Claim Missing Document
Check
Articles

Found 2 Documents
Search
Journal : JOURNAL OF INFORMATION SYSTEM RESEARCH (JOSH)

Designing an Intuitive UI/UX for Laundry and Household Cleaning Services Using a User-Centered Design Thinking Approach Tangka, George Morris William; Mambu, Joe Yuan; Putra, Edson Yahuda
Journal of Information System Research (JOSH) Vol 6 No 2 (2025): January 2025
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/josh.v6i2.6443

Abstract

The growing demand for footwear and accessory care reflects an increasing awareness of cleanliness and personal appearance. This study focuses on a cleaning service business specializing in shoes, bags, and strollers, with shoes as the primary focus. Operational challenges, including inefficient customer communication and delays due to high demand, impact customer satisfaction. Using the Design Thinking method, this research develops a user-centered User Interface (UI) and User Experience (UX) for the business's application. The Design Thinking process—empathize, define, ideate, prototype, and test—helped identify pain points and generate tailored solutions, such as improved navigation and task flow. Usability testing involved 18 participants performing key tasks, including booking services and tracking orders, with success rates and error metrics as evaluation criteria. The testing yielded a 70.6% task completion success rate, indicating improved service efficiency. However, the 54.4% misclick rate, higher than typical benchmarks for similar applications (30–40%), highlights significant navigation challenges. Future iterations will focus on refining the interface layout and enhancing task clarity to reduce errors and improve usability. These findings emphasize the value of iterative, user-centered design in addressing operational inefficiencies and enhancing the customer experience.
Classification of Indonesian Undergraduate Students’ Awareness Level of Phishing Attacks using Decision Tree Algorithm Tangka, George Morris William; Putra, Edson Yahuda
Journal of Information System Research (JOSH) Vol 6 No 4 (2025): July 2025
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/josh.v6i4.7859

Abstract

Phishing remains a dominant cyber-crime vector in higher-education settings, yet most Indonesian campus studies stop at descriptive awareness surveys. This study sets out (i) to build a fully interpretable predictive model that can classify students’ phishing-awareness levels from a concise questionnaire and (ii) to demonstrate how the model’s rules can be mapped to established behavioural theory for targeted educational intervention. Guided by the Cross-Industry Standard Process for Data Mining (CRISP-DM), we transformed a ten-item phishing-awareness instrument into a 153 × 10 binary matrix drawn from 153 undergraduate responses (82 male; 71 female) and analysed the data with a cost-complexity–pruned Classification-and-Regression Tree (CART). The optimal tree (depth = 5, 19 leaves) achieved 94.9 % accuracy, 93.4 % recall, 95.8 % precision, and a 0.971 ROC-AUC under stratified 10-fold cross-validation—metrics comparable to ensemble methods but obtained with a glass-box structure that exposes explicit IF-THEN rules. The three most salient splits—URL-domain mismatch, urgency cues, and misconceptions about the HTTPS lock icon—directly align with Protection Motivation Theory constructs, providing actionable targets for micro-learning modules. Because the dataset originates from a single campus and governance prerequisites (fairness audit, GDPR impact assessment, SOP alignment) are pending, the model will run in “shadow mode” next term to collect longitudinal evidence and monitor concept drift. Overall, the findings show that concise, theory-grounded instruments combined with pruned decision trees can achieve high predictive power and immediate pedagogical value without sacrificing transparency.