{"title":"Feasibility study of Information Technology Investment (a case study of ODOO ERP: Project Management Module Implementation in Indonesia Based Company)","authors":"Fredy Jingga, R. Kosala, S. Supangkat, B. Ranti","doi":"10.1109/ICISS48059.2019.8969810","DOIUrl":"https://doi.org/10.1109/ICISS48059.2019.8969810","url":null,"abstract":"IT Governance are one of the needs in managing Enterprise Level IT. This study shows part of the decision domain of IT Governance Help, which are IT Investment and Prioritization. The purpose of this study is to determine feasibility of implementation open source ERP system Odoo project management module that replaces current system based on operational, economic, and technical aspects. The method used are Fit / Gap Analysis and Cost Benefit model using economic impact worksheet. The analysis is done by comparing the requirement with features owned by current system and Odoo ERP system. This research resulted that Odoo ERP System is feasible in the 3 aspects, the operational feasibility Odoo reaching 72% Fit, the economic feasibility with ROI of 84%, and technical feasibility indicating the technical requirement can be fulfilled by leasing AWS server. The conclusion is the open source ERP system Odoo project management module is feasible to be applied in terms of 3 aspects that have been studied, those are operational, economic, and technical.","PeriodicalId":125643,"journal":{"name":"2019 International Conference on ICT for Smart Society (ICISS)","volume":"9 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114128416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Implementation of Smart Trip Planner","authors":"A. Osmond, S. Supangkat, F. Hidayat","doi":"10.1109/ICISS48059.2019.8969814","DOIUrl":"https://doi.org/10.1109/ICISS48059.2019.8969814","url":null,"abstract":"Utilization of information technology in the tourism has the potency to improve the quality of services for tourism and tourism industry players in increasing the amount of revenue for the region. The tourism trend has now shifted towards digital or called tourism 4.0. Tourism 4.0 is aimed at millennial tourists with multiple growth targets. This 4.0 tourism trend is marked by changes in tourist behavior that tends to be independent and individual. Through digital technology, consumer behavior begins to change in an increasingly mobile, personal and interactive direction. In this paper, we propose a smart trip planner to support independent traveler to facilitate their itinerary automatically.","PeriodicalId":125643,"journal":{"name":"2019 International Conference on ICT for Smart Society (ICISS)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114187125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Relations Between Influencers in Social Media and The Election Winning Party 2019","authors":"Olga Monica, Firda Wahyu Wahida, Hanif Fakhruroja","doi":"10.1109/ICISS48059.2019.8969801","DOIUrl":"https://doi.org/10.1109/ICISS48059.2019.8969801","url":null,"abstract":"In this era, most people use social media to communicate and keep up with any kind of news. Politic is one of the sectors that use social media to spread the news. By utilizing information from public opinion and other politicians, will add another important information in order to increase the possibility of winning the elections. This paper uses social network analysis to measure public conversational activity through social media network. We select \"Pemilu Presiden 2019\" as the case study since this is the biggest politic event in Indonesia and this event also has a massive impact not only for Indonesia but also other countries in the world. In addition to that, this paper uses conversational activity in social media platform which is Twitter and collected 4.564 tweets between March 29 until April 8, 2018. We analyze two political parties such as, \"Gerindra\" and \"PDI Perjuangan\" as the parties from the presidential candidates. We also found a number of influencers in the network that indicate \"PDI Perjuangan\" has more a good sentiment than \"Gerindra\". We collect and summarize all the influencer’s conversations related to each party and found a high correlation between the influencers, parties, and presidential candidates. It shows the bigger influencers are able to provide more risks for the presidential candidates image, also the parties.","PeriodicalId":125643,"journal":{"name":"2019 International Conference on ICT for Smart Society (ICISS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121256212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of e-Government Security Governance System Using COBIT 2019 : (Trial Implementation in Badan XYZ)","authors":"Vira Septiyana Kasma, S. Sutikno, K. Surendro","doi":"10.1109/ICISS48059.2019.8969808","DOIUrl":"https://doi.org/10.1109/ICISS48059.2019.8969808","url":null,"abstract":"e-Government is needed to actualize clean, effective, transparent and accountable governance as well as quality and reliable public services. The implementation of e-Government is currently constrained because there is no derivative regulation, one of which is the regulation for e-Government Security. To answer this need, this study aims to provide input on performance management and governance systems for e-Government Security with the hope that the control design for e-Government Security can be met. The results of this study are the e-Government Security Governance System taken from 28 core models of COBIT 2019. The 28 core models were taken using CSF and risk. Furthermore, performance management for this governance system consists of capability and maturity levels which is an extension of the evaluation process in the e-Government Evaluation Guidelines issued by the Ministry of PAN & RB. The evaluation of the design carried out by determining the current condition of capability and maturity level in Badan XYZ. The result of the evaluation shows that the design possible to be implemented and needed.","PeriodicalId":125643,"journal":{"name":"2019 International Conference on ICT for Smart Society (ICISS)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125221821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of Distributed Academic-record System Based on Blockchain","authors":"A. Rachmat, Albarda","doi":"10.1109/ICISS48059.2019.8969849","DOIUrl":"https://doi.org/10.1109/ICISS48059.2019.8969849","url":null,"abstract":"As a distributed system, blockchain is currently an attractive choice for the back-end of public services because of its benefits. Decentralized and carries a consensus mechanism making data stored into irreversible ledger is an advantage of the blockchain. This study discusses the architecture design of academic recording systems in Indonesia, which is currently centralized to be decentralized in permitted networks. Participants involved in the network system, namely institutions as academic staff, teachers, students, and external parties, which each participant has the authority and arrangement with smart-contracts. Evaluation results show less time on the proposed system to complete business processes than the currently system. The task of validation activities can be eliminated and perform smart-contract functions inside to become a \"trust-less operation\", in which academic data are ensured to be protected from abused or damage due to human error. The data that has been included in the ledger consists of personal performance from the history of academic activities required by students that can be traced by interested parties such as organizations wishing to recruit employees, as well as educational institutions that require the achievement of specific information needed by prospective applicants.","PeriodicalId":125643,"journal":{"name":"2019 International Conference on ICT for Smart Society (ICISS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134000441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"UAV Navigation System with Obstacle Detection using Deep Reinforcement Learning with Noise Injection","authors":"Alonica R. Villanueva, Arnel C. Fajardo","doi":"10.1109/ICISS48059.2019.8969798","DOIUrl":"https://doi.org/10.1109/ICISS48059.2019.8969798","url":null,"abstract":"This paper is an application of deep reinforcement learning and noise injection to the navigation of the Unmanned Aerial Vehicle. Recent studies take advantage of the enhancement of the exploratory of its navigation to the environment like civilian missions such as disaster monitoring and, search and rescue. Some research studies include noise injection in the deep learning algorithm to improve its performance. Therefore, this study applied the ad compared two ways to inject Gaussian noise namely Gaussian Noise Layer and Noisy Network in Double Dueling Deep Q Network. The tests conducted with the Gaussian Noise Layer with a standard deviation of 1.0 gives stable exploration performance in terms of q learning, loss and flight navigation. The noticeable results give the significance to further research in Gaussian Noise injection in optimizing the deep reinforcement algorithm of unmanned aerial vehicles where can be further applied to future technology of navigation.","PeriodicalId":125643,"journal":{"name":"2019 International Conference on ICT for Smart Society (ICISS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131198318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hanif Fakhrurroja, Muhammad Nashir Atmaja, Joe Nathan C.G Panjaitan, A. Alamsyah, A. Munandar
{"title":"Crisis Communication on Twitter: A Social Network Analysis of Christchurch Terrorist Attack in 2019","authors":"Hanif Fakhrurroja, Muhammad Nashir Atmaja, Joe Nathan C.G Panjaitan, A. Alamsyah, A. Munandar","doi":"10.1109/ICISS48059.2019.8969839","DOIUrl":"https://doi.org/10.1109/ICISS48059.2019.8969839","url":null,"abstract":"Christchurch terrorist attack is a recent tragedy that happened in New Zealand on 15 March 2019. There are total 50 deaths caused by the attack in Christchurch. In two days, at least, 722,295 tweets are created by users of Twitter, they tweet about their thoughts and prayers about the attack. That means that social media is very important to spread information throughout the world while in a crisis condition, which also able to provide and facilitate how the information flow. To understand the issue, this paper examines the use of Twitter during post-tragedy, which is 2 days after the tragedy happened in New Zealand. The network structures within the conversation about Christchurch attack must be concerned, because many communities and actors play a part in the flow of information about the attack on Twitter. Our findings show an individual might have more information-spreading power than authority or government institutions. The influence of non-authority actors in Twitter network highlights an apparent reality that an individual might be spread information wider than authority without knowing the righteousness.","PeriodicalId":125643,"journal":{"name":"2019 International Conference on ICT for Smart Society (ICISS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130153841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rezky Aulia Efendy, A. Almaarif, Avon Budiono, M. Saputra, Warih Puspitasari, E. Sutoyo
{"title":"Exploring the Possibility of USB based Fork Bomb Attack on Windows Environment","authors":"Rezky Aulia Efendy, A. Almaarif, Avon Budiono, M. Saputra, Warih Puspitasari, E. Sutoyo","doi":"10.1109/ICISS48059.2019.8969789","DOIUrl":"https://doi.org/10.1109/ICISS48059.2019.8969789","url":null,"abstract":"The need for data exchange and storage is currently increasing. The increased need for data exchange and storage also increases the need for data exchange devices and media. One of the most commonly used media exchanges and data storage is the USB Flash Drive. USB Flash Drive are widely used because they are easy to carry and have a fairly large storage. Unfortunately, this increased need is not directly proportional to an increase in awareness of device security, both for USB flash drive devices and computer devices that are used as primary storage devices. This research shows the threats that can arise from the use of USB Flash Drive devices. The threat that is used in this research is the fork bomb implemented on an Arduino Pro Micro device that is converted to a USB Flash drive. The purpose of the Fork Bomb is to damage the memory performance of the affected devices. As a result, memory performance to execute the process will slow down. The use of a USB Flash drive as an attack vector with the fork bomb method causes users to not be able to access the operating system that was attacked. The results obtained indicate that the USB Flash Drive can be used as a medium of Fork Bomb attack on the Windows operating system.","PeriodicalId":125643,"journal":{"name":"2019 International Conference on ICT for Smart Society (ICISS)","volume":"5 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131349050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Agustina Ampuni, Sopater Fonataba, Adi Fitrianto, Gunawan Wang
{"title":"Smart Parking System With Automatic Cashier Machine Utilize the IoT Technology","authors":"Agustina Ampuni, Sopater Fonataba, Adi Fitrianto, Gunawan Wang","doi":"10.1109/ICISS48059.2019.8969793","DOIUrl":"https://doi.org/10.1109/ICISS48059.2019.8969793","url":null,"abstract":"The difficulty of finding car parking spot has become one of main consideration to create this paper and focusing on develop our proposed smart parking system. Other than that, the utilization of internet of things (IoT) technology has become one of great technology that match for complex system with a minimal use of hardware. With the implementation of IoT based on cloud computing, several smart devices, and also smart automatic machine, the concept of smart parking system are expected to be able to provide services for car parking spot searching and car parking spot allocation through the mobile application.","PeriodicalId":125643,"journal":{"name":"2019 International Conference on ICT for Smart Society (ICISS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121412704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Rakhmanto, S. Royani, Riesda Triyanti, Gunawan Wang
{"title":"Developing Forecasting System with Zachman Approach","authors":"M. Rakhmanto, S. Royani, Riesda Triyanti, Gunawan Wang","doi":"10.1109/ICISS48059.2019.8969794","DOIUrl":"https://doi.org/10.1109/ICISS48059.2019.8969794","url":null,"abstract":"Big data nowadays can provide unique insights into, market trends, demand and supply forecasting, stock retribution, sales scoring profile, stock redistribution with purpose benefit into lowering cost and enabling more efficient business decision. The article addressed the use of Zachman Framework to address challenges, and for successful implementation of Big Data Optimization. The article takes the case study in Astra International subsidiary such as Auto2000, an automotive dealer company that faced some challenges in inflexibility and complexity with handling stock and demand forecasting. The article applies the advantages of big data and combined with Zachman approach to address the transformation from business perspective into IT operation. The article addresses the role of brand principal to cut inefficient cost. The objective of this article to examine the use of Zachman approach with assistance of big data, and its analytic tools in the area of machine learning to investigate the user requirements how to predict the efficient the 3-month stock demand and allow stock planning optimisation at Country and Branch level through business flow understanding.","PeriodicalId":125643,"journal":{"name":"2019 International Conference on ICT for Smart Society (ICISS)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115658772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}