframe id="datawrapper-chart-XCjD9" style="width: 0; min-width: 100% !important; border: none;" title="Mobile and Forensics Author's Diversity" src="https://datawrapper.dwcdn.net/XCjD9/1/" height="367" frameborder="0" scrolling="no" aria-label="Map" data-external="1"></iframe></p> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> Universitas Ahmad Dahlan en-US Mobile and Forensics 2656-6257 <p><strong>Start from 2019 issues, authors who publish with JURNAL MOBILE AND FORENSICS agree to the following terms:</strong></p> <ol start="1"> <li>Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a <a href="http://creativecommons.org/licenses/by-sa/4.0/" target="_blank" rel="noopener">Creative Commons Attribution License (CC BY-SA 4.0)</a> that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.</li> <li>Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.</li> <li>Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.</li> </ol> <p> </p> <p><a href="http://creativecommons.org/licenses/by-sa/4.0/" rel="license"><img src="https://i.creativecommons.org/l/by-sa/4.0/88x31.png" alt="Creative Commons License" /></a><br />This work is licensed under a <a href="http://creativecommons.org/licenses/by-sa/4.0/" rel="license">Creative Commons Attribution-ShareAlike 4.0 International License</a>.</p> Integration of Landscape Analysis, Mobile GIS and Ant Algorithm for Early Warning and Coastal Security Systems http://journal2.uad.ac.id/index.php/mf/article/view/13176 <p><em>Coastal areas are increasingly vulnerable to abrasion, flash floods, and seawater intrusion due to climate change and human activities. Addressing these hazards requires an integrated early warning system that enables timely and adaptive disaster mitigation. This study integrates landscape analysis, Mobile GIS technology, and the Ant algorithm into a unified early warning framework. Landscape analysis identifies geomorphological patterns and coastline changes. Mobile GIS supports real-time spatial data acquisition, while the Ant algorithm optimizes evacuation routes, sensor placement, and hazard prediction through agent-based modeling. The system incorporates spatial, topographic, oceanographic, and socio-economic data processed through spatial and computational methods. Validation using historical records and field data shows enhanced hazard detection, more efficient evacuation planning, and quicker response times. The Ant algorithm adapts routes in real time based on environmental changes. Sensor deployment is optimized for high-risk zones. Mobile GIS ensures continuous updates and spatial visualization. Real-time processing supports rapid decision-making and threat modeling. These integrated components demonstrate a strong potential to build a resilient, data-driven early warning system for coastal communities. In conclusion, the proposed system offers a precise, adaptive, and scalable approach to improve disaster preparedness in vulnerable coastal regions.</em></p> <p><em>&nbsp;</em></p> <p><strong>Keywords:</strong><em> early warning system, Mobile GIS, ant algorithm, landscape analysis, coastal disaster mitigation</em></p> <p>&nbsp;</p> Muhammad Aziz Copyright (c) 2025 Muhammad Aziz https://creativecommons.org/licenses/by-sa/4.0 2025-06-01 2025-06-01 7 2 69 80 10.12928/mf.v7i2.13176 Security Analysis of Two-Factor Authentication Applications: Vulnerabilities in Data Storage and Management http://journal2.uad.ac.id/index.php/mf/article/view/13312 <p>In the digital era, two-factor authentication (2FA) is used as an additional security measure to protect user access to digital services. However, the storage methods of authentication data in 2FA applications have potential security vulnerabilities that can be exploited. This study analyzes five popular 2FA applications, namely Google Authenticator, 2FAS, Aegis Authenticator, Okta Verify, and TOTP Authenticator, focusing on how secret keys are stored and the potential exploitation risks. The experiment was conducted in a virtual Android environment using rooted BlueStacks 5. Data acquisition was performed using Media Manager and X-Plore File Manager, followed by data analysis with SQLite Browser and bypass with PyOTP. The results indicate that some applications store secret keys in plaintext or weak encryption, making authentication bypass possible by manually generating OTP codes. This study concludes that strengthening data storage security in 2FA applications is crucial to prevent unauthorized exploitation by malicious actors.</p> Syafrial Fachri Pane Dzikri Izzatul Haq M. Amran Hakim Siregar Copyright (c) 2025 Syafrial Fachri Pane, Dzikri Izzatul Haq, M. Amran Hakim Siregar https://creativecommons.org/licenses/by-sa/4.0 2025-07-14 2025-07-14 7 2 81 95 10.12928/mf.v7i2.13312 Implementation of Deep Learning for Personal Protective Equipment (PPE) Detection on Workers Using the YOLO Algorithm http://journal2.uad.ac.id/index.php/mf/article/view/13884 <p><em>Occupational accidents represent a major challenge in the construction and manufacturing industries. This study aims to develop a deep learning model for real-time detection of personal protective equipment (PPE) usage using the YOLOv5 algorithm. Utilizing a dataset that includes four classes (hardhat, no hardhat, coverall, and no coverall), the model was trained and evaluated based on precision, recall, and mean Average Precision (mAP) metrics. The results demonstrated that the model achieved a high accuracy level with an mAP of 0.91 and stable performance. The model can also rapidly and effectively detect safety attributes even in complex work environments, such as varied lighting conditions and numerous background objects. Based on usability testing results of 85.35% and satisfactory black box testing, this study produced a prototype web-based application enabling efficient and effective PPE monitoring. The application is designed to support the improvement of workplace safety across various industrial sectors in a more practical and adaptive manner. It is expected to increase PPE compliance, reduce accident risks, and contribute significantly to workplace safety in the industry. The conclusion indicates that the YOLOv5 algorithm holds great potential for implementation in technology-based safety monitoring systems and supports the development of a safer and more modern industry.</em></p> Rendra Soekarta Muhammad Yusuf Javan Visman Muh. Fadli Hasa Asno Azzawagama Firdaus Copyright (c) 2025 Rendra Soekarta, Muhammad Yusuf, Javan Visman, Muh. Fadli Hasa, Asno Azzawagama Firdaus https://creativecommons.org/licenses/by-sa/4.0 2025-07-21 2025-07-21 7 2 96 106 10.12928/mf.v7i2.13884 Cluster-Based Modeling of Internal Factors and FinTech Influence on Strategy: A Case Study of Bank BNI http://journal2.uad.ac.id/index.php/mf/article/view/14066 <p style="font-weight: 400;">The rapid development of financial technology (FinTech) and shifting organizational dynamics have compelled banking institutions to reassess their internal capabilities and strategic positioning. This study aims to examine the influence of internal factors namely the Core Values of State-Owned Enterprises (AKHLAK), innovation culture, gratitude, employee commitment, and employee performance on the competitive strategy of Bank BNI, while also investigating the moderating role of FinTech. A quantitative research design was employed using a survey method, involving 200 employees of Bank BNI. Data were analyzed using Cluster Analysis and Structural Equation Modeling–Partial Least Squares (SEM–PLS) through WarpPLS software. The results indicate that AKHLAK core values, innovation culture, and gratitude have significant positive effects on employee commitment and performance. Furthermore, both employee commitment and performance significantly enhance the bank’s competitive strategy. FinTech was found to significantly moderate the relationship between employee-related factors and competitive strategy. In conclusion, this study presents an integrated model that highlights the strategic role of internal organizational values and behavior, enhanced by digital technology, in fostering competitive advantage within the banking sector.</p> Aisyah Aryandani Asno Azzawagama Firdaus Copyright (c) 2025 Aisyah Aryandani, Asno Azzawagama Firdaus https://creativecommons.org/licenses/by-sa/4.0 2025-07-21 2025-07-21 7 2 107 117 10.12928/mf.v7i2.14066 Implementation of Mikhmon Server for Qos Optimization and Traffic Control on Mikhmon Hotspot Network at Amicom Net http://journal2.uad.ac.id/index.php/mf/article/view/14076 <p>The increasing demand for stable and fair internet access, particularly on public networks like hotspots, presents challenges in maintaining Quality of Service (QoS) and ensuring balanced traffic distribution. This study aims to implement and evaluate the effectiveness of the Mikhmon Server as a solution for user management and traffic control on the Mikrotik hotspot network at AMICOM NET. A quantitative experimental approach was used by comparing network performance before and after the implementation of Mikhmon. Key QoS parameters measured include latency, throughput, and bandwidth fairness. Mikhmon, a web-based tool for managing Mikrotik users, enables administrators to set speed limits, distribute bandwidth evenly, and monitor user sessions in real-time. The results indicate a significant improvement in traffic management efficiency, with average latency reduced by 52.63% and more equitable bandwidth distribution among users. These findings demonstrate that Mikhmon is a practical and cost-effective tool for optimizing medium-scale hotspot networks.</p> M.Hasan Amir Husen Firmansyah Firmansyah Copyright (c) 2025 M.Hasan Amir Husen, Firmansyah Firmansyah https://creativecommons.org/licenses/by-sa/4.0 2025-07-28 2025-07-28 7 2 118 127 10.12928/mf.v7i2.14076 Digital Forensics on APK Files: A Combined Approach Using MobSF and GHIDRA http://journal2.uad.ac.id/index.php/mf/article/view/14088 <p>The rapid growth of Android smartphones has increased user convenience but also elevated the risk of cybercrime, especially malware attacks using complex obfuscation techniques that hinder detection and analysis. Traditional methods are often insufficient to address these evolving threats. This study integrates automated and manual analysis on APK files using Mobile Security Framework (MobSF) and GHIDRA through reverse engineering. MobSF performs automated static analysis to identify vulnerabilities and security indicators, while GHIDRA is used to decompile binary code into pseudocode for in-depth manual verification. The analysis of the “Pencairan Hadiah” (Prize Disbursement) application revealed dangerous permissions such as RECEIVE_SMS, READ_PHONE_STATE, and SYSTEM_ALERT_WINDOW. Manual inspection with GHIDRA confirmed API calls like getImei() and access to the Telegram API for automated data transmission. Although the bot token was inactive, the findings indicate an intent to exfiltrate sensitive data. The integration of MobSF and GHIDRA provides a deeper understanding and concrete evidence of malicious behavior in APK files, demonstrating the effectiveness of combining automated and manual approaches in digital forensic analysis.</p> Fariz Maulana Rizki Mukhlis Prasetyo Aji Ermadi Satriya Wijaya Harjono Copyright (c) 2025 Fariz Maulana Rizki, Mukhlis Prasetyo Aji, Ermadi Satriya Wijaya, Harjono https://creativecommons.org/licenses/by-sa/4.0 2025-07-30 2025-07-30 7 2 128 138 10.12928/mf.v7i2.14088