Pub Date : 2019-10-01DOI: 10.1109/ICACSIS47736.2019.8979739
Qurrata A’yuna Adrianus, G. Guarddin, H. Santoso
This research was conducted to explore user needs and an effective design interaction based on user interface principle and the needs of both disabled and non-disabled people. This study proposes an effective design of mobile application for providing public facilities for persons with disabilities called BisaGo. The data were collected from an online survey to get the user requirements about design and information. The evaluation was done using usability testing, and interview sessions. The result shows that there are three groups of user needs toward this application, i.e: general needs, primary needs, and special needs. Also, the evaluation shows that the simple design is enough to represent the user needs with an average score of 8.05. However, the design can be improved to make it more attractive.
{"title":"Developing Interaction Design to Provide Public Facilities Information for Persons with Disabilities","authors":"Qurrata A’yuna Adrianus, G. Guarddin, H. Santoso","doi":"10.1109/ICACSIS47736.2019.8979739","DOIUrl":"https://doi.org/10.1109/ICACSIS47736.2019.8979739","url":null,"abstract":"This research was conducted to explore user needs and an effective design interaction based on user interface principle and the needs of both disabled and non-disabled people. This study proposes an effective design of mobile application for providing public facilities for persons with disabilities called BisaGo. The data were collected from an online survey to get the user requirements about design and information. The evaluation was done using usability testing, and interview sessions. The result shows that there are three groups of user needs toward this application, i.e: general needs, primary needs, and special needs. Also, the evaluation shows that the simple design is enough to represent the user needs with an average score of 8.05. However, the design can be improved to make it more attractive.","PeriodicalId":165090,"journal":{"name":"2019 International Conference on Advanced Computer Science and information Systems (ICACSIS)","volume":"428 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115932179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/ICACSIS47736.2019.8979945
Dimas Agung Saputra, W. S. Nugroho, B. Ranti
The problem that the organization often face is the difficulty of measuring the effectiveness of IT investment, alignment with business objective, and the benefit map into the part of organization affected. The purpose of this study is to analyze the business benefits of IT investments in Business Support System (BSS) projects, such as Customer Relationship Management (CRM) and Billing system in Indonesian Telecommunication Companies. The method of analysis is using the Ranti’s Generic IS/IT Business Value Table, which is an IT investment management framework. The analysis is also carried out the benefit identified to the units each organization within the company according to the functions of enhanced Telecom Operation Map (eTOM), which are the framework of the business process in the Telecommunication industry. The result show from case studies that the benefits provided by BSS projects are to increase business capacity (IRE-01) and improve service quality (IQU-03. The benefits obtained are more relating to business development of product and improve service quality of customer. The eTOM 2018 functions which get business values benefit are Product (7 sub-categories), Customer (3 sub-categories), Service (3 sub-categories), Resource (3 sub-categories), and Marketing (1 sub-category)
{"title":"Benefits Analysis of IT Investment in Business Support System (BSS) Projects Using Ranti’s Generic IS/IT Business Values: Case Studies of the Indonesian Telecommunication Company","authors":"Dimas Agung Saputra, W. S. Nugroho, B. Ranti","doi":"10.1109/ICACSIS47736.2019.8979945","DOIUrl":"https://doi.org/10.1109/ICACSIS47736.2019.8979945","url":null,"abstract":"The problem that the organization often face is the difficulty of measuring the effectiveness of IT investment, alignment with business objective, and the benefit map into the part of organization affected. The purpose of this study is to analyze the business benefits of IT investments in Business Support System (BSS) projects, such as Customer Relationship Management (CRM) and Billing system in Indonesian Telecommunication Companies. The method of analysis is using the Ranti’s Generic IS/IT Business Value Table, which is an IT investment management framework. The analysis is also carried out the benefit identified to the units each organization within the company according to the functions of enhanced Telecom Operation Map (eTOM), which are the framework of the business process in the Telecommunication industry. The result show from case studies that the benefits provided by BSS projects are to increase business capacity (IRE-01) and improve service quality (IQU-03. The benefits obtained are more relating to business development of product and improve service quality of customer. The eTOM 2018 functions which get business values benefit are Product (7 sub-categories), Customer (3 sub-categories), Service (3 sub-categories), Resource (3 sub-categories), and Marketing (1 sub-category)","PeriodicalId":165090,"journal":{"name":"2019 International Conference on Advanced Computer Science and information Systems (ICACSIS)","volume":"609 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115491806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/ICACSIS47736.2019.8980000
M. Baehaqi, M. Irzal, Fariani Hermin Indiyah
The main problem that occurs with people with hearing impairment is the difficulty of communicating, both among fellow deaf and non-hearing impaired. This difficulty is caused by not all non-hearing impairments have skills in using sign language such as the Sistem Isyarat Bahasa Indonesia (SIBI). The presence of a SIBI dictionary cannot be used practically and less effective if people want to translate sentences to sign language. The goal that will be achieved in this research is to create assistive applications that can change the speech in form of sentences into SIBI so that it can facilitate communication between people with hearing impairment and people with non-hearing impairment. The specific target to be achieved in this research is the creation of an android application that can change the speech in form of sentences into SIBI using morphological analysis with modification of the Enhanced Confix Stripping (ECS) stemming algorithm. The method used consists of literature studies and requirement analysis, Android Speech API integration, parsing the sentence (through morphological analysis with modification of the ECS stemming algorithm), creating SIBI video datasets, testing algorithms, and testing overall. The results showed that the average accuracy of the Android Speech API is 94.06%, the average accuracy rate of morphological analysis with modification of the ECS stemming algorithm is 95%, and the overall level of conformity is 80,71%. These results indicate that overall the speech translator into SIBI is working very well.
{"title":"Morphological Analysis of Speech Translation into Indonesian Sign Language System (SIBI) on Android Platform","authors":"M. Baehaqi, M. Irzal, Fariani Hermin Indiyah","doi":"10.1109/ICACSIS47736.2019.8980000","DOIUrl":"https://doi.org/10.1109/ICACSIS47736.2019.8980000","url":null,"abstract":"The main problem that occurs with people with hearing impairment is the difficulty of communicating, both among fellow deaf and non-hearing impaired. This difficulty is caused by not all non-hearing impairments have skills in using sign language such as the Sistem Isyarat Bahasa Indonesia (SIBI). The presence of a SIBI dictionary cannot be used practically and less effective if people want to translate sentences to sign language. The goal that will be achieved in this research is to create assistive applications that can change the speech in form of sentences into SIBI so that it can facilitate communication between people with hearing impairment and people with non-hearing impairment. The specific target to be achieved in this research is the creation of an android application that can change the speech in form of sentences into SIBI using morphological analysis with modification of the Enhanced Confix Stripping (ECS) stemming algorithm. The method used consists of literature studies and requirement analysis, Android Speech API integration, parsing the sentence (through morphological analysis with modification of the ECS stemming algorithm), creating SIBI video datasets, testing algorithms, and testing overall. The results showed that the average accuracy of the Android Speech API is 94.06%, the average accuracy rate of morphological analysis with modification of the ECS stemming algorithm is 95%, and the overall level of conformity is 80,71%. These results indicate that overall the speech translator into SIBI is working very well.","PeriodicalId":165090,"journal":{"name":"2019 International Conference on Advanced Computer Science and information Systems (ICACSIS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123664579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/ICACSIS47736.2019.8979924
Hafizh Rafizal Adnan, A. Hidayanto, B. Purwandari, M. Kosandi, W. R. Fitriani, S. Kurnia
Information technology can be an enabler to optimize open government initiatives and its relative advantage. Knowing the adoption factors of technology supporting initiatives is needed to drive a more comprehensive implementation of Open Government. Hence, this study aims to provide an integrative view of open government-related technology adoption factors. Preferred Reporting Items for Systematic Reviews (PRISMA) is combined with the review method proposed by Okoli and Schabram to explore past 5 years studies. Twenty articles were screened during the study selection process. This study identified 36 factors influencing the adoption of technology to support open government initiatives. The factors were categorized using technology, organization, and environmental (TOE) Framework and additional individual and managerial dimension. The findings of this study can be a guideline for further study to explore more empirical adoption cases in various government institution types or countries.
信息技术可以成为优化政府开放举措及其相对优势的推动者。要推动更全面地推行开放政府,必须了解科技支援措施的采用因素。因此,本研究旨在提供一个与开放政府相关的技术采用因素的综合观点。PRISMA (Preferred Reporting Items for Systematic Reviews)与Okoli和Schabram提出的综述方法相结合,对过去5年的研究进行了探讨。在研究选择过程中筛选了20篇文章。本研究确定了36个影响采用科技来支持政府开放计划的因素。使用技术、组织和环境(TOE)框架以及附加的个人和管理维度对这些因素进行分类。本研究的结果可以为进一步研究提供指导,以探索更多不同政府机构类型或国家的实证采用案例。
{"title":"Multi-Dimensional Perspective on Factors Influencing Technology Adoption for Open Government Initiatives: A Systematic Literature Review","authors":"Hafizh Rafizal Adnan, A. Hidayanto, B. Purwandari, M. Kosandi, W. R. Fitriani, S. Kurnia","doi":"10.1109/ICACSIS47736.2019.8979924","DOIUrl":"https://doi.org/10.1109/ICACSIS47736.2019.8979924","url":null,"abstract":"Information technology can be an enabler to optimize open government initiatives and its relative advantage. Knowing the adoption factors of technology supporting initiatives is needed to drive a more comprehensive implementation of Open Government. Hence, this study aims to provide an integrative view of open government-related technology adoption factors. Preferred Reporting Items for Systematic Reviews (PRISMA) is combined with the review method proposed by Okoli and Schabram to explore past 5 years studies. Twenty articles were screened during the study selection process. This study identified 36 factors influencing the adoption of technology to support open government initiatives. The factors were categorized using technology, organization, and environmental (TOE) Framework and additional individual and managerial dimension. The findings of this study can be a guideline for further study to explore more empirical adoption cases in various government institution types or countries.","PeriodicalId":165090,"journal":{"name":"2019 International Conference on Advanced Computer Science and information Systems (ICACSIS)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125753987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/ICACSIS47736.2019.8979819
M. S. Islam, Md. Mahin, Ahsanur Rahman
In this paper, we propose a computational pipeline that can be used to unearth periodic processes and their regulators in any organism along with the networks governing such periodicity. Our approach is based on mining periodic subgraphs from temporal gene networks. Specifically, we collected 30 time varying gene networks inferred from temporal expression profiles of 588 Drosophila genes, computed periodic subgraphs in those networks, and analyzed them in a number of ways in order to discover their biological significance. Our results show that the largest connected component in the periodic subgraphs as well as hub genes and dense subgraphs in that component are highly enriched in periodically active gene-functions. We also devised a way to find the regulators of these periodic functions. We show the superiority of our approach as compared to a baseline method that computes aperiodic subgraphs by showing that similar analysis on aperiodic subgraphs fails to find any periodic or specific gene function. To the best of our knowledge, this work is the first of its kind in the field of network biology.
{"title":"A Data Analysis Pipeline for Identifying Periodic Processes during Drosophila Development","authors":"M. S. Islam, Md. Mahin, Ahsanur Rahman","doi":"10.1109/ICACSIS47736.2019.8979819","DOIUrl":"https://doi.org/10.1109/ICACSIS47736.2019.8979819","url":null,"abstract":"In this paper, we propose a computational pipeline that can be used to unearth periodic processes and their regulators in any organism along with the networks governing such periodicity. Our approach is based on mining periodic subgraphs from temporal gene networks. Specifically, we collected 30 time varying gene networks inferred from temporal expression profiles of 588 Drosophila genes, computed periodic subgraphs in those networks, and analyzed them in a number of ways in order to discover their biological significance. Our results show that the largest connected component in the periodic subgraphs as well as hub genes and dense subgraphs in that component are highly enriched in periodically active gene-functions. We also devised a way to find the regulators of these periodic functions. We show the superiority of our approach as compared to a baseline method that computes aperiodic subgraphs by showing that similar analysis on aperiodic subgraphs fails to find any periodic or specific gene function. To the best of our knowledge, this work is the first of its kind in the field of network biology.","PeriodicalId":165090,"journal":{"name":"2019 International Conference on Advanced Computer Science and information Systems (ICACSIS)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121286211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/ICACSIS47736.2019.8979738
D. Gunawan, Tika Hairani, A. Hizriadi
Personal data is the primary target of cybercrime. Robot network or abbreviated as botnet is a program that infects the computers and allows the botnet owner to control the infected computers. The botnet can be controlled to steal personal data of the infected computers, as well as using the computer to other cybercrime purposes. This research aims to identify the botnet in the flow traffic by using K-Nearest Neighbor (KNN). The flow traffic data source is obtained from CTU-13 datasets, which contain the real flow traffic captured by Czech Technical University. As a result, the botnet identification accuracy lies in the range of 75.84% to 97.27%, depends on the scenario and the k value. Although KNN has shown a good accuracy result, several other methods outperform KNN accuracy.
{"title":"Botnet Identification Based on Flow Traffic by Using K-Nearest Neighbor","authors":"D. Gunawan, Tika Hairani, A. Hizriadi","doi":"10.1109/ICACSIS47736.2019.8979738","DOIUrl":"https://doi.org/10.1109/ICACSIS47736.2019.8979738","url":null,"abstract":"Personal data is the primary target of cybercrime. Robot network or abbreviated as botnet is a program that infects the computers and allows the botnet owner to control the infected computers. The botnet can be controlled to steal personal data of the infected computers, as well as using the computer to other cybercrime purposes. This research aims to identify the botnet in the flow traffic by using K-Nearest Neighbor (KNN). The flow traffic data source is obtained from CTU-13 datasets, which contain the real flow traffic captured by Czech Technical University. As a result, the botnet identification accuracy lies in the range of 75.84% to 97.27%, depends on the scenario and the k value. Although KNN has shown a good accuracy result, several other methods outperform KNN accuracy.","PeriodicalId":165090,"journal":{"name":"2019 International Conference on Advanced Computer Science and information Systems (ICACSIS)","volume":"379 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116521470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/ICACSIS47736.2019.8979782
CS. Purwowidhu Widayanti, Irwansyah
This study elaborates measurements of interactivity on social media as well as describes the predictors that can strengthen the interactivity of government’s post on Facebook and Twitter account. A content analysis was conducted on 143 posts and 313 tweets over one of government’s official account. The result shows a significant predictor of interactivity from content features both on Facebook and Twitter is the topic of posts or tweets. The topic that generally has a positive influence on the overall type of interactivity and breadth of interactivity both on Facebook and Twitter is the topic of public service advertising. A significant predictor of interactivity from the structural features on Facebook is the hashtag while significant predictors of interactivity from structural features on Twitter are multimedia elements and external links.
{"title":"Features to Improve The Interactivity of Government’s Post on Social Media","authors":"CS. Purwowidhu Widayanti, Irwansyah","doi":"10.1109/ICACSIS47736.2019.8979782","DOIUrl":"https://doi.org/10.1109/ICACSIS47736.2019.8979782","url":null,"abstract":"This study elaborates measurements of interactivity on social media as well as describes the predictors that can strengthen the interactivity of government’s post on Facebook and Twitter account. A content analysis was conducted on 143 posts and 313 tweets over one of government’s official account. The result shows a significant predictor of interactivity from content features both on Facebook and Twitter is the topic of posts or tweets. The topic that generally has a positive influence on the overall type of interactivity and breadth of interactivity both on Facebook and Twitter is the topic of public service advertising. A significant predictor of interactivity from the structural features on Facebook is the hashtag while significant predictors of interactivity from structural features on Twitter are multimedia elements and external links.","PeriodicalId":165090,"journal":{"name":"2019 International Conference on Advanced Computer Science and information Systems (ICACSIS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131230290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/ICACSIS47736.2019.8979799
Agus Gunawan, D. H. Widyantoro
Although achieving a good accuracy, the multi-shot human re-identification (MS Re-ID) experiences long processing time and large memory consumption, because it uses all of the frames it receives. The usage of all of the frames for reidentification does not only weigh the system’s process, but also gives redundant information. To enable a faster and lighter execution of the MS Re-ID system, the present study proposed a key frame extraction method using face biometric feature for MS Re-ID system. Key frames were responsible to provide important information of an individual’s face for re-identification, and avoid collecting the redundant features. The proposed key frame extraction method consists of two phases: face detection with facial landmark extraction and face tilt angle calculation. Multitask Cascaded Convolutional Networks (MTCNN) was used for face detection with facial landmark extraction, while 10 was used as the optimal number of key frames and the optimal face tilt angle range was -10° until 10°. We also compared MS Re-ID system with the proposed method to the normal single-shot and multi-shot systems to examine the proposed method’s impact on the performance. We found that the proposed key frame extraction method successfully retained 100% accuracy while reducing the memory consumption by 2% and the execution time by 19%, compared to MS Re-ID system without key frame extraction.
多帧人再识别(multiple -shot human Re-ID, MS Re-ID)虽然精度较高,但由于要使用接收到的所有帧,处理时间长,内存消耗大。使用所有的帧进行重新识别不仅权衡了系统的进程,而且提供了冗余信息。为了使MS Re-ID系统更快、更轻地执行,本研究提出了一种基于人脸生物特征的MS Re-ID系统关键帧提取方法。关键帧负责提供人脸的重要信息以供重新识别,避免收集冗余特征。提出的关键帧提取方法包括两个阶段:人脸检测与人脸特征提取和人脸倾斜角计算。采用多任务级联卷积网络(Multitask cascade Convolutional Networks, MTCNN)进行人脸检测,提取人脸地标,最优关键帧数为10帧,最优人脸倾斜角度范围为-10°~ 10°。我们还将采用该方法的MS Re-ID系统与普通的单发和多发系统进行了比较,以检验该方法对性能的影响。我们发现,与没有关键帧提取的MS Re-ID系统相比,所提出的关键帧提取方法成功地保持了100%的准确率,同时减少了2%的内存消耗和19%的执行时间。
{"title":"Key Frame Extraction with Face Biometric Features in Multi-shot Human Re-identification System","authors":"Agus Gunawan, D. H. Widyantoro","doi":"10.1109/ICACSIS47736.2019.8979799","DOIUrl":"https://doi.org/10.1109/ICACSIS47736.2019.8979799","url":null,"abstract":"Although achieving a good accuracy, the multi-shot human re-identification (MS Re-ID) experiences long processing time and large memory consumption, because it uses all of the frames it receives. The usage of all of the frames for reidentification does not only weigh the system’s process, but also gives redundant information. To enable a faster and lighter execution of the MS Re-ID system, the present study proposed a key frame extraction method using face biometric feature for MS Re-ID system. Key frames were responsible to provide important information of an individual’s face for re-identification, and avoid collecting the redundant features. The proposed key frame extraction method consists of two phases: face detection with facial landmark extraction and face tilt angle calculation. Multitask Cascaded Convolutional Networks (MTCNN) was used for face detection with facial landmark extraction, while 10 was used as the optimal number of key frames and the optimal face tilt angle range was -10° until 10°. We also compared MS Re-ID system with the proposed method to the normal single-shot and multi-shot systems to examine the proposed method’s impact on the performance. We found that the proposed key frame extraction method successfully retained 100% accuracy while reducing the memory consumption by 2% and the execution time by 19%, compared to MS Re-ID system without key frame extraction.","PeriodicalId":165090,"journal":{"name":"2019 International Conference on Advanced Computer Science and information Systems (ICACSIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129159705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/ICACSIS47736.2019.8979901
Fariz Darari, Garry Gumelar Pratama, A. Krisnadhi
The quality of higher education in Indonesia does not distribute equally, as observed from various sources of university ranking results. This calls for a solution to narrow the quality gap that leverages digital approaches. In this paper, we propose Open Tridharma, a framework for digital openness in higher education. The framework augments Tridharma, the three pillars of Indonesian higher education (i.e., education, research, and community service), by laying the digital openness foundation. We also provide qualitative analysis and discuss the benefits and challenges of Open Tridharma.
{"title":"Open Tridharma: A Framework for Digital Openness in Higher Education","authors":"Fariz Darari, Garry Gumelar Pratama, A. Krisnadhi","doi":"10.1109/ICACSIS47736.2019.8979901","DOIUrl":"https://doi.org/10.1109/ICACSIS47736.2019.8979901","url":null,"abstract":"The quality of higher education in Indonesia does not distribute equally, as observed from various sources of university ranking results. This calls for a solution to narrow the quality gap that leverages digital approaches. In this paper, we propose Open Tridharma, a framework for digital openness in higher education. The framework augments Tridharma, the three pillars of Indonesian higher education (i.e., education, research, and community service), by laying the digital openness foundation. We also provide qualitative analysis and discuss the benefits and challenges of Open Tridharma.","PeriodicalId":165090,"journal":{"name":"2019 International Conference on Advanced Computer Science and information Systems (ICACSIS)","volume":"310 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115863373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/icacsis47736.2019.8979706
{"title":"ICACSIS 2019 Table of Contents","authors":"","doi":"10.1109/icacsis47736.2019.8979706","DOIUrl":"https://doi.org/10.1109/icacsis47736.2019.8979706","url":null,"abstract":"","PeriodicalId":165090,"journal":{"name":"2019 International Conference on Advanced Computer Science and information Systems (ICACSIS)","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115960575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}