cover
Contact Name
Maria Lamury
Contact Email
ejaict@sgu.ac.id
Phone
+622129779596
Journal Mail Official
ejaict@sgu.ac.id
Editorial Address
Directorate of Academic Research and Community Services Swiss German University The Prominence Office Tower Jl. Jalur Sutera Barat No. 15 Alam Sutera, Tangerang 15143
Location
Kota tangerang,
Banten
INDONESIA
Journal of Applied Information, Communication and Technology
ISSN : 23551771     EISSN : 27234827     DOI : https://doi.org/10.33555/
Core Subject : Science,
Journal of Applied Information, Communication and (eJAICT) welcomes full research papers in the area of Information and Communication Technology (ICT). The journal publishes review and research result on the frontier research, development, and application in the scope of ICT. The scope of the journal includes but not limited to: 1. Computer Network and Telecommunication 2. Wireless & Mobile Computing 3. Internet Technology 4. Multimedia System 5. Software Engineering 6. Computer Science 7. Information System and Knowledge Management 8. Data Analytics and Data Mining 9. Cyber and Computer Security
Articles 5 Documents
Search results for , issue "Vol. 5 No. 1 (2018)" : 5 Documents clear
Business Intelligence (BI) Implementation - COBIT 4.1 Firmansyah, Denny
Journal of Applied Information, Communication and Technology Vol. 5 No. 1 (2018)
Publisher : Swiss German University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33555/ejaict.v5i1.5

Abstract

The present paper aims to propose a general procedure to sizing and improve the Information Technology in an organization. The use of information systems has led to the recognition of the importance of quality management in the competitive environment. However, only few companies have taken actions to measure and enhance the quality of information. Hidden costs and poor quality of information may adversely measuring the performance of Business Intelligence systems based on COBIT 4.1 [1]. The value of the study is the ability to use business intelligence for the purpose of implementation and management capability.
Analysis of Twitter-based Malware Propagation using SIR Epidemic Model Yonathan, Alfius
Journal of Applied Information, Communication and Technology Vol. 5 No. 1 (2018)
Publisher : Swiss German University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33555/ejaict.v5i1.45

Abstract

This paper presented an analysis of malware propagation scenario in which attacker exploit news spreading dynamics on Twitter. The malware propagation starts with an attacker crafting tweets about breaking news, event or tragedy that will lure user to click the short-URL provided in the tweet which then redirect user to malicious website, which in turn installed the malware in the user mobile device or computer. As the information spread in the Twitter then more users will be infected with malware. The underlying principle to analyze this type of malware propagation is that the spreading of information in Twitter can be modeled by using formal epidemic model of disease. The simulation result of the model shows parameters that highly impacting the spread of malware using Twitter as the medium.
Enhancing Laptop Security Policy using RiskIT Framework Wijaya, Andy; Soetomo, Mohammad Amin
Journal of Applied Information, Communication and Technology Vol. 5 No. 1 (2018)
Publisher : Swiss German University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33555/ejaict.v5i1.46

Abstract

The usage of laptop as replacement of PC for staff mobility has been continuing to increase for many companies. In the same time the threats related to the use of laptops has evolving due to technology and internet growth. To protect the corporate information, the policy of the laptop is become mandatory to continuously reviewed and enhanced. This paper explains the enhancement of laptop security policies. ISACA Risk IT Framework is used as the methodology. It is expected that the latest security risks (from social engineering to cyber risk) facing by the company are mitigated. New set of policies are suggested. It covers process, people and technology.
Factored Statistical Machine Translation for German-English Sulistyan, Darryl Yunus
Journal of Applied Information, Communication and Technology Vol. 5 No. 1 (2018)
Publisher : Swiss German University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33555/ejaict.v5i1.47

Abstract

Machine Translation is a machine that is going to automatically translate given sentences in a language to other particular language. This paper aims to test the effectiveness of a new model of machine translation which is factored machine translation. We compare the performance of the unfactored system as our baseline compared to the factored model in terms of BLEU score. We test the model in German-English language pair using Europarl corpus. The tools we are using is called MOSES. It is freely downloadable and use. We found, however, that the unfactored model scored over 24 in BLEU and outperforms the factored model which scored below 24 in BLEU for all cases. In terms of words being translated, however, all of factored models outperforms the unfactored model.
Implementation of data mining as a support of business application strategy Damayanti, Florensia Unggul
Journal of Applied Information, Communication and Technology Vol. 5 No. 1 (2018)
Publisher : Swiss German University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33555/ejaict.v5i1.49

Abstract

Data mining help industries create intelligent decision on complex problems. Data mining algorithm can be applied to the data in order to forecasting, identity pattern, make rules and recommendations, analyze the sequence in complex data sets and retrieve fresh insights. Yet, increasing of technology and various techniques among data mining availability data give opportunity to industries to explore and gain valuable information from their data and use the information to support business decision making. This paper implement classification data mining in order to retrieve knowledge in customer databases to support marketing department while planning strategy for predict plan premium. The dataset decompose into conceptual analytic to identify characteristic data that can be used as input parameter of data mining model. Business decision and application is characterized by processing step, processing characteristic and processing outcome (Seng, J.L., Chen T.C. 2010). This paper set up experimental of data mining based on J48 and Random Forest classifiers and put a light on performance evaluation between J48 and random forest in the context of dataset in insurance industries. The experiment result are about classification accuracy and efficiency of J48 and Random Forest , also find out the most attribute that can be used to predict plan premium in context of strategic planning to support business strategy.

Page 1 of 1 | Total Record : 5