cover
Contact Name
Yana Priyana
Contact Email
mrpyana@gmail.com
Phone
+6282105575700
Journal Mail Official
info@westscience-press.com
Editorial Address
Grand Slipi Tower, level 42 Unit G-H Jl. S Parman Kav 22-24, RT. 01 RW. 04 Kel. Palmerah Kec. Palmerah Jakarta Barat 11480
Location
Kota adm. jakarta barat,
Dki jakarta
INDONESIA
Science Information System and Technology
Published by Westscience Press
ISSN : 30261120     EISSN : 30255120     DOI : https://doi.org/10.58812/wsist.v1i02
Core Subject : Science,
West Science Information System and Technology is a scholarly journal dedicated to the exploration and advancement of knowledge in the field of information systems and technology. The journal aims to publish high-quality research articles that contribute significantly to the understanding and development of information systems and technologies in the Western world. The journal covers a wide range of topics related to information system design, development, implementation, and management. It encompasses areas such as information systems development methodologies, database management systems, information technology infrastructure, enterprise systems, decision support systems, information systems security and privacy, human-computer interaction, and ethical and social implications of information systems.
Articles 30 Documents
Enhancing Security and Reliability of Information Systems through Blockchain Technology: A Case Study on Impacts and Potential Adi Nugroho Susanto Putro; Sabil Mokodenseho; Nur Alim Hunawa; Muhatir Mokoginta; Evelin Ragil Marjoni Marjoni
West Science Information System and Technology Vol. 1 No. 01 (2023): West Science Information System and Technology
Publisher : Westscience Press

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58812/wsist.v1i01.166

Abstract

In the digital age, ensuring the security and reliability of information systems is a paramount concern for organizations. This research investigates the potential of blockchain technology to enhance information system security and reliability within the dynamic landscape of Indonesian start-up companies. By employing a mixed-methods approach, combining qualitative interviews and quantitative surveys, this study explores the current state of information system security practices, assesses the challenges faced by start-ups, and evaluates perceptions regarding the adoption of blockchain technology. The qualitative findings highlight the existing security measures, challenges, and potential benefits associated with blockchain. The quantitative results provide insights into security practices and willingness to adopt blockchain. Through the integration of these findings, the study offers practical recommendations for enhancing information system security and reliability in the context of start-ups, while considering the challenges of blockchain adoption. This research contributes to the understanding of the symbiotic relationship between technology adoption and information security, offering guidance for start-ups, policymakers, and researchers.
Integrated Financial Management Information System: Exploring Implementation Challenges and Benefits in Organizational Contexts Dwi Nita Aryani
West Science Information System and Technology Vol. 1 No. 01 (2023): West Science Information System and Technology
Publisher : Westscience Press

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58812/wsist.v1i01.167

Abstract

This research investigates the challenges and benefits of implementing an Integrated Financial Management Information System (IFMIS) in the context of large-scale enterprise business organizations. Through a mixed-methods approach, including qualitative interviews and quantitative surveys, the study uncovers insights into the intricacies of IFMIS adoption. The qualitative phase reveals technological complexities, change management challenges, and data security concerns as key hurdles. Conversely, the benefits encompass enhanced decision-making, operational efficiency, and financial transparency. The quantitative phase substantiates these findings, affirming the significance of these challenges and benefits. The discussion of the results underscores the practical implications for organizations considering IFMIS implementation. Ultimately, this research contributes to the knowledge landscape by providing actionable insights that inform strategic decisions in the realm of financial management and technology adoption.
Analysis of Information System Development in the Context of the Latest Technological Era: Challenges and Potential for Success Adi Nugroho Susanto Putro; Sabil Mokodenseho; Adit Mohammad Aziz
West Science Information System and Technology Vol. 1 No. 01 (2023): West Science Information System and Technology
Publisher : Westscience Press

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58812/wsist.v1i01.168

Abstract

Micro, Small, and Medium Enterprises (MSMEs) are integral to economic growth, and in the current technological era, information system development has become crucial for their success. This research explores the challenges faced by MSMEs in West Java regarding information system development and examines the potential impact on business performance. Through mixed-methods research involving literature review, case studies, and surveys, the study reveals that financial constraints, lack of expertise, resistance to change, integration issues, and cybersecurity concerns hinder information system adoption. However, successful integration leads to improved efficiency, customer engagement, and innovation. The findings offer strategic insights for fostering MSME growth through technology in West Java.
Data Encryption and Anonymization Techniques for Enhanced Information System Security and Privacy Arief Budi Pratomo; Sabil Mokodenseho; Adit Mohammad Aziz
West Science Information System and Technology Vol. 1 No. 01 (2023): West Science Information System and Technology
Publisher : Westscience Press

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58812/wsist.v1i01.176

Abstract

The rapid evolution of digital technology has ushered in a new era of data-driven information systems, bringing both unprecedented convenience and complex challenges to the forefront. This research delves into the realm of data encryption and anonymization techniques to enhance the security and privacy of information systems. The study encompasses a comprehensive exploration of diverse encryption and anonymization methods, evaluating their effectiveness through qualitative and quantitative analysis. A bibliometric analysis, facilitated by VOSviewer, unveils influential authors, research trends, and collaborative networks in the field. The research sheds light on the practical implications of encryption and anonymization techniques through real-world case studies and offers insights into the multidimensional landscape of information system security and user privacy.
Big Data Analysis and Its Utilization for Business Decision-Making Astika Ayuningtyas; Sabil Mokodenseho; Adit Mohammad Aziz; Dwi Nugraheny; Nurcahyani Dewi Retnowati
West Science Information System and Technology Vol. 1 No. 01 (2023): West Science Information System and Technology
Publisher : Westscience Press

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58812/wsist.v1i01.177

Abstract

In today's data-driven business landscape, the analysis of big data has become a pivotal tool for making informed decisions across industries. This research method paper explores the methodologies employed in big data analysis for business decision-making and conducts a bibliometric analysis using VOSviewer to map the scholarly landscape of this field. The systematic literature review identifies key methodologies, including descriptive, predictive, and prescriptive analytics, text analysis, and network analysis. Real-world case studies demonstrate their practical applications in diverse sectors such as retail, finance, healthcare, and more. The bibliometric analysis unveils influential authors, collaborative networks, research clusters, and trends within the academic discourse on big data analysis and business decision-making. By integrating empirical research, systematic review, and bibliometric analysis, this paper offers a comprehensive understanding of the role of big data analysis in shaping contemporary business decisions.
Fire Suppression Simulation Application Development Stereo Graphics Based (Virtual Reality) Windarko Windarko
West Science Information System and Technology Vol. 1 No. 01 (2023): West Science Information System and Technology
Publisher : Westscience Press

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58812/wsist.v1i01.260

Abstract

Modern man today is very dependent on his life with computers. Because with the help of computer technology can ease their task. A computer can create a situation similar to the original. This technology is commonly called simulation. Serious simulations depict a system that is difficult to perform in the real world and is at high risk. These serious simulations are usually much more developed in the making. This development technology is called Virtual Reality (VR). Virtual Reality (VR) is a development of stereo display techniques. Where users can see an object with dimensional depth that will give a 3D effect on the human brain. Based on the background above, the author tries to implement stereo displays in firefighting simulation (FFS) applications. The simulation engine used is Open Scene Graph with Microsoft Visual Studio 2008 compiler, which uses the C++ programming language. The GUI display design uses Qt 4.7.3. Users will try the stereo display effect in the FFS application and interact between the fire particle system and the water particle system to compare factors that cause fire particle system outages. Of all the implementations and trials carried out, the author succeeded in implementing stereoscopic fire suppression simulation applications. Because all objects in this application already have a red shadow for the left side of the thing and a blue shadow for the right side. The interaction between the user and the fire suppression simulation application was also successfully displayed in this Fire Fighting Simulation (FFS) application. The fire particle system will be extinguished if the user performs fire suppression interactions.
The Influence of Service Personalization, Customer Satisfaction, and Customer Retention in the Telecommunications Industry on Data-Driven Marketing Muh Fihris Khalik; Wily Mohammad; Zilfana Zilfana; Orfyanny Syahreffy Themba
West Science Information System and Technology Vol. 1 No. 02 (2023): West Science Information System and Technology
Publisher : Westscience Press

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58812/wsist.v1i02.476

Abstract

This research investigates the intricate dynamics of service personalization, customer satisfaction, and customer retention in the context of the telecommunications industry and their influence on data-driven marketing effectiveness. A quantitative approach, employing Structural Equation Modeling with Partial Least Squares (SEM-PLS), was utilized to analyze survey data from a sample of 250 participants. The study confirms the reliability and validity of measurement instruments, establishes discriminant validity, and unveils significant positive relationships between customer retention, customer satisfaction, service personalization, and data-driven marketing effectiveness. The findings underscore the importance of personalized services and customer-centric strategies in enhancing marketing outcomes within the telecommunications sector. The high explanatory power of the model emphasizes the relevance of these factors in shaping the landscape of data-driven marketing in the digital age.
Implementation of Blockchain Technology in Improving Transparency of Public Services: A Case Study on Government Service Delivery in Indonesia Loso Judijanto
West Science Information System and Technology Vol. 1 No. 02 (2023): West Science Information System and Technology
Publisher : Westscience Press

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58812/wsist.v1i02.477

Abstract

This research investigates the implementation of blockchain technology in enhancing the transparency of government service delivery in Indonesia through a quantitative analysis. Utilizing a mixed-methods approach, including regression analysis, descriptive statistics, and demographic analysis, the study explores the perceptions of government officials, service providers, and citizens regarding the impact of blockchain adoption. The findings reveal overwhelmingly positive perceptions, with statistically significant relationships identified between blockchain adoption and perceived transparency, user satisfaction, reduced incidents of corruption or fraud, and improved time and cost efficiency. The demographic analysis highlights variations in perceptions across different stakeholder groups, emphasizing the need for tailored approaches in policy formulation. These results contribute to the evolving discourse on blockchain technology in the public sector, providing valuable insights for policymakers and practitioners.
Analysis of Reliability, Transaction Speed, and User Experience on Information System Integration in E-commerce Business in Indonesia Loso Judijanto; Wily Mohammad; Etika Purnamasari; Hanifah Nurul Muthmainah
West Science Information System and Technology Vol. 1 No. 02 (2023): West Science Information System and Technology
Publisher : Westscience Press

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58812/wsist.v1i02.478

Abstract

This research investigates the dynamics of information system integration in the context of e-commerce businesses in Indonesia, focusing on the critical factors of reliability, transaction speed, and user experience. Employing a quantitative approach, the study utilizes Structural Equation Modeling with Partial Least Squares (SEM-PLS) to analyze data from a sample of 175 participants. The measurement model assessment reveals robust factor loadings and reliability measures, establishing the foundation for further analysis. Discriminant validity analysis highlights the distinctiveness of the constructs, though attention to refining measurement items for user experience is recommended. The model fit assessment indicates that the proposed structural model aligns well with the observed data. The structural model analysis uncovers significant positive relationships between reliability, transaction speed, user experience, and information system integration. Furthermore, the R-Square values underscore the substantial impact of these factors, explaining approximately 60.2% of the variance in information system integration. The findings provide valuable insights for businesses and policymakers, emphasizing the need to prioritize reliability, transaction speed, and user experience to enhance information system integration in Indonesian e-commerce.
Analysis of Threat Detection, Prevention Strategies, and Cyber Risk Management for Computer Network Security in Government Information Systems in Indonesia Loso Judijanto; Rifky Lana Rahardian; Hanifah Nurul Muthmainah; Moh. Erkamim
West Science Information System and Technology Vol. 1 No. 02 (2023): West Science Information System and Technology
Publisher : Westscience Press

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58812/wsist.v1i02.479

Abstract

This research investigates the landscape of threat detection, prevention strategies, and cyber risk management within Government Information Systems in Indonesia. A quantitative approach, employing Structural Equation Modeling - Partial Least Squares (SEM-PLS), was utilized to analyze data collected from 150 participants across diverse government institutions. The study assessed perceived cyber threats, the effectiveness of threat detection mechanisms, prevention strategy implementation, and cyber risk management practices. Findings revealed significant regional variations in threat perception and underscored the importance of both technological and human-centric approaches. The Structural Equation Model demonstrated satisfactory fit, with notable path coefficients indicating strong relationships among latent variables. The study contributes valuable insights to cybersecurity practices in the Indonesian government sector, informing policymakers and practitioners on strategies to enhance network security resilience.

Page 1 of 3 | Total Record : 30