首页 > 最新文献

Journal of Information Systems Engineering and Business Intelligence最新文献

英文 中文
Implementations of Artificial Intelligence in Various Domains of IT Governance: A Systematic Literature Review 人工智能在不同IT治理领域的实现:系统的文献综述
Pub Date : 2023-11-01 DOI: 10.20473/jisebi.9.2.305-319
Eva Hariyanti, Made Balin Janeswari, Malvin Mikhael Moningka, Fikri Maulana Aziz, Annisa Rahma Putri, Oxy Setyo Hapsari, Nyoman Agus Arya Dwija Sutha, Yohannes Alexander Agusti Sinaga, Manik Prasanthi Bendesa
Background: Artificial intelligence (AI) has become increasingly prevalent in various industries, including IT governance. By integrating AI into the governance environment, organizations can benefit from the consolidation of frameworks and best practices. However, the adoption of AI across different stages of the governance process is unevenly distributed. Objective: The primary objective of this study is to perform a systematic literature review on applying artificial intelligence (AI) in IT governance processes, explicitly focusing on the Deming cycle. This study overlooks the specific details of the AI methods used in the various stages of IT governance processes. Methods: The search approach acquires relevant papers from Elsevier, Emerald, Google Scholar, Springer, and IEEE Xplore. The obtained results were then filtered using predefined inclusion and exclusion criteria to ensure the selection of relevant studies. Results: The search yielded 359 papers. Following our inclusion and exclusion criteria, we pinpointed 42 primary studies that discuss how AI is implemented in every domain of IT Governance related to the Deming cycle. Conclusion: We found that AI implementation is more dominant in the plan, do, and check stages of the Deming cycle, with a particular emphasis on domains such as risk management, strategy alignment, and performance measurement since most AI applications are not able to perform well in different contexts as well as the other usage driven by its unique capabilities. Keywords: Artificial Intelligence, Deming cycle, Governance, IT Governance domain, Systematic literature review
背景:人工智能(AI)在各个行业越来越普遍,包括IT治理。通过将AI集成到治理环境中,组织可以从框架和最佳实践的整合中获益。然而,在治理过程的不同阶段采用人工智能是不均匀分布的。目的:本研究的主要目的是对人工智能(AI)在IT治理过程中的应用进行系统的文献综述,明确地关注戴明周期。本研究忽略了在IT治理过程的各个阶段中使用的人工智能方法的具体细节。方法:检索Elsevier、Emerald、谷歌Scholar、施普林格、IEEE explore等网站的相关论文。然后使用预定义的纳入和排除标准对获得的结果进行筛选,以确保选择相关研究。结果:检索得到359篇论文。根据我们的纳入和排除标准,我们确定了42项主要研究,这些研究讨论了AI如何在与Deming周期相关的IT治理的每个领域中实现。结论:我们发现人工智能的实施在戴明周期的计划、执行和检查阶段更占主导地位,特别强调风险管理、战略协调和绩效衡量等领域,因为大多数人工智能应用程序无法在不同的环境中表现良好,以及由其独特功能驱动的其他使用。关键词:人工智能,戴明周期,治理,IT治理领域,系统文献综述
{"title":"Implementations of Artificial Intelligence in Various Domains of IT Governance: A Systematic Literature Review","authors":"Eva Hariyanti, Made Balin Janeswari, Malvin Mikhael Moningka, Fikri Maulana Aziz, Annisa Rahma Putri, Oxy Setyo Hapsari, Nyoman Agus Arya Dwija Sutha, Yohannes Alexander Agusti Sinaga, Manik Prasanthi Bendesa","doi":"10.20473/jisebi.9.2.305-319","DOIUrl":"https://doi.org/10.20473/jisebi.9.2.305-319","url":null,"abstract":"Background: Artificial intelligence (AI) has become increasingly prevalent in various industries, including IT governance. By integrating AI into the governance environment, organizations can benefit from the consolidation of frameworks and best practices. However, the adoption of AI across different stages of the governance process is unevenly distributed. Objective: The primary objective of this study is to perform a systematic literature review on applying artificial intelligence (AI) in IT governance processes, explicitly focusing on the Deming cycle. This study overlooks the specific details of the AI methods used in the various stages of IT governance processes. Methods: The search approach acquires relevant papers from Elsevier, Emerald, Google Scholar, Springer, and IEEE Xplore. The obtained results were then filtered using predefined inclusion and exclusion criteria to ensure the selection of relevant studies. Results: The search yielded 359 papers. Following our inclusion and exclusion criteria, we pinpointed 42 primary studies that discuss how AI is implemented in every domain of IT Governance related to the Deming cycle. Conclusion: We found that AI implementation is more dominant in the plan, do, and check stages of the Deming cycle, with a particular emphasis on domains such as risk management, strategy alignment, and performance measurement since most AI applications are not able to perform well in different contexts as well as the other usage driven by its unique capabilities. Keywords: Artificial Intelligence, Deming cycle, Governance, IT Governance domain, Systematic literature review","PeriodicalId":16185,"journal":{"name":"Journal of Information Systems Engineering and Business Intelligence","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135510235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ensemble Learning Based Malicious Node Detection in SDN-Based VANETs 基于集成学习的sdn vanet恶意节点检测
Pub Date : 2023-11-01 DOI: 10.20473/jisebi.9.2.136-146
Kunal Vermani, Amandeep Noliya, Sunil Kumar, Kamlesh Dutta
Background: The architecture of Software Defined Networking (SDN) integrated with Vehicular Ad-hoc Networks (VANETs) is considered a practical method for handling large-scale, dynamic, heterogeneous vehicular networks, since it offers flexibility, programmability, scalability, and a global understanding. However, the integration with VANETs introduces additional security vulnerabilities due to the deployment of a logically centralized control mechanism. These security attacks are classified as internal and external based on the nature of the attacker. The method adopted in this work facilitated the detection of internal position falsification attacks. Objective: This study aimed to investigate the performance of k-NN, SVM, Naïve Bayes, Logistic Regression, and Random Forest machine learning (ML) algorithms in detecting position falsification attacks using the Vehicular Reference Misbehavior (VeReMi) dataset. It also aimed to conduct a comparative analysis of two ensemble classification models, namely voting and stacking for final decision-making. These ensemble classification methods used the ML algorithms cooperatively to achieve improved classification. Methods: The simulations and evaluations were conducted using the Python programming language. VeReMi dataset was selected since it was an application-specific dataset for VANETs environment. Performance evaluation metrics, such as accuracy, precision, recall, F-measure, and prediction time were also used in the comparative studies. Results: This experimental study showed that Random Forest ML algorithm provided the best performance in detecting attacks among the ML algorithms. Voting and stacking were both used to enhance classification accuracy and reduce time required to identify an attack through predictions generated by k-NN, SVM, Naïve Bayes, Logistic Regression, and Random Forest classifiers. Conclusion: In terms of attack detection accuracy, both methods (voting and stacking) achieved the same level of accuracy as Random Forest. However, the detection of attack using stacking could be achieved in roughly less than half the time required by voting ensemble. Keywords: Machine learning methods, Majority voting ensemble, SDN-based VANETs, Security attacks, Stacking ensemble classifiers, VANETs,
背景:软件定义网络(SDN)与车辆自组织网络(VANETs)集成的架构被认为是处理大规模、动态、异构车辆网络的实用方法,因为它提供了灵活性、可编程性、可扩展性和全局理解。然而,由于部署了逻辑上集中的控制机制,与VANETs的集成引入了额外的安全漏洞。这些安全攻击根据攻击者的性质分为内部攻击和外部攻击。本文采用的方法有助于检测内部位置伪造攻击。目的:本研究旨在研究k-NN, SVM, Naïve贝叶斯,逻辑回归和随机森林机器学习(ML)算法在使用车辆参考不当行为(VeReMi)数据集检测位置伪造攻击中的性能。并对投票和堆叠两种集成分类模型进行比较分析,以进行最终决策。这些集成分类方法协同使用ML算法来实现改进的分类。方法:采用Python编程语言进行仿真和评价。选择VeReMi数据集是因为它是VANETs环境的特定应用数据集。准确度、精密度、召回率、f值和预测时间等性能评价指标也被用于比较研究。结果:本实验研究表明,随机森林机器学习算法在机器学习算法中检测攻击的性能最好。通过k-NN、SVM、Naïve贝叶斯、逻辑回归和随机森林分类器生成的预测,投票和堆叠都用于提高分类精度,减少识别攻击所需的时间。结论:在攻击检测准确率方面,两种方法(投票和堆叠)都达到了与Random Forest相同的准确率水平。然而,使用堆叠检测攻击可以在不到投票集合所需时间的一半的时间内实现。关键词:机器学习方法,多数投票集成,基于sdn的vanet,安全攻击,堆叠集成分类器,vanet,
{"title":"Ensemble Learning Based Malicious Node Detection in SDN-Based VANETs","authors":"Kunal Vermani, Amandeep Noliya, Sunil Kumar, Kamlesh Dutta","doi":"10.20473/jisebi.9.2.136-146","DOIUrl":"https://doi.org/10.20473/jisebi.9.2.136-146","url":null,"abstract":"Background: The architecture of Software Defined Networking (SDN) integrated with Vehicular Ad-hoc Networks (VANETs) is considered a practical method for handling large-scale, dynamic, heterogeneous vehicular networks, since it offers flexibility, programmability, scalability, and a global understanding. However, the integration with VANETs introduces additional security vulnerabilities due to the deployment of a logically centralized control mechanism. These security attacks are classified as internal and external based on the nature of the attacker. The method adopted in this work facilitated the detection of internal position falsification attacks. Objective: This study aimed to investigate the performance of k-NN, SVM, Naïve Bayes, Logistic Regression, and Random Forest machine learning (ML) algorithms in detecting position falsification attacks using the Vehicular Reference Misbehavior (VeReMi) dataset. It also aimed to conduct a comparative analysis of two ensemble classification models, namely voting and stacking for final decision-making. These ensemble classification methods used the ML algorithms cooperatively to achieve improved classification. Methods: The simulations and evaluations were conducted using the Python programming language. VeReMi dataset was selected since it was an application-specific dataset for VANETs environment. Performance evaluation metrics, such as accuracy, precision, recall, F-measure, and prediction time were also used in the comparative studies. Results: This experimental study showed that Random Forest ML algorithm provided the best performance in detecting attacks among the ML algorithms. Voting and stacking were both used to enhance classification accuracy and reduce time required to identify an attack through predictions generated by k-NN, SVM, Naïve Bayes, Logistic Regression, and Random Forest classifiers. Conclusion: In terms of attack detection accuracy, both methods (voting and stacking) achieved the same level of accuracy as Random Forest. However, the detection of attack using stacking could be achieved in roughly less than half the time required by voting ensemble. Keywords: Machine learning methods, Majority voting ensemble, SDN-based VANETs, Security attacks, Stacking ensemble classifiers, VANETs,","PeriodicalId":16185,"journal":{"name":"Journal of Information Systems Engineering and Business Intelligence","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135510372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Prediction of COVID-19 Using the Artificial Neural Network (ANN) with K-Fold Cross-Validation 基于K-Fold交叉验证的人工神经网络预测COVID-19
Pub Date : 2023-04-28 DOI: 10.20473/jisebi.9.1.16-27
Nur Alifiah, D. Kurniasari, Amanto Amanto, W. Warsono
Background: COVID-19 is a disease that attacks the respiratory system and is highly contagious, so cases of the spread of COVID-19 are increasing every day. The increase in COVID-19 cases cannot be predicted accurately, resulting in a shortage of services, facilities and medical personnel. This number will always increase if the community is not vigilant and actively reduces the rate of adding confirmed cases. Therefore, public awareness and vigilance need to be increased by presenting information on predictions of confirmed cases, recovered cases, and cases of death of COVID-19 so that it can be used as a reference for the government in taking and establishing a policy to overcome the spread of COVID-19.Objective: This research predicts COVID-19 in confirmed cases, recovered cases, and death cases in Lampung ProvinceMethod: This study uses the ANN method to determine the best network architecture for predicting confirmed cases, recovered cases, and deaths from COVID-19 using the k-fold cross-validation method to measure predictive model performance.Results: The method used has a good predictive ability with an accuracy value of 98.22% for confirmed cases, 98.08% for cured cases, and 99.05% for death cases.Conclusion: The ANN method with k-fold cross-validation to predict confirmed cases, recovered cases, and COVID-19 deaths in Lampung Province decreased from October 27, 2021, to January 24, 2022. Keywords: Artificial Intelligence, Artificial Neural Network (ANN) K-Fold Cross Validation, COVID-19 Cases, Data Mining, Prediction.
背景:COVID-19是一种侵袭呼吸系统的疾病,具有高度传染性,因此COVID-19的传播病例每天都在增加。COVID-19病例的增加无法准确预测,导致服务、设施和医务人员短缺。如果社会不保持警惕并积极降低新增确诊病例的速度,这一数字将不断增加。因此,需要提高国民的意识和警惕性,提供新冠肺炎确诊病例、康复病例、死亡病例预测等信息,为政府制定和制定应对新冠肺炎扩散的政策提供参考。目的:本研究预测楠pung省新冠肺炎确诊病例、康复病例和死亡病例方法:本研究使用人工神经网络方法确定预测新冠肺炎确诊病例、康复病例和死亡病例的最佳网络架构,并使用k-fold交叉验证方法衡量预测模型的性能。结果:该方法对确诊病例、治愈病例和死亡病例的预测准确率分别为98.22%、98.08%和99.05%,具有较好的预测能力。结论:采用k-fold交叉验证的人工神经网络方法预测楠pung省的确诊病例、康复病例和COVID-19死亡病例从2021年10月27日到2022年1月24日呈下降趋势。关键词:人工智能,人工神经网络K-Fold交叉验证,COVID-19病例,数据挖掘,预测
{"title":"Prediction of COVID-19 Using the Artificial Neural Network (ANN) with K-Fold Cross-Validation","authors":"Nur Alifiah, D. Kurniasari, Amanto Amanto, W. Warsono","doi":"10.20473/jisebi.9.1.16-27","DOIUrl":"https://doi.org/10.20473/jisebi.9.1.16-27","url":null,"abstract":"Background: COVID-19 is a disease that attacks the respiratory system and is highly contagious, so cases of the spread of COVID-19 are increasing every day. The increase in COVID-19 cases cannot be predicted accurately, resulting in a shortage of services, facilities and medical personnel. This number will always increase if the community is not vigilant and actively reduces the rate of adding confirmed cases. Therefore, public awareness and vigilance need to be increased by presenting information on predictions of confirmed cases, recovered cases, and cases of death of COVID-19 so that it can be used as a reference for the government in taking and establishing a policy to overcome the spread of COVID-19.\u0000Objective: This research predicts COVID-19 in confirmed cases, recovered cases, and death cases in Lampung Province\u0000Method: This study uses the ANN method to determine the best network architecture for predicting confirmed cases, recovered cases, and deaths from COVID-19 using the k-fold cross-validation method to measure predictive model performance.\u0000Results: The method used has a good predictive ability with an accuracy value of 98.22% for confirmed cases, 98.08% for cured cases, and 99.05% for death cases.\u0000Conclusion: The ANN method with k-fold cross-validation to predict confirmed cases, recovered cases, and COVID-19 deaths in Lampung Province decreased from October 27, 2021, to January 24, 2022.\u0000 \u0000Keywords: Artificial Intelligence, Artificial Neural Network (ANN) K-Fold Cross Validation, COVID-19 Cases, Data Mining, Prediction.","PeriodicalId":16185,"journal":{"name":"Journal of Information Systems Engineering and Business Intelligence","volume":"55 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85258052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Aspect-based Sentiment and Correlation-based Emotion Detection on Tweets for Understanding Public Opinion of Covid-19 基于方面的情绪检测和基于关联的推文情绪检测,以理解新冠疫情的民意
Pub Date : 2023-04-28 DOI: 10.20473/jisebi.9.1.84-94
S. Salsabila, Salsabila Mazya Permataning Tyas, Yasinta Romadhona, D. Purwitasari
Background: During the Covid-19 period, the government made policies dealing with it. Policies issued by the government invited public opinion as a form of public reaction to these policies. The easiest way to find out the public’s response is through Twitter’s social media. However, Twitter data have limitations. There is a mix between facts and personal opinions. It is necessary to distinguish between these. Opinions expressed by the public can be both positive and negative, so correlation is needed to link opinions and their emotions.Objective: This study discusses sentiment and emotion detection to understand public opinion accurately. Sentiment and emotion are analyzed using Pearson correlation to determine the correlation.Methods: The datasets were about public opinion of Covid-19 retrieved from Twitter. The data were annotated into sentiment and emotion using Pearson correlation. After the annotation process, the data were preprocessed. Afterward, single model classification was carried out using machine learning methods (Support Vector Machine, Random Forest, Naïve Bayes) and deep learning method (Bidirectional Encoder Representation from Transformers). The classification process was focused on accuracy and F1-score evaluation.Results: There were three scenarios for determining sentiment and emotion, namely the factor of aspect-based and correlation-based, without those factors, and aspect-based sentiment only. The scenario using the two aforementioned factors obtained an accuracy value of 97%, while an accuracy of 96% was acquired without them.Conclusion: The use of aspect and correlation with Pearson correlation has helped better understand public opinion regarding sentiment and emotion more accurately. Keywords: Aspect-based sentiment, Deep learning, Emotion detection, Machine learning, Pearson correlation, Public opinion.
背景:在新冠疫情期间,政府制定了应对政策。政府发布的政策邀请民意作为公众对这些政策的反应的一种形式。了解公众反应的最简单方法是通过推特社交媒体。然而,Twitter的数据有局限性。事实和个人观点是相互交织的。有必要对这些进行区分。公众表达的意见可以是积极的,也可以是消极的,因此需要将意见和他们的情绪联系起来。目的:探讨情绪与情绪检测对民意准确理解的影响。使用Pearson相关来分析情绪和情绪,以确定相关性。方法:数据集为来自Twitter的Covid-19公众舆论数据集。使用Pearson相关将数据标注为情绪和情绪。标注过程结束后,对数据进行预处理。然后,使用机器学习方法(支持向量机、随机森林、Naïve贝叶斯)和深度学习方法(Transformers双向编码器表示)进行单模型分类。分类过程侧重于准确性和f1评分评估。结果:情绪和情绪的确定有三种情景,即以方面为基础的因素和以相关为基础的因素,不考虑这些因素和仅以方面为基础的情绪。使用上述两个因素的场景获得了97%的准确率值,而没有它们的场景获得了96%的准确率值。结论:使用方面和相关与Pearson相关有助于更准确地理解公众对情绪和情绪的看法。关键词:面向情感,深度学习,情感检测,机器学习,Pearson相关,民意
{"title":"Aspect-based Sentiment and Correlation-based Emotion Detection on Tweets for Understanding Public Opinion of Covid-19","authors":"S. Salsabila, Salsabila Mazya Permataning Tyas, Yasinta Romadhona, D. Purwitasari","doi":"10.20473/jisebi.9.1.84-94","DOIUrl":"https://doi.org/10.20473/jisebi.9.1.84-94","url":null,"abstract":"Background: During the Covid-19 period, the government made policies dealing with it. Policies issued by the government invited public opinion as a form of public reaction to these policies. The easiest way to find out the public’s response is through Twitter’s social media. However, Twitter data have limitations. There is a mix between facts and personal opinions. It is necessary to distinguish between these. Opinions expressed by the public can be both positive and negative, so correlation is needed to link opinions and their emotions.\u0000Objective: This study discusses sentiment and emotion detection to understand public opinion accurately. Sentiment and emotion are analyzed using Pearson correlation to determine the correlation.\u0000Methods: The datasets were about public opinion of Covid-19 retrieved from Twitter. The data were annotated into sentiment and emotion using Pearson correlation. After the annotation process, the data were preprocessed. Afterward, single model classification was carried out using machine learning methods (Support Vector Machine, Random Forest, Naïve Bayes) and deep learning method (Bidirectional Encoder Representation from Transformers). The classification process was focused on accuracy and F1-score evaluation.\u0000Results: There were three scenarios for determining sentiment and emotion, namely the factor of aspect-based and correlation-based, without those factors, and aspect-based sentiment only. The scenario using the two aforementioned factors obtained an accuracy value of 97%, while an accuracy of 96% was acquired without them.\u0000Conclusion: The use of aspect and correlation with Pearson correlation has helped better understand public opinion regarding sentiment and emotion more accurately.\u0000 \u0000Keywords: Aspect-based sentiment, Deep learning, Emotion detection, Machine learning, Pearson correlation, Public opinion.","PeriodicalId":16185,"journal":{"name":"Journal of Information Systems Engineering and Business Intelligence","volume":"3 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85638575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Aspect in Software Testing Perspective: A Systematic Literature Review 软件测试视角下的安全问题:系统的文献综述
Pub Date : 2023-04-28 DOI: 10.20473/jisebi.9.1.95-107
Halim Wildan Awalurahman, Ibrahim Hafizhan Witsqa, I. K. Raharjana, A. Basori
Background: Software testing and software security have become one of the most important parts of an application. Many studies have explored each of these topics but there is a gap wherein the relation of software security and software testing in general has not been explored.Objective: This study aims to conduct a systematic literature review to capture the current state-of-the-art in software testing related to security.Methods: The search strategy obtains relevant papers from IEEE Xplore and ScienceDirect. The results of the search are filtered by applying inclusion and exclusion criteria.Results: The search results identified 50 papers. After applying the inclusion/exclusion criteria, we identified 15 primary studies that discuss software security and software testing. We found approaches, aspects, references, and domains that are used in software security and software testing.Conclusion: We found certain approach, aspect, references, and domain are used more often in software security testing Keywords: Software security, Software testing, Security testing approach, Security threats, Systematic literature review
背景:软件测试和软件安全已经成为应用程序中最重要的部分之一。许多研究都对这些主题进行了探讨,但在软件安全和软件测试之间的关系方面还存在空白。目的:本研究旨在进行系统的文献综述,以获取当前与安全性相关的软件测试的最新进展。方法:采用检索策略从IEEE explore和ScienceDirect中获取相关论文。通过应用包含和排除标准对搜索结果进行过滤。结果:检索结果确定了50篇论文。在应用纳入/排除标准之后,我们确定了15个讨论软件安全和软件测试的主要研究。我们发现了在软件安全和软件测试中使用的方法、方面、参考和领域。关键词:软件安全,软件测试,安全测试方法,安全威胁,系统文献综述
{"title":"Security Aspect in Software Testing Perspective: A Systematic Literature Review","authors":"Halim Wildan Awalurahman, Ibrahim Hafizhan Witsqa, I. K. Raharjana, A. Basori","doi":"10.20473/jisebi.9.1.95-107","DOIUrl":"https://doi.org/10.20473/jisebi.9.1.95-107","url":null,"abstract":"Background: Software testing and software security have become one of the most important parts of an application. Many studies have explored each of these topics but there is a gap wherein the relation of software security and software testing in general has not been explored.\u0000Objective: This study aims to conduct a systematic literature review to capture the current state-of-the-art in software testing related to security.\u0000Methods: The search strategy obtains relevant papers from IEEE Xplore and ScienceDirect. The results of the search are filtered by applying inclusion and exclusion criteria.\u0000Results: The search results identified 50 papers. After applying the inclusion/exclusion criteria, we identified 15 primary studies that discuss software security and software testing. We found approaches, aspects, references, and domains that are used in software security and software testing.\u0000Conclusion: We found certain approach, aspect, references, and domain are used more often in software security testing\u0000 \u0000Keywords: Software security, Software testing, Security testing approach, Security threats, Systematic literature review","PeriodicalId":16185,"journal":{"name":"Journal of Information Systems Engineering and Business Intelligence","volume":"8 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89557744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Trends and Applications of Gamification in E-Commerce: A Systematic Literature Review 电子商务中的游戏化趋势与应用:系统文献综述
Pub Date : 2023-04-28 DOI: 10.20473/jisebi.9.1.28-37
Muhamad Adhytia Wana Putra Rahmadhan, D. I. Sensuse, Ryan Randy Suryono, Kautsarina Kautsarina
Background: Gamification is a trend that has emerged with the growth of e-commerce. Given the wide range of human characteristics, determining which gamification elements perform well and what impact those gamification elements have can be challenging.Objective: This study aims to conduct a systematic literature review to broadly review the impact that can be caused by the application of gamification elements in e-commerce. This study also attempts to identify the current trends in using gamification elements.Methods: This study was carried out based on the Kitchenham approach and analyzes 25 research papers extracted from a total of 550 papers. The articles were gathered from ACM, Emerald, ScienceDirect, and Scopus and were published between 2016 and 2021.Results: This study found that the trend of research in the field of gamification in e-commerce continues to grow every year. Also, this study found that the most frequently used gamification elements are achievement-oriented (such as rewards, points, badges, and leaderboards). Meanwhile, immersion-related gamification elements (such as avatars, fantasy, etc.) are emerging as a new trend for new gamification elements to be incorporated in e-commerce. This study also found three major themes, namely consumer loyalty, consumer engagement, and user behavior, as a result of the application of gamification in e-commerce.Conclusion: This study helps to improve knowledge of various gamification elements, trends, and impacts on e-commerce. Future studies need to examine the challenges that may arise in the application of gamification elements to the three major themes found in this study and find potential solutions to overcome them. Keywords: E-Commerce, Gamification, Gamification trends and applications, Kitchenham, Systematic literature review. 
背景:游戏化是随着电子商务的发展而出现的一种趋势。考虑到人类特征的广泛性,确定哪些游戏化元素表现良好以及这些游戏化元素的影响可能具有挑战性。目的:本研究旨在通过系统的文献综述,对游戏化元素在电子商务中的应用可能产生的影响进行综述。本研究还试图确定使用游戏化元素的当前趋势。方法:本研究采用Kitchenham方法,从550篇文献中抽取25篇文献进行分析。这些文章来自ACM、Emerald、ScienceDirect和Scopus,发表于2016年至2021年之间。结果:本研究发现,电子商务游戏化领域的研究趋势每年都在持续增长。此外,该研究还发现,最常使用的游戏化元素是以成就为导向的(游戏邦注:如奖励、积分、徽章和排行榜)。与此同时,与沉浸感相关的游戏化元素(如化身、幻想等)正在成为电子商务中融入新游戏化元素的新趋势。本研究还发现了游戏化在电子商务中应用的三个主要主题,即消费者忠诚度、消费者参与度和用户行为。结论:本研究有助于提高对各种游戏化元素、趋势及其对电子商务的影响的认识。未来的研究需要检查在将游戏化元素应用于本研究中发现的三个主要主题时可能出现的挑战,并找到克服这些挑战的潜在解决方案。关键词:电子商务,游戏化,游戏化趋势与应用,Kitchenham,系统文献综述
{"title":"Trends and Applications of Gamification in E-Commerce: A Systematic Literature Review","authors":"Muhamad Adhytia Wana Putra Rahmadhan, D. I. Sensuse, Ryan Randy Suryono, Kautsarina Kautsarina","doi":"10.20473/jisebi.9.1.28-37","DOIUrl":"https://doi.org/10.20473/jisebi.9.1.28-37","url":null,"abstract":"Background: Gamification is a trend that has emerged with the growth of e-commerce. Given the wide range of human characteristics, determining which gamification elements perform well and what impact those gamification elements have can be challenging.\u0000Objective: This study aims to conduct a systematic literature review to broadly review the impact that can be caused by the application of gamification elements in e-commerce. This study also attempts to identify the current trends in using gamification elements.\u0000Methods: This study was carried out based on the Kitchenham approach and analyzes 25 research papers extracted from a total of 550 papers. The articles were gathered from ACM, Emerald, ScienceDirect, and Scopus and were published between 2016 and 2021.\u0000Results: This study found that the trend of research in the field of gamification in e-commerce continues to grow every year. Also, this study found that the most frequently used gamification elements are achievement-oriented (such as rewards, points, badges, and leaderboards). Meanwhile, immersion-related gamification elements (such as avatars, fantasy, etc.) are emerging as a new trend for new gamification elements to be incorporated in e-commerce. This study also found three major themes, namely consumer loyalty, consumer engagement, and user behavior, as a result of the application of gamification in e-commerce.\u0000Conclusion: This study helps to improve knowledge of various gamification elements, trends, and impacts on e-commerce. Future studies need to examine the challenges that may arise in the application of gamification elements to the three major themes found in this study and find potential solutions to overcome them.\u0000 \u0000Keywords: E-Commerce, Gamification, Gamification trends and applications, Kitchenham, Systematic literature review.\u0000 ","PeriodicalId":16185,"journal":{"name":"Journal of Information Systems Engineering and Business Intelligence","volume":"51 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89802633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Simulation of System Dynamics for Improving The Quality of Paddy Production in Supporting Food Security 支持粮食安全提高水稻生产质量的系统动力学模拟
Pub Date : 2023-04-28 DOI: 10.20473/jisebi.9.1.38-46
Mala Rosa Aprillya, E. Suryani
Background: The food security policy is an effort to ensure stable food availability and stable access of the community to food. As the population increases, this will affect the fulfillment of food needs in the future. Therefore, increase in rice production is needed to support food security.Objective: Conduct an analysis of the factors affecting the quality of rice production by using a dynamic system simulation that can be used as a basis for formulating policy strategies.Method: Simulation using System Dynamics (SD) is a method used to study and analyze complex systems by modeling non-linear behavior. Then several scenarios were carried out for the best decision-making using a computer.Result: The results of the scenario show that increasing the quality of paddy production in order to meet food needs in the future is doable by boosting the rendement of paddy as it will upgrade rice production which  will contribute greatly to rice production.Conclusion: From the simulation results, the  study can be used to increase the quality of rice production to maintain food security by improving the harvesting mechanism to increase yields. For further research, the use of Smart Agriculture can be considered to increase production of rice. Keywords: Food security, Rice production, Rice production, System dynamics
背景:粮食安全政策是一项努力,以确保稳定的粮食供应和稳定的社区获得粮食。随着人口的增长,这将影响到未来粮食需求的满足。因此,需要增加水稻产量来支持粮食安全。目的:通过动态系统模拟分析影响水稻生产质量的因素,为制定政策策略提供依据。方法:系统动力学仿真(SD)是一种通过模拟非线性行为来研究和分析复杂系统的方法。然后用计算机进行了几个场景的最佳决策。结果:情景分析结果表明,通过提高水稻产量来提高水稻生产质量以满足未来粮食需求是可行的,因为这将使水稻生产升级,对水稻生产有很大贡献。结论:从模拟结果来看,研究可以通过改进收获机制,提高产量,提高水稻生产质量,维护粮食安全。对于进一步的研究,可以考虑使用智能农业来增加水稻的产量。关键词:粮食安全,水稻生产,水稻生产,系统动力学
{"title":"Simulation of System Dynamics for Improving The Quality of Paddy Production in Supporting Food Security","authors":"Mala Rosa Aprillya, E. Suryani","doi":"10.20473/jisebi.9.1.38-46","DOIUrl":"https://doi.org/10.20473/jisebi.9.1.38-46","url":null,"abstract":"Background: The food security policy is an effort to ensure stable food availability and stable access of the community to food. As the population increases, this will affect the fulfillment of food needs in the future. Therefore, increase in rice production is needed to support food security.\u0000Objective: Conduct an analysis of the factors affecting the quality of rice production by using a dynamic system simulation that can be used as a basis for formulating policy strategies.\u0000Method: Simulation using System Dynamics (SD) is a method used to study and analyze complex systems by modeling non-linear behavior. Then several scenarios were carried out for the best decision-making using a computer.\u0000Result: The results of the scenario show that increasing the quality of paddy production in order to meet food needs in the future is doable by boosting the rendement of paddy as it will upgrade rice production which  will contribute greatly to rice production.\u0000Conclusion: From the simulation results, the  study can be used to increase the quality of rice production to maintain food security by improving the harvesting mechanism to increase yields. For further research, the use of Smart Agriculture can be considered to increase production of rice.\u0000 \u0000Keywords: Food security, Rice production, Rice production, System dynamics","PeriodicalId":16185,"journal":{"name":"Journal of Information Systems Engineering and Business Intelligence","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84444091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Vader Lexicon and Support Vector Machine Algorithm to Detect Customer Sentiment Orientation 基于维德词典和支持向量机算法的顾客情感倾向检测
Pub Date : 2023-04-28 DOI: 10.20473/jisebi.9.1.108-118
Vivine Nurcahyawati, Z. Mustaffa
Background: The concept of customer orientation, which is based on a set of fundamental beliefs that prioritize the interests of the customer, requires companies to detect these interests in order to maintain a high level of quality in their products or services. Furthermore, there are several indicators of customer orientation, and one of them is their opinion or taste, which provides valuable feedback for businesses. With the rapid development of social media, customers can express emotions, thoughts, and opinions about services or products that may not be easily conveyed in the real world.Objective: The objective of this study is to detect customer orientation towards product or service quality, as expressed in online or social media. Additionally, the study showcases the novelty and superiority of the annotation process used for detecting customer orientation classifications.Methods: This study employs a method to compare the classification performance of the Vader lexicon annotation process with manual annotation. To accomplish this, a dataset from the Amazon website will be analyzed and classified using the Support Vector Machine algorithm. The objective of this method is to determine the level of customer orientation present within the dataset. To evaluate the effectiveness of the Vader lexicon, the study will compare the results of manual and automatic data annotation.Results: The results showed that customer orientation towards product or service quality has a predominantly positive value, comprising up to 76% of the total responses analyzed.Conclusion: The findings demonstrate that using Vader in the annotation process results in superior accuracy values compared to manual annotation. Specifically, the accuracy value increased from 86% to 88.57%, indicating that Vader could be a reliable tool for annotating text. Therefore, future studies should consider using Vader as a classifier or integrating it into the annotation process to further enhance its performance. Keywords: Classification, Customer, Orientation, Text analysis, Vader lexicon,
背景:以客户为导向的概念是基于一套优先考虑客户利益的基本信念,它要求公司检测这些利益,以保持产品或服务的高质量水平。此外,客户导向有几个指标,其中一个是他们的意见或品味,这为企业提供了有价值的反馈。随着社交媒体的快速发展,客户可以表达对服务或产品的情感、想法和意见,这些在现实世界中可能不容易传达。目的:本研究的目的是检测客户对产品或服务质量的倾向,表现在网络或社交媒体上。此外,该研究还展示了用于检测客户导向分类的注释过程的新颖性和优越性。方法:采用一种方法对维德词典标注过程与人工标注过程的分类性能进行比较。为了实现这一点,将使用支持向量机算法对来自亚马逊网站的数据集进行分析和分类。该方法的目标是确定数据集中呈现的客户导向水平。为了评估维德词典的有效性,本研究将比较人工和自动数据标注的结果。结果:结果显示,客户对产品或服务质量的导向具有主要的积极价值,占分析的总响应的76%。结论:研究结果表明,在标注过程中使用Vader比手动标注具有更高的准确率值。具体来说,准确率值从86%提高到88.57%,表明Vader可以成为一个可靠的文本注释工具。因此,未来的研究应考虑使用Vader作为分类器或将其集成到标注过程中,以进一步提高其性能。关键词:分类,顾客,定位,文本分析,维德词典
{"title":"Vader Lexicon and Support Vector Machine Algorithm to Detect Customer Sentiment Orientation","authors":"Vivine Nurcahyawati, Z. Mustaffa","doi":"10.20473/jisebi.9.1.108-118","DOIUrl":"https://doi.org/10.20473/jisebi.9.1.108-118","url":null,"abstract":"Background: The concept of customer orientation, which is based on a set of fundamental beliefs that prioritize the interests of the customer, requires companies to detect these interests in order to maintain a high level of quality in their products or services. Furthermore, there are several indicators of customer orientation, and one of them is their opinion or taste, which provides valuable feedback for businesses. With the rapid development of social media, customers can express emotions, thoughts, and opinions about services or products that may not be easily conveyed in the real world.\u0000Objective: The objective of this study is to detect customer orientation towards product or service quality, as expressed in online or social media. Additionally, the study showcases the novelty and superiority of the annotation process used for detecting customer orientation classifications.\u0000Methods: This study employs a method to compare the classification performance of the Vader lexicon annotation process with manual annotation. To accomplish this, a dataset from the Amazon website will be analyzed and classified using the Support Vector Machine algorithm. The objective of this method is to determine the level of customer orientation present within the dataset. To evaluate the effectiveness of the Vader lexicon, the study will compare the results of manual and automatic data annotation.\u0000Results: The results showed that customer orientation towards product or service quality has a predominantly positive value, comprising up to 76% of the total responses analyzed.\u0000Conclusion: The findings demonstrate that using Vader in the annotation process results in superior accuracy values compared to manual annotation. Specifically, the accuracy value increased from 86% to 88.57%, indicating that Vader could be a reliable tool for annotating text. Therefore, future studies should consider using Vader as a classifier or integrating it into the annotation process to further enhance its performance.\u0000 \u0000Keywords: Classification, Customer, Orientation, Text analysis, Vader lexicon,","PeriodicalId":16185,"journal":{"name":"Journal of Information Systems Engineering and Business Intelligence","volume":"212 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90479081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Hybrid Deep CNN-SVM Approach for Brain Tumor Classification 一种混合深度CNN-SVM脑肿瘤分类方法
Pub Date : 2023-04-28 DOI: 10.20473/jisebi.9.1.1-15
A. Biswas, Md. Saiful Islam
Background: Feature extraction process is noteworthy in order to categorize brain tumors. Handcrafted feature extraction process consists of profound limitations. Similarly, without appropriate classifier, the promising improved results can’t be obtained.Objective: This paper proposes a hybrid model for classifying brain tumors more accurately and rapidly is a preferable choice for aggravating tasks. The main objective of this research is to classify brain tumors through Deep Convolutional Neural Network (DCNN) and Support Vector Machine (SVM)-based hybrid model.Methods: The MRI images are firstly preprocessed to improve the feature extraction process through the following steps: resize, effective noise reduction, and contrast enhancement.  Noise reduction is done by anisotropic diffusion filter, and contrast enhancement is done by adaptive histogram equalization. Secondly, the implementation of augmentation enhances the data number and data variety. Thirdly, custom deep CNN is constructed for meaningful deep feature extraction. Finally, the superior machine learning classifier SVM is integrated for classification tasks. After that, this proposed hybrid model is compared with transfer learning models: AlexNet, GoogLeNet, and VGG16.Results: The proposed method uses the ‘Figshare’ dataset and obtains 96.0% accuracy, 98.0% specificity, and 95.71% sensitivity, higher than other transfer learning models. Also, the proposed model takes less time than others.Conclusion: The effectiveness of the proposed deep CNN-SVM model divulges by the performance, which manifests that it extracts features automatically without overfitting problems and improves the classification performance for hybrid structure, and is less time-consuming. Keywords:  Adaptive histogram equalization, Anisotropic diffusion filter, Deep CNN, E-health, Machine learning, SVM, Transfer learning.
背景:为了对脑肿瘤进行分类,特征提取过程值得关注。手工特征提取过程存在着深刻的局限性。同样,如果没有合适的分类器,也无法获得有希望的改进结果。目的:提出一种更准确、快速的脑肿瘤分类混合模型,是加重任务的较好选择。本研究的主要目的是通过基于深度卷积神经网络(DCNN)和支持向量机(SVM)的混合模型对脑肿瘤进行分类。方法:首先对MRI图像进行预处理,通过调整大小、有效降噪、增强对比度等步骤改进特征提取过程。采用各向异性扩散滤波实现降噪,采用自适应直方图均衡化实现对比度增强。其次,增强的实施增强了数据数量和数据种类。第三,构建自定义深度CNN,进行有意义的深度特征提取。最后,将优秀的机器学习分类器SVM集成到分类任务中。然后,将该混合模型与迁移学习模型AlexNet、GoogLeNet和VGG16进行比较。结果:该方法使用“Figshare”数据集,准确率为96.0%,特异性为98.0%,灵敏度为95.71%,高于其他迁移学习模型。此外,所提出的模型比其他模型花费的时间更少。结论:本文提出的深度CNN-SVM模型的有效性体现在性能上,它可以自动提取特征,不存在过拟合问题,提高了混合结构的分类性能,并且耗时更短。关键词:自适应直方图均衡化,各向异性扩散滤波,深度CNN,电子健康,机器学习,支持向量机,迁移学习
{"title":"A Hybrid Deep CNN-SVM Approach for Brain Tumor Classification","authors":"A. Biswas, Md. Saiful Islam","doi":"10.20473/jisebi.9.1.1-15","DOIUrl":"https://doi.org/10.20473/jisebi.9.1.1-15","url":null,"abstract":"Background: Feature extraction process is noteworthy in order to categorize brain tumors. Handcrafted feature extraction process consists of profound limitations. Similarly, without appropriate classifier, the promising improved results can’t be obtained.\u0000Objective: This paper proposes a hybrid model for classifying brain tumors more accurately and rapidly is a preferable choice for aggravating tasks. The main objective of this research is to classify brain tumors through Deep Convolutional Neural Network (DCNN) and Support Vector Machine (SVM)-based hybrid model.\u0000Methods: The MRI images are firstly preprocessed to improve the feature extraction process through the following steps: resize, effective noise reduction, and contrast enhancement.  Noise reduction is done by anisotropic diffusion filter, and contrast enhancement is done by adaptive histogram equalization. Secondly, the implementation of augmentation enhances the data number and data variety. Thirdly, custom deep CNN is constructed for meaningful deep feature extraction. Finally, the superior machine learning classifier SVM is integrated for classification tasks. After that, this proposed hybrid model is compared with transfer learning models: AlexNet, GoogLeNet, and VGG16.\u0000Results: The proposed method uses the ‘Figshare’ dataset and obtains 96.0% accuracy, 98.0% specificity, and 95.71% sensitivity, higher than other transfer learning models. Also, the proposed model takes less time than others.\u0000Conclusion: The effectiveness of the proposed deep CNN-SVM model divulges by the performance, which manifests that it extracts features automatically without overfitting problems and improves the classification performance for hybrid structure, and is less time-consuming.\u0000 \u0000Keywords:  Adaptive histogram equalization, Anisotropic diffusion filter, Deep CNN, E-health, Machine learning, SVM, Transfer learning.","PeriodicalId":16185,"journal":{"name":"Journal of Information Systems Engineering and Business Intelligence","volume":"11 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90443033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Factors Affecting Adoption of Telemedicine for Virtual Healthcare Services in Indonesia 影响印度尼西亚虚拟医疗服务采用远程医疗的因素
Pub Date : 2023-04-28 DOI: 10.20473/jisebi.9.1.47-69
Rima Alviani, B. Purwandari, I. Eitiveni, Mardiana Purwaningsih
Background: The utilization of virtual healthcare services, particularly telemedicine, has been accelerated by the COVID-19 pandemic. Although the pandemic is no longer the primary concern, telemedicine still holds potential for long-term adoption. However, implementing telemedicine in Indonesia as an online platform for remote healthcare delivery still faces issues, despite its potential. Further investigation is required to identify the factors that affect its adoption and develop strategies to surmount implementation challenges.Objective: This study aims to examine and enrich knowledge about the adoption of telemedicine in Indonesia.Methods: A cross-sectional survey was conducted through an online questionnaire to collect data. Unified Theory of Acceptance and Use of Technology 2 (UTAUT2) was employed by integrating with several factors, such as eHealth Literacy, Privacy Concerns, and Trust. Gender and age were considered as moderating variables. Data samples were analyzed using Partial Least Square – Structural Equation Modeling (PLS–SEM).Results: The findings suggest that performance expectancy, effort expectancy, social influence, eHealth literacy, and trust have a significant impact on adults’ behavioral intention to use telemedicine. However, facilitating condition, price value, and privacy concern do not show any significant effects on adults’ Behavioral Intention to Use Telemedicine.  Conclusion: This study highlights the importance of understanding adoption factors to develop effective strategies. Results show performance expectancy, effort expectancy, social influence, eHealth literacy, and trust are significant factors, while facilitating condition, price value, and privacy concern are not. The UTAUT2 model is a good predictive tool for healthcare adoption. To increase usage intention, several aspects must be considered in the implementation of telemedicine. Keywords: Adoption, Behavioral Intention to Use, Telemedicine, UTAUT2, Virtual Healthcare.
背景:COVID-19大流行加速了虚拟医疗服务,特别是远程医疗的利用。虽然大流行病不再是主要关切,但远程医疗仍然具有长期采用的潜力。然而,在印度尼西亚实施远程医疗作为远程医疗服务的在线平台仍然面临着一些问题,尽管它有潜力。需要进一步调查,以确定影响其采用的因素,并制定战略以克服执行方面的挑战。目的:本研究旨在调查和丰富印度尼西亚采用远程医疗的知识。方法:采用横断面调查法,采用在线问卷收集资料。技术接受和使用的统一理论2 (UTAUT2)通过整合几个因素,如电子健康素养,隐私问题和信任被采用。性别和年龄被认为是调节变量。采用偏最小二乘-结构方程模型(PLS-SEM)对数据样本进行分析。结果:研究结果表明,绩效期望、努力期望、社会影响力、电子健康素养和信任对成人使用远程医疗的行为意愿有显著影响。而便利条件、价格价值和隐私问题对成人远程医疗使用行为意愿的影响不显著。结论:本研究强调了了解收养因素对制定有效策略的重要性。结果显示,绩效期望、努力期望、社会影响力、电子健康素养和信任是影响因素,便利条件、价格价值和隐私关注不是影响因素。UTAUT2模型是医疗保健采用的一个很好的预测工具。为了提高使用意愿,在实施远程医疗时必须考虑几个方面。关键词:收养,行为使用意向,远程医疗,UTAUT2,虚拟医疗
{"title":"Factors Affecting Adoption of Telemedicine for Virtual Healthcare Services in Indonesia","authors":"Rima Alviani, B. Purwandari, I. Eitiveni, Mardiana Purwaningsih","doi":"10.20473/jisebi.9.1.47-69","DOIUrl":"https://doi.org/10.20473/jisebi.9.1.47-69","url":null,"abstract":"Background: The utilization of virtual healthcare services, particularly telemedicine, has been accelerated by the COVID-19 pandemic. Although the pandemic is no longer the primary concern, telemedicine still holds potential for long-term adoption. However, implementing telemedicine in Indonesia as an online platform for remote healthcare delivery still faces issues, despite its potential. Further investigation is required to identify the factors that affect its adoption and develop strategies to surmount implementation challenges.\u0000Objective: This study aims to examine and enrich knowledge about the adoption of telemedicine in Indonesia.\u0000Methods: A cross-sectional survey was conducted through an online questionnaire to collect data. Unified Theory of Acceptance and Use of Technology 2 (UTAUT2) was employed by integrating with several factors, such as eHealth Literacy, Privacy Concerns, and Trust. Gender and age were considered as moderating variables. Data samples were analyzed using Partial Least Square – Structural Equation Modeling (PLS–SEM).\u0000Results: The findings suggest that performance expectancy, effort expectancy, social influence, eHealth literacy, and trust have a significant impact on adults’ behavioral intention to use telemedicine. However, facilitating condition, price value, and privacy concern do not show any significant effects on adults’ Behavioral Intention to Use Telemedicine.  \u0000Conclusion: This study highlights the importance of understanding adoption factors to develop effective strategies. Results show performance expectancy, effort expectancy, social influence, eHealth literacy, and trust are significant factors, while facilitating condition, price value, and privacy concern are not. The UTAUT2 model is a good predictive tool for healthcare adoption. To increase usage intention, several aspects must be considered in the implementation of telemedicine.\u0000 \u0000Keywords: Adoption, Behavioral Intention to Use, Telemedicine, UTAUT2, Virtual Healthcare.","PeriodicalId":16185,"journal":{"name":"Journal of Information Systems Engineering and Business Intelligence","volume":"9 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78590246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Information Systems Engineering and Business Intelligence
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1