Ema Utami, A. Iskandar, Wahyu Hidayat, Agung Budi Prasetyo, A. D. Hartanto
Social media has become a communication key to spark thinking, dialogue and action around social issues. Hoax is information that added or subtracted from the content of the actual news. The spread of unconfirmed Covid-19 news can cause public concern. The purpose of this research was to modify KNN with Jaccard Space in the classification of hoax news related to Covid-19. The data used from Jabar Saber Hoaks and Jala Hoaks. The classification results with KNN with Jaccard Space and stemming Nazief & Adriani get the highest accuracy than other models in this research. The accuracy of the KNN model on the Jaccard Space with stemming Nazief & Adriani and K = 5 was 75.89%, while for Naïve Bayes was 65.18%.
{"title":"Covid-19 Hoax Detection Using KNN in Jaccard Space","authors":"Ema Utami, A. Iskandar, Wahyu Hidayat, Agung Budi Prasetyo, A. D. Hartanto","doi":"10.22146/IJCCS.67392","DOIUrl":"https://doi.org/10.22146/IJCCS.67392","url":null,"abstract":"Social media has become a communication key to spark thinking, dialogue and action around social issues. Hoax is information that added or subtracted from the content of the actual news. The spread of unconfirmed Covid-19 news can cause public concern. The purpose of this research was to modify KNN with Jaccard Space in the classification of hoax news related to Covid-19. The data used from Jabar Saber Hoaks and Jala Hoaks. The classification results with KNN with Jaccard Space and stemming Nazief & Adriani get the highest accuracy than other models in this research. The accuracy of the KNN model on the Jaccard Space with stemming Nazief & Adriani and K = 5 was 75.89%, while for Naïve Bayes was 65.18%.","PeriodicalId":31625,"journal":{"name":"IJCCS Indonesian Journal of Computing and Cybernetics Systems","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44335248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Laptop is a desktop personal computer (PC) whose dimensions are reduced to increase flexibility in its use. However, the large number of products will make it difficult for consumers to choose a laptop that suits the needs of consumers who want to buy it.The purpose of this research is to help buyers who want to buy laptop products according to their needs by making a Decision Support System (DSS). There are 12 criteria considered in this research, price, processor, RAM capacity, hard disk capacity, SSD capacity, V-RAM capacity, maximum RAM upgrade capacity, laptop weight, screen size, screen type, screen refresh rate, and screen resolution. Choosing a laptop product there is a criterion value of a laptop product and a value of preference criteria from the buyer as a decision maker. Also the criteria values on laptop products have different contributions to the overall value of the laptop product. Thus, the methods used are Analytical Hierarchy Process (AHP), Profile Matching (PM) with linear interpolation, and Simple Addictive Weighting (SAW) to determine the recommended options. Lastly, SPK that has been made will be able to provide recommendations best alternative choices and best suit the needs of buyers for selecting laptop products.
{"title":"Decision Support System for Laptop Selection Using AHP Method and Profile Matching","authors":"Muhammad Mukharir, Retantyo Wardoyo","doi":"10.22146/IJCCS.67811","DOIUrl":"https://doi.org/10.22146/IJCCS.67811","url":null,"abstract":" Laptop is a desktop personal computer (PC) whose dimensions are reduced to increase flexibility in its use. However, the large number of products will make it difficult for consumers to choose a laptop that suits the needs of consumers who want to buy it.The purpose of this research is to help buyers who want to buy laptop products according to their needs by making a Decision Support System (DSS). There are 12 criteria considered in this research, price, processor, RAM capacity, hard disk capacity, SSD capacity, V-RAM capacity, maximum RAM upgrade capacity, laptop weight, screen size, screen type, screen refresh rate, and screen resolution. Choosing a laptop product there is a criterion value of a laptop product and a value of preference criteria from the buyer as a decision maker. Also the criteria values on laptop products have different contributions to the overall value of the laptop product. Thus, the methods used are Analytical Hierarchy Process (AHP), Profile Matching (PM) with linear interpolation, and Simple Addictive Weighting (SAW) to determine the recommended options. Lastly, SPK that has been made will be able to provide recommendations best alternative choices and best suit the needs of buyers for selecting laptop products.","PeriodicalId":31625,"journal":{"name":"IJCCS Indonesian Journal of Computing and Cybernetics Systems","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46079675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Learning using video media such as watching videos on YouTube is an alternative method of learning that is often used. However, there are so many learning videos available that finding videos with the right content is difficult and time-consuming. Therefore, this study builds a recommendation system that can recommend videos based on courses and syllabus. The recommendation system works by looking for similarity between courses and syllabus with video annotations using the cosine similarity method. The video annotation is the title and description of the video captured in real-time from YouTube using the YouTube API. This recommendation system will produce recommendations in the form of five videos based on the selected courses and syllabus. The test results show that the average performance percentage is 81.13% in achieving the recommendation system goals, namely relevance, novelty, serendipity and increasing recommendation diversity.
{"title":"Online Learning Video Recommendation System Based on Course and Sylabus Using Content-Based Filtering","authors":"F. Ramadhan, Aina Musdholifah","doi":"10.22146/IJCCS.65623","DOIUrl":"https://doi.org/10.22146/IJCCS.65623","url":null,"abstract":"Learning using video media such as watching videos on YouTube is an alternative method of learning that is often used. However, there are so many learning videos available that finding videos with the right content is difficult and time-consuming. Therefore, this study builds a recommendation system that can recommend videos based on courses and syllabus. The recommendation system works by looking for similarity between courses and syllabus with video annotations using the cosine similarity method. The video annotation is the title and description of the video captured in real-time from YouTube using the YouTube API. This recommendation system will produce recommendations in the form of five videos based on the selected courses and syllabus. The test results show that the average performance percentage is 81.13% in achieving the recommendation system goals, namely relevance, novelty, serendipity and increasing recommendation diversity.","PeriodicalId":31625,"journal":{"name":"IJCCS Indonesian Journal of Computing and Cybernetics Systems","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46411667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The continuous growth of the internet has led to the use of social media for various purposes increase. For instance, some irresponsible parties take advantage of the comment feature on social media platforms to harm others by providing spam comments on the shared object. Furthermore, variation of comments creates many features to be processed, thereby negatively impacting the performance of a classification algorithm. Therefore, this study aims to solve the problem associated with spam comments by comparing filter and wrapper based feature selection using text classification techniques. Data collected from training and test data of 4944 and 100 comments showed that the best accuracy, precision, recall, and f-measure of MNB are 96%, 100%, 92%, and 95.8%. The best accuracy is achieved using feature selection by combining Chi-Square and Sequential Forward Selection methods with a subset of 500 features. Furthermore, the accuracy increase in the MNB and SVM classifications are 8% and 4%. This research concludes that the combination of feature selection improves the classification performance of Indonesian language spam comments.
{"title":"Comparison of Filter and Wrapper Based Feature Selection Methods on Spam Comment Classification","authors":"Amalia Nur Anggraeni, K. Mustofa, Sigit Priyanta","doi":"10.22146/IJCCS.66965","DOIUrl":"https://doi.org/10.22146/IJCCS.66965","url":null,"abstract":"The continuous growth of the internet has led to the use of social media for various purposes increase. For instance, some irresponsible parties take advantage of the comment feature on social media platforms to harm others by providing spam comments on the shared object. Furthermore, variation of comments creates many features to be processed, thereby negatively impacting the performance of a classification algorithm. Therefore, this study aims to solve the problem associated with spam comments by comparing filter and wrapper based feature selection using text classification techniques. Data collected from training and test data of 4944 and 100 comments showed that the best accuracy, precision, recall, and f-measure of MNB are 96%, 100%, 92%, and 95.8%. The best accuracy is achieved using feature selection by combining Chi-Square and Sequential Forward Selection methods with a subset of 500 features. Furthermore, the accuracy increase in the MNB and SVM classifications are 8% and 4%. This research concludes that the combination of feature selection improves the classification performance of Indonesian language spam comments.","PeriodicalId":31625,"journal":{"name":"IJCCS Indonesian Journal of Computing and Cybernetics Systems","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48678042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Someone's opinion on a product or service that is poured through a review is something that is quite important for the owner or potential customer. However, the large number of reviews makes it difficult for them to analyze the information contained in the reviews. Aspect-based sentiment analysis is the process of determining the sentiment polarity of a sentence based on predetermined aspects.This study aims to analyze an Indonesian restaurant review using a combination of Convolutional Neural Network and Contextualized Word Embedding models. Then it will be compared with a combination of Convolutional Neural Network and Traditional Word Embedding models. The result of aspect-classification on three models; BERT-CNN, ELMo-CNN, and Word2vec-CNN give the best results on the ELMo-CNN model with micro-average precision of 0.88, micro-average recall of 0.84, and micro-average f1-score of 0.86. Meanwhile, the sentiment-classification gives the best results on the BERT-CNN model with a precision value of 0.89, a recall of 0.89, and an f1-score of 0.91. Classification using data without stemming have almost similar results, even better than using data with stemming.
{"title":"Aspect-Based Sentiment Analysis on Indonesian Restaurant Review Using a Combination of Convolutional Neural Network and Contextualized Word Embedding","authors":"P. Amalia","doi":"10.22146/IJCCS.67306","DOIUrl":"https://doi.org/10.22146/IJCCS.67306","url":null,"abstract":"Someone's opinion on a product or service that is poured through a review is something that is quite important for the owner or potential customer. However, the large number of reviews makes it difficult for them to analyze the information contained in the reviews. Aspect-based sentiment analysis is the process of determining the sentiment polarity of a sentence based on predetermined aspects.This study aims to analyze an Indonesian restaurant review using a combination of Convolutional Neural Network and Contextualized Word Embedding models. Then it will be compared with a combination of Convolutional Neural Network and Traditional Word Embedding models. The result of aspect-classification on three models; BERT-CNN, ELMo-CNN, and Word2vec-CNN give the best results on the ELMo-CNN model with micro-average precision of 0.88, micro-average recall of 0.84, and micro-average f1-score of 0.86. Meanwhile, the sentiment-classification gives the best results on the BERT-CNN model with a precision value of 0.89, a recall of 0.89, and an f1-score of 0.91. Classification using data without stemming have almost similar results, even better than using data with stemming.","PeriodicalId":31625,"journal":{"name":"IJCCS Indonesian Journal of Computing and Cybernetics Systems","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44073217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lya Hulliyyatus Suadaa, Ibnu Santoso, Amanda Tabitha Bulan Panjaitan
Nowadays, internet has become the most popular source of news. However, the validity of the online news articles is difficult to assess, whether it is a fact or a hoax. Hoaxes related to Covid-19 brought a problematic effect to human life. An accurate hoax detection system is important to filter abundant information on the internet. In this research, a Covid-19 hoax detection system was proposed by transfer learning of pre-trained transformer models. Fine-tuned original pre-trained BERT, multilingual pre-trained mBERT, and monolingual pre-trained IndoBERT were used to solve the classification task in the hoax detection system. Based on the experimental results, fine-tuned IndoBERT models trained on monolingual Indonesian corpus outperform fine-tuned original and multilingual BERT with uncased versions. However, the fine-tuned mBERT cased model trained on a larger corpus achieved the best performance.
{"title":"Transfer Learning of Pre-trained Transformers for Covid-19 Hoax Detection in Indonesian Language","authors":"Lya Hulliyyatus Suadaa, Ibnu Santoso, Amanda Tabitha Bulan Panjaitan","doi":"10.22146/IJCCS.66205","DOIUrl":"https://doi.org/10.22146/IJCCS.66205","url":null,"abstract":"Nowadays, internet has become the most popular source of news. However, the validity of the online news articles is difficult to assess, whether it is a fact or a hoax. Hoaxes related to Covid-19 brought a problematic effect to human life. An accurate hoax detection system is important to filter abundant information on the internet. In this research, a Covid-19 hoax detection system was proposed by transfer learning of pre-trained transformer models. Fine-tuned original pre-trained BERT, multilingual pre-trained mBERT, and monolingual pre-trained IndoBERT were used to solve the classification task in the hoax detection system. Based on the experimental results, fine-tuned IndoBERT models trained on monolingual Indonesian corpus outperform fine-tuned original and multilingual BERT with uncased versions. However, the fine-tuned mBERT cased model trained on a larger corpus achieved the best performance.","PeriodicalId":31625,"journal":{"name":"IJCCS Indonesian Journal of Computing and Cybernetics Systems","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42428800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The performance appraisal process in Religious High Court Bandar Lampung has not been carried out objectively, but rather a subjectivity element (relationship closeness). Some employees occupy structural positions but do not fulfil competence and promotion principles, so that it has an impact on providing promotion to a position in the judiciary. Multiple Linear Regression method can provide a predictive model for employee recommendations entitled to occupy positions in the agency. The method implementation using SPSS produces an equation Y = 74.177 + 0.035X1 + 0.020X2 - 0.026X3 + 0.045X4 + 0.001X5. This equation is applied to the employee performance values, and it is obtained from 40 employees 26 employees deserve to be given recommendations promotion. Regression performance testing results using 10-cross validation get the correlation coefficient value is 80.66% with MAE value of 2.24% and RMSE 3.88%, which mean has good performance.
{"title":"Analysis of classic assumption test and multiple linear regression coefficient test for employee structural office recommendation","authors":"Debby Alita, Ade Dwi Putra, D. Darwis","doi":"10.22146/IJCCS.65586","DOIUrl":"https://doi.org/10.22146/IJCCS.65586","url":null,"abstract":"The performance appraisal process in Religious High Court Bandar Lampung has not been carried out objectively, but rather a subjectivity element (relationship closeness). Some employees occupy structural positions but do not fulfil competence and promotion principles, so that it has an impact on providing promotion to a position in the judiciary. Multiple Linear Regression method can provide a predictive model for employee recommendations entitled to occupy positions in the agency. The method implementation using SPSS produces an equation Y = 74.177 + 0.035X1 + 0.020X2 - 0.026X3 + 0.045X4 + 0.001X5. This equation is applied to the employee performance values, and it is obtained from 40 employees 26 employees deserve to be given recommendations promotion. Regression performance testing results using 10-cross validation get the correlation coefficient value is 80.66% with MAE value of 2.24% and RMSE 3.88%, which mean has good performance.","PeriodicalId":31625,"journal":{"name":"IJCCS Indonesian Journal of Computing and Cybernetics Systems","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43389080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hiragana and katakana handwritten characters are often used when writing words in Japanese. Japanese itself is often used by native Japanese as well as people learning Japanese around the world. Hiragana and katakana characters themselves are difficult to learn because many characters are similar to one another. In this study, hiragana and basic katakana, dakuten, handakuten, and youon were used, which were taken from the respondents using a questionnaire. This study used the CNN method which will be compared with a combination of the CNN and SVM methods which have been designed to identify each character that has been prepared. Preprocessing of character images uses the methods of image resizing, grayscaling, binarization, dilation, and erosion. The preprocessed results will be input for CNN as a feature extraction tool and SVM as a tool for character recognition. The results of this study obtained accuracy with the following parameters: 69×69 image size, 3 patience values, val_loss monitor callbacks, Nadam optimization function, 0.001 learning rate value, 30 epochs value, and SVM RBF kernel. If using a system that only uses the CNN network, the accuracy is 87.82%. The results obtained when using a combination of CNN and SVM were 88.21%.
{"title":"Transliteration of Hiragana and Katakana Handwritten Characters Using CNN-SVM","authors":"Nicolaus Euclides Wahyu Nugroho, A. Harjoko","doi":"10.22146/IJCCS.66062","DOIUrl":"https://doi.org/10.22146/IJCCS.66062","url":null,"abstract":"Hiragana and katakana handwritten characters are often used when writing words in Japanese. Japanese itself is often used by native Japanese as well as people learning Japanese around the world. Hiragana and katakana characters themselves are difficult to learn because many characters are similar to one another. In this study, hiragana and basic katakana, dakuten, handakuten, and youon were used, which were taken from the respondents using a questionnaire. This study used the CNN method which will be compared with a combination of the CNN and SVM methods which have been designed to identify each character that has been prepared. Preprocessing of character images uses the methods of image resizing, grayscaling, binarization, dilation, and erosion. The preprocessed results will be input for CNN as a feature extraction tool and SVM as a tool for character recognition. The results of this study obtained accuracy with the following parameters: 69×69 image size, 3 patience values, val_loss monitor callbacks, Nadam optimization function, 0.001 learning rate value, 30 epochs value, and SVM RBF kernel. If using a system that only uses the CNN network, the accuracy is 87.82%. The results obtained when using a combination of CNN and SVM were 88.21%.","PeriodicalId":31625,"journal":{"name":"IJCCS Indonesian Journal of Computing and Cybernetics Systems","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49550158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Social media has become more critical for people to communicate about the pandemic of COVID-19. In social media, hashtags are social annotations which often used to denote message content. It serves as an intuitive and flexible tool for making huge collections of posts searchable on Twitter. Through practices of hashtagging, user representations of a given post also become connected. This study aimed to analyze the hashtag of Indonesian COVID-19 Tweets using Social Network Analysis (SNA). We used SNA techniques to visualize network models and measure some centrality to find the most influential hashtag in the network. We collected and analyzed 500.000 public tweets from Twitter based on COVID-19 keywords. Based on the centrality measurement result, the hashtag #corona is a hashtag with the most connection with other hashtags. The hashtag #COVID19 is the hashtag that is most closely related to all other hashtags. The hashtag #corona is the hashtag that most acts as a bridge that can control the flow of information related to COVID-19. The hashtag #coronavirus is the most important of hashtags based on their link. Our study also found that the hashtag #covid19 and #wabah have a substantial relationship with religious-related hashtags based on network visualization.
{"title":"Hashtag Analysis of Indonesian COVID-19 Tweets Using Social Network Analysis","authors":"Muhammad Habibi, A. Priadana, M. Ma’arif","doi":"10.22146/IJCCS.61626","DOIUrl":"https://doi.org/10.22146/IJCCS.61626","url":null,"abstract":"Social media has become more critical for people to communicate about the pandemic of COVID-19. In social media, hashtags are social annotations which often used to denote message content. It serves as an intuitive and flexible tool for making huge collections of posts searchable on Twitter. Through practices of hashtagging, user representations of a given post also become connected. This study aimed to analyze the hashtag of Indonesian COVID-19 Tweets using Social Network Analysis (SNA). We used SNA techniques to visualize network models and measure some centrality to find the most influential hashtag in the network. We collected and analyzed 500.000 public tweets from Twitter based on COVID-19 keywords. Based on the centrality measurement result, the hashtag #corona is a hashtag with the most connection with other hashtags. The hashtag #COVID19 is the hashtag that is most closely related to all other hashtags. The hashtag #corona is the hashtag that most acts as a bridge that can control the flow of information related to COVID-19. The hashtag #coronavirus is the most important of hashtags based on their link. Our study also found that the hashtag #covid19 and #wabah have a substantial relationship with religious-related hashtags based on network visualization.","PeriodicalId":31625,"journal":{"name":"IJCCS Indonesian Journal of Computing and Cybernetics Systems","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45892751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The use of information technology in the management of Micro, Small, and Medium Enterprises (MSMEs) is not limited to business performance and productivity but also aspects of data security and transactions using various mobile, website, and desktop-based applications. This article offers an idea to explore cybersecurity awareness and risk management of MSME actors who adopt information technology. The research method used is qualitative with a case study approach in the Coffeeshop X business and the Y Souvenir business in Salatiga City, Central Java, Indonesia. The data collection technique used in-depth interviews, observation, and document studies. These findings indicate that Cybersecurity Awareness, especially information security awareness, can be reviewed based on knowledge, attitudes, and behavior. Risk management can be review based on supply risk, operational risk, and customer risk. Cybersecurity Awareness and Risk Management in MSMEs is holistic and cannot be generalized, so it needs to be discussed contextually based on case studies. In the context of Coffeeshop X and Souvenir Y, the level of Cybersecurity Awareness (knowledge, attitude, behavior) is not always linear. In addition, risk management is more dominant in the customer risk dimension, compared to supply risk and operational risk.
{"title":"Exploring MSMEs Cybersecurity Awareness and Risk Management : Information Security Awareness","authors":"Y. Singgalen, H. Purnomo, I. Sembiring","doi":"10.22146/IJCCS.67010","DOIUrl":"https://doi.org/10.22146/IJCCS.67010","url":null,"abstract":"The use of information technology in the management of Micro, Small, and Medium Enterprises (MSMEs) is not limited to business performance and productivity but also aspects of data security and transactions using various mobile, website, and desktop-based applications. This article offers an idea to explore cybersecurity awareness and risk management of MSME actors who adopt information technology. The research method used is qualitative with a case study approach in the Coffeeshop X business and the Y Souvenir business in Salatiga City, Central Java, Indonesia. The data collection technique used in-depth interviews, observation, and document studies. These findings indicate that Cybersecurity Awareness, especially information security awareness, can be reviewed based on knowledge, attitudes, and behavior. Risk management can be review based on supply risk, operational risk, and customer risk. Cybersecurity Awareness and Risk Management in MSMEs is holistic and cannot be generalized, so it needs to be discussed contextually based on case studies. In the context of Coffeeshop X and Souvenir Y, the level of Cybersecurity Awareness (knowledge, attitude, behavior) is not always linear. In addition, risk management is more dominant in the customer risk dimension, compared to supply risk and operational risk. ","PeriodicalId":31625,"journal":{"name":"IJCCS Indonesian Journal of Computing and Cybernetics Systems","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47787743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}