ORDER |
PAPER ID |
AUTHORS |
PAPER TITLE |
TOPIC / TRACK |
1 |
1 |
Nedal Nwasra, Nurlida Basir and Mohd Fadzli Marhusin |
Quality Aspects Priorities of Malaysian Universities Websites from End-Users and Decision-Makers Perspectives Based on QinUEM |
Information Systems Management (ISM) |
2 |
3 |
Lim Kian Long, Wan Mohd Nazmee Wan Zainon, Lim Chien Hui and Gim Yeong Fook |
A Study on the Effectiveness of Tree-maps as Tree Visualization Techniques |
Data Engineering and Business Intelligence (DEBI) |
3 |
5 |
Narumon Sriratanaviriyakul and Jamal El-Den |
Motivational Factors for Knowledge Sharing using Pedagogical Discussion Cases: Students, Educators, and Environmental Factors |
Information Systems Management (ISM) |
4 |
6 |
Fatemeh Mina Torabi and Jamal El-Den |
The impact of Knowledge Management on Organizational Productivity: A Case Study; Koosar Bank of Iran |
Information Systems Management (ISM) |
5 |
7 |
Kamarul Faizal Hashim and Nawar Abbood Fadhil |
Engaging with Customer using Social Media Platform: A Case Study of Malaysia Hotels |
Data Acquisition and Information Dissemination (DAID) |
6 |
9 |
Alhassan Adamu and Wan Mohd Nazmee Wan Zainon |
Multiview Similarity Assessment Techniques of UML Diagrams |
Information Systems Management (ISM) |
7 |
11 |
Baydoun Ali and El-Den Jamal |
A Framework for Knowledge Based Software Service Supply Chain (SSSC): A Comparative Analysis with Existing Frameworks |
Enterprise Systems (ES) |
8 |
14 |
Mahendra Adhi Nugroho and M. Andryzal Fajar |
Effects of Technology Readiness Towards Acceptance of Mandatory Web-Based Attendance System |
Information Systems Management (ISM) |
9 |
15 |
Mahendra Adhi Nugroho, Arief Zuliyanto Susilo, M. Andryzal Fajar and Diana Rahmawati |
Exploratory Study of SMEs Technology Adoption Readiness Factors |
Information Systems Management (ISM) |
10 |
17 |
Masrina Akmal Salleh, Mahadi Bahari and Nor Hidayati Zakaria |
An Overview of Software Functionality Service: A Systematic Literature Review |
Information Systems Management (ISM) |
11 |
20 |
Wan Safra Diyana Wan Abdul Ghani, Nik Zulkarnaen Khidzir, Tse Guan Tan and Mohammad Ismail |
The influences of Task-Technology Fit, Attitude, Subjective Norm and Perceived Behavioral Control on Textile Cyberpreneurâs Intention to Adopt Cloud-based m-Retail Application |
Information Systems Management (ISM) |
12 |
21 |
Dedi Iskandar Inan and Ghassan Beydoun |
Disaster Knowledge Management Analysis Framework with Agent-Based Models: Design Science Research Approach |
Data Engineering and Business Intelligence (DEBI) |
13 |
22 |
Rendan Liu and Ayoung Suh |
Self-Branding on Social Media: An Analysis of Style Bloggers on Instagram |
Data Acquisition and Information Dissemination (DAID) |
14 |
24 |
Noor Azizah Mohamadali and Nur Faizah Ab Aziz |
The Organization Factors as Barriers for Sustainable Health Information Systems (HIS) – A Review |
Information Systems Management (ISM) |
15 |
25 |
Manik Hapsara, Ahmed Imranand Timothy Turner |
Beyond Organizational Motives of e-Government Adoption: The Case of e-Voting Initiative in Indonesian Villages |
Information Systems Management (ISM) |
16 |
26 |
Saad Albishi, Ben Soh, Azmat Ullah and Fahad Algarni |
Challenges and Solutions for Applications and Technologies in the Internet of Things |
IT Infrastructure and Security (ITIS) |
17 |
27 |
Noor Azizah Mohamadali and Nur Faizah Ab Aziz |
The Technology Factors Barriers for Sustainable Health Information Systems (HIS) â A Review |
Information Systems Management (ISM) |
18 |
28 |
Adhi Setyo Santoso and Liza Agustina Maureen Nelloh |
Factors of Satisfaction and Intention to Use Peer-to-Peer Online Transportation: a Replication Study |
Information Systems Management (ISM) |
19 |
29 |
Fajara Kurniawan Nasrullah Hariyadi, Nur Aini Rakhmawati, Abi Nubli Abadi, Muhammad Zuhri and Wisnu Tri Sugiyanto |
Indonesia Government Information Completeness on the Web |
Data Acquisition and Information Dissemination (DAID) |
20 |
30 |
Hatma Suryotrisongko, Reginia Cindy Kusuma and Rv Hari Ginardi |
Four-Hospitality : Friendly Smart City Design for Disability |
IT Infrastructure and Security (ITIS) |
21 |
31 |
Ammar Amran, Zarul Fitri Zaaba, Manmeet Kaur Mahinderjit Singh and Abdalla Wasef Marashdih |
Usable Security: Revealing End-users Comprehension on Security Warnings |
IT Infrastructure and Security (ITIS) |
22 |
36 |
Aritra Rudra and Parag Kumar Guha Thakurta |
Node Level Tuning for QoS Aware Routing in Wireless Cellular Networks |
IT Infrastructure and Security (ITIS) |
23 |
37 |
Mahendrawathi Er, Shania Olivia Zayyin and Firman Jati Pamungkas |
ERP Post Implementation Review with Process Mining: A Case Study of Agricultural Chemicals Company Procurement Process |
Enterprise Systems (ES) |
24 |
38 |
Geetha Nadarajan, Jamil Bojei and Haliyana Khalid |
Influence of Negative eWOM on Consumerâs Intention to Switch Mobile Service Provider |
Information Systems Management (ISM) |
25 |
40 |
Ari Kusyanti, Dita Rahma Puspitasari, Harin Puspa Ayu Catherina and Yustiyana April Lia Sari |
Information Privacy Concerns on Teens as Facebook Users in Indonesia |
IT Infrastructure and Security (ITIS) |
26 |
45 |
Mohd Talmizie Amron, Dr Roslina Ibrahim and Dr Suriayati Chuprat |
A Review of Factors of Cloud Computing Acceptance Factors |
IT Infrastructure and Security (ITIS) |
27 |
46 |
Yeow Pooi Mun, Haliyana Khalid and Devika Nadarajah |
Millennialsâ Perception on Mobile Payment Services in Malaysia |
Information Systems Management (ISM) |
28 |
47 |
Melisa Helingo, Betty Purwandari, Riri Satria and Iis Solichah |
The Use of Analytic Hierarchy Process (AHP) for Software Development Method Selection: A Perspective of e-Government in Indonesia |
Information Systems Management (ISM) |
29 |
49 |
Renny Sari Dewi, Sholiq and Apol Pribadi Subriadi |
A Modification Complexity Factor in Function Points Method for Software Cost Estimation Towards Public Service Application |
Information Systems Management (ISM) |
30 |
52 |
Arif Ridho Lubis, Ferry Fachrizal and Muharman Lubis |
The Effect of Social Media to Cultural Homecoming Tradition of Computer Programs Students in Medan |
Information Systems Management (ISM) |
31 |
56 |
Riska Asriana Sutrisnowati, Bernardo Nugroho Yahya, Hyerim Bae, Iq Reviessay Pulshashi and Taufik Nur Adi |
Scalable Indexing Algorithm for Multi-dimensional Time-gap Analysis with Distributed Computing |
Enterprise Systems (ES) |
32 |
58 |
Abdalla Wasef Marashdih and Zarul Fitri Zaaba |
Cross Site Scripting: Removing Approaches in Web Application |
IT Infrastructure and Security (ITIS) |
33 |
59 |
Anisah Herdiyanti, Nanda Restanena Listyawati and Hanim Maria Astuti |
Understanding the Total Value of Information Technology Services from the Perspective of Students and Academic Staffs |
Information Systems Management (ISM) |
34 |
60 |
Khairun Ashikin Ismail, Manmeet Mahinderjit Singh, Norlia Mustaffa, Pantea Keikhosrokiani and Zakiah Zulkefli |
Security Strategies for Hindering Watering Hole Cyber Crime Attack |
IT Infrastructure and Security (ITIS) |
35 |
61 |
Wawan Gunawan, Hari Ginardi and Septiawan Rosetya Wardana |
WebGIS for Asset Management of Land and Building of Madiun City Government |
Information Systems Management (ISM) |
36 |
62 |
Satrio Baskoro Yudhoatmojo and Muhammad Arvin Samuar |
Community Detection on Citation Network of DBLP Data Sample Set using LinkRank Algorithm |
Data Acquisition and Information Dissemination (DAID) |
37 |
64 |
Salama Mostafa, Aida Mustapha, Mohd Sharifuddin Ahmad and Moamin A. Mahmoud |
An Adjustable Autonomy Management Module for Multi-agent Systems |
Data Engineering and Business Intelligence (DEBI) |
38 |
65 |
Zakiah Zulkefli, Manmeet Mahinderjit Singh, Azizul Rahman Mohd Shariff and Azman Samsudin |
Typosquat Cyber Crime Attack Detection via Smartphone |
IT Infrastructure and Security (ITIS) |
39 |
66 |
Handaru Jati and Dhanapal Durai Dominic |
A New Approach of Indonesian University Webometrics Ranking Using Entropy and PROMETHEE II |
Information Systems Management (ISM) |
40 |
67 |
Tiara Izrinda Jafni, Mahadi Bahari, Waidah Ismail and Abduljalil Radman |
Understanding the Implementation of Telerehabilitation at Pre-Implementation Stage: A Systematic Literature Review |
Information Systems Management (ISM) |
41 |
68 |
Alifia Puspaningrum and Riyanarto Sarno |
A Hybrid Cuckoo Optimization and Harmony Search Algorithm for Software Cost Estimation |
Information Systems Management (ISM) |
42 |
69 |
Aris Tjahyanto |
The Utilization of Filter on Object-based Opinion Mining in Tourism Product Reviews |
Data Acquisition and Information Dissemination (DAID) |
43 |
71 |
Riyanarto Sarno and Kelly R. Sungkono |
Coupled Hidden Markov Model for Process Discovery of Non-Free Choice and Invisible Prime Tasks |
Data Engineering and Business Intelligence (DEBI) |
44 |
74 |
Sholiq and Renny Sari Dewi |
A Comparative Study of Software Development Size Estimation Method: UCPabc vs Function Points, Which One is Closest to the Actual Effort? |
Information Systems Management (ISM) |
45 |
76 |
Wiwik Anggraeni, Rafika Nurmasari, Edwin Riksakomara, Febriliyan Samopa, Radityo Prasetyanto Wibowo, Lulus Condro T. and Pujiadi |
Regression Approach with Natural Logarithmic Transformation In Response Variables for Predicting Number of Dengue Fever Incidents Case Study : Malang Regency, Indonesia |
Data Engineering and Business Intelligence (DEBI) |
46 |
78 |
Bambang Setiawan, Supeno Djanali and Tohari Ahmad |
A Study on Intrusion Detection Using Centroid-Based Classification |
IT Infrastructure and Security (ITIS) |
47 |
82 |
Muhammad Asep Subandri and Riyanarto Sarno |
Cyclometer for Determining Product Complexity Cost Driver in COCOMO II |
Information Systems Management (ISM) |
48 |
84 |
Rangaballav Pradhan, Souvik Rakshit and Tanmay De |
Performance Evaluation of RPL under Mobility for VANETs |
IT Infrastructure and Security (ITIS) |
49 |
85 |
Lilia Quentara and Erma Suryani |
The Development of Photovoltaic Power Plant for Electricity Demand Fulfillment in Remote Regional of Madura Island using System Dynamics Model |
Enterprise Systems (ES) |
50 |
86 |
Subhendu Barat, Basuki Nath Keshri and Tanmay De |
A Cost Function based Multi-objective Multicast Communication over WDM Optical Fiber Mesh Network |
Data Engineering and Business Intelligence (DEBI) |
51 |
88 |
Shilvia Silalahi, Putu Handayani and Qorib Munajat |
Service Quality Analysis for Online Transportation Services: Case Study of Gojek |
Information Systems Management (ISM) |
52 |
89 |
Saed Tarapiah and Shadi Atalla |
Analysis the Performance of Vehicles Ad Hoc Network |
IT Infrastructure and Security (ITIS) |
53 |
90 |
Elin Cahyaningsih, Dana Indra Sensuse and Handrie Noprisson |
Multi Methods for Knowledge Management Strategy Roadmap of Government Human Capital Management |
Information Systems Management (ISM) |
54 |
91 |
Fatimah Azzahro, Putu Wuri Handayani and Rizky Septiani |
Factors that Affects Behavioral Intention in Online Transportation Service: Case study of GO-JEK |
Information Systems Management (ISM) |
55 |
92 |
I Putu Eka N. Kencana, Ida Harini and Kadek Mayuliana |
The Performance of Ant System in Solving Multi Traveling Salesmen Problem |
Data Acquisition and Information Dissemination (DAID) |
56 |
93 |
Feby Artwodini Muqtadiroh, Hanim Maria Astuti dan Eko Wahyu Tyas Darmaningrat |
Usability Evaluation to Enhance Software Quality of Cultural Conservation System Based on Nielsen Model (WikiBudaya) |
Information Systems Management (ISM) |
57 |
94 |
Fayez Alqahtani |
The Development of Information Security Policy (ISP): A Case Study Approach |
IT Infrastructure and Security (ITIS) |
58 |
99 |
Muhammad Rifki Shihab, Nina Meilatinova, Achmad Nizar Hidayanto and Herkules |
Determinants of CAATT acceptance: Insights from public accounting firms in Indonesia |
Information Systems Management (ISM) |
59 |
101 |
Afira Putri Ghaisani, Putu Wuri Handayani and Qorib Munajat |
Usersâ Motivation in Sharing Information on Social Media |
Information Systems Management (ISM) |
60 |
102 |
Totok R. Biyanto, Irawan Sonny, Henokh Y. Fibrianto, Matradji Matradji and Ahmad Hasinur Rahman |
Killer Whale Algorithm: An Algorithm Inspired by the Life of Killer Whale |
Data Engineering and Business Intelligence (DEBI) |
61 |
103 |
Paul Jr. Bokingkito and Orven Llantos |
Design and Implementation of Real-Time Mobile-based Water Temperature Monitoring System |
IT Infrastructure and Security (ITIS) |
62 |
104 |
Anggar Riskinanto, Bayu Kelana and Deliar Rifda Hilmawan |
The Effect of Generation on Adopting E-Payment Technology |
Information Systems Management (ISM) |
63 |
107 |
Amna Shifia Nisafani |
Developing Salesperson Performance Indicators on Instant Messaging Platform |
Enterprise Systems (ES) |
64 |
108 |
Zaini Zainol, Hawa Ahmad and Dahlia Fernandez Mohd Farid Fernandez |
Public Sector Accountantsâ Opinion on Impact of a New Enterprise System |
Enterprise Systems (ES) |
65 |
109 |
Kristine Mae Galera and Orven Llantos |
Mobile Web Energy Monitoring System Using DFRduino Uno |
IT Infrastructure and Security (ITIS) |
66 |
110 |
Jaillah Mae Gesulga, Almarie Berjame, Kristelle Sheen Moquiala and Adrian Galido |
Barriers to Electronic Health Record System Implementation and Information Systems Resources: A Structured Review |
Information Systems Management (ISM) |
67 |
111 |
Totok R. Biyanto, Matradji Matradji, Ahmad Hasinur Rahman and Sonny Irawan |
Application of Killer Whale Algorithm in ASP EOR Optimization |
Data Engineering and Business Intelligence (DEBI) |
68 |
113 |
Jatmiko Wahyu Nugroho Joshua, I Putu Agus Swastika and Tri Oktin Windha Daniaty |
E-Government Integration through Implementation of GIS web-based on Community Health monitoring in Jembrana Regency, Bali |
Information Systems Management (ISM) |
69 |
114 |
Jerina Jean Ecleo and Adrian Galido |
Surveying LinkedIn Profiles of Data Scientists: The Case of the Philippines |
Data Acquisition and Information Dissemination (DAID) |
70 |
117 |
Elin Cahyaningsih, Dana Indra Sensuse, Aniati Murni Arymurthy and Wahyu Catur Wibowo |
NUSANTARA: A New Model of Knowledge Management in Government Human Capital Management |
Data Acquisition and Information Dissemination (DAID) |
71 |
118 |
Dyah Lestari Widaningrum, Isti Surjandari and Aniati Murni Arymurthy |
Spatial Data Utilization for Location Pattern Analysis |
Data Acquisition and Information Dissemination (DAID) |
72 |
119 |
Nur Aini Rakhmawati, Valliant Ferlyando, Febriliyan Samopa and Hanim Maria Astuti |
A Heuristic Evaluation for Assessing Registered Websites |
IT Infrastructure and Security (ITIS) |
73 |
120 |
Made Mira Diani, Tony Dwi Susanto and Irmasari Hafidz |
Measurement of User’s Intention to Use of City113 Application Based on Decomposed Theory of Planned Behavior (DTPB) in Surabaya City (Case Study: East Surabaya) |
Information Systems Management (ISM) |
74 |
121 |
Dina Chahyati |
Tracking People by Detection Using CNN Features |
Data Engineering and Business Intelligence (DEBI) |
75 |
123 |
Vania Beatrice Liwandouw and Alz Danny Wowor |
The Existence Of Cryptography: A Study On Instant Messaging |
IT Infrastructure and Security (ITIS) |
76 |
125 |
Ifrina Nuritha and Mahendrawathi Er |
Structural Similarity Measurement of Bussiness Process Model to Compare Performance of Heuristic and Inductive Miner Algorithm in Dealing with Noise |
Enterprise Systems (ES) |
77 |
126 |
Hanim Maria Astuti, Feby Artwodini Muqtadiroh and Eko Wahyu Tyas Darmaningrat |
Risks Assessment of Information Technology Processes Based on COBIT 5 Framework: A Case Study of ITS Service Desk |
Information Systems Management (ISM) |
78 |
127 |
Noor Akma Abu Bakar, Ainil Fahsha Nasrun Adil, Mazlina Abdul Majid, Khalid Adam and Younis M. Younis |
Decision Support Model for Vehicular Traffic Congestion using Discrete Event Simulation: A Case Study |
Enterprise Systems (ES) |
79 |
128 |
Satrio Priyambada, Mahendrawathi Er and Bernardo Nugroho Yahya |
Curriculum Assessment of Higher Educational Institution Using Aggregate Profile Clustering |
Enterprise Systems (ES) |
80 |
129 |
Dedy Rahman Wijaya, Riyanarto Sarno, Enny Zulaika and Shoffi Izza Sabila |
Development of Mobile Electronic Nose for Beef Quality Monitoring |
IT Infrastructure and Security (ITIS) |
81 |
132 |
Jockey Satria Wijaya, Wiwik Anggraenil, Ahmad Muklason, Faizal Mahananto, Edwin Riksakomara and Arif Djunaidy |
Advanced Traveler Information System: Itinerary Optimisation As an Orienteering Problem Using Iterative Local Search-Hill Climbing Algorithm |
Data Engineering and Business Intelligence (DEBI) |
82 |
133 |
Linda Salma Angreani, Annas Vijaya |
Designing an Effective Collaboration using Information Technology towards World Class University |
Information Systems Management (ISM) |
83 |
135 |
June Ling Ong Hui, Keng Hoon Gan and Wan Mohd Nazmee Wan Zainon |
Effects of Word Class and Text Position in Sentiment-based News Classification |
Data Acquisition and Information Dissemination (DAID) |
84 |
137 |
Mahyuddin K M Nasution and Noah S A |
Social Network Extraction Based on Web: 2. Comparison of Superficial Methods |
Data Acquisition and Information Dissemination (DAID) |
85 |
139 |
Shoffi Izza Sabilla, Riyanarto Sarno and Joko Siswantoro |
Estimating Gas Concentration using Artiï¬cal Neural Network for Electronic Nose |
Data Engineering and Business Intelligence (DEBI) |
86 |
141 |
Berlilana, Taqwa Hariguna, Nurfaizah |
Understanding of Public Behavioral Intent to Use e-Government Service: an Extended of Unified Theory of Acceptance Use of Technology and Information System Quality |
Information Systems Management (ISM) |
87 |
142 |
Muhammad Mustafa Hassan and Adnan Qureshi |
Disrupting the Rote Learning Loop: CS Majors Iterating over Learning Modules with an Adaptive Educational Hypermedia |
Enterprise Systems (ES) |
88 |
143 |
Leo Santoso |
Academic Data Warehouse with Big Data Technology for Higher Education |
Data Acquisition and Information Dissemination (DAID) |
89 |
144 |
Irmasari Hafidz, Alvin Rahman Kautsar, Tetha Valianta and Nur Aini Rakhmawati |
Shaping Individual Online Behavior Through Time Teenstagram: A Visualization for Instagram Time Dataset from Teen Users (Case Study in Surabaya, Indonesia) |
Data Acquisition and Information Dissemination (DAID) |
90 |
145 |
Febriliyan Samopa, Hanim Maria Astuti, Mahesti Ayu Lestari |
The Development of Work Instruction as a Solution to Handle IT Critical Incidents in Units within an Organization |
Information Systems Management (ISM) |