2019 International Conference on ICT for Smart Society (ICISS)最新文献

筛选
英文 中文
Feasibility study of Information Technology Investment (a case study of ODOO ERP: Project Management Module Implementation in Indonesia Based Company) 信息技术投资的可行性研究(以ODOO ERP项目管理模块在印尼公司实施为例)
2019 International Conference on ICT for Smart Society (ICISS) Pub Date : 2019-11-01 DOI: 10.1109/ICISS48059.2019.8969810
Fredy Jingga, R. Kosala, S. Supangkat, B. Ranti
{"title":"Feasibility study of Information Technology Investment (a case study of ODOO ERP: Project Management Module Implementation in Indonesia Based Company)","authors":"Fredy Jingga, R. Kosala, S. Supangkat, B. Ranti","doi":"10.1109/ICISS48059.2019.8969810","DOIUrl":"https://doi.org/10.1109/ICISS48059.2019.8969810","url":null,"abstract":"IT Governance are one of the needs in managing Enterprise Level IT. This study shows part of the decision domain of IT Governance Help, which are IT Investment and Prioritization. The purpose of this study is to determine feasibility of implementation open source ERP system Odoo project management module that replaces current system based on operational, economic, and technical aspects. The method used are Fit / Gap Analysis and Cost Benefit model using economic impact worksheet. The analysis is done by comparing the requirement with features owned by current system and Odoo ERP system. This research resulted that Odoo ERP System is feasible in the 3 aspects, the operational feasibility Odoo reaching 72% Fit, the economic feasibility with ROI of 84%, and technical feasibility indicating the technical requirement can be fulfilled by leasing AWS server. The conclusion is the open source ERP system Odoo project management module is feasible to be applied in terms of 3 aspects that have been studied, those are operational, economic, and technical.","PeriodicalId":125643,"journal":{"name":"2019 International Conference on ICT for Smart Society (ICISS)","volume":"9 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114128416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Implementation of Smart Trip Planner 智能出行计划的设计与实现
2019 International Conference on ICT for Smart Society (ICISS) Pub Date : 2019-11-01 DOI: 10.1109/ICISS48059.2019.8969814
A. Osmond, S. Supangkat, F. Hidayat
{"title":"Design and Implementation of Smart Trip Planner","authors":"A. Osmond, S. Supangkat, F. Hidayat","doi":"10.1109/ICISS48059.2019.8969814","DOIUrl":"https://doi.org/10.1109/ICISS48059.2019.8969814","url":null,"abstract":"Utilization of information technology in the tourism has the potency to improve the quality of services for tourism and tourism industry players in increasing the amount of revenue for the region. The tourism trend has now shifted towards digital or called tourism 4.0. Tourism 4.0 is aimed at millennial tourists with multiple growth targets. This 4.0 tourism trend is marked by changes in tourist behavior that tends to be independent and individual. Through digital technology, consumer behavior begins to change in an increasingly mobile, personal and interactive direction. In this paper, we propose a smart trip planner to support independent traveler to facilitate their itinerary automatically.","PeriodicalId":125643,"journal":{"name":"2019 International Conference on ICT for Smart Society (ICISS)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114187125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Relations Between Influencers in Social Media and The Election Winning Party 2019 社交媒体影响者与2019年大选获胜党之间的关系
2019 International Conference on ICT for Smart Society (ICISS) Pub Date : 2019-11-01 DOI: 10.1109/ICISS48059.2019.8969801
Olga Monica, Firda Wahyu Wahida, Hanif Fakhruroja
{"title":"The Relations Between Influencers in Social Media and The Election Winning Party 2019","authors":"Olga Monica, Firda Wahyu Wahida, Hanif Fakhruroja","doi":"10.1109/ICISS48059.2019.8969801","DOIUrl":"https://doi.org/10.1109/ICISS48059.2019.8969801","url":null,"abstract":"In this era, most people use social media to communicate and keep up with any kind of news. Politic is one of the sectors that use social media to spread the news. By utilizing information from public opinion and other politicians, will add another important information in order to increase the possibility of winning the elections. This paper uses social network analysis to measure public conversational activity through social media network. We select \"Pemilu Presiden 2019\" as the case study since this is the biggest politic event in Indonesia and this event also has a massive impact not only for Indonesia but also other countries in the world. In addition to that, this paper uses conversational activity in social media platform which is Twitter and collected 4.564 tweets between March 29 until April 8, 2018. We analyze two political parties such as, \"Gerindra\" and \"PDI Perjuangan\" as the parties from the presidential candidates. We also found a number of influencers in the network that indicate \"PDI Perjuangan\" has more a good sentiment than \"Gerindra\". We collect and summarize all the influencer’s conversations related to each party and found a high correlation between the influencers, parties, and presidential candidates. It shows the bigger influencers are able to provide more risks for the presidential candidates image, also the parties.","PeriodicalId":125643,"journal":{"name":"2019 International Conference on ICT for Smart Society (ICISS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121256212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Design of e-Government Security Governance System Using COBIT 2019 : (Trial Implementation in Badan XYZ) 基于COBIT 2019的电子政务安全治理体系设计(在巴丹市试点)
2019 International Conference on ICT for Smart Society (ICISS) Pub Date : 2019-11-01 DOI: 10.1109/ICISS48059.2019.8969808
Vira Septiyana Kasma, S. Sutikno, K. Surendro
{"title":"Design of e-Government Security Governance System Using COBIT 2019 : (Trial Implementation in Badan XYZ)","authors":"Vira Septiyana Kasma, S. Sutikno, K. Surendro","doi":"10.1109/ICISS48059.2019.8969808","DOIUrl":"https://doi.org/10.1109/ICISS48059.2019.8969808","url":null,"abstract":"e-Government is needed to actualize clean, effective, transparent and accountable governance as well as quality and reliable public services. The implementation of e-Government is currently constrained because there is no derivative regulation, one of which is the regulation for e-Government Security. To answer this need, this study aims to provide input on performance management and governance systems for e-Government Security with the hope that the control design for e-Government Security can be met. The results of this study are the e-Government Security Governance System taken from 28 core models of COBIT 2019. The 28 core models were taken using CSF and risk. Furthermore, performance management for this governance system consists of capability and maturity levels which is an extension of the evaluation process in the e-Government Evaluation Guidelines issued by the Ministry of PAN & RB. The evaluation of the design carried out by determining the current condition of capability and maturity level in Badan XYZ. The result of the evaluation shows that the design possible to be implemented and needed.","PeriodicalId":125643,"journal":{"name":"2019 International Conference on ICT for Smart Society (ICISS)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125221821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Design of Distributed Academic-record System Based on Blockchain 基于区块链的分布式学籍系统设计
2019 International Conference on ICT for Smart Society (ICISS) Pub Date : 2019-11-01 DOI: 10.1109/ICISS48059.2019.8969849
A. Rachmat, Albarda
{"title":"Design of Distributed Academic-record System Based on Blockchain","authors":"A. Rachmat, Albarda","doi":"10.1109/ICISS48059.2019.8969849","DOIUrl":"https://doi.org/10.1109/ICISS48059.2019.8969849","url":null,"abstract":"As a distributed system, blockchain is currently an attractive choice for the back-end of public services because of its benefits. Decentralized and carries a consensus mechanism making data stored into irreversible ledger is an advantage of the blockchain. This study discusses the architecture design of academic recording systems in Indonesia, which is currently centralized to be decentralized in permitted networks. Participants involved in the network system, namely institutions as academic staff, teachers, students, and external parties, which each participant has the authority and arrangement with smart-contracts. Evaluation results show less time on the proposed system to complete business processes than the currently system. The task of validation activities can be eliminated and perform smart-contract functions inside to become a \"trust-less operation\", in which academic data are ensured to be protected from abused or damage due to human error. The data that has been included in the ledger consists of personal performance from the history of academic activities required by students that can be traced by interested parties such as organizations wishing to recruit employees, as well as educational institutions that require the achievement of specific information needed by prospective applicants.","PeriodicalId":125643,"journal":{"name":"2019 International Conference on ICT for Smart Society (ICISS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134000441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
UAV Navigation System with Obstacle Detection using Deep Reinforcement Learning with Noise Injection 基于噪声注入深度强化学习的无人机障碍物检测导航系统
2019 International Conference on ICT for Smart Society (ICISS) Pub Date : 2019-11-01 DOI: 10.1109/ICISS48059.2019.8969798
Alonica R. Villanueva, Arnel C. Fajardo
{"title":"UAV Navigation System with Obstacle Detection using Deep Reinforcement Learning with Noise Injection","authors":"Alonica R. Villanueva, Arnel C. Fajardo","doi":"10.1109/ICISS48059.2019.8969798","DOIUrl":"https://doi.org/10.1109/ICISS48059.2019.8969798","url":null,"abstract":"This paper is an application of deep reinforcement learning and noise injection to the navigation of the Unmanned Aerial Vehicle. Recent studies take advantage of the enhancement of the exploratory of its navigation to the environment like civilian missions such as disaster monitoring and, search and rescue. Some research studies include noise injection in the deep learning algorithm to improve its performance. Therefore, this study applied the ad compared two ways to inject Gaussian noise namely Gaussian Noise Layer and Noisy Network in Double Dueling Deep Q Network. The tests conducted with the Gaussian Noise Layer with a standard deviation of 1.0 gives stable exploration performance in terms of q learning, loss and flight navigation. The noticeable results give the significance to further research in Gaussian Noise injection in optimizing the deep reinforcement algorithm of unmanned aerial vehicles where can be further applied to future technology of navigation.","PeriodicalId":125643,"journal":{"name":"2019 International Conference on ICT for Smart Society (ICISS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131198318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Crisis Communication on Twitter: A Social Network Analysis of Christchurch Terrorist Attack in 2019 推特上的危机沟通:2019年克赖斯特彻奇恐怖袭击的社会网络分析
2019 International Conference on ICT for Smart Society (ICISS) Pub Date : 2019-11-01 DOI: 10.1109/ICISS48059.2019.8969839
Hanif Fakhrurroja, Muhammad Nashir Atmaja, Joe Nathan C.G Panjaitan, A. Alamsyah, A. Munandar
{"title":"Crisis Communication on Twitter: A Social Network Analysis of Christchurch Terrorist Attack in 2019","authors":"Hanif Fakhrurroja, Muhammad Nashir Atmaja, Joe Nathan C.G Panjaitan, A. Alamsyah, A. Munandar","doi":"10.1109/ICISS48059.2019.8969839","DOIUrl":"https://doi.org/10.1109/ICISS48059.2019.8969839","url":null,"abstract":"Christchurch terrorist attack is a recent tragedy that happened in New Zealand on 15 March 2019. There are total 50 deaths caused by the attack in Christchurch. In two days, at least, 722,295 tweets are created by users of Twitter, they tweet about their thoughts and prayers about the attack. That means that social media is very important to spread information throughout the world while in a crisis condition, which also able to provide and facilitate how the information flow. To understand the issue, this paper examines the use of Twitter during post-tragedy, which is 2 days after the tragedy happened in New Zealand. The network structures within the conversation about Christchurch attack must be concerned, because many communities and actors play a part in the flow of information about the attack on Twitter. Our findings show an individual might have more information-spreading power than authority or government institutions. The influence of non-authority actors in Twitter network highlights an apparent reality that an individual might be spread information wider than authority without knowing the righteousness.","PeriodicalId":125643,"journal":{"name":"2019 International Conference on ICT for Smart Society (ICISS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130153841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Exploring the Possibility of USB based Fork Bomb Attack on Windows Environment 探讨基于USB的分叉炸弹攻击Windows环境的可能性
2019 International Conference on ICT for Smart Society (ICISS) Pub Date : 2019-11-01 DOI: 10.1109/ICISS48059.2019.8969789
Rezky Aulia Efendy, A. Almaarif, Avon Budiono, M. Saputra, Warih Puspitasari, E. Sutoyo
{"title":"Exploring the Possibility of USB based Fork Bomb Attack on Windows Environment","authors":"Rezky Aulia Efendy, A. Almaarif, Avon Budiono, M. Saputra, Warih Puspitasari, E. Sutoyo","doi":"10.1109/ICISS48059.2019.8969789","DOIUrl":"https://doi.org/10.1109/ICISS48059.2019.8969789","url":null,"abstract":"The need for data exchange and storage is currently increasing. The increased need for data exchange and storage also increases the need for data exchange devices and media. One of the most commonly used media exchanges and data storage is the USB Flash Drive. USB Flash Drive are widely used because they are easy to carry and have a fairly large storage. Unfortunately, this increased need is not directly proportional to an increase in awareness of device security, both for USB flash drive devices and computer devices that are used as primary storage devices. This research shows the threats that can arise from the use of USB Flash Drive devices. The threat that is used in this research is the fork bomb implemented on an Arduino Pro Micro device that is converted to a USB Flash drive. The purpose of the Fork Bomb is to damage the memory performance of the affected devices. As a result, memory performance to execute the process will slow down. The use of a USB Flash drive as an attack vector with the fork bomb method causes users to not be able to access the operating system that was attacked. The results obtained indicate that the USB Flash Drive can be used as a medium of Fork Bomb attack on the Windows operating system.","PeriodicalId":125643,"journal":{"name":"2019 International Conference on ICT for Smart Society (ICISS)","volume":"5 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131349050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Smart Parking System With Automatic Cashier Machine Utilize the IoT Technology 智能停车自动收银系统利用物联网技术
2019 International Conference on ICT for Smart Society (ICISS) Pub Date : 2019-11-01 DOI: 10.1109/ICISS48059.2019.8969793
Agustina Ampuni, Sopater Fonataba, Adi Fitrianto, Gunawan Wang
{"title":"Smart Parking System With Automatic Cashier Machine Utilize the IoT Technology","authors":"Agustina Ampuni, Sopater Fonataba, Adi Fitrianto, Gunawan Wang","doi":"10.1109/ICISS48059.2019.8969793","DOIUrl":"https://doi.org/10.1109/ICISS48059.2019.8969793","url":null,"abstract":"The difficulty of finding car parking spot has become one of main consideration to create this paper and focusing on develop our proposed smart parking system. Other than that, the utilization of internet of things (IoT) technology has become one of great technology that match for complex system with a minimal use of hardware. With the implementation of IoT based on cloud computing, several smart devices, and also smart automatic machine, the concept of smart parking system are expected to be able to provide services for car parking spot searching and car parking spot allocation through the mobile application.","PeriodicalId":125643,"journal":{"name":"2019 International Conference on ICT for Smart Society (ICISS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121412704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Developing Forecasting System with Zachman Approach 用Zachman方法开发预测系统
2019 International Conference on ICT for Smart Society (ICISS) Pub Date : 2019-11-01 DOI: 10.1109/ICISS48059.2019.8969794
M. Rakhmanto, S. Royani, Riesda Triyanti, Gunawan Wang
{"title":"Developing Forecasting System with Zachman Approach","authors":"M. Rakhmanto, S. Royani, Riesda Triyanti, Gunawan Wang","doi":"10.1109/ICISS48059.2019.8969794","DOIUrl":"https://doi.org/10.1109/ICISS48059.2019.8969794","url":null,"abstract":"Big data nowadays can provide unique insights into, market trends, demand and supply forecasting, stock retribution, sales scoring profile, stock redistribution with purpose benefit into lowering cost and enabling more efficient business decision. The article addressed the use of Zachman Framework to address challenges, and for successful implementation of Big Data Optimization. The article takes the case study in Astra International subsidiary such as Auto2000, an automotive dealer company that faced some challenges in inflexibility and complexity with handling stock and demand forecasting. The article applies the advantages of big data and combined with Zachman approach to address the transformation from business perspective into IT operation. The article addresses the role of brand principal to cut inefficient cost. The objective of this article to examine the use of Zachman approach with assistance of big data, and its analytic tools in the area of machine learning to investigate the user requirements how to predict the efficient the 3-month stock demand and allow stock planning optimisation at Country and Branch level through business flow understanding.","PeriodicalId":125643,"journal":{"name":"2019 International Conference on ICT for Smart Society (ICISS)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115658772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信
小红书