{"title":"Privacy in Social Media","authors":"Jeffry Hirawan, Itmam Al Rasyid","doi":"10.33555/EJAICT.V7I1.76","DOIUrl":"https://doi.org/10.33555/EJAICT.V7I1.76","url":null,"abstract":"Nowadays social networks become very common. People use social media to keep people in touch, businesses, organizations, and many more. The information you share with your friends in the social media allows them easily to keep in touch with you. However beside friends, colleges, relatives, there are many people that are interested in the private information on social media. Identity thieves, scam artists, debt collectors, stalkers, companies use social networks to gather information. Companies that use social networks for getting information about people are intended to personalize their services for the users and to sell to advertisement. In this paper we will discuss the advantage and disadvantage of using social media and what kind of information is safe to post and how to protect it.","PeriodicalId":144274,"journal":{"name":"Journal of Applied Information, Communication and Technology","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133605795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development of an on-Premise Indonesian Handwriting Recognition Backend System Using Open Source Deep Learning Solution For Mobile User","authors":"Gianino Masasi, James Purnama, M. Galinium","doi":"10.33555/JAICT.V7I2.109","DOIUrl":"https://doi.org/10.33555/JAICT.V7I2.109","url":null,"abstract":"Existing handwriting recognition solution on mobile app provides off premise service which means the handwriting is processed in overseas servers. Data sent to abroad servers are not under our control and could be possibly mishandled or misused. As recognizing handwriting is a complex problem, deep learning is needed. This research has the objective of developing an on premise Indonesian handwriting recognition using open source deep learning solution. Comparison of various deep learning solution to be used in the development are done. The deep learning solution will be used to build architectures. Various database format are also compared to decide which format is suitable to gather Indonesian handwriting database. The gathered Indonesian handwriting database and built architectures are used for experiments which consists of number of Convolutional Neural Network (CNN) layers, rotation and noise data augmentation, and Gated Recurrent Unit (GRU) vs Long Short Term Memory (LSTM). Experiment results shows that rotation data augmentation is the parameter to be change to improve word accuracy and Character Error Rate (CER). The improvement is 64.8% and 23.2% to 69.6% and 20.6% respectively.","PeriodicalId":144274,"journal":{"name":"Journal of Applied Information, Communication and Technology","volume":"37 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131196339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Measuring Client Satisfaction Level From Migration Manual Reconciliations system to Automatic Reconciliations system In Bank Danamon Indonesia Using Kano Model","authors":"Rizaldi Rizaldi","doi":"10.33555/ejaict.v6i2.65","DOIUrl":"https://doi.org/10.33555/ejaict.v6i2.65","url":null,"abstract":"In banking industry, reconciliation software can help you rise to a range of regulatory, business and operational challenges. In this new, challenging operational environment, an automated reconciliation strategy has proved to be a mandatory system to help reduce costs and risk, to achieve compliance and improve transparency, efficiency and scalability. But migrating system is a big project, And like other big projects, sometimes the result are not satisfactory, to measure client satisfaction on this project, we use Kano Model to measure it, a theory of customer satisfaction and product development developed by Professor Noriako Kano in 1980.","PeriodicalId":144274,"journal":{"name":"Journal of Applied Information, Communication and Technology","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126929079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Case Study in PT. XYZ: Aligning Capacity of Information Technology Human Resources in the Headquarter and Subsidiary Office using IT Governance Framework","authors":"Andy Asmoro","doi":"10.33555/ejaict.v6i2.64","DOIUrl":"https://doi.org/10.33555/ejaict.v6i2.64","url":null,"abstract":"In this paper will be explained about a Multi Nationed Company which have many branch office around the world and the company has developed and implemented a new approach to strategic planning that better aligns all activities and competency with the corporate bussines goals. Information Technology employee has to improve their knowledge and competency regarding to technology innovation (C. Casado-Lumbreras, 2013). Hopefully this paper could be the initial framework to realize Capacity Building for Information Technology Resources in companies or any other agencies.","PeriodicalId":144274,"journal":{"name":"Journal of Applied Information, Communication and Technology","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114372874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementing Website Design Based on Search Engine Optimization (SEO) Checklist to Increase Web Popularity","authors":"Agus Budi Harto","doi":"10.33555/ejaict.v6i2.67","DOIUrl":"https://doi.org/10.33555/ejaict.v6i2.67","url":null,"abstract":"One way to increase website popularity is by increasing the user's visit to the website. Search Engine Optimization is a popular concept to increase website popularity or page ranking of a website in search engine, but not many designer know on how to implement the concept so their website popularity could not be controlled. This research aims to create a template based on checklist created from SEO concept. Evaluation is done by comparing website page ranking that created based on this checklist and not. The result of this research is the website popularity ranking which implement SEO design is higher.","PeriodicalId":144274,"journal":{"name":"Journal of Applied Information, Communication and Technology","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114490983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Case Study Risk Based Approach for Life Cycle Computerized System in Pharmaceutical Industry","authors":"Yodi Fitrio","doi":"10.33555/ejaict.v6i2.66","DOIUrl":"https://doi.org/10.33555/ejaict.v6i2.66","url":null,"abstract":"Pharmaceutical industry is one of the industries that heavily regulated in most of country in the world. Regulation made by the regulatory is intended to ensure the system or process in the industry produce the product without impacting the safety, efficacy, integrity and quality of the product. \u0000Computerized system are commonly used by pharmaceutical manufacturing activities from planning, warehousing, production, engineering and testing in laboratories. Computerized system that used not only as information system or processing the data the system also used by the company to control their proses such automation system in production area. \u0000Recent report from regulatory showing there is increasing reports from regulatory regarding company failure in maintain their computerized system to comply with cGMP (current good manufacturing practice) from regulator.","PeriodicalId":144274,"journal":{"name":"Journal of Applied Information, Communication and Technology","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114604894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Building Data Mining Decision Tree Model for Predicting Employee Performance","authors":"Ira Mellisa","doi":"10.33555/ejaict.v6i2.79","DOIUrl":"https://doi.org/10.33555/ejaict.v6i2.79","url":null,"abstract":"Human resource is one of the functions of a company that is considered as an asset. Therefo re, the theory of performance qualificat ion was adopted by the company in order to get an overview of employee performance. Furthermore, the company needs an effective method to predict the performance not only for the employees but also for the new applic ants. The goals of this research are to get a decision tree model of the employee performance. By learning employee data, the performance of the new applicants could be predicted. The study would provide the characteristic of new applicants who will give better performance than other applicants . The data from a company in Indonesia will have been used for this research. The data mining technique will be applied to the data of operators (such as admins, clerks, cashiers, machine operators, and security offi cers). The data mining technique was use d is decision tree. The decision tree technique was commonly used for a supervised learning data. The decision tree technique also has advantages compared others, because of its ability to produce information that is easy to understand. The result of this research shown the high dependency of employee performance with employment type (work contract). It also means that employees are encouraged to provide good performance to the company if those employees have become p ermanent employees. This research also showed that there is no relationship between employee performances with gender or position grade.","PeriodicalId":144274,"journal":{"name":"Journal of Applied Information, Communication and Technology","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134085319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Augmented Reality to Interior Design Company Performance","authors":"Septiyanti Septiyanti","doi":"10.33555/ejaict.v6i1.59","DOIUrl":"https://doi.org/10.33555/ejaict.v6i1.59","url":null,"abstract":"Interior design is an industrial company that works of flow from visual drawing into implementation construction of interior design drawing on site as a framework to fulfilled demand of client needed. Each day interior design company market becomes more high competitiveness as a national or even as a global market, and demand to fulfill with adequately performance to reach global market. In this report depart from previous comprehension; augmented reality can be a purpose effort interior design application for environment experience from computing interaction.","PeriodicalId":144274,"journal":{"name":"Journal of Applied Information, Communication and Technology","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121128106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Democracy & Act 11 of 2008 (Chapter VII, Article 27, Paragraph 3)","authors":"Yudha Fernando Silitonga","doi":"10.33555/ejaict.v6i1.60","DOIUrl":"https://doi.org/10.33555/ejaict.v6i1.60","url":null,"abstract":"In this study, researchers are interested to see the potential threat of Act 11 of 2008 (Chapter VII, Article 27, Paragraph 3) to the values of democracy. Act No.11 of 2008 turned out to save a potential threat to the values of democracy in Indonesia. It is related to Chapter VII, Article 27, Paragraph 3 regulating defamation / or defamation. Through the article, the government can impose penalties for civil society if insulting / or defamation in cyberspace. Researchers using the method of literature study in collecting research material. In the analysis, the researchers used a model of interactive method of Miles and Huberman analysis.","PeriodicalId":144274,"journal":{"name":"Journal of Applied Information, Communication and Technology","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121959036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Business Feasibility Research in Opening Learning Centre at Balaraja based on SWOT and AHP Method","authors":"Y. Yunita","doi":"10.33555/ejaict.v6i1.61","DOIUrl":"https://doi.org/10.33555/ejaict.v6i1.61","url":null,"abstract":"Business feasibility research is needed before business development team decided to start the business. SWOT analysis is an important part of it, since it described Strength – Weaknesses – Opportunity – Threats. However the result have no score, so its makes harder to consider each part in making decision. AHP (Analytic Hierarchy Process) is one of the method in decision tool to scoring, AHP carry the quantitative analysis of the problem. The combine of SWOT and AHP in feasibility research provide more reliable accurate in decision making. The aim of this paper is to analyze the business feasibility in opening learning centre at Balaraja based on SWOT and AHP method.","PeriodicalId":144274,"journal":{"name":"Journal of Applied Information, Communication and Technology","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132911613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}