{"title":"Analysis of Knowledge Management Readiness in PT Artajasa Pembayaran Elektronis","authors":"Deden Artini, Theresia Wati, S. Afrizal","doi":"10.1109/ICIMCIS51567.2020.9354308","DOIUrl":"https://doi.org/10.1109/ICIMCIS51567.2020.9354308","url":null,"abstract":"PT Artajasa Pembayaran Elektronis is a pioneer in the electronic transaction market in Indonesia, with a mission to provide effective and efficient electronic transaction services. PT Artajasa Pembayaran Elektronis must understand the diverse needs of partners and customers. For this reason, staff are required to be able to share training and special consultations for management team mentoring to their partners. To be able to improve service to partners requires knowledge and experience of employees so that knowledge is not lost, knowledge management is needed to convey, capture, create, and carry out the sharing process. However, based on previous studies, not many organizations have successfully implemented knowledge management, including this company, so it is necessary to measure the level of readiness (knowledge management readiness). This study aims to assess the readiness of PT Artajasa Pembayaran Elektronis in implementing knowledge management. The method used to assess the level of readiness is by mapping the critical success factors of knowledge management (KMCSF) and mapping the knowledge management infrastructure into the aspects of knowledge management (abstract, soft and hard). The results showed that PT Artajasa Pembayaran Elektronis got a score of 74.82 out of 100 points, it can be concluded that the organization is representative for implementing knowledge management, especially for abilities and expertise.","PeriodicalId":441670,"journal":{"name":"2020 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124912754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Y. El-Ebiary, Seita Almandeel, W. Ghanem, Waheeb Abu-ulbeh, M. M. M. Al-Dubai, Samer Bamansoor
{"title":"Security Issues and Threats Facing the Electronic Enterprise Leadership","authors":"Y. El-Ebiary, Seita Almandeel, W. Ghanem, Waheeb Abu-ulbeh, M. M. M. Al-Dubai, Samer Bamansoor","doi":"10.1109/ICIMCIS51567.2020.9354330","DOIUrl":"https://doi.org/10.1109/ICIMCIS51567.2020.9354330","url":null,"abstract":"the explosion if e.-commerce businesses have seen the growth if number if the online businesses worldwide. Consumers nowadays are opted with inline business commerce which is inconsiderably inconvenience compared to traditional transactions. Deniably, e.-commerce enterprises offer more benefits, comparing to “bricks-andmortal” traditional enterprises, but not to be missed the issues and challenges faced by the e-commerce enterprises. This study highlighted the issues and challenges of e-commerce and a set of proposed solutions to those issues and challenges. Among the issues are trust, readiness and security. For each of the issues and challenges, proposed solutions are presented.","PeriodicalId":441670,"journal":{"name":"2020 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127925110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ira Maryati, B. Purwandari, Harry Budi Santoso, I. Budi
{"title":"Implementation Strategies for Adopting Digital Library Research Support Services in Academic Libraries in Indonesia","authors":"Ira Maryati, B. Purwandari, Harry Budi Santoso, I. Budi","doi":"10.1109/ICIMCIS51567.2020.9354327","DOIUrl":"https://doi.org/10.1109/ICIMCIS51567.2020.9354327","url":null,"abstract":"Digital libraries play an essential role in supporting higher educations research. Therefore, Indonesia's academic libraries require digital library research support services and strategies to adopt such services quickly. Strategy design is carried out in three stages: a literature review using guidelines from the Preferred Reporting Items for Systematic Reviews and Meta-analyses (PRISMA) to determine indicators of research support services; a digital library survey to find out the implemented research support services in the top nine digital academic libraries in Indonesia; and gap analysis to establish strategies using the Technology-Organization-Environment (TOE) framework. The investigation shows Indonesian academic libraries have adopted few research support services. Libraries in implementing research support services experienced various obstacles. The recommended organization strategy focuses on research support services and partnerships with university research units. Regarding technology, academic libraries require developing a prototype of a digital library with research support service features. As for the environmental area, libraries need to assess user expectations for digital library research support services. Further research is required to validate the relationship between factors in an adoption model. A further study is conducted to develop a prototype of digital library research support services.","PeriodicalId":441670,"journal":{"name":"2020 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129925130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rizal Broer Bahaweres, Arif Imam Suroso, Alam Wahyu Hutomo, Indra Permana Solihin, I. Hermadi, Y. Arkeman
{"title":"Tackling Feature Selection Problems with Genetic Algorithms in Software Defect Prediction for Optimization","authors":"Rizal Broer Bahaweres, Arif Imam Suroso, Alam Wahyu Hutomo, Indra Permana Solihin, I. Hermadi, Y. Arkeman","doi":"10.1109/ICIMCIS51567.2020.9354282","DOIUrl":"https://doi.org/10.1109/ICIMCIS51567.2020.9354282","url":null,"abstract":"Software defect prediction is a way to improve quality by finding and tracking defective modules in the software which helps reduce costs during the software testing process. The use of machine learning methods for predicting software defects can be applied to predict defects in each software module. However, basically the software defect prediction dataset has two problems, namely class imbalance with very few defective modules compared to non-defective modules and contains noisy attributes due to irrelevant features. With these two problems, it will result in overfitting and lead to biased classification results so that it will have an impact on significantly reducing the performance of the machine learning model. In this study, we propose the implementation of bagging techniques and genetic algorithms to improve the classification performance of machine learning models in predicting software defects based Logistic Regression, Naive Bayes, SVM, KNN, Decision Tree. Bagging techniques and Genetic algorithms are approaches that can handle two main problems in software defects prediction, each of which can handle the class imbalance and feature selection problem. We used 6 NASA Promise datasets to evaluate the classification performance results based on AUC and G-Means values. The results using 10 cross-validations show that the proposed method can improve classification performance when compared to the original algorithm. The Decision Tree shows the highest performance of the 3 datasets tested, with the highest value of 94.61 % on the KC4 dataset. We also compare GA performance with another natural algorithm, Particle Swarm Optimization (PSO). The results show that the performance of all machine learning models with GA can outperform the algorithms with PSO","PeriodicalId":441670,"journal":{"name":"2020 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122457323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis and Design of Agricultural Marketplace Using User Experience","authors":"Pipit Rahmayanti, Yani Nurhadryani, I. Hermadi","doi":"10.1109/ICIMCIS51567.2020.9354292","DOIUrl":"https://doi.org/10.1109/ICIMCIS51567.2020.9354292","url":null,"abstract":"The marketplace is an e-business model that deals with sellers and buyers. In the agricultural sector, the market acts as a direct link between farmers and consumers. So that it can increase and benefit Indonesian farmers. The total users of the agricultural market currently only reach 100,000 users, which is very different from the total users of other general markets which have reached 50 million users. One of the reasons is that 60% of the time is wasted because many users have not yet obtained the information they are looking for. This has an impact on decreasing productivity until it fails. This study will design an agricultural marketplace application design with a User-Centered Design (UCD) approach. This method is a cycle stage starting from production to market applications by implementing quality market services. This production stage is carried out to become a measuring tool for marketplace design to match the standards set and made by the specifications of user requirements. Then the prototype design stage is carried out with a sketch, a wireframe, and the results of this design are implemented into a medium-fidelity prototype. In the evaluation stage of the medium-fidelity prototype, usability testing was carried out using the think-aloud method and the performance results were obtained with a success rate of 77.14%.","PeriodicalId":441670,"journal":{"name":"2020 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS)","volume":"1995 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131552397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation and evaluation of blockchain based e-voting system with Ethereum and Metamask","authors":"Deni Pramulia, Bayu Anggorojati","doi":"10.1109/ICIMCIS51567.2020.9354310","DOIUrl":"https://doi.org/10.1109/ICIMCIS51567.2020.9354310","url":null,"abstract":"The implementation of an electronic voting (e-voting) system which has begun to be widely applied in place of traditional electoral systems, still has a major problem in the level of trust results. E-voting systems are very vulnerable to manipulation issues, such as changes in election results due to hacking or by the electoral system maker. Centralized systems in a network result in data sources coming from one party having the right to store and to manage data sources. The issue of trust caused by a centralized data distribution system can be overcome by spreading data in a system network. Blockchain is a distributed ledger, where every party in the network has the same data source, and it has a powerful characteristic known as immutability which is very suitable for e-voting system. This research proposed a blockchain based e-voting system with Ethereum and metamask. We show that the proposed e-voting system fulfills six basic principles of an election system, namely secret ballot, one-man one-vote, voter eligibility, transparency, votes accurately, recorded and counted, and reliability. Furthermore, the performance evaluation of the e-voting system shows that the slow gas price option gives the lowest gas price per second result, i.e. the best trade-off.","PeriodicalId":441670,"journal":{"name":"2020 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123662512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparison of MySQL and MongoDB with focus on performance","authors":"Petr Filip, Lukás Cegan","doi":"10.1109/ICIMCIS51567.2020.9354307","DOIUrl":"https://doi.org/10.1109/ICIMCIS51567.2020.9354307","url":null,"abstract":"Almost every web application uses a database for storing data. Storing and retrieving data causes a delay between request to the system and its response. This has an impact on user-experience. The market offers many types of databases and each is more suitable for different types of applications. The main difference is in data-structures which are used for data storing. Data-structures directly influence the performance of the database system and all dependent systems. In this paper, an overview and brief comparison of four types of NoSql databases has been made. Next, benchmark comparing performance of MongoDb and MySQL in different situation are discussed. Benchmarks are focused on operations such as inserting, updating, and deleting data with transactions and without transactions. The added value of the benchmarks is evaluated in terms of cost of indexed fields in the abovementioned situations.","PeriodicalId":441670,"journal":{"name":"2020 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122681788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hybrid-Based Malware Analysis for Effective and Efficiency Android Malware Detection","authors":"R. B. Hadiprakoso, Herman Kabetta, I. K. S. Buana","doi":"10.1109/ICIMCIS51567.2020.9354315","DOIUrl":"https://doi.org/10.1109/ICIMCIS51567.2020.9354315","url":null,"abstract":"In the last decade, Android is the most widely used operating system. Despite this rapidly increasing popularity, Android is also a target for the spread of malware. Android admits the installation of applications from other unauthorized markets. This fact allows malware developers to place malicious apps and engage Android devices. So far, malware analysis and detection systems have been developed to use both static analysis and dynamic analysis. However, existing research is still lagging in the performance of detecting malware efficiently and accurately. For accurate malware detection, it often utilizes many resources from resource-limited mobile devices. Therefore, this research proposes a solution by developing and testing an efficient and accurate machine learning and deep learning model for this problem. We used the malware genome dataset and the Drebin project for static analysis and used the CICMalDroid dataset for dynamic analysis. From these two datasets, we extract 261 combined features of the hybrid analysis. To test the model that was built, we took 311 application samples consisting of 165 benign apps from the play store and 146 malicious apps from VirusShare. The test results show that the hybrid analysis model can increase detection by about 5%. Further testing also revealed that the extreme gradient boosting (XGB) assemble model is the best accuracy and efficiency model.","PeriodicalId":441670,"journal":{"name":"2020 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131890328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Lexicon Addition Effect on Lexicon-Based of Indonesian Sentiment Analysis on Twitter","authors":"F. Saputra, S. Wijaya, Yani Nurhadryani, Defina","doi":"10.1109/ICIMCIS51567.2020.9354269","DOIUrl":"https://doi.org/10.1109/ICIMCIS51567.2020.9354269","url":null,"abstract":"Opinion numbers in social media such as Twitter are so widespread that it is not possible to read all of it sentiment (positive, negative, or neutral). Sentiment analysis is one method that can be used to overcome these problems. One of sentiment analysis approach is lexicon-based approach which is highly dependent on the completeness and diversity of sentiment lexicons. Therefore, this study conducts lexicon addition to the sentiment lexicon to improve performance. The datas used in this study were tweet data on the West Java 2018 Governor election, 2019 Presidential election, and COVID-19 pandemic. The results of classification are determined by the highest frequency of occurrence of words based on positive and negative sentiment lexicons. The result of lexicon addition thus being compared to previous work which is Lailiyah method and Saputra and Nurhadryani method. The lexicon addition has proven to improve the accuracy of both Lailiyah and Saputra and Nurhadryani methods on all data with an increase respectively: 6.09% and 5.07% on the 2018 West Java Governor election data, 9.16% and 5.9% on the 2019 Presidential election data, 15.74% and 15.48% on the COVID-19 pandemic data. The lexicon addition could improve the weighted f1-measure on both Lailiyah and Saputra and Nurhadryani methods on all data with an increase respectively: 4.85% and 2.09% on 2018 West Java Governor election, 6.89% and 2.26% on 2019 Presidential election, and 12.18% and 5.10% on COVID-19 pandemic.","PeriodicalId":441670,"journal":{"name":"2020 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS)","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134093015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Breaches Detection in Zebra Cross Traffic Light Using Haar Cascade Classifier","authors":"Mahada Panji Anggadhita, Yuni Widiastiwi","doi":"10.1109/ICIMCIS51567.2020.9354275","DOIUrl":"https://doi.org/10.1109/ICIMCIS51567.2020.9354275","url":null,"abstract":"Traffic violations are common in the area zebra crossing at the location of traffic lights, violations are generally caused by the negligence of motorists who do not comply with existing regulations. As a result, there were many traffic accidents that could have been avoided. Starting from this problem, a simulation model tool is needed that is able to provide direct appeals to drivers when a violation occurs. Based on this, the purpose of this research is to create a simulation model to prevent accidents caused by motorists who are negligent of the rules by identifying vehicles that stop crossing the line boundaries. zebracross or drivers waiting for an out of place traffic light using imagery HaarCascade Classifiers which is programmed using Python and OpenCV to help process digital images. The results of this study that the Haar Cascade Classifier algorithm can characterize motorbikes well, with the best average accuracy value of 91.5% at a resolution of 720p. Based on the results obtained shows that the algorithm haar cascade classifier can detect violations that exist at traffic lights. Hence this indicates the rate of traffic violations can reduce by utilizing the algorithm haar cascade classifier.","PeriodicalId":441670,"journal":{"name":"2020 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114222521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}