Claim Missing Document
Check
Articles

Found 8 Documents
Search

Understanding Zalora's Neuromarketing-Based Online Marketplace Customer Choices Rizal, Saepul; Pasaribu, Popy Novita; Sutisna, Nandang
INOVATOR Vol 12 No 2 (2023): SEPTEMBER
Publisher : prodima@fe.uika-bogor.ac.id

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32832/inovator.v12i2.17633

Abstract

The development of the internet has popularized Digital commerce (e-commerce). There are various types online marketplaces with unique customer bases. Customers develop preferences or choices for certain online marketplaces over competitors. This research is to find out the choice variables that can influence. This study looks at online parameters that affect user experience when shopping. Included in this research are the discoveries of neuroscience, a type of limbic system that is basically similar to a client's personality. Descriptive analysis was used to analyze the customer's limbic personality, and regression analysis using the SPSS application was used for online shopping attitudes. The research subject is an online shop with Zalora marketplace. The author uses the snowball method to collect data into Google Forms. The total of all respondents is 36 people. Zalora types of emotional types found as joy and pleasure. Zalora Limbic Map is a fantasy/entertainment system for balance. The most important aspects of brand identity are interaction, quality of information, usability, entertainment and personalization of customer preferences when shopping with Zalora. The SPSS partial test results show that the personalization variable significantly influences Zalora's marketplace preferences. In addition, the usability variable and the domain name affect it negatively, although not significantly. The model can explain consumer preferences for the Zalora marketplace by 63.7%.
Implementasi Private Cloud Menggunakan Metode Zero Trust Dan IP Public Dinamis Pada PT. Elnusa Sentra Bajatama Mufid, Ahmad Raihan; Setiawan, Kiki; Sutisna, Nandang
INTECOMS: Journal of Information Technology and Computer Science Vol 7 No 5 (2024): INTECOMS: Journal of Information Technology and Computer Science
Publisher : Institut Penelitian Matematika, Komputer, Keperawatan, Pendidikan dan Ekonomi (IPM2KPE)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31539/intecoms.v7i5.11760

Abstract

Perkembangan teknologi informasi menyebabkan perubahan signifikan dalam penyimpanan data perusahaan. PT. Elnusa Sentra Bajatama, yang bergerak di bidang penyedia alat rancah, saat ini menggunakan hardisk dan flashdisk pada komputer karyawan sebagai media penyimpanan. Namun, metode ini rentan terhadap kehilangan data akibat kerusakan perangkat dan tidak adanya infrastruktur penyimpanan yang memadai, sehingga memungkinkan akses tanpa izin terhadap data perusahaan. Penelitian ini bertujuan untuk mengimplementasikan Private Cloud Storage sebagai solusi penyimpanan data terpusat dan aman, dengan menggabungkan konsep Zero Trust dan IP Publik Dinamis. Data penelitian mencakup jumlah pengguna dan perangkat kantor yang akan mengakses cloud storage. Pendekatan ROCCA digunakan sebagai model implementasi sistem, meliputi tahapan analisis, perencanaan, adopsi, migrasi, dan pengelolaan. Hasil penelitian menunjukkan bahwa penggunaan Nextcloud sebagai private cloud storage berhasil diterapkan di lingkungan perusahaan. Kombinasi Zero Trust dan IP Publik Dinamis terbukti optimal dalam memperkuat keamanan akses server. Dapat disimpulkan bahwa implementasi ini menawarkan solusi efektif dan aman untuk penyimpanan data perusahaan, mengurangi risiko kehilangan data dan akses tanpa izin.
The Influence of Competency, SOP, and Information Technology on Employee Performance in Using the Ideaprocs Application in BUMD Rizal, Saepul; Ramly, Amir Tengku; Firdaus, M. Aziz; Sutisna, Nandang; Rasiban, Rasiban
Indonesian Interdisciplinary Journal of Sharia Economics (IIJSE) Vol 8 No 1 (2025): Sharia Economics
Publisher : Sharia Economics Department Universitas KH. Abdul Chalim, Mojokerto

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31538/iijse.v8i1.5655

Abstract

Human resources (HR) are very much needed in this increasingly advanced modern era, employees play an important role in running the system in the company which includes the company's vision, mission, and goals. HR also plans and acts actively in all Company functions related to technological progress and advancement. The purpose of this study is to analyze "The Effect of Competence, SOP, and Information Technology on Employee Performance in Using the IdeaProcs Application in BUMD". The research method used is a quantitative research method using a purposive technique as a method of determining the sample based on certain considerations to determine a sample of 61 employees and distribute questionnaires using Google form and analyze using number processing software. The results of the study based on the results of the analysis using number processing software that the significance value is 0.000 <0.05 and the calculated F value is 46.502> F table 2.77, so it can be concluded that there is a significant influence of the Competence variables (X1), SOP (X2) and Information Technology (X3) simultaneously on Employee Performance (Y) of 71.0%.
Implementasi IDS pada Jaringan Komputer Menggunakan Snort Berbasis Chatbot Telegram: Implementation of IDS on Computer Networks Using Snort Based on Telegram Chatbot Ardiyansyah, Ferry; Setiawan, Kiki; Sutisna, Nandang
MALCOM: Indonesian Journal of Machine Learning and Computer Science Vol. 4 No. 4 (2024): MALCOM October 2024
Publisher : Institut Riset dan Publikasi Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.57152/malcom.v4i4.1561

Abstract

Pada era digital ini, keamanan informasi dan perlindungan jaringan komputer sangat penting. Penggunaan internet di Indonesia mencapai 79,50% dari populasi pada tahun 2024, disertai meningkatnya ancaman siber seperti Ping of Death (POD), Nmap scanning, dan DDoS. PT Tiga Kawan Sertifikasi menghadapi tantangan dalam mengelola keamanan jaringan. Penelitian ini bertujuan mengimplementasikan sistem deteksi serangan menggunakan Snort yang terintegrasi dengan chatbot Telegram untuk notifikasi real-time. Metode penelitian mencakup konfigurasi server Ubuntu sebagai IDS dengan Snort dan penggunaan chatbot Telegram sebagai media notifikasi. Pengujian dilakukan dengan skenario pentest menggunakan server Kali Linux. Hasil pengujian menunjukkan Snort mendeteksi serangan Ping of Death dalam 4 detik, Nmap scanning dalam 3 detik, dan DDoS dalam 2 detik. Sistem berhasil mengirimkan alert pada grup Telegram, mengoptimalkan keamanan jaringan PT Tiga Kawan Sertifikasi secara efektif dan efisien. Keseluruhan hasil menunjukkan bahwa solusi ini dapat memberikan perlindungan yang lebih baik terhadap ancaman siber dan memungkinkan respons cepat terhadap insiden keamanan. Selain itu, sistem ini mempermudah administrator jaringan dalam memantau dan menangani serangan secara real-time, meningkatkan ketahanan jaringan perusahaan
Web-Based E-Procurement Development in Regional-Owned Enterprises (BUMD): An R&D Approach Sutisna, Nandang; Abdul Rahman, Titik Khawa
International Journal of Advances in Data and Information Systems Vol. 6 No. 1 (2025): April 2025 - International Journal of Advances in Data and Information Systems
Publisher : Indonesian Scientific Journal

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59395/ijadis.v6i1.1374

Abstract

This study presents the design, development, and evaluation of a web-based e-procurement system tailored to the institutional needs of a Regional-Owned Enterprise (BUMD), with a case implementation at PDAM Tirta Kahuripan. Employing a Research and Development (R&D) methodology and assessed using ISO/IEC 25010 standards, the system integrates six core procurement modules—e-Planning, e-Budgeting, e-Preparation, e-Sourcing, e-Contracting, and e-Inventory—alongside a Vendor Management System (VMS) to enhance procurement transparency and supplier accountability. System testing involved both quantitative and qualitative assessments. Functionality and reliability achieved perfect scores (100%), usability scored 79 based on a System Usability Scale (SUS) survey completed by 20 procurement personnel, and maintainability recorded a moderate index of 82.85 based on PHP Metrics analysis. Efficiency testing using GTMetrix resulted in a Grade C, indicating areas for performance optimization. These findings demonstrate that the system is both technically robust and operationally relevant, offering a replicable model for digital procurement reform in decentralized public institutions. The study contributes to interdisciplinary knowledge across software engineering, public sector management, and procurement governance, with implications for future integration, scalability, and policy adoption in similar institutional contexts.
Contextualizing Procurement Maturity: Lessons from Government Procurement for Enhancing Regional-Owned Enterprise (BUMD) Performance Sutisna, Nandang; Rahman, Titik Khawa Abdul; Bin Mansor, Shazali
International Journal of Multidisciplinary Approach Research and Science Том 3 № 02 (2025): International Journal of Multidisciplinary Approach Research and Science
Publisher : PT. Riset Press International

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59653/ijmars.v3i02.1568

Abstract

Procurement governance represents a strategic function critical to the success of public organizations, particularly Regional-Owned Enterprises (BUMDs), which operate under hybrid mandates combining public service delivery and market competitiveness. This study critically examines the applicability of the Indonesia Procurement Maturity Model (IPM2) to BUMDs and proposes an adapted conceptual framework better suited to their unique governance complexities. Through analytical deconstruction, the study finds that while elements such as transparency, accountability, and technology utilization in IPM2 are directly adoptable, significant adjustments are necessary in organizational structures, competency frameworks, and risk management approaches. Rigid elements tied to governmental budget cycles and inspectorate-driven oversight are deemed incompatible with BUMD operational realities. An adapted maturity model is proposed, positioning procurement as a strategic enabler supported by five interconnected adaptive dimensions: Strategic Human Capital Development, Agile Institutional Structures, Performance-Driven Management Systems, Strategic Technological Integration, and Proactive Risk and Opportunity Management. Grounded in contingency theory and contemporary hybrid governance literature, the model reframes procurement maturity as a dynamic, value-driven system rather than a linear, compliance-oriented progression. This research offers both a practical roadmap for BUMDs and a conceptual contribution to the evolving field of procurement governance in hybrid public organizations.
Prediksi Motif Batik dengan Menggunakan Metode Gabor Filter Convolution Neural Network Bili, Yudisman Ferdian; Tundo; Sutisna, Nandang; Putri, Atsilah Daini; Yuliantoro, Dita Tri; Nurmayanti, Laily
Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) Vol 9 No 3 (2025): JULI-SEPTEMBER 2025
Publisher : Lembaga Otonom Lembaga Informasi dan Riset Indonesia (KITA INFO dan RISET)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/jtik.v9i3.3798

Abstract

This research aims to develop a batik motif classification system by utilizing Convolutional Neural Network (CNN) and Gabor Filter, in order to increase accuracy in texture feature extraction. The batik dataset used goes through a preprocessing stage, which includes normalization and data augmentation. During training, the model was tested with 10,000 iterations, using the Adam optimizer and the Categorical Cross-Entropy loss function, and evaluated via a confusion matrix. Test results show accuracy reaching 87%, with a precision and recall value of 90% each, and an F1-score of 89%. This method has proven effective for classifying batik motifs and has the potential to be applied in the fields of education, textile industry and cultural preservation.
Pelatihan Penggunaan Tools WEKA untuk Kepentingan Proses Data Mining di ITS NU Pekalongan Tundo, Tundo; Betty Yel, Mesra; Sutisna, Nandang; Kastum, Kastum; Adrianto, Sopan
ABDINE: Jurnal Pengabdian Masyarakat Vol. 4 No. 1 (2024): ABDINE : Jurnal Pengabdian Masyarakat
Publisher : Sekolah Tinggi Teknologi Dumai

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52072/abdine.v4i1.826

Abstract

Pada pelatihan ini, penggunaan WEKA akan fokus dalam hal data mining, yang artinya pengelolahan data dan menggali data menjadi suatu knowledge dan visualisasi yang memberikan manfaat informasi yang berguna. Banyak cara dalam mengelolah data dan menggali data untuk dijadikan sebuah visual, salah satunya dengan menggunakan aplikasi WEKA, dimana cara ini juga membantu mahasiswa dalam menentukan tema skripsi yang didalamnya mengandung algoritma dan metode data mining. Bentuk cara dalam membantu mahasiswa tersebut, salah satunya yaitu memberikan pelatihan penggunaan aplikasi WEKA untuk membantu mahasiswa dalam mengelolah data dan menggali data menjadi sebuah visual dan knowledge. Pelatihan dilakukan di ITS NU Pekalongan dengan tujuan menambahkan wawasan baru kepada seluruh mahasiswa terkait proses pembuatan visualisasi data dengan WEKA. Kegiatan pelatihan ini masih fokus ke pembuatan visualisasi data berupa rule dari algoritma decision tree J48. Kegiatan dilaksanakan dalam bentuk pendampingan dan praktik dalam penggunaan aplikasi WEKA mulai dari penyampaian materi data mining dan tools WEKA, dilanjutkan praktik cara membuat visualisasi data berupa rule otomatis. Berdasarkan hasil kuesioner menunjukkan bahwa 92% peserta merasa WEKA mudah digunakan untuk proses pengolahan data dan menggali data.