cover
Contact Name
Aji Prasetya Wibawa
Contact Email
aji.prasetya.ft@um.ac.id
Phone
-
Journal Mail Official
businta.2017@gmail.com
Editorial Address
Sudah terakreditasi SINTA 2. Editorial Office of Bulletin of Social Informatics Theory and Application Association for Scientific Computing and Electrical, Engineering (ASCEE)-Indonesia Section Jln. Supriyadi, Kel. Surodakan, Kec. Trenggalek, Kota Trenggalek, Propinsi Jawa Timur, 66316 Indonesia Email: businta.2017@gmail.com
Location
Kab. trenggalek,
Jawa timur
INDONESIA
Bulletin of Social Informatics Theory and Application
ISSN : 26140047     EISSN : 26140047     DOI : https://doi.org/10.31763/businta.v6i2.601
Core Subject : Science, Social,
Bulletin of Social Informatics Theory and Application (ISSN 2614-0047) is an interdisciplinary scientific journal for researchers from Computer Science, Informatics, Social Sciences, and Management Sciences to share ideas and opinions, and present original research work on studying the interplay between socially-centric platforms and social phenomena. Bulletin of Social Informatics Theory and Application is the first Asia-Pacific journal in social informatics. The journal aims to create a better understanding of novel and unique socially-centric platforms not just as a technology, but also as a set of social phenomena and to provide a media to help scholars from the two disciplines define common research objectives and explore methodologies. Bulletin of Social Informatics Theory and Application offers an opportunity for the dissemination of knowledge between the two communities by publishing of original research papers and experience-based case studies in computer science, sociology, psychology, political science, public health, media & communication studies, economics, linguistics, artificial intelligence, social network analysis, and other disciplines that can shed light on the open questions in the growing field of computational social science. To that end, we are inviting interdisciplinary papers, on applying information technology in the study of social phenomena, on applying social concepts in the design of information systems, on applying methods from the social sciences in the study of social computing and information systems, on applying computational algorithms to facilitate the study of social systems and human social dynamics, and on designing information and communication technologies that consider social context.
Articles 15 Documents
Search results for , issue "Vol. 8 No. 1 (2024)" : 15 Documents clear
Monitoring oxygen levels of windu shrimp pond water using dissolved oxygen sensor based on wemos D1 R1 Djainuddin, Djainuddin; Fattah, Farniwati; Asis, Muhammad Arfah; Satra, Ramdan; Fattah, Muhammad Hattah; Adam Ali Abdalla, Modawy
Bulletin of Social Informatics Theory and Application Vol. 8 No. 1 (2024)
Publisher : Association for Scientific Computing Electrical and Engineering

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31763/businta.v8i1.676

Abstract

This research implements an oxygen monitoring system in tiger shrimp ponds using a Dissolved Oxygen (DO) sensor based on Wemos D1 R1 with an Internet of Things (IoT) approach. Tiger shrimp ponds, as aquaculture centers, require regular monitoring of water quality. The system uses DO sensors in the water, processed by Wemos D1 R1, and the data is sent to Firebase Cloud for storage. A web application serves as the user interface to monitor and analyze the data. The results of the research in Pandawa 1000 tiger shrimp pond, Lanrisang Village, Pinrang, showed the positive impact of IoT technology on pond management. The selection of the Wemos D1 R1 and the use of the Dissolved Oxygen Sensor enabled accurate and efficient measurement of oxygen levels, overcoming the shortcomings of previous research, especially the integration of the sensor directly into Firebase for real-time data storage and delivery. This development improves connectivity and real-time monitoring capabilities, crucial aspects in ensuring optimal pond water quality.
Optimization of k-means clustering using particle swarm optimization algorithm for human development index Laili, Ufil Hidayatul; Faisal, Muhammad; Kurniawan, Fachrul
Bulletin of Social Informatics Theory and Application Vol. 8 No. 1 (2024)
Publisher : Association for Scientific Computing Electrical and Engineering

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31763/businta.v8i1.678

Abstract

K-Means algorithm can be used to cluster the Human Development Index in East Java in particular for the people, the hope is that with this development all the problems that exist in the community including poverty, unemployment, school dropouts, health and social inequality can be resolved. However, this algorithm has a weakness that is sensitive to the determination of the initial centroid. Initial centroids that are determined randomly will reduce the level of accuracy, often get stuck at the local optimum, and get random solutions. Optimization algorithms such as PSO can overcome this by determining the optimal initial centroid. The quality of clusters produced by K-Means algorithm with and without PSO algorithm is measured using the average Silhouette Coefficient (SC). In this study, better accuracy was obtained between pure kmeans and PSO based kmeans where the comparison value of pure kmeans was 0.27% while PSO based kmeans obtained a value of 0.34%. The Human Development Index data set was obtained from the official website of the Central Bureau of Statistics and used as secondary data in this study, especially the East Java region. In addition to program planning in the following year, the clustering carried out from 2019 to 2022 is also an evaluation of the East Java Provincial Government's program targets that have been implemented in that year, especially related to the human quality of life development program.
Enhancing the Shopping Experience in E-Commerce: A Path to Improvement – Buy the Best Sarama Shehmir, Sarama; Nazar, Mobeen; Zaveri, Ayesha Anees; Sami , Naveera; Mashood, Ramsha; Faisal , Nabiha; Waqas, Abdul; Naeem, Rimsha
Bulletin of Social Informatics Theory and Application Vol. 8 No. 1 (2024)
Publisher : Association for Scientific Computing Electrical and Engineering

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31763/businta.v8i1.680

Abstract

This research paper presents the development of "Buy by Best," a user-friendly platform designed to save users' time by providing a consolidated shopping experience. The project addressed the inconvenience of visiting multiple websites and logging in to various accounts to shop for different brands. Extensive research was conducted to explore existing shopping websites, user behaviors, and industry trends. The project team analyzed multiple sites, considering brand reputation, product variety, and user experience. Based on the findings, "Buy by Best" was developed to streamline the shopping process. The platform features a centralized login where users can access products from various brands, eliminating the need for multiple website visits and logins. Technologies like the MERN stack and Python libraries like Selenium and Beautiful Soup were used for web development and web scraping of brand products. The platform offers a user-friendly interface with options to browse products by brand, apply filters, and view product details. Users can place orders seamlessly and be redirected to the brand's official website. Future work includes developing a mobile application, enhancing the user interface, expanding the range of brands, and integrating other platforms. In conclusion, "Buy by Best" offers users a convenient and time-saving solution by consolidating products from various brands into a single platform. The project successfully achieves its objective through web scraping, user authentication, and intuitive interfaces.
Ransomware detection: patterns, algorithms, and defense strategies Amro, Manar Y; Dwieb, Mohamed; Hammad, Jehad A.H; Wibawa, Aji Prasetya
Bulletin of Social Informatics Theory and Application Vol. 8 No. 1 (2024)
Publisher : Association for Scientific Computing Electrical and Engineering

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31763/businta.v8i1.689

Abstract

In the contemporary digital landscape, rapid technological advancements present unprecedented challenges for developers in the hardware and software realms. The ubiquitous presence of the Internet, the Internet of Things (IoT), and widespread digital solutions bring numerous benefits and escalating risks. This study investigates the pervasive threat of ransomware attacks, a daily menace that imperils the operational and security dimensions of the digital sphere for enterprises and individuals. The research objective is to identify the most effective algorithm for detecting ransomware viruses, a persistent and evolving threat that significantly challenges institutions, companies, and governmental organizations. The dynamic nature of ransomware necessitates robust detection mechanisms to safeguard sensitive data. To achieve this goal, we conducted a comparative analysis of four prominent algorithms recognized for their efficacy in combating and detecting viruses. Emphasis was placed on the algorithm exhibiting the most promising results. A detailed examination of its impact on existing data involved comprehensive analysis and a comparative assessment against previous studies. Results, derived from extensive studies and experiments on a diverse dataset, illuminate the critical role of ransomware detection algorithms and underscore their effectiveness. The findings contribute valuable insights to the ongoing discourse on cybersecurity strategies, providing a foundation for enhanced ransomware defense measures.
Mastery of information technology and self-efficacy in enhancing technopreneurship readiness among vocational school student Ni Ketut Kertiasih; Djoko Kustono; Purnomo; Eddy Sutadji
Bulletin of Social Informatics Theory and Application Vol. 8 No. 1 (2024)
Publisher : Association for Scientific Computing Electrical and Engineering

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31763/businta.v8i1.719

Abstract

This study aims to analyze the contribution of information technology mastery and self-efficacy in fostering technopreneurship readiness among vocational students. Technopreneurship is a business field that utilizes information technology and presents a viable solution to unemployment. Meanwhile, vocational school graduates have a significant opportunity to pursue technopreneurship. To support these graduates’ readiness in the field of technopreneurship, it is necessary to equip them with information technology and self-efficacy skills. With these skills, vocational school graduates have the opportunity to become independent workers and create new jobs based in the field of information technology.The rapid development of information and communication technology high lights the importance of students’ mastery of this field. These skill sarenecessary for students to compete, beresponsible, and exhibit creativity and innovation. Additionally, self-efficacy refers to anindividual’s belief and confidence in their ability to influence their environment. It is a crucial factor in determining students’ readiness to work. By enhancing their self-efficacy, students can be motivated to establish new businesses based on information technology. There fore, this research employed a correlational quantitative method, focusing on vocational students in Buleleng Regency, with a sample size of 167. Regression analysis was used to analyze the data with two predictors. The finding sindicated that the mastery of information technology and self-efficacy significantly contributed to the technopreneurship readiness of vocational students. Keywords: mastery of information technology, self-efficacy, technopreneurship readiness

Page 2 of 2 | Total Record : 15