2020 International Conference on Information Technology Systems and Innovation (ICITSI)最新文献

筛选
英文 中文
Digital Transformation of Indonesia Banking Institution: Case Study of PT. BRI Syariah 印尼银行机构数字化转型:以“一带一路”伊斯兰教为例
2020 International Conference on Information Technology Systems and Innovation (ICITSI) Pub Date : 2020-10-19 DOI: 10.1109/ICITSI50517.2020.9264935
Punto Widharto, Adam Imansyah Pandesenda, A. Yahya, Eki Aidio Sukma, M. R. Shihab, B. Ranti
{"title":"Digital Transformation of Indonesia Banking Institution: Case Study of PT. BRI Syariah","authors":"Punto Widharto, Adam Imansyah Pandesenda, A. Yahya, Eki Aidio Sukma, M. R. Shihab, B. Ranti","doi":"10.1109/ICITSI50517.2020.9264935","DOIUrl":"https://doi.org/10.1109/ICITSI50517.2020.9264935","url":null,"abstract":"Competition in the financial services industry has now entered the digital era, where banks are competing to carry out digital transformation. The survey results from PwC in 2018 stated that of the banks surveyed, including regional development banks, joint venture banks, and local banks, as many as 66% had indicated the digital strategy as part of the company's strategy. Digitalization can result in savings in human resources and all costs associated with them, which increases competition. This research discusses the digital transformation carried out by one of the banks in Indonesia, what is the role and impact of IT on digitalization carried out and the extent to which digitalization has been carried out in the bank. The results of the research show that IT has a big role in the digital transformation that exists in organizations, but that does not yet make an organization a digital bank.","PeriodicalId":286828,"journal":{"name":"2020 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130476155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
HTTPS Contribution in Web Application Security: A Systematic Literature Review HTTPS在Web应用程序安全中的贡献:系统的文献综述
2020 International Conference on Information Technology Systems and Innovation (ICITSI) Pub Date : 2020-10-19 DOI: 10.1109/ICITSI50517.2020.9264971
F. Wijitrisnanto, Suhardi, Purnomo Yustianto
{"title":"HTTPS Contribution in Web Application Security: A Systematic Literature Review","authors":"F. Wijitrisnanto, Suhardi, Purnomo Yustianto","doi":"10.1109/ICITSI50517.2020.9264971","DOIUrl":"https://doi.org/10.1109/ICITSI50517.2020.9264971","url":null,"abstract":"A Web application is one of the most used technology nowadays due to its flexibility in delivering services to society. It also plays a good portion in enhancing our daily life since it could provide almost any kind of services through an application served from the internet. Thus, many users’ private information runs the risk of being exposed to an unauthorized party. Standard browser connection uses HTTPS protocol, while both TLS over HTTP and Web application are known for several of vulnerabilities. This paper presents the results of an SLR study on web application security of HTTPS implementation. The study selects 45 qualified papers related to the topic and analyzed 24 of the documents. The findings are categorized into three labels: threats, threats impact, and defense mechanisms. This work also classifies the attack and threats based on the impact produced. In this study, the lack of understanding about security-related mechanism in TLS, session management, and web application still become the culprit of most attack and vulnerability. Based on this work, a researcher could better prioritize and prepare security mechanism to overcome the threats.","PeriodicalId":286828,"journal":{"name":"2020 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129499200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ICITSI 2020 Breaker Page ICITSI 2020断路器页面
2020 International Conference on Information Technology Systems and Innovation (ICITSI) Pub Date : 2020-10-19 DOI: 10.1109/icitsi50517.2020.9264909
{"title":"ICITSI 2020 Breaker Page","authors":"","doi":"10.1109/icitsi50517.2020.9264909","DOIUrl":"https://doi.org/10.1109/icitsi50517.2020.9264909","url":null,"abstract":"","PeriodicalId":286828,"journal":{"name":"2020 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133916549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ICITSI 2020 Index
2020 International Conference on Information Technology Systems and Innovation (ICITSI) Pub Date : 2020-10-19 DOI: 10.1109/icitsi50517.2020.9264925
{"title":"ICITSI 2020 Index","authors":"","doi":"10.1109/icitsi50517.2020.9264925","DOIUrl":"https://doi.org/10.1109/icitsi50517.2020.9264925","url":null,"abstract":"","PeriodicalId":286828,"journal":{"name":"2020 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134225100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Customer Satisfaction and Willingness to Pay OnDemand Entertainment Streaming Service: The Role of Service Quality and Perceived Values 客户满意度和付费点播娱乐流媒体服务意愿:服务质量和感知价值的作用
2020 International Conference on Information Technology Systems and Innovation (ICITSI) Pub Date : 2020-10-19 DOI: 10.1109/ICITSI50517.2020.9264953
F. Azzahro, Joshua Valdamer Ghibran, P. W. Handayani
{"title":"Customer Satisfaction and Willingness to Pay OnDemand Entertainment Streaming Service: The Role of Service Quality and Perceived Values","authors":"F. Azzahro, Joshua Valdamer Ghibran, P. W. Handayani","doi":"10.1109/ICITSI50517.2020.9264953","DOIUrl":"https://doi.org/10.1109/ICITSI50517.2020.9264953","url":null,"abstract":"This research aims to analyze the factors affecting users’ willingness to pay for subscription-based OnDemand streaming service in Indonesia. These factors are derived from the perceived values and electronic subscription service quality (ESSQUAL) theory. This research uses a quantitative approach with a total of 726 valid collected respondents who are current/former users of one or more OES services in Indonesia. The data collected within this research is analyzed using partial least squares structural equation modeling (PLS-SEM) method by utilizing SmartPLS version 3 as the tool. This research found that the factors of quality of accessibility, monetary value, and identity salience directly influence willingness to pay. Meanwhile, quality of content, quality of experience, perceived enjoyment, monetary value, and identity salience could also influence willingness to pay through customer satisfaction.","PeriodicalId":286828,"journal":{"name":"2020 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"50 1-5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132186607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Implementation of YOLO and Smoke Sensor for Automating Public Service Announcement of Cigarette's Hazard in Public Facilities 实施YOLO和烟雾传感器在公共设施中自动发布香烟危害公共服务
2020 International Conference on Information Technology Systems and Innovation (ICITSI) Pub Date : 2020-10-19 DOI: 10.1109/ICITSI50517.2020.9264972
Lathifah Arief, A. Tantowi, Nefy Puteri Novani, T. Sundara
{"title":"Implementation of YOLO and Smoke Sensor for Automating Public Service Announcement of Cigarette's Hazard in Public Facilities","authors":"Lathifah Arief, A. Tantowi, Nefy Puteri Novani, T. Sundara","doi":"10.1109/ICITSI50517.2020.9264972","DOIUrl":"https://doi.org/10.1109/ICITSI50517.2020.9264972","url":null,"abstract":"Smoking in public facilities is one of the most unwanted behaviours that shall be given serious and continuous approaches. Using automation-based approaches, nowadays, a common technique used is using detectors which trigger an alarm upon detecting smoke. While this approach is better than none, it is more detective than preventive and is still lacking awareness-stimulation. This research aims to propose a more comprehensive solution. A real-time alert is not only triggered when the system detects a certain level of smoke, but also when it recognizes cigarette objects, to add the preventive purpose. Not only a buzzer is triggered, upon detection of either smoke or cigarette or both, a public service announcement (PSA) is also automatically displayed to provide education about smoking's hazard to conduct responsible behavior in public facilities. The system combines the concepts of embedded systems and deep learning. The process consists of a continuous monitoring of smoke level from several sensors reading and also a continuous cigarette object detection using YOLO. The outputs are two binary digits that will role as the inputs for an OR operation which results in the bit required to trigger an anti-smoking PSA and a buzzer. The system consists of a Raspberry Pi 4B 4GB, smoke sensors, a camera module as the visual input device, a monitor, and also a buzzer. The results show that the system is able to perform in a semi indoor environment for detecting both smoke and cigarette then automating an alert and a PSA in a soft real-time manner.","PeriodicalId":286828,"journal":{"name":"2020 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133083001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An Empirical Study: Computer-Mediated Communication and Collaboration among Government Employees during Flexible Working Arrangements 弹性工作制下政府雇员计算机媒介沟通与协作的实证研究
2020 International Conference on Information Technology Systems and Innovation (ICITSI) Pub Date : 2020-10-19 DOI: 10.1109/ICITSI50517.2020.9264968
E. Sirait, Cut Medika Zellatifanny
{"title":"An Empirical Study: Computer-Mediated Communication and Collaboration among Government Employees during Flexible Working Arrangements","authors":"E. Sirait, Cut Medika Zellatifanny","doi":"10.1109/ICITSI50517.2020.9264968","DOIUrl":"https://doi.org/10.1109/ICITSI50517.2020.9264968","url":null,"abstract":"During the Covid-19 pandemic, the implementation of flexible working arrangements (FWA) became a trend and necessity in many work forces, including government offices. The success of FWA is affected by many factors; one of them is the effective computer-mediated communication and collaboration. This study examines the patterns and the effectiveness of computer-mediated communication and collaboration among government employees, cases in the Ministry of Communication and Informatics, during their working experience with flexible arrangement. Using quantitative approach, the data is collected through a survey to 745 employees, in June 2020. The results show that all employees have used instant messaging and online meeting applications to communicate during flexible working. Moreover, majority of the employees also have used office e-mail and document sharing tool to correspondence and collaborate remotely. Even though most employees consider that communication and coordination through information and communication technology is easy and clear, it has not been able to replace fully face-to-face meetings. Some recommendations are given to result in more effective computer-mediated communication and collaboration among government employees to support flexible working arrangements.","PeriodicalId":286828,"journal":{"name":"2020 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124110772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Defining Trust in Computation 定义计算中的信任
2020 International Conference on Information Technology Systems and Innovation (ICITSI) Pub Date : 2020-10-19 DOI: 10.1109/ICITSI50517.2020.9264918
D. E. Saputra
{"title":"Defining Trust in Computation","authors":"D. E. Saputra","doi":"10.1109/ICITSI50517.2020.9264918","DOIUrl":"https://doi.org/10.1109/ICITSI50517.2020.9264918","url":null,"abstract":"The concept of trust has become a prevalent concept in modern IT. Due to the rising of cloud computing, IoT, and social network, computer interaction has become more common. However, trust is still defined differently across those domains. It has various definition and computation method that can make understanding concept of trust difficult. This paper provides a formal description of trust that can be used to describe trust in more unified way. The formalization is constructed by using systematic literature review. Trust is defined as a Trustor’s level of confidence in regard to the ability of a Trustee to provide expected result in an interaction between Trustor and Trustee. This definition provides a base to a more detailed formal description about trust form and computation. The formal definition is shown to be able to explain implementation of two trust model in cloud computing and social network.","PeriodicalId":286828,"journal":{"name":"2020 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129592338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Control Plane and Data Plane Issues in Network Layer Multipathing 网络层多路径中的控制平面和数据平面问题
2020 International Conference on Information Technology Systems and Innovation (ICITSI) Pub Date : 2020-10-19 DOI: 10.1109/ICITSI50517.2020.9264915
Mohsin Khalil, Sohaib Khan
{"title":"Control Plane and Data Plane Issues in Network Layer Multipathing","authors":"Mohsin Khalil, Sohaib Khan","doi":"10.1109/ICITSI50517.2020.9264915","DOIUrl":"https://doi.org/10.1109/ICITSI50517.2020.9264915","url":null,"abstract":"Path redundancy at network layer is necessary in communication networks to ensure high network efficiency and fault tolerance. Single path routing may cause route oscillations in addition to becoming a throughput bottleneck. In order to ensure link reliability and prevention from routing oscillations, the availability of multiple paths becomes an absolute necessity. However, the design issues related to multipathing need to be resolved first for optimum network performance, especially for future networks with separated control and data planes. In this work, we outline the control plane and data plane issues associated with network layer multipathing in light of existing literature. We explore two control plane problems pertaining to route calculation and routing metric selection with regards to multipathing and gauge the options at hand. Furthermore, we expatiate three data plane multipathing issues encompassing load balancing, path quantification and their concurrent/backup usage for wired as well as wireless scenarios.","PeriodicalId":286828,"journal":{"name":"2020 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122563011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Implementation Of Convolutional Neural Network (CNN) Algorithm For Classification Of Human Facial Expression In Indonesia 卷积神经网络(CNN)算法在印度尼西亚用于人脸表情分类的实现
2020 International Conference on Information Technology Systems and Innovation (ICITSI) Pub Date : 2020-10-19 DOI: 10.1109/ICITSI50517.2020.9264940
Aqil Bayu Jala, T. Purboyo, Ratna Astuti Nugrahaeni
{"title":"Implementation Of Convolutional Neural Network (CNN) Algorithm For Classification Of Human Facial Expression In Indonesia","authors":"Aqil Bayu Jala, T. Purboyo, Ratna Astuti Nugrahaeni","doi":"10.1109/ICITSI50517.2020.9264940","DOIUrl":"https://doi.org/10.1109/ICITSI50517.2020.9264940","url":null,"abstract":"Emotional expression is an effort made by someone to communicate the status of feelings or emotions in response to certain situations both internal and external as seen from biological changes, physiological and a series of actions like attitudes and behaviors oriented toward goal-oriented. Although humans can recognize expressions very well, facial recognition research is continuing to improve the quality of expression recognition in human and computer interactions. In this study discusses the detection of human facial expressions using the Convolution Neural Network (CNN) method with the Indonesian Mixed Emotion Dataset (IMED), in this algorithm there are two methods in a series namely convolution as feature extraction and neural network as classification. To facilitate the extraction of features, the researcher does preprocessing. The preprocessing stage is face detection, cropping, resizing and grayscaling. To overcome overfitting, in this study, data augmentation was performed on training data and also test data. The results of experiments in this study that the Convolution Neural Network (CNN) algorithm can recognize human facial expressions with an accuracy rate of 93.63% of the 110 expressions tested.","PeriodicalId":286828,"journal":{"name":"2020 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115725704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信