Pub Date : 2020-11-03DOI: 10.1109/ICIC50835.2020.9288566
N. Azzahra, Muhammad Okky Ibrohim, Junaedi Fahmi, Bagus Fajar Apriyanto, Oskar Riandi
Named-Entity Recognition (NER) is a task that extracts the entity information from dataset into several different entity classes. Most of current NER research train the NER model from structured data such as news and Wikipedia article. Whereas, there are several tasks that generate an unstructured dataset such as speech-to-text task. In this paper, we did NER research for unstructured text formatting dataset in Indonesian language using deep learning approaches including LSTM, Bidirectional LSTM (Bi-LSTM), GRU, Bidirectional GRU (Bi-GRU), and Convolutional Neural Network (CNN). We used NERGRIT CORPUS as our dataset and modified the dataset into four types of structured and unstructured datasets. Afterward, we run several experiments scenario by combining all types of data modification and the deep learning algorithms that we used and we obtain that the highest $F$ - Score was obtained when using Bi-GRU for standard dataset, lowercase with punctuation dataset, lowercase without punctuation dataset, and lowercase and clean dataset equal to 71.04%, 70.61%, 68.12%, and 67.45%, respectively.
{"title":"Developing Name Entity Recognition for Structured and Unstructured Text Formatting Dataset","authors":"N. Azzahra, Muhammad Okky Ibrohim, Junaedi Fahmi, Bagus Fajar Apriyanto, Oskar Riandi","doi":"10.1109/ICIC50835.2020.9288566","DOIUrl":"https://doi.org/10.1109/ICIC50835.2020.9288566","url":null,"abstract":"Named-Entity Recognition (NER) is a task that extracts the entity information from dataset into several different entity classes. Most of current NER research train the NER model from structured data such as news and Wikipedia article. Whereas, there are several tasks that generate an unstructured dataset such as speech-to-text task. In this paper, we did NER research for unstructured text formatting dataset in Indonesian language using deep learning approaches including LSTM, Bidirectional LSTM (Bi-LSTM), GRU, Bidirectional GRU (Bi-GRU), and Convolutional Neural Network (CNN). We used NERGRIT CORPUS as our dataset and modified the dataset into four types of structured and unstructured datasets. Afterward, we run several experiments scenario by combining all types of data modification and the deep learning algorithms that we used and we obtain that the highest $F$ - Score was obtained when using Bi-GRU for standard dataset, lowercase with punctuation dataset, lowercase without punctuation dataset, and lowercase and clean dataset equal to 71.04%, 70.61%, 68.12%, and 67.45%, respectively.","PeriodicalId":413610,"journal":{"name":"2020 Fifth International Conference on Informatics and Computing (ICIC)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132552142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-03DOI: 10.1109/ICIC50835.2020.9288596
Razief Perucha Fauzie Afidh, Z. Hasibuan
News related to Covid-19 or Corona dominates the news in several media. From various perspectives, a number of news have been produced regarding the corona outbreak. The purpose of this research is to look at various news topics related to corona, both in national online media and in local online media. This study uses the Latent Dirichlet Allocation (LDA) algorithm to find out news topics related to corona. Preprocessing was carried out on existing articles such as removing punctuation marks, numbers, and removing stopwords. This process is preceded by lowering the text to get unique words. The number of articles collected was 12.883 news titles from the national online media RMOL and the Aceh Tribunnews regional online media in the period January to May 2020. The news items came from various news categories such as politics, law, health, economy, sports and others. Based on this research, by using the LDA algorithm, evaluate using coherence value and visualize the topics, will have the best perspective of how many topics can be created. RMOL news articles have 12 topics discussion with the coherence value is 0.538795. Aceh Tribunnews has 8 topics with the coherence value of 0.522946.
{"title":"Indonesia's News Topic Discussion about Covid-19 Outbreak using Latent Dirichlet Allocation","authors":"Razief Perucha Fauzie Afidh, Z. Hasibuan","doi":"10.1109/ICIC50835.2020.9288596","DOIUrl":"https://doi.org/10.1109/ICIC50835.2020.9288596","url":null,"abstract":"News related to Covid-19 or Corona dominates the news in several media. From various perspectives, a number of news have been produced regarding the corona outbreak. The purpose of this research is to look at various news topics related to corona, both in national online media and in local online media. This study uses the Latent Dirichlet Allocation (LDA) algorithm to find out news topics related to corona. Preprocessing was carried out on existing articles such as removing punctuation marks, numbers, and removing stopwords. This process is preceded by lowering the text to get unique words. The number of articles collected was 12.883 news titles from the national online media RMOL and the Aceh Tribunnews regional online media in the period January to May 2020. The news items came from various news categories such as politics, law, health, economy, sports and others. Based on this research, by using the LDA algorithm, evaluate using coherence value and visualize the topics, will have the best perspective of how many topics can be created. RMOL news articles have 12 topics discussion with the coherence value is 0.538795. Aceh Tribunnews has 8 topics with the coherence value of 0.522946.","PeriodicalId":413610,"journal":{"name":"2020 Fifth International Conference on Informatics and Computing (ICIC)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131382669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-03DOI: 10.1109/ICIC50835.2020.9288610
I. Afrianto, Y. Heryanto
The purpose of this research is to develop a job training document storage system based on the public blockchain platform. The use of public platforms is used to secure certificate data making it difficult to falsify. The use of smart contracts is used to form data that will be used in blocks to be sent to the Ethereum blockchain network. The InterPlanetary File System (IPFS) is used to store certificate files in a distributed environment so that access is easy and safe to do. The results showed that certificate data can be stored in public blockchain Ethereum infrastructure and its supporting files stored in the IPFS environment. This means that certificate data is more secure from counterfeiting because it is stored in a distributed and transparent blockchain environment.
{"title":"Design and Implementation of Work Training Certificate Verification Based On Public Blockchain Platform","authors":"I. Afrianto, Y. Heryanto","doi":"10.1109/ICIC50835.2020.9288610","DOIUrl":"https://doi.org/10.1109/ICIC50835.2020.9288610","url":null,"abstract":"The purpose of this research is to develop a job training document storage system based on the public blockchain platform. The use of public platforms is used to secure certificate data making it difficult to falsify. The use of smart contracts is used to form data that will be used in blocks to be sent to the Ethereum blockchain network. The InterPlanetary File System (IPFS) is used to store certificate files in a distributed environment so that access is easy and safe to do. The results showed that certificate data can be stored in public blockchain Ethereum infrastructure and its supporting files stored in the IPFS environment. This means that certificate data is more secure from counterfeiting because it is stored in a distributed and transparent blockchain environment.","PeriodicalId":413610,"journal":{"name":"2020 Fifth International Conference on Informatics and Computing (ICIC)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127018547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-03DOI: 10.1109/ICIC50835.2020.9288604
Ahmad Fauzi, S. Madenda, Ernastuti, E. P. Wibowo, Anis Fitri Nur Masruriyah
In today's digital era, we are used to living with various technologies that help ensure safety and comfort in our daily activities. One of the technologies commonly used to help safety and comfort is the use of Closed-Circuit Television (CCTV). Many people or groups are helped by the presence of CCTV in their environment. Some CCTVs have been shown to help identify criminals, but this is done manually. In this research, CCTV is supported by computational techniques that can identify object activities. The computational technique used is a bounding box for moving objects. Thus, it is easier for stakeholders to find out suspicious things in a particular area or incident. The technique to determine the bounding box by calculating the body aspect ratio and object speed.
{"title":"The Importance of Bounding Box in Motion Detection","authors":"Ahmad Fauzi, S. Madenda, Ernastuti, E. P. Wibowo, Anis Fitri Nur Masruriyah","doi":"10.1109/ICIC50835.2020.9288604","DOIUrl":"https://doi.org/10.1109/ICIC50835.2020.9288604","url":null,"abstract":"In today's digital era, we are used to living with various technologies that help ensure safety and comfort in our daily activities. One of the technologies commonly used to help safety and comfort is the use of Closed-Circuit Television (CCTV). Many people or groups are helped by the presence of CCTV in their environment. Some CCTVs have been shown to help identify criminals, but this is done manually. In this research, CCTV is supported by computational techniques that can identify object activities. The computational technique used is a bounding box for moving objects. Thus, it is easier for stakeholders to find out suspicious things in a particular area or incident. The technique to determine the bounding box by calculating the body aspect ratio and object speed.","PeriodicalId":413610,"journal":{"name":"2020 Fifth International Conference on Informatics and Computing (ICIC)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125377993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-03DOI: 10.1109/ICIC50835.2020.9288561
Heru Nugroho, Maria Irmina, Rini Wijayanti
Internet has changed society's lifestyle in the direction that completely modern and digital. But the excessive use of the internet may cause dependency or addiction effects. Internet Addiction Test (IAT) is the most frequent instrument used to measure someone's internet addiction level. This paper will conduct a review of the IAT questionnaire through reliability and validity tests based on the online survey result in 385 Indonesian netizens. The reliability test result shows the Cronbach's Alpha value at 0.905, which means the measurement is reliable. The results of the validity test show that the items in the IAT instrument are valid. In addition, this paper also reviews some related scientific literature which showed that it was necessary to evaluate the IAT instrument.
{"title":"An Evaluation of Internet Addiction Test (IAT)","authors":"Heru Nugroho, Maria Irmina, Rini Wijayanti","doi":"10.1109/ICIC50835.2020.9288561","DOIUrl":"https://doi.org/10.1109/ICIC50835.2020.9288561","url":null,"abstract":"Internet has changed society's lifestyle in the direction that completely modern and digital. But the excessive use of the internet may cause dependency or addiction effects. Internet Addiction Test (IAT) is the most frequent instrument used to measure someone's internet addiction level. This paper will conduct a review of the IAT questionnaire through reliability and validity tests based on the online survey result in 385 Indonesian netizens. The reliability test result shows the Cronbach's Alpha value at 0.905, which means the measurement is reliable. The results of the validity test show that the items in the IAT instrument are valid. In addition, this paper also reviews some related scientific literature which showed that it was necessary to evaluate the IAT instrument.","PeriodicalId":413610,"journal":{"name":"2020 Fifth International Conference on Informatics and Computing (ICIC)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114228444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-03DOI: 10.1109/ICIC50835.2020.9288519
Ave Adriana Pinem, Achmad Nizar Hidayanto, Awalia Mitha Syaninda, Ernest Anderson, Hera Mentari Putri, Yudistira Ramadhan, Rahmat Mustafa Samik Ibrahim
Health is very essential and considered an asset to complete all our daily activities smoothly. As the development of technology is advancing, the search for health information is now developing even further on the internet media in the online community. Previous studies have been conducted to evaluate the motivation of sharing, seeking, and exchanging health information. Whereas the final purpose for people to seek information has not been studied intensely which is to adopt and apply the information. There is still limited literature to study the factor of the adoption of health information. Thus, this study aims to analyze the factor that influences the adoption of health information. The data was collected with an online survey and 170 valid data were collected. The analysis was conducted with PLS-SEM using SmartPLS. The results show that the recommendation credibility and recommendation usefulness have an influence on recommendation adoption. Credibility can be achieved through online community interactivity and social support. The recommendation usefulness can be influenced by the recommendation credibility.
{"title":"Health Information Adoption Influencing Factors in Social Online Community","authors":"Ave Adriana Pinem, Achmad Nizar Hidayanto, Awalia Mitha Syaninda, Ernest Anderson, Hera Mentari Putri, Yudistira Ramadhan, Rahmat Mustafa Samik Ibrahim","doi":"10.1109/ICIC50835.2020.9288519","DOIUrl":"https://doi.org/10.1109/ICIC50835.2020.9288519","url":null,"abstract":"Health is very essential and considered an asset to complete all our daily activities smoothly. As the development of technology is advancing, the search for health information is now developing even further on the internet media in the online community. Previous studies have been conducted to evaluate the motivation of sharing, seeking, and exchanging health information. Whereas the final purpose for people to seek information has not been studied intensely which is to adopt and apply the information. There is still limited literature to study the factor of the adoption of health information. Thus, this study aims to analyze the factor that influences the adoption of health information. The data was collected with an online survey and 170 valid data were collected. The analysis was conducted with PLS-SEM using SmartPLS. The results show that the recommendation credibility and recommendation usefulness have an influence on recommendation adoption. Credibility can be achieved through online community interactivity and social support. The recommendation usefulness can be influenced by the recommendation credibility.","PeriodicalId":413610,"journal":{"name":"2020 Fifth International Conference on Informatics and Computing (ICIC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123511360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-03DOI: 10.1109/ICIC50835.2020.9288608
Karina Lia Meirita Ulo, Aldi Firmansyah, Astari Dwi Rahmanisa, Athifa Michel, Deana Almira Putri, Hauri Silmi Zafirah, A. Hidayanto, Ferdian Aditya Pratama
This study examined the influence of University students' innovativeness and the technology product characteristics toward their intention of purchasing new smartphones by utilizing the theory of Domain-Specific Innovativeness (DSI). Data collection was done by distributing an online questionnaire. There were 156 responses collected from University students in Indonesia. The data were analyzed by using Smart-PLS version 3. The finding discovered that relative advantage had the strongest influence on purchase intention. Meanwhile, Product-Possessing Innovativeness (PPI) had a great influence on the social image. This also revealed a strong relationship between students' Information-Possessing Innovativeness (IPI) and their attraction of aesthetic products. Later, discussion of the results and its practical implications presented.
本研究运用特定领域创新(Domain-Specific innovativeness, DSI)理论,考察了大学生创新能力和科技产品特征对其购买新手机意愿的影响。数据收集是通过分发在线问卷来完成的。从印度尼西亚的大学生中收集了156份回复。使用Smart-PLS version 3对数据进行分析。研究发现,相对优势对购买意愿的影响最大。同时,产品创新能力对企业的社会形象也有很大的影响。这也揭示了学生的信息拥有创新能力与审美产品的吸引力之间的密切关系。随后,讨论了研究结果及其实际意义。
{"title":"Purchasing New Smartphones among University Students: The Role of Domain-Specific Innovativeness (DSI) and Technology Product Characteristics","authors":"Karina Lia Meirita Ulo, Aldi Firmansyah, Astari Dwi Rahmanisa, Athifa Michel, Deana Almira Putri, Hauri Silmi Zafirah, A. Hidayanto, Ferdian Aditya Pratama","doi":"10.1109/ICIC50835.2020.9288608","DOIUrl":"https://doi.org/10.1109/ICIC50835.2020.9288608","url":null,"abstract":"This study examined the influence of University students' innovativeness and the technology product characteristics toward their intention of purchasing new smartphones by utilizing the theory of Domain-Specific Innovativeness (DSI). Data collection was done by distributing an online questionnaire. There were 156 responses collected from University students in Indonesia. The data were analyzed by using Smart-PLS version 3. The finding discovered that relative advantage had the strongest influence on purchase intention. Meanwhile, Product-Possessing Innovativeness (PPI) had a great influence on the social image. This also revealed a strong relationship between students' Information-Possessing Innovativeness (IPI) and their attraction of aesthetic products. Later, discussion of the results and its practical implications presented.","PeriodicalId":413610,"journal":{"name":"2020 Fifth International Conference on Informatics and Computing (ICIC)","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123383632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-03DOI: 10.1109/ICIC50835.2020.9288593
D. I. Sensuse, Andy Syahrizal, Faizan Aditya, M. Nazri
Otoritas Sertifikat Digital (OSD) is a certificate authority held by Balai Sertifikasi Elektronik (BSrE) of the Badan Siber dan Sandi Negara (BSSN). Digital certificate management is the primary business process of Otoritas Sertifikat Digital Layanan Universal (OSD LU), which, if it is interrupted, the OSD business process cannot run smoothly and has an impact on the digital certification process. With the problem of maintaining the reliability and security of the system it there is a need to classify, analyzed, and carried these risks correctly to diminish the negative repercussions that may arise at an agreeable level. The main goal is to address the issues about risk management planning, particularly in the absence of an information security risk management plans within BSrE. We carried the process of risk assessment utilizing the ISO 27005 framework combined with NIST SP 800–30 revision 1 in assessing the security risks. The results of the risk assessment of the 27 assets identified and 26 risk scenarios that must be mitigated and 38 risk scenarios acceptable to the organization. We hope with this study it can help the BSrE in analyzing and to maintaining the security management plan within the OSD LU system and to provides control recommendations as an effort to minimize information security risks in data communication application within the business processes and produce a strategic plan for handling and accepting risk accompanied by a person in charge of the risk scenario
Otoritas Sertifikat Digital (OSD)是由Badan Siber dan Sandi Negara (BSSN)的Balai Sertifikasi Elektronik (BSrE)持有的认证机构。数字证书管理是Otoritas Sertifikat Digital Layanan Universal (OSD LU)的主要业务流程,如果OSD业务流程中断,将导致OSD业务流程无法正常运行,并对数字认证流程产生影响。对于维护系统的可靠性和安全性的问题,需要对这些风险进行正确的分类、分析和处理,以减少可能在一个可接受的水平上出现的负面影响。主要目标是解决有关风险管理计划的问题,特别是在BSrE中缺乏信息安全风险管理计划的情况下。我们利用ISO 27005框架结合NIST SP 800-30修订1进行风险评估过程,以评估安全风险。已识别的27项资产的风险评估结果、必须减轻的26种风险情景和组织可接受的38种风险情景。我们希望通过本研究能够帮助BSrE分析和维护OSD LU系统内的安全管理计划,并提供控制建议,以尽量减少业务流程中数据通信应用中的信息安全风险,并在风险场景负责人的陪同下制定处理和接受风险的战略计划
{"title":"Information Security Risk Management Planning of Digital Certificate Management Case Study: Balai Sertifikasi Elektronik","authors":"D. I. Sensuse, Andy Syahrizal, Faizan Aditya, M. Nazri","doi":"10.1109/ICIC50835.2020.9288593","DOIUrl":"https://doi.org/10.1109/ICIC50835.2020.9288593","url":null,"abstract":"Otoritas Sertifikat Digital (OSD) is a certificate authority held by Balai Sertifikasi Elektronik (BSrE) of the Badan Siber dan Sandi Negara (BSSN). Digital certificate management is the primary business process of Otoritas Sertifikat Digital Layanan Universal (OSD LU), which, if it is interrupted, the OSD business process cannot run smoothly and has an impact on the digital certification process. With the problem of maintaining the reliability and security of the system it there is a need to classify, analyzed, and carried these risks correctly to diminish the negative repercussions that may arise at an agreeable level. The main goal is to address the issues about risk management planning, particularly in the absence of an information security risk management plans within BSrE. We carried the process of risk assessment utilizing the ISO 27005 framework combined with NIST SP 800–30 revision 1 in assessing the security risks. The results of the risk assessment of the 27 assets identified and 26 risk scenarios that must be mitigated and 38 risk scenarios acceptable to the organization. We hope with this study it can help the BSrE in analyzing and to maintaining the security management plan within the OSD LU system and to provides control recommendations as an effort to minimize information security risks in data communication application within the business processes and produce a strategic plan for handling and accepting risk accompanied by a person in charge of the risk scenario","PeriodicalId":413610,"journal":{"name":"2020 Fifth International Conference on Informatics and Computing (ICIC)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130040056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-03DOI: 10.1109/ICIC50835.2020.9288602
Rafif I. Shaputra, A. Hidayanto, Purwo Aji Fahmi Akmal, Ismail Al Ghani, Muhammad Arief Wibowo, Annisa Monicha Sari
Online forum as media for exchange information that can be accessed online by the public (citizen), especially cooking information. Despite the citizen can obtain various information through online forums, very little is known about factors affecting the effectiveness of online forums in cooking information. This study, therefore, seeks to analyze what factors can influence online forum's effectiveness as knowledge sharing media in increasing people's knowledge and cooking performance. There are four indicators used in this study, knowledge sharing, knowledge application, knowledge creation, and transactive memory system (which refers to three-point: specialization, credibility, and coordination). The survey was taken place and obtain 174 respondents as samples. Structural Equation Modelling (SEM) was conducted with SmartPLS tools to test this research. The result of this study concludes that knowledge application, knowledge sharing, and knowledge creation significantly influence knowledge and cooking performance by using transactive memory systems (TMS) theory.
{"title":"Factors Influencing of Online Forums Effectiveness as Knowledge Sharing Media in Increasing Knowledge and Cooking Performance","authors":"Rafif I. Shaputra, A. Hidayanto, Purwo Aji Fahmi Akmal, Ismail Al Ghani, Muhammad Arief Wibowo, Annisa Monicha Sari","doi":"10.1109/ICIC50835.2020.9288602","DOIUrl":"https://doi.org/10.1109/ICIC50835.2020.9288602","url":null,"abstract":"Online forum as media for exchange information that can be accessed online by the public (citizen), especially cooking information. Despite the citizen can obtain various information through online forums, very little is known about factors affecting the effectiveness of online forums in cooking information. This study, therefore, seeks to analyze what factors can influence online forum's effectiveness as knowledge sharing media in increasing people's knowledge and cooking performance. There are four indicators used in this study, knowledge sharing, knowledge application, knowledge creation, and transactive memory system (which refers to three-point: specialization, credibility, and coordination). The survey was taken place and obtain 174 respondents as samples. Structural Equation Modelling (SEM) was conducted with SmartPLS tools to test this research. The result of this study concludes that knowledge application, knowledge sharing, and knowledge creation significantly influence knowledge and cooking performance by using transactive memory systems (TMS) theory.","PeriodicalId":413610,"journal":{"name":"2020 Fifth International Conference on Informatics and Computing (ICIC)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116369236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-03DOI: 10.1109/ICIC50835.2020.9288616
Majesty Eksa Permana, Handoko Ramadhan, I. Budi, Aris Budi Santoso, Prabu Kresna Putra
Understanding user needs and application quality are difficult things in developing an application. Sentiment analysis and topic modeling based on application review can be used to understand the user needs and application quality. This research aimed to determine customer sentiment towards mobile banking applications and what aspects need to be improved or maintained from the application. The data come from application user reviews on Google Play Store, which amounted to 6194 data. Labeling is done manually, generates two main classes namely positive and negative classes. The sentiment analysis process is done using Naive Bayes models. While the topic modeling process is carried out using the LDA algorithm. The results of the experiment were Naive Bayes method has a good level of accuracy, recall, and precision. The highest accuracy, recall, and precision are at the value of k=5, which is 86.762% accuracy, 93.474% for recall, and 92.482% for precision. Based on the LDA algorithm, the most frequent topics in negative classes are related to OTP code delivery constraints, application login problems, and network connection. On the other hand, the most frequent topics in positives classes included ease, simplicity, and helpfulness.
在开发应用程序时,理解用户需求和应用程序质量是很困难的事情。基于应用审查的情感分析和主题建模可以用来了解用户需求和应用质量。本研究旨在确定客户对移动银行应用程序的看法,以及应用程序需要改进或维护的方面。数据来自Google Play Store上的应用用户评论,共计6194条数据。标记是手动完成的,生成两个主要类别,即正类和负类。情感分析过程是使用朴素贝叶斯模型完成的。而主题建模过程则采用LDA算法进行。实验结果表明,朴素贝叶斯方法具有较好的准确率、召回率和精密度。准确率、查全率和查准率在k=5时最高,准确率为86.762%,查全率为93.474%,查准率为92.482%。基于LDA算法,负类中最常见的主题与OTP代码交付约束、应用程序登录问题和网络连接有关。另一方面,积极类中最常见的话题包括轻松、简单和有用。
{"title":"Sentiment Analysis and Topic Detection of Mobile Banking Application Review","authors":"Majesty Eksa Permana, Handoko Ramadhan, I. Budi, Aris Budi Santoso, Prabu Kresna Putra","doi":"10.1109/ICIC50835.2020.9288616","DOIUrl":"https://doi.org/10.1109/ICIC50835.2020.9288616","url":null,"abstract":"Understanding user needs and application quality are difficult things in developing an application. Sentiment analysis and topic modeling based on application review can be used to understand the user needs and application quality. This research aimed to determine customer sentiment towards mobile banking applications and what aspects need to be improved or maintained from the application. The data come from application user reviews on Google Play Store, which amounted to 6194 data. Labeling is done manually, generates two main classes namely positive and negative classes. The sentiment analysis process is done using Naive Bayes models. While the topic modeling process is carried out using the LDA algorithm. The results of the experiment were Naive Bayes method has a good level of accuracy, recall, and precision. The highest accuracy, recall, and precision are at the value of k=5, which is 86.762% accuracy, 93.474% for recall, and 92.482% for precision. Based on the LDA algorithm, the most frequent topics in negative classes are related to OTP code delivery constraints, application login problems, and network connection. On the other hand, the most frequent topics in positives classes included ease, simplicity, and helpfulness.","PeriodicalId":413610,"journal":{"name":"2020 Fifth International Conference on Informatics and Computing (ICIC)","volume":"4291 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125855511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}