This article elaborates the result of the Pilot Study which is related to IT implementation factors at the Higher Education Institution (HEI), a pilot study is used to validate quantitative readiness model of IT implementation. The main objective of this study is examining the factors that influence the readiness of IT implementation in HEI. This study attempts to analyze IT Content factors, Institutional Context, People, Process, Technology, Service Quality and IT Implementation Readiness (ITIR). The sample of data was taken from 150 HEIs throughout Indonesia which was then processed in statistical techniques through PLS-SEM method. The research finding shows that 9 of the 14 hypotheses used as ITIR model construct have a very significant influence on IT implementation on HEI, so that this finding can provide a comprehensive contribution to the literature of ITIR model development.
MEASURING UTILIZATION OF E-LEARNING COURSE DISCRETE MATHEMATICS TOWARD MOTIVA...AM Publications
In the implementation of learning E-Learning which has been implemented by the Mercu Buana University in recent years had a positive impact on students and lecturer. However, in some course such as Discrete Mathematics perceived by lecturer and student have several problems such as difficulty from lecturer to explain some of the logic material or analysis algorithm problem. Students also do not understand clearly if only read from the text that is presented through the e learning process. Effectiveness basically is attainment of precise goal or selecting the appropriate objectives from a series of alternative or choice of ways and determine the choice of several other options. Effectiveness can also be interpreted as a measure of success in achieving the goals that have been determined. As an example if a task can finish with choice of ways which is already determine, then that way is correct or effective.
This study aims to examine factors influencing aspects such as teacher's personality, student's behavior, environmental which has influence student's affective and cognitive. The data were obtained using methods: interview and questionnaire. The random participant has been chosen for interviewed and population has been used for the questionnaire. There were 1585 participants have filled the questionnaire and 24 students have interviewed. Interview data were recorded and analyzed. The results have processed, it was classified according to study programs following the indicator. The research finding shows that: factors from lecturers and teaching assistants got 78 - 81%, academic and non-academic facilities got 74.91% - 80.86% and dormitory as living for students got 69.16% which have a big impact on influencing student's affective and cognitive. There were also issues such as teacher's centered-learning, most of students and class situations can often be uncomfortable.
Analysis of the User Acceptance for Implementing ISO/IEC 27001:2005 in Turkis...IJMIT JOURNAL
This study aims to develop a model for the user acceptance for implementing the information security standard (i.e. ISO 27001) in Turkish public organizations. The results of the surveys performed in Turkey reveal that the legislation on information security public which organizations have to obey is significantly related with the user acceptance during ISO 27001 implementation process. The fundamental components of our user acceptance model are perceived usefulness, attitude towards use, social norms, and performance expectancy.
Data science for digital culture improvement in higher education using K-mean...IJECEIAES
This study aims to investigate the meaningful pattern that can be used to improve digital culture in higher education based on parameters of the technology acceptance model (TAM). The methodology used is the data mining technique with K-means algorithm and text analytics. The experiment using questionnaire data with 2887 respondents in Universitas Islam Negeri (UIN) Sunan Gunung Djati Bandung. The data analysis and clustering result show that the perceived usefulness and behavioral intention to use information systems are above the normal value, while the perceived ease of use and actual system use is quite low. Strengthened with text analytics, this research found that the EDA and K-means result in harmony with the hope or desire of academic society the information system implementation. This research also found how important the socialization and guidance of information systems, especially the new one information system, in order to improve digital culture in higher education.
A well-prepared abstract enables the reader to identify the basic content of a document quickly and accurately, to determine its relevance to their interests, and thus to decide whether to read the document in its entirety. The Abstract should be informative and completely self-explanatory, provide a clear statement of the problem, the proposed approach or solution, and point out major findings and conclusions. The Abstract should be 100 to 200 words in length. The abstract should be written in the past tense. Standard nomenclature should be used and abbreviations should be avoided. No literature should be cited. The keyword list provides the opportunity to add keywords, used by the indexing and abstracting services, in addition to those already present in the title. Judicious use of keywords may increase the ease with which interested parties can locate our article
Influence of year of study on computer attitude of business education student...IJITE
The purpose of this study was to examine the attitude to computer among Business Education students in
Lagos State tertiary institutions. The effect of year of study of the Business Education students on
their attitude to computer was studied. Four institutions of higher learning (two universities and two
Colleges of Education) in Lagos State were selected for the study. The sample comprised of 520 Business
Education students. The subjects responded to a computer attitudinal scale and a questionnaire
comprising items on the biodata of respondents. The study adopted the expost-facto research approach as
none of the variables was manipulated. The data collected were analysed using mean, standard deviation
and ANOVA. The statistical package for social sciences (SPSS) software was used to carry out the
analysis. The result revealed the following: year of study had significant effect on the Business
Education students’ attitude to Computer. Useful recommendations as they affect government policies,
delivery of Business Education in our tertiary institutions as well as Business Education students were
made.
MEASURING UTILIZATION OF E-LEARNING COURSE DISCRETE MATHEMATICS TOWARD MOTIVA...AM Publications
In the implementation of learning E-Learning which has been implemented by the Mercu Buana University in recent years had a positive impact on students and lecturer. However, in some course such as Discrete Mathematics perceived by lecturer and student have several problems such as difficulty from lecturer to explain some of the logic material or analysis algorithm problem. Students also do not understand clearly if only read from the text that is presented through the e learning process. Effectiveness basically is attainment of precise goal or selecting the appropriate objectives from a series of alternative or choice of ways and determine the choice of several other options. Effectiveness can also be interpreted as a measure of success in achieving the goals that have been determined. As an example if a task can finish with choice of ways which is already determine, then that way is correct or effective.
This study aims to examine factors influencing aspects such as teacher's personality, student's behavior, environmental which has influence student's affective and cognitive. The data were obtained using methods: interview and questionnaire. The random participant has been chosen for interviewed and population has been used for the questionnaire. There were 1585 participants have filled the questionnaire and 24 students have interviewed. Interview data were recorded and analyzed. The results have processed, it was classified according to study programs following the indicator. The research finding shows that: factors from lecturers and teaching assistants got 78 - 81%, academic and non-academic facilities got 74.91% - 80.86% and dormitory as living for students got 69.16% which have a big impact on influencing student's affective and cognitive. There were also issues such as teacher's centered-learning, most of students and class situations can often be uncomfortable.
Analysis of the User Acceptance for Implementing ISO/IEC 27001:2005 in Turkis...IJMIT JOURNAL
This study aims to develop a model for the user acceptance for implementing the information security standard (i.e. ISO 27001) in Turkish public organizations. The results of the surveys performed in Turkey reveal that the legislation on information security public which organizations have to obey is significantly related with the user acceptance during ISO 27001 implementation process. The fundamental components of our user acceptance model are perceived usefulness, attitude towards use, social norms, and performance expectancy.
Data science for digital culture improvement in higher education using K-mean...IJECEIAES
This study aims to investigate the meaningful pattern that can be used to improve digital culture in higher education based on parameters of the technology acceptance model (TAM). The methodology used is the data mining technique with K-means algorithm and text analytics. The experiment using questionnaire data with 2887 respondents in Universitas Islam Negeri (UIN) Sunan Gunung Djati Bandung. The data analysis and clustering result show that the perceived usefulness and behavioral intention to use information systems are above the normal value, while the perceived ease of use and actual system use is quite low. Strengthened with text analytics, this research found that the EDA and K-means result in harmony with the hope or desire of academic society the information system implementation. This research also found how important the socialization and guidance of information systems, especially the new one information system, in order to improve digital culture in higher education.
A well-prepared abstract enables the reader to identify the basic content of a document quickly and accurately, to determine its relevance to their interests, and thus to decide whether to read the document in its entirety. The Abstract should be informative and completely self-explanatory, provide a clear statement of the problem, the proposed approach or solution, and point out major findings and conclusions. The Abstract should be 100 to 200 words in length. The abstract should be written in the past tense. Standard nomenclature should be used and abbreviations should be avoided. No literature should be cited. The keyword list provides the opportunity to add keywords, used by the indexing and abstracting services, in addition to those already present in the title. Judicious use of keywords may increase the ease with which interested parties can locate our article
Influence of year of study on computer attitude of business education student...IJITE
The purpose of this study was to examine the attitude to computer among Business Education students in
Lagos State tertiary institutions. The effect of year of study of the Business Education students on
their attitude to computer was studied. Four institutions of higher learning (two universities and two
Colleges of Education) in Lagos State were selected for the study. The sample comprised of 520 Business
Education students. The subjects responded to a computer attitudinal scale and a questionnaire
comprising items on the biodata of respondents. The study adopted the expost-facto research approach as
none of the variables was manipulated. The data collected were analysed using mean, standard deviation
and ANOVA. The statistical package for social sciences (SPSS) software was used to carry out the
analysis. The result revealed the following: year of study had significant effect on the Business
Education students’ attitude to Computer. Useful recommendations as they affect government policies,
delivery of Business Education in our tertiary institutions as well as Business Education students were
made.
Adaboost-multilayer perceptron to predict the student’s performance in softwa...journalBEEI
Software Engineering (SE) course is one of the backbones of today's computer technology sophistication. Effective theoretical and practical learning of this course is essential to computer students. However, there are many students fail in this course. There are many aspects that influence a student's performance. Currently, student performance analysis methods just focus on historical achievement and assessment methods given in the class. Need more research to predict student's performance to overcome the problem of student failing. The objective of this research is to perform a prediction for student's performance in the SE using enhanced Multilayer Perceptron (MLP) machine learning classification with Adaboost. This research also investigates the requirements of each student before registering in this course. This research achieved 87.76 percent accuracy in classifying the performance of SE students.
This study aims to determine the level of eligibility of the application of staffing information systems as a learning media for automation of staffing governance in the Vocational. This research method uses quantitative research methods. Data collection techniques are done using a questionnaire and analysis of needs using quantitative data analysis. Based on the results of the feasibility test on the application of the staffing information system as a learning media for automation of the governance of staffing above it was concluded that the application of the staffing information system can be categorized as very suitable for use in the learning process in the Vocational School in the Field of Automation and Office Management. Based on the results of the assessment of material experts, validation of media experts, expert practitioners and materials that show the results of the assessment of 89.2% of material experts; 95% assessment of media experts; 90% of expert practitioners, so the application is very feasible to use in the learning process.
Clustering Students of Computer in Terms of Level of ProgrammingEditor IJCATR
Educational data mining (EDM) is one of the applications of data mining. In educational data mining, there are two key domains, i.e. student domain and faculty domain. Different type of research work has been done in both domains.
In existing system the faculty performance has calculated on the basis of two parameters i.e. Student feedback and the result of student in that subject. In existing system we define two approaches one is multiple classifier approach and the other is a single classifier approach and comparing them, for relative evaluation of faculty performance using data mining
Techniques. In multiple classifier approach K-nearest neighbor (KNN) is used in first step and Rule based classification is used in the second step of classification while in single classifier approach only KNN is used in both steps of classification.
But in proposed system, I will analyse the faculty performance using 4 parameters i.e., student complaint about faculty, Student review feedback for faculty, students feedback, and students result etc.
For this proposed system I will be going to use opinion mining technique for analyzing performance of faculty and calculating score of each faculty.
A Model for Predicting Students’ Academic Performance using a Hybrid of K-mea...Editor IJCATR
Higher learning institutions nowadays operate in a more complex and competitive due to a high demand from prospective
students and an emerging increase of universities both public and private. Management of Universities face challenges and concerns of
predicting students’ academic performance in to put mechanisms in place prior enough for their improvement. This research aims at
employing Decision tree and K-means data mining algorithms to model an approach to predict the performance of students in advance
so as to devise mechanisms of alleviating student dropout rates and improve on performance. In Kenya for example, there has been
witnessed an increase student enrolling in universities since the Government started free primary education. Therefore the Government
expects an increased workforce of professionals from these institutions without compromising quality so as to achieve its millennium
development and vision 2030. Backlog of students not finishing their studies in stipulated time due to poor performance is another
issue that can be addressed from the results of this research since predicting student performance in advance will enable University
management to devise ways of assisting weak students and even make more decisions on how to select students for particular courses.
Previous studies have been done Educational Data Mining mostly focusing on factors affecting students’ performance and also used
different algorithms in predicting students’ performance. In all these researches, accuracy of prediction is key and what researchers
look forward to try and improve.
An Analysis of Behavioral Intention toward Actual Usage of Open Source Softwa...IJAEMSJORNAL
This study focused on analyzing behavioral intention toward the actual usage of open source software in private universities in Tanzania. Questionnaires were used to collect quantitative data in two private universities namely Iringa University and Ruaha Catholic University. Stratified sampling technique was utilized to ensure sample representativeness among two universities where simple random sampling was used to draw a sample from each stratum during the survey. Finding Using Structural Equation Modeling indicated that performance expectancy (source code production and software localization) and social factor (Vendor, internet services provider and lecturer) have a significant influence toward behavioral intention while effort expectancy was found to be insignificant. In addition the behavioral intention was found to be significant toward student’s actual usage of open source software in Universities. This study recommended that for students to develop behavioral intention toward OSS actual usage, internet service provider have to increase the level of internet services that can assist the university communities to access and download open source software. In addition, to increase actual use, open source software vendors and lecturer or experts have to make sure that their software source code is free for distribution and localization, this will increase self-motivation and interest of the students toward actual usage of open source software.
Managers Perceptions towards the Success of E-performance Reporting SystemTELKOMNIKA JOURNAL
Managers are the key informants in the information system (IS) success measurements. In fact, besides the determinant agents are rarely involved in the assessments, most of the measurements are also often performed by the technical stakeholders of the systems. Therefore, the results may questionable. This study was carried to explain the factors that influence the success of an e-performance reporting system in an Indonesian university by involving ± 70% of the managers (n=66) in the sampled institution. The DeLone and McLean model was adopted and adapted here following the suggestions of the previous meta-analysis studies. The collected data was analyzed using the partial least squares-structural equation modelling (PLS-SEM) for examining the four hypotheses. Despite the findings revealed acceptances of the overall hypotheses, the weak explanation of the user satisfaction variable towards the net benefit one had been the highlighted point. Besides the study limitations, the point may also be the practical and theoretical considerations for the next studies, especially for the IS success studies in Indonesia
Presentation on the effectiveness of E-learning within the premises of Tata S...Anannya Chakraborty.
Learning and development and how that has affected workers and co workers of Tata Steel Tubes Strategic Business Unit. The video discusses on the effectiveness of E-learning and how that could eradicate the undeucative practises of Tata Steel co-workers and staff members and also in a manner that it has helped me in my learning process. The process of imparting the educative policies in Tata Steel has benefitted staffs, members and the workers working within the Tata Steel.
Acceptance of E-learning among university students in UAE: A practical study IJECEIAES
The objective of the study is to find out the factors which affect the acceptance of E-learning among students and how the students’ purpose of using E-learning is determined by these factors. The research was based on the Technology Acceptance Model (TAM). The researcher developed a questionnaire to gather data from a sample of 366 university students who actively used the E-learning system. According to the results of the study, subjective norms, perceived usefulness, perceived ease of use, enjoyment, and accessibility” are the vital predicators behind the intention of students for using E-learning systems. This indicates that extended TAM is applicable in the UAE. The results show that policymakers and education developers should take E-learning system seriously since it can be opted not just as a technological solution but also as a learning platform for students belonging to a distant area. The results present practical implications for education developers, policymakers and practitioners in devising useful plans to implement E-learning systems.
Efforts to Revitalize the Computer Science Education in ThailandIJERA Editor
The shortage of ICT professionals in Thai workforce has been appeared in spite of many ICT-related programs
offering in universities across Thailand. The statistics show that a promoting of new ICT-related programs,
modified by CS program, is stealing students from CS program. Thus, CS enrollment decline as well as
students’ dropping outs are problems facing in every Thai universities. This paper reports on a study in which
10 people who are the representative of ICT graduates’ users were interviewed and 702 freshmen who took in
the introductory computer course were surveyed to try to determine the relationship of CS enrollment and ICT
professionals and the factors contributing to decline in CS enrollments. The results revealed that most of ICT
professionals were developed from CS background. The top reasons for rejecting the CS major, were its’
difficulties and students’ desire to use IT as an application, instead of a construction. These were their weakness
in programming and technical work, but the reasons for choosing the CS major were opposite. Finally, this
paper proposes a revitalization of the CS education framework to reverse the trend of CS enrollment decline.
Data Mining Application in Advertisement Management of Higher Educational Ins...ijcax
In recent years, Indian higher educational institute’s competition grows rapidly for attracting students to get enrollment in their institutes. To attract students educational institutes select a best advertisement method. There are different advertisements available in the market but a selection of them is very difficult
for institutes. This paper is helpful for institutes to select a best advertisement medium using some data mining methods.
The Academic Performance and the Computer Programming Anxiety of BSIT Student...IJAEMSJORNAL
The 21st century has caused numerous significant impacts and advancements in the lives of people. Information Technology (IT) has contributed essential benefits in the different areas of the society. One of the vital skills in developing IT solutions is programming. For many, writing computer programs may be a very challenging task which may result in some levels of anxiety. This study aimed to describe and look at the relationship between the academic performance and the programming anxiety among Bachelor of Science in Information Technology (BSIT) students to provide a basis for instructional strategy improvement in the undergraduate level.
Improving keyword extraction in multilingual texts IJECEIAES
The accuracy of keyword extraction is a leading factor in information retrieval systems and marketing. In the real world, text is produced in a variety of languages, and the ability to extract keywords based on information from different languages improves the accuracy of keyword extraction. In this paper, the available information of all languages is applied to improve a traditional keyword extraction algorithm from a multilingual text. The proposed keywork extraction procedure is an unsupervise algorithm and designed based on selecting a word as a keyword of a given text, if in addition to that language holds a high rank based on the keywords criteria in other languages, as well. To achieve to this aim, the average TF-IDF of the candidate words were calculated for the same and the other languages. Then the words with the higher averages TF-IDF were chosen as the extracted keywords. The obtained results indicat that the algorithms’ accuracis of the multilingual texts in term frequency-inverse document frequency (TF-IDF) algorithm, graph-based algorithm, and the improved proposed algorithm are 80, 60.65, and 91.3%, respectively.
Implementation of ICT As a Change Agent in Computing Students Result in Chukw...IJERA Editor
Manual method of sorting out for result and computing it has posed a big problem to exams unit in ChukwuemekaOdumegwuOjukwu University (COOU), In Anambra State, Nigeria. During computation of results, the exam officers collect paper results from the department and either calculate them on papers or enter them on a computer for computation. Either of them is hard work and time wasting. Hence we propose a change and retrieval agent in computing results in ChukwuemekaOdumegwuOjukwu University, Uli. Since the University already has an existing website, we require a new format for uploading results to the website using Microsoft excel witheight (8) specific columns namely: names of students, registration numbers, continuous assignment, examination score, total score, grade and remarks done by course lecturers.To compute the results of a particular student, the exam officer opens the application; enters the required detail and the application will fetch and populate the grade fields automatically from the results already uploaded on the university website by the course lecturers. The application needs internet connection in order to do this. Thereafter the results are computed by the application. The methodology used is Object Oriented Analysis and Design Methods. The application is a windows application written with Microsoft visual basic.net. The database used in saving login information and computed CGPAs is a free distributed database MySQL. The result of this researchis a functional result retrieval and computation application used only by the authorized personnel for computation of degree results.
PREDICTING ACADEMIC MAJOR OF STUDENTS USING BAYESIAN NETWORKS TO THE CASE OF ...ijcax
In this study, which took place current year in the city of Maragheh in IRAN. Number of high school students in the fields of study: mathematics, Experimental Sciences, humanities, vocational, business and science were studied and compared. The purpose of this research is to predict the academic major of high school students using Bayesian networks. The effective factors have been used in academic major selection for the first time as an effective indicator of Bayesian networks. Evaluation of Impacts of indicators on each other, discretization data and processing them was performed by GeNIe. The proper course would be advised for students to continue their education.
E-Learning Readiness Assessment Tool for Philippine Higher Education Institut...IJITE
The growth of internet technologies changed learning strategies globally. The Philippines is no exemption. Due to its usefulness and potential, E-learning is becoming popular. But before these benefits would be enjoyed, it is very important for an institution to be assessed. This is to identify the needs and factors that directly affect their readiness. This study presents a readiness assessment tool for Philippine Higher Education Institutions. It also serves as a needs assessment instrument.
Combining Two Models of Successful Information System MeasurementTELKOMNIKA JOURNAL
This paper purposes is to measure successful of Academic Advisory information system by combining two models of information system measurement. DeLone & McLean IS Success Model use to measure the successful of system while COBIT framework is to measure system maturity level. Result of this research showed that the successful of Academic Advisory IS affected by User Satifaction, Quality of Service, Quality of System while Maturity level at 3.7. The result also showed there’s a relation between level of maturity system with the success of system.
Assessing Information System Integration Using Combination of the Readiness a...journalBEEI
Information system integration (ISI) is one of the development concerns for organizations to enhance business competitiveness. However, the implementations still present its failures. Despite the ISI may successful technically; but it still seems to be unsuccessful because of the human and management issues. The issues may relate to the readiness constructs of ISI. This study was aimed to know the status of the readiness and success of ISI and to assess the influential factors of the integration in the sampled institution. About 160 samples were purposely involved by considering their key informant characteristics. The data were analyzed using the partial least squares-structural equation modeling (PLS-SEM) method. The findings revealed only the user satisfaction variable that mediated the positive effects of the readiness variables towards variable of the system integration success. Besides, the findings may practically helpful for stakeholders in the sampled institution, but it may also theoretically useful for researchers in regard to the readiness and success issues of ISI.
Adaboost-multilayer perceptron to predict the student’s performance in softwa...journalBEEI
Software Engineering (SE) course is one of the backbones of today's computer technology sophistication. Effective theoretical and practical learning of this course is essential to computer students. However, there are many students fail in this course. There are many aspects that influence a student's performance. Currently, student performance analysis methods just focus on historical achievement and assessment methods given in the class. Need more research to predict student's performance to overcome the problem of student failing. The objective of this research is to perform a prediction for student's performance in the SE using enhanced Multilayer Perceptron (MLP) machine learning classification with Adaboost. This research also investigates the requirements of each student before registering in this course. This research achieved 87.76 percent accuracy in classifying the performance of SE students.
This study aims to determine the level of eligibility of the application of staffing information systems as a learning media for automation of staffing governance in the Vocational. This research method uses quantitative research methods. Data collection techniques are done using a questionnaire and analysis of needs using quantitative data analysis. Based on the results of the feasibility test on the application of the staffing information system as a learning media for automation of the governance of staffing above it was concluded that the application of the staffing information system can be categorized as very suitable for use in the learning process in the Vocational School in the Field of Automation and Office Management. Based on the results of the assessment of material experts, validation of media experts, expert practitioners and materials that show the results of the assessment of 89.2% of material experts; 95% assessment of media experts; 90% of expert practitioners, so the application is very feasible to use in the learning process.
Clustering Students of Computer in Terms of Level of ProgrammingEditor IJCATR
Educational data mining (EDM) is one of the applications of data mining. In educational data mining, there are two key domains, i.e. student domain and faculty domain. Different type of research work has been done in both domains.
In existing system the faculty performance has calculated on the basis of two parameters i.e. Student feedback and the result of student in that subject. In existing system we define two approaches one is multiple classifier approach and the other is a single classifier approach and comparing them, for relative evaluation of faculty performance using data mining
Techniques. In multiple classifier approach K-nearest neighbor (KNN) is used in first step and Rule based classification is used in the second step of classification while in single classifier approach only KNN is used in both steps of classification.
But in proposed system, I will analyse the faculty performance using 4 parameters i.e., student complaint about faculty, Student review feedback for faculty, students feedback, and students result etc.
For this proposed system I will be going to use opinion mining technique for analyzing performance of faculty and calculating score of each faculty.
A Model for Predicting Students’ Academic Performance using a Hybrid of K-mea...Editor IJCATR
Higher learning institutions nowadays operate in a more complex and competitive due to a high demand from prospective
students and an emerging increase of universities both public and private. Management of Universities face challenges and concerns of
predicting students’ academic performance in to put mechanisms in place prior enough for their improvement. This research aims at
employing Decision tree and K-means data mining algorithms to model an approach to predict the performance of students in advance
so as to devise mechanisms of alleviating student dropout rates and improve on performance. In Kenya for example, there has been
witnessed an increase student enrolling in universities since the Government started free primary education. Therefore the Government
expects an increased workforce of professionals from these institutions without compromising quality so as to achieve its millennium
development and vision 2030. Backlog of students not finishing their studies in stipulated time due to poor performance is another
issue that can be addressed from the results of this research since predicting student performance in advance will enable University
management to devise ways of assisting weak students and even make more decisions on how to select students for particular courses.
Previous studies have been done Educational Data Mining mostly focusing on factors affecting students’ performance and also used
different algorithms in predicting students’ performance. In all these researches, accuracy of prediction is key and what researchers
look forward to try and improve.
An Analysis of Behavioral Intention toward Actual Usage of Open Source Softwa...IJAEMSJORNAL
This study focused on analyzing behavioral intention toward the actual usage of open source software in private universities in Tanzania. Questionnaires were used to collect quantitative data in two private universities namely Iringa University and Ruaha Catholic University. Stratified sampling technique was utilized to ensure sample representativeness among two universities where simple random sampling was used to draw a sample from each stratum during the survey. Finding Using Structural Equation Modeling indicated that performance expectancy (source code production and software localization) and social factor (Vendor, internet services provider and lecturer) have a significant influence toward behavioral intention while effort expectancy was found to be insignificant. In addition the behavioral intention was found to be significant toward student’s actual usage of open source software in Universities. This study recommended that for students to develop behavioral intention toward OSS actual usage, internet service provider have to increase the level of internet services that can assist the university communities to access and download open source software. In addition, to increase actual use, open source software vendors and lecturer or experts have to make sure that their software source code is free for distribution and localization, this will increase self-motivation and interest of the students toward actual usage of open source software.
Managers Perceptions towards the Success of E-performance Reporting SystemTELKOMNIKA JOURNAL
Managers are the key informants in the information system (IS) success measurements. In fact, besides the determinant agents are rarely involved in the assessments, most of the measurements are also often performed by the technical stakeholders of the systems. Therefore, the results may questionable. This study was carried to explain the factors that influence the success of an e-performance reporting system in an Indonesian university by involving ± 70% of the managers (n=66) in the sampled institution. The DeLone and McLean model was adopted and adapted here following the suggestions of the previous meta-analysis studies. The collected data was analyzed using the partial least squares-structural equation modelling (PLS-SEM) for examining the four hypotheses. Despite the findings revealed acceptances of the overall hypotheses, the weak explanation of the user satisfaction variable towards the net benefit one had been the highlighted point. Besides the study limitations, the point may also be the practical and theoretical considerations for the next studies, especially for the IS success studies in Indonesia
Presentation on the effectiveness of E-learning within the premises of Tata S...Anannya Chakraborty.
Learning and development and how that has affected workers and co workers of Tata Steel Tubes Strategic Business Unit. The video discusses on the effectiveness of E-learning and how that could eradicate the undeucative practises of Tata Steel co-workers and staff members and also in a manner that it has helped me in my learning process. The process of imparting the educative policies in Tata Steel has benefitted staffs, members and the workers working within the Tata Steel.
Acceptance of E-learning among university students in UAE: A practical study IJECEIAES
The objective of the study is to find out the factors which affect the acceptance of E-learning among students and how the students’ purpose of using E-learning is determined by these factors. The research was based on the Technology Acceptance Model (TAM). The researcher developed a questionnaire to gather data from a sample of 366 university students who actively used the E-learning system. According to the results of the study, subjective norms, perceived usefulness, perceived ease of use, enjoyment, and accessibility” are the vital predicators behind the intention of students for using E-learning systems. This indicates that extended TAM is applicable in the UAE. The results show that policymakers and education developers should take E-learning system seriously since it can be opted not just as a technological solution but also as a learning platform for students belonging to a distant area. The results present practical implications for education developers, policymakers and practitioners in devising useful plans to implement E-learning systems.
Efforts to Revitalize the Computer Science Education in ThailandIJERA Editor
The shortage of ICT professionals in Thai workforce has been appeared in spite of many ICT-related programs
offering in universities across Thailand. The statistics show that a promoting of new ICT-related programs,
modified by CS program, is stealing students from CS program. Thus, CS enrollment decline as well as
students’ dropping outs are problems facing in every Thai universities. This paper reports on a study in which
10 people who are the representative of ICT graduates’ users were interviewed and 702 freshmen who took in
the introductory computer course were surveyed to try to determine the relationship of CS enrollment and ICT
professionals and the factors contributing to decline in CS enrollments. The results revealed that most of ICT
professionals were developed from CS background. The top reasons for rejecting the CS major, were its’
difficulties and students’ desire to use IT as an application, instead of a construction. These were their weakness
in programming and technical work, but the reasons for choosing the CS major were opposite. Finally, this
paper proposes a revitalization of the CS education framework to reverse the trend of CS enrollment decline.
Data Mining Application in Advertisement Management of Higher Educational Ins...ijcax
In recent years, Indian higher educational institute’s competition grows rapidly for attracting students to get enrollment in their institutes. To attract students educational institutes select a best advertisement method. There are different advertisements available in the market but a selection of them is very difficult
for institutes. This paper is helpful for institutes to select a best advertisement medium using some data mining methods.
The Academic Performance and the Computer Programming Anxiety of BSIT Student...IJAEMSJORNAL
The 21st century has caused numerous significant impacts and advancements in the lives of people. Information Technology (IT) has contributed essential benefits in the different areas of the society. One of the vital skills in developing IT solutions is programming. For many, writing computer programs may be a very challenging task which may result in some levels of anxiety. This study aimed to describe and look at the relationship between the academic performance and the programming anxiety among Bachelor of Science in Information Technology (BSIT) students to provide a basis for instructional strategy improvement in the undergraduate level.
Improving keyword extraction in multilingual texts IJECEIAES
The accuracy of keyword extraction is a leading factor in information retrieval systems and marketing. In the real world, text is produced in a variety of languages, and the ability to extract keywords based on information from different languages improves the accuracy of keyword extraction. In this paper, the available information of all languages is applied to improve a traditional keyword extraction algorithm from a multilingual text. The proposed keywork extraction procedure is an unsupervise algorithm and designed based on selecting a word as a keyword of a given text, if in addition to that language holds a high rank based on the keywords criteria in other languages, as well. To achieve to this aim, the average TF-IDF of the candidate words were calculated for the same and the other languages. Then the words with the higher averages TF-IDF were chosen as the extracted keywords. The obtained results indicat that the algorithms’ accuracis of the multilingual texts in term frequency-inverse document frequency (TF-IDF) algorithm, graph-based algorithm, and the improved proposed algorithm are 80, 60.65, and 91.3%, respectively.
Implementation of ICT As a Change Agent in Computing Students Result in Chukw...IJERA Editor
Manual method of sorting out for result and computing it has posed a big problem to exams unit in ChukwuemekaOdumegwuOjukwu University (COOU), In Anambra State, Nigeria. During computation of results, the exam officers collect paper results from the department and either calculate them on papers or enter them on a computer for computation. Either of them is hard work and time wasting. Hence we propose a change and retrieval agent in computing results in ChukwuemekaOdumegwuOjukwu University, Uli. Since the University already has an existing website, we require a new format for uploading results to the website using Microsoft excel witheight (8) specific columns namely: names of students, registration numbers, continuous assignment, examination score, total score, grade and remarks done by course lecturers.To compute the results of a particular student, the exam officer opens the application; enters the required detail and the application will fetch and populate the grade fields automatically from the results already uploaded on the university website by the course lecturers. The application needs internet connection in order to do this. Thereafter the results are computed by the application. The methodology used is Object Oriented Analysis and Design Methods. The application is a windows application written with Microsoft visual basic.net. The database used in saving login information and computed CGPAs is a free distributed database MySQL. The result of this researchis a functional result retrieval and computation application used only by the authorized personnel for computation of degree results.
PREDICTING ACADEMIC MAJOR OF STUDENTS USING BAYESIAN NETWORKS TO THE CASE OF ...ijcax
In this study, which took place current year in the city of Maragheh in IRAN. Number of high school students in the fields of study: mathematics, Experimental Sciences, humanities, vocational, business and science were studied and compared. The purpose of this research is to predict the academic major of high school students using Bayesian networks. The effective factors have been used in academic major selection for the first time as an effective indicator of Bayesian networks. Evaluation of Impacts of indicators on each other, discretization data and processing them was performed by GeNIe. The proper course would be advised for students to continue their education.
E-Learning Readiness Assessment Tool for Philippine Higher Education Institut...IJITE
The growth of internet technologies changed learning strategies globally. The Philippines is no exemption. Due to its usefulness and potential, E-learning is becoming popular. But before these benefits would be enjoyed, it is very important for an institution to be assessed. This is to identify the needs and factors that directly affect their readiness. This study presents a readiness assessment tool for Philippine Higher Education Institutions. It also serves as a needs assessment instrument.
Combining Two Models of Successful Information System MeasurementTELKOMNIKA JOURNAL
This paper purposes is to measure successful of Academic Advisory information system by combining two models of information system measurement. DeLone & McLean IS Success Model use to measure the successful of system while COBIT framework is to measure system maturity level. Result of this research showed that the successful of Academic Advisory IS affected by User Satifaction, Quality of Service, Quality of System while Maturity level at 3.7. The result also showed there’s a relation between level of maturity system with the success of system.
Assessing Information System Integration Using Combination of the Readiness a...journalBEEI
Information system integration (ISI) is one of the development concerns for organizations to enhance business competitiveness. However, the implementations still present its failures. Despite the ISI may successful technically; but it still seems to be unsuccessful because of the human and management issues. The issues may relate to the readiness constructs of ISI. This study was aimed to know the status of the readiness and success of ISI and to assess the influential factors of the integration in the sampled institution. About 160 samples were purposely involved by considering their key informant characteristics. The data were analyzed using the partial least squares-structural equation modeling (PLS-SEM) method. The findings revealed only the user satisfaction variable that mediated the positive effects of the readiness variables towards variable of the system integration success. Besides, the findings may practically helpful for stakeholders in the sampled institution, but it may also theoretically useful for researchers in regard to the readiness and success issues of ISI.
Technology readiness and usability of office automation system in suburban areasTELKOMNIKA JOURNAL
Readiness and usability issues are important attributes of an information system (IS) success. Currently, IS studies that have been assessing the issues in suburban areas are still limited. The purpose of this study was to measure the above-mentioned phenomena by combining the readiness and usability models. The proposed model consisted out 10 constructs with 25 indicators. The four constructs were from the readiness model and the six ones were the usability model. The 89 samples were collected using an online survey based on purposive random sampling. Partial least squares structural equation modeling (PLS-SEM) method with SmartPLS 3.2.8 was used for analyzing the data. The findings may have contributed to the IS research field, in terms of the readiness and usability issues on the IS use in a suburban area in Indonesia.
Determining the Factors Affecting on Digital Learning Adoption among the Stud...Dr. Amarjeet Singh
This study investigated students’ perception towards acceptance of digital transformation in teaching-learning activities studying at different levels in Kathmandu valley (includes 3 districts: Kathmandu, Lalitpur, and Bhaktapur), Nepal. Using the Technology Acceptance Model (TAM) as a research framework to examine the factors affecting how students come to accept and use technology. The literature review indicated that social influence, accessibility, computer self-efficacy, infrastructure, and perceived enjoyment were the most common external factors of TAM. A total of 384 students were participated in the study. Different statistical analyses have been performed in order to test the significance of the considered factors that may affect the digital learning practices of students. The result of the data analysis revealed that social influence, accessibility, computer self-efficacy, infrastructure, and enjoyment have a significant impact on perceived ease of use of the digital learning system. Furthermore, social influence, accessibility, computer self-efficacy, infrastructure, and enjoyment were also found to have a positive influence on the perceived usefulness of the digital learning system. The Digital learning system is changing the traditional practice of learning with technology and innovation. The study support that using digital tools in education makes academic activities more interesting, easy to access, creative, effective, and productive.
The Implementation of E-learning System Governance to Deal with User Need, In...TELKOMNIKA JOURNAL
In this digital era, it has been proven that the proper of e-learning system implementation provides
various advantages and huge benefits. But to achieve the proper implementation is not an easy way since
there are many obstacles have to be addressed. Beside the benefits and advantages, such as the other IT
based system, e-learning also bring many risks that come from its environment or embedded in. Although
many methods or approaches proposed to tackle those obstacles and risks, but the study that tackle those
problems from IT Governance view is still limited. The study presents the report of the IT Governance
approach to address some of the risks of eLearning system implementation such as: miss alignment with
the enterprise goal and strategies, uncomplianceness with the government regulation, and unmatched with
the stakeholder needs. The governance of eLearning system proposed has been implemented in the
private university situated in Jakarta, Indonesia for two semesters. Based on the general observation, the
University can get some benefits such as their succeed in maintaining its institution as the university that
comply with government regulatory.
THE RATIONALE AND FRAMEWORK FOR EVALUATING THE ICT USE IN TEACHER EDUCATION D...DrGavisiddappa Angadi
This study investigated that the quantity of computer and ICT use in teacher education institutions is less and it is mainly focused on the learning of ICT skills which takes optimum time computers are used. The framework is then improved towards a new framework that can be effectively used to evaluate information and communication technology use in pre-service teacher education. In this study the independent variables are derived from computer use within the institution, some other extraneous factor may have impact on the results. Those factors may be computer use at home, friends home and cyber or internet centers by the respondents. The study concludes that the reality rhetoric gap of the impact of ICTs in teacher education institutions be evaluated from periodically to ensure that the quality with program objectives are met. The result shows that there is an urgent need to conduct intensive training to all the teacher educators in the colleges of education. The curriculum developers should develop global content for serving the local needs and make it to available to all the colleges of education online as well as offline content or blended learning modules. Several factors have been cited as responsible for low quantity of computer use in colleges of education. Some of these factors are; attitude towards new technologies, poor management, lack of local content serving local needs, shortage of equipments.
Indonesian universities are implementing various strategies to improve the quality and quantity of scientific publications. Sriwijaya University has restructured its research and community service grant services by implementing e-services through the new generation management information system of the institute of research and community service (SIM LPPM NG). Numerous studies have been performed to determine the factors that influence lecturer performance, particularly in scientific journals. The purpose of this research is to utilize a model to investigate the impact of system quality, information quality, and service quality on user satisfaction and performance. For partial least squares structural equation modelling (PLS-SEM), 280 respondents comprised the dataset. The results demonstrated that system quality, information quality, and service quality influence user satisfaction. Individual performance is influenced by the level of user satisfaction. According to the findings of this study, the DeLone and McLean information system success model can be used to evaluate obligatory e-services that are integrated.
Use of information Systems in Yemeni Universities Future Vision EECJOURNAL
This research examines the use of computed information systems in Yemeni universities through the use of intermediate variable technology to test the indirect impact of the information systems structure on the relationship between information technology, and the final performance in the computed information systems in Yemeni universities. The applied situation was exemplified by the selection of four universities where the data on the study were collected through special friendly questionnaire, and the number of respondent (224) persons had been used. Many statistical means, percentages, arithmetic mean, standard deviation, and intermediate deviation have been used for the description of the study sample, and for the study variables, as for hypothesis testing, the intermediate variant method was used and the end result was to prove that there was a relationship An incomplete mediation attributed to the structure of information systems that has an indirect impact on the resulting relationship between information technology and the final performance of information systems.
HIGHER EDUCATION FACULTY STAFF EREADINESS IN INSTITUTIONS OF THE ROYAL COMMIS...ijait
Critical analysis of technological skills deemed extremely important in the evaluation of faculty staff e- readiness. Research aims at assessing e-readiness of faculty staff in the affiliate institutions of the Royal Commission in Jubail, and to investigate whether their experience in using ICTs influences
their judgement about using ICTs or not. Survey methodology facilitated through the use of questionnaires collected from 146 respondents. Analysis revealed that faculty staff judgement about using ICTs, their e- readiness and willingness to using ICTs are highly positive. Moreover, their experience in using ICTs did not significantly predict their judgement about ICTs. The result of this study provides valuable insights as it will enable policy-makers to prioritize interventions needed for
transforming the Institutions of the Royal Commission in Jubail into an e-ready entity favourably placed to benefit from digital opportunities, as well as to develop and support factors that enhance strategies for adopting ICTs effectively.
Present study aims to investigate the influence of ICTs dimensions (Information Technology (IT),
Management Information System (MIS), Office automation (OA), Intranet and Internet) on workforce
productivity for a group of industrial organizations in Alexandria - Egypt. The population of the study was
managers and staff members working in different areas related to ICTs in the selected industrial
organizations at various managerial levels. Descriptive-statistical combined research study was conducted.
The selection of the participating industrial organization done using simple random sampling technique.
Data collection done using questionnaires. In order to check the validity of the study instrument expert
comments were used and the reliability of the questions calculated as 79% using Cronbach’s Alpha
coefficient. The analysis of instrument data done using single variable t-test, Friedman and variance
analysis. The study findings revealed that the specified dimensions of ICTs positively affect workforce
productivity of industrial organizations in Alexandria - Egypt.
Financial Management Information System within Government Institution and Sup...sececonf
The provision of comprehensive financial
information by the government institution is needed by
the wider community to boost the effectiveness of the
information to the society and government, and
decision-making. This system produces information that
is able to encourage the realization of a clean,
transparent, and able government to respond to
changing demands effectively. Therefore, the success of
the information system if the users are successful in the
model of acceptance of the systems and information
technology and it would be improving their
performance. This research aims to examine the
acceptance of regional financial information systems in
government using the Technology Acceptance Model
(TAM) and evidence of its influence on the
performance. The study found 556 respondents who are
civil servants in Lampung Province. The finding using
SEM analysis shows that all constructs have an effect in
conformity with the concept of TAM in a government
institution. This study reveals that all variables which
include the model of TAM theory have a positive impact
on the user's performance. It also improvesthe
effectiveness of the information system within the
government institution, especially the implementation of
the financial management information system.
Keywords-Financial Management Information System,
supply chain strategy, Technology Acceptance Model
(TAM), User’s Performance
E-LEARNING READINESS ASSESSMENT TOOL FOR PHILIPPINE HIGHER EDUCATION INSTITUT...IJITE
The growth of internet technologies changed learning strategies globally. The Philippines is no exemption.
Due to its usefulness and potential, E-learning is becoming popular. But before these benefits would be
enjoyed, it is very important for an institution to be assessed. This is to identify the needs and factors that
directly affect their readiness. This study presents a readiness assessment tool for Philippine Higher
Education Institutions. It also serves as a needs assessment instrument.
E-Learning Readiness Assessment Tool for Philippine Higher Education Institut...IJITE
The growth of internet technologies changed learning strategies globally. The Philippines is no exemption.
Due to its usefulness and potential, E-learning is becoming popular. But before these benefits would be
enjoyed, it is very important for an institution to be assessed. This is to identify the needs and factors that
directly affect their readiness. This study presents a readiness assessment tool for Philippine Higher
Education Institutions. It also serves as a needs assessment instrument.
The impact of management information systems(mis) technologies on the quality...IJNSA Journal
This study aimed to identify the impact of management information systems (MIS) techniques on the quality
of services provided at the University of Tabuk from the perspective of staff. To achieve the goals of the
study, two questionnaires were developed and distributed on a random sample of 426 employees at the
University of Tabuk in the Kingdom of Saudi Arabia. The Statistical Package of Social Sciences (SPSS,
V.16) was used to analyze the data of the questionnaire.
THE IMPACT OF MANAGEMENT INFORMATIONSYSTEMS(MIS) TECHNOLOGIES ON THEQUALITY O...IJNSA Journal
This study aimed to identify the impact of management information systems (MIS) techniques on the quality of services provided at the University of Tabuk from the perspective of staff. To achieve the goals of the study, two questionnaires were developed and distributed on a random sample of 426 employees at the University of Tabuk in the Kingdom of Saudi Arabia. The Statistical Package of Social Sciences (SPSS, V.16) was used to analyze the data of the questionnaire.
Implementation of a decision support process for evaluating the correlation ...IJECEIAES
The main objective of this paper is to study the correlation between investment in information technologies and especially information systems and information system success based on data collection and a multi-criteria decision-making approach using technique for order preference by similarity to ideal solution (TOPSIS) and analytical hierarchy process (AHP) methods. The criteria of the hierarchical model for evaluating the information system success are chosen from Delone and McLean information systems (IS) success model. The proposed approach has been implemented in 3 sectors recognized by their variation in the use of information systems: the financial sector, the service companies sector, and the construction industry sector. Therefore, the results of this implementation show that massive investment in information systems does not always guarantee good information system success, and information system success is not always the result of massive investment in the information system.
The Contribution of Information Technology Infrastructure in the Information ...IJRES Journal
There are some great innovations in e-government during the past decade. And there is intense competition between some governments and leaders in the supply of services on the Internet. Some countries do not want to stay behind in this area, where many governments have developed detailed strategies to realize the e-government programs. Despite differences in goals behind these programs from one country to another, but there are still many points of convergence between them particularly in information technology infrastructure field. However, Problems associated with the process of application and adoption of e-government due to poor systems and infrastructure construction, which negatively affects the adoption of the public services through the e-government portal, in particular in developing countries. This study argued contribution the information technology Infrastructure in Information Systems success in e-government agencies. Where there are weaknesses in the understanding of this contribution and its importance in many developing countries, so the researcher proposed a model to clarify this contribution, and expected a positive relationship between the information technology infrastructure factors and information systems success, and this affects positively or negatively the adoption of e-government.
Examining relationship between service quality, user satisfaction and perform...IJECEIAES
Governments attempt to use all forms of information technologies including Internet and mobile computing to be able to transform relationships with citizens. However, there is a clear gap between the indicator of the impact of technology innovation output and government’s vision in United Arab Emirates (UAE). In this regard, investigating the relationship between service quality, user satisfaction, and performance impact may help the government to mark its current progress and milestone achievement. This research proposed a model based on Delone & McLean IS success model by considering the research context. The modeling of structural equations via PLS (Partial least squares) regression was applied to evaluate the model within the context of public sector in the UAE. The data was collected from a sample of 147 employees in public organizations using a questionnaire. Results demonstrated that the quality of service has a significant effect on user satisfaction. In addition, quality of service and user satisfaction positively influences the staff performance. The outcome of this research helps to enhance the understanding of the impact of smart government applications.
ACCEPTABILITY OF K12 SENIOR HIGH SCHOOL STUDENTS ACADEMIC PERFORMANCE MONITOR...IJITE
The K to 12 Basic Education program uses standards and a competency-based grading system. These are
found in the curriculum guides. All grades will be based on the weighted raw score of the learners’
summative assessments. Senior High School Students have been graded on three categories the written
work, performance tasks, and quarterly assessments. Technology plays a substantial role in helping
teachers in the progress, communication, application, and grading of assessment tasks. The correlational
aspect aims to establish the degree to which the variables of on the level of compliance of the developed
application affects and influences the level of acceptance of the system as perceived by the respondents.
From the level of acceptance of the system when it comes to its performance efficiency is directly affected
by the level of compliance of the system in its compatibility and reliability. This means that changes on the
identified variables may directly affect the variables on the level of acceptance of the system. The findings
of significant difference on the perceptions of the IT expert and the Users on the level of acceptance of the
system simply imply that the IT experts and the users does not share similar perceptions on the system. This
means that there is a significant difference on the level of acceptance of the system as perceived by the
users and the IT experts.
Similar to Readiness measurement of IT implementation in Higher Education Institutions in Indonesia (20)
Amazon products reviews classification based on machine learning, deep learni...TELKOMNIKA JOURNAL
In recent times, the trend of online shopping through e-commerce stores and websites has grown to a huge extent. Whenever a product is purchased on an e-commerce platform, people leave their reviews about the product. These reviews are very helpful for the store owners and the product’s manufacturers for the betterment of their work process as well as product quality. An automated system is proposed in this work that operates on two datasets D1 and D2 obtained from Amazon. After certain preprocessing steps, N-gram and word embedding-based features are extracted using term frequency-inverse document frequency (TF-IDF), bag of words (BoW) and global vectors (GloVe), and Word2vec, respectively. Four machine learning (ML) models support vector machines (SVM), logistic regression (RF), logistic regression (LR), multinomial Naïve Bayes (MNB), two deep learning (DL) models convolutional neural network (CNN), long-short term memory (LSTM), and standalone bidirectional encoder representations (BERT) are used to classify reviews as either positive or negative. The results obtained by the standard ML, DL models and BERT are evaluated using certain performance evaluation measures. BERT turns out to be the best-performing model in the case of D1 with an accuracy of 90% on features derived by word embedding models while the CNN provides the best accuracy of 97% upon word embedding features in the case of D2. The proposed model shows better overall performance on D2 as compared to D1.
Design, simulation, and analysis of microstrip patch antenna for wireless app...TELKOMNIKA JOURNAL
In this study, a microstrip patch antenna that works at 3.6 GHz was built and tested to see how well it works. In this work, Rogers RT/Duroid 5880 has been used as the substrate material, with a dielectric permittivity of 2.2 and a thickness of 0.3451 mm; it serves as the base for the examined antenna. The computer simulation technology (CST) studio suite is utilized to show the recommended antenna design. The goal of this study was to get a more extensive transmission capacity, a lower voltage standing wave ratio (VSWR), and a lower return loss, but the main goal was to get a higher gain, directivity, and efficiency. After simulation, the return loss, gain, directivity, bandwidth, and efficiency of the supplied antenna are found to be -17.626 dB, 9.671 dBi, 9.924 dBi, 0.2 GHz, and 97.45%, respectively. Besides, the recreation uncovered that the transfer speed side-lobe level at phi was much better than those of the earlier works, at -28.8 dB, respectively. Thus, it makes a solid contender for remote innovation and more robust communication.
Design and simulation an optimal enhanced PI controller for congestion avoida...TELKOMNIKA JOURNAL
In this paper, snake optimization algorithm (SOA) is used to find the optimal gains of an enhanced controller for controlling congestion problem in computer networks. M-file and Simulink platform is adopted to evaluate the response of the active queue management (AQM) system, a comparison with two classical controllers is done, all tuned gains of controllers are obtained using SOA method and the fitness function chose to monitor the system performance is the integral time absolute error (ITAE). Transient analysis and robust analysis is used to show the proposed controller performance, two robustness tests are applied to the AQM system, one is done by varying the size of queue value in different period and the other test is done by changing the number of transmission control protocol (TCP) sessions with a value of ± 20% from its original value. The simulation results reflect a stable and robust behavior and best performance is appeared clearly to achieve the desired queue size without any noise or any transmission problems.
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...TELKOMNIKA JOURNAL
Vehicular ad-hoc networks (VANETs) are wireless-equipped vehicles that form networks along the road. The security of this network has been a major challenge. The identity-based cryptosystem (IBC) previously used to secure the networks suffers from membership authentication security features. This paper focuses on improving the detection of intruders in VANETs with a modified identity-based cryptosystem (MIBC). The MIBC is developed using a non-singular elliptic curve with Lagrange interpolation. The public key of vehicles and roadside units on the network are derived from number plates and location identification numbers, respectively. Pseudo-identities are used to mask the real identity of users to preserve their privacy. The membership authentication mechanism ensures that only valid and authenticated members of the network are allowed to join the network. The performance of the MIBC is evaluated using intrusion detection ratio (IDR) and computation time (CT) and then validated with the existing IBC. The result obtained shows that the MIBC recorded an IDR of 99.3% against 94.3% obtained for the existing identity-based cryptosystem (EIBC) for 140 unregistered vehicles attempting to intrude on the network. The MIBC shows lower CT values of 1.17 ms against 1.70 ms for EIBC. The MIBC can be used to improve the security of VANETs.
Conceptual model of internet banking adoption with perceived risk and trust f...TELKOMNIKA JOURNAL
Understanding the primary factors of internet banking (IB) acceptance is critical for both banks and users; nevertheless, our knowledge of the role of users’ perceived risk and trust in IB adoption is limited. As a result, we develop a conceptual model by incorporating perceived risk and trust into the technology acceptance model (TAM) theory toward the IB. The proper research emphasized that the most essential component in explaining IB adoption behavior is behavioral intention to use IB adoption. TAM is helpful for figuring out how elements that affect IB adoption are connected to one another. According to previous literature on IB and the use of such technology in Iraq, one has to choose a theoretical foundation that may justify the acceptance of IB from the customer’s perspective. The conceptual model was therefore constructed using the TAM as a foundation. Furthermore, perceived risk and trust were added to the TAM dimensions as external factors. The key objective of this work was to extend the TAM to construct a conceptual model for IB adoption and to get sufficient theoretical support from the existing literature for the essential elements and their relationships in order to unearth new insights about factors responsible for IB adoption.
Efficient combined fuzzy logic and LMS algorithm for smart antennaTELKOMNIKA JOURNAL
The smart antennas are broadly used in wireless communication. The least mean square (LMS) algorithm is a procedure that is concerned in controlling the smart antenna pattern to accommodate specified requirements such as steering the beam toward the desired signal, in addition to placing the deep nulls in the direction of unwanted signals. The conventional LMS (C-LMS) has some drawbacks like slow convergence speed besides high steady state fluctuation error. To overcome these shortcomings, the present paper adopts an adaptive fuzzy control step size least mean square (FC-LMS) algorithm to adjust its step size. Computer simulation outcomes illustrate that the given model has fast convergence rate as well as low mean square error steady state.
Design and implementation of a LoRa-based system for warning of forest fireTELKOMNIKA JOURNAL
This paper presents the design and implementation of a forest fire monitoring and warning system based on long range (LoRa) technology, a novel ultra-low power consumption and long-range wireless communication technology for remote sensing applications. The proposed system includes a wireless sensor network that records environmental parameters such as temperature, humidity, wind speed, and carbon dioxide (CO2) concentration in the air, as well as taking infrared photos.The data collected at each sensor node will be transmitted to the gateway via LoRa wireless transmission. Data will be collected, processed, and uploaded to a cloud database at the gateway. An Android smartphone application that allows anyone to easily view the recorded data has been developed. When a fire is detected, the system will sound a siren and send a warning message to the responsible personnel, instructing them to take appropriate action. Experiments in Tram Chim Park, Vietnam, have been conducted to verify and evaluate the operation of the system.
Wavelet-based sensing technique in cognitive radio networkTELKOMNIKA JOURNAL
Cognitive radio is a smart radio that can change its transmitter parameter based on interaction with the environment in which it operates. The demand for frequency spectrum is growing due to a big data issue as many Internet of Things (IoT) devices are in the network. Based on previous research, most frequency spectrum was used, but some spectrums were not used, called spectrum hole. Energy detection is one of the spectrum sensing methods that has been frequently used since it is easy to use and does not require license users to have any prior signal understanding. But this technique is incapable of detecting at low signal-to-noise ratio (SNR) levels. Therefore, the wavelet-based sensing is proposed to overcome this issue and detect spectrum holes. The main objective of this work is to evaluate the performance of wavelet-based sensing and compare it with the energy detection technique. The findings show that the percentage of detection in wavelet-based sensing is 83% higher than energy detection performance. This result indicates that the wavelet-based sensing has higher precision in detection and the interference towards primary user can be decreased.
A novel compact dual-band bandstop filter with enhanced rejection bandsTELKOMNIKA JOURNAL
In this paper, we present the design of a new wide dual-band bandstop filter (DBBSF) using nonuniform transmission lines. The method used to design this filter is to replace conventional uniform transmission lines with nonuniform lines governed by a truncated Fourier series. Based on how impedances are profiled in the proposed DBBSF structure, the fractional bandwidths of the two 10 dB-down rejection bands are widened to 39.72% and 52.63%, respectively, and the physical size has been reduced compared to that of the filter with the uniform transmission lines. The results of the electromagnetic (EM) simulation support the obtained analytical response and show an improved frequency behavior.
Deep learning approach to DDoS attack with imbalanced data at the application...TELKOMNIKA JOURNAL
A distributed denial of service (DDoS) attack is where one or more computers attack or target a server computer, by flooding internet traffic to the server. As a result, the server cannot be accessed by legitimate users. A result of this attack causes enormous losses for a company because it can reduce the level of user trust, and reduce the company’s reputation to lose customers due to downtime. One of the services at the application layer that can be accessed by users is a web-based lightweight directory access protocol (LDAP) service that can provide safe and easy services to access directory applications. We used a deep learning approach to detect DDoS attacks on the CICDDoS 2019 dataset on a complex computer network at the application layer to get fast and accurate results for dealing with unbalanced data. Based on the results obtained, it is observed that DDoS attack detection using a deep learning approach on imbalanced data performs better when implemented using synthetic minority oversampling technique (SMOTE) method for binary classes. On the other hand, the proposed deep learning approach performs better for detecting DDoS attacks in multiclass when implemented using the adaptive synthetic (ADASYN) method.
The appearance of uncertainties and disturbances often effects the characteristics of either linear or nonlinear systems. Plus, the stabilization process may be deteriorated thus incurring a catastrophic effect to the system performance. As such, this manuscript addresses the concept of matching condition for the systems that are suffering from miss-match uncertainties and exogeneous disturbances. The perturbation towards the system at hand is assumed to be known and unbounded. To reach this outcome, uncertainties and their classifications are reviewed thoroughly. The structural matching condition is proposed and tabulated in the proposition 1. Two types of mathematical expressions are presented to distinguish the system with matched uncertainty and the system with miss-matched uncertainty. Lastly, two-dimensional numerical expressions are provided to practice the proposed proposition. The outcome shows that matching condition has the ability to change the system to a design-friendly model for asymptotic stabilization.
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...TELKOMNIKA JOURNAL
Many systems, including digital signal processors, finite impulse response (FIR) filters, application-specific integrated circuits, and microprocessors, use multipliers. The demand for low power multipliers is gradually rising day by day in the current technological trend. In this study, we describe a 4×4 Wallace multiplier based on a carry select adder (CSA) that uses less power and has a better power delay product than existing multipliers. HSPICE tool at 16 nm technology is used to simulate the results. In comparison to the traditional CSA-based multiplier, which has a power consumption of 1.7 µW and power delay product (PDP) of 57.3 fJ, the results demonstrate that the Wallace multiplier design employing CSA with first zero finding logic (FZF) logic has the lowest power consumption of 1.4 µW and PDP of 27.5 fJ.
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemTELKOMNIKA JOURNAL
The flaw in 5G orthogonal frequency division multiplexing (OFDM) becomes apparent in high-speed situations. Because the doppler effect causes frequency shifts, the orthogonality of OFDM subcarriers is broken, lowering both their bit error rate (BER) and throughput output. As part of this research, we use a novel design that combines massive multiple input multiple output (MIMO) and weighted overlap and add (WOLA) to improve the performance of 5G systems. To determine which design is superior, throughput and BER are calculated for both the proposed design and OFDM. The results of the improved system show a massive improvement in performance ver the conventional system and significant improvements with massive MIMO, including the best throughput and BER. When compared to conventional systems, the improved system has a throughput that is around 22% higher and the best performance in terms of BER, but it still has around 25% less error than OFDM.
Reflector antenna design in different frequencies using frequency selective s...TELKOMNIKA JOURNAL
In this study, it is aimed to obtain two different asymmetric radiation patterns obtained from antennas in the shape of the cross-section of a parabolic reflector (fan blade type antennas) and antennas with cosecant-square radiation characteristics at two different frequencies from a single antenna. For this purpose, firstly, a fan blade type antenna design will be made, and then the reflective surface of this antenna will be completed to the shape of the reflective surface of the antenna with the cosecant-square radiation characteristic with the frequency selective surface designed to provide the characteristics suitable for the purpose. The frequency selective surface designed and it provides the perfect transmission as possible at 4 GHz operating frequency, while it will act as a band-quenching filter for electromagnetic waves at 5 GHz operating frequency and will be a reflective surface. Thanks to this frequency selective surface to be used as a reflective surface in the antenna, a fan blade type radiation characteristic at 4 GHz operating frequency will be obtained, while a cosecant-square radiation characteristic at 5 GHz operating frequency will be obtained.
Reagentless iron detection in water based on unclad fiber optical sensorTELKOMNIKA JOURNAL
A simple and low-cost fiber based optical sensor for iron detection is demonstrated in this paper. The sensor head consist of an unclad optical fiber with the unclad length of 1 cm and it has a straight structure. Results obtained shows a linear relationship between the output light intensity and iron concentration, illustrating the functionality of this iron optical sensor. Based on the experimental results, the sensitivity and linearity are achieved at 0.0328/ppm and 0.9824 respectively at the wavelength of 690 nm. With the same wavelength, other performance parameters are also studied. Resolution and limit of detection (LOD) are found to be 0.3049 ppm and 0.0755 ppm correspondingly. This iron sensor is advantageous in that it does not require any reagent for detection, enabling it to be simpler and cost-effective in the implementation of the iron sensing.
Impact of CuS counter electrode calcination temperature on quantum dot sensit...TELKOMNIKA JOURNAL
In place of the commercial Pt electrode used in quantum sensitized solar cells, the low-cost CuS cathode is created using electrophoresis. High resolution scanning electron microscopy and X-ray diffraction were used to analyze the structure and morphology of structural cubic samples with diameters ranging from 40 nm to 200 nm. The conversion efficiency of solar cells is significantly impacted by the calcination temperatures of cathodes at 100 °C, 120 °C, 150 °C, and 180 °C under vacuum. The fluorine doped tin oxide (FTO)/CuS cathode electrode reached a maximum efficiency of 3.89% when it was calcined at 120 °C. Compared to other temperature combinations, CuS nanoparticles crystallize at 120 °C, which lowers resistance while increasing electron lifetime.
In place of the commercial Pt electrode used in quantum sensitized solar cells, the low-cost CuS cathode is created using electrophoresis. High resolution scanning electron microscopy and X-ray diffraction were used to analyze the structure and morphology of structural cubic samples with diameters ranging from 40 nm to 200 nm. The conversion efficiency of solar cells is significantly impacted by the calcination temperatures of cathodes at 100 °C, 120 °C, 150 °C, and 180 °C under vacuum. The fluorine doped tin oxide (FTO)/CuS cathode electrode reached a maximum efficiency of 3.89% when it was calcined at 120 °C. Compared to other temperature combinations, CuS nanoparticles crystallize at 120 °C, which lowers resistance while increasing electron lifetime.
A progressive learning for structural tolerance online sequential extreme lea...TELKOMNIKA JOURNAL
This article discusses the progressive learning for structural tolerance online sequential extreme learning machine (PSTOS-ELM). PSTOS-ELM can save robust accuracy while updating the new data and the new class data on the online training situation. The robustness accuracy arises from using the householder block exact QR decomposition recursive least squares (HBQRD-RLS) of the PSTOS-ELM. This method is suitable for applications that have data streaming and often have new class data. Our experiment compares the PSTOS-ELM accuracy and accuracy robustness while data is updating with the batch-extreme learning machine (ELM) and structural tolerance online sequential extreme learning machine (STOS-ELM) that both must retrain the data in a new class data case. The experimental results show that PSTOS-ELM has accuracy and robustness comparable to ELM and STOS-ELM while also can update new class data immediately.
Electroencephalography-based brain-computer interface using neural networksTELKOMNIKA JOURNAL
This study aimed to develop a brain-computer interface that can control an electric wheelchair using electroencephalography (EEG) signals. First, we used the Mind Wave Mobile 2 device to capture raw EEG signals from the surface of the scalp. The signals were transformed into the frequency domain using fast Fourier transform (FFT) and filtered to monitor changes in attention and relaxation. Next, we performed time and frequency domain analyses to identify features for five eye gestures: opened, closed, blink per second, double blink, and lookup. The base state was the opened-eyes gesture, and we compared the features of the remaining four action gestures to the base state to identify potential gestures. We then built a multilayer neural network to classify these features into five signals that control the wheelchair’s movement. Finally, we designed an experimental wheelchair system to test the effectiveness of the proposed approach. The results demonstrate that the EEG classification was highly accurate and computationally efficient. Moreover, the average performance of the brain-controlled wheelchair system was over 75% across different individuals, which suggests the feasibility of this approach.
Adaptive segmentation algorithm based on level set model in medical imagingTELKOMNIKA JOURNAL
For image segmentation, level set models are frequently employed. It offer best solution to overcome the main limitations of deformable parametric models. However, the challenge when applying those models in medical images stills deal with removing blurs in image edges which directly affects the edge indicator function, leads to not adaptively segmenting images and causes a wrong analysis of pathologies wich prevents to conclude a correct diagnosis. To overcome such issues, an effective process is suggested by simultaneously modelling and solving systems’ two-dimensional partial differential equations (PDE). The first PDE equation allows restoration using Euler’s equation similar to an anisotropic smoothing based on a regularized Perona and Malik filter that eliminates noise while preserving edge information in accordance with detected contours in the second equation that segments the image based on the first equation solutions. This approach allows developing a new algorithm which overcome the studied model drawbacks. Results of the proposed method give clear segments that can be applied to any application. Experiments on many medical images in particular blurry images with high information losses, demonstrate that the developed approach produces superior segmentation results in terms of quantity and quality compared to other models already presented in previeous works.
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...TELKOMNIKA JOURNAL
Drug addiction is a complex neurobiological disorder that necessitates comprehensive treatment of both the body and mind. It is categorized as a brain disorder due to its impact on the brain. Various methods such as electroencephalography (EEG), functional magnetic resonance imaging (FMRI), and magnetoencephalography (MEG) can capture brain activities and structures. EEG signals provide valuable insights into neurological disorders, including drug addiction. Accurate classification of drug addiction from EEG signals relies on appropriate features and channel selection. Choosing the right EEG channels is essential to reduce computational costs and mitigate the risk of overfitting associated with using all available channels. To address the challenge of optimal channel selection in addiction detection from EEG signals, this work employs the shuffled frog leaping algorithm (SFLA). SFLA facilitates the selection of appropriate channels, leading to improved accuracy. Wavelet features extracted from the selected input channel signals are then analyzed using various machine learning classifiers to detect addiction. Experimental results indicate that after selecting features from the appropriate channels, classification accuracy significantly increased across all classifiers. Particularly, the multi-layer perceptron (MLP) classifier combined with SFLA demonstrated a remarkable accuracy improvement of 15.78% while reducing time complexity.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Readiness measurement of IT implementation in Higher Education Institutions in Indonesia
1. TELKOMNIKA Telecommunication, Computing, Electronics and Control
Vol. 18, No. 2, April 2020, pp. 860~869
ISSN: 1693-6930, accredited First Grade by Kemenristekdikti, Decree No: 21/E/KPT/2018
DOI: 10.12928/TELKOMNIKA.v18i2.14902 860
Journal homepage: http://journal.uad.ac.id/index.php/TELKOMNIKA
Readiness measurement of IT implementation
in Higher Education Institutions in Indonesia
Mohamad Irfan1
, Syopiansyah Jaya Putra2
1
Department of Informatics, Faculty of Sains and Technology, UIN Sunan Gunung Djati Bandung, Indonesia
2
Department of Information System, Syarif Hidayatullah State Islamic Unversity Jakarta, Indonesia
1
Department of ICT, Asia E University Malaysia, Malaysia
Article Info ABSTRACT
Article history:
Received Aug 1, 2019
Revised Jan 6, 2020
Accepted Feb 19, 2020
This article elaborates the result of the Pilot Study which is related to IT
implementation factors at the Higher Education Institution (HEI), a pilot
study is used to validate quantitative readiness model of IT implementation.
The main objective of this study is examining the factors that influence
the readiness of IT implementation in HEI. This study attempts to analyze IT
Content factors, Institutional Context, People, Process, Technology, Service
Quality and IT Implementation Readiness (ITIR). The sample of data was
taken from 150 HEIs throughout Indonesia which was then processed in
statistical techniques through PLS-SEM method. The research finding shows
that 9 of the 14 hypotheses used as ITIR model construct have a very
significant influence on IT implementation on HEI, so that this finding can
provide a comprehensive contribution to the literature of ITIR model
development.
Keywords:
ITIR
Pilot study
PLS-SEM
Validation model
This is an open access article under the CC BY-SA license.
Corresponding Author:
Mohamad Irfan,
Department of Informatics, Faculty of Sains and Technology,
UIN Sunan Gunung Djati Bandung
Jl. A.H. Nasution No.105, Cipadung, Kec. Cibiru, Kota Bandung, Jawa Barat 40614, Indonesia.
Email: irfan.bahaf@uinsgd.ac.id
1. INTRODUCTION
Along with the rapid development of information technology nowadays, it is certain that IT
is involved in all fields, including higher education institution [1]. IT does not only benefit the things that
directly utilize the potential of technology, but also encourage the emergence of new innovations in doing
work/activities [2]. One task that belongs to high education is the utilization of IT development in supporting
the provision of high quality services of high education which is affordable for the people who need
education [3]. There are two important ways which can lead us to the purpose of IT development. First, high
education needs to understand the roles that IT can do in supporting higher education processes and the ways
that IT can perform that roles. Second, understanding the way to build a conducive environment so that IT
can provide optimal support [4]–[6].
John Ward and Joe Peppard stated that there are three main objectives of the application of SI/IT
in an organization. First of all is improving work efficiency by automating various processes that manage
information. Secondly, improving management effectiveness by fulfilling information needs for decision
making. Thirdly, improving competitiveness or improving an organization’s competitive advantage by
changing the style and way of doing business. The fact that this application is not in line with expectations,
the value of failure reaches 18%, the implementation of IT problems is 55% and successful IT
2. TELKOMNIKA Telecommun Comput El Control
Readiness measurement of IT implementation in Higher Education Institutions… (Mohamad Irfan)
861
implementation is 27% [7]. The result of the study of the utilization of readiness for IT implementation have
a significant impact on the success of IT project on HEI [8], [9].
This article constitutes a series of doctoral research that covers literature review, pretest and pilot
study. The objective of pilot study is to validate the model of IT Implementation Readiness using quantitative
method. Moreover, this study is intended to reveal the status of IT implementation readiness in HEI and to
ascertain the factors that affect IT implementation readiness. In order to ascertain the above objectives, there
was applied a statistical method called partial structural-structural equation modeling (PLS-SEM) with
SmartPLS 2.0, which is considered to be appropriate for this study. The total responses of respondents
(n = 180) were taken from some HEI respondents in Indonesia. 14 hypotheses as shown in Figure 1 were
then tested. The results show that 8 hypotheses were rejected after the structural model assessment.
The purpose of this study is exploring the factors that influence ITIR organizations.
This study covers five sections. The first part of this article is introduction, followed by the literature
review which reveal the modeling and pilot study. Meanwhile the third part is the research method applied in
the pilot study, which is followed by the research findings and the data analysis. The following part is
discussion and data presentation, that ends with the research conclusion
Figure 1. The research model
2. RESEARCH METHOD
2.1. Research model
As stated by Matti Synco, the factors that have an influence on the implementation of ICT in Higher
Education (HEI) are divided into four groups, namely global challenge, benefits of technology; pedagogical
factors; barrier and limitation to ICT application; and political issues. Moreover, Alemayehu Molla
and Paul S. Licker highlighted the role and perception of organization based on the perception of e-readiness
organization (POER) and perception of e-readiness environment (PEER), which included innovative,
managerial, organizational, and environmental characteristics as determinant factors of IT adoption
and implementation in HEI [10]. In this regard, the framework of e-readiness model which (1) can be reused
consists of components that are not bound to a particular moment in time, and (2) includes all relevant
variables [11], the variables include people, process and technology [12]. This indicator is easy to measure
and has relevant factors for IT implementation in HEI [13], while e-readiness has become a core feature
of international socio-economic development for its ability to change society movement from traditional
relation to a more modern way of thinking or dealing with health, education and production [14], so HEI is
able to have a smart campus with IT utilization indicators on HEI that are used in optimal and massive
manners [15]. Another factor that influences the success of IT implementation in HEI is the quality of IT
services adjusted to Institutional Context [16].
The modelling in this study is built by combining, adapting and adopting existing models using
Input-Process-Output logic to produce a new model as shown in Figures 1 and 2. Through the combination
and adoption, 42 indicators were used to measure IT implementation readiness in HEI as shown in Table 1.
Previously there were 46 indicators interconnected, but their number was simplified into 42 indicators
according to the recommendations of the conducted studies that aim to perform indicator validation, pre-test
3. ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 2, April 2020: 860 - 869
862
and confirmation using quantitative method. In this study, an inductive-quantitative approach is conducted to
validate the proposed model through survey results.
Furthermore, this quantitative research is intended to validate the model, both logically
and empirically. Logical validation is done when the model is logically analyzed in accordance with the
content and aspects expressed, while empirical analysis works when an instrument can reveal all data
captured by the five senses existing in the objects of the research field [17, 18]. In addition, this quantitative
research is concerned with the degree of objectivity, consistency and stability of data or findings that are
related to the developed model, regarding the degree of many people agreement towards data. Based on the
obtained data, the point from this validation study is that the stakeholders participating in this study revised
the first model by repositioning the variables so that the number of relationships between variables within the
model increased. Meanwhile, within the other improvement, the researcher also reformulated the conceptual
framework by accommodating the TESCA model as an additional dimension from the framework.
In graphical illustration, Figure 3 shows the model a conceptual framework.
Table 1. Reference of Indicators
Code Indicators References
ITC1 Timeliness [19],[20],[21],[11]
ITC2 Completeness
ITC3 Consistency
ITC4 Relevance
ITC5 Technology Complexity
ITC6 Information Quality
ITC7 System Quality
ITC8 Perceived Usefulness
ITC9 Perceived Ease of Use
INC1 Institutional Policies [19],[22],[10],[23]
INC2 Management Involvement
INC3 Infrastructure Availability
INC4 External Environments
INC5 Legal Environment
PPL1 Workforce Capability [12],[24],[25]
PPL2 Leadership
PPL3 Competency
PPL4 Resources
PPL5 Change Management
PPL6 Resources and Cultural Infrastructure
PCS1 Culture [12],[24],[25]
PCS2 Governance
PCS3 Awareness
PCS4 Strategy
PCS5 Management Commitment
TCH1 Infrastructure [12],[24],[25]
TCH2 Security
TCH3 Networking
TCH4 Data
TCH5 Telecommunication
SVQ1 Responsiveness [26],[16],[14]
SVQ2 Availability
SVQ3 Functionality
SVQ4 Extension
SVQ5 Reliability
SVQ6 Efficiency
SVQ7 Effectiveness
ITIR1 Technology Management [15], [27]
ITIR2 IT skills
ITIR3 IT Partnership
ITIR4 Quality Improvement
ITIR5 IT acquaintance
4. TELKOMNIKA Telecommun Comput El Control
Readiness measurement of IT implementation in Higher Education Institutions… (Mohamad Irfan)
863
Figure 2. The critical study of the processional and causal model
Figure 3. Conceptual framework ITIR
(Davis, 1998)
Organization
Context
Input Process Output
System
Adaptation
Information Infrastructure
Human
Capital
System
Readiness
Institutional
Context
Orga.
Strategy
Infrastructure HEAM
Environment
Technology
Transfer
Information
Quality
TESCA
Service Quality
E-Readiness
Accession
IT
Content
Institutional
Context
Service
Quality
Technology People ITIR
Processional and Causal Dimensions
(Molla &
Licker, 2005)
(Tarvid, 2008)
(Kashorda &
Waema, 2011)
(Dos Reis & Do
Carmo Duarte
Freitas, 2014)
(Marcel, 2016)
(Kiula,
Waiganjo, &
Kihoro, 2017)
(Mohamad
Irfan, Putra, &
Alam, 2018)
References
Information Integration
Access Needs
IT Utilization
UserSatisfaction
ITImplementationFocuss
Reliability
ServiceLevel
Agreement
Efficiency
Validity
Quality of Service
Otomation
Data Integration Compatible Communication
Availability Reachability Infrastructure
Execution Time Accurration Transparancy
IT Content
Infrastructure
Center
ITIR
People
Process
Technology
Process Dimension-1
Sevice Quality
Process Dimension-2
Input
Dimension
Output
Dimension
5. ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 2, April 2020: 860 - 869
864
2.2. Research procedure
Figure 4 shows two primary stages of research, namely, preliminary study and pilot study.
This study develops a conceptual framework [28] and a research model [8], and validates the model
quantitatively. In particular, this pilot study was conducted based on the recommendations from previous
studies in order to validate model and variable which are developed quantitatively.
Research
Model
Conceptional
Framework
Survey
Result
Research
Instrument
(1.1)
Literature
Study
(1.2)
Research
Model Dev.
(1.3)
Survey
(1)
Preliminary Studies
(2.1)
Research
Design
(2.2)
Instrument
Dev.
Research
Design
(2.3)
Data
Collection
Data
Analisys
Result
Research
Findings
(2.4)
Data
Analisys
(2.5)
Interpretation
(2.6)
Report
Writing
Research
Report
(2)
Pilot Study
Sep,2017-Feb,2018 Mar.2018 Apr-Sep,2018 Oct,2018 Nov-Dec,2018 Jan-Feb,2019
Figure 4. The research procedure
2.3. Population, sample and data collection procedure
The population in this pilot study is stakeholders of IT utilization in higher education institutions in
Indonesia that cover top managers, middle managers, IT unit managers, and IT staff. The types
of stakeholders chosen refer to key informant aspects [29, 30]. 250 data were obtained from institutions
and purposive sampling techniques from universities that have implemented IT, by selecting 160 (64%)
respondents. The biggest number of respondents (51%) are university graduates and 68% of them have
experiences less than ten years in managing IT at HEI. Moreover, the highest percentage of their job
positions belongs to IT staff members (50%). In the data collection procedure, electronic questionnaires are
sent to 300 email addresses and messages broadcast through social media.
2.4. Research instruments and data analysis
The instrument of this study is a survey questionnaire using a five-point Likert scale ranging from
‘strongly disagree’ to ‘strongly agree’ [31, 32]. In data analysis process, descriptive analysis was conducted
to produce demographic information to answer the objectives of the first study and clarify the next inferential
findings. Meanwhile, inferential mode is done using PLS-SEM with SmartPLS 2.0 to assess measurement
and structural models. Statistical software is used due to strong exploration and prediction with small size
of sample sizes [33, 34]. The assessment of measurement model covers indicator reliability, internal
consistency reliability, convergent validity, and evaluation of discriminant validity to test the external model.
In addition, the assessment of structural model consists of path coefficient (β), determinant coefficient (𝑅2
),
t-tes, effect size (𝑓2
), predictive relevance (𝑄2
), and relative impact (𝑞2
) checks to evaluate the inside factor.
3. THE ANALYSIS RESULT
3.1. The result of the descriptive analysis
The information of the survey result is presented in Table 2, and the analysis results illustrate that
61% of respondents stated that IT implementation in HEI aims to meet operational requirements, 17% said to
fulfill managerial requirements and 22% revealed for strategic requirements. The other result stated that 85%
of HEI have IT implementation strategic planning. The analysis result of IT implementation architecture
ownership in HEI reached 59%, while the analysis results of IT implementation roadmap ownership
reached 52%.
6. TELKOMNIKA Telecommun Comput El Control
Readiness measurement of IT implementation in Higher Education Institutions… (Mohamad Irfan)
865
Table 2. The IT implementation profile
Measure Item %
Goal IT implementation Operational requirements 61%
Managerial requirements 17%
Strategic requirements 22%
Ownership of Strategic Plans for IT Implementation Available 85%
Not Available 15%
Ownership of Architecture IT Implementation Available 59%
Not Available 41%
Ownership of Roadmap IT Implementation Available 52%
Not Available 48%
3.2. The result of the inferential analysis table
Inferential statistics use a random sample of data taken from a population to describe and make
conclusions about a population. The results of the inferential analysis are presented in Table 3. Preliminary
Discriminant Validity is testing performed in two ways, namely by looking at the value of cross loading or
cross loading Fornell-Lacker's, by comparing the value of the root of AVE (top values in the table) where
the value must be greater than the correlation between the constructs to construct another. Information about
Preliminary Discriminant Validity is presented in Table 4.
Table 3. Results of the measurement model assessments
Ind OL
Cross Loading
AVE CR
INC ITC ITIR PCS PPL SVQ TCH
INC1 0.943 0.943 0.604 0.805 0.807 0.871 0.879 0.823
0.885 0.959
INC2 0.951 0.951 0.596 0.797 0.788 0.867 0.851 0.861
INC3*
INC4 0.929 0.929 0.584 0.766 0.801 0.819 0.818 0.826
ITC1 0.919 0.602 0.919 0.586 0.570 0.605 0.605 0.630
0.867 0.979
ITC2 0.948 0.578 0.948 0.609 0.565 0.574 0.577 0.591
ITC3 0.899 0.546 0.899 0.524 0.486 0.539 0.529 0.528
ITC4 0.924 0.551 0.924 0.588 0.553 0.564 0.595 0.576
ITC5 0.963 0.606 0.963 0.640 0.555 0.604 0.593 0.633
ITC6 0.943 0.612 0.943 0.613 0.518 0.588 0.588 0.602
ITC7 0.922 0.622 0.922 0.632 0.538 0.585 0.595 0.607
ITIR1 0.933 0.821 0.604 0.933 0.840 0.887 0.882 0.846
0.862 0.969
ITIR2 0.885 0.682 0.567 0.885 0.752 0.761 0.798 0.789
ITIR3 0.947 0.775 0.643 0.947 0.811 0.814 0.808 0.812
ITIR4 0.947 0.811 0.605 0.947 0.821 0.850 0.818 0.825
ITIR5 0.928 0.801 0.572 0.928 0.797 0.832 0.802 0.814
PCS1 0.896 0.738 0.496 0.756 0.896 0.805 0.759 0.779
0.830 0.951
PCS2*
PCS3 0.932 0.799 0.525 0.801 0.932 0.794 0.816 0.823
PCS4 0.918 0.764 0.522 0.787 0.918 0.797 0.832 0.810
PCS5 0.899 0.791 0.574 0.816 0.899 0.809 0.786 0.810
PPL1 0.909 0.804 0.571 0.825 0.820 0.909 0.850 0.853
0.854 0.967
PPL2 0.927 0.848 0.589 0.823 0.799 0.927 0.846 0.851
PPL3 0.944 0.859 0.550 0.821 0.798 0.944 0.864 0.833
PPL4 0.906 0.800 0.587 0.824 0.816 0.906 0.806 0.809
PPL5 0.935 0.872 0.584 0.837 0.828 0.935 0.845 0.870
SVQ1 0.925 0.803 0.561 0.813 0.794 0.833 0.925 0.832
0.851 0.981
SVQ2 0.923 0.815 0.572 0.802 0.830 0.830 0.923 0.825
SVQ3 0.934 0.863 0.556 0.804 0.783 0.846 0.934 0.862
SVQ4 0.939 0.847 0.589 0.833 0.858 0.853 0.939 0.864
SVQ5 0.922 0.824 0.561 0.805 0.793 0.820 0.922 0.812
SVQ6 0.947 0.886 0.620 0.848 0.865 0.884 0.947 0.874
SVQ7 0.899 0.808 0.559 0.792 0.784 0.841 0.899 0.819
SVQ8 0.920 0.821 0.625 0.837 0.787 0.849 0.920 0.828
SVQ9 0.892 0.824 0.559 0.819 0.776 0.810 0.892 0.812
TCH1 0.924 0.839 0.606 0.844 0.827 0.871 0.814 0.924
0,867 0.970
TCH2 0.929 0.830 0.620 0.793 0.822 0.820 0.801 0.929
TCH3 0.961 0.871 0.590 0.849 0.855 0.892 0.878 0.961
TCH4 0.917 0.788 0.578 0.808 0.819 0.831 0.854 0.917
TCH5 0.925 0.808 0.590 0.804 0.792 0.833 0.877 0.925
7. ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 2, April 2020: 860 - 869
866
Table 4. Preliminary discriminant validity results
INC ITC ITIR PCS PPL SVQ TCH
INC 0.911
ITC 0.641 0.931
ITIR 0.835 0.644 0.928
PCS 0.869 0.572 0.854 0.893
PPL 0.914 0.623 0.894 0.878 0.924
SVQ 0.909 0.627 0.886 0.877 0.912 0.922
TCH 0.894 0.641 0.881 0.879 0.913 0.907 0.931
3.2.1. The result of the measurement model assessments
The outlined information from this assessment demonstrates statistically that the external model
shows good psychometric properties with two refusal indicators (INC3 and PCS2). This means that
the assessment can proceed to the assessment of structural model.
- Testing Individual Item Reliability, that based on testing values on the outer loading, all values have met
the threshold value of 0.7, so that there are no indicators deleted, in this case.
- Testing Internal Consistency Reliability, this test is done by looking at the composite reliability (CR) value
with a threshold above 0.7. Testing results show that all CR values of all variables meet the requirements
and are valid to be used in the research model.
- Convergent Validity Test, this test is done by looking at the average variance extracted (AVE) value with a
threshold value of 0.5. The test results in which all AVE values of all variables have met the requirements
and are valid for use in the research model.
- Testing Discriminant Validity, it is tested through cross loading comparison analysis with AVE squared
value, as follows: there is still found a smaller AVE root value compared to the correlation between other
variables, in the next step there are removed some indicators. After several tests, there are 2 (two) deleted
indicators, namely: PCS2 and INC3, with each value of 0.846 and 0.858. By removing these two indicators,
it is necessary to re-examine internal consistency reliability, composite reliability (CR), convergent
validity, and discriminant validity.
3.2.2. The result of the structural model assessments
In the analysis phase of the structural model, there are six stages of testing, namely testing path
coefficient (β), coefficient of determination (R2
), t-test using the bootstrapping method, effect size (𝑓2
),
predictive relevance (𝑄2
), and relative impact (𝑞2
).
- Testing path coefficient (β), it is done by looking at a threshold value above 0.1 where the path can be
declared to have an influence on the model if the result of the path coefficient test value is above 0.1.
The results of the 14 pathways in the research model, 9 of these pathways have significant influence
and 5 paths have no significant influence as shown in Figure 5 and Table 5.
- Testing coefficient of determination (R2
), this test is intended to explain the variance of each endogenous
variable target with a measurement standard of around 0.670 which is expressed as accurate (A), around
0.333 is expressed as moderate (M) and 0.190 or below indicates weak variant level (L) as shown
in Table 5.
- Testing t-test, it is carried out using the bootstrapping method on SmartPLS 3.0, and the received value on
the t-test is above 1.96. The test result shows that from a total of 14 hypotheses there are 6 accepted
hypotheses and 8 rejected hypotheses as shown in the above table as shown in Figure 5 and Table 5.
- Testing effect size (𝑓2
), this test is done to predict the influence of certain variables. The threshold values
are 0.02 for a small effect (k), 0.15 for an intermediate effect (m), and 0.35 for a big effect (b) as shown
in Table 5.
- Testing predictive relevance (𝑄2
), which is conducted through blindfolding method to explain that certain
variables used in the model have predictive relationship with other variables in the model with a threshold
value above zero (0). The testing results reveals that the (𝑄2
) value of all variables above zero (0) indicates
predictive linkages as shown in Table 5.
- Testing relative impact(𝑞2
), which carried out by blindfolding method. This measurement is done to
measure the relative influence of a predictive link between a variable and other variables. The threshold
used is equal to f2
which is around 0.02 for a small effect, 0.15 for a middle effect, and 0.35 for a big effect
as shown in Table 5.
8. TELKOMNIKA Telecommun Comput El Control
Readiness measurement of IT implementation in Higher Education Institutions… (Mohamad Irfan)
867
Table 5. The structural model assessments hypothesis
Hypothesis
β t-test R2
f2
Q2
q2 Analysis
Hip Path β t-test R2
f2
H1 INC -> ITIR -0.105 0.845 0.852 0.006 0.653 0.003 Insig R a S
H2 INC -> PCS 0.801 10.087 0.724 1.396 0.550 0.684 Sig A a L
H3 INC -> PPL 0.852 16.366 0.825 2.490 0.637 0.978 Sig A a L
H4 INC -> SVQ 0.844 15.992 0.820 2.381 0.624 0.911 Sig A a L
H5 INC -> TCH 0.806 15.133 0.800 1.956 0.626 0.857 Sig A a L
H6 ITC -> ITIR 0.098 1.745 0.852 0.033 0.653 0.011 Insig R a S
H7 ITC -> PCS 0.075 0.867 0.724 0.013 0.550 -0.003 Insig R a S
H8 ITC -> PPL 0.084 1.593 0.825 0.022 0.637 0.007 Insig R a S
H9 ITC -> SVQ 0.093 1.372 0.820 0.031 0.624 0.013 Insig R a S
H10 ITC -> TCH 0.131 2.262 0.800 0.052 0.626 0.023 Sig A a S
H11 PCS -> ITIR 0.225 1.708 0.852 0.060 0.653 0.017 Sig R a S
H12 PPL -> ITIR 0.347 2.689 0.852 0.087 0.653 0.029 Sig A a S
H13 SVQ -> ITIR 0.265 1.806 0.852 0.053 0.653 0.017 Sig R a S
H14 TCH -> ITIR 0.155 1.280 0.852 0.020 0.653 0.005 Sig R a S
Notes: sig: significant; insig: insignificant; R: rejected; A: accepted; a: accurate; S: small; L: large
Figure 5. Results of the SmartPLS Analysis
4. DISCUSSION
First of all, the descriptive analysis reveals that IT need is operationally more than 60%, and even
the majority of respondents already have IT development strategic plan (85%). As matter of fact, planning
has come to the technical stage, in which IT implementation architecture reaches 59%, while the ownership
of IT implementation roadmap reaches 52%. Strategically and operationally, These phenomenon is not
surprise when referring to HEI’s needs for IT. This is consistently in line with IT planning strategic theory
which shows that the achievement of HEI’s vision can be realized through IT implementation [35]–[37].
Second, in spite of the measurement model assessments represented statistically the good
psychometric properties, with the indication that there are only two rejected indicators, namely INC3 and
PCS2. It should be noted that the indicator rejection affects the created model. Therefore, it is necessary to
develop instruments so that the data collected does not have biased information [38], in addition, it is
necessary to consider the knowledge and environment of the respondents, because they can affect the results
of the questionnaire too [39], [40]. So that, it is recommended to focus and minimize this problem in
9. ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 2, April 2020: 860 - 869
868
subsequent research by increasing sample size and analyzing systematic errors by attention to research
design, participants and data collection.
Third, the similar tendency was found across the results of the four structural model assessments
(𝛽, 𝑡 − 𝑡𝑒𝑠, 𝑅2
, 𝑞2
). The five of the 14 paths had statistically insignificant effects in β assessment and
rejected in t-test examination, small predictive influences (𝑓2
) and small relative impact of the predictive
relevance (𝑞2
), especially related to INC and PCS variables. In the case of INC and PCS, there are
inconsistencies with the procession and causal concepts of the readiness and ZEN framework as the basis for
model development. In addition, PCS cases are not consistent with e-readiness theory [41] so that it is not
surprising to note that the majority of respondents (85%) stated that IT has been used operationally more than
61%. This inconsistency may be related to the development of a model or cultural problem that applies in the
institution being sampled.
5. CONCLUSION
The research finding shows research sustainability from the previous studies until the pilot study.
Readiness study is conducted to develop a framework and conceptual model, and to validate the model
quantitatively. In particular, this pilot study elaborates the status of IT implementation readiness in HEI
and the factors that influence it. In addition, the result of this pilot study can be used to complete the model;
by paying attention to the research design, participant, data collection and data measurement, data analysis
and publication of the analysis results.
Moreover, there are two limitations that researchers must keep in their minds. First, research finding
cannot be generalized to other institutions because data is influenced by the condition of an institution being
studied. Second, although the involvement of stakeholders in IT implementation is intended to obtain
the completeness of the research results in connection with key information aspects, the stakeholder’s
involvement of each institution may also be somewhat different regarding certain issues presented in
the survey instrument. Therefore, the subjective conditions of institution are out of control for possible
analysis results in this study.
In addition, there are two main important points in this study. First, the status of IT implementation
readiness in HEI can take to be one of the practical consideration points for sampled institutions policy
makers regarding the availability of strategic planning and PCS issues to ensure that IT implementation can
be carried out properly and correctly. Second, the use of INC can be rejected with respect to insignificant
pathways, hypotheses rejection, and influences that have little impact and predictive relevance in future
studies. Thus, further research can adopt this these findings, by reconsidering the limitations of this study.
ACKNOWLEDGEMENTS
Authors wishing to acknowledge Research and Publication Centre of UIN Sunan Gunung Djati
Bandung that supports and funds this research publication.
REFERENCES
[1] Mms. Fauziah, S.Kom, Pengantar Teknologi Informasi. Bandung: Muara Indah, 2010.
[2] R. E. Indrajit, “PERANAN STRATEGIS TIK DALAM DUNIA PENDIDIKAN,” 2011.
[3] R. E. Indrajit, “Renstra tik,” Seri 999 E-Artikel Sist. dan Teknol. Inf., no. C, 2012.
[4] M. Ali and F. Wahid, “Permasalahan Implementasi Sistem Informasi Di Perguruan Tinggi Swasta,” J. Ilm. Teknol.
Sist. Inf., vol. 2, no. 1, pp. 17–21, 2016.
[5] A. R. Aradea, Husni Mubarok, “Blueprint Teknologi Informasi Untuk Mengintegrasikan Sistem Informasi
Perguruan Tinggi,” no. APRIL 2013, pp. 1–6, 2010.
[6] G.-G. Lee and B. Rong-Ji, “Organizational mechanisms for successful IS/IT strategic planning in the digital era,”
Manag. Decis., vol. 41, no. 1/2, pp. 32–42, 2003.
[7] H. Dwi Apriyanto, Rudi. and Prihantono Putro, “Tingkat kegagalan dan keberhasilan proyek sistem informasi di
indonesia,” Semin. Nas. Teknol. Inf. dan Komun. 2018 (SENTIKA 2018), vol. 2018, no. Sentika, pp. 23–24, 2018.
[8] A. Subiyakto, A. R. Ahlan, M. Kartiwi, and S. J. Putra, “Measurement of the information system project success of
the higher education institutions in Indonesia: A pilot study,” Int. J. Bus. Inf. Syst., vol. 23, no. 2, 2016.
[9] M. Irfan, S. J. Putra, and C. N. Alam, “E-Readiness for ICT Implementation of the Higher Education Institutions in
the Indonesian,” 6th Int. Conf. Cyber IT Serv. Manag. (CITSM 2018), no. CITSM, pp. 3–8, 2018.
[10] A. Molla and P. S. Licker, “Perceived E-Readiness Factors in E-Commerce Adoption: An Empirical Investigation
in a Developing Country,” Int. J. Electron. Commer., vol. 10, no. 1, pp. 83–110, 2005.
[11] A. Tarvid, Measuring the E-Readiness of Higher Education Institutions, vol. 6, no. 102. 2008.
[12] E. C. W. Lou and J. S. Goulding, “Organisational E-Readiness in the Built Environment : People , Process ,” 2008.
[13] M. Kashorda and T. M. Waema, “ICT Indicators in Higher Education : Towards an E-readiness Assessment
10. TELKOMNIKA Telecommun Comput El Control
Readiness measurement of IT implementation in Higher Education Institutions… (Mohamad Irfan)
869
Model,” Proc. reports 4th UbuntuNet Alliance Annu. Conf., pp. 57–76, 2011.
[14] H. Alaaraj and F. W. Ibrahim, “An Overview and Classification of E-Readiness Assessment Models,” Int. J. Sci.
Res. Publ., vol. 4, no. 12, pp. 1–5, 2014.
[15] Marcel, “A study of TESCA an Indonesia’ higher education e-readiness assessment model,” 2015 Int. Conf. Inf.
Technol. Syst. Innov. ICITSI 2015 - Proc., 2016.
[16] M. Kiula, E. Waiganjo, and J. Kihoro, “Novel E-Readiness Accession in Higher Education Institutions in Kenya,”
Int. J. Manag. Stud. Res., vol. 5, no. 6, pp. 101–111, 2017.
[17] Sugiyono, “Metoder Penelitian Evaluasi,” Alfabeta, 2018.
[18] J. W. Creswell, Research Design: Qualitative, Quantitative, and Mixed Methods Approaches. 2013.
[19] M. P. J. D. Sinko, “Factors Influencing Implementation of ICT in Higher Education,” Springer, 2002.
[20] C. Machado, “Developing an e-readiness model for higher education institutions: Results of a focus group study,”
Br. J. Educ. Technol., vol. 38, no. 1, pp. 72–82, 2007.
[21] M. Irfan, S. J. Putra, C. N. Alam, A. Subiyakto, and A. Wahana, “Readiness factors for information system
strategic planning among universities in developing countries: A systematic review,” in Journal of Physics:
Conference Series, vol. 978, no. 1, 2018.
[22] R. A. Dos Reis and M. Do Carmo Duarte Freitas, “Critical factors on information technology acceptance and use:
An analysis on small and medium Brazilian clothing industries,” Procedia Comput. Sci., vol. 31, no. Itqm,
pp. 105–114, 2014.
[23] A. Subiyakto, A. R. Ahlan, M. Kartiwi, S. J. Putra, and Y. Durachman, “The user satisfaction perspectives of
the information system projects,” Indones. J. Electr. Eng. Comput. Sci., vol. 4, no. 1, pp. 215–223, 2016.
[24] A. Wahyudin and Z. A. Hasibuan, “Research Classification in Strategic Information System Planning
Development: A Critical Review.”
[25] F. Wabwoba, S. Omuterema, G. Wanyembi, and K. Omieno, “Green ICT Readiness Model for Developing
Economies: Case of Kenya,” Int. J. Adv. Comput. Sci. Appl., vol. 4, no. 1, pp. 51–65, 2013.
[26] R. Kurdi, A. Taleb-Bendiab, M. Randles, and M. Taylor, “E-Government information systems and cloud
computing (Readiness and analysis),” Proc. - 4th Int. Conf. Dev. eSystems Eng. DeSE 2011, pp. 404–409, 2011.
[27] Marcel, “A conceptual green-ICT implementation model based-on ZEN and G-readiness framework,” 2016 Int.
Conf. Informatics Comput. ICIC 2016, no. Icic, pp. 99–104, 2017.
[28] M. Irfan, J. P. Syopiansyah, and A. R. Muhammad, “The Readiness Model of Information Technology
Implementation among Universities in Indonesia,” IOP Conf. Ser. Mater. Sci. Eng., 2018.
[29] N. A. Ismail, R. H. R. M. Ali, R. M. Saat, and H. M. Hsbollah, “Strategic information systems planning in
Malaysian public universities,” Campus-Wide Inf. Syst., vol. 24, no. 5, pp. 331–341, 2007.
[30] V. Venkatesh and S. A. Brown, “Research Essay B Ridging The Q Ualitative –Q Uantitative D Ivide : Guidelines
For C Onducting M Ixed M Ethods,” MIS Q., vol. X, no. X, pp. 1–34, 2013.
[31] A. Rind, “Some Whys and Hows of Experiments in Human–Computer Interaction,” Found. Trends®
Human–Computer Interact., vol. 5, no. 4, pp. 299–373, 2013.
[32] H. S. H. Gombachika and G. Khangamwa, “ICT readiness and acceptance among TEVT students in University of
Malawi,” Campus-Wide Inf. Syst., vol. 30, no. 1, pp. 35–43, 2012.
[33] C. M. R. and R. R. S. Jorg Henseler, “Advances in International Marketing,” Adv. Int. Mark., vol. 20, no. 2009,
pp. 361–388, 1999.
[34] K. K.-K. Wong, “Partial Least Squares Structural Equation Modeling (PLS-SEM) Techniques Using SmartPLS,”
Mark. Bull., vol. 24, no. 1, pp. 1–32, 2013.
[35] H. H. Md Hafiz Selamat, Mohd Adam Suhaimiβ, “Integrating Strategic Information Security with Strategic
Information Systems Planning (SISP) Md Hafiz Selamat,” pp. 1–16, 2015.
[36] S. Rogerson and C. Fidler, “Strategic Information Systems Planning : Its Adoption and Use,” 2006.
[37] A. Amrollahi, A. H. Ghapanchi, and A. Talaei-Khoei, “Three decades of research on strategic information system
plan development,” Commun. Assoc. Inf. Syst., vol. 34, no. 1, pp. 1439–1467, 2014.
[38] H. Malone, H. Nicholl, and C. Tracey, “Awareness and minimisation of systematic bias in research,” Br. J. Nurs.,
vol. 23, no. 5, pp. 279–282, 2014.
[39] J. Smith and H. Noble, “Bias in research,” Evid. Based Nurs., vol. 17, no. 4, pp. 100–101, 2014.
[40] D. Yuniarto, M. A. Helmiawan, and E. Firmansyah, “Technology Acceptance in Augmented Reality,” J. Online
Inform., vol. 3, no. 1, p. 10, 2018.
[41] A. Wahyudin and Z. A. Hasibuan, “Research classification in strategic information system planning development:
A critical review,” in Proceedings - 2015 International Conference on Science in Information Technology:
Big Data Spectrum for Future Information Economy, ICSITech 2015, pp. 287–292, 2015.