cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota surabaya,
Jawa timur
INDONESIA
Journal of Information Systems Engineering and Business Intelligence
Published by Universitas Airlangga
ISSN : -     EISSN : -     DOI : -
Core Subject : Science,
Jurnal ini menerima makalah ilmiah dengan fokus pada Rekayasa Sistem Informasi ( Information System Engineering) dan Sistem Bisnis Cerdas (Business Intelligence) Rekayasa Sistem Informasi ( Information System Engineering) adalah Pendekatan multidisiplin terhadap aktifitas yang berkaitan dengan pengembangan dan pengelolaan sistem informasi dalam pencapaian tujuan organisasi. ruang lingkup makalah ilmiah Information Systems Engineering meliputi (namun tidak terbatas): -Pengembangan, pengelolaan, serta pemanfaatan Sistem Informasi. -Tata Kelola Organisasi, -Enterprise Resource Planning, -Enterprise Architecture Planning, -Knowledge Management. Sistem Bisnis Cerdas (Business Intelligence) Mengkaji teknik untuk melakukan transformasi data mentah menjadi informasi yang berguna dalam pengambilan keputusan. mengidentifikasi peluang baru serta mengimplementasikan strategi bisnis berdasarkan informasi yang diolah dari data sehingga menciptakan keunggulan kompetitif. ruang lingkup makalah ilmiah Business Intelligence meliputi (namun tidak terbatas): -Data mining, -Text mining, -Data warehouse, -Online Analytical Processing, -Artificial Intelligence, -Decision Support System.
Arjuna Subject : -
Articles 246 Documents
Perencanaan Arsitektur Perusahaan untuk Pengelolaan Aset di PT. Musdalifah Group menggunakan Kerangka Kerja Zachman Indah Safarina; Indra Kharisma Raharjana; Endah Purwanti
Journal of Information Systems Engineering and Business Intelligence Vol. 1 No. 2 (2015): October
Publisher : Universitas Airlangga

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1411.567 KB) | DOI: 10.20473/jisebi.1.2.59-72

Abstract

Abstrak— Aset adalah hal penting yang dimiliki oleh setiap perusahaan atau organisasi. Proses manajemen aset yang dilakukan dengan tepat akan membuat aset yang dimiliki oleh perusahaan atau organisasi lebih optimal. Karena proses manajemen aset belum terlaksana dengan maksimal, maka pada penelitian ini direncanakan sebuah arsitektur enterprise untuk proses manajemen aset untuk kelompok perusahaan PT. Musdalifah Group dengan kerangka kerja Zachman melalui tujuh tahap. Tahap pertama adalah pengumpulan data terkait manajemen aset perusahaan yang digunakan sebagai acuan perencanaan. Tahap kedua adalah inisialisasi perencanaan yang menghasilkan rencana kerja arsitektur perusahaan sesuai ruang lingkup dan kondisi perusahaan. Tahap ketiga, meninjau kondisi enterprise saat ini perusahaan, dengan hasil tinjauan model proses bisnis dan katalog sumber daya perusahaan terkait manajemen aset. Tahap keempat adalah analisis hasil tinjauan enterprise dengan analisis SWOT, sehingga dapat dihasilkan 5 rencana proses bisnis serta usulan sistem dan teknologi terintegrasi. Tahap kelima melakukan perencanaan arsitektur enterprise yaitu arsitektur data dengan hasil 34 kandidat entitas data, arsitektur aplikasi yang menghasilkan 9 kandidat aplikasi, dan arsitektur teknologi dengan hasil 3 kandidat perangkat keras dan platform aplikasi yang terintegrasi. Sedangkan tahap terakhir, perencanaan implementasi hasil penelitian yaitu, rencana pemenuhan komponen, rencana migrasi, dan evaluasi dampak arsitektur. Evaluasi dari hasil penelitian menyatakan bahwa cetak biru arsitektur dapat diterima oleh perusahaan dan dipertimbangkan untuk diimplementasikan beberapa tahun kedepan.Kata Kunci—Perencanaan Arsitektur Perusahaan, Kerangka Kerja Zachman, Manajemen Aset.Abstract— Asset is an important thing that owned by any company or organization. Asset management process aims to manage an organization’s assets optimally. Because of the asset management process has not been implemented maximally, so in this study planned an enterprise architecture for the process of asset management for the group of companies PT. Musdalifah Group using Zachman framework through seven phases. The first phase, data collection, and the results is relevant information of company’s asset management as a design reference. The second phase, planning initialization, generates enterprise architecture work plan according to the scope and conditions of the company. The third phase, reviewing the company's current enterprise conditions, the results of the review are models of business processes and enterprise resource catalog of related asset management. The fourth phase, results review analysis of enterprise with SWOT analysis, so it can produce 5 plan and proposed business processes and technology systems terintegrasi. The fifth phase, enterprise architecture planning of data architecture with the results are 37 data entities candidates, application architecture which produces 9 applications candidate, and technology architecture with the results are 3 hardware and application platform candidates. The last phase, planning the implementation of the research’s result, plan fulfillment component, the migration plan, and evaluating the impact of architecture. Evaluation of the result of research is describing that the architectural blueprints can be received by the company and considered to be implemented next few years.Keywords— Enterprise Architecture Planning, Zachman Framework, Asset Management.
One-Pot Synthesis of Requirements Elicitation for Operational BI (OBI) System: in the Context of the Modern Business Environment A.D.N. Sarma
Journal of Information Systems Engineering and Business Intelligence Vol. 5 No. 2 (2019): October
Publisher : Universitas Airlangga

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (407.593 KB) | DOI: 10.20473/jisebi.5.2.131-145

Abstract

Background: Requirement elicitation is the first step for any project. The available BI requirement elicitation approaches are focused more towards: the top pyramid of the management, less focus on the business aspect of an organization, historical in nature, emphasis on data mining and data warehousing aspects, no clear separation between requirements, and lack of proper linkage between the requirements.  The demand of BI shifts towards the operational front for last couple of years. The use of Operational BI is gaining more popularity among industry and business communities because of increased demand of real time BI.  It provides a powerful analysis of both operational and business information in current time for all levels of the users in the organization.Objective: In the modern business environment, the business operates on networks that demands multi-level decision-making capabilities as compared to the traditional business approaches. Operational BI is one of the business information systems that support the modern business environment and provides timely decision-making information to all the users in the organization. The requirement elicitation methodology for Operational BI system is found open for research. A new approach for requirement elicitation for an Operational BI system is presented in this paper, which highly suits to the organizations in the modern business environment.Methods: A top down technique is employed in the proposed requirements methodology that focuses on the business context of an organization. The proposed requirement elicitation approach is highly suited for the organizations that operate in the modern business environment. This approach overcomes several limitations in the existing BI requirement approaches. A case study is presented to support the proposed requirement elicitation approach for OBI system.Conclusion: This approach has several advantages like fast development, clear definition, classification of various types of requirements and proper linkage between the requirements without any loss or missing of gathering requirements. Finally, it is to conclude that the proposed approach acts as a one-pot synthesis of requirements elicitation for Operational BI system.Keywords: Business Context, Business, Intelligence, Business Networks, Protocols, Modern Business, Environment, Operational Business, Intelligence    Requirement,  Elicitation, Requirement, Methodology
Pengaruh dan Pola Aktivitas Penggunaan Internet serta Media Sosial pada Siswa SMPN 52 Surabaya Astrid Kurnia Sherlyanita; Nur Aini Rakhmawati
Journal of Information Systems Engineering and Business Intelligence Vol. 2 No. 1 (2016): April
Publisher : Universitas Airlangga

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1033.116 KB) | DOI: 10.20473/jisebi.2.1.17-22

Abstract

Abstrak— Perkembangan fungsi dari internet membuat internet dapat diakses bagi semua kalangan. Akhir-akhir ini, beberapa penelitian membuktikan bahwa sebagian besar pengguna internet adalah kalangan remaja. Berkembangnya media sosial secara mendunia secara tidak langsung memiliki pengaruh besar terhadap penggunaan internet bagi remaja. Fokus pada paper ini adalah penelitian seberapa besar pengaruh penggunaan internet dan media sosial bagi remaja ditinjau dari beberapa aspek serta pola aktivitas penggunaan sosial media pada remaja. Penelitian dilakukan terhadap 44  siswa dan 2 (dua) guru SMPN 52 Surabaya. Hasil survey kemudian dianalisis apakah para siswa memiliki pengetahuan yang cukup terhadap hal-hal yang sebaiknya dilakukan dan tidak berkaitan dengan keamanan dalam penggunaan media sosial. Didapatkan hasil bahwa siswa SMPN 52 Surabaya secara umum sudah dapat menentukan penggunaan internet secara baik, baik untuk sarana pembelajaran maupun fungsi hiburan seperti media sosial, di mana waktu interaksi siswa pada interaksi langsung di kehidupan sehari-hari dan waktu interaksi pada media sosial sudah seimbang dan sesuai dengan porsinya. Serta dapat diketahui bahwa para siswa SMPN 52 Surabaya sudah dapat mengetahui hal-hal dasar yang perlu diterapkan keamanan, seperti pembatasan privasi dan sharing  hanya untuk orang yang dikenal.Kata Kunci— Internet, Media Sosial, RemajaAbstract—Nowdays, internet is accessable for everyone. Previous studies prove that the majority of internet users are teenagers. Development of worldwide social media indirectly have a major influence on the use of the internet for teen. The focus of this paper is to investigate the impact of the Internet and social media for teens. We evaluated from several aspects as well as social media usage patterns of activity in adolescents. The study was conducted on 44 students and two teachers at SMPN 52 Surabaya. The results then analyzed whether the students have sufficient knowledge of the things that should be done and not related to safety in the use of social media. The results showed that the most of students at SMPN 52 Surabaya generally been able to determine the use of the Internet, both for the means of learning and entertainment functions such as social media, where the interaction time students on direct interaction in daily life and time interaction on social media is already balanced and accordance with the portions. As well as it can be seen that the students of SMPN 52 Surabaya already be aware of the basic things that need to be applied to security, such as restrictions on privacy and sharing only to people you know. Keywords— Internet, Social Media, Teen
Pengelompokan Wilayah Madura Berdasar Indikator Pemerataan Pendidikan Menggunakan Partition Around Medoids Dan Validasi Adjusted Random Index Budi Dwi Satoto; Bain Khusnul Khotimah; Iswati Iswati
Journal of Information Systems Engineering and Business Intelligence Vol. 1 No. 1 (2015): April
Publisher : Universitas Airlangga

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (279.174 KB) | DOI: 10.20473/jisebi.1.1.17-24

Abstract

Abstrak— Pemerataan pendidikan di Indonesia telah menjadi perhatian pemerintah sejak lama. Namun hingga saat ini, pendidikan di Indonesia masih belum merata. Hal tersebut dapat dilihat dari rendahnya nilai Angka Partisisipasi Kasar (APK) dan Angka Partisipasi Murni (APM) di daerah-daerah tertentu serta belum meratanya sarana dan prasarana pendidikan. Adapun tujuan penelitian ini adalah memberikan informasi kepada pemerintah setempat mengenai kondisi pendidikan di wilayahnya sehingga dapat menghasilkan kebijakan yang tepat mengenai pengembangan infrastuktur pendidikan dan distribusi guru bantu. Clustering adalah metode data mining yang membagi data kedalam kelompok yang mempunyai objek yang karakteristik sama. Penelitian ini menggunakan metode clustering Partition Around  Medoids (PAM) dengan 3 distance measure: Manhattan, Euclidean dan Canberra distance. Untuk mengukur kualitas hasil clustering, digunakan nilai Adjusted Rand Index (ARI). Semakin besar nilai ARI, semakin baik kualitas cluster. Dari 3 kali ujicoba diperoleh rata-rata nilai ARI untuk Euclidean distance sebesar 0.799, Manhattan distance dengan rata-rata sebesar 0.738 dan Canberra distance sebesar 0.163. Sedangkan pengelompokan terbaik diperoleh menggunakan Euclidean distance dengan nilai ARI sebesar 0.825 dan kecocokan dengan label asli sebesar 83.33%. Dari pengelompokan terbaik menghasilkan kelompok pemerataan tinggi terdiri dari 11 kecamatan, kelompok pemerataan sedang  terdiri dari 15 kecamatan dan kelompok pemerataan rendah terdiri dari 46 kecamatan. Kata Kunci— indikator pemerataan pendidikan, clustering, Partition Around Medoid, distance measure, Adjusted Random IndexAbstract—Distribution of education in Indonesia has become government's attention for a long time. But until now, education in Indonesia is still not evenly distributed. This can be seen from the low value of Participation Rough figures and net enrollment ratio in certain areas as well as uneven educational facilities. The purpose of this research is to provide information to local authorities about the state of education in local region to produce an appropriate policy regarding development of educational infrastructure and teachers assistant distribution. Clustering is a data mining method that divides data into several groups with the same object characteristics. This research used Partition Around Medoids methods with 3 distance measure that contain Manhattan, Euclidean and Canberra distance. Adjusted Random Index used to measure the quality of clustering results. From 3 times sampling, better value of ARI Euclidean distance 0.799,  Manhattan distance 0.738 and Canberra distance 0.163  while the best clustering obtained  is Euclidean distance with value of ARI 0.825 and compatibility with the original label 83.33%. it is produces high equity group composed of 11 districts with equity groups are composed of 15 districts and low equity group consists of 46 sub-districts. Keywords—Indicator of Educational Equity, Clustering, Partition Around Medoid, Distance Measure, Adjusted Random Index .
Process Discovery of Business Processes Using Temporal Causal Relation Yutika Amelia Effendi; Nania Nuzulita
Journal of Information Systems Engineering and Business Intelligence Vol. 5 No. 2 (2019): October
Publisher : Universitas Airlangga

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (367.519 KB) | DOI: 10.20473/jisebi.5.2.183-194

Abstract

Background: Nowadays, enterprise computing manages business processes which has grown up rapidly. This situation triggers the production of a massive event log. One type of event log is double timestamp event log. The double timestamp has a start time and complete time of each activity executed in the business process. It also has a close relationship with temporal causal relation. The temporal causal relation is a pattern of event log that occurs from each activity performed in the process.Objective: In this paper, seven types of temporal causal relation between activities were presented as an extended version of relations used in the double timestamp event log. Since the event log was not always executed sequentially, therefore using temporal causal relation, the event log was divided into several small groups to determine the relations of activities and to mine the business process.Methods: In these experiments, the temporal causal relation based on time interval which were presented in Gantt chart also determined whether each case could be classified as sequential or parallel relations. Then to obtain the business process, each temporal causal relation was combined into one business process based on the timestamp of activity in the event log.Results: The experimental results, which were implemented in two real-life event logs, showed that using temporal causal relation and double timestamp event log could discover business process models.Conclusion: Considering the findings, this study concludes that business process models and their sequential and parallel AND, OR, XOR relations can be discovered by using temporal causal relation and double timestamp event log.Keywords:Business Process, Process Discovery, Process Mining, Temporal Causal Relation, Double Timestamp Event Log
Pemanfaatan Teknologi Fingerprint Authentication untuk Otomatisasi Presensi Perkuliahan Abdulloh Fakih; Indra Kharisma Raharjana; Badrus Zaman
Journal of Information Systems Engineering and Business Intelligence Vol. 1 No. 2 (2015): October
Publisher : Universitas Airlangga

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (315.238 KB) | DOI: 10.20473/jisebi.1.2.41-48

Abstract

Abstrak— Dalam dunia pendidikan, daftar kehadiran atau presensi menjadi faktor penting yang tidak dapat dipisahkan dari kegiatan belajar mengajar dan evaluasi. Perguruan Tinggi biasanya menggunakan tanda tangan sebagai bukti kehadiran mahasiswa, sehingga data presensi kurang dapat dijamin validitasnya. Perlu dibangun sistem informasi presensi yang dapat memenuhi kebutuhan informasi dan meningkatkan keakuratan data. Penelitian ini bertujuan untuk menguji apakah sistem informasi presensi dengan memanfaatkan teknologi fingerprintauthentication lebih baik dibandingkan dengan sistem presensi konvensional yang selama ini digunakan.Terdapat beberapa tahapan dalam penelitian ini. Tahap pertama adalah identifikasi kebutuhan menggunakan teknik wawancara, studi berkas, dan observasi. Tahap kedua adalah analisis kebutuhan untuk merumuskan solusi dari permasalahan yang ada. Tahap ketiga adalah perancangan sistem menggunakan activity diagram, class diagram, dan sequence diagram. Tahap keempat adalah pembangunan sistem menggunakan bahasa pemrograman Java, php dan database MySQL. Tahap kelima adalah pengujian sistem menggunakan functional testing dan acceptance testing. Tahap terakhir adalah evaluasi sistem dengan membandingkan sistem informasi presensi yang sudah dibangun dengan sistem presensi konvensional yang selama ini digunakan.Hasil dari evaluasi sistem menunjukkan bahwa sistem informasi presensi dengan memanfaatkan teknologi fingerprintauthentication lebih baik dalam hal keakuratan data dan kemudahan manajemen presensi dibandingkan dengan sistem presensi konvensional yang selama ini digunakan.Kata Kunci— Presensi, Fingerprint Authentication, Sistem InformasiAbstract—The student’s attendance is an important factor that can not be separated from the learning and evaluation activities. Higher Education usually using a signature as the proof of student attendance. However, the data validity using this method can not be guaranteed. An attendance information systemcan be used to to fulfil the required information and to improve data accuracy. This research aimed to test whether the attendance information system using fingerprint authentication technology is better than the existing conventional attendance system. There were several phases in this research. The first phase was the requirement identification using interviews, file analysis, and the observation techniques. The second phase was the requirement analysis to formulate solutions of existing problems. The third phase was to design a system using activity diagrams, class diagrams, and sequence diagrams. The fourth phase was the development of a system using Java, PHP and MySQL database. The fifth phase was to test the system using functional testing and acceptance testing. The last step was the evaluation of the system by comparing the attendance information system and the existing conventional attendance system. Results of the evaluation system shows that attendance information system using fingerprint authentication technology is better in terms of data accuracy and attendance management than the conventional attendance system.Keywords—Attendance, Fingerprint Authentication, Information System
Untethering the Queue based on Multi Channel Access (MCA) Technology at Hospital Radiology Section Dharma Dyatmika; Oka Sudana; Gusti Agung A. Putri
Journal of Information Systems Engineering and Business Intelligence Vol. 5 No. 2 (2019): October
Publisher : Universitas Airlangga

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1483.668 KB) | DOI: 10.20473/jisebi.5.2.146-155

Abstract

Background: Information technology is developing rapidly over time, but there are many companies do not make use of it to support their operational activities. One example is the queue system in the Radiology Section of Sanglah Hospital, which operates the conventional queue system.Objective: The problem occurs in this queue system is inefficient waiting time because the patients must come early and wait in line in the hospital waiting rooms. Many patients thereafter decide going home first or doing other activities. Another problem is it triggers double costs of transportation. The purpose of this study is to improve patients comfort while waiting in queue by applying untethering the queue. Untethering the queue is a service that allows people to be in a queue even though they are not in the waiting room.Methods: The system applies the FCFS (First Come First Serve) algorithm to manage patients’ queue and integrates this queue system with Telegram and SMS gateway. It makes patients easier to take queue numbers and receive notification of health service time from the Radiology Section of Sanglah Hospital.Result:  As a result of this study is an untethering the queue application which is web-based queue system integrated to Telegram and SMS gateway. The daily queue services in the Radiology Section of Hospital can be improved through this application.Conclusion: Patients can only come to the hospital when the queue numbers obtained nearly the health service time so that it leads to time efficient and comfort while waiting in queue.Keywords:First Come First Serve, Multi Channel Access, SMS, Telegram, Untethering the Queue
Perancangan dan Penerapan Konten e-Learning melalui Learning Management System dalam Meningkatkan Motivasi Belajar Studi Kasus pada Mata Kuliah Pemrograman Basis Data Elis Hernawati; Pramuko Aji
Journal of Information Systems Engineering and Business Intelligence Vol. 2 No. 1 (2016): April
Publisher : Universitas Airlangga

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (569.447 KB) | DOI: 10.20473/jisebi.2.1.23-32

Abstract

Abstrak – Mata Kuliah Pemrograman Basis Data merupakan salah satu mata kuliah inti dan memiliki kompetensi utama pada program studi D3 Manajemen Informatika di Fakultas Ilmu Terapan Unversitas Telkom. masih banyak mahasiswa yang merasa kesulitan mengikuti mata kuliah ini karena metode pembelajarannya masih dilakukan secara konvensional dengan pengajaran berpusat pada dosen. Dosen memberikan materi berupa slide di dalam kelas dan mahasiswa mendengarkan penjelasan dosen. Kegiatan belajar mengajar dilakukan secara terus menerus di dalam kelas. Hal ini membuat mahasiswa bosan dan menurunkan minat dan motivasi belajar mereka.  Untuk mengatasi masalah ini penulis akan membuat suatu rancangan konten e-learning mata kuliah pemrograman basis data dan menerapkannya melalui Learning Management System (LMS) terintegrasi yang bernama iDea milik Universitas Telkom. Metode yang digunakan untuk membangun konten e-learning ini adalah metode prototype dan software aplikasi yang digunakan untuk pembuatan konten interaktif adalah Microsoft Power Point yang didalamnya terkandung teks, video, animasi flash dan narasi serta software aplikasi Wondershare QuizCreator untuk pembuatan soal interaktif. Untuk mengukur konten e-learning yang dihasilkan dilakukan pengujian dengan menggunakan kuesioner dan beberapa contoh soal dalam bentuk aplikasi media interaktif. Hasil pengujian akan memperlihatkan seberapa besar minat dan pemahaman mahasiswa terhadap konten e-learning yang telah dirancang.Kata Kunci – Perancangan Konten, e-Learning, Media InteraktifAbstract - Database Programming is one of the core courses and has core competencies in the study program of D3 Information Management at the School of Applied Science of Telkom University. There are many students who find it hard to follow this course because its learning methodology is still done conventionally with teacher-centered learning. The lecturers provide the materials in the form of slides and explain it in the classroom and the students listen to the lecturers’ explanation. The learning activities are always carried out in the classroom. This makes the students bored and decreases their learning interest and motivation. To overcome this problem, the writer is going to create a design of e-learning contents for Database Programming course and implement it through an integrated Learning Management System (LMS) named IDEA that is owned by Telkom University. The method used to create this e-learning contents is the prototype method, the application used to create the interactive contents (that contain text, video, flash animation, and narration) is Microsoft PowerPoint, and the application used to create the interactive quiz is Wondershare Quiz Creator. An examination is done to measure the e-learning content created, by using questionnaires and some samples of questions in the form of interactive media application. The test results will show how much the interest and understanding of students to the e-learning content that has been created.Keywords - Contents Design, e-Learning, Interactive Media
Penerapan Reverse Engineering Dalam Penentuan Pola Interaksi Sequence Diagram Pada Sampel Aplikasi Android Vierdy Sulfianto Rahmadani; Indra Kharisma Raharjana; Taufik Taufik
Journal of Information Systems Engineering and Business Intelligence Vol. 1 No. 1 (2015): April
Publisher : Universitas Airlangga

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (544.862 KB) | DOI: 10.20473/jisebi.1.1.25-32

Abstract

Abstrak—Tujuan penelitian ini adalah penerapan reverse engineering untuk penentuan pola interaksi Sequence diagram yang bisa digunakan oleh sistem analis sebagai pola templateuntuk mendesain UML sequence diagram. Aplikasi yang digunakan sebagai data dasar berasal dari aplikasi contoh milik Android, aplikasi inilah yang mengalami proses reverse engineering dan teridentifikasi polanya. Tahap pertama yang dilakukan dalam penentuan pola interaksi ini adalah pengumpulan aplikasi dataset. Tahapan selanjutnya adalah identifikasi fitur dan aktifitas aplikasi, melakukan reverse engineeringsehingga didapatkan model sequence diagram,kemudian melakukan sistesis semua model tersebut menjadi pola interaksi sequence diagram. Langkah terakhir adalah menguji pola tersebut dengan menerapkannya dalam pembangunan aplikasi studi kasus. Berdasarkan hasil evaluasi, disimpulkan bahwa pola interaksi pada sequence diagram yang didapatkan dari penelitian ini dapat diterapkan pada perancangan perangkat lunak yang memiliki fitur-fitur yang sama dengan fitur-fitur yang terdapat pada penelitian ini. Kata Kunci— Reverse Engineering, Pola Interaksi, Sequence Diagram, AndroidAbstract—The purpose of this research is to apply the application of reverse engineering to determine interaction patterns of the Sequence diagram that can be used by system analysts as a template for designing UML sequence diagrams. Sample applications from android are used as dataset for reverse engineering and pattern identification. The first step is collecting application datasets. The next stage is identifying the features and applications activity, reverse engineering to obtain a sequence diagram model, and then synthesize all of the models into an interaction pattern of sequence diagram. The final step is to test the patterns by implementing it in an application development case stud. The evaluation results concludes that interaction patterns of sequence diagram designs obtained in reverse engineering steps is able to be implemented in software development that contained similar features with the obtained features in this research. Keywords— Reverse Engineering, Interaction Pattern, Sequence Diagram, Android
Hybrid Mobile Executive Information (m-EIS) System Using Quasar Framework for Indonesia Financial Service Authority Dina Fitria Murad; Wirianto Widjaya; Dwi Rahmania Noviani; Nur Fitriyyah; Liany Minarni Saputri
Journal of Information Systems Engineering and Business Intelligence Vol. 5 No. 2 (2019): October
Publisher : Universitas Airlangga

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1668.443 KB) | DOI: 10.20473/jisebi.5.2.195-207

Abstract

Background: Given the digital transformation in currently emerging digital era in Financial Service Industry; marked by the rise of Fintech; Financial Service Authority (FSA) is challenged to mitigate new type of risks that are introduced by it. As first step, Indonesia FSA seeks for an effective and efficient way to present up-to-date Strategic Information to its Top Executive Leaders to enable informed strategic decision making.Objective: This study aimed to find the solution to provide information strategic information to Indonesia FSA executives at any-time any-where. The researchers hypothesize that mobile Executive Information System could effectively serve the purpose.Methods: The research activities are laid out based on the Unified Process (UP) Methodology and use Unified Modelling Language (UML) diagrams to communicate the design. At the end of the study, a survey-based on TAM2 is conducted to confirm the study result. The survey is tested to measure its validity, reliability and correlation analysis using SPSS.Results: The study produce mobile executive information system (m-EIS) geared with the latest UI technology framework; Quasar; and microservice pattern. The m-EIS is deployed and implemented. The survey result shows the overall users’ acceptance of the implementation.Conclusion: The study recommends the further enhancement of m-EIS and highlights limitation of the current study for which future study could address and improve.Keywords:Executive Information System, Financial Service Authority, Financial Service Industry, Hybrid Mobile Application, Unified Modelling Language, Unified Process

Page 9 of 25 | Total Record : 246