Pub Date : 2019-10-24DOI: 10.20473/jisebi.5.2.183-194
Yutika Amelia Effendi, Nania Nuzulita
Background: Nowadays, enterprise computing manages business processes which has grown up rapidly. This situation triggers the production of a massive event log. One type of event log is double timestamp event log. The double timestamp has a start time and complete time of each activity executed in the business process. It also has a close relationship with temporal causal relation. The temporal causal relation is a pattern of event log that occurs from each activity performed in the process.Objective: In this paper, seven types of temporal causal relation between activities were presented as an extended version of relations used in the double timestamp event log. Since the event log was not always executed sequentially, therefore using temporal causal relation, the event log was divided into several small groups to determine the relations of activities and to mine the business process.Methods: In these experiments, the temporal causal relation based on time interval which were presented in Gantt chart also determined whether each case could be classified as sequential or parallel relations. Then to obtain the business process, each temporal causal relation was combined into one business process based on the timestamp of activity in the event log.Results: The experimental results, which were implemented in two real-life event logs, showed that using temporal causal relation and double timestamp event log could discover business process models.Conclusion: Considering the findings, this study concludes that business process models and their sequential and parallel AND, OR, XOR relations can be discovered by using temporal causal relation and double timestamp event log.Keywords:Business Process, Process Discovery, Process Mining, Temporal Causal Relation, Double Timestamp Event Log
{"title":"Process Discovery of Business Processes Using Temporal Causal Relation","authors":"Yutika Amelia Effendi, Nania Nuzulita","doi":"10.20473/jisebi.5.2.183-194","DOIUrl":"https://doi.org/10.20473/jisebi.5.2.183-194","url":null,"abstract":"Background: Nowadays, enterprise computing manages business processes which has grown up rapidly. This situation triggers the production of a massive event log. One type of event log is double timestamp event log. The double timestamp has a start time and complete time of each activity executed in the business process. It also has a close relationship with temporal causal relation. The temporal causal relation is a pattern of event log that occurs from each activity performed in the process.Objective: In this paper, seven types of temporal causal relation between activities were presented as an extended version of relations used in the double timestamp event log. Since the event log was not always executed sequentially, therefore using temporal causal relation, the event log was divided into several small groups to determine the relations of activities and to mine the business process.Methods: In these experiments, the temporal causal relation based on time interval which were presented in Gantt chart also determined whether each case could be classified as sequential or parallel relations. Then to obtain the business process, each temporal causal relation was combined into one business process based on the timestamp of activity in the event log.Results: The experimental results, which were implemented in two real-life event logs, showed that using temporal causal relation and double timestamp event log could discover business process models.Conclusion: Considering the findings, this study concludes that business process models and their sequential and parallel AND, OR, XOR relations can be discovered by using temporal causal relation and double timestamp event log.Keywords:Business Process, Process Discovery, Process Mining, Temporal Causal Relation, Double Timestamp Event Log","PeriodicalId":16185,"journal":{"name":"Journal of Information Systems Engineering and Business Intelligence","volume":"12 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80298059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-24DOI: 10.20473/jisebi.5.2.100-109
Debby Alita, Sigit Priyanta, N. Rokhman
Background: Indonesia is an active Twitter user that is the largest ranked in the world. Tweets written by Twitter users vary, from tweets containing positive to negative responses. This agreement will be utilized by the parties concerned for evaluation.Objective: On public comments there are emoticons and sarcasm which have an influence on the process of sentiment analysis. Emoticons are considered to make it easier for someone to express their feelings but not a few are also other opinion researchers, namely by ignoring emoticons, the reason being that it can interfere with the sentiment analysis process, while sarcasm is considered to be produced from the results of the sarcasm sentiment analysis in it.Methods: The emoticon and no emoticon categories will be tested with the same testing data using classification method are Naïve Bayes Classifier and Support Vector Machine. Sarcasm data will be proposed using the Random Forest Classifier, Naïve Bayes Classifier and Support Vector Machine method.Results: The use of emoticon with sarcasm detection can increase the accuracy value in the sentiment analysis process using Naïve Bayes Classifier method.Conclusion: Based on the results, the amount of data greatly affects the value of accuracy. The use of emoticons is excellent in the sentiment analysis process. The detection of superior sarcasm only by using the Naïve Bayes Classifier method due to differences in the amount of sarcasm data and not sarcasm in the research process.Keywords: Emoticon, Naïve Bayes Classifier, Random Forest Classifier, Sarcasm, Support Vector Machine
{"title":"Analysis of Emoticon and Sarcasm Effect on Sentiment Analysis of Indonesian Language on Twitter","authors":"Debby Alita, Sigit Priyanta, N. Rokhman","doi":"10.20473/jisebi.5.2.100-109","DOIUrl":"https://doi.org/10.20473/jisebi.5.2.100-109","url":null,"abstract":"Background: Indonesia is an active Twitter user that is the largest ranked in the world. Tweets written by Twitter users vary, from tweets containing positive to negative responses. This agreement will be utilized by the parties concerned for evaluation.Objective: On public comments there are emoticons and sarcasm which have an influence on the process of sentiment analysis. Emoticons are considered to make it easier for someone to express their feelings but not a few are also other opinion researchers, namely by ignoring emoticons, the reason being that it can interfere with the sentiment analysis process, while sarcasm is considered to be produced from the results of the sarcasm sentiment analysis in it.Methods: The emoticon and no emoticon categories will be tested with the same testing data using classification method are Naïve Bayes Classifier and Support Vector Machine. Sarcasm data will be proposed using the Random Forest Classifier, Naïve Bayes Classifier and Support Vector Machine method.Results: The use of emoticon with sarcasm detection can increase the accuracy value in the sentiment analysis process using Naïve Bayes Classifier method.Conclusion: Based on the results, the amount of data greatly affects the value of accuracy. The use of emoticons is excellent in the sentiment analysis process. The detection of superior sarcasm only by using the Naïve Bayes Classifier method due to differences in the amount of sarcasm data and not sarcasm in the research process.Keywords: Emoticon, Naïve Bayes Classifier, Random Forest Classifier, Sarcasm, Support Vector Machine","PeriodicalId":16185,"journal":{"name":"Journal of Information Systems Engineering and Business Intelligence","volume":"25 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83472406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-24DOI: 10.20473/jisebi.5.2.156-162
R. Angelina, A. Hermawan, A. Suroso
Background: The increasing usage and development of e-commerce in Indonesia, demands competition between e-commerce that exists. To be successful e-commerce should be balanced with a good information system. Some clinical research has established what factors that affected the success, including DeLone and McLean. According to their e-commerce success model, there are six variables that affect e-commerce success, system quality, information quality, service quality, use, user satisfaction, and net benefitObjective: The study aims to analyze the relationship between system quality, information quality and service quality to user satisfaction and use. In addition, the study aims to analyze the relationship between user satisfaction and use to a net benefit.Methods: This study draws on the DeLone and McLean Model of Information System (IS) success model. It is a quantitative study that was conducted in the form of a survey of 110 users of each Lazada, Bukalapak, and Shopee users.Results: By applying DeLone and McLean model, this findings confirmed four hypotheses were significant in Bukalapak, Lazada, and Shopee.Conclusion:There were significant effect between the system quality on user satisfaction, service quality on use, service quality on user satisfaction and user satisfaction on net benefits. Meanwhile, system quality had insignificant effect to use and also information quality to use in Bukalapak, Lazada, and Shopee.Keywords: DeLone and McLean model,E-Commerce Success, Information System Success Measurement, IS Success Model
{"title":"Analyzing E-Commerce Success using DeLone and McLean Model","authors":"R. Angelina, A. Hermawan, A. Suroso","doi":"10.20473/jisebi.5.2.156-162","DOIUrl":"https://doi.org/10.20473/jisebi.5.2.156-162","url":null,"abstract":"Background: The increasing usage and development of e-commerce in Indonesia, demands competition between e-commerce that exists. To be successful e-commerce should be balanced with a good information system. Some clinical research has established what factors that affected the success, including DeLone and McLean. According to their e-commerce success model, there are six variables that affect e-commerce success, system quality, information quality, service quality, use, user satisfaction, and net benefitObjective: The study aims to analyze the relationship between system quality, information quality and service quality to user satisfaction and use. In addition, the study aims to analyze the relationship between user satisfaction and use to a net benefit.Methods: This study draws on the DeLone and McLean Model of Information System (IS) success model. It is a quantitative study that was conducted in the form of a survey of 110 users of each Lazada, Bukalapak, and Shopee users.Results: By applying DeLone and McLean model, this findings confirmed four hypotheses were significant in Bukalapak, Lazada, and Shopee.Conclusion:There were significant effect between the system quality on user satisfaction, service quality on use, service quality on user satisfaction and user satisfaction on net benefits. Meanwhile, system quality had insignificant effect to use and also information quality to use in Bukalapak, Lazada, and Shopee.Keywords: DeLone and McLean model,E-Commerce Success, Information System Success Measurement, IS Success Model ","PeriodicalId":16185,"journal":{"name":"Journal of Information Systems Engineering and Business Intelligence","volume":"10 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79169139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-24DOI: 10.20473/jisebi.5.2.146-155
Dharma Dyatmika, Oka Sudana, G. A. A. Putri
Background: Information technology is developing rapidly over time, but there are many companies do not make use of it to support their operational activities. One example is the queue system in the Radiology Section of Sanglah Hospital, which operates the conventional queue system.Objective: The problem occurs in this queue system is inefficient waiting time because the patients must come early and wait in line in the hospital waiting rooms. Many patients thereafter decide going home first or doing other activities. Another problem is it triggers double costs of transportation. The purpose of this study is to improve patients comfort while waiting in queue by applying untethering the queue. Untethering the queue is a service that allows people to be in a queue even though they are not in the waiting room.Methods: The system applies the FCFS (First Come First Serve) algorithm to manage patients’ queue and integrates this queue system with Telegram and SMS gateway. It makes patients easier to take queue numbers and receive notification of health service time from the Radiology Section of Sanglah Hospital.Result: As a result of this study is an untethering the queue application which is web-based queue system integrated to Telegram and SMS gateway. The daily queue services in the Radiology Section of Hospital can be improved through this application.Conclusion: Patients can only come to the hospital when the queue numbers obtained nearly the health service time so that it leads to time efficient and comfort while waiting in queue.Keywords:First Come First Serve, Multi Channel Access, SMS, Telegram, Untethering the Queue
背景:随着时间的推移,信息技术正在迅速发展,但有许多公司没有利用它来支持他们的经营活动。一个例子是Sanglah医院放射科的排队系统,该系统采用传统的排队系统。目的:该排队系统存在的问题是患者必须提前到医院候诊室排队等待,导致等待时间效率低下。此后,许多患者决定先回家或做其他活动。另一个问题是它引发了双倍的运输成本。本研究的目的是为了提高患者在排队等候时的舒适度。Untethering the queue是一项允许人们排队的服务,即使他们不在候车室。方法:系统采用先到先得(FCFS)算法对患者进行队列管理,并将该队列系统与Telegram、SMS网关相结合。它使病人更容易获得排队号码,并从Sanglah医院放射科收到保健服务时间通知。结果:本研究的结果是将基于web的队列系统集成到Telegram和SMS网关上,实现了队列的解缆应用。该应用程序可改善医院放射科的日常排队服务。结论:患者只有在排队人数接近卫生服务时间的情况下才能来医院就诊,从而提高了患者排队等候的时间效率和舒适度。关键词:先到先得,多通道接入,短信,电报,解系队列
{"title":"Untethering the Queue based on Multi Channel Access (MCA) Technology at Hospital Radiology Section","authors":"Dharma Dyatmika, Oka Sudana, G. A. A. Putri","doi":"10.20473/jisebi.5.2.146-155","DOIUrl":"https://doi.org/10.20473/jisebi.5.2.146-155","url":null,"abstract":"Background: Information technology is developing rapidly over time, but there are many companies do not make use of it to support their operational activities. One example is the queue system in the Radiology Section of Sanglah Hospital, which operates the conventional queue system.Objective: The problem occurs in this queue system is inefficient waiting time because the patients must come early and wait in line in the hospital waiting rooms. Many patients thereafter decide going home first or doing other activities. Another problem is it triggers double costs of transportation. The purpose of this study is to improve patients comfort while waiting in queue by applying untethering the queue. Untethering the queue is a service that allows people to be in a queue even though they are not in the waiting room.Methods: The system applies the FCFS (First Come First Serve) algorithm to manage patients’ queue and integrates this queue system with Telegram and SMS gateway. It makes patients easier to take queue numbers and receive notification of health service time from the Radiology Section of Sanglah Hospital.Result: As a result of this study is an untethering the queue application which is web-based queue system integrated to Telegram and SMS gateway. The daily queue services in the Radiology Section of Hospital can be improved through this application.Conclusion: Patients can only come to the hospital when the queue numbers obtained nearly the health service time so that it leads to time efficient and comfort while waiting in queue.Keywords:First Come First Serve, Multi Channel Access, SMS, Telegram, Untethering the Queue","PeriodicalId":16185,"journal":{"name":"Journal of Information Systems Engineering and Business Intelligence","volume":"13 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81371880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-24DOI: 10.20473/jisebi.5.2.120-130
D. Rahmalia, T. Herlambang, T. E. Saputro
Background: The applications of constrained optimization have been developed in many problems. One of them is production planning. Production planning is the important part for controlling the cost spent by the company.Objective: This research identifies about production planning optimization and algorithm to solve it in approaching. Production planning model is linear programming model with constraints : production, worker, and inventory.Methods: In this paper, we use heurisitic Particle Swarm Optimization-Genetic Algorithm (PSOGA) for solving production planning optimization. PSOGA is the algorithm combining Particle Swarm Optimization (PSO) and mutation operator of Genetic Algorithm (GA) to improve optimal solution resulted by PSO. Three simulations using three different mutation probabilies : 0, 0.01 and 0.7 are applied to PSOGA. Futhermore, some mutation probabilities in PSOGA will be simulated and percent of improvement will be computed.Results: From the simulations, PSOGA can improve optimal solution of PSO and the position of improvement is also determined by mutation probability. The small mutation probability gives smaller chance to the particle to explore and form new solution so that the position of improvement of small mutation probability is in middle of iteration. The large mutation probability gives larger chance to the particle to explore and form new solution so that the position of improvement of large mutation probability is in early of iteration.Conclusion: Overall, the simulations show that PSOGA can improve optimal solution resulted by PSO and therefore it can give optimal cost spent by the company for the planning.Keywords: Constrained Optimization, Genetic Algorithm, Linear Programming, Particle Swarm Optimization, Production Planning
{"title":"Fertilizer Production Planning Optimization Using Particle Swarm Optimization-Genetic Algorithm","authors":"D. Rahmalia, T. Herlambang, T. E. Saputro","doi":"10.20473/jisebi.5.2.120-130","DOIUrl":"https://doi.org/10.20473/jisebi.5.2.120-130","url":null,"abstract":"Background: The applications of constrained optimization have been developed in many problems. One of them is production planning. Production planning is the important part for controlling the cost spent by the company.Objective: This research identifies about production planning optimization and algorithm to solve it in approaching. Production planning model is linear programming model with constraints : production, worker, and inventory.Methods: In this paper, we use heurisitic Particle Swarm Optimization-Genetic Algorithm (PSOGA) for solving production planning optimization. PSOGA is the algorithm combining Particle Swarm Optimization (PSO) and mutation operator of Genetic Algorithm (GA) to improve optimal solution resulted by PSO. Three simulations using three different mutation probabilies : 0, 0.01 and 0.7 are applied to PSOGA. Futhermore, some mutation probabilities in PSOGA will be simulated and percent of improvement will be computed.Results: From the simulations, PSOGA can improve optimal solution of PSO and the position of improvement is also determined by mutation probability. The small mutation probability gives smaller chance to the particle to explore and form new solution so that the position of improvement of small mutation probability is in middle of iteration. The large mutation probability gives larger chance to the particle to explore and form new solution so that the position of improvement of large mutation probability is in early of iteration.Conclusion: Overall, the simulations show that PSOGA can improve optimal solution resulted by PSO and therefore it can give optimal cost spent by the company for the planning.Keywords: Constrained Optimization, Genetic Algorithm, Linear Programming, Particle Swarm Optimization, Production Planning","PeriodicalId":16185,"journal":{"name":"Journal of Information Systems Engineering and Business Intelligence","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84946139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-24DOI: 10.20473/jisebi.5.2.195-207
D. F. Murad, Wirianto Widjaya, D. Noviani, N. Fitriyyah, Liany Minarni Saputri
Background: Given the digital transformation in currently emerging digital era in Financial Service Industry; marked by the rise of Fintech; Financial Service Authority (FSA) is challenged to mitigate new type of risks that are introduced by it. As first step, Indonesia FSA seeks for an effective and efficient way to present up-to-date Strategic Information to its Top Executive Leaders to enable informed strategic decision making.Objective: This study aimed to find the solution to provide information strategic information to Indonesia FSA executives at any-time any-where. The researchers hypothesize that mobile Executive Information System could effectively serve the purpose.Methods: The research activities are laid out based on the Unified Process (UP) Methodology and use Unified Modelling Language (UML) diagrams to communicate the design. At the end of the study, a survey-based on TAM2 is conducted to confirm the study result. The survey is tested to measure its validity, reliability and correlation analysis using SPSS.Results: The study produce mobile executive information system (m-EIS) geared with the latest UI technology framework; Quasar; and microservice pattern. The m-EIS is deployed and implemented. The survey result shows the overall users’ acceptance of the implementation.Conclusion: The study recommends the further enhancement of m-EIS and highlights limitation of the current study for which future study could address and improve.Keywords:Executive Information System, Financial Service Authority, Financial Service Industry, Hybrid Mobile Application, Unified Modelling Language, Unified Process
{"title":"Hybrid Mobile Executive Information (m-EIS) System Using Quasar Framework for Indonesia Financial Service Authority","authors":"D. F. Murad, Wirianto Widjaya, D. Noviani, N. Fitriyyah, Liany Minarni Saputri","doi":"10.20473/jisebi.5.2.195-207","DOIUrl":"https://doi.org/10.20473/jisebi.5.2.195-207","url":null,"abstract":"Background: Given the digital transformation in currently emerging digital era in Financial Service Industry; marked by the rise of Fintech; Financial Service Authority (FSA) is challenged to mitigate new type of risks that are introduced by it. As first step, Indonesia FSA seeks for an effective and efficient way to present up-to-date Strategic Information to its Top Executive Leaders to enable informed strategic decision making.Objective: This study aimed to find the solution to provide information strategic information to Indonesia FSA executives at any-time any-where. The researchers hypothesize that mobile Executive Information System could effectively serve the purpose.Methods: The research activities are laid out based on the Unified Process (UP) Methodology and use Unified Modelling Language (UML) diagrams to communicate the design. At the end of the study, a survey-based on TAM2 is conducted to confirm the study result. The survey is tested to measure its validity, reliability and correlation analysis using SPSS.Results: The study produce mobile executive information system (m-EIS) geared with the latest UI technology framework; Quasar; and microservice pattern. The m-EIS is deployed and implemented. The survey result shows the overall users’ acceptance of the implementation.Conclusion: The study recommends the further enhancement of m-EIS and highlights limitation of the current study for which future study could address and improve.Keywords:Executive Information System, Financial Service Authority, Financial Service Industry, Hybrid Mobile Application, Unified Modelling Language, Unified Process","PeriodicalId":16185,"journal":{"name":"Journal of Information Systems Engineering and Business Intelligence","volume":"32 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88875750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-24DOI: 10.20473/jisebi.5.2.110-119
Ricardo Franclinton, Oscar Karnalim
Background: Most source code plagiarism detection tools are not modifiable. Consequently, when a modification is required to be applied, a new detection tool should be created along with it. This could be a problem as creating the tool from scratch is time-inefficient while most of the features are similar across source code plagiarism detection tools.Objective: To alleviate researchers' effort, this paper proposes a library for observing two plagiarism-suspected codes (a feature which is similar across most source code plagiarism detection tools).Methods: Unique to this library, it is not constrained by the selected programming language for development. It is executed from command line, which is supported by most programming languages.Results: According to our evaluation, the library is integrable and functional. Moreover, the library can enhance teaching assistants' accuracy and reduce the tasks' completion time.Conclusion: The library can be beneficial for the development of source code plagiarism detection tools since it is integrable, functional, and helpful for teaching assistants.Keywords:Language independency, Plagiarism detection, Reusable library, Source code, Tool development
{"title":"A Language-Independent Library for Observing Source Code Plagiarism","authors":"Ricardo Franclinton, Oscar Karnalim","doi":"10.20473/jisebi.5.2.110-119","DOIUrl":"https://doi.org/10.20473/jisebi.5.2.110-119","url":null,"abstract":"Background: Most source code plagiarism detection tools are not modifiable. Consequently, when a modification is required to be applied, a new detection tool should be created along with it. This could be a problem as creating the tool from scratch is time-inefficient while most of the features are similar across source code plagiarism detection tools.Objective: To alleviate researchers' effort, this paper proposes a library for observing two plagiarism-suspected codes (a feature which is similar across most source code plagiarism detection tools).Methods: Unique to this library, it is not constrained by the selected programming language for development. It is executed from command line, which is supported by most programming languages.Results: According to our evaluation, the library is integrable and functional. Moreover, the library can enhance teaching assistants' accuracy and reduce the tasks' completion time.Conclusion: The library can be beneficial for the development of source code plagiarism detection tools since it is integrable, functional, and helpful for teaching assistants.Keywords:Language independency, Plagiarism detection, Reusable library, Source code, Tool development","PeriodicalId":16185,"journal":{"name":"Journal of Information Systems Engineering and Business Intelligence","volume":"32 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78851061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-24DOI: 10.20473/jisebi.5.2.131-145
A. Sarma
Background: Requirement elicitation is the first step for any project. The available BI requirement elicitation approaches are focused more towards: the top pyramid of the management, less focus on the business aspect of an organization, historical in nature, emphasis on data mining and data warehousing aspects, no clear separation between requirements, and lack of proper linkage between the requirements. The demand of BI shifts towards the operational front for last couple of years. The use of Operational BI is gaining more popularity among industry and business communities because of increased demand of real time BI. It provides a powerful analysis of both operational and business information in current time for all levels of the users in the organization.Objective: In the modern business environment, the business operates on networks that demands multi-level decision-making capabilities as compared to the traditional business approaches. Operational BI is one of the business information systems that support the modern business environment and provides timely decision-making information to all the users in the organization. The requirement elicitation methodology for Operational BI system is found open for research. A new approach for requirement elicitation for an Operational BI system is presented in this paper, which highly suits to the organizations in the modern business environment.Methods: A top down technique is employed in the proposed requirements methodology that focuses on the business context of an organization. The proposed requirement elicitation approach is highly suited for the organizations that operate in the modern business environment. This approach overcomes several limitations in the existing BI requirement approaches. A case study is presented to support the proposed requirement elicitation approach for OBI system.Conclusion: This approach has several advantages like fast development, clear definition, classification of various types of requirements and proper linkage between the requirements without any loss or missing of gathering requirements. Finally, it is to conclude that the proposed approach acts as a one-pot synthesis of requirements elicitation for Operational BI system.Keywords: Business Context, Business, Intelligence, Business Networks, Protocols, Modern Business, Environment, Operational Business, Intelligence Requirement, Elicitation, Requirement, Methodology
{"title":"One-Pot Synthesis of Requirements Elicitation for Operational BI (OBI) System: in the Context of the Modern Business Environment","authors":"A. Sarma","doi":"10.20473/jisebi.5.2.131-145","DOIUrl":"https://doi.org/10.20473/jisebi.5.2.131-145","url":null,"abstract":"Background: Requirement elicitation is the first step for any project. The available BI requirement elicitation approaches are focused more towards: the top pyramid of the management, less focus on the business aspect of an organization, historical in nature, emphasis on data mining and data warehousing aspects, no clear separation between requirements, and lack of proper linkage between the requirements. The demand of BI shifts towards the operational front for last couple of years. The use of Operational BI is gaining more popularity among industry and business communities because of increased demand of real time BI. It provides a powerful analysis of both operational and business information in current time for all levels of the users in the organization.Objective: In the modern business environment, the business operates on networks that demands multi-level decision-making capabilities as compared to the traditional business approaches. Operational BI is one of the business information systems that support the modern business environment and provides timely decision-making information to all the users in the organization. The requirement elicitation methodology for Operational BI system is found open for research. A new approach for requirement elicitation for an Operational BI system is presented in this paper, which highly suits to the organizations in the modern business environment.Methods: A top down technique is employed in the proposed requirements methodology that focuses on the business context of an organization. The proposed requirement elicitation approach is highly suited for the organizations that operate in the modern business environment. This approach overcomes several limitations in the existing BI requirement approaches. A case study is presented to support the proposed requirement elicitation approach for OBI system.Conclusion: This approach has several advantages like fast development, clear definition, classification of various types of requirements and proper linkage between the requirements without any loss or missing of gathering requirements. Finally, it is to conclude that the proposed approach acts as a one-pot synthesis of requirements elicitation for Operational BI system.Keywords: Business Context, Business, Intelligence, Business Networks, Protocols, Modern Business, Environment, Operational Business, Intelligence Requirement, Elicitation, Requirement, Methodology","PeriodicalId":16185,"journal":{"name":"Journal of Information Systems Engineering and Business Intelligence","volume":"44 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73688560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Background: Educational data mining is an emerging trend, especially in today Big Data Era. Numerous method and technique already been implemented in order to improve its process to gain better understanding of the educational process and to extract knowledge from various related data, but the implementation of these methods into Decision support system (DSS) application still limited, especially regarding help to choose university sub majors .Objective: To design an academic decision support system (DSS) by adopting Theory of Reasoned Action (TRA) concept and using Data Mining as a factor analytic apporach to extract rules for its knowledge model.Methods: We implemented factor analysis method and decision tree method of C.45 to produce rules of the impact course of the sub- majors and the job interest as the basic rules of the DSS.Results: The proposed academic decision support system able to give sub majors recommendations in accordance with student interest and competence, with 79.03% of precision and 61.11% of recall. Moreover, the system also has a dashboard feature that shows the information about the statistic of students in each sub majors.Conclusion: C.45 algorithm and factor analysis are suitable to build a knowledge model for Academic Decision Support System for Choosing Information System Sub Majors Bachelor Programs. This system could also help the academic adviser on monitoring and make decision accordance with that academic information
{"title":"Academic Decision Support System for Choosing Information Systems Sub Majors Programs using Decision Tree Algorithm","authors":"Cut Fiarni, Evasaria Magdalena Sipayung, Prischilia B.T. Tumundo","doi":"10.20473/JISEBI.5.1.57-66","DOIUrl":"https://doi.org/10.20473/JISEBI.5.1.57-66","url":null,"abstract":"Background: Educational data mining is an emerging trend, especially in today Big Data Era. Numerous method and technique already been implemented in order to improve its process to gain better understanding of the educational process and to extract knowledge from various related data, but the implementation of these methods into Decision support system (DSS) application still limited, especially regarding help to choose university sub majors .Objective: To design an academic decision support system (DSS) by adopting Theory of Reasoned Action (TRA) concept and using Data Mining as a factor analytic apporach to extract rules for its knowledge model.Methods: We implemented factor analysis method and decision tree method of C.45 to produce rules of the impact course of the sub- majors and the job interest as the basic rules of the DSS.Results: The proposed academic decision support system able to give sub majors recommendations in accordance with student interest and competence, with 79.03% of precision and 61.11% of recall. Moreover, the system also has a dashboard feature that shows the information about the statistic of students in each sub majors.Conclusion: C.45 algorithm and factor analysis are suitable to build a knowledge model for Academic Decision Support System for Choosing Information System Sub Majors Bachelor Programs. This system could also help the academic adviser on monitoring and make decision accordance with that academic information","PeriodicalId":16185,"journal":{"name":"Journal of Information Systems Engineering and Business Intelligence","volume":"65 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74597629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-25DOI: 10.20473/JISEBI.5.1.76-84
Dhyna Octabriyantiningtyas, E. Suryani
Background: Every year, the number of T-Cash users is increasing significantly. However, the increase is not in sync with the number of T-Cash transactions. In this year, it was noted that active T-Cash users were only 35%. Some clinical studies have established an assessment of the quality of services, there are several dimensions assessed according to the topic of research. The dimensions of service quality used in this study are dimensions of efficiency, reliability, responsiveness, privacy, and security.Objective: This study aims to build general models and simulations in increasing customer satisfaction with the quality of T-Cash services and produce the best scenarios that can be used by policymakers in increasing customer satisfaction.Methods: System dynamics framework is utilized for the development of the model and scenarios. Because by using a system dynamics framework can predict service quality sometime in the future so that it can produce policies for the company.Results: The simulation results are considered valid because they produce E1 values of 3% (E1 valid when E1 ≤ 5%) and E2 of 7% (E2 valid when E2 ≤ 30%). E1 is mean comparison and E2 is error variance. Based on these 2 scenarios, a policy can be taken that scenario 1 significantly increases customer satisfaction compared to scenario 2.Conclusion: Based on the simulation that has been done, it can be concluded that the dimensions of responsiveness, privacy, reliability, security, and efficiency have an effect on improving service quality. On the scenario 1, it can be concluded that with the addition of the user friendliness dimension, the service quality will experience a significant increase over the next 5 years.
{"title":"The Effect of Service Quality on T-Cash Customer Satisfaction using System Dynamics Framework","authors":"Dhyna Octabriyantiningtyas, E. Suryani","doi":"10.20473/JISEBI.5.1.76-84","DOIUrl":"https://doi.org/10.20473/JISEBI.5.1.76-84","url":null,"abstract":"Background: Every year, the number of T-Cash users is increasing significantly. However, the increase is not in sync with the number of T-Cash transactions. In this year, it was noted that active T-Cash users were only 35%. Some clinical studies have established an assessment of the quality of services, there are several dimensions assessed according to the topic of research. The dimensions of service quality used in this study are dimensions of efficiency, reliability, responsiveness, privacy, and security.Objective: This study aims to build general models and simulations in increasing customer satisfaction with the quality of T-Cash services and produce the best scenarios that can be used by policymakers in increasing customer satisfaction.Methods: System dynamics framework is utilized for the development of the model and scenarios. Because by using a system dynamics framework can predict service quality sometime in the future so that it can produce policies for the company.Results: The simulation results are considered valid because they produce E1 values of 3% (E1 valid when E1 ≤ 5%) and E2 of 7% (E2 valid when E2 ≤ 30%). E1 is mean comparison and E2 is error variance. Based on these 2 scenarios, a policy can be taken that scenario 1 significantly increases customer satisfaction compared to scenario 2.Conclusion: Based on the simulation that has been done, it can be concluded that the dimensions of responsiveness, privacy, reliability, security, and efficiency have an effect on improving service quality. On the scenario 1, it can be concluded that with the addition of the user friendliness dimension, the service quality will experience a significant increase over the next 5 years. ","PeriodicalId":16185,"journal":{"name":"Journal of Information Systems Engineering and Business Intelligence","volume":"10 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82644368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}