Pub Date : 2021-10-28DOI: 10.1109/ICIMCIS53775.2021.9699353
N. C. Harahap, P. W. Handayani, A. Hidayanto
A personal health record (PHR) is a type of health record maintained by patients. Integrated PHR is an ideal type of PHR that can empower patients to manage their health care and provide continuous connections between patients and their health providers. However, little is known about the adoption of integrated PHR in Indonesia. Thus, this study aims to discuss the challenges in the adoption of integrated PHR in Indonesia from the perspective of regulators as health policymakers in Indonesia. Data collection was conducted using semi-structured interviews with participants from the Ministry of Health and Social Health Insurance Administration Body (BPJS Kesehatan). This qualitative study identified nine challenges in the adoption of integrated PHR in Indonesia. Four challenges are related to technological issues, such as lack of interoperability, unequal distribution of infrastructure, security concerns, and system quality. Five challenges are related to people and organization, such as lack of IT human resources, health professionals' resistance to health information systems, top management support, strategic government plans, and policy changes.
{"title":"The Challenges in Integrated Personal Health Record Adoption in Indonesia: A Qualitative Analysis of Regulatory Perspectives","authors":"N. C. Harahap, P. W. Handayani, A. Hidayanto","doi":"10.1109/ICIMCIS53775.2021.9699353","DOIUrl":"https://doi.org/10.1109/ICIMCIS53775.2021.9699353","url":null,"abstract":"A personal health record (PHR) is a type of health record maintained by patients. Integrated PHR is an ideal type of PHR that can empower patients to manage their health care and provide continuous connections between patients and their health providers. However, little is known about the adoption of integrated PHR in Indonesia. Thus, this study aims to discuss the challenges in the adoption of integrated PHR in Indonesia from the perspective of regulators as health policymakers in Indonesia. Data collection was conducted using semi-structured interviews with participants from the Ministry of Health and Social Health Insurance Administration Body (BPJS Kesehatan). This qualitative study identified nine challenges in the adoption of integrated PHR in Indonesia. Four challenges are related to technological issues, such as lack of interoperability, unequal distribution of infrastructure, security concerns, and system quality. Five challenges are related to people and organization, such as lack of IT human resources, health professionals' resistance to health information systems, top management support, strategic government plans, and policy changes.","PeriodicalId":250460,"journal":{"name":"2021 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121641453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-10-28DOI: 10.1109/ICIMCIS53775.2021.9699147
Boby Siswanto, F. Gaol, B. Soewito, H. Warnars
Text mining is a data mining technique to find hidden things from a set of data in the form of text. One of the things that can be obtained with text mining is opinion or sentiment, whether it is positive or negative. Positive sentiment is used as a reference for a subject or object from a collection of texts to be recommended. Java Island is the city with the most population in Indonesia with a variety of culinary delights. This study aims to analyze sentiment recommendations on culinary data from food or cuisine in big cities on the island of Java. Four big cities were selected, namely Jakarta, Bandung, Yogyakarta, and Surabaya. The data source is a tweet of culinary arts of the four cities from Twitter in Indonesia. The Sastrawi Library is used as a text mining data processing tool in Indonesia. The results obtained are the majority of positive sentiments from all cities. The cumulative sentiment value of the four cities is 54%, meaning that the big cities on the island of Java have good culinary delights and deserve to be recommended to be enjoyed.
{"title":"Sentiment Analysis of Big Cities on The Island of Java in Indonesia from Twitter Data as A Recommender System","authors":"Boby Siswanto, F. Gaol, B. Soewito, H. Warnars","doi":"10.1109/ICIMCIS53775.2021.9699147","DOIUrl":"https://doi.org/10.1109/ICIMCIS53775.2021.9699147","url":null,"abstract":"Text mining is a data mining technique to find hidden things from a set of data in the form of text. One of the things that can be obtained with text mining is opinion or sentiment, whether it is positive or negative. Positive sentiment is used as a reference for a subject or object from a collection of texts to be recommended. Java Island is the city with the most population in Indonesia with a variety of culinary delights. This study aims to analyze sentiment recommendations on culinary data from food or cuisine in big cities on the island of Java. Four big cities were selected, namely Jakarta, Bandung, Yogyakarta, and Surabaya. The data source is a tweet of culinary arts of the four cities from Twitter in Indonesia. The Sastrawi Library is used as a text mining data processing tool in Indonesia. The results obtained are the majority of positive sentiments from all cities. The cumulative sentiment value of the four cities is 54%, meaning that the big cities on the island of Java have good culinary delights and deserve to be recommended to be enjoyed.","PeriodicalId":250460,"journal":{"name":"2021 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115165794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-10-28DOI: 10.1109/ICIMCIS53775.2021.9699177
P. Sari, P. W. Handayani, A. Hidayanto, R. F. Aji, S. Yazid
Inter-organization Information Technology (IT) relationships enhance the collaboration among organizations to deliver better healthcare services. This study aims to analyze information security practices and challenges for inter-organizational IT relationships in healthcare services from health regulator's perspective namely the National Health Insurance Agency (BPJS-K) who provides an inter-organization system to support the relationships. We use the qualitative research method with thematic coding as data analysis techniques. Data are collected using an online interview with three middle management in the IT division from BPJS-K. The results revealed some information security threats on inter-organizational systems. Even though BPJS-K has implemented some security measures to protect the systems, it must address some challenges to improve them. This study discusses some theoretical and practical contributions for inter-organizational information security.
{"title":"Challenges of Inter-organizational Information Security in Healthcare Services: Health Regulator's Perspective","authors":"P. Sari, P. W. Handayani, A. Hidayanto, R. F. Aji, S. Yazid","doi":"10.1109/ICIMCIS53775.2021.9699177","DOIUrl":"https://doi.org/10.1109/ICIMCIS53775.2021.9699177","url":null,"abstract":"Inter-organization Information Technology (IT) relationships enhance the collaboration among organizations to deliver better healthcare services. This study aims to analyze information security practices and challenges for inter-organizational IT relationships in healthcare services from health regulator's perspective namely the National Health Insurance Agency (BPJS-K) who provides an inter-organization system to support the relationships. We use the qualitative research method with thematic coding as data analysis techniques. Data are collected using an online interview with three middle management in the IT division from BPJS-K. The results revealed some information security threats on inter-organizational systems. Even though BPJS-K has implemented some security measures to protect the systems, it must address some challenges to improve them. This study discusses some theoretical and practical contributions for inter-organizational information security.","PeriodicalId":250460,"journal":{"name":"2021 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134241180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-10-28DOI: 10.1109/ICIMCIS53775.2021.9699351
Erly Krisnanik, Nadia Imawangi, H. N. Irmanda
Based on the results of monitoring through the covid19.go.id information channel managed by the Covid-19 Handling Task Force regarding the analysis of Covid-19 virus data as of July 18, 2021, there were 2,877,476 cumulative Covid-19 cases in Indonesia, of which 542.236 (18.8%) Among them were active cases, 2,261,658 (78.6%) were declared cured from being confirmed, and 73,582 (2.6%) died and were confirmed to have contracted Covid-19. The problems faced by the community today are still afraid to come to the hospital for an initial examination. Based on this, it is necessary to have a system application that can detect the level of risk of being exposed to Covid-19 for the community without having to come to the hospital. The research methodology used is agile software development using the sprint (the stages of the research carried out consisted of 3 sprints to produce a mobile-based SIMTEKDIN Covid 19 application). The results of this study are expected to help the public in knowing early the symptoms of Covid 19 disease. The contribution of this research is in the form of a mobile-based application of the Covid-19 Disease Early Detection Monitoring Information System (SIMTEKDIN).
{"title":"SIMTEKDIN of Covid-19 Using Forward Chaining Based on Android Mobile","authors":"Erly Krisnanik, Nadia Imawangi, H. N. Irmanda","doi":"10.1109/ICIMCIS53775.2021.9699351","DOIUrl":"https://doi.org/10.1109/ICIMCIS53775.2021.9699351","url":null,"abstract":"Based on the results of monitoring through the covid19.go.id information channel managed by the Covid-19 Handling Task Force regarding the analysis of Covid-19 virus data as of July 18, 2021, there were 2,877,476 cumulative Covid-19 cases in Indonesia, of which 542.236 (18.8%) Among them were active cases, 2,261,658 (78.6%) were declared cured from being confirmed, and 73,582 (2.6%) died and were confirmed to have contracted Covid-19. The problems faced by the community today are still afraid to come to the hospital for an initial examination. Based on this, it is necessary to have a system application that can detect the level of risk of being exposed to Covid-19 for the community without having to come to the hospital. The research methodology used is agile software development using the sprint (the stages of the research carried out consisted of 3 sprints to produce a mobile-based SIMTEKDIN Covid 19 application). The results of this study are expected to help the public in knowing early the symptoms of Covid 19 disease. The contribution of this research is in the form of a mobile-based application of the Covid-19 Disease Early Detection Monitoring Information System (SIMTEKDIN).","PeriodicalId":250460,"journal":{"name":"2021 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121876571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-10-28DOI: 10.1109/ICIMCIS53775.2021.9699193
J. Hussain, Vanlalruata Hnamte, Laldinsangi
This study aims to analyze the level of awareness of cybersecurity and crimes in Mizoram by focusing on various threats from the internet, Social Networking Sites (SNSs), and other communication or computer-oriented crime, in cyberspace along with their significant awareness. In modern technological years, cybercrime is a hot challenge in all areas and aspects including personal security, national security, and public safety. To prevent from being victimized, everyone needs to be informed about some sort of measures and about cybercrimes. A well-structured questionnaire was prepared for the survey as per the cases history recorded provided by the Mizoram police department. The results of this study are important recommendations and need to be carried out by various circles of the general public and specifically for Mizoram. While crime victims are mostly unaware of stranger behaviour to capture their information details, consequently the public awareness level on cybercrime is below average. This study presents a brief overview of all evolving crime, case studies, and the working approach to combat cybercrime in the Mizoram context.
{"title":"A Brief Study on Cybercrimes and Practices in Mizoram","authors":"J. Hussain, Vanlalruata Hnamte, Laldinsangi","doi":"10.1109/ICIMCIS53775.2021.9699193","DOIUrl":"https://doi.org/10.1109/ICIMCIS53775.2021.9699193","url":null,"abstract":"This study aims to analyze the level of awareness of cybersecurity and crimes in Mizoram by focusing on various threats from the internet, Social Networking Sites (SNSs), and other communication or computer-oriented crime, in cyberspace along with their significant awareness. In modern technological years, cybercrime is a hot challenge in all areas and aspects including personal security, national security, and public safety. To prevent from being victimized, everyone needs to be informed about some sort of measures and about cybercrimes. A well-structured questionnaire was prepared for the survey as per the cases history recorded provided by the Mizoram police department. The results of this study are important recommendations and need to be carried out by various circles of the general public and specifically for Mizoram. While crime victims are mostly unaware of stranger behaviour to capture their information details, consequently the public awareness level on cybercrime is below average. This study presents a brief overview of all evolving crime, case studies, and the working approach to combat cybercrime in the Mizoram context.","PeriodicalId":250460,"journal":{"name":"2021 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129830214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-10-28DOI: 10.1109/ICIMCIS53775.2021.9699327
Yasmin Amalia, P. W. Handayani, Ika Chandra Hapsari
This study aims to analyze the factors that influence someone to adopt transactional video on demand (TVOD) services. This study uses a quantitative approach involving 359 respondents through an online questionnaire. Then, the validation of quantitative results was carried out through interviews with five respondents. The data obtained in this study were processed and analyzed using the Covariance Based Structural Equation Model. The results showed that perceived ease of use, perceived usefulness, social value, and monetary value were factors that influenced the intention to use TVOD services, where these intentions affect the actual use of TVOD services in Indonesia.
{"title":"Actual Use of Transactional Video on Demand: The Extended of Technology Acceptance Model","authors":"Yasmin Amalia, P. W. Handayani, Ika Chandra Hapsari","doi":"10.1109/ICIMCIS53775.2021.9699327","DOIUrl":"https://doi.org/10.1109/ICIMCIS53775.2021.9699327","url":null,"abstract":"This study aims to analyze the factors that influence someone to adopt transactional video on demand (TVOD) services. This study uses a quantitative approach involving 359 respondents through an online questionnaire. Then, the validation of quantitative results was carried out through interviews with five respondents. The data obtained in this study were processed and analyzed using the Covariance Based Structural Equation Model. The results showed that perceived ease of use, perceived usefulness, social value, and monetary value were factors that influenced the intention to use TVOD services, where these intentions affect the actual use of TVOD services in Indonesia.","PeriodicalId":250460,"journal":{"name":"2021 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121092867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-10-28DOI: 10.1109/ICIMCIS53775.2021.9699341
Muhammad Mahreza Maulana, A. Suroso, Yani Nurhadryani, K. Seminar
Business licensing services are required to provide integrated services across government agencies. It can provide convenient public services for the community. To have quality and reliable information services with infrastructure that has adequate capacity and capability. This paper aims to address a recommendation to be implemented and support business licensing services. Having a proper enterprise system will increase service adoption, simplify the service integration process, manage and analyze data. It also needs to own appropriate infrastructure capacity and capability to handle the data and information security required by the government and citizens. By conducting activity to assess, select, add and create modeling of an enterprises system component that provides information technology solutions supporting government services, especially business licensing services. It includes high-level Enterprise Systems, service adoption solutions, service integration solutions, service data/information analysis solutions to support decision making, and adequate infrastructure solutions. The recommended enterprise system solutions are implementing CRM with BPM for service adoption, implementing API Gateway and ESB for service integration, implementing BIA technology for data processing, and implementing cloud and cybersecurity solutions for adequate infrastructure.
{"title":"Enterprise System Modeling for Business Licensing Services","authors":"Muhammad Mahreza Maulana, A. Suroso, Yani Nurhadryani, K. Seminar","doi":"10.1109/ICIMCIS53775.2021.9699341","DOIUrl":"https://doi.org/10.1109/ICIMCIS53775.2021.9699341","url":null,"abstract":"Business licensing services are required to provide integrated services across government agencies. It can provide convenient public services for the community. To have quality and reliable information services with infrastructure that has adequate capacity and capability. This paper aims to address a recommendation to be implemented and support business licensing services. Having a proper enterprise system will increase service adoption, simplify the service integration process, manage and analyze data. It also needs to own appropriate infrastructure capacity and capability to handle the data and information security required by the government and citizens. By conducting activity to assess, select, add and create modeling of an enterprises system component that provides information technology solutions supporting government services, especially business licensing services. It includes high-level Enterprise Systems, service adoption solutions, service integration solutions, service data/information analysis solutions to support decision making, and adequate infrastructure solutions. The recommended enterprise system solutions are implementing CRM with BPM for service adoption, implementing API Gateway and ESB for service integration, implementing BIA technology for data processing, and implementing cloud and cybersecurity solutions for adequate infrastructure.","PeriodicalId":250460,"journal":{"name":"2021 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127957972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-10-28DOI: 10.1109/ICIMCIS53775.2021.9699133
Fajar Subkhi Sulaiman, H. Seta, Noor Falih
In late 2018, more than 50,000 network printers were exposed to a cyberattack that forced them to print spam messages. Were the spam message turned into a message for large-scale political activities, it can cause a major problem. Based on this, two problem arises, namely what is the impact of hacked printers. Can a hacked network printer inflict major damage on the surrounding? Secondly, whether a combination of a firewall with Suricata intrusion detection system (IDS) and intrusion prevention system (IPS) can prevent printer hacking. This research only discusses transmission control protocol (TCP) communication packets, access restriction using pfSense firewall along with Suricata, and printer model Canon imageRunner ADV-4025 as the test printer. The offered solution is to separate the network into two-part and put a firewall in between two networks, and configure the firewall along with Suricata so that the firewall can detect malicious packets. The output obtained is a system that can limit access and perform packet filters from computers on a different network to a printer, which can increase service availability, information confidentiality, and data integrity on printers.
{"title":"Exploitation Prevention on Network Printer with Signature-Based Suricata on PfSense","authors":"Fajar Subkhi Sulaiman, H. Seta, Noor Falih","doi":"10.1109/ICIMCIS53775.2021.9699133","DOIUrl":"https://doi.org/10.1109/ICIMCIS53775.2021.9699133","url":null,"abstract":"In late 2018, more than 50,000 network printers were exposed to a cyberattack that forced them to print spam messages. Were the spam message turned into a message for large-scale political activities, it can cause a major problem. Based on this, two problem arises, namely what is the impact of hacked printers. Can a hacked network printer inflict major damage on the surrounding? Secondly, whether a combination of a firewall with Suricata intrusion detection system (IDS) and intrusion prevention system (IPS) can prevent printer hacking. This research only discusses transmission control protocol (TCP) communication packets, access restriction using pfSense firewall along with Suricata, and printer model Canon imageRunner ADV-4025 as the test printer. The offered solution is to separate the network into two-part and put a firewall in between two networks, and configure the firewall along with Suricata so that the firewall can detect malicious packets. The output obtained is a system that can limit access and perform packet filters from computers on a different network to a printer, which can increase service availability, information confidentiality, and data integrity on printers.","PeriodicalId":250460,"journal":{"name":"2021 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132555979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-10-28DOI: 10.1109/icimcis53775.2021.9699242
{"title":"[Copyright notice]","authors":"","doi":"10.1109/icimcis53775.2021.9699242","DOIUrl":"https://doi.org/10.1109/icimcis53775.2021.9699242","url":null,"abstract":"","PeriodicalId":250460,"journal":{"name":"2021 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131925124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-10-28DOI: 10.1109/ICIMCIS53775.2021.9699299
Diah Henisa, Nori Wilantika
Social media has been used by the government for communication, socialization, and publication. However, it is still not being used to its maximum potential. This study aims to analyze citizen engagement on a government agency's social media accounts based on the number of likes, comments, and shares. In addition, this study examines how citizen engagement differs depending on the topic, media type, and upload time of the post on government social media accounts. Data was collected from Facebook, Twitter, and Instagram using scraping tools, namely Facepager, Twint, and Instaloader. The types of post topics are determined based on the results of topic modeling using the Latent Dirichlet Allocation (LDA) method. Using the Kruskal-Wallis test and Dunn's test, the post topic, the media type, and the post time has a significant influence on citizen engagement. Instagram got the highest engagement rate compared to Facebook and Twitter.
{"title":"Content Characteristics of Government Social Media and The Impact on Citizen Engagement Rate","authors":"Diah Henisa, Nori Wilantika","doi":"10.1109/ICIMCIS53775.2021.9699299","DOIUrl":"https://doi.org/10.1109/ICIMCIS53775.2021.9699299","url":null,"abstract":"Social media has been used by the government for communication, socialization, and publication. However, it is still not being used to its maximum potential. This study aims to analyze citizen engagement on a government agency's social media accounts based on the number of likes, comments, and shares. In addition, this study examines how citizen engagement differs depending on the topic, media type, and upload time of the post on government social media accounts. Data was collected from Facebook, Twitter, and Instagram using scraping tools, namely Facepager, Twint, and Instaloader. The types of post topics are determined based on the results of topic modeling using the Latent Dirichlet Allocation (LDA) method. Using the Kruskal-Wallis test and Dunn's test, the post topic, the media type, and the post time has a significant influence on citizen engagement. Instagram got the highest engagement rate compared to Facebook and Twitter.","PeriodicalId":250460,"journal":{"name":"2021 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134510822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}