2021 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS最新文献

筛选
英文 中文
A Systematic Literature Review of Knowledge Sharing Practices in Academic Institutions 学术机构知识共享实践的系统文献综述
Mariana Purba, Ermatita Ermatita, Abdiansah Abdiansah, Vina Ayumi, Handrie Noprisson, Anita Ratnasari
{"title":"A Systematic Literature Review of Knowledge Sharing Practices in Academic Institutions","authors":"Mariana Purba, Ermatita Ermatita, Abdiansah Abdiansah, Vina Ayumi, Handrie Noprisson, Anita Ratnasari","doi":"10.1109/ICIMCIS53775.2021.9699350","DOIUrl":"https://doi.org/10.1109/ICIMCIS53775.2021.9699350","url":null,"abstract":"Many knowledge-sharing activities take place in educational institutions, both formally and informally. If this activity is organized with good knowledge management, then this will support a faster knowledge sharing process to get quality and innovative ideas. This paper aims to obtain a summary of existing research, issues, and opportunities for further analysis on knowledge-sharing (KS) practices in academic institutions. The phases of the systematic literature review (SLR) method are described based on Kitchenham (2009) guideline. We found 21 articles, seven articles from IEEE, nine articles from Science Direct, and five articles from Springer. The collection of research data on knowledge sharing has been carried out in the United States, Australia, China, Cyprus, United Kingdom, Ghana, Hungary, Indonesia, Iran, Israel, Italy, Jordanian, Malaysia, and Saudi Arabia, with the most research locations being Malaysia (14%) and Saudi Arabia (19%). We also attempted to identify the research topic trend of knowledge sharing research in academic institutions. We found two types of research trends of knowledge sharing research in university, including factor analysis and architecture development. Of the two categories of research trends, 76% discussed factor analysis, and 24% discussed architectural development. We also identified six methods in KS research including Partial Least Square Structure Equation Modeling (PLS-SEM), questionnaire, data triangulation, focus groups discussion, observation and interview. Moreover, the most used method in related research is questionnaire, because it is a relatively inexpensive, fast and efficient way of collecting large amounts of information.","PeriodicalId":250460,"journal":{"name":"2021 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127378663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Building Indonesian Music Dataset: Collection and Analysis 建立印尼音乐数据集:收集与分析
M. O. Pratama, Pamela Kareen, Ermatita
{"title":"Building Indonesian Music Dataset: Collection and Analysis","authors":"M. O. Pratama, Pamela Kareen, Ermatita","doi":"10.1109/ICIMCIS53775.2021.9699332","DOIUrl":"https://doi.org/10.1109/ICIMCIS53775.2021.9699332","url":null,"abstract":"We introduce The Indonesian Music Dataset (IMD), a collection of audio features and text lyrics features for thousand Indonesian popular songs which has been developed for automatic music era classification and other classification tasks. Dataset collection consists of audio features represented by Spectrogram, Chroma Feature and Low-level audio features. The dataset also consists of lyric features in order to support multimodal tasks. Dataset is equipped with eras (year of publication) labels starting from '70 until the current era, mood labels from Valence-Arousal (Anger, Sadness, Happiness and Relax), and genre labels (Rock, Pop, Jazz). In this paper, we also present era, mood and genre prediction as an example of a dataset experiment for each modality (audio features and text lyrics features) that shows positive results using benchmarking models.","PeriodicalId":250460,"journal":{"name":"2021 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125797512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Face Recognition Using Convolutional Neural Network Architectures on Mask-Occluded Face Images 基于卷积神经网络架构的掩模遮挡人脸识别
Muhammad Alif Raihan, Jayanta, M. M. Santoni
{"title":"Face Recognition Using Convolutional Neural Network Architectures on Mask-Occluded Face Images","authors":"Muhammad Alif Raihan, Jayanta, M. M. Santoni","doi":"10.1109/ICIMCIS53775.2021.9699239","DOIUrl":"https://doi.org/10.1109/ICIMCIS53775.2021.9699239","url":null,"abstract":"In epidemic situations such as the novel coronavirus disease (COVID-19) pandemic that spreads through physical contact, security and presence systems that previously used fingerprints-based or were contact-based are no longer safe for users. Compared to other popular biometrics such as fingerprints, irises, palms, and veins, the face has much better potential to recognize identity in a nonintrusive manner. Therefore, this study will employ two convolutional neural network (CNN) architectures, LeNet-5 and MobileNetV2, for face recognition on mask-occluded face images. Data were taken from 12 subjects face-to-face were preprocessed by cropping, artificial mask augmentation, resizing, and image augmentation. The model was trained with the configured hyperparameter for 50 epochs with a 60:40 data split. Model testing was performed using image data without augmentation wearing a mask. The test results are measured with classification accuracy for 12 classes. The highest testing accuracy on LeNet-5 models is 98.15%, with $64times 64$ input size and 64 batch size. Meanwhile, the highest testing accuracy for MobileNetV2 is 97.22% with input size $96times 96$, batch size 16, and the weight of the MobileNetV2 model initialized with ImageNet $96times 96$.","PeriodicalId":250460,"journal":{"name":"2021 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123783282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Acceptance of Pay Later Payment Usage on Business-To-Consumer Online Marketplace in Indonesia 印尼企业对消费者在线市场对后期支付的接受情况
Salsabila Maurizka, P. W. Handayani, A. Pinem
{"title":"The Acceptance of Pay Later Payment Usage on Business-To-Consumer Online Marketplace in Indonesia","authors":"Salsabila Maurizka, P. W. Handayani, A. Pinem","doi":"10.1109/ICIMCIS53775.2021.9699127","DOIUrl":"https://doi.org/10.1109/ICIMCIS53775.2021.9699127","url":null,"abstract":"Pay Later is a new payment method that allows consumers to buy products using installments with a certain deadline. Pay Later have been adopted by various online marketplaces and increased during the COVID-19. This study aims to seek light on Pay Later payment method adoption on business-to-consumer (B2C) online marketplace in Indonesia using the modification of the Technology Acceptance Model (TAM). This study uses the Partial Least Square Structural Equation Modelling (PLS-SEM) analysis method with the help of SmartPLS 3.0 and a survey filled out by 1,141 respondents. The results showed that perceived usefulness, perceived ease of use, social influence, lifestyle compatibility, consumer trust, perceived risk, and debt attitude influence the users' intention to adopt/use Pay Later, and the intention is proven to influence the actual use of Pay Later in B2C online marketplace in Indonesia.","PeriodicalId":250460,"journal":{"name":"2021 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121911192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Business Intelligence and Analytics in Dairy Goat Livestock: Current and Future Challenge 商业智能和分析在奶山羊家畜:当前和未来的挑战
A. Primawati, I. S. Sitanggang, Annisa, D. Astuti
{"title":"Business Intelligence and Analytics in Dairy Goat Livestock: Current and Future Challenge","authors":"A. Primawati, I. S. Sitanggang, Annisa, D. Astuti","doi":"10.1109/ICIMCIS53775.2021.9699336","DOIUrl":"https://doi.org/10.1109/ICIMCIS53775.2021.9699336","url":null,"abstract":"Business Intelligence and Analytics (BIA) has been widely used and developed in various business fields. The main goal is to make decisions quickly based on recommendations from analysis and business predictions in the present and the future. Dairy goat livestock in Indonesia has the potential to be developed which aims to support Precision Livestock Farming (PLF) in Indonesia because goat livestock is one of the businesses that contributes to food security such as milk but has not received important attention compared to cattle livestock in Indonesia. However, the availability of information provided by Statistics Indonesia is still limited so that the role of BIA is needed. This paper presents the development of BIA on dairy goat livestock. The method used in this study is a critical literature study of relevant BIA research to identify problems based on data on the potential and condition of BIA in dairy goats in Indonesia to map solutions and challenges in the future. At the conclusion of this study, recommendations are made to apply the BIA solution to the problem of dairy goats livestock.","PeriodicalId":250460,"journal":{"name":"2021 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126498604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber-Risk Management Planning Using NIST CSF v1.1, NIST SP 800-53 Rev. 5, and CIS Controls v8 使用NIST CSF v1.1、NIST SP 800-53 Rev. 5和CIS Controls v8进行网络风险管理规划
A. Amiruddin, Hafizh Ghozie Afiansyah, Hernowo Adi Nugroho
{"title":"Cyber-Risk Management Planning Using NIST CSF v1.1, NIST SP 800-53 Rev. 5, and CIS Controls v8","authors":"A. Amiruddin, Hafizh Ghozie Afiansyah, Hernowo Adi Nugroho","doi":"10.1109/ICIMCIS53775.2021.9699337","DOIUrl":"https://doi.org/10.1109/ICIMCIS53775.2021.9699337","url":null,"abstract":"With the use of information systems as a means for supporting the success of missions and objectives of organizations increased, the protection towards assets against cyber risks needs to be considered and paid more attention. Cyber-risk management planning can be carried out as a means or approach to protect assets from the risks of cyber-attacks. As a supporting unit in XYZ, the IT Unit has the responsibility to manage the information systems, information technology, and their infrastructure and services within the XYZ system. However, the IT Unit has never conducted a cybersecurity evaluation so it does not yet have a plan for cybersecurity risk management. In this study, we tailored a cyber-risk plan for the IT Unit of XYZ using NIST CSF as the main framework and CIS Controls v8 and NIST SP 800-53 Rev 5 for defining controls and action recommendations. As the results, we found 42 risk scenarios in the IT Unit in which 12 are accepted and 30 are mitigated. There are 14 actions recommendation for the IT Unit to reach tier 3 based on 18 controls of CIS and 20 controls of NIST SP 800-53 rev 5 that can be applied to control the current cyber-risk.","PeriodicalId":250460,"journal":{"name":"2021 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130393959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Inter-Organizational Data Sharing: What Issues Should Be Considered? 组织间数据共享:应该考虑哪些问题?
Dewi Puspasari, Ahmad Nizar Hadiyanto, Suryana Setiawan
{"title":"Inter-Organizational Data Sharing: What Issues Should Be Considered?","authors":"Dewi Puspasari, Ahmad Nizar Hadiyanto, Suryana Setiawan","doi":"10.1109/ICIMCIS53775.2021.9699333","DOIUrl":"https://doi.org/10.1109/ICIMCIS53775.2021.9699333","url":null,"abstract":"Currently, data sharing activities between agencies have been done in many ways. This provides benefits but behind it there are also threats. Therefore, we explore what needs to be considered in sharing current data based on previously published research results. This research was conducted with a systematic literature review approach to 34 articles entered in the Scopus electronic database in 2017–2021. From the results of this study, we then propose six domains that need to be considered when sharing data, namely Security; access control; data privacy; confidentiality, integrity, and availability of data; compliance and trust; also data audit capabilities.","PeriodicalId":250460,"journal":{"name":"2021 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132100403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
One Data ASN Framework (ODAF) for Indonesian State Civil Apparatus 印度尼西亚国家民用机器的一个数据ASN框架(ODAF)
Elin Cahyaningsih, Natascha Lestari Eunike Silalahi, Handrie Noprisson, Vina Ayumi
{"title":"One Data ASN Framework (ODAF) for Indonesian State Civil Apparatus","authors":"Elin Cahyaningsih, Natascha Lestari Eunike Silalahi, Handrie Noprisson, Vina Ayumi","doi":"10.1109/ICIMCIS53775.2021.9699290","DOIUrl":"https://doi.org/10.1109/ICIMCIS53775.2021.9699290","url":null,"abstract":"Data management and governance framework purpose to support data life cycle and ensure the consistency within an organizational function in terms of framework implementation to achieve organizational objectives. Data accuracy, integrity, interoperability, and quality become a challenge that occurs in One Data State Civil Apparatus (ASN) implementation. Therefore, it is needed to define a suitable framework for ASN data management and governance. This research conducted identify strategic issues and current problems, literature review and previous study to determine the theoretical framework, evaluation the theoretical framework, hybrid, and synthesis framework to define the suitable component, and validation the proposed framework by expert judgment. The One Data ASN Framework (ODAF) consists of eight components there are regulation/policy, vision, mission, goals, principles, committee, type, standard, metadata, data organizing, data dissemination, coaching, monitoring, and evaluation.","PeriodicalId":250460,"journal":{"name":"2021 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114983963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Conformity Analysis of HTTP Strict Transport Security (HSTS) Configuration and Implementation Using Bettercap Tools 基于Bettercap工具的HTTP严格传输安全(HSTS)配置与实现符合性分析
A. Amiruddin, Daffa Akbar Putra Yusa, Rizky Ainur Rofiq
{"title":"Conformity Analysis of HTTP Strict Transport Security (HSTS) Configuration and Implementation Using Bettercap Tools","authors":"A. Amiruddin, Daffa Akbar Putra Yusa, Rizky Ainur Rofiq","doi":"10.1109/ICIMCIS53775.2021.9699358","DOIUrl":"https://doi.org/10.1109/ICIMCIS53775.2021.9699358","url":null,"abstract":"Currently, HTTPS is commonly used because it offers more protection when compared to HTTP. However, it does not rule out the possibility of attacks being carried out against HTTPS. One of the features that can improve HTTPS security is configuring HTTP strict transport security (HSTS). Unfortunately, not all HSTS is successfully configured and implemented correctly due to administrator ignorance. The purpose of this study is to provide an overview of what configurations need to be done to run HSTS properly to increase the functionality of existing features and improve security. Configuration conformity testing is done using three parameters, i.e., max-age, includeSubDomains, and preload. The attack attempts carried out in this exploratory study used Bettercap, which allows multiple types of attacks to be carried out simultaneously. The results obtained from this study include a list of parameters that need to be met as a condition of an adequately configured HSTS on a website, such as the max-age value, which has a minimum value of 31536000.","PeriodicalId":250460,"journal":{"name":"2021 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131838317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Challenges and Solution Recommendation in Large-Scale Agile Implementation: A Systematic Literature Review 大规模敏捷实施中的挑战和解决方案建议:系统的文献综述
Dika Swadani Ekasari, T. Raharjo, Adi Prasetyo
{"title":"Challenges and Solution Recommendation in Large-Scale Agile Implementation: A Systematic Literature Review","authors":"Dika Swadani Ekasari, T. Raharjo, Adi Prasetyo","doi":"10.1109/ICIMCIS53775.2021.9699312","DOIUrl":"https://doi.org/10.1109/ICIMCIS53775.2021.9699312","url":null,"abstract":"In the recent years, Agile methods have been widely-used in large organization to improve their performance. Since these methods initially designed for small projects and co-located teams, organization faces many challenges when implementing them in large-scale. During the past few years, challenges in implementing Large-Scale Agile have become a popular research topic. However, studies exploring the challenges in large scale Agile development along with best practices solutions through secondary studies is still scarce. This study aims to fill this gap by conducting Systematic Literature Review to identify various challenges as well as the proposed practices and solution to deal with them. A total of 12 papers, the results of SLR process, were analysed. This study identified 28 challenges classified in six categories. The biggest challenge arises from communication and collaboration category, which includes challenges related to team coordination, managing autonomous team, uneven team maturity, and distributed team. The solution of each challenge obtained from related studies and best practices.","PeriodicalId":250460,"journal":{"name":"2021 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130323459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信