Punto Widharto, Adam Imansyah Pandesenda, A. Yahya, Eki Aidio Sukma, M. R. Shihab, B. Ranti
{"title":"Digital Transformation of Indonesia Banking Institution: Case Study of PT. BRI Syariah","authors":"Punto Widharto, Adam Imansyah Pandesenda, A. Yahya, Eki Aidio Sukma, M. R. Shihab, B. Ranti","doi":"10.1109/ICITSI50517.2020.9264935","DOIUrl":"https://doi.org/10.1109/ICITSI50517.2020.9264935","url":null,"abstract":"Competition in the financial services industry has now entered the digital era, where banks are competing to carry out digital transformation. The survey results from PwC in 2018 stated that of the banks surveyed, including regional development banks, joint venture banks, and local banks, as many as 66% had indicated the digital strategy as part of the company's strategy. Digitalization can result in savings in human resources and all costs associated with them, which increases competition. This research discusses the digital transformation carried out by one of the banks in Indonesia, what is the role and impact of IT on digitalization carried out and the extent to which digitalization has been carried out in the bank. The results of the research show that IT has a big role in the digital transformation that exists in organizations, but that does not yet make an organization a digital bank.","PeriodicalId":286828,"journal":{"name":"2020 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130476155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"HTTPS Contribution in Web Application Security: A Systematic Literature Review","authors":"F. Wijitrisnanto, Suhardi, Purnomo Yustianto","doi":"10.1109/ICITSI50517.2020.9264971","DOIUrl":"https://doi.org/10.1109/ICITSI50517.2020.9264971","url":null,"abstract":"A Web application is one of the most used technology nowadays due to its flexibility in delivering services to society. It also plays a good portion in enhancing our daily life since it could provide almost any kind of services through an application served from the internet. Thus, many users’ private information runs the risk of being exposed to an unauthorized party. Standard browser connection uses HTTPS protocol, while both TLS over HTTP and Web application are known for several of vulnerabilities. This paper presents the results of an SLR study on web application security of HTTPS implementation. The study selects 45 qualified papers related to the topic and analyzed 24 of the documents. The findings are categorized into three labels: threats, threats impact, and defense mechanisms. This work also classifies the attack and threats based on the impact produced. In this study, the lack of understanding about security-related mechanism in TLS, session management, and web application still become the culprit of most attack and vulnerability. Based on this work, a researcher could better prioritize and prepare security mechanism to overcome the threats.","PeriodicalId":286828,"journal":{"name":"2020 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129499200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ICITSI 2020 Breaker Page","authors":"","doi":"10.1109/icitsi50517.2020.9264909","DOIUrl":"https://doi.org/10.1109/icitsi50517.2020.9264909","url":null,"abstract":"","PeriodicalId":286828,"journal":{"name":"2020 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133916549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ICITSI 2020 Index","authors":"","doi":"10.1109/icitsi50517.2020.9264925","DOIUrl":"https://doi.org/10.1109/icitsi50517.2020.9264925","url":null,"abstract":"","PeriodicalId":286828,"journal":{"name":"2020 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134225100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
F. Azzahro, Joshua Valdamer Ghibran, P. W. Handayani
{"title":"Customer Satisfaction and Willingness to Pay OnDemand Entertainment Streaming Service: The Role of Service Quality and Perceived Values","authors":"F. Azzahro, Joshua Valdamer Ghibran, P. W. Handayani","doi":"10.1109/ICITSI50517.2020.9264953","DOIUrl":"https://doi.org/10.1109/ICITSI50517.2020.9264953","url":null,"abstract":"This research aims to analyze the factors affecting users’ willingness to pay for subscription-based OnDemand streaming service in Indonesia. These factors are derived from the perceived values and electronic subscription service quality (ESSQUAL) theory. This research uses a quantitative approach with a total of 726 valid collected respondents who are current/former users of one or more OES services in Indonesia. The data collected within this research is analyzed using partial least squares structural equation modeling (PLS-SEM) method by utilizing SmartPLS version 3 as the tool. This research found that the factors of quality of accessibility, monetary value, and identity salience directly influence willingness to pay. Meanwhile, quality of content, quality of experience, perceived enjoyment, monetary value, and identity salience could also influence willingness to pay through customer satisfaction.","PeriodicalId":286828,"journal":{"name":"2020 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"50 1-5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132186607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lathifah Arief, A. Tantowi, Nefy Puteri Novani, T. Sundara
{"title":"Implementation of YOLO and Smoke Sensor for Automating Public Service Announcement of Cigarette's Hazard in Public Facilities","authors":"Lathifah Arief, A. Tantowi, Nefy Puteri Novani, T. Sundara","doi":"10.1109/ICITSI50517.2020.9264972","DOIUrl":"https://doi.org/10.1109/ICITSI50517.2020.9264972","url":null,"abstract":"Smoking in public facilities is one of the most unwanted behaviours that shall be given serious and continuous approaches. Using automation-based approaches, nowadays, a common technique used is using detectors which trigger an alarm upon detecting smoke. While this approach is better than none, it is more detective than preventive and is still lacking awareness-stimulation. This research aims to propose a more comprehensive solution. A real-time alert is not only triggered when the system detects a certain level of smoke, but also when it recognizes cigarette objects, to add the preventive purpose. Not only a buzzer is triggered, upon detection of either smoke or cigarette or both, a public service announcement (PSA) is also automatically displayed to provide education about smoking's hazard to conduct responsible behavior in public facilities. The system combines the concepts of embedded systems and deep learning. The process consists of a continuous monitoring of smoke level from several sensors reading and also a continuous cigarette object detection using YOLO. The outputs are two binary digits that will role as the inputs for an OR operation which results in the bit required to trigger an anti-smoking PSA and a buzzer. The system consists of a Raspberry Pi 4B 4GB, smoke sensors, a camera module as the visual input device, a monitor, and also a buzzer. The results show that the system is able to perform in a semi indoor environment for detecting both smoke and cigarette then automating an alert and a PSA in a soft real-time manner.","PeriodicalId":286828,"journal":{"name":"2020 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133083001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Empirical Study: Computer-Mediated Communication and Collaboration among Government Employees during Flexible Working Arrangements","authors":"E. Sirait, Cut Medika Zellatifanny","doi":"10.1109/ICITSI50517.2020.9264968","DOIUrl":"https://doi.org/10.1109/ICITSI50517.2020.9264968","url":null,"abstract":"During the Covid-19 pandemic, the implementation of flexible working arrangements (FWA) became a trend and necessity in many work forces, including government offices. The success of FWA is affected by many factors; one of them is the effective computer-mediated communication and collaboration. This study examines the patterns and the effectiveness of computer-mediated communication and collaboration among government employees, cases in the Ministry of Communication and Informatics, during their working experience with flexible arrangement. Using quantitative approach, the data is collected through a survey to 745 employees, in June 2020. The results show that all employees have used instant messaging and online meeting applications to communicate during flexible working. Moreover, majority of the employees also have used office e-mail and document sharing tool to correspondence and collaborate remotely. Even though most employees consider that communication and coordination through information and communication technology is easy and clear, it has not been able to replace fully face-to-face meetings. Some recommendations are given to result in more effective computer-mediated communication and collaboration among government employees to support flexible working arrangements.","PeriodicalId":286828,"journal":{"name":"2020 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124110772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Defining Trust in Computation","authors":"D. E. Saputra","doi":"10.1109/ICITSI50517.2020.9264918","DOIUrl":"https://doi.org/10.1109/ICITSI50517.2020.9264918","url":null,"abstract":"The concept of trust has become a prevalent concept in modern IT. Due to the rising of cloud computing, IoT, and social network, computer interaction has become more common. However, trust is still defined differently across those domains. It has various definition and computation method that can make understanding concept of trust difficult. This paper provides a formal description of trust that can be used to describe trust in more unified way. The formalization is constructed by using systematic literature review. Trust is defined as a Trustor’s level of confidence in regard to the ability of a Trustee to provide expected result in an interaction between Trustor and Trustee. This definition provides a base to a more detailed formal description about trust form and computation. The formal definition is shown to be able to explain implementation of two trust model in cloud computing and social network.","PeriodicalId":286828,"journal":{"name":"2020 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129592338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Control Plane and Data Plane Issues in Network Layer Multipathing","authors":"Mohsin Khalil, Sohaib Khan","doi":"10.1109/ICITSI50517.2020.9264915","DOIUrl":"https://doi.org/10.1109/ICITSI50517.2020.9264915","url":null,"abstract":"Path redundancy at network layer is necessary in communication networks to ensure high network efficiency and fault tolerance. Single path routing may cause route oscillations in addition to becoming a throughput bottleneck. In order to ensure link reliability and prevention from routing oscillations, the availability of multiple paths becomes an absolute necessity. However, the design issues related to multipathing need to be resolved first for optimum network performance, especially for future networks with separated control and data planes. In this work, we outline the control plane and data plane issues associated with network layer multipathing in light of existing literature. We explore two control plane problems pertaining to route calculation and routing metric selection with regards to multipathing and gauge the options at hand. Furthermore, we expatiate three data plane multipathing issues encompassing load balancing, path quantification and their concurrent/backup usage for wired as well as wireless scenarios.","PeriodicalId":286828,"journal":{"name":"2020 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122563011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aqil Bayu Jala, T. Purboyo, Ratna Astuti Nugrahaeni
{"title":"Implementation Of Convolutional Neural Network (CNN) Algorithm For Classification Of Human Facial Expression In Indonesia","authors":"Aqil Bayu Jala, T. Purboyo, Ratna Astuti Nugrahaeni","doi":"10.1109/ICITSI50517.2020.9264940","DOIUrl":"https://doi.org/10.1109/ICITSI50517.2020.9264940","url":null,"abstract":"Emotional expression is an effort made by someone to communicate the status of feelings or emotions in response to certain situations both internal and external as seen from biological changes, physiological and a series of actions like attitudes and behaviors oriented toward goal-oriented. Although humans can recognize expressions very well, facial recognition research is continuing to improve the quality of expression recognition in human and computer interactions. In this study discusses the detection of human facial expressions using the Convolution Neural Network (CNN) method with the Indonesian Mixed Emotion Dataset (IMED), in this algorithm there are two methods in a series namely convolution as feature extraction and neural network as classification. To facilitate the extraction of features, the researcher does preprocessing. The preprocessing stage is face detection, cropping, resizing and grayscaling. To overcome overfitting, in this study, data augmentation was performed on training data and also test data. The results of experiments in this study that the Convolution Neural Network (CNN) algorithm can recognize human facial expressions with an accuracy rate of 93.63% of the 110 expressions tested.","PeriodicalId":286828,"journal":{"name":"2020 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115725704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}