cover
Contact Name
Maria Lamury
Contact Email
ejaict@sgu.ac.id
Phone
+622129779596
Journal Mail Official
ejaict@sgu.ac.id
Editorial Address
Directorate of Academic Research and Community Services Swiss German University The Prominence Office Tower Jl. Jalur Sutera Barat No. 15 Alam Sutera, Tangerang 15143
Location
Kota tangerang,
Banten
INDONESIA
Journal of Applied Information, Communication and Technology
ISSN : 23551771     EISSN : 27234827     DOI : https://doi.org/10.33555/
Core Subject : Science,
Journal of Applied Information, Communication and (eJAICT) welcomes full research papers in the area of Information and Communication Technology (ICT). The journal publishes review and research result on the frontier research, development, and application in the scope of ICT. The scope of the journal includes but not limited to: 1. Computer Network and Telecommunication 2. Wireless & Mobile Computing 3. Internet Technology 4. Multimedia System 5. Software Engineering 6. Computer Science 7. Information System and Knowledge Management 8. Data Analytics and Data Mining 9. Cyber and Computer Security
Articles 48 Documents
Business Intelligence (BI) Implementation - COBIT 4.1 Firmansyah, Denny
Journal of Applied Information, Communication and Technology Vol. 5 No. 1 (2018)
Publisher : Swiss German University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33555/ejaict.v5i1.5

Abstract

The present paper aims to propose a general procedure to sizing and improve the Information Technology in an organization. The use of information systems has led to the recognition of the importance of quality management in the competitive environment. However, only few companies have taken actions to measure and enhance the quality of information. Hidden costs and poor quality of information may adversely measuring the performance of Business Intelligence systems based on COBIT 4.1 [1]. The value of the study is the ability to use business intelligence for the purpose of implementation and management capability.
Analysis of Twitter-based Malware Propagation using SIR Epidemic Model Yonathan, Alfius
Journal of Applied Information, Communication and Technology Vol. 5 No. 1 (2018)
Publisher : Swiss German University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33555/ejaict.v5i1.45

Abstract

This paper presented an analysis of malware propagation scenario in which attacker exploit news spreading dynamics on Twitter. The malware propagation starts with an attacker crafting tweets about breaking news, event or tragedy that will lure user to click the short-URL provided in the tweet which then redirect user to malicious website, which in turn installed the malware in the user mobile device or computer. As the information spread in the Twitter then more users will be infected with malware. The underlying principle to analyze this type of malware propagation is that the spreading of information in Twitter can be modeled by using formal epidemic model of disease. The simulation result of the model shows parameters that highly impacting the spread of malware using Twitter as the medium.
Enhancing Laptop Security Policy using RiskIT Framework Wijaya, Andy; Soetomo, Mohammad Amin
Journal of Applied Information, Communication and Technology Vol. 5 No. 1 (2018)
Publisher : Swiss German University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33555/ejaict.v5i1.46

Abstract

The usage of laptop as replacement of PC for staff mobility has been continuing to increase for many companies. In the same time the threats related to the use of laptops has evolving due to technology and internet growth. To protect the corporate information, the policy of the laptop is become mandatory to continuously reviewed and enhanced. This paper explains the enhancement of laptop security policies. ISACA Risk IT Framework is used as the methodology. It is expected that the latest security risks (from social engineering to cyber risk) facing by the company are mitigated. New set of policies are suggested. It covers process, people and technology.
Factored Statistical Machine Translation for German-English Sulistyan, Darryl Yunus
Journal of Applied Information, Communication and Technology Vol. 5 No. 1 (2018)
Publisher : Swiss German University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33555/ejaict.v5i1.47

Abstract

Machine Translation is a machine that is going to automatically translate given sentences in a language to other particular language. This paper aims to test the effectiveness of a new model of machine translation which is factored machine translation. We compare the performance of the unfactored system as our baseline compared to the factored model in terms of BLEU score. We test the model in German-English language pair using Europarl corpus. The tools we are using is called MOSES. It is freely downloadable and use. We found, however, that the unfactored model scored over 24 in BLEU and outperforms the factored model which scored below 24 in BLEU for all cases. In terms of words being translated, however, all of factored models outperforms the unfactored model.
Gamification: Classification of the Users Based on Player Types and Motivations Tunggawan, Edwin
Journal of Applied Information, Communication and Technology Vol. 5 No. 2 (2018)
Publisher : Swiss German University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33555/ejaict.v5i2.48

Abstract

A comparison between two methods to understand the players’ behavior in games. The first one is the player types model by Richard Bartle, and the second is the motivations model by Nick Yee. It’s concluded that Yee’s model is better when the developers need a more detailed understanding on their users, while Bartle’s model is better to use when the developers need to classify the users in a quicker and simpler way.
Implementation of data mining as a support of business application strategy Damayanti, Florensia Unggul
Journal of Applied Information, Communication and Technology Vol. 5 No. 1 (2018)
Publisher : Swiss German University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33555/ejaict.v5i1.49

Abstract

Data mining help industries create intelligent decision on complex problems. Data mining algorithm can be applied to the data in order to forecasting, identity pattern, make rules and recommendations, analyze the sequence in complex data sets and retrieve fresh insights. Yet, increasing of technology and various techniques among data mining availability data give opportunity to industries to explore and gain valuable information from their data and use the information to support business decision making. This paper implement classification data mining in order to retrieve knowledge in customer databases to support marketing department while planning strategy for predict plan premium. The dataset decompose into conceptual analytic to identify characteristic data that can be used as input parameter of data mining model. Business decision and application is characterized by processing step, processing characteristic and processing outcome (Seng, J.L., Chen T.C. 2010). This paper set up experimental of data mining based on J48 and Random Forest classifiers and put a light on performance evaluation between J48 and random forest in the context of dataset in insurance industries. The experiment result are about classification accuracy and efficiency of J48 and Random Forest , also find out the most attribute that can be used to predict plan premium in context of strategic planning to support business strategy.
Research of Web Real-Time Communication - the Unified Communication Platform using Node.js Signaling Server Damayanti, Florensia Unggul
Journal of Applied Information, Communication and Technology Vol. 5 No. 2 (2018)
Publisher : Swiss German University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33555/ejaict.v5i2.54

Abstract

The way of people communicate has been changed from generation. With rapid innovation of technology and the improvement of computer technology, smartphone, tablet and etc., the traditional communication is confronted. However, unified communication born and Web Real-Time Communication as a part of the innovation of communication technology, enhance the way peoples share their thought, feeling and information, in real-time and different place. This research offers an educational foundation and applied research of WebRTC, to leverage unified communication, through WebSocket node.js as the signalling protocol. A system of web real-time communication developed at the end of research to give an understanding and view of the opportunity given by WebRTC technology, such as leverage online distance-learning with a real-time communication, healthcare video conferencing, online video conference, self-service customer care and corporate online meeting.
Forensic Analysis of Artifacts of Giant Instant Messaging “WhatsApp” in Android Smartphone Ghannam, Hussein Abed
Journal of Applied Information, Communication and Technology Vol. 5 No. 2 (2018)
Publisher : Swiss German University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33555/ejaict.v5i2.55

Abstract

WhatsApp is a giant mobile instant message IM application with over 1billion users. The huge usage of IM like WhatsApp through giant smart phone “Android” makes the digital forensic researchers to study deeply. The artefacts left behind in the smartphone play very important role in any electronic crime, or any terror attack. “WhatsApp” as a biggest IM in the globe is considered to be very important resource for information gathering about any digital crime. Recently, end-to-end encryption and many other important features were added and no device forensic analysis or network forensic analysis studies have been performed to the time of writing this paper. This paper explains how can we able to extract the Crypt Key of “WhatsApp” to decrypt the databases and extract precious artefacts resides in the android system without rooting the device. Artefacts that extracted from the last version of WhatsApp have been analysed and correlate to give new valuable evidentiary traces that help in investigating. Many hardware and software tools for mobile and forensics are used to collect as much digital evidence as possible from persistent storage on android device. Some of these tools are commercial like UFED Cellebrite and Andriller, and other are open source tools such as autopsy, adb, WhatCrypt. All of these tools that forensically sound accompanied this research to discover a lot of artefacts resides in android internal storage in WhatsApp application.
Collecting Malware in Swiss German University with Low Energy and Cost Computer Marcello, Mario
Journal of Applied Information, Communication and Technology Vol. 5 No. 2 (2018)
Publisher : Swiss German University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33555/ejaict.v5i2.57

Abstract

The malware spreads massively in Indonesia. The security in Information Technology doesn’t seem to become a top priority for Indonesian. The use of pirated software is still high, although it is the biggest threat and entrance for the malwares to attacks. This paper shows how to collect a spreading malware in a system to know the malware trends that exist. So, the owner may know the malware trends inside his system and he can countermeasure the attacks. To collect the malwares, I use the Dionaea, the honeypot to collect malware and implement it to Raspberry Pi. Raspberry Pi is a small, low cost and low energy consumption computer. By using Raspberry Pi to collect malware, we can minimize budget, save the energy and space.
Strategies to Reduce Rework in Software Development on IT Organization Case Study of: PT. XYZ Kurniawan, Nurul Kholis
Journal of Applied Information, Communication and Technology Vol. 5 No. 2 (2018)
Publisher : Swiss German University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33555/ejaict.v5i2.58

Abstract

Today’s world, developing an application that meets exactly the need of organizational business is getting tougher and more challenging, with the additional complexity of business flow and the increasing and diversity of the data that an organization has. In addition, the customers are more demanding than before in term of using an information system or software application and within an instant result which gives an extra pressure for those who work as an application developer. Rework of the software application tends to contain very negative impact to the company because it is impacting the cost for the organization. This paper is trying to resolve the problem that causes a lot of rework occurred in the case study provided. By finding out the root cause of the problem, the literature study is conducted in order to have some recommendations to be applied to the case study given. After having a discussion by conducting interview session with the expert, the result in form of a recommendation is then defined. As the final result, it is decided that the best and most appropriate recommendation to be applied is by implementing System Configuration Management (SCM) and the SMC tools chosen is Team Foundation Server or usually called as TFS.