cover
Contact Name
Taqwa Hariguna
Contact Email
taqwa@amikompurwokerto.ac.id
Phone
+62895422720524
Journal Mail Official
contact@ijiis.org
Editorial Address
Puri Mersi Baru, Jl.Martadireja II, Gang Sitihingil 3 Blok A No 2, Purwokerto Timur, Jawa Tengah
Location
Kota adm. jakarta pusat,
Dki jakarta
INDONESIA
IJIIS: International Journal of Informatics and Information Systems
Published by Bright Publisher
ISSN : -     EISSN : 25797069     DOI : https://doi.org/10.47738/ijiis
Core Subject : Science,
The IJIIS is an international journal that aims to encourage comprehensive, multi-specialty informatics and information systems. The Journal publishes original research articles and review articles. It is an open access journal, with free access for each visitor (ijiis.org/index.php/IJIIS/); meanwhile we have set up a robust online platform and use an online submission system to ensure the international visibility and the rigid peer review process. The journal staff is committed to a quick turnaround time both in regards to peer-review and time to publication.
Articles 157 Documents
The Impact of Servicescape Perception on Perceived E-Commerce Value and Client Loyalty Jeffri Prayitno Bangkit Saputra
International Journal of Informatics and Information Systems Vol 4, No 3: December 2021
Publisher : International Journal of Informatics and Information Systems

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47738/ijiis.v4i3.118

Abstract

While previous research on e-servicescapes has focused on the ordinary Internet user, several studies show that heavy Internet users are the target audience. To maximize firm profitability, it is vital to understand the nature of heavy user consumption; hence, this study examines the primary components of e-servicescapes and their relationship to buy intent using moderated data from heavy and light Internet users. Three hundred and forty-two genuine internet users with online purchasing experience answered an online questionnaire, and discrepancies were determined using structural equation modeling. For ordinary users, aesthetic appeal and interaction are significant factors in purchase intention; for heavy users, interactivity is the most important attribute, followed by aesthetic appeal, layout, and functionality; and for light users, aesthetic appeal is the sole consideration. Additionally, our data show that financial stability does not help heavy, regular, or light users. We demonstrate how heavy and light Internet users evaluate e-servicescapes to signal quality attributes and contribute to their cognitive responses and purchase intentions based on their consumption traits by integrating purchase intentions with e-service quality and segmentation theory in e-servicescapes. It is advised that online merchants identify heavy and light users, rethink their current e-servicescapes, and apply more tailored marketing methods to attract and retain heavy and light users, as well as increase their purchase intent. While this study concentrated on the most salient characteristics of heavy users, more research is required to explicate additional critical mediators. This poll makes no mention of the three kinds of websites or product qualities. Finally, demographic and psychological variables such as gender and personal characteristics may act as significant mediators in the link between the e-servicescape and purchase intention, but their relevance requires more research.
The Impact of Knowledge Management on Strategic Management Practices Alghofeli, Mashael Shaye
International Journal of Informatics and Information Systems Vol 5, No 1: January 2022
Publisher : International Journal of Informatics and Information Systems

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47738/ijiis.v5i1.125

Abstract

Purpose: The study aims to assess the effect of knowledge management on strategic management in the General Administration of Education in Jeddah, Saudi Arabia. Design/methodology/approach: The research employed a quantitative method and descriptive analysis was conducted using SPSS21 and AMOS 23. The design, which has six independent variables and a single dependent variable. The study uses the questionnaire tool, a questionnaire was developed by the researcher, and distributed to a sample of 316 employees of the General Administration of Education in Jeddah in Saudi Arabia. and the questionnaire is two-part. The first is for primary verses such as age, experience, degree of employment, scientific qualification, and average income, and the second part is to address the knowledge management dimensions (knowledge distribution, knowledge acquisition, knowledge diagnosis, knowledge storage, knowledge generation, knowledge application) and its relationship to strategic management practices, the testing measurement validity and reliability could be occurred by EFA then analyzed the data by using multi regression .The study is based on the descriptive analytical approach to suit its purposes, free from reviewing and reviewing the theoretical literature on knowledge management and strategic management practices, in addition to reviewing previous relevant studies. Findings: knowledge management processes impact on Strategic Management Practices when testing the relationship between knowledge management processes and strategic management practices by structural equation modeling SEM, but the knowledge acquisition has no significant effect on strategic management practices.Research limitations/implications: The research was applied to the General Administration of Education in Jeddah, in Saudi Arabia, and the research was limited to the city of Jeddah only, and these tools can also be applied to other government institutions, especially in departments that work in providing services to the public. It is believed that knowledge management will have a role Effective if it is applied in service institutions that seek to apply strategic management to meet the increasing needs of the public.Originality/value: The paper is of theoretical and practical importance, as the theoretical importance is the literary addition to which research contributes to the theoretical enrichment of scientific literature on knowledge management and strategic management practices, The paper also has its applied importance as it deals with the effect of knowledge management on implementing strategic management practices. This will be applied in Jeddah, Saudi Arabia, which contributes to developing strategic performance based on knowledge management.
Data Mining Technology Used in an Internet of Things-Based Decision Support System for Information Processing Intelligent Manufacturing Ahmad Sulhi
International Journal of Informatics and Information Systems Vol 4, No 3: December 2021
Publisher : International Journal of Informatics and Information Systems

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47738/ijiis.v4i3.114

Abstract

In recent years, database technology has improved significantly, and database management systems have gained widespread adoption. As a result, the volume of data saved across numerous databases has increased exponentially. However, the vast majority of information is hidden beneath this mountain of data. The goal of this study is to get a comprehensive understanding of the decision information system employed in the Internet of Things for intelligent manufacturing data processing. The proposed Decision support system (DSS) information processing is accomplished through the use of an IoT-based intelligent manufacturing data mining model. Numerous DM algorithms that are frequently encountered are analyzed, including the ARS and Apriori Algorithm (AA). The Decision Tree data mining algorithm is investigated, as is the generation of several Decision Trees and the pruning algorithm for digital twins. The findings demonstrate that data mining technology is capable of analyzing statistical data from a variety of angles and perspectives by modeling, classifying, and grouping large amounts of data as well as discovering correlations between them. Additionally, statistical work involves the calculation of data and the use of their correlations to aid in decision analysis. The proposed theoretical framework demonstrates how DSS-integrated components can work cooperatively in Intelligent Manufacturing to define a stable data flow within the Internet of Things. Particular emphasis is placed on conceptualizing the decision support system's integrated performance.
A Data Hiding Method Based on Partition Variable Block Size with Exclusive-or Operation on Binary Image Yang, Chyuan-Huei Thomas; Wang, Yu-Tzu; Chen, Po-An; You, Shih-Syuan
International Journal of Informatics and Information Systems Vol 5, No 1: January 2022
Publisher : International Journal of Informatics and Information Systems

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47738/ijiis.v5i1.120

Abstract

In this paper, we propose a high capacity data hiding method applying in binary images. Since a binary image has only two colors, black or white, it is hard to hide data imperceptible. The capacities and imperception are always in a trade-off problem. Before embedding we shuffle the secret data by a pseudo-random number generator to keep more secure. We divide the host image into several non-overlapping (2n+1) by (2n+1) sub-blocks in an M by N host image as many as possible, where n can equal 1, 2, 3 , …, or min(M,N). Then we partition each sub-block into four overlapping (n+1) by (n+1) sub-blocks. We skip the all blacks or all whites in each (2n+1) by (2n+1) sub-blocks. We consider all four (n+1) by (n+1) sub-blocks to check the XOR between the non overlapping parts and center pixel of the (2n+1) by (2n+1) sub-block, it embed n 2 bits in each (n+1) by (n+1) sub-block, totally are 4*n 2 . The entire host image can be embedded 4×n 2×M/(2n+1)×N/(2n+1) bits. The extraction way is simply to test the XOR between center pixel with their non-overlapping part of each sub-block. All embedding bits are collected and shuffled back to the original order. The adaptive means the partitioning sub-block may affect the capacities and imperception that we want to select. The experimental results show that the method provides the large embedding capacity and keeps imperceptible and reveal the host image lossless.
Data Mining Integration with PostgreSQL Extension by K-Means, ID3 and 1R Method Wahyuningsih, Tri; Gunawan, I Ketut; Srenggini, Abdullah Dwi; Riyandi, Henry
International Journal of Informatics and Information Systems Vol 5, No 2: March 2022
Publisher : International Journal of Informatics and Information Systems

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47738/ijiis.v5i2.129

Abstract

Data mining is a tool that allows users to quickly access large amounts of data. The purpose of this study was to analyze the integration of data mining technique algorithms into the PostgreSQL database management system. The method used in this research is K-Means, ID3 and 1R, the tools used to implement data mining using RapidMiner and PostgreSQL tools. In this study, the number of rows to be analyzed is 100,000 records, 500,000 records, and 1,000,000 records. The results obtained are the algorithm implemented to validate the data by using an experimental design that serves to observe the time that the analysis of the algorithm that has been integrated into the DBMS is smaller than the results from Rapidminer. As the number of records increases, data analysis becomes difficult using RapidMiner.Data mining techniques, Database management system, Partition, Response time
Implementation of the Jaccard Similarity Algorithm on Answer Type Description Riyanto, Riyanto; Azis, Abdul
International Journal of Informatics and Information Systems Vol 5, No 2: March 2022
Publisher : International Journal of Informatics and Information Systems

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47738/ijiis.v5i2.130

Abstract

This study aims to measure the similarity of the answers to the description by using alternative answers as reference answers provided by the lecturer with a view to overcoming the diversity of student answers. This research focuses more on Indonesian language questions and answers by combining the jaccard similarity algorithm and keyword similarity. The results obtained indicate that by adding alternative reference answers, it can increase the correlation value to 0.78% and reduce MAE to 0.55. Likewise, after combining the jaccard similarity algorithm and keyword similarity, the correlation value increased to 0.78% and MAE decreased to 0.49.
The Naive Bayes Algorithm in Predicting the Spread of the Omicron Variant of Covid-19 in Indonesia: Implementation and Analysis Saputra, Jeffri Prayitno Bangkit; Bernarte, Racidon P
International Journal of Informatics and Information Systems Vol 5, No 2: March 2022
Publisher : International Journal of Informatics and Information Systems

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47738/ijiis.v5i2.131

Abstract

Indonesia was struck by an epidemic of the corona virus in the start of March 2020, according to official reports (covid). Indonesia continues to see a rise in the number of cases of covid-19 spreading on a daily basis. The general people are urged to engage in social distancing in order to disrupt the development of COVID-19, which has spread across Indonesia's numerous areas. For this reason, this research was undertaken as a preemptive step against the Covid-19 pandemic by estimating the extent of the Omicron variety of Covid-19's spread around the world, with a particular emphasis on Indonesia. The research methodologies employed in this study were problem analysis and literature review, as well as data gathering and execution. The Naive Bayes technique is thought to be capable of estimating the degree of COVID-19 dissemination in Indonesia. The results of the Naive Bayes method classification study revealed that 16 data from 33 data tested for Covid-19 cases per province were correctly classified with an accuracy of 46.4252 percent, while 16 data from 33 data tested for Covid-19 cases per province were misclassified with an accuracy of 46.4252 percent.
Customer Acceptance Analysis of Islamic Bank of Indonesia Mobile Banking Using Technology Acceptance Model (TAM) Wandira, Raju; Fauzi, Ahmad; Azim, Fauzan; Annas, Firdaus
International Journal of Informatics and Information Systems Vol 5, No 2: March 2022
Publisher : International Journal of Informatics and Information Systems

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47738/ijiis.v5i2.132

Abstract

This takes a look at goals to observe the elements that affect clients in the use of BSI`s cellular baking service. These elements are visible from perceived ease of use the software, the perceived usefulness through clients, and the safety supplied on attitudes and intentions in the use of cellular banking applications. The facts became received from a survey that became dispensed to 183 BSI clients with numerous financial and academic levels. The data have been analyzed with the use of Structural Equation Modeling (SEM) with AMOS software. So that effective consequences are received with a full-size impact of the perceived ease and advantages of the use of the BSI cellular banking software at the attitudes and intentions proven through clients. In addition, in phrases of security, it additionally has an effective impact on attitudes in adopting BSI mobile banking. However, the work environment, buddies, and administrative center doesn't have any full-size impact on the advantages of BSI mobile banking.
The Role of Knowledge Management in Raising the Saudi Universities Performance Efficiency: An Applied Study on the Administrative Body of King Abdulaziz University Alsharyofi, Maher Saif
International Journal of Informatics and Information Systems Vol 5, No 2: March 2022
Publisher : International Journal of Informatics and Information Systems

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47738/ijiis.v5i2.133

Abstract

This study aimed at identifying the role of knowledge management in raising the efficiency of the performance of the administrative body at King Abdulaziz University. In light of this goal, a number of hypotheses were developed and tested by preparing a questionnaire comprising two variables, namely knowledge management (information technology, organizational culture, organizational structure) and the performance of the administrative body (personal elements, performance elements, knowledge of job requirements). This study was conducted at King Abdulaziz University. The necessary information was obtained through the questionnaire tool prepared for this purpose. Data were collected from 304 individuals of the administrative body of King Abdulaziz University. The results were analyzed using correlation and regression analyzes of the SPSS program. The snowball sample method was relied upon, and the link was sent to a number of the administrative body with a recommendation for them to distribute it among their university colleagues. In light of this, 315 responses were obtained, 11 responses were excluded because they were not valid. Consequently, the responses valid for analysis were 304 questionnaires. Then the student concluded with a set of recommendations related to the research variables.
Integrating Big Data Technologies to Strengthen Network Security Awareness Hariguna, Taqwa
International Journal of Informatics and Information Systems Vol 5, No 3: September 2022
Publisher : International Journal of Informatics and Information Systems

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47738/ijiis.v5i3.137

Abstract

The Network Security Alarm Warning System (NSAWS) is a sophisticated, real-time, large-scale database management system designed to enhance cybersecurity by analyzing user identity data and access rights within the amassed information to detect potential threats and issue timely alarm notifications. This paper explores methods to bolster network attack prevention in a Big Data framework, starting with an overview of prevalent internet technologies in our country and their current applications. It then elaborates on the architecture, deployment strategies, and operational methodologies of the NSAWS, emphasizing the integration of fundamental security infrastructures like cloud computing platforms and firewalls. Following this, the traditional NSAWS is analyzed, and a simulation platform is tested to evaluate its performance in identifying and alerting network security threats. The results indicate that the NSAWS platform demonstrates exceptional accuracy and stability in its warning capabilities, effectively safeguarding network security by swiftly addressing potential vulnerabilities and threats. This paper underscores the importance of leveraging advanced technologies and robust security frameworks to fortify network defenses against evolving cyber threats, highlighting the NSAWS as a vital tool in maintaining and enhancing network security in an increasingly digital and interconnected world.

Page 8 of 16 | Total Record : 157