首页 > 最新文献

2021 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS最新文献

英文 中文
The Challenges in Integrated Personal Health Record Adoption in Indonesia: A Qualitative Analysis of Regulatory Perspectives 印度尼西亚综合个人健康记录采用的挑战:监管视角的定性分析
N. C. Harahap, P. W. Handayani, A. Hidayanto
A personal health record (PHR) is a type of health record maintained by patients. Integrated PHR is an ideal type of PHR that can empower patients to manage their health care and provide continuous connections between patients and their health providers. However, little is known about the adoption of integrated PHR in Indonesia. Thus, this study aims to discuss the challenges in the adoption of integrated PHR in Indonesia from the perspective of regulators as health policymakers in Indonesia. Data collection was conducted using semi-structured interviews with participants from the Ministry of Health and Social Health Insurance Administration Body (BPJS Kesehatan). This qualitative study identified nine challenges in the adoption of integrated PHR in Indonesia. Four challenges are related to technological issues, such as lack of interoperability, unequal distribution of infrastructure, security concerns, and system quality. Five challenges are related to people and organization, such as lack of IT human resources, health professionals' resistance to health information systems, top management support, strategic government plans, and policy changes.
个人健康记录(PHR)是由患者维护的一种健康记录。综合PHR是一种理想的PHR类型,它可以使患者能够管理他们的医疗保健,并在患者和他们的医疗服务提供者之间提供持续的联系。然而,人们对印度尼西亚采用综合PHR的情况知之甚少。因此,本研究旨在从监管机构作为印度尼西亚卫生政策制定者的角度讨论在印度尼西亚采用综合PHR所面临的挑战。数据收集采用与卫生部和社会健康保险管理机构(BPJS Kesehatan)的参与者进行的半结构化访谈。这项定性研究确定了印度尼西亚采用综合PHR的九个挑战。四个挑战与技术问题相关,例如缺乏互操作性、基础设施的不平等分布、安全问题和系统质量。五项挑战与人员和组织有关,如缺乏IT人力资源、卫生专业人员对卫生信息系统的抵制、最高管理层的支持、政府战略计划和政策变化。
{"title":"The Challenges in Integrated Personal Health Record Adoption in Indonesia: A Qualitative Analysis of Regulatory Perspectives","authors":"N. C. Harahap, P. W. Handayani, A. Hidayanto","doi":"10.1109/ICIMCIS53775.2021.9699353","DOIUrl":"https://doi.org/10.1109/ICIMCIS53775.2021.9699353","url":null,"abstract":"A personal health record (PHR) is a type of health record maintained by patients. Integrated PHR is an ideal type of PHR that can empower patients to manage their health care and provide continuous connections between patients and their health providers. However, little is known about the adoption of integrated PHR in Indonesia. Thus, this study aims to discuss the challenges in the adoption of integrated PHR in Indonesia from the perspective of regulators as health policymakers in Indonesia. Data collection was conducted using semi-structured interviews with participants from the Ministry of Health and Social Health Insurance Administration Body (BPJS Kesehatan). This qualitative study identified nine challenges in the adoption of integrated PHR in Indonesia. Four challenges are related to technological issues, such as lack of interoperability, unequal distribution of infrastructure, security concerns, and system quality. Five challenges are related to people and organization, such as lack of IT human resources, health professionals' resistance to health information systems, top management support, strategic government plans, and policy changes.","PeriodicalId":250460,"journal":{"name":"2021 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121641453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Sentiment Analysis of Big Cities on The Island of Java in Indonesia from Twitter Data as A Recommender System 基于Twitter数据推荐系统的印尼爪哇岛大城市情感分析
Boby Siswanto, F. Gaol, B. Soewito, H. Warnars
Text mining is a data mining technique to find hidden things from a set of data in the form of text. One of the things that can be obtained with text mining is opinion or sentiment, whether it is positive or negative. Positive sentiment is used as a reference for a subject or object from a collection of texts to be recommended. Java Island is the city with the most population in Indonesia with a variety of culinary delights. This study aims to analyze sentiment recommendations on culinary data from food or cuisine in big cities on the island of Java. Four big cities were selected, namely Jakarta, Bandung, Yogyakarta, and Surabaya. The data source is a tweet of culinary arts of the four cities from Twitter in Indonesia. The Sastrawi Library is used as a text mining data processing tool in Indonesia. The results obtained are the majority of positive sentiments from all cities. The cumulative sentiment value of the four cities is 54%, meaning that the big cities on the island of Java have good culinary delights and deserve to be recommended to be enjoyed.
文本挖掘是一种以文本形式从一组数据中发现隐藏内容的数据挖掘技术。文本挖掘可以获得的东西之一是观点或情绪,无论是积极的还是消极的。积极情绪是用来作为一个主题或对象的参考,从一个文本集合被推荐。爪哇岛是印度尼西亚人口最多的城市,有着各种各样的美食。本研究旨在分析爪哇岛各大城市的食物或烹饪数据的情感推荐。雅加达、万隆、日惹、泗水等4个大城市被选定。数据来源是印度尼西亚Twitter上关于这四个城市烹饪艺术的推文。在印度尼西亚,savastri图书馆被用作文本挖掘数据处理工具。调查结果显示,各城市的正面评价占绝大多数。四个城市的累计情感值为54%,这意味着爪哇岛上的大城市有很好的烹饪乐趣,值得推荐去享受。
{"title":"Sentiment Analysis of Big Cities on The Island of Java in Indonesia from Twitter Data as A Recommender System","authors":"Boby Siswanto, F. Gaol, B. Soewito, H. Warnars","doi":"10.1109/ICIMCIS53775.2021.9699147","DOIUrl":"https://doi.org/10.1109/ICIMCIS53775.2021.9699147","url":null,"abstract":"Text mining is a data mining technique to find hidden things from a set of data in the form of text. One of the things that can be obtained with text mining is opinion or sentiment, whether it is positive or negative. Positive sentiment is used as a reference for a subject or object from a collection of texts to be recommended. Java Island is the city with the most population in Indonesia with a variety of culinary delights. This study aims to analyze sentiment recommendations on culinary data from food or cuisine in big cities on the island of Java. Four big cities were selected, namely Jakarta, Bandung, Yogyakarta, and Surabaya. The data source is a tweet of culinary arts of the four cities from Twitter in Indonesia. The Sastrawi Library is used as a text mining data processing tool in Indonesia. The results obtained are the majority of positive sentiments from all cities. The cumulative sentiment value of the four cities is 54%, meaning that the big cities on the island of Java have good culinary delights and deserve to be recommended to be enjoyed.","PeriodicalId":250460,"journal":{"name":"2021 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115165794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Challenges of Inter-organizational Information Security in Healthcare Services: Health Regulator's Perspective 医疗保健服务中组织间信息安全的挑战:卫生监管机构的观点
P. Sari, P. W. Handayani, A. Hidayanto, R. F. Aji, S. Yazid
Inter-organization Information Technology (IT) relationships enhance the collaboration among organizations to deliver better healthcare services. This study aims to analyze information security practices and challenges for inter-organizational IT relationships in healthcare services from health regulator's perspective namely the National Health Insurance Agency (BPJS-K) who provides an inter-organization system to support the relationships. We use the qualitative research method with thematic coding as data analysis techniques. Data are collected using an online interview with three middle management in the IT division from BPJS-K. The results revealed some information security threats on inter-organizational systems. Even though BPJS-K has implemented some security measures to protect the systems, it must address some challenges to improve them. This study discusses some theoretical and practical contributions for inter-organizational information security.
组织间信息技术(IT)关系可增强组织之间的协作,从而提供更好的医疗保健服务。本研究旨在从健康监管机构的角度,即国家健康保险局(BPJS-K)的角度,分析医疗服务中组织间IT关系的信息安全实践和挑战,该机构提供了一个组织间系统来支持这些关系。我们采用定性研究方法,以专题编码作为数据分析技术。数据是通过对BPJS-K IT部门的三名中层管理人员的在线访谈收集的。研究结果揭示了组织间系统存在的信息安全威胁。尽管BPJS-K已经实施了一些安全措施来保护系统,但它必须解决一些挑战来改进它们。本研究探讨了对组织间信息安全的一些理论和实践贡献。
{"title":"Challenges of Inter-organizational Information Security in Healthcare Services: Health Regulator's Perspective","authors":"P. Sari, P. W. Handayani, A. Hidayanto, R. F. Aji, S. Yazid","doi":"10.1109/ICIMCIS53775.2021.9699177","DOIUrl":"https://doi.org/10.1109/ICIMCIS53775.2021.9699177","url":null,"abstract":"Inter-organization Information Technology (IT) relationships enhance the collaboration among organizations to deliver better healthcare services. This study aims to analyze information security practices and challenges for inter-organizational IT relationships in healthcare services from health regulator's perspective namely the National Health Insurance Agency (BPJS-K) who provides an inter-organization system to support the relationships. We use the qualitative research method with thematic coding as data analysis techniques. Data are collected using an online interview with three middle management in the IT division from BPJS-K. The results revealed some information security threats on inter-organizational systems. Even though BPJS-K has implemented some security measures to protect the systems, it must address some challenges to improve them. This study discusses some theoretical and practical contributions for inter-organizational information security.","PeriodicalId":250460,"journal":{"name":"2021 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134241180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SIMTEKDIN of Covid-19 Using Forward Chaining Based on Android Mobile 基于Android手机前向链的新型冠状病毒SIMTEKDIN
Erly Krisnanik, Nadia Imawangi, H. N. Irmanda
Based on the results of monitoring through the covid19.go.id information channel managed by the Covid-19 Handling Task Force regarding the analysis of Covid-19 virus data as of July 18, 2021, there were 2,877,476 cumulative Covid-19 cases in Indonesia, of which 542.236 (18.8%) Among them were active cases, 2,261,658 (78.6%) were declared cured from being confirmed, and 73,582 (2.6%) died and were confirmed to have contracted Covid-19. The problems faced by the community today are still afraid to come to the hospital for an initial examination. Based on this, it is necessary to have a system application that can detect the level of risk of being exposed to Covid-19 for the community without having to come to the hospital. The research methodology used is agile software development using the sprint (the stages of the research carried out consisted of 3 sprints to produce a mobile-based SIMTEKDIN Covid 19 application). The results of this study are expected to help the public in knowing early the symptoms of Covid 19 disease. The contribution of this research is in the form of a mobile-based application of the Covid-19 Disease Early Detection Monitoring Information System (SIMTEKDIN).
根据2019冠状病毒病监测结果。截至2021年7月18日,印尼新冠肺炎疫情处理工作组管理的新冠病毒数据分析信息频道显示,印尼累计确诊病例2877476例,其中活动性病例542.236例(18.8%),确诊治愈病例2261658例(78.6%),死亡确诊病例73582例(2.6%)。今天社区面临的问题仍然是不敢来医院进行初步检查。在此基础上,有必要开发出无需前往医院就能为社区检测新冠病毒感染风险程度的系统应用程序。使用的研究方法是使用sprint的敏捷软件开发(进行的研究阶段由3个sprint组成,以生产基于移动的SIMTEKDIN Covid - 19应用程序)。预计此次研究结果将有助于公众尽早了解新冠肺炎的症状。这项研究的贡献是基于移动应用的Covid-19疾病早期检测监测信息系统(SIMTEKDIN)。
{"title":"SIMTEKDIN of Covid-19 Using Forward Chaining Based on Android Mobile","authors":"Erly Krisnanik, Nadia Imawangi, H. N. Irmanda","doi":"10.1109/ICIMCIS53775.2021.9699351","DOIUrl":"https://doi.org/10.1109/ICIMCIS53775.2021.9699351","url":null,"abstract":"Based on the results of monitoring through the covid19.go.id information channel managed by the Covid-19 Handling Task Force regarding the analysis of Covid-19 virus data as of July 18, 2021, there were 2,877,476 cumulative Covid-19 cases in Indonesia, of which 542.236 (18.8%) Among them were active cases, 2,261,658 (78.6%) were declared cured from being confirmed, and 73,582 (2.6%) died and were confirmed to have contracted Covid-19. The problems faced by the community today are still afraid to come to the hospital for an initial examination. Based on this, it is necessary to have a system application that can detect the level of risk of being exposed to Covid-19 for the community without having to come to the hospital. The research methodology used is agile software development using the sprint (the stages of the research carried out consisted of 3 sprints to produce a mobile-based SIMTEKDIN Covid 19 application). The results of this study are expected to help the public in knowing early the symptoms of Covid 19 disease. The contribution of this research is in the form of a mobile-based application of the Covid-19 Disease Early Detection Monitoring Information System (SIMTEKDIN).","PeriodicalId":250460,"journal":{"name":"2021 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121876571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Brief Study on Cybercrimes and Practices in Mizoram 米佐拉姆邦网络犯罪与实践简要研究
J. Hussain, Vanlalruata Hnamte, Laldinsangi
This study aims to analyze the level of awareness of cybersecurity and crimes in Mizoram by focusing on various threats from the internet, Social Networking Sites (SNSs), and other communication or computer-oriented crime, in cyberspace along with their significant awareness. In modern technological years, cybercrime is a hot challenge in all areas and aspects including personal security, national security, and public safety. To prevent from being victimized, everyone needs to be informed about some sort of measures and about cybercrimes. A well-structured questionnaire was prepared for the survey as per the cases history recorded provided by the Mizoram police department. The results of this study are important recommendations and need to be carried out by various circles of the general public and specifically for Mizoram. While crime victims are mostly unaware of stranger behaviour to capture their information details, consequently the public awareness level on cybercrime is below average. This study presents a brief overview of all evolving crime, case studies, and the working approach to combat cybercrime in the Mizoram context.
本研究旨在分析米佐拉姆邦的网络安全和犯罪意识水平,重点关注网络空间中来自互联网、社交网站(sns)和其他通信或计算机导向犯罪的各种威胁,以及他们的重要意识。在现代科技时代,网络犯罪是涉及个人安全、国家安全、公共安全等各个领域和方面的热点问题。为了防止成为受害者,每个人都需要了解一些措施和网络犯罪。根据米佐拉姆邦警察局提供的案件历史记录,为调查准备了一份结构良好的问卷。这项研究的结果是重要的建议,需要由公众各界执行,特别是对米佐拉姆邦。虽然犯罪受害者大多没有意识到陌生人的行为来获取他们的信息细节,因此公众对网络犯罪的认识水平低于平均水平。本研究简要概述了所有不断演变的犯罪,案例研究,以及在米佐拉姆邦打击网络犯罪的工作方法。
{"title":"A Brief Study on Cybercrimes and Practices in Mizoram","authors":"J. Hussain, Vanlalruata Hnamte, Laldinsangi","doi":"10.1109/ICIMCIS53775.2021.9699193","DOIUrl":"https://doi.org/10.1109/ICIMCIS53775.2021.9699193","url":null,"abstract":"This study aims to analyze the level of awareness of cybersecurity and crimes in Mizoram by focusing on various threats from the internet, Social Networking Sites (SNSs), and other communication or computer-oriented crime, in cyberspace along with their significant awareness. In modern technological years, cybercrime is a hot challenge in all areas and aspects including personal security, national security, and public safety. To prevent from being victimized, everyone needs to be informed about some sort of measures and about cybercrimes. A well-structured questionnaire was prepared for the survey as per the cases history recorded provided by the Mizoram police department. The results of this study are important recommendations and need to be carried out by various circles of the general public and specifically for Mizoram. While crime victims are mostly unaware of stranger behaviour to capture their information details, consequently the public awareness level on cybercrime is below average. This study presents a brief overview of all evolving crime, case studies, and the working approach to combat cybercrime in the Mizoram context.","PeriodicalId":250460,"journal":{"name":"2021 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129830214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Actual Use of Transactional Video on Demand: The Extended of Technology Acceptance Model 交易视频点播的实际应用:技术接受模型的扩展
Yasmin Amalia, P. W. Handayani, Ika Chandra Hapsari
This study aims to analyze the factors that influence someone to adopt transactional video on demand (TVOD) services. This study uses a quantitative approach involving 359 respondents through an online questionnaire. Then, the validation of quantitative results was carried out through interviews with five respondents. The data obtained in this study were processed and analyzed using the Covariance Based Structural Equation Model. The results showed that perceived ease of use, perceived usefulness, social value, and monetary value were factors that influenced the intention to use TVOD services, where these intentions affect the actual use of TVOD services in Indonesia.
本研究旨在分析影响人们采用交易式视讯点播服务的因素。本研究采用定量方法,通过在线问卷调查了359名受访者。然后,通过对五名受访者的访谈,对定量结果进行验证。本研究所得数据采用基于协方差的结构方程模型进行处理和分析。结果表明,感知易用性、感知有用性、社会价值和货币价值是影响TVOD服务使用意愿的因素,这些意愿影响了印度尼西亚TVOD服务的实际使用。
{"title":"Actual Use of Transactional Video on Demand: The Extended of Technology Acceptance Model","authors":"Yasmin Amalia, P. W. Handayani, Ika Chandra Hapsari","doi":"10.1109/ICIMCIS53775.2021.9699327","DOIUrl":"https://doi.org/10.1109/ICIMCIS53775.2021.9699327","url":null,"abstract":"This study aims to analyze the factors that influence someone to adopt transactional video on demand (TVOD) services. This study uses a quantitative approach involving 359 respondents through an online questionnaire. Then, the validation of quantitative results was carried out through interviews with five respondents. The data obtained in this study were processed and analyzed using the Covariance Based Structural Equation Model. The results showed that perceived ease of use, perceived usefulness, social value, and monetary value were factors that influenced the intention to use TVOD services, where these intentions affect the actual use of TVOD services in Indonesia.","PeriodicalId":250460,"journal":{"name":"2021 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121092867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Enterprise System Modeling for Business Licensing Services 业务许可服务的企业系统建模
Muhammad Mahreza Maulana, A. Suroso, Yani Nurhadryani, K. Seminar
Business licensing services are required to provide integrated services across government agencies. It can provide convenient public services for the community. To have quality and reliable information services with infrastructure that has adequate capacity and capability. This paper aims to address a recommendation to be implemented and support business licensing services. Having a proper enterprise system will increase service adoption, simplify the service integration process, manage and analyze data. It also needs to own appropriate infrastructure capacity and capability to handle the data and information security required by the government and citizens. By conducting activity to assess, select, add and create modeling of an enterprises system component that provides information technology solutions supporting government services, especially business licensing services. It includes high-level Enterprise Systems, service adoption solutions, service integration solutions, service data/information analysis solutions to support decision making, and adequate infrastructure solutions. The recommended enterprise system solutions are implementing CRM with BPM for service adoption, implementing API Gateway and ESB for service integration, implementing BIA technology for data processing, and implementing cloud and cybersecurity solutions for adequate infrastructure.
商业许可服务需要提供跨政府机构的综合服务。它可以为社区提供便捷的公共服务。具备足够容量和能力的基础设施,提供优质可靠的信息服务。本文旨在解决一个建议,以实现和支持业务许可服务。拥有适当的企业系统将增加服务的采用,简化服务集成过程,管理和分析数据。它还需要拥有适当的基础设施容量和能力来处理政府和公民所需的数据和信息安全。通过开展活动,评估、选择、添加和创建企业系统组件的模型,该组件提供支持政府服务的信息技术解决方案,特别是业务许可服务。它包括高级企业系统、服务采用解决方案、服务集成解决方案、支持决策制定的服务数据/信息分析解决方案,以及适当的基础设施解决方案。推荐的企业系统解决方案包括:用BPM实现CRM,用于服务采用;实现API Gateway和ESB,用于服务集成;实现BIA技术,用于数据处理;实现云和网络安全解决方案,用于适当的基础设施。
{"title":"Enterprise System Modeling for Business Licensing Services","authors":"Muhammad Mahreza Maulana, A. Suroso, Yani Nurhadryani, K. Seminar","doi":"10.1109/ICIMCIS53775.2021.9699341","DOIUrl":"https://doi.org/10.1109/ICIMCIS53775.2021.9699341","url":null,"abstract":"Business licensing services are required to provide integrated services across government agencies. It can provide convenient public services for the community. To have quality and reliable information services with infrastructure that has adequate capacity and capability. This paper aims to address a recommendation to be implemented and support business licensing services. Having a proper enterprise system will increase service adoption, simplify the service integration process, manage and analyze data. It also needs to own appropriate infrastructure capacity and capability to handle the data and information security required by the government and citizens. By conducting activity to assess, select, add and create modeling of an enterprises system component that provides information technology solutions supporting government services, especially business licensing services. It includes high-level Enterprise Systems, service adoption solutions, service integration solutions, service data/information analysis solutions to support decision making, and adequate infrastructure solutions. The recommended enterprise system solutions are implementing CRM with BPM for service adoption, implementing API Gateway and ESB for service integration, implementing BIA technology for data processing, and implementing cloud and cybersecurity solutions for adequate infrastructure.","PeriodicalId":250460,"journal":{"name":"2021 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127957972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Exploitation Prevention on Network Printer with Signature-Based Suricata on PfSense 基于PfSense的基于签名的Suricata网络打印机攻击防范
Fajar Subkhi Sulaiman, H. Seta, Noor Falih
In late 2018, more than 50,000 network printers were exposed to a cyberattack that forced them to print spam messages. Were the spam message turned into a message for large-scale political activities, it can cause a major problem. Based on this, two problem arises, namely what is the impact of hacked printers. Can a hacked network printer inflict major damage on the surrounding? Secondly, whether a combination of a firewall with Suricata intrusion detection system (IDS) and intrusion prevention system (IPS) can prevent printer hacking. This research only discusses transmission control protocol (TCP) communication packets, access restriction using pfSense firewall along with Suricata, and printer model Canon imageRunner ADV-4025 as the test printer. The offered solution is to separate the network into two-part and put a firewall in between two networks, and configure the firewall along with Suricata so that the firewall can detect malicious packets. The output obtained is a system that can limit access and perform packet filters from computers on a different network to a printer, which can increase service availability, information confidentiality, and data integrity on printers.
2018年底,超过5万台网络打印机受到网络攻击,迫使它们打印垃圾邮件。如果垃圾邮件变成大规模政治活动的信息,就会引发严重的问题。基于此,出现了两个问题,即打印机被黑的影响是什么。被黑的网络打印机能对周围环境造成重大破坏吗?其次,防火墙与Suricata入侵检测系统(IDS)和入侵防御系统(IPS)的组合是否可以防止打印机被黑客入侵。本研究仅讨论传输控制协议(TCP)通信数据包,使用pfSense防火墙和Suricata进行访问限制,并使用Canon imagerrunner adva -4025打印机作为测试打印机。解决方案是将网络分成两部分,在两个网络之间设置防火墙,并与Suricata一起配置防火墙,以便防火墙可以检测恶意数据包。所获得的输出是一个系统,它可以限制访问并执行从不同网络上的计算机到打印机的包过滤,这可以增加打印机上的服务可用性、信息机密性和数据完整性。
{"title":"Exploitation Prevention on Network Printer with Signature-Based Suricata on PfSense","authors":"Fajar Subkhi Sulaiman, H. Seta, Noor Falih","doi":"10.1109/ICIMCIS53775.2021.9699133","DOIUrl":"https://doi.org/10.1109/ICIMCIS53775.2021.9699133","url":null,"abstract":"In late 2018, more than 50,000 network printers were exposed to a cyberattack that forced them to print spam messages. Were the spam message turned into a message for large-scale political activities, it can cause a major problem. Based on this, two problem arises, namely what is the impact of hacked printers. Can a hacked network printer inflict major damage on the surrounding? Secondly, whether a combination of a firewall with Suricata intrusion detection system (IDS) and intrusion prevention system (IPS) can prevent printer hacking. This research only discusses transmission control protocol (TCP) communication packets, access restriction using pfSense firewall along with Suricata, and printer model Canon imageRunner ADV-4025 as the test printer. The offered solution is to separate the network into two-part and put a firewall in between two networks, and configure the firewall along with Suricata so that the firewall can detect malicious packets. The output obtained is a system that can limit access and perform packet filters from computers on a different network to a printer, which can increase service availability, information confidentiality, and data integrity on printers.","PeriodicalId":250460,"journal":{"name":"2021 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132555979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
[Copyright notice] (版权)
{"title":"[Copyright notice]","authors":"","doi":"10.1109/icimcis53775.2021.9699242","DOIUrl":"https://doi.org/10.1109/icimcis53775.2021.9699242","url":null,"abstract":"","PeriodicalId":250460,"journal":{"name":"2021 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131925124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Content Characteristics of Government Social Media and The Impact on Citizen Engagement Rate 政府社交媒体内容特征及其对公民参与率的影响
Diah Henisa, Nori Wilantika
Social media has been used by the government for communication, socialization, and publication. However, it is still not being used to its maximum potential. This study aims to analyze citizen engagement on a government agency's social media accounts based on the number of likes, comments, and shares. In addition, this study examines how citizen engagement differs depending on the topic, media type, and upload time of the post on government social media accounts. Data was collected from Facebook, Twitter, and Instagram using scraping tools, namely Facepager, Twint, and Instaloader. The types of post topics are determined based on the results of topic modeling using the Latent Dirichlet Allocation (LDA) method. Using the Kruskal-Wallis test and Dunn's test, the post topic, the media type, and the post time has a significant influence on citizen engagement. Instagram got the highest engagement rate compared to Facebook and Twitter.
社会媒体已被政府用于沟通、社会化和出版。然而,它仍然没有得到最大限度的利用。这项研究旨在分析一个政府机构的社交媒体账户上的公民参与,基于点赞、评论和分享的数量。此外,本研究还考察了公民参与如何根据主题、媒体类型和政府社交媒体账户上帖子的上传时间而有所不同。数据是从Facebook、Twitter和Instagram上收集的,使用的是抓取工具,即Facepager、Twint和Instaloader。利用潜在狄利克雷分配(Latent Dirichlet Allocation, LDA)方法进行主题建模,根据结果确定帖子主题的类型。通过Kruskal-Wallis检验和Dunn检验发现,发文主题、媒体类型和发文时间对公民参与有显著影响。与Facebook和Twitter相比,Instagram的参与率最高。
{"title":"Content Characteristics of Government Social Media and The Impact on Citizen Engagement Rate","authors":"Diah Henisa, Nori Wilantika","doi":"10.1109/ICIMCIS53775.2021.9699299","DOIUrl":"https://doi.org/10.1109/ICIMCIS53775.2021.9699299","url":null,"abstract":"Social media has been used by the government for communication, socialization, and publication. However, it is still not being used to its maximum potential. This study aims to analyze citizen engagement on a government agency's social media accounts based on the number of likes, comments, and shares. In addition, this study examines how citizen engagement differs depending on the topic, media type, and upload time of the post on government social media accounts. Data was collected from Facebook, Twitter, and Instagram using scraping tools, namely Facepager, Twint, and Instaloader. The types of post topics are determined based on the results of topic modeling using the Latent Dirichlet Allocation (LDA) method. Using the Kruskal-Wallis test and Dunn's test, the post topic, the media type, and the post time has a significant influence on citizen engagement. Instagram got the highest engagement rate compared to Facebook and Twitter.","PeriodicalId":250460,"journal":{"name":"2021 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134510822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2021 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1