Category Archives: Events & News


Oleh Syaikh Abdur Rahman bin Nashir As-Sa’di rahimahullah

Dalam urusan politik, Islam telah mensyari’atkan aturan yang paling sempurna dan adil. Islam mengajari umatnya segala yang seharusnya dilakuan dalam berintraksi (muamalah) dengan sesama Muslim atau dengan yang lainnya. Dalam peraturannya, Islam menggabungkan antara rahmah (kasih sayang) dengan kekuatan, menggabungkan antara sikap lemah lembut dengan kasih sayang terhadap semua makhluk sesuai kemampuan. Jika dengan lembut dan kasih sayang tidak bisa, maka kekuatan yang dipergunakan, namun dengan penuh hikmah dan keadilan, bukan dengan kezhaliman dan kekerasan, Allâh Azza wa Jalla berfirman:

إِنَّ اللَّهَ يَأْمُرُ بِالْعَدْلِ وَالْإِحْسَانِ وَإِيتَاءِ ذِي الْقُرْبَىٰ وَيَنْهَىٰ عَنِ الْفَحْشَاءِ وَالْمُنْكَرِ وَالْبَغْيِ ۚ يَعِظُكُمْ لَعَلَّكُمْ تَذَكَّرُونَ ﴿٩٠﴾ وَأَوْفُوا بِعَهْدِ اللَّهِ إِذَا عَاهَدْتُمْ وَلَا تَنْقُضُوا الْأَيْمَانَ

Sesungguhnya Allâh menyuruh (kamu) berlaku adil dan berbuat kebajikan, memberi kepada kaum kerabat, dan Allâh melarang dari perbuatan keji, kemungkaran dan permusuhan. Dia memberi pengajaran kepadamu agar kamu dapat mengambil pelajaran. Dan tepatilah perjanjian dengan Allâh apabila kamu berjanji dan janganlah kamu membatalkan sumpah-sumpah(mu) itu, sesudah meneguhkannya, sedang kamu telah menjadikan Allâh sebagai saksimu (terhadap sumpah-sumpahmu itu). [an-Nahl/16:90-91]

Continue reading

Online Shopping

Online shopping is a form of electronic commerce which allows consumers to directly buy goods or services from a seller over the Internet using a web browser. Consumers find a product of interest by visiting the website of the retailer directly or by searching among alternative vendors using a shopping search engine, which displays the same product’s availability and pricing at different e-retailers. As of 2016, customers can shop online using a range of different computers and devices, including desktop computerslaptopstablet computers and smartphones.

Continue reading

Electronic Business

Electronic Business or e-business is a term which can be used for any kind of business or commercial transaction that includes sharing information across the internet. Commerce constitutes the exchange of products and services between businesses, groups and individuals and can be seen as one of the essential activities of any business. Electronic commerce focuses on the use of ICT to enable the external activities and relationships of the business with individuals, groups and other businesses or e business refers to business with help of internet i.e. doing business with the help of internet network.[1] The term “e-business” was coined by IBM‘s marketing and Internet team in 1996.[2][3]



In 1994, IBM, with its agency Ogilvy & Mather, began to use its foundation in IT solutions and expertise to market itself as a leader of conducting business on the Internet through the term “e-business.”[4] Then CEO Louis V. Gerstner, Jr. was prepared to invest $1 billion to market this new brand.[5]

After conducting worldwide market research in October 1997, IBM began with an eight-page piece in the Wall Street Journal that would introduce the concept of “e-business” and advertise IBM’s expertise in the new field.[4] IBM decided not to trademark the term “e-business” in the hopes that other companies would use the term and create an entire new industry.[5] However, this proved to be too successful and by 2000, to differentiate itself, IBM launched a $300 million campaign about its “e-business infrastructure” capabilities.[5]Since that time, the terms, “e-business” and “e-commerce” have been loosely interchangeable and have become a part of the common vernacular.[6]

Business model

Main article: Business model

When organizations go online, they have to decide which e-business models best suit their goals.[7] A business model is defined as the organization of product, service and information flows, and the source of revenues and benefits for suppliers and customers. The concept of e-business model is the same but used in the online presence.

Revenue model

Main article: Revenue model

A key component of the business model is the revenue model, which is a framework for generating revenues. It identifies which revenue source to pursue, what value to offer, how to price the value, and who pays for the value. It is a key component of a company’s business model. It primarily identifies what product or service will be created in order to generate revenues and the ways in which the product or service will be sold.

Without a well defined revenue model, that is, a clear plan of how to generate revenues, new businesses will more likely struggle due to costs which they will not be able to sustain. By having a clear revenue model, a business can focus on a target audience, fund development plans for a product or service, establish marketing plans, begin a line of credit and raise capital.


Main article: E-commerce

E-commerce (short for “electronic commerce”) is trading in products or services using computer networks, such as the Internet. Electronic commerce draws on technologies such as mobile commerce, electronic funds transfer, supply chain management, Internet marketing, online transaction processing, electronic data interchange (EDI), inventory management systems, and automated data collection. Modern electronic commerce typically uses the World Wide Web for at least one part of the transaction’s life cycle, although it may also use other technologies such as e-mail.


While much has been written of the economic advantages of Internet-enabled commerce, there is also evidence that some aspects of the internet such as maps and location-aware services may serve to reinforce economic inequality and the digital divide.[8] Electronic commerce may be responsible for consolidation and the decline of mom-and-popbrick and mortar businesses resulting in increases in income inequality.[9][10][11] Author Andrew Keen, a long-time critic of the social transformations caused by the Internet, has recently focused on the economic effects of consolidation from Internet businesses. Keen cites a 2013 Institute for Local Self-Reliance report saying brick-and-mortar retailers employ 47 people for every $10 million in sales, while Amazon employs only 14. Similarly, the 700-employee room rental start-up Airbnb was valued at $10 billion in 2014, about half as much as Hilton Hotels, which employs 152,000 people. And car-sharing Internet startup Uber employs 1,000 full-time employees and is valued at $18.2 billion, about the same valuation as Avis and Hertz combined, which together employ almost 60,000 people.[12]


E-business systems naturally have greater security risks than traditional business systems, therefore it is important for e-business systems to be fully protected against these risks. A far greater number of people have access to e-businesses through the internet than would have access to a traditional business. Customers, suppliers, employees, and numerous other people use any particular e-business system daily and expect their confidential information to stay secure. Hackers are one of the great threats to the security of e-businesses. Some common security concerns for e-Businesses include keeping business and customer information private and confidential, authenticity of data, and data integrity. Some of the methods of protecting e-business security and keeping information secure include physical security measures as well as data storage, data transmission, anti-virus softwarefirewalls, and encryption to list a few.[13][14]

Privacy and confidentiality

Confidentiality is the extent to which businesses makes personal information available to other businesses and individuals.[15] With any business, confidential information must remain secure and only be accessible to the intended recipient. However, this becomes even more difficult when dealing with e-businesses specifically. To keep such information secure means protecting any electronic records and files from unauthorized access, as well as ensuring safe transmission and data storage of such information. Tools such as encryption and firewalls manage this specific concern within e-business.[14]


E-business transactions pose greater challenges for establishing authenticity due to the ease with which electronic information may be altered and copied. Both parties in an e-business transaction want to have the assurance that the other party is who they claim to be, especially when a customer places an order and then submits a payment electronically. One common way to ensure this is to limit access to a network or trusted parties by using a virtual private network (VPN) technology. The establishment of authenticity is even greater when a combination of techniques are used, and such techniques involve checking “something you know” (i.e. password or PIN), “something you need” (i.e. credit card), or “something you are” (i.e. digital signatures or voice recognition methods). Many times in e-business, however, “something you are” is pretty strongly verified by checking the purchaser’s “something you have” (i.e. credit card) and “something you know” (i.e. card number).[14]

Data integrit

Data integrity answers the question “Can the information be changed or corrupted in any way?” This leads to the assurance that the message received is identical to the message sent. A business needs to be confident that data is not changed in transit, whether deliberately or by accident. To help with data integrity, firewalls protect stored data against unauthorized access, while simply backing up data allows recovery should the data or equipment be damaged.[14]


This concern deals with the existence of proof in a transaction. A business must have assurance that the receiving party or purchaser cannot deny that a transaction has occurred, and this means having sufficient evidence to prove the transaction. One way to address non-repudiation is using digital signatures.[14] A digital signature not only ensures that a message or document has been electronically signed by the person, but since a digital signature can only be created by one person, it also ensures that this person cannot later deny that they provided their signature.[16]

Access control

When certain electronic resources and information is limited to only a few authorized individuals, a business and its customers must have the assurance that no one else can access the systems or information. Fortunately, there are a variety of techniques to address this concern including firewalls, access privileges, user identification and authentication techniques (such as passwords and digital certificates), Virtual Private Networks (VPN), and much more.[14]


This concern is specifically pertinent to a business’ customers as certain information must be available when customers need it. Messages must be delivered in a reliable and timely fashion, and information must be stored and retrieved as required. Because availability of service is important for all e-business websites, steps must be taken to prevent disruption of service by events such as power outages and damage to physical infrastructure. Examples to address this include data backup, fire-suppression systems, Uninterrupted Power Supply (UPS) systems, virus protection, as well as making sure that there is sufficient capacity to handle the demands posed by heavy network traffic.[14]


The business internet which supports e-business has a cost to maintain of about $2 trillion in outsourced IT dollars just in the United States alone. With each website custom crafted and maintained in code, the maintenance burden is enormous. In the twenty-first century, look for new businesses that will help standardize the look and feel of the internet presence of a business to be more uniform in nature to help reduce the cost of maintenance. Expect maintenance by graphical software tools instead of directly by code as a key business proposition that will revolutionize the internet once again.

Security solutions

When it comes to security solutions, sustainable electronic business requires support for data integrity, strong authentication, and privacy.

Access and data integrity

There are several different ways to prevent access to the data that is kept online. One way is to use anti-virus software. This is something that most people use to protect their networks regardless of the data they have. E-businesses should use this because they can then be sure that the information sent and received to their system is clean.[14] A second way to protect the data is to use firewalls and network protection. A firewall is used to restrict access to private networks, as well as public networks that a company may use. The firewall also has the ability to log attempts into the network and provide warnings as it is happening. They are very beneficial to keep third-parties out of the network. Businesses that use Wi-Fi need to consider different forms of protection because these networks are easier for someone to access. They should look into protected access, virtual private networks, or internet protocol security.[14] Another option they have is an intrusion detection system. This system alerts when there are possible intrusions. Some companies set up traps or “hot spots” to attract people and are then able to know when someone is trying to hack into that area.[14]


Encryption, which is actually a part of cryptography, involves transforming texts or messages into a code which is unreadable. These messages have to be decrypted in order to be understandable or usable for someone. There is a key that identifies the data to a certain person or company. With public key encryption, there are actually two keys used. One is public and one is private. The public one is used for encryption, and the private for decryption. The level of the actual encryption can be adjusted and should be based on the information. The key can be just a simple slide of letters or a completely random mix-up of letters. This is relatively easy to implement because there is software that a company can purchase. A company needs to be sure that their keys are registered with a certificate authority.[14]

Digital certificates

The point of a digital certificate is to identify the owner of a document. This way the receiver knows that it is an authentic document. Companies can use these certificates in several different ways. They can be used as a replacement for user names and passwords. Each employee can be given these to access the documents that they need from wherever they are. These certificates also use encryption. They are a little more complicated than normal encryption however. They actually used important information within the code. They do this in order to assure authenticity of the documents as well as confidentiality and data integrity which always accompany encryption.[14] Digital certificates are not commonly used because they are confusing for people to implement. There can be complications when using different browsers, which means they need to use multiple certificates. The process is being adjusted so that it is easier to use.[14]

Digital signatures

A final way to secure information online would be to use a digital signature. If a document has a digital signature on it, no one else is able to edit the information without being detected. That way if it is edited, it may be adjusted for reliability after the fact. In order to use a digital signature, one must use a combination of cryptography and a message digest. A message digest is used to give the document a unique value. That value is then encrypted with the sender’s private key.[14]

See also


Digital Distribution

Digital distribution (also called content deliveryonline distribution, or electronic software distribution (ESD), among others) is the delivery or distribution of media contentsuch as audiovideosoftware and video games.[1] The term is generally used to describe distribution over an online delivery medium, such as the Internet, thus bypassing physical distribution methods, such as papercompact discs, and VHS videocassettes. The term online distribution is typically applied to freestanding products; downloadable add-ons for other products are more commonly known as downloadable content. With the advancement of network bandwidth capabilities, online distribution became prominent in the 21st century.

Continue reading

Raja Salman akan Beri Bantuan Pendirian Sekolah Bahasa Arab

Raja Salman1

Jakarta – Raja Arab Saudi Salman bin Abdulaziz al-Saud akan memberikan bantuan pendidikan dengan mendirikan sejumlah sekolah di Indonesia. Pendirian sekolah ini dimaksudkan untuk pengembangan bahasa Arab.

Continue reading

Raja Salman ke Indonesia, Arab Saudi Ingin Terlibat dalam Proyek Infrastruktur

\Raja Salman ke Indonesia, Arab Saudi Ingin Terlibat dalam Proyek Infrastruktur

Continue reading

3 Langkah Dakwah Kreatif Melalui Media Sosial

Dakwah Kreatif Melalui Media Sosial, Why Not?

Sebelum saya mengulas tentang dakwah kreatif melalui media sosial, alangkah baiknya kita bahas kata perkata yang menjadi judul bahasan kali ini.

Dakwah berarti mengajak atau menyeru, setidaknya itu yang pernah saya dengar ketika mengaji pada ustadz, Wikipedia pun berkata senada dalam mengartikan kata dakwah. Sebelum saya dan Anda mengetahui definisi  kata dakwah, apa yang terlintas dalam benak Anda saat mendengar kata itu? Sebagian besar mungkin akan berpendapat sama dengan saya, ketika mendengar kata dakwah, seketika akan terbayang orang yang sedang berbicara diatas mimbar atau di depan banyak orang dengan menyampaikan ayat-ayat Yang Maha Kuasa, iya kan?

Continue reading

Ulama Upayakan Pakai Media Sosial sebagai Medium Dakwah 

Ulama Upayakan Pakai Media Sosial sebagai Medium Dakwah 

Jakarta – Ketua Komisi Informasi dan Komunikasi MUI Masduki Baidlowi mengatakan paradigma berdakwah terjadi pergeseran nilai. Menurutnya pendakwah sudah mulai mengatur strategi berdakwah melalui media sosial (medsos).

Continue reading


Kegiatan Pramuka & Karnaval Agustus 2016

This gallery contains 11 photos.

Khoul KH. Ahmad Juwahir ke 6 2019/1440H

Khoul 6 diadakan pada hari Ahad, 14-Okt-2019 bertempat di kediaman Alm. KH. Achmad Juwahir.

Keluarga mengucapkan terimakasih atas kehadiran dan doa-doanya dari warga dan manyarakat semua, semoga sebagai amal sholeh dan mendapat balasan yang setimpal dari Allah.SWT. Aamin.