Pub Date : 2020-09-15DOI: 10.1109/IC2IE50715.2020.9274654
Muhammad Irwan Padli Nasution, N. Nurbaiti, N. Nurlaila, Tri Inda Fadhila Rahma, Kamilah Kamilah
On March 11, 2020 the World Health Organization has announced the status of a global pandemic of corona virus disease 2019 or also called corona virus disease 2019 (COVID-19). The World Health Organization defines this disease as a pandemic because all citizens of the world are potentially exposed to COVID-19 infection. With the establishment of the global pandemic status, WHO also confirmed that COVID-19 was an international emergency. The trend of digitalization is becoming a new business trend to develop and survive in the midst of a crisis due to this pandemic. The online buying and selling market, digital payments and electronic health services, from online training classes to consulting with doctors via the internet, continue to increase. Some companies in the offline market also continue to operate by implementing health protocols. The form of digital payments continues increasing, this is because according to WHO the surface of objects can be a medium in the spread of the covid-19 virus. However, some digital payment media still require a card and enter a Personal Identification Number (PIN) in the Electronic Data Capture machine. For a solution so that the buyer does not need to bring a card and touch the Electronic Data Capture machine, face recognition authentication can be developed instead of PIN.
{"title":"Face Recognition Login Authentication for Digital Payment Solution at COVID-19 Pandemic","authors":"Muhammad Irwan Padli Nasution, N. Nurbaiti, N. Nurlaila, Tri Inda Fadhila Rahma, Kamilah Kamilah","doi":"10.1109/IC2IE50715.2020.9274654","DOIUrl":"https://doi.org/10.1109/IC2IE50715.2020.9274654","url":null,"abstract":"On March 11, 2020 the World Health Organization has announced the status of a global pandemic of corona virus disease 2019 or also called corona virus disease 2019 (COVID-19). The World Health Organization defines this disease as a pandemic because all citizens of the world are potentially exposed to COVID-19 infection. With the establishment of the global pandemic status, WHO also confirmed that COVID-19 was an international emergency. The trend of digitalization is becoming a new business trend to develop and survive in the midst of a crisis due to this pandemic. The online buying and selling market, digital payments and electronic health services, from online training classes to consulting with doctors via the internet, continue to increase. Some companies in the offline market also continue to operate by implementing health protocols. The form of digital payments continues increasing, this is because according to WHO the surface of objects can be a medium in the spread of the covid-19 virus. However, some digital payment media still require a card and enter a Personal Identification Number (PIN) in the Electronic Data Capture machine. For a solution so that the buyer does not need to bring a card and touch the Electronic Data Capture machine, face recognition authentication can be developed instead of PIN.","PeriodicalId":211983,"journal":{"name":"2020 3rd International Conference on Computer and Informatics Engineering (IC2IE)","volume":"199 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116689257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-09-15DOI: 10.1109/IC2IE50715.2020.9274594
H. Winarno, Fatah Yasin, Muhamad Aries Prasetyo, Fathur Rohman, M. R. Shihab, B. Ranti
PT. XYZ is an insurance company that currently provides a variety of services using electronic systems in 80 service offices throughout Indonesia. At the end of 2019, the company experienced an IT security incident. The core application was hit by a malware attack that caused slow system performance and disruption of insurance operational services. These events have a negative impact on the company both operationally and to customers, so that it becomes a serious concern of management. Therefore, this research aims to see how companies develop infrastructure to ensure the reliability and improvement of IT security. The research methodology used is a qualitative approach by collecting data through documentation and interview studies. Based on the results of the assessment, there were 16 out of 20 controls that exceeded the threshold value. These results illustrate that the security of the IT infrastructure of PT. XYZ is very weak. Therefore, the company must carry out 13 recommendations for improvement that will be carried out in stages. This research is expected to be a lesson for other organizations especially insurance companies to improve the reliability and security of IT infrastructure.
PT. XYZ是一家保险公司,目前在印度尼西亚的80个服务办事处使用电子系统提供各种服务。2019年底,该公司经历了一次IT安全事件。核心应用程序受到恶意软件攻击,导致系统性能下降,保险业务服务中断。这些事件对公司的运营和客户都有负面影响,因此成为管理层严重关注的问题。因此,本研究旨在了解公司如何开发基础设施以确保IT安全的可靠性和改进。使用的研究方法是通过文献和访谈研究收集数据的定性方法。根据评估结果,20个控制组中有16个超过了阈值。这些结果表明,PT. XYZ的IT基础设施的安全性非常薄弱。因此,公司必须实施13项改进建议,并分阶段实施。这项研究有望为其他组织,特别是保险公司,提高IT基础设施的可靠性和安全性提供借鉴。
{"title":"IT Infrastructure Security Risk Assessment using the Center for Internet Security Critical Security Control Framework: A Case Study at Insurance Company","authors":"H. Winarno, Fatah Yasin, Muhamad Aries Prasetyo, Fathur Rohman, M. R. Shihab, B. Ranti","doi":"10.1109/IC2IE50715.2020.9274594","DOIUrl":"https://doi.org/10.1109/IC2IE50715.2020.9274594","url":null,"abstract":"PT. XYZ is an insurance company that currently provides a variety of services using electronic systems in 80 service offices throughout Indonesia. At the end of 2019, the company experienced an IT security incident. The core application was hit by a malware attack that caused slow system performance and disruption of insurance operational services. These events have a negative impact on the company both operationally and to customers, so that it becomes a serious concern of management. Therefore, this research aims to see how companies develop infrastructure to ensure the reliability and improvement of IT security. The research methodology used is a qualitative approach by collecting data through documentation and interview studies. Based on the results of the assessment, there were 16 out of 20 controls that exceeded the threshold value. These results illustrate that the security of the IT infrastructure of PT. XYZ is very weak. Therefore, the company must carry out 13 recommendations for improvement that will be carried out in stages. This research is expected to be a lesson for other organizations especially insurance companies to improve the reliability and security of IT infrastructure.","PeriodicalId":211983,"journal":{"name":"2020 3rd International Conference on Computer and Informatics Engineering (IC2IE)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127072565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-09-15DOI: 10.1109/IC2IE50715.2020.9274600
Sifat Ahmed, Abdus Sayef Reyadh, Fatima Tabsun Sithil, F. Shah, Asif Imtiaz Shaafi
In today’s world, social networks are the place where user share their views, emotions in their way. Social media, such as Twitter, Instagram, Facebook, etc. where millions of people express their views in their daily day-to-day life, which can be their sentiments and opinions or expressing emotions about a particular thing or their own. This gave researchers an outstanding opportunity to analyze the emotions of users’ activities on social networks. These massive digital data contain people’s day to day life sentiments, opinions, and showing emotions. Over the years there have been different research on emotion analysis of the social platform. As people tend to have different thoughts, analyzing the right emotion from social data is becoming a challenge. This clearly states that there is a need for an attempt to work towards these problems and it has opened up several opportunities for future research for hidden emotion identification, users’ emotions about a particular topic, etc. Detecting emotion from text is one of the toughest challenges in natural language processing. Developing a system that can detect emotion from social media is a crying need as people are sharing more of their thoughts here. In this research work, to learn the representation of the tweets, we propose an attention-based model. The proposed model has been divided into different components and subcomponents consisting of ID Convolution, Bidirectional LSTM, and Attention mechanism. We create a new dataset from SemEval Affect in Tweets dataset and then conduct experiments for the best outcomes. Our model achieves up to 79% accuracy in this task.
{"title":"An Attention-based Approach to Detect Emotion from Tweets","authors":"Sifat Ahmed, Abdus Sayef Reyadh, Fatima Tabsun Sithil, F. Shah, Asif Imtiaz Shaafi","doi":"10.1109/IC2IE50715.2020.9274600","DOIUrl":"https://doi.org/10.1109/IC2IE50715.2020.9274600","url":null,"abstract":"In today’s world, social networks are the place where user share their views, emotions in their way. Social media, such as Twitter, Instagram, Facebook, etc. where millions of people express their views in their daily day-to-day life, which can be their sentiments and opinions or expressing emotions about a particular thing or their own. This gave researchers an outstanding opportunity to analyze the emotions of users’ activities on social networks. These massive digital data contain people’s day to day life sentiments, opinions, and showing emotions. Over the years there have been different research on emotion analysis of the social platform. As people tend to have different thoughts, analyzing the right emotion from social data is becoming a challenge. This clearly states that there is a need for an attempt to work towards these problems and it has opened up several opportunities for future research for hidden emotion identification, users’ emotions about a particular topic, etc. Detecting emotion from text is one of the toughest challenges in natural language processing. Developing a system that can detect emotion from social media is a crying need as people are sharing more of their thoughts here. In this research work, to learn the representation of the tweets, we propose an attention-based model. The proposed model has been divided into different components and subcomponents consisting of ID Convolution, Bidirectional LSTM, and Attention mechanism. We create a new dataset from SemEval Affect in Tweets dataset and then conduct experiments for the best outcomes. Our model achieves up to 79% accuracy in this task.","PeriodicalId":211983,"journal":{"name":"2020 3rd International Conference on Computer and Informatics Engineering (IC2IE)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122280208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-09-15DOI: 10.1109/IC2IE50715.2020.9274648
Atika Uyun, Dwinanda Kinanti Suci Sekarhati, Mohamad Yusup Dias Ibrahim, Sofian Lusa, D. I. Sensuse, Nadya Safitri, Damayanti Elisabeth
Nowadays, digital marketing strategy has made major improvement in business and industry within more than two decades. In the era of rapid information technology development, business competition is also getting stricter through the transformation of digital business. This is also happening in one of Indonesia’s digital business company known as PT XYZ Indonesia. For its sustainability, knowledge management has been adopted. But, there are some issues in its implementation because of high turnover rate and incorrect implementation process. In addition, there is a complaint rating of approximately 20% of 1049 projects. This paper aims to investigate KM implementation process on job satisfaction and worker performance for XYZ and give recommendation based on the measurement result to KM process implementation. The result of this paper is organizational culture has significant relationship with job satisfaction and knowledge sharing has significant relationship with worker performance. Based on the result, we recommend to create reward, KM policy, allocate budget, and organize special division of KM to optimal the KM implementation.
{"title":"Investigation of Job Satisfaction and Worker Performance on Digital Business Company","authors":"Atika Uyun, Dwinanda Kinanti Suci Sekarhati, Mohamad Yusup Dias Ibrahim, Sofian Lusa, D. I. Sensuse, Nadya Safitri, Damayanti Elisabeth","doi":"10.1109/IC2IE50715.2020.9274648","DOIUrl":"https://doi.org/10.1109/IC2IE50715.2020.9274648","url":null,"abstract":"Nowadays, digital marketing strategy has made major improvement in business and industry within more than two decades. In the era of rapid information technology development, business competition is also getting stricter through the transformation of digital business. This is also happening in one of Indonesia’s digital business company known as PT XYZ Indonesia. For its sustainability, knowledge management has been adopted. But, there are some issues in its implementation because of high turnover rate and incorrect implementation process. In addition, there is a complaint rating of approximately 20% of 1049 projects. This paper aims to investigate KM implementation process on job satisfaction and worker performance for XYZ and give recommendation based on the measurement result to KM process implementation. The result of this paper is organizational culture has significant relationship with job satisfaction and knowledge sharing has significant relationship with worker performance. Based on the result, we recommend to create reward, KM policy, allocate budget, and organize special division of KM to optimal the KM implementation.","PeriodicalId":211983,"journal":{"name":"2020 3rd International Conference on Computer and Informatics Engineering (IC2IE)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114264082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-09-15DOI: 10.1109/IC2IE50715.2020.9274640
L. M. Hasani, Hafizh Rafizal Adnan, D. I. Sensuse, Kautsarina, Ryan Randy Suryono
Widespread lockdowns across the globe during Covid-19 outbreak forced the universities to abruptly adopt full-online distance learning. Such unprecedented abrupt adoption requires a degree of student readiness to ensure the success of distance learning delivery. However, prior research about student readiness of e-Learning adoption is still limited to discussing proactive adoption in normal conditions. To address this issue, this study investigated the factors that affect the student’s perceived readiness for abrupt distance learning adoption. By applying Structural Equation Modelling (SEM) using the Partial Least Square algorithm, this study found that self-competence, comfort with e-Learning, uncertainty avoidance, financial ability, and technological facilitating conditions are factors that significantly affect student’s perceived readiness. Based on this finding, faculties are recommended to be an early adopter of e-Learning, to provide an e-Learning platform with excellent usability and effective instructional design for the students, to provide clear instructions for both students and instructors, and to provide needed resources (e.g. internet connection) to the students. Moreover, future studies could be focused on lecturers’ or faculties’ readiness for abrupt distance learning adoption.
{"title":"Factors Affecting Student’s Perceived Readiness on Abrupt Distance Learning Adoption: Indonesian Higher-Education Perspectives","authors":"L. M. Hasani, Hafizh Rafizal Adnan, D. I. Sensuse, Kautsarina, Ryan Randy Suryono","doi":"10.1109/IC2IE50715.2020.9274640","DOIUrl":"https://doi.org/10.1109/IC2IE50715.2020.9274640","url":null,"abstract":"Widespread lockdowns across the globe during Covid-19 outbreak forced the universities to abruptly adopt full-online distance learning. Such unprecedented abrupt adoption requires a degree of student readiness to ensure the success of distance learning delivery. However, prior research about student readiness of e-Learning adoption is still limited to discussing proactive adoption in normal conditions. To address this issue, this study investigated the factors that affect the student’s perceived readiness for abrupt distance learning adoption. By applying Structural Equation Modelling (SEM) using the Partial Least Square algorithm, this study found that self-competence, comfort with e-Learning, uncertainty avoidance, financial ability, and technological facilitating conditions are factors that significantly affect student’s perceived readiness. Based on this finding, faculties are recommended to be an early adopter of e-Learning, to provide an e-Learning platform with excellent usability and effective instructional design for the students, to provide clear instructions for both students and instructors, and to provide needed resources (e.g. internet connection) to the students. Moreover, future studies could be focused on lecturers’ or faculties’ readiness for abrupt distance learning adoption.","PeriodicalId":211983,"journal":{"name":"2020 3rd International Conference on Computer and Informatics Engineering (IC2IE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130328271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-09-15DOI: 10.1109/IC2IE50715.2020.9274592
Defiana Arnaldy, Tio Setia Hati
Sophisticated technology in the world has been developing very rapidly, especially in terms of accessing all the information that is on the web. Website is one of technological sophistication that presents various kinds of information needed, from children to adults easily accessing websites on the internet. Unwittingly the number of accesses made by users around the world causes a web server or a place that provides a website will be weak and can occur down. When a web server becomes weak, hackers will use it to attack the web server, retrieve data, important information, and even more fatal is when user data is stolen and misused by hackers. The web developers only focus on a website appearance but do not focus on access and security of the website. Therefore, we need an optimal web server that can accommodate the many accesses caused by users and the security of the web server to safeguard data and information stored. This research applies a package namely Reverse Proxy which is used to optimize a web server and Web Application Firewall which is used to maintain the security of a web server.
{"title":"Performance Analysis of Reverse Proxy and Web Application Firewall with Telegram Bot as Attack Notification On Web Server","authors":"Defiana Arnaldy, Tio Setia Hati","doi":"10.1109/IC2IE50715.2020.9274592","DOIUrl":"https://doi.org/10.1109/IC2IE50715.2020.9274592","url":null,"abstract":"Sophisticated technology in the world has been developing very rapidly, especially in terms of accessing all the information that is on the web. Website is one of technological sophistication that presents various kinds of information needed, from children to adults easily accessing websites on the internet. Unwittingly the number of accesses made by users around the world causes a web server or a place that provides a website will be weak and can occur down. When a web server becomes weak, hackers will use it to attack the web server, retrieve data, important information, and even more fatal is when user data is stolen and misused by hackers. The web developers only focus on a website appearance but do not focus on access and security of the website. Therefore, we need an optimal web server that can accommodate the many accesses caused by users and the security of the web server to safeguard data and information stored. This research applies a package namely Reverse Proxy which is used to optimize a web server and Web Application Firewall which is used to maintain the security of a web server.","PeriodicalId":211983,"journal":{"name":"2020 3rd International Conference on Computer and Informatics Engineering (IC2IE)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131944328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-09-15DOI: 10.1109/IC2IE50715.2020.9274573
R. Hidayat, A. M. Arymurthy, Dimas Sony Dewantara
Analysis of changes in the conditions of an area can be done through satellite image analysis. This study utilizes the classification of satellite imagery to determine the impact of disasters and liquefaction disaster recovery efforts in the Petobo region, Palu, Central Sulawesi. The deep learning approach, namely Convolutional Neural Network (CNN) and CNN combined with ResNet as the Transfer Learning model, were selected as classification methods that would be compared in determining the approach with the best performance. The classification of satellite imagery is mapped into two main classes, namely natural land cover and artificial land cover. This research subsequently succeeded in mapping land cover changes that occurred as a result of liquefaction disasters and recovery efforts that have been carried out with promising performance
{"title":"Disaster Impact Analysis Uses Land Cover Classification, Case study: Petobo Liquefaction","authors":"R. Hidayat, A. M. Arymurthy, Dimas Sony Dewantara","doi":"10.1109/IC2IE50715.2020.9274573","DOIUrl":"https://doi.org/10.1109/IC2IE50715.2020.9274573","url":null,"abstract":"Analysis of changes in the conditions of an area can be done through satellite image analysis. This study utilizes the classification of satellite imagery to determine the impact of disasters and liquefaction disaster recovery efforts in the Petobo region, Palu, Central Sulawesi. The deep learning approach, namely Convolutional Neural Network (CNN) and CNN combined with ResNet as the Transfer Learning model, were selected as classification methods that would be compared in determining the approach with the best performance. The classification of satellite imagery is mapped into two main classes, namely natural land cover and artificial land cover. This research subsequently succeeded in mapping land cover changes that occurred as a result of liquefaction disasters and recovery efforts that have been carried out with promising performance","PeriodicalId":211983,"journal":{"name":"2020 3rd International Conference on Computer and Informatics Engineering (IC2IE)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134097565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-09-15DOI: 10.1109/IC2IE50715.2020.9274625
Pramitya Lisnawaty Ayunda, E. K. Budiardjo
Focusing on the big topic of information technology related to software engineering, Scrum is one of the frameworks on the agile methodology to develop innovative products and services. Implementing the Scrum framework can be challenging. Changes in teamwork culture, both vertically and horizontally in a software development organization, cannot be avoided. In software development process improvement, evaluation of the scrum implementation using the Scrum Maturity Model. Scrum Maturity Model also assesses the extent of the implementation of the scrum such as the implementation of roles, events, and artifacts following the Scrum Guide. This research occurred to the representative of the product owner, scrum master, and development team. There are seven sub-categories which do not implement the best scrum practices. These practices have an impact on the avoided risk. By understanding the impact of these risks, the team can make plans to avoid those risks. The sub-categories are the product owner, development team, sprint, sprint planning, daily Scrum, product backlog, and sprint backlog.
{"title":"Evaluation of Scrum Practice Maturity in Software Development of Mobile Communication Application","authors":"Pramitya Lisnawaty Ayunda, E. K. Budiardjo","doi":"10.1109/IC2IE50715.2020.9274625","DOIUrl":"https://doi.org/10.1109/IC2IE50715.2020.9274625","url":null,"abstract":"Focusing on the big topic of information technology related to software engineering, Scrum is one of the frameworks on the agile methodology to develop innovative products and services. Implementing the Scrum framework can be challenging. Changes in teamwork culture, both vertically and horizontally in a software development organization, cannot be avoided. In software development process improvement, evaluation of the scrum implementation using the Scrum Maturity Model. Scrum Maturity Model also assesses the extent of the implementation of the scrum such as the implementation of roles, events, and artifacts following the Scrum Guide. This research occurred to the representative of the product owner, scrum master, and development team. There are seven sub-categories which do not implement the best scrum practices. These practices have an impact on the avoided risk. By understanding the impact of these risks, the team can make plans to avoid those risks. The sub-categories are the product owner, development team, sprint, sprint planning, daily Scrum, product backlog, and sprint backlog.","PeriodicalId":211983,"journal":{"name":"2020 3rd International Conference on Computer and Informatics Engineering (IC2IE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130477845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-09-15DOI: 10.1109/IC2IE50715.2020.9274666
Rakhmayudhi, W. Suwarningsih
The classification of question types in the Indonesian medical domain is the important component of the medical question answering system. The strategy proposed in this paper is to build the template pattern and rule-based parser for extracting some important words using the generated feature to automatically query the classification of question. Classification aims to prove that the system is capable of classifying queries only by using the available language resources. The proposed method has been evaluated using datasets collected from various Indonesian health consultation websites. Test results from the proposed method indicated that the classification process is very effective with an accuracy of 84.33%.
{"title":"Template Pattern for Simple Question Transformation","authors":"Rakhmayudhi, W. Suwarningsih","doi":"10.1109/IC2IE50715.2020.9274666","DOIUrl":"https://doi.org/10.1109/IC2IE50715.2020.9274666","url":null,"abstract":"The classification of question types in the Indonesian medical domain is the important component of the medical question answering system. The strategy proposed in this paper is to build the template pattern and rule-based parser for extracting some important words using the generated feature to automatically query the classification of question. Classification aims to prove that the system is capable of classifying queries only by using the available language resources. The proposed method has been evaluated using datasets collected from various Indonesian health consultation websites. Test results from the proposed method indicated that the classification process is very effective with an accuracy of 84.33%.","PeriodicalId":211983,"journal":{"name":"2020 3rd International Conference on Computer and Informatics Engineering (IC2IE)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124738871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-09-15DOI: 10.1109/IC2IE50715.2020.9274563
Diyang Risma Gabriella, A. Agus
Cross-border e-commerce (CBEC) is growing rapidly, it provides a new shopping experience for customers where they can involve in a global transaction. Each year, CBEC receives a significant total number of transactions, recorded in 2018, CBEC transactions have increased by 27.5% globally. Shopee as the biggest of Indonesia CBEC has dominated the market with a monthly average of 200.2 million visits. Competition between CBEC in Indonesia continues, they are competing to provide the best quality of products and platform experience to gain trust and purchase from the customers. Building a trust and customer intention to purchase in CBEC platform is a challenge, while customers’ awareness of products is the first step in creating optimal product cognition. Perceived trust can be improved by the involvement of customers in the CBEC platform, the provision of convincing product information, as well as the awareness of good product quality, thus it will influence purchase intention of customers. Therefore, this study was conducted to analyze the relationship between product cognition stage, platform emotion stage, behavior intention stage, and actual behavior stage at the biggest CBEC in Indonesia. The research is based on the Hierarchy of Effect (HOE) model which consists of customers stages of journey. The survey began in January to March, 2020 and 1.281 respondents were processed through a structured questionnaire, and data were analyzed using the Structural Equation Method (SEM).
跨境电子商务(CBEC)正在迅速发展,它为客户提供了一种新的购物体验,他们可以参与全球交易。每年,CBEC都会收到大量的交易,2018年,CBEC交易在全球范围内增长了27.5%。Shopee是印尼最大的CBEC,月平均访问量为2.002亿。CBEC在印尼的竞争仍在继续,他们正在竞争提供最优质的产品和平台体验,以获得客户的信任和购买。在CBEC平台上建立信任和客户购买意愿是一个挑战,而客户对产品的认知是创造最佳产品认知的第一步。感知信任可以通过客户参与CBEC平台,提供令人信服的产品信息,以及对良好产品质量的认识来提高,从而影响客户的购买意愿。因此,本研究以印尼最大的CBEC为研究对象,分析产品认知阶段、平台情感阶段、行为意向阶段和实际行为阶段之间的关系。本研究基于效应层次模型(Hierarchy of Effect, HOE),该模型包含了顾客旅程的各个阶段。调查于2020年1月至3月展开,通过结构化问卷对1281名受访者进行了处理,并使用结构方程法(SEM)对数据进行了分析。
{"title":"Product Cognition, Platform Emotion, Behavior Intention, and Actual Behavior Stage in Cross Border E-commerce (Case Study: Shopee as The Biggest Cross Border E-Commerce in Indonesia)","authors":"Diyang Risma Gabriella, A. Agus","doi":"10.1109/IC2IE50715.2020.9274563","DOIUrl":"https://doi.org/10.1109/IC2IE50715.2020.9274563","url":null,"abstract":"Cross-border e-commerce (CBEC) is growing rapidly, it provides a new shopping experience for customers where they can involve in a global transaction. Each year, CBEC receives a significant total number of transactions, recorded in 2018, CBEC transactions have increased by 27.5% globally. Shopee as the biggest of Indonesia CBEC has dominated the market with a monthly average of 200.2 million visits. Competition between CBEC in Indonesia continues, they are competing to provide the best quality of products and platform experience to gain trust and purchase from the customers. Building a trust and customer intention to purchase in CBEC platform is a challenge, while customers’ awareness of products is the first step in creating optimal product cognition. Perceived trust can be improved by the involvement of customers in the CBEC platform, the provision of convincing product information, as well as the awareness of good product quality, thus it will influence purchase intention of customers. Therefore, this study was conducted to analyze the relationship between product cognition stage, platform emotion stage, behavior intention stage, and actual behavior stage at the biggest CBEC in Indonesia. The research is based on the Hierarchy of Effect (HOE) model which consists of customers stages of journey. The survey began in January to March, 2020 and 1.281 respondents were processed through a structured questionnaire, and data were analyzed using the Structural Equation Method (SEM).","PeriodicalId":211983,"journal":{"name":"2020 3rd International Conference on Computer and Informatics Engineering (IC2IE)","volume":"43 7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129990677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}