cover
Contact Name
Fergyanto F. Gunawan
Contact Email
fgunawan@binus.edu
Phone
+62215345830
Journal Mail Official
-
Editorial Address
Jl. Kebun Jeruk Raya No. 27, Kemanggisan / Palmerah Jakarta Barat 11530
Location
Kota adm. jakarta barat,
Dki jakarta
INDONESIA
CommIT (Communication & Information Technology)
ISSN : 19792484     EISSN : 24607010     DOI : -
Core Subject : Science,
Journal of Communication and Information Technology (CommIT) focuses on various issues spanning: software engineering, mobile technology and applications, robotics, database system, information engineering, artificial intelligent, interactive multimedia, computer networking, information system audit, accounting information system, information technology investment, information system development methodology, strategic information system (business intelligence, decision support system, executive information system, enterprise system, knowledge management), e-learning, and e-business (e-health, e-commerce, e-supply chain management, e-customer relationship management, e-marketing, and e-government). The journal is published in affiliation with Research Directorate, Bina Nusantara University in online and free access mode.
Articles 6 Documents
Search results for , issue "Vol. 15 No. 2 (2021): CommIT Journal" : 6 Documents clear
Service Level Management of Information Technology and System in ITB STIKOM Bali Nyoman Ayu Nila Dewi; A. A. Ngurah Bima Prasatria
CommIT (Communication and Information Technology) Journal Vol. 15 No. 2 (2021): CommIT Journal
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/commit.v15i2.6895

Abstract

ITB STIKOM Bali is a technology-based university so that all business processes, especially related to academics, student affairs, and finance, utilize information technology. Management of the information system and technology is carried out by the Computer and Network Center unit (Pusat Komputer dan Jaringan - PUSKOMJAR). In the management of Information Technology (IT) services, an agreement is needed in the form of Service Level Management (SLM) which contains the level of service, quality of service, and complaints handling, so users’ needs are aligned with the system developer. Meanwhile, in managing the internal system of ITB STIKOM Bali, the agreement between PUSKOMJAR and related units is only in the form of submitting a form for making or changing the system. Therefore, it raises a problem if there is a mismatch in the manufacture or development of the system because there is no contract document that regulates in detail about the system. Hence, designing an SLM of IT and system services at ITB STIKOM Bali to overcome these problems is necessary. The research presents a case study by analyzing and designing the SLM of service system and IT in ITB STIKOM Bali. The applied research method is literature study and observation, analysis of existing SLM, designing new SLM, and conclusions. The result of the research is a document of SLM for internal IT and system services at ITB STIKOM Bali. Based on the analysis and design of SLM, the SLM document can help the PUSKOMJAR in documenting IT service information and making it easier for users to get information related to the provided IT services.
Evaluation on User Perception Effect based on Interaction Techniques in the Stereoscopic Environment Dino Caesaron; Rio Prasetyo Lukodono; Yunita Nugrahaini Safrudin
CommIT (Communication and Information Technology) Journal Vol. 15 No. 2 (2021): CommIT Journal
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/commit.v15i2.7021

Abstract

The interaction of user performance with three-dimensional (3D) objects has become an important issue in the recent development of virtual reality applications. Additionally, the basic conviction of current Virtual Reality (VR) supports the development of the viable interface between humans and machines. The research focuses on the user’s interaction technique by considering two approaches (direct and indirect interaction techniques) for the users while interacting with threedimensional objects. Numerous possible uses can benefit from virtual reality by considering a few fundamental visual and cognitive activities in the Virtual Environment (VE), such as the interpretation of space that users of clear and indirect perception are not well established. The experiment is performed in a stereoscopic environment using a reciprocal tapping task. Participants are expected to use direct pointing as well as indirect cursor techniques to select a stereoscopic spherical target. The results show that, in the sense of a direct interaction technique, user recognition of an object appears to converge in the center of a simulated area. Unfortunately, this convergence is not demonstrated in the indirect cursor situation. The pointing estimation from the users is more accurate when using the indirect interaction approach. The findings provide an understanding of the interaction characteristics done by the users in the stereoscopic environment. Importantly, developers of a virtual environment may use the result when developing effective user interface perception in specific interaction techniques.
Decision Support System Design Model for Choosing Effective Learning Method in Higher Education Institution Trisna Febriana; Arif Budiarto
CommIT (Communication and Information Technology) Journal Vol. 15 No. 2 (2021): CommIT Journal
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/commit.v15i2.6668

Abstract

In an educational institution, especially higher education, producing qualified graduates is the highest priority achievement. The quality of the graduates is highly dependent on the applied learning method. However, sometimes universities have difficulty in determining appropriate learning for their students. Determination of this decision requires a tool that can facilitate decisionmakers in analyzing all the considerations in choosing decisions. Another challenge is when the decision is shared among multiple stakeholders with equal contribution. It consequently creates a need for a mechanism that can provide an equal contribution for each stakeholder. The research tries to create a model to design a tool that can determine the decisions that need to be taken. This model is built with the Multi-Criteria Decision Analysis (MCDA) approach. MCDA is selected because it can be implemented in a collaborative ecosystem where multiple stakeholders are involved. Then, a literature study is conducted to determine the attributes and decision-making parameters. In addition, the primary data derived from interviews to a total of 40 respondents consisting of students, lecturers, and staff are taken into consideration to complete the literature study. The literature review and interview output are then translated to some parameters that influence an effective learning system. The result shows that this model can be used as a reference in developing a web-based application as an implementation of MCDA.
Universal Face Recognition Using Multiple Deep Learning Agent and Lazy Learning Algorithm Kenny Vincent; Yosi Kristian
CommIT (Communication and Information Technology) Journal Vol. 15 No. 2 (2021): CommIT Journal
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/commit.v15i2.6688

Abstract

Mainstream face recognition systems have a problem regarding the disparity of recognizing faces from different races and ethnic backgrounds. This problem is caused by the imbalances in the proportion of racial representations found in mainstream datasets. Hence, the research proposes using a multi-agent system to overcome this problem. The system employs several face recognition agents according to the number of races that are necessary to make data encodings for the classification process. The first step in implementing this system is to develop a race classifier. The number of races is arbitrary or determined differently in a caseby-case scenario. The race classifier determines which face recognition agent will try to recognize the face in the query. Each face recognition agent is trained using a different dataset according to their assigned race, so they have different parts in the system. The research utilizes lazy learning algorithms as the final classifier to accommodate a system with the constant data flow of the database. The experiment divides the data into three racial groups, which are black, Asian, and white. The experiment concludes that dividing face recognition tasks based on racial groups into several face recognition models has better performance than a single model with the same dataset with the same imbalances in racial representation. The multiple agent system achieves 85% on the Face Recognition Rate (FRR), while the single pipeline model achieves only 80.83% using the same dataset.
General Cybersecurity Maturity Assessment Model: Best Practice to Achieve Payment Card Industry-Data Security Standard (PCI-DSS) Compliance Khairur Razikin; Agus Widodo
CommIT (Communication and Information Technology) Journal Vol. 15 No. 2 (2021): CommIT Journal
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/commit.v15i2.6931

Abstract

The use of technology in the era of the Industrial Revolution 4.0 is essential, marked by the use of technology in the economy and business. This situation makes many companies in the payment sector have to improve their information technology security systems. In Indonesia, Bank Indonesia and the Financial Services Authority (Otoritas Jasa Keuangan - OJK) are agencies that provide operational permits for companies by making Payment Card Industry-Data Security Standard (PCI-DSS) certification as one of the requirements for companies to obtain operating permits. However, not all companies can easily get PCI-DSS certification because many companies still do not meet the PCI-DSS requirements. The research offers a methodology for measuring the level of technology and information maturity using general cybersecurity requirements adopted from the cybersecurity frameworks of CIS, NIST, and Cobit. Then, the research also performs qualitative calculations based on interviews, observations, and data surveys conducted on switching companies that have been able to implement and obtain certification. PCI-DSS to produce practical cybersecurity measures, in general, can be used as a measure of the maturity of technology and information security. The results and discussion provide a model assessment tool on the procedures and requirements needed to obtain PCI-DSS certification. The maturity level value of PT XYZ is 4.0667 at maturity level 4, namely quantitatively managed, approaching level 5 as the highest level at maturity level.
Enhanced Financial Business Competitiveness by Leveraging Technology and Innovation Suwinto Johan
CommIT (Communication and Information Technology) Journal Vol. 15 No. 2 (2021): CommIT Journal
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/commit.v15i2.6968

Abstract

The financial industry has developed rapidly with the emergence of financial technology companies. Moreover, the use of technology in the financial industry has developed rapidly. However, conventional financial companies face tough challenges in doing business. They have to adopt the technology to survive. The adoption of technology will increase the competitiveness of established financial companies against financial technology companies. The research aims to analyze the impact of technology on improving the work process of established financial companies. It examines the business model of established financial companies and financial technology companies. The work process is almost identical for all companies. The research applies a qualitative method. The chosen companies are multi-purpose financing for the purchase of two-wheeled and four-wheeled motorized vehicles. The total number of companies involved in the research is four companies. The result concludes that conventional consumer finance companies need to adopt technology into the work process to compete with financial technology companies. Technologies that can be used are Artificial Intelligence (AI), automation job allocation, chatbot, and face recognition. The work process is reviewed by digitizing, eliminating, and moving. Then, technology adoption will require a large investment. Hence, consumer finance companies can collaborate with technology companies, including financial technology companies.

Page 1 of 1 | Total Record : 6


Filter by Year

2021 2021


Filter By Issues
All Issue Vol. 19 No. 1 (2025): CommIT Journal (in press) Vol. 18 No. 2 (2024): CommIT Journal Vol. 18 No. 1 (2024): CommIT Journal Vol. 17 No. 2 (2023): CommIT Journal Vol. 17 No. 1 (2023): CommIT Journal Vol. 17 No. 1 (2023): CommIT Journal (In Press) Vol. 16 No. 2 (2022): CommIT Journal Vol. 16 No. 1 (2022): CommIT Journal Vol. 15 No. 2 (2021): CommIT Journal Vol. 15 No. 1 (2021): CommIT Journal Vol 14, No 2 (2020): CommIT Vol. 14 No. 2 Tahun 2020 (IN PRESS) Vol 14, No 1 (2020): CommIT Vol. 14 No. 1 Tahun 2020 Vol. 14 No. 2 (2020): CommIT Journal Vol. 14 No. 1 (2020): CommIT Journal Vol 13, No 2 (2019): CommIT Vol. 13 No. 2 Tahun 2019 Vol 13, No 1 (2019): CommIT Vol. 13 No. 1 Tahun 2019 Vol. 13 No. 2 (2019): CommIT Journal Vol. 13 No. 1 (2019): CommIT Journal Vol 12, No 2 (2018): CommIT Vol. 12 No. 2 Tahun 2018 Vol 12, No 1 (2018): CommIT Vol. 12 No. 1 Tahun 2018 Vol. 12 No. 2 (2018): CommIT Journal Vol. 12 No. 1 (2018): CommIT Journal Vol 11, No 2 (2017): CommIT Vol. 11 No. 2 Tahun 2017 Vol 11, No 1 (2017): CommIT Vol. 11 No. 1 Tahun 2017 Vol. 11 No. 2 (2017): CommIT Journal Vol. 11 No. 1 (2017): CommIT Journal Vol 10, No 2 (2016): CommIT Vol. 10 No. 2 Tahun 2016 Vol 10, No 1 (2016): CommIT Vol. 10 No. 1 Tahun 2016 Vol. 10 No. 2 (2016): CommIT Journal Vol. 10 No. 1 (2016): CommIT Journal Vol 9, No 2 (2015): CommIT Vol. 9 No. 2 Tahun 2015 Vol 9, No 1 (2015): CommIT Vol. 9 No. 1 Tahun 2015 Vol. 9 No. 2 (2015): CommIT Journal Vol. 9 No. 1 (2015): CommIT Journal Vol 8, No 2 (2014): CommIT Vol. 8 No. 2 Tahun 2014 Vol 8, No 1 (2014): CommIT Vol. 8 No. 1 Tahun 2014 Vol. 8 No. 2 (2014): CommIT Journal Vol. 8 No. 1 (2014): CommIT Journal Vol 7, No 2 (2013): CommIT Vol.7 No. 2 Tahun 2013 Vol 7, No 1 (2013): CommIT Vol. 7 No. 1 Tahun 2013 Vol. 7 No. 2 (2013): CommIT Journal Vol. 7 No. 1 (2013): CommIT Journal Vol 6, No 2 (2012): CommIT Vol. 6 No. 2 Tahun 2012 Vol 6, No 1 (2012): CommIT Vol. 6 No. 1 Tahun 2012 Vol. 6 No. 2 (2012): CommIT Journal Vol. 6 No. 1 (2012): CommIT Journal Vol 5, No 2 (2011): CommIT Vol. 5 No. 2 Tahun 2011 Vol 5, No 1 (2011): CommIT Vol. 5 No. 1 Tahun 2011 Vol. 5 No. 2 (2011): CommIT Journal Vol. 5 No. 1 (2011): CommIT Journal Vol 4, No 2 (2010): CommIT Vol. 4 No. 2 Tahun 2010 Vol 4, No 1 (2010): CommIT Vol. 4 No. 1 Tahun 2010 Vol. 4 No. 2 (2010): CommIT Journal Vol. 4 No. 1 (2010): CommIT Journal Vol 3, No 2 (2009): CommIT Vol. 3 No. 2 Tahun 2009 Vol 3, No 1 (2009): CommIT Vol. 3 No. 1 Tahun 2009 Vol. 3 No. 2 (2009): CommIT Journal Vol. 3 No. 1 (2009): CommIT Journal Vol 2, No 2 (2008): CommIT Vol. 2 No. 2 Tahun 2008 Vol 2, No 1 (2008): CommIT Vol. 2 No. 1 Tahun 2008 Vol. 2 No. 2 (2008): CommIT Journal Vol. 2 No. 1 (2008): CommIT Journal Vol 1, No 2 (2007): CommIT Vol. 1 No. 2 Tahun 2007 Vol 1, No 1 (2007): CommIT Vol. 1 No. 1 Tahun 2007 Vol. 1 No. 2 (2007): CommIT Journal Vol. 1 No. 1 (2007): CommIT Journal More Issue