Ermatita, Yugo Bayu Prastyo, I. W. W. Pradnyana, Muhammad Adrezo
{"title":"Diffie-Hellman Algorithm for Securing Medical Record Data Encryption keys","authors":"Ermatita, Yugo Bayu Prastyo, I. W. W. Pradnyana, Muhammad Adrezo","doi":"10.1109/ICIMCIS51567.2020.9354297","DOIUrl":"https://doi.org/10.1109/ICIMCIS51567.2020.9354297","url":null,"abstract":"Data security is an issue that must be a concern in the current era of information technology. Medical data in the form of medical digital images is also important data to protect its security. This is to avoid being used by irresponsible parties. This data security can apply data encryption. The application of this encryption is by developing a medical digital image security that uses a combination of the advanced encryption standard (AES) algorithm in the data encryption process and the Diffie-Hellman algorithm in the key exchange process to maintain the security and confidentiality of medical images. The AES algorithm is used in the encryption and decryption process, while the Diffie-Hellman algorithm is used to secure the key of the AES algorithm. The results of this research showed that the combination of AES and Diffie-Hellman algorithms succeeded in securing medical images. Diffie-Hellman algorithm will generate different keys which are then used as AES keys. In this research, the Diffie-Hellman algorithm will produce a key which will be combined with the encryption key from the AES algorithm. In addition, the Diffie-Hellman algorithm is used for security in the exchange process and key generation.","PeriodicalId":441670,"journal":{"name":"2020 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116456839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Gustriansyah, Ermatita, Dian Palupi Rini, Reza Firsandaya Malik
{"title":"The Criteria That Have A Significant Effect on Forecasting the Number of Sales Using the Best-Worst Method","authors":"R. Gustriansyah, Ermatita, Dian Palupi Rini, Reza Firsandaya Malik","doi":"10.1109/ICIMCIS51567.2020.9354276","DOIUrl":"https://doi.org/10.1109/ICIMCIS51567.2020.9354276","url":null,"abstract":"Forecasting the number of sales is an effort for forecasting the number of product sales for a certain period in the future. The company's failure to supply products will have negative effects on the quality of service to customers, thereby reducing the company's competitiveness. One of the critical success factors on forecasting the number of sales is determining the criteria required by the decision support system. The problem is what criteria are needed or influential in forecasting the number of sales. Furthermore, most of the problems in decision making are uncertainties associated with input criteria. Therefore, this study will investigate the criteria that a significant effect in forecasting the number of sales by using the recent decision support method, namely the Best-Worst Method by considering uncertainty so that the optimum forecasting of the number of sales can be achieved. The results achieved in this study indicate that the three most significant criteria for forecasting the number of sales are frequency, quantity, and monetary. Preliminary experimental results have shown that perturbations in the case study had no significant effect on the final ranking of the decision support system criteria.","PeriodicalId":441670,"journal":{"name":"2020 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS)","volume":"5 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131717483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Rank Critical Success Factors (CSFs) of Data Warehouse and Business Intelligence (DW/BI) Implementation in Banking Sector Using Analytical Hierarchy Process (AHP)","authors":"S. Halim, Izzati Mubarokah, A. Hidayanto","doi":"10.1109/ICIMCIS51567.2020.9354331","DOIUrl":"https://doi.org/10.1109/ICIMCIS51567.2020.9354331","url":null,"abstract":"Data is a very important asset for a company in supporting decision making. The implementation of Data Warehouse and Business Intelligence (DW / BI) is a step of a company to manage data as an asset. This study aims to evaluate the Critical Success Factor (CSF) for DW/BI implementation in an Indonesian financial institution that provides conventional and sharia banking, PT XYZ. Data are obtained through a survey of key person who involved in full cycle in the 2 phases of DW/BI implementation at PT XYZ and had roles and responsibilities that could provide a holistic view of the people, process and technology dimensions during the project. Analytical Hierarchy Process (AHP) method is used to calculate the weight of CSF influence in the context of people, process, and technology. CSF ‘Project Leader / Champion’ has the most influence in the context of people, ‘well defined system requirements' rank first in the context of process, and ‘source system’ has the biggest influence on the context of technology. The criterion of people is considered the most influential compared to the criterion of process and technology. Source system sub-criterion in the technology context has the most influence compared to other CSFs globally.","PeriodicalId":441670,"journal":{"name":"2020 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131882884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nidjo Sandjojo, Muhammad Zuhriyanto, I. W. W. Pradnyana
{"title":"The Effects of Fear of Cybercrime and Information Systems Security Policy on National Vigilance","authors":"Nidjo Sandjojo, Muhammad Zuhriyanto, I. W. W. Pradnyana","doi":"10.1109/ICIMCIS51567.2020.9354283","DOIUrl":"https://doi.org/10.1109/ICIMCIS51567.2020.9354283","url":null,"abstract":"The aim of this study was to examine the effect of information system security policy and fear of cybercrime on national vigilance in the Indonesian Ministry of Defense of the Republic of Indonesia. Cybercrime threat could happen in many forms and these are real threats to the Indonesian national security and sustainability as a nation. This is one of the reasons why this study was conducted. The study has been conducted since October 2015 in the Research and Development Body of the Ministry of Defense of the Republic of Indonesia, and Universitas Pembangunan Nasional “Veteran” Jakarta (University of National Development “Veteran” Jakarta). A quantitative method was employed in this study. Military officers, civilian employees working in the Research and Development Body of the Ministry of Defense, university lecturer as well as students of Universitas Pembangunan N asional “Veteran” Jakarta were selected as respondents. The result shows that information systems security policy has the biggest effect on national vigilance. As the result of this study, information security policy could play an important role in combating cybercrime. Conducting awareness program on the danger of cybercrime is another way to make public aware of the danger of cybercrime.","PeriodicalId":441670,"journal":{"name":"2020 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131952919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development of Prediction System for Crude Palm Oil (CPO) Production with Time Series Data Mining Approach","authors":"Achmad Solichin, U. Hasanah, Jayanta","doi":"10.1109/ICIMCIS51567.2020.9354321","DOIUrl":"https://doi.org/10.1109/ICIMCIS51567.2020.9354321","url":null,"abstract":"Palm oil is a plantation commodity that snowballs when compared to other plantation crops such as coffee or cocoa. The Indonesian palm oil industry has a comparative advantage in the form of a large area of land and the lowest production cost of Crude Palm Oil (CPO) in the world. Indonesia's palm oil production in August 2019 recorded an increase of 14% over the same period in 2018. However, the amount of Indonesia's CPO production can still be optimized and increased. The amount of CPO production is very dependent on several factors, such as weather conditions, land area, and the number of Fresh Fruit Bunches (FFB). To help the Palm Oil Mill (POM), this study compares three data mining algorithms to predict the amount of CPO production based on the number of FFBs. The algorithms being compared are multilayer perceptron (MLP), support vector regression (SVR), and linear regression (LR). Based on test results using test data from a palm oil company in Indonesia, the SVR algorithm can provide higher accuracy than the other two algorithms. The SVR gets a PTA value of 0.694, MSE of 955.002, MAPE of 55.169, and MAD of 22.227. Then, we developed a prototype that applied the SVR algorithm to predict the amount of CPO production. The SQA test results on the prototype resulted in 80.225 software quality in the good category.","PeriodicalId":441670,"journal":{"name":"2020 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125571532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Ramos-Diaz, Qiaolei Jiang, Rosmery Ramos-Sandoval, M. Griffiths
{"title":"Problematic Mobile Phone Use and Risky Behaviors Among College Students in Peru","authors":"J. Ramos-Diaz, Qiaolei Jiang, Rosmery Ramos-Sandoval, M. Griffiths","doi":"10.1109/ICIMCIS51567.2020.9354318","DOIUrl":"https://doi.org/10.1109/ICIMCIS51567.2020.9354318","url":null,"abstract":"A recent report noted that 93.4% of Peruvian citizens own a smartphone and that this has impacted positively in society for different purposes. Despite its advantages, scholars and practitioners have been investigating human-technology interaction, psychological processes, and their possible negative effects. Previous studies have investigated Problematic Mobile Phone Use (PMPU) as a dysfunctional interaction concerning the excessive use of smartphone activities that results progressively in negative consequences such as lack of control, preoccupation, withdrawal, relapse, and conflict. Despite this emergent area of research, there is little research examining PMPU among young Peruvian adults. In addition to this, there are still inconsistencies in relationship between PMPU, and substance use, and other risky behaviors. This paper analyses the impact of smartphone usage patterns, sensation seeking, and substance use in relation to PMPU. A total of 921 college students from Peru were recruited and completed a survey examining demographics, usage patterns, sensation seeking, and substance use. Overall, results indicate that gender, time spent talking on mobile phones, sensation seeking, and psychoactive substance use were predictors of PMPU. Implications at a theoretical, practical, and methodological level are discussed in relation to further research of PMPU in Peru.","PeriodicalId":441670,"journal":{"name":"2020 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129267858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Natalia Limantara, Meyliana, F. Gaol, Harjanto Prabowo
{"title":"Mechanics, Dynamics, and Aesthetics Framework on Gamification at University","authors":"Natalia Limantara, Meyliana, F. Gaol, Harjanto Prabowo","doi":"10.1109/ICIMCIS51567.2020.9354271","DOIUrl":"https://doi.org/10.1109/ICIMCIS51567.2020.9354271","url":null,"abstract":"Gamification is a concept in which game elements are applied in a non-game environment. In this paper, we analyze the use of the concept of gamification in learning using the mechanics, dynamics, and aesthetic (MDA) framework. Using the literature between 2017 and 2020, the gamification model used at the university is detailed according to three categories of the MDA Framework. From this study, it was found that leaderboard and points are still the dominant game mechanics. The results of this study can be used as a basis for researchers to know the application model of gamification that has been implemented and the impact of the implementation of the model.","PeriodicalId":441670,"journal":{"name":"2020 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116798696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ria Ariyani, Kurniawan Nur Ramadhani, Hilman Fauzi Tresna Sania Putra, Ali Budi Harsono
{"title":"Pre Cervical Cancer Detection on Visual Inspection of Acetic Acid (VIA) Test Image Using K-Means Clustering Method","authors":"Ria Ariyani, Kurniawan Nur Ramadhani, Hilman Fauzi Tresna Sania Putra, Ali Budi Harsono","doi":"10.1109/ICIMCIS51567.2020.9354317","DOIUrl":"https://doi.org/10.1109/ICIMCIS51567.2020.9354317","url":null,"abstract":"We built an approach in early detection of cervical cancer using image recognition of Visual Inspection with Acetic Acid (VIA) image. We used k-Means clustering to segment the expected region of cervical cell in the VIA test image. The positive suspect shown by white lesion which are called acetowhite. We used VIA test image captured from mobile phone as the dataset. From the acetowhite area, we extracted the color moment feature and the Gray Level Co-occurence Matrix (GLCM) feature. The color moment and GLCM feature were then classified as positive or negative using Support Vector Machine (SVM) classifier. The best performance were an accuracy of 72,14%, with sensitivity of 70% and specificity of 74% using k-Means clustering with k=2 and SVM with linear kernel.","PeriodicalId":441670,"journal":{"name":"2020 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133258495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"[Copyright notice]","authors":"","doi":"10.1109/mps.2019.8759753","DOIUrl":"https://doi.org/10.1109/mps.2019.8759753","url":null,"abstract":"","PeriodicalId":441670,"journal":{"name":"2020 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123067441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}