Claim Missing Document
Check
Articles

Found 1 Documents
Search
Journal : CommIT (Communication

Data Monetization Service Development Using Iterative Lifecycle Framework, Quality Assurance, and Open Web Application Security Project: A Case Study of a Utility Company in Indonesia Kusuma Atmaja, Wahyu Haris; Warnars, Harco Leslie Hendric Spits; Gaol, Ford Lumban; Soewito, Benfano
CommIT (Communication and Information Technology) Journal Vol. 18 No. 2 (2024): CommIT Journal
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/commit.v18i2.10293

Abstract

The research aims to provide Data Monetization (DM) services for an Indonesian utility company as a pilot to generate additional revenue beyond the primary operation. The service is built using an iterative development lifecycle framework and evaluated based on five Quality Goals (QGs), including application and security testing activities. The framework includes methods for processing and modeling electricity usage data, testing application quality, checking infrastructure quality, and ensuring access security for front-end and back-end applications using the Open Web Application Security Project (OWASP). For data modeling, Support Vector Regression (SVR) is used, and it outperforms Polynomial Regression (PR) and Multi-Layer Perception (MLP) Neural Networks. Furthermore, QG shows strong performance with an Relative Root Mean Squared Error (RRMSE) value < 10%, high forecasting ability with Mean Average Probability Error (MAPE) < 10%, and a near-zero average error rate (Mean Squared Error (MSE)) square using minimal data from four months. The services go through functional and integration test to ensure product quality and application performance, which results in a minimum of 95% service response in throughput, 0.128 seconds for processing 2,000 requests, stability at 300–500 in one second per hour, and 7–21 seconds during peak hours. Additionally, the service passes nine penetration tests and ten vulnerability assessments using the OWASP top 10:2021 category. Based on the comprehensive testing and evaluation results, both the application and the service are considered ready and secured for deployment.
Co-Authors Achmad Imam Kistijantoro Adrian Randy Pratama Adrian Setyawan Afrilia Astari Agung A. Pramudji Agung Trisetyarso Alam, Sirojul Andhika Prasetyo Andy Julianto Antoine Doucet Arif Fahrudin Arif Fahrudin Assiroj, Priati Aswan Supriyadi Sunge Benaya Oktavianus Oktavianus Benfano Soewito Benfano Soewito Bobi Kurniawan, Bobi Calvin Leonardo Christopher Samuel Christy, Jessica Damayanti, Damayanti Darren Kent Jeremy, Darren Kent Dedy Prasetya Kristiadi Dodick Zulaimi Sudirman Edi Abdurachman Edi Abdurachman Endang Kusnadi Endang Kusnadi Epafras Suria, Epafras Erick Erick Erick Fernando Ersa Andhini Mardika Evan Fabian Rahardja Fauzi Megantara Ferry Sudarto Ford Lumban Gaol Ford Lumban Gaol Ford Lumban Gaol Ford Lumban Gaol, Ford Lumban Gilbert Xervaxius Naphan Hesananda, Rizki Hintarsyah, Aristo Putramasi Ida Farida Ignasius Raffael Santoso Joshua Dylan Jovano Edmund Friry Junaidi Junaidi Kevin Dynata Kevin Renalda Kharis Munawar Kiyota Hashimoto Kusuma Atmaja, Wahyu Haris Lukman Adyana Megantara, Fauzi Melvin Ismanto Meyliana Meyliana Meyliana, M. Muhammad Farrel Pramono Muhammad Naufal Mu’azzi Naufal Rayfi Hafizh Nizirwan Anwar Nuruliyani, Nuruliyani Po Abas Sunarya Pramudito, Dendy K. Priati Assiroj Rakhmat Arianto Randy Dwi Raymond Sunardi Oetama Richard Randriatoamanana Safrizal Safrizal Salicca Dewi Rahajeng Sandi Martono Sianipar, Nesti Fronika Siti Julianingsih Nurfitriyani suaidah suaidah Sudaryono Sudaryono Sugiarto, Dian Suharjo, Bambang Suroto Adi Tanty Oktavia, Tanty Wibowo, Adi Winarno Winarno Wiranto Herry Utomo Worapan Kusakunniran Yaya Heryadi Yaya Heryadi Yulia Lanita Zaki Izzani Akbar