Progressive Information, Security, Computer, and Embedded System https://journal.diginus.id/PISCES <p class="show-on-mobile" style="text-align: center;"><img src="https://journal.diginus.id/public/site/images/pisces/logo-pisces-wide.png" alt="" width="1680" height="386" /></p> <p style="text-align: justify;">Articles submitted in PISCES Scientific Journal will be examined by the editorial board. If the article matches the scope and style of writing an PISCES Scientific Journal, the editorial board will assign the article to the reviewer. Reviewer's name cannot be seen by the author. The author only sees the review results from the reviewer, so the author must revise the reviewer request. Each article will be reviewed by two reviewers. If one of the reviewers refuses, the decision will be submitted to the editor. If all reviewers receive the article will be published. Articles that do not make revisions will not be published in the PISCES Scientific Journal.</p> Sakura Publisher en-US Progressive Information, Security, Computer, and Embedded System 2986-724X Analysis and Retrieval of Digital Forensic Evidence on the X Social Media Application Using the Static Forensic Method https://journal.diginus.id/PISCES/article/view/725 <p>This study discusses the application of static digital forensic methods to analyze evidence of cybercrime on the social media platform X. The research is based on a simulated case involving violations of Indonesia’s Electronic Information and Transactions Law (UU ITE), specifically concerning the distribution of pornographic content, hate speech, cyberbullying, and the spread of hoax X. The investigation was conducted by seizing the suspect’s devices, including a laptop and a 15GB flash drive, which were then xamined using FTK Imager and Autopsy forensic tools. The acquisition process was carried out using FTK Imager to create a digital image while maintaining data integrity through MD5 and SHA-1 hash verification. The subsequent analysis was conducted using Autopsy to identify hidden files, deleted files, file system structures, and relevant metadata. The investigation uncovered various types of digital evidence such as illicit images, social media activity logs, SQLite database files, email artifacts, and user activity data directly linked to the suspect’s X account. The findings indicate that static forensic methods are effective in preserving original data during investigation. Furthermore, the forensic tools used in this study proved capable of systematically identifying, extracting, and processing digital evidence accurately. This research contributes to the field of cybercrime law enforcement, particularly in supporting the process of proving digital-based crimes committed through social media platforms.</p> Destyfaini Paisal Udin Sidik Sidin Muhammad Fajar B Copyright (c) 2025 Destyfaini Paisal, Udin Sidik Sidin https://creativecommons.org/licenses/by-sa/4.0 2025-09-02 2025-09-02 67 79 Development of a Assessment System Database with Scheduled Access Management and Email OTP Verification https://journal.diginus.id/PISCES/article/view/750 <p>The rapid advancement of information technology has driven academic services to require increasingly reliable and secure systems, particularly in the assessment domain, which plays a crucial role in the learning process. This study was initiated based on findings of security issues in an existing academic grading system at a higher education institution, including unauthorized changes to student grades and vulnerabilities caused by outdated frameworks. This research aims to develop a grading system database design equipped with scheduled access management and <em>One-Time Password</em> (OTP) email verification to enhance the security of assessment processes. The study employs a Research and Development (R&amp;D) approach aligned with the System Development Life Cycle (SDLC) prototyping model. The results indicate that the newly designed database using PostgreSQL successfully supports access restriction based on assessment schedules, while the integration of OTP verification effectively prevents unauthorized account usage. System testing by a supervisor demonstrated that almost all key features operated with “fully successful” status. Therefore, the developed product is considered effective in resolving security issues within academic grading systems and can serve as a reference for similar system development efforts in higher education institutions.</p> Muhammad Agung Baso Riadi Husda Copyright (c) 2025 Muhammad Agung, Baso Riadi Husda https://creativecommons.org/licenses/by-sa/4.0 2025-09-02 2025-09-02 80 86 Development of an Android-Based Information System at SMA Negeri 17 Gowa https://journal.diginus.id/PISCES/article/view/557 <p>This research aims to (1) Knowing the results of testing on the development of school information systems at SMA Negeri 17 Gowa, and (2) assess the effectiveness and practicality of the developed school information system at SMA Negeri 17 Gowa. This type of research is Research &amp; Development (R&amp;D). The development was carried out using the prototype model. The results obtained from the research are a system that can be used by the community and students of SMA 17 Gowa. This system has undergone software testing using ISO 25010, encompassing several aspects such as (1) Functional Suitability, achieving a score of 95.83% (very suitable); (2) Performance Efficiency, based on software testing using performance overlay tools, the average GPU and UI (CPU) usage indicators showed a green line, indicating normal results; (3) Compatibility, where multiple applications running simultaneously showed that both could operate well; (4) Usability, tested with 30 respondents using a random sampling method, achieved a score of 86.58%, categorized as very good; (5) Reliability, in tests covering good operational levels of the system and ease of access; (6) Maintainability, the testing showed that the system is in a very good category; (7) Portability, in this aspect, testing on several types of smartphones with different Android versions ran well without issues; (8) Security, testing yielded a security score of 65/100. The conclusion from these results is that the software has passed system evaluation and is deemed suitable, ready to be handed over to users and put into use.<em>&nbsp; </em></p> M. Nurmuhajirin Surahman Muhammad Yusuf Mappeasse Ninik Rahayu Ashadi Copyright (c) 2025 M. Nurmuhajirin S Surahman, Muhammad Yusuf Mappeasse, Ninik Rahayu Ashadi https://creativecommons.org/licenses/by-sa/4.0 2025-09-02 2025-09-02 87 94 Implementation of the RememberMe Application as a Digital Task Reminder Media https://journal.diginus.id/PISCES/article/view/751 <p><em>This study aims to develop a digital reminder application that helps users manage their daily schedules and activities more efficiently. The application is &nbsp;designed using the waterfall method, which includes the stages of analysis, design, &nbsp;implementation, testing, and maintenance. Testing was conducted using the black box method to ensure that all functions operate according to user needs. The results show that the application works well, delivers timely notifications, and can be used practically to support time management. </em></p> Arham Arham M. Afif Sahwan Salma Salma Sukma Riski Ananda Copyright (c) 2025 Arham Arham, M. Afif Sahwan, Salma Salma, Sukma Riski Ananda https://creativecommons.org/licenses/by-sa/4.0 2025-09-02 2025-09-02 95 104