Bulletin of Social Informatics Theory and Application

Journal Information
EISSN : 2614-0047
Published by: ASCEE Publications (10.31763)
Total articles ≅ 41
Current Coverage
DOAJ
Archived in
SHERPA/ROMEO
Filter:

Latest articles in this journal

Leeveshkumar Pokhun, M Yasser Chuttur
Bulletin of Social Informatics Theory and Application, Volume 4, pp 59-69; https://doi.org/10.31763/businta.v4i2.256

Abstract:
Several studies have used different techniques to detect and identify emotions expressed in various sets of texts corpora. In this paper, we review different emotion models, emotion datasets and the corresponding techniques used for emotion analysis in past studies. We observe that researchers have been using a wide variety of techniques to detect emotions in texts and that there is currently no gold standard on which dataset or which emotion model to use. Consequently, although the field of emotion analysis has gained much momentum in previous years, there seems to be little progress into relevant research with findings that may be useful in real world applications. From our analysis and findings, we urge researchers to consider the development of datasets, evaluation benchmarks and a common platform for sharing achievements in emotion analysis to see further development in the field.
Bulletin of Social Informatics Theory and Application, Volume 4, pp 83-90; https://doi.org/10.31763/businta.v4i2.287

Abstract:
This study aims to propose an evaluation of Indonesian online learning system which known as SPADA. This system accommodate an online learning for teacher profession education program which known as PPG. The system evaluation is using unified theory of acceptance and use of technology 2 (UTAUT2) model with a few adjustments. This study provide an information such as required variables to evaluate the system and research design on SPADA. The proposed evaluation model using seven main constructs of UTAUT 2.0 and its influence on behavioral intention and use behavior. The data obtained from several questionnaires related to the variable and analyzed with path analysis technique. Moreover, this proposed study is expected can be as reference to conduct a similar study related to the system evaluation.
Roni Herdianto, Dzikra Syahidin
Bulletin of Social Informatics Theory and Application, Volume 4, pp 40-51; https://doi.org/10.31763/businta.v4i2.266

Abstract:
Adolescence and gadget are inseparable these days. This research aimed at describing the characteristics of gadget user and social-religious aspect influence. This research employed a descriptive qualitative method. The researchers took a role as an observer dan data collector. This research was conducted on Junior High School X. It took 39 male students as the subject. The data collection was done by distributing the questionnaire. The questionnaire consisted of 14 items. The data obtained were arranged based on the discussion category. The findings explained: (1) the characteristics of adolescences in Junior High School X as the gadget user, gadget ownership characteristics, usage duration, how to obtain internet access, internet use, the most used application; (2) the influence of gadget use on the social life such as pornographic content, social interaction, studying concentration, and religious aspect of the adolescence. This research concludes that, based on the characteristics of the users, the gadget provides both negative and positive impacts. Furthermore, it is important to have attention and guidance by the related stakeholders to be concerned about the mental health of the adolescence as well as the social-religious aspects.
Aripriharta Aripriharta, Adim Firmansah, Nandang Mufti, Gwo-Jiun Horng, Norzanah Rosmin
Bulletin of Social Informatics Theory and Application, Volume 4, pp 76-82; https://doi.org/10.31763/businta.v4i2.283

Abstract:
Harvest estimation is an essential parameter in the agriculture industries to estimate transportation facilities and storage areas in the harvesting season. Meanwhile, companies are required to calculate crop yields quickly and accurately. This paper reports on an experimental study in the form of a smart application to count oil palm fruit in the field quickly and accurately. The system used a single shot detector algorithm to count the number of fresh fruit bunches (FFB) on-site using a smartphone camera. The cutting area (CA) at the top of the collection was collected in various positions in the database. Our research documented that the algorithm matched the CA with the picture taken by the operator. Hence, the application automatically calculated the number of harvests per-site in the FFB unit. The data were then sent to the cloud database via a wireless router in a warehouse or through a cellular network. The main advantage of this application is reducing the theft that usually occurs on the spot. The model used performs very well for agricultural applications, with 94% to 99% accuracy.
Qorina Mailil Husna Mumtaza, Shada Intishar Nabillah, Sholikhatul Amaliya, Yuveta Rosabella, Jehad Abdelhamid Hammad
Bulletin of Social Informatics Theory and Application, Volume 4, pp 70-75; https://doi.org/10.31763/businta.v4i2.204

Abstract:
The proliferation of the internet led to the emergence of new technology. Nowadays, many activities can be done online, such a payment. After Mobile Banking was introduced publicly, a new method for payment called mobile wallet that uses mobile application as a device appears. The ease caused by this technology should be the main reason for implementing this system on to daily basis. Nevertheless, in various countries, the usage rate of the cashless system remains uneven, caused by many factors, both from internal factors such as security risks and external factors such as the policies of the countries involved. This paper will evaluate worldwide online payment systems to determine the impact of online payment systems usage, both positive and negative. This paper will evaluate the factors that affect the introduction of m-payment. Several measurements, such as country with the highest and lowest cashless payment usage and the reasons were taken for this research so that the objectives to improve the system and increase the usage rate can be achieved.
Hidayah Kariima Fithri, Jeanny Indra Rifani, Mutyara Whening Aniendya, Nadiratin Jamilah, Anusua Ghosh
Bulletin of Social Informatics Theory and Application, Volume 4, pp 1-5; https://doi.org/10.31763/businta.v4i1.96

Abstract:
The impact of the digital era is the gap between active smartphone users and those who are not particular. Then IT is not fully felt by the senior citizen. This study aims to determine the ability of the senior citizen in the use of smartphones. The results of the study will be used as a reference for teaching IT to four senior citizen people. As a result, two senior citizen people want to be taught to use smartphones intensive and privately.
Muhammad Yusuf, Mochammad Kautsar Sophan, Arif Muntasa, Nurwahyu Alamsyah, Haythem Nakkas, Putri Pradnyawidya Sari
Bulletin of Social Informatics Theory and Application, Volume 4, pp 12-20; https://doi.org/10.31763/businta.v4i1.258

Abstract:
Augmented reality (AR) is one of the newest learning technologies besides Artificial Intelligent, Virtual Reality, Virtual World, Alternates Reality Games, and Wearable Computing. E-Government is becoming an evolving academic field and transforming to be E-Governance, E-Participation, E-Service, E-Democracy, E-Voting issues. Therefore, some universities have E-Government course in their curriculum. AR can be one of the learning media to learn and teach E-Government effectively and interestingly. This research aims and contributes to develop a novel model of E-Government learning media using AR. Furthermore, this work has three novelties as follows:First, a method to develop e-Government learning media using AR. Second, a novel model of e-government learning media based on augmented reality technology. Third, the material courses are command centre and public service mall materials based in Surabaya, Indonesia. The new model of learning media using AR consists of main components, i.e., user, devices, AR, and course materials. Additionally, this novel model has some sub-components, such as AR object, marker, text, image, audio, video, and 3D animation. The proposed model has some practical and theoretical implications. For the theoretical implication , it adds a model of learning media for e-government course and extends the body of knowledge for e-government and augmented reality fields. For practice, e-Government courses can uilize the augmented reality application.
Asghaiyer Mohamed
Bulletin of Social Informatics Theory and Application, Volume 4, pp 35-39; https://doi.org/10.31763/businta.v4i1.188

Abstract:
Internet technology is developing very rapidly especially on the database system. Today's database has led to data that cannot be processed into the traditional way that we call big data. Some data stored on the server requires a way for the data to be valid and intact for that transaction mechanism appears on RDBMS which ensures that the data stored will become a unified whole as in customer account data, withdrawal of money at ATMs, e-transactions -commerce and so on. Of course the use of transactions in a database by not using Atomic transactions has a difference in terms of traffic on the network. This research appears by analyzing network traffic or density from a database that uses transactions and not to users who access them. This research method uses a questionnaire method by distributing questionnaires quantitatively to 300 respondents. The results of the study of approximately 300 respondents, researchers get the results that the use of transactions in databases and databases without transactions after being accessed by 300 people, the densest network is a network owned by a system that uses transaction features, this is because there is a slight increase of about 13% of traffic when compared to a network without transactions. This statement shows that two-way communication from a database that has the transaction provides feedback to the user so that the data is reliable as an indicator that the data has been stored safely. Further research can be done by finding other information or a study of big data using the atomic transaction model.
Leonel Hernandez, Piedad Marchena, Aji Prasetya Wibawa
Bulletin of Social Informatics Theory and Application, Volume 4, pp 21-34; https://doi.org/10.31763/businta.v4i1.259

Abstract:
By 1997, Cisco Systems, a company already consolidated in the technology and communications market, saw the need to train personnel who had the skills to configure, manage, install and support all its products in general at all levels, from design to the implementation of solutions. In Colombia, more precisely in the city of Barranquilla, the ITSA University Institution in the early 2000s saw an excellent opportunity to ally with the University created by Cisco, called Cisco Networking Academy, to train professionals in the Caribbean region capable of face the new challenges that technology in networks is generating day by day, becoming in the first Institution of higher education in the region to provide this type of training with international certification and endorsement. From then on, the local Cisco academy has strengthened and significantly impacted local society, generating valued and skilled labor in the labor market of the city and the region. The purpose of this work is to measure this impact, focused on the Cisco, CCNA, and CCNP flagship courses between 2015 and 2019, verifying how ITSA, through the Cisco Academy, has transformed lives. The research methodology is descriptive, exploratory, and documentary
Moh Hidayat Koniyo, Made Sudarma
Bulletin of Social Informatics Theory and Application, Volume 4, pp 6-11; https://doi.org/10.31763/businta.v4i1.246

Abstract:
The distribution of assistance to disadvantaged people in an area is always synonymous with problems especially, in the duplication of assistance and manipulation of family data that actually has no right to obtain assistance data for underprivileged families. To ensure the integrity of the data taken is not duplicated and non-repudiation, the blockchain-based poverty data collection plan is one solution. The purpose of this research is to ensure that the data retrieved cannot be modified after data retrieval and the database cannot validly deny that the data has been provided as a result of a particular request. The feasibility of the proposed service using the blockchain method is a request from the poverty database in the form of low-income family data and assistance type data that are placed in the blockchain series and tested with hash values that have been created from the blockchain
Back to Top Top