Claim Missing Document
Check
Articles

Found 4 Documents
Search

Strategy Based Technology-Based Startups to Drive Digital Business Growth Safitri, Hanny; Chakim, Mochamad Heru Riza; Adiwijaya, Alfri
Startupreneur Business Digital (SABDA Journal) Vol. 2 No. 2 (2023): Startupreneur Business Digital (SABDA)
Publisher : Pandawan Sejahtera Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33050/sabda.v2i2.344

Abstract

Lean startup methodology-based strategic formulation to promote the expansion of  technology-based startup businesses in Indonesia. About 75% of developing startups fail to expand appropriately, which is a relatively high startup failure percentage. Failure of startups is influenced by time and the relevant industry. Due to the wrong approach being chosen from the startup's first year to its fourth, it was unable to expand. The goal of this study is to develop new general methods for company growth based on the lean startup approach. The goal of this study is to use the Delphi technique to find startup failure indicators, and then to select the primary failed cause using the Analytical Network Process (ANP). The research's next phase is to develop the plan after the failure factor has been determined. The researcher acquired 8 as a consequence of this study. 55 indicators of startup failure factors and factors. Using the ANP model, 10 priorities were determined. addressed by developing a new approach utilizing agile development and the minimal viable product idea. technique, human resource management, and customer relationship management. eventually acquired a fresh approach that entrepreneurs may utilize to promote growth.
AI Adoption Barriers in SMEs Analyzing Through the Technology Organization Environment TOE Framework Syahidun; Susetyono, Eko; Adiwijaya, Alfri; Madani, Muchlisina; Mustafa Kareem, Yasir
APTISI Transactions on Management (ATM) Vol 9 No 3 (2025): ATM (APTISI Transactions on Management: September)
Publisher : Pandawan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33050/h6qyfk21

Abstract

Artificial Intelligence (AI) has become a key driver of innovation, improving efficiency, decision-making, and competitiveness in businesses worldwide. However, the adoption of AI tools among Small and Medium Enterprises (SMEs), especially in developing countries like Indonesia, remains limited. This study aims to explore the barriers hindering AI adoption in SMEs in Indonesia using the Technology Organization Environment (TOE) framework. A survey was conducted among Indonesian SMEs across various sectors to capture their perceptions regarding AI implementation. The survey focused on technological, organizational, and environmental factors that influence AI adoption. The findings reveal that technological barriers, such as high implementation costs and system complexity, are significant challenges for SMEs. Organizational barriers, including limited digital literacy, a lack of skilled workforce, and resistance to change, also hinder AI adoption. Furthermore, environmental barriers like insufficient government support, regulatory uncertainty, and low market pressure constrain SMEs' adoption readiness. This study extends the TOE framework to the context of AI adoption in SMEs in developing economies. Addressing the identified barriers is essential for accelerating digital transformation and enabling SMEs to leverage AI for sustainable growth in the digital economy.
Cybersecurity in the Age of IoT and Developing Frameworks for Securing Smart Devices and Networks Rahayu, Eli Ratih; Aprillia, Ariesya; Ikhsan, Ramzi Zainum; Adiwijaya, Alfri; Kumara, Aryan
CORISINTA Vol 2 No 1 (2025): February
Publisher : Pandawan Sejahtera Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33050/corisinta.v2i1.64

Abstract

The rapid proliferation of the Internet of Things (IoT) has significantly transformed various industries, enhancing automation and efficiency. However, it has also brought forth substantial cybersecurity challenges that threaten data integrity, user privacy, and system reliability. This study proposes a multi-layered cybersecurity framework to address these vulnerabilities by integrating robust security measures such as device authentication, data encryption, continuous network monitoring, and enhanced privacy protection. Employing a mixed methods research approach, the framework was rigorously validated through real world implementation in smart home environments, demonstrating tangible improvements in security resilience. Notably, the findings indicate a 40% reduction in threat response time, a 96% intrusion detection rate, and the complete elimination of data breaches post-implementation, emphasizing the framework’s effectiveness in mitigating cyber risks. Proactively addressing security concerns, this study provides valuable insights for key stakeholders, including device manufacturers, network operators, and policymakers, guiding them toward implementing stringent cybersecurity protocols to enhance trust and compliance across IoT ecosystems. Furthermore, the results highlight the necessity for continuous adaptation and innovation in cybersecurity strategies, ensuring that IoT deployments remain resilient against evolving cyber threats. As IoT adoption continues to accelerate across sectors such as healthcare, smart cities, and industrial automation, this research underscores the critical importance of a proactive, comprehensive security approach to safeguard connected infrastructures. Ultimately, the proposed framework serves as a blueprint for strengthening IoT security governance and fostering a safer digital ecosystem, reinforcing the importance of collaborative efforts in securing the future of interconnected technologies.
Cybersecurity Strategies for Preventing Ransomware Attacks in Cloud-Based Applications Ageng Setiani Rafika; Sora Baltasar; Adiwijaya, Alfri; Riza Chakim, Mochamad Heru; Stefano Rizky, Zhask
CORISINTA Vol 2 No 2 (2025): August
Publisher : Pandawan Sejahtera Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33050/corisinta.v2i2.77

Abstract

Ransomware attacks have become a significant threat to cloud-based applications, posing severe risks to organizations' data integrity, financial stability, and operational continuity. This paper explores the challenges of securing cloud environments against ransomware, focusing on vulnerabilities such as inadequate encryption, weak access controls, and multi-tenancy risks. Through an in-depth analysis, the paper identifies the most common types of ransomware targeting cloud applications, including file encryption and data exfiltration ransomware, and discusses the security weaknesses that facilitate these attacks. The paper further evaluates existing cybersecurity strategies, such as data encryption, multi-factor authentication (MFA), and continuous monitoring, highlighting their effectiveness in preventing ransomware attacks. Based on these findings, a comprehensive framework is proposed, combining technical solutions like strong encryption and AI-based threat detection with organizational practices such as regular employee training and backup solutions. The study also emphasizes the importance of collaboration between cloud service providers and organizations to enhance overall cloud security. By adopting a multi-layered approach and integrating emerging technologies, organizations can significantly improve their resilience against ransomware threats. This research contributes to the ongoing dialogue on cloud security by providing actionable recommendations for preventing ransomware attacks and safeguarding cloud-based applications from evolving cyber threats.