Journal of Applied Information, Communication and Technology
Journal of Applied Information, Communication and (eJAICT) welcomes full research papers in the area of Information and Communication Technology (ICT). The journal publishes review and research result on the frontier research, development, and application in the scope of ICT. The scope of the journal includes but not limited to: 1. Computer Network and Telecommunication 2. Wireless & Mobile Computing 3. Internet Technology 4. Multimedia System 5. Software Engineering 6. Computer Science 7. Information System and Knowledge Management 8. Data Analytics and Data Mining 9. Cyber and Computer Security
Articles
48 Documents
Analysis, Design and Implementation of a Digital Marketing Strategy for Ecommerce
Sukandar, Bernhart Farras;
Galinium, Maulahikmah;
Mukadis, Panji
Journal of Applied Information, Communication and Technology Vol. 4 No. 1 (2017)
Publisher : Swiss German University
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.33555/ejaict.v4i1.80
This paper is an Analysis, Design and Implementation of a Digital Marketing Strategy for eCommerce. Marketers are faced with new challenges and opportunities within this digital age. Digital marketing is the utilization of electronic media by the marketers to promote the products or services into the market. The main objective of digital marketing is attracting users and allowing them to interact with the brand through digital media. This article focuses on the importance of digital marketing for both marketers and consumers. We examine the effect of digital marketing on MerekIndonesia.com. This study has described multiple channels of digital marketing, effectiveness of it and the impact it has on MerekIndonesia.com visitor. The examined sample consists of six digital marketing channel to prove the effectiveness of digital marketing. Collected data has been analyzed with the help of various statistical tools and techniques.
Hadoop Configuration Tuning for Performance Optimization
Christian, Christian;
I Eng, Kho;
Ipung, Heru Purnomo
Journal of Applied Information, Communication and Technology Vol. 4 No. 1 (2017)
Publisher : Swiss German University
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.33555/ejaict.v4i1.81
Configuration parameter tuning is an essential part of the implementation of Hadoop clusters. Each parameter in a configuration plays a role that impacts the ov erall performance of the cluster. Therefore, we need to learn the characteristics of said parameter and understand the impact in hardware utilization in order to achieve optimal configuration. In this paper, we conducted experiments that includes modifying configuration and performed benchmark to find out if there is any performance gain. TeraSort is the program that runs the benchmark, we measure the time needed to complete the sort of the set of data and the CPU utilization during the benchmark. We conclu de that from our experiments we can see significant performance improvements by tuning with the configurations. However, the results may vary between different cluster configuration.
Delivering Sustainable Water Systems Using Kalman Filter and Statistical Approach
Loebis, Dedy
Journal of Applied Information, Communication and Technology Vol. 4 No. 1 (2017)
Publisher : Swiss German University
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.33555/ejaict.v4i1.82
This paper presents the results of work undertaken to develop and test contrasting data analysis approaches for the detection of bursts/leaks and other anomalies within wate r supply systems at district meter area (DMA)level. This was conducted for Yorkshire Water (YW) sample data sets from the Harrogate and Dales (H&D), Yorkshire, United Kingdom water supply network as part of Project NEPTUNE EP/E003192/1 ). A data analysissystem based on Kalman filtering and statistical approach has been developed. The system has been applied to the analysis of flow and pressure data. The system was proved for one dataset case and have shown the ability to detect anomalies in flow and pres sure patterns, by correlating with other information. It will be shown that the Kalman/statistical approach is a promising approach at detecting subtle changes and higher frequency features, it has the potential to identify precursor features and smaller l eaks and hence could be useful for monitoring the development of leaks, prior to a large volume burst event.
Intellivent: A Business Intelligence Platform for Event Management Using Gamified Mobile Application and QR Code
Adiputra, Wilbert;
Purnama, James;
Anthony, Randy
Journal of Applied Information, Communication and Technology Vol. 4 No. 2 (2017)
Publisher : Swiss German University
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.33555/ejaict.v4i2.83
One way for a company to communicate to their customer and promote their products is by participating or holding an event, like an exhibition or a seminar. For the event holder and organizer, it will be their best interest to gat her as much data as they can, however for now some of the company may find it hard to find those data. From the visitor perspective, there may be less incentive on the user to interact and engage more in an event. Intellivent is a platform for event manage ment, which features a gamification using gamified QR code. The gamification can be used as a tool for the event organizer to obtain more data regarding on activity in an event, and the visitor will be rewarded when they engage more in an event. A prototyp e has been created and tested on Islamic Book Fair 2019 where it is downloaded by 2000 users from the Play Store. Another version is created to be used in SGU Open House and Patjar Merah Malang 2019, a book bazaar that is predicted to gross around 5 Billion Rupiah. The implementation of the first prototype receive a very positive result from both the Event Organizer and the visitor of the event.
Analysis of The User Experience of a Mobile Application System : A Case Study of Xyz
Firstama, Panjinagara Vandy;
Galinium, Maulahikmah;
Purnama, James
Journal of Applied Information, Communication and Technology Vol. 4 No. 2 (2017)
Publisher : Swiss German University
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.33555/ejaict.v4i2.84
This research intention is to comparing user experience value of mobile applic ation using User experience(UX) result from new and old sys tem, then doing gap analysis to determine how much improvement of user experience in the new system compared to old system. By using User Experience Questionnaire (UEQ), this research is to evaluat e which aspect of mobile application is looked for by its u ser. Survey is conducted to 60 people to answer what experience they have on old application, new application and user expectation for application and compare them. The result shows that there s mu ch improvement from old application to new application, and for expectation user towards new and old application, the gap between new app to expectation become closer if compare with old app to expectation
Developing Food Sensory Analysis Information System using Waterfall Software Engineering Model
Oliver, Stefanus;
Marpaung, Abdullah Muzi;
Galinium, Maulahikmah
Journal of Applied Information, Communication and Technology Vol. 4 No. 2 (2017)
Publisher : Swiss German University
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.33555/ejaict.v4i2.85
Food sensory analysis is the terms from the field of Food Technology that has a meaning which means sensory evaluation of food that is conducted by the food sensory evaluators. Currently, food sensory analysis is conductedmanually. It can caus e human errors and consume much ti me. The objective of this research is to build a web based application that is specific for food sensory analysis using PHP programming language. This research followsfour first steps of waterfall software engineering mod el which are user requirements ana lysis (user software and requirements analysis), system design (activity, use cases, architecture, and entity relationship diagram),implementation (software development), and testing (software unit, functionality, validit y, and user acceptance testing). T he software result is well built. It is also acceptable for users and all functionality features can run well after going through those four software testing. The existence of the software brings easiness to deal with the manual food sensory analysis exper iment. It is considered also for the future it has business value by having open source and premium features.
ERP Enhancement to Accommodate Business Process in Furnishing Company
Firmansyah, Deny
Journal of Applied Information, Communication and Technology Vol. 2 No. 1 (2015)
Publisher : Swiss German University
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.33555/ejaict.v2i1.4
Avoiding customization to enhance of an ERP implementation consider as one of successful keyfactor. Within this paper, the writer tries to answer the question of “The expectation of ERP able tofit in with company business flow in a standard way and why enhancing the system is almost notavoidableâ€.To answer this question, the writer will use a case study of a furnishing distribution company or thesupplier to retail store in the process of integration of ERP system with logistic process.
Optimizing the use of Data Management via Market Intelligence to optimize spending in Indonesian Oil and Gas Sectors
Sjah Razad, Haryo Seto
Journal of Applied Information, Communication and Technology Vol. 2 No. 2 (2015)
Publisher : Swiss German University
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.33555/ejaict.v2i1.6
Any purchasing or product and service acquisition comes in hidden costs if we dont have background information on references of reference database. Especially in the oil and gas sector where the cost to acquire those services are higher, market intelligence initiatives plays a pivotal role in ensuring we obtain correct market price data with the help of COBIT5 framework
Leak in OpenSSL
Yapri, Jason;
Hananto, Rinkel
Journal of Applied Information, Communication and Technology Vol. 7 No. 1 (2020)
Publisher : Swiss German University
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.33555/ejaict.v7i1.70
The term “hacker†has been spread around the world and has always been considered as a threat when we use the internet. We often hear hackers deface websites’ contents and break into system to steal private and confidential information, such as account’s username and password, credit card numbers and others. This is definitely an unethical behavior of irresponsible people who mostly aims to gain profit. However the term hacker, on the contrary actually originates from an expert computer technicians who tries to access the system to debug and fix security problems of the system. Nowadays there are dozens of websites out there and some of those websites have low level of security. Hacker can easily break through their system and steal their private confidential data but just because these websites have low level security, that doesn’t mean that it is ethical to break into someone’s system and read their data. It goes the same when someone entering other people’s house because the door was left open by the owner. As web development grows rapidly, security has become an essential part to make the website more secure and reliable. This is when a group of people decided to make a collaborative project on the implementation of SSL (Secure Socket Layer) and TLS (Transport Layer Security) that is available to be used by everyone. This project is called as OpenSSl and has been used by most of the websites in the internet today. What if this OpenSSL, which has been trusted and implemented by 2/3rd of the websites all around the world can be breached? Definitely it will attract dozens of hackers all around the world to do something unimaginably dangerous.
The Lack of Enforcement of the DRM Policy
Oliver, Stefanus;
Winarta, Tommy
Journal of Applied Information, Communication and Technology Vol. 7 No. 1 (2020)
Publisher : Swiss German University
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.33555/ejaict.v7i1.73
In this digital era, numerous copyrighted items such as music and movies can be enjoyed online. However, our activities in enjoying those entertainments are also limited by the copyright law. Some contents are also protected by Digital Rights Management, which makes sure that the user who purchases the item is the only person who has the right to enjoy the content. All of these rules are obviously made to make sure that everything is in order. Therefore, those illegal activities can be brought to justice. However, the lack of communication might present an ambiguity to the users, and those users might unconsciously do illegal things that are previously forbidden. Other than that, the law itself has its own limitation in the aspect of execution and enforcement, causing pirated versions of a content can be found easily on the internet. This paper is going to review the current condition of the execution of the law regarding the DRM protected contents.