Claim Missing Document
Check
Articles

Found 18 Documents
Search

Performance Evaluation of Business Continuity Plan in Dealing with Threats and Risks in Cilegon Companies Use ISO 22301:2019 & NIST Sp 800-30 R1 Frameworks Case Study: PT. X Hendaryatna Hendaryatna; Gerry Firmansyah; Budi Tjahjono; Agung Mulyo Widodo
Asian Journal of Social and Humanities Vol. 1 No. 12 (2023): Asian Journal of Social and Humanities
Publisher : Pelopor Publikasi Akademika

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59888/ajosh.v1i12.120

Abstract

This research was conducted at PT.X which is located in Cilegon, Merak-Banten. Seeing the geographical location of PT.X which is in a disaster-prone area, the company must ensure an effective business continuity process. In accordance with government regulations on Electronic-Based Government Systems (SPBE) related to corporate and government business activities, companies must be able to ensure business continuity in every condition that poses a threat and risk, but with no specific obligation that is the basis for the company's business continuity if it does not have a Business Continuity Plan (BCP) process, it will get a sanction. The purpose of this research is to evaluate the existing BCP process at PT X Cilegon and provide recommendations for a standardized BCP framework in the company to ensure business continuity as the company's Business Continuity Management System (BCMS) to avoid all threats and risks. BCP has standards regulated in ISO 22301: 2019 as its framework, and in BCP there is a risk analysis process and this research will be carried out using the NIST SP 800-30 Revision 1 method as its best practice. The evaluation results show that the previous BCP process at PT X Cilegon was not in accordance with the standards and the risk analysis carried out was still based on the ISO that the company had implemented but not ISO 31000 which is the risk management standard, so this study provides recommendations for a BCP framework that is in accordance with the standards and risk analysis with risk analysis methods that produce risk priorities.
Analysis of School Community Sentiment towards Personal Data Protection Law Using Support Vector Machine (SVM) Method Gusti Fachman Pramudi; Gerry Firmansyah; Budi Tjahjono; Agung Mulyo Widodo
Asian Journal of Social and Humanities Vol. 1 No. 12 (2023): Asian Journal of Social and Humanities
Publisher : Pelopor Publikasi Akademika

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59888/ajosh.v1i12.121

Abstract

This research aims to analyze the awareness status of the school community regarding the right to personal data protection, test and analyze the sentiments of the school community towards the implementation of the Personal Data Protection Law and as a means of outreach regarding personal data protection laws in the world of education, especially school community besides that to find out whether the Support Vector Machine method can be used as a method in conducting Sentiment Analysis research. The results of this study can be concluded that only 38% of the school community knows about this regulation while the other 62% still don't know much about this rule. Then for the use of the Support Vector Machine method which has been carried out five (5) trials using different variations of training data and test data produces an average accuracy rate of 85.97% with the highest results on training data and test data 50% - 50% that is equal to 88.00% and the lowest result is in the experiment of training data and test data of 90% - 10% which is equal to 84.44%. For the school community's sentiment towards the Personal Data Protection Act, it was 56% or as many as 496 of 887 words. which shows a neutral response and 8% or as many as 72 out of 887 sentiment words show a negative response.
Analysis and Design of Serviced Oriented Architecture (SOA) with Service-Oriented Modeling And Architechture (SOMA) Method in Trucking Services Company (Case Study: PT Argo Kencana Transindo) Intan Setya Palupi; Husni Satra Mihardja; Habibullah Akbar; Gerry Firmansyah
Asian Journal of Social and Humanities Vol. 1 No. 12 (2023): Asian Journal of Social and Humanities
Publisher : Pelopor Publikasi Akademika

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59888/ajosh.v1i12.128

Abstract

Service Oriented Architecture (SOA) is an architectural approach which uses basic construction in the form of services to support rapid system development at low cost and has the ease of managing the composition of distributed applications even in heterogeneous environments. PT Argo Kencana Transindo (PT AKT) is a company in the field of transportation services or freight forwarding. Until now, the company in carrying out its operations still uses an information system that is only integrated with computerized applications, namely Microsoft excel, Microsoft word and also a simple system but there is no information system that is integrated between departments to be able to manage a lot of existing work. For the trucking industry, fast and efficient delivery times are essential to meet customer needs and maintain competitiveness in a competitive market. Facing the opportunity of changing business process needs in the future, SOA offers adaptive and reactive to the environment and offers solutions to business complexity, system diversity and technology. This research analyzes and designs SOA using the SOMA method which is expected to contribute to making it easier to integrate with other systems and services, helping to streamline communication and data sharing throughout the supply chain, leading to more efficient and effective operations.
Emotional Classification Based on Facial Expression Recognition Using Convolutional Neural Network Method Arif Pami Setiaji; Gerry Firmansyah; Habibullah Akbar; Budi Tjahjono; Agung Mulyo Widodo
Asian Journal of Social and Humanities Vol. 1 No. 12 (2023): Asian Journal of Social and Humanities
Publisher : Pelopor Publikasi Akademika

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59888/ajosh.v1i12.139

Abstract

In recent years, the development of human-computer interaction technology has reached remarkable levels, particularly in the field of facial expression recognition. This technology utilizes human facial images to identify and classify emotional expressions such as happiness, sadness, fear, and more through computer image processing. Active research in facial expression recognition yields substantial benefits for individual and societal advancement, especially in the context of its application within Smart City environments. This study demonstrates that well- configured Convolutional Neural Network (CNN) models empowered by TensorFlow exhibit higher accuracy compared to models utilizing PyTorch. The TensorFlow model achieves the highest accuracy of 93% in recognizing emotional expressions, whereas the PyTorch model achieves 69% accuracy. The TensorFlow model also displays lower accuracy loss and shorter training times compared to the PyTorch model. In the context of calculating happiness indices within Smart City environments, the appropriate choice of technology significantly influences measurement accuracy and efficiency. Therefore, the TensorFlow platform, proven to deliver superior performance in this study, can be a strategic choice for integrating facial expression detection technology into happiness index measurements in such locations
Utilization of LSTM (Long Short Term Memory) Based Sentiment Analysis for Stock Price Prediction Muhammad Fajrul Aslim; Gerry Firmansyah; Budi Tjahjono; Habibullah Akbar; Agung Mulyo Widodo
Asian Journal of Social and Humanities Vol. 1 No. 12 (2023): Asian Journal of Social and Humanities
Publisher : Pelopor Publikasi Akademika

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59888/ajosh.v1i12.141

Abstract

This study aims to utilize sentiment analysis in predicting stock price movements. Sentiment analysis can provide information to investors to understand market sentiment. This study uses a text-based approach by pre-processing data, constructing a sentiment analysis model and evaluating model performance. The collected data is analyzed to identify the text's positive, negative, or neutral sentiments. The approach used in scoring sentiment analysis is the Text blob approach and the Lexicon approach. Differences in the results of the accuracy of the two Sentiment Analysis approaches with the LSTM model have an influence on the prediction results with a better increase in accuracy using the Lexicon Sentiment Analysis approach. Then the LSTM model is implemented to classify texts into the desired sentiment categories. The results of this study are insight into the use of sentiment analysis in predicting stock price movements. The implemented sentiment analysis model can be a useful predictive tool for investors and stock practitioners in making investment decisions.
Analysis of Knowledge Management Strategies for Handling Cyber Attacks with the Computer Security Incident Response Team (CSIRT) in the Indonesian Aviation Sector Lingga Dwiaji; Agung Mulyo Widodo; Gerry Firmansyah; Budi Tjahyono
Asian Journal of Social and Humanities Vol. 2 No. 6 (2024): Asian Journal of Social and Humanities
Publisher : Pelopor Publikasi Akademika

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59888/ajosh.v2i6.261

Abstract

Cyber attacks are one of the genuine threats that have emerged due to the evolution of a more dynamic and complex global strategic environment. In Indonesia, several cyber attacks target various government infrastructure sectors. The National Cyber and Crypto Agency (BSSN) predicts Indonesia will face approximately 370.02 million cyber attacks in 2022. The majority of cyber attacks target the government administration sector. The National Cyber and Crypto Agency (BSSN) officially formed a Computer Security Incident Response Team (CSIRT) to tackle the rampant cybercrime cases. CSIRT is an organization or team that provides services and support to prevent, handle, and respond to computer security incidents. The current CSIRT does not have a data storage process and forensic preparation. CSIRT will repeat the procedure, and so on. This is a repeating procedure; the attack will occur once, and only a technical problem will arise. Therefore, the research entitled "Analysis of Knowledge Management Strategies for Handling Cyber Attacks with the Computer Security Incident Response Team (CSIRT)" is expected to implement this Knowledge Management Strategy to manage existing knowledge so that it can make it easier for the CSIRT team to handle cyber attacks that occur.
Assessment of the level of student understanding in the distance learning process using Machine Learning Adilah Widiasti; Agung Mulyo Widodo; Gerry Firmansyah; Budi Tjahjono
Asian Journal of Social and Humanities Vol. 2 No. 6 (2024): Asian Journal of Social and Humanities
Publisher : Pelopor Publikasi Akademika

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59888/ajosh.v2i6.272

Abstract

As technology develops, data mining technology is created which is used to analyse the level of understanding of students. This analysis is conducted to group students according to their ability to understand and master the subject matter. This research can provide guidance and insight for educators, as well as artificial intelligence, machine learning, association techniques, and classification techniques. Researchers and policymakers are working to optimise learning and improve the quality of student understanding. This study aims to analyse the level of student understanding in simple and structured terms. Using the Machine learning method to analyse the level of student understanding has the potential to impact the quality of education significantly. In addition, machine learning categories are qualified to be applied to the concept of data mining. The data mining techniques used are association and classification. Association techniques are used to determine the pattern of distance student learning. The following process of classification techniques is used to determine the variables to be used in this study using the Logistic Regression model where data that have been classified are grouped or clustered using the K-Means algorithm into three, namely the level of understanding is excellent, sound, and lacking, based on student activity, assignment scores, quiz scores, UTS scores, and UAS scores.
Integration Of Garch Models And External Factors In Gold Price Volatility Prediction: Analysis And Comparison Of Garch-M Approach Arisandi Langgeng Tardiana; Habibullah Akbar; Gerry Firmansyah; Agung Mulyo Widodo
Eduvest - Journal of Universal Studies Vol. 4 No. 5 (2024): Journal Eduvest - Journal of Universal Studies
Publisher : Green Publisher Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59188/eduvest.v4i5.1195

Abstract

This study investigates the volatility of gold prices by applying the Generalized Autoregressive Conditional Heteroskedasticity (GARCH) model and extending it with the GARCH-M model, incorporating the Federal Reserve's interest rate as an external variable. The GARCH(1,1) model revealed a positive average daily return for gold, with high sensitivity to recent price changes, indicated by the significant estimation of mu and a high alpha1 value. The persistence of past volatility on current volatility is reflected by a beta1 value close to one. In the GARCH-M model development, a significant negative relationship was found between the Federal Reserve's interest rates and gold returns, suggesting that an increase in the Federal Reserve's interest rates could potentially decrease gold returns. An increase in the Log Likelihood value and improvements in information criteria such as the Akaike Information Criterion (AIC) and the Bayesian Information Criterion (BIC) indicate that the GARCH-M model provides a better fit than the GARCH(1,1) model that uses only gold price data. The study concludes that macroeconomic factors like the Federal Reserve's interest rates play a crucial role in influencing gold price volatility, and these findings can aid investors and portfolio managers in devising more effective risk management strategies. Additionally, the findings contribute to financial theory by highlighting the importance of multivariate models in the analysis of asset price volatility.