cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota bandar lampung,
Lampung
INDONESIA
International conference on Information Technology and Business (ICITB)
ISSN : -     EISSN : -     DOI : -
Core Subject : Economy, Science,
Arjuna Subject : -
Articles 48 Documents
Search results for , issue " 2015: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND BUSINESS (ICITB) 1" : 48 Documents clear
ASSOCIATION RULE METHOD FOR INFORMATION SYSTEM EPIDEMIC DENGUE MAPPING BASED ASSOCIATION OF RISK FACTORS IN PALEMBANG Destriatania, Suci; Ermatita, Ermatita
Prosiding International conference on Information Technology and Business (ICITB) 2015: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND BUSINESS (ICITB) 1
Publisher : Prosiding International conference on Information Technology and Business (ICITB)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Endemic diseases dangerous such as dengue fever must be handling seriously  for the risk minimize by the disease. Dengue Hemorrhagic Fever (DHF) is  disease  has not been found vaccine or cure is powerful. It is  necessary  treatment to prevent the occurrence of dengue fever, especially when it came to the incidence of dengue fever endemic in certain areas by doing Epidemiologist dengue fever. Epidemiology is identification of risk factors for DHF to find level of area  risk. Risk factors of hemorrhagic fever endemic must be identified  to prevent the occurrence of dengue fever. Identifying risk factors and  risk factors association  can  potential increase  the occurrence of dengue fever. This study developed  mapping information system Dengue epidemic through Association rule method of data mining. The information generated in the map of epidemic DHF level based association of potential risk factors that cause hemorrhagic fever endemic. Analysis with the Association Rule to determine level of  DHF epidemic area based data reporting system. KEY WORDS: information system mapping, data mining, Association Rule, endemic, Dengue Hemorrhagic Fever (DHF).
THE EFFECTS OF ORGANIZATIONAL CULTURE AND INDIVIDUAL CAPACITY ON BUDGETARY SLACK USING PARTICIPATIVE BUDGETING AS MODERATING VARIABLE AT IBI DARMAJAYA LAMPUNG Swissia, Pebrina
Prosiding International conference on Information Technology and Business (ICITB) 2015: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND BUSINESS (ICITB) 1
Publisher : Prosiding International conference on Information Technology and Business (ICITB)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This research discusses the effects of organizationalculture and individual capacity on budgetary slack usingparticipative budgeting as moderating variables that areorganizational commitment, organizational culture andindividual capacity. The respondents chosen were basedon structural position in IB Darmajaya as 53 respondents.The data collected through survey method in the form ofquestionnaire also measuring the reliability test on allvariables and correlation analysis.The result of the research based on correlation analysisindicates the correlation level where the correlationanalysis of all variables indicates the strong level ofcorrelation. In addition, the participative budgetingpositively affects budgetary slack. On the contrary,organizational commitment and organizational cultureweakened the correlation between participative budgetingand budgetary slack. Besides, high or low individualcapacity is not able to moderate the correlation.KEY WORDS : Budgetary Slack, OrganizationalCulture, Participative Budgeting
THE USAGE OF WARD AND PEPPARD METHOD IN IS/IT STRATEGIC PLAN COMPILATON IN DISHUBKOMINFO EAST LAMPUNG Nugroho, Handoyo Widi; Darmawan, Abdi; Sampurna, Abdul Lathif
Prosiding International conference on Information Technology and Business (ICITB) 2015: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND BUSINESS (ICITB) 1
Publisher : Prosiding International conference on Information Technology and Business (ICITB)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Dishubkominfo in running the coordination task in Nexus,Communication and Informatics field must charged towork fast. Therefore, the support from the reliableinformation technology (IS/IT) is really needed. To makesure the usage of IS/IT actually support the purpose ofgovernment administering, with noticing the efficiency theusage of resources and the management of risk that relatedto it, it required strategic planning related to IS/IT, in thisdocument called Strategic Planning IT/IS.The methodology that used in preparation of documentusing reference that developed by Ward and Peppard.Analysis method that used includes SWOT analysis, CSF,Value Chain, McFarlan Strategic Grid, BalancedScorecard. The result that achieved in this thesis isstrategic plan framework that include system informationstrategy, information technology and IT/IS managementintegrated and portfolio and roadmap from 2015 until2019.KEYWORDS : Strategic Plan IT/IS, Planning, Ward andPeppard, Dishubkominfo
DETERMINATION MODEL OF INDEPENDENT BUSINESS CREDIT "GRAMEENBANK" PATTERN USING SIMPLE ADDITIVE WAIGHTING (SAW) METHOD TO ENHANCING THE RURAL ECONOMIC DEVELOPMENT Hartati, Sri; Abadi, Satria
Prosiding International conference on Information Technology and Business (ICITB) 2015: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND BUSINESS (ICITB) 1
Publisher : Prosiding International conference on Information Technology and Business (ICITB)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This research aims to determine the aid creditprogram "grameenbank" by using Simple AdditiveWaighting (SAW) method in rural communities as aresource empowerment of rural women towardseconomic development of the region. The determinationof the criteria is to perfom the weight on theexisting.criteria which applied to the decisions making.The software program can generate customers wereselected as recipients grameenbank aid credit program.The Independent Business Credit system is a replicationof the pattern ofcredit Grameen Bank (Meaning VillageBank developed in Bangladesh to serve the poor people)who have adapted their implementation inIndonesia. Credit package provided through thisinstitutional adjusted to the conditions and the ability oftheir poor, so that they are able to increase revenues andat the same time is able to be trusted because it can repayloans with discipline. These results indicate that theSimple Additive Waighting (SAW) method caneffectively help in the decision making and to determineprospective customers that receiver program in ruraldistricts Gemahripah Pringsewu. This programenhancing empowerment of rural women towardseconomic development of the region.Keywords: Grameen Bank, Simple AdditiveWaighting (SAW) Method
OPTIMIZATION OF WIRELESS PRICING SCHEME Taib, Bahok M.; Puspita, Fitri Maya; Abdullah, Ismail
Prosiding International conference on Information Technology and Business (ICITB) 2015: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND BUSINESS (ICITB) 1
Publisher : Prosiding International conference on Information Technology and Business (ICITB)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The wireless service providers obtain surplus fromconsumers who applied the service. That pricing strategyis developed by considering the linearity factors, elasticityprice, price factors, acceptance factor and unit serviceprice. Previous researches are focussed on the introductionof the models in general. This new approach of the modelis by considering the model as the nonlinear programmingproblem that can be solved optimally using LINGO 13.0.The optimal solution could give information on decisionvariables and objective function to maximize the revenuefor the providers. The several objectives to be achieved byservice providers are by setting the increment ordecrement of price change due to QoS change and amountof QoS value.KEY WORDS: Optimization, price change, QoS change, amount of QoSvalue
A CONCEPTUAL APPROACH OF ENTERPRENEURSHIP AND INNOVATIVE ENTERPRENEUR S ROLES TO CONTINUAL DEVELOPMENT (A Literary Study) Rahayu, Mieke -
Prosiding International conference on Information Technology and Business (ICITB) 2015: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND BUSINESS (ICITB) 1
Publisher : Prosiding International conference on Information Technology and Business (ICITB)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Principally, if an enterprise is growing and keepsmaking innovations with a well structured pattern, thestrategies to be done will be more focused and surelyreduce the expenses. It means that innovation as acompetitive source can give a positive response tocustomers and certainly to continual enterpreneurship.This framework is based on a continualenterpreneurship typology, and is included indeveloping a social and institutional entrpreneurship. Itmeans that the implementation of theenterpreneusrship approach to reach the social goaland to gain changes connected to markets as well ascontinuing innovation. This framework givesreferences to managers to introduce continualinnovation and to reach continual enterpreneurship inthe continual development.
AN ANALYSIS OF SECURITY AND SERVICE QUALITY TOWARD PURCHASE DECISION ON E-COMMERCE AND ITS IMPLICATIONS OF CONSUMER LOYALTY -, Ardiansyah
Prosiding International conference on Information Technology and Business (ICITB) 2015: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND BUSINESS (ICITB) 1
Publisher : Prosiding International conference on Information Technology and Business (ICITB)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

In the marketing world, especially through internetmarketing or what is known as e-commerce, an e-marketercannot ignore the role of the online shop as a medium fortheir marketing communications, where marketingactivities via e-commerce is currently being favorable bythe people in Indonesia. However transaction through ecommercehas the fairly high riskpotential. Therefore thefactor of security and service quality become a benchmarkon purchasing decisions through e-commerce. The purposeof this study is to analyzewhether security factordirectlyinfluences purchasing decisions through e-commerce,service quality factor directly influences purchasingdecisions through e-commerce, security and service qualityfactor directly influences purchasing decisions through ecommerce,as well as security and service qualityfactorgives significant effect on e-commerce consumer loyalty.This research was conducted by taking samples of ecommerceusers in Indonesiawhich were most active topurchase online products or services in 2014.KEYWORDS: E-commerce, Security, ServiceQuality, Purchasing Decisions, Loyalty
TOPOLOGICAL COMPARISON-BASED WORMHOLE DETECTION FOR MANET Alan, Mohammad Rafiqul; Chan, King Sun
Prosiding International conference on Information Technology and Business (ICITB) 2015: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND BUSINESS (ICITB) 1
Publisher : Prosiding International conference on Information Technology and Business (ICITB)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Wormhole attack is considered one of the mostthreatening security attacks for mobile ad hocnetworks (MANET). In a wormhole attack, a tunnelis setup in advance between two colluders. Thecolluders record packets at one location and forwardthem through the tunnel to another location in thenetwork. Depending on whether or not the colludersare participating in the network functions, thewormhole attack can be further divided into twocategories: traditional wormhole attack andByzantine wormhole attack. Existing researchesfocusing on detecting traditional wormhole attackscan be classified into three categories: one-hop delaybased approach; topological analysis based orspecial hardware/middleware based approaches.Unfortunately, they all have their own limitations.Most of the researches detecting Byzantinewormhole attack are not addressing the Byzantinewormhole attack directly. Instead, they focus onobserving the consequence after a Byzantinewormhole attack, like packet dropping ormodification. In this paper, we propose to detectboth traditional and Byzantine wormhole attacks bydetecting some topological anomalies introduced bywormhole tunnels. Simulation results show that ourscheme can achieve both high wormhole attackdetection rate and accuracy. Our scheme is alsosimple to implement.KEY WORDS: Wormhole attack, Byzantine wormhole attack,manet, topological comparison.
THE INFLUENCE OF SERVICE QUALITY ON STUDENTS SATISFACTION AT PRIVATE UNIVERSITIES IN BANDAR LAMPUNG Amelia, Ratih; -, Vitratin
Prosiding International conference on Information Technology and Business (ICITB) 2015: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND BUSINESS (ICITB) 1
Publisher : Prosiding International conference on Information Technology and Business (ICITB)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The research is aimed at giving contribution to long-termresearches for private universities in Bandar Lampung indeveloping human resources to be empowered eithernationally or internationally by prioritizing the sustainableservice and academic system.It can be reached by using survey method throughquestionnaire to respondents, consisting of a list ofquestions on current problems faced by the researcher andasking respondents for responding the questions. Thismethod is used to know how far the service provided byuniversities in developing their students in BandarLampung.
Optimum Feature for Palmprint Image Authentication Setyohadi, Dwi Putro Sarwo; Ayuninghemi, Ratih
Prosiding International conference on Information Technology and Business (ICITB) 2015: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND BUSINESS (ICITB) 1
Publisher : Prosiding International conference on Information Technology and Business (ICITB)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Palm print authentications have become extensive research in recent years.  Some research discussing palm print authentication emphasize on matching of two feature vectors of it. Problem faced by the research in this field is the sampling process. Different position of hand geometry results in different palm print image cause palm print to be unauthenticated. This research proposes an approach to solve the problem by first making image dimension using Multi-scale Wavelet Pyramid (MWP) to produce features represent palm print image. The next stage is feature matching by using Hamming Distance Similarity. Testing in several levels combination show that integration of level 1 and level 2 yields optimum feature. The evaluation result produce that MWP has faster and better performance accuracy up to 77.93% with threshold 4700.