{"title":"Big data properties designed for customer engagement information via multi-channel digital services","authors":"Panant Krairojananan, Sakuna Anuvareepong","doi":"10.1109/ICSITECH.2016.7852635","DOIUrl":"https://doi.org/10.1109/ICSITECH.2016.7852635","url":null,"abstract":"The growth of Big Data plays an important role to transform data generated by online consumers in valuable assets. This paper aims to explore the design of big data properties, which are composed of volume, velocity, variety, and veracity, for managing customer engagement information; including intrinsic, extrinsic, and economic drive. Accordingly, the customer engagement information is derived from customer activities via multi-channel digital services comprised social media, blogs, and Webboards. The implications of this study lead to be used as the useful information for the big data infrastructure enablers. The results from the study reveal that most of single female in higher education whose average income at 10,000 – 30,000 Thai Baht were respondents who used Facebook and LINE app everyday at night time. Besides, the result also shows the significance of big data properties to support customer engagement.","PeriodicalId":447090,"journal":{"name":"2016 2nd International Conference on Science in Information Technology (ICSITech)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124703864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ramadiani, R. Atan, M. Selamat, R. Abdullah, Noraini Che Pa, Azainil
{"title":"User difficulties in e-learning system","authors":"Ramadiani, R. Atan, M. Selamat, R. Abdullah, Noraini Che Pa, Azainil","doi":"10.1109/ICSITECH.2016.7852626","DOIUrl":"https://doi.org/10.1109/ICSITECH.2016.7852626","url":null,"abstract":"An interface is very effective to encourage the users intention and engage them to achieve their destination in e-learning process. This research aims to explore the user needs through learner experience on using e-learning interface. The case study is needed to identify and to collect the learner problem in e-learning, especially in User Interface. It took three months to get the user interface problems, such as login page, choice menus, and table of contents, content presentation, interactive media, and presentation of exercises, example solutions, and self-assessment. The research took three months data collection of forty-seven students in Mulawarman University. Based on this research, it shows that the communicativeness of the interface is the most difficult part, followed by choices menu, and self-assessment. Meanwhile, the example solutions and login page are among the least difficult of the menu.","PeriodicalId":447090,"journal":{"name":"2016 2nd International Conference on Science in Information Technology (ICSITech)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125850009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation of the Cellular Automata Algorithm for developing an educational game","authors":"N. Fauzia, D. Rohendi, L. Riza","doi":"10.1109/ICSITECH.2016.7852628","DOIUrl":"https://doi.org/10.1109/ICSITECH.2016.7852628","url":null,"abstract":"During the past two decades, game developments have been increasing rapidly. In developing these games, there are various algorithms involved. The objective of this research is to develop an educational game by using the Cellular Automata Algorithm (CAA) to construct areas in the game. It is used for generating a dynamic labyrinth, so that it always changes in every game play. Therefore, it basically is a labyrinth game involving some obstacles for representing tasks that should be done in order to finish it. In this game, four types of educational evaluations are included, as follows: multiple choice, briefings answer, arranging the code, and filling in the blank. For the case study, this game contains the Fundamental Programming subject, focused on the Looping chapter. According to the experiment, it is capable in increasing student's comprehension with 0.37 gain. Finally, it can be used to increase cognitive comprehension for Vocational High School students.","PeriodicalId":447090,"journal":{"name":"2016 2nd International Conference on Science in Information Technology (ICSITech)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129706766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A system to diagnose learning disability in children of special need","authors":"M. Rasim, Chepy Cahyadi, L. Riza","doi":"10.1109/ICSITECH.2016.7852606","DOIUrl":"https://doi.org/10.1109/ICSITECH.2016.7852606","url":null,"abstract":"There are many factors that led to the occurrence of learning disability, namely impaired concentration, memory, dyslexia, dyscalculia, and the environment. The difficulty to determine solution and find out the cause of the learning disability occurrence is the problem of the research. Dempster-Shafer method is used to build an expert system in diagnosing learning disability. Interference engine used to calculate the value of belief function and the results of children diagnosis against symptoms. The result found that 15 of the 25 people inquired are known to experience learning disability while others are normal. Further development of the system which focuses on the characteristics of learning disability in more detail is needed.","PeriodicalId":447090,"journal":{"name":"2016 2nd International Conference on Science in Information Technology (ICSITech)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130926394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Vehicle detection and tracking based on corner and lines adjacent detection features","authors":"M. D. Enjat Munajat, D. H. Widyantoro, R. Munir","doi":"10.1109/ICSITECH.2016.7852641","DOIUrl":"https://doi.org/10.1109/ICSITECH.2016.7852641","url":null,"abstract":"This paper discusses a new method in detecting moving objects, which is differ from most of the methods used such as Gaussian Mixture Model, and Haar-Like approach. The focus is on utilizing corner detection and line adjacent detection features through thresholding process creating black and white images to detect the corner of each object in each frame. The process divides a frame length into 4 parts, whereas the first part acted as initiation process of moving object recognition while the rest of the frame functioning as vehicle tracking, speed measurement, and number of vehicles calculation. The initiation process started by identifying corner spots of the moving objects that must be recognized as a single object. The lines surpassing through two points are later identified to determine whether those spots have dark color (0) or light color (1). The moving objects is represented by light color (1) and the walking objects is represented by dark color (0). A group of corner spots, identified and connected by two-point-line equation to be recognized as one unified object by using corner and line adjacent method. The identified vehicle objects can be more easily tracked and identified by the average speed in order to obtain the number of passing vehicles. The research result shows that in the initiation phase, the corner and line adjacent features able to detect moving object and distinguish it with different objects. Furthermore, in tracking phase, system is able to track the vehicle position, measuring the speed and number of vehicles. The system is proven to be able to recognize the moving objects quickly and accurately resulting in the more feasible process of speed measurement and tracking.","PeriodicalId":447090,"journal":{"name":"2016 2nd International Conference on Science in Information Technology (ICSITech)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121913542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mike Yuliana, Haryadi Amran Darwito, Amang Sudarsono, Gabymars Yofie
{"title":"Privacy and security of sharing referral medical record for health care system","authors":"Mike Yuliana, Haryadi Amran Darwito, Amang Sudarsono, Gabymars Yofie","doi":"10.1109/ICSITECH.2016.7852639","DOIUrl":"https://doi.org/10.1109/ICSITECH.2016.7852639","url":null,"abstract":"Sharing of health information become daily routines in which hospitals and clinics often refer patients to specialists because of their limited facilities, services, and number of specialist physicians. This paper proposed secure design for sharing referral medical record using HIBE (Hierarchical ID-Based Encryption), that focused on the ability of sharing information and ensuring privacy of referral medical record. Our proposed system is able to secure referral medical record from third parties and only the referral physician that can access the referral medical record. The result of performance testing shows that the average percentage increase from length of cipher text is 75%, with the smallest percentage increase is 22.80% and the largest is 236%.","PeriodicalId":447090,"journal":{"name":"2016 2nd International Conference on Science in Information Technology (ICSITech)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121927825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Path analysis method to identify factors affecting consumer interest on online shopping","authors":"R. Purwaningsih, Belan Adison","doi":"10.1109/ICSITECH.2016.7852601","DOIUrl":"https://doi.org/10.1109/ICSITECH.2016.7852601","url":null,"abstract":"Current research indicates that a novelty, exciting and engaging shopping experience can positively affect consumer buying behavior. Identifying factors that influence the consumer behavior on use a virtual world for shopping will help retailers to create and maintain a presence in a virtual world, while positive impacting purchases and returns intentions. Therefore, the objectives of this study are to understand what factors affect consumer intention to shop in a virtual world and to analyze the relationships among these factors. Particularly, this study explores consumer innovativeness (consumer novelty seeking and consumer independent judgment making) as an external variable that influences consumer intention indirectly through its effects on consumer experiences with the virtual world application (ease of use, control, concentration, and enjoyment). Path analysis method is used to identify the variable given significant influence to consumer intention to shop. The finding indicates that independent variables Consumer Novelty Seeking and Consumer Independent Judgment Making have influence to Perceived concentration, Perceived enjoyment, and Ease of Use. These three variables give significant influence to consumer intention to shop.","PeriodicalId":447090,"journal":{"name":"2016 2nd International Conference on Science in Information Technology (ICSITech)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114931539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Haifaa Jassim Muhasin, R. Atan, Marzanah A. Jabar, Salfarina Abdullah
{"title":"Cloud computing sensitive data protection using multi layered approach","authors":"Haifaa Jassim Muhasin, R. Atan, Marzanah A. Jabar, Salfarina Abdullah","doi":"10.1109/ICSITECH.2016.7852610","DOIUrl":"https://doi.org/10.1109/ICSITECH.2016.7852610","url":null,"abstract":"Cloud computing is a modern technology and it gives access to the network upon request to required computing resources (network, servers, storage, applications and services). This exciting computing model depends on data traffic and controlled by a third party. Despite the expected savings in infrastructure and the development cost for business flexibility, security is still the biggest challenge for the implementation of computing for many service-based companies. This paper discusses challenges related to data security and privacy implementation in cloud computing environment. A framework is proposed to accommodate the protection of sensitive data in cloud computing environment. This framework consists of three levels authorization, security and privacy and saves and verifies level. The main objective of this paper is to discuss the framework implementation and its architecture verification. It is expected from the research a verified framework to protect private and sensitive data in cloud environment.","PeriodicalId":447090,"journal":{"name":"2016 2nd International Conference on Science in Information Technology (ICSITech)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116568599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Car detection based on road direction on traffic surveillance image","authors":"A. Prahara, Murinto","doi":"10.1109/ICSITECH.2016.7852660","DOIUrl":"https://doi.org/10.1109/ICSITECH.2016.7852660","url":null,"abstract":"One of the challenges in car detection is to be able to detect car in any viewpoint from traffic surveillance camera. The size, shape, and appearance of car are different if they are viewed from various viewpoint of traffic surveillance cameras. Car also has the most variety of models compared to the other vehicle. However, car poses usually follow road direction. Therefore, this research proposes a method to detect car based on road direction. The method utilizes 3D car models to generate car poses, groups them into four pairs of viewpoint orientation: 1) front / back view, 2) top left / bottom right view, 3) top right / bottom left view, and 4) left side / right side view, then builds car detectors corresponding to each orientation. On traffic surveillance image, road area is extracted to localize the detection area and road direction is estimated to determine the car detector that will be used by Linear-Support Vector Machine (Linear-SVM). Finally, SVM classifies the features extracted by Histogram of Oriented Gradients (HOG) to detect cars. The test result on various viewpoints of traffic surveillance image gives 0.9098 of Balance Accuracy (BAC).","PeriodicalId":447090,"journal":{"name":"2016 2nd International Conference on Science in Information Technology (ICSITech)","volume":"19 814 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121387875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. U. Tjhin, R. Tavakoli, Perwiro Atmojo Robertus Nugroho
{"title":"The determinants affecting e-loyalty: Hospitality industry in Indonesia","authors":"V. U. Tjhin, R. Tavakoli, Perwiro Atmojo Robertus Nugroho","doi":"10.1109/ICSITECH.2016.7852621","DOIUrl":"https://doi.org/10.1109/ICSITECH.2016.7852621","url":null,"abstract":"The aim of this study was to determine the effect of e-marketing and e-service quality on e-satisfaction and its impact on e-loyalty. This research was conducted on customers in Jakarta. Data were collected from a sample of 100 respondents. The data were analyzed using path analysis. The result of this study found that e-marketing did not affect the e-satisfaction. E-marketing and e-service quality had an influence on e-satisfaction. E-satisfaction had an influence on e-loyalty. E-marketing and e-service did not influence e-loyalty. Based on the results of this study, we suggested that hotels should develop their website with interesting and detailed features for e-marketing and also provide live chat service for increasing e-service quality. E-satisfaction can be supported by customer satisfaction surveys on a regular basis or to be a part of the standard operating procedure, whereas customer loyalty programs need to be developed in the near future to build customers' e-loyalty.","PeriodicalId":447090,"journal":{"name":"2016 2nd International Conference on Science in Information Technology (ICSITech)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125237418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}