2021 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS最新文献

筛选
英文 中文
The Challenges in Integrated Personal Health Record Adoption in Indonesia: A Qualitative Analysis of Regulatory Perspectives 印度尼西亚综合个人健康记录采用的挑战:监管视角的定性分析
N. C. Harahap, P. W. Handayani, A. Hidayanto
{"title":"The Challenges in Integrated Personal Health Record Adoption in Indonesia: A Qualitative Analysis of Regulatory Perspectives","authors":"N. C. Harahap, P. W. Handayani, A. Hidayanto","doi":"10.1109/ICIMCIS53775.2021.9699353","DOIUrl":"https://doi.org/10.1109/ICIMCIS53775.2021.9699353","url":null,"abstract":"A personal health record (PHR) is a type of health record maintained by patients. Integrated PHR is an ideal type of PHR that can empower patients to manage their health care and provide continuous connections between patients and their health providers. However, little is known about the adoption of integrated PHR in Indonesia. Thus, this study aims to discuss the challenges in the adoption of integrated PHR in Indonesia from the perspective of regulators as health policymakers in Indonesia. Data collection was conducted using semi-structured interviews with participants from the Ministry of Health and Social Health Insurance Administration Body (BPJS Kesehatan). This qualitative study identified nine challenges in the adoption of integrated PHR in Indonesia. Four challenges are related to technological issues, such as lack of interoperability, unequal distribution of infrastructure, security concerns, and system quality. Five challenges are related to people and organization, such as lack of IT human resources, health professionals' resistance to health information systems, top management support, strategic government plans, and policy changes.","PeriodicalId":250460,"journal":{"name":"2021 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121641453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Sentiment Analysis of Big Cities on The Island of Java in Indonesia from Twitter Data as A Recommender System 基于Twitter数据推荐系统的印尼爪哇岛大城市情感分析
Boby Siswanto, F. Gaol, B. Soewito, H. Warnars
{"title":"Sentiment Analysis of Big Cities on The Island of Java in Indonesia from Twitter Data as A Recommender System","authors":"Boby Siswanto, F. Gaol, B. Soewito, H. Warnars","doi":"10.1109/ICIMCIS53775.2021.9699147","DOIUrl":"https://doi.org/10.1109/ICIMCIS53775.2021.9699147","url":null,"abstract":"Text mining is a data mining technique to find hidden things from a set of data in the form of text. One of the things that can be obtained with text mining is opinion or sentiment, whether it is positive or negative. Positive sentiment is used as a reference for a subject or object from a collection of texts to be recommended. Java Island is the city with the most population in Indonesia with a variety of culinary delights. This study aims to analyze sentiment recommendations on culinary data from food or cuisine in big cities on the island of Java. Four big cities were selected, namely Jakarta, Bandung, Yogyakarta, and Surabaya. The data source is a tweet of culinary arts of the four cities from Twitter in Indonesia. The Sastrawi Library is used as a text mining data processing tool in Indonesia. The results obtained are the majority of positive sentiments from all cities. The cumulative sentiment value of the four cities is 54%, meaning that the big cities on the island of Java have good culinary delights and deserve to be recommended to be enjoyed.","PeriodicalId":250460,"journal":{"name":"2021 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115165794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Challenges of Inter-organizational Information Security in Healthcare Services: Health Regulator's Perspective 医疗保健服务中组织间信息安全的挑战:卫生监管机构的观点
P. Sari, P. W. Handayani, A. Hidayanto, R. F. Aji, S. Yazid
{"title":"Challenges of Inter-organizational Information Security in Healthcare Services: Health Regulator's Perspective","authors":"P. Sari, P. W. Handayani, A. Hidayanto, R. F. Aji, S. Yazid","doi":"10.1109/ICIMCIS53775.2021.9699177","DOIUrl":"https://doi.org/10.1109/ICIMCIS53775.2021.9699177","url":null,"abstract":"Inter-organization Information Technology (IT) relationships enhance the collaboration among organizations to deliver better healthcare services. This study aims to analyze information security practices and challenges for inter-organizational IT relationships in healthcare services from health regulator's perspective namely the National Health Insurance Agency (BPJS-K) who provides an inter-organization system to support the relationships. We use the qualitative research method with thematic coding as data analysis techniques. Data are collected using an online interview with three middle management in the IT division from BPJS-K. The results revealed some information security threats on inter-organizational systems. Even though BPJS-K has implemented some security measures to protect the systems, it must address some challenges to improve them. This study discusses some theoretical and practical contributions for inter-organizational information security.","PeriodicalId":250460,"journal":{"name":"2021 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134241180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SIMTEKDIN of Covid-19 Using Forward Chaining Based on Android Mobile 基于Android手机前向链的新型冠状病毒SIMTEKDIN
Erly Krisnanik, Nadia Imawangi, H. N. Irmanda
{"title":"SIMTEKDIN of Covid-19 Using Forward Chaining Based on Android Mobile","authors":"Erly Krisnanik, Nadia Imawangi, H. N. Irmanda","doi":"10.1109/ICIMCIS53775.2021.9699351","DOIUrl":"https://doi.org/10.1109/ICIMCIS53775.2021.9699351","url":null,"abstract":"Based on the results of monitoring through the covid19.go.id information channel managed by the Covid-19 Handling Task Force regarding the analysis of Covid-19 virus data as of July 18, 2021, there were 2,877,476 cumulative Covid-19 cases in Indonesia, of which 542.236 (18.8%) Among them were active cases, 2,261,658 (78.6%) were declared cured from being confirmed, and 73,582 (2.6%) died and were confirmed to have contracted Covid-19. The problems faced by the community today are still afraid to come to the hospital for an initial examination. Based on this, it is necessary to have a system application that can detect the level of risk of being exposed to Covid-19 for the community without having to come to the hospital. The research methodology used is agile software development using the sprint (the stages of the research carried out consisted of 3 sprints to produce a mobile-based SIMTEKDIN Covid 19 application). The results of this study are expected to help the public in knowing early the symptoms of Covid 19 disease. The contribution of this research is in the form of a mobile-based application of the Covid-19 Disease Early Detection Monitoring Information System (SIMTEKDIN).","PeriodicalId":250460,"journal":{"name":"2021 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121876571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Brief Study on Cybercrimes and Practices in Mizoram 米佐拉姆邦网络犯罪与实践简要研究
J. Hussain, Vanlalruata Hnamte, Laldinsangi
{"title":"A Brief Study on Cybercrimes and Practices in Mizoram","authors":"J. Hussain, Vanlalruata Hnamte, Laldinsangi","doi":"10.1109/ICIMCIS53775.2021.9699193","DOIUrl":"https://doi.org/10.1109/ICIMCIS53775.2021.9699193","url":null,"abstract":"This study aims to analyze the level of awareness of cybersecurity and crimes in Mizoram by focusing on various threats from the internet, Social Networking Sites (SNSs), and other communication or computer-oriented crime, in cyberspace along with their significant awareness. In modern technological years, cybercrime is a hot challenge in all areas and aspects including personal security, national security, and public safety. To prevent from being victimized, everyone needs to be informed about some sort of measures and about cybercrimes. A well-structured questionnaire was prepared for the survey as per the cases history recorded provided by the Mizoram police department. The results of this study are important recommendations and need to be carried out by various circles of the general public and specifically for Mizoram. While crime victims are mostly unaware of stranger behaviour to capture their information details, consequently the public awareness level on cybercrime is below average. This study presents a brief overview of all evolving crime, case studies, and the working approach to combat cybercrime in the Mizoram context.","PeriodicalId":250460,"journal":{"name":"2021 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129830214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Actual Use of Transactional Video on Demand: The Extended of Technology Acceptance Model 交易视频点播的实际应用:技术接受模型的扩展
Yasmin Amalia, P. W. Handayani, Ika Chandra Hapsari
{"title":"Actual Use of Transactional Video on Demand: The Extended of Technology Acceptance Model","authors":"Yasmin Amalia, P. W. Handayani, Ika Chandra Hapsari","doi":"10.1109/ICIMCIS53775.2021.9699327","DOIUrl":"https://doi.org/10.1109/ICIMCIS53775.2021.9699327","url":null,"abstract":"This study aims to analyze the factors that influence someone to adopt transactional video on demand (TVOD) services. This study uses a quantitative approach involving 359 respondents through an online questionnaire. Then, the validation of quantitative results was carried out through interviews with five respondents. The data obtained in this study were processed and analyzed using the Covariance Based Structural Equation Model. The results showed that perceived ease of use, perceived usefulness, social value, and monetary value were factors that influenced the intention to use TVOD services, where these intentions affect the actual use of TVOD services in Indonesia.","PeriodicalId":250460,"journal":{"name":"2021 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121092867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Enterprise System Modeling for Business Licensing Services 业务许可服务的企业系统建模
Muhammad Mahreza Maulana, A. Suroso, Yani Nurhadryani, K. Seminar
{"title":"Enterprise System Modeling for Business Licensing Services","authors":"Muhammad Mahreza Maulana, A. Suroso, Yani Nurhadryani, K. Seminar","doi":"10.1109/ICIMCIS53775.2021.9699341","DOIUrl":"https://doi.org/10.1109/ICIMCIS53775.2021.9699341","url":null,"abstract":"Business licensing services are required to provide integrated services across government agencies. It can provide convenient public services for the community. To have quality and reliable information services with infrastructure that has adequate capacity and capability. This paper aims to address a recommendation to be implemented and support business licensing services. Having a proper enterprise system will increase service adoption, simplify the service integration process, manage and analyze data. It also needs to own appropriate infrastructure capacity and capability to handle the data and information security required by the government and citizens. By conducting activity to assess, select, add and create modeling of an enterprises system component that provides information technology solutions supporting government services, especially business licensing services. It includes high-level Enterprise Systems, service adoption solutions, service integration solutions, service data/information analysis solutions to support decision making, and adequate infrastructure solutions. The recommended enterprise system solutions are implementing CRM with BPM for service adoption, implementing API Gateway and ESB for service integration, implementing BIA technology for data processing, and implementing cloud and cybersecurity solutions for adequate infrastructure.","PeriodicalId":250460,"journal":{"name":"2021 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127957972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Exploitation Prevention on Network Printer with Signature-Based Suricata on PfSense 基于PfSense的基于签名的Suricata网络打印机攻击防范
Fajar Subkhi Sulaiman, H. Seta, Noor Falih
{"title":"Exploitation Prevention on Network Printer with Signature-Based Suricata on PfSense","authors":"Fajar Subkhi Sulaiman, H. Seta, Noor Falih","doi":"10.1109/ICIMCIS53775.2021.9699133","DOIUrl":"https://doi.org/10.1109/ICIMCIS53775.2021.9699133","url":null,"abstract":"In late 2018, more than 50,000 network printers were exposed to a cyberattack that forced them to print spam messages. Were the spam message turned into a message for large-scale political activities, it can cause a major problem. Based on this, two problem arises, namely what is the impact of hacked printers. Can a hacked network printer inflict major damage on the surrounding? Secondly, whether a combination of a firewall with Suricata intrusion detection system (IDS) and intrusion prevention system (IPS) can prevent printer hacking. This research only discusses transmission control protocol (TCP) communication packets, access restriction using pfSense firewall along with Suricata, and printer model Canon imageRunner ADV-4025 as the test printer. The offered solution is to separate the network into two-part and put a firewall in between two networks, and configure the firewall along with Suricata so that the firewall can detect malicious packets. The output obtained is a system that can limit access and perform packet filters from computers on a different network to a printer, which can increase service availability, information confidentiality, and data integrity on printers.","PeriodicalId":250460,"journal":{"name":"2021 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132555979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
[Copyright notice] (版权)
{"title":"[Copyright notice]","authors":"","doi":"10.1109/icimcis53775.2021.9699242","DOIUrl":"https://doi.org/10.1109/icimcis53775.2021.9699242","url":null,"abstract":"","PeriodicalId":250460,"journal":{"name":"2021 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131925124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Content Characteristics of Government Social Media and The Impact on Citizen Engagement Rate 政府社交媒体内容特征及其对公民参与率的影响
Diah Henisa, Nori Wilantika
{"title":"Content Characteristics of Government Social Media and The Impact on Citizen Engagement Rate","authors":"Diah Henisa, Nori Wilantika","doi":"10.1109/ICIMCIS53775.2021.9699299","DOIUrl":"https://doi.org/10.1109/ICIMCIS53775.2021.9699299","url":null,"abstract":"Social media has been used by the government for communication, socialization, and publication. However, it is still not being used to its maximum potential. This study aims to analyze citizen engagement on a government agency's social media accounts based on the number of likes, comments, and shares. In addition, this study examines how citizen engagement differs depending on the topic, media type, and upload time of the post on government social media accounts. Data was collected from Facebook, Twitter, and Instagram using scraping tools, namely Facepager, Twint, and Instaloader. The types of post topics are determined based on the results of topic modeling using the Latent Dirichlet Allocation (LDA) method. Using the Kruskal-Wallis test and Dunn's test, the post topic, the media type, and the post time has a significant influence on citizen engagement. Instagram got the highest engagement rate compared to Facebook and Twitter.","PeriodicalId":250460,"journal":{"name":"2021 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134510822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信