Pub Date : 2018-10-01DOI: 10.1109/ICACSIS.2018.8618137
Adinda Nadinta Juliana, M. R. Shihab
this research aims to analyze the factors that influence traveler to book open-trip service through open-trip marketplace website. The collection data method that is used is online questionnaire. This research manage to collect 58 travelers who have booked on an open-trip marketplace website. The collected data then analyzed using Partial Least Square (PLS) method and using SmartPLS 3.0 software to analyze the data. The result of this research show that traveler's intention to book open-trip service through open-trip marketplace website is directly influence by attitude toward merchant and indirectly influence by merchant familiarity with an intermediate factor attitude toward merchant. Other than that, this research also show a significant relationship between source credibility with attitude toward E-WOM, and also fulfillment and system availability with attitude toward channel.
{"title":"Investigating the Influence of Attitude toward Traveler's Intention to Book Open Trip Service from Open Trip C2C Marketplace Website","authors":"Adinda Nadinta Juliana, M. R. Shihab","doi":"10.1109/ICACSIS.2018.8618137","DOIUrl":"https://doi.org/10.1109/ICACSIS.2018.8618137","url":null,"abstract":"this research aims to analyze the factors that influence traveler to book open-trip service through open-trip marketplace website. The collection data method that is used is online questionnaire. This research manage to collect 58 travelers who have booked on an open-trip marketplace website. The collected data then analyzed using Partial Least Square (PLS) method and using SmartPLS 3.0 software to analyze the data. The result of this research show that traveler's intention to book open-trip service through open-trip marketplace website is directly influence by attitude toward merchant and indirectly influence by merchant familiarity with an intermediate factor attitude toward merchant. Other than that, this research also show a significant relationship between source credibility with attitude toward E-WOM, and also fulfillment and system availability with attitude toward channel.","PeriodicalId":207227,"journal":{"name":"2018 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114978330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/ICACSIS.2018.8618192
Rosalia Valentin Margareta, Y. G. Sucahyo, Y. Ruldeviyani, Arfive Gandhi
Personal Data Protection is governed by the laws of the Republic of Indonesia. The regulation must also be obeyed by motorcycle ride-sharing service. It is important to know the customers’ perception of personal data protection since it will affects the customers’ intention to provide their personal data when using the services. An analysis was conducted using quantitative methods and PLS-SEM to determine this case. 253 ride-sharing customers were hired as respondents who tested by several variables: privacy violation experiences, privacy concerns, risk beliefs, trusting beliefs, and behavioral intentions. As the results, a personal data violation experience does not negatively affect customers’ privacy concerns. However, the privacy concerns do not negatively affect the level of customers’ trust and the desire to provide personal data. It has a positive effect on the potential perceived risk. This study recommends ride-sharing providers to develop their data protection, improve privacy policies, and provides access control for customers.
{"title":"Understanding the Customers’ Perception in Motorcycle Ride-Sharing on Personal Data Protection","authors":"Rosalia Valentin Margareta, Y. G. Sucahyo, Y. Ruldeviyani, Arfive Gandhi","doi":"10.1109/ICACSIS.2018.8618192","DOIUrl":"https://doi.org/10.1109/ICACSIS.2018.8618192","url":null,"abstract":"Personal Data Protection is governed by the laws of the Republic of Indonesia. The regulation must also be obeyed by motorcycle ride-sharing service. It is important to know the customers’ perception of personal data protection since it will affects the customers’ intention to provide their personal data when using the services. An analysis was conducted using quantitative methods and PLS-SEM to determine this case. 253 ride-sharing customers were hired as respondents who tested by several variables: privacy violation experiences, privacy concerns, risk beliefs, trusting beliefs, and behavioral intentions. As the results, a personal data violation experience does not negatively affect customers’ privacy concerns. However, the privacy concerns do not negatively affect the level of customers’ trust and the desire to provide personal data. It has a positive effect on the potential perceived risk. This study recommends ride-sharing providers to develop their data protection, improve privacy policies, and provides access control for customers.","PeriodicalId":207227,"journal":{"name":"2018 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126653439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/ICACSIS.2018.8618235
Nanda Maulina Firdaus, D. Chahyati, M. I. Fanany
Smart tourism is a keyword for describe the tourist on emerging forms of ICT. One application of smart tourism is to classify tourist attractions automatically, where the data in the form of pictures taken by tourists. However, there are some problems in application of tourist attractions classifications. First, in one place may have different objects and traits. Second, in some places may have a similar architecture, so it could be difficult for the system to classify the places. In this study, we focused on the tourist attractions in Jakarta and Depok using ResNet50. We divided this study into 2 scenarios. Scenario 1 is a model with 12 classes, and scenario 2 is a model with 16 classes. The results are ResNet50 has been able to handle both research problems, although not yet maximized, with average accuracy in scenario 1 is 92.17% and scenario 2 is 93.75%.
{"title":"Tourist Attractions Classification using ResNet","authors":"Nanda Maulina Firdaus, D. Chahyati, M. I. Fanany","doi":"10.1109/ICACSIS.2018.8618235","DOIUrl":"https://doi.org/10.1109/ICACSIS.2018.8618235","url":null,"abstract":"Smart tourism is a keyword for describe the tourist on emerging forms of ICT. One application of smart tourism is to classify tourist attractions automatically, where the data in the form of pictures taken by tourists. However, there are some problems in application of tourist attractions classifications. First, in one place may have different objects and traits. Second, in some places may have a similar architecture, so it could be difficult for the system to classify the places. In this study, we focused on the tourist attractions in Jakarta and Depok using ResNet50. We divided this study into 2 scenarios. Scenario 1 is a model with 12 classes, and scenario 2 is a model with 16 classes. The results are ResNet50 has been able to handle both research problems, although not yet maximized, with average accuracy in scenario 1 is 92.17% and scenario 2 is 93.75%.","PeriodicalId":207227,"journal":{"name":"2018 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122936457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/ICACSIS.2018.8618172
S. Ekayanti, Irwansyah
Progressive development of technology has offered varied Learning Management Systems (LMS). These systems are aimed to facilitate educational processes through the delivery of contents, assessments, learning outputs and collaborative communication. However, the acceptance of users became a determining factor for the success or failure of LMS. A comprehension of students’ acceptance towards a LMS is very essential in order to measure its use and effects. As recent model of technology acceptance, extended Unified Theory of Acceptance and Use of Technology (UTAUT 2), has been used to investigate the acceptance on ManageBac as LMS in Gandhi Memorial Intercontinental School (GMIS), Jakarta. GMIS Jakarta has used this system platform since 2012. As LMS, ManageBac has been designed to manage curriculum planning, evaluation, outcome reporting, attendance and communication. The research was aimed to prove that extended UTAUT model would be well applied at GMIS Jakarta even though with the presence of voluntariness as additional moderator. This research also had purpose to prove whether all constructs of this model affect the acceptance and use of ManageBac at GMIS Jakarta. This research employed quantitative approach with survey method using 7 scale Likert questionnaire and SEM-PLS. A total of 245 students having experience with ManageBac for more than three years were taken as participants. The result of finding revealed that ManageBac’s acceptance model was not similar to model of extended UTAUT. Moreover, this study also depicted that relations among constructs were not similar to extended UTAUT model.
{"title":"UTAUT in Communication Technology of Learning Management System","authors":"S. Ekayanti, Irwansyah","doi":"10.1109/ICACSIS.2018.8618172","DOIUrl":"https://doi.org/10.1109/ICACSIS.2018.8618172","url":null,"abstract":"Progressive development of technology has offered varied Learning Management Systems (LMS). These systems are aimed to facilitate educational processes through the delivery of contents, assessments, learning outputs and collaborative communication. However, the acceptance of users became a determining factor for the success or failure of LMS. A comprehension of students’ acceptance towards a LMS is very essential in order to measure its use and effects. As recent model of technology acceptance, extended Unified Theory of Acceptance and Use of Technology (UTAUT 2), has been used to investigate the acceptance on ManageBac as LMS in Gandhi Memorial Intercontinental School (GMIS), Jakarta. GMIS Jakarta has used this system platform since 2012. As LMS, ManageBac has been designed to manage curriculum planning, evaluation, outcome reporting, attendance and communication. The research was aimed to prove that extended UTAUT model would be well applied at GMIS Jakarta even though with the presence of voluntariness as additional moderator. This research also had purpose to prove whether all constructs of this model affect the acceptance and use of ManageBac at GMIS Jakarta. This research employed quantitative approach with survey method using 7 scale Likert questionnaire and SEM-PLS. A total of 245 students having experience with ManageBac for more than three years were taken as participants. The result of finding revealed that ManageBac’s acceptance model was not similar to model of extended UTAUT. Moreover, this study also depicted that relations among constructs were not similar to extended UTAUT model.","PeriodicalId":207227,"journal":{"name":"2018 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121886854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/ICACSIS.2018.8618190
M. T. Anwar, H. Pumomo, S. Y. Prasetyo, K. Hartomo
Wildfire is one of the most frequent disasters occurred in Indonesia and had caused tremendous economic loss, environmental damage, and endangered the life of human and other organisms. Wildfire cases happened in Indonesia are occurred on both peat and mineral (non-peat) land. However, the number of research on wildfire modeling which includes peat land is very limited. This research aims to build a wildfire model based on decision tree learning which includes peatland as the factor contributing to wildfire. This will also provide an alternative model for the current national risk index which is based on additive weighting. This model then can be used to build an early warning/risk map which is very useful in managing / mitigating wildfire to minimize loss. We use C4.5 classification algorithm to build the model, and exploring the contribution of each attribute to the model. Factors used in this study are the land type (peat or mineral), land cover/ land use, Normalized Difference Vegetation Index (NDVI), and The Normalized Difference Moisture (Water) Index (NDMI). The result showed that the most prominent factor in wildfire cases in our study area is the peatland, followed by its combination with land use types. While the NDVI and NDMI have a very little contribution to the model. The model with all factors included has the accuracy of 78%. The implication of this result is then discussed.
{"title":"Decision Tree Learning Approach To Wildfire Modeling on Peat and Non-Peat Land in Riau Province","authors":"M. T. Anwar, H. Pumomo, S. Y. Prasetyo, K. Hartomo","doi":"10.1109/ICACSIS.2018.8618190","DOIUrl":"https://doi.org/10.1109/ICACSIS.2018.8618190","url":null,"abstract":"Wildfire is one of the most frequent disasters occurred in Indonesia and had caused tremendous economic loss, environmental damage, and endangered the life of human and other organisms. Wildfire cases happened in Indonesia are occurred on both peat and mineral (non-peat) land. However, the number of research on wildfire modeling which includes peat land is very limited. This research aims to build a wildfire model based on decision tree learning which includes peatland as the factor contributing to wildfire. This will also provide an alternative model for the current national risk index which is based on additive weighting. This model then can be used to build an early warning/risk map which is very useful in managing / mitigating wildfire to minimize loss. We use C4.5 classification algorithm to build the model, and exploring the contribution of each attribute to the model. Factors used in this study are the land type (peat or mineral), land cover/ land use, Normalized Difference Vegetation Index (NDVI), and The Normalized Difference Moisture (Water) Index (NDMI). The result showed that the most prominent factor in wildfire cases in our study area is the peatland, followed by its combination with land use types. While the NDVI and NDMI have a very little contribution to the model. The model with all factors included has the accuracy of 78%. The implication of this result is then discussed.","PeriodicalId":207227,"journal":{"name":"2018 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"274 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122121028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/ICACSIS.2018.8618150
P. Mursanto, Aulia Roza Albareta
A performance evaluation on modified structure of square operation in an inverter architecture of Galois Field (GF) has been conducted. The most time-consuming GF multiplicative inversion process has been implemented by constructing a nested square and multiplication operations. The new structure of square operator takes advantage of Normal Basis (NB) representation of GF elements. Although NB parallel multiplication has higher complexity than Polynomial Basis (PB) version, the nature of simple circular shift in NB square operation has reduced the total delay significantly and increased the inversion speed by 43% in average.
{"title":"Circular Shift Squarer for Efficiency Improvement of Normal Basis Galois Field Inverter","authors":"P. Mursanto, Aulia Roza Albareta","doi":"10.1109/ICACSIS.2018.8618150","DOIUrl":"https://doi.org/10.1109/ICACSIS.2018.8618150","url":null,"abstract":"A performance evaluation on modified structure of square operation in an inverter architecture of Galois Field (GF) has been conducted. The most time-consuming GF multiplicative inversion process has been implemented by constructing a nested square and multiplication operations. The new structure of square operator takes advantage of Normal Basis (NB) representation of GF elements. Although NB parallel multiplication has higher complexity than Polynomial Basis (PB) version, the nature of simple circular shift in NB square operation has reduced the total delay significantly and increased the inversion speed by 43% in average.","PeriodicalId":207227,"journal":{"name":"2018 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124638867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/ICACSIS.2018.8618262
H. T. Y. Achsan, W. Wibowo, W. T. Putri, M. Achsan, Quintin Kurnia Dikara Barcah
Web mining is an important techniques for it enables extraction of data and information from the web for further needs. Although there are a lot of web databases that holds bibliography data, The Online Computer Library Center (OCLC) owns the largest web databases on bibliography in the world. A large number of bibliography data, surely needs more than manual downloading. In this research we conduct an experimentation to harvest bibliography data using multi-threading process that is fast, safe and ethical. Using C# programming language and Visual Studio IDE, We were successful in harvesting five million bibliography data, without being penalized by the source site.
网络挖掘是一项重要的技术,它可以从网络中提取数据和信息以供进一步需要。尽管保存书目数据的网络数据库很多,但在线计算机图书馆中心(OCLC)拥有世界上最大的书目数据库。大量的书目数据,肯定不需要人工下载。在本研究中,我们进行了一个实验,使用多线程的方法来获取书目数据,这是一种快速、安全、道德的方法。使用c#编程语言和Visual Studio IDE,我们成功地收集了500万个书目数据,而没有受到源站点的惩罚。
{"title":"Harvesting Bibliography Multi-thread, Safe and Ethical Web Crawling","authors":"H. T. Y. Achsan, W. Wibowo, W. T. Putri, M. Achsan, Quintin Kurnia Dikara Barcah","doi":"10.1109/ICACSIS.2018.8618262","DOIUrl":"https://doi.org/10.1109/ICACSIS.2018.8618262","url":null,"abstract":"Web mining is an important techniques for it enables extraction of data and information from the web for further needs. Although there are a lot of web databases that holds bibliography data, The Online Computer Library Center (OCLC) owns the largest web databases on bibliography in the world. A large number of bibliography data, surely needs more than manual downloading. In this research we conduct an experimentation to harvest bibliography data using multi-threading process that is fast, safe and ethical. Using C# programming language and Visual Studio IDE, We were successful in harvesting five million bibliography data, without being penalized by the source site.","PeriodicalId":207227,"journal":{"name":"2018 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128168459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/ICACSIS.2018.8618203
R. Ramli, Nor'ashikin Ali
Teleconsultation offers a platform for remote medical care. However, they have been concerns about the poor acceptance rate towards the initiative resulting in the facility being underutilized. Studies often look at the use of teleconsultation from the perspectives of technology acceptance, in many cases forgetting the fact that it is also contributing greatly towards knowledge building and preserving within healthcare organization, offering a wealth of knowledge and expertise development opportunities. This study is looking at teleconsultation use from the perspectives of knowledge management, starting by confirming that it is of type KMS, studying how it fits in healthcare’s knowledge exchange landscape and then establishing the determinants and inhibitors for the system’s use among medical practitioners. Existing research on the use of teleconsultation are studied to determine the aspects influencing its success and the finding is hoped to pave the way for further studies on teleconsultation success in health care organizations from KM perspectives.
{"title":"Teleconsultation as Knowledge Management System: Recognizing the Issues Contributing to its Underutilization in Hospitals","authors":"R. Ramli, Nor'ashikin Ali","doi":"10.1109/ICACSIS.2018.8618203","DOIUrl":"https://doi.org/10.1109/ICACSIS.2018.8618203","url":null,"abstract":"Teleconsultation offers a platform for remote medical care. However, they have been concerns about the poor acceptance rate towards the initiative resulting in the facility being underutilized. Studies often look at the use of teleconsultation from the perspectives of technology acceptance, in many cases forgetting the fact that it is also contributing greatly towards knowledge building and preserving within healthcare organization, offering a wealth of knowledge and expertise development opportunities. This study is looking at teleconsultation use from the perspectives of knowledge management, starting by confirming that it is of type KMS, studying how it fits in healthcare’s knowledge exchange landscape and then establishing the determinants and inhibitors for the system’s use among medical practitioners. Existing research on the use of teleconsultation are studied to determine the aspects influencing its success and the finding is hoped to pave the way for further studies on teleconsultation success in health care organizations from KM perspectives.","PeriodicalId":207227,"journal":{"name":"2018 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130206051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/ICACSIS.2018.8618240
Achmad Fauzi Azmi, R. Nuravianty, Tashia Indah Nastiti, D. I. Sensuse
In this work, we explore the role of Social Networking Sites (SNS) for the student practices in various characteristic of SNS use, including Conversation and Communication, User Generate Content, File Sharing and Entertainment by undergraduates and postgraduate students. The another of our main objective is to examine the effect of SNS on student learning experience. The data were gathered from the questionnaire and received 182 responses from a sample of students or alumni who are Indonesian citizens whether they are studying in Indonesia or abroad. The results of the study show most students were using Whatsapp for conversation and communication, user-generated content and file sharing and using Youtube for entertainment. These results provide the importance of SNS could be a significant supporting role in student learning experience.
{"title":"Using Social Networking Sites for Learning Experiences by Indonesian University Students","authors":"Achmad Fauzi Azmi, R. Nuravianty, Tashia Indah Nastiti, D. I. Sensuse","doi":"10.1109/ICACSIS.2018.8618240","DOIUrl":"https://doi.org/10.1109/ICACSIS.2018.8618240","url":null,"abstract":"In this work, we explore the role of Social Networking Sites (SNS) for the student practices in various characteristic of SNS use, including Conversation and Communication, User Generate Content, File Sharing and Entertainment by undergraduates and postgraduate students. The another of our main objective is to examine the effect of SNS on student learning experience. The data were gathered from the questionnaire and received 182 responses from a sample of students or alumni who are Indonesian citizens whether they are studying in Indonesia or abroad. The results of the study show most students were using Whatsapp for conversation and communication, user-generated content and file sharing and using Youtube for entertainment. These results provide the importance of SNS could be a significant supporting role in student learning experience.","PeriodicalId":207227,"journal":{"name":"2018 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134539011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/ICACSIS.2018.8618151
Mutiara Aisyah, Y. Ruldeviyani
In today's era of digital transformation, data is one of the main pillars of the organization in supporting various functions to achieve its strategic objectives. As a government institution, the Indonesia Deposit Insurance Corporation (IDIC) is responsible for securing deposits of depositors and actively participating in maintaining financial system stability. Those functions require data and information as a basis for policy making and decision making. The large number of data owned and managed by IDIC resulted in the need for a comprehensive management of the institution's data. This research aims to develop a data governance and management structure based on the guidance of Data Management Body of Knowledge (DMBOK). The results of this research are standards and guidelines to support the implementation of data governance in IDIC effectively.
{"title":"Designing Data Governance Structure Based On Data Management Body of Knowledge (DMBOK) Framework: A Case Study on Indonesia Deposit Insurance Corporation (IDIC)","authors":"Mutiara Aisyah, Y. Ruldeviyani","doi":"10.1109/ICACSIS.2018.8618151","DOIUrl":"https://doi.org/10.1109/ICACSIS.2018.8618151","url":null,"abstract":"In today's era of digital transformation, data is one of the main pillars of the organization in supporting various functions to achieve its strategic objectives. As a government institution, the Indonesia Deposit Insurance Corporation (IDIC) is responsible for securing deposits of depositors and actively participating in maintaining financial system stability. Those functions require data and information as a basis for policy making and decision making. The large number of data owned and managed by IDIC resulted in the need for a comprehensive management of the institution's data. This research aims to develop a data governance and management structure based on the guidance of Data Management Body of Knowledge (DMBOK). The results of this research are standards and guidelines to support the implementation of data governance in IDIC effectively.","PeriodicalId":207227,"journal":{"name":"2018 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115551711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}