Page 6 (data 151 to 180 of 231) | Displayed ini 30 data/page
Corresponding Author
Fajar Nugroho
Institutions
a) Master of Information Systems, Faculty Of Post Graduate
b) Universitas Komputer Indonesia
Jl. Dipati Ukur No.112-116, 40132, Bandung, Jawa Barat, Indonesia
c) fajarnugroho.id[at]gmail.com
Abstract
Keywords are important because they represent a simple form of content and have important role in finding articles in information gathering as well as effective indexing. Keywords are common in scientific papers; website (meta tag), news, etc. In this research, we are focusing on scientific writings. Scientific writings are also categorized as structured because they have firm parts such as title, abstract, content, and conclusion so whenever we are going to find important information, we can find them through specific parts such as title, abstract, and conclusion.Automatic keywords extraction from scientific papers is used to assist on suggesting keywords for indexers or to produce summary in a form of keywords for scientific writings.By using trained auto associative artificial neural network with chosen keywords data sets we are able to find keywords features in scientific documents and a combination of semantic approaches in which relation among words is an important aspect aside of words frequency to discover important things in a document, so we expect to produce recommended relevant keywords. So the automated keywords extraction and pre-included keywords from the writer will be compared to choose either the most relevant or complementary and providing recommendation or perhaps the extracted automated keywords and the keywords from the writer are exactly the same.
Keywords
Automatic Keyword Extraction (AKE); Semantic Relatedness; Neural Network
Topic
Informatic and Information System
Corresponding Author
Tati Harihayati Mardzuki
Institutions
Program Studi Teknik Informatika
Universitas Komputer Indonesia
Abstract
The purpose of this study is to produce a model that can be used as a reference by nursing managers in monitoring each action taken by nurses, updating Standard Operating Procedures (SOPs), and being able to assist the head of the room to share action experiences between nursing staff. Nurses as nursing services implementers have different knowledge in carrying out nursing services, even though the nursing services provided are in accordance with existing procedures. This can occur due to several factors such as differences in work period, experience habits, and knowledge from various seminar or training that have been followed by each nurse. The difference in knowledge will greatly affect the quality of nursing services to patients in hospitals, so that good and correct handling through nursing knowledge management will be very helpful in terms of managing the resources they have. The process of knowledge conversion uses the SECI process (socialization, externalization, combination and internationalization). The method used to monitor the actions taken by nurses on patients is the text mining method, in which the stemming process uses the Nazief and Adriani Algorithm and in the analysis process using the Jaro-Winkler algorithm to measure the level of similarity of a nurses experience with Standard Operating Procedure (SOP ) The results of this study are recommendations for knowledge management systems at hospital nursing services, so that nurses knowledge and experience can be managed properly to share experiences between nursing staff.
Keywords
Knowledge Management, SOP, Nursing Services
Topic
Informatic and Information System
Corresponding Author
Geraldi Catur Pamuji
Institutions
Postgraduate Faculty, Universitas Komputer Indonesia, Bandung, Indonesia.
Abstract
PT. XYZ is a Company in Bandung that specializes in software creation services. Limited human resources in this company causing the control and management of the project do not neatly arrange because every team has differences in phases, procedures in the project, or location of the project that is being done under the contract, including the preparation of documents related to the project reports. Management of the company has difficulties in getting information about the state and progress of the ongoing projects. Due to the lack of good Standard Operating Procedure (SOP) in managing project information. The main problem why is documents and knowledge spread is the employee turnover rate is quite high among employees who transfer from one project to another or when the employee leave the company so that each individual- knowledge had come to move or disappear. Based on these problems, it can be concluded that PT. XYZ requires knowledge management to improve the performance of the company. Therefore, this study proposes a model of knowledge management system design as the solution to the problems that occur in the company especially knowledge management project that is the core business of the company. Research conducted are using 6 steps from the 10 Step method Knowledge Management Roadmap to manufacture a blueprint. Research supported by the Knowledge Management Assessment Kit (KMAK) tools that serve to facilitate the research stages.
Keywords
Knowledge Management, 10 Step Knowledge Management Roadmap, KMS
Topic
Informatic and Information System
Corresponding Author
Julian Chandra Wibawa
Institutions
Department of Information System, Universitas Komputer Indonesia. Jalan Dipatiukur No. 112-116, Bandung 40132
Abstract
One form of service to consumers provided by retail companies is the convenience of shopping. Starting from the condition of the building, room temperature, and lighting in each outlet. However, the system that handles the management of the physical condition of this outlet has become a matter of little concern, as a result of some implementation of repairs and maintenance of outlets, not as expected. This research aims to build a maintenance helpdesk information system to provide effective and efficient repair services. The design of this study uses descriptive methods, using a structured approach, using flow map tools, context diagrams, Data Flow Diagrams (DFD) and Entity Relationship Diagrams (ERD), while the development uses a prototype model. With the construction of the Maintenance Helpdesk Information System in Retail Companies, it can be concluded that this application is able to monitor all physical conditions of existing outlets, and is able to improve performance in the maintenance department and shorten the time in the administrative process.
Keywords
information system, maintenance, helpdesk
Topic
Informatic and Information System
Corresponding Author
Sinthia Anggraeni
Institutions
a) Departemen Ilmu Komunikasi, Universitas Komputer indonesia
tessamelita[at]mahasiswa.unikom.ac.id
b) Departemen Manajemen, Universitas Komputer Indonesia
Abstract
The purpose of this study was to find out about the influence of online business (E-Commerce) on the internet which has a relationship between marketing mix, namely modern and traditional marketing systems. The type and method of this research can use qualitative research methods. The results of this study note that the influence of the development of these technologies causes the world of trade is required to offer a new concept through the internet, that is E-Marketing. Therefore, with the internet in order to make it easier for people to buy goods through onlineshop, which is currently widely used by the Indonesian people even to the world. So the internet provides a big role in business management aspects, e-commerce is one of the effective ways to increase sales and turnover but e-commerce is not the best way.
Keywords
Marketing, Online Business
Topic
Informatic and Information System
Corresponding Author
indriyanto indriyanto
Institutions
a) Postgraduate of Information System Department, Universitas Komputer Indonesia
b) Information Management Department, Universitas Komputer Indonesia
c) indriyanto[at]email.unikom.ac.id
Abstract
Plagiarism in a thesis can occur due to accidental or intentional, it is necessary to make a system that can detect plagiarism. computerized systems can help in quickly detecting and measuring the plagiarism of a scientific work. there are many techniques that can be used to measure the level of plagiarism of a document. in the papper, we will use the Vector Space Model and Cosine Similarity method to measure the degree of similarity of the thesis. the result of this method is to compare the level of thesis similarity with the dataset using the TF and TF-IDF techniques in graphical form. can be concluded from the experimental process, using the TF-IDF technique produces smaller values compared with using the TF technique
Keywords
plagiarism, scientific work, space model vector, cosine similarity.
Topic
Informatic and Information System
Corresponding Author
Sopian Alviana
Institutions
Universitas Komputer Indonesia
Abstract
The purpose of this study was to measure the comparative success rate methods of signature-based anomaly based on enterprise computer network attack detected. The application of information technology in many fields often cause the occurrence of attacks and threats that lead to data loss, the crippled system, and destruction of the system. To address these threats required the presence of early detection against any threats that occur at the enterprise computer network system. Early detection function to minimize and prevent the loss of the more extensive system. Methods used in the detection of the threat that is signature based and anomaly based method. Both methods are used for detection of any threats to the network system, then that method will be between the two measured how many threats can be detected by both methods, and measure the level of success detection. The results obtained in this study, Method of Anomaly Based successfully detect 89.66% attack, while the method Signature based successfully detected 91.87% attack. If the results of the great early attack detection, then the security level of the network are also great and can reduce the risk posed by a threat. Intrusion Detection System (IDS) with method signature based detection has a success rate higher in detecting attacks in computer networks, as compared with the method of anomaly based.
Keywords
ids, security, network, detection, rmse
Topic
Informatic and Information System
Corresponding Author
Ravie Chandren Muniyandi
Institutions
Faculty of Information Science and Technology, University Kebangsaan Malaysia,
43600 Bangi, Selangor, Malaysia.
Abstract
Membrane computing models are bio-inspired and used as intelligent algorithms. To exploit their inherent parallelism, previous studies have mapped one membrane to one thread block of a graphics processing unit (GPU). However, these previous approaches have not addressed the issue of GPU occupancy and the rate of the communication between thread blocks, which is a time consuming process. Here, we present a new classification algorithm to organize dependent objects and membranes based on the thread block communication rate and assign them to sub-matrices for execution by those same threads and thread blocks. This reduces the amount of communication required between threads and thread blocks, allowing the GPUs to maintain the highest possible occupancy. Our results indicate that for 48 objects per membrane, this algorithm facilitates a 93-fold increase in processing speed compared with a 1.6-fold increase associated with previous algorithms.
Keywords
Membrane computing, clustering algorithm, high performance computing, graphic processing units, multiprocessor occupancy
Topic
Informatic and Information System
Corresponding Author
Budi Arifitama
Institutions
a) Departement of Informatic, Universitas Trilogi
Jl.TMP Kalibata No.1 Kampus Trilogi
*budiarif[at]trilogi.ac.id
Abstract
The purpose of this research is to design a mobile augmented reality for learning Batavia traditional culture on improving the knowledge of the citizen of Jakarta. Augmented reality is applied as an approach to enhance the interaction of users for improving their level of knowledge. The method used in this research is a marker-based method detection which resulted in a minimum response of less than 2 second, a minimum distance of 10 cm and a maximum distance of 50 cm, a minimum angle of 25 degrees and a maximum 80 degrees performed on the augmented reality marker. The result of this research is the marker-based tracking method applied on a mobile augmented reality has proven to be excellent and giving an increasing knowledge effect of the citizen of Jakarta for learning their traditional arts, architecture and weaponry
Keywords
Augmented Reality; Marker-Based Tracking; Traditional Cuture; Mobile Augmented Reality
Topic
Informatic and Information System
Corresponding Author
Mohammad Iqbal Matondang
Institutions
Universitas Komputer Indonesia (UNIKOM)
Jl. Dipati Ukur 114 Bandung 40132
Abstract
Now days every bank offered many services to the customers for ease of banking. One of the services that bank offered is mobile banking. With widely used of handheld device, the use of mobile banking gets easier. Customer now prefer using mobile banking except for service that cannot be done on their handheld device. With this come a security concern on mobile banking. The basic principle of security on mobile banking has the same purpose of security on banking in general. That purpose is guarantee of transaction, transaction services and data security. However, there are some problem occurred in some cases with the mobile banking application. These problems might cause customer loses some of their money. Audit on security of mobile banking is conducted by the bank to ensure that banks mobile banking is ready for attack on their system. In this paper, it presents a survey of the conformity audit of the mobile banking security system to the needs of proven information security standards. So that the results of the security system survey on mobile banking can be used to support banking organizers in determining strategies and evaluating the security system of mobile banking services.
Keywords
mobile banking, security system.
Topic
Informatic and Information System
Corresponding Author
Ade Indra Saputra
Institutions
a) Master of Information System, Postgraduate Faculty, Indonesia Computer University of Bandung
b) Indonesia Computer University of Bandung
Abstract
STIKOM DB Jambi Postgraduate is a private college in the province of Jambi. The existence of an information system is very needed nowadays to support the main activities at STIKOM DB Jambi postgraduate program. Failure in implementing information systems is often times caused by lack of careful planning. So, now the planning of an information system for STIKOM DB Jambi postgraduate program can be realized in the form of a blueprint. Enterprise Architecture Planning (EAP) is an architecture defining process that will used by an information system to support business process and planning for the implementation of said information system. This journal will discuss the concept of using EAP to make an academic information system blueprint for STIKOM DB Jambi postgraduate program that contains data architecture, application, and technology.
Keywords
EAP, enterprise architecture planning, STIKOM DB Jambi.
Topic
Informatic and Information System
Corresponding Author
Yaddarabullah Yaddarabullah
Institutions
a,b,c) Faculty of Creative Industry and Telematics, Universitas Trilogi
Jl. TMP Kalibata No.1, Jakarta 12760, Indonesia
*yaddarabullah[at]trilogi.ac.id
Abstract
Least Significant Bit (LSB) is one method used in steganography to store messages in an image. In the LSB method there is still a gap to corrupt the message in the stego image if it is modified. As the result, the message in the stego image is corrupted. In this study, the modification process of the LSB method will be carried out by inserting the Redundant Pattern Encoding (RPE) method. The Redundant Pattern Encoding method will divide the stego image into patch A and patch B, then the message will be inserted into each patch. The results of the modification process on the Least Significant Bit method with Redundant Pattern Encoding, that is, the messages on the stego image can survive if the Segmentation is increased by a rate of 10% to 50%, Image Compression with a rate of 5% to 15% and Image Enhancement with a rate of 5% to 25 %. The message on the stego image cannot survive if they experience by giving of Color Image Processing and Noise thoroughly on both patches
Keywords
Steganography; Least Significant Bit; Redundant Pattern Encoding
Topic
Informatic and Information System
Corresponding Author
Nizar Rabbi Radliya
Institutions
(1,2)Universitas Komputer Indonesia, (3)Universitas Siliwangi
Abstract
Clean water needs for the community continue to increase along with population growth in each area. The government continued to pursue of clean water supply but them has difficulty in collecting data of people who have or have not had access to clean water. The purpose of this research is to develop a monitoring application of clean water access for the community and determining areas that need to improve access to clean water. Data collection is done by examining documents which are related to clean water management and conducting interviews with the Department of Housing and Settlement of West Java Province. The results of data collection are used to develop a clean water monitoring application system based on Android and Web. Data from the application will be used for clustering with the K-Means algorithm. For example, in the city of Bandung, 12 urban village areas were recommended for increasing access to clean water. The area has a percentage of ownership of clean water access approaching the value of 29.96% of the ownership of clean water sources for food and drink, 28.96% for ownership of other sources of clean water and 14.48% for ownership of reserves of clean water.
Keywords
Monitoring Application, Clean Water Access, Clustering, K-Means Algorithm
Topic
Informatic and Information System
Corresponding Author
Cahya pradipta Abdussamad
Institutions
MEGISTER DESIGN STUDY PROGRAM
FACULTY OF POST GRADUATE
INDONESIAN COMPUTER UNIVERSITY
EMAIL : cahyapradipta[at]gmail.com
Abstract
ABSTRACT: Processing data on new student admissions at the University of Ichsan Gorontalo Campus II Pohuwato is still done conventionally, namely prospective applicants must come directly to the registration place then fill out the registration form then registration data is recorded in books and report making also uses conventional recap so the frequent loss of archives and the time spent making reports requires a very long time. With the existence of these problems it is necessary to have a new student admission information system that is online so that prospective students do not have to come directly to the registration site and make it easier for officers in making reports. The research methods used in this study are literature, interviews, observation, system analysis, system design, and system implementation. With this research, it is expected to be able to help prospective new students and new student admissions officers. Keywords: new student registration information system, ichsan university Gorontalo campus II pohuwato
Keywords
new student admission information system
Topic
Informatic and Information System
Corresponding Author
Andri Heryandi
Institutions
Universitas Komputer Indonesia
Abstract
A diploma is an important document for someone because the document shows evidence of someones graduation in taking an education both formally and informally. At present, the government of the Republic of Indonesia order the higher eduation institution to publish a diploma companion certificate (Permendikbud) No. 81 of 2014. A diploma companion certificate (known as Surat Keterangan Pendamping Ijazah - SKPI) or a diploma supplement is an official statement issued by a higher education institution, containing information about academic achievement or qualifications from education graduates where graduate qualifications are described in the form of descriptive narratives that state graduates learning achievements at the relevant to Indonesian Nasional Qualification Framework level, in a standard format that is easily understood by the general public. In order to collect data on academic achievements and qualifications of students during lectures, a mechanism is needed to collect them. The propossed system allows students to record data on their activities both achievements, projects that have been done, systems or applications that have been built, internships, practical work and other information that leads to the competence of graduates of study programs. This information system is used as a medium to collect these data, where when the student passes the study it can be used as a reference in making supplement diploma document which will later be verified and validated by the authorized personel. The system is an online information system, so that it is easy to be used by students, as well as study programs to process competency data which will later be used as input for diploma supplement when the students graduate. Students must be active in filling out the system so that their competencies will be seen in diploma supplement document which will later be printed by their higher education institution.
Keywords
Diploma Supplement, SKPI, Surat Keterangan Pendamping Ijazah
Topic
Informatic and Information System
Corresponding Author
Dezara Judithia Handriani
Institutions
a) Departemen Ilmu Komunikasi, Universitas Komputer Indonesia, Indonesia
b) Departemen Sastra Inggris, Universitas Komputer Indonesia, Indonesia
Abstract
To start a job opportunity now, its no longer a difficult thing to do. Therefore, the purpose of this study is to make it easier for readers to develop their potentials and even to find out self-potential in reliable and successful entrepreneurship only through online media. We use descriptive methods for successful influencers and entrepreneurs in their respective fields. The results are starting from online business that has several elements to get success, ranging from business and potential formation process, pioneering business through online media, the role of online media itself, preparing capital, to the role of consumers and markets in the online business. We lift this research because of the growing development of telecommunication and information technology, internet facilities are available which now have created many virtual worlds and triggered to build businesses that do not require much cost and build businesses based on online media is also more quickly intertwined. And in the end, even the smallest potential that we have can be maximized only by capitalizing on online media and our reliability in managing an increasingly sophisticated online business. So with an online business, you no longer need to be afraid to find a job, even you can create your own job openings and pay yourself. Be someone who has an entrepreneurial spirit.
Keywords
E-Commerce
Topic
Informatic and Information System
Corresponding Author
Mochammad Fachri
Institutions
a) Informatics Engineering, Krisnadwipayana University
Jl. Jatiwaringin Raya, Pondok Gede, Jakarta Timur - Indonesia
Abstract
Bluetooth Low Energy (BLE) beacon is a technology that attracted interesting attention in microlocation services. Signal broadcasted by BLE beacons, can be used for determine position of BLE enabled device that capture those signal. The potential of this device has been utilized by various manufacturers, and has been produced in compact forms with varying specifications. The diversity of available beacon devices provides many choices for users in adjusting the capabilities needed in the field. However, because the performance of the beacon device also varies due to the different manufacturing processes, this can lead to varying accuracy performance in microlocation positioning. This research presents the positioning accuracy of various commercially available BLE beacon devices. Accuracy data is obtained from beacon devices for indoor positioning taken from various mobile devices with BLE support. Our result shows the average accuracy that is not too deviate by various kinds of bluetooth beacons being tested.
Keywords
Bluetooth Low Energy (BLE) beacon; indoor positioning; BLE protocol
Topic
Informatic and Information System
Corresponding Author
Roni Aminudin
Institutions
Magister Sistem Informasi, Universitas Komputer Indonesia, Jl. Dipatiukur No. 112-116, Bandung, Jawa Barat
Abstract
Abstract. This research aims to forecast the Poverty Line, to help a government obtain accurate and fast information. The method used in this research is Double Exponential Smoothing Holt-s Method. This method is a part of the data based time series analysis. The research applies the forecasting theory to produce a poverty line forecast for the coming year. Next, this research is analyzing data patterns and determine the best parameter values. Double Exponential Smoothing Holt-s method uses the parameters Alpha (α) and Gamma (γ). To determine the best parameter value is to use the trial and error method. The best parameter value produces the smallest value of MAPE (Mean Absolute Percentage Error). The data pattern shows the trend, meaning that the Double Exponential Smoothing Holt-s method is appropriate for use in this research. The parameter values generated from the trial and error methods are Alpha (α) of 0.7 and Gamma (γ) of 0.1, which produced the smallest measure of accuracy, in this research using MAPE. By observing the results of the forecasting that has been done, this forecasting model has a very good performance. Poverty Line value will keep increasing, in accordance with increasing consumption patterns and rising prices of basic necessities.
Keywords
Poverty Line, Forecasting, Double Exponential Smoothing Holt-s Method, Time Series, MAPE (Mean Absolute Percentage Error)
Topic
Informatic and Information System
Corresponding Author
Rita Komalasari
Institutions
Polytechnic LP3I Bandung
Jalan Pahlawan 59, Bandung 40123, Indonesia
sekretariat[at]plb.ac.id
Abstract
Poverty is one of the development challenges faced by almost all areas in Indonesia and became the main concern of national and Regional development, to poverty reduction programs and objectives can be implemented effectively then required the use of technology in an effort to improve services for the poor population in Padang City. Through the development of management information system of poverty in Padang city, integrated data can be obtained from the poor population. The Application needed, at least has 3 main functions of processing, namely: the filtering Function based variables with specific criteria either singly or combination. The output of this function is the overall number of aggregate or per group of deciles and area based distribution (districts and subdistricts) needed to stage the analysis of socio-economic conditions as well as the list of household names and addresses or/and individual to the targets of the program, The function to add the recipients programs and program data from either the central or regional data into households or/and individual. The output of this function is any household or/and individual who became the recipient of the program will have a program of historical data has been received and the function to update the data of household variables or/and individual. In the end the Bappeda Padang city can carry out the application that will optimize the management of the database of poverty in innovative and integrated and can be operated by the users particularly executives simply and easily. The application is web and mobile-based to be accessible via the internet so that it can support the concept whenever and wherever.
Keywords
Poverty; Information System; Database
Topic
Informatic and Information System
Corresponding Author
Waidah Ismail
Institutions
1Faculty of Science and Technology, University Sains Islam Malaysia, Malaysia
2Center for Interdisciplinary Research on Complex Systems, Northeastern University, Boston, MA, USA
3PERKESO Rehabilitation Centre, Malacca, Malaysia
3Center for Holistic Intelligence, Institut Sains Islam, Universiti Sains Islam Malaysia, Malaysia
Abstract
This paper highlighted prediction of difficulty in exergames in Rehabilitation Patients. The case study uses 19 rehabilitation patients with lower limb disability. The data set that used are from MIRA Application which the games based on Kinect-based Rehabilitation Gaming System (RGS). In the each of MIRA exergames consists of three difficulty modes which are easy, medium and hard. Currently, in exergames to move the difficulty level of games determined by the physiotherapy based on the improvement of the patents. But in this paper, it will suggest the difficulty level of games based on the history of the patients. The methodology that used is a K-Mean Clustering in finding the benchmarks of the individual patients. In producing the weight of the patients in determine difficulty level or exergames.
Keywords
Rehabilitation, Kinect-based rehabilitation game system, machine learning
Topic
Informatic and Information System
Corresponding Author
Rita Sari
Institutions
Institut Teknologi Sepuluh Nopember
Abstract
Rapid technological development can be used to meet the increasing demand for a project, especially in various general government organizations such as E-Government (electronic-based information technology services used by the government) to deal with various resource constraints and therefore have to make choices. In general, in terms of choosing between dozens and hundreds of alternatives for projects, organizational portfolios and priorities are complex multi-criteria decision making problems with solutions that require clear techniques, types of methods, and factor definitions for decision making and decision making prioritization. A literature review is conducted to identify the characteristics of public organizations proposed to begin research on the application of portfolio management prioritization, as well as the methodology and practices used and other relevant aspects of the topic. This study explores the use and portfolio management techniques of several previous studies that have been tested in project priority practices and methodologies in application services in a successful city government level environment. This will be further developed regarding the development of generic prioritization models using the AHP (Analytical Hierarchy Process) and ANP (Analytical Network Process) approaches. The results of this study are used as a comparison of previous prioritization models and contribute to enriching theories about techniques, methods, especially the priority of portfolio project management in the case of government.
Keywords
E-Government; Decision-making; Prioritization; AHP; ANP
Topic
Informatic and Information System
Corresponding Author
EKO BUDI SETIAWAN
Institutions
Universitas Komputer Indonesia
Abstract
The page displayed in a website on the internet is the output of the results of processing carried out by the web server. Initially, the web browser requests web pages for the web server, then the web server serves by providing web pages to display in the web browser. If there is no web server, the website cannot be displayed. Many web servers can be used on a server. But of course, we have to choose which web server to use. Web servers are generally run on a server computer so that they can serve many requests. However, there is also a web server that can be implemented on Android-based smartphone devices, with quality that is certainly different from that implemented on computer devices. This research aims to analyze the quality of several mobile web servers so that it can be known which mobile web server is recommended for use. This research uses several application tools to measure the quality value of several web servers. The results of the quality comparison assessment of each mobile web server will depend on the smartphone used in the implementation so that the quality value will be different if implemented on a different smartphone.
Keywords
Mobile, Web Server, Quality, Analysis
Topic
Informatic and Information System
Corresponding Author
Dina Maysarah
Institutions
a) Departemen Sastra Jepang, Universitas Komputer Indonesia, Indonesia
b) Departemen Sastra Jepang, Universitas Komputer Indonesia, Indonesia
Abstract
The Goals of this research is for knowing that language has an important role to attract the attention of customers in improving e-commerce. This research used descriptive analysis method. The instrument used is a study of documentation. The research subject is a customer who often using e-commerce either for services or goods. The result of this research showed that a customer choose e-commerce because it saves their time. They interested with a service or item on web online site because the display look nice and customers will be more attractive to buy when reading descriptions of goods or services using interesting and polite language. The result of the research showed that language has a very important role for attract customers attention to buy a product. The Admin is required to have good language skills in promoting and informing their products, as well as in answering and responding to questions or complaints from contumers.
Keywords
Entrepreneurship; e-Commerce; Technopreneurs; Language
Topic
Informatic and Information System
Corresponding Author
indah khoerul nisa
Institutions
c) Departemen Akutansi, Universitas Komputer Indonesia
indahhoerulnisa[at]mahasiswa.unikom.ac.id
b) Departemen Manajemen, Universitas Komputer Indonesia
Abstract
The purpose of this research is to determine the relationship between accounting information systems and individual performance through the application of accounting information systems. This research method uses quantitative methods, using data obtained from the performance of individuals in services that utilize information systems in carrying out tasks. The result of this research was to determine the technical capabilities of the users of accounting information systems related to individual performance, as well as the benefits provided by data processing programs on information and communication technology at service cooperative. So this result is to measure the ability and to know the effect of the information system technology sophistication in the ability of the user to use accounting information systems for individual performance. It can be concluded that more use of data processing systems, so that performance technology is increasingly fast.
Keywords
Accounting, Information System, Employment
Topic
Informatic and Information System
Corresponding Author
Razvi Astio Hermawan
Institutions
a) Postgraduate of Information System, Computer University of Indonesia
Jl.Dipatiukur No 112-114. Bandung, Indonesia
*razvi.75118021[at]mahasiswa.unikom.ac.id
b) Postgraduate of Information System, Computer University of Indonesia
Jl.Dipatiukur No 112-114. Bandung, Indonesia
Abstract
The purpose of designing Enterprise Architecture is to developing an existing information system by designing a school data reporting system from the regional coordinator for further processing in the Sub Division of Programs and Reporting at Dinas Pendidikan, Pemuda Dan Olahraga Karawang. The method used for designing Enterprise Architecture is the open group architecture framework Architecture Development Method (TOGAF ADM). The steps applied in this design is TOGAF ADM, among other Preparation, Architectural Vision, Business Architecture, Information System Architecture, Technology Architecture. This research produces a blueprint that will be used to support information business processes. The output of this stage will produce an enterprise architecture which can later be used by organizations to support business processes and achieve their strategic goals. the conclusion of this study is that using the TOGAF-ADM methodology as a tool used in designing this information system enterprise architecture, it can produce a design architectural models in general that are in accordance with the organizations vision and mission and can be applied in other organizations that have similarities in business processes. the impact of this research is a solution to the problem of data loss and damage during the reporting process in the form of manual.
Keywords
Enterprise Architecture (EA), framework TOGAF ADM
Topic
Informatic and Information System
Corresponding Author
Syahrul Mauluddin
Institutions
Universitas Komputer Indonesia, Bandung, Indonesia.
Abstract
This study intends to conduct reverse engineering at mark recapitulation application at the Information Systems Department, Universitas Komputer Indonesia (UNIKOM). This research is the first step of the reengineering process in the mark recapitulation application. Reengineering needed because the application of the mark recapitulation that is currently running does not meet user needs and there is no documentation of application development. This study used the big bang approach, the reverse engineering stage follows the stages of general software reengineering model by analyzing three things, analysis of application functions, analysis of user activities with applications and database analysis. The results of this research are documentation of application function requirements, documentation of user activities with application and database documentation
Keywords
Reverse Engineering, Big bang, Re-engineering
Topic
Informatic and Information System
Corresponding Author
Yasmi Afrizal
Institutions
a) Faculty of engineering and computer science, UNIKOM, Bandung, Indonesia
b) Faculty of Information and Communication Technology, UTeM, Melaka, Malaysia
Abstract
The JIT software risk management model is a model for managing all risks in a software project. There are 3 (three) risk elements that most often appear in software projects in the risk management model of JIT software, namely technology, scheduling and costs and 10 (ten) risk factors in the form of Organization, Estimation, Monitoring, Development Methodology, Tools, Risk Culture, Usability, Correctness, Reliability and Personnel. The process of evaluating the overall risk in the model involves questionnaires with 81 questions, where assessment is carried out in the SERIM metrics (Software Engineering Risk Index Model). Based on the analysis conducted by the risk management model, JIT software has several limitations. First, the number of risk factors specified in the model is static. The number of risk factors cannot be limited or static. Risks will always appear during software building activities and influence the decision-making process. Limiting the number of risks that arise results in limiting stakeholders in the risk identification process so as to influence the analysis produced. Second, the assessment process is carried out using 81 lists of questions given by stakeholders. The number of questions will affect the actual project situation. The incidence of risks and impacts of risk events cannot be predicted if the project situation is not recognized. The process of the risk assessment carried out inappropriately causes failure to prioritize risks to be controlled in an effort to reduce risk. This limitation suggests that the JIT software risk management model must be used with caution in efforts to improve the model
Keywords
The JIT software risk management model, risk, assessment process, SERIM metrics
Topic
Informatic and Information System
Corresponding Author
Ridwan Fadjar Septian
Institutions
(a) Master of Information System Faculty
Universitas Komputer Indonesia
(b) Master of Information System Faculty
Universitas Komputer Indonesia
Abstract
The purpose of this research is to assure the performance and quality of healthcare information system security from Dutch Company which is located in Rotterdam, Netherland. The research apply COBIT 5 to audit the existing information security management system (ISMS) based on ISO 27001 and NEN 7510-2 2017 toolkit to audit the information system security for healthcare-specific issue. The audit is applied in order to identify any risk that might come during the ISMS implementation. On the other hand the result will be used as an improvement for the successor version of ISMS which compatible to the ISO 27001 and NEN 7510-2. The research is composed by applying qualitative method that consist of observation to the activity of the company and review the existing ISMS-related documents. The observation utilize selected COBIT 5 process form and selected NEN 7510-2 toolkit based on scope of vision and mission of the company. After scoping the research, the audit process for NEN 7510-2 2017 is applied to the security management aspect. For the COBIT 5-based audit, the audit focus on three kind of process that consist of APO 13, DSS 05 and MEA 02. As a result of this audit, the company ISMS has an achievement from NEN 7510-2:2017 audit result that has a score for 92.86 % on security management section. For the COBIT 5 result, the audit yield a result that consist of two “Established Process” level on APO13 and MEA02 and “Predictable Process” level on DSS 05. The result indicate a good result and encourage the company to improve their ISMS for next periode
Keywords
Information Security, IT Governance, General Data Privacy Regulation (GDPR), ISO 27001, NEN 7510-2-2017, COBIT 5
Topic
Informatic and Information System
Corresponding Author
ARMAN SYAH PUTRA
Institutions
a) Computer Science Department, BINUS Graduate Program - Doctor of Computer Science, Bina Nusantara university
Jakarta, Indonesia 11480 *arman.putra[at]binus.ac.id
b) Computer Science Department, BINUS Graduate Program - Doctor of Computer Science, Bina Nusantara university
Jakarta, Indonesia 11480 *safrizal001[at]binus.ac.id
Abstract
Current traffic conditions, can not be predicted anymore, from natural conditions and accidents on the road, all conditions that occur every day on the highway, accidents increase every year, with conditions like this the government is directly involved in decision makers, many make regulations in dealing with traffic violations, but still many violations occur and accidents continue to occur on the road. This study uses data mining methods, with a very deep data search, will be able to find the source of the problem and can provide proposals that can be applied in the future, with various proposals expected to produce regulations that can make people aware of traffic regulations so that awareness will be traffic security for ones own safety. The end of the purpose of this study, will provide suggestions that violations on the road can be reduced, especially accidents, after searching for in-depth data will produce a framework with maximum results. The conclusion of this paper explains that the habits of motorists can be changed, with the human side being lifted into government regulations that will make regulations will be able to make people feel reluctant but not feared, and his proposal can make people aware of orderly traffic.
Keywords
Traffic Violations, Accidents, Data Mining
Topic
Informatic and Information System
Corresponding Author
Norshuhani Zamin
Institutions
[1] Universiti Sains Islam Malaysia
[2] Universiti Sains Islam Malaysia
[3] University Malaysia of Computer Science and Engineering
[4] Universiti Kebangsaan Malaysia
Abstract
— Social interaction is an essential component for development of both normal and special needs children. However, many special needs children suffer from a lack of social interaction because they are unable to interpret social cues as well as a failure in social gaze when communicating. One of the ways to cope with these problems is to improve their social cognitive skill by teaching basic emotions through facial expressions. This paper describes the development of a new and sustainable teaching and learning approach using robotics to promote social interaction among special needs children of aged 4-6 years old. The robotic tool can teach basic facial expressions such as happy, sad and angry to increase emotion recognition skill among special needs children. The growing demand for technological innovation to enable empowerment of developing communities requires new and creative educational initiatives. Malaysia has also address it concerns on sustainable education for all spectrum of communities. RoboTherapist is a new teaching and learning method in Malaysia-s special education which targeting the special needs children. The special needs children are children with Autism, children with Down Syndrome, children with ADHD and slow learners. The aim of this research is to make teaching and learning more attentive for special needs children and hence to improve their social interaction in daily-s life and gain confidence to communicate with the people around them.
Keywords
Robotics, Special Needs, Sustainable, Emotions
Topic
Informatic and Information System
Page 6 (data 151 to 180 of 231) | Displayed ini 30 data/page
Featured Events
Embed Logo
If your conference is listed in our system, please put our logo somewhere in your website. Simply copy-paste the HTML code below to your website (ask your web admin):
<a target="_blank" href="https://ifory.id"><img src="https://ifory.id/ifory.png" title="Ifory - Indonesia Conference Directory" width="150" height="" border="0"></a>Site Stats