Claim Missing Document
Check
Articles

Found 23 Documents
Search

Studi Literatur Mengenai Prediksi Kepuasan GrabFood Menggunakan Machine Learning Martiani, Evi; Setyanto, Arief; Nasiri, Asro
DIELEKTRIKA Vol 11 No 1 (2024): DIELEKTRIKA
Publisher : Jurusan Teknik Elektro Fakultas Teknik Universitas Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29303/dielektrika.v11i1.367

Abstract

The rapid growth of food delivery applications, such as GrabFood, has revolutionized the way consumers access and enjoy their favorite meals. Ensuring customer satisfaction is crucial for these platforms to maintain their competitive edge and foster customer loyalty. If many customers are not satisfied with the service or anything provided by GrabFood, it is possible that they will leave the application soon or later. This research is aimed to review some literature related to customer satisfaction of the food delivery application with the use of machine learning. From this review, one can have more information and insight on how machine learning can help to find the satisfaction level of the customers. The method which is used in this research is literature review which reviews the collection of literature. Varied literature with different variables has been resulted from this research. Many of them use different methods of machine learning.
Machine learning methods for classification and prediction information security risk assessment Muhammad, Alva Hendi; Nasiri, Asro; Harimurti, Agung
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 14, No 1: February 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v14.i1.pp457-465

Abstract

Information is an essential company asset that must be protected. The value of information assets depends on the type and scale of the business and its role in delivering services. One of the primary programs that can help identify areas of improvement and guide the development of security awareness programs is risk assessment. Managing cybersecurity risks is critical to protecting enterprises from developing cyber threats and promoting resilience. This includes detecting, assessing, and mitigating risks to protect sensitive data, systems, and networks. While cybersecurity risk management is challenging, organizations may improve their security posture. This paper seeks to contribute to the field of information security risk assessment by leveraging the power of machine learning to provide quick, cost-effective, and individualized risk assessments for small and medium enterprises. Specifically, we extend the evaluation for security level classification by utilizing a support vector machine, random forest, and gradient boosting algorithms. The results demonstrate how well the model detects significant cases while reducing false positives. The model’s exceptional precision ensures that its identifications are dependable, while the high recall demonstrates that it accurately detects relevant data. Precision is critical in security risk assessment because a false positive result might have profound effects.
ANALYSIS OF INFORMATION TECHNOLOGY INNOVATION GOVERNANCE USING COBIT: SYSTEMATIC LITERATURE REVIEW Rosady, Melinne Maldini; Muhammad, Alva Hendi; Nasiri, Asro
JIPI (Jurnal Ilmiah Penelitian dan Pembelajaran Informatika) Vol 10, No 1 (2025)
Publisher : STKIP PGRI Tulungagung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29100/jipi.v10i1.5961

Abstract

Information Technology (IT) has become a critical element in all aspects of business, especially in the current digital era. To ensure continuity and operational effectiveness, companies must maintain their IT systems' security, availability and integrity. Success in managing IT innovation impacts operational efficiency and directly influences the company's overall performance and sustainability. Therefore, implementing effective IT innovation governance is crucial to reducing risks and maximizing benefits from IT investments. This research focuses on using the COBIT framework as the primary tool in managing IT innovation. COBIT, especially the COBIT 2019 version, is the dominant choice in innovation governance practices in the industrial and digital sectors. Through the Systematic Literature Review (SLR) method, this research identified and analyzed 30 related articles that provide in-depth insight into the application of COBIT in various industrial contexts. The research results highlight several challenges faced in implementing COBIT, including a need for a more in-depth understanding of this framework, a lack of proper documentation of work processes, and the need for clear operational standards to manage IT innovation effectively. Thus, this research not only provides practical guidance for practitioners in the field but also contributes a deeper understanding of the importance of integrated IT innovation governance with broader business strategy.
Prioritas Investasi Keamanan Informasi Menggunakan Analytic Network Process (ANP) Bagi Pemerintah Daerah Provinsi Kalimantan Tengah Haris, Ruby; Muhammad, Alva Hendi; Nasiri, Asro
Jurnal Teknologi Informasi dan Ilmu Komputer Vol 11 No 6: Desember 2024
Publisher : Fakultas Ilmu Komputer, Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25126/jtiik.2024119245

Abstract

Keamanan informasi menjadi fokus utama bagi Pemerintah Daerah Provinsi Kalimantan Tengah, terutama dalam menghadapi ancaman siber yang semakin kompleks. Walaupun telah ada inisiatif dari Pemerintah Pusat seperti Indeks Keamanan Informasi (KAMI) yang diperkenalkan oleh Badan Siber dan Sandi Negara (BSSN), implementasi di tingkat daerah masih dihadapkan dengan berbagai tantangan. Kendala utama yang dihadapi adalah terbatasnya anggaran, kekurangan sumber daya manusia yang berkualitas, serta rendahnya kesadaran tentang pentingnya keamanan informasi. Penelitian ini menghipotesiskan bahwa dengan penerapan metode Analytic Network Process (ANP), Pemerintah Daerah dapat lebih efektif menentukan prioritas dalam investasi keamanan informasi, sehingga risiko ancaman siber dapat diminimalkan secara signifikan. Solusi yang diusulkan adalah penggunaan metode ANP untuk menangani hubungan antar kriteria yang saling terkait dan memberikan panduan prioritas yang komprehensif antara aspek teknologi, sumber daya manusia, dan kebijakan. Survei dilakukan terhadap pengambil keputusan dan pengelola teknis terkait keamanan informasi. Hasil penelitian menunjukkan bahwa pengambil keputusan lebih memprioritaskan kerangka kerja manajemen keamanan informasi, sementara pengelola teknis lebih fokus pada aspek teknologi. Penelitian ini diharapkan dapat membantu Pemerintah Daerah dalam merumuskan strategi investasi yang lebih efektif untuk meningkatkan keamanan informasi dan melindungi data sensitif di wilayah Pemerintah Provinsi Kalimantan Tengah.   Abstract Information security has become a primary focus for the Regional Government of Central Kalimantan Province, especially in facing increasingly complex cyber threats. Although there have been initiatives from the Central Government, such as the Information Security Index (KAMI) introduced by the National Cyber and Crypto Agency (BSSN), implementation at the regional level still faces various challenges. The main obstacles encountered are limited budgets, a shortage of qualified human resources, and a lack of awareness about the importance of information security. This study hypothesizes that by applying the Analytic Network Process (ANP) method, the Regional Government can more effectively prioritize investments in information security, thereby significantly minimizing cyber threat risks. The proposed solution is to use the ANP method to manage interrelated criteria and provide a comprehensive priority guide between technological, human resource, and policy aspects. Surveys were conducted with decision-makers and technical managers related to information security. The results of the study show that decision-makers prioritize the information security management framework, while technical managers focus more on technological aspects. This research is expected to assist the Regional Government in formulating more effective investment strategies to improve information security and protect sensitive data within the Central Kalimantan Provincial Government's jurisdiction.
ANALYSIS OF INFORMATION TECHNOLOGY GOVERNANCE WITH COBIT 2019 ON THE BAI08 DOMAIN TO IMPROVE HIGHER EDUCATION PERFORMANCE (CASE STUDY: INSTITUT KEGURUAN DAN TEKNOLOGI LARANTUKA) Hewen, Maria Beliti; Muhammad, Alva Hendi; Nasiri, Asro
JIPI (Jurnal Ilmiah Penelitian dan Pembelajaran Informatika) Vol 10, No 2 (2025)
Publisher : STKIP PGRI Tulungagung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29100/jipi.v10i2.6080

Abstract

Information technology governance is essential and must be appropriately managed to fulfill company strategy. Determination of the achievement of the capability level in the information technology governance process at the academic administration bureau at the Institut Keguruan dan Teknologi Larantuka (IKTL) as a case study site. This research aims to analyze the implementation of information technology governance and measure the achievement of capability values using COBIT 2019. The findings of the problem were that an evaluation had never been carried out, and lack of knowledge sharing caused a decrease in the quality of governance, so an evaluation was needed. The research stages help administrative staff responsible for developing and implementing knowledge and presenting information. Information technology management is carried out to facilitate the management, monitoring, and evaluation of each business process and information technology to achieve organizational goals. COBIT 2019 is used to assist organizations in managing and optimizing existing information technology by using factor design to determine important process domains according to the existing circumstances at the institution. Then, the level of capability in the selected domain BAI08 will be analyzed. The results of measuring the level of capability reached a value of 2.25 at level 2 of the expected goals. The solution to overcome the gap is to give recommendations for improving the governance of information technology
Literature Review Audit Tata Kelola Teknologi Informasi Menggunakan Kerangka Kerja COBIT 2019 A’yuni, Ashlih Qurota; Muhammad, Alva Hendi; Nasiri, Asro
Jurnal Informa : Jurnal Penelitian dan Pengabdian Masyarakat Vol 9 No 1 (2023): Juni
Publisher : Politeknik Indonusa Surakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46808/informa.v9i1.247

Abstract

Information Technology Governance Audit is an evaluation process carried out to evaluate the level of maturity or readiness of an organization in managing information technology. Information Technology governance audit basically focuses more on IT management and its implementation to then produce evaluations and recommendations for company improvement. COBIT 2019 can be used as a framework for conducting IT governance audits. COBIT 2019 is the latest version of COBIT with various advantages, namely, flexibility and openness, novelty and relevance, has a level of adaptation to developments with the latest technology today, provides more in-depth guidance on corporate IT governance according to the needs of each company. Of the 15 articles that have been collected, there are 2 articles that really discuss the entire information technology governance audit process, and 2 articles that discuss in detail the planning of information technology governance audits. While the other 11 articles only arrive at the calculation of the level of capability, the calculation of the maturity level of information technology governance. From these findings, it is hoped that there will be better research in the future.
Enhancing vocational computer engineering education with a GPT-driven speech recognition tool Eka Sakti, Putra Utama; Muhammad, Alva Hendi; Nasiri, Asro
Indonesian Journal of Electrical Engineering and Computer Science Vol 39, No 1: July 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v39.i1.pp564-574

Abstract

This research investigates the effectiveness of an AI-driven speech recognition and GPT-powered learning tool in enhancing vocational students’ proficiency in computer networks. The study involved 100 students from vocational hig school, who used the prototype as part of their learning process. A pre-test/post-test design was employed to assess changes in proficiency, and students also provided feedback on the tool’s usability and impact. The results showed a consistent improvement in proficiency across all classes. A strong positive correlation was found between students’ feedback and their proficiency improvement, suggesting that students who rated the prototype as Very Helpful were more likely to see significant learning gains. However, the correlation between time spent using the tool and proficiency improvement was minimal, indicating that the quality of engagement with the tool was more important than the duration of usage. These findings highlight the prototype’s potential to improve vocational learning outcomes and underscore the importance of user satisfaction in driving success, with future refinements necessary to ensure the tool’s broader effectiveness across different learning contexts.
Klasifikasi Radio Siaran FM Berdasarkan Data IQ Menggunakan Convolutional Neural Networks Sukarno, Agus; Setyanto, Arief; Nasiri, Asro
JURNAL INFORMATIKA DAN KOMPUTER Vol 9, No 3 (2025): Oktober 2025
Publisher : Lembaga Penelitian dan Pengabdian Masyarakat - Universitas Teknologi Digital Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26798/jiko.v9i3.1978

Abstract

Pengawasan spektrum siaran FM secara real-time memerlukan teknik canggih, pendekatan berbasis klasifikasi sinyal telah terbukti meningkatkan ketepatan deteksi dibandingkan metode manual. Penelitian ini mengembangkan dan membandingkan tiga arsitektur deep learning - CNN 5-Layers, CNN-BiLSTM, dan CNN-Transformer - untuk mengklasifikasikan pengguna siaran radio FM berdasarkan data IQ. Data sinyal dikumpulkan dari 16 pemancar FM menggunakan SDR dan diolah menjadi 80.000 sampel seimbang. Model-model ini dievaluasi berdasarkan akurasi klasifikasi dan waktu inferensi. Hasil eksperimen menunjukkan bahwa CNN-BiLSTM memberikan akurasi tertinggi sebesar 98,96% namun dengan waktu inferensi relatif lama sekitar 62 detik. Sementara itu, CNN 5-Layers memiliki waktu klasifikasi tercepat sekitar 10 detik dengan akurasi tinggi sebesar 98,18%, dan CNN-Transformer paling lambat sekitar 120 detik dengan akurasi sebesar 97,72%. Mengingat waktu klasifikasi per batch harus lebih pendek daripada laju pengambilan data sekitar 2 ms per sampel, hanya CNN 5-Layers yang memenuhi persyaratan pemantauan spektrum secara real-time.
Penilaian Investasi Teknologi Informasi STMIK Indonesia Padang Menggunakan Val IT Framework 2.0 Domain Investment Management (IM) Gusman, Anisya; Winarno, Wing Wahyu; Nasiri, Asro
The Indonesian Journal of Computer Science Vol. 11 No. 1 (2022): The Indonesian Journal of Computer Science
Publisher : AI Society & STMIK Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33022/ijcs.v11i1.3026

Abstract

IT investment is an investment that can be made to increase resources from IT expenses by utilizing these expenditures to achieve the expected value. In measuring IT values in a business context, one methodology that can be used is Val IT. Val IT has three domains, one of which is Investment Management (IM). The results obtained at STMIK Indonesia Padang in developing and evaluating the concept of business case programs are still at level 2 where this means the campus has built a business case but is still unclear. But overall, STMIK Indonesia Padang is at level 3 where this is at the defined level so that STMIK Indonesia Padang is increasingly aware of the importance of managing changes and procedures carried out have been passed, documented and communicated. But at the implementation stage it is still individual.
Evaluasi Sistem Informasi Menggunakan Technology Acceptance Model dengan Penambahan Variabel Eksternal Andriani, Ria; Setyanto, Arief; Nasiri, Asro
Jurnal Teknologi Informasi dan Ilmu Komputer Vol 7 No 3: Juni 2020
Publisher : Fakultas Ilmu Komputer, Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25126/jtiik.202073850

Abstract

Dalam rangka pengelolaan akademik, sebelum mengikuti perkuliahan mahasiswa wajib untuk mengisi KRS. KRS (Kartu Rencana Studi) berfungsi untuk mengelola mata kuliah yang akan diambil pada Semester yang bersangkutan oleh mahasiswa, pengisian KRS dilakukan menggunakan akun yang telah diberikan oleh pihak kampus dengan cara masuk menggunakan identitas berupa Nomor Induk Mahasiswa dan kata sandi, mahasiswa dapat melakukan pengisian Kartu Rencana Studi dari manapun dengan informasi yang telah disediakan pada website, sehingga dapat dikatakan bahwa Sistem KRS merupakan penjembatan antara mahasiswa dengan pengelola dalam hal ini bagian akademik di Universitas Amikom. Pada penelitian ini penulis melakukan evaluasi tingkat penerimaan mahasiswa terhadap sistem KRS online yang telah diimplementasikan dengan jumlah responden yang digunakan sebanyak 200 mahasiswa, adapun model yang digunakan adalah Technology Acceptance Model (TAM) yang dimodifikasi dengan menambahkan Eksternal variabel berupa kemudahan akses dan kenyamanan tempat. Penelitian ini melakukan pengkajian terhadap penerimaan pengguna berdasarkan variabel yang terdapat pada Technology Acceptance Model diantaranya adalah  Kemudahan Penggunaan/ Perceived Ease Of Use (PEOU), Manfaat yang dirasakan / Perceived Usefulness (PU), Sikap Terhadap Penggunaan Attitude Toward Using (ATT) dan Penerimaan Teknologi/ Acceptance Of Technology (AOT).Hasil dari penelitian ini didapatkan pengaruh yang signifikan antara variabel PEOU terhadap PU dengan nilai 0,356, PEOU terhadap ATT dengan nilai 0,251, PU terhadap ATT dengan nilai 0,578, ATT terhadap AOT dengan nilai 0,337, Ext terhadap PEOU dengan nilai 0,263, Ext terhadap PU dengan nilai 0,233 sedangkan PU terhadap AOT tidak terdapat pengaruh yang siginifikan dengan nilai sebesar 0,169. Hasil dari analisis data yang didapatkan bahwa penerimaan sistem KRS online dipengaruhi oleh faktor kemudahan penggunaan sistem, kemudahan akses, kenyamanan tempat serta sikap perilaku mahasiswa dalam menggunakannya.  AbstractIn the context of academic management, before attending lectures students are required to fill KRS. KRS (Study Plan Card) functions to manage courses that will be taken in the relevant semester by students, filling in KRS using the account given by the campus by entering using an identity in the form of a Student Identification Number and password, students can fill in the Card Study Plan from anywhere with information that has been provided on the website, so that it can be said that the Card Study Plan System is a bridge between students and managers in this case the academic section at the University of Amikom.In this study the authors evaluated the level of student acceptance of the Card Study Plan online system that has been implemented with the number of respondents used by 200 students, while the model used is the Technology Acceptance Model (TAM) which was modified by adding External variables in the form of ease of access and comfort of the place. This study examines user acceptance based on variables contained in the Technology Acceptance Model including Ease of Use / Perceived Ease of Use (PEOU), Perceived Usefulness (PU), Attitudes Towards Attitude Toward Using (ATT) and Technology Acceptance / Acceptance Of Technology (AOT).The results of this study found a significant influence between PEOU variables on PU with a value of 0.356, PEOU on ATT with a value of 0.251, PU on ATT with a value of 0.578, ATT on AOT with a value of 0.337, Ext on a PEOU with a value of 0.263, Ext on PU with a value 0.233 while PU on AOT did not have a significant effect with a value of 0.169. The results of data analysis found that the acceptance of the online KRS system is influenced by the ease of use of the system, ease of access, comfort of the place and the attitude of students' behavior in using it.