{"title":"The Implementation of Internet Memes to Build Brand Awareness of E-Commerce in Indonesia","authors":"Elfi Fauziah, P. W. Handayani, Q. Munajat","doi":"10.1109/ICCED.2018.00040","DOIUrl":"https://doi.org/10.1109/ICCED.2018.00040","url":null,"abstract":"This study aims to assess the potential of memes to be used in advertising to improve the brand awareness of an Indonesian ecommerce business, Fabelio. The method used in this study is experimental - quantitative. The experiment was conducted using Instagram posts. To answer the research question, this study measured the memes virality and the brand awareness of the respondent. There are two respondent groups involved in this experiment which are respondents who follow Fabelio’s Instagram account (control group) and respondents who like the memes but do not follow Fabelio’s Instagram post (experimental group). The brand awareness level for both groups were compared using t-test. The result of this study shows that the brand awareness level of the experimental group is similar with the control group which shows that memes is as effective as traditional ads in improving the brand awareness. In addition, the type of meme that has the highest virality level is silliness and sarcasm type. This finding could be used as consideration for business to implement memes as form of ads.","PeriodicalId":166437,"journal":{"name":"2018 International Conference on Computing, Engineering, and Design (ICCED)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116744242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bambang Jatmika, Miptahul Pallah, Nur Akmaliyah, Ardi Sardi, Rezha Firdaus Kusuma Barkah, I. Darmawan
{"title":"The Evaluation on the Saturation Degree on Pelabuhan II Street of Sukabumi City","authors":"Bambang Jatmika, Miptahul Pallah, Nur Akmaliyah, Ardi Sardi, Rezha Firdaus Kusuma Barkah, I. Darmawan","doi":"10.1109/ICCED.2018.00048","DOIUrl":"https://doi.org/10.1109/ICCED.2018.00048","url":null,"abstract":"The Highway is the drive and connection of the economy aspect within the South Part of Sukabumi City region. The part of Pelabuhan II street of Sukabumi City is very crauded and heavy, because of the high number of transporter. The traffic jam every day during weekdays, cause need took a lot of time when pass throug the Pelabuhan II street. Based on that problem, it is necessary to do some research to find out the Degree of Saturation and Service Level of Pelabuhan II street of Sukabumi City. The location of the heavy traffic are in the front of Sport Garden Store during the peak hour at 07.00 – 08.00 AM . From the road capacity analysis point of view, the resulted of the capacity value (C) reach 181.8904 smp/hour. With the Degree of Saturation (DS) 0,905, show the Service Level of Pelabuhan II Street is inside the category E (between 0.85-1.00)","PeriodicalId":166437,"journal":{"name":"2018 International Conference on Computing, Engineering, and Design (ICCED)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123791385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Y. Normandia, Larastri Kumaralalita, A. Hidayanto, W. S. Nugroho, M. R. Shihab
{"title":"Measurement of Employee Information Security Awareness Using Analytic Hierarchy Process (AHP): A Case Study of Foreign Affairs Ministry","authors":"Y. Normandia, Larastri Kumaralalita, A. Hidayanto, W. S. Nugroho, M. R. Shihab","doi":"10.1109/ICCED.2018.00020","DOIUrl":"https://doi.org/10.1109/ICCED.2018.00020","url":null,"abstract":"Indonesian government has been mandated in presidential decree regarding bureaucratic reform to realize its commitment to implement electronic government (egovernment) based on Information and Communication Technology (ICT). This notion has caused the dependency of business process functions of government services to the public, using ICTs. Increased use of ICTs leads to high levels of vulnerability that can be exploited by major threats. The largest source of the information security breaches is due to a lack of awareness of the human aspect. Ministry of Foreign Affairs (MOFA) RI has a strategic problem concerning the awareness of employees. This study measured awareness of information security. Analytic Hierarchy Process (AHP) was used to assess the importance of each of those dimensions through pairwise comparison. Measurements conducted using questionnaire to all employees of the MOFA. Focus areas measured include: workstation security, password management, the use of email and instant messaging, internet usage, the use of social media, document handling, incident reporting, and security policies. The result shows that the security awareness of employees at the MOFA is at the average level, or in need of attention and supervision.","PeriodicalId":166437,"journal":{"name":"2018 International Conference on Computing, Engineering, and Design (ICCED)","volume":"174 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125179086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Samsul Pahmi, Sudin Saepudin, Nira Maesarah, Ujang Isa Solehudin, Wulandari
{"title":"Implementation of CART (Classification and Regression Trees) Algorithm for Determining Factors Affecting Employee Performance","authors":"Samsul Pahmi, Sudin Saepudin, Nira Maesarah, Ujang Isa Solehudin, Wulandari","doi":"10.1109/ICCED.2018.00021","DOIUrl":"https://doi.org/10.1109/ICCED.2018.00021","url":null,"abstract":"The purpose of this research is to identify the problems that affect the performance of employees in the company. This research is a type of quantitative research involving data with different types ranging from nominal, continuous, categorical, ordinal and using 15 independent variables and 1 dependent variable. The population in this research are all employees of some companies in Sukabumi Indonesia. The sample used was 120 employees and the determination of the sample used a random sampling method. Methods of data collection in this study were questionnaires, interviews, and documentation. Data analysis method uses CART (Classification and Regression Trees) algorithm because it involves many kinds of data. The results showed that there are five variables that can be used for work motivation, corporate social environment, job type, leadership style, and organizational support (company policy). From these variables, the best formula can be generated to improve the performance of the employee is: increase the motivation of work (X1), making the company more conducive social environment (x11), divide the types of work (X14), which became more specific to be done individually, and if an employee is required to work in a team, it should be supported by specific policy organization/company (X3). Of the overall variables, the most influential factor in the performance of employees is the motivation of work, when higher the motivation of work, then the possibility of increased employee performance could be higher.","PeriodicalId":166437,"journal":{"name":"2018 International Conference on Computing, Engineering, and Design (ICCED)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122364919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
G. Borg, Zia-Ud-Din Javaid, Michael Blacksell, P. Redman, Daniel Tempra, M. Artiyasa, T. Mantoro, M. A. Ayu
{"title":"ANU-MIMO: A Community Wireless Network Infrastructure for Remote Populations","authors":"G. Borg, Zia-Ud-Din Javaid, Michael Blacksell, P. Redman, Daniel Tempra, M. Artiyasa, T. Mantoro, M. A. Ayu","doi":"10.1109/ICCED.2018.00015","DOIUrl":"https://doi.org/10.1109/ICCED.2018.00015","url":null,"abstract":"Large-scale, scalable, distributed, decentralised MIMO (SDD-MIMO) [1] can be deployed to extend existing broadband infrastructure to remote communities. The network complements existing back-haul networks by providing an omnidirectional broadband service to a large and scalable number of distant users distributed over a very large area. The Indonesian archipelago poses some challenging scenarios with its mountainous landscapes and some 18000 islands, often trans-oceanic and separated beyond horizon. In this paper, we propose SDD-MIMO as a solution for many of these difficult scenarios and present simulations for two representative examples.","PeriodicalId":166437,"journal":{"name":"2018 International Conference on Computing, Engineering, and Design (ICCED)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131723533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rahmat Sulaiman, Burham Isnanto, Heng Ki, Chandra Kirana
{"title":"Cryptography in (LSB) Method Using RC4 Algorithm and AES Algorithm in Digital Image to Improve Message Security","authors":"Rahmat Sulaiman, Burham Isnanto, Heng Ki, Chandra Kirana","doi":"10.1109/ICCED.2018.00016","DOIUrl":"https://doi.org/10.1109/ICCED.2018.00016","url":null,"abstract":"Cryptography and Steganography is the science and art in securing and maintaining the confidentiality of the message. However, to maintain the security and the confidentiality of a message it takes two different methods. To maintain the security of messages, the science that has been widely used is cryptography. As for maintaining the confidentiality ofthe message, the science used is steganography. But cryptography has weakness, the unknown messages is show us that the message is protected, that mean the unknown message show us it has a real message. So, we need to keep the confidentiality in the messages. For that we need a security message that can maintain the security and the secret ofthe message simultaneously. In this work to solve that problem, this study is combining between RC4 or AES algorithm in LSB Steganography. The test is done by calculating the length of the encryption time process and the decryption time process of each algorithm with the same number of messages and key lengths. Measurement time is done as much as 10 times, then taken average value to get consistent time because system instability. Therefore, we will compare the speed of encryption and decryption process by applying AES and RC4 algorithm to LSB. In the process of encryption and decryption, the AES algorithm is better in terms of speed compared to RC4 algorithm. The MSE andPSNR values generatedfrom the encrypted images based on the AES and RC4 algorithm doesn't show significant value. Overall the AES algorithm is better than RC4 algorithm when applied in LSB. This research show us that we can make double and triple secure only using same method and variant algorithms and different type ofobject such as Image, File, Audio or Others.","PeriodicalId":166437,"journal":{"name":"2018 International Conference on Computing, Engineering, and Design (ICCED)","volume":"36 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133192799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Anggy Pradiftha Junfithrana, Euis Liani, Miraz Z. Suwono, Dika Meldiana, A. Suryana
{"title":"Rice Donation System in Orphanage Based on Internet of Things, Raspberry-Pi, and Blockchain","authors":"Anggy Pradiftha Junfithrana, Euis Liani, Miraz Z. Suwono, Dika Meldiana, A. Suryana","doi":"10.1109/icced.2018.00053","DOIUrl":"https://doi.org/10.1109/icced.2018.00053","url":null,"abstract":"IoT utilization in daily lives is very potential and can be applied in various fields, unfortunately the implementation in the social field still lacking. The large number of orphanages in Indonesia caused information distribution not easily available, however donors find it difficult to get the right information about food reserves, especially rice stock in orphanages. This paper proposes an IoT-based system where rice stocks in orphanages can be detected by Raspberry pi which is connected to sensors, data information from raspberry-pi connected to the network that can be accessed and monitored by mobile applications. This application designed for service providers, donors and rice suppliers. Donors send rice through financial transactions with service providers, and rice suppliers will ship items to the orphanage. Blockchain technology is applied to all parties in order to be transparent and reduce transaction manipulation.","PeriodicalId":166437,"journal":{"name":"2018 International Conference on Computing, Engineering, and Design (ICCED)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129352667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"[Title page i]","authors":"","doi":"10.1109/icced.2018.00001","DOIUrl":"https://doi.org/10.1109/icced.2018.00001","url":null,"abstract":"","PeriodicalId":166437,"journal":{"name":"2018 International Conference on Computing, Engineering, and Design (ICCED)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122858839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Samsul Pahmi, Nunik Destria Arianti, Imam Fahrudin, Ana Zanatun Amalia, Erdi Ardiansyah, Sarah Rahman
{"title":"Estimated Missing Data on Multiple Linear Regression Using Algorithm EM (Expectation-Maximization) for Prediction Revenue Company","authors":"Samsul Pahmi, Nunik Destria Arianti, Imam Fahrudin, Ana Zanatun Amalia, Erdi Ardiansyah, Sarah Rahman","doi":"10.1109/ICCED.2018.00025","DOIUrl":"https://doi.org/10.1109/ICCED.2018.00025","url":null,"abstract":"This study aims to identify problems in the company which in the past two years have experienced unpredictable fluctuations in revenue and do not seem to improve the overall trend in two years. This research is a type of quantitative research involving continuous data types and using 20 independent variables and 1 dependent variable. Data collection was carried out at companies in Sukabumi, Indonesia with data collection methods using interviews and documentation. In the process of data collection, there are some missing data. Based on the type of data that is retrieved, the selection method used in this research is divided into two methods, Expectation-Maximization algorithm for estimating missing data and Multiple Linear Regression to determine the effect of variables on company revenue and to predict the company revenue in the next period. The results showed that using EM Algorithm using the reference variable that has the same character can be predicted the missing data from the initial data. From the calculation of hypothesis test can be concluded that only Luggage, Cleaning Aid, and Glass Ware which have no significant effect to the company's revenue; While the calculation using multiple linear regression analysis there are 5 types of goods that have a negative influence with company revenue, the 5 types are: Hair care, Luggage, Bakery, Cleaning Aid, and Snack. Thus, the overall type of goods that are very necessary to be evaluated by the company are: Luggage, Bakery, Cleaning Aid, Snack and Glass Ware, because of the type of goods that do not have significant influence or negatively effect to the increase of the company's revenue.","PeriodicalId":166437,"journal":{"name":"2018 International Conference on Computing, Engineering, and Design (ICCED)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116770534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ariel Dame Sari Sirait, W. R. Fitriani, A. Hidayanto, B. Purwandari, M. Kosandi
{"title":"Evaluation of Social Media Preference as e-Participation Channel for Students Using Fuzzy AHP and TOPSIS","authors":"Ariel Dame Sari Sirait, W. R. Fitriani, A. Hidayanto, B. Purwandari, M. Kosandi","doi":"10.1109/ICCED.2018.00039","DOIUrl":"https://doi.org/10.1109/ICCED.2018.00039","url":null,"abstract":"Technology, particularly social media, is growing. Governments that are being intensively build government services electronically can see social media as an ever-growing oppurtunities to support the development of egovernment, especially e-participation. Students, who are considered as drivers of change in Indonesia, are the largest social media users. Therefore, it is important for the government to reach out to students to be willing to participate electronically to the government program. This study seeks to determine criteria of social media selection to increase student participation to government. This study also tries to develop a hierarchy for evaluating social media preferences and prioritize the social media that are currently popular to support e-participation. Based on the results literature study and FGD, we obtained 11 criteria of social media selection to increase participation and 8 alternative solutions that best fit the criteria. Criteria is determined based on the theory of motivation (hedonic and utilitarian). Data collection is done through a questionnaire. Data processing is done by using fuzzy AHP to determine the weight of social media to increase the participation of the government and TOPSIS to determine social media preferences. The result of this study shows that LINE becomes an alternative solution of social media that has the highest priority while Wiki has the lowest priority.","PeriodicalId":166437,"journal":{"name":"2018 International Conference on Computing, Engineering, and Design (ICCED)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122108453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}