SISTEM INFORMASI MANAJEMEN BARANG BUKTI KRIMINAL DENGAN ALGORITMA FEDERATED LEARNING UNTUK KEAMANAN DATA
DOI:
https://doi.org/10.31849/7hg0zs72Keywords:
Barang Bukti Kriminal, Sistem Informasi Manajemen, Federated Learning, Keamanan Data, Blackbox TestingAbstract
Sistem Informasi Manajemen Barang Bukti Kriminal (SIMBKK) berbasis Federated Learning dikembangkan untuk menjawab tantangan dalam pengelolaan barang bukti, khususnya terkait keamanan data, transparansi, dan efisiensi kerja. Sistem ini melibatkan tiga jenis pengguna, yaitu Admin yang bertugas mengelola akun serta mengawasi jalannya sistem, Penyidik yang berperan dalam menginput dan memperbarui data barang bukti, serta Atasan yang memiliki wewenang untuk memantau laporan dan memberikan arahan terkait tindak lanjut kasus. Dengan penerapan Federated Learning, sistem mampu menjaga kerahasiaan data karena proses pembelajaran dilakukan secara terdistribusi tanpa harus memusatkan data pada satu server, sehingga risiko kebocoran data dapat diminimalkan. Fitur utama SIMBKK meliputi login yang aman, input data barang bukti, manajemen pengguna, pencarian data, serta pembuatan laporan. Pengujian dengan metode blackbox menunjukkan bahwa seluruh fitur berjalan sesuai dengan harapan dan menghasilkan keluaran yang tepat. Implementasi SIMBKK terbukti mampu meningkatkan efisiensi alur kerja, memperkuat keamanan data, serta menghadirkan pengelolaan barang bukti yang lebih terstruktur. Sistem ini memberikan kontribusi nyata terhadap transformasi digital di lingkungan kepolisian melalui peningkatan akuntabilitas dan transparansi dalam manajemen barang bukti kriminal.
References
[1] I. Ismail and D. Iryani, “EKSISTENSI LABORATORIUM KRIMINAL PUSPOMAD UNTUK MENDUKUNG KETERSEDIAAN ALAT BUKTI TINDAK PIDANA DI PERADILAN MILITER,” 2023, ejurnal.ubk.ac.id. [Online]. Available: https://ejurnal.ubk.ac.id/index.php/setara/article/view/385
[2] M. I. Saputra, Metode Prototyping Untuk Mengembangkan Sistem Informasi Registrasi Barang Bukti Kriminal (Studi Kasus Polsek Depok Timur). dspace.uii.ac.id, 2018. [Online]. Available: https://dspace.uii.ac.id/handle/123456789/10709
[3] K. Bakry, M. Munawara, and F. Febrianty, “Pengujian Hymen Intact bagi Wanita sebagai Salah Satu Alat Bukti Tindak Kriminal Pemerkosaan dalam Perspektif Fikih Jinayah,” AL-QIBLAH J. Stud. 2022, [Online]. Available: https://journal.stiba.ac.id/index.php/qiblah/article/view/1585
[4] E. M. Situmorang, M. L. Panggabean, and H. Jayadi, “Kebijakan Kriminal Dalam Penggunaan Alat Bukti Petunjuk Dalam Tindak Pidana Korupsi Di Indonesia,” 2021, ejournal.uki.ac.id. [Online]. Available: http://ejournal.uki.ac.id/index.php/tora/article/download/2646/1749
[5] N. Noffezar, F. Fitriati, and I. Faniyah, “Penggunaan Alat Bukti Digital Dalam Komputer Forensik Pada Penyidikan Tindak Pidana Mayantara Di Direktorat Kriminal Khusus Polda Sumbar,” UNES J. …, 2019, [Online]. Available: https://swarajustisia.unespadang.ac.id/index.php/UJSJ/article/view/82
[6] J. Wen, Z. Zhang, Y. Lan, Z. Cui, And J. Cai, “A survey on federated learning: challenges and applications,” 2023, Springer. doi: 10.1007/S13042-022-01647-Y.
[7] P. M. Mammen, “Federated learning: Opportunities and challenges,” arXiv Prepr. arXiv2101.05428, 2021, [Online]. Available: https://arxiv.org/abs/2101.05428
[8] C. Zhang, Y. Xie, H. Bai, B. Yu, W. Li, and Y. Gao, “A survey on federated learning,” Knowledge-Based Syst., 2021, [Online]. Available:
https://www.sciencedirect.com/science/article/pii/S0950705121000381
[9] T. Li, A. K. Sahu, A. Talwalkar, and ..., “Federated learning: Challenges, methods, and future directions,” IEEE signal Process, 2020, [Online].
Available: https://ieeexplore.ieee.org/abstract/document/9084352/
[10] L. Li, Y. Fan, M. Tse, and K. Y. Lin, “A review of applications in federated learning,” Comput. &Industrial Eng., 2020, [Online].
Available: https://www.sciencedirect.com/science/article/pii/S0360835220305532
[11] A. Pratama and E. Supriyanto, “Sistem Informasi Barang Bukti Berbasis Web pada Polres Sleman. Jurnal Teknologi dan Sistem Informasi,” J. Teknol. dan Sist. Inf., vol. 9, no. 2, pp. 112–120, 2021.
[12] D. Lestari and F. Ramadhan, “Pengembangan Sistem Informasi Barang Bukti Kriminal Berbasis Desktop pada Polresta Bandung,” J. Sist. Inf. dan Komputerisasi, vol. 8, no. 1, pp. 45–53, 2020.
[13] J. L. Ingram, Criminal evidence. taylorfrancis.com, 2021. doi: 10.4324/9781003092360.
[14] P. Roberts and A. Zuckerman, Roberts &Zuckerman’s Criminal Evidence. books.google.com, 2022. [Online]. Available:
[15] R. May and M. Wierda, International criminal evidence. books.google.com, 2021. [Online]. Available: https://books.google.com/books?hl=en&lr=&id=SfVNEAAAQBAJ&oi=fnd&pg=PR3&dq=criminal+evidence&ots=I0vCBJ53sD&sig=KHZbOH0wkwqhe7wumQrnOggOYNc
[16] I. A. Bani and J. K. I. Al-Maliki, “The effects of criminal evidence obtained illegally,” J. Asian Multicult. Res, 2023, [Online]. Available: http://amrsjournals.com/index.php/jamrsss/article/view/371
[17] M. A. Putri, M. Irwan, and P. Nasution, “Integrasi sistem informasi manajemen dengan teknologi big data dalam bisnis,” vol. 3, no. 2, pp. 27–33, 2025.
[18] M. Ridwan, Y. Widiastiwi, A. Zaidiah, R. H. Purabaya dkk, Sistem informasi manajemen. books.google.com, 2021. [Online]. Available:
[19] R. Rahim and A. Ikhwan, “Cryptography Technique with Modular Multiplication Block Cipher and Playfair Cipher,” Int. J. Sci. Res. Sci. Technol. IJSRST, vol. 2, no. 6, pp. 1–2, 2021, [Online]. Available: www.ijsrst.com
[20] P. Sistem, I. Manajemen, S. I. M. Dalam, M. Kolaborasi, T. I. M. Dan, and I. Di, “Peran sistem informasi manajemen (sim) dalam meningkatkan kolaborasi tim dan inovasi di lingkungan kerja,” vol. 3, no. 1, pp. 34–38, 2025.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 ZONAsi: Jurnal Sistem Informasi

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
CC BY-SA 4.0
Attribution-ShareAlike 4.0
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- ShareAlike — If you remix, transform, or build upon the material, you must distribute your contributions under the same license as the original.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.
