cover
Contact Name
Monica Cinthya
Contact Email
monicacinthya@unesa.ac.id
Phone
-
Journal Mail Official
monicacinthya@unesa.ac.id
Editorial Address
Gedung A10 Teknik Informatika Kampus Unesa Ketintang Jl. Ketintang Wiyata Gedung A10 Surabaya, Jawa Timur 60231
Location
Kota surabaya,
Jawa timur
INDONESIA
Journal of Emerging Information Systems and Business Intelligence (JEISBI)
ISSN : -     EISSN : 27743993     DOI : 10.26740/jeisbi
Core Subject : Science, Education,
Journal of Emerging Information Systems and Business Intelligence (JEISBI) aims to provide scholarly literature focused on studies and research in the fields of Information Systems (IS) and Business Intelligence (BI). This journal also includes public reviews on the development of theories, methods, and applications relevant to these topics. All published works are presented exclusively in English to reach a global audience of readers and researchers. The journal’s scope includes but is not limited to the following fields: Data Mining Generative Artificial Intelligence Big Data Analytics Business Intelligence Enterprise Architecture UI/UX Business Process Management Enterprise System System Development Decision Support System IS/IT Strategy and Planning IT Investment and Productivity IT Project Governance IS Business Value Audit SI/TI Cybersecurity and Risk Management IS/IT Operations and Service Management IT Ethics Organizational and Human Behavior Technology Digital Sociology
Articles 14 Documents
Search results for , issue "Vol. 6 No. 3 (2025): Vol. 06 Issue 03" : 14 Documents clear
Business Process Reengineering of The New Installation Process at PDAM Tirta Agung to Improve The Company's Business Performance Nur Alian, Galang Maftuh; Nuryana, I Kadek Dwi
Journal of Emerging Information Systems and Business Intelligence (JEISBI) Vol. 6 No. 3 (2025): Vol. 06 Issue 03
Publisher : Universitas Negeri Surabaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26740/jeisbi.v6i3.64497

Abstract

In increasingly complex business developments, companies are required to optimize business processes to be more effective and efficient. In addition, customer complaints are important feedback for companies to carry out evaluations to maintain their reputation in the eyes of customers. This study takes a case study on PDAM Tirta Agung, which provides clean water services in Babat District. Referring to interviews and observations, it was found that the legacy system used in the new installation business process has been running for more than four years and is considered inefficient, and time-consuming. Complaints from customers regarding the length of the installation process show that there is a need for repairs. Therefore, the Business Process Reengineering (BPR) method is proposed as a solution to improve service quality. BPR aims to implement radical changes to business processes so that companies can improve speed, accuracy, and cost efficiency, in accordance with the theory put forward by Hammer & Champy.
Analysis of Information Security Culture Among Students Cholsa, Achmad Raafiud'; Bisma , Rahadian
Journal of Emerging Information Systems and Business Intelligence (JEISBI) Vol. 6 No. 3 (2025): Vol. 06 Issue 03
Publisher : Universitas Negeri Surabaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26740/jeisbi.v6i3.65085

Abstract

This research aims to analyze the information security culture among university students, which is becoming increasingly important in today's digital era. In the context of increasing threats to personal data and sensitive information, understanding the culture of information security among the younger generation is crucial. The method used in this research is a quantitative survey involving 400 student respondents from various universities in Surabaya, the data is analyzed using descriptive statistical techniques to describe students' understanding, attitudes, and behavior towards information security. The results showed that students have low awareness of information security, even though they actively use digital technology. Many respondents have experienced data breaches but did not take sufficient preventive measures. The research recommends increased education and socialization about information security on campus, as well as the development of structured training programs to improve security awareness and practices among students.
Application of User Centered Design Method on UI/UX of Indodax Cryptocurrency Exchange Application in Indonesia UBAIDILLAH, M FATIH FADLIL; Indriyanti, Aries Dwi
Journal of Emerging Information Systems and Business Intelligence (JEISBI) Vol. 6 No. 3 (2025): Vol. 06 Issue 03
Publisher : Universitas Negeri Surabaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26740/jeisbi.v6i3.65542

Abstract

This research aims to improve the quality of the User Interface (UI) and User Experience (UX) of the Indodax cryptocurrency exchange application in Indonesia through the application of the User-Centered Design (UCD) method, against the background of the rapid development of digital technology and the increasing public interest in cryptocurrency. Indodax, as one of the leading platforms in Indonesia, needs to ensure that the UI and UX of its application are able to meet user needs. This research identifies various problems with Indodax's UI and UX through literature studies and user surveys, which are then followed by application redesign using the UCD approach, including understanding the context of use, determining user needs, designing solutions, and evaluating these solutions. The results show that the application of the UCD method has significantly improved user satisfaction, which is reflected in the increase in the System Usability Scale (SUS) score from 56.6 (grade D) to 80.3 (grade B). The findings make an important contribution to the development of more humanistic and user-centered cryptocurrency applications, and can serve as a reference for similar application developers in Indonesia, which is expected to improve the overall competitiveness of cryptocurrency platforms.
Design and Development of Raw Material Inventory System for “Es Barbar” SME Using the Material Requirement Planning Method Arsydi, Mohammad Dandi; Nuryana, I Kadek Dwi
Journal of Emerging Information Systems and Business Intelligence (JEISBI) Vol. 6 No. 3 (2025): Vol. 06 Issue 03
Publisher : Universitas Negeri Surabaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26740/jeisbi.v6i3.65777

Abstract

The difficulty in managing raw material inventory has become a major challenge for the UMKM Es Barbar, leading to imbalances such as shortages or excess materials, which hinder operational smoothness. This study aims to design and develop a web-based information system using the Material Requirement Planning (MRP) method to improve raw material management efficiency. With the System Development Life Cycle (SDLC) approach using the waterfall model, the system was designed through stages of communication, planning, modeling, construction, and implementation. The results show that the application of the MRP method successfully reduced stock shortages by 95% and excess stock by 85%, as well as improved the accuracy of raw material planning based on the Master Production Schedule (MPS) and Bill of Materials (BOM). This system facilitates precise raw material requirement planning, supports decision-making, and reduces waste, there by having a positive impact on the operational efficiency of UMKM Es Barbar.
Analysis of Book Borrowing Patterns Using the Apriori Algorithm (Case Study: East Java Provincial Library and Archives Service) PADWASIH, ELLEN MARIA; Indriyanti, Aries Dwi
Journal of Emerging Information Systems and Business Intelligence (JEISBI) Vol. 6 No. 3 (2025): Vol. 06 Issue 03
Publisher : Universitas Negeri Surabaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26740/jeisbi.v6i3.65841

Abstract

This study analyzes book borrowing patterns at the East Java Provincial Library and Archives Service using the Apriori algorithm. Data from borrowing transactions between January 16 and March 10, 2023, were analyzed to identify relationships between book titles. This data mining study involves data preprocessing, checking for missing values and duplicates, as well as transforming data into a binary matrix. The analysis results show that item combinations with a minimum support value of 1.2% can be identified. Association rules such as AC, AE → AG have a support value of 0.012 and a confidence level of 40.9%. Further analysis reveals more complex patterns, such as AE, AJ → AC, with a confidence level of 57.1%. This research contributes to understanding book borrowing behavior and offers solutions to improve library management efficiency, such as book recommendation systems and more appropriate collection arrangement strategies. Thus, libraries can develop services that are more responsive to community needs.
Prediction of Goods Damage in Land Transportation Services (Trucking) Using Naïve Bayes Dzulfaqqor, Moh. Fatihul Farras; Nuryana, I Kadek Dwi
Journal of Emerging Information Systems and Business Intelligence (JEISBI) Vol. 6 No. 3 (2025): Vol. 06 Issue 03
Publisher : Universitas Negeri Surabaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26740/jeisbi.v6i3.66306

Abstract

Land transportation plays a crucial role in supporting economic dynamics, yet cargo damage remains a significant challenge that affects the supply chain, efficiency, customer satisfaction, and financial stability. This research aims to analyze the factors influencing cargo damage and predict its likelihood using the Naïve Bayes classification algorithm. A case study was conducted at PT. Tuntas Smart Solusi, a logistics company in Gresik, Indonesia. The Knowledge Discovery in Databases (KDD) framework was employed to process historical shipping data from 2021 to 2023, incorporating variables such as cargo type, shipping route, weather conditions, and load capacity. The results indicate that adverse weather conditions, excessive load weight, and rough routes significantly contribute to cargo damage rates. The Naïve Bayes classifier demonstrated high predictive accuracy, validated using k-fold cross-validation, proving its effectiveness in logistics risk assessment. The findings offer strategic recommendations for logistics companies to minimize damage risks, including optimized packaging strategies, route selection improvements, and predictive monitoring systems. By integrating machine learning-based predictive analytics, logistics firms can enhance operational efficiency, reduce financial losses, and improve overall service quality.
Business Process Analysis and Modeling Using the Business Process Model Notation (Bpmn) Method (Case Study: Simo Jaya Printing) Aziz; Nuryana, I Kadek Dwi
Journal of Emerging Information Systems and Business Intelligence (JEISBI) Vol. 6 No. 3 (2025): Vol. 06 Issue 03
Publisher : Universitas Negeri Surabaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26740/jeisbi.v6i3.70359

Abstract

Percetakan Simo Jaya is one of the providers of offset printing services in Surabaya. Percetakan Simo Jaya has constraints in managing its existing business processes. A business process is a set of tools used to organize activities in order to improve understanding of how these activities are interconnected to achieve a specific goal. In business process modeling, a method called Business Process Model and Notation (BPMN) is used, which is a standard for modeling business processes that provides graphical notation to describe them. The business processes at Percetakan Simo Jaya include the ordering process, raw material purchasing process, printing process, and the goods collection and delivery process. Based on the identified issues within the business processes at Percetakan Simo Jaya, this study will examine and propose improvements. The proposed improvements are expected to serve as a consideration for Percetakan Simo Jaya in refining its business processes to enhance service quality and operational effectiveness.
DESIGN OF INVENTORY STOCK INFORMATION SYSTEM USING LARAVEL FRAMEWORK WITH FIFO METHOD Bagus, Bagus Laksono Yudo Atmojo; Nuryana, I Kadek Dwi
Journal of Emerging Information Systems and Business Intelligence (JEISBI) Vol. 6 No. 3 (2025): Vol. 06 Issue 03
Publisher : Universitas Negeri Surabaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26740/jeisbi.v6i3.70863

Abstract

Toko Anugerah Rianto is a business engaged in retail, namely cosmetics since 2016, located in Rungkut, Surabaya. Of course, in running his business, the business owner has his own challenges in running it. Based on the results of interviews conducted with business owners, the obstacle in running their business is controlling the availability of stock in the warehouse. This obstacle is caused by the absence of recording incoming and outgoing goods so that stock-outs and inaccurate availability often occur. This problem causes consumers to wait for stock to be available. The purpose of this research is to design an inventory information system that can overcome the problems of the business being run. This design uses the Research and Development (R&D) method which consists of 4D (define, design, develop, disseminate). The stock inventory management method applied in this study is the First In First Out (FIFO) method where the first item in is the first item out to avoid expired goods. The result of this research is a website-based inventory information system that is a solution to the problems of Anugerah Rianto Store to support accurate data collection of incoming and outgoing goods.
Information System with Face Recognition and Geolocation at MA Al Bukhary Satrianto, Augusta; Sisephaputra, Bonda
Journal of Emerging Information Systems and Business Intelligence (JEISBI) Vol. 6 No. 3 (2025): Vol. 06 Issue 03
Publisher : Universitas Negeri Surabaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26740/jeisbi.v6i3.70921

Abstract

Modern technology continues to advance rapidly, impacting various aspects of life, including attendance management systems. One notable innovation is the integration of face recognition and geolocation technology for attendance systems. This technology provides a more efficient and accurate solution for recording attendance compared to conventional methods. Face recognition allows for automatic and quick identity verification, while geolocation ensures that users are in the correct location when marking their attendance. This study aims to design and develop an attendance information system utilizing both face recognition and geolocation technologies. Face recognition is implemented using a TensorFlow model trained to accurately recognize faces. Geolocation data is obtained from the GPS devices on users' smartphones and is used to verify their presence at authorized locations. The system is implemented as an interconnected website and mobile application for storing attendance information. The results of the research and testing indicate that the developed face recognition system can accurately identify faces and distinguish between real and fake faces. Additionally, the geolocation system can effectively verify users' locations and detect the use of spoofed locations. The educators at MA Al Bukhary possess the necessary devices to use this information system, meeting the technology requirements tested. From the user requirements testing, the system received a score of 88,06, categorized as excellent (A).
Comparison You Only Look Once (Yolo) Algorithm On Physical Violence Video Detection Rahayu, Aulia Anisa Puji; Yustanti, Wiyli
Journal of Emerging Information Systems and Business Intelligence (JEISBI) Vol. 6 No. 3 (2025): Vol. 06 Issue 03
Publisher : Universitas Negeri Surabaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26740/jeisbi.v6i3.71185

Abstract

Physical violence is one of the crimes that often occurs in various environments and can have a serious impact on victims, both physically and mentally. One of the obstacles in handling it is the delay in detecting acts of violence. The solution to this problem is to implement the best algorithm between You Only Look Once (YOLO) version 8 and version 9 to detect physical violence through video automatically and quickly. The dataset used consists of two classes, namely violence and non-violence, which have gone through the process of extraction, data cleaning, and labeling using Roboflow. The model was trained using Google Collaboratory, and the training results were evaluated using mAP, precision, recall, and F1-score metrics. Based on the test results, YOLOv9 obtained the best performance with a precision of 0.8096, recall of 0.8665, F1-score of 0.8363, and mAP of 0.8117. The detection system is then implemented into a web-based application using the Flask framework, which allows users to Upload videos and detect acts of violence automatically. The test results show that the application runs according to its function and is able to detect physical violence well. This research is expected to be a supporting solution in video-based security surveillance systems.

Page 1 of 2 | Total Record : 14