Meditya Wasesa
School of Business and Management, Institut Teknologi Bandung, Indonesia

Published : 2 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 2 Documents
Search

Segmentation using Customers Lifetime Value: Hybrid K-means Clustering and Analytic Hierarchy Process Radit Rahmadhan; Meditya Wasesa
Journal of Information Systems Engineering and Business Intelligence Vol. 8 No. 2 (2022): October
Publisher : Universitas Airlangga

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20473/jisebi.8.2.130-141

Abstract

Background: Understanding customers’ electricity consumption patterns is essential for developing predictive analytics, which is needed for effective supply and demand management. Objective: This study aims to understand customers’ segmentation and consumption behaviour using a hybrid approach combining the K-Means clustering, customer lifetime value concept, and analytic hierarchy process. Methods: This study uses more than 16 million records of customers’ electricity consumption data from January 2019 to December 2020. The K-Means clustering identifies the initial market segments. The results were then evaluated and validated using the customer lifetime value concept and analytical hierarchy process. Results: Three customer segments were identified. Segment 1 has 282 business customers with a total capacity of 938,837 kWh, peak load usage of 27,827 kWh, and non-peak load usage of 115,194 kWh. Segment 2 has 508,615 business customers with a total capacity of 4,260 kWh, a peak load of 35 kWh, and a non-peak load of 544 kWh. Segment 3 has 37 business customers with a total capacity of 2,226,351 kWh, a peak load of 123.297 kWh, and a non-peak load of 390,803. Conclusion: A business strategy that could be taken is to base customer relationship management (CRM) on the three-customer segmentation. For the least profitable segment, aside from retail account marketing, a continuous partnership program is needed to increase electricity consumption during the non-peak period. For the highly and moderately profitable segments, a premium business-to-business approach can be applied to accommodate their increasing energy consumption without excessive electricity use in the peak period. Special account executives need to be deployed to handle these customers.
Managing Inherent IT Business Risk against Cyber Threats: a Decision Analysis Case Study of an Oil and Gas Company I Wayan Novit Marhaendra Putra; Meditya Wasesa
International Journal of Advances in Data and Information Systems Vol. 5 No. 1 (2024): April 2024 - International Journal of Advances in Data and Information Systems
Publisher : Indonesian Scientific Journal

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59395/ijadis.v5i1.1315

Abstract

XYZ, an anonymized oil and gas company, aims to enhance cyber resilience by strategically managing inherent risk profiles in cybersecurity, aligned with business needs and stakeholder expectations. This research addresses challenges including Information Security Control determination, proficiency improvement in risk management, and ISMS preparedness. Additionally, it tackles procurement strategy for Security Operations Control across XYZ Group, operating under PSC Gross Split, Cost Recovery, and Non-PSC statuses. Utilizing diverse frameworks such as problem tree analysis, stakeholders’ power-interest matrix, MITRE ATT&CK, NIST 800-53, COBIT 2019, ISO 27005:2022, KAMI 5.0, and SMART, data analysis includes risk documents, interviews, and cyber-attack data. The research establishes effective IS Control for risk mitigation, readiness for Information Security Management System ISMS implementation, strategic programs enhancing risk management capability, and refined Security Operations Control procurement. These outcomes, incorporated into a collaborative contract structure, significantly mitigate cyber threats and potential impacts, such as disruptions to operations, revenue reduction, increased costs, data theft, and non-compliance.