Claim Missing Document
Check
Articles

Found 20 Documents
Search

Empowering Indonesian MSMEs: Bridging the digital divide through e-commerce Surbakti, Feliks Prasepta Sejahtera
Community Empowerment Vol 10 No 6 (2025)
Publisher : Universitas Muhammadiyah Magelang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31603/ce.13521

Abstract

Micro, Small, and Medium Enterprises (MSMEs) play a vital role in the Indonesian economy, yet comprehensive e-commerce adoption remains low. This community service initiative aimed to facilitate the digital transformation of MSMEs by enhancing awareness and skills in the integration of e-commerce and artificial intelligence (AI). The implementation method included a national webinar, “Forum Digitalk”. The results demonstrated an 80% increase in public awareness regarding the digital transformation of MSMEs, along with a positive shift in participants' attitudes towards utilizing technology. This initiative recommends advanced training, government policies supporting technology adoption, and mentorship programs to ensure the sustainability of MSME digital transformation, including the integration of social commerce and artificial intelligence applications, to maintain competitiveness in the future marketplace.
Training on Tips and Tricks to Avoid Online Scams in the West Java 1 Electoral District Surbakti, Feliks Prasepta Sejahtera
International Journal of Research in Community Services Vol. 6 No. 2 (2025)
Publisher : Research Collaboration Community (Rescollacom)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46336/ijrcs.v6i2.801

Abstract

The rise of online fraud has become a pressing issue in today's digital society, affecting individuals and communities across various sectors. This community service initiative aims to increase public awareness and equip participants with effective strategies to avoid falling victim to online scams. The program specifically focuses on addressing common fraud types such as phishing, identity theft, and fraudulent e-commerce activities. The implementation method involved conducting an interactive online training session, leveraging digital platforms to reach a broader audience efficiently. The training included presentations, case studies, and simulations to help participants recognize potential threats and adopt preventive measures. Topics covered ranged from identifying warning signs of fraud, securing personal data, to utilizing cybersecurity tools such as multi-factor authentication and safe browsing practices. The results demonstrated a significant improvement in participants' understanding of online fraud risks and their ability to apply preventive strategies in real-life scenarios. Post-training surveys indicated increased confidence in identifying and avoiding online scams, as well as a commitment to sharing the knowledge with their communities. This initiative highlights the importance of education and technology in combating online fraud and serves as a replicable model for fostering digital safety awareness in diverse communities. The outcomes contribute to creating a more informed and secure digital environment.
EDUKASI PERLINDUNGAN DATA PRIBADI DALAM LAYANAN PUBLIK PADA MASYRAKAT DAERAH PEMILIHAN PAPUA Surbakti, Feliks Prasepta Sejahtera
Jurnal AbdiMas Nusa Mandiri Vol. 7 No. 2 (2025): Periode Oktober 2025
Publisher : LPPM Universitas Nusa Mandiri

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33480/abdimas.v7i2.6228

Abstract

The protection of personal data has become a critical concern in Indonesia, particularly with the increasing cases of data breaches involving healthcare platforms and government institutions. In public services, safeguarding personal data is vital to maintaining citizens’ trust in government systems. This community service program aims to enhance public and stakeholder awareness of regulations, digital technologies, and best practices in personal data protection. Activities were carried out through an educational approach, including seminars and hands-on training. The materials covered the urgency of personal data protection, relevant Indonesian regulations such as Law No. 27 of 2022, and practical digital security techniques such as two-factor authentication, full encryption, and safe internet practices. The results indicated a significant improvement in participants’ understanding of personal data protection and their ability to apply digital security measures. Participants also received technical guidance on the use of emerging technologies, including biometric authentication and secure password management. In conclusion, effective personal data protection in public services requires not only strong legal frameworks but also continuous public engagement through education and technology adoption. This program contributes to building a safer and more trustworthy digital ecosystem in Indonesia and serves as a replicable model for enhancing digital literacy in public institutions.
Digital Safety Education for the Constituents of West Nusa Tenggara Electoral District 2 Surbakti, Feliks Prasepta Sejahtera
Jurnal Pengabdian UNDIKMA Vol. 6 No. 3 (2025): August
Publisher : LPPM Universitas Pendidikan Mandalika (UNDIKMA)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33394/jpu.v6i3.16374

Abstract

This community service aims to provide the public with practical knowledge and skills in cybersecurity, focusing on securing digital devices, digital identities, and managing digital footprints. The method used involved interactive seminar-based training and case simulations. Participants were trained to understand various types of cyber threats, recognize digital scams, and implement security measures such as using strong passwords, two-factor authentication, full encryption, and antivirus software. Additionally, participants were encouraged to manage their digital footprints responsibly to minimize the risk of privacy violations. To evaluate the effectiveness of the program, a structured instrument in the form of pre-test and post-test questionnaires was used. The instrument measured participants’ understanding of key cybersecurity concepts and safe digital practices. The data collected were analyzed using descriptive statistics, specifically by comparing the average scores before and after the training to determine the extent of knowledge improvement. The results of this program showed a significant improvement of 35% in participants’ awareness and understanding of digital security. In conclusion, this program successfully enhanced participants’ digital literacy in cybersecurity and contributed to building a safer digital ecosystem in Indonesia.
Pengabdian Masyarakat sebagai Narasumber dalam Webinar Ngobrol Bareng Legislator Untuk Peningkatan Kesadaran Perlindungan Data Pribadi Surbakti, Feliks Prasepta Sejahtera
Jurnal Pengabdian Masyarakat Charitas Vol. 4 No. 02 (2024): Jurnal Pengabdian Masyarakat Charitas
Publisher : Program Studi Teknik Industri, Fakultas Teknik, Universitas Katolik Indonesia Atma Jaya Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25170/charitas.v4i02.5950

Abstract

With the growing digital transformation, ensuring cybersecurity has become crucial, especially concerning personal data protection. This event, titled "Jangan Asal Sebar Data Pribadi," aimed to raise awareness about the legal framework and best practices for safeguarding personal data in Indonesia. The discussion, held on March 1, 2023, covered key regulations such as the Personal Data Protection Law (UU No. 27 of 2022), which sets strict penalties for unauthorized dissemination of personal information. The session also introduced the "8 Digital Safety Indicators," which include managing privacy on social media, reporting misuse, disabling geographic tracking, and adopting strong password practices. These steps, along with utilizing antivirus software and twofactor authentication, are essential in protecting individuals from phishing, malware, and data theft. The event concluded with actionable solutions to mitigate common cyber threats like fake APK files sent through messaging apps. This seminar underscored the importance of digital literacy and vigilance in maintaining cybersecurity and emphasized the need for individuals and organizations to implement robust data protection strategies. The discussion highlighted the growing importance of safeguarding personal data to prevent security breaches and protect privacy.
Risk Mitigation on Metalworking Oil & Fluids Business Process by Integrated House Of Risk (HOR) and Fishbone Diagram Approach Natalia, Christine; Oktavia, Chendrasari Wahyu; Silaban, Sonia Artha Ria; Surbakti, Feliks Prasepta Sejahtera
Metris: Jurnal Sains dan Teknologi Vol. 22 No. 02 (2021): Desember
Publisher : Prodi Teknik Industri, Fakultas Teknik - Universitas Katolik Indonesia Atma Jaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25170/metris.v22i02.3040

Abstract

Business processes take an essential role in creating strategic goals for every company. However, It is not easy things in current condition. In the business process, every company has many vulnerable activities to risk. This research was conducted in the company engaged in the manufacturing industry that produces and supplies metalworking oils & fluids. So far, the company has experienced risk events such as late production and late delivery. This research aims to analyse and design the risk mitigation strategies of the company’s supply chain by using House of Risk and Fishbone Diagram approaches. By integrating these two methods, the root of the risk agent can be specifically identified and make it easier to design risk mitigation strategies. The purpose of this research is to analyse and design a risk mitigation strategy using the integrated HOR and Fishbone Diagram approach in the supply chain of a metalworking oils & fluids company. This research indicates twenty risk events, six priority risk agents, sixteen root of risk agents, and six priority mitigation strategies. The six priority mitigation strategies include implementing reward and punishment for better SOP, starting with briefing every day before activities, providing regular training to the employees, hiring great employees, establishing employee performance appraisal effectively, and maintaining machines preventively.
Understanding Effective Use of Big Data: Challenges and Capabilities (A Management Perspective) Surbakti, Feliks Prasepta Sejahtera
Metris: Jurnal Sains dan Teknologi Vol. 23 No. 01 (2022): Juni
Publisher : Prodi Teknik Industri, Fakultas Teknik - Universitas Katolik Indonesia Atma Jaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25170/metris.v23i01.3274

Abstract

While prior research has provided insights into challenges and capabilities related to effective Big Data use, much of this contribution has been conceptual in nature. The aim of this study is to explore such challenges and capabilities through an empirical approach. Accordingly, this paper reports on a multiple case study approach, involving eight organizations from the private and public sectors. The study provides empirical support for capabilities and challenges identified through prior research and identifies additional insights viz. problem-driven approach, time to value, data readiness, data literacy, data misuse, operational agility, and organizational maturity assessment.
The Application of Sentiment Analysis on Customers Responses in Social Media (Case Study: Indihome and First Media Internet Service Provider) Surbakti, Feliks Prasepta Sejahtera; Ginting, Andi Arifta
Metris: Jurnal Sains dan Teknologi Vol. 23 No. 02 (2022): Desember
Publisher : Prodi Teknik Industri, Fakultas Teknik - Universitas Katolik Indonesia Atma Jaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25170/metris.v23i02.4150

Abstract

The development of technology in industry 4.0 era leads to a digitalization process which is marked by the emergence of the internet as one of the important enablers. Indihome and Firstmedia are the most popular Internet Service Providers) ISPs in Indonesia in providing internet services. These two companies certainly have competition in winning the hearts of customers. One of the important factors in this business competition is customer response in the form of reviews which are usually done through social media tools such as Twitter. For this reason, it is important to study how the customer responds in the form of a given sentiment. Sentiment analysis can be a way to study customer responses to products and services. Sentiment Analysis is a method that is part of Big Data in Data Science which is useful for assessing sentiment in the form of positive or negative sentiments. The data collected was 1000 tweets for each ISP which will be processed with the help of Rstudio. The processing results obtained 177 positive tweets, 489 neutral, and 334 negative tweets for indihome while firstmedia obtained 620 positive tweets, 222 neutral tweets, and 158 negative tweets. The result is firstmedia ISPs get a better positive response and the number of complaints is less than indihome. Internet service providers (ISPs) can improve product and service quality by creating a single database system and also implementing the service design blueprint.
Edukasi Keamanan Siber Berdigital dengan Aman Surbakti, Feliks Prasepta Sejahtera
Prima Abdika: Jurnal Pengabdian Masyarakat Vol. 4 No. 4 (2024): Volume 4 Nomor 4 Tahun 2024
Publisher : Program Studi Pendidikan Guru Sekolah Dasar Universitas Flores Ende

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37478/abdika.v4i4.4967

Abstract

The rapid development of digital technology in Indonesia has heightened the need for cybersecurity education to safeguard individuals against prevalent digital fraud. This community service initiative, titled "Cybersecurity: Safe Digital Practices," aims to raise awareness and educate participants about key aspects of digital security. The program covers the fundamentals of cybersecurity, including digital fraud detection, device security, identity protection, and understanding digital footprints. The implementation involved interactive workshops that addressed common cyber threats and equipped participants with practical strategies for safe digital engagement. Methodologies included presentations on real-life cyber-attack cases, discussions on digital fraud tactics such as phishing, pharming, and sniffing, and hands-on sessions for using security tools like two-factor authentication, fingerprint authentication, and device tracking. Participants were encouraged to engage actively, allowing for the immediate application of learned strategies. Results indicate an increased awareness and capability among participants to recognize and counteract digital fraud. Through post-program evaluations, participants reported a significant improvement in their confidence and ability to protect personal information and secure digital devices. In conclusion, this program effectively enhanced the cybersecurity skills of the participants. It is recommended that future programs expand to include more advanced topics, such as cybersecurity for small businesses and data privacy laws. Continued collaboration with educational institutions and community organizations can further disseminate cybersecurity knowledge across broader demographics, ensuring safer digital practices at the community level.
People Development Dengan Metode Business Process Improvement (Studi Kasus: PT. XYZ) Surbakti, Feliks Prasepta Sejahtera; Alfonso, Pedro
Jurnal Teknik Industri Terintegrasi (JUTIN) Vol. 6 No. 4 (2023): Oktober
Publisher : LPPM Universitas Pahlawan Tuanku Tambusai

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31004/jutin.v6i4.19430

Abstract

PT. XYZ intends to create a Human Resources Information System (HRIS), requiring HR master data. During the formation of HR master data, many errors were found in the business processes within it, necessitating corrections. The numerous errors in HR business processes have hindered the creation of the Human Resources Information System (HRIS) system. Business process improvements are carried out in the recruitment and people development modules. Improving business processes is the initial step in creating master data to be used in the Human Resources Information System (HRIS) system. Business process improvements begin with the identification of business processes, evaluation of business processes, and proposing business process improvements. The evaluation of business processes is done using the business process improvement method and the ESIA (Eliminate, Simplify, Integrate, Automate) technique. The proposed business processes for recruitment and people development show significant differences in the number of activities and the flow of processes performed