Jurnal Sistem Informasi最新文献

筛选
英文 中文
Prioritizing Critical Success Factors of Requirements Engineering using Analytical Hierarchy Process 使用层次分析法确定需求工程关键成功因素的优先级
Jurnal Sistem Informasi Pub Date : 2023-04-05 DOI: 10.21609/jsi.v19i1.1197
I. Eitiveni, Hardyn Alexander Hutapea
{"title":"Prioritizing Critical Success Factors of Requirements Engineering using Analytical Hierarchy Process","authors":"I. Eitiveni, Hardyn Alexander Hutapea","doi":"10.21609/jsi.v19i1.1197","DOIUrl":"https://doi.org/10.21609/jsi.v19i1.1197","url":null,"abstract":"Requirements engineering is not as straightforward as asking stakeholders what they want the information systems to do. In most cases, their vision tends to be limited by the status quo. Eliciting a complete set of requirements that fulfil every gap and withstand scrutiny during validation is challenging. Hence, it is important to consider various factors influencing the success of requirements engineering. This paper identifies and prioritizes multiple critical success factors of requirements engineering using the Analytical Hierarchy Process. The initial model was developed from literature review and validated using evidence from an empirical study. Quantitative data was collected through a questionnaire and then analyzed to rank the success criteria and critical success factors. The results show that the user satisfaction is the most important success criterion, while the clear definition of project scopes and goals is the most critical factor for the success of requirements engineering.","PeriodicalId":32357,"journal":{"name":"Jurnal Sistem Informasi","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46558587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Users’ Intention to Use Mobile Health Applications for Personal Health Tracking 用户使用移动健康应用跟踪个人健康的意向
Jurnal Sistem Informasi Pub Date : 2023-04-05 DOI: 10.21609/jsi.v19i1.1196
Galuh Octavia Chrisdianti, P. W. Handayani, F. Azzahro, S. Yudhoatmojo
{"title":"Users’ Intention to Use Mobile Health Applications for Personal Health Tracking","authors":"Galuh Octavia Chrisdianti, P. W. Handayani, F. Azzahro, S. Yudhoatmojo","doi":"10.21609/jsi.v19i1.1196","DOIUrl":"https://doi.org/10.21609/jsi.v19i1.1196","url":null,"abstract":"This study aimed to analyze factors influencing the intention to use mobile health applications for personal health tracking (PHT). The respondents were 516 individuals who had used a PHT application, such as Samsung Health, iOS Health, or MiFit. Data processing was done via using partial least squares–structural equation modeling (PLS-SEM). This study uncovered factors that can affect intention to use PHT applications, including perceived usefulness, social influence, facilitating conditions, hedonic motivation, habits, performance risk, and self-health awareness. It was found that perceived ease of use and self-reported health condition do not affect the intention to use PHT applications. This study can provide guidance on PHT application service providers for ensuring data accuracy, increasing user satisfaction when using the applications, and preventing privacy violation.","PeriodicalId":32357,"journal":{"name":"Jurnal Sistem Informasi","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46212003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Indonesian Adaptation of The Students’ Preparedness for University e-Learning Environment Questionnaire 印尼学生对大学电子学习环境准备情况的适应性调查
Jurnal Sistem Informasi Pub Date : 2023-04-05 DOI: 10.21609/jsi.v19i1.1213
K. Junus, Lia Sadita, T. Siswantining, Diana Nur Vitasari
{"title":"An Indonesian Adaptation of The Students’ Preparedness for University e-Learning Environment Questionnaire","authors":"K. Junus, Lia Sadita, T. Siswantining, Diana Nur Vitasari","doi":"10.21609/jsi.v19i1.1213","DOIUrl":"https://doi.org/10.21609/jsi.v19i1.1213","url":null,"abstract":"Although most students are digital natives, online learning requires different skills as compared to conventional face-to-face learning. This paper aims to adapt and test the reliability and validity of the Students’ Preparedness for the University e-Learning Environment questionnaire developed by Parkes et al. into Bahasa Indonesia.  The original questionnaire covers a wide range of competencies relevant to e-learning preparedness for university e-learning environments in three dimensions. Prior to reliability and validity checking, pilot testing is conducted to test the unidimesionality of the instrument and the rating scale. An item-match analysis test is also carried out to observe the suitability of each item. Then, the final version of the questionnaire is administered to a large representative sample of respondents for whom the questionnaire is intended. The results show that, with a total of 1446 students from a public university in Indonesia as respondents, the adapted questionnaire is valid and reliable.","PeriodicalId":32357,"journal":{"name":"Jurnal Sistem Informasi","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46022587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Acceptance Analysis of The Electronic Kohort Information System for Maternal and Child Health (MCH) Using the Technology Acceptance Model (TAM) Method at the Bima City Health Centers 采用技术接受模型(TAM)方法对比马市卫生院妇幼保健电子短信息系统(MCH)的接受度分析
Jurnal Sistem Informasi Pub Date : 2023-04-05 DOI: 10.21609/jsi.v19i1.1207
Hizriansyah
{"title":"Acceptance Analysis of The Electronic Kohort Information System for Maternal and Child Health (MCH) Using the Technology Acceptance Model (TAM) Method at the Bima City Health Centers","authors":"Hizriansyah","doi":"10.21609/jsi.v19i1.1207","DOIUrl":"https://doi.org/10.21609/jsi.v19i1.1207","url":null,"abstract":"The Maternal and Child Health (MCH) Program in Indonesia is faced with a diversity of achievements between regions caused by disparities in the capacity of the health system and exacerbated by the Covid-19 pandemic which has caused a decrease in service activities and reporting quality so that digitalization of services is needed.  This type of research is qualitative research with the design of phenomenological studies using thematic analysis with the help of the Nvivo 12 application. Primary data collection was carried out by means of observation and in-depth interviews with research informants by purposive sampling. To increase the credibility of the data use source triangulation. The research informants consisted of the head of the family health services section, the head of the health centers and the midwife as the user of the e-cohort.  Thirteen informants (11 women and 2 men) participated in the study. Most informants can use the core functions of the e-cohort app navigation menu. The study proposes that the perceived perception of ease of use may not be in line with the perceived expediency of explaining variations in the successful acceptance of MCH e-cohort applications. The study also found that there were differences in outcomes between user perceptions at the operational level and policy makers at the managerial level. In general, the analysis collects several types of obstacles and potentially problems that negatively affect the usefulness of the e-cohort application : not being able to make the work of midwives easier and faster, ineffective and not so much to increase the productivity of performance. With regard to ease of use, users feel that the e-cohort can be easily learned and used.  The e-cohort is considered to have value as a system that makes the work of midwives more difficult and hinders the work, however, the appearance, elements, features and design are perceived to be quite easy to use. In addition, users also highlight the need to consider how the system can be implemented in order to minimize the impact and optimize usability","PeriodicalId":32357,"journal":{"name":"Jurnal Sistem Informasi","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42096363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Integrated Information and Communication Media Based on Organization Goal-Oriented Requirement Engineering (OGORE) 基于组织目标导向需求工程(OGORE)的信息通信集成媒体
Jurnal Sistem Informasi Pub Date : 2023-04-05 DOI: 10.21609/jsi.v19i1.1198
F. M. H. Tjiptabudi
{"title":"Integrated Information and Communication Media Based on Organization Goal-Oriented Requirement Engineering (OGORE)","authors":"F. M. H. Tjiptabudi","doi":"10.21609/jsi.v19i1.1198","DOIUrl":"https://doi.org/10.21609/jsi.v19i1.1198","url":null,"abstract":"The BPD NTT pension fund is a company incorporated as a legal entity that manages and runs a pension benefit program for BPD NTT employees. In its current business process, BPD NTT does not yet have a capable media to accommodate the information and communication needs of participants and interested parties, as a business branding and service facility for the participants. The problem that occurs is in the need elicitation stage when developing the information and communication media. For example, if the development is carried out by applying the Global eXtreme Programming (GXP) model, in the exploration phase the Organizational Goal-Oriented Requirement Engineering (OGORE) method will be applied to elicit needs that base each activity on organizational goals. The results of the research are in the form of web-based information and communication media modeling based on IT goals which are described in various tasks equipped with actors and resources used as well as KPIs that are integrated into each goal.","PeriodicalId":32357,"journal":{"name":"Jurnal Sistem Informasi","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43823588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of the C4.5 Algorithm to Predict the Effectiveness of Google Adwords Ads C4.5算法在Google Adwords广告效果预测中的应用
Jurnal Sistem Informasi Pub Date : 2023-01-31 DOI: 10.32520/stmsi.v12i1.1978
Aditya Gusti, Sri Hadianti
{"title":"Application of the C4.5 Algorithm to Predict the Effectiveness of Google Adwords Ads","authors":"Aditya Gusti, Sri Hadianti","doi":"10.32520/stmsi.v12i1.1978","DOIUrl":"https://doi.org/10.32520/stmsi.v12i1.1978","url":null,"abstract":"Google Adswords is a product that you can use to promote your business, help sell products or services, raise awareness, and increase traffic to your site. Nayaka Technology is currently using the services of Google Adswords as a way to boost sales and expand the network. However, because broadcast planning was not carried out in advance, the results obtained were not satisfactory. In the next campaign, planning will be carried out first using the history on the previous campaign's broadcast reports, the data is processed using data mining techniques to predict the market. The model used is the C4.5 algorithm, the results of the C4.5 algorithm model are tested using a confusion matrix and get 92.70% of accuracy, 78.23% of precision and 97.25% of recall. Keywords: Google Adswords, Algoritma C4.5, Data Mining .","PeriodicalId":32357,"journal":{"name":"Jurnal Sistem Informasi","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135306485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Malware Detection on Local Network based on Honeypot and Yara 基于Honeypot和Yara的本地网络恶意软件检测
Jurnal Sistem Informasi Pub Date : 2023-01-31 DOI: 10.32520/stmsi.v12i1.2432
Nur Rohman Rosyid, Budi Bayu Murti, Brama Prayudha, Arul Ferian Ramadloni, Lukman Subekti
{"title":"Malware Detection on Local Network based on Honeypot and Yara","authors":"Nur Rohman Rosyid, Budi Bayu Murti, Brama Prayudha, Arul Ferian Ramadloni, Lukman Subekti","doi":"10.32520/stmsi.v12i1.2432","DOIUrl":"https://doi.org/10.32520/stmsi.v12i1.2432","url":null,"abstract":"The malware threats have never subsided, even the trend shows an increase and varies along with the development of hardware and software technology. End user may not realize if their machine is compromised by malware. It could be the anti-malware mechanism is not working properly, such as the anti-virus is not updated or there is a zero-day attack. Therefore, it is necessary to detect the presence of malware on end-systems devices or the existence of zero-day attack in the local network. Implementation of honeypot as a security sensor that collects malware attack data in the form of malware files and malware hashes can be used as signatures for scanning and detecting malware. This research utilizes a honeypot as a security sensor to catching malware. The malware hash from the honeypot is used to scanning and detecting the presence of malware on the end-system in a local network such as a PC or server. Furthermore, Yara helps clarify the type of malware found by scanning suspected files. The results of scanning and detecting of malware by Yara will be reported to the appropriate authorities via Telegram application channles. This research contributes by providing early warning of potential security threats to the network and collecting hash code of recently malware attacking to the network. Keywords: Honeypot, Malware, Yara, Proactive Security .","PeriodicalId":32357,"journal":{"name":"Jurnal Sistem Informasi","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135306322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Usability Analysis using Usefulness, Satisfaction, and Ease-of-Use Questionnaire on the Digital Banking 数字银行可用性、满意度和易用性问卷分析
Jurnal Sistem Informasi Pub Date : 2023-01-31 DOI: 10.32520/stmsi.v12i1.2396
Carolina Rachel Pirie, Johan J. C. Tambotoh
{"title":"Usability Analysis using Usefulness, Satisfaction, and Ease-of-Use Questionnaire on the Digital Banking","authors":"Carolina Rachel Pirie, Johan J. C. Tambotoh","doi":"10.32520/stmsi.v12i1.2396","DOIUrl":"https://doi.org/10.32520/stmsi.v12i1.2396","url":null,"abstract":"In order to give a seamless transaction, particularly during COVID-19 pandemic, private and public bank institution in Indonesia released digital banking application that is easier to use by smartphone. Nonetheless, there are several complaints from the customer regarding the dissatisfying experience of using digital banking apps. Hence, this research aims to analyze the effect of usability in user experience on customer satisfaction based on 4 variables namely Usefulness, Ease-of-Use, Ease-of-Learning as independent variables, and Satisfaction as a dependent variable on the USE Questionnaire. These variables can be used as references to usability enhancement for digital banking apps to give quality services to customers and be able to compete with competitors. Behavioral Science Research (BSR) is the approach used in this research using the quantitative method. The statistical method used in this research is multiple linear regression analysis. The result of this research shows that 1 out of 4 research hypotheses is rejected (Hypothesis 3) proving that there is no effect of the Ease-of-Learning variable on the Satisfaction variable. However, the value of the t-calculated of Ease-of-Learning variable is 2,478 nearly approach the value of t-table 2,600 showing that this variable is almost capable to give the effect of the Satisfaction variable.","PeriodicalId":32357,"journal":{"name":"Jurnal Sistem Informasi","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135306487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementation of Business Modeling Canvas (BMC) and Unified Modelling Language (UML) for Android-based Application 基于android应用程序的业务建模画布(BMC)和统一建模语言(UML)的实现
Jurnal Sistem Informasi Pub Date : 2023-01-31 DOI: 10.32520/stmsi.v12i1.1822
Fajar Akbar, Dedi Saputra, Irwan Agus Sobari Sobari, Erna Agustine
{"title":"Implementation of Business Modeling Canvas (BMC) and Unified Modelling Language (UML) for Android-based Application","authors":"Fajar Akbar, Dedi Saputra, Irwan Agus Sobari Sobari, Erna Agustine","doi":"10.32520/stmsi.v12i1.1822","DOIUrl":"https://doi.org/10.32520/stmsi.v12i1.1822","url":null,"abstract":"The development of digital in indonesia is shown from the increasing demand of computers use, and mobile Application. The development technology has an impact on changes in many human habits , especially in human's lifestyles.In this era People’s can get everything efficiently and effectively except in needs of foods. People can use VeggieFun for fulfillment fruits and vegetables needs. VeggieFun provides convenience people’s to order and buy fruits dan vegetables without go to market. As an application for comercial used, VeegieFun use bussines model and UML methode for development and implementation VeegieFun aplication. With a Bussines With Bussines Model Canvas (BMC) we can more get analiysis from bussines model and using UML In development of veggiefun applicationt for simplify the stages of implementation and development an application . Keyword : Busines Modeling Canvas, Unified Modelling Language , Application","PeriodicalId":32357,"journal":{"name":"Jurnal Sistem Informasi","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135306482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementation of JSON Web Token on Authentication with HMAC SHA-256 Algorithm 基于HMAC SHA-256算法的JSON Web令牌认证实现
Jurnal Sistem Informasi Pub Date : 2023-01-31 DOI: 10.32520/stmsi.v12i1.2450
Ficry Cahya Ramdani, Alam Rahmatulloh, S.T., M.T., MCE. (SCOPUS ID=57210469316), Rahmi Nur Shofa
{"title":"Implementation of JSON Web Token on Authentication with HMAC SHA-256 Algorithm","authors":"Ficry Cahya Ramdani, Alam Rahmatulloh, S.T., M.T., MCE. (SCOPUS ID=57210469316), Rahmi Nur Shofa","doi":"10.32520/stmsi.v12i1.2450","DOIUrl":"https://doi.org/10.32520/stmsi.v12i1.2450","url":null,"abstract":"The rapid growth of information technology is influenced by globalization to accelerate access to information. This creates new problems, as differences must produce relevant information. Of course, system integration will be required. Web Service is a system integration solution that does not consider the platform, architecture, or programming language used in different sources. The security of web service is considered not yet implemented. The JSON Web Token (JWT) technology is an authentication mechanism for web service and will have a significant impact on data security. This implementation optimizes JWT security with the HMAC SHA-256 algorithm. Testing is conducted on two information systems by comparing the performance size when JWT technology is applied to Tim Bebersih Masjid Information System. The results show that the implementation of JWT on Windows Server 2019 (VM) is 462.8 ms with an average data size of 8.59 kb. Testing on the Windows 10 operating system obtained an average speed of 216.25 ms with an average data size of 8.59 kb. The result on Windows Server 2019 (VM) from the JWT performance test itself obtained the highest result, due to the use of virtual machine which is considered to consume a lot of RAM, resulting in performance that is 2 times higher. Keywords: Algorithm, HMAC SHA-256, JSON Web Token, Web Service, Virtual Machine","PeriodicalId":32357,"journal":{"name":"Jurnal Sistem Informasi","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135306483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信