首页 > 最新文献

2021 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS最新文献

英文 中文
A Systematic Literature Review of Knowledge Sharing Practices in Academic Institutions 学术机构知识共享实践的系统文献综述
Mariana Purba, Ermatita Ermatita, Abdiansah Abdiansah, Vina Ayumi, Handrie Noprisson, Anita Ratnasari
Many knowledge-sharing activities take place in educational institutions, both formally and informally. If this activity is organized with good knowledge management, then this will support a faster knowledge sharing process to get quality and innovative ideas. This paper aims to obtain a summary of existing research, issues, and opportunities for further analysis on knowledge-sharing (KS) practices in academic institutions. The phases of the systematic literature review (SLR) method are described based on Kitchenham (2009) guideline. We found 21 articles, seven articles from IEEE, nine articles from Science Direct, and five articles from Springer. The collection of research data on knowledge sharing has been carried out in the United States, Australia, China, Cyprus, United Kingdom, Ghana, Hungary, Indonesia, Iran, Israel, Italy, Jordanian, Malaysia, and Saudi Arabia, with the most research locations being Malaysia (14%) and Saudi Arabia (19%). We also attempted to identify the research topic trend of knowledge sharing research in academic institutions. We found two types of research trends of knowledge sharing research in university, including factor analysis and architecture development. Of the two categories of research trends, 76% discussed factor analysis, and 24% discussed architectural development. We also identified six methods in KS research including Partial Least Square Structure Equation Modeling (PLS-SEM), questionnaire, data triangulation, focus groups discussion, observation and interview. Moreover, the most used method in related research is questionnaire, because it is a relatively inexpensive, fast and efficient way of collecting large amounts of information.
许多知识分享活动在教育机构中进行,有正式的,也有非正式的。如果这个活动是在良好的知识管理下组织起来的,那么这将支持一个更快的知识共享过程,以获得高质量和创新的想法。本文旨在总结现有的研究,问题和机会,以进一步分析学术机构的知识共享(KS)实践。基于Kitchenham(2009)的指南,描述了系统文献综述(SLR)方法的各个阶段。我们找到了21篇文章,其中7篇来自IEEE, 9篇来自Science Direct, 5篇来自Springer。在美国、澳大利亚、中国、塞浦路斯、英国、加纳、匈牙利、印度尼西亚、伊朗、以色列、意大利、约旦、马来西亚和沙特阿拉伯进行了关于知识共享的研究数据收集,其中研究地点最多的是马来西亚(14%)和沙特阿拉伯(19%)。我们还试图识别学术机构知识共享研究的研究主题趋势。我们发现了大学知识共享研究的两种研究趋势:因子分析和架构开发。在两类研究趋势中,76%讨论了因素分析,24%讨论了架构开发。我们还确定了六种研究KS的方法,包括偏最小二乘结构方程模型(PLS-SEM)、问卷调查、数据三角测量、焦点小组讨论、观察和访谈。此外,在相关研究中使用最多的方法是问卷调查,因为它是一种相对便宜,快速和有效的收集大量信息的方法。
{"title":"A Systematic Literature Review of Knowledge Sharing Practices in Academic Institutions","authors":"Mariana Purba, Ermatita Ermatita, Abdiansah Abdiansah, Vina Ayumi, Handrie Noprisson, Anita Ratnasari","doi":"10.1109/ICIMCIS53775.2021.9699350","DOIUrl":"https://doi.org/10.1109/ICIMCIS53775.2021.9699350","url":null,"abstract":"Many knowledge-sharing activities take place in educational institutions, both formally and informally. If this activity is organized with good knowledge management, then this will support a faster knowledge sharing process to get quality and innovative ideas. This paper aims to obtain a summary of existing research, issues, and opportunities for further analysis on knowledge-sharing (KS) practices in academic institutions. The phases of the systematic literature review (SLR) method are described based on Kitchenham (2009) guideline. We found 21 articles, seven articles from IEEE, nine articles from Science Direct, and five articles from Springer. The collection of research data on knowledge sharing has been carried out in the United States, Australia, China, Cyprus, United Kingdom, Ghana, Hungary, Indonesia, Iran, Israel, Italy, Jordanian, Malaysia, and Saudi Arabia, with the most research locations being Malaysia (14%) and Saudi Arabia (19%). We also attempted to identify the research topic trend of knowledge sharing research in academic institutions. We found two types of research trends of knowledge sharing research in university, including factor analysis and architecture development. Of the two categories of research trends, 76% discussed factor analysis, and 24% discussed architectural development. We also identified six methods in KS research including Partial Least Square Structure Equation Modeling (PLS-SEM), questionnaire, data triangulation, focus groups discussion, observation and interview. Moreover, the most used method in related research is questionnaire, because it is a relatively inexpensive, fast and efficient way of collecting large amounts of information.","PeriodicalId":250460,"journal":{"name":"2021 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127378663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Building Indonesian Music Dataset: Collection and Analysis 建立印尼音乐数据集:收集与分析
M. O. Pratama, Pamela Kareen, Ermatita
We introduce The Indonesian Music Dataset (IMD), a collection of audio features and text lyrics features for thousand Indonesian popular songs which has been developed for automatic music era classification and other classification tasks. Dataset collection consists of audio features represented by Spectrogram, Chroma Feature and Low-level audio features. The dataset also consists of lyric features in order to support multimodal tasks. Dataset is equipped with eras (year of publication) labels starting from '70 until the current era, mood labels from Valence-Arousal (Anger, Sadness, Happiness and Relax), and genre labels (Rock, Pop, Jazz). In this paper, we also present era, mood and genre prediction as an example of a dataset experiment for each modality (audio features and text lyrics features) that shows positive results using benchmarking models.
我们介绍印度尼西亚音乐数据集(IMD),这是一个收集了数千首印度尼西亚流行歌曲的音频特征和文本歌词特征的集合,用于自动音乐时代分类和其他分类任务。数据集包括由谱图、色度特征和低级音频特征表示的音频特征。为了支持多模态任务,数据集还包含歌词特征。数据集配备了从1970年到当前时代的时代(出版年份)标签,从Valence-Arousal(愤怒,悲伤,快乐和放松)的情绪标签和流派标签(Rock, Pop, Jazz)。在本文中,我们还将时代,情绪和类型预测作为每个情态(音频特征和文本歌词特征)的数据集实验的示例,使用基准模型显示出积极的结果。
{"title":"Building Indonesian Music Dataset: Collection and Analysis","authors":"M. O. Pratama, Pamela Kareen, Ermatita","doi":"10.1109/ICIMCIS53775.2021.9699332","DOIUrl":"https://doi.org/10.1109/ICIMCIS53775.2021.9699332","url":null,"abstract":"We introduce The Indonesian Music Dataset (IMD), a collection of audio features and text lyrics features for thousand Indonesian popular songs which has been developed for automatic music era classification and other classification tasks. Dataset collection consists of audio features represented by Spectrogram, Chroma Feature and Low-level audio features. The dataset also consists of lyric features in order to support multimodal tasks. Dataset is equipped with eras (year of publication) labels starting from '70 until the current era, mood labels from Valence-Arousal (Anger, Sadness, Happiness and Relax), and genre labels (Rock, Pop, Jazz). In this paper, we also present era, mood and genre prediction as an example of a dataset experiment for each modality (audio features and text lyrics features) that shows positive results using benchmarking models.","PeriodicalId":250460,"journal":{"name":"2021 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125797512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Face Recognition Using Convolutional Neural Network Architectures on Mask-Occluded Face Images 基于卷积神经网络架构的掩模遮挡人脸识别
Muhammad Alif Raihan, Jayanta, M. M. Santoni
In epidemic situations such as the novel coronavirus disease (COVID-19) pandemic that spreads through physical contact, security and presence systems that previously used fingerprints-based or were contact-based are no longer safe for users. Compared to other popular biometrics such as fingerprints, irises, palms, and veins, the face has much better potential to recognize identity in a nonintrusive manner. Therefore, this study will employ two convolutional neural network (CNN) architectures, LeNet-5 and MobileNetV2, for face recognition on mask-occluded face images. Data were taken from 12 subjects face-to-face were preprocessed by cropping, artificial mask augmentation, resizing, and image augmentation. The model was trained with the configured hyperparameter for 50 epochs with a 60:40 data split. Model testing was performed using image data without augmentation wearing a mask. The test results are measured with classification accuracy for 12 classes. The highest testing accuracy on LeNet-5 models is 98.15%, with $64times 64$ input size and 64 batch size. Meanwhile, the highest testing accuracy for MobileNetV2 is 97.22% with input size $96times 96$, batch size 16, and the weight of the MobileNetV2 model initialized with ImageNet $96times 96$.
在新型冠状病毒病(COVID-19)大流行等通过身体接触传播的疫情中,以前使用基于指纹或基于接触的安全和存在系统对用户不再安全。与指纹、虹膜、手掌和静脉等其他流行的生物识别技术相比,面部识别在非侵入性方式下具有更好的识别身份的潜力。因此,本研究将采用LeNet-5和MobileNetV2两种卷积神经网络(CNN)架构对被掩模遮挡的人脸图像进行人脸识别。采集12名受试者的面对面数据,通过裁剪、人工掩模增强、调整大小和图像增强等方法进行预处理。该模型使用配置的超参数进行了50个epoch的训练,数据分割为60:40。使用不带增强的图像数据进行模型测试。测试结果对12个类别的分类精度进行了测量。LeNet-5模型的最高测试精度为98.15%,输入大小为64美元× 64美元,批量大小为64美元。同时,当输入大小为$96 × 96$,批量大小为16,使用ImageNet $96 × 96$初始化MobileNetV2模型的权重时,MobileNetV2的最高测试准确率为97.22%。
{"title":"Face Recognition Using Convolutional Neural Network Architectures on Mask-Occluded Face Images","authors":"Muhammad Alif Raihan, Jayanta, M. M. Santoni","doi":"10.1109/ICIMCIS53775.2021.9699239","DOIUrl":"https://doi.org/10.1109/ICIMCIS53775.2021.9699239","url":null,"abstract":"In epidemic situations such as the novel coronavirus disease (COVID-19) pandemic that spreads through physical contact, security and presence systems that previously used fingerprints-based or were contact-based are no longer safe for users. Compared to other popular biometrics such as fingerprints, irises, palms, and veins, the face has much better potential to recognize identity in a nonintrusive manner. Therefore, this study will employ two convolutional neural network (CNN) architectures, LeNet-5 and MobileNetV2, for face recognition on mask-occluded face images. Data were taken from 12 subjects face-to-face were preprocessed by cropping, artificial mask augmentation, resizing, and image augmentation. The model was trained with the configured hyperparameter for 50 epochs with a 60:40 data split. Model testing was performed using image data without augmentation wearing a mask. The test results are measured with classification accuracy for 12 classes. The highest testing accuracy on LeNet-5 models is 98.15%, with $64times 64$ input size and 64 batch size. Meanwhile, the highest testing accuracy for MobileNetV2 is 97.22% with input size $96times 96$, batch size 16, and the weight of the MobileNetV2 model initialized with ImageNet $96times 96$.","PeriodicalId":250460,"journal":{"name":"2021 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123783282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Acceptance of Pay Later Payment Usage on Business-To-Consumer Online Marketplace in Indonesia 印尼企业对消费者在线市场对后期支付的接受情况
Salsabila Maurizka, P. W. Handayani, A. Pinem
Pay Later is a new payment method that allows consumers to buy products using installments with a certain deadline. Pay Later have been adopted by various online marketplaces and increased during the COVID-19. This study aims to seek light on Pay Later payment method adoption on business-to-consumer (B2C) online marketplace in Indonesia using the modification of the Technology Acceptance Model (TAM). This study uses the Partial Least Square Structural Equation Modelling (PLS-SEM) analysis method with the help of SmartPLS 3.0 and a survey filled out by 1,141 respondents. The results showed that perceived usefulness, perceived ease of use, social influence, lifestyle compatibility, consumer trust, perceived risk, and debt attitude influence the users' intention to adopt/use Pay Later, and the intention is proven to influence the actual use of Pay Later in B2C online marketplace in Indonesia.
延期付款是一种新的付款方式,允许消费者在一定期限内分期付款购买产品。Pay Later已被各种在线市场采用,并在COVID-19期间有所增加。本研究旨在通过对技术接受模型(TAM)的修改,在印度尼西亚的企业对消费者(B2C)在线市场上寻求对Pay Later支付方式采用的启示。本研究采用偏最小二乘结构方程建模(PLS-SEM)分析方法,借助SmartPLS 3.0和1141名受访者填写的调查问卷。结果表明,感知有用性、感知易用性、社会影响力、生活方式兼容性、消费者信任、感知风险和债务态度影响了用户采用/使用Pay Later的意愿,并且这种意愿被证明影响了印度尼西亚B2C在线市场中Pay Later的实际使用。
{"title":"The Acceptance of Pay Later Payment Usage on Business-To-Consumer Online Marketplace in Indonesia","authors":"Salsabila Maurizka, P. W. Handayani, A. Pinem","doi":"10.1109/ICIMCIS53775.2021.9699127","DOIUrl":"https://doi.org/10.1109/ICIMCIS53775.2021.9699127","url":null,"abstract":"Pay Later is a new payment method that allows consumers to buy products using installments with a certain deadline. Pay Later have been adopted by various online marketplaces and increased during the COVID-19. This study aims to seek light on Pay Later payment method adoption on business-to-consumer (B2C) online marketplace in Indonesia using the modification of the Technology Acceptance Model (TAM). This study uses the Partial Least Square Structural Equation Modelling (PLS-SEM) analysis method with the help of SmartPLS 3.0 and a survey filled out by 1,141 respondents. The results showed that perceived usefulness, perceived ease of use, social influence, lifestyle compatibility, consumer trust, perceived risk, and debt attitude influence the users' intention to adopt/use Pay Later, and the intention is proven to influence the actual use of Pay Later in B2C online marketplace in Indonesia.","PeriodicalId":250460,"journal":{"name":"2021 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121911192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Business Intelligence and Analytics in Dairy Goat Livestock: Current and Future Challenge 商业智能和分析在奶山羊家畜:当前和未来的挑战
A. Primawati, I. S. Sitanggang, Annisa, D. Astuti
Business Intelligence and Analytics (BIA) has been widely used and developed in various business fields. The main goal is to make decisions quickly based on recommendations from analysis and business predictions in the present and the future. Dairy goat livestock in Indonesia has the potential to be developed which aims to support Precision Livestock Farming (PLF) in Indonesia because goat livestock is one of the businesses that contributes to food security such as milk but has not received important attention compared to cattle livestock in Indonesia. However, the availability of information provided by Statistics Indonesia is still limited so that the role of BIA is needed. This paper presents the development of BIA on dairy goat livestock. The method used in this study is a critical literature study of relevant BIA research to identify problems based on data on the potential and condition of BIA in dairy goats in Indonesia to map solutions and challenges in the future. At the conclusion of this study, recommendations are made to apply the BIA solution to the problem of dairy goats livestock.
商业智能与分析(BIA)在各个商业领域得到了广泛的应用和发展。主要目标是根据现在和未来的分析建议和业务预测快速做出决策。印度尼西亚的奶山羊畜牧业具有发展潜力,其目的是支持印度尼西亚的精确畜牧业(PLF),因为山羊畜牧业是为牛奶等粮食安全做出贡献的行业之一,但与印度尼西亚的牛相比,没有得到重视。但是,印度尼西亚统计局提供的信息仍然有限,因此需要BIA的作用。本文介绍了BIA在奶山羊上的研究进展。本研究使用的方法是对相关BIA研究的重要文献研究,以印度尼西亚奶山羊BIA的潜力和状况为基础,找出问题,并制定未来的解决方案和挑战。在本研究的结论中,建议将BIA解决方案应用于奶山羊家畜问题。
{"title":"Business Intelligence and Analytics in Dairy Goat Livestock: Current and Future Challenge","authors":"A. Primawati, I. S. Sitanggang, Annisa, D. Astuti","doi":"10.1109/ICIMCIS53775.2021.9699336","DOIUrl":"https://doi.org/10.1109/ICIMCIS53775.2021.9699336","url":null,"abstract":"Business Intelligence and Analytics (BIA) has been widely used and developed in various business fields. The main goal is to make decisions quickly based on recommendations from analysis and business predictions in the present and the future. Dairy goat livestock in Indonesia has the potential to be developed which aims to support Precision Livestock Farming (PLF) in Indonesia because goat livestock is one of the businesses that contributes to food security such as milk but has not received important attention compared to cattle livestock in Indonesia. However, the availability of information provided by Statistics Indonesia is still limited so that the role of BIA is needed. This paper presents the development of BIA on dairy goat livestock. The method used in this study is a critical literature study of relevant BIA research to identify problems based on data on the potential and condition of BIA in dairy goats in Indonesia to map solutions and challenges in the future. At the conclusion of this study, recommendations are made to apply the BIA solution to the problem of dairy goats livestock.","PeriodicalId":250460,"journal":{"name":"2021 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126498604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber-Risk Management Planning Using NIST CSF v1.1, NIST SP 800-53 Rev. 5, and CIS Controls v8 使用NIST CSF v1.1、NIST SP 800-53 Rev. 5和CIS Controls v8进行网络风险管理规划
A. Amiruddin, Hafizh Ghozie Afiansyah, Hernowo Adi Nugroho
With the use of information systems as a means for supporting the success of missions and objectives of organizations increased, the protection towards assets against cyber risks needs to be considered and paid more attention. Cyber-risk management planning can be carried out as a means or approach to protect assets from the risks of cyber-attacks. As a supporting unit in XYZ, the IT Unit has the responsibility to manage the information systems, information technology, and their infrastructure and services within the XYZ system. However, the IT Unit has never conducted a cybersecurity evaluation so it does not yet have a plan for cybersecurity risk management. In this study, we tailored a cyber-risk plan for the IT Unit of XYZ using NIST CSF as the main framework and CIS Controls v8 and NIST SP 800-53 Rev 5 for defining controls and action recommendations. As the results, we found 42 risk scenarios in the IT Unit in which 12 are accepted and 30 are mitigated. There are 14 actions recommendation for the IT Unit to reach tier 3 based on 18 controls of CIS and 20 controls of NIST SP 800-53 rev 5 that can be applied to control the current cyber-risk.
随着信息系统作为支持组织任务和目标成功的一种手段的使用增加,需要考虑和更多地关注对网络风险资产的保护。网络风险管理规划可以作为一种手段或方法来保护资产免受网络攻击的风险。作为XYZ中的支持单位,IT单位有责任管理信息系统、信息技术,以及它们在XYZ系统中的基础设施和服务。然而,IT部门从未进行过网络安全评估,因此尚未制定网络安全风险管理计划。在这项研究中,我们使用NIST CSF作为主要框架,并使用CIS Controls v8和NIST SP 800-53 Rev 5来定义控制和行动建议,为XYZ的IT部门量身定制了网络风险计划。结果,我们在IT单元中发现了42个风险场景,其中12个被接受,30个被缓解。基于CIS的18项控制措施和NIST SP 800-53 rev 5的20项控制措施,有14项行动建议IT部门达到第3层,可用于控制当前的网络风险。
{"title":"Cyber-Risk Management Planning Using NIST CSF v1.1, NIST SP 800-53 Rev. 5, and CIS Controls v8","authors":"A. Amiruddin, Hafizh Ghozie Afiansyah, Hernowo Adi Nugroho","doi":"10.1109/ICIMCIS53775.2021.9699337","DOIUrl":"https://doi.org/10.1109/ICIMCIS53775.2021.9699337","url":null,"abstract":"With the use of information systems as a means for supporting the success of missions and objectives of organizations increased, the protection towards assets against cyber risks needs to be considered and paid more attention. Cyber-risk management planning can be carried out as a means or approach to protect assets from the risks of cyber-attacks. As a supporting unit in XYZ, the IT Unit has the responsibility to manage the information systems, information technology, and their infrastructure and services within the XYZ system. However, the IT Unit has never conducted a cybersecurity evaluation so it does not yet have a plan for cybersecurity risk management. In this study, we tailored a cyber-risk plan for the IT Unit of XYZ using NIST CSF as the main framework and CIS Controls v8 and NIST SP 800-53 Rev 5 for defining controls and action recommendations. As the results, we found 42 risk scenarios in the IT Unit in which 12 are accepted and 30 are mitigated. There are 14 actions recommendation for the IT Unit to reach tier 3 based on 18 controls of CIS and 20 controls of NIST SP 800-53 rev 5 that can be applied to control the current cyber-risk.","PeriodicalId":250460,"journal":{"name":"2021 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130393959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Inter-Organizational Data Sharing: What Issues Should Be Considered? 组织间数据共享:应该考虑哪些问题?
Dewi Puspasari, Ahmad Nizar Hadiyanto, Suryana Setiawan
Currently, data sharing activities between agencies have been done in many ways. This provides benefits but behind it there are also threats. Therefore, we explore what needs to be considered in sharing current data based on previously published research results. This research was conducted with a systematic literature review approach to 34 articles entered in the Scopus electronic database in 2017–2021. From the results of this study, we then propose six domains that need to be considered when sharing data, namely Security; access control; data privacy; confidentiality, integrity, and availability of data; compliance and trust; also data audit capabilities.
目前,各机构之间的数据共享活动以多种方式进行。这带来了好处,但背后也存在威胁。因此,我们根据之前发表的研究成果,探讨在共享当前数据时需要考虑的问题。本研究采用系统文献综述的方法,对2017-2021年Scopus电子数据库收录的34篇文章进行分析。根据本研究的结果,我们提出了共享数据时需要考虑的六个领域,即安全性;访问控制;数据隐私;数据的保密性、完整性和可用性;遵守和信任;还有数据审计功能。
{"title":"Inter-Organizational Data Sharing: What Issues Should Be Considered?","authors":"Dewi Puspasari, Ahmad Nizar Hadiyanto, Suryana Setiawan","doi":"10.1109/ICIMCIS53775.2021.9699333","DOIUrl":"https://doi.org/10.1109/ICIMCIS53775.2021.9699333","url":null,"abstract":"Currently, data sharing activities between agencies have been done in many ways. This provides benefits but behind it there are also threats. Therefore, we explore what needs to be considered in sharing current data based on previously published research results. This research was conducted with a systematic literature review approach to 34 articles entered in the Scopus electronic database in 2017–2021. From the results of this study, we then propose six domains that need to be considered when sharing data, namely Security; access control; data privacy; confidentiality, integrity, and availability of data; compliance and trust; also data audit capabilities.","PeriodicalId":250460,"journal":{"name":"2021 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132100403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
One Data ASN Framework (ODAF) for Indonesian State Civil Apparatus 印度尼西亚国家民用机器的一个数据ASN框架(ODAF)
Elin Cahyaningsih, Natascha Lestari Eunike Silalahi, Handrie Noprisson, Vina Ayumi
Data management and governance framework purpose to support data life cycle and ensure the consistency within an organizational function in terms of framework implementation to achieve organizational objectives. Data accuracy, integrity, interoperability, and quality become a challenge that occurs in One Data State Civil Apparatus (ASN) implementation. Therefore, it is needed to define a suitable framework for ASN data management and governance. This research conducted identify strategic issues and current problems, literature review and previous study to determine the theoretical framework, evaluation the theoretical framework, hybrid, and synthesis framework to define the suitable component, and validation the proposed framework by expert judgment. The One Data ASN Framework (ODAF) consists of eight components there are regulation/policy, vision, mission, goals, principles, committee, type, standard, metadata, data organizing, data dissemination, coaching, monitoring, and evaluation.
数据管理和治理框架旨在支持数据生命周期,并在框架实现方面确保组织功能的一致性,以实现组织目标。数据的准确性、完整性、互操作性和质量成为单一数据状态民用设备(ASN)实施中的一个挑战。因此,需要为ASN数据管理和治理定义一个合适的框架。本研究通过识别战略问题和当前问题、文献综述和前人研究确定理论框架、评价理论框架、混合框架和综合框架来确定合适的组成部分,并通过专家判断对提出的框架进行验证。一个数据ASN框架(ODAF)由八个组成部分组成:法规/政策、愿景、使命、目标、原则、委员会、类型、标准、元数据、数据组织、数据传播、指导、监控和评估。
{"title":"One Data ASN Framework (ODAF) for Indonesian State Civil Apparatus","authors":"Elin Cahyaningsih, Natascha Lestari Eunike Silalahi, Handrie Noprisson, Vina Ayumi","doi":"10.1109/ICIMCIS53775.2021.9699290","DOIUrl":"https://doi.org/10.1109/ICIMCIS53775.2021.9699290","url":null,"abstract":"Data management and governance framework purpose to support data life cycle and ensure the consistency within an organizational function in terms of framework implementation to achieve organizational objectives. Data accuracy, integrity, interoperability, and quality become a challenge that occurs in One Data State Civil Apparatus (ASN) implementation. Therefore, it is needed to define a suitable framework for ASN data management and governance. This research conducted identify strategic issues and current problems, literature review and previous study to determine the theoretical framework, evaluation the theoretical framework, hybrid, and synthesis framework to define the suitable component, and validation the proposed framework by expert judgment. The One Data ASN Framework (ODAF) consists of eight components there are regulation/policy, vision, mission, goals, principles, committee, type, standard, metadata, data organizing, data dissemination, coaching, monitoring, and evaluation.","PeriodicalId":250460,"journal":{"name":"2021 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114983963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Conformity Analysis of HTTP Strict Transport Security (HSTS) Configuration and Implementation Using Bettercap Tools 基于Bettercap工具的HTTP严格传输安全(HSTS)配置与实现符合性分析
A. Amiruddin, Daffa Akbar Putra Yusa, Rizky Ainur Rofiq
Currently, HTTPS is commonly used because it offers more protection when compared to HTTP. However, it does not rule out the possibility of attacks being carried out against HTTPS. One of the features that can improve HTTPS security is configuring HTTP strict transport security (HSTS). Unfortunately, not all HSTS is successfully configured and implemented correctly due to administrator ignorance. The purpose of this study is to provide an overview of what configurations need to be done to run HSTS properly to increase the functionality of existing features and improve security. Configuration conformity testing is done using three parameters, i.e., max-age, includeSubDomains, and preload. The attack attempts carried out in this exploratory study used Bettercap, which allows multiple types of attacks to be carried out simultaneously. The results obtained from this study include a list of parameters that need to be met as a condition of an adequately configured HSTS on a website, such as the max-age value, which has a minimum value of 31536000.
目前,HTTPS被广泛使用,因为与HTTP相比,它提供了更多的保护。然而,这并不排除针对HTTPS进行攻击的可能性。可以提高HTTPS安全性的特性之一是配置HTTP严格传输安全(HSTS)。不幸的是,由于管理员的疏忽,并非所有HSTS都能成功配置和正确实现。本研究的目的是概述需要进行哪些配置才能正确运行HSTS,以增加现有特性的功能并提高安全性。配置一致性测试是使用三个参数完成的,即max-age、inclesubdomains和preload。在本探索性研究中进行的攻击尝试使用了Bettercap,它允许同时进行多种类型的攻击。本研究得到的结果包括一个网站上充分配置HSTS所需满足的参数列表,如max-age值,其最小值为31536000。
{"title":"Conformity Analysis of HTTP Strict Transport Security (HSTS) Configuration and Implementation Using Bettercap Tools","authors":"A. Amiruddin, Daffa Akbar Putra Yusa, Rizky Ainur Rofiq","doi":"10.1109/ICIMCIS53775.2021.9699358","DOIUrl":"https://doi.org/10.1109/ICIMCIS53775.2021.9699358","url":null,"abstract":"Currently, HTTPS is commonly used because it offers more protection when compared to HTTP. However, it does not rule out the possibility of attacks being carried out against HTTPS. One of the features that can improve HTTPS security is configuring HTTP strict transport security (HSTS). Unfortunately, not all HSTS is successfully configured and implemented correctly due to administrator ignorance. The purpose of this study is to provide an overview of what configurations need to be done to run HSTS properly to increase the functionality of existing features and improve security. Configuration conformity testing is done using three parameters, i.e., max-age, includeSubDomains, and preload. The attack attempts carried out in this exploratory study used Bettercap, which allows multiple types of attacks to be carried out simultaneously. The results obtained from this study include a list of parameters that need to be met as a condition of an adequately configured HSTS on a website, such as the max-age value, which has a minimum value of 31536000.","PeriodicalId":250460,"journal":{"name":"2021 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131838317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Challenges and Solution Recommendation in Large-Scale Agile Implementation: A Systematic Literature Review 大规模敏捷实施中的挑战和解决方案建议:系统的文献综述
Dika Swadani Ekasari, T. Raharjo, Adi Prasetyo
In the recent years, Agile methods have been widely-used in large organization to improve their performance. Since these methods initially designed for small projects and co-located teams, organization faces many challenges when implementing them in large-scale. During the past few years, challenges in implementing Large-Scale Agile have become a popular research topic. However, studies exploring the challenges in large scale Agile development along with best practices solutions through secondary studies is still scarce. This study aims to fill this gap by conducting Systematic Literature Review to identify various challenges as well as the proposed practices and solution to deal with them. A total of 12 papers, the results of SLR process, were analysed. This study identified 28 challenges classified in six categories. The biggest challenge arises from communication and collaboration category, which includes challenges related to team coordination, managing autonomous team, uneven team maturity, and distributed team. The solution of each challenge obtained from related studies and best practices.
近年来,敏捷方法在大型组织中得到了广泛的应用,以提高其绩效。由于这些方法最初是为小型项目和位于同一地点的团队设计的,因此在大规模实现它们时,组织面临许多挑战。在过去的几年里,实现大规模敏捷的挑战已经成为一个热门的研究话题。然而,通过二次研究探索大规模敏捷开发中的挑战以及最佳实践解决方案的研究仍然很少。本研究旨在通过系统的文献综述来填补这一空白,找出各种挑战,并提出应对这些挑战的做法和解决方案。对12篇单反工艺的研究结果进行了分析。这项研究确定了28项挑战,分为6类。最大的挑战来自沟通和协作类别,其中包括与团队协调、管理自治团队、不平衡团队成熟度和分布式团队相关的挑战。从相关研究和最佳实践中获得的每个挑战的解决方案。
{"title":"Challenges and Solution Recommendation in Large-Scale Agile Implementation: A Systematic Literature Review","authors":"Dika Swadani Ekasari, T. Raharjo, Adi Prasetyo","doi":"10.1109/ICIMCIS53775.2021.9699312","DOIUrl":"https://doi.org/10.1109/ICIMCIS53775.2021.9699312","url":null,"abstract":"In the recent years, Agile methods have been widely-used in large organization to improve their performance. Since these methods initially designed for small projects and co-located teams, organization faces many challenges when implementing them in large-scale. During the past few years, challenges in implementing Large-Scale Agile have become a popular research topic. However, studies exploring the challenges in large scale Agile development along with best practices solutions through secondary studies is still scarce. This study aims to fill this gap by conducting Systematic Literature Review to identify various challenges as well as the proposed practices and solution to deal with them. A total of 12 papers, the results of SLR process, were analysed. This study identified 28 challenges classified in six categories. The biggest challenge arises from communication and collaboration category, which includes challenges related to team coordination, managing autonomous team, uneven team maturity, and distributed team. The solution of each challenge obtained from related studies and best practices.","PeriodicalId":250460,"journal":{"name":"2021 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130323459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2021 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1