bulletin of social informatics theory and application issn 2614-0047 vol. 1, no. 1, march 2017, pp. 11-17 11 https://doi.org/10.31763/businta.v1i1.20 technology acceptance model for computer assisted personal interviewing margaretha ari anggorowati a,1,* a sekolah tinggi ilmu statistik, jakarta, indonesia 1 m.ari@stis.ac.id * corresponding author 1. introduction data quality directly and indirectly will influence government policy. badan pusat statistik (bps) indonesia conduct many census and survey in order to supply data for government and society. the most using of budget in census and survey for data collection and data entry. in traditional way, the data collection has been conducted using questioner/ paper and pencil interviewing (pepi). this method even though face to face interview, has some limitations: (1) pepi needs data entry that takes time and budgeting, (2) there is no standardization how the interviewer fill the form. it will makes double interpretation, (3) there is possibility for typo mistake. computer assisted personal interviewing (capi) was developed in order to be a solution for pepi limitation. capi is a new method for data collection that using computer technology such as notebook, laptop and pc tablet [1]–[3]. capi employing system data entry that embedded in such computer and it is used for directly interview. the aim of capi implementation is for faster process of data collection, data processing and for accurate data entry. capi also has impact in budget reduction of survey/census. it is important to employ information technology to support how data collection and data entry can automatically run. the important point for employing capi in survey or census is how user have a perception of this system and then have a willingness to use it. based on the theory of technology acceptance model [4] and a framework of diffusion technology [5], this research was conducted in order to answer these question: (1) how is tam’s model for capi stis, (2) what factors which influence the user acceptance of capi and (3) what kind of supporting to user in order to get the optimum capi implementation?. a r t i c l e i n f o a b s t r a c t article history received november 12, 2016 revised december 14, 2016 accepted january 11, 2017 data collection plays an important role in census and survey for statistical work. badan pusat statistik (bps) indonesia spent a lot of effort on human resources, budget, and time and complexity management in order to have valid data. computer assisted personal interviewing (capi) is a system which support data collection process more simple and efficient. it important to measure the user acceptance of capi in statistical work. this is an open access article under the cc–by-sa license. keywords tam sem capi http://creativecommons.org/licenses/by-sa/4.0/ http://creativecommons.org/licenses/by-sa/4.0/ 12 bulletin of social informatics theory and application issn 2614-0047 vol. 1, no. 1, march 2017, pp. 11-17 anggorowati (technology acceptance model for computer assisted personal interviewing) 2. theoritical framework 2.1. technology acceptance model (tam) technology acceptance model (tam) is a model which use for explain the willingness of user to accept and use a new or specific technology. tam was developed by fred davis in 1989. tam is expanded of theory of reaction action (tra) which developed by fisbein a n d azjen in 1975 [6]. tam has two main constructs, there are perceived ease of use (peu) and perceived usefulness (pu) [7]. in three decade tam was used for measuring various technology adoption. tam has been employing for many kind researches of technology. tam has been developed theoretically by expanding the variables or constructs. structural equation model (sem) is a statistical method which is employed in 64% validation of tam model [8]. it means that sem is powerful to explain relations among construct in tam structure. sem was employed to do statistical test for relation among constructs in tam model. 2.2. capi stis capi stis 2015 is a statics application it means that this application just specific for such survey. it is needed some hardcode (modify the coding program) if this application will be used for other survey. this application was developed specifically for an economic and social survey. sekolah tinggi ilmu statistik (stis) bps, employed capi in social and economic survey. the survey was conducted in 4 kabupaten: kabupaten indramayu and kota bandung. there are 108 user capi who use capi application in data collection. capi stis 2015 is a statics application. this system was the constructs of tam model was developed refer to tam bps [8]. there are perceived usefulness, perceived ease of use, training, output quality , and result demonstrability. 3. data and model structure data collection was conducted by questioners among users. the indicators of variables were put in likert scale in order to describe the user’s perception of capi system. according to validity and reliability of each external variables (constructs), tam capi structure of tam model is shown in fig. 1. the figure shows that there are 5 constructs in tam model. the main constructs in tam model are perceived ease of use and perceived of usefulness [9]. output quality and result demonstrability have relation to perceived ease of use. perceived ease of use and training have relation to perceive of usefulness. output quality describe the user perception about the output of data entry using capi. the data will put in database in real time and will be save in server. for the next step of survey/census the data will be used for statistical analysis. result demonstrability define how the user could be discuss and communicate around the result of capi system. training explain the influence of training to users in order to have good skill in capi system. perceived of usefulness describe the user perception whether the system help them to finish their work. perceived ease of use explain the user perception whether the system is easy to be used. fig. 1. tam structure issn 2614-0047 bulletin of social informatics theory and application 13 vol. 1, no. 1, march 2017, pp. 11-17 anggorowati (technology acceptance model for computer assisted personal interviewing) 4. analysis 4.1. descriptive analysis descriptive analysis explain data characteristics and data distribution. the users as respondent are divided in two groups based on different survey. based on fig. 2, 63% user use capi in social survey and 37% user use capi in economics survey. fig. 2. user based on survey different survey will conduct different type of data entry, different rule validation and different design interface of capi system. the differences may have different influences user acceptance. fig. 3 shows user experience is one of the tam constructs. having knowledge of the user experiences is very important to understand the user acceptance of the users. fig. 3. user experience fig. 4 explain subjective norm explain that most of users have perception that they friends and lecture said that capi application is important for data collection (61.42% really agree, 33.3% agree). 63% 37% social economics 41% 59% experience no experience 14 bulletin of social informatics theory and application issn 2614-0047 vol. 1, no. 1, march 2017, pp. 11-17 anggorowati (technology acceptance model for computer assisted personal interviewing) fig. 4. subjective norm according to of tam model, sem structure was developed in order to validate the tam. fig. 1 shows the sem structure for tam capi model. sem model consists of measurement model and structural model. measurement model validate all indicators of variables and structural model validate the relations between variables in tam model. fig. 5 shows that 33.64% users has perception that capi application does not have good output quality, in other side 10% and 49.38% user agree and really agree that capi has good quality. fig. 6 shows that 8% users said that capi applications does not make data collection faster and efficient. in the other hand 31% agree and 61% really agree that capi applications helps data collections faster and more efficient. fig. 5. output quality 33.33% 61.42% 5.25% agree really agree no agree 33.64% 49.38% 10.80% no agree agree really agree issn 2614-0047 bulletin of social informatics theory and application 15 vol. 1, no. 1, march 2017, pp. 11-17 anggorowati (technology acceptance model for computer assisted personal interviewing) fig. 6. percieved of usefulness fig. 7 shows that 65.28% users agree and 27.78% really agree that capi application is easy to use, but 6.94% has perception that capi applications is not ease to use. fig. 6 shows the users perception of the influence of training for using capi applications. 60.65%dan 29.63% users said that training help them to use capi bit 9.72% said that training is not to help them for using capi. fig. 7. percieved ease of use fig. 8. training 8% 31% 61% no agree agree really agree 6.94% 65.28% 27.78% no agree agree really agree 9.72% 60.65% 29.63% no agree agree really agree 16 bulletin of social informatics theory and application issn 2614-0047 vol. 1, no. 1, march 2017, pp. 11-17 anggorowati (technology acceptance model for computer assisted personal interviewing) 4.2. validation structure using sem validation tam structure was conducted by sem analysis. sem estimated all parameter which can explain the relation between constructs in tam structure [10]. the estimation obtain value parameter of tam model. table 1 shows the parameters, the minimum value of λ is 0.650 and the maximum is 0.919. λ explain the relation between indicators and variable/construct. table 1 also explain the minimum value of is 0.165 and the maximum is 0.347. parameters explain relation between variables. fig. 2 shows that output quality has positive influence significantly to perceived ease of use. result demonstrability and training also has positive influence significantly to perceived ease of use. training significant influence positively to perceived usefulness. refers to anggorowati, for the case of tam bps model perceived ease of use does not have influence significantly to perceive of usefulness [8]. the interpretation of the model explain that the output of data entry in database could be used in analysis. it means that data collection using capi system can replace the data collection using pepi (paper and pencil interviewing). the user also can discuss and communicated each other about the data and has no difficulties to use it. it explain that result demonstrability has significantly to perceived ease of use. training of capi applications was conducted for all users. the training also involved role play as a simulation how to use capi in data collections. in the simulation there were some fisherman been interviewed by the users. the training variable influence positively on perceived. ease to use and perceived of usefulness. it means that users has perceptions that training make them understand how to use the capi application and they can see how capi make data collections become easier and faster (more efficient). relevance to tam bps perceived ease of use has no significant influence to perceived ease of use [8]. it explain that when the application is used in mandatory environment then no relation between perceived ease of use and perceived ease of use. table 1. parameter model parameter value parameter value λ1 0.861 λ9 0.871 λ2 0.852 λ10 0.724 λ3 0.894 λ11 0.848 λ4 0.805 λ12 0.919 λ5 0.811 ƴ1 0.165 λ6 0.821 ƴ2 0.347 λ7 0.738 ƴ3 0.130 λ8 0.650 ƴ4 0.290 fig. 9. estimation of tam parameters issn 2614-0047 bulletin of social informatics theory and application 17 vol. 1, no. 1, march 2017, pp. 11-17 anggorowati (technology acceptance model for computer assisted personal interviewing) 5. conclusion capi application was proved can be implemented in survey and census data collections especially for social survey and economics survey. capi application made the data collection more efficient and effective (fast and easy). there are three variables which are influence the perceived ease of use and perceived of usefulness. it is needed to be developed the dynamics capi application for many kind of survey data collection. this research lead to a new problem question: how management support should be conducted in order to enhance the implementation of capi applications. references [1] j. gratch, g. m. lucas, a. a. king, and l. p. morency, “it’s only a computer: the impact of human-agent interaction in clinical interviews,” in proceedings of the 2014 international conference on autonomous agents and multi-agent systems, 2014, pp. 85–92. [2] c. leisher, “a comparison of tablet-based and paper-based survey data collection in conservation projects,” soc. sci., vol. 3, no. 2, pp. 264–271, 2014. [3] r. p. baker, “new technology in survey research: computer-assisted personal interviewing (capi),” soc. sci. comput. rev., vol. 10, no. 2, pp. 145–157, 1992. [4] n. marangunić and a. granić, “technology acceptance model: a literature review from 1986 to 2013,” univers. access inf. soc., vol. 14, no. 1, pp. 81–95, 2015. [5] w. keller, “international technology diffusion,” j. econ. lit., vol. 42, no. 3, pp. 752–782, 2004. [6] o. c. otieno, s. liyala, b. c. odongo, and s. abeka, “theory of reasoned action as an underpinning to technological innovation adoption studies,” world j. comput. appl. technol., vol. 4, no. 1, pp. 1–7, 2016. [7] t. ramayah and j. ignatius, “impact of perceived usefulness, perceived ease of use and perceived enjoyment on intention to shop online,” icfai j. syst. manag., vol. 3, no. 3, pp. 36–51, 2005. [8] m. a. anggorowati, n. iriawan, s. suhartono, and h. gautama, “restructuring and expanding technology acceptance model: structural equation model and bayesian approach,” am. j. appl. sci., vol. 9, no. 4, pp. 496–504, 2012. [9] f. d. davis, “perceived usefulness, perceived ease of use, and user acceptance of information technology,” mis q., vol. 13, no. 3, pp. 319–340, 1989. [10] a. mardani et al., “application of structural equation modeling (sem) to solve environmental sustainability problems: a comprehensive review and meta-analysis,” sustainability, vol. 9, no. 10, p. 1814, 2017. bulletin of social informatics theory and application issn 2614-0047 vol. 3, no. 2, july 2019, pp. 56-60 56 https:doi.org/10.31763/ businta.v3i2.184 the use of augmented reality to educate preschoolers on preventing dental malocclusion yulita salim a,1,*, yustisia puspitasari b,2, huzain azis a,3, risnayanti anas b,4 a faculty of informatics, universitas muslim indonesia, makassar, indonesia b faculty of dentistry, universitas muslim indonesia, makassar, indonesia 1 yulita.salim@umi.ac.id; 2yustisia.puspitasari@umi.ac.id; 3huzain.azis@umi.ac.id; 4risnayanti.anas@gmail.com * corresponding author 1. introduction normal occlusion is a harmonious relationship between teeth and occlusion that requires a balance between teeth, jaw, jaw muscles, temporomandibular joints, and nervous system [1]. disruption in one of these components will produce an unbalanced relationship called malocclusion [2]. the causes of malocclusion are multifactorial and dentofacial structures caused by genetic and environmental factors [3]. the environment is caused by the habit of not maintaining hygiene during the child's growth and development process [4]. caries and premature loss or early date of deciduous teeth predispose to the lack of space in the tooth replacement and permanent phase [5]. prevalence studies of the frequency of premature loss of deciduous teeth reached 15.1 54.26% [6]. according to the study, primary teeth often experience premature loss of deciduous molars are the teeth of the lower jaw [1]. premature loss that occurs in primary teeth is caused by caries [7]. awareness of adults in indonesia to come to the dentist is less than 7% and in children around 4%. 72.1% of indonesia's population has cavities, and 46.5% do not treat cavities. the average patient visit is in an excellent condition for treatment, so it can be interpreted that the level of public awareness to seek treatment as early as possible is still lacking. the utilization of dental and oral health services is not only in the form of tooth extraction and dental fillings, but the community must visit at least once every six months. a r t i c l e i n f o a b s t r a c t article history received august 21, 2019 revised september 17, 2019 accepted october 4, 2019 according to the world health organization (who), malocclusion is a deviation in dentofacial growth or an abnormal relationship between the teeth of both arches, which results in impaired physical function for sufferers. causes of malocclusion include genetic factors, inappropriate growth and development processes, bad habits of children, and malnutrition. also, malocclusion can be caused by a lack of knowledge of children, parents, and guardians of students in the school environment in maintaining oral health. nurul falah kindergarten, located in mamajang district in the middle of makassar city. however, students in kindergarten are from the middle to lower economies with a lack of dental and oral health awareness. according to the principal, some students come with the condition of not brushing teeth and with cavities. this service activity aims to help solve the problems faced by teachers in pre-school age students by providing dental education based on augmented reality and topical application fluor (taf) as an effort to prevent malocclusion. it is hoped that through this activity malocclusion prevention can be done through promotive efforts on dental health. this dental extension will be complemented by the utilization of information technology advances in the form of android-based augmented reality (ar) technology that is able to visualize an object in 3 dimensions so that the counseling process becomes more interactive and real. this is an open access article under the cc–by-sa license. keywords fluoride caries preschoolers augmented reality (ar) malocclusion http://creativecommons.org/licenses/by-sa/4.0/ http://creativecommons.org/licenses/by-sa/4.0/ issn 2614-0047 bulletin of social informatics theory and application 57 vol. 3, no. 2, december 2019, pp. 56-60 y.salim et.al (dental malocclusion prevention education-based augmented reality for kindergarten) this dental extension will utilize augmented reality (ar) technology. augmented reality is a technology that can combine a 3d object into a real environment using webcam media [8], [9]. the advantage of the augmented reality method is an attractive visual display, which can display 3d objects that appear to exist in a real environment [10], [11]. the augmented reality method also has the advantage of being interactive because it uses markers to display 3d objects. counseling with this method will increase the reasoning power and imagination of students because dental and mouth objects can be visualized into 3d images, so that extension material becomes more attractive, easy to remember and easy to implement. 2. method the first step is checking the status of oral hygiene using an index called the simplified oral hygiene index (ohi-s). ohi-s value obtained from the sum of the debris index and calculus index. equation (1) and (2) to measure the debris and calculus index, it can be seen in equation (1) and (2). debris and calculus score assessment as follows: good, if the value is 0-0.6; medium, if the value is 0.7-1.8; and bad, if the value is 1.9-3.0. moreover, ohi-s assessment as follows: good, if the value is 0-1.2; medium, if the value is 1.3-3.0; and bad, if the value is 3.1-6.0. 𝐷𝑒𝑏𝑟𝑖𝑠 𝐼𝑛𝑑𝑒𝑥 = 𝑁𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝑑𝑒𝑏𝑟𝑖𝑠 𝑟𝑎𝑡𝑖𝑛𝑔𝑠 𝑁𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝑡𝑒𝑒𝑡ℎ 𝑒𝑥𝑎𝑚𝑖𝑛𝑒𝑑 (1) 𝐶𝑎𝑙𝑐𝑢𝑙𝑢𝑠 𝐼𝑛𝑑𝑒𝑥 = 𝑁𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝑐𝑎𝑙𝑐𝑢𝑙𝑢𝑠 𝑎𝑠𝑠𝑒𝑠𝑠𝑚𝑒𝑛𝑡 𝑁𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝑡𝑒𝑒𝑡ℎ 𝑒𝑥𝑎𝑚𝑖𝑛𝑒𝑑 (2) the next step, dental health counseling activities, consists of three materials. the first material is a function of deciduous teeth. the second material is the frequency and method of brushing teeth. and the last material is a source of healthy food. an understanding of the role of primary teeth needs to be given to support the child's growth and development process. the role of parents is crucial in supporting this program at home because it can provide examples, encourage, remind and help children about the habit of brushing their teeth. counseling information about healthy food for teeth also needs to be provided, so parents can provide healthy food at home and in preparing the children's supplies at school. counseling activities using android-based augmented reality (ar) technology. ar is expected to stimulate the curiosity of students to learn because it is accompanied by video animation/cartoon. fig. 1. ar application with android based 58 bulletin of social informatics theory and application issn 2614-0047 vol. 3, no. 2, december 2019, pp. 56-60 salim et.al (dental malocclusion prevention education-based augmented reality for kindergarten) fig. 2. ar application implementation toothbrush activity is the implementation of the extension phase of the teeth. students will conduct a joint toothbrush using a brush and tooth given. each student will be monitored one by one while being given examples by the counseling material that has been taught. aside from school, tooth brushing must also be monitored by parents of students at home. the result of this program is expected to be a sustainable activity both at school and at home. teeth that are being treated will be given a lift (fillings) using glass ionomer cement fuji ix. the next step is giving taf material to healthy teeth as well as teeth that have been capped (patched). the goal given taf material is 4 namely 1) helps inhibit the occurrence of dental caries by providing tooth enamel protection so that it is more resistant to the demineralization process caused by acidic conditions in the oral cavity, 2) stimulates the remineralization process on the enamel surface, 3) inhibits the microbiological enzyme system which converts carbohydrates to acids in dental plaque, and 4) there is a bacteriostatic effect that inhibits bacterial colonization on the tooth surface. the procedure for topical application fluor (taf) is as follows:  teeth are cleaned with pumice paste and rubber cup.  teeth are isolated with cotton rolls.  teeth are dried with air spray, especially interproximal areas.  apply 2% sodium fluoride solution to the teeth with a cotton pellet or micro brush.  dry for three minutes, and not eat, drink or gargle in one hour.  repeat all steps four times a month. giving sodium fluoride four times can help prevent dental caries and last up to three years. 3. results and discussion augmented reality based dental education activities are carried out four times in three months. these activities provide educational counseling to students, parents, and teachers about the importance of oral and dental health care. activities that use instrument augmented reality (ar) is beneficial to facilitate teachers and parents to teach the habit of taking care of your teeth and mouth. after providing counseling to 50 students, ten teachers, and representatives of parents, then the monitoring carried out for 30 days. the results of this activity are 100 percent of students nurul falah brush their teeth every morning, which is visible through the control card. the teachers have also installed the ar application to assist them in conducting the teaching process, which contains the importance of caring for teeth and how to choose healthy foods. issn 2614-0047 bulletin of social informatics theory and application 59 vol. 3, no. 2, december 2019, pp. 56-60 y.salim et.al (dental malocclusion prevention education-based augmented reality for kindergarten) the application of ar to educate students is beneficial in providing a different and memorable learning experience. ar technology can attract users, especially students [12], [13] to a new world so that it can have an impact on improving the quality of education more optimally. by involving several senses, ar becomes one of the technologies suitable for education [14]. in addition to providing counseling, the service lecturers also applied taf for students. provision of taf can help prevent caries that occurs in children, for approximately six months. 4. conclusion based on this study, it can draw several conclusions. dental education for pre-school age needs to be done to prevent early damage to children's teeth. then, activities counseling is equipped with a control card module, and dental care was given to teachers and parents of students. in addition, learning how to take care of oral health and choosing healthy foods using android-based ar technology has an impact on students' habit of cleaning their teeth every day, and makes it easy for teachers to teach children to understand the importance of dental care. dental extension activities should get support from all elements, especially the school. knowledge of how to care for teeth dramatically affects the growth and development of children, especially those from the lower middle class. a healthy tooth and mouth condition is needed so that all activities of the child are not disrupted. finally, oral health helps children to meet their nutritional needs. acknowledgment our gratitude goes to the directorate of research and community service, ministry of research, technology and higher education for providing financial assistance to the community service stimulus in 2018. hopefully what we have done can benefit our institutions, especially universitas muslim indonesia in makassar. references [1] m. h. ahangar-atashi, “prevalence of dental malocclusions in patients admitted to the department of orthodontics, school of dentistry, tabriz, in 2016,” j. contemp. dent. pract., vol. 18, no. 11, pp. 1034– 1039, 2017. [2] v. p. singh and a. sharma, “epidemiology of malocclusion and assessment of orthodontic treatment need for nepalese children,” int. sch. res. not., vol. 2014, no. 768357, 2014. [3] j. k. baskaradoss, a. geevarghese, c. roger, and a. thaliath, “prevalence of malocclusion and its relationship with caries among school children aged 11-15 years in southern india,” korean j. orthod., vol. 43, no. 1, pp. 35–41, 2013. [4] r. harris, a. d. nicoll, p. m. adair, and c. m. pine, “risk factors for dental caries in young children: a systematic review of the literature,” community dent. health, vol. 21, no. 1, pp. 71–85, 2004. [5] m. demers, j. m. brodeur, p. l. simard, c. mouton, g. veilleux, and s. frechette, “caries predictors suitable for mass-screenings in children: a literature review,” community dent. health, vol. 7, no. 1, pp. 11–21, 1990. [6] t. m. de carvalho and a. f. miranda, “preventive orthodontics: space maintainers in the early loss of deciduous tooth-clinical case report,” ec dent. sci., vol. 10, pp. 143–148, 2017. [7] d. e. al agili, “a systematic review of population-based dental caries studies among children in saudi arabia,” saudi dent. j., vol. 25, no. 1, pp. 3–11, 2013. [8] h. elmunsyah, w. n. hidayat, and k. asfani, “interactive learning media innovation: utilization of augmented reality and pop-up book to improve user’s learning autonomy,” j. phys. conf. ser., vol. 1193, no. 1, 2019. [9] s. zheng, “research on mobile learning based on augmented reality,” open j. soc. sci., vol. 3, no. 12, p. 179, 2015. 60 bulletin of social informatics theory and application issn 2614-0047 vol. 3, no. 2, december 2019, pp. 56-60 salim et.al (dental malocclusion prevention education-based augmented reality for kindergarten) [10] m. m. zarzuela, f. j. d. pernas, l. b. martínez, g. ortega, and m. a. rodríguez, “mobile serious game using augmented reality for supporting children ’ s learning about animals,” procedia procedia comput. sci., vol. 25, pp. 375–381, 2013. [11] á. zsila, g. orosz, b. beáta, i. tóth-király, and o. király, “an empirical study on the motivations underlying augmented reality games : the case of pokémon go during and after pokémon fever,” pers. individ. dif., 2017. [12] d. mcmahon, d.f. cihak, and r. wright, "augmented reality as a navigation tool to employment opportunities for postsecondary education students with intellectual disabilities and autism," journal of research on technology in education., vol. 47, no. 3, pp.157-172, 2015. [13] m. akçayır, and g. akçayır, "advantages and challenges associated with augmented reality for education: a systematic review of the literature" educational research review., vol. 20, pp. 1-11, 2017. [14] r.m. yilmaz, "educational magic toys developed with augmented reality technology for early childhood education," computers in human behavior., vol. 54, pp.240-248, 2016. bulletin of social informatics theory and application issn 2614-0047 vol. 4, no. 1, july 2020, pp. 35-39 35 https:doi.org/10.31763/businta.v4i1.188 network load traffic on mysql atomic transaction database asghaiyer mohamed asghaiyer* beni ulid technology, bani walid, libya asghier86@gmail.com * *corresponding author 1. introduction network traffic is the amount of data that moves on the network at a certain point in time [1]. the quality of service in the network is determined by the appropriate network traffic organization. network data is mostly encapsulated in network packets, which provide a load in the network. data in the present period is growing very quick, both in terms as volume, velocity and variety. as well as techniques or ways to organize it. the database has now created information that can't be handled into the customary way we call big data. big data is the development or activity of associations to recover, store, process, and examine information that was beforehand impractical or prudent to recover, store, process, and investigate [2], [3]. big data is data with a large volume so it can't be handled utilizing customary techniques, both organized data and unstructured data. so it needs special techniques to deal with the data. with the volume and velocity of data, it becomes difficult to keep the data to be valid and intact while transferring data. by using transactions in mysql can ensure consistency of the data being stored. use of transactions in a database by not using atomic transactions has a difference in terms of traffic on the network. for this research appears by analyzing network traffic or density from a database that uses transactions. a r t i c l e i n f o a b s t r a c t article history received january 5, 2020 revised january 25, 2020 accepted february 2, 2020 internet technology is developing very rapidly especially on the database system. today's database has led to data that cannot be processed into the traditional way that we call big data. some data stored on the server requires a way for the data to be valid and intact for that transaction mechanism appears on rdbms which ensures that the data stored will become a unified whole as in customer account data, withdrawal of money at atms, e-transactions -commerce and so on. of course the use of transactions in a database by not using atomic transactions has a difference in terms of traffic on the network. this research appears by analyzing network traffic or density from a database that uses transactions and not to users who access them. this research method uses a questionnaire method by distributing questionnaires quantitatively to 300 respondents. the results of the study of approximately 300 respondents, researchers get the results that the use of transactions in databases and databases without transactions after being accessed by 300 people, the densest network is a network owned by a system that uses transaction features, this is because there is a slight increase of about 13% of traffic when compared to a network without transactions. this statement shows that two-way communication from a database that has the transaction provides feedback to the user so that the data is reliable as an indicator that the data has been stored safely. further research can be done by finding other information or a study of big data using the atomic transaction model. this is an open access article under the cc–by-sa license. keywords network load traffic mysq atomic transaction. http://creativecommons.org/licenses/by-sa/4.0/ http://creativecommons.org/licenses/by-sa/4.0/ 36 bulletin of social informatics theory and application issn 2614-0047 vol. 4, no. 1, july 2020, pp. 35-39 asghaiyer (network load traffic on mysql atomic transaction database) with the background mentioned above this research finally emerged. this research examines the comparison of network load in databases using transactions and databases without transaction. 2. the proposed method/algorithm 2.1.network traffic according to technopedia, a trusted website for professional it insight and inspiration, network traffic also known as data traffic alludes to the measure of information moving over a system at a given purpose of time [4]. network data is for the most part epitomized in network packets, which give the heap in the network. network traffic is the principle segment for network traffic measurement, network traffic control and recreation [1]. the best possible association of system traffic helps in guaranteeing the nature of administration in a given network [4]. in this topic, an analysis of network traffic can provide benefits to an organization such as:  recognizing system bottlenecks there could be clients or applications that expend high measures of transmission capacity, in this manner comprising a significant piece of the system traffic. various arrangements can be actualized to handle these.  system security unusual measure of traffic in a system is a conceivable indication of an assault. system traffic reports give significant bits of knowledge into avoiding such assaults.  system building knowing the utilization levels of the system enables future prerequisites to be broke down. 2.2.mysql sql or stands for structured query language, is a programming language used to form relationships with databases. there are various relational database management system (rdbms) that have work with sql such as mysql, oracle, microsoft sql server, postgresql, informix, mariadb, mongodb, and others. mysql is an excellent open source rdbms product in web applications. over time, mysql has proven to exceed the performance of other rdbms. mysql also has features that are required by enterprise level applications. although mysql has a fairly large table size (8tb) per table, mysql can operate on intel pentium class computers that have a minimum of 32mb ram. mysql underpins the sql-92 standard almost totally and expands the standard with different highlights [5]. 2.3.acid transactions the acid transaction is an idea that was first presented during the 1960s (in spite of the fact that the term acid was not presented until 1983) [6]. in 1983 acid was created by andreas reuter and theo harder which stand for atomicity, consistency, isolation, and durability [7]. an acid transaction is a grouping of actions or operations that together have the following properties:  atomicity atomicity is the atomically action that implies indivisibility and irreducibility, so the transaction is guaranteed. whereas the transaction is successful there will be a change and if the transaction fails then no change will occur and the transaction will never happened [8], [9].  consistency consistency implies when any given transaction start changes a consistent condition of the database or the data into another consistent condition till it ends, without essentially saving consistency at all intermediate points. this consistent state occur in spite the transaction succeeding or failing and both before the beginning the transaction and after the transaction is finished [10]–[12].  isolation transaction often executed simultaneously. isolation guarantees that simultaneous execution of exchanges leaves the database in a similar condition that would have been acquired if the transactions were executed sequentially. it was done by concealed the transaction from every single other exchange until such time as the given exchange submits. so the transactions that run simultaneously have all the earmarks of being serialized [10]– [12]. issn 2614-0047 bulletin of social informatics theory and application 37 vol. 4, no. 1, july 2020, pp. 35-39 asghaiyer (network load traffic on mysql atomic transaction database)  durability durability means when the transaction has been carried out the changes will persist, even if there is a system failure. for example one account made money transactions to another account; this durability property guarantees that the update that already made won’t be reversed [12]. 3. method this research and development utilizes the waterfall method. waterfall method is regularly called the exemplary life cycle (classic life cycle), where it shows a precise and consecutive way to deal with programming improvement, beginning with the specification of client needs and afterward proceeds through the phases of arranging (requirements), planning programs (design), convert the plan to code to make the program (implementation), then test the system (verification), which closures with help for the complete software that is delivered (maintenance). the phases of the waterfall method can be found in “fig.1,” beneath. fig. 1. images of waterfall methodology we chose this method because there are several advantages contained in this method other than because this method is an easy method to implement. the first advantage is that we can clearly get what is needed during the process of making this program before the creation begins. because of the clear needs at the beginning of the process, each stage is completed within the allotted time. referring to the level of difficulty of the implementation of this method which is quite low, then the level of resources needed is also quite low. but the problem arises if in the allotted time at the time of work each stage is not enough to complete the stage. therefore it is necessary to prepare and calculate sufficiently mature to do this research using this waterfall method [13]. a complete description of the steps of the waterfall system is as follows: 3.1.requirement analysis requirement stage is a stage that analysis of system requirements to be made and must be understood by clients and developers. at this stage the client must be able to explain and define the purpose of the system to be built. as a developer must be able to capture the intent of the client regarding the system to be built and also provide advice and perhaps also constraints on the system to be built. the documents produced at this stage form the basis of a work contract between the client and the developer. this method is applied by researching and inputting data that will be made points in the questionnaire entries. 3.2. system design the prerequisites detail from the past stage will be examined in this stage and the system design is readied. system design helps in deciding the (equipment) and system necessities and furthermore helps in characterizing the general system engineering. the system design stage is redefining by make and organizes the question points to form a questionnaire that is ready to be circulated. 38 bulletin of social informatics theory and application issn 2614-0047 vol. 4, no. 1, july 2020, pp. 35-39 asghaiyer (network load traffic on mysql atomic transaction database) 3.3.implementation implementation is the stage where the general system design that has been arranged already will be changed over into program codes and modules which will later be incorporated into a complete system as per the work contract. at this stage programmers opens mysql and direct the respondents to make an action with transactions and without transactions on mysql. 3.4.verification at this stage the system that has been caused will to be incorporated and tried to test whether the system is working appropriately and that is no less significant is as per the agreement that has been concurred. the verification stage is carried out by respondents filling up the questionnaires 3.5.maintenance the final stage in the waterfall model. finished software, run and maintain. maintenance is incorporated into amending blunders that were not found in the past advance. improvement of system unit execution and improvement of system services as new needs. at this stage the result of the questionnaires is being analyzed, charted and be concluded. 4. result and discussion before we go to the result, we gonna discuss how the transaction in mysql works. a transaction is an atomic unit of database operations (queries) in one or more databases that can be committed or rolled back. in fig.2, it could be seen that when a transaction makes multiple queries to the database, either all the queries executed successfully when the transaction is committed, or any of the query failed when the transaction is rolled back. a transaction begins with the initiate of transaction then the first executable query continues with other queries and ends when it is committed or rolled back. in a set of operations, if one of them fails, the rollback occurs to restore the database to its original state. if no error occurs, the entire set of statements is committed to the database. fig. 2. transaction workflow the advantages of using transaction, mysql transaction allow you to execute a set of mysql operations to ensure that the database never contains the result of partial operations. imagine what would happen if in a transaction with multiple queries, one or more query failed due some reasons. it difficult to track and repair or make a return as the initial conditions where all steps should be successful because the data are related to each other. the only restoration option available is to reconstruct the data from a backup (providing one exists). 4.1.network load traffic test results on mysql atomic transaction database the test was carried out by means of 300 respondents accessing 2 different systems, one system using transactions and one other system did not use transactions. researchers get the result that the densest network is a network owned by a system that uses transaction features, because there is an increase of about 13% of network traffic when compared to systems without transaction features. in fig. 3, it could be seen that there is a difference in network load traffic between using transactions and not using transactions. issn 2614-0047 bulletin of social informatics theory and application 39 vol. 4, no. 1, july 2020, pp. 35-39 asghaiyer (network load traffic on mysql atomic transaction database) fig. 3. test results 5. conclusions this research was conducted to determine network load when using transactions on mysql. this research answers the purpose of algorithm design with transactions which has insignificant influence on network load but it is considered that if a large number of users access the system, congestion can occur. the results showed that there was a 13% surge in traffic with 300 people in the trial, but this change in traffic was not linear with the number of users. other researchers might be able to contribute by finding a prediction line from the surge in traffic. references [1] t. benson, a. akella, and d. a. maltz, “network traffic characteristics of data centers in the wild,” in proceedings of the 10th acm sigcomm conference on internet measurement, 2010, pp. 267–280. [2] i. a. t. hashem, i. yaqoob, n. b. anuar, s. mokhtar, a. gani, and s. u. khan, “the rise of ‘big data’ on cloud computing: review and open research issues,” inf. syst., vol. 47, pp. 98–115, 2015. [3] m. troester, “big data meets big data analytics,” 2012. [4] technopedia, “network traffic,” www.technopedia.com, 2019. [online]. available: https://www.techopedia.com/definition/29917/network-traffic. [accessed: 14-sep-2019]. [5] s. suehring, mysql bible. john wiley & sons, inc., 2002. [6] j. gray and a. reuter, transaction processing: concepts and techniques. elsevier, 1992. [7] m. chessell, c. griffin, d. vines, m. butler, c. ferreira, and p. henderson, “extending the concept of transaction compensation,” ibm syst. j., vol. 41, no. 4, pp. 743–758, 2002. [8] j. amsterdam, “atomic file transactions, part 1,” o’reilly on java.com, 2001. [online]. available: https://web.archive.org/web/20160303090517/http://archive.oreilly.com/pub/a/onjava/2001/11/07/atomi c.html. [accessed: 14-sep-2019]. [9] s. yu, “acid properties in distributed databases,” adv. ebus. trans. b2b-collaborations, p. 17, 2009. [10] international business machines corporation (ibm), “acid properties of transactions,” www.ibm.com, 2019. . [11] technet microsoft, “isolation levels in the database engine,” technet.microsoft.com, 2012. . [12] c. j. date, sql and relational theory: how to write accurate sql code. “ o’reilly media, inc.,” 2011. [13] m. ally, v. balaji, a. abdelbaki, and r. cheng, “use of tablet computers to improve access to education in a remote location,” j. learn. dev., vol. 4, no. 2, pp. 221–228, 2017. bulletin of social informatics theory and application issn 2614-0047 vol. 7, no. 1, march 2023, pp. 43-46 43 https:doi.org/10.31763/businta.v7i1.206 internship and entrepreneurship in computer science muhammad bahauddin alfan a,1,*, sabri sangjaya a,2, muhammad rizal rusdiansyah a,3, fandi arfabuma a,4, gulsun kurubacak b,5 a universitas negeri malang, indonesia b anadolu university, turkey 1 dy2nzoid@gmail.com ; 2 sabriwp@outlook.com; 3 muhammadrizal2252@gmail.com; 4 arfabuma.987@gmail.com; 5 gkurubac@anadolu.edu.tr * corresponding author 1. introduction at present, throughout the world, especially in indonesia, various kinds of industrial fields are developing rapidly. this can be seen with the emergence of a variety of new business spaces established by several groups. according to the website startupranking.com [1], indonesia had 2153 startup companies in 2019, and won 5th place as the country with the most startups after canada. this of course, is an attraction for the community, especially students who have new things to develop in the business field. they compete with each other to do various innovations to make something different from the others and can benefit many people. however, setting up a new industry or startup is not easy. not necessarily a student with high hard skills can make a startup that can survive and succeed. this is because it takes more than just hard skills in the development of startups. they are expected to have an initiative soul, can plan a system well, have creativity and innovation, the ability to solve problems, and can manage risk and information [2]. based on one paper discussing entrepreneurship-based education in china [3], it is evident that the development of education in universities in china is caused by the application of entrepreneurship education in nine renowned universities in china [4]. according to jun li [5], higher education in china was influenced by political conditions prevailing during the 1960s. socio-economic and political reforms have massively changed china through rural areas with the introduction of a system of family responsibilities and triggered the rapid development of urban and rural enterprises. other studies look at the perspective of determining entrepreneurial career choices and entrepreneurial interests [6]. but in this case, we approach through the viewpoint of the relationship between the subject of the lecture and the internship program with an entrepreneurial interest to see the pattern of both relationships. 2. entrepreneurship entrepreneurial is a process of creating new things, with time and effort, to achieve financial resources, job satisfaction, and independence [7]. entrepreneurship needs to be taught in one course a r t i c l e i n f o a b s t r a c t article history received january 3, 2023 revised february 18, 2023 accepted february 24, 2023 graduated students of state university of malang majoring in computer science have required to do an internship in industry. generally, the chosen private industry is in the form of a startup, such as learning media applications and games. in this case, the authors would like to conduct research related to the impact of an internship program and another computer science subject related to entrepreneurial skills. it is expected that this research can improve the quality of student graduates in order to have an entrepreneurial spirit. this is an open access article under the cc–by-sa license. keywords internship entrepreneurship computer science student mailto:dy2nzoid@gmail.com http://creativecommons.org/licenses/by-sa/4.0/ http://creativecommons.org/licenses/by-sa/4.0/ 44 bulletin of social informatics theory and application issn 2614-0047 vol. 7, no. 1, march 2023, pp. 43-46 muhammad bahauddin alfan et.al (internship and entrepreneurship in computer science) that teaches students to brainstorm to run a business. however, the course has not been effective in producing sustainable projects such as startup incubation. then students are given another opportunity to take part in an internship program which is also a compulsory subject. this program is quite effective because students are required to go directly into employment. information technology-based companies have contributed massively to economic growth and job creation. but according to chen [8], regardless of his contribution, entrepreneurship in the field of information technology remains lacking in business research. the study's results stated that entrepreneurship interests in computer science students are determined directly by social influence and self-efficacy. 3. hipster, hustler, hacker according to research by tatjana [9], from the results of a joint interview with rei inamoto, ceo of akqa, believes that the startup field requires a high level of creativity and the need for 3 types of people: hipster, hacker, and hustler. hipster is one that makes cool and fashionable products. designers have a high chance of skills in the form of hipster, thus showing that designers are generally innovative[10]. ux designers are known to have the expertise needed to make a startup, but they still need to learn about business literacy. thus, designers who aspire to be hipsters need to learn the ux designer skills while building business literacy and developing their creativity. the term hipster is meant here to indicate someone who thinks and behaves independently, develops imagination and intuition, with a sense of art, and transcends the dominant mainstream in society. hackers are people who know how to build products in the field of information technology. this person is a person who understands the environment, procedures and technology better than others and is able to realize creative ideas. hustler is a person who found a way to sell products to the world. selling here does not always mean realization in the market, but the creation of something valuable, necessary, and can be adopted. hustler is a person who has strong corporate values, vision and mission. 4. method this research method is qualitative by taking data through interviews with graduate of computer science students who have established businesses and work in companies. this research explores how effective the courses taught on campus and the internship program is in implementing entrepreneurship. many methodologies can be used when researching entrepreneurial intentions, but almost all researchers use a quantitative methodology where interviewees are the principal data. we conduct research using interviews. lisa ruch has conducted research using phenomenological interviews about internships as entrepreneurship education[11]. uduak[12] also conducted interviews about entrepreneurship education and the career interests of students. we interviewed computer science students who had opened businesses to support this research. from the interviews we conducted, there were several findings that entrepreneurial interest could be found in several things, among others. industry practice, lecture, business incubation, organization or community, competition 5. results and discussion marlino[13] said that education in entrepreneurship might increase interest as a career for students. the resource person said that the lecture material in the classroom was indirectly useful when in the company. coco[14] said internships foster awareness and innovation in the changing world of the workplace. internships give insight into the relationships and differences between the classroom and the world of work. according to coco[14], taylor[15], there are benefits from industrial practices facilitating the transition of students from college to work more easily. students can find career interests. the speakers also said that the entrepreneurship courses held by the campus also had an impact on the interests of entrepreneurs. uduak [12] in a study conducted in nigeria said that education in entrepreneurship positively affected student career interests and added students' insights into the entrepreneurial process. uduak suggested that entrepreneurship education should be based on issn 2614-0047 bulletin of social informatics theory and application 45 vol. 7, no. 1, march 2023, pp. 43-46 muhammad bahauddin alfan et.al (internship and entrepreneurship in computer science) practice to maintain student interest. in a study conducted by mustofa [16] it was mentioned that students were active while attending entrepreneurship lectures and practiced opening a business, but at the end of the lecture, it was rarely found who continued the business. moh solehatul suggested that industrial practice activities should also follow entrepreneurship lectures to increase entrepreneurship knowledge. based on interviews that have been conducted, the results are in the form of a mismatch of courses taught on campus with work processes in the industry when internships. this statement is supported by research conducted by kevin [17], which states that the future curriculum of computer science and software engineering needs to be revitalized. this revitalization is based on promoting and practicing computational thinking. computational thinking can foster entrepreneurship if we can connect entrepreneurial skills and computer science curriculum to students. entrepreneurship develops new computing markets, introduces new software and hardware technologies, and creates jobs. therefore, it is very important to improve computer science and software engineering programs with entrepreneurship. one of the subjects taught in computer science engineering at um is multimedia. this field is quite familiar to students who are interested in developing their skills in graphic fields such as design, animation and games. however, the scope of knowledge gained in multimedia is too biased because one of the subjects being taught is like animation using actionscript (code-based animation). in fact, the reality of making animation using actionscript is irrelevant and not even used. one article on actionscript [18] learning proposes that the use of actionscript is only a programming introduction language. so the framework that places actionscript in the curriculum for computer science in particular needs to be discussed again. furthermore, the internship program teaches operational standards in doing things so that they can be organized and existing results can be documented and ongoing for the next project. one application of optimization in the it field [19] is the management of electricity in large-scale it systems such as commercial data centers is a rapidly growing application area from an economic and ecological perspective, with billions of dollars in funds and millions of metric tons of co2 emissions at stake every year. business people generally want to save power without sacrificing performance. from this program, students can have new insights for their future careers, whether they are comfortable with following the company's operational standards or creating their own intellectual property. in working on coding projects, for example, students who take part in an internship program are not only required to be able to understand the intended programming language. but it must also apply optimization in working on coding, and project management so that it can be neatly organized and can be sustained if the process of switching hands. the experience of competition and certification is also able to improve skills to support entrepreneurship [20], but that is not enough if you do not study marketing knowledge. any good product must be presented attractively. therefore, a good product without adjusting to automatic market interest will not attract the attention of consumers. 6. conclusion after conducting research, it can be concluded that there is a need for curriculum reconstruction in computer science lectures at um. the following points need to be changed in the curriculum. among them the first is the application of hipster hustler hackers in grouping entrepreneurship courses. second, updating outdated theories, for example, the module uses the updated one. third, task management by emphasizing optimization in work tasks. finally, familiarize project documentation for the cv and introduce the culture of the company's operational standards. acknowledgment thank you very much for your attention lisa bosman, ph.d., along with criticism and suggestions for the articles we write. we are sorry if there are writing errors and misunderstanding of the suggestions given. hopefully, this research can be useful for future research. 46 bulletin of social informatics theory and application issn 2614-0047 vol. 7, no. 1, march 2023, pp. 43-46 muhammad bahauddin alfan et.al (internship and entrepreneurship in computer science) references [1] v. edgar and n. jonathan, “startup ranking sac,” 2019. available at: https://www.startupranking.com/sac-wireless [2] k. fredric, n. j. lindsay, and s. aviv, “entrepreneurial orientation and international entrepreneurial business venture startup,” int. j. entrep. behav. res., vol. 14(2), pp. 102-117, 2008. doi : 10.1108/13552550810863080. [3] m. zhou and h. xu, “a review of entrepreneurship education for college students in china,” adm. sci., vol. 2(1), pp. 82-98, 2012. doi: 10.3390/admsci2010082. [4] g. yi, “impact of internship quality on entrepreneurial intentions among graduating engineering students of research universities in china,” int. entrep. manag. j., pp. 1071-1087, 2017. doi : 10.1007/s11365-0170491-2 [5] j. li, h. matlay, and u. kingdom, “entrepreneurship education in china" , educ. + train., vol. 45, no. 8/9, pp. 495–505, dec. 2003, doi: 10.1108/00400910310508883. [6] r. b. moralista and g. c. delariarte, “entrepreneurship as a career choice : an analysis of entrepreneurial self-efficacy and intention of national high school senior students at the municipality of calinog , iloilo,” vol. 1, no. 2, pp. 12–15, 2014. available at : http://apjeas.apjmr.com/wpcontent/uploads/2014/05/apjeas-2014-1-025.pdf [7] a. tavakoli, “impact of information technology on the entrepreneurship development,” vol. 7, no. 8, pp. 1421–1426, 2013. available at: go.gale.com. [8] l. chen and e. claire, “it entrepreneurial intention among college students : an empirical study,” vol. 24, no. 3, pp. 233–244, 2013. available at : aisel.aisnet.org [9] m. tatjana and m. ljiljana, “the invisible and underestimated contributions to creative achievements,” 30th int. sci. conf. econ. soc. dev., vol. 16(3), pp. 69-82, 2018. doi: 10.5937/megrev1903069m. [10] s. s. l. chew, “designers as entrepreneurs: an investigation on why startups need design and design need startups,” ohio state university, 2015. available at: etd.ohiolink.edu. [11] r. lisa, “internships in start-up companies as part of an entrepreneurship education,” 2014. available at: duo.uio.no. [12] u. ekpoh and a. edet, “entrepreneurship education and career intentions of tertiary education students in akwa ibom and cross river states, nigeria.,” int. educ. stud., 2011. doi: 10.5539/ies.v4n1p172 [13] f. wilson, j. kickul, and d. marlino, “gender, entrepreneurial self-efficacy, and entrepreneurial career intentions: implications for entrepreneurship education.,” entrep. theory pract., 2007. doi: 10.1037/t22723-000. [14] m. coco, “internships: a try before you buy arrangement,” sam adv. manag. j., vol. 65(2), pp.41 2000. available at: go.gale.com [15] t. susan, “effects of college internships on individual participants,” j. appl. psychol., vol. 73(3), pp.393401, 1988. doi: 10.1037/0021-9010.73.3.393 [16] m. mustofa, “entrepreneurship lecture and entrepreneurial behavior of students of sociology education study program of social science faculty unnes 2018,” int. conf. educ. soc. sci. humanit., 2019. doi: 10.2991/icesshum-19.2019.66. [17] k. daimi and n. rayess, “the role of software entrepreneurship in computer science curriculum,” int. conf. front. educ. comput. sci. comput. eng., 2018. available at: semanticsholar [18] s. crawford and e. boese, “actionscript: a gentle introduction to programming,” j. comput. sci. coll., vol. 21, no. 3, pp. 156-168, 2006. doi: 10.5555/1089182.1089203 [19] g. tesauro et al., “managing power consumption and performance of computing systems using reinforcement learning,” pp. 1–8. available at: neurips.cc. [20] a. nugroho, sunyoto, and u. miftakhul, “influence of internship toward entrepreneurship interest for mechanical engineering students,” aip conf. proc., no. march, 2017, doi: 10.1063/1.4976920. https://www.startupranking.com/sac-wireless https://doi.org/10.1108/13552550810863080 https://doi.org/10.3390/admsci2010082 https://doi.org/10.1007/s11365-017-0491-2 https://doi.org/10.1007/s11365-017-0491-2 https://doi.org/10.1108/00400910310508883 http://apjeas.apjmr.com/wp-content/uploads/2014/05/apjeas-2014-1-025.pdf http://apjeas.apjmr.com/wp-content/uploads/2014/05/apjeas-2014-1-025.pdf https://go.gale.com/ps/i.do?p=aone&u=googlescholar&id=gale|a347003717&v=2.1&it=r&sid=aone&asid=daf159c7 https://aisel.aisnet.org/jise/vol24/iss3/8/ https://doi.org/10.5937/megrev1903069m https://etd.ohiolink.edu/apexprod/rws_etd/send_file/send?accession=osu1417611292&disposition=inline https://www.duo.uio.no/bitstream/handle/10852/42287/lisa_ruch_masterthesis_final.pdf?sequence=1&isallowed=y https://doi.org/10.5539/ies.v4n1p172 https://doi.org/10.1037/t22723-000 https://go.gale.com/ps/i.do?id=gale%7ca62205446&sid=googlescholar&v=2.1&it=r&linkaccess=abs&issn=07497075&p=aone&sw=w&usergroupname=anon%7e4c7f3ddd&aty=open+web+entry https://psycnet.apa.org/doi/10.1037/0021-9010.73.3.393 https://doi.org/10.2991/icesshum-19.2019.66 https://www.semanticscholar.org/paper/the-role-of-software-entrepreneurship-in-computer-daimi-rayess/c477377e1d622579815275835c692c1c7ebedef3 https://doi.org/10.5555/1089182.1089203 https://proceedings.neurips.cc/paper_files/paper/2007/file/c8fbbc86abe8bd6a5eb6a3b4d0411301-paper.pdf https://doi.org/10.1063/1.4976920 bulletin of social informatics theory and application issn 2614-0047 vol. 5, no. 1, march 2021, pp. 52-57 52 https:doi.org/10.31763/businta.v5i1.199 modern parenting: an ethical way to nurture children in digital era oemar syarif burhan a,1,*, wahyu eka praditia a,2, gustinar yus yuniarto a,3, anusua ghosh b,4 a department of electrical engineering, universitas negeri malang, malang, indonesia b university of south australia, adelaide, australia 1 oemar.edu@gmail.com*; 2 pradityaeka38@gmail.com; 3 gustinar.yuniar@gmail.com; 3 gustinar.yuniar@gmail.com * corresponding author 1. introduction parents knowingly use digital media to communicate with other parents and find some advice from other parents through social media [1]. at the same time, children tend to go online from social networks to online multiplayer games that involve communicating with other players [2]. due to worldwide trends, the number of children (including adolescents) using the internet or digital media keeps rising. recent reports suggest, south korea has 93% of 3–9-year-olds being online with an average of 8-9 hours a week, 25% for 3-year-old go online in the us and rising in percentage as the child grows older, and there are 79% of children aged between 5–9-year-olds also go online at home in australia [3]. in the usa, children are most likely to access reading books (91%), television around (89%), followed by computers (43%), gaming platforms (31%), interacting tablets about 25%, and smartphones around 21% [4]. other than using the internet as entertainment (watching video clips or playing games), the internet is also helping children at a young age to develop emergent digital literacy (understanding the process of interacting with computers). these new digital literacy capabilities also form a basis for digital technology managers through effective interaction of computers and the internet and help to create creative interpersonal linking [3], [5]. also, it gives a positive correlation between internet use during early childhood and outperforms at school [3]. other than that, recent experiments were performed on a group of adults and discovered that seeking information on the internet increased their individual’s confidence [2]. a r t i c l e i n f o a b s t r a c t article history received january 2, 2021 revised january 27, 2021 accepted february 11, 2021 the internet becoming more sophisticated and advancing at a tremendous rate is also a concern for parents. as children are introduced to the online platform, parents worry about their safety and nurture them from potential risks. parents gradually develop their parenting methods in this era by learning from community websites, blogs, social media, and apps. the information equips them to deal with their children when playing with electronic devices or surfing websites. there are various types of parenting styles, from strict about precluding parenting. when parents are strict, they will be using technology that can monitor or track their children's activities by remotely accessing their children's device, camera, recording text messages, and locations. this type of parenting does make their children feel very uncomfortable. on the other hand, not being concerned about their children accessing the internet can be very dangerous as they can access any sites that are not allowed for their age. this article will review previous digital parenting experiences and analyze/design a solution around what parents should do when nurturing and guiding their children for a better future in this digital age. this is an open access article under the cc–by-sa license. keywords modern parenting ethical way nurture digital era http://creativecommons.org/licenses/by-sa/4.0/ http://creativecommons.org/licenses/by-sa/4.0/ issn 2614-0047 bulletin of social informatics theory and application 53 vol. 5, no. 1, march 2021, pp. 52-57 burhan et.al (modern parenting: an ethical way to nurture children in digital era) with many benefits for children when they are using the internet or interact computers, it also has negative effects when using it excessively. thus, it makes parents concerned that their child's going online might disrupt social and cognitive development, and perhaps can lead to declining school results or even dropping out of school; increased family tension; abandoned hobbies; and psychological and physical problems [2], [6]. the fact is that 46% of 9-16 years-olds of internet users had experienced online risk at least once. from that percentage, there are 17% 9–10-year-olds, and 69% of 15–16-year-olds [7], which mean that the children are experiencing a risk online quickly as they grow older because of the complexity of the media and communication technologies are becoming more private [8]. when the internet and smart technology become a thing in our life today, interacting with it is easy because of how fast the computation and internet is, and also there is a device that you can bring it anywhere and anytime. interacting the internet gives us a positive effect and a negative effect depending on how to use it, makes parents about their children accessing the internet, especially on children’s cognitive development, online risks, and verbal interaction with their siblings or parents [2], [3], [9]. the outline of this paper follows: section ii presents the effects when people at a young age from what they do the most on the internet and how they handle it and parenting method. section iv will discuss current parent activities on nurturing their children and analyze the patterns by surveying and suggestions for parents on lecturing them properly. finally, section v concludes the research 2. parental mediation method in recent research, digital media and internet functions and their abilities benefit both parents and their children and keep evolving. moreover, both of them have their activities on their internet. there are various parenting methods that we have discovered. there are five different types of strategies: technical mediation, monitoring, restrictive, active mediation of internet safety, and active mediation of internet use [7]. however, the other references only have three types, which are restrictive, active, and co-use mediation [4], [9], [10]. it is essential to see the effects of using one of those methods; research has found that some of it can harm children’s cognitive and social development [9]. 2.1. technical mediation technical mediation focuses on limiting internet content to prevent the adverse outcomes for children when using technologies that can be used for browsing any media. technical mediation includes: 1) using software to prevent spam or junk mail or viruses, 2) a service that can limit children's time spent on the internet, 3) tracking internet activity, and 4) filtering or blocking types of websites [7]. parents who use most of technical mediation is the first one (prevent spam or virus) around 75% of average from 9–16-year-olds, and the least is limiting time spending on internet [7]. 2.2. monitoring mediation monitoring mediation is more focused on seeing children’s social activity (which friends she/he has in social network, reading their messages, and websites they have visited) rather than being restrictive. although technical mediation also includes tracking internet activity, the difference is that tracking internet activity will be dynamically updated. while in monitoring mediation, parents can directly access personal privacy activity, but at times, a parent could become suspicious of their children's act differently than before. 2.3. restrictive mediation this mediation refers to when parents set a media use regulation that will apply to their children such as restricting content or time usage [9]. according to duerager [7], this method focuses on how to restrict photo upload, video content to share with others, sharing personal information, restrict streaming or downloading media content and restrict instant messages usage. the survey results showed that this method encounters fewer online risks such as adult content, cyberbullying, or contact with unknown people [7]. moreover, this mediation is mainly used by parents with lower education, less digital media or internet, and less digital confidence (insecure online content). 54 bulletin of social informatics theory and application issn 2614-0047 vol. 5, no. 1, march 2021, pp. 52-57 burhan et.al (modern parenting: an ethical way to nurture children in digital era) parents use this approach when guiding their teenage children on social media. this restrictive mediation refers to general access regulation, by being how long surfing the internet as an example, and when the child wants to access a specific website must ask their parent. it discovered that these regulations are applied more to older than younger children [3]. 2.4. active mediation (internet safety and internet use) active mediation is a method where parents are giving instructions about the use of media to their children. for example, active mediation refers to parent’s conversations with their children about television. in other words, active mediation is parents talking about media content while the child is doing something like watching, reading, and listening to any medium. this method includes positive instruction and negative/critical forms of instruction [9]. 2.5. co-use mediation co-use means that the parent remains present while the child is engaged with the medium. parents share the experience without commenting on the content or its effects [9]. co-viewing happens when parents watch television with their children. while parents may talk to their children about the tv content while watching, it is essential to note that co-viewing takes place regardless of whether active mediation occurs. as a result of this co-viewing, the parent watches tv with their child in a much more passive action. it is essential to distinguish between active mediation and co-viewing since the two concepts reflect unique behavioral forms linked to different effects. this method applies more in the television and gaming category but if the parents have a positive attitude [3]. 3. method a survey is designed and conducted based on multiple-choice questions. the questions are based on seattle public school [1], [2]. this survey is for evaluating current "academic background" parents' activities to their children. the survey questionnaire are including:  first-time children interact with any medium  children personal device and when do the parents allow to have it  what will children do when using technology?  how much time their child spent their day on digital media on weekdays and weekends?  do any parents restrict media content?  parents who are using co-use media, and what media are they using it with their child/children.  parents respond on what they did when their children experienced online risk, 4. results and discussion from the survey results, we have received 18 samples. the most responders are father 13/18 and for mother is 5/18. most respondents are parents aged 30 to 40 years. respondents have different educational backgrounds. most parents with a master's background amounted to 66.7% for a doctoral degree has a value of 27.6%, for the rest is the value of a bachelor's degree. furthermore, most respondents have an internet connection network at home, with respondents getting a score of 50% and only 16.7% who do not have private internet access. children of the majority of respondents are in high school and early childhood education, and also some are still in junior high school. based on the survey, are 50% of children have digital media (computers) in their bedroom, with only three out of 5 mothers disallowing their children to have digital media in the bedroom. interestingly, four out of eighteen allow their children to have personal digital media at the age of 46 years old. meanwhile, most parents allow them to have personal digital media when they are 7-12 years old by 38.9% (fig. 1). the ideal age for children to have personal smartphones or any digital media is mid to late teenage because parents might explain the guide fully. also, children are a little bit more mature and efficiently understand and process information at this age. fig. 2 presents children's activity on digital media. issn 2614-0047 bulletin of social informatics theory and application 55 vol. 5, no. 1, march 2021, pp. 52-57 burhan et.al (modern parenting: an ethical way to nurture children in digital era) fig. 1. children's age are allowed to have personal digital media fig. 2. children activity on digital media most parents allow their children to spend their day on digital media on weekdays (fig. 3) and weekends few hours or less than that (fig. 4). nevertheless, only 4 out of 18 allow them to spend almost a day on the weekend. fig. 3. children spend time on weekdays fig. 4. children spend time on weekend fig. 5 shows that most parents-children use smartphones rather than television or other media but do not reduce child's interest in using books, which is proven by the balanced use of books and smartphones in the survey results. 56 bulletin of social informatics theory and application issn 2614-0047 vol. 5, no. 1, march 2021, pp. 52-57 burhan et.al (modern parenting: an ethical way to nurture children in digital era) fig. 5. parent-child spend their time together only 66.7% of parents restrict website content or upload photos (fig. 6). website content can be illegal sites or adult content. uploading photos could be like sending or sharing to an anonymous user. fig. 6. parents who are restrict digital contents then parents are giving personal digital media in the form of a smartphone to children at the age of 7-12 years of age, and children should often interact with peers rather than smartphones. accordingly, the ideal age for giving a smartphone is 16-18 years old. at that age, children will easily understand and process information that is positive for themselves or negatively impacts. for the problem of accessing the internet, we should better direct it towards education rather than just accessing games, entertainment, and other entertainment media. parents must be firm with their children. being assertive does not mean restraining. parents must manage smartphone use in children by reducing the interaction of smartphone usage on the days when school portions are reduced. nevertheless, have to be fair on weekends and give them more time to interact with smartphones, but they have to manage usage and not take it easy. as for monitoring, the results are positive for parents who monitor their children's social media activities because watching them can give advice or support that should or should be done on social media. however, parents should also use active mediation while monitoring their children, and when the child reaches a late teenage, monitoring is unnecessary. 5. conclusion this paper concludes that parenting in this era is very complex because of the emerging digital technology. restrictive mediation limits children to use of media for their physical and psychological health. on the other hand, less restriction is suitable for late teens. active mediation is effective until they mature enough to process information. co-viewing is necessary as it paves the way for the child to get along and close to their parents. parents must combine all known mediations into one. references [1] d. lupton, s. pedersen, and g. m. thomas, “parenting and digital media: from the early web to contemporary digital society,” sociol. compass, vol. 10, no. 8, pp. 730–743, aug. 2016. [2] k. l. mills, “possible effects of internet use on cognitive development in adolescence,” media commun., vol. 4, no. 3, pp. 4–12, jun. 2016. issn 2614-0047 bulletin of social informatics theory and application 57 vol. 5, no. 1, march 2021, pp. 52-57 burhan et.al (modern parenting: an ethical way to nurture children in digital era) [3] d. holoway, l. green, and s. livingstone, “zero to eight: young children and their internet use,” london, 2013. [4] s. l. connell, a. r. lauricella, and e. wartella, “parental co-use of media technology with their young children in the usa,” j. child. media, vol. 9, no. 1, pp. 5–21, jan. 2015. [5] j. a. rode, “digital parenting: designing children’s safety,” in people and computers xxiii celebrating people and technology (hci), 2009. [6] d. šmahel and l. blinka, “excessive internet use among european children,” in children, risk and safety on the internet: research and policy challenges in comparative perspective, s. m. livingstone, l. haddon, and a. gorzig, eds. bristol: the policy press, 2012, pp. 191–204. [7] a. duerager and s. livingstone, “how can parents support children’s internet safety?,” london, 2012. [8] s. livingstone and e. j. helsper, “parental mediation of children’s internet use,” j. broadcast. electron. media, vol. 52, no. 4, pp. 581–599, nov. 2008. [9] s. m. coyne et al., “parenting and digital media,” pediatrics, vol. 140, no. supplement 2, pp. s112–s116, nov. 2017. [10] p. nikken and j. jansz, “developing scales to measure parental mediation of young children’s internet use,” learn. media technol., vol. 39, no. 2, pp. 250–266, apr. 2014. bulletin of social informatics theory and application issn 2614-0047 vol. 3, no. 2, december 2019, pp. 61-68 61 https:doi.org/10.31763/ businta.v3i2.175 global industry perspective of halal cosmetics applying sales and distribution process based on enterprise resources planning khairen niza mefid 1,*, ari yanuar ridwan 2, warih puspita sari 3 faculty of industrial engineering, telkom university, bandung, indonesia 1 khairennizam@gmail.com *; 2 ari.yanuar.ridwan@gmail.com; 3 warihpuspita@gmail.com * corresponding author 1. introduction the cosmetics industry is a contract manufacturing industry engaged in beauty. this industry carries out the process of product development, manufacturing, packaging, sales and distribution for skincare, as well as for the professional skincare label industry. however, only a small number of cosmetic companies have halal certification. cosmetics that are not halal mean in the manufacturing process using illicit substances according to islamic religious rules. non-halal cosmetics means that during the manufacturing process, the factory used non-permissible substances according to islamic rules. the cosmetics industry needs a system that integrates its business processes and monitor processes following halal standardization. an integrated system should be able to manage, monitor and minimize errors in the company. the integration of information systems or appropriate technology can support the company's business plans and development, which will later provide added value in the form of comparative disadvantage in business competition [1], [2]. one information technology that is available to support the business process is enterprise resource planning (erp). erp is the core software used by companies to integrate every business process in order to support the management reporting process [3]. one erp application that is often used is open erp (odoo). this business application has complete modules from sales, crm, project management, warehouse management, manufacturing, financial management, and human resources, as well as many supporting modules. odoo has several characteristics, such as customizable, comprehensive, modular, and open-source [4]. one of the modules, the sales module, allows users to manage and classify sales orders in a structural and hierarchical system. users are allowed to make new orders and review existing orders in various countries. order confirmation can automatically set the delivery schedule for goods, invoices and time determined by the settings in each order. in this module, the a r t i c l e i n f o a b s t r a c t article history received september 2, 2019 revised september 29, 2019 accepted october 10, 2019 the cosmetics industry has several business processes from procurement to sales and distribution of products; thus, it requires a system that can integrate and monitor business processes under halal standardization. this paper discusses the use of erp systems in the application of odoo 10.0 halal sales and distribution modules using the asap (accelerated sap) method. halal system integration allows users to find out the sales results in real-time and can do documentation in the form of customer data, quotations, sales orders, invoices, delivery orders. in addition, the main element is the halal report on sales management that can store and show reports for the marketing department. this halal erp system can be adapted to the needs of companies to face global challenges. this is an open access article under the cc–by-sa license. keywords global industry halal cosmetics sales and distribution process http://creativecommons.org/licenses/by-sa/4.0/ http://creativecommons.org/licenses/by-sa/4.0/ 62 bulletin of social informatics theory and application issn 2614-0047 vol. 3, no. 2, december 2019, pp. 61-68 mefid et.al (global industry perspective of halal cosmetics applying sales and distribution process…) seller acquired all the information needed in just one screen and can control the ordering and shipping of goods. the sales management module is very close to the manufacturing and warehouse modules. this paper aims to discuss the inclusion of halal reports on business processes, mainly cosmetics industry sales and distribution. this model employed asap, a methodology recommended by sap for other companies if they intend to implement erp system applications [5]. the asap methodology is a methodology that has a structured roadmap that is accessible to determine strategy. the phases included are project preparation, blueprint, realization, final preparation and go-live support [6]. also, it discusses the views of the international community regarding the halal industry which primarily implements erp. 2. global perspective of halal cosmetics industry the total of the global islamic population is massive, and it is still increasing. there are in excess of 2 million muslims who are spread more than 112 nations, crosswise over different areas such as the organization of islamic cooperation (oic) nation (1.4 billion), asia (805 million), africa (300 million), the middle east (210 million), europe (18 million), and north america (8 million) [7]. with muslims currently making up one-fourth of the total global population, the markets’ development is tremendous. one of the main issues for muslim consumers is the need for halal products. the halal industry covers food, non-food products such as pharmaceuticals and cosmetics, and services, including logistics, tourism, and marketing. especially in the cosmetics industry, market development is reflected by a customer insight about the ingredients used and product awareness. the fundamental driver for this massive need in halal cosmetics and beauty care products comes from the statistic of teenagers, religiously cognizant, and dynamic expert muslim population. in the extent of halal cosmetics, the idea covers essential parts of production, for example, permissible ingredients and use of permissible substances which must be made, stored, packaged, and delivered following shari requirements [8]. the market for halal beauty care products is blasting in the middle east and asia. over the middle east, halal beauty care products are enlisting a 12% yearly development coming to usd12 billion in total value of cosmetic related sales. markets in asia, especially malaysia and indonesia, just as europe, have seen a flood in enthusiasm for halal cosmetics [9]. the cosmetics business needs to understand customer concerns, awareness, expectations, use of halal cosmetics. it will assist them in earning more profit. halal cosmetics are convenient for both muslims and non-muslim in terms of ingredients, procedure, and nature of the items. in this way, association and brands of cosmetics need to create specialty market of halal cosmetics to do design up to some expand adequately in muslim religiosity [10]. the worldwide halal cosmetics market will prosper that meets the religious necessities of muslims. expanded degree of education and awareness, expanded the need to build up, and create general gauges for halal items including cosmetics. it is significant for the cosmetics industry to satisfy customers' needs and make the benefit alongside satisfying the social obligations to fulfill cognizant wellbeing customers. research on halal products expanded awareness to support manufacturers, producers, and marketers ought not just to consider how to increase the profit, yet in addition, they have to know initial preparation about halal to urge them to makes really halal products. researchers argue that buyers tend to choice halal product and they are pleased to pay more for halal-labeled brands [11]. 3. business process of halal cosmetic industry the business process of the halal cosmetic industry consists of various features. there are nine features, which will be detailed in the next sections. 3.1. halal customer cosmetics factories need a system that is capable of storing halal customer data. commonly, the customer data collection process only uses forms. development of a sales management module, allows customer information or data to be stored and configured on the customer features. fig. 1 shows the customer form contained in the odoo application. there are some data needed such as an address for the customer's address and product delivery, phone number, email to send issn 2614-0047 bulletin of social informatics theory and application 63 vol. 3, no. 2, december 2019, pp. 61-68 mefid et.al (global industry perspective of halal cosmetics applying sales and distribution process…) quotations to customers, and language options. in addition, it shows in the figure that there is a custom field, the demands for halal products field. the field is used to determine the demand for halal products needed by the customer. fig. 1. halal customer 3.2. halal quotation cosmetics factories need a form to offer halal products sent to customers. after being confirmed by the customer, it will become a sales order. in the application, the bidding process is still done manually and orally between the marketing and customer sections. in the future, the product offering process (quotation) conducted on sales management can be stored in a database. quotations can be sent directly to customers through send by email feature. after the confirmation from the customer, it can be generated into a sales order (data ordering goods). also, it allows customizing the halal fields needed in product offerings. fig. 2 shows the quotation form (product offer form). the form contains information about customer data, invoice address, delivery address, order date, expiration date, and payment terms. there is a custom field in fig. 2, namely the demands of the field for halal products and a total of halal-certified products. the customization is carried out to determine the demand for halal products and the total of products that have halal certification in the company. the quotation can be sent directly to the customer by clicking the send by email button. fig. 2. halal quotation 64 bulletin of social informatics theory and application issn 2614-0047 vol. 3, no. 2, december 2019, pp. 61-68 mefid et.al (global industry perspective of halal cosmetics applying sales and distribution process…) 3.3. halal sales order fig. 3. halal sales order ideally, users need a system that can send halal sales order documents directly with integrated information. however, usually, sales orders are sent to the production department in the form of documents that are created manually. in the upcoming future, with the integration of sales management and manufacturing, the sales order will automatically become a manufacturing order. fig. 3 shows the sales order form. the sales order form is generated from the quotation form after it has been sent to the customer and received confirmation from the customer; the manager can click the confirm sale button. 3.4. halal shipping in the shipping process, there needs to be a system that regulates the process of moving halal products to customers. recently, no system regulates the process of moving the finished product to the customer. in the upcoming future, when the manufacturing department has produced the goods, then the product will be picked up for packing and transferring in the form of a delivery order to the customer according to the sales order. odoo can do customization to check products according to halal standardization. fig. 4. halal shipping issn 2614-0047 bulletin of social informatics theory and application 65 vol. 3, no. 2, december 2019, pp. 61-68 mefid et.al (global industry perspective of halal cosmetics applying sales and distribution process…) in fig. 4, a delivery order form is a form that contains partner data (product ordering) and products that will be sent to the customer. on the delivery order form, there is a customization of halal product specifications that are used to determine whether or not a product complies with halal provisions. 3.5. halal return in the return process, the system requires checking the compatibility between the order data and the halal product sent. in the current system conditions, there is no system that regulates the process of returning goods from customers to companies. when goods that have been produced will be sent to the customer, there is a system that is able to document defect products thus the products that arrive at the customer are halal products. in fig. 5, it shows the order delivery form. there are customizations of the halal product specifications tab with the fields of the total of smelly products, total of damaged products, total of transport according to sjh, total of product change color and total of halal products. these fields allow users to identify the total defect product. to do the return, users can click the cancel button. thus, the customers will receive the halal product. fig. 5. halal return 3.6.the invoice process it requires a system to create invoices based on customer orders and find out the payment status. however, billing payments are still manually done by employing microsoft excel (spreadsheet program). ideally, the system can create a sales invoice that is integrated with the payment register. in fig. 6, it addresses the invoice, which is generated from the sales order. the system can create sales invoices that are integrated with the payment register. 66 bulletin of social informatics theory and application issn 2614-0047 vol. 3, no. 2, december 2019, pp. 61-68 mefid et.al (global industry perspective of halal cosmetics applying sales and distribution process…) fig. 6. invoice process 3.7.report quotation it requires a system design that can display reports on customer orders within a period (months). however, no system regulates the product ordering report process. ideally, the system can create a customer order report that is in the sales management module in the quotation section by customizing it. fig. 7 presents the results of the report quotation that occurred in may. the report contains the total product offerings and a total of halal-certified products. fig. 7. report quotation 3.8.halal sales orders report it requires a system design that can display reports on customer percentage orders within a period (months). however, no system regulates the product sales report process. ideally, the system can create a customer order report that is in the sales management module in the quotation section by customizing it. fig. 8 shows the results of a sales order report that occurred in may. the report contains total product sales and a total of halal-certified products. issn 2614-0047 bulletin of social informatics theory and application 67 vol. 3, no. 2, december 2019, pp. 61-68 mefid et.al (global industry perspective of halal cosmetics applying sales and distribution process…) fig. 8. sales order report 3.9.halal picking operation report users need a system that can display reports for the process of product picking or picking operation. however, no system regulates the report picking operation process. ideally, the system can create custom order reports, namely in the inventory management module, in the delivery order section by customizing. in fig. 9, it shows the results of the report picking operation. the report contains the products ordered, the number, the total of the product defects. this reporting is needed for company documentation. fig. 9. picking operation report 68 bulletin of social informatics theory and application issn 2614-0047 vol. 3, no. 2, december 2019, pp. 61-68 mefid et.al (global industry perspective of halal cosmetics applying sales and distribution process…) 4. conclusion halal system integration allows users to find out sales results in real-time and can do documentation in the form of customer data, quotations, sales orders, invoices, delivery orders, and generates halal reports on sales management that are capable of saving and showing reports for the marketing department. this halal system design can be adjusted to the needs of the company in order to overcome the problems faced by the industry. references [1] a. tarhini, h. ammar, t. tarhini, and r. e. masa’deh, “analysis of the critical success factors for enterprise resource planning implementation from stakeholders’ perspective: a systematic review,” int. bus. res., vol. 8, no. 4, pp. 25–40, 2015. [2] c. j. costa, e. ferreira, f. bento, and m. aparicio, “enterprise resource planning adoption and satisfaction determinants,” comput. human behav., vol. 63, pp. 659–671, 2016. [3] y. yılmaz and g. ozcan, “implementing erp-systems with accelerated erp more efficient and quickly– a best practice,” j. syst. integr., vol. 2, no. 3, pp. 28–37, 2011. [4] a. ganesh, k. n. shanil, c. sunitha, and a. m. midhundas, “openerp/odoo-an open source concept to erp solution,” in 2016 ieee 6th international conference on advanced computing (iacc), 2016, pp. 112–116. [5] f. tasevska, t. damij, and n. damij, “project planning practices based on enterprise resource planning systems in small and medium enterprises—a case study from the republic of macedonia,” int. j. proj. manag., vol. 32, no. 3, pp. 529–539, 2014. [6] m. wang, “integrating erp/sap to information systems 2010 curriculum: design and delivery,” inf. syst. educ. j., vol. 9, no. 5, p. 97, 2011. [7] i. a. latif, z. mohamed, j. sharifuddin, a. m. abdullah, and m. m. ismail, “a comparative analysis of global halal certification requirements,” j. food prod. mark., vol. 20, no. sup1, pp. 85–101, 2014. [8] m. a. hassali, s. k. al-tamimi, o. t. dawood, a. k. verma, and f. saleem, “malaysian cosmetic market: current and future prospects,” pharm. reg aff., vol. 4, no. 4, pp. 155–157, 2015. [9] h. elasrag, “halal industry: key challenges and opportunities,” munich pers. repec arch., no. 69631, 2016. [10] m. b. majid, i. sabir, and t. ashraf, “consumer purchase intention towards halal cosmetics & personal care products in pakistan,” glob. j. res. bus. manag., vol. 1, no. 1, 2015. [11] s. ali, f. halim, and n. ahmad, “beauty premium and halal cosmetics industry,” j. mark. manag. consum. behav., vol. 1, no. 4, 2016. bulletin of social informatics theory and application issn 2614-0047 vol. 1, no. 1, march 2017, pp. 34-40 34 https://doi.org/10.31763/businta.v1i1.23 seismic analysis using maximum likelihood of gutenbergrichter arum handini primandari 1,*, khusnul khotimah 2 department of statistics, islamic university of indonesia, indonesia 1 primandari.arum@uii.ac.id *; 2 khusnul.khotimah@student.uii.ac.id * corresponding author 1. introduction an earthquake is natural disaster which occur as result of seismic wave released by earth crust [1]. it happens mostly triggered by the rupture of geological faults and volcano activities which cause mild to severe tremor. other causes such as landslide, mine blast, and nuclear test may result mild tremor. to measure the velocity of seismic wave, an instrument called seismograph is used [2]. this instrument is installed under the earth’s surface and is connected to seismogram (a device to record ground motion). seismogram works by recording the ground motion which is visualized through vertical waves [3]. unlike seismograph, seismogram is placed in an observation station. to define the size of the magnitude of earthquake, a scale named richter scale is developed. this scale is determined from the base-10 logarithm of the amplitude of seismic waves [4]. the latitude of d.i. yogyakarta, indonesia is -7.797068, and the longitude is 110.370529. d.i. yogyakarta is located in java which lies on convergent plateau zone where the indo-australian plate is sub ducted under the eurasian plate. the offshore plate movement will suppress the onshore plates which is located near d.i. yogyakarta. therefore, d.i. yogyakarta has highly possibility to encounter earthquakes. there are many considerable researches conducted to predict the place and time the earthquake likely happens. however, until now there is no definite method that can precisely predict the occurrence of earthquake. the least the researcher can do is to conjecture the potential tremor to occur. thus, we can make any effort to reduce the impact of the catastrophe. aki and utsu proposed estimator obtained from maximum likelihood method [5]. this estimator is called b-value which used to determine seismicity rate. since it is an estimator, there are the uncertainty factor (bias) [6]–[8]. the probability of earthquake may be obtained since the seismicity rate had been calculated [6], [9]. a r t i c l e i n f o a b s t r a c t article history received december 21, 2016 revised january 14, 2017 accepted february 4, 2017 an earthquake is one of catastrophe which often claim numerous lives and cause great damage to infrastructure. multiple studies from various field have been conducted in order to make a precise prediction of earthquake occurrence, such as recognizing the natural phenomena symptoms leading to the shaking and ground rupture. however, up till now there is no definite method that can predict the time and place in which earthquake will occur. by assuming that the number of earthquake follow gutenberg-richter law, we work b-value derived using maximum likelihood method to calculate the probability of earthquake happen in the next few years. the southern sea of d.i. yogyakarta was divided into four areas to simplify the analysis. as the result, in the next five years the first and second area have high enough probability (>0.3) to undergo more than 6.0-magnitude earthquake. this is an open access article under the cc–by-sa license. keywords earthquake gutenberg-richter maximum likelihood probability prediction http://creativecommons.org/licenses/by-sa/4.0/ http://creativecommons.org/licenses/by-sa/4.0/ issn 2614-0047 bulletin of social informatics theory and application 35 vol. 1, no. 1, march 2017, pp. 34-40 seismic analysis using maximum likelihood of gutenberg-richter the gutenberg-richter (gr) distribution is widely used to show statistical relation, 𝑙𝑜𝑔 10 𝑁(𝑀) = 𝑎 − 𝑏𝑀   where n(m) is the number of earthquake with magnitude equal to or greater than m, a and b are constants which show level and the character of seismicity in the region of concern. using maximum likelihood method, the estimator called b-value is derived. since b-value is obtained, we also can get the value of a. seismic activity of d.i. yogyakarta is able to be quantified by parameters that are seismicity index, probability of tremor occurrence, and return period of the highest tremor within the area. the probability describes the risk of earthquake including only seismic information, without others factor such as geology structure, population density, quality of infrastructure, etc. the hazard risk of tremor is useful for construction planning. therefore, we can build the earthquake resistant buildings. earthquakes are classified into some categories from minor to great. this research calculated the probability of tremor with 4.0 magnitude or more which potentially destructive. the outline of this paper was arranged as follow, first introduction described the background of research. second, problem formulation states what this research would do. method, the third outline, explains the source of data and the tools which is used to analyze the data. the seismic analysis of d.i. yogyakarta was provided in fourth section. the conclusion and open problem, successively was written in fifth and sixth section. 2. problem formulation to describe the seismicity condition in d.i. yogyakarta from 2011 – 2015, we need a series of measurable parameters. this study is to quantify these parameters that are seismicity index, earthquake probability, and return period. the b-value and a which are obtained from maximum likelihood method, used to draw the seismicity index. this index represents the number of earthquake occurrence with magnitude equal to or more than m0. since seismicity index is given, the problem is how to calculate the probability for an area to encounter a number of earthquakes with magnitude equal to or more than m0 and the return period. return period indicates the repetitive interval (in years) of earthquake to occur. in this research we analyzed the tremor which have magnitude equal to 4.0 (on the richter scale) or more. 3. method 3.1. data earthquake data from 2011 – 2015 is obtained from subsection data and information of meteorology climatology and geophysics agency (bmkg) of d.i. yogyakarta. the epicenter of earthquake located in southern offshore of d.i. yogyakarta divided into six areas. 1. area 1 : -8.26° – -9,31° latitude and 110,01° – 110,47° longitude 2. area 2 : -8,26° – -9,31° latitude and 110,47° – 110,93° longitude 3. area 3 : -9,37° – -10,37° latitude and 110,01° – 110,47° longitude 4. area 4 : -9,37° – -10,37° latitude and 110,47° – 110,93° longitude 5. area 5 : -10,37° – -11,42° latitude and 110,47° – 110,93° longitude 6. area 6 : -10,37° – -11,42° latitude and 110,01° – 110,47° longitude 36 bulletin of social informatics theory and application issn 2614-0047 vol. 1, no. 1, march 2017, pp. 34-40 seismic analysis using maximum likelihood of gutenberg-richter fig. 1. the division of earthquake zone we did not include area 5 and 6 into analysis because it has few tremors. there was even no tremor with magnitude more than 5.0 richter. moreover, area 5 and 6 is far from d.i. yogyakarta onshore. 3.2. gutenberg-richter law in seismology, the gutenberg-richer (g-r) law holds [10], 𝑙𝑜𝑔 10 𝑁 (𝑀) = 𝑎 − 𝑏 (𝑀 − 𝑀0; 𝑀 ≥ 𝑀0)   where n ( m ) is the number of earthquake in particular magnitude m, m0 is the minimum magnitude above which all earthquake within a certain region are recorded. parameter b, called bvalue, and parameter a are constant related to seismicity rate. 1) maximum likelihood estimator (mle) equation (1) implies that magnitude distributed exponentially [10]: 𝑝(𝑀) = 𝛽𝑒 −𝛽(𝑀−𝑀0); 𝑀 ≥ 𝑀0   where, β = bln(10), p(m) is the probability density function of m. mle of b-value was derived by: a) the likelihood function defines as follows: 𝐿(𝑀) = ∏ 𝛽𝑒 −𝛽(𝑀𝑖−𝑀0)𝑛𝑖−1  = 𝛽𝑛𝑒 −𝛽 ∑ (𝑀𝑖−𝑀0) 𝑛 𝑖=1    b) the natural logarithm of likelihood function is given below: ln 𝐿 (𝑀) = 𝑛 𝛽 − 𝛽 ∑ (𝑀𝑖 − 𝑀0) 𝑛 𝑖=1      issn 2614-0047 bulletin of social informatics theory and application 37 vol. 1, no. 1, march 2017, pp. 34-40 seismic analysis using maximum likelihood of gutenberg-richter c) define the parameter β which optimized the log logarithm likelihood function by taking the derivative and setting it equal to 0. 𝜕 ln 𝐿 (𝑀) 𝜕𝛽 = 𝑛 𝛽 − ∑ (𝑀𝑖 − 𝑀0) = 0 𝑛 𝑖=1    𝛽 = 1 �̅�− 𝑀0    by substituting β = bln(10) to equation (7), we obtain the mle of β : �̂� = 1 �̅�−𝑀0    thus we have mle of parameter β which called b-value. instead of equation (8), this research used the modified b-value below. �̂� = log 𝑒 �̅�−(𝑀0− ∆𝑀/2 )    in practice, magnitude is rounded into ∆m, usually ∆m = 0.1 . the uncertainty of b-value defines as follow [11]: �̂�𝑏 2 = �̂� √𝑁    where n is the number of earthquakes occurrence. shi and bolt provide formula to estimate the error of b-value that is [11]: �̂�𝑏 = 2.30�̂� 2√ ∑ (𝑀𝑖− �̅�) 2𝑁 𝑖=1 𝑁 (𝑁−1)    compared equation (10), equation (11) have reliable estimation for b-value error. parameter a and b in g-r distribution are constant. the value of a is formulated as follow [7]: �̂� = 𝑙𝑜𝑔10 ( 𝑁(𝑀) 𝑇 ) + 𝑏𝑀0 ; 𝑀 ≥ 𝑀0    where t is time interval in which the observation recorded. holding the estimation of parameter a and b, the seismicity index (or rate) of an area with magnitude m ≥ m0 can be written bellow: 𝑁1(𝑀) = 10 �̂�−�̂�𝑀   the formula to determine return period is given bellow: 𝜃 = 1 𝑁1(𝑀)    2) probability the probability of earthquake occurrence with magnitude equal to or more than m within t period, usually called cumulative distribution function, given as follow: 𝑃(𝑀, 𝑇) = 1 − 𝑒 −𝑁1(𝑀)𝑇      38 bulletin of social informatics theory and application issn 2614-0047 vol. 1, no. 1, march 2017, pp. 34-40 seismic analysis using maximum likelihood of gutenberg-richter 4. seismicity analysis of d.i. yogyakarta we define m0 = 4, since the data recorded was all the earthquakes with magnitude more than or equal to 4.0 occurred in different depth. the summary of the data is explained in table 1. table 1. summary of earthquake data of d.i. yogyakarta offshore 2011-2015 no area mmin mmax �̅� n(mmin) 1 area 1 4.0 5.8 4.435 31 2 area 2 4.0 5.5 4.484 19 3 area 3 4.0 4.5 4.300 6 4 area 4 4.1 4.5 4.217 6 in area 1, earthquake with 4.0-magnitude until 5.8-magnitude happened in 10 km until 50 km depth, while the 5.8-magnitude earthquake happened in 50 km depth. the distribution of earthquake based on its depth is showed in fig. 1. meanwhile, others areas’ description was provided in appendix. fig. 2. the distribution of earthquakes based on its depth in area 1 earthquake magnitudes are classified into some categories that are light (4.0-4.9), moderate (5.05.9), strong (6.0-6.9), major (7.0-7.9), and great (>8.0). since the data recorded have more than or equal to 4.0-magnitude, we calculate the seismicity index for 4.1-magnitude. table 2. seismicity index for m ≥ 4.1 no. area m0 b-value a-value n1 m 1 area 1 4 0.895 4.374 5.045 2 area 2 4 0.813 3.833 3.151 3 area 3 4 1.241 5.043 0.902 4 area 4 4 1.627 6.585 0.825 according to table 2, area 1 has seismicity index at 5.045 which means every year area 1 encounters about 5 earthquakes with magnitude more than or equal to 4.1. in area 3 and 4, tremor happen about once for every year. meanwhile, in area 2, tremors happen four times within a year. estimation of b-value error in every area is shown at table 3. issn 2614-0047 bulletin of social informatics theory and application 39 vol. 1, no. 1, march 2017, pp. 34-40 seismic analysis using maximum likelihood of gutenberg-richter table 3. estimation of b-value error no. area m0 b-value ˆ 1 area 1 4 0.895 0.151 2 area 2 4 0.813 0.147 3 area 3 4 1.241 0.259 4 area 4 4 1.627 0.290 the probability having tremor with magnitude more than or equal to 4.1 in the next of five years is showed in table 4. table 4. probability of earthquake with magnitude more than or equal to 4.1 no. area n1(m) p( m ≥ 4.1) 1 area 1 5.045 1.000 2 area 2 3.151 1.000 3 area 3 0.902 0.989 4 area 4 0.825 0.984 in five years ahead, every area is almost certain for having earthquake with given magnitude. d.i. yogyakarta encountered earthquake with 5.9-magnitude for about 57 seconds. this natural disaster caused a lots of deaths, about 5700, and injuries. the epicenter was located near area 1 and 2 in 33 km depth. thus, we took the strong earthquake with minimum magnitude at 6.0 and calculate both seismicity index and the probability for experiencing this earthquake in five years ahead. table 5. seismicity index and probability for m ≥ 6.0 no. area n1 m  p m 6.0 1 area 1 0.100 0.395 2 area 2 0.090 0.362 3 area 3 0.004 0.020 4 area 4 0.001 0.003 the earthquake with magnitude more than 6.0-magnitude may cause a lot of damage. area 1 has the highest probability among the four area for going through this earthquake. 5. conclusion employing maximum likelihood method, we obtain mle called b-value which is used to determine seismicity index. the b-value of earthquake with 4.1 magnitude or more of the four area ranged from 0.895 – 1.627. while seismicity index obtained is about 0.825 – 5.045, which means there are about 1 – 5 times earthquakes happen within a year. since seismicity index provided, the probability was calculated. the probability for having more than or equal 4.1-magnitude tremor in five years ahead is almost certain for all areas. the minimum magnitude for hazardous earthquake was given at 6.0-magnitude. the highest probability for encountering this earthquake is 0.395 which occurred in area 1. meanwhile, the lowest probability is 0.003 which occurred in area 3. whereas, area 1 is closer d.i. yogyakarta onshore than area 3. 6. open problem the formula for determining seismicity rate should consider the depth where the earthquake happen. the shallower the epicenter of earthquake, the more hazardous to the population. 40 bulletin of social informatics theory and application issn 2614-0047 vol. 1, no. 1, march 2017, pp. 34-40 seismic analysis using maximum likelihood of gutenberg-richter references [1] k. d. marano, d. j. wald, and t. i. allen, “global earthquake casualties due to secondary effects: a quantitative analysis for improving rapid loss analyses,” nat. hazards, vol. 52, no. 2, pp. 319–328, 2010. [2] i. koulakov, s. el khrepy, n. al-arifi, i. sychev, and p. kuznetsov, “evidence of magma activation beneath the harrat lunayyir basaltic field (saudi arabia) from attenuation tomography,” solid earth, vol. 5, no. 2, pp. 873–882, 2014. [3] incorporated research institutions for seismology, “how does a seismometer work?,” 2007. [online]. available: https://www.iris.edu/hq/inclass/fact-sheet/how_does_a_seismometer_work. [accessed: 17may-2016]. [4] d. m. boore, “the richter scale: its development and use for determining earthquake source parameters,” tectonophysics, vol. 166, no. 1–3, pp. 1–14, 1989. [5] a. kijko and a. smit, “extension of the aki‐ utsu b‐ value estimator for incomplete catalogs,” bull. seismol. soc. am., vol. 102, no. 3, pp. 1283–1287, 2012. [6] a. barth, f. wenzel, and c. langenbruch, “probability of earthquake occurrence and magnitude estimation in the post shut-in phase of geothermal projects,” j. seismol., vol. 17, no. 1, pp. 5–11, 2013. [7] m. lindman, “physics of aftershocks in the south iceland seismic zone: insights into the earthquake process from statistics and numerical modelling of aftershock sequences,” uppsala university, 2009. [8] c. godano, e. lippiello, and l. de arcangelis, “variability of the b value in the gutenberg–richter distribution,” geophys. j. int., vol. 199, no. 3, pp. 1765–1771, 2014. [9] a. budiman, r. nandia, and m. t. gunawan, “analisis periode ulang dan aktivitas kegempaan pada daerah sumatera barat dan sekitarnya,” j. ilmu fis., vol. 3, no. 2, pp. 55–61, 2011. [10] a. de santis, g. cianchini, p. favali, l. beranzoli, and e. boschi, “the gutenberg–richter law and entropy of earthquakes: two case studies in central italy,” bull. seismol. soc. am., vol. 101, no. 3, pp. 1386–1395, 2011. [11] w. marzocchi and l. sandri, “a review and new insights on the estimation of the b-value and its uncertainty." annals of geophysic 46 (6): 1271-1281.,” ann. geophys., vol. 46, no. 6, pp. 1271–1282, 2003. bulletin of social informatics theory and application issn 2614-0047 vol. 4, no. 1, july 2020, pp. 6-11 6 https:doi.org/10.31763/businta.v4i1.246 data retrieval service on poverty blockchain-based on regional government moh. hidayat koniyo a, 1, *, made sudarma b, 2 a departement of informatics engineering, universitas negeri gorontalo, gorontalo, indonesia b departement of electrical engineering, universitas udayana, bali, indonesia 1 hidayat_koniyo@ung.ac.id; 2 imasudarma@gmail.com; * corresponding author 1. introduction aid funds provided by the government of gorontalo city are currently classified in various types of assistance, with the hope that every family who is less fortunate after obtaining assistance can improve their standard of living so that the poor can be reduced each year. the distribution of aid to disadvantaged communities to regional governments has used a particular application for distributing assistance to disadvantaged people. in principle, these types of assistance are the same and distributed to low-income families can only get one type of assistance, the process of determining and providing assistance so far has used an application that selects the data of lowincome families and assistance, but in its implementation, it is still found assistance which is duplicated, or there is a change in the type of assistance to a family that falls into the category of receiving assistance. the poverty database changes every time the status of a low-income family is processed every year if the family has received assistance; it is expected to improve its standard of living so that in subsequent years it is not included in the low-income family. thus, it is important to ensure that data cannot be manipulated and the user can have evidence of what data was taken from the database of poverty families at certain times as a result of the request. good data collection services must meet at least two requirements, namely integrity and nonrepudiation [1]. integrity is a query and the data retrieved cannot be modified (intentionally or unintentionally), when the retrieval operation is complete. non-repudiation means that in view of past retrieval operations, poverty data retrieval services cannot validly reject data that has been provided by the service in response to requests given at a certain time [1]. this is what underlies the need for a block chain-based poverty data collection service that can seal each other's requests and results in every time a certain party requests distribution of assistance a r t i c l e i n f o a b s t r a c t article history received december 23, 2019 revised january 20, 2020 accepted february 3, 2020 the distribution of assistance to disadvantaged people in an area is always synonymous with problems especially, in the duplication of assistance and manipulation of family data that actually has no right to obtain assistance data for underprivileged families. to ensure the integrity of the data taken is not duplicated and non-repudiation, the blockchain-based poverty data collection plan is one solution. the purpose of this research is to ensure that the data retrieved cannot be modified after data retrieval, and the database cannot validly deny that the data has been provided as a result of a particular request. the feasibility of the proposed service using the blockchain method is a request from the poverty database in the form of low-income family data and assistance type data that are placed in the blockchain series and tested with hash values that have been created from the blockchain. this is an open access article under the cc–by-sa license. keywords service poverty data integrity non-repudiation blockchain mailto:hidayat_koniyo@ung.ac.id http://creativecommons.org/licenses/by-sa/4.0/ http://creativecommons.org/licenses/by-sa/4.0/ issn 2614-0047 bulletin of social informatics theory and application 7 vol. 4, no. 1, july 2020, pp. 6-11 koniyo & sudarma (data retrieval service on poverty blockchain-based on regional government) to families who get help from a poverty database, so matters relating to duplication of low-income family data and low-income family status can be avoided. nowadays, there is a great belief that blockchain technology will revolutionize the health care industry [2], and reviews about the advantages and challenges of using blockchain technology [3], [4]. 2. method 2.1. integrity and non-repudiation data integrity and repudiation are important things in application development. in article [5] mentions a list that compares various methods to achieve integrity, authenticity, non-repudiation, and evidence of existence. furthermore, to provide a completed and structured overview of security requirements in the field of cloud computing solution [6], in addition to large-scale data processing that is distributed on mapreduce [7] and ad hoc vehicle networks (vanet) [8], are aspects of security and privacy on this technology. common methods that used to ensure data integrity are backing up data, checksum techniques or using hash cryptographic [9]. this method has input length data and outputs a fixed-sized bit sequence. it has a one-way function, for example, internationally it is not feasible to calculate input from output, and it is deterministically, that is, a specific input that provides the same output. a slight change of input will produce a different output. so that, to ensure message integrity, a hash cryptographic functions can be used to calculate the message of hash values. on the other hand, the message integrity can be checked by comparing the initial hash value, which is stored with the hash value provided by the same hash cryptographic function in that message. the technique often used on handling non-repudiation is a digital signature [9], an analogy from handwriting or manuals. for instance, the sender signed a message generated by a hash function which cryptographically secured. then, the digital signal is implemented using asymmetric cryptography, by a pair of public keys to ensure there is no rejection, where the sender signed the message with the private key and the recipient uses the sender's public key to validate the signature. 2.2. blockchain technology the application of blockchain technology has been applied to the demanding of biomedical data consumers (human or similar programs) who can get accurate data from biomedical database references [1]. blockchain is a distributed transaction management technology that cannot be updated by certain parties. the first blockchain technology was proposed and implemented in bitcoin [10], with whom users can make transactions without regulators need (for example in banks). besides, there is ethereum [11], whom everyone can participate, and hyperledger fabric [12], that only approved parties can post to the blockchain. in a blockchain, each new transaction is placed on a network of distributed nodes, after all nodes have agreed that the transaction is valid, the transaction is added to the block. each block contains a timestamp, hash from the previous block, and transaction data so that a chain is created which doesn't change and adds up only. a copy of the entire blockchain is managed by each participating node. within each block, transaction data is encoded in a hash tree [13]. many applications use blockchain technology including the her integration [14], sharing and access control [15], [16], preservation [17] and overall management [18], [19], so that, the distribution of assistance to poverty families in local governments needs to be developed using this blockchain technology. 2.3. poverty data request service architecture fig. 1 shows the architecture of poverty data collection services, where the main components are users, nodes/programs, databases, and blockchain. the service process mechanism starts from all users making requests (queries) to the blockchain system through the node, the node will retrieve its blockchain data, and if needed, the node will request db poverty data through the db api client. furthermore, the results of requests are placed in each block, which continues to grow according to family data requests and types of assistance. then the blocks are sent in the blockchain with the hash value of each block. retrieval results and information are then validated in the blockchain to avoid manipulation of aid distribution data to low-income families, and it is almost certain that there is no duplication of beneficiary data. 8 bulletin of social informatics theory and application issn 2614-0047 vol. 4, no. 1, july 2020, pp. 6-11 koniyo & sudarma (data retrieval service on poverty blockchain-based on regional government) fig. 1. poverty data request service architecture 3. results and discussion the results obtained from the application of blockchain technology in the distribution of assistance to regional governments are carried out in two scenarios, namely querying the data and testing the validity of the data channeling the assistance as shown in fig. 2 the data query algorithm and fig. 3 the testing algorithm. in fig. 2, shows a request service workflow to determine which families get this type of assistance using blockchain technology, where the flow starts from requests on client applications (nodes), the results of these requests are in the form of querying low-income family data and the type of assistance that has already received assistance. furthermore, checking the query results of the data query, if the query does not exist, then it will form a new data block which will then be added to the blockchain. results both from the old block and from the new block are displayed to the user. fig. 2. data request algorithm to find out whether the hash of the query results is fitting with the previous user's request, then it is done by checking the hash, as shown in fig. 3 of the hash proof algorithm. the principle of proof of hash with four conditions, namely:  the hash is invalid or unproven  the hash is valid with the condition that there are already new results in the blockchain  the hash is valid with the condition that there is no new result yet from the transaction database.  the valid hash with the condition that there is no new result from the blockchain, but there is already a new result from the transaction database. user db poverty node node node block block block block block issn 2614-0047 bulletin of social informatics theory and application 9 vol. 4, no. 1, july 2020, pp. 6-11 koniyo & sudarma (data retrieval service on poverty blockchain-based on regional government) fig. 3. hash proof algorithm interfaces of family data requests and types of assistance for cases (a) that have been received, (b) that have not been received (data are in the blockchain) and (c) have never received assistance (data is not in the blockchain, so it is requested from the database and added to the new blockchain). as shown in fig. 4. query results by entering the family code in a blockchain for cases (a) that have not and (b) that have received aid in the blockchain obtained query results in the form of family data with the status of receiving and not receiving and the hash of the result of the query block in the blockchain. for case (c), which has never received aid (not in the blockchain), the query is sent to the database and entered in the new blockchain. interface testing (validation) hash data receiver and type of help for the case (a) invalid hash, (b) valid hash, with the condition that there is already a new result on the blockchain, (c) valid hash, with the condition, that there is no new result from the db (d) valid hash, with the condition that there is no new result from the blockchain but there is already a new result from the db. a b c fig. 4. the query data interface from the blockchain 10 bulletin of social informatics theory and application issn 2614-0047 vol. 4, no. 1, july 2020, pp. 6-11 koniyo & sudarma (data retrieval service on poverty blockchain-based on regional government) a b c d fig. 5. the hash testing interface the results of hash testing by entering hash values in the blockchain are two possibilities, namely valid and invalid. for case (a), the hash value is tested if it is not appropriate, then the result is a hash value that is invalid or not appropriate. for case (b), the hash value is tested if it is suitable, then the result is a valid hash value with the condition that there is a recent result on the blockchain. for case (c) the hash value is tested, the result is a valid hash value, with the condition that there is no new result from the db, and for case (d) the hash value is tested, the result is a valid hash value, with the condition that there is no new result in the blockchain but has already a new result from db. 4. conclusion this paper is one of the solutions for collecting poverty data in regional governments with the hope of minimizing data manipulation on the distribution of aid to low-income families. the service developed in taking data uses the blockchain method, where the process is carried out in a poverty database to request family data and types of assistance by checking on the blockchain for the status of receiving assistance and not receiving assistance. for the condition of the data contained in the blockchain, there are two statuses, they have received assistance and have not yet received assistance. as for data that is not in the blockchain, it is requested in the database and added to the new blockchain. for testing hash values, there are two possibilities, namely invalid hash value or not appropriate and valid hash value. for valid conditions, there are three states, namely valid hash values with new result conditions on the blockchain, with conditions, there are no new results from the database, and with conditions, there are no new results from the blockchain but there are new results from the database. thus data retrieval using the blockchain method can be an effective solution to prevent manipulation of beneficiary data in the case of aid distribution in a regional government. references [1] a.-s. kleinaki, p. mytis-gkometh, g. drosatos, p. s. efraimidis, and e. kaldoudi, “a blockchain-based notarization service for biomedical knowledge retrieval,” comput. struct. biotechnol. j., vol. 16, pp. 288–297, 2018. issn 2614-0047 bulletin of social informatics theory and application 11 vol. 4, no. 1, july 2020, pp. 6-11 koniyo & sudarma (data retrieval service on poverty blockchain-based on regional government) [2] m. mettler, “blockchain technology in healthcare: the revolution starts here,” in 2016 ieee 18th international conference on e-health networking, applications and services (healthcom), 2016, pp. 1–3. [3] t.-t. kuo, h.-e. kim, and l. ohno-machado, “blockchain distributed ledger technologies for biomedical and health care applications,” j. am. med. informatics assoc., vol. 24, no. 6, pp. 1211–1220, 2017. [4] m. n. k. boulos, j. t. wilson, and k. a. clauson, “geospatial blockchain: promises, challenges, and scenarios in health and healthcare.” biomed central, 2018. [5] m. vigil, j. buchmann, d. cabarcas, c. weinert, and a. wiesmaier, “integrity, authenticity, nonrepudiation, and proof of existence for long-term archiving: a survey,” comput. secur., vol. 50, pp. 16– 32, 2015. [6] i. iankoulova and m. daneva, “cloud computing security requirements: a systematic review,” in 2012 sixth international conference on research challenges in information science (rcis), 2012, pp. 1–7. [7] p. derbeko, s. dolev, e. gudes, and s. sharma, “security and privacy aspects in mapreduce on clouds: a survey,” comput. sci. rev., vol. 20, pp. 1–28, 2016. [8] f. qu, z. wu, f.-y. wang, and w. cho, “a security and privacy review of vanets,” ieee trans. intell. transp. syst., vol. 16, no. 6, pp. 2985–2996, 2015. [9] a. j. menezes, j. katz, p. c. van oorschot, and s. a. vanstone, handbook of applied cryptography. crc press, 1996. [10] s. nakamoto, “bitcoin: a peer-to-peer electronic cash system.—2008.—9 p.[electronic resource],” url http//bitcoin. org/bitcoin. pdf (date access 25.05. 2019). [11] v. buterin, “a next-generation smart contract and decentralized application platform,” white pap., vol. 3, no. 37, 2014. [12] c. cachin, “architecture of the hyperledger blockchain fabric,” in workshop on distributed cryptocurrencies and consensus ledgers, 2016, vol. 310, p. 4. [13] g. wood, “ethereum: a secure decentralised generalised transaction ledger,” ethereum proj. yellow pap., vol. 151, no. 2014, pp. 1–32, 2014. [14] p. zhang, j. white, d. c. schmidt, g. lenz, and s. t. rosenbloom, “fhirchain: applying blockchain to securely and scalably share clinical data,” comput. struct. biotechnol. j., vol. 16, pp. 267–278, 2018. [15] x. yue, h. wang, d. jin, m. li, and w. jiang, “healthcare data gateways: found healthcare intelligence on blockchain with novel privacy risk control,” j. med. syst., vol. 40, no. 10, p. 218, 2016. [16] g. g. dagher, j. mohler, m. milojkovic, and p. b. marella, “ancile: privacy-preserving framework for access control and interoperability of electronic health records using blockchain technology,” sustain. cities soc., vol. 39, pp. 283–297, 2018. [17] h. li, l. zhu, m. shen, f. gao, x. tao, and s. liu, “blockchain-based data preservation system for medical data,” j. med. syst., vol. 42, no. 8, p. 141, 2018. [18] a. azaria, a. ekblaw, t. vieira, and a. lippman, “medrec: using blockchain for medical data access and permission management,” in 2016 2nd international conference on open and big data (obd), 2016, pp. 25–30. [19] k. fan, s. wang, y. ren, h. li, and y. yang, “medblock: efficient and secure medical data sharing via blockchain,” j. med. syst., vol. 42, no. 8, p. 136, 2018. bulletin of social informatics theory and application issn 2614-0047 vol. 2, no. 2, december 2018, pp. 73-78 73 https://doi.org/ 10.31763/businta.v2i2.116 the use of social media for engineering lecturers and students achmad shobirin 1,*, dian candra lestari 2, firdausi nuzula 3, fitri umeidah 4 department of electrical engineering, state university of malang, malang, indonesia 1 neraka.malam@outlook.com*; 2 dnivers@gmail.com, 3 chagyusi@gmail.com, 4fitriumeidah@gmail.com * corresponding author 1. introduction social media are an internet-based communication media that can be accessed by anyone and anywhere. social media can take on various forms, such as forums, social networks, wikis, and microblogging [1]. information shared through social media can be a message in the form of text, images, audio, and even video [2]. nowadays, social media is not only a medium for communication, but also as an e-learning media, politics, and e-commerce [3]. referring to data from "we are social", indicate that the average internet usage every day reaches 6 hours per active user with the number reaching 4 billion worldwide in 2018. in addition, the same report shows indonesia ranks third under india and china with around 24 million users [4]. with a large number of users, social media has an important role in daily life, both from a social aspect, educational, economic, political and health. therefore, this research purpose to observe the influence of social media in education, especially for students and lecturers at the faculty of engineering. [5]. observations made in this research using a questionnaire model that refers to tam (technology acceptance model). tam is a model that is used to analyze the factors that influence the receipt of an information system. according to previous research, it was mentioned that users tend to use the system if the system is easy to use and useful. tam explains and estimates user acceptance of a technology based on certain factors [6]. the questionnaire uses a likert scale where the subjects are lecturers and students. based on research previously conducted by mikako ogawa and his friends entitled "social media use at work: comparison of the united states and japan" states that social media in japan and america was used for product advertising (79%), research (55 %), sales (46%), recruitment (38%), developing community (32%) and improving customer service (33%). so, this research will discuss the influence of ease of use and usefulness of social media during the teaching and learning process between lecturers and students, such as the use of social media in sharing information and facilitating students' understanding in learning [7]. a r t i c l e i n f o a b s t r a c t article history received september 7, 2018 revised october 1, 2018 accepted october 20, 2018 social media provides convenience to the public in various aspects of life, one of which is ease of communication. social media within the scope of education can be used as a medium of communication and information exchange between students and lecturers. this research purpose to determine the level of acceptance of social media use by lecturers and students. the data collection technique uses the likert scale survey method that refers to the tam (technology acceptance model). the results obtained from the research were respondents from lecturers (n = 3) and students (n = 56) in the faculty of engineering. the results of the research indicate that the use of social media has a positive influence on students and lecturers in the field of education. this is an open access article under the cc–by-sa license. keywords social media ease of use lecturers students technology acceptance mode survey http://creativecommons.org/licenses/by-sa/4.0/ http://creativecommons.org/licenses/by-sa/4.0/ 74 bulletin of social informatics theory and application issn 2614-0047 vol. 2, no. 2, december 2018, pp. 73-78 shobirin et.al (the use of social media for engineering lecturers and students) 2. method the benefits provided by social media in supporting the work of lecturers and students in the teaching and learning process, sharing information about education can be known by using a questionnaire with research questions that refer to the tam research model (technology acceptance model). tam is useful for knowing attitudes towards the presence of a technology [8]. tam is one type of theory that utilizes behavioral theory approaches (behavior theory), the theory is used to conduct an assessment of information technology adoption processes. the tam theory focuses on the perception of ease in use and the benefits possessed by an information system so that users have an interest in using the information system [9]. based on various studies on tam, it was stated that experience is an important predictor in knowing ease and usefulness, therefore it does not rule out the possibility that the perception or experience of social media in general can have an impact on the use of social media in the work environment. figure 1 shows the research model based on the reference journal and the questions used in the research. questions are addressed to 2 types of respondents, namely lecturers and students, who have different questions between the two. the first question for lecturers is, can social media like youtube make it easier to find reference material for teaching materials? and the second question for lecturers: is social media like instagram easier for you to share information about meetings and other important activities? moreover, the first question for students: did you use social media chat like whatsapp for college needs? and the second question for students: can social media like facebook help in supporting lecture activities? fig. 1. the research model for the experience of using social media in general. previous research used the monkey survey method to find out the reasons and goals of using social media in work between the united states and japan using the tam research model [10]. the research "the use of social media for lecturers and engineering students" developed from previous research conducted by mikako ogawa and his friends, entitled "social media use at work: a comparison of the united states and japan" where in this research using a questionnaire developed using google form with 5 general questions and 10 specific statements on each type of respondent, namely students and lecturers. some questions consist of the sections shown in table 2. the survey was conducted at faculty of engineering, universitas negeri malang. the survey was conducted from october 2, 2018, to october 10, 2018, and already had 3 respondents from lecturers and 56 respondents from students with details: electrical engineering lecturer = 2, electrical engineering students = 26, industrial technology students = 10, mechanical engineering students = 14, and civil engineering students = 6. with this survey, we can find out the role of social media for education and the use of social media for education. educational sm issn 2614-0047 bulletin of social informatics theory and application 75 vol. 2, no. 2, december 2018, pp. 73-78 shobirin et.al (the use of social media for engineering lecturers and students) table 1. description of variables variables description scope questions eou ease of use general-sm 4 uk usefulness of collective knowledge general-sm 3 bi behavior intention general-sm 5 ue-sm usefulness for education education-sm 3 3. results and discussion we use social media as the purpose of used for student and lecturer respondents in the scope of the um faculty of engineering. the results we obtained from the weighting of the mean variables that make sense using social media describe the results. the variety of questions found from the variables that are present with the number of questions calculated. the eou variable results of 26.7%, uk by 20%, bi by 33%, and eu-sm by 20% from 100% percentage. this study analyzes variables related to social media between lecturers and students. thus, finding a significant use of social media to improve education effectiveness [11]. table 2. categories of social media functions functions of social media strongly agree agree slightly agree disagree sharing 45.8 32.1 45.8 13 communication 42.9 53.6 1.75 1.75 productive 23.6 48 17.85 2.2 education facility 11.6 46.8 16.5 25.1 meeting of online 8.95 42.85 33.9 5.35 the functions of social media based on categories are divided into 5 types like sharing, communication, productive, educational facilities and online meetings. the several categories, it is known that the function of social media as a tool for sharing is the first choice with a score of 45.8 for respondents who “strongly agree”. table 3. types of social media kinds of social media strongly agree agree slightly agree disagree facebook 20.5 43.75 30 5.75 instagram 9.85 32.15 39.25 18.75 whatsapp 24.43 56.57 18 10 youtube 16.63 39.3 34.53 9.5 meanwhile, there are 4 types of social media that we apply to this study. like as, facebook, instagram, whatsapp, and youtube. based on table 3, respondents were very excited about whatsapp social media. it is proven by whatsapp's score is 56,57 in the " strongly agree" column [12]. table 4. the purpose of using social media the purpose of use strongly agree agree slightly agree disagree information 15.1 41.4 23.9 10.1 tutorial 12.5 41.1 38.4 8 reference 24.1 49.1 16.5 4.45 76 bulletin of social informatics theory and application issn 2614-0047 vol. 2, no. 2, december 2018, pp. 73-78 shobirin et.al (the use of social media for engineering lecturers and students) then, the purpose of using social media is grouped into 3 parts, for information, learning media, and references. three objectives, respondents stated that social media is quite good as a learning media shown in table 4. youtube social media has a significant positive impact on education. among students, youtube can help in learning things and adding knowledge (tutorial). whereas among lecturers, youtube helps in providing reference sources for teaching materials [13]. so, there is continuity between the use of youtube social media by students and lecturers. the lecturers provide material obtained from youtube reference sources. then, students can implement it by looking at the tutorial on youtube. the use of social media to students boils down to knowledge and information. where, when looking at a glimpse of information on instagram social media or facebook [14]. so, they will look for that information further on youtube social media because the information displayed in it is in the form of videos, images, sounds, and texts that are more accurate if only compared to information in the form of text/images/sounds only. whereas, for social media types of chatting like whatsapp are used as a medium of communication in relationships between students and lecturers. the use of social media to lecturers is in accordance with the level of lecturers' needs when they are active in lectures. youtube media can be used for teaching media, while chat media such as whatsapp for discussion media as teaching materials about the field of education or supporting knowledge in academic matters both for personal chat and groups so that communication supports lecture activities. when the lecture hours take place, lecturers can access social media as teaching materials which later can be studied and listened to by students. however, students are not permitted to access social media if there is no connection and guidance with the lecture hours that were taken at that time. so, when the lecture hours take place, lecturers have the authority to access social media while students do not have it. social media active users are respondents from the whole survey, 50% of respondents use social media for more than 5 years. home and boarding are the places most often used to access social media, either by using wi-fi or cellular data packages. however, internet access using cellular data packages is often used by users because of its practical advantages. in using social media, the time needed is less than 1 hour. however, intensive (periodic) intervals of several minutes/hour if totaled in a day will take more than 1 hour. some respondents said that youtube social media has a greater influence on the field of education, especially in finding information/knowledge and references/material other than instagram and facebook [15]. whereas, whatsapp social media is limited as an interactive communication medium between students and lecturers. the difference in this study leads to uk variables (usefulness of collective knowledge) that are insightful uses as the main problem. the reasons for using social media, social media types, social media types, and social media goals can affect insightful uses. we must analyze each variable to obtain what variables are most influential in the use of social media in the education field based on user status. these variables are for reference in analyzing the questions that will be used in the questionnaire. one limitation of this study is about samples. where the sample needed for lecturer respondents is not enough as an analysis material in comparing the use of social media between lecturers and students. the samples for each department are also not balanced enough. so, we need additional studies regarding lecturer respondents to the use of social media and the widespread use of social media in each department. the target of lecturer respondents is 7 people for engineering faculty lecturers, while as many as 70 students for engineering faculty students. respondents who were obtained did not reach the normal target, the lecturer with a percentage of 37.5% as many as 3 people and students with a percentage of 70% as many as 56 people. lecturer respondents are difficult to obtain because they lack participation when filling out questionnaires assuming a large number of questions. issn 2614-0047 bulletin of social informatics theory and application 77 vol. 2, no. 2, december 2018, pp. 73-78 shobirin et.al (the use of social media for engineering lecturers and students) 4. conclusion based on the results of research on the use of social media in the workplace with the proposed title "the use of social media for technical and student lecturers" research has been conducted for approximately 3 weeks with coverage from the faculty of engineering, universitas negeri malang and the limitations of social media in using whatsapp, instagram, youtube and facebook in the field of education, the results of respondents for lecturers were 3 people and as many as 56 students in the faculty of engineering, universitas negeri malang. the use of social media on average tends to influence the usefulness of insight in accordance with the scope of the campus, for lecturers tend to discussion and communication media as teaching materials in lectures compared to students tend to media information sources, communication in lectures, and exploration media to develop creativity. the ease of use of social media tends to be on social media as much as 50% of respondents with a usage period of more than 5 years, and frequent usage locations at home or dormitory using wi-fi or cellular data packages, regularly per minute/hour in one day spend more than 1 hour. social media has a different way of using respondents in the field of work in education in terms of information that is more likely to be youtube media than facebook and instagram, compared to whatsapp which is more likely to be an interactive communication medium between lecturers and students so that the ease of using social media is based on the use of reason, the type of media, the type of media and the purpose of social media can improve the quality of teaching and learning during college. references [1] e. w. ngai, k. l. k. moon, s. s. lam, e. s. chin, and s. s. tao, “social media models, technologies, and applications: an academic review and case study,” ind. manag. data syst., vol. 115, no. 5, pp. 769–802, 2015. [2] y. a. ahmed, m. n. ahmad, n. ahmad, and n. h. zakaria, “social media for knowledge-sharing : a systematic literature review,” telemat. informatics, 2018. [3] w. m. al-rahmi and a. m. zeki, “a model of using social media for collaborative learning to enhance learners ’ performance on learning,” j. king saud univ. comput. inf. sci., vol. 29, no. 4, pp. 526–535, 2017. [4] s. kemp, “digital in 2018: world’s internet users the 4 billion mark,” we are social: special report, 2018. [online]. available: https://wearesocial.com/blog/2018/01/global-digital-report-2018. [accessed: 14-jun-2018]. [5] c. i. maican, a. m. cazan, and r. c. lixandroiu, “a study on academic staff personality and technology acceptance: the case of communication and collaboration applications,” comput. educ., vol. 128, pp. 113–131, 2018. [6] c. yoon, “extending the tam for green it : a normative perspective,” comput. human behav., vol. 83, pp. 129–139, 2018. [7] l. m. kruse, d. r. norris, and j. r. flinchum, “social media as a public sphere? politics on social media,” sociol. q., vol. 59, no. 1, pp. 62–84, 2018. [8] e. fatmawati, “technology acceptance model (tam) untuk menganalisis penerimaan terhadap sistem informasi perpustakaan,” iqra’ j. perpust. dan inf., vol. 9, no. 1, 2015. [9] s. t. muntianah, e. s. astuti, and d. f. azizah, “pengaruh minat perilaku terhadap actual use teknologi informasi dengan pendekatan technology acceptance model (tam)(studi kasus pada kegiatan belajar mahasiswa fakultas ilmu administrasi universitas brawijaya malang),” profit (jurnal adm. bisnis), vol. 6, no. 1, 2012. [10] m. ogawa, d. l. amoroso, t. mukahi, m. tanabu, and o. sato, “social media use at work : comparison of the united states and japan,” in annual conference of japan society for management information, 2012, pp. 17–20. 78 bulletin of social informatics theory and application issn 2614-0047 vol. 2, no. 2, december 2018, pp. 73-78 shobirin et.al (the use of social media for engineering lecturers and students) [11] k. lim, c. kilpatrick, j. storr, and h. seale, “exploring the use of entertainment-education youtube videos focused on infection prevention and control,” ajic am. j. infect. control, vol. 46, no. 11, pp. 1218– 1223, 2018. [12] a. m. marshall, “whatsapp server-side media persistence,” digit. investig., 2018. [13] s. moghavvemi, a. sulaiman, n. i. jaafar, and n. kasem, “social media as a complementary learning tool for teaching and learning: the case of youtube,” int. j. manag. educ., vol. 16, no. 1, pp. 37–42, 2018. [14] c. shane-simpson, a. manago, n. gaggi, and k. gillespie-lynch, “why do college students prefer facebook, twitter, or instagram? site affordances, tensions between privacy and self-expression, and implications for social capital,” comput. human behav., vol. 86, pp. 276–288, 2018. [15] v. pornsakulvanich, “excessive use of facebook: the influence of self-monitoring and facebook usage on social support,” kasetsart j. soc. sci., vol. 39, no. 1, pp. 116–121, 2018. bulletin of social informatics theory and application issn 2614-0047 vol. 2, no. 2, december 2018, pp. 58-64 58 https://doi.org/ 10.31763/businta.v2i2.114 togaf for designing the enterprise architecture of lazismu jefree fahana 1,*, ahmad azhari 2 informatics department, universitas ahmad dahlan, yogyakarta, indonesia 1 jefree.fahana@tif.uad.ac.id *; 2 ahmad.azhari@tif.uad.ac.id * corresponding author 1. introduction based on indonesian law number 23 of 2011 on zakat, each zakat management must be carried out by official government institutions and zakat institutions that have been approved by the government. this law prohibits any person or institution from withdrawing zakat from the community. the existence of this act gives authority to the zakat institution to be able to collect funds optimally from the community. because it is stated for everyone to deliberately collect zakat funds from the public, they will be subject to fines and criminal penalties [1]. in addition, the government of indonesia issued several regulations including the minister of religion regulation no. 52 of 2014 on requirements and procedures for calculating mal tithes and zakat fitrah and utilizing zakat for productive enterprises and minister of religion decree no. 333 of 2015 on guidelines for granting permits for the establishment of amil institutions zakat [2], [3]. indonesia's zakat potential from year to year has experienced a significant increase. references [4] states that in 2012 the potential of zakat in indonesia reached 3.4% of the total gross domestic product (gdp), equivalent to 217 trillion rupiah, while in 2015, based on the results of the research division of the center for strategic studies of the national zakat agency (puskas baznas) reached idr 286 trillion [5]. based on the above conditions, reference [6] states that the role of laz in the efforts to collect and utilize zakat for public welfare becomes important and becomes a necessity by promoting the principles of good corporate governance. the existence of support from information systems and information technology can help realize organizational goals [7], [8]. in organizational management, reference [9] describes three strategic a r t i c l e i n f o a b s t r a c t article history received august 30, 2018 revised september 26, 2018 accepted october 7, 2018 lazismu as an amil zakat institution has an important role in collecting and managing zakat for public welfare. the existence of law no. 23 of 2011 and the minister of religion regulation no. 333 of 2015 on guidelines for granting permits for the establishment of zakat institutions requires that the management of zakat, infaq, and sadaq (zis) funds be transparent, accountable and prioritize professional principles. for this reason, there needs to be support from information systems and information technology to achieve these business goals. information systems and technology will be utilized optimally if the development is aligned with the business objectives of the organization. enterprise architecture (ea) is a bridge to harmonize the business needs of an organization with information systems and information technology. enterprise architecture planning at the laz has been designed using the open group architecture framework (togaf) with architecture development method (adm). data collection is done by interviewing and making direct observations of the organization. analysis tools used are the unified modelling language (uml) method and the value chain method. the results of this study are blue print business architecture, data architecture, application architecture so that it can support the business processes that exist in lazismu. this is an open access article under the cc–by-sa license. keywords laz enterprise architecture togaf adm http://creativecommons.org/licenses/by-sa/4.0/ http://creativecommons.org/licenses/by-sa/4.0/ issn 2614-0047 bulletin of social informatics theory and application 59 vol. 2, no. 2, december 2018, pp. 58-64 fahana and azhari (togaf for designing the enterprise architecture of lazismu) roles of information systems, including operational management, to support decisions, and to support the creation of competitive advantages. planning both in building an information system and information technology of an organization according to [10] becomes very necessary to be done until the organizational strategic objectives are achieved. preparation of enterprise architecture (ea) can be one solution to create good planning. the use of ea will result in harmony between the business needs of the organization and information systems and technology. the ability to communicate with customer-oriented and the ability to provide integrated and economical services is the reason for the use of ea is very relevant and needed in an organization. research on the togaf framework has been widely applied to organizations or companies [11]– [14]. references [11] have proposed five phases togaf in pt. pelabuhan indonesia ii to compile an information system strategy proposal and a planning document for the business process reporting system in the goods service section. other research work has been done by [12], togaf has been successfully applied on development of indonesian scientific journal management system with a sequential transformative strategy approach. blueprint for information technology development in the form of sketches of planning and application of information technology at garut state vocational high school (smkn) which refers to national education standards using value chain analysis [13]. togaf adm is also able to help identify in full and detailed business processes that occur at the bumigora mataram college of information and computer management [15]. the use of togaf in this study focuses on building enterprise architecture (ea) at amil zakat institutions (laz) using adm. the results of this study are in the form of blueprints for system development and information technology. to limit this research, researchers only used 5 stages from 9 stages in the togaf adm framework namely premiliary (preparation), vision architecture, business architecture, si architecture, it architecture, while for laz to be studied is laznas lazismu especially lazismu representative office in the special province of yogyakarta. 2. method this paper uses two research methods containing methods of data retrieval and analysis. data retrieval is done in several ways, namely interviews, observation and literature study. the analysis adopts the stages of ae preparation in the adm togaf, namely the preparation phase, architectural vision, business architecture, architectural information systems. the preparation phase identify the scope affected by the application of enterprise architecture to be built. among the affected organizational units include:  the core unit of the organization affected: organizational units in lazismu special region of yogyakarta  supporting units of affected organizations: muhammadiyah regional leader special region of yogyakarta, lazismu center, lazismu region  affected expansion units: national baznas special region of yogyakarta, ministry of religion special region of yogyakarta  affected community units: muzaki (donors) and mustahik (beneficiaries) in addition, in this phase also declared architectural principles refer to management principles. the principle of this architecture will be used as a reference in the preparation of enterprise architecture. table 1 shows a catalog of architectural principles. it consists of ten principles such as islamic shari’a, trusteeship, benefit, justice, legal certainty, integration, accountability, professional, transparency, and synergy. 60 bulletin of social informatics theory and application issn 2614-0047 vol. 2, no. 2, december 2018, pp. 58-64 fahana and azhari (togaf for designing the enterprise architecture of lazismu) table 1. architectural principle catalogs no. architectural principle principle catalogs 1 islamic shari’a business principle 2 trusteeship business principle 3 benefit business principle 4 justice business principle 5 legal certainty business principle 6 integration data and applications principle 7 accountability business principle 8 professional business principle 9 transparency business principle 10 synergy business principle the phase architecture vision, scope of lazismu special region of yogyakarta activities will be presented in the value chain chart. the results of this phase are grouping activities into two categories namely main activities and supporting activities. table 2 shows the chart of the value chain lazism of the special region of yogyakarta. table 2. activity of value chain lazismu special region of yogyakarta supporting activities administrative management financial management facility and infrastructure management fundraising managemet public relations and publications management main activities (inbound) (processing) (outbound) marketing and sales services ziska funds collection ziska fund distribution use of ziska funds preparation of reports and publications mustahik and muzaki coaching this paper aims to produce the design enterprise architecture. therefore, the result of business architecture phase and system architecture will be discussed in the following section. 3. result and discussion in this section, it is explained by the results of research. there are several parts: phase architecture vision, business phase architecture and phase information system architecture. this phase defines the initial conditions of business architecture, and determines organizational structures, services and business models or desired business activities based on existing business processes in the organization. based on the value chain activity, the organizational unit and functions, business process lazismu special region of yogyakarta can be described in table 3. in the business architecture phase, the information system architecture activity was developed. information system architecture in this stage consists of data architecture and application architecture that will be used by the organization. table 4 shows the data requirements of business functions and business processes. it also describes the method of create, read, update, and delete (crud) which used in each business functions and entity. while organizational application requirements are shown in table 5. it describes about applications requirements on each business functions. issn 2614-0047 bulletin of social informatics theory and application 61 vol. 2, no. 2, december 2018, pp. 58-64 fahana and azhari (togaf for designing the enterprise architecture of lazismu) table 3. organizational unit and function, business process lazismu special region of yogyakarta organizational unit business function business process sharia board supervision, direction, and making decisions on the management of ziska funds to fit syar'i approved the annual monthly budget plan, making decisions on managing ziska funds to fit supervisor board supervision of the management of ziska funds approved the annual monthly budget plan, overseeing the management of ziska funds managerial board planning, implementation, coordinating in the collection, distribution and utilization of ziska funds; compile a draft annual budget, prepare a program plan for collecting, distributing and utilizing ziska funds, evaluating the implementation of ziska funds collection, distribution and utilization programs, staff recruitment and coaching fundraising division the implementation of the ziska fund raising program develop and implement a fund raising strategy identification of muzakki and prospective muzaki or donors (individuals and institutions) building communication with muzakki and prospective muzaki or donors (individuals and institutions) distribution division the program for distributing ziska funds distribution of ziska fundsx utilization division implementation of the zis fund utilization program carry out the program for utilizing zis funds administration division administration management create and inventory documents and activity proposals finance division finance management 1. data collection on ziska fundraising 2. prepare reports on raising and utilizing ziska funds facilities and infrastructure division infrastructure management procurement, maintenance and inventory of facilities and infrastructure public relations and publications division public relations and publications management 1. cooperating with related institutions 2. build effective communication with muzaki / regular donors 3. establish effective communication with mustahik / beneficiaries 4. conduct publications in the mass media, electronics and social media 62 bulletin of social informatics theory and application issn 2614-0047 vol. 2, no. 2, december 2018, pp. 58-64 fahana and azhari (togaf for designing the enterprise architecture of lazismu) table 4. data entity based on business functions function entity p la n m u z a k i's c a n d id a te m u z a k i/ d o n o r f in a n c e a d m in istr a tio n in fr a str u c tu r e p u b lic r e la tio n sh ip h u m a n r e so u r c e d istr ib u tio n p r o g r a m m u sta h ik r e p o r t supervision, direction, and making decisions on the management of ziska funds to fit syar'i r r r supervision of the management of ziska funds r r r r r planning, implementation, coordinating in the collection, distribution and utilization of ziska funds; cru d r r r r r r c r u d c r u d r r the implementation of the ziska fund raising program cr ud r r r the program for distributing ziska funds r r r r implementation of the zis fund utilization program r r c r u d administration management r r r c r u d r r r r r r r finance management c r u d c r u d c r u d human resources management r cr ud infrastructure management r c r u d public relations and publications management r cr ud r r issn 2614-0047 bulletin of social informatics theory and application 63 vol. 2, no. 2, december 2018, pp. 58-64 fahana and azhari (togaf for designing the enterprise architecture of lazismu) table 5. application requirement based on business function business function requirements supervision, direction, and making decisions on the management of ziska funds to fit syar'i supervision application supervision of the management of ziska funds supervision application planning, implementation, coordinating in the collection, distribution and utilization of ziska funds plan and strategy application the implementation of the ziska fund raising program collection application (emarketing) the program for distributing ziska funds distribution application implementation of the zis fund utilization program utilization application administration management e-office application finance management finance application human resources management human resources application infrastructure management infrastructure application public relations and publications management crm application mustahik complaint application website profile zis calculator application muzaki / donor registration application 4. conclusion the design of enterprise architecture in lazismu d.i.y produces the applications and entities needed for the development of lazismu now and in the future. the requirements of the application and the existing entities are analyzes of the process sequences in togaf adm. some of the most needed applications consist of financial management applications, utilization applications, web profile applications, and e-marketing. this research still needs to be developed in the realm of implementation and additional stages in togaf adm so that it can produce a complete ae and be able to be implemented in the form of applications that can be utilized by lazismu. acknowledgements this research is supported by the indonesian ministry of research, technology and higher education (ristek-dikti) research grant no. 109/sp2h/lt/drpm/2018. references [1] kementerian agama, undang-undang republik indonesia nomor 23 tahun 2011 tentang pengelolaan zakat. indonesia: government of the republic of indonesia, 2011. [2] minister of religion republic of indonesia, “regulation of the minister of religion of the republic of indonesia number 52 of 2014 on terms and procedures for calculating zakat mal and zakat al-fitr and utilization of zakat for productive enterprises.” minister of religion republic of indonesia, 2014. [3] minister of religion republic of indonesia, “decree of the minister of religion of the republic of indonesia number 333 of 2015 on guidelines for granting permits to establish amil zakat institutions.” minister of religion republic of indonesia, 2015. [4] m. firdaus, i. s. beik, t. irawan, and b. juanda, “economic estimation and determinations of zakat potential in indonesia,” jeddah islam. res. train. inst., p. 74, 2012. [5] p. k. s. badan amil zakat nasional (baznas), outlook zakat indonesia 2017. badan amil zakat nasional. [6] s. pratolo, good corporate governance: implementasi pada bumn di indonesia. lembaga penelitian, publikasi, dan pengabdian masyarakat universitas muhammadiyah yogyakarta, 2015. [7] k. surendro, pengembangan rencana induk sistem informasi. bandung: informatika, 2009. 64 bulletin of social informatics theory and application issn 2614-0047 vol. 2, no. 2, december 2018, pp. 58-64 fahana and azhari (togaf for designing the enterprise architecture of lazismu) [8] j. fahana, “perencanaan strategis sistem informasi untuk pengelolaan guru sekolah muhammadiyah,” j. ilm. tek. elektro komput. dan inform., vol. 4, no. 1, pp. 51–57, 2018. [9] s. sumaryanto, “peranan sistem informasi manajemen dalam rangka peningkatan dunia pariwisata indonesia,” j. akunt. dan sist. teknol. inf., vol. 7, no. 1, pp. 85–97, 2009. [10] j. ward and j. peppard, strategic planning for information systems, 3rd ed. chichester west sussex, england: john wiley & sons, 2002. [11] r. hariawan, k. r. s. wiharja, and e. g. perdana, “perencanaan strategis sistem informasi menggunakan togaf adm (studi kasus : bagian pelayanan barang pada pt. pelabuhan indonesia ii),” eproceedings eng., vol. 1, no. 1, p. 6, 2014. [12] e. marlina and b. nugroho, “arsitektur pengembangan sistem pengelolaan jurnal ilmiah indonesia menggunakan framework togaf.” pusat dokumentasi dan informasi ilmiah lipi, pp. 1–16, 2014. [13] a. suryadi, “strategi perencanaan dan penerapan teknologi informasi menggunakan kerangka togaf versi 9: studi kasus smkn xyz,” fakt. exacta, vol. 8, no. 4, pp. 392–399, 2015. [14] y. hutama and a. a. arman, “perancangan enterprise architecture menggunakan togaf framework 9.0 dan content framework (studi kasus baa universitas kristen maranatha),” vol. 5, no. 1, p. 18, 2014. [15] r. rismayanti, “analisis penerapan arsitektur enterprise pada bagian akademik perguruan tinggi (studi kasus stmik bumigora mataram),” indones. j. netw. secur., vol. 5, no. 2, pp. 26–32, may 2016. bulletin of social informatics theory and application issn 2614-0047 vol. 2, no. 1, march 2018, pp. 1-7 1 https://doi.org/10.31763/businta.v2i1.100 spatial regression analysis for discovering quality living index (qli) in asia devina gilar fitri ayu sumardi 1,*, tuti purwaningsih 2 department of statistics, faculty of mathematics and natural science, islamic university of indonesia 1 15611107@students.uii.ac.id *; 2 tuti.purwaningsih@uii.ac.id * corresponding author 1. introduction quality of life that is identical with welfare, lately much discussed. survival or quality of life is an important issue in the economy and political knowledge. quality of life is generally measured by social and economic factors [1], [2]. quality of life is a person's subjective feelings about his wellbeing, based on his or her current life experience as a whole. quality of life describes the achievement of an ideal human life or in accordance with the desired. the quality of life index provides a comprehensive ranking of the quality of life of a society in a country around the world [3]. to ensure a high level of reliability, a wide range of measurable data is used to measure the opportunities and limitations imposed by individual countries. many scientists and world organizations have formulated indicators used in measuring the quality of life index, which is calculated based on health index, material welfare, feel of one part of local society, occupation and productive activity, welfare emotional, relationships with family and friends, as well as personal safety in the community in the country [4]. quality of life is usually used to evaluate the general welfare of individuals and society, the term is used in a variety of contexts, including in the field of international development. on an a r t i c l e i n f o a b s t r a c t article history received december 21, 2017 revised january 17, 2018 accepted february 4, 2018 the quality of life that is synonymous with welfare lately much discussed. survival or quality of life is an important issue in the economy and political knowledge. quality of life describes the achievement of an ideal human life or in accordance with the desired. the quality of life index (ikh) provides a comprehensive ranking of the quality of life of a society in a country around the world. according to katadata news and research in 2016, the quality of life in 5 southeast asian countries is ranked lowest. the research finds that there are regional imbalances based on the indices of quality of life in 2018. therefore, countries in southeast asia need to be genjotic in all areas to boost contributions to the quality of life in the country, as dominic volek, southeast asia chief in henley & partners singapore. in this study we use the data from numbeo.com to see the value of quality indices in asia in 2018 with various supporting indicators such as purchasing power index, security index, health care index, cost of living index, property price to income ratio, time index travel traffic, pollution index, and climate index. where this study aims to determine how much influence the indicators that have been determined to calculate the cpi, knowing the best spatial regression model that can be used and determine whether there is asi gap in the region of asia. the results of this study hope can be useful information for the community and a reference to make policy by the state officials in the field, but it can be a research material that can be developed again to see the difference and development of quality of life index in each country in asia next year. this is an open access article under the cc–by-sa license. keywords quality of life index asia spatial regression mapping qgis http://creativecommons.org/licenses/by-sa/4.0/ http://creativecommons.org/licenses/by-sa/4.0/ 2 bulletin of social informatics theory and application issn 2614-0047 vol. 2, no. 1, march 2018, pp. 1-7 sumardi and purwaningsih (spatial regression analysis for discovering quality living index (qli) in asia) internationally known scale the millennium development goals (mdgs), agreed upon by world leaders in the 2000 summit [5]. the mdg is a commitment of the international community, especially the developing world, to the vision of development [5], [6]. according to katadata news and research in 2016, the quality of life in 5 southeast asian countries is ranked lowest. based on the numbeo quality life index, vietnam became the worst-quality country of life from 61 countries surveyed in mid-2016. indonesia stands at 57th place with an index value of 66.39. while countries from continental europe and australia occupy the top 5. denmark became the country with the best quality of life with a score of 201.53 [7]. index value is the result of estimation of quality of life with various factors, one of which is the environment and safety. therefore, countries in southeast asia need to be genjotic in all areas to boost contributions to the quality of life in the country. in this study, we took the asian region as a limitation of research area to determine the cpi level of each country. according to republika.co.id, the quality of life is good to be everyone's dream. but the good parameters of poor quality of life are different indicators. in this study we use the data from numbeo.com to see the value of quality indices in asia in 2018 with various supporting indicators such as purchasing power index, security index, health care index, cost of living index, property price to income ratio, time index travel traffic, pollution index, and climate index. under the title of "influence analysis on level of quality of life (qli) index in asia 2018 on the determinants of qli using spatial regression with geodes and qgis" this study aims to find out how much influence the indicators that have been determined to calculate the cpi, knowing the model the best spatial regression that can be used and know whether there is an imbalance in the region of asia. where the results of this study hope can be useful information for the community and a reference to make policy by state officials in the field, but it can be a research material that can be developed again to see the difference and development of quality of life index in each country in asia for next year. the purposes of this research is to find out the quality of life of asian countries in 2018 is seen from the quality of life index and the various indicators. discover the existence of indicators that significantly affect the quality of life index in asia with the spatial regression model. the latest one is to find out the imbalance of asian countries based on the quality of life index in 2018. 2. method the research used by type of data and its analysis is quantitative research, which is research which its analysis more focus on numerical data which is processed by spatial regression method using geoda software [8], [9]. in this study, tests on 9 secondary data obtained from www.numbeo.com, which contains the world's largest user database that contributes data about cities and countries around the world. numbeo provides current and timely information on world living conditions including living costs, housing indicators, health care, traffic, crime and pollution. data used in this research is data in asia region with variables as in table 1. table 1. quality of life indicators [10] no variable variable’s code variable type 1 quality of life index qli dependent 2 purchasing power index purpower independent 3 safety index safety independent 4 health care index health independent 5 costs of living index cost independent 6 property price to income ratio proprice independent 7 traffic commute time index traffic independent 8 pollution index pollution independent 9 climate index climate independent issn 2614-0047 bulletin of social informatics theory and application 3 vol. 2, no. 1, march 2018, pp. 1-7 sumardi and purwaningsih (spatial regression analysis for discovering quality living index (qli) in asia) 3. result and discussion factors affecting world gas prices include purchasing power index, security index, health care index, cost of living index, property price to revenue ratio, traffic time travel index, pollution index, and climate index. to answer these problem there are some results and the discussion. fig. 1. moran’s index graph figure 1 is the output of global moran's i index used to determine whether there is spatial autocorrelation in gasoline price data. from the output note that the value of moran index for variable gasoline price that is equal to 0.399382, the value is in the range 0 α (0.05) so that the failure to reject h0 then the error data is normally distributed. the breusch-pagan test detects whether or not heteroscedasticity is present. models are considered good in the absence of heteroscedasticity. from result of breusch-pagan test using geoda obtained p-value value for this model is equal to 0,61894> α (0,05), so it can be said insignificant, using level of significance 0,05 from existing data all model failed reject h0 means the regression model does not contain homoscedasticity. thus, no spatial effects are found in the data, so the influence of the location does not need to be included in the model, but this data can be used with the gwr method to see the factors that affect the quality of life index with heteroscedasticity data. 4 bulletin of social informatics theory and application issn 2614-0047 vol. 2, no. 1, march 2018, pp. 1-7 sumardi and purwaningsih (spatial regression analysis for discovering quality living index (qli) in asia) fig. 2. output of ols regression with geoda detection of autocorrelation in spatial data using moran's test i. table 2 is the output of moran's i using geoda program is -0.5568. where the value i = 0.57767> 0 so there is a negative autocorrelation, this means the data patterns collect and form clusters (clusters). next will be tested autocorrelation between locations using moran's test i. the hypothesis tested are h0: i = 0 (there is no autocorrelation between locations) and h0: i ≠ 0 (there is autocorrelation between locations). table 2. moran’s test result spatial dependence value p-value decision moran’s i -0,5568 0,57767 reject h0 based on the analysis of moran's i it is known that the value of probability moran's i of 0.57767> α, so fail to reject h0. it means there is no autocorrelation between locations so that the assumption of freedom error is met. in this case actual spatial regression cannot be used for spatial nonautocorrelation data. issn 2614-0047 bulletin of social informatics theory and application 5 vol. 2, no. 1, march 2018, pp. 1-7 sumardi and purwaningsih (spatial regression analysis for discovering quality living index (qli) in asia) the value of r-square or coefficient of determination is used to find out how big the independent variable can explain the dependent variable / contribution influence independent variable (independent) to dependent variable (dependent). the r-square value only ranges from 0-1, getting closer to 1 the stronger the effect, as found in this case. from the results of spatial regression output in figure 5.2 note that the value of r-square obtained that is equal to 1, it means there is the influence of independent variables are very strong to explain the dependent variable. to see which factors affect the quality of life index can be seen from the value of probability variables as in the ols regression output in figure 5.1 above. from the results it is known that all independent variables have the same value that is 0.000 <α (0.05) which means all variables assumed to reject h0 where all independent variables significantly influence the quality of life index in asia. the next stage is choosing the best method in spatial regression models in addition to ols. the test to know which method can be used to model the quality of life index number in asia can be seen from the lagrange multiplier value of 3 methods besides ols i.e. sar, sem, and sarma presented in the table 3. table 3. lagrange multiplier test result method lagrange multiplier value decision sar 0,51982 > α fail to reject h0 sem 0,17226 > α fail to reject h0 sarma 0,32026 > α fail to reject h0 from the results in table 3 it can be concluded that of the three models of spatial regression that all three are assumed to reject failure h0. it means that there is no regression model that can be used other than ols, and because this data is homogeneous, it is better to do regression test using gwr method. data visualization includes region mapping, and presents plot / graph data. this is done to see clearly which countries have low and high quality of life, and to see regional imbalances in asia based on the quality of life index of 2018. based on figure 3, it is known based on existing legend, that dark green color depicts low quality of life and medium red, while pink and light green in a row depicts the level of quality of life is getting higher. of the 19 countries in asia in this study, the five countries with highest quality of life index are japan, united arab emirates, taiwan, qatar and south korea. while the five countries with the lowest quality of life index are in vietnam, iran, philippines, china and pakistan. from mapping of quality of life index is also known in asia there is imbalance of quality of life, where it is seen that the average country with high quality of life index aligned with countries with low quality of life, so it is very visible differences and disparities between regions. therefore, special attention is needed by the governments of each country in asia to be able to improve each other's quality of life in their country which still has a low quality of life index so that asia can be an example by other areas in an effort to improve the index of quality of life and good cooperation. fig. 3. mapping of quality of life index in asia 2018 6 bulletin of social informatics theory and application issn 2614-0047 vol. 2, no. 1, march 2018, pp. 1-7 sumardi and purwaningsih (spatial regression analysis for discovering quality living index (qli) in asia) fig. 4. the 2018 life quality index graph in asia figure 4 is used to determine the level of quality of life index of countries in asia as a whole. a higher quality of life index signifies better community welfare, this index is measured using an empirical formula that takes into account purchasing power (higher up better), pollution index (lower is better), ratio of goods price to income (lower is better ), a higher (better) index of living costs, a safety index (higher is better), health care index (higher is better), traffic travel time index (lower is better) and climate index (higher is better) . 4. conclusion based on the results of the analysis that has been done it can be concluded that the quality of life of asian countries in 2018 is seen from the index of quality of life and the various indicators in the not too high and not too low. the highest value of life index value of 176.04 is owned by japan and the lowest is 81.09 is owned by vietnam. indicators that have a significant effect on the quality of life index in asia are all independent variables with p-value is 0.000 100 players), every player can interact directly as does the real world. 2.1. the characteristics of online game addiction addiction to online games is defined as overuse, obsessive, compulsive and having common problems with gaming activities. according to[12] the definition of game addiction as excessive and repeated use of computers or smartphones that results in social, emotional, and gameplay issues cannot control over gaming activity. the cause of game addiction is divided into two factors: internal factors and external factors. here are the internal factors that affect addiction in online games. desire players to get higher points than their opponents, this is the goal made online games to make players curious with the game so it will continue to play it. level of bored is high enough to vent to anything else that is by playing online games. lack of ability to set priorities or manage time in activities. and, cannot control themselves to playing online games, so make the players forget themselves with the pattern of his life. 36 bulletin of social informatics theory and application issn 2614-0047 vol. 2, no. 1, march 2018, pp. 34-38 purnama et.al (avoiding online game addiction among youngsters) moreover, the external factors that affect addiction in online games are, the influence of the environment that mostly play online games. usually influenced by friends at school. social interaction with the environment is not good, so the teenagers choose to seek their own fun by playing games. and lack of supervision and attention from parents so that feel neglected and assume all activities that children do is a natural thing. there are several studies conducted earlier by [13][6][10] about the behavior of online game addicts, from the research note that the common characteristics that exist in the game addict is experiencing problems on his emotional because he cannot control himself when playing online games, low self-care for being too busy with the game so forget the circumstances herself, poor communication skills, lazy, and usually the player is trying to distance himself from a thing. another research[14], said that there is a worker who is willing to spend time working to play games at work. of course it disrupts his work activities and becomes obstructed. addictions to this online game resemble addiction to consume chemicals, when stopped playing the players will feel depressed, mentally disturbed. 2.2. negative impacts the impact of online game addiction mainly come to the players. the teenagers are the most addictive games because of the difficult age in controlling themselves or still unstable in doing something when compared with adults, adolescents also have a high level of curiosity, especially on new things. technological developments are very rapid influence on the spread of online games very quickly too. when you first play the game the players experience joy, feel more challenged, satisfaction, freedom and so forth, from where the players become addicted to playing continuously[15][16]. they are willing not to sleep for hours to sit in front of the computer, so the impact on the physical health of the players is in sight because it is too often viewed screen monitors, hand pain because too often pressing the -button computer, headache from lack of rest, back pain from sitting too long, weight loss because it is too busy with his game, and even obesity caused by uncontrolled eating[17][10]. the other negative impacts are on the psychological state, such as: the social relationships of his school friends are reduced, the disregard of the surrounding environment, the concern for the surrounding becomes decreased, forget the obligation as the learner, the concentration of the lesson becomes decreased and the more fatal is experiencing the stress of losing to the opponent[18][12]. this has troubled the parents are no exception to the teachers because it affects academic achievement the students[19][6]. if online games are done continuously without time constraints can lead to addiction to play games or commonly called game addiction[20] and have a negative effect on the player. there is research conducted[21] in south korea showing that 73.4% of 384 respondents and 83.9% of 706 students are addicted to playing online games. moreover, it also has an impact to the family. addictions to online games can lead to aggressive behavior, either intentionally or unintentionally. in the online game there is violence, a scene approaching sexual [22]. another impact that arises from online game addiction is the "behavioral effect" in which this effect occurs when players play the game in the form of behavior and action. players tend to follow and imitate situations like those in the games they likely. this affects to many people around him, especially the family. teenagers will be stubborn, hard to listen to parenting advice, more do not want to listen to others. 2.3. positive impacts playing online games not only cause adverse effects, but also has a positive impact. according to research on [23] by playing online games players get many new friends who have the same hobby, players become proficient in english because usually the online games using the international language and there will appear the terms commonly used terms in the game. another impact is to increase concentration and high imagination in making game strategy so as not to be defeated by enemies, to improve abstract thinking skills, problem solving and logic, eye coordination of hand coordination and spatial visual ability, teaching children, managing hypothesis, teamwork and cooperation while playing with others, and real-world simulation skills[24]. it is expected that the positive impact is more important than the negative impact. especially now the mastery of the computer is needed in improving the imagination, creativity for technological progress. it can be seen that nowadays all the fields of science use the computer as a means to perform its activities. however, issn 2614-0047 bulletin of social informatics theory and application 37 vol. 2, no. 1, march 2018, pp. 34-38 purnama et.al (avoiding online game addiction among youngsters) not everyone has such thoughts so there is no follow-up. most online game addicts just want to find entertainment and satisfaction only. 2.4. prevention of the addiction online games have a bad impact on users, so do not become a game addict needed an effort or a way that can be done by the users of the game. there are some ways of preventing people from becoming addicted to online games such as, strong intention to stop playing games, the first and foremost thing to be able to quit game addiction is the intention of being strong and earnest to stop playing online games. this of course cannot have a direct impact, it takes enough time so that the game addicts can really stop to play the game. the second one is a replacing with more useful activities, replacing online gaming activities that can spend time with positive and useful activities such as reading books, taking extracurricular activities at school, following organizational activities at school and so on. replacing useful activities so as not to feel unemployed so as not to make online games as a place of escape. next is reduce the time to play the game, the only way you cannot get addicted to the game is to reduce game play time, which was initially done all day, minus little by little from day to day. the next way is reduce time hanging out with fellow gamers, by reducing the time meet between fellow game players can reduce game play time. because someone is triggered to play the game because of its supportive environment. to minimize the desire to play the game is to reject the invitation and friends when invited to play the game. get used to frugality, we need to know that playing games can actually spend a lot of money. the money is just a moment of fun and intangible nothing, so the money that should be saved will be exhausted just to play online games. perhaps by stopping playing games will make the expenditure more efficient and can be saved to buy more useful purposes. friends with good people, the intention of making friends with good people here is to make friends with people who do not take things that are not as useful as playing games. befriend people who want to take care of us, who always remind us when they're wrong. and the last way is a family supervision. the family, especially parents is needed to know and control the activities undertaken by their child. parents must remind a child who is too often playing the game. they should give understanding that non-stop playing is not good for them. 3. conclusion the online game addicts have some fairly common characteristics, these characteristics include: poor emotional level, lack of attention to himself, poor communication skills, laziness, always avoid something he does not like and so on. based on some research done online game addiction has some impact that is positive and negative impact. positive impacts such as adding new friends, being proficient in english, can increase concentration and high imagination in making strategy, on the contrary the negative impact of addiction to play online games is the social relationship to his school friends to be reduced, being indifferent to the environment, awareness of the surrounding becomes decreased, the concentration on the lesson decreases. in addition to the psychological state also affects the physical condition of weight loss because it is too busy with the game, there is even the possibility of obesity due to uncontrolled eating, eye disorders because often see the monitor, and hand pain because too often pressing the computer buttons. some actions to overcome the case of addiction are cultivate a strong intention to stop playing games, change the activities of playing games with more useful activities, reduce time to play games, reduce time hanging out with fellow game players, get used to frugality, making friends with good people and parental supervision. references [1] r. bailey, k. wise, and p. bolls, “how avatar customizability affect children’s arousal and subjective presence during junk food-sponsored online video games,” cyber psychol. behav., vol. 12, no. 3, pp. 277–283, 2009. [2] v. mallinckrodt and d. mizerski, “the effects of playing an advergame on young children ’ s perceptions , preferences , and requests,” j. advert., vol. 36, no. 2, pp. 87–100, 2014. [3] a. nairn, c. fine, a. nairn, and c. fine, “who ’ s messing with my mind ? the implications of dualprocess models for the ethics of advertising to children,” int. j. advert., vol. 27, no. 3, pp. 37–41, 2015. 38 bulletin of social informatics theory and application issn 2614-0047 vol. 2, no. 1, march 2018, pp. 34-38 purnama et.al (avoiding online game addiction among youngsters) [4] e. j. jeong and d. h. kim, “social activities, self-efficacy, game attitudes, and game addiction,” cyberpsychol. behav. soc. netw., vol. 14, no. 4, pp. 213–221, 2011. [5] j. t. sulistyo, evanytha, and vinaya, “hubungan problematic online game,” psikologi, vol. 2, no. 1, pp. 396–406, 2015. [6] m. d. griffiths, d. j. kuss, and d. l. king, “video game addiction : past , present and future,” curr. psychiatry rev., vol. 8, no. 4, 2012. [7] k. h. kim, j. y. park, and d. y. kim, “e-lifestyle and motives to use online games,” irish mark. rev., vol. 15, no. 2, pp. 71–77, 2002. [8] c.-s. wan and w.-b. chiou, “the motivations of adolescents who are addicted to online games: a cognitive perspective,” adolescence, vol. 42, no. 165, pp. 179–197, 2007. [9] a. f. giandi and h. s. arifin, “perilaku komunikasi pecandu game online dengan menggunakan game online,” e-journal mhs. univ. padjajaran, vol. 1, no. 1, pp. 1–39, 2012. [10] k. young, “understanding online gaming addiction and treatment issues for adolescents,” americn j. fam. ther., vol. 37, no. 5, pp. 37–41, 2009. [11] h. c. chan, “government regulation of online game addiction,” commun. theassociation inf. syst., vol. 30, pp. 187–198, 2012. [12] j. s. lemmens, p. m. valkenburg, and j. peter, “development and validation of a game addiction scale for adolescents development and validation of a game addiction scale for adolescents,” media psychol., vol. 12, no. 1, pp. 77–95, 2009. [13] s. m. grüsser, p. d. r. thalemann, d. c. ph, m. d. griffiths, and d. ph, “excessive computer game playing : evidence for addiction and aggression ?,” cyber psychol. behav., vol. 10, no. 2, pp. 290–292, 2007. [14] d. chappell, v. eatough, m. n. davies, and m. griffiths, “everquest—it’s just a computer game right? an interpretative phenomenological analysis of online gaming addiction,” int j ment heal. addict., vol. 4, no. 3, pp. 205–216, 2006. [15] n. yee, “motivations for play in online games,” cyber psychol. behav., vol. 9, no. 6, pp. 772–775, 2006. [16] a. v karapetsas, v. a. karapetsas, and n. x. zygouris, “internet gaming addiction. reasons, diagnosis, prevention and treatment,” encephalos, vol. 51, pp. 10–14, 2014. [17] m. a. liebert, y. chuang, and d. ph, “massively multiplayer online role-playing game-induced seizures : a neglected health problem in internet addiction,” cyber psychol. behav., vol. 9, no. 4, pp. 451–456, 2006. [18] r. e. kraut, p. m. greenfield, and e. f. gross, “childrens activities and development,” futur. child., vol. 10, no. 2, pp. 123–144, 2015. [19] l. lay, c. teo, and r. l. neo, “children and video games: addiction, engagement, and scholastic achievement,” cyber psychol. behav., vol. 12, no. 5, 2009. [20] j. e. grant and s. won, “dissociative symptoms in pathological gambling,” psychopathol, vol. 36, pp. 200–203, 2003. [21] c. koo et al., “internet-addicted kids and south korean goverment effort: boot-camp case,” cyberpsychol. behav. soc. netw., vol. 14, no. 6, 2011. [22] d. williams and m. skoric, “internet fantasy violence : a test of aggression in an online game,” commun. monogr., vol. 72, no. 2, pp. 217–233, 2007. [23] r. syahran, “ketergantungan online game dan penanganannya,” j. psiklogi pendidik. konseling, vol. 1, no. 1, pp. 84–92, 2015. [24] j. hong and m. liu, “a study on thinking strategy between experts and novices of computer games,” comput. humn behav., vol. 19, pp. 245–258, 2003. bulletin of social informatics theory and application issn 2614-0047 vol. 2, no. 2, december 2018, pp. 39-46 39 https://doi.org/ 10.31763/businta.v2i2.112 investigating the effect of electronic government in realizing social justice in iraq heidar najm 1,*, ruhollah tavallaee department of information technology management, shahid beheshti university, tehran, iran 1 heydarnajm92@gmail.com * * corresponding author 1. introduction at present, the most accountable form of government which satisfies people’s expectations is the e-government. the goal of establishing e-government is providing people with better services, improving services for business, transparency, empowerment through information and creating efficient government [1]. thus, many experts believe that today it is possible to overcome some of the human problems with the help of the technologies that mankind has gained at this time. among these technological innovations is information technology. governments hope that with the help of information technology, they will be able to overcome many of these problems and thus, can accelerate the development path [2]. developing countries are moving toward developing e-government, but cultural and institutional considerations must be considered in order to succeed in deploying e-government [3]. the egovernment, as an applied area, essentially invites the users to face the challenges of the new internet media and wants them relying on their initiatives and through using new systems, remove those challenges. if we want to set a point for the start of activities in this area, we can refer to "us national performance review" program which was initiated in 1993 and emphasizes the role of e-government in federal government services. subsequently, led by the vice president, mr. al gore, who was linked with clinton's strong centralized focus on the developed economy, it was luminous and was totally a r t i c l e i n f o a b s t r a c t article history received august 11, 2018 revised september 6, 2018 accepted september 29, 2018 the increasing use of information technology, communication tools and applied programming has led to the development and evolution of public policies, processes, and functions. information and communication technology is entering not only the provision of citizen services, but also public utilities, improving accountability and transparency in government performance, and saving government costs and government management. developing countries are moving toward e-government, but in order to succeed in deploying egovernment, cultural and institutional considerations must be taken into consideration. this is a survey research and the statistical population includes experts in e-government in iraq. therefore, using morgan’s table, 196 experts have been selected. to collect data, questionnaires were used. through the study it was found that in terms of the development of the rule of law, iraq's missan oil company is in a good condition, and 55 percent of the respondents believed that the expansion of the rule of law, the behavior based on the principles and rules and avoiding to impose personal interests are the results of the deployment of e-government. furthermore, according to the results and considering that out of six existing sub-hypotheses, 5 sub-hypotheses were confirmed, the main hypothesis of the research which is based on the effect of e-government on social justice is confirmed. this is an open access article under the cc–by-sa license. keywords social justice e-government governmental management ict http://creativecommons.org/licenses/by-sa/4.0/ http://creativecommons.org/licenses/by-sa/4.0/ 40 bulletin of social informatics theory and application issn 2614-0047 vol. 2, no. 2, december 2018, pp. 39-46 najm and tavallaee (investigating the effect of electronic government in realizing social justice in iraq) based on the new internet technology, with a reciprocal influence on policy making and technology to promote both of them [4]. the fact is that although the terms used for the electronic government are synonymous, their meanings are not just the same. there are two limited and open definitions. in general, the two words "government" and "statesmanship" are confusingly used in research. also, there are ambiguities to separate or combine the two terms of the "electronic democracy" and " electronic government". what is common among all definitions is that electronic government involves a comprehensive strategic approach for state organization, rather than the stage by stage automation of the government. the electronic government can be theoretically described as a method of drawing the perspective which in practice, guides the definitions on the basis of some theories, or uses the current measures to achieve descriptive definitions [5]. meanwhile, ict has developed all the technologies and businesses as well as oil and gas industry [2]. due to the complex conditions in the world, the iraq national oil company (nioc) which is in the process of updating information and communication technology in this industry, in large-scale requires the recognition and macro-planning for ict applications in the upstream business, which requires the use of e-government in the realization of social justice in the public organizations. thus, the social responsibility of the iraq national oil company is based on the idea of going beyond the legal requirements of business activity and achieving a positive impact on the environment and stakeholders, including customers, people, host communities, employees, and all those affected by the company's activities. recognizing the role of e-government in the development of social justice in the national oil company of iraq is one of the applied results of the research project, and government officials and employees will be among the beneficiaries [6]. today, technological development across the world implies the use of information and communication technology which has been introduced as a new type of compliance with the principles of the public sector. the increasing use of information and communication technology and applied programs has led to the development of the public policies, processes and functions. information and communication technology not only serves citizens, but also is used to increase the productivity in public sectors, improve accountability and transparency in government performance, and save the costs of government and state management [5]. 2. literature review the society, in other words, is a set of people living together and having a variety of cultural, economic, and political relations with each other. a society has structures in all its simple and complex forms. the contemporary complex and industrial societies and the simple societies of the past have not just been formed through the gathering of individuals but each of them has its own social structure which distinguishes it from the other societies. the basic structure of a society consists of institutions [7]. justice is one of the most important words in the history of human civilization and from the point of view of every human being with health ego, observing it has a great importance. so, no man (though he himself is crucial) denies it [8]. one of the tools to achieve justice is e-government. an electronic government often focuses on outsourcing, such as services provided to citizens. the basis of social justice theories is that economic and social inequalities have an impact on its judiciary organization, and any changes in the judiciary organization, socio-economic relations and income distribution has direct effects on the society [6]. undoubtedly, this deep and fundamental debate is controversial, has a wide scope, and deals with profound challenges in other epistemic areas such as ethics, the theories of personality, philosophy of law and epistemology. in his later writings, john rawls insists that it is possible to present a theory of justice which is purely political, without relying on a comprehensive philosophical or moral doctrine. according to him, his political conception of justice and its principles lacks a certain philosophical basis. he thinks that it is possible to create a framework for social and fair cooperation that would be accepted by all the scholars of comprehensive ethical, religious and philosophical doctrines and make it the base of the social structure of their society. this framework is outlined by the principles of justice that are not advocating the comprehensive philosophical or moral theory which he calls political liberalism. according to this political conception of justice, a desirable liberal society gives way to moral, issn 2614-0047 bulletin of social informatics theory and application 41 vol. 2, no. 2, december 2018, pp. 39-46 najm and tavallaee (investigating the effect of electronic government in realizing social justice in iraq) religious, and philosophical pluralism and acts in a way that all people accept this fair framework which is not based on a specific comprehensive doctrine since the principles of political justice do not claim that they can answers specific moral and philosophical questions. furthermore, these principles make comprehensive ethical and philosophical doctrines answer such questions so there is no rival who is sensitive to what people accept [9]. social justice is one of the implications of the concept of justice, which means the "fair" allocation of resources in a society. in this sense, the law must achieve an acceptable level of genuine and formal justice and must guarantee the fair distribution of resources and opportunities. in modern state management, the principles of social justice are one of the aspects of a new paradigm in state governance and especially emphasize the role of state administrators in providing and delivering highquality services to citizens and groups [10]. with the increase of public confidence, the pessimism to the government decreases, the cost of mutual control for both the government and the nation decreases. it seems that this situation affects the government in all three areas of economic, political and cultural activity [11]. trust plays an important role in maintaining the cohesion and solidity of social relations; this role becomes more prominent in the realm of the economy and has become a vital role for all actors, both individual and organizational, so that numerous studies, especially in the last decades of the previous century focused on the positive and direct correlation between the health of the economic system and social confidence [12]. 3. method since the focus of this research is on the number of experts and specialists in the field of electronic government in iraq, the managing and planning organization of iraq was selected as the statistical population (expert population) and using the morgan table, 196 experts were selected as samples. since the present research is a field research, the most common tool to collect information in this type of research is questionnaire. therefore, the data gathering tool in this research is a questionnaire, which is included in the research appendix. there are seven independent variables in the questionnaire: (1) increase in governmental transparency in electronic government, (2) development of rule of law in electronic government, (3) the necessity of answering in electronic government, (4) attention to justice and fairness, (5) increase in participation, (6) effectiveness and efficiency, and (7) attention to the necessity of social consensus. in this questionnaire, four questions are personal questions. the first question is the amount of work experience in the organization and the second and third questions are age and gender, respectively, and the last question in this section is the level of education. the dependent variable in this research is social justice, which in the questionnaire indirectly and directly related to the other dependent parameters are evaluated. table 1. scale and measurement coefficient of the questionnaire. measurement scale measurement coefficient very high 9 high 7 moderate 5 low 3 very low 1 in the questionnaire, opinions and tendencies of the responders about the subject are asked. according to the likert scale, the responses are ranked from very high to very low. the scale and measurement of the questionnaire shown in table 1. therefore, the responder has no limits to answer and is not limited in predetermined categories. in this questionnaire, the severity of the effect of each factor was measured using arithmetic mean, mean of each indicator (1) and weight of each indicator (2). in these two formulas, aj, ri, n and wj are arithmetic mean of indicator j, scores obtained for each indicator by the person i, sample number and weight of indicator j, respectively. 42 bulletin of social informatics theory and application issn 2614-0047 vol. 2, no. 2, december 2018, pp. 39-46 najm and tavallaee (investigating the effect of electronic government in realizing social justice in iraq) 𝐴𝑗 = ∑𝑟𝑖 𝑛 i=1,2,3,….,56 j=1,2,3,…..,60 (1) 𝑊𝑗 = 𝐴𝑗 ∑𝐴𝑗 j=1,2,3,…..,60 (2) to confirm the research hypotheses, it is necessary to analyze the collected data based on the statistical tests. in this regard, two parts of statistics, descriptive statistics and statistical inference are used. descriptive statistics including frequency distribution tables, central tendency and dispersion index (mean, standard deviation, skewness and elongation) and bar charts are used to describe the data. inferential statistics test, including t-test to compare two independent groups, f test (variance analysis test) to compare more than two groups, pearson correlation coefficient to study simple relationships between research variables and multiple regression coefficients to analyze the effect of the variables. the t test method examines the hypothesis related to mean of statistical population. since our hypotheses examine the degree of correlation between the two variables, correlation coefficient is needed. as in the definition of correlation coefficient, the intensity of the dependence of the two variables is called correlation coefficient, which is a number between -1 and 1. the closer the number is to one, the greater the correlation is. in the science of statistics, there are many types of correlation coefficients, each of which measure the correlation between the two variables according to the type of data and the variable conditions. therefore, when using these methods, the type of variables used in the research should be paid special attention. since both variables are ratio-interval and both variables are quantitative in the research, the pearson correlation coefficient based on the two-variable variance and their standard deviation, which has a high power among other types of correlation coefficients, is used. the total statistical analysis is done in the spss software. 4. result and discussion 4.1. descriptive statistics the gender distribution of respondents is in a way that 18% are female and 82% are male. furthermore, the age distribution of respondents can be seen in table 2. table 2. the age distribution of respondents age frequency relative frequency cumulative relative frequency 21-30 42 21 21 30-4 36 18 39 40-50 44 22 61 50-60 36 18 79 >60 42 21 100 total 200 100 fig. 1. frequency distribution of respondents' gender issn 2614-0047 bulletin of social informatics theory and application 43 vol. 2, no. 2, december 2018, pp. 39-46 najm and tavallaee (investigating the effect of electronic government in realizing social justice in iraq) table 3. scoring and description of the used questionnaire results absolutely agree agree have no idea disagree absolutely disagree number of questions 20-19 18-15 14-11 10-7 4-6 4 increase transparency 15-14 14-11 11-8 8-5 5-3 3 development of rule of law 20-19 18-15 14-11 10-7 4-6 4 the need for accountability 10 9-8 7-6 5-4 3-2 2 attention to justice and fairness 30-28 27-21 21-16 15-10 9-6 6 increase participation 15-14 14-11 11-8 8-5 5-3 3 attention to the need for social consensus fig. 2. frequency distribution of increased transparency. fig. 3. frequency distribution of the need for accountability. 44 bulletin of social informatics theory and application issn 2614-0047 vol. 2, no. 2, december 2018, pp. 39-46 najm and tavallaee (investigating the effect of electronic government in realizing social justice in iraq) fig. 4. distribution frequency of attention increasing participation. fig. 5. frequency distribution of variable considering the need for social consensus. 4.2. inferential statistic the research variables were analyzed in the descriptive statistics section with the actual scores given. however, in order to ensure that the data are normal and the absence of any irregularity in the accuracy of the statistical tests, these variables were normalized using standard z score, and then we performed statistical tests. the formula of z score is as follows: 𝑍 = 𝑋 − 𝑀𝑒𝑎𝑛 𝑆.𝑑 (3) x is the responder's score, mean is the mean of the variables and s.d is the standard deviation of the variable. using the above equation, all the research variables were normalized so they have a mean of 0 and standard deviation of 1, and replacing this change in the data, we can use parametric methods, ensuring the normal distribution of the data. to determine the method of testing the hypothesis, first, it is necessary to be sure about the distribution of the variables of the research since this test determines which solidarity model has more similarity with our data. issn 2614-0047 bulletin of social informatics theory and application 45 vol. 2, no. 2, december 2018, pp. 39-46 najm and tavallaee (investigating the effect of electronic government in realizing social justice in iraq) table 4. the results of descriptive score inferential statistics standard deviation the average the number the name of the variable 1/439 3/28 200 the increase of transparency 1/422 3/37 200 development of rule of law 1/425 2/845 200 the need for accountability 1/392 3/625 200 attention to justice and fairness 1/397 3/87 200 increase participation 1/384 3/515 200 attention to the need for social consensus table 5. single sample t-test results variables single sample t-test results the assumed average of society= 3 the variable name the confidence distance 95% average difference in averages pvalue (bilateral) degrees of freedom the t statistics upper limit lower limit 3/479 3/080 0/28 0/026 199 2/751 the increase of transparency 3/567 3/173 0/37 0/000 199 3/679 development of rule of law 3/042 2/647 -0/155 0/237 199 -1/538 the need for accountability 3/818 3/432 0/625 0/000 199 6/349 attention to justice and fairness 4/063 3/676 0/870 0/000 199 8/807 increase participation 3/707 3/323 0/515 0/000 199 5/262 attention to the need for social consensus as we can see, in all variables except for the need for accountability variable, the value of the t statistic is higher than 96/1 and the error level is smaller than 0.05 and the lower limit of the obtained values is also higher than 3. therefore, with all the reasons, the effect of e-government implementation on these variables is accepted. 5. conclusion the research findings highlighted the fact that only 45 percent of respondents were positive about increasing transparency resulting from the launch of e-government at the missan oil company, which is indicative of the fact that e-government efficiency is well-suited to many operational and managerial levels it has not been described and there is a strong inertia from the staff and managers. iraqi missan oil company should improve this procedure and plan to reduce the negative attitudes of its employees along with the maintenance of procedures and working principles. in relation to the development of the rule of law, the oil company missan iraq is in a good position. 55% of respondents view the rise of rule of law and the rule of law-based approach and avoiding personal loopholes as a result of the deployment of e-government. regarding the need for accountability, the existing practices are not so interesting and employees do not distinguish between the traditional system and the e-government system. more than half of the studied population is not responding to the egovernment's effectiveness. regarding the development of justice and fairness in e-government, we must say that this variable is much stronger than previous variables. agreeing 64.5 percent of respondents with this topic is very interesting. the increase in the participation rate is above the level of justice and fairness, and with 46 bulletin of social informatics theory and application issn 2614-0047 vol. 2, no. 2, december 2018, pp. 39-46 najm and tavallaee (investigating the effect of electronic government in realizing social justice in iraq) 80% of respondents' agreement, it can be said that the full glory is about the effectiveness of egovernment in the development of social justice. the first hypothesis of the research based on the significant effect of "e-government" on "increasing the transparency" is confirmed to the tstatistic certificate with a value of 751.2 in a singlesample t-test with 95% confidence. as a result, the first hypothesis of the research is confirmed. the second hypothesis of the research is based on the significant effect of e-government on the "development of the rule of law" to the tstatistic certificate with a value of 679/3 in a single-sample t test with 95 % confidence. as a result, the second sub-hypothesis of the research is confirmed. the third hypothesis of the research is that the "e-government" has a meaningful effect on the "the need of accountability" with the t-statistic of 1.385 in the one-sample t-test, which has no effectiveness. because the mean confidence interval contains also 3, as a result, this hypothesis is not statistically significant and the third hypothesis of the research is rejected. the fourth hypothesis of the research is based on the significant effect of e-government on "paying attention to justice and fairness" to the t-statistic certificate with a value of 349.6 in a single sample t test with 95 % confidence. as a result, the fourth sub-hypothesis of the research is confirmed. the fifth hypothesis of the research is based on the significant effect of e-government on the "increase in participation" to the t-test certificate with a value of 8. 807 in a single-sample t test with 95 % confidence. as a result, the fifth sub-hypothesis of the research is confirmed. the fifth hypothesis of the research is based on the significant effect of "e-government" on "the importance of social consensus" to the t statistic certificate with a value of 5.262 in a single sample t test with 95 % confidence. as a result, the fifth sub-hypothesis of the research is confirmed. the main hypothesis of the research on the effectiveness of e-government in social justice, according to the confirmation of the 5 sub-hypotheses of the six existing sub-hypotheses, is confirmed. references [1] j. c. bertot, p. t. jaeger, and j. m. grimes, “using icts to create a culture of transparency: e-government and social media as openness and anti-corruption tools for societies,” gov. inf. q., vol. 27, no. 3, pp. 264– 271, 2010. [2] m. r. bin abdul karim and n. m. khalid, e-government in malaysia: improving responsiveness and capacity to serve. pelanduk publications, 2003. [3] v. ndou, “e–government for developing countries: opportunities and challenges,” electron. j. inf. syst. dev. ctries., vol. 18, no. 1, pp. 1–24, 2004. [4] å. grönlund, “state of the art in e-gov research–a survey,” in international conference on electronic government, 2004, pp. 178–185. [5] m. hatam, “key factors for success in implementing e-government in iraq,” tarbiat modares university, 2011. [6] h. kyoumars, a. hooshmand, m. m. varaz, v. baigi sivan, and v. sasan, “analyzing the social justice in spatial structure of sanandaj city,” armanshahr, vol. 4, no. 7, pp. 103–112, 2012. [7] j. rawls, the basic structure as subject. dordrecht: springer, 1978. [8] l. l. tung and o. rieck, “adoption of electronic government services among business organizations in singapore,” j. strateg. inf. syst., vol. 14, no. 4, pp. 417–440, 2005. [9] e. kirchner and j. sperling, eu security governance. manchester: manchester university press, 2018. [10] m. moghimi and m. alaei ardakani, “measuring good goverance factors and e-government role in enhancing it,” q. j. inf. technol. manag., vol. 3, no. 8, pp. 171–188, 2011. [11] h. d., a. mcgrew, d. goldblatt, and p. j., “global transformations: politics, economics and culture,” in politics at the edge, c. pierson and s. tormey, eds. london: palgrave macmillan, 2000, pp. 14–28. [12] s. szreter and m. woolcock, “health by association? social capital, social theory, and the political economy of public health,” int. j. epidemiol., vol. 33, no. 4, pp. 650–667, 2004. bulletin of social informatics theory and application issn 2614-0047 vol. 3, no. 1, march 2019, pp. 13-21 13 https:doi.org/10.31763/businta.v3i1.160 learning management systems with emphasis on the moodle at unisa anusua ghosh a,1,*, andrew nafalski a,2, zorica nedic a,3, aji prasetya wibawa b,4 a university of south australia, adelaide, australia b department of electrical engineering, universitas negeri malang, indonesia 1 anusua.ghosh@mymail.unisa.edu.au*; 2 andrew.nafalski@unisa.edu.au; 3 zorica.nedic@unisa.edu.au; 4 aji.prasetya.ft@um.ac.id * corresponding author 1. introduction the internet has revolutionized the way knowledge is deployed and acquired. conventional faceto-face teaching is becoming a thing of the past as knowledge is everywhere and accessible from anywhere. e-learning is gaining momentum as it enables user to access information over the internet outside their conventional area; the classroom. as individual responds to learning differently, elearning provides the platform that facilitates various needs and options to cater for learners to learn efficiently. therefore, in comparison to traditional face-to-face learning it is more convenient and easier to access online resources which would normally be di cult or unavailable. universities and training organization are now embracing the technology and imparting teaching and learning effectively using online platform. with technology reshaping our education system, and increase in online learning, a system to manage the online program arose. these online management systems are known as learning management system (lms). lms are software that provide an online portal to collaborate teaching and learning seamlessly, making it more productive and engaging. moreover, lms provide the space for educators and learners to collaborate in a way that is progressive and e effective. moreover, lms empowers e-learning as it provides the basic tools to organize, deliver and manage online educational courses using a single portal. this paper is organized as follows: section ii presents an overview of the learning management systems including critical review with regards to their compatibility, usefulness, security, accessibility, scalability, stability/reliability and design. in section iii the recent development of the moodle at unisa will be outlined. the a r t i c l e i n f o a b s t r a c t article history received december 23, 2018 revised january 20, 2019 accepted february 7, 2019 with recent advances in technology and the internet, the concept of teaching and learning have evolved significantly. conventional face-to-face teaching is becoming a thing of the past as knowledge is everywhere and accessible from anywhere. thus, a shift to e-learning is gaining momentum. educational institute, companies, individuals and training organizations are embracing new technology and creating a shared online platform to facilitate learning, referred to as the learning management systems (lms). lms are software that provide an online portal to collaborate in teaching and learning seamlessly, making it more productive and engaging. this paper aims to review the top ten lmss both cloud based and open source with regards to their compatibility, usefulness, security, accessibility, scalability, stability/reliability and de-sign in general with emphasis on the recent development of the moodle and netlab at university of south australia (unisa). the open source online learning platform moodle is adopted by unisa to provide educators a space for collaborative learning using the optimized tools to create activities. moreover, the netlab online remote laboratory developed at unisa, provides a platform for academic staff for teaching and demonstrations during lectures and for students to conduct practical experiments remotely on real laboratory equipment. this is an open access article under the cc–by-sa license. keywords learning management system e-learning moodle unisa netlab http://creativecommons.org/licenses/by-sa/4.0/ http://creativecommons.org/licenses/by-sa/4.0/ 14 bulletin of social informatics theory and application issn 2614-0047 vol. 3, no. 1, march 2019, pp. 13-21 ghosh et.al (learning management systems with emphasis on the moodle at unisa) development of the online remote laboratory netlab at unisa is followed in section iv. finally, section v concludes the work. 2. learning management systems smart technology, internet access, and e-learning are leveraging users to explore, gain and deliver knowledge in a streamlined and productive way. virtual learning environments and networked learning will increasingly become key factors in the delivery of training and education in the 21s century [1].today universities/training organizations are offering online courses/training so that user can remotely access course content and collaborate; aiming to develop a con-textual collaborative space within the teaching and learning environment. this knowledge sharing requires a robust platform to benchmark and manage online content. the amalgamation of online and traditional practice are also referred to as blended learning and has been suggested by many researcher to be effective in facilitating the process of online collaborative learning [2]–[7]. 2.1. overview of lms learning management system (lms) as shown in fig.1 are an online platform developed to facilitate collaborative teaching and learning. blended learning defined above is supported extensively by learning management system (lms) or course management system (cms) used interchangeably [8]. gagne et. al. define a cms as a system that provides the tools for the development and delivery of courses, which are placed onto the internet, whereas they de ne a lms as a management system delivering online learning [9]. hall defines an lms as "software that provides the platform for the enterprise's online learning environment by enabling the management, delivery and tracking of blended learning (online and traditional classroom) for employees, stakeholders and customers" [10]. lmss and online learning platforms available for both k-12 and higher education [11]. a robust lms should integrate with other departments, such as human resources, accounting and ecommerce, so administrative and supervisory tasks can be streamlined and automated and the overall cost and impact of education can be tracked and quantified. he also pointed out that an \ lms should support a collaborative learning community, offering multiple modes of learning from self-paced coursework (web-based seminars and classes, down-loadable, cd-rom and video content) to scheduled classes (live instruction in classroom settings or online) to group learning (online forums and chats). fig. 1. lms within e-learning environment. according to hall, optimally an lms will consolidate mixed-media training initiatives, automate the selection and administration of courses, assemble and deliver learning content, measure learning effectiveness and integrate with other enterprise applications [10]. issn 2614-0047 bulletin of social informatics theory and application 15 vol. 3, no. 1, march 2019, pp. 13-21 ghosh et.al (learning management systems with emphasis on the moodle at unisa) thus, while evaluating an lms the following criteria are important:  high availability: the lms platform must be robust and available.  scalability: scalable to meet future growth.  usability: supportive and easy to use.  interoperability: the lms should support resources from different sources and satisfy different industry standards.  stability: reliable infrastructure.  security: the platform should be secured. moreover, as the functionality of each system (lms) such as communication tools, studentstudent interaction tools, student-instructor interaction tools, open source or cloud based differ widely it is important to keep in mind the requirement for individual institution while selecting an online learning management platform. also, the strength and limitations of each platform, how to integrate this new innovation within the existing environment should be considered. open source learning platform provide the code free, are online, flexible and each organization/enterprise can adept accordingly. cloud-based platform also known as software as a service (saas) are hosted on the cloud and maintained by the vendors. the software can be accessed using a password, where by online learners and collaborator can use the system. the downside is that an internet connection is required to retrieve information and cannot be customized as compared to the flexibility of the open source platform. 2.2. review of learning management systems (lms) according to william fenton, author and contributing editor for pc mag, australia \whatever form online education may take, educators and administrators generally rely upon some kind of lms to develop and assign course content, track student progress, and measure and report student outcomes." [11]. lms software have evolved and matured as in the late 1900, blackboard learn was widely used followed by d2l brightspace in the early 2000. moreover, innovative technology, revolutionized lmss with added functionality that cater for individual institution or e-learning requirements. according to g2 crowd, lms software are rated based on user review and market presence which is again based on product, scale focus and influence, as placed into four categories on the grid r [12].  leaders include: google classroom, blackboard learn, canvas moodle, schoology, edmodo, brightspace, and litmos by sap.  high performers are highly rated by their users, but have not yet achieved the market presence of the leaders high performers include: frontline professional growth, eds by, talent lms, thought industries, showbie, chamilo lms, neo, kannu, and path lms.  contenders have significant market presence and resources, but have received below average user satisfaction ratings or have not yet received a sufficient number of reviews to validate the solution. contenders include: mindtap, skyward, in nite campus, and engrade.  niche solutions do not have the market presence of the leaders. they may have been rated positively on customer’s satisfaction, but have not yet received enough reviews to validate them. niche products include: blackboard open lms, zoho wiki, wiziq, sakai 11, latitude learning and learn dash. presented in fig. 2 are the lms on the grid based on customer satisfaction and market presence. similarly, a comparison of the lms form 2016-2017 based on market share for us and canadian higher educational institution are depicted in table. 1. from the table it can be seen that, blackboard learn and moodle scored higher percentages for fall 2017 by institutions, fall 2016 by institutions and fall 2017 by enrollments as 28%,31%,37% and 25%.,5%,12% respectively. moreover, instructure canvas and d2l brightspace scored higher than moodle for fall 2017 by enrollments as 27% and 15% [13]. also, an updated lms market share graphic for us and canadian higher education highlighting the story of the market over time is shown in fig. 3. in this graph, the width of each band represents the percentage of institutions using a particular lms as its primary system. 16 bulletin of social informatics theory and application issn 2614-0047 vol. 3, no. 1, march 2019, pp. 13-21 ghosh et.al (learning management systems with emphasis on the moodle at unisa) in table 1, the comparison clearly shows that blackboard learn and moodle are mostly preferred followed by canvas and d2lbrightspace. fig. 2. lms on the grid based on customer satisfaction and market presence [12]. fig. 3. lms timeline (1997-2017). issn 2614-0047 bulletin of social informatics theory and application 17 vol. 3, no. 1, march 2019, pp. 13-21 ghosh et.al (learning management systems with emphasis on the moodle at unisa) table.1 comparison of lms share in us and canadian higher educational institution (2016-17) [13] lms solution fall 2017 by institutions fall 2016 by institutions fall 2017 by enrollments blackboard learn 28% 31% 37% instructure canvas 21% 17% 27% d2lbrightspace 13% 11% 15% moodle 25% 25% 12% sakai 3% 3% 3% homegrown lms 2% 2% 3% others 4% 6% 1% bned loudcloud learning 0% 0% 1% blackboard angel 1% 1% 1% pearson learningstudio 2% 4% 0% schoology lms 1% 0% 0% the best lms for 2018 compiled by fenton are absorb, moodle, canvas, schoology, blackboard learn, brightspace, edmodo, qiuzlet and google class-room, based on editor's rating, scorm (technical standard for e-learning soft-ware), bundled course content, single sign-on (sso),e-commerce, developer api, available lti support, and native web hosting [11]. another reviewer collated the best lms based on popularity, which are canvas, blackboard learn, google classroom, moodle, talentlms, schoology, litmos, edmodo, brightspace [13]. 2.3. comparison of the best learning management system as lms software provide a solution for the online learning management they are used extensively to empower instructors and learners with flexible teaching/learning methods, educational technologies, interaction mechanisms or learning resources, to provide an interactive learning environment to overcome the limitations of classroom and e-learning [7]. thus, this section presents a critical review of the popular lms as identified by fenton and hill, based on their compatibility, usefulness, security, accessibility, scalability, stability/reliability and design [11], [13]. the learning management system absorb is an industry based software, de-signed for employee training but is scalable. the software provides the learner accessible and intuitive experience along with a cost-effective and powerful administrative tool that integrates efficiently. the lms is compatible, useful and secured. similarly, moodle with its modular plugins based design is an open source, secure, robust, and scalable integrated system to empower educators, administrators and learners to create learning environments. blackboard/blackboard learn on the other hand is a well-equipped k-12 learning management platform used by most educational institution including australia. but the software is not user friendly, has interface and reliability issues. thus, canvas is similar to moodle in some aspect as this being open, usable, educational, but is a cloud-based technologies, that enables easy integration of the content, tools, and services that teacher’s need and students want. not surprisingly, it is a usable, customizable, adaptable, and reliable learning platform. likewise, schoology is an educational learning management system for k-12, the platform is easy to integrate, secured with important information accessible at one point. therefore, brightspace is an user-friendly lms, that allow the instructor to have enormous control over the software. the downside is the limited features and functionality and not scalable. moreover, edmodo is a centralized classroom that connects teachers with students, colleague, and parents, also enabling them to share content, distribute quizzes, assignments. the online portal offers communication, collaboration, and coaching platform to k-12 schools and teachers. quizlet provides a simple learning environment for students to study using ashcards and games. the student can access information and collaborate effectively and study more efficiently. along the line, the google classroom is an educational software that provides the educator to communicate with their students beyond classroom. some of the features and design needs improvement for the software to be scalable and compatible. 18 bulletin of social informatics theory and application issn 2614-0047 vol. 3, no. 1, march 2019, pp. 13-21 ghosh et.al (learning management systems with emphasis on the moodle at unisa) but, talentlms is a fully customized and comprehensible cloud based lms suitable to train employees, customers and partners. it is flexible and can be integrated with scrom authoring tools. the platform is simple for learning and management. furthermore, litmos is a cloud based learning environment de-signed to provide content based learning solution and management to meet employees training within an organization. novo-corti et.al applied e-learning and face-face using moodle. the report shows that moodle promotes the participation of students, increases their motivation and improves their competence and their performance in terms of qualifications [14]. thus the moodle learning management system is the more edacious and effective learning management system than the blackboard learning management system [15]. as moodle was easier to administer and allowed for better organization of their course materials so would consider using the platform in future. 3. moodle at unisa the university of south australia used moodle as an lms to embed their online teaching and learning framework, learnonline that enables creation of a unique course site for each offering of a course. the word moodle stands for modular object oriented dynamic learning environment that can be customized to support academic staff and students in their teaching and learning activities. the moodle lms platform is an open source software application that is comprehensive, scalable, secure and easily manageable. as many other universities, unisa has customized it to create and power all our course websites.students enrolled in a course will gain automatic access to the course web site which is retained for one year after the conclusion of the course. an example of a course web site within the unisa moodle environment is shown in fig. 4. each lecturer can edit the course website template and customize it to his/her needs. each course website includes teaching materials like, lecture notes, lecture video recordings, and other multimedia resources; then activities that students need to complete like, assessment tasks, formative quizzes, etc. students are uploading assessment tasks online which are by default tested for plagiarism via turnitin and reports are readily available to lecturers when they assess the assignments. marks are recorded in the system and the final marks and grades are generated by the system at the completion of the course. fig. 4. a course website example. this is very helpful for lecturers and reduces the risk of errors. lecturers also have an option to upload marked assignments with marks and feedbacks for students on their work. for each assessment task students can view the grade distribution of the whole class so they can compare their own performance with the performance of the rest of the class which helps students evaluate their own performance. issn 2614-0047 bulletin of social informatics theory and application 19 vol. 3, no. 1, march 2019, pp. 13-21 ghosh et.al (learning management systems with emphasis on the moodle at unisa) the unisa moodle application also provides a number of reports to lecturers so they can monitor student activities, behavior and performance. fig.5 shows a course dashboard with some of the reports available to lecturers, like how many students accessed the course website, which resources were most assessed over the past week, etc. fig. 5. course dashboard showing various reports on student activities. details of reports can also be viewed for more comprehensive analysis of students' engagement as shown in fig. 6. a lecturer can further see even more details down to which student did what (see link in top right-hand corner). fig. 6. report with more details on student engagement. in summary, the moodle at unisa is usefully customized and implemented in such a way to provide both students and staff with a rich online educational platform suitable for contemporary teaching and learning activities. 20 bulletin of social informatics theory and application issn 2614-0047 vol. 3, no. 1, march 2019, pp. 13-21 ghosh et.al (learning management systems with emphasis on the moodle at unisa) 4. online remote laboratory netlab at unisa netlab is a remote laboratory developed at unisa is one of the very rust remote laboratory developed in australia. netlab is an open access platform that enables students and any other user to remotely access real equipment at unisa and to perform experiments from anywhere in the world and at any time as it is online 24/7. it is developed in java software and is linked to websites of all courses that use netlab in teaching. it is also very useful for lecturers as they can perform laboratory experiments in lecture theatres and thus teach students not only theory but also hands-on skills necessary for controlling experiments in a laboratory. this remote laboratory is suitable for experiments on basic passive electrical circuits and can be used in courses like introductory electrical engineering course, electrical circuit theory and signals and systems courses. fig. 7. netlab graphical user interface. netlab graphical user interface is shown in fig. 7. it includes basic electronic instruments; function generator, oscilloscope and digital multimeter and a range of passive components like resistors, capacitors and inductors. netlab is open access and can be accessed at http://netlab2.unisa.edu.au/. although netlab was not developed within the moodle, it is an online educational environment and an excellent example of additional resources used in online teaching. 5. conclusion recent advances in technology and the internet, has seen the concept of teaching and learning evolve significantly. conventional face-to-face teaching is becoming a thing of the past as knowledge is everywhere and accessible from anywhere. thus, a shift to e-learning is leveraging educational institute, companies, individuals and training organizations to embracing new technology and creating a shared online platform to facilitate learning, referred to as the learning management systems (lms). the literature review of the top ten lms shows that blackboard and moodle are most widely used. moreover, as the functionality of each system (lms) such as communication tools, student-student interaction tools, student-instructor interaction tools, open source or cloud based differ widely it is important to keep in mind the requirement for individual institution while selecting an online learning management platform. unisa has customized and implemented the moodle in such a way that it provide both students and staff with a rich online educational platform. furthermore, though the netlab was not developed within the moodle, it is still an online educational environment and an excellent example of additional resources used in online teaching. issn 2614-0047 bulletin of social informatics theory and application 21 vol. 3, no. 1, march 2019, pp. 13-21 ghosh et.al (learning management systems with emphasis on the moodle at unisa) references [1] p. tóth, “virtual learning approach in vocational initial teacher training,” in proceedings of the international conference on engineering education, 2007. [2] c. r. graham, blended learning systems: definition, current trends, and future directions. in c. j. bonk & c. r. graham (ed.), the handbook of blended learning: global perspectives, local designs, san fransi. pfeiffer publishing, 2006. [3] j. macdonald, blended learning and online tutoring: planning learner support and activity design. gower publishing ltd., 2008. [4] m. v. lópez-pérez, m. c. pérez-lópez, and l. rodríguez-ariza, “blended learning in higher education: students’ perceptions and their relation to outcomes,” comput. educ., vol. 56, no. 3, pp. 818–826, 2011. [5] a. carr-chellman, d. dyer, and j. breman, “burrowing through the network wires: does distance detract from collaborative authentic learning?,” int. j. e-learning distance educ., vol. 15, no. 1, pp. 39– 62, 2000. [6] m. gabriel, “learning together: exploring group interactions online,” j. distance educ., vol. 19, no. 1, pp. 54–72, 2004. [7] h. j. so and t. a. brush, “student perceptions of collaborative learning, social presence and satisfaction in a blended learning environment: relationships and critical factors,” comput. educ., vol. 51, no. 1, pp. 318–336, 2008. [8] t. wilen-daugenti, edu: technology and learning environments in higher education. new york: peter lang, 2009. [9] r. m. gagne and l. j. briggs, principles of instructional design. holt: rinehart & winston, 1974. [10] j. l. hall, “assessing learning management systems,” learning delivery, 2002. [online]. available: https://www.chieflearningofficer.com/2002/12/11/assessing-learning-management-systems/. [accessed: 01-sep-2018]. [11] w. fenton, “the best (lms) learning management systems for 2018,” education, 2018. [online]. available: https://www.pcmag.com/roundup/336308/the-best-lms-learning-management-systems. [accessed: 01-sep-2018]. [12] g2 crowd, “best learning management system (lms) software,” 2018. [online]. available: https://www.g2.com/categories/learning-management-system-lms. [accessed: 01-sep-2018]. [13] p. hill, “state of higher ed lms market for us and canada: fall 2017 edition,” lms & learning platforms, 2017. [online]. available: https://mfeldstein.com/state-higher-ed-lms-market-us-canada-fall2017-edition/. [accessed: 01-sep-2018]. [14] i. novo-corti, l. varela-candamio, and m. ramil-díaz, “e-learning and face to face mixed methodology: evaluating effectiveness of e-learning and perceived satisfaction for a microeconomic course using the moodle platform,” comput. human behav., vol. 29, no. 2, pp. 410–415, 2013. [15] m. machado and e. tao, “blackboard vs. moodle: comparing user experience of learning management systems,” in 2007 37th annual frontiers in education conference-global engineering: knowledge without borders, opportunities without passports, 2007. bulletin of social informatics theory and application issn 2614-0047 vol. 3, no. 1, march 2019, pp. 22-29 22 https:doi.org/10.31763/businta.v3i1.161 blocking pornography sites on the internet private and university access ni’matul ulfah a,1,*, ninon oktaviani irawan a,2, piska dwi nurfadila a,3, putri yuni ristanti a,4, jehad a.h hammad b,5 a department of electrical engineering, universitas negeri malang b computer information systems department, faculty of technology and applied systems, al-quds open university, palestine 1 ulfah153@gmail.com*; 2 ninonirawan@gmail.com; 3 piskadwi12@gmail.com; 4 putriyuni7@gmail.com; 3 jhammad35@hotmail.com * corresponding author 1. introduction by the reachable internet access that ease people to access internet as well as the increase of internet users from year to year, it is found that one of contents provides pornography content said that in 2017, the largest user accesses their platform comes from mobile device. data shows that in 2013 the percentage is 45% and becomes 67% in 2017. one of reasons about why the access towards pornography contents popular is the cheap price of internet package for mobile devices. data from telecommunications union shows that rate of data broadband per average gni per capita in indonesia is 1.45% cheaper than price in 2015, which is 1.53 per cent. the government realizes that effect caused by pornography can change people’s mind, especially learners. learners still unable to choose content considered as positive or negative content. they will be easier to be affected by their social environment without taking care to the effect of internet using. according to law no 44 year of 2008, pornography is picture, sketch, illustration, photo, text, voice, sound, moving picture, animation, cartoon, conversation, body language, or other messages through many types of communication media and/or performances or shows in the public, which contain sexuality (pornography) or sexual exploitation that violated moral norm prevailed in the society [1]. pornography is something that arouses sexual desire by picture, painting, photo, video, text or conversation (voice)[2] [3]. a r t i c l e i n f o a b s t r a c t article history received january 1, 2019 revised january 22, 2019 accepted february 4, 2019 internet development in indonesia is not always results in positive effect to the indonesian people, especially to the learners. by the effect comes from internet application, then, ministry of communication and information technology conducts blocking activity to the sites suspected to change people’s mind. based on database of trust positive between 2014-2017 type of pornography content has the first place than other contents. the increase of access towards pornography content in indonesia supported by the availability of reachable internet access. one of contents provides pornography content said that in 2017, the largest user accesses their platform comes from mobile device. it is supported by the price of internet package for mobile device in indonesia is one of the cheapest than other southeast asia countries. therefore, the government, since 2002 till present, continually conducts blocking activity towards negative sites together with isp in indonesia. the isp (internet service provider) must obey the government by conducting blocking activity towards negative sites through dns nawala or other filtering program. the aim of this paper is to analyze pornography access through many types of provider and the differences from each provider in conducting sensor towards sites with pornography content. this is an open access article under the cc–by-sa license. keywords sites pornography blocking isp sensor http://creativecommons.org/licenses/by-sa/4.0/ http://creativecommons.org/licenses/by-sa/4.0/ issn 2614-0047 bulletin of social informatics theory and application 23 vol. 3, no. 1, march 2019, pp. 22-29 ulfah et.al (blocking pornography sites on the internet private and university access) in “ the nature and dynamics of internet pornography exposure for youth”, it is explained that accessing pornography either through electronic or non-electronic media for them under 18 years old included as a crime [4]. negative impact caused by pornography to adults is gender believe [5]. in general, pornography has effect to weaken function of each individual and social in the type of mind, body, and heart [6]. meanwhile, for largest portion of adolescent accesses pornography content is male who already have puberty [7]. in the research, it shows that pornography has negative effect towards learning, which is about content and dynamics of sexual interaction, gender mapped to the sexual relationship, sexual agreement, normalization to the gender violence, and sexual script that create femininity and masculinity. fig. 1. negative internet site screening graphic fig. 1 shows the survey in 2014 to 2017 shows that negative contents of pornography group got the first place. the government, in 2002, created program of positive internet in order to cope with negative content of pornography to be followed up with the action. however, crimes in internet (cyber crime) develop rapidly and still have possibility to access using many isp in indonesia in order to access pornography content. besides that, accessing using proxy and imitating dns conducted by users to access negative content, especially pornography. ministry of communication and information technology realizes the change of people’s mind towards internet, thus the ministry uses reference of electronic information and transaction laws and anti-pornography laws in order to block sites with pornography contents. ministry of communication and information technology involves indonesia internet service provider (apjii) and 15 internet service provider to activate google safe search in indonesia isp network. various internet service providers’ result in number and type of content filtered by isp also various. in order to make standardized control system, ministry of communication and information technology requires that isp makes subcontractor of sensor service to assure that each isp obey the government policy. ministry of communication and information also requires that isp buys commercial filter product in order to play an active role in controlling contents from isp administrator. 2. method 2.1. interviews in the process of collecting sites related to pornographic content, interviews were conducted with five speakers. from the five speakers, there are similarities in several sites that are accessed. from the list of sites obtained through interviews both directly and indirectly. the indirect interview method is carried out through whatsapp. whatsapp is one of the messaging and exchanging applications commonly used by users in indonesia. direct interviews conducted on september 27 only get two sites. indirect interviews conducted through whatsapp on september 28th received 21 sites. 24 bulletin of social informatics theory and application issn 2614-0047 vol. 3, no. 1, march 2019, pp. 22-29 ulfah et.al (blocking pornography sites on the internet private and university access) 2.2. documentation the method used to collect material and opinions from the author so that it can be used as a theoretical basis, by analyzing the literature relating to research problems. this method is done for data collection of isps who can still access pornographic sites and have been able to access pornographic sites. the collected data is documented in table form. this table is divided into five researches conducted on september 28th, and october 5th, october 12th, october 19th and october 26th. as well as gathering problems on pornographic literature so that it can be presented in the form of methodologies that can underlie this research. 3. website filtering ministry of communication and information technology runs health and safe internet (insan) and trust positive as the attempt to control pornography sites. by those programs, it is expected that it can reduce or erase pornography sites from internet. however, those programs may still considered as centered program due to it is still able to reach controlling in the smallest server unit [8]. today, the implementation of those programs still optional and many isp use different techniques in the filtering system. this web filtering can be conducted through three steps, personal, group, and organization. personal web filtering can be conducted individually through our own computer. group web filtering is like local network, for example is control application owned by um. this level of filtering usually conducted through proxy. while, organization web filtering conducted by isp (internet service provider). isp included into government method in restricting users to access pornography sites or even blocked it directly through the decision of ministry of communication and information technology to isp. the following is many techniques used by isp to block pornography sites in indonesia [9]. 3.1. dns filtering dns used in application that connected with internet such as web browser or email. dns will works by mapping host name to the suitable ip address [10]. the advantage of this technique is simplicity and effectiveness in case of manipulation. the following stages carried out in the dns filtering process describes below [11].  rejected, when you want to access a page then a notification appears from the page "host not found" or "connection denied".  nxdomain, manipulate the existence of the host, so when accessing a page "host not found" notification appears.  name hijacking, switch the actual page to a page that is intentionally hijacked to another page.  name invalidation, hijacking web pages by displaying notifications "can't connect".  shut up, does not respond to user requests to access the page, resulting in out of time access.  provoked server failure, causing a message failure on the user's server to go to a certain domain and displaying the notification "can't connect". this technique developed to be dns nawala in 2009 by the supports from telkom in order to implement laws of anti-pornography and introduction towards “health and safe” program. 3.2. dns poisoning and spoofing protection or control program through dns is a simple level that mostly conducted. as we know about dns spoofing [12][13] and dns poisoning [13][14] that mostly found such when we access a site but isp cannot reach the site. this system works like a network cut off, thus it will be seen as if we or the networks are in problem in accessing site. there are many strategies can be conducted through dns either attack the dns or protect it using firewall [15]. 3.3. border gateway protocol (bgp) the type of this bgp filtering such as as_path filtering: peer locking. route filtering is basic in regulating bgp policy. there are numbers way to filter one or more network from bgp partner, including information of network layer capability and as_path as well as community attribute [16]. issn 2614-0047 bulletin of social informatics theory and application 25 vol. 3, no. 1, march 2019, pp. 22-29 ulfah et.al (blocking pornography sites on the internet private and university access) there is other feature from bgp that may use, which is outbond route filtering (orf) feature based bgp prefix by using bgp orf to send and receive capability in order to minimize number of bgp update sent between bgp partners. configuring this feature helps to reduce system resources needed to result and process route update by filtering unwanted route update in the source. for example, this feature can be used to reduce number of processing needed by router that not receive full route from service provider network [17]. 3.4. trust positive the attempt conducted to filter contents managed and supported by ministry of communication and information technology. principle and technique from this method is saving domain consists of black list and white list as well as configuration information in order to make administrator enable to implement filtering by using open source squid cache with proxy http/caching system with the addition of squidguard [18]. in the trust site, it has url delivery page encourages the users to participate in developing url list used as black list that will be developed by ministry of communication and information technology. 3.5. deep packet inspection (dpi) deep packet inspection is a technology implemented on router that will be used to monitor data in real time. deep packet inspection is not only observe targeted address, but also payload and sender address. then, this captured information will be compared with protocol on order to identify data characteristic of isp hardware. dpi has various functions including [19]:  network security, used by operators to detect malware and also dangerous traffic.  network management, used to handle rare bandwidth. this will make it easier for isps to block unwanted traffic such as sharing peer-peer files that consume bandwidth. it can also be used to optimize routing based on the data transferred.  surveillance, internet and telecommunications companies in the us use dpi for real-time monitoring needs in collaboration with national security agencies. besides that it is also used to monitor internet traffic.  content regulation, can apply string matching and is used to block websites that are considered dangerous. dpi has the ability to inspect packages.  copyright enforcement, can be used to detect copyrighted packages such as music, videos or other copyrighted documents.  ad injection, companies like nebuad and the phorm package offer isps to edit advertisements on websites that are in accordance with the interests of users. 3.6. application control dan url filtering application control and url filtering system was developed by company check point. this system has undergone two changes, first in 2014 system was launched as version r76 [20] and the year 2016 named r77 [21]. this application is used to handle malware and hogging bandwidth. the benefits of application control and url filtering including: (a) local internet access control to the site that will be on the block, (b) control bandwidth problem, and (c) increase security organization. the main feature in the application control and url filtering are:  granular application control, identify the website/application is blocked and give protection on malware  largest application library with appwiki, this application uses the library with more than 4500 applications and over 100,000 widgets and web 2.0 categories that will be on the block.  integrated into security gateways, enable security gateways i.e. utm-1, power-1, ip appliances, and ias appliances.  central management, eases management of security policies  smart event analysis, helps to understand the proceedings of application control and url filtering with statistics, reporting filters that pass through security gateways. 26 bulletin of social informatics theory and application issn 2614-0047 vol. 3, no. 1, march 2019, pp. 22-29 ulfah et.al (blocking pornography sites on the internet private and university access) 4. results and discussion strategy to control pornography in indonesia has been ruled in laws no 44 year of 2008, thus government program in blocking sites with pornography contents together with isp in indonesia and also content provider itself to remove or block those contents. in this blocking activity, isp uses site filtering through list given by the government. despite site filtering, there is dns blocking for certain sites. a research conducted by comparing five isp used in indonesia and a local application control. this research conducted five times for four weeks; september 28, october 5, october 12, october 19, and october 26 towards 23 sites contained pornography content as with interview to the five persons that ever accessed and still accessing the sites. such in table 1, it can be seen the result of research conducted to compare the more secure isp in sites with pornography content on september 28 to october 26 2018 towards 23 websites. table.1 comparison of 5 isp security against pornography sites p observation k1 k2 k3 k4 k5 p1 10 10 10 10 10 p2 3 3 3 3 3 p3 9 9 9 9 9 p4 7 7 7 7 7 p5 3 3 3 3 3 university 2 1 1 1 1 total 34 33 33 33 33 fig. 2. diagram of the amount of porn sites from each application. based on our research conducted towards five isp in indonesia and application as comparison in site blocking, it can be seen in fig. 2 that from 23 pornography sites ten sites still able to be accessed and 13 sites have been blocked. the following are the results of research on pornographic sites:  provider p1 can access ten sites for each study with a presentation of 29% of the total amount of content that can be accessed.  p2 provider can access three sites for each study with a presentation of 9% of the total amount of content that can be accessed.  the p3 provider can access nine sites for each study with a presentation of 26% of the total amount of content that can be accessed.  provider p4 can access seven sites for each study with a presentation of 21% of the total amount of content that can be accessed.  the university of p5 can access two sites in the first study, while for the four studies, there is a decrease in access, which can access one site with 6% presentation of the total amount of content can be accessed. 29% 9% 26% 21% 9% 6% p1 p2 p3 p4 p5 university issn 2614-0047 bulletin of social informatics theory and application 27 vol. 3, no. 1, march 2019, pp. 22-29 ulfah et.al (blocking pornography sites on the internet private and university access) fig. 3. graph of changes in the amount of porn sites from each case. based on fig. 3, it can be seen that different color line show research k1-k5 conducted towards porn sites that still able to be accessed as well as provider and application in university. it can be seen each of them, p1-p5, has no change towards its number of porn sites can be accessed, where it is shown from color of k1-k5 research that overlapped each other. meanwhile, in accessing sites through university, it shows a change. there is change from two sites that still able to be accessed become only one site that still able to be accessed. then, in fig. 4, it shows change towards number of porn sites that still able to be accessed from the whole research. fig. 4. graphic of changes in the amount of porn sites from the university network. the difference of pornography sites that able or unable to be accessed by provider caused by the difference of technique and filtering system used by internet service provider. table 2 presents filtering technique owned by provider or university used to block pornography sites. table.2 comparison of 5 isp methods to pornography sites p methods a b c d e p1 √ √ p2 √ p3 √ p4 p5 √ √ √ university √ a. a: dns filtering b. b: dns poisoning and spoofing c. c: bgp (border gateway protocol) d. d: trust positive e. e: application control and url filtering the research result shows that provider p5 gets highest portion to use blocking method of dns poisoning and spoofing, bgp (border gateway protocol) and trust positive. method development conducted by provider p5 able to block 20 pornography sites. the research result also shows that p1, 10 p2, 3 p3, 9 p4, 7 p5, 3 university, 2 p1, 10 p2, 3 p3, 9 p4, 7 p5, 3 university, 1 p1, 10 p2, 3 p3, 9 p4, 7 p5, 3 university, 1 p1, 10 p2, 3 p3, 9 p4, 7 p5, 3 university, 1 p1, 10 p2, 3 p3, 9 p4, 7 p5, 3 university, 1 0 2 4 6 8 10 12 0 1 2 3 4 5 6 7 observation k1, 2 observation k2, 1 observation k3, 1 observation k4, 1 observation k5, 1 0 0.5 1 1.5 2 2.5 0 2 4 6 university university 28 bulletin of social informatics theory and application issn 2614-0047 vol. 3, no. 1, march 2019, pp. 22-29 ulfah et.al (blocking pornography sites on the internet private and university access) provider p4 uses those three blocking the techniques as well as this is directly proportional to the amount of content that is successfully blocked. for example provider p1 uses proxy or gateway blocking technique, then the mechanism of blacklist internet access will give notification in the cellphone screen with notification of “access is denied to security policy enforcement'. while, provider p5 uses blocking technique of trust positive by mechanism of creating specific team to look for safe sites to be accessed or included into whitelist and unsafe sites to be accessed or included into blacklist. besides that, those provider companies also open to the input from customers relate to sites that must be blocked to be directly included into blacklist. the research result that the university uses a third party to block pornographic sites namely application and url filtering, with the workings of the university party input the url of the content that is considered as containing pornography. 5. conclusion from the research that we have done, there are 23 pornographic sites out of five interviewees that we have interviewed. of the 23 sites tested using five different isps. the results obtained are not all providers can access the site, there are differences between one provider and another provider, and this is because each provider has its own technique in blocking pornographic sites. this study also examines the techniques carried out by providers in blocking, from the analysis that we got, there are four techniques used by providers namely dns filtering, dns poisoning and spoofing, bgp, positive trust, and application control & url filtering. the difference between the four sites is the costs that will be incurred from isps in blocking pornographic sites. references [1] kementrian hukum dan ham, “undang-undang ri nomor 44 tahun 2008 tentang pornografi.” 2008. [2] e. w. owens, r. j. behun, j. c. manning, and r. c. reid, “the impact of internet pornography on adolescents : a review of the research,” sex. addict. compulsivity, vol. 19, pp. 99–122, 2012. [3] j. k. global, p. prihandini, p. a. janitra, and u. padjadjaran, “perilaku penggunaan smartphone dan akses pornografi di kalangan remaja perempuan,” j. komun. glob., vol. 7, no. 1, pp. 1–11, 2018. [4] c. sabina, j. wolak, and d. finkelhor, the nature and dynamics of internet pornography exposure for youth, vol. 11. 2008. [5] p. j. wright, r. s. tokunaga, and a. kraus, “a meta-analysis of pornography consumption and actual acts of sexual aggression in general population studies a meta-analysis of pornography consumption and actual acts of sexual,” j. commun., no. 66, pp. 183–205, 2016. [6] t. rahmania and h. c. haryanto, “persepsi pornografi pada anak (studi pendahuluan pada siswa kelas 5 sekolah dasar islam ‘x’),” inq. j. ilm. psikol., vol. 8, no. 1, pp. 55–74, 2017. [7] g. dines, “dignity: a journal on sexual exploitation and violence growing up with porn: the developmental and societal impact of pornography on children,” dign. a j. sex. exploit. violence, vol. 2, no. 3, pp. 1–9, 2017. [8] m. a. helmiawan and s. kom, “internet sehat dengan metode web filtering layer 7 pada jaringan wireless(study case hotspot rt4 cipeuteuy baru),” no. april, 2018. [9] r. a. halimatussa, y. hasan, and l. belakang, “analisa akurasi,” vol. 4, no. september, pp. 68–74, 2012. [10] r. d. sari, a. p. u. siahaan, supiyandi, and m. muttaqin, “a review of ip and mac address filtering in wireless network security,” ijsrst (international j. sci. res. sci. technol., vol. 3, no. 6, pp. 470– 473, 2017. [11] r. scott and a. melgosa, “using blocking / filtering technologies,” j. advent. educ., vol. 1, no. march, pp. 55–67, 2013. issn 2614-0047 bulletin of social informatics theory and application 29 vol. 3, no. 1, march 2019, pp. 22-29 ulfah et.al (blocking pornography sites on the internet private and university access) [12] n. tripathi, m. swarnkar, and n. hubballi, “dns spoofing in local networks made easy,” in ieee international conference on advanced networks and telecommunications systems, 2017. [13] a. polyakov, “dns spoofing and poisoning : trust , danger , and solutions.” . [14] h. s. hmood, z. li, and h. k. abdulwahid, “adaptive caching approach to prevent dns cache poisoning attack,” comput. j., vol. 58, no. 4, pp. 973–985, 2015. [15] j. afonso and p. veiga, “improving dns security using active firewalling with network probes,” int. j. distrib. sens. networks, vol. 8, no. 5, p. 684180, may 2012. [16] cisco, “identifying and filtering routes based on nlri filtering using distribute-list with a standard access list,” . [17] cisco, “bgp prefix-based outbound route filtering,” in ip routing: bgp configuration guide, cisco ios release 15m&t, 2017. [18] c. andersen, “tinjauan hukum kewenangan sistem trust + positif tm sebagai database acuan dan rujukan penyaringan seluruh layanan akses informasi publik penggunaan internet di indonesia,” dialogia luriduca j. huk. bisnis dan investasi, vol. 9, no. 1, pp. 80–91, 2017. [19] r. bendrath, “global technology trends and national regulation : explaining variation in the governance of deep packet inspection,” int. stud. annu. conv., no. february, pp. 1–32, 2009. [20] check point, application control and url filtering r76, no. april. 2014. [21] check point, application control and url filtering r77, no. december. 2016. bulletin of social informatics theory and application issn 2614-0047 vol. 7, no. 1, march 2023, pp. 57-62 57 https:doi.org/10.31763/businta.v7i1.212 social media and e-government to prevent corruption in indonesia villages adjie rosyidin a,1,*, arief yoga pangestu a,2, austin fascal iskandar a,3, darusalam b,4 a universitas negeri malang, malang, indonesia b accounting research institute, university teknologi mara, malaysia, level 12, menara sultan abdul aziz shah, universiti teknologi mara, 40450 shah alam, selangor 1 adjierosyidin48@gmail.com ; 2 ariefyogapangestu.x@gmail.com; 3 austinfascal@outlook.com; 4 darusalam85@gmail.com * corresponding author 1. introduction corruption is an ever-increasing problem all across the world, and its long history suggests it may be as ancient as humanity itself [1]. corruption is defined as the abuse of public power for personal gain or for the benefit of a group to which one owes allegiance [2]. as a result of this growing awareness, many supporters increasingly tout good governance as the means to secure long-term economic development and competitiveness [3]. corruption prevention has gone global [2], with many nations investing heavily to leave a better world for the next generation. however, many public officials are prepared to engage in corrupt activities due to the widespread belief that doing so offers "high reward, low risk" [4]. when it comes to preventing and punishing corrupt conduct, the legislation on public information disclosure has significantly influenced the efficiency with which the indonesian government serves its people and residents. transparency of information in all government institutions is a priority for the corruption eradication commission (kpk), and it is seen as a necessary condition for establishing democratic governance, which is predicted to lead to a shift from a closed government to an open one, particularly in regards to the management of public finances. corruption's multifaceted character necessitates an equally multifaceted approach to understanding and overcoming it [5]. corruption is notoriously difficult to track down, which has hampered issuesolving in many nations. weak law enforcement, poor legal frameworks, and a lack of proper systems for openness and accountability are often highlighted as problems in the fight against corruption. in reality, there are a number of underlying behavioral issues that need to be addressed in order to combat a r t i c l e i n f o a b s t r a c t article history received january 3, 2023 revised february 18, 2023 accepted february 24, 2023 examining the anti-corruption movement in indonesia, this paper will give a review of the topic. the primary goal of this analysis is to discover whether or not e-government and social media can serve as an efficient weapon in the fight against corruption in indonesian village budgets. this research evaluates corruption from several behavioral angles. to evaluate the efficacy of social media and e-government in combating corruption in indonesia's village funds, researchers conducted a comprehensive literature review and normative juridical analysis using a conceptual approach. the study demonstrates that ict's rapid expansion and improvement in indonesia has had far-reaching consequences. the participants share and discuss corruption-related news and information. because traditional punishment-oriented tactics have not been effective in eradicating corruption in indonesia, incorporating technology into future efforts to do so might boost the likelihood of success. this is an open access article under the cc–by-sa license. keywords anti-corruption indonesia village funding corruption mailto:adjierosyidin48@gmail.com http://creativecommons.org/licenses/by-sa/4.0/ http://creativecommons.org/licenses/by-sa/4.0/ 58 bulletin of social informatics theory and application issn 2614-0047 vol. 7, no. 1, march 2023, pp. 57-62 adjie rosyidin et.al (social media and e-government to prevent corruption…) corruption effectively [6]. if these issues aren't addressed, the effort to eradicate corruption may not be successful. the village law's requirements for managing municipal funds serve to motivate the mayor to put them into effect. there are several aspects that the community has communicated, all having to do with the village chief's preparedness, the village's infrastructure, and the chief's leadership. the village law provides the local administration with unrestricted autonomy to run and improve the village as it sees fit. because of the wealth of available resources, the village administration has a great chance to improve residents' standard of living and economic standing. one billion to one and a half billion dollars in village money is a breath of fresh air that will allow the village to manage its potential better and grow into a self-sustaining, efficient, and competitive community. 2. method this research uses the literature study. the researcher studied a variety of libraries relating to information systems, especially matters relating to the system, to be examined to solve a problem. observations in this literature study data were obtained from literature books, research journals, papers, magazines, and newspaper references or references from previous research on terms, existing frameworks, theories, and relevant to the subject matter studied. as well as conducting data collection techniques by finding, recording and studying data from a number of archives or official documents in the research location that are considered important and have relevance to the problem under the study. 2.1. research problem the question is, how can the governing body of a community keep its natural resources from being mismanaged? even if the village law is functioning properly, especially with regard to the administration of village resources, it is not sufficient to prevent graft. not only must we stop trying to keep corruption at bay, but we also need to stop using technology to make anti-corruption efforts more likely to succeed. the prevalence of online social interactions and the consequential role of ict in molding individual personalities cannot be overstated. the rise of social media platforms has been crucial to the evolution of human communication. every day, for instance, social media users in indonesia post and discuss information about a wide range of topics, including corruption. in addition, e-government and other forms of it-enabled transparency assist in combating corruption. 2.2. research objective this paper aims to find the methods that can be used to prevent corruption, especially regarding village funding in indonesia. the methods required should be able to be accessed through smartphones by utilizing the internet. 2.3. research question • how does the village government in this community make sure that its natural resources are managed fairly and honestly? • what method does the village government need to prevent corruption? • how can social media and e-government be used as a weapon to combat corruption? 3. review of literature and hypothesis development 3.1. what is corruption according to the previous study [7]–[10] defined corruption as an exploiting behavior of public office that is contrary to the laws and regulations regarding public office in forms of fraud, bribery, malicious agreement to obtain resources and public funds for personal or personal gain. intentional lawbreaking with the goal to profit oneself or another person or company at the expense of the national treasury or the national economy is defined as corruption under law no. 31 of 1999. according to these two schools of thought, corruption is committed by anybody who illegally utilizes their position in public office to benefit themselves, their relatives, or a business to the detriment of the state resources and/or state finances and/or the economy country. issn 2614-0047 bulletin of social informatics theory and application 59 vol. 7, no. 1, march 2023, pp. 57-62 adjie rosyidin et.al (social media and e-government to prevent corruption…) 3.2. e-government one definition of e-government is the use of information technology (such as the internet, the world wide web, and mobile computing) by government agencies to facilitate the delivery of services to the public, increase engagement with business and industry, other levels of government, and the international community at large, and increase access to information [11]. meanwhile, the ministry of communication and information technology defines e-government as the use of internet-based information technology and other digital devices under government management to disseminate government information to citizens, businesses, and other organizations via the internet [12]. e-government can be defined as the use of internet-based communication and other digital devices managed by the government to disseminate information from the government to the public, business partners, employees, business entities, and other institutions, or vice versa, with the goals of improving community services, increasing interaction with the public, and reducing bureaucratic red tape. although the rule of law is the most potent predictor of anti-corruption and the basic criteria for clean governance [13], e-government can be a useful instrument for combating corruption in government. 3.3. social media the term social media has historically been used to refer to a broad category of emerging forms of online media that are unified by a set of shared qualities, chief among them high levels of user interaction that encourage the contribution and feedback of everyone, the openness that avoids various obstacles to access and utilizes media content, conversations that carry out two-way communication, communities that share a common interest, connections that utilize links to sites, resources, and other people. because it allows people to express themselves freely, social media may offer users a sense of agency. essentially, this makes it possible for anybody with access to the internet to publish or broadcast material at little cost, thereby democratizing the media [14]. six forms of social media contain notes and thoughts that provide innovation and change lives: social networks, blogs, wikis, podcasts, forums, content communities, and microblogging [15]. based on the expert's opinion, it can be concluded that it is possible to characterize social media as a means that consists of various forms of online media characterized by the presence of user participation, openness to the substance of the problem, two-way conversation, communities that have similar interests, and connectedness to the site, the source power, and people. social media is also a popular thing that both computer or smartphone can access. 4. results and discussion 4.1. e-government vs. corruption: a case study of village funding in indonesia accurate information can now be created, accessed, processed, and used thanks to the fast growth of information and communication technology. in this age of globalization, knowledge is a priceless commodity. to sustainably increase the company's competitiveness, more information is required. governments everywhere are under increasing pressure from a wide range of stakeholders to raise the bar on public service delivery and access to information. as a result, e-government and related initiatives are becoming more crucial for policymakers of all stripes. paper-based administration, which the researchers meant by traditional government, is on its way out. the shift from paper-based to paperless administration, or e-government, is one of the most-discussed topics in public affairs today. to meet this problem head-on, the indonesian government has enacted laws to promote the use of electronic governance at all levels of government, from the municipal to the presidential. the finished network of computers and other devices will be utilized to coordinate activities at the national and local levels of government. the indonesian government's intention to move the country's population toward a knowledge-based society is reflected in legislation such as presidential instruction (in-pres) number 3 of 2003 and the minister of communication and information decree on the development of e-gov. e-government, in its most basic form, is the provision of information services to other government institutions (government to government—g2g), to the business world (government to business— 60 bulletin of social informatics theory and application issn 2614-0047 vol. 7, no. 1, march 2023, pp. 57-62 adjie rosyidin et.al (social media and e-government to prevent corruption…) g2b), and to the general public (government to citizen—g2c), with the goals of: providing comprehensive information about institutions or regions for economic growth and regional development; enhancing the efficiency and effectiveness of service processes; and optimizing the delivery of public services. by utilizing e-government, we can reduce the possibilities of corruption while still maintaining village funds effectively. maladministration in village gov can occur from public service activities by public officials to citizens. maladministration tends to occur in public services provided by direct contact between providers and users. collusion and nepotism, misuse of authority, demands for monetary reward, and bribery are only some of the maladministration activities that may be avoided with the help of e-government. 4.2. case study of village funding through social media in indonesia after the corruption eradication commission (kpk) detained the governor of bengkulu province on june 20, 2017, people took to social media to voice their disapproval. the governor of rejang lebong regency in bengkulu reportedly took bribes totaling rp 1 billion (us$ 75,000) to fix the tender for two road construction projects [16]. the authors used the ncapture feature in nvivo 11 to collect data on 300 tweets from 20 and 21 june 2017, including "ott kpk bengkulu" or "kpk's sting operation in bengkulu" and then analyzed the data to determine which aspects of the case are most prominent. several unnecessary terms (such as stop words) were removed from the dataset before it was analyzed using the word frequency query tool in nvivo 11 software. the success of social media in rallying public support for the fight against corruption hinges in large part on how well that information is disseminated. so-called "information gatekeepers" with extensive control over information spread are necessary for this [17]. using nvivo 11, we created a visual depiction of the web of relationships on twitter, indicating the spread of news about the alleged corruption committed by the governor of bengkulu. citizen journalism on social media platforms can provide more transparency to fight corruption. when traditional media fails, when the media is heavily influenced or controlled by the state or people in power, or when the media delivers insufficient news coverage [18], citizen journalism can report additional information by using social media. the most powerful individuals in the network may be pinpointed with further investigation into key vertices. from the aforementioned twitter web, three crucial questions regarding the "central figures" are [19]: • what is the fastest speed at which this individual may contact everyone in the system? • who do you think has the most data coursing through them?? • thirdly, how many individuals does this person have direct access to? centrality measures (i.e., vertex metrics) such as "closeness centrality," "betweenness centrality," and "degree centrality" can provide the answers to these three queries. freeman defined closeness centrality as the sum of a node's distances to every other node in a network graph. it represents the rate at which data may be sent from one location to another [20]. in other words, it shows which network members have the quickest and most direct access to a particular piece of data. as a rule, it takes less time for information to spread across a network if it originates from the node that is closest to the network's center (the node with the highest proximity centrality score). the authors found that out of the twenty-six usernames in the dataset, some are likely to be individual profiles with a proximity centrality of 1. citizen participation in the quick dissemination of knowledge regarding corruption inside a social network is exemplified by these first-hand testimonies. with a score of 0.125, the kpk's twitter account is now becoming the 46th in the world. once again, the authors attribute kpk's score to the fact that they don't do anything on twitter to preserve their anonymity. penetration of social media platforms offers several opportunities to lessen expenditures against corruption. first, most social media users are connected to a sizable group of other people affected by corruption extortion and would like to talk about their experiences. second, the people may be mobilized to criticize the corrupt practices of government officials and politicians at a low cost and in a short amount of time, appreciate the widespread reach of social media. using social media, a free issn 2614-0047 bulletin of social informatics theory and application 61 vol. 7, no. 1, march 2023, pp. 57-62 adjie rosyidin et.al (social media and e-government to prevent corruption…) press (including newspapers, television, and internet news sites) may reach a wider audience and potentially reduce corruption. in the end, social media's favorable image or credibility may be enhanced by the connection between social media programs, particularly between friends and family, and the personal touch of social media on the information. a person's closest and dearest can always benefit from having them take action in line with this knowledge. from this, we may infer that social media can be used as a tool to fight corruption on four fronts: cooperation, participation, empowerment, and the passage of time. the very nature of collaborative and participatory social media is that people constantly interact, which creates a massive pool of people with whom to talk, share knowledge, and work toward a common goal. 5. conclusion as information and communication technologies (ict) advance rapidly, the concept of egovernment emerges and is immediately adopted by various administrations. using e-government and social media to promote transparency and prevent or punish instances of corruption is supported by the law. however, many rules are imperfect in protecting everyone's freedom to express themselves. at the request of the affected individual and in accordance with a court order, the organizer of the electronic system was required in 2016 to delete any irrelevant material in their possession. the honesty with which it combats corruption. in addition, the indonesian penal code does not encompass all criminal defamation laws. e-government and social media users are thus cautious about expressing views that might be deemed defamatory. in addition, there are still regulations requiring providers of electronic systems to terminate users' access to illegal material included in electronic documents and information. because the website or content of electronic information can be disconnected, the requirements of this article may worry those who organize egovernment and social media to voice their ideas as a representation of openness in preventing and cracking down on acts of corruption. while e-government and social media can help promote transparency, combat corruption, and crack down on corrupt practices, this does not give anybody carte blanche to ignore the law or infringe on the rights of others. users of e-government and social media platforms expressing opinions via electronic means shouldn't already be sending data or information that doesn't clearly distinguish between events based on intuition or emotion and those based on facts in social and state life so that they do not face criminal, civil, or administrative punishments from the requirements of applicable laws. in short, e-government users and social media should verify the veracity and consider the ramifications of the information to be supplied before providing it electronically. references [1] m. kayrak, “evolving challenges for supreme audit institutions in struggling with corruption,” j. financ. crime, vol. 15, no. 1, pp. 60–70, jan. 2008, doi: 10.1108/13590790810841707. [2] “performance accountability and combating corruption,” perform. account. combat. corrupt., jun. 2007, doi: 10.1596/978-0-8213-6941-8. [3] a. k. clark, “measuring corruption: transparency international’s ‘corruption perceptions index,’” vol. 29, pp. 3–22, oct. 2017, doi: 10.1108/s2053-769720170000029001. [4] j. s. t. quah, “learning from singapore’s effective anti-corruption strategy: policy recommendations for south korea,” asian educ. dev. stud., vol. 6, no. 1, pp. 17–29, 2017, doi: 10.1108/aeds-07-2016-0058. [5] r. di pietra and a. melis, “‘governance and corruption: is history repeating itself?’ fostering a debate and inviting contributions from a multidisciplinary perspective,” j. manag. gov., vol. 20, no. 4, pp. 689–701, dec. 2016, doi: 10.1007/s10997-015-9326-0. [6] j. c. bertot, p. t. jaeger, and j. m. grimes, “promoting transparency and accountability through icts, social media, and collaborative e-government,” transform. gov. people, process policy, vol. 6, no. 1, pp. 78–91, mar. 2012, doi: 10.1108/17506161211214831. [7] l. b. ngouo, “responsibility and transparency in governmental organizations in cameroon: a review of institutional arrangements,” int. rev. adm. sci., vol. 63, no. 4, pp. 475–492, dec. 1997, doi: 10.1177/002085239706300403. https://doi.org/10.1108/13590790810841707 https://doi.org/10.1596/978-0-8213-6941-8 https://doi.org/10.1108/s2053-769720170000029001 https://doi.org/10.1108/aeds-07-2016-0058 https://doi.org/10.1007/s10997-015-9326-0 https://doi.org/10.1007/s10997-015-9326-0 https://doi.org/10.1177/002085239706300403 62 bulletin of social informatics theory and application issn 2614-0047 vol. 7, no. 1, march 2023, pp. 57-62 adjie rosyidin et.al (social media and e-government to prevent corruption…) [8] s. t. akindele, “critical analysis of corruption and its problems1 in nigeria,” kamla raj enterp., vol. 7, no. 1, pp. 7–18, jan. 2017, doi: 10.1080/09720073.2005.11890876. [9] o. j. ibitoye, a. a. ogunoye, and e. p. j. kleynhans, “impact of recession on economic growth in nigeria,” j. econ. financ. sci., vol. 15, no. 1, pp. 207–221, 2022, doi: 10.4102/jef.v15i1.796. [10] a. s. bakare, “the crowding-out effects of corruption in nigeria: an empirical study,” e3 j. bus. manag. econ., vol. 2, no. 2, pp. 059–068,. available at: ideas.repec.org [11] m. j. moon, “the evolution of e-government among municipalities: rhetoric or reality?,” public adm. rev., vol. 62, no. 4, pp. 424–433, jan. 2002, doi: 10.1111/0033-3352.00196. [12] m. h. simarmata, “peranan e-government dan media sosial untuk mewujudkan budaya transparansi dan pemberantasan korupsi,” integritas j. antikorupsi, vol. 3, no. 2, pp. 203–230, oct. 2017, doi: 10.32697/integritas.v3i2.108. [13] c. k. kim, “anti-corruption initiatives and e-government: a cross-national study,” public organ. rev., vol. 14, no. 3, pp. 385–396, may 2014, doi: 10.1007/s11115-013-0223-1. [14] m. j. magro, “a review of social media use in e-government,” adm. sci. 2012, vol. 2, pages 148161, vol. 2, no. 2, pp. 148–161, apr. 2012, doi: 10.3390/admsci2020148. [15] a. mayfield, “what i̇s social media?,” icrossing, pp. 1–36, 2008, [online]. available: http://www.icrossing.co.uk/fileadmin/uploads/ebooks/what_is_social_media_icrossing_ebook.pdf [16] “file:thrips (15817836204).jpg wikimedia commons.” https://commons.wikimedia.org/wiki/file:thrips_(15817836204).jpg (accessed jun. 25, 2023). [17] j. riddell, a. brown, i. kovic, and j. jauregui, “who are the most influential emergency physicians on twitter?,” west. j. emerg. med. integr. emerg. care with popul. heal., vol. 18, no. 2, pp. 281– 287, feb. 2017, doi: 10.5811/westjem.2016.11.31299. [18] j. c. bertot, p. t. jaeger, and j. m. grimes, “using icts to create a culture of transparency: egovernment and social media as openness and anti-corruption tools for societies,” gov. inf. q., vol. 27, no. 3, pp. 264–271, jul. 2010, doi: 10.1016/j.giq.2010.03.001. [19] “nvivo 11 for windows help about social network analysis.” https://helpnv11.qsrinternational.com/desktop/concepts/about_social_network_analysis.htm. [20] “nvivo 11 for windows help understand sociogram centrality measures.” http://helpnv11.qsrinternational.com/desktop/concepts/understand_sociogram_centrality_measures.htm. https://doi.org/10.1080/09720073.2005.11890876 https://doi.org/10.4102/jef.v15i1.796 https://ideas.repec.org/a/etr/series/v2y2011i2p059-068.html https://doi.org/10.1111/0033-3352.00196 https://doi.org/10.32697/integritas.v3i2.108 https://doi.org/10.1007/s11115-013-0223-1 https://doi.org/10.3390/admsci2020148 http://www.icrossing.co.uk/fileadmin/uploads/ebooks/what_is_social_media_icrossing_ebook.pdf https://commons.wikimedia.org/wiki/file:thrips_(15817836204).jpg https://doi.org/10.5811/westjem.2016.11.31299 https://doi.org/10.1016/j.giq.2010.03.001 https://help-nv11.qsrinternational.com/desktop/concepts/about_social_network_analysis.htm https://help-nv11.qsrinternational.com/desktop/concepts/about_social_network_analysis.htm http://help-nv11.qsrinternational.com/desktop/concepts/understand_sociogram_centrality_measures.htm http://help-nv11.qsrinternational.com/desktop/concepts/understand_sociogram_centrality_measures.htm bulletin of social informatics theory and application issn 2614-0047 vol. 2, no. 1, march 2018, pp. 8-14 8 https://doi.org/ 10.31763/businta.v2i1.101 assistive and wearable technology for elderly muhammad fathoni akbar 1,*, nur a’yuni ramadhani 2, riris aulya putri 3 department of electrical engineering, state university of malang, malang, indonesia 1 mfathonyakbar@gmail.com *; 2 naayunir@gmail.com; 3 rhirisaulya@gmail.com * corresponding author 1. introduction elderly is the final adult period beginning in the 60s to the 120s, that having the longest lifespan in the period of development [1]. elderly is the phase of decreasing intellect, physical, and psychological ability. the decreased physical condition may include slow body movements, lack of balance of body, decreased coordination of movement between the limbs, decreased memory, and decreased capacity to process information [2]. those limitations make elderly difficulty to do their activity and they start depend on others. limitations possessed by the elderly can be overcome with the help of technology. technology nowadays are able to improve the quality life of the elderly to be even better in performing daily activities without rely on others. but the technology that exists today may not use maximally by the elderly. this is because there’s a technology gap experienced by the elderly. generally, elderly do not feel that the technology include computer and internet means to them [3]. this causes the elderly never want to know about any kind of possible benefits from technology. finally they only focus on the negative side of the technology. they assume that technology is only for young people [4]. this explains that the utilization of technology by the elderly is very low and uneven. it is unfortunate that elderly are reluctant to use technology that can obviously help them in their daily activities. to introduce about various aspects of gesture intimacy, language familiarity, functionality and ease of use from technology, it’s necessary to increase the elderly's desire to know about technology [5]. in addition, it is also necessary to approach and counseling the elderly about technology. with this kind of approach and counseling the elderly will be familiar with technology that can assist them in doing their activities easier. technology that can be utilized by the elderly are assistive and wearable technology. a r t i c l e i n f o a b s t r a c t article history received december 24, 2017 revised january 20, 2018 accepted february 5, 2018 the current technology is able to assist the daily activities of elderly without depend on others. that’s because the physical condition of the elderly began to decreasing. the decreased physical conditions can include slow body movements, lack of balance of the body, decreased coordination of movement between limbs, memory loss, and decreased capacity to process information. with those many limitations possessed by elderly, they used technology to help them. there are two kind of technology that used to help elderly, those technology are wearable technology and assistive technology. this paper will discussed about some wearable technology and assistive technology that can help the problems experienced by elderly. this is an open access article under the cc–by-sa license. keywords elderly wearable technology assistive technology http://creativecommons.org/licenses/by-sa/4.0/ http://creativecommons.org/licenses/by-sa/4.0/ issn 2614-0047 bulletin of social informatics theory and application 9 vol. 2, no. 1, march 2018, pp. 8-14 akbar et.al (assistive and wearable technology for elderly) 2. elderly and technology elderly is a period where humans will experience aging which is the last phase in life that begins when entering the age of 60 years and above. the aging process is also subjective, individuals who’s in the same age may have different physical and mental abilities, which may or may not be related to how long they last [1]. over time the elderly will have functional impairment that caused them difficulties on doing their daily activity. naturally, the decreasing functional that occurred to elderly is a decrease in sensory acuity (touch, taste, odor, sight, hearing and temperature); decreased mobility, stamina, and muscle strength; changing stability; as well as changing mental clarity [6]. according to the world health organization (who), in 2025 there will be about 1.2 billion people in the world aged over 60 years or often called elderly [7]. the increasing number of elderly population resulted in the number of elderly who live alone at home. if elderly live alone and no one is watching them, the risk of their critical condition will increase [8]. this is very worrying. because of these concerns, currently there are a lot of technology that created specifically to monitor the condition of the elderly. technology helps the elderly to stay in touch with their family and friends, helping to ensure home security, and facilitate them in health care [9]. this brings new stimuli into the elderly life and provides more access to information through the internet. elderly will use internet to get the health information. they feel comfortable using the internet to find health information. they will use internet to find information that has a direct impact on the type and quality care that they get [10]. it is not easy to introduce technology to the elderly. there are many things that must be urged to elderly that want to use technology. according to fisk et al (2004), they have identified five very important characteristics when introducing technology and its usefulness to elderly [11]:  learnability, how difficult it is to learn to use the tools, understand and integrate functioning instructions. they need time to complete the task correctly and the results obtained in a certain amount of time is a possible measure of learning.  efficiency, which technology applications meet user needs, avoid loss of time, frustration and dissatisfaction. this can be measured by the performance of experienced users on a particular task.  memorability, elderly alerts to device functionality are essential to avoid frustration and loss of time. a simple measure of these characteristics can be obtained by take into time counting that required to perform the tasks that previously experienced.  error, how easily a product can cause errors for elderly users and how easy it is to recover from it.  satisfaction, user attitudes and application of technology applications can be affected by the fun derived from their use. most of the technology for the elderly is currently focused on achieving a platform that can monitor medical records of health status in real-time, improve the concept of online diagnosis, improve security and integrity, develop and improve telemedicine that handles the delivery of long distance telecommunication services using telecommunications [12]. some advantages of using technology / systems that can be used to measure mobility are direct access to biomechanical parameters, data retrieval and processing can be done anywhere [8]. there are several types of technology that can be used directly by the elderly. those technology are assistive technology and wearable technology. 3. assistive technology for elderly assistive technology may be defined as a commercially acquired tool or product which is modified or adjusted to enhance, maintain, or improve the functional capability of individuals with disabilities [13]. from the description above it can be concluded that assistive technology is a technology that includes tools and solutions that can help the functional limitations that experienced by individuals [14]. but actually not only disabled people who need assistive technology, elderly also need assistive technology to help their daily activities. 10 bulletin of social informatics theory and application issn 2614-0047 vol. 2, no. 1, march 2018, pp. 8-14 akbar et.al (assistive and wearable technology for elderly) assistive technology is able to make daily activities of the elderly become easier [15]. assistive technology itself is also considered able to help three kinds of criteria, namely assistive technology for everyday activities, assistive technology for safety, and assistive technology for social participation. first, there are assistive technologies that can help the elderly everyday activities, such as digital pillbox or digital medicine box is a medicine box that equipped with a system that allows users to take the medicine on time and correctly [16]. this system is equipped with a sensor that will record users while they are taking the medicine, also a real-time feedback that notes user that taken and drank the medicine. this system also has the utility to increase user awareness, identify errors quickly, and confirm memory to help improve their self-efficacy, maintain their performance, and preserve their autonomy without resorting to disturbing reminders. the next technology is an appointment reminder, is an assistive technology product that is made to help the elderly everyday activity suffering from dementia disease [17]. with the assistive technology is expected, people with dementia disease can be helpful in remembering something that had been planned before. second, there are assistive technologies that can be used as an elderly security system. for example the lighting path, the function of the lighting path is to reduce the risk of falling elderly when doing activities at night [18]. for example, they will wake up in the middle of the night to go to the toilet. so it was made a nightlighting system to provide ambient light and visual veridical cues. with this assistive technology, the risk of falling elderly when doing activities at night will be reduced. the second one is a home monitoring technology. one example of assistive technology that can help the elderly is home monitoring technology. home monitoring technology itself is a smart-home technology that consists of a set of technology that serves to help in securing the home [19]. these technologies will be installed in all parts of the house such as bedroom, bathroom, kitchen, family room, and yard. there are several advantages in implementing home monitoring technology such as, easy to use and does not require extra care, it does not cost a lot of money to use it, ensure home security, and be able to detect and give appropriate warning during emergency situations. the next technology is a smoke detector, this tool reacts to a visible and invisible fire aerosol, and therefore it can detect the presence of fire using an optional ionization detector. and the last one is a door alert, door alert is a sensor that attaches to the door, this tool is useful for people who like to roam at night. this tool will work by making video calls to relatives while people are hanging around. finally, there are assistive technologies that can be used as an elderly social participation. for example, video telephone with the function of this assistive technology is to help the elderly in communicating with others. it is expected to help elderly who are unable to interact directly due to various factors. these factors can be the distance or even the type of illness suffered by the elderly so that the elderly will not feel isolated. video telephone can also be used as a tool to monitored elderly well. the next technology is a digital pictures, in general, the function of digital pictures with video telephone. it's just for digital pictures elderly can not receive a feedback in real-time. elderly need technology because they have decreased cognitive abilities and physical abilities that require them to reduce their daily activities [20]. but not all elderly can receive assistive technology, it is due to several factors that affect the elderly. these factors are characteristic of elderly, social environment, and also the ability of technology access owned by theirself [21]. so it takes another type of technology that can be easily used by the elderly, such as wearable technology. 4. wearable technology the growth of mobile computing technology is currently delivering huge changes in the last few decades, the next trend in computing technology is moving on smaller objects of mobile and is called wearable computing [22]. wearable computing or can be called wearable technology was created to integrate everyday life and simplify human work in the form of small and easy to use [23]. especially with the development of head-mounted displays (hmds), wearable has become a ubiquitous and userfriendly technology [24]. wearable technology (wt) is a computing technology device that can be used on the human body, whether the computer is incorporated as an accessory or as part of the material used in clothing [25]. wt devices are present in various forms such as watches, glasses, bracelets or even jewelry. wt offers new opportunities to monitor continuous elderly activity with miniature wearable sensors. it issn 2614-0047 bulletin of social informatics theory and application 11 vol. 2, no. 1, march 2018, pp. 8-14 akbar et.al (assistive and wearable technology for elderly) increases the efficiency, productivity, service and involvement of families and health authorities. this wt tool mostly aims to change the elderly's health behavior so that they are more motivated to pay attention to their health [26]. some wts created specifically to help the elderly include: lively wearable (www.mylively.com), lively wearable is a technology that provides convenience for the elderly by using lively wearable. elderly get a reminder feature hours of medicine and emergency calls in case of dangerous conditions. simply press a button, the user will directly connect with the emergency service center number. this wearable uses long-lasting batteries that are not refilled, so it is safe for the elderly whose memory starts to decline [27]. elderly care (www.geeny.io), elderly care from geeny provides several technology products that provide convenience for the elderly. several products such as smart power sockets that serve to provide a warning of danger will occur. the dangers that can occur include elderly activities that like to cook but they forget that they are cooking so the stove turn on and can cause a fire. with smart power sockets it can be handled, ie by directly lowering the temperature of the stove. there is also a sensor that can be used by the elderly in case of emergency. just by pressing the emergency button then the child will soon know that their parents are in danger condition, this is because of the sensor will be directly connected to the child gadget. for the health of the elderly geeny also provides products under the name smart blood pressure meter which directly relates to children and doctors [28]. pocketfinder gps trackers (pocketfinder.com), pocketfinder gps trackers is one of the technologies that can detect the location of elderly through smartphones. pocketfinder can detect location up to 60 days. therefore this tool is suitable given to the elderly because the child will be able to easily check where the location of their parents are [29]. wearable care system [30], wearable care system is designed to monitor some parameters such as heart rate, respiratory rate, body temperature, and the position of elderly. from the monitored parameters the results can be seen in applications that can be accessed with a pc. these tools form a sensor that attached to a garment, so that when elderly people will wear it feels like wearing ordinary clothes. wearable skin-stretch device combined with haptic joystick [31], this wearable technology is designed to facilitate the operation of the wheelchair that used by the elderly, so they do not have to rely on others to push it. this tool is very easy to operate. this tool is also able to provide a very good balance so as to minimize the occurrence of accidents. wearable smart home technology help senior age in place, wearable has a function as smart home designed in the form of watches so elderly can use it easily. this tool is integrated with the phone to make arrangements. but when it used by elderly they just have to move their hands on one thing they want to control such as turning off or turning on the lights and locking the door. those examples of wt products can be used by elderly to assist their daily activities and monitor their health condition. wearable technology is a solution to solve the problem about increasing the burden on health care systems and rising current healthcare costs nowadays [32]. based on the types of those technologies described earlier, they can be represented in a table 1. from table 1, it is known that there are various technologies that can help the elderly, either from assistive technology or wearable technology. all those usefulness and function of the two kinds of technology is same. the difference between these two technologies are only in the implementation of the technology used. assistive technology has a technology that has a large size and difficult to carry anywhere. while wearable technology has a relatively smaller size compared with assistive technology. with a smaller size, wearable technology can be used easily and can be taken anywhere. 12 bulletin of social informatics theory and application issn 2614-0047 vol. 2, no. 1, march 2018, pp. 8-14 akbar et.al (assistive and wearable technology for elderly) table 1. comparison of technology for elderly technology type name function assistive technology digital pillbox as a reminder and recording system in taking medication for the elderly and assisting in confirming memory to help improve the elderly selfefficacy appointment reminder helps in reminding people with dementia in remembering something that has been planned before lighting path helps in arranging the lighting at night to minimize the occurrence of accident against the elderly at night home monitoring technology helps secure the home with smart-home technologies that used in the home smoke detector helps in detecting a fire by using an optional ionization detector in the home door alert helps in detecting the presence of people who like to roam at night video telephone helping the elderly in communicating and interacting in real-time with others digital pictures helping the elderly in interacting but not real-time wearable technology lively wearable helping the elderly in remembering to take the medicine, and able to provide information when the elderly get lost that resembles a watch so it can be used anywhere and anytime smart power socket warned the elderly when the are in danger, such as forgot to turn off the stove and iron. this tool is also directly connected with child smartphones so they will know when their parents are in danger pocketfinder gps tracker helps to detect the position of the elderly with tools directly connected to the smartphone wearable care system helping the elderly in monitoring the pulse, breathing frequency, body temperature, current position wearable skin-stretch device combined with haptick joystick helping the elderly by providing ease in operating the wheelchair without relying on others and providing a balance that minimizes the occurrence of accidents wearable smart home technology help senior age in place helping the elderly in taking care of their homes 5. conclusion wearable technology is considered easier when compared with assistive technology. for example, comparable pillbox digital products from assistive technology with lively wearable from wearable technology. both products are products with the same utility, which is reminiscent of the elderly in taking the medicine. but in its implementation, lively wearable can be more easily used by elderly. because lively wearable shaped like a watch that has a smaller size and can be brought anywhere either for activities in the house or outdoors. in contrast to lively wearable, digital pillbox has a larger size and can not be taken anywhere with ease. so for elderly who have activities outside the home can not use the tool. references [1] b. b. naves and f. amaro, “too old for technology? how the elderly of lisbon use and perceive ict,” j. community informatics, vol. 8, no. 1, pp. 1–11, 2012. [2] h. orimo, h. ito, t. suzuki, a. araki, t. hosoi, and m. sawabe, “reviewing the definition of ‘elderly,’” geriatr. gerontol. int., vol. 6, no. 3, pp. 149–158, 2006. [3] m. van de watering, “the impact of computer technology on the elderly,” vol. 29, no. 5, p. 2008, 2005. [4] v. z. ogozalek, “a comparison of the use of text and multimedia interfaces to provide information to the elderly,” sigchi conf., pp. 65–71, 1994. [5] m. rice and n. alm, “designing new interfaces for digital interactive television usable by older adults,” comput. entertain., vol. 6, no. 1, 2008. [6] j. cocco, “smart home technology for the elderly and the need for regulation,” j. enviromental public heal. law, vol. 6, no. 1, pp. 85–108, 2011. issn 2614-0047 bulletin of social informatics theory and application 13 vol. 2, no. 1, march 2018, pp. 8-14 akbar et.al (assistive and wearable technology for elderly) [7] g. m. sprinzl and h. riechelmann, “current trends in treating hearing loss in elderly people : a review of the technology and treatment options – a mini-review,” gerontology, vol. 56, no. 3, pp. 351–358, 2010. [8] l. k. hema, t. c. krishnanunni, v. k. a. majid, and a. george, “wearable safety wristband device for elderly health monitoring,” int. j. chem. sci., vol. 14, pp. 829–834, 2016. [9] v. ikonen and m. o. heikkila, “user and concept studies as tools in developing mobile communication services for the elderly,” pers. uboqitos comput., vol. 6, pp. 113–124, 2002. [10] r. j. campbell, “consumer informatics : elderly persons and the internet,” perspect. heal. inf. manag., vol. 2, no. 2, 2005. [11] l. gamberini, m. alcaniz, g. barresi, m. fabregat, f. ibanez, and l. prontu, “cognition , technology and games for the elderly : an introduction to eldergames project,” psychnology j., vol. 4, no. 3, pp. 285– 308, 2006. [12] a. bourouis and m. feham, “ubiquitos mobile health monitoring system for elderly (umhmse),” int. j. comput. sci. inf. technol., vol. 3, no. 3, pp. 74–82, 2011. [13] m. j. scherer, “the change in emphasis from people to person : introduction to the special issue on assistive technology,” disabil. rehabil., vol. 24, no. 1, pp. 3–6, 2002. [14] t. lansley, peter; claudine, mccreadie; anthea, “can adapting the homes of older people and providing assistive technology pay its way ?,” age ageing, vol. 33, no. 6, pp. 571–576, 2004. [15] j. ocepek and z. prosi, “assistive technology and its role among the elderly – a survey vloga medicinsko tehni č nih pripomo č kov pri starostnikih – rezultati ankete,” inform. medica slov., vol. 17, no. 2, pp. 9–15, 2012. [16] m. l. lee and a. k. dey, “real time feedback for improving medication taking,” in proceedings of the sigchi conference on human factors in computing systems, 2014, pp. 2259–2268. [17] j. woolham, n. c. services, g. gibson, and p. clarke, “assistive technology , telecare , and dementia : some implications of current policies and guidance,” res. policy plan., vol. 24, no. 3, pp. 149–164, 2006. [18] f. mariana g., g. laura z., r. mary s., p. barbara, and r. mark s., “research letters lighting for improving balance in older adults with and without risk for falls research letters,” age ageing, vol. 41, no. 3, pp. 392–395, 2012. [19] a. mihailidis et al., “the acceptability of home monitoring technology among community-dwelling older adults and baby boomers the acceptability of home monitoring technology among communitydwelling older adults and baby boomers,” assist. technol., vol. 20, no. 1, 2010. [20] j. bouisson, “routinization preferences , anxiety , and depression in an elderly french sample,” j. aging stud., vol. 16, pp. 295–302, 2002. [21] h. r. boeije and h. j. m. vrijhoef, “factors influencing acceptance of technology for aging in place : a systematic review ଝ,” int. j. med. inform., vol. 83, no. 4, pp. 235–248, 2014. [22] j. ham, j. hong, y. jang, s. ko, and w. woo, “smart wristband: touchandmotion-tracking wearable 3d input device for smart glasses,” distrib. ambient. pervasive interact. lect. notes comput. sci., vol. 8530, pp. 109–118, 2014. [23] j. edmondson, j. loyall, w. anderson, k. schmid, j. gray, and j. white, “next generation mobile computing,” ieee softw., pp. 44–47, 2014. [24] m. c. dieck, t. jung, d. han, m. c. dieck, t. jung, and d. han, “mapping requirements for the wearable smart glasses augmented reality museum application,” j. hosp. tour. technol., vol. 7, no. 3, 2016. [25] k. w. ching and m. m. singh, “wearable technology devices security and privacy vulnerability analysis,” int. j. netw. secur. its appl., vol. 8, no. 3, pp. 19–30, 2016. [26] m. s. patel, d. a. asch, and k. g. volpp, “wearable devices as facilitators , not drivers , of health behavior change,” jama, vol. 313, no. 5, pp. 459–460, 2015. [27] lively, “senior medical alert watch_ top systems & devices _ livelytm.” 2017. 14 bulletin of social informatics theory and application issn 2614-0047 vol. 2, no. 1, march 2018, pp. 8-14 akbar et.al (assistive and wearable technology for elderly) [28] genny, “elderly care.” 2017. [29] pocketfinder, “pocketfinder 3g gps trackers for children, pets, seniors, & vehicles.” . [30] m. frydrysiak and ł. tęsiorowski, “wearable care system for elderly people,” int. j. pharma med. biol. sci., vol. 5, no. 3, pp. 171–177, 2016. [31] h. u. yoon, n. a. kumar, and p. hur, “synergistic effects on the elderly people ’ s motor control by wearable skin-stretch device combined with haptic joystick,” front. neurorobot., vol. 11, no. june, pp. 1–13, 2017. [32] m. a. hentschel, m. l. haaksma, and t. h. van de belt, “wearable technology for the elderly : underutilized solutions,” eur. geriatr. med., vol. 7, no. 5, p. 2016, 2016. bulletin of social informatics theory and application issn 2614-0047 vol. 3, no. 2, december 2019, pp. 69-74 69 https:doi.org/10.31763/ businta.v3i2.176 indonesia’s policy on e-commerce regulation and its challenges peronika simanjuntak a,1,* a faculty of social and political science, airlangga university, surabaya, indonesia 1 veronika91@ymail.com * * corresponding author 1. introduction as one of the highest growth rates region in the world, southeast asia has not apart from the influence of technological developments on its social and economic aspects. the rapid technological developments of the last two decades and the emergence of internet technology had a significant effect on the way people perform economic activities, including emergence concept of electronic commerce (e-commerce). e-commerce is a new concept, but with its rapid development, this industry sector becomes increasingly important [1]. also, the efficiency of this form of trading leads to the development of other industrial sectors. based on the explanations, it is normal that countries in southeast asia begin to pay more attention to this type of trading model. besides being aware of the enormous potential of online trading for economic growth, they are also aware of the threat posed, especially for small and medium enterprises (smes). in indonesia’s case, the rules on electronic commerce are not new. however, this issue is starting to get more attention especially since the elimination of the ecommerce industry from the list of detrimental investments. which means that the government began to receive foreign investment in the domestic e-commerce industry sector? furthermore, the government began to issue other policies related to the regulation of the domestic e-commerce industry. a r t i c l e i n f o a b s t r a c t article history received september 4, 2019 revised september 30, 2019 accepted october 14, 2019 globalization has a significant influence on many aspects, such as social and economic, and its effect cannot be separated from technological developments that change human behavior in conducting economic activities. those change including the emergence of trade that uses online-based transactions or ecommerce. e-commerce considered to have a significant influence on the country’s economic growth and predicted to flourish over the years. aware of its enormous potential and growth in southeast asia, countries in this region began to regulate e-commerce, and one of them is indonesia. the authors find that in the past few years, indonesia has been more active in making and changing its policies to regulate online-based trading, while at the same time trying to protect its domestic small-medium enterprises (smes). nowadays, indonesia's ecommerce market is relatively minor compared to its neighbors. however, believed that the growth of the middle class, the improvement of internet users, and the intensive improvements in indonesia’s logistics and infrastructure that conducted in recent years, will have a significant effect on the indonesian ecommerce market. in this paper, the authors will explain the policy of indonesia in regulating e-commerce and its challenges. the discussion in this paper will be divided into three sections. the first part is the conceptual foundation. the second part is about the development of e-commerce in indonesia. the third part is the indonesian government's policy in managing e-commerce and its challenges. this is an open access article under the cc–by-sa license. keywords e-commerce regulations globalization indonesian’s e-commerce policy southeast asia technology and information http://creativecommons.org/licenses/by-sa/4.0/ http://creativecommons.org/licenses/by-sa/4.0/ 70 bulletin of social informatics theory and application issn 2614-0047 vol. 3, no. 2, december 2019, pp. 69-74 simanjuntak (indonesia’s policy on e-commerce regulation and its challenges) this study describes the relationship between globalization, technological developments and electronic commerce and how these issues affect indonesia’s policy. globalization and rapid technological developments in the last few years have given rise to a new concept in commerce, which is trade that utilizes internet technology. recently, this issue attracts the attention of many countries. the immense potential of this trade raises indonesia’s awareness to regulate its growth, taking advantage of economic growth, and protecting smes in the country. 2. globalization, the development of technology and e-commerce globalization is a form of interconnection between countries in terms of economy through the form of free trade. the word integration, which means integer or the act of combining one into a whole in defining globalization [2]. there is a paradigm shift from nation-state and national economy to a global economy, due to free trade, mobility capital, and migration that are difficult to control. as daly explains, integration in the concept of globalization itself will blur the boundaries between countries, as well as its actors, so that other issues develop into cross-border [2]. the development of information technology is a factor that has a significant influence on such integration. globalization and the development of technology and information have complementary relationships due to their mutual benefits [3]. the rapid development of technology and information in the last two decades has made the world became shrinking, and distances become a concept that is no longer relevant in human interconnection. in the era of globalization, the development of technology and information has a considerable influence on the way people in conducting economic activities. as a result, countries, corporations, and individuals are in a situation where they must restructure and position themselves to efficiently utilize global resources and maximize profits derived from global markets [4]. the development of the internet because of rapid technological developments in the 21st century may cause the development of e-commerce. as a new concept, e-commerce has a significant influence on changing the shape of economic activity and affecting major industrial sectors such as communications, finance, commerce, health, even governance [5]. the definition of e-commerce is the purchase and sale of goods and services that use the internet media. in other literature, the concept of e-commerce refers to commercial or non-profit business activities with the application of modern computer technology, network technology, and modern information communication technology [6]. sometimes, this process is also referred to as e-business. however, the term e-business is often used to define a broader process, such as the way companies do business through the internet. e-commerce is formed due to the development of modern information technology and global economic integration. in other words, e-commerce is a new form of commerce that comes with the application of electronic information technology in the field of trade [6]. the rapid development of e-commerce may cause chaos in the retail industry [7]. the reason is, they are demanded to immediately adjust to changes with consumer behavior in the digital era as nowadays. also, the speed of technological development and the transition to the digital era will have a significant impact on global trade [7]. moreover, the rapid development of e-commerce, leading to the thought of frictionless economic or known as the concept whereby economic activity occurs with almost zero transaction costs since the loss of existing intermediaries will drastically reduce transaction costs [8]. reduced transaction costs will encourage the entry of new businesses that affect increasing competition. so, the result is increasing pressure on the producer to provide a lower cost to the consumer. besides, online transactions also lead to a shift in market power from producer to consumer because internet media allows consumers to find lower prices among available traders [9]. overall, e-commerce can significantly improve economic efficiency, improve competitiveness, improve resource allocation, and promote long-term growth [8]. the growth of e-commerce has an impact on the number of consumer interest in online transactions and leads to an increase in their consumption. with the growing e-commerce, it will have a significant role in improving the growth of a country in the 21st century [10]. there are five reasons why e-commerce can be a crucial factor for economic growth, (1) e-commerce is closely related to the development of information and technology, (2) it is based on internet and information issn 2614-0047 bulletin of social informatics theory and application 71 vol. 3, no. 2, december 2019, pp. 69-74 simanjuntak (indonesia’s policy on e-commerce regulation and its challenges) (3) e-commerce is a form of innovation from traditional economic and business activities, (4) have an ecosystem chain, and (5) e-commerce has strong permeability [11]. there is a close relationship between e-commerce and the national economy [6]. the microscopic behavior of e-commerce has a positive effect that will inevitably lead to macroeconomic development and encourage national economic growth. in liu's research, ecommerce in china encourages the development of high-tech companies, encourages structural optimization and improves traditional industries, as well as being a growth point of the modern logistics industry and china's economic development. the result is that at present, china is a country with the world's largest e-commerce industry and transactions because of it’s rapid growth of the e-commerce industry, especially since 2006. these developments cannot be separated from the pleasant environment, including infrastructure, government policies, and markets favorable to industrial development. even the monetary crisis of 2008 did not affect the development of ecommerce in china. china's total volume of e-commerce transactions in 2008 increased by more than 40 percent. during the crisis, the e-commerce industry in china has a vital role in helping small and medium-sized businesses overcome difficulties by boost domestic demand and create jobs [6]. furthermore, the development of e-commerce provides a chilling effect for the chinese economy, such as encouraging the development of the computer industry, the internet technology industry and the logistics industry, and providing more labor and related practitioners [11]. the explanation proves that e-commerce progress also brings other industry advances. the magnitude of the impact of e-commerce, become new attention for many countries in terms of regulating and taking advantage of the interests of the domestic economy. southeast asia as a region with a prominent level of technology adoption, did not escape the issue of the development of digital commerce, and indonesia is one of them. departing from the issue, the author will try to discuss it in the next explanation. 3. the development of e-commerce in indonesia by now, the asia and pacific region is the largest e-commerce market in the world, with china accounting for 47% of total sales in the region [12]. in this case, the southeast asian region is very lagging behind with other regions. inequality of technology adoption is an underlying factor that is very influential on the backwardness of southeast asia. it is that only 29% of southeast asian populations have access to the internet network by 2013 [13], and 44% by 2015 in other literature [14]. in another study, it mentioned only six countries, which are singapore, indonesia, malaysia, philippines, vietnam, and thailand, while not mentioning the other four, cambodia, laos, myanmar, and brunei darussalam, when explaining e-commerce in southeast asia. the reason is, those four countries have almost no e-commerce to discuss [15]. of the six countries mentioned by olsen et al., malaysia and thailand are the largest e-commerce markets in southeast asia by 2015 [16]. the e-commerce market in those six countries estimated to be worth about us$ 7 billion by 2015 [13], but that number represents less than 2.5% of overall retail sales in southeast asia [11]. the number is indeed insignificant compared to the size of southeast asian populations [13]. nevertheless, most of the southeast asian populations that connected to the internet do economic activities online as often as populations in developed countries [15]. the explanation shows that southeast asia is a region with an exciting potential as a next e-commerce boom, especially if we look at the rapid development of technological adoption in vietnam and indonesia within a few years [11]. besides, trade using social commerce is high in southeast asia, with a percentage of 30% of all online sales in the region by 2016 and showing an ever-increasing trend [12]. social media platforms are a dynamic, efficient, and essential tool for smes that generally have limited resources [12]. at present, thailand is the largest social trading market in the world, with 51% of online shoppers shopping using social media platforms. malaysia and indonesia have not much different comparison with thailand, with an average of 33% of online shoppers shopping using social media platforms [12]. also, southeast asia has a relatively young population, and proper infrastructure development is one of the main drivers of the growth of the e-commerce industry in the region. the growth of active social media users in southeast asia is over 20%, with vietnam and indonesia as the highest growth-number countries, with 41% and 39% respectively [17]. 72 bulletin of social informatics theory and application issn 2614-0047 vol. 3, no. 2, december 2019, pp. 69-74 simanjuntak (indonesia’s policy on e-commerce regulation and its challenges) social media platform proves to be a positive platform for e-commerce growth in southeast asia, and one of the critical drivers of this development is its high middle-class growth, changes in consumption and purchase patterns, and the growing number of mobile payment systems in the region. however, although it is considered to have enormous growth potential, the e-commerce market in southeast asia has many obstacles. frost and sullivan's study also points out that ecommerce is a crucial driver of regional growth in southeast asia, but its complexity is one of the biggest challenges faced by southeast asian countries in developing this industry. for example, apart from malaysia and singapore, credit card ownership rates in southeast asia are meager, less than 7 percent of the total population. also, in some countries, more than half the population has no bank account. logistics is another issue that hinders e-commerce growth, especially in areas with complex geography such as indonesia and the philippines [16] the challenges for e-commerce in southeast asia, which is (1) infrastructure and poor connectivity. internet connectivity in southeast asia is relatively low, and the only country with strong internet connectivity is singapore, (2) lack of adequate human resources, many companies are struggling to grow their businesses online because they lack the skilled workers about online technology and transactions, especially in smes [13]. moreover, these obstacles make the challenge even harder because they lead to other challenges directly related to previous challenges: (1) skepticism about competing capabilities, southeast asian smes lag behind other regions [13]. in a survey conducted by cimb, explained that southeast asian entrepreneurs still have the perception that e-commerce businesses cost more than their profits. besides, smes in southeast asia believe that most of the hype surrounding e-commerce is overstated [15], (2) fear of online payment systems; many traders and consumers in southeast asia are less interested in online transactions. they still prefer the traditional transaction model by way of cash. therefore, the governments of southeast asian countries have begun developing regulations for data protection, preventing cybercrime, and encouraging online purchases [13]. in indonesia’s case, this country has the status of being one of the largest economies in southeast asia, possibly asia pacific, and one of the fastest internet adoption nations in the world. so, it is normal that e-commerce in indonesia began to grow [18]. however, the issues mentioned earlier, basically not much different from indonesia. indonesia is listed at the bottom 30% position in the ranking of countries to do business, which means that indonesia is one country that has a bad investment environment, from a list of 189 countries in the world bank report. the cause is not much different from most of the southeast asian countries, such as inadequate infrastructure, lack of regulation and protection from the government, and inadequate resources. even though indonesia is still considered as a potential country after india and china, because of its large population, the economic potential of e-commerce is still not widely utilized. in its development, the indonesia government began to realize the potential of e-commerce business in the country and began more active in drafting regulations on this business. [19] stating that there is urgency regarding the need for the preparation of e-commerce regulation in indonesia (ministry of trade of republic of indonesia 2015), followed by the emergence of the new e-commerce roadmap of indonesia. 4. indonesian policy in e-commerce regulation and its challenges the development of e-commerce business or online sales in indonesia has increased dramatically since the last few years, especially since various smartphone vendors entered the indonesian market. according to agus tjandra, vice chairman & foreign relations of the e-commerce association of indonesia (idea), the growth of e-commerce business in indonesia is remarkable, and the growth is accompanied by increased e-money compared to five years ago. meanwhile, according to research from social research & monitoring soclab.com, quoted by news portal indonesia, tribun news, internet users in indonesia reached 93.4 million, with 77 percent of them looking for product information and online shopping in 2015. in 2016, the number of online shoppers reached 8.7 million people, with a transaction value of about $ 4.89 billion us dollars [20]. the e-commerce industry in indonesia is growing while the issue of e-commerce regulation in indonesia has only started in 2016 [21]. in that year, the government began to have a commitment to provide ease of investment that is useful for the progress of the digital ecosystem industry in indonesia and as well as protection for smes who will enter the digital world. as with opening up e-commerce investment for foreign, that is by removing e-commerce business from a negative list of issn 2614-0047 bulletin of social informatics theory and application 73 vol. 3, no. 2, december 2019, pp. 69-74 simanjuntak (indonesia’s policy on e-commerce regulation and its challenges) investments in indonesia in 2016 [22]. this step is considered as the first step in indonesia in its effort to regulate the e-commerce industry. with the abolition of e-commerce from a negative list, it means that the indonesian government is beginning to provide significant opportunities for foreign investment, including e-commerce companies, to invest in indonesia, although there are prerequisites to allow only 100 percent of foreign ownership with a minimum investment of 100 billion $ us 7.3 billion in exchange rates in 2016) or businesses that generate 1,000 jobs, and limit foreign ownership to 49 percent for business investments below 100 billion [18]. although relatively slow, the government's efforts seen as a positive step if the indonesia government wants to encourage significant e-commerce investments from large businesses while protecting e-commerce players from local small and medium enterprises (smes) in indonesia. in addition to efforts to open investment in e-commerce business, the government has also issued a new e-commerce roadmap as a step to welcome the free trade of asean economic community (taf), whose draft has been signed by president joko widodo in 2017. in the roadmap, the indonesia government is targeting that e-commerce business in indonesia can reach us $ 130 billion by 2020 [14]. there are seven main points in the e-commerce roadmap in indonesia, named (1) utilization of blueprint national logistics system (sislognas) to increase the delivery speed to reduce shipping costs; (2) finalize rpp e-commerce that can channel government grants / subsidies to digital smes and startup e-commerce, (3) build consumer trust through regulation, protection of industry players, simplify business licensing registration for e-commerce players, developing the national payment gateway in stages that can improve electronic retail payment services (4) improving the national communications infrastructure as the backbone of e-commerce industry growth; (5) simplifying taxation procedures for e-commerce starters, providing tax incentives for ecommerce investors, and tax incentives for e-commerce startup, (6) provide education for the entire e-commerce ecosystem, and (7) increased awareness of online and public traders against cybercrime and about the importance of electronic transaction security [14]. besides, the indonesian government is also committed to improving indonesia's internet and communications infrastructure with the palapa ring 2 program, which targeted for completion by 2018. to date, the indonesian government's seriousness is seen by improving the logistics issue, by improving infrastructure on a large scale in all provinces in indonesia, as well as the start of digitalization as required by all toll roads in indonesia to use non-cash payment systems, and the national payment gateway (npg) policy to be implemented by bank indonesia on june 30, 2018 [23]. by looking at indonesia's efforts through the issuance of new policies in regulating the ecommerce industry, there are undoubtedly many challenges that indonesia will face in the future. regarding internal challenges, there is a tendency that developing countries are less consistent in implementing regulations. often there are different regulations between government agencies, as well as the possibility of oligarchic politics, as established industries are potentially threatened with the effectiveness of the e-commerce industry. another issue is taxes, with increasing electronic transactions, the indonesian government should unquestionably think about the reduced state revenues from the tax sector on the offline retail industry, which is likely to be rivaled by the online retail industry. the transition of taxes would take some time, given to the present; the socialization of the tax has not been published. there are also other issues, such as inadequate infrastructure. as for the external challenges that indonesia must face is the lack of integration between countries in southeast asia. since the e-commerce industry is part of cross-border trade, the differences in interest, development, and sense of urgency often become an obstacle for countries to cooperate. given china's aggressiveness to the e-commerce market in the region, the urgency to work together is becoming increasingly important. 5. conclusion given its rapid development and the enormous impact of e-commerce on a country's economy, governments need to build a positive environment for e-commerce industries to take advantage of these new market opportunities. it will require an active role from the public sector because as a newly emerging industry, likely that the market failure rate in indonesia will be high. the challenges faced by indonesia will be overwhelming, especially in the transition phase towards the digital economy in indonesia. 74 bulletin of social informatics theory and application issn 2614-0047 vol. 3, no. 2, december 2019, pp. 69-74 simanjuntak (indonesia’s policy on e-commerce regulation and its challenges) most southeast asia countries may also face indonesia's challenges. the similarity of these potentials and challenges should increase the awareness of countries in the southeast asia region to be more synergistic in developing the e-commerce industry. references [1] g. a. jentz, r. l. miller, and b. franc, “cross, west’s business law.” alternate edition, 2002. [2] s. subba rao, g. metts, and c. a. mora monge, “electronic commerce development in small and medium sized enterprises: a stage model and its implications,” bus. process manag. j., vol. 9, no. 1, pp. 11–32, 2003. [3] k. chareonwongsak, “globalization and technology: how will they change society?,” technol. soc., vol. 24, no. 3, pp. 191–206, 2002. [4] o. m. obafemi, “the challenges of globalization on e-commerce in nigeria,” ahmadu bello university, 2012. [5] m. l. markus and c. soh, “structural influences on global e-commerce activity,” in advanced topics in global information management, volume 2, igi global, 2003, pp. 1–13. [6] s. liu, “an empirical study on e-commerce’s effects on economic growth,” in 2013 conference on education technology and management science (icetms 2013), 2013. [7] m. kenney and j. curry, “e-commerce: implications for firm strategy and industry configuration,” ind. innov., vol. 6, no. 2, pp. 131–151, 1999. [8] z. hoq, m. s. kamal, and a. h. m. e. h. chowdhury, “the economic impact of e-commerce,” brac univ. j., vol. 2, no. 2, pp. 49–56, 2005. [9] r. j. gordon, “does the" new economy" measure up to the great inventions of the past?,” j. econ. perspect., vol. 14, no. 4, pp. 49–74, 2000. [10] s. vanichviroon, “e-commerce contribution to economic growth: the case of thailand,” in information technology and economic development, igi global, 2008, pp. 140–154. [11] s. feindt, j. jeffcoate, and c. chappell, “identifying success factors for rapid growth in sme ecommerce,” small bus. econ., vol. 19, no. 1, pp. 51–62, 2002. [12] f. hoppe, s. lamy, and a. cannarsi, “can southeast asia live up to its e-commerce potential,” bain co., vol. 16, 2016. [13] r. kirchenbauer, “e-commerce in southeast asia: major challenges,” www.investasian.com, 2016. [14] s. tangkary, “siap menjadi raja digital asean?,” makassar, 2016. [15] c. lee and s. b. das, “e-commerce & asean economic integration,” 2018. [16] d. t. cris, “e-commerce set to grow rapidly in south-east asia,” internetretailing.com.au, 2016. [17] s. kemp, “digital in 2017: global overview,” we are soc., vol. 24, 2017. [18] h. rosdiana and r. kusumastuti, “the protection of information privacy in indonesia’s e-commerce: a legal approach perspective,” kne soc. sci., pp. 59–68, 2017. [19] e. makarim, “kerangka kebijakan dan reformasi hukum untuk kelancaran perdagangan secara elektronik (e-commerce) di indonesia,” j. huk. pembang., vol. 44, no. 3, pp. 314–337, 2014. [20] h. feryanto, “transaksi e-commerce di indonesia pada 2016 mencapai 4,89 miliar dolar as,” www.tribunnews.com, feb-2017. . [21] m. t. kinda, e-commerce as a potential new engine for growth in asia. international monetary fund, 2019. [22] the jakarta post, “indonesia to finalize regulation on e-commerce,” www.thejakartapost.com, jakarta, may-2016. [23] k. david, “the dual challenge of e-commerce regulations in indonesia,” www.export.gov, 2017. bulletin of social informatics theory and application issn 2614-0047 vol. 1, no. 1, march 2017, pp. 1-10 1 https://doi.org/10.31763/businta.v1i1.19 characteristics and segmentation of social problems with kohonen self-organizing maps reza aditya pratama 1,*, tiara shafira 2, faisal ardiansyah 3, rb fajriya hakim 4 statistics program, faculty of mathematics and natural science, islamic university of indonesia, indonesia 1 rezaadityauii@gmail.com *; 2 tiarashafira60@gmail.com; 3 faisalardiansyah000@gmail.com; 4 fajriyahakim@yahoo.com * corresponding author 1. introduction social problems are phenomenon and symptom of reality in social life. identification of social problems in society is different between one figures with others. social problems are mismatch between element of culture or society which endanger social life [1]. social problems is contradict situation of society values, where people agreed to take some action for change those situation [2]. certainly there are social problem in our community or society like juvenile delinquency, population problems, environmental pollution, as well as other social problems such as poverty, social inequality, etc. the existence of those social problems in community have positive or negative impact for the community itself. one of various impact because social problems is increasing of crime rate [3]. specially discuss about one of an impact of social problems is the increasing of crime rate. although it was not main factor, but it affect the psychology of perpetrators. there are various theoretical reviews regarding the cause of crime related to economic issues change crime behavior directly. this theory includes decreasing of economy, comparative deterioration in socio-economic, reduced of opportunities in formal sectors, urbanization and economic growth that potentially lead the integration with poorer. poverty have a correlation with crime [4], result of psychologists and sociologist’s research prove that someone which is life under poverty, vulnerable commit a crime. in poor condition, people will experience anxiety, become very emotional, easily frustrated, even doing suicidal. poverty also become the causes of crime as alternative in order of living his/her life [4]. a r t i c l e i n f o a b s t r a c t article history received november 3, 2016 revised december 22, 2016 accepted january 10, 2017 indonesia is a country with a low human development index, it shows the number of quality and healthy standard in indonesia is still poor. indonesia also have various social problems such as overcrowding, poverty, unemployment, bad education level .this problem can bring negative impact for our society like increasing of crime rate. for identification phase of social problems and crime, indonesian government does not integrate social problems which is identified can affect the crime and use descriptive statistics only. further diagnosis required for cases of social issues. the purpose and benefits of this research is to determine the characteristics of the social problems in indonesia, introduce and make segmentation using kohonen self organizing map’s algorithm. hopefully the results of this analysis can helps government for make public policy in general, specifically future policy about social problems in indonesia. using kohonen algorithm effective for visualizing of high-dimensional data by reducing the dimensions of ann-dimensional input into lower dimension while maintaining its original topological relations. based of clustering result of provinces in indonesia, it divided into 5 group and each group has similar characteristics. this is an open access article under the cc–by-sa license. keywords social problem clustering kohonen http://creativecommons.org/licenses/by-sa/4.0/ http://creativecommons.org/licenses/by-sa/4.0/ 2 bulletin of social informatics theory and application issn 2614-0047 vol. 1, no. 1, march 2017, pp. 1-10 pratama et.al (characteristics and segmentation of social problems with kohonen self-organizing maps) hundred million of the world’s population today, and one of the reason incidence of insecurity of their life are not surely terrorism only, but extreme poverty. therefore, factor of density will make crime, it become worse if socio economic factors does not support community needs. population density will become worse if it was not accompanied by new job chance, it causing unemployment. it mean more unemployment will affect more crime [4], [5]. it is evident that crime rate is higher in urban areas than in rural areas. then, effective method except keeping public security and safety, government should open more jobs for their people, if unemployment decrease so do the crime rate will decrease. except density, poverty and unemployment factor, there is another social problem that is educational inequality. low level of education have significant influence with crime rate. nowadays, the increasing of human resources quality can be seen from the average of education level in several region in indonesia. this increase is a result of the growing demand for education to get a job with a better income, due to gain employment in the modern sector is dependent on their education [6]. there is a negative correlation between level of education and the level of crime. first, higher education can bring or obtain legal employment. secondly, highly educated person would tend to think of a criminal act, because the benefits are too small. so education will indirectly affect crime through increased wages. someone who is graduates from lower level of education may have a poorer skill than someone which is graduated from high school or university. the analysis conducted by ehrlich mention that education is important for population, because education helps to determine the benefits from legal or illegal activities [7]. human development index (hdi) generally can show the society quality, it able to measure the achievement of human development life, hdi is built through basic three dimensional approach. the dimensions include long and healthy life; knowledge, and a decent life. the third dimension has a wide sense as related to many factors. to measure the dimension of health, use life expectancy. furthermore, about the knowledge indicator using literacy rate and average length of school. as for measuring the dimension of decent life used indicator of the ability of purchase number of basic needs as seen from the average amount of spending per capita as the income approach which represents the achievement of development for a decent life. in 2013 hdi of indonesia those year do not change from 108th from 187 [8]. except singapura (9), brunei (30), malaysia (62) and thailand (89), other asean country such as myanmar (150), laos (139), cambodia (136), vietnam (121) and filipina (117) placed in low rank. indonesia’s hdi is 0,684 in 2013, there are upward movement which is not so far from previous year, ie 0,681. this report also highlight the lack of decent jobs especially for young people. that is major challenge in asia and pacific. 22% of the unemployment rate in indonesia is relatively high. education must be accessible in eastern indonesia like papua. these areas often do not experiencing the improvement of living standard due to limited access to basic social services. in general, crime itself is a behavior that violates the law and social norms, so people will against it. in many cases the crime occurred due to several factors. factors that causing crime like biological factors, sociologically composed of economic factors (economic system, population, changes of market prices, financial crisis, lack of employment and unemployment), mental factors (religion, literature, newspapers, movies), physical factors such as climatic conditions and others, and personal factors (age, race and nationality, alcohol, war) that whole thing is part of a social problem and it needs to be fix by analyzing the social problems. in identification stage, the government of indonesia in indonesian crime statistics 2013 through bps is focused on the use of the susenas model and statistik potensi desa, not integrating with social problems which is identified has an effect on crime. bps only use descriptive statistics to determine the incidence and prevalence crime. developing of computer, software, and research measurement instrument, made research in various scientific fields capable to collect and analyze data set which is size and its dimensions continues to increase. author considers that need some method that can solve that problem, especially about social problem in indonesia. using kohonen because it is an effective algorithm for visualizing of highdimensional data by reducing the dimensions of ann-dimensional input into lower dimension while maintaining its original topological relations. in addition, kohonen soms is a nonparametric issn 2614-0047 bulletin of social informatics theory and application 3 vol. 1, no. 1, march 2017, pp. 1-10 pratama et.al (characteristics and segmentation of social problems with kohonen self-organizing maps) approach requires no assumptions about the distribution of the population. therefore, researchers will identify and perform clustering for social problems which is particularly affect the rate of criminality. based on those background, the problem is how the characteristics and segmentation of social problems in indonesia using kohonen algorithm to clustering provinces in indonesia. the purpose of this paper is to know the characteristics of the social problems in indonesia, introduce and make segmentation algorithm using kohonen's self organizing map for provinces based on similar characteristics in terms of the social issues that affect crime rate. boundary of this paper, author using data obtained from bps indonesia for most recent year in 2013. author using variables that have a significant effect on crime as the negative impact of social problems in indonesia that based source of news and previous research. these variables such as population density, the school enrollment rate of children aged more than 15 years, unemployment, poverty, and human development index in 2013. the method of analysis is using descriptive and analysis of algorithms cluster with kohonen's self organizing map. 2. literature review variable which is used by author is human development index (hdi), hdi intends to shift the focus of development towards three factors. these three factors are difficult to measure precisely and so ‘proxies’ deemed to be the best indicators of the level of these targets are chosen to form the indices instead. furthermore, the proxies chosen are relevant and available indicators in very potential region of study, enabling international comparison. human development report the hdi combines three dimensions, there are:  a long and healthy life: life expectancy at birth  educational index mean years of schooling and expected years of schooling  a decent standard of living: gni per capita (ppp us$) the formula to count hdi is shown at equation 1. the indexx(i,j) is hdi component index i for region to j j. the variable i is 1, 2, 3 and the variable j is 1, 2, …. k region.  1 3 ∑indexx(i,j)   poverty rate is a percentage of the population under the poverty line. poverty line is the sum of the food poverty line (fpl) and non-food poverty line (nfpl) [9]. residents who have an average monthly per capita expenditure below the poverty line are categorized as poor. food poverty line (fpl) is the minimum food expenditure, which is equivalent to 2100 kilocalories per capita per day. non-food poverty line (nfpl) is the minimum requirement for housing, clothing, education and health. package of non-food commodities basic needs represented by 51 types of commodities in urban and 47 rural commodity. 𝑃𝑜𝑣𝑒𝑟𝑡𝑦 𝐿𝑖𝑛𝑒 = 𝐹𝑃𝐿 + 𝑁𝐹𝑃𝐿   fpl = food poverty line nfpl = non food poverty line pα = 1 n ∑ [ z−yi z ]α q i=1    based on the equation 3, the variable α is 0. the variable z is the poverty line. the variable y1 is the average expenditure per capita of population in a month under poverty line (i=1,2,3,..,q), y1 < z. the variable q is count of population that live under poverty line and variable n is the population. population density is the number of inhabitants per unit area [9]. ceude population density shows number of people for every kilometer square area. the total area is the total land area in an administration. school enrollment is the proportion of school children at age level of education in the age group in accordance to the education level. 4 bulletin of social informatics theory and application issn 2614-0047 vol. 1, no. 1, march 2017, pp. 1-10 pratama et.al (characteristics and segmentation of social problems with kohonen self-organizing maps) unemployment figures are the percentage of the population who is unemployed compared with the productive population of an area. unemployment is a person belonging to productive and for a period does not work, and willing to accept the job, and looking for work. segmentation is an attempt to classify objects of observation into several groups. objects of observation that are in one group are generally more homogeneous than objects of observation in other group. descriptive statistics are methods relating to the collection and presentation data to become useful information. descriptive statistics describe an overview of the object using sample or population it can also be presented as pareto diagrams and tables [10]. clustering used to analyze different group of data, similar like classification, but the grouping has not been defined before executable with data mining tool. usually using a neural network or statistical methods. clustering divide the items into several groups based on the data mining tool. the principle of clustering is to maximize the similarity between members of the class and minimizing inter-cluster similarity. clustering can be performed on the data that has some attributes. many clustering algorithms require the function of distance to measure the similarity between data. also required a method for normalizing various attributes of the data. clustering algorithms used to determine segment of data sets into sub groups which is equal [11]. self-organizing map (som) is a form of unsupervised neural network that produces a low (typically two) dimensional representation of input space of one set of training samples. selforganizing map (som) network is a neural network based method for dimension reduction. som can learn from complex, multi-dimensional data and transform them into a map of fewer dimensions, such as a two-dimensional plot. the two-dimensional plot provides an easy-to-use graphic aluser interface to help decision-maker visualize the similarities between consumer preference patterns. for example in at & t data set, there are 68 variables. it would be difficult to visually classify consumers based on all these attributes because grouping must be done in a 68-dimensional space. by mapping the information contained in 68-variable set into a two-dimensional plot, one can visually group customers with similar preferences into clusters. these relationships can be translated into an appropriate type of structure that genuinely represents the underlying relationships between market segments. hence, som networks can be used to build a decision support system for marketing management. it is designed to capture topologies and hierarchical structures of higher dimensional input spaces. unlike most neural network applications, som performs unsupervised training, i.e., during the learning (training) stage, som processing input units in network and adjusts their weights primarily based on the lateral feedback connections. the nodes in the network converge to form clusters to represent groups of nodes with similar properties. a two-dimensional map of the input data is created in such a way that the orders of the interrelationships among objects are preserved. the number and composition of clusters can be visually determined based on the output distribution generated by the training process [12]. fig. 1. environment illustration [12] fig. 1 illustrates environment concept. left one figure show environment with r=1 it surrounding point 13. right one show environment from r=2. environment topology generally using 3 type of grid there is grid, hexagonal and random topology. distance function with euclidean. d(wj, xn) = √∑ (wij − xni) 2 i    issn 2614-0047 bulletin of social informatics theory and application 5 vol. 1, no. 1, march 2017, pp. 1-10 pratama et.al (characteristics and segmentation of social problems with kohonen self-organizing maps) this is several relative research that associated with this paper, previous research becomes very important in order to know relationship between previous and this research. there are research that related to social issues nor analysis methods that used previously. one research result is clustering based on crime location as impact of social problems and notice socio-economic factors [13]. another research show count of population and unemployment has an effect with crime, while the number of industry and poverty indirectly effect on crime [4], [5]. pinheiro separate company into several segmentation and take a policy for monitoring certain consumer groups using kohonen’s self organizing maps [14]. kiang give conclusion that show segmentation of som algorithm and result demographic profile is better than k means clustering [15]. 3. method this research used secondary data obtained from website of badan pusat statistika that accessible through http://bps.go.id.the data that used are the factors that affect the crime rate in indonesia like population density, school enrolment rate of children aged more than 15 year, unemployment rate, poverty and hdi [16]. this research conducted on january 2015. latest data show 2013 data only and covering a whole indonesia territory. this research using descriptive statistics and kohonen self organizing map’s. 4. result and discussion this research using descriptive analysis that able to describe characteristics of provinces in indonesia based on several variables that affect crime rates based on previous studies and using of kohonen algorithm make segmentation. fig. 2. characteristics of population density in indonesia based on the fig. 2, jakarta is in first place with15.015 inhabitants/km2and then followed by west java, banten, diy, and central java. all provinces in java have high population density but lowest one is west papua with the density 9 inhabitants/ km2only. there is inequality of population density between java and another islands. it is able to make another social, economic, or cultural problems if government made no effort for population distribution. http://bps.go.id/ 6 bulletin of social informatics theory and application issn 2614-0047 vol. 1, no. 1, march 2017, pp. 1-10 pratama et.al (characteristics and segmentation of social problems with kohonen self-organizing maps) fig. 3. school enrolment rate of children aged more than 15 year (aps) the lowest school enrollment rates (aps) is papua, followed by bangka belitung, west kalimantan, central kalimantan and west sulawesi. fig. 3 shows a big proportion of children who is more than 15 year cannot feel the education facility. special region of yogyakarta has a numeric percentage of children aged above 15 years of schooling highest followed aceh, west sumatra, bali and east kalimantan. java island, jakarta occupies the first position with aps is 66.09 only. fig. 4. unemployment rate in indonesia fig. 4 illustrates that lowest unemployment rate is bali, while highest unemployment rate is aceh. big five which is have a high unemployment rate include 3 province in java island like banten, west java and jakarta when those province have a high population density too. government should preparing a new jobs to decrease unemployment rate. if decrease unemployment program succeed, it can increase the economy in society. issn 2614-0047 bulletin of social informatics theory and application 7 vol. 1, no. 1, march 2017, pp. 1-10 pratama et.al (characteristics and segmentation of social problems with kohonen self-organizing maps) fig. 5. poverty in indonesia based on fig. 5, highest poverty rate, and top five province with highest poverty rates are mostly in east indonesia such as papua, west papua, maluku and gorontalo. ntt locates in central region and capital city of indonesia has lowest poverty rate followed by bali, south kalimantan, bangka belitung and banten. fig. 6. human development index papua, west nusa tenggara, east nusa tenggara, west papua and north maluku province with a low hdi, while jakarta, yogyakarta, north sulawesi, east kalimantan and riau is a province with a high hdi. papua province occupies the lowest position compared to other provinces. variables of this research related with social, education, population and economy and this is the result of clustering using kohonen algorithm. 8 bulletin of social informatics theory and application issn 2614-0047 vol. 1, no. 1, march 2017, pp. 1-10 pratama et.al (characteristics and segmentation of social problems with kohonen self-organizing maps) fig. 7. training progress based on fig. 7, author using 10.000 iteration but in 4000th iteration show the data begin to constant. based on output with r, average distance of this clustering is 0,1285484. fig. 8. within cluster sum of squares fig. 8 shows the within cluster sum of squares (wcss), if researcher pick one cluster only then the curve will show sharp decline, so when researcher take 2, 3, or 4 cluster then the sharpness still visible. more clusters formed so the members will also less. fig. 9 show the clustering using kohonen that divide population density, aps, hdi, unemployment and poverty line. to clarify the cluster result, the researcher needs to use boundaries. researchers have determined will make 5 clusters and here are the results: fig. 9. kohonen som algorithm result after obtaining these results, researcher will explain results of clustering using kohonen self organizing maps. blue circle shows high density, unemployment, hdi and aps, and lower poverty. orange circle show high aps levels, unemployment, poverty, medium hdi and low density. green issn 2614-0047 bulletin of social informatics theory and application 9 vol. 1, no. 1, march 2017, pp. 1-10 pratama et.al (characteristics and segmentation of social problems with kohonen self-organizing maps) circle has a low density, aps, unemployment, poverty and medium hdi. the red circle has a high poverty rate, but the density, aps, unemployment and hdi are low. purple circle show medium hdi, but density, aps, unemployment and poverty are low. after obtaining these results, the researchers made a clustering between provinces in indonesia and some of the variables that have been described previously. table 1. cluster result cluster cluster result i dki jakarta ii aceh, sumatra utara, sumatra barat, riau, kepulauan riau, jawa barat, banten, kalimantan timur, sulawesi utara, maluku iii jambi, sumatra selatan, bengkuli, lampung, jawa tengah, di yogyakarta, jawa timur, bali, ntb, ntt, sulawesi tenggara, sulawesi selatan, sulawesi tengah, gorontalo, papua barat. iv papua v kepulauan bangka belitung, kalimantan barat, kalimantan tengah, kalimantan selatan, sulawesi barat dan maluku utara. based on table 1, dki jakarta have high density, unemployment, hdi and aps, and low poverty. cluster ii, aceh, sumatra utara, sumatra barat, riau, kepulauan riau, jawa barat, banten, kalimantan timur, sulawesi utara dan maluku have same characteristics that high aps levels, unemployment, poverty, medium hdi and low density. cluster iii, there are jambi, sumatra selatan, bengkulu, lampung, jawa tengah, di yogyakarta, jawa timur, bali, nusa tenggara barat, nusa tenggara timur, sulawesi tengah, sulawesi selatan, sulawesi tenggara, gorontalo dan papua barat low density, aps, unemployment, poverty and medium hdi. papua itself the only member of cluster iv that have high poverty rate, but the density, aps, unemployment and hdi are low. kepulauan bangka belitung, kalimantan barat, kalimantan tengah, kalimantan selatan, sulawesi barat dan maluku utara are become cluster v where hdi, density, aps, unemployment and poverty are low. 5. conclusion summary of this research that various problem about population, education, social etc. can be fixed with implementation of kohonen self organizing map’s algorithm as one of alternative method for clustering which is every member of cluster have similar characteristics. this research, author make 5 cluster which is containing several provinces that have similarity about social problem than can influent crime rate. for next research, it will be better if adding other variables especially social problem in society that influent crime rate, adding spatial variables can make a better cluster. government should be doing their job for national development, it will help decreasing social problem and minimizing crime rate. references [1] d. wolke, w. e. copeland, a. angold, and e. j. costello, “impact of bullying in childhood on adult health, wealth, crime, and social outcomes,” psychol. sci., vol. 24, no. 10, pp. 1958–1970, 2013. [2] d. weinberg, “on the social construction of social problems and social problems theory: a contribution to the legacy of john kitsuse,” am. sociol., vol. 40, no. 1–2, pp. 61–78, 2009. [3] r. martinez jr, r. rosenfeld, and d. mares, “social disorganization, drug market activity, and neighborhood violent crime,” urban aff. rev., vol. 43, no. 6, pp. 846–874, 2008. [4] a. šileika and j. bekerytė, “theoretical issues of relationship between unemployment, poverty and crime in sustainable development,” j. secur. sustain. issues, vol. 2, no. 3, 2013. [5] m. j. lin, “does unemployment increase crime? evidence from us data 1974–2000,” j. hum. resour., vol. 413–436, no. 2, pp. 413–436, 2008. 10 bulletin of social informatics theory and application issn 2614-0047 vol. 1, no. 1, march 2017, pp. 1-10 pratama et.al (characteristics and segmentation of social problems with kohonen self-organizing maps) [6] d. suryadarma, a. suryahadi, and s. sumarto, “the measurement and trends of unemployment in indonesia: the issue of discouraged workers,” jakarta, 2005. [7] p. r. ehrlich, a. n. ehrlich, and j. p. holdren, human ecology. san francisco: freeman company, 1973. [8] e. sofilda, p. hermiyanti, and m. hamzah, “determinant variable analysis of human development index in indonesia (case for high and low index at period 2004-2013),” oida int. j. sustain. dev., vol. 8, no. 9, pp. 11–27, 2015. [9] badan pusat statistik, “statistik kriminal 2013,” statistik kriminal 2013, 2013. [online]. available: https://www.bps.go.id/publication/2013/12/23/0ca75fd275be1372ea0ac3ec/statistik-kriminal-2013.html. [accessed: 15-jan-2015]. [10] p. j. bickel and e. l. lehmann, descriptive statistics for nonparametric models. boston, ma: springer, 2012. [11] d. t. larose, discovering knowledge in data: an introduction to data mining. hoboken, new jersey: john wiley & sons, inc, 2005. [12] h. demuth and m. beale, neural network toolbox, user’s gui. natick, ma: the mathworks, inc, 2000. [13] r. sujatha and d. d. ezhilmaran, “an adaptive method for analyzing and predicting the crime locations by means of amabc and arm,” j. theor. appl. inf. technol., vol. 59, no. 1, pp. 45–56, 2014. [14] c. a. r. pinheiro, a. g. evsukoff, and n. f. f. ebecken, “neural network to identify and prevent bad debt in telephone companies,” in ieee 2005 international conference on data mining: workshop on data mining case studies, 2005, pp. 125–139. [15] m. y. kiang, m. y. hu, and d. m. fisher, “an extended self-organizing map network for market segmentation—a telecommunication example,” decis. support syst., vol. 42, no. 1, pp. 36–47, 2006. [16] badan pusat statistik, “bps-statistics indonesia.” 2015. bulletin of social informatics theory and application issn 2442-6571 vol. 1, no. 1, march 2017, pp. 18-25 18 https://doi.org/10.31763/businta.v1i1.21 spell checker implementation to analyze the narrative essay of sixth-grade elementary school students in indonesia muhana gipayana * department of elementary and pre school, universitas negeri malang, malang, indonesia gipayana@gmail.com * corresponding author 1. introduction in essence, indonesian language learning is directed to improve the ability to communicate orally and written indonesian and to cultivate the appreciation of indonesian literary works and intellectual works [1]. learning indonesian in elementary school has an important value because this is the first time teaching indonesian language implementation is planned and directed at this level of education. the general objectives of learning indonesian elementary school are [2]:  students appreciate and pride the indonesian as the language of unity and national language.  students understand indonesian in terms of form, meaning, and function and its appropriate and creative use for various purposes and circumstances.  students have the ability to use indonesian language to improve intellectual ability, emotional maturity, and social maturity.  students have discipline in thinking and speaking.  students are able to enjoy and utilize literary works to develop a personality, broader life insight and improve knowledge and language skills.  students appreciate and boast indonesian literature as a cultural and intellectual repertoire. the above can be achieved if indonesian language teachers in primary schools can teach the indonesian language efficiently, effectively and directed. the quality of learning development greatly affects student learning outcomes. the methodology of language learning based on communicative approach revealed that game learning method, role play simulation, and partner communication can be applied [3]. a r t i c l e i n f o a b s t r a c t article history received december 2, 2016 revised december 28, 2016 accepted january 14, 2017 learning bahasa indonesia correctly in terms of writing and reading is needed by students to understand well the language learned in school. some problems arise when elementary school students still need guidance in writing indonesian sentences in narratives, that are still lacking the standard or misspelling. teachers usually read essays from students but it takes a lot for the teacher to learn. this research emerged with the aim of assisting teachers and students in correcting the spelling of the essay that was written so that it would be a perfect and perfect sentence. applications built using internet technology so students can access the system anywhere. the results show that 87% of students experience spelling errors in writing narrative essay because they are inaccurate to what they write, so the application will provide automatic correction and already implemented in several schools at malang. this is an open access article under the cc–by-sa license. keywords spell checker elementary school narrative essay http://creativecommons.org/licenses/by-sa/4.0/ http://creativecommons.org/licenses/by-sa/4.0/ issn 2614-0047 bulletin of social informatics theory and application 19 vol. 1, no. 1, march 2017, pp. 18-25 gipayana (spell checker implementation to analyze the narrative essay of sixth-grade elementary school students) in order to measure the success of indonesian language learning in elementary schools in accordance with the intellectual, social, and emotional development of students, it is required minimum qualification standards or minimum mastery standards (skm) that describes the mastery of knowledge, skills and positive attitudes toward indonesian language and literature. some elementary school students in malang have many difficulties in studying narrative essay, this is because to give evaluation takes a long time for the teacher to make corrections by reading every sentence. researchers have coordinated with several elementary schools to provide solutions to these problems, and the solution is to create applications that can help students automatically get feedback from the narrative essay they have written. this feedback is very important and it takes students to develop narrative writing skills by getting better. 2. literature review the following description are some basic knowledge that should be known in the implementation of the method. 2.1. narrative essay essays began to be known in the 1500s where a french philosopher, montaigne, wrote a book that included some anecdotes and observations. his first book was published in 1580 entitled essais which means attempts or effort. montaigne wrote several stories in this book and states that his book was published based on his personal opinion. this essay, based on montaigne's acknowledgment, aimed to express his view of life. in indonesia, the form of the essay was popularized by hb jassin through his reviews of indonesian literary works which were then recorded (four volumes) under the title modern indonesian literature in criticism and essay (1985), but jassin could not explain the essay formulation. an essay is a brief prose composition expressing the author's opinion on a particular subject. a basic essay is divided into three parts: an introduction that contains background information that identifies the subject and the introduction of the subject; body of essays presenting all information about the subject; and the last is the conclusion that gives the conclusion by recalling the main idea, the summary of the body of the essay, or adding some observations about the subject. what distinguishes essays and others? answering this question can be done by referring existing opinions or formulas, but the opinions or formulations that have been there are often still incomplete and sometimes contradictory so it still contains shortcomings as well. for example about the size of the essay, there is a free, medium, and can be read once sitting. about the contents of the essay, there is a statement in the form of analysis, interpretation, and descriptions (literature, culture, philosophy, science). furthermore, likewise of the essay styles and methods there are those who declare free and there are regular states. essay explanations can be more "safe and easy to understand" if taken by borrowing the division of edward de bono's model of reasoning. according to de bono, reasoning can be divided into two models. first, the model of vertical reasoning (focusing and setting aside something irrelevant) and the two models of lateral reasoning (open attention and accept all possibilities and influences). from the division of this reasoning model, essays tend to apply lateral reasoning because essays tend not to be analytical and random, but can be skipping and provocative. because, the essay according to its meaning of the word origin is an attempt or experiment that does not have to answer a problem in a final, but rather want to stimulate. according to francis bacon, essays are more like salt-generating salt grains than a filling meal. describe an idea by way of speaking. the events told are usually presented in the order of time. the persuasive essay tries to alter the reader's behavior or motivate the reader to participate in an action/action. this essay can express an emotion or look emotional. support details are usually presented in order of importance. the following paragraph is an example of a narrative essay written by one of the primary school students: tepat ketika tanggal 10 maret, sekolahku libur selama sembilan hari dan akan berakhir pada tanggal 18 maret. aku dan seluruh keluargaku tidak menyia-nyiakan waktu ini untuk mengadakan liburan keluarga. ketika itu aku memilih berlibur ke pantai parangtritis. pagi-pagi aku telah 20 bulletin of social informatics theory and application issn 2614-0047 vol. 1, no. 1, march 2017, pp. 18-25 gipayana (spell checker implementation to analyze the narrative essay of sixth-grade elementary school students) berbenah dan menyiapkan semua perbekalan yang nantinya diperlukan. sepanjang perjalanan, aku iringi dengan nyanyian lagu riang. betapa senangnya aku ketika sampai di pantai tersebut. dengan hati suka ria, aku sambut pantai parangtritis dengan senyumku. pantai parangtritis, pantai nan elok yang menjadi favoritku. tanpa menyia-nyiakan waktu, aku mengajak kakakku untuk bermain air. kuambil air dan aku ayunkan ke mukanya. dengan canda tawa, kami saling berbalasan. puas rasanya, terasa hilang semua kepenatan karena kesibukan tiap harinya. di sana, aku dan seluruh keluargaku saling berfoto-foto untuk mengabadikan momen yang indah ini. tak terasa waktu berjamjam telah kuhabiskan disana. hari pun mulai sore menandakan perpisahan dan kembali pulang. tak rela rasanya kebahagiaan ini akhirnya selesai. dalam benakku, aku kan kembali esok. 2.2. writing skills writing skill is one type of language skills that students must master. many scholars have put forward the notion of writing. in addition, writing skills are the ability to express ideas, opinions, and feelings to others through written language. the accuracy of disclosure of ideas must be supported by the accuracy of the language, vocabulary and grammatical and spelling used. writing skills is a skill pouring thoughts, ideas, opinions about something, a response to a statement of desire, or the expression of feelings by using the language [4].writing skills is one of the productive and expressive language skills that are used to communicate indirectly with others [5]. the skill of writing essays or writing is to pour ideas into the written language through the sentences that are strung together and clear so that can be communicated to the reader successfully [6]. writing is an act of expressing ideas through the language medium [7]. writing is a productive and expressive activity so the writer must have the ability to use vocabulary, grammar, and language structure. writing skills as an act of transferring thoughts and feelings into the written language using symbols [8]. writing skills is defined as the ability to use language to express ideas, thoughts or feelings to others by using written language [4]. writing is an act of expressing ideas, ideas, thoughts or feelings into the linguistic symbols. writing is an activity to convey a message (communication) by using written language as a medium or tool [9]. in written communication there are at least four elements involved are (1) the author as messenger, (2) content of writing or message, (3) channel or media in the form of writing and (4) the reader as the recipient of the message. writing skills is a skill in making letters, numbers, names, any sign of any language with a stationary on a particular page [10]. while making up is a whole series of one's activities in expressing ideas and passing them through written language to the reader's community to be understood. based on some opinions above, it can be argued that writing skills are a skill to pour ideas, ideas, and feelings in the form of written language so that others who read can understand the contents of the article well. 2.3. addie model development the addie development model is an acronym of analysis (analysis), design (design), development (development), implementation (implementation), and evaluation (evaluation). the steps of the addie development model are characterized as a generic-systemic approach, which can also be encountered in the field of software engineering and product design. another feature of this development model is that it is systematic in that the output of the previous process becomes the input for the next process [11]. the model of addie development begins with an analysis of needs, i.e. surveying the scope of development to determine what are the priorities and development goals [11]. the design stage is the stage where the development goal is designed in the form of blueprint (design). at the development stage, the blueprint is then manifested using materials in the form of specific procedures or equipment. at the implementation stage (implementation), procedures or equipment have been prepared and then realized in real terms within the scope of development. the evaluation stage is the stage where the developer evaluates to see the extent to which development is based on a predetermined objective. at this stage, revisions can be made to the things that are deemed necessary. the scheme of the addie development model shown at figure 1. issn 2614-0047 bulletin of social informatics theory and application 21 vol. 1, no. 1, march 2017, pp. 18-25 gipayana (spell checker implementation to analyze the narrative essay of sixth-grade elementary school students) fig. 1. addie model development. with generic systemic features and a wide range of fields, the addie development model can be applied as a procedure for developing constructivist learning methods. theory and learning strategies derived from instructional system design (isd) or instructional system design, including the addie model, can be applied in the learning process to help educational practitioners or providers develop the instructional design of optimal learning to motivate learners better in absorbing knowledge, skills, and experience. application of the addie development model through constructivist learning approach is expected to create a learning environment that reflects real-world experiences so that it will support teaching and learning activities effectively and efficiently. 2.4. spell correction spell correction is a software intended to correct the mistakes in spelling. spell correction will help the user in the process of checking the correct words they entered. of course, there will be words that are considered correct or incorrect by the spell correction software. the word which is considered to be incorrect will be converted into words that are considered to be correct by the spell correction software. some applications which have been using spell correction features including a word processor, email client, electronic dictionary and search engine. spell checker is the fundamental spelling correction tool. the first spell checker software already existed in the late 1970's mainframe computer. but the spell checker for personal computers has begun to exist in 1980. then the ibm pc software also included a spell checker in 1981. seeing the enormous benefit in addition of spell checker facility, the manufacturer of word processing software such as wordperfect and wordstar include spell checker feature in their software. in addition to winning the market as a strategy to reap the benefits, besides of english spelling, the producer also made supports for other languages such as hungarian and france languages, and also asian countries. with varying amounts of training data, vocabulary size may change with the size of the training set [12]. that experiments on a large number of data sets show that the two take the similar time to learn and are similarly accurate, but naive bayes inference is order of faster magnitude [13]. probabilistic classifiers are often criticized because they do not induce declarative, interpretable models [14]. however, an often overlooked advantage is that the probabilistic model is a ranked rather than a classifier, and thus can be calibrated to improve classification performance. interpretability is an important issue in data mining application [15]. naïve bayes tree segment the data using a univariate decision tree. the naïve bayes work best in two cases: completely independent features and functionally dependent features [16]. 3. method this research is to create an application with spell correction facility for learning written essay in bahasa indonesia. it is unfortunate if the written sentence doesn’t mean as the mistype has occurred. for example is, search engine google.com, author of a simple adaptation to the process of checking the word. a simple adaptation was outlined by peter norvig, a professor who worked on google labs that discuss how to do the spell correction in its search engine. this method of spell correction is available to be implemented in other application. 22 bulletin of social informatics theory and application issn 2614-0047 vol. 1, no. 1, march 2017, pp. 18-25 gipayana (spell checker implementation to analyze the narrative essay of sixth-grade elementary school students) as described above, the output of training data is words and probabilities. it then will be saved in the database and used as the basic material for calculation in spell correction process and give output to the user for their learning in written english. 3.1. analysis the analysis phase is the basic and necessary step in order to ensure production of quality learning materials. it comprises many analyses, but for the scope of this research, it was needed that the analysis was conducted with four analyses which are users, content, context, and technology. the first step in this stage is to know the extent to which elementary school students understand in writing the narrative essay which is then continued by benchmarking on some technology services that are able to help learning the essay, especially the narrative one. fig. 2. step of analysis phase. after the problem arises, then it’s important to get the best solution among them. spell checker is a current optimum solution because it can check written spelling by the students. 3.2. design the design phase defines the instructional strategies for courses and gives a description of the content like a blueprint. it shows how the content should be organized (learning object approach), presented and delivered to learners, it includes also types of activities and exercises. some of the issues to be considered when devising an instructional strategy are material grouping and sequencing, instructional methods and tactics (pedagogy) to be used to present materials, learner’s assessments methods, etc. some exercise questions are made gradually by providing a clear level, for example, there are categories of students who are at level 1 to 6. level 1 is the lowest level, meaning that the essay writing still has a lot of mistakes, but the students at level 6 already understand the grammar, which means good so this level is the final stage of practicing essay writing. the instructional instruction in sequence is also explained through the exposure of teachers in the classroom along with the learning methods that support the development of this system to improve writing skills for elementary school students. 3.3. development a successful development phase draws upon information collected in the analysis phase and the decisions made in the instructional design phase. using this information, the prototype can be created and course material developed. the development phase will result into consistency subject materials with sound instructional design principles, technological and pedagogical strategies. the system development life cycle framework provides a sequence of activities for system designers and developers to follow. it consists of a set of steps or phases in which each phase of the sdlc uses the results of the previous one. the sdlc adheres to important phases that are essential for developers, such as planning, analysis, design, and implementation, and are explained in the section below. it includes evaluation of the present system, information gathering, and feasibility study and request approval. a number of sdlc models have been created: waterfall, fountain, spiral, build, and fix, rapid prototyping, incremental, and synchronize and stabilize. the oldest of these, and the issn 2614-0047 bulletin of social informatics theory and application 23 vol. 1, no. 1, march 2017, pp. 18-25 gipayana (spell checker implementation to analyze the narrative essay of sixth-grade elementary school students) best known is the waterfall model: a sequence of stages in which the output of each stage becomes the input for the next process. these stages can be characterized and divided up in different ways, including the following nine processes: the objective of phase 1 is to conduct a preliminary analysis, propose alternative solutions, describe costs and benefits and submit a preliminary plan with recommendations. in this step, we need to find out the organization's objectives and the nature and scope of the problem under study. even if a problem refers only to a small segment of the organization itself then we need to find out what the objectives of the organization itself are. then we need to see how the problem being studied fits in with them. in digging into the organization's objectives and specific problems, we may have already covered some solutions. alternate proposals may come from interviewing employees, clients, suppliers, and/or consultants. we can also study what competitors are doing. with this data, we will have three choices: leave the system as is, improve it, or develop a new system. the last step is describe the costs and benefits. the second process is requirements definition. it defines project goals into defined functions and operation of the intended application. analyzes end-user information needs. the third process describes desired features and operations in detail, including screen lawets, business rules, process diagrams, pseudocode and other documentation. the next process is writing the real code. the fifth process, brings all the pieces together into a special testing environment, then checks for errors, bugs, and interoperability. the sixth process is acceptance, installation, and deployment. here, the final stage of initial development, where the software is put into production and runs actual business. the seventh process is maintenance, during the maintenance stage of the sdlc, the system is assessed to ensure it does not become obsolete. this is also where changes are made to initial software. it involves continuous evaluation of the system in terms of its performance. after the maintenance process is evaluation. some companies do not view this as an official stage of the sdlc, but is it an important part of the life cycle. evaluation step is an extension of the maintenance stage and may be referred to in some circles as post-implementation review. this is where the system that was developed, as well as the entire process, is evaluated. some of the questions that need to be answered include: does the newly implemented system meet the initial business requirements and objectives? is the system reliable and fault-tolerant? does the system function according to the approved functional requirements?. in addition to evaluating the software that was released, it is important to assess the effectiveness of the development process. if there are any aspects of the entire process, or certain stages, that management is not satisfied with, this is the time to improve. evaluation and assessment is a difficult issue. however, the company must reflect on the process and address weaknesses. the final phase are developed for discarding system information, hardware, and software in making the transition to a new system. the purpose here is to properly move, archive, discard or destroy information, hardware, and software that is being replaced, in a matter that prevents any possibility of unauthorized disclosure of sensitive data. the disposal activities ensure proper migration to a new system. particular emphasis is given to proper preservation and archival of data processed by the previous system. all of this should be done in accordance with the organization's security requirements. 3.4. implementation the implementation phase, in this case, will involve testing a developed prototype in the pilot site. the test must check for content pedagogical design, accessibility and delivery issues, also test the functions of the content repository. storyboard design contains simple lawet design which is more to understand by the student and only focused on the material of e-learning system. design for students is an important part of this system where students can comfortably follow the distance learning system, students can be created from the comfort of a good application design and in accordance with the wishes of the student as a weng child. 3.5. evaluation two types of evaluation are considered in this model, i.e. formative evaluation normally done at each phase and summative evaluation done at the end of all phases. formative evaluation is preferred for a better quality of the product. although for the scope of this research only formative evaluation 24 bulletin of social informatics theory and application issn 2614-0047 vol. 1, no. 1, march 2017, pp. 18-25 gipayana (spell checker implementation to analyze the narrative essay of sixth-grade elementary school students) will be covered. evaluation of this system provides information of students writing wrong and correct comparisons so that students can learn to improve the quality of writing independently. 4. result and discussion after all, requirement was done, it is the time to see the results of the development application as shown in figure. this application has been completed in early march 2017 and took one month for students to use and perform on bahasa essay learning. students enter the sentence and begin the test of writing skills as shown at figure 3. fig. 3. student form input on website. students write in the box correctly, then when it is finished, then the "evaluation" button can be pressed. after that will appear writing evaluation results that shown at figure 5. the results of this evaluation provide some suggestions for misspelled words, the words "senyuku", "kluargaku", and "rasana". spell checker application then provides solutions to these problems by displaying the correct results. fig. 4. evaluation result. after spell checker application is implemented into 4 schools in malang as the sample, then the researcher then give questionnaire in the form of questionnaire to the teacher in the school about the responses to the usefulness of this application, whether felt help or even complicate. the data processing of the questionnaire results stated that 87% of teachers are satisfied with the results of the application, proved to increase the value of essay narration on average by 30% from the previous value. this increase in value occurs because students try several times and try not to make the same mistakes. issn 2614-0047 bulletin of social informatics theory and application 25 vol. 1, no. 1, march 2017, pp. 18-25 gipayana (spell checker implementation to analyze the narrative essay of sixth-grade elementary school students) the questionnaire results show students satisfaction of 91% they are happy and feel helped by the application. students suggest that application design should be attractive and lots of good colors. teachers at the school also provide suggestions for evaluations other than narrative essays, as students also feel difficulty on other types of essays. 5. conclusion based on this research, it can be concluded that the development of media using the addie model has been implemented well in some elementary schools in malang. software development is incorporated into development steps in this model and has resulted in applications that help students in self-evaluation. students are be able to perform independent learning on narrative essay in order to improve learning outcomes. students try to visit the website and conduct self-learning activities among peers after that. acknowledgment i would like to thanks to m zainal arifin who helped me to develop the application. references [1] m. gipayana, pengajaran literasi: fokus menulis di sd/mi. malang: asih asah asuh, 2010. [2] depdiknas, kurikulum berbasis kompetensi. jakarta: puskur balitbang depdiknas, 2002. [3] tarigan, pengajaran kosakata. bandung: angkasa, 1989. [4] a. rofi’uddin and d. zuhdi, pendidikan bahasa dan sastra indonesia di kelas tinggi. jakarta: depdikbud, 1999. [5] h. guntur, membaca sebagai suatu keterampilan berbahasa. bandung: angkasa, 2008. [6] haryadi and zamzani, peningkatan keterampilan berbahasa indonesia. jakarta: dirjen dikti, 1997. [7] b. nurgiyantoro, penilaian dalam pengajaran bahasa dan sastra. yogyakarta: bpfe, 2001. [8] a. semi, metode penelitian sastra. bandung: angkasa, 1993. [9] suparno and m. yunus, keterampilan dasar menulis. jakarta: universitas terbuka, 2006. [10] t. l. gie, terampil mengarang. yogyakarta: andi, 2002. [11] m. molenda, “in search of the elusive addie model,” perform. improv., vol. 42, no. 5, pp. 34–36, 2003. [12] a. mccallum and k. nigam, “a comparison of event models for naive bayes text classification,” aaai98 work. learn. text categ., vol. 752, no. 1, pp. 41–48, 1998. [13] d. lowd and p. domingos, “naive bayes models for probability estimation,” in proceedings of the 22nd international conference on machine learning, 2005, pp. 529–536. [14] p. a. flach and n. lachiche, “naive bayesian classification of structured data,” mach. learn., vol. 57, no. 3, pp. 233–269, 2004. [15] r. kohavi, “scaling up the accuracy of naive-bayes classifiers: a decision-tree hybrid,” kdd, vol. 96, pp. 202–207, 1996. [16] i. rish, “an empirical study of the naive bayes classifier,” in ijcai 2001 workshop on empirical methods in artificial intelligence, 2001, pp. 41–46. bulletin of social informatics theory and application issn 2614-0047 vol. 3, no. 1, march 2019, pp. 30-37 30 https:doi.org/10.31763/businta.v3i1.162 a review: evolution of big data in developing country bayu prasetyo a,1,*, faiz syaikhoni aziz a,2, kamil faqih a,3, wahyu primadi a,4, roni herdianto b,5, wicaksono febriantoro c,6 a electrical engineering postgraduate, electrical engineering department, universitas negeri malang b graduate school, universitas negeri malang c metrological resources development centre, ministry of trade-republic of indonesia 1 bayoe.30015@gmail.com*; 2 faizsyaikhoni@gmail.com; 3 kamil.faqih201@yahoo.com; 4 pakwahyuprimadi@gmail.com; 5 roni.herdianto@um.ac.id; 6 wicaksono.febriantoro@kemendag.go.id * corresponding author 1. introduction the need for data storage is increasing along with the progress of systems that begin to use data storage technology as their primary storage. up to the present, some systems store data on their hard drives at the most, but the more data stored, the more storage and big data technology as a solution are required. big data and its analysis system lie in modern data centers. data stored on big data is obtained from online transactions, e-mail, picture media, audio video, log data, posts, search requests, health records, social networking interactions, science data, sensors and cellphones and their application [1], [2]. all data obtained is stored in databases that grow massively and begin to be difficult to capture, form, store, manage, share, analyze, and visualize through unique database software [3]. utilization of big data has begun to penetrate in many human’s life aspects, for instance, big data in the context of health services. in the context of health, there are many medical imaging techniques to know certain structures or know what is in the human body. for example, visualizing the structure of blood vessels can be performed using magnetic resonance imaging (mri), computed tomography (ct), ultrasound and photoacoustic imaging [4]. the scanning process requires a large storage space. for example, microscopic scanning of high-resolution human brains requires 66tb of storage space [5]. ordinary storage systems will not be able to accommodate that much data storage. big data technology, accordingly, is very necessary to meet the demands of storage in the health sector. besides the health sector, the utilization of big data technology has also begun to be utilized in the field of agriculture. smart farming development began to be intensively implemented by utilizing big data technology as storage. big data on agriculture is often used for further analysis, such as research on soil type, temperature, biodiversity, plants and so on. this analysis is used to determine the right techniques to produce better agricultural products [6]. a r t i c l e i n f o a b s t r a c t article history received january 7, 2019 revised january 24, 2019 accepted february 6, 2019 the development of technology from year to year is increasingly rapid and diverse. all systems that exist in human life began to be designed with technology that requires large data storage. big data technology began to be developed to accommodate very large data volumes, rapid data changes, and very varied. developing countries are starting to use big data a lot in developing their systems, such as healthcare, agriculture, building, transportation, and various other fields. in this paper, it explains the development of big data applied to the sectors previously mentioned in developing countries and also the challenges faced by developing countries in the process of developing their systems. this is an open access article under the cc–by-sa license. keywords big data healthcare agriculture building transportation developing country http://creativecommons.org/licenses/by-sa/4.0/ http://creativecommons.org/licenses/by-sa/4.0/ issn 2614-0047 bulletin of social informatics theory and application 31 vol. 3, no. 1, march 2019, pp. 30-37 prasetyo et.al (a review: evolution of big data in developing country) development of big data requires developing countries to be prepared in all their architectures, both communication networks, compatible devices, and construction costs. in various cases, there are several developing countries that have failed in technology development, especially in the information field. for example, the development of a health information system in south africa has failed due to a system that spent a high cost of data or less consumer use which has caused a loss [7]. system development in developing countries often has problems due to incompatibility between the previous system and the future system to be developed. in addition, system development in developing countries is often constrained due to gaps in cultural, economic and systemic contexts with software designers [7], [8]. however, development must have progressed in the process. in this paper, the evolution of big data technology will be presented in various fields, such as healthcare, agriculture, building, and transportation. 2. big data technology big data is a term used to refer to a set of volumes of data that are difficult to store, process, and analyze and are efficient if only using simple database technology [9], [10]. big data technology is created since the need for data storage volumes is getting considerable and more complex with various types of media stored. big data allows people to store various types of media ranging from online transactions, e-mail, picture media, audio video, log data, posts, search requests, health records, social networking interactions, science data, sensors and cellphones and their application [1], [2]. the kinetic of big data is explained in four dimensions, namely:  volume (v1): size of data collected for analysis.  velocity (v2): refers to the speed of data transfer. the contents of the data continue to change due to absorption complementary data collections, the introduction of previously archived data or legacy collections, and streaming data coming from various sources.  variety (v3): diverse data sources that have different formats and from various disciplines and from several application domains.  veracity (v4): quality, reliability, and potential data [6], [9]. yet, there are some opinions that convey five dimensions. the fifth dimension is valorization (v5): the ability to spread knowledge, appreciation, and innovation [6]. although these five dimensions can describe big data, big data analysis does not need to fulfill all dimensions. large data is generally known to be less accurate and stable due to compromising the 4th dimension. other relevant dimensions can be visualization hence an informative data structure presentation is needed thus it is easy to understand [6], [9], [11], [12]. 3. evolution of big data 3.1. big data in healthcare healthcare is a sector that plays an important role in a country. evolution of big data in the healthcare sector has been carried out in developing countries, for example, the system of managing records in hospitals from manual to digital [2]. big data facilitates the identification, collection, and storage of data related to the healthcare sector [13]. in the healthcare sector, big data is summarized into three categories, namely traditional medical data originating from the health system (e.g personal and family health history, medical history, laboratory reports, pathology results), omics data referring to large-scale datasets in the biological and molecular fields (for example genomics, microbiomics, proteomics, and metabolomics) and data from social media [13]. 3.2. big data in agriculture agriculture is a sector that plays an important role in the economy of a country. a good agricultural sector will improve other aspects which follow it, such as employment, the country's food availability, and the supply of raw materials in the food industry. in addition, the agricultural sector is able to contribute more to the gross domestic product. evolution in agriculture has happened since decades ago. evolution in agriculture takes place in various aspects including aspects of pest management, planting techniques to produce quality and 32 bulletin of social informatics theory and application issn 2614-0047 vol. 3, no. 1, march 2019, pp. 30-37 prasetyo et.al (a review: evolution of big data in developing country) quantity [14]. in the past 150 years, agricultural innovation has become an important means by which food and agricultural systems have increased productivity and increased world food availability [15], [16]. in the big data evolution of the agriculture sector, there are several datasets made so that big data agriculture can be precise and can be used as a system algorithm parameter [13]. the types of data used include:  historical data: includes, soil testing, crop patterns, field monitoring, monitoring of results, climate conditions, weather conditions, gis data, and labor data.  data on agricultural equipment and sensors: includes data collected from remote sensing devices, gps receivers based references, variable level fertilizers, soil moisture, temperature sensors, farmers call records and equipment logs.  social and web-based data: these include, farmers and customer feedback, agricultural websites and blogs, social media groups, web pages, and data from search engines  publications: includes agricultural research on cultural reference materials such as text-based practice guidelines for land and agricultural needs (e.g. pesticides, fertilizers, and equipment information).  flowed data: this includes data from plant monitoring, mapping, drones, airplanes, wireless sensors, smartphones, and security surveillance.  business, industrial and external data: data from billing and scheduling systems, agricultural departments and other agricultural equipment manufacturing companies. evolution in agriculture has now begun to involve technology both in monitoring, communication, and data storage technology. in 2015, processing techniques and program models for distributed computing were developed, namely, map reduce. this technique is used in smart agriculture for system decision making with several parameters as considerations, namely weather, soil conditions, and market conditions [13], [17]. then in 2018, the map-reduce model was used as the basic algorithm in designing big data in the smart agriculture system developed. big data developed can be seen in fig. 1. smart agriculture also allows for monitoring in the form of images and graphics since humans capture information in the form of images and graphics faster than using plain text [18]. fig. 1. big data system of smart agriculture [17]. issn 2614-0047 bulletin of social informatics theory and application 33 vol. 3, no. 1, march 2019, pp. 30-37 prasetyo et.al (a review: evolution of big data in developing country) 3.3. big data in building energy building energy efficiency has become one of the main concerns of the community in terms of sustainability and has attracted research and development efforts in recent years. big data analysis can be one method used to analyze and understand individual energy consumption behaviors, help improve energy efficiency in the building sector and promote energy conservation [19]. household energy consumption can be described in three dimensions, namely time dimensions, user dimensions and spatial dimensions as in fig. 2. fig. 2. energy consumption dimensions [19]. the parameters for measuring household energy consumption can be in one hour, a day, a month or even a year. household energy consumption in a day often shows several different differences in time of day. monthly and annual energy consumption is usually influenced by many external factors [20]–[22]. different household energy consumption also varies greatly. individual energy use is generally influenced by various factors, including internal factors such as the use of basic needs and external factors such as building characteristics and building location [19]. household energy use is often influenced by the geographical environment, level of economic development, climate characteristics and other factors. the amount of data in the energy sector is growing at any time. another big challenge for data analysis is exemplified by applications with limits on size. occasionally, the limits are relatively arbitrary; about 256 columns, 65,536 rows are bound to worksheet sizes in all versions of microsoft excel, yet when microsoft excel was updated since 2007, 16,384 columns and one million rows can be collected [19]. 3.4. big data in transportation urban traffic has become a concern for many people and gathers increasing interest as cities become bigger, crowded, and “smart” [23]. many people use big data analysis in various fields and have achieved great success [24]. with the successful big data analysis application in various fields, intelligent transportation systems (its) also began to see big data with great interest [25]. the evolution of intelligent transportation systems (its) was developed since the early 1970s, initially using traditional inefficient data processing systems. intelligent transportation systems is the future direction of the transportation system. its combines advanced technology that includes electronic sensor technology, data transmission technology, and intelligent control technology into 34 bulletin of social informatics theory and application issn 2614-0047 vol. 3, no. 1, march 2019, pp. 30-37 prasetyo et.al (a review: evolution of big data in developing country) the transportation system [26]. the aim of its is to provide better services for drivers and motorists in the transportation system [26]–[28]. intelligent transportation systems (its) data can be obtained from various sources, such as smart cards, gps, sensors, video detectors, social media, and so on [29], [30]. with the development of its, the amount of data generated at its expanded from the trillion bytes to petabyte level. with its monitoring devices deployed along selected main roads in the downtown area, a large amount of traffic data can be a useful resource to help traffic operations, transportation design, planning, management, performance measurement, and research by identifying the main dynamic properties of the road which varies [23]. big data analysis offers its a new technical method. its can obtain benefit from the big data analysis as follows [31], [32]:  big data analysis has solved three problems: data storage, data analysis, and data management. big data platforms like apache hadoop and spark are able to process large amounts of data, and they have been widely used in academic setting and industry.  big data analysis can improve the efficiency of its operations and the traffic management department can predict traffic flow in real time. big data analysis from transport developers can help users to reach their destination on the most suitable route and with the shortest possible time.  big data analysis can increase the level of safety of its. using advanced sensors and detection techniques, the amount of transportation information in real time can be obtained. through big data analysis, we can effectively predict traffic accidents. the architecture of the big data analysis of intelligent transportation systems (its) is shown in fig. 3. this can be divided into three layers, namely the data collection layer, data analysis layer, and data application layer [26]. fig. 3. analysis architecture of its big data [26]. using advanced data collection techniques, layer data collection monitors people, vehicles, roads, and the environment. original traffic data which includes structured data, semi-structured data and mixtures are transmitted to layer analysis data via wired or wireless communication. after the layer analysis data receives original traffic data, first classifies the data, deletes duplicate data, cleanses the data and distributes useful and accurate data distributed [26]. issn 2614-0047 bulletin of social informatics theory and application 35 vol. 3, no. 1, march 2019, pp. 30-37 prasetyo et.al (a review: evolution of big data in developing country) 4. big data development challenges in developing countries the development of big data implementation in developing countries has faced numerous challenges. to develop a big data, it requires a strong physical infrastructure for its operations [4]. on the operation of big data, it requires a server architecture consisting of thousands of nodes with multiple processors and disks connected by high-speed networks working in a distributed manner [27]. internet companies such as google, microsoft, yahoo, and amazon use this architecture with centers scattered throughout the world offering their services yet costing a lot [28]. many developing countries cannot afford architectures that support big data [29]. in addition, apart from the server architecture, it also requires additional components that are needed by software and a reliable workforce [26]. many developing countries lack the storage and communication infrastructure needed to regulate and integrate the amount of information generated in big data. not only countries that lack resources, but they do not have computing capacity, electricity networks, and telecommunications networks [30]–[32]. after identifying the challenges of big data in developing countries, we discussed the challenges of big data in the sectors in healthcare, agriculture, building, and transportation. 4.1. big data development challenges in healthcare the big data development challenge in healthcare is divided into two main categories, namely fiscal and technology [7]. in fiscal challenges, health practitioners interact without face-to-face but have risks about payment. the biggest technological challenge is the state of health data [7]. 4.2. big data development challenges in agriculture basically, agriculture requires a complex system with several types of data variables taken. an example is data regarding the weather. in smart agriculture, there is often a weather forecasting system. numerical weather prediction or (nwp) has several problems, such as requiring large volumes, complex calculations, and real-time operations. this will also have an impact on large energy consumption as well [33], [34]. in addition, modeling in weather forecasting is limited and insufficient therefore this is a challenge in the development of agriculture [35]. 4.3. big data development challenges in building energy the amount of data in the energy sector is a challenge in the development of big data in building energy. where data in the energy sector grows every time. another big challenge for data analysis is exemplified by applications with limits on size. the limit is relatively arbitrary; about 256 columns, 65,536 lines are bound to worksheet sizes in all versions of microsoft excel. according to adam jacobs, excel is not targeted at users who deploy very large data sets [19]. 4.4. big data development challenges in transportation big data analysis has indeed made great achievements on intelligent transportation systems (its), but there are still open challenges that need to be addressed in future work. some open challenges to the use of big data analysis in its are, data collection, data privacy, data storage, data processing, and data opening [36]. big data analysis will have a profound impact on intelligent system transportation design, and make it safer, more efficient and profitable [37]. 5. conclusion the rapid development of technology with the amount of data which needs to be increasingly stored encourages the need for a system that is able to accommodate the entire data that must be stored. big data technology is one of the solutions for storing data on a large scale with increasingly complex computing. some sectors have started using big data for storage and computing media for example healthcare. the development of big data in healthcare offers an easy approach to administer and store health data from medical devices or medical methods. in addition, in the field of agriculture, building energy and transportation also utilize big data to store or compute data for control based on that data. in the development of big data, there are several challenges that are generally caused by financial and capital conditions. in the future, it is expected that the big data system will be more efficient and economical which will be fulfilled by several developments on low-cost computing. 36 bulletin of social informatics theory and application issn 2614-0047 vol. 3, no. 1, march 2019, pp. 30-37 prasetyo et.al (a review: evolution of big data in developing country) references [1] p. zikopoulos and c. eaton, understanding big data: analytics for enterprise class hadoop and streaming data. mcgraw-hill osborne media, 2011. [2] r. d. schneider, hadoop for dummies special edition. canada: john wiley & sons, 2012. [3] s. sagiroglu and d. sinanc, “big data: a review,” in 2013 international conference on collaboration technologies and systems (cts), 2013, pp. 42–47. [4] r. c. gessner, c. b. frederick, f. s. foster, and p. a. dayton, “acoustic angiography: a new imaging modality for assessing microvasculature architecture,” j. biomed. imaging, vol. 2013, no. 14, 2013. [5] i. scholl, t. aach, t. m. deserno, and t. kuhlen, “challenges of medical image processing,” comput. sci. dev., vol. 26, no. 1–2, pp. 5–13, 2011. [6] a. kamilaris, a. kartakoullis, and f. x. prenafeta-boldú, “a review on the practice of big data analysis in agriculture,” comput. electron. agric., vol. 143, pp. 23–37, 2017. [7] d. dada, “the failure of e‐government in developing countries: a literature review,” electron. j. inf. syst. dev. ctries., vol. 26, no. 1, pp. 1–10, 2006. [8] r. heeks, “information systems and developing countries: failure, success, and local improvisations,” inf. soc., vol. 18, no. 2, pp. 101–112, 2002. [9] i. a. t. hashem, i. yaqoob, n. b. anuar, s. mokhtar, a. gani, and s. u. khan, “the rise of ‘big data’ on cloud computing: review and open research issues,” inf. syst., vol. 47, pp. 98–115, 2015. [10] j. manyika et al., “big data: the next frontier for innovation, competition, and productivity,” 2011. [11] d. rodriguez, p. de voil, m. c. rufino, m. odendo, and m. t. van wijk, “to mulch or to munch? big modelling of big data,” agric. syst., vol. 152, pp. 32–42, 2017. [12] a. karmas, a. tzotsos, and k. karantzalos, “geospatial big data for environmental and agricultural applications,” in big data concepts, theories, and applications, s. yu and s. guo, eds. springer, cham, 2016, pp. 353–390. [13] m. r. bendre, r. c. thool, and v. r. thool, “big data in precision agriculture: weather forecasting for future farming,” in 2015 1st international conference on next generation computing technologies (ngct), 2015, pp. 744–750. [14] s. sonka, “big data: fueling the next evolution of agricultural innovation,” j. innov. manag., vol. 4, no. 1, pp. 114–136, 2016. [15] n. e. borlaug, “ending world hunger. the promise of biotechnology and the threat of antiscience zealotry,” plant physiol., vol. 124, no. 2, pp. 487–490, 2000. [16] s. chakraborty and a. c. newton, “climate change, plant diseases and food security: an overview,” plant pathol., vol. 60, no. 1, pp. 2–14, 2011. [17] m. kumar and m. nagar, “big data analytics in agriculture and distribution channel,” in 2017 international conference on computing methodologies and communication (iccmc), 2017, pp. 384– 387. [18] o. kumar and a. goyal, “visualization: a novel approach for big data analytics,” in 2016 second international conference on computational intelligence & communication technology (cict), 2016, pp. 121–124. [19] n. koseleva and g. ropaite, “big data in building energy efficiency: understanding of big data and main challenges,” procedia eng., vol. 172, pp. 544–549, 2017. [20] k. zhou, c. fu, and s. yang, “big data driven smart energy management: from big data to big insights,” renew. sustain. energy rev., vol. 56, pp. 215–225, 2016. [21] l. mashayekhy, m. m. nejad, d. grosu, q. zhang, and w. shi, “energy-aware scheduling of mapreduce jobs for big data applications,” ieee trans. parallel distrib. syst., vol. 26, no. 10, pp. 2720–2733, 2014. [22] j. cooper, m. noon, c. jones, e. kahn, and p. arbuckle, “big data in life cycle assessment,” j. ind. ecol., vol. 17, no. 6, pp. 796–799, 2013. issn 2614-0047 bulletin of social informatics theory and application 37 vol. 3, no. 1, march 2019, pp. 30-37 prasetyo et.al (a review: evolution of big data in developing country) [23] a. artikis, m. weidlich, a. gal, v. kalogeraki, and d. gunopulos, “self-adaptive event recognition for intelligent transport management,” in 2013 ieee international conference on big data, 2013, pp. 319– 325. [24] m. chen, s. mao, and y. liu, “big data: a survey,” mob. networks appl., vol. 19, no. 2, pp. 171–209, 2014. [25] c. r. berger and e. smith, “intelligent transportation systems provide operational benefits for new york metropolitan area roadways: a systems engineering approach,” in 2007 ieee long island systems, applications and technology conference, 2007, pp. 1–8. [26] l. qi, “research on intelligent transportation system technologies and applications,” in 2008 workshop on power electronics and intelligent transportation system, 2008, pp. 529–531. [27] s. h. an, b. h. lee, and d. r. shin, “a survey of intelligent transportation systems,” in 2011 third international conference on computational intelligence, communication systems and networks, 2011, pp. 323–337. [28] n. e. el faouzi, h. leung, and a. kurian, “data fusion in intelligent transportation systems: progress and challenges–a survey,” inf. fusion, vol. 12, no. 1, pp. 4–10, 2011. [29] j. zhang, f. y. wang, k. wang, w. h. lin, x. xu, and c. chen, “data-driven intelligent transportation systems: a survey,” ieee trans. intell. transp. syst., vol. 12, no. 4, pp. 1624–1639, 2011. [30] q. shi and m. abdel-aty, “big data applications in real-time traffic operation and safety monitoring and improvement on urban expressways,” transp. res. part c emerg. technol., vol. 58, pp. 380–394, 2015. [31] n. mohamed and j. al-jaroodi, “real-time big data analytics: applications and challenges,” in 2014 international conference on high performance computing & simulation (hpcs), 2014, pp. 305–310. [32] x. lin, p. wang, and b. wu, “log analysis in cloud computing environment with hadoop and spark,” in 2013 5th ieee international conference on broadband network & multimedia technology, 2013, pp. 273–276. [33] m. zaharia et al., “fast and interactive analytics over hadoop data with spark,” usenix login, vol. 37, no. 4, pp. 45–51, 2012. [34] h. jain and r. jain, “big data in weather forecasting: applications and challenges,” in 2017 international conference on big data analytics and computational intelligence (icbdac), 2017, pp. 138–142. [35] s. e. haupt and b. kosovic, “big data and machine learning for applied weather forecasts: forecasting solar power for utility operations,” in 2015 ieee symposium series on computational intelligence, 2015, pp. 496–501. [36] j. mayes, “from observations to forecasts – concluding article (part 15): opportunities and challenges for today’s operational weather forecasters,” weather, vol. 67, no. 4, pp. 100–107, 2012. [37] m. smith, c. szongott, b. henne, and g. von voigt, “big data privacy issues in public social media,” in 2012 6th ieee international conference on digital ecosystems and technologies (dest), 2012, pp. 1– 6. bulletin of social informatics theory and application issn 2614-0047 vol. 2, no. 2, december 2018, pp. 65-72 65 https://doi.org/ 10.31763/businta.v2i2.115 cyber terrorism in indonesia katya lindi chandrika 1,*, risky perdana adiperkasa 2, yana ningtyas 3 department of electrical engineering, state university of malang, malang, indonesia 1 katyachandrika@gmail.com*; 2 riskyperdana999@gmail.com; 3 yananingtyas@gmail.com * corresponding author 1. introduction humans in this modern era cannot separate from many activities. human activities sometimes are largely beyond human control and capability. human inability to handle every activity and problem that exist, causing humans need something can help the disability. one way human in resolve these problems by utilizing technology. today’s technology is growing very rapidly and will progress as science progresses. one form of technological advancement is the existence of cyber technology. cyber technology that connected with many internet networks has made new phenomenon in every stage of human interaction in cyber space. cyber technology is the use of the internet as media for communication and interaction without limit. cyber technology then make negative impacts such as emergence crime via cyber media usually known as cybercrime. the irresponsible use of cyber can result in the occurrence of violations or crimes which may result in the occurrence of a particular threat to the state. the type and violation of cybercrime very diverse as a result of improper use. wiretapping, theft and misuse of information or data in an electronic form or electronically transferred, illegal fund rising, destruction of websites and system through viruses, trojan horse, signal grounding and the like are forms of cybercrime. these emerging crimes need to be wary of their development. there are several types of cybercrime, one of them is a crime that raises terror and anxiety in the people cause harm to the state. the crime is cyber terrorism. however, cyber terrorism is still unknown to the layman. this is because ordinary people do not form of crime so they assume normal and do not want to know about cyber terrorism. ignorance about cyber terrorism cause the public not to know how to prevent and overcome cyber terrorism. a r t i c l e i n f o a b s t r a c t article history received september 4, 2018 revised september 30, 2018 accepted october 11, 2018 cyber terrorism is one of cybercrime. cyber terrorism is an activity using computer technology and information to create an atmosphere of terror and fear on a large scale through good threats to the government and citizens with brings politics, religion or ideology objectives which can lead paralysis of important infrastructure. there are several reasons why the internet is considered as the right choice to do cyber terrorism. many methods are used to do cyber terrorism. in indonesia, people’s understanding about cyber terrorism is very low. this creates ignorance in tackling cyber terrorism crime in the future when people become victims of cyber terrorism. the low knowledge about cyber terrorism requires the government to make education about cyber terrorism. the education provided will help people find solutions in the against cyber terrorism. in avoiding cyber terrorism crime the government is expected to cooperate with other developed countries that have a high level of security. this is an open access article under the cc–by-sa license. keywords cybercrime cyber terrorism terrorism http://creativecommons.org/licenses/by-sa/4.0/ http://creativecommons.org/licenses/by-sa/4.0/ 66 bulletin of social informatics theory and application issn 2614-0047 vol. 2, no. 2, december 2018, pp. 65-72 chandrika et.al (cyber terrorism in indonesia) 2. cyber terorrism cyber terrorism is a combination of two words which are cyber and terrorism. cyber means cyberspace, and terrorism is an act of violence and intimidation in the pursuit of political aims. what people first thought of cyber terrorism, it comes to war, radical organization and other rebellious activity. in reality, the definition of cyber terrorism not as simple as that. the definition of cyber terrorism always been a debate since the 1990s. the debate of definition occurred because it is not easy to explain how terrible the damage caused by a single computer attack. the term cyber terrorism has become controversial. sometimes the term of cyber terrorism is used in different contexts. the term cyber terrorism was first introduced by barry collin in 1980 as a transition of terrorism from the physical world to the virtual world [1]. the center for strategic and international studies (csies) defines this term as the use computer networks to paralyze the state infrastructure such as transportation, government, energy and other devices [2][3] [2][3]. then william l. tafoya, a retired fbi special agent describes cyber terrorism as intimidation through the use of technology with political purpose, religion or ideology can result in paralysis of important infrastructure and important infrastructure information data [4]. uma and padmavathi define the term cyber terrorism as the use cyberspace to create large scale disruption and destruction of life and property [5]. over time, in all cycles the definition transformed into the use of information technology to run an activity of terrorism [6]. surely there is not precise definition to describe the term cyber terrorism. however from the definitions that presented, it can be conclude that cyber terrorism is the activity of the use computer and information technology to create an atmosphere of error and fear of large scale through threats for government and citizens with brings politics, religion or ideological objectives which can lead paralysis of important infrastructure. the term of cyber terrorism was first introduce in 1980. this term then became more pronounced after attack on september 11, 2001 in world trade center. the attack led to many areas of government to review the standards and procedures of their security system. it also increase awareness that terrorists can use other way to reach their goals including cyber terrorism [7]. fig. 1. anatomy of cyber terrorism. bradley k. ashley in his paper titled “anatomy of cyber terrorism: is america vulnerable?” mapping and anatomical model of cyber terrorism. there are 5 factors of cyber terrorism which can be seen in figure 1. the first factor is an actor, colarik confirmed in a statement that there is no cyber terrorism without terrorism, period. the statement confirmed that cyber terrorism actor are terrorists. they launched their terror activity using cyber facilities. the second one is tools, the occurrence of cyber terrorism is certainly on the base that an important infrastructure of country works and depends on the utilization computer network. the next factor is a target, currently countries in the world are highly dependent on information systems. the information system are used as a basic needs for country to reserve public interest. so cyber terrorism always targets its target on infrastructure that has critical information. infrastructure that quite important and usually as targeted by cyber terrorism issn 2614-0047 bulletin of social informatics theory and application 67 vol. 2, no. 2, december 2018, pp. 65-72 chandrika et.al (cyber terrorism in indonesia) attacks are: (a) telecommunications, (b) health, (c) defense, (d) government, (e) banks, (f) energy, and others. the fourth factor is a motive, in general there are motives why the internet is often a tool or target where the occurrence of crime. according to phillip w. brunst the factors become the motivation of crimes commited on the internet are: (a) location, (b) speed, (c) anonymity, (d) wide coverage, and (e) cost-benefit ratio. and the last factor is a timing, attacks can be done anytime. the time of attack will be grealty determined by the right momentum so that fear can spread widely among the people. in other words, the timing of attack will be correlated with the objectives, capabilities and vulnerability factors of the security system of network is used as a tool or target attack. cyberspace is a technology that is often used become tool or target where occurrence of crime. cyber-attacks offer terrorist abilities to launch their actions with the greater effect, create greater damage to a country and pose a direct threat then they do physically. the traditional terrorist activity such as bombing will cause trauma effects that are only limited to that location alone [3][4]. in addition, there are several reasons why cyberspace is chose to launch acts of terrorism summarized in table 1. table 1. the reason terrorist use cyberspace no. reason detail 1. anonymity cyberspace offers anonymity, attacks can be disguised with specific programs or techniques, self-information is difficult to trace [10] the difficulty of knowing the motives of terrorists using cyberspace. 2. access can attack wherever they are, whether near or far from the location. using worms and viruses to spread without any direct involvement. when the attack has been designed, the terrorist can start quickly without requiring more preparation. 3. communication used a media to discuss the attack plan. free control of mass in large quantities [1] as an alternative to train members in the form of instruction or audio. for example how to make bombs, firearms and something dangerous. 4. resource using less resources, but the resulting effect is greater. as terrorists who have limited funds 5. propaganda and recruitment for propaganda action, usually an explanation of ideology, practical instruction and promotion of terrorist activities. usually present in multimedia form. propaganda distributed over the internet can easily spread widely. recruitment of terrorist groups is based on lure, resentment and weakness in thinking. recruiting many members becomes easier. cyber terrorist use various methods to launch their actions [11]. the following descriptions are some of the methods often used by terrorists. the first method is a hacking. hacking is an activity braking into someone else is computer or can be said as any form of unauthorized access to computer or computer network. hacking itself can be a form threat “cyber murders”. the next method is trojan, is a program will pretend work as good and useful program but actually do the activities of spying and stealing data. computer worms, this is a kind of malware (malicious software) that can activated itself. when malware successfully enter in computer or network then worm can move to another computer in one network automatically. cryptography, the encoding of data in the text form or video (encryption) and the laying of hidden sentence on an object is used by terrorist to ensure their message is confidential [12] until now, there are several cases of cyber terrorism that occur in the world. in 2008, there was a plane crash at madrid-bajaras airport where one of spanair’s central computers was infected by trojans. the plane will send a signal when there are some technical problem and the central computer should generate an alarm. until the plane dropped because the alarm was not reached and cause 154 deaths. it is considered airlines failure to secure central computer from the dangerous code of external infection. this event makes people assume that the vital system is not always protected and affects the public's trust in the capacity and readiness of the authorities to deal with risks, vulnerabilities and crises, something that may have long-term political implications [13]. another case occurred in 2012, the new york times reported cyber-attacks by the united states and israel against iran. this cyber-attack uses computer virus stuxnet to cripple iran's nuclear program. the attack using stuxnet malware is not the first time experienced by iran. stuxnet malware 68 bulletin of social informatics theory and application issn 2614-0047 vol. 2, no. 2, december 2018, pp. 65-72 chandrika et.al (cyber terrorism in indonesia) attacks have occurred in 2009 during the installation of nuclear enrichment. stuxnet malware is capable on sabotaging the motor system of the nuclear drive. the iranian government also often gets cyber-attacks carried out by a number of foreign countries. this attack is considered a cyber-security threat and cyber terrorism against the state. in 2014 isis spread propaganda on twitter and always provide the latest information. this information is like bombing, suicide missions, and assassinations, checkpoints in the cities they control, photographs of arrests, transport and massacres of detainees. the information they shared eventually spread quickly on the internet because it was disseminated by pro-isis. although not sure whether the account is purely made by isis or not, it makes people in the world anxious. isis opened a google plus account for several months. the opening of this account is not realized by google. this account is used to disseminate isis information for pro-isis. other cases of cyber terrorism occur in estonia. in the case of estonia, cyber terrorism occurs through the widespread use of "zombie" computer botnets. hackers hack computers-including home pcs-in egypt, russia and the united states and use them in ddos strategies. government and bank sites that typically receive 1,000 visits per day fall after receiving a 2,000 increase per second. [3] especially in indonesia, bali bombing is a case of cyber terrorism that became history in indonesia. imam samudra who is one of the figures who caused the bali bombing tragedy stated that the internet facilitates him in committing the crime. commissioner general makbul padmanagara told the idec conference that indonesia could uncover cases of cyber terrorism for the first time the case was linked to the bali bombing case. in 2006, police arrested two people suspected of cyber terrorism by buying a domain www.anshar.net for propaganda radicalism [14]. in early 2016 there was a bomb explosion in thamrin area, jakarta. polri stressed that the network of terrorism "bahrun naim" is communicating using social media. the application used is telegram. the procedure for making bombs is also distributed and can be downloaded by followers. in may 2017, there was a cyber-attack in several countries including indonesia. cyber-attacks "ransomware", a software or malicious software that attacks the computer by encrypting the victim's computer data so it cannot be accessed. ransomeware is named wannacry. the victim must pay some money if the data does not want to be permanently deleted. because of wannacry, information systems of two hospitals in indonesia cannot keep patient data and hospital payments. according to sammy pangerapan, director general of informatics applications in indonesia, this attack is cyber terrorism because it threatens and cripples critical infrastructure. from the psychological side, people become worried, anxious, intimidated and scared [15]. the internet has become a part of human life, the fear will also increase. cyber terrorism that attacks infrastructure and vital objects causes huge losses. cyber terrorism can disrupt economic stability and can be used to threaten political opponents. 3. cyber terrorism according to society in indonesia to find out the understanding and opinion of indonesian society on cyber terrorism, a survey was made with 10 questions shown in table 2. the questionnaire was distributed online. after five days, data obtained answers from 128 respondents. from the 128 respondents, 41% did not know the term cyber terrorism. the misconception of the definition of cyber terrorism can also be seen in figure 2. 34% of respondents chose that cyber terrorism is a terrorist who breaches or alters databases in government and terrorists who commit identity theft. 34% of respondents have misinterpreted cyber terrorism as another cybercrime action. although the percentages show low results, it shows a lack of public knowledge of the increasingly modern terrorism. speaking of cyber terrorism as a threat to indonesia, almost all respondents, or 95% of respondents consider cyber terrorism a threat to indonesia. very surprising, in other words even though there are respondents do not know about what cyber terrorism is, respondents assume that it is a threat to indonesia. while the government's rating in educating the public about cyber terrorism, preventing, and overcoming cyber terrorism. the average score given by respondents is 2,8; 3,04; and 3,05 out of 5. this shows, the indonesian government has tried its best to handle cyber terrorism. in the education of cyber terrorism, the respondents gave an average of half the rating that issn 2614-0047 bulletin of social informatics theory and application 69 vol. 2, no. 2, december 2018, pp. 65-72 chandrika et.al (cyber terrorism in indonesia) meant that the respondents considered that the government should improve the education of cyber terrorism. table 2. questionnaire of the cyber terrorism understanding for indonesia no. question answer 1. gender men / women 2. age under 17 17 until 25 26 until 45 above 45 3. what activities are being undertaken by respondent school (elementary, primary, high) diploma (d1/d3/d4) college (s1/s2/s3) work does not work 4. respondent’s knowledge about computer average / high / basic / advance 5. does respondent know about cyber terrorism yes / no 6. exact defenition of cyber terrorism according to the respondent attacks with political motives committed on infrastructure such as airports and power stations, causing damage (2) terrorists who use computer networks as a tool to spread propaganda and member recruitment (4) terrorists who do burglary / database changes to the government (3) terrorists who commit identity theft and create false identity documents (1) 7. the respondent's opinion about cyber terrorism as a threat to indonesia yes / no 8. rating for the indonesian government in educating the public about cyber terrorism rating 1 to 5 9. rating for the indonesian government in preventing people from cyber terrorism rating 1 to 5 10 rating for indonesian government in overcoming the public about cyber terrorism rating 1 to 5 fig. 2. respondents’ opinion about cyber terrorism terms. 70 bulletin of social informatics theory and application issn 2614-0047 vol. 2, no. 2, december 2018, pp. 65-72 chandrika et.al (cyber terrorism in indonesia) 4. prevention and solution in indonesia, much prevention by the ministry of communications and information by blocking sites of radicalism. although there are still many sites that have not been blocked, at least the government has reduced sites that cause propaganda and fear. indonesia also cooperates with other countries to minimize cybercrime. the cooperation within indonesian police and afp continued with the building of tncc and cybercrime investigations satellite laboratory. tncc servers as a center for gathering analysis and exchanging information between police and afp, primarily in combating transnational crimes including cybercrime. the tncc supports the full discussion of the two countries held annually in senior official meeting (som) of the police and afp and represents the actual delivery contained in memorandum of understanding (mou) between the indonesian and australian governments in tackling transnational crime. while the function of the ccis laboratory is to monitor the activities of hackers, ccis is also used to reveal the financing of terrorism networks that have been well accommodated. then, with this satellite, the police can easily and quickly track and detect terrorist networks that usually communicate via email or short messaging service. until now there has been no specific arrangement regarding cyber terrorism in international law. in this legal vacuum situation, the asean convention on counter terrorism and international convention for the suppression of terrorist bombings can be used as a legal basis to criminalize cyber terrorism perpetrators. unfortunately, this convention did not regulate further about the elements of cyber terrorism’s criminal acts, the scope of cyber terrorism, as well as what distinguishes it from terrorism. in indonesia, legislation that is still valid and effective to be linked in order to ensnare the perpetrators of criminal acts of cyber terrorism namely the law of the republic of indonesia number 15 year 2003 on the crime of terrorism and the law of the republic of indonesia number 11 year 2008 on information and electronic transactions. uu (undang-undang or constitution) no. 11 year 2008 is a law that regulates the crime-based crime technology (cybercrime), while the criminal act of cyber terrorism is part or type of cybercrime. the criminal provisions in the information and electronic transactions (iet) act are contained in chapter xi articles 45 through 52. based on the provisions of chapter xi on the criminal provisions of the iet act, it may be identified some prohibited acts (elements of crime) that are closely related to the criminal act of cyber terrorism in each chapter. article 30 related to the crime of cyber terrorism in the form of unauthorized access to computer system and service. article 31 is related to hacking crime. in this law related to the crime of cyber terrorism in the form of cyber sabotage and extortion. article 33 concerns the crime of cyber terrorism in the form of unauthorized access to computer system and service. therefore, it appears that the perspective of the iet act is emphasizing the aspects of the use or security of electronic information systems or electronic documents, and the abuse of technology and electronic transactions conducted by cyber terrorism actors. then, indonesia also has also cooperated with other countries for cyber terrorism prevention. on march 29, 2017, president joko widodo and fancois holland on a bilateral visit indonesia – france agreed to establish corporation in the field of eradication of cyber terrorism. from what has been occurred, most targets of cyber terrorism are large organization. these organizations include government, banking, infrastructure like airport and others. there are several ways that can be used to protect country’s critical infrastructure, such as: (1) privacy, information or data from each organization must be safeguarded and not easily accessible by unauthorized users. the secret storage of communication plays an important role in security. (2) availability, information or data that plays a leading role in the organization or in government offices should be kept secretly when it should be transparent to authorized users and should not be accessed easily by unauthorized users. this is necessary to fix some limitations for legitimate users. (3) authentication, the identity of authorized users must be verified to access information or data before data is accessed. there are three ways available to verify a legitimate user identity, by using a password, token and biometric. with this verification method, it's easy to separate authorized users from unauthorized users. (4) integrity, information or data should not be changed during delivery process. information must arrive at the destination exactly as it has been sent from the source. (5) non-repudiation, the sending and receiving party of the information or data shall ensure that both are aware of the delay in the transmission and reception of data or information. issn 2614-0047 bulletin of social informatics theory and application 71 vol. 2, no. 2, december 2018, pp. 65-72 chandrika et.al (cyber terrorism in indonesia) aside from security purpose, there are some other secondary goals needed to maintain security. they are access and availability [5]. in addition, there are also several ways that individuals can do to protect themselves and minimize the impact of cyber terrorism. individuals can use strong passwords, use different passwords for each website, use a more secure operating system, secure personal networks and secure data with strong encryption. then, each individual must be must be capable in processing and sorting information. the new generation is also expected to assist in this case, by doing research that can facilitate investigation of cyber terrorism cases such as research on text classification techniques [16]. 5. conclusion the roles of technology in assisting terrorist crimes through cyberspace are to facilitate the launch long-range attacks, cost-effective, maximum in term of disguising, easy recruitment, virus spreading, no need to bother on member training, communication media between terrorists. the impact of cyber terrorism is destroying the country's infrastructure and making people worried, anxious, and fearful. one way to cope cyber terrorism is by making a legislation in order to ensnare the perpetrators of criminal acts of cyber terrorism and every individual must be capable in processing and sorting information. the government should establish an association that helps to fight cyber terrorism, for members of the association the government can utilize human resources in indonesia by selecting students in indonesia, especially those who study the program or other informatics engineering that is able to fight cyber terrorism. the government must block sites in the internet that contain elements of crime including terrorism, because in this era of globalization internet users not only come from adults but children also can use it. the role of parents is also very important in monitoring what their children are accessing and seeing, so crime via the internet can be minimized. references [1] a. kontselidze, “cyberterrorism when technology became a weapon,” eur. sci. j., vol. 11, no. 10, pp. 24–29, 2015. [2] a. jones, “cyber terrorism: fact or fiction,” comput. fraud secur., vol. 2005, no. 5, pp. 4–7, 2005. [3] s. herzog, “revisiting the estonian cyber attacks: digital threats and multinational responses,” j. strateg. secur., vol. 4, no. 2, pp. 49–60, 2011. [4] w. l. tafoya, “cyber terror,” fbi law enforc., vol. 80, no. 1, pp. 1–7, 2011. [5] m. uma and g. padmavathi, “a survey on various cyber attacks and their classification,” int. j. netw. secur., vol. 15, no. 5, pp. 390–396, 2013. [6] n. foggetti, “cyber-terrorism and the right to privacy in the third pillar perspective,” masaryk univ. j. law technol., vol. 3, no. 3, pp. 365–376, 2014. [7] j. j. prichard and l. e. macdonald, “cyber terrorism: a study of the extent of coverage in computer science textbooks,” j. inf. technol. educ., vol. 3, pp. 279–289, 2004. [8] m. dogrul, a. aslan, and e. celik, “developing an international cooperation on cyber defense and deterrence against cyber terrorism,” in cyber conflict (iccc), 2011 3rd international conference, 2011, pp. 1–15. [9] m. stohl, “cyber terrorism: a clear and present danger, the sum of all fears, breaking point or patriot games?,” crime, law soc. chang., vol. 46, no. 4, pp. 223–238, 2006. [10] g. cavaglion and e. rashty, “narratives of suffering among italian female partners of cybersex and cyberporn dependents,” sex. addict. compulsivity, vol. 17, no. 4, pp. 270–284, 2010. [11] r. nagpal, “cyber terrorism in the context of globalization,” in ii world congress on informatics and law, 2002, pp. 1–23. [12] s. m. furnell and m. j. warren, “computer hacking and cyber terrorism: the real threats in the new millennium?,” comput. secur., vol. 18, no. 1, pp. 28–34, 1999. 72 bulletin of social informatics theory and application issn 2614-0047 vol. 2, no. 2, december 2018, pp. 65-72 chandrika et.al (cyber terrorism in indonesia) [13] r. heickerö, “cyber terrorism: electronic jihad,” strateg. anal., vol. 38, no. 4, pp. 554–565, 2014. [14] j. y. hui, “studies in conflict & terrorism the internet in indonesia: development and impact of radical websites,” routledge, vol. 33, no. 2, pp. 171–191, 2010. [15] l. huddy, s. feldman, t. capelos, and c. provost, “the consequences of terrorism: disentangling the effects of personal and national threat,” polit. psychol., vol. 23, no. 3, pp. 485–509, 2002. [16] d. a. simanjuntak, h. p. ipung, and a. s. nugroho, “text classification techniques used to facilitate cyber terrorism investigation,” in advances in computing, control and telecommunication technologies (act), 2010 second international conference, 2010, pp. 198–200. bulletin of social informatics theory and application issn 2614-0047 vol. 2, no. 2, december 2018, pp. 47-57 47 https://doi.org/ 10.31763/businta.v2i2.113 technology acceptance model of student ability and tendency classification system mardian dwi jaelani 1,*, aji prasetya wibawa 2, utomo pujianto 3 department of electrical engineering, state university of malang, malang, indonesia 1 dwimardianstudent@gmail.com *; 2 aji.prasetya.ft@um.ac.id; 3 utomo.pujianto.ft@um.ac.id * corresponding author 1. introduction the teacher prepares vocational students to be able to choose the competency skills of students in facing the expertise competency test. the obstacles that are often encountered are (1) the teacher has difficulty in classifying the ability of students (2) the teacher has difficulty in recommending students to choose the skills competency test package that is in accordance with the tendency of students' abilities. the student's ability in question is desktop programming, web programming, and mobile device programming. therefore we need a mechanism or system that can help teachers in preparing vocational students to face the expertise competency test which aims to recommend students to choose the skills competency test package according to their ability tendency and to know the level of student learning outcomes as long as students learn five semester skills students based on student grades. one of them is by using a decision support system (dss). decision support system (dss) is a computer-based interactive system that is able to help decision makers in determining a choice [1]. this dss uses the learning vector quantization (lvq) algorithm to solve the problem of classifying student abilities and the tendency of students to choose the sct package. some examples of problems that use the lvq algorithm include classification to select osn participant students [2], academic value prediction [3]. so that by applying the learning vector quantization algorithm, it is hoped that it can help the process of classifying students' abilities appropriately and the system can be useful and an easy system for user use. but in reality, many implementations of failed systems are caused not by technical factors but rather by user factors [4]. the factors that influence people to use the system are extrinsic motivation and intrinsic motivation [5]. in this research, intrinsic motivation obtained from perceived ease of use, while extrinsic motivation obtained from perceived usefulness. in this study intrinsic motivation was obtained from perceived ease of use, while extrinsic motivation was obtained from perceived a r t i c l e i n f o a b s t r a c t article history received august 18, 2018 revised september 14, 2018 accepted october 1, 2018 skill and competency test (sct) is part of the government's intervention in ensuring the quality of education in the vocational high school (smk) education unit. the teacher prepares vocational students to face sct, especially vocational students of class xii. however, the obstacles often encountered by teachers in recommending students to choose competency that are in accordance with students' abilities. ability classification system and student ability trends by applying the learning vector quantization (lvq) algorithm, it can be used as a solution to assist teachers in classifying student abilities and the tendency of students' abilities to be used to select skills competencies during sct. this study aims to examine the use of the technology acceptance model (tam) implementation of the classification system. as a result, the average user has felt the usefulness and ease of use of the system. each tam variable has a significant effect. this is an open access article under the cc–by-sa license. keywords tam ability tendency student classification system http://creativecommons.org/licenses/by-sa/4.0/ http://creativecommons.org/licenses/by-sa/4.0/ 48 bulletin of social informatics theory and application issn 2614-0047 vol. 2, no. 2, december 2018, pp. 47-57 jaelani et.al (technology acceptance model of student ability and tendency classification system) usefulness. tam illustrates that the use of the system will be influenced by usefulness variables and ease of use variables [6]. this study examines the behavior of users of the classification system of students' abilities using the lvq algorithm based on the factors that influence it with the technology acceptance model (tam) approach [6]. the purpose of this study is to find out (1) the effect of perceived ease of use (peou) on perceived usefulness (pu), (2) knowing the influence of perceived ease of use (peou) and perceived usefulness (pu) on attitude toward using (atu), (3) knowing the influence of perceived usefulness (pu) and attitude toward using (atu) on behavioral intention to use (itu), and (4) knowing the effect of behavioral intention to use (itu) on actual system usage (asu). 2. method the student ability and tendency classification system (satcs) is a decision-making system using the lvq algorithm to help teachers classify students' abilities and the tendency of students to choose sct packages that match students' abilities. figure 1 shows the use case diagram. based on figure 1 can be explained, there are 2 users, namely (1) students and (2) teachers. before using satcs students must register in advance to obtain access rights. meanwhile, the admin must log in first to be able to use the system. fig. 1. use case diagram satcs. after inputting the values in each subject, the system will perform calculations using lvq. the calculation results will provide a classification of students' abilities. the range of ratings is shown in table 1. table 1. range of ratings average value interval classification 78 to <= 82 good enough > 82 to <= 88 satisfy > 88 to 100 very satisfactory issn 2614-0047 bulletin of social informatics theory and application 49 vol. 2, no. 2, december 2018, pp. 47-57 jaelani et.al (technology acceptance model of student ability and tendency classification system) figure 2 shows the results of the classification of students' abilities. the results of the classification will be processed to get the tendency of students' abilities. the results of the tendency can be used by students to choose a sct package that is in accordance with students' abilities. fig. 2. student ability classification page analysis of user behavior is done by using the tam instrument as an approach to data collection combined with a linear regression model as a data analysis approach to test the relationship between the main variables tam [4], [7]–[9]. the description of the framework for using tam can be explained in figure 3. fig. 3. tam usage framework [6] tam instrument indicators were adopted from previous studies that have been carried out [4], [6]. the type of data obtained is quantitative data. quantitative data is data in the form of questionnaires. this data is obtained from the results of questionnaires given to respondents. the questionnaire used is a closed questionnaire, namely the questionnaire that has been provided with the answer option so that the respondent just has to choose the appropriate answer by simply checking the answer columns provided. the scale used in the form of likert scale (likert scale) 4 categories namely (ss) strongly agree, (s) agree, (ts) disagree, and (sts) strongly disagree [10]. the validity test used is the product of the pearson correlation moment which uses the principle of correlating or connecting between each item score with the total score obtained in the study. [7]. reliability testing is also used to measure the level of consistency of a person's answer to the statement used. reliability test using cronbach alpha (α) statistical test [11]. validity and reliability test calculations use ibm spss statistic base 23.0. linear regression analysis is used as a tool for analyzing and interpreting data. moreover, linear regression analysis is also used to test the hypothesis [10]. this analysis aims to prove the existence or absence of a function relationship between two or more independent variables and one dependent variable. relationship of perceived ease of use (peou) to perceived usefulness (pu). hypothesis testing uses simple linear regression analysis with t test and with significance level of 0.05 and 2 sides. the first hypothesis is  𝐻𝑎 = there is a positive and significant relationship between perceived ease of use (peou) to perceived usefulness (pu) 50 bulletin of social informatics theory and application issn 2614-0047 vol. 2, no. 2, december 2018, pp. 47-57 jaelani et.al (technology acceptance model of student ability and tendency classification system)  𝐻0 = there is no positive and significant relationship between perceived ease of use (peou) to perceived usefulness (pu) relationship of perceived ease of use (peou) and perceived usefulness (pu) to attitude toward using (atu). testing the hypothesis using multiple linear regression analysis with f test with a significance level of 0.05 with df 1 (number of variables -1) and df 2 (n-k-1) (n is the amount of data and k is the number of independent variables). the second hypothesis is  𝐻𝑎 = there is a positive and significant relationship between perceived ease of use (peou) and perceived usefulness (pu) to attitude toward using (atu).  𝐻0 = there is no positive and significant relationship between perceived ease of use (peou) and perceived usefulness (pu) to attitude toward using (atu). relationship of perceived usefulness (pu) and attitude toward using (atu) to behavioral intention of use (itu). testing the hypothesis using multiple linear regression analysis with f test with a significance level of 0.05 with df 1 (number of variables -1) and df 2 (n-k-1) (n is the amount of data and k is the number of independent variables). the third hypothesis is  𝐻𝑎 = there is a positive and significant relationship between perceived usefulness (pu) and attitude toward using (atu) to behavioral intention of use (itu)  𝐻0 = there is no positive and significant relationship between perceived usefulness (pu) and attitude toward using (atu) to behavioral intention of use (itu) relationship of behavioral intention of use (itu) to actual system use (asu). hypothesis testing uses simple linear regression analysis with a t test with significance level of 0.05 and 2 sides. the fourth hypothesis is  𝐻𝑎 = there is a positive and significant relationship between behavioral intention of use (itu) to actual system use (asu).  𝐻0 = there is no positive and significant relationship between behavioral intention of use (itu) to actual system use (asu). 3. result and discussion based on questionnaire questionnaires that have been carried out the respondent characteristics that contribute to the research can be seen in table 2. table 2. demographic analysis status frequency percent valid percent cumulative percent student 58 98.3 98.3 98.3 teacher 1 1.7 1.7 100.0 total 59 100.0 100.0 reliability analysis is done using the help of ibm spss v 23. table 3 shows the results of the reliability testing of the tam instrument obtained by cronbach alpha (α) of 0.862. because the cronbach alpha score is above 0.8, the instrument can be said to be a reliable measurement instrument and the instrument is declared valid [8]–[10]. table 3. reliability test result cronbach's alpha n of items ,862 25 the tam instrument used in the perceived usefulness (pu) variable has 6 indicators, the variable perceived ease of use (peou) there are 8 indicators, attitude toward using (atu) there are 3 indicators, the behavioral intention to use (itu) variable has 4 indicators, and the actual system use (asu) variable has 4 indicators. table 4 shows the results of the tam instruments by students issn 2614-0047 bulletin of social informatics theory and application 51 vol. 2, no. 2, december 2018, pp. 47-57 jaelani et.al (technology acceptance model of student ability and tendency classification system) table 4. students’ tam instrument result no variable resp (n) n total respon average respon std. deviation 1. pu 58 6 1135 19.59 2.185 2. peou 58 8 1534 26.41 2.534 3. atu 58 3 563 9.71 1.601 4. itu 58 4 718 12.40 1.611 5. asu 58 4 685 11.81 1.670 the results of the tam instrument are then used to categorize the level of the level criteria of the tam variables. the formula used to calculate interval classes is as follows: 𝐼𝑛𝑡𝑒𝑟𝑣𝑎𝑙 𝑐𝑙𝑎𝑠𝑠 𝑙𝑒𝑛𝑔𝑡ℎ = 𝐵𝑖𝑔𝑔𝑒𝑠𝑡 𝑆𝑐𝑜𝑟𝑒 − 𝑆𝑚𝑎𝑙𝑙𝑒𝑠𝑡 𝑆𝑐𝑜𝑟𝑒 𝐴𝑚𝑜𝑢𝑛𝑡 𝑜𝑓 𝑖𝑛𝑡𝑒𝑟𝑣𝑎𝑙 𝑐𝑙𝑎𝑠𝑠𝑒𝑠 (1) after this step, then proceed with percentagen in the following formula. where p stands for percentage of frequency distribution, f stands for frequency (number of respondents to answer), and n stands for total number of respondents. 𝑃 = 𝑃 𝑁 𝑥100% (2) 3.1. result of students’ descriptive analysis based on formulas 1 and 2, the results of the calculation of pu variable criteria are shown in table 5. table 5 shows that 58 students were the subjects of the study, 33 students (56.9%) answered that the student ability classification system was very useful, 24 students (41.4%) answered that the student capability classification system was useful, 1 student (1.7 %) answered that the student ability classification system was less useful, and 0 students (0%) answered that the student ability classification system was not useful. the average respondent answers in a very useful and useful range. table 5. the frequency variable of pu criteria. no interval criteria frequency (f) persentage (%) 1. 19,5 – 24 very useful 33 56,9 % 2. 14,9 – 19,4 useful 24 41,4 % 3. 10,3 – 14,8 less usefull 1 1,7 % 4. 6 – 10,2 not useful 0 0 % total 58 100 % table 6 shows that 58 students were the subjects of the study, 29 students (50%) answered that the student ability classification system was very easy, 28 students (48.3%) answered that the student ability classification system was easy, 1 student (1.7%) answered that the student ability classification system was less easy, and 0 students (0%) answered that the student ability classification system was not easy. the average respondent answers in a very easy and easy range. table 6. the frequency variable of peou criteria no interval criteria frequency (f) persentage (%) 1. 27 – 32 very easy 29 50 % 2. 21 – 26 easy 28 48,3 % 3. 15 – 20 less easy 1 1,7 % 4. 8 – 14 not easy 0 0 % total 58 100 % 52 bulletin of social informatics theory and application issn 2614-0047 vol. 2, no. 2, december 2018, pp. 47-57 jaelani et.al (technology acceptance model of student ability and tendency classification system) table 7 shows that 58 students were the subjects of the study, 32 students (52.2%) answered that the student ability classification system was very good, 22 students (37.9%) answered that the student ability classification system was good, 2 students (3.4 %) answered that the student ability classification system was less good, and 2 students (3.4%) answered that the student ability classification system was not good. the average respondent answers in a very good and good range. table 7. the frequency variable of atu criteria no interval criteria frequency (f) percentage (%) 1. 9,75 – 12 very good 32 55,2 % 2. 7,49 – 9,74 good 22 37,9 % 3. 5,23 – 7,48 less good 2 3,4 % 4. 3 – 5,22 not good 2 3,4 % total 58 100 % table 8 shows that 58 students were the subjects of the study, 10 students (17.2%) answered that the classification ability system of students was very intent on using the system, 43 students (74.1%) answered that the system of classification of students' ability to use the system, 4 students (6.9%) answered that the student ability classification system lacked the intention to use the system, and 1 student (1.7%) answered that the students' classification ability system was not intent on using the system. the average respondent answers in a range of intentions. table 8. the frequency variable of itu criteria no interval criteria frequency (f) percentage (%) 1. 14 – 16 very intention 10 17,2 % 2. 11 – 13 intention 43 74,1 % 3. 8 – 10 lack of intention 4 6,9 % 4. 4 – 7 no intention 1 1,7 % total 58 100 % table 9 shows that 58 students were the subjects of the study, 7 students (12.1%) answered that the classification ability system of students very often used the system, 41 students (70.7%) answered that the system classification ability students often use the system, 9 students (15.5%) answered that the ability classification system of students rarely used the system, and 1 student (1.7%) answered that the system of classification of abilities students very rarely used the system. the average respondent answers in a frequent range. table 9. the frequency variable of asu criteria no interval criteria frequency (f) percentage (%) 1. 14 – 16 very often 7 12,1 % 2. 11 – 13 often 41 70,7 % 3. 8 – 10 rarely 9 15,5 % 4. 4 – 7 very rarely 1 1,7 % total 58 100 issn 2614-0047 bulletin of social informatics theory and application 53 vol. 2, no. 2, december 2018, pp. 47-57 jaelani et.al (technology acceptance model of student ability and tendency classification system) 3.2. result of teachers’ descriptive analysis table 10 shows the results of the tam instrument by the teacher. from the results of tam instruments by the teacher, the criteria for each variable will be categorized using formulas 1 and 2. based on formulas 1 and 2, the results of the calculation of pu variable criteria are shown in table 11. table 11 shows that the student capability classification system is very useful. it can be concluded that the capability classification system of students has been felt useful by the teacher's. table 10. result of tam by teacher no variabel resp (n) n total respon 1. pu 1 6 22 2. peou 1 8 32 3. atu 1 3 12 4. itu 1 4 16 5. asu 1 4 14 table 11. the frequency variable of pu criteria no interval criteria frequency (f) percentage (%) 1. 19,5 – 24 very useful 1 100 % 2. 14,9 – 19,4 useful 0 0 % 3. 10,3 – 14,8 less useful 0 0 % 4. 6 – 10,2 not useful 0 0 % total 1 100 % table 12 shows that the student ability classification system is very easy. it can be concluded that the ease of use of the student ability classification system has been felt by the teacher. table 12. the frequency variable of peou criteria no interval criteria frequency (f) percentage (%) 1. 27 – 32 very easy 1 100 % 2. 21 – 26 easy 0 0 % 3. 15 – 20 less easy 0 0 % 4. 8 – 14 not easy 0 0 % total 1 100 % table 13 shows that the student ability classification system is very good. it can be concluded that the student ability classification system is a good system. table 13. the frequency variable of atu criteria no interval criteria frequency (f) percentage (%) 1. 9,75 – 12 very good 1 100 % 2. 7,49 – 9,74 good 0 0 % 3. 5,23 – 7,48 less good 0 0 % 4. 3 – 5,22 not good 0 0 % total 1 100 % table 14 shows that users of the classification ability system students are very intent on using the system. it can be concluded that the teacher has intended to use the student ability classification system. 54 bulletin of social informatics theory and application issn 2614-0047 vol. 2, no. 2, december 2018, pp. 47-57 jaelani et.al (technology acceptance model of student ability and tendency classification system) table 14. the frequency variable of itu criteria no interval criteria frequency (f) percentage (%) 1. 14 – 16 very intention 1 100 % 2. 11 – 13 intentiom 0 0 % 3. 8 – 10 lack of intention 0 0 % 4. 4 – 7 no intention 0 0 % total 1 100 % table 15 shows that teacher as users of the classification ability system students, very often use the system. it can be concluded that the teacher has used the student ability classification system to actually use the system. table 15. the frequency variable of asu criteria no interval criteria frequency (f) persentage (%) 1. 14 – 16 very often 1 100 % 2. 11 – 13 often 0 0 % 3. 8 – 10 rarely 0 0 % 4. 4 – 7 very rarely 0 0 % total 1 100 % 3.3. result of regression analysis testing the effect of each variable according to the tam framework with regression analysis [4], [7]–[9]. the results of the regression analysis are shown in table 16. based on table 16, it can be interpreted that the pu variable can be explained by the peou variable of 95.2% while the influence of 4.8% is caused by other variables outside of this model. so that it can be interpreted that the user's perception of the ease of use of the satcs (peou) has a significant influence on the user's attitude about the usefulness of satcs (pu). to test whether there is a relationship or not between peou variables and pu, a linear regression test is used. decision making results of hypothesis testing, if t count> t table then ho is rejected and ha is accepted. the linear regression test results are shown in table 17. table 16. independent variable independent variable peou pu atu itu asu d e p e n d e n t v a r ia b le peou pu 95.2% atu 87.7% itu 88,9% asu 82.6% issn 2614-0047 bulletin of social informatics theory and application 55 vol. 2, no. 2, december 2018, pp. 47-57 jaelani et.al (technology acceptance model of student ability and tendency classification system) table 17. regression result of peou to pu variabel regression coefficient t sig constant -2.633 -3.934 .000 peou 0,841 33.349 .000 table 17 shows that t count is 33,349. while the t table is 2,003. it can be concluded that the value of t count (33,349)> t table (2,003), then ho is rejected and ha is accepted. so it was concluded that the perceived ease of use had an effect on perceived usefulness. based on the tam theory, perceived usefulness is also influenced by perceived ease of use because the easier a system is used, the system feels more useful. a sense of ease using technology / information systems will give rise to the feeling that the system has a function, and therefore creates a sense of comfort when working with technology / information systems [6], [9]. in addition, previous research has shown that if technology is easy to use, it will increase the interests of users to use technology [12]. so it can be concluded that there is a significant relationship between the ease of use of the system and the usefulness of the system. table 17 shows that the atu variable can be explained by the peou variable and pu variable by 87.7% while the effect of 12.3% is due to other variables outside of this model. so that it can be interpreted that convenience and usefulness have a significant relationship with the willingness to use the system or in other words the more the system is easy to use and has high benefits, the feeling of users to use satcs is also higher. to test there is a relationship or not between the variables peou and pu with atu used multiple linear regression test. results of hypothesis testing, if f count> f table then ho is rejected and ha is accepted. the linear regression test results are shown in table 18. table 18 shows that f count is 196,309. while the f table is 3.165. so that it can be concluded that the value of f count> f table (196,309> 3,165), then ho is rejected and ha is accepted. so it was concluded that perceived ease of use and perceived usefulness together had an effect on attitude toward using (atu). the attitude was strong enough in traditional tam with the support of the influence of ease of use and usefulness [13]. so it can be concluded that there is a significant relationship between ease and usefulness of the system with the willingness or attitude of the user to use the system. table 18. regression result of peou and pu to atu model sum of squares df mean square f sig regression 128.076 2 64.038 196.309 . 000𝑏 residual 17.941 55 .326 total 146.017 57 table 16 shows that the itu variable can be explained by the pu variable and the atu variable at 88.9% while the effect of 11.1% is due to other variables outside of this model. so that it can be interpreted that the user's perception of the usefulness of use (pu) and willingness to use (atu) have a significant influence on the attitude of users about the interest in using satcs (itu) or in other words the higher the system benefits that will increase user interest using satcs. to test whether there is a relationship or not between pu variables and atu with itu, multiple linear regression tests are used. decision making results of hypothesis testing, if f count> f table then ho is rejected and ha is accepted. the linear regression test results are shown in table 19. table 19. regression result of pu and atu to itu model sum of squares df mean square f sig regression 131.454 2 65.727 220.093 . 000𝑏 residual 16.425 55 .299 total 147.879 57 56 bulletin of social informatics theory and application issn 2614-0047 vol. 2, no. 2, december 2018, pp. 47-57 jaelani et.al (technology acceptance model of student ability and tendency classification system) table 19 shows that f count is 220,093. while the f table is 3.165. so it can be concluded that the value of f count> f table (220,093> 3,165), then ho is rejected and ha is accepted. so it was concluded that perceived usefulness (pu) and attitude toward using (atu) together had an effect on behavioral intention to use (itu). based on literature research, there is evidence that there is a relationship between attitudes and intentions in various contexts [14]. behavioral intentions to use the system strongly related to use and behavioral intention were the main factors of user behavior while other factors influenced user behavior indirectly with behavioral intentions or attitudes [15], [16]. so it is clear that there is a relationship between usefulness or usability and willingness or attitude to use the system with the intention of the user to use the system. in other words there is a significant relationship between pu and atu with itu. table 16 shows that the asu variable can be explained by itu variables at 82.6% while the influence of 17.4% is caused by other variables outside of this model. so that it can be interpreted that the higher the interest of someone using the system will increase the actuality of system usage in their work. to test whether or not there is a relationship between itu variables and asu, a linear regression test is used. decision making results of hypothesis testing, if t count> t table then ho is rejected and ha is accepted. the linear regression test results are shown in table 20. table 20. regression result of itu to asu variabel regression coefficient t sig constant 0,128 .177 .860 itu 0,942 16.331 .000 table 20 shows that t count is 16,331. while the t table is 2,003. it can be concluded that the value of t count (16,331)> t table (2,003), then ho is rejected and ha is accepted. so it was concluded that behavioral intention to use (itu) has an effect on actual system use (asu) of actual behavior. in rational behavior theory, a person's behavioral intention will determine the actual performance of the actual behavior [17], [18]. so it can be concluded that the intention of the user to use the system has an effect on actual user behavior. in other words there is a significant relationship between itu and asu. 4. conclusion based on the results and discussion, it can be concluded that the lvq algorithm can be used to provide direction to classify the ability of students and choose a sct package that matches the students' abilities for students even though it is not required to be implemented. based on the results of the spread of the tam instrument as an evaluation that focuses on the behavior of system users, the average respondent answers enough on each variable. so that it can be concluded on average users have felt the usefulness and ease of use of the system. the tam variables also have a significant effect. so that each variable will influence the behavior of users of the system. references [1] firdausa, a. p. wibawa, and u. pujianto, “model sistem pendukung keputusan pemilihan sekolah menggunakan metode saw,” semnasteknomedia online, vol. 4, no. 1, pp. 3-3–1, 2016. [2] w. h. pujianto, m. hariadi, and s. sumpeno, “klasifikasi berbasis lvq menggunakan optimasi learning rate untuk memilih siswa peserta osn,” pros. semin. nas. manaj. teknol. xvii, pp. 1–7, 2013. [3] hartatik, “data manajemen dan teknologi informasi (dasi),” j. ilm. dasi, vol. 16, no. 3, pp. 53–58, 2015. [4] y. iriani, a. mariana, s. lestari, and murnawan, “analisis penerimaan sistem informasi berbasis web dengan menggunakan technology acceptance model,” simp. nas. rapi xii, pp. 60–66, 2013. [5] r. k. chellappa and p. a. pavlou, “perceived information security, financial liability and consumer trust in electronic commerce transactions,” logist. inf. manag., vol. 15, no. 5/6, pp. 358–368, 2002. issn 2614-0047 bulletin of social informatics theory and application 57 vol. 2, no. 2, december 2018, pp. 47-57 jaelani et.al (technology acceptance model of student ability and tendency classification system) [6] f. d. davis, “perceived usefulness, perceived ease of use, and user acceptance of information technology,” mis q., vol. 13, no. 3, pp. 319–340, sep. 1989. [7] f. fatmasari and m. ariandi, “penerapan metode technology acceptance model (tam) terhadap penerimaan krs online (studi kasus : mahasiswa ilmu komputer universitas bina darma palembang),” j. matrik, vol. 16, no. 2, 2014. [8] z. y. liu, “an analysis of technology acceptance modelexploring user acceptance and intension of taxi-hailing app in shanghai,” an anal. technol. accept. model, pp. 1–14, 2014. [9] v. wilson and u. mbamba, “acceptance of mobile phone payments systems in tanzania : technology acceptance model approach,” bus. manag. rev., vol. 2253, pp. 15–25, 2017. [10] j. munusamy, e. c. de run, s. chelliah, and s. annamalah, “journal of internet banking and commerce,” j. internet bank. commer., vol. 17, no. 3, pp. 1–14, 2012. [11] w. r. king and j. he, “a meta-analysis of the technology acceptance model,” inf. manag., vol. 43, no. 6, pp. 740–755, 2006. [12] c. s. ong, j. y. lai, and y. s. wang, “factors affecting engineers’ acceptance of asynchronous e-learning systems in high-tech companies,” inf. manag., vol. 41, no. 6, pp. 795–804, 2004. [13] a. l. lederer, d. j. maupin, m. p. sena, and y. zhuang, “the role of ease of use, usefulness and attitude in the prediction of world wide web usage,” in proceedings of the 1998 acm sigcpr conference on computer personnel research, 1998, pp. 195–204. [14] h. f. lin, “predicting consumer intentions to shop online: an empirical test of competing theories,” electron. commer. res. appl., vol. 6, no. 4, pp. 433–442, 2007. [15] f. d. davis, r. p. bagozzi, and p. r. warshaw, “user acceptance of computer technology: a comparison of two theoretical models,” manage. sci., vol. 35, no. 8, pp. 982–1003, 1989. [16] y. h. lee, y. c. hsieh, and c. n. hsu, “adding innovation diffusion theory to the technology acceptance model: supporting employees’ intentions to use e-learning systems,” j. educ. technol. soc., vol. 14, no. 4, 2011. [17] m. fishbein and i. ajzen, “belief, attitude, intention, and behavior: an introduction to theory and research,” philos. rhetor., vol. 10, no. 2, pp. 130–132, 1977. [18] r. greene, human behavior theory and social work practice, 2nd editio. new york: routledge, 2017. bulletin of social informatics theory and application issn 2614-0047 vol. 7, no. 1, march 2023, pp. 63-73 63 https:doi.org/10.31763/businta.v7i1.203 a decade evolution of virtual and remote laboratories nurul fajriah andini a,1, popy maulida dewi a,2,*, tyas agung cahyaning marida a,3, aji prasetya wibawa a,4, andrew nafalski b,5 a universitas negeri malang, malang, indonesia b unisa education futures, school of engineering, university of south australiasct2-39 mawson lakes campus, adelaide, south australia 5095, australia 1 dinifajriah10@gmail.com; 2 popimaulida12@gmail.com ; 3 yani.cahyaning29@gmail.com; 4 aji.prasetya.ft@um.ac.id; 5 andrew.nafalski@unisa.edu.au * corresponding author 1. introduction experiments are essential in school courses and demonstrate a series of scientific procedures to discover a particular goal. school researchers, teachers, or students perform their experiments in a laboratory (lab). teachers use the lab for teaching as well as storing their scientific equipment. however, some schools have problems with setting up a laboratory. the laboratory requires an extensive and safe area, along with a great maintenance budget and also inflexible operational time. thus, technological solutions are needed to encounter these crucial problems. one available solution for those problems is using virtual and remote laboratories. a virtual laboratory virtualizes a real lab using 3d images and interactive videos. students may freely perform the research simulation without being afraid of damaging any equipment in the lab. on the other hand, a remote laboratory permits students to conduct experiments and other laboratory tasks through the internet even though they are not in the same location as the real apparatus. additionally, they can perform an actual experiment without concern about time and place constraints. lastly, this solution may transform monotonous learning into more fun and enjoyable learning. this paper examines the most recent expansion of virtual and remote laboratories. we conduct a review of 36 online articles pertaining to virtual and remote laboratories. the review is divided into four sections. the first and second sections discuss the recent evolution of virtual and remote laboratories separately. meanwhile, the third discusses the dangers associated with implementing both technologies as well as their future development. 2. method 2.1. virtual laboratory in a decade the virtual laboratory (fig. 1) represents the use of computer technology to efficiently and interactively simulate experiments in a laboratory. the first version of this technology was reported a r t i c l e i n f o a b s t r a c t article history received january 3, 2023 revised february 18, 2023 accepted february 24, 2023 the conventional-experimental laboratory presents problems with time, expenses, risks, distances, and space. thus, the potential solution to such problems is a virtual and remote laboratory that uses web or mobile applications and internet networks for virtual learning. this paper discusses the recent evolution of virtual and remote laboratories in the last decade. an in-depth literature review is performed to discover any facts about vr laboratory development. the results of this review may lead to the future evolution of remote and virtual laboratories. this is an open access article under the cc–by-sa license. keywords virtual laboratory remote laboratory evolution mailto:popimaulida12@gmail.com http://creativecommons.org/licenses/by-sa/4.0/ http://creativecommons.org/licenses/by-sa/4.0/ 64 bulletin of social informatics theory and application issn 2614-0047 vol. 7, no. 1, march 2023, pp. 63-73 nurul fajriah andini et.al (a decade evolution of virtual and remote laboratories) in 1977 in the form of a virtual laboratory for psychology. it continues growing over time, along with the development of other technology and human needs. in 2010, a virtual laboratory was implemented in chemical education with collaborative scripts to promote conceptual knowledge. that laboratory facilitates students to attract and release substances and tools for specific problems, as well as completing actions such as mixing and weighing. the virtual laboratory also includes meters and feedback indicators about the characteristics of substances [1]. fig. 1. a screenshot of the computerized cochemex script displaying the test menu in addition, in 2010, virtual laboratories presented essential roles in engineering education. during this year, a new virtual laboratory method was developed for plc (programmable logic controller). this virtual laboratory is used to design and implement parts of the mechatronic design with various multiprog languages. meanwhile, the students are required to monitor processes in this instance, understand the concept of plc automation and understand virtual laboratory processes (fig. 2) [2]. in the same year, a virtual epidemic was used to enhance knowledge of infectious diseases, their social implications, and the investigation process. in this virtual epidemic, users can use their own experiences and community observations to learn the process of infection and immunity, social behavior interactions, as well as reactions to perceived health risks. the real-world investigations are difficult to replicate due to ethical considerations. besides, different learning laboratories can engage students in testing various epidemic simulation parameters, identifying and developing vaccines, analyzing archived records of past epidemics, and discussing ethical issues [3]. issn 2614-0047 bulletin of social informatics theory and application 65 vol. 7, no. 1, march 2023, pp. 63-73 nurul fajriah andini et.al (a decade evolution of virtual and remote laboratories) fig. 2. component diagram depicting interfaces of sahara release 2. consists of scheduling server, web interface client, and rigclient. in 2011, the tele-lab project was built to address the lack of knowledge about cybersecurity. telelab is a virtual web-based laboratory that can be accessed via http://www.tele-lab.org/. the rising usage of the internet this year also captivates the attention related to cybersecurity. a previous study reported that some teaching techniques are not suitable for security training because of the inadequate environment [4]. in the same year, virtual laboratories were built to facilitate science education. virtual laboratories were constructed due to the lack of laboratory equipment, limited time to conduct experiments, high material costs, and attempt to minimize the possible risks from scientific experiments [5]. in 2012, virtual and remote laboratories were developed to overcome problems related to the high cost of equipment in experimental laboratories. for the undergraduate teaching laboratories in the field of optics and microwaves (fig. 3), the university of limoges has established a virtual electromagnetic and optical laboratory (lab-en-vi) [6]. fig. 3. architecture of the remote virtual lab for microwaves in the same year, an interoperability platform was developed to incorporate virtual and remote access laboratories, increase the versatility of educational resources and adapt to new learning methodologies [7]. also, in 2012 remote and virtual laboratories were web-based platforms that allowed users to conduct a series of remote and virtual experiments in various fields, such as in education or training in real laboratories using shared data networks [8]. in 2013, for a course with more than one hundred students, a web panel and labview interface were used to solve problems in virtual experimental settings and the use of remote laboratories. meanwhile, university policy allocates a disproportionate amount of funds to instructional laboratories [9]. 66 bulletin of social informatics theory and application issn 2614-0047 vol. 7, no. 1, march 2023, pp. 63-73 nurul fajriah andini et.al (a decade evolution of virtual and remote laboratories) in 2014, a virtual laboratory can also be applied in other fields, such as vlab.co.in a website that can be adopted in the biotechnology field (fig. 4), which is equipped with animation. the implementation of a virtual laboratory in the field of biotechnology has also been reported in a previous study [10]. in 2015, a project-based virtual laboratory (pblvl) was developed to increase the knowledge of students, researchers, and members of society working together in various fields and disciplines, especially in heat transfer material. the project is expected to increase students' understanding of entry-level techniques from multiple aspects of heat transfer engineering topics [11]. also, in 2015 a study investigated a virtual laboratory by giving students remote access to various laboratories in the domain of technical education. further, the application of cloud computing models in building a virtual laboratory aims to overcome various problems observed in physical laboratories [12]. fig. 4. logical diagram of virtual labs in 2016, virtual and remote laboratories became a platform for enhancing user engagement in blended learning scenarios to accelerate university education in india’s rural areas [13]. also, in 2016 a virtual lab developed with netlab was used to determine the equivalent transformer circuit with ltspice software [14]. in the same year, a simulation was conducted to reduce the annually increasing greenhouse gases by implementing virtual and remote laboratories. this simulation confirmed that cost transfer techniques help increase the percentage of renewable energy utilization [15]. in 2017, the virtual lab was developed in the nuclear physics field and applied using the montecarlo (memcm) method (fig. 5) [16]. fig. 5. homepage of the nuclear power plant laboratory support system for distinctive experimental apparatus issn 2614-0047 bulletin of social informatics theory and application 67 vol. 7, no. 1, march 2023, pp. 63-73 nurul fajriah andini et.al (a decade evolution of virtual and remote laboratories) additionally, in 2017 a web-based virtual and remote laboratory was developed as a learning media for line follower robots learning. it was created using learning management system (lms) with moodle support connected to the internet. in addition to using the learning management system (lms), virtual and remote laboratories can also be implemented using netlab in the lecturing process (for lecturers) and completing assignments (for students). netlab is used for experiments with electronic instruments and actual electrical circuits [17]. in 2018, a virtual lab was implemented with physics education technology (phet) in the learning of waves and sounds, while the lab can be accessed on the phet.colorado.edu website page [18]. in the same year, a mobile-based virtual laboratory for experimentation was also developed (vlapp) using unity3d and 3ds-max software, along with android for its installation [19]. in 2019, (fig. 6) multimedia learning in virtual laboratories was supported by pedagogical agents that not only assist but also foster more effective multimedia learning due to motivational factors and its ability to direct student attention toward a more goal-oriented learning process. additionally, the pedagogical agent also enhances communication between students in the subsequent iteration by, for example, distributing questions, answers, or assistance in study groups [20]. fig. 6. left: the orange frame emphasizes the task containing the input field. the student is asked to evaluate her or his self-confidence using the provided response. right: presentation of the pedagogical agent and control bar for navigation (left/right arrow), information (i-symbol), tip (tipp), and cross-symbol to remove the pedagogical agent. 2.2. ten years of remote laboratory evolution remote laboratories (fig. 7) are a computer-based learning environment that enables students from all over the globe to conduct remote experiments using actual laboratory equipment via the internet. different from virtual laboratories, remote laboratories facilitate real experiments in the form of distance learning. this technology has rapidly grown following the progression of the world's digitalization era. in 2010, different focuses, philosophies, approvals, and domains were reported in vastly distinct technical solutions for remote laboratory support. aside from demonstrating significant strength in resolving a variety of problems and applications, this diversity does support the division of laboratories among various institutions. investment in interoperability between two remote laboratory platforms has met the requirement for a common application protocol, so the remote lab can provide the desired services [21]. in the same year, a remote laboratory for electronic teaching was developed named remoteeleclab. remoteeleclab combines learning management system (lms) and moodle (elearning platform) to facilitate students' interaction daily, aiding them to complete their practical work at home [22]. in 2011, a non-holonomic cellular robot experiment was conducted with a mobile robot to establish a leader-follower using image processing implemented with matlab and easy java simulation [23]. 68 bulletin of social informatics theory and application issn 2614-0047 vol. 7, no. 1, march 2023, pp. 63-73 nurul fajriah andini et.al (a decade evolution of virtual and remote laboratories) fig. 7. architecture of the remote lab. further, in 2011, remote laboratories also brought an important role in engineering education. labshare, developed by australia, is one of the examples of a remote laboratory project. labshare can be accessed at http://www.labshare.edu.au. another remote laboratory, named remote laboratory, is equipped with a glossary and toolkit that help the faculty member to understand the terminology of remote laboratories [24]. in 2012, remote laboratories were applied for data acquisition using labview and ni hardware, one of the integrated development environments widely used for digital signal processing and instrumentation development [25]. in 2013, a virtual and remote laboratory was developed by applying the e-learning methodology in the field of robotics education using ejs, matlab, and labview (fig. 8)[26]. fig. 8. laboratory architecture within the same year, a control technique learning laboratory (fig. 9) was developed using a distributed remote laboratory with a deltav server and teamviewer as a remote control. teamviewer was used to operate an installation integrated with deltav from a remote system [27]. in 2014, labview was used to create a remote laboratory for teaching motion control experiments and control system experiments to engineer mechatronics students with various feedback devices [28]. issn 2614-0047 bulletin of social informatics theory and application 69 vol. 7, no. 1, march 2023, pp. 63-73 nurul fajriah andini et.al (a decade evolution of virtual and remote laboratories) fig. 9. architecture of the remote motion control laboratory in 2014, the remote laboratory was adopted to overcome existing problems using virtual instrumentation in academic institutions. besides, it also improved the lectures in the classroom, specifically in completing the learning process, sharing research equipment, and supporting student independent learning activities [29]. in 2015, in a computer-based learning environment, the remote laboratory (rl) was developed. it enabled students to remotely access and conduct experiments using actual laboratory apparatus via the internet from any location. besides, facial expression recognition (fer) was used to create intelligent systems guiding students and aiding them in enhancing instruction and learning (fig. 10). this fer may include monitoring tools to generate automatic learning assistance after analyzing their faces and other human features for detecting and measuring frustration, interest, and boredom. in the end, fer assists instructors in their teaching roles, as well as students in overcoming their difficulties during their practical work [30]. fig. 10. learner expression detection interface on the left. face model recognition javascript on the right. 70 bulletin of social informatics theory and application issn 2614-0047 vol. 7, no. 1, march 2023, pp. 63-73 nurul fajriah andini et.al (a decade evolution of virtual and remote laboratories) in 2016, a new field of research emerged, namely learning analytics (la). it is an amalgamation of education and computational research methodology in the field of technical education [31]. in the same year, in south india, comparative analyzes of remote learning components were controlled remotely in real time through virtual biotechnology laboratory workshops to improve teaching and learning strategies in the region [32]. fig. 11. a. animation of light microscope experiment, b. simulation of light microscope experiment, c. remotely controlled light microscope experiment (freely available via http:// vlab.amrita.edu/). in 2017, netlab was used for experiments with electronic instruments and actual electrical circuits (fig. 12) [33]. fig. 12. structure of netlab. in 2018, a website (using html or javascript provided by the nodejs server hosted on raspberry) was developed for practical electronic work based on embedded systems (raspberry and arduino) with intelligent education systems (fig. 13) [34]. fig. 13. general architecture. issn 2614-0047 bulletin of social informatics theory and application 71 vol. 7, no. 1, march 2023, pp. 63-73 nurul fajriah andini et.al (a decade evolution of virtual and remote laboratories) also, in 2018 e-learning education for mechatronics remote laboratory (edumec) provided courses to introduce diverse good practices related to national and international qualifications of mechatronics vocational training [35]. in 2019, remote laboratories were proposed in two types of architecture. first, a remote laboratory architecture based on arduino and a reliable pc server for data storage, speed, and processing capacity was developed to test the optimization of irrigation using a solar pump. meanwhile, the second remote laboratory architecture was used to control the digital electronic experience based on the use of an embedded system pcduino used an operating system [36]. 3. results and discussion during the evolution of virtual and remote laboratories, various positive and negative impacts have emerged. a number of its positive impact happens as a consequence of the evolution of virtual and remote laboratories. first, students can understand an experiment because of the unlimited replication of experiments. second, students can still experiment remotely. besides, experimenting with virtual and remote laboratories is more economical because they do not need lab tools and materials. also, the effectiveness of learning increases because students can linger in the lab and do repeated experiments. it also provides higher security and safety because students do not interact directly with authentic tools and chemicals. meanwhile, the negative impacts include the absence of real authentic field experience and the lack of actual experience. therefore, students may confuse about assembling tools and operating them in a real library setting. in the end, we concluded that the forthcoming of this technology is promising. the subsequent development can be carried out in the dentistry field, which is still experiencing difficulties, especially in dental practices. we propose the idea of a virtual laboratory to design a virtual dental design to help students save time and money because they do not need to carry the activity manually. they can design through the virtual laboratory, then print and use it immediately. 4. conclusion to conclude, the development of remote and virtual laboratories is occurring in numerous fields. the virtual laboratory represents the use of computer technology to efficiently and interactively simulate experiments in a lab. meanwhile, remote laboratories are a computer-based learning environment accessible for students from all over the world. the progression of the virtual laboratory is mainly observed in the field of education. the development of these laboratories was also identified in the engineering and technology fields. many virtual laboratories are developed based on websites, so they are accessible through the internet, enabling their usage from anywhere and anytime. meanwhile, the development of remote laboratories mostly also centralizes the field of education. most of the remote laboratory development is based on websites and applications. virtual and remote laboratories have positive effects, specifically in facilitating users to complete a project. however, we also observed some negative effects from the creation of remote and virtual laboratories, such as there being no experience in using physical laboratories. thus, future remote and virtual laboratories can be developed in various other fields. references [1] d. tsovaltzi et al., “extending a virtual chemistry laboratory with a collaboration script to promote conceptual learning,” int. j. technol. enhanc. learn., vol. 2, no. 1–2, pp. 91–110, 2010, doi: 10.1504/ijtel.2010.031262. [2] w. j. shyr, “enhancement of plc programming learning based on a virtual laboratory,” world trans. eng. technol. educ., vol. 8, no. 2, pp. 196–202, 2010. available at: wiete.com.au [3] y. kafai and n. fefferman, “virtual epidemics as learning laboratories in virtual worlds,” virtual world res., vol. 3, no. 2, pp. 3–15, 2010, doi: 10.4101/jvwr.v3i2.1888 https://doi.org/10.1504/ijtel.2010.031262 http://www.wiete.com.au/journals/wte&te/pages/vol.8,%20no.2%20(2010)/11-05-shyr.pdf https://doi.org/10.4101/jvwr.v3i2.1888 72 bulletin of social informatics theory and application issn 2614-0047 vol. 7, no. 1, march 2023, pp. 63-73 nurul fajriah andini et.al (a decade evolution of virtual and remote laboratories) [4] c. willems, t. klingbeil, l. radvilavicius, a. cenys, and c. meinel, “a distributed virtual laboratory architecture for cybersecurity training,” 2011 int. conf. internet technol. secur. trans. icitst 2011, vol. 2011, no. icitst, pp. 408–415, 2011. available at: https://ieeexplore.ieee.org/document/6148474 [5] h. mohammad babateen, “the role of virtual laboratories in science education assistant professor in curriculum and teaching methods of science,” vol. 12, pp. 100–104, 2011. available at: semanticschoolar. [6] f. said, b. abdelhalim, n. guillaume, and b. denis, “design of a flexible hardware interface for multiple remote electronic practical experiments of virtual laboratory,” int. j. online eng., vol. 8, no. s2, pp. 7–12, 2012, doi: 10.3991/ijoe.v8is2.2004. [7] j. fernandez et al., “interoperability platform for virtual and remote laboratories,” 2012 9th int. conf. remote eng. virtual instrumentation, rev 2012, 2012, doi: 10.1109/rev.2012.6293163. [8] a. cardoso, m. vieira, and p. gil, “a remote and virtual lab with experiments for secondary education, engineering and lifelong learning courses,” int. j. online eng., vol. 8, no. s2, 2012, doi: 10.3991/ijoe.v8is2.1984. [9] j. pinto, s. costa, and j. g, virtual and remote laboratories for industrial automation e-learning, vol. 10. ifac, 2013. doi: 10.3182/20130828-3-uk-2039.00063. [10] r. radhamani, h. sasidharakurup, g. sujatha, b. nair, k. achuthan, and s. diwakar, “virtual labs improve student’s performance in a classroom,” lect. notes inst. comput. sci. soc. telecommun. eng. lnicst, vol. 138, pp. 138–146, 2014, doi: 10.1007/978-3-319-13293-8. [11] h. el-sadi, “project based learning – virtual lab : heat transfer,” int. j. eng. technol., vol. 5, no. 5, pp. 290–296, 2015. available at: semanticschoolar, [12] m. maaz and t. pandey, “design of virtual labs : a step towards remote experimentation mohammad maaz tushar pandey,” vol. 5, no. 6, pp. 5–11, 2015. available at: ijera.com. [13] s. diwakar et al., “complementing education via virtual labs: implementation and deployment of remote laboratories and usage analysis in south indian villages,” int. j. online eng., vol. 12, no. 3, pp. 8–15, 2016, doi: 10.3991/ijoe.v12i03.5391. [14] j. baraniak, k. pachowicz, a. nafalski, h. considine, and z. nedic, “determination of parameters of an equivalent circuit of a single-phase transformer using a remote laboratory,” world trans. eng. technol. educ., vol. 14, no. 4, pp. 445–450, 2016. available at: wiete.com.au. [15] m. breen, a. o’donovan, m. d. murphy, f. delaney, m. hill, and p. d. o. sullivan, “a virtual laboratory for the simulation of sustainable energy systems in a low energy building: a case study,” iop conf. ser. earth environ. sci., vol. 32, no. 1, 2016, doi: 10.1088/1755-1315/32/1/012061. [16] i. saldikov, v. afanasyev, v. petrov, and m. ternovykh, “open web system of virtual labs for nuclear and applied physics,” j. phys. conf. ser., pp. 1–7, 2017, doi: 10.1088/1742-6596/755/1/011001. [17] suwasono, d. prihanto, i. d. wahyono, and a. nafalski, “virtual laboratory for line follower robot competition,” int. j. electr. comput. eng., vol. 7, no. 4, pp. 2253–2260, 2017, doi: 10.11591/ijece.v7i3.pp2253-2260. [18] s. s. maulidah and e. c. prima, “using physics education technology as virtual laboratory in learning waves and sounds,” j. sci. learn., vol. 1, no. 3, p. 116, 2018, doi: 10.17509/jsl.v1i3.11797. [19] w. zheng, j. shi, j. qiao, t. xu, l. feng, and p. fu, “virtual laboratory application development for mobile terminal,” int. j. online eng., vol. 14, no. 2, pp. 76–89, 2018, doi: 10.3991/ijoe.v14i02.7779. [20] t. roth, j. appel, a. schwingel, and m. rumpler, “learning in virtual physics laboratories assisted by a pedagogical agent,” j. phys. conf. ser., vol. 1223, no. 1, 2019, doi: 10.1088/17426596/1223/1/012001. [21] h. yeung, d. lowe, and s. murray, “interoperability of remote laboratories systems,” int. j. online eng., vol. 6, no. si1, pp. 71–80, 2010, doi: 10.3991/ijoe.v6s1.1387. [22] n. sousa, g. r. alves, and m. g. gericota, “an integrated reusable remote laboratory to complement electronics teaching,” ieee trans. learn. technol., vol. 3, no. 3, pp. 265–271, 2010, doi: 10.1109/tlt.2009.51. https://ieeexplore.ieee.org/document/6148474 https://www.semanticscholar.org/paper/the-role-of-virtual-laboratories-in-science-babateen/a98d73d731659b5e9053f10b3213daeb85f630eb https://doi.org/10.3991/ijoe.v8is2.2004 https://doi.org/10.1109/rev.2012.6293163 https://doi.org/10.3991/ijoe.v8is2.1984 https://doi.org/10.3182/20130828-3-uk-2039.00063 https://doi.org/10.1007/978-3-319-13293-8 https://www.semanticscholar.org/paper/project-based-learning-virtual-lab%3a-heat-transfer-el-sadi/be92484a1a0c93fca118d5901c44f44aea2deb95 https://www.ijera.com/papers/vol5_issue6/part%20-%205/b56050511.pdf https://doi.org/10.3991/ijoe.v12i03.5391 http://www.wiete.com.au/journals/wte&te/pages/vol.14,%20no.4%20(2016)/01-nafalski-a.pdf https://doi.org/10.1088/1755-1315/32/1/012061 https://doi.org/10.1088/1742-6596/755/1/011001 https://doi.org/10.11591/ijece.v7i4.pp2253-2260 https://doi.org/10.17509/jsl.v1i3.11797 https://doi.org/10.3991/ijoe.v14i02.7779 https://doi.org/10.1088/1742-6596/1223/1/012001 https://doi.org/10.1088/1742-6596/1223/1/012001 https://doi.org/10.3991/ijoe.v6s1.1387 https://doi.org/10.1109/tlt.2009.51 issn 2614-0047 bulletin of social informatics theory and application 73 vol. 7, no. 1, march 2023, pp. 63-73 nurul fajriah andini et.al (a decade evolution of virtual and remote laboratories) [23] d. v. neamţu, e. fabregas, b. wyns, r. de keyser, s. dormido, and c. m. ionescu, “a remote laboratory for mobile robot applications,” ifac proc. vol., vol. 44, no. 1 part 1, pp. 7280–7285, 2011, doi: 10.3182/20110828-6-it-1002.00649. [24] e. d. lindsay, s. murray, and b. d. stumpers, “a toolkit for remote laboratory design and development,” int. j. online eng., vol. 8, no. 1, pp. 14–19, 2012, doi: 10.3991/ijoe.v8i1.1874. [25] p. tripathi, m. jidhu mohan, and k. gangadharan, “design and implementation of web based remote laboratory for engineering education,” int. j. eng. technol., vol. 2, no. 2, 2012. doi: 10.1016/j.ifacol.2016.11.133. [26] d. chaos, j. chacón, j. a. lopez-orozco, and s. dormido, “virtual and remote robotic laboratory using ejs, matlab and labview,” sensors (switzerland), vol. 13, no. 2, pp. 2595–2612, 2013, doi: 10.3390/s130202595. [27] m. popescu and n. paraschiv, remote laboratory for learning in control engineering, vol. 10. ifac, 2013. doi: 10.3182/20130828-3-uk-2039.00072. [28] s. d. gadzhanov, a. nafalski, and z. nedic, “remote laboratory for advanced motion control experiments,” int. j. interact. mob. technol., vol. 10, no. 5, pp. 43–51, 2014, doi: 10.3991/ijoe. v10i5.3835. [29] m. prasannakumar and n. sridevi, “design implementation of remote laboratory using virtual,” pp. 35–38, 2014. [30] j. khalfallah and j. b. h. slama, “facial expression recognition for intelligent tutoring systems in remote laboratories platform,” procedia comput. sci., vol. 73, no. awict, pp. 274–281, 2015, doi: 10.1016/j.procs.2015.12.030. [31] h. considine, m. teng, a. nafalski, and z. nedic, “recent developments in remote laboratory netlab,” glob. j. eng. educ., vol. 18, no. 1, pp. 16–21, 2016. available at: wiete.com.au. [32] s. diwakar et al., “assessing students and teachers experience on simulation and remote biotechnology virtual labs: a case study with a light microscopy experiment,” lect. notes inst. comput. sci. soc. telecommun. eng. lnicst, vol. 160, pp. 44–51, 2016, doi: 10.1007/978-3-31928883-3. [33] s. gadzhanov, a. nafalski, and a. wibawa, “remote and proximal delivery of the laboratory component of electrical and energy systems course,” jps (jurnal pendidik. sains), vol. 5, no. 1, pp. 6–10, 2017, doi: 10.17977/jps.v5i1.8218. [34] a. abouhilal, a. moulay, n. taifi, and a. malaoui, “smart educational system : web-based low-cost remote laboratory for electronic practical work,” int. j. eng. technol., vol. 7, pp. 34–39, 2018. doi: 10.14419/ijet.v7i4.32.23241. [35] a. ak, v. topuz, a. altikardeş, and b. oral, “development of a remote laboratory infrastructure and lms for mechatronics distance education,” eurasia j. math. sci. technol. educ., vol. 14, no. 6, pp. 2493–2508, 2018, doi: 10.29333/ejmste/89947. [36] a. abouhilal, a. moulay taj, n. taifi, and a. malaoui, “using online remote laboratory in agriculture engineering and electronic training,” int. j. online biomed. eng., vol. 15, no. 06, p. 66, 2019, doi: 10.3991/ijoe.v15i06.9699. https://doi.org/10.3182/20110828-6-it-1002.00649 https://doi.org/10.3991/ijoe.v8i1.1874 https://doi.org/10.1016/j.ifacol.2016.11.133 https://doi.org/10.3390/s130202595 https://doi.org/10.3182/20130828-3-uk-2039.00072 https://doi.org/10.3991/ijoe.v10i5.3835 https://doi.org/10.3991/ijoe.v10i5.3835 https://doi.org/10.1016/j.procs.2015.12.030 http://www.wiete.com.au/journals/gjee/publish/vol18no1/02-nafalski-a.pdf https://doi.org/10.1007/978-3-319-28883-3 https://doi.org/10.1007/978-3-319-28883-3 http://dx.doi.org/10.17977/jps.v5i1.8218 https://doi.org/10.14419/ijet.v7i4.32.23241 https://doi.org/10.29333/ejmste/89947 https://doi.org/10.3991/ijoe.v15i06.9699 bulletin of social informatics theory and application issn 2614-0047 vol. 3, no. 2, december 2019, pp. 45-55 45 https:doi.org/10.31763/ businta.v3i2.213 a novel framework of e-participation for smart cities muhammad yusuf a,1,*, nurwahyu alamsyah b,2, muh. syarif c,3, arif muntasa d,4, hakam muzakki e,5 a department of information system, universitas trunojoyo madura, bangkalan, indonesia b department of information management, national taiwan university of science and technology, taipei, taiwan c department of management, universitas trunojoyo madura, bangkalan, indonesia d department of informatics, universitas trunojoyo madura, bangkalan, indonesia e department of mechanical engineering, universitas trunojoyo madura, bangkalan, indonesia 1 muhammadyusuf@trunojoyo.ac.id*; 2 d10709802@mail.ntust.edu.tw; 3 syarif@trunojoyo.ac.id; 4arifmuntasa@trunojoyo.ac.id; 5muzakki.h@gmail.com * corresponding author 1. introduction there is a growth of research interests regarding the use of information and communication technologies as the channels for social and political participation. ict have revealed themselves as the primary tool for social and political activities. many political parties and government stakeholders in some countries are using ict as the main instrument to get closer to the voters and citizens. obama's 2008 and joko widodo’s 2014 electoral campaign are well-known examples of the excessive use of the internet to campaign their programs and interact with their constituents. citizens have various chances to communicate directly with the government to influence the policy-making process through the internet. the united nations (un) has surveyed governments worldwide in order to assess their role in facilitating citizens to participate actively in policy-making processes. the study examines e-participation index to evaluates some points as follows: (i) the online provision of information by the government to the citizens, (ii) the online communication with stakeholders, (iii) and the extension of online communication results as a direct input for public policy [1]. it aims to support active citizen participation with the latest technology developments in order to promote a fair, effective, and efficient society and government, which is called e-participation. this field focuses on the use of technologies to expand citizen participation activities from limited and offline participatory activities to online, borderless and active participation. a r t i c l e i n f o a b s t r a c t article history received august 14, 2019 revised september 9, 2019 accepted november 1, 2019 the smart city is an exciting concept for improving the quality of the city. however, a smart city needs participation from citizens and all related stakeholders to use the technologies effectively in order to achieve the goal and solve the problems. even though the city already has high-tech infrastructures, participation still required to provide ideas, inputs, and roles within the development of smart city concepts. this research aims to describe and analyze the current state of the e-participation frameworks and propose a novel framework for smart cities. the analysis will go through a systematic literature review. hopefully, this study makes contributions by providing a novel framework of e-participation for smart cities. this research has implications for theory and practice. for theory, the novel framework can be added to the body of knowledge of e-participation, e-government, and smart cities fields. for practice, the framework will be useful for practitioners, policymakers, people and other stakeholders related to the smart city governance to increase citizen participation through technology-based services. this is an open access article under the cc–by-sa license. keywords novel framework e-participation smart cities mailto:syarif@trunojoyo.ac.id mailto:4arifmuntasa@trunojoyo.ac.id http://creativecommons.org/licenses/by-sa/4.0/ http://creativecommons.org/licenses/by-sa/4.0/ 46 bulletin of social informatics theory and application issn 2614-0047 vol. 3, no. 2, december 2019, pp. 45-55 yusuf et.al (a novel framework of e-participation for smart cities) in the research community, there are various definitions of e-participation. e-participation is the extension and transformation of participation in societal democratic and consultative processes mediated by information and communication technologies (ict), primarily the internet [2]. it aims to support active citizenship with the latest technology developments, increasing access to and availability of participation in order to promote fair and efficient society and government [2]. on the other hand, the definition of e-participation within a school as the various activities of interaction, communication, and participation between numerous internal and external school stakeholders through several electronic technologies that are influencing and influenced by many complex factors, support systems, and change factors [3]. the advantages of the internet for improving citizen participation can be summarized into four main points: (i) it ease and speed up people to get information on public issues. (ii) it also facilitates the engagement in political participation by reducing the cost of social pressure, such as an individual can privately sign a petition on a controversial issue from his computer at home [4]; (iii) individuals can encourage others to participate through online platforms, such as change.org or disseminate information through their social networks; (iv) the internet facilitates activities at the global scale and complements today's social report of collective action . there are several existing e-participation frameworks, such as macintosh captured three levels of participation within e-democracy initiatives [5]; tambouris et al., presented democratic processes, participation areas, participatory techniques, categories of used tools and ict technologies [6]; sæbø et al., examined elements of e-participation, such as participation actors, activities, effects, evaluation, and contextual factors [2]; kalampokis et al., described three domains model of e-participation consist of the stakeholders, participation processes and ict tools [7]; phang & kankanhalli, discussed about three step procedures for e-participation implementation [8]; islam proposed a sustainable eparticipation implementation model [9]; scherer & wimmer developed six-steps for e-participation initiatives [10]; they also examined the holistic engineering approach for supporting the development of new e-participation projects [11]; salamat and hasan proposed a framework based on actornetwork theory (ant) perspective within malaysia context [12]; medaglia developed a model based on the previous works [2], [13]; yusuf et al., proposed a framework consist of relationships between government institutions and people through technology and its complex factors [14]; yusuf et al., developed a model for e-participation within school [3]; scherer & wimmer, proposed a met model for the e-participation framework [15]. as a summary, each of the previous frameworks captures different elements, things, and priorities. e-participation is also used by a government to gain citizens' participation. recently, many governments transformed their cities to be a smarter city. smart governance encourages various stakeholders in decision making and public services [16]. ict-mediated governance, also called egovernance, is fundamental in bringing smart city initiatives to citizens, and to keep the decision and implementation process transparent. many cities in the world adopted this concept to have better service to the citizens. the concept of the smart city arose from the challenges and issues caused by the rapid urbanization of the world. a smart city aims to resolve various urban problems through ict-based technology connected as urban infrastructure, such as public service unavailability or shortages, traffic, over-development, pressure on land, environmental or sanitation shortcomings, and other forms of inequality. the ultimate goal is to revitalize some of the city's structural problems such as environmental and social imbalances through the efficient redirection of information. the concept of the smart city has attracted world interest, including governments, companies, universities, and institutes. different stakeholders have tried to understand and explain the smart city from their different viewpoints. the term ‘smart city’ appeared for the first time in the early 1990s, and researchers have emphasized technology, innovation, and globalization in the process of urbanization [17]. there is a large body of research about smart cities, producing great innovation and implementations by many countries and cities. smart cities also have potential benefits for the citizens by maximizing the usage of technology [18]. however, several key issues need to be addressed, such as concepts and success factors of a smart city that have not been discussed with a comprehensive understanding from multi-perspective, is based on our literature review about smart cities, such as issn 2614-0047 bulletin of social informatics theory and application 47 vol. 3, no. 2, december 2019, pp. 45-55 yusuf et.al (a novel framework of e-participation for smart cities) previous work [17], [19]–[22]. furthermore, many technology-based services were not utilized effectively by their citizens due to several factors. as a consequence, the smart city requires a robust framework for e-participation, which is limited research to examine this. therefore, this research has a research question: how is the framework of eparticipation for sustainable smart city. additionally, this research aims to address the gap aforementioned. hopefully, this book chapter contributes by providing a novel framework of eparticipation for smart cities. the framework will have implications for theory and practice. this book chapter consists of some sections as follows: introduction, research method, results, and discussions, as well as conclusions and contributions. 2. research method this study uses systematic literature approach [23] and starts from abstract, introductions, literature review, problem identification, conducting the selection process, synthesize and write down the ideas proposed, and then make conclusions. this research started through developing research design as following: literature reviews, define the research question, analysis, and evaluation of the previous frameworks, then develop a new framework. moreover, analysis and discussions about the new framework and make conclusions, identification of the contributions and implications for the theory and practice. in practice, we reviewed the previous frameworks of e-participation and smart cities. moreover, we analyzed the relationship between e-participation, e-government, and smart city. then, we identified the critical elements to develop a novel framework of e-participation for smart cities. furthermore, this chapter began through the study of the smart city and e-participation in order to choose the key concepts about:  the word "smart" assumes a broad range of definitions because a smart city is a broad concept related to the different fields of applications. ibm reported that " the smart city is a broad concept including many aspects of urban life, such as urban planning, sustainable development, environment, energy grid, economic development, technologies, social participation and so on." [24]  the terminology of the smart city is not identified if these terms can be adopted in the same cities, strategies, and technologies [19], [21], [25], [26].  what is the definition, concept, and meaning of the smart city in several papers [27]–[38].  e-participation is a hybrid of various technologies, social and political measures, and there is a need to improve understanding of the relationships between these components and how their own evaluation practices can be applied to e-participation as a whole [39].  participation can be generally understood as joining in, either in the sense of taking part in some communal discussion or activity or in the sense of taking some role in decision-making. eparticipation enabled and supported democratic initiatives, and related to communication services that are influenced by the rapid growth and acceptance of the internet [40].  the citizen participation have been adopted in the e-participation process as following: community informatics, community building, collaborative environments, citizenship education, cultural politics, discourse, polling, voting, campaigning, electioneering, inclusion/exclusion, information provision, service delivery, policy processes, participatory law-making, citizen journalism, mediation, participatory spatial planning [6].  some categories were identified by examining the participation area from the more exclusive to the inclusive one as follows: expert administrations, elected representatives, professional stakeholders, lay stakeholders, randomly selected recruits, non-randomly selected recruits, and self-selected participants [6]. in this research, 362 references were obtained from various journals, books, conference proceedings, media reports, project reports, technical reports. the documents were collected from the google search engine. then, we searched the references by typing some keywords, such as smart 48 bulletin of social informatics theory and application issn 2614-0047 vol. 3, no. 2, december 2019, pp. 45-55 yusuf et.al (a novel framework of e-participation for smart cities) city, framework, model, e-participation, performance, why the e-participation framework is vital for the sustainable smart city, the central concept of e-participation, smart city development processes, and related models in cycles e-participation, e-government and smart city. then, we divided into several classifications depend on the topic, and we have 45 relevant references, consist of 16 best papers of smart city and 29 best papers of e-participation. from those 45 references, we used the references which have the framework and cited it in this paper for a literature review. furthermore, we collected the previous frameworks of e-participation and smart city. then, those frameworks were analyzed related to the advantages and limitations. based on that analysis, we developed an eparticipation framework for a sustainable smart city based on the previous paper. our proposed framework is a composite of several essential parts from the previous frameworks. each framework has its superiority. the previous frameworks have some critical and unimportant parts, and then we took the most crucial part and combined it all into our proposed framework. 3. result and discussion this study examines that e-participation is one of the required fields regarding smart cities. smart citizens use technologies for supporting their day to day activities, such as living in the regions with higher levels of public services online development, participating online via joining petitions, and taking part in public consultations. table.1 the advantages and limitations of previous models/frameworks author(s)/year model/framework (s) advantage (s) limitation(s) macintosh, a., & whyte, a. (2008) the three levels of analysis for the e-participation framework [39] it explains the flow of the process too simple and it does not explain more detail about the participation areas, categories of tools and sort of technologies kalampokis et al., (2008) a domain model for eparticipation [7] the model describes the primary and detail elements of e-participation process there are not complex factors that influence the eparticipation process the uml class diagram representing the domain model for e-participation sommer, l., & cullen, r. (2009) the guide to participation [41] the model examines the process and elements of eparticipation process the model does not capture the complex, geopolitical, local, and change factors which influence the eparticipation implementation projects. bélissent, (2010) smart city blue print [19] the blueprint includes two essential aspects: education and health there is no specific information about citizens' activities. nam, t., & pardo, t. a. (2011) fundamental components of smart city technology factors [25] simple and clear to understand, consists of three parts: technology, human and institution it is challenging to adopt the idea for smart cities because of technical issues. salamat, m. a., & hassan, s. (2011). the e-participation platform based on actor-network theory (ant) approach [12] based on the ant perspective according to the malaysia case study there are not geopolitical, local, and change factors. e-participation framework for public policy formulation scherer & wimmer, (2011) reference framework for eparticipation projects [11] the model indicates the flow of the process for eparticipation implementation projects. the model does not capture the complex, geopolitical, local, and change factors which influence the eparticipation implementation projects. batty et al., (2012) typology of smart cities functions [21] consist of several issues from different area most of the information describes theories. medaglia, (2012) the shape of the eparticipation field revisited (2006-2011) [13] the model captures the processes, factors, central and detail of elements of eparticipation there are not geopolitical, local, and change factors. issn 2614-0047 bulletin of social informatics theory and application 49 vol. 3, no. 2, december 2019, pp. 45-55 yusuf et.al (a novel framework of e-participation for smart cities) j. h. lee, hancock, & hu, (2014) case framework for smart city analysis [22] proposed by different point of views, such as urban openness, service innovation, partnership formulation, and urban proactiveness this research leads to social science research. only a few technological issues emphasized. chuantao et al., (2015) classification of smart city application domains [17] there were sub-domains in every main domain. more compact than batty’s framework this framework is too broad to implement, and no best practice described there. furthermore, this research also analyzes the previous models/frameworks. table 1 captures the advantages and limitations of the previous models/frameworks developed by other researchers regarding e-participation and smart cities. table 2 shows the various model/framework (s) related to e-participation and smart cities. table.2 previous models/frameworks by other researchers. author(s)/year previous model/framework (s) macintosh, a., & whyte, a. (2008) kalampokis et al., (2008) kalampokis et al., (2008) 50 bulletin of social informatics theory and application issn 2614-0047 vol. 3, no. 2, december 2019, pp. 45-55 yusuf et.al (a novel framework of e-participation for smart cities) author(s)/year previous model/framework (s) sommer, l., & cullen, r. (2009) salamat, m. a., & hassan, s. (2011) salamat, m. a., & hassan, s. (2011). issn 2614-0047 bulletin of social informatics theory and application 51 vol. 3, no. 2, december 2019, pp. 45-55 yusuf et.al (a novel framework of e-participation for smart cities) author(s)/year previous model/framework (s) scherer & wimmer, 2011 (2011) batty et al., (2012) medaglia, (2012) chuantao et al., (2015) 52 bulletin of social informatics theory and application issn 2614-0047 vol. 3, no. 2, december 2019, pp. 45-55 yusuf et.al (a novel framework of e-participation for smart cities) fig. 1. the proposed framework of e-participation for smart cities based on the analysis of the previous research regarding e-participation and smart city, we developed a novel framework as shown in fig. 1. this framework applies the e-participation concept into the smart city field. the framework consists of four levels as following: the first level is participation factors; furthermore, the second one includes citizens, technologies, participation activities, and evaluations and improvements. moreover, the third level is real-time control systems, and the fourth level is policymaking. the first level is the participation factor. in the government system, some factors affect citizen participation. for instance, publishing the views of politicians, assessing the acceptance of these views on the constituents' side, making the views/objections on a political decision known by their constituents, ensuring transparency of political action, offering the opportunity to co-formulated political decision making in some instances, and others. participation factors refer to the studies of the way governments are organized, and work affects to eparticipation. the second level consists of citizens, technology, participation activities, and evaluations and improvements. the existence of actors and systems used in the e-participation process are described at this level. citizens are the leading role in smart city sustainability. moreover, technologies are the media to help citizens participation in activities. at the end of the process, everything has to be evaluated and improved. citizens are the people who lived in the city and used city services. therefore, citizens need to provide feedback to the users of government services. consultation between citizens and government can be conducted through ict-based platforms. several e-participation research contributions focused on citizens as a crucial role in e-participation processes. technology and e-participation are interdependencies. technologies in this context can be defined as hardware and software to help citizens participation. there are many technologies for supporting citizen participation: personal computers, networking hardware, operating system, web-based application for services, and also mobile applications. participation activities are a sort of participation process consist of citizen engagement and involvement in the democratic process. different scope of the democratic processes, such as a national scope or a macro-regional scope has different requirements and characteristics than a local scope. a participation activity has an outcome. one of the most common problems regarding eparticipation processes is that the government failed to integrate outcomes into the policy process or respond to them effectively. by using technology, e-participation can do activities, such as e-voting, online decision making, online political discourse, e-consultation, e-activism, e-campaigning, and epolicies making issn 2614-0047 bulletin of social informatics theory and application 53 vol. 3, no. 2, december 2019, pp. 45-55 yusuf et.al (a novel framework of e-participation for smart cities) petitioning. all of these features will help government systems more productive and reduce several failures. evaluations and improvements are the processes to have better conditions. every process, actions, and service in e-participations have to be evaluated. the slow process becomes fast. the previous action becomes efficient. in other words, every process, step, and action become better than before. the third level is the real-time control systems. once citizens involved many government services, the government needs a system that gives them a real-time and recent report. this level is the way of government to know everything about the participation of their citizens. the use of high-technology systems, such as cctv (closed-circuit television), the internet, social media, web-based, and mobile applications, ease the government to control every single process. some smart cities control this system through the command center. the fourth level, policies making is the last process from e-participation in smart cities in which citizens have an active engagement in defining the process and content of policy-making. it acknowledges an equal position for citizens for setting the agenda, although the government has responsibility for the final decision. in the last decade, the leader of the city has to do several offline activities, meetings, and conferences to make the decision. however, e-participation and technology are getting more accessible, faster and efficient in making decisions or policies. few prior research included technology issues in the e-participation process. in this framework, technology is mandatory for the e-participation process in smart city systems. the real-time control system is a vital aspect of e-participation processes, and also it is an essential part of smart city systems. several previous research on smart city captures frameworks for the development process. however, the novel framework in this book chapter figured out more specific about how the eparticipation process can be adopted in smart cities. the proposed framework in fig. 1 complements the previous frameworks of e-participation and smart cities, as described in table 2. the advantages of this novel framework are clearly describing how the e-participation process will implementing for citizens in smart city systems. fig. 1 shows all of the processes start from the various factors of participation, four critical components, such as citizens, technologies, participation activities, and evaluation and improvement, the whole processes monitored by a real-time control system, and the expectations are helpful for policies making for better services. however, the framework also has a limitation as it has not been implemented in the real smart city case. it is developed based on desk research, as explained in the research method section. 4. conclusion this research has the conclusion that e-participation can support sustainable smart city systems through several elements, such as participation factors, citizens, technologies, participation activities, evaluations and improvements, real-time control systems, and policy making. e-participation is also very important to encourage citizen participation in smart cities. even though the smart city has sophisticated technologies, but it still needs participation from the citizens and related stakeholders. additionally, e-participation has element ‘e’ or electronic that identical with smart city systems. this book chapter contributes a novel framework of e-participation for smart cities, as shown in fig. 1. it describes the whole process of e-participation for smart cities. furthermore, the novel framework complements the existing frameworks of e-participation and smart cities by various researchers. it has some implications for the theory, such as the novel framework can be added to the body of knowledge of e-participation and smart cities fields. additionally, the implications for practice are the practitioners, stakeholders, and decision-makers regarding smart cities need to consider elements in the framework to improve citizen participation through technologies. finally, further interesting research is examining how effective this framework to help and make more natural e-participation processes in smart city systems, what are the drawbacks and other elements based on empirical research. 54 bulletin of social informatics theory and application issn 2614-0047 vol. 3, no. 2, december 2019, pp. 45-55 yusuf et.al (a novel framework of e-participation for smart cities) references [1] united nations, “united nations e-government survey 2012: e-government for the people,” new york, new york, usa, 2012. [2] ø. sæbø, j. rose, and l. skiftenes flak, “the shape of eparticipation: characterizing an emerging research area,” gov. inf. q., 2008. [3] m. yusuf, c. adams, and k. dingley, “digital citizen participation within schools in the united kingdom and indonesia: an actor-network theory (ant) perspective,” inf., 2016. [4] e. anduiza, a. gallego, and m. cantijoch, “online political participation in spain: the impact of traditional and internet resources,” j. inf. technol. polit., 2010. [5] a. macintosh, “characterizing e-participation in policy-making,” in proceedings of the 37th hawaii international conference on system sciences (hicss-37), 2004, vol. 00, no. c, p. 50117a (1-10). [6] e. tambouris, n. liotas, and k. tarabanis, “a framework for assessing eparticipation projects and tools,” in proceedings of the annual hawaii international conference on system sciences, 2007, pp. 1–10. [7] e. kalampokis, e. tambouris, and k. tarabanis, “a domain model for eparticipation,” 2008 third int. conf. internet web appl. serv., pp. 25–30, jun. 2008. [8] c. w. phang and a. kankanhalli, “a framework of ict exploitation for e-participation initiatives,” commun. acm, vol. 51, no. 12, p. 128, 2008. [9] m. s. islam and s. business, “towards a sustainable e-participation implementation model,” no. october, pp. 1–12, 2008. [10] s. scherer and m. a. wimmer, “a regional model for e-participation in the eu : evaluation and lessons learned from voice,” pp. 162–173, 2010. [11] s. scherer and m. a. wimmer, “reference framework for e-participation projects,” in lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics), 2011, vol. 6847 lncs, pp. 145–156. [12] m. a. bin salamat and s. bin hassan, “an actor-network theory ( ant ) approach to malaysian eparticipation framework,” in 2011 international conference on social science and humanity ipedr, 2011, vol. 5, pp. 83–88. [13] r. medaglia, “eparticipation research: moving characterization forward (2006-2011),” gov. inf. q., vol. 29, no. 3, pp. 346–360, 2012. [14] m. yusuf, c. adams, and k. dingley, “research philosophy and methodologies of e‐government: update from eceg and iceg,” proc. 14th eur. conf. egovernment (eceg 2014), vol. 12, no. 2, pp. 242–251, 2014. [15] s. scherer and m. a. wimmer, “a metamodel for the e-participation reference framework,” in lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics), 2016. [16] v. albino, u. berardi, and r. m. dangelico, “smart cities: definitions, dimensions, performance, and initiatives,” j. urban technol., vol. 22, no. 1, pp. 3–21, 2015. [17] y. i. n. chuantao, x. zhang, c. hui, w. jingyuan, c. daven, and d. bertrand, “a literature survey on smart cities,” vol. 58, no. october, pp. 1–18, 2015. [18] n. alamsyah, t. d. susanto, and t.-c. chou, “a comparison study of smart city in taipei and surabaya,” 2016, pp. 111–118. [19] j. bélissent, “getting clever about smart cities: new opportunities require new business models,” forrester res. inc, p. 33, 2010. [20] t. nam and t. a. pardo, “smart city as urban innovation,” proc. 5th int. conf. theory pract. electron. gov. icegov ’11, p. 185, 2011. [21] m. batty et al., “smart cities of the future,” eur. phys. j. spec. top., vol. 214, no. 1, pp. 481–518, 2012. issn 2614-0047 bulletin of social informatics theory and application 55 vol. 3, no. 2, december 2019, pp. 45-55 yusuf et.al (a novel framework of e-participation for smart cities) [22] j. h. lee, m. g. hancock, and m.-c. hu, “towards an effective framework for building smart cities: lessons from seoul and san francisco,” technol. forecast. soc. change, vol. 89, pp. 80–99, 2014. [23] b. kitchenham et al., “systematic literature reviews in software engineering-a tertiary study,” inf. softw. technol., vol. 52, no. 8, pp. 792–805, 2010. [24] m. kehoe et al., “smarter cities series : understanding the ibm approach to smater cities,” ibm redguides bus. leaders, pp. 1–30, 2011. [25] t. nam and t. a. pardo, “conceptualizing smart city with dimensions of technology, people, and institutions,” proc. 12th annu. int. digit. gov. res. conf. digit. gov. innov. challenging times dg.o ’11, p. 282, 2011. [26] j.-h. lee and m. g. hancock, “towards a framework for smart cities: a comparison of seul, san francisco & amsterdam,” yonsei univ., 2012. [27] r. jucevičius, i. patašienė, and m. patašius, “digital dimension of smart city: critical analysis,” procedia soc. behav. sci., vol. 156, no. april, pp. 146–150, 2014. [28] a. oliveira and m. campolargo, “from smart cities to human smart cities,” proc. 48th hawaii int. conf. syst. sci., pp. 2336–2344, 2015. [29] c. p. liyanage and a. marasinghe, “planning smart meal in a smart city for a smart living,” proc. 2013 int. conf. biometrics kansei eng. icbake 2013, pp. 166–171, 2013. [30] n. alamsyah, t.-c. chou, and t. d. susanto, “ict-mechanisms of intelligent transportation system in taipei city as a smart city,” int. j. comput. sci. inf. technol., vol. 8, no. 3, pp. 55–66, 2016. [31] g. kuk and m. janssen, “the business models and information architectures of smart cities,” j. urban technol., vol. 18, no. 2, pp. 39–52, 2011. [32] m. thite, “smart cities: implications of urban planning for human resource development,” hum. resour. dev. int., vol. 14, no. 5, pp. 623–631, 2011. [33] u. aguilera, o. peña, o. belmonte, and d. lópez-de-ipiña, “citizen-centric data services for smarter cities,” futur. gener. comput. syst., pp. 1–14, 2016. [34] h. ahvenniemi, a. huovila, i. pinto-sepp??, and m. airaksinen, “what are the differences between sustainable and smart cities?,” cities, vol. 60, pp. 234–245, 2017. [35] v. albino, u. berardi, and r. m. dangelico, “smart cities : definitions , dimensions , performance , and initiatives,” vol. 0732, no. april, 2016. [36] p. neirotti, a. de marco, a. c. cagliano, g. mangano, and f. scorrano, “current trends in smart city initiatives: some stylised facts,” cities, vol. 38, pp. 25–36, 2014. [37] j. hedlund, “smart city 2020. technology and society in the modern city,” no. march, p. 27, 2012. [38] s. ben letaifa, “how to strategize smart cities: revealing the smart model,” j. bus. res., vol. 68, no. 7, pp. 1414–1419, 2015. [39] a. macintosh and a. whyte, “towards an evaluation framework for eparticipation,” transform. gov. people, process policy, vol. 2, no. 1, pp. 16–30, 2008. [40] c. sanford and j. rose, “characterizing eparticipation,” int. j. inf. manage., vol. 27, no. 6, pp. 406–421, 2007. [41] l. sommer and r. cullen, “participation 2 . 0 : a case study of e-participation within the new zealand government,” 2009 42nd hawaii international conference on system sciences, big island, hi, pp. 1-10, 2009. bulletin of social informatics theory and application issn 2614-0047 vol. 3, no. 1, march 2019, pp. 1-12 1 https:doi.org/10.31763/businta.v3i1.159 expand the internet access in an urban park using a wi-fi offloading technique leonel hernandez a,1,*, jair carbonó a,2, andres cantillo a,3 a institución universitaria itsa, carrera 45 # 48 – 31, barranquilla, colombia 1 lhernandezc@itsa.edu.co*; 2 jcarbono@itsa.edu.co; 3 adcantillo@itsa.edu.co * corresponding author 1. introduction it is unmotivating, to move around each of the attractive places of the muvdi park and notice that in the different areas or points you visit, the data network changes coverage (edge, 3g, h +, lte) and loses connection at wide intervals, that on different occasions only the terminal or smartphone device (tablet, phone-cell) is reset, to reconnect to the network that covers the current point. it is of common interest to make known the technologies, which make possible the exchange of data through the internet. the majority of users with a smartphone already navigate from it, and in most cases, they do so through an internet data plan provided by their telephone service [1]. at this time the most widespread connection for our country is the 3g network, but this is changing little by little, and the 4g network is taking much more ground, thanks to the promise of offering higher speed, we can also find it with lte. to identify which network is available, smartphones have an icon in the notification bar where you can see the different symbols as well as two arrows. also, you can see the following letters h, g, e, h + or 3g and 4g or lte. it is necessary to point out another problem that undoubtedly affects the muvdi park. it is that the park only has a hotspot for access via wi-fi, making it difficult for users, visitors who are in the entertainment sites further away from the internet access point. to enjoy a service (internet via wifi) stable, since the radius of coverage is insufficient to cover the entire area of the park, it is due to this that present problems and constant failures in the transmission of data to the internet. likewise, this problem generates a massive concentration in the place where the hotspot is located, saturating a r t i c l e i n f o a b s t r a c t article history received december 16, 2018 revised january 18, 2019 accepted february 3, 2019 nowadays, smart devices have grown exponentially, so they have become a necessity rather than a luxury, therefore staying connected to the internet has facilitated people to explore national and international news, make payments for services public, virtual shopping, scheduling medical appointments, among others. now all this demand increases every day at excessive levels and adding the robust applications that are currently being developed and launched on the market. regarding this, it is known that currently, the internet service providers of the municipality of soledad atlántico do not have the physical infrastructure to maintain the availability of the service. this is where the project design of the wi-fi-offloading solution to extend the coverage and the transmission of data from the cellular network, through the wireless network in the muvdi park of the municipality of soledad atlántico, is carried out with the aim of providing a solution and alternative so that the internet connection service remains available without import the data network to which you have access. the research methodology used for the development of the project is descriptive. the research design is qualitative, transactional, and non-experimental. at this moment, it is in a descriptive stage, carrying out tests, and then moving on to the applied stage. this is an open access article under the cc–by-sa license. keywords hotspot 3g lte small cell wi-fi offload wlan http://creativecommons.org/licenses/by-sa/4.0/ http://creativecommons.org/licenses/by-sa/4.0/ 2 bulletin of social informatics theory and application issn 2614-0047 vol. 3, no. 1, march 2019, pp. 1-12 hernandez et.al (expand the internet access in an urban park using a wi-fi offloading technique) the connections and providing a poor service, preventing a good experience for the user or visitor who decided to access the services provided by the park. in short, it has a wi-fi network, little available and stable to which even the most expert user is unlikely to access it thanks to the number of established connections that consume the resources of the internet service provider via wi-fi. therefore, to prevent all these failures and provide improvements in the link and traffic of the internet network, it is required that there be at least three internet providers devices via wi-fi (hotspot) and be located and configured as such way that covers the entire area of the park and allows to maintain the availability and reliability of the service to the internet network to avoid crowds of users at the same point and decrease the negative experience in terms of browsing the internet of users and visitors from the park. wireless networks are very important nowadays because thanks to them it is possible to save, as much as space with cable spending, which uses radiofrequency technologies that allow mobility to the user without the need of a cable that connects it to the network [2]. wireless networks facilitate operation in places where the computer cannot remain in one place, such as warehouses or offices that are located on several floors. wireless networks are not expected to replace wired networks. it offers higher transmission speeds than those achieved with wireless technology. this situation entails that the data transmission of the users is carried out in a delayed manner, due to the saturation of the wi-fi communication device, product of the number of connections found by the user group at the same point they are looking for transmitting. through the wireless network, this affectation would mean a decrease in the visitors for the poor service rendered to the citizen. however, the existing technology can provide solutions, which are already available in the local market in different brands and prices. to achieve this, it must have the priority of installing and configuring two new wi-fi access points to support all the connections of the wireless network, based on the installation and configuration of these devices. it is understood that a previous study of the network has been made where the statistics of daily connections and bandwidth available for the implementation of a solution design with regarding its introduction in the current topology of the wireless network of the muvdi park, the changes expected by the design of this solution are noted. the objective of this research is to design a wi-fi offloading solution to extend the coverage and data transmission of the cellular network through the wireless network in the muvdi park of the city of soledad. in the planning of this research project, the authors rely on two types of study, because they are of high relevance for the realization of the proposed solution. descriptive research is applied in this solution design because it is necessary to describe the current status of the wireless coverage of the muvdi park of the municipality of soledad atlántico, identify the point of most significant influx of users and visitors of the park and indicate the areas where the coverage of the cellular network changes bands, the sending, and reception of traffic being lower. also, thanks to the use of observation, which approves the use of the senses, to obtain in a conscious and directed, data that provide elements for our research, allowing from it, to develop a hypothesis, and then reapplies observation, to verify if the hypothesis is met. the paper is organized in the following way: the initial conceptualizations are given in the introduction, then a fundamental review of the literature related to wi-fi offloading is made. continue with the explanation of the research methodology used. subsequently, the results and discussions that have so far are shown, specifying what is expected to be developed in the following stages. finally, the conclusions are defined. 2. wi-fi offloading and conceptualization the significant increase in traffic in the cellular network has significantly surpassed the infrastructure of national ips, leading to the saturation of these. it is for this reason that wi-fi offloading is considered one of the most promising techniques to deal with the explosive increase of data in cellular networks due to its high speed of transmission of traffic and its low requirement of devices. therefore, this technique will supply the current needs that affect not only the citizenship but also the companies that provide internet service. below are the documents that support the present investigation. a previous research article entitled "data traffic offload from mobile to wi-fi networks: behavioral patterns of smartphone users" presents a model for defining the behavior patterns of smartphone users when downloading data from mobile networks to networks wi-fi [3]. in other issn 2614-0047 bulletin of social informatics theory and application 3 vol. 3, no. 1, march 2019, pp. 1-12 hernandez et.al (expand the internet access in an urban park using a wi-fi offloading technique) publication entitled "proposal for the design of a mobile data network with the wi-fi offload solution complementary to the umts and lte networks, which allows providing internet service to mobile users through wi-fi access" explains the design of a mobile data network with the wi-fi offload solution to be able to provide the mobile data service through a non-3gpp access network such as wi-fi as a technological alternative to improve the overall performance of the network, solve the problems indoor coverage problems and improve the user's browsing experience with speeds and quality of service that exceed 3g and equal and improve 4g at a lower price of mbps [4]. in other project entitled "design of wi-fi solution for download data from mobile networks 3g "explains how to build the best solution to optimize quality and service perception for congested mobile network zones [5]. in other research article entitled "mobile data traffic offloading over pass point hotspots" define mobile data traffic continues its tremendous growth. road, with a growing number of smartphones, high-end phone tablets they require internet access everywhere [6]. as a side effect of this explosion of mobile data, today, we face the challenge of managing traffic overloads in cellular networks. the current cellular networks are experiencing explosive growth in data traffic, and this traffic generates a load on the network [7]. this growth is the result of smart devices, data-hungry mobile applications (for example, online social networks, internet gaming, video streaming), according to cisco's global visual. network index (vni), since 2007, global mobile data traffic is doubling every year. it is estimated that this growth rate will even increase more in the coming years. the realistic parameters of a saturated lte cellular network, and see how it can be downloaded using data-offloading techniques as they are small cells and wi-fi offload by using free software [8]. due to the rapid growth of smartphones and tablets, data traffic in networks is increasing in the last years [9]. until 2015, mobile connections are expected to reach 7.4 billion, surpassing the global population. as the popularity of extensive data, social media, video, and online game applications are growing rapidly; it will further boost data consumption and create tremendous network stress. the mobile data traffic grows at a compound annual growth rate (cagr) of 131 percent between 2008 and 2013 and will exceed two exabyte per month in 2013 [10]. at the same time, cellular operators in europe are investing a large amount of money to drive machine-to-machine (m2m) communications for billions of machines and intelligent devices (e.g., cars and sensors), which will create additional mobile traffic. however, current cellular networks cannot adapt to an exponential growth of data of this type. therefore, there is an urgency for the research community to look for new solutions. fig. 1 shows a basic wi-fi offloading network topology. fig. 1. wi-fi offloading network. 4 bulletin of social informatics theory and application issn 2614-0047 vol. 3, no. 1, march 2019, pp. 1-12 hernandez et.al (expand the internet access in an urban park using a wi-fi offloading technique) 3. method the project is framed in the type of descriptive research [11]. descriptive since all the documentation related to wi-fi offloading have been reviewed. according to the research design, the project is non-experimental, qualitative, and transactional. non-experimental because it focuses on the study of the reality of network performance in an open area in its natural dynamics. the study does not create situations to observe what changes in the environment from a created situation but seek to describe, explain, and predict reality, from an approach. in later stages of the project, experiments will be carried out to analyze the impact of wi-fi offloading and validate how it transforms the performance of the cellular network, modifying some variables that will be defined in later in the investigation. qualitative because it is based on a working hypothesis, defined as the saturation of the cellular network and the need to decongest it by expanding the capabilities (coverage, response times, d2d connectivity) of the wireless network. it is transactional because the measurements are taken in a single moment. it is expected in the future to perform a multivariate statistical analysis to compare the gap between the current values versus the new values of each metric reviewed in this study. fig. 2 shows the stages of the project. fig. 2. wi-fi offloading solution characterization. 4. results and discussion according to he et al., wi-fi offloading is classified in five categories: 1) capacity; 2) cost; 3) energy; 4) rate; and 5) continuity [12]. this classification obeys the interests of each operator in solving or developing products aimed at solving problems in the categories. wi-fi offloading schemes are accommodated in some of the categories which are shown in fig.3. fig. 3. wi-fi offloading schemes. issn 2614-0047 bulletin of social informatics theory and application 5 vol. 3, no. 1, march 2019, pp. 1-12 hernandez et.al (expand the internet access in an urban park using a wi-fi offloading technique) considering delay technology, our proposal is based on non-delayed offloading. the main reason is that for our environment it is the one that can provide the best results and it is relatively easy to start developing without incurring higher costs. this scheme is based on wi-fi first algorithm where users connect to a wi-fi access network whenever wi-fi coverage is available. then ues (user equipment) shift their data traffic to a wi-fi network. in other words, ues offload their data traffic only if the received signal strength of wi-fi access is non-zero. otherwise, they use cellular networks to transfer the data traffic, as cheng et al. explain in their research [13]. in formulating the proposed wi-fi d2d-based offloading scheme, it is assumed that mobile nodes have both 3g/4g and wi-fi wireless network interfaces. mobile nodes use the cellular network interface to transmit data in the general case but switch to the wi-fi network interface whenever wi-fi offloading is possible. the control flow chart of the proposed scheme is shown in fig. 4. cellular network connect to ap? connect to ap start to construct the carrier sense list transmit data using wifi is the list changed? controller notify mobile nodes to use d2d? send the list to controller d2d communication in ap’s coverage? failed transmission? calculate the new upper bound of the retransmission times mobility and location connection management no no yes yes yes no no yes no yes fig. 4. control flow chart of the proposed scheme. to achieve the aforementioned d2d wi-fi offloading scenario, two critical issues must be resolved: (1) identifying whether or not the two peered mobile nodes that are communicating with each other are capable of performing wi-fi d2d communication; (2) deciding when the two peered mobile nodes should switch from wi-fi d2d communication back to infrastructure-based communication. table.1 functions and conditions of algorithms algorithm function and condition input parameter variable set on the spot offloading [20][53] 𝐴𝑐𝑐𝑒𝑠𝑠𝑖 { 𝑊𝑖 − 𝐹𝑖 𝑆𝑁𝑅𝑖 1 ≥ 0 𝐿𝑇𝐸 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒 𝑆𝑁𝑅𝑖 1 0 fixed snr threshold [21] 𝐴𝑐𝑐𝑒𝑠𝑠𝑖 { 𝑊𝑖 − 𝐹𝑖 𝑆𝑁𝑅𝑖 1 ≥ 𝑆𝑁𝑅𝑚𝑖𝑛 1 (𝑙𝑜𝑎𝑑𝑖 1) 𝐿𝑇𝐸 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒 𝑆𝑁𝑅𝑖 1, 𝑙𝑜𝑎𝑑𝑖 1 𝑆𝑁𝑅𝑚𝑖𝑛 1 andsf model based on cell-id [22] 𝐴𝑐𝑐𝑒𝑠𝑠𝑖 { 𝑊𝑖 − 𝐹𝑖 𝑆𝑁𝑅𝑖 1 ≥ 0 𝐿𝑇𝐸 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒 𝑆𝑁𝑅𝑖 1 𝑆𝑁𝑅𝑚𝑖𝑛 1 andsf model base don position [22] 𝐴𝑐𝑐𝑒𝑠𝑠𝑖 { 𝑊𝑖 − 𝐹𝑖 𝐷𝑖𝑠𝑡𝑎𝑛𝑐𝑒𝑖 ≥ 𝐷𝑡ℎ𝑟 𝐿𝑇𝐸 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒 𝐷𝑖𝑠𝑡𝑎𝑛𝑐𝑒𝑖 𝐷𝑡ℎ𝑟, 𝑆𝑁𝑅𝑚𝑖𝑛 1 hybrid andsf model [22] 𝐴𝑐𝑐𝑒𝑠𝑠𝑖 { 𝑊𝑖 − 𝐹𝑖 { 𝐷𝑖𝑠𝑡𝑎𝑛𝑐𝑒𝑖 < 𝐷𝑡ℎ𝑟 𝑆𝑁𝑅𝑖 1 > 0 𝐿𝑇𝐸 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒 𝐷𝑖𝑠𝑡𝑎𝑛𝑐𝑒𝑖, 𝑆𝑁𝑅𝑖 1, 𝑙𝑜𝑎𝑑𝑖 1 𝐷𝑡ℎ𝑟, 𝑆𝑁𝑅𝑚𝑖𝑛 1 6 bulletin of social informatics theory and application issn 2614-0047 vol. 3, no. 1, march 2019, pp. 1-12 hernandez et.al (expand the internet access in an urban park using a wi-fi offloading technique) there is a list of handover algorithms for the access network discovery and selection function to control the handover operations between 3g and non-3g networks. in the next stage of the project, we will decide which the most appropriated algorithm is. table 1 shows several algorithms schemes based on different snr thresholds. thanks to the research project developed in muvdi park, the necessary data and information were obtained to create the design of the proposed wi-fi offloading solution. the present investigation will show the results obtained, considering the account that specific security measures in navigation govern the current hotspot national parks, so the ministry of information technologies and communications (tics) mentions some of the main characteristics and restrictions of the located hotspot in each of the parks. fig. 5 shows the main navigation restrictions for this kind of free connection. fig. 5. navigation restrictions. considering the previous provision demarcated by mintic and illustrated in fig. 2. we proceeded to make the connection with the wireless internet access device. it was found that for the final devices you must log in from a captive portal which will ask the clients primary data to get personal information, contribute with the statistics required by the administration of the wi-fi zones for their control and accept all the conditions that imply connecting to the network. likewise, an analysis of the coverage range of the device was carried out, which showed that the range of coverage of the hotspot could cover an approximate area of 7,800 square meters according to ict specifications. however, in the field, it can be seen in fig. 6 that the distance is wider, but with inevitable delays and intermittency reaching approximately 18,000 square meters. fig. 6. range of hotspot coverage similarly, the pertinent measurements were made on the bandwidth of the device (hotspot) to know the variations between the data of loading and unloading of the information. fig. 6 corroborates the bandwidth available for the wireless access device and details the number of successful pings for each of the tests, so it is detailed that the band is like the described by mintic in fig. 7. issn 2614-0047 bulletin of social informatics theory and application 7 vol. 3, no. 1, march 2019, pp. 1-12 hernandez et.al (expand the internet access in an urban park using a wi-fi offloading technique) fig. 7. bandwidth test. it is pertinent to mention that the infrastructure designed directly depends on the colombian state, which provides the wireless access solutions to all the country's parks, as well as the participation of national and local cellular data service providers. consequently, the results of the authors of state-of-the-art documents who support the integrity of the present investigation will be cited. the survey from 298 people consists of a data traffic generation request form, which is based on measurements made by the integrated application on their smartphones to complete an online study of user preferences [3]. of this total, 221 (74.16%) were men, and 77 (25.84%) were women. according to the study, 98.9% of participants use wi-fi networks, and 74.16% reported using wi-fi networks almost often when accessing the internet and uploading or downloading data. the majority of participants (77.85%) reported that they used only wi-fi networks when updating applications on their smartphones, while 14.43% reported using both mobile networks and wi-fi to do so. likewise, it exposes an example of the 28-day history of mobile data traffic and the wi-fi network for a single participant of the study, which is shown in table 2. a significant difference can be seen in the traffic of data between mobile networks and wi-fi, as was the case of our study population in general. another research results show that is available to the mobile user to access both cellular and wifi technologies to unify security policies with eapaka authentication process for all devices that use usims [4]. the method of authentication and encryption is the same for both a user accessing the mobile internet services through a network of 3gpp or non-3gpp access. also, step by step was detailed the whole process from a user turns on the mobile device to engage the network access 3gpp until it is enabled to interact with a public network either surfing the internet or a private network with a connection intranet via mobile core. similarly, clarifies that the proposed solution provides full integration with the mobile 3gpp network, allowing to give a mode convergent access handover without disconnection between access technologies such as (cell access and vice versa) or between one network (wi-fi wi-fi) while maintaining the same ip. different suppliers worldwide include solutions wi-fi offload own maximizing the benefits and operating costs. finally, to meet the specific objectives the overall objective in proposing the design of a mobile data network with wi-fi complementary offload solution to data networks umts and lte that will allow decongesting the traffic generated by cell phone users is met redirecting mobile data downloading via a wi-fi network. 8 bulletin of social informatics theory and application issn 2614-0047 vol. 3, no. 1, march 2019, pp. 1-12 hernandez et.al (expand the internet access in an urban park using a wi-fi offloading technique) table.2 result of a traffic smartphone id mobile networks wi-fi networks application amount application amount facebook 507 mb android os 1.31 gb opera 300 mb facebook 1.31 gb youtube 29.8 mb google play store 569 mb google play store 28.01 mb youtube 396 mb whatsapp 27.45 mb messenger 245 mb maps 12.41 mb opera 221 mb vecernji list [croatian national newspaper] 9.75 mb whatsapp 25.55 mb 1062014 google play services 7.78 mb gmail 19.49 mb messenger 5.56 mb vecernji list [croatian national newspaper] 11.99 mb android os 5.06 mb google play services 6.41 mb weather clock 1.76 mb video player 5.24 mb skype 1.48 mb maps 2.6 mb flipboard 1.44 mb google applications 2.3 mb gmail 1.03 mb skype 1.02 mb samsung push service 779 mb private photo vault 798 kb 28 days 0.92 gb 4.11 gb a set of parameters used for typical bandwidths for lte transmission on the downlink shown in table 3, where the spacing of the subcarrier is δ f = 15 khz [6]. where they selected 20 mhz transmission bandwidth, therefore the number of resource blocks per frame is equal to 100 rb, for example, allowing a maximum yield of 100.8 mb / s for 64 qam modulation. these parameters are used to calculate the demands of users in terms of rbs, knowing only the volume in bytes. here they noted that the modulation used by each user depends on your level of signal to noise plus interference (sinr). table.3 transmission parameters download parameters rate transmission bandwidth [mhz] 20 number of resource blocks 100 ofdma symbols per 1 ms 14 modulation symbol rate (mb/s) 16.8 qpsk bit rate (mb/s) 33.6 16qam bit rate (mb/s) 67.2 64qam bit rate (mb/s) 100.8 in other project, results of its degree a solution similar to the research project in progress, but implemented in a shopping mall, as item connection diagram of equipment where pose, the ap 7762-s (indoor) will be pointed at an angle of 30° and 120° scanning or vice versa as appropriate and ap 7363 (outdoor) will cover 360 omnidirectional configurations [5]. table 4 and table 5 shows design parameters and design results, respectively, arranged by the authors. issn 2614-0047 bulletin of social informatics theory and application 9 vol. 3, no. 1, march 2019, pp. 1-12 hernandez et.al (expand the internet access in an urban park using a wi-fi offloading technique) they add that for sizing the solution in shopping malls; the following basic data are:  ap ruckuszoneflex7363 estimated coverage: omnidirectional, from 30 to 50 meters radio coverage (as environmental conditions).  estimated coverage ap ruckus zoneflex 7762-s: 30º and 120º targeted scanning or vice versa as appropriate with an average elevation of + 20 meters target.  the maximum number of clients connected by ap 100 total users.  the maximum length of utp cable to connect the ap with poe 90 meters.  switch poe feeding. table.4 design parameters and results design parameters ue/m2 2 % operator users 30% % simultaneous users 30% # ue per ap 100 table.5 design results design results average area of high traffic areas m2 15000 total users/ m2 30000 average user x operator 9000 beneficiary users 2700 total ap to install 27 the other results of scientific paper disclosed that an lte network is congested and is expected to see a degradation of services, proportional to the number of users connected to the network will be simulated [8]. several small cells to which users can connect then installed, and you will see how the system responds. subsequently, it does the same with the access point wi-fi and finally shall together both small cells and wi-fi ap to evaluate the network. they assume that the reason why lte and 802.11n be used, as can be seen in table 6, it is because their parameters are very similar. table.6 comparison of certain technical aspects of lte and wifi 802.11n parameters lte 802.11n bw (mhz) 20 20/40 mimo si si modulation 64-qam 64-qam maximum theoretical download speed (mbps) 300 300/600 another research made a comparison of madnet's performance against 3g networks when users download and upload data [7]. they also show the results of the two cases separately, characterizing the system, considering the satisfaction of the users, the delays and the load of the network. fig. 8 shows the main idea of madnet network. 10 bulletin of social informatics theory and application issn 2614-0047 vol. 3, no. 1, march 2019, pp. 1-12 hernandez et.al (expand the internet access in an urban park using a wi-fi offloading technique) fig. 8. the main idea of madnet network. user satisfaction: defined the satisfaction ratio (sr) to be rs (t) r (t), where rs (t) is the total number of satisfied requests (download or upload) at time t, and ri (t ) is the total number of requests made by users at time t. sr also evaluated over time in case of unloading (d0d12). to improve readability, show only assessments for d0, d2, d8, d3, d9, d6, d12. as shown in fig. 9, the sr remains stable in each simulation run after two days. fig. 9. variation satisfaction index discharge over time with different configurations. in the same way, they affirm that, in case of video transmission, the requests are always of greater satisfaction than within the 3g network. therefore, the implementation of more access points increases the number of requests satisfied. however, such improvement is not directly proportional to the number of access points deployed. for example, the introduction of 41 aps in 3g networks (i.e., d12) increases the sr by 21.49%, while an improvement of 29.46% is obtained by aggregating 82 aps (i.e., d10) in the city. besides, when implementing many aps (for example, d7), we get a high increase in the average rs of 60.92%, but more than 50% of the aps contribute more than half of the rise. since the threshold also determines the centrality of the deployed pas, they conclude that a more significant number of requests can be met through the strategic deployment of the pas along the central streets of the pa urban area. similar observations can be made for bulk data. however, in this case, if we implement very few aps (for example, d5 and d6), requests cannot be satisfied with the same proportion as in 3g networks. despite this, we found that approximately the same satisfaction index of 3g networks can be obtained through 82 aps. regarding the overall results, they observed that the decrease of the threshold keeps the sr at approximately the same value for both cases. in fact, for a given limit, the presence of cellular networks is the only difference between the two cases. therefore, they conclude that the implementation of more aps (which are gradually placed in less central streets) makes the rs less influenced by cellular networks. issn 2614-0047 bulletin of social informatics theory and application 11 vol. 3, no. 1, march 2019, pp. 1-12 hernandez et.al (expand the internet access in an urban park using a wi-fi offloading technique) the entire importance of the wi-fi offloading technique applied to the design proposed by the authors of this scientific article was evidenced in each of the results mentioned above, which will provide all the technical requirements to satisfy and correct the faults found in the network. wireless and cellular data of the muvdi park of the municipality of soledad atlántico. 5. conclusion the connections through the cellular data network are in constant growth; likewise, the robustness of the applications demand a higher consumption in the bandwidth. to all this, there is the inadequate infrastructure offered by the current internet service providers in the country whose existing coverage solutions fluctuate when visiting different parts of the city as seen in the user equipment. similarly, it occurs in the muvdi park, in which the coverage offered by the isp, as well as the inadequate infrastructure of the current wi-fi-public zone, and changes in the quality of the cellular data network service that shelters the center recreational, impede efficient and stable internet connectivity. given the above, a solution was designed using the wi-fi offloading technique, which is adjusted to meet all the current needs faced by the park's internet service. it also allows all visitors to the recreational center not to agglomerate in a single point looking for a connection opportunity and get lost from the other entertainment offered. thanks to the strategic distribution of access points proposed in the solution, which will provide coverage total in the different areas facilitating a service availability with greater breadth and reliability that generates a pleasant browsing experience for all users and visitors. in the same way, traffic through the 3g and lte networks will decrease, offering savings in the use of user data, which will also benefit the providers of the different cellular networks. as future work, it is expected to implement the complete solution in the park and replicate it in other cultural spaces of the city. another alternative to investigate and enforce wi-fi offloading is through sdn, in which through software the handover can be performed between wi-fi aps and 3g/4g base stations, as jang explains in his research [14]. this solution is called fmsdn (flow management and mobile data using sdn). references [1] xataka mexico, “h, h+, lte... ¿qué significan estos símbolos en la pantalla de mi teléfono?,” movistar 4g lte, 2017. [online]. available: https://www.xataka.com.mx/movistar4glte/h-h-lte-que-significanestos-simbolos-en-la-pantalla-de-mi-telefono. [accessed: 14-oct-2018]. [2] m. wollschlaeger, t. sauter, and j. jasperneite, “the future of industrial communication: automation networks in the era of the internet of things and industry 4.0,” ieee ind. electron. mag., vol. 11, no. 1, pp. 17–27, 2017. [3] s. husnjak, d. peraković, and i. forenbacher, “data traffic offload from mobile to wi-fi networks: behavioural patterns of smartphone users,” wirel. commun. mob. comput., vol. 2018, no. 2608419, 2018. [4] c. ferigra, “proposed design of a mobile data network with wifi solution offload complementary to umts and lte networks, allowing to provide internet service to mobile users through a wifi,” catholic university of santiago de guay, 2017. [5] l. acevedo, “designing wireless solution for downloading data from 3g mobile networks,” santo tomas university, 2015. [6] s. hoteit, s. secci, g. pujolle, a. wolisz, c. ziemlicki, and z. smoreda, “mobile data traffic offloading passpoint over hotspots,” comput. networks, vol. 84, pp. 76–93, 2015. [7] a. r. pawar, s. s. bhardwaj, and s. n. wandre, “mobile data offloading techniques and related issues,” int. j. adv. res. comput. eng. tech., vol. 4, pp. 1367–1371, 2015. [8] j. m. koo, j. p. espino, i. p. armuelles, and b. pérez, “metodología para evaluación de técnicas de data offloading en una red lte,” in twelfth laccei latin american and caribbean conference for engineering and technology (laccei’2014), 2014. [9] r. r. pahlajani and g. r. bamnote, “mobile data offloading the growing need with its solutions and challenges,” int. j. recent innov. trends comput. commun., vol. 2, no. 3, pp. 678–682, 2014. 12 bulletin of social informatics theory and application issn 2614-0047 vol. 3, no. 1, march 2019, pp. 1-12 hernandez et.al (expand the internet access in an urban park using a wi-fi offloading technique) [10] s. dimatteo, p. hui, b. han, and v. o. k. li, “cellular traffic offloading through wifi networks,” in mass ’11 proceedings of the 2011 ieee eighth international conference on mobile ad-hoc and sensor systems, 2011, pp. 192–201. [11] v. a. lambert and c. e. lambert, “qualitative descriptive research: an acceptable design,” pacific rim int. j. nurs. res., vol. 16, no. 4, pp. 255–256, 2012. [12] y. he, m. chen, b. ge, and m. guizani, “on wifi offloading in heterogeneous networks: various incentives and trade-off strategies,” ieee commun. surv. tutorials, vol. 18, no. 4, pp. 2345–2385, 2016. [13] r. s. cheng, c. m. huang, and s. y. pan, “wifi offloading using the device-to-device (d2d) communication paradigm based on the software defined network (sdn) architecture,” j. netw. comput. appl., vol. 112, pp. 18–28, 2018. [14] h. c. jang and c. h. chang, “context aware mobile data offload using sdn,” in 2016 26th international telecommunication networks and applications conference, 2016, pp. 185–190. bulletin of social informatics theory and application issn 2614-0047 vol. 2, no. 1, march 2018, pp. 22-33 22 https://doi.org/ 10.31763/businta.v2i1.103 information system interoperability maturity model bayu koen anggoro a, 1, *, musa hubeis b, 2, illah sailah b, 3 a state university of malang, malang, indonesia b institut pertanian bogor, bogor, indonesia 1 bayu.koen@um.ac.id *; 2 hubeis.musa@yahoo.com; 3 isailah@yahoo.com * corresponding author 1. introduction the development of information systems (is) in the current era of globalization is the result of a digital revolution that changes people and organizations viewpoint within their lives and business sustainability towards information and communication technology (ict). the digital revolution was provoked by numerous high-tech inventions in the '80s that signified as the beginning of the information age. a variety of digital forms of knowledge change everything, from habits to the mindset of people who are increasingly creative and then the knowledge is passed down, disseminated, and managed from generation to generation. in terms of consumer expectations, cost reduction, sustainability, is integration, and transparency is among the fourteen global supply chain system megatrend [1]. those megatrends should always be taken into account by higher education (universities) if they want to survive and obtain added value in the current information knowledge era since all knowledge can be easily obtained from both reliable and responsible sources even anonymously. the use of ict in higher education has grown rapidly. it is not limited to creating and sending e-mails, but also as a means of sharing knowledge that has the aim of increasing the competitiveness of higher education [2]–[8]. college is an education institution which provides and organizes higher education. meanwhile, private college or university is a higher education institution which its organization is administered privately in the form of a legal institution which based on non-profit principle. private college or university is commonly administered by foundations, associations, and other forms in accordance with the provisions of the legislation. law number 12 of 2012 article 59 distinguishes higher education in six forms, namely universities, institutes, colleges, polytechnics, academies, and community academies. the university is a higher education that organizes academic education and a r t i c l e i n f o a b s t r a c t article history received january 11, 2018 revised january 21, 2018 accepted february 10, 2018 management of higher education (he) cannot run if not yet have technological resources that can meet the needs of the campus community and stakeholders. the focus of this research was to look beyond the use of information systems (is) of universities in kopertis iii jakarta on the maturity level of data interoperability, software, communication, and physical is. using the information system interoperability maturity model (isimm), this study resulted in an average level of university located at level 3 (collaborative) indicating the relationship between data was wider to facilitate is, logical data model was shared and used in the data exchange process and no separation or the data sharing impacts on the easy exchange of information. the optimization of is interoperability attributes (ease of access), develops isimm-based roadmap is (planning), determines the main problem solving target (improvement), and improves the quality of is based on importance level were some suggestions that university managers can make in order to advance is. this is an open access article under the cc–by-sa license. keywords interoperability information system maturity level private universities http://creativecommons.org/licenses/by-sa/4.0/ http://creativecommons.org/licenses/by-sa/4.0/ issn 2614-0047 bulletin of social informatics theory and application 23 vol. 2, no. 1, march 2018, pp. 22-33 anggoro et.al (information system interoperability maturity model) can administer vocational education at least 10% in various clusters of science and / or technology. university commonly can administer at least ten study programs and the number of permanent lecturers is at least 6 (six) people (ministry of research, technology and higher education decree number: 2 / m / se / lx / 20l6). in higher education operations, the government requires the development of an integrated ictbased service system as the main database which is expected to be integrated with the higher education data base (pd dikti). it aims at providing data recording of tridharma (three pillars of higher education comprising education, research and community service) activities and students in higher education. furthermore, the data is available as a reference of decision making and accreditation (evaluation) (ministry of research, technology and higher education regulation number 61 of 2016). higher education which was registered at higher education data base up to january 2017 were 4,542 consisting of 415 state-owned higher education and 4,120 private higher education or 90.71% higher education is privately administered. the percentage of private higher education in kopertis region iii is 7.33% of the total universities in indonesia or 8.08% of all private universities in indonesia. kopertis iii jakarta working area can be a picture of private universities with the highest number of higher education institution accreditation (aipt) of higher education national accreditation agency (ban-pt) amounted to 25 universities. universities that already have 6 accredited achievements a, b accredited number 16, accredited c number 3 and not accredited or in the accreditation process totaling 32, meaning more than 50% of private universities have not been accredited by ban-pt until january 2017. the accreditation process of higher education refers to the directorate general of higher education data base as the main database, thus all pts should have an integrated database. there are many forms of integrated ict-based service systems that can support directorate general of higher education data base developed by the academic affair of the university. for instance, an academic information system which is developed by the university. although each university has a different version of the academic information system, essentially the system is similar. it is connected through the internet, intranet, and extranet which serves as databases to track and record students’ academic and administrative development and lecturers’ activities. however, its interoperability has not yet tested. the benefit of information system in the academic affairs of the university is to organize administrative issue during freshmen enrollment, academic data management, courses management, human resources management, and any executive decision-making process which can be conducted effectively and optimally [9]. unfortunately, students only use information system provided to check for the grade, course schedule, and announcement however learning in an information system is way better [10]. in fact, the information system does not maximally organize which most databases of higher education do not satisfy high interoperability and do not align with the higher education database. the information provided is not real-time data and users of the information system do not acquire recent information. the formulation of the problems that arise in the management of the information system can be measured by evaluating the academic and non-academic information system of each university which is connected to the intranet, extranet, and internet networks. model of information system interoperability maturity level (information system interoperability maturity model = isimm) is developed by staden in which the isimm technical attributes have been tested on seven non-profit government organizations in namibia, hence they can be used as a reference for organizational sustainability in optimization end-to-end non-profit organizations such as universities [11]. isimm provides a model to measure the level of information system interoperability maturity for cases such as: (1) interoperability maturity and compliance with an information system in certain environmental conditions such as non-profit organizations; and (2) information interoperability and compliance maturity in pairs, groups, or clusters. the achievement of integrated isimm with knowledge management maturity model (kmmm) is the key to the progress of an organization's information exchange [11], therefore it is useful as an evaluation tool for leaders, technicians, and stakeholders to develop is which has high interoperability. isimm defines the level of sophistication of interoperability that will be achieved by information system organizations. it focuses more on the technical aspects of interoperability in which the details allow the distribution of data designation in 24 bulletin of social informatics theory and application issn 2614-0047 vol. 2, no. 1, march 2018, pp. 22-33 anggoro et.al (information system interoperability maturity model) an information system environment. hence it can provide practical means to assess technical interoperability between information system pairs, groups, or clusters. in addition, it becomes a model for measuring the level of maturity or level of information system interoperability compliance which can be seen in figure 1. fig. 1. interoperability maturity level of information system.  level 1 manual, no connection among information system. data sharing remains conventional such as flash disk, cd. zip, drive, and etc.  level 2 ad-hoc, data sharing is done by using simple electronic means and data sharing between the units or organization is not standardized. application and database are separated and are not shared between the unit or organization.  level 3 collaborative, the relationship between data is broader to facilitate information system. basic level collaboration takes place through program distribution between independent applications. logical data models are divided and used in the process of data exchange which has a common function in exchanging minimal data assignments then applications and databases are separated but the data is not shared.  level 4 integrated, data sharing is arranged for multiple databases and exchanged between applications independently using domain-based sharing models. collaboration used is already at a sophisticated level and service integration systems can already be implemented between organizations or units.  level 5 unified, data and applications can be distributed between organizations or units without obstacle. collaboration at the organizational level can operate continuously through the logic server system. data has command interpretations and is based on models commonly used in sophisticated (systematic) exchange modes. the full back office system becomes a unified system. in the data processing up to confirmation is done automatically with a high level of security [11]. the definition of interoperability according to the indonesian dictionary (kbbi) is the ability of various types of computers, applications, operating systems, and networks to exchange information in a useful and meaningful way. the definition of interoperability is specifically related to the performance of an information system. an information system is the capacity of a product or system whose interface is fully expressed to interact and function with other products or systems, now or in the future, without restrictions on access or implementation [12]. issn 2614-0047 bulletin of social informatics theory and application 25 vol. 2, no. 1, march 2018, pp. 22-33 anggoro et.al (information system interoperability maturity model) fig. 2. interoperability degree. standardization of protocol and system interoperability technology are the key to openness. in the context of business, education, or other high-level networks in higher education, the principles of openness and standardization are implemented with attitudes and gestures that indicate openness so that agreement on cooperation protocols and guarantees of implementation in the field can be facilitated centrally [13]. there are three stages in the formation of value creation network in academic sphere namely, facist, logical, and social. table 1. the formation of value creation network stages aspect stage 1 stage 2 stage 3 facist logical social compliance network interconnection infrastructure and electronic content development content management and interoperability between content processing applications value creation process based on social interaction requirement the local fascist network is ready: the material or substance that will be digitized is available content management applications already exist; mastery of cross-application interoperability technology the creation process at the local level has been running; motivational similarities ; and the economies of scale need for the values generated by the network has been fulfilled 2. method this study took five universities in kopertis iii jakarta and started from february to june 2017. the data processing was ended in august 2017. it employed descriptive design with a case study approach in private universities which focus on isimm level. it employed observation method on the official page of universities, higher education database, national accreditation agency for higher education, and kopertis iii jakarta. next, an in-depth interview and close-ended questionnaire to the university’s board of director, person in charge, and information system builder was conducted. from the identification, it obtained data that can classify problems encountered by the university which is worth evaluating. the snowball method was applied to respondents who completed isim instrument questionnaires, this method was used the limited insight of the researcher regarding the builder or person in charge of ict or the developer of information system in each university. therefore, by asking directly to the boards of the director is expected to deliver an appropriate recommendation to ict and information system developer of the university. isimm was used to measure the level of mastery of a university's information system in developing an ict-based information system. the four layers of interoperability developed by staden, became the main reference, namely data conditions, software, communication systems, and physical devices used [11]. it measured the level of interoperability in pairs, groups, and clusters. thus, the university's information system can be classified in the levels of maturity explained above i.e. manual, ad-hoc, collaborative, integrated, or unified. isimm analysis technique produces an integrated one information system with another information system, in this case is information system of higher education database with private university information system, then the information system is used pairs, groups, or clusters that indicate the level or degree of maturity. the level of capacity can be distinguished according to the information system work field such as data, software, communication, and physical conditions which 26 bulletin of social informatics theory and application issn 2614-0047 vol. 2, no. 1, march 2018, pp. 22-33 anggoro et.al (information system interoperability maturity model) can explain that the higher interoperability of information system, the less human intervention in the system. the range values for each maturity level are shown in the upper part of table 2 (for example 1-4, 5-7, 8-10, 11-13, 14>) then the overall compliance rating is shown below the expected range value at the respective compliance level layers of interoperability (i.e., d, s, c, and p) are defined from table 3. the functional compatibility of basic interoperability required for each attribute of each layer of interoperability is shown in table 2 with "e" = expected, " a "= exceeds target (above), and" b "= not according to target (below). table 2. isimm matrix and functional compatibility code interoperability layers and attributes level of interoperability manual ad-hoc collaborative integrated unified (1–4) (2) (5–7) (6) (8–10) (9) (11–13) (12) (14>) (15) d data interoperability 1 2 4 5 5 1 common data presentation format e e e e e 2 share meta-content e e e 3 common data model e e e 4 data security e e e e 5 shared data e e s software interoperability 1 2 3 5 8 6 n-tier common interoperability e e 7 data exchange services e e e e e 8 directory services e 9 common naming services e 10 discovery services e e e 11 common workflow services e 12 security management services e e e e 13 share application e e c communication interoperability 0 1 1 1 1 14 common communication protocols e e e e p physical interoperability 0 1 1 1 1 15 share communication network e e e e table 3. isimm grading matrix example code interoperability layers and attributes interoperability capability d data interoperability 2 1 common data presentation format √ 2 share meta-content (data about data contents) 3 common data model 4 data security: ownership, rights, and auditing √ 5 shared data s software interoperability 4 6 n-tier common interoperability architecture √ 7 data exchange services √ 8 directory services 9 common naming services 10 discovery services √ 11 common workflow services 12 security management services √ 13 share application c communication interoperability 1 14 common communication protocols √ p physical interoperability 1 15 share communication network √ total rating 8 √ = done – = not yet issn 2614-0047 bulletin of social informatics theory and application 27 vol. 2, no. 1, march 2018, pp. 22-33 anggoro et.al (information system interoperability maturity model) the stages of isimm analysis techniques were determining the target level of private university information system interoperability in short-term, medium-term, and long-term. the second step was to use data in table 3 as recent grading instrument for pairs, groups, and clusters which in the end it completed table 2 for each technical mastery. after determining recent condition and defining the desired circumstance, roadmap to achieve goal settled in the first step was developed. 3. result and discussion information system achievement on the maturity level of interoperability is the achievement of mp within the organization [11]. therefore, mp management advancement within an organization is reflected in the maturity level of the information system interoperability. the information system in the five universities studied is sufficient, however it was found that there is a minor obstacle when accessing a1, a2, and a4 university information system. furthermore, information and knowledge obtained from digital libraries, repositories, academic information systems, e-learning services, evaluation of teaching and learning processes, research and students’ creativity project (pkm), and higher education database are beneficial to improve services at the university since it is in accordance with the standards and results expected from the information system service except for e-learning services at a2 university. in terms of ease of access, the boards of director assumed that it was still difficult to access the mp or information system portal of the university, especially the universities a1, a2 and a4. university entities should log in to different information system since the account is not integrated into one system. in terms of benefits and expectations, information system services have a high level of benefits and meet the expectations of users. there4fore, the information obtained is in accordance with the expectation of obtaining the information. only at the university a2 e-learning service that is still not in line with expectations due to difficult access or due to technical problems are shown at table 4. table 4. university mp facility condition no mp condition towards is a1 a2 a3 a4 a5 1 adequate is facility √ √ √ √ √ 2 accessbility √ √ 3 information and knowledge obtained from the following applications are useful for improving services at universities a. digital library √ √ √ √ √ b. repository √ √ √ √ √ c. academic information system √ √ √ √ √ d. e-learning √ √ √ √ √ e. learning teaching evaluation process √ √ √ √ √ f. research and students’ creativity project database √ √ √ √ √ g. higher education database √ √ √ √ √ 4 a. the information and knowledge generated by the following application is as expected b. digital library √ √ √ √ √ c. repository √ √ √ √ √ d. academic information system √ √ √ √ √ e. e-learning √ √ √ √ f. learning teaching evaluation process √ √ √ √ √ g. research and students’ creativity project database √ √ √ √ √ h. higher education database √ √ √ √ √ mean percentage 93,75% 87,5% 100% 93,75% 100% √ = done – = not yet the university information system which focuses on managing ict-based tridharma (three pillars of higher education comprising education, research and community service) as its facilities can be seen in the is collaboration matrix. is collaboration matrix is pairing each is digital library, repository, academic information system, e-learning service, evaluation of teaching and learning process, research and students’ creativity project database, and higher education database using isim attributes so that each is collaboration can be mapped as in table 5. 28 bulletin of social informatics theory and application issn 2614-0047 vol. 2, no. 1, march 2018, pp. 22-33 anggoro et.al (information system interoperability maturity model) table 5. collaboration matrix of university is information system is-1 is-2 is-3 is-4 is-5 is-6 university a1 is-1 is-2 √ is-3 – – is-4 √ – – is-5 √ √ – √ is-6 – – – – √ university a2 is-1 is-2 √ is-3 – – is-4 √ – – is-5 √ √ – √ is-6 – – √ – √ university a3 is-1 is-2 √ is-3 √ √ is-4 √ √ √ is-5 √ √ – √ is-6 – – √ – √ university a4 is-1 is-2 √ is-3 – – is-4 √ √ – is-5 √ √ √ √ is-6 – – √ – √ university a5 is-1 is-2 √ is-3 √ √ is-4 √ √ √ is-5 √ √ √ √ is-6 – – √ – √ √ = collaborated – = not collaborated is-1 = digital library is-2 = repository is-3 = academic is-4 = e-learning is-5 = research and students’ creativity project database is-6 = higher education database issn 2614-0047 bulletin of social informatics theory and application 29 vol. 2, no. 1, march 2018, pp. 22-33 anggoro et.al (information system interoperability maturity model) the information system of the digital library, repository, and e-learning service (e-learning, ebook, e-thesis, e-paper, and etc.) which is part of the learning system in the current condition collaborate with research and students’ creativity project database so that the is is connected to each other in each university. academic information system means percentage is the lowest internal information system collaboration, as much as 48%. higher education database as an external information system in four universities obtained a similar percentage of 40%, while only a1 university obtained 20%. research and students’ creativity project database in a4 and a5 universities obtained the highest percentage of 88%. it means that the information system highly collaborates. repositories and e-learning services obtained an average of 60% meaning that two of the five iss that are paired do not have collaboration with repositories or e-learning services shown in table 6. table 6. university is collaboration percentage university is collaboration percentage (%) a1 a2 a3 a4 a5 mean digital library 60 60 80 60 80 68 repository 40 40 80 60 80 60 academic 0 20 80 40 100 48 e-learning 40 40 80 60 80 60 research and students’ creativity project database 80 80 80 100 100 88 higher education database 20 40 40 40 40 36 university mean 40 47 73 60 80 60 a5 university information system high collaboration level reaches an average of 80%, showing a high correlation between data and information between iss, so that the use of the database becomes very massive. whereas at the a1 university, the level of collaboration is below 50% or only 40%. it is caused by academic is which is separately running or having its own database. hence, it is not integrated with other is and as a result, academic data used by other is both internal and external are administered manually in data synchronization. the facilities owned by the entire universities, both academic and non-academic are sufficient. however, in a1, a2, and a3 universities, access to knowledge is obstructed. this is due to the development of a prototype which not all entities have an access to it or several entities have a different level of access. digital libraries, repositories, and e-learning services which are part of the learning system which currently has collaboration with research and students’ creativity project database, so that inter iss in each university are connected. the description of is university collaboration at the interoperability maturity level is shows the level of effectiveness of is services in supporting the initiation, process and implementation as well as the sustainability of university management. isimm's focus on is interoperability is technically in the following areas: (1) data interoperability: showing the different software capabilities of heterogeneous is to understand the syntactic and semantic meaning of data from different data models through the general use of the model data, data mapping, and data structures; (2) software interoperability: refers to different software capabilities used by organizations to work together in exchanging and sharing data by solving differences among them; (3) communication interoperability: shows the ability of the system to connect and communicate through public protocols; and (4) physical interoperability is the ability of different computers hardware, network devices, and peripherals to work in a connected way [11]. table 7. university is interoperability percentage interoperability layer percentage mean (%) a1 a2 a3 a4 a5 data 60 100 100 100 100 92 software 62.5 75 100 75 100 82.5 communication 100 100 100 100 100 100 physical 100 100 100 100 100 100 findings percentage 80.63 93.75 100 93.75 100 93.63 30 bulletin of social informatics theory and application issn 2614-0047 vol. 2, no. 1, march 2018, pp. 22-33 anggoro et.al (information system interoperability maturity model) the interoperability percentages of is in university a1, a2, a3, a4, and a5, are 80.63%, 93.75%, 100%, 93.75%, and 100%. in table 8 respectively, indicates that the total interoperability level of is university a3 and a5 is very good. all systems are connected and already have a database system hence there is no repetition or duplication of data and all academic is references, tridharma, repositories, kms, etc. have only one source. all universities have high is interoperability in communication interoperability (c) and physical (p) while the constraints on data interoperability (d) are only found in university a1. then there is an obstacle in software interoperability (s) at university a1, a2, and a4 but overall the level of is interoperability of the university has been very good, which is above 90%. analysis through pairing approach, table 5 and 6 serve as the basis of examining is collaboration in each university. the pairing analysis is presented as follows:  pairing 1 (p1)= digital library and research and students’ creativity project database  pairing 2 (p2)= repository and research and students’ creativity project database  pairing 3 (p3)= digital library and research and repository  pairing 4 (p4)= academic and research and students’ creativity project database  pairing 5 (p5)= higher education database and research and students’ creativity project database  pairing 6 (p6)= e-learning and research and students’ creativity project database  pairing 7 (p7)= e-learning and digital library  pairing 8 (p8)= higher education database and academic while the target of is interoperability in each university is presented in table 7 and is pairing analysis is presented in the table 8. from the results of isimm analysis on is paired universities in table 6, it can be explained that the average of interoperability on a1 university is is 6 at 2e of level 2 (ad-hoc). it means that the level is low. data and information sharing use simple electronic means and it is not standardized. in addition, the databases and applications are separated, particularly in p1, p2, p4, and p6. the manual approach is used in p5 and p6 since the internal system is not in accordance with the external system. the data transfer is used manual means such as flash disk. while p3 and p7 are higher at the level of 3: collaborative. at university a2, the average grade of is pairing total rating is 8 at 3b of level 3. it is defined as collaborative below the target. it means that is pairing at university a2 has an average interoperability which program distribution among application is administered independently. also, application and database are separated and not divided. it is below the target since c and p obtained 0.8 in which at the level of 1b where p5 and p8 are manually administered. p2 and p7, meanwhile, at the high interoperability or in the level of 4 (integrated). medium level or level of 3 are p4, p1, p2, and p6. at university a3, p7, p1, p2, p3, and p4 are at the level of 4 (integrated). it is considered having high interoperability. then, p6 reached the level of 3 or at the collaborative stage. while p5 and p8 are at the same level as university a1 and a2. overall, university a3 is at a collaborative level in accordance with the target. having almost similar level with university a1, university a4 reaches 7.1 total rating and is at the level of 2 (ad-hoc) which obtained d and s average value higher, 2.8 and 2.9. however, is interoperability of p7, p3, p4, p1, p2, and p6 are at the level of 3 or collaborative. at university a5, the total score is 9.6 or at the level of 3 (collaborative) above the target. p3 and p7 are the highest with the score of 13 (level 4a), followed by p1 and p2 with the score of 12 (level 4e), p6 with the score of 11 (level 4b), p4 with the score of 10 (level 3a), and p5 and p8 which are similar to university a1. issn 2614-0047 bulletin of social informatics theory and application 31 vol. 2, no. 1, march 2018, pp. 22-33 anggoro et.al (information system interoperability maturity model) table 8. maturity level and interoperability of university is interoperability layers interoperability level and grade mean p1 p2 p3 p4 p5 p6 p7 p8 university a1 data 2a 2a 3e 2e 1e 2e 3e 1e 2e 2 2 3 1 2 2 3 2 2.1 software 3e 3e 3a 3e 1b 2e 2b 1b 2e 3 3 4 3 0 3 3 0 2.4 communication 2e 2e 3e 2e 1b 2e 3e 1b 1b 1 1 1 1 0 1 1 0 0.8 physical 2e 2e 3e 2e 1b 2e 3e 1b 1b 1 1 1 1 0 1 1 0 0.8 total rating 2a 2a 3e 2e 1e 2a 3b 1e 2e 7 7 9 6 2 7 8 2 6 university a2 data 3e 3e 3e 3e 2e 3e 4b 2e 2a 4 4 4 4 2 4 4 2 3.5 software 3e 3e 4a 4b 1b 3b 4e 1b 3e 3 3 6 4 0 3 5 0 3 communication 3e 3e 4e 3e 1e 3e 4e 1e 1b 1 1 1 1 0 1 1 0 0.8 physical 3e 3e 4e 3e 1e 3e 4e 1e 1b 1 1 1 1 0 1 1 0 0.8 total rating 3e 3e 4e 3a 1e 3e 4b 1e 3b 9 9 12 10 2 9 11 2 8 university a3 data 3e 4e 3e 4e 2e 2a 4e 2e 2a 4 5 4 4 2 3 4 2 3.5 software 4e 4e 4a 4e 1b 4e 5b 1b 3a 5 5 6 5 0 5 7 0 4.1 communication 4e 4e 4e 4e 1e 3e 4e 1e 1b 1 1 1 1 0 1 1 0 0.8 physical 4e 4e 4e 4e 1e 3e 4e 1e 1b 1 1 1 1 0 1 1 0 0.8 total rating 4b 4e 4e 4b 1e 3a 4a 1e 3e 11 12 12 11 2 10 13 2 9.1 university a4 data 3b 3b 3b 3b 2e 3b 3b 2e 2a 3 3 3 3 2 3 3 2 2.8 software 3e 3e 4e 3e 1e 3e 4e 1e 2a 3 3 5 4 0 3 5 0 2.9 communication 3e 3e 3e 3e 1e 3e 3e 1e 1b 1 1 1 1 0 1 1 0 0.8 physical 3e 3e 3e 3e 1e 3e 3e 1e 1b 1 1 1 1 0 1 1 0 0.8 total rating 3b 3b 3a 3e 1e 3b 3a 1e 2a 8 8 10 9 2 8 10 2 7.1 university a5 data 4e 4e 4e 2a 2e 3e 3e 2e 3b 5 5 5 3 2 4 4 2 3.8 software 4e 4e 4a 4e 1b 4e 5b 1e 4b 5 5 6 5 1 5 7 1 4.4 communication 4e 4e 4e 3e 1e 3e 4e 1e 1e 1 1 1 1 0 1 1 0 0.8 physical 4e 4e 4e 3e 1e 3e 4e 1e 1e 1 1 1 1 0 1 1 0 0.8 total rating 4e 4e 4a 3a 1a 4b 4a 1a 3a 12 12 13 10 3 11 13 3 9.6 interoperability maturity level: level 1 manual, level 2 ad-hoc, level 3 collaborative, level 4 integrated, and level 5 unified. conformity level in each maturity: e = expected, a = exceeds target (above), and b = does not meet the target (below). 32 bulletin of social informatics theory and application issn 2614-0047 vol. 2, no. 1, march 2018, pp. 22-33 anggoro et.al (information system interoperability maturity model) in the isimm, individual, pairs, and clusters analysis produce the level of is interoperability maturity in each university. the average achievement of isimm in each university results from the average interoperability value in the isimm matrix and the functional suitability of the interoperability layer and it is described in table 9. table 9. the average of maturity level of university is interoperability university maturity level and interoperability value of information system mean individual p1 p2 p3 p4 p5 p6 p7 p8 cluster a1 3a 2a 2a 3e 2e 1e 2a 3b 1e 3b 2e 10 7 7 9 6 2 7 8 2 7 6.5 a2 4a 3e 3e 4e 3a 1e 3e 4b 1e 3e 3e 13 9 9 12 10 2 9 11 2 8 8.5 a3 5a 4b 4e 4e 4b 1e 3a 4a 1e 4e 3a 15 11 12 12 11 2 10 13 2 12.1 10.01 a4 4a 3b 3b 3a 3e 1e 3b 3a 1e 3e 3b 13 8 8 10 9 2 8 10 2 9.3 7.93 a5 5a 4e 4e 4a 3a 1a 4b 4a 1a 5b 3a 15 12 12 13 10 3 11 13 3 13.9 10.59  isimm pairing analysis: digital library and research and students’ creativity project database (p1), repository and research and students’ creativity project database (p2), digital library and repository (p3), academic and students’ creativity project database (p4), higher education database and students’ creativity project database (p5), e-learning and students’ creativity project database (p6), e-learning and digital library (p7), and higher education database and academic (p8).  interoperability maturity level: level 1 manual, level 2 ad-hoc, level 3 collaborative, level 4 integrated, and level 5 unified.  compatibility level of each maturity level: "e" = expected, " a "= exceeds target (above), and" b "= does not meet the target (below). in general, isimm level in pairs and clusters at the university are influenced by the external information system. it is described at a low level of interoperability at the higher education database information system, because it still uses manual methods in data transfer which provides opportunities for input errors and data duplication. then, at the internal level of university, good cooperation among databases is established, particularly at university a3 and a5. the two universities employ one database for the entire academic and non-academic necessities which require high interoperability. mapping and determining the isim achievement targets of each is makes it easier to solve interoperability problems that occur between is. the increasing interoperability of is in the isim attribute of the predetermined target gives an overview of the level of seriousness of the boards of director and academicians in developing is-based mp. 4. conclusion mapping the level of importance and expectation in the is interoperability attribute provides an overview of the current university position and helps managers to determine the priority of mp development in the future. kopertis iii jakarta can develop is with high interoperability that is connected to the university database, thus it offers easy monitoring, assessment, and providing recommendations related to assistance and consultation on university capacity development. the limited collaboration of external and internal is only make the interoperability of all universities reached at the level of 3. meanwhile, assessment on internal is indicates that university a3 and a5 are at the level of 5, university a2 and a4 are at the level of 4, and university a1 is at the level of 3. responding to the challenges of future of information system, it needs the recent, fast, resilient and large capacity to enhance the unified level of interoperability. future research is expected to be more detailed in investigating ict-based information system, particularly in the model and roadmap along with its financial arrangement. thus, it can be explored comprehensively, in addition to being a reference for stakeholders in financing and cooperation planning. issn 2614-0047 bulletin of social informatics theory and application 33 vol. 2, no. 1, march 2018, pp. 22-33 anggoro et.al (information system interoperability maturity model) references [1] w. kersten, b. von see, and h. skirde, “identification of megatrends affecting complexity in logistics systems,” in next generation supply chains: trends and opportunities, w. kersten, t. blecker, and c. ringle, eds. berlin: epubli gmbh, 2014, pp. 3–27. [2] s. w. h. l. hendric, “analisa dampak investasi teknologi informasi proyek data warehouse pada perguruan tinggi swasta dengan metode simple roi,” j. inform., vol. 9, no. 2, pp. 101–108, 2010. [3] j. schmidt-wilk, d. p. heaton, and d. steingard, “higher education for higher consciousness: maharishi university of management as a model for spirituality in management education,” j. manag. educ., vol. 24, no. 5, pp. 580–611, 2000. [4] u. rusilowati, “analisis manajemen pengetahuan berbasis teknologi informasi: studi kasus pada lemlitbang pemerintah pengambil kebijakan,” j. organ. dan manaj., vol. 11, no. 1, pp. 44–61, 2017. [5] j. rowley, “is higher education ready for knowledge management?,” int. j. educ. manag., vol. 14, no. 7, pp. 325–333, 2000. [6] m. mustafid, “sistem business intelligence untuk mendukung perguruan tinggi yang kompetitif,” j. sist. inf. bisnis, vol. 3, no. 1, pp. 18–24, 2016. [7] f. s. d. kusuma, “analisa pengaruh knowledge management terhadap keunggulan bersaing dan kinerja perusahaan,” bus. account. rev., vol. 1, no. 2, pp. 161–171, 2013. [8] r. s. dlamini, “the evolution of information technology executive position in higher education: the strategic and adaptive chief information officer in higher education,” ohio university, 2011. [9] s. aswati, n. mulyani, y. siagian, and a. z. syah, “peranan sistem informasi dalam perguruan tinggi,” j. teknol. dan sist. inf., vol. 1, no. 2, pp. 79–86, 2015. [10] murdiyati, “peranan teknologi informasi/sistem informasi dalam menunjang proses belajar mengajar: studi kasus stmik mikroskil medan,” universitas indonesia, 2008. [11] s. van staden, “e-government interoperability: a cooperative architecture model to facilitate information sharing in namibia,” university of namibia, 2011. [12] v. chapurlat and n. daclin, “system interoperability: definition and proposition of interface model in mbse context,” ifac proc. vol., vol. 45, no. 6, pp. 1523–1528, 2012. [13] l. e. nugroho, “kerangka pengembangan pendidikan tinggi di indonesia,” 2013. [online]. available: http://lukito.staff.ugm.ac.id/files/2013/02/pemanfaatan-ti-di-perguruan-tinggi-final.pdf. [accessed: 02feb-2017]. bulletin of social informatics theory and application issn 2614-0047 vol. 1, no. 2, december 2017, pp. 72-78 72 https://doi.org/10.31763/businta.v1i2.30 application level interoperability on iaas cloud migration soffa zahara 1,*, surya sumpeno 2, istas pratomo 3 faculty of electrical engineering institut teknologi sepuluh nopember surabaya 1 soffa.zahara@gmail.com *; 2 surya@ee.its.ac.id; 3 istaspra@ee.its.ac.id * corresponding author 1. introduction the increasing awareness of people about the several benefits using cloud computing technology caused a lot of organizations, companies, and agencies are switching from the use of physical infrastructure for their system which already known there are a lot of shortcomings such as the amount of maintenance costs to be incurred to manage the system to cloud computing technology. actually, the infrastructure cost is not only the main reason for displacement of local infrastructure to the cloud, but also flexibility, disaster recovery, security and the others. certainly, each company must have their own reasons when decide to move their infrastructure from local to cloud. considering the strong market enthusiastic about cloud computing, cloud companies were racing competitions offer the best products with various advantages such as a more affordable price, higher performance, and better service level assurance (sla) and security system. in the process of utilizing cloud computing technology there are circumstances in which the company wants to move its infrastructure to other providers cloud caused by various aspects above to new targeted cloud provider in order to meet better expectations of the company. however, there are many obstacles in practice in the process of transfer system between two different environment or can be called migration. there are a lot of possibilities that could become obstacles when migrating to other cloud provider. one of them is a vendor lock-in. vendor lockin is a situation where the user of a product depends on the provider and cannot switch to another provider without the huge costs and longtime duration [1]. in the process of migration or movement from one system to another, especially in cloud computing environments interoperability becomes an important factor [2]. interoperability cloud is an easy migration and integration of applications and data between providers of cloud computing services a r t i c l e i n f o a b s t r a c t article history received october 4, 2017 revised october 30, 2017 accepted november 14, 2017 the increasing awareness of people about several benefits using cloud computing technology caused a lot of organizations, companies, and agencies are switching from utilizing physical infrastructure to cloud infrastructure, especially iaas. considering the strong market enthusiastic about cloud computing, cloud companies were racing competitions offer the best products with various advantages. in the process of utilizing cloud computing technology there are circumstances in which the company wants to move its infrastructure to other cloud providers caused by various aspects in order to meet better expectations of to the new provider. however, there are many obstacles in practice in the process of transfer system between two different environment or can be called migration. one of them is a vendor lock-in that caused system cannot be function properly especially application functionality after migration. this paper introduces improvement method of testing interoperability between systems that were migrated between different cloud providers which use different hypervisor technology. we also conduct interoperability application testing between several cloud providers. this is an open access article under the cc–by-sa license. keywords cloud migration iaas interoperability virtual machine http://creativecommons.org/licenses/by-sa/4.0/ http://creativecommons.org/licenses/by-sa/4.0/ issn 2614-0047 bulletin of social informatics theory and application 73 vol. 1, no. 2, december 2017, pp. 72-78 zahara et.al (application level interoperability on iaas cloud migration) [3], [4]. the emergence of vendor lock-in problem is caused by many cloud providers have different format and type of systems construction that restrict the possibility of application migration between cloud providers. in addition, the unavailability of methods to test the level of interoperability between the two systems that migrate in infrastructure as a service (iaas) cloud environment at the level of application functionality led to many organizational difficulties to determine the level of interoperability of target cloud systems when migrating. the goal of this study is to introduce the development method to measure the level of interoperability especially application functionality when migrating between two different cloud provider. it also provides an analysis of test results in terms of technology, risk, and cost. the benefits of this research is to give a reference method interoperability testing migration between cloud systems that are more specific to the application functionality so can be implemented in real migration between cloud providers. 2. interoperability and cloud migration theory barry sosinsky in his book defines cloud computing as a set of applications and services running and operate in a distributed network or scattered by utilizing virtual resources and internet standards [5]. there are two types of models of cloud computing of deployment models and service models [3]. deployment model is a model of cloud computing that describes the location, purpose, and management of cloud infrastructure. while the service model consists of various types of cloud computing services offered. this model adopted from nist (national institute of standards and technology) which separates into 2 cloud computing services like those mentioned. fig. 1. nist cloud computing model [5] virtualization is a key technology enabling the emergence of cloud computing paradigm. mechanical virtualization allows multiple operating systems to run simultaneously on one physical machine [6]. cloud computing comes from two important concepts, the first is the concept of abstraction which hides detail implementation of the system as users do not know where the physical devices are accessible and the second is virtualization concepts which unite and divide the available resources[5]. virtualization techniques are used when users access to the resources that are attached. virtual machine migration is one of the virtualization capability allows a system where applications can be moved transparently from one physical host to another without losing the features [6]. in general, the migration is done by moving transfer the application along with all virtual machine system including cpu, memory, disk from the system origin to the destination system [7]. besides its use for managing resources and their applications in data center environments and virtualized cloud system, virtual machine migration also allows the system to dynamically relocate to another system that has a faster execution and more reliable. in the process of migrating from one system to another, especially in cloud computing environments interoperability becomes an important factor. cloud interoperability refers to the ease of migration and application integration, data and workloads between cloud service providers [3]. vendor lock-in is a situation where the user of a product depends on the provider and cannot switch to another provider without the huge costs and a long time [1]. one way to overcome the problem of vendor lock-in that is making interoperability standards to support easy migration of workloads, applications, data from one cloud provider to another provider [1]. 74 bulletin of social informatics theory and application issn 2614-0047 vol. 1, no. 2, december 2017, pp. 72-78 zahara et.al (application level interoperability on iaas cloud migration) lewis defines four basic interoperability in the case of cloud computing environments [8]. first, authentication user. each user must be identified in a cloud environment. second, workload migration. its indicate vm image migration from one cloud provider to another. there is a need to extract workloads in source cloud then upload it to target cloud. third, migration data, when the data has been transferred to the new provider cloud, entire programs that perform crud (create, retrieve, update, delete) in the previous cloud should be able to conduct such operations at a new cloud provider. fourth, workload management is a workload system built in a cloud environment. there are several methodology about cloud migration : 1. cloud-rmm(cloud-reference migration model)[9] table 1. cloud-rmm migration methodology process task planning feasibility study, migration requirement analysis, decisions of provider and services, migration strategies execution code modification, architecture extraction, data extraction, transformation evaluation deployment, testing, validation crosscutting concerns governance, security, training, effort estimation, organizational change, multitenancy 2. artist(advanced software-based service provisioning and migration of legacy software)[9] table 2. artist methodology process task pre-migration migration feasibility assesment migration application discovery & understanding and migration provisioning testing, verification, & certification 3. tiosa(testing vm interoperability at an os and aplication level)[10] fig. 2. tiosa methodology tiosa (vm interoperability testing at an os and application level) is a method to measure system interoperability between two different hypervisor. hypervisor is software that maintains virtual machine in one physical server or can be called virtual machine monitor [10]. tiosa method only test the interoperability at the level of the hypervisor and operating system, and have not been tested at the level of certain applications running on the system that were migrated. issn 2614-0047 bulletin of social informatics theory and application 75 vol. 1, no. 2, december 2017, pp. 72-78 zahara et.al (application level interoperability on iaas cloud migration) 3. system design the research method used in this study is adapting tiosa method. the difference from the method tiosa are the developed method is implemented in the actual cloud migration, namely on commercial cloud hosting and system migration process is done two times, the first from physical server to a source cloud and the second is from source cloud to the target cloud also there are additional application functionality tests in this research. fig. 5 depicts the proposed new interoperability method testing of virtual machine migration. convert system image import system image application functionality test source cloud target cloud evaluate the result application functionality test import system image convert system image physical server application functionality test fig. 3. proposed new method application functionality test is the first to be done in physical server before migrated to the source cloud, the objective in this step is to ensure all the application process functioned properly, then start to convert system or virtual machine image appropriate with standard system image that used in source cloud. system image conversion process can be automated and manual. when the import system process in source cloud is successful, we performed application functionality test to ensure functionality running according to the original system on the physical server. once the application functionality testing phase is complete, the system service will be discontinued in the cloud resources to begin the process of convert image and migrating to target cloud. the conversion process is done the system image using the tools available that are tailored to the type of source and destination cloud provider. system image conversion process can be automated and manual. the import process is done after the entire configuration system in the cloud destinations is ready to do the import process image of cloud resources. the import process the image in this stage can be automatically or manually according to the type of cloud resources and cloud-purpose use. after the import stage system image is accomplished, all services on systems that have migrated starts, including applications that will be tested functionality. functionality testing applications on cloud has a goal of using the same testing components by testing in the physical server and source cloud. the goal is to verify the functionality of the application. once the entire migration testing data collected will be determined according to the level of interoperability parameters predetermined size. for every possible migration will be classified according to the level of interoperability of applications. in this phase will also be analyzed in terms of risk and cost for every possible migration do. there are two kinds of cloud infrastructure will be testing. the first is the migration cloud infrastructure between amazon elastic cloud 2 (ec2) which the types of hypervisor used is xen and indonesian cloud where the hypervisor used is vmware vcloud air. 76 bulletin of social informatics theory and application issn 2614-0047 vol. 1, no. 2, december 2017, pp. 72-78 zahara et.al (application level interoperability on iaas cloud migration) virtual machine operating system appllicationphysical server source cloud (amazon ec2) target cloud 2(google cloud engine) virtual machine operating system appllication virtual machine operating system appllication virtual machine operating system appllication migration migration migration target cloud 1 (indonesian cloud) fig. 4. proposed testing environment for the second cloud migration is between amazon elastic cloud (ec2) which the types of hypervisor used is xen and google compute engine that uses kvm as its hypervisor. the migration scenario in this research: 1. migration from amazon ec2 cloud to indonesian cloud a. testing the application functionality on the physical server b. migration virtual machine image from a physical server to amazon ec2 server c. testing the application functionality d. migration virtual machine image from the amazon ec2 server to the indonesian cloud e. testing the functionality of the application on the indonesian cloud server 2. migration to amazon ec2 to google compute engine a. testing the application functionality on the physical server b. migration virtual machine image from a physical server to amazon ec2 server c. testing the application functionality d. migration virtual machine image from the amazon ec2 server to the google cloud engine e. testing the functionality of the application on the google cloud engine 4. results and discussion based on the experiment that have been done, the result below describe about application interoperability testing cloud result between two cloud providers, amazon ec2 as source cloud and indonesian cloud as target cloud. indeed, we also perform the cloud testing migration between issn 2614-0047 bulletin of social informatics theory and application 77 vol. 1, no. 2, december 2017, pp. 72-78 zahara et.al (application level interoperability on iaas cloud migration) amazon ec2 and google compute engine. however there are several obstacles that had not been resolved yet especially about converting image problem between amazon ec2 and google compute engine. so the result below just performs the first migration scenario between amazon ec2 and indonesian cloud. table 3. evaluation result id test success warning failure migration from physical server to amazon ec2 1.1 vm lifecycle 1.1a start success 1.1b shutdown success 1.1c restart success 1.2 application functionality 1.2a functionality success 1.2b non functionality success migration from amazon ec2 to indonesian cloud 2.1 vm lifecycle 2.1a start success 2.1b shutdown success 2.1c restart success 2.2 application functionality 2.2a functionality success 2.2b non functionality website banner cannot be seen migration from amazon ec2 to google compute engine 3.1 vm lifecycle 3.1a start success 3.1b shutdown success 3.1c restart success 3.2 application functionality 3.2a functionality success 3.2b non functionality success table 4. overall evaluation result id test success warning failure 4.1 vm lifecycle 4.1a amazon ec2 to indonesian cloud success 4.1b amazon ec2 to google compute engine success 4.2 application 4.2a amazon ec2 to indonesian cloud warning 4.2b amazon ec2 to google compute engine success overall status warning the result indicate that after system migration there was a problem with application especially application non functionality, the problem that appear was the website banner cannot be seen in indonesian cloud server when the website was accessed which result the status of application test is warning. in this paper we proposed further development method for interoperability testing between the two cloud provider systems that migrate on different hypervisors which the improvement aspect is application functionality. this method can be used by organizations that want to test the interoperability between real cloud systems. 78 bulletin of social informatics theory and application issn 2614-0047 vol. 1, no. 2, december 2017, pp. 72-78 zahara et.al (application level interoperability on iaas cloud migration) references [1] j. opara-martins, r. sahandi, and f. tian, “critical review of vendor lock-in and its impact on adoption of cloud computing,” in international conference on information society (i-society 2014), 2014, pp. 92– 97. [2] s. dippl, m. c. jaeger, a. luhn, a. shulman-peleg, and g. vernik, “towards federation and interoperability of cloud storage systems,” in cloud technology: concepts, methodologies, tools, and applications, 2015, pp. 423–434. [3] s. dowell, a. barreto, j. b. michael, and m. t. shing, “cloud to cloud interoperability,” in system of systems engineering (sose), 2011 6th international conference, 2011, pp. 258–263. [4] t. dillon, c. wu, and e. chang, “cloud computing: issues and challenges,” in advanced information networking and applications (aina), 2010 24th ieee international conference, 2010, pp. 27–33. [5] b. sosinsky, cloud computing bible. indianapolis, indiana: wiley publishing, inc., 2011. [6] a. strunk and w. dargie, “does live migration of virtual machines cost energy?,” in advanced information networking and applications (aina), 2013 ieee 27th international conference, 2013, pp. 514–521. [7] c. clark et al., “live migration of virtual machines,” in proceedings of the 2nd conference on symposium on networked systems design & implementation-volume 2, 2005, pp. 273–286. [8] g. a. lewis, “role of standards in cloud-computing interoperability,” in 2013 46th hawaii international conference on system sciences (hicss), 2013, pp. 1652–1661. [9] a. w. pappas, “migration of legacy applications to the cloud: a review on methodology and tools for migration to the cloud,” umeå university, 2014. [10] a. lenk et al., “tiosa: testing vm interoperability at an os and application level--a hypervisor testing method and interoperability survey,” in cloud engineering (ic2e), 2014 ieee international conference, 2014, pp. 245–252. bulletin of social informatics theory and application issn 2614-0047 vol. 3, no. 2, december 2019, pp. 80-93 80 https:doi.org/10.31763/businta.v3i2.239 big data: issues, trends, problems, controversies in asean perspective haviluddin a,1,*, rayner alfred b,2 a faculty of computer science and information technology, universitas mulawarman, samarinda, indonesia b faculty of computing and informatics, universiti malaysia sabah, kinibalu, sabah, malaysia 1 haviluddin@gmail.com*; 2 ralfred@ums.edu.my * corresponding author 1. introduction an utilization of a big data has changed the process of decision making in an organization or government. therefore, among the three support each other's ability to fully utilize the data and analysis: an ability to identify and manage a variety of data sources, a capacity to build sophisticated analytic models, and a role of management in order to change the organization are indispensable. as the growing big data, across the organization, including governments around the world begin to take advantage of big data as part of the decision making [1]. before applying it, first have to understand big data itself, so that in practice no trouble and can run properly as expected, especially in facing the asean economic community (aec) era. the 12th the association of southeast asian nations (asean) summit in cebu, the philippines in january 2007 made an agreement a "declaration on the acceleration of the establishment of an asean community by 2015", marked by the establishment of the aec blueprint. however, the implementation of the aec postponed until 2016. furthermore, the aec is an implementation of the asean blueprint and agreement of its members. based on asean blueprint, there are three main pillars that are the focus of cooperation among asean countries includes related to security, economy, and social and cultural. first, related security community aims to realize the principle of comprehensive security which recognizes the interrelationship between aspects of political, economic, social and cultural. second, related economic community aims to realize the economy and trade among asean countries that can compete fairly and to prevent monopoly. third, related socio cultural community aims to create harmony relationship between asean countries which could create cultural conditions of the people who know each asean country. in support of the three main pillars above, there are five pillars supporting aec in 2015 consists of: 1. free flow of goods, 2. free flow of services, 3. free flow of investments, 4. free flow of skilled labors, and 5. free flow of capitals [2]. a r t i c l e i n f o a b s t r a c t article history received october 16, 2019 revised december 18, 2019 accepted december 23, 2019 big data has a characteristics is size, new opportunities and have the potential to transform corporations and government and its interactions with the public. this paper attempts to offer a broader definition of big data that captures it is other unique and defining characteristics. this paper presents a consolidated description of big data by integrating definitions from practitioners and academics. in addition, we summarize the issues, trends, problems and controversies related to big data (technology, applications, and people) from infrastructure (i.e., hardware and software), technology for big data analytics (bda), management, educational and scientists, and government-related to policies perspectives in order to support the economic community asean (aec) era. this is an open access article under the cc–by-sa license. keywords big data infrastructure economics community asean http://creativecommons.org/licenses/by-sa/4.0/ http://creativecommons.org/licenses/by-sa/4.0/ issn 2614-0047 bulletin of social informatics theory and application 81 vol. 3, no. 2, december 2019, pp. 80-93 haviluddin & alfred (big data: issues, trends, problems, controversies in asean perspective) in the aec era, all asean countries (indonesia, malaysia, thailand, philippines, singapore, brunei darussalam, vietnam, myanmar, laos and cambodia) should be able to deliver highly competitive conditions of competition. each country must have arrangements in various sectors, including an information technology (it). a sector that has significant potential for growth in the asean, electronics sector including the it industry and electronics among 11 other business sectors, such as the free flow of goods, services, investment, capitals and labor, wood-based products and automotives, healthcare and e-asean, rubber products and textile, agro-based products and fisheries, travel and tourism and logistics [2], [3]. by leveraging it, a country can make production more efficient, to innovate the work process, which in turn will accelerate the economy. therefore, strengthening the construction of information communication and technology (ict) infrastructure such as sustainable ict infrastructure development between government-to-enterprise, and government-to-government are required by all asean members. nowadays, every nation around the world including asean nations are fighting a war without gunfire to dominate the next generation communication market [4]. thus, to support the three pillars of asean community, a data or information plays an important role and as a strategic commodities. this paper aims to provide a comprehensive overview and trends of big data to readers of this exciting area. this paper is also examined with a discussion of the trends, challenges and prospects of big data in the commitments to support the aec. section two understands the evolution of data becomes a big data. section three presents the components of big data. section four looks at the solutions and recommendations in big data, and finally section five provides concluding remarks. 2. data/information is power "how to understand the data" has actually been around since ancient times. along with a technological developments or ‘information explosion’ and a growth of data or ‘data deluge’ is increasing [5]–[7]. since the 1950s, as computing technology has gradually been used in commercial applications, many corporations have developed databases. hence, most corporations cannot store, process, and analyze these data. in the 1990s the database community started using the term data mining (intersects human intervention, machine learning, mathematical modeling, and databases), that interchangeable with the term knowledge discovery in databases is now the common approach to data analysis [8]–[10]. big data is unavoidable. in the last twenty years, the data is increasing day-by-day in structured, semi structured or even in unstructured forms, called data deluge from across the world. the emergence of big data is more because of the increasingly widespread use of social media and supported by the growth of social media platforms quite rapidly. government and corporations also need social media to improve performance and as brand awareness. in addition, increasingly more devices connected to the internet, also mobile phones which is getting a lot of data collected. wherein, the data come from a variety of sources (i.e., google processes 100 petabyte (pb)/day, youtube processes 1000 petabyte (pb) video storage; 4 billion views/day, email, and social media (i.e., facebook processes 300 petabyte (pb) plus 500 terabyte (tb)/day, twitter processes 124 billion tweets/year and linkedin, etc.)) for 7 billion people around the world were created every day with the data size petabyte (pb) to yottabyte (yb), called information explosion. a survey institute, mckinsey global institute has stated that by 2018, demand for the needed talent to capitalize on big data is estimated to exceed the supply by 50-60%. then, the total amount of digital data will grow exponentially from 1 zettabyte (zb) in 2010 to 45 zettabytes (zb) in 2020 [11]–[14]. these data has an impact on the storage media. at this time, the storage media is increasingly easy and inexpensive to provide, e.g., in 2000 a gigabyte (gb) of disk $17, now < $0.07, in 2000 a gigabyte (gb) of random access memory (ram) $1800, now < $1, and in 2009 a terabyte (tb) of relational database management system (rdbms) was %70k, now < $ 20k [15]. currently, the concept of data management becomes a trend in order to understand the data. this concept comes from the desire in order to integrate all the data into one place, making it easy to do the analysis, called the integration agent, and need for insights real-time [15]. then, roger mougalas of o'reilly media coined the term big data in 2005. what is the big data or data science? big data definitions have evolved rapidly, which has raised some confusion. in some academic communities, big data is a term called data science, which is associated with a collection of data size, diverse form 82 bulletin of social informatics theory and application issn 2614-0047 vol. 3, no. 2, december 2019, pp. 80-93 haviluddin & alfred (big data: issues, trends, problems, controversies in asean perspective) or format (structured, unstructured and semi-structured), interdisciplinary efforts from mathematics, sociology, economics, computational science, and management science. in some professional communities, big data called business intelligence and business analytics refers to big data analytics (bda) or big data mining in handling the amount of data that can reach gigabytes (gb) and continues to grow rapidly. the definition of big data is data that exceeds the processing capacity of conventional database systems. the data is too big, moves too fast, or doesn’t fit the structures of database architectures” [15], [16]. the national science foundation describes big data as: “large, diverse, complex, longitudinal, and/or distributed data sets generated from instruments, sensors, internet transactions, email, video, click streams, and/or all other digital sources available today and in the future” [17]. in other opinion, big data is high-volume, high-velocity and/or high-variety information assets that demand cost-effective, innovative forms of information processing that enable enhanced insight, decision making, and process automation” [18]. big data can be described as the data that exceeds the processing capacity of conventional database systems. data that are too big, moving too fast, or not in accordance with the structure of the database architecture. in order to obtain the value of big data, it must choose an alternative way to process it. actually, big data have a characteristics is size. however, there is no unified definition of big data and it has been defined differently from corporation, technological, research or academic perspectives [10], [17], [19]–[21]. the big data, in management perspectives, called big data management. the most recent definition of big data is characteristics by three parameters called 3v’s includes; volume (refers to a massive amount of data that is ever growing every day), variety (refers to the data comes from in various formats and any type; structured, semi-structured, and unstructured), velocity (refers to the data comes at high speed e.g., arriving and stored data) [22], [23]. in addition to the 3v's, other dimensions of big data have also been mentioned by ibm, variability (refers to the variation in the data flow rates in some sources of main buzz data) [23]–[25], by sas, veracity (refers to unreliability, provenance, and accurateness inherent in some dirty sources of data) [15], [26], and by oracle, value (refers to the economic value contained in the various of data) [9], [11], [22]. the big data of characteristics can be seen in figure 1. in technological perspectives, refers to the big data initiative should be the responsibility of specialized information technology (it) departments to support the technology in other parts of the government or corporations such as banking, marketing, demographic, or health. then, big data is collected, analyzed, and reapplied for the purposes of government and corporate activities to be more valuable and useful. therefore, the right technology platform to collect, maintain, analyze and implement it must be appropriate. therefore, the right technology platform to collect, maintain, analyze and implement must be appropriate, such as hardware being used, software being used, as well as the right person to do it. therefore, many applications that have been created by the company in order to manage the volumes and complexity of information involved, such as microsoft, intel big data, amazon web services, dell big data analytics, teradata, google bigquery, vmware, redhat, ibm, sas, tableau, oracle, emc2, and others. fig. 1. the characteristics of big data issn 2614-0047 bulletin of social informatics theory and application 83 vol. 3, no. 2, december 2019, pp. 80-93 haviluddin & alfred (big data: issues, trends, problems, controversies in asean perspective) in research perspectives, refers to in an effort to overcome the 3vs, many early innovators in big data technologies focused on the field; computing and storage. however, along with the development of big data, the researchers not only focus on two things but big data demands more, so researchers continue to develop; computational, analyzes techniques, also security. the focus of research to provide quality hardware, software analysis which corresponds to specific needs. in fact, education is held by higher education, as well as specialized institutes are already implementing learning materials on the use of big data. based on the phenomenon above, a strategy of smart-intelligence in order to harness big data to be translated (business analytics) and assist (advanced analytics) in improving the performance and worth, also have new values is required. however, these large data sets is almost impossible to manage and process using traditional business intelligence tools or based on databases traditional such as relational database management system (rdbms), database management system (dbms), and object-relational database management system (ordbms) [20], [21]. nevertheless, through science and knowledge and the latest technology in the management of data science, it is possible to create a system that will automatically to be able to process these large data [4]. since data is having valuable, many researchers, corporations including government began to digging and analyzing it, by leveraging existing applications. as well as, many researchers propose several methods to improve performance on large data processing. in business communities, big data has been utilized in industrial it services and solutions [27], economics area; bank [27], [28], vehicles rental [29], [30], manufacturing [30], consumer analytics [31]–[33], marketing [34], [35],energy consumption [36], healthcare domain; healthcare financing, pharmaceutical, ebola, dna microarray analysis, dna, rna and protein [37]–[45], engineering domain; futuristic applications domain (i.e., robot taxi, city information model (cim)), geospatial, remote sensing, wireless network [37], [46]– [50]. according to the mckinsey global institute study of big data on five types of industries, namely the us healthcare industry, sector governance in europe, the retail industry in the us and global scale manufacturing stated that big data can generated considerable value [12]. in academic and professional communities around the world have been established to exchange and disseminate theoretical findings, practical experience on big data; beacon institute for rivers and estuaries, clarkson university, the royal institute of technology (kth) stockholm, sweden, marine institute ireland, university of ontario institute of technology, uppsala university, the swedish institute of space physics [30], china’s research centers on fictitious economy and data science and for dataology and data science, the data science consortium in japan, the international council for science: committee on data for science and technology (codata; based in france), and the uk data science institute, and others [17], [51]. in the usa, boston university to support the rafik b. hariri institute for computing and computational science and engineering, and the university of rochester to support the institute for data science on personalized medicine, national security, and online commerce [13]. 3. main focus of the chapter in this chapter we discusses some of big data issues and trends especially in big data analytics to support the asean economic community (aec). then, of course, with popularity, comes controversies and problems. currently, big data is growing in popularity. in general, the challenges in information communication and technology (ict) is related in order to human resources, infrastructure [52], policies and laws including utilization of big data. in other words, big data is also about how can take advantage of existing opportunities such as policy and regulation by governments and corporations. to change the large data into valuable, they should be review how to manage big data in the data center. they need a system that is optimized to acquire, manage, and load the data (structural, semistructured, and unstructured) into their database, so it can be effectively presented and analyzed in depth. therefore, the scalability of big data solutions in the data center is an important consideration, then the big data management planning is important. the governments play a key role in promoting big data including rules and technologies [17]. currently, the revolution will continue to explore the big data has been cross country and overthrow 84 bulletin of social informatics theory and application issn 2614-0047 vol. 3, no. 2, december 2019, pp. 80-93 haviluddin & alfred (big data: issues, trends, problems, controversies in asean perspective) the existing differences in per capita income, population, and the indicators of socio-economic. therefore, to answer the big data issues and trends, in the asean perspective in order to support the implementation of the aec, asean ict masterplan (aim) 2015 was launched in january 2015, in kuala lumpur, malaysia. this confirms that asean countries should be prepare for the digitalization era. in line with the characteristics of big data, the rules agreed upon by asean in the management of big data is required. in order to support aec, the aim 2015 is based on six strategic thrusts including (1) economic transformation, (2) people empowerment and engagement, (3) innovation, (4) infrastructure development, (5) human capital development, and (6) bridging the digital divide. with these, the aim 2015 is designed to deliver the following four key outcomes, (1) ict as an engine of growth for asean countries, (2) recognition for asean as a global ict hub, (3) improved quality of life asean, and (4) contribution to asean integration. in other words, all asean countries agreed on an “open government plan” that encourages governments to open their data to the public. fig. 2. the schemes of components of big data technology issn 2614-0047 bulletin of social informatics theory and application 85 vol. 3, no. 2, december 2019, pp. 80-93 haviluddin & alfred (big data: issues, trends, problems, controversies in asean perspective) for implementation of the aim, for example, a memorandum of understanding (mou) have been signed on july 9th, 2015, at the launch by the ministry of science, technology and innovation (mosti) and mimos, cyberview, sas institute, and cyber security for a smart city iot trial shows one of the early iot implementation initiatives as a result of this collaboration. the big data technology generally refers to three aspects of technical innovation that cope with super-large datasets: namely, automated parallel computation (storage capacity as standard tools and the processing to find), data management schemes include people, and data mining analytics (analyze massive datasets), see in figure 2. first, automated parallel computation, refers to every systems will be generate more and various public data sources (structured, semi-structured, and unstructured forms). then, of course data become larger, more complex and more inexplicable. as a human being, of course, will be difficulties in deciphering and interpreting the large data including data storage constraints. therefore, the computational role in big data to define and interpret large data including data storage. in principle, information technology (it) infrastructures in big data must meet the following criteria [13], [19], [53]:  data acquisition, referring to the flow of data at high speed and a wide variety. the information technology (it) infrastructures to support large data acquisition must be delivered slowly, predictable both in capture and process data quickly and simply, can handle very high transaction volumes, in a distributed environment, flexible, and has a dynamic data structure is needed;  data access, referring to data service called platform as a service (paas) such as google, vmware, amazon, microsoft, hp, and oracle. the paas includes computing platform and a solution stack with software as a service (saas) and infrastructure as a service (iaas), right now associated with cloud computing;  data organization, referring to data integration. the it infrastructures to manage large data must be able to process and manipulate the data in the original storage location is required; and  data analysis, referring to the data presentation. the it infrastructures for analyzing large data must be able to support a deeper analysis, such as statistics, machine learning and data mining analysis. most importantly, the it infrastructures must be able to integrate the analysis on a combination of big data and traditional data. second, data management schemes, refers to the processing and analysis of large amount of data. the big data would be meaningless if it is not treated. therefore, it is necessary to analyze the scheme to process large data such. no matter what the purpose of processing and analyzing data, it is critical that the data contain the insights or answers being sought, for example, data processing models are samza, tez, and mapreduce. the working principle of these models are to separate the data into the machine and each processor, but it works using the same algorithm [9]. third, data mining analytics, refers to integrate popular applications software and machinelearning-based computing infrastructure that supports big data such as an environment analysis is provided as a service use-on-demand by integrating popular software and machine-learning-based supporting computing infrastructures. currently, many popular tools that can be used by governments and corporations in order to analyze their data, such as weka, java and jvm languages, r, python, sas, matlab, and others. however, each of these tools has its own advantages and disadvantages. many statistical and machine learning techniques are averaging processes in big data analytics (bda) in order to improve the performance of these tools. the application of these techniques have been widely applied to solve problems, such as classification, regression, clustering, prediction, summarization, segmentation, feature selection, dimensionality reduction, ensemble learning, network analysis, and density estimation. furthermore, these analytics process in order to meet and support the policy makers is needed [7], [17], [19], [54]–[58]. in order to utilization of big data in both the government and corporate organizations, of course, will be able to get a better view to the public service (for the government) as well as on their business sustainability (for corporations). behind a great opportunities, some researchers also stated that big data also has controversies that can affect the success of the management, such as bigger data are not always better (confusing and solving complex), because real‐world data are incomplete and noisy, some technologies of big data 86 bulletin of social informatics theory and application issn 2614-0047 vol. 3, no. 2, december 2019, pp. 80-93 haviluddin & alfred (big data: issues, trends, problems, controversies in asean perspective) analytics are not always the best tools, and human life becomes less privacy (human daily activities will be a "record" and collected in storage). for the purpose of analysis of huge amount of data which is in structured, semi-structured, and unstructured forms. in this manner, big data analytics (bda) that in handling of the complex and massive datasets is needed [19], [55], [59]–[61]. 4. challenges and prospects the unique characteristic of big data is the process in which value is discovered. thus, the biggest challenge in the big data of era itself is the amount of data generated from various sources (data capture, data lifecycle and variability), called technology, people, and process. to process big data into valuable process is a long term process that cannot be done in hurriedly. therefore, successful implementation of big data is at least dependent on technology, people, and processes. in order to challenges, this paper we categorize the challenges of big data related to technology (i.e., security and privacy), people, and process (i.e., guidance) into two categories: infrastructures (i.e., hardware and software) and data analytics. in infrastructure perspectives of hardware is a combination of components that produce an architecture that delivers business outcomes. build an infrastructure designed to enable new levels of insights derived from exploiting all relevant data. the platform should be fluent in all forms of data and analytics or transactional data including local area network (lan), wide area network (wan), internet, and so forth. build a highly flexible, scalable information technology (it) infrastructures, tuned for today’s big data environment and designed to capitalize on the integration of social, mobile, and cloud technologies. in infrastructure perspectives of software, there are some of technologies in order to manipulating, analyzing and visualizing the big data as an advance analytics including lucene, solr, hadoop and hbase. social media such as facebook, twitter and linkedin are going a step further thereby publishing open source projects for big data like cassandra, hive, pig, voldemort, storm, indextank. back to the fundamental question, whether these applications capable of processing large data accurate? although, it may be easy to use but needs desired by the management is not necessarily appropriate [19], [39], [51]. in infrastructure perspectives of data analytics. it refers to be able to generation parallel and distributed systems in process large data (i.e., captured, manipulated/communicated, analyzed, stored and displayed), there are quite a lot of technical and non-technical challenges then displayed them in advance and in real-time. at first, big data is seen as an objective to manage to reduce the cost of data management. now, governments and corporations are focused on creation potential values. in order to benefit from the additional insights gained there is a need to assess the analytical capabilities and the implementation of big data [12], [19], [55]. to get the benefits of big data are required, among others, the large investment required to build the infrastructures (i.e., hardware and software) of the system, governance, culture, skills, and business processes. the latest mathematics or statistical and machine learning models for large data also remains a hot research topic that are still being developed by researchers in many fields related big data analytics (bda) such as classification, regression, clustering, prediction, summarization, feature selection, segmentation, dimensionality reduction, ensemble learning, network analysis, density estimation, and security [53], [55], [62]–[68]. nevertheless, it should be a concern that the failure of the technology development often begins with the assumption that new technology will be able to generate value or insight by itself. this assumption is certainly a danger, due to heavy investment (both in terms of material and time) that have been issued in the form of these technologies produces only a small return value. to avoid danger, so before investing in new technology, a company must begin with the issue of big data analytics, and then identify the data is required in order to solve the issue. each issue in the government and corporations are sometimes require different technologies. thereby, the government and corporations could be learn in order to implement organizational solutions and receive information on the operational challenges and limitations of the data, thus helping governments and corporations determine the conditions which must be owned technology solutions that would be invested. in addition, another problem of the biggest challenge related to big data are privacy and security. how to maintain data security, both of infrastructures (i.e., hardware and software) and data analysis results terms [10], [69]–[71]. hence, the challenges and prospects for each of the asean countries are linking data such as legislation and policies, policy, culture and other values, processes and issn 2614-0047 bulletin of social informatics theory and application 87 vol. 3, no. 2, december 2019, pp. 80-93 haviluddin & alfred (big data: issues, trends, problems, controversies in asean perspective) procedures, organizations and people, transparency/privacy, information quality, information architectures categories (i.e., health care and techno-biology, informatics and risk, and sustainable and smart systems). currently, new legislation to deal with various issues related to the law in the digital world including big data technologies have been proposed, discussed and endorsed the government in various world. 5. solutions and recommendations in this section, we provide solutions and recommendations related big data technology in order to supporting management of government and corporations. based on the analysis of idc (2012), the investment for big data and analytics has increased significantly. where, in 2015 an estimated expenditure of big data in the asia pacific region will reach us $ 1.61 billion, up 355% from a year ago [72]. the impact of the development of big data, governments and corporations willing to process the data with investing. in the view of asean, the use of big data will be a factor supporting the success of the asean economic community (aec). therefore, the following factors of common concern. in order to obtain the benefits of big data, we classified based on infrastructure (i.e., hardware and software) and analysis [16], [19], [73]. in infrastructure perspectives of hardware, a good infrastructure will be impact on the management of big data, especially in speed, availability, and access. speed refers to understanding how data and insights flow and how consistently they flow at speed is an important essential in planning. you need to balance cost versus speed and the value of business outcomes. in addition, also consider future growth. a well architected solution should achieve the best balance among all requirements. then, availability refers to the ability of a system to absorb or avoid damage without suffering complete failure (disaster recovery). lastly, access refers to data locality, data life cycle management, and data deduplication. it is important to remember that the goal of building information technology (it) infrastructures platform is to easily integrate these large data sets, and provide facilities to conduct indepth analysis of the combined data set [16], [19], [50], [74]. in infrastructure perspectives of software, big data analytics (bda) is indispensable. in order to support big data analytics (bda), the smart based applications in data management for various purposes are required. not enough to rely on existing applications, in addition to expensive, the facilities provided are also difficult to meet the needs of corporations and government. this creates an opportunity for human resources are still used in infrastructure perspectives of data analytics, for the purpose of processing large amounts of data, the big data analytics (bda) technologies is extraordinary indispensable. the big data analytics (bda) are necessarily involves the computer, the application of computer technology, operational research, and statistics to solve problems in business and industry. of course, mathematics underpins the methods used in analytics, and the science of analytics is concerned with extracting useful insights or properties of the data using computable functions. furthermore, from the perspective of technology, machine learning will continue to play a role in big data analytics (bda). currently the technique is capable of working in a large data analysis (i.e., diagnostic analysis, predictive analysis and prescriptive analysis), with a wide variety of data types. in other words, the key value of big data analytics or data mining is to obtain intelligent knowledge [7], [17], [19], [55], [75], [76]. the most frequent obstacle encountered is the lack of information about things to be known, so that the processing of big data requires a fairly long time, and human resources that are used in large quantities. therefore, the framework for analyzing the data is needed, such as data types, applications, algorithms, and the target analysis. in order to ensure the success of big data projects, governments and companies must make the following points with the precautionary principle, among others:  think carefully every purpose business intelligence and insight that is most valuable to the organization;  to avoid combining data from various sources without sorting and tidying up the data first (data cleansing);  the most valuable insights on business performance can be achieved by determining early on what information is required and then ask specific questions related to it; 88 bulletin of social informatics theory and application issn 2614-0047 vol. 3, no. 2, december 2019, pp. 80-93 haviluddin & alfred (big data: issues, trends, problems, controversies in asean perspective)  to achieve the best results is very important to cooperate with reliable analytics provider by involving stakeholders from relevant business in the beginning of the period;  to allocate a budget to develop solutions 'self-service' which allows users to build their own reports when needed; and  debriefing skills needed to ensure that governments and corporations will receive a return on investment in the management of big data faster. 6. future research directions in this section, we provide insights and an overview of the importance of big data related security, privacy, and guidance for further research. based on perspectives (i.e., infrastructures (hardware and software) and big data analytics (bda)) in big data in order to obtain the benefits of big data. the challenges and opportunities for study of the future utilization of big data that we propose, among others: 6.1 in infrastructures (i.e., hardware and software) there are three main challenges and opportunities in infrastructure related to the hardware and software. these three concerns are (1) how to develop new infrastructure and tools, create data dynamicity (volume, variety, velocity, value, and veracity), storage, search, linkage, and retrieval of big data including speed data capture, (2) how does merging data from multiple sources with traditional data structured?, and (3) how to make the rule of law in order to avoid the misuse of digital data. 6.2 in infrastructure perspectives of data analytics in the coming years, all measures taken in the governments and corporations will be based on data. the algorithm will determine what action should be taken. artificial intelligence (ai) would be a priority in the choice of completing the task of analyzing big data. several opportunities for further research related algorithms into big data analytics (bda) to reveal some kind of existing data, such as text analytics (i.e., information extraction (ie), text summarization, question answering (qa), and sentiment analysis); audio analytics (i.e., speech analytics); video analytics; social media analytics (i.e., community detection, analysis of social influence, and link prediction); and predictive analytics (i.e., heterogeneity, noise accumulation, spurious correlation, and incidental endogeneity), especially in order to supporting the implementation of the asean economic community (aec). of course, mathematical and machine learning methods are still an option in the bda.  how to analyze the data in real-time/streaming analytics, interactive analytics and machine learning;  how to determine and select the right algorithm in big data will affect the results of the analysis;  how to transform data into insight to solve business challenges and create competitive advantages;  how can people pay attention to the results of data analysis or statistics that have been produced through story telling; and  how to design problems and violations of the law concerning privacy in big data technologies. 6.3 in education government and skilled manpower is essential in the era of big data. there are still many students who do not understand career paths and career benefits of data analytics. scientists in particular have a critical role to play to educate the public about how to interpret and use their data in a way that is responsible, and also to ask the right questions about the re-use of data, such as questioning the possibility of bias in the sample of data, applying predictive models compared to only consider causality, and algorithms principal policy-making process. a study on the evolution of big data as research and scientific topic has shown began in 1970s, then crowded published in 2008. today the concept of big data is treated from a different point of covering implications in various fields. issn 2614-0047 bulletin of social informatics theory and application 89 vol. 3, no. 2, december 2019, pp. 80-93 haviluddin & alfred (big data: issues, trends, problems, controversies in asean perspective)  how to educational will be improved big data across education levels (curriculum reform) in order to produce professionals in data analytics with a high value in the world market.  how to provide education related to big data to the communities, especially in asean region. 6.4 in government most governments are still slow in adapting to new trends, including big data. in other words, the data revolution is being challenged social scientific models and its ability to inform policy and make it available to the government in the new forms of evidence that can inform the design, implementation and evaluation of public policy.  how to development of 'smart government' is an opportunity in order to provide the public services with good quality;  how to the existing system of government will be work to allow corporations relate more easily;  how to increase the interest of the government and corporate innovation projects based on data in the asean region specifically, particularly in the social investment approach, such as legislation and policies, policy, culture and other values; and  how to design and create a code of conduct to regulate and control the big data technology without losing any of its characteristics. 7. conclusion in this article, an overview of big data's concept, tools, techniques, applications, advantages and challenges have been reviewed. the results have given away that regardless of the fact that accessible information, tools and techniques available in the literature, there are numerous focuses to be viewed as, discussed, analyzed, developed, and improved, and so on. the term big data is emerging due to the fact that indicates that data growth continues to multiply over time has exceeded the limits of storage media and database systems that exist today. because of these impacts, governments and corporations need tools and techniques for managing big data is to get the value of benefits. in future infrastructure perspectives of hardware and software, data centers are the physical locus of big data in all its forms. how large collection of data that is replicated in multiple data centers for improved performance and durability. moreover, software technology that is specific to analyze big data across multiple data centers (and spread over tens of thousands of processors and hard-disk drive), thereby providing both scaling and better performance. in future infrastructure perspectives of data analytics, the role of machine learning to produce smart system still remains an option and the trend of big data processing. moreover, in the role of business, in which every business should have the right strategies for managing big data, especially in the information business that continues to grow. how to maintain data security is also an important part in keeping big data. thus, business leaders are able to obtain maximum results. furthermore, the government and employers can collect large amount of data from their operational systems and found the value of the benefits from the data stored. analysis of large data with the correct method will help the government and employers to gain a true insight into the decision making. in education perspectives. academics, scientists in particular have a very important role in order to data innovation. when applying 3v's principle of big data related to giving people greater control over the data, they actually allow the democratization of research capabilities. in the asean perspectives. the asean members are mostly agricultural countries. therefore, big data could be used to help farmers to increase crop production, predicting the right time for planting, analyze the quality of the soil, etc. in healthcare, big data could be used for patient data collection e.g., medical history, similarity disease, pharmaceuticals, and financial, etc. in taxes, big data can also be utilized to increase the government tax, such as raising awareness of paying taxes, and reducing the tax fraud. in banking, big data could be used to collect information regarding the 90 bulletin of social informatics theory and application issn 2614-0047 vol. 3, no. 2, december 2019, pp. 80-93 haviluddin & alfred (big data: issues, trends, problems, controversies in asean perspective) transaction, customer’s relationships, choosing products in the right time. in telecommunications, big data could be used to understand behavior of customers, and so forth. finally, in principle, each of the asean countries are ready to implement the asean economic community (aec), of course, with the strengths and weaknesses of the member countries of asean, especially in order to realize the asean as "one windows" in the field of information communication and technology (ict) includes data integration, data security and connectivity infrastructure lines to share administrative data are integrated. in other words, big data account for a growing share of countries’ economy. references [1] f. dzikrullah and m. a. rinjani, “a framework design to develop integrated data system for smart egovernment based on big data technology,” bull. soc. informatics theory appl., vol. 1, no. 2, pp. 41–51, 2017. [2] asean, “asean economic community blueprint,” 2015. [3] asean, “asean economic community blueprint,” 2008. [4] s.-t. park, y.-r. kim, s.-p. jeong, c.-i. hong, and t.-g. kang, “a case study on effective technique of distributed data storage for big data processing in the wireless internet environment,” wirel. pers commun, vol. 86, no. 2016, pp. 239–253, 2016. [5] m. chen, s. mao, and y. liu, “big data: a survey,” mob. networks appl., vol. 19, no. 2, pp. 171–209, 2014. [6] s. m. zobaed and m. a. salehi, “big data in the cloud,” in encyclopedia of big data technologies, 2019. [7] n. d. shah, e. w. steyerberg, and d. m. kent, “big data and predictive analytics,” jama, 2018. [8] u. fayyad and p. piatetsky-shapiro, g. smyth, “from data mining to knowledge discovery in databases,” ai magazine, pp. 37–54, 1996. [9] a. mohebi, s. aghabozorgi, t. y. wah, t. herawan, and r. yahyapour, “iterative big data clustering algorithms: a review,” softw. pract. exp., vol. 46, no. 2016, pp. 107–129, 2016. [10] a. gandomi and m. haider, “beyond the hype: big data concepts, methods, and analytics,” int. j. inf. manage., vol. 35, no. 2015, pp. 137–144, 2015. [11] j.-p. dijcks, oracle: big data for the enterprise. redwood shores, ca, usa: oracle corporation, 2013. [12] j. manyika et al., “big data: the next frontier for innovation, competition, and productivity,” 2011. [13] j. m. tien, “overview of big data: a us perspective,” natl. acad. eng., vol. 44, no. 4, pp. 12–19, 2014. [14] n. trifunovic, v. milutinovic, j. salom, and a. kos, “paradigm shift in big data supercomputing: dataflow vs. controlflow,” j. big data, 2015. [15] m. troester, “big data meets big data analytics,” 2012. [16] e. dumbill, big data now: 2012. 2012. [17] y. shi, “big data history, current status, and challenges going forward,” bridg., 2014. [18] g. it glossary, “big data,” 2016. [19] j. dean, big data, data mining, and machine learning: value creation for business leaders and practitioners. 2014. [20] y. wang, l. a. kung, and t. a. byrd, “big data analytics: understanding its capabilities and potential benefits for healthcare organizations,” technol. forecast. soc. change, 2018. [21] d. rajasekar, c. dhanamani, and s. k. sandhya, “a survey on big data concepts and tools,” int. j. emerg. technol. adv. eng., vol. 5, no. 2 february 2015, pp. 80–84, 2015. [22] l. doug, “3d data management: controlling data volume, velocity, and variety,” appl. deliv. strateg., pp. 1–4, 2001. issn 2614-0047 bulletin of social informatics theory and application 91 vol. 3, no. 2, december 2019, pp. 80-93 haviluddin & alfred (big data: issues, trends, problems, controversies in asean perspective) [23] ibm, “ibm big data platform bringing big data to the enterprise,” big data at the speed of business, 2016. . [24] p. zikopoulos, d. deroos, c. bienko, r. buglio, and m. andrews, big data beyond the hype: a guide to conversations for today’s data center. mcgraw-hill education, 2015. [25] p. c. zikopoulos, d. deroos, k. parasuraman, t. deutsch, d. corrigan, and j. giles, harness the power of big data: the ibm big data platform. 2012. [26] p. russom, “big data analytics,” 2011. [27] g. csc, “big data tools connect the dots for csc’s digital marketing,” 2016. [28] g. csc, “global bank secures risk and compliance with csc,” 2016. [29] g. csc, “avis budget’s road to customer value,” 2016. [30] ibm, “ibm big data success stories,” 2011. [31] s. erevelles, n. fukawa, and l. swayne, “big data consumer analytics and the transformation of marketing,” j. bus. res., vol. 69, no. 2016, pp. 897–904, 2016. [32] m. salehan and d. j. kim, “predicting the performance of online consumer reviews: a sentiment mining approach to big data analytics,” decis. support syst., vol. 81, no. 2016, pp. 30–40, 2016. [33] v. e. mariana, a. p. wibawa, j. hammad, r. herdianto, and haviluddin, “customer trust of online shopping using social media,” in iop conference series: materials science and engineering, 2018. [34] s. fan, r. y. k. lau, and j. l. zhao, “demystifying big data analytics for business intelligence through the lens of marketing mix,” big data res., vol. 2, no. 2015, pp. 28–32, 2015. [35] z. xu, g. l. frankwick, and e. ramirez, “effects of big data analytics and traditional marketing analytics on new product success: a knowledge fusion perspective,” j. bus. res., 2016. [36] k. zhou and s. yang, “understanding household energy consumption behavior: the contribution of energy big data analytics,” renewable and sustainable energy reviews. 2016. [37] h. aly, m. elmogy, and s. barakat, “big data on internet of things: applications, architecture, technologies, techniques, and future directions,” int. j. comput. sci. eng., vol. 4, no. 6, pp. 300–3013, 2015. [38] amankwah-amoah, “emerging economies, emerging challenges: mobilising and capturing value from big data,” technol. forecast. soc. change, 2016. [39] m. v. boland, “big data, big challenges,” am. acad. ophthalmol., vol. 123, no. 1 january 2016, pp. 7– 8, 2016. [40] v. bolón-canedo, n. sánchez-maroño, and a. alonso-betanzos, “recent advances and emerging challenges of feature selection in the context of big data,” knowledge-based syst., vol. 86, no. 2015, pp. 33–45, 2015. [41] g. csc, “world’s largest healthcare informatics data warehouse,” csc, g., 2016. . [42] b. mounia and c. habiba, “big data privacy in healthcare moroccan context,” in the 2nd international workshop on privacy and security in healthcare (pscare15), 2015. [43] c. seebode, m. ort, c. regenbrecht, and m. peuker, “big data infrastructures for pharmaceutical research,” in proceedings 2013 ieee international conference on big data, big data 2013, 2013. [44] s. d. young, “a ‘big data’ approach to hiv epidemiology and prevention,” preventive medicine. 2015. [45] c. church, h. young, g. parraga, and g. n. maksym, “improvements in functional image impedance modelling of asthmatic lungs using k-means clustering,” in b20. asthma: new findings in airway smooth muscle pathophysiology and potential therapy. american thoracic society, 2018, pp. a2746–a2746. [46] s. li et al., “geospatial big data handling theory and methods: a review and research challenges,” isprs journal of photogrammetry and remote sensing. 2016. 92 bulletin of social informatics theory and application issn 2614-0047 vol. 3, no. 2, december 2019, pp. 80-93 haviluddin & alfred (big data: issues, trends, problems, controversies in asean perspective) [47] y. ma et al., “remote sensing big data computing: challenges and opportunities,” futur. gener. comput. syst., vol. 51, no. 2015, pp. 47–60, 2015. [48] y. qin, h. k. yalamanchili, j. qin, b. yan, and j. wang, “the current status and challenges in computational analysis of genomic big data,” big data res., vol. 2, no. 2015, pp. 12–18, 2015. [49] c. yang, “learning methodologies for wireless big data networks: a markovian game-theoretic perspective,” neurocomputing, 2016. [50] haviluddin, f. agus, m. azhari, and a. saleh ahmar, “artificial neural network optimized approach for improving spatial cluster quality of land value zone,” int. j. eng. technol., 2018. [51] e. r. mardis, “the challenges of big data,” dis. model. mech., 2016. [52] b. prasetyo, f. s. aziz, k. faqih, w. primadi, r. herdianto, and w. febriantoro, “a review: evolution of big data in developing country,” bull. soc. informatics theory appl., vol. 3, no. 1, pp. 30–37, 2019. [53] b. schoenborn, big data analytics infrastructure for dummies. 2014. [54] r. alfred, “summarizing relational data using semi-supervised genetic algorithm-based clustering techniques,” j. comput. sci., 2010. [55] e. alpaydin, introduction to machine learning second edition. 2010. [56] shilpa and m. kaur, “big data and methodology-a review,” int. j. adv. res. comput. sci. softw. eng., 2013. [57] purnawansyah, haviluddin, a. f. o. gafar, and i. tahyudin, “comparison between k-means and fuzzy c-means clustering in network traffic activities,” in proceedings of the eleventh international conference on management science and engineering management, 2017. [58] marselina, e. hiswati, a. f. o. gaffar, rihartanto, and haviluddin, “minimum wage prediction based on k-mean clustering using neural based optimized minkowski distance weighting,” int. j. eng. technol., vol. 7, no. 2, pp. 90–93, 2018. [59] j. p. holdren and e. s. lander, “big data and privacy: a technological perspective,” 2014. [60] s. roy et al., “iot, big data science & analytics, cloud computing and mobile app based hybrid system for smart agriculture,” in 2017 8th annual industrial automation and electromechanical engineering conference (iemecon), 2017, pp. 303–304. [61] m. ge, h. bangui, and b. buhnova, “big data for internet of things: a survey,” futur. gener. comput. syst., 2018. [62] r. alfred, “discovering knowledge from multi-relational data based on information retrieval theory,” in lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics), 2009. [63] h. haviluddin and a. jawahir, “comparing of arima and rbfnn for short-term forecasting,” int. j. adv. intell. informatics, 2015. [64] haviluddin and i. tahyudin, “time series prediction using radial basis function neural network,” int. j. electr. comput. eng., vol. 5, no. 4, pp. 765–771, 2015. [65] s. hardwinarto and m. aipassa, “rainfall monthly prediction based on artificial neural network: a case study in tenggarong station, east kalimantan-indonesia,” procedia comput. sci., vol. 59, pp. 142–151, 2015. [66] mislan, a. f. o. gaffar, haviluddin, and n. puspitasari, “water level prediction of lake cascade mahakam using adaptive neural network backpropagation (annbp),” in 1st international conference on tropical studies and its application (ictrops), 2018. [67] f. sia, r. alfred, and k. o. chin, “learning relational data based on multiple instances of summarized data using dara,” in communications in computer and information science, 2013. [68] suprihatin, i. t. r. yanto, n. irsalinda, t. purwaningsih, haviluddin, and a. p. wibawa, “a performance of modified fuzzy c-means (fcm) and chicken swarm optimization (cso),” in proceeding 2017 3rd issn 2614-0047 bulletin of social informatics theory and application 93 vol. 3, no. 2, december 2019, pp. 80-93 haviluddin & alfred (big data: issues, trends, problems, controversies in asean perspective) international conference on science in information technology: theory and application of it for education, industry and society in big data era, icsitech 2017, 2018. [69] m. janssen and j. v. d. hoven, “big and open linked data (bold) in government: a challenge to transparency and privacy?,” gov. inf. q., vol. 32, no. 2015, pp. 363–368, 2015. [70] q. liang, j. ren, j. liang, b. zhang, y. pi, and c. zhao, “security in big data,” secur. commun. networks, vol. 8, no. 2015, pp. 2383–2385, 2015. [71] n. chaudhari and s. srivastava, “big data security issues and challenges,” in proceeding ieee international conference on computing, communication and automation, iccca 2016, 2017. [72] idc, “big data: global overview: market analysis: worldwide big data technology and services 20122016 forecast,” 2012. [73] s. wolfert, l. ge, c. verdouw, and m. j. bogaardt, “big data in smart farming – a review,” agricultural systems. 2017. [74] q. zhang, l. t. yang, z. chen, and p. li, “a survey on deep learning for big data,” information fusion. 2018. [75] g. huang, g.-b. huang, s. song, and k. you, “trends in extreme learning machines: a review. neural networks,” neural networks, vol. 61, no. 2015, pp. 32–48, 2015. [76] m. xu and s. y. rhee, “becoming data-savvy in a big-data world,” trends in plant science. 2014. bulletin of social informatics theory and application issn 2614-0047 vol. 1, no. 2, december 2017, pp. 52-59 52 https://doi.org/10.31763/businta.v1i2.27 application of rule association with algorithm apriori of disaster in indonesia residential fires muhammad muhajir 1,*, gusmayyeni 2, redita anggita sari 3, tusriana rahmatika 4 department of statistics, faculty of mathematics and natural science, islamic university of indonesia 1 muhammad.muhajir.stat89@gmail.com *; 2 gusmayyeni29@gmail.com; 3 reditaanggita118@gmail.com; 4 tusrianarahmatika@gmail.com * corresponding author 1. introduction flame of fire both small and large in place, situation and time undesired detrimental and generally difficult to control. fire is also included in one of the categories conditions or emergency situations within the house, company, etc [1]. fire disaster is a disaster that is mostly caused by human negligence. although in some cases can also occur as a spark of fire that comes from lightning strikes [2]. fire incident intensification of settlement lately also triggered by the seasons. while the number of objects that are not saved, due to many things. fire engines such as delays in the place of the crime scene, the limited fire engine away water sources and the difficulty of access to the scene. various constraints and limitations of the above has been the record from year to year, but almost minimal with progress in the form of a concrete solution. some other things that also be important for the handling of the fire accident is recognition, understanding and mitigation capabilities are still low, even nil in the community. judging from fires in indonesia event data, event data residential fire disasters in the last five years, there were 979 fire cases recorded from august 24 2011 until june 30, 2015. in 2011 there were 11 cases of fire. presentation of cases of fires in 2012 began to rise to 53 cases of fire, for the year 2013 has increased very rapidly that there were 398 cases of fire. for the year 2014 increased again to 471 fire cases. whereas in 2015, from the beginning of january until june 30, there were 43 cases of fire national disaster management agency (bnpb). this indicates that fires potency continued to increase from year to year. this is certainly not a proud achievement for indonesia. in the case of fire, the cause of the fire source such as an electric short circuit. gas cylinder explosion, discarded cigarettes or sparks, etc. a r t i c l e i n f o a b s t r a c t article history received september 21, 2017 revised october 17, 2017 accepted november 4, 2017 data mining is a technique of decision making by means of extracting information based on historical data of existing data in a large database. one of technique in data mining, is association rule algorithm where the method is searching for a set of items that frequently appear together. this study will use data association rule mining method for data processing fire disaster settlements in indonesia because we want to know what information is often occur together in the event of fire disaster settlement. from the analysis associative relationship, event's pattern that occur from residential fires in indonesia which the data is from the beginning of january 2015 to june 2015, support the highest value that the event of catastrophic fires in settlements in the afternoon resulted in broken homes with a value of 0.8148148 support and confident value of 1.0292398. this is an open access article under the cc–by-sa license. keywords data mining association rules apriori fire settlements http://creativecommons.org/licenses/by-sa/4.0/ http://creativecommons.org/licenses/by-sa/4.0/ issn 2614-0047 bulletin of social informatics theory and application 53 vol. 1, no. 2, december 2017, pp. 52-59 muhajir et.al (application of rule association with algorithm apriori of disaster in indonesia residential fires) one of the efforts to prevent or reduce the presence of residential fires is that by studying the pattern of linkages between events with the characteristics of the occurrence of events such as the time of the incident, location of the incident, victims, and losses due to the incident. so the factors that may affect the fire can be seen. one method that can be used is by using the association rule apriori algorithm. association rule (rule associative) is one of the main techniques in data mining and is the form most commonly used in finding a pattern or patterns from a data set [3]. association rule (rule associative) trying to discover certain rules that associate the data with other data. to search for association rule from a data set, first of all we should seek first the so-called "frequent itemset" (a collection of items that often appear together) [4]. 2. material and methodology in this study used data settlement fires in indonesia in early january to june 2015. this data was obtained from the national disaster management agency (bnpb). in this case there are 43 residential fire event data to be analyzed. data following the landslide in indonesia: table 1. genesis residential fires in indonesia 1 january-june 2015 no disaster date time longitude latitude location victim damage 1 fire settlement 30/06/20 15 12.00 am 106.796 6.14 545 west jakarta 63 family 290 people evacua ted 35 material losses 2 fire settlement 06/05/20 15 03.55 am 106.907 6.32 262 east jakarta none 1 unit building collapsed 3 fire settlement 05/05/20 15 13.55 pm 106.816 6.18 562 central jakarta none 1 unit of houses were damaged 41 fire settlement 02/01/2015 10.40 am 106.814 -6.1506 west jakarta none 1 unit of houses were damaged 42 fire settlement 01/01/2015 00.52 am 106.929 6.11166 north jakarta none 1 unit of houses were damaged 43 fire settlement 01/01/2015 01.05 am 106.828 6.14186 south jakarta none 1 unit of houses were damaged variables used in this paper can be done for coding is as follows; 1. time: variable time with regard to the settlement of immortality catastrophic events. the division of time variable is divided into three, namely; a. morning: 00:00 to 11:59 o'clock pm b. day: 12:00 to 15:59 o'clock pm c. afternoon: at 4:00 p.m. to 17:59 pm d. night: at 6:00 p.m. to 23:59 pm 2. location: the variable is the location of the scene of the fire disaster may facilitate then action of the analysis. 54 bulletin of social informatics theory and application issn 2614-0047 vol. 1, no. 2, december 2017, pp. 52-59 muhajir et.al (application of rule association with algorithm apriori of disaster in indonesia residential fires) 3. victim: victim variables are objects that are vulnerable to catastrophic fires. victims carried classification into three (nil / no casualties, injuries either mild, moderate, or severe, and death) 4. damage: variabe loss is the impact of disaster events fire. losses can be divided into; a. building: houses, shops / stalls, stalls, shops, offices, companies. a. vehicle: motorcycle and car b. in the investigation (still follow-up) c. land 5. description: a chronology of events which occurred because the fire could be short circuit currents listring, in the investigation, the explosion (gas stove), and fire (derived from cigarette butts, combustion, wax). 3. association rule association rule mining is one of data mining techniques to discover the rules of the association between a combination item with other items that often appear together with a certain amount or frequency of a set of data. i = {i1, i2, ..., im} is a set of items. for example, items such as butter, bread, milk is purchased at a supermarket; and ai = v is an item, where v is the value of the attribute domain ai, in relation r (a1, ..., an). a collection of items referring to the term itemset, x called itemset if a subset of i. d = {ti, ti + 1, ..., tn} is the set of transactions, called database transactions, where each transaction has a tid t and t-itemset t = (tid, t-itemset). for example, shopping cart checkout consumer who has examined referred to as one transaction; tuple (v1, .., vn) of relation r (a1, ..., an) as a transaction. transaction t containing itemset x for all items, which i∈ x, and i is t-itemset [5]. analysis of the association is also known as one of data mining techniques that became the basis of a variety of other data mining techniques. in particular one of the stages of the analysis of the association called high frequency pattern analysis attracted the attention of many researchers to produce an efficient algorithm. association rule is an implication of the form x → y, where x ⊂ i, y ⊂ i, and x∩y = ø. x (or y) can consist of a single item or the whole collection of items. x can be regarded as antecedent and y as the consequent. each association rule has two main measure of quality, namely the support and confidence. support the rule x → y is support (x∩y) = p (x∩y) is defined as [6]: supp (x → y) = support (x∩y) = p (x∩y) = n(x∩y) n(d) with: p (x∩y) = probability of occurrence of x and y simultaneously n (x∩y) = the number of occurrences of x and y simultaneously on transactions n (d) = total number of transactions in the database d confidence rule x → y is defined as [7] : confidence(x y) p(y|x ) = p (x∩y) p (x) with: p (y x) =c onditional probability y occur given x has occurred p (x) = probability of occurrence itemset x besides the two measures, one of the better ways to determine the strength of an association rule is to look at the value of the lift. lift is defined as [6]: issn 2614-0047 bulletin of social informatics theory and application 55 vol. 1, no. 2, december 2017, pp. 52-59 muhajir et.al (application of rule association with algorithm apriori of disaster in indonesia residential fires) lift(x → y) = interes (x → y) = p (x∩y) p (x) p (y) the association rule mining can be viewed as a two step process [8], namely: 1. find all frequent itemsets: each of these itemsets will occur at least as frequently as a predetermined minimum support count. 2. generate strong association rules from the frequent itemsets: the rules must satisfy minimum support and confidence. these rules are called strong rules. 3.1. apriori algorithm apriori is a seminal algorithm proposed by r. agarwal and r. srikant in 1994 [4] for mining frequent itemsets for boolean association rules. the name of the algorithm is based on the fact that the algorithm uses prior knowledge of frequent itemset properties. the following lines state the steps in generating frequent itemset in apriori algorithm [9]. the stages of apriori algorithm is described in fig. 1. fig. 1. flowchart of apriori algorithm the first step in association rule mining is to find frequent itemsets. k-itemset is defined as an itemset as k items, lk as the set of frequent k-itemsets, and ck as the set of candidate k-itemset. pseude-code following a priori algorithm used to generate all frequent itemsets and pruning frequent itemset unattractive in a transaction database [10]. 1. k = 1. 2. lk = { i|i ∈ i ˄σ ({i}) ≥ n × minnsup }. {get all the frequent 1-itemset } 3. repeat 4. k = k + 1 5. ck = apriori-gen (lk-1). {produced candidates itemsets } 56 bulletin of social informatics theory and application issn 2614-0047 vol. 1, no. 2, december 2017, pp. 52-59 muhajir et.al (application of rule association with algorithm apriori of disaster in indonesia residential fires) 6. for each transaction t∈ddo 7. ct = subset(ckt). {determine all the candidate itemsetsck on each t } 8. for each candidate itemset c 9. p(c ) = p (c )+1 {add in support count} 10. end for 11. end for 12. lk = {c|c ∈ ck ˄σ(c) ≥ n × minnsup}.{ remove the candidates is less thanminsup} 13. until lk = ø 14. result = u lk immediately generated a strong association rules (strong) from the frequent itemsets (which strong association rules meet the minimum support and minimum confidence). this can be done using the equation of confidence. 4. results residential fire disaster events of 1 january to 30 june 2015 there were 43 cases of fire. of the 43 cases of fires will be analyzed using algorithms arules priori to obtain a pattern of rules. in this analysis using the software r which determines the value of minimum support, minimum confident, and the main line. the value to be shown is the value that is equal to or greater than a predetermined minimum support. first, the data summary will be known residential fire disaster. summary data is a summary regarding some information about residential fire data to be analyzed. fig 2 shows an output of fire disaster data summary settlement. fig. 2. output fire disaster data summary settlement from the above data shows that the output of residential fires 15,17,31 to have the attributes of 5 pieces, 1,10,11 events have attributes incidence of 4 pieces, and other residential fires have attributes with a total of less than 4 attributes as much as 144 pieces. other information that can be known is the attribute of the building appear as much as 41 times, shorted appeared 31 times, morning appeared 21 times, night mumcul 12 times, day appears 6 times, and east jakarta appears 7 times of the total incidence of landslides observed as many as 43 events. next will be the grouping attributes in an accident with a split order data. software r will categorize the attributes into the same incident. fig. 3 shows the results of data output in the event of fire split the first settlemen. fig. 3. output split residential fire disaster data the output of note that the attributes that go event1 residential fires that morning, west jakarta, building, shorted. to display the attributes of accompanying events and events that are not accompanied by the initiation of a value of zero (0) and one (1) will be determined by the rules of the matrix. the output produced is as follows. issn 2614-0047 bulletin of social informatics theory and application 57 vol. 1, no. 2, december 2017, pp. 52-59 muhajir et.al (application of rule association with algorithm apriori of disaster in indonesia residential fires) fig. 4. output rule matrix residential fire disasters fig. 4 shows the attributes that accompany the event. false logic shows there is no attribute in the incidence and value of true indicates there are attributes in the incident. attributes are sorted alphabetically from a to z. event1 describes buildings there are attributes and attribute building, and shorted with logic true. whereas, to attribute affected, afternoon, central jakarta, cilacap, cisolok, day, night, north jakarta, rembang, shorted, sidoarjo, situbondo, and solok with a logic false. tests were first carried out is by determining the minimum support = 0.1; minimum confident = 0.1; and and a main line = 2 with the following output. fig. 5. continued output combinations of two itemsets from the output of fig. 5, for a pattern of a combination of two itemsets which shows the relationship of two attributes, eg in case a then there occurs b. establishment of two itemsets frequency pattern, formed from the type of items-items that meet the minimum support that is by combining all of the items into two patterns combination. in the syntax has been determined that the minimum support = 0.1, then the displayed minimum support value equal to or more than 0.1, the value of which is less than 0.1 are automatically eliminated by the system. the following description of the calculation of point 1, and 2 that can result as above. support (south jakarta ∩ building) = 𝑐𝑜𝑛𝑡𝑎𝑖𝑛𝑠 𝑎 𝑛𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝑒𝑣𝑒𝑛𝑡𝑠 𝑠𝑜𝑢𝑡ℎ 𝑗𝑎𝑘𝑎𝑟𝑡𝑎 𝑎𝑛𝑑 𝑏𝑢𝑖𝑙𝑑𝑖𝑛𝑔 𝑡𝑜𝑡𝑎𝑙 𝑒𝑣𝑒𝑛𝑡𝑠 = 5 43 = 0.1162791 58 bulletin of social informatics theory and application issn 2614-0047 vol. 1, no. 2, december 2017, pp. 52-59 muhajir et.al (application of rule association with algorithm apriori of disaster in indonesia residential fires) support (building ∩ south jakarta) = 𝑐𝑜𝑛𝑡𝑎𝑖𝑛𝑠 𝑎 𝑛𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝑒𝑣𝑒𝑛𝑡𝑠 𝑠𝑜𝑢𝑡ℎ 𝑗𝑎𝑘𝑎𝑟𝑡𝑎 𝑎𝑛𝑑 𝑏𝑢𝑖𝑙𝑑𝑖𝑛𝑔 𝑡𝑜𝑡𝑎𝑙 𝑒𝑣𝑒𝑛𝑡𝑠 = 5 43 = 0.1162791 confidence p(south jakarta|building) = 𝑡𝑜𝑡𝑎𝑙 𝑒𝑣𝑒𝑛𝑡𝑠 𝑏𝑢𝑖𝑙𝑑𝑖𝑛𝑔 𝑎𝑛𝑑 𝑠𝑜𝑢𝑡ℎ 𝑗𝑎𝑘𝑎𝑟𝑡𝑎 𝑡𝑜𝑡𝑎𝑙 𝑒𝑣𝑒𝑛𝑡𝑠 𝑠𝑜𝑢𝑡ℎ 𝑗𝑎𝑘𝑎𝑟𝑡𝑎 = 5 5 = 1 confidence p(building|south jakarta) = 𝑡𝑜𝑡𝑎𝑙 𝑒𝑣𝑒𝑛𝑡𝑠 𝑏𝑢𝑖𝑙𝑑𝑖𝑛𝑔 𝑎𝑛𝑑 𝑠𝑜𝑢𝑡ℎ 𝑗𝑎𝑘𝑎𝑟𝑡𝑎 𝑡𝑜𝑡𝑎𝑙 𝑒𝑣𝑒𝑛𝑡𝑠 𝑏𝑢𝑖𝑙𝑑𝑖𝑛𝑔 = 5 41 = 0,1219512 from the above calculation in mind that although support equal value but the value is not always the same confident. this occurs because the value of the support shows the probability appears attributes a and b together from all events while the value of certain or confident showed strong relationships between items within a priori. from output fig. 5, the importance of the final result associative relationship patterns with the highest support value if there is a fire settlement with the occurrence of a shorted, in the morning, it will cause damage to building with a value of 0,3255814 support and confident value of 1. if there is a settlement due to fire condition of the building, in the morning, then cause a shorted with the value of 0,3255814 support and confident value for 0,667. the next case of residential fires due to the condition of the building, with the caused by shorted then a fire broke out there early morning to support the value of 0,3255814 and confident value of 0,4827. the following table association final rule. table 2. table final association rule no rules supp conf support x confidence 1 if fires settlement "shorted" and "morning", then "building" 32% 100% 32% 2 if fires settlements "building", and "morning", then " shorted " 32% 67% 21% 3 if fires settlements "building", and " shorted”, then in the "morning" 32% 48% 15% 5. conclusion based discussion can be concluded, using the association rule with a priori algorithm that can be applied to residential fire disasters in some rules such as; iresidential fires often occur with the support value at 0,32 and confident value of 1 due to a short circuit or a short circuit that occurred on the morning of the types of losses obtained in the form of the building. also, in case of fire settlement with the type of loss of the building, in the morning it is caused by a shorted with a support value of 0,32 and a confident value of 0,67. if there is a fire settlement with the type of building damages caused by the short circuit occurred in the morning at 0,32 day with support value and confident value at 0,48. references [1] n. wagner and v. agrawal, “an agent-based simulation system for concert venue crowd evacuation modeling in the presence of a fire disaster,” expert syst. appl., vol. 41, no. 6, pp. 2807–2815, 2014. [2] h. b. cheng, z. y. he, h. t. hu, x. q. mu, and b. wang, “risk assessment and early warning of lightning disaster for traction power supply system of high-speed railway,” j. china railw. soc., vol. 35, no. 5, pp. 21–26, 2013. [3] f. fadlina, “data mining untuk analisa tingkat kejahatan jalan dengan algoritma association rule metode apriori (studi kasus di polsekta medan sunggal),” maj. ilm. inf. dan teknol. ilm., vol. 3, no. 1, pp. 144– 154, 2014. issn 2614-0047 bulletin of social informatics theory and application 59 vol. 1, no. 2, december 2017, pp. 52-59 muhajir et.al (application of rule association with algorithm apriori of disaster in indonesia residential fires) [4] r. agrawal and r. srikant, “fast algorithms for mining association rules,” in proc. 20th int. conf. very large data bases, vldb, 1994, pp. 487–499. [5] c. zhang and s. zhang, association rule mining : models and algorithms. sydney: springer, 2002. [6] s. brin, r. motwani, and c. silverstein, “beyond market baskets: generalizing association rules to correlations,” acm sigmod rec., vol. 26, no. 2, pp. 265–276, 1997. [7] y. zhao, r and data mining: examples and case studies. elsevier, 2015. [8] v. kumar and a. chadha, “mining association rules in student’s assessment data,” int. j. comput. sci. issues, vol. 9, no. 5, p. 211, 2012. [9] m. a. anwar and n. ahmed, “knowledge mining in supervised and unsupervised assessment data of students’ performance,” in 2011 2nd international conference on networking and information technology ipcsit, 2011. [10] p.-n. tan, m. steinbach, and v. kumar, introduction to data mining, first edit. boston, ma: addisonwesley longman publishing, 2005. bulletin of social informatics theory and application issn 2614-0047 vol. 5, no. 1, march 2021, pp. 47-51 47 https:doi.org/10.31763/businta.v5i1.408 promoting covid-19 vaccination with instagram ahmad maulanal fahmi a,1,*, hanifah nur azizah a,2, i putu arda mahendra a,3, irma fatkhiatin a,4, jehad a.h hammad b,5 a department of electrical engineering, universitas negeri malang, malang, indonesia b department of computer information systems, al-quds open university (qou), palestine 1 ahmad.fahmi.1805356@students.um.ac.id*; 2 hanifah.nur.1805356@students.um.ac.id; 3 iputuardamahendra.1805356@students.um.ac.id; 4 irma.fatkhiatin.1805356@students.um.ac.id; 5 jhammad@qou.edu * corresponding author 1. introduction at this time, the world is being shocked by the presence of a new virus that massively attacks humans, and the virus is covid-19 (coronavirus disease 2019). covid-19 is a disease caused by infection with the sars-cov-2 virus, which attacks the respiratory system, spreads throughout the body, and can cause death. this virus first appeared in china on december 30, 2019 [1]. the world health organization (who) is an international organization whose main task is to fight infectious diseases. in mid-february 2020 it finally declared covid-19 a pandemic because of its high-speed transmission and has spread throughout the world [2]. in indonesia, a covid-19 case was first reported on march 2, 2020, which infected an indonesian citizen who had direct contact with a japanese citizen who was suspected of being positive for covid-19 [3]. as of may 5, 2021, the number of confirmed cases has reached 1,686,373, with a total of 46,137 deaths [4]. the number is higher than the case on march 7, 2021, which had 1,373,836 cases with a death toll of 37,154 cases [4]. the increase in the number of covid-19 is speedy and needs to be reduced. vaccination is the process of introducing a weakened virus into the body to produce antibodies [5], [6]. vaccination is a solution that can reduce the number of positive cases of covid-19, which is increasing day by day. in indonesia, vaccination has begun to be carried out by the ministry of health of the republic of indonesia with the initial target of health workers and public service workers, the elderly, educators. it will be expanded along with the availability of vaccines and permits. vaccination in indonesia officially began during the first vaccine injection to the president of indonesia, joko widodo, on january 13, 2021. the vaccination target in indonesia is 40,349,051 people, but as of march 6, 2021, there were only 2,552,265 people vaccinated in first stage and 1,130,524 people in second stage [7]. this figure is still very far from the target. it is hoped that the government of the republic of indonesia, especially the ministry of health, needs to promote an invitation to vaccinate on a large scale so that the desired target can be achieved. a r t i c l e i n f o a b s t r a c t article history received january 2, 2021 revised january 17, 2021 accepted january 30, 2021 the covid-19 vaccination program is essential information during this pandemic. information about covid-19 vaccination is disseminated through social media, one of which is instagram. during the covid-19 pandemic, the ministry of health's instagram accounts in various countries provided much information about covid-19, including vaccinations. this research was made to determine the role of instagram as a media to promote the invitation to vaccinate for covid-19 by using the calculation of engagement rates in each post category on the instagram account of the ministry of health of indonesia, malaysia, the united states, and australia. the results obtained in this study are that these accounts have implemented the right strategy in covid-19 vaccination, and several strategic refinements need to be done. this is an open access article under the cc–by-sa license. keywords covid-19 vaccination instagram promotion media http://creativecommons.org/licenses/by-sa/4.0/ http://creativecommons.org/licenses/by-sa/4.0/ 48 bulletin of social informatics theory and application issn 2614-0047 vol. 5, no. 1, march 2021, pp. 47-51 fahmi et.al (promoting covid-19 vaccination with instagram) instagram is an application to take photos, edit, and share these photos with other instagram user communities because instagram has many users worldwide,hich makes it possible to build new information networks [8]–[10]. as of july 2021, instagram users in indonesia reached more than 93,000,000 users [11], while the population in indonesia as of december 2020 reached more than 270,000,000 inhabitants, so instagram users in indonesia reached one-third of the entire population in indonesia. from this data, instagram has the potential to become a promotional media related to an invitation to vaccinate against covid-19 in indonesia because it can reach most of its population easily. 2. method in making this study, researchers used the method of observation to obtain data. observation is the collection of data directly from the field, which is carried out by identifying objects, classifying objects, and writing down the classification results for further processing [12]. observations made by researchers were to identify posts about vaccinations that the indonesian ministry of health @kemenkes_ri has uploaded, malaysian ministry of health @kementeriankesseemalaysia, australian ministry of health @helat.gov.au, and the united states ministry of health @hhsgov during february 2021 and record the post title, date of upload of the post, the number of likes on the post, and the number of comments on the post. the next step after identifying the posts is grouping the posts into classification. classification is grouping facts based on specific characteristics or categories [13]. the researchers compiled two classification categories, namely posts that act as media for information on covid-19 vaccination and media for information on non-vaccination for covid-19. the data processing method used in this study is the calculation of the engagement rate in each classification category. engagement rate is a calculation used to determine the amount of interest other people have on an account or post [14], [15]. by knowing the engagement rate of each classification category, the researcher can find out the role of each of the accounts above. the calculation of the engagement rate is as in formula 1. 𝐸𝑅 = [[𝑡𝑜𝑡𝑎𝑙 𝑙𝑖𝑘𝑒𝑠 + 𝑡𝑜𝑡𝑎𝑙 𝑐𝑜𝑚𝑚𝑒𝑛𝑡𝑠]/𝑛𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝑓𝑜𝑙𝑙𝑜𝑤𝑒𝑟𝑠] 𝑥 100 (1) 3. comparison of covid-19 vaccination promotion from several countries in comparing how the promotion of covid-19 vaccination is carried out through instagram, we observe the government accounts of the republic of indonesia, australia, malaysia, and the united states, which in this case are the accounts of the ministry of health of the four countries, namely the instagram account @kemenkes.ri belonging to the ministry of health of the republic. indonesia, @kementeriankesihatanmalaysia belongs to the ministry of health malaysia, @ health.gov.au belongs to the australian ministry of health and @hhsgov belongs to the us ministry of health. we recorded publication data carried out by each account in february 2021, which included the date the post was published, the content of the post, the number of likes and comments, and the number of followers of each account. then we classify each recorded post into 2 categories: the "vaccine" category, which means the post contains covid-19 vaccination information, and the "non-vaccine" category indicates that the post does not contain covid-19 vaccination information. table.1 information on covid-19 vaccinations in various countries via instagram for the period 01-02-2021 to 28-02-2021 country followers number of posts total likes total comments engagement rate indonesia 2.095.726 15 149.489 2583 7,26 malaysia 1.304.888 10 29.997 254 2,32 australia 63.401 21 2469 106 4,06 united states of america 101.117 2 629 39 0,66 issn 2614-0047 bulletin of social informatics theory and application 49 vol. 5, no. 1, march 2021, pp. 47-51 fahmi et.al (promoting covid-19 vaccination with instagram) table.2 information on non-vaccination against covid-19 in various countries via instagram for the period 01-02-2021 to 28-02-2021 country followers number of posts total likes total comments engagement rate indonesia 2.095.726 17 130.271 3325 6,37 malaysia 1.304.888 125 855.631 7254 66,13 australia 63.401 81 6310 127 10,15 united states of america 101.117 23 3759 163 3,88 in february 2021, there were 34 posts published on their instagram account. of the 34 posts that 15 of contained information about vaccinations, covid-19 with a total like and comment number 149.489 like and 2.583 comments. meanwhile, 17 others were non-vaccine information with a total of likes 130.271 and 3.325 comments. meanwhile, the followers of the instagram account @kemenkes.ri during the observation is 2.095.726 followers. meanwhile, 135 posts were recorded on the instagram account @kementeriankesihatanmalaysia during february 2021. of these 135 posts, only 10 posts can be categorized as “vaccines,” with a total of 29.997 likes and 254 comments. meanwhile, 125 others were grouped into “non-vaccine” posts with more total likes, namely 855.631 and comments that were also more than 7.254 posts in the “vaccine” category. the total number of followers of this account recorded during the observation was 1.304.888 followers. as with the instagram account of the ministry of health of australia, with the number of followers when the observation is only 63.401 followers, we record number of 21 posts in the category "vaccines" which has a total of 2.469 likes and 106 comments, and 81 posts are categorized as post "non-vaccine" which has several 6.310 likes and 127 comments in total. the last account we observed belongs to the united states ministry of health, with 101.117 followers. our observations found that only 2 posts contained covid-19 vaccination information with a total of 629 likes and 39 comments, while 23 posts in the non-vaccine category received 3.759 likes and 163 comments. the total number of posts published by this account is 25 posts for february 2021. 4. differences in the promotion of covid-19 vaccination in different countries in doing promotions through social media, of course, every person/company/organization has its way. likewise, in promoting covid-19 vaccination, the authorities of each country have their way of increasing public interest in vaccinating covid-19, one of which is the use of public figures. the indonesian ministry of health, in several publications regarding covid-19 vaccination in february 2021, was recorded as including public figures known to the public in their posts, even though they were only photos or with statements attached. for example, on february 1, 2021, a publication stated that the president of the republic of indonesia joko widodo, received the second vaccine by including a photo of president joko widodo. in several other posts, @kemenkes_ri also included the 2012-2014 minister of health, dr. nafsiah mboi, spa, mph, and several other public figures, such as minister of health budi gunadi, inviting the public to vaccinate immediately. unlike indonesia, which often uses the presence of public figures to increase the promotion of vaccination programs, the australian ministry of health packages their covid-19 vaccination promotion on instagram @health.gov.au with the covid-19 vaccination branding entitled safe, effective, free. the brand itself promises the quality of the product, service, or experience. the presence of a brand will change the way of thinking and behavior patterns because they believe in the brand. so, with the brand's presence, the australian ministry of health strives to provide the best quality and excellent service to australian citizens so that they are interested in vaccinating. the effort to make this happen is that the australian ministry of health has consistently built this brand by publishing information on the covid-19 vaccine, one of which is by campaigning that those vaccinations can be obtained free of charge for all australian citizens. twice in february 2021, @health.gov.au campaigned for this through their social media in addition to other covid-19 vaccination information. not only that but, “safe” in the australian covid-19 vaccination brand has 50 bulletin of social informatics theory and application issn 2614-0047 vol. 5, no. 1, march 2021, pp. 47-51 fahmi et.al (promoting covid-19 vaccination with instagram) also been revealed several times through their publications, which states that “the covid-19 vaccine has passed the test for quality, safety and efficacy”. apart from brands and the influence of public figures, promotion of covid-19 vaccination can also be done through detailed information. social media as new communication technology is becoming a new source of information [16]. in some cases, social media is used to find information on serious topics such as health, politics, etc. through the malaysian ministry of health, malaysia uses social media as a reference for public information about covid-19 vaccination. their instagram account @kementeriankesihatanmalaysia always provides detailed information about covid-19 vaccinations. for example, in a post entitled “nationality covid-19 immunization program” on february 5, 2021 @kementeriankesihatanmalaysaia provides detailed information about the program starting from its phase, targets to the period the program starts. the united states ministry of health did the same thing, their instagram account was used as a source of information on covid-19 vaccinations that could be trusted by the wider community. the credibility of information sources is an important variable, especially in crisis or risk, such as covid-19 vaccination. even though in february 2021, the @hhsgov account of the united states ministry of health has not been intensively promoting covid-19 vaccination like the countries previously discussed. 5. promotion strategy for covid-19 vaccination through instagram information is essential in everything, including vaccination against covid-19. moreover, with the increased absorption of communication and information technology in society, the role of social media has become crucial. even the dissemination of information from social media is faster than conventional mass media such as news [16]. in critical and risky times, social media has an advantage as a source of information. that is why the clarity of published information is essential. social media is the right tool in distributing information, especially in emergency cases such as covid-19 [17]. the speed of information dissemination, the large mass, and the ease of use are the reasons why clear information needs to be disseminated through social media. in addition, the costs involved in disseminating information through social media are lower than for disseminating information through conventional media such as news and newspapers. infographics, for example, can be used as an appropriate medium to disseminate clear information [18]. besides being transparent, infographics can be made as attractive and attractive as possible to make viewers easier to remember the information provided account owners need to approach viewers by being like someone close to them or presenting information close to them. one way is to increase social influence to attract the attention of viewers, which in turn can change their thoughts and behavior [17]. increasing social influence can be by spreading information in the form of testimonials from people that the audience knows, can be close people or public figures, causing their curiosity to arise after this curiosity arose the term "word of mouth marketing," which would spread by word of mouth or through social media again massively. in addition to using testimonials, approaching viewers to increase interest can be through virtual interactions with viewers through answering audience comments, which can undoubtedly increase the user's interest and trust in the thing being discussed. 6. conclusion in promoting covid-19 vaccination, each government uses different ways, such as public figures, infographics, or branding. these strategies aim to increase the spread of information through social media. the government should approach the delivered information may gain the public trustworthy. thus, social media, especially instagram, is certainly adequate for the covid-19 promotion. references [1] t. k. koley and m. dhole, the covid-19 pandemic. london: routledge india, 2020. [2] f.-x. lescure et al., “clinical and virological data of the first cases of covid-19 in europe: a case series,” lancet infect. dis., vol. 20, no. 6, pp. 697–706, jun. 2020. [3] v. setiawaty et al., “the identification of first covid-19 cluster in indonesia,” am. j. trop. med. hyg., vol. 103, no. 6, pp. 2339–2342, dec. 2020. issn 2614-0047 bulletin of social informatics theory and application 51 vol. 5, no. 1, march 2021, pp. 47-51 fahmi et.al (promoting covid-19 vaccination with instagram) [4] satuan tugas penanganan covid-19, “peta sebaran covid-19,” 2021. [online]. available: https://covid19.go.id/peta-sebaran-covid19. [5] d. e. bloom, d. canning, and m. weston, “the value of vaccination,” in fighting the diseases of poverty, routledge, 2017, pp. 214–238. [6] s. plotkin, “history of vaccination,” proc. natl. acad. sci., vol. 111, no. 34, pp. 12283–12287, aug. 2014. [7] satuan tugas penanganan covid-19, “vaksinasi covid-19,” 2021. [online]. available: https://covid19.go.id/vaksin-covid19. [8] a. j. al-kandari, a. a. al-hunaiyyan, and r. al-hajri, “the influence of culture on instagram use,” j. adv. inf. technol., vol. 7, no. 1, pp. 54–57, 2016. [9] l. s. huey and r. yazdanifard, “how instagram can be used as a tool in social network marketing,” center for southern new hampshire university, 2015. [10] y.-t. huang and s.-f. su, “motives for instagram use and topics of interest among young adults,” futur. internet, vol. 10, no. 8, p. 77, 2018. [11] statista, “leading countries based on instagram audience size as of july 2021,” 2021. [online]. available: https://www.statista.com/statistics/578364/countries-with-most-instagram-users/. [accessed: 14-jul2021]. [12] d. k. padgett, qualitative methods in social work research, 36th ed. sage publications, 2016. [13] a. toloie-eshlaghy, s. chitsaz, l. karimian, and r. charkhchi, “a classification of qualitative research methods,” res. j. int. stud., vol. 20, no. 20, pp. 106–123, 2011. [14] k. r. purba, d. asirvatham, and r. k. murugesan, “an analysis and prediction model of outsiders percentage as a new popularity metric on instagram,” ict express, vol. 6, no. 3, pp. 243–248, sep. 2020. [15] a. a. arman and a. pahrul sidik, “measurement of engagement rate in instagram (case study: instagram indonesian government ministry and institutions),” in 2019 international conference on ict for smart society (iciss), 2019, pp. 1–6. [16] d. westerman, p. r. spence, and b. van der heide, “social media as information source: recency of updates and credibility of information,” j. comput. commun., vol. 19, no. 2, pp. 171–183, jan. 2014. [17] j. j. levac and t. o’sullivan, “social media and its use in health promotion,” rev. interdiscip. des sci. la santé interdiscip. j. heal. sci., vol. 1, no. 1, p. 47, feb. 2010. [18] a. k. m. chan, c. p. nickson, j. w. rudolph, a. lee, and g. m. joynt, “social media for rapid knowledge dissemination: early experience from the covid‐19 pandemic,” anaesthesia, vol. 75, no. 12, pp. 1579– 1582, dec. 2020. bulletin of social informatics theory and application issn 2614-0047 vol. 5, no. 1, march 2021, pp. 1-6 1 https:doi.org/10.31763/businta.v5i1.417 supernatural facebook groups in indonesia aji prasetya wibawa 1,*, bayu kuncoro aji 2, brilliant filby 3, farhan fadhilah 4, imro’aturrozaniyah 5, adib ahmad istiqlal 6 a department of electrical engineering, faculty of engineering, universitas negeri malang, malang, indonesia 1 aji.prasetya.ft@um.ac.id*; 2 bayu.kuncoro.1805356@students.um.ac.id; 3 brilliant.filby.1805356@students.um.ac.id; 4 farhan.fadhilah.1805356@students.um.ac.id; 5 imro'aturrozaniyah.1805356@students.um.ac.id; 6 adib.ahmad.1805356@students.um.ac.id * corresponding author 1. introduction social media allows interaction and exchange of information between people using virtual networks [1]. the popular social media are facebook, twitter, whatsapp, instagram, line, youtube, and linked in. in 2021, facebook users reach 69% of total social media users [2]. in indonesia, social media users reach 170 million people [3], continuously growing. the features of such media may trigger an increase in social media users. facebook provides people to form a virtual community, called a group. the communities may share networks with a single click [4]. these groups bring up endless discussions on diverse topics, where distance and time are no longer considered information obstacles [5]. one strong binder of a community is similar interest [6], such as supernatural topics. supernatural deals with the outer human mind relating to mystical subjects [7]. supernaturalrelated discussions have happened since back centuries to the present [8]. these superstitious things are inseparable from the role of digital media that facilitates the dissemination of information [9]. in other words, the supernatural is past information that continues to go hand in hand with the growth of technology. this article discusses supernatural things on indonesian facebook-groups. in-depth observations using indonesian keywords explore the group's number of followers, posts, and other related matters. the results of this study may provide information to readers related to the phenomena and habits of the groups. a r t i c l e i n f o a b s t r a c t article history received december 10, 2020 revised january 1, 2021 accepted january 14, 2021 social media groups have various discussion topics, including supernatural. this paper aims to examine supernatural groups on facebook based on the number of followers, the number of posts, and discussion topics. the research phase consists of data collection, pre-processing, processing, and data visualization. observations review the group characteristics: group status, members, posts per day, and published content. the immune science group has 4,437,000 with a total of 300 posts. on the other hand, fortune tellers have 95,271 members with a total of 2260 posts. however, not all group’s members are active in content contribution. most of them are passive members who read or follow the posts. this is an open access article under the cc–by-sa license. keywords supernatural observation facebook social media group http://creativecommons.org/licenses/by-sa/4.0/ http://creativecommons.org/licenses/by-sa/4.0/ 2 bulletin of social informatics theory and application issn 2614-0047 vol. 5, no. 1, march 2021, pp. 1-6 wibawa et.al (supernatural facebook groups in indonesia) 2. method this study discusses the supernatural using observation methods. the study involved facebook group members without considering their age, gender, educational background, and occupation. this research has 16 supernatural groups as in table 1. we search the group based on indonesian keywords and label it in a specific category. the observation started from 23 to 30 march 2021. we observed the number of members, posts per day, and the group's content during the period. table.1 total group categories by status afterward, we eliminate noise [10], aiming to level up the classification accuracy in the classification. in this study, the way used to eliminate the missing value used the average value of each attribute [11]. the technique used is a non-participant observation technique by taking an outsider position and trying to distance himself from the categorization and evaluation taken for granted [12]. the last stage is data visualization and analysis using various forms, for example, statistical graphs, plots, and information graphs [13]. in this visual stage, the type of graphics used is the area and line that aims to match the total of the attributes [14]. the visualization results are then analyzed to draw the study conclusion. 3. results and discussion through facebook, one can communicate virtually in groups, share common interests and, express opinions [15]. facebook also helps in disseminating information, one of which is paranormal topics. in this case, social media plays a role in fostering trust in paranormal research scientifically [16]. more than 800 million facebook users have changed the way they communicate and share information [17]. facebook as a media provider of information, also makes it easy for someone to know new things. similarly, when it comes to paranormal topics, users can find out both from individual posts and posts in groups. generally, social media is open to everyone. content posted to the public group homepage is visible to all facebook users [18]. facebook also gives its users the flexibility to set up their privacy. by setting private, only members can access information in the group [19] to keep the information confidential. this study examined groups with private and public status in the supernatural context described in table 2. the study identified 105 groups: 65 private groups and 40 public groups. the group with the highest number of members is a private group with a total of 6,700,000 members. the ratio of public and private groups is 1:25, considered the proportional ratio [20], that is also affected by sometimes incomplete, inconsistent, and redundant data [21]. category public private dukun dan paranormal (witchdoctors) 5 12 gunung (mountains) 0 4 ilmu kebal (immunity against weapon) 0 5 orang pintar (shamans) 1 0 pantai selatan (south coast of java island) 1 1 pelet (incantation) 0 5 pendopo spiritual (spiritual javanese pavilion) 2 1 peramal (fortune teller) 17 14 pesugihan (ocult money rituals) 5 1 pusaka dan benda bertuah (kris and magical objects) 1 3 pusaka dan minyak bertuah (heirloom and magical oil) 2 1 rumah hantu (haunted house) 0 2 santet (black magic) 0 5 supernatural 7 5 tempat pesugihan (places for money rituals) 0 2 tempat ritual (ritual places) 2 1 issn 2614-0047 bulletin of social informatics theory and application 3 vol. 5, no. 1, march 2021, pp. 1-6 wibawa et.al (supernatural facebook groups in indonesia) table.2 number of supernatural groups and total members group status number of groups total members public (0) 40 291,843 private (1) 65 6.700.000 fig. 1. graph of the most posts in a group data can be visualized through graphs to understand data sets from different perspectives [22]. fig.1 presented an area graph of the number of posts in both groups transformed into tables to make it easier to read the highest value in terms of total posts and members. table.3 graph of the most posts in a group group status group name total posts total members public (0) pusaka (keris) dan benda bertuah (magical objects) 2260 95,271 private (1) peramal (frtune teller) 1263 22,390 table 3 show two categories: privacy and public groups. the status of the "public" group occupied the highest position with a total of 2,260 posts in the pusaka (keris) and benda bertuah (magical objects) and peramal (fortune teller) groups having the highest level in the privacy group status with 1,263 posts. the privacy group's characterization of individual actions is described through the r2 model that 22.5% of people rethink when to provide information [23]. 4 bulletin of social informatics theory and application issn 2614-0047 vol. 5, no. 1, march 2021, pp. 1-6 wibawa et.al (supernatural facebook groups in indonesia) fig. 2. graph of the most members in a group in fig. 2, the total members of both groups are shown. the total members in both group statuses are inversely proportional to the total posts. the highest total members of the ilmu kebal (immunity against weapon) privacy group were 4,437,000 and 124,119 in the supernatural public group. table.4 highest number of members and posts group status group name total post total members public (0) supernatural 271 124,119 private (1) ilmu kebal (immune sciences) 300 4,437,000 table 4 shows the total posts of the highest total members of the public and private groups. compared to table 2, public groups have a relatively high rate of dissemination of information (posts) with 95,271 members compared to privacy groups with a total of 4,437,000 with a total of not enough posts signed with the total members listed. so it appears that the public has an interest in the supernatural in private (privacy), indicates a belief in supernatural powers and unexplained powers, thus becoming a psychological trait [24]. in this study, there were 16 group categories based on their status described in table 4. the group 16 categories consist of 6 privacy groups, 1 public group, and 9 public and private groups. the nine categories that have public group status and privacy include, dukun and paranormal (shaman and paranormal), pantai selatan (south beach), pendopo spiritual (spiritual pendopo), peramal (fortune teller), pesugihan (pesugihan), pusaka and benda bertuah, pusaka (heirloom and magical objects, pusaka and minyak bertuah (heirloom and magical oil), supernatural (supernatural), and tempat supernatural (supernatural place). the category with the total groups is peramal (fortune teller). the statement suggests that the peramal (fortune teller) category information is more interesting than other categories. this is evidenced by people who believe in the supernatural in the form of magic. 4. conclusion based on research conducted using observation methods, there is information that as many as 105 supernatural groups are public and private. the highest interest is owned by a privacy group of 6,700,000 people, of which 16 categories are obtained and nine of them are private and public. forecasters dominate the nine categories with the highest value in the section of clairvoyant privacy status, suggests that groups with prominent members do not necessarily have more posts than groups with fewer members. supernatural groups are mostly private activities that are invisible. to conclude, this is done to keep things related to the supernatural, not to become public consumption. issn 2614-0047 bulletin of social informatics theory and application 5 vol. 5, no. 1, march 2021, pp. 1-6 wibawa et.al (supernatural facebook groups in indonesia) references [1] d. zeng, h. chen, r. lusch, and s. h. li, “social media analytics and intelligence,” ieee intelligent systems, vol. 25, no. 6. pp. 13–16, nov-2010. [2] b. auxier and m. anderson, “social media use in 2021,” pew research center, apr-2021. . [3] s. kemp, “digital in indonesia: all the statistics you need in 2021 — datareportal – global digital insights,” feb-2021. . [4] j. swart, c. peters, and m. broersma, “sharing and discussing news in private social media groups: the social function of news and current affairs in location-based, work-oriented and leisure-focused communities,” digit. journal., vol. 7, no. 2, pp. 187–205, feb. 2019. [5] t. sinta, n. fatimah, and r. hidayah, “the development of cihoe game as a learning media in the elemental chemistry material,” int. j. act. learn., vol. 6, no. 2, pp. 49–57, oct. 2021. [6] s. garfield, “types of communities & enterprise social network groups: a trail that collects,” apr-2018. [7] bennett, “aspects of supernatural belief, memorate and legend in a contemporary urban environment,” 1985. [8] tim cnn indonesia, “muasal mistik ‘bertahan’ di tengah masyarakat indonesia,” cnn indonesia, oct2019. [9] e. m. syafrudin, “superstitious belief in purchasing property,” s1 thesis, uajy., pp. 1–10, 2016. [10] r. amanda and e. s. negara, “analysis and implementation machine learning for youtube data classification by comparing the performance of classification algorithms,” j. online inform., vol. 5, no. 1, pp. 61–72, jul. 2020. [11] a. bakker, “the early history of average values and implications for education,” j. stat. educ., vol. 11, no. 1, 2003. [12] m. ciesielska, k. w. boström, and m. öhlander, “observation methods,” in qualitative methodologies in organization studies, vol. 2, springer international publishing, 2017, pp. 33–52. [13] r. l. cardoso, r. o. leite, and a. c. b. de aquino, “a graph is worth a thousand words: how overconfidence and graphical disclosure of numerical information influence financial analysts accuracy on decision making,” plos one, vol. 11, no. 8, p. 160443, aug. 2016. [14] w. y. mengesha, yonatan; singh, ajit pal; amedie, “quality improvement using statistical process control tools in glass bottles manufacturing company,” int. j. qual. res., vol. 7, no. 1, pp. 107–126, 2013. [15] b. m. garrett and r. l. cutting, “magical beliefs and discriminating science from pseudoscience in undergraduate professional students,” heliyon, vol. 3, no. 11, p. e00433, nov. 2017. [16] l. e. young, k. fujimoto, and j. a. schneider, “facebook group affiliation ties, group topics, and hiv behavioral characteristics among young black men who have sex with men: potential for public health intervention,” ssm popul. heal., vol. 9, dec. 2019. [17] r. e. wilson, s. d. gosling, and l. t. graham, “a review of facebook research in the social sciences,” perspect. psychol. sci., vol. 7, no. 3, pp. 203–220, may 2012. [18] m. stellefson, s. paige, a. apperson, and s. spratt, “social media content analysis of public diabetes facebook groups,” j. diabetes sci. technol., vol. 13, no. 3, pp. 428–438, may 2019. [19] n. s. lau and l. lam, “an investigation of the determinants influencing student learning motivation via facebook private group in teaching and learning,” in lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics), 2012, vol. 7411 lncs, pp. 35–44. [20] v. agarwal, “research on data preprocessing and categorization technique for smartphone review analysis,” int. j. comput. appl., vol. 131, no. 4, pp. 30–36, 2015. [21] c. viau and m. j. mcguffin, “connectedcharts: explicit visualization of relationships between data graphics,” comput. graph. forum, vol. 31, no. 3pt4, pp. 1285–1294, jun. 2012. 6 bulletin of social informatics theory and application issn 2614-0047 vol. 5, no. 1, march 2021, pp. 1-6 wibawa et.al (supernatural facebook groups in indonesia) [22] m. hajli, “information sharing on social networking sites: the role of perceived control of information and gender,” in proceedings of the eighth pre-icis workshop on information security and privacy, 2013. [23] j. schuurmans-stekhoven, “measuring spirituality as personal belief in supernatural forces: is the character strength inventory-spirituality subscale a brief, reliable and valid measure,” implicit relig., vol. 17, no. 2, pp. 211–222, 2014. [24] m. h. kahissay, t. g. fenta, and h. boon, “beliefs and perception of ill-health causation: a socio-cultural qualitative study in rural north-eastern ethiopia,” bmc public health, vol. 17, no. 1, p. 124, dec. 2017. bulletin of social informatics theory and application issn 2614-0047 vol. 4, no. 2, september 2020, pp. 76-82 76 https:doi.org/10.31763/businta.v4i2.283 smartphone for palm oil fruit counting to reduce embezzlement in harvesting season aripriharta a,1,*, adim firmansah b,2, nandang mufti c,3, gwo-jiun horng d,4 , norzanah rosmin e,5 a department of electrical engineering, faculty of engineering, universitas negeri malang, indonesia b graduate school, faculty of engineering, universitas negeri malang, indonesia c department of physics, faculty of mathematics and natural sciences, universitas negeri malang, indonesia d department of computer science and information engineering southern taiwan university of science and technology, taiwan e centre of electrical energy system (cees), sekolah kejuruteraan elektrik, fakulti kejuruteraan, universiti teknologi malaysia, malaysia 1 aripriharta.ft@um.ac.id *, 2 adimfirmansah@gmail.com; 3 nandang.mufti.fmipa@um.ac.id , 4 grojium@gmail.com , 5 norzanah@utm.my * corresponding author 1. introduction palm oil is a plant species that grows in tropical areas. palm oil is often used as a basic ingredient of products traded internationally, such as alternative energy sources [1] and vegetable oil [2]. in 2013, indonesia's palm oil land reached 10.6 million ha. the number expands annually. in 2020, palm oil land has increased by up to 13.7 million ha [3]. the increase in demand and consumption of palm oilbased products leads the agriculture industry to explore the technology to provide benefits, competitiveness, and market viability [4]. therefore, an appropriate management system is necessary, starting from land selection, nursery, planting, maintenance, and harvesting. the harvest system plays an essential role because it affects the freshness of the fruit produced. 1.1. harvest system automation needs harvest estimation is an important parameter in the agriculture industry to prepare the harvesting process, especially ordering transportation facilities. companies need to calculate yields accurately so that there is data alignment of sales, purchases, and storage of harvest data. companies generally use manual calculation methods to estimate harvest yields with the help of manual labors. in general, large companies cost around $600,000 to $1,000,000 for manual calculations per year [5]. in addition to manual calculation costs, many other evaluation costs such as overhead costs that include insurance and total equipment repair costs. thus, companies need more sophisticated technology to calculate harvest yields automatically. a r t i c l e i n f o a b s t r a c t article history received august 1, 2020 revised august 15, 2020 accepted august 30, 2020 harvest estimation is an essential parameter in the agriculture industries to estimate transportation facilities and storage areas in the harvesting season. meanwhile, companies are required to calculate crop yields quickly and accurately. this paper reports on an experimental study in the form of a smart application to count oil palm fruit in the field quickly and accurately. the system used a single shot detector algorithm to count the number of fresh fruit bunches (ffb) on-site using a smartphone camera. the cutting area (ca) at the top of the collection was collected in various positions in the database. our research documented that the algorithm matched the ca with the picture taken by the operator. hence, the application automatically calculated the number of harvests per-site in the ffb unit. the data were then sent to the cloud database via a wireless router in a warehouse or through a cellular network. the main advantage of this application is reducing the theft that usually occurs on the spot. the model used performs very well for agricultural applications, with 94% to 99% accuracy. this is an open access article under the cc–by-sa license. keywords image matching harvesting cnn yolo mailto:nandang.mufti.fmipa@um.ac.id http://creativecommons.org/licenses/by-sa/4.0/ http://creativecommons.org/licenses/by-sa/4.0/ issn 2614-0047 bulletin of social informatics theory and application 77 vol. 4, no. 2, september 2020, pp. 76-82 aripriharta et.al (smartphone for palm oil fruit counting to reduce embezzlement in harvesting season) automatic crop yields counting provides many benefits, such as making the harvest process faster. a faster harvest cycle makes labor costs more efficient, especially laborers paid on an hourly basis. the automatic calculation system also provides more precise and consistent results. the low error rate can reduce the budget due to crop yields' miscalculations. the fast harvesting process also makes the company can produce fresh fruit. the automation system can reduce embezzlement of palm oil crops that harm the company. 1.2. related works research on increasing crop harvesting efficiency has received much attention in the last few decades, especially in detecting and counting the number of fruits. one appliance widely used is computer vision techniques based on color previous research carried out by [6] deployed image colors to detect maturity and count the number of green, oranges. the results showed a successful detection rate of 75.3%, with an error rate of 27.3% during the day. sunlight conditions during the day have a significant influence on the results of detection [7], [8]. the sun's rays create shadows that cause a standard segmentation procedure to divide the surface into several fragments. anchored by these results, [9] applied computer vision techniques at night to detect fruit using an artificial light source with 78% success rate. meanwhile, authors [7] used computer vision techniques for detecting oranges in outdoor environments-based color. the obtained accuracy rate is 76.5%. furthermore, authors [10] added size parameters to improve the accuracy of fruit detection. the accuracy level produced in their study using the color, shape, and size parameters increased to 90%. traditional computer vision techniques have been widely adopted in the agricultural industry. although the method works well under certain conditions, some cases require more precise detection due to changes in environmental conditions such as illuminations and occlusions [11]. the traditional computer vision algorithm also has a high error rate when detecting fruit that piled up. in recent years, the computing capabilities of electronic devices continue to increase. the processor continues to grow until it is created with a special purpose processor for graphics processing called the graphics processing unit (gpu). in this era, deep learning (dl), which a sub-field of machine learning (ml), has been widely developed. these are included in the category of artificial intelligent (ai). dl uses a layered algorithm structure called an artificial neural network (ann) [8]. dl makes it possible to build accurate detectors through training that automatically learns features from photos and uses them efficiently. in dl, visual features are generally extracted by the convolutional neural network (cnn) [12]. in an earlier study, [13] adopted the faster r-cnn model called deep fruit to detect fruit. the model produced after training has an accuracy of 83.8% for detecting paprika. with a different model, authors [14] developed cnn based on inception-resnet architecture model called deep count to count fruit. this research was carried out by adding synthetic images to produce a better model. after tested in a real environment, the model has an accuracy of 80% to 85%. [8] employed a single-shot detector to detect fruit in real-time. the model also used synthetic images as training data and produced an accuracy of 0.9 with 0.64 intersection over union (iou). all these three studies used a computer or minicomputer to conduct detection. unlike the above three investigations, [15] applied the r-cnn faster model and single shot detector (ssd) to calculate crop yield estimates. in their study, the trained r-cnn faster model was able to obtain an accuracy rate of 89%, while the ssd model had an accuracy rate of 82%. on the other hand, [16] applied dl in unmanned aerial vehicles (uav) to count apples and oranges. they used two-layer cnn. the first layer is a fully convolutional network-based blob detector, and the second layer is a counting algorithm based convolutional network-based. interestingly, this study not only implements dl but also combines linear regression to determine the results of the fruit calculation. the results showed the applied model had an accuracy rate of 91.3% for detecting apples. based on the needs of the crop automation system and technological developments explained earlier in this paper, we aim to propose an automatic crop yield calculation as a new technological appliance in agricultural sectors. the proposed system applies the dl to calculate yields. in contrast to the study of the application of dl to calculate crop yields, our experiment uses a single shot detector model called you only look once (yolo) lite version 3 model. the model is embedded in the smartphone application to detect objects. overall, system details are explained in the method section. 78 bulletin of social informatics theory and application issn 2614-0047 vol. 4, no. 2, september 2020, pp. 76-82 aripriharta et.al (smartphone for palm oil fruit counting to reduce embezzlement in harvesting season) 2. method this proposed system implemented a single-shot detector (yolo) lite version 3 as cnn in a smartphone application to detect and count palm oil fruit. the smartphone application accessed the camera to take pictures. the system detected palm oil fruit in real-time and directly displays the bounding box on the detected fruit. besides displayed on the smartphone application in real-time, the number of fruits is also sent to the cloud database. this system can use two network connection modes, namely a cellular network that utilizes a base transceiver station (bts) and a wi-fi network that utilizes a wireless router. data sent in the cloud database is displayed in the form of a web interface that can be accessed via a computer or smartphone. the overall system block diagram is shown in fig. 1. fig. 1. system block diagram. this system can be used to calculate harvest yields that are outside the warehouse if there is a cellular network to send data to the database. fig. 2 shows the proposed system implementation scenario. workers who oversee counting fruit carry a smartphone with an installed automatic counter application. workers who are in the warehouse area can also use wi-fi networks to send data to the cloud database. besides, workers who work in outdoor areas can use the cellular network that is available to send data to the database. fig. 2. implementation scenario 3. results and discussion the test was carried out on a smartphone with a mediatek mt6753t chipset. the smartphone uses an octa-core 1.5 ghz cortex-a53 processor and a mali-t720mp3 gpu. fig. 3 showed a screenshot of the application display when workers were counting the number of palm oil fruit. the detected fruit was marked with a red bounding box. the test results show that the used model can detect palm oil fruit well. issn 2614-0047 bulletin of social informatics theory and application 79 vol. 4, no. 2, september 2020, pp. 76-82 aripriharta et.al (smartphone for palm oil fruit counting to reduce embezzlement in harvesting season) fig. 3. detection application modifications to the smartphone application scripts were performed to display the confidence level of each detected fruit. fig. 4 shows the display of the smartphone application that the script added to display the name and level of confidence of the detected palm oil fruit. the experimental results show a confidence level (accuracy) of 94% to 99%. the high level of confidence indicates the used model has great accuracy in detecting palm oil fruit. fig. 4. confidence value the detection button is used to start and end the palm oil fruit detection process. after the worker presses the detection button, the calculated number of palm oil fruit is automatically sent to the cloud database. the implementation of the proposed system can accelerate the process of harvesting palm oil. manual calculations generally require ± 2 minutes. the time needed for manual calculations is also directly proportional to the number of fruits. manual calculations for large numbers also have a high error rate. after implementing the proposed system, the calculation process of palm oil fruit decreased to ± 30 seconds, with a high degree of accuracy. overall, the proposed system has an accuracy rate of 94% to 99%. a comparison of the proposed system accuracy with the previous research is shown in table 1. the comparison results show that three studies can produce an accuracy rate above 90%. if the level of accuracy is greater, the error rate for fruit harvest calculation is thus lower. the level of accuracy is significantly influenced by the network architectures, datasets, training system, and the detected object form [8], [17]. the level of accuracy can be improved through the longer training stages of the model. the error level due to illumination can be minimized by providing a dataset with several illumination variations or add a process layer [18]–[20]. however, if more layers are used, then it takes longer computational time to detect fruit. 80 bulletin of social informatics theory and application issn 2614-0047 vol. 4, no. 2, september 2020, pp. 76-82 aripriharta et.al (smartphone for palm oil fruit counting to reduce embezzlement in harvesting season) table.1 accuracy comparison reference model accuracy (%) [13] faster r-cnn 83,8 [14] inception-resnet 80-85 [8] modified yolo v2 85-95 [15] faster r-cnn 89 [15] ssd 82 [16] blob detector + count network + linear regression 91,3 proposed system yolo lite v3 94-99 to obtain responses from users, we carried out a survey of the application use feedback. survey documents were disseminated through google online survey covering several aspects, namely userfriendly, execution speed, accuracy, and benefits. furthermore, each item of this question has a double answer option. fig. 5 shows the feedback from users. based on our survey, it was found that 95% agreed that the developed application was user-friendly, and only 5% of them disagreed. this is because we have developed an application to be able to process images from the user's smartphone camera. users only need to take pictures of the oil palm harvest, and then our algorithm will process the image data automatically. fig. 5. users’ feedback users’ responses on the execution speed are quite good, with 70% stating that the application is fast, and 30% contended slow. execution is carried out in the cloud, while the speed constraints are usually on uploading and downloading data transmission from the cloud, depending on the type of smartphone, signal strength, and internet user quota. from the research aspect, almost 85% of users responded that the image matching algorithm is accurate, and 15% of them expressed conversely. in general, this algorithm has been proven to be of good quality through performance tests so that the responses of 15% of users are probably due to the user's camera resolution or the user's poor photo technique. the last aspect is the benefit where 88% of users shared that the application entails many benefits, while 12% of them did not express the same idea. this shows that the developed application is acceptable for the users. 4. conclusion the single-shot detector (yolo) lite version 3 model has been successfully implemented in the smartphone application to speed up the process of harvesting palm oil for automatic counting. the applied model has high accuracy in detecting palm oil fruit. the network connection method used in the system more flexible because it can be used to calculate the amount of palm oil inside or outside the warehouse (garden area). compared to the manual calculation, the proposed system can increase the efficiency of the harvest process with a low error rate. this could bring a precise number of fruit and reduce the embezzlement. in general, this application is plausible. it can be construed from the users’ positive responses to all survey questions concerning aspects of user-friendliness, accuracy, usefulness, and speed. differences in users' responses to binary questions are due to differences in smartphone types and camera resolutions. acknowledgment this work is supported by pnbp 2020 um. % issn 2614-0047 bulletin of social informatics theory and application 81 vol. 4, no. 2, september 2020, pp. 76-82 aripriharta et.al (smartphone for palm oil fruit counting to reduce embezzlement in harvesting season) references [1] a. c. fitrianto, k. tokimatsu, and m. sufwandika, “estimation the amount of oil palm trees production using remote sensing technique,” in iop conference series: earth and environmental science, 2017, vol. 98, no. 1, p. 12016. [2] l. k. aguiar, d. c. martinez, and s. m. q. caleman, “consumer awareness of palm oil as an ingredient in food and non-food products,” j. food prod. mark., vol. 24, no. 3, pp. 297–310, 2018. [3] m. a. shahputra and z. zen, “positive and negative impacts of oil palm expansion in indonesia and the prospect to achieve sustainable palm oil,” in iop conference series earth and environmental science, 2018, vol. 122, no. 1, p. 12008. [4] j. m. ponce, a. aquino, b. millan, and j. m. andújar, “automatic counting and individual size and mass estimation of olive-fruits through computer vision techniques,” ieee access, vol. 7, no. may, pp. 59451– 59465, 2019. [5] a. syal, d. garg, and s. sharma, “apple fruit detection and counting using computer vision techniques,” in ieee international conference on computational intelligence and computing research, 2014, pp. 1– 6. [6] f. kurtulmus, w. s. lee, and a. vardar, “green citrus detection using ‘eigenfruit’, color and circular gabor texture features under natural outdoor conditions,” comput. electron. agric., vol. 78, no. 2, pp. 140–149, 2011. [7] y. çakır, m. kırcı, e. o. güneş, and b. b. üstündağ, “detection of oranges in outdoor conditions,” in second international conference on agro-geoinformatics (agro-geoinformatics), 2013, pp. 500–503. [8] k. bresilla, g. d. perulli, a. boini, b. morandi, l. corelli grappadelli, and l. manfrini, “single-shot convolution neural networks for real-time fruit detection within the tree,” front. plant sci., vol. 10, no. may, pp. 1–12, 2019. [9] a. payne, k. walsh, p. subedi, and d. jarvis, “estimating mango crop yield using image analysis using fruit at ‘stone hardening’ stage and night time imaging,” comput. electron. agric., vol. 100, no. january, pp. 160–167, 2014. [10] w. c. seng and s. h. mirisaee, “a new method for fruits recognition system,” in 2009 international conference on electrical engineering and informatics, 2009, vol. 1, pp. 130–134. [11] z. s. pothen and s. nuske, “texture-based fruit detection via images using the smooth patterns on the fruit,” in 2016 ieee international conference on robotics and automation (icra), 2016, pp. 5171–5176. [12] p. nevavuori, n. narra, and t. lipping, “crop yield prediction with deep convolutional neural networks,” comput. electron. agric., vol. 163, no. april, p. 104859, 2019. [13] i. sa, z. ge, f. dayoub, b. upcroft, t. perez, and c. mccool, “deepfruits: a fruit detection system using deep neural networks,” sensors (switzerland), vol. 16, no. 8, pp. 12–22, 2016. [14] m. rahnemoonfar and c. sheppard, “deep count: fruit counting based on deep simulated learning,” sensors (switzerland), vol. 17, no. 4, pp. 1–12, 2017. [15] h. yu, s. song, s. ma, and r. o. sinnott, “estimating fruit crop yield through deep learning,” in bdcat 2019 proceedings of the 6th ieee/acm international conference on big data computing, applications and technologies, 2019, pp. 145–148. [16] s. w. chen et al., “counting apples and oranges with deep learning: a data-driven approach,” ieee robot. autom. lett., vol. 2, no. 2, pp. 781–788, 2017. [17] s. gupta, a. agrawal, k. gopalakrishnan, and p. narayanan, “deep learning with limited numerical precision,” in 32nd international conference on machine learning, icml 2015, 2015, vol. 3, pp. 1737– 1746. [18] l. murmann, m. gharbi, m. aittala, and f. durand, “a dataset of multi-illumination images in the wild,” in proceedings of the ieee international conference on computer vision, 2019, vol. 2019–octob, pp. 4079–4088. 82 bulletin of social informatics theory and application issn 2614-0047 vol. 4, no. 2, september 2020, pp. 76-82 aripriharta et.al (smartphone for palm oil fruit counting to reduce embezzlement in harvesting season) [19] b. arad, p. kurtser, e. barnea, b. harel, y. edan, and o. ben-shahar, “controlled lighting and illumination-independent target detection for real-time cost-efficient applications. the case study of sweet pepper robotic harvesting,” sensors (switzerland), vol. 19, no. 6, pp. 1–15, 2019. [20] m. wang and z. shang, “deep separable convolution neural network for illumination estimation,” icaart 2019 proc. 11th int. conf. agents artif. intell., vol. 2, no. 174, pp. 879–886, 2019. bulletin of social informatics theory and application issn 2614-0047 vol. 4, no. 2, september 2020, pp. 52-58 52 https:doi.org/10.31763/businta.v4i2.289 how much does distance learning affect social life and psychology of growing adolescent ming foey teng a,1,*, yudha kusuma putra b,2, muhammad, ilham b,3 , wahyu arbianda yudha pratama a american university of sharjah, united arab emirates b universitas negeri malang, malang,indonesia 1 mteng@aus.edu* * corresponding author 1. introduction with the significant rate of growth technology in this millennial era, technology will take over the conventional way, eventually, from a simple labor task, information, communication, and education [1]. even though technology only focused on the economics and social field to improve countries at first, in the last two decades, technology has been improving education in many ways. the improvement of education technology was affected by the already improved information and communication that has been around for a longer time. it is known that education is one of the most important aspects to enhance the quality of developing countries [2]. one of the innovations of technology in the education field is distance learning [3], [4]. distance learning is considered as an essential strategy to improve the quality of education, where it also provides advocating for peer-to-peer collaboration. additionally, distance learning also provides a greater sense of responsibility for learning to the teachers [4]. distance learning provides flexibility when considering time and place in education. distance learning also enhances the efficiency of gathering knowledge through the ease of access to vast information provided on the internet. distance learning is also considered as a cost-effective method where there is no need for teachers and students to travel to school building [5]. distance learning also can be a solution to the bullying that occasionally occurs in the conventional school, where according to suicide and suicide attempts in adolescents [6] and national center for educational statistics [7], one out of every five (20,8%) students report being bullied. a r t i c l e i n f o a b s t r a c t article history received june 20, 2020 revised july 3, 2020 accepted july28, 2020 distance learning is one of the most important innovations in the education field. it provides flexibility when considering time and place in education while enhancing the efficiency of gathering knowledge. while distance learning improves the quality of education, distance learning diminishes the interaction between students and teachers or among students themselves. the lack of interaction that occurs in distance learning affects adolescent’s social life and psychology. in this research, we would like to study all the impacts that are going to affect students, especially in their social life and psychology. in this research, the method used is a document study or document analysis. the purpose of this research is to observe and analyze the impact of distance learning to improve distance learning in the future not only in educational but also in social and psychological side. with this research, we find that students that use distance learning without any interaction with the others tend to induce an antisocial behavior which leads to loneliness and suicidal thought. this is an open access article under the cc–by-sa license. keywords distance learning student’s psychology students social life suicide rate http://creativecommons.org/licenses/by-sa/4.0/ http://creativecommons.org/licenses/by-sa/4.0/ issn 2614-0047 bulletin of social informatics theory and application 53 vol. 4, no. 2, september 2020, pp. 52-58 teng et.al (how much does distance learning affect aside from the advantages and benefits of distance learning mentioned above, distance learning also has its disadvantages. while distance learning improves education quality, distance learning also diminished the interaction between not only teachers and students, but also among students themselves [5]. not only has that, but the presence of the instructor also affected the way students learn. instructor in learning activities is essential on some things like "degree of feeling, perception, and reaction of being connected." while students can get all of these from face-to-face courses, distance learning limits them all, especially when the courses are in the asynchronous sessions[8]. with the small amount of interaction between students and teachers, or among students themselves in distance learning, it will affect the character development of students eventually. the character development of students is affected by these changes in the environment is their psychology and social skill, where adolescents around those ages need friends to develop their character. in this paper, we will try to analyze the impacts of distance learning both in a good and bad way. through the result that we get from analyzing data of the impact from distance learning, we hope that we can make a better future for distance learning without decreasing its quality, whether on the education side or social side and psychology side. 2. literature overview 2.1. distance learning brief history with the domination of technology and technological advancements, especially in terms of science and computer, the distance between information technology and communication technologies has been reduced largely. thus, the enhancement in education has improved a lot using the technology that enabled the system of education. distance learning is one of the improvements in education that's used to increase the quality of education [2]. distance learning unites two main areas, learning, and technology. learning is a process to achieve knowledge and technology, is a tool or improvement to help teachers and students in the learning process. even though the term "e-learning" was introduced by white [10] as "learning via electronics sources, such as television, computer, video-disk, teletext, video-text.". the distance learning system was conceptualized first from 1960. distance learning was first introduced to focus more on the student in the concept of computer-assisted instruction as a means of problem-solving. in 1997, distance learning turned its meaning into "an interactive distance learning" [10]. however, nowadays, distance learning is referred to internet-based learning ecosystem that uses technology such as smartphones, laptops, tablets, and computers or through the world wide web with the help of the internet to connect among the students and their teachers [11]. the internet has become one of the essential ways to make resources available, especially in terms of research and learning for both teachers and students. some researchers also defined distance learning as an evolutionary way to make benefit of the workforce with the knowledge and skills. also, distance learning is an interactive, repetitious, self-paced, and customizable system in learning [5]. distance learning also provides an alternative way to learn and enables students to access course information without any geographical or time restrictions. it also provides interactivity between students and instructors to promote a more efficient and effective way of learning traditionally [12]. 2.2. type of distance learning there are various ways to classify types of distance learning. generally, distance learning can be divided into two types: "synchronous" and "asynchronous.". synchronous distance-learning requires students and lecturers to be online at the same time to do the learning activity. while asynchronous distance-learning provides more flexibility in learning activity for both students and teachers [5]. 2.3. advantages of distance learning according to raba [5], distance learning can make objectives be accomplished in the shortest time with the least effort for both the students and teachers. that way, both students and teachers can develop their skills in the meantime. distance learning can also be a good solution towards bullying that mostly occurs on school faculty. bullying is an aggressive behavior, intentional acts carried by a group or individual repeatedly and overtime against helpless victims. bullying is not always in a physical form (e.g., hitting, kicking, damaging victim's property), but also in verbal attacks and relational/social aggression (e.g., social 54 bulletin of social informatics theory and application issn 2614-0047 vol. 4, no. 2, september 2020, pp. 52-58 teng et.al (how much does distance learning affect) exclusion, fake rumor spreading) up to the most recent forms of attack that occurs through the internet, cyberbullying. bullying sometimes involves an imbalance of power (e.g., physical power or popularity)[13]. according to suicide and suicide attempts in adolescents [6], bullying is one of the most significant factors in suicide ideation and behavior. it is stated that 23,7% of girls and 15,6% of boys were bullied on school property where traditional learning occurs. the data even shows that 8,7% of girls and 5,4% of boys did not go to school one day in the past 30 days because they feel unsafe at school. according to sadeghi [14], distance learning saves significant amount of money, where the fee of a distance education degree costs less than the regular one. distance learning also provides flexibility to learn, where in traditional school students were asked to follow the curriculum. sadeghi also states that the flexibility of distance learning provides the chance of students to earn while learning. 2.4. disadvantage of distance learning however, distance learning has its disadvantages despite having so many advantages. distance learning as an alternative way to traditional school makes the learners, as well as students, have less interaction or relation. distance learning might also be less active when it comes to clarification, offering explanations, and interpretations where it usually is much more comfortable in traditional face to face encounters between students and instructors [5], [15]. on the education side, distance learning does not provide any control of any immoral activities like cheating on a test. distance learning also enables students to do piracy or plagiarism as well as copy and paste. some field in scientific that requires practical activities like pharmacy in medical science cannot be optimized using distance learning. last but not the least, communication skills in distance learning might have a negative effect where though distance learning might have excellent academic knowledge, they may not possess any skill to deliver their acquired knowledge [5]. according to sadeghi [14], distance learning has higher chances of distraction. with no one around students who can help to remind about assignments, the chances of getting distracted are more likely higher. job markets and employers also tend to choose a degree from a regular college over an online degree. so, it could be quite dangerous for students who rely only on online degree. cacault [16] states that distance learning such as livestreaming-based learning only enhances students who have high-ability in their exam grades but lowers the exam grades of students who have low-ability 3. method in this research, the method used is a document study or document analysis. document analysis is a systematic procedure for reviewing or evaluating documents both material (computer-based and internet transmitted) print and electronic. document analysis was done by taking data from documents related to the research conducted. in this case, the research conducted is related to distance learning and its influence on the community. then the data is analysed and continued with abstract formation, literature review, problem identification, proposed solutions, and making conclusions [9]. the document analysis in this study aims to find out various kinds of cases and the impact of distance learning on social or psychological life. from the study results, the document will be analysed to make conclusions and conclusions. in addition, data searches for the use of e-learning in the community are also carried out. each of these data will be used to find out the frequency of community interest in using distance learning. in addition, we analyse the relationship between the effects of distance learning, psychological and sociological. in this study, we use several references obtained from various journals, scientific articles, and data science. the documents were obtained from the google search engine, where we searched by typing in a number of keywords, such as distance learning, e-learning, the effect of learning, e-learning for children, the effect of distance learning on psychology and sociology, cyberbullying, social and psychological, advantages and disadvantages of distance learning. from those references, we used the references which have connection to the effect of distance learning and cited it in this paper for a literature review. based on that analysis, we conclude a solution that can reduce the negative effect of distance learning. issn 2614-0047 bulletin of social informatics theory and application 55 vol. 4, no. 2, september 2020, pp. 52-58 teng et.al (how much does distance learning affect 4. results and discussion between 2000 and 2012, the enrolment of distance learning increases from 8 to 32% and those who use the online distance learning fully went up from 2 to 6% (fig.1) [17]. fig. 1. growth of distance learning in 2002-2012[17] according to the elearning industry, approximately 77% of us corporations used online learning. while e-learning increases learning retention rates between 25% and 60%, retention rates of face to face training are much lower: 8% and 10%. its development is proved by the growth of 900% between 2001 and 2017, according to elearning industry. elearning industry also stated that 42% of expansion income in us organizations. according to statista, 43% of us college students found digital study technologies help do homework, while 81% of us college students agreed that digital learning technology was helping them improve their grades. according to one of the biggest e-learning websites, kahoot! the total of monthly active users on kahoot! are approximately 70 million. the users of kahoot! are mostly workers around age 35-44 (25%) and 45-54(34) where they want gamebased learning. there are three things that kahoot! users want to change the way to learn, which are: more interactive learning, flexibility, more time allocated on training. the lack of interaction in distance learning also tends to induce antisocial behavior in adolescents. it is known that distance learning lacks interaction between students and their instructors or among the students themselves. while it is true that problem such as adhd, teenage pregnancy, substance abuse, and crime impose [18] or basic training in home where distance learning usually happens to develop antisocial behavior, e.g., poor parental discipline and monitoring [19], distance learning also decrease the chance of adolescents to develop their social-skill with the lack of communication skill [5]. besides the lack of development in communication skill, humans are social creatures which need to interact with others. while distance learning provides a high quality of education, it also could put students, especially adolescents, to loneliness. loneliness is one of the main factors that can lead to various psychiatric disorders and various physical disorders [20]. being lonely is also one of the social factors that affect the risk of suicide. those who have suicidal behavior could be prevented in many ways, like being at school, workplace, and community based on the intervention. the example of school-based prevention of suicidal behavior is the good behavior game, where the teacher teaches the classroom intervention of suicidal behavior and sos program, which gives students awareness about the relationship between mental disorders and suicide where teachers encourage students to seek appropriate help when feeling depressed [21]. with data from “understanding student's online behavior and their relations inside real class gradings”, we can conclude that students with more online time tend to be approved inside real class. as seen in fig. 2, we can see that students who have more time-online tend to be approved in real class. 56 bulletin of social informatics theory and application issn 2614-0047 vol. 4, no. 2, september 2020, pp. 52-58 teng et.al (how much does distance learning affect) fig. 2. online-time as a factor of being approved in real class in fig. 3, it is shown that students who do not have “collaborative post” are not approved in real class. we can also see that students who have time-online above 1466 tend to be approved in real class. distance learning encourages students to be more creative and collaborative to be approved in real class gradings. fig. 3. decision tree of being approved in real class on “understanding student’s online behavior and their relations inside real class gradings” based on the results of the distance learning’s impact on adolescent, both advantages and disadvantages, we propose solutions that can improve distance learning in social, psychological, and educational side. 4.1. increasing the synchronous system on distance learning even though distance learning specializes in the flexibility of time and place, it is proved to affect the psychology and social life of adolescents. additionally, synchronous system on distance learning can be a solution on the lack of interaction between adolescents and their teachers. it is also proved that the communication between adolescents and their teachers affects the quality of students’ performance. issn 2614-0047 bulletin of social informatics theory and application 57 vol. 4, no. 2, september 2020, pp. 52-58 teng et.al (how much does distance learning affect 4.2. increasing the interactivity of asynchronous system on distance learning one of the biggest downsides of distance learning is the lack of interaction between students and their teachers and among students themselves. asynchronous system on distance learning is one of the biggest factors when it comes to the lack of interaction. it is because in asynchronous system, students do not have to be on the same time and place to do learning activity. to reduce the lack of interaction in asynchronous system, we need to increase the interactivity. that way, students would feel like they are not learning from a robot and make learning activity less boring. 4.3. creating group-based activities even though synchronous system can be an alternative way to fix the lack of interaction, a reallife interaction is still needed, especially on adolescents. a group-based activity can be a solution to improve social-life of adolescents. this group-based activity can be “ice-breaking” from learning through distance learning where students can interact with others. this group-based activity does not need to be focused on education. 4.4. creating a plagiarism system one of the biggest disadvantages in distance learning on educational side is the lack of control in students’ work. to improve distance learning, there must be a system that can check piracy and plagiarism. that way, teachers do not have to check the authenticity of students’ works all alone. additionally, it will reduce the amount of cheating habit. 5. conclusion distance learning is one of the best innovations in education with all the advantages that allows students and teachers to get huge information through the ease use of internet. distance learning also provides flexibility when considering time and place in learning activity. however, distance learning diminishes the interaction between students and teachers and among students themselves. the lack of interaction may cause antisocial behavior where it could lead to suicidal-thought and suicidal-behavior from being lonely. there is no denying that distance learning already improved many aspects in educational field. however, to improve the lack of interaction in adolescents, distance learning needs to fix the current system, especially the asynchronous system. distance learning needs to have more interactive way to do the learning activity. synchronous system is one of the solutions that has been used. it is true that synchronous system decreases the flexibility on distance learning, but the users would feel less lonely. another way to improve the lack of interaction on distance learning is a group-based activity in real life that could be held at least three times a week. the groupbased activity does not need to be focused on education. this group-based activity can be used as an “ice-breaking” in distance learning to make adolescents feel less lonely and thus improves their social skills. as for educational problem in distance learning, there should be a new system to check the works of students. this system should be able to identify plagiarism and identify the authenticity of the students’ works. that way, distance learning can be a better while not making students lazier. references [1] d. acemoglu and p. restrepo, “the race between machine and man: implications of technology for growth, factor shares and employment,” am. econ. rev., vol. 108, no. 6, pp. 1488–1542, 2018. [2] d. kem, “role of information and communication technology in open and distance learning,” res. j. soc. sci., vol. 9, no. 11, pp. 55–59, 2018. [3] v. de silva, “developing self-regulated learning skills in university students studying in the open & distance learning environment by using kwl method.” 2015. [4] j. calvert, “achieving development goals-foundations: open and distance learning, lessons, and issues.” 2006. [5] r. m. subramanian, “the role of e-learning, the advantages and disadvantages of its adoption in higher education,” tamilnadu, vol. 2, no. 12, pp. 397–410, 2016. [6] b. n. shain, “suicide and suicide attempts in adolescents,” pediatrics, vol. 120, no. 3, pp. 669–676, 2007, doi: 10.1542/peds.2016-1420. 58 bulletin of social informatics theory and application issn 2614-0047 vol. 4, no. 2, september 2020, pp. 52-58 teng et.al (how much does distance learning affect) [7] d. lessne and c. yanez, “student reports of bullying: results from the 2015 school crime supplement to the national crime victimization survey,” no. december. national center for education statistics, p. 15, 2016. [8] j. a. gray and m. diloreto, “the effects of student engagement, student satisfaction, and perceived learning in online learning environments,” int. j. educ. leadersh. prep., vol. 11, no. 1, 2016. [9] g. a. bowen, “document analysis as a qualitative research method,” qual. res. journal, vol. 9, no. 2, pp. 27–40, 2009, doi: 10.3316/qrj0902027. [10] m. aparicio, f. bacao, and t. oliveira, “an e-learning theoretical framework,” an e-learning theor. framew., vol. 19, no. 1, pp. 292–307, 2016. [11] w. a. cidral, t. oliveira, m. di felice, and m. aparicio, “e-learning success determinants: brazilian empirical study,” comput. educ., vol. 122, no. 351, pp. 273–290, 2018, doi: 10.1016/j.compedu.2017.12.001.this. [12] h. al-samarraie, b. k. teng, a. i. alzahrani, and n. alalwan, “e-learning continuance satisfaction in higher education: a unified perspective from instructors and students,” stud. high. educ., vol. 0, no. 0, pp. 1–17, 2017, doi: 10.1080/03075079.2017.1298088. [13] e. menesini and c. salmivalli, “bullying in schools : the state of knowledge and effective interventions,” psychol. health med., vol. 22, no. sup1, pp. 240–253, 2017, doi: 10.1080/13548506.2017.1279740. [14] m. sadeghi, “a shift from classroom to distance learning: advantages and limitations,” int. j. res. english educ., vol. 4, no. 1, pp. 80–88, 2019. [15] c. angelaki and i. mavroidis, “communication and social presence: the impact on adult learners ’ emotions in distance learning,” eur. j. open, distance e-learning, vol. 16, no. 1, pp. 78–93, 2013. [16] m. p. cacault, c. hildebrand, j. laurent-lucchetti, and m. pellizzari, distance learning in higher education: evidence from a randomized experiment. 2019. [17] s. protopsaltis and s. baum, “does online education live up to its promise? a look at the evidence and implications for federal policy,” no. january. 2019. [18] j. w. reyes, “lead exposure and behavior: effects on antisocial and risky behavior among children and adolescents,” econ. inq., vol. 53, no. 3, pp. 1580–1605, 2014. [19] g. r. patterson, b. d. debaryshe, and e. ramsey, “a developmental perspective on antisocial behavior,” am. psychol., vol. 44, no. 2, pp. 329–335, 1989. [20] r. mushtaq, s. shoib, t. shah, and s. mushtaq, “relationship between loneliness, psychiatric disorders and physical health ? a review on the psychological aspects of loneliness,” j. clin. diagnostic res. jcdr, vol. 8, no. 9, pp. 1–4, 2014, doi: 10.7860/jcdr/2014/10077.4828. [21] g. turecki and d. a. brent, “suicide and suicidal behaviour,” the lancest, vol. 387, no. 10024, pp. 1227– 1239, 2017, doi: 10.1016/s0140-6736(15)00234-2.suicide. bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 1, march 2022, pp. 1-6 1 https:doi.org/10.31763/businta.v6i1.415 tiktok and indonesian housewives aji p wibawa a,1,*, mokhamad iqbal a,2, oktarian karyanto a,3, prezza wiliaguna a,4, rifki fajar a,5, vishnu adisaka a,6 a universitas negeri malang, malang, indonesia 1 aji.prasetya.ft@um.ac.id ; 2 mokhamad.iqbal.1605356@students.um.ac.id; 3 oktarian.karyanto.1805356@students.um.ac.id; 4 prezza.wiliaguna.1805356@students.um.ac.id; 5 rifki.fajar.1805356@students.um.ac.id; 6 vishnu.adisaka.1805356@students.um.ac.id * corresponding author 1. introduction short video applications have become increasingly popular in the past few years. this also drives the trend of making short videos to increase in cyberspace with technology that makes it easier for people to create and edit videos. many short video platforms provide various video editing tools, features, and effects to create short videos that can grab much attention. this then triggers the audience to make their creative videos and try to become short video content creators. many content creators have succeeded with their creative ideas and attracted many followers [1]. one of the most popular short video applications is tiktok. lip-matching-up recordings have been a popular type of client-created content among adolescents since the introduction of social networking platforms [2]. tiktok is the most downloaded application. in 2020, the total download reached 850 million downloads [3]. according to statistics, among the user groups of tik tok, 68.97% are less than 24 years old, and 73.69% are less than 30 years old [4]. in other words, the application is popular among people, including homemakers. a housewife is a woman who works to run or manage her family home, is responsible for educating her children, cooking and serving food, buying items for daily family needs, cleaning and maintaining the house, preparing and sewing clothes for the family, and so on. homemakers generally do not work outside the home. a housewife is a married woman responsible for her household [5]. homemakers are sturdy and robust pillars of a family [6]. the existence of free workspace and time increasingly encourages women, especially homemakers, to work as homeworkers [7]. the increase in household activities may increase their boredom, triggering the use of tiktok as entertainment. a r t i c l e i n f o a b s t r a c t article history received december 20, 2021 revised january 17, 2022 accepted february 1, 2022 the “tiktok” app is a short music-powered social video platform, whether it is dance music, freestyle, or performance. expressive video-makers to be as creative as possible, imagine freely and express their expressions as funny as possible. since 2017, the short video industry has been on the rise. the “tik tok” application is a music creative short video social software launched in september 2016. in 2017, this application became the dark horse of many short video applications. the purpose of this study is to determine how the influence of tiktok on homemakers. every individual has a different level of need to use the media. this literature review starts with using tiktok social media to its effect on homemakers. to meet the objectives of this study, in-depth interviews were used to collect data from informants. this is an open access article under the cc–by-sa license. keywords social media tiktok snack video housewife uses and gratification deep interview mailto:aji.prasetya.ft@um.ac.id http://creativecommons.org/licenses/by-sa/4.0/ http://creativecommons.org/licenses/by-sa/4.0/ 2 bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 1, march 2022, pp. 1-6 wibawa et.al (tiktok and indonesia housewives) the goal of this study is to determine how tiktok affects homemakers. this study also reveals their behavior in using this short video application. finally, the result may suggest that homemakers are related to tiktok and its usage. 2. method this study aimed to determine the effect of short video content on tiktok for homemakers. this study uses a qualitative approach to describe the effect of short tiktok videos on homemakers. this method was chosen to determine the respondent's opinion based on the respondent's perspective in looking at a problem in detail. respondents can freely answer the questions asked without pressure from others or shame in expressing opinions. data obtained from interviews conducted with four respondents are as follows. h1. housewife (40-50 years old), has a husband who is an entrepreneur, has two adult children h2. housewife (40-50 years old) has a husband, two adult children, and one teenager h3. housewife (40-50 years old), has a businessman husband, has one adult child, one teenager, and one toddler h4. housewife (35-40 years old), has a fisherman husband, has one adult child and one toddler questions posed to respondents have three topics. the first topic is general knowledge about tiktok. researchers can determine how much respondents know about short tiktok videos on this topic. the second topic is the respondent's habit of watching tiktok. the third topic of the researcher is a tiktok video show. respondents were asked to express their opinion about the video that was shown. the interview topic delivered to the respondent will be compared with previous research to determine the effects of tiktok videos on homemakers. 2.1. knowledge of tiktok of the four respondents, all knew tiktok. h1, h2, and h4 learn from their children. meanwhile, h2 prefers to explore tiktok itself. this suggests that there is a closeness between the housewife and her children. according to the research, mothers, and children negotiated interdependence as they moved functionally between vertical and horizontal interactions in their relationship [8]. so it can be concluded that children usually teach their parents social media. h2 and h3 use tiktok as spectators. h4 uses tiktok as a viewer and creator. while h1 does not use the tiktok app, it only watches tiktok via facebook. this shows that more people use tiktok as a viewer than as creators. h3 and h4 are interested in recommending tiktok to others. h1 will not recommend tiktok because h1 does not install tiktok on its phone and is not very interested in tiktok. h2 does not want to make tiktok more attractive and will only show some exciting videos to others. h2, h3, and h4 like to show interesting videos to their friends. it can be concluded that one likes to show interesting things to others. table 1 shows that h2, h3, and h4 often show the videos they find to others. this shows that mothers influence each other's tiktok spectacles. table.1 general knowledge of tiktok question object answer do you know tiktok? h1 yes, my friends and my sons have told me about tiktok h2 yes, i know titkok because sometimes my daughter makes a dancing video h3 yes, i usually look for cooking and news videos on tiktok h4 yes, i usually watch tiktok videos with my daughter do you have tiktok? h1 no, i do not have tiktok. i am not interested in installing tiktok on my device h2 yes, my daughter installed tiktok on my device issn 2614-0047 bulletin of social informatics theory and application 3 vol. 6, no. 1, march 2022, pp. 1-6 wibawa et.al (tiktok and indonesia housewives) question object answer h3 yes, i have tiktok on my device to watch cooking videos h4 yes, i have tiktok on my device how do you know tiktok? h1 i know tiktok from friends. they usually talk about tiktok videos. and my sons have shown me a tiktok video h2 my friend told me about tiktok, and my children sometimes show me some tiktok videos h3 my friend usually sends me tiktok videos on whatsapp group, and sometimes i watch tiktok videos on my facebook and my instagram h4 i know tiktok from online advertising on facebook do you use tiktok as a content creator or viewer? h1 i do not use tiktok, and i watch tiktok videos on my facebook h2 just as a viewer, i do not think i will create a content h3 just enjoy tiktok as a viewer h4 i use tiktok as a viewer, but sometimes i create a video by recording my daughter will you recommend tiktok to others? h1 no, because i do not use tiktok, and i do not really like tiktok h2 no, i am not interested in recommending tiktok. sometimes i only show some interesting tiktok videos to my friends h3 yes, i often ask my friends to install tiktok on their devices h4 yes, i will recommend tiktok to others to keep them entertained 2.2. habits of watching tiktok the average housewife spends time watching tiktok of the four respondents, all watched cooking videos. h1 and h3 watch news videos. only h4 often watches videos of dancing and singing. only h3 watches gossip and parenting. cooking videos are often a topic of conversation when mothers are getting together. cooking videos proved more popular among homemakers than in other categories. so it can be concluded that mothers love to learn new things from social media. h4 sometimes records his son dancing on tiktok and is shown to his friend, h4's friends love the video. this is research that mentions that baby-related videos, which were about showing off how talented the babies were or what fun it was to have a baby do creative things, were attractive to most people [9]. this shows mothers are also very interested in videos about infants and toddlers. all respondents said that tiktok affects their families. h1 is often shown cooking videos and asked to make the dish by his son. h2 sometimes sees his daughter making dance videos on tiktok. h3 often sends tiktok videos and discusses tiktok in his family's whatsapp group. h4 has a daughter who often imitates the movements of a tiktok video show and shows the movement to others. this suggests that tiktok influences all families with different effects. table 2, only h1 uses tiktok for less than 1 hour. all respondents opened the video using tiktok and facebook, except h3, which uses instagram. facebook is proving popular among mothers compared to instagram. this corresponds to the survey results (diah, 2020) of 30 homemakers. they use social media for marketing as follows whatsapp (96.7%), facebook (73.3%), instagram (70%), youtube (36.7%), tiktok ( 30%), twitter (16, 7%), line (13.3%) and telegram (3.3%) [10]. the findings show that the average access to tiktok is 1-2 hours/day, which can be directly or through other social media table.2 tiktok viewing habits question object quantity how long do you watch tiktok in a day? (hour) h1 0 1 hour h2 1 2 hour h3 1 – 2 hour 4 bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 1, march 2022, pp. 1-6 wibawa et.al (tiktok and indonesia housewives) question object quantity h4 more than 2 hour what kind of videos do you watch? h1 i do not watch tiktok videos daily, but sometimes my friends show me cooking and news. i also usually watch cooking and news videos that appear on my facebook h2 my friends usually show me videos about cooking. so i watch cooking videos h3 i usually watch cooking, news, and gossip. sometimes i watch parenting videos h4 i usually watch dancing and singing videos because my child loves that kind of video, and sometimes i watch the cooking video does tiktok affect your family? h1 anak saya terkadang menunjukkan video memasak dan meminta saya untuk membuat masakan yang ada di video tersebut h2 ya, terkadang saya melihat anak perempuan saya membuat video menari di tiktok nya h3 saya biasanya mengirim video tiktok di grup whatsapp keluarga saya. anak laki-laki saya juga suka melihat video tentang sepeda motor di tiktok h4 ya, putri saya biasanya meniru gestur yang ia lihat disebuah video tiktok. bahkan ia sering menunjukkan gestur tersebut kepada orang lain do you often talk about tiktok with your friends? h1 just sometimes, when i join the gathering h2 yes, but not often, sometimes i ask my friend about cooking videos h3 yes, we usually talk about cooking, news, and gossip h4 yes, i often talk about tiktok with my friends when we meet and talk about it on facebook where do you usually watch tiktok videos? h1 sometimes some tiktok videos appear on my facebook homepage. i do not use any other app to watch tiktok videos h2 sometimes from tiktok, but more often on facebook h3 tiktok, facebook and instagram h4 i usually watch on tiktok and facebook 2.3. response after seeing the tiktok video show all respondents were asked to view a video view to answer the interview. the video shows indonesian women aged 20-30 with thousands of spectators dancing for 30 seconds. the accompaniment of the music is the dangdut genre. in the video, the woman dances in skimpy clothes (short pants and short clothes). the movements performed by dancers are exotic. table 3 shows respondents' responses to the video. h1, h2, and h3 do not like such videos. only h4 likes them. h1, h2, and h3 are worried that such videos are imitated by their children. it can be concluded that most mothers are worried if their children are negatively affected by erotic dancing videos on tiktok. however, according to h2, such a video may entertain some people. h4 likes such videos because he and his daughter often watch such videos. her daughter h4 sometimes imitates some moves and sings like the woman in the video. h4 does not feel worried if her daughter imitates the video while under h4's supervision. h4 considers her daughter cute when imitating some of the gestures in the tiktok video. of the four respondents, all had watched such dancing videos. h1, h2, and h3 said their friends had shown them videos. h3 sometimes talks about such videos with his friends in whatsapp groups. his daughter once showed h2 such a video. meanwhile, h4 daily explores such singing and dancing videos with her daughter. h1, h2, and h3 have similarities in where respondents know tiktok videos from their environment. h4 knows tiktok videos because respondents have an interest in tiktok content. h1 does not like videos like that. however, h1 said his two children are adults and can distinguish good and evil. if that is his son, he advises him to use social media wisely. h2 does not like it if the video is about his family. h2 will reprimand his family because, according to h2, such a issn 2614-0047 bulletin of social informatics theory and application 5 vol. 6, no. 1, march 2022, pp. 1-6 wibawa et.al (tiktok and indonesia housewives) video is embarrassing. h3 will confiscate his son's gadget for a few days if his son makes erotic dancing videos. according to h3, children need to be supervised and warned not to get badly affected by tiktok videos. h4 does not know if the video is his daughter. h4 said that he always watched his daughter. according to h4, her daughter will not be affected by harmful effects because h4 controls her daughter's spectacle. h1, h2, and h3 have similar concerns about the video shown. respondents showed a preventive attitude in dealing with the effects of the video shown. this is in line with research that mentions the increasing complexity of the media landscape, and the increasingly younger age at which children start using new digital technologies potentially gives rise to a new set of educational problems for parents [11]. at the same time, h4 is not worried about the negative effect of the video because, according to h4, h4 has been monitoring his son's use of the tiktok application. table.3 response after seeing a tiktok video view question object answer what do you think about the showed video? h1 i would not say i like that kind of video. i am afraid it will be followed by children and have a negative influence h2 i think the video is quite entertaining for some people h3 i am worried that if my children watch that kind of video, it will hurt them. h4 the video is enjoyable to watch. i usually watch that kind of video with my daughter. sometimes my daughter impersonates them have you ever seen a video like this before? h1 yes, i have watched this kind of video, my friends usually show me, and sometimes i watch it on facebook. h2 yes, i have watched that kind of video. sometimes the video is shown to me by my friends or my children h3 yes, i have. my friends usually send it on whatsapp group chat, and sometimes my friends talk about it h4 yes, i have. i often watch those kinds of videos with my daughter if it was your family, what do you think? h1 my sons are adults, so i will advise them to make videos wisely. h2 i would be embarrassed and rebuke my family. i don't like it when my family makes videos like that. h3 i would have taken the device for a few days if it were my kids. as a form of warning to prevent harmful effects. h4 if it is my child, i do not mind as long as it is not harmful content. after all, i watched videos like that with my child, and sometimes my child imitated what she saw. i think it is entertainment for my daughter and me. how do you anticipate those kinds of videos not negatively impacting your family? h1 i do not have a specific way to anticipate it. my sons are all adults. i think they can wisely respond to those kinds of videos. h2 sometimes i advise and remind my children to be careful and wise in using social media. h3 i permanently delete the videos sent by my friends after i watch them. i also sometimes control my child's gadgets. if i encounter a negative video on my child's gadget, i usually discuss it with them and advise them. h4 although my daughter and i often watch such videos, i always keep an eye on my daughter. i do not let my daughter use tiktok alone, so i can still control it. tiktok social media can be an entertaining app providing many benefits for homemakers. however, it still takes a wise attitude from users in choosing content and information. people also use tiktok as a means to spread bad examples. if a child or teenager watches lousy content, they will model it to create similar content. parents must supervise the use of tiktok in their children. although tiktok contains negative things, we will have a positive impact if we use them well. tiktok application is helpful for various education because it is more attractive and music, so it can be more effective in delivering messages like housewives who love content about cooking, news, and parenting. tiktok has much educational content; everyone can learn new things from tiktok videos. 6 bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 1, march 2022, pp. 1-6 wibawa et.al (tiktok and indonesia housewives) 3. conclusion with the rapid development of mobile communication technology, short video applications, which combine the features of both social and multimedia applications, have become popular [12]. tiktok has gained popularity as a result of user sharing. some tiktok users became famous for their short videos. in this modern era, technological advances are proliferating. in this modern era, technological advances are proliferating. tiktok is a social media currently used by all circles, both children and adults. tiktok can have an impact on homemakers. tiktok can entertain and provide benefits for homemakers. however, tiktok can spread bad examples that harm its users. users must be intelligent and wise in choosing videos when using tiktok to avoid harmful content and bad influences in the tiktok app. references [1] x. cheng, j. liu, and c. dale, “understanding the characteristics of internet short video sharing: a youtube-based measurement study,” ieee trans. multimed., vol. 15, no. 5, pp. 1184–1194, aug. 2013, doi: 10.1109/tmm.2013.2265531. [2] j. herrman, “how tiktok is rewriting the world,” the new york times, 2019. [online]. available: http://res.tigerge.cn/20200713/补充1 how tiktok is rewriting the world.pdf. [3] “app insights: tiktok | apptopia,” accessed may 27, 2021. [online]. available: apptopia. https://apptopia.com/ios/app/835599320/intelligence. [4] s. yang, y. zhao, and y. ma, “analysis of the reasons and development of short video application —— taking tik tok as an example,” in international conference on information and social science (iciss), 2019, vol. 9, no. 62, pp. 340–343. [online]. available: https://webofproceedings.org/proceedings_series/article/artid/10287.html. [5] “housewife (noun) american english definition and synonyms,” macmillan dictionary. [online]. available: https://www.macmillandictionary.com/dictionary/american/housewife . [6] d. novianti and s. fatonah, “social media literacy for housewives in kanoman maguwoharjo village, sleman, yogyakarta,” in proceeding of lppm upn “veteran” yogyakarta conference series 2020political and social science series, oct. 2020, vol. 1, no. 1, pp. 83–92, doi: 10.31098/pss.v1i1.183. [7] m. uddin, “addressing work-life balance challenges of working women during covid-19 in bangladesh,” int. soc. sci. j., vol. 71, no. 239–240, pp. 7–20, mar. 2021, doi: 10.1111/issj.12267. [8] e. nixon, s. greene, and d. m. hogan, “negotiating relationships in single-mother households: perspectives of children and mothers,” fam. relat., vol. 61, no. 1, pp. 142–156, 2012, doi: 10.1111/j.1741-3729.2011.00678.x. [9] x. lu and z. lu, “fifteen seconds of fame: a qualitative study of douyin, a short video sharing mobile application in china,” in social computing and social media. design, human behavior and analytics, 2019, pp. 233–244, doi: 10.1007/978-3-030-21902-4_17. [10] d. sri rejeki, “digital literacy mapping for housewife in entrepreneurship,” palarch’s j. archaeol. egypt / egyptol., vol. 17, no. 10, pp. 1541–1550, 2020, [online]. available: https://archives.palarch.nl/index.php/jae/article/view/4867. [11] p. nikken and j. de haan, “guiding young children’s internet use at home: problems that parents experience in their parental mediation and the need for parenting support,” cyberpsychology, vol. 9, no. 1, 2015, doi: 10.5817/cp2015-1-3. [12] w. wu et al., “deep reinforcement learning-based video quality selection and radio bearer control for mobile edge computing supported short video applications,” ieee access, vol. 7, pp. 181740–181749, 2019, doi: 10.1109/access.2019.2960191. https://doi.org/10.1109/tmm.2013.2265531 http://res.tigerge.cn/20200713/补充1%20how%20tiktok%20is%20rewriting%20the%20world.pdf https://apptopia.com/ios/app/835599320/intelligence https://webofproceedings.org/proceedings_series/article/artid/10287.html https://www.macmillandictionary.com/dictionary/american/housewife https://doi.org/10.31098/pss.v1i1.183 https://doi.org/10.1111/issj.12267 https://doi.org/10.1111/j.1741-3729.2011.00678.x https://doi.org/10.1007/978-3-030-21902-4_17 https://archives.palarch.nl/index.php/jae/article/view/4867 https://doi.org/10.5817/cp2015-1-3 https://doi.org/10.1109/access.2019.2960191 bulletin of social informatics theory and application issn 2614-0047 vol. 5, no. 1, march 2021, pp. 7-13 7 https:doi.org/10.31763/businta.v5i1.398 the impact of social media use on suicide-related behavior muhammad afdhal arrazy a,1, muhammad tatag adi ndaru a,2, nandha mustika sari a,3, mei dwi ariyanti a,4, anusua ghosh b,5,* a department of electrical engineering, universitas negeri malang, malang, indonesia b university of south australia, adelaide, australia 1 afdhalarrazy.1805356@students.um.ac.id; 2 muhammad.adi.1805356@students.um.ac.id; 3 nandhamustikasari.1805356@students.um.ac.id; 4 dwimey.1805356@students.um.ac.id; 5 anusua.ghosh@mymail.unisa.edu.au* * corresponding author 1. introduction covid-19 pandemic exploded in china at the end of 2019 and soon spread worldwide, infecting and killing millions of people [1]. fake news rumors and conspiracy theories over the virus's sources circulated across the globe, followed by misinformation, bigotry, and widespread sales of face masks [2]. in january 2020, there were 3.80 billion social media users, and internet users spent an average of 6 hours and 43 minutes a day online [3]. that's unsurprising that the enormous volume of information obtained across these sources has an impact on how we view and respond to the present covid-19 outbreak. the covid-19 outbreak is causing an increase in social media users in the world. the lockdown system implemented in many countries can trigger feelings of loneliness in a person so, in order to get attention and not feel lonely, many of them began to use social media to communicate with other people frequently. it is feared that the use of social media, which was initially only used to reduce loneliness, could lead to negative impacts such as addictive behavior and cyberbullying, which could affect users' mental health. in our daily lives, social media plays a significant part. governments, individuals, state bodies, and corporations increasingly use social media to communicate [4]. in education, students can use social media to discuss through various platforms [5]. social media changes marketing methods to reach customers who are far away [6]. social media makes getting information very fast and easy. however, if not utilized properly, social media can interfere with a person's life, such as the emergence of addictive behavior, cyberbullying, and social comparisons. so that this behavior can trigger a person to experience depression and mental health problems, and even the risk of suicide. a r t i c l e i n f o a b s t r a c t article history received december 14, 2020 revised january 3, 2020 accepted january 17, 2021 cyberbullying and addictive behavior are examples of the negative impacts that social media use that lead to suicidal thoughts. this study uses a systematic literature review to show the consequences of using social media that lead to suicidal behavior in various parts of the world. 37 articles were used to support this study that consists of 19 articles about cyberbullying and 18 articles about social media addiction. according to the findings of this report, there is a connection between cyberbullying and internet addiction and an increased risk of suicide or suicidal behavior among teenagers due to social media access. addictive behavior of social media use has a direct effect on mental health and causes depression. meanwhile, cyberbullying causes a lack of self-confidence, depression, frustration, self-awareness, and suicidal thoughts. suicide is a way out for teenagers who experience various problems. suicide prevention is also discussed. this is an open access article under the cc–by-sa license. keywords social media cyberbullying addictive behavior mental health suicide behavior http://creativecommons.org/licenses/by-sa/4.0/ http://creativecommons.org/licenses/by-sa/4.0/ 8 bulletin of social informatics theory and application issn 2614-0047 vol. 5, no. 1, march 2021, pp. 7-13 arrazy et.al (the impact of social media use on suicide-related behavior) social media are internet-based platforms that enable users to introduce themselves to both wide and narrow audiences that value user-generated content and the pleasure of engaging with others in real-time or asynchronously [7]. social media addiction has a major negative impact on mental health and leads to depression. a study of 631 adolescents aged 12 to 18 was conducted in israel to determine a link between social media addiction and suicidal ideation [8]. the results found that 22.9 percent of the participants had suicidal ideation in the month before the survey, 42 percent had sleep problems, 30.2 percent used the internet addictively, and 26.5 percent had extreme depressive symptoms. addiction will cause a lack of effective use of social media, resulting in feelings of loneliness and psychological pressure for the person and ultimately disrupting a person's life with bullying. fig. 1. the effects of school bullying victims and cyberbullying victimization on suicide ideas: a theoretical model fig.1 presents the theoretical model of this study. based on this theoretical model, it can be seen that indirectly, victims of cyberbullying will have suicidal ideas, which are the effects of perceived stress, loneliness, depression, and psychological pressure [9]. cyberbullying causes low self-esteem, depression, frustration, self-consciousness, and suicidal ideation. more than half of the victims started skipping school and completely changed their attitudes, meaning they stopped paying attention in class and formed gangs to avoid being bullied. because of the victimization, cyberbullying victims disliked going to school and considered dropping out [10]. those who had been targeted to either school bullying or cyberbullying had no increased risk of suicidal ideation, but those who had been subjected to all kinds of bullying were more than 11 times more likely to contemplate suicide than those who had not been bullied [11]. this study uses a systematic literature review to determine the relationship between social media with cyberbullying, unfavorable social comparisons, and addictive behaviors that lead to suicide attempts. a review of research articles and journals was carried out on the specified subjects to find this relationship. the literature and journals reviewed are between 2012 and 2021. 2. method in order to analyze this report, the researchers used a systematic literature review. this literature study is an activity that involves summarizing the research findings from numerous scholarly articles of interest in order to create a new report. data collection for this study were from journals in the google scholar database according to the research theme. the following are keyword terms used for literature: "cyberbullying", "cyberbullying and suicide rate", "addiction to social media and suicide rates", and “social comparisons in social media”. a literature search was performed for all publications written in the previous ten years between 2012 and 2021. many factors contribute to varying prevalence rates of suicidal behavior around the world [12]. in this review, we will discuss the negative impact of social media use, which results in the emergence of ideas, attempts, and suicides in adolescents in various countries within america, europe, africa, and asia. issn 2614-0047 bulletin of social informatics theory and application 9 vol. 5, no. 1, march 2021, pp. 7-13 arrazy et.al (the impact of social media use on suicide-related behavior) the topics included in this study have a relationship between the impact of social media use and suicidal behavior. this behavior can be in the form of suicidal ideation, suicide attempts, or suicide, especially among adolescents around the world. this analysis has many facets of data collection by reviewing the title and summary, looking at the number of populations and samples, analyzing the test findings collected, and the research conclusions. the research data were then classified based on the factors contributing to the risk of suicidal behavior due to social media use, such as cyberbullying and social media addiction. 3. results a total of 37 articles qualified for inclusion in the study, including 19 articles on cyberbullying presents on table 1 and 18 articles on addiction presents on table2. a total of 5 articles from africa (4 articles from south africa and 1 article from kenya), 11 articles from europe (4 articles from spain, 3 articles from turkey, 1 article from england, 1 article from the united kingdom, 1 article from portugal, and 1 article from italy), 8 articles from america (6 articles from the usa, 1 article from mexico and 1 article from canada), and 13 articles from asia (3 articles from indonesia, 2 articles from singapore, 2 articles from china, 2 articles from korea, 1 article from thailand, 1 article from israel, 1 article from taiwan, 1 article from kuwait) table.1 suicide behavior as a result of cyberbullying study year continent country population sample result j.r.a ndiege et al., 2020 africa kenya 6500 students of the private universities in kenya 395 students university students who spent 3-4 hours and more than 5 hours a day online were more likely to partake in deceptive online bullying than those who spent 1-2 hours online. p. farhangpour et al., 2019 africa south africa a rural high school for students in grades 8 through 10. 80 students from grades 8 to 10 (50 females and 30 males) cyberbullying causes low self-esteem, depression, frustration, selfconsciousness, and suicidal ideation. more than half of the respondents started skipping school and totally changed their attitudes, meaning they stopped paying attention in class and formed gangs to avoid being bullied. because of the victimization, cyberbullying victims disliked going to school and considered dropping out. b. iranzo et al., 2019 europe spain adolescents in the valencia region pursuing secondary education there were 1,062 teenagers between 12 and 18, including 547 boys (51.5%) and 515 females (48.5 percent). suicidal ideation is directly influenced by cyberbullying. according to the research, cyberbullying appears to indirectly affect suicidal ideation through perceived stress, isolation, depressive symptoms, and psychological problems. hinduja s. & patchin j.w. 2018 america usa englishspeaking middle and students in primary schoolaged 12 to 17 who live in the united states there were a total of 2,670 students, with a gender split of 49.9% female and 49.6% male.) according to the findings, cyberbullying appears to have an indirect impact on suicidal ideation through perceived stress, loneliness, depression symptoms, and psychological distress. 10 bulletin of social informatics theory and application issn 2614-0047 vol. 5, no. 1, march 2021, pp. 7-13 arrazy et.al (the impact of social media use on suicide-related behavior) study year continent country population sample result m.c.m. monteagudo et al., 2019 europe spain 1102 spanish high school and the study included baccalaureate students. 499 boys and 603 girls between the ages of 12 and 18 additionally, possessing a higher level of empathy and cognitive control lowers the likelihood of intervening in any of the cyberbullying roles. anke görzig 2016 europe england 25,000 european children aged 9 to 16 who use the internet a total of 19,406 11-16year-olds were included in the study (50 percent girls) cyberbully victims tend to be the most helpless and most need assistance with several psychological problems. meanwhile, more focused approaches could concentrate on solving cyberbullies' emotional and peer problems and helping cyber victims' emotional and peer problems. e. whittaker et al. 2015 america usa 25,000 european children aged 9 to 16 who use the internet 84% of the sample was white, with another 8.6% being african american. in the previous year, 18.2 percent of those interviewed said they had been the victim of cyberbullying at least once. nearly 12% of respondents said they had been the target of cyberbullying at least once in the previous year. m. rachoene & t. oyedemi 2015 africa south africa south african youth 30 pages of subscribers' postings and comments on six different facebook pages attacks on intellect, attacks on body shape, sexting and outing, slurs, and intimidation are the five most popular forms of cyberbullying among south african youth on these facebook accounts. s. buelga, et al., 2015 europe spain adolescents in spain aged 12 to 17 years old 1,415 spanish adolescent boys and girls (760 boys and 655 girls) boys and adolescents in their fourth year of high school (15-17 years old) were more likely than females and students with lower grades to engage in violence against their classmates. c. abidin 2019 asia singapore influencers in singapore young influencer in singapore hate comments make influencers angry and frustrated. z. zhou et al., 2013 asia china high school students in china 1,438 central chinese high school students males are more likely than females to be the perpetrators and victims of online bullying. students with lower academic achievement were more likely to be online perpetrators than students with higher academic achievement. students who spend more time online are more likely to be attacked by online bullies. r. sittichai, & p.k. smith 2018 asia thailand students in thailand, 12 schools from three southern thai provinces 1,049 students aged 12 to 18 (42 percent boys, 58 percent girls) according to the girls, cyberbullying should be recorded. the girls even suggested that you dismiss him further or block his messages. boys, on the other hand, support revenge. issn 2614-0047 bulletin of social informatics theory and application 11 vol. 5, no. 1, march 2021, pp. 7-13 arrazy et.al (the impact of social media use on suicide-related behavior) study year continent country population sample result j.h. kim et al., 2020 amerika usa 10th graders students with a mean age of around 15 years, there were 61 males and 32 females. school connectedness serves as a significant barrier, reducing the effect of cyber victimization on suicidal behavior. r.a. bonanno, & s. hymel 2013 america usa 8th to 10th grades students at a single urban high school in southern british columbia 171 males and 228 females both forms of victimization and abuse were positively linked to both depressive symptomatology and suicidal ideation, despite the small extent of these associations. d.h. tustin et al., 2014 africa south africa 14 schools in south africa 3353 learners from gauteng and 892 learners from western cape bullying suspects and participants are also at a greater risk of depression, suicidal thoughts, and suicide attempts than teenagers who are not bullied. h. sampasakanyinga et al., 2014 america canada eastern ontario youth 2,999 participants (1658 females and 1341 males) victims of cyberbullying and school bullying are most likely to have suicidal thoughts. one of the most common triggers of thoughts, plans, and suicide attempts in cyberbullying victims in distress. m.c. martínezmonteagudo et al., 2020 europe spain students at spanish universities aged 18 to 46 1282 students enrolled in college (46.33 percent men and 53.67 percent women) cyberbullying victims are more likely to experience social anxiety as well as the likelihood of suicidal ideation. e.l. mirsky & h.a. omar 2015 america usa adolescents adolescent raging 12-18 years old cyberbullying has very adverse psychological effects, often leading to suicidal thoughts and behavior. 4. discussion based on studies that have been conducted, 19 journals were found that showed a relationship between cyberbullying and suicide behavior, and 18 journals showed a relationship between social media addiction and suicide behavior. according to a meta-analysis, the correlation between suicide attempts and online bullying is more potent than the relationship between conventional bullying and suicidal ideation. according to related research, 20% of adolescents victims of cyberbullying on social media commit suicide to alleviate their problems and suffering [9]. aside from cyberbullying, social media addiction has been linked to depression and suicidal ideation [13]. according to research conducted, the activities that are often done on the internet are 69,61% playing online games, 66,21% accessing email, 49.47% using the internet to access information, 35.95% watching movies online, 32,22% for chatting, and 23.30% for learning online [14]. using the internet for these activities is positive, but if done excessively, it can contribute to increased stress and depression, leading to suicidal thoughts [8]. internet addiction can also lead to unhealthy eating habits, anxiety, depression [15], and more likely to experience cyberbullying [16]. according to the report, 72,2 percent of cyberbullying victims had high levels of distress, 68,1 percent had high levels of depression, and 75,2 percent had elevated levels of anxiety [17]. cyberbullying is more common among boys than girls, who are more likely to partake in and perpetuate it; the target of cyberbullying tends to be someone with poor academic performance [18]. 12 bulletin of social informatics theory and application issn 2614-0047 vol. 5, no. 1, march 2021, pp. 7-13 arrazy et.al (the impact of social media use on suicide-related behavior) cyberbullying and social media addiction are related because they cause depression, which has been identified as the leading cause of suicidal thoughts, intentions, and attempts in research [19]. the following is a case study of the effects of social media on suicide behavior in various nations, based on the 37 journals are organized by country presents on fig.2. fig. 2. the impact of social media use on suicide-related behaviour in countries prevention is needed to overcome suicidal thoughts. assistance for victims is significant. communicating with people at high risk of committing suicide can reduce suicide attempts by up to 30% [20]. therefore, communication is also an important thing, which makes the technology very important for the mental recovery of victims. social media can also be used to overcome this. online mental health services and counseling psychologist services in china were carried out during the covid-19 pandemic [21]. the service is quite effective as a means of communication for victims to get assistance. 5. conclusion according to the findings of this report, there is a connection between cyberbullying and internet addiction and an increased risk of suicide or suicidal behavior among teenagers due to social media access. most of the social media users in the world are teenagers or adolescents, so they are more likely to suffer the adverse effects of social media use. teenagers who are victims of cyberbullying on social media will commit suicide to alleviate their hardships and misery. additionally, addictive social media behavior has been linked to depression and suicidal thoughts. the impact felt by victims of cyberbullying and victims of internet addiction in using social media is the emergence of jealousy, psychological pressure, depression, stress, and feelings of deep loneliness, so they finally choose to commit suicide to get out of various problems. references [1] m. cascella, m. rajnik, a. aleem, s. dulebohn, and r. di napoli, “features, evaluation, and treatment of coronavirus (covid-19),” statpearls, 2021. [2] a. depoux, s. martin, e. karafillakis, r. preet, a. wilder-smith, and h. larson, “the pandemic of social media panic travels faster than the covid-19 outbreak,” j. travel med., vol. 27, no. 3, may 2020. [3] s. kemp, “digital 2020: october global statshor,” datareportal, 2020. [online]. available: https://datareportal.com/reports/digital-2020-october-global-statshot. [accessed: 22-dec-2020]. [4] r. sandoval-almazan and j. r. gil-garcia, “are government internet portals evolving towards more interaction, participation, and collaboration? revisiting the rhetoric of e-government among municipalities,” gov. inf. q., vol. 29, pp. s72–s81, jan. 2012. issn 2614-0047 bulletin of social informatics theory and application 13 vol. 5, no. 1, march 2021, pp. 7-13 arrazy et.al (the impact of social media use on suicide-related behavior) [5] w. akram and r. kumar, “a study on positive and negative effects of social media on society,” int. j. comput. sci. eng., vol. 5, no. 10, pp. 351–354, oct. 2017. [6] d. a. al-sabti, a. v. singh, and s. k. jha, “impact of social media on society in a large and specific to teenagers,” in 2017 6th international conference on reliability, infocom technologies and optimization (trends and future directions) (icrito), 2017, pp. 663–667. [7] c. t. carr and r. a. hayes, “social media: defining, developing, and divining,” atl. j. commun., vol. 23, no. 1, pp. 46–65, jan. 2015. [8] h. sami, l. danielle, d. lihi, and s. elena, “the effect of sleep disturbances and internet addiction on suicidal ideation among adolescents in the presence of depressive symptoms,” psychiatry res., vol. 267, pp. 327–332, sep. 2018. [9] b. iranzo, s. buelga, m. j. cava, and j. ortega-barón, “cyberbullying, psychosocial adjustment, and suicidal ideation in adolescence,” psychosoc. interv., vol. 28, no. 2, pp. 75–81, 2019. [10] p. farhangpour, c. maluleke, and h. n. mutshaeni, “emotional and academic effects of cyberbullying on students in a rural high school in the limpopo province, south africa,” sa j. inf. manag., vol. 21, no. 1, mar. 2019. [11] s. hinduja and j. w. patchin, “connecting adolescent suicide to the severity of bullying and cyberbullying,” j. sch. violence, vol. 18, no. 3, pp. 333–346, jul. 2019. [12] e. m. selkie, j. l. fales, and m. a. moreno, “cyberbullying prevalence among us middle and high school–aged adolescents: a systematic review and quality assessment,” j. adolesc. heal., vol. 58, no. 2, pp. 125–133, feb. 2016. [13] j. l. j. medrano, f. lopez rosales, and m. gámez-guadix, “assessing the links of sexting, cybervictimization, depression, and suicidal ideation among university students,” arch. suicide res., vol. 22, no. 1, pp. 153–164, jan. 2018. [14] i.-h. lin et al., “the association between suicidality and internet addiction and activities in taiwanese adolescents,” compr. psychiatry, vol. 55, no. 3, pp. 504–510, apr. 2014. [15] c. s. tang and y. y. w. koh, “online social networking addiction among college students in singapore: comorbidity with behavioral addiction and affective disorder,” asian j. psychiatr., vol. 25, pp. 175–178, feb. 2017. [16] m. f. a. qudah et al., “smartphone addiction and its relationship with cyberbullying among university students,” int. j. ment. health addict., vol. 17, no. 3, pp. 628–643, jun. 2019. [17] m. c. martínez-monteagudo, b. delgado, á. díaz-herrero, and j. m. garcía-fernández, “relationship between suicidal thinking, anxiety, depression and stress in university students who are victims of cyberbullying,” psychiatry res., vol. 286, p. 112856, apr. 2020. [18] z. zhou, h. tang, y. tian, h. wei, f. zhang, and c. m. morrison, “cyberbullying and its risk factors among chinese high school students,” sch. psychol. int., vol. 34, no. 6, pp. 630–647, dec. 2013. [19] h. sampasa-kanyinga, p. roumeliotis, and h. xu, “associations between cyberbullying and school bullying victimization and suicidal ideation, plans and attempts among canadian schoolchildren,” plos one, vol. 9, no. 7, p. e102145, jul. 2014. [20] i. w. miller et al., “suicide prevention in an emergency department population,” jama psychiatry, vol. 74, no. 6, p. 563, jun. 2017. [21] s. liu et al., “online mental health services in china during the covid-19 outbreak,” the lancet psychiatry, vol. 7, no. 4, pp. e17–e18, apr. 2020. bulletin of social informatics theory and application issn 2614-0047 vol.4, no.1, july 2020, pp. 12-20 12 https:doi.org/10.31763/businta.v4i1.258 e-government learning media through augmented reality technology muhammad yusuf a,1,*, mochammad kautsar sophan a,2, arif muntasa a,3, nurwahyu alamsyah b,4, haythem nakkas c,5 , putri pradnyawidya sari d,6 a faculty of engineering, universitas trunojoyo madura, indonesia b department of information management, national taiwan university of science and technology, taiwan c faculty of technology, university of portsmouth, uk, university house, uk d bpsdmp of communication anf informatics department, ,indonesia 1muhammadyusuf@trunojoyo.ac.id*; 2 kautsar@trunojoyo.ac.id; 3arifmuntasa@trunojoyo.ac.id, 4d10709802@ntust.edu.tw; 5haythem.nakkas@port.ac.uk, 6putripradnya@gmail.com * corresponding author 1. introduction learning media technologies are always improved every time. augmented reality is one of the emerging technologies which can be used for educational purposes. there are some newest learning technologies, such as artificial intelligent, augment reality, virtual reality, virtual world, alternates reality games, and wearable computing. in other hand, e-government field keep evolving as many government utilize electronic technology to keep up to date with the advancing in technology and improve the services they provide. issues in e-government are also growing, such as e-governance, e-participation, e-service, e-democracy, e-voting and others.some universities provide e-government as part of their courses. e-government courses uses some traditional learning medias and methods. however, using emerging technologies such as augmented reality would potentially supporte-government learning. therefore, augmented reality could help the users or learners to easily understand about the materials of e-government course. a r t i c l e i n f o a b s t r a c t article history received january 2, 2020 revised january 16, 2020 accepted february 1, 2020 augmented reality (ar) is one of the newest learning technologies besides artificial intelligent, virtual reality, virtual world, alternates reality games, and wearable computing. e-government is becoming an evolving academic field and transforming to be e-governance, e-participation, e-service, e-democracy, e-voting issues. therefore, some universities have e-government course in their curriculum. ar can be one of the learning media to learn and teach egovernment effectively and interestingly. this research aims and contributes to develop a novel model of e-government learning media using ar. furthermore, this work has three novelties as follows:first, a method to develop e-government learning media using ar. second, a novel model of e-government learning media based on augmented reality technology. third, the material courses are command centre and public service mall materials based in surabaya, indonesia. the new model of learning media using ar consists of main components, i.e., user, devices, ar, and course materials. additionally, this novel model has some sub-components, such as ar object, marker, text, image, audio, video, and 3d animation. the proposed model has some practical and theoretical implications. for the theoretical implication , it adds a model of learning media for egovernment course and extends the body of knowledge for e-government and augmented reality fields. for practice, e-government courses can uilize the augmented reality application. this is an open access article under the cc–by-sa license. keywords e-government learning media augmented reality technology mailto:muhammadyusuf@trunojoyo.ac.id mailto:kautsar@trunojoyo.ac.id mailto:3arifmuntasa@trunojoyo.ac.id mailto:d10709802@ntust.edu.tw mailto:5haythem.nakkas@port.ac.uk http://creativecommons.org/licenses/by-sa/4.0/ http://creativecommons.org/licenses/by-sa/4.0/ issn2614-0047 bulletin of social informatics theory and application 13 vol. 4, no. 1, july 2020, pp. 12-20 yusuf et.al (e-government learning media through augmented reality technology) however, there is a limited research about use of augmented reality technology in the egovernment field. therefore, this research aims to develop a novel model for e-government learning media through augmented reality technology. in this case, we selected two materials of egovernment course, i.e. introduction of command centre and public service mall. the case study is e-government course in department of information system at universitas trunojoyo madura, indonesia. this paper contributes a new model for e-government learning media using augmented reality. this work has three novelties as follows: first, a method to develop e-government learning media using ar. second, a novel model of e-government learning media based on augmented reality technology. third, the material courses are command centre and public service mall materials based in surabaya, indonesia. moreover, this paper consists of introduction, material and methods, theory, results, discussion, and conclusion sections. introduction section captures background, gap, aim, contribution, and novelties of the research. material and methods section describes step by step research in flowchart and its description. theory section explains e-government and augmented reality literature reviews. results section consists of ar user interface design and the ar system. discussion section examines analysis, challenges, advantages, and limitations of the ar system for e-government course teaching. conclusion section consists of summary, conclusion, implication and future research. 2. the proposed method/algorithm e-government as electronic government or electronic governance field emerged in the late 1990´s. however, the use of computer for supporting government activities has existed for a long time [1], [2] discussed the trends of e-government research and its opportunities; [3] evaluated the performance of public services by local government; [4] identified empirical evidences to assessedthe impacts of the decentralisation. furthermore, it assesed public services spanish local governments for the quality of life of the citizen; [5] captured ethical concern in public service by local government of pekanbaru city; [6] explored citizen participation in public e-service development. the participation consists of user-centred design, participatory design, and user innovation; [7] examined e-services in the public sector domain by classifying it into three cateories, (a) a service, (b) electronic, and (c) public; [8] discussed the co-evolution of public governance innovation. it also proposed an adoption of hartley's model, such as co-evolution; [9] identified the role of stakeholders in the effective use of e-government resources in public services. there are also some literature about augmented reality, i.e., discuss the impact of ar on student’s learning process. this research stated that ar has a medium impact on the learning gains of students[10]; [11]examined ar research trends regarding science education. this research captured mobile learning, science education, science learning, and e-learning as the most popular topics; [12] captured the ar technological acceptance of students, the student performance, and gender factors. this research showed that ar can be employed in a university teaching, and the student's gender does not influence learning; [13] discussed the development of an augmented reality game-based learning environment; [14] examined an ar application to test its feasibility with enhancing the training process, learning time, and error rate. this work highlighted that ar produced better results for error rates and the average assembly times; [15] captured the implementation and evaluation of ar technology for 3d visualization models and architectural projects presentation; [16] discussed enhancing the attractiveness of learning through ar technology. in this work, the researcher developed four applications to improve communication and collaboration skills as well as biology and geography learning; [17] captured critical success factors and challenges for industrial ar implementation projects. technology, organisation, environment (toe) framework is utilized as a theoretical basis for the quantitative method and the questionnaire. a complementary qualitative approach is also employed to analyzed the findings; [18] analyzed the integration of ar into educational in-class activities. ar is utilized to to improve behavioral changes towards energy efficiency in schools; [19]reviewed several literatures of mobile augmented reality and its potentials for education; [20] examined ar experiment in higher education. in this case, ar is employed in pedagogy, but this experience is also important for introducing engineering students about the potential of augmented reality; [21] pointed out ar for education and training to meet the requirements of digitalization in the industrial revolution more successfully. 14 bulletin of social informatics theory and application issn2614-0047 vol. 4, no. 1, july 2020, pp. 12-20 yusuf et.al (e-government learning media through augmented reality technology) 3. method there are some stages for conducting this research as shown in “fig. 1,”. first, we developed a research design of how to develop an e-government learning media based on augmented reality technology. second, we collected references about learning media using augmented reality in journals, conference proceedings, books, website, youtube, and playstore. we searched references in science direct website using keywords of augmented reality, augmented reality for e-government, and e-government learning. also, we searched video in youtube and applications in playstore about learning media using augmented reality. from youtube, we found some learning medias in bahasa, such as virus biology learning, pray and ablution procedures, introduction of earth layers and structures, and introduction of garuda pancasila. third, we conducted user requirement analysis. in this step, we identified hardware, software, and user interface requirements. this ar application needs smartphone, pc, or laptop to run the program. the application also require some softwares, i.e., unity 2018, sketchup, visual studio 2019, and paint. fourth, we designed ar interface and the application. “fig. 2,” shows design of user interface for the ar application. fifth, we produced a presentation about introduction of command centre and public service mall as shown in “fig, 4,”. these materials will be included in the introduction menu in command centre and public service mall interfaces. sixth, we recorded the first author to deliver a lecture about introduction of command centre and public service mall. seventh, we recorded a video of public service mall in real condition as shown in “fig. 5,”. this video was taken at 1st floor of former siola building in surabaya, indonesia in the morning. it is one stop shopping for public service in local government of surabaya, indonesia. eighth, we also recorded a video of public service mall in real condition using cardboard camera application as shown in “fig. 6,”. this application is utilized to get virtual reality video. ninth, we produced a video of command centre. in this step, we captured from youtube and other video sources in the internet as difficult to record in the real command centre. there is a procedure and takes time to get permission for recording the real command centre. tenth, we developed an e-government learning media as shown in “fig. 3,”. in this stage, we also created 3d animation for command centre and public service mall as captured in “fig. 7 and 8,”. additionally, ar objects and markers are also produced in this application. eleventh, we created markers of command centre and public service mall. twelfth, we tested and validated the learning media in the course session. fig. 1. step by step research method 4. results and discussion in the design process, we set up the user interface as shown in the “fig. 3,”. the first interface contains text to explain the title teaching media of e-government course, then user can click start button. after that, the second interface will appear consist of two options, i.e., command centre and public service mall. user can choose one of them and the third interface will come out. it contains three menus, i.e., introduction, video 360, and augmented reality. introduction menu consists of explanation about command centre or public service mall, such as definition, objective, issn2614-0047 bulletin of social informatics theory and application 15 vol. 4, no. 1, july 2020, pp. 12-20 yusuf et.al (e-government learning media through augmented reality technology) components, types, and stages. video 360 menu has content about virtual reality video of command centre or public service mall. this video can be seen using virtual reality glasses or google card board. then, user can click augmented reality menu which consist of ar object. this animation object describes staff of command centre or public service mall that can look left and right. fig. 2. design of ar user interface furthermore, “fig. 3,” captures main interface of the ar application. it consists of two main menus, i.e., command centre and public service mall. therefore, the user can choose one of the menus, then it will goe to the next user interface. fig. 3. main interface moreover, “fig. 4,” shows video of e-government materials teaching. in the video, the first author delivers a lecture about introduction of command centre and public service mall. the duration of the video is 4 minutes and 14 second. furthermore, the length of video of public service mall is 3 minutes and 10 second. this video was taken at first author home. fig. 4. video of command centre and public service mall teaching the next “fig. 5,” is video of public service mall in real condition. in this place, the public service mall opens everyday to serve surabaya citizen for arranging administration and other public service affairs. 16 bulletin of social informatics theory and application issn2614-0047 vol. 4, no. 1, july 2020, pp. 12-20 yusuf et.al (e-government learning media through augmented reality technology) fig. 5. video of public service mall in real condition moreover, “fig. 6,” points out video of public service mall using cardboard camera application. it is a virtual reality video. user need to wear virtual reality glasses or camera cardboard. fig. 6. video of public service mall using cardboard camera additionally, “fig. 7,” captures a video of command centre. this video was captured from youtube and edited by adding voice of second author to explain about command centre. fig. 7. video of real command centre issn2614-0047 bulletin of social informatics theory and application 17 vol. 4, no. 1, july 2020, pp. 12-20 yusuf et.al (e-government learning media through augmented reality technology) then, “fig. 7,” captures animation of command centre. this figure contains computers, desks, and monitor screens. “fig. 8,” shows animation of public service mall. this figure consists of desks, computers and staffs to serve the citizen. fig. 8. animation of command centre based on our project, we developed a novel model of learning media using ar as shown in “fig. 9,”. this model consists of main components, i.e., user, devices, ar, and course materials. the user can be a student or anyone who has access the ar for to learn about a topic. devices can be a smartphone, a laptop, and a personal computer. ar consists of object and a marker. in this project, ar objects are command centre and public service mall. markers are icon, text, image, or something that can be scanned by the devices to detect and get in to the ar object. then, the user can access the course materials in text, image, video, and audio forms. in this case, the course materials are egovernment materials focusing on introduction of command centre and public service mall “fig. 10,”. in e-government lecture, students have to come to the command centre and public service mall building to learn about command centre and public service mall learning materials. fig. 9. a novel model of e-government learning media using ar 18 bulletin of social informatics theory and application issn2614-0047 vol. 4, no. 1, july 2020, pp. 12-20 yusuf et.al (e-government learning media through augmented reality technology) fig. 10. animation of public service mall furthermore, visiting the command centre is not straightforward process as it onvolvesbureaucracy and administration process. therefore, it is not easy for a student at information system department. thus, ar can help students to learn about the command centre, public service mall, and other e-government materials lecture easily and interestengly. students need a smartphone or a computer or a laptop to install and run the application. after that, they can get the the materials in texts, video, audio, and ar animation in the application. also, ar animation is interesting to students as the application contains video and audio. ar learning media has been changes the education approach. this research is also compared with [20] as shown in the tabel 1. ar for e-government learning is utilised for students in information system and informatics departments. however, ar for mechanical design is used for bachelor of technology and arts et métiers engineering students. furthermore, this research is focused on introduction of data centre and public service mall. moreover, ar for mechanical design is specified for mechanical design. both of research have same components of text, image, video, audio, 3d animation. however, ar for e-government learning employed ar object and marker as [20] did not mention those components. moreover, this research utilized softwares of unity 2018, sketchup, visual studio 2019, and paints as another research applied diota software. both application also use same tablet as the hardware. however, ar for egovernment application uses mobile phone as ar for mechanical design utilised hololens glasses. both applications are interesting for learners, students, and other users. ar for e-government learning application has some contributions as follows: teacher and lecturer might change their roles as they are not only give and transfer knowledge, but also facilitate knowledge transfer. also, students will change their learning behaviour more independently and able to learn the course materials everywhere and everytime. furthermore, ar for mechanical design also has contributions, such as supporting the kinematic reading and movement transformations detection in context, specified information at the appropriate moment and location, and helping in the follow-up of procedures, such as handling operations or assembling/disassembling operations shown in table 1. 5. conclusion in conclusion, ar has proven to be one of the tools in the other sectors of the economy and has a lot to offer to ein the future. there are some advantages to teach e-government using ar technology, i.e., interesting, attractive, easy to use. however, there are also some limitations, ar needs a smart phone, a computer, or a laptop and its literacy for the user. a new model describes main components based on this project, i.e., user, devices, ar, and, course materials. additionally, there are also sub-components of the novel model, such as a smartphone, a laptop, a personal computer, ar object, marker, text, image, video, and audio. this work has some implications for theory and practice. for theory, it adds a model of learning media for e-government course and extends the body of knowledge for e-government and augmented reality fields. for practice, the augmented reality application as an outcome of this project can be utilized for eissn2614-0047 bulletin of social informatics theory and application 19 vol. 4, no. 1, july 2020, pp. 12-20 yusuf et.al (e-government learning media through augmented reality technology) government courses. the next research will develop a virtual reality technology for e-government learning media. table.1 comparison ar for e-government learning and mechanical design material courses ar for e-government learning ar for mechanical design [20] students information system students informatics students bachelor of technology students arts et métiers engineering students topics introduction of data centre and public service mall mechanical design components ar object marker text image video audio 3d animation text image video audio 3d animation software unity 2018 sketchup, visual studio 2019, paint diota software hardware tablet mobile phone tablet hololens glasses contribution of ar interesting teacher and lecturer might change their roles as they are not only give and transfer knowledge, but also facilitate knowledge transfer. students will change their learning behaviour more independently ar application makes students able to learn the course materials everywhere and everytime interesting support the kinematic reading and movement transformations detection in context specified information at the appropriate moment and location helping in the follow-up of procedures, such as handling operations or assembling/disassembling operations. acknowledgment this work is supported by university of trunojoyo madura, indonesia under learning innovation award. therefore, we woud like to thank university of trunojoyo madura, indonesia for supporting this project. references [1] å. grönlund and t. a. horan, “introducing e-gov: history, definitions, and issues,” commun. assoc. inf. syst., vol. 15, no. 1, p. 39, 2005. [2] m. p. rodríguez bolívar, l. alcaide muñoz, and a. m. lópez hernández, “trends of e-government research: contextualization and research opportunities,” 2010. [3] j. l. t. blank, “measuring the performance of local administrative public services,” brq bus. res. q., vol. 21, no. 4, pp. 251–261, 2018. [4] b. cuadrado-ballesteros, i. m. garcía-sánchez, and j. m. prado-lorenzo, “effects of different modes of local public services delivery on quality of life in spain,” j. clean. prod., vol. 37, pp. 68–81, 2012, doi: 10.1016/j.jclepro.2012.06.008. [5] t. k. harahap, “ethics green open space public service by government pekanbaru city,” procediasocial behav. sci., vol. 211, pp. 945–952, 2015. [6] j. holgersson and f. karlsson, “public e-service development: understanding citizens’ conditions for participation,” gov. inf. q., 2014, doi: 10.1016/j.giq.2014.02.006. [7] i. lindgren and g. jansson, “electronic services in the public sector: a conceptual framework,” gov. inf. q., vol. 30, no. 2, pp. 163–172, 2013. [8] a. scupola and a. zanfei, “governance and innovation in public sector services: the case of the digital library,” gov. inf. q., vol. 33, no. 2, pp. 237–249, 2016. [9] o. r. ashaye and z. irani, “the role of stakeholders in the effective use of e-government resources in public services,” int. j. inf. manage., vol. 49, pp. 253–270, 2019. 20 bulletin of social informatics theory and application issn2614-0047 vol. 4, no. 1, july 2020, pp. 12-20 yusuf et.al (e-government learning media through augmented reality technology) [10] m.-d. guillamón, a.-m. ríos, b. gesuele, and c. metallo, “factors influencing social media use in local governments: the case of italy and spain,” gov. inf. q., vol. 27, no. march, pp. 244–260, 2016, doi: 10.1016/j.giq.2016.06.005. [11] f. arici, p. yildirim, ş. caliklar, and r. m. yilmaz, “research trends in the use of augmented reality in science education: content and bibliometric mapping analysis,” comput. educ., vol. 142, p. 103647, 2019. [12] j. cabero-almenara, j. m. fernández-batanero, and j. barroso-osuna, “adoption of augmented reality technology by university students,” heliyon, vol. 5, no. 5, p. e01597, 2019. [13] c. h. chen, c.-h. ho, and j.-b. lin, “the development of an augmented reality game-based learning environment,” procedia-social behav. sci., vol. 174, no. 1, pp. 216–220, 2015. [14] f. ferrati and j. a. erkoyuncu, “developing an augmented reality based training demonstrator for manufacturing cherry pickers,” 2019. [15] d. fonseca, n. martí, e. redondo, i. navarro, and a. sánchez, “relationship between student profile, tool use, participation, and academic performance with the use of augmented reality technology for visualized architecture models,” comput. human behav., vol. 31, pp. 434–445, 2014. [16] a. iftene and d. trandabăț, “enhancing the attractiveness of learning through augmented reality,” procedia comput. sci., vol. 126, pp. 166–175, 2018. [17] t. masood and j. egger, “augmented reality in support of industry 4.0—implementation challenges and success factors,” robot. comput. integr. manuf., vol. 58, pp. 181–195, 2019. [18] g. mylonas, c. triantafyllis, and d. amaxilatis, “an augmented reality prototype for supporting iotbased educational activities for energy-efficient school buildings,” electron. notes theor. comput. sci., vol. 343, pp. 89–101, 2019. [19] d. nincarean, m. b. alia, n. d. a. halim, and m. h. a. rahman, “mobile augmented reality: the potential for education,” procedia-social behav. sci., vol. 103, no. 0, pp. 657–664, 2013. [20] d. scaravetti and d. doroszewski, “augmented reality experiment in higher education, for complex system appropriation in mechanical design,” procedia cirp, vol. 84, pp. 197–202, 2019. [21] s. r. sorko and m. brunnhofer, “potentials of augmented reality in training,” procedia manuf., vol. 31, pp. 85–90, 2019. bulletin of social informatics theory and application issn 2614-0047 vol. 5, no. 1, march 2021, pp. 38-46 38 https:doi.org/10.31763/businta.v5i1.286 bayes interpretation for smoke-free area cities index tazkiyah herdi 1,*, ardiansyah dores 2 a universitas mercu buana, jakarta, indonesia 1 tazkiyah.herdi@mercubuana.ac.id*; 2 ardian@mercubuana.ac.id * corresponding author 1. introduction according to the global youth tobacco survey carried out in 2019, 19.2% of schoolchildren were smoking, comprised 35.6% male and 3.5% female. meanwhile, 57.8% of schoolchildren aged 13-15 years were exposed to cigarette smoke at home and 66.2% in public places, implying that 6 out of every ten school children aged 13-15 years were exposed to cigarette smoke at home in public places [1]. the prevalence of smoking among adolescents between the ages of 10-18 years increased continuously from 7.2% in 2013 to 9.1% in 2018. furthermore, tobacco consumption among the population aged above 15 years also increased from 32.8% to 33.8%. there is growing international interest in advancing ‘the tobacco endgame. a previous study used new zealand smoke-free goal for 2025 as an example to model the impacts on smoking prevalence, health gains, and cost savings. furthermore, the cost savings consist of strategies, which are 10% annual tobacco tax increases, a tobacco-free generation, a substantial outlet reduction strategy, and a sinking lid on tobacco supply [2]. in terms of controlling tobacco consumption, the government should (1) increase the cigarette tax [3], (2) make policy for taps (tobacco, advertisement, promotion, and sponsor) ban [4], (3) implement a warning on the effects of smoking with phw (pictorial health warning) on cigarette advertisements, and packaging, (4) make policy on smoke-free area, which are places or areas that are declared prohibited from smoking, producing, introducing and/promoting tobacco products. the world health organization (who) in the framework convention on tobacco control (fctc) stated that both the local and central government should enforce and implement the regulation in the jurisdiction of their respective countries as stipulated in national law and actively promote the enactment and application of legislative, executive, administrative and action measures. in order to a r t i c l e i n f o a b s t r a c t article history received december 17, 2020 revised january 16, 2021 accepted january 30, 2021 to control tobacco consumption in indonesia, whose prevalence increased from 32.8% to 33.8%, local governments issued regional regulations on smoke-free area policy with support from the central government. until 2019, there were still 166 cities/districts governments that were yet to issue the regulation out of 514 cities/districts. the increase in the number of active smokers and individuals still exposed to cigarette smoke shows that efforts have not been optimized to reduce tobacco consumption. furthermore, no control effort has been discovered regarding the level of success of the policies that have been applied. therefore, this research discusses the surveys carried out in cities/districts that have applied the smoke-free policy, using indicators such as ideal questions relating to the policy. naïve bayes classifier is one of the decision support system (dss) classification methods used to classify the survey results into good, fair or poor categories to determine whether each city/district has implemented the issued regulation. based on the results from the classification of the three cities/districts using the classifier, bogor regency was classified as good while lombok and padang cities were classified as poor. this is an open access article under the cc–by-sa license. keywords smoke-free policy decision support system naïve bayes classifier http://creativecommons.org/licenses/by-sa/4.0/ http://creativecommons.org/licenses/by-sa/4.0/ issn 2614-0047 bulletin of social informatics theory and application 39 vol. 5, no. 1, march 2021, pp. 38-46 herdi & dores et.al (bayes interpretation for smoke-free area cities index) protect against exposure to cigarette smoke in workplaces, indoors, public transport, closed public places, and in other public places [5], who introduced the mpower concept (monitor, protect, offer, warn, enforce, raise). it is an effective measure to assist in the implementation at the country level to reduce tobacco demand. the p stands for protect, which is education on protection. it also emphasizes that clean air is a human right. public support is the critical factor for the success of smokefree laws, which is obtainable through effective education about the dangers of passive smoking and a clear explanation of policy objectives. to control active smoking in indonesia, the city and district government issued local regulations on smoke-free policy and taps ban with support from the central government. until 2019, there were still 166 cities/districts that were yet to issue the regulation. the increasing number of active smokers and individuals exposed to cigarette smoke shows that efforts have not been optimized to reduce tobacco consumption. furthermore, no control effort has been discovered regarding the success of policies applied. previous studies have been made for the social impacts of this smoke-free policy. in jayapura, researchers monitored the compliance and barriers to applying the smoke-free area and social studies law in jayapura. they found that the smoke-free area criteria compliance following government regulations was only 17% [6]. smoke-free policy implementation could be enhanced with information about second-hand smoke exposure (shse) for smokers and non-smokers [7]. in palembang and bogor, many respondents find smoke-free policy necessary. however, they still experienced of asking smokers not to smoke in restricted areas [8]. the role of campus smoking policies on reducing student smoking behavior was concerned across us. other types of policies concerned included partial smoking restriction and integration of preventive education and/or smoking cessation programs into college-level policies. the results of the studies had reviewed that policies were found to significantly reduce smoking behavior and pro-smoking attitudes over time [9]. measurement of the level of implementation of smoke-free area policy and taps (tobacco advertisements promotions and sponsors) ban has been calculated in previous research. the results showed that smoke-free area policy and taps ban using the saw (simple additive weighting) analysis to weigh all applicable indicators is capable of showing the ranking value [10]. according to arnot and pervan, decision support system (dss) has been used in many types of research, which focused on the evolution of several sub-groupings of research and practice such as personal, group, negotiation, intelligence, and knowledge management based decision support system. the others include executive information systems/business intelligence and data warehousing” [11]. decision support systems aids human cognitive deficiencies by integrating various sources of information, providing intelligence, access to relevant knowledge, and aiding decision-making [12], [13]. a decision is a choice among several alternatives, and decision making refers to the whole process of assessing the problem, collecting and verifying information, identifying alternatives, anticipating consequences of decisions, making a choice using sound and logical judgment based on available information, informing others of the decision and rationale, evaluating decisions. a multiattribute decision is applied for an assessment mechanism to get recommendations from prospective corporate employees with high benefits and low costs for the company [14], [15]. one of the dss classification methods is the naive bayes classifier, which was derived from bayes' theorem. it is a statistical calculation that is carried out by evaluating the probability of similarity of an existing case on a case-by-case basis. it has a high degree of accuracy and speed when applied to large databases [16], [17]. in addition, it allows researchers to formally incorporate prior information, whether qualitative or quantitative, into their analyses. bayes’ theorem developed over time into naïve bayes classification method. naïve bayes classifier is applied to the text classification for news categories, which explains the difficulty of newsreaders choosing online news according to their categories. this method can be applied to classify online news portals in finance, lifestyle, news, and sports [18]. furthermore, it is applicable in the government and agribusiness sectors. its algorithm is also applicable in regional government performance assessment on regional budgeting management since there is no control system in the regional government to manage the budget properly. therefore, an assessment system using this classification may be carried out to determine the performance of the village government in managing the budgets. meanwhile, in the agribusiness sector, research also proposed a shallots classification 40 bulletin of social informatics theory and application issn 2614-0047 vol. 5, no. 1, march 2021, pp. 38-46 herdi & dores et.al (bayes interpretation for smoke-free area cities index) method based on quality using the naïve bayes classifier, which classified them into three classes: good, medium, and poor quality [19]. naive bayes classifier has been developed, and it is a method of calculating the decision support system assessment in various industrial sectors. this research discusses the surveys carried out in cities/districts that have implemented smoke-free policies. this method was used to classify the survey results from each city/district to determine whether the implemented smoke-free policy is in good, fair, or poor categories. this research focuses on data samples in lombok and padang cities, bogor district to get the appropriate bayes method calculation formula. 2. method fig. 1 presents the research framework. literature reviews in books, journals, regional regulations, research reports, and relevant information were carried out to determine the method to be used. furthermore, data collection was carried out through the following activities: collaboration between the author's team and non-governmental organization to formulate assessment indicators by global regulations, which are the framework convention on tobacco control (fctc), government and local regulations and indicators for assessing child-friendly cities. after the indicators were determined, several questions were asked concerning the indicators to be answered by the communities. in addition, the indicator survey was tested in the areas of padang city, lombok city, and bogor district to obtain sample data. fig. 1. the research framework table.1 places of smoke-free areas based on regulations smoke-free area policy no fctc child-friendly city government regulation no. 109 year 2012 1 indoor office space health service health service 2 public transportation education places education places 3 indoor public places public places child-friendly indoor and outdoor 4 other public places child-friendly indoor and outdoor worship places 5 worship places public transportation 6 public transportation office spaces 7 public and other determined places. after the survey data was collected, a classification calculation simulation using the bayes theorem method was carried out to ascertain whether the smoke-free policy implemented by the city/district is reasonable, fair, or poor. the calculation, conclusion, and results were generated after going through these stages. fig. 2 shows the naïve bayes learning process for training data. the first step was preprocessing, the survey documents were used to process the cleaning and grouping according to cities in good, adequate or insufficient categories. for the second step, each type of data on the training data variables was searched. when it is available, it was added to the frequency of that category. however, the data is added as a new one when the searching failed the probability of (p (wk | vj)) was calculated, where wk is the indicator variable of smoke free areas and vj are the categories: good, fair, and poor. furthermore, the amount of survey data that has a conformity value was added and the value of (p (vj)) was calculated, therefore, the probability of (p (vj) was recalculated issn 2614-0047 bulletin of social informatics theory and application 41 vol. 5, no. 1, march 2021, pp. 38-46 herdi & dores et.al (bayes interpretation for smoke-free area cities index) fig. 2. bayes learn process flowchart fig. 3. bayes classifying process flowchart 42 bulletin of social informatics theory and application issn 2614-0047 vol. 5, no. 1, march 2021, pp. 38-46 herdi & dores et.al (bayes interpretation for smoke-free area cities index) the purpose of the naïve bayes classifying process is to discover the highest possible value to make a test data classification value in the correct category. fig. 2 shows the design for the classification of the test data, which was carried out by checking the variables in each category with the highest frequency. furthermore, the probability value of (p (wk | vj)) was calculated as well as the probability value of (p (vj)) * (p (wk | vj)). the next stage was the result in the second step process, each category was compared for the most outstanding value, and the document were included in that category. 3. results and discussion the number of survey data for each city was grouped into good, fair, and poor categories. the good category represents the answers of respondents that high-frequently see no-smoking signs and officers warning the smokers in particular places while low-frequently see people smoking, cigarette butts, and taps in particular places. meanwhile, the fair category represents the answers of respondents that med-frequently see no-smoking signs and officers that warned smokers at particular places while med-frequently saw smoking people, cigarette butts, and taps in particular places. also, the poor category represents the answers of respondents that low-frequently see no-smoking signs and officers that warned the smoker in that place while, high-frequently see smoking people, cigarette butts, and taps in particular places. fig. 4. number of frequencies based on respondents’ answers in bogor district fig. 5. number of frequencies based on respondents’ answers in lombok issn 2614-0047 bulletin of social informatics theory and application 43 vol. 5, no. 1, march 2021, pp. 38-46 herdi & dores et.al (bayes interpretation for smoke-free area cities index) fig. 6. number of frequencies based on respondents’ answers in padang in summary, the graphs show that the frequency of good and fair categories mostly took place in health services, followed by education places and child-friendly outdoors. meanwhile, the poor category took place mainly in public places and public transportations the health services in bogor district (fig. 4) took seriously about smoke-free area policy, because it had the highest frequency of good category, at roughly over 50. there was a slight difference between health services and child-friendly outdoors. the highest frequency of appropriate category was located in health services, roughly above 80. meanwhile, the highest frequency of poor category was located in public transportations and public places. furthermore, in lombok (fig. 5), the highest frequency of excellent and fair categories was also located in health services, at about 140 and nearly 100. meanwhile, the public places had the highest frequency of poor category. in padang (fig. 6), health services, child-friendly outdoors, and public transportations had the highest good, fair and poor frequency, respectively. table 2 shows the bayes training data which used all respondents’ answers from three cities. education places, health services, child-friendly outdoors, places of worship, public transportations, workplaces, and public places were assumed as variables. then the categories were good, fair and poor. table.2 frequency of variables to categories no variables good fair poor total 1 education places 157 146 162 465 2 health services 189 253 23 465 3 child-friendly outdoors 113 253 99 465 4 worship places 154 106 205 465 5 public transportations 95 155 215 465 6 working places 131 235 99 465 7 public places 70 134 261 465 total data training 909 1282 1064 3255 after being grouped based on the place and frequency of categories, the probability between variables to the category was searched with the formula of the equation 𝑃(𝑊𝑘|𝑉𝑗) = 𝑛𝑘+1 𝑛+|𝑣𝑜𝑐𝑎𝑏𝑢𝑙𝑎𝑟𝑦| nk was the category frequency in a variable, and n is all frequencies in all variables in a category. vocabulary are the frequency of all variables from all categories. table 3 shows the calculation of the 44 bulletin of social informatics theory and application issn 2614-0047 vol. 5, no. 1, march 2021, pp. 38-46 herdi & dores et.al (bayes interpretation for smoke-free area cities index) probability of each variable to categories. this formula is used as the training data for data testing in table 4, 5, and 6. table 4 shows that the bogor regency testing document is in the fair category. based on the probability values shown in table 5, the lombok city testing document is in the poor category. finally, table 6 shows that the padang city testing document is in the poor category. table.3 probability variables to categories as training data no variables p[variables|good] p[variables|fair] p[variables|poor] 1 education places 0.037944284 0.032400264 0.037740218 2 health services 0.045629203 0.05598413 0.005556842 3 child-friendly outdoors 0.027377522 0.05598413 0.023153508 4 worship places 0.037223823 0.023583866 0.047696226 5 public transportations 0.023054755 0.034383954 0.050011577 6 working places 0.031700288 0.052016751 0.023153508 7 public places 0.017050913 0.029755345 0.06066219 table.4 data testing for bogor district bogor district frequency p[vj] * p[wk |vj] no variables good fair poor good fair poor 1 education places 44 53 43 * 0.010800088 * 2 health services 52 85 3 * 0.018661377 * 3 child-firendly outdoors 31 83 26 * 0.018661377 * 4 worship places 52 38 50 0.012407941 * * 5 public transportations 29 47 64 * * 0.016670526 6 working places 33 84 23 * 0.017338917 * 7 public places 31 44 65 * * 0.02022073 total 0.012407941 0.065461759 0.036891256 table.5 data testing for lombok city lombok city frequency p[vj] * p[wk |vj] no variables good fair poor good fair poor 1 education places 85 62 103 * 0.012580073 2 health services 98 139 13 * 0.018661377 3 child-friendly outdoors 64 125 61 * 0.018661377 4 worship places 80 50 120 * * 0.015898742 5 public transportations 51 93 106 * * 0.016670526 6 working places 76 116 58 * 0.017338917 7 public places 20 63 167 * * 0.02022073 total * 0.054661671 0.06537007 issn 2614-0047 bulletin of social informatics theory and application 45 vol. 5, no. 1, march 2021, pp. 38-46 herdi & dores et.al (bayes interpretation for smoke-free area cities index) table.6 data testing for padang city padang city frequency p[vj] * p[wk |vj] no variables good fair poor good fair poor 1 education places 28 31 16 * 0.010800088 * 2 health services 39 29 7 0.015209734 * 3 child-friendly outdoors 18 45 12 * 0.018661377 * 4 worship places 24 18 33 0.012407941 * 0.015898742 5 public transportations 15 15 45 * * 0.016670526 6 working places 22 35 18 * 0.017338917 7 public places 19 27 29 * * 0.02022073 total 0.027617675 0.046800382 0.052789998 4. conclusion to conclude, the frequency of excellent and fair categories mainly was located in health services, followed by education places and child-friendly outdoors. meanwhile, the poor category was primarily located in public places and public transportations. documents for data testing include 3 cities that were assessed separately to be classified into a category. the classification results using the naïve bayes classifier include bogor regency as good, lombok and padang cities as poor. furthermore, this classification helps analyze and design a decision support system to assess all cities/districts implementing the local policy of smoke-free areas. other decision-making calculation methods should be tried out to obtain results following the policy stakeholders. acknowledgment the authors express gratitude to universitas mercu buana for funding this research through research scheme project 02-5/209/b-spk/iii/2020. furthermore, acknowledge the use of service and facilities of the business intelligence laboratory at department of information system, universitas mercu buana. references [1] world health organization, “2019 gyts fact sheet indonesia,” 2019. [2] f. s. van der deen et al., “impact of five tobacco endgame strategies on future smoking prevalence, population health and health system costs: two modelling studies to inform the tobacco endgame,” tob. control, vol. 27, no. 3, pp. 278–286, may 2018. [3] l.-m. ho, c. schafferer, j.-m. lee, c.-y. yeh, and c.-j. hsieh, “raising cigarette excise tax to reduce consumption in low-and middle-income countries of the asia-pacific region:a simulation of the anticipated health and taxation revenues impacts,” bmc public health, vol. 18, no. 1, p. 1187, dec. 2018. [4] d.-j. a. van mourik, g. e. nagelhout, m. c. willemsen, b. van den putte, and h. de vries, “differences in smokers’ awareness of the health risks of smoking before and after introducing pictorial tobacco health warnings: findings from the 2012–2017 international tobacco control (itc) netherlands surveys,” bmc public health, vol. 20, no. 1, p. 512, dec. 2020. [5] who fctc, “who framework convention on tobacco control,” 2003. [6] w. wahyuti, s. hasairin, s. mamoribo, a. ahsan, and d. kusuma, “monitoring compliance and examining challenges of a smoke-free policy in jayapura, indonesia,” j. prev. med. public heal., vol. 52, no. 6, pp. 427–432, nov. 2019. [7] j. anthony et al., “qualitative assessment of smoke-free policy implementation in low-income housing: enhancing resident compliance,” am. j. heal. promot., vol. 33, no. 1, pp. 107–117, jan. 2019. 46 bulletin of social informatics theory and application issn 2614-0047 vol. 5, no. 1, march 2021, pp. 38-46 herdi & dores et.al (bayes interpretation for smoke-free area cities index) [8] m. r. kaufman, a. p. merritt, r. rimbatmaja, and j. e. cohen, “‘excuse me, sir. please don’t smoke here’. a qualitative study of social enforcement of smoke-free policies in indonesia,” health policy plan., vol. 30, no. 8, pp. 995–1002, oct. 2015. [9] b. l. bennett, m. deiner, and p. pokhrel, “college anti-smoking policies and student smoking behavior: a review of the literature,” tob. induc. dis., vol. 15, no. 1, p. 11, dec. 2017. [10] t. herdi, a. dores, and f. masya, “simple additive weighting in selection of cities performance of non smoking area and tobacco advertisements, promotions and sponsors ban,” int. j. inf. syst. comput. sci., vol. 4, no. 2, pp. 71–79, 2020. [11] d. arnott and g. pervan, “a critical analysis of decision support systems research,” in formulating research methods for information systems, london: palgrave macmillan uk, 2015, pp. 127–168. [12] s. f. crone, s. lessmann, and r. stahlbock, “the impact of preprocessing on data mining: an evaluation of classifier sensitivity in direct marketing,” eur. j. oper. res., vol. 173, no. 3, pp. 781–800, 2006. [13] g. e. phillips-wren, o. m. ferreiro, g. forgionne, and h. desai, “adoption of decision support systems ( dss ) in a developing country,” j. decis. syst., vol. 16, no. 4, pp. 425–449, 2007. [14] r. accorsi, r. manzini, and f. maranesi, “a decision-support system for the design and management of warehousing systems,” comput. ind., vol. 65, no. 1, pp. 175–186, jan. 2014. [15] b. a. alyoubi, “decision support system and knowledge-based strategic management,” procedia comput. sci., vol. 65, pp. 278–284, 2015. [16] x. wu et al., “top 10 algorithms in data mining,” knowl. inf. syst., vol. 14, no. 1, pp. 1–37, 2008. [17] k. i. qazi, h. k. lam, b. xiao, g. ouyang, and x. yin, “classification of epilepsy using computational intelligence techniques,” caai trans. intell. technol., vol. 1, no. 2, pp. 137–149, 2016. [18] a. dores, f. masya, and h. prastiawan, “indonesian text news classification using the naive bayes algorithm,” int. j. comput. sci. mob. comput., vol. 7, no. 8, pp. 159–169, 2018. [19] a. susanto, z. h. dewantoro, c. a. sari, d. r. i. m. setiadi, e. h. rachmawanto, and i. u. w. mulyono, “shallot quality classification using hsv color models and size identification based on naive bayes classifier,” j. phys. conf. ser., vol. 1577, p. 012020, jul. 2020. bulletin of social informatics theory and application issn 2614-0047 vol. 4, no. 2, september 2020, pp. 83-90 83 https:doi.org/10.31763/businta.v4i2.287 indonesian online learning system evaluation framework based on utaut 2.0 felix andika dwiyanto a,1,*, hakkun elmunsyah b,2, yoto c,3 a graduate school, universitas negeri malang, malang, indonesia b depatment of electrical engineering, universitas negeri malang, malang, indonesia c depatment of mechanical engineering, universitas negeri malang, malang, indonesia 1 felix.adwiyanto@gmail.com*; 2 hakkun@um.ac.id; 3 yoto.ft@um.ac.id * corresponding author 1. introduction currently, the role of information and communication technology (ict) cannot be separated from any activities and works. especially in education, the use of ict is to communicate, create, disseminate, store, and manage information [1]–[3]. moreover, a learning process with face-to-face method has been long time combined with technology assistance. in its application this, method commonly known as online learning. this method is able to conduct a flexible learning process that can be done anywhere and anytime as long as user connected to the internet. moreover, it can provide a sufficient learning quality in a wider scope[4], [5]. in indonesia, one of ict utilization in online learning is spada referred as sistem pembelajaran daring indonesia. it is a program from indonesian ministry of research, technology, and higher education to increase equitable access of quality learning in higher education. spada is developed to answer several education challenges [6], which are (a) limited capacity of university, (b) limited scope of university due to uneven distribution, (c) there are still many universities that do not have adequate and quality educational resources, (d) higher quality universities are still concentrated in java, and (e) a lack of equal and quality higher education services. therefore, the use of ict is expected to be a solution with a concept of networked higher education and online learning. one of spada application is to provide and accommodate a teacher profession education program which known as ppg. this program is actualization from law about teacher profession which state that teacher should have academic and competency qualification, teaching certificate, physically and mentally healthy, also have an ability to realizing the goals of national education. this regulation become a basic indonesian teacher reformation that teacher should prepare through ppg after completed a bachelor degree. in other words, this program will prepare a graduates in either education or non-education majors who have an interest to become a professional teacher. a r t i c l e i n f o a b s t r a c t article history received august 6, 2020 revised august 20, 2020 accepted september 2, 2020 this study aims to propose an evaluation of indonesian online learning system which known as spada. this system accommodate an online learning for teacher profession education program which known as ppg. the system evaluation is using unified theory of acceptance and use of technology 2 (utaut2) model with a few adjustments. this study provide an information such as required variables to evaluate the system and research design on spada. the proposed evaluation model using seven main constructs of utaut 2.0 and its influence on behavioral intention and use behavior. the data obtained from several questionnaires related to the variable and analyzed with path analysis technique. moreover, this proposed study is expected can be as reference to conduct a similar study related to the system evaluation. this is an open access article under the cc–by-sa license. keywords utaut2 online learning system http://creativecommons.org/licenses/by-sa/4.0/ http://creativecommons.org/licenses/by-sa/4.0/ 84 bulletin of social informatics theory and application issn 2614-0047 vol. 4, no. 2, september 2020, pp. 83-90 dwiyanto et.al (indonesian online learning system evaluation framework based on utaut 2.0) the implementation of ppg is consists of three main stages which are online learning, workshop, and teaching practice at school. fig. 1 show the implementation flow of ppg. based on the flow, it can be seen that the early 12 weeks of the program is done by completed the course of pedagogic competency through an online learning. the online platform used is brightspace web-based learning management system. a several features in this platform are discussion forum and virtual classroom. the advantage of this platform is instructor can monitoring an improvement of learning participant such as user activity, visited content, learning achievement, final exam, and quizzes. fig. 1. the implementation stages of ppg based on the program phase, it can be seen that the most proportion required is the first phase which are online course. from that phase, an instructor will evaluate the participants’ learning achievement and filter participants who deserve and succeed to continue to the next phase. in this case, the use of web-based platform has an important role in a learning process. therefore, it is required to evaluate the system quality, also the user intentions to use a system. an evaluation is used to examine the effectiveness of content and features that provided in the system. also, it will improve the system quality based on users’ technology acceptance. one of evaluation model used to test the system is unified theory of acceptance and use of technology (utaut). this model has four main factors in acceptance and use of technology, which are (a) performance expectancy, (b) effort expectancy, (c) social influence, and (d) facilitating conditions [7]. that four factors will affecting technology behavioral intention and use behavior. nowadays, the use of utaut has been improved become utaut2. this model extends the previous model of utaut to study acceptance and use of technology [8]. previous studies shows that utaut describes an acceptance and use of technology in the educational fields [9]–[14]. in this case, an evaluation of the spada system needs to be done because the learning implementation of ppg students are new and different. so, acceptance, use and adaptation will be different for each user. this evaluation will be useful for explaining the differences in use and acceptance so that it will produce a feedback that can be used as a reference for improving the system according to user needs. 2. unified theory of acceptence and use of technology 2.0 (utaut2.0) generally, utaut is a technology acceptance model. this model is a development and synthesis of several existing technology application models including theory of reasoned action (tra), technology acceptance model (tam), motivation model (mm), theory of planned behavior (tpb), combined tam and tpb, model of pc utilization (mptu), innovation diffusion theory (idt) and social cognitive theory (sct) [7], [15], [16]. along with the development of information technology and communication, utaut also developed into new version known as utaut2. this developed model added three main factors in its implementation which are (a) hedonic motivation, (b) price value, and (c) habit [8]. it’s produced a variation of substantial improvement in behavioral intention and technology use. fig. 2 shows the initial model of utaut2. based on the initial model of utaut2, it consists of several constructs or variable. those variables are independent, dependent, and moderating variable. independent variables are seven main factors that affecting dependent variables (behavioral intention and use behavior). while, the three factors which are age, gender, and experience acts as moderating variable. issn 2614-0047 bulletin of social informatics theory and application 85 vol. 4, no. 2, september 2020, pp. 83-90 dwiyanto et.al (indonesian online learning system evaluation framework based on utaut 2.0) fig. 2. model of utaut2 the first variable is a performance expectancy (pe). this is a level of an individual's belief that using the system will help him get benefits at work [10], [17]. the higher level of trust will make him to use the technology longer. in its application, there are five constructs related to performance expectations. the five constructs are perceived usefulness, extrinsic motivation, job fit, relative advantage, and outcome expectations. the first construct, perceived usefulness, is related to the benefits when using a certain technology, which will facilitate his job. the second construct, extrinsic motivation is the perception of doing something to get results or rewards from the work such as wages, bonuses, and others [18]. furthermore, job fit is the suitability of the system functions that will help someone's personal work. the fourth construct is the relative advantage associated with the extent to which the system development will be better than the previous one. the final construct is the outcome expectations associated with the expected results achieved by using a system. the second variable is effort expectancy (ee). this construct defined as the level of ease associated with using the system [9], [19]. in other words, it refers to the expectation of ease of doing work when using a particular system. this variable has three basic constructs, which are perceived ease of use, complexity, and ease of use. the perceived ease of use is related to the level of user confidence in the use of a system [20]. in other words, the use of a system can ease the work effort. the second construct is the complexity associated with the level of ease and use of a system. this is because the level of convenience varies between users. each user will feel the difference in manual work with system assistance which impacts on their level of understanding of a system. the final construct is ease of use associated with innovation and development of a technology or system. this causes a different experience when a system is experiencing development or innovation. furthermore, users will feel whether the developed system is better used or not. social influence (si) as a third variable is defined as how other people influence the use of a system [21]. this shows that the role of other people influences the user to use a system or not. this variable has three main constructs which are subjective norms, social factors, and views. subjective norms mean the user's perception of someone who is important to him will think that the user must use a certain system. the second construct is social factors related to the social environment. this means that the social environment will influence someone to use a certain system. 86 bulletin of social informatics theory and application issn 2614-0047 vol. 4, no. 2, september 2020, pp. 83-90 dwiyanto et.al (indonesian online learning system evaluation framework based on utaut 2.0) the last construct is the view or impact of using the system on one's views. this is related to the use of a system that can increase the view of a person's social status. next, the fourth variable is a facilitating condition (fc). it is defined as organizational and technical infrastructure will affecting and supporting a system [22]. this variable has three main construct [7]. the first construct is the perception of behavioral control that reflects internal and external perceptions including the condition of facilities, resources, and technological facilities. the second construct is a facilitating condition related to the environment that supports the use of a system both from the system itself and from others. the final construct is compatibility which is related to the consistency of innovation against the value, needs and user experience. in the fifth variable there is a hedonic motivation (hm). hedonic motivation is a pleasure thing from using technology or systems. this will be an experience and an important factor for users in using this technology [23]. if the user experience is pleasant, then users will tend to use the technology. this will affect the acceptance level and use of a technology or system. the sixth variable is a price value (pv). from the consumer side, the price value is related to the costs required to use a system or technology [24]. this is related to the feasibility of a system for the costs incurred to access it. but, this does not apply if the system or technology used is free or open source. this factor also affects the user in the intention to use a system. in the seventh variable, there is a habit (h). this is related to the pattern of using the system in their daily life. in other words, this familiarity is a factor in using a system [25]. the more accustomed to users using a system, the impact on their daily work. interest or behavioral intention (bi) as an eighth variable can be interpreted as a person's level of exploiting a system [7], [26]. the higher the interest and desire in using a system will have an impact on the intensity of its use in that system. this is the dependent variable which is influenced by the previous variables. and the last variable is a use behavior (ub). this is the way and intensity of a person using a system [10]. this is influenced by the factors or independent variables previously described. 3. evaluation of indonesian online learning system the implementation of ict are related to the user acceptance and understanding of technology [27]. it becomes an important factors that affecting the success of technology implementation [27], [28]. the user acceptance is determined by two factors which are (a) user’s perception about technology that will assist their works, and (b) the level of difficulty in using technology. it means that the use of technology should be easy to operate. in a technology usability, there are five aspects to evaluate the system or technology. first aspect is a learnability related to the ease in learning a system. second aspect is a rememberability related to the ease of remember to operate the system. third aspect is an efficiency of use the system. fourth aspect is a reability in use means that system should reduce the human error in their works. and the fifth aspect is a user satisfaction when using a system. as we mention before, this study proposes an evaluation for indonesian online learning system (spada) for teacher profession education program (ppg). in its application, spada has a several features to support an online learning. these features such as learning content, discussions, course tools and so on. fig. 3 show the preview of course overview in spada web page. moreover, the next sub-section will discussed an evaluation design for spada. issn 2614-0047 bulletin of social informatics theory and application 87 vol. 4, no. 2, september 2020, pp. 83-90 dwiyanto et.al (indonesian online learning system evaluation framework based on utaut 2.0) fig. 3. preview of spada overview page 3.1. evaluation model this study uses a quantitative approach with the utaut2 model for evaluating the spada. in its implementation, there are several variables tested according to the utaut2 model. however, not all variables are tested because they will be adjusted to the needs and conditions of system use. fig. 4 shows the model used in this study and adopted from the utaut2 model. based on fig. 4, there are several differences from the utaut2 model. the first difference is that from the independent variable there is no price value variable. this is because in using the spada users do not need to pay extra for accessing it. the use of this learning system is an integral part of the ppg program. then the moderating variable such as age, gender, and experience also not measured because it does not directly affect the dependent variable. therefore, further research can be done to discuss a moderating variables in utaut2. fig. 4. evaluation model adopted from utaut2 88 bulletin of social informatics theory and application issn 2614-0047 vol. 4, no. 2, september 2020, pp. 83-90 dwiyanto et.al (indonesian online learning system evaluation framework based on utaut 2.0) 3.2. evaluation design a quantitative approach is used to analyze data using numerical data and processed by statistical analysis methods. after the data is processed, the results will be described and conclusions based on the statistical analysis. the data collection method used in this study is to collect information from the sample using a questionnaire. meanwhile, the data analysis used is path analysis [29], [30]. path analysis is a form of multiple regression statistical analysis used to evaluate causal models by examining the relationship between the dependent variable and two or more independent variables [31]. moreover, fig. 5 illustrates the evaluation design in this study. fig. 5. evaluation design the population is selected for participants who finished the online learning stage through the system to be tested. then, a purposive sampling technique is used with the selection of a group of subjects based on certain considerations. the number of samples with an error rate of 5% by looking at the table for determining the number of samples. the next important thing is the evaluation instrument to measure and analyze a data. a questionnaire is used as an evaluation instrument that would be distributed to the research sample. the questionnaire contains questions arranged based on the adoption of the utaut2 model. the questions are structured by adjusting the variables used only in this study. table 1 describes the indicators of the variables in this research model. furthermore, the weighting uses a likert scale in the questionnaire using five answer choices consisting of strongly disagree (1), disagree (2), neutral (3), agree (4) and strongly agree (5). table.1 indicator of each variable variable code indicator of the variable performance expectancy pe1 perceived usefulness pe2 extrinsic motivation pe3 job-fit pe4 relative advantage effort expectancy ee1 perceived ease of use ee2 complexity ee3 ease of use social influence si1 subjective norm si2 social factor si3 image facilitating conditions fc1 perceived behavioral control fc2 facilitating conditions fc3 compatibility hedonic motivation hm1 repurchase intentions hm2 positive word-of-mouth communication hm3 service quality habit ht1 fun ht2 entertain ht3 interest behavioral intention bi1 quality bi2 price bi3 value use behavior ub1 prior use ub2 addiction ub3 behavior to be automatic issn 2614-0047 bulletin of social informatics theory and application 89 vol. 4, no. 2, september 2020, pp. 83-90 dwiyanto et.al (indonesian online learning system evaluation framework based on utaut 2.0) based on table 1, it can be seen that there are several indicators from each variable. these indicators are the basis for making the questionnaire questions to be tested. each indicator can be broken down into several questions that refer to that topic. an example of the question such as “using the system in my job would enable me to accomplish tasks more quickly” for pe1; “it is easy for me to learn operating the system” for ee1; and “i use the system because of the coworkers who use the system” for si1. the question is adjusted to the intent of each indicator. after collecting the data, in the last stage the data will be processed using statistical techniques. the analysis used is path analysis, wherein the results of the analysis will be described. then, based on the results, a conclusion and suggestions can be used as a reference for system development. 4. conclusion this paper proposed an evaluation model for indonesian online learning system (spada). it is used for accommodate online learning of teacher profession education program (ppg). the evaluation is to discover user acceptance and understanding of technology. it becomes an important factors that affecting the success of technology implementation. the user acceptance is determined by two factors which are (a) user’s perception about technology that will assist their works, and (b) the level of difficulty in using technology. the evaluation is adopted from utaut2 as technology acceptance model to explain user intentions to use an information system and usage behavior. by evaluating the system it is expected the system can be improved better. furthermore, it is necessary to implement this evaluation model to get the expected results. also, this study also can be as reference to conduct similar study related to the use of information system. references [1] a. bertram and b. waldrip, “ict for ict’s sake: secondary teachers’ views on technology as a tool for teaching and learning,” aust. educ. comput., vol. 28, no. 1, 2013. [2] h. elmunsyah, “a national education policy-based ict model for indonesian vocation1al high schools (vhs),” glob. j. eng. educ., vol. 16, no. 3, pp. 136–140, 2014. [3] t. teo, technology acceptance in education. aw rotterdam: sense publishers, 2011. [4] d. xu and s. s. jaggars, “the impact of online learning on students’ course outcomes: evidence from a large community and technical college system,” econ. educ. rev., vol. 37, pp. 46–57, 2013. [5] t. nguyen, “the effectiveness of online learning: beyond no significant difference and future horizons,” merlot j. online learn. teach., vol. 11, no. 2, pp. 309–319, 2015. [6] m. i. mustofa, m. chodzirin, and l. sayekti, “formulasi model perkuliahan daring sebagai upaya menekan disparitas kualitas perguruan tinggi (studi terhadap website pditt.belajar.kemdikbud.go.id),” walisongo j. inf. technol., vol. 1, no. 2, pp. 151–160, 2019. [7] v. venkatesh, m. g. morris, g. b. davis, and f. d. davis, “user acceptance of information technology: toward a unified view,” mis q., vol. 27, no. 3, pp. 425–478, 2003. [8] v. venkatesh, j. y. l. thong, and x. xu, “consumer acceptance and use of information technology: extending the unified theoryof acceptance and use of technology,” mis q., vol. 36, no. 1, pp. 157–178, 2012. [9] b. bervell and i. n. umar, “validation of the utaut model: re-considering non-linear relationships of exogeneous variables in higher education technology acceptance research,” eurasia j. math. sci. technol. educ., vol. 13, no. 10, pp. 6471–6490, 2017. [10] s. a. salloum and k. shaalan, “factors affecting students’ acceptance of e-learning system in higher education using utaut and structural equation modeling approaches,” in international conference on advanced intelligent systems and informatics, 2018, pp. 469–480. [11] r. bendi and s. andayani, “penerapan model utaut untuk memahami perilaku pengguna sistem informasi akademik,” j. hoaq teknol. inf., vol. 2, no. 1, pp. 144–151, 2013. [12] n. ain, k. kaur, and m. waheed, “the influence of learning value on learning management system use: an extension of utaut2,” inf. dev., vol. 32, no. 5, pp. 1306–1321, 2016. 90 bulletin of social informatics theory and application issn 2614-0047 vol. 4, no. 2, september 2020, pp. 83-90 dwiyanto et.al (indonesian online learning system evaluation framework based on utaut 2.0) [13] m. el-masri and a. tarhini, “factors affecting the adoption of e-learning systems in qatar and usa: extending the unified theory of acceptance and use of technology 2 (utaut2),” educ. technol. res. dev., vol. 65, no. 3, pp. 743–763, 2017. [14] s. yang, “understanding undergraduate students’ adoption of mobile learning model: a perspective of the extended utaut2,” j. converg. inf. technol., vol. 8, no. 10, p. 969, 2013. [15] v. venkatesh, j. y. thong, and x. xu, “unified theory of acceptance and use of technology: a synthesis and the road ahead,” j. assoc. inf. syst., vol. 17, no. 5, pp. 328–376, 2016. [16] y. k. dwivedi, n. p. rana, a. jeyaraj, m. clement, and m. d. williams, “re-examining the unified theory of acceptance and use of technology (utaut): towards a revised theoretical model,” inf. syst. front., vol. 21, no. 3, pp. 719–734, 2019. [17] o. oechslein, m. fleischmann, and t. hess, “an application of utaut2 on social recommender systems: incorporating social information for performance expectancy,” in 47th hawaii international conference on system sciences, 2014, pp. 3297–3306. [18] v. venkatesh, m. g. morris, g. b. davis, and f. d. davis, “user acceptance of information technology: toward a unified view,” j. chem. inf. model., vol. 27, no. 3, pp. 425–478, 2013. [19] a. a. alalwan, y. k. dwivedi, and n. p. rana, “factors influencing adoption of mobile banking by jordanian bank customers: extending utaut2 with trust,” int. j. inf. manage., vol. 37, no. 3, pp. 99– 110, 2017. [20] a. m. elkaseh, k. w. wong, and c. c. fung, “perceived ease of use and perceived usefulness of social media for e-learning in libyan higher education: a structural equation modeling analysis,” int. j. inf. educ. technol., vol. 6, no. 3, p. 192, 2016. [21] h. khechine and m. augier, “adoption of a social learning platform in higher education: an extended utaut model implementation,” in proceedings of the 52nd hawaii international conference on system sciences, 2019. [22] m. kuciapski, “students acceptance of m-learning for higher education–utaut model validation,” in eurosymposium on systems analysis and design, 2016, pp. 155–166. [23] h. khechine, b. raymond, and m. augier, “the adoption of a social learning system: intrinsic value in the utaut model,” br. j. educ. technol., 2020. [24] s. hu, k. laxman, and k. lee, “exploring factors affecting academics’ adoption of emerging mobile technologies-an extended utaut perspective,” educ. inf. technol., pp. 1–21, 2020. [25] d. chávez herting, r. cladellas pros, and a. castelló tarrida, “habit and social influence as determinants of powerpoint use in higher education: a study from a technology acceptance approach,” interact. learn. environ., pp. 1–17, 2020. [26] c. m. chao, “factors determining the behavioral intention to use mobile learning: an application and extension of the utaut model,” front. psychol., vol. 10, p. 1652, 2019. [27] r. rauniar, g. rawski, j. yang, and b. johnson, “technology acceptance model (tam) and social media usage: an empirical study on facebook,” j. enterp. inf. manag., vol. 27, no. 1, pp. 6–30, 2014. [28] i. i. ushatikova, a. r. rakhmanova, v. s. kireev, a. o. chernykh, and m. a. ivanov, “pedagogical bases of formation of key information technology competencies polytechnic institute graduates,” int. j. econ. financ. issues, vol. 6, no. 2, pp. 283–289, 2016. [29] t. thomas, l. singh, and k. gaffar, “the utility of the utaut model in explaining mobile learning adoption in higher education in guyana,” int. j. educ. dev. using ict, vol. 9, no. 3, 2013. [30] s. saxena and m. janssen, “examining open government data (ogd) usage in india through utaut framework,” foresight, vol. 19, no. 4, 2017. [31] j. w. creswell, research design: qualitative, quantitative, and mixed methods approaches. sage publication, 2013. bulletin of social informatics theory and application issn 2614-0047 vol. 5, no. 1, march 2021, pp. 58-62 58 https:doi.org/10.31763/businta.v5i1.433 social media learning on indonesian university students s. bekti istiyanto a,1,*, mochammad bagus priyantono b,2, muhammad abdul faiz rifai b,3, kartika wahyuningsih b,4, dzanun fansyiari b,5, lalu gilang obidia ramdhani b,6 a universitas jenderal soedirman, purwokerto, indonesia b universitas negeri malang, malang, indonesia 1bektiis@yahoo.com*, 2baguspriyantono.1805356@students.um.ac.id, 3faizrifaii.1805356@students.um.ac.id, 4kartikawahyu.1805356@students.um.ac.id, 5dzannun.fansyiari.1905357@students.um.ac.id, 6l.gilang.1805356@students.um.ac.id * corresponding author 1. introduction covid-19 certainly has a significant impact on various areas of life [1]. this disease is to prevent transmission, such as social distancing and stay at home [2], is the implementation of a policy to keep a distance not to create a crowd of people. maintaining this distance aims to minimize the spread of covid-19 in the community [3]. universities, of course, have provided an alternative during the covid19 pandemic period by implementing online learning. the internet network can utilize the utilization of online distance learning innovations. online media can make it easier for students and lecturers to carry out lectures in different locations [4]. universities, of course, have provided an alternative during the covid19 pandemic period by implementing online learning. the utilization of online distance learning innovations is using the internet network. online media can make it easier for students and lecturers to carry out lectures in different locations [5]. one of the potential online media is social media. social media is a web-based tool that individuals can build social systems or social relationships with others who share an individual interface or real-life career, activity, background, or association [6]. in addition, kaplan explained that social media could be a collection of web-based applications built on a system with innovations that allow creating and exchanging user-generated substances [7]. based on records, in january 2019 of 7.7 billion people in the world. there are 3.39 billion actives on social media [8]. social media is famous for product advertising in america and japan, and research is in second place [9]. in addition, in the field of education. social media has been widely used for learning. some universities in india use social media in their learning methods [10]. furthermore, there are several favorite social media in its use at the university of houston in texas. the top three most popular social media are facebook, wiki, and youtube [11]. thus, facebook is the most widely used social media in the field of learning so with this of course each social media has its characteristics in its use. the characteristics of each social media can undoubtedly affect the use of social media. one way to determine the size of the characteristics on social media is to use the eucs method. this method a r t i c l e i n f o a b s t r a c t article history received january 3, 2021 revised february 1, 2021 accepted february 13, 2021 this study aims to compare social media as appropriate learning media for university students at universitas negeri malang in the era of the covid-19 pandemic. the method used in this study is eucs (end-user computing satisfaction) with a sample of 100 people. this study indicates that the googleclassroom media is more in demand as a learning medium in terms of satisfaction by um students. all the variable values are superior to the other two social media, namely facebook and schoology. this is an open access article under the cc–by-sa license. keywords social media university students eucs learning http://creativecommons.org/licenses/by-sa/4.0/ http://creativecommons.org/licenses/by-sa/4.0/ issn 2614-0047 bulletin of social informatics theory and application 59 vol. 5, no. 1, march 2021, pp. 58-62 istiyanto et.al (social media learning on indonesian university students) can indicate user satisfaction with the technology perspective based on the dimensions of content, accuracy, format, ease of use of the system, and timeliness [12]. in addition, yasoa supports the eucs doll and torkzadeh models, including two new factors, namely satisfaction with system speed and system reliability, where the overall results support all hypotheses related to factors contributing to eucs. [13]. rino explained in his research that the eucs method is considered successful in knowing the factors that affect users' satisfaction of the dukcapil application (dukcapil in handheld) in surakarta regency [14]. the eucs method can be used to determine the characteristics of the media through a measure of user satisfaction in its use. based on the description of the problem and previous research above, it encourages the author to research the analysis of satisfaction with the use of social media for learning in students in the covid-19 pandemic era by using the eucs method in determining the size of student satisfaction. 2. method this study aims to compare the use of social media in learning among um students in the era of the covid pandemic. this study uses the eucs method to determine the results of the problems that illustrates through research model in fig. 1. end-user computing satisfaction (eucs) is a method to measure the level of user satisfaction of an application system by comparing the expectations and reality of an information system. understanding end-user computing satisfaction of an information system is an overall evaluation of users of information systems based on their experience in using the system [15]. fig. 1. research model the population in this study is the object of research that can relate to the object to be studied [16]. the sample is determined using the slovin equation, which allows an analyst to sample the population with the desired level of precision [17]. so that from 33,700 populations, 100 samples were obtained with an error rate of 10%. this study also uses a likert scale to get answers to the value of a sample. the likert scale has five alternative answer values: strongly disagree, disagree, neutral, agree, and strongly agree. 3. results and discussion at this stage, a comparison of the use of social media in learning for um students is discussed. several variables include content, accuracy, format, ease of use, content, and timeliness. user satisfaction is usually a critical figure to win benefits. in this case, user satisfaction is a person's perceived acknowledgment of the benefits provided by social media [18]. user satisfaction is one of the crucial indicators in the end user computing satisfaction (eucs) model because it relates to the goals of academic processes and global activities, up to date and accurate to users, especially students [19]. this stage will display the results that have been obtained and processed. this study compares three social media, namely facebook, classroom, and schoology, using the eucs method. 60 bulletin of social informatics theory and application issn 2614-0047 vol. 5, no. 1, march 2021, pp. 58-62 istiyanto et.al (social media learning on indonesian university students) table.1 result of facebook variable content accuracy format ease to use timeliness question 1 2 1 2 1 2 1 2 1 2 the result 64.4% 68.2% 62.5% 61.2% 62.4% 55.6 66.8% 72.6% 58.2% 61.2% the final result 66.3% 61.85% 59% 69.7% 59.7% the results found that the variable that has the highest value on facebook is the ease to use a variable, which is 69.7%, and the lowest value is the format variable, which is 59%, while the content variable has a value of 66.3%, accuracy has a value of 61.85% and timeliness 59.7. %, this shows that based on the data obtained above, it is known that facebook as a learning medium is still considered less than optimal by um students. in contrast, 81.9% of students at griffith university consider facebook a perfect learning medium [20]. on the other hand, facebook also has its interest in its use in learning media and research conducted by mauro, which states that facebook in brazil seems to have privileges, preoccupations, and motivates intentions for other social needs [21]. table.2 result of classroom variable content accuracy format ease to use timeliness question 1 2 1 2 1 2 1 2 1 2 the result 64.4% 68.2% 62.5% 61.2% 62.4% 55.6 66.8% 72.6% 58.2% 61.2% the final result 66.3% 61.85% 59% 69.7% 59.7% the classroom research obtained 76.3% for the content variable, 71% accuracy variable, 75% format variable, 79% from ease to use a variable, and 78.7% from timeliness variable. in addition, the ease to use variable obtained the highest value, which was 84.9%. in this case, it means that the class has good content in the learning process, is in line with research that says that students find innovative and creative activities in google classroom that the teacher adequately instructs, and also they can participate in more interactive activities in classrooms than usual. similarly, in studying content, students strongly agree that they can easily understand concepts and turn in assignments on time, unlike in the general class [22]. in addition, the quality of the learning management system (lms) media is represented by usefulness and informativeness, and the quality of lecture materials is represented by learning content [23]. table.3 result of schoology variable content accuracy format ease to use timeliness question 1 2 1 2 1 2 1 2 1 2 the result 72.3% 82.3% 70.1% 68.9% 71.1% 73.5% 82.9% 71.9% 75.7% 72.8% the final result 69.5% 77.3% 72.3% 77.4% 74.25% the schoology research obtained a value of 69.5% for the content variable, 77.3% accuracy variable, 72.3% format variable, 77.4% from ease to use a variable, and 74.25% from timeliness variable. schoology has the highest value on the ease of using a variable. as a learning medium, schoology makes learning more accessible, personalized and provides students with a richer educational experience. at the same time, the potential of schoology itself includes ease of use, security for student safety, and efficient tools and resources for teachers. schoology can help teachers find out the progress of students' learning in writing skills [24]. in addition, beautiful in his research stated that the use of schoology had a positive impact on student learning at lakidende university and gave a positive response to schoology. positive responses can also be identified from the interaction between lecturers and students in the schoology class. the students feel more excited and enthusiastic. [25]. the classroom media ranks first between facebook and schoology based on the satisfaction of the five variables filled in by um students. the schoology platform occupies the second-order, and issn 2614-0047 bulletin of social informatics theory and application 61 vol. 5, no. 1, march 2021, pp. 58-62 istiyanto et.al (social media learning on indonesian university students) facebook occupies the third. google classroom outperforms both social media as a learning medium during this pandemic. however, it is different from what was revealed by tyler in his research that southern alberta institute of technology (sait) students use facebook more, followed by youtube in the second position [26]. however, in his research, nurul revealed something similar to the research conducted by tyler, that facebook supports the learning process and improves student achievement [27]. based on the results and several explanations related to previous research, it can be seen that the use of social media as a learning medium is different in each region. in addition, the use of media is also based on the needs of an educational environment. in line with this, sheldon mentions that culture influences everything from attitudes to motivations to needs and responses to social media [28]. the use of the eucs involves many measurements so that the method can be used as a decision-maker [29]. 4. conclusion based on the results and discussions obtained previously, it was found that google classroom was in the first position, schoology was in the second position, and facebook was in the third position based on data from student satisfaction as measured by the eucs method. the um students gave the highest rating on google classroom as a learning media platform during this pandemic since it is easy to use, has a good format, appropriate accuracy, and content suitable for learning to effectively timeliness. in addition, based on several previous studies, it is also known that the culture in each region also affects the use of learning media on social media. references [1] z. z. a. thaariq, “the use of social media as learning resources to support the new normal,” teknodika, vol. 18, no. 2, pp. 80–93, 2020. [2] k.-h. park, a.-r. kim, m.-a. yang, s.-j. lim, and j.-h. park, “impact of the covid-19 pandemic on the lifestyle, mental health, and quality of life of adults in south korea,” plos one, vol. 16, no. 2, p. e0247970, feb. 2021. [3] a. abidah, h. n. hidaayatullaah, r. m. simamora, d. fehabutar, and l. mutakinati, “the impact of covid-19 to indonesian education and its relation to the philosophy of ‘merdeka belajar,’” stud. philos. sci. educ., vol. 1, no. 1, pp. 38–49, apr. 2020. [4] j. jakhar and p. kharya, “social distancing and promoting psychological well being during covid-19 pandemic,” int. j. soc. psychiatry, p. 002076402096813, oct. 2020. [5] a. alchamdani, f. fatmasari, e. rahmadani anugrah, n. putri sari, f. putri, and a. astina, “the impact of covid19 pandemic on online learning process in the college at southeast sulawesi,” j. kesehat. lingkung., vol. 12, no. 1si, p. 129, sep. 2020. [6] w. akram and r. kumar, “a study on positive and negative effects of social media on society,” int. j. comput. sci. eng., vol. 5, no. 10, pp. 351–354, oct. 2017. [7] a. m. kaplan and m. haenlein, “users of the world, unite! the challenges and opportunities of social media,” bus. horiz., vol. 53, no. 1, pp. 59–68, 2010. [8] s. kemp, “digital 2020: october global statshor,” datareportal, 2020. [online]. available: https://datareportal.com/reports/digital-2020-october-global-statshot. [accessed: 22-dec-2020]. [9] l. m. kruse, d. r. norris, and j. r. flinchum, “social media as a public sphere? politics on social media,” sociol. q., vol. 59, no. 1, pp. 62–84, jan. 2018. [10] j. bharucha, “exploring education-related use of social media: business students perspectives in a changing india,” educ. + train., vol. 60, no. 2, pp. 198–212, jan. 2018. [11] y. liu, “social media tools as a learning resource,” j. educ. technol. dev. exch., vol. 3, no. 1, jun. 2010. [12] s. t. satyawati, “student satisfaction towards the use of f-learn services in online learning,” j. pendidik. dan pengajaran, vol. 53, no. 3, p. 295, sep. 2020. 62 bulletin of social informatics theory and application issn 2614-0047 vol. 5, no. 1, march 2021, pp. 58-62 istiyanto et.al (social media learning on indonesian university students) [13] a. ilias, m. z. abd razak, r. a. rahman, and m. r. yasoa, “end-user computing satisfaction (eucs) in computerised accounting system (cas): which the critical factors? a case in malaysia,” comput. inf. sci., vol. 2, no. 1, pp. 18–24, 2009. [14] a. b. darmawan and r. a. nugroho, “factors that affect user satisfaction of dukcapil application (dukcapil dalam genggaman) in surakarta regency,” jakpp (jurnal anal. kebijak. pelayanan publik), vol. 6, no. 2, pp. 154–175, dec. 2020. [15] m. s. abdullah and m. toycan, “analysis of the factors for the successful e-learning services adoption from education providers’ and students’ perspectives: a case study of private universities in northern iraq,” eurasia j. math. sci. technol. educ., vol. 14, no. 3, dec. 2017. [16] m. azwar, i. surandari, and h. i. djohar, “evaluating the library website of the indonesian ministry of education and culture through the end-user computing satisfaction (eucs) model,” libr. philos. pract., 2020. [17] l. rono, “microcredit and its relationship to the growth of small and medium enterprises in konoin subcounty, kenya.,” int. j. adv. res., vol. 6, no. 4, pp. 961–968, apr. 2018. [18] m. b. winanti and i. pangaribuan, “role of website intranet portal quality analysis on user satisfaction at pt. xyz,” in international conference on business economics, social sciences & humanities, 2020. [19] w. a. putera and i. m. candiasa, “analysis of e-learning user satisfaction itb stikom bali using end user computing satisfaction (eucs) method,” j. phys. conf. ser., vol. 1810, no. 1, p. 012017, mar. 2021. [20] c. irwin, l. ball, b. desbrow, and m. leveritt, “students’ perceptions of using facebook as an interactive learning resource at university,” australas. j. educ. technol., vol. 28, no. 7, aug. 2012. [21] m. j. de oliveira and m. k. z. huertas, “does life satisfaction influence the intention (we-intention) to use facebook?,” comput. human behav., vol. 50, pp. 205–210, sep. 2015. [22] c. y. r. loh and t. c. teo, “understanding asian students learning styles, cultural influence and learning strategies,” j. educ. soc. policy, vol. 7, no. 1, pp. 194–210, 2017. [23] t. theresiawati, h. b. seta, a. n. hidayanto, and z. abidin, “variables affecting e-learning services quality in indonesian higher education: students’ perspectives,” j. inf. technol. educ. res., vol. 19, pp. 259–286, 2020. [24] a. apriliani, “the effect of schoology on the students’ writing interest,” ijee (indonesian j. english educ., vol. 7, no. 2, pp. 111–129, dec. 2020. [25] a. n. rama and i. wahyudi, “the use of schoology to enhance students’ reading comprehension at lakidende university,” cetta j. ilmu pendidik., vol. 2, no. 3, pp. 439–448, 2019. [26] t. w. nagel, c. remillard, r. aucoin, and a. takenishi, “findings on student use of social media at the collegiate, undergraduate, and graduate levels: implications for post-secondary educators,” j. univ. teach. learn. pract., vol. 15, no. 1, 2018. [27] n. f. jumaat, n. ahmad, n. abu samah, z. m. ashari, d. f. ali, and a. h. abdullah, “facebook as a platform of social interactions for meaningful learning,” int. j. emerg. technol. learn., vol. 14, no. 4, 2019. [28] d. a. alsaleh, m. t. elliott, f. q. fu, and r. thakur, “cross-cultural differences in the adoption of social media,” j. res. interact. mark., vol. 13, no. 1, pp. 119–140, mar. 2019. [29] r. s. m. siregar, “comparison study of performance analysis of information system using the methods of end-user computing satisfaction and it balance score card,” jaict, vol. 3, no. 2, oct. 2018. bulletin of social informatics theory and application issn 2614-0047 vol. 1, no. 1, march 2017, pp. 26-33 26 https://doi.org/10.31763/businta.v1i1.36 recommendation system for web article based on association rules and topic modelling guntur budi herwanto a,1,*, annisa maulida ningtyas b,2 a departement of computer science and electrical gadjah mada university, yogyakarta, indonesia b departement of computer and informatics engineering, jakarta state polytechnic, depok, indonesia 1 gunturbudi@ugm.ac.id *; 2 annisa.m.n@gmail.com * corresponding author 1. introduction currently, the world wide web (www) becomes a knowledge base for numerous information around the world. a lot of industry starts to utilize the benefit of the world wide web, including tourism industry. gretzel said that the internet is the primary source of information in the domain of tourism [1]. with the increasing information of the tourism destination on the internet, the traveler is no longer dependent on travel agents [2]. the tourists prefer to seek information over the internet, even its an itinerary or individual reviews of each place. however, the internet can be overwhelming for the novice traveler due to various sources of information. the information that comes out is often not quite what they want. recommendation system can be a tool to resolve the issue and also provide useful information to help the user to make his choice [3]. to be able to make a good recommendation, the system should be able to identify the user interests based on other users who have the same preferences [4]. the analysis of the browsing pattern of users can provide valuable information to the website owner. such analysis can be done by applying data mining technique into web data. web mining is referred to as the application of data mining technique to the web data [5]. web mining classified into three categories, namely the web usage mining, we content mining, and web structure mining [6]. web usage mining is a process of picking up information from the user how to use websites [7]. the objective is to capture, model, and analyze the behavioral patterns and profiles of users interacting with a website [8]. one way to achieve this goal is by using association rule mining. web usage association rule mining has long been a traditional data mining method for automatic extraction of potentially interesting information about the behavior of the website visitors from the web usage log files [9]. the most commonly used algorithms for association mining are a r t i c l e i n f o a b s t r a c t article history received december 14, 2016 revised january 10, 2017 accepted february 1, 2017 the world wide web is now the primary source for information discovery. a user visits websites that provide information and browse on the particular information in accordance with their topic interest. through the navigational process, visitors often had to jump over the menu to find the right content. recommendation system can help the visitors to find the right content immediately. in this study, we propose a two-level recommendation system, based on association rule and topic similarity. we generate association rule by applying apriori algorithm. the dataset for association rule mining is a session of topics that made by combining the result of sessionization and topic modeling. on the other hand, the topic similarity made by comparing the topic proportion of web article. this topic proportion inferred from the latent dirichlet allocation (lda). the results show that in our dataset there are not many interesting topic relations in one session. this result can be resolved, by utilizing the second level of recommendation by looking into the article that has the similar topic. this is an open access article under the cc–by-sa license. keywords apriori association rule lda recommendation topic modelling http://creativecommons.org/licenses/by-sa/4.0/ http://creativecommons.org/licenses/by-sa/4.0/ issn 2614-0047 bulletin of social informatics theory and application 27 vol. 1, no. 1, march 2017, pp. 26-33 herwanto and ningtyas (recommendation system for web article based on association rules and topic modelling) apriori [10]. while this algorithm can discover meaningful association pattern, the problem of too much execution time and generating too many items due to url variation exists [11]. this issue can be resolved by utilizing content information from the web content mining process. web content mining is a process of picking up information from texts, images, and other contents [7]. mostly, web content can be seen as a text data or documents. several analysis such as topic modeling can reveal the theme from the documents [12]. thematic information obtained from the content may also increase the understanding of the pattern generated from the web usage mining [13]. in this study, we propose two-level recommendation, using association rule mining and topic modelling. we also aimed to prevent the twin problems that exists in apriori by reducing the variations of itemset by utilizing topic modeling. itemset that usually formed as a set of url changed to become a set of the topic. in addition to reducing generated association rule, this combination can make the rule more meaningful because of thematic information that contained in the rule. this paper is organized into 5 sections. section 1 describes the background, current technique, and the case study. section 2 describes the related work of web mining. section 3 describes the proposed system of this study. section 4 show the result and research findings. finally, section 5 summarizes the conclusion. 2. related work the growth of users and contents on the www can be an enormous potential for some website owner, to seek for interesting user behavior in their industry niche including tourism [1]. user behavior can be seen by analyzing the usage data obtained from web server. examination of user actions in interacting with a website can offer insights causing to customization and personalization of a user’s web practice [14]. web usage mining can provide online recommendation effectively [15]. rao propose an architecture for online recommendation in web usage mining system [15]. the author presents the architecture of online recommendation in web usage mining (olrwms) for improving the accuracy of classification by the interaction between classifications, evaluation, and the current user activates and user profile in the online phase of this architecture. another recommendation system proposed by destyaputri [17] used three-level recommendation system based on association rule discovery, news articles in the same category, and similarity between news articles. by combining collaborative filtering approach and content-based filtering, experiment results show that the technique produces reliable news recommendation. association rule mining especially apriori algorithm have been studied to uncover potential user browsing behaviors and creating recommendation [7], [11], [16]. rawat customizes apriori algorithm to become custom-built apriori [7]. the goal is to find effective pattern analysis. the author found that analyzing web logs can not only provide an interesting pattern but also help in creating an adaptive website. more trying to uncover the disadvantages of the apriori algorithm by comparing with another algorithm, the results appear that apriori has more execution time than the other algorithm. lazcoretta analyzes the process of discovering association rules in this kind of big repositories and of transforming them into user-adapted recommendations by the two-step modified apriori technique [11]. the results show that their approach can provide better recommendation services by analyzing the behavior of a single user by all other users of web-based information systems. web log data is the primary source for analyzing user behavior in the web usage mining. such models can be extended by adding web content as a source for analyzing user behavior especially for the website that has an extensive content like news portal. the combination of both sources can make a significant improvement on the recommendation of news articles [17]. semantic analysis [18] or topic modeling [19] often be used to analyze the semantic meaning of the content, so it can be combined with log data to enrich the sense of the pattern. in this research, we aim to combine the association rule mining with topic modeling. we use apriori as the algorithm for association rule mining, and enrich the association rule with latent dirichlet allocation (lda) [12]. apriori allows us to discover the association among user clicks. meanwhile, 28 bulletin of social informatics theory and application issn 2614-0047 vol. 1, no. 1, march 2017, pp. 26-33 herwanto and ningtyas (recommendation system for web article based on association rules and topic modelling) lda makes it possible to identify several topics under what the user clicks. by combining these two, we can produce a good recommendation for the future users. 3. proposed system our recommendation system built consisting offline and online phase. offline phase aims to generate the knowledge base that will be used as the basis for recommendations on the online phase. there are two levels of the knowledge base that will be utilized as the basis for the recommendation. the first one is the association rules and the second is the similarity of content based on topic modeling. fig. 1. offline phase web content and web server logs are the primary sources for this recommendation system. these two sources are used to generate the first knowledge base which is association rules. firstly, web server logs will be transformed into url sessions. then, web contents are processed in topic modeling to find the topic model. the result from both of these sources combined to generate the session topic. each session topics is an item which becomes the input to the association rule mining. the output of the association rule mining is becoming the first knowledge base. the second knowledge base generates purely from the topic similarity of the document inferred by the result of topic modeling. the workflow of these offline process can be seen in fig.1. fig. 2. online phase issn 2614-0047 bulletin of social informatics theory and application 29 vol. 1, no. 1, march 2017, pp. 26-33 herwanto and ningtyas (recommendation system for web article based on association rules and topic modelling) the online phase then uses these knowledge base as the reference for the recommendation. when the user started to navigate the website, a set of topic item are shaped. association rules have the priority for the recommendation. a rule that has the highest support and confidence will become the recommendation. if there are no rules that match, then the similar document based on the topic distribution will be selected as the recommendation. the workflow of these online process can be seen in fig. 2. 3.1. web log data preprocessing the interaction between the users and the website is recorded on a web server logs. this log file has several relevant fields that were used for analysis such as the identity of the user and also the information on the accessed pages. before these log files are ready for analysis, data cleaning is needed. there are four steps involved in the cleaning process. the first is eliminating request with the error status code (4xx and 5xx). the second step is to remove the request on the page that is not related to user activity such requests on images, videos, styles (css), and scripts (javascript). the next step is to eliminate requests on the page that are not directly related to content such as contact page, about, and sitemap. the last step is to eliminate the request made by robots, crawlers, or spiders. after the logs data are cleaned, user and session need to be identified. a user can be recognized by the identical of ip address and user agent [20]. once the user is found, we need to identify the session. the simplest way can be achieved by looking at the timeout. most commercial services using 30 minutes as the default timeout [21]. the output of this process is in the form of a url session length n, and can be represented in definition (1). 𝑆𝑆 = (𝜐𝑠 1 𝜐𝑠 1 … 𝜐𝑠 𝑙 )   where the session ss consist of url that belongs to session s with the length of l. 3.2. topic modelling topic modeling is a statistical method for discovering patterns and themes in the corpus of document [2], [12]. in this study, we used latent dirichlet allocation (lda) that introduced by blei [12]. lda allows us to identify topics in web content. in this research, web content acquired by the web scraping technique recursively to the entire address of the website. this content needs to be transformed into lda corpus. this transformation consists of tokenization, stopword removal and forming into the bag of words. the output of lda is a model that contains the topic with the probability of the word. this model can be used to find the document topic probability vector that represents the distribution of topics from each of the document. document topic probability vector can be described in definition (2). 𝐷𝑇𝑖 = (𝑃𝜐𝑑 𝑇𝜊 , 𝑃𝜐𝑑 𝑇1 , … , 𝑃𝜐𝑑 𝑇𝑘 )   where dti is document topic probability vector is the affinity of topic k on document i. this vector can be used to see the similarity between documents based on topic distribution, and used as a knowledge base for the second recommendation. 3.3. session and topic model combination the output of the sessionization process is a series of url. a url included in the analysis contains an article. in gudegnet, there are more than 9.000 articles with its own topics. in the previous process, we have a document topic probability vector, so that we can get the topic with the highest probability. this one topic then substitutes with the url in session to become a session topic. session topics can be represented as follows. definition (3). 𝑆𝑇𝑆 = (𝑇𝑠 1 𝑇𝑠 2 … 𝑇𝑠 𝐿 )   where the session sts consist of topic that belong to session s with the length of l 30 bulletin of social informatics theory and application issn 2614-0047 vol. 1, no. 1, march 2017, pp. 26-33 herwanto and ningtyas (recommendation system for web article based on association rules and topic modelling) 3.4. association rule mining session topic from (3) contains a list of topic that accessed together in a session. therefore it can show the interest degree of a user on some topic [2]. to uncover the interesting relationship between the topics we used association rule mining. association rule mining is a fundamental data mining task. association rule can be used to find all co-occurrence relationships and web usage patterns [8]. we used the best known association rule mining algorithm which is the apriori algorithm proposed in [11]. this relationship can be expressed into association rules. given i = i1 , i2 ,...., im be a set of items, where each i is session topic (sts ) and i is an item or topics ( ). let t= (t1, t2,…,tn) be a set of transactions or a set of session topics where each session topic is a set of topics such that ti ⊆ i. support and confidence are used as the metrics for the rule. the main purpose of association rule mining is to discover all association rules in t that have support and confidence greater than or equal to the minimum support and minimum confidence given by user [8]. an association rule can be represented as, x →y, where x ⊂ i, y⊂ i, and x ∩ y = ∅. 3.5. recommendation system in the online phase, recommendation system generated based on two level of the knowledge base, association rules and topic similarity. 1) recommendation based on association rules an example of association rules is: culinary → accommodation [support = 20%, confidence = 80%] the rule says that 20% visitors read culinary article and accommodation article in one session, and those who read the culinary article also read accommodation article 80% of the time. the left part of the rule is known as the antecedent, and the right part known as the consequent. these co-occurrence relationship used as a recommendation for the web articles. during user surfing sessions, the system will match the sessions with the antecedent, and if such rule is found then the system will recommends the consequent item. 2) recommendation based on topic similarity it is possible that during the browsing of a user, no session is match the association rule. therefore, it needs a knowledge base that assure recommendations. we used document similarity based on document-topic vector generated in (3). the intuition behind lda is that document is a mixture of multiple topics with different probabilities [12]. given that probabilities vector, we can measure the similarity of documents by using cosine similarity. 4. research findings we have collected a month of user request from gudegnet web server log. it was contained 15.795.173 requests, and by doing data cleaning, we can reduce it into 212.694 requests. then we perform user identification and sessionization and we got 148.666 session with the average length is 1,4 url per session. from the result, we can see that the bounce rate in gudegnet is very high. we decided to remove the session that contains only have one url. after this elimination, we got 30.032 sessions with 3.1 url per session. from the content side, we scraped 12.908 articles from gudegnet, with 10.791 in bahasa indonesia, and 4.893 in english. on each language, we performed topic modeling so we got 2 topic model, with each of the model contain 10 topics. then, we make document topic probability for each article based on particular language. the example of topic model in bahasa indonesia can be seen in table 1. issn 2614-0047 bulletin of social informatics theory and application 31 vol. 1, no. 1, march 2017, pp. 26-33 herwanto and ningtyas (recommendation system for web article based on association rules and topic modelling) table 1. topic model topic words 1 0.022*desa + 0.014*pasar + 0.014*wisata + 0.008*restaurant + 0.008*rw + 0.007*menikmati + 0.006*sekar + 0.006*kerajinan + 0.006*pengunjung + 0.005*lokasi 2 0.015*indonesia + 0.014*mandiri + 0.013*sleman + 0.008*lingkungan + 0.007*kantor + 0.007*buku + 0.007*bantul + 0.007*bank + 0.006*bni + 0.006*perusahaan 3 0.039*atm + 0.025*seni + 0.019*indonesia + 0.018*tunai + 0.016*bca + 0.013*pameran + 0.011*tersedia + 0.011*gallery + 0.010*art + 0.008*karya 4 0.020*buka + 0.019*gudeg + 0.018*ayam + 0.017*warung + 0.016*menu + 0.015*nasi + 0.014*goreng + 0.012*restoran + 0.011*soto + 0.010*pariwisata 5 0.022*candi + 0.020*villa + 0.018*hotel + 0.012*fasilitas + 0.010*uang + 0.009*terletak + 0.009*restoran + 0.009*bangunan + 0.009*museum + 0.006*parkir 6 0.034*tour + 0.030*travel + 0.019*wisata + 0.015*pantai + 0.014*paket + 0.014*borobudur + 0.012*mobil + 0.010*parangtritis + 0.010*jam + 0.010*harga 7 0.036*rt + 0.033*smp + 0.018*negeri + 0.009*bantul + 0.008*harjo + 0.006*jepang + 0.006*cv + 0.006*umbul + 0.005*mangkubumi + 0.005*giwangan 8 0.020*pendidikan + 0.017*rumah + 0.015*pelayanan + 0.012*tk + 0.011*masyarakat + 0.011*sakit + 0.011*daerah + 0.011*kesehatan + 0.009*circle + 0.009*dokter 9 0.015*upacara + 0.014*masjid + 0.011*dusun + 0.009*desa + 0.008*gunungan + 0.007*jawa + 0.007*gunung + 0.007*sultan + 0.006*kyai + 0.006*makam 10 0.079*informasi + 0.054*kota + 0.051*terbaru + 0.029*istimewa + 0.027*kontak + 0.027*perkembangan + 0.026*gudang + 0.026*detail + 0.026*simak + 0.026*tertera we combine url session and topic, to become the session topic. in the session, it is highly possible that a user can access the same topic throughout the navigation. the objectives of this association rule analysis are to seek the different topic that frequently access together. we make a distinct topic selection in every session and eliminate the itemset that only has 1 topic. this process resulted in 7.619 session topic. this would become the input for association rule generation with apriori. we perform apriori with minimum support 0,01 and minimum confidence 0,6. with these parameters, there are 144 frequent itemset and 11 rule. the sample result of the frequent itemset can be seen in the following. the number means the topic number base on table 1. (3, 1, 6), support: 0.025 (10, 1, 6), support: 0.029 (1, 6), support : 0.098 (10, 6), support: 0.103 based on the frequent itemset, the association rules can be generated. the sample of association rule generated can be seen in the following. (1, 8, 3) ⇒ (6) , confidence : 0.698 (10, 8, 6) ⇒ (1) , confidence : 0.699 (1, 7, 3) ⇒ (6) , confidence : 0.734 (10, 1, 8) ⇒ (6) , confidence : 0.744 (10, 1, 3) ⇒ (6), confidence : 0.772. when the user navigate into article with the highest probability of topic is topic 10, the system will give recommendation several article on topic 6. we can see the support for this rule is very low in 1% but the confidence is pretty high in 77%. the second level of recommendation is based on the topic similarity between articles. we infer model from table 1 into all web articles to create a document topic (2). the example of document topic probability can be seen in table 2. table 2. document topic document topic probability pantai drini topic 1*0.0532096046423 + topic 2*0.0457563449665 + topic 3*0.144193425948 + topic 4*0.198742440219 + topic 5*0 + topic 6*0.195690258319 + topic 7*0 + topic 8*0 + topic 9*0.359529963764 + topic 10*0 da transport topic 1*0 + topic 2*0 + topic 3*0 + topic 4*0 + topic 5*0.044931817055 + topic 6*0.71084746703 + topic 7*0.239733171757 + topic 8*0 + topic 9*0 + topic 10*0 gulai kepala ikan pak untung topic 1*0.144676810114 + topic 2*0 + topic 3*0 + topic 4*0.605434609718 + topic 5*0 + topic 6*0 + topic 7*0.122715187125 + topic 8*0.10850285919 + topic 9*0 + topic 10*0 32 bulletin of social informatics theory and application issn 2614-0047 vol. 1, no. 1, march 2017, pp. 26-33 herwanto and ningtyas (recommendation system for web article based on association rules and topic modelling) we can get topic similarity by comparing the probability of each document. the result of the top 3 similar item, based on articles in table 2, can be seen in table 3. table 3. document similarity document similar document similarity pantai drini pantai ngobaran goa rancang kencono pantai sadeng 0.93888807 0.91741419 0.90404648 da transport windu rent car ab yogya transport nusa santana prima tour dan travel 0.99549359 0.99484509 0.9756009 gulai kepala ikan pak untung warung bu ageng lusidus vegetarian keripik belut 0.97529632 0.97240818 0.97150409 when the user navigate into ”pantai drini” , the system will give top 3 recommendation based on the similarity. the recommendation is “pantai ngobaran”, “goa rancang kencono”, and “pantai sadeng” with the similarity over 90%. 5. conclusion in this study, we proposed two level of recommendation based on association rules and topic similarity. we used apriori as the association rule mining algorithm and lda as the topic modeling algorithm. we implement this technique specifically for a website that has much content such as city directory that we used for this study. from the result, we can see that there are only 11 association rules generated with the confidence below 80%. the result says that there are not many associations between different topics. on the other hand, we can get much better results on the second level which is the topic similarity. the top three recommended documents have over 90% similarity. acknowledgment . the authors would like to thank pt citraweb indonesia owner of gudegnet for providing the data and their support. references [1] u. gretzel, “intelligent systems in tourism: a social science perspective,” ann. tour. res., vol. 38, no. 3, pp. 757–779, 2011. [2] o. arbelaitz, i. gurrutxaga, a. lojo, j. muguerza, j. m. pérez, and i. perona, “web usage and content mining to extract knowledge for modelling the users of the bidasoa turismo website and to adapt it,” expert syst. appl., vol. 40, no. 18, pp. 7478–7491, 2013. [3] d. buhalis and r. law, “progress in information technology and tourism management: 20 years on and 10 years after the internet—the state of etourism research,” tour. manag., vol. 29, no. 4, pp. 609–623, 2008. [4] b. pan and d. r. fesenmaier, “travel information search on the internet: a preliminary analysis.” 2003. [5] j. borges and m. levene, “data mining of user navigation patterns,” in international workshop on web usage analysis and user profiling, 1999, pp. 92–112. [6] a. s. lalani, “data mining of web access logs,” royal melbourne institute of technology, 2003. [7] s. s. rawat and l. rajamani, “discovering potential user browsing behaviors using custom-built apriori algorithm,” int. j. comput. sci. inf. technol., vol. 2, no. 4, pp. 28–37, 2010. [8] b. liu, web data mining: exploring hyperlinks, contents, and usage data, second edi. chicago: springer, 2011. issn 2614-0047 bulletin of social informatics theory and application 33 vol. 1, no. 1, march 2017, pp. 26-33 herwanto and ningtyas (recommendation system for web article based on association rules and topic modelling) [9] m. dimitrijevic and z. bosnjak, “pruning statistically insignificant association rules in the presence of high-confidence rules in web usage data,” in 18th international conference on knowledge-based and intelligent information & engineering systems kes2014, 2014, pp. 271–280. [10] r. agrawal and r. srikant, “fast algorithms for mining association rules,” in proc. 20th int. conf. very large data bases, vldb, 1994, pp. 487–499. [11] e. lazcorreta, f. botella, and a. fernández-caballero, “towards personalized recommendation by twostep modified apriori data mining algorithm,” expert syst. appl., vol. 35, no. 3, pp. 1422–1429, 2008. [12] d. m. blei, “probabilistic topic models,” commun. acm, vol. 55, no. 4, pp. 77–84, 2012. [13] o. arbelaitz, i. gurrutxaga, a. lojo, j. muguerza, j. m. pérez, and i. perona, “enhancing a web usage mining based tourism website adaptation with content information,” in kdir, 2012, pp. 287–292. [14] j. vellingiri and s. c. pandian, “a survey on web usage mining,” glob. j. comput. sci. technol., vol. 11, no. 4, pp. 66–72, 2011. [15] t. s. rao, y. ravindra, u. s. kumar, s. sandeep, and k. srikanth, “an effecive framework for identifying personalized web recommender system by applying web usage mining,” int. j. eng. res. appl., vol. 2, no. 3, pp. 307–312, 2012. [16] n. more and n. p. more, “recommendation of books using improved apriori algorithm,” int. j. innov. res. sci. technol, vol. 1, no. 4, pp. 80–82, 2014. [17] h. s. husin, j. a. thom, and x. zhang, “news recommendation based on web usage and web content mining,” in data engineering workshops (icdew), 2013 ieee 29th international conference, 2013, pp. 326–329. [18] d. m. desyaputri, a. erwin, m. galinium, and d. nugrahadi, “news recommendation in indonesian language based on user click behavior,” in information technology and electrical engineering (icitee), 2013, pp. 164–169. [19] n. dave, k. potts, v. dinh, and h. u. asuncion, “combining association mining with topic modeling to discover more file relationships,” int. j. adv. softw., vol. 7, no. 3&4, 2014. [20] v. chitraa and d. a. s. thanamani, “a novel technique for sessions identification in web usage mining preprocessing,” int. j. comput. appl., vol. 34, no. 9, 2011. [21] r. cooley, b. mobasher, and j. srivastava, “data preparation for mining world wide web browsing patterns,” knowl. inf. syst., vol. 1, no. 1, pp. 5–32, 1999. bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 1, march 2022, pp. 7-12 7 https:doi.org/10.31763/businta.v6i1.424 social media and online prostitution industries khafit badrus zaman a,1, mohammad iqbal firman ardiansyah a,2, muhammad busthomi arviansyah a,3,* muhammad ferdyan syach a,4, naziro a,5, aji prasetya wibawa a,6 a universitas negeri malang, malang, indonesia 1 khafitbadruszaman1805356@students.um.ac.id; 2 iqbalardiansyah.1805356@students.um.ac.id; 3 muhammad.busthomi.1805356@students.um.ac.id ; 4 muhammad.ferdyan.1805356@students.um.ac.id; 5 naziro.1805356@students.um.ac.id; 6 aji.prasetya.ft@um.ac.id * corresponding author 1. introduction prostitution is a form of the sexual transaction [1]. etymologically, according to the cambridge dictionary, prostitution is a form of business having sex for money. meanwhile, ivan bloch interpreted prostitution as "a form of sexual intercourse outside of marriage with a certain pattern, namely to anyone openly and almost always with payment, either by marriage or other sexual activities that give the satisfaction desired by the person concerned" [2] . the understanding and the strict line about prostitution is that in every act of prostitution, there is always an element of exchange of sexual relations for certain benefits, which are carried out as a trade transaction. the existence of rapid advancement of technology affects the development of prostitution marketing, which is becoming known as online prostitution [3]. the touch of the internet may spread the existence of online prostitution. online prostitution is a term for prostitution activities carried out or promoted via the internet [4]. one of the internet media that is often used is social media. by using social media, sex workers can efficiently promote themselves. before using social media, they used sms to promote themselves. however, social media can reduce the money they need to spend. facebook, twitter, grindr, and other social media are often used to promote because many people can see in one time upload [5]. in addition, whatever the uploaded information can be viewed at any time. so, there is no need to publish new information to attract new customers. through social media, sex workers do not need to stay at a specific location to get customers [6]. they can proceed with the transactions anywhere and anytime. the transaction occurs through private messages or private numbers deliberately distributed. when the transaction has been accepted, they hold a meeting outside the brothel. thus, online prostitution may generate a bunch of benefits for prostitutes. this paper aims to explore the worldwide development of online prostitution. in the exploration, data, and information sources are taken from the english news circulating on the internet for the last ten years (2011-2021). this paper is organized as follows. section 2 describes the development of a r t i c l e i n f o a b s t r a c t article history received december 19, 2021 revised january 21, 2022 accepted february 2, 2022 online prostitution continuously increases along with the development of technology and information. this study aims to observe the development of prostitution globally, including the developed and developing countries. this research was conducted by collecting world data news about online prostitution in the last ten years (2011-2021). most of the motives for online prostitution are economic factors. several online prostitution cases involved minors. online prostitution cases in developed and developing countries occur on social media platforms such as wechat, line, michat, and facebook. in the discussion chapter, the writers provide suggestions to minimize the cases of online prostitution. one of them is making regulations to govern the use of social media. this is an open access article under the cc–by-sa license. keywords prostitution online prostitution social media developed country developing country mailto:muhammad.busthomi.1805356@students.um.ac.id mailto:naziro.1805356@students.um.ac.id http://creativecommons.org/licenses/by-sa/4.0/ http://creativecommons.org/licenses/by-sa/4.0/ 8 bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 1, march 2022, pp. 7-12 zaman et.al (social media and online prostitution industries) online prostitution in developing countries. section 3 describes online prostitution in developed countries. section 4 describes the discussion. finally, section 5 presents our conclusion. 2. development of online prostitution in developing countries the development of online prostitution in developing countries increases from year to year. it is proven by the presence of new cases every year. online prostitution is still widely prohibited in developing countries such as indonesia, malaysia, china, and thailand. although prostitution is illegal in these countries, many people still act as clients and providers of these services. 2.1. development of online prostitution in indonesia online prostitution is increasing in almost all developing countries, including indonesia. in indonesia, many cases of online prostitution occur. one of them occurred in balikpapan city in 2019. from the revealed online prostitution case, eight women were caught in raids in three different hotels with a male pimp. the ages of the eight women ranging from 19-22 years. the transaction mode was carried out by the perpetrator using a chat application called michat. customers ordered prostitution services by chatting with the admin via social media. then, the admin contacted the sex worker ordered by the customer [7]. a similar case also occurred in surabaya city in 2020. the number of suspects was seven people aged 19-27 years. the prices offered by pimps in both cases ranged from one million to two million rupiahs [8]. in makassar city in 2020, 14 teenagers consisting of 8 men and six women, were arrested by the police at one of the hotels. based on the suspect's confession, the mode of transaction of the prostitutes was carried out through social media. the prostitutes promote their social media services with a price ranging from 1-2 million rupiahs [9]. apart from teenagers, online prostitution cases also involve children. in 2018, kpai recorded 264 cases of online prostitution and the trafficking of children. kpai believes that there are still many social media platforms that expose children to prostitution. one of the social media used in this case is line. this is based on police findings about pornographic activity in the form of live streaming in the line chat group called show time. the group comprises 400-500 users, including minors [10]. social media allows a pimp to have sex workers in various places. for example, the police have arrested two pimps with the initials nnu and mir. they worked as admins and promoted prostitution using the twitter account 'bandung agency' under the id @agencyladies. the account is spread across some major cities in indonesia, such as bali, jabodetabek, malang, surabaya, semarang, medan, jambi, kalimantan, purwokerto, and yogyakarta. this account is used to offer sex workers to customers. then the interested customers will pay a down payment between five hundred thousand and one million rupiahs to the admin. after the customer gets the service, the customer will pay the remaining payment to the sex worker ordered. furthermore, sex worker pays a commission of around 30% to the assistant or agent of the admin [11]. 2.2. development of online prostitution in malaysia, china, and thailand online prostitution has grown in malaysia. one of the cases occurred in pudu, malaysia, in 2020. in that case, 26 foreigners were arrested. there were 23 women caught, ages 25 to 40. some of them were caught with the man suspected to be the client of the woman who was caught. a notebook containing the client's payment records and some condoms were found and used as evidence of the case. the perpetrator used wechat social media to make transactions with clients. the rates offered by these service providers ranged from rm 180 to rm 300 [12]. online prostitution is also growing in china. in china, many platforms act as a link between sex workers and customers who seek these services [13]. some of these platforms are called quick come rent me and wechat. sex workers offer their services for around $ 15 per hour. at least 38 public accounts were found with the keyword "rent people". this indicates that online prostitution in china is significantly developing until 2016 . online prostitution has become open in thailand. according to a post today report, one of the pimps who are new and popular on facebook already has more than 16,400 likes on their account. the homepage contains contacts, prices, and terms to do. prices range from 1,000 to 5,000 baht for each 12-hour service. online prostitution in thailand is easier and cheaper than going directly to a massage parlor because clients can stay with the sex workers for 12 hours. one of the online issn 2614-0047 bulletin of social informatics theory and application 9 vol. 6, no. 1, march 2022, pp. 7-12 zaman et.al (social media and online prostitution industries) prostitution cases in thailand occurred in 2013. the bangkok police arrested nine perpetrators; three were underage, four were over 18 years of age, and two were from myanmar. the perpetrators offer their services through social media, facebook [14]. 3. development of online prostitution in developed countries not only in developing countries, but eventually online prostitution also increases in developed countries. the rising number of prostitution cases occurs because social media makes it the providers easier to carry out their actions. so the authorities are challenged to detect them. they also disguise the platform used to hide transactions that occur. the mode used by perpetrator was forcing the victim to send a nude photo, and then it was used to threaten the victim. in addition, the perpetrator also uses the victim's educational background to frighten them so that the perpetrator can continue to proceed with their actions. 3.1. developing of online prostitution in the united states the rise of social media impacts online prostitution in the united states. many pimps make transactions online and are difficult to detect. one of the reasons is that they use social media and mobile applications. moreover, they hide ads on commonly accessed sites like craigslist and backpage. they advertise prostitution by disguising the advert as a massage or dating. from interviews with 71 pimps in atlanta and chicago, the median income of pimps was between $ 75,000 and $ 100,000 [15]. one of the online prostitution cases found that the customers came from various ages, ranging from 22 to 62 years [16]. many prostitutes were forced to participate and use addictive drugs. the death rate of prostitutes in america is around 204/100000 [17]. abuse of prostitutes also occurred frequently, on average, once a month. also, there are some online prostitution cases involving children. like the jh case, he was a high school teacher arrested for child pornography and prostitution. jh was arrested for making videos or images of the sexual abuse of children and making transactions against these videos or images. moreover, he also had prostitutes with someone under 18 [18]. 3.2. development of online prostitution in europe online prostitution is also growing in european countries. in european countries, one of the executors of online prostitution is an international gang that roams the social media accounts of women and girls. the gang uses the victim's education and family background to exploit them. there are tons of social media platforms in use. most victims were women with two recruitment strategies: posting fake job advertisements on legitimate websites and responding to the victim's subsequent job requests. the criminal network also creates comprehensive websites of fake employment agencies. these sites are often promoted on social media so more victims can easily access them. sometimes the website includes live chat, ostensibly allowing direct contact with the alleged hiring manager [19]. the rise of social media platforms impacts online prostitution in the uk. many university students secretly become sex workers to pay for basic living expenses [20]. the research involved 6,750 students, 5% male and 3.5% female, who said they had worked in the sex industry, while nearly 22% said they had considered doing so. other research shows that one out of twenty students has worked in the sex industry, and male students are more likely to do so than female students. the student is involved in prostitution and escorts to nude work and the internet . in turkey, about 20,000 women are working as sex workers online. they produce up to 4,500 turkish lira in a month. on one of the online prostitution websites, 600 sex workers earn an average of 26 lire per hour. most of these women are homemakers, and some are people with disabilities. one sex worker said that the increasing market for online prostitution is the rise in unemployment due to layoffs in other occupations. another reason is that the turkish government strictly regulates traditional prostitution. on the other hand, online prostitution is mainly free from legal restrictions [21]. 3.3. development of online prostitution in japan as one of the countries that legalize prostitution, japan can not avoid prostitution cases. one of the methods the perpetrator uses is luring a modeling career for the victim. after signing several 10 bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 1, march 2022, pp. 7-12 zaman et.al (social media and online prostitution industries) contracts, the victim was then flown to a remote place where the perpetrator was doing his prostitution business [22]. in 2019, there were at least 103 similar new cases. in most of the cases, the victims were adolescents. apart from being approached on the streets, the perpetrator used social media to persuade victims. they were persuaded to send their nude photos. these photos were used to blackmail the victims, so they must send more photos repeatedly. once the victim's photos and videos are uploaded to the website, deleting or retrieving them is almost impossible. it made some victims desperate until they stopped continuing their studies, and some of them decided to end their lives [22]. 4. results and discussion from the cases described in the previous section, there are also several cases of prostitution involving minors. it violates the prevailing norms and morals. in the eyes of the law, online prostitution involving minors is very complicated. even online prostitution itself is already complicated. prostitution is a case that includes moral offenses. so that the examination of the case is carried out in a limited manner, even closed to the public [23]. to tackle cases of online prostitution involving minors, global child protection (unicef) should establish stricter regulations against child trafficking and child exploitation. in addition, through the commission for child protection, each country makes laws and regulations that discuss this matter. furthermore, set a very severe punishment for those who violate these rules. online prostitution can also be tackled by minimizing the use of social media, which is one of the supporting factors for online prostitution itself— not minimizing the real meaning. the government may be able to make regulations that regulate the public using social media. for example, in indonesia, the information and electronic technology law article 27 paragraph 1 of the ite law prohibits indonesian citizens from distributing, transmitting, and accessing electronic information or electronic documents whose contents deliberately violate the norms of decency. the formation of this regulation indicates the indonesian government's seriousness in dealing with online prostitution [17]. it can be a role model for countries that have not implemented these regulations. even in developed countries such as the united states, prostitution is illegal. most perpetrators of prostitution in the united states are unwilling to become a crime [24]. besides, the case in europe explained that prostitution could cause several health risks. prostitution can cause sexual disease, namely hiv [25]. from this discussion, it can be concluded that prostitution does not have positive impacts but negative ones. the use of social media for online prostitution is difficult to stop. however, it can be limited by the application of technology on social media, one of which is the selection of features on social media. by implementing feature selection on social media, such as for names, profile photos, hashtags, biodata, and uploaded content, prostitution or pornographic content can be detected [26] so that the social media system can easily remove the content. in addition to selecting features, another way can be used, namely by implementing svm (support vector machine) for image content on social media. this method is used to determine whether an image includes prostitution content or not. image detection can be done from several attributes, one of which is skin [27]. 5. conclusion online prostitution occurs in almost all parts of the world, both in developing and developed countries. the main factor behind the occurrence of prostitution is the economy. by performing the prostitution service, providers will get relatively large profits more quickly. in this all-digital era, the use of technology, which caused the rise of online prostitution, has become a similarity between developing and developed countries. the use of social media as a medium of online prostitution is constantly growing in developed and developing countries. prostitutes use social media to offer their services. transactions are also carried out through social media, which is more accessible and practical. also, those platforms make it easier to communicate and negotiate. social media often used in online prostitution include facebook, line, wechat, and michat. issn 2614-0047 bulletin of social informatics theory and application 11 vol. 6, no. 1, march 2022, pp. 7-12 zaman et.al (social media and online prostitution industries) references [1] j. o’connell davidson, “prostitution,” in the blackwell encyclopedia of sociology, oxford, uk: john wiley & sons, ltd, 2007, doi: 10.1002/9781405165518.wbeosp111. [2] v. samarasinghe, female sex trafficking in asia. routledge, pp. 1-234, 2012, doi: 10.4324/9780203485231. [3] g. ekberg, “the swedish law that prohibits the purchase of sexual services,” violence against women, vol. 10, no. 10, pp. 1187–1218, oct. 2004, doi: 10.1177/1077801204268647. [4] l. e. c. rocha, f. liljeros, and p. holme, “information dynamics shape the sexual networks of internet-mediated prostitution,” proc. natl. acad. sci., vol. 107, no. 13, pp. 5706–5711, mar. 2010, doi: 10.1073/pnas.0914080107. [5] f. mackee, “social media in gay london: tinder as an alternative to hook-up apps,” soc. media + soc., vol. 2, no. 3, p. 205630511666218, jul. 2016, doi: 10.1177/2056305116662186. [6] s. cunningham et al., “behind the screen: commercial sex, digital spaces and working online,” technol. soc., vol. 53, pp. 47–54, may 2018, doi: 10.1016/j.techsoc.2017.11.004. [7] “online prostitution uncovered in balikpapan.” accessed apr. 06, 2021. [online]. available at: https://www.thejakartapost.com/news/2019/08/20/online-prostitution-uncovered-in-balikpapan.html . [8] p. daulay, s. kanto, d. wisadirana, and s. mu’adi, “post closure prostitution and the adaptation strategy of sex workers: case study of dolly prostitution community, surabaya indonesia,” international journal of west asian studies, vol. 10, pp. 14, 2018. [online]. available at: http://journalarticle.ukm.my/17693/1/30036-92048-1-sm.pdf. [9] r. cempaka, b. wardhani, a. a. s. sawitri, p. p. januraga, and b. bavinton, “prep use awareness and interest cascade among msm and transgender women living in bali, indonesia,” trop. med. infect. dis., vol. 5, no. 4, p. 158, oct. 2020, doi: 10.3390/tropicalmed5040158. [10] “kpai: social media eases child prostitution practices news en.tempo.co.” accessed apr. 06, 2021. [online]. available at: https://en.tempo.co/read/1173466/kpai-social-media-eases-childprostitution-practices. [11] l. r. bennett and s. g. davies, “surveilling sexuality in indonesia,” routledge, pp. 47-68, dec. 05, 2014. accessed apr. 06, 2021. [online]. available at: https://www.taylorfrancis.com/chapters/edit/ . [12] “prostitution ring smashed, three malaysians and 26 foreigners nabbed in pudu raid.” accessed apr. 29, 2021. [online]. available at: https://www.thestar.com.my/news/nation/2020/04/24/prostitutionring-smashed-three-malaysians-and-26-foreigners-nabbed-in-pudu-raid. [13] e. y. tsang, “finding hope as a ‘tempting girl’ in china: sex work, indentured mobility, and cosmopolitan individuals,” deviant behav., vol. 39, no. 7, pp. 896–909, jul. 2018, doi: 10.1080/01639625.2017.1335543. [14] “online sex services ‘booming.’”. accessed apr. 29, 2021. [online]. available at: https://www.bangkokpost.com/thailand/politics/349226/online-sex-services-booming. [15] “social media is helping prostitution thrive online, pimps earning rs 50 lakh annually: study.” accessed apr. 29, 2021. [online]. available at: https://news.abplive.com/lifestyle/social-media-ishelping-prostitution-thrive-online-pimps-earning-rs-5016746-annually-study-399699. [16] m. soohoo, m. blas, g. byraiah, c. carcamo, and b. brown, “cervical hpv infection in female sex workers: a global perspective,” open aids j., vol. 7, no. 1, pp. 58–66, dec. 2013, doi: 10.2174/1874613601307010058. [17] c. cooke, “decriminalizing prostitution: embracing the swedish model by removing the mistakeofage defense from new york’s stop violence in the sex trade act.,” journal of law & policy,vol29, no. 1, pp. 248-284 2020. [online]. available at: https://libproxy.wustl.edu/login?url=https://search.ebscohost.com/ . [18] “concord teacher arrested on prostitution, child sex image charges.” accessed apr. 29, 2021. https://doi.org/10.1002/9781405165518.wbeosp111 https://doi.org/10.4324/9780203485231 https://doi.org/10.4324/9780203485231 https://doi.org/10.1177/1077801204268647 https://doi.org/10.1073/pnas.0914080107 https://doi.org/10.1177/2056305116662186 https://doi.org/10.1016/j.techsoc.2017.11.004 https://www.thejakartapost.com/news/2019/08/20/online-prostitution-uncovered-in-balikpapan.html http://journalarticle.ukm.my/17693/1/30036-92048-1-sm.pdf https://doi.org/10.3390/tropicalmed5040158 https://en.tempo.co/read/1173466/kpai-social-media-eases-child-prostitution-practices https://en.tempo.co/read/1173466/kpai-social-media-eases-child-prostitution-practices https://www.taylorfrancis.com/chapters/edit/10.4324/9781315849805-11/surveilling-sexuality-indonesia-sharyn-graham-davies https://www.thestar.com.my/news/nation/2020/04/24/prostitution-ring-smashed-three-malaysians-and-26-foreigners-nabbed-in-pudu-raid https://www.thestar.com.my/news/nation/2020/04/24/prostitution-ring-smashed-three-malaysians-and-26-foreigners-nabbed-in-pudu-raid https://doi.org/10.1080/01639625.2017.1335543 https://www.bangkokpost.com/thailand/politics/349226/online-sex-services-booming https://news.abplive.com/lifestyle/social-media-is-helping-prostitution-thrive-online-pimps-earning-rs-5016746-annually-study-399699 https://news.abplive.com/lifestyle/social-media-is-helping-prostitution-thrive-online-pimps-earning-rs-5016746-annually-study-399699 https://doi.org/10.2174/1874613601307010058 https://libproxy.wustl.edu/login?url=https://search.ebscohost.com/login.aspx?direct=true&db=a9h&an=150051150&site=ehost-live&scope=site 12 bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 1, march 2022, pp. 7-12 zaman et.al (social media and online prostitution industries) [online]. available at: https://patch.com/new-hampshire/concord-nh/concord-teacher-arrestedprostitution-child-sex-image-charges. [19] y. dandurand, “review of international sex trafficking of women & children – understanding the global epidemic,” j. hum. traffick., vol. 2, no. 3, pp. 255–256, jul. 2016, doi: 10.1080/23322705.2015.1099875. [20] j. simpson and c. smith, “students, sex work and negotiations of stigma in the uk and australia,” sexualities, vol. 24, no. 3, pp. 474–490, mar. 2021, doi: 10.1177/1363460720922733. [21] a. içduygu, “international migration and human development in turkey,” munich personal repec archive, oct. 01, 2009. accessed apr. 29, 2021. [online]. available at: https://mpra.ub.unimuenchen.de/19235/%0d. [22] c. ueno, “self-determination on sexuality? commercialization of sex among teenage girls in japan 1,” inter-asia cult. stud., vol. 4, no. 2, pp. 317–324, jan. 2003, doi: 10.1080/1464937032000113060. [23] w. zukerman, “could online prostitution crackdown endanger women?,” new sci., vol. 212, no. 2840, p. 24, nov. 2011, doi: 10.1016/s0262-4079(11)62895-9. [24] a. lutnick and d. cohan, “criminalization, legalization or decriminalization of sex work: what female sex workers say in san francisco, usa,” reprod. health matters, vol. 17, no. 34, pp. 38–46, jan. 2009, doi: 10.1016/s0968-8080(09)34469-9. [25] m. a. barnard, “violence and vulnerability: conditions of work for streetworking prostitutes.,” sociol. heal. illn., vol. 15, no. 5, pp. 683–705, nov. 1993, doi: 10.1111/1467-9566.ep11434434. [26] r. permatasari and n. a. rakhmawati, “features selection for entity resolution in prostitution on twitter,” int. j. adv. data inf. syst., vol. 2, no. 1, pp. 53–61, mar. 2021, doi: 10.25008/ijadis.v2i1.1214. [27] y.-c. lin, h.-w. tseng, and c.-s. fuh, “pornography detection using support vector machine,” 16th ippr conference on computer vision, graphics and image processing (cvgip), pp. 123-130, 2003. [online]. available at: http://www.bunny.idv.tw/~sbb/work/paper/cvgip2003.pdf. https://patch.com/new-hampshire/concord-nh/concord-teacher-arrested-prostitution-child-sex-image-charges https://patch.com/new-hampshire/concord-nh/concord-teacher-arrested-prostitution-child-sex-image-charges https://doi.org/10.1080/23322705.2015.1099875 https://doi.org/10.1177/1363460720922733 https://mpra.ub.uni-muenchen.de/19235/%0d https://mpra.ub.uni-muenchen.de/19235/%0d https://doi.org/10.1080/1464937032000113060 https://doi.org/10.1016/s0262-4079(11)62895-9 https://doi.org/10.1016/s0968-8080(09)34469-9 https://doi.org/10.1111/1467-9566.ep11434434 https://doi.org/10.25008/ijadis.v2i1.1214 http://www.bunny.idv.tw/~sbb/work/paper/cvgip2003.pdf bulletin of social informatics theory and application issn 2614-0047 vol. 1, no. 2, december 2017, pp. 41-51 41 https://doi.org/10.31763/businta.v1i2.26 a framework design to develop integrated data system for smart e-government based on big data technology fahmi dzikrullah a,1,*, muhammad angga rinjani b,2 a pt. gamatechno indonesia, e-government division, yogyakarta, indonesia b departement of electrical engineering and information technology, engineering faculty, universitas gadjah mada, yogyakarta, indonesia 1 fahmi@gamatechno.com *; 2 angga.ti14@mail.ugm.ac.id * corresponding author 1. introduction the information communication and technology become the backbone of e-government to reorganize the public service agencies who are still using traditional techniques so that the quality of service to the community could be faster and easier. governments around the world have been implementing information and computer technology on e-government initiatives for more than ten years [1]. electronic government (e-government) is the use of electronic communication devices, computers and the internet to provide public services to citizens. the benefits and values of egovernment are to enhance the quality of public services, transparency, accountability, cost-effective service provision and government operation, reduced corruption, citizen services, optimization of public policies for better outcomes and integrated government processes. the service delivery also involves many interrelated parties. it requires integration of the various related activities to the delivery of services. a r t i c l e i n f o a b s t r a c t article history received september 14, 2017 revised october 9, 2017 accepted november 1, 2017 the rapid development of information communication and technology (ict) in the field of governance or public service has shifted from the age of information to the age of data. the public sector is becoming increasingly aware of the potential value of data, where governments generate and collect large quantities of data (volume), rapid growth data (velocity) and various type of data (variety) through their services. meanwhile, the government agencies keep constructing the various database, information system or application with different data sources and platform. therefore, the interoperability has become the important requirements in electronic government (egovernment) infrastructure that progresses towards higher levels of integration among government levels and branches. in this paper, we proposed a framework design for the development of integrated data system for egovernment that we call smart e-government, which integrates traditional information systems that is combined with an intelligent system based on big data technology. with this system, the government agencies could provide services environment with greater ease and deliver public value through open government data initiatives in a smart e-government context. moreover, this would also be very useful for the government executives to monitor public services which are increasingly prestige, institutional transparency, as well as accountability. such integration is to improve the quality of public services through information technology. this is an open access article under the cc–by-sa license. keywords e-government interoperability integrated data system open government data big data http://creativecommons.org/licenses/by-sa/4.0/ http://creativecommons.org/licenses/by-sa/4.0/ 42 bulletin of social informatics theory and application issn 2614-0047 vol. 1, no. 2, december 2017, pp. 41-51 dzikrullah and rinjani (a framework design to develop integrated data system for smart e-government …) fig. 1. e-government delivery model according to j.c hai [2], the term e-government consists of the digital interactions delivery model; the e-government delivery model is described in fig. 1, namely: 1. governments to other government agencies (g2g), the purpose is “to reduce cost by reducing paper clutter, staffing cost, or communicating with private citizens or public government”. 2. government to internal employees (g2e), which are “online tools, sources, and articles that help employees maintain communication with the government and their own companies”. 3. government to citizens (g2c), offers “variety of ict services to citizens in an efficient and economical manner in order to strengthen the relationship between government and citizens using technology”. 4. government to businesses (g2b), is a “non-commercial interaction between local or central government and the commercial business sector with the purpose of providing businesses information and advice on e-business 'best practices'”. 5. government to organization (g2o), is a “non-commercial interaction between nongovernment organizations such academic institutions”. currently, the rapid development of information technology in the e-governments has shifted from the age of information to the age of data. the public sector is becoming increasingly aware of the potential value of data, where governments generate and collect large quantities of data (volume), rapid growth data (velocity) and various type of data (variety) through their services. meanwhile, the government agencies keep building various applications with different data sources, programming platform, operating system, hardware, and network specification. therefore, the interoperability has become the important requirement in e-government infrastructure. that progresses towards higher levels of integration among government levels and branches. the interoperability is described in fig. 2. fig. 2. e-government interoperability issn 2614-0047 bulletin of social informatics theory and application 43 vol. 1, no. 2, december 2017, pp. 41-51 dzikrullah and rinjani (a framework design to develop integrated data system for smart e-government …) in this paper, the use of information technology is to develop a platform that aims to integrate information systems by designing framework of integrated data systems based on big data technology for e-government, called smart e-government, which integrates traditional information system of government agencies and an intelligent system based on big data technology. through this system, the government agencies could provide services environment with greater ease and deliver public value through open government data (ogd) initiatives in a smart e-government context. moreover, this is also very useful for the government executive to monitor public services which are increasing prestige as well as institutional transparency and accountability. the integration of information technology is to improve the quality of public services through information technology. 2. related research designing and implementing an e-government framework intend to simplify contacts between government bureaucracy and citizens, because it is of this kind of organizations that implement technologies with bureaucracy, with the aim at enhancing public administration function and service to citizens; the technology generates the new horizon for a data-driven economy [3]. the public sector is becoming increasingly aware of the potential value of data, fahmi d. et al. governments generate and collect large quantities of data (volume), rapid growth data (velocity) and various type of data (variety) through public services. however, implementation of e-government in developing countries as indonesia is easier said than done. some studies [4], [5], have already been done to investigate challenges and strategies in implementing a local e-government; then it was found the gap raises when the government agencies are trying to scale up the infrastructure. proposed study about infrastructure and design for integrated skpd in manado, indonesia. meanwhile, the agencies keep constructing various database and application with a different platform for the sake of agencies’ sectoral ego that could lead to failure in implementing an e-government [6]. therefore, the interoperability has become the important requirement in e-government infrastructure to extensive information sharing among governmental entities [7]. according to ieee glossary [8] “interoperability is the ability of two or more systems or components to exchange information and to use the information that has been exchanged. review of several models of interoperability in e-government services [9], and the proposed study about soa-based approach for e-government interoperability to solve the traditional problem for the integrating system in public services platform [10]. furthermore, it could integrate with open government and data sharing and intelligent system [11]. data analytics becomes the fundamental of an intelligent system, by examining large amounts of data to uncover hidden patterns, the goal is to turn data into information, and information into insight, with today’s technology, it is possible to analyze large amounts of public service data and integrated with intelligent or machine learning system. in our previous research, we implemented a machine learning system with hadoop platform using smart card automatic fare collection system (scafcs) dataset on public transportation system to analyze passengers temporal pattern and provide insight information to support for public transportation management [12]. the purpose of providing information from organizations to citizens is to gain trust and transparency between citizens and government, in line with open data initiatives [13]. the open data initiatives facilitate data-driven decision making, so that all e-government delivery models could be accomplished. in this paper, we try to fill all technological gaps above by proposing a framework design for the development of integrated data system for smart e-government, which integrates traditional e-government information system and an intelligent system based on big data technology. 3. system framework 3.1. the interoperabilities in e-government e-government systems grow so rapidly and generate large of data. interoperability among the egovernment systems is very important for connecting and transmitting data between several systems. so that, the interoperability has become the critical requirement in e-government infrastructure. based on paper review [9], there are several types of interoperability in e-government, namely: 1. e-government interoperability using semantic oriented architecture 2. e-government interoperability based on interlinking application layer 3. e-government interoperability using data integration. 44 bulletin of social informatics theory and application issn 2614-0047 vol. 1, no. 2, december 2017, pp. 41-51 dzikrullah and rinjani (a framework design to develop integrated data system for smart e-government …) 4. e-government interoperability based on ontology model according to european commission definition, interoperability is the ability of information and communication technology (ict) systems to support exchange data of business processes and will to enable sharing of information and knowledge. there are three aspects of interoperability are identified, namely: 1. interoperability of organizational, an aspect which deals with cases where the organizations of cooperate have differences in structure and their business processes. therefore, it needs interoperability solution in the organizational side. 2. interoperability of services, an aspect where the information exchanged between organizations is interpreted differently by each side of systems in a service. therefore, it case needs interoperability to solve the different interpretation of information. 3. interoperability of semantic, this issues about how to connect various computer systems and services. other problem of this aspect such as interconnection, not close interfaces, data integration and middleware, data presentation and exchange, accessibility. then, another problem in this aspect is security of the services [14]. according to related research [14], interoperability model consists of several government agencies. the model of the interoperability approach is described in fig. 3. fig. 3. bilateral model interoperability [14] this model is called smartgov, the most straightforward approach towards achieving interoperability. the basic idea behind this model is that a direct connection to send e-government transaction services from each government agencies to all other government agencies that it needs to interoperate, this model called smartgov, an approach for interoperability model that of direct bilateral or multilateral communication between government agencies is preferred when implementing e-government services. the approachment can be implemented and this is the better way to solve interoperability challenges. however, this model which is described in the research is limited only number of interoperability patterns and implementation models. in that case, egovernment information systems are sociotechnical and not purely technical systems. therefore interoperability challenges related to legal, management, cultural, ethical and other social issues should be more deeply investigated [14]. in 2008, ministry of information and telecommunication (mcit) of indonesia published interoperability guideline [15]. current situation of e-government implementation shows that government agencies implement an information system, but it is not interoperable with other agencies. this happens because ict solution depends on a proprietary product. shared services become a challenge in the situation. the government agencies cannot deliver their service effectively. thus, the government mandates interoperability guidelines to get benefit from government agencies. 1. data management and access delivery become easier. 2. the government agencies can deliver their service effectively. 3. the information system can provide accurate information decision making. 4. sharing information among different agencies becomes possible. issn 2614-0047 bulletin of social informatics theory and application 45 vol. 1, no. 2, december 2017, pp. 41-51 dzikrullah and rinjani (a framework design to develop integrated data system for smart e-government …) based on the problems above, mcit developed an application to enable data exchange between various government agencies called mantra (management of information integration and data exchange). mantra acts as an information system interoperability framework that integrates and provides data exchange through the internet using web service technology based on service oriented architecture (soa) and government service bus (gsb). this framework is to provide integrated information system securely, accurately, and efficiently. web services are developed as an api (application programming interface). the api connects to applications using rpc (remote procedure call) technology. the api output is in the standard data formats such as json, or xml that have a similar structure; the extraction of data or information is in accordance to public service agency needs in information systems respectively. fig. 4 shows the web service sequence diagram. fig. 4. web service sequence diagram [15] mantra, in general, has two interaction concepts that can be implemented, namely: (1) point to point web-api. the concept of mantra point to point interaction between applications is middleware that connects mantra and database; the concept is on the layer of the web-api, that supplies data and the output from a database source, and communicates between api and the web application directly. there are authorizations between requester (who requires data) and provider (provider of web-api) as the form of security offered by these systems; mantra sets authorization requested based on registered user-agent. fig. 5 describes the point to point web-api. however, application access with point to point method will cause a loss of service availability if there is changing at domain name service, so that the application access on api web service should mediated with a hub/api service bridge using government service bus (gsb). 46 bulletin of social informatics theory and application issn 2614-0047 vol. 1, no. 2, december 2017, pp. 41-51 dzikrullah and rinjani (a framework design to develop integrated data system for smart e-government …) fig. 5. mantra point to point web-api [15] (2) government service bus (gsb) is the concept of interaction adopting services oriented architecture (soa). the solution offered by gsb is to provide integrated description management services via web-api provider. agent management is known as universal description discovery and integration (uddi). communication between uddi can support access to information between agencies using channel based soa or service bus management. because of mantra is intended to support interoperability between government agencies; the interaction concept is called government bus services (gsb). uddi is managing access to each web-api. uddi agent will give access to applications or systems that want to utilize data via mantra authorization application. gsb enables open integration process which does not need to rely on application, operation system, and database. the messages are exchanged in xml form which is retrieved from a local database of a certain system. fig. 6 describes gsb as a channel that stores various lists of web-api from many data sources and systems. fig. 6. government service bus issn 2614-0047 bulletin of social informatics theory and application 47 vol. 1, no. 2, december 2017, pp. 41-51 dzikrullah and rinjani (a framework design to develop integrated data system for smart e-government …) 3.2. integrated data system for smart e-government in this research, we separated the system framework into two tier system and seven layers; the front-end system is the interface between user or application that interacts directly with users and back-end system is data access and communication layer between the system. 1) smart e-government front end system the development of integrated information system for smart e-government is more complex than developing the local system because we need to standardize the meta-data from front-end so that it can be processed in the back-end. the smart e-government front-end application needs to be centralized for identity verification of all citizens to access the certain application. numerous governments around the world are utilizing id based smart cards [16]. in indonesia, this is called e-ktp. in this study, we also adopted the application based smart card e-ktp as a single identity verification control system (single-id) with access privileges and stores value for use in various front-end application layers based on e-government services. the classification according to the services provided is shown in fig. 7 [17]. fig. 7. smart e-government front-end system 1. e-management: the use of ict is to improve the efficiency of public administration and management as eprocurement, which improves the management of government purchases. another application is the management of data for public administration through ict. 2. single-id based on e-ktp: citizen electronic identity (e-id) contactless smart card based on single identification number, in indonesia also known as e-ktp, the purpose is to perform citizen single-id authentication with high security and accuracy, by verifying and registering user identity using nfc reader, where inside the e-id card contained electronic identification/e-id and digital signature/e-signature). 3. mdemocracy: an e-government mobile application portal called maspirasi to promote democratic mechanisms by implementing e-participation (for participation in service assessment and government decisions) e-campaigning and e-voting (electronic voting through ict). 4. mservices: an e-government mobile application portal called mperizinan that makes information regarding its management and simplification of public services such as ecitizenship and e-permission. 5. mpromotion: an e-government mobile application portal called mcity that makes information about e-tourism (local culture) e-regional potency and e-commodity (strategic place, economic commodity and local weather) available to the public to promote the city. 48 bulletin of social informatics theory and application issn 2614-0047 vol. 1, no. 2, december 2017, pp. 41-51 dzikrullah and rinjani (a framework design to develop integrated data system for smart e-government …) 2) smart e-government back-end systems the smart e-government back-end system is divided into six layers and illustrated in fig. 8. fig. 8. smart e-government back-end system framework 1. cloud data layer. it is a set of physical databases on the cloud servers for the nontransactional database collected from mantra api from different public agencies. 2. middleware layer. it is used for implementing interoperability between database and applications. we use mantra, an application to enable data exchange between different government agencies developed by ministry of information and telecommunication (mcit) of indonesia. mantra works without looking at the application, database or operating system of various systems. it employs government service bus (gsb) technology and webapi (application programming interface). the interoperability feature of mantra is described in table 1. no feature 1 the framework composed of web service component, which is loosely coupled, it allows to integrate with application that diverse implemented in various operating system, programming, platform, databases and network. 2 the middleware approach used in the framework is gsb. gsb responsible for integrating legacy systems, which provides interoperability with various old legacy applications, platform and database with the framework 3 services in the process can be changed without affecting other services, as far as input/output types of the service are unchanged. 4 the services access can be from the internet as an open network as well as from the private governmental network. 3. data warehouse layer. this is used for reporting and data analysis. for raw data preprocessor and data integrator from large scale and multisource database, we used pentaho data integration [18], which is integrating data in both structured and unstructured database format then stored in data warehousing system (i.e. hive) that used to processing a large number of datasets. it has three key functions like summarization of data, query, and analysis in term of processing large and unstructured data using hadoop platform, hadoop has two essential issn 2614-0047 bulletin of social informatics theory and application 49 vol. 1, no. 2, december 2017, pp. 41-51 dzikrullah and rinjani (a framework design to develop integrated data system for smart e-government …) components, namely: hadoop distribution system file (hdfs), it is used for storing and retrieving unstructured data, mapreduce that responsible for processing jobs in distributed data processing and the aggregation of output [19]. 4. open data layer, is “the comprehensive knowledge archive network (ckan) is a webbased open source management system for the storage and distribution of open data.” ckan has developed into a powerful data catalog system that is mainly used by public institutions to share their data with the general public, such as g2c, g2b and g2o [20]. 5. intelligent system layer. an intelligent data analysis using machine learning algorithm after data go to preprocess stage. the government agencies can use machine learning for constituents and government employees (ex: campaign prediction, supporting operational management). risk & security management as well as anomaly & threat detection are carried out by identifying anomalies or signatures to address proliferation of fraud, money laundering. the common machine learning platforms for handling a huge amount of data analysis and large scale in distributed computing system are apache mahout and spark. there are several machine learning models that can be used for data analysis, namely: a. forecasting. campaign prediction in particular states based on the history / time-series data or bayesian method. b. clustering. a part of data mining task, for measuring public service performance by clustering public service data. c. classification. a part of data mining task applied on the social network dataset, such as semantic analysis. several proven methods can be used for the classifier, namely: c4.5, naive bayes, k-nearest neighborhood, decision tree, support vector machine (svm). d. sentiment analysis. also known as opinion mining information from traditional data or scraping social media data (web, twitter feeds and etc.). the purpose of sentiment analysis is to help policy makers to prioritize services and be aware of citizens interests and opinions [3]. e. decision support system. a supporting system to policy makers for public service process, performance evaluation and assessment. 6. dashboard application layer. this is used for showing a graphical presentation of the current status or historical trends of a government key performance indicators (kpi). 3.3. framework scenario fig. 9 describes the framework scenario of an integrated data system for smart e-government based on big data technology. fig. 9. framework scenario 50 bulletin of social informatics theory and application issn 2614-0047 vol. 1, no. 2, december 2017, pp. 41-51 dzikrullah and rinjani (a framework design to develop integrated data system for smart e-government …) 1. data acquisition. integrate relevant data source between government agencies structured and unstructured data via mantra gsb and collected smartgov mobile apps data in cloud data center. 2. data preparation. preparing and merging data from different data source for reporting and data analysis preprocessing. 3. data analytic. generating datasets using open data (i.e. ckan) the output of datasets is files with rows and columns, these files can be used for data analytic and processing using machine learning platform (i.e. spark, mahout) for business intelligent in govt policy decision makers. 4. data delivery. providing interchange data between govt agencies, open datasets and data representation for organization, business and citizen. 4. conclusion in this paper, we proposed a framework for developing integrated data system smart egovernment which integrates traditional information system using mantra and government service bus (gsb). the framework designed to achieve interoperability and flexibility that allows integrating diverse types of application, platform, operating system, database and network. the scalability that allows processing large and various data using big data technology, implementing intelligent system or machine learning for decision support for policy-makers and providing open government data to improve the quality of public services. note that; we are on initial progress research and development; we are aware that the technology that we proposed is not a new product, but it is a new way of looking at how to integrate applications, database, coordinate resources, and manipulate information especially in a public service system or e-government. for the future work, the framework will be separated into detailed implementation and validation progress, and we gratefully receive any suggestion for better research and development. acknowledgment the authors are thankful to ministry of information and telecommunication republic of indonesia and pt. gamatechno indonesia that have given permission and supported this research. references [1] s. basu, “e‐ government and developing countries: an overview,” int. rev. law, comput. technol., vol. 18, no. 1, pp. 109–132, 2004. [2] j. c. hai and i. ibrahim, fundamental of development administration. selangor: scholar press, 2007. [3] j. domingue, n. lasierra, a. fensel, t. van kasteren, m. strohbach, and a. thalhammer, “big data analysis,” in new horizons for a data-driven economy: a roadmap for usage and exploitation of big data in europe, j. m. cavanillas, e. curry, and w. wahlster, eds. springer open, 2016, pp. 63–86. [4] w. chutimaskul and v. chongsuphajaisiddhi, “a framework for developing local e-government,” in ifip international working conference on knowledge management in electronic government, 2004, pp. 335– 340. [5] c. g. mkude and m. a. wimmer, “strategic framework for designing e-government in developing countries,” in international conference on electronic government, 2013, pp. 148–162. [6] a. a. sinsuw, x. najoan, and y. d. rindengan, “architecture design of manado e-government ict networks: the road to manado smart city,” in telecommunication systems services and applications (tssa), 2014 8th international conference, 2014, pp. 1–6. [7] h. j. scholl, “interoperability in e-government: more than just smart middleware,” in system sciences, 2005. hicss’05. proceedings of the 38th annual hawaii international conference, 2005. [8] a. geraci et al., ieee standard computer dictionary: compilation of ieee standard computer glossaries. ieee press, 1991. issn 2614-0047 bulletin of social informatics theory and application 51 vol. 1, no. 2, december 2017, pp. 41-51 dzikrullah and rinjani (a framework design to develop integrated data system for smart e-government …) [9] i. w. ordiyasa, l. e. nugroho, p. i. santosa, r. ferdiana, and w. kumorotomo, “interoperability model of e-government services,” in information technology, computer, and electrical engineering (icitacee), 2015 2nd international conference, 2015, pp. 177–182. [10] m. m. el benany and o. el beqqali, “soa based e-government interoperability,” in 2015 ieee/acs 12th international conference of computer systems and applications (aiccsa), 2015, pp. 1–2. [11] a. kö, c. leitner, h. leitold, and a. prosser, technology-enabled innovation for democracy, government and governance: second joint international conference on electronic government and the information systems perspective, and electronic democracy, egovis/edem 2013, prague, czech republic, august 26-2. springer, 2013. [12] f. dzikrullah, n. a. setiawan, and s. sulistyo, “implementation of scalable k-means++ clustering for passengers temporal pattern analysis in public transportation system (brt trans jogja case study),” in engineering seminar (inaes), international annual, 2016, pp. 78–83. [13] g. v. pereira, m. a. macadar, e. m. luciano, and m. g. testa, “delivering public value through open government data initiatives in a smart city context,” nformation syst. front., vol. 19, no. 2, pp. 213–229, 2017. [14] e. tambouris, n. loutas, v. peristeras, and k. tarabanis, “the role of interoperability in egovernment applications: an investigation of obstacles and implementation decisions,” in digital information management, 2008. icdim 2008. third international conference, 2008, pp. 381–386. [15] d. sukyadi, kerangka acuan dan pedoman interoperabilitas sistem informasi instansi pemerintahan. depkominfo, 2008. [16] f. fioravanti and e. nardelli, “identity management for e-government services,” in integrated series in information systems, boston, ma: springer, 2008, pp. 331–352. [17] b. s. de abajo et al., “egovernment: real democracy in digital society,” in international workshop on human-computer interaction, tourism and cultural heritage, 2011, pp. 113–123. [18] hitachi vantara, “pentaho data integration,” 2016. [online]. available: https://www.hitachivantara.com/en-us/products/big-data-integration-analytics/pentaho-dataintegration.html?source=pentaho-redirect. [accessed: 29-jun-2016]. [19] simplilearn, “8 essential concepts of big data and hadoop,” big data and analytics, 2016. [online]. available: https://www.simplilearn.com/big-data-and-hadoop-8-essential-concepts-guide-pdf. [accessed: 29-jun-2016]. [20] ckan, “about ckan,” 2016. [online]. available: https://ckan.org/about/. [accessed: 20-jun-2016]. bulletin of social informatics theory and application issn 2614-0047 vol. 5, no. 2, september 2021, pp. 88-96 88 https:doi.org/10.31763/businta.v5i2.405 popular dating apps in indonesia and the united states ramadhani akbar ilmiawan a,1,*, riza maqfiratun nafisah a,2, rizki khoirun nisa a,3, yaritza haq indra hart a,4, roni herdianto b,5 a department of electrical engineering, universitas negeri malang, malang, indonesia b graduate school, universitas negeri malang, malang, indonesia 1 ilmuwan10@gmail.com*; 2 rizamaqfiratun@gmail.comr; 3 rizkinisa004@gmail.com, 4 yaritzahaq@gmail.com, 5 roni.herdianto@um.ac.id * corresponding author 1. introduction current technological developments can take over conventional employment, information, communication, and education [1]. with social media, people can easily communicate and share information with other people [2]. thus, smartphones and internet have become very important today. over the past 20 years, smartphones and the internet have changed how people get partners from other countries. location-based dating applications with real-time maximize people's experience finding their partner based on geographic location [3]. people can also easily connect with potential partners who have the same sexual orientation and religious views [4]. now, finding the right partner is no longer a big problem. apart from the benefits, portability, availability, opportunity, and multimodality offered by various dating apps [5], there are also risks such as infidelity, fraud, and sexual crimes [3]. especially in dating applications that use the geolocation feature, which makes it easier for couples to find someone nearby [6]. some applications are also unable to verify data, allowing catfishing to occur. if the photo uploaded on the application is different from the natural person, this can also result in cyberbullying. an even bigger impact is body shaming and avoidant personality disorders that can affect mental health. avoidant personality disorder is an individual who has extreme anxiety about criticism from others, so they tend to avoid social interactions that have the potential to raise criticism on that individual [7]. thus, people must be able to use dating applications wisely to avoid these risks. not everyone has the same goals and reasons for using dating apps. the majority use it just for fun and making friends. some want to find someone and seek a more meaningful relationship. however, crimes are still common in dating applications, such as fraud, data theft, and threats of computer a r t i c l e i n f o a b s t r a c t article history received june 14, 2021 revised july 3, 2021 accepted july28, 2021 the use of smartphones and the internet has changed the way people have partners. location-based dating apps are also designed to maximize people's experience of finding partners. apart from the various benefits, there are also risks such as adultery, fraud, and sexual crimes. in this research, we want to study the research and negative impacts of the three most popular dating apps in indonesia and the united states. this research is a descriptive study with a qualitative narrative approach. the purpose of this study is to compare the use of dating apps in indonesia and the united states and the negative impacts of these dating apps. this research finds that tinder is the dating app with the most number of users and has the best privacy and security policy system in indonesia and the united states. however, due to cultural and environmental differences in the two countries, internet crime is more prone to occur in the united states. even so, the legal protection in the united states in resolving cases caused by dating apps is more robust than in indonesia. this is an open access article under the cc–by-sa license. keywords dating applications privacy policy data security romance scams http://creativecommons.org/licenses/by-sa/4.0/ http://creativecommons.org/licenses/by-sa/4.0/ issn 2614-0047 bulletin of social informatics theory and application 89 vol. 5, no. 2, september 2021, pp. 88-96 ilmiawan et.al (popular dating apps in indonesia and the united states) viruses [8]. in this study, three online dating applications that are most popular in indonesia and the united states will be compared in terms of the privacy policy and data security, also criminal cases that occur, and legal protection of the two countries. so, it is hoped that this research can be a reference for couples who use dating applications and the government in resolving the negative impact of dating applications. 2. method this research employed a qualitative research design and used a descriptive approach. the method used in this research is document study or document analysis. document analysis is a systematic procedure helpful in reviewing documents, both printed and electronic material (computer-based and internet). the data used comes from documents related to research [9]. this research is a comparative study between indonesia and the usa. here is a comparison chart of popular dating apps in indonesia and the united states. fig. 1. leading mobile dating apps in indonesia as of september 2020 [source: statista.com] fig 1. shows some of the dating apps used in indonesia. based on the results of a survey conducted by rakuten insight in october 2020 through the publication of statista.com, out of a total of 1,613 respondents with an age range over 16 years, the survey results show that the tinder application ranks first as dating. the application most used by indonesians with a proportion of 57.59% and the application least used by indonesians is paktor with a proportion of 3.72% 90 bulletin of social informatics theory and application issn 2614-0047 vol. 5, no. 2, september 2021, pp. 88-96 ilmiawan et.al (popular dating apps in indonesia and the united states) fig. 2. most popular online dating apps in the united states as of september 2019 [source: statista.com] fig. 2. shows some of the dating apps used in the united states. based on a survey conducted by verto in november 2019 through the publication of statista.com, the survey stated that tinder is the favorite application used by americans with 7.86 million users and the least desirable application for use by americans is ashley madison with 0.85 million users. each of the three popular dating applications in indonesia and the united states was selected from the data. popular dating apps are selected based on their ranking. tinder, tantan, and okcupid were selected as popular dating apps in indonesia. tinder, bumble, and pof (plenty of fish) were voted popular dating apps in the united states. these applications are compared based on privacy policy and data security. there is also an explanation regarding the case due to the dating app and its legal protection. 3. results and discussion the most popular dating apps in a country are not necessarily apps created and released by that country. the marketing strategy has made dating apps known and used by people in various countries. apart from that, some dating apps sometimes have similar features because they were developed in the same parent company. here is brief information about the three most popular dating applications in indonesia and the united states. tinder is a dating application that originated in the united states and was launched on september 12, 2012. tinder was created by sean red, then developed by match group, an internet, and technology company based in dallas, texas [10]. tinder performs and performs searches based on the profile photo, hobbies, and location using the gps on the phone. tinder is the first dating application to implement the swipe feature to select potential partners. swipe left for "no", swipe right for "like" and swipe up for "really like" [11]. the swipe feature is expected to be able to help users make selections more easily and quickly. tantan is a dating application developed by the picn company from china and released in 2014. since it was first released, tantan has attracted the attention of many people, according to its official website, now there are more than four billion tantan users worldwide. the features of the tantan app are similar to other dating apps, namely using geolocation and photos to find a partner and selecting them using the swipe feature. okcupid is a dating app developed by match group, the company that also houses tinder. okcupid was created by chris coyne, christian rudder, sam yagan, and max krohn and was launched on january 19, 2004 [10]. initially, okcupid was a social networking site called the spark, issn 2614-0047 bulletin of social informatics theory and application 91 vol. 5, no. 2, september 2021, pp. 88-96 ilmiawan et.al (popular dating apps in indonesia and the united states) which provided quizzes and personality tests to connect with other users with similar personalities. after its popularity, thespark changed its name to okcupid and focused on developing dating apps. in 2011 okcupid was acquired by iac (interactivecorp), the parent company of match group. the working system of the okcupid application is different from other dating applications, searches are determined based on answers to questions and personality tests. in addition, users can immediately send messages to potential partners even though they haven't matched yet. bumble is a dating application originating from the united states which launched in december 2014. the bumble application was developed by match group, an american company that also houses several other dating applications [10]. the bumble app has a working system and features similar to the tinder app. the system searches based on geolocation data then the user will select it using the swipe feature. female users can send messages to other matched users to have deeper interactions. the system can delete match notifications automatically if within 24 hours the user does not send a message to their partner. this policy applies to free users of the bumble application. pof (plenty of fish) is an online dating application that originated in canada, was created by markus frind, and was released in 2003. in july 2015, pof (plenty of fish) was acquired by match group, a company that also houses tinder, bumble, and match [10]. pof (plenty of fish) has a similar way of working with other dating applications. pof (plenty of fish) will recommend a partner based on photos and geolocation data then the user selects them using the swipe feature. paid users can specifically search for partners by using a feature on the search engine to find a partner according to their wishes. 3.1. comparison of privacy policy dating apps various popular dating applications provide the best services so that users can feel comfortable when using the application. each application certainly has a privacy policy that may differ depending on the applicable law and the company to support the best service. based on data from the most popular dating applications in indonesia and the united states, each of the three dating applications is taken and compared to each application's privacy policies. reporting from the official website of each application, here is the comparison in table 1. based on the comparison of data taken from the official website of each application, it can be seen that there are differences in the policies of each popular application. there are several significant differences, including the first time there is a safety retention window before the account is permanently deleted, the okcupid application has the most extended timeframe compared to other applications, which is one year. tantan and pof applications do not provide a safety retention window so that when the account is deleted, existing data will also be permanently deleted. the second difference is the age limit. only the tantan application allows children under the age of 18 to have an account with the condition of parental consent. the third significant difference is the privacy policies between tinder, which operates in indonesia, and the united states. tinder users in the united states can request notification of what personal data is shared with third parties, such as name, age, or address needed to support the services provided. however, tinder users in indonesia cannot request this information, so users do not know what personal information is being shared with third parties. this can reduce the level of comfort and confidence in the dating app itself. the privacy policy in dating applications will affect user comfort—the more complete the existing privacy policy, the higher level of user confidence in using the application. for dating application users, privacy is an important thing needed to interact [12]. based on the comparison of privacy policies, tinder is the most popular application both in indonesia and in the united states, which has a high level of privacy policy, followed by bumble and okcupid, can be seen from the number of data security supporting elements available on tinder (marked with a checkmark). 92 bulletin of social informatics theory and application issn 2614-0047 vol. 5, no. 2, september 2021, pp. 88-96 ilmiawan et.al (popular dating apps in indonesia and the united states) table.1 comparison of the three most popular dating apps in indonesia and in the united states differences indonesia united states tinder tantan okcupid tinder bumble pof the period of the safety retention window before the account is permanently deleted 3months 1 year 3months 28days minimum age 18 years ✔ ✔ ✔ ✔ ✔ collect the personal information of users according to consent ✔ ✔ ✔ ✔ ✔ ✔ automatic review to reduce negative risk ✔ ✔ ✔ ✔ ✔ ✔ automatically block suspicious accounts ✔ ✔ ✔ bridging users with the authorities ✔ ✔ ✔ provide anti-fraud team ✔ ✔ data encryption ✔ ✔ ✔ use basic contract clauses for cross-border data transfers ✔ ✔ ✔ ✔ use cookies to recommend user activity ✔ ✔ ✔ ✔ ✔ ✔ user rights to manage the information to be shared ✔ ✔ ✔ ✔ share user data with third parties to help provide the best service. ✔ ✔ ✔ ✔ ✔ ✔ receive data from other social media such as facebook ✔ ✔ ✔ ✔ implemented a bug bounty program to secure information ✔ may request notification of what personal data is shared with third parties ✔ ✔ 3.2. comparison of data security dating applications system security is an important aspect to be included in the application, especially in some dating applications, where the data entered is personal data that is private and sensitive. systems with tight data security can attract user confidence in protecting their data from cyber-attacks. dating apps have different levels of data security with established technology and privacy policies. referring to table 1, three popular dating applications in indonesia and america have differences in several aspects of their privacy policies that can affect the security of user data. the first difference is that only the tinder and bumble apps will depend on unusual activity patterns. the second difference is that the tinder and tantan applications use data encryption technology to protect user privacy. the third difference is that the tinder, okcupid, and bumble applications will transfer to countries outside the eea (european economic area) based on standard contractual clauses to ensure the security of user data. the fifth difference is that only the tinder and okcupid applications implement a bug bounty program to help the team find security holes to prevent cyber attacks. based on the data above, it can be ignored that tinder has the highest level of data security compared to other dating applications. tinder has a more complete data security policy. although all dating applications have made efforts to maintain and ensure the security of user data, there is no system with a 100% data security level, proven by several cybersecurity cases. based on issn 2614-0047 bulletin of social informatics theory and application 93 vol. 5, no. 2, september 2021, pp. 88-96 ilmiawan et.al (popular dating apps in indonesia and the united states) research conducted by cybersecurity white ops and informed via cybersecurity-insiders.com, as many as 70,000 photos of women using tinder have been stolen and shared on cybercrime forums [13]. in addition, in 2020, based on information from security brief.co.nz, a cyber organization, namely checkpoint research, also found gaps in the security of okcupid websites and applications, which allow hackers to access and measure user data. based on these facts, even though every system has guaranteed data security, we still need to select the information to be uploaded on the internet. 3.3. comparison of number of dating application cases in indonesia, the directorate of cyber crime (dittipidsiber) bareskrim polri received 2,259 reports of cybercrime cases from january to september 2020. reports about the distribution of provocative content were the most reported, with 1,048 cases. fig.3. is about crime cases related to dating apps [14]. fig. 3. criminal case data originating from an online dating application in indonesia fig. 3 shows that online application-based crime in indonesia is dominated by online fraud. for example, a woman from jakarta suffered a loss of rp15.8 billion after being subjected to a criminal act of fraud using online dating. according to the head of the public relations division of polda metro jaya, kombes pol yusri yunus, this case is not just fraud but also a criminal act of money laundering. "the fraud and money laundering offenses which occurred in april from a report by someone (a woman from jakarta), the loss is more than rp15 billion," said head of public relations of polda metro jaya, kombes pol yusri yunus at polda metro jaya, friday, november 27, 2020 [15]. after that in the united states from the recent data provided by facebook, many users' data was stolen. such as name, id, telephone number, and email. according to an fbi 2019 report on internet crime, 241,342 americans fell victim to phishing attacks last year, making it the most common type of cybercrime. identity theft and spoofing also high on the list of common offenses. protecting personal data from getting into the wrong hands is crucial for the fight against online crime. fig. 4. is about crime cases related to dating apps. 94 bulletin of social informatics theory and application issn 2614-0047 vol. 5, no. 2, september 2021, pp. 88-96 ilmiawan et.al (popular dating apps in indonesia and the united states) fig. 4. criminal case data originating from an online dating application in the usa the graph above shows that the united states also has many cases regarding online dating. in the united states alone, there are many cases of phishing. phishing itself means an attempt to get someone's data information with phishing techniques. the data that is subject to phishing is personal data (name, age, address), account data (username and password), and financial data (credit card information, account). according to data from lloyds bank, people aged 55 to 64 are particularly at risk. like anna (not her real name), who is in her 50s and a widow: she became prey to her scammer, who called himself tim, after meeting him on a dating website, initially using its chat facility before switching to whatsapp. after a few weeks, tim told anna he was traveling to romania to work on a transport project and asked her to send money. first, he asked for small amounts, and then larger ones, eventually defrauding her £320,000. romance fraud often starts on online dating websites but quickly switches to social media or old-fashioned texting, so there is no evidence of the scam. sometimes the scammer is more subtle than just asking for money, seeking to garner personal information, which can later be used to commit identity fraud [16]. 3.4. comparison of legal protection the increasing annual number of crimes also offsets the increasing number of dating app users., must be supported by solid legal protection from the local government. legal protection is an effort made by government and private institutions that are intended to control, secure, fulfill and live a welfare life under existing human rights. therefore, the government is obliged to provide legal protection because this is a natural form of government in providing a sense of security to its citizens. a comparison of legal protection provided by indonesia and the united states in handling cases caused by online dating applications is presented in table 2. table.2 comparison of legal protection in indonesia and the united states difference indonesia united states the law that regulates cases through dating apps article 35 in conjunction with article 51 paragraph 1 of the ite law the computer fraud and abuse act (cfaa), 18 u.s.c. 1030 a specialized agency that handles cases through dating apps federal trade commission (ftc) the threat of punishment for the perpetrator of the case through a dating application prison for up to 12 years or a fine of up to idr 12,000,000,000.00 imprisonment of less than 5 years or a fine of less than $ 250,000 providing public education to prevent cases through dating applications still rare active through the ftc website and youtube channel issn 2614-0047 bulletin of social informatics theory and application 95 vol. 5, no. 2, september 2021, pp. 88-96 ilmiawan et.al (popular dating apps in indonesia and the united states) in indonesia, the rights of victims of fraud cases are in the criminal procedure code (kuhap) that deals with victims of the crime romance scam where the fraud is carried out via the internet. in addition to providing legal protection, the indonesian government also applies policies to perpetrators regulated in the criminal code (kuhp) and law no. 19 of 2016 concerning electronic information and transactions. in the criminal code, a specific article regulates criminal acts of fraud, namely article 378 of the criminal code. whereas in the ite law, the article that regulates identity fraud via the internet is article 35 in conjunction with article 51 paragraph 1 of the ite law issued by the government through the ministry of communication and information technology. these rules are not yet strong and sufficient to prevent the perpetrator from canceling his actions. it can be concluded that indonesia does not yet have a strong and binding legal policy. whereas in the united states, the legal protection obtained by victims of the crime of romance scam is stronger than in indonesia. this is evidenced by an independent agency called the federal trade commission (ftc) which the united states government established. the ftc is tasked with preventing fraud and providing information to assist users in finding, stopping, and avoiding things that are suspected of being fraudulent [17]. its primary mission is to enforce usa civil antitrust (noncriminal) laws and promote consumer protection. the main purpose of establishing the ftc is to provide education about identity fraud on dating apps. this educational provision can be seen in articles and graphic info published on the ftc website. in addition, the ftc's youtube channel also uploads educational videos about fraudulent schemes in dating apps. the united states government strongly encourages its citizens to report all acts related to fraud experienced through the ftc website. with the result, it can be concluded that the united states government is more responsive in providing legal protection to victims of the romance scam than the indonesian government. 4. conclusion the use of smartphones and the internet has also changed the way people find partners through dating apps. with benefits, portability, numbers, opportunities, and multimodality, dating app users are increasing every year. however, the increase in users was offset by the increase in criminal cases. based on the data found, the three most popular dating apps in indonesia are tinder, tantan, and okcupid, while those in the united states are tinder, bumble, and pof (plenty of fish). each of these dating apps has a different privacy and security policy. tinder is the most widely used dating app and has the best privacy and data security policy system in indonesia and the united states. nonetheless, criminal cases are still vulnerable in both countries, such as sexual crimes, fraud, and cybercrimes. the number of cases that occur in the united states is higher than in indonesia because of its culture and environment. the legal protection applied in the two countries is still not strong enough to prevent these crimes. however, the united states has better legal protection for victims, as evidenced by the existence of an independent agency called the federal trade commission (ftc). references [1] d. acemoglu and p. restrepo, “the race between man and machine: implications of technology for growth, factor shares, and employment,” am. econ. rev., vol. 108, no. 6, pp. 1488–1542, jun. 2018, doi: 10.1257/aer.20160696. [2] m. li, j. zhang, z. liu, and g. i. johnson, “an experimental study of chinese shopping related sharing behaviors,” in human-computer interaction – interact 2013, p. kotzé, g. marsden, g. lindgaard, j. wesson, and m. winckler, eds. berlin, heidelberg: springer, 2013, pp. 608–615. [3] á. castro, j. r. barrada, p. j. ramos-villagrasa, and e. fernández-del-río, “profiling dating apps users: sociodemographic and personality characteristics,” int. j. environ. res. public health, vol. 17, no. 10, p. 3653, may 2020, doi: 10.3390/ijerph17103653. [4] c. clemens, d. atkin, and a. krishnan, “the influence of biological and personality traits on gratifications obtained through online dating websites,” comput. human behav., vol. 49, pp. 120–129, aug. 2015, doi: 10.1016/j.chb.2014.12.058. [5] g. ranzini and c. lutz, “love at first swipe? explaining tinder self-presentation and motives,” mob. media commun., vol. 5, no. 1, pp. 80–101, jan. 2017, doi: 10.1177/2050157916664559. 96 bulletin of social informatics theory and application issn 2614-0047 vol. 5, no. 2, september 2021, pp. 88-96 ilmiawan et.al (popular dating apps in indonesia and the united states) [6] c. van de wiele and s. t. tong, “breaking boundaries,” in proceedings of the 2014 acm international joint conference on pervasive and ubiquitous computing, sep. 2014, pp. 619–630, doi: 10.1145/2632048.2636070. [7] a. weinbrecht, l. schulze, j. boettcher, and b. renneberg, “avoidant personality disorder: a current review,” curr. psychiatry rep., vol. 18, no. 3, p. 29, mar. 2016, doi: 10.1007/s11920-016-0665-6. [8] a. murphy, “dating dangerously: risks lurking within mobile dating apps,” cath. ujl tech, vol. 26, p. 100, 2017. [9] g. a. bowen, “document analysis as a qualitative research method,” qual. res. j., vol. 9, no. 2, pp. 27– 40, aug. 2009, doi: 10.3316/qrj0902027. [10] r. wilken, j. burgess, and k. albury, “dating apps and data markets: a political economy of communication approach,” comput. cult., vol. 7, pp. 1–26, 2019. [11] g. david and c. cambre, “screened intimacies: tinder and the swipe logic,” soc. media + soc., vol. 2, no. 2, p. 205630511664197, apr. 2016, doi: 10.1177/2056305116641976. [12] j. farnden, b. martini, and k.-k. r. choo, “privacy risks in mobile dating apps,” arxiv prepr. arxiv1505.02906, 2015. [13] n. goud, “tinder cyber attack exposes 70k female photos for catfishing,” 2019. https://www.cybersecurity-insiders.com/tinder-cyber-attack-exposes-70k-female-photos-for-catfishing/ (accessed may 18, 2021). [14] c. m. annur, “daftar kejahatan siber yang paling banyak dilaporkan ke polisi,” 2020. https://databoks.katadata.co.id/datapublish/2020/09/08/daftar-kejahatan-siber-yang-paling-banyakdilaporkan-ke-polisi (accessed may 17, 2021). [15] i. walhadi, “kena modus penipuan kencan online, wanita asal jakarta ini alami kerugian rp15,8 miliar,” 2020. https://isubogor.pikiran-rakyat.com/warta/pr-451024547/kena-modus-penipuan-kencanonline-wanita-asal-jakarta-ini-alami-kerugian-rp158-miliar (accessed may 27, 2021). [16] j. wakefield, “romance fraud on rise in coronavirus lockdown,” 2021. https://www.bbc.com/news/technology-55997611 (accessed may 28, 2021). [17] n. s. p. s. dewi and i. irwansyah, “regulasi terhadap penipuan identitas: studi fenomena ‘catfish’ pada social networking sites (sns),” j. stud. komun. (indonesian j. commun. stud., vol. 5, no. 1, p. 267, feb. 2021, doi: 10.25139/jsk.v5i1.2612. bulletin of social informatics theory and application issn 2614-0047 vol. 1, no. 2, december 2017, pp. 79-85 79 https://doi.org/10.31763/businta.v1i2.42 social effects of digital pornography muhammad firman aji saputra 1,*, sherly allsa siregar 2, zahra nabila izdihar 3 universitas negeri malang, malang, indonesia 1 firman.asbn@gmail.com *; 2 sherlyallsasiregar@gmail.com; 3 zahra.informatics@gmail.com * corresponding author 1. introduction technology will continue to evolve over time. technology is no longer a secondary or tertiary need, but has become a primary need that must be owned by every individual. the current information technology, making almost all regions can feel the benefits of information technology. with information technology, every individual is made easier to get the information he wants. the development of information technology is also not spared from the role of the internet that has been present in this world. the internet has been considered to be the greatest discovery, where everyone can get information from around the world using internet. this integrated information technology and internet makes the world only in the grip now. meanwhile, the development of technology can also have a negative impact on its users. as a consequence, the changes that occur in the community due to advances in technology and the internet cannot be avoided anymore. one effect is that each individual is free to communicate anything unconstrained by the limits of conventional values and norms, even to issues that may have been taboo to be openly discussed, pornographic issues. pornography is increasingly accessible in this era. as a result, pornographic content is easy to handle even in the hands of minors. two recent reports, from the american psychological association on hypersexualized girls and the national campaign to prevent teen pregnancy report that pornographic content has reached the phone’s childrens [1]. in indonesia, pornography is indeed widespread, not only teenagers who have access but also children. pornography has invited various controversies both pros and cons. many things related to pornography, from the matter of history, culture, politics, technology, to the economy. similarly, a r t i c l e i n f o a b s t r a c t article history received october 10, 2017 revised october 31, 2017 accepted november 20, 2017 emerging technology will provide benefits for users. especially with the presence of the internet will make technology more perfect. on the one hand, technology and the internet provide benefits, on the other hand can also give a negative impact for users, one of which is the rise of pornographic content on the internet or often called cyberporn. with the internet, pornography can be obtained easily. that is because the producers of pornographic content think that the internet is the most optimal marketing medium. the presence of pornography has occurred pros and cons in various countries. in indonesia, it is strictly prohibited because it can damage the morale of the next generation of the nation. in addition, pornography is something very addictive to humans that will eventually happen in various things. in fact, porn addiction is more severe addictive substance addiction than psychotropic. some efforts that can be done to minimize the pornography deal either by the government of indonesia, family, or other related parties are making laws that regulate pornography, blocking pornographic sites, providing early childhood sex education, and the role of parents in child supervision. this is an open access article under the cc–by-sa license. keywords technology pornography cyberporn internet http://creativecommons.org/licenses/by-sa/4.0/ http://creativecommons.org/licenses/by-sa/4.0/ 80 bulletin of social informatics theory and application issn 2614-0047 vol. 1, no. 2, december 2017, pp. 79-85 saputra et.al (social effects of digital pornography) pornography has given rise to a diverse stream of thought. therefore things about the crime of pornography are an interesting topic to be discussed in this journal. 2. literature review 2.1. information technology information technology (it) is a term relating to computer and communication systems. information technology includes everything related to processes, manipulation, and information management [2]. information technology can also be interpreted as an integrated tool for capturing data, processing and sending information. information technology itself is made on the basis of science that can help various human’s jobs. utilization of information technology can helping humans, but has some negative effects so it takes wisdom for its users. information technology has a very important role in society because it can affect the attitudes, values and behaviors, and establish conditions for identity, and existence [3]. in information technology, humans have a role as makers, carriers, and receivers of information. there are several points of view related to the use of information technology on sexuality, here are 6 areas of information technology utilization on sexuality [4]: 1) pornography with the information technology, users can access both commercial and non-commercial pornography online. in addition they can also produce, distribute and discuss pornographic-related content as they want. 2) sex shop internet users can obtain information about sexual aids. internet users can also purchase those items via online. online sex shops usually concentrate on marketing non-digital products such as vibrators, condoms, aphrodisiacs, lingerie, and erotic magazines. 3) sex work the internet can be used for offline work sex marketing (such as advertising for prostitution) and on the other hand allows for new forms of online sex work (e.g. live sex via webcam, video calls and so on). in contrast to pornography that consisting of sexual texts, images, or video that have been produced previously, sex work includes real time interpersonal contact between client and sex worker. 4) sex education the internet offers much needed information, this information can be used to alter sexual awareness, attitudes, and behaviors, and also promote healthy sex. internet users can search and access information they find useful and reliable from various sources. 5) sex contacts there are 2 types of sex contacts: first, using information and communication technology intermediaries (online sex, eg via video call) and second, meet offline. information technology can be used as an intermediary to connect with each other. the difference with sex work is sex contacts not for commercial purposes. 6) sexual subculture people with non-mainstream sexual orientation or preference especially those who have difficulty finding similar minded people can easily find people who share their own orientation and preferences on the internet. sexual subculture can be easily searched for when connected to the internet. 2.2. pornografi pornography is derived from the greek word (porne and graphein). in indonesia pornography is defined as deliberate deeds associated with drawings, sketches, illustrations, photographs, writings, sounds, sounds, motion pictures, animations, cartoons, conversations, gestures, or other forms of communication through various forms of communication media or in advance shows public that contain elements of sexual abuse or exploitation. thus, anyone who presents pornographic content in any form, is automatically involved in the act of pornography. pornographic content is usually disseminated through four media, namely: issn 2614-0047 bulletin of social informatics theory and application 81 vol. 1, no. 2, december 2017, pp. 79-85 saputra et.al (social effects of digital pornography) 1) print media it prints women's drawings in sensual, transparent, open-ended, or open-totality with seductive pose with nasty papers like photography, books, posters, calendars, cards, magazines, novels, comics, other. 2) image media (visual) in the visual media is the same as the print media displaying pornographic images or paintings of women with open bodies. such as, painting, graffiti, cover design, interior, and so on. 3) audio media audio media that presents lethargic voices with interactive dialogue and broadcasts, dirty talk, sighs, tempting screams, filthy poems, and so on. this sound media is usually obtained from radio, cassette, phone, mp3, and others. 4) audio-visual image this media is a media that is very vulnerable and dangerous to the morality of the nation, because of the sophisticated technology in presenting pornographic movements that move and sound, which is very liked and easily imitated teenagers and people who are immoral and irresponsible. voice media images are commonly obtained from tv, video, vcd, widescreen movies, and others. 2.3. cyberporn cyberporn is a pornographic content that is digitally loaded. cyberporn is a term usually given on digital images, and the site that contains pornography [5]. one of the information technology that is often used to access pornographic content is internet. pornographic content spread over the internet spreads faster because it is easy to find pornographic links on search engines. cyberporn is not only accessible to adults but also underage children and is often misused by irresponsible people so, cyberporn is included in cybercrime or crime in information technology. 3. pornography damages the brain pornography affects several human hormones so that pornography can affect brain performance, the following will be discussed about hormones that are affected by pornography and its relation to the concentration of the human brain: 3.1. dopamine dopamine (da) acts as a major neurotransmitter in the brain. this hormone causes a sensation like satisfied, and happy. dopamine pathways are connected to three other keys that form a circuit called a reward system, the three keys are the amygdala (regulating positive and negative emotions), the hippocampus (processing and retrieval of long-term memory), and the frontal cortex (coordinating and defining behaviors) [6]. when dopamine in the brain increases it will activate the rewards system. rewards system is what triggers dependence on pornography. if the rewards pathway in the brain is active then when people addicted to pornography stop to see things related to pornography will feel the symptoms of anxiety, difficulty concentrating, and insomnia. 3.2. noradreanline noradrenaline is involved in various psychological functions and behaviors. one of the most important is its role in "attention" and "passion". this hormone also regulates anxiety and memory of negative perceptions [7]. this hormone causes a person who is addicted to pornography will imagine things that are not appropriate. 3.3. serotonin make a person feel comfortable when serotonin hormone out. serotonin dysfunction can lead to obsessive compulsive disorder, aggression, eating disorders, and schizophrenia and migraine headaches [7]. serotonin arises from something that provides a sense of "calm" in the body such as eating, sleeping and other activities that are considered "comfortable", including pornography because some people think pornography is entertaining that describes the effect of "calming". 82 bulletin of social informatics theory and application issn 2614-0047 vol. 1, no. 2, december 2017, pp. 79-85 saputra et.al (social effects of digital pornography) 3.4. oksitosin the hormone is secreted by the pituitary gland (located at the base of the brain) and is classified as a peptide containing 9 amino acids. these nine small amino acid peptides are involved in various physiological and pathological functions such as sexual activity, penile erection, ejaculation, pregnancy, uterine contractions, milk expulsion, maternal behavior, social bonding, stress and so on [8]. someone will love something that makes hormone oxytocin release. this causes a pornographic addict to have an inner bond with pornography so that the person always want to see pornography. because of pornography is addictive, it can cause various changes in the brain. some stages of addiction that cause brain changes include: 1) sensitization (cue-reactivity & cravings) brain circuits that engage in motivation and reward become very sensitive to memories or cues associated with addictive behaviors. this leads to an increase desire [9]. people who have been addicted to pornography (e.g. looking at pornographic images or videos), will feel not satisfied with the “pornography” thing that he usually consume and then the person will experience increased needs become more wild or more distorted. 2) desensitization (decreased reward sensitivity & tolerance) it involves long-term chemical and structural changes that make individuals less sensitive to pleasure. desensitization often manifests as tolerance, i.e. the need for high or greater dose stimulation to achieve the same response. at this stage, material that is taboo, and immoral, will become commonplace. consumers of pornography even become less sensitive to sexual violence. 3) dysfunctional prefrontal circuits distractions in prefrontal circuits in addiction not only make a person use illegal drugs but also cause misbehavior caused by addiction [10]. 4) malfunctional stress system something that can make addictions can damage the stress system because chronic addiction can induce some changes in the stress system of the brain, and also affect the circulation of stress hormones (cortisol and adrenaline). 4. information technology and pornography the existence of the internet provides the ease of accessing pornographic content causing pornography to be higher in its spread. the existence of pornography is out of control [11]. research in the united states has shown that 66% of men and 41% of women consume pornography every month [12]. this number is increasing due to the presence of pornographic content on the internet [13]. it proves technological developments also affect the spread of pornography. describing sexual explicitly and potentially stimulating activities on the internet are usually in the form of photos, videos clips and movies, comics, and text. online pornography is available on the website either for free or for a fee. in addition to erotica/soft-core and hardcore pornography, illegal pornography is the third form of explicit sexual content available online (albeit to a lesser extent). online child pornography is very difficult to find for non-sophisticated users, because child pornography is illegal in most developed countries. for this reason, child pornography is almost always sold or exchanged in a closed area and usually sold for a considerable price. on the other side, animal pornography is relatively easy to find for free because animal pornography is considered legal in some countries [4]. with the information technology, especially the internet then the user is possible to access any information including pornography, form of pornography that can be accessed also diverse with different costs as well. the pornography in digital form on the internet makes it easy for users to get pornographic content and then store it in their own devices even with a sizeable file size. 5. the effect of pornography 5.1. effect of pornography pornography can have certain effects on humans. the end result of to the use of pornography varies greatly, especially when it comes to sexual results. there are two points of view of the effects of pornography are: https://yourbrainonporn.com/rewire-your-brain-using-ocd-neuroscience#hypofrontality http://www.mc.vanderbilt.edu/reporter/index.html?id=6916 issn 2614-0047 bulletin of social informatics theory and application 83 vol. 1, no. 2, december 2017, pp. 79-85 saputra et.al (social effects of digital pornography) 1) positive impact many people report that consumption of pornography is associated with an increase in sexual life, increased sexual knowledge, and a more positive and permissive attitude about sexuality. in some other studies also mentioned that in heterosexual young men, the consumption of pornography does not seem to be related to desire, erection, or difficulty of orgasm [14]. pornography can also be used for couples to get a new model or way of making love so as to enhance the couple's sexuality life. this positive effect applies only to adults where they already have adequate education on sex. 2) negative impact use of pornography is associated with sexual effects such as compulsive sexual behavior, dependence on pornography, and risky or perverse sexual behavior [14]. the negative effect of pornography is when a person becomes dependent on pornography. pornographic addicts use pornography in the same way as alcoholics use alcohol until they numb and rise from their painful lives [15]. pornography is something very addictive to humans that will eventually happen in various things. in fact, the number of published studies is a more severe addiction to pornography than addictive addiction and psychotropic substances. pornography can also increase men's aggressive behavior towards women [16]. in addition, because of the pornography can also cause the rampant exploitation of children for sex in order to gain profits. pornography has positive and negative effects, depending on how a person use of the pornography whether someone uses it to get positive things like education about sex and satisfaction for a spouse or they use it for negative things like sex trafficking, sex crimes, etc. 5.2. cyberporn in children under age and adolescence with the existence of information technology, pornography is more easily accessible by all circles including children and adolescents. this is a separate issue related to cyberporn, which children and adolescents who are not old enough and not worth to have sex related education can access easily. the problem of cyberporn in underage children is a very important thing, which in the era is the development of the brain so that pornography will be more to damage the mindset and behavior of children under age than adults. underage child exposure to pornography is associated longitudinally with decreased academic achievement in boys, the possibility of increased early sexual initiation, and other sexual behaviors [17]. in addition to causing addiction, pornography is also progressive, as people become dissatisfied with the pornography they see, so that those who are addicted to pornography will look for more and more severely. therefore, it is not surprising that child pornography becomes extremely vicious [18]. minors do not have enough education about sex and therefore are more vulnerable to negative effects of pornography than adults. many adults worry that "pornographic content" will cause trauma for minors. the problem of cyberporn in adolescence is the age at which the level of curiosity is very high, one of them against things related to sex. however, in adolescence, they are usually still embarrassed to ask their parents about sex so they can find out directly through the internet that can lead to a misconception about sex education, so that students can get caught up in aberrant sexual behavior. in adolescence, they usually get information about sex with friends, by discussing together, reading sex material books or doing extreme ways to experiment with masturbation, scratching or even worse is having sex. it will later have a negative impact, rape and others. 6. cyberporn prevention effort indonesia has made various efforts to minimize the effects of cyberporn that will occur. efforts to prevent the impact of cyberporn done by various parties, either by the government, the family, as well as other relevant parties. this is some precautions that can be done:  making the cyberporn act. this effort is one of the efforts made by the government. the goal is that cyberporn can be controlled, at least will provide a sense of security for internet users and put pressure on the elements who are not responsible for pornographic content on the internet. the form of realization is law no. 44 of 2008 on pornography that has been made by the government. 84 bulletin of social informatics theory and application issn 2614-0047 vol. 1, no. 2, december 2017, pp. 79-85 saputra et.al (social effects of digital pornography)  blocking pornographic sites. this is another way the government makes pornographic websites not easily accessible from the internet. this is considered a powerful way to minimize pornographic content on the internet. however, because of the large number of pornographic websites that exist on the internet, it will make the government trouble and takes a long time.  film censorship. the government of indonesia requires every film producer or advertisement to censor the pornographic stuff in its products. later, the indonesian censorship (lembaga sensor indonesia) agency will provide a recommendation decision that the impression may be published for public.  supervise underage children. providing supervision of children is a task of parents. supervision aims to prevent children from falling into forbidden acts. always communicating with children is also one of the ways that parents can make it so that children are always under surveillance. if you have to introduce gadgets or other technological devices to minors, then parents should keep an eye on them.  providing education related sex. provision of education about sex is very necessary especially when someone is stepping on adolescence. adolescence is often known as the time to seek identity or called the identity of the ego (ego identity). this happens because adolescence is a transitional period between the life span of children and adult life span. 7. conclusion technology has made the spread of pornographic content even easier. pornographic content more easily to get from various countries with various genres, either free or paid. manufacturers of pornography often use the internet to market its products either paid or free. of course, this raises concerns for internet users in the world including in indonesia. as discussed in this journal, pornography can have a detrimental effect on the audience, one of which is the worst affected brain performance which is the brain will experience several stages of change such as, sensitization, desensitization, dysfunctional prefrontal circuits, and malfunction stress system. however, the pros and cons of pornography still occur. for the pros, consumption of pornography is associated with an increase in sexual life, increased sexual knowledge, and a more positive and permissive attitude about sexuality. pornography can also be used for couples to get a new model or way of making love so as to enhance the couple's sexuality life. this positive effect applies only to adults which they already have adequate education on sex. as for the counter, assume that the use of pornography is associated with adverse sexual effects such as compulsive sexual behavior, dependence on pornography, and risky or distorted sexual behavior. pornography is something that is very addictive for humans that will eventually affect in various things. in fact, pornography addiction is more severe than addictive substance addiction and psychotropic. pornography can also increase men's aggressive behavior towards women. in addition, because of the pornography can also lead to the rampant exploitation of children for sex in order to gain profits. in indonesia, pornography is strictly prohibited. pornography is considered to damage the morale of the next generation of the nation. some efforts that can be done to minimize the existence of pornography either done by the government of indonesia, family, as well as other related parties are making laws that regulate pornography, blocking pornographic sites, providing early childhood sex education, and the role of parents in supervising their children. references [1] p. f. fagan, “the effects of pornography on individuals, marriage, family, and community,” marriage & religion research institute. pp. 1–26, 2009. [2] v. venkatesh, m. g. morris, g. b. davis, and f. d. davis, “user acceptance of information technology: toward a unified view,” j. chem. inf. model., vol. 27, no. 3, pp. 425–478, 2013. [3] i. karlsson, “ethics and information and communication technology,” ifac proc. vol., vol. 36, no. 22, pp. 75–80, 2003. [4] n. m. döring, “computers in human behavior the internet ’ s impact on sexuality : a critical review of 15 years of research,” comput. human behav., vol. 25, no. 5, pp. 1089–1101, 2009. [5] r. h. potter and l. a potter, “the internet, cyberporn, and sexual exploitation of children: media moral panics and urban myths for middle-class parents?,” sex. cult., vol. 5, no. 3, pp. 31–48, 2001. issn 2614-0047 bulletin of social informatics theory and application 85 vol. 1, no. 2, december 2017, pp. 79-85 saputra et.al (social effects of digital pornography) [6] t. love, c. laier, m. brand, l. hatch, and r. hajela, “neuroscience of internet pornography addiction: a review and update,” behav. sci. j., vol. 5, no. 1, pp. 388–433, 2015. [7] a. uppala, “international journal of recent scientific research,” int. j. recent sci. res., vol. 6, no. 10, pp. 6632–6636, 2015. [8] n. magon and s. kalra, “the orgasmic history of oxytocin: love, lust, and labor,” indian j. endocrinol. metab., vol. 25, no. suppl3, pp. 156–161, 2011. [9] t. e. robinson and k. c. berridge, “the incentive sensitization theory of addiction : some current issues,” philos. trans. r. soc. london b biol. sci., vol. 363, no. 1507, pp. 3137–3146, 2008. [10] r. z. goldstein and n. d. volkow, “dysfunction of the prefrontal cortex in addiction: neuroimaging findings and clinical implications,” nat rev neurosci, vol. 12, no. 11, pp. 652–669, 2012. [11] d. zillmann and j. bryant, “pornography and sexual callousness, and the trivialization of rape,” j. commun., vol. 32, no. 4, pp. 10–21, 1982. [12] s. kühn and j. gallinat, “brain structure and functional connectivity associated with pornography consumption: the brain on porn,” jama psychiatry, vol. 71, no. 7, pp. 827–834, 2014. [13] j. wolak, k. mitchell, and d. finkelhor, “unwanted and wanted exposure to online pornography in a national sample of youth internet users,” pediatrics, vol. 119, no. 2, pp. 247–257, 2007. [14] s. blais-lecours, m. p. vaillancourt-morel, s. sabourin, and n. godbout, “cyberpornography: time use, perceived addiction, sexual functioning, and sexual satisfaction,” cyberpsychology, behav. soc. netw., vol. 19, no. 11, pp. 649–655, 2016. [15] r. p. cox and m. d. howard, “utilization of emdr in the treatment of sexual addiction: a case study,” sex. addict. compulsivity, vol. 14, no. 1, pp. 1–20, 2007. [16] d. o. yang and g. youn, “effects of exposure to pornography on male aggressive behavioral tendencies,” open psychol. j., vol. 5, no. 1, 2012. [17] e. f. rothman, j. paruk, a. espensen, j. r. temple, and k. adams, “a qualitative study of what us parents say and do when their young children see pornography,” acad. pediatr., vol. 17, no. 8, pp. 844– 849, 2017. [18] b. h. schell, m. v. martin, p. c. hung, and l. rueda, “cyber child pornography: a review paper of the social and legal issues and remedies—and a proposed technological solution,” aggress. violent behav., vol. 12, no. 1, pp. 45–63, 2007. bulletin of social informatics theory and application issn 2614-0047 vol.4, no.2, september 2020, pp. 40-51 40 https:doi.org/10.31763/businta.v4i2.266 gadget and adolescent: its effect depiction on daily life roni herdianto a,1,*, dzikra syahidin b,2 a postgraduate, universitas negeri malang, malang, indonesia b smpit al-hikmah, blitar, indonesia 1 roni.herdianto@um.ac.id*; 2 syahidindzikra@gmail.com * corresponding author 1. introduction the recent development of information and telecommunication technology these days has promoted a radical and wide-ranging adjustment of human social life. one of the notable developments of information and communication technology is a development of internet and gadget. these days, it is mainstream for young adulthood or adolescence to have their own gadgets such as smartwatch, smartphone, tablet, virtual reality-augmented reality device, wearable android device, and so forth. nowadays, the young adulthood and adolescence, commonly called millennial generation, are inseparable from any gadget in their daily life [1]–[3]. such phenomena also occurs among indonesian young adulthood; they seem unable to live without their gadget [2], [4], [5]. indonesian association for internet service providers reported that around 64.8% of indonesians are active internet user [4]. information and communication ministry has revealed that the internet users in indonesia reached 63 million people and a number of 95% used internet connection to access social media [2]. furthermore, from a number of 63 million, 80% of the internet users are the young adulthood; to access educational content, entertainment, online shopping, social media and so forth [2], [6]. among the diverse types of gadget, smartphone is the most preferable gadget due to its practicality and convenience [2], [4]. during its development, internet connection does not only aim at supporting educational or learning processes as well as trading activities. into the bargain, internet connection plays a role as a primary channel of communication which we commonly refer to social media. when using internet, young adulthood mostly accesses social media. at that point in time, facebook is the most used social media followed by instagram, whatsapp, twitter, and so forth [2], [4]. a r t i c l e i n f o a b s t r a c t article history received june 13, 2020 revised july 1, 2020 accepted july 28, 2020 adolescence and gadget are inseparable these days. this research aimed at describing the characteristics of gadget user and social-religious aspect influence. this research employed descriptive qualitative method. the researchers took a role as an observer dan data collector. this research was conducted on junior high school x. it took 39 male students as the subject. the data collection was done by distributing the questionnaire. the questionnaire consisted of 14 items. the data obtained were arranged based on the discussion category. the findings explained: (1) the characteristics of adolescences in junior high school x as the gadget user, gadget ownership characteristics, usage duration, how to obtain internet access, internet use, the most used application; (2) the influence of gadget use on the social life such as pornographic content, social interaction, studying concentration, and religious aspect of the adolescence. this research concludes that, based on the characteristics of the users, gadget provides both negative and positive impact. furthermore, it is crucial to have attention and guidance by the related stakeholders to be concerned about the mental health of the adolescence as well as the social-religious aspects. this is an open access article under the cc–by-sa license. keywords gadget user adolescence social-religious aspect http://creativecommons.org/licenses/by-sa/4.0/ http://creativecommons.org/licenses/by-sa/4.0/ issn2614-0047 bulletin of social informatics theory and application 41 vol.4, no.2, september 2020, pp. 40-51 herdianto & syahidin (gadget and adolescent: its effect depiction on the daily life) a more targeted and specific search for news on google by entering the keyword "teenager internet" found around 48,900 results and most of it was news about the use of the internet by teens around the world that was positive and negative. examples of positive news related to internet are to use internet for communicating, seeking information, and educational purposes. while examples of negative news are about pornography, hacking, wiretapping, drug transactions, terrorism, fraud and so forth. if the keyword typed "teenagers’ social media", it found 18,200 results. the results were mostly dominated by the impacts of the use of social media on adolescents, both negative and positive. some examples of the social impact of using gadgets are as follows. research conducted by lestari mentioned the use of gadgets to influence patterns of social interaction in the family as a whole [3]. research on adolescents in russia and germany explained that interference due to playing games on the internet had been shown to reduce adolescent mental health [7], [8]. the last example was a study conducted by several researchers in the uae and indonesia and concluded the negative impact of gadget addiction. the research revealed that children tend to be individualistic, difficult to get along with, difficult to control the use of gadgets and consequently, it obstructs the development of the brain [9], [10]. preliminary studies conducted by researchers revealed that the adolescents used as the object of research were 84.6% having personal gadgets; 53.8% of them own gadgets over 2 years; 51.3% of them using gadgets for 1-5 hours/day; 59% get internet access by using wi-fi. this research is important because it is a common problem throughout the world regarding teenagers. the information obtained from the results of the study is used as a reference for handling the next step, especially in anticipating the negative impact of the use of gadgets by adolescents in their daily lives. although there have been many articles that discuss the effect of gadgets on adolescent social life, in particular there have not been many articles that describe the impact of the use of gadgets in adolescent social-religious life based on religious views. this study aims to describe the characteristics of gadget users and the impact of using gadgets on the social-religious life of adolescent at x junior high school in their daily lives. 2. method this research employed a qualitative research design and used a descriptive approach that aimed at describing and interpreting the object of the study according to the obtained fact in the field. this research aimed at depicting the impact of gadget use on the social life of adolescences at junior high school x in detail [11]. during this research, the researchers took a role as an observer and data and information collector from the respondents. this research was conducted at junior high school x. the data collection was conducted between 9th until 10th october 2019 around 09.30-10.00 indonesian western standard time (utc+07.00). the data were collected through a descriptive questionnaire. to obtain a more comprehensive findings, this research used a descriptive questionnaire that enables the presence of the researchers during the interview. the data were collected directly from the distribution of questionnaire to the subject of the research. it tools 39 male adolescences of junior high school x. the questionnaire consisted of 14 items. the items given were related to the user profile in using internet, the use of internet, pornographic content access, social relation with other gender and parents, its effect on the learning concentration and quran recitation, children responses on adzan (prayer calling), as well as the frequency and convenience of interactions with gadgets when compared to direct social interactions the obtained data were then arranged according to the category of findings in the discussion part. the results and discussions obtained have a systematic arrangement and are related to one another. a conclusion is drawn up after a comprehensive discussion has been made. 3. results based on the data collection that has been done, it obtained answers from 39 respondents (21 respondents in class 8b and 18 respondents in class 8c) to the 14 questions given. 42 bulletin of social informatics theory and application issn2614-0047 vol.4, no.2, september 2020, pp. 40-51 herdianto & syahidin (gadget and adolescent: its effect depiction on the daily life) the results of recapitulation of answers to questions about gadget ownership by 39 respondents is presented in fig. 1. fig. 1. question 1 recapitulation results fig. 1 shows that private ownership of gadget among adolescence at junior high school x ranks the highest; amounted to 33 or 84.6%. the rest of the respondents do not own the gadget by themselves. then, the following fig. 2 illustrates how long they own the gadget from the 39 research subjects. fig. 2. question 2 recapitulation results fig. 2 illustrates that most adolescences at junior high school x own gadget more than 2 years. the number was 21 or 53.8%. meanwhile, only three adolescences at junior high school x own gadget less than a year (7.7%). then, the following fig. 3 depicts the duration of gadget use in the daily life by the 39 research subjects. fig. 3. question 3 recapitulation results fig. 3 illustrates that most adolescences at junior high school x use gadget from three to five hours a day. the number was 17 or 43.6%. meanwhile, only two adolescences at junior high school x use gadget less than an hour (5.1%). then, the following fig. 4 depicts how the 39 research subjects were connected to the internet. personal gadget others (parents, friend, ets) have no gadget less than a year 1-2 years more than two years less than an hour 1-3 hours 3-5 hours issn2614-0047 bulletin of social informatics theory and application 43 vol.4, no.2, september 2020, pp. 40-51 herdianto & syahidin (gadget and adolescent: its effect depiction on the daily life) fig. 4. question 4 recapitulation results based on fig. 4, it shows that the connection access acquired by the adolescence at junior high school x. amounted to 23 or 59% adolescences at junior high school used wi-fi connection. the least number was two adolescences who acquired internet connection from peer-tethering connection (5.1). then, the following fig. 5 illustrates how they use their own the gadget from the 39 research subjects. fig. 5. question 5 recapitulation results fig. 5 illustrates that most adolescences at junior high school x use their gadget for accessing social media. the number was 32 or 82.1%. meanwhile, only 11 adolescences at junior high school x use gadget for having an online transaction (5.1%). then, the following fig. 6 depicts the social media that is accessed by the 39 research subjects. fig. 6. question 6 recapitulation results fig. 6 illustrates that most adolescences at junior high school x use their gadget for accessing whatsapp. the number was 37 or 94.9%. meanwhile, only two adolescences at junior high school x use gadget for accessing line (5.1%). then, the following fig. 7 depicts the use of gadget on the learning concentration among the 39 research subjects. personal quota wi-fi tethering studying online games/entertainment social media communication information searching online transaction others (mention..) 44 bulletin of social informatics theory and application issn2614-0047 vol.4, no.2, september 2020, pp. 40-51 herdianto & syahidin (gadget and adolescent: its effect depiction on the daily life) fig. 7. question 7 recapitulation results according to fig. 7, it illustrates that the concentration of studying of the subject at junior high school x was slightly influenced using gadget. the number was 18 or 46.2%. meanwhile, only eight adolescences at junior high school x confirmed that their concentration of studying was significantly influenced. then, the following fig. 8 depicts the frequency of accessing pornography content among the 39 research subjects. fig. 8. question 8 recapitulation results according to fig. 8, it illustrates that the frequency of accessing the pornography content by the subject at junior high school x. around 21 students seldom accessed the pornography content using internet (53.8%). only three students that had never been accessed the pornography content (7.7%) then, the following fig. 9 depicts the frequency of using their gadget for contacting the other gender friends among the 39 research subjects. fig. 9. question 9 recapitulation results fig. 9 indicates that most of the subjects from junior high school x seldom contacted their other gender friends by using their gadget. it was 22 subjects or 56.4%. meanwhile, eight subjects (20.5%) confirmed that they have never contacted their other gender friends by using their gadget. not influenced slightly influenced significantly influenced frequently sometimes never frequently sometimes never issn2614-0047 bulletin of social informatics theory and application 45 vol.4, no.2, september 2020, pp. 40-51 herdianto & syahidin (gadget and adolescent: its effect depiction on the daily life) further, fig. 10 illustrates the answer results from the 39 subjects regarding the question whether they were bothered when their parents or friends asked for a help when they were using their gadget. fig. 10. question 10 recapitulation results fig. 10 indicates that most of the subjects from junior high school x were using their gadget. it was 22 subjects or 56.4%. meanwhile, eight subjects (20.5%) confirmed that they have never contacted their other gender friends by using their gadget. further, fig. 11 illustrates the answer results from the 39 subjects when they were not using their gadget. fig. 11. the question 11 recapitulation results fig. 11 above explains that the most subject did other activity(s) when they were not playing with their gadget. there were 19 adolescences at junior high school x who answered or approximately 50%. meanwhile, there were six subjects that tend to think of their gadget while doing another activity (15.8%). the next question was “which one do you prefer the best, playing gadget at your house or playing outside with your friends?”. the answers provided by the 39 respondents are illustrated in the fig. 12. fig. 12. the question 12 recapitulation results not disturbed slightly disturbed very disturbed cannot stay away from the gadget leaving a few moments by doing other activities doing another activities and sometimes think of the gadget doing another activities and completely forget the gadget playing with gadget playing outside not both 46 bulletin of social informatics theory and application issn2614-0047 vol.4, no.2, september 2020, pp. 40-51 herdianto & syahidin (gadget and adolescent: its effect depiction on the daily life) fig. 12, shows that the 29 subjects at junior high school x chose to play outside with their friends rather than playing their gadget at the home (76.3%). meanwhile, only one subject did not chose both options (2.6%). the following fig. 13 illustrates the response of the subject when they listened to the adzan (prayer calling) while playing their gadget. fig. 13. the question 13 recapitulation results fig. 13 shows that the 19 subjects at junior high school x chose to directly go to mosque right after listening the prayer calling (50%). meanwhile, only two subject chose to finish the game first instead of doing their religion responsibility (5.3%). fig. 14 illustrates the response of the subject regarding the influence of gadget use on their holy quran recitation activity. fig. 14. the question 14 recapitulation results based on fig. 14, there were 17 subjects at junior high school x who explained that the use of gadget slighlty influenced their holy quran recitation activity (44.7%). meanwhile, only one subject who explained that the use of gadget significantly influenced the holy quran recitation activity (2.6%). 4. discussions 4.1. the characteristics of gadget use the findings of this research confirmed that 84.6% adolescences at junior high school x own personal gadget (fig 1). in addition, the adolescences who own personal gadget for more than two years was 53.8% (fig. 2). internet safety expert from ohio, jesse weinberger explains that parents shouldn't buy their kids mobile phone [12]. these days, it is inevitable that smartphone is the new addictive stuff that distract child’s development [13], [14]. therefore, parents need to have careful consideration before deciding to buy their kids a mobile phone to avoid its negative impact in the near future. according to the findings, the highest daily average use of gadgets among adolescences at junior high school x was 1-3 hours (amounted to 51.3%) and as much as 43.6% of them used gadget from 3-5 hours a day (fig. 5). american academy of pediatrics (aap) suggests that children 12-15 years old should maximally spent 2 hours a day to play their gadget [15]. benger et al. and paiva et al., explain that the duration spent by children in playing their gadgets or accessing internet is closely related to the physical and mental health [16], [17]. other research conducted by hepilita and gantas; saquib; and muthukrishnan has confirmed that there is a significant correlation between the immediately go to the mosque postponing for a while since the game is not over yet continuing the game after the congregational prayer are finished finish the games first not influenced slightly influenced influenced significantly influenced issn2614-0047 bulletin of social informatics theory and application 47 vol.4, no.2, september 2020, pp. 40-51 herdianto & syahidin (gadget and adolescent: its effect depiction on the daily life) duration of accessing social media and children’s sleep in pattern disorder [18]–[20]. based on the recommendation of aap, then the duration spent by the subjects of this research have exceeding the limit. when the adolescences of junior high school x spent their hour intensively to interact with their gadget which exceed the duration recommended, it obstructs their mental and physical health. thus, it requires parental and teacher guidance related to the gadget use among adolescences at junior high school x. not to mention, an education related to how to appropriately use gadget by school and a strict regulation imposed with relevant punishment are needed. then, based on the obtained findings, the subjects are commonly connected by using wi-fi (59%) and it is followed by personal internet data quota as much as 51.3% and peer-tethering connection as much as 5.1% (fig. 4). it is in line with the survey conducted by ministry of communication and information of indonesia confirming that wi-fi is the most widely used connection [2]. meanwhile, the results of the recapitulation of answers about the use of internet access by the adolescences at junior high school x are shown in fig. 5. the social media platform that is often used by the adolescences at junior high school x is whatsapp (fig. 6). data from hootsuite mentions the highest use of social media is whatsapp then it is followed by facebook, instagram, twitter, etc. [5]. in contrast to the results of the hootsuite survey, apjii and the ministry of communication and information confirmed that facebook and instagram into the most visited social media [2], [4]. based on apjii and the ministry of communication and information survey data and research that has been done, social media plays an important role in the social life of the community, especially teenagers these days. it is necessary to have good time management and discipline so that the social life of adolescents with their environment is balanced [20]. 4.2. the impact of using gadgets on social aspects 1) studying concentration aspects based on the data obtained from the study, it states that there is slight influence of the use of gadgets on the studying concentration among adolescences in junior high school x (fig. 7). this finding can be explained by the fact that the adolescences in junior high school x have been able to manage the time between studying and using their gadgets thus they do not interfere much with the learning process. in contrast, there were eight children (20.5%) who stated that gadgets influence the concentration of studying (fig. 7). research conducted [21], mentions that the adolescences in junior high school x who rarely use gadgets will have high achievements [21]. whereas hedge et al. stated that the adolescences in junior high school x who like to use gadgets will have difficulty concentrating thereby reducing their learning achievement [22]. from these two studies there is a very close correlation between the use of gadgets and student's learning achievement in schools. it is necessary to have the role of parents and the school in supervising the use of gadgets by adolescents both at home, school, and social environment to avoid the interference of studying concentration and learning achievement. 2) the influence of pornographic content according to who, the age standard of adolescence is between 10-19 years old [22]. during this phase, adolescence will have a significant changing in terms of sexual attraction and motivation to the other gender [23]. the development of body parts related to sexual as well as the hormones lead to a sexual attraction among adolescences [24]. no exception for adolescences in junior high school x, since most of them own gadgets (amounted to 84.6%), then it is probable that the negative effects of the internet will be easily accessed by them, either intentionally or not accessing pornographic content. this was proven as many as 53.8% of the adolescences in junior high school x who sometimes accessed pornographic content and as many as three people often accessed pornographic content (fig. 8). it is in line with the results of a survey on the use of ict by research and development institute of the ministry of communication and information which states that around 74% of pornography becomes negative content that is often found when accessing online media [2]. the most paramount effect of pornographic content addiction is the obstruction of thinking ability that will further influence the thinking process such as memorizing and recalling the stored memory in the brain [25], [26]. the thinking process of adolescence will be obstructed and it further show a regression in thinking, processing information, and paying attention to certain task [27]. 48 bulletin of social informatics theory and application issn2614-0047 vol.4, no.2, september 2020, pp. 40-51 herdianto & syahidin (gadget and adolescent: its effect depiction on the daily life) the findings of this study mention that sometimes a number of 22 adolescences in junior high school x used their gadget to contact their other gender classmates (56.4%) and nine adolescences in junior high school x frequently contact their other gender classmates using their gadget (23.1%) (fig 9). the communication of adolescence between two different genders is inevitable. however since the influence of pornographic content these days is unavoidable, the relationship of different gender among adolescence will have greater negative impact such as the possibility of promiscuity [6], [28]. the role of religion teacher in this context is vital to give comprehensive guidance based on religious values as an attempt to prevent the negative impact [29]. to avoid any negative impact from the relationship of different genders such as promiscuity and the negative effect of pornographic content, it is important for every individual to hold on the word of the almighty allah :as follows هلالج لج ”tell the believing men to reduce [some] of their vision and guard their private parts. that is purer for them. indeed, allah is acquainted with what they do.”[qs.an-nur: 30] 3) social relation aspect the results of this study indicate that as many as 61.5% of teenagers in smp x felt undisturbed when using gadget and their parents or friends ask for help (fig 10). this shows that most of the adolescences in junior high school x have good social interactions and sympathy towards others [30]. furthermore, good communication is indicated by empathy [31], [32]. meanwhile, there were two adolescences in junior high school x who were very disturbed. this further shows a symptom of addiction and dependence with gadget. alifiani said that changes in communication patterns in adolescents were influenced by the use of gadgets and tended to ignore the presence of people around when operating gadgets [32]. an individual who considers gadget as his/her vital stuff and ignores his/her surrounding environment is a symptom of antisocial behaviour [33]. when an individual has less interaction with his/her surrounding environment, he or she will be difficult to have social life. this research also confirmed that most of the adolescences in junior high school x could not stay away from their gadget while doing another activity (as much as 50%) (fig. 11). in addition, some of them tended to choose to play with their gadget instead of playing with their friends (23.7%) (fig. 12). these findings further affirm that they tend to be addicted to gadget. this is in line with the research conducted by hasanah which conclude that the use of gadget among the children influences the physical and psychological aspects for instance avoiding social interaction with their surrounding environment, having relatively bad relationship with the parents, easily feel bored, and having less attention and concentration when doing certain task in the real life [34]. 4) religious aspect the other negative impact from the use of gadget is also caused by the online/offline games [35]. the findings of this research confirm that some of the adolescences in junior high school x (50%) directly put down their gadget the moment they heard the prayer calling. meanwhile several 44.7% subject postponed their responsibility and continued to play. then, a few 5.3% of the subjects remained playing and did not perform their obligation to pray (fig. 13). based on this finding, it is assumed that the most subjects do not have a tendency of being gadget addict. only two subjects that are being a gadget addict since they completely postponed their obligation due to mobile game. this is in line with lee et al. which explain that a gadget addict individual has some issues regarding his/her mental health, one of them is bad attention to the surrounding. when an individual having a relatively bad attention to the surrounding, he/she will have insignificant sensitivity, as a result, when the prayer calling is echoed, he/she ignores it. besides, this research affirms that the intense use of gadget by the adolescences negatively influences on the holy quran recitation they progress (15.8%) (fig. 4). this is due to the degradation of brain function; the brain will have limited function when working. rapid information spreading through media that is received continuously influences the ability to have good concentration and memorization [37], [38]. it is further concluded that the six subjects in this research who answered that the gadget significantly influence their concentration have an intense use of gadget (more than two hours a day). consequently, it significantly influences the quality of learning and concentration when reciting the holy quran. issn2614-0047 bulletin of social informatics theory and application 49 vol.4, no.2, september 2020, pp. 40-51 herdianto & syahidin (gadget and adolescent: its effect depiction on the daily life) excessive use of gadgets is also not appropriate in the islamic view, because it has negative consequences for the religious life of adolescents as described above. in the qur'an and the hadith of the prophet muhammad ملسو هيلع هللا ىلص is mentioned: “….. do not prohibit the good things which allah has made lawful to you and do not transgress. indeed, allah does not like transgressors” [qs. al ma’idah: 87] “among the goodness of islam is to leave something that is not useful” [hadith by tirmidzi no. 2317, ibnu majah no. 3976] 5. conclusion the conclusions of this study are as follows. first, the characteristics of the use of gadgets by adolescences in junior high school x is most of them have personal gadgets more than two years; the duration of using gadget is between 1-5 hours/day; most of them use wi-fi to connect to the internet; most of them use internet for accessing social media; and whatsapp is the most used application for social media. second, the impact of the use of gadgets on the social aspects of adolescences in junior high school x is as follows. 1) effects of pornography; most of them have accessed pornographic content, even three people often access pornographic content. 2) most of the adolescences in junior high school x have good and balanced social interaction with their environment, but there are two people who have symptoms of gadget addiction. 3) most of the adolescences in junior high school x are likely not affected by the presence of gadgets in terms of studying concentration. 4) most of the adolescences in junior high school x have good spiritual aspect, it is proven by the answer provided by them explaining that they immediately pray when they are hearing the prayer call, and most of them have insignificant effect on holy quran recitation. even so, there are a small number of adolescences in junior high school x requiring the attention and guidance of parents and teachers because of the possibility of addiction to gadgets that can affect their mental health and social-spiritual life. references [1] a. k. sherlyanita and n. a. rakhmawati, “pengaruh dan pola aktivitas penggunaan internet serta media sosial pada siswa smpn 52 surabaya,” j. inf. syst. eng. bus. intell., vol. 2, no. 1, pp. 17–22, 2016. [2] kementerian komunikasi dan informatika, “buku saku penggunaan teknologi informasi dan komunikasi serta implikasinya terhadap aspek sosial dan budaya masyarakat tahun 2018.” badan penelitian dan pengembangan sdm, jakarta, 2018. [3] i. lestari, a. w. riana, and b. m. taftazani, “pengaruh gadget pada interaksi sosial dalam keluarga,” pros. penelit. dan pengabdi. kpd. masy., vol. 2, no. 2, pp. 147–300, 2015. [4] apjii, “laporan survei: penetrasi dan profil perilaku pengguna internet indonesia.” jakarta, 2019. [5] h. hootsuite, “digital 2019: indonesia.” 2019. [6] h. indrijati, “penggunaan internet dan perilaku seksual pranikah remaja,” pros. temu ilm. nas. x ikat. psikol. perkemb. indones., vol. 1, 2017. [7] e. a. makarova and e. l. makarova, “aggressive behavior in online games and cybervictimization of teenagers and adolescents,” int. electron. j. elem. educ., vol. 12, no. 2, pp. 157–165, 2019. [8] l. wartberg, l. kriston, k. kegel, and r. thomasius, “adaptation and psychometric evaluation of the young diagnostic questionnaire (ydq) for parental assessment of adolescent problematic internet use,” j. behav. addict., vol. 5, no. 2, pp. 311–317, 2016. [9] s. al majali, “the digital world for children and its relationship with personality disorders: exploring emerging technologies,” int. j. emerg. technol. learn., vol. 15, no. 01, pp. 213–221, 2020. [10] k. m. master, c. p. kaur, a. narasimhan, n. mizrab, m. ali, and r. b. shaik, “impact of electronic gadgets on psychological behavior of middle school children in uae,” uni emirates arab. gulf med. j., vol. 5, no. s2, pp. s54–s60, 2016. 50 bulletin of social informatics theory and application issn2614-0047 vol.4, no.2, september 2020, pp. 40-51 herdianto & syahidin (gadget and adolescent: its effect depiction on the daily life) [11] j. w. creswell and j. d. creswell, research design: qualitative, quantitative, and mixed methods approaches. sage publications, 2017. [12] i. d. a. d. putra and f. rahmawati, “educating smartphone use in early childhood, through designing parenting books illustrations,” in 6th bandung creative movement 2019, 2019, pp. 34–38. [13] a. a. h. putri and h. khairunnisa, “the relationship of family function and social media addiction among adolescents,” 2019. [14] h. a. rosyid, e. fajariani, h. adhilaga, and a. amalia, “the online game addiction psychology and interpersonal relationship of the engineering students,” bull. soc. informatics theory appl., vol. 3, no. 2, pp. 75–79, 2019. [15] j. falbe, b. rosner, w. c. willett, k. r. sonneville, f. b. hu, and a. e. field, “adiposity and different types of screen time,” pediatrics, vol. 132, no. 6, pp. e1497–e1505, 2013. [16] r. e. bélanger, c. akre, a. berchtold, and p.-a. michaud, “a u-shaped association between intensity of internet use and adolescent health,” pediatrics, vol. 127, no. 2, pp. e330–e335, 2011. [17] t. paiva, t. gaspar, and m. g. matos, “sleep deprivation, sleep stealers and risk behaviors in portuguese adolescents-a cross-cultural comparison,” moj public heal., vol. 3, no. 1, p. 49, 2015. [18] y. hepilita and a. a. gantas, “hubungan durasi penggunaan media sosial dengan gangguan pola tidur pada anak usia 12 sampai 14 tahun di smp negeri 1 langke rembong,” wawasan kesehat., vol. 3, no. 2, pp. 78–87, 2018. [19] j. saquib, “social ecological model as a framework for understanding screen time and sedentary behavior among arab adolescents,” int. j. health sci. (qassim)., vol. 12, no. 3, p. 1, 2018. [20] j. muthukrishnan, “gadgets, sleep and obesity,” praxis (bern. 1994)., vol. 1, no. 1, 2018. [21] b. manumpil, a. y. ismanto, and f. onibala, “hubungan penggunaan gadget dengan tingkat prestasi siswa di sma negeri 9 manado,” j. keperawatan, vol. 3, no. 2, pp. 1–6, 2015. [22] p. l. p. rori, “pengaruh penggunaan minuman keras pada kehidupan remaja di desa kali kecamatan pineleng kabupaten minahasa,” holistik, j. soc. cult., vol. 8, no. 17, pp. 1–12, 2016. [23] d. imawati and m. t. sari, “studi kasus kecanduan pornografi pada remaja,” motiv. j. psikol., vol. 1, no. 2, pp. 56–62, 2019. [24] r. bhattacharyya, “addiction to modern gadgets and technologies across generations,” east. j. psychiatry, vol. 18, no. 2, 2017. [25] r. de alarcón, j. i. de la iglesia, n. m. casado, and a. l. montejo, “online porn addiction: what we know and what we don’t—a systematic review,” j. clin. med., vol. 8, no. 1, p. 91, 2019. [26] m. f. a. saputra, s. a. siregar, and z. n. izdihar, “social effects of digital pornography,” bull. soc. informatics theory appl., vol. 1, no. 2, pp. 79–85, 2017. [27] a. m. rajab et al., “gaming addiction and perceived stress among saudi adolescents,” addict. behav. reports, p. 100261, 2020. [28] l. k. rizki and r. amalia, “analysis of factors affecting sexual behavior in adolescents in the porong health center work area,” j. heal. sci., vol. 12, no. 02, pp. 36–44, 2019. [29] n. l. al-adawy, “peran guru pendidikan agama islam dalam mencegah perilaku seks bebas di smpn 2 ngantang malang.” universitas islam negeri maulana malik ibrahim, 2019. [30] s. w. sarwono, psikologi remaja, revisi. jakarta: rajawali press, 2011. [31] a. abu and s. munawar, psikologi perkembangan. jkarta: rineka cipta, 2005. [32] h. alifiani, n. nurhayati, and y. ningsih, “analisis penggunaan gadget terhadap pola komunikasi keluarga,” faletehan heal. j., vol. 6, no. 2, pp. 51–55, 2019. [33] j. a. heerde, a. curtis, j. a. bailey, r. smith, s. a. hemphill, and j. w. toumbourou, “reciprocal associations between early adolescent antisocial behavior and depressive symptoms: a longitudinal study in victoria, australia and washington state, united states,” j. crim. justice, vol. 62, no. mayjune, pp. 74–86, 2019. issn2614-0047 bulletin of social informatics theory and application 51 vol.4, no.2, september 2020, pp. 40-51 herdianto & syahidin (gadget and adolescent: its effect depiction on the daily life) [34] m. hasanah, “pengaruh gadget terhadap kesehatan mental anak,” indones. j. islam. early child. educ., vol. 2, no. 2, pp. 207–214, 2017. [35] n. saquib et al., “video game addiction and psychological distress among expatriate adolescents in saudi arabia,” addict. behav. reports, vol. 6, pp. 112–117, 2017. [36] s. setianingsih, “dampak penggunaan gadget pada anak usia prasekolah dapat meningkatan resiko gangguan pemusatan perhatian dan hiperaktivitas,” gaster, vol. 16, no. 2, pp. 191–205, 2018. [37] s. a. murtaza, “digital heroin the impact of digital gadgets on developing minds an empirical study on growing children of lahore,” in international conference on management, business & technology (icmbt), 2017, pp. 303–309. bulletin of social informatics theory and application issn 2614-0047 vol. 5, no. 1, march 2021, pp. 71-81 71 https:doi.org/10.31763/businta.v5i1.460 user generated content: cybernetic infographic visual narrative sufiana a,1,*, santosa soewarlan b,2, sumbo tinarbuko b,3 a department of design of visual communication, faculty of design, institut sains dan teknologi terpadu surabaya, surabaya, indonesia b institut seni indonesia, surakarta, indonesia 1 sufianaa@stts.edu *; 2 santosa.isisolo@gmail.com; 3 sumbotinarbuko @gmail.com * corresponding author 1. introduction a lot of content is presented to attract visitors. ranging from simple chats, video conferencing, email exchanges, blogs and discussion groups [1], [2]. content created and published by cyber media users is called user generated content (ugc). user generated content through discussion or content uploads can give the effect of awareness of an information for readers [3]. content can be made for personal, community, corporate, and online mass media. haibunda.com is one of ugc providers, which has contents that narrate about parenting, pregnancy, birth, breastfeeding, through verbal-visual language with the segmentation of millennial mothers. “tahukah bunda” is one of the infographic themes found on the infographics channel. apart from several infographic themes, it is also equipped with a comment column for readers to respond and comment on. readers can access directly to instagram, youtube, and twitter. millennial mothers are the generation born between1980-1999, ages 18 to 35 [4]. on the one hand, it is considered that there is not enough experience in child care and education. the other side should work. working mothers have greater challenges than working fathers [5].cybernetics is an interdisciplinary study of regulatory systems' structure and is closely related to information theory, control theory, and systems theory [6]. talcott parsons' cybernetic theory states that society consists of parts (sub-sub) that are interrelated and influence each other reciprocally [7]. it is said to be a complex system because the various elements contained in it interact and influence each other [8]. a r t i c l e i n f o a b s t r a c article history received january 23, 2021 revised february 4, 2021 accepted february 20, 2021 user generated content is a marketing strategy that emphasizes consumergenerated content, social media followers, and fans. the ugc trend has sparked interest in cyber media haibunda.com to integrate ugc in the process of creating infographic visual narratives. the infographic on haibunda.com is the result of media and ugc integration. the media provides a ugc space, for discussion, commenting, reading and viewing pictures. in practice, cybernetics visual narrative involves the role of information theory, control theory, and systems theory. most of the ugc infographic channel visitors are millennial mothers who have interests in information about parenting patterns and child development. can ugc readers interpret the visual infographic narrative, respond to and apply the values of daily morality in childcare? the purpose of the writing is to find out how millennial mothers interpret the visual infographic narrative. the qualitative method, talcott parsons' approach, is to see the meaning of the visual infographic narrative as a system, interrelation, has mutua influence to the media and readers. the results show that the visual narrative of haibunda.com's infographic with the theme “tahukah bunda” means educational and informative and contains moral values and the nature of women. this is an open access article under the cc–by-sa license. keywords user generated content cybernetic digital visual narrative infographics http://creativecommons.org/licenses/by-sa/4.0/ http://creativecommons.org/licenses/by-sa/4.0/ 72 bulletin of social informatics theory and application issn 2614-0047 vol. 5, no. 1, march 2021, pp. 71-81 sufiana et.al (user generated content: cybernetic infographic visual narrative) the digital era has considerably impacted people's lives, encouraging a shift from manual methods to digital media. automation and digitization, as long-term evolutionary processes, are causing significant effects, such as the transformation of jobs and job profiles, changing forms of work, and a more significant role for the platform economy, generating challenges for social policy [9] and it is also because technology will continue to move like ocean currents that continue to run during human life [10]. in the digital era, digitally visualized information does not lose its significance; it makes it easier to convey it to the audience [11]. the need for information is increasingly pressing towards the digital era, and humans are subject to an unprecedented amount of information [12]. with the explosion of digital media content and access tools in the last generation, more information is now available to more people from more sources than at any time in human history [13]. in this era of technological acceleration, the media is required to be fast but clear in providing information to the public; because the public has limited time, media is needed to present information that is concise and easy to understand and is specifically aimed at organizing the chronology of events presented through statistical data. in delivering information to the public, information and most of the news carried out in the last decade have used infographics that are believed to be famous and influential in visualizing data and conveying information to audiences more clearly attractively [14]. in terms of storytelling, various infographics with attractive visual compositions are ultimately one of the attractions for the audience to understand better the content of the news conveyed. digital storytelling (dst) combines the art of storytelling with multimedia features, namely digital graphics, text, recorded voice narrations, videos and music that presents particular material with a particular duration of time packaged in digital format [15]. dst takes advantage of the audacity program and operates it with windows movie maker. visualization of images can be made freely by the designer and creator of the media. infographics are tools that combine images and text to frame information and ideas concisely [16]. visual literacy is needed to understand it [17], apart from being visual learning [18]. it is also a form of knowledge set how to present infographics through text and numbers, charts, graphs or maps, and characters to convert data into visually accessible arguments [19], [20]. 2. user generated content indirectly related research on cybernetics and user generated content (ugc) has been widely carried out. tourism research [21], memes advertising [22], online newsrooms [23], [24], participatory design [25], social networking, and ugc diffusion [26], differences in brand-related ugc on youtube, facebook, and twitter, consumers' motivation to make ugc [27], the impact of ugc on online purchase product reviews [28], and the role of ugc [29]. similarly, research related to mass media and women's issues [30], new mothers and online media users [31], [32], parents and digital media [33], media infographics, and journalistic narratives [34]. however, there are not many studies linking infographic visual narratives about millennial mothers in the world of cybernetics with ultrasound. the least relevant research is research on ugc in the newsroom and new mothers and online media users. the phenomenon of citizen journalism and ugc has created new challenges and opportunities for mainstream media, where ugc can be integrated into the professional news-making process. however, sparse but growing research on participatory journalism shows that several contextual factors hinder the adoption of user-generated content in newsrooms at different levels of newsroom organization [35]. using a social construction approach, based on semi-structured interviews, the main conclusion is that participatory journalism develops rather slowly; caused by newsroom structure, work routines, and professional beliefs regarding user contributions. 3. method talcot parsons, society consists of parts that are interrelated and influence each other reciprocally. in the cyber world, haibunda.com is part of a virtual social community with parts of a systemically structured visual narrative. systemically, ugc works whenever readers interact, respond, read, share news, send comments, and upload photos or videos. data collection is done through; an online observation by taking one of the themes of the infographic tahukah bunda on the infographic channel haibunda.com, followed by online interviews with four millennial mothers, with 13 questions. the 13 questions were then simplified into five core questions which were considered to have a close relationship with the object under study. the literature study was conducted to complete the data when the research took place. issn 2614-0047 bulletin of social informatics theory and application 73 vol. 5, no. 1, march 2021, pp. 71-81 sufiana et.al (user generated content: cybernetic infographic visual narrative) based on talcott parsons, the analysis is divided into four stages: adaptation, go-tooltainment, integration, and latent pattern maintenance. they were seeing the relationship of social systems built between narratives and images and integrated elements so that they can achieve the goal, which cyber users can enjoy. three questions parsons; about social order and values; the nature of social action; essential features of modern society in values and social structure; contribution of sociology to understanding and fostering progressive social relations [30]. parson's idea, influence as a medium of general exchange circulating in the social system. the analogy between economic and sociological conceptual systems goes beyond the simple notion of exchange, which is, in fact, a key concept for studying the workings of social systems. 4. results and discussion haibunda.com ugc consists of eight main contents; home, pregnancy, breastfeeding, parenting, baby names, mom's life, mother's story, trending. then the seven visual narrative channels, namely; haibunda squad, comics, infographics, photos, videos, moms need to know, mom's catalog. in the main room of ugc, there is a display of text narration topics accompanied by photos and the names of the authors. then in another ugc room, there are image content accompanied by information created by illustrators, infographers, and video makers, sourced from various data sources, and scriptwriters. all of them contain narratives adapted to their content, and each narrative is systemically integrated. the visual narrative of the infographic tahukah bunda from 2017 to 2020 has 22 infographics divided into seven categories: pregnancy, birth, breastfeeding, health, bullying, education, and jastip (entrustment services). fig. 1. an example of the cybernetics narrative space display on the home page (source: haibunda.com) the structural properties of social networks, especially millennial mothers and the media haibunda.com (detiknews-detik.com) have a major influence on the development of both. they contribute to more or less inequality [36]. fig. 2, explained that haibunda.com internal system is very dependent on external systems, connected to its parent detiknews–detik.com, digital technology, internet, information flow, media devices as communication tools. media as ugc users and providers, cybernetic visual narratives, and readers as ugc users are three elements that cannot be separated from the virtual communication system. in the tahukah bunda theme room, seven (7) concepts can be interpreted as pregnancy, birth, breastfeeding/mpasi, health, education, bullying, and services. the total number of narrative topics in it is 22 topics. each of these topics can be connected, and interaction occurs when the cursor movement appears from the user's hand. the system becomes more intense in its interaction activities when many users from various geographic areas with the same purpose seek the same information or other purposes and engage in reading, searching, and commenting activities in that space. 74 bulletin of social informatics theory and application issn 2614-0047 vol. 5, no. 1, march 2021, pp. 71-81 sufiana et.al (user generated content: cybernetic infographic visual narrative) fig. 2. haibunda.com infographic visual narrative flow scheme fig. 3. the flow scheme of the infographic narrative system on haibunda.com in the cyber world fig. 3 explaining haibunda.com also has its own system, which is integrated with its parent detiknews-detik.com. haibunda.com adheres to the ideology of its parent media management while maintaining identity stability and positioning in the virtual social environment. most importantly, haibunda.com is tasked with bridging the activities of the mother's social community in cyberspace in the delivery of knowledge narratives through image information (infographics). the media also provides a comment field. program animasi manuscripts, comments and questions, videos, photos ugc users/content readers haibunda.com providers and users ugc script verbal+vis ual ideas verbal + visual actualizati on adaptation between elements integration between systems content publication issn 2614-0047 bulletin of social informatics theory and application 75 vol. 5, no. 1, march 2021, pp. 71-81 sufiana et.al (user generated content: cybernetic infographic visual narrative) fig. 4. examples of some of the cybernetics infographics visual narrative displays are tahukah bunda fig. 4 here is the thumbnail display section of the infographic visual narrative of the “tahukah bunda” theme, which was mentioned on the previous page. the visual language presented is varied, but has a strong correlation with the use of color elements and space formats, namely vertical. the consistency of identity and visual narrative themes is maintained systemically and is connected. the difference is, sometimes it is haibunda.com who narrates, which is supported by the advice and opinions of psychologists, pediatricians, therapists, teachers, or media parties that are strengthened from data sources or research institutions or companies that are relevant to the content raised. as a visual narrative of cybernetics infographics, the theme “tahukah bunda” contains the meaning and values of humanity. the nature of women is practical and essential to be understood and understood by indonesian mothers to develop the next generation. based on talcott parsons, cybernetic infographic visual narrative is an interrelated system and influences each other reciprocally between the reader and the media. these interrelated parts respond when one of the images or the navigator icon changes color when a cursor passes and presses 'click'. visual narratives are arranged systemically, and the ugc system works whenever there is an activity for readers to interact, respond, read, share news, send comments, and upload photos or videos. the reader's response states that it is necessary to present a narrative about parenting patterns and child development. fig. 5. an example of an infographic visual narrative scheme about estimated birth day the results obtained are 64.7% of respondents who agree with presenting information about mothers on social media. following that, 32.4% agreed, and the rest answered quite agree. this questionnaire conclusion shows that the presentation of information is considered very important. then followed by a questionnaire about the importance of breastfeeding information, child care and education patterns, growth and development, and nutrition. fig. 6 and fig. 7 show the respondent responses. system subsystem 3 subsystem 4 subsystem 2 subsystem 1 the system moves the entire narrative, and each sub-system through the dotted arrows. the system is divided into two through differences in blue and pink colors, in the form of a silhouette that represents the condition of the pregnant woman's abdomen and the position of the baby in the mother's womb. 76 bulletin of social informatics theory and application issn 2614-0047 vol. 5, no. 1, march 2021, pp. 71-81 sufiana et.al (user generated content: cybernetic infographic visual narrative) fig. 6. questionnaire about the importance of information related to mothers on social media fig. 7. questionnaire on the knowledge importance about breastfeeding, parenting and child education, health, school, and diet mother's responses about the importance of breastfeeding knowledge, parenting and child education, health, school, and diet showed that 58.8% said it was very important, 32.4% said it was important, and 8.8% said it was quite important, shows the position of information about children and toddlers is very important. they are supported by the results of interviews conducted by the author with several millennial mothers (table 1). analysis of p1-a, p1-b, p1-c, and p1-d proves that information is a need to increase intellectually young mothers, and through social networks, aspirations and dynamic information can bring mothers' experiences in education and child care. information on parenting patterns for children and families through social media is important and can be updated and consulted directly through the consultation column provided. millennial mothers are rationalist characters and trust information from the internet more to share with peers or directly with experts in their fields, rather than listening to information from parents and grandmothers. efforts to increase knowledge and patterns of children's education in millennial communities can be influenced by the lack of insight, demography, independence, digital media, needs, and networking. besides, it is helpful for the user audience and the internal media. it can be proven by the results of research conducted by forbes. infographics help marketing and business development by almost 60%, relying on visuals in social media messages 74%. issn 2614-0047 bulletin of social informatics theory and application 77 vol. 5, no. 1, march 2021, pp. 71-81 sufiana et.al (user generated content: cybernetic infographic visual narrative) table.1 millennial mothers' responses to the importance of information on parenting code response p1-a important, because now we are more familiar with gadgets. so if there is information through social media or sites it will be very helpful and can always update information. in addition, sometimes there is a column for online consultation through the site, so it is very helpful. p1-b important for young mothers p1-c yes it's important and sometimes i know the information from facebook p1-d this is important because not all millennials know information about parenting patterns. especially those who live in urban areas without being accompanied by their grandmothers and grandfathers, these millennials seek a lot of information via the internet or online media. infographics as an effective medium reaches 84%26. while infographics for educational purposes stated that the presentation of information through infographics has 29.3% more because it has better visuals and is more descriptive, more permanent in mind for 16.4%, presentations are more understandable 10.7%, and more interesting 4.3 % [37]. as a visual narration of cybernetics infographics, the theme of “tahukah bunda” contains meanings and values related to women's life cycle. knowledge about the problem of mothers is important to be understood and understood by indonesian mothers, especially for the development of the next generation. the interconnected sub-systems in “tahukah bunda” create their meanings in a small scope and a larger context. because the system is an integrated whole consisting of interconnected parts [38], users can easily capture and interpret information related to parenting patterns and child development because it is presented through visual infographics. infographic function research states that 90% of the information sent to the brain is visual, and visuals are known to increase learning and retention by 400% [39]. the revealed meaning of fig. 7 shows relevance and integration of the married woman cycle: pregnant, giving birth, breastfeeding, providing nutrition as supporting food, caring for, educating, maintaining health, and protecting children from outside disturbances. allah created humans through pregnancy, which must be taken care of properly in the process of becoming a whole human. adaptation. online media and all its contents are virtual social systems [40], which must adapt to the environment they face, in this case, the global audience and culture. the cybernetic narrative of the infographic on haibunda.com is evidence of an effort to adapt to the millennial society. ugc is revolutionizing interactions among people, and users can now share and create personalized content on the internet instead of just using available content [41]. thus it can be said that ugc is a system that involves the community and the media. haibunda.com's media goals must align with larger social goals to avoid conflict with social-environmental goals. all the infographic narratives presented on their website reflect problems and solutions for young mothers who are considered to have minimal knowledge, especially regarding parenting and child education. to grow the adjustment of the infographic narrative with social reality that produces dynamics. as the narrative in fig. 8, the individual gains a presence, transmits tradition, education, and knowledge of the language, history, art, and costume. a prominent feature is in contemporary artistic practices, in works that remain in time, marking the origin of culture and the process of identification and adaptation to other realities in space and time. the purpose of social media, to blur the line between our personal and professional lives [42]. integration. media haibunda.com as a content creator user, shows the social solidarity of the parts that make it up. integration between the narrative elements of haibunda.com's infographic and its readers can only be realized if all the elements that make up the system adapt to each other. there is integration between spaces when infographic channels turn blue when the cursor is moved and intersects. (click) the moving screen infographic opens a narrative space with infographic thumbnails of various themes. 78 bulletin of social informatics theory and application issn 2614-0047 vol. 5, no. 1, march 2021, pp. 71-81 sufiana et.al (user generated content: cybernetic infographic visual narrative) fig. 8. visual infographic narratives tahukah bunda fig. 9. cybernetics narrative from thumbnails, users are free to move the cursor and search for content as they wish. the cursor moves back and forth. when the user clicks on one of the infographics, the full view of the infographic space appears. the infographic page consists of the narrative title, the scriptwriter's name, day, date, and year, then social media icons such as facebook, twitter, links. below it is a narration that aims to convey the contents of the infographic. one author says being 'social' means being available in realtime for marketing, customer service, and user analytics. this new reality offers excellent opportunities for any company looking to dive into the world of mobile marketing and social media [43]. the rapid spread of social media platforms such as twitter and facebook prompted scholars from various fields of study to investigate these sites [44]. latent pattern maintenance. media haibunda.com, as the maintenance of narrative patterns in the form of a cultural value system constantly controls the actions of users, is the value that society has agreed upon will be able to control the integrity of social solidarity. as revealed by haibunda.com, all content uploaded by users (user-generated content) is entirely the user's responsibility. haibunda.com has the right to edit or remove any content uploaded by users that violates the law or, as regulated by the cyber media coverage guidelines [45]. media control and social control. latent pattern maintenance media is a functional requirement related to efforts to keep the system in balance, efforts to bind individuals in the system, efforts to be prepared if members are acting outside the system. goal attainment: the system must define & promote primary goals. according to talcott parsons (fig. 10), it is known that user generated content has created its social system with female readers. efforts to transfer social meanings such as education, health, and the nature of women to readers are the result of media adaptation as ugc to women's events globally. tahukah bunda is evidence of a visual narrative of adaptation efforts to the millennial society. reflecting the problems and solutions for young mothers who are considered to have minimal knowledge, especially regarding parenting and child education patterns. issn 2614-0047 bulletin of social informatics theory and application 79 vol. 5, no. 1, march 2021, pp. 71-81 sufiana et.al (user generated content: cybernetic infographic visual narrative) fig. 10. description of the analogy of social systems based on talcott parsons. 5. conclusion to conclude, ugc proves social solidarity. the integration between the visual narrative elements of the cybernetic infographic tahukah bunda and the reader can be realized if all the elements that make up the system adjust to each other are mutually agreed. haibunda.com as the creator of the cultural value system, constantly controls the user's actions. as revealed by haibunda.com, that usergenerated content is entirely the responsibility of the user. haibunda has the right to edit or remove any content uploaded by users that violates the law and or as regulated by the cyber media coverage guidelines. references [1] d. e. rosen and e. purinton, “website design: viewing the web as a cognitive landscape,” j. bus. res., vol. 57, no. 7, pp. 787–794, jul. 2004. [2] n. s. ahmad, r. musa, and m. h. m. harun, “the impact of social media content marketing (smcm) towards brand health,” procedia econ. financ., vol. 37, pp. 331–336, 2016. [3] c. wyrwoll, “user-generated content,” in social media, wiesbaden: springer fachmedien wiesbaden, 2014, pp. 11–45. [4] l. addison-lavelle, “millennial women in leadership: a new generation of women still facing gender inequalities in business leadership,” 2016. [5] saniatu aini and n. hernawati, “parental environment quality, mother-child attachment, and cognitive development of preschool children with working mother,” j. child dev. sci., vol. 1, no. 2, pp. 12–21, 2016. [6] v. ilková and a. ilka, “legal cybernetics: an educational perspective,” ifac-papersonline, vol. 49, no. 6, pp. 326–331, 2016. [7] talcott parsons, the social system, 2nd ed. london, new york: routledge, taylor & francis e library, 2005. [8] d. s. adhiarso, p. utari, and s. hastjarjo, “the impact of digital technology to change people’s behavior in using the media,” digit. press soc. sci. humanit., vol. 2, may 2019. [9] v. sima, i. g. gheorghe, j. subić, and d. nancu, “influences of the industry 4.0 revolution on the human capital development and consumer behavior: a systematic review,” sustainability, vol. 12, no. 10, p. 4035, may 2020. 1 2 3 4 5 6 7 8 3 4 5 6 2 1 7 system (ugc provider) sub-system-1 (ugc theme tahukah bunda) part 1 sub system (ugc sub theme) sub system-2 (ugc user) interdependent relationship between ugc content, users, media interdependent relationships between users (direct and indirect) 80 bulletin of social informatics theory and application issn 2614-0047 vol. 5, no. 1, march 2021, pp. 71-81 sufiana et.al (user generated content: cybernetic infographic visual narrative) [10] p. weaver, l. jansen, g. van grootveld, e. van spiegel, and p. vergragt, sustainable technology development. london: routledge, 2017. [11] b. i̇. u. dur, “data visualization and infographics in visual communication design education at the age of information,” j. arts humanit., vol. 3, no. 5, pp. 39–50, 2014. [12] s. davis, s. brodersen, g. böhmer, and a. g. siemens, “digitalization sparks a quiet revolution,” world pumps, vol. 2017, no. 5, pp. 28–31, 2017. [13] a. j. flanagin and m. j. metzger, “digital media and youth: unparalleled opportunity and unprecedented responsibility,” in foundation series on digital media and learning, massachusetts: mit press, 2008. [14] p. sari sukardani and v. maya setianingrum, “visual storytelling of infographic design in news media: a comparative study on online media platforms in indonesia,” in proceedings of the social sciences, humanities and education conference (soshec 2019), 2019. [15] b. r. robin, “digital storytelling: a powerful technology tool for the 21st century classroom,” theory pract., vol. 47, no. 3, pp. 220–228, jul. 2008. [16] j. lankow, j. ritchie, and r. crooks, infographics: the power of visual storytelling. john wiley & sons, 2012. [17] e. sims, r. o’leary, j. cook, and g. butland, “visual literacy: what is it and do we need it to use learning technologies effectively?,” in ascilite, 2002, pp. 885–888. [18] o. duchak, “visual literacy in educational practice,” czech-polish hist. pedagog. j., vol. 6, no. 2, jul. 2014. [19] b. robin, “the educational uses of digital storytelling,” in proceedings of site 2006--society for information technology & teacher education international conference, 2006, pp. 709–716. [20] b. i̇. u. dur et al., “interactive infographics on the internet,” online j. art des., vol. 2, no. 4, pp. 1–14, 2014. [21] s. burgess, c. sellitto, c. cox, and j. buultjens, “user-generated content (ugc) in tourism: benefits and concerns of online consumers,” in 17th european conference on information systems, 2009, pp. 417–429. [22] t. csordás, d. horváth, a. mitev, and é. markos-kujbus, “4.3 user-generated internet memes as advertising vehicles: visual narratives as special consumer information sources and consumer tribe integrators,” in commercial communication in the digital age, de gruyter, 2017, pp. 247–266. [23] j. a. garcía-avilés, “online newsrooms as communities of practice: exploring digital journalists’ applied ethics,” j. mass media ethics, vol. 29, no. 4, pp. 258–272, oct. 2014. [24] g. hulten, “newsroom divides: online news production, gender, and organization at dn.se,” commun. pap., vol. 4, no. 07, p. 22, apr. 2015. [25] m. van der velden and c. mörtberg, “participatory design and design for values,” in handbook of ethics, values, and technological design: sources, theory, values and application domains, j. van den hoven, p. e. vermaas, and i. van de poel, eds. netherlands: springer, 2015, pp. 41–66. [26] a. susarla, j.-h. oh, and y. tan, “social networks and the diffusion of user-generated content: evidence from youtube,” inf. syst. res., vol. 23, no. 1, pp. 23–41, mar. 2012. [27] t. daugherty, m. s. eastin, and l. bright, “exploring consumer motivations for creating user-generated content,” j. interact. advert., vol. 8, no. 2, pp. 16–25, mar. 2008. [28] a. z. bahtar and m. muda, “the impact of user – generated content (ugc) on product reviews towards online purchasing – a conceptual framework,” procedia econ. financ., vol. 37, pp. 337–342, 2016. [29] v. podile, c. h. v. s. sree, and s. sarita, “role of ugc and naac in governing higher education in india,” in conference: challenges of higher education in india, 2011. [30] j. johannessen, “gender, media and development. the role of media in the cultural struggle of gender transformation in tanzania,” institutt for sosiologi og statsvitenskap, 2006. issn 2614-0047 bulletin of social informatics theory and application 81 vol. 5, no. 1, march 2021, pp. 71-81 sufiana et.al (user generated content: cybernetic infographic visual narrative) [31] b. t. mcdaniel, s. m. coyne, and e. k. holmes, “new mothers and media use: associations between blogging, social networking, and maternal well-being,” matern. child health j., vol. 16, no. 7, pp. 1509–1517, oct. 2012. [32] y. setyastuti, j. r. suminar, p. hadisiwi, and f. zubair, “millennial moms : social media as the preferred source of information about parenting in indonesia,” libr. philos. pract., 2019. [33] d. lupton, s. pedersen, and g. m. thomas, “parenting and digital media: from the early web to contemporary digital society,” sociol. compass, vol. 10, no. 8, pp. 730–743, aug. 2016. [34] w. t. lima junior and e. f. u. barboza, “multimedia infographics as journalistic narratives and the possibilities of html5,” brazilian journal. res., vol. 11, no. 2, pp. 222–243, dec. 2015. [35] s. paulussen and p. ugille, “user generated content in the newsroom: professional and organisational constraints on participatory journalism,” westminster pap. commun. cult., vol. 5, no. 2, p. 24, may 2008. [36] j. van dijk, the network society. netherland: sage publications ltd, 2012. [37] f. ozdamlı, s. kocakoyun, t. sahin, and s. akdag, “statistical reasoning of impact of infographics on education,” procedia comput. sci., vol. 102, pp. 370–377, 2016. [38] y. merali and p. allen, “complexity and systems thinking,” in the sage handbook of complexity and management, p. allen, s. maguire, and b. mckelvey, eds. sage publications ltd, 2011, pp. 31–52. [39] c. conner, “the data is in: infographics are growing and thriving in 2017 (and beyond),” forbes, 2017. [online]. available: https://www.forbes.com/sites/cherylsnappconner/2017/10/19/the-data-is-ininfographics-are-growing-and-thriving-in-2017-and-beyond/?sh=4a9cd44a137c. [accessed: 20-dec2020]. [40] s. e. mustafa and a. hamzah, “online social networking: a new form of social interaction,” int. j. soc. sci. humanit., pp. 96–104, 2011. [41] muhammad naeem and s. okafor, “user-generated content and consumer brand engagement,” in leveraging computer-mediated marketing environments, 2019, pp. 193–220. [42] j. cassano rizzuti, “social media: are the lines between professional and personal use blurring?,” mcmaster j. commun., vol. 12, no. 2, pp. 78–90, sep. 2020. [43] m. amirkhanpour, d. vrontis, and a. thrassou, “mobile marketing: a contemporary strategic perspective,” int. j. technol. mark., vol. 9, no. 3, p. 252, 2014. [44] a. s. kümpel, v. karnowski, and t. keyling, “news sharing in social media: a review of current research on news sharing users, content, and networks,” soc. media + soc., vol. 1, no. 2, jul. 2015. [45] v. prahassacitta, “citizen journalism in cyber media: protection and legal responsibility under indonesian press law,” humaniora, vol. 8, no. 1, p. 45, jan. 2017. bulletin of social informatics theory and application issn 2614-0047 vol. 1, no. 2, december 2017, pp. 60-71 60 https://doi.org/10.31763/businta.v1i2.28 job applicants clustering using self-organizing map arum handini primandari 1,*, nur aini ikasakti 2 department of statistics, islamic university of indonesia, indonesia 1 primandari.arum@uii.ac.id *; 2 213611135@student.uii.ac.id * corresponding author 1. introduction result of sakernas (survei angkatan kerja nasional) conducted by badan pusat statistik (bps) recorded unemployment rate or tpt (tingkat pengangguran terbuka) in indonesia in august 2014 reached 3.33% of the total workforce in yogyakarta. this figure rose significantly in august 2015 reached 4.07% [1]. after the economic crisis in mid-1997, unemployment rate in indonesia reached over 5% from 1998 to 2004. even in the period from 1999 to 2002, unemployment rate has reached over 8% every year. the unemployment problem in indonesia as a developing country into a particular concern because it resulted in the emergence of problems in other areas such as economic, social, and political [2]. in the economic field, unemployment means unproductiveness a resource that will result in the increase of the number of people as the divisor in each capita income. the larger the denominator, then each capita income, as one indicator of economic development, is getting smaller. in the social sector, the increase in unemployment causes insecurity increase in social ills such as crime. as the impact of the imbalance in economic and social fields, the political situation becomes conducive. unemployment caused by the inability of jobs to absorb the labor force [3]. in other words, employment opportunities are much smaller than the labor force. according to a survey from the institute of management development imd world competitiveness 2015, indonesia was ranked 41, down 16 ranking of 2014. the position of indonesia is far from neighboring countries such as malaysia and singapore, and even thailand [4]. factors affecting the development and assessment that is factor of investment, attractiveness factors of a country, and the readiness factors of human resources. one of the factors that led to indonesia down the ranks is the third factor is the readiness of human resources is the most dominant figure accounts for skilled labor downgrade indonesia in 2015. a r t i c l e i n f o a b s t r a c t article history received october 2, 2017 revised october 29, 2017 accepted november 10, 2017 yogyakarta government through directorate of manpower and transmigration (disnakertrans) have been canvassing people looking for job. an employment program was provided by disnakertrans to allow job applicants meet companies. this research was carried out to identify educational background of applicants, in order to obtain the suitable worker. one of the ways to identify educational background is by district clustering in yogyakarta. clustering method is employed to reveal the characteristic of educational quality in every district in yogyakarta. clustering is a grouping method which is done by minimalize the characteristic among class members and minimalize the characteristic among clusters. this research used self organizing maps to grouping districts in yogyakarta according to educational background of its job seekers. the clustering results 3 clusters: 6 districts belong to cluster 1, 4 districts belong to cluster 2, and 4 districts belong to cluster 3. then, yogyakarta map is used to visualize the result of district clustering. this is an open access article under the cc–by-sa license. keywords clustering mapping self-organizing maps http://creativecommons.org/licenses/by-sa/4.0/ http://creativecommons.org/licenses/by-sa/4.0/ issn 2614-0047 bulletin of social informatics theory and application 61 vol. 1, no. 2, december 2017, pp. 60-71 primandari and ikasakti (job applicants clustering using self-organizing map) based on the exposure to the experts above, it can be concluded that the factors causing the increase in the number of unemployment in indonesia covered lack of employment opportunities and quality of labor. to overcome these problems, yogyakarta government through directorate of manpower and transmigration (disnakertrans) seeks employment opportunities for job seekers through a program of labor market information with the identification of employment (job canvassing). these programs bring together between job seekers with labor users who are in need of manpower making it easier for job seekers to obtain complete information on job vacancies. in addition, job seekers can choose or define their own desired job in accordance with the education and skills they have. however, the efforts could not overcome the number of job seekers continues to increase every year. because each time there will be students who graduated from the school and then become job seekers. based on these problems, the author will discuss about whether the lack of success of efforts to reduce job seekers registered with the disnakertrans yogyakarta city caused by a lack of job opportunities or education quality job seekers. to find the right solution to the problem, the author uses the analysis of clustering som to be visualized with a map. 2. problem formulation based on the background as to whether the lack of success of efforts to reduce the number of job seekers registered with the disnakertrans yogyakarta city caused by a lack of job opportunities or education quality search work. to find the right solution to the problem, the authors use the som clustering analysis to be visualized with a map, then the problem in this research is how the quality of education on unemployment in the city of yogyakarta in 2015 and how to perform clustering (grouping) on unemployment in the city of yogyakarta in 2015 by education level. 3. method 3.1. self-organizing maps (som) kohonen self organizing maps is a network that was discovered by teuvo kohonen network is one of the most widely used. named "self-organizing" because this method does not need a special surveillance and som competitive approach followed by unsupervised probation [5]. the word "maps" itself because this method uses the map in the weighting of input data. each node in this network works presented each input data, therefore the network can also be called "self organizing feature maps", the concept of "features" into something important and valuable, in specific topological relations between inputted data will remain intact and original when mapped in a som network [6]. kohonen self-contained within the som two most important characteristics of this network which explains that the som is a device for data visualization and analysis of high-dimensional [7]. however, the network is able to be used also for clustering, dimensionality reduction, classification, vector quantization and data mining [8]. in perspective, som can be seen not just as a tool but as a toolbox containing features numbers and make it more attractive in different situations. the work can be done by som among other groupings, in the context of clustering, som can be used as a grouping alternative to k means. knowledgeable amount som cluster will divide the available data into different groups. the main advantage of the som are less likely to get results than using a branching k means algorithm, and can be used as a good initialization algorithm for k means method. in fact, the som can be substituted with the same k means and the som algorithm produces the same algorithm with k means. other advantages of the som algorithm are to obtain a sequence which typically cluster topologically similar spliced together. kohonen network is used to divide the data into a high-dimensional pattern with dimensions lower. data shown to have a relationship with the topology of the original data, thus, a pattern that is composed can visualize the results of the training to see the data, for example, the structure of the cluster. suppose the input of vector of n components to be grouped in a maximum of m pieces of the group. exodus networks are among the most close / similar to a given input. 62 bulletin of social informatics theory and application issn 2614-0047 vol. 1, no. 2, december 2017, pp. 60-71 primandari and ikasakti (job applicants clustering using self-organizing map) weight vectors example serves as a determinant of the sample vector proximity to a given input. during the setup process, the vector example at the time closest to the input will emerge as the winner. vector winner (and vicinity vectors) will be modified weights. the clustering algorithm is the kohonen network patterns with initializing the form of weights (wij) obtained randomly for each node. after weight (wij) is given then select an input sample (xi). once the input received by the network, and then calculating the euclidean distance vector dj(x) is obtained by summing the difference between the weight vector(wij) with the input vector (xi). 𝐷𝑗(𝑥) = σ(𝑤𝑖𝑗 − 𝑥𝑖𝑗)   in addition to the distance between nodes are known then the specified minimum value of the calculation of distance vector dj(x),then the next step to change the weights. 𝑊𝑖𝑗(𝑛𝑒𝑤) = 𝑤𝑖𝑗(𝑜𝑙𝑑) + 𝑎[𝑥𝑖 − 𝑤𝑖𝑗(𝑜𝑙𝑑)]   in the process of getting new weight requires a value of learning rate (α) is 0 ≤ α ≤ 1. the value of learning rate for each epoch would be reduced to. 𝑎(𝑖 + 1) − 0.5𝑎   the termination condition testing is done by calculating the difference between the weights wij (new) with wij (old), if the value wij only changed slightly, testing means have reached convergence so that it can be stopped [9]. table 1. unemployment in the city of yogyakarta district no school sd smp sma smk di /dii /diii s1 s2/ s3 mantrijeron 8 57 112 148 155 18 36 0 kraton 4 43 108 392 73 10 44 0 mergangsan 15 117 203 369 159 17 52 1 umbulharjo 27 147 303 483 262 35 79 0 kotagede 19 100 212 418 260 39 49 2 gondokusuman 14 114 205 347 312 42 43 1 danurejan 7 54 140 269 119 12 23 0 pakualaman 3 32 62 194 74 5 17 0 gondomanan 17 96 121 149 68 8 3 0 ngampilan 5 50 92 134 56 4 16 1 wirobrajan 35 114 201 295 170 23 20 1 gedongte-ngen 20 98 170 198 205 17 20 0 jetis 22 129 184 228 202 19 21 1 tegalrejo 15 130 226 308 260 26 35 1 total 211 1281 2339 3932 2375 275 458 8 som itself can be considered as a spatial form of the k means cluster analysis. the analogy, each unit in accordance with a cluster and the cluster number is determined by the size of the grid which is usually arranged in a square or hexagonal shape. som grid use in the mapping process. so when the two-dimensional objects are very similar, then the position in the mapping will be very close together. this algorithm is more concentrated on the biggest similarity [5]. the results of clustering using the som class in addition to producing the appropriate criteria also has an output in the form of fan charts. when interpreting output fan diagram including subjective because it depends associate researcher in color. for example if a variable is used more dominant, it issn 2614-0047 bulletin of social informatics theory and application 63 vol. 1, no. 2, december 2017, pp. 60-71 primandari and ikasakti (job applicants clustering using self-organizing map) can be associated to a group 1. next group / class is also divided into several corresponding circle determined matrix multiplication. the variables that exist within one characteristic will have a circle of the same color. then for the outcome of the class can be directly mapped with the help of other software. later the difference between these classes can be distinguished by their color. 3.2. research method analysis cluster method soms (self-organizing maps) that will be used to see a breakdown of the number of unemployed based on the characteristics of each cluster, as well as the mapping for the cluster is formed. software used in this analysis is the r version 3.1.2 and q gis. fig. 1. flowchart of research methodology 4. analysis 4.1. descriptive statistics fig. 2, shows the percentage of unemployed from each level of education for all districts. fig. 2. percentage unemployment judging from education level workforcein the category of the unemployed can be differentiated according to the level of education. the percentage of unemployed people have a high school education down, if specified at the most are those who have graduated from high school is as much as 36% (3,932 people). next up was smk graduates by 22% (2,375 people), smp by 21% (2,339 people), and primary school by 12% (1,281 people). based on fig. 2, it was concluded that unemployment in the city of yogyakarta majority of low-educated are generally only had high school down. unemployment is higher education that have graduated di / dii / diii and s1 and s2 / s3 reaches 741 people. that number suggests that people who have higher education is not necessarily accepted by the labor market. it is highly related to limited employment opportunities to absorb them. in addition, the number of job seekers is also abundant so the level of competition to be able to get a job to be very tight. 64 bulletin of social informatics theory and application issn 2614-0047 vol. 1, no. 2, december 2017, pp. 60-71 primandari and ikasakti (job applicants clustering using self-organizing map) fig. 3. graph unemployment based on the number of districts in yogyakarta based on the number of districts located in the city of yogyakarta, on the level of education of the school not the lowest unemployment rate in the pakualaman district which amounted to 3 people and the highest in wirobrajan district which amounted to 35 people. for this level of education above the elementary school graduate unemployment is the lowest in pakualaman district which amounted to 32 people and the highest in umbulharjo district which amounted to 147 people. for this level of education graduated from junior high/equal lowest unemployment rate in the pakualaman district is 62 people and the highest in umbulharjo district which amounted to 303 people. for graduating high school education level of the lowest unemployment rate in the ngampilan district which amounted to 134 inhabitants and the highest in umbulharjo district which amounted to 483 people. tertiary education for vocational school graduate lowest unemployment rate in the ngampilan district amounted to 56 people and the highest in gondokusuman district which amounted to 312 people. tertiary education for graduate d1 and d2 / d3 lowest unemployment rate in the ngampilan district which amounted to 4 people and the highest in gondokusuman district which amounted to 42 people. for the highest level of education completed s1 lowest unemployment rate in gondomanan district 8 4 15 27 19 14 7 3 17 5 35 20 22 15 57 43 117 147 100 114 54 32 96 50 114 98 129 130 112 108 203 303 212 205 140 62 121 92 201 170 184 226 148 392 369 483 418 347 269 194 149 134 295 198 228 308 155 73 159 262 260 312 119 74 68 56 170 205 202 260 18 10 17 35 39 42 12 5 8 4 23 17 19 26 36 44 52 79 49 43 23 17 3 16 20 20 21 35 0 0 1 0 2 1 0 0 0 1 1 0 1 1 0 100 200 300 400 500 600 mantrijeron kraton mergangsan umbulharjo kotagede gondokusuman danurejan pakualaman gondomanan ngampilan wirobrajan gedongte-ngen jetis tegalrejo s2/ s3 s1 di /dii /diii smk sma smp sd tdk sekolah issn 2614-0047 bulletin of social informatics theory and application 65 vol. 1, no. 2, december 2017, pp. 60-71 primandari and ikasakti (job applicants clustering using self-organizing map) which amounted to 3 people and the highest in umbulharjo district which amounted to 79 people and graduated s2 / s3 highest unemployment rate in the kotagede district which amounted to 2 people. meanwhile, measures of statistical descriptive of unemployment in the city of yogyakarta is shown in table 2. table 2. unemployment diy central tendency measure no school sd smp sma smk di /dii /diii s1 s2/ s3 mean 15.07143 91.5 167.0714 280.8571 169.6429 19.64286 32.71429 0.571429 median 15 99 177 282 164.5 17.5 29 0.5 if payed of the measure of the centralization of data, between the mean values and the media is almost the same. it thus becomes an indicator that the unemployment data has no outliers. 4.2. clustering process determination of the number of clusters that classifying the city of yogyakarta has been done by the government of yogyakarta using geographical factors and divide indonesia. in addition to referring to the number of groups that have been established, the researchers also used the approach within cluster sum of squares (wcss) in determining number of the clusters [10]. wcss is the distance between elements within the cluster. fig. 4. within cluster sum of squares (wcss) based on the picture, when the point cluster index number 3 represents the movement that began ramps do not like change point cluster in previous index number that illustrate the change is quite steep. if you use multiple clusters 3, then the distance between elements in the cluster will not vary much if you use multiple cluster 4. meanwhile, if you use multiple cluster goes higher, then clustering will be ineffective. this is because the number of districts will be grouped only 13 districts. after approaching the wcss then, found the number of clusters as many as three classes, further implemented to methods self organizing maps. at algorithm self organizing maps takes itersi to get the best grouping. fig. 4. explaining the many training progress that shows the number of iterations and the impact on the average distance to the closest unit is getting smaller. it can be seen that the indicate iteration convergence began when iterating to 400. based on the graph in fig. 5, it can be seen that in training progress has been made as much as 1000 iterations and produced a mean of distance to closest unit (average distance each unit cluster) fewer than 4. it can be concluded that when researchers conducted iterations more and more so, the mean of distance cluster units are getting smaller and results the clustering will be better. after passing iterations to 400 shows that training progress is beginning to stabilize with a mean of distance cluster units fewer than 4. 66 bulletin of social informatics theory and application issn 2614-0047 vol. 1, no. 2, december 2017, pp. 60-71 primandari and ikasakti (job applicants clustering using self-organizing map) fig. 5. graph training progress process som algorithm produces a model of som and in the process using r will produce a diagram that contains several circles (circle) which topology will be adjacent if their characteristics same. fig. 6. venn diagram kohonen based on the fig. 6, algorithm can be seen authors make of fan use charts display rectangular with of grid 3 x 4. diagram is formed based on the results of data if the kohonen algorithm using eight variables. once formed fan diagram can be known depiction and staining for each of variables: no school by dark green, graduate from elementary school is green, junior high school graduate was given a green, senior high school graduate is yellow, smk graduate is orange, d1, d2 / d3 graduate is orange, s1 graduate is pink, and s2 / s3 graduate is white. fan diagram shows the distribution of the variables on the map. patterns can be seen by examining the dominant color. issn 2614-0047 bulletin of social informatics theory and application 67 vol. 1, no. 2, december 2017, pp. 60-71 primandari and ikasakti (job applicants clustering using self-organizing map) fig. 7. venn diagram of results clustering based on fig. 7, viewable models created with kohonen algorithm is then shaped into 3 clusters with hierarchical cluster method. each cluster is formed has its own characteristics. cluster 1 is marked in green, cluster 2 is marked in blue, cluster 3 is marked by the orange color. fig. 8 shows the characteristics of each cluster: fig. 8. characteristics of each cluster table 3. results grouping using self-organizing maps district group mantrijeron 2 kraton 1 mergangsan 1 umbulharjo 3 kotagede 3 gondokusuman 3 danurejan 1 pakualaman 2 gondomanan 2 ngampilan 2 wirobrajan 1 gedongtengen 1 jetis 1 tegalrejo 3 68 bulletin of social informatics theory and application issn 2614-0047 vol. 1, no. 2, december 2017, pp. 60-71 primandari and ikasakti (job applicants clustering using self-organizing map) processes of understanding the diagram of the som algorithm is when the diagram has colored and defined by the vectors are visualized in a plot mapping. based on figure 8., obtained information that the circle of orange on the lower right is associated in a group that has a level of education completed primary school, junior high, high school and vocational high, but the level of education is not school, graduated d1 / d2 / d3, s1, and graduated s2 / s3 low. graduate junior high school, vocational and higher and have completed primary school, and s1 were but the other levels of education no school, graduated d1 / d2 / d3 and s2 / s3 low associated in the blue circle in the top middle. a green circle is associated with a group that has the level of education completed primary school, junior high. table 4. number and class members using self-organizing maps group number of members group 1 6 kecamatan kraton, mergangsan, danurejan, wirobrajan, gedongtengen, and jetis 2 4 kecamatan mantrijeron, pakualaman, gondomanan, and ngampilan 3 4 kecamatan umbulharjo, kotagede, gondokusuman, and tegalrejo as for the results of the analysis to the classification of mappings using the som which members of each group have been known, would have seen his profile by using the average in each group. table 5. calculation of average results clustering som group group 1 group 2 group 3 tdk sekolah 17.17 8.25 18.75 sd 92.50 58.75 122.75 smp 167.67 96.75 236.50 sma 291.83 156.25 389.00 smk 154.67 88.25 273.50 di /dii /diii 16.33 8.75 35.50 s1 30.00 18.00 51.50 s2 / s3 0.50 0.25 1.00 when depicted in the bar chart, then visualization average each variable for each cluster are shown at fig. 9. fig. 9. average number of unemployment according to education for every cluster issn 2614-0047 bulletin of social informatics theory and application 69 vol. 1, no. 2, december 2017, pp. 60-71 primandari and ikasakti (job applicants clustering using self-organizing map) when the note, then the group 3 has the number of unemployed from various levels of the education higher than group 1 and group 2. this indicates that the third group consists of the districts that have high unemployment rates. group 2 is a group with an unemployment rate at various levels of education are the lowest among the three groups. this indicates that the second group consists of the districts which have a relatively low unemployment rate. 4.3. validation selection of the best techniques and results grouping also able to use a validation in this case the researchers are using cluster variance. validation of the som is to calculate the variance between members of a group (sw) and the variance between groups(sb), for the next available cluster variance. the variance between members of a group will show better results when the value gets smaller. meanwhile, the value of variance between groups will show good results when a large value. values cluster variance which is a division of the variance between members in the group and the variance between groups, where the value of cluster variance would be better if the value is getting smaller. based on the results obtained validations conducted cluster varianceto equal 1.48 for the method of self organizing maps. table 6. table validation som no school sd sekolah sd smp sma smk di/dii/diii s1 s2/s3 sw 44,17 274.00 500.92 837.08 516.42 60.58 99.50 1.75 14.72 91.33 166.97 279.03 172.14 20.19 33.17 0.58 4.39 1.00 0.35 120.48 224.29 10.95 7.37 0.01 46.53 8372.25 27912.86 78880.73 28778.70 385.84 1070.22 0.33 13.53 1190.25 3032.86 17651.02 214.41 2.70 10.80 0.33 64.45 9563.50 30946.08 96652.23 29217.40 399.49 1088.39 0.66 32.23 4781.75 15473.04 48326.12 14608.70 199.75 544.19 0.33 sb 5.68 69.15 124.39 219.83 120.87 14.13 23.33 0.57 sw/sb 2.59 1.32 1.34 1.27 1.42 1.43 1.42 1.02 cluster varianc 1.48 a. amount of the average of each variable by district. b. on average variable by district reduced the overall average variable squared. c. the sum of average variable in number 2. d. the average of the variables have been added shared with many classes. 4.4. mapping the mapping results of clustering analysis using self organizing maps in the fig. 10. if you see the results table grouping and mapping som visually, and see the table group average then the group 1 consisting district of kraton, mergangsan, danurejan, wirobrajan, gedongtengen, and jetis education level smp, sma, and smk graduate are highest, sd and s1 higher than no school, d1 / d2 / d3 and s2 / s3. the group is in accordance with which is associated in the blue circle in the self organizing maps. group 2 consists district of mantrijeron, pakualaman, gondomanan, and ngampilan in the blue circle the level of education smp, sma, and smk are the highest graduate while sd, and s1 higher than no school, d1/ d2/ d3, and s2/ s3. the results of profiling in accordance with a circle of orange in the mapping of self organizing maps. group 3 consists district of umbulharjo, kotagede, gondokusuman, and tegal level of education sd, smp, sma, and smk are the highest graduate, lower than no school, d1/ d2/ d3, s1, and s2/s3. the group is associated in a green circle in the mapping of self organizing maps. 70 bulletin of social informatics theory and application issn 2614-0047 vol. 1, no. 2, december 2017, pp. 60-71 primandari and ikasakti (job applicants clustering using self-organizing map) fig. 10. mapping algorithm results som 5. conclusion based on the analysis and discussion that has been done in the previous chapter, it can be concluded as follows. 1. unemployment in the city of yogyakarta, the majority of low-educated are generally only had high school down. 2. the number of groups formed as many as 3 groups were determined by researchers with the approach of using within cluster sum of squares. 3. the use of algorithms self organizing maps produces three groups with each group as follows. a. six districts for cluster 1 to the characteristics of the level of education smp, sma, and smk graduate are highest, sd and s1 higher than no school, d1 / d2 / d3 and s2 / s3. b. four districts to cluster 2 has the characteristic graduated from smp, sma, and smk are the highest graduate while sd, and s1 higher than no school, d1/ d2/ d3, and s2/ s3. c. four districts to cluster 3 has the characteristic level of education sd, smp, sma, and smk are the highest graduate, lower than no school, d1/ d2/ d3, s1, and s2/s3. 4. group 1 consists district of kraton, mergangsan, danurejan, wirobrajan, gedongtengen, and jetis. group 2 consists district of mantrijeron, pakualaman, gondomanan, and ngampilan, and group 3 comprised district of umbulharjo, kotagede, gondokusuman, and tegalrejo. references [1] badan pusat statistik provinsi d.i. yogyakarta, “keadaan ketenagakerjaan di daerah istimewa yogyakarta pada agustus 2014 tingkat pengangguran terbuka sebesar 3,33 persen,” 2014. [online]. available: https://yogyakarta.bps.go.id/pressrelease/2014/11/05/321/keadaan-ketenagakerjaan-di-daerahistimewa-yogyakarta-pada-agustus-2014-tingkat-pengangguran-terbuka-sebesar-3-33-persen.html. [accessed: 14-jul-2016]. [2] d. suryadarma, a. suryahadi, and s. sumarto, “the measurement and trends of unemployment in indonesia: the issue of discouraged workers,” jakarta, 2005. [3] a. kayahan karakul, “educating labour force for a green economy and renewable energy jobs in turkey: a quantitave approach,” renew. sustain. energy rev., vol. 63, pp. 568–578, 2016. [4] imd world competitiveness center, “imd world talent report 2015,” lausanne, switzerland, 2015. [5] r. wehrens and l. m. buydens, “self-and super-organizing maps in r: the kohonen package,” j. stat. softw., vol. 21, no. 5, pp. 1–19, 2007. [6] s. m. guthikonda, “kohonen self-organizing maps.” wittenberg university, 2005. issn 2614-0047 bulletin of social informatics theory and application 71 vol. 1, no. 2, december 2017, pp. 60-71 primandari and ikasakti (job applicants clustering using self-organizing map) [7] j. fort, p. letremy, m. cottrell, i. elie, and u. nancy, “advantages and drawbacks of the batch kohonen algorithm,” proc eur. symp. artif. neural networks esann, pp. 223–230, 2002. [8] j. vesanto and e. alhoniemi, “clustering of the self-organizing map,” ieee trans. neural networks, vol. 11, no. 3, pp. 586–600, 2000. [9] k. mehrotra, c. k. mohan, and s. ranka, elements of artificial neural networks. massachusetts: mit press, 1997. [10] i. b. mohamad and d. usman, “standardization and its effects on k-means clustering algorithm,” res. j. appl. sci. eng. technol., vol. 6, no. 17, pp. 3299–3303, 2013. bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 1, march 2022, pp. 53-64 53 https:doi.org/10.31763/businta.v6i1.407 social media addiction and its impact on social relationships maftuh ahnan a,1,*, lalu agung purnama budi a,2, mohamad firzon ainur roziqin a,3, nur rosalia a,4, rian ari sasono a,5 , anusua ghosh b,6* a universitas negeri malang, malang, indonesia b university of south australia, adelaide, australia 1 maftuhahnan.1805356@students.um.ac.id *; 2 laluagung.1805356@students.um.ac.id; 3 firzonainur.1805356@students.um.ac.id; 4 nurrosalia.1805356@students.um.ac.id; 5 riansasono.1805356@students.um.ac.id; 6 anusua.ghosh@mymail.unisa.edu.au * * corresponding author 1. introduction human beings are social creatures. humans, as social beings, need other humans to live and interact socially. social interaction is the primary condition for the occurrence of social activities [1]. social interaction is a dynamic social relationship involving relationships between individuals, groups of people, and between individuals and groups of humans [2]. technology brings changes to social life [3]. one of them is changing the way of communicating and relating. in the past, when you wanted to communicate with other people, you had to meet face to face. however, with the presence of social media, communicating with fellow humans becomes easier via a smartphone connected to an internet connection [4]. social media is a platform that brings changes in communicating and relating to fellow humans [5]. social media is a group of internet-based applications built based on web 2.0 ideology and technology, allowing the creation and exchange of user-generated content [6]. social media is a platform that focuses on the existence of users who facilitate them in activities and collaboration [7]. therefore, social media can be seen as an online platform that strengthens user relationships and social bonds [8]. active social media users are 4.2 billion, or 53.6% of the world's population [9]. in 2021, the number of users will increase by 13.2% compared to the previous year [9]. data on social media users, 90% of the population aged 18-29 years use social media, 82% of the population aged 20-49 years use social media, 69% of the population aged 50-64 years use social media, and residents over 65 years use social media as much as 40% [10]. based on this data, it can be seen that various ages use social media. the average data use of social media is 2 hours and 25 minutes [9]. there are tons of social media nowadays. the following social media are widely used worldwide, as seen in fig.1. a r t i c l e i n f o a b s t r a c t article history received december 18, 2021 revised january 18, 2022 accepted february 3, 2022 social media is a platform that allows users to engage in activities and collaborate. social media can make communicating with fellow humans easier via a smartphone or internet connection. however, on the other hand, the presence of social media can have a negative impact. excessive use of social media can be addicting and negatively affect one's social relationships. therefore, this paper will analyze the relationship between social media addiction on social relationships and how it impacts one's social relationships. a research instrument in the form of a questionnaire was used to analyze that. after that, the validity and reliability tests were carried out regarding the questionnaire. if the questionnaire passed the test, the questionnaire was distributed. the results from the questionnaire were analyzed by an assumption and hypothesis test, respectively, to describe the objectives of this study. this is an open access article under the cc–by-sa license. keywords social relationships social media social media addiction impact of social media https://doi.org/10.31763/businta.v6i1.407 mailto:maftuhahnan.1805356@students.um.ac.id mailto:anusua.ghosh@mymail.unisa.edu.au http://creativecommons.org/licenses/by-sa/4.0/ http://creativecommons.org/licenses/by-sa/4.0/ 54 bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 1, march 2022, pp. 53-64 maftuh ahnan et.al (social media addiction and its impact on social relationships) fig. 1. stages of the project [source: ] fig.1 shows that facebook, youtube, whatsapp, messenger, instagram, wechat, and quora are currently the most widely used social media users worldwide. apart from social media in fig.1, there are still many social media worldwide. each of these social media has its advantages in attracting the many social media users it has. almost all social media that are most widely used are social media, a social networking sites. there are six types of social media [11]. 1) collaboration projects the website allows its users to be able to change, add, or delete content on this website. for example, wikipedia. 2) blogs and microblogs users can express something on this blog, such as acknowledging or criticizing government policies. for example, twitter, blogspot, tumblr, path, instagram, etc. 3) content users of this website share media content, such as videos, ebooks, images, and more. for example, youtube. 4) social networking sites an application that allows users to connect by creating personal information to connect with other people. personal information can be like a photo. for example, facebook, path, instagram, and others. 5) virtual game world a virtual world replicates a 3d environment, where users can appear in the desired avatar form and interact with other people just like in the real world, for example, in online games. 6) virtual social world. a virtual world where the user feels alive in a virtual world, such as a virtual game world that interacts with other people. however, the virtual social world is more accessible and more towards life, for example, a second life. the function of social media can be described through the relationship of the honeycomb framework using seven function-building boxes, like in fig.2 [12]. issn 2614-0047 bulletin of social informatics theory and application 55 vol. 6, no. 1, march 2022, pp. 53-64 maftuh ahnan et.al (social media addiction and its impact on social relationships) fig. 2. honeycomb framework diagram 1) identity social media as a user identity includes name, age, gender, profession, location, and photo. 2) conversations social media as a platform allows communication between other users. 3) sharing social media is a place to exchange, share and receive content through text, images, or videos from among users. 4) presence describes whether users can access other users. 5) relationship users can connect with other users. 6) reputation users can identify others as well as themselves 7) groups social media can form communities and sub-communities between users with backgrounds, interests, or demographics. nevertheless, on the other hand, the presence of social media can have a negative impact. excessive use of social media can be addicting. addiction is dependency behavior on something you like [13]. social media addiction can be summed up as a set of applications on the internet network that make it easier for users to participate in sharing news, information, and content with others by spending much time and not being able to control their use online and someone who is addicted feels punished if they do not fulfill their wishes [14]. social media addiction will affect one's social relationships. therefore, we will analyze the relationship between social media addiction social relationships and how it impacts one's social relationships. 2. the proposed method/algorithm this study aims to determine the effect of social media security on social media users among the millennial generation. subjects in this study are the generation born in the 1980s –2000 or those aged 15–35 years. the data collection method used in this study is a questionnaire via a google form. respondents determine their level of agreement with a statement when responding to questions by selecting one of the available options. usually, four scale options are provided: 1 = strongly agree, 2 = agree, 3 = disagree, 4 = strongly disagree. 56 bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 1, march 2022, pp. 53-64 maftuh ahnan et.al (social media addiction and its impact on social relationships) 3. method the design of this research is descriptive quantitative research. this study aims to describe a phenomenon or obtain information on how social media addiction impacts social relationships [15]. the data used is quantitative data, where the research data is in the form of numbers derived from the objective parameters of the results of filling out the questionnaire by research subjects to strengthen the data described [16]. the subjects of this study are individuals with early adult characteristics aged 18-40 years who actively use social media. a research instrument is a tool used by researchers in collecting data so that their work is more accessible and the results are better, in the sense that it is more accurate, complete, and systematic, so that it is easier to process. the research instrument used in this study was a questionnaire. a questionnaire is a data collection technique that is carried out by giving a series of questions or written statements to respondents to be answered [17]. this study uses a closed questionnaire whose questions are limited by several answer choices. the questionnaire used in this study used a likert scale with four scales. alternative answers are (a) strongly agree, (b) agree, (c) disagree, and (d) strongly disagree. the modification of the linkert scale with four answers is intended to eliminate the tendency of respondents to choose neutral answers (middle answer). a neutral answer (middle answer) can have a double meaning, namely doubtful, or the respondent cannot decide or provide a response. in addition, the existence of a neutral answer choice also encourages respondents to choose the middle answer alternative, especially those who are doubtful and have not been able to decide whether to agree or not. before being used, the research instrument must go through a validity test and a reliability test to determine its validity of the research instrument. the purpose of this trial was carried out so that the instrument was suitable for use as a research instrument and a data collection tool to obtain complete and systematic data. valid (feasible) means that the instrument can measure what should be measured [17]. 3.1. validity the validity test shows the extent to which the instrument can measure what should be measured in research activities. the quantitative validation of the instrument is indicated by a quantitative score of the results of data analysis from the results of empirical trials with specific statistical techniques and formulas [18]. in this study, the instrument test questions were tested on the age group of 18-40, as many as 65 people, and consisted of 58 items. based on the validity test results, there are 34 valuable items. 3.2. reliability test the test is an instrument that is trusted enough to be used as a data collection tool because the instrument is good [19]. a reliability test is conducted to find out how much the instrument can be trusted and relied on to collect data to reveal reliable data. stated there are five categories of reliability can be seen in table 1 [20]. table.1 reliability test score category -1.00 < r11 < 0.19 very low reliability (unreliable) 0.20 < r11 < 0.39 low reliability 0.40 < r11 < 0.59 average 0.60 < r11< 0.79 high reliability 0.80 < r11 < 1.00 very high reliability fig. 3. reliability statistic r11 is the reliability instrument test score issn 2614-0047 bulletin of social informatics theory and application 57 vol. 6, no. 1, march 2022, pp. 53-64 maftuh ahnan et.al (social media addiction and its impact on social relationships) based on fig.3, the analysis conducted with 58 questions, cronbach's alpha value of 0.733 > 0.70 is obtained, so it can be concluded that the questions have high reliability. 3.3. data collection data collection is a method that researchers use to collect research data [21]. the data collection steps used in this research follow the questionnaire technique. researchers use a closed questionnaire in this study for several reasons, namely: (1) ensuring the confidentiality of the respondent, (2) providing sufficient opportunity and time for respondents to think and answer freely, (3) it can reach many people at the same time,(4) well documented and can be reflected, and (5) easy to analyze and can be done face-to-face or not [22]. 3.4. data analysis analyzing data is a process of changing the form of data that has been obtained, usually still contained in instruments or notes made by researchers or evaluators, into a presentation of data that can be concluded and interpreted [23]. the data analysis technique used in this research is descriptive analysis. 3.4.1. assumption test the test is carried out so that the conclusions are not different and deviate from the predetermined research objectives. the assumption test in this study will be carried out using the normality test. the normality test is carried out to test whether the independent and bound variables have typically distributed data. the normality test in this study will be calculated using a non-parametric statistical test formula, namely one sample kolmogorov smirnov in the spss version 26.0 program. if the significant value is less than 0.05, it can be concluded that the data is not normally distributed. however, if the significant value is greater than 0.05, it can be concluded that the data is normally distributed [23]. 3.4.2. hypothesis test this test is conducted to determine whether there is a negative relationship between addiction to social media and social relationships. if the data is normally distributed, the hypothesis testing will be calculated using the pearson product moment using spss version 26.0. however, if the data is not normally distributed, the calculation will be carried out using the technique spearman rho. 4. results and discussion this section discusses data obtained from primary data sources through distributing questionnaires, including another gender, age, background, school origin of the respondent, and class level of respondent. from the results of distributing questionnaires, respondent data can be obtained as in table 2. table.2 classification of respondents information amount percentage gender male 47 67,14% female 23 32,86% total 70 100% last education sma/smk 56 80% d3 1 1,43% s1 8 11,43% s2 5 7,14% total 70 100% based on table 2, from the questionnaire results above, it is known that the respondents based on male gender were 47 people (75.14%), while 23 (32.86%) were female. the latest high school education level is 56 people (80%), the d3 level is 1 (1.43%), the s1 level is eight people (11.43%), and the s2 level is five people (7.14%), so it can be rejected male respondents were more dominant, and the most current education level was sma/smk. 58 bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 1, march 2022, pp. 53-64 maftuh ahnan et.al (social media addiction and its impact on social relationships) table.3 description of social addiction question answer quantity mean median modus variants i feel worried if a lot of social media notifications come in, but i cannot access social media for some reason 1 56 0,68220962 1 1 0,864876385 2 1 3 9 4 4 i often sleep late because of playing social media 1 7 0,706938776 3 3 0,721325052 2 20 3 33 4 10 i do not mind if no social media notifications are coming to my phone 1 10 0,742857143 2 2 0,765217391 2 30 3 22 4 8 i often neglect my obligations because i am too busy with social media 1 2 0,535918367 3 3 0,593995859 2 15 3 35 4 18 how long have i been using social media 1 20 0,546938776 2 2 0,592339545 2 35 3 13 4 2 when there are activities, i will not play social media 1 12 0,932244898 2 2 1,121325052 2 26 3 14 4 18 i find it challenging to divide my time between work and playing social media 1 10 0,782857143 2 2 0,854865424 2 32 3 17 4 11 i spend time playing on social media 1 7 0,705449827 2 2 0,6714223 2 28 3 26 4 7 i do not feel annoyed when i do not access social media all-day 1 2 0,474047672 3 3 0,49434645 2 13 3 40 4 12 i feel like i can manage my time well by using social media 1 0 0,514285714 3 3 0,468115942 2 20 3 37 4 13 table 3 above shows the questions used to find the value of the variable social media addiction. the question about social media addiction has 12 questions and is answered by 70 respondents using google forms. each question has four answers: one means disagree, two means disagree, three means agree, and four means agree. this variable will later be used for research. then, the following fig.4 illustrates the addictions they feel when using social media with 70 research subjects. issn 2614-0047 bulletin of social informatics theory and application 59 vol. 6, no. 1, march 2022, pp. 53-64 maftuh ahnan et.al (social media addiction and its impact on social relationships) fig. 4. respondents' answers about social media addiction variables fig.4 shows the total number of answers from all respondents to 12 questions about social media addiction. 17% answered they disagree, 35% answered they disagree, 35% answered they agree, and 13% answered they agree. then table 4 is a description of questions about social relations. table.4 description of social relations question answer quantity mean median modus varian i find it challenging to accept opinions that do not match my opinion 1 13 0,704489796 2 2 0,795238095 2 35 3 14 4 8 i feel less sensitive and responsive in paying attention to others 1 8 0,764965343 3 3 0,838022165 2 19 3 29 4 13 i often ignore other people when i am talking 1 1 0,779591837 3 3 0,841614907 2 21 3 32 4 16 it is not easy for me to understand what the people around me feel 1 2 0,594285714 3 3 0,584057971 2 22 3 27 4 13 i can take criticism openly 1 5 0,735510204 3 3 0,866252588 2 17 3 25 4 23 i do not hesitate to start a conversation with anyone 1 1 0,517959184 3 3 0,36873706 2 2 3 40 4 27 i can share my feelings and thoughts that i do not like with others openly 1 5 0,615918367 3 3 0,693374741 2 14 3 36 4 15 i can talk to anyone regardless of social status 1 4 0,548571429 3 3 0,560869565 2 21 3 37 4 8 i have never been active in a conversation 1 2 0,782857143 3 3 0,944927536 2 11 3 36 4 21 i choose to be honest even though it hurts the feelings of the other person 1 9 0,585306122 2 2 0,519461698 2 14 3 29 4 18 60 bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 1, march 2022, pp. 53-64 maftuh ahnan et.al (social media addiction and its impact on social relationships) from table 3, the questions used to find the variable's value on social relations. the question about social relations has 22 questions and is answered by 70 respondents using google forms. each question has four answers; answer one means disagree, two means disagree, three means agree, and four means agree. this variable will later be used for research. then, the following fig.5. illustrates the social relationships they feel when using social media from 70 research subjects fig. 5. respondents' answers about social relation variables fig.5. shows all respondents' total number of answers to 22 questions about social media addiction. 10% of respondents answered they disagree, 33% answered they disagree, 40% answered they agree, and 17% answered they agree. then table 4 is a description of questions about social relations. after obtaining the data, then the data obtained will be tested for data validation, data normality, and hypothesis testing to determine the relationship between the social media addiction variable and the social relationship variable. this test is carried out to determine the results of the impact that will occur. the impact of social media addiction on social relationships. 4.1. validity test in this research, there 58 questions were asked. respondents in this research were 70 respondents from smk levels to s2. of the 58 questions, the validity was tested, so 34 questions were valid. this validity test is obtained by counting the following r table: 𝑑𝑓 = 𝑛 − 2 then obtained 𝑑𝑓 = 70 − 2 = 68 the following is data for calculating the validity of the question can be seen in table 5. totally disagree 10% disagree 33% agree 40% totally agree 17% respondents' answers about social relation variables totally disagree disagree agree totally agree issn 2614-0047 bulletin of social informatics theory and application 61 vol. 6, no. 1, march 2022, pp. 53-64 maftuh ahnan et.al (social media addiction and its impact on social relationships) table.5 calculating the validity of the question number of question r count r table status 1 -.107 0,244 invalid 2 .265* 0,244 valid 3 .240 0,244 invalid 4 -.248* 0,244 invalid 5 .172 0,244 invalid 6 .494** 0,244 valid 7 .309* 0,244 valid 8 .154 0,244 invalid 9 .381** 0,244 valid 10 .283* 0,244 valid 11 .022 0,244 invalid 12 .034 0,244 invalid 13 .094 0,244 invalid 14 .554** 0,244 valid 15 .085 0,244 invalid 16 .246 0,244 valid 17 .285* 0,244 valid 18 .255* 0,244 valid 19 .180 0,244 invalid 20 .237 0,244 invalid 21 .215 0,244 invalid 22 .483** 0,244 valid 23 .236 0,244 invalid 24 .197 0,244 invalid 25 -.081 0,244 invalid 26 .025 0,244 invalid 27 .150 0,244 invalid 28 .088 0,244 invalid 29 .432** 0,244 valid 30 .127 0,244 invalid 31 .333** 0,244 valid 32 .394** 0,244 valid 33 .271* 0,244 valid 34 -.002 0,244 invalid 35 .227 0,244 invalid 36 .403** 0,244 valid 37 .182 0,244 invalid 38 .385** 0,244 valid 39 -.152 0,244 invalid 40 .315* 0,244 valid 41 .370** 0,244 valid 42 .323** 0,244 valid 43 .423** 0,244 valid 44 .411** 0,244 valid 45 .426** 0,244 valid 46 .471** 0,244 valid 47 .355** 0,244 valid 48 .252* 0,244 valid 49 .369** 0,244 valid 50 .479** 0,244 valid 51 .266* 0,244 valid 52 .197 0,244 invalid 53 .259* 0,244 valid 54 .310* 0,244 valid 55 .333** 0,244 valid 56 .350** 0,244 valid 57 .430** 0,244 valid 58 .377** 0,244 valid table 5 shows that this study used a significance level of 5%. so that when referring to the r table, the value is 0.244. so that if the r count exceeds the r table, then the question is valid and will be processed toward the data normality test stage. 62 bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 1, march 2022, pp. 53-64 maftuh ahnan et.al (social media addiction and its impact on social relationships) 4.2. data normality the next step is to determine whether the data is usually distributed. the kolmogorov smirnov count can prove this. the kolmogorov-smirnov (referred to as ks henceforth) statistic belongs to the supremum class of edf statistics, and this class of statistics is based on the most significant vertical difference between the hypothesized and empirical distribution [24]. the following is the value for each variable of social media addiction (x) and social relations (y). the result of the one-sample kolmogorov-smirnov test can be seen in fig.6. fig. 6. result of one-sample kolmogorov-smirnov test after calculating using spss, it is known that the data is usually distributed in complete form, and the value is 0.2. if this exceeds 0.05, then it can be said that the normality of the data is valid. thus the assumptions or requirements for normality in the regression model have been fulfilled. the next step is to test the hypothesis using the product-moment correlation (pearson). 4.3. test the hypothesis a simple statistical analysis of pearson product moment correlation (ppmc) is commonly used to establish the degree or strength of a relationship between samples. generally, the r values (generated from ppmc) range between −1 and 1, where 1 indicates a perfect positive linear relationship, and a correlation of −1 indicates a perfect negative linear relationship. it has been suggested that correlation coefficients between 0.8 and 1 indicate a strong correlation between samples, while coefficients between 0.5 and 0.8 indicate a medium correlation [25]. product moment correlation or pearson determines the relationship between variables if the data is used as an interval or ratio scale. this analysis is the most widely used. the rationale for product moment correlation analysis is the change between variables, which means that if a change follows a change in a variable in another variable, the two variables are related. the following is an explanation of the count of the correlation hypothesis to the data that has been obtained from the questionnaire: ho: there is no positive correlation between social media addiction and the quality of social relationships between individuals (negative or insignificant). ha: there is a positive correlation between social media addiction and individuals' quality of social relationships (significant). testing criteria ho cannot be rejected if r count ≤ r table, or sig. > alpha (α) ha is accepted if r count > r table or sig. ≤ alpha (α), and the positive direction. issn 2614-0047 bulletin of social informatics theory and application 63 vol. 6, no. 1, march 2022, pp. 53-64 maftuh ahnan et.al (social media addiction and its impact on social relationships) the result of the correlations test can be seen in fig.7. fig. 7. result of correlations test from fig.7, it was found that the r-value was 0.470, which indicates a positive relationship between social media addiction and the quality of social relationships between individuals, and this is a medium correlation category. with r table 0.2144, the count r-value greater than the r table points to the accepted hypothesis ha and with a significance value (sig. (1-tailed)) of 0.000 less than the alpha used, that is 0.05, then the ha hypothesis is accepted. so, there is a positive and significant relationship between social media addiction and the quality of social relationships between individuals. 5. conclusion pearson correlation test results show the value of sig. (1-tailed) as 0.000, so the sig value is 0.000 <0.05, then the social media addiction control variable has a significant relationship with the social relationship variable. the variable of social media addiction with social relationships has a moderate relationship. its value is a positive relationship. the direction of the positive relationship means that the variable social media addiction increases, so the social relationship variable will also increase. the increase in social addiction is directly proportional to social relationships. prolonged use of social media gives users more time to connect with other users. the use of social media has a good impact, especially in interacting socially. the use of social media makes it easy to communicate with friends and family, making it impossible to make face-to-face contact due to the distance factor. social media can be used to send the required information easily and quickly and access the information needed. social relationships with friends or family who have not met for a long time can be connected through social media such as facebook, instagram, and others. for these reasons, social media can affect a person's social relationships. references [1] w. n. listia, “anak sebagai makhluk sosial,” j. bunga rampai usia emas, vol. 1, no. 1, pp. 14– 23, jun. 2015, doi: 10.24114/jbrue.v1i1.9278. [2] m. i. akbar, t. k. chandra, r. a. setyowati, f. isnaeni, s. l. zahro, and a. d. yuniar, “interelasi kecerdasan sosial dengan interaksi sosial mahasiswa luar jawa fakultas ilmu sosial universitas negeri malang,” j. integr. dan harmon. inov. ilmu-ilmu sos., vol. 1, no. 5, pp. 598–604, may 2021, doi: 10.17977/um063v1i5p598-604. [3] m. danuri, m. informatika, j. teknologi, and c. semarang, “perkembangan dan transformasi teknologi digital,” j. ilm. infokam, vol. 15, no. 2, sep. 2019, doi: 10.53845/infokam.v15i2.178. [4] j. pembangunan, p. : fondasi, d. aplikasi, m. ngafifi, s. negeri, and s. wonosobo, “kemajuan teknologi dan pola hidup manusia dalam perspektif sosial budaya,” j. pembang. pendidik. fondasi dan apl., vol. 2, no. 1, jun. 2014, doi: 10.21831/jppfa.v2i1.2616. https://doi.org/10.24114/jbrue.v1i1.9278 https://doi.org/10.17977/um063v1i5p598-604 https://doi.org/10.53845/infokam.v15i2.178 https://doi.org/10.21831/jppfa.v2i1.2616 64 bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 1, march 2022, pp. 53-64 maftuh ahnan et.al (social media addiction and its impact on social relationships) [5] a. setiadi amik bsi karawang jl banten no, “pemanfaatan media sosial untuk efektifitas komunikasi,” cakrawala j. hum. bina sarana inform., vol. 16, no. 2, 2016, doi: 10.31294/jc.v16i2.1283. [6] a. a. nur, s. hajar, s. prodi, p. bahasa, and i. umpar, “the library research ; the effectiveness of social media on efl learners speaking skill,” la parol. j. lang. teach. pedagog., vol. 3, no. 2, pp. 104–122, sep. 2021, accessed: apr. 05, 2023. [online]. available at: jurnal.umpar.ac.id. [7] c. juditha, “hoax communication interactivity in social media and anticipation (interaksi komunikasi hoax di media sosial serta antisipasinya),” j. pekommas, vol. 3, no. 1, pp. 31–44, sep. 2018, doi: 10.30818/jpkm.2018.2030104. [8] e. dwi and s. watie, “komunikasi dan media sosial (communications and social media),” j. messenger, vol. 3, no. 2, pp. 69–74, mar. 2016, doi: 10.26623/themessenger.v3i2.270. [9] “digital 2021 we are social uk.”, available at : wearesocial.com. [10] “social media use in 2021 | pew research center.” available at : pewresearch.org. [11] a. m. kaplan and m. haenlein, “users of the world, unite! the challenges and opportunities of social media,” bus. horiz., vol. 53, no. 1, pp. 59–68, jan. 2010, doi: 10.1016/j.bushor.2009.09.003. [12] p. a. cakranegara and e. susilowati, “analisis strategi implementasi media sosial (studi kasus ukm ‘xyz’),” firm j. manag. stud., vol. 2, no. 2, sep. 2017, doi: 10.33021/firm.v2i2.337. [13]. k nurmutiasundawati, “penggunaan media sosial instagram dalam upaya meningkatkan hasil belajar dan motivasi siswa kelas xi pada materi sel,” 2018, available at : unpas.ac.id. [14] h. miftahurrahmah and f. harahap, “hubungan kecanduan sosial media dengan kesepian pada mahasiswa,” acta psychol., vol. 2, no. 2, pp. 153–160, oct. 2020, doi: 10.21831/ap.v2i2.34544. [15] h. nassaji, “qualitative and descriptive research: data type versus data analysis,” vol. 19, no. 2, pp. 129–132, feb. 2015, doi: 10.1177/1362168815572747. [16] willis f.overton, “life-span development: concepts and issues,” pp. 1–29, 1997, accessed: apr. 06, 2023. available at: researchgate.net. [17] h. taherdoost, “validity and reliability of the research instrument; how to test the validation of a questionnaire/survey in a research,” ssrn electron. j., aug. 2016, doi: 10.2139/ssrn.3205040. [18] m. t. kane, “book reviews: test validity,”, vol. 14, no. 3, pp. 291–296, sep. 1989, doi: 10.3102/10769986014003291. [19] sultoni, i. gunawan, and d. n. sari, “validity and reliability of character education internalization instruments,” pp. 245–249, dec. 2019, doi: 10.2991/coema-19.2019.50. [20] “guilford, j. p. fundamental statistics in psychology and education. new york (330 west 42nd street): mcgraw-hill book company, 1956. 565 p. $6.25,” sci. educ., vol. 41, no. 3, pp. 244–244, apr. 1957, doi: 10.1002/sce.3730410357. [21] s.arikunto, prosedur penelitian : suatu pendekatan praktik / suharsimi arikunto | opac perpustakaan nasional ri. rineka cipta 2010, 2010. accessed: apr. 06, 2023. available at: opac.perpusnas.go.id. [22] d. andrich and i. marais, “reliability and validity in classical test theory,” pp. 41–53, 2019, doi: 10.1007/978-981-13-7496-8_4. [23] melissa j. goertzen, “applying quantitative methods to e-book collections, ,” pp. 5–31, accessed: apr. 06, 2023. [online]. available at: journals.ala.org. [24] “razali, n. and wah, y. (2011) power comparisons of shapiro-wilk, kolmogorov-smirnov, lilliefors and anderson-darling tests. journal of statistical modeling and analytics, 2, 21-33. references scientific research publishing.” available at : scirp.org. [25] m. n. mohamad asri, n. h. hashim, w. n. s. mat desa, and d. ismail, “pearson product moment correlation (ppmc) and principal component analysis (pca) for objective comparison and source determination of unbranded black ballpoint pen inks,”, vol. 50, no. 4, pp. 323–340, jul. 2016, doi: 10.1080/00450618.2016.1236292. https://doi.org/10.31294/jc.v16i2.1283 https://jurnal.umpar.ac.id/index.php/laparole/article/view/1119 https://doi.org/10.30818/jpkm.2018.2030104 https://doi.org/10.26623/themessenger.v3i2.270 https://wearesocial.com/uk/blog/2021/01/digital-2021-uk/ https://www.pewresearch.org/internet/2021/04/07/social-media-use-in-2021/ https://doi.org/10.1016/j.bushor.2009.09.003 https://doi.org/10.33021/firm.v2i2.337 http://repository.unpas.ac.id/40202/ https://doi.org/10.21831/ap.v2i2.34544 http://dx.doi.org/10.1177/1362168815572747 https://www.researchgate.net/publication/286253216_life-span_development_concepts_and_issues https://doi.org/10.2139/ssrn.3205040 http://dx.doi.org/10.3102/10769986014003291 https://doi.org/10.2991/coema-19.2019.50 https://doi.org/10.1002/sce.3730410357 https://opac.perpusnas.go.id/detailopac.aspx?id=801361 https://doi.org/10.1007/978-981-13-7496-8_4 https://www.journals.ala.org/index.php/ltr/issue/view/640 https://www.scirp.org/(s(lz5mqp453edsnp55rrgjct55))/reference/referencespapers.aspx?referenceid=2050949 https://doi.org/10.1080/00450618.2016.1236292 bulletin of social informatics theory and application issn 2614-0047 vol. 5, no. 2, september 2021, pp. 124-132 124 https:doi.org/10.31763/businta.v5i2.455 topic modeling using latent dirichlet allocation (lda) on twitter data with indonesia keyword edi surya negara 1,*, dendi triadi 2 a data science interdisciplinary research center, computer science, universitas bina darma, palembang, indonesia 1 e.s.negara@binadarma.ac.id*; 2 dendi.triadi@binadarma.ac.id * corresponding author 1. introduction social media is one of the factors that causes changes in people's social interactions. from social media, humans get a lot of information because the scope of social media is unlimited. social media exists in many different forms, including social networks, internet forums, weblogs, social blogs, micro blogging, wikis, podcasts, images, videos, ratings and social bookmarking [1]. of the many social media twitter is one of the most popular. twitter exists as a means of communication to exchange information about events in the real world, short messages on twitter in general influence various events experienced by users in real-time [2]. the huge twitter data can be used as a data source for online news webs. however, with the many topics extracted from twitter data, the incoming data has a variety of topics which causes difficulties in identifying the topics from the data set taken and will require a lot of time if it has to be done manually by humans. meanwhile, the data is potentially needed to provide information as quickly as possible [3]. summarization is a frequent biomedical text mining activity that heavily relies on information extraction. summarization is the process of automatically finding the most salient features of one or more papers and representing them in a logical manner. it has recently attracted significant interest as a result of the massive growth of unstructured data in the biomedical arena, such as scholarly papers and clinical data. [4]. a large volume of news stories presents a potential difficulty in the work of automatic classification. the debates over how to classify english news stories have been extensively a r t i c l e i n f o a b s t r a c t article history received august 4, 2021 revised august 20, 2021 accepted september 2, 2021 digital transformation causes an increase in the volume of information in the form of text such as news. on social media, a lot of news is uploaded in such a fast time and one of them is twitter. twitter is a social media service that has served many users, making it one of the social media that has very large data. from this very large data, it can be used as a news source for online news web. however, with the many topics extracted from twitter data, the incoming data has a variety of topics which causes difficulties in identifying the topics from the data set taken and will require a lot of time if it has to be done manually by humans. meanwhile, the data is potentially needed to provide information as quickly as possible. this study aims to classify topics on data taken from twitter automatically so that it can make a classification on the news taken, can be more effective and efficient and does not take as much time as done manually by humans. the research was conducted using the latent dirichlet allocation (lda) method. news documents that will be classified are indonesian news documents and will be classified into topics to be determined. the results of the research using topic modeling using the lda method concluded that the number of topics formed from 9094 tweet data was 10 topics. this is an open access article under the cc–by-sa license. keywords classification text mining news documents natural language processing latent dirichlet allocation (lda) http://creativecommons.org/licenses/by-sa/4.0/ http://creativecommons.org/licenses/by-sa/4.0/ issn 2614-0047 bulletin of social informatics theory and application 125 vol. 5, no. 2, september 2021, pp. 124-132 negara & triadi (topic modeling using latent dirichlet allocation) examined. this differs from the automatic categorisation of indonesian news articles. the implemented classification method is confined to classical methods such as naive bayes and support vector machine. both techniques are rigorous in their classification of documents into a single topic. as a result, we employ one of the topic modeling techniques, in which a document is represented as a distribution of topics, each of which is represented by a set of words. latent dirichlet allocation is the technique used. the experimental investigation is conducted using a 10-fold cross validation technique and numerous parameters, including the number of subjects (5, 10, and 15) and both lda hyperparameters (0.001, 0.01, and 0.1). the result indicates that the best overall accuracy is approximately 70% when categorizing documents of indonesian news stories into five categories, including economic, tourist, criminal, sport, and politics. [5]. classification using independent variables has been widely implemented using the naive bayes method and the results depend on the features used, and do not apply if the conditional probability is zero. while classification using the svm method there are many texts that cannot be classified correctly due to high dimensional characteristics, still rigid and performance depending on the selection of kernel functions causing data sparseness problems [6]. this article presents text classification with a topic modeling approach with the aim of classifying news topics for online news webs using the latent dirichlet allocation (lda) method. the news texts that will be used in this study include the results of crawling twitter data using the application programming interface (api) provided by twitter to produce text data sets based on updates uploaded by twitter users. the crawling process is successful on twitter data using the application programming interface and has produced informative data through the crawling process [7]. research topic modeling using the latent dirichlet allocation (lda) method has been carried out by several previous researchers. but this article presents topic modeling using the keyword "indonesia" by crawling the data create_at, id, id_str, text, entity, metadata, source, user, geo, coordinates, retweet which will be used for online news web development with the topic of information modeling, sentiment analysis and geolocation graph mapping. 2. literature review 2.1. social media social media is a type of media that is comprised of three components: an information infrastructure and tools for producing and disseminating media content; and individuals, organizations, and industries make and consume media information in digital form in the form of personal communications, news, ideas, and cultural items. [8]. social media and other online media are a place for information and a place for disseminating information that can be accessed for anyone who wants to find information easily through the internet, either through smartphones or with computers/laptops. social media is defined as an online information technology tool that enables users to connect easily via the internet in the form of text messages, audio, video, and photographs [9]. 2.2. twitter twitter is an online social networking and microblogging website that enables users to send and read text-based messages of up to 140 characters, which was raised to 280 characters on november 7, 2017 and is referred to as tweets. jack dorsey founded twitter in march 2006, and the social networking platform launched in july. since its inception, twitter has grown to become one of the top ten most visited websites on the internet and has been termed the "internet's short message service." since its inception in 2006, twitter has grown to be one of the most popular social media platforms on the planet. indonesia has been a twitter user since the service's launch and is one of the most productive users. indonesia has approximately 29 million twitter users. in 2014, indonesia was rated sixth in terms of the number of tweets. numerous pieces of information can be gleaned from the social media platform twitter, which is becoming increasingly popular. it is used for a variety of purposes, including public, government, and business purposes. twitter users share a range of different types of tweets. users can express their opinions on shared tweets. the term "topic" refers to the substance of numerous tweets that cover the same subject. by running topic analysis on these tweets, you may determine the primary themes being discussed by people at the moment [10]. 126 bulletin of social informatics theory and application issn 2614-0047 vol. 5, no. 2, september 2021, pp. 124-132 negara & triadi (topic modeling using latent dirichlet allocation) 2.3. topic modelling the notion of topic modeling is made up of three entities: "word," "document," and "corpora." the term "word" refers to the fundamental unit of discrete data in a text, which is defined as a piece of vocabulary that is indexed for each unique word in the document. the term "document" refers to an array of n words. corpora is the plural version of corpus, which is a collection of m documents. while "subject" refers to the distribution of a specific vocabulary word. to put it simply, each document in the corpus contains a unique fraction of topics mentioned based on the words included within [11]. the basic idea of topic modeling is a topic consisting of words certain words that make up the topic, in a document may be composed of several topics and probabilities. while human thought documents are something that can be observed but topics, topic distribution per document, and labeling on each topic are hidden structures, therefore topic modeling helps to find topics and words contained in the document [12]. the concept of topic modeling is aimed at right in fig. 1. fig. 1. topic modeling concept 2.4. latent dirichlet allocation latent dirichlet allocation (lda) is a topic modeling and analysis method that is currently in great demand. in analyzing large documents, lda is present as one of the methods that can be used. one of the functions of lda is that it can be used to summarize, cluster, and connect or process large data, this is because lda can produce a list of topics that are weighted in each document [13]. lda is an analysis method on very large documents. lda can be used to summarize, cluster, connect or process very large data because lda produces a list of topics that are weighted for each document [13]. the dirichlet distribution is used to obtain the topic distribution for each text, and the lda generating process uses the dirichlet results as a proposal for allocating words in the document to different subjects. however, from a human perspective, documents are visible elements, whereas topics, their distribution within documents, and the classification of words inside topics are hidden structures; thus, this approach is named latent dirichlet allocation (lda) [11]. latent dirichlet allocation (lda) is a method in topic modeling that provides flexibility in organizing, understanding, searching and summarizing electronic archives that have proven to be successfully implemented quite well in the text field and information retrieval. blei represents the lda method as a probabilistic model visually as shown in fig. 2. 3. method the method used in this study is to use a text mining approach with the main objective of classifying text based on modeling topics. iteratively, the research steps are arranged based on the framework shown in the sub-chapter of the research stages. in summary, the development of the topic modeling method began with the creation of the latent semantic indexing (lsi) algorithm, which attempted to address issues with the tf-idf scheme's dimension reduction. then, the lsi method was developed utilizing the maximum likelihood or bayesian approach, dubbed the probabilistic lsi (plsi) method, which incorporates the concept of probability [14]. although the plsi method can be useful for probabilistic modeling of topics, it does not fully produce probabilistic models at the document level. to solve this problem, the latent dirichlet allocation method emerged [11]. while the lda method can perform effectively at the issn 2614-0047 bulletin of social informatics theory and application 127 vol. 5, no. 2, september 2021, pp. 124-132 negara & triadi (topic modeling using latent dirichlet allocation) document level for documents that contain a large number of subjects, it cannot be used optimally for topic modeling in datasets that contain compact language, such as the twitter dataset. to accomplish this, we require the appropriate method for modeling topics on a small dataset, which is why lda was developed into twitter-lda for the purpose of modeling topics on the twitter dataset [15]. fig. 2. topic modeling visualization with lda method [11]. 3.1. research stages this research was conducted by following the main framework of text mining which is divided into four stages. the framework is shown in fig. 3. fig. 3. research stages in fig. 3 it is explained that the research was carried out by preparing the data in advance, if the data has been prepared it will proceed to the topic modeling stage with the latent dirichlet allocation method, after the data is processed with this method, it will proceed to visualization to display the results of the data that has been processed. if the visualization has been completed, the data obtained will enter the results and discussion stage [16]. 3.2. modeling topics with latent dirichlet allocation at the stages, the modeling topic with latent dirichlet allocation (lda) consists of several stages, namely: document, pre-processing, modeling topic, latent dirichlet allocation, output document, these stages are shown in fig. 4. in general, the classification of text based on modeling topics using the latent dirichlet allocation algorithm is carried out using five main stages. the first stage is to prepare a document or dataset that has followed the format in data processing. the second stage is pre-processing, where at this stage the data is cleaned. the third stage is modeling with the aim of classifying text by preparing training data as the main model for topic classification. the fourth stage is to run the latent dirichlet allocation algorithm to calculate and execute the test data that has been prepared. the fifth stage is the result or output of the resulting modeling topic [17]. 128 bulletin of social informatics theory and application issn 2614-0047 vol. 5, no. 2, september 2021, pp. 124-132 negara & triadi (topic modeling using latent dirichlet allocation) fig. 4. modeling topic stage with latent dirichlet allocation (lda) 3.3. corpus pre-processing in conducting modeling topics with lda, steps are needed to prepare the data so that it can be processed at the next stage, this stage is called the corpus pre-processing stage [18]. the sub-activities of the corpus preprocessing stage are shown in the fig. 5. fig. 5. sub-activity of the corpus pre-processing stage [19] the inputted document will be formed into a lovercase with the intention that the same word but different in capitals and not, is considered the same word. furthermore, the takenization process is the process of separating the data in the sentence into single word pieces or termed words. stopwords are common words that have no meaning and usually occur in large numbers [20]. given the high frequency of occurrence of stopwords in a document, making the step of eliminating stopwords is very important, because it will make the topic not interpreted properly. in the stemming process it is used to change the form of a word into the root word of the word. the stemming process will eliminate all affixes, which consist of prefixes, insertions, suffixes and combinations of prefixes and suffixes on derived words, because text data needs to be formed into basic words so that there are no words that are the same but different because of affixes [21]. issn 2614-0047 bulletin of social informatics theory and application 129 vol. 5, no. 2, september 2021, pp. 124-132 negara & triadi (topic modeling using latent dirichlet allocation) 3.4. modeling topics the latent dirichlet allocation stage aims to ensure that the topic model generated from the topic modeling results carried out on the document is correct, both in the form of topics and words in the topic. in the topic model validation stage, the topic's level of truth is adjusted according to the perplexit method and based on the level of coherence [22]. here is how the lda algorithm works, which will be shown in the (1). 𝑃(𝑊, 𝑍, ∅, 𝜑; 𝛼, 𝛽) = ∏ 𝑝(𝜑𝑖; 𝛽) ∏ 𝑃(∅𝑗 ; 𝛼) ∏ 𝑃 (𝑍𝑗,𝑡 |∅𝑗 )𝑃(𝑊𝑗,𝑡 |𝜑𝑍𝑗,𝑡 ) 𝑁 𝑡=1 𝑀 𝑗=1 𝐾 𝐼=1 (1) note: m : shows the number of documents n : the number of words in a particular document (document i n_words) α : dirichlet prior parameter on the topic distribution per document β : dirichlet prior parameter in the word-by-topic distribution ∅i : topic distribution for document i φk : word distribution for the topic k zij : topic for the jth word in document i wij : specific word. 4. results and discussion in this section, we will discuss the results of the twitter text mining trial for topic classification on the online news web with a text mining approach using latent dirichlet allocation (lda). the trial was carried out with the aim of facilitating decision making in choosing topics to be made for news on the online news web [23]. 4.1. implementation in conducting this research, it has been carried out in several stages, the first stage is crawling twitter data. at this stage the crawling of twitter data is carried out with the keyword "indonesia" as the hashtag. then the results of the crawl are changed from json to csv format before going to the next stage. the next stage is topic modeling with the latent dirichlet allocation method, at this stage it will be managed through the text preprocessing process, where there will be two actions to be taken, namely lowercase and tokenizing before finally arriving at the latent dirichlet allocation (lda) stage. from the results of the implementation of the latent dirichlet allocation (lda) stage, it will be visualized in the form of a word cloud to make it easier to understand. with visualization, it is hoped that it will make it easier for decision makers what topic to take in making news on the online news web [24]. 4.2. crawling implementation this twitter data crawl uses the twitter search api as the processed source text. in the process of crawling data using the python programming language. how to use it is to run the source code that has been prepared. in the management it takes a consumer key, consumer secret as authentication to access steam twitter that has been provided by the search api [25]. in downloading tweets, the keyword "indonesia" is written in the source code. after running it will download tweet data and then save it in json form and change it into csv form to continue to the next process. from the process carried out when the source code is finished, the data obtained is complete information containing information about the text of the tweet itself in the form of created_at, id, id_str, text, entities, metadata, source, user, geo, coordinates, retweeted, and others concerned. with full profile of wteet author or twitter user and saved in json form. fig. 6 shows the small description of 9094 twitter data in json form obtained. 130 bulletin of social informatics theory and application issn 2614-0047 vol. 5, no. 2, september 2021, pp. 124-132 negara & triadi (topic modeling using latent dirichlet allocation) fig. 6. crawling results in json form 4.3. implementation of latent dirichlet allocation at this stage the topic modeling with latent dirichlet allocation is the stage where the latent dirichlet allocaion process is called. this process is unsupervised learning where machine learning looks for previously undetected patterns in a data set without pre-existing labels and with minimal human supervision. so that the results of this method will be taken by the researcher through the results of the lda and it is concluded that the topic belongs to a certain category. topics that will be formed from the processed documents are ten topics. to get maximum results, the document will be trained with vector data that has been previously input. fig. 7 presents the result of the topic call source code. fig. 7. results of topic calling 4.4. visualization at the visualization stage, it will be done using wordcloud. wordcloud are words that exist, depicted in a visualization where the size of the letters depends on the frequency with which the word appears in the text. from the results of the previous process will be directly displayed by means of wordcloud. the results of the visualization can be seen in fig. 8. issn 2614-0047 bulletin of social informatics theory and application 131 vol. 5, no. 2, september 2021, pp. 124-132 negara & triadi (topic modeling using latent dirichlet allocation) fig. 8. display of wordcloud 5. conclusion after doing the analysis and testing that was done previously, the resulting data shows that latent dirichlet allocation can be used for text mining. the data generated from the twitter api crawling process is 9094 documents. from the 9094 document data produced, it was cleaned using text processing and generated tweet data from 9094 to 2909 and resulted in 10 main topics. from the process of this medeling topic, it can be concluded that latent dirichlet allocation can be used for text mining. acknowledgment we thank the data science interdisciplinary research center universitas bina darma for providing laboratory facilities in conducting this research. references [1] a. m. kaplan and m. haenlein, “users of the world, unite! the challenges and opportunities of social media,” bus. horiz., vol. 53, no. 1, pp. 59–68, 2010, doi: 10.1016/j.bushor.2009.09.003. [2] h. becker, m. naaman, and l. gravano, “beyond trending topics: real-world event identification on twitter,” 2011. [3] s. hong, “online news on twitter: newspapers’ social media adoption and their online readership,” inf. econ. policy, vol. 24, no. 1, pp. 69–74, mar. 2012, doi: 10.1016/j.infoecopol.2012.01.004. [4] m. allahyari et al., “a brief survey of text mining: classification, clustering and extraction techniques,” arxiv prepr. arxiv1707.02919, jul. 2017, [online]. available: http://arxiv.org/abs/1707.02919. [5] r. kusumaningrum, m. i. a. wiedjayanto, and s. adhy, “classification of indonesian news articles based on latent dirichlet allocation,” in 2016 international conference on data and software engineering (icodse), 2016, pp. 1–5. [6] p. haffner, g. tur, and j. h. wright, “optimizing svms for complex call classification,” in 2003 ieee international conference on acoustics, speech, and signal processing, 2003. proceedings. (icassp ’03)., 2003, vol. 1, pp. i-632-i–635, doi: 10.1109/icassp.2003.1198860. [7] e. s. negara, d. triadi, and r. andryani, “topic modelling twitter data with latent dirichlet allocation method,” in 2019 international conference on electrical engineering and computer science (icecos), oct. 2019, pp. 386–390, doi: 10.1109/icecos47637.2019.8984523. 132 bulletin of social informatics theory and application issn 2614-0047 vol. 5, no. 2, september 2021, pp. 124-132 negara & triadi (topic modeling using latent dirichlet allocation) [8] p. n. howard and m. r. parks, “social media and political change: capacity, constraint, and consequence,” j. commun., vol. 62, no. 2, pp. 359–362, apr. 2012, doi: 10.1111/j.14602466.2012.01626.x. [9] m. o. odewole, “the role of a librarian in using social media tools to promote the research output of his/ her clienteles,” j. educ. pract., vol. 8, no. 27, 2017. [10] a. ju, s. h. jeong, and h. i. chyi, “will social media save newspapers?,” journal. pract., vol. 8, no. 1, pp. 1–17, jan. 2014, doi: 10.1080/17512786.2013.794022. [11] d. m. blei, a. y. ng, and m. i. jordan, “latent dirichlet allocation,” j. mach. learn. res., vol. 3, pp. 993– 1022, 2003, doi: doi/10.5555/944919.944937. [12] d. m. blei, “probabilistic topic models,” commun. acm, vol. 55, no. 4, pp. 77–84, apr. 2012, doi: 10.1145/2133806.2133826. [13] j. c. campbell, a. hindle, and e. stroulia, “latent dirichlet allocation,” in the art and science of analyzing software data, elsevier, 2015, pp. 139–159. [14] l. chen, n. tokuda, and a. nagai, “a new differential lsi space-based probabilistic document classifier,” inf. process. lett., vol. 88, no. 5, pp. 203–212, dec. 2003, doi: 10.1016/j.ipl.2003.09.002. [15] w. x. zhao et al., “comparing twitter and traditional media using topic models,” in advances in information retrieval, berlin, heidelberg: springer, 2011, pp. 338–349. [16] k. l.sumathy and m. chidambaram, “text mining: concepts, applications, tools and issues an overview,” int. j. comput. appl., vol. 80, no. 4, pp. 29–32, oct. 2013, doi: 10.5120/13851-1685. [17] z. a. guven, b. diri, and t. cakaloglu, “classification of turkishtweet emotions by nstage latent dirichlet allocation,” in 2018 electric electronics, computer science, biomedical engineerings’ meeting (ebbt), apr. 2018, pp. 1–4, doi: 10.1109/ebbt.2018.8391454. [18] y. lu, q. mei, and c. zhai, “investigating task performance of probabilistic topic models: an empirical study of plsa and lda,” inf. retr. boston., vol. 14, no. 2, pp. 178–203, apr. 2011, doi: 10.1007/s10791010-9141-9. [19] j. ucherek et al., “auto-suggestive real-time classification of driller memos into activity codes using natural language processing,” feb. 2020, doi: 10.2118/199593-ms. [20] v. jha, n. manjunath, p. d. shenoy, and k. r. venugopal, “hsra: hindi stopword removal algorithm,” in 2016 international conference on microelectronics, computing and communications (microcom), jan. 2016, pp. 1–5, doi: 10.1109/microcom.2016.7522593. [21] j. r. méndez, e. l. iglesias, f. fdez-riverola, f. díaz, and j. m. corchado, “analyzing the impact of corpus preprocessing on anti-spam filtering software,” res. comput. sci., vol. 17, pp. 129–138, 2005. [22] d. maier et al., “applying lda topic modeling in communication research: toward a valid and reliable methodology,” commun. methods meas., vol. 12, no. 2–3, pp. 93–118, apr. 2018, doi: 10.1080/19312458.2018.1430754. [23] n. s. purohit, a. b. angadi, m. bhat, and k. c. gull, “crawling through web to extract the data from social networking site twitter,” in 2015 national conference on parallel computing technologies (parcomptech), feb. 2015, pp. 1–6, doi: 10.1109/parcomptech.2015.7084522. [24] r. kusumaningrum, s. adhy, and s. suryono, “wcloudviz: word cloud visualization of indonesian news articles classification based on latent dirichlet allocation,” telkomnika (telecommunication comput. electron. control., vol. 16, no. 4, p. 1752, aug. 2018, doi: 10.12928/telkomnika.v16i4.8194. [25] j.-h. lee, “building an sns crawling system using python,” j. korea ind. inf. syst. res., vol. 23, no. 5, pp. 61–76, 2018, doi: https://doi.org/10.9723/jksiis.2018.23.5.061. bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 2, december 2022, pp. 120-131 120 https:doi.org/10.31763/businta.v6i2.395 impact of intense social media usage on sleeping pattern nadifah adya ilham a,1,*, mahisha mutharrif laila a,2, muhammad aditia syauqi a,3, mohammad ardy audya armadhana a,4 , anusua ghosh b,5 a undergraduate, universitas negeri malang, malang, indonesia b university of south australia, adelaide, australia 1 nadifaadya.1805356@students.um.ac.id ; 2 mahishaicha.1805356@students.um.ac.id; 3 syauqi.aditia.1805356@students.um.ac.id; 4 mohammad.ardy.1805356@students.um.ac.id; 5 anusua.ghosh@mymail.unisa.edu.au * corresponding author 1. introduction social media is a collection of web-based resources that enable people to exchange and spread new concepts, views, and knowledge in a more collaborative and virtual setting [1]. social media provides numerous opportunities for collecting knowledge, entertainment, and social interaction [2], but social media users' influence on young people's sleep patterns has been a concern [3]. the relationship between social media use and sleep has been linked to three well-recognized root causes and reasons for the negative effect of cell media on sleep. firstly, young people’s use of social media could interfere with their sleep; this is known as the time displacement hypothesis [4]. secondly, it is well understood that using social media raises arousal levels, especially when using facebook [5]. adolescents can find it more difficult to fall asleep due to these elevated levels of physiological arousal [6]. thirdly, bright screen lights can disrupt melatonin production in teens who use social media [7]. according to this reasoning, individuals who use electronics that produce flashing video lights have difficulty falling asleep before bedtime. their biological clock rhythms have been thrown off, and they have more daytime sleepiness [8]. also, homeostatic factors, endogenous circadian factors, and behavioral factors are the three main factors that influence sleep. behavioral factors can replace homeostatic and circadian factors. the homeostasis mechanism is a physiological and psychological condition that humans must satisfy satisfactorily. a necessity is one of the things that are essential, useful, or required to sustain homeostasis and life itself. maslow’s hierarchy as show in fig. 1. a r t i c l e i n f o a b s t r a c t article history received october 20, 2022 revised november 22, 2022 accepted december 3, 2022 the sleeping pattern refers to resting after a day's activities. this involves the number of hours spent sleeping and the body's overall wellbeing when performing everyday tasks. when we do not get enough sleep, it immediately affects our health. several things, including intense social media usage, cause this unhealthy sleep pattern. the use of social media can affect health, both physically and psychologically. this research relies on the systematic literature review (slr) method obtained from databases, namely google scholar from many countries, and data about the digital 2021 global overview report from hootsuite & we are social. of the 55 studies obtained, 41 stated that insufficient sleep was linked to social media use, daytime sleepiness, insomnia, or sleep patterns. according to the research, excessive social media usage is related to sleep problems or disruptions. social media usage will have a beneficial impact since it will make daily tasks easier. however, unrestricted use of social media can have a detrimental effect on sleep habits. this is an open access article under the cc–by-sa license. keywords social media sleeping pattern daytime sleepiness https://doi.org/10.31763/businta.v6i2.395 mailto:nadifaadya.1805356@students.um.ac.id http://creativecommons.org/licenses/by-sa/4.0/ http://creativecommons.org/licenses/by-sa/4.0/ issn 2614-0047 bulletin of social informatics theory and application 121 vol. 6, no. 2, december 2022, pp. 120-131 ilham et.al (impact of intense social media usage on sleeping pattern) fig. 1. maslow’s hierarchy in maslow's hierarchy, the pyramid's needs rise from bottom to top, with the lowest needs at the bottom and the highest needs at the top. the first layer of the pyramid represents physiological requirements. these include food, water, rest, sleep, and so forth. these have something to do with biological motivations [9]. as a result, it is critical to comprehend the factors that influence sleep. behaviors that occur before bedtime can disrupt sleep. sleepiness or drowsiness during the day diminishes the capacity to remain awake and aware during regular operating hours [10]. according to research findings published in april 2021, 4.66 billion people have access to the internet today, accounting for nearly 60% of the world's population. so, based on this data, we can deduce that with so much internet access, these people will naturally visit a variety of platforms, with social media being one of the most common. for example, 36,5% of global internet users aged 16 to 64 use social media to “keep up with news and current events,” which is the most common reason for using social media globally. most internet users claim this is one of the main reasons they use social media [11]. therefore, one of the factors causing the pattern of shorter sleep duration in adolescents is excessive use of social media, incredibly late at night [12]. sleep disturbances can occur as a consequence of heavy usage of social media, so this study is intended to present that there are a variety of related cases in different countries about the effect of intense social media use on sleep patterns, with a variety of negative consequences that can lead to poor body health. as a result, various types of people, especially indonesians, must recognize the importance of prevention. recent data review shows that the percentage of people who use social media in indonesia can be inferred that many people need to be informed on when to use social media and how to avoid disrupting sleep habits for their wellbeing. 2. method this research is a systematic literature review that summarizes some of the related literature for the research subject. this research design is the newest approach adopted by researchers/experts to analyze research results in various reputable journals with different themes. the stage of data gathering is where analysis data was collected. primary and secondary data were gathered in this research. in this study, the primary data taken were journals from the database. specifically, google scholar and the following keywords were used in the literature search: “social media effect on sleeping pattern”, “sleeping problem”, and “sleeping disorder”. the literature used was written between 2011 and 2021. secondary data is used to supplement primary data; for example, if the primary data contains only abstracts, secondary data is used to complete the primary data. secondary data were gathered with the support of google. data collection in the study was obtained through several stages, including 122 bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 2, december 2022, pp. 120-131 ilham et.al (impact of intense social media usage on sleeping pattern) observation and literature study from research that used the slr method and data analytics from datareportal.com about the digital 2021 global overview. the digital 2021 global overview is a study that includes all of the evidence, patterns, and perspectives necessary to comprehend the global ‘state of digital' in 2021. the report involves statistics about how the world's population uses the world wide web, mobile devices, and social networking sites. finally, after gathering data, divide the research into two categories: students and college students. the conclusion presents that social media has an impact on sleep patterns. 3. results and discussion as seen in [11], there are 4.20 billion social network consumers. this increased by 490 million in the last year, indicating a greater than year-over-year growth of more than 13%. people who use social media account for more than 53% of the global population. according to data, the total regular time spent on social media has increased by more than a half hour in the last five years. the average person currently consumes approximately two hours and twenty-five minutes daily on social media, equating to approximately one full working day a week. about social media users by age, it shows that mostly 18-24 years old, with a total of 25,2% of 4.20 billion users that can be related to college students. students 13-17 years old, with a total of 6.7% of 4.20 billion users of social media the data was chosen for journals or research data because it has problems, approaches, and sufficient information for data selection. based on the results of a review of the 55 studies obtained, 41. research shows a strong correlation between social media use and poor sleep, daytime sleepiness, insomnia, or disturbed sleep habits. the following results are obtained and divided into two categories. research related to sample students and college students. table.1 research related to the sample: students no year journal title research location population/sample result 1 2015 adolescent problematic social networking and school experiences: the mediating effects of sleep disruptions and sleep quality australia a representative study of 1,886 students in australia between the ages of 12 and 18 years old adolescents' inappropriate social networking usage greatly enhanced sleep disruptions, which had a detrimental effect on adolescents' expectations of sleep efficiency, lowering adolescents' ratings of school satisfaction. 2 2011 the effects of insomnia and internet addiction on depression in hong kong chinese adolescents: an exploratory cross‐ sectional analysis hongkong, china secondary school in hong kong. results indicate that internet addicts were classified as insomniacs and depressive in this chinese teenage study. 3 2017 relationship between mobile phone addiction and the incidence of poor and short sleep among korean adolescents: a longitudinal study of the korean children & youth panel survey korea korean adolescent results indicate that internet addicts were classified as insomniacs and depressive in this chinese teenage study. 4 2019 social media use and adolescent sleep patterns: cross-sectional findings from uk 1. 872 teenagers (aged 13– 15 years) were surveyed. the findings suggest that social media usage and sleep behaviors, particularly late sleep beginning, are correlated with statistically issn 2614-0047 bulletin of social informatics theory and application 123 vol. 6, no. 2, december 2022, pp. 120-131 ilham et.al (impact of intense social media usage on sleeping pattern) no year journal title research location population/sample result the uk millennium cohort study and functionally significant outcomes. 5 2018 the relationship of social media usage duration and sleep pattern disorders in children aged 12 to 14 years at smp negeri 1 langke rembong indonesia adolescents aged 12-14 years in langke rembong junior high school in children aged 12-14 years at smp 1 langke rembong, there is a correlation between the use of social media and interrupted sleeping habits. 6 2015 the relationship duration of social media use with the incidence of insomnia in adolescents in sma negeri 9 manado indonesia adolescents in manado 9 junior high school the period of social media usage and the prevalence of insomnia among adolescents in sma negeri 9 manado are correlated. suggestions help you spend less time on social media and better control your sleep time. 7 2020 analysis of the relationship between social media use and sleep quality in adolescents indonesia adolescents in lawongan 1 senior high school in adolescents in class xi mathematics and natural sciences (mia) sman 1 langowan, there is a connection between their usage of social media and their sleep quality 8 2017 the relationship between stress level and the incidence of insomnia in adolescent social media users at mts muhammadiyah i malang indonesia adolescents in muhammadiyah junior high school there is a relationship between stress levels and the incidence of insomnia in adolescent social media users (facebook). 9 2019 prevalence and effect of social media on sleep among students of higher institutions in sokoto metropolis, sokoto state nigeria nigeria students from sokoto metropolis, sokoto state, nigeria's higher education institutions students spend many hours a day on social media, affecting their sleep. there are growing facts. a regular sleep period of 7 to 9 hours is needed for the human body to act normally and healthily. 10 2017 relationship intensity of use of the site social networks with insomnia on teenagers at muhammadiyah sma 7 yogyakarta indonesia 134 senior high school students in adolescents at sma muhammadiyah 7 yogyakarta, there is a connection between the frequency with which they use social networking sites and insomnia. 11 2020 identifying drivers for bedtime social media use despite sleep costs: the adolescent perspective uk adolescents between the ages of 11 and 17 years old engaged in focus group interviews this research aims to include an adolescent viewpoint on the reasons for bedtime social media usage and the perceived effect on sleep. 12 2021 the role of technology and social media use in sleep-onset difficulties among italian italy three thousand one hundred seventy-two teenagers aged 11 to 15 years in northern italy. this research informs a representative group of school-age children about the correlation between sleep 124 bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 2, december 2022, pp. 120-131 ilham et.al (impact of intense social media usage on sleeping pattern) no year journal title research location population/sample result adolescents: crosssectional study problems, technology, and social networking. screenbased exposure and online social networking are substantially correlated with teenage sleep-onset difficulties 13 2014 effects of pre-sleep media use on sleep/wake patterns and daytime functioning among adolescents: the moderating role of parental control belgium 1,926 belgian students, adolescents according to correlational analyses, tv consumption, except television watching, was correlated to late bedtimes and greater sleep durations. since social media usage may significantly impact adolescent sleep, parental supervision is needed to monitor adolescent media exposure and moderate the negative effects of social media use on sleep. 14 2019 associations of social media use with physical activity and sleep adequacy among adolescents: crosssectional survey usa students of the eighth, tenth, and twelfth grades in the united states regularly using social networking daily was linked to continuing health behaviors, while mild social media usage was linked to the highest amounts of physical activity and the least amount of sleep adequacy for those with modest health behaviors. 15 2015 technology use and sleep quality in preadolescence and adolescence italy a sample of 850 (364 males) preadolescents and adolescents the circadian preference of the evening, cell phone and internet usage, amount of other tasks after 21:00, late turn-off period, and number of devices in the bedroom have various detrimental effects on sleep quality in preadolescents and adolescents. 16 2017 sleep in adolescents: association with social media, mental health, and problem behavior islandia study participants were primary school grades 8, 9, and 10 studied in iceland's elementary schools a chi-square correlation test and two-way anova were performed to evaluate the hypothesis that time spent on social media affects sleep. those who invested a long time on social media were more likely to sleep insufficiently (26.4%) than those who spent less time (9.7%). 17 2019 media use and sleep in teenagers: what do we know? (american) usa american teens in conclusion, teens have high screen usage and bad sleep health (i.e., limited length, bad consistency, and late timing). 18 2015 the impact of sleep time-related (american) usa american adolescents strict usage was correlated with anxiety, excessive issn 2614-0047 bulletin of social informatics theory and application 125 vol. 6, no. 2, december 2022, pp. 120-131 ilham et.al (impact of intense social media usage on sleeping pattern) no year journal title research location population/sample result information and communication technology (strict) on sleep patterns and daytime functioning in american adolescents daytime sleepiness, excessive evening sleepiness, academic underperformance, later bedtimes, and decreased sleep length. daytime sleepiness partly mediated the association between strict usage and underperformance. 19 2018 fear of missing out and sleep: cognitive behavioral factors in adolescents' nighttime social media use uk adolescents between the ages of 12 and 18 nighttime social media use was correlated with later bedtimes, greater cognitive arousal prior to sleep, a longer sleep onset delay, and a shorter sleep period. 20 2016 tracking effects of problematic social networking on adolescent psychopathology: the mediating role of sleep disruptions australia a total of 874 students from 27 different high schools were polled. adolescents who spent more time on social media had more depressed moods, with sleep disturbances accounting for about 53% of the correlation. 21 2020 social media use, social media stress, and sleep: examining cross-sectional and longitudinal relationships in adolescents nether lands 1,441 adolescents 11–15 years sm usage was positively linked to sleep latency and daytime sleepiness. the empirical data revealed a positive correlation between sm tension and resulting sleep delay and daytime sleepiness, but only in females. 22 2015 technology use and sleep quality in preadolescence and adolescence italy 850 italian preadolescents and adolescents adolescents showed increased sleep issues, a proclivity for evening sports, and a rise in internet and mobile use and social media use. poor sleep quality for adolescents was consistently correlated with smartphone use. table.2 research related to the sample: college students no year journal title research location population/sample result 1 2017 impact of social media usage on daytime sleepiness: a study in a sample of tertiary students in singapore singapore tertiary students in singapore the findings of this research pose health concerns around tertiary students' use of social media and daytime sleepiness. 126 bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 2, december 2022, pp. 120-131 ilham et.al (impact of intense social media usage on sleeping pattern) no year journal title research location population/sample result 2 2019 prevalence and effect of social media on sleep among students of higher institutions in sokoto metropolis, sokoto state nigeria nigeria students in sokoto metropolis, sokoto state, nigeria the study found a substantial prevalence of social media use among students at higher education institutions in sokoto, with a large proportion of them sleeping less. schools and the general population should be conscious of the detrimental effects of students accessing social media late at night. 3 2020 analysis of the use of social media on the incidence of insomnia in students indonesia students of uin sunan ampel surabaya with a total sample of 194 respondents social media usage and the occurrence of insomnia have a relatively poor connection. social media use without good time management will change a person's sleep patterns, resulting in insomnia disorders. 4 2020 relationship of use of social media with insomnia events in students: literature review indonesia college student there was a strong association between social media use and insomnia in 10 of the 11 studies. 5 2020 long relationships using social media with insomnia events in faculty of health science students of tuanku tambusai university of heroes, 2020 indonesia student of the faculty of health sciences, universitas pahlawan tuanku tambusai in 2020, there is a long-term correlation between social media usage and insomnia in students at universitas pahlawan tuanku tambusai’s faculty of health sciences. 6 2017 relationship between internet use and sleep pattern disorders in psik students unitri malang indonesia psik unitri malang student it proves that 28 respondents experienced very heavy internet addiction, and 19 respondents experienced poor sleep patterns. students at psik unitri malang have discovered a connection between internet usage and sleep disorders. 7 2021 the relationship between the duration of social media used with quality of sleep aged 19-22 years indonesia udayana university’s faculty of social and political sciences has a communication studies program the more people spend on social media, the poorer their sleep quality. 8 2020 relationships between the severity of internet gaming disorder, severity of problematic usa hong kong university students aged 18-24 in 2019 internet games and social networking usage dominate many people’s lives. however, prolonged participation in all issn 2614-0047 bulletin of social informatics theory and application 127 vol. 6, no. 2, december 2022, pp. 120-131 ilham et.al (impact of intense social media usage on sleeping pattern) no year journal title research location population/sample result social media use, sleep quality, and psychological distress of them may have detrimental health consequences. 9 2017 social media use before bed and sleep disturbance among young adults in the united states: a nationally representative study usa a national survey of 1763 teens in the united states, ages 19 to 32, was taken sleep disruptions in young adults have been linked to social media usage. on the other hand, previous research has not clarified why using social media right before bedtime is so essential. 10 2020 determinants of subjective poor sleep quality in social media users among freshman college students saudia arab first-year college students became users social media usage has increased among teens. this is correlated to poor sleep quality, a hazard factor for mental and physical health problems. 11 2015 relationship time range of social media use with the incidence of insomnia in students of the faculty of computer science, university of lancang kuning indonesia student of the faculty of computer science, university of lancang kuning in students at the university of lancang kuning’s faculty of computer science, there is a connection between the frequency with which they use social media and the occurrence of insomnia. 12 2018 prevalence of insomnia and its association with social media usage among university students in selangor, malaysia, 2018 malaysia 445 students from private universities in shah alam the moment they had the most links on social media was between 20.00 and 12.00 when 66.7 percent of them did so. while the least access time is in the morning between 08.0012.00 for 24% of respondents. the prevalence of insomnia among respondents was 69%. 13 2016 influence of wechat on sleep quality among undergraduates in chongqing, china: a cross-sectional study xianglong xu, qianyi lin, yan zhang china undergraduates in chongqing, china 535 (27.0%) males and 1311 (66.3%) females for those aged 20.27 ± 1.26 years recorded low sleep quality. 128 bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 2, december 2022, pp. 120-131 ilham et.al (impact of intense social media usage on sleeping pattern) no year journal title research location population/sample result 14 2020 social media addiction and sleep problem: a structural equation modelling romania university to all the dentistry 1st4th form students faculty of dentistry, cyprus health and social sciences university, güzelyurt, cyprus regular instagram users have mentioned sleep issues. whatsapp was social media's second most powerful impact on students’ sleep. whatsapp users who use the app often say they have trouble waking up and sleeping. 15 2014 relationship of smartphone use severity with sleep quality, depression, and anxiety in university students turkey suleyman demirel university’s students according to findings, mobile overuse can be linked to depression, anxiety, and bad sleep quality. overusing these substances may contribute to stress or anxiety, which can add to sleep issues. smartphone addiction should be closely tracked among university students with high depression and anxiety scores. 16 2020 prediction of intention to change sleep behavior among undergraduates: social media and perception of quality of sleep thailand a sample of 400 undergraduate students using social media the study’s findings suggest that if students are to improve their sleep habits, they need to be educated about the advantages of sleep and the risk of sleep disorders, as well as guidelines for how much social media they can use each day. 17 2020 relationship between social media use and sleep quality of undergraduate nursing students at a southeastern university usa a total of 133 undergraduate nursing students from southeastern university were included in this study’s survey according to studies, 60% of college students had low sleep efficiency, sleeping an average of 6-6.9 hours a night. people between 18 and 25 use social media at significant rates. numerous research has shown that social media affects sleep efficiency. of the 41, it was categorized into a sample of students and undergraduates. so the sample of students obtained 22 studies, while the sample of students obtained 19 studies. this is accomplished by analyzing the conclusions of each paper in order to see in detail the impact of social media use on their sleeping pattern. issn 2614-0047 bulletin of social informatics theory and application 129 vol. 6, no. 2, december 2022, pp. 120-131 ilham et.al (impact of intense social media usage on sleeping pattern) for students from 22 studies, it was found that social media influenced their sleep patterns and resulted in insomnia. according to a study on the effect of sleep time-related information and communication technology (strict) on sleep habits and daytime functioning in american adolescents, 56.7% of insomnia, daytime sleepiness, nighttime sleepiness, academic outperformance, delayed bedtimes, and sleep quality length were all observed in the study as they texted/tweeted/messaged in bed [13]. according to one study in chinese, the influence of social media after sleep disturbance, namely insomnia, also induces depression [14]. these findings suggest that complex pathways can occur between insomnia, internet addiction, and depression. for the college students category, 19 studies show that it is true that the use of social media has an impact on sleep disturbances, insomnia, and sleep patterns every day. four of the studies stated that social media impacts sleeping patterns and is directly related to depression, anxiety, and stress levels. research conducted at students in suleyman demirel university states that the study suggests that smartphone overuse, especially social media, could be related to mental, anxiety, and sleep quality. excessive usage can lead to stress or anxiety, leading to sleep issues [15]. the following is a case description of the impact of social media on sleep patterns in various countries according to the 41 journals above, which are grouped by country. the diagram shows that there were 10 cases of the effects of social media on sleep patterns in indonesia. then 7 cases were found in the usa, and 3 in the uk, nigeria, and italy. social media impact as show in fig. 2. fig. 2. social media impact on sleeping patterns in every country another research found several points about the effects of heavy social media use by college students. for example, of college students at prince sattam bin abdul aziz university, only 1% used social media for academic purposes, while 57% were addicted to social media [16]. nighttime television and social media usage were positively associated with weight and weight status among different first-semester college students in america [17]. the impact of college student bedtime and increased mobile phone usage was substantially decreased with academic achievement and sleep quality [18]. it is essential to understand how much time college students invest in social networking platforms and the activities they participate. the concern is not social media; it is the actual usage and purpose of social media practices that make the difference impact [19]. several journals above state that the use of social media for students, especially adolescents, must be accompanied by guidance from parents. because most social media sites are owned by profit corporations that often advertise and collect data [20], advertisers such as pornographic material, alcohol, and a variety of other unhealthy items may easily reach adolescents through these social media platforms [21]. so parents need to ask their children about their social media usage and become better educated about the various technologies their children use 4. conclusion the literature review shows a relationship and impact between social media use and sleep patterns, including insomnia, sleep disturbances, and daytime sleepiness. this is also supported by data from the digital 2021 global overview, which shows that 31.9% of social media users are aged 13-24 and can have the status of students and college students. on average, accessing social media daily is 2 hours and 25 minutes a day, with the platforms most frequently accessed being facebook, whatsapp, 130 bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 2, december 2022, pp. 120-131 ilham et.al (impact of intense social media usage on sleeping pattern) instagram, and tiktok. from 55 studies obtained, 41 studies show that this is due to frequent access to social media before bedtime, both students and college students. insomnia, where the longer a person accesses social media, the person's sleep time will also experience disturbances, resulting in insomnia. several journals also state a correlation between social media use and the incidence of insomnia. even from 4 studies, the conclusion is that there is a connection between social media usage and insomnia results in anxiety and depression. some of these studies also stated that a relationship related to sleep patterns with social media resulted in academic performance. the everyday usage of social media and the activity of bringing a mobile or other devices to bed and the longer the use of social media through these gadgets will further disturb the regulation of the hormone melatonin so that it can cause insomnia which causes disturbed sleep patterns. references [1] p. m. leonardi and e. vaast, “social media and their affordances for organizing: a review and agenda for research,” acad. manag. ann., vol. 11, no. 1, pp. 150–188, jan. 2017, doi: 10.5465/annals.2015.0144. [2] g. s. o’keeffe and k. clarke-pearson, “the impact of social media on children, adolescents, and families,” pediatrics, vol. 127, no. 4, pp. 800–804, apr. 2011, doi: 10.1542/peds.2011-0054. [3] h. scott, s. m. biello, and h. c. woods, “identifying drivers for bedtime social media use despite sleep costs: the adolescent perspective,” sleep heal., vol. 5, no. 6, pp. 539–545, dec. 2019, doi: 10.1016/j.sleh.2019.07.006. [4] n. cain and m. gradisar, “electronic media use and sleep in school-aged children and adolescents: a review,” sleep med., vol. 11, no. 8, pp. 735–742, sep. 2010, doi: 10.1016/j.sleep.2010.02.006. [5] m. mauri, p. cipresso, a. balgera, m. villamira, and g. riva, “why is facebook so successful? psychophysiological measures describe a core flow state while using facebook,” cyberpsychology, behav. soc. netw., vol. 14, no. 12, pp. 723–731, dec. 2011, doi: 10.1089/cyber.2010.0377. [6] j. van den bulck, “media use and dreaming: the relationship among television viewing, computer game play, and nightmares or pleasant dreams.,” dreaming, vol. 14, no. 1, pp. 43–49, mar. 2004, doi: 10.1037/1053-0797.14.1.43. [7] s. j. crowley, s. w. cain, a. c. burns, c. acebo, and m. a. carskadon, “increased sensitivity of the circadian system to light in early/mid-puberty,” j. clin. endocrinol. metab., vol. 100, no. 11, pp. 4067–4073, nov. 2015, doi: 10.1210/jc.2015-2775. [8] a.-m. chang, d. aeschbach, j. f. duffy, and c. a. czeisler, “evening use of light-emitting ereaders negatively affects sleep, circadian timing, and next-morning alertness,” proc. natl. acad. sci., vol. 112, no. 4, pp. 1232–1237, jan. 2015, doi: 10.1073/pnas.1418490112. [9] f. j. bruno, “psychology: a self-teaching guide,” john willey & sons, 2002. accessed apr. 11, 2021. [online]. available at: https://books.google.co.id/books?id=63exnzyryqec&printsec=copyright&redir_esc=y#v=onepage &q&f=false. [10] a. m. a. nasirudeen, l. lee chin adeline, k. wat neo josephine, l. lay seng, and l. wenjie, “impact of social media usage on daytime sleepiness: a study in a sample of tertiary students in singapore,” digit. heal., vol. 3, pp. 1–9, jan. 2017, doi: 10.1177/2055207617699766. [11] “digital 2021: global overview report,” datareportal, 2021. accessed apr. 11, 2021. [online]. available at: https://datareportal.com/reports/digital-2021-global-overview-report. [12] c. j. calamaro, t. b. a. mason, and s. j. ratcliffe, “adolescents living the 24/7 lifestyle: effects of caffeine and technology on sleep duration and daytime functioning,” pediatrics, vol. 123, no. 6, pp. e1005–e1010, jun. 2009, doi: 10.1542/peds.2008-3641. [13] p. g. polos et al., “the impact of sleep time‐related information and communication technology (strict) on sleep patterns and daytime functioning in american adolescents,” j. adolesc., vol. 44, no. 1, pp. 232–244, oct. 2015, doi: 10.1016/j.adolescence.2015.08.002. [14] l. m. cheung and w. s. wong, “the effects of insomnia and internet addiction on depression in https://doi.org/10.5465/annals.2015.0144 https://doi.org/10.1542/peds.2011-0054 https://doi.org/10.1016/j.sleh.2019.07.006 https://doi.org/10.1016/j.sleep.2010.02.006 https://doi.org/10.1089/cyber.2010.0377 https://doi.org/10.1037/1053-0797.14.1.43 https://doi.org/10.1210/jc.2015-2775 https://doi.org/10.1073/pnas.1418490112 https://books.google.co.id/books?id=63exnzyryqec&printsec=copyright&redir_esc=y%23v=onepage&q&f=false https://books.google.co.id/books?id=63exnzyryqec&printsec=copyright&redir_esc=y%23v=onepage&q&f=false https://doi.org/10.1177/2055207617699766 https://datareportal.com/reports/digital-2021-global-overview-report https://doi.org/10.1542/peds.2008-3641 https://doi.org/10.1016/j.adolescence.2015.08.002 issn 2614-0047 bulletin of social informatics theory and application 131 vol. 6, no. 2, december 2022, pp. 120-131 ilham et.al (impact of intense social media usage on sleeping pattern) hong kong chinese adolescents: an exploratory cross-sectional analysis,” j. sleep res., vol. 20, no. 2, pp. 311–317, jun. 2011, doi: 10.1111/j.1365-2869.2010.00883.x. [15] k. demirci, m. akgönül, and a. akpinar, “relationship of smartphone use severity with sleep quality, depression, and anxiety in university students,” j. behav. addict., vol. 4, no. 2, pp. 85–92, jun. 2015, doi: 10.1556/2006.4.2015.010. [16] m. kolhar, r. n. a. kazi, and a. alameen, “effect of social media use on learning, social interactions, and sleep duration among university students,” saudi j. biol. sci., vol. 28, no. 4, pp. 2216–2222, apr. 2021, doi: 10.1016/j.sjbs.2021.01.010. [17] j. whipps, m. byra, k. g. gerow, and e. hill guseman, “evaluation of nighttime media use and sleep patterns in first-semester college students,” am. j. health behav., vol. 42, no. 3, pp. 47–55, may 2018, doi: 10.5993/ajhb.42.3.5. [18] d. ragupathi, n. ibrahim, k.-a. tan, and b. n. andrew, “relations of bedtime mobile phone use to cognitive functioning, academic performance, and sleep quality in undergraduate students,” int. j. environ. res. public health, vol. 17, no. 19, p. 7131, sep. 2020, doi: 10.3390/ijerph17197131. [19] j. mastrodicasa and p. metellus, “the impact of social media on college students,” j. coll. character, vol. 14, no. 1, pp. 21–30, feb. 2013, doi: 10.1515/jcc-2013-0004. [20] y. t. uhls, n. b. ellison, and k. subrahmanyam, “benefits and costs of social media in adolescence,” pediatrics, vol. 140, no. supplement_2, pp. s67–s70, nov. 2017, doi: 10.1542/peds.2016-1758e. [21] e. m. winpenny, t. m. marteau, and e. nolte, “exposure of children and adolescents to alcohol marketing on social media websites,” alcohol alcohol., vol. 49, no. 2, pp. 154–159, mar. 2014, doi: 10.1093/alcalc/agt174. https://doi.org/10.1111/j.1365-2869.2010.00883.x https://doi.org/10.1556/2006.4.2015.010 https://doi.org/10.1016/j.sjbs.2021.01.010 https://doi.org/10.5993/ajhb.42.3.5 https://doi.org/10.3390/ijerph17197131 https://doi.org/10.1515/jcc-2013-0004 https://doi.org/10.1542/peds.2016-1758e https://doi.org/10.1093/alcalc/agt174 bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 1, march 2022, pp. 13-20 13 https:doi.org/10.31763/businta.v6i1.439 instagram performance analysis of micro, small, and medium enterprises: a case study in the fashion sector ahmad saufi maulana a,1,*, agung andhika f. a,2, balqies savina a,3, f.ti ayyu syaidul l a,4, fachrul kurniawan b,5 a universitas negeri malang, malang, indonesia b universitas islam negeri maulana malik ibrahim malang, malang, indonesia 1 ahmadmaulana.1805356@students.um.ac.id ; 2 agungandhikaf.1805356@students.um.ac.id; 3 balqies.savina.1805356@students.um.ac.id; 4 f.ti.1805356@students.um.ac.id; 5 fachrulk@ti.uin-malang.ac.id * corresponding author 1. introduction instagram was established in 2010 [1]. instagram allows users to snap a photo or video and share it globally with their followers [2]. instagram was the third most popular social network among college students in the united states [3]. on april 12, 2012, facebook acquired instagram and continued to run instagram as an independent application [4]. instagram has 100 million monthly active users, 40 million photos are uploaded daily, 8,500 likes, and 1,000 comments are gained per second [5], making instagram a worldwide social media platform. according to the pew internet and american life project [6], 13% of internet users are also instagram users. following the pew survey, individuals who show positive interest in instagram are adults between 18-29, african americans, latinos, women, and urban residents [7]. instagram helps a company to promote its products or services [8]. the point that makes instagram different from other social media is that instagram applies a visual-based strategy [9]. everything about instagram is about photography [10]. instagram marketing is an effective way to advertise a product, as it is said that a picture speaks a thousand words. this is significantly more than any other platform, making instagram the most beneficial platform for influencers. micro small and medium enterprises (msmes) are essential to the national or regional economy, as in indonesia. the development of msmes has a special meaning in efforts to increase economic growth and reduce a country's poverty rate [11]. for example, from 2011 to 2012, gross domestic product (gdp) contribution only reached 57.94 percent, while msmes contributed 99.9 percent of the number of business entities in indonesia and 97.24 percent in employment . so it can be concluded that growth and development in the msme sector are often interpreted as indicators of successful development, especially in countries with low per capita income. a r t i c l e i n f o a b s t r a c t article history received december 18, 2021 revised january 18, 2022 accepted february 3, 2022 people nowadays rely on social media, which has become a necessity in their everyday lives. with 13 % of internet users, instagram is currently the largest social network. this is an opportunity for micro, small, and medium enterprise (msme) owners who target instagram users as their market. this paper analyses the performance of instagram in selling msme fashion products, especially thrift shops. based on the data, followers, likes, and comments do not influence the item's sale. the research finds some factors that can increase the sale of goods on instagram, such as ads, paid promotions, endorsements, events, and giveaways. furthermore, the results deliver strategies to improve sales through the instagram platform. this is an open access article under the cc–by-sa license. keywords social media instagram micro, small, and medium enterprise thriftshop fashion mailto:ahmadmaulana.1805356@students.um.ac.id http://creativecommons.org/licenses/by-sa/4.0/ http://creativecommons.org/licenses/by-sa/4.0/ 14 bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 1, march 2022, pp. 13-20 maulana et.al (instagram performance analysis of micro) product marketing at msmes can be divided into traditional or offline marketing methods and digital or online marketing methods. these two methods differ in the marketing costs associated with time, quality, target reach, and the marketing media used [12]. in digital or online marketing, one can use social media promotion. in the development of msmes, social media is very influential in product marketing because, in this current era, most people use instagram as a medium to find references when buying a product. in indonesia, facebook applications such as whatsapp and instagram can aid entrepreneurs and micro, small, and medium businesses (msmes) to get started in business and identify new opportunities. the applications can, in general, provide msmes with some of the benefits of scale because they enable greater reach to a higher number of better-targeted customers and partners. of those msmes surveyed, 75% agreed that facebook applications reduce the cost of marketing, 63% agreed that the applications reduce customer service costs, and 56% mentioned the lower cost of research and development. 92% of msmes surveyed also said that using facebook applications helped them grow their number of customers. in addition to assisting businesses in minimizing the cost of marketing and sales, facebook applications can help reduce resource requirements across other aspects of their operations, which can be critical to the success of msmes in their initial growth phase. 74% of msmes agreed that facebook applications help reduce barriers to growth, and 71% agreed that the apps help them efficiently manage operational staff and processes [13]. this concludes that most micro, small, and medium enterprises in indonesia use instagram to market their products. however, there are still problems regarding what factors affect the performance of online sales made by micro, small, and medium enterprises (msmes) using the instagram social media platform, such as marketing strategies, quality of content on instagram from the products being sold, and feedback from sellers. this research compares the performance of social media instagram on micro, small, and medium enterprises (msmes), focusing on the fashion sector. this research aims to determine what factors affect online sales performance on instagram social media, specifically in the fashion sector. 2. method the research method in this study is observation, which directly observes the situation and conditions of the research from the field [14]. post observations were made from three instagram accounts offering thrift clothes in jakarta and makassar. namely, instagram accounts a, b, and c. the number of likes, comments, and availability of items sold from the three accounts were recorded in tabular form. the data consist of usage, the number of followers, and the overall quality of the posts. the next step compares the three accounts using tables and charts to examine the elements that might affect an account’s sales and finds some factors that can increase the sale of goods on instagram. fig.1 shows the research steps. fig. 1. block diagram of the method steps the research mainly discusses instagram and its impact on micro, small, and medium enterprises (msmes). creating data begins with determining and observing the msmes’ accounts (instagram accounts a based in jakarta and b and c in makassar). the data was analyzed and then used to form an abstract, discussion regarding the influence of instagram, proposed solutions, and conclusion. the analytic data in this study is utilized to determine the various types of cases that result in more excellent sales of the items. to conclude will be carried out based on the document assessment of the study results. issn 2614-0047 bulletin of social informatics theory and application 15 vol. 6, no. 1, march 2022, pp. 13-20 maulana et.al (instagram performance analysis of micro) the first instagram account is msmes in the fashion sector, a korean-style thrift shop in jakarta. in sales, this account has a concept divided into several parts ranging from volume 1 to volume 15. the goods provided are limited to specific stocks. on this instagram account, every item that has been sold out will be reported with the caption "sold". the concept of selling on this first account is by opening orders which are carried out for each volume. in addition to sales, this instagram account in volumes 14 and 15 there is a giveaway event, which has the following requirements: • follow the account • must be active during the volume upload period 14 by commenting & liking as much as possible. whereas point 2 impacts the reach and traffic of this account, on volumes 14 and 15, the number of comments and likes has increased quite drastically. parameter of instagram account a show in table 1. table.1 parameter table description amount followers 3700 total post 179 item for sale 144 sold item 125 non-sold item 19 a. parameter table of instagram account a the second instagram account is for a thrift shop located in makassar. this account has a concept in sales, which is divided into several chapters from chapter 1 to chapter 5. the goods provided are also limited by only having one stock of each type to be sold. every item sold out will be reported with the caption "sold, no restock". one uniqueness of this instagram account is the hashtag #dtvready to indicate products that have not been sold in the account. buyers do not need to look at existing posts individually if they want to buy or see items that are still available. the concept of selling on this account is by ordering via direct message (dm) or through the shopee e-commerce platform. parameter of instagram account b show in table 2. table.2 parameter table description amount followers 43.900 total post 67 item for sale 62 sold item 54 non-sold item 8 b. parameter table of instagram account b instagram account c is msmes in the thrift shop sector. founded on june 10, 2020, this account focuses on women's clothing, such as sweaters and shirts. this account has a concept in sales where each item is displayed on one instagram feed. the goods provided are limited to 1 stock per product. items sold out will be reported with the caption "sold". parameter of instagram account c show in table 3. table.3 parameter table description amount followers 10.200 total post 197 item for sale 185 sold item 178 non-sold item 7 c. parameter table of instagram account c 16 bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 1, march 2022, pp. 13-20 maulana et.al (instagram performance analysis of micro) 3. results and discussion table 4 shows the various marketing strategies of each merchant. some use instagram ads, giveaways, or endorsements to reach more account visitors. merchant a uses instagram ads as its marketing strategy, b's account uses endorsements, while c creates events and makes giveaways for its marketing strategy. it can be said that the quality of the content is pretty good for all of the accounts. in this case, each instagram account has a different way of carrying out its marketing strategy. marketing on social media platforms is more effective and less expensive than traditional marketing [15]. table.4 comparison table accounts feedback advertising strategy content quality likes comments instagram ad endorsement event product image quality clear product description a 8460 2012 yes no yes on average, in each post, the product image quality is quite good, looks detailed, has original images, and uses a model each post caption contains the following: product name, brand, size (ld), and additional information (such as condition, model description, materials, etc.) b 1691 13 no yes no each post has pretty good product image quality and uses original images. each post caption contains the following: product code, price, and conditions (several posts attach the product brand) c 12022 167 no no yes on average, in each post, the quality of product images is quite good. looks like detailed, original images. each post caption contains the following: product code, price, size (ld), and additional information (such as condition, model description, materials, etc.) d. comparison table of parameter instagram accounts a, b, and c moreover, there is an advantage that the communication involved with the social media phenomenon provides both the means for customer-to-customer interactions and customer-tobusiness interactions and business-to-customer interactions [16]. social media platforms allow message recipients to interact with authors and convey messages to the entire community [2]. from all data in the table, does it all affect the sales figures for each account? in the following, we present several parameters with the sales figures for each account using a chart. issn 2614-0047 bulletin of social informatics theory and application 17 vol. 6, no. 1, march 2022, pp. 13-20 maulana et.al (instagram performance analysis of micro) fig. 2 shows that there is no correlation between followers and sold items. b has many followers but has few items sold. a's instagram account has 3,700 followers and 125 sold items. b's instagram has 43,900 followers and 54 sold items. this is a high number of followers but has a low number of sold items. moreover, account c, with 10,200 followers, is lower than instagram b and bigger than instagram account c but has the highest sales among the three. it shows that the number of followers does not affect the items sold. fig. 2. comparison chart followers ratio and sold item of instagram accounts a, b, and c between the establishment of each account until april 14, 2021, data of likes, comments, and sold items are shown in fig. 3. fig. 3. comparison chart like ratio, comment ratio, and sold item of instagram accounts a, b, and c as in fig. 3, instagram accounts a has many likes and comments, specifically 8,400 likes and 20,120 comments, with the number of sold items as many as 125. even though account a has a relatively large number of comments compared to the other two accounts, sales on account a are not the highest. account b has 130 likes and 1,691 comments and has the lowest sales, 54 items. as for account c, it has 12,022 likes and 167 comments, with 178 sold items. even though it has a small number of comments, sales on account c are the highest compared to the other two accounts. 3.7 43.9 10.2 125 54 178 0 20 40 60 80 100 120 140 160 180 200 a b c followers ratio 1:1000 sold item 84.6 16.91 120.22 201.2 1.3 16.7 125 54 178 0 50 100 150 200 250 a b c like ratio 1:100 comment ratio 1:10 sold item 18 bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 1, march 2022, pp. 13-20 maulana et.al (instagram performance analysis of micro) according to the data, the number of followers and comments does not impact the item's sale. the followers tend to like and comment just because they want, not because they want to buy the item. for example, c's instagram account has a small number of followers and comments but has high sales compared to the other two accounts. many likes and comments can also be caused by an event or giveaway that requires participants to like and comment a lot. the data show that followers and comments do not influence the item's sale. the following things are solutions that might increase sales, such as instagram ads, paid promote and endorsement, and giveaway and event. more and more days have changed, and instagram continues to develop services for users, increasing the sophistication of its features. so users can quickly meet their needs to do marketing. for instance, instagram ads are posts or stories that a business pays to promote a user's instagram feed. they can look like regular instagram posts but are always identified by the label "sponsored". instagram ads can reach and emulate the current follower's demography [17]. with a potential audience of over a million people, instagram advertising is the ultimate tool for any social media marketer. instagram ads are an effective strategy that's easy to implement. instagram uses ad targeting like facebook ads to get more specific information about instagram users. target instagram ads based on age, location, and gender. in addition, they can also get instagram user data based on user interests, hobbies, and connections. instagram ads offers a large selection of ad formats. there are at least three types of ads to choose from, namely images, videos, and multiple images in one post. many advertisements on instagram make users more interested in actions such as giving likes to posts, comments, or even following the account. moreover, in the end, it will be profitable in terms of growing interactions between the brands that suit their market. promotion is one marketing component, by promoting institutions, collections, systems and types of services, information processes approach the user [18]. by using instagram, ads will help msmes actors for promoting their products. there are many advantages when using instagram ads. advertising using instagram ads will assist in obtaining more specific information data about instagram users. one way to increase the business brand awareness is through instagram ads, such as making interesting visual posts. with instagram ads, they can enter a link that will direct users to their website. another promotional term that is often used by online businesses is paid promotion. paid promotion can be defined as a paid promotion service. a person or group of people provides this service based on doing a social media promotion service with a particular contract value according to the agreement. such services could help online businesses promote products or services sold [19]. this service is related to instagram social media or the telegram profession. paid promotion service providers are. generally, instagram accounts with a large following: accounts belonging to public figures, selebgram, artists, or youtubers. the use of paid promotion should consider account selection. the account must be trusted and have genuine followers. while endorsement promotes positive reviews about a product or service provided by public figures on their instagram, product owners, goods, and services, give their products to account owners for free to get positive reviews while promoting them to all their followers. reviews can be uploaded via stories or feeds, depending on the agreement between the product owner and the account owner. celebrity endorsement shows attributes and product quality, increasing acceptance from consumers. because of consumer confidence in celebrity endorsement, consumers tend to transfer celebrity endorse perceptions against the product [20]. paid promotion and endorsement could be one of the creative strategies in the advertisement. it could help any enterprise to boost its turnover widely and quickly. a giveaway is an activity of distributing prizes with certain conditions. each participant taking part in the giveaway must meet every requirement according to the giveaway event, from enlivening posts to making particular challenges. the giveaway contest aims to get feedback in the form of awareness, profits, promotion of a product, etc. meanwhile, the public is considered more interested in the giveaway contest because it is free. this was also evidenced by the high interest of people participating in the event. that way, enterprises can take advantage of this in new followers, awareness, and drawing attention. even though it is not in the form of money, it can significantly issn 2614-0047 bulletin of social informatics theory and application 19 vol. 6, no. 1, march 2022, pp. 13-20 maulana et.al (instagram performance analysis of micro) affect the product. many people will use the giveaway products, and in the end, many people also see the outcome. the hope is that audience will be moved to become customers. there is a positive and significant influence between social intensity media use for consumptive behavior [21]. this means that the higher the intensity of the use of instagram social media, the higher the consumptive behavior. the attractive shop displays offline and online to attract consumers, and several promotional offers such as discounts, giveaways, and special price offers to make consumers more and more compelled to buy the product offered [22]. some advantages of a giveaway are that it can increase leads, namely potential customers and engagement. engagement is the communication between business actors and customers. that is important to build loyal customers. with good engagement, it is easier for a business to grow. 4. conclusion from the data that has been analyzed, it can be concluded that the number of comments, likes, and followers do not affect the sale of thrift items. for example, even though instagram b has the highest number of followers, which is 43,900, this does not make instagram b the account with the most significant sales. meanwhile, c's instagram account, with fewer followers than b's, has the most significant sales of 178 items. when viewed by percentage, account a's followers are not more than 10% of account b's total followers, but sales on account a are two times more than account b. the same thing happened to the number of comments, where the number of comments had nothing to do with the number of items sold. in general, buyers follow and interact with the selling posts of an instagram account because they want to. it does not mean they are interested in buying. researchers feel that every business actor who sells products through social media, especially instagram, needs to pay attention to marketing strategies. they must implement several sales strategies like instagram ads, paid promotions, or endorsements. it can attract more reach tailored to the seller's target market. this is undoubtedly a good strategy. suppose you want to introduce the business of an msmes actor to instagram users. apart from ads, other marketing strategies include events and giveaways, which can be an alternative, especially for business actors who want to interact with their customers. references [1] t. bergström and l. bäckman, “marketing and pr in social media : how the utilization of instagram builds and maintains customer relationships,” p. 57, 2013, accessed: mar. 23, 2021. [online]. available at: http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-90410. [2] m. n. p. jadhav, m. r. s. kamble, and b. patil, “social media marketing: the next generation of business trends,” in second international conference on emerging trends in engineering (sicete), 2013, pp. 45–49, accessed: mar. 23, 2021. [online]. available at: www.iosrjournals.org. [3] d. salomon, “moving on from facebook: using instagram to connect with undergraduates and engage in teaching and learning,” coll. res. libr. news, vol. 74, no. 8, pp. 408–412, sep. 2013, doi: 10.5860/crln.74.8.8991. [4] z. li and a. agarwal, “platform integration and demand spillovers in complementary markets: evidence from facebook’s integration of instagram,” manage. sci., vol. 63, no. 10, pp. 3438–3458, sep. 2017, doi: 10.1287/mnsc.2016.2502. [5] s. gindl, “through the photo-chromic lens of the beholder: the development of the simple holiday photography to a marketing product,” vienna university, 2013. [online]. available at: https://www.modul.ac.at/uploads/files/bachelor_thesis__maravic.pdf. [6] n. tekulve and k. kelly, “worth 1,000 words: using instagram to engage library users,” in brick and click libraries symposium, p. 12, nov. 2013, accessed: mar. 23, 2021. [online]. available at: https://ecommons.udayton.edu/roesch_fac/20. [7] m. duggan and j. brenner, “the demographics of social media users-2012,” 2013. accessed: mar. 23, 2021. [online]. available at: www.pewresearch.org. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-90410 www.iosrjournals.org https://doi.org/10.5860/crln.74.8.8991 https://doi.org/10.1287/mnsc.2016.2502 https://www.modul.ac.at/uploads/files/bachelor_thesis__maravic.pdf https://ecommons.udayton.edu/roesch_fac/20. %20www.pewresearch.org 20 bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 1, march 2022, pp. 13-20 maulana et.al (instagram performance analysis of micro) [8] c. bevins, “get schooled: a visual social semiotic analysis of target’s branding using instagram,” liberty university, p. 133, 2014. [online]. available at: https://digitalcommons.liberty.edu/masters/327/. [9] c. hird, “social media marketing: a best practices analysis of selected destination magazines,” california polytechnic state university, san luis obispo, p. 40, 2013. [online]. available at: https://digitalcommons.calpoly.edu/cgi/viewcontent.cgi?referer=&httpsredir=1&article=1054&conte xt=rptasp. [10] j. linaschke, getting the most from instagram, 1st ed. peachpit press, 2011. [online]. available at: https://www.peachpit.com/store/getting-the-most-from-instagram-9780132875776. [11] n. nursini, “micro, small, and medium enterprises (msmes) and poverty reduction: empirical evidence from indonesia,” dev. stud. res., vol. 7, no. 1, pp. 153–166, jan. 2020, doi: 10.1080/21665095.2020.1823238. [12] d. patil and d. bhakkad, redefining management practices and marketing in modern age, p. 249, 2014. [online]. available at: https://books.google.co.id/books/about/. [13] t. singh, r. kumar, and p. kalia, e-marketing practices of micro-, smalland medium-sized enterprises: evidence from india. emerald publishing limited, pp. 197-216, 2021, doi: 10.1108/9781-80071-264-520211012. [14] l. baker, “observation: a complex research method,” libr. trends, vol. 55, no. 1, pp. 171–189, 2006, doi: 10.1353/lib.2006.0045. [15] a. m. kaplan and m. haenlein, “two hearts in three-quarter time: how to waltz the social media/viral marketing dance,” bus. horiz., vol. 54, no. 3, pp. 253–263, may 2011, doi: 10.1016/j.bushor.2011.01.006. [16] w. g. mangold and d. j. faulds, “social media: the new hybrid element of the promotion mix,” bus. horiz., vol. 52, no. 4, pp. 357–365, jul. 2009, doi: 10.1016/j.bushor.2009.03.002. [17] r. m. wahid, “implementation of paid instagram ads for fresh produce sellers affected by covid19 pandemic in a traditional market in palembang,” int. j. innov. sci. res. technol., vol. 6, no. 1, pp. 322–328, 2021, [online]. available at: https://ijisrt.com/assets/upload/files/ijisrt21jan304.pdf. [18] m. azwar and s. sulthonah, “the utilization of instagram as a media promotion : the case study of library in indonesia,” insa. j. islam humanit., vol. 2, no. 2, pp. 147–159, may 2018, doi: 10.15408/insaniyat.v2i2.7320. [19] r. alfiansyah and e. listiani, “paid promote as a media promotions (a case study of paid promote miniinstaxpvj as promotion media in instagram to increase desire onlineshop campaign),” pp. 157162, feb. 2016, accessed: mar. 23, 2021. [online]. available at: http://repository.unisba.ac.id:8080/xmlui/handle/123456789/24208. [20] j. s. wang, y. f. cheng, and y. l. chu, “effect of celebrity endorsements on consumer purchase intentions: advertising effect and advertising appeal as mediators,” hum. factors ergon. manuf. serv. ind., vol. 23, no. 5, pp. 357–367, sep. 2013, doi: 10.1002/hfm.20336. [21] a. thoumrungroje, “the influence of social media intensity and ewom on conspicuous consumption,” in procedia social and behavioral sciences, aug. 2014, vol. 148, pp. 7–15, doi: 10.1016/j.sbspro.2014.07.009. [22] a. triwidisari, a. nurkhin, and m. muhsin, “the relationships between instagram social media usage, hedonic shopping motives and financial literacy on impulse buying,” din. pendidik., vol. 12, no. 2, pp. 170–181, dec. 2017, doi: 10.15294/dp.v12i2.13565. https://digitalcommons.liberty.edu/masters/327/ https://digitalcommons.calpoly.edu/cgi/viewcontent.cgi?referer=&httpsredir=1&article=1054&context=rptasp https://digitalcommons.calpoly.edu/cgi/viewcontent.cgi?referer=&httpsredir=1&article=1054&context=rptasp https://www.peachpit.com/store/getting-the-most-from-instagram-9780132875776 https://doi.org/10.1080/21665095.2020.1823238 https://books.google.co.id/books/about/redefining_management_practices_and_mark.html?id=7dovagaaqbaj&redir_esc=y. https://doi.org/10.1108/978-1-80071-264-520211012 https://doi.org/10.1108/978-1-80071-264-520211012 https://doi.org/10.1353/lib.2006.0045 https://doi.org/10.1016/j.bushor.2011.01.006 https://doi.org/10.1016/j.bushor.2009.03.002 https://ijisrt.com/assets/upload/files/ijisrt21jan304.pdf. https://doi.org/10.15408/insaniyat.v2i2.7320 http://repository.unisba.ac.id:8080/xmlui/handle/123456789/24208 https://doi.org/10.1002/hfm.20336 https://doi.org/10.1016/j.sbspro.2014.07.009 https://doi.org/10.15294/dp.v12i2.13565 bulletin of social informatics theory and application issn 2614-0047 vol. 5, no. 1, march 2021, pp. 14-27 14 https:doi.org/10.31763/businta.v5i1.411 misuse of facebook user data leonel hernández a,1,*, tri juniarti fatimah b,2, petrus jack fautngilyanan b,3, sayed rahman hamid b,2, setya rahadi pramudhita b,3, triyanti simbolon b,2 a instituciòn universitaria itsa, carrera 45 # 48 -31, barranquilla, colombia b department of electrical engineering, universitas negeri malang, malang, indonesia 1 lhernandezc@itsa.edu.co*; 2 tri.juniarti.1805356@studens.um.ac.id; 3 jackfautngilyanan.1805356@studens.um.ac.id; 4 sayed.rahman.1805356@studens.um.ac.id; 5 rahadisetya69@gmail.com; 6 triyanti.simbolon.1805356@studens.um.ac.id * corresponding author 1. introduction during the last decade, the internet, particularly online news service and social media networks, have been the dominant information-sharing channels. in social media's large groups, they share similar interest forms networks that create mutual trust among the network members. information coming from a network member is accepted and propagated by the group members without much criticism. such a free environment to make the users vulnerable and express their opinions also reveals some personal data. third parties may collect such personal information, process it, and use it for their purposes. advertising agencies and political parties are willing to use personal information to convince or convert individuals [1]. social media networks create an ever-increasing array of functionalities for users to connect to make the most convenient forms of communication [2]. facebook is one of the most popular social media platforms, with over 300 million registered users [3]. there are some benefits of using facebook. first, facebook was created to facilitate the exchange of knowledge among teenagers [4]. second, facebook is often used as a teaching and learning tool in the classroom [5]. there are 7,6 billion people on earth, and 4,2 billion uses the internet, which means that more than half of all internet users are on facebook, or to be more exact, 1/3 of the world population is on facebook [6]. from facebook, users can also show their identity freely for others to know more about them. however, regarding showing personal information in detail, cybercriminals will easily retrieve and misuse users' information data if users do not maintain the privacy of personal information. cybercriminals have more opportunities to carry out their illicit activity with the exponential rise of a r t i c l e i n f o a b s t r a c t article history received december 16, 2020 revised january 9, 2021 accepted january 23, 2021 nowadays, we live when technological developments have developed rapidly, especially in the communications and information sector. one of the triggers is social media, including facebook. in 2010, there were around 24 million facebook users in indonesia. in building social relationships, of course, personal information is needed from someone. the same is the case when using social media. when you want to create a facebook account, users will be asked to provide various personal data. this functions so that users can recognize one another. besides that, it can also help facebook in securing user accounts. but by sharing personal data will undoubtedly pose a risk of being misused. apart from data leaks due to facebook's shortcomings, this is also inseparable from users' negligence in safeguarding their data. this research explores the unawareness of facebook users in protecting their data. this research will show the consequences of a lack of attention in maintaining personal data and show how to protect personal data to increase the awareness of facebook users in safeguarding their data. this is an open access article under the cc–by-sa license. keywords facebook social media personal data misuse http://creativecommons.org/licenses/by-sa/4.0/ http://creativecommons.org/licenses/by-sa/4.0/ issn 2614-0047 bulletin of social informatics theory and application 15 vol. 5, no. 1, march 2021, pp. 14-27 hernández et.al (misuse of facebook user data) online social networking sites [7]. hence the freedom of expressing an opinion and spreading information may be misused to propagate rumors, gossip, and misleading or false information. the question, whether such interventions affect public opinion or not is still an open debate. an information system such as tv, newspaper, blogs on the evolution of public opinion is studied. while it is fun to share information on facebook, it also necessitates a great deal of protection and privacy [8]. also, the analysis of the frequency of interaction is considered. it is also shown that to use/support some concepts which are valuable or very sensitive for the society, such as religion, nationality, cultural issues, collective beliefs, can also make a profit for politicians and even the ideas adopted by the minority of the society can be supported by the majority, after such a process. although social studies still do not have clear evidence on the influence of such misleading information flow on social preferences, false news propagation is faster and broader than the spread of true news due to the attractiveness of the false news. like the previous incident related to the scandal on facebook, one of facebook's largest-ever data leaks is the data analytics firm that partnered with donald trump's election team and the victorious brexit campaign gathered millions of us voter profiles and used them to create a powerful software program to forecast and manipulate voting decisions. 2. misuse of user data: a literature review 2.1. facebook with the advancement of technology and the proliferation of content, facebook has become a popular social networking platform across many people. in 2010, indonesia had approximately 24 million facebook users, accounting for 10% of the country's total population. facebook has evolved into a modern platform for self-presentation [9]. users' motivations for using facebook, privacy settings and self-disclosure, and satisfaction with facebook's ability to fulfill their motivating needs are all critical factors [10]. in indonesia, teenagers are among the most active users of social media. the initial impetus for them to become so involved on social media is to attract publicity, elicit input, and show their profile. however, they grow addicted to social media consumption in the long run. they can't keep away from social media events. also, users did not consider the implications of their daily actions until they were reminded of their information's public audience, such as receiving unwelcome messages from strangers [11]. while social media has a positive side to be consumed in general, excessive use of social media has a detrimental effect. a significant number of studies have shown that teenagers' excessive use of social media leads to an uptick in self-concept incongruence when the true self and the ideal self are too far apart [12]. people who used social media to satisfy their social needs and affection were more likely to use facebook. because of this influence, teens rapidly post personal information on social media networks without fully comprehending any risk involved [13]. a development that is undoubtedly fueled by the advancement of the channels they use and shifting social norms. in terms of type and purpose, a typical teen's myspace profile in 2006 was very distinct from the 2006 edition of facebook and the facebook profiles that have become a staple of adolescent life today [14]. constantly disseminating personal data, it has become unconcerned with privacy. according to a study conducted by university of iowa researchers, some third-party facebook applications could be misusing their users' records. the study found that specific applications could be using their users' data for malware, malware, and targeted ads without their permission [15]. they believe facebook to be a secure computing network, but this is not always the case. for example, hackers can create fake accounts or clone user accounts to steal personal users' data[13]. also, the revelations that organizations collected user data for targeted ads, especially political advertising, with apparent success culminated in a decade of apparent indifference to data privacy at facebook. although cambridge analytica, the political consultancy and strategic communication company behind the pro-brexit leave eu movement, is the most well-known perpetrator, some organizations have most likely used similar strategies to gather personal data from facebook users, including donald trump's 2016 presidential campaign [16]. 16 bulletin of social informatics theory and application issn 2614-0047 vol. 5, no. 1, march 2021, pp. 14-27 hernández et.al (misuse of facebook user data) part of the problem is that, in 2011, facebook told the federal trade commission (ftc) in the united states that it would not exchange user data without their express permission [17]. facebook ceo mark zuckerberg has since maintained that he first heard of ca from a december 2015 guardian report breaking the news that ted cruz's presidential campaign was using psychological evidence focused on studies involving tens of millions of facebook members, largely without their knowledge [18]. it is common knowledge that facebook is not the most wholesome brand in social media. the company's downward spiral can be traced in part to the cambridge analytica fiasco. user data are manipulated by a particular party to influence elections in the united states at the time [19]. therefore, another explanation that privacy standards aimed at social media sites are sometimes mistaken is that it is unlikely for the social media business to violate your privacy in the social media sense. however, social media network administrators are not specifically liable for privacy invasions caused by users. current regulations that were structured to shield internet service providers provide them with broad exemptions from contributory liability. 2.2. use of privacy settings the most often used privacy security techniques were excluding personal information, private email addresses, and changing the default privacy settings [20]. however, there are several ways to protect user privacy data. although they do not guarantee it is protected, it can minimize misuse of facebook user data. if users aren't on facebook, facebook can still gather a lot of information about the facebook user. hundreds of thousands of apps, websites, and other services submit reams of data on what facebook users are doing on the internet to the firm. facebook maintains a copy of the data and will continue to use it for analytics reports and detailed success measurements for the competition. it's also essential to protect the user's facebook location. facebook user's phone location services settings power the most reliable source of location data on facebook. if a user disables their location access in the facebook app, the information available to the company would be less precise. users of iphones will go through their phone's settings, privacy, location services, and then facebook. then choose between "when using the app" and "never." go to the location section of their phone's settings for android phones and press app access to location and facebook. then choose between "allow only when using the app" and "deny." these directions can differ somewhat depending on the type of phone that facebook users have. look for a permissions menu on older phones. the facebook login feature allows you to sign in to other websites and applications quickly and easily. however, as previously said, facebook gains access to a little more of your personal information in return. it will also allow organizations that offer outside services access to account information, such as the name, profile, email address, and other information ordinarily available to the public. on a computer, a facebook user can go to settings and privacy on the down arrow in the top right of the facebook home, then apps and websites, active, click the box next to the app's name, then remove. using two-factor authentication is a good idea to secure facebook user login operation and database. this is especially important if a user ever used the same password for several accounts or a facebook user has a bad habit of using weak passwords. when users enable two-factor authentication in their facebook settings, the organization will give them a verification code by text or app to prove their identity. when users enable two-factor authentication in facebook's settings, the company will provide users a verification code via text or app to validate their identity when they log in from an unknown location, smartphone, or browser. users can take advantage of some of the privacy rules available on facebook and reduce activities that show or display detailed user personal data. 3. method the research approach used in this writing is juridical-normative research. it is a scientific procedure to find truth based on scientific logic from the normative side, whose object is the law itself. the study is focused on identifying and studying the norms or norms in a positive direction. the use of this type of juridical-normative research in this study can be seen from two aspects, namely from the juridical and normative aspects where this research tries to examine the juridical issn 2614-0047 bulletin of social informatics theory and application 17 vol. 5, no. 1, march 2021, pp. 14-27 hernández et.al (misuse of facebook user data) review of the abuse of personal data on social media. meanwhile, it is trying to analyze the problems in the rules or norms from the normative aspect. based on the type, the type of data used in this study is quantitative data. the data were obtained from the data collection techniques used during the research process. based on the source, this study uses primary data. the data was obtained from the data collection techniques used during the research process. the data collection technique used in this quantitative research is data collection using a questionnaire (questionnaire). the questionnaire (questionnaire) is a data collection technique carried out by giving questions or written statements to respondents to be answered. data analysis was carried out by interpreting the data that had been collected. in its use consists of several stages. the first is data reduction. data reduction is made by summarizing, selecting the main things, and focusing on essential things that support the success of the research. the second stage is the presentation of the data; in this stage, the researcher compiles a collection of information so that it is possible to conclude. the last stage is completing; in this stage, the researcher concludes the findings in descriptions or descriptions based on data that has gone through the analysis process. review analysis in this research uses a questionnaire or survey used as a research sample that represents the population determined by the author. the difference between people and sample is that the population is the entire population, while the sample represents it. in this research, review analysis is being used to see what testing has been conducted and what approaches have been suggested to solve a problem. 4. results and discussion the facebook user sample survey was split into demographic profile and awareness to protect personal data. 4.1. demographic profile the first section aims to collect demographic profile data from participants since there are so many facebook users that only some data can be sampled. fig. 1. gender fig. 1 shows the frequency of facebook use obtained from 28 respondents for questions about gender that facebook users are mostly male with a percentage of 54%. the remaining 46% are women. however, based on this comparison, there is no significant difference between male facebook users and female facebook users, shows that using social media in indonesia, especially facebook is not related to gender. both men and women all using facebook simultaneously means that negligence in securing personal data does not necessarily occur because someone is male or female. therefore, the objectives of this study will not be related to the gender of the user. all have the same opportunity to be negligent in safeguarding their data, not as male facebook users or female facebook users, but as facebook users. thus, negligence in protecting personal data occurs due to the lack of awareness of facebook users regardless of gender. 18 bulletin of social informatics theory and application issn 2614-0047 vol. 5, no. 1, march 2021, pp. 14-27 hernández et.al (misuse of facebook user data) fig. 2. age fig. 2 shows the frequency of facebook use obtained from the results of questions from 28 respondents about age, that most facebook users are 18 to 25 years old with a percentage of 89%. other facebook users, namely those under 18 years old, are 3%, 26 to 30 years old there is 4%, 31 to 40 years old there is 4%, the remaining 0% are facebook users who are over 40 years old. based on this comparison, it appears that there is a big difference between the number of facebook users of all ages. adolescents, especially those between 18 and 25 years, are the most significant facebook users among facebook users of other generations. this shows that using social media in indonesia, especially facebook, is reasonably related to age. therefore, the target of this research is facebook users whom teenagers dominate. negligence in securing personal data may be related to the awareness of teenagers using facebook. all facebook users may have an equal chance of neglecting to safeguard their data. however, people of other ages will not be able to ignore maintaining personal data because previously, they did not use social media, especially facebook. thus, negligence in safeguarding personal data occurs due to the lack of awareness of facebook users, which may be related to a person's age. fig. 3. profession fig. 3 shows the frequency of facebook use obtained from the results of questions from 28 respondents about the profession, that most facebook users are students with a percentage of 89%. 11% of other facebook users are workers, 0% are housewives, the remaining 3% are facebook users who are students with part-time jobs. based on this comparison, it appears that there is a significant difference between the number of facebook users by profession. students are the most influential facebook users among facebook users of other occupations, shows that using social media in indonesia, especially facebook, is reasonably related to the profession. therefore, the target of this study is facebook users whom students dominate. negligence in securing personal data may be associated with the awareness of students using facebook. all facebook users may have the same opportunity to bypass their data security. however, people of different professions will not have the chance to neglect their data because they previously did not use social media, especially facebook. thus, negligence in safeguarding personal data occurs due to the lack of awareness of facebook users related to one's profession. 4.2. awareness to protect personal table 1 aims attempts to shows the value of how many facebook users have used strategies to protect their data. we asked the respondents fifteen questions regarding this topic: do you read facebook's privacy policy? do you use a vpn every time you use facebook? do you show your location? have you used the setting and privacy features of facebook? the content of your facebook account is? , etc. all of the questions can be seen in table 1. issn 2614-0047 bulletin of social informatics theory and application 19 vol. 5, no. 1, march 2021, pp. 14-27 hernández et.al (misuse of facebook user data) table.1 shows the general use of facebook user question answer quantity mean median modus varian do you read facebook's privacy policy? yes 12 15,3333 14 b 17,3333 read a little 20 no 14 total 46 do you show or write the information of your details on facebook publicly? yes 3 20 27 b 240,3333 some little 32 never 27 total 62 do you use a vpn every time you use facebook? always 0 9,33333 1 c 234,3333 some 1 no 27 total 29 do you show your location? always 6 13,66667 17 c 44,3333 sometime 18 never 17 total 41 do you click on the links or ads on your facebook timeline? always 24 26 12 b 1424 often 80 rarely 0 never 0 total 104 do you use security strategies to protect your data on facebook? always 32 18,25 17,5 a 121,5833 often 21 rarely 14 never 6 total 105 have you used the setting and privacy features of facebook always 39 19,333 11 a 292 sometime 8 never 11 total 54 the content of your facebook account is safe 15 17 15 b 67 with restriction 26 public 10 total 51 you track the log of your facebook profile activity : once a week 0 10 11 d 75 1 – 2 times a month 6 once a month 16 never 18 total 40 you monitor, or customize, your new section : once a week 1 21,75 7 d 1154,25 1 – 2 times a month 1 20 bulletin of social informatics theory and application issn 2614-0047 vol. 5, no. 1, march 2021, pp. 14-27 hernández et.al (misuse of facebook user data) question answer quantity mean median modus varian once a month 13 never 72 total 99 do you connect your facebook account to other social media accounts? always 2 19 9 b 559 sometime 46 never 9 total 57 are you worried if other people on facebook don't know about your situation? always 0 9,75 9,5 d 66,91 often 9 rarely 10 never 20 total 39 do you connect your facebook account to other social media accounts? almost all 4 17,333 16 b 197,333 some 32 no 16 total 60 do you log into a website using your facebook account? always 1 21,5 14 c 664,333 often 4 rarely 57 never 24 total 86 log into facebook using two-factor authentication. yes 16 18 18 b 8 no 20 total 36 table 1 shows that if the total value of each question is calculated to an average value of 60.6. it suggests that most facebook users still do not comprehend the necessity of safeguarding data privacy on their facebook accounts to avoid misuse of facebook user data, as seen in the table 1. as a result, they have not fully protected their personal information. the second section attempts to shows the value of how many facebook users have used strategies to protect their data. fig. 4. facebook user awereness' privacy policy' fig. 4 shows that 14% of facebook user read the privacy policy of facebook, 36% read a little, and 50% do not read. most facebook users do not read the privacy policy of facebook, but some have read it briefly. reading the privacy policy on facebook is very important to read and must be considered before using it on facebook because there are several provisions such as providing an understanding of the extent to which user data is protected and cookies policy. issn 2614-0047 bulletin of social informatics theory and application 21 vol. 5, no. 1, march 2021, pp. 14-27 hernández et.al (misuse of facebook user data) fig. 5. facebook user awereness' personal details information' fig. 5 shows that 11% of facebook users show or write their personal detail information publicly, 57% sometimes, and 32% never do. most facebook users show or report personal details information on facebook publicly. not all user information data must be shown on social media, especially facebook. we recommend that users continue to sort out which information data is allowed to be delivered, which cannot be directed to the facebook account publicly. fig. 6. facebook user awereness' use a vpn' fig. 6 shows that 0% of the facebook user always use a vpn every time log in facebook, 6% sometimes, and 94% never do. most facebook users never use a vpn to log in to facebook. the use of a vpn has several benefits: it encrypts users 'internet traffic, keeps users' online activities from surveillance, and allows users to browse in privacy. this can maintain user privacy every time they access facebook using a vpn. although this is not sure to protect, it can prevent user privacy surveys every time they access facebook using a vpn. fig. 7. facebook user awereness' shown location' fig. 7 shows that 9% of the facebook user always shown their location, 41% sometimes, and 50% never do. facebook users showed their place, but most have it for a while. maintaining location information is very important because it prevents other people from monitoring user activity. 22 bulletin of social informatics theory and application issn 2614-0047 vol. 5, no. 1, march 2021, pp. 14-27 hernández et.al (misuse of facebook user data) fig. 8. facebook user awereness' link or ads' fig. 8 shows that 29% of the facebook user always click on links or ads on facebook timeline, 71% often, 0% rarely, and 0% never do. the facebook users always click on the links or ads on facebook timelines, but most have it often. most facebook users have already clicked on a link or ads from their home page. it is advisable to never click on links or ads from the home page because it prevents information data theft through the links or ads. fig. 9. facebook user awereness' security strategies' fig. 9 shows that 29% of the facebook user always use security strategies to protect their data on facebook, 25% often, 25% rarely, and 21% never do. the diagram above shows that many people have used strategies to protect their data. because personal data protection is not a minor issue, it is better to protect users' data, such as securing accounts, not displaying detailed personal information, monitoring login activities, etc. fig. 10. facebook user awereness' setting and privacy features' fig. 10 shows that 47% of the facebook user continuously use the setting and privacy features, 14% sometimes, and 39% never have. some facebook users used the setting and privacy features, but some others never use them. users must take advantage of existing security systems and settings in facebook's features to protect their data. issn 2614-0047 bulletin of social informatics theory and application 23 vol. 5, no. 1, march 2021, pp. 14-27 hernández et.al (misuse of facebook user data) fig. 11. facebook user awereness' content' fig. 11 shows that 18% of the facebook user safe their facebook content, 46% with restriction, and 36% public. most facebook user save their facebook content. content on facebook accounts for users is better not shown to the public but safely or with restriction. this is to prevent the theft of personal information from users. fig. 12. facebook user awereness' track' fig. 12 shows that 0% of the facebook user track their profile activity, 7% track for 1 or 2 times a month, 29% once a month, and 64% never do. most facebook users never track their profile activity. this indicates that 64% or most facebook users do not monitor their login profile account activity. this is very important if to prevent misuse of personal data because users monitoring login profile activities can prevent cybercriminals from trying to log in using user accounts. fig. 13. facebook user awereness' new section' fig. 13 shows that 3% of the facebook user monitor or customize their new section, 4% do it 1 or 2 times a month, 29% one a month, and 64% never do. the most facebook user never monitor or customize their new section. most of the users did not have to watch and are not customizing their new page. it is recommended that users always observe and adjust their page to prevent showing their data on their facebook account. 24 bulletin of social informatics theory and application issn 2614-0047 vol. 5, no. 1, march 2021, pp. 14-27 hernández et.al (misuse of facebook user data) fig. 14. facebook user awareness 'accept anyone' fig. 14 shows that 10% of the facebook user accept anyone when someone adds them as a friend on facebook, 10% sometimes, and 80% never do. most facebook users never take when someone adds them as a friend on facebook. when a stranger or an unknown person adds a user to their friend on facebook, it is better not to accept it because it prevents them from tracking activity or user accounts through friends unless they have set the security of their personal information to protect their data. fig. 15. facebook user awareness 'worried' fig. 15 shows that 0% of the facebook user always worried if other users do not know about their situation, 11% often, 18% rarely, and 71% never concerned. most facebook users never worried if other users do not know about their situation. this is pretty good because not everyone should know what users are doing. moreover, to show obvious information on what the user is doing now. fig. 16. facebook user awereness' connect to others' fig. 16 shows that 14% of the facebook user connect their facebook account to almost all of their social media accounts, 57% to some social media accounts, and never do. it is better to log in to other social media. it is better not to use a facebook account because it prevents theft of personal data through javascript trackers or the like. issn 2614-0047 bulletin of social informatics theory and application 25 vol. 5, no. 1, march 2021, pp. 14-27 hernández et.al (misuse of facebook user data) fig. 17. facebook user awereness' log in using facebook' fig. 17 shows that 4% of the facebook user always log into a website with their facebook account, 7% often, 68% rarely, and 21% never do. like not using facebook to log in to other social media, websites are also not recommended to log in using a facebook account because it prevents data theft from happening through the website. fig. 18. facebook user awereness' two-factor authentication' fig. 18 shows that 29% of facebook users log in with two-factor authentication, and 71% never log in. most facebook users never log in with two-factor authentication. it can be seen from these data that most facebook users do not use two-factor authentication to log in to their facebook account. two-factor authentication can provide double security for social media accounts, especially facebook. this does not guarantee that personal data will not be stolen, but at least when someone else tries to enter the user's facebook account before verifying the code employing a phone number. 5. conclusion based on the results of our research, it is known that personal data or personal information is personally identifiable data based on such information regarding specific individuals. personal data is misused for the personal and political interests of particular individuals. one of the media with the most significant number of users and holds various users' information is facebook. unfortunately, many users are not careful in protecting their data. 64.3% of facebook users do not monitor login activity on their accounts, and 71.4% of facebook users do not use two-factor authentication to log in. facebook must protect the personal data of its users as stated in the privacy policy, and facebook has also agreed to the statement of rights and responsibilities. however, this only applies if the user's data occurs between the user and facebook. if the problem occurs between the user and fellow users, then facebook is not responsible. therefore, users need to be more careful in safeguarding their data and not underestimating the misuse of personal data. users also need to pay attention to data provisions and policies from media and social networks before agreeing to and providing personal data. users can take advantage of both the security facilities provided by facebook and trusted facilities from outside facebook to protect their data. however, it would be better if social network users do not have to share all personal data. share what is necessary for the social network by knowing the purpose for which the data is requested. 26 bulletin of social informatics theory and application issn 2614-0047 vol. 5, no. 1, march 2021, pp. 14-27 hernández et.al (misuse of facebook user data) references [1] s. gündüç, “the effect of social media on shaping individuals opinion formation,” in international conference on complex networks and their applications, 2020, pp. 376–386. [2] t. limba and a. šidlauskas, “secure personal data administration in the social networks: the case of voluntary sharing of personal data on the facebook,” entrep. sustain. issues, vol. 5, no. 3, pp. 528–541, mar. 2018. [3] m. laliberté, é. samson, c. beaulieu-poulin, a. c. larrivée, m. charbonneau, and d. e. feldman, “facebook and physiotherapy: current uses and misuses,” physiotherapy, vol. 101, pp. e809–e810, may 2015. [4] m. t. kincheloe, d. weed, and c. w. lack, “facebook and psychology: use and misuse of social networks,” in recent advances in clinical medicine book series: recent advances in biology and biomedicine, 2010, pp. 80–83. [5] m. j. bugeja, “facing the facebook,” chron. high. educ., vol. 52, no. 21, 2006. [6] t. vranešević, n. perić, and t. marušić, “perception of social media as a source of relevant information,” zagreb int. rev. econ. bus., vol. 22, no. 1, pp. 133–144, may 2019. [7] p. patel, k. kannoorpatti, b. shanmugam, s. azam, and k. c. yeo, “a theoretical review of social media usage by cyber-criminals,” in 2017 international conference on computer communication and informatics (iccci), 2017, pp. 1–6. [8] senthil kumar n, saravanakumar k, and deepa k, “on privacy and security in social media – a comprehensive study,” procedia comput. sci., vol. 78, pp. 114–119, 2016. [9] h. pangastuti, “hubungan antara narsisme dengan presentasi diri pada pengguna jejaring sosial facebook,” universitas muhammadiyah surakarta, 2015. [10] w. p. special and k. t. li-barber, “self-disclosure and student satisfaction with facebook,” comput. human behav., vol. 28, no. 2, pp. 624–630, mar. 2012. [11] h. r. lipford, a. besmer, and j. watson, “understanding privacy settings in facebook with an audience view,” upsec, vol. 1, pp. 1–8, 2008. [12] p. felita, c. siahaja, v. wijaya, g. melisa, m. chandra, and r. dahesihsari, “pemakaian media sosial dan self concept pada remaja,” j. ilm. psikol. manasa, vol. 5, no. 1, pp. 30–41, 2016. [13] p. nyoni and m. velempini, “privacy and user awareness on facebook,” s. afr. j. sci., vol. 114, no. 5/6, may 2018. [14] m. madden et al., “teens, social media, and privacy,” pew res. cent., vol. 21, no. 1055, pp. 2–86, 2013. [15] g. dillon, “study finds some facebook apps misuse user data; tiktok looks to quell privacy concerns,” exchangewire, 2020. [online]. available: https://www.exchangewire.com/blog/2020/07/02/study-finds-some-facebook-apps-misuse-user-datatiktok-looks-to-quell-privacy-concerns/. [accessed: 17-oct-2020]. [16] d. patterson, “facebook data privacy scandal: a cheat sheet,” techrepublic, 2020. [online]. available: https://www.techrepublic.com/article/facebook-data-privacy-scandal-a-cheat-sheet/. [accessed: 17-oct2020]. [17] bbc, “facebook’s data-sharing deals exposed,” bbc news, 2018. [online]. available: https://www.bbc.com/news/technology-46618582. [accessed: 17-oct-2020]. [18] n. lomas, “facebook data misuse and voter manipulation back in the frame with latest cambridge analytica leaks,” techcrunch, 2020. [online]. available: https://techcrunch.com/2020/01/06/facebookdata-misuse-and-voter-manipulation-back-in-the-frame-with-latest-cambridge-analytica-leaks/. [accessed: 17-oct-2020]. [19] z. muhammad, “facebook’s dangerous misuse of user data revealed,” digital information world, 2019. [online]. available: https://www.digitalinformationworld.com/2019/04/leaked-documents-show-markzuckerberg-abused-user-data.html. [accessed: 17-oct-2020]. issn 2614-0047 bulletin of social informatics theory and application 27 vol. 5, no. 1, march 2021, pp. 14-27 hernández et.al (misuse of facebook user data) [20] a. l. young and a. quan-haase, “information revelation and internet privacy concerns on social network sites,” in proceedings of the fourth international conference on communities and technologies c&t ’09, 2009, p. 265. bulletin of social informatics theory and application issn 2614-0047 vol. 4, no. 1, july 2020, pp. 21-34 21 https:doi.org/10.31763/businta.v4i1.259 characterization of the impact on the society of the local cisco networking academy of itsa in barranquilla leonel hernandez a,1,*, piedad marchena a,2, aji prasetya wibawa b,1 a instituciòn universitaria itsa, carrera 45 # 48 -31, barranquilla, colombia b department of electrical engineering, universitas negeri malang, malang, indonesia 1 lhernandezc@itsa.edu.co*; 2pmarchena@itsa.edu.co; 3 aji.prasetya.ft@um-ac.id 1. introduction itsa (university institution itsa) is an institute of higher education in the department of atlántico committed to providing the best learning opportunities to our student community. the university offers several academic degrees by tiered vocational cycles to meet the needs of the caribbean region's industrial and social sectors in a global context. itsa started working in 2000; one of its primary goals has been to promote the usage of information and communication technologies. it has also been a pioneer in partnering with the technology education program cisco networking academy. itsa has led campaigns to implement and articulate high school and college workforce education programs. furthermore, itsa has taken steps to bring education to those who live far away from cities. itsa has been recognized as having set forth a proactive and successful educational pattern to be followed [1]. in latin america, the demand for professionals with ict skills will exceed the supply, and it will take 449,000 full-time employees by 2019, according to the study on network skills in latin a r t i c l e i n f o a b s t r a c t article history received january 3, 2020 revised january 17, 2020 accepted february 1, 2020 by 1997, cisco systems, a company already consolidated in the technology and communications market, saw the need to train personnel who had the skills to configure, manage, install and support all its products in general at all levels, from design to the implementation of solutions. in colombia, more precisely in the city of barranquilla, the itsa university institution in the early 2000s saw an excellent opportunity to ally with the university created by cisco, called cisco networking academy, to train professionals in the caribbean region capable of face the new challenges that technology in networks is generating day by day, becoming in the first institution of higher education in the region to provide this type of training with international certification and endorsement. from then on, the local cisco academy has strengthened and significantly impacted local society, generating valued and skilled labor in the labor market of the city and the region. the purpose of this work is to measure this impact, focused on the cisco, ccna, and ccnp flagship courses between 2017 and 2019. to fulfill the purpose of the study, two types of research have been used according to the object of study, exploratory and documentary research. according to the level of measurement, scientific knowledge and analysis of the information, the research is quantitative and descriptive. the research design is non-experimental longitudinal, using the cisco satisfaction survey as a measurement instrument to collect data and analyze the information. as a result, the study shows the high level of satisfaction of the students of the academy in the points analyzed throughout the defined period, which allows us to conclude the positive impact that training under the cisco methodology has had on society. this is an open access article under the cc–by-sa license. keywords cisco networking academy feedback propedeutic students http://creativecommons.org/licenses/by-sa/4.0/ http://creativecommons.org/licenses/by-sa/4.0/ 22 bulletin of social informatics theory and application issn 2614-0047 vol. 4, no. 1, july 2020, pp. 21-34 hernandez et.al (characterization of the impact on the society of the local cisco networking academy of itsa) america, commissioned by cisco to the company idc. in mexico, the shortage will reach 148,052 employees for the same year. this gap causes companies and governments to face the challenge of finding professionals with the right skills that allow them to drive innovation to be globally competitive. the same study suggests that latin america is advancing on the path to transformation through the adoption of technology and innovation, which increases competitiveness in the world and solves its unique challenges. some of the technological trends in latin america worth highlighting are cloud computing, open-source and network disaggregation, software-defined networks behind the transformation, the dominance of network security, convergence and integration of communication and collaboration unified to business and mobility, the rise of medium-sized companies in the adoption of technologies in latin america. undoubtedly, the teaching-learning process is changing to adapt to the digital revolution, as expressed by [2] in their study, in which they highlight that the digital revolution has created a vast space of interconnected information and communication, in the which take as an example the curricula of the networking academy of cisco, to exemplify the impact that this educational model has caused in society. the itsa university institution, a pioneer in the implementation of the propedeutic cycle model, it is characterized by being a proactive institution, committed to the constant development and improvement of higher education in the caribbean region and the country. to accomplish this, the itsa university institution has the laboratories required to properly develop the contents of the different modules, and pearson vue, which is one of the international organizations for the certification of technical and technological competences of cisco, among others. it also has instructors recognized by the academy to carry out training in the administration of telematics services in the area of data networks. according to the studies carried out by the cisco academy, the need for management and administration in the different services of data networks, communications and computers are evident, considering the interconnection of people, processes, data, and things, which will create an impact sustainable in every aspect of society. both the undergraduate students of the telematic engineering program, and the students of the institution's extension programs focused on the area of computer networks, have access to the netacad platform of cisco academy, in which the material in line of different cisco courses, translated in several languages [3]. a differentiating factor of the itsa university institution programs concerning other similar programs in the preparation in computer networks is the inclusion of the training programs provided through the cisco academy within the training cycles, with which it is prepared for the presentation of the international certification exams in this area, which is highly requested by the productive sector. however, until now, a characterization has not been carried out in which the impact of the formation of the cisco networking academy in our environment is estimated. it is necessary to carry out this analysis to focus on efforts that are aimed at increasing the satisfaction indicators of both students and representatives of the productive sector concerning graduates. the rest of the document will deal with the following points. a review of the literature with similar studies is made. the research methodology will be described, specifying the method of information collection, to later show the results and analyze the leading satisfaction indicators of recent years, focused on the ccna and ccnp training (main products of the full offer of the cisco networking academy, which are the most requested). finally, the recommendations for the improvement of the training process will be given, and some acknowledgments that the institution has had by cisco will be exposed. 2. literature review previous works. the strong impact that the programs of the cisco academy have had in his combined model of distance learning, implemented in the open university of the united kingdom, highlighting the importance of the model above for supporting students in their process learning [4]. another study present an investigation in which they highlight the ease of understanding and understanding in the subject of computer networks provided by the packet tracer simulator that can be studied through the cisco academy [5]. they emphasize that the tool allows presenting the various case studies and exercises educationally, increasing the level of student learning, improving the results of the evaluation process. issn 2614-0047 bulletin of social informatics theory and application 23 vol. 4, no. 1, july 2020, pp. 21-34 hernandez et.al (characterization of the impact on the society of the local cisco networking academy of itsa) a similar study highlighted that traditional education can be implemented as an auxiliary teaching method, to make way for new strategies such as flipped classroom and gamification, which can be achieved through education [6]. provided by cisco networking academy, with excellent results in the teaching-learning process a study in the same sense was carried out [7]. on the other hand, the effects of the different qualities of teachers on the performance of students in secondary schools with a standards-based curriculum that is offered in a blended learning environment, for which they use the cisco networking academy curriculum [8]. a comparison between assessmentbased learning and game-based learning in their research [9]. the authors created a game on the packet tracer simulator to be analyzed considering defined categories throughout the study. another use of the packet tracer offered by cisco networking academy, this time to be integrated with a moodle platform to put knowledge into practice, validate skills and improve the teaching-learning process in general by students, is presented by [10]. a case study on teaching network engineering in conjunction with interactive learning resources offered by the cisco networking academy [11]. the main goal of this work is allowing learners and educators to perform network simulations within a web browser or an interactive ebook by using any type of electronic device. a case study in which they describe all the activities carried out to offer distance learning in an open university, through cisco programs [12]. the authors present the results of the learning process, both through face-to-face and distance learning, highlighting the indicators obtained with the latter method. a comprehensive study on the impact of high school principal's technology leadership on the sustainability of corporate-sponsored information communication technology curriculum, in which he conducted qualitative research based on a case study from the cisco networking academy in montana [13]. the results of the study helped to develop factors that described the sustainability of corporate-sponsored ict curricula in montana high schools. similar work was produced in which authors further investigate the applicability of the cisco networking academy program's instructional model for the delivery of end-user information security instructional content, planned with the assistance of bloom's taxonomy [14]. the results of the inclusion of the cisco networking academy in their training programs in slovakia, which were positive [15]. one of the factors that have the most impact on the correct delivery of the cisco academy curriculum, and which is vital for the success of the program, is the infrastructure of the physical laboratories. in this sense, the impact of the forge toolkit, which takes advantage of the laboratory infrastructures to facilitate the development of e-learning materials [16]. another research measured the impact of the cisco networking academy on higher education programs in malaysia [17]. another job similar to the previous one but in slovakia, in the country`s vocational education system [18]. a fascinating work in which they evaluate the effectiveness of the cisco networking academy program in developing countries for the preparation of future professionals in the ict area [19]. the social responsibility of the cisco academy program is shown, highlighting that this training model can contribute positively to the transformation of lives for many people [20]. finally, and in the same line of research work that is being carried out, presents the results of the performance and level of student satisfaction concerning the cisco academy curriculum, through a descriptive research methodology [21]. 3. method this detailed study will be developed using the documentary and descriptive research methodology, since for the elaboration of this project it is necessary to consult a series of documents and collect information through data collection techniques, to reinforce concepts and terms in the different stages in the optimal development of the object of study. the type of research design to be used is the quantitative/longitudinal one since it is going to analyze the level or current state of variables that will be defined throughout the work and its relation [22]. the objective of having defined this research design is to analyze what is the level or state of one or several variables (collected through the measurement instrument, the cisco survey) at various points in time (measurements years 2017, 2018 and 2019). a population has been chosen from a sample, following statistical criteria to be deepened in the project, to use data collection techniques such as direct observation and in-depth interviews, to subsequently make a qualitative analysis of the data [23]. fig. 1 shows the stages of the project and the resources used to carry out the study: 24 bulletin of social informatics theory and application issn 2614-0047 vol. 4, no. 1, july 2020, pp. 21-34 hernandez et.al (characterization of the impact on the society of the local cisco networking academy of itsa) fig. 1. stages of the project the type of longitudinal non-experimental research design like the one of the study focuses on the analysis of reality in its natural dynamics. the objective is not to create situations to observe what changes in the environment from the created situation, but to describe, explain and predict reality from an approach to its natural dynamics. longitudinal studies have the advantage that they provide information on how variables and their relationships evolve over time. 4. results and discussion 4.1.portfolio of programs offered by the itsa cisco networking academy table 1 shows the list of some programs offered by the local cisco networking academy – itsa. all these courses are in force and are part of the curricular structure of the undergraduate engineering programs and extension graduates. table 1. list of cisco programs program modules ccnav7 ccna1: introduction to networks ccna2: switching, routing and wireless essentials ccna3: enterprise networking, security and automation ccna security ccna security it essentials pc hardware and software introduction to iot introduction to iot entrepreneurship entrepreneurship introduction to cybersecurity introduction to cybersecurity ccnp ccnp route: implementing ip routing ccnp switch: implementing ip switching ccnp tshoot: maintaining and troubleshooting ip networks linux ndg linux essentials ndg linux i ndg linux ii cybersecurity essentials cybersecurity essentials introduction to packet tracer introduction to packet tracer partner pcap programming essentials in python issn 2614-0047 bulletin of social informatics theory and application 25 vol. 4, no. 1, july 2020, pp. 21-34 hernandez et.al (characterization of the impact on the society of the local cisco networking academy of itsa) 4.2.metrics, or key indicators of success the local itsa cisco academy has historically focused on ccna and ccnp training. although all the listed courses are taught, the most representative courses and the most significant number of students are in the courses. the study focuses on this sample. likewise, the following metrics are considered as key indicators of success at our local academy. these metrics have been selected based on research and requirements defined by the netacad community:  pass rate is the number of registrants (=registered students) who pass a course over the total number of registered students that showed activity  student feedback is based on the course feedback surveys completed by students at the end of each class. for the feedback to be visible, three or more students must have completed the survey. ratings derived from course feedback include: (a) equipment access— the quality and availability of lab equipment, (b) instructor rating— effectiveness of the class instructor, (c) lab effectiveness— the usefulness of lab exercises in learning skills, and (d) value to students— relevance of the course to students’ lives  student performance is based on the assessment results of students. the academy success dashboard displays two informations which are final exam and gradebook score. final exam is the average of all students' last attempts on the final exam. the dashboard reflects the scores of the exams as submitted by the students—changes made by the instructors afterward in the gradebook are not considered. gradebook score reflects the final gradebook score. ungraded assignments and assignments that are not completed on netacad.com are assigned a score of zero (0). table 2 shows the survey questions, which are applied by the cisco academy to monitor the quality of all its courses. table 2. cisco networking academy – survey question description values q1 please rate your level of satisfaction with the following aspects of this course: labs access to equipment / software classroom instruction online curriculum materials: this course as a whole assessments (including quizzes, chapter exams, and the final exam) very dissatisfied dissatisfied neutral satisfied very satisfied q2 please rate your confidence with the overall skills you learned in this course not at all confident a little confident confident very confident completely confident prefer not to answer q3 please rate how confident you feel in your ability to do each of the following: *this option varies depending of the course, for example, if the course is ccna3, one option is configure, verify and troubleshoot ipv4 and ipv6 acls not at all confident a little confident confident very confident completely confident prefer not to answer q4 compare your instructor to other instructors you have had in terms of: preparedness to teach the course clear and easy to understand lessons presenting information in multiple ways making the topic interesting approachability with questions and ideas among the worst a little worst about the same a little better among the best prefer not to answer q5 please rate how much you agree with the following statements about your instructor(s): i would take another course from this instructor. i learned a lot from this instructor this instructor emphasized learning through practice (such as strongly disagree disagree neither agree nor disagree agree strongly agree 26 bulletin of social informatics theory and application issn 2614-0047 vol. 4, no. 1, july 2020, pp. 21-34 hernandez et.al (characterization of the impact on the society of the local cisco networking academy of itsa) question description values hands-on labs, packet tracer, netlab, etc.) prefer not to answer q6 please rate how much you agree with the following statements: overall, the online course materials were of high quality the hands-on lab activities helped me to achieve the stated course objectives having access to equipment in the classroom helped me learn. the online chapter quizzes helped to prepare me for the chapter exams interactive activities helped me learn packet tracer activities helped me learn chapter modeling activities helped me validate my learning. the chapter exam scores accurately reflected my understanding of the curriculum strongly disagree disagree neither agree nor disagree agree strongly agree don’t know/not applicable q7 rate the reading level of this course much too hard slightly too hard about right slightly too easy much too easy don’t know/not applicable q8 please rate how easy it is for you to access the course materials online from home i can't access the online course materials from home difficult somewhat difficult fairly easy easy q9 please rate how easy it is to use a computer in your classroom i don’t have access to a computer in my classroom i have to share my computer with more than one other person i share my computer with one other person i have my computer to work on during class q10 please rate how easy it is to use equipment in your classroom i don't have access to equipment in my classroom i have to share the equipment with more than one other person i share the equipment with one other person i have my own equipment to work on during class q11 please rate your motivation to do well in this course: not at all motivated slightly motivated motivated very motivated completely motivated q12 please indicate how enthusiastic you are about the content of this course and the things you’re learning (or have learned) not at all enthusiastic slightly enthusiastic enthusiastic very enthusiastic completely enthusiastic q13 please indicate your interest in this course not at all interested slightly interested interested very interested completely interested q14 to what extent did this course help you: prepare for the certification exam(s) obtain a new job or advance in your current job increase your value in the job market further your education learn skills that can be used in your current or a future job not at all a little somewhat quite a bit very much don’t know/na issn 2614-0047 bulletin of social informatics theory and application 27 vol. 4, no. 1, july 2020, pp. 21-34 hernandez et.al (characterization of the impact on the society of the local cisco networking academy of itsa) question description values prefer not to answer q15 please rate the likelihood that you will do each of the following to achieve your future goals: continue my education on the job training take certification exam(s) very unlikely somewhat unlikely somewhat likely very likely don’t know prefer not to answer q16 please choose the option below that best describes your current goal or motivation for taking cisco networking academy courses to explore a technology career to enter or advance in a career in networking to enter or advance in a technology career (not exclusivity networking focused) to gain technology knowledge that can be applied in my current or future nontechnology career to further my education for personal use (as a hobby or for home use) other q17 are you currently employed in the technology field? yes, employed in the networking field yes, employed in a technology field, not networking focused no, but employed in a different field no, not employed q18 please rate the extent to which you agree with the following statements: the cisco networking academy program furthered my goals i would recommend the cisco networking academy program to others strongly disagree disagree neither agree nor disagree agree strongly agree q19 is your career goal to work in it and/or networking? yes no unsure at this time 4.3.analysis of the results. below are the results of the analysis of the survey, considering the years 2017 to 2019, for the ccna and ccnp curricula, with the success metrics indicated above. fig. 2 shows the pass rate, in which the ccnp pass rate is higher than ccna, and that the best year was 2018. pass rate is the percentage of all students with activities at an academy who received a “pass” in classes within the selected curriculum that ended in the selected period: fig. 2. pass rate for ccna and ccnp 28 bulletin of social informatics theory and application issn 2614-0047 vol. 4, no. 1, july 2020, pp. 21-34 hernandez et.al (characterization of the impact on the society of the local cisco networking academy of itsa) fig. 3. student result details fig. 3 shows the students result in detail, in which registrants (blue) is the number of registered students within the selected twelve months period (blue). a student may be counted more than one time, provided the student registered in two or more courses within the chosen curricula and twelve months period. registrants with activities (green) are registered students that show any activity in netspace (enrolls in a course, looks at a calendar, posts something, ,…). participants (yellow) are registered students that have qualified as a participant in a class. a student may be counted more than one time, provided the student qualified as a participant in two or more courses within the selected curricula and twelve months period. to be eligible as a participant, a student must demonstrate participation by initiating at least one “participating activity” in netspace (i.e., assignment, quiz, file download, or access course content). passed (red) shows the number of registered students who passed the class (received a checkmark in the instructor use only assign student pass status column in netspace or a “p” in the gradebook on academy connection). here you can see a perhaps strange phenomenon, but that due to the itsa training model has an explanation. as mentioned above, the itsa training model corresponds to propedeutic cycles (technical, technological, and professional cycle), some students register from the technical cycle, enroll in ccna1 or ccnp1, and do not continue with the training because they are not promoted to the next training cycle. given this explanation, the number of ccna passers is considerably higher than that of ccnp, each year analyzed. the following analysis is related to student feedback. feedback is the average of ratings from the course feedback forms completed by students at the end of a course for a selected curriculum and 12-month period. the course feedback form contains questions about instructor rating, and value to students, most of the curricula also include questions about lab effectiveness, equipment access. since 2018, the survey stopped being applied to the ccnp curriculum, so only ccna results are shown. however, the same infrastructure of laboratories, classrooms, physical equipment, simulators that are used for ccna are used for ccnp. fig. 4 shows the average (maximum value 5.0) of the survey response by curriculum and by year. fig. 4. feedback results issn 2614-0047 bulletin of social informatics theory and application 29 vol. 4, no. 1, july 2020, pp. 21-34 hernandez et.al (characterization of the impact on the society of the local cisco networking academy of itsa) fig. 5. number of feedback responses fig. 5 shows the relative number of course feedback (cf) responses collected across the specified time range by students taking classes in the selected curriculum or curricula. fig. 6 shows the level of student satisfaction, both from ccna and ccnp, with access to laboratory equipment and satisfaction with the instructor. equipment access reflects whether or not students found the level of access to lab equipment in the class adequate for learning the objectives of the course. instructor rating reflects what students report about how much they learned from the instructor and how effectively the instructor emphasized learning through practice as can be seen, in both cases it exceeds the weighting of 4.0, which is very positive, considering that all courses and teachers, which are a considerable number, are evaluated during the study period. the quality of laboratories and teachers is checked at this point fig. 6. level of satisfaction for equipment access and instructor rating fig. 7 shows the level of student satisfaction with the effectiveness of the laboratories and the value that students place on the academy itself, on the online material, on the importance of training for their future. professional and regarding whether they would continue studying the following levels offered by the cisco networking academy. lab effectiveness reflects what students report about whether the hands-on lab exercises helped them learn the objectives of the course, value to students reflects what students report about the value that this training has added to their skill sets and development. fig. 7. level of satisfaction for lab effectiveness and value to students the last key success metric to analyze is the student performance, in which it is possible to verify the final exam report and gradebook score (which measures the completion of chapter exams and other activities defined by the instructor). final exam is the average of final exam scores for all students. the last attempt is counted. changes made by instructors afterward in the gradebook are not considered. fig. 8 shows the final exam report. 30 bulletin of social informatics theory and application issn 2614-0047 vol. 4, no. 1, july 2020, pp. 21-34 hernandez et.al (characterization of the impact on the society of the local cisco networking academy of itsa) fig. 8. final exam the final exam averages are above 80%, which is very positive since cisco demands that it be above 70%. respectively, the averages of the finals are 83%, 86%, and 89% for the years 2017, 2018, and 2019. fig. 9 shows the gradebook score, which is the average of the final scores for all students from class gradebook(s) in netspace. ungraded assignments and assignments that are not completed receive a score of zero (0). this corresponds with the weighted percentage for classes that were delivered through academy connection. fig. 9. gradebook scores the previous figure shows another aspect to highlight. for ccna, some instructors did not require, for specific modules, that students complete the exams online because a cisco guideline on flexibility in taking exams had been misunderstood. this topic has already been corrected. some other indicators to analyze are the following. fig. 10 shows the number of students registered per curriculum. registrants by curriculum and year line chart shows the number of registrants in the specified curriculum during selected years. all the values obtained in the analysis of the metrics previously exposed in the figures are summarized in fig. 11. fig. 10. registrants by curriculum and year issn 2614-0047 bulletin of social informatics theory and application 31 vol. 4, no. 1, july 2020, pp. 21-34 hernandez et.al (characterization of the impact on the society of the local cisco networking academy of itsa) fig. 11. details table academy id academy curriculum year 2016 2017 2018 2019 2016 2017 2018 2019 asc id 37063 37063 37063 37063 37063 37063 37063 37063 n.º of registrants by curriculum 892 640 781 686 45 68 30 87 n.º of registrants with activity 825 591 662 632 42 66 30 85 n.º of registrants 784 568 646 616 40 64 29 85 n.º of approved 539 350 394 382 39 55 29 59 approval rate 65% 59% 60% 60% 93% 83% 97% 69% n.º of course feedback responses 450 375 398 477 18 14 0 0 total comments 4,21 4,27 4,24 4,24 4,55 4,31 nd nd equipment access 3,99 4,12 4,07 4,06 4,22 4,05 nd nd instructor rating 4,34 4,39 4,41 4,36 4,51 4,16 nd nd lab effectiveness 4,15 4,21 4,18 4,20 4,53 4,29 nd nd value to students 4,04 4,09 3,99 4,04 4,64 4,43 nd nd gradebook score 42% 47% 42% 51% 70% 71% 73% 53% final exam 79% 83% 86% 89% 95% 86% nd nd n.º of new registrants 232 174 142 217 3 2 1 0 n.º or feedback responses 309 71 0 1 0 0 0 0 n.º of it-oriented registrants 222 56 0 1 0 0 0 0 n.º of experienced responses 811 587 662 632 42 63 29 85 n.º experienced registrants 420 296 283 181 33 46 23 50 n.º of registrants with activity in voucher classes 73 53 34 61 0 0 0 0 pass rate in voucher classes 100,00% 85,00% 88,44% 65,90% nd nd nd nd % of registrants with activity with at least 75% on final 71% 81% 79% 86% nd nd nd nd voucher eligible 71% 81% 79% 64% nd nd nd nd vouchers requested 3% 4% 0% 5% nd nd nd nd n.º of registrants difference year after year 79 -252 141 -95 -73 22 -37 56 n.º of registrants with activity difference year after year 93 -234 71 -30 -75 24 -36 55 n.º of participants difference year after year 66 -216 78 -30 -77 24 -35 56 approval rate difference year after year -8% -7% 1% 2% 15% -10% 13% -27% n.º of feedback responses difference year after year 17 -74 23 79 -60 -4 nd nd total feedback responses difference year after year 0,12 0,07 -0,04 0,00 0,22 -0,24 nd nd equipment access difference year after year 0,05 0,12 -0,05 -0,01 0,29 -0,17 nd nd instructor rating difference year after year 0,15 0,04 0,03 -0,05 0,10 -0,34 nd nd lab effectiveness difference year after year 0,09 0,06 -0,04 0,02 0,22 -0,24 nd nd value to students difference year after year 0,17 0,05 -0,10 0,05 0,22 -0,21 nd nd gradebook scores difference year after year 0% 5% -5% 9% -5% 0% 3% -21% final exam difference year after year -1% 4% 2% 3% 5% -9% nd nd pass rate in voucher classes difference year after year 21,00% -15,00% 10,94% -29,51% nd nd nd nd % of registrants with activity with at least 75% on final difference year after year 10,00% 10,00% 5,47% 0,00% nd nd nd nd n.º of registrants with activity difference year after year -700 -2000 -2006 2849 nd nd nd nd voucher eligible difference year after year 19% 10% 5% -22% nd nd nd nd vouchers requested difference year after year -6% 1% -4% 5% nd nd nd nd n.º of registrants with activity country average 15045 16781 16804 17691 1825 169 298 488 n.º of registrants country average 312 340 356 384 96 50 60 200 n.º of participants country average 272 292 310 330 71 48 59 190 approval rate country average 66% 67% 64% 62% 59% 69% 69% 69% total feedback country average 4,20 4,21 4,22 4,23 4,36 4,31 nd nd equipment access country average 3,91 3,93 3,94 3,94 4,06 4,05 nd nd instructor rating country average 4,31 4,30 4,32 4,32 4,33 4,16 nd nd lab effectiveness country average 4,17 4,19 4,20 4,21 4,38 4,29 nd nd value to students country average 4,14 4,13 4,13 4,15 4,38 4,43 nd nd final exam country average 84% 84% 87% 87% 93% 86% nd nd n.º of registrants in voucher classes country average 32 30 36 40 nd nd nd nd approval rate in voucher classes country average 75,00% 82,00% 73,00% 70,00% nd nd nd nd % of registrants with activity with at least 75% on final country average 68,00% 64,00% 68,00% 57,00% nd nd nd nd voucher eligible country average 63% 61% 62% 51% nd nd nd nd voucher requested country average 16% 19% 9% 11% nd nd nd nd ccnp r&s instituto tecnologico de soledad atlantico itsa 36518 ccna r&s 32 bulletin of social informatics theory and application issn 2614-0047 vol. 4, no. 1, july 2020, pp. 21-34 hernandez et.al (characterization of the impact on the society of the local cisco networking academy of itsa) 4.4.data analytics from a ccna module. this last section shows the data analytics calculated by cisco for a specific ccna course, more precisely the final module called connecting networks. in this module, students already have previous knowledge acquired thanks to the 3 previous modules, being on the verge of finishing their training and thus being able to take the certification exam. fig 12 shows the interaction that the students have had with the cisco moodle platform (participation in forums, reading the material online, taking online exams): fig. 12. interaction of the studens with the platform. fig. 13 shows the percentage of student compliance with respect to the presentation of online exams. as can be seen, students have a high average of compliance, given their special interest in preparing adequately to obtain their certification: fig. 13. submissions of online exams. fig. 14 shows the tabulated general course data. only one student did not complete his activities (for reasons of force majeure he had to withdraw). the rest of the students successfully completed their training cycle, and subsequently passed their certification exam. today they are working in important companies in the local productive sector. fig. 14. final statistics per student. issn 2614-0047 bulletin of social informatics theory and application 33 vol. 4, no. 1, july 2020, pp. 21-34 hernandez et.al (characterization of the impact on the society of the local cisco networking academy of itsa) 5. conclusion technology is potent when combined with education. cisco networking academy was born 23 years ago, with the primary objective of teaching some companies to build their networks. the networking academy quickly grew from a single school to become an ever-expanding community of students, educators, employers, cisco employees, and customers. now, the academy is present in 180 countries around the world. according to the cisco networking academy web site, the university impacts the lives of 10.9 million students in all continents. the number of educators is 26.500, spread over 12.100 academies. in our local environment, throughout these years of validity of the academy at itsa, the ccna and ccnp curriculum has been integrated into the curriculum of undergraduate training programs, offering low-income students and outsiders who take the courses such as extension programs, a high-quality training, that enhances their skills, and that has transformed their lives, since the vast majority of students work in various companies in the productive sector, and even in companies directly associated with cisco, improving their quality of life substantially. as can be seen in the metrics of success analyzed, the number of ccna and ccnp students who have reached full training and certification as such is high. as future work, strategies should be designed to promote ccnp, increase the number of registered and certified students. it is expected to do a factor analysis by clusters to identify better groups in the community on which to act in a better way. also, perform a regression analysis to verify the relationship between variables. finally, to carry out an additional study in which more cisco networking academy programs are included. references [1] d. del programa i. t.itsa, “documento_maestro_renovacion_ingenieria_telematica.” itsa, barranquilla, p. 428, 2018. [2] j. t. behrens, r. j. mislevy, k. e. dicerbo, and r. levy, “evidence centered design for learning and assessment in the digital world,” in technology-based assessments for 21st century skills, 2012. [3] cisco networking academy, “cisco networking academy,” 2015, 2015. [online]. available: http://www.cisco.com/web/learning/netacad/index.html. [4] n. moss and a. smith, “large scale delivery of cisco networking academy program by blended distance learning,” in 6th international conference on networking and services, icns 2010, includes lmpcna 2010; intensive 2010, 2010. [5] j. janitor, f. jakab, and k. kniewald, “visual learning tools for teaching/learning computer networks: cisco networking academy and packet tracer,” in 6th international conference on networking and services, icns 2010, includes lmpcna 2010; intensive 2010, 2010. [6] a. zhamanov and z. sakhiyeva, “implementing flipped classroom and gamification teaching methods into computer networks subject, by using cisco networking academy,” in proceedings of the 2015 12th international conference on electronics computer and computation, icecco 2015, 2016. [7] a. zhamanov, s. m. yoo, z. sakhiyeva, and m. zhaparov, “implementation and evaluation of flipped classroom as iot element into learning process of computer network education,” int. j. inf. commun. technol. educ., 2018. [8] h. çakır and b. a. bichelmeyer, “effects of teacher professional characteristics on student achievement: an investigation in blended learning environment with standards-based curriculum,” interact. learn. environ., 2016. [9] j. t. behrens, d. frezzo, r. mislevy, m. kroopnick, and d. wise, “structural, functional, and semiotic symmetries in simulation-based games and assessments,” in assessment of problem solving using simulations, 2018. [10] d. petcu, b. iancu, a. peculea, v. dadarlat, and e. cebuc, “integrating cisco packet tracer with moodle platform: support for teaching and automatic evaluation,” in proceedings roedunet ieee international conference, 2013. 34 bulletin of social informatics theory and application issn 2614-0047 vol. 4, no. 1, july 2020, pp. 21-34 hernandez et.al (characterization of the impact on the society of the local cisco networking academy of itsa) [11] a. mikroyannidis, a. gomez-goiri, a. smith, and j. domingue, “online experimentation and interactive learning resources for teaching network engineering,” in ieee global engineering education conference, educon, 2017. [12] n. moss and r. seaton, “development of a vendor practice-based distance based learning programme,” in laboratories for the 21st century in stem higher education: a compendium of current uk practice and an insight into future directions for laboratory-based teaching and learning, 2013. [13] b. r. gottwig, “the impact of high school principal’s technology leadership on the sustainability of corporate sponsored information communication technology curriculum.,” diss. abstr. int. sect. a humanit. soc. sci., 2014. [14] j. f. van niekerk and k. l. thomson, “evaluating the cisco networking academy program’s instructional model against bloom’s taxonomy for the purpose of information security education for organizational end-users,” ifip adv. inf. commun. technol., 2010. [15] k. kleinová, p. fecil’ak, and f. jakab, “networking academy innovation in education,” in iceta 2012 10th ieee international conference on emerging elearning technologies and applications, proceedings, 2012. [16] g. jourjon et al., “forge toolkit: leveraging distributed systems in elearning platforms,” ieee trans. emerg. top. comput., 2017. [17] r. ab rahman, m. m. md zan, h. z. abidin, m. kassim, and h. c. k. che ku yahaya, “impact of globalization and industry on engineering education at higher learning education in malaysia,” in 2010 ieee transforming engineering education: creating interdisciplinary skills for complex global environments, 2010. [18] k. kleinová, p. fecilak, f. jakab, and z. szalay, “transforming vocational education in slovakia,” in iceta 2011 9th ieee international conference on emerging elearning technologies and applications, proceedings, 2011. [19] o. yekela, k. l. thomson, and j. van niekerk, “assessing the effectiveness of the cisco networking academy program in developing countries,” in ifip advances in information and communication technology, 2017. [20] j. villalba, “cisco networking academy ‘corporate social responsibility,’” rev. científica la ucsa, 2017. [21] e. z. red, “students’ performance and satisfaction with the cisco academy networking program (computer networking 1): basis for a proposed pedagogical action in blended learning,” iamure int. j. multidiscip. res., 2012. [22] r. hernandez, c. fernandez, and m. baptista, metodología de la investigación. 2010. [23] r. walpole, r. myers, s. myers, and k. ye, probabilidad y estadística para ingenierías y ciencias, novena edición. méxico: pearson, 2012. bulletin of social informatics theory and application issn 2614-0047 vol. 5, no. 1, march 2021, pp.63-70 63 https:doi.org/10.31763/businta.v5i1.435 social media for energy saving campaigns yuni rahmawati 1,*, siti fatimah 2, candra friyandi harianja 3, zaka m. noor 4, shafa t. aulia 5 department of electrical engineering, universitas negeri malang, malang, indonesia 1 yuni.rahmawati.ft@um.ac.id *; 2 siti.fatimah.1805356@students.um.ac.id; 3 candra.friyandi.1805356@students.um.ac.id; 4 zaka.m.1805356@students.um.ac.id; 5 tasya.1805356@students.um.ac.id * corresponding author 1. introduction energy is a part of life. one of the most frequently used energies in everyday life is electrical energy. in indonesia, the electricity demand continues to increase because technology is also developing. based on the evaluation of power generation sources in the first quarter of 2018, indonesia uses fossil fuels as much as 87.3% to meet national electricity needs. the use of fossil fuels as electricity generators must affect the availability of non-renewable fossil fuels quickly. fossil fuels also produce carbon emissions which have a role in the greenhouse effect and climate change [1]. the more electricity used, the higher carbon emissions are generated by power plants because electricity in indonesia is still not produced from environmentally friendly materials. so that the resulting carbon emissions will impact global warming, it has prompted the government, organizations, institutions, and companies to carry out a campaign to invite the public to conserve electrical energy. the electricity saving reform campaign can be said to be an idea, characterized as follows: (1) the benefits people get are reducing the monthly payment for electricity and ensuring a sustainable supply; (2) save energy by wisely saving people's lives; (3) the electricity saving program is easy to understand; (4) the idea of saving electricity is not difficult to try; and (5) the idea of saving electricity is used and communicated to others [2]. the invitation to save electricity was campaigned by using social media. the development of technology, information, and communication that continues to increase makes the number of internet users also getting higher all over the world every year, including indonesia [3], [4]. according to reports from the british media company, internet users in indonesia in early 2021 reached 202.6 million people. this number increased by 15.5 percent or 27 million people when a r t i c l e i n f o a b s t r a c t article history received january 12, 2021 revised february 4, 2021 accepted february 20, 2021 the demand for electrical energy continues to increase in line with technological developments. electrical energy generally comes from fossil fuels or coal. the higher the electricity demand, the more carbon emissions are produced, which can cause global warming. currently, many campaigns invite people to save energy. the campaign is carried out using social media. currently, 170 million active social media users in indonesia spend 3 hours 14 minutes accessing social media. this phenomenon opens up great opportunities for business people, organizations, institutions, and the government to carry out a campaign or promotional activities, such as energy-saving campaigns by various organizations with social media such as facebook, instagram, twitter, and youtube. this research aims to observe government and non-government accounts that are campaign energy saving on facebook, instagram, twitter, and youtube. this research was conducted by collecting data from the followers or subscribers, time the account operates on each social media, post, and other necessary data. based on social media research, the most effective way to campaign energy saving is instagram. this is an open access article under the cc–by-sa license. keywords social media campaign energy saving http://creativecommons.org/licenses/by-sa/4.0/ http://creativecommons.org/licenses/by-sa/4.0/ 64 bulletin of social informatics theory and application issn 2614-0047 vol. 5, no. 1, march 2021, pp. 63-70 rahmawati et.al (social media for energy saving campaigns) compared to january 2020 [5]. the total population of indonesia is currently 274.9 million. from this data, the number of active social media users reaches 170 million. in january 2021, social media users in indonesia are equivalent to 61.8 percent of the total population. furthermore, in the same report, it was also stated that ordinary indonesian people spend 3 hours 14 minutes each day on social media, which shows that the indonesian population has been involved in social media in their daily lives. fig. 1 shows that the most widely used social media are youtube, whatsapp, instagram, facebook, and twitter [6]. the development of social media impacts the organizational process of communicating [7], included in energy-saving promotional activities. fig. 1. popular social media [6] through the kementerian sumber daya dan mineral (esdm) and the institute for essential services reform (iesr), the government is conducting energy-saving campaigns on social media on youtube, instagram, facebook, and twitter. however, from the social media used by the government and institutions to carry out energy-saving campaigns, it has not been found which social media is the most effective in campaigning for energy saving. for this reason, a comparative analysis was carried out related to social media, which was more effective in campaigning for energy saving. this analysis was carried out on two social media accounts, first the government account of the kementerian sumber daya dan mineral and the second non-governmental iesr indonesia. 2. popular social media social media is an internet platform provided for communication media, for between individuals, individuals with groups, and groups with groups by sharing content, news, photos, and others as a communication feed so that two-way interactions occur. this understanding is from the conclusion of the meaning of social media. according to communication experts, social media is an internet platform that allows individuals to share quickly and communicate continuously with their community [8]–[10]. social media has many features and characteristics. it has many facilities on the same channel like communicating, texting, image sharing, audio and video sharing, fast publishing, linking with all over the world, and direct connecting [11]—some of the social media functions.  social media is designed to expand human social interaction using the internet and web technology [12].  social media successfully transformed the practice of direct communication of broadcast media from one media institution to many audiences ("one to many") into a practice of dialogical communication between many audiences ("many to many") [13]. issn 2614-0047 bulletin of social informatics theory and application 65 vol. 5, no. 1, march 2021, pp. 63-70 rahmawati et.al (social media for energy saving campaigns)  social media supports the democratization of knowledge as well as information. transforming people from message content users into the message creator itself [14]. the development of social media utilized various fields such as education, economics, health, and others. during the current pandemic, social media has been utilized in the world of education as a long-distance interaction between teachers and students by creating groups on social media such as facebook, whatsapp, instagram, and others [15], as students, they are required to use social media to substitute schools face-to-face until the pandemic ends. likewise, with the business world, because of social restrictions to avoid crowds from government regulations, social media is considered very effective for market players to branding or promote their products to switch to e-commerce or online trading places that use gadgets and the internet. it can also help reduce spending [16]. to support the change of the offline market to e-commerce and help reduce the spread of the virus, the bank formalizes digital money as a means of online transactions without using banknotes or coins [17]. social media helps medical teams such as doctors expand their knowledge and experience by establishing facebook, instagram, and twitter communities, is especially helpful for young doctors [18]. currently, social media has become a part of people's lives of all ages, especially teenagers and adults. based on data reported from we are social, the highest number of social media users are teenagers 18-24 years with a classification of 14.8% for women and 15.9% for men, while among adults aged 25-34 years, 14.8% for women and 19.3% for men [6]. fig. 2. audience profile of social media [6] fig. 2 shows that social media has reached people of various ages, from 13 years to 65 years and even more. the success of social media in reaching users makes social media a good platform for promotion and expressing positive opinions that can influence the community as social media users. the first popular social media, facebook, is a social networking website where users can join communities such as cities, work, schools, and regions to connect and interact with other people [19], [20]. one of the most popular social media because it has a vast number of users and always increases every year, it is recorded that for more than 16 years since the founding of facebook, there are 3.3 billion registered users globally, while monthly active are 2.7 billion users. automatically makes it easy to connect everyone in the world to do business promotions [21]. several things can be done to increase business through facebook [19], [22]:  facebook as a market research media as a communication tool that involves many people. it is easy for business people to experiment with products before sell.  facebook for branding, generating traffic, and sales. business people are facilitated by the wide distribution of information for product promotion that will increase sales.  facebook can be used as a money-making media on the internet. features such as facebook groups, facebook pages, facebook ads, and facebook marketplace can be used to market and place for paid product advertisements. 66 bulletin of social informatics theory and application issn 2614-0047 vol. 5, no. 1, march 2021, pp. 63-70 rahmawati et.al (social media for energy saving campaigns) the second is instagram, a photo and video-sharing application that allows users to take photos, take videos, apply digital filters, and do other network activities [23], [24]. this free downloaded application is available for users of ios devices and android devices. to start using instagram, users must create account that contains user data and an email address to verify this data, after which instagram provides information on the use of the features in it before use. instagram has many features and will increase in the development of the application. the four popular features are detailed as follows.  photo and video sharing feature. the feature is prevalent in this application because users can share photos and videos in the gallery or take their pictures and upload using the internet. before uploading, users can edit photos or videos using instagram filters and create photos and videos directly with these instagram filters. photo or video posts can be given a caption in the text to provide information on the post. in addition, the user can tag other users by tagging the intended user.  comments and likes feature. this feature can be an indicator of whether a post is liked or not. the more likes on the post, this indicates that the post is very popular with many people. instagram does not provide a dislike feature on these posts, but it can be seen from the comments provided by other users  explore feature. users can see popular posts or many other users, especially their followers.  instagram story feature. post photos or videos with a short duration, which is a maximum of 15 seconds. the maximum of uploaded stories within 24 hours is 100 stories or 1,500 seconds per day. posts for each story will be deleted or cannot be viewed after 24 hours. twitter, is also one of facebook's biggest rivals since 2012, with 150 million active users and 1.3 billion registered accounts in 2020 [25]. the sending of messages known as "tweets" with a limited length of 140 characters identifies twitter from facebook. tweets display as a message stream [26], [27] on the user's page, viewed by the public or followers. users might follow other users to expand their social network if the public or followers retweet (repost tweets). twitter also allows users to communicate privately through the direct message function, which enables people to communicate with one another without being seen by the public. hashtags are always used on twitter to indicate what is trending at the time. most of twitter's features are similar to all of those seen on other social media platforms. finally, youtube is a video-sharing site created in february 2005. this site allows users to upload, watch, and share videos with other users. in general, videos on youtube users-created video clips from films, tv, and videos, although media companies such as cbs, bbc, vevo, hulu, and other organizations have used youtube as a news delivery partner [14], [28]. unregistered accounts can only view youtube videos and have no other access. a subscription feature to follow a channel (an account that has been registered and verified), where users can receive notifications of the latest videos or activities on the channel in a verified email. non-paying accounts have restricted download access, which depends on whether the channel that uploaded the video provides download access or not, while paid accounts can download without access from the provider's channel and can listen to them offline. every video that users view for free has ads in the minutes determined by youtube, while paid accounts are ad-free. ads will be a source of income for content creators who have a large audience. 3. method observations in this study through social media on government accounts and institutions' energysaving campaigns are the accounts of kementerian esdm and iesr indonesia. this observation on march 17, 2021. the social media accounts of kementerian esdm and iesr indonesia studied are instagram, youtube, facebook, and twitter. the data collected is the followers or subscribers, how long the account operates, instagram posts, the average instagram likes instagram comments, and other data needed to support the research. after data collection, the next stage is comparative analysis. this comparative analysis by comparing data in the form of the followers with the time the account operates. issn 2614-0047 bulletin of social informatics theory and application 67 vol. 5, no. 1, march 2021, pp. 63-70 rahmawati et.al (social media for energy saving campaigns) 4. results and discussion this research analyzes the social media accounts of the kementerian esdm and iesr indonesia in campaigning for energy savings in indonesia on facebook, instagram, twitter, and youtube. some social media users analyze which social media is more effective for energy-saving campaigns. the parameters used in this analysis are followers with time. the kementerian esdm account on facebook uploaded content or posts for the first time in february 2013 for 97 months. the facebook account had 171,623 followers in march 2021. the first post on instagram was in april 2016, in march 2021, with 425 thousand followers. twitter posts were first published in february 2013, and march 2021 (97 months) had 260.5 thousand followers. finally, on youtube, uploaded a video that started in july 2015, in march 2021 (69 months) has 21,200 subscribers. fig. 3. followers of the kementerian esdm and time to join social media the data in fig. 3 shows that the kementerian esdm account on instagram has the highest followers, in only 59 months, shorter than the kementerian esdm accounts on other social media. moreover, fig. 3 shows that the kementerian esdm account on instagram can grow faster than facebook, twitter, and youtube accounts. the development of the kementerian esdm account on instagram is influenced by several things, such as the type of content, posts, and social media users. the followers of the kementerian esdm on instagram come from the younger generation to adults. according to theory, the younger generation (aged 18-24 years) and adults (aged 25-34 years) are the highest social media users. then, the content presented on the kementerian esdm instagram account is needed by social media users, which is exciting and informative content. it is content about the information policy by the government in creating renewable energy, publication of events or seminars discussing energysaving, energy-saving campaigns, and energy innovation quizzes and challenges with prizes, among others. the content has been published in 2,494 posts and has received many responses from instagram users. the calculations with the engagement rate calculator for instagram, the kementerian esdm posts received an average of 883 likes and 60 comments by instagram users. this number is high enough for the number of posts which is quite a lot. move to the iesr indonesia account. on facebook, this account started uploading content in february 2018, and in march 2021, or 37 months, it had 473 followers. then on instagram, the first post was in september 2017. in march 2021 (42 months) iesr's followers were 5,344. on twitter, 68 bulletin of social informatics theory and application issn 2614-0047 vol. 5, no. 1, march 2021, pp. 63-70 rahmawati et.al (social media for energy saving campaigns) the iesr account started tweeting in september 2009. then in march 2021 (140 months), this account had 2,115 followers. iesr uploaded a video on youtube, in september 2010, in march 2021 (42 months), with as many as 1,280 subscribers. fig. 4. followers of iesr indonesia and time to join social media fig. 4 shows that iesr accounts on instagram also have the highest number of followers, achieved within 42 months, shorter than iesr accounts on facebook, twitter, and instagram, proves that iesr accounts on instagram can grow faster compared to accounts on other social media. in other words, instagram is considered more popular than facebook, twitter, and youtube. another study also mentioned that instagram is becoming the most popular social media platform. around one-third of online adults (32%) report using instagram–roughly the same share as in 2015, when 27% of online adults did so [29]. social media users, content, and the number of posts influence the development of this iesr instagram account, with 551 posts containing exciting and informative content. the latest information related to energy, energy-saving campaigns, challenges, seminar information that discusses energy, and others. this iesr account also has quite a lot of responses on its instagram account. based on calculations made through the engagement rate calculator for instagram, iesr posts get an average of 110 likes and three comments from instagram users. this figure is high enough for a 42-month-old institution account. instagram is a social media account that gets the highest number of followers. those followers are obtained in the shortest period. instagram, as a popular social media, is considered the most effective use for energy-saving campaigns. in addition to the behavior of organizations in conducting energyefficient campaigns, instagram's ability to improve user convenience also affects the effectiveness of this campaign through social media. instagram users are satisfied with instagram's features for expressing or presenting themselves [30], and users also spend longer on instagram than on twitter and facebook [31]. 5. conclusion the increasing need for electrical energy makes the resulting high carbon emissions, which impact global warming. therefore, through the kementerian esdm and the non-governmental organization iesr indonesia, the government is campaigning for energy savings through social media facebook, instagram, twitter, and youtube. the research results show that the most effective social media for energy-saving campaigns is instagram. the kementerian esdm and iesr indonesia instagram account have more followers in a short time compared to other social media platforms. there are issn 2614-0047 bulletin of social informatics theory and application 69 vol. 5, no. 1, march 2021, pp. 63-70 rahmawati et.al (social media for energy saving campaigns) several reasons why instagram is more effective for energy-saving campaigns; first, most instagram users are young to adults aged 18-34 years. another reason is the ease of use and attractive features of instagram that many users love. references [1] s. shafiee and e. topal, “when will fossil fuel reserves be diminished?,” energy policy, vol. 377, no. 1, pp. 181–189, 2009. [2] w. muljono, “electricity energy saving in indonesia households: a look at communication campaign programs and the importance of environmental attitudes to help address the electricity crisis,” environ. manag. sustain. dev., vol. 5, no. 2, p. 204, sep. 2016. [3] j. y. hui, “the internet in indonesia: development and impact of radical websites,” stud. confl. terror., vol. 33, no. 2, pp. 171–191, jan. 2010. [4] l. puspitasari and k. ishii, “digital divides and mobile internet in indonesia: impact of smartphones,” telemat. informatics, vol. 33, no. 2, pp. 472–483, may 2016. [5] s. kemp, “digital 2020: october global statshor,” datareportal, 2020. [online]. available: https://datareportal.com/reports/digital-2020-october-global-statshot. [accessed: 22-dec-2020]. [6] s. kemp, “digital in indonesia: all the statistics you need in 2021 — datareportal – global digital insights,” feb-2021. . [7] w. winarso, “technology, social media and behaviour of young generation in indonesia; a conseptual paper,” int. j. sci. technol. res., vol. 9, no. 4, pp. 986–989, 2020. [8] q. wang, w. chen, and y. liang, “the effects of social media on college students,” rsch5500research anal., p. 13, 2011. [9] a. k. m. chan, c. p. nickson, j. w. rudolph, a. lee, and g. m. joynt, “social media for rapid knowledge dissemination: early experience from the covid‐19 pandemic,” anaesthesia, vol. 75, no. 12, pp. 1579– 1582, dec. 2020. [10] e. weinstein, “adolescents’ differential responses to social media browsing: exploring causes and consequences for intervention,” comput. human behav., vol. 76, pp. 396–405, 2017. [11] g. shabir, y. m. y. hameed, g. safdar, and s. m. f. s. gilani, “the impact of social media on youth: a case study of bahawalpur city,” asian j. soc. sci. humanit., vol. 3, no. 4, 2014. [12] a. m. kaplan and m. haenlein, “users of the world, unite! the challenges and opportunities of social media,” bus. horiz., vol. 53, no. 1, pp. 59–68, 2010. [13] l. m. kruse, d. r. norris, and j. r. flinchum, “social media as a public sphere? politics on social media,” sociol. q., vol. 59, no. 1, pp. 62–84, 2018. [14] a. litvinenko, “youtube as alternative television in russia: political videos during the presidential election campaign 2018,” soc. media + soc., vol. 7, no. 1, p. 205630512098445, jan. 2021. [15] s. siddiqui and t. singh, “social media its impact with positive and negative aspects,” int. j. comput. appl. technol. res., vol. 5, no. 2, pp. 71–75, 2016. [16] j. phusalux, k. jermsittiparsert, c. saisama, and n. wongjunyav, “impact of social media marketing on consumer buying behaviour of youth,” int. j. psychosoc. rehabil., vol. 24, no. 7, pp. 1304–1331, 2020. [17] m. mukherjee and s. roy, “e-commerce and online payment in the modern era,” int. j. adv. res. comput. sci. softw. eng., vol. 7, no. 5, pp. 1–5, may 2017. [18] m. von muhlen and l. ohno-machado, “reviewing social media use by clinicians: table 1,” j. am. med. informatics assoc., vol. 19, no. 5, pp. 777–781, sep. 2012. [19] t. d. baruah, “effectiveness of social media as a tool of communication and its potential for t echnology enabled connections: a micro-level study,” int. j. sci. res. publ., vol. 2, no. 1, pp. 1–10, 2012. [20] a. przepiorka, a. błachnio, and j. f. díaz-morales, “problematic facebook use and procrastination,” comput. human behav., vol. 65, pp. 59–64, 2016. 70 bulletin of social informatics theory and application issn 2614-0047 vol. 5, no. 1, march 2021, pp. 63-70 rahmawati et.al (social media for energy saving campaigns) [21] w. akram and r. kumar, “a study on positive and negative effects of social media on society,” int. j. comput. sci. eng., vol. 5, no. 10, pp. 351–354, oct. 2017. [22] n. f. jumaat, n. ahmad, n. abu samah, z. m. ashari, d. f. ali, and a. h. abdullah, “facebook as a platform of social interactions for meaningful learning,” int. j. emerg. technol. learn., vol. 14, no. 4, 2019. [23] s. shuqair and p. cragg, “the immediate impact of instagram posts on changing the viewers’ perceptions towards travel destinations,” in 1st international conference on advanced research (icar-2017), 2017. [24] y. hu, l. manikonda, and s. kambhampati, “what we instagram : a first analysis of instagram photo content and user types,” in eighth international aaai conference on weblogs and social media, 2014. [25] b. dean, “how many people use twitter in 2021? [new twitter stats],” 2021. [online]. available: https://backlinko.com/twitter-users. [26] j. patihullah and e. winarko, “hate speech detection for indonesia tweets using word embedding and gated recurrent unit,” ijccs (indonesian j. comput. cybern. syst., vol. 13, no. 1, p. 43, jan. 2019. [27] g. jain, m. sharma, and b. agarwal, “spam detection on social media using semantic convolutional neural network,” int. j. knowl. discov. bioinforma., vol. 8, no. 1, pp. 12–26, jan. 2018. [28] k. lim, c. kilpatrick, j. storr, and h. seale, “exploring the use of entertainment-education youtube videos focused on infection prevention and control,” ajic am. j. infect. control, vol. 46, no. 11, pp. 1218– 1223, 2018. [29] s. greenwood, a. perrin, and m. duggan, “social media update 2016,” 2018. [30] b. kim and y. kim, “facebook versus instagram: how perceived gratifications and technological attributes are related to the change in social media usage,” soc. sci. j., vol. 56, no. 2, pp. 156–167, jun. 2019. [31] s. alhabash and m. ma, “a tale of four platforms: motivations and uses of facebook, twitter, instagram, and snapchat among college students?,” soc. media + soc., vol. 3, no. 1, 2017. indonesian sharia fintech services & social media usage bulletin of social informatics theory and application issn 2614-0047 vol. 5, no. 2, september 2021, pp. 97-106 97 https:doi.org/10.31763/businta.v5i2.456 indonesian sharia fintech services and social media usage leon a. abdillah a,1,*, yogi i. mukti b, desi puspita b, suhartini c a dept. of information systems universitas bina darma, jl. ahmad yani no.3, palembang 30264, indonesia b sekolah tinggi teknologi pagar alam, pagar alam, indonesia c stmik prabumulih, prabumulih, indonesia 1 leon.abdillah@yahoo.com* * corresponding author 1. introduction the development of the digital world based on information technology has changed many aspects of human life. several shifts in the business world towards the digital economy involve a lot of online or virtual activities. internet consumption during digital activities are shown by global internet protocol (ip) traffic, which serves as a proxy for data transfers, increased from approximately 100 gigabytes (gb) per day in 1992 to more than 45,000 gb per second in 2017. (fig. 1). and yet, the data-driven economy is still in its infancy; by 2022, global ip traffic is expected to surpass 150,700 gb per second [1], fuelled by more and more people coming online for the first time and by the expansion of the big data, cloud computing, iot, smartphones, and social media [2]. the world of trade has also undergone significant changes. with digital economy, the ecommerce trend is experiencing very rapid progress. with its rapid speed, limitless storage capacity, and numerous conveniences, information technology has become a prominent trend in virtually every part of life. numerous terminologies relating to information technology have been widely used. the phrase e-government is well-known in the sphere of government. in the realm of education, terminology such as e-learning, blended learning, and distance learning are frequently used. additionally, the business and trade sectors are riddled with recent developments such as ecommerce, online shopping, and marketplaces. in the financial sector, the term financial technology is now fashionable (fintech). indonesia as a country that is experiencing a transition a r t i c l e i n f o a b s t r a c t article history received july 15, 2021 revised august 2, 2021 accepted august 30, 2021 mobile and information technology have reconfigured the global towards a digital system including the digital economy and its payment technology through mobile applications and social media. covid-19 pandemic has triggered all parties to accelerate and expand it-based and digital services. the limited of studies related to islamic fintech in indonesia is the main reason for writing this article. continuing the previous research, it is known that indonesia in general has followed the era with many fintechs and startups growing. however, there are still very few sharia-based services. after conducting online surveys with a number of agencies such as ojk, fintech islami indonesia, it is known that 10 out of 121 fintechs operate or serve sharia schemes. they provide financial services for: smes and msmes (60.00%), general or consumptive financing (30.00%), and property (30.00%), followed by umrah and hajj (20.00%), education (10.00%), and health (10.00%). most of the indonesian sharia fintech (60%) already have mobile-based applications, both android and ios. the most widely used social media are instagram and facebook, in addition to twitter, linkedin, whatsapp, and youtube. in the future, it is hoped that more indonesian islamic fintechs include those serving other sectors such as agriculture, forestry, maritime affairs and fisheries, linked to crypto-currency, etc. this is an open access article under the cc–by-sa license. keywords digital economy e-commerce information technology islamic fintech social media http://creativecommons.org/licenses/by-sa/4.0/ http://creativecommons.org/licenses/by-sa/4.0/ 98 bulletin of social informatics theory and application issn 2614-0047 vol. 5, no. 2, september 2021, pp. 97-106 abdillah et.al (indonesian sharia fintech services and social media usage) from a developing country to a developed country is not left behind in implementing the use of fintech [3]–[5]. until 2020, there are at least 6 (six) startup companies [3], [6] that have entered the unicorn and decacorn level. one example of skills and knowledge currently trending in the business world is the emergence of new startups in the field: 1) transportation [7]: gojek and traveloka, 2) marketplaces [8], [9]: tokopedia, bukalapak, and jd.id, and 3) financial technology (fintech) [10], such as ovo [4], [11]. fig. 1. internet traffic growth between 2002-2022 (in gb). as world largest muslim country in the worlds, indonesia is one of the biggest online markets for internet-based business. until july 2020, more than 185 million internet users or equal to over 68 percent [12]. this figure is predicted to continue to increase, and by 2020 it is estimated that there will be 256.37 million internet users in indonesia. fig. 2. indonesia internet users 2015-2025 (in million). meanwhile, the collaboration of smartphones and social media has further advanced the global mobile digital world. 2020 is a year that will be remembered as the year of the global pandemic covid-19 [13]. the pandemic that began to spread from the chinese city of wuhan is set to become a pandemic in march 2020 [14]. in a very short time, covid-19 has infected almost all the inhabitants of the earth in all areas. universally, per 20 august 2021, there have been 209,876,613 confirmed cases of covid-19, including 4,400,284, reported to who [15]. covid-19 is indeed very fast spreading without knowing anyone. it can infect children, adults, as well as the elderly. even most horrendously, covid-19 also infected prince charles philip arthur george in britain (march 25, 2020) and the president of the united states, donald john trump (september 30, 2020). 100 2000 46000 150700 0 50000 100000 150000 200000 2002 2007 2017 2022 internet traffic (gb) issn 2614-0047 bulletin of social informatics theory and application 99 vol. 5, no. 2, september 2021, pp. 97-106 abdillah et.al (indonesian sharia fintech services and social media usage) table 1 presents the regions most affected by covid-19 including americas, europe, southeast asia, eastern mediterranean, western pacific, and africa. countries with more than ten million cases include united states of america, india, and brazil (20 august 2021). the global pandemic covid-19 has forced all parties to adhere to strict health protocols, such as maintaining distance, minimizing crowds, reducing contact activity, maintain health and immunity, etc. table.1 top 12 countries, areas or territories of covid-19 cases (21 august 2021) rank country country cases 1 usa america 36,547,639 2 india asia 32,250,679 3 brazil america 20,364,099 4 russia europe/asia 6,642,559 5 france europe 6,317,130 6 uk europe 6,295,617 7 turkey asia/europe 6,096,816 8 argentina america 5,084,635 9 colombia america 4,867,761 10 spain europe 4,719,266 11 iran asia 4,467,015 12 italy europe 4,444,338 13 indonesia asia 3,892,479 14 germany europe 3,827,051 15 mexico america 3,101,266 the phenomenon of disruptive innovation has also occurred in the financial services industry, which has disrupted the landscape of the financial services industry globally, starting from the structure of the industry, its intermediation technology, to its marketing model to consumers [16]. all these changes led to the emergence of a new phenomenon called financial technology (fintech). the following will describe a number of studies related to fintech in indonesia. the role of fintech in improving financial inclusion in indonesia msmes [17]. fintech implementation constraints in improving financial inclusion in msmes in indonesia, as follow: 1) infrastructure, 2) human resources (hr), 3) legislation, and 4) lack of financial literacy. the role of islamic financial technology (fintech) start-up in improving financial inclusion in indonesia case study of angsur [18]. islamic fintech start-up like “angsur” becomes an alternative to finance undergraduate students’ e-commerce purchases. they concluded that start-up will act as complement for traditional bank services. islamic financial technology development in indonesia is divided into four categories, namely: 1) fintech function perspective, 2) islamic fintech problems, 3) islamic fintech strategy development, and 4) islamic fintech’s ecosystems or actors involved indonesia. last but not least, the author himself has also conducted a study related to the overall overview of finttech in indonesia [11]. the author will continue his studies with a focus on islamic indonesia fintech and the financial services it offers. based on those previous studies, there is minimum information related to the landscape of islamic indonesia fintech. this study will cover the overall services of indonesia islamic fintech from several aspects. this study aims to provide the landscape of islamic fintech applications in indonesia in general. especially, the types of services provided by islamic’s fintech applications in indonesia. indonesia as a country with the largest muslim population in the world should pay more attention to the development of digital economies and sharia fintech. 100 bulletin of social informatics theory and application issn 2614-0047 vol. 5, no. 2, september 2021, pp. 97-106 abdillah et.al (indonesian sharia fintech services and social media usage) 2. method in this methodology section, the author will explain the source of the data, as well as the method of approach used. this research employs a combination of quantitative and qualitative methods. the author used a quantitative approach to compile data from past ojk reports. the data is next evaluated qualitatively. 2.1. data initial data in this study were taken from the dissemination of international conferences in 2019 [11]. then the data is updated according to data from the latest ojk. as of 27 july 2021 [19], there have been 121 registered and licensed fintech lending operators at the ojk. the data announced is related to the platform name, website, company name, registered certificate, date, type of business, and operating system. 2.2. approaches the approach used in this research is a hybrid that combines the quantitative and qualitative actions. in quantitative approach, author gathered information from previous report of ojk per 27 july 2021. the data then convert into spreadsheet for further analyze and calculation. the information is then analyzed using a qualitative approach. author adds some additional resources by browsing the fintech websites to enrich the analysis and discussion. 2.3. research objects fintech is an acronym for financial technology, which refers to the adoption of information technology advancements in the financial services business. all financial activities were digitalized during the fintech era using internet-based transaction modalities and are now accessible via smart devices such as smartphones. on 11 october 2018, the imf and world bank launched the bali fintech agenda [20], [21], a set of 12 policy elements aimed at helping member countries to capitalize on the benefits and opportunities of rapid advances in financial technology that transform the provision of banking services, while at the same time managing inherent risks. ”the bali fintech agenda” consists of 12 points. fintech is rising at a quick pace, as are startups or information technology-based enterprises that can trade directly with customers or suppliers without using traditional banking institutions. fintech development in indonesia is still in its infancy [22]. in southeast asia itself, indonesia is one of the countries whose fintech market is growing rapidly. fig. 3. growth in indonesia's fintech transaction value (in million us$). there are five types of fintech transactions that are developing in indonesia [23], namely: 1) payment, settlement, and clearing, 2) market aggregator, 3) risk and investment management, 4) crowd-funding and peer to peer (p2p) lending, and 5) other financial services. the projected growth in the value of indonesia's fintech transactions continues to experience significant issn 2614-0047 bulletin of social informatics theory and application 101 vol. 5, no. 2, september 2021, pp. 97-106 abdillah et.al (indonesian sharia fintech services and social media usage) increases. pada juni 2020 [24] the value of the “digital payments” transaction reached us $ 35.513 million. in 2024, this value is predicted to increase to more than 100% or us $ 63,690 million. as of august 14, 2020 there are 157 fintech operators registered or licensed in indonesia [25]. in the future, it is predicted that more variants of fintech-based financial services will emerge. the local fintechs are pushing quickly to pursue profitable opportunities [26]. 3. result and discussion 3.1. overall fintech types all fintech companies registered or licensed in indonesia as of july 27, 2021 totaled 121. this number decreased by 37 fintechs from the number of fintechs as of august 2020, or an decrease of 13.3%. of these, 111 fintechs operate in full conventional types of business or equivalent to 91.7%. fig. 4 presents that there is only one fintech that operates both conventionally and sharia. while the number of fintech operating in full sharia is nine or equivalent to 7.4% (7% rounded) and if added with hybrid fintech, there are 10 total fintechs operating in sharia or equal to 8.20% (8% rounded). fig. 4. indonesian fintech business types (in percentage). 3.2. indonesia islamic fintech indonesia fintech companies that operate sharia or provide sharia services only amount to 10 or 8.00 percent. among the sharia fintech, there are six android-based services, four of which provide ios-based services, while three don't have mobile-based services or the equivalent of 30.00%. these data indicate that indonesian sharia fintech is still not optimally utilizing information technology trends yet. table.2 islamic lending company list fintech sharia in ojk [19] no platforms company operating systems 1 investree pt investree radhika jaya android & ios 2 ammana.id pt ammana fintek syariah android & ios 3 alami pt alami fintek sharia android & ios 4 dana syariah pt dana syariah indonesia android & ios 5 duha syariah pt duha madani syariah android 6 qazwa.id pt qazwa mitra hasanah 7 ethis pt ethis fintek indonesia 8 kapitalboost pt kapital boost indonesia 9 papitupi syariah pt piranti alphabet perkasa android 10 finteck syariah pt berkah finteck syariah android sharia 7% conventional 92% mixed 1% indonesian fintech business types 102 bulletin of social informatics theory and application issn 2614-0047 vol. 5, no. 2, september 2021, pp. 97-106 abdillah et.al (indonesian sharia fintech services and social media usage) 3.3. indonesia islamic fintech services indonesia fintech companies that operate sharia or provide sharia services only fintech islamic indonesia has provided services that are quite evenly distributed in a number of fields such as: smes and msmes, general or consumptive financing, umrah and hajj, property, education and health which describes in table 3. table.3 indonesia islamic fintech services no platforms services 1 investree small and medium enterprises (smes) 2 ammana.id micro, small and medium enterprises (msmes) 3 alami micro, small and medium enterprises (msmes) 4 dana syariah property project 5 duha syariah consumptive financing (purchase of goods / services), halal umrah travel, and productive financing according to sharia principles. 6 qazwa.id small and medium enterprises (smes) 7 ethis property project 8 kapitalboost small and medium enterprises (smes) 9 papitupi syariah employees (company employees, members of employee cooperatives and company employees) 10 finteck syariah murabaha financing (general), renting, ijarah financing is financing for the payment of tuition fees, hospital fees, umrah travel expenses in accordance with sharia principles. among the 10 (ten) of indonesian islamic fintechs, it is known that they serve financial services for the following purposes: • smes and msmes (60.00%). • general or consumptive financing (30.00%) • umrah and hajj (20.00%) • property (30.00%) • education (10.00%) • health (10.00%). fig. 5. indonesia islamic fintech services (in percentage). 0 10 20 30 40 50 60 smes & msmes property umrah & hajj general funding education health issn 2614-0047 bulletin of social informatics theory and application 103 vol. 5, no. 2, september 2021, pp. 97-106 abdillah et.al (indonesian sharia fintech services and social media usage) 3.4. indonesia islamic fintech social media social media [27] is the most effective medium in conveying information quickly and can be accessed by all ages anytime and anywhere. no wonder social media is one of the latest information technology trends today. a number of indonesian sharia fintechs also use social media as digital profiles in cyberspace. among the ten of indonesian islamic fintechs, it is known that they use social media as follow: • facebook (80.00%). • instagram (90.00%). • linkedin (50.00%) • whatsapp (50.00%) • twitter (70.00%). • youtube (40.00%). fig. 6. indonesia islamic fintech sociel media usage (in percentage). 3.5. discussion the discussion in this article is based on the results presented or presented in the previous section. there are 4 (four) main discussion related to: 1) fintech business types, 2) fintech application operating systems, 3) fintech services, and 4) fintech social media usage. along with the proliferation of virtual business models in cyberspace, it encourages all related parties (stakeholders) to also implement an electronic payment system. the result from fig. 4 represents an irony for indonesia as a country with a muslim majority. even in the world, indonesia is the largest muslim country. indonesia only owns 8% of fintech which operates in a sharia manner. business mode has also experienced a drastic shift towards electronic transaction mode, both using the web and via smartphone gadget [4]. business systems are increasingly using the term ecommerce or m-commerce, which takes place virtually through a number of information technology-based applications. the results of the query presented in table 2 illustrates that islamic fintech indonesia has not all taken advantage of information technology trends, especially services that use mobile or smartphones, there are still 30,00% of islamic fintech indonesia who have not provided mobile or smartphone-based fintech services. for services by sector, indonesian sharia fintech is still focused on serving the sme and msme sectors (60.00%), while sectors related to education and health are still very few (10.00% each). the development paradigm has shifted from initially centered on economic growth to development that 0,00 20,00 40,00 60,00 80,00 100,00 facebook instagram linkedin twitter whatsapp youtube 104 bulletin of social informatics theory and application issn 2614-0047 vol. 5, no. 2, september 2021, pp. 97-106 abdillah et.al (indonesian sharia fintech services and social media usage) is human centered through education [28] and health [29]. the world of education in indonesia in the last decade has received more attention from the government with a fairly large allocation of funds from the state budget. meanwhile, health sector spending has also increased sharply since the covid-19 pandemic hit the world and indonesia. the power of social media is still an attraction for many agencies to convey information. the presence of social media [30] turned out to have an impact on changing the way of communicating from conventional to modern and all-digital, but also caused the ongoing communication to be more effective. social networking media offers many business advantages for companies and organizations [27]. facebook and instagram are social media platforms that are widely used by indonesian sharia fintech. instagram is used by 90.00% of indonesian sharia fintech followed by facebook by 80.00%. 4. conclusion the development of indonesian fintech in general has been quite encouraging. the existence of sharia fintech is currently an option for economic actors. the number of fintech as one of the pillars of the digital economy continues to experience good growth. however, sharia fintech services still need serious attention from the government and related parties. likewise, islamic fintech services that use smartphones need to be maximally pushed. even though the covid-19 vaccine will be discovered, it seems that the behavior that took place during the new normal period will continue to be a habit for most people. digital transaction modes will develop rapidly in line with the increasingly massive advances in information technology. based on the study, author encourages legal indonesia authority to force the progression of fintechbased applications in indonesia. currently, indonesian sharia fntech is dominated by services for smes and msmes, the android operating system for mobile-based application services, and utilizing instagram and facebook on social media. in the future, the existence of fintech-based financial applications can contribute to the lucrative growth and welfare of the economy for indonesia's digital economy. it is hoped that this type of financing can also enter indonesian specific sectors such as agriculture, fisheries, forestry, etc. as the largest muslim population in the world, the indonesian government should focus more on encouraging the growth and development of fintech companies that operate in sharia. the government can also benchmark a number of countries with more advanced islamic fintech, both in the asean region or on a global scale such as the organization of islamic cooperation (oic). references [1] united nations, “digital economy report 2019,” united nations conference on trade and development (unctad), 2019. [online]. available: https://unctad.org/en/publicationslibrary/der2019_overview_en.pdf. [2] j. valacich and c. schneider, information systems today : managing in the digital world, 8th ed. new york, usa: pearson education, inc., 2018. [3] l. a. abdillah, “fintech e-commerce payment application user experience analysis during covid19 pandemic,” sci. j. informatics, vol. 7, no. 2, pp. 265–278, 2020. [4] l. a. abdillah, “financial technology (fintech),” in tren teknologi masa depan (future technology trends), medan: yayasan kita menulis, 2020. [5] a. riyanto, i. primiana, yunizar, and y. azis, “disruptive technology: the phenomenon of fintech towards conventional banking in indonesia,” in iop conference series: materials science and engineering, 2018, vol. 407, no. 1. [6] a. ghina and i. sinaryanti, “the learning evaluation of business incubator’s role in developing technology-based startups at technology business incubator,” asian j. technol. manag., vol. 14, no. 1, pp. 35–56, 2021. [7] v. briliana, t. deitiana, and w. ruswidiono, “how millennial travelers are forcing indonesian tourism to go digital,” int. j. business, econ. law, vol. 19, no. 2, pp. 1–7, 2019. issn 2614-0047 bulletin of social informatics theory and application 105 vol. 5, no. 2, september 2021, pp. 97-106 abdillah et.al (indonesian sharia fintech services and social media usage) [8] h. t. sugiharto, s. r. zein, e. b. setiawan, and l. lesmini, “increasing purchase intention through delivery and brand reputation in e-commerce,” adv. transp. logist. res., vol. 2, pp. 51–58, 2019. [9] a. s. nisafani, a. wibisono, and m. h. t. revaldo, “analyzing the effectiveness of public emarketplaces for selling apparel products in indonesia,” in procedia computer science, 2017, vol. 124, pp. 274–279. [10] n. iman, “traditional banks against fintech startups: a field investigation of a regional bank in indonesia,” banks bank syst., vol. 14, no. 3, pp. 20–33, 2019. [11] l. a. abdillah, “an overview of indonesian fintech application,” 1st int. conf. commun. inf. technol. youth study, pp. 8–16, 2019. [12] j. müller, “number of internet users in indonesia from 2015 to 2025 (in millions),” 2020. [online]. available: https://www.statista.com/statistics/254456/number-of-internet-users-in-indonesia/. [accessed: 11-sep-2020]. [13] d. zhang, m. hu, and q. ji, “financial markets under the global pandemic of covid-19,” financ. res. lett., vol. 36, no. january, 2020. [14] who, “who director-general’s opening remarks at the media briefing on covid-19 11 march 2020,” 2020. [online]. available: https://www.who.int/dg/speeches/detail/who-director-general-sopening-remarks-at-the-media-briefing-on-covid-19---11-march-2020. [15] who, “who coronavirus (covid-19) dashboard,” 2021. [online]. available: https://covid19.who.int/. [16] m. d. hadad, “financial technology (fintech) di indonesia.” otoritas jasa keuangan (ojk), jakarta, 2017. [17] f. f. r. pambudianti, b. purwanto, and t. n. a. maulana, “the implementation of fintech: efficiency of msmes loans distribution and users’ financial inclusion index,” j. keuang. dan perbank., vol. 24, no. 1, pp. 68–82, 2020. [18] h. b. firmansyah and a. l. ramdani, “the role of islamic financial technology (fintech) start-up in improving financial inclusion in indonesia case: angsur,” in 3the rd international conference of integrated intellectual community (iconic2018), 2018. [19] ojk, “perusahaan fintech lending berizin dan terdaftar di ojk per 27 juli 2021,” 2021. [online]. available: https://www.ojk.go.id/id/kanal/iknb/financial-technology/documents/penyelenggara fintech lending terdaftar dan berizin di ojk per 27 juli 2021.pdf. [20] the world bank group, “the bali fintech agenda: a blueprint for successfully harnessing fintech’s opportunities,” the world bank group, imf, 2018. [online]. available: https://www.worldbank.org/en/news/press-release/2018/10/11/bali-fintech-agenda-a-blueprint-forsuccessfully-harnessing-fintechs-opportunities. [21] international monetary fund, “the bali fintech agenda: a blueprint for successfully harnessing fintech’s opportunities,” 2018. [online]. available: https://www.imf.org/en/publications/policypapers/issues/2018/10/11/pp101118-bali-fintech-agenda. [22] a. barata, “strengthening national economic growth and equitable income through sharia digital economy in indonesia,” j. islam. monet. econ. financ., vol. 5, no. 1, pp. 145–168, 2019. [23] bank indonesia, “peraturan anggota dewan gubernur nomor 19/14/padg/2017 tentang ruang uji coba terbatas (regulatory sandbox) teknologi finansial.” bank indonesia, jakarta, 2017. [24] statista, “fintech (indonesia),” 2020. [online]. available: https://www.statista.com/outlook/295/120/fintech/indonesia. [25] otoritas jasa keuangan, “penyelenggara fintech lending terdaftar dan berizin di ojk per 14 agustus 2020,” 2020. [online]. available: https://www.ojk.go.id/id/kanal/iknb/financialtechnology/documents/penyelenggara terdaftar_berizin 14 agustus 2020.pdf. [accessed: 07-sep-2020]. [26] k. davis, r. maddock, and m. foo, “catching-up with indonesia ’ s fintech industry,” law financ. mark. rev., vol. 11, no. 1, pp. 1–24, 2017. 106 bulletin of social informatics theory and application issn 2614-0047 vol. 5, no. 2, september 2021, pp. 97-106 abdillah et.al (indonesian sharia fintech services and social media usage) [27] d. r. rahadi and l. a. abdillah, “the utilization of social networking as promotion media (case study: handicraft business in palembang),” in seminar nasional sistem informasi indonesia (sesindo2013), 2013. [28] e. a. hanushek and l. woßmann, “education and economic growth,” in economics of education, d. j. brewer and p. j. mcewan, eds. san diego, usa: academic press (elsevier), 2010. [29] r. j. barro, “health and economic growth,” ann. econ. financ., vol. 14, no. 2 a, pp. 305–342, 2013. [30] g. meikle, social media : communication, sharing and visibility. new york, usa: routledge (taylor & francis group), 2016. bulletin of social informatics theory and application issn 2614-0047 vol. 4, no. 2, september 2020, pp. 59-69 59 https:doi.org/10.31763/businta.v4i2.256 emotions in texts leeveshkumar pokhun 1, m yasser chuttur 2,* department of software and information systems, university of mauritius, moka, mauritius 1 leevesh.pokhun1@umail.uom.ac.mu; 2 y.chuttur@uom.ac.mu* * corresponding author 1. introduction user-generated content on social media networks and the web is a common practice nowadays [1]. users, who were once consumers of information, are now major information contributors [2]. this shift from information consumers to information producers has provided an abundance of data, both structured and unstructured, that can be collected, processed, and analysed to yield useful information. the observed increase in online user content is explained primarily by the latest technology advancement and wide adoption of web 2.0, whereby expressing one's emotions or feelings over communication networks has become much simpler and easier [3]. for instance, using short text messages such as lol for expressing 'laugh all loud' or 'lots of love', people are no longer bound to typing full texts when communicating. also, with the introduction of emoticons and multimodal content (text with image, video, audio, animated images), users can quickly and explicitly convey their feelings without having to type long descriptive messages [4], [5]. currently, most, if not all, online messages are written in short text format and contain some form of emoticons. consequently, classical methods of text analysis, such as sentiment analysis, are not sufficient in obtaining a correct interpretation of the meaning conveyed in each message. in general, sentiment analysis, also known as opinion mining, focuses on classifying text into three main categories namely positive, negative, and neutral. those three categories are useful in various applications [6] but will, however, not provide accurate details regarding any emotion expressed in a message. for instance, sentiment analysis cannot perceive emotions such as joy, fear, surprise, guilt etc., which are essential to understanding the actual feeling expressed by a user [7]. for a more effective interpretation of a message, it is not only essential to identify the contents and context of the message, but it is also crucial to detect the emotion expressed within the message [8]. emotion analysis, in this sense, seeks to capture the emotion expressed in a message [9]. emotions by nature, however, are very complex to identify, and several techniques have been proposed for emotion analysis. a r t i c l e i n f o a b s t r a c t article history received july 21, 2020 revised august 2, 2020 accepted august 30, 2020 several studies have used different techniques to detect and identify emotions expressed in various sets of texts corpora. in this paper, we review different emotion models, emotion datasets and the corresponding techniques used for emotion analysis in past studies. we observe that researchers have been using a wide variety of techniques to detect emotions in texts and that there is currently no gold standard on which dataset or which emotion model to use. consequently, although the field of emotion analysis has gained much momentum in previous years, there seems to be little progress into relevant research with findings that may be useful in real world applications. from our analysis and findings, we urge researchers to consider the development of datasets, evaluation benchmarks and a common platform for sharing achievements in emotion analysis to see further development in the field. this is an open access article under the cc–by-sa license. keywords emotions analysis emotion models emotion dataset http://creativecommons.org/licenses/by-sa/4.0/ http://creativecommons.org/licenses/by-sa/4.0/ 60 bulletin of social informatics theory and application issn 2614-0047 vol. 4, no. 2, september 2020, pp. 59-69 pokhun & chuttur (analyzing emotions in texts) in this paper, we present the different achievements and challenges in emotion analysis. the rest of the paper is organized as follows: section 2 introduces the concept of emotion along with considerations to take when detecting emotion. different applications of emotion analysis are presented in section 3. section 4 describes some popular emotion models used to classify emotions, followed by section 5, which gives an overview of datasets available for emotion analysis. section 6 presents some of the techniques used for emotion analysis as found in past studies, and section 7 highlights some noteworthy findings concerning the state-of-the-art techniques for emotion analysis. we conclude the paper with some future research directions. 2. method emotion is a complex state of mind, which represents the feeling of a person and which can influence both the physical and psychological behaviour of that individual [10]. happiness, sadness, love, and hatred are some examples of emotions expressed by human beings. emotions can be involved in that emotion, rather than being singular, which can consist of a cluster of emotions. it is also common for emotions to vary according to a person's personality traits and the corresponding context and environment [11]. in emotion analysis from the text, the aim is to correctly identify the actual state of mind of an individual when the written message was sent. in general, however, it is very challenging to detect emotions from texts for several reasons. firstly, text messages can be highly unstructured and may not follow strict grammatical or syntactic rules such that a general approach for text processing cannot be applied. for instance, messages consisting of texts written as "carooooooooooooooooooooooo im going to kiiiillll uuuuuuuuuuuuuuuuu... n u know why but i still love u (a little bit:p) don’t worry :p mwahhh" are very hard to process [12]. secondly, as [13] explained, context plays a vital role in emotion detection as evidenced by the following sentence, "the performers were greeted with joyless cheer". here, the emotion factor of the word "cheer' is influenced by the word "joyless" which transforms the emotion expressed by the phrase "joyless cheer" to sadness rather than joy. thirdly, sarcasm/metaphors, when expressed in messages, add further complexity when detecting emotion in text. for example, the sentence "yes. i guess your amazing delivery service has not yet arrived" is clearly not expressing the feeling of a delighted customer [14]. similarly, some expressions of anger emotion class are metaphorical, that is, they cannot be evaluated by the literal meaning of the expression (e.g. 'she is boiling with anger' or 'don’t snarl at me’) [15]. fourthly, expressions may constitute of multiple emotions, which may vary according to culture. for instance, according to [16], emotions are organized differently for each culture. in the chinese culture, we can identify seven basic emotions: happiness, anger, anxiety, thoughtfulness, sadness, fear, surprise whereas in the indian culture, we find eight core emotions, namely, erotic, mirth, sorrow, anger, energy, fear, disgust, astonishment. and finally, there are some messages that do use words at all. rather, emotion expression is expressed via emoticons. e.g. i still have christmas shopping to do [17]. 2.1. applications of emotion analysis backed by the capabilities of the social web, emotion analysis has led to the creation or improvement of various applications and services [18]. for instance, by considering the emotions expressed during the navigation of websites, web designers obtain useful insights that help them design websites for improved user experience [19]. in the marketing field, customer emotional responses to promotional video campaigns or ads are used as a critical factor to determine strategies that can drive sales figures [20], [21]. in e-learning, automatic emotion recognition has been used to discover the emotional state of the learner to adapt to the learner’s ability and provide an optimized learning experience [22], [23]. psychologists can further use emotion analysis to detect topic sensitivity from facial emotion recognition and subtle voice changes. emotion analysis can also help identify key emotional point that may require more in-depth investigations [24]. the application of emotion analysis also extends to social media. for instance, cyber-bullying incidents can be classified by detecting the emotional issn 2614-0047 bulletin of social informatics theory and application 61 vol. 4, no. 2, september 2020, pp. 59-69 pokhun & chuttur (analyzing emotions in texts) state of users [25] and in customer service, tweets can be ranked based on the emotion expressed, and reply to customers can be prioritized accordingly, hence increasing customer satisfaction [14]. 1) emotion models emotion models set forth the different criteria to make various emotions expressed by an individual measurable and distinguishable [26]. five emotion models, namely, discrete, dimensional, componential, circuit and appraisal model have been reported in previous studies [27]. in this section a brief overview on each model is provided. 2) discrete model discrete models identify a set of fundamental or core emotions that are expressed by every person, regardless of religion, culture, or ethnicity [28]. in ekman’s basic emotion theory, six basic emotions identified are: anger, disgust, fear, happiness, sadness, and surprise. extended ekman’s basic list by taking into consideration neuropsychological aspects to propose ten core emotions: interest, joy, surprise, sadness, anger, disgust, contempt, fear, shame, and guilt [29]. james russell [30], however, critiqued discrete models as they do not necessary provide accurate representations of an individual’s feeling. for instance, fear is a basic emotion, but “fear of getting wet” cannot be considered equal to “fear of bear”. “fear of getting wet” will most likely be representing anger and “fear of bear” will be more representative of actual fear. 3) dimensional model in contrast to the discrete emotion model, dimensional models map emotions into a continuous one-dimensional or multi-dimensional space. a one-dimensional model consists of a single dimension, and multi-dimensional may have two or more dimensions [27]. dimension models represent different affective states as the point in a dimensional space with coordinates ranging from -1 to 1 in some cases, and in other cases, it can extend to higher ranges such as -100 to 100 [31]. the pleasure arousal and dominance (pad) emotional state model is an implementation of the dimensional model, which was introduced by [30]. to measure emotional states, pad makes use of the following three dimensions: pleasure, for a degree of valence, arousal, indicating the level of affective activation and dominance for the degree of power or control [31]. russel, for instance, put forth the circumplex model of affect, which states that any emotion can fit within two continuous dimensions of valence and arousal [30]. the valence (pleasure) dimension contrasts between positive and negative emotions, which can be evaluated on different axes with values nearer to zero, indicating neutral emotional states. arousal (activation) dimension contrasts between active and passive emotional states, with a value of zero indicating intermediate states. however, the dimensional model of effect has been criticized for three main reasons [27]. firstly, it is not natural for the human representation of emotions as people do not think about emotions as points. secondly, it is hard to represent ambivalent emotional states, and finally, some emotions such as fear and anger are indistinguishable, as these emotions both lie in the same quadrant of high arousal and negative valence 4) componential model componential models consider that emotions are manifested by cerebral assessment of events and the sequence of reactions in different physiological responses, facial expressions, gestures, stance and affect [30]. ortony, clore and collin (occ) in 1988 defined a hierarchy of twenty-two emotion types in their occ model to represent all possible affective states, which might be experienced by an individual [32]. in the occ model, each emotion is a result of an affective reaction, which occurs after evaluating the aspects of a situation as positive (beneficial) or negative (harmful). the reactions are consequences of events, actions of agents, and aspects of objects [31]. psychologist robert plutchik recognized that there are eight core emotions and that all other emotions grow from those core emotions. in plutchik’s psych evolutionary theory of emotion, he suggests that there are eight primary emotions, namely anger, fear, sadness, disgust, surprise, anticipation, trust, and joy and that various combinations of the eight basic emotions will form other emotions. for instance, joy and surprise can be combined to result into delight. the model is also known as plutchik wheel of emotions [33] 62 bulletin of social informatics theory and application issn 2614-0047 vol. 4, no. 2, september 2020, pp. 59-69 pokhun & chuttur (analyzing emotions in texts) [31] argued that complex models like the one proposed by [34] are rarely used in practical applications and the occ model is used for emotion state prediction. furthermore, in some cases, emotion recognition and prediction capabilities are merged to obtain a more precise emotional state. 5) circuit model the circuit model, also known as anatomical model, was proposed by neuroscientist, joseph e. ledoux [35]. ledoux theorised that individual emotion can be processed in dissimilar, distinct neural circuits and essential tasks or systems are linked to those circuits. neuropsychologists posit that evolutionary neural circuits in the brain construct elemental emotions and their distinctions. they discovered numerous important primitive emotions such as rage, fear, expectancy, and panic. ledoux further insisted that language may not be enough to distinguish among emotions as there exists diverse circuits to compute dissimilar emotions in our brain, and which may not be necessary measurable or translated in a language format. 6) appraisal models smith and lazarus proposed the appraisal model, which suggests that emotions emerge from the constantly changing communication of appraisal and coping processes that rely on the agent’s depiction of its relationship with the environment [36]. the model also states that each environment relationship is assessed with the help of a defined number of appraisal dimensions or variables, and connections among environmental and affect changes. appraisal variables are based on "if-then" rules, i.e. on relevance, implications, coping potential, and normative significance. appraisal model is the leading theory related to human emotion in computer science, specifically in symbolic artificial intelligence (ai) systems. 2.2 datasets available for emotion analysis emotion analysis is a relatively new field in computational linguistic [37], [38]. consequently, quality datasets expressing all or most measurable emotions do not exist. in this section, we discuss some datasets, which have been used for emotion analysis. the international survey on emotion antecedents and reactions (isear) was a project lead by [39]. the authors constructed a dataset with seven out of ten basic emotions, joy, fear, anger, sadness, disgust, shame, and guilt based on a study in 37 countries. despite its size, isear only comprises of a personal reaction toward an event, which triggered an emotional response. for instance, “a girl entered in the division where i work and greeted everybody but not me”, is an extract from the dataset which expresses anger. however, this form of the dialog is not expected in a conversation. the isear dataset was built with the intention of sentence-level emotion recognition and not for conversation level analysis. klimt and yang created the enron email dataset, which consists of emails collected from one hundred and fifty-eight users from enron senior management office [40]. the original dataset only contained emails and was not annotated. it was up to the researchers to annotate the mails. in 2017, charlie oxborough released sentence-level annotations to classify the mail dataset into two groups, namely negative and positive mails. semeval 2007 is another dataset created by strapparava and mihalcea [41]. semeval2007 consists of news headlines extracted from news web sites like google news, cnn, and newspapers. collected news is classified under ekman six basic emotions, anger, disgust, fear, joy, sadness, surprise with a valence indicating its sentence polarity. however, headlines are quite straightforward and enclosed such as, “trucks swallowed in subway collapse.” twitter is a popular social network where people share or express their opinions. mohammad and bravo-marquez collected tweets and manually annotated the data under four discrete emotions, anger, fear, joy, and sadness for the wassa-2017 dataset [42]. in another attempt to create a twitter dataset, figure eight collected tweets that were classified under thirteen emotion labels: anger, enthusiasm, fun, happiness, hate, neutral, sadness, surprise, worry, love, boredom, relief, and empty. the dataset contains forty thousand tweets. however, the emotions used in the dataset do not match any of the popular emotion models discussed previously. it is generally observed that labeled emotion datasets have been designed to address a specific text emotion classification problem. the main problem with currently available datasets is that the issn 2614-0047 bulletin of social informatics theory and application 63 vol. 4, no. 2, september 2020, pp. 59-69 pokhun & chuttur (analyzing emotions in texts) emotions tagged belong to discrete human emotions. authors attempting to resolve multi class emotion issues need to build their own or enhance existing dataset to suit their needs. 2.3 emotion analysis techniques anusha and sandhya proposed a supervised learning system, which makes use of natural language processing (nlp), naïve bayes multinomial (nbm) and support vector machines (svm) algorithms to classify text data into emotions [37]. the isear dataset was used for training on five emotions classes: anger, disgust, fear, joy, and sadness as per the ekman emotion model. a 10-fold cross-validation was performed, and it was found that svm yielded an average f1 of 63.1 with kappa statistics of 0.49 whereas nbm yielded an average f1 of 52.9 with kappa statistics of 0.43. udochukwu and he proposed a rule-based approach toward implicit emotion detection using five emotion classes in the occ model [43]. the approach was tested on three datasets: isear, semeval2007 and alm. two baseline models were crafted to test the rule-based approach. the first one is a lexicon matching technique, which uses nrc emotion lexicon for sentence-level emotion detection, and the second one is a supervised naive bayes (nb) classifier. the performance was evaluated using f-measure in five-fold cross-validation. the rule-base system was unable to classify any “fear” affect bearing sentences on the three datasets. however, its surpassed nb by 9.5% on alm dataset and achieved almost equivalent results to nb for the isear and semeval2007 datasets. perikos and hatzilygeroudis, attempted emotion recognition from text using an ensemble classifier combining naïve bayes (nb), maximum entropy (me), and knowledge-based tools (kbtool) [44]. the ensemble classifier is based on a voting function to make classification verdict based on the output of each base classifier. the authors argued that in comparison to nb, me provides additional features, such as unigrams and bigrams, which can be added without risk of overlapping. the advantages of me also extend to better performance in multiple natural language processing tasks. however, it necessitates more time to be trained. the kbtool performs deeper sentence analysis by storing affect bearing words and using wordnet affect. the model was trained on the isear dataset on seven discrete emotions while russell’s two-dimensional model of affect was used to detect emotion polarity. when tested on a manually crafted dataset, which consists of tweets, news headlines and articles, an accuracy of 83% to 89%, precision of 85% to 90%, sensitivity of 79% to 91% and specificity of 86% to 89% were obtained. yasmina et al. used point wise mutual information (pmi) to compute text emotion similarity on youtube comments [45]. the authors extended agrawal and an, learning algorithm to take into consideration any convergence between sets of an emotion, which can result into distortion in classification results [13]. the classifier categorized comments for each category under ekman six basic emotion model and obtained results accounting to 90% in precision, 72% for recall and 67-70% in accuracy. razek and frasson, used dominant meaning classifier (dmc) to recognize emotion from text [46]. a dominant tree is trained on the isear dataset to form seven emotion classes, joy, fear, anger, sadness, disgust, shame, and guilt, which is in line with carroll [29] discrete emotions. for each emotional class, a sub class is associated, for instance, under anger class, the sub classes mislead, punishment, argument and other emotions are added. the dominant tree is then utilized to classify text retrieved from users chat sessions. instead of using keywords-based techniques, the authors adopted dominant meaning techniques to enhance the accuracy and refine the emotion classes. the following metrics were used to evaluate the accuracy of the model, average precision, recall, and fmeasure. a ten-fold cross validation comparison was made between support vector machine (svm) and dmc. it was observed that dmc yielded superior results across all emotion classes. to tackle the problem of emotion analysis from a psychological and linguistic perspective, [38] developed a framework designed to capture emotions from multilingual text using ekman six basic emotions model. two additional emotion classes were added: “mixed emotion” for sentences with multiple affects and “no emotion” for sentences bearing no affective words. the dataset used was constructed from twitter in three different areas, political election, healthcare, and sports. latent dirichlet allocation (dla) was applied for the extraction of repeating topics and keywords. each tweet was manually labeled with an emotion class by four human annotators. the task of emotion classification was done in two segments. in the first segment, the dataset is split into two categories, emotion, and non-emotion, which is classified using svm. in the second segment, fine tuning is 64 bulletin of social informatics theory and application issn 2614-0047 vol. 4, no. 2, september 2020, pp. 59-69 pokhun & chuttur (analyzing emotions in texts) performed using svm and nb. to cater for automatic emotion classification, three publicly available lexical resources, worldnet-affect (wna), hindi wordnet-affect (hwna) and senti-worldnet, were used to create three features sets to distinguish between affective and non-affective words. evaluation was conducted using the following metrics: precision, recall, accuracy, and f-measure. comparison between svm and nb showed that nb outperformed svm with an accuracy of 72.81%. for messages with text sparsity, proposed two supervised intensive topic model namely: weighted labelled topic model (wltm) and intensive emotion topic model (ietm) for emotion detection over short texts [47]. wltm performs biterm (pair of words) extraction, which matches the topic from a document label set. gibbs sampling algorithm was used to estimate the required parameters for wltm. then, support vector regression (svr) is used to forecast emotion distributions. ietm also performs biterm extraction. the two models were trained on the semeval and isear datasets. averaged pearson’s correlation coefficient, apdocument and apemotion were used to evaluate the models. wltm result on semeval did not perform well in terms of apdocument (0.24); however, the same model achieved the highest score on apemotion (0.45). in another emotion classification task, [48], employed prediction by partial matching (ppm) technique to recognize ekman's six basic emotions in character-based text. the ppm technique was experimented on three datasets, livejournal dataset, alm’s dataset and aman’s dataset to categorize emotions. the model obtained accuracy within the range of 88% to 96%, precision between 71% to 90%, recall between 70% to 88% and f-measure between 67% to 88%. hasan et al. further proposed an approach to automatic emotion detection from tweets by developing two systems called emotex and emotexstream [49]. the authors extended the circumplex model with wordnet’s synsets (synonym) to capture a broader spectrum of affect bearing words. nb, svm and decision tree as classifiers were used in emotex. emotexstream as an extension to emotex was developed as a real-time tweet classifying system whose aim is to discover temporal distributions of aggregate emotion and detect emotional burst during major events. an unsupervised method (binary classification using linguistic inquiry and word count (liwc) and affective norms for english words (anew) was developed to classify tweets in two groups, emotion-present and emotion-absent, which were fed in emotex for emotion classification. results for precision between 78% to 93%, recall between 77% to 95% and f-measure between 77.8% to 85.6% were observed. a method for unlabelled text emotion classification, called universal affective model (uam) was proposed by [50]. their objectives were to detect social emotions from the point of view of social media users and to classify unlabelled text with limited features. three steps are involved, keywords identification, biterm extraction and emotion prediction of unlabelled text with limited features. their model was tested on three datasets, semeval, six and sinanews. six is a collection of small texts from bbc forum posts, digg.com, myspace, twitter, youtube, and runners world. sinanews is a collection of news articles and contains eight emotion class, touching, empathy, boredom, anger, amusement, sadness, surprise, and warmness. the three datasets were evaluated using three metrics, namely, ap, apemotion, and accu@1. the authors reported 35.7, 24.1, 36.7 in semeval for each metric respectively, 54, 44.4, 77.2 in six, and 54.5, 41.3, 54.7 in sinanews. chen et al. used agglomerative hierarchical clustering and the valence-arousal (v-a) emotion (based on plutchik wheels of emotions) dimensional space to monitor and analyze users’ emotions when chatting online [51]. emoticons were manually mapped into the v-a space. pointwise mutual information criterion was used to calculate the correlations between chat messages and emoticons in terms of scores. the authors conducted data clustering to automatically detect emotions in a conversation and reported an accuracy of 88%. in an attempt to detect emotion from twitter data, [52] made use of c-gru (context-aware gated recurrent units) for context extraction when determining user feelings. emotions were classified using the twelve discrete emotions: anger, anticipation, disgust, fear, joy, love, optimism, pessimism, sadness, surprise, trust, and neutral. the authors reported an accuracy of 0.532 and an f1 score of 0.64. kratzwald et al. attempted emotion recognition using long-short term memory (lstm) as per [53]. the proposed approach was tested on semeval-2015 (a set election tweets datasets) and semeval2018 (a set of general tweets datasets). four discrete emotions categories, anger, fear, joy, sadness were targeted. overall, the authors reported performance f1-score 58.4% for election tweets and issn 2614-0047 bulletin of social informatics theory and application 65 vol. 4, no. 2, september 2020, pp. 59-69 pokhun & chuttur (analyzing emotions in texts) 58.6% for general tweets. another method consisting of the use of lstm on text emotion recognition was further proposed by su et al. (2018). the method was tested against natural language processing and chinese computing (nlpcc) database which contains seven emotion categories: anger, boredom, disgust, anxiety, happiness, sadness, surprise and results obtained indicated an accuracy of 70.66%. in an attempt to address multiclass emotion classification, [55] put forth an approach using emotion distribution learning and a multi-task convolutional neural network for text emotion analysis. the proposed approach was evaluated on semeval 2007 dataset on six distribution prediction: euclidean, sørensen, squaredx2, kl divergence, cosine, and intersection and four classification performance: precision, recall, f-score, and accuracy metrics. distribution prediction for each metric are as follows: 44.38, 41.96, 55.19, 73.06, 72.91, 58.04 and classification performance for each metric are as follows: 48.33, 42.23, 41.41, 51.60. single class emotion classification is evaluated on the isear, fairy tales, tec and cbet datasets using the same performance metrics as multiclass emotion classification. precision between 61.20 and 67.11, recall between 52.57 and 79.2, f-score between 56.94 and 78.72 and accuracy between 61.52 and 79.21 were obtained. chatterjee et al. attempted the detection of four emotion labels, happy, sad, angry, others, using a deep learning approach called sentiment and semantic-based emotion detector (ss-bed) which is based on the combination of semantic and sentiment representations of user text and makes use of two lstm layers [14]. the authors created a dataset based on twitter conversations. those conversations are pre-processed and were assigned to five judges who in turn classified the conversation to an emotion class. ss-bed obtained precision, recall and f1 score of 69.51%, 52.29%, 59.68, respectively for happy, 85.42%, 76.63%, 80.79% for sad and 87.69%, 63.33%, 73.55%, for angry 3. results and discussion table 1 provides a summary of the different techniques, datasets, and evaluation metrics commonly used in emotion analysis research since 2015. it is generally observed that researchers have adopted hybrid implementation, that is, a combination of two or more algorithms to handle multiclass emotion classification with svm and nb as the most used algorithms. the most used datasets are isear and semeval, both of which contain texts that express discrete emotions. we also note that the highest performing algorithm is ppm with an accuracy of up to 96% and the least performing algorithm is c-gru with an accuracy of 53.2%. we also observe an inconsistency in the way performances are reported. authors do not use the same metrics, datasets, and emotion models such that it is not possible to compare the different emotion analysis techniques. moreover, it is found that earlier studies adopted a general statistical approach for classifying emotions, but recent studies are seen to adopt machine learning techniques, notably deep learning to address the problem of emotion analysis. furthermore, as summarized in table 1, authors either limit themselves to a single dataset or they may combine different datasets with a varying choice of different algorithms for emotion analysis. given that each dataset adopts different emotion models (basic level emotions to different emotion levels), results reported would be significant only to the actual emotions present within the datasets. eventually, there is concern regarding the relevance of reported performance into real-world applications. as is, most studies tend to focus mostly on the datasets overlooking any implications to real-world settings. moreover, current datasets suffer from emotion imbalances, that is, they do not contain equal amount of all emotions classes, which makes it difficult for any classification system to calculate performance correctly. 66 bulletin of social informatics theory and application issn 2614-0047 vol. 4, no. 2, september 2020, pp. 59-69 pokhun & chuttur (analyzing emotions in texts) table 1. techniques used for text emotion analysis over past five years technique(s) dataset(s) emotion model performance (%) source nlp, nbm, svm isear 5 discrete emotions f1score: 63.1 anusha and sandhya (2015) rule-based approach: nrc emotion lexicon, nb isear, semeval-2007, alm occ model f1score: 51.3 65.5 udochukwu and he (2015) nb, me twitter 7 discrete emotions, circumplex model of affect accuracy: 83 89 precision: 85 90 sensitivity: 79 91 specificity: 86 89 perikos and hatzilygeroudis (2016) pmi youtube comments ekman basic emotions precision: 92.75 recall: 72 accuracy: 67 70 yasmina et al. (2016) dmc isear 7 discrete emotions precision: 20.2 27.2 recall.: 46.9 60.2 razek and frasson (2017) svm, nb twitter ekman basic emotions accuracy: 72.81 jain et al. (2017) wltm, ietm semeval, isear 7 discrete emotions apdocument: 0.24 apemotion: 0.45 rao et al. (2017) ppm livejournal, alm, aman ekman basic emotions accuracy: 88 96 precision: 71 90 recall: 70 88 f1-score: 67 88 almahdawi and teahan (2017) uam semeval, six, sinanews discrete + dimensional ap: 35.7 54.5 apemotion: 24.1 44.4 accu@1: 36.7 77.2 liang et al. (2018) nb, svm, and decision tree twitter circumplex model of the effect precision: 78 – 93 recall: 77 95 f1-score: 77.8 85.6 hasan et al. (2018) agglomerative hierarchical clustering, pmi real-time chat data plutchik wheels of emotions accuracy: 88 chen et al. (2018) c-gru twitter 12 discrete emotions accuracy: 53.2 f1-score: 64 samy et al. (2018) lstm, semeval-2015, semeval-2018 4 discrete emotions f1-score: 58.4 58.6 kratzwald et al. (2018) lstm nlpcc-mhmc-te 7 emotions categories accuracy: 70.66 su et al. (2018) multi-task: cnn, ldl, semeval-2007, isear, fairy tales, tec, cbet mix emotions precision: 61.20 67.11 recall: 52.57 79.2 f1 score: 56.94 78.72 accuracy: 61.52 79.21 wang et al. (2018) lstm twitter 4 discrete emotions precision: 69.51 recall: 52.29 f1 score: 59.68 chatterjee et al. (2019) 4. conclusion this paper has provided an overview of the emotion analysis techniques used in past studies. it is observed that various algorithms have been adopted to classify emotions, but results reported are not comparable and sometimes deceiving since there is little scope for practical applications. despite the existence of various emotion models, none can be considered sufficient to cover the range of emotions that are usually expressed by an individual. the same limitation is observed within the current datasets available for emotion analysis. datasets adopt a single emotion model and are imbalanced. with the increasing amount of data and improved techniques for data analysis, there is a good scope for the field of emotion analysis to move beyond academic research and find its way into real-world applications. however, prior to that, researchers must consider the development of robust and reliable emotion models, which can be adopted in emotion analysis studies. moreover, researchers are issn 2614-0047 bulletin of social informatics theory and application 67 vol. 4, no. 2, september 2020, pp. 59-69 pokhun & chuttur (analyzing emotions in texts) encouraged to consider the development of benchmarks to allow for comparison of reported results across studies references [1] t. kamboj and m. dayal, “social media: collaborating web 2.0 and user-generated content (ugc),” int. multidiscip. j. appl. res., vol. 1, no. 3, pp. 35–41, 2014. [2] n. a. ghani, s. hamid, i. a. t. hashem, and e. ahmed, “social media big data analytics: a survey,” comput. human behav., vol. 101, no. december, pp. 417–428, 2019, doi: https://doi.org/10.1016/j.chb.2018.08.039. [3] a. b. youssef and h. b. youssef, “social networking on web 2.0: from emotional intelligence to cyber emotional intelligence,” manag. inf. syst., vol. 6, no. 2, pp. 21–28, 2011. [4] m. fernández-gavilanes, j. juncal-martínez, s. garcía-méndez, e. costa-montenegro, and f. j. gonzález-castaño, “creating emoji lexica from unsupervised sentiment analysis of their descriptions,” expert syst. appl., vol. 103, no. august, pp. 74–91, 2018, doi: https://doi.org/10.1016/j.jocs.2017.01.010. [5] y. zhang, d. song, p. zhang, p. wang, x. li, j., li, and b. wang, “a quantum-inspired multimodal sentiment analysis framework,” theor. comput. sci., vol. 752, no. december, pp. 21–40, 2018, doi: https://doi.org/10.1016/j.tcs.2018.04.029. [6] j. serrano-guerrero, j. a. olivas, f. p. romero, and e. herrera-viedma, “sentiment analysis: a review and comparative analysis of web services,” inf. sci. (ny)., vol. 311, no. august, pp. 18–38, 2015, doi: https://doi.org/10.1016/j.ins.2015.03.040. [7] m. munezero, c. s. montero, e. sutinen, and j. pajunen, “are they different? affect, feeling, emotion, sentiment, and opinion detection in text,” ieee trans. affect. comput., vol. 5, no. 2, pp. 101–111, 2014, doi: https://doi.org/10.1109/taffc.2014.2317187. [8] a. a. lazarus and c. n. lazarus, “the 60-second shrink,” atascadero, ca. 1997. [9] c. y. yam, “emotion detection and recognition from text using deep learning,” microsoft developer blog. 2015. [10] d. seal, u. k. roy, and b. basak, “sentence-level emotion detection from text based on semantic rules,” in information and communication technology for sustainable development, springer, 2020, pp. 423– 430. [11] ö. f. şimşek, “happiness revisited: ontological well-being as a theory-based construct of subjective wellbeing,” j. happiness stud., vol. 10, no. 5, pp. 505–522, 2009, doi: https://doi.org/10.1007/s10902-0089105-6. [12] m. yassine and h. hajj, “a framework for emotion mining from text in online social networks,” in 2010 ieee international conference on data mining workshops, 2010, pp. 1136–1142, doi: https://doi.org/10.1109/icdmw.2010.75. [13] a. agrawal and a. an, “unsupervised emotion detection from text using semantic and syntactic relations,” in proceedings 2012 ieee/wic/acm international conference on web intelligence, wi 2012, 2012, pp. 346–353, doi: 10.1109/wi-iat.2012.170. [14] a. chatterjee, u. gupta, m. k. chinnakotla, r. srikanth, m. galley, and p. agrawal, “understanding emotions in text using deep learning and big data,” comput. human behav., vol. 93, no. april 2018, pp. 309–317, 2019, doi: 10.1016/j.chb.2018.12.029. [15] m. aksan, “metaphors of anger: an outline of a cultural model,” dil ve edeb. derg., vol. 3, no. 1, pp. 31– 67, 2011. [16] z. shao, r. chandramouli, k. p. subbalakshmi, and c. t. boyadjiev, “an analytical system for user emotion extraction, mental state modeling, and rating,” expert syst. appl., vol. 124, no. 15, pp. 82–96, 2019, doi: 10.1016/j.eswa.2019.01.004. [17] p. s. dandannavar, s. r. mangalwede, and s. b. deshpande, “emoticons and their effects on sentiment analysis of twitter data,” in eai international conference on big data innovation for sustainable cognitive computing, 2020, pp. 191–201. 68 bulletin of social informatics theory and application issn 2614-0047 vol. 4, no. 2, september 2020, pp. 59-69 pokhun & chuttur (analyzing emotions in texts) [18] r. newman, v. chang, r. j. walters, and g. b. wills, “web 2.0—the past and the future,” int. j. inf. manage., vol. 36, no. 4, pp. 591–598, 2016, doi: https://doi.org/10.1016/j.ijinfomgt.2016.03.010. [19] s. f. pengnate and r. sarathy, “an experimental investigation of the influence of website emotional design features on trust in unfamiliar online vendors,” comput. human behav., vol. 67, no. february, pp. 49–60, 2017, doi: https://doi.org/10.1016/j.chb.2016.10.018. [20] r. p. bagozzi, m. gopinath, and p. u. nyer, “the role of emotions in economic,” j. acad. mark. sci., vol. 27, no. 2, pp. 184–206, 1999, doi: https://doi.org/10.1001/jama.1953.03690150021006. [21] i. o. pappas, p. e. kourouthanassis, m. n. giannakos, and v. chrissikopoulos, “sense and sensibility in personalized e‐ commerce: how emotions rebalance the purchase intentions of persuaded customers,” psychol. mark., vol. 34, no. 10, pp. 972–986, 2017, doi: https://doi.org/10.1002/mar.21036. [22] a. kołakowska, a. landowska, m. szwoch, w. szwoch, and m. r. wrobel, “emotion recognition and its applications,” in human-computer systems interaction: backgrounds and applications 3, springer, 2014, pp. 51–62. [23] p. sharma, m. esengönül, s. r. khanal, t. t. khanal, v. filipe, and m. j. reis, “student concentration evaluation index in an e-learning context using facial emotion analysis,” in international conference on technology and innovation in learning, teaching and education, 2018, pp. 529–538, doi: https://doi.org/10.1007/978-3-030-20954-4. [24] m. f. wagner, j. s. milner, r. j. mccarthy, j. l. crouch, t. r. mccanne, and j. j. skowronski, “facial emotion recognition accuracy and child physical abuse: an experiment and a meta-analysis.,” psychol. violence, vol. 5, no. 2, p. 154, 2015. [25] s. salawu, y. he, and j. lumsden, “approaches to automated detection of cyberbullying: a survey,” ieee trans. affect. comput., 2017. [26] k. r. scherer and h. g. wallbott, “evidence for universality and cultural variation of differential emotion response patterning.,” j. pers. soc. psychol., vol. 66, no. 2, p. 310, 1994. [27] k. kim and r. w. picard, “emotion modeling and machine learning in affective computing,” unpublished manuscript. 2014. [28] p. ekman and w. v. friesen, “constants across cultures in the face and emotion,” j. pers. soc. psychol., vol. 17, no. 2, p. 124, 1971. [29] c. e. izard, d. z. libero, p. putnam, and o. m. haynes, “stability of emotion experiences and their relations to traits of personality.,” j. pers. soc. psychol., vol. 64, no. 5, p. 847, 1993. [30] a. mehrabian and j. a. russell, an approach to environmental psychology. cambridge, ma: the mit press, 1974. [31] a. kołakowska, a. landowska, m. szwoch, w. szwoch, and m. r. wróbel, modeling emotions for affectaware applications, vol. january. 2015. [32] a. ortony, g. l. clore, and a. collins, the cognitive structure of emotions. cambridge university press, 1990. [33] r. plutchik, “the nature of emotions: human emotions have deep evolutionary roots, a fact that may explain their complexity and provide tools for clinical practice,” am. sci., vol. 89, no. 4, pp. 344–350, 2001. [34] r. plutchik, “the nature of emotions,” am. sci., vol. 86, no. 4, p. 344, 2001, doi: https://doi.org/10.1511/2001.4.344. [35] j. m. fellous, j. l. armony, and j. e. ledoux, emotional circuits and computational neuroscience, vol. 2. mit press cambridge, ma, 2002. [36] c. a. smith and r. s. lazarus, emotion and adaptation. new york, 1990. [37] e. s. m. el-alfy, s. m. thampi, h. takagi, s. piramuthu, and t. hanne, advances in intelligent informatics, vol. 320. springer international publishing, 2015. issn 2614-0047 bulletin of social informatics theory and application 69 vol. 4, no. 2, september 2020, pp. 59-69 pokhun & chuttur (analyzing emotions in texts) [38] v. k. jain, s. kumar, and s. l. fernandes, “extraction of emotions from multilingual text using intelligent text processing and computational linguistics,” j. comput. sci., vol. 21, no. july, pp. 316–326, 2017, doi: 10.1016/j.jocs.2017.01.010. [39] k. r. scherer, “what are emotions? and how can they be measured?,” soc. sci. inf., vol. 44, no. 4, pp. 695–729, 2005. [40] b. klimt and y. yang, “introducing the enron corpus,” ceas. 2004. [41] c. strapparava and r. mihalcea, “semeval-2007 task 14: affective text,” in proceedings of the fourth international workshop on semantic evaluations (semeval-2007), 2007, pp. 70–74. [42] s. m. mohammad and f. bravo-marquez, “wassa-2017 shared task on emotion intensity,” arxiv preprint arxiv:1708.03700. 2017. [43] o. udochukwu and y. he, “a rule-based approach to implicit emotion detection in text,” in international conference on applications of natural language to information systems, 2015, pp. 197–203. [44] i. perikos and i. hatzilygeroudis, “recognizing emotions in text using ensemble of classifiers,” eng. appl. artif. intell., vol. 51, no. may, pp. 191–201, 2016, doi: 10.1016/j.engappai.2016.01.012. [45] d. yasmina, m. hajar, and a. m. hassan, “using youtube comments for text-based emotion recognition,” procedia comput. sci., vol. 83, no. ant, pp. 292–299, 2016, doi: 10.1016/j.procs.2016.04.128. [46] m. a. razek and c. frasson, “text-based intelligent learning emotion system,” j. intell. learn. syst. appl., vol. 9, no. 1, pp. 17–20, 2017, doi: 10.4236/jilsa.2017.91002. [47] y. rao et al., supervised intensive topic models for emotion detection over short text, vol. 1. 2017. [48] a. almahdawi and w. j. teahan, “emotion recognition in text using ppm,” in in international conference on innovative techniques and applications of artificial intelligence, 2017, pp. 149–155, doi: 10.1007/9783-319-71078-5_13. [49] m. hasan, e. rundensteiner, and e. agu, “automatic emotion detection in text streams by analyzing twitter data,” int. j. data sci. anal., vol. 7, no. 1, pp. 35–51, 2019, doi: https://doi.org/10.1007/s41060018-0096-z. [50] w. liang, h. xie, y. rao, r. y. lau, and f. l. wang, “universal affective model for readers’ emotion classification over short texts,” expert syst. appl., vol. 114, no. december, pp. 322–333, 2018, doi: 10.1016/j.eswa.2018.07.027. [51] c. h. chen, w. p. lee, and j. y. huang, “tracking and recognizing emotions in short text messages from online chatting services,” inf. process. manag., vol. 54, no. 6, pp. 1325–1344, 2018, doi: 10.1016/j.ipm.2018.05.008. [52] a. e. samy, s. r. el-beltagy, and e. hassanien, “a context integrated model for multi-label emotion detection,” procedia comput. sci., vol. 142, pp. 61–71, 2018, doi: 10.1016/j.procs.2018.10.461. [53] b. kratzwald, s. ilić, m. kraus, s. feuerriegel, and h. prendinger, “deep learning for affective computing: text-based emotion recognition in decision support,” decis. support syst., vol. 115, no. december, pp. 24–35, 2018, doi: 10.1016/j.dss.2018.09.002. [54] m. h. su, c. h. wu, k. y. huang, and q. b. hong, “lstm-based text emotion recognition using semantic and emotional word vectors,” in 2018 1st asian conference on affective computing and intelligent interaction, acii asia 2018, 2018, pp. 1–6, doi: 10.1109/aciiasia.2018.8470378. [55] y. zhang, j. fu, d. she, y. zhang, s. wang, and j. yang, “text emotion distribution learning via multitask convolutional neural network,” in ijcai international joint conference on artificial intelligence, 2018, vol. 2018-july, pp. 4595–4601. bulletin of social informatics theory and application issn 2614-0047 vol. 5, no. 1, march 2021, pp. 28-37 28 https:doi.org/10.31763/businta.v5i1.430 a roadmap for the successful use of social media in electoral campaigns awanda s. s. pratama a,1,*, elloy y. m. s. danan a,2, grace angeline a,3, irfan z. abdillah a,4, jevin a. prayoga a,5, nedal a. m. jabari b,6 a department of electrical engineering, universitas negeri malang, malang, indonesia b department of electrical engineering, palestine technical university, tulkarm, palestine 1 awanda.setya.1805356@students.um.ac.id*; 2 elloyyabest.1805356@students.um.ac.id; 3 grace.angeline.1805356@students.um.ac.id; 4 irfan.zuhdi.1805356@students.um.ac.id; 5 jevin.arda.1805356@students.um.ac.id; 6 njabari@ptca.edu.ps * corresponding author 1. introduction the internet's inspiring growth has paved the way for politicians to use social media strategy. politicians and political parties are turning to social media for a new way to engage with voters due to the changes brought on by social media [1]. before the existence of the internet, political campaigns were carried out through broadcasting through advertisements on television, radio, magazines, and newspapers. in contrast to pre-internet methods such as television, social media use in political campaigns has risen considerably. however, this does not imply that traditional media should be abandoned immediately, such as television or radio. the internet has developed communication networks that play an essential role in the flow of information, and social media can transform not just the message but also the nature of ideals and conflict dynamics of politics. to win the election, they must implement creative campaign communication strategies aimed toward supporters and recognize how this can be accomplished by implementing messaging strategies to promote the candidate and their political ideals [2]. social media has become essential for many people. in less than two decades, social media can affect many aspects of life. the emergence of social media platforms such as facebook, twitter, and instagram makes it easier to exchange information. social media is increasingly recognized as an essential source of information about a wide range of issues. not all information from social media is correct. this time the information is often met with false and misleading information. this false information has different purposes, shapes, and targets. among the strategic tools used by perpetrators a r t i c l e i n f o a b s t r a c t article history received december 17, 2020 revised january 9, 2021 accepted january 23, 2021 over the last few years, social media has become important for many people and can affect many aspects of life. in terms of politics, social media can help candidates and political parties do their political campaign. the use of social media in politics and during political campaigns has become a vital part for every political party and candidate. this paper describes the current social media and its characteristics, how campaigns were conducted in the past and how modern campaign activities were conducted. case studies from several countries regarding how political campaigns were carried out are also written in this paper. the authors explore the factors available in social media that can affect and change the political process and campaign. strong and weak factors of using social media in electoral campaigns are also discussed in this paper. this paper further addresses the author's point of view about how candidates should use social media during elections. this is an open access article under the cc–by-sa license. keywords social media electoral campaign politician political parties politics http://creativecommons.org/licenses/by-sa/4.0/ http://creativecommons.org/licenses/by-sa/4.0/ issn 2614-0047 bulletin of social informatics theory and application 29 vol. 5, no. 1, march 2021, pp. 28-37 pratama et.al (a roadmap for the successful use of social media in electoral campaigns) are fake news, propaganda, hateful speech, astroturfing, colluding users (e.g., paid trolls), and automation [3]. in terms of politics, social media can help the campaign or interact between candidates, political parties, and users. many advantages of doing campaigns on social media, for example, less money spent and increasing popularity. in campaigning, candidates or political parties must determine targets so that the campaign runs efficiently. each social media platform has different characteristics. facebook is probably the biggest social media platform, with monthly active users up to 2.7 billion. facebook users can share personal information, join groups and establish connections with friends or acquaintances. twitter is a social media microblogging platform that allows users to send and receive text-based messages of 280 characters. twitter users can also define the kind of information and topic that will be received [4]. twitter also provides a trending topic feature. instagram is a social media that uses images as its main content, provides a feature so that the user profile looks like a gallery. instagram users have to post images or videos if they want to post, which does not allow them to post without pictures or videos. social media is now crucial for election campaigns as more and more people use social media in their daily lives. social media such as facebook, twitter, and instagram are widely used social media platforms for political campaigns. the purpose of this paper is to discuss the use of social media in electoral campaigns. this paper explains how social media will influence and alter the political process and campaign. the advantages and disadvantages of using social media in political campaigns and how politicians can use social media during elections will be discussed. 2. theoretical framework 2.1. election campaign before the internet before the existence of the internet, political campaigns were carried out using broadcasting through advertisements on television, radio, magazines, and newspapers. if we see, there were lots of advertisements on television. television advertising campaigns had the most significant influence on the selection of candidates [5]. television had an impact on how politicians communicate with voters. such as dwight d. eisenhower, who used television as his political advertisement in the united states to reach the broader community at a low cost [6]. to this day, social media has become a new method of political campaigning. compared to preinternet methods such as using television, social media is considered more effective because currently, more and more people are using social media in their daily lives. however, that does not mean that old media such as television is immediately abandoned. according to voolvert & noort, social media can complement campaigns because television cannot be abandoned [7]. 2.2. international modern campaign activities stories before campaigning is the most critical process in the general election. in a campaign, a party or candidate announces his vision and mission to the public. currently, campaigns can be carried out using internet facilities. social media such as facebook, twitter, and instagram are widely used platforms for campaign implementation. by utilizing social media, candidates can interact directly with the community. the existence of social media will undoubtedly increase the closeness between candidates and the public. this closeness will attract the hearts of the public so that people will support the candidate. the modern campaign was first used in the united states in 2000 by ai gore and george w. they created a personal website containing their biographies. in 2008, barack obama linked his campaign site with his facebook account. this was done to increase his online presence [8]. obama's opponent, john mcclain regularly releases his television ads on youtube and his personal web campaigns [9]. obama's success in the 2008 election led to social media being used again in 2012. obama and romney used social media and expanded their platforms. the use of social media aims to attract teenagers. in 2016, donald trump made headlines on social media, especially twitter. trump uses social media to provoke his opponents and criticize his challengers [8]. this makes trump's popularity even higher. trump's opponent, hillary clinton also used social media for her campaign but not as well as trump. trump with his sensationalist style won the election. 30 bulletin of social informatics theory and application issn 2614-0047 vol. 5, no. 1, march 2021, pp. 28-37 pratama et.al (a roadmap for the successful use of social media in electoral campaigns) in nigeria, goodluck jonathan is seen by the public as an enemy of democracy because he suppresses the circulation of newspapers [10]. due to the limited circulation of newspapers, the opposing camp took advantage of the existing loopholes. muhammadu buhari uses social media as a campaign tool. the use of social media was effective, leading buhari to victory. in 2016, two candidates from the ghana election also used social media. john mahama took advantage of social media by uploading videos of the infrastructure development [11]. nana akufo-addo hired a grub who had won candidates in nigeria before [11]. his strategy, making nana akufo-addo won the election of ghana. 2.3. case studies in the u.s, more than 5 million campaign advertisements appeared on television in 2020, more than double as many as in 2016. nearly $8 billion is spent on broadcast and digital advertisements [12]. all candidates widely used social media during the 2020 presidential election. on twitter, almost 87 million people follow donald trump, while 11 million people follow vice president joe biden. despite the large distance between the two, biden's top tweets outperformed donald trump's top tweets by almost a factor of two [13]. the pew research center finds that almost one-fourth of all americans learn something about the candidates from an internet outlet such as facebook [14]. during the campaigning season, the youth's participation on social media often sparks rallies and movement [15]. despite the rise of the internet as a source of campaign news, television remains the public's primary source. however, television is not as dominant as at once was [14]. the central election commission (cec) defined a schedule for allocating airtime for russian presidential candidates on february 14 2018. debates were broadcast on five federal television channels and three radio stations [16]. for campaigning, each candidate has to do a collection of signatures. candidates nominated by political parties with factions in the state duma are exempt from collecting signatures [17]. in russia, traditional media are widely controlled by the state. however, the internet still offers the possibility of free speech [18]. there has been a rise in social media use for politics and campaigning in russia in the last few years. youtube has established itself as an alternative to state television in russia, with a high degree of political content within trending videos [19]. media company rbc states that the primary focus of vladimir putin’s presidential campaign of 2018 was on his promotion in social media [20]. despite the growth of using social media for politics and campaigning, there is also a trend of tightening internet control in russia in recent years [21]. because of that, the primary tool for campaigning in russia right now is traditional mass media such as tv and radio. the last official campaign in indonesia lasted about six months, beginning on september 23, 2018 and ending on april 13, 2019 [22]. both parties sent their campaign teams to the kpu prior to the launch of the campaign. the kpu planned five debates for 2019, the same number as in 2014 [23]. with millennials responsible for about two-fifths of indonesia's population, both parties made substantial attempts to cater to the age demographic. one significant social media-centered initiative, called #2019gantipresiden, was launched by pks politician mardani ali sera. it involved organising rallies in many cities until they were prohibited due to clashes with jokowi supporters [24]. before the campaign started, it had been anticipated that there would be a flood of hoaxes and false news on social media and whatsapp. however, one observer mentioned that the government's influence in dealing with the issue was minimal because it could be framed as favoring the incumbent [25]. to counterattack issues regarding false news on social media, both sides formed dedicated anti-hoax organizations [26], [27], with the indonesian government hosting weekly false news briefings [28]. compared to the hugely costly, multi-channel extravaganza that voters in other advanced democracies are exposed to, japan's regulated and very conservative elections seem to originate from another age altogether. japan's election laws have been interpreted to ban online advertising and to limit online voter participation during the official campaign time before an election [29]. japan's public offices election law (poel) strictly limits candidates' paid television advertisements and radio spots. while political parties are free to purchase television or newspaper advertisements, politicians are not entitled to purchase personal television or radio time [30]. during the official campaign time, candidates are permitted to produce a certain number of pamphlets and leaflets [31]. strict campaigning laws make politicians go out and visit the voters they are meant to represent. that kind of direct interaction with people, albeit fleeting and brief, is something that many countries' political campaigns have missed. the election rules were amended in 2013 to allow social media issn 2614-0047 bulletin of social informatics theory and application 31 vol. 5, no. 1, march 2021, pp. 28-37 pratama et.al (a roadmap for the successful use of social media in electoral campaigns) campaigning, but political parties are resistant to change [32]. table 1 compares the countries mentioned above in terms of the main campaigning media and campaign time before election. table.1 comparison among country difference country u. s. russia indonesia japan main campaigning stye/media television, digital advertising & social media traditional mass media (tv/radio) television debate & social media old media (print media) & on-site in person visit campaigning time period before election different for each candidate. the u.s. doesn't have laws dictating how long a campaign period is. around 2 months february 2018 march 2018 around 7 months 23 september 2018 13 april 2019 12 days lower house election 17 days upper house election 2.4. political advertising for multi-purpose in an open and accountable modern political competition, candidates need a mechanism for distributing political goods to the electorate, such as innovative approaches, problems, party ideology, policies, and leadership styles. to win the election, they must adopt innovative campaign communication strategies geared toward supporters and realize how this can be done by introducing messaging strategies to support the individual and their political ideals. the new democratic age has brought about significant changes in the political world, especially in political communication practices. there has been a significant shift in how candidates plan and devise political advertising strategies to gain popular trust in electoral campaigns. as a result, many political players, including the government, parties, politicians, and interest groups, adopted and regularly used political marketing in their political campaigning [2]. political marketing and political communication are the most important aspects of producing effective political advertisements. political marketing is a relatively recent area of research within political science and communication that investigates the application of marketing methods in the political process. the use of targeting, tactics, and approaches in the political sphere is referred to as campaign marketing. it represents marketing's invasion of the political space as an enterprise and tool. political advertisements, celebrity endorsements, specialist marketers and campaign management, internet campaigning, cell phone canvassing, segmentation, and micro-targeting are all common approaches of political marketing [2]. the information revolution and globalization have played critical roles in transforming conventional election campaigning into the most professional and sophisticated targeting techniques [33]. before that, political marketing was presumed to have a unique role in achieving the goal of political activities by strategic planning, preparation, design, and packaging of political topics, which is the dissemination of political knowledge focused on audience segmentation. the ultimate aim is to establish an equally satisfying and harmonious state with political parties and voters [2]. political communication is related to spreading and impacting information in politics, politicians, media, and people. the media plays a strategic role in promoting and introducing modern political relations strategies such as political advertising. this is because advertisement is the most powerful method of constructing and producing an image. it is effective because of the structure, which encourages political actors to deliver their messages directly to the public, without the need for journalists to mediate. political messaging is used in various ways, including television, radio, newspapers, banners, and cinemas [34]. furthermore, in an ideal democratic society, the media should play a variety of roles, including providing information, educating people, serving as a forum for national political debate, providing publicity to the government as the society's watchdog, and serving as a channel for the advocacy of political views [35]. 3. political factors used in social media the use of online social media platforms in political systems and activities is called social media use in politics. facebook, youtube, instagram, wechat, weibo, twitter, tumblr, line, snapchat, and pinterest are social media platforms. the internet has developed communication networks that play an essential role in the flow of information, and social media can transform the message and the 32 bulletin of social informatics theory and application issn 2614-0047 vol. 5, no. 1, march 2021, pp. 28-37 pratama et.al (a roadmap for the successful use of social media in electoral campaigns) nature of political corruption, ideals, and conflict dynamics of politics. diplomacy around the globe has become less private and more susceptible to public opinion due to the use of social media in election systems, global strife, and radical politics [36]. there are seven factors available in social media that can influence the political process and campaign. the first factor is social media as a news source. adults in the united states with internet access rapidly obtain political news and information from social media platforms. in 2019, the pew research center discovered that more than half of americans received their news from social media, with facebook being the most prominent social media source where american adults got their news [37]. so social media platforms are central to campaigns’ communicative strategies. unlike in the days before the internet, where people had to wait for the next newspaper or tv news show to get the latest stuff, online news in social media is available at every moment. even though news can be found on many websites, most people devote more time to social media platforms such as facebook and twitter than to relevant news or political websites [38]. secondly is the poll’s influence in social media. political surveys are an essential component of any campaign. like most forms of political coverage, the internet and social media have massively expanded the number of poll results we see each day. opinion polls are an essential source of information for voters and candidates, providing the latter with data that can be used to guide strategic communication. furthermore, it has been discovered that the specific wording of a published poll and the corresponding report on it by a specific news or media source may impact the outlet's audience perceptions about two running presidential candidates and affect how people vote [39]. the next factor is demographics and targeting. social media platforms enable campaigns with new and creative opportunities to reach out to the public, craft the best message, and target specific audiences. candidates can now adapt their messages to meet the needs of women, college students, retirees, or any other group of voters. each social media platform caters to different demographics and has unique affordances [40]. candidates can tailor their strategies to the platforms that they use. during the u.s. 2016 presidential elections, social media was critical in helping candidates to target their audiences [41]. direct interaction is the next factor available in social media. previously, if we were to see a politician or a candidate, we had to go to a live show. now it is possible to attend virtual gatherings where we can partake in live streaming events and connect with politicians and candidates. presidential political campaigns now regularly and actively use social media to reach, engage, and mobilize voters. according to some scholars, social media is a game-changer for politicians in informing, recruiting, and interacting with citizens [42]. the next factor is fake news and rumors in social media. there is an increasing divergence of opinion that social media platforms like facebook and twitter play a role in spreading misinformation during election campaigns [43]. it is becoming more difficult to distinguish between real and fake news on the internet. this distinction is particularly perplexing in the age of social media. though false news has some value for users, such as confirming far-right views and distributing propaganda to support a presidential candidate, it also has private and social costs. one social cost to users, for example, is the distribution of disinformation, which can make it more difficult for people to seek the reality and, in the case of the 2016 u.s. election, to select an electoral candidate [44]. confirmation bias is one of the unseen factors that work on social media. individuals form opinions over various economic, political, and social issues based on information they get from both media and acquaintances [45]. most people will have the same outlook with their majority of friends and followers on social media. an experiment involving 60 million facebook users before the 2010 us elections showed that they could generate 340,000 additional votes using a social message that informed a user about friends that had voted, compared to an informational message without social network information [46]. social media may reinforce our opinions and make it more difficult to entertain alternative points of view. in politics, confirmation bias can help to make people more opinionated and less tolerant of others. on the other hand, if we make an effort to connect with an assortment of people with diverse viewpoints, we can overcome confirmation bias and use social media to make us more open-minded. the last factor is the attention economy. social media contributes to the concept of the attention economy. the attention economy concept emphasizes that content that garners more attention is more issn 2614-0047 bulletin of social informatics theory and application 33 vol. 5, no. 1, march 2021, pp. 28-37 pratama et.al (a roadmap for the successful use of social media in electoral campaigns) likely to be viewed, shared, and circulated than news content that does not garner as much attention or interest from the general public [47]. because of the multitude of concepts, feelings, and viewpoints flowing via the social media platform, it often works to alter or sway opinions regarding political beliefs. it has been discovered that news consumption contributes to political persuasion; therefore, the more people use social media platforms for news sources, the more their political views will be influenced [48]. the use of “news” leads to political persuasion. the more people use social media platforms as their primary source of news, the more social media acts as the primary catalyst in shaping their political opinions, and the more this "attention economy" will be able to harbored, manipulated, and often shaped. 4. strength and weakness factors in the use of social media in electoral campaigns 4.1. strength factors using social media for electoral campaigns has its strong and weak factors. the substantial factor in using social media for campaigning is that disseminating information from the candidates who will be elected can reach the wider community, unlike in the past, which only reached a few areas because there are many people. by using social media, voters can find out the views of the candidates to be elected. in terms of impact on political engagement, the findings reinforce the idea that increased use of new media contributes to increased political engagement among the general population. along with political engagement and previous offline activity, one of the best predictors of involvement was using social media for political purposes. another supporting factor is that the costs incurred can be kept to a minimum so as not to incur large campaign advertising costs, such as in the usa in 2020, which spent nearly $ 8 billion with a total cost of up to $ 14 billion [12]. in the usa 2016 election, both clinton and trump have said that there are factors of using social media in campaigning that were instrumental in the 2016 election outcome, as has barack obama [49]. as trump's new media chief at the time, brad parscale, put it that facebook and twitter were the reason we won this thing. mr. trump's platform is twitter, and his fundraising platform is facebook [50]. because of their massive user bases, social media platforms such as facebook, twitter, and instagram can also be used as advertising media. facebook is the most popular social media website; the number of daily active users has surpassed 2.7 billion [51]. facebook can also share content, communicate with others, and join communities to engage with others. this is where facebook can be valid as a marketing tool. twitter, on the other hand, is a popular social media website with a large user base. messaging on twitter should be handled in the same way as reading or posting messages is done. twitter can also decide trends using hashtags; if many more people use the hashtag, trending topics will appear; but, if there are other hashtags with many people, the trending subject will shift. in comparison, instagram is a social media platform whose primary content is photographs and videos. it can also be used as a campaign platform for posted photos and videos. based on the comparisons made, it can be inferred that facebook is now the most powerful social media platform for campaigning. 4.2. weakness factors controversies have dominated much of the current public conversation over the position of social media sites. there is an increasing concern that social media platforms play in spreading misinformation during election campaigns. this is concerning because online media networks have increasingly spread political misinformation, both about candidates and essential campaign issues [52]. exposure to partisan online news, which is widely spread through social media, has also led to misperceptions [53]. there is no doubt that a vast amount of falsehoods were spread during the previous two u.s. presidential elections and that millions of americans were exposed to inaccurate messages via social media. however, panel results obtained during the 2012 and 2016 u.s. presidential elections show that, considering the prevalence of falsehoods on these networks, their effect on voters' beliefs remains reasonably minor. these findings show that social media may influence citizens' ability to accept falsehoods during elections, although the results are primarily minor [43]. 34 bulletin of social informatics theory and application issn 2614-0047 vol. 5, no. 1, march 2021, pp. 28-37 pratama et.al (a roadmap for the successful use of social media in electoral campaigns) 5. a roadmap for the successful use of social media in electoral campaigns there are three things that politicians need to do to use social media in electoral campaigns successfully. in using social media, politicians must show their true personalities. like trump, he uses his social media to criticize his political opponents and challengers [8], is following his personality, so that trump's social media shows his behavior in the real world. the result is that trump is superior to his opponent, hillary clinton. clinton's social media did not show her character. she is too meticulous in using his social media. clinton tends to post messages that will please everyone [8]. because of his behavior, the public began to doubt the real character of clinton. in other words, to successfully use social media in electoral campaigns, politicians must show their true selves. the following important part of campaigning is how candidates talk to the voters. more frequent interactions with supporters and challengers on social media will increase closeness and the chances of winning the election. use polite and straightforward language so social media users can understand easily. if a politician is positively perceived on social media, more people will write a complementary post about them. so during campaigning, the next thing that candidates need to do is be friendly when using their social media. to attract the attention of teenagers, politicians can use chat forums [54]. politicians can use it for political discussion. in the eu27 in 2010, people aged 16-24 used the internet to post messages on chat sites, social networking sites, and blogs. this amount is as much as 80%. while the age 25-45 as much as 42% and the age 55-74 as much as 18% [55]. in addition, politicians can make news online. political participation among adolescents is positively related to their consumption of online news [56]. next, listen to what the teenagers think. teenagers often feel that their opinions are not heard, so they are no longer interested in elections. do not compare teenagers to parents because teens do not like being compared. offline participation increases with age, the tendency to choose traditional media is increasing. the use of social media to attract parents' attention is not following their characteristics. a more effective way to get their attention is to use traditional media such as television, newspapers, and radio. males have more political efficacy, that is, political awareness, than females [57]. in order to attract women's attention, candidates should give their views on specific topics about women, such as women's rights. educational background influences the 2016 united states presidential election. white non-college voters chose more trump [58]. it shows that trump's strategies and ideologies primarily work on white non-college voters. trump's ideology and strategy are considered immature for some white college voters. lastly, to successfully use social media for campaigns, politicians must first know their target audience and then use it to their advantage. 6. conclusion there are some factors as to why social media plays such an important part in political campaigns. social media is used as a news outlet and a means for candidates to communicate with voters directly. however, there is a chance that the news on social media is inaccurate. polls on social media can also support candidates by providing data that can be used to direct strategic communication. demographics in social media will also assist politicians in crafting their best message and targeting their audiences. there are also unseen factors such as confirmation bias and the attention economy that operates on social media influence political campaigning. due to their vast user bases, social media platforms such as facebook, twitter, and instagram can also be used as advertising media to spread campaign information; this is a substantial factor in social media usage for political campaigns. the weakness of using social media for campaigning is that there is a possibility that social media platforms like facebook and twitter play in spreading misinformation during election campaigns. however, there is no problem using social media for political campaigns unless it is appropriately used. there are several strategies for the use of social media in the election campaign. these strategies include being yourself, being friendly to anyone and knowing who the campaign target is. campaign targets can be seen based on age, gender, and educational background. different targets mean different social media usage. issn 2614-0047 bulletin of social informatics theory and application 35 vol. 5, no. 1, march 2021, pp. 28-37 pratama et.al (a roadmap for the successful use of social media in electoral campaigns) references [1] k. a. kumara and s. natarajan, “role of social media in political campaigning and its evaluation methodology: a review,” sona glob. manag. rev., vol. 10, 2016. [2] i. sofyan, “political marketing and its impact on democracy,” commun. sph., vol. 1, no. 1, 2015. [3] l. nizzoli, s. tardelli, m. avvenuti, s. cresci, and m. tesconi, “coordinated behavior on social media in 2019 uk general election,” in proc. aaai intl. conference on web and social media, 2020. [4] m. t. nuseir, “is advertising on social media effective an empirical study on the growth of advertisements on the big four (facebook, twitter, instagram, whatsapp),” int. j. procure. manag., vol. 13, no. 1, p. 134, 2020. [5] m. j. alsamydai and r. o. yousif, “the impact of advertising campaigns on the selection of candidates for election,” int. rev. manag. bus. res., vol. 7, no. 2, pp. 542–555, jun. 2018. [6] j. l. spenkuch and d. toniatti, “political advertising and election results,” q. j. econ., vol. 133, no. 4, pp. 1981–2036, nov. 2018. [7] h. a. m. voorveld and g. van noort, “social media in advertising campaigns,” j. creat. commun., vol. 9, no. 3, pp. 253–268, nov. 2014. [8] a. s. hwang, “social media and the future of u.s. presidential campaigning,” claremont mckenna college, 2016. [9] wattal, schuff, mandviwalla, and williams, “web 2.0 and politics: the 2008 u.s. presidential election and an e-politics research agenda,” mis q., vol. 34, no. 4, p. 669, 2010. [10] o. olowojolu, “role of media in 2015 presidential election in nigeria,” int. j. polit. good gov., vol. 7, no. 1, 2017. [11] r. kasenally and d. awatar, “social media, elections and political engagement: the 2014 general elections in mauritius,” j. african elections, vol. 16, no. 2, pp. 47–70, oct. 2017. [12] d. mcmanus, “column: this year’s political ads: the good, the bad and the deceptive,” los angeles times, 2020. [online]. available: https://www.latimes.com/politics/story/2020-10-25/doyle-columnpolitical-ads-2020-biden-trump. [accessed: 14-dec-2021]. [13] p. suciu, “social media could determine the outcome of the 2020 election,” forbes, 2020. [online]. available: https://www.forbes.com/sites/petersuciu/2020/10/26/social-media-could-determine-theoutcome-of-the-2020-election/?sh=489fd18426f6. [accessed: 14-jan-2021]. [14] a. kohut, “the internet gains in politics,” pew research center, 2008. [online]. available: https://www.pewresearch.org/internet/2008/01/11/the-internet-gains-in-politics/. [accessed: 20-dec2020]. [15] m. baker, “the impact of social networking sites on politics,” rev. a j. undergrad. student res., vol. 10, no. 1, pp. 72–74, 2009. [16] n. voroshilov, “cec allocated time for media debates,” kommersant, 2018. [online]. available: https://www.kommersant.ru/doc/3548494. [accessed: 19-oct-2020]. [17] president of russia, “law freeing political parties from collecting signatures in order to take part in election,” news, 2012. [online]. available: http://en.kremlin.ru/events/president/news/15187. [accessed: 16-may-2020]. [18] a. litvinenko, “youtube as alternative television in russia: political videos during the presidential election campaign 2018,” soc. media + soc., vol. 7, no. 1, p. 205630512098445, jan. 2021. [19] s. goncharov, “‘tv of the future’: how video bloggers are changing the media landscape,” levada center, 2017. [online]. available: https://www.levada.ru/2017/07/17/televizor-budushhego-kakvideoblogery-menyayut-medialandshaft/. [accessed: 23-sep-2020]. [20] n. galimova, a. balashova, m. kolomychenko, e. kuznetsovka, and i. lee, “creative competition: why does the kremlin need a strategy for internet promotion of elections,” rbc.ru. [online]. available: https://www.rbc.ru/politics/09/08/2017/5983410f9a79472cdd85ff2a. [accessed: 27-sep-2020]. 36 bulletin of social informatics theory and application issn 2614-0047 vol. 5, no. 1, march 2021, pp. 28-37 pratama et.al (a roadmap for the successful use of social media in electoral campaigns) [21] c. vendil pallin, “internet control through ownership: the case of russia,” post-soviet aff., vol. 33, no. 1, pp. 16–33, jan. 2017. [22] g. m. ibrahim, “dimulai 23 september, kampanye pilpres berakhir 13 april 2019,” detik news, 2018. [online]. available: https://news.detik.com/berita/d-4221870/dimulai-23-september-kampanye-pilpresberakhir-13-april-2019. [accessed: 23-dec-2020]. [23] f. c. farisa, “ini jadwal debat pilpres 2019, dari tanggal hingga tema,” kompas.com, 2018. [online]. available: https://nasional.kompas.com/read/2018/12/19/17590871/ini-jadwal-debat-pilpres-2019-daritanggal-hingga-tema. [accessed: 18-dec-2020]. [24] m. walden, “indonesian opposition movement accuses president of authoritarianism,” voa, 2018. [online]. available: https://www.voanews.com/a/indonesian-opposition-movement-accuses-presidentof-authoritarianism/4581207.html. [accessed: 18-dec-2020]. [25] m. walden, “ahead of 2019 election, indonesia, media battle fake news,” voa, 2018. [online]. available: https://www.voanews.com/a/ahead-of-2019-election-indonesia-and-its-media-battle-fakenews/4628680.html. [accessed: 18-dec-2020]. [26] i. budilaksono, “prabowo to set up anti-hoax team during election campaign,” tempo, 2018. [online]. available: https://en.tempo.co/read/921895/prabowo-to-set-up-anti-hoax-team-during-electioncampaign. [accessed: 18-dec-2020]. [27] z. putri, “tangkal hoax, timses jokowi bentuk tim siber hadapi isu di medsos,” detik news, 2018. [online]. available: https://news.detik.com/berita/d-4164269/tangkal-hoax-timses-jokowi-bentuk-timsiber-hadapi-isu-di-medsos. [accessed: 18-dec-2020]. [28] l. handley, “indonesia’s government is to hold public fake news briefings every week,” cnbc, 2018. [online]. available: https://www.cnbc.com/2018/09/27/indonesias-government-is-to-hold-public-fakenews-briefings-each-week.html. [accessed: 18-dec-2020]. [29] t. ohta, “fairness versus freedom: constitutional implications of internet electioneering for japan,” soc. sci. japan j., vol. 11, no. 1, pp. 99–115, jun. 2008. [30] m. j. wilson, “e-elections: time for japan to embrace online campaigning,” stan. tech. l. rev., vol. 4, 2011. [31] a. williamson, l. miller, and f. fallon, behind the digital campaign. london: hansard society, 2010. [32] r. mealey, “japan election campaigns ‘a little bit old-fashioned’ with strict laws and billboard bans,” abc.net.au, 2017. [online]. available: https://www.abc.net.au/news/2017-10-14/election-campaigns-injapan-an-old-fashioned-affair/9040624. [accessed: 18-dec-2020]. [33] j. lees-marshment, “political marketing theory and practice: a reply to ormrod’s critique of the leesmarshment market-oriented party model,” politics, vol. 26, no. 2, pp. 119–125, may 2006. [34] g. craig, the media, politics and public life. sydney: allen & unwin, 2004. [35] b. mcnair, an introduction to political communication. new york: routledge, 2003. [36] p. singer and e. brooking, likewar: the weaponization of social media. boston: houghton mifflin harcourt, 2018. [37] e. shearer and e. grieco, “americans are wary of the role social media sites play in delivering the news,” pew research center, 2019. [online]. available: https://www.pewresearch.org/journalism/2019/10/02/americans-are-wary-of-the-role-social-media-sitesplay-in-delivering-the-news/. [accessed: 18-dec-2020]. [38] h. satterfield, “how social media affects politics,” meltwater, 2020. [online]. available: https://www.meltwater.com/en/blog/social-media-affects-politics. [accessed: 18-dec-2020]. [39] b. w. hardy, “can a poll affect perception of candidate traits?,” public opin. q., vol. 69, no. 5, pp. 725–743, jan. 2005. [40] m. bossetta, “the digital architectures of social media: comparing political campaigning on facebook, twitter, instagram, and snapchat in the 2016 u.s. election,” journal. mass commun. q., vol. 95, no. 2, pp. 471–496, jun. 2018. issn 2614-0047 bulletin of social informatics theory and application 37 vol. 5, no. 1, march 2021, pp. 28-37 pratama et.al (a roadmap for the successful use of social media in electoral campaigns) [41] d. kreiss and s. c. mcgregor, “technology firms shape political communication: the work of microsoft, facebook, twitter, and google with campaigns during the 2016 u.s. presidential cycle,” polit. commun., vol. 35, no. 2, pp. 155–177, apr. 2018. [42] t. graham, m. broersma, k. hazelhoff, and g. van ’t haar, “between broadcasting political messages and interacting with voters,” information, commun. soc., vol. 16, no. 5, pp. 692–716, jun. 2013. [43] r. k. garrett, “social media’s contribution to political misperceptions in u.s. presidential elections,” plos one, vol. 14, no. 3, p. e0213500, mar. 2019. [44] h. allcott and m. gentzkow, “social media and fake news in the 2016 election,” j. econ. perspect., vol. 31, no. 2, pp. 211–236, may 2017. [45] m. fernandes, “confirmation bias in social networks,” ssrn electron. j., 2019. [46] r. m. bond et al., “a 61-million-person experiment in social influence and political mobilization,” nature, vol. 489, no. 7415, pp. 295–298, sep. 2012. [47] l. kane, “the attention economy,” human computer interaction, psychology and ux, 2019. [online]. available: https://www.nngroup.com/articles/attention-economy/. [accessed: 18-dec-2020]. [48] p. moy and d. a. scheufele, “media effects on political and social trust,” journal. mass commun. q., vol. 77, no. 4, pp. 744–759, dec. 2000. [49] d. remnick, “obama reckons with a trump presidency,” the political scene, 2016. [online]. available: https://www.newyorker.com/magazine/2016/11/28/obama-reckons-with-a-trump-presidency. [accessed: 18-dec-2020]. [50] i. lapowsky, “here’s how facebook actually won trump the presidency,” wired, 2016. [online]. available: https://www.wired.com/2016/11/facebook-won-trump-election-not-just-fake-news/. [accessed: 18-dec-2020]. [51] statista research department, “number of monthly active facebook users worldwide as of 2nd quarter 2021,” statista, 2021. [online]. available: https://www.statista.com/statistics/264810/number-ofmonthly-active-facebook-users-worldwide/. [accessed: 14-sep-2021]. [52] j. shin, l. jian, k. driscoll, and f. bar, “political rumoring on twitter during the 2012 us presidential election: rumor diffusion and correction,” new media soc., vol. 19, no. 8, pp. 1214–1235, aug. 2017. [53] r. k. garrett, b. e. weeks, and r. l. neo, “driving a wedge between evidence and beliefs: how online ideological news exposure promotes political misperceptions,” j. comput. commun., vol. 21, no. 5, pp. 331–348, sep. 2016. [54] j. bartlett, a. krasodomski-jones, n. daniel, a. fisher, and s. jesperson, “social media for election communication and monitoring in nigeria,” london, 2015. [55] eurostat, “80% of young internet users in the eu27 active on social media,” 2010. [56] t. p. bakker and c. h. de vreese, “good news for the future? young people, internet use, and political participation,” communic. res., vol. 38, no. 4, pp. 451–470, aug. 2011. [57] s. tufail, u. baneen, b. akram, and r. sajid, “impact of social media on political efficacy and vote intention: a case of educated youth,” j. indep. stud. res. manag. soc. sci. econ., vol. 13, no. 1, 2015. [58] r. teixeira and j. halpin, “the path to 270 in 2020,” center of american progress, 2019. [online]. available:https://www.americanprogress.org/issues/politics-andelections/reports/2019/10/24/476315/path-270-2020/. [accessed: 18-dec-2020]. bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 1, march 2022, pp. 31-52 31 https:doi.org/10.31763/businta.v6i1.414 psychological effects of using instagram: its effects on anxiety, self-confidence, and body image leonel hernandez collantes a,1,*, nina aulia saputro b,2, rizky akmaluddin b,3, shinta ayu liliana b,4, yogi khairul umam b,5, yushivan rendi harviansyah b,6 a institucion universitaria de barranquilla iub, colombia b universitas negeri malang, malang, indonesia 1 lhernandezc@itsa.edu.co ; 2 ninaaulia.1805356@students.um.ac.id; 3 rizkyakmaluddin.1805356@students.um.ac.id; 4 shinta.ayu.1805356@students.um.ac.id; 5 yogiumam.1805356@students.um.ac.id; 6 yushivan.rendi.1805356@students.um.ac.id * corresponding author 1. introduction social media has become a primary communication method with the rapid growth of communication technologies. it plays a significant role at an individual level in this modern society. there has been an increasing number of social media sites, such as facebook, twitter, tiktok, and instagram, in the past few years. adolescents are at the most risk of suffering from social media dependence because they are the ones who adapt faster to new technology and are constantly searching for new experiences to find their self-identity [1][2]. over 95% of internet users are adolescents, 81% use social media, and 67% use it at least once a day [2]. the term ‘adolescent’ is used inconsistently to refer to young people from various age groups, and for this paper, ‘adolescence’ refers to young people aged 18 to 25 years. the use of social media has provided more opportunities for people to connect and communicate with each other more efficiently [3][4]. people can connect with anyone from anywhere to learn and share [4]. students can express their thoughts easily, especially those who feel uncomfortable speaking directly [5]. however, it can negatively affect psychology and mental health, such as cyberbullying, self-esteem, and body image [6]. in early 2017, the royal society for public health (rsph) and the young health movement (yhm) surveyed almost 1500 young people aged 14-24 across the uk. the research asks them to score how each social media platform, such as youtube, twitter, instagram, snapchat, and facebook, a r t i c l e i n f o a b s t r a c t article history received december 4, 2021 revised december 21, 2021 accepted february 24, 2022 instagram has become a central social media platform that plays a significant role in this modern society. people spend their time mindlessly scrolling through their instagram feeds, and it is starting to affect their mental health, primarily adolescents, because they are going through a phase of finding their self-identity. this research aims to explore how instagram affects mental health in adolescents. it focuses on the effects of instagram on self-confidence, anxiety, and body image. two types of research have been used according to the object study, descriptive and documentary research, to fulfill the purpose of this study. the research design is non-experimental longitudinal, using the instagram user experience survey as a measurement instrument to collect data and analyze the information. this research was conducted on 99 people from ages 18 to 25 as the subject. the data collection was done by distributing the questionnaire for seven days. as a result, this study shows that instagram affects some users' psychological health in their anxiety and self-confidence and leads to body dissatisfactionc. this is an open access article under the cc–by-sa license. keywords instagram social media psychology self-confidence anxiety body dissatisfaction mailto:lhernandezc@itsa.edu.co http://creativecommons.org/licenses/by-sa/4.0/ http://creativecommons.org/licenses/by-sa/4.0/ 32 bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 1, march 2022, pp. 31-52 collantes et.al (psychological effects of using instagram) impacts their mental health. in the survey, they asked the respondents to what extent each social media platform they use made certain health-related factors better or worse [7]. the research proves that youtube is the most positive social media, followed by twitter, facebook, and snapchat. instagram ranked last and was concluded as the worst social media for young people’s mental health. instagram is a visual-based social media users to share photos and videos [8] first launched in 2010 and is promoted as a medium that can help users to transform an image into a memory to keep around forever [9]. it also has a filter feature to enrich or beautify user photos [10]. that is why this platform allows users to manipulate their photos. therefore, instagram users prefer to promote an ideal self by editing their photos to be as perfect as possible to expose them to other users, which can lead to unfavorable life comparisons [11]. besides, instagram has a comment and like feature by doubletapping the post or tapping the heart icon. being a visual-based social media, instagram users will be more likely to see the posts of other users posted, and people will assume that the photos the other users posted indicate how the people in them actually live. forgetting that the photos can be manipulated to appear more perfect and different from reality. this may result in triggering feelings of distress that lead to self-comparison. according to previous research, instagram users show decreasing body satisfaction, decreasing positive affect, and increasing the negative effect on their mental health [12]. besides, the “likes” and comment features can sometimes lead to excessively posting photos and videos to gain another user’s attention so that the user will constantly check the notifications for the photos and videos they posted impulsively [13]. furthermore, instagram has been associated with loneliness because they may not receive social support from their followers [14]. other adverse effects that instagram can cause are unfavorable social comparison, social anxiety, body image dissatisfaction, and low self-confidence [14]. this study focuses on the influence of instagram on the level of self-confidence experienced by instagram users based on the number of likes and comments they receive on their posts, the anxiety experienced by users while using instagram, and the body image issues experienced by instagram users caused by beauty filters. 2. literature review – previous works 2.1. social media and social anxiety social anxiety is a type of anxiety disorder caused by fear and anxiety when interacting or being negatively evaluated by others during social interactions [15]. it is found that social anxiety is related to negative social feedback, interpersonal rumination, a trait of perfectionism, and perfectionist selfpresentation. people with social anxiety are typically shy when they meet new people, quiet and uncomfortable when meeting new people, and withdrawn in unfamiliar social settings [16]. people with social anxiety find online communication more comfortable and prefer face-to-face interactions [17]. however, online social interaction can lead to problematic outcomes such as loneliness [18]. the internet has significantly influenced our lives throughout the last decade, impacting how we interact and communicate [18]. social comfort, time spent online, and problematic internet use (piu) strongly correlated with social anxiety as age increased [17]. problematic internet use (piu) is a syndrome of cognitive and behavioral symptoms that result in negative social, academic, and professional consequences [18]. when using social media, people often selectively reveal their personalities and construct their preferred identities or characteristics to show others. when users are notified about other people’s life update through social media posting, they subconsciously practice social comparison, which will decrease their mental well-being. one study found that late adolescents and adults embracing more indications of addictive social media use were reported to have more anxiety symptoms [19]. it is because people are becoming more aware of distressing occasions in other people’s lives and disguising the pressure to keep up with social network updates. privacy concerns can also significantly influence social anxiety when using social media because certain potential privacy risks are disclosed through social media use [20]. adolescents with deep concerns for privacy and security may be socially anxious because they are more likely to avoid sharing and uncovering personal data online [20]. issn 2614-0047 bulletin of social informatics theory and application 33 vol. 6, no. 1, march 2022, pp. 31-52 collantes et.al (psychological effects of using instagram) 2.2. instagram “likes” and online validation instagram has several features besides the upload photos and videos feature, including the poststory feature, beauty filters, comments, and like feature under each photo post. users can click on the “like” button with a heart shape under every post on instagram to show their agreement with the particular posts on instagram [21]. instagram users can express their positive attitude toward any content posted on instagram by double-tapping heart-shaped buttons to give the post a “like”. instagram users who use the “like” button are often reported to have more excellent bonding with social media [22]. adolescence mainly focuses on seeking validation and attention through this “like” feature that instagram provides. instagram is considered a self-expression and self-promotion platform [23], and users often promote their account and content by saying things such as “please follow me, and i will follow you back” in their bio or by adding more tags and hashtags to their photos [24]. dependent individuals with a self-critical issues use social media to fulfill their needs for self-presentation [23] and being more vulnerable to being liked or rejected [25]. however, users more focused on self-worth issues are more likely to use instagram to deceive others and feel the need to seek support and validation from others [23] in the form of “likes” and comments they receive on social media. some instagram users feel that they do not live up to their standards or ideals [23], and they would feel helpless without support from others. a study shows that instagram posts containing faces are 32% more likely to receive comments and 38% more likely to receive likes [26]. users who post their photos more frequently can express their “true selves” online more than users who post less [27]. the number of likes can measure the engagement of the post and a strong signal of whether another user liked the photo [26]. users with a self-critical personality may feel like a failure due to fewer “likes” they receive on a post or following someone and not being followed back as a threat to their self-worth [23]. 2.3. instagram effects on body image social media give us more opportunities for connectivity and self-expression [28]. however, increasing social media use is linked to body image concerns [29]. body image refers to an individual’s impression of their physical self and the thoughts, both positive and negative feelings, which result from that perception of their body [30]. researchers have found that social media plays a role in affecting body image based on beauty trends that are happening and concerns regarding selfesteem issues [31]. the body image issue can occur by using instagram because it is a photo-based social media, which means that users can cautiously select the photo they wish to post and enhance the photo with filtering and editing features to manage their self-presentation [29]. instagram use requires a photo or video to be posted with or without textual content that other users can view, “like”, and comment on [28]. moreover, social media can trigger unfavorable social comparisons in individuals, such as believing others are happier and have better lives [19]. instagram has a beauty filter feature that allows users to alter their appearances, which can provide smooth and lighter skin tones, more enormous eyes, and thinned faces. this beauty filter feature can change the perception of beauty that leads to idealizing their photo to fit the unrealistic self-image [32]. this may result in body dissatisfaction. when people alter a photo to change the way they looklike to achieve the perfect image of their face and body to achieve a you-but-better-version image, people may start to think that that is what they should look like and make them feel unattractive in real life [33]. adolescence is a crucial age for body image development in which positive or negative development of body image, self-esteem, and body dissatisfaction can sometimes leads to eating disorder behavior [31], [34]. social media portrays beauty standards as a perfect slender, lean body [31] being more beautiful compared to overweight women [35]. this problem encourages and delivers anti-obesity messages [31]. adolescents are vulnerable to comparison, and they feel the need to improve their beauty standards, so they feel dissatisfied with their bodies and leave them questioning their self-worth, which can drive them to self-harm behavior. 3. method this research applies two types of methodology: documentary and descriptive. descriptive because it describes the characteristics of low self-confidence, anxiety, and body dysmorphia in the 34 bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 1, march 2022, pp. 31-52 collantes et.al (psychological effects of using instagram) sample studied. documentary because various documentary sources are reviewed and analyzed. for the elaboration of this project, it is necessary to collect information from existing literature and gather information through data collection techniques to reinforce concepts and terms in distinct stages in the optimal development of the object of study. the research design is non-experimental longitudinal, using the instagram user experience survey as a measurement instrument to collect data and analyze the information. this research was conducted on 99 people from ages 18 to 25 as the subject. the data was collected by distributing the questionnaire for seven days with 21 questions. questions are divided into four categories, namely general questions about the use of instagram, the experience of instagram users' anxiety that they are experiencing while using instagram, self-confidence and self–expression issues of the instagram user, and the body image issue that instagram users are experiencing. the questionnaire model uses the likert model, a question that aims to find out opinions or someone's perception of the choices offered by researchers on a 5point scale (1 = definitely disagree, 5 = definitely agree). the stages of the project and the resources used to carry out the study using longitudinal non-experimental research design. fig. 1 shows the stages of the project. fig. 1. stages of the project [36] 4. results and discussion 4.1. authors and affiliations table. 1 shows the general use of instagram users. in the survey, we asked the respondents five questions regarding this topic: how often do you open instagram every day? do you feel addicted to instagram? do you private your account? do you frequently upload photos on instagram? do you often create instastory? moreover, fig. 2 to fig. 6 shows the result of the survey for each question. table.1 the general use of instagram user question answer quantity mean median modus varian how often do you open instagram everyday? 1 7 3,575758 4 5 1,634508 2 14 3 26 4 19 5 33 total 354 1 14 2,858589 3 3 1,634508 2 24 issn 2614-0047 bulletin of social informatics theory and application 35 vol. 6, no. 1, march 2022, pp. 31-52 collantes et.al (psychological effects of using instagram) question answer quantity mean median modus varian do you feel addicted to instagram? 3 32 4 20 5 9 total 283 do you private your account? yes 41,4% 1,414141 1 1 0,245104 no 58,6% total 140 do you frequently upload photos on instagram? 1 49 1,787879 2 1 0,883117 2 28 3 17 4 4 5 1 total 177 do you often create instastory? 1 35 2,030303 2 1 0,886827 2 33 3 24 4 7 5 0 total 201 fig. 2 shows the frequency of daily instagram use among the 99 respondents to the question, “how often do you open instagram every day?” the highest; amounted to 33.3% of respondents who open instagram very often. 19.2% of respondents open it often and only 26.3% open it usually. the remaining respondents open it rarely 14.1% and very rarely, with 7.1% then, the following fig. 3 illustrates the addiction they feel while using instagram the 99 research subjects. fig. 2. the daily instagram use fig. 3 shows their instagram addiction from the 99 research subjects asking, “do you feel addicted to instagram?” the highest, 9.1% of respondents, feel very addicted to instagram. 20.2% of 36 bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 1, march 2022, pp. 31-52 collantes et.al (psychological effects of using instagram) respondents feel pretty addicted to it, and 24.2% feel they may get addicted. the rest of the respondents feel a little addicted, with 32.3% and only 7.1% not feeling addicted to instagram. then, the following fig. 4 illustrates the number of respondents who privatize their instagram account from the 99 research subjects. fig. 3. the instagram addiction fig. 4 shows the number of respondents who privatize their instagram account from the 99 research subjects asking, “do you private your account?” 41.4% of respondents privatize their instagram account while 58.6% open their accounts publicly. then, the following fig. 5 illustrates the number of respondents who often upload their photos on instagram and the 99 research subjects. fig. 4. the instagram privatize account fig. 5 shows the number of respondents who often upload their photos on instagram from the 99 research subjects from the question “do you frequently upload your photos on instagram?” the highest; amounted to 49.5% of respondents uploading their photos very rarely, and 28.3% rarely issn 2614-0047 bulletin of social informatics theory and application 37 vol. 6, no. 1, march 2022, pp. 31-52 collantes et.al (psychological effects of using instagram) upload their photos. moreover, 17.2% upload their photo at a regular frequency. the rest of the respondents often upload their photos to instagram, with 4.0% of respondents and only 1.0% of respondents uploading their photos very often. then, the following fig. 6 illustrates the instastory post frequency from the 99 research subjects. fig. 5. the instagram upload frequency fig. 6 shows the instastory post frequency on instagram from the 99 research subjects from the question “do you often create instastory?” the highest; amounted to 35.4% of respondents upload their photo on instastory very rare and 33.3% rarely upload their photos on instastory. moreover, 24.2% upload their instastory at regular frequency. the rest of the respondents often upload their photos to instastory, with 7.1% of respondents. fig. 6. the instastory post frequency 38 bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 1, march 2022, pp. 31-52 collantes et.al (psychological effects of using instagram) 4.2. anxiety that users experience while using instagram table. 2 shows the experience of the respondents regarding anxiety issues they experienced while using instagram. in the survey, we asked the respondents five questions regarding this topic: how often do you open instagram every day? do you fear being left behind (fear of missing out) if you do not open instagram? do you feel anxious after uploading your photo on instagram? do you feel anxious if no one comments on the photos you upload? do you feel anxious after uploading instastory? moreover, fig. 7 to fig. 11 show the result of the survey for each question. table.2 the experience of instagram user's anxiety that they are experiencing while using instagram question answer quantity mean median modus varian do you feel anxious if you do not open instagram? 1 42 1,828283 2 1 0,796743 2 38 3 14 4 4 5 1 total 181 do you fear being left behind (fear of missing out) if you do not open instagram? 1 38 2 2 1 1,081633 2 35 3 17 4 6 5 3 total 198 do you feel anxious after uploading your photo on instagram? 1 31 2,454545 2 1 1,781076 2 25 3 21 4 11 5 11 total 243 do you feel anxious if no one comments on the photos you upload? 1 58 1,646465 1 1 0,741084 2 20 3 19 4 2 5 0 total 163 do you feel anxious after uploading instastory? 1 60 1,676768 1 1 1,037312 2 20 3 13 4 3 5 3 total 166 fig. 7 shows the anxiety when they don’t open instagram from the 99 research subjects asking, “do you feel anxious if you do not open instagram?” the highest; amounted to 42.4% of respondents very rare to feel anxious, and 38.4% rarely feel anxious when they do not open instagram. moreover, 14.1% feel anxious at a regular frequency. the rest of the respondents often feel anxious when they do not open instagram, with 4.0% of respondents and only 1.0% of respondents feeling very anxious when they do not open instagram. then, the following fig. 8 illustrates the feeling of fear of missing out (fomo) frequency from the 99 research subjects. issn 2614-0047 bulletin of social informatics theory and application 39 vol. 6, no. 1, march 2022, pp. 31-52 collantes et.al (psychological effects of using instagram) fig. 7. the anxiousness when they do not open instagram fig. 8 shows the feeling of fear of missing out (fomo) frequency from the 99 research subjects from the question, “do you feel afraid of being left behind (fear of missing out) if you do not open instagram?” the highest; amounted to 38.4% of respondents very rare to feel fomo, and 35.4% rarely feel fomo when they do not open instagram. furthermore, 17.2% feel fomo at a regular frequency. the rest of the respondents often feel fomo when they do not open instagram, with 6.1% of respondents and only 3.0% of respondents feeling very afraid of being left behind when they do not open instagram. then, the following fig. 9 illustrates the feeling of anxiousness after they upload a photo from the 99 research subjects. fig. 8. the fomo frequency fig. 9 shows the feeling of anxiousness after they upload a photo on instagram from the 99 research subjects from the question, “do you feel anxious after uploading your photo on instagram?” the highest; amounted to 31.1% of respondents very rarely feeling anxious, and 25.3% rarely feel anxious 40 bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 1, march 2022, pp. 31-52 collantes et.al (psychological effects of using instagram) after uploading a photo on instagram. furthermore, 21.2% sometimes feel anxious. the rest of the respondents often feel anxious after they upload a photo on instagram, with 11.1% of respondents and another 11.1% of respondents feeling anxious very often after they upload a photo on instagram. then, the following fig. 10 illustrates the relation between anxiousness from the comments they receive on their instagram post from the 99 research subjects. fig. 9. the anxiousness after they upload a photo fig. 10 shows the relation between anxiousness from the comments they receive on their instagram post from the 99 research subjects from the question, “do you feel anxious if no one comments on the photos you upload?” the highest was 58.6% of respondents very rarely feel anxious, and 20.2% rarely feel anxious when no one comments on the photos they post on instagram. furthermore, 19.2% sometimes feel anxious. the rest of the respondents often feel anxious when no one comments on their instagram posts, with 2.0% of respondents. then, the following fig.11 illustrates the anxiousness when they upload instastory from the 99 research subjects. fig. 10. the relation between anxiousness and the comments they receive issn 2614-0047 bulletin of social informatics theory and application 41 vol. 6, no. 1, march 2022, pp. 31-52 collantes et.al (psychological effects of using instagram) fig. 11 shows the anxiousness after uploading instastory from the 99 research subjects from the question “do you feel anxious after uploading instastory?” the highest; amounted to 60.7% of respondents very rarely feel anxious, and 20.2% rarely feel anxious when no one comments on the photos they post on instagram. furthermore, 13.1% sometimes feel anxious. the rest of the respondents often feel anxious after uploading instastory, with 3.0% of respondents and another 3.0% of respondents feeling anxious very often after they upload instastory on instagram. fig. 11. the anxiousness when they upload instantly 4.3. self-confident instagram user table. 3 shows the experience of the respondents regarding self-confidence and self-expression they experienced while using instagram. in the survey, we asked the respondents five questions regarding this topic: do you feel confident about uploading your photos on instagram? are you afraid to express yourself on instagram? do you feel confident when many people like the photos you upload? do you feel confident about showing your personal life on instagram? do you feel like you have to show your everyday life on instagram? furthermore, fig. 12 to fig. 16 shows the result of the survey for each question. table.3 the self-confidence and self–expression of instagram user question answer quantity mean median modus variants do you feel confident about uploading your photos on instagram? 1 23 1.,878788 3 3 1,842301 2 13 3 31 4 17 5 15 total 285 are you afraid to express yourself on instagram? 1 24 2,666667 3 3 1,571429 2 17 3 36 4 12 5 10 total 264 1 5 3,555556 4 3 1,39229 2 13 42 bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 1, march 2022, pp. 31-52 collantes et.al (psychological effects of using instagram) question answer quantity mean median modus variants do you feel confident when many people like the photos you upload? 3 31 4 22 5 28 total 352 do you feel confident about showing your personal life on instagram? 1 37 2,10101 2 1 1,010101 2 23 3 31 4 8 5 0 total 208 do you feel like you have to show your everyday life on instagram? 1 83 1,181818 1 1 0,191095 2 14 3 2 4 0 5 0 total 117 fig. 12 shows the self-confidence of the 99 research subjects from the question, “do you feel confident about uploading your photos on instagram?” the highest; amounted to 31.3% of respondents sometimes feeling confident, and 23.2% rarely feel confident about posting their photos on instagram. furthermore, 17.2% feel confident, and 15.2% feel very confident about posting their photo on instagram. the rest of the respondents, 13.1%, feel rarely confident about posting their photos on instagram. then, the following fig. 13 illustrates the self-expression frequency from the 99 research subjects. fig. 12. the confidence in uploading the photo fig. 13 shows the self-expression frequency of the 99 research subjects from the question, “are you afraid to express yourself on instagram?” the highest; amounted to 36.4% of respondents afraid to express themselves on instagram, and 24.2% of respondents very rare to feel afraid of expressing themselves. moreover, 17.2% rarely feel afraid, and 12.1% often feel afraid to express themselves on instagram. the rest of the respondents, 10.1%, often feel afraid to express themselves on instagram. issn 2614-0047 bulletin of social informatics theory and application 43 vol. 6, no. 1, march 2022, pp. 31-52 collantes et.al (psychological effects of using instagram) then, the following fig. 14 illustrates the relationship between self-confidence and the amount of “likes” they receive on instagram from the 99 research subjects. fig. 13. the self-expression frequency fig. 14 shows the relation between self-confidence and the amount of “likes” they receive on instagram from the 99 research subjects from the question, “do you feel confident when many people like the photo you upload?” the highest; amounted to 31.3% of respondents sometimes feel confident, and 28.3% very often feel confident when they get many likes on their instagram posts. 22.2% of respondents often feel confident, and 13.1% rarely feel confident. the rest of the respondents, 5.1%, sporadic to feel confident when they got many likes on their instagram posts. then, the following fig. 15 illustrates the self-confidence they experienced when they showed their personal life on instagram from the 99 research subjects. fig. 14. the relation between self-confidence and the “likes” amount they receive fig. 15 shows the self-confidence they experience when they show their personal life on instagram. from the 99 research subjects, "do you feel confident about showing your personal life on 44 bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 1, march 2022, pp. 31-52 collantes et.al (psychological effects of using instagram) instagram?” the highest; amounted to 37.4% of respondents very rare to feel confident, and 31.3% sometimes feel confident about showing their personal life on instagram. 23.2% of respondents rarely feel confident, and the rest of the respondents, 8.1%, often feel confident about showing their personal life on instagram. then, the following fig. 16 illustrates the need to show their personal life on instagram to the 99 research subjects. fig. 15. the confidence in showing their life fig. 16 shows the need to show their personal life on instagram from the 99 research subjects asking, “do you feel like you have to show your everyday life on instagram?” the highest, 83.8% of respondents feel very rare, and 14.1% rarely feel the need to show their personal life on instagram. the rest of the respondents, 2%, sometimes need to show their personal life on instagram. fig. 16. the need to show their life issn 2614-0047 bulletin of social informatics theory and application 45 vol. 6, no. 1, march 2022, pp. 31-52 collantes et.al (psychological effects of using instagram) 4.4. body image issue from using instagram table. 4 shows the experience of the respondents regarding the body image issue they experienced while using instagram. in the survey, we asked the respondents five questions regarding this topic: do you like to compare yourself to others after seeing photos of other people's accounts? do you often use photo filters when uploading photos on instagram? do you feel more confident when you upload photos using filters? do you feel confident when you upload photos without filters? have you been bullied on instagram because of your body? moreover, fig. 17 to fig. 21 shows the result of the survey for each questio. table.4 the body image issue that instagram’s user experiencing question answer quantity mean median modus variant do you like to compare yourself to others after seeing photos or other people's accounts? 1 41 2,363636 2 1 2,070501 2 17 3 18 4 10 5 13 total 234 do you often use photo filters when uploading photos on instagram? 1 21 3,070707 3 3 1,964337 2 11 3 26 4 22 5 19 total 304 do you feel more confident when you upload photos using filters? 1 13 3,262626 3 3 1,399711 2 5 3 39 4 27 5 15 total 323 do you feel confident when you upload photos without filters? 1 14 3,151515 3 3 1,476809 2 10 3 36 4 25 5 14 total 312 have you been bullied on instagram because of your body? yes 6,1% 1,060606 1 1 0,057514 no 93,9% total 105 fig. 17 shows the need to compare themselves to others on instagram from the 99 research subjects asking, “do you like to compare yourself to others after seeing photos of other people’s accounts?” the highest; amounted to 41.4% of respondents, who are very rare to compare themselves, and 17.2% rarely compare themselves on instagram. 10.2% of respondents sometimes compare themselves with other people. of the rest of the respondents, 10.1% often compare themselves, and 13.1% of respondents compare themselves very often while using instagram. then, the following fig. 18 illustrates the frequency of photo filter use while using instagram from the 99 research subjects. 46 bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 1, march 2022, pp. 31-52 collantes et.al (psychological effects of using instagram) fig. 17. the need to compare to others fig. 18 shows the frequency of photo filters used on instagram by the 99 research subjects from the question, “do you often use photo filters when uploading photos on instagram?” the highest, 26.3% of respondents, sometimes use photo filters, and 22.2% often use photo filters on instagram. 21.2% of respondents rarely use photo filters, and 19.2% use photo filters very often. the rest of the respondents, 11.1%, rarely use photo filters. then, the following fig. 19 illustrates the confidence level when they used a filter on instagram for the 99 research subjects. fig. 18. the frequency of photo filter use fig. 19 shows the confidence level when they use a filter on instagram from the 99 research subjects from the question, “do you feel more confident when you upload photos using filters?” the highest mounted to 39.4% of respondents, sometimes feel more confident when they use photo filters, and 27.3% of respondents also often feel more confident using filters. 15.2% of respondents often feel more confident when they upload photos using filters. of the rest of the respondents, 5.1% rarely feel more confident while using filters, and 13.1% of respondents very rare to feel more confident while issn 2614-0047 bulletin of social informatics theory and application 47 vol. 6, no. 1, march 2022, pp. 31-52 collantes et.al (psychological effects of using instagram) using filters. then, the following fig. 20 illustrates the confidence level when they upload a photo without filters on instagram from the 99 research subjects. fig. 19. the confidence level when they use filters fig. 20 shows the confidence level when they upload a photo without using filters on instagram from the 99 research subjects from the question “do you feel confident when you upload photos without filters?” the highest, amounting to 36.4% of respondents, sometimes feel confident when they upload a photo without filters, and 25.3% of respondents often feel confident without filters. 14.1% of respondents often feel confident when they upload a photo without using filters. of the rest of the respondents, 10.1% rarely feel confident without using filters, and 14.1% of respondents sporadic to feel confident when they upload a photo without using filters. then, the following fig. 21 illustrates the number of respondents experiencing online bullying on instagram from the 99 research subjects. fig. 20. the confidence level when they upload a photo without filters fig. 21 shows the respondents who experienced online bullying on instagram from the 99 research subjects asking, “have you been bullied on instagram because of your body?” the highest was 93.9% of respondents, who had never been bullied on instagram. of the rest of the respondents, 6.1% respondents experienced online bullying on instagram because of their body image. 48 bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 1, march 2022, pp. 31-52 collantes et.al (psychological effects of using instagram) fig. 21. the online bullying frequency 4.5. discussions the findings of this research confirmed that 29.3% of 99 respondents aged 18 to 25 feel addicted to instagram, and 52.5% open instagram very often in their daily life. among the 99 research subjects, 5% feel anxious if they do not open instagram. the previous study shows that people with interpersonal and emotionally disturbed problems prefer interacting in the virtual world and social networks like instagram rather than communicating directly with others [37]. this behavior leads to addiction, which can happen because instagram is considered a source of information, especially on social events. when they do not open instagram, they are afraid that they will be left behind. this problem can lead to feeling fomo or fear of missing out, and 9.1% of respondents experienced it. this finding is similar to previous research that people spend more than 30 minutes per day on instagram, and those who are addicted to instagram spend more than 90 minutes per day scrolling through instagram [38]. the need to always catch up with the news and events that are currently happening on social media can make us feel overwhelmed. without knowing, we will absorb information without choosing between good or bad news. when we absorb lousy information, this will lead to feelings of unhappiness, which result in anxiety. moreover, instagram is a public platform, meaning everyone can see your posts. a previous study found that seeing an attractive image of other people posted can negatively impact the user's feelings [39]. some people with social anxiety often guess and overthink other people’s opinions about their life and their photos on instagram. fig. 22 shows the frequency of respondents who feel anxious after they upload a photo on instagram. fig. 22. the anxiousness because of an instagram post issn 2614-0047 bulletin of social informatics theory and application 49 vol. 6, no. 1, march 2022, pp. 31-52 collantes et.al (psychological effects of using instagram) according to the findings, 21.2% of respondents from the 99 research subjects feel afraid to express themselves on instagram, and 36.3% do not feel confident about uploading their photos on instagram. this can happen because they observe other people’s lives too much, so they are afraid to express themselves. previous research found that people with this condition are more likely to fear intimacy and attachment [37]. they try to blend in with the existing trends and beauty standards, so they forget their characteristics. from the findings, 60.5% of respondents feel confident when many like the photos they upload on their instagram. this can lead to the need to seek validation through the number of likes they receive on their instagram post. a previous study shows that when users focus more on gaining the number of likes they receive on their post, they will more likely weaken the feeling of belonging with peers and may sabotage genuine relationships [39]. by seeking online validation, we will constantly try to fit in society and the impossible standards of society. furthermore, if we cannot fit in, we feel unconfident in expressing ourselves on social media. fig. 23 shows the frequency of respondent who feels confident when many people like the photo they upload. fig. 23. the relation between likes and confidence then, based on the obtained findings, 24.2% of respondents from the 99 research subjects felt confident about posting their photos without a beauty filter. this shows the body image issue that instagram users are experiencing. they feel more comfortable posting their photos using beauty filters [33] that can enhance their beauty to look more perfect, such as smoother and lighter skin, thinner faces, and bigger eyes. when they use filters too much, they will feel uncomfortable showing their natural body [31]. they refuse to accept that it is normal to have skin problems, such as acne. they will constantly think about their flaws and imperfections, which leads to body dissatisfaction. fig. 24 shows the frequency of respondents who feel more confident posting their photos with a filter. fig. 24. photo filter and confidence 50 bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 1, march 2022, pp. 31-52 collantes et.al (psychological effects of using instagram) 5. conclusion the conclusion of this study is as follows. first, instagram, as a visual-based social media, has the potential to make users addicted, just like any other social media. moreover, instagram users are at the most risk of anxiety due to worry because of the thoughts of how others would see and portray them on instagram. second, the impact of instagram use is that it can lead to low self-confidence because when they scroll through their instagram feeds, users will see the photos that other users posted and will compare themselves with others. this behavior can impact the feeling of dissatisfaction about their own life, and they try to manipulate their instagram photos to look as good as possible. third, instagram's beauty filters can make users dissatisfied with their bodies. because of its feature to edit pictures and enhance looks and appearances, people will idealize their unrealistic self-image. it changes the perception of self and beauty standards, which is impossible, especially for young women. references [1] f. bányai et al., “problematic social media use: results from a large-scale nationally representative adolescent sample,” plos one, vol. 12, no. 1, pp. 10–14, 2017, doi: 10.1371/journal.pone.0169839. [2] l. m. yonker, s. zan, c. v. scirica, k. jethwani, and t. b. kinane, “‘friending’ teens: systematic review of social media in adolescent and young adult health care,” j. med. internet res., vol. 17, no. 1, p. e4, 2015, doi: 10.2196/jmir.3692. [3] k. a. allen, t. ryan, d. l. gray, d. m. mcinerney, and l. waters, “social media use and social connectedness in adolescents: the positives and the potential pitfalls,” aust. educ. dev. psychol., vol. 31, no. 1, pp. 18–31, 2014, doi: 10.1017/edp.2014.2. [4] w. akram and r. kumar, “a study on positive and negative effects of social media on society,” int. j. comput. sci. eng., vol. 5, no. 10, pp. 351–354, 2017, doi: 10.26438/ijcse/v5i10.351354. [5] s. siddiqui and t. singh, “social media its impact with positive and negative aspects,” int. j. comput. appl. technol. res., vol. 5, no. 2, pp. 71–75, 2016, doi: 10.7753/ijcatr0502.1006. [6] j. shah, p. das, n. muthiah, and r. milanaik, “new age technology and social media: adolescent psychosocial implications and the need for protective measures,” curr. opin. pediatr., vol. 31, no. 1, pp. 148–156, 2019, doi: 10.1097/mop.0000000000000714. [7] royal society for public health, “social media and young people’ s mental health and wellbeing,” r. soc. public heal., no. may, p. 32, 2017. [online]. available at: https://www.rsph.org.uk/static/uploaded/d125b27c-0b62-41c5-a2c0155a8887cd01.pdf. [8] n. b. yarbil and n. argaç, “a first analysis of instagram photo content and user types,” front. math. china, vol. 12, no. 1, pp. 247–260, 2017, doi: 10.1007/s11464-016-0589-9. [9] e. lee, j. a. lee, j. h. moon, and y. sung, “pictures speak louder than words: motivations for using instagram,” cyberpsychology, behav. soc. netw., vol. 18, no. 9, pp. 552–556, 2015, doi: 10.1089/cyber.2015.0157. [10] h. chen, “college-aged young consumers’ perceptions of social media marketing: the story of instagram,” j. curr. issues res. advert., vol. 39, no. 1, pp. 22–36, 2018, doi: 10.1080/10641734.2017.1372321. [11] g. fioravanti, a. prostamo, and s. casale, “taking a short break from instagram: the effects on subjective well-being,” cyberpsychology, behav. soc. netw., vol. 23, no. 2, pp. 107–112, 2020, doi: 10.1089/cyber.2019.0400. [12] r. engeln, r. loach, m. n. imundo, and a. zola, “compared to facebook, instagram use causes more appearance comparison and lower body satisfaction in college women,” body image, vol. 34, pp. 38– 45, 2020, doi: 10.1016/j.bodyim.2020.04.007. [13] k. kircaburun and m. d. griffiths, “instagram addiction and the big five of personality: the mediating role of self-liking,” j. behav. addict., vol. 7, no. 1, pp. 158–170, 2018, doi: https://doi.org/10.1371/journal.pone.0169839 https://doi.org/10.2196/jmir.3692 https://doi.org/10.1017/edp.2014.2 https://doi.org/10.26438/ijcse/v5i10.351354 https://doi.org/10.7753/ijcatr0502.1006 https://doi.org/10.1097/mop.0000000000000714 https://www.rsph.org.uk/static/uploaded/d125b27c-0b62-41c5-a2c0155a8887cd01.pdf. https://doi.org/10.1007/s11464-016-0589-9 https://doi.org/10.1089/cyber.2015.0157 https://doi.org/10.1080/10641734.2017.1372321 https://doi.org/10.1089/cyber.2019.0400 https://doi.org/10.1016/j.bodyim.2020.04.007 issn 2614-0047 bulletin of social informatics theory and application 51 vol. 6, no. 1, march 2022, pp. 31-52 collantes et.al (psychological effects of using instagram) 10.1556/2006.7.2018.15. [14] c. yurdagül, k. kircaburun, e. emirtekin, p. wang, and m. d. griffiths, “psychopathological consequences related to problematic instagram use among adolescents: the mediating role of body image dissatisfaction and moderating role of gender,” int. j. ment. health addict., vol. 19, no. 5, pp. 1385–1397, oct. 2021, doi: 10.1007/s11469-019-00071-8. [15] “social anxiety disorder: more than just shyness.” accessed mar. 31, 2018. [online]. available at: https://www.nimh.nih.gov/health/publications/social-anxiety-disorder-more-than-just-shyness. [16] m. b. stein and d. j. stein, “social anxiety disorder,” lancet, vol. 371, no. 9618, pp. 1115–1125, 2008, doi: 10.1016/s0140-6736(08)60488-2. [17] s. prizant-passal, t. shechner, and i. m. aderka, “social anxiety and internet use a meta-analysis: what do we know? what are we missing?,” comput. human behav., vol. 62, pp. 221–229, 2016, doi: 10.1016/j.chb.2016.04.003. [18] s. e. caplan, “relations among loneliness, social anxiety, and problematic internet use,” cyberpsychology behav., vol. 10, no. 2, pp. 234–242, 2007, doi: 10.1089/cpb.2006.9963. [19] a. vannucci, k. m. flannery, and c. m. c. ohannessian, “social media use and anxiety in emerging adults,” j. affect. disord., vol. 207, no. august 2016, pp. 163–166, 2017, doi: 10.1016/j.jad.2016.08.040. [20] y. alkis, z. kadirhan, and m. sat, “development and validation of social anxiety scale for social media users,” comput. human behav., vol. 72, pp. 296–303, 2017, doi: 10.1016/j.chb.2017.03.011. [21] c. t. ting, “city university of hong kong a study on motives , usage , self-presentation and number of followers on instagram submitted to department of applied social studies,” 2014. [online]. available at: http://lbms03.cityu.edu.hk/oaps/ss2014-4595-ctt656.pdf. [22] e. frison and s. eggermont, “browsing, posting, and liking on instagram: the reciprocal relationships between different types of instagram use and adolescents’ depressed mood,” cyberpsychology, behav. soc. netw., vol. 20, no. 10, pp. 603–609, 2017, doi: 10.1089/cyber.2017.0156. [23] c. a. jackson and a. f. luchner, “self-presentation mediates the relationship between self-criticism and emotional response to instagram feedback,” pers. individ. dif., vol. 133, pp. 1–6, 2018, doi: 10.1016/j.paid.2017.04.052. [24] j. y. jang, k. han, p. c. shih, and d. lee, “generation like: comparative characteristics in instagram,” conf. hum. factors comput. syst. proc., vol. 2015-april, pp. 4039–4042, 2015, doi: 10.1145/2702123.2702555. [25] a. besser and b. priel, “dependency, self-criticism and negative affective responses following imaginary rejection and failure threats: meaning making processes as moderators or mediators,” psychiatry, vol. 74, no. 1, pp. 31–40, 2011, doi: 10.1521/psyc.2011.74.1.31. [26] s. bakhshi, d. a. shamma, and e. gilbert, “faces engage us: photos with faces attract more likes and comments on instagram,” conf. hum. factors comput. syst. proc., pp. 965–974, 2014, doi: 10.1145/2556288.2557403. [27] n. h. o’donnell, “storied lives on instagram: factors associated with the need for personal-visual identity,” vis. commun. q., vol. 25, no. 3, pp. 131–142, 2018, doi: 10.1080/15551393.2018.1490186. [28] a. c. couture bue, “the looking glass selfie: instagram use frequency predicts visual attention to highanxiety body regions in young women,” comput. human behav., vol. 108, no. august 2019, p. 106329, 2020, doi: 10.1016/j.chb.2020.106329. [29] m. tiggemann, s. hayden, z. brown, and j. veldhuis, “the effect of instagram ‘likes’ on women’s social comparison and body dissatisfaction,” body image, vol. 26, pp. 90–97, 2018, doi: 10.1016/j.bodyim.2018.07.002. [30] j. fardouly and l. r. vartanian, “social media and body image concerns: current research and future directions,” curr. opin. psychol., vol. 9, pp. 1–5, 2016, doi: 10.1016/j.copsyc.2015.09.005. [31] m. henriques and d. patnaik, “social media and its effects on beauty,” intech, no. september, 2020. https://doi.org/10.1556/2006.7.2018.15 https://doi.org/10.1007/s11469-019-00071-8 https://www.nimh.nih.gov/health/publications/social-anxiety-disorder-more-than-just-shyness https://doi.org/10.1016/s0140-6736(08)60488-2 https://doi.org/10.1016/j.chb.2016.04.003 https://doi.org/10.1089/cpb.2006.9963 https://doi.org/10.1016/j.jad.2016.08.040 https://doi.org/10.1016/j.chb.2017.03.011 http://lbms03.cityu.edu.hk/oaps/ss2014-4595-ctt656.pdf https://doi.org/10.1089/cyber.2017.0156 https://doi.org/10.1016/j.paid.2017.04.052 https://doi.org/10.1145/2702123.2702555 https://doi.org/10.1521/psyc.2011.74.1.31 https://doi.org/10.1145/2556288.2557403 https://doi.org/10.1080/15551393.2018.1490186 https://doi.org/10.1016/j.chb.2020.106329 https://doi.org/10.1016/j.bodyim.2018.07.002 https://doi.org/10.1016/j.copsyc.2015.09.005 52 bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 1, march 2022, pp. 31-52 collantes et.al (psychological effects of using instagram) [online]. available at: https://ssyj.babol.iau.ir/article_533425.html. [32] j. v. wang, e. a. rieder, e. schoenberg, c. b. zachary, and n. saedi, “patient perception of beauty on social media: professional and bioethical obligations in esthetics,” j. cosmet. dermatol., vol. 19, no. 5, pp. 1129–1130, 2020, doi: 10.1111/jocd.13118. [33] j. eshiet, “‘real me versus social media me:’ filters, snapchat ‘real me versus social media me:’ filters, snapchat dysmorphia, and beauty perceptions among young dysmorphia, and beauty perceptions among young women women,” 2020. [online]. available: https://scholarworks.lib.csusb.edu/etd/1101/. [34] j. reel, d. voelker, and c. greenleaf, “weight status and body image perceptions in adolescents: current perspectives,” adolesc. health. med. ther., p. 149, 2015, doi: 10.2147/ahmt.s68344. [35] a. l. toriola, b. m. dolan, c. evans, and o. adetimole, “weight satisfaction of nigerian women in nigeria and britain: inter-generational and cross-cultural influences,” eur. eat. disord. rev., vol. 4, no. 2, pp. 84–94, 1996, doi: 10.1002/(sici)1099-0968(199606)4:2<84::aid-erv148>3.0.co;2-w. [36] l. h. collantes, y. martafian, s. n. khofifah, t. kurnia fajarwati, n. t. lassela, and m. khairunnisa, “the impact of cyberbullying on mental health of the victims,” 4th int. conf. vocat. educ. training, icovet 2020, pp. 30–35, 2020, doi: 10.1109/icovet50258.2020.9230008. [37] z. s. ershad and t. aghajani, “prediction of instagram social network addiction based on the personality, alexithymia and attachment styles,” j. sociol. stud. youth, vol. 8, no. 26, pp. 21–34, 2017. [online]. available: https://ssyj.babol.iau.ir/article_533425.html. [38] k. moore and g. craciun, “fear of missing out and personality as predictors of social networking sites usage: the instagram case,” psychol. rep., 2020, doi: 10.1177/0033294120936184. [39] y. wu, x. wang, s. hong, m. hong, m. pei, and y. su, the relationship between social short-form videos and youth’s well-being: it depends on usage types and content categories. 2021, doi: 10.1037/ppm0000292. https://ssyj.babol.iau.ir/article_533425.html https://doi.org/10.5772/intechopen.93322 https://scholarworks.lib.csusb.edu/etd/1101/ https://doi.org/10.2147/ahmt.s68344 https://doi.org/10.1002/(sici)1099-0968(199606)4:2%3c84::aid-erv148%3e3.0.co;2-w https://doi.org/10.1109/icovet50258.2020.9230008 https://ssyj.babol.iau.ir/article_533425.html https://doi.org/10.1177/0033294120936184 https://doi.org/10.1037/ppm0000292 bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 2, december 2022, pp. 146-150 146 https:doi.org/10.31763/businta.v6i2.508 concerns for digital privacy in business and management: an overview and future discourses recommendation jaya addin linando a,1,*, guntur budi herwanto b,2 a management department, universitas islam indonesia, yogyakarta, indonesia b computer science department, universitas gadjah mada, yogyakarta, indonesia 1 addin.linando@uii.ac.id ; 2 gunturbudi@ugm.ac.id * corresponding author 1. introduction as the advancement of technology has impacted all aspects of human lives and shaping the future, the discourse of technology-related matters from business and management viewpoint emerges as a pertinent current issue. while on the one hand technology eases a lot of human activities, on the other hand technology also bears many concerns and questions. hence, the saying that technology is a double-edged sword apparently be plausible. this paper aims to focus on the ‘dark’ side of technology, in particular from business and management perspective. by no means to disparage another important issues on technology and business (i.e., monopoly practices in digital platform; digital literacy challenges), for the sake of argumentations depth the authors limit the paper’s scope on privacy issue. privacy grows as one of the biggest concerns in digital era [1], [2]. data is an incredibly important asset, where collecting and sharing data transform into big businesses in today's digital economy [3]. as companies collect more information about their customers, customers are beginning to recognize the potential drawbacks of data collection [4]. in order to safely and successfully use the data they collected, companies should ensure that the data is strictly private and that consumers are not exposed to unsolicited surveillance [5]. the cambridge analytica and facebook scandals have raised questions about how consumers' personal data can be protected. as privacy escalates to be an integral part of human rights, governments are expected to ensure their citizens' privacy are safe [6]. the upsurge of concern for privacy promotes new laws and regulations like the european union's general data protection regulation (gdpr) that requires businesses and organizations to adhere to specific privacy and data protection rules. from company’s perspective, privacy has evolved into a critical component of a company's image. these highlights of the growing importance of privacy in business and management field triggers the authors to write this piece of note. a r t i c l e i n f o a b s t r a c t article history received october 30, 2022 revised november 21, 2022 accepted december 3, 2022 this paper aims to highlight the developing awareness of concern for digital privacy from a business and management viewpoint. the authors compile data privacy literature in the management field and visualize the literature into four main clusters of concerns. the four central concerns in data privacy discourse in management are the internet; roles-trust-security; locations; and consumer privacy. this paper contributes to developing research and discourse in the data privacy and management domain. besides delivering an overview of the digital privacy concerns in business and management fields, the paper also places suggestions for future researchers. this is an open access article under the cc–by-sa license. keywords digital privacy data privacy consumer privacy business management https://doi.org/10.31763/businta.v6i2.508 mailto:addin.linando@uii.ac.id http://creativecommons.org/licenses/by-sa/4.0/ http://creativecommons.org/licenses/by-sa/4.0/ issn 2614-0047 bulletin of social informatics theory and application 147 vol. 6, no. 2, december 2020, pp. 146150 linando et.al (concerns for digital privacy in business and management: an overview and future discourses) 2. method while there are various arguments on definitions of ‘privacy’, the relationship of ‘privacy’ with other associated terms, and the debate of the ‘privacy boundaries (see the discussion further on reference [7], the discourses of privacy in business and management context are relatively convergent. mainly the business and organizational cases of privacy focus on customers and employees (e.g., reference [8]; reference [9]) hence makes human resources management (hrm) and marketing as the two most related management branches to privacy issues. data protection issues affect most human resources activities, including recruitment [10], monitoring [11] and the management of their data [12]. the main question on hr field regarding data protection is whether employers should be allowed to monitor online activities of their employees. supposedly employees deem the employers violate their data privacy, the electronic communications privacy act (ecpa) can enact to help protect employees' fundamental right to privacy in their electronic communications [13]. on the marketing side, marketers are increasingly reliant on customer data for market segmenting and targeting purposes. marketers are the custodians of their company's brand image, hence ignoring consumer’s privacy out of choice or necessity could bear negative impacts on the overall company's image. marketing field also sees online personalized advertising (opa) among one of the most advanced tool to utilize personal data for marketing research. consumers may view opa as a beneficial tool, but at the same time may also concern about their personal information being profiled by the company. this is known as the paradox of personal advertising, which is relevant for the current and future marketing discourse and still lacks exploration to date [14]. the authors compile data privacy in hrm and marketing articles through ‘title words’ and ‘keywords’ search combinations on publish or perish (pop) software and run the result’s visualization using vosviewer as can be seen in fig. 1. the visualization was obtained through title field analysis, complete counting method, and minimum 10 occurrences threshold. in total, 464 articles were obtained with a wide-ranging timespan of publication. for instance, a paper discussing the privacy dilemma of intimacy versus intrusion in marketers-customers’ relationship management [15]. from human resource management perspective, there is a paper discussing the reciprocal rights and responsibilities between employees and institutions [16]. from the article list, the most cited article is about consumers’ privacy concerns and willingness to share their personal information, with more than a thousand citation to date [17]. fig. 1. concerns for privacy themes on business-management fields 148 bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 2, december 2020, pp. 146150 linando et.al (concerns for digital privacy in business and management: an overview and future discourses) 3. results and discussion 3.1. results the visualization was obtained through title field analysis, full counting method, and minimum 10 occurrences threshold. the result shows 4 clusters of concerns which are: • internet as the leading platform of digital era, internet as a cluster provides general overview of the privacyrelated matters happening around the business world. the contents vary from fairness matter on the internet, e-business model, internet of things (iot) to internet users’ characteristics. • roles-trust-security this is arguably the most wide-ranging cluster as it concerns the privacy-related interconnected components like the role of digital marketing in political campaigns, the role of user privacy concerns in platforms competition, the role of governmental organization to regulate data privacy and the role of information types that shape privacy issue. the trust variable deals with the conviction on platforms and institutions such as business websites, employee learning tools, hospitals, and cyber games. finally, the cluster ends on security issues like identity security, organization security compliance, and potential business frauds. • locations it concerns two main subjects: location-based marketing apps and service and the advertisement location of digital marketing. • consumer privacy this marketing subject develops as a particular concern following the number of articles placing consumer privacy as their primary emphasis [18]. among the discourses on this cluster are related to the perception of privacy from two point of views (consumers and sellers/marketers), business privacy policy to protect the customers, consumer’s privacy awareness and different country’s regulations of consumer privacy. 3.2. recomendation following this short overview of the growing privacy themes in business and management fields, the authors offer several further discussion topics for the researcher interested on data privacy and business management intersection. the topics are arranged on three (macro-meso-micro) levels to cover the broad research interests. • macro level – countries/social future researchers may consider to examine different country’s approaches on managing privacy. there are some websites provide country comparison data privacy laws (i.e., www.dlapiperdataprotection.com) that might be helpful to construct the argumentations. it is also possible to evaluate the privacy management effectiveness of particular government policy or institution. • meso level – organization among the main questions will be how the organization can ensure its consumers and employees that the business and management practices is in compliance to data privacy protection. it is also possible to further discuss the ethical, responsibility, benefit and competition aspects of privacy policy and management within organization. • micro level – individual mainly concerns individual privacy awareness, consent, the fair exchange of personal information (further elaboration on this matter, see reference [19]; reference [20], and the consequences (mental, emotional, or even physical) for individuals upon the case of the privacy breach and misuse. issn 2614-0047 bulletin of social informatics theory and application 149 vol. 6, no. 2, december 2020, pp. 146150 linando et.al (concerns for digital privacy in business and management: an overview and future discourses) 4. conclusion bearing in mind the loud echoes of digital era for current and future generations, the discourse of digital privacy in business-management field stands as an ever-growing subject. individuals are more likely to do businesses with organizations that are sensible of data protection matters. the way companies respond to concerns about data privacy will be crucial. in the coming years, it will be a challenge for organizations to show that data privacy and personalization can go hand in hand. by emphasizing their commitment to protecting their stakeholders’ privacy, ensuring transparency in the use of data and offering more privacy options, businesses can build a good credential. the authors argue that the future central discourse will revolve in the quest for win-win solution, both for companies and their stakeholders. where businesses can utilize personal data for their interest and at the same hand, their stakeholders (like consumers and employees) feel safe and respected. references [1] e. santanen, “the value of protecting privacy,” bus. horiz., vol. 62, no. 1, pp. 5–14, jan. 2019, doi: 10.1016/j.bushor.2018.04.004. [2] z. allam and z. a. dhunny, “on big data, artificial intelligence and smart cities,” cities, vol. 89, pp. 80–91, jun. 2019, doi: 10.1016/j.cities.2019.01.032. [3] v. s. litvinenko, “digital economy as a factor in the technological development of the mineral sector,” nat. resour. res., vol. 29, no. 3, pp. 1521–1541, jun. 2020, doi: 10.1007/s11053-019-095684. [4] y. wang, l. kung, and t. a. byrd, “big data analytics: understanding its capabilities and potential benefits for healthcare organizations,” technol. forecast. soc. change, vol. 126, pp. 3–13, jan. 2018, doi: 10.1016/j.techfore.2015.12.019. [5] c. yang, q. huang, z. li, k. liu, and f. hu, “big data and cloud computing: innovation opportunities and challenges,” int. j. digit. earth, vol. 10, no. 1, pp. 13–53, jan. 2017, doi: 10.1080/17538947.2016.1239771. [6] l. yang, n. elisa, and n. eliot, “privacy and security aspects of e-government in smart cities,” in smart cities cybersecurity and privacy, elsevier, 2019, pp. 89–102, doi: 10.1016/b978-0-12-8150320.00007-x. [7] j. r. saura, d. ribeiro-soriano, and d. palacios-marqués, “evaluating security and privacy issues of social networks based information systems in industry 4.0,” enterp. inf. syst., vol. 16, no. 10–11, pp. 1694–1710, oct. 2022, doi: 10.1080/17517575.2021.1913765. [8] k. d. martin and p. e. murphy, “the role of data privacy in marketing,” j. acad. mark. sci., vol. 45, no. 2, pp. 135–155, mar. 2017, doi: 10.1007/s11747-016-0495-4. [9] x. zhang, y. zhu, and n. hua, “privacy parallel algorithm for mining association rules and its application in hrm,” in 2009 second international symposium on computational intelligence and design, 2009, vol. 2, pp. 296–299, doi: 10.1109/iscid.2009.220. [10] p. swartz, a. da veiga, and n. martins, “validating an information privacy governance questionnaire to measure the perception of employees,” inf. comput. secur., vol. 29, no. 5, pp. 761–786, nov. 2021, doi: 10.1108/ics-08-2020-0135. [11] s. a. smith and s. r. brunner, “to reveal or conceal: using communication privacy management theory to understand disclosures in the workplace,” manag. commun. q., vol. 31, no. 3, pp. 429– 446, aug. 2017, doi: 10.1177/0893318917692896. [12] d. carpenter, a. mcleod, c. hicks, and m. maasberg, “privacy and biometrics: an empirical examination of employee concerns,” inf. syst. front., vol. 20, no. 1, pp. 91–110, feb. 2018, doi: 10.1007/s10796-016-9667-5. [13] d. anthony, c. campos-castillo, and c. horne, “toward a sociology of privacy,” annu. rev. sociol., vol. 43, no. 1, pp. 249–269, jul. 2017, doi: 10.1146/annurev-soc-060116-053643. [14] q. chen, y. feng, l. liu, and x. tian, “understanding consumers’ reactance of online personalized https://doi.org/10.1016/j.bushor.2018.04.004 https://doi.org/10.1016/j.cities.2019.01.032 https://doi.org/10.1007/s11053-019-09568-4 https://doi.org/10.1007/s11053-019-09568-4 https://doi.org/10.1016/j.techfore.2015.12.019 https://doi.org/10.1080/17538947.2016.1239771 https://doi.org/10.1016/b978-0-12-815032-0.00007-x https://doi.org/10.1016/b978-0-12-815032-0.00007-x https://doi.org/10.1080/17517575.2021.1913765 https://doi.org/10.1007/s11747-016-0495-4 https://doi.org/10.1109/iscid.2009.220 https://doi.org/10.1108/ics-08-2020-0135 https://doi.org/10.1177/0893318917692896 https://doi.org/10.1007/s10796-016-9667-5 https://doi.org/10.1146/annurev-soc-060116-053643 150 bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 2, december 2020, pp. 146150 linando et.al (concerns for digital privacy in business and management: an overview and future discourses) advertising: a new scheme of rational choice from a perspective of negative effects,” int. j. inf. manage., vol. 44, pp. 53–64, feb. 2019, doi: 10.1016/j.ijinfomgt.2018.09.001. [15] l. o’malley, m. patterson, and m. evans, “intimacy or intrusion? the privacy dilemma for relationship marketing in consumer markets,” j. mark. manag., vol. 13, no. 6, pp. 541–559, aug. 1997, doi: 10.1080/0267257x.1997.9964492. [16] f. a. mael, “privacy and personnel selection: reciprocal rights and responsibilities,” empl. responsib. rights j., vol. 11, no. 3, pp. 187–214, 1998, doi: 10.1023/a:1027307400954. [17] a. bleier, a. goldfarb, and c. tucker, “consumer privacy and the future of data-based innovation and marketing,” int. j. res. mark., vol. 37, no. 3, pp. 466–480, sep. 2020, doi: 10.1016/j.ijresmar.2020.03.006. [18] j. a. obar and a. oeldorf-hirsch, “the biggest lie on the internet: ignoring the privacy policies and terms of service policies of social networking services,” information, commun. soc., vol. 23, no. 1, pp. 128–147, jan. 2020, doi: 10.1080/1369118x.2018.1486870. [19] m. a. katell, s. r. mishra, and l. scaff, “a fair exchange: exploring how online privacy is valued,” in 2016 49th hawaii international conference on system sciences (hicss), jan. 2016, vol. 2016march, pp. 1881–1890, doi: 10.1109/hicss.2016.239. [20] c. prince, n. omrani, a. maalaoui, m. dabic, and s. kraus, “are we living in surveillance societies and is privacy an illusion? an empirical study on privacy literacy and privacy concerns,” ieee trans. eng. manag., pp. 1–18, 2022, doi: 10.1109/tem.2021.3092702. https://doi.org/10.1016/j.ijinfomgt.2018.09.001 https://doi.org/10.1080/0267257x.1997.9964492 https://doi.org/10.1023/a:1027307400954 https://doi.org/10.1016/j.ijresmar.2020.03.006 https://doi.org/10.1080/1369118x.2018.1486870 https://doi.org/10.1109/hicss.2016.239 https://doi.org/10.1109/tem.2021.3092702 bulletin of social informatics theory and application issn 2614-0047 vol. 5, no. 2, september 2021, pp. 142-149 142 https:doi.org/10.31763/businta.v5i2.470 development of fishery marketplace app for fishermen to support local products during the covid-19 pandemic dwi ely kurniawan a,1,*, afdhol dzikri b,2, nanna suryana herman c,3 a department of informatics engineering, politeknik negeri batam, batam, indonesia b department of multimedia network engineering, politeknik negeri batam, batam, indonesia c university malaysia of computer science & engineering, selangor, malaysia 1 dwialikhs@polibatam.ac.id*; 2 afdhol@polibatam.ac.id; 3 nsuryana@utem.edu.my * corresponding author 1. introduction the state of indonesia is an archipelagic country whose marine resources should be an essential concern. fishers, for example. where the community around the hinterland area, most of them make a living as fishermen. there are many problems regarding fishermen [1], [2], such as fishing skills, tools, technology used, facilities and infrastructure, and electricity infrastructure and internet networks in the hinterland areas, which are quite adequate and affordable. the welfare of fishers should be a concern of the government, especially considering the role of a fisherman who is very important in fulfilling community nutrition. fish protein is a source of food to meet the nutritional needs of the community [3]. the local products of the hinterland community are none other than fish and all kinds of fishermen's catches, as well as processed products of marine resources. the covid-19 pandemic has made it difficult for fishers to market their catch. in addition, there are limited fish auction places at every point in the archipelago. income has decreased drastically, mainly due to the covid-19 pandemic. people's purchasing power has decreased because the economy is also unstable. a fisherman in bintan island who has been working as a fisherman for 20 years regrets that there is no fish auction place (tpi) in bintan; this makes it difficult for fishers to sell fish after going to sea. a r t i c l e i n f o a b s t r a c t article history received august 4, 2021 revised august 20, 2021 accepted september 1, 2021 since the covid-19 pandemic, the growth of e-commerce in indonesia has increased sharply. the covid-19 pandemic has caused a shift in human habits or activities from offline to online. however, the lack of facilities and infrastructure, especially the fish auction place, is an obstacle fishers face when they want to market and distribute their catch. this study aims to provide an alternative solution to the limitations of fish auction places. this research develops a prototype of a fishery marketplace application to make it easier for fishers to market their catch. the research method in software development uses a prototyping model and usability testing using the sus scale. based on fishermen's gadgets owned, including network infrastructure availability in hinterland areas. this study used technology that utilizes sms gateway. sms messages in the form of information on fish products. based on the analysis and calculation of the sus score, the result is 79.25, meaning that the fisherman's application is functionally perfect and can be accepted by users. the fisheries marketplace application displays a catalog of fish products that can access the public to view product information, prices, and transact. buyers and sellers meet in the fisheries marketplace application to make offers via call communication or take advantage of the provided whatsapp api. this is an open access article under the cc–by-sa license. keywords fish auction places fishery marketplace sms gateway cash on delivery http://creativecommons.org/licenses/by-sa/4.0/ http://creativecommons.org/licenses/by-sa/4.0/ issn 2614-0047 bulletin of social informatics theory and application 143 vol. 5, no. 2, september 2021, pp. 142-149 kurniawan et.al (development of fishery marketplace app) middlemen (collectors) control the marketing and distribution of fish. fish export activities are not one-way. they are big vessels for fishing and have their export market to neighboring countries. so far, those who enjoy reasonable prices from fresh fish are traders, middlemen (collectors): no government support, no buying fish from fishers [4]. hence, there are facilities for fishing spots so that fishers do not sell fish in the middle of the sea to large ships, both from indonesia and foreign vessels. so far, those who do not have ships, some sell them to collectors. sometimes the price is played with, and sometimes it goes up, sometimes it goes down far, so the fishermen's income is uncertain [5]. the government needs to release fishermen's dependence on capital owners and abolish the bondage system [6]. exports to singapore are 90% of fish caught by fishermen in the batam area. the prices offered by the singapore market are higher when compared to the domestic market and can even increase two times compared to local prices. in addition to these problems, the government should pay attention to fuel (fuel oil) availability [7]. solar is complicated to obtain, even though diesel fuel is the primary need for fishers to go to the sea to find fish. fishers sometimes queue to buy retail, so the price is higher. it is conceivable that when they go to sea, fishers need gasoline. after getting the catch, they need to market and distribute the fresh fish immediately; this also requires transportation, including gasoline. uncertain fish prices and the absence of fish auctions are the government's main concerns. therefore, the existence of fish auction place for fishers is essential to improve the welfare of fishers [8], [9]. the fish auction place makes it easy for buyers and sellers to meet in one area with central and local governments' supervision [4]. in addition, it is also a means of fostering the quality of fishery products by the government or fishing communities [10] and controlling prices [11], [12] that are reasonable for consumers [13]. physically, making a fish auction place is not easy. it costs the government budget. besides that, it requires reasonable regulations and systems in the hinterland area community [14]. several fishermen's problems have another side related to ownership of ict devices in the form of cellphones which are pretty high by fishers. making the fishery marketplace app application becomes an alternative solution to market fish [15]. suppose you see from e-commerce activities that purchases are doing by visit the web or mobile app. product orders are doing by select the features of the products provided. marketing can be expanded by share information through social networking sites, search engines, and online advertising sites. provision of products does not have to be physical but can display product catalogs digitally. there is a delivery fee, but the reach of consumers is wider. based on data from the central statistics agency, in 2018, the number of batam residents who access the internet reached 61.75%. then in 2019, it came 72.63%. the increase is relatively high, soaring more than 10%, dominated by social media activities such as facebook, twitter, and whatsapp. the percentage is 74, 43% of batam's men can already access the internet, while women reach 70.78%. then 88.06% of batam residents already use computers, laptops, cellphones, and other wireless equipment. based on data from iprice and jakpat (iprice.co.id and jakpat.net), 26% of the total 1000 respondents said they chose to use e-wallet/e-money as a payment method. in addition, some use atm transfers and cod (cash on delivery), which are safe and convenient options when doing online shopping. meanwhile, the transactions carried out ranged from 1-5 million rupiah. therefore, this study tries to develop a marketplace application for fishers used technology that utilizes sms gateway and cash on delivery (cod) transactions to match the background knowledge and skills. as an alternative to make it easier to market and distribute fresh fish and control market prices. 2. method the research method in software development uses a prototyping model. to make it easier to explore real needs in the field, use the prototyping method. the first step is to analyze the needs of fishers and the availability of infrastructure in the hinterland area. the survey was conducted in two locations: areas of batam and bintan, riau islands. in analyzing the application needs, we conducted a literature review survey, interviews and looked at the condition of the network infrastructure and the behavior of the hinterland community. after developing the prototype of the application, we carried out usability testing using the sus scale [16], [17]. respondents were taken as many as 30 respondents from 150 participants in ict 144 bulletin of social informatics theory and application issn 2614-0047 vol. 5, no. 2, september 2021, pp. 142-149 kurniawan et.al (development of fishery marketplace app) training activities for home industries (smes) spread across batam [18]–[20]. the questions consist of 10 questionnaire items, according to the respondent's understanding of the fishermen's application. participants will rate each question from 1 to 5 based on how much they agree with the statements they read. five means strongly agree. one means strongly disagree. 3. results and discussion the results of the application prototype are based on interviews and surveys on the availability of internet network infrastructure in hinterland areas, especially batam and bintan. development of an sms gateway system [21], to send fish product catalogs by fishers. the internet network is not adequate when fishers go to sea, but the gsm connection is still relatively stable. therefore, the sms option is the most supportive option for fishers. ownership of gadgets and background knowledge [2] and skills of fishers are also supportive to be applied [22]. fishers send fish products via sms gateway after they finish looking for fish, or they will dock [23]. fig. 1. design of fishery market app fig. 1 shows the overall system design of the fishery marketplace app, starting from fishers sending sms to marketing fish products. the sms gateway server will capture and send it to the server of the fishery marketplace app. sms can work if it matches the fisherman's cellphone number registered on the sms gateway server. sms in the form of information on fish products and prices per kilogram of fish. the format of the sms messages sent by fishermen to the sms gateway server, in table 1. table.1 text message format for sms gateway activity message format adding of fish product tambah#selar#1#27000 editing of fish product ubah#selar#1#24000 deleting of fish product hapus#selar table 1 shows the activities of fishers in sending sms message formats to the gateway server. sms activities that can be done include adding fish products, updating fish products, and deleting fish products. add and edit is used to add and change fish data, the format added#selar#1#27000 means issn 2614-0047 bulletin of social informatics theory and application 145 vol. 5, no. 2, september 2021, pp. 142-149 kurniawan et.al (development of fishery marketplace app) adding a product of selar fish, the weight of selar fish is in one kilogram, and finally, selar fish is in one-kilogram price is rp. 27,000. delete#selar activity is used to remove the product of selar fish. the gateway server will filter the sms message format suitability. the gateway server will refuse if the mobile number is not registered and the sms text format activity is inappropriate. the gateway server then forwards to the marketplace webserver to display catalog information of fish products. fig. 2. activity of updating fishery market app fig. 2 is an activity of updating fishery market app. the application can run on the web and can also be accessed on a mobile app. before using the fisherman application, register to the marketplace website by completing the profile and mobile number that has been registered in the whatsapp application. the mobile number will also be registered on the gateway server to receive sms message format activities. after registering and completing the profile, fishers can send short messages in the form of table 1 sms message format activities. fishermen can also add, change and delete activities on the dashboard account of the fishery marketplace application. the development of a fishery marketplace app brings together sellers and buyers. buyers can access the fishery marketplace app on desktop pc platforms and mobile devices. it is enough to open a browser and go to the fishery marketplace app site. the information available is in the form of fish products, prices, and cellphone numbers from fishers. to facilitate the buying and selling communication process, the buyer can contact the mobile number available in the call mode or use the chat mode on the whatsapp application. the product display has integrated the whatsapp api technology from the previously registered fisherman's cellphone number. contact us on whatsapp 146 bulletin of social informatics theory and application issn 2614-0047 vol. 5, no. 2, september 2021, pp. 142-149 kurniawan et.al (development of fishery marketplace app) fig. 3. fishery market app (a), (b) fish menu, (c) whatsapp api. fig. 3 is a display of the fisheries marketplace application. the application displays a catalog of fish product data that appears periodically following sms message information from fishers. the fish product display is updated automatically after being filtered on the sms gateway server. fish product catalog information and information validation can also be done by the admin manually as needed. the fish product catalog is shown in fig. 3(b) so that buyers can view and make purchases— communication through mobile phone call services or by utilizing the whatsapp application features. transactions can be made by atm transfer or cod (cash on delivery) according to needs. next, do the testing during the training event. respondents tried the fisherman application and then filled out a questionnaire. the responses obtained were 30 respondents. respondents are application users from the hinterland area of batam and its surroundings. table.2 result of system usability scale (sus) no sus question likert scale 1 2 3 4 5 1 i think i want to use this app often. 0 0 4 12 14 2 i found some of the menus to be uncomplicated. 3 20 7 0 0 3 i think the app is easy to use. 0 1 2 11 16 4 i think i need support from a technical person to be able to use this app. 9 18 3 0 0 5 i find the various functions in this app well integrated like the sms and whatsapp app. 0 0 3 11 16 6 i think there are too many inconsistencies in this application. 7 16 7 0 0 7 i imagine that most people will learn to use this application very quickly. 0 0 2 14 14 8 i think this application is very complicated to use. 7 21 2 0 0 9 i feel very confident using this application. 0 0 4 24 2 10 i need to learn a lot of things before i can use this app. 5 20 5 0 0 total average score 4.3 2.1 4.4 1.8 4.4 table 2 displays the responses from 30 participants for each item in the sus questionnaire as a total item. as noted earlier, the score takes between 1 (strongly disagree) and 5 (strongly agree). question items were positive and negative on odd and even to reduce extreme agreement and response biases. issn 2614-0047 bulletin of social informatics theory and application 147 vol. 5, no. 2, september 2021, pp. 142-149 kurniawan et.al (development of fishery marketplace app) fig. 4. radar chart of question sus fig. 4 shows the radar chart of question sus (system usability scale). the average response to positive statements 1,3,5,7 and 9 is at the top point, which means it is functionally good and easy to use. however, responses to negative statements 2, 4, 6, 8 and 10 found that although they were easy to use, some inconsistencies and complications still exist. the rules for calculating the sus score on the questionnaire are that each question obtained is reduced by 1 for the odd-numbered questions, and the score is five minus the question scores obtained from the user for each even-numbered question. furthermore, the sum of the scores for each question is multiplied by 2.5. the sus is scored using the following formula [24]: sus score = ((q1 − 1) + (q3 − 1) + ( q5 − 1) + (q7 − 1) + (q9 − 1) + (5 − q2) + (5 − q4) + (5 − q6) + (5 − q8) + (5 − q10)) x 2.5 (1) table.3 result of question sus respondent item of question total sus score q1 q2 q3 q4 q5 q6 q7 q8 q9 q10 respondent 1 4 2 4 4 4 3 4 4 3 4 36 90 respondent 2 4 2 4 4 4 2 4 4 2 2 32 80 respondent 3 3 3 4 3 2 3 3 3 3 3 30 75 … … … … … … … … … … … … … … … … … … … … … … … … … … … … … … … … … … … … … … … respondent 30 4 3 4 3 3 3 3 3 3 3 32 80 sus score 79.25 fig. 5. sus score 148 bulletin of social informatics theory and application issn 2614-0047 vol. 5, no. 2, september 2021, pp. 142-149 kurniawan et.al (development of fishery marketplace app) table 3 is the calculation of the question sus, and fig. 5 is the sus score. based on the tabulation of sus scores using a likert scale, the result is 79.25 (blue line). this shows that the fisherman's application is good (grade b) and can be accepted by users, which means that it is functionally excellent and easy to use. in functionality, the application utilizes sms gateway technology that supports gsm networks in the middle of the sea. fishers can easily update fish product information by sending a short message according to the format specified in table 1. in addition, it makes it easier for consumers to view and shop from the fish product information available on the web or smartphone. effectively and efficiently, the application is considered better in distributing and marketing fish widely without being limited by the time and limitations of fish auction places. 4. conclusion the sus score is 79.25, indicating that the fisherman's application is functionally perfect and useracceptable. this research was motivated by the constraints of fish auctions and the difficulty in selling and distributing fish obtained by fishermen. the project focuses on building fish marketplace applications that support local items in the batam and bintan hinterlands. based on the analysis and calculation of the sus score, the result is 79.25, meaning that the fisherman's application is functionally perfect and can be accepted by users. the results of the application design utilizing sms gateway technology are considered better and support gsm networks in the middle of the sea. fishers can send short messages according to the specified format so that fish product information can be directly distributed or marketed widely through the fishery marketplace app. the fishery marketplace app makes it easy for consumers to get fish without taking a long time. at least it can minimize transportation and limitations of fish auction places. in addition, the public can view updates on fresh fish products. if interested, you can make transactions using the cod (cash on delivery) system. cod payment transactions are carried out to minimize fraud in commerce. further research can examine business procedures and user login security following the behavior of the hinterland community in the fishery marketplace application, besides the application of gamification to attract the hinterland community as users of the fishery marketplace application. acknowledgment this research is a research assignment grant for the program directorate of research and community service (drpm) in 2021, the basic research scheme for higher education excellence (pdupt), information and communication technology through politeknik negeri batam. references [1] a. cahaya, “fishermen community in the coastal area: a note from indonesian poor family,” procedia econ. financ., vol. 26, pp. 29–33, 2015, doi: https://doi.org/10.1016/s2212-5671(15)00801-1. [2] a. halim et al., “developing a functional definition of small-scale fisheries in support of marine capture fisheries management in indonesia,” mar. policy, vol. 100, pp. 238–248, 2019, doi: https://doi.org/10.1016/j.marpol.2018.11.044. [3] a. m. naaum et al., “validation of fastfish-id: a new commercial platform for rapid fish species authentication via universal closed-tube barcoding,” food res. int., vol. 141, mar. 2021, doi: 10.1016/j.foodres.2020.110035. [4] i. chapsos, j. koning, and m. noortmann, “involving local fishing communities in policy making: addressing illegal fishing in indonesia,” mar. policy, vol. 109, p. 103708, 2019, doi: https://doi.org/10.1016/j.marpol.2019.103708. [5] s. w. purcell, b. i. crona, w. lalavanua, and h. eriksson, “distribution of economic returns in smallscale fisheries for international markets: a value-chain analysis,” mar. policy, vol. 86, pp. 9–16, 2017, doi: https://doi.org/10.1016/j.marpol.2017.09.001. [6] c. warren and d. j. steenbergen, “fisheries decline, local livelihoods and conflicted governance: an indonesian case,” ocean coast. manag., vol. 202, p. 105498, 2021, doi: https://doi.org/10.1016/j.ocecoaman.2020.105498. [7] n. andrews et al., “oil, fisheries and coastal communities: a review of impacts on the environment, livelihoods, space and governance,” energy res. soc. sci., vol. 75, p. 102009, 2021, doi: https://doi.org/10.1016/j.erss.2021.102009. issn 2614-0047 bulletin of social informatics theory and application 149 vol. 5, no. 2, september 2021, pp. 142-149 kurniawan et.al (development of fishery marketplace app) [8] z. anna, a. a. yusuf, a. s. alisjahbana, a. a. ghina, and rahma, “are fishermen happier? evidence from a large-scale subjective well-being survey in a lower-middle-income country,” mar. policy, vol. 106, p. 103559, 2019, doi: https://doi.org/10.1016/j.marpol.2019.103559. [9] e. susilo, p. purwanti, m. fattah, v. a. qurrata, and b. s. narmaditya, “adaptive coping strategies towards seasonal change impacts: indonesian small-scale fisherman household,” heliyon, vol. 7, no. 4, p. e06919, 2021, doi: https://doi.org/10.1016/j.heliyon.2021.e06919. [10] i. s. wekke and a. cahaya, “fishermen poverty and survival strategy: research on poor households in bone indonesia,” procedia econ. financ., vol. 26, pp. 7–11, 2015, doi: https://doi.org/10.1016/s22125671(15)00962-4. [11] s. w. purcell, d. h. williamson, and p. ngaluafe, “chinese market prices of beche-de-mer: implications for fisheries and aquaculture,” mar. policy, vol. 91, pp. 58–65, 2018, doi: https://doi.org/10.1016/j.marpol.2018.02.005. [12] b. a. bertheussen, b. h. nøstvold, and i. ruiken, “fishing for an institution-based first-mover advantage: the norwegian snow crab case,” ocean coast. manag., vol. 194, p. 105274, 2020, doi: https://doi.org/10.1016/j.ocecoaman.2020.105274. [13] n. a. ratnaningtyas, w. f. ma’ruf, t. w. agustini, j. hutabarat, and s. anggoro, “prospect and adversity the downstream of ‘softbone milkfish’ in semarang city, indonesia,” aquat. procedia, vol. 7, pp. 166– 176, 2016, doi: https://doi.org/10.1016/j.aqpro.2016.07.023. [14] d. grimm et al., “assessing catch shares’ effects evidence from federal united states and associated british columbian fisheries,” mar. policy, vol. 36, no. 3, pp. 644–657, 2012, doi: https://doi.org/10.1016/j.marpol.2011.10.014. [15] m. n. mornie, n. jali, k. zen, and s. k. jali, “e-nelayan the fishery marketplace app,” trends undergrad. res., vol. 4, no. 1, pp. c1--10, 2021. [16] j. baumgartner, n. ruettgers, a. hasler, a. sonderegger, and j. sauer, “questionnaire experience and the hybrid system usability scale: using a novel concept to evaluate a new instrument,” int. j. hum. comput. stud., vol. 147, p. 102575, 2021, doi: https://doi.org/10.1016/j.ijhcs.2020.102575. [17] o. alhadreti, “assessing academics’ perceptions of blackboard usability using sus and csuq: a case study during the covid-19 pandemic,” int. j. human–computer interact., vol. 37, no. 11, pp. 1003– 1015, jul. 2021, doi: 10.1080/10447318.2020.1861766. [18] batam pos, “pelatihan ict bagi pelaku industri rumahan,” batam pos, batam, oct. 2017. [19] r. a. d. putri, “peran e-commerce batam dukung produk lokal saat pandemi covid-19,” tribunbatam.id, batam, oct. 2021. [20] s. c. indonesia, “peran e-commerce batam dukung produk lokal saat pandemi covid-19 – supply chain indonesia,” oct. 2021. [21] d. ely kurniawan, a. fatulloh, and n. cahyono kushardianto, “ship ticketing system using near field communication (nfc) and sms gateway for batam island transportation,” in proceedings of the joint workshop ko2pi and the 1st international conference on advance & scientific innovation, 2018, pp. 32– 38. [22] q. sholihah, a. s. hanafi, a. a. bachri, and r. fauzia, “ergonomics awareness as efforts to increase knowledge and prevention of musculoskeletal disorders on fishermen,” aquat. procedia, vol. 7, pp. 187– 194, 2016, doi: https://doi.org/10.1016/j.aqpro.2016.07.026. [23] d. e. kurniawan, n. z. janah, a. wibowo, m. k. mufida, and p. prasetyawan, “c2c marketplace model in fishery product trading application using sms gateway,” in matec web of conferences, 2018, vol. 197, p. 15001. [24] j. xiong, c. z. acemyan, and p. kortum, “susapp: a free mobile application that makes the system usability scale (sus) easier to administer.,” j. usability stud., vol. 15, no. 3, 2020. bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 1, march 2022, pp. 84-89 84 https:doi.org/10.31763/businta.v6i1.545 forecasting iot pollution data using forward newton for sustainable green environment asghaiyer mohamed asghaiyer a,1,*, abdaraouf abdalla omar a a faculty of technical sciences bani walid, bani walid, libya 1 asghaiyer@gmail.com * corresponding author 1. introduction iot (internet of things) technology is developing quite rapidly. this is marked by the emergence of various technologies built by iot itself [1]–[4]. in libya, especially in bani walid, a city where this research was conducted, the number of vehicles is increasing every year in line with improving economic life, so the number of huge vehicles also increases as trucks, buses, and buses tractors. diesel fuel consumption has a smoke effect that exceeds gasoline consumption, but both will still be included in this study. the pollution that occurs is not felt, but it can be seen from the data that the temperature in the city is rising [5]–[7]. iot is used and installed in outdoor locations, such as at campus entrances, in front of shopping centers, schools, and others. the installation of iot refers to research previously carried out by beccera et al. l [1] about pollutants, one of which is co2, as measured in 18 classrooms in schools. iot technology has been used to capture co2 gas levels, which in general [8]–[10], if the levels exceed o2, researchers can recommend planting trees or reducing air pollution to the government. co2 levels are captured by sensors that use the nodemcu board component with a co2 level detection sensor. this sensor works by storing data in a database on the server and displaying daily co2 levels through a tv display only. this is done continuously, and the collected data eventually accumulate in the database, especially last month's data, which is no longer used. the co2 level data in the database reaches millions of rows because data sampling through sensors is carried out every 5 minutes and has been running for over ten years. the researcher proposes to process the data so that it is not deleted and used to trend the surrounding environmental conditions so that it will be helpful. the researcher conducted a data analysis test at the beginning of the study and decided to use the advanced newton to conduct research by predicting the trend of air content with the help of computer software using the python programming language [11]–[13]. a r t i c l e i n f o a b s t r a c t article history received december 16, 2021 revised january 16, 2022 accepted february 1, 2022 internet of things (iot) technology proliferates because of its ease of use and low cost. one widely used iot technology is air pollution loggers in big cities. this technology is often installed in places easily visible to display pollution information. the stored data is not processed, so the data seems useless. the data contains valuable information as long as it is extracted correctly. the pollution data is consistent with time, so the advanced newton method is suitable because the prediction will involve future trends. the results of this study indicate that from 12,432, the amount of data gives the result that in the next year, the amount of co2 levels will increase by 3%. this needs to be considered by planting trees around the location to make the environment friendly to human health. this is an open access article under the cc–by-sa license. keywords internet of things air pollution newton method future trends green environment http://doi.org/10.31763/businta.v6i1.545 mailto:asghaiyer@gmail.com http://creativecommons.org/licenses/by-sa/4.0/ http://creativecommons.org/licenses/by-sa/4.0/ issn 2614-0047 bulletin of social informatics theory and application 85 vol. 6, no. 1, march 2022, pp. 84-89 asghaiyer mohamed and abdaraouf abdalla (forecasting iot pollution data using forward…) 2. method this method is carried out systematically, from the system requirements stage to the analysis, design, coding, testing, and maintenance stages [14]–[17]. the passed steps must be completed one by one and run sequentially. this study uses the waterfall software development method, which consists of the sequence in fig. 1. fig. 1. waterfall model the waterfall stage has five stages: requirements, design, implementation, verification or testing, deployment, and maintenance. for more details, see the next sub-chapter. 2.1. requirements before doing software development, a developer must know and understand the information needs of users for software [18]–[20]. this information collection method can be obtained through discussion, observation, survey, interview, etc. the information obtained is then processed and analyzed so that complete data or information is obtained regarding the specifications of user needs for the software to be developed at this stage, data is collected on the iot server, stored in the mysql database, then processed in csv format and later processed in python. not all database information is included in the processing. only the most essential part can be entered. the data converted into csv can be seen in table 1. table.1 sample dataset is taken from the database time co2(ppm) 7:04:12 1530 7:09:12 1642 7:14:12 1809 7:19:12 1972 7:24:12 1619 7:29:12 1482 7:34:12 1759 7:39:12 1492 table 1 shows a column of co2 levels in the air. the unit of that level is mg, captured by the iot device every 5 minutes. furthermore, the data is processed statistically by entering numbers in spss as input software. 2.2. design information about the requirements specification from the requirements analysis stage is then analyzed and implemented in the development design [21]–[23]. design drafting is done to help to provide a complete picture of what must be done. this stage will also help developers to prepare hardware requirements in making the software system architecture that will be made as a whole. 86 bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 1, march 2022, pp. 84-89 asghaiyer mohamed and abdaraouf abdalla (forecasting iot pollution data using forward…) this stage is to design the algorithm that will be used in the application. the use of advanced newtons takes a reference from a journal. fig. 2. algorithm design using newton's forward for equidistant points, newton's polynomial formula becomes simpler. in addition, the divisordifference table is easier to construct. here we plant the table as a difference table only because there is no division process in forming table elements. the value of ∆fp = fp+1 – fp is the difference between the current co2 level and previous co2 levels. 2.3. implementation the implementation and unit testing stages are the programming stage. software development is divided into small modules, which will be combined in the next stage. in addition, in this phase, testing and checking the functionality of the modules made is also carried out, whether they meet the desired criteria or not. this stage is coding and running the results on the computer. there is an essential part of the program code shown in fig. 3. for i in range(1,n): for j in range(0,n-i): f[j][i] = f[j+1][i-1] f[j][i-1] fig. 3. newton forward pseudocode an essential part of the pseudocode in fig. 3 is the subtraction of values that point to the right so that later it will form an end of a calculation. 2.4. testing all the units or modules developed and tested in the implementation phase are integrated into the overall system. after the integration process, further system inspection and testing are carried out to identify possible system failures and errors. table.2 result of newton forward prediction (nfp) time co2(ppm) nfp 7:04:12 1530 1502 7:09:12 1642 1690 7:14:12 1809 1827 7:19:12 1972 1962 7:24:12 1619 1620 7:29:12 1482 1452 7:34:12 1759 1766 7:39:12 1492 1459 from table 2, it appears that the actual value of the data sent by iot to the server with the nfp value has a difference. this will be explained further in the discussion section. issn 2614-0047 bulletin of social informatics theory and application 87 vol. 6, no. 1, march 2022, pp. 84-89 asghaiyer mohamed and abdaraouf abdalla (forecasting iot pollution data using forward…) 2.5. deployment in the last stage of the waterfall method, the finished software is operated by the user and carried out maintenance. maintenance allows developers to improve errors not detected in the earlier stages. maintenance includes repairing errors, improving the implementation of the system unit, and upgrading and adjusting the system as needed. at this stage, the calculation results will be stored in the database and will be displayed on a number pad near the sensor, following government policy. 3. results and discussion the results of dataset calculations using the advanced newton method have been carried out on 12,432 dataset samples taken sequentially. the results of the calculation analysis appear in the following table 3. table.3 simple statistic analysis time co2(ppm) predict δ 7:04:12 1530 1551 -21 7:09:12 1642 1628 14 7:14:12 1809 1817 -8 7:19:12 1972 1969 3 7:24:12 1619 1605 14 7:29:12 1482 1490 -8 7:34:12 1759 1783 -24 7:39:12 1492 1511 -19 parameter value predict analysis min 1482 1490 -8 max 1972 1969 3 avg 1663.125 1669.25 -6.125 stddev 172.4118 169.7079 2.703888 table 3 notes a difference between each real value and the predictor generated from newton forward. the value of the difference between the two can be seen in the last column of table 3. these values vary; if the percentage is calculated, the difference is not too big. likewise, when looking at the statistical count parameters in the table below, it is explained that the min and max values of the data are almost the same. there is a very slight difference. the same is true for the mean and standard deviation. the standard deviation means that the value of 172.4118 is the point difference value with an average of 2.703888 from the predictor value of 169.7079 using advanced newtons. this shows that predictions using this advanced newton algorithm produce values that are not much different from the original. if there is a significant difference ranging from 1.5% and computation results by spss, it is shown that increasing of average value from iot next year is not more than 3%. 4. conclusion pollution in big cities like bani walid in libya requires a solution shortly. data recording co2 levels are already available in several corners of the city and have been processed using the advanced newton method to predict the increase in co2 levels every year. it aims to save the health of an area or surrounding community. this advanced newton predictor provides a calculation error of 1.5% and predicts an annual increase in co2 levels of 3%. the study gave good results because accurate data with predictors had a standard deviation of 0.36%. this research can inspire other researchers to optimize the calculation speed if the data increases. acknowledgment the researcher would like to thank universitas negeri malang for the research opportunity given. 88 bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 1, march 2022, pp. 84-89 asghaiyer mohamed and abdaraouf abdalla (forecasting iot pollution data using forward…) references [1] j. a. becerra, j. lizana, m. gil, a. barrios-padura, p. blondeau, and r. chacartegui, “identification of potential indoor air pollutants in schools,” j. clean. prod., vol. 242, p. 118420, jan. 2020, doi: 10.1016/j.jclepro.2019.118420. [2] b. w. wirtz, j. c. weyerer, and f. t. schichtel, “an integrative public iot framework for smart government,” gov. inf. q., vol. 36, no. 2, pp. 333–345, apr. 2019, doi: 10.1016/j.giq.2018.07.001. [3] f. john dian, r. vahidnia, and a. rahmati, “wearables and the internet of things (iot), applications, opportunities, and challenges: a survey,” ieee access, vol. 8, pp. 69200–69211, 2020, doi: 10.1109/access.2020.2986329. [4] o. said, z. al-makhadmeh, and a. m. r. tolba, “ems: an energy management scheme for green iot environments,” ieee access, vol. 8, pp. 44983–44998, 2020, doi: 10.1109/access.2020.2976641. [5] n. uskowi, “temperature rising: iran’s revolutionary guards and wars in the middle east,” 2018. available at : ndupress.ndu.edu. [6] m. lopez, a. gomez, g. muller, e. w.medrxiv, and u. 2022, “climate change and the rising incidence of dengue in argentina,” medrxiv.org, doi: 10.1101/2022.06.03.22275954. [7] h. stevens, p. beggs, … p. g.-i. journal of, and undefined 2019, “hot and bothered? associations between temperature and crime in australia,” springer. doi : 10.1007/s00484-019-01689-y. [8] v. suma, r. shekar, k. a.-2019 3rd international, and undefined 2019, “gas leakage detection based on iot,” ieeexplore.ieee.org. doi : 10.1109/iceca.2019.8822055. [9] p. kumar, a. k.-i. j. of engineering, and undefined 2019, “design of gas detection and monitoring system using iot,” academia.edu. doi : 10.17577/ijertv8is110193 [10] j. b. a. gomes, j. j. p. c. rodrigues, r. a. l. rabêlo, n. kumar, and s. kozlov, “iot-enabled gas sensors: technologies, applications, and opportunities,” mdpi.com, 2019, doi: 10.3390/jsan8040057. [11] y. romm, g. d.-j. of p. conference, and undefined 2021, “piecewise interpolation solution of ordinary differential equations with application to numerical modeling problems,” iopscience.iop.org, vol. 1902, p. 12130, 2021, doi: 10.1088/1742-6596/1902/1/012130. [12] a. rakshit and b. banerjee, “analysis the internal pressure of the thin cylindrical shell by newton’s forward interpolation,” irjmets.com, pp. 2582–5208. available at : irjmets. [13] a. r. mohammed, m. abdel-aal, k. s. hassan, and m. a. m. abdel-aal, “moving average smoothing for gregory-newton interpolation: a novel approach for short-term demand forecasting,” 2022. doi : 10.1016/j.ifacol.2022.09.499. [14] f. heriyanti, a. i.-i. c. s. m. science, and undefined 2020, “design of logistics information system in the finished product warehouse with the waterfall method: review literature,” iopscience.iop.org, doi: 10.1088/1757-899x/801/1/012100. [15] s. n. hidayati, “application of waterfall model in development of work training acceptance system,” 2020, doi: 10.29407/intensif.v4i1.12976. doi: 10.1016/j.ifacol.2022.09.499. [16] a. sinha, p. d. electronics, m. e. & nano, and undefined 2021, “agile methodology vs. traditional waterfall sdlc: a case study on quality assurance process in software industry,” ieeexplore.ieee.org. doi: 10.1109/iementech53263.2021.9614779. [17] m. k.-r. of b. & f. studies and undefined 2018, “best practices in systems development lifecycle: an analyses based on the waterfall model,” papers.ssrn.com, vol. 9, no. 1, pp. 77–84, 2018. available at : papers.ssrn.com. [18] c. burr, n. cristianini, j. l.-m. and machines, and undefined 2018, “an analysis of the interaction between intelligent software agents and human users,” springer. doi : 10.1007/s11023-018-9479-0. [19] e. gebka, j. crusoe, and k. ahlin, “to capture the information needs of end-users of open data: guidelines to design methods,” 2021. doi: 10.5334/dsj-2021-037. https://doi.org/10.1016/j.jclepro.2019.118420 https://doi.org/10.1016/j.giq.2018.07.001 https://doi.org/10.1109/access.2020.2986329 https://doi.org/10.1109/access.2020.2976641 https://ndupress.ndu.edu/media/news/news-article-view/article/1979824/temperature-rising-irans-revolutionary-guards-and-wars-in-the-middle-east/ https://doi.org/10.1101/2022.06.03.22275954 https://doi.org/10.1007/s00484-019-01689-y https://doi.org/10.1109/iceca.2019.8822055 https://doi.org/10.17577/ijertv8is110193 https://doi.org/10.3390/jsan8040057 https://doi.org/10.1088/1742-6596/1902/1/012130 https://www.irjmets.com/uploadedfiles/paper/volume_2/issue_8_august_2020/3009/final/fin_irjmets1631109538.pdf https://doi.org/10.1016/j.ifacol.2022.09.499 https://doi.org/10.1088/1757-899x/801/1/012100 https://doi.org/10.1016/j.ifacol.2022.09.499 https://doi.org/10.1109/iementech53263.2021.9614779 https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3131958 https://doi.org/10.1007/s11023-018-9479-0 http://doi.org/10.5334/dsj-2021-037 issn 2614-0047 bulletin of social informatics theory and application 89 vol. 6, no. 1, march 2022, pp. 84-89 asghaiyer mohamed and abdaraouf abdalla (forecasting iot pollution data using forward…) [20] c. burr, n. cristianini, and j. ladyman, “an analysis of the interaction between intelligent software agents and human users,” minds mach., vol. 28, no. 4, pp. 735–774, dec. 2018, doi: 10.1007/s11023018-9479-0. [21] s. almeyda, c. zapata del río, and d. cohn, “integration of user experience and agile techniques for requirements analysis: a systematic review,” lect. notes comput. sci. (including subser. lect. notes artif. intell. lect. notes bioinformatics), vol. 12779 lncs, pp. 187–203, 2021, doi: 10.1007/978-3-030-78221-4_13. [22] r. prasath, r. r.-2021 2nd i. c. on, and undefined 2021, “autonomous application in requirements analysis of information system development for producing a design model,” ieeexplore.ieee.org. doi: 10.1109/c2i454156.2021.9689440. [23] m. kamalrudin, l. ow, s. s.-j. of telecommunication, and undefined 2018, “requirements defects techniques in requirements analysis: a review,” core.ac.uk. available at : semanticscholar. https://doi.org/10.1007/s11023-018-9479-0 https://doi.org/10.1007/s11023-018-9479-0 https://doi.org/10.1007/978-3-030-78221-4_13 https://doi.org/10.1109/c2i454156.2021.9689440 https://www.semanticscholar.org/paper/requirements-defects-techniques-in-requirements-a-kamalrudin-ow/9efae273d9213b46254116e3a68fcd6ffe0debdf bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 1, march 2022, pp. 65-75 65 https:doi.org/10.31763/businta.v6i1.534 comparison analysis of digital forensic tools on instagram messenger using the national institute of standards and technology (nist) method harno supardin a,1*, ramdan satra a,2, muh. arfah asis a,3, ming foey teng b,4 a universitas muslim indonesia, makassar, indonesia b american university of sharjah, united arab emirates 1 harnoshupardin@gmail.com ; 2 mailto.ramdan@umi.ac.id; 3 muh.arfah.asis@umi.ac.id; 4 mteng@aus.edu * corresponding author 1. introduction technological developments from time to time are very rapid, one of which is the development of smartphones constantly evolving in operating systems, features, specifications, and applications. today's increasingly sophisticated technology has become essential to people's lives. some activities in people's lives can be carried out using technology, including committing crimes. the increasingly sophisticated technology is not only used by the community to carry out positive activities, but many also take advantage of the greatness of technology to carry out negative actions that threaten technology users, especially regarding using cybercrime. in layman, cybercrime, known as the internet, has become an essential part of people's daily lives, which not only brings benefits but also threatens the security and human rights of its users. one of the most common threats is the threat of pornography. users widely use internet media to access pornographic content that is widespread in cyberspace [1]. social media, such as instagram, is the most widely used place by people using smartphones. instagram is a combination of the words instant-telegram. from the use of the word, it can be interpreted as an application to send information quickly in the form of managing photos, sharing photos, and sharing other social networks [2]. fig.1 is a graph of instagram social media users who became the second row after whatsapp in january 2022. a r t i c l e i n f o a b s t r a c t article history received december 18, 2021 revised january 18, 2022 accepted february 3, 2022 technological developments from time to time are very rapid, one of which is the development of smartphones constantly evolving in operating systems, features, specifications, and applications. today's increasingly sophisticated technology has become essential to people's lives. some people's lives can be carried out by utilizing technology, including committing crimes in cyberspace. one of the most widely used social media applications is instagram. instagram messenger causes cybercrime, pornography, fraud, and cyberbullying. this study aims to compare the performance of digital forensic tools in obtaining digital evidence on instagram messenger using the nist method. the results of this study indicate that mobiledit forensic and magnet axiom have the following accuracy results in restoring deleted data on instagram messenger, mobiledit forensic 69.23% and magnet axiom 76.92%. this is an open access article under the cc–by-sa license. keywords digital forensic tools instagram messenger nist method https://doi.org/10.31763/businta.v6i1.534 mailto:harnoshupardin@gmail.com http://creativecommons.org/licenses/by-sa/4.0/ http://creativecommons.org/licenses/by-sa/4.0/ 66 bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 1, march 2022, pp. 65-75 harno supardin et.al (comparison analysis of digital forensic tools on instagram…) fig. 1. instagram social media user graph the graph above explains the development based on the global ad audience reach. instagram had at least 1.478 billion users worldwide in january 2022. as for instagram users in indonesia in 2022, the figures published in the meta-advertising tool show that instagram had 99.15 million users in indonesia in 2018. early 2022 [3]. from the problem of cybercrime crime cases, there is a field of science that can assist in proving cybercrime cases, namely digital forensics in helping to solve pornographic crime cases through instagram messenger social media with smartphone access media [4]. digital forensics is the study of how to deal with various crimes involving computer technology [5]. the digital forensic analysis is carried out using the national institute of standards and technology (nist) method because it has superior work techniques and a structured forensic process that ensures investigators are accurate by systematically following research steps to justify the results. this method is widely used in digital crime cases [6]. previous research conducted by imam riadi, anton yudhana, muhamad caesar febriansyah putra (2018) with the title "analysis of digital evidence on android-based instagram messenger using the national institute of justice (nij) method" in this study took data on instagram messenger from cyberbullying cases. using the oxygen forensic tool with the nij method stages [7]. then the research was conducted by anton yudhana, imam riadi, and ikhwan anshori (2018) titled "analysis of digital evidence for facebook messenger using the nist method". in this study, the tools used were oxygen forensic using the national institute of standards and technology (nist) method [8]. while this study will develop previous research using the nist method and conduct testing using two forensic tools, mobiledit forensic, and magnet axiom forensic, to better compare results from data on pornographic instagram messengers in the form of text messages, images, and videos digital evidence under court. based on the above background, a study titled "comparative analysis of digital forensic tools on instagram messenger using the national institute of standards and technology (nist) method" was conducted. 2. method this research uses the national institute of standards and technology (nist) method. this method describes how, step by step in detail and systematically, to solve existing problems. the stages of the nist method are collection, examination, analysis, and reporting. the following are the forensic stages of the nist method in fig.2. issn 2614-0047 bulletin of social informatics theory and application 67 vol. 6, no. 1, march 2022, pp. 65-75 harno supardin et.al (comparison analysis of digital forensic tools on instagram…) fig. 2. digital forensic stages of the nist method 2.1. collection the collection is the collection or identification of evidence used in the form of a smartphone whose data will be used as digital evidence of a pornographic crime case. this process is carried out by following data integrity security measures. 2.2. examination the examination is collecting data on evidence using trusted forensic tools so that the data obtained has high integrity. 2.3. analysis the analysis stage is the process of analyzing and re-evaluating the data found from the examination results. 2.4. reporting the reporting stage is the process of reporting the results of the analysis of digital evidence that has been found, which is used as the final report of the forensic process that has been carried out. in this study, the research design used was a case study research design. while handling and analyzing digital evidence, researchers create a scenario of the activities on instagram messenger, as in fig.3. fig. 3. research design collection examination analysis reporting 68 bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 1, march 2022, pp. 65-75 harno supardin et.al (comparison analysis of digital forensic tools on instagram…) in the research design image above, the investigation was carried out from a case scenario of sending pornographic content from the suspect to the victim. in this process, the suspect sent pornographic content to the victim. after the suspect sent it to the victim, the suspect deleted the data from the communication device, namely the smartphone, to remove evidence. using forensic tools, text messages, images, and videos deleted from instagram messenger will be recovered from the perpetrator's device. the acquisition was completed after the perpetrator's smartphone evidence was secured. the acquisition used forensic tools, namely mobiledit forensic and magnet axiom forensic. then the acquisition process results will be analyzed to make a report. reports from the analysis results are in the form of data information that has been found, forensic methods carried out, and forensic tools used. the conclusion stage in this study is the accuracy of each forensic tool based on digital evidence obtained using the nist method and forensic procedures performed. 3. results and discussion 3.1. collection at this stage, the xiaomi redmi note 7 smartphone is secured for investigation so that the data does not change before being analyzed. smartphone evidence and specifications can be seen in fig.4 and table 1. fig. 4. smartphone table.1 specifications model perangkat redmi note 7 ram 4,00 versi android 10 qkq1.190910.002 versi miui miui global 12.5.3 model m1901f7g os android issn 2614-0047 bulletin of social informatics theory and application 69 vol. 6, no. 1, march 2022, pp. 65-75 harno supardin et.al (comparison analysis of digital forensic tools on instagram…) the smartphone used has been rooted using the magisk application. then the preparation for the process of data acquisition from the smartphone. 3.2. examination the data acquisition process is carried out on the smartphone at this stage. the data acquisition process on the smartphone must be connected to the laptop using a data cable and activate the developer options on the smartphone to connect to the mobiledit forensic tools. it can be seen in fig.5 that the smartphone is already connected to mobiledit forensic. fig. 5. smartphone connected with mobiledit forensic after the smartphone is successfully connected to mobiledit forensic, information from the connected smartphone will appear, as shown in the image above. the data acquisition process uses magnet axiom forensic tools when the smartphone is connected. the information provided is shown in fig.6. fig. 6. smartphone connected with axiom forensic magnet furthermore, the data acquisition process is carried out with mobiledit forensic on the instagram application, as shown in fig.7. 70 bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 1, march 2022, pp. 65-75 harno supardin et.al (comparison analysis of digital forensic tools on instagram…) fig. 7. data acquisition process with mobiledit forensic while the data acquisition process with magnet axiom forensic on the instagram application can be seen in fig.8. fig. 8. data acquisition process with axiom forensic magnets after the data acquisition process, several files will be obtained in the folder. the results of the data acquisition process can be seen on the laptop, which has previously determined the storage location of the acquisition results, as shown in fig.9 and fig.10. fig. 9. results of the data acquisition process with mobiledit forensic issn 2614-0047 bulletin of social informatics theory and application 71 vol. 6, no. 1, march 2022, pp. 65-75 harno supardin et.al (comparison analysis of digital forensic tools on instagram…) fig. 10. results of the data acquisition process with axiom forensic magnets 3.3. analysis at this stage, an analysis of the results of the data acquisition process found on the smartphone is carried out. digital evidence to be analyzed is text messages, images, and videos. the following is the process of analyzing the digital evidence found from mobiledit forensic, which can be seen in fig.11, fig.12, and fig.13. fig. 11. the process of analysis of successfully found text messages on mobiledit forensic fig. 12. image message analysis process found on mobiledit forensic 72 bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 1, march 2022, pp. 65-75 harno supardin et.al (comparison analysis of digital forensic tools on instagram…) fig. 13. video message analysis process found on mobiledit forensic while the analysis process for digital evidence found on magnet axiom is almost the same as mobiledit forensic, it can be seen in fig.14, fig.15, and fig.16. fig. 14. the process of analyzing text messages found on axiom forensic magnets issn 2614-0047 bulletin of social informatics theory and application 73 vol. 6, no. 1, march 2022, pp. 65-75 harno supardin et.al (comparison analysis of digital forensic tools on instagram…) fig. 15. image message analysis process found on axiom forensic magnets fig. 16. the process of analysis of video messages found on axiom forensic magnets 3.4. reporting this stage reports the results of the analysis process from 13 digital pieces of evidence, which is the focus of the analysis. mobiledit forensic returned nine digital pieces of evidence that had been deleted and magnet axiom forensic returned ten digital pieces of evidence that had been deleted. the following compares the performance of the mobiledit forensic and magnet axiom forensic tools in restoring deleted data on instagram messenger, which can be seen in table 2. table.2 digital evidence results no digital evidence amount of digital evidence initial data mobiledit forensic magnet axiom 1. text message 5 1 2 2. picture message 5 5 5 3. video message 3 3 3 74 bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 1, march 2022, pp. 65-75 harno supardin et.al (comparison analysis of digital forensic tools on instagram…) a comparison of the performance results of digital forensic tools on instagram messenger using mobiledit forensic and magnet axiom forensic has the following accuracy results in restoring deleted data. 92%. these results are obtained from the calculation of the comparison of unweighted index numbers with the following formula: mobiledit forensic tools performance calculation = 9 13 ∗ 100 = 69, 23% calculation of performance of magnet axiom forensic tools = 10 13 ∗ 100 = 76, 92% research conducted by galih fanani, imam riadi, and anton yudhana (2022) with the title "forensic analysis of the michat application using the digital forensics research workshop method" in this study the tools used for mobiledit forensic the results of digital evidence obtained from the perpetrator's smartphone in the form of images and videos. at the same time, digital evidence of text messages was not found [9]. research conducted by ikhwan wiratama putra, aries suharso, and chaerur rozikin (2021) with the title "digital evidence acquisition and image authenticity detection on whatsapp using the nist and ela methods" in this study, the tools used for magnet axiom digital evidence that were successfully obtained from smartphones perpetrators are in the form of accounts, contacts, call history, text messages, digital evidence that was not successfully obtained in the form of images [10]. while in this study, the digital evidence that was successfully obtained on instagram messenger from the perpetrator's smartphone using the mobiledit forensic tools digital evidence that was successfully obtained were text messages, picture messages, and video messages with an accuracy of 69.23% and magnet axiom forensic digital evidence that was successfully obtained, namely text messages, picture messages and video messages with an accuracy of 76.92%. 4. conclusion the analysis of data deleted on instagram messenger using the mobiledit forensic and magnet axiom forensic tools shows that magnet axiom forensic performance results are more optimal because the accuracy results reach 76.92%, compared to mobiledit forensic, the accuracy results only reach 69.23%. mobiledit forensic and magnet axiom forensic tools are not good enough to restore deleted data from smartphones in text messages, while picture and video messages can be appropriately restored on the instagram messenger application. based on the analysis of research conducted, it is proven that the nist method can help facilitate investigations from evidence to the stage of reporting digital evidence. suggestions for further research are to use smartphones from perpetrators and victims to investigate digital evidence on instagram messenger to be used as comparison or use other forensic tools to get much more valid evidence. references [1] w. a. mukti, s. u. masruroh, and d. khairani, “analisa dan perbandingan bukti forensik aplikasi media sosial facebook dan twitter pada smartphone android,” j. tek. inform., vol. 10, no. 1, pp. 73– 84, 2018, doi: 10.15408/jti.v10i1.6820. [2] i. riadi, a. yudhana, and m. c. f. putra, “analisis recovery bukti digital instagram messangers menggunakan metode national institute of standards and technology (nist),” semin. nas. teknol. inf. dan komun. semant., pp. 161–166, 2017. available at : peradaban.ac.id. [3] s. kemp, “digital 2022: platform media sosial favorit dunia,” www.datareportal.com, 2022. available at : datareportal.com. [4] f. yudha, “usb analisys tool untuk investigasi forensika digital,” teknoin, vol. 21, no. 4, 2015, doi: 10.20885/teknoin.vol21.iss4.art6. [5] i. riadi and r. umar, “identification of digital evidence on android’s blackberry messenger using nist mobile forensic method imam,” int. j. comput. sci. inf. secur., vol. 15, no. 5, pp. 3–8, 2017. doi:10.11591/ijece.v8i5.pp3991-4003. [6] i. riadi, a. fadlil, and m. i. aulia, “investigasi bukti digital optical drive menggunakan metode https://doi.org/10.15408/jti.v10i1.6820 https://journal.peradaban.ac.id/index.php/ijir/article/download/627/522 https://datareportal.com/reports/digital-2022-favourite-social-platforms?rq=favourite https://doi.org/10.20885/teknoin.vol21.iss4.art6 https://doi.org/10.11591/ijece.v8i5.pp3991-4003 issn 2614-0047 bulletin of social informatics theory and application 75 vol. 6, no. 1, march 2022, pp. 65-75 harno supardin et.al (comparison analysis of digital forensic tools on instagram…) national institute of standard and technology (nist),” j. resti (rekayasa sist. dan teknol. informasi), vol. 1, no. 10, pp. 820–828, 2021.doi : 10.29207/resti.v4i5.2224. [7] i. riadi, a. yudhana, m. caesar, and f. putra, “akuisisi bukti digital pada instagram messenger berbasis android menggunakan metode national institute of justice (nij),” j. tek. inform. dan sist. inf., vol. 4, pp. 219–227, 2018. available at : journal.maranatha.edu. [8] a. yudhana, i. riadi, and i. anshori, “analisis bukti digital facebook messenger menggunakan metode nist,” it j. res. dev., vol. 3, no. 1, pp. 13–21, 2018, doi: 10.25299/itjrd.2018.vol3(1).1658. [9] g. fanani, i. riadi, and a. yudhana, “analisis forensik aplikasi michat menggunakan metode digital forensics research workshop,” j. media inform. budidarma, vol. 6, no. 2, pp. 1263–1271, 2022, doi: 10.30865/mib.v6i2.3946. [10] i. p. wiratama, a. suharso, and c. rozikin, “akuisisi bukti digital dan deteksi keaslian citra pada whatsapp menggunakan metode nist dan ela,” j. sains komput. inform., vol. 5, no. 2, pp. 712–726, 2021. doi : 10.30645/j-sakti.v5i2.370. https://doi.org/10.29207/resti.v4i5.2224 https://journal.maranatha.edu/index.php/jutisi/article/view/1490 https://doi.org/10.25299/itjrd.2018.vol3(1).1658 https://doi.org/10.30865/mib.v6i2.3946 http://dx.doi.org/10.30645/j-sakti.v5i2.370 bulletin of social informatics theory and application issn 2614-0047 vol. 5, no. 2, september 2021, pp. 158-164 158 https:doi.org/10.31763/businta.v5i2.473 towards academic computer emergency response teams in african developing countries leonard mutembei a,1,*, fredrick ishengoma b,2 a institute of accountancy arusha, tanzania b the university of dodoma, tanzania 1 leonardmut31@gmail.com*; 2 ishengomaf@gmail.com * corresponding author 1. introduction according to the international telecommunication union (itu) (2019), the number of internet users has continued to grow from 2005 to 2019, reaching approximately 4.1 billion users in 2019. technological advancements bring an increasing number of security threats, such as cyber-attacks [1]. cyber-attacks are increasing year after year as criminals advance their technologies and methods. a case in point is the ransomware attacks, which continue to target organizations, businesses, universities, and public administrations worldwide. universities are the primary generators of innovation in countries and the economy as a whole. recent studies indicate that universities and research institutions have risen to prominence as new targets for cyber-attacks [2]. this is because universities are hubs for research, innovation, and solutions to global problems. for instance, the race to develop a covid-19 vaccine has shifted cyberattacks to universities seeking research data and information [3]. meanwhile, university-wide standards generally do not favor resilient security measures, owing to the high volume of students and staff accessing the network, device sharing, the dynamic nature of enrollment and graduation, and the bring your own device (byod) practice [4]. universities' position as knowledge generators and disseminators outweighs the importance of information security in research, development, processing, access, and sharing [5]. perhaps it is unsurprising that universities are targeted by cybercriminals, given the volume of research data, personal, economic, and scientific data stored by these institutions. hackers have spent the last decade researching network vulnerabilities in universities and research institutions [6]. theft, manipulation, or disruption of research data has a detrimental effect on the research community, intellectual property, nation, and economy. examples of attacks include using brute force on the networks of research facilities, which involves rapidly attempting millions of login and password combinations [7]. a r t i c l e i n f o a b s t r a c t article history received august 6, 2021 revised august 27, 2021 accepted september 2, 2021 the increasing number of cyberattacks on african universities demonstrates the critical need for a more profound shift in perspective from a simple it problem to the implementation of more resilient security measures and policies, and thus, computer emergency response teams (certs). fortunately, even though there are numerous certs worldwide, there are relatively few studies in the literature that address academic-cert in the african context. this article summarizes the cert landscape in african countries and proposes a framework for academic-cert. the proposed framework aims to fortify african academic institutions' resilient security measures. the paper will serve as a foundation for developing academic certs in african countries, which will eventually result in the implementation of national certs and the protection of online users. this is an open access article under the cc–by-sa license. keywords computer emergency response teams computer security incident response team african developing countries http://creativecommons.org/licenses/by-sa/4.0/ http://creativecommons.org/licenses/by-sa/4.0/ issn 2614-0047 bulletin of social informatics theory and application 159 vol. 5, no. 2, september 2021, pp. 158-164 mutembei & ishengoma (towards academic computer emergency response teams in african developing countries) cybercriminals have targeted african universities as a result of lenient security protocols. with africa's universities lagging in terms of ict and infrastructure development (in comparison to western universities), the need for academic computer emergency response teams (cert) is critical [8]. academic-cert would respond to security incidents, conduct vulnerability analysis, and develop incident management skills in an academic setting. in light of the preceding, this paper proposes an academic-cert framework for african universities. the following is the structure of this paper: section 2 contains a review of the literature on cert. section 3 discusses the state of academic cert in african universities and the need for it. section 3 details the study's methodology. section 4 summarized the findings of the study, and section 5 concludes this paper. 2. literature review 2.1. computer emergency response team (cert) cert –computer emergency response team coordination center (cert/cc) is associated with the emergency of worms within computers. november 1988, morris worm was released by a student and affected computers on the internet which led to the formation of the first cert at the university of carnegie mellon [9]. other names used to refer cert/cc are computer emergency response team (cert), computer security incident response team (csirt), cyber incident response teams (cirts) and cyber security incident response teams (csirts). however, the researcher uses the term computer emergency response team (cert) to refer to any emergency team in this study. cert collaborates with information security experts who collaborate on planning, detecting, monitoring, and responding to cyberattacks [10]. cert's mission is to respond to security incidents involving computers and information systems as they occur. the team is required in various settings, including government agencies, private businesses, the military, large and small businesses, and academia. in this study, our focus would be on academic settings. numerous studies have been conducted to demonstrate how to establish certs in various industries. wara and signh [11], conducted a study that shows how to set a cert within a research and education network. their guidelines apply to the formation of a security team within the academic community. while difficulties may arise during the formation of certs, teams should not surrender but should persevere to the end. grobler and bryk [10], conducted a study to determine the number of difficulties encountered when establishing a cert within a nation. the same issues can arise during the formation of academic certs. numerous ideas can be incorporated into their research to assist academic institutions in establishing certs. the formation of certs is contingent upon member trust in order to function effectively. kruidhof's study [12], demonstrates that trust in people is more critical for the cert to carry out its functions. additionally, due to advancements in technology and cybersecurity, the researcher suggests that certs are a necessity in our countries for resolving cyber-attacks both internally and collaboratively. he concluded that trust must exist between individuals and organizations to foster a culture of information sharing. thus, effective collaboration is contingent upon certs developing trust in one another. the importance of certs worldwide cooperating and sharing information in order to resolve cyber problems. the researchers demonstrate how well-established certs can raise cybersecurity awareness among team members and thus be more effective at defending against cyberattacks. the cert team contributes to network security by providing alerts and solutions to problems. in may 2017, a report revealed that approximately 100 countries worldwide had been impacted by a cyber-attack known as ransomware (the guardian, 2017). academic institutions conducted studies and made recommendations to their communities on how to avoid such attacks; a good example comes from norway's university of oslo (2017). the formation of certs is contingent upon member trust in order to function effectively. then, the trust in people is more critical for the cert to carry out its functions. additionally, due to advancements in technology and cybersecurity, the researcher suggests that certs are a necessity in our countries for resolving cyber-attacks both internally and collaboratively. he concluded that trust must exist between individuals and organizations in order to foster a culture of information sharing. thus, effective collaboration is contingent upon certs developing trust in one another. the importance of certs worldwide cooperating and sharing information in order to resolve cyber problems. 160 bulletin of social informatics theory and application issn 2614-0047 vol. 5, no. 2, september 2021, pp. 158-164 mutembei & ishengoma (towards academic computer emergency response teams in african developing countries) 2.2. cert in africa vs world worldwide, international organizations contribute to the development of standards and certify nationals and their constituencies as certs based on agreed-upon criteria. additionally, they collaborate with nations to establish certs and assist in maintaining databases of available certs for researchers to study and recommend appropriately. africa has its own entity, the forum of computer security incident response teams (africacert), which facilitates capacity building, awareness, coordination, and information sharing among member states. 22 african member states have certs, according to (africacert 2020). several certs exist in african developing countries, including eg-cert in egypt, ghcert in ghana, csirt in kenya, ecs-csirt in south africa, and tz-cert in tanzania (tanzania). however, additional work must be done to ensure that at least half of africa's nations have certs and encourage other sectors, such as academia, to establish their own. this will strengthen regional cybersecurity and also aid international organizations in combating cyber-attacks. according to the forum of incident response and security teams' (first) annual report, there will be over 530 cert member teams by july 2020. they classified members according to their geographical origins. the researcher searched the first website and discovered 535 cert members who met the criteria for grouping them into six regions. fig. 1 depicts certs members in first, indicating that africa is still lagging other regions worldwide. fig. 1. certs members in first according to international organizations, africa is still lagging behind other continents in terms of cert establishment. when deciding to research a particular area, academia can play an essential role in stimulating the formation of certs. fig. 2. nations with certs issn 2614-0047 bulletin of social informatics theory and application 161 vol. 5, no. 2, september 2021, pp. 158-164 mutembei & ishengoma (towards academic computer emergency response teams in african developing countries) 2.3. the need for academic cert in africa at the most fundamental level, cyber threats faced by african universities are broadly similar to those faced by universities in other parts of the world. however, contextual factors distinguishes african universities from the rest of the world. contextual factors include poor ict infrastructure such as inadequate access to the internet with the high cost and low bandwidth, frequent power failures and outages, a lack of adequate maintenance and routine patching, a shortage of skilled staff, natural causes (such as natural disasters), political, cultural, and social factors. academic institutions frequently use out-of-date or unpatched software, which makes them particularly vulnerable. for example, computers running software that the development teams no longer support (no longer receiving security updates). while africa offers numerous opportunities, it also faces countless cyber challenges in academia. numerous university students and faculty members use hardware and networks that are incapable of running current software, posing a security risk to their systems. additionally, some pirated software is used, posing significant security risks due to the likelihood that it will not be updated to address vulnerabilities. further, some academic institutions do not publicly disclose security breaches. this complicates determining the scope of attacks on universities in africa and developing solutions. as a result, a trustworthy environment (academic cert) should be established to benefit everyone (including developers and end-users) from cyber-attacks. while several cybersecurity solutions developed outside of africa may be applicable to african universities, africa does have some unique characteristics. except for a few developing nations, most african countries are distinct from the rest of the world in the following ways: 1) professional human resources are scarce in the field of cybersecurity. 2) universities have limited resources to devote to cybersecurity (including funds, sophisticated software, and hardware equipment). 3) africa's universities lack adequate infrastructure (poor internet connection, regular power cuts etc. ). 4) there is a lack of understanding among key stakeholders regarding cybersecurity issues. 5) a deficiency of awareness of the dangers inherent in the use of icts. despite these constraints, african universities host a significant amount of research and innovation. university ecosystems are prosperous "breeding grounds" for it experimentation and research, attracting the attention of hackers from both within and outside the university community. however, the security of information systems is frequently not a well-organized or transparent process in african universities, mainly where it services are decentralized. as a result, computer networks in african universities are insufficiently secured, frequently leaving them vulnerable to manipulation and targeted attacks by malicious code. additionally, infected computers could be remotely used to launch coordinated attacks and engage in various other malicious activities on different networks throughout the world. a security breach could result in data loss, lost time, and diminished credibility for the institution, its students, faculty, and the entire country. while student identification numbers are not as valuable as they once were in african universities, other potential targets include the accounting and finance department, research data, student, human resources, and payroll processing departments, as well as any hosted computer systems or services. universities in africa, regardless of country, face a cybersecurity threat. academic institutions must establish academic certs to prepare for and monitor cyber-attacks on their networks. higher education institutions must employ best security practices to safeguard data and educate students and staff about cybersecurity issues. thus, african universities must develop and implement academic cert in light of the preceding arguments. 3. proposed academic cert framework this section proposes an academic cert framework for african developing countries, using a top-down approach as illustrated in fig. 3. the proposed framework is divided into five clusters, which include the academic cert board, academic cert managers, academic cert technical team, academic cert operational team, and academic cert users. this way, all levels of it authority report issues to their assigned boss. for example, if a user discovers a virus on his or her computer, he or she must immediately contact the academic cert operational team, which will handle the situation appropriately. in exchange, the academic cert operational team will report all information security incidents to a higher management level, specifically to the academic cert managers. 162 bulletin of social informatics theory and application issn 2614-0047 vol. 5, no. 2, september 2021, pp. 158-164 mutembei & ishengoma (towards academic computer emergency response teams in african developing countries) this method pre-arranges and implements information security responsibilities according to authority levels. for example, the board of directors must approve the information security policy, whereas managers are accountable for the institution's information security policy. additionally, it is self-evident that all levels of information technology authority should be proactive in implementing the organization's information security policy. the academic cert manager is responsible for ensuring that all information security policies and practices adopted by the board are adhered to rigorously and correctly by those who fall under their jurisdiction. academic cert managers are also responsible for defining the technical team's roles and responsibilities. they are accountable to the academic cert committee. the academic cert technical team is responsible for effectively managing technical security issues on the university network. this ensures that the university's information is completely secure at all times. individuals working at this level of information technology should have extensive knowledge of information security and significant professional experience. this expertise is frequently acquired through academic training such as tertiary degrees/diplomas or industry-specific information security certifications such as the certified information systems security professional (cissp), certified information security manager (cism), and offensive security certified professional (oscp) (oscp). fig. 3. proposed academic cert framework for african developing countries academic cert's operational team is dedicated to taking all necessary precautions. additionally, the team is committed to ensuring that all university information security policies and procedures are followed. for example, the team can ensure that routine information security procedures, such as applying software security patches and updating computer antivirus, are carried out correctly. the academic cert technical team reports directly to this team. the term "users" refers to all university's computer network users and computer systems (students, staff, and professors). users should be informed of all university policies and guidelines governing the security of university data and computer systems. with numerous sophisticated malicious techniques being developed daily, awareness campaigns for information security are critical at this stage. hence, this approach taken by the proposed framework ensures that all information security issn 2614-0047 bulletin of social informatics theory and application 163 vol. 5, no. 2, september 2021, pp. 158-164 mutembei & ishengoma (towards academic computer emergency response teams in african developing countries) circumstances and events are communicated to the board, which has the authority to adjust information security policies and practices as necessary. 4. proposed practices towards enhancing academic cert we propose several practices in this subsection that should be enforced under academic cert in order to improve security in african academic institutions. the first is limiting the number of sessions. by limiting students to a single valid windows session and requiring them to use only one valid windows connection at a time, significant security vulnerabilities can be avoided. this prevents fraudulent users from using the login credentials concurrently with the legitimate owner. the second is enforce accountability. attempting to prevent multiple logins frequently leaves authorized users liable for any unauthorized action they take, whether it's a data breach, virus distribution, phishing, or more severe hacker attacks. it ensures that access to an institution's critical assets is delegated to a single individual, minimizing threat situations. to address any violations that occur, rules and regulations should then be adhered to systematically. then, enforcing different level of access according to users. the university's network security should be addressed differently depending on the user type, i.e. faculty, staff, or students so that the level of access granted is appropriate for each individual's position within the university. visiting scholars, professors, and staff should also be addressed separately to ensure that their access is withdrawn upon their departure. the first line of defense for a windows network is the control of user accounts according to user type, target audience, and organizational structure, with login privileges granted according to the user's position within the university. consideration should also be given to requirements such as workspace or computer (including personal devices), duration, work schedules, and session format (as well as wireless access). for example, a student who obtains a professor's credentials can access sensitive information from any computer connected to the university network (examination questions, assignments, grades, etc.). userlock can prevent account abuse by allowing the administrator to specify which computers a user may or may not access (via ip range). thus, a student will not access the system via a professor's authentication and the network's free-access computers. and the last is byod security policy. byod security protocols must be implemented because bring your own device (byod) practices expose the university's network to security threats [13]– [15]. to mitigate the risks associated with the inability to retain a byod device, the university's security protocol should enforce the mobile device management (mdm) security approach and remote wipe services. university staff and students can use this software to monitor a missing computer and have the computer's data deleted as of a last resort. all university users should back up their data regularly. by implementing backup and restore procedures, the effects of a missing or stolen computer can be significantly mitigated. 5. conclusion due to increased technological sophistication and reliance on the internet, african universities face a slew of new cyber threats. cyberattacks, like those carried out in other parts of the world, are becoming increasingly sophisticated. african universities' latest research and financial opportunities are attracting an increasing number of attackers with various motives. their influence has grown beyond the confines of individual universities to encompass national security concerns. africa developing countries are particularly vulnerable due to a lack of knowledge about information security, financial constraints, stakeholders' willingness to combat cybercrime, and a scarcity of cybersecurity expertise. regrettably, african universities will continue to face difficulties protecting their networks from cyber-attacks. this paper aims to highlight the importance of academic certs in universities of african developing countries and propose a framework for their implementation. the proposed academic cert framework is structured to assist security professionals in advancing universities' information security programs in african universities. capacity building and information exchange are critical components of cybersecurity in african universities. universities must have access to cutting-edge software and hardware to assist in ensuring 164 bulletin of social informatics theory and application issn 2614-0047 vol. 5, no. 2, september 2021, pp. 158-164 mutembei & ishengoma (towards academic computer emergency response teams in african developing countries) cybersecurity. this includes current and actionable information on vulnerabilities and security strategies and guidance on how to implement them. to accomplish this goal, the academic-cert should initiate capacity-building initiatives. these initiatives will introduce cutting-edge technologies, techniques, and activities to universities through awareness-raising activities. meetings, training sessions, and seminars may all be incorporated into the program. academic certs in africa should promote the use of internet exchange points (ixps) and information sharing and connectivity. ixps can help to mitigate cyberattacks. reduced traffic loads on international connections complicate ddos attacks on those services and infrastructure. local traffic passing through an ixp is unaffected if a foreign connection is disabled due to an attack. internet exchange points, or ixps, are a subset of internet exchange points. african academic certs can motivate academic actors to develop a cybersecurity culture through knowledge exchange, promoting guiding principles, and setting an example. references [1] i. agrafiotis, j. r. c. nurse, m. goldsmith, s. creese, and d. upton, “a taxonomy of cyber-harms: defining the impacts of cyber-attacks and understanding how they propagate,” j. cybersecurity, vol. 4, no. 1, jan. 2018, doi: 10.1093/cybsec/tyy006. [2] j. chapman, a. chinnaswamy, and a. garcia-perez, “the severity of cyber attacks on education and research institutions: a function of their security posture,” 2018. [3] j. wiggen, the impact of covid-19 on cyber crime and state-sponsored cyber activities. konrad adenauer stiftung, 2020. [4] h. v. nguyen, “cybersecurity strategies for universities with bring your own device programs,” walden university, 2019. [5] h. van thai and m. a. l. t. k. anh, “the 4.0 industrial revolution affecting higher education organizations’ operation in vietnam,” int. j. manag. technol., vol. 4, no. 2, pp. 1–12, 2017. [6] l. coleman and b. m. purcell, “data breaches in higher education,” j. bus. cases appl., vol. 15, no. 15, pp. 1–7, 2015. [7] s. coughlan, “hackers beat university cyber-defences in two hours,” bbc news family and education correspondent, 2019. https://www.bbc.com/news/education-47805451 (accessed feb. 21, 2021). [8] internet society, “internet infrastructure security guidelines for africa: a joint initiative of the internet society and the commission of the african union,” 2017. https://www.internetsociety.org/resources/doc/2017/internet-infrastructure-security-guidelines-for-africa/ (accessed mar. 20, 2021). [9] g. killcrece, k. p. kossakowski, r. ruefle, and m. zajicek, “state of the practice of computer security incident response teams (csirts),” 2003. [10] m. grobler and h. bryk, “common challenges faced during the establishment of a csirt,” in 2010 information security for south africa, aug. 2010, pp. 1–6, doi: 10.1109/issa.2010.5588307. [11] y. m. wara and d. singh, “a guide to establishing computer security incident response team (csirt) for national research and education network (nren),” african j. comput. ict, vol. 8, no. 2, pp. 1–8, 2015. [12] o. kruidhof, “evolution of national and corporate certs-trust, the key factor,” in best practices in computer network defense: incident detection and response, m. e. hathaway, ed. ios press, 2014. [13] m. olalere, m. t. abdullah, r. mahmod, and a. abdullah, “a review of bring your own device on security issues,” sage open, vol. 5, no. 2, p. 215824401558037, apr. 2015, doi: 10.1177/2158244015580372. [14] g. disterer and c. kleiner, “byod bring your own device,” procedia technol., vol. 9, pp. 43–53, 2013, doi: 10.1016/j.protcy.2013.12.005. [15] b. morrow, “byod security challenges: control and protect your most sensitive data,” netw. secur., vol. 2012, no. 12, pp. 5–8, dec. 2012, doi: 10.1016/s1353-4858(12)70111-3. bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 1, march 2022, pp. 76-83 76 https:doi.org/10.31763/businta.v6i1.551 dragonfly algorithm for crowd npc movement simulation in metaverse ong, hansel santoso a,1, hartarto junaedi a,2, joan santoso a,3* a institut sains dan teknologi terpadu surabaya, surabaya indonesia 1 hansel@istts.ac.id; 2 hartarto@istts.ac.id; 3 joan@istts.ac.id * corresponding author 1. introduction the pandemic has limited movement and interaction between people, causing new communication challenges. the current development of virtual reality (vr) technology enables its users to interact with other people in the virtual world through avatars, known as social virtual reality (svr) [1]. as the virtual world is built, it is necessary to add supporters such as a crowd that can walk around the world to make it more similar to the real world. the crowd needs to be given artificial intelligence not to look stiff or move based on the pattern provided, according to [2], [3]. the movement of humans in the real world always avoids objects in front of them and pays attention to their surroundings. dragonfly algorithm (da) by [4] is a metaheuristic algorithm that has the characteristic of knowing who its neighbors are and can walk side by side to the destination without bumping into each other and away from enemies, which is a modification of particle swarm optimization (pso) [5]. in the real world, it would more or less apply the same thing to not bumping into each other and getting past obstacles, and not crashing into walls. implementing artificial intelligence for crowds can be done by simulating crowds in an exhibition. a job fair exhibition is a form of exhibition that can provide multiple profiles for each individual, and each has their abilities. previous studies found that many crowd simulations were driven by metaheuristic algorithms such as pso and other modifications. however, da for motion simulation still does not exist. therefore the gap in this study is to use da as an artificial intelligence for crowd simulation. in addition, the use of crowd simulations with many profiles in an exhibition is still minimal. through this research, it is hoped that da will be a solution for crowd simulation of non-playable character (npc), which has more natural movements than other algorithms. in addition, through this research, it will be developed in a metaverse world that prioritizes the virtual world like the real world with vr [6]. a r t i c l e i n f o a b s t r a c t article history received december 18, 2021 revised january 18, 2022 accepted february 3, 2022 during the pandemic period, the development of virtual reality (vr) in the field of social media (metaverse) is very fast to give new experiences. to provide a new experience, the development of a supporting virtual world as a gathering place is needed, to support the presence of others that become a factor of social virtual presence (svr) npc is required. npc crowds will be tested in a job fair case study by compared dragonfly and particle swarm optimization algorithms. algorithm testing will be adjustable with the same parameters and profiles for individuals and objectives. after experiment and evaluation, dragonfly algorithms was more optimal and provided better svr. this is an open access article under the cc–by-sa license. keywords metaverse crowd movement intelligent metaheuristic dragonfly algorithm particle swarm optimization https://10.0.124.19/businta.v6i1.551 mailto:joan@istts.ac.id http://creativecommons.org/licenses/by-sa/4.0/ http://creativecommons.org/licenses/by-sa/4.0/ issn 2614-0047 bulletin of social informatics theory and application 77 vol. 6, no. 1, march 2022, pp. 76-83 hansel santoso et.al (dragonfly algorithm for crowd npc…) 2. method npc crowd simulation in this study will compare pso with da with the same scenario and fitness function. the manufacturing stage will be divided into three parts: preparation, trial, and evaluation. fig. 1. the methodology is divided into three stages: preparation, trial, and evaluation. the preparation stage will be divided into several parts, as in “fig. 1”, designing scenarios for job fair exhibitions, creating 2d scenario environments, npc profiling and job fair booth profiling, and creating models for npc. the first part will design the form of the job fair, from how wide the world will be made, how many booths will be used in 1 job fair, what is the minimum number of visitors and the maximum number of visitors, how many types of jobs will be adapted to the booth, and how many types of individuals. 2.1. preparation fig. 2. initial scenario design of job fair exhibition the second part, like “fig. 2” continuing with the scenario design is urgently needed to determine the position of the spawn location for each npc, the position of the fair job booth and which places npcs may enter or not, and exits from exhibitions such as job fairs in general so that they can 78 bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 1, march 2022, pp. 76-83 hansel santoso et.al (dragonfly algorithm for crowd npc…) determine the flow of visitors. the third section will profile each type and booth type. the profile of each npc can influence decision-making and how long it takes to reach the fair job booth. table.1 npc profiling based on the skill no. job seeker npc profiling skill age degree interest score 1 person a artificial inteligent random (2340) bachelor it 0.0 0.1 2 person b machine learning engineer random (2340) bachelor / master it 0.1 0.2 3 person c data scientist random (2340) bachelor / master it 0.2 0.3 4 person d web developer random (2340) bachelor it 0.3 0.4 5 person e accountant random (2340) bachelor business 0.4 0.5 6 person f business analyst random (2340) bachelor / master business 0.5 0.6 7 person g financial analyst random (2340) bachelor / master business 0.60.7 8 person h animators random (2340) bachelor / master design 0.70.8 9 person i creative director random (2340) bachelor / master design 0.80.9 10 person j fashion designer random (2340) bachelor design 0.9 1.0 npc profiles like “table 1” each profile of the npc is divided into ten types according to the individual skills of each npc. other attributes that support the profile of the npc are age which will be given a random score from the age of 23-40, graduates will also be randomly assigned between bachelor and masters, and interest will have a fixed value according to the skills of each npc. table.2 job fair booth profiling based on the vacancy no company job fair booth profiling vacancy 1 vacancy 2 vacancy 3 minimum requirement degree min age max age field score 1 company a machine learning engineer data scientist web developer bachelor 23 26 it 0.0 0.1 2 company b creative director artificial inteligent business analyst bachelor 23 40 mixed 0.1 0.2 3 company c accountant financial analyst data scientist bachelor 23 40 mixed 0.2 0.3 4 company d artificial inteligent machine learning engineer data scientist master 24 30 it 0.3 0.4 5 company e business analyst financial analyst accountant bachelor 23 26 business 0.4 0.5 6 company f data scientist business analyst creative director master 24 40 mixed 0.5 0.6 7 company g artificial inteligent animators web developer bachelor 23 26 mixed 0.6 0.7 8 company h financial analyst fashion designer animators bachelor 23 30 mixed 0.7 0.8 9 company i fashion designer creative director animators bachelor 23 25 design 0.8 0.9 10 company j animators artificial inteligent business analyst bachelor 23 30 design 0.9 1.0 issn 2614-0047 bulletin of social informatics theory and application 79 vol. 6, no. 1, march 2022, pp. 76-83 hansel santoso et.al (dragonfly algorithm for crowd npc…) the booth will also be given a profile that suits the needs of the npc to make the npc move toward the booth. booth profiles are differentiated and given variations such as “table 2” so that each npc can move naturally and not based on existing patterns. the model prepared in the fourth section is intended for the fitness function that pso and da will use. 2.2. trial the trial phase will implement the model as a fitness function for pso and da, giving the same scenario conditions, such as the number of npcs, booths, and exit and entry directions. in this stage, it is tested to see the movement of npcs with different algorithms used, how long it takes for each npc to reach its destination, and how long it takes to reach that goal. pso developed and developed a coefficient to control velocity. the following is a formulation that describes the position and velocity of an individual in a particular dimension and space in (1) and (2). 𝑋𝑖(𝑡) = 𝑋𝑖1(𝑡) + 𝑋𝑖2(𝑡), … . , 𝑋𝑖𝑁 (𝑡) () 𝑉𝑖 (𝑡) = 𝑉𝑖1(𝑡) + 𝑉𝑖2(𝑡), … . , 𝑉𝑖𝑁 (𝑡) () where, x: particle postition v: particle velocity i: particle index t: t-th iteration n: space dimensions the following is a model that describes the mechanism of movement of individuals [5] 𝑉𝑖 (𝑡) = 𝑉𝑖 (𝑡 − 1) + 𝑐1𝑟1(𝑃𝑏𝑒𝑠𝑡 − 𝑋𝑖 (𝑡 − 1) + 𝑐2𝑟2(𝐺𝑏𝑒𝑠𝑡 − 𝑋𝑖 (𝑡 − 1) () where, 𝑉𝑖 (𝑡): velocity of each individual in each iteration 𝑐1, 𝑐2: learning factor. 𝑟1, 𝑟2: random number 0-1. pbest: the best position of the individual. guest: the best position of the population. following are some of the properties of pso which are also found in da and some of which have been modified to be calculated by the model [7]: • separation 𝑆𝑖 = − ∑ 𝑋 − 𝑋𝑗 𝑁 𝑗=1 () where x is the individual's current position, while 𝑋𝑗 is the position of the j-neighbor. the number of neighbors is indicated by n [7]. • alignment 𝐴𝑖 = ∑ 𝑉𝑗 𝑁 𝑗=1 𝑁 () where, 𝑉𝑗 denotes the speed of the j-th individual neighbors, and n is the number of neighbors [7]. 80 bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 1, march 2022, pp. 76-83 hansel santoso et.al (dragonfly algorithm for crowd npc…) • cohesion 𝐶𝑖 = ∑ 𝑋𝑗 𝑁 𝑗=1 𝑁 – 𝑋 () where x denotes the individual's current position and 𝑋𝑗 denotes the position of the j-neighbor individual, and n is the number of neighbors [7]. • attraction toward a food source 𝐹𝑖 = 𝑋 + − 𝑋 () where x indicates the individual's current position and 𝑋+ indicates the position of the food source [7]. • distraction outward an enemy 𝐸𝑖 = 𝑋 − + 𝑋 () where x denotes the individual's current position and 𝑋− denotes the enemy's position [7]. to improve the position of each individual in exploring and exploiting, da uses a modification of the pso step vector as follows: ∆𝑋𝑡+1 = (𝑠𝑆𝑖 + 𝑎𝐴𝑖 + 𝑐𝐶𝑖 + 𝑓𝐹𝑖 + 𝑒𝐸𝑖 ) + 𝑤∆𝑋𝑡 () where: ∆𝑋: vector step s: separation weight a: alignment weight c: cohesion weight f: food weight e: enemy weight w: inertia weight the truncated step vector will be used for position vector calculations as follows: 𝑋𝑡+1 = 𝑋𝑡 + ∆𝑋𝑡+1 () to maximize exploration and exploitation with da. da uses lévy flight calculations [8] when individuals have no neighbors. the following is the calculation of the position vector from the lévy flight: 𝑋𝑡+1 = 𝑋𝑡 + 𝐿é𝑣𝑦 (𝑑) 𝑋𝑡+1 () the formula calculates lévy flight: 𝐿é𝑣𝑦 (𝑥) = 0.01 𝑟1𝜎 |𝑟2| 1 𝛽 () where 𝑟1, 𝑟2 are random numbers 0-1, the 𝛽 constant is 1.5, and 𝜎 is calculated by: 𝜎 = ( 𝜏(1+𝛽)𝑠𝑖𝑛( 𝜋𝛽 2 ) 𝜏( 1+𝛽 2 )𝛽∙2 ( 𝛽−1 2 ) ) 1 𝛽 () issn 2614-0047 bulletin of social informatics theory and application 81 vol. 6, no. 1, march 2022, pp. 76-83 hansel santoso et.al (dragonfly algorithm for crowd npc…) to calculate 𝜏 by: 𝜏(𝑥) = (𝑥 − 1)! () the calculation for each iteration of pso and ga also has differences at each step. when pso runs the fitness function for all individuals, the best individual (gbest) will be selected, and the best movement will be recorded for each individual (pbest). meanwhile, da first calculates each neighbor with the euclidian distance and updates each individual's neighbors. when an individual alone does not have neighbors, the individual will move randomly to explore, and vice versa. when there is at least one neighbor, the individual will expand the radius of their neighbors to be more convergent. the fitness function formulation to be used in this study is as follows: d = √(𝑥2 − 𝑥1) 2 − (𝑦2 − 𝑦1) 2 () 𝑝 = |𝑥2 − 𝑥1| () 𝑓(𝑥) = 𝑑 + 𝑝 () equation (15) calculates the distance between each individual and the booths spread over the area, and equation (16) calculates the profile similarity between individuals and job fair booth profiles as a fitness function used in each iteration of equation (17). with all the equations and cycles that will be run based on the fixed parameters, a comparison will be made with the pso. 2.3. evaluation the results of the experimental phase will be evaluated to determine which algorithm is most suitable for the scenario used. the suitability of this model is used to see how natural the movement of each npc that spawns and walks toward each destination is. in the course of the npc, how long it takes to explore (roam the job fair exhibition) and exploit the destination (stay in the booth) will be measured. this experiment was compared with 30 iterations of 100 populations and the fitness function in equation (17). fig. 3. scenario using population fig.3 shows a scenario with several populations: the first with 10 populations, the second with 20 populations, the third with 40 populations, and the last 80 populations. with some of the pictures above, it can be seen that the movements of each individual will first polarize to find food and stay away from enemies, then will continue to approach the food closer and closer and reach the food, represented by the fair job booth. for the movement itself, sometimes it still looks a little stiff because the random value given will determine the direction of the vector. 82 bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 1, march 2022, pp. 76-83 hansel santoso et.al (dragonfly algorithm for crowd npc…) table.3 the experimental results use the da algorithm population trial time for all agents to reach the target (s) average time (s) 10 1 8 18.3 10 2 20 10 3 17 20 1 30 33 20 2 25 20 3 44 40 1 46 48.3 40 2 49 40 3 50 80 1 55 56 80 2 52 80 3 61 table 3 shows the results of calculating how long each individual can reach the goal in the unity program with a waiting time of 1 second. the trials carried out several times gave entirely satisfactory results because it was faster than pso, but it could only reach one goal and still needed development in further research into multi-objectives so that not only one booth was approached by all fair job attendees. 3. results and discussion fig. 4. konvergen result fig.4 shows when all individuals will move toward the food, namely the fair job booth, by calculating the shortest distance and profile that matches the individual represented as a fair job visitor. fig. 5. the results of the pso algorithm use matlab and unity fig.5 on the left is the result of using the pso algorithm in the matlab program, and the results show convergence at iteration 70, and on the right is a visualization in the unity program in 2 dimensions or top view. issn 2614-0047 bulletin of social informatics theory and application 83 vol. 6, no. 1, march 2022, pp. 76-83 hansel santoso et.al (dragonfly algorithm for crowd npc…) fig. 6. the results of the da algorithm use matlab and unity fig. 6 on the left shows the results of processing the fitness function using the matlab program, and on the right, the visualization results in unity in the two dimensions seen above. the results show that the success of da in solving problems faster than pso in fig.3 can be seen from the number of iterations needed to converge. the da algorithm only requires less than 20 iterations to converge compared to the pso, which requires 70 iterations. 4. conclusion after an experiment comparing pso with da, it was found that da is a more optimal algorithm than pso and provides a stronger immersive side due to the calculation of neighbors and random movements from levy's algorithm. however, this experiment still uses a single objective to achieve the goal, and for further research, it will be made with multi-objectives to determine more than one goal and not crowd into one place. besides that, it will be implemented with 3-dimensional assets in a virtual environment. references [1] m. e. latoschik, f. kern, j. p. stauffert, a. bartl, m. botsch, and j. l. lugrin, “not alone here?! scalability and user experience of embodied ambient crowds in distributed social virtual reality,” ieee trans. vis. comput. graph., vol. 25, no. 5, pp. 2134–2144, may 2019, doi: 10.1109/tvcg.2019.2899250. [2] c. kiourt, g. pavlidis, a. koutsoudis, and d. kalles, “multi-agents based virtual environments for cultural heritage,” icat 2017 26th int. conf. information, commun. autom. technol. proc., vol. 2017-december, pp. 1–6, dec. 2017, doi: 10.1109/icat.2017.8171602. [3] a. a. owaidah, d. olaru, m. bennamoun, f. sohel, and r. n. khan, “modelling mass crowd using discrete event simulation: a case study of integrated tawaf and sayee rituals during hajj,” ieee access, vol. 9, pp. 79424–79448, 2021, doi: 10.1109/access.2021.3083265. [4] s. mirjalili, “dragonfly algorithm: a new meta-heuristic optimization technique for solving singleobjective, discrete, and multi-objective problems,” neural comput. appl., vol. 27, no. 4, pp. 1053– 1073, may 2016, doi: 10.1007/s00521-015-1920-1. [5] j. kennedy and r. eberhart, “particle swarm optimization,” proc. icnn’95 int. conf. neural networks, vol. 4, pp. 1942–1948, doi: 10.1109/icnn.1995.488968. [6] w. hurst and r. geraerts, “augmented and virtual reality interfaces for crowd simulation softwarea position statement for research on use-case-dependent interaction,” 2019 ieee virtual humans crowds immersive environ. vhcie 2019, may 2019, doi: 10.1109/vhcie.2019.8714733. [7] c. w. reynolds, "flocks, herds and schools: a distributed behavioral model," siggraph comput. graph., vol. 21, no. 4, pp. 25-34, aug. 1987, doi: 10.1145/37402.37406. [8] x. s. yang and s. deb, “cuckoo search via lévy flights,” 2009 world congr. nat. biol. inspired comput. nabic 2009 proc., pp. 210–214, 2009, doi: 10.1109/nabic.2009.5393690. https://doi.org/10.1109/tvcg.2019.2899250 https://doi.org/10.1109/icat.2017.8171602 https://doi.org/10.1109/access.2021.3083265 https://doi.org/10.1007/s00521-015-1920-1 https://doi.org/10.1109/icnn.1995.488968 https://doi.org/10.1109/vhcie.2019.8714733 https://doi.org/10.1145/37402.37406 https://doi.org/10.1109/nabic.2009.5393690 bulletin of social informatics theory and application issn 2614-0047 vol. 5, no. 2, september 2021, pp. 115-123 115 https:doi.org/10.31763/businta.v5i2.491 database optimization for improved system performance and response time of hospital management information system bayu rahayudi 1,*, nurizal dwi priandani 2, buce trias hanggara 3,wayan firdaus mahmudy 4 universitas brawijaya, malang, indonesia 1 ubay1@ub.ac.id*; 2 priandani@ub.ac.id; 3 buce_trias@ub.ac.id; 4 wayanfm@ub.ac.id * corresponding author 1. introduction the hospital management information system (sistem informasi manajemen rumah sakit /simrs) is an arrangement that deals with data collection, data management, information presentation, analysis and conclusion of information, and delivery of information needed by stakeholders regarding hospital activities [1]. in general, simrs includes clinical information systems, administrative information systems, and management information systems. simrs is an integrated information system prepared to handle the entire hospital management process, from services, diagnosis, and action for patients, medical records, pharmacies, pharmacy warehouses, billing, personnel database, employee payroll, accounting processes to control by management [2][3]. the hospital management information system can be utilized by all general hospitals, both managed by government and privately as regulated in the law of the republic of indonesia number 44 of 2009 concerning hospitals, and also in regulation of the minister of health no. 82 of 2013 concerning hospital management information systems [4][5][6]. in the latest, article 1 paragraph 6 states that the function of simrs is to increase efficiency, effectiveness, professionalism, performance, and access to hospital services. information systems play an important role in the production, sharing, storage and transmission of information in various fields, especially in hospital management information systems [7]–[11]. a good simrs system, information, and service quality satisfy its users [12]–[17]. the system quality included a system that can function properly and respond quickly to its users [18][19]. the fast a r t i c l e i n f o a b s t r a c t article history received august 5, 2021 revised august 15, 2021 accepted august 30, 2021 a regional hospital in east java has implemented a hospital management information system, namely simrs, in their data management system but has experienced problems in the form of slow system response when accessed by many users, was experienced in the last years when the system had been running for four years since 2016. the system’s slow response causes hospital services to be disrupted and also the quality of service to decline. so, an analysis to the existing database system is carried out, which includes an analysis of the system‘s database performance. since many simrs use database servers on their data processing, then their applications will be based on executing queries and stored procedures (most of the queries are stored in stored procedures). so that, analysis of those queries will be carried out. the optimization process will include analyzing and mapping the database’s queries, profiling, and analyzing the actual execution plan. by doing so, it is known which parts of the query are causing a decrease in performance and time system response. based on the analysis results, recommendations are given for improving and rewriting several stored procedures and query statements, and the system response time is getting better. this is an open access article under the cc–by-sa license. keywords simrs analysis system profiling actual execution plan analysis response time measurement http://creativecommons.org/licenses/by-sa/4.0/ http://creativecommons.org/licenses/by-sa/4.0/ 116 bulletin of social informatics theory and application issn 2614-0047 vol. 5, no. 2, september 2021, pp. 115-123 rahayudi et.al (database optimization for improved system performance) response will depend on the amount of data stored in the database and commands for processing and retrieving data [19]. as time goes by, where there is additional data on simrs, it will affect the system response time. simrs, which have and store large amounts of data, have the potential for slower response times as more data is stored. the implementation of a good design and database system will affect the system's performance [20]. asyary [21] also conducted research that aims to determine the use of simrs from the user's point of view with the technology acceptance model (tam) measurement method in a case study at a maternity hospital in lampung, indonesia. these studies provide an overview of the use of information system features and user workflows in the currently implemented information systems considered not optimal. many papers showed research about database optimizations and said that database optimization is an important process that should be done when building information systems [22]–[25]. zhang [25] said that optimizing database systems plays a vital role even though it is a very complex task. satoto [22] discusses how to optimize the database system so that when the data is accessed does not affect the performance of server systems. process optimization is done on the design of the database system. he said that database design plays a vital role in determining system performance. wankhade [23] in his paper discusses about the importance, objectives and different approaches to query optimization. he tried to summarize some of the helpful query optimization techniques focused on common query constructs. dorottya et.al [26] discusses the aspects of optimization performance related to data access in a database containing soy and corn-based products to ensure a quick search in the database. the result was database optimization techniques had been derived to address the issues that may limit the performance of a database to an extent of vulnerability. one of the regional hospital (rsud in the indonesian language) in east java has also used simrs to manage his hospital and experienced a similar problem: slow response time to simrs users. simrs slow response causes hospital services to decline. for this reason, an analysis of the existing simrs is carried out to find out the problems so that the system can be optimized and system response time can be increased. 2. research method the research methodology carried out in this research is following the concept which depicted in fig. 1. the activity begins with a background description, objectives determination and purposes of the research. after that, data collection is carried out, and followed by analyzing data that has been collected. based on the analysis, the recommendation is proposed to make system improvements and better system response time. 2.1. method of collecting data data collection activities is carried out by collecting data through primary data surveys and secondary data observation. primary data collection was carried out by making direct observations at the rsud, by looking at the location of the server and client using simrs, and observing the process of using simrs by users. secondary data collection is carried out through literature or literature studies and related information to systems analysis activities. at this stage, data collection is carried out through manual book, application guides, and reports on simrs. 2.2. system analysis the system analysis stage is carried out by analyzing the existing system, by collecting data on a running system, including system functions, system input-output, processes, databases used [27]. an analysis also includes a performance tuning process that consists of identifying performance bottlenecks, prioritizing the issues, troubleshooting their causes, applying different resolutions, quantifying performance improvements, and then repeating the whole process again and again [28]. in addition, data collection is also carried out on several hardware devices such as a set of computers, network equipment used, and analysis of the software used in simrs. issn 2614-0047 bulletin of social informatics theory and application 117 vol. 5, no. 2, september 2021, pp. 115-123 rahayudi et.al (database optimization for improved system performance) fig. 1. research methodology used in this research 2.3. optimization and system improvement from the results of the analysis, recommendations and system improvement are carried out into computer code. improvement is carried out by optimizing the database design, including improving the relations between tables in the database and improving query and stored procedure codes. 2.4. system testing system testing is carried out to ensure that the system is running according to the results of the analysis and optimization. at this stage, functional testing and performance measurement of each process is carried out to ensure that all functions are running, all input entered has been validated and the output displayed has met the needs. 3. general description of rsud x simrs simrs on one of rsud in east java was implemented for the first time in january 2016. the simrs is an application specially designed using the erp (enterprise resource planning) concept by integrating all units/sections/installations in the hospital, both medical and non-medical services. this application consists of 36 modules and was developed with the visual basic programming language and used a database implemented using the microsoft sql server dbms. the database developed consists of several objects, including 1210 tables, 1106 stored procedures, 2936 views and 212 functions. based on the initial analysis carried out on the simrs, it is known that two simrs application modules resulted in poor performance and slow response time. both modules are included in the main module of simrs. these modules are the pharmacy logistics module and the medical records module. these two modules give a large load to the system so that when the two modules are run, the system's performance will decline significantly. 118 bulletin of social informatics theory and application issn 2614-0047 vol. 5, no. 2, september 2021, pp. 115-123 rahayudi et.al (database optimization for improved system performance) 4. system testing and analysis for system testing and verification, analysis will be carried out on two simrs modules already mentioned. process mapping, profiling techniques, and execution plan analysis will be carried out on the query procedures and functions contained in the modules. 4.1. pharmacy logistics module analysis this pharmacy logistics module is a simrs module which functions is to process data in pharmacies and drug storage. this module's mostly process is checking (data loading), updating, and saving data for prescriptions and medicines. the initial step of the module analysis is to map the processes that occur in the module. one of the results of the process mapping can be seen in fig. 2. it is present the process in the service of medicine prescription, whereas the process involves several queries and stored procedures. after mapping the process, they are then followed by analyzing the process and measuring processing time of the query using the profiler. and then continuing the analysis using the actual execution plan. the process of query monitoring is done using ms sql profiler, which is carried out in the frmuseobatalkes object. this object accessed the drug storage database and triggered several queries and stored procedure. the monitoring results can be seen in fig. 3, and it is found that the execution of (sp)add_pemakaiobatalkesresepnew (stored procedure that checking medicine stocks) and also (sp) add_generate_resepobat (stored procedure that updates medicine stocks) are the processes that consume the largest resources. the next step is analyzing actual execution plan. the analysis targeted (sp) add_pemakaiobatalkesresepnew and (sp)add_generatere sepobat. the analysis results of the actual execution plan show that there are queries with the high cost. the first one had cost of 100%, i.e (sp)add_generateresepobat, and the second one had a query load of 90% on (sp)add_pemakaiobatalkesresepnew. the result of the analysis shows that previously problems described are caused by computation time and cost that is carried out in saving and loading data. if this process can be refined and optimized, then the problems can be resolved. process refining and optimization will reduce computation time and cost and improve the response time of the system. the process of improvement and recommendations for this module are summarized and explained in the recommendation section below. fig. 2. results of pharmacy logistics module process mapping issn 2614-0047 bulletin of social informatics theory and application 119 vol. 5, no. 2, september 2021, pp. 115-123 rahayudi et.al (database optimization for improved system performance) fig. 3. profiler results for the pharmacy logistics module 4.2. medical records module analysis similar to the process carried out in the pharmacy logistics module, it is also carried out to the medical record module. this medical record module will record (update and save) the patient's medical history and treatment data through related queries and stored procedures. the results of mapping process on tables, stored procedures and functions of the module are shown in fig. 4, while the results of the profiling process can be seen in fig. 5. it is shown in fig. 5 that the execution process of (sp)add_biayapela yananotomatisnew (stored procedure that calculate medical treatment cost), add_registrasipasienmrs (stored procedure that add/update patient’s record data) and add_pasienmasukkamar (query that add/update data for impatient data) are processes that consumes the most resources. based on analyzing actual execution plan in the medical record module, it is shown that query with the highest cost is on the 6th, 7th and 8th queries with a query load of 16%, 27% and 58% respectively on (sp)add_biayapelayanan_automatic_new. fig. 4. result of mapping process on medical record module 120 bulletin of social informatics theory and application issn 2614-0047 vol. 5, no. 2, september 2021, pp. 115-123 rahayudi et.al (database optimization for improved system performance) fig. 5. profiling results of the medical record module 4.3. discussion and recommendations on applications and databases based on the analysis of the pharmacy logistics and medical records module, a comprehensive and global recommendation can be obtained, which can also be implemented for all modules on simrs of the rsud to improve existing information systems' performance and response time. for optimization of unnecessary queries, the query algorithm tracing is carried out in the analysis phase to find out what steps are carried out in the stored procedure. in this phase, several queries were found that hindered the data exchange process, for example: • a select table process is inserted into the variables, but the variables used are not processed in any process. this results in wasted cpu and memory usage. the recommendation given is to delete this select query. • there is an update query where the condition of the selection process does not return a value, so no rows are updated, but this query resulted in a long process. the recommendation is to add the if-else conditional command to the query, which will not be updated if it does not return a value. • use the select and where commands to get data that only has one value. the recommendation given is to replace the command with the select top 1 command which will return one value on hundreds or millions of rows of data. one of the problems that arise and slowdown the processes is an inefficient looping process. it is found a process contained in the medical record module in (sp) add_rekapitulasikamarrawatinap (stored procedure that calculates and count for room that is occupied and unoccupied) that was carried out about 700 times through looping, which was obtained from the select count query process in view v_informasikamarrawatinap (view/query that process impatient room records). after further analysis, it was found that the 700 data results were duplicated, that the really needed data was only about 100 data. thus,it is recommended to use the select distinct command when retrieving data to the v_informasikamarrawatinap view. performance problems also occur using aggregate functions, namely the max and count commands, which are used to retrieve data that only produces one value. these problems can be solved by applying the concept of lightly summarized data, a simple concept of a data warehouse. in the pharmacy logistics module, a process is needed to collect the maximum queue number per day. to ease the read process, both in terms of memory and cpu, a summary table is created called counterantrianresepseq (table that record patient’s queue number) which contains only 2 attributes, namely date and nomaxantriresep (maximum patient’s number that can be hadled). the data stored in the table is the maximum queue no data per day which will continue to be updated when a new issn 2614-0047 bulletin of social informatics theory and application 121 vol. 5, no. 2, september 2021, pp. 115-123 rahayudi et.al (database optimization for improved system performance) queue arrives. unlike the previous query that requires the max function to calculate the maximum value of several rows of data, this process only execute a select statement. there is a very significant difference in the number of process, which if in the previous table the process will access more than 100,000 rows, then in the lightly summarized table the process will only access 100 rows. 5. performance evaluation after implementing recommendations after implementing the recommendations, by rewriting some queries and repairing programs in logistics pharmacy module and medical record module, the simrs performance increase significantly. after recommendations for logistics pharmacy module are implemented, the total cost that can be reduced is around 95% for the entire process in the. and after recommendations for medical record module are implemented, the total cost that can be reduced is around 93% for the entire process. so the overall performance of the systems after recommendation implementation increase by 94%. this improvement has a significant effect on the simrs service to customers, which can reduce queue time and affect hospital employee response, that they can respond better (quicker) to customers. 6. conclusions this study analyzes the query process that occurs in several simrs modules at one of rsud in east java, which has decreased performance and response time. after analyzing the query, by mapping the process, profiling, and analyzing the actual execution plan, it is known which parts of the query cause a decrease in system performance and response time, so that recommendations can be made to improve queries improve performance and response time. the recommendations include optimizing and eliminating unnecessary queries, looping process refinement that increased efficiency and reduced redundancy in query data resulting by system, and lastly, using variables and light summarized data in queries and stored procedures. acknowledgment we would like to thank the it team department of rsud x in east java for their help and cooperation when conducting this research. references [1] v. n. helia, v. i. asri, e. kusrini, and s. miranda, “modified technology acceptance model for hospital information system evaluation – a case study,” matec web conf., vol. 154, p. 01101, feb. 2018, doi: 10.1051/matecconf/201815401101. [2] p. r. vegoda, “introduction to hospital information systems,” int. j. clin. monit. comput., vol. 4, no. 2, pp. 105–109, 1987, doi: 10.1007/bf02915853. [3] n. i. ismail, n. h. abdullah, and a. shamsuddin, “adoption of hospital information system (his) in malaysian public hospitals,” procedia soc. behav. sci., vol. 172, pp. 336–343, 2015, doi: 10.1016/j.sbspro.2015.01.373. [4] menteri kesehatan republik indonesia, “peraturan menteri kesehatan ri nomor 82 tentang sistem informasi manajemen rumah sakit,” peratur. menteri kesehat., no. 87, pp. 1–36, 2013. [5] p. r. indonesia, “undang-undang republik indonesia nomor 44 tahun 2009,” undang. republik indones., vol. 44, no. 10, p. 41, 2009. [6] p. w. handayani, a. n. hidayanto, d. ayuningtyas, and i. budi, “hospital information system institutionalization processes in indonesian public, government-owned and privately owned hospitals,” int. j. med. inform., vol. 95, pp. 17–34, 2016, doi: 10.1016/j.ijmedinf.2016.08.005. [7] d. demirel, “hospital management information systems in health sector and development in turkey journal of current researches on health sector hospital management information systems in health sector and development in turkey,” j. curr. res. heal. sect. (j o c r e h e s), 2018. [8] g. h. c. sibuea, t. a. napitupulu, and a. r. condrobimo, “an evaluation of information system using hot-fit model: a case study of a hospital information system,” proc. 2017 int. conf. inf. manag. 122 bulletin of social informatics theory and application issn 2614-0047 vol. 5, no. 2, september 2021, pp. 115-123 rahayudi et.al (database optimization for improved system performance) technol. icimtech 2017, vol. 2018-january, no. november, pp. 106–111, 2018, doi: 10.1109/icimtech.2017.8273520. [9] s. l. hsieh et al., “an integrated healthcare enterprise information portal and healthcare information system framework,” annu. int. conf. ieee eng. med. biol. proc., no. december 2003, pp. 4731–4734, 2006, doi: 10.1109/iembs.2006.260715. [10] t. takemura, n. kume, k. okamoto, t. kuroda, and h. yoshihara, “development of an environment for information reuse on a hospital information system,” 6th int. conf. soft comput. intell. syst. 13th int. symp. adv. intell. syst. scis/isis 2012, pp. 1384–1387, 2012, doi: 10.1109/scis-isis.2012.6505339. [11] p. balaraman and k. kosalram, “e –hospital management & hospital information systems – changing trends,” int. j. inf. eng. electron. bus., vol. 5, no. 1, pp. 50–58, 2013, doi: 10.5815/ijieeb.2013.01.06. [12] n. fadilla and w. setyonugroho, “sistem informasi manajemen rumah sakit dalam meningkatkan efisiensi: mini literature review,” tek. inform. dan sist. inf., vol. 8, no. 1, 2021. [13] p. w. handayani, a. n. hidayanto, a. a. pinem, i. c. hapsari, p. i. sandhyaduhita, and i. budi, “acceptance model of a hospital information system,” int. j. med. inform., vol. 99, no. 1171, pp. 11–28, 2017, doi: 10.1016/j.ijmedinf.2016.12.004. [14] m. khalifa and o. alswailem, “hospital information systems (his) acceptance and satisfaction: a case study of a tertiary care hospital,” procedia comput. sci., vol. 63, no. icth, pp. 198–204, 2015, doi: 10.1016/j.procs.2015.08.334. [15] f. r. rumambi, a. j. santoso, and d. b. setyohadi, “identification of factors influencing the success of hospital information system (sirs) by hot-fit model 2006: a case study of rsud dr samratulangi tondano, minahasa regency, north sulawesi,” proc. 2017 int. conf. soft comput. intell. syst. inf. technol. build. intell. through iot big data, icsiit 2017, vol. 2018-january, pp. 202–207, 2017, doi: 10.1109/icsiit.2017.38. [16] h. a. anema, j. kievit, c. fischer, e. w. steyerberg, and n. s. klazinga, “influences of hospital information systems, indicator data collection and computation on reported dutch hospital performance indicator scores,” bmc health serv. res., vol. 13, no. 1, p. 1, 2013, doi: 10.1186/1472-6963-13-212. [17] h. yu, j. li, h. chen, x. zhang, y. tian, and y. yang, “performance evaluation of post-relational database in hospital information systems,” 2nd int. work. educ. technol. comput. sci. etcs 2010, vol. 2, pp. 247–251, 2010, doi: 10.1109/etcs.2010.134. [18] j. choi et al., “implementation of consolidated his: improving quality and efficiency of healthcare,” healthc. inform. res., vol. 16, no. 4, pp. 299–304, 2010, doi: 10.4258/hir.2010.16.4.299. [19] k. m. kuo, c. f. liu, p. c. talley, and s. y. pan, “strategic improvement for quality and satisfaction of hospital information systems,” j. healthc. eng., vol. 2018, 2018, doi: 10.1155/2018/3689618. [20] b. rahayudi, a. w. widodo, c. dewi, m. a. rahman, and w. f. mahmudy, “design spatial-based information system using flexible field-value database∗,” proc. 2019 4th int. conf. sustain. inf. eng. technol. siet 2019, pp. 100–103, 2019, doi: 10.1109/siet48054.2019.8986009. [21] a. asyary, a. k. nur prasetyo, t. eryando, and s. gerke, “users’ perception of the hospital information system in a maternity hospital in lampung, indonesia,” kesmas, vol. 14, no. 2, pp. 76–81, 2019, doi: 10.21109/kesmas.v14i2.2574. [22] k. i. satoto, r. r. isnanto, r. kridalukmana, and k. t. martono, “optimizing mysql database system on information systems research, publications and community service,” proc. 2016 3rd int. conf. inf. technol. comput. electr. eng. icitacee 2016, pp. 1–5, 2017, doi: 10.1109/icitacee.2016.7892476. [23] p. wankhade and v. deshmukh, “an overview of query optimization techniques in database systems,” int. res. j. eng. technol., pp. 1116–1119, 2008. [24] g. c. a. l. aponso, t. m. t. i. tennakon, a. m. c. b. arampath, s. kandeepan, h. p. k. k. s. amaratunga, and s. lanka, “database optimization using genetic algorithms for distributed databases,” int. j. comput., vol. 24, no. 1, pp. 23–27, 2017. [25] j. zhang, “research on database application performance optimization method,” no. mmebc, pp. 2236– 2239, 2016, doi: 10.2991/mmebc-16.2016.448. issn 2614-0047 bulletin of social informatics theory and application 123 vol. 5, no. 2, september 2021, pp. 115-123 rahayudi et.al (database optimization for improved system performance) [26] d. c. pamfil and r. academy, “database optimization techniques applied to a database contain soy and corn based products to ensure a quick search in this database.,” bull. univ. agric. sci. vet. med. clujnapoca. hortic., vol. 69, no. 2, 2012, doi: 10.15835/buasvmcn-hort:8823. [27] t. sutabri, analisis sistem informasi. penerbit andi. [28] g. fritchey, sql server 2012 query performance tuning. berkeley, ca: apress, 2012. bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 2, december 2022, pp. 151-157 151 https:doi.org/10.31763/businta.v6i2.596 deep learning in education: a bibliometric analysis aji prasetya wibawa a,1,*, felix andika dwiyanto b,2, agung bella putra utama a,3 a department of electrical engineering, universitas negeri malang, malang, indonesia b faculty of computer science, electronics, and telecommunications, agh university of science and technology, kraków, poland 1 aji.prasetya.ft@um.ac.id ; 2 dwiyanto@agh.edu.pl; 3 agungbpu02@gmail.com * corresponding author 1. introduction the modern classroom has become increasingly digitized due to recent advancements in artificial intelligence (ai) [1], [2]. this technology is beginning to take over repetitive classroom tasks, such as continuous student assessment or grading, optimizing course work, and revolutionizing how teachers teach and students learn [3]. modern classrooms can improve their resource allocation, the context of personalized learning, adaptive assessments, and predictive analysis by using technology namely machine learning (ml). ml is an ai subfield, a discipline of computing that uses statistical approaches to endow computer systems with the capacity to learn. ml has advanced rapidly in recent years, allowing machines to learn from examples and experiences, establishing a foothold in the educational sector [4]. on the other hand, deep learning (dl) is a subfield of ml that focuses on the creation of artificial neural networks (ann). these networks are comprised of algorithms that are modeled after the structure and function of the human brain [5]. for various objectives, deep learning may be used in education, including obtaining individualized information about each student's educational experience [6]. instructors and administrators can then utilize this information to assist them in making automated choices based on data. a significant advantage of machine learning models is their ability to find patterns in big data sets that are difficult to notice manually, allowing for the regulation of abnormal behaviors, early diagnosis of school failure, and grouping of students or teachers [7], [8]. educational and technical innovation occurs through high-quality digitalization and enhancement of teaching and learning to enhance students' and instructors' personal, professional, and social growth, hence the development of families and society [9]. it has been demonstrated that online activity strongly correlates with a student's grade on a topic [10]. student engagement in learning activities may be a significant predictor of teaching quality since it demonstrates students' interest in the deep processing of learning information and reflects the time students spend on assignments assigned by a r t i c l e i n f o a b s t r a c t article history received october 30, 2022 revised november 21, 2022 accepted december 3, 2022 this study investigates the application and development of deep learning in educational settings. based on the statistics of scientific papers, analysis done using bibliometrics demonstrates the rise of deep learning in educational settings. deep learning is having a transformative effect on all aspects of education and learning, as well as research. these findings could pave the way for more investigation into deep learning, particularly in education. according to the bibliometric results, the netherlands, china, the united states of america, india, and norway are the five countries that have contributed the most to deep learning in education. norway came in fifth place. in addition, some of the possible directions that research could go in the future concerning deep learning in education include online, machine, blended, remote, informal, and deep reinforcement learning. this is an open access article under the cc–by-sa license. keywords deep learning education bibliometric analysis https://doi.org/10.31763/businta.v6i2.596 mailto:aji.prasetya.ft@um.ac.id http://creativecommons.org/licenses/by-sa/4.0/ http://creativecommons.org/licenses/by-sa/4.0/ 152 bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 2, december 2022, pp. 151157 wibawa et.al (deep learning in education: a bibliometric analysis) teachers. thus, technologies are required to track and increase student activity [11], [12] and cooperation in the digital learning environment and create a competence profile of the student that can help them improve their quality of life in the most critical areas. while instructors are critical to the educational process, leading and promoting student learning, the future of education will see increased collaboration between teachers and technology to benefit students [13]. technology is increasingly assisting instructors in locating and focusing on learning and assessment through increased cooperation and creativity [14]. today, deep learning algorithms identify trends in enormous data sets of instructor and student behavior [15], therefore assisting in optimizing instructional practices. the purpose of this research is to explore the use of dl in educational settings as well as its growth. bibliometrics analysis, which is derived from the statistics of published scientific publications, is used to illustrate the expansion of dl in educational settings. the findings might lead scholars to pursue more study in the area of profound educational learning. 2. method an analytical and bibliometric examination of the current publishing trends in the field of deep learning education is carried out in this work. it is anticipated that this method will quickly achieve widespread adoption in the field of information science and will be explicitly utilized in all research seeking to quantify the processes of textual communication. this study highlights the immense potential for quantitative, bibliometric assessments of the academic literature to give a comprehensive picture of scholarly activity and performance as well as the policy implications of their findings. in the field of scientific research, it is essential to get a more comprehensive understanding of the research that has already been conducted on a pertinent topic, as well as a bibliometric analysis profile on the research trajectory and the dynamics of global research activities. this study conducts an in-depth analysis of the previously published research by making use of the scopus database maintained by elsevier. the purpose of this research is to undertake a bibliometric analysis of papers published in international journals in order to give a useful reference for further investigation. the information used to compile this article came from the database (http://www.scopus.com), which was accessed on december 27, 2021. in addition to this, the database has information on 186 different publications that were published between the years 1993 and 2022. in order to obtain a more relevant result, the following search terms were utilized: (title (deep and learning)) and ((education)) and (teaching) and (limit-to (subjarea, "comp")) and (limit-to (language, "english")) and (limit-to (srctype, "j") the combination of these terms yielded the best results. the data were then analyzed using an application called biblioshiny, which is based on the programming language r [16] and can be downloaded for free here: https://bibliometrix.org/. 3. results and discussion 3.1. three-field plot analyses the three-field plot analysis, which was used to illustrate correlations between the three units (the author, the author's nation, and the keywords), is depicted in fig. 1. using the number 20 as a guide, we chose 20 different writers, 20 different nations, and 20 different keywords. the nation of the author, the writers themselves, and the top research keywords are all presented with gray relationships to illustrate the connection between one area and the one that comes after it. the extent of each rectangle in each list represents the number of items that are associated with that particular component. the au_co plane in the centre of the three-plane graphic serves as the focus of emphasis. in 2021, the top five nations will consist of norway, the united states, china, and india. the netherlands will fill out the top five. furthermore, fig.1 depicts a green rectangle (de) for each of the five most published topics, deep learning in education, including deep learning, artificial intelligence, online learning, machine learning, and moocs. more research themes arise in larger rectangles, so this study described a common research topic. http://www.scopus.com/ https://bibliometrix.org/ issn 2614-0047 bulletin of social informatics theory and application 153 vol. 6, no. 2, december 2022, pp. 151-157 wibawa et.al (deep learning in education: a bibliometric analysis) fig. 1. three-field plot correlations in the deep learning and education terms 3.2. the author's contribution we examined the top five writers to determine the extent of their influence, the entire articles they contributed to, and the partnerships they formed. according to fig. 2, faust, o. ranks top with 398 citations. these citations are for papers with the title deep learning for healthcare applications based on physiological signals: a review [3], which led to a major review of deep learning for healthcare applications. the research conducted by vos n on the impact of designing vs playing an educational game on student motivation and the application of deep learning strategies [17] has received 219 citations, making it the second most referenced piece of work. the next researcher on this list is francois-lavet v., who has 211 citations for his work on introducing deep reinforcement learning [18]. with 139 citations, grover s.'s work on designing for deeper learning in a blended computer science course for middle school students came in at number four on the list of articles with the most citations [19]. lastly, surface and deep learning processes in distant education: synchronous versus asynchronous systems by offir b was the fifth most referenced article overall, receiving a total of 111 citations. this article was ranked fifth because it was authored [20]. based on this finding, we anticipate that the author will earn a significant number of citations in the academic year 2020–2021, and that this number will keep growing over time. fig. 2. the author's most globally-cited works another aspect that should be taken into consideration and credited is the author's contribution to the text. that will indicate international cooperation between researchers on a certain topic from different countries. in addition, other researchers, particularly rookie 154 bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 2, december 2022, pp. 151157 wibawa et.al (deep learning in education: a bibliometric analysis) researchers, can get in touch with the author in a country where there is a lot of collaborative work being done on the same topic. single country publications (scp) and multiple country publications (mcp) in scopus are displayed side-by-side in fig. 3. according to the information gathered from the source, the countries with the most scps are china, the united states, the united kingdom, and india. meanwhile, according to mcp statistics, china has the most six articles, pakistan has three articles, and the united states, the united kingdom, saudi arabia, and sweden have two articles. fig. 3. single-country and multi-country publications in terms of profound knowledge and education 3.3. the most frequent keywords and future research when it comes to conducting research on trends, keywords are of the utmost importance. not only is it a trend in keyword research, but it also makes it simple for readers and researchers to locate topics that are relevant to their professions. the degree of precision with which these terms are selected will have an impact, both on the ease with which searches can be made and on the issues that are currently being discussed. each keyword, which can be a single word or a combination of two words in various forms, will direct the investigation and the search through the relevant literature. the most frequently used phrases in relation to deep learning in education are illustrated in fig. 4. fig. 4. tree mapping of most used keywords issn 2614-0047 bulletin of social informatics theory and application 155 vol. 6, no. 2, december 2022, pp. 151-157 wibawa et.al (deep learning in education: a bibliometric analysis) according to fig. 4, deep learning (n = 124), learning systems (n = 42), students (n = 34), teaching (n = 24), and e-learning (n = 23) were the most common terms. in other words, deep learning, learning systems, and students were the most prevalent subjects for scopus publications in deep learning in education. as a result, deep learning has become increasingly significant among learning systems and students in linked education. furthermore, this discovery may be utilized to generate an intriguing subject of deep learning that can be used in education, such as learning systems, teaching, and e-learning. as shown in fig. 5, the thematic map analysis backs up this result. fig. 5. thematic map analysis fig. 5 presents the potential trends for future research on deep learning in education. another exciting notion to use after deep learning is the multi-disciplinary theme. online learning, machine learning, blended learning, remote education, informal learning, and deep reinforcement learning are some of the conceivable clusters depicted in fig. 5. several themes using yellow, green, blue, purple, red, orange, and gray hues are suggested for further research based on the educational goal scope. 4. conclusion an investigation into using bibliometrics revealed a positive trend toward deep learning in education. in education domains, deep learning (dl) has been successfully implemented. dl is revolutionizing education, teaching, learning, and research. educators are utilizing dl to identify difficult pupils and intervene early. students use deep learning to extract meaning and knowledge from course materials and experiences. students may be able to acquire the knowledge and skills necessary for success more quickly and easily with the assistance of localization, transcription, text-to-speech, and personalization of the learning content. as a result, dl has the potential to affect positively the access to education that will be available in the future. references [1] l. chen, p. chen, and z. lin, “artificial intelligence in education: a review,” ieee access, vol. 8, pp. 75264–75278, 2020, doi: 10.1109/access.2020.2988510. [2] c. zhang and y. lu, “study on artificial intelligence: the state of the art and future prospects,” j. ind. inf. integr., vol. 23, p. 100224, sep. 2021, doi: 10.1016/j.jii.2021.100224. https://doi.org/10.1109/access.2020.2988510 https://doi.org/10.1016/j.jii.2021.100224 156 bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 2, december 2022, pp. 151157 wibawa et.al (deep learning in education: a bibliometric analysis) [3] n. holmes, “engaging with assessment: increasing student engagement through continuous assessment,” act. learn. high. educ., vol. 19, no. 1, pp. 23–34, mar. 2018, doi: 10.1177/1469787417723230. [4] h. s. alenezi and m. h. faisal, “utilizing crowdsourcing and machine learning in education: literature review,” educ. inf. technol., vol. 25, no. 4, pp. 2971–2986, jul. 2020, doi: 10.1007/s10639-020-10102w. [5] a. voulodimos, n. doulamis, a. doulamis, and e. protopapadakis, “deep learning for computer vision: a brief review,” comput. intell. neurosci., vol. 2018, pp. 1–13, 2018, doi: 10.1155/2018/7068349. [6] m. ryu and s. han, “ai education programs for deep-learning concepts,” j. korean assoc. inf. educ., vol. 23, no. 6, pp. 583–590, dec. 2019, doi: 10.14352/jkaie.2019.23.6.583. [7] m. ciolacu, a. f. tehrani, l. binder, and p. m. svasta, “education 4.0 artificial intelligence assisted higher education: early recognition system with machine learning to support students’ success,” in 2018 ieee 24th international symposium for design and technology in electronic packaging (siitme), oct. 2018, pp. 23–30, doi: 10.1109/siitme.2018.8599203. [8] t. kabudi, i. pappas, and d. h. olsen, “ai-enabled adaptive learning systems: a systematic mapping of the literature,” comput. educ. artif. intell., vol. 2, p. 100017, jan. 2021, doi: 10.1016/j.caeai.2021.100017. [9] p. serdyukov, “innovation in education: what works, what doesn’t, and what to do about it?,” j. res. innov. teach. learn., vol. 10, no. 1, pp. 4–33, apr. 2017, doi: 10.1108/jrit-10-2016-0007. [10] v. callan and m. johnston, “social media and student outcomes: teacher, student and employer views,” ncver, 2017. accessed apr. 17, 2021. [online]. available at: https://www.ncver.edu.au/researchand-statistics/publications/all-publications/social-media-and-student-outcomes-teacher,-student-andemployer-views. [11] j. a. n. ansari and n. a. khan, “exploring the role of social media in collaborative learning the new domain of learning,” smart learn. environ., vol. 7, no. 1, p. 9, dec. 2020, doi: 10.1186/s40561-02000118-7. [12] n. alalwan, w. m. al-rahmi, o. alfarraj, a. alzahrani, n. yahaya, and a. m. al-rahmi, “integrated three theories to develop a model of factors affecting students’ academic performance in higher education,” ieee access, vol. 7, pp. 98725–98742, 2019, doi: 10.1109/access.2019.2928142. [13] p. jääskelä, p. häkkinen, and h. rasku-puttonen, “teacher beliefs regarding learning, pedagogy, and the use of technology in higher education,” j. res. technol. educ., vol. 49, no. 3–4, pp. 198– 211, oct. 2017, doi: 10.1080/15391523.2017.1343691. [14] v. silber‐varod, y. eshet‐alkalai, and n. geri, “tracing research trends of 21st‐century learning skills,” br. j. educ. technol., vol. 50, no. 6, pp. 3099–3118, nov. 2019, doi: 10.1111/bjet.12753. [15] c. romero and s. ventura, “educational data mining and learning analytics: an updated survey,” wires data min. knowl. discov., vol. 10, no. 3, p. e1355, may 2020, doi: 10.1002/widm.1355. [16] m. aria and c. cuccurullo, “bibliometrix : an r-tool for comprehensive science mapping analysis,” j. informetr., vol. 11, no. 4, pp. 959–975, nov. 2017, doi: 10.1016/j.joi.2017.08.007. [17] n. vos, h. van der meijden, and e. denessen, “effects of constructing versus playing an educational game on student motivation and deep learning strategy use,” comput. educ., vol. 56, no. 1, pp. 127– 137, jan. 2011, doi: 10.1016/j.compedu.2010.08.013. [18] v. françois-lavet, p. henderson, r. islam, m. g. bellemare, and j. pineau, “an introduction to deep reinforcement learning,” found. trends® mach. learn., vol. 11, no. 3–4, pp. 219–354, dec. 2018, doi: 10.1561/2200000071. [19] s. grover, r. pea, and s. cooper, “designing for deeper learning in a blended computer science course for middle school students,” comput. sci. educ., vol. 25, no. 2, pp. 199–237, apr. 2015, doi: 10.1080/08993408.2015.1033142. [20] b. offir, y. lev, and r. bezalel, “surface and deep learning processes in distance education: https://doi.org/10.1177/1469787417723230 https://doi.org/10.1007/s10639-020-10102-w https://doi.org/10.1007/s10639-020-10102-w https://doi.org/10.1155/2018/7068349 https://doi.org/10.14352/jkaie.2019.23.6.583 https://doi.org/10.1109/siitme.2018.8599203 https://doi.org/10.1016/j.caeai.2021.100017 https://doi.org/10.1108/jrit-10-2016-0007 https://www.ncver.edu.au/research-and-statistics/publications/all-publications/social-media-and-student-outcomes-teacher,-student-and-employer-views https://www.ncver.edu.au/research-and-statistics/publications/all-publications/social-media-and-student-outcomes-teacher,-student-and-employer-views https://www.ncver.edu.au/research-and-statistics/publications/all-publications/social-media-and-student-outcomes-teacher,-student-and-employer-views https://doi.org/10.1186/s40561-020-00118-7 https://doi.org/10.1186/s40561-020-00118-7 https://doi.org/10.1109/access.2019.2928142 https://doi.org/10.1080/15391523.2017.1343691 https://doi.org/10.1111/bjet.12753 https://doi.org/10.1002/widm.1355 https://doi.org/10.1016/j.joi.2017.08.007 https://doi.org/10.1016/j.compedu.2010.08.013 https://doi.org/10.1561/2200000071 https://doi.org/10.1080/08993408.2015.1033142 issn 2614-0047 bulletin of social informatics theory and application 157 vol. 6, no. 2, december 2022, pp. 151-157 wibawa et.al (deep learning in education: a bibliometric analysis) synchronous versus asynchronous systems,” comput. educ., vol. 51, no. 3, pp. 1172–1183, nov. 2008, doi: 10.1016/j.compedu.2007.10.009. https://doi.org/10.1016/j.compedu.2007.10.009 bulletin of social informatics theory and application issn 2614-0047 vol. 5, no. 2, september 2021, pp. 150-157 150 https:doi.org/10.31763/businta.v5i2.492 development of a criticality scale related to hoaxes in social media anjarie dharmastuti a,1,*, bambang budi wiyono b,2, imanuel hitipeuw a,3, hetti rahmawati a,4, fitri wahyuni c,5, fressi apriliyanti d,6 a department of educational.psychology, universitas negeri malang, malang, indonesia b department of educational administration, universitas negeri malang, malang, indonesia c department of country guidance and counseling, universitas negeri malang, malang, indonesia d kindergarten al wa'yi, malang, indonesia 1 dharmastuti.1601139@students.um.ac.id *; 2 bambang.budi.fip@um.ac.id; 3 imanuel.hitipeuw.fip@um.ac.id; 4 hetti.rahmawati.fppsi@um.ac.id; 5 fitri.wahyuni.1601119@students.um.ac.id; 6 apriliyanti.fresy123@gmail.com * corresponding author 1. introduction the rapid development of social media technology has provided benefits for human life. especially during the covid 19 pandemic, the use of social media is known to have increased intensively, both for communication, information, and the learning process [1]–[3]. the existence of social media is also glorified as a symbol of openness and freedom of information [4]–[6]. social media is identified as the most popular platform for online information dissemination [5]. netizens are free to be actively involved in the flow of information itself. the phenomenon of sharing, tweeting, or retweeting on social media has now become part of the daily lives of internet users or what are often referred to as netizens [4]. the rapid behavior of sharing information online, causes the flow of information to become overloaded [7], [8]. this is as reported by beam et al. [9], that there is a high correlation between information exposure and information sharing behavior. this abundance of information actually has an impact on increasing the pathology of the information itself [10]. various false information, rumors, and hoaxes also spread instantly [11], [12]. the circulation of false information or what is more popularly known as hoax is currently a concern [13], [14]. concern about hoaxes is increasing, along with the impact it brings. the impact of hoaxes is clearly very detrimental, including the proliferation of fake infodemics that trigger unrest in the midst of a pandemic [15], [16], confusion regarding vaccine rumors [12], causing slander and prejudice [17], heated political strife [18]; and also it creates feelings of alienation and cynicism [19], and threatens a r t i c l e i n f o a b s t r a c t article history received august 4, 2021 revised august 24, 2021 accepted september 1, 2021 the massive circulation of hoaxes on social media is currently a fairly complex problem in society. one simple way that is considered effective to reduce the rate of hoaxes is to not disseminate information without prior verification. verification efforts with the aim of minimizing the impact of this hoax can be referred to as criticality. the term criticality is basically still quite new when compared to the term critical thinking. criticality refers to the concept of critical thinking accompanied by a commitment to act based on socio-cultural values. the purpose of this study was to develop a criticality scale related to hoaxes on social media. the method used is quantitative involving 400 students from state universities in malang city. the results of this study indicate that the criticality scale related to hoaxes developed has met the criteria of good validity and reliability. this is an open access article under the cc–by-sa license. keywords criticality hoax social media confirmatory factor analysis reliability http://creativecommons.org/licenses/by-sa/4.0/ http://creativecommons.org/licenses/by-sa/4.0/ issn 2614-0047 bulletin of social informatics theory and application 151 vol. 5, no. 2, september 2021, pp. 150-157 dharmastuti et.al (development of a criticality scale related to hoaxes in social media) the welfare of society [20]. it can be said that hoaxes are one of the "dark sides" of the glittering sophistication of social media [21]. stopping hoaxes is not an easy thing, it requires cooperation from various multidisciplinary or cross-sectors [22]. the social media platform has tried to use algorithms to minimize hoaxes, but these efforts are felt to be not optimal [23]. therefore, there is an emphasis on the micro level, where every social media user is expected to be responsible for the circulation of hoaxes [24]–[26]. however, the circulation of hoaxes is also rapidly increasing due to user behavior, both intentional and unintentional [8]. individuals are at the forefront of efforts to combat the circulation of hoaxes. the tendency of people to gather and tell stories without data is basically one of the causes of the massive circulation of hoaxes. this can be seen in the research results of khan & idris [8], which show that one of the predictors of the circulation of hoaxes in indonesia is the lack of willingness and skills to verify information. basically, this information verification skill cannot be separated from critical thinking skills [5], [10], [27]. based on research results during the pandemic, it was also found that individuals who do not think critically are more likely to spread hoax information related to covid 19 [26]. critical thinking skills, in the end, become something much more valuable when faced with the increasingly uncontrolled phenomenon of hoax circulation [5], [8], [25], [27], [28]. thinking critically before spreading information on social media is a form of individual effort in mitigating the circulation of hoaxes [29]. as expressed by one of the critical thinking experts, namely paul richard (1992) which states that critical thinking is a very important skill, especially when changes occur so quickly. a simple example of critical thinking by verifying is by questioning the credibility of the source or evidence of an information [30]. unfortunately, the practice of critical thinking on social media is still low. this can be seen from the high number of cases of hoax spread [29]. critical thinking is basically a higher-order mental function that is influenced by social factors and is carried out in a social context [31]. critical thinking is not a competency that only exists in individual mentality, but is a way of life that must be understood from a socio-cultural perspective. the concept of critical thinking that emphasizes cognitive and socio-cultural perspectives is then called criticality (davies, 2015). davies uses the term criticality to describe critical thinking as a trait that includes thinking, reflecting, and following up with action or action. according to davies [32], criticality is a skill concept that should be taught at the college level. ironically, this uncritical behavior regarding information on social media is also found among academics in higher education [10], [33], [34]. in connection with the background of the problem, this research aims to develop a criticality scale related to hoaxes on social media. so far, there are still not many criticality scales related to hoaxes on social media, especially among college students. with the development of this scale, it is hoped that it can add to the literature related to similar scales. given that this hoax problem is getting more and more worrying, it is hoped that the development of this scale can make a small contribution to efforts to minimize the circulation of hoaxes. 2. criticality in particular, criticality in disseminating information on social media is a cognitive as well as social activity [4], [35]. concern for the impact of hoaxes in society and the world must be the basis for critical thinking and following up with action [36]. criticality related to information on social media can be applied by identifying evidence, sources, and cognitive biases that arise before deciding to share it [30], [37]. criticality is generally emphasized at the level of higher education. this is also supported by the finding that high-level cognitive abilities develop optimally in late adolescence to adulthood [38]. criticality requires individuals to be moved to do something based on the results of their critical thinking. skills and dispositions are essential for critical thinking, they are not sufficient unless supplemented by action. this emphasis on action is because criticality has added a socio-cultural dimension to critical thinking which initially tends to only be at the cognitive level [32]. criticality is 152 bulletin of social informatics theory and application issn 2614-0047 vol. 5, no. 2, september 2021, pp. 150-157 dharmastuti et.al (development of a criticality scale related to hoaxes in social media) basically a high-level mental function that is influenced by social factors and is carried out in a social context [31]. criticality has become a highly valued skill in modern society [38]. this is because in the modern era, where information technology is developing rapidly, skills are needed to analyze information, evaluate its credibility and apply information appropriately [39]. of course, by developing criticality skills, the community will benefit more from the various information currently available [40]. on the other hand, failure to critically analyze information will certainly have a negative impact [41]. 3. method 3.1. item generation the criticality scale used in this study was developed based on the critical thinking scale in understanding and responding to news (critical thinking performance in news) [30], [37]. the scale developed consists of 3 dimensions, namely (1) criticality related to messages (content), (2) criticality related to sources or data, (3) criticality related to bias. the answer to the statement of each item will be given a score of 1-5 with a likert scale model. variations of answer choices are very often, often, moderately, not often, very not often. the blueprint for the criticality scale can be seen in table 1. table.1 blueprint criticality scale dimention indicator item tot. item fav unfav criticality about message identify the truth of the information to be disseminated 1, 3 2, 4 4 criticality about the source identify sources/data information to be disseminated 6, 7 5, 8 4 criticality about bias identify the bias of the information to be disseminated 9, 11 10, 12 4 total item 12 3.2. content adequacy assessment the results of the expert validity test were analyzed using the aiken v method. based on the aiken v analysis, with 12 raters, a v value of 0.78 was obtained with a significance of 0.01 and a v value of 0.69 with a significance of 0.05. the results of the analysis with aiken v showed the highest score was 0.95 and the lowest score was 0.78. thus, it can be concluded that this instrument is valid in terms of face validity at a significance of 0.01. based on the results of this expert validity test, it appears that none of the items were eliminated. 3.3. questionnaire administration, by conducting trials on 120 samples with ready-made instruments then followed up with scoring. the number of test subjects in this study were 120 students of state universities in the city of malang, namely brawijaya university, malang state university, maulana malik ibrahim state islamic university. 3.4. factor analysis this step was done by conducting a confirmatory test. based on the results of the confirmatory analysis test presented in fig. 1, it can be concluded that all indices have exceeded their cut off values. it appears that the p-value is 0.161 0.05, gfi and agfi 0.90, cfi and tli 0.95, and the rmsea value 0.08. based on the results of the confirmatory test, it is known that the constructed construct has met the feasibility standard. 3.5. construct validity based on the results of the analysis of construct validity, it was found that from 12 items, three items were eliminated by using a minimum loading factor limit of 0.5. then get nine valid items. issn 2614-0047 bulletin of social informatics theory and application 153 vol. 5, no. 2, september 2021, pp. 150-157 dharmastuti et.al (development of a criticality scale related to hoaxes in social media) fig. 1. construct validity 3.6. internal consistency assessment this step was done by conducting a reliability test. the results of the cronbach reliability test showed the results of 0.841 and the composite reliability test showed the results of 0.997, which means that the criticality construct can be said to be reliable. 4. results and discussion 4.1. statistics and data analysis after rearranging the valid items, namely a number of nine items, a field test was carried out. this field test was conducted on 400 students of state universities in malang, namely brawijaya university, malang state university, maulana malik ibrahim state islamic university. sampling is done by probability sampling technique. based on the results of the confirmatory analysis test presented in fig. 1, it can be concluded that all indices are more than their cut off values. it appears that the p value is 0.866 0.05, gfi and agfi 0.90, cfi and tli 0.95, and the rmsea value 0.08. thus, it can be said that the unidimensionality of the criticality scale has been fulfilled. of the 9 indicators, there are 6 indicators with a loading factor value of 0.5, in other words 6 indicators have met convergent validity. the three dimensions are proven to be able to contribute in explaining criticality by 79% (cri1), 83% (cri2), and 89% (cri3). the results of the cronbach reliability test showed a result of 0.814 and the results of the composite reliability test showed a result of 0.898. 154 bulletin of social informatics theory and application issn 2614-0047 vol. 5, no. 2, september 2021, pp. 150-157 dharmastuti et.al (development of a criticality scale related to hoaxes in social media) fig. 2. statistics analysis based on the results of trials and field tests, it can be said that the criticality scale related to hoaxes on social media has met the appropriate criteria. in other words, this scale is a ready-to-use measuring tool to measure student criticality in responding to hoaxes on social media, because it has been tested both in terms of reliability and validity. the number of items on this scale is quite minimalist, only 6 items out of 12 items at the beginning of development. the criticality scale developed consists of three dimensions, namely 1) criticality related to messages (content), 2) criticality related to sources or data, 3) criticality related to bias. each dimension is represented by two items, one favorable item and one unfavorable item. in full, the six valid items are presented in the table 2. table.2 valid items no items valid 1 i choose not to share information if i'm not sure if it's true 2 i spread information without thinking about the credibility of the content 3 i evaluate the veracity of the information source first, before spreading it 4 i do not consider the credibility of the data presented in the information that i will share 5 i reconsider my conclusions regarding the veracity of the information i will share 6 i consider information that does not match my beliefs to be false information the three dimensions on this scale represent the individual's tendency to respond to information. the first dimension is related to the criticality of messages or data from a message, this is very important considering that some information is made in a bombastic way so that it encourages individuals to get carried away by their emotions and just believe. the second dimension is related to the source of information, this becomes very important, given the tendency to just believe in an information if the sender is a person who has familiarity. sources of information are also important regarding the credibility of information. the third dimension is related to the biases that often arise in individual thinking. some information on social media triggers bias so that often the right and wrong judgment of an information is only based on personal beliefs or subjectivity. the three dimensions on the scale can be used as criticality parameters related to hoaxes on social media. based on psychometric rules, the criticality scale related to hoaxes on social media can also be said to be good. internal consistency with cronbach's alpha and composite reliability of this scale have shown good results. the construct validity of this scale has also shown good results. in other words, issn 2614-0047 bulletin of social informatics theory and application 155 vol. 5, no. 2, september 2021, pp. 150-157 dharmastuti et.al (development of a criticality scale related to hoaxes in social media) this scale is able to measure the relationship between criticality and the behavior of spreading hoaxes on social media. the results of the confirmatory analysis also show that the developed criticality scale model shows a fairly good model fit index based on the goodness of fit criteria. the limitation of developing this scale is the disproportionate proportion of subjects between men and women. the majority (76%) of the research subjects were women. so that for the development of a better criticality scale in the future, it is necessary to arrange so that the number of male and female subjects becomes more proportional. the items on this criticality scale generally still look the same as the notion of critical thinking. the determination of the term criticality in this scale refers to the social aspect in the context of disseminating information on social media. criticality in this case concerns the effect of actions on other people or society. literally, basically thinking or deciding not to do something (not disseminating information) is also a behavior. the choice of the term criticality in this context also emphasizes the importance of consistency between thought and action. 5. conclusion psychometrically, the criticality scale related to hoaxes on social media developed in this study has met the good psychometric rules. in other words, this scale can be used for research purposes related to the criticality of college students in responding to hoaxes on social media. references [1] m. drouin, b. t. mcdaniel, j. pater, and t. toscos, “how parents and their children used social media and technology at the beginning of the covid-19 pandemic and associations with anxiety,” cyberpsychology, behav. soc. netw., vol. 23, no. 11, pp. 727–736, nov. 2020, doi: 10.1089/cyber.2020.0284. [2] r. sigurvinsdottir, i. e. thorisdottir, and h. f. gylfason, “the impact of covid-19 on mental health: the role of locus on control and internet use,” int. j. environ. res. public health, vol. 17, no. 19, p. 6985, sep. 2020, doi: 10.3390/ijerph17196985. [3] b. b. wiyono, a. wedi, s. wahyuni, and a. v. valdez, “use of online communication media as a student learning tool in college and its effect on the achievement of students,” in 2020 6th international conference on education and technology (icet), oct. 2020, pp. 186–191, doi: 10.1109/icet51153.2020.9276562. [4] v. karnowski, l. leonhard, and a. s. kümpel, “why users share the news: a theory of reasoned action-based study on the antecedents of news-sharing behavior,” commun. res. reports, vol. 35, no. 2, pp. 91–100, mar. 2018, doi: 10.1080/08824096.2017.1379984. [5] k. y. l. ku, q. kong, y. song, l. deng, y. kang, and a. hu, “what predicts adolescents’ critical thinking about real-life news? the roles of social media news consumption and news media literacy,” think. ski. creat., vol. 33, p. 100570, sep. 2019, doi: 10.1016/j.tsc.2019.05.004. [6] o. turel and h. qahri-saremi, “explaining unplanned online media behaviors: dual system theory models of impulsive use and swearing on social networking sites,” new media soc., vol. 20, no. 8, pp. 3050–3067, aug. 2018, doi: 10.1177/1461444817740755. [7] a. khan, s. khan, s. zia-ul-islam, and m. khan, “communication skills of a teacher and its role in the development of the students ’ academic success,” j. educ. pract., vol. 8, no. 1, pp. 18–21, 2017. [8] m. l. khan and i. k. idris, “recognise misinformation and verify before sharing: a reasoned action and information literacy perspective,” behav. inf. technol., vol. 38, no. 12, pp. 1194–1212, dec. 2019, doi: 10.1080/0144929x.2019.1578828. [9] m. a. beam, m. j. hutchens, and j. d. hmielowski, “clicking vs. sharing: the relationship between online news behaviors and political knowledge,” comput. human behav., vol. 59, pp. 215–220, jun. 2016, doi: 10.1016/j.chb.2016.02.013. [10] a. p. weiss, a. alwan, e. p. garcia, and j. garcia, “surveying fake news: assessing university faculty’s fragmented definition of fake news and its impact on teaching critical thinking,” int. j. educ. integr., vol. 16, no. 1, p. 1, dec. 2020, doi: 10.1007/s40979-019-0049-x. 156 bulletin of social informatics theory and application issn 2614-0047 vol. 5, no. 2, september 2021, pp. 150-157 dharmastuti et.al (development of a criticality scale related to hoaxes in social media) [11] m. tambuscio, d. f. m. oliveira, g. l. ciampaglia, and g. ruffo, “network segregation in a model of misinformation and fact-checking,” j. comput. soc. sci., vol. 1, no. 2, pp. 261–275, sep. 2018, doi: 10.1007/s42001-018-0018-9. [12] x. xiao, y. su, and d. k. l. lee, “who consumes new media content more wisely? examining personality factors, sns use, and new media literacy in the era of misinformation,” soc. media + soc., vol. 7, no. 1, p. 205630512199063, jan. 2021, doi: 10.1177/2056305121990635. [13] n. a. karlova and k. e. fisher, “a social diffusion model of misinformation and disinformation for understanding human information behaviour,” inf. res., vol. 18, no. 1, 2013. [14] k. p. k. kumar and g. geethakumari, “detecting misinformation in online social networks using cognitive psychology,” human-centric comput. inf. sci., vol. 4, no. 1, p. 14, dec. 2014, doi: 10.1186/s13673-0140014-x. [15] m. montesi, “understanding fake news during the covid-19 health crisis from the perspective of information behaviour: the case of spain,” j. librariansh. inf. sci., vol. 53, no. 3, pp. 454–465, sep. 2021, doi: 10.1177/0961000620949653. [16] s. o. oyeyemi, e. gabarron, and r. wynn, “ebola, twitter, and misinformation: a dangerous combination?,” bmj, vol. 349, no. oct14 5, pp. g6178–g6178, oct. 2014, doi: 10.1136/bmj.g6178. [17] e. c. tandoc, “the facts of fake news: a research review,” sociol. compass, vol. 13, no. 9, sep. 2019, doi: 10.1111/soc4.12724. [18] h. allcott and m. gentzkow, “social media and fake news in the 2016 election,” j. econ. perspect., vol. 31, no. 2, pp. 211–236, may 2017, doi: 10.1257/jep.31.2.211. [19] m. balmas, “when fake news becomes real,” communic. res., vol. 41, no. 3, pp. 430–454, apr. 2014, doi: 10.1177/0093650212453600. [20] e. ferrara, “‘manipulation and abuse on social media’ by emilio ferrara with ching-man au yeung as coordinator,” acm sigweb newsl., no. spring, pp. 1–9, apr. 2015, doi: 10.1145/2749279.2749283. [21] c. v. baccarella, t. f. wagner, j. h. kietzmann, and i. p. mccarthy, “social media? it’s serious! understanding the dark side of social media,” eur. manag. j., vol. 36, no. 4, pp. 431–438, aug. 2018, doi: 10.1016/j.emj.2018.07.002. [22] d. m. j. lazer et al., “the science of fake news,” science (80-. )., vol. 359, no. 6380, pp. 1094–1096, mar. 2018, doi: 10.1126/science.aao2998. [23] p. pourghomi, f. safieddine, w. masri, and m. dordevic, “how to stop spread of misinformation on social media: facebook plans vs. right-click authenticate approach,” in 2017 international conference on engineering & mis (icemis), may 2017, pp. 1–8, doi: 10.1109/icemis.2017.8272957. [24] m. koohikamali and a. sidorova, “information re-sharing on social network sites in the age of fake news,” informing sci. int. j. an emerg. transdiscipl., vol. 20, pp. 215–235, 2017, doi: 10.28945/3871. [25] p. lorenz-spreen, s. lewandowsky, c. r. sunstein, and r. hertwig, “how behavioural sciences can promote truth, autonomy and democratic discourse online,” nat. hum. behav., vol. 4, no. 11, pp. 1102– 1109, nov. 2020, doi: 10.1038/s41562-020-0889-7. [26] [26] m. l. stanley, n. barr, k. peters, and p. seli, “analytic-thinking predicts hoax beliefs and helping behaviors in response to the covid-19 pandemic,” think. reason., vol. 27, no. 3, pp. 464–477, jul. 2021, doi: 10.1080/13546783.2020.1813806. [27] g. pennycook and d. g. rand, “who falls for fake news? the roles of bullshit receptivity, overclaiming, familiarity, and analytic thinking,” j. pers., vol. 88, no. 2, pp. 185–200, apr. 2020, doi: 10.1111/jopy.12476. [28] s. talwar, a. dhir, d. singh, g. s. virk, and j. salo, “sharing of fake news on social media: application of the honeycomb framework and the third-person effect hypothesis,” j. retail. consum. serv., vol. 57, p. 102197, nov. 2020, doi: 10.1016/j.jretconser.2020.102197. [29] a. m. guess et al., “a digital media literacy intervention increases discernment between mainstream and false news in the united states and india,” proc. natl. acad. sci., vol. 117, no. 27, pp. 15536–15545, jul. 2020, doi: 10.1073/pnas.1920498117. issn 2614-0047 bulletin of social informatics theory and application 157 vol. 5, no. 2, september 2021, pp. 150-157 dharmastuti et.al (development of a criticality scale related to hoaxes in social media) [30] a. maksl, s. ashley, and s. craft, “measuring news media literacy,” j. media lit. educ., vol. 6, no. 3, pp. 29–45, 2015. [31] n. m. lee, “fake news, phishing, and fraud: a call for research on digital media literacy education beyond the classroom,” commun. educ., vol. 67, no. 4, pp. 460–466, oct. 2018, doi: 10.1080/03634523.2018.1503313. [32] m. davies, “a model of critical thinking in higher education,” in higher education: handbook of theory and research, 2015, pp. 41–92. [33] x. chen, s.-c. j. sin, y.-l. theng, and c. s. lee, “why students share misinformation on social media: motivation, gender, and study-level differences,” j. acad. librariansh., vol. 41, no. 5, pp. 583–592, sep. 2015, doi: 10.1016/j.acalib.2015.07.003. [34] j. mcdougall, “media literacy versus fake news,” medijske stud., vol. 10, no. 19, pp. 29–45, oct. 2019, doi: 10.20901/ms.10.19.2. [35] j. choi, “why do people use news differently on snss? an investigation of the role of motivations, media repertoires, and technology cluster on citizens’ news-related activities,” comput. human behav., vol. 54, pp. 249–256, jan. 2016, doi: 10.1016/j.chb.2015.08.006. [36] g. dunne, “beyond critical thinking to critical being: criticality in higher education and life,” int. j. educ. res., vol. 71, pp. 86–99, 2015, doi: 10.1016/j.ijer.2015.03.003. [37] s. ashley, a. maksl, and s. craft, “developing a news media literacy scale,” journal. mass commun. educ., vol. 68, no. 1, pp. 7–21, mar. 2013, doi: 10.1177/1077695812469802. [38] m. r. su and k. k. shum, “the moderating effect of mindfulness on the mediated relation between critical thinking and psychological distress via cognitive distortions among adolescents,” front. psychol., vol. 10, jun. 2019, doi: 10.3389/fpsyg.2019.01455. [39] h. a. butler, “halpern critical thinking assessment predicts real-world outcomes of critical thinking,” appl. cogn. psychol., vol. 26, no. 5, pp. 721–729, sep. 2012, doi: 10.1002/acp.2851. [40] c. p. dwyer, m. j. hogan, and i. stewart, “an integrated critical thinking framework for the 21st century,” think. ski. creat., vol. 12, pp. 43–52, jun. 2014, doi: 10.1016/j.tsc.2013.12.004. [41] c. noone, “mindfulness and critical thinking: structural relations, short-term state effects, and longterm intervention effects,” national university of ireland, galway, 2016. bulletin of social informatics theory and application issn 2614-0047 vol. 4, no. 1, july 2020, pp. 1-5 1 https:doi.org/10.31763/businta.v4i1.96 smartphone usage on senior citizen hidayah kariima fithri a,1,*, jeanny indra rifani a,2, mutyara whening aniendya a,3, nadiratin jamilah a,4, anusua ghosh b,5. adepartment of electrical engneering, universitas negeri malang, indonesia bschool of engineering, university of south australia, australia 1 hidayah9a20@gmail.com1*; 2 jeannyindrarifani@gmail.com; 3 mutyaraaniendya@gmail.com; 4 nadiratin.jamilah97@gmail.com; 5 anusua.ghosh@mymail.unisa.edu.au * corresponding author 1. introduction the development of technology makes it easy for humans to complete work but the introduction of technology is only done to children and adults. this results in a gap of the senior citizen or those over the age of 60 years [1]. decreasing physical conditions, reduced income, limited relationships threaten the existence and happiness of the elderly, causing the senior citizento feel left behind because the world seems to be faster with technology even though the senior citizen need to stay connected with technology. the technology that is developing at this time and much in demand is a smartphone [2]. smartphones have advantages such as functions to take photos, play songs, record sound and access geographic information and the global positioning system (gps) [3]. now there are many people who use smartphones that have internet connections with touch screens [4]. in other words, smartphones can be categorized as mini-computers that have many functions and have high mobility [3], [5]. many reasons people use smartphones, teenagers are more focused on social media for the purpose of communicating this goal is certainly different from the elderly [6], [7]. previously there was research conducted in japan [8] the results of the study were the idea of a method called remosupp for the senior citizento teach and support the senior citizenfor internet technology conducted by japanese it volunteers. the research will be adopted in this paper for research with cases of the senior citizenin malang. the aim is to determine the ability of the senior citizento operate a smartphone and determine the suitable method used to teach the operation of smartphones in a sample of four senior citizenpeople in malang city. the approaches and preferences for learning technology vary at various ages. older adults prefer learning through printed instruction manuals, compared to their younger counterparts who prefer the trial-and-error method [9]. the results of this study provide an effort to reduce the digital divide due to age factors so that an effective method is needed to introduce it with smartphones to the senior citizen. a r t i c l e i n f o a b s t r a c t article history received december 21, 2019 revised january 14, 2020 accepted february 1, 2020 the impact of the digital era is the gap between active smartphone users and those who are not particular. then it is not fully felt by the senior citizen. this study aims to determine the ability of the senior citizen in the use of smartphones. the results of the study will be used as a reference for teaching it to four senior citizen people. as a result, two senior citizen people want to be taught to use smartphones intensive and privately. this is an open access article under the cc–by-sa license. keywords smartphone usage senior citizen http://creativecommons.org/licenses/by-sa/4.0/ http://creativecommons.org/licenses/by-sa/4.0/ 2 bulletin of social informatics theory and application issn 2614-0047 vol. 4, no. 1, july 2020, pp. 1-5 fithri et.al (smartphone usage on senior citizen) 2. method 2.1. analysis of the current system previous research conducted by wei zhou and shigekei yokoi used the remote method, where the senior citizen can learn about it guided by volunteers [8]. this remote method allows volunteers to overcome the constraints of the difference in distance they have. this method provides benefits not only in terms of transportation costs to approach the senior citizen in learning, but this method also indirectly makes the senior citizen can apply remote technology to learn about the internet and solutions to overcome trouble shooting. in contrast to the research previously outlined briefly, the research we conducted took a simpler sample by taking data by conducting random interviews in the elderly. the target of our respondents comes from different social levels, education levels and employment status in indonesian society, especially in malang city. the interview method is chosen because it is a flexible method. this method has its own advantages for us, where respondents are far more open and comfortable with us in conveying what is known, seen, felt, and expected. the environment in japan (referring to previous research) is very different from indonesia. the hypothesis that we have based on the existence of environmental differences is that not all people in indonesia can operate a smartphone. there are social factors, economic factors, and educational factors that influence. the following is an explanation of each factor we consider: 1) economical factor the essence of the economic problem faced by humans is the fact that human needs are unlimited [10], while the means of satisfying human needs are limited. this research is closely related to the problems raised in this study, because economic factors can influence social status in society. according to data from newzoo's global mobile market report in 2018, it was noted that indonesia at 25.4% was smartphone penetration and as many as 67,570,000 were smartphone users [11]. this means that indonesia's ranking in smartphone usage is still low. 2) social humanity factor in this study, this factor leads to public relations which are about strata. this strata is formed because of the economic factors that influence. senior citizen in the upper strata, certainly know the appearance of smartphones and their functions, while those in the middle to lower strata, not many of those who understand smartphones don't even know the form of a smartphone. 3) educational factor regarding economic factors and social factors, educational factors also influence [12], [13]. generally, the people (elderly) who really don't know smartphones are people who lived in the era before smartphones existed, so education did not introduce the form and function of smartphones. for the senior citizens who are still productive, such as lecturers at educational institutions, they certainly know smartphones because they teach the younger generation who know the shape and function of smartphones. so that the productive lecturers are forced to study smartphones to provide information online and search for academic data. 2.2. data collection the data we obtain is the result of interviews with four respondents; two of them came from malang city, and the rest came from malang regency. the interview process that we did was to invite the respondents to speak as comfortable as possible, but we still have the variable questions that became our topic. table 1 shows are our main variables. based on the variables we use, this variable is able to extract information from respondents. the concept of our first interview is to explore the background of the respondents, the second is to explore information about whether the respondents have used smartphones or ordinary mobile phones and the length of ownership of their cellphones or smartphones, and thirdly we will ask respondents to test our ability. this ability test is done to see the ability as well as to find out whether age, education status, and employment status can influence the interest in using a smartphone. issn 2614-0047 bulletin of social informatics theory and application 3 vol. 4, no. 1, july 2020, pp. 1-5 fithri et.al (smartphone usage on senior citizen) table 1. variable data variable description region (city / regency) to find out whether the skills of the city community are superior or equal to the regency community age between 55-80 years old job status to find out the effect of work status in smartphone usage education status to find out the influence of the latest educational status in smartphone use interest in using hp or smartphone to find out about the interest in using a smartphone ownership of hp or smartphone to find out the length of time you have a smartphone skill i is the initial ability before learning skill ii is the ability after learning 2.3. data processing data processing is the stage of the process after the data is obtained. this stage aims to get analysis and conclusions from the research conducted. the data in the form of videos that we produce will be transcribed in advance to merge data from four respondents. the results of this transcript will further facilitate the data analysis process.................. 3. result and discussions the results of the interviews and the data processing phase that we did, we got some data and influencing factors and factors that did not influence. next we describe the results of the interviews conducted. table 1 shows the data that obtained from the interview. based on the results of this study, there were one person who could not use a hand phone/smartphone, three people who could use hand phone/smartphone but couldn’t use the internet, and no one who could use the internet. table ii. obtained data statement a b c d age 70 y.o 72 y.o 70 y.o 73 y.o job status housewife pensionary pensionary pensionary education statis elementary school s1 senior high school ownership of hp yes no no yes ownership of smartphone no yes no no time periode using hp 5 years 10 years time periode using smatphone 2 years skill i only accept incoming calls receive and call, play music from playlists, take photos sms, receive and call skill ii open google and type on the qwerty keyboard introduce smartphone features open google and type on the qwerty keyboard length of study 45 minute 10 minute 15 minute interest with smartphone interest not interest interest interest reason tired of seeing the news on tv easier in use faster in use 4 bulletin of social informatics theory and application issn 2614-0047 vol. 4, no. 1, july 2020, pp. 1-5 fithri et.al (smartphone usage on senior citizen) for respondent a, she was very interested in smartphones even though his last education was elementary school. for respondent a, he was very interested in smartphones even though his last education was elementary school. after the interviewer did a demo about searching for information on google, the respondents were able to conclude why so many people use smartphones. when starting to learn on the qwerty keyboard, respondents felt very difficult because previously they were only able to receiving calls on operating their hand phone. when information has been found, respondent a still does not know that the information has been displayed, from that the interviewer concludes that more than 1 learning process is needed for respondent b, she already has a smartphone and she knowing how to do some work on a smartphone such as calling and receiving phone calls, listening to murottal (reciting al-quran) from the application and taking photos through an existing camera on that smartphone. but respondents b are not interested in learning anything else that possible to do on smartphone, because he felt it was enough by the features he usually used on smartphone. for respondents c, she did not have a hand phone or smartphone, but because of the supportive environment of almost all children and grandchildren having smartphones, he was very interested in learning how to operate and use a smartphone[14]. respondents use smartphones to call through the whatsapp messenger application but this is still aided by their children and grandchildren. respondents were also very enthusiastic when taught new things related to smartphones. for respondent d, he has a hand phone and is interested in learning how to operate and use a smartphone. after the interviewer did a demo about browsing on google, the respondent immediately knew when there was a new page that appeared on the smartphone screen, and then the interviewer told to the respondent to do the activity himself. when introduced on the qwerty keyboard, there were no obstacles it is just to use it takes a long time because looking for letters that are separate and he previously typed using the abc-def keyboard not qwerty keyboard. respondents are very interested in learning anything else that possible to do on smartphone and he are interested to buy own smartphones because he felt that having a smartphone would be easier and faster to obtain information or do a job 4. conclusion technology learning is only focused on children and adults. so that active smartphone users who are able to operate their features properly start from the age of junior high school to adulthood. even though the senior citizen also need knowledge about the use and use of tools as a result of technological developments such as smartphones, given the many benefits that can be obtained from the sophistication of smartphones. although many factors influence whether a senior citizen person wants to learn about technological developments, especially the operation of a smartphone or not. based on the results of the research that has been carried out there are three variations of grouping in the understanding of the senior citizen towards the operation of the smartphone which consists of good, the senior citizen can operate the smartphone and use its features as needed, medium, the senior citizen can know the smartphone features but have difficulty operating the smartphone and bad, the senior citizen cannot use smartphones at all. an effective method for teaching the operation of smartphones in the senior citizen is face to face, private with intensive guidance. reference [1] w. zhou, t. yasuda, and s. yokoi, “an it social support environment for senior beginners,” ipsj sig tech. rep., vol. 3, no. 16, pp. 9–15, 2006. [2] m. sharples and d. spikol, “mobile learning,” in technology enhanced learning: research themes, e. duval, m. sharples, and r. sutherland, eds. cham: springer international publishing, 2017, pp. 89–96. [3] m. salehan and a. negahban, “social networking on smartphones: when mobile phones become addictive,” comput. human behav., vol. 29, no. 6, pp. 2632–2639, 2013. [4] k. dehnen-schmutz, g. l. foster, l. owen, and s. persello, “exploring the role of smartphone technology for citizen science in agriculture,” agron. sustain. dev., vol. 36, no. 2, p. 25, 2016. issn 2614-0047 bulletin of social informatics theory and application 5 vol. 4, no. 1, july 2020, pp. 1-5 fithri et.al (smartphone usage on senior citizen) [5] y. t. sung, k. e. chang, and t. c. liu, “the effects of integrating mobile devices with teaching and learning on students’ learning performance: a meta-analysis and research synthesis. computers & education, 94, 252-275.,” a meta-analysis res. synth. comput. educ., vol. 94, pp. 252–275, 2016. [6] j. mastrodicasa and p. metellus, “the impact of social media on college students,” j. coll. character, vol. 14, no. 1, pp. 21–30, 2013. [7] h. t. chen and x. li, “the contribution of mobile social media to social capital and psychological wellbeing: examining the role of communicative use, friending and self-disclosure,” comput. human behav., vol. 75, pp. 958–965, 2017. [8] w. zhou and s. yokoi, “a study of remote support by it volunteer group for senior citizens,” j. socio-informatics, vol. 2, no. 1, pp. 103–113, 2009. [9] h. m. mohadisdudis and n. m. ali, “a study of smartphone usage and barriers among the elderly,” in 2014 3rd international conference on user science and engineering (i-user), 2014, pp. 109–114. [10] w. j. fellner and b. goehmann, “human needs, consumerism and welfare,” cambridge j. econ., vol. 44, no. 2, pp. 303–318, 2020. [11] newzoo, “2018 global digital,” pp. 1–25, 2018. [12] m. zhitomirsky-geffet and m. blau, “cross-generational analysis of predictive factors of addictive behavior in smartphone usage,” comput. human behav., vol. 64, pp. 682–693, 2016. [13] h. s. al-barashdi, a. bouazza, and n. h. jabur, “smartphone addiction among university undergraduates: a literature review,” j. sci. res. reports, vol. 4, no. 3, pp. 210–225, 2015. [14] m. j. r. priyani, “lansia yang bahagia di era internet,” in prosiding temu ilmiah nasional x ikatan psikologi perkembangan indonesia 1, 2017, pp. 299–306. bulletin of social informatics theory and application issn 2614-0047 vol. 7, no. 1, march 2023, pp.1-7 1 https:doi.org/10.31763/businta.v7i1.592 twitter sentiment analysis about economic recession in indonesia fauzan prasetyo eka putra a,1,*, fairuz iqbal maulana b,2, nawawi muhammad akbar c,3, wicaksono febriantoro d,4 a faculty of engineering, informatic program study, panglegur, pamekasan, indonesia, 69313 b department computer science department, school of computer science, bina nusantara university, jakarta, indonesia 11480 c master of law science and development, postgraduate school, airlangga university, surabaya, indonesia 60115 d knowledge lab, university college london (ucl), united kingdom 1 prasetyo@unira.ac.id; 2 fairuz.maulana@binus.edu; 3 nawawi.muhammad.akbar-2021@pasca.unair.ac.id; 4 wicaksono.febriantoro.21@ucl.ac.uk * corresponding author 1. introduction text mining is a data mining technique that can unearth relevant information concealed within text data sets. on social media, text mining techniques, such as mood analysis on twitter data, can be applied. text mining techniques include information extraction, document categorization, document retrieval, and clustering [1], [2]. the categorization technique of sentiment analysis is guided learning. positive, negative, and neutral are the three categories applicable to studies of emotion. technically, the mood class is determined by determining the orientation value. a positive polarity value represents a positive emotion, while a negative polarity value represents a negative opinion. a polarity number of zero indicates a sense of neutrality [3]. textblob is one of the commonly used instruments for sentiment analysis. textblob excels at processing mood analysis data in english [4]–[6]. due to the complexity of the structure of the indonesian language, text mining with indonesian data sources still has room for improvement. the nazief and adriani algorithm is one of the text-mining techniques utilized for the analysis of indonesian data [7]. the modern era has seen a continuous development of text mining (tm) software. artificial intelligence (ai) techniques have been the subject of numerous research articles in the medical field [8], [9], social survey [10], agriculture [11], including machine learning (ml) [12], online education [13], and predictive analytics [14]. the majority of existing studies employ a technique known as machine learning, in which annotated data is used to analyze sentiment, and the concentration is on improving the performance a r t i c l e i n f o a b s t r a c t article history received january 3, 2023 revised february 18, 2023 accepted february 24, 2023 as one of the most popular social media platforms, twitter enables users to express their opinions on diverse concepts, products, and services. large quantities of data shared as tweets can be mined for user feedback and used to improve the quality of products and services. using twitter data and social media sentiment analysis, tracking how people feel about the recession in real time is possible. as a consequence, relevant organizations or governments can take preventative measures against the disinformation and unlawful conduct caused by the effects of the recession. this study aims to determine if there is a correlation between how people on twitter feel about the recession. this study's data acquisition utilized "recession"-tagged twitter remarks from 2023. this study analyses filtered tweets for sentiment, emotion, word usage, and trends. according to the findings, 94% of tweets had benign sentiments, 4% had positive sentiments, and 2% had negative sentiments. tweets with moderate subjective valence cluster in the middle of the polarity scale (between 1 and +1), while tweets with strong subjective valence are dispersed throughout the scale. this is an open access article under the cc–by-sa license. keywords sentiment analysis twitter perspective indonesia recession https://doi.org/10.31763/businta.v7i1.592 mailto:prasetyo@unira.ac.id http://creativecommons.org/licenses/by-sa/4.0/ http://creativecommons.org/licenses/by-sa/4.0/ 2 bulletin of social informatics theory and application issn 2614-0047 vol. 7, no. 1, march 2023, pp. 1-7 putra et.al (twitter sentiment analysis about economic recession in indonesia) of models [13], [15]. on the other hand, this study proposes a novel method for analyzing sentiment by integrating machine learning (ml) techniques with the textblob model. [2], [4], [5] that is based on a dictionary. before, only a few methods, mostly machine learning models, were used to improve accuracy, and the characteristics of datasets were not taken into account. there is a chance that the annotations are wrong because tweets that are marked as positive could actually be neutral or positive. because of this, using these kinds of data with machine learning models can hurt how well the models work. considering this assumption, this study looks at how well textblob works for sentiment analysis relative to the initial dataset. despite previous attempts to improve model performance via hyperparameter settings, model design optimization, preprocessing pipelines, and feature extraction and selection techniques, the models did not substantially or appreciably improve. academics are interested in learning more about the effects of the covid-19-caused economic recession on various socioeconomic phenomena in people's lives. for instance, investigating the effect of the covid-19 economic recession on aspects of mental health, chronic diseases, life span, and natural mortality [16] or how the recession affected the type of macroeconomic policy that should be implemented to lessen the effects of the recession [17]. other studies that covid-19 should investigate predict that the pandemic could cause a worldwide food recession [18]. most of the research in this study focused on comprehensive twitter sentiment analysis, focusing their research on the discussion regarding the recession. different topics are associated with various sentiment polarities, implying that sentiment analysis alone cannot disclose much without topic modeling. as a result, the researcher incorporates subject modeling into our study. 2. method researchers obtained tweet data from twitter for this study by crawling on social media twitter. the keywords for crawling used indonesian input, namely “recession”, and were taken on february 28, 2023. in this study, various aspects of topic modeling and sentiment analysis will be investigated in relation to the recession. fig. 1 depicts the method devised by researchers to analyze tweet data and determine the sentiments of twitter users. fig. 1. workflow of twitter opinion with sentiment analysis the data is processed using google colab and the python programming language. the first stage is to scrape data from twitter, then export it to a csv file, such as making the data in the csv file machine-readable through custom programming. second, the csv format file data will go through a cleaning process, such as removing “rt, #, \, @, hyperlinks, and emoji, to leading and trailing whitespaces”. researchers will then ascertain how users feel and categorize their opinions. next, visualizations can be used to check sentiment on various elements. issn 2614-0047 bulletin of social informatics theory and application 3 vol. 7, no. 1, march 2023, pp. 1-7 putra et.al (twitter sentiment analysis about economic recession in indonesia) 2.1. dataset the information was acquired by scraping tweets on twitter social media using python programming on google colab on february 28, 2023, and exporting as a csv file. this file contains 1808 tweets from the last few weeks. table 1 displays a subset of the csv file data. table.1 sample tweets datetime tweet id tweet username 2023-02-27 22:22:30 1630332575637200896 jujur ga punya kenangan interaksi secara langsung dengan event beyond the summit. tapi, merasa sangat beruntung bisa interview godz di maret 2021. masih ga percaya beyond the summit kena efek resesi sehebat ini rosesagaming 2023-02-23 23:15:13 1628896290338914304 indonesia konsumtif tp bagus biar g resesi adekhoky 2023-02-23 19:15:56 1628836072842199040 ujan ujan rebahan nonton drama uwu❎ ujan ujan mikirin resesi global✅ https://t.co/dzj87kmus6 iamlilboo 2.2. data preprocessing ensuring that our data is machine-readable is a crucial aspect of data analysis. unlike humans, machines can only process binary data., making it challenging to comprehend human language, let alone images and films, and analyzing 1 and 0 as data requires many stages. to be used, the data must first undergo a data cleansing procedure, including turning the raw data into a computer-readable file. the researcher must delete the extensive textual data collection comprising tweets to remove any potential discrepancies. unwanted information, such as url connections, user comments, and unescaped html characters, is contained in the raw textual data and is not required for mood analysis. we straightforwardly sanitize data. we screen out irrelevant twitter data during the preprocessing step. we deleted “rt, #, @, hyperlinks, and emoji, to preceding and following whitespaces” because our method of mood analysis does not require verifying extra information. 2.3. sentiment analysis semantic orientation evaluates texts’ polarity and partiality, while sentiment analysis determines their affective tone. in this tweet, directional nouns and adverbs show logical flow. adverbs divided by words determine emotional direction. developers use textblob to analyze twitter data and opinions. textblob ranks tweets numerically. textblob offers text hash tags, polarity, and opinion. polarity is [-1.1], where -1 indicates negative emotion, and 1 signifies optimism. negative words become negative figures. the human experience is 0–1. a tweet’s biased grade shows how much is the opinion and how much is fact. “polarity” describes how deeply people feel about views. the outcomes may be positive or negative. deeply moved by positive emotions such as admiration, faith, or love, a person or entity will adopt a particular worldview. subjectivity is a person’s connection to something. regardless of others’ opinions, emotional commitment and unique contact with the item are key. sample sentiment analysis based on polarity and subjectivity score as show in table 2. table.2 sample sentiment analysis based on polarity and subjectivity score tweet polarity score subjectivity score sentiment “jujur ga punya kenangan interaksi secara langsung dengan event beyond the summit. tapi, merasa sangat beruntung bisa interview godz di maret 2021. masih ga percaya beyond the summit kena efek resesi sehebat ini” 0.00 0.00 neutral “terindikasi & disinyalir bahkan banyak yg terpaksa menjual aset2nya (tansh, ruko, toko, kendaraan, ternak, kayu, dll) untuk mendapatkan dana segar. banyak kredit bank yg macet dibekukan krn kondisi yg memaksa. sisi lain sibuk poksanpaksin & propaganda idu resesi ekonomi global” -0.05 0.05 negative “g i truly did the best i could.” 1.00 0.03 positive 4 bulletin of social informatics theory and application issn 2614-0047 vol. 7, no. 1, march 2023, pp. 1-7 putra et.al (twitter sentiment analysis about economic recession in indonesia) 3. results and discussion the results show that from the data file used, an average of more than 1699 tweets shows a neutral sentiment. whereas for positive results, around 72 tweets were obtained and the rest were negative sentiments, as shown in fig. 2. it describes that 94% of tweets with neutral sentiments, 4% with positive sentiments, and 2% with negative sentiments. fig. 2. the bargraph and piechart of sentiment analysis then, the researcher wants to know the word cloud visualization based on the keyword recession and the data files obtained. fig. 3 depicts a word cloud comprising filtered tweets about the term recession. a word cloud is a graphical depiction of a data collection that emphasizes the regularity with which a specific term or sentence is used. fig. 3. word cloud of tweet posts related to recession as shown in fig. 4 and fig. 5, the terms in the cloud collectively reflect the most frequently used words. a bigger font size indicates that the term is stated more frequently than a smaller font size. in summary, the word cloud can wrap up twitter discussions about the keyword recession. it can also help us comprehend what a recession is. our filtered tweet word cloud frequently discovers instances of indonesian and turkish that occurred just before this tweet was crawled, as well as many other terms. fig. 4. word cloud of tweet posts with the top 10 words in the most positive and negative tweets issn 2614-0047 bulletin of social informatics theory and application 5 vol. 7, no. 1, march 2023, pp. 1-7 putra et.al (twitter sentiment analysis about economic recession in indonesia) fig. 5. word cloud of tweet posts with common words among most positive and negative tweets next, the researcher wants to measure polarity and subjectivity, as in formula 1. the polarity of a tweet is determined by adding the number of the chosen characteristics to the message. a rating is assigned to each tweet based on the following criteria: 𝑃𝑜𝑙𝑎𝑟𝑖𝑡𝑦𝑆𝑐𝑜𝑟𝑒(𝑡𝑤𝑒𝑒𝑡) = ∑ 𝑓𝑒𝑎𝑡𝑢𝑟𝑒𝑣𝑎𝑙𝑢𝑒(𝑡𝑤𝑒𝑒𝑡𝑖) () based on the subjectivity and polarity values from the data file, fig. 6 portrays polarity and subjectivity graphs for every tweet ever sent. the color blue represents neutral emotion, while the color green represents negative emotion, and the color yellow represents positive emotion. positive sentiment is more widespread than negative sentiment around the world. it suggests that our collection of tweets has a broad subjective range, with the majority of tweets falling on the [-1.00, 1.00] polarity scale (negative or positive). fig. 6. polarity and subjectivity scatter graph a correlation heatmap is a graphical depiction of a data set’s correlation matrix between clusters of factors. the association value is represented as a hue in the heat map, with each cell representing a set of factors. the heatmap in fig 7 represents a symmetric grid with correlation values ranging from -1 to 1, with -1 indicating a perfect negative correlation, 0 indicating no correlation, and 1 indicating a perfect positive correlation. the strength and orientation of the correlation value are reflected in the cell colors, with warmer colors showing positive correlations and colder colors signaling negative correlations (such as blue and green). the darker the color, the stronger the link. fig. 7. heatmap of correlations based on tweets mentioning the recession 6 bulletin of social informatics theory and application issn 2614-0047 vol. 7, no. 1, march 2023, pp. 1-7 putra et.al (twitter sentiment analysis about economic recession in indonesia) furthermore, the scholar notices that some variables have a strong positive connection, whereas others have a strong negative correlation. heat maps can help you find patterns and connections in data sets, which can help you make data-driven choices or create predictive models. for this study, researchers collected and analysed recession tweets in indonesian to determine its prevalence and impact. according to the findings, different individuals have expressed interest in recession tweets both directly and through the media. various social media platforms continue to facilitate the dissemination of recession tweet statistics. as a result, the researcher requires cuttingedge computational tools and methods to assess vast quantities of data promptly. in an effort to combat the dissemination of false information on social media, sentiment analysis was developed. several sectors will benefit from considering consumer insights when developing new policies. due to the vast amount of data available on social media platforms like twitter, there is a growing need for a systematic and efficient method of analyzing tweets. this study will benefit numerous industries because it provides a snapshot of the facts on the ground, which is crucial when advocating for legislative or regulatory reform. 4. conclusion based on twitter statistics in indonesian, this research examines social media sentiment with the keyword recession. according to this study, popular opinion on twitter about the recession is overwhelmingly neutral. this study classified twitter using text blobs, and the researchers successfully displayed data using a word cloud. with 1808 tweets collected, the sentiment study yielded 94% indifferent sentiment, 4% positive sentiment, and 2% negative sentiment. this study demonstrates that opinion analysis on social media can be used to monitor real-time recession trends. this discovery will presumably aid future mathematical modeling and data analysis research, particularly large-scale data processing using sentiment analysis to monitor responses and public statements via social media, specifically twitter. acknowledgment the researcher would like to thank everyone who has helped and backed our study “research on the perspective of internet public opinion in social media twitter about recession in indonesia using sentiment analysis”. additionally, the researcher would like to express our sincere appreciation to our supervisor for their invaluable guidance and support, to the participants who provided us with data and insights, to the research assistants and technical support team for their expertise and assistance, and to our friends and family for their unwavering support throughout the research process. we are extremely grateful for everyone’s efforts, which made this study feasible. references [1] l. feng, y. k. chiam, and s. k. lo, “text-mining techniques and tools for systematic literature reviews: a systematic literature review,” in 2017 24th asia-pacific software engineering conference (apsec), dec. 2017, pp. 41–50, doi: 10.1109/apsec.2017.10. [2] r. bose, s. aithal, and s. roy, “sentiment analysis on the basis of tweeter comments of application of drugs by customary language toolkit and textblob opinions of distinct countries,” int. j. emerg. trends eng. res., vol. 8, pp. 3684–3696, 2020, doi: 10.30534/ijeter/2020/129872020. [3] m. arora and v. kansal, “character level embedding with deep convolutional neural network for text normalization of unstructured data for twitter sentiment analysis,” soc. netw. anal. min., vol. 9, no. 1, p. 12, dec. 2019, doi: 10.1007/s13278-019-0557-y. [4] r. hermansyah and r. sarno, “sentiment analysis about product and service evaluation of pt telekomunikasi indonesia tbk from tweets using textblob, naive bayes & k-nn method,” in 2020 international seminar on application for technology of information and communication (isemantic), sep. 2020, pp. 511–516, doi: 10.1109/isemantic50169.2020.9234238. [5] w. aljedaani et al., “sentiment analysis on twitter data integrating textblob and deep learning models: the case of us airline industry,” knowledge-based syst., vol. 255, p. 109780, nov. 2022, doi: 10.1016/j.knosys.2022.109780. [6] s. zahoor and r. rohilla, “twitter sentiment analysis using lexical or rule based approach: a case study,” in 2020 8th international conference on reliability, infocom technologies and optimization https://doi.org/10.1109/apsec.2017.10 https://doi.org/10.30534/ijeter/2020/129872020 https://doi.org/10.1007/s13278-019-0557-y https://doi.org/10.1109/isemantic50169.2020.9234238 https://doi.org/10.1016/j.knosys.2022.109780 issn 2614-0047 bulletin of social informatics theory and application 7 vol. 7, no. 1, march 2023, pp. 1-7 putra et.al (twitter sentiment analysis about economic recession in indonesia) (trends and future directions) (icrito), jun. 2020, pp. 537–542, doi: 10.1109/icrito48877.2020.9197910. [7] d. soyusiawaty, a. h. s. jones, and n. l. lestariw, “the stemming application on affixed javanese words by using nazief and adriani algorithm,” iop conf. ser. mater. sci. eng., vol. 771, no. 1, p. 012026, mar. 2020, doi: 10.1088/1757-899x/771/1/012026. [8] s. s. sohail, m. m. khan, and m. a. alam, “an analysis of twitter users from the perspective of their behavior, language, region and development indices -a study of 80 million tweets,” social and information networks, p. 10, may 2021. [online]. available at: https://arxiv.org/abs/2105.10245. [9] s. das and a. k. kolya, “predicting the pandemic: sentiment evaluation and predictive analysis from large-scale tweets on covid-19 by deep convolutional neural network,” evol. intell., vol. 15, no. 3, pp. 1913–1934, 2022, doi: 10.1007/s12065-021-00598-7. [10] m. lepelaar et al., “sentiment analysis of social survey data for local city councils,” j. sens. actuator networks, vol. 11, no. 1, pp.1-13, 2022, doi: 10.3390/jsan11010007. [11] a. s. neogi, k. a. garg, r. k. mishra, and y. k. dwivedi, “sentiment analysis and classification of indian farmers’ protest using twitter data,” int. j. inf. manag. data insights, vol. 1, no. 2, p. 100019, 2021, doi: 10.1016/j.jjimei.2021.100019. [12] n. leelawat et al., “twitter data sentiment analysis of tourism in thailand during the covid-19 pandemic using machine learning,” heliyon, vol. 8, no. 10, p. e10894, 2022, doi: 10.1016/j.heliyon.2022.e10894. [13] m. mujahid et al., “sentiment analysis and topic modeling on tweets about online education during covid-19,” appl. sci., vol. 11, no. 18, pp. 1-25 2021, doi: 10.3390/app11188438. [14] n. chintalapudi, g. battineni, m. di canio, g. g. sagaro, and f. amenta, “text mining with sentiment analysis on seafarers’ medical documents,” int. j. inf. manag. data insights, vol. 1, no. 1, p. 100005, 2021, doi: 10.1016/j.jjimei.2020.100005. [15] m. umer, i. ashraf, a. mehmood, s. kumari, s. ullah, and g. sang choi, “sentiment analysis of tweets using a unified convolutional neural network-long short-term memory network model,” comput. intell., vol. 37, no. 1, pp. 409–434, 2021, doi: 10.1111/coin.12415. [16] m. h. brenner, “will there be an epidemic of corollary illnesses linked to a covid-19-related recession?,” american journal of public health, vol. 110, no. 7. united states, pp. 974–975, jul. 2020, doi: 10.2105/ajph.2020.305724. [17] h. chernick, d. copeland, and a. reschovsky, “the fiscal effects of the covid-19 pandemic on cities: an initial assessment,” natl. tax j., vol. 73, pp. 699–732, 2020, doi: 10.17310/ntj.2020.3.04. [18] s. goetz, c. schmidt, l. chase, and j. kolodinsky, “americans’ food spending patterns explain devastating impact of covid-19 lockdowns on agriculture,” j. agric. food syst. community dev., vol. 9, no. 3, pp. 31–33, may 2020, doi: 10.5304/jafscd.2020.093.033. https://doi.org/10.1109/icrito48877.2020.9197910 https://doi.org/10.1088/1757-899x/771/1/012026 https://arxiv.org/abs/2105.10245 https://doi.org/10.1007/s12065-021-00598-7 https://doi.org/10.3390/jsan11010007 https://doi.org/10.1016/j.jjimei.2021.100019 https://doi.org/10.1016/j.heliyon.2022.e10894 https://doi.org/10.3390/app11188438 https://doi.org/10.1016/j.jjimei.2020.100005 https://doi.org/10.1111/coin.12415 https://doi.org/10.2105/ajph.2020.305724 https://doi.org/10.17310/ntj.2020.3.04 https://doi.org/10.5304/jafscd.2020.093.033 bulletin of social informatics theory and application issn 2614-0047 vol. 5, no. 2, september 2021, pp. 133-141 133 https:doi.org/10.31763/businta.v5i2.463 structure learning of bayesian network using swarm intelligent algorithm: a review shahab wahhab kareem a,b,1,*, shavan askar a,2, kosrat dlshad ahmed a,3 a information system engineering department, technical engineering college, erbil polytechnic university, erbil, iraq b college of engineering and computer science, lebanese french university, kurdistan, iraq 1 shahab.kareem@epu.edu.iq*; 2 shavan.askar@epu.edu.iq; 3 kosrat.ahmed@epu.edu.iq * corresponding author 1. introduction biologists and social scientists build relational structures for their study [1]. but the network layout of a lot of nodes is very dense. sometimes used in applied in statistics and machine learning, the probabilistic model is a random variable between an independent framework and a classification model, probabilistic networks are more often used to produce structure. different models express the likelihood distributions in multidimensional space in different forms [1]. a distinction in terms of structure and composition is the form of probability distribution is used to differentiate between the two. a bayesian model is more than just a reflection of information, it is a particular type of probability graph. when there are connections between different random variables, it will show interdependence [2]. although an acyclic structure is described as random network between parameters, it can also be thought of as a guided acyclic graph. a bayesian network has more often represents a multidimensional distribution or configuration of curves rather than arrows since it uses directional edges to express the probability distribution." highdimensional modelling will also cost a great deal of money to do. one approach to construct network topology is by score and process is another route dependent on restriction. it is difficult to create score functions, as well as difficult to check for the optimization space. the primary advantage of the methodology based on restrictions is how to accurately determine whether a kind of freedom has been achieved. when learning is concerned with network optimization, the best search approach is to use a scoring system that allows matching of the highest degree of structure on results [3]. based on the results of the variables being independent of each other, the network can find a way to create a bayesian framework. so far, several clever bayesian network layout learning algorithms have been suggested. that has well-clusters of observations (a frequently used bayesian network built around lfo observations) (pc). practical, feasible have various advantages and drawbacks, and thus, this a r t i c l e i n f o a b s t r a c t article history received august 2, 2021 revised august 20, 2021 accepted august 30, 2021 machines using bayesian networks can be used to construct the framework of information in artificial intelligence that connects the variables in a probabilistic way. “deleting, reversing, moving, and inserting” is an approach to finding the best answer to the proposition of problem in the algorithm. in the enhanced surface water searching technique, mostly, the hunt for water is done by elephants during dry seasons, it is pigeon optimization, simulated annealing, greedy search, and the bdeu metrics being reviewed in combination to evaluate all these strategies being used in order to solve this problem. they subjected different data sets to the uncertainty matrix in an investigation to find out which of these approaches performed best. according to evaluation data, the algorithm shows stronger results and delivers better points. additionally, this article also represents the structure learning processes for bayesian network as well. this is an open access article under the cc–by-sa license. keywords bayesian network conditional independence test structure learning global search local search pigeon inspired optimization http://creativecommons.org/licenses/by-sa/4.0/ http://creativecommons.org/licenses/by-sa/4.0/ 134 bulletin of social informatics theory and application issn 2614-0047 vol. 5, no. 2, september 2021, pp. 133-141 kareem et.al (structure learning of bayesian network) algorithm has the network of being used in a wide range of applications, such as in a mixed learning situation. "compensate for network search space constraints with learning algorithm and recover bayesian network score from sparse graph" (cibns). using the bayesian network to help, and data that we were given as an example above, we can cut down on the blindness of the quest [4]. as a result, a combination of constraint-action and search-based methods will further increase the performance of bayesian network research. around the same time, it's good for finding the global optimum. since the relationships of random variables can be represented with direct acyclic graphs (dags) and therefore useful in realms such as artificial intelligence, medicine, bioinformatics, and sociology, it has been widely applied in the economy, as well. the framework learning mechanism has gained popularity in recent years and is now almost ubiquitous [5]. with regards to learning the structures of dags from evidence, two methods have predominated: as well, the quest and restriction and mixed methods have been used. rebuilding dags conditional approaches for determining bn structure, such as the use of independence measures as well as search-based methods have been suggested [6]. constraint-based methods construct using variables that are conditional independence (correlation) dependent on each other he uses ic, pc, and tpda (three-oriented dependency analysis) in this class. a score-based search is used to discover the network's ideal setup under which search constraints are applied only to the super structure of the graph. a reduction in the search space will result in better solutions [4]. verma and pearl gave an ic which looks for all subsets of u and v, for the assumption that no subsets of the two variables are conditionally dependent on some other subset of variables and all other subsets are independent on that subset of the whole, and which partition s into u and v are mutually exclusive and which are mutually nonexclusive. this procedure was suggested by spirtes and glymour, an iterative way of looking for the cardinality of increasing subsets of items was [3]. the pc algorithm constrains the set of vertices that may separate u and v to vertices that are either directly connected or that are adjacent to v [7]. as the number of vertices in a dag expands, the asymptotic consistency of the algorithm remains intact. 2. related works 2.1. bayesian network because of their capacity to deal with nondeterministic variables in the physical universe, probabilistic models have been widely used in recent years. the joint probability distribution of random variables can be defined by a bayesian network (bayesian) network (bn) [8]. a bayesian network is a graph in which variables are represented by nodes and bayesian probabilities are described. structure learning is based learning is just a form of parameter learning. likelihood is obtained for each variable probabilistically for those variables it has to have [9]. it detects a dag with one node for each variable in the structure. variables used in the system are conditionally independent of their non-descendants with regard to their values, whether the conditions specified are not true for any of the nodes lower in the network [8]. lately, extensive research has been conducted on discovering how bns work by actual evidence. learned dependency graph analysis may be a valuable in helping to define the problem which is also utilized in solving it (friedman et al. 1999). the cooperherskovitzler k2 algorithm was first suggested in 1992, and virtual annealing bn was improved in 1995 (sa). genetic algorithm (ga) is used to apply it to the design of the neural network structures. a bayesian network s = {g, θ} for a series of n quantities that expresses the conditional probability mass function of its constituent variables and θ is defined by a guided acyclic graph x = {x1, x 2,..., x n} etc. 𝑝(𝐺|𝐷) ∝ 𝑝(𝐺)𝑝(𝐷|𝐺) (1) in the bayesian network, g, a correlation between two variables implies that they are interconnected, and an edge occurs. as if the structure g is valid, then it means that prior to seeing some data, the prior data holds true. it is conditional on the probability. to treat p (g and d) as a ranking [10], one can use a heuristic search algorithm, one can search for a high-scoring network. for e.g., a greedy search the area in question, looking at all nearby structures, calculates the score, and goes to the structure with the best score. it ends because the new arrangement is greater than any of any of the surrounding structures. hence, computing a network structure can be described as an optimization problem [11], where the objective is to find the best possible quality for the training data. it can be made using a bayesian method, minimal knowledge criterion, or a combination of the two. issn 2614-0047 bulletin of social informatics theory and application 135 vol. 5, no. 2, september 2021, pp. 133-141 kareem et.al (structure learning of bayesian network) these measurements may be applied to entire networks, and their results summarized as a (or composed) as the total (or product) of their parts. it's easier to score and therefore to locate when it's done locally. if you are looking for familiarity, k2, hillclimber, sa, and ga are good ways to go. probabilistic models, because of their power to describe uncertain information, are often highly effective aids. probability theory offers an analysis method for determining how the elements are linked, to ensure the system's consistency. there is supposed to be little overlap between the two sets of findings and different approaches are necessary to come up with new models for the data. graph theory provides an intuitive general-purpose interface for creating arrays of interactional [12], variable-structure data that can be used in varied algorithms. maybe 'probabilistic graphical simulations' may be referred to as bayesian networks. while probabilistic networks are a more complex and more flexible technique, bayesian networks (bn) can be considered a simpler analytical approach for machine learning [4]. they can be applied through information development, discourse, and derivation. bayesian network had the structure: dags with two critical nodes. a variety of the network is created by the parameters and its overall configuration. this structure describes parameter dependencies, and these parameters represent conditional probabilities [9]. without an effective search tool, building a bayesian network is a challenge. given a dataset, the optimization problem of finding the optimum configuration of a bayesian network (bn) is np-complete [4]. although significant research to come up with an approximation of network structures has been done in essence, there are two approaches to structural learning in bayesian networks. while the first uses constraint-based techniques [13], and searches, the second employs a method that utilizes scoring and searching techniques. a calculation is used to find the bn composition. 2.2. structure learning of bayesian network a probabilistic paradigm incorporates mathematics, as well as graphical representations of concepts that were developed by graph theory [14]. there are two problems that must be addressed: ambiguity and unpredictability. graphical models are joint probabilistic systems that depict random dependency relationships algorithms provide a large impact in analyzing and in the design and development of machine learning approaches diagrammatic models use probabilities, where nodes represent random variables and/association between pairs of variables may be drawn to display relationships. compressed mutual likelihood distributions there are two essential kinds of software programs: writer-prompts and reader-prompts. markov random fields (mrfs) or bayesian networks may also be classified as undirected models. observational learning has been researched throughout the latest decade. the use of experience or observed evidence can be used to generate new principles [15]. although there has been some study on this topic, different approaches have been tried make just the changes to the data necessary to reconstruct the feature. to change the whole graph to optimize a ranking, but the alterations could create dependencies. the aim of optimization techniques is to create a local version of the network to better approximate the global structure. most analysis with bayesian networks is limited to scenarios in which the configuration does not change. traditional algorithms also used scores were used for the bulk of these algorithms. we may determine the likelihood of all dag models if there are just a few random variables, including all possibilities [12]. 𝑓(𝑛) = ∑(−1)𝑖+1 ( 𝑛 𝑖 )2𝑖(𝑛−𝑖)𝑓(𝑛 − 𝑖)𝑛 > 2 𝑛 𝑖=1 (2) for all practical purposes, this amount should be huge. checkering has shown that for certain groups of dag-patterns that this is really is so. using smarter search algorithms may help solve this sort of issue. for example, we will select values of a stochastic variable (sv) that increase the probability of obtaining p (should be higher than one maximizing model.) as the number of variables grows, finding the optimal models among all possible models becomes infeasible to the method. 2.3. pigeon inspired optimization currently, the majority of pigeon-inspired optimization (pio) has been used in continuous optimization problems. as the follow-up from problem orientation: the metropolis adoption of simulated annealing is suggested as a solution to this discrete pi-o (dpio) algorithm; (tsps). 𝑉𝑖(𝑡) = 𝑉𝑖(𝑡 − 1). 𝑒−𝑅𝑡 + 𝑟𝑎𝑛𝑑.(𝑃𝑔 − 𝑃𝑖(𝑡 − 1)) (3) 136 bulletin of social informatics theory and application issn 2614-0047 vol. 5, no. 2, september 2021, pp. 133-141 kareem et.al (structure learning of bayesian network) 𝑃𝑖(𝑡) = 𝑃𝑖(𝑡 − 1)𝑉𝑖(𝑡) (4) dpio is developing a new chart and compass that will make it easier for explorers to understand and advance. a modern hallmark operator, which is intended to increase the performance of tsps using cooperative learning and heuristic knowledge. the metropolis approval criteria is used to determine if new solutions should be allowed to converge or not, particularly if they are otherwise trying to be effective [16]. experiments were carried out to observe the behavior of the map and compass operator as well as other landmark workers and learn their individual differences. fig. 1. compass operator and map for pio. pigeon inspired optimization is a method is a novel bio-inspired optimization method in terms of pigeons [17], it was on the first account that the navigational methodology was created, and in airvehicle applications it was later. fig. 2. landmark operator model for pio. any pio has two essential-valued components: a mapping driver and a way finder, and a geographic/direction driver, and another that values landmarks. in the map and compass domain driver, there are many suns, while in the landmark driver, there are just a few landmarks [16]. in layered form, it mimics the aptitude of handyman do vessel pigeons during the map and compass, each team member learns new navigation techniques, including d-dimensional explorations. we will get to know the new position and velocity ip and velocity i by each one of our techniques. much of the pigeons are able to locate the targets because of the magnetic field. they often use landmarks to figure out where they are. the suggested solution utilizes a bayesian search using a pio search tool [18]. to calculate the bayesian network configuration, the bdeu metric was used. any pigeon in the population encodes a location and velocity in the specified room [19]. this place is believed to be the optimal search location. it is focused on two methods. for the first technique, the local quest procedure is navigated using a schematic of a globe and compass. second, it employs a landmark paradigm for world-wide quest [18]. pseudo code of this algorithm is seen in fig. 3. pio algorithm may include the use of various neighborhood-specific search algorithms. when searching for solutions created by pigeons, you can depend on being up-to-to-date. the dags for studying brts are a part of the solution space to be investigated. any pigeon represents a solution and is started on an empty seed dag [20]. when issn 2614-0047 bulletin of social informatics theory and application 137 vol. 5, no. 2, september 2021, pp. 133-141 kareem et.al (structure learning of bayesian network) the pigeon is looking for a likely network layout, defined as the bdeu metric, it explores inside the quest room. equation 4 seeks to find the network with the greatest bdeu score. fig. 3. compass steps for a particular pigeon. at any turn, new ideas are developed through trial and error. if you start with an empty graph, all arcs will be appended. the process is repeated until the specified number of arcs has been created. as a result, each operator is initialized with the initial population and the one that raises bdeu score is chosen [21]. as long as bdeu or as long as necessary, the operator sees an improvement, the pigeon can keep flying [22]. operators usually are called the four basic optimization operators: addition, elimination, movement, and mutation, and replacement. it is an uncomplicated setup in this particular domain and only replaces one competitor edge per time, with the four operators working around the board. on the other side, moving the solution about in some medium affects it, in a mild manner [23]. correcting a solution without the three basic operators would not automatically result in a better solution [21]. higher ground-hopping occurs with proximity to a sought-after destination. moving the cursor to a lot about is referred to as pigeon-skipping in literature. landmark is a complex and interesting combination of travelling and seeking. a dag defines a pigeon as one which does revert, moves, makes new arcs, and ads, and reaches solutions g1, g2, g3, and g4 in succession [24]. as suggested by g3, then considering the bdeu score, it will look for another operator that satisfies g3 if the bdeu (behavioral + economics) score of g+1 is greater than that of g, than it can carry out the associated action. 3. method using positivist philosophical approach, this research targets to maintain the development of knowledge to assess the outcomes. in this process, gradual management of the information and process simulation is necessary. for the comparative analysis of the literature, several determiners such as and, or, but etc. have been used for the keywords such as bayesian network, structure processing, structure learning, conditional independence test etc. to simulate the comparative review, articles have been collected from the reliable journals. articles published from 2010 to 2020 have been chosen for the comparative review because of the scarcity of quality journals. systematic comparison among the selected articles will be conducted in this review. comparative analysis have been conducted based on available articles in this regard. 4. result and analysis through developing theories of ambiguity reasoning in the 1980s, bayesian networks (or bayesian belief networks) have come to the forefront of artificial intelligence science. recently, bns have shown to be an important method in dealing with unpredictable systems and data processing of multivariate random variables determining the network configuration and parameters with datasets derived from previous analyses. structure or parameter learning into two parts: structure learning and parameter identification. in the former, the network topology determination involves identifying the topologically suitable sample sets. the details of the network topology are needed to establish the network parameters. bayesian learning also involves access to network topology and data, making it the foundation of bayesian network growth. a good way to find the 'optimization structure' is to be based on identifying effective structural principles. 138 bulletin of social informatics theory and application issn 2614-0047 vol. 5, no. 2, september 2021, pp. 133-141 kareem et.al (structure learning of bayesian network) there are two models of bayesian networks, which could be derived from a bayesian framework learning process, as a way of breaking down a bayesian inference system, the dag method may be considered a graph that codifies the interdependence between variables [7]. conditional freedom is confirmed by experimentation. stress on relevancy approaches once you have chosen a quest strategy, the best network will be found [7]. there are means of assessing how accurately we can classify participants (commoner ones include maximum probability, bayesian information criterion, [31] bayesian ranking, and minimum description length), as well as uncommon means (maximum product-likelihood, bayesian information, and minimum description). searching for the most optimal network is an intractable challenge and refined algorithms are almost impossible to implement [7]. manually controlled approaches have included techniques, such as greedy hill-climbing [31], simulated annealing, evolutionary algorithm (ea), and genetic algorithm (ga). ga and ea have been widely employed. because the number of variables is high, both of the above algorithms are likely to return a local optimised network structure until convergence is reached [32]. table.1 findings from related previous research source findings [25] in unpredictable situations, bayesian networks (bns) may be good methods for creating models of ideas and reasoning. bayesian network configuration is deemed a difficult challenge to learn from a dataset because of the search space difficulty. this paper introduces a novel approach for structure learning that is focused on pso (particle swarm optimization) and the k2 algorithm. pso is used to check the space of orderings in order to better understand a bayesian network's layout. each network's fitness is determined by running the k2 algorithm and comparing the result to the fitness of the network. our solution gives greater efficiency than the other approaches. [26] the paper proposes a hybrid algorithm that they term a bayesian network model-based conditional independence test and a heuristic scan (cibns, ci-based bayesian network search). to ensure the solution consistency and search speed, the latest algorithm initially uses the conditional independence test to compact the search space. after that, the algorithm implements a heuristic search method that incorporates the bdeu measure score in order to boost performance in the construction process. on simulated and actual info, the latest algorithm finds that it is capable of efficiently constructing a network for aviation. it outclasses hill climbing and local hunt in terms of utility and precision. [27] extending the representational capacity of continuous bayesian networks beyond exponentially-distributed state transformations has long been done through the use of phase-type distributions. a framework for learning phase-type distributions was introduced in this article. to efficiently obtain good phase-type approximations for a variety of parametric distributions, we use particle swarm optimization to reduce a changed kl divergence value. [28] the authors discussed a np-hard problem for bayesian network architectures from results in this paper. a proposal using shared knowledge and pc algorithm techniques was introduced in this article. this algorithm uses shared knowledge to find the original undirected graph. you can firstly use the pc algorithm to find a pdag. based on our experiments, it seems that our algorithm is more effective than the pc algorithms under the same conditions. [29] the authors regarded bayesian networks structure learning is widely considered to be a difficult computational problem, as the more candidate graphs you have, the more the ratio of variables grows exponentially. there have been several heuristic searching techniques that attempt to improve network layout. we demonstrate two methods for enhancing bayesian network layout learning using search optimization in this article. this method combines elements of greedy quest with elements of bee optimization algorithms. to test this suggested strategy, we are going to use two search techniques. [30] using bayesian networks, machine learning experts may construct a framework for information that depicts the probability relationship between variables. elephant swarm water search algorithm (eswsa) was introduced as a new way to build bayesian networks. the algorithms involved include the ones mentioned below: deleting, reversing, inserting, and moving are both used in order to arrive at the optimum solution structure with the eswsa. mostly, elephants' use of water quest technique during droughts is incorporated into the eswsa algorithm. to assess all algorithms, bdeu (bird-inspired efficient) score function is used. they compared the confusion matrix performances of these methods with different data sets to get a better understanding of them. the findings of the evaluations show that the algorithm suggested does better than the other algorithms, both in terms of efficiency and results. in this paper, a novel approach focused on a new-to-discrete particle-behavioural quantum algorithm (ndpb) is used to learn bns' structure statistical dependencies are easy to express in a bayesian network (bn). it harnesses the power of graph theory to represent random variables' dynamic bayesian networks (dbns) is a type of bayesian networks (bns) which deals with timevarying processes. due to dbn's ability to describe nonlinear, time-dependent, changing, and probabilistic relationships, much of dbn learning and modelling research has emerged. dbns also issn 2614-0047 bulletin of social informatics theory and application 139 vol. 5, no. 2, september 2021, pp. 133-141 kareem et.al (structure learning of bayesian network) been employed in many different sectors. many complex bayesian networks are built by asking a professional for help. when working for smaller networks, elicitation may be a straightforward, but when doing so for huge numbers of variables, it becomes cumbersome and time-consuming. if information is accessible, it is feasible to construct the model on that [32]. if all the data have been collected, studying two networks can be modelled when the complex bayesian network results into the expression of prior network and transformation network since the fitness mechanism is a closed form [32]. data normally include errors, because we typically cannot accurately observe the mechanism we are trying to represent. an additional difficulty with missing data is that it operates as a closed form with comprehensive data, though not limited to that. what's needed for learning a database structure from incomplete data is entirely is much more effort than what's required for a well-structured database (he et al. 2018). from 1998 onward, the use of dbn (structural em), can be seen in latent variable models. deterministic approaches, on the other hand, are vulnerable to finding local optima, are said to be weak at generalizing, may be wide in their quest space [33]. when a local maximum has been reached, an easy solution to the problem is to use a stochastic approach this paper introduces complex bayesian networks using particle swarm optimization (pso) [34]. we choose that as a result of the job. since networks can be viewed as components, we can develop more complex systems by sharing their component parts with higher fitness. 5. conclusion using the pigeon-inspired learning method, we concentrated on the structure learning issue and applied it to the bayesian network. they are useful for the design of information representation systems in machine learning. it is possible to encode probabilistic dependencies among the variables using bayesian networks. scoring and scan is one layout learning methodology at bay networks. propose a new bayesian network framework based on pio (pio). it's a basic concentration rate. an unbelievable and remarkable navigational skill can be seen in pigeons in the way they just seem to find their way a guided acyclic graph any chart has a fitness score that tells its ability to demonstrate this reality. the algorithm takes time to explore the solution space, so it is performed using a landmark, compass, and map operator before it achieves the best or a suitable structure is found. when implementing the suggested approach, simulated annealing and greedy search were contrasted with each other with the bdeu value. in addition, we tested the uncertainty approaches in a variety of data sets. a specific algorithm yields outstanding results as shown by the effects produced it produces better results, is as effective, and produces higher and better values than simulated annealing and greedy algorithms. we used the score and search method, where pi as a parameter and the search tool. a search strategy that uses the random flights of a pigeon as its basis. the hunt seems to follow the path of least resistance, so pio is a popular technique for finding discrete solutions. easily tailored to a specific to every target area. prompting pio exploration results in a likely-to-to-be-be-tried solutions because of allowing pigeons to travel in short range leads to plausible solutions by parameter input. according to the suggested approach, the structure of the network, it can find outstanding structure solutions, which means it can measure better function and approximates more accurately. the algorithms make the quest faster and convergence is rapid. the suggested solution may be studied as a study in parallel processing. references [1] x. sun, c. chen, l. wang, h. kang, y. shen, and q. chen, “hybrid optimization algorithm for bayesian network structure learning,” information, vol. 10, no. 10, p. 294, sep. 2019, doi: 10.3390/info10100294. [2] j. xin, g. chen, and y. hai, “a particle swarm optimizer with multi-stage linearly-decreasing inertia weight,” in 2009 international joint conference on computational sciences and optimization, apr. 2009, pp. 505–508, doi: 10.1109/cso.2009.420. [3] c. yuan, b. malone, and x. wu, “learning optimal bayesian networks using a* search,” 2011. [4] p. o. djan-sampson and f. sahin, “structural learning of bayesian networks from complete data using the scatter search documents,” in 2004 ieee international conference on systems, man and cybernetics (ieee cat. no.04ch37583), 2004, pp. 3619–3624, doi: 10.1109/icsmc.2004.1400904. 140 bulletin of social informatics theory and application issn 2614-0047 vol. 5, no. 2, september 2021, pp. 133-141 kareem et.al (structure learning of bayesian network) [5] c. yang, j. ji, j. liu, j. liu, and b. yin, “structural learning of bayesian networks by bacterial foraging optimization,” int. j. approx. reason., vol. 69, pp. 147–167, feb. 2016, doi: 10.1016/j.ijar.2015.11.003. [6] x.-s. yang, “a new metaheuristic bat-inspired algorithm,” in nature inspired cooperative strategies for optimization (nicso 2010), 2010, pp. 65–74. [7] y. zhang, j. liu, and y. liu, “bayesian network structure learning: the two-step clustering-based algorithm,” 2018. [8] j. cowie, l. oteniya, and r. coles, “particle swarm optimisation for learning bayesian networks,” in icciis 2007, world congress on engineering, wce 2007, 2007, pp. 71–76. [9] shao-zhong zhang and lu liu, “mcmc samples selecting for online bayesian network structure learning,” in 2008 international conference on machine learning and cybernetics, jul. 2008, pp. 1762– 1767, doi: 10.1109/icmlc.2008.4620690. [10] j. wang and s. liu, “novel binary encoding water cycle algorithm for solving bayesian network structures learning problem,” knowledge-based syst., vol. 150, pp. 95–110, jun. 2018, doi: 10.1016/j.knosys.2018.03.007. [11] g.-g. wang, s. deb, and l. dos s. coelho, “elephant herding optimization,” in 2015 3rd international symposium on computational and business intelligence (iscbi), dec. 2015, pp. 1–5, doi: 10.1109/iscbi.2015.8. [12] j. li and j. chen, “a hybrid optimization algorithm for bayesian network structure learning based on database,” j. comput., vol. 9, no. 12, pp. 2787–2791, 2014. [13] l. antonio pereira silva, j. batista nunes bezerra, m. barbosa perkusich, k. costa gorgônio, h. oliveira de almeida, and a. perkusich, “continuous learning of the structure of bayesian networks: a mapping study,” in bayesian networks advances and novel applications, intechopen, 2019. [14] t. rahier, s. marié, s. girard, and f. forbes, “fast bayesian network structure learning using quasideterminism screening,” in jfrb 2018-9èmes journées francophones sur les réseaux bayésiens et les modèles graphiques probabilistes, 2018, pp. 14–24. [15] s. tong and d. koller, “active learning for structure in bayesian networks,” in international joint conference on artificial intelligence, 2001, pp. 863–869. [16] a. j. kulkarni, g. krishnasamy, and a. abraham, cohort intelligence: a socio-inspired optimization method, vol. 114. cham: springer international publishing, 2017. [17] y. cao, m. raoof, e. szabo, j. ottosson, and i. näslund, “using bayesian networks to predict longterm health-related quality of life and comorbidity after bariatric surgery: a study based on the scandinavian obesity surgery registry,” j. clin. med., vol. 9, no. 6, p. 1895, jun. 2020, doi: 10.3390/jcm9061895. [18] j. cheng, r. greiner, j. kelly, d. bell, and w. liu, “learning bayesian networks from data: an information-theory based approach,” artif. intell., vol. 137, no. 1–2, pp. 43–90, may 2002, doi: 10.1016/s0004-3702(02)00191-1. [19] t. koski and j. noble, bayesian networks: an introduction. john wiley & sons, 2011. [20] a. r. khanteymoori, m.-h. olyaee, o. abbaszadeh, and m. valian, “a novel method for bayesian networks structure learning based on breeding swarm algorithm,” soft comput., vol. 22, no. 9, pp. 3049– 3060, may 2018, doi: 10.1007/s00500-017-2557-z. [21] m. bartlett and j. cussens, “integer linear programming for the bayesian network structure learning problem,” artif. intell., vol. 244, pp. 258–271, mar. 2017, doi: 10.1016/j.artint.2015.03.003. [22] k. m. salama and a. a. freitas, “abc-miner: an ant-based bayesian classification algorithm,” in swarm intelligence, 2012, pp. 13–24. [23] f. liu, f. tian, and q. zhu, “bayesian network structure ensemble learning,” in advanced data mining and applications, 2007, pp. 454–465. [24] s. sencer, e. oztemel, o. torkul, c. kubat, h. taskin, and g. yildiz, “bayesian structural learning with minimum spanning tree algorithm,” 2013. issn 2614-0047 bulletin of social informatics theory and application 141 vol. 5, no. 2, september 2021, pp. 133-141 kareem et.al (structure learning of bayesian network) [25] s. aouay, s. jamoussi, and y. ben ayed, “particle swarm optimization based method for bayesian network structure learning,” in 2013 5th international conference on modeling, simulation and applied optimization (icmsao), apr. 2013, pp. 1–6, doi: 10.1109/icmsao.2013.6552569. [26] z. long, “a bayesian network based structure learning algorithm,” in 2016 international conference on robots & intelligent system (icris), aug. 2016, pp. 12–15, doi: 10.1109/icris.2016.2. [27] l. j. perreault, m. thornton, r. goodman, and j. w. sheppard, “a swarm-based approach to learning phase-type distributions for continuous time bayesian networks,” in 2015 ieee symposium series on computational intelligence, dec. 2015, pp. 1860–1867, doi: 10.1109/ssci.2015.259. [28] j. li and y. zhang, “a method for learning bayesian network structure,” in 2014 sixth international conference on intelligent human-machine systems and cybernetics, aug. 2014, pp. 222–225, doi: 10.1109/ihmsc.2014.156. [29] s. kareem and m. c. okur, “bayesian network structure learning using hybrid bee optimization and greedy search,” in 3rd international mediterranean science and engineering congress, 2018, pp. 1–7. [30] s. cheng and y. shi, handbook of research on advancements of swarm intelligence algorithms for solving real-world problems. igi global, 2020. [31] b. andrews, j. ramsey, and g. f. cooper, “scoring bayesian networks of mixed variables,” int. j. data sci. anal., vol. 6, no. 1, pp. 3–18, aug. 2018, doi: 10.1007/s41060-017-0085-7. [32] s. b. gillispie and m. d. perlman, “enumerating markov equivalence classes of acyclic digraph models,” arxiv prepr. arxiv1301.2272, jan. 2013, [online]. available: http://arxiv.org/abs/1301.2272. [33] c.-c. he and x.-g. gao, “structure learning of bayesian networks based on the lars-mmpc ordering search method,” in 2018 37th chinese control conference (ccc), jul. 2018, pp. 9000–9006, doi: 10.23919/chicc.2018.8483049. [34] a. h. gandomi, x. s. yang, s. talatahari, and a. h. alavi, metaheuristic applications in structures and infrastructures. newnes, 2013. bulletin of social informatics theory and application issn 2614-0047 vol. 7, no. 1, march 2023, pp. 8-13 8 https:doi.org/10.31763/businta.v7i1.621 comparing neural network with linear regression for stock market prediction fachrul kurniawan a,1,*, yunifa miftachul arif a,2, fresy nugroho a,3, mohammed ikhlayel b,4 a department of informatics engineering, state islamic university maulana malik ibrahim malang, indonesia b department of information technology and communications, al-quds open university, palestine 1 fachrulk@ti.uin-malang.ac.id; 2 yunif4@ti.uin-malang.ac.id; 3 fresy@ti.uin-malang.ac.id; 4 miklil@qou.edu * corresponding author 1. introduction investors frequently choose stocks as their asset of choice because of the enormous potential rewards they provide [1]. on-the-go stock purchases and sales can be made through the use of a downloadable app. seeds, stockbit, octafx, and a great number of additional applications, just like them, are all examples of stock programs for mobile devices [2], [3]. investing in stocks comes with both positives and negatives that should be considered. investing money in companies that do not have a track record of success or are accused of fraud can bring about financial devastation and bankruptcy [4], [5]. in addition to this, generating money on the stock market necessitates a high level of foresight in addition to an extensive understanding of the stock market. therefore, linear regression [6]–[8] and neural networks [9]–[11] are utilized in this study to produce projections regarding bank stocks. it is vital to develop simulations utilizing the tools that are accessible in order to optimize outcomes, especially buying and selling suggestions on the stock market [12]. this is done so investors can obtain a clear image through data trials using neural networks and linear regression techniques. the data that was used in this investigation came from the indonesian banking stake held by a single corporation. as a result of the size and reputation of the firm, this stock is now frequently recommended to investors for use as a bank service provider. this stock has a track record of providing superior returns to its shareholders. a r t i c l e i n f o a b s t r a c t article history received january 20, 2023 revised february 3, 2023 accepted february 24, 2023 there are both gains and losses possible in stock market investing. brokerage firms' stock investments carry a higher risk of loss since their stock prices are not being tracked or analyzed, which might be problematic for businesses seeking investors or individuals. thanks to progress in information and communication technologies, investors may now easily collect and analyze stock market data to determine whether to buy or sell. implementing machine learning algorithms in data mining to obtain information close to the truth from the desired objective will make it easier for an individual or group of investors to make stock trades. in this study, we test hypotheses on the performance of a financial services firm's stock using various machine learning and regression techniques. the relative error for the neural network method is only 0.72 percentage points, while it is 0.78 percentage points for the linear regression. more training cycles must be applied to the algortima neural network to achieve more accurate results. this is an open access article under the cc–by-sa license. keywords neural network linear regression stock market prediction https://doi.org/10.31763/businta.v7i1.621 mailto:fachrulk@ti.uin-malang.ac.id http://creativecommons.org/licenses/by-sa/4.0/ http://creativecommons.org/licenses/by-sa/4.0/ issn 2614-0047 bulletin of social informatics theory and application 9 vol. 7, no. 1, march 2023, pp. 8-13 kurniawan et.al (comparing neural network with linear regression for stock market prediction) 2. method an early step in this study's contribution is developing a plan outlining the sequence of events that will occur throughout the experiment, allowing for more precise and repeatable results. this research follows the sequence shown below. the research begins with defining the problem and developing a working hypothesis, followed by searching for relevant publications or studies. second, it is time to gather some information. information on a topic may be quickly found by conducting a web search. yahoo finance was utilized by the research team in this study for its extensive stock database. in order to find an appropriate rhythm algorithm for use in forecasting, it is necessary first to identify the problem. this study chooses to employ linear regression analysis and a neural network. both approaches can be helpful in data prediction and have their benefits. rapidminer, a machine learning assistance program, is also utilized in this investigation. finally, the fourth step attempts to find answers to the issues identified. the answer is shown as a comparison of the accuracy of the linear regression technique and the neural network. a neural network is a collection of interconnected computational nodes inspired by the structure of the human brain [13], [14]. ann, like the brain's internal network, is made up of a collection of neurons that work together to process and convert incoming data [15], [16]. the term "weight" is used to describe this connection. the data collected is then sent into the propagation function's input and used to calculate the total load. as shown in fig. 1, there are three stages in which data will travel: the input, the hidden layer, and the output. fig. 1. neural network linear regression is divided into two parts: simple and multiple linear regression. simple linear regression is an equation model that uses the relationship of one independent variable/predictor (x) with a dependent variable/response (y) [15]. the difference in the multiple linear regression method is that the independent variables have more than one variable [16]. the equation used in linear regression is as follows. 𝑌 = 𝛽0 ⊢ 𝛽1𝑋1 + 𝛽2𝑋2 + ⋯ 3. results and discussion this project makes use of existing resources by first developing a rapidminer software process schematic, as seen in fig. 2. rapidminer provides a simple step by running the process scheme that has been made to see the prediction results using the neural network method. this neural network still uses training cycles = 200 and learning rate = 0.01, which is the default setting from the rapidminer. three tests will be proposed with different training cycles and learning rates to improve accuracy. fig. 3 show the neural network architecture for testing process. fig. 4 shows an example of the prediction results performed by a neural network. 10 bulletin of social informatics theory and application issn 2614-0047 vol. 7, no. 1, march 2023, pp. 8-13 kurniawan et.al (comparing neural network with linear regression for stock market prediction) fig. 2. neural network process the input is selected on the neurons, namely low, which goes to nodes in hidden layers 2 and 4. in this test, it can be seen that linear regression still has higher accuracy than the neural network. however, the accuracy of neural networks can still be improved by changing the training cycles and learning rates used. therefore, the second test scenario is carried out by changing the training cycles to 500, and the learning rate to 0.1. fig. 3. neural network architecture for testing fig. 4. prediction results of neural network test 1 issn 2614-0047 bulletin of social informatics theory and application 11 vol. 7, no. 1, march 2023, pp. 8-13 kurniawan et.al (comparing neural network with linear regression for stock market prediction) open, high, and low inputs are linked to hidden 1 in neural network test 2. in addition, the output is linked to nodes 1, 2, 3, and 4. all three types of inputs—open, high, and low—are sent into the hidden layer's nodes. table 1 summarizes the error performance outcomes from each approach, allowing us to compare their relative precision. the table shows that the third neural network test also has less error than the linear regression. overall, the bigger the number of training cycles, the better the results. as a result, the margin of error is decreasing, and precision is improving. table.1 error performance method rmse absolute error relative error regresi linear 80.380 +/0.000 61.263 +/52.036 0.78% +/0.66% neural network (test 1) 103.962 +/0.000 88.848 +/53.982 1.13% +/0.67% neural network (test 2) 91.101 +/0.000 76.236 +/49.876 0.97% +/0.62% neural network (test 3) 67.042 +/0.000 56.100 +/36.707 0.72% +/0.47% linear regression processing is seen in fig. 5. find rmse, absolute, and relative errors with apply model and performance first. fig. 6 displays the results of the low attribute prediction of stocks, which has a coefficient of 0.977, an error of 0.005, and a standard coefficient of 0.994. fig. 5. linear regresion process fig. 6. linear regression prediction results linear regression is a straightforward method that may be quickly applied to produce reliable outcomes. in contrast to other complicated algorithms, training these models requires relatively little computing power. therefore, they may be used even on systems with limited resources. linear regression's temporal complexity is far lower than other machine learning techniques. linear regression's mathematical formulae are also easy to grasp and apply. therefore, learning linear regression is a breeze. finding the nature of the association between variables is a common use of linear regression because of its near-perfect fit to linearly separable datasets. overfitting can also be mitigated by regularization. when a machine learning model catches the noisy data along with the clean, it is said to have overfit the dataset, lowering the model's quality and its results on the test data [17]. a regularization is a straightforward approach that can effectively reduce a function's complexity to mitigate overfitting. 12 bulletin of social informatics theory and application issn 2614-0047 vol. 7, no. 1, march 2023, pp. 8-13 kurniawan et.al (comparing neural network with linear regression for stock market prediction) linear regression is problematic for complicated datasets because it presumes a linear connection between input and output variables. in most situations, a straight line does not provide the best fit for the data since the connection between the variables in the dataset is not linear [18]. in some cases, a more sophisticated function can more accurately capture the information, which is why linear regression models typically have poor predictive power [19]. it is essential to adequately handle outliers before applying linear regression to a dataset since they might significantly affect the results. on the other hand, neural networks initially improve visual analysis. artificial neural networks can accomplish more complicated tasks than other machines because they are akin to human brain networks. neural networks can analyze disorganized data, which is another benefit [20]. anns make organizing unstructured data simpler. neural networks' adaptability is its third benefit. for any purpose, an ann changes its structure. neural networks may transition from machine learning to complicated applications. unlike many machine learning techniques and applications, this is flexible. artificial neural networks swiftly adapt to new surroundings and show their talents, suggesting that these networks require less and more flexible training. computation requires no involvement. 4. conclusion according to the findings of this study, linear regression and neural networks may be able to be used to make accurate predictions on the stock market. when compared to the relative error number produced by linear regression, the neural network technique produces just 0.72% of it, whereas linear regression produces 0.78%. additional training cycles are required in order to increase the accuracy of the predictions made by the neural network. in the not-too-distant future, researchers hope to compare the precision of this method with that of many other machine-learning strategies. the combination of clustering, classification, and association might be interesting for future implementations. references [1] j. y. campbell and l. m. viceira, “strategic asset allocation.” oxford university pressoxford, pp. 381-420, 2002, doi: 10.1093/0198296940.001.0001. [2] m. yusuf, m. rahmani, a. fakultaspascasarjana, and u. a. banjarmasin, “sharia law analysis of binary option,” syariah j. huk. dan pemikir., vol. 22, no. 2, pp. 141–149, dec. 2022, accessed: dec. 21, 2022. [online]. available: https://jurnal.uin-antasari.ac.id/index.php/syariah/article/view/6454. [3] r. chaysiri and c. ngauv, “prediction of closing stock prices using the artificial neural network in the market for alternative investment (mai) of the stock exchange of thailand (set),” in integrated uncertainty in knowledge modelling and decision making, thammasat university, 2020, pp. 335–345, doi: 10.1007/978-3-030-62509-2_28. [4] a. r. admati, “a skeptical view of financialized corporate governance,” j. econ. perspect., vol. 31, no. 3, pp. 131–150, aug. 2017, doi: 10.1257/jep.31.3.131. [5] h. grove and m. clouse, “financial and non-financial fraud risk assessment,” j. forensic investig. account., vol. 12, no. 3, p. 2020, 2020. [online]. available at: http://web.nacva.com.s3.amazonaws.com/jfia/issues/jfia-2020-no3-3.pdf. [6] d. maulud and a. m. abdulazeez, “a review on linear regression comprehensive in machine learning,” j. appl. sci. technol. trends, vol. 1, no. 4, pp. 140–147, 2020, doi: 10.38094/jastt1457. [7] a. sharma, d. bhuriya, and u. singh, “survey of stock market prediction using machine learning approach,” in 2017 international conference of electronics, communication and aerospace technology (iceca), apr. 2017, pp. 506–509, doi: 10.1109/iceca.2017.8212715. [8] b. m. henrique, v. a. sobreiro, and h. kimura, “stock price prediction using support vector regression on daily and up to the minute prices,” j. financ. data sci., vol. 4, no. 3, pp. 183–201, sep. 2018, doi: 10.1016/j.jfds.2018.04.003. [9] ö. ican and t. b. çelik, “stock market prediction performance of neural networks: a literature review,” int. j. econ. financ., vol. 9, no. 11, p. 100, oct. 2017, doi: 10.5539/ijef.v9n11p100. https://doi.org/10.1093/0198296940.001.0001 https://jurnal.uin-antasari.ac.id/index.php/syariah/article/view/6454 https://doi.org/10.1007/978-3-030-62509-2_28 https://doi.org/10.1257/jep.31.3.131 http://web.nacva.com.s3.amazonaws.com/jfia/issues/jfia-2020-no3-3.pdf https://doi.org/10.38094/jastt1457 https://doi.org/10.1109/iceca.2017.8212715 https://doi.org/10.1016/j.jfds.2018.04.003 https://doi.org/10.5539/ijef.v9n11p100 issn 2614-0047 bulletin of social informatics theory and application 13 vol. 7, no. 1, march 2023, pp. 8-13 kurniawan et.al (comparing neural network with linear regression for stock market prediction) [10] m. f. masouleh and a. bagheri, “forecasting stock exchange data using group method of data handling neural network approach,” knowl. eng. data sci., vol. 4, no. 1, p. 1, aug. 2021, doi: 10.17977/um018v4i12021p1-13. [11] y.-g. song, y.-l. zhou, and r.-j. han, “neural networks for stock price prediction,” arxiv prepr. arxiv1805.11317, pp. 1-13, 2018. [online]. available at: https://arxiv.org/abs/1805.11317. [12] s. sohangir, d. wang, a. pomeranets, and t. m. khoshgoftaar, “big data: deep learning for financial sentiment analysis,” j. big data, vol. 5, no. 1, p. 3, dec. 2018, doi: 10.1186/s40537-017-0111-6. [13] a. azhari, a. susanto, a. pranolo, and y. mao, “neural network classification of brainwave alpha signals in cognitive activities,” knowl. eng. data sci., vol. 2, no. 2, p. 47, 2019, doi: 10.17977/um018v2i22019p47-57. [14] e. vocaturo and p. veltri, “on the use of networks in biomedicine,” procedia comput. sci., vol. 110, pp. 498–503, jan. 2017, doi: 10.1016/j.procs.2017.06.132. [15] a. pyataeva and a. dzyuba, “artificial neural network technology for lips reading,” e3s web conf., vol. 333, p. 01009, dec. 2021, doi: 10.1051/e3sconf/202133301009. [16] a. p. wibawa, w. lestari, a. b. p. utama, i. t. saputra, and z. n. izdihar, “multilayer perceptron untuk prediksi sessions pada sebuah website journal elektronik,” indones. j. data sci., vol. 1, no. 3, dec. 2020, doi: 10.33096/ijodas.v1i3.15. [17] c. renggli, l. rimanic, n. m. gürel, b. karlaš, w. wu, and c. zhang, “a data quality-driven view of mlops,” arxiv prepr. arxiv2102.07750, pp. 1-12, 2021. [online]. available at: https://arxiv.org/abs/2102.07750. [18] j. gauthier, q. v. wu, and t. a. gooley, “cubic splines to model relationships between continuous variables and outcomes: a guide for clinicians,” bone marrow transplant., vol. 55, no. 4, pp. 675–680, apr. 2020, doi: 10.1038/s41409-019-0679-x. [19] v. stanev et al., “machine learning modeling of superconducting critical temperature,” npj comput. mater., vol. 4, no. 1, p. 29, jun. 2018, doi: 10.1038/s41524-018-0085-8. [20] j. santoso, e. i. setiawan, f. x. ferdinandus, g. gunawan, and l. hernandez, “indonesian language term extraction using multi-task neural network,” knowl. eng. data sci., vol. 5, no. 2, p. 160, dec. 2022, doi: 10.17977/um018v5i22022p160-167. https://doi.org/10.17977/um018v4i12021p1-13 https://arxiv.org/abs/1805.11317 https://doi.org/10.1186/s40537-017-0111-6 https://doi.org/10.17977/um018v2i22019p47-57 https://doi.org/10.1016/j.procs.2017.06.132 https://doi.org/10.1051/e3sconf/202133301009 https://doi.org/10.33096/ijodas.v1i3.15 https://arxiv.org/abs/2102.07750 https://doi.org/10.1038/s41409-019-0679-x https://doi.org/10.1038/s41524-018-0085-8 https://doi.org/10.17977/um018v5i22022p160-167 bulletin of social informatics theory and application issn 2614-0047 vol. 3, no. 2, december 2019, pp. 75-79 75 https:doi.org/10.31763/ businta.v3i2.88 the online game addiction, psychology and interpersonal relationship of the engineering students harits ar rosyid a,1,*, della murbarani prawidya murti a,2, erna fajariani a,3, hanif adhilaga a,4, amalia a,5 a department of electrical engineering, universitas negeri malang, malang, indonesia 1 harits.ar.ft@um.ac.id*; 2 dellamurbarani4@gmail.com; 3 ernarraini@gmail.com; 4 adhilaga@gmail.com; 5 amaliakakashi@gmail.com * corresponding author 1. introduction online game is a kind of game that can accessed by multiple players through a network synchronously or asynchronously [1]. online game serves the purpose of entertainment for players, but it is potentially destructive as well. as such, can be originated from the strong (yet natural) motivation to become the best players, the pursue of collecting highly valuable items, or reaching game achievements. often, these require players to play the game as often as possible to achieve their goals. the intensity of playing the game can also make the players addicted to the game [2]. they can become unaware of their surroundings due to the lacking interaction with their family and friends. these kind of players tend to isolate themselves from their community which later trigger psychiatric problems like depression [3]. some experienced interpersonal relationship problems due to such antisocial-like behavior [4]. many online game players are provoke-able, easily cursing, or saying bad words that negatively impact their social life. but one can prevent those negative effects from occurring through wellmanaged activities, relationship awareness, and also good game-playing ethic. as these things theoretically sound, this research opts to determine the online game addiction, the psychological state, and also the interpersonal relationship of the engineering students at the universitas negeri malang. this research extends previous research that identifies the correlation between internet dependency on human’s daily life [5]. a r t i c l e i n f o a b s t r a c t article history received october 10, 2019 revised october 31, 2019 accepted november 20, 2019 the trend of playing the online game had affected many kinds of people including students. people play online games to relieve their tension or as a mood repair, given that such games provide entertainment. this research aims to determine the online game addiction of the students, their psychological state, and also their interpersonal relationships. we collected data via a questionnaire-based survey to 72 students who played an online game. from a demographic perspective, most participants were male students from the electrical engineering department. as a result, the indications of players’ addiction are the daily playing session of at least four hours and the fact that they were experienced (loyal) players. briefly, playing online games contributed to the student's psychological state, emotional level, time management, and also problem-solving ability. fortunately, these players rarely had conflicts with either their parents, friend or others. this is an open access article under the cc–by-sa license. keywords online games students addiction psychology interpersonal relationships http://creativecommons.org/licenses/by-sa/4.0/ http://creativecommons.org/licenses/by-sa/4.0/ 76 bulletin of social informatics theory and application issn 2614-0047 vol. 3, no. 2, december 2019, pp. 75-79 rosyid et.al (the online game addiction, psychology and interpersonal relationship of the engineering students) 2. method this research applied a survey method to a number of students from the faculty of engineering, universitas negeri malang. with 72 students participated, 29 of them are electrical engineering students, 19 mechanical engineering students, 13 civil engineering students, and the remaining 11 students are from the industrial technology department. male respondents were dominant in this survey by 72% of overall participants. it means only a mere 20 female students participated. this research activity was carried out within one month from 3 september 2018 to 5 october 2018. the place of this study is in the faculty of engineering, universitas negeri malang. questionnaires are believed to be one of the most effective yet efficient way of a data collection method. it is a technique that allows respondents to convey their experience via a set of questions [6]. one of the advantages of using a questionnaire is the provided standard results to quantify certain aspects of the experience under consideration [7]. in addition, the questionnaire allows online game users to express their subjective experience even though in the parameters set by the items from the questionnaire [8], such as enjoyment [9], [10]. this questionnaire aims to analyze the addiction of playing online games, psychology and interpersonal relationships. the research questionnaire consisted of 33 questions wherein three questions are relevant to gaming addiction, 15 questions related to psychology and the remaining items are about participants’ interpersonal relationships. there are four criteria used in this study, which are online games, online game addiction, psychology, and interpersonal relations. the first criteria is an online games. one can define online games as games played via the internet [11]. unlike traditional pcs or game consoles where one or two players play games on a personal computer, online games allow many players around the world to play together on game servers over the internet [12]. there are massive participating players at the same time, the online game's framework enables real-time communication via text-based or voice-based chat [13]. majority players play online games to refresh or eliminating boredom both from daily activities (work, study, and other factors) and to fill up free time [14]. next, the second criteria is online game addiction. addiction to play online games is an example of computer game addiction indicated by excessive gaming routines [15]. one particular question is about the daily gaming duration in which affect their gaming experience. the indication is a frequent gaming for at least six months that potentially ruin their social and emotional life of the player[16]. nowadays, one can find a cheap or even free internet connection to facilitate such the desire to play online games. a case study revealed the development of a bad mood or feeling uneasy when such online gaming addiction is not satisfied[17]. online game players can spend most of their time just playing games while ignoring other important activities such as having meals, rehydrate or studying. their dedication to achieving some multiplayer recognition sparks concern from colleagues. teenagers are users suffering from this type of internet addiction. teenage students spend at least two hours playing the online game. the third criteria is psychology. online game addiction is a millenials’ psychosocial problem, including students [18]. children who have quality friendships have a low risk of game addiction, while children who have social anxiety and loneliness fall to the high-risk game addiction [19]. also, feeling boredom to school activities in one of the internal motivators for students that drive themselves to play online games. as such is the anticipation of repairing a depression. in this study, there are psychological statements and terms often used by the players of online games such as "i become frustrated when not playing games". there is a degree of correlation between frustration and online game addiction [20]. and the last criteria is an interpersonal relationship. interpersonal relationships happen when each other communicate or conveying messages, as well as forming relationships. it is constructed in various ways, one of which is online games. most online games provide ways of communication between players [4]. however, the use of online games proved to be negatively correlated with interpersonal relationships [3], especially to non-gaming colleagues [21]. a player may have a good relationship with his/her in-game competitor or friends. on the contrary, players tend to have difficulty getting along with their family or school friends because they spent most of their time gaming rather than socializing. in this study, the statement used to measure the effect of online games on interpersonal relationships includes "i have had a fight with family or friends because i played online games", "i have neglected family or friends because i played too many online games". game addicts issn 2614-0047 bulletin of social informatics theory and application 77 vol. 3, no. 2, december 2019, pp. 75-79 rosyid et.al (the online game addiction, psychology and interpersonal relationship of the engineering students) are seldom to have physical or direct communication because they are getting used to interact in cyberspace. they prefer to recognize themselves in the virtual world. thus, it makes them isolated from friends and family [22]. 3. results and discussion the result of the study is an analysis of the relationship between the indicators understudied. such as the period of participants had known online games, the time spent playing online games, and where online gaming access influences the level of addiction. on average, male students had known games for more than one year compared to female students. the reason for female students playing online games is mostly to get rid of boredom. so, the intensity of the play is less than male students. the gaming location also influences the length of gaming time. a comfortable, less-restricted, open access to wifi and the atmosphere of the environment can influence the choice of gaming place such as a boarding house or at home. meanwhile, the campus becomes the alternatives place for gaming due to more academic activities. they are hence restricting their gaming time. the duration of playing online games is divided into three categories of gaming routines, which are two hours, four hours and more than four hours. players who access online games less or equal than two hours are familiar with online games for more than one year. players utilize these routines to fill spare time and refreshing. in addition, female or male students who recognize games between one or six months do not prioritize games as their needs. in this category, players’ interpersonal relationships are mostly fine, rarely experiencing conflicts with others and they can communicate well. likewise, psychological health is good, because playing online games can reduce frustration levels, provide pleasure and maintain logical thinking. the second category is players who access online games for four hours are nearly have the same characteristics as the previous category. however, there is a little occurrence of conflict between people. fortunately, these players can manage their social life, can control their anger, and more manageable of their gaming time. the last category is players who access online games for more than 4 hours. these players are similar to those of the categories above. but the longer the intensity of playing online games has worsened the interpersonal relationships and psychology of players. they often experience conflicts with parents, friends and other people. they experience difficulties in managing game time. likewise, in psychological health, that is easily agitated, bad anger management, and anti-social behavior. table 1 shows the corresponding indicators of interpersonal relationships. the indicators measure the percentage of relationships with parents, friends, and others. overall, responses reveal that gaming routines have little influence on interpersonal relationships. in the psychological analysis of playing online games, there are psychological health, time management, and other indicators. table 2 shows the resulting responses. time management and psychology are the highest psychological effects caused by online games on psychological health by 55 and 54 percent, respectively. some examples of these psychological problems are stress, anger, boredom, and anxiety. in terms of time management in question, users often procrastinate work, lack of sleep and lacking attention to their health. while for other indicators such as uncontrolled expenditure due to online games and problem-solving habits, the percentage is 49%. table.1 interpersonal relationships indicator percentage information relations with parents 46% rarely has a conflict relations with friend 51% has been a conflict relation with everybody 41% rarely has a conflict 78 bulletin of social informatics theory and application issn 2614-0047 vol. 3, no. 2, december 2019, pp. 75-79 rosyid et.al (the online game addiction, psychology and interpersonal relationship of the engineering students) table.2 psychology indicator percentage information psychology 54% often time management 55% often ,etc. 49% rarely in conclusion, online games have an ample degree of influence on the interpersonal and psychological relationships of the students in the engineering faculty of universitas negeri malang. the addiction to playing online games is strongly influenced by several factors, such as the duration of recognizing the online games, the intensity of the gaming session and the place to access online games. 4. conclusion the results of the research conducted on 72 engineering students of universitas negeri malang provide an overview of student addiction to online games, psychology, and interpersonal relationships. male students dominated the participants of this study. in this study, there is a relationship between the availability of online gaming facilities and boredom experienced by students. when boredom arose, just slightly more than half of the respondents tend to play online games. these engineering students experience a stronger gaming addiction when they are at home or their boarding house because of the comfort and flexibility provided. most of them play online games to fill their free time, as a mood repair or just to refresh their minds. the addiction of online games is strongly influenced by the interrelationship between several factors: the period of getting to know online games, the intensity of access, and location and facilities to access online games. psychologically, online game addicts have caused bad time management such as procrastination and inconsistent sleep. moreover, they often experiencing psychological instability such as stress, irritability, boredom, anxiety that detriment even more to the health of student’s psychology. fortunately, these engineering students rarely have issues in their interpersonal relations. references [1] j. s. lemmens and s. j. hendriks, “addictive online games: examining the relationship between game genres and internet gaming disorder,” cyberpsychology, behav. soc. netw., vol. 19, no. 4, pp. 270–276, 2016. [2] e. j. jeong and d. h. kim, “social activities, self-efficacy, game attitudes, and game addiction,” cyberpsychol. behav. soc. netw., vol. 14, no. 4, pp. 213–221, 2011. [3] j. h. kwon, c. s. chung, and j. lee, “the effects of escape from self and interpersonal relationship on the pathological use of internet games,” community ment. health j., vol. 47, no. 1, pp. 113–121, 2011. [4] m. a. liebert, s. lo, d. ph, c. wang, and w. fang, “physical interpersonal relationships and social anxiety,” cyberpsychology behav., vol. 8, no. 1, pp. 15–20, 2005. [5] a. kumazaki et al., “the effects of lnternet use psychological health , lnternet dependency , relationships lnterpersonal,” pp. 17–27. [6] a. i. nordin, a. denisova, and p. cairns, “too many questionnaires: measuring player experience whilst playing digital games,” proc. seventh york dr. symp. comput. sci. electron., no. october 2014, pp. 69– 75, 2014. [7] p. cairns and a. l. cox, “research methods for human computer interaction,” p. 264, 2008. [8] a. adams and a. l. cox, “questionnaires, in-depth interviews and focus groups,” cairns, paul cox, anna l. eds. res. methods hum. comput. interact. cambridge, uk cambridge univ. press, pp. 17–34, 2008. [9] h. a. rosyid, m. palmerlee, and k. chen, “deploying learning materials to game content for serious education game development: a case study,” entertain. comput., vol. 26, no. 1, pp. 1–9, 2018. [10] h. a. rosyid, “adaptive serious educational games using machine learning,” university of manchester, 2018. issn 2614-0047 bulletin of social informatics theory and application 79 vol. 3, no. 2, december 2019, pp. 75-79 rosyid et.al (the online game addiction, psychology and interpersonal relationship of the engineering students) [11] r. hilton, “gaming as an education tool,” young consumers, vol. 7, no. 2. pp. 14–19, 2006. [12] j. wu and d. liu, “the effects of trust and enjoyment on intention to play online games,” j. electron. commer. res., vol. 8, no. 2, pp. 128–140, 2007. [13] k. s. young, “understanding online gaming addiction and treatment issues for adolescents,” the american journal of family therapy, vol. 37, no. 5. pp. 355–372, 2009. [14] s. bigdeli and d. kaufman, “digital games in health professions education: advantages, disadvantages, and game engagement factors,” med. j. islam. repub. iran, vol. 31, p. 117, 2017. [15] c. t. wittek et al., “prevalence and predictors of video game addiction: a study based on a national representative sample of gamers,” int. j. ment. health addict., vol. 14, no. 5, pp. 672–686, 2016. [16] j. s. lemmens, p. m. valkenburg, and j. peter, “development and validation of a game addiction scale for adolescents,” media psychol., vol. 12, no. 1, pp. 77–95, 2009. [17] r. s. bimbingan and d. konseling, “ketergantungan online game dan penanganannya,” j. psikol. pendidik. konseling, vol. 1, no. 1, pp. 84–92, 2015. [18] e. pappa, f. s. apergi, r. ventouratou, m. janikian, and i. n. beratis, “online gaming behavior and psychosocial well-being in greek adolescents,” eur. j. soc. behav. sci., vol. 15, no. 1, pp. 1988–1998, 2016. [19] a. j. van rooij, t. m. schoenmakers, a. a. vermulst, r. j. van den eijnden, and d. van de mheen, “online video game addiction: identification of addicted adolescent gamers,” addict. abingdon engl., vol. 106, no. 1, pp. 205–212, 2011. [20] a. m. weinstein, “computer and video game addiction—a comparison between game users and non-game users,” am. j. drug alcohol abuse, vol. 36, no. 5, pp. 268–276, 2010. [21] r. punamäki, m. wallenius, h. hölttö, c. nygård, and a. rimpelä, “the associations between information and communication technology (ict) and peer and parent relations in early adolescence,” int. j. behav. dev., vol. 33, no. 6, pp. 556–564, 2009. [22] t. greitemeyer and d. o. mügge, “video games do affect social outcomes: a meta-analytic review of the effects of violent and prosocial video game play,” personal. soc. psychol. bull., vol. 40, no. 5, pp. 578– 589, 2014. bulletin of social informatics theory and application issn 2614-0047 vol. 5, no. 2, september 2021, pp. 107-114 107 https:doi.org/10.31763/businta.v5i2.490 housewife perception of gadget functions: economy creative opportunity in woman empowerment, theory of economic sociology perspective irwan gani a,1,*, suharnanik b,2 a universitas mulawarman, samarinda, indonesia b universitas wijaya kusuma surabaya, surabaya, indonesia 1 irwan.gani@feb.unmul.ac.id*; 2 nanik_fisip@uwks.ac.id * corresponding author 1. introduction women perceptions are regulated in islamic family law [1], while gadgets also have a new influence on women. obedience of women in carrying out family law as islam regulates makes women have a different response from men. if previously religion as a regulator in his life, while the information obtained on the internet can also influence it. even with gadgets women can read the qur'an, refer to islamic law. modernity in gadgets forms special specifications that apply according to the menu and function. gadgets are items that cannot be ignored by their existence in behavioral life. according to morris, age and gadget are inseparable so that it affects every behavior [2]. women also follow this development, although not as extreme as the majority of men as gadget holders [3]. previous research revealed in various activities such as digital games give multi perspective in social and cultural life of the community, especially for teenagers. as the result, negative discourses emerge as new destructive cultures such as addiction, negative emotional effects on players, and decreasing motivation [4]–[6]. hence for women who interesting to be entrepreneurship, they will face higher risk than men. business such as in early human civilization then now is a male-dominated arena with ceiling effect happened to woman which availability few role models and lack confidence in some business skills. furthermore, to be successful, women need to make a fabulous track record which can be accepted as achievements equally with men [7]. a r t i c l e i n f o a b s t r a c t article history received july 20, 2021 revised august 10, 2021 accepted august 30, 2021 women as housewives can provide various responses to the existence of gadgets or better known as gadgets. with her limitations as a woman who focuses on household functions, she is still able to respond to some advances in gadget functions. the longer the function of the gadget, the more sophisticated it causes changes in behavior that are different from before, sometimes even confusing in determining good attitudes and behavior according to them. the value of multiple and not absolute behavior due to changes in the function of gadgets causes housewives to reject the latest gadgets because they harm the behavior and values they believe in. this research was conducted on several housewives. data was collected using a qualitative approach, through interviews and direct observation of housewives. the data were analyzed using a descriptive study of modern socio-economic theory to see how housewives respond to the development of gadgets. the results showed that housewives had excessive concerns about the progress of gadgets, so they tended to reject these advances. more relented to have the latest gadgets, and do not know how to use gadgets in order to take opportunities in empowering the creative economy. this study uses an economic sociology study, to be able to provide a more comprehensive analysis in looking at the phenomenon of housewives in urban areas. this is an open access article under the cc–by-sa license. keywords woman and gadget modernity economy creative http://creativecommons.org/licenses/by-sa/4.0/ http://creativecommons.org/licenses/by-sa/4.0/ 108 bulletin of social informatics theory and application issn 2614-0047 vol. 5, no. 2, september 2021, pp. 107-114 gani & suharnanik (housewife perception of gadget functions) women as workers use technology and information in the platform of mobile phones and the internet. in sirait, the modern family still maintains strict cultural customs to maintain its social solidarity and its status and role. women use to utilize mobile phones and the internet for communication tools with friends and distant families. mobile and internet provide benefits in sociocultural changes, each of which influence by factors of age, gender, education, type of work and length of work [8], [9]. thus, digitalizing give modernity life is not the easy way to be influencing individual behavior in its social system. moderate muslim families can strictly maintain their traditional behavior, meanwhile women consider more to adopt gadgets as purpose for information needs to build communication as well as efforts to maintain social solidarity in order to stay connected with family. mobile does not only have the function to call and send messages. in some highclass mobile phones (smartphones) it even has a function as a computer. the mobile phone is very helpful for the smooth running of human activities. however, only a few of the people who use mobile phones are sensitive to the symptoms of damage to the cellphone, so most people are not aware and ignorant of the symptoms of the damage until the cellphone dies. gadget or cellular mobile phone better known by the name of a cell phone is now almost a primary need after clothing, food, and shelter. most of the population in this country use cellphones as a communication tool, even the numbers beat the spread of home phone use. cellphones are one of the wireless communication devices, which use radio waves as their medium. the advantage of utilizing this radio wave when compared to the use of cable is its ability to be used mobile, it can be used anywhere as long as there is a signal. also, the use of mobile phones does not require complicated installation such as the installation of a landline using a cable. several studies that have been conducted in several countries, such as those at the university of arizona, state that cellphones are often thought to cause brain tumors because they are believed to be able to deliver electromagnetic waves, although honestly until now there has been no definitive evidence. but based on the latest research, it is said that cellphones that we use every day have radiation which is quite deadly in the long run if we are not careful in using it. the influence of radio radiation emitted from cell phones has the most immediate effect on health, especially in the reproductive system [10], [11]. the state also facilitates the availability of information technology for its citizens, although it is not as expected [12]. we are faced with a new reality where our dependence on internet access to fulfill basic civil tasks is threatened by the increasing vulnerability of personal and social cyber. this dichotomy of dependency and vulnerability requires a new framework for understanding the legal and human rights status of this evolving technological reality. many theories have tried to explain how internet access can achieve human rights status. these include the dependence on freedom of expression offered by the international convention on civil and political rights and the universal declaration of human rights. a newer approach shows that customary international law can apply, or that internet access can achieve additional human rights status. despite repeated demands by international institutions to overcome the challenges of modern cyberspace through the lens of human rights, these various legal approaches fail to garner a consensus view in the international community. this article reviews the benefits of each of these arguments and underpins the debate in the eyes of the reality of dependency and vulnerability [13]. we compare some approaches that influence human communication to understand what interpersonal communication means into a form of social action. specifically, we discuss the largescale social normativity advocated by speech act theory, the view of communication as a small-scale social interaction appropriate from gricean's approach, and the intimate relationship between communication and cooperation maintained by tomasello. we then argue in favor of a small-scale view of communication that can take into account the normative effects of communicative actions; for this purpose, we introduce the concept of interpersonal normativity and analyze its relationship with communicative intentions [14]. reactions to the new media range from utopian statements about their potential for democratization to fear of social deviation. this media is to see the motivation used by someone in social media and how users describe their feelings about the list of friends of their audience or how users describe themselves as members of the audience [15]. issn 2614-0047 bulletin of social informatics theory and application 109 vol. 5, no. 2, september 2021, pp. 107-114 gani & suharnanik (housewife perception of gadget functions) 2. literature review 2.1. sociology modern in the development of gadgets, for example, samsung every month always produces new gadgets with various features it offers. everyone knows samsung as a company producing the latest technology gadgets which are the originator of the popularity of cellphones with the android operating system. without getting tired, he also creates innovations from his products. in just a few months this famous cellphone vendor can launch something that always attracts the attention of its consumers. researchers observe the birth of this technological tool will be able to be a very interesting material in seeing how modernity occurs and states in a tangible form that we are still living in a modern era and have not yet moved to postmodern. this description of modern society has been discussed in several classical sociological theories such as marx, weber, durkheim, and simmel. the four discussed the problem of the emergence and influence of modernity. although there are many advantages and benefits offered in modernity, there are many problems faced by modern life. the economic theory of socialism is based on the idea that by relying solely on all its tools, capitalism is economically inefficient, socially disputes and unable to develop itself in the long run [16]. marx was analyzing that modernity was determined by capitalist economics. he acknowledged the progress made by the transition from the previous society to the society of capitalism. men master patriarchal cultural norms in terms of inheritance distribution, even special treatment using the latest gadgets in men is preferred over women. in holma et al, smartphones are increasing [17]. although the correlation is not strong enough in identifying how far the decision of the family gives these privileges. the assumption that men are in the public sector is the main reason women end up giving in not using the latest gadgets. modernity has not prepared women in the household to take a more productive role as actors. weber's argumentation about modernity is the most decisive problem of modern life in the development of formal rationality by prioritizing other types of rationality and resulting in the emergence of the iron cage of rationality. humans are increasingly imprisoned in this iron cage and as a result, are increasingly unable to express some of their most basic human right. women with the domestic sector are not ready to collaborate with gadgets without balanced abilities and skills. the technological sophistication provided by gadgets transforms women as positive consumers of capitalist development. with low awareness of women, housewives tend to fall victim to some jewelry, fashion and beauty products. all the settings made to market products are no realized, so it becomes easier to manipulate and commodify. good and unkind women, polite and disrespectful, and the appropriateness of being a woman are determined through online media which the capital owners control. durkheim saw that modernity was determined by organic solidarity and the weakening of collective consciousness. collective awareness results in greater freedom and higher productivity, but there is a unique set of problems. people will feel its existence is not meaningful to modern life in other words experiencing anomic suffering. simmel's thinking is more detailed in seeing modernity by seeing it as two interconnected sides of the city and the money economy. cities are places where modernity is centered or intensified, while the money economy causes the spread of modernity and its expansion. following the flow of modernity through the use of gadgets does not use the basic principles of rational thinking. women select gadget type not only as fashionable looks and up to date features, but function based for supporting productive activities also. this can be proven from some women claiming to use gadgets without knowing the function as a whole, only went along with friends or neighbors that others have so they also have it. so women use gadgets based only on others using them, even though they don't really need it. the feeling of organic awareness because everyone uses gadgets, allows women to adopt it without first considering it. the weakening of collective awareness, with the fading of several behaviors together talking to each other, interacting with each other and behavior that does not bother others becomes a balance for gadget users. in the past, if there were problems with transportation problems, you could borrow family or neighbors, but with gadgets, you could use on-line transportation. 2.2. gadget modernity and its consequences giddens defines modernity from four basic institutional angles, first is capitalism which is characterized by commodity production, private ownership of capital, labor without property and the class system. second is industrialism which involves the use of natural resources and machinery to 110 bulletin of social informatics theory and application issn 2614-0047 vol. 5, no. 2, september 2021, pp. 107-114 gani & suharnanik (housewife perception of gadget functions) produce goods. industrialism is not limited to the workplace and industrialism affects a range of other environments such as transportation, communication, and even domestic life. third, the ability to supervise, "the ability to supervise refers to the supervision of the activities of individual citizens. fourth, is military power or control over the means of violence, including the industrialization of war equipment. gadgets are a result of industrialism using humans as laborers in working on the manufacturing process in the field of technology and information. these workers are paid by their master, the samsung company owner, who can manage when the product is released on the market by adding new features that are considered as innovations even though by the experts these features have long been found along with previous features. this is the power of the owner of capital in controlling the market to get as much profit as possible. besides, gidden’s also sees that modernity provides three essential aspects in giddens' structuration theory, namely: first is detention, which is a separation between space and time. second, is the release or revocation is the revocation of social relations from the local contexts of interaction and rearrangement across an unlimited span of time-space. third, reflexivity is a fundamental feature of structuration theory about human existence, but it takes on a special meaning in modernity, namely "social practices are constantly examined and renewed within the framework of new information coming in about very practical matters, thus constitutionally change their character. the sophistication of the gadget as a communication tool has brushed away the boundaries between space and time, where there is no longer a limit for anyone to carry out social interaction anytime, anywhere and with anyone. the world is like being folded to the point of being destroyed between space and time. as a practical tool that can change the character of the owner where individuals will have very different characters based on the type of gadget they have. someone who only has gadgets that can only phone and send sms will be very different when compared to other people who have gadgets that function not only for sms and telephone but can browse, social network s like fb, what apps, line, bbm, email, camera, and others. the more complete the features of the gadget, the individual will be and depends on the device. with these gadgets, everything can be done such as studying, watching tv or movies (video), sending news to friends or chatting with everyone in the world, writing articles and sending them wherever and wherever the place, camera photos, singing and others, this is which is called the world in your hand. the market is a constantly moving machine, which only requires a legal framework without government intervention to produce growth without obstacles. gadgets are markets created by capitalism in the struggle for modernity, so who can stop them? because the panzer has been opened wide and shot without control. therefore, we need an understanding of cultural capital in fending off and understanding the cultural changes that are happening. awareness of cultural changes as an effort to understand in the form of utilizing these changes. efforts to understand cultural capital in the face of digital development can be done by, first, increasing knowledge about digital technology, by media literacy, not only as passive consumers but can be productive as digital businesses. second, improving technology mastery skills, according to separate digital equipment properly and prioritize tools as needed. and the third, processing information data, using digital to master information data. in the millennial era which means that data is not information about money anymore, it is better to use data as a means of production in achieving life success, as capital in increasing the ability and readiness to continue living in the millennial era. 2.3. economy creative opportunity in theory of economic perspective an area is considered to have used creative abilities in its economy based on three indicators, namely the creative economy's gross regional domestic product (grdp), labor absorption in the creative economy sub-sector, and measurement of the value of the creative economy's exports. grdp is the overall amount of added value created in all production business units in an area, whereas the grdp creative economy is total added value derived from the economic sectors, as illustrated in fig. 1. industry, trade, food and beverage accommodation, information and communication, corporate services, government administration, education services, and other services are among the 16 economic sectors that make up the creative economy sub-sector. in this context, mahakam ulu's creative economy can be centered on these industries, which are projected to be a catalyst for the development and growth of other sectors. issn 2614-0047 bulletin of social informatics theory and application 111 vol. 5, no. 2, september 2021, pp. 107-114 gani & suharnanik (housewife perception of gadget functions) fig. 1. derivation of creative economy sub-sector based on business field according to the opus research on the 2020 creative economy, the creative economy sub-sector contributes idr 1,211 trillion to the national gdp. with the contribution of the creative economy sector to gdp, this figure places indonesia among the top three countries in the world. although the data shows that indonesia is capable of becoming a country through creating opportunities in the creative economy. then, what about women in their home space, often known as housewives? women with the competence and skills to use the gadgets to carry out activities in a creative economy should be able to take advantage of this opportunity. by utilizing the balanced scorecard approach [18], the assessment of creative economy entrepreneurs on women can be carried out with (1) financial perspective performance on creative economy entrepreneurs, (2) economic creative entrepreneur, evaluate customer perspective performance, (3) the internal business process performance of creative economy entrepreneurs, whether these women have the potential to innovate in their production processes to experience growth, and (4) the learning and growth perspective's performance on women creative economy entrepreneurs might motivate women to enhance their talents. the creative sector necessitates a multidisciplinary approach, particularly in areas such as culture, creativity, innovation, and local development. in international literature, creativity is defined as an aggregation of creative sector firms that are not evenly spread across the region but concentrated in a single location. in agglomeration economic theory, three theories emerge as the dominant theoretical perspectives. first, how to articulate the process of institutionalizing economic institutions. the goal is to use a combination of new institutional economics (nie) and new economic sociology (nes) to describe the processes involved in establishing institutional practices in the creative industries cluster. second, institutional theory states that economic organization is socially constructed. and third, provide a framework text that better depicts the socioeconomic context and more clearly discusses the dynamics of enacting, embedding, and modifying organizational features and processes in the creative industries grouping [19]. the ability of the women's community to participate in the creative economy has been demonstrated, for example, in community-based women's activities. however, the community's creative economy is fueled by a partial industrial company growth model that isn't yet integrated with policymakers and other businesses like travel agencies and mass media [20]. 3. method this study uses a descriptive qualitative research design, which is categorized as a case study on women living in urban areas, surabaya. the women who were interviewed in depth were housewives with an age range of 21 to 45 years. that range is still young enough to develop her capacity in understanding and functioning of gadgets in his economic empowerment. the type of data used in this study is qualitative data sourced from primary data, directly from the participants. participants’ selection in this study using purposive sampling technique, with certain considerations, where the sample is taken based on the characteristics of housewives and lives in urban areas. data were collected using in-depth interviews with 10 women who are housewives in urban environments. 112 bulletin of social informatics theory and application issn 2614-0047 vol. 5, no. 2, september 2021, pp. 107-114 gani & suharnanik (housewife perception of gadget functions) 4. result and discussion based on a participant who has spent her life in prudent and purity rural area convince that modern collective life is like a giant armored vehicle that is moving to a certain extent can be driven, but also threatened to go out of control to cause itself to be destroyed. this giant panzer will destroy those who oppose it and although it will take an orderly path, it can also turn at times unimaginable at any time. the journey is not entirely unpleasant or not useful, sometimes it is fun and changes as expected. but as long as these institutions of modernity continue to function, we will never be able to fully control both the direction and speed of the journey. we too will never feel safe at all because the area being explored is full of danger. this is what happens to products offered by samsung as a gadget manufacturer that is always in the name of being able to meet the needs of its consumers by increasing the ability of these gadgets to more and more for example, this time a gadget modern with specifications which is a refinement of the cellphone s4 this cellphone has upgraded many features from the camera to its super amoled capacitive touchscreen security features, 16m colors, screen size: 5.1 ", external memory can be up to 128 gb, even large internal memory 16/32 gb storage, 2 gb ram. the main camera is 16 mp, 5312 x 2988 pixels, phase detection autofocus, led flash, front camera 2mp. the latest type of android kitkat. 2.5 ghz krait 400 quad-core cpu. as if samsung is emphasizing consumers to always change their gadgets in just a few months because there will be new and new again. then who dares to stop the freedom from samsung with all its innovations? if the system does not want to stop the giant panzer from the gadget industry will continue to escape without any control. table.1 housewife perception of gadget functions no. initial name housewife perception of gadget functions 1. um yes, as a means of easy and fast communication help to work both in school and business help provide information that is not limited by space and time. negative internet: pornography (youtube), digital interactions that have an impact on social media information in society. ex: baby digital. the development of social media / internet is increasingly widespread in children. 2. tk yes, because the internet can speed up communication, information and relationships, family, business, education quickly. and the internet can make us live critically, creatively and innovatively. digital literacy that has an impact on information, skills/skills in the use of digital media. the very rapid development of social media has created a culture in society. 3. st um yes, because the internet has a bad effect, some has a good effect, because the desire to see what is good can also be bad. yes, we can find out all the information, for example, if we want to make a cake, we can see our phone. 4. end yes, but we all take the positives because with the internet it can speed up communication and information in our daily lives. using social media as a place to obtain information and communication for family and friends. 5. dn no, because we do not live in cyberspace, the value of mutual cooperation. unity value. 6. st jl yes, because to some extent using the internet, it really affects behavior, for example, children who are addicted to playing games using on-line, imitating tattoos, wearing unnatural clothes. 7. zc yes, because the internet can make it easier for us to communicate well. yes, because with social media it can make it easier to see news, and from news or other info it can affect people's lifestyles. 8. sth yes, because in an influential family i don't study and i can't control what children see, good or bad there are advantages to obtaining information quickly, saving time and enriching skills. values of gotong royong, unity, friendship, cultural and religious civilization. 9. ra with the internet, you can sell via the internet and can see the virtual world (just to know). no, because of dependence on ourselves. 10. ya because the internet has many benefits, we can do various things using the internet. no, because it depends on ourselves in doing social media. we emphasized the study using semantic approach to descript woman perceives on their gadget. the analysis based on triangulation on physical data such as types of mobile phone or gadgets and tabulation of in-depth interviews to ten participants with criteria who faced harassment from their issn 2614-0047 bulletin of social informatics theory and application 113 vol. 5, no. 2, september 2021, pp. 107-114 gani & suharnanik (housewife perception of gadget functions) spouse because they enacted to use mobile phone in daily life. table 1 illustrates how women see the use of gadgets, demonstrating that women already know a lot about how to use these technologies for communication and company development. however, it has not been encouraged in the form of abilities that can increase the gadget's actual function. based on table 1, women's perceptions of gadgets are as a means of easy and fast communication, can help to work both at school and in business, provide information that is not limited by space and time, maintain relationships, family, education quickly, think critically, creatively, and innovatively, digital literacy, skills/skills in the use of digital media, and think critically, creatively, and innovatively. gadgets contribute to bad perceptions of pornography, digital infants, cultural shifts in society, addiction to online gaming, and alterations in young people's lifestyles such as hair coloring, tattoo copying, and wearing strange clothing. getting information rapidly has advantages in terms of saving time and improving abilities. according to this statement, women place a higher importance on cultural values such as mutual cooperation, unity, lifestyle, the collapse of friendly ties, and cultural and religious civilisation when it comes to the function of devices. despite the fact that the perception of creative economic empowerment is still low, some people believe that gadgets can be utilized to sell on the internet and foster creativity. through social media, we may see the virtual world. because of this low perception, it is critical to promote the institutionalization of women's groups that empower women through the creative economy. 5. conclusion gadgets, as a form of modernity, need human quality along with these advancements. this thing that created man to help ease his duties. the higher quality and expensive gadget require knowledge and skills for the owner. in addition, the gadget is also a determinant of social and economic status for those who have it. because the high cost is only able to be bought by people with the high economic class, high economy class women prefer menus and gadget features that are bigger ram and quality of ingredients and appearance. the findings in this study are in the class of women who work as housewives with their religious beliefs, first, they are more concerned about the progress of gadgets, so they tend to reject these advances. secondly, not concerned with new functions and features so that they refuse to own the latest gadgets. third, do not know how to use it to be more useful and more productive. this research illustrates that women have high concerns about modernity, specialization and the speed of social change that occurs with capitalist economic control. with limited skills and education making him choose to reject the novelty, the changes offered by the gadget are considered as a threat that damages the system that is believed so far. some accept gadgets but are not willing to use the latest features and menus listed in the gadget, more use for consumption, selfexhibition and social media communication functions. while what makes women housewives do not know how they use more detailed and productive functions is because women are more closed to these changes and are not facilitated by means and infrastructure. in these conditions, women still need assistance in improving the development of skills to have the ability in the creative economy. in terms of cultural culture, housewives who tend to refuse the technology for the development of the creative economy should change their perspective on gadgets that are more sensitive to their respective cultural conditions. also, government should ensure that the technology is safe to access, and that the content does not conflict with cultural customs. in the economic view, the state must be present in providing policy umbrellas in increasing women's abilities in the creative economy. these policies can be in the form of institutionalizing women's communities in the creative economy, cultural synergy and indonesian women's culture. references [1] a. rokhmad and s. susilo, “conceptualizing authority of the legalization of indonesian women’s rights in islamic family law,” j. indones. islam, vol. 11, no. 2, p. 489, dec. 2017, doi: 10.15642/jiis.2017.11.2.489-508. [2] j. a. morris, women in computing. elsevier, 2013. 114 bulletin of social informatics theory and application issn 2614-0047 vol. 5, no. 2, september 2021, pp. 107-114 gani & suharnanik (housewife perception of gadget functions) [3] j. wajcman, “feminist theories of technology,” cambridge j. econ., vol. 34, no. 1, pp. 143–152, jan. 2010, doi: 10.1093/cje/ben057. [4] c. goh, c. jones, and a. copello, “a further test of the impact of online gaming on psychological wellbeing and the role of play motivations and problematic use,” psychiatr. q., vol. 90, no. 4, pp. 747– 760, dec. 2019, doi: 10.1007/s11126-019-09656-x. [5] l. mclean and m. d. griffiths, “female gamers’ experience of online harassment and social support in online gaming: a qualitative study,” int. j. ment. health addict., vol. 17, no. 4, pp. 970–994, aug. 2019, doi: 10.1007/s11469-018-9962-0. [6] g. caselli, c. marino, and m. m. spada, “modelling online gaming metacognitions: the role of time spent gaming in predicting problematic internet use,” j. ration. cogn. ther., vol. 39, no. 2, pp. 172– 182, jun. 2021, doi: 10.1007/s10942-020-00365-0. [7] r. d. hisrich, “the woman entrepreneur: a comparative analysis,” leadersh. organ. dev. j., vol. 7, no. 2, pp. 8–16, feb. 1986, doi: 10.1108/eb053593. [8] s. iqbal and i. a. qureshi, “m-learning adoption: a perspective from a developing country,” int. rev. res. open distrib. learn., vol. 13, no. 3, may 2012, doi: 10.19173/irrodl.v13i3.1152. [9] j. gubbi, r. buyya, s. marusic, and m. palaniswami, “internet of things (iot): a vision, architectural elements, and future directions,” futur. gener. comput. syst., vol. 29, no. 7, pp. 1645–1660, 2013. [10] e. hacker, c. horsham, d. vagenas, l. jones, j. lowe, and m. janda, “a mobile technology intervention with ultraviolet radiation dosimeters and smartphone apps for skin cancer prevention in young adults: randomized controlled trial,” jmir mhealth uhealth, vol. 6, no. 11, p. e199, nov. 2018, doi: 10.2196/mhealth.9854. [11] g. yu et al., “long-term exposure to 4g smartphone radiofrequency electromagnetic radiation diminished male reproductive potential by directly disrupting spock3–mmp2-btb axis in the testes of adult rats,” sci. total environ., vol. 698, p. 133860, jan. 2020, doi: 10.1016/j.scitotenv.2019.133860. [12] h. twinomurinzi, j. phahlamohlaka, and e. byrne, “the small group subtlety of using ict for participatory governance: a south african experience,” gov. inf. q., vol. 29, no. 2, pp. 203–211, apr. 2012, doi: 10.1016/j.giq.2011.09.010. [13] r. shandler and d. canetti, “a reality of vulnerability and dependence: internet access as a human right,” isr. law rev., vol. 52, no. 1, pp. 77–98, mar. 2019, doi: 10.1017/s0021223718000262. [14] a. carassa and m. colombetti, “interpersonal communication as social action,” philos. soc. sci., vol. 45, no. 4–5, pp. 407–423, jul. 2015, doi: 10.1177/0048393115580265. [15] r. n. spicer, “social net/work(ing) on facebook,” in virtual community participation and motivation, igi global, 2012, pp. 315–329. [16] a. arato, “social theory, civil society, and the transformation of authoritarian socialism,” in crisis and reform in eastern europe, routledge, 2020, pp. 1–26. [17] h. holma, a. toskala, and p. tapia, hspa+ evolution to release 12: performance and optimization. john wiley & sons, 2014. [18] g. f. frederico, j. a. garza-reyes, a. kumar, and v. kumar, “performance measurement for supply chains in the industry 4.0 era: a balanced scorecard approach,” int. j. product. perform. manag., vol. 70, no. 4, pp. 789–807, may 2020, doi: 10.1108/ijppm-08-2019-0400. [19] p. ismalina, “what factors constitute structures of clustering creative industries? incorporating new institutional economics and new economic sociology into a conceptual framework,” gadjah mada int. j. bus., vol. 14, no. 3, p. 213, nov. 2012, doi: 10.22146/gamaijb.5454. [20] m. c. b. manteiro and e. kabu, “model of creative economic development for micro, small and mediumsized culinary industries in kupang city indonesia,” int. j. soc. sci. humanit., vol. 3, no. 1, pp. 143–152, apr. 2019, doi: 10.29332/ijssh.v3n1.275. bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 2, december 2022, pp. 102-110 102 https:doi.org/10.31763/businta.v6i2.553 social network analysis of the development of the halal industry in indonesia muhamad subhi apriantoro a,1,*, adelia eka nuraini a,2, hudaifah b,3 a faculty of islamic religion, universitas muhammadiyah surakarta, sukoharjo, 57169, indonesia b faculty of computing & mathematics industrial, king fahd university of petroleum & minerals, 3126, kingdom saudi arabia 1 msa617@ums.ac.id ; 2 i000190007@student.ums.ac.id; 3 g201806140@kfupm.edu.sa * corresponding author 1. introduction halal industry refers to processing goods and services using methods and tools that comply with sharia [1]. currently, halal products and enterprises are a religious problem in the muslim community and a way of life [2]. indonesia, which has a larger muslim population than other nations, has not developed its halal business effectively [3]. the indonesian market is quite promising. the halal industry is currently a global trend. in this scenario, it is evident that the potential for the halal business increases from year to year [4]. the existence of the halal industry cannot be separated from the existence of a structured movement through social media [5]. conversations about the halal industry influence public opinion in determining lifestyle decisions with the halal industry or others [6]. the development of information technology is the development of a system that is very concerned with the ease of internet access and speed because there are now numerous digital sources circulating on the internet [7]. it can track aspects of daily life that are inextricably linked to digital technology. with the following terms, social media has become necessary for the public, dramatically altering the social landscape and how participation is understood. the application of accurate and proportionate information technology to software (platforms) and software (operating systems) continues to offer numerous benefits to the community [8]. all scientific disciplines anticipate the effectiveness and efficiency of an information system's performance due to its practical advantages. in addition, the recent rapid development of digital issues has strengthened the public's understanding of its role. the data is then used for various channels of participation that are classified as reading the public opinion that develops within a society. a r t i c l e i n f o a b s t r a c t article history received october 16, 2022 revised november 18, 2022 accepted november 30,2022 this study looks at the public sentiment of twitter users regarding the halal industry. data was taken using drone emprit academic, an extensive data method that captures and analyzes conversations on social media, especially on twitter, developed by media kernels indonesia, which is also installed on the information system agency of the islamic university of indonesia. the research method uses a social network analysis approach to analyze data on social media conversations. the data was obtained after observing for 30 days from trending twitter topics. the data is processed by the social network analysis (sna) system, which can be interpreted as describing the interactions and relationships that always occur between one individual and another in an organization or work environment and the company. we found that the halal industry in indonesia is growing more rapidly with the existence of social networks. a large number of conversations among twitter users in indonesia shows this. this is an open access article under the cc–by-sa license. keywords social networking twitter social media machine learning sentiment analysis https://doi.org/10.31763/businta.v6i2.55 mailto:msa617@ums.ac.id http://creativecommons.org/licenses/by-sa/4.0/ http://creativecommons.org/licenses/by-sa/4.0/ issn 2614-0047 bulletin of social informatics theory and application 103 vol. 6, no. 2, december 2022, pp. 102-110 apriantoro et.al (social network analysis of the development of the halal industry in indonesia) consequently, a tool is required to detect in detail the analysis conducted by netizens in software application conversations [9]. in this study, we will present the functions of the drone emprit academic (dea) application developed by the islamic university of indonesia in light of current trends among internet users. this study will describe the usage of keywords in the halal industry in indonesia, which has become a topic of conversation among netizens on social media, particularly on twitter. drone emprit provides vast data to discover actual social. according to the study, drone emprit academic is an extensive data system that records and analyzes social media, particularly twitter chats [10]. using the streaming technology, drone emprit already uses a twitter-integrated api (applications programming interface) service to capture talks in near-real time. twitter displays trending percentages, retweets, and graphs, with retweet status and conversations taking precedence [11], [12]. the data as a reference can only be read/viewed for the many types and social phenomena that occur. this study has limited the capability of the drone emprit academic application to scan public debates on social media using the phrases halal industry [13]. in this dea application, researchers will perform a study using a social network analysis method frequently employed by academics and researchers, including professors, teachers, researchers, and students [14]. examining the network patterns in which organizations, ideas, and people interact in various ways, sna has various network features that give relationships that aid in the development of information management [15]. 2. method in this study, descriptive qualitative methodology is employed [16]. a case study is the qualitative research method employed in this study. in this context, a case study is a qualitative research method purposely designed to generate and discover novel processes or behaviors as a research object that is not well recognized [17]–[19]. the drone emprit academic application has been the subject of research in reading citizen conversations in social media with the twitter application for the last 30 (thirty) days, beginning on 3 (three) august and ending on 1 (one) september. in contrast, the data analyzed in this study were collected from 3 (three) august to september 1. the research presented here takes the form of citizen conversations around the halal industry in indonesia. social network analysis (sna) from the drone emprit academic (dea) of the islamic university of indonesia was utilized to collect data on their talks using data collection techniques [20]. the tracking process of conversations by netizens goes through several stages: one, it can analyze the entire cluster of netizen conversations that are adjusted to the keywords halal industry. second, conversations with netizens are very determined in the period. third, we quickly analyze keywords through social network analysis (sna) and then describe them based on influencers, buzzers, and followers. fourth, we can select conversations based on the number of retweets, mentions, user accounts, and hashtags used. fifth, it can determine the percentage of the bot (robot) accounts in the conversation. sixth, identify the most shared sites. finally, determine which regions the netizens who participated in the conversation came from [21]. the algorithm of the data flow can be seen in fig. 1. fig. 1. algorithm of the data flow 104 bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 2, december 2022, pp. 102-110 apriantoro et.al (social network analysis of the development of the halal industry in indonesia) 3. results and discussion drone emprit academic discovered 5,585 active twitter social media users discussing the halal industry. we discussed the halal industry on twitter between august 3 and september 1, 2022. the data comes exclusively from social media platforms, not news websites. this finding indicates that internet users are highly enthusiastic about the topic. the following discussion will outline the specific analysis of the various chats. 3.1. mention analysis twitter users continue to engage in heated discussions about the halal industry in august 2022. with 787 tweets on august 17, 2022, the topic of the halal industry reached its highest point in august. there was no conversation from august 18-22. the conversation about the halal industry resumed on august 23 and peaked on august 25, 2022, with 451 tweets. after two days, the conversation topic began declining on the 27th, when only 127 tweets were posted about it. this halal industry discussion will experience daily ups and downs until september 1, 2022. fig. 2 shows the trends of total mentions by media type. fig. 2. trends of total mentions by media types fig. 3 shows that drone emprit academic discovers daily twitter activity about the halal industry. from monday to wednesday, the halal industry is frequently discussed and has increased in frequency on wednesday. monday, as many as 584 twitter users discuss this subject. as a result, as many as 1,656 twitter users discussed this subject at its highest point on wednesday. from thursday to saturday, the number of twitter users discussing this topic decreased from 810 to 477. finally, as many as 837 twitter users discussed this topic on sunday. fig. 3. mentions by day we compile an analysis of twitter users' hourly halal industry-related conversation mentions. similar to midnight or midnight, 113 twitter users were discussing this topic. however, only 48 twitter users talked about the halal industry at three o'clock, but by nine o'clock, that number had risen to 483. in addition, the conversation is declining, possibly because everyone is engaged in activities such as work, school, or college during working hours. fig. 4 shows mentions by the hour. 584 738 1,656 810 483 477 837 0 200 400 600 800 1000 1200 1400 1600 1800 issn 2614-0047 bulletin of social informatics theory and application 105 vol. 6, no. 2, december 2022, pp. 102-110 apriantoro et.al (social network analysis of the development of the halal industry in indonesia) fig. 4. mention by hour we analyze engagement types. fig. 5 shows twitter users' total mentions, replies, and retweets. as a result, from august 3 to september 1, 2022, the number of tagged or tagged someone's account in conversations or comments on halal industry topics reached 973 accounts (17.42%). responses given to other people's tweets reached 746 accounts (13.36%), and (retweets) reposted a tweet of up to 3,866 accounts (69.22%). the total number of mentions, replies, and retweets on the halal industry on twitter is 5,585 active twitter accounts. at the same time, the level of interaction on this topic is 4.74. fig. 5. total daily rt, reply, and mentions the exposure captured by the emprit academic drone application analyzes twitter followers and posts from followers on topics discussing the halal industry. starting from twitter followers 0-3 posted (tweets) of 296 (5.30%), twitter followers from 4-25 posted (tweets) 450 (8.06%), twitter followers from 26-50 posted (tweets) 297 (5.32%), twitter followers 51-100 tweets 410 (7.34%), from 101-500 twitter followers his posts (tweets) 1,672 or (29.94%), twitter followers from 5011000 his posted (tweets hence, the sum of all of the postings (tweets) made by all of the followers is 5,585, which is equal to 100%. fig. 6 shows the total exposure. fig. 6. shows the total exposure 113 55 61 48 53 111 210 319 379 483 453 388 276 312 292 283 277 358 251 212 179 156 161 153 0 100 200 300 400 500 600 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 0 200 400 600 800 8. aug 15. aug 22. aug 29. aug mention reply rt 0 500 1000 1500 2000 0-3 4_25 26-50 51-100 101-500 501-1000 1001-10k 10k-100k 100k-500k 500k-1m 1m-up number of followers 106 bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 2, december 2022, pp. 102-110 apriantoro et.al (social network analysis of the development of the halal industry in indonesia) 3.2. sentiment analysis we analyzed sentiment from august 3 to september 1, 2022, resulting in harmful, positive, and neutral comments. many netizens participated in mentioning the topic of the halal industry. there were also unfavorable remarks or answers from netizens, with as many as 1,895 or 34% of mentions. most netizen responses were positive, with 3,460 or 62% of mentions. meanwhile, those who responded neutrally were 230 or (4%) mentions. in total, 5,585 netizens participated in the halal industry topic. fig. 7 to fig. 8 shows the total mentions and share of voice by sentiment. fig. 7. total mentions by sentiments fig. 8. share of voice by sentiment as shown below, we analyze sentiment by day and comments that lead to pros and cons. on monday, there were 584 mentions. blue commented positively on 301 netizens, and in red, 267 negative comments. next was tuesday, where netizens commented more positively, as many as 503, negative 154, and neutral 81. the highest peak of netizens commenting on wednesday was 1,656 mentions, 695 positive comments, 863 negative, and only 98 neutral. from thursday onwards, positive comments are always the most on the following day, like thursday, and there are 677 positive and negative comments, only 118: friday positive 322 and negative 152. on saturday, there were 400 positive, 74 negative comments. on sunday, 562 commented positive and 267 negative comments. fig. 9 shows sentiment by day. fig. 9. sentiment by day in the middle of the night, at 00:00 or 12 pm, netizens gave 80 positive comments and only 28 negatives. at 04:00, positive comments dropped to 33 and negative ones only 17 comments. at the peak of commenting at 09:00, there were 239 negative comments, 231 positive and neutral comments, 1895 3460 230 0 500 1000 1500 2000 2500 3000 3500 4000 negative positive netral 301 503 695 677 322 400 562 267 154 863 118 152 74 26781 98 15 0 200 400 600 800 1000 1200 1400 1600 1800 monday tuesday wednesday thursday friday saturday sunday positve negative neutral 34% 62% 4% issn 2614-0047 bulletin of social informatics theory and application 107 vol. 6, no. 2, december 2022, pp. 102-110 apriantoro et.al (social network analysis of the development of the halal industry in indonesia) and 13 comments. in addition, netizens' comments have experienced ups and downs, and many still comment positively about the halal industry because in indonesia, the majority of muslims, so many muslim netizens know halal and haram for them. fig. 10 shows sentiment by the hour. fig. 10. sentiment by hour 3.3. influential source in table 1, we analyzed the most shared sites on the topic of the halal industry. here are the top five sites; first, the site shopee shared 39 times with the i.p. number 143.92.85.2 with similarweb traffic. second, the site bisanews.id share up to 7 times with the i.p. number 153.92.10.148 with similarweb traffic. third, republika.co.id site shares six times the i.p. number 18.138.109.77 with similarweb traffic. fourth, the site tribunnews.com six times with the i.p. number 13.33.88.94 similarweb traffic. fifth, the site keuangannews.id share up to 4 times with the i.p. number 192.124.249.183 simillarweb traffic. table.1 most shared sites no sites number of shares i.p. traffic 1 shopee 39 143.92.85.2 similarweb 2 bisanews.id 7 153.92.10.148 similarweb 3 www.republika.co.id 6 18.138.109.77 similarweb 4 www.tribunnews.com 6 13.33.88.94 similarweb 5 keuangannews.id 4 192.124.249.183 similarweb the first hashtag, "bangkitbersamaet" has 722 tweets, and the second hashtag, "shopeeid" has 157 tweets. the third down green, "gaspolkinerjapositifbsi" with 103 tweets, and the bottom fourth, "racuninskincare" with 77 tweets. the fifth bottom color is "collagendrink" 77 tweets, from top to bottom until the smallest box. table 4.8 shows a positive comment from one twitter user on the hashtag "bangkitbersamaet". fig. 11 shows the top hashtags in the halal industry. fig. 11. top hashtags 80 29 38 31 33 56 109 158185 231247214210244221200186 249 76 135118105108 97 28 22 20 15 17 51 94 156 185 239196 155 56 58 51 75 76 98 65 57 47 44 40 50 4 4 7 5 9 13 10 19 12 10 20 8 15 11 10 20 14 7 13 6 0 100 200 300 400 500 600 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 positive negative neutral 108 bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 2, december 2022, pp. 102-110 apriantoro et.al (social network analysis of the development of the halal industry in indonesia) twitter accounts greatly influence the halal industry conversation on food and tourism accounts. fig. 12 shows the top influencers, including @yozariam, @h_bakkaniy, @malaysianfoods, @pmbrutiketmurah, and @mnw_mnw_mn. in other words, the account is lighter to attract the participation of netizens to provide comments with the theme of the halal industry, which has various discussions ranging from muslim clothing to halal food. fig. 12. top influencers in the conversation, it is known that the bot account shows 998 authors (73.60%) with a bot score of 0-1. that is why in the conversation that discusses the halal industry, it is natural that it is sourced from netizens, not because of robot accounts. table 2 shows the results of the bot analysis. table.2 bot score bot score authors authors (%) posts posts (%) retweeted mentions replies 0 1 998 73.60 % 1,178 72.94 % 895 169 114 1 2 218 16.08 % 254 15.73 % 196 35 23 2 3 83 6.12 % 104 6.44 % 74 21 9 3 4 40 2.95 % 44 2.72 % 28 10 6 4 5 17 1.25 % 35 2.17 % 5 25 5 3.4. demography analysis of the 4,166 active accounts, it was found that millennials aged 19-29 were very highly engaged in this halal industry-themed conversation or 50.51%, 49.94% of posts were tweeted, 644 tweets were called 94 times and reposted (replies) 77 times. while 31.38% of 18-year-olds use twitter and are involved in this theme, there are 505 posts tweeted, 399 tweets mentioned 57 times and reposted (replies), and as many as 49. the identified authors were 1,380 or 33.13%. table 3 shows demographics by age. table.3 demography by age age group authors authors (%) posts posts (%) retweeted mentions replies 18 433 31.38 % 505 30.94 % 399 57 49 19-29 697 50.51% 815 49.94 % 644 94 77 30-39 116 8.41 % 140 8.58 % 95 28 17 40 134 9.41 % 172 10.54 % 77 78 17 we found the types of users in this halal industry topic twitter application. there 90.29% of authors with non-org user types, while 9.71% with organizational user types. table 4 shows demographics by user type. table.4 demography of user type user type authors authors (%) posts posts (%) retweeted mentions replies non-org 1.246 90.29% 1.380 84.56% 1.120 120 140 is-org 134 9.71% 252 15.44% 95 137 20 issn 2614-0047 bulletin of social informatics theory and application 109 vol. 6, no. 2, december 2022, pp. 102-110 apriantoro et.al (social network analysis of the development of the halal industry in indonesia) table 5 shows that 63.26% of men and 36.74% of women were in this halal industry topic conversation, with men posting 65.44% and women 34.56%. it resulted in 766 tweet retweets, 184 mentions, and 118 reposts for the male gender. meanwhile, women retweeted 449 tweets, referred to them 73 times, and reposted 42 times. table.5 demography br gender gender authors authors (%) posts posts (%) retweeted mentions replies male 873 63.26% 1,068 65.44% 766 184 118 female 507 36.74%% 564 34.56% 449 73 42 based on this demographic data, it is known that the generation aged 19-29 with non-affiliated status in organizations and the male gender is the largest producer of tweets about the halal industry in indonesia. 4. conclusion a total of 5,585 twitter social users discussed the topic of the halal industry. the peak of the discussion was on august 17, 2022. before that date, the conversation on this topic experienced daily ups and downs. wednesday's mentions were the highest at 1,656 twitter users. one day there are 24 hours, while at 09.00, the topic is discussed by as many as 483 twitter. the top hashtag is found on the #bangkitsemangatet account, which has 722 tweets. the top influencer on twitter accounts, the most influential related to halal industry conversations, is @yozariam 729 engagements. in the sentiment analysis, netizens responded positively rather than negatively, with 3,460 positive mentions from 5,585. analysis of emotions, anger, and trust are dominant on this topic. the netizens' location in this topic's distribution in indonesia is relatively even, not in eastern indonesia. this conversation is less desirable. millennials aged 19-29 are interested in the halal industry, while older people are only slightly interested. sna (social network analysis) looks at @yozariam accounts and @h_bakkaniy many negative cluster influences, while @malaysianfoods and @pmbrytiketmurah have positive clusters. this study has the limitation of only using twitter as the primary data for analysis. in the subsequent study, researchers can use data sources from other social media covering not only one country. references [1] n. ahmad and s. m. shariff, “supply chain management: sertu cleansing for halal logisitics integrity,” in procedia economics and finance, jan. 2016, vol. 37, pp. 418–425, doi: 10.1016/s22125671(16)30146-0. [2] a. n. millatina, f. hakimi, r. a. budiantoro, and m. r. arifandi, “the impact of halal label in halal food buying decisions,” j. islam. econ. laws, vol. 5, no. 1, pp. 159–176, mar. 2022, doi: 10.23917/jisel.v5i1.17139. [3] h. m. h. habibie and d. r. donna, “factors that influence the intention to purchase halal food products (case study of universitas gadjah mada students),” benefit j. manaj. dan bisnis, vol. 5 no 1, pp. 83–95, jul. 2020. [online]. available at: https://journals.ums.ac.id/index.php/benefit/article/ . [4] r. siregar and a. alam, “halal label on food products by mui (indonesian ulama council) and students purchasing decision of faculty of business and economic universitas muhammadiyah surakarta,” j. islam. econ. laws, vol. 1, no. 1, pp. 1–30, jul. 2018, doi: 10.23917/jisel.v1i1.6163. [5] s. b. istiyanto, m. b. priyantono, m. a. f. rifai, k. wahyuningsih, d. fansyiari, and l. g. o. ramdhani, “social media learning on indonesian university students,” bull. soc. informatics theory appl., vol. 5, no. 1 se-articles, pp. 58–62, oct. 2021.[online]. available at: https://pubs.ascee.org/index.php/businta/article/view/433. https://doi.org/10.1016/s2212-5671(16)30146-0 https://doi.org/10.1016/s2212-5671(16)30146-0 https://doi.org/10.23917/jisel.v5i1.17139 https://journals.ums.ac.id/index.php/benefit/article/view/10653 https://doi.org/10.23917/jisel.v1i1.6163 https://pubs.ascee.org/index.php/businta/article/view/433 110 bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 2, december 2022, pp. 102-110 apriantoro et.al (social network analysis of the development of the halal industry in indonesia) [6] m. a. arrazy, m. t. a. ndaru, n. m. sari, m. d. ariyanti, and a. ghosh, “the impact of social media use on suicide-related behavior,” bull. soc. informatics theory appl., vol. 5, no. 1 se-articles, pp. 7– 13, oct. 2021. [online]. available at: https://pubs.ascee.org/index.php/businta/article/view/398. [7] m. irfan, z. chen, t. s. adebayo, and m. a. s. al-faryan, “socio-economic and technological drivers of sustainability and resources management: demonstrating the role of information and communications technology and financial development using advanced wavelet coherence approach,” resour. policy, vol. 79, p. 103038, dec. 2022, doi: 10.1016/j.resourpol.2022.103038. [8] n. j. kholit and m. nastain, “mapping of data communication networks on social media,” inject (interdisciplinary j. commun., vol. 5, no. 2, pp. 143–162, jan. 2021, doi: 10.18326/inject.v5i2.143162. [9] m. collonnaz et al., “social network analysis to study health behaviours in adolescents: a systematic review of methods,” soc. sci. med., vol. 315, p. 115519, dec. 2022, doi: 10.1016/j.socscimed.2022.115519. [10] h. gusfa and f. e. d. kadjuand, “political agonism for indonesian cyberpolitic: critical cyberculture to political campaign of 2019 indonesian presidential election in twitter,” nyimak j. commun., vol. 4, no. 2, p. 211, sep. 2020, doi: 10.31000/nyimak.v4i2.2685. [11] z. gilani, r. farahbakhsh, g. tyson, and j. crowcroft, “a large-scale behavioural analysis of bots and humans on twitter,” acm trans. web, vol. 13, no. 1, pp. 1–23, feb. 2019, doi: 10.1145/3298789. [12] k. anam, l. m kolopaking, and r. a kinseng, “the effectiveness of social media usage within social movement to reject the reclamation of the jakarta bay, indonesia,” sodality j. sosiol. pedesaan, vol. 8, no. 1, pp. 64–81, apr. 2020, doi: 10.22500/8202028955. [13] s. h. sahir, r. s. ayu ramadhana, m. f. romadhon marpaung, s. r. munthe, and r. watrianthos, “online learning sentiment analysis during the covid-19 indonesia pandemic using twitter data,” iop conf. ser. mater. sci. eng., vol. 1156, no. 1, p. 012011, jun. 2021, doi: 10.1088/1757899x/1156/1/012011. [14] a. r. rahmanti, d. n. a. ningrum, l. lazuardi, h.-c. yang, and y.-c. li, “social media data analytics for outbreak risk communication: public attention on the ‘new normal’ during the covid-19 pandemic in indonesia,” comput. methods programs biomed., vol. 205, p. 106083, jun. 2021, doi: 10.1016/j.cmpb.2021.106083. [15] m. a. laagu and a. setyo arifin, “analysis the issue of increasing national health insurance (bpjs kesehatan) rates through community perspectives on social media: a case study of drone emprit,” in 2020 international conference on smart technology and applications (icosta), feb. 2020, pp. 1– 7, doi: 10.1109/icosta48221.2020.1570615599. [16] v. a. handini and a. dunan, “buzzer as the driving force for buzz marketing on twitter in the 2019 indonesian presidential election,” int. j. sci. technol. manag., vol. 2, no. 2, pp. 479–491, feb. 2021, doi: 10.46729/ijstm.v2i2.172. [17] r. s. juairiah and h. ubaya, “visualization of twitter geo-location for equalization analysis of smart cities in indonesia,” in 2020 international conference on informatics, multimedia, cyber and information system (icimcis), nov. 2020, pp. 278–283, doi: 10.1109/icimcis51567.2020.9354293. [18] y. hanafi et al., “the new identity of indonesian islamic boarding schools in the ‘new normal’: the education leadership response to covid-19,” heliyon, vol. 7, no. 3, p. e06549, mar. 2021, doi: 10.1016/j.heliyon.2021.e06549. [19] l. hakim, “covid-19 and the moment to evaluate tourism euphoria, indonesia,” j. indones. tour. dev. stud., vol. 8, no. 2, pp. 119–123, apr. 2020, doi: 10.21776/ub.jitode.2020.008.02.09. [20] i. fahmi, “drone emprit academic: software for social media monitoring and analytics,” drone emprit acad., 2018. [21] i. fahmi, “drone emprit: konsep dan teknologi,” it camp big data data mining, jakarta, 2017. https://pubs.ascee.org/index.php/businta/article/view/398 https://doi.org/10.1016/j.resourpol.2022.103038 https://doi.org/10.18326/inject.v5i2.143-162 https://doi.org/10.18326/inject.v5i2.143-162 https://doi.org/10.1016/j.socscimed.2022.115519 https://doi.org/10.31000/nyimak.v4i2.2685 https://doi.org/10.1145/3298789 https://doi.org/10.22500/8202028955 https://doi.org/10.1088/1757-899x/1156/1/012011 https://doi.org/10.1088/1757-899x/1156/1/012011 https://doi.org/10.1016/j.cmpb.2021.106083 https://doi.org/10.1109/icosta48221.2020.1570615599 https://doi.org/10.46729/ijstm.v2i2.172 https://doi.org/10.1109/icimcis51567.2020.9354293 https://doi.org/10.1016/j.heliyon.2021.e06549 https://doi.org/10.21776/ub.jitode.2020.008.02.09 bulletin of social informatics theory and application issn 2614-0047 vol. 7, no. 1, march 2023, pp. 24-31 24 https:doi.org/10.31763/businta.v7i1.606 uncovering negative sentiments: a study of indonesian twitter users' health opinions on coffee consumption laksono budiarto a,1,*, nissa mawada rokhman a,2, wako uriu b,3 a universitas negeri malang, jl. semarang no. 5 malang 65145, jawa timur, indonesia b chikushi jogakuen university,2-chōme-12-1 ishizaka, dazaifu, fukuoka 818-0118, japan 1 laksono.budiarto@um.ac.id; 2 nissa.mawarda@um.ac.id; 3 ue2017119@chikushi-u.ac.jp * corresponding author 1. introduction in previous research, it has been found that coffee consumption is generally safe at normal intake levels, based on a summary indicating low to no increased health risk for consumption of three to four cups per day, and may even be more beneficial than harmful to health. importantly, outside of pregnancy, available evidence suggests that coffee can be tested as an intervention without significant risk of harm [1]. caffeine, trigonelline, chlorogenic acid, amino acids, carbohydrates, lipids, organic acids, minerals, and volatile aroma compounds are just a few numbers of many chemical components contained in coffee that have both positive and negative impacts on the health of coffee drinkers [2], [3]. recent research on coffee consumption and consumer purchasing patterns may help us better understand food choices and lifestyles. it is also possible to further improve and establish consumption recommendations and food purchasing behavior by integrating knowledge of food nutrient quality [4]. evidence shows that consuming coffee may reduce the risk of noncommunicable diseases (ncds) [1]. understanding modifiable risk factors through unhealthy dietary patterns could help the world health organization (who) achieve its goal of reducing the relative risk of premature deaths from ncds by 25% by025 [5]. although there have been numerous studies on the general impact of coffee on health, there is still limited discussions on public opinion regarding to the effects of coffee on health. opinions on the health effects of coffee vary widely among coffee drinkers, depending on their physical health and knowledge of the beverage itself. the same cup of coffee can have different opinions on each individual, not only in terms of taste but also its effects on their body, which sometimes contradicts the facts. according to liu [6], there are two main types of textual information: facts and opinions. a r t i c l e i n f o a b s t r a c t article history received january 24, 2023 revised february 6, 2023 accepted february 26, 2023 the increase in coffee consumption among the public is due to several reasons, including health and lifestyle. awareness of coffee consumption’s positive and negative effects has also increased. this research is a sentiment analysis that aims to investigate twitter users’ opinions about the impact of coffee consumption on their health. the method involves data collection using the rapidminer application, which utilizes the twitter application programming interface (api) function connected to a prepared twitter account. the obtained data underwent data cleaning, saved as an excel file type, training and testing, and model evaluation. then, the data were classified into negative, neutral, and positive opinions. the results showed that less than 10% of opinions were positive, 19% were neutral, and 73% were negative. the opinions obtained are useful information for stakeholders in the coffee industry. they can also be used to determine better steps in educating the public about coffee. this is an open access article under the cc–by-sa license. keywords sentiment analysis twitter coffee effect negative opinion rapidminer https://doi.org/10.31763/businta.v7i1.606 mailto:laksono.budiarto@um.ac.id http://creativecommons.org/licenses/by-sa/4.0/ http://creativecommons.org/licenses/by-sa/4.0/ issn 2614-0047 bulletin of social informatics theory and application 25 vol. 7, no. 1, march 2023, pp. 24-31 budiarto et.al (uncovering negative sentiments: a study of indonesian twitter users' health opinions on coffee) current processing techniques (such as search engines) work with facts (assuming the information is true), which can be expressed through topic keywords. however, search engines are not used to search for opinions because opinions are difficult to express with just a few keywords [7]. to mine opinions, it is more appropriate to use a dataset consisting of messages collected from twitter, which contains a large number of short messages created by users of this microblogging platform [8]. twitter is a well-known social media platform with 18.45 million users as of january 2022 [9]. twitter is a popular social media platform widely used to express opinions and thoughts in short messages [10]. the limited character count on twitter makes it an ideal platform for opinion mining. by analyzing tweets and opinions about coffee, it is possible to determine the sentiment or polarity of these opinions, whether they are positive, negative, or neutral. this information is valuable for understanding how users perceive and feel about coffee. by conducting sentiment analysis, a more accurate picture can be obtained regarding public opinion about coffee, particularly its impact on health. if the results show a higher negative score, education about coffee should be improved by emphasizing more research facts about the effects of coffee on the body. this research was conducted on twitter posts, both recent and popular posts. the data was collected in october 2022, on indonesian-language posts. 2. method sentiment analysis, sometimes called opinion mining, is a method or process that classifies text resulting in natural language processing (nlp) [11]. this is a common method of defining and grouping opinions about goods, services, or concepts, involving data mining applications, artificial intelligence (ai), and machine learning (ml) to mine text with a sentiment or subjective meaning. opinion analysis is one type of study used in social media because its content can become a trending topic and significantly impact social life [12]. text mining is one of the main subfields of data mining. its goal is to uncover previously undiscovered but potentially useful information from semi-structured or unstructured text data [13]. the mining process uses the rapidminer application, one of the most popular, comprehensive and adaptable data mining tools that can be accessed, with over 400 data mining modules or operators. rapidminer is an open-source data mining tool that was one of the top three data mining tools overall in 2007 and 2008, according to a survey conducted by the well-known data mining website kdnuggets.com among several hundred data mining specialists. data loading, preprocessing, visualization, interactive mining process design and review, automatic modeling, automatic parameter and process optimization, automatic feature creation and feature selection, evaluation, and implementation are all supported by rapidminer. rapidminer is a powerful platform for mining and analyzing data [14], [15]. with the rapidminer application, the analysis results will be processed through several modeling methods, one of which is the naïve bayes method [16]. the bayes’ theorem forms the basis of the naive bayes classification. classification is a set of algorithms for classification. naive bayes classification is based on the idea that the features being classified are all independent of each other [17], [18]. as shown in fig. 1, the steps of the process can be explained as follows, according to the rapidminer studio manual book [19]. fig. 1. the stages of the sentiment analysis process 26 bulletin of social informatics theory and application issn 2614-0047 vol. 4, no. 2, july 2018, pp. 24-31 budiarto et.al (uncovering negative sentiments: a study of indonesian twitter users' health opinions on coffee) 2.1. data collection with api twitter • testing the prepared query on the twitter search section. the obtained results can at least provide a definite picture of the relevance of the resulting message posts to the research objective. • selecting twitter as the connection type to input the twitter api access code in the token input field. • coming into the twitter search operator, which is located under the data access, application, and twitter option. • select the connection type created in the connection entry option, and enter the prepared query in the query entry field. 2.2. data cleaning • the cleaning process involves using the select attributes operator under the blending, attributes, and selection options. select “single” for the attributes file type option and “text” for the attributes option. • enter the “remove duplicates” operator, which is located in the cleansing, duplicates option. select “single” in the attributes file type options, and “text” in the attributes option. 2.3. save as excell • the mining result data is saved in an excel format file using the write excel operator located in the data access, files, write option. • specify the filename to save the results by filling in the filename in the excel file input field. 2.4. train and test • adding a label column to the excel file to enter negative, neutral, and positive inputs. • rapidminer handles this process by using the xvalidation operator. this operator automatically divides the data into various subsets needed for cross-validation. several sample experiments can be found, including experiments that use xvalidation for performance measurement, which are available under the sample, repository option. 2.5. model and evaluate • by default, automodel uses multi-hold-out-set validation instead of cross-validation to validate the model. • rapidminer creates the resulting process after running automodel to see how the model’s performance is estimated. the data obtained through mining consists of the date, time, sender, message content, and other determined attributes. the reading process is done by utilizing the application programming interface (api) service provided by twitter. connection entry is done by entering the given api token and then entering the “search twitter” operator with the query input “minum kopi” sakit and “minum kopi” aman, result type “recent or popular”. a total of 328 data were obtained. the author did not use the query “minum kopi” sehat as an antonym of sakit because even though the results obtained were more (357 data), the negative value was higher than the positive value. it is because the word “sehat” (healthy) is more often associated with “tidak sehat” (unhealthy) or “kurang sehat” (rather sick). the process is shown in fig. 2. it starts with searching data based on the query entered in the search twitter operator, followed by combining data using the union operator. the next step is to select the attribute to be processed in the text column containing user tweets. the following step is to remove duplicate data that may occur because users only retweet. the resulting data is then saved in excel format for further processing. issn 2614-0047 bulletin of social informatics theory and application 27 vol. 7, no. 1, march 2023, pp. 24-31 budiarto et.al (uncovering negative sentiments: a study of indonesian twitter users' health opinions on coffee) fig. 2. data mining process in rapidminer to obtain a data comparison, this study also conducted an online survey. two options were provided in this survey system, a) drinking coffee makes you sick, and b) drinking coffee is healthy. the survey will be distributed by sharing a tweet link. this survey was conducted for seven days, in accordance with twitter’s rules [20]. the polling was conducted by creating a tweet containing a message introducing the purpose and objective of the survey. then, the poll feature was selected, options for the survey were filled in, and the maximum duration of the survey, which could last up to 7 days, was determined. the process can be seen in fig. 3. fig. 3. the process of creating a poll on a twitter’s tweet 3. results and discussion in table 1, there is an opinionated statement that drinking coffee has a negative impact on health. the text part of the sentence explicitly states that the cause of illness is drinking coffee. table.1 data classification of negative opinions id text label 1585067228881641472 jangan minum kopi pagi2 sakit perut wkwk negative 1584980056065339392 yaolo yaolo niat minum kopi biar ga ngantuk eh malah sakit perut wkwk negative 1584976005495943168 ih asik banget kakak bisa minum kopi. aku sekalinya nyeruput kafein langsung sakit perut masa, kak. ?? negative 28 bulletin of social informatics theory and application issn 2614-0047 vol. 4, no. 2, july 2018, pp. 24-31 budiarto et.al (uncovering negative sentiments: a study of indonesian twitter users' health opinions on coffee) meanwhile, table 2 shows that the sentences are categorized as neutral statements and are mostly dominated by questions. table.2 data classification of neutral opinions id text label 1583559221081440256 kalo bsk pagi gue minum kopi pait kr2 aman gak yaa,, neutral 1583459347073445890 maybe lebih aman makanan yaa. ga usah mahal mahal gapapa ko. soalnya blm tentu bisa minum kopi. neutral 1583345106140397569 iyaa, kadang malah minum kopi dari biji salak. kalo itu masih aman. neutral in table 3, there are affirmations that drinking coffee is safe and categorized as positive statements. table.3 data classification of positive opinions id text label 1584774800689405953 gue pasti sama dia sama-sama minum kopi terus? aman sejauh ini! lagi dan selalu berusaha diimbangi dengan makan terus. positive 1584724633646817280 pagiku aman kalau udah sarapan plus minum kopi. positive 1584462034921754624 yg pasti perut udh diisi dulu sm makanan si ceu biar lambung aman. abis itu mangga klo mau ngopi. biar gak insomnia jangan minum kopi diatas jam 6 sore si kyknya positive in table 4, show the results of several modeling. table.4 the results of several modeling model classificati on error standard deviation gai ns total time training time (1,000 rows) scoring time (1,000 rows) naive bayes 0.4 0.0 0. 0 999.0 149.4 4297.7 generalized linear model 0.4 0.1 0. 0 4199.0 6957.3 6694.7 fast large margin 0.4 0.1 6. 0 2464.0 122.0 6251.9 decision tree 0.4 0.0 0. 0 1125.0 149.4 3404.6 random forest 0.4 0.0 2. 0 3661.0 280.5 3587.8 gradient boosted trees 0.3 0.0 14 .0 377175. 0 3192.1 2511.5 support vector machine 0.3 0.0 2. 0 1945.0 332.3 3709.9 the naïve bayes sentiment analysis result can be seen in fig. 4, where the positive opinion is minimal, below 10%, while the neutral opinion is 19%, and the negative opinion is 73%. the words “tiap, makin, and mood” are part of the support for the negative opinion. meanwhile, contradicting negative opinion is obtained from the words “dada, asli, beli, tidur”. for example, it can be seen in the sentence "anjir tiap minum kopi malem2 pasti langsung mual + sakit perut??" from id "1583154503926575105"., “kalo stress minum kopi aja kali yah..biar makin sakit!!!” from id ”1583567191580246016", become part of supports negative opinion, while those that become part of contradicts negative opinion, in the sentence "hari-hari minum kopi malah mules, biasanya degdegan, dada sakit, sekarang mules wkaakakaka" from id "1582013788210876416", "udah tau ga bisa minum kopi pake ngide segala beli kopi, akhirnya sakit kan perutnya:(“ from id “1582321855889043463”. issn 2614-0047 bulletin of social informatics theory and application 29 vol. 7, no. 1, march 2023, pp. 24-31 budiarto et.al (uncovering negative sentiments: a study of indonesian twitter users' health opinions on coffee) fig. 4. diagram and factors of negative opinion the naïve bayes performance as seen in fig. 5 fig. 5. naïve bayes – performance as a comparison, an online survey was conducted in this study. as seen in fig. 6, the result of choosing drinking coffee as healthy obtained a value of 67.7%, much larger than the choice of drinking coffee causing illness at 32.3%. the survey participants amounted to 167 respondents, starting from december 13, 2022, until december 20, 2022. fig. 6. the results of the opinion poll on twitter 30 bulletin of social informatics theory and application issn 2614-0047 vol. 4, no. 2, july 2018, pp. 24-31 budiarto et.al (uncovering negative sentiments: a study of indonesian twitter users' health opinions on coffee) these different results may be influenced by the limited scope of dissemination, which tends to be obtained from the account’s circle of friends, as well as the respondents’ subjective level towards the poll creator’s profile. 4. conclusion the results obtained from this sentiment analysis provide an overview of the imbalance between coffee education, the promotion of coffee benefits, and the growing negative opinion regarding the impact of coffee on health. it may also be due to the increasing number of coffee shops that do not apply proper serving methods and the importance of coffee education by baristas to customers. these possibilities also serve as suggestions for further research development, and the results of online polls can be improved with wider dissemination. references [1] r. poole, o. j. kennedy, p. roderick, j. a. fallowfield, p. c. hayes, and j. parkes, “coffee consumption and health: umbrella review of meta-analyses of multiple health outcomes,” bmj, vol. 359, p. j5024, nov. 2017, doi: 10.1136/bmj.j5024. [2] j. v. higdon and b. frei, “coffee and health: a review of recent human research,” crit. rev. food sci. nutr., vol. 46, no. 2, pp. 101–123, mar. 2006, doi: 10.1080/10408390500400009. [3] f. bastian et al., “from plantation to cup: changes in bioactive compounds during coffee processing,” foods, vol. 10, no. 11, p. 2827, nov. 2021, doi: 10.3390/foods10112827. [4] a. samoggia and b. riedel, “consumers’ perceptions of coffee health benefits and motives for coffee consumption and purchasing,” nutrients, vol. 11, no. 3, p. 653, mar. 2019, doi: 10.3390/nu11030653. [5] who, “global action plan for the prevention and control of noncommunicable diseases 2013-2020.,” world heal. organ., p. 102, 2013, [online]. available at: https://www.who.int/publications/i/item/9789241506236. [6] m. hu and b. liu, “mining and summarizing customer reviews,” in proceedings of the tenth acm sigkdd international conference on knowledge discovery and data mining, aug. 2004, pp. 168–177, doi: 10.1145/1014052.1014073. [7] g. uddin and f. khomh, “automatic mining of opinions expressed about apis in stack overflow,” ieee trans. softw. eng., vol. 47, no. 3, pp. 522–559, mar. 2021, doi: 10.1109/tse.2019.2900245. [8] m. imran, p. mitra, and c. castillo, “twitter as a lifeline: human-annotated twitter corpora for nlp of crisis-related messages,” proc. 10th int. conf. lang. resour. eval. lr. 2016, pp. 1638–1643, may 2016, accessed: jun. 22, 2023. [online]. available: https://arxiv.org/abs/1605.05894v2. [9] a. o. p. dewi, a. isnaini, and m. f. lestari, “an analysis of the post-covid-19 information distribution on social media,” e3s web conf., vol. 359, p. 02037, oct. 2022, doi: 10.1051/e3sconf/202235902037. [10] n. öztürk and s. ayvaz, “sentiment analysis on twitter: a text mining approach to the syrian refugee crisis,” telemat. informatics, vol. 35, no. 1, pp. 136–147, apr. 2018, doi: 10.1016/j.tele.2017.10.006. [11] c. j. rameshbhai and j. paulose, “opinion mining on newspaper headlines using svm and nlp,” int. j. electr. comput. eng., vol. 9, no. 3, p. 2152, jun. 2019, doi: 10.11591/ijece.v9i3.pp2152-2163. [12] s. sendari, i. a. e. zaeni, d. c. lestari, and h. p. hariyadi, “opinion analysis for emotional classification on emoji tweets using the naïve bayes algorithm,” knowl. eng. data sci., vol. 3, no. 1, pp. 50–59, aug. 2020, doi: 10.17977/um018v3i12020p50-59. [13] z. ding, z. li, and c. fan, “building energy savings: analysis of research trends based on text mining,” autom. constr., vol. 96, pp. 398–410, dec. 2018, doi: 10.1016/j.autcon.2018.10.008. [14] m. bjaoui, h. sakly, m. said, n. kraiem, and m. s. bouhlel, “depth insight for data scientist with rapidminer « an innovative tool for ai and big data towards medical applications»,” in proceedings of the 2nd international conference on digital tools & uses congress, oct. 2020, pp. 1–6, doi: 10.1145/3423603.3424059. https://doi.org/10.1136/bmj.j5024 https://doi.org/10.1080/10408390500400009 https://doi.org/10.3390/foods10112827 https://doi.org/10.3390/nu11030653 https://www.who.int/publications/i/item/9789241506236 https://doi.org/10.1145/1014052.1014073 https://doi.org/10.1109/tse.2019.2900245 https://arxiv.org/abs/1605.05894v2 https://doi.org/10.1051/e3sconf/202235902037 https://doi.org/10.1016/j.tele.2017.10.006 https://doi.org/10.11591/ijece.v9i3.pp2152-2163 https://doi.org/10.17977/um018v3i12020p50-59 https://doi.org/10.1016/j.autcon.2018.10.008 https://doi.org/10.1145/3423603.3424059 issn 2614-0047 bulletin of social informatics theory and application 31 vol. 7, no. 1, march 2023, pp. 24-31 budiarto et.al (uncovering negative sentiments: a study of indonesian twitter users' health opinions on coffee) [15] p. ristoski, c. bizer, and h. paulheim, “mining the web of linked data with rapidminer,” j. web semant., vol. 35, pp. 142–151, dec. 2015, doi: 10.1016/j.websem.2015.06.004. [16] z. e. rasjid and r. setiawan, “performance comparison and optimization of text document classification using k-nn and naïve bayes classification techniques,” procedia comput. sci., vol. 116, pp. 107–112, jan. 2017, doi: 10.1016/j.procs.2017.10.017. [17] k. yadav and r. thareja, “comparing the performance of naive bayes and decision tree classification using r,” int. j. intell. syst. appl., vol. 11, no. 12, pp. 11–19, dec. 2019, doi: 10.5815/ijisa.2019.12.02. [18] m. singh, m. wasim bhatt, h. s. bedi, and u. mishra, “withdrawn: performance of bernoulli’s naive bayes classifier in the detection of fake news,” in materials today: proceedings, dec. 2020, p. 1, doi: 10.1016/j.matpr.2020.10.896. [19] rapidminer, rapidminer studi o manual, p.116, 2012. [online]. available at: https://docs.rapidminer.com/downloads/rapidminer-v6-user-manual.pdf. [20] twitter, “twitter polls – how to create and how to vote.”. [online]. available at: https://help.twitter.com/en/using-twitter/twitter-polls. https://doi.org/10.1016/j.websem.2015.06.004 https://doi.org/10.1016/j.procs.2017.10.017 https://doi.org/10.5815/ijisa.2019.12.02 https://doi.org/10.1016/j.matpr.2020.10.896 https://docs.rapidminer.com/downloads/rapidminer-v6-user-manual.pdf https://help.twitter.com/en/using-twitter/twitter-polls bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 2, december 2022, pp. 168-176 168 https:doi.org/10.31763/businta.v6i2.602 sequential pattern mining to support customer relationship management at beauty clinics esther irawati setiawan a,1,*, valerynta natalie a,2, joan santoso a,3, kimiya fujisawa b,4 a institut sains dan teknologi terpadu surabaya, indonesia b graduate school of bionics, computer and media sciences, tokyo university of technology, tokyo 1 esther@stts.edu; 2 valerynta.natalie@gmail.com; 3 joan@stts.edu; 4 fujisawa@stf.teu.ac.jp * corresponding author 1. introduction the customer is the leading actor in the sales transaction that will generate profit for the company. competition in the business world is getting intense. every company is competing to attract attention from the market, and customers increasingly have more choices in fulfillment of their needs. every company's challenge is making customers visit and stay loyal [1], [2]. often companies only focus on products sold and ignore services that cannot be ignored, this is very closely related to customer relationship management (crm), where a series of activities is managed to understand better, attract attention, and maintain the loyalty of customers [3], [4], this is the basis for doing this research. by utilizing sequential pattern mining, this research is expected to help company management parties take steps to meet customer satisfaction. sequential pattern mining is one of the valuable data mining techniques to find the sequential pattern of a group of items [5]. this study uses the generalized sequential pattern (gsp) algorithm to find rules of transactions that will later support crm in the company. the association mining method could be combined with the generalized sequential pattern (gsp) algorithm to identify sequences or patterns of attributes that frequently occur together, to generate recommendations for movies to watch after a previous film has ended [6]. the researchers found that the gsp algorithm effectively identified association rules and sequential a r t i c l e i n f o a b s t r a c t article history received october 30, 2022 revised november 27, 2022 accepted december 3, 2022 the increasing competition for beauty clinics makes management need to think of methods to survive in this competition. for that, the company needs to improve crm in its customer service. customer relationship management is a series of activities managed to understand better, attract attention, and maintain loyalty. sequential pattern mining is one of the data mining techniques that is useful for finding sequential patterns / sequences of a set of items. the algorithm that is used is the generalized sequential pattern (gsp). gsp performs candidate generation and supports counting processes, that are, the union of l1−k with itself, which generates a candidate sequence that cannot exist as a twin candidate after that deletion candidate who does not meet the minimum support. while carrying out the process through existing data, it is also carried out increasing the number of supports from the included candidates in data sequences. the output to be produced by the program are all frequent itemsets that satisfy minimum support in the form of rules. sales transaction data will be processed by using the generalized sequential pattern algorithm so that it can produce a rule, namely the purchase order that meets the minimum support. the result of the rule used by management to support enterprise crm activities such as acquiring new customers, increasing the profits from existing customers, and retaining existing customers. this is an open access article under the cc–by-sa license. keywords data mining generalized sequential pattern sequential pattern mining https://doi.org/10.31763/businta.v6i2.602 mailto:esther@stts.edu http://creativecommons.org/licenses/by-sa/4.0/ http://creativecommons.org/licenses/by-sa/4.0/ issn 2614-0047 bulletin of social informatics theory and application 169 vol. 6, no. 2, december 2022, pp. 169-176 setiawan et.al (sequential pattern mining to support customer relationship management at beauty clinics) pattern rules based on movie transaction data, which could be used to recommend films and increase audience interest in watching movies. the generalized sequential pattern (gsp) algorithm can identify user behavior patterns in each transaction, revealing relationships or associations between books that are requested simultaneously or sequentially [7]. through the algorithm's calculations, a total of 295 frequent sequences consisting of three sequence patterns have been identified based on a minimum support threshold of 0.53% or a minimum number of two borrowed books. in a recent study [8], researchers used a combination of qualitative textual analysis, human-based content analysis, and machine learning techniques to examine user-generated content (ugc) on social media, focusing on dove's "campaign for real beauty" as a case study. the study outlines a six-step analysis procedure that includes identifying topics through qualitative analysis, generating labeled data through human coding, preprocessing data, evaluating machine learning classifiers, classifying unlabeled data, and conducting research. the findings of this study have significant methodological implications for advertising scholars and practitioners, particularly in the beauty industry, and can be applied to similar research studies. crm could utilize association rule mining and sequential pattern mining techniques to provide recommendations to customer service [9]. crm is built based on mobile and is able to provide effective services and recommendations for customers. from this study, it was found that crm is able to maintain the quality of the company's relationship with customers through the utilization of information about the customer. a recent study has investigated the patterns of structural changes in customer segments and proposed a new approach that combines clustering and sequential rule mining techniques. to test the proposed method, the researchers applied it to customer data from a telecommunication service provider, demonstrating its effectiveness in this field. one interesting finding was the identification of a group of customers who exhibited dynamic behavior that caused structural changes, and the researchers labeled this group as "structure breakers." the insights gained from this study can be helpful for marketing managers at the telecommunication company, as they can leverage these results to refine their marketing strategies and improve their decision-making processes. this new approach could also be applied to other organizations to analyze patterns of structural changes in customer segments [10]. 2. method 2.1. related works 2.1.1. sequential pattern mining (spm) [11], [12] one of the data mining techniques can find patterns in order of a set of items that will result in output in the form of rules. according to [13], the generalized sequential pattern mining (gsp) algorithm is an algorithm that can process and find all existing sequential and non-sequential patterns. input from spm is a data sequence, a collection of data sequences. each data sequence is a list of transactions consisting of items. in general, each transaction is associated with transaction time. no data sequence has more than one transaction with the same transaction time and uses transaction time as a transaction identifier, where in this case, the quantity of an item in a transaction is not taken into account. agrawal and srikant first introduced sequential pattern mining. according to [14], gsp algorithms are generally viewed as the first traversal area algorithm that finds all sequence that frequently occurs by passing several data. the spm algorithm is divided into two main methods, which are: • a priori-based, consisting of the gsp algorithm, which is a sequential pattern mining method with a horizontal format, and the sequential pattern discovery using equivalent class (spade) algorithm by adopting a vertical format spm. • projection-based, consisting of the freespan algorithm and prefixspan, which applies a division pattern and a series of strategies for the efficiency of sequential pattern mining. 2.1.2. generalized sequential patterns (gsp) the gsp [15] algorithm works by analyzing existing data to identify sequential patterns. it involves multiple phases, each determining the support of items in the data. the support is the number 170 bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 2, december 2022, pp. 169-176 setiawan et.al (sequential pattern mining to support customer relationship management at beauty clinics) of data sequences that contain the items. the algorithm then identifies items that meet the minimum support level and are therefore considered frequent. each frequent item produces a frequent sequence, with the first consisting only of the item. in each phase, the algorithm starts with a set of potential candidates, frequent sequences from the previous phase. these candidates produce new potential frequent sequences, which must have more than one item in ordinary with the original candidate sequence. the algorithm determines the support of each candidate sequence as it progresses through the data. at the end of each phase, the algorithm identifies which candidate sequences are frequent and adds them to the list of candidates for the next phase. the process continues until no more frequent sequences can be generated or no more candidate sequences are left to analyze. candidate generation is the stage where the set of all frequent(k-1)-itemset f_(k-1) found on the pass to-(k-1) is used to generate candidate itemset ck. the join phase generates the candidate sequence by doing a join process or merging of l1−k with itself. prunes phase deletes candidate sequences that do not meet the specified minimum support. on counting candidates, while doing the process through existing data, additional amounts are also made to support the candidate included in the data sequences. the gsp algorithm can be seen in fig.1 [16]. generalized sequential pattern 𝐿1= {large 1-sequences}; for (k=2; 𝐿𝑘 ≠∅; k++) do begin 𝐶𝑘= new candidates generated from 𝐿𝑘−1 foreach customer-sequences in the database do increment the count of all candidates in c that are contained in c. 𝐿𝑘= candidates in 𝐶𝑘 with minimum support. end generate 𝑳𝒌−𝟏 candidate insert into 𝐶𝑘 select 𝑝. 𝑙𝑖𝑡𝑒𝑚𝑠𝑒𝑡1,..., 𝑝. 𝑙𝑖𝑡𝑒𝑚𝑠𝑒𝑡𝑘−1, 𝑞. 𝑙𝑖𝑡𝑒𝑚𝑠𝑒𝑡𝑘−1 from 𝐿𝑘−1 𝑝, 𝐿𝑘−1 𝑞 where 𝑝. 𝑙𝑖𝑡𝑒𝑚𝑠𝑒𝑡1 = 𝑞. 𝑙𝑖𝑡𝑒𝑚𝑠𝑒𝑡1,..., 𝑝. 𝑙𝑖𝑡𝑒𝑚𝑠𝑒𝑡𝑘−2 = 𝑞. 𝑙𝑖𝑡𝑒𝑚𝑠𝑒𝑡𝑘−2; rule generation rulegen(f, min_conf); for all frequent sequences 𝛽 𝜖 𝐹 do for all subsequences 𝛼 ← 𝛽 do conf = fr(𝛽)/fr(𝛼); if (conf ≥ min_conf) then output the rule 𝛼 ⇒ 𝛽, and conf fig. 1. gsp algorithm 2.1.3. customer relationship management (crm) [17] crm [18] is a type of management that addresses theory on handling relationships between companies with its customers with the aim of increasing the value company in the eyes of the customer. many crm studies say that not all customers have an equal contribution to the business; therefore, to maximize business profits, it is necessary to evaluate each customer's value before designing a marketing strategy. the main goal of every company for crm is to analyze customer value and to improve customer retention rate. customer retention is a process to retain old customers. to achieve the goal in this way, the company can incorporate the right constraints in sequential pattern mining over time on existing transactions. sequential buying patterns from customers help in determining customers' next buying behavior. therefore, if the constraints are selected correctly, then customer value analysis and customer retention, the two important pillars of crm, can be achieved. issn 2614-0047 bulletin of social informatics theory and application 171 vol. 6, no. 2, december 2022, pp. 169-176 setiawan et.al (sequential pattern mining to support customer relationship management at beauty clinics) sequential pattern mining is one of the data mining techniques that is useful for finding sequential patterns of a set of items. this research using the generalized sequential pattern algorithm (gsp) to find future transaction rules will support crm in the company [19], [20]. 17 most important parameters from the perspective of customer value as show in fig. 2. fig. 2. customer value analysis parameter there are 17 most important parameters from the perspective of customer, it will be discussed how constraints selection can be made to meet certain objectives of customer value. the 17 parameters are divided into 3 groups, namely compactness, frequency, and monetary. • compactness compactness constraint is important to use on sequential patterns due to customer buying habits varies from time to time. so, applying this technique can not only get new customers but also increase the customer's subsequent purchases which exist as show in fig. 3. fig. 3. customer value by constraint based on sequential pattern • frequency to focus on existing customers and increase retention rates, as show in fig. 4. 172 bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 2, december 2022, pp. 169-176 setiawan et.al (sequential pattern mining to support customer relationship management at beauty clinics) fig. 4. relationship between customer retention and enterprise profit • monetary monetary shows the amount of customer money issued for the product. company fee for getting new customers is increasing. lots of company agrees that the cost of obtaining new customers is 6-8 times the cost for retain existing customers. therefore, it is clear that the company should give more attention to retaining existing customers. 2.2. system architecture after the data is ready, then the mining process is carried out in accordance with the stages in the gsp algorithm. it is the mining process that will produce the purchase rule/pattern from customers. with the rules that have been generated by the program, then the management can take concrete steps to carry out the crm process on the customer. the fig. 5 below is the overall block diagram of the system. fig. 5. block diagram the last phase of fig. 5 is action (crmprocess), namely the steps taken by the clinic based on the rules that the program has generated. 2.3. application of crm the program was created using microsoft visual studio with the c# programming language as show in fig. 6. issn 2614-0047 bulletin of social informatics theory and application 173 vol. 6, no. 2, december 2022, pp. 169-176 setiawan et.al (sequential pattern mining to support customer relationship management at beauty clinics) fig. 6. program page interface in the program, there are several inputs for processing transaction data, namely: • transaction periods can be selected by month or date. the type of transaction can also be selected according to the need for the rules to be generated. there are two types of transactions, namely product and care sales. • there are also inputs for minimum support which can be input as a percentage of the total number of transactions and the total desired transaction. • rule mode consists of priority and global. priority contains customer-level categories, while global is all customers. • view stock is a button to display the last stock of the product. • discount consists of numbers and options discount calculation input, namely normalized and reversed. for example, a discount normalized 30% is to give a maximum discount of 30% starting from the type of product/treatment with the most sales, whereas if selected, reversed will start with the fewest sales. • follow up will display a list of customers who have the potential to make transactions according to the results rule based on the order of previous purchase periods. after the iteration process, the output generated is a series of rules as show in fig. 7. fig. 7. last iteration rules implementation will be linked to the discussion carried out in chapter 2, namely in terms of the crm phase, and on crm. in general, the crm phase is divided into three parts, namely: • acquire new customers (acquire) one way to invite new customers is by promotion. promotion can be customized with many factors, such as seasonal factors, trends, and specific events—for example, a promo to celebrate valentine's day. then can perform a search in the february period of last year, and a pattern of a 174 bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 2, december 2022, pp. 169-176 setiawan et.al (sequential pattern mining to support customer relationship management at beauty clinics) purchase order will be found that can be used to design attractive promos and be liked by many people. • increase profits from existing customers (enhance) ways that can be done to improve benefits from existing customers can be through up-selling and cross-selling. • retain profitable customers (retain) this research focuses on retain by offering what specific customers need, not what market customers need. application on the program is by taking advantage of the follow up feature, namely contacting or offering products/treatment recommendations to customers by the results of the rules and what has been purchased by the customer. the things above can be applied to companies because customers will feel treated personally (because giving promos is not the same for everyone, depending on the customer's transaction history). personal treatment will increase customer loyalty to the company [21]. 2.4. testing • trial results look up testing is done by matching the results of the rule from the training data process in the period between 2012-2013 with transactions that occurred in 2014 ( testing data) as in fig. 8. fig. 8. rule testing when the rule has been formed, then the program displayed as fig. 8 can be clicked on one of the existing rules. then the program will calculate on the testing data (2014 period) how many sequences are in accordance with the selected rule. • rule testing the test was carried out with several different parameters. the test results are presented in tabular form in table 1 below. table.1 rule testing results year threshold max simultan type (transaction total) time iteration 2012 100 3 product, care (21224) 15m 3s 3 2012 150 3 product, care (21224) 13m 20s 3 2012 200 3 product, care (21224) 12m 19s 2 2012 100 4 product, care (21224) 22m 5s 3 2012 150 4 product, care (21224) 22m 50s 3 issn 2614-0047 bulletin of social informatics theory and application 175 vol. 6, no. 2, december 2022, pp. 169-176 setiawan et.al (sequential pattern mining to support customer relationship management at beauty clinics) 3. conclusion from the results of this study, conclusions can be drawn, that the result of the resulting rule can be proven through 2014 trial data, that if there is a sequence of purchases in 2012 (training data) then the purchase order is also contained in the 2014 transaction (test data). from the analysis of the test results data then the test results with different thresholds can be concluded that with the same number of transactions, the time required and the rules generated are inversely proportional to the threshold value which is given. the greater the threshold value is given, the shorter the processing time and the resulting rules are also less, and vice versa. the result of the rule can be used by management to support companies' crm activities like getting new customers (acquire), increasing the profits of existing customers (enhance), and maintaining existing customers (retain). the time required to process transaction data and generate rules is determined by the number of transactions, and the number of transactions depends on the length of the selected period. the longer the selected period and the smaller the threshold value becomes, the longer the processing time will be. references [1] r. kalakota, m. robinson, and d. tapscott, e-business 2.0: roadmap for success, vol. 11, pp. 544. addison-wesley boston, 2001. [online]. available: https://marmamun.gov.np/. [2] s. wilde, customer knowledge management: improving customer relationship through knowledge application. springer science \& business media, 2011, doi: 10.1007/978-3-642-16475-0. [3] r. j. baran, r. j. galka, and d. p. strunk, principles of customer relationship management. cengage learning, 2008. [4] l. e. herman, s. sulhaini, and n. farida, “electronic customer relationship management and company performance: exploring the product innovativeness development,” j. relatsh. mark., vol. 20, no. 1, pp. 1–19, jan. 2021, doi: 10.1080/15332667.2019.1688600. [5] c.-c. chen, h.-h. shuai, and m.-s. chen, “distributed and scalable sequential pattern mining through stream processing,” knowl. inf. syst., vol. 53, no. 2, pp. 365–390, nov. 2017, doi: 10.1007/s10115017-1037-1. [6] a. r. andriyan, d. m. rochma, m. n. mudyawati, m. jannah, s. l. d. agustini, and a. a. nugraha, “determination of film recommendations using the generalized sequence pattern (gsp) association method,” in gunung djati conference series, 2021, vol. 3, pp. 7–11, [online]. available: https://conferences.uinsgd.ac.id/index.php/gdcs/article/view/89. [7] t. astuti and l. anggraini, “analysis of sequential book loan data pattern using generalized sequential pattern (gsp) algorithm,” int. j. informatics inf. syst., vol. 2, no. 1, pp. 17–23, 2019, doi: 10.47738/ijiis.v2i1.10. [8] y. feng, h. chen, and l. he, “consumer responses to femvertising: a data-mining case of dove’s ‘campaign for real beauty’ on youtube,” j. advert., vol. 48, no. 3, pp. 292–301, 2019, doi: 10.1080/00913367.2019.1602858. [9] n. setiyawati, “application of association rule mining and mining sequential patterns on crm pt. armada international motor,” creat. commun. innov. technol. j., vol. 11, no. 1, pp. 95–101, 2018, doi: 10.33050/ccit.v11i1.562. [10] e. a. z. noughabi, a. albadvi, and b. h. far, “how can we explore patterns of customer segments’ structural changes? a sequential rule mining approach,” in 2015 ieee international conference on information reuse and integration, 2015, pp. 273–280, doi: 10.1109/iri.2015.52. [11] b. c. kachhadiya and b. patel, “a survey on sequential pattern mining algorithm for web log pattern data,” in 2018 2nd international conference on trends in electronics and informatics (icoei), may 2018, pp. 1269–1273, doi: 10.1109/icoei.2018.8553691. [12] d. s. maylawati, h. aulawi, and m. a. ramdhani, “the concept of sequential pattern mining for text,” iop conf. ser. mater. sci. eng., vol. 434, no. 1, p. 012042, dec. 2018, doi: 10.1088/1757899x/434/1/012042. https://marmamun.gov.np/sites/marmamun.gov.np/files/webform/pdf-e-business-20-roadmap-for-success-2nd-edition-ravi-kalakota-marcia-robinson-pdf-download-free-book-3828566.pdf https://doi.org/10.1007/978-3-642-16475-0 https://doi.org/10.1080/15332667.2019.1688600 https://doi.org/10.1007/s10115-017-1037-1 https://doi.org/10.1007/s10115-017-1037-1 https://conferences.uinsgd.ac.id/index.php/gdcs/article/view/89 https://doi.org/10.47738/ijiis.v2i1.10 https://doi.org/10.1080/00913367.2019.1602858 https://doi.org/10.33050/ccit.v11i1.562 https://doi.org/10.1109/iri.2015.52 https://doi.org/10.1109/icoei.2018.8553691 https://doi.org/10.1088/1757-899x/434/1/012042 https://doi.org/10.1088/1757-899x/434/1/012042 176 bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 2, december 2022, pp. 169-176 setiawan et.al (sequential pattern mining to support customer relationship management at beauty clinics) [13] m. zaki, “fast mining of sequential patterns in very large databases,” 1997. [14] k. shudo, “message bundling on structured overlays,” in 2017 ieee symposium on computers and communications (iscc), jul. 2017, pp. 424–431, doi: 10.1109/iscc.2017.8024566. [15] s. rezig, z. achour, and n. rezg, “using data mining methods for predicting sequential maintenance activities,” appl. sci., vol. 8, no. 11, p. 2184, nov. 2018, doi: 10.3390/app8112184. [16] w. gan, j. c.-w. lin, p. fournier-viger, h.-c. chao, and p. s. yu, “a survey of parallel sequential pattern mining,” acm trans. knowl. discov. data, vol. 13, no. 3, pp. 1–34, jun. 2019, doi: 10.1145/3314107. [17] r. l. helmreich and h. c. foushee, “why crm? empirical and theoretical bases of human factors training,” in crew resource management, elsevier, 2019, pp. 3–52, doi: 10.1016/b978-0-12-8129951.00001-4. [18] t. guyet and r. quiniou, “negpspan: efficient extraction of negative sequential patterns with embedding constraints,” data min. knowl. discov., vol. 34, no. 2, pp. 563–609, mar. 2020, doi: 10.1007/s10618-019-00672-w. [19] c. pypno and g. sierpiński, “automated large capacity multi-story garage—concept and modeling of client service processes,” autom. constr., vol. 81, pp. 422–433, sep. 2017, doi: 10.1016/j.autcon.2017.03.006. [20] m. taufik, f. renaldi, and f. r. umbara, “implementing online analytical processing in hotel customer relationship management,” iop conf. ser. mater. sci. eng., vol. 1115, no. 1, p. 012040, mar. 2021, doi: 10.1088/1757-899x/1115/1/012040. [21] j. sterne, customer service on the internet: building relationships, increasing loyalty, and staying competitive. john wiley \& sons, inc., 2000. https://doi.org/10.1109/iscc.2017.8024566 https://doi.org/10.3390/app8112184 https://doi.org/10.1145/3314107 https://doi.org/10.1016/b978-0-12-812995-1.00001-4 https://doi.org/10.1016/b978-0-12-812995-1.00001-4 https://doi.org/10.1007/s10618-019-00672-w https://doi.org/10.1016/j.autcon.2017.03.006 https://doi.org/10.1088/1757-899x/1115/1/012040 bulletin of social informatics theory and application issn 2614-0047 vol. 7, no. 1, march 2023, pp. 74-82 74 https:doi.org/10.31763/businta.v7i1.97 the use of social media for earthquake and tsunami information anik nur handayani 1,a*, reski dwi suciati 2,a, ulfa qomaria 3,a, widya lestari 4,a, youngga rega nugraha 5,a, paul igunda machumu 6,b a universitas negeri malang, malang, indonesia b handeni district office, tanzania 1 aniknur.ft@um.ac.id ; 2 reskidwisucuati@gmail.com; 3 ulfaqomaria@gmail.com; 4 lestariwidya792@gmail.com; 5 younggarega@gmail.com; 6 machumupaul@gmail.com * corresponding author 1. introduction indonesia is one of the countries passed by the pacific fire circle (ring of fire). consequently, indonesia is prone to earthquakes. recently, indonesia just experienced earthquakes and tsunamis, especially in the central sulawesi region. this incident has destroyed a number of buildings and houses, with more than 2000 casualties. information from these natural events has spread quickly in the community through social media, signifying the crucial role of social media in disaster management [1], [2]. social media is a set of applications and services that connect people to one another using internet networks [3]. with the presence of social media, users can connect and exchange information in the form of text, images, and videos [4], [5]. the social media that are widely used include twitter, facebook, line, instagram, and others. in addition to social media, websites, such as wikipedia and youtube, are also the means to create content. the use of applications and social media is growing with the development of internet technology, such as smartphones [2]. the ministry of communication and information stated that the number of internet users in indonesia is currently very high, reaching 63 million people, with 95 percent of whom use the internet to access social networks. social networking sites that are widely accessed are facebook and twitter. a r t i c l e i n f o a b s t r a c t article history received january 3, 2023 revised february 18, 2023 accepted february 24, 2023 as one of the countries being passed by the pacific fire circle (ring of fire), indonesia is prone to earthquakes. recently, an earthquake and tsunami occurred. a new disaster occurred in central sulawesi, indonesia, resulting in the destroyed buildings and houses. this occurrence of the disaster was quite shocking to various countries. news of the occurrence of natural disasters immediately went viral through various social media due to the residents' and bmkg's posts. social media is greatly involved in natural disaster cases as it facilitates analysis on the conditions and situations of earthquake-affected areas. besides, it also functions to disseminate earthquake information. by using social media, such as twitter and facebook, we may rescue the directly affected individuals. it can also be means of sharing information and ways for people in and outside disaster-affected areas to volunteer and provide support-based information to affected individuals. additionally, social media can perform important assistance functions such as identification of safety, placement of displaced people, provision of damage information, support for disabled people, volunteer organizations, fundraising, and a moral support system. this study discusses the potential usage of social media in disaster preparedness and response, especially in central sulawesi, indonesia, earthquakes and tsunamis. this is an open access article under the cc–by-sa license. keywords social media erathquake tsunami central sulawesi mailto:aniknur.ft@um.ac.id http://creativecommons.org/licenses/by-sa/4.0/ http://creativecommons.org/licenses/by-sa/4.0/ issn 2614-0047 bulletin of social informatics theory and application 75 vol. 7, no. 1, march 2023, pp. 74-82 anik nur handayani et.al (the use of social media for earthquake and tsunami information) besides, indonesia is ranked as the 4th largest facebook user after the usa, brazil, and india. further, indonesia ranks 5th in twitter users in the world. another social network known in indonesia is path, with 700,000 users, line with 10 million users, google+ 3.4 million users and linkdlin 1 million users [6]–[8]. social media has great potential but also carries numerous adverse effects, such as misinformation, the digital divide (between users and non-users), privacy, and identity theft [3]. during the 2018 central sulawesi earthquake and tsunami, popular social media such as twitter, facebook, and instagram functioned as a means of rescuing directly affected individuals, means of sharing information, and means to volunteer, as well as providing support-based information to those directly affected victims [9]. additionally, social media is also used to perform important assistance functions such as identification of safety, placement of displaced people, provision of damage information, support for disabled people, volunteer organizations, fundraising, moral support systems, and so forth [3]. this paper discusses the effectiveness of social media in the earthquake and tsunami disasters management in central sulawesi. based on a survey of social media users, social media had an effective role in the earthquake and tsunami in central sulawesi. the results of the study are expected to increase disaster preparedness and response in the future. 2. method in this study, we garnered data through an online media questionnaire distributed to the general public. there were 14 questions raised related to the use of social media during the earthquake and tsunami in central sulawesi. the number of respondents in the study was 64 respondents consisting of 49 women and 15 men. the online questionnaire began to be disseminated in the community from october 5 2018 to october 25 2018. the duration of the research conducted was quite short, which was around 20 days. those who first filled out the online questionnaire at a time reported difficulty organizing it. based on the results of the survey, the analysis of various parameters related to social media was carried out for the benefit of the community affected by the natural disaster. table.1 summary of questionnaire items no. question answer choice 1. what is your gender? a. male b. female 2. how old are you? a. <18 b. 18-27 c. 28-37 d. 38-47 e. >47 3. are you a community affected by the palu,sigi and donggala earthquakes and tsunamis? a. yes b. no 4. where did you find out information about the earthquake and tsunami in palu, sigi and donggala? a. tv b. print media c. radio d. social media e. other 5. do you use social media? a. yes b. no 6. do you know information about the palu, sigi and donggala earthquakes and tsunamis through social media? a. yes b. no 7. do you get information through social media? a. facebook b. twitter c. instagram d. other 8. are you interested in finding information about the earthquake and tsunami in palu, sigi and donggala through social media? a. yes b. no 9. are you interested in seeking information on the palu, sigi and donggala earthquakes and tsunamis through social media? if yes, what kind of information search do you use? a. based on certain groups b. use keyword # (hastag) c. use the description that leads d. other 76 bulletin of social informatics theory and application issn 2614-0047 vol. 7, no. 1, march 2023, pp. 74-82 anik nur handayani et.al (the use of social media for earthquake and tsunami information) 10. what type of information did you receive during the disaster? a. general information b. safety information c. infrastructure information d. help information 11. does information about the earthquake and tsunami disaster in palu, sigi and donggala affect you? a. yes b. no 12. what did you do after hearing the news? a. does not do anything b. redistribute information c. volunteering d. other 13. do you think social media is able to influence the affected victims of natural disaster? a. yes b. no 14 are you sure or believe in the information contained in social media related to the palu and sigi and donggala earthquakes and tsunamis? a. strongly believes b. believe c. believe it enough d. lack of trust 3. results and discussion among the indonesian social media users, 85% of them are less than 35 years old, with the majority being from the ages of 14 to 24 years, with a total of 41%. [5] this age group is students who have an important role in holding discussions on social media, so it does not rule out the possibility that the people of central sulawesi, especially students, can access and provide information on social media. media has an important role in making a public agenda [10], [11]. if the issue of disaster in central sulawesi has succeeded in becoming an agenda in the community, the government will automatically put more concern into it and make a policy to overcome the existing problems. media indifference to disaster issues will be able to exacerbate the losses experienced by the community when they are struck by a disaster. according to prajarto (2008), the core of the involvement of the media and its workers lies in the issue of providing information. the provision of information in the form of reports and developments in events and direct or indirect actions results in assistance to save people, reduce the number of victims, alleviate the suffering of victims, and reduce other possible losses. the forms of social media involvement can be realized in various formats of information and news, in the forums in the community, and in actions when a disaster strikes. in addition, the media also plays an important role in providing pre-disaster, disasters, and post-disaster information. according to harry tanoe soedibyo in kompas (2013), between indonesian people who reached almost 250 million, 95% of them got information from television. meanwhile, the remaining public gets information from the internet (30%), then radio (23%), and print (12%). from this fact, we can know that public access to mass media or internet-based social media in indonesia is quite high. thus, the inclusion of disaster content in mass and social media has a high chance of touching the community directly [12]. at present, reporting on disasters usually focuses on the event only. furthermore, mitigation and preparedness in the face of disasters are regarded as less interesting content for journalists and social media users. as in the earthquake that occurred in chile on april 1, 2014, this event became a trending topic on twitter with #prayforchille. the world community, including indonesia, expressed their empathy through twitter related to the disaster in chile. however, after seeing this phenomenon, public awareness of a disaster is still limited to the occurrence of a disaster. the community has not adopted the information to increase their preparedness in facing future disasters. the issues of natural disasters have many agencies related to a disaster, starting to touch social media (twitter and facebook), such as from the accounts @prayforpalu, @prayfordonggala, and @bmkg, but the news provided is limited to information about disaster events, with minimum issues of disaster preparedness being discussed. therefore, we need to introduce social media use to the people of central sulawesi. this is of concern to us, given the paradigm shift in disaster management that has taken place in indonesia and the world. the change in the paradigm of disaster management from the reactive efforts of emergencies towards disaster risk reduction seems to have only involved academics and issn 2614-0047 bulletin of social informatics theory and application 77 vol. 7, no. 1, march 2023, pp. 74-82 anik nur handayani et.al (the use of social media for earthquake and tsunami information) practitioners, and it is not yet reaching the media and society. actually, the government's efforts through bnpb and bmkg to get through the public via mass and social media have been carried out, such as by launching applications to improve preparedness, such as the infobmkg-based android application and bancana bnpb monitoring. however, the response of the community to disaster preparedness is still very lacking, as seen from the small number of application downloads. besides, its social media accounts, such as twitter and facebook, also have not attracted the public's attention, as observed from their low number of followers and posts about disaster [13]–[15]. research on the effectiveness of the use of social media in the earthquake and tsunami in central sulawesi was carried out using a sample on a fairly small scope of only 64 respondents with 14 questions in the questionnaire. based on their answers, two questions are classified as poor questions because they get a 100% presentation. the question receiving 100% presentation stated that each respondent who filled out the questionnaire used social media, and the respondents stated that social media could have a significant impact on the affected community. in this study, data were obtained by directly distributing questionnaires to respondents who were active social media users from nearby communities. easy access and efficient time in delivering information lead us to spread questionnaires through social media. the questionnaires can be increasingly simple and quickly disseminated on social media since it offers a broad global reach. recently, social media can be easily used by people without an it knowledge base. consequently, the respondents can access questionnaires via smartphone or computer with an internet connection. thus, it is easier for researchers to review the answers. in the distribution of the questionnaire, we started on october 5, and we got 64 respondents. each questionnaire was given to the respondent, and the respondent was expected to submit the questionnaire. the respondent's statements are certainly in accordance with the actual situation. from questionnaires distributed to internet users, all can be processed into data that is useful for the continuation of this research. the responses obtained from the questionnaire that we distributed are discussed in the following. fig. 1. graph of the respondents' gender of the respondent of the 64 respondents who filled out a questionnaire about the role of social media in the earthquake and tsunami disaster in central sulawesi, 49 of them were women, and 15 men. the results obtained indicate that women are more concerned with events such as earthquakes and tsunamis that occur in central sulawesi. fig. 2. graph of the age of respondents 78 bulletin of social informatics theory and application issn 2614-0047 vol. 7, no. 1, march 2023, pp. 74-82 anik nur handayani et.al (the use of social media for earthquake and tsunami information) fig. 2 shows that most of those who responded to the questionnaire distributed were at aged 18-27 years. this shows that the earthquake and tsunami information that occurred in central sulawesi was widely distributed by those of productive age. fig. 3. the public knows information through social media fig. 3 illustrates that information about the earthquake and tsunami disaster in central sulawesi was disseminated through several media such as tv, social media, radio, print media, and others. the results of this study indicate that 81.3% of the people knew about the event through social media, 15.6% via tv, and the rest through other media, such as getting information from person to person. fig. 4. types of social media used by the community in addition, social media that is widely used to obtain information about the earthquake and tsunami is instagram social media, followed by twitter, and facebook, as shown in fig 4. fig. 5. community interest in social media fig. 5 suggests that many people are interested in finding information about the earthquake and tsunami disasters in central sulawesi through social media. social media is used as an easy medium to get information quickly and precisely. issn 2614-0047 bulletin of social informatics theory and application 79 vol. 7, no. 1, march 2023, pp. 74-82 anik nur handayani et.al (the use of social media for earthquake and tsunami information) fig. 6. forms of information on social media disasters obtained fig. 6 indicates that seismic and tsunami information retrieval is obtained through certain groups, uses certain keywords, and searches using event descriptions. fig. 7. the type of information obtained during natural disasters occurs information obtained through social media from the earthquake and tsunami that occurred in central sulawesi was in the form of general information, such as when the earthquake occurred, the number of victims, and which areas were affected. safety information, such as how many people are dead, and information on infrastructure and assistance. most of the information sought by the community from the earthquake and tsunami that occurred in central sulawesi was general information. fig. 8. information affects society. the earthquake and tsunami disasters that occurred in central sulawesi influenced the community; as shown in the fig. 8, 79.7% of people felt the impact of the event, even though they were not affected. 80 bulletin of social informatics theory and application issn 2614-0047 vol. 7, no. 1, march 2023, pp. 74-82 anik nur handayani et.al (the use of social media for earthquake and tsunami information) fig. 9. activities carried out by the community after knowing the information after knowing the information about the earthquake and tsunami in central sulawesi, 35.9% of respondents distributed the information obtained, 7% volunteered, while 12.5% did nothing. fig. 10. the level of public trust in information dissemination of earthquake and tsunami information in central sulawesi through social media, its identity is believed to be true by the community. as shown in fig. 10 that less than 5% of them do not believe the truth of the information disseminated through social media. fig. 11. media to get information information about the central sulawesi earthquake and tsunami disaster 81.3% was obtained through social media, 15.6% through tv media, and the remaining through radio and newspapers. this shows that social media has an important role in the dissemination of information on the earthquake and tsunami that occurred in central sulawesi. issn 2614-0047 bulletin of social informatics theory and application 81 vol. 7, no. 1, march 2023, pp. 74-82 anik nur handayani et.al (the use of social media for earthquake and tsunami information) 4. conclusion this study aims to examine the effective usage of social media in natural disaster management, especially after the occurrence of tsunamis or earthquakes in palu, sigi and donggala areas in central sulawesi. based on the results of the study, the conclusions from this study are based on the respondents involved in this study. most of them said that social media can have an impact on those directly affected by the disaster and those who are not directly affected by the disaster. through social media, the community can also play a role in saving disaster victims by volunteering and sending aid through the foundation for the distribution of natural disaster relief in certain social media groups involving the community. the results of this study expect control of the information so that the purpose of important information can be achieved effectively and efficiently. because this control system focuses on achieving disaster news objectives, this type of control must allow the results to be measured and compared to standards so that the willingness of news about the disaster and the condition of the victim does not experience deception. references [1] m. wolf, j. sims, and h. yang, “what social media?,” assoc. inf. syst., vol. 3, no. 6, pp. 1–18, 2018, [online]. available: https://aisel.aisnet.org/ukais2018/3 [2] j. h. kietzmann, k. hermkens, i. p. mccarthy, and b. s. silvestre, “social media ? get serious ! understanding the functional building blocks of social media ? get serious ! understanding the functional building blocks of social media,” bus. horiz., vol. 54, no. 3, pp. 241–251, 2011, doi: 10.1016/j.bushor.2011.01.005. [3] y. t. akeuchi, “utilization of social media in the east japan earthquake and tsunami and its effectiveness brett d . m . p eary * rajib s haw *,” vol. 34, no. 1, pp. 3–18, 2012.doi: 10.2328/jnds.34.3. [4] y. zhao, “social networks and reduction of risk in disasters: an example of the wenchuan earthquake,” qual. life asia, vol. 4, pp. 171–182, 2013, doi: 10.1007/978-94-007-7386-8_10. [5] j. dugdale, b. van de walle, and c. koeppinghoff, “social media and sms in the haiti earthquake,” www’12 proc. 21st annu. conf. world wide web companion, pp. 713–714, 2012, doi: 10.1145/2187980.2188189. [6] o. mauroner and a. heudorfer, “social media in disaster management: how social media impact the work of volunteer groups and aid organisations in disaster preparation and response,” int. j. emerg. manag., vol. 12, no. 2, pp. 196–217, 2016, doi: 10.1504/ijem.2016.076625. [7] z. bojovic, đ. klipa, e. šećerov and v. šenk, "smart government from information to smart society.” the journal (institute of telecommunications professionals)., vol. 11(3), pp. 34-39, oct. 2017. available at: https://www.researchgate.net/publication/322232405_smart_government__from_information_to_smart_society. [8] m. jawaid, m. h. khan, and s. n. bhutto, “social network utilization (facebook) & eprofessionalism among medical students,” pakistan j. med. sci., vol. 31, no. 1, pp. 209–213, jan. 2015, doi: 10.12669/pjms.311.5643. [9] t. o. reilly, “what is web 2 . 0 design patterns and business models for the next generation of software,” vol. 6228, 2006. available a: papers.ssrn.com. [10] s. pasari, a. v. h. simanjuntak, neha, and y. sharma, “nowcasting earthquakes in sulawesi island, indonesia,” geosci. lett., vol. 8, no. 1, pp. 1–13, dec. 2021, doi: 10.1186/s40562-021-00197-5. [11] s. n. ward, “tsunamis the encyclopedia of physical science and technology,” encycl. phys. sci. technol., vol. 17, pp. 175–191, 2002, doi: 10.1097/phh.0b013e318221a7ee. [12] a. m. kaplan and m. haenlein, “users of the world, unite! the challenges and opportunities of social media,” bus. horiz., vol. 53, no. 1, pp. 59–68, jan. 2010, doi: 10.1016/j.bushor.2009.09.003. [13] s. zhang, w. rong, g. tai, m. yu, and l. sun, “designing and dynamic modeling of 1d nanopositioner based on stick-slip motion principle,” jixie gongcheng xuebao/journal mech. eng., vol. 48, no. 19, 2012, doi: 10.3901/jme.2012.19.029. https://aisel.aisnet.org/ukais2018/3 https://doi.org/10.1016/j.bushor.2011.01.005 https://doi.org/10.2328/jnds.34.3 https://doi.org/10.1007/978-94-007-7386-8_10 https://doi.org/10.1145/2187980.2188189 https://doi.org/10.1504/ijem.2016.076625 https://www.researchgate.net/publication/322232405_smart_government_-_from_information_to_smart_society https://www.researchgate.net/publication/322232405_smart_government_-_from_information_to_smart_society https://doi.org/10.12669/pjms.311.5643 https://papers.ssrn.com/sol3/papers.cfm?abstract_id=1008839 https://doi.org/10.1186/s40562-021-00197-5 https://doi.org/10.1097/phh.0b013e318221a7ee https://doi.org/10.1016/j.bushor.2009.09.003 https://doi.org/10.3901/jme.2012.19.029 82 bulletin of social informatics theory and application issn 2614-0047 vol. 7, no. 1, march 2023, pp. 74-82 anik nur handayani et.al (the use of social media for earthquake and tsunami information) [14] k. kawaguchi, y. kaneda, e. araki, t. baba, and n. takahashi, “reinforcement of seafloor surveillance infrastructure for earthquake and tsunami monitoring in western,” pp. 2–6, 2011. doi: 10.1109/oceans-yeosu.2012.6263447. [15] k. kawaguchi et al., “decision-making on seafloor surveillance infrastructure site for earthquake and tsunami monitoring in western japan,” ocean. 2014 taipei, pp. 5–8, 2014, doi: 10.1109/oceans-taipei.2014.6964514. https://doi.org/10.1109/oceans-yeosu.2012.6263447 https://doi.org/10.1109/oceans-taipei.2014.6964514 bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 2, december 2022, pp. 158-167 158 https:doi.org/10.31763/businta.v6i2.601 web-based system for medicinal plants identification using convolutional neural network franklin m.d. mandagi a,1, frangky j. paat a,2, dedie tooy a,3, sandra e. pakasi a,4, sofia wantasen a,5, diane d. pioh a,6, rinny mamarimbing a,7, bobby j. v. polii a,8, jantje pongoh a,9, arthur g. pinaria a,10, edwin tenda a,11, luther alexander latumakulita a,12,*, noorul islam b,13 a sam ratulangi university, jalan kampus, manado 95115, indonesia b kanpur institute of technology, a-1, upsidc, rooma industrial area, kanpur, 201008, india 1 f.m.mandagi66@gmail.com; 2 frangkypaat@unsrat.ac.id; 3 dtooy@unsrat.ac.id; 4 sandrapakasi@unsrat.ac.id; 5 swantasen@unsrat.ac.id; 6 deibijdiane@unsrat.ac.id; 7 rinnyliwu@gmail.com; 8 bobbypolii@unsrat.ac.id; 9 jantjepongoh@unsrat.ac.id; 10 arthur.pinaria@unsrat.ac.id; 11 tenda.edwin@unsrat.ac.id; 12 latumakulitala@unsrat.ac.id; 13 noorul.islam3101@gmail.com * corresponding author 1. introduction indonesia is known as a country rich in natural resources. about 30,000 plant species, and 7,000 of them have beneficial medicinal properties [1]. medicinal plants are often used as an alternative to natural medicine, and around 80% of people still rely on traditional medicine for healing [2], [3]. however, due to the large number of medicinal plant species and their morphological similarity, the identification process can lead to errors that hurt the user and can even be fatal. the manual identification process takes a long time and requires assistance from experts [4]. therefore, technology is needed to help identify the type of drug. over time, technologies such as artificial intelligence (ai) are increasingly popular in solving various problems. several researchers have conducted studies on ai, such as that conducted by [5], who used the backpropagation neural network (bpnn) method to identify local reef fish species in bunaken national park. they used three feature extraction processes, namely geometric invariant moment (gim), gray level co-occurrence matrix (glcm), and hue saturation value (hsv), with the lowest training accuracy of 75.00% and the highest of 88.73%, and the lowest validation accuracy a r t i c l e i n f o a b s t r a c t article history received october 30, 2022 revised november 26, 2022 accepted december 3, 2022 indonesia has a variety of medicinal plants that are efficacious for preventing or treating various diseases. each region has unique medicinal plants, such as in north sulawesi, there are many medicinal plants with local names of "jarak" (jatropha curcas), "jarak merah" (jatropha multifida), "miana" (coleus scutellarioide), and "sesewanua" (clerodendron squmatum vahl). this research applies the convolutional neural network (cnn) method to identify the types of medicinal plants of north sulawesi based on leaf images. data was collected directly by taking photos of medicinal plant leaves and then using the augmentation process to increase the data. the first stage is conducting training and validation processes using 10-fold cross-validation, resulting in 10 classification models. evaluation results show that the lowest validation accuracy of 98.4% was obtained from fold-4, and the highest was 100% from fold-2. the third stage was to run the testing process using new data. the results showed that the worst model produced a test accuracy of 80.91% while the best model produced an accuracy of 87.73% which means that the identification model is quite good and stable in classifying types of medicinal plants based on its leaf images. the final stage is to develop a web-based system to deploy the best model so people can use it in real-time. this is an open access article under the cc–by-sa license. keywords medicinal plants cnn identifications leaf images cross-validation https://doi.org/10.31763/businta.v6i2.601 mailto:frangkypaat@unsrat.ac.id mailto:dtooy@unsrat.ac.id;%204sandrapakasi@unsrat.ac.id mailto:dtooy@unsrat.ac.id;%204sandrapakasi@unsrat.ac.id mailto:dtooy@unsrat.ac.id;%204sandrapakasi@unsrat.ac.id mailto:swantasen@unsrat.ac.id mailto:deibijdiane@unsrat.ac.id mailto:rinnyliwu@gmail.com mailto:tenda.edwin@unsrat.ac.id mailto:latumakulitala@unsrat.ac.id http://creativecommons.org/licenses/by-sa/4.0/ http://creativecommons.org/licenses/by-sa/4.0/ issn 2614-0047 bulletin of social informatics theory and application 159 vol. 6, no. 2, december 2022, pp. 158-167 mandagi author et.al (web-based system for medicinal plants identification using convolutional neural network) of 73.33%, and the highest 80.00%. this research was continued by research [6], which increased system performance with the lowest validation accuracy of 85% and the highest of 100%. both studies used the k-fold cross validation technique to evaluate the model. other studies have also used the bpnn method to predict and select prospective bidikmisi scholarship recipients, considering the poverty level, and achieved an accuracy of 85.6% [7]. meanwhile, researchers [8] identified 54 images of 3 types of ficus plants using the support vector machine (svm) and achieved an accuracy of 83.3%. other researchers [9] used the svm method to classify herbal leaves using the scale invariant feature transform (sift) technique as feature extraction. research [10] classifies five different types of leaves using law's mask analysis and svm as a classifier with an accuracy of 90.27%. [11] the random forest method was used with ten cross-validations to identify 32 images of 24 plant species on mauritius island, resulting in an accuracy of 90.1%. several studies use convolutional neural networks (cnn) to identify types of medicinal plants, such as [12] analyzing the differences in leaf shape of 6 medicinal plants using an android-based camera. the results show a training and validation accuracy of 100%. [13] authenticated herbal leaves using the cnn method on a raspberry pi for seven types of medicinal plants. the dataset is divided into 66.67% for training and 33.33% for data testing. the results show an accuracy of 93.62% for offline data testing and 91.04% for online data testing. in addition, other studies identify images of herbal plant leaves using cnn. [14] used 33 herbs with a dataset of 21,450 images, divided into 76.9% for training, 15.4% for validation, and 7.7% for testing. in the training and validation process, 150 epochs were carried out, with the highest accuracy of 94% and the lowest loss of 0.28%. based on the problems and research that has been done, this study aims to build a website-based system to classify four typical medicinal plants of north sulawesi using the cnn method. 2. method 2.1. dataset the data used in this study is in the form of leaf images of 4 types of medicinal plants: jatropha curcas, jatropha multifida, coleus scutellarioide, and clerodendron squmatum vahl. the total original data is 300 photos and became 2320 through an augmented process. the distribution of training, validation, and testing data can be seen in table 1, where fig. 1 shows four types of medicinal plants as classification classes. table.1 distribution of data training, validation, and testing no medicinal plants data group training validation testing 1 jatropha curcas 423 47 110 2 jatropha multifida 423 47 110 3 coleus scutellarioide 423 47 110 4 clerodendron squmatum vahl 423 47 110 jarak (jatropha curcas) jarak merah (jatropha multifida) miana (coleus scutellarioide) sesewanua (clerodendron squmatum vahl) fig. 1. four classification classes of medicinal plants 2.2. research stages the research stages are shown in fig. 2, which consists of 3 stages developing, testing, and deploying the model. 160 bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 2, december 2022, pp. 158-167 mandagi author et.al (web-based system for medicinal plants identification using convolutional neural network) fig. 2. research stages of medicinal plants identification in the first stage, the augmentation process was conducted to add more data and continued to training and validation processes. k-folds cross-validation technique with k was set up to 10, and then the evaluation process ran over ten built models. the testing process runs in the second stage by using new data never used in the previous stage. the best model will be selected to deploy in the third stage. 2.3. cross validation cross-validation is a standard evaluation technique in machine learning where data is divided into training and validation data according to the assigned k value [15]. training and validation processes are repeated k times so that all subsets are used for evaluation. thus, k-fold cross validation produces k models tested on different data [16]. in this study using ten folds, this means that the data is divided 90% for training data and 10% for validation, as shown in table 2. table.2 10-fold cross-validation of medicinal plants data validation training fold1 data 1-188 data 189-1880 fold2 1-188 189376 377-1880 fold3 1-376 377564 565-1880 fold4 1-564 565752 753-1880 fold5 1-752 753940 941-1880 fold6 1-940 9411128 1129-1880 fold7 1-1129 11291316 1317-1880 fold8 1-1316 13171504 1505-1880 fold9 1-1504 15051692 16931880 fold10 1-1692 16931880 2.4. convulational neural network convolutional neural network (cnn) is an algorithm in machine learning that processes data in matrix forms, such as images or image data. cnn was developed from artificial neural networks (ann) with an architecture that processes spatial data. cnn is considered one of the best models for image object recognition problems. cnn consists of several layers that can be trained to extract the relevant features from the image. issn 2614-0047 bulletin of social informatics theory and application 161 vol. 6, no. 2, december 2022, pp. 158-167 mandagi author et.al (web-based system for medicinal plants identification using convolutional neural network) each layer in cnn receives input from the previous layer and produces output as a feature matrix. the processing at each layer consists of convolution, activation, and pooling operations. convolution is used to extract features from the input data, activation is used to introduce non-linearity into the model, and pooling is used to reduce data dimensions [17], [18]. the architecture of cnn is shown in fig. 3, where the input is medicinal plants leaf image and then processed at the feature extraction stage and ends with the classification stage. fig. 3. convolutional neural network architecture 2.5. confusion matrix confusion matrix is used to evaluate the performance of a model on classification problems [19], [20]. table 3 shows the confusion matrix with four classification classes of medicinal plants jatropha curcas, jatropha multifida, coleus scutellarioide, and clerodendron squmatum vahl. table.3 confusion matrix of medicinal plants with four classes actual values jatropha curcas jatropha multifida coleus scutellarioide clerodendron squmatum vahl predicted values jatropha curcas t f f f jatropha multifida f t f f coleus scutellarioide f f t f clerodendron squmatum vahl f f f t where t is true prediction, and f is false prediction. accuracy can be calculated by using equation (1). 𝐴𝑐𝑐𝑢𝑟𝑎𝑐𝑦 = ( 𝑇𝑜𝑡𝑎𝑙 𝑜𝑓 𝑇 (𝑇𝑜𝑡𝑎𝑙 𝑜𝑓 𝑇)+(𝑇𝑜𝑡𝑎𝑙 𝑜𝑓 𝐹) ) (1) 3. results and discussion 3.1. training and validation result the training process is carried out with epoch = 5 parameters, batch size = 32, and learning rate = 0.001, 10 folds cross-validation is applied. table 4 shows the loss and accuracy of validation result for ten folds, where fig. 4 show the graphics of accuracy and loss for each fold. table.4 loss and accuracy values of validation results fold loss accuracy fold-1 0.022688891738653183 0.9893617033958435 fold-2 0.016021721065044403 1.0 fold-3 0.04087042063474655 0.9946808218955994 fold-4 0.07188611477613449 0.9840425252914429 fold-5 0.0398603156208992 0.9840425252914429 fold-6 0.03860936686396599 0.9840425252914429 fold-7 0.02509928308427334 0.9840425252914429 fold-8 0.04476083442568779 0.9840425252914429 fold-9 0.025063488632440567 0.9893617033958435 fold-10 0.04325980320572853 0.9840425252914429 162 bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 2, december 2022, pp. 158-167 mandagi author et.al (web-based system for medicinal plants identification using convolutional neural network) fig. 4. accuracy and loss per fold validation graph fold-2 produces the most accurate model, whereas fold-4 yields the most miniature accurate model despite its sufficient accuracy at 98%. the best model is generated from fold-2. fig. 5 and fig. 6 compare the loss value and accuracy of the training and validation processes of the best model from fold-2. on the other hand, fig. 7 and fig. 8 present the same cases for the worst model from fold-4. this indicates that the loss values show the system performs well, and the accuracy is almost identical at the end of the epoch included for the worst model. fig. 5. graphic of loss values of training and validation result of fold-2 fig. 6. graphic of the accuracy of training and validation result of fold-2 fig. 7. graphic of loss values of training and validation result of fold-4 fig. 8. graphic of the accuracy of training and validation result of fold-4 3.2. testing results based on the results of previous training and validation processes, the best model of fold-2 was selected. the testing process is conducted with new data to ensure that the model still provides excellent and stable performance. fig. 9 shows the confusion matrix of the testing result of the best model fold-2, and fig. 10 shows its classification reports. fig. 9. confusion matrix of the best model of fold-2 issn 2614-0047 bulletin of social informatics theory and application 163 vol. 6, no. 2, december 2022, pp. 158-167 mandagi author et.al (web-based system for medicinal plants identification using convolutional neural network) fig. 10. classification report, the best model of fold-2 as shown in fig. 9 above that each class has 110 testing data. the result shows that 105 data from the "jarak" class are correctly predicted, where 109 data from "jarak merah" is predicted as accurately, 101 from the "miana" class are correctly detected, 71 data from the "sesewanua" class are genuinely predicted. table 5 shows detail of the testing results. table.5 testing result classification classes prediction amount of testing data per class true false “jarak” 105 5 110 “jarak merah” 109 1 110 “miana” 101 9 110 “sesewanua” 71 39 110 386 total testing data = 440 accuracy = 368/440 * 100% = 87.73% fig. 11 and fig. 12 show the confusion matrix and classification report of the testing process of the worst model from fold-4. it can be seen that the worst model still gives a good accuracy of 80,91%, indicating that the proposed model for identifying the medicinal plants discussed in this study is perfect and also stable. based on all findings above, the model from fold-2 is selected to be deployed into a web-based system so it can be used online. fig. 11. the confusion matrix of the worst model fig. 12. classification report of the worst model 164 bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 2, december 2022, pp. 158-167 mandagi author et.al (web-based system for medicinal plants identification using convolutional neural network) 3.3. deployment after several tests, the optimal value has been determined and will be integrated into the system. the system is designed as a web-based application that can detect medicinal plants. fig. 13 illustrates the main menu header display of the application that contains various features, including the identification model for medicinal plants. the development of the application was based on the python-flask framework, a web application framework written in python. this framework provides libraries, tools, and technologies that enable developers to build dynamic web applications. with the help of the python-flask framework, the application is designed to provide a user-friendly interface that can be easily accessed through a web browser. overall, the system is expected to facilitate the identification of medicinal plants and support researchers in their study of herbal medicine. fig. 13. main menu of web-based applications for detect medical plants in order to enable users to detect images of known medicinal plants, the website provides an image upload feature. this feature allows users to upload images of a medicinal plant they wish to identify. fig. 14 depicts the form that enables users to browse an image of the medicinal plant they wish to detect.. the model uses deep learning algorithms to carry out the image recognition and detection process. this model has been trained on a large dataset of images of various medicinal plants, enabling it to accurately identify and classify the plant based on its unique features and characteristics. by providing this image upload feature, the website aims to provide a simple and effective way for users to identify medicinal plants and learn more about their properties and uses. fig. 14. form input image, which will detect fig. 15 shows the image the user has successfully uploaded and is ready to be detected. upon clicking the "detection" button, the website will start processing the image and display the detected medicinal plant with its name and other related information, such as its common name, scientific name, and medicinal properties, as in fig. 16. fig. 15. form to display the input image issn 2614-0047 bulletin of social informatics theory and application 165 vol. 6, no. 2, december 2022, pp. 158-167 mandagi author et.al (web-based system for medicinal plants identification using convolutional neural network) fig. 16. medicinal plant detection result the web-based identification application created as part of this research presents a potential solution to the problem of assisting people in recognizing the native medicinal plants of the sulawesi utara province and the advantages of these plants in preventing and treating illnesses. this program can provide an easy and readily available means for individuals to investigate the medicinal potential of local plants, which is particularly useful given the growing interest in alternative forms of treatment. this method can act as a basis for more research and development in the field of pharmacology based on traditional herbal medicine. exploring the potential of natural treatments can bring new options for the development of drugs. this is especially important given the rising need for healthcare solutions that are both safe and effective. in addition, the system may teach people how to combine herbal remedies from indigenous plants in north sulawesi to prevent and treat ailments. this is one of the potential applications of the system. this method can potentially establish a new paradigm for health education based on local medicinal plants if it can capitalize on the knowledge of traditional medicine. the web-based identification application built throughout this research has a significant amount of potential to improve research in the field of pharmacology, advance the use of local medicinal plants, and give a new model for health education based on traditional medicine. 4. conclusion the identification model of medicinal plants using cnn proposed in this research provided excellent and stable performance. ten identification models were created by using 10-fold crossvalidation. evaluation results show that even the worst model still gives a good validation accuracy of 80.91%, while the best model provides a perfect validation accuracy of 100%. the system also shows perfect accuracy in testing new data. the worst model provided a testing accuracy of 80,91%, the same as its validation accuracy, while the best model achieved an excellent testing accuracy of 87.73%. the website-based system has been successfully created to deploy the best model and runs properly. acknowledgment we thank kanpur institute of technology india and sam ratulangi university manado indonesia for this research collaboration. references [1] w. o. jumiarni and o. komalasari, “inventory of medicines plant as utilized by muna tribe in kota wuna settlement,” maj. obat tradis., vol. 22, no. 1, p. 45, apr. 2017, doi: 10.22146/tradmedj.24314. [2] x. zhu, m. zhu, and h. ren, “method of plant leaf recognition based on improved deep convolutional neural network,” cogn. syst. res., vol. 52, pp. 223–233, dec. 2018, doi: 10.1016/j.cogsys.2018.06.008. [3] h. a. atabay, “a convolutional neural network with a new architecture applied on leaf classification,” iioab j., vol. 7, pp. 326–331, 2016, [online]. available at: https://www.iioab.org/articles/iioabj_7.s5_326-331.pdf. [4] m. musa, m. s. arman, m. e. hossain, a. h. thusar, n. k. nisat, and a. islam, “classification of https://doi.org/10.22146/tradmedj.24314 https://doi.org/10.1016/j.cogsys.2018.06.008 https://www.iioab.org/articles/iioabj_7.s5_326-331.pdf 166 bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 2, december 2022, pp. 158-167 mandagi author et.al (web-based system for medicinal plants identification using convolutional neural network) immunity booster medicinal plants using cnn: a deep learning approach,” in communications in computer and information science, vol. 1440 ccis, springer science and business media deutschland gmbh, 2021, pp. 244–254, doi: 10.1007/978-3-030-81462-5_23. [5] u. andayani, a. wijaya, r. f. rahmat, b. siregar, and m. f. syahputra, “fish species classification using probabilistic neural network,” j. phys. conf. ser., vol. 1235, no. 1, p. 012094, jun. 2019, doi: 10.1088/1742-6596/1235/1/012094. [6] l. a. latumakulita et al., “combination of feature extractions for classification of coral reef fish types using backpropagation neural network,” joiv int. j. informatics vis., vol. 6, no. 3, p. 643, sep. 2022, doi: 10.30630/joiv.6.3.1082. [7] l. latumakulita and t. usagawa, “indonesia scholarship selection model using a combination of back-propagation neural network and fuzzy inference system approaches,” int. j. intell. eng. syst., vol. 11, no. 3, pp. 79–90, jun. 2018, doi: 10.22266/ijies2018.0630.09. [8] s. j. kho, s. manickam, s. malek, m. mosleh, and s. k. dhillon, “automated plant identification using artificial neural network and support vector machine,” front. life sci., vol. 10, no. 1, pp. 98– 107, jan. 2017, doi: 10.1080/21553769.2017.1412361. [9] . p. p., “robust recognition and classification of herbal leaves,” int. j. res. eng. technol., vol. 05, no. 16, pp. 146–149, may 2016, doi: 10.15623/ijret.2016.0516031. [10] d. puri, a. kumar, j. virmani, and kriti, “classification of leaves of medicinal plants using laws’ texture features,” int. j. inf. technol., vol. 14, no. 2, pp. 931–942, mar. 2022, doi: 10.1007/s41870019-00353-3. [11] a. begue, v. kowlessur, u. singh, f. mahomoodally, and s. pudaruth, “automatic recognition of medicinal plants using machine learning techniques,” int. j. adv. comput. sci. appl., vol. 8, no. 4, 2017, doi: 10.14569/ijacsa.2017.080424. [12] l. p. d. s. senevirathne, d. p. d. s. pathirana, a. l. silva, m. g. s. r. dissanayaka, d. p. nawinna, and d. ganegoda, “mobile-based assistive tool to identify & learn medicinal herbs,” in 2020 2nd international conference on advancements in computing (icac), dec. 2020, pp. 97–102, doi: 10.1109/icac51239.2020.9357247. [13] haryono, k. anam, and b. sujanarko, “herbal leaf authentication using convolutional neural network on raspberry pi 3,” in aip conference proceedings, oct. 2020, vol. 2278, no. 1, p. 020047, doi: 10.1063/5.0014514. [14] i. n. purnama, “herbal plant detection based on leaves image using convolutional neural network with mobile net architecture,” jitk (jurnal ilmu pengetah. dan teknol. komputer), vol. 6, no. 1, pp. 27–32, jul. 2020, accessed: apr. 17, 2023. [online]. available at: https://ejournal.nusamandiri.ac.id/index.php/jitk/article/view/1400. [15] z. xiong, y. cui, z. liu, y. zhao, m. hu, and j. hu, “evaluating explorative prediction power of machine learning algorithms for materials discovery using k -fold forward cross-validation,” comput. mater. sci., vol. 171, p. 109203, jan. 2020, doi: 10.1016/j.commatsci.2019.109203. [16] p. n. andono, e. h. rachmawanto, n. s. herman, and k. kondo, “orchid types classification using supervised learning algorithm based on feature and color extraction,” bull. electr. eng. informatics, vol. 10, no. 5, pp. 2530–2538, oct. 2021, doi: 10.11591/eei.v10i5.3118. [17] g. g. and a. p. j., “identification of plant leaf diseases using a nine-layer deep convolutional neural network,” comput. electr. eng., vol. 76, pp. 323–338, jun. 2019, doi: 10.1016/j.compeleceng.2019.04.011. [18] v. tiwari, r. c. joshi, and m. k. dutta, “dense convolutional neural networks based multiclass plant disease detection and classification using leaf images,” ecol. inform., vol. 63, p. 101289, jul. 2021, doi: 10.1016/j.ecoinf.2021.101289. [19] s. ernawati, e. r. yulia, frieyadie, and samudi, “implementation of the naïve bayes algorithm with feature selection using genetic algorithm for sentiment review analysis of fashion online companies,” in 2018 6th international conference on cyber and it service management (citsm), aug. 2018, pp. 1–5, doi: 10.1109/citsm.2018.8674286. https://doi.org/10.1007/978-3-030-81462-5_23 https://doi.org/10.1088/1742-6596/1235/1/012094 https://doi.org/10.30630/joiv.6.3.1082 https://doi.org/10.22266/ijies2018.0630.09 https://doi.org/10.1080/21553769.2017.1412361 https://doi.org/10.15623/ijret.2016.0516031 https://doi.org/10.1007/s41870-019-00353-3 https://doi.org/10.1007/s41870-019-00353-3 https://doi.org/10.14569/ijacsa.2017.080424 https://doi.org/10.1109/icac51239.2020.9357247 https://doi.org/10.1063/5.0014514 https://ejournal.nusamandiri.ac.id/index.php/jitk/article/view/1400 https://doi.org/10.1016/j.commatsci.2019.109203 https://doi.org/10.11591/eei.v10i5.3118 https://doi.org/10.1016/j.compeleceng.2019.04.011 https://doi.org/10.1016/j.ecoinf.2021.101289 https://doi.org/10.1109/citsm.2018.8674286 issn 2614-0047 bulletin of social informatics theory and application 167 vol. 6, no. 2, december 2022, pp. 158-167 mandagi author et.al (web-based system for medicinal plants identification using convolutional neural network) [20] a. f. ab. nasir et al., “text-based emotion prediction system using machine learning approach,” iop conf. ser. mater. sci. eng., vol. 769, no. 1, p. 012022, feb. 2020, doi: 10.1088/1757899x/769/1/012022. https://doi.org/10.1088/1757-899x/769/1/012022 https://doi.org/10.1088/1757-899x/769/1/012022 bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 1, march 2022, pp. 21-30 21 https:doi.org/10.31763/businta.v6i1.598 social media instagram for promoting tourism in the eastern indonesia adita ayu kusumasari a,1,*, annisa amelia syafitri b,2, adita febiola selly b,3, dimas prastyo buseri b,4, fabyan raif erlangga b,5, genett jimenez c,6 a sekolah tinggi informatika dan komputer indonesia, malang, indonesia b universitas negeri malang, malang, indonesia c institucion universitaria de barranquilla iub, colombia 1 adita.kusumasari@stiki.ac.id; 2 annisa.amelia.1805356@students.um.ac.id; 3 adita.febiola.1805356@students.um.ac.id; 4 dimas.prastyo.1805356@students.um.ac.id; 5 fabyan.raif.1805356@students.um.ac.id; 6 gjimenez@unibarranquilla.edu.co * corresponding author 1. introduction the natural beauty of indonesia is very enchanting and has a variety and charms ranging from sabang to merauke. the number of islands in indonesia that have been spatially verified (having names, coordinates, and polygons) is 16,684 islands, and as of april 2020, 17,162 islands were declared valid, leaving 229 islands still to be studied [1]. indonesia's cultural diversity adds to the richness of indonesian culture. geographical environment, background, history of regional development, ethnicity, and religion or belief give their characteristics to each region in indonesia. from this data, the potential for nature tourism in indonesia will be endless to be explored. there are still several tourist objects that are still not recognized by many indonesians. one of the tourist objects in question is maluku province. maluku is a province in eastern indonesia. maluku has various ethnic groups, religions, and languages. most of the inhabitants of maluku are native maluku people consisting of various tribes and nations, such as the alifuru, ambon, buru, and kei tribes. most maluku population is muslim, with as many as 988,365 people in 2020. meanwhile, 736,580 protestants and 128,527 catholics. in 2017, 18,075 foreign tourists visited maluku [2]. this number is tiny compared to foreign tourists in bali, central indonesia. it was recorded that in 2017, 5,697,739 foreign tourists entered bali [3]. this is unfortunate considering there are so many tourism potentials in maluku, which are as diverse as interesting ones, such as bair island, dodola island, lake laguna ternate, liang ambon beach, and ambon city, which is famous for tolerance between religious communities. a r t i c l e i n f o a b s t r a c t article history received december 16, 2021 revised january 21, 2022 accepted february 23, 2022 indonesia consists of many islands and cultures, so there are many tourist destinations in indonesia. it is appropriate to introduce tourism in indonesia by having various tourism destinations. many methods can be used to introduce indonesian tourist objects, including current social media that can also be used to promote tourism. this study aims to reveal the influence of social media as a tourism promotion in the eastern part. in this paper, instagram is the social media focused on researching eastern tourism promotion. social media instagram has a large number of users. currently, the number of instagram downloads is 1 billion. in this paper, data collection on instagram accounts that have tourism promotion content will be carried out. data taken, such as the number of followers and the number of posts, then an account will be determined, which will be the object of research so that later it will produce an analysis of how the instagram account promotes tourism. indonesia complies with the elements of the 7c framework. this is an open access article under the cc–by-sa license. keywords social media instagram tourism promotion mailto:adita.kusumasari@stiki.ac.id http://creativecommons.org/licenses/by-sa/4.0/ http://creativecommons.org/licenses/by-sa/4.0/ 22 bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 1, march 2022, pp. 21-30 kusumasari et.al (social media instagram for promoting tourism in the eastern indonesia) currently, technology is developing very rapidly, and even the use of technology is familiar to humans in various parts of the world. one of the impacts of this technological development is the emergence of social media. with social media, information can be obtained easily. promotion of products, services, and tourist destinations can be done through social media. the total population of indonesia is currently 274.9 million, and internet users in indonesia in early 2021 have reached 202.6 million. compared to 2020, this number has increased by 15.5 percent or 27 million people, meaning that internet penetration in indonesia in early 2021 reached 73.7 percent. this is written in the latest report from the content management service hootsuite, and social media marketing agency. we are social in a "digital 2021" report. hootsuite reports that internet users aged 16 64 have various electronic devices such as smartphones, smartwatches, pcs, etc. of the various types of smartphone devices, there are many users, and 96.4 percent, or 195.3 million indonesians, use smartphones to access social media [4]. instagram is the result of the idea of kevin systrom and mike krieger, and instagram was released on october 6, 2010. instagram is an application that allows users to upload short photos and videos, even equipped with filters and location information (pratt, 2018). according to the latest report from napoleoncat, one analyst firm based in social media marketing in warsaw, poland, instagram users in indonesia in november 2019 reached 61.61 million. this means that 22.6%, or almost a quarter of indonesia's total population, are instagram users [5]. with this information, we have selected the social media to be used, namely instagram. social media is no stranger to indonesia but can be downloaded for free, and instagram is more accessible using smartphones. east indonesia tourism promotion uses commercial advertisements such as wonderful indonesia, which often appears on television. the ministry of tourism and creative economy is also trying to promote eastern indonesia tourist destinations through the ministry's official website, namely kemenparekraf.go.id. the site contains information within the scope of the ministry of tourism and creative economy. kemenparekraf also has instagram social media with the account name @ kemenparekraf.ri. the promotion of eastern indonesia tourist destinations can be seen on these social media accounts. however, the number of promotions is not significant because the account does not only focus on eastern indonesia tourism but also tourism in other regions. people and foreign tourists who want to dig up news and information about eastern indonesia tourism will have a hard time. one of the instagram accounts that promote eastern indonesia tourist destinations is @maluku_punya. as the name implies, this account focuses on promoting tourist destinations in maluku province in eastern indonesia. an example of the content in this account is a tour of waetina waterfall, located in bara village, maluku province. the content is a photo of a waterfall which is a repost from someone else's account so that more people can see the tourism content of waetina waterfall from that person's account. so, the instagram account @maluku_punya can be used as an object of research to prove the benefits of social media in promoting tourism in eastern indonesia. 2. literature overview 2.1. social media social media is a system or application that functions as a place to interact with one another. usually, social media applications can be web or android based [6]. for internet users worldwide, social media is a new “territory” that will become the center of destination with the existence of the internet. this condition makes social media will continue to grow to become a platform that provides various kinds of content on the internet with a large capacity [7] [8] [9]. the development of innovative content-like products in the internet sector can open up opportunities for social media to step into a new era. this will change traditional media to become more modern [10]. social media development focuses on the various behaviors and activities of individuals involved in it, such as sharing personal information, identities, and influence [11]. the comparison proposed by funk / levis & association can be seen in fig. 1. recent studies have proven that social media's power is genuine and requires more attention from various parties [12]. one of them is 86% of internet users in the united states and 79% of users from europe who use social media activity with continuously developed content according to existing topics [13]. in addition to indonesia alone, 139 million active users use social 87% are internet users in indonesia [14]. issn 2614-0047 bulletin of social informatics theory and application 23 vol. 6, no. 1, march 2022, pp. 21-30 kusumasari et.al (social media instagram for promoting tourism in the eastern indonesia) fig. 1. comparison of traditional media and social media 2.2. instagram instagram is a social networking application initially made for sharing short photos and videos. as time goes by, instagram has also experienced relatively rapid development. many features have been added that attract users' interest. instagram's journey began in 2010 with systrom and krieger and was then acquired by facebook for 1 billion dollars in 2012. in 2013, among smartphone users, instagram was the fastest-growing media, and in 2016, it generated 1, 53 billion dollars, which is 8.4% of facebook's global mobile ad revenue [15]. not only as a social media, but instagram has also become one of the most popular marketing platforms due to its large number of users and visual excellence through user-generated content [16]. visual content effectively builds brand awareness, increases conversions, and facilitates information dissemination [17]. instagram has five pages in it, namely: • home this page contains posts uploaded by instagram accounts that users follow. besides that, it will automatically show other users who are uploading instagram stories, so this is where users can share information. some subsystems can be used, such as direct message • explore this page will display uploads from various accounts, including those users do not follow. usually, the uploads that are displayed are uploads that are currently popular and uploads that users frequently see. the types of posts displayed are not only photos but include videos and igtv. • upload photos and videos in the middle, there is a page for uploading photos or videos, which is the main feature of this application. 24 bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 1, march 2022, pp. 21-30 kusumasari et.al (social media instagram for promoting tourism in the eastern indonesia) • market furthermore, instagram provides a new page, namely the market. there will be displayed accounts offering their products so that instagram can be used as a medium for marketing products online. nevertheless, there are no buying and selling transactions between instagram sellers and users on instagram. • profile all settings regarding personal accounts can be arranged on this page. besides that, it will also display how the main page of the user's instagram account will appear, and this page will provide complete information about the account that is owned, complete with information on the number of followers. here are some of the main features of instagram: • photo and short video upload feature following the primary purpose of this application, instagram can share short photos and videos owned by users with other users. media that will be posted can be edited on instagram, such as using filters, after which the user can provide a caption along with hashtags. a feature can also mark another user's instagram account in the photo or video to be uploaded. • instagram story feature almost the same as the previous feature, this feature can also upload photos and videos. the difference is that the upload only lasts 24 hours. more than that time, the upload will be automatically deleted. just like the previous feature, videos and photos to be uploaded can be edited and tagged with other instagram users. • comments and likes feature this feature serves to provide feedback to the account owner. the account owner can find out the responses from other users, such as how many like the upload and the comment feature to provide interactions between instagram users. • search feature this feature is used to find other user accounts and hashtags to search for, making it easier for users to find their destination. 2.3. tourism tourism is a set of activities, either traveling outside the city, foreign or domestic, performed by an individual or family to travel from the place of origin to other places to travel and not for work or a place to live [18]. tourism is an economic sector that has a significant contribution to the economy. according to the central statistics agency (bps), tourist arrivals to indonesia in 2019 recorded a growth of 16.1 million or 1.88%, and the tourists are mainly from malaysia, singapore, china, australia, and timor leste. 3. method the method used in this research uses descriptive research where the results of this descriptive study will result in the form of interpretation of the researchers regarding a phenomenon or event following the existing situation and the emphasis on description. the data collection is done by observation on several social media accounts, such as instagram has tourism promotional content. the purpose of looking for some of these instagram accounts is to see facts that occur on social media and the impact of instagram as a promotional media and a means of promoting tourism in eastern indonesia. later, accounts with qualifications will be selected according to the research being carried out. the following is a collection of accounts that have tourism promotion content on instagram show in table 1. issn 2614-0047 bulletin of social informatics theory and application 25 vol. 6, no. 1, march 2022, pp. 21-30 kusumasari et.al (social media instagram for promoting tourism in the eastern indonesia) table.1 tourism instagram account reference instagram user name total post total followers total following verified information @lensaindonesiatimur 198 1.993 699 unverified @pesonaid_travel 1575 340.000 127 verified @wisatatimur 208 6.483 7.103 unverified @pariwisataindonesiaofficial 543 25.1rb 18 unverified @exploreindonesiatimur 45 538 23 unverified @kemenparekraf.ri 15.000 744rb 240 verified @pariwisata.jogjakota 573 13.1rb 300 verified @maluku_punya 1427 58.3rb 7.343 unverified @indonesiatraveler_official 439 9.468 12 unverified from the results of data collection carried out by researchers on each instagram account. several accounts were taken to be analyzed to answer the truth about influential instagram as a tourism promotion medium, namely @maluku_punya, and the following are the results of the analysis of these accounts: • instagram: @maluku_punya this account has 58.3 thousand followers, with a total of 1,426 posts that contain photos and videos about tourism in the maluku area. this account has several likes of more than 2,000 likes and has positive comments. the method taken by this account is by reposting posts from other accounts that have a suitable location and good image results and include the source of the account name. • instagram: @ kemenparekraf.ri the account has 744 thousand followers with 15 thousand posts and is the official account of the tourism and creative economy ministry. instagram has verified this account. the account contains photos and videos about travel and promotes activities such as seminars and others. the account has an average number of more than 2,000 likes and positive comments. the method taken by this account is by posting pure tourist location content from the account, with a description of the name of the place and a description of the location. the author will determine the research focus, namely analyzing the use of instagram social media on the @maluku_punya account with 7c framework elements and supporting and inhibiting factors for using instagram @maluku_punya social media in promoting eastern tourism. the following are the objectives of the 7c framework [19], including: • context: the look and feel of a display between the face and the user. • content: determines the digital information in the situation, including audio, video, images, and text. • community: forming a sense of membership through the involvement or attraction of the same. the community can be understood as a user interaction through one-to-one or one-to-many interaction. • customization: the ability of the site to display content appropriate for each user. • communication refers to the dialogue between the organization (company) and the user. 26 bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 1, march 2022, pp. 21-30 kusumasari et.al (social media instagram for promoting tourism in the eastern indonesia) • connection: the level at which a site can connect to other sites, usually displayed to users as underlined or highlighted text, images, or graphics. when the user clicks on the link, it will immediately display a text, graphic, sound file, or web page that combines these files. • commerce: an activity interface (interface) consumer supports the site to conduct financial transactions. this feature is the most important in a site that is more dominant in product sales, but it is also not uncommon in situations where information or services are dominated. functional tools that support e-commerce include, for example, registration, shopping carts, security with encryption and authentication technology, credit card approvals, orders through affiliates, configuration technology, order tracking, and shipping options. 4. results and discussion the research begins with analyzing the quantity and quality of content uploaded to the @maluku_punya account. the number of uploaded content on the @maluku_punya account in 2020 has an average of 10-20 uploads per month. the content varies, such as video posts, photos, and other (paid) content. nevertheless, unfortunately, in 2021, the @maluku_punya account was inconsistent; in 2020, the account did not download content in february and march. caption details in the travel content upload are pretty short. there are only tourist locations, reposted accounts, invitations to follow the @maluku_punya account, and three hashtags designed to attract more tourists. the hashtags are #mallow, #instamaluku, and #exploremaluku. the hashtag function helps bring up content that uses the hashtag that instagram users are looking for without needing to know the instagram account's name. on average, there are around 10 to 40 comments for each upload of travel content. the content of the comments mostly gives appreciation to the uploaded tourist destination content. meanwhile, there are only less than five comments on uploading promotional content. uploads in 2021 with the highest number of comments are on the upload of the togutil tribe content, which amounts to 40 comments. the content of the comments asks for the truth and continuity of the content because the content is incomplete. after making observations and collecting information data from the @maluku_punya social media account, the account will be linked to the 7c framework method following royport & jaworski's explanation. as follows: • context the look of the @maluku_punya instagram account is still simple. the profile picture is less attractive and does not use the instagram highlight feature. sponsored content does not follow the theme of tourism, such as endorsements of slimming products, clothes, and others. things like this can undoubtedly damage the appearance of @maluku_punya's instagram or disturb the reader's comfort because it comes from the concept presented by the @maluku_punya account. but the selection of images that are posted has good quality, such as pictures and videos that look clear and not blurry, have an aesthetic value to make them look attractive, and take proportional pictures. • content the digital information in the @maluku_punya instagram account is in the form of videos and images, along with detailed locations and captions made by the account owner. on this account, posts in the form of images and videos posts have a balanced composition. for example, in july 2020, the account uploaded 19 posts, including 10 photo posts, 3 video posts, and six other promotional content. besides that, in august 2020, the company uploaded 12 posts, including 3 photo posts, 7 video posts, and two other promotional content. from the research that has been done, it was found that within one month, the @maluku_punya account could post 10-20 pieces of content. however, unfortunately, this account tends to apply the reposting method by re-uploading posts from other accounts to the @maluku_punya account but still including the source account name from which the post was taken. each post is given an attractive caption and hashtag, making it easy for instagram users to find. issn 2614-0047 bulletin of social informatics theory and application 27 vol. 6, no. 1, march 2022, pp. 21-30 kusumasari et.al (social media instagram for promoting tourism in the eastern indonesia) • community using hashtags can make collecting or finding communities with the same interests and interests easier. for example, the @maluku_punya account uses the hashtag #exploremaluku with 62.4k similar posts. of course, the interaction between instagram users has somewhat interactive engagement • customization the content in @maluku_punya can attract the attention of instagram users. the types of natural tourism that are uploaded are various, such as beaches, islands, mountains, and buildings that have artistic value and meaning for the area. in addition to providing travel content, @maluku_punya also displays content through product promotions. although it is outside the concept of this account, product promotions it can be helpful for users. indeed, very useful for users. • communication communication is critical in providing information, where customers can dialogue about tourist attractions to be addressed, such as the place's location, facilities, etc. in this instagram social media, a comment column can function as a means of communication between followers and account owners. on the @maluku_punya account, this feature goes well, each post has at least one comment, but there is also a dodola beach video post located in maluku tenggara, indonesia, a source from the @ilhamarch account, which has more than 80 comments, and on average has positive comments, but those who comment are only @maluku_punya account visitors. communication will run better if the @maluku_punya account also responds to other users' comments. • connection on instagram social media, there is a feature in each post with a three-dot option at the top right, namely, report, copy the link, and share. with this feature, the @maluku_punya account can be connected to other social media, so it will help to share content on other social media. in addition, because the @maluku_punya account uses the repost method for each post, there is also a connection between the @maluku_punya account and other instagram accounts. • commerce there are financial transactions on the instagram account @maluku_punya, namely a paid promotion service. with the paid promotion, the goods, services, and tours will be displayed on the instagram post @maluku_punya, an example of paid promotion related to tourism is a culinary destination so that it can provide references to visitors to culinary in the eastern region. 4.1. supporting and inhibiting factors use of social media instagram on @maluku_punya account in promoting east regional tourism the supporting factor for using social media instagram @maluku_punya is that the instagram application can be downloaded for free and has various features, so this application has many users. instagram has more than 1 billion downloads. therefore, by utilizing social media, instagram can make it easier to find an audience and disseminate information easily and quickly. the content uploaded on instagram is in the form of short photos and videos, equipped with a like feature that can provide followers 'responses to uploads, a comment feature that can be an interaction between followers and account owners, a save feature that can function to increase followers' collections and there is a sharing feature that is used to share content with fellow instagram users. the @maluku_punya account also uses the hashtag feature on instagram to attract many people to view the account's content and create a community network with the same concept. instagram, there are also instagram ads that can make it easier to promote tourism content. instagram uses the leading media in the form of photos and videos so that it is possible to show the beauty and attractiveness of tourism. the inhibiting factor for using instagram social media on the @maluku_punya account is that even though the @maluku_punya account has 58.3 k followers, not all of its followers give likes and comments on every upload on their @maluku_punya account. so that the number of likes and comments is not proportional to the number of followers. this can be because the time users use instagram is different, and each user has different tastes. second, the spread of feedback from each user cannot be controlled because the comments column on instagram is free, so every 28 bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 1, march 2022, pp. 21-30 kusumasari et.al (social media instagram for promoting tourism in the eastern indonesia) @maluku_punya follower can comment freely, and it cannot be denied if there are negative comments on their uploads. these comments cannot be prevented quickly by the @maluku_punya account owner because, on instagram, there is no feature to filter out nasty comments, so the account owner performs manual methods such as deleting comments one by one. even though instagram has a story feature, the @maluku_punya account does not use this feature properly. this is quite unfortunate because the story feature is an instagram feature that instagram users often see. after all, instagram stories can be seen automatically on the home page without opening an @maluku_punya account. as for some of the content that should be on the @maluku_punya account, namely: • host a webinar and promote it by posting posters on the @maluku_punya instagram account, there are posts in the form of pictures or videos of nature tourism and some paid content (endorsement). promoting tourism on social media is not only about pictures or videos. digital media currently has various types, such as meetings or meetings that can be done virtually. example of application is zoom and google meet. with this facility, events such as seminars can be held online or remotely, so there is no need to come to a location (or it can be called a webinar). therefore, webinars can be implemented to introduce tourism, and existing webinar posters can be promoted through the @malukuiliki instagram account. • create original content so that it gives an original, attractive impression on the instagram account @maluku_punya, the majority repost uploads from other accounts, making the uploads on the account not have their characteristics. the @maluku_punya account should still create its content so that no other account has it, and it is original. in addition, it is necessary to add information that is not only the location but also the price of entrance tickets and a description of the location to attract visitors' attention. • providing information about eastern cultures, such as food, customs, etc., so that it does not seem monotonous not only uploading tourist locations, but in the @maluku_punya account, you can also add information about the eastern region, such as existing cultural customs and regional specialties, so that the content provided is not monotonous and followers do not feel boring, besides that it can also provide education or information to followers about the area • maximizing the features on instagram, such as highlights and igtv instagram has a variety of features that its users can use. one of the relatively new features is igtv and highlights. however, unfortunately, the @maluku_punya account does not take advantage of this feature. igtv is almost the same as uploaded videos on instagram, but what distinguishes is that the videos uploaded on igtv are longer than usual. moreover, the highlight is a feature that stores instagram stories, where instagram stories usually only last for 24 hours, so followers do not miss existing content and can review stories that have been uploaded for more than 24 hours • using the hashtag broader and more general in every post in the @maluku_punya account, hashtags are used, but unfortunately, only three hashtags are used, namely #maluku, #instamaluku, and #exploremaluku, so the search for hashtags by users is not widespread, only in the same section. meanwhile, if the hashtag is further expanded, it can help get a wider following, such as using the hashtags #indonesiatimur and #wisataindonesiatimur. 5. conclusion without realizing the development of technology is increasing, coupled with the wide range of social media on instagram. utilizing social media to disseminate information is the right decision, considering that social media can be downloaded for free and have many users. of course, it has slight advantages and disadvantages, but it still depends on how it is used. likewise, you can also take advantage of instagram social media in promoting tourism. as you know, indonesia has many regions, each with its sights. unfortunately, many tourist sites are still unknown to the public, especially in the issn 2614-0047 bulletin of social informatics theory and application 29 vol. 6, no. 1, march 2022, pp. 21-30 kusumasari et.al (social media instagram for promoting tourism in the eastern indonesia) eastern regions. so, choosing social media instagram to introduce tourism in the eastern area is the right choice. the instagram account @maluku_punya influences promoting eastern tourism. account 7c meets the six elements of the framework context, content, community, community, connection, commerce, and customization. in addition, there are supporting factors and obstacles in utilizing the @maluku_punya instagram account, such as the one instagram users are already quite a lot, but preventing nasty comments can not be done quickly. the disadvantages of the @maluku_punya account are that they do not take advantage of the features provided by instagram, and some content must be added, such as insight into the area such as customs, and culture. references [1] s.martha, “the analysis of geospatial information for validating some numbers of islands in indonesia,” indones. j. geogr., vol. 49, no. 2, p. 204, dec. 2017, doi: 10.22146/ijg.12792. [2] “maluku province in figures 2021,” statics of maluku province, 2021. [online]. available at: https://ppidutama.malukuprov.go.id/storage/2021/08/provinsi-maluku-dalam-angka2021_compress.pdf. [3] badan pusat statistik provinsi bali, “badan pusat statistik provinsi bali,” badan pusat statistik bali, 2018. accessed apr. 04, 2020. [online]. available at: https://bali.bps.go.id/publication/2018/08/16/. [4] “digital in indonesia: data report.”. accessed apr. 03, 2022. [online]. available at: https://datareportal.com/reports/digital-2021-indonesia. [5] “instagram users in indonesia november 2019,” napoleoncat. accessed apr. 04, 2020. [online]. available at: https://napoleoncat.com/stats/instagram-users-in-indonesia/2019/11/. [6] s. bregman, “uses of social media in public transportation,” uses soc. media public transp., 2012, doi: 10.17226/14666. [7] s. loeb, “social media makes global urology meetings truly global,” bju int., vol. 115, no. 2, p. 175, 2015, doi: 10.1111/bju.13027. [8] m. pittman and b. reich, “social media and loneliness: why an instagram picture may be worth more than a thousand twitter words,” comput. human behav., vol. 62, pp. 155–167, 2016, doi: 10.1016/j.chb.2016.03.084. [9] e. k. seltzer, n. s. jean, e. kramer-golinkoff, d. a. asch, and r. m. merchant, “the content of social media’s shared images about ebola: a retrospective study,” public health, vol. 129, no. 9, pp. 1273– 1277, 2015, doi: 10.1016/j.puhe.2015.07.025. [10] y. benkler, h. roberts, r. faris, a. solow-niederman, and b. etling, “social mobilization and the networked public sphere: mapping the sopa-pipa debate,” ssrn electron. j., 2013, doi: 10.2139/ssrn.2295953. [11] p. l. roth, p. bobko, c. h. van iddekinge, and j. b. thatcher, “social media in employee-selectionrelated decisions: a research agenda for uncharted territory,” j. manage., vol. 42, no. 1, pp. 269– 298, 2016, doi: 10.1177/0149206313503018. [12] t. dong, c. liang, and x. he, “social media and internet public events,” telemat. informatics, vol. 34, no. 3, pp. 726–739, jun. 2017, doi: 10.1016/j.tele.2016.05.024. [13] s. brooks, “computers in human behavior does personal social media usage affect efficiency and well-being ?,” comput. human behav., vol. 46, pp. 26–37, 2015, doi: 10.1016/j.chb.2014.12.053. [14] e. gazali, “learning by clicking: an experiment with social media democracy in indonesia,” int. commun. gaz., vol. 76, no. 4–5, pp. 425–439, jun. 2014, doi: 10.1177/1748048514524119. [15] i. bruns, “‘ perceived authenticity ’ and ‘ trust ’ in social media driven influencer marketing and their influence on intentions-to-buy of 18-24-year-olds in ireland,” pp. 1–135, 2018. [online]. available at: https://esource.dbs.ie/bitstream/handle/10788/3536/. [16] a. duffy, “the road more travelled: how user-generated content can lead to homogenized travel journalism,” continuum (n. y)., vol. 29, no. 6, pp. 821–832, 2015, doi: 10.1080/10304312.2015.1073686. https://doi.org/10.22146/ijg.12792 https://ppidutama.malukuprov.go.id/storage/2021/08/provinsi-maluku-dalam-angka-2021_compress.pdf https://ppidutama.malukuprov.go.id/storage/2021/08/provinsi-maluku-dalam-angka-2021_compress.pdf https://bali.bps.go.id/publication/2018/08/16/9c43969415935571f5436925/provinsi-bali-dalam-angka-2018.html https://datareportal.com/reports/digital-2021-indonesia https://napoleoncat.com/stats/instagram-users-in-indonesia/2019/11/ https://doi.org/10.17226/14666 https://doi.org/10.1111/bju.13027 https://doi.org/10.1016/j.chb.2016.03.084 https://doi.org/10.1016/j.puhe.2015.07.025 https://doi.org/10.2139/ssrn.2295953 https://doi.org/10.1177/0149206313503018 https://doi.org/10.1016/j.tele.2016.05.024 https://doi.org/10.1016/j.chb.2014.12.053 https://doi.org/10.1177/1748048514524119 https://esource.dbs.ie/bitstream/handle/10788/3536/mba_bruns_i_2018.pdf?sequence=1&isallowed=y. https://doi.org/10.1080/10304312.2015.1073686 30 bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 1, march 2022, pp. 21-30 kusumasari et.al (social media instagram for promoting tourism in the eastern indonesia) [17] livia bjurling and victor ekstam, “influencer marketing ’ s effect on brand perceptions – a consumer involvement perspective,” pp. 1–102, 2018. [online]. available at: https://lup.lub.lu.se/luur/download?func=downloadfile&recordoid=8949706&fileoid=8949707. [18] c. cooper, tourism: principles & practise. england: longman group limited, pp. viii + 290, 1993.[online]. available at: https://www.cabdirect.org/cabdirect/abstract/19931860314. [19] j. f. rayport and b. j. jaworski, “introduction to e-commerce, second edition.,” 2004. [online]. available at: https://repository.vnu.edu.vn/handle/vnu_123/82604. https://lup.lub.lu.se/luur/download?func=downloadfile&recordoid=8949706&fileoid=8949707 https://www.cabdirect.org/cabdirect/abstract/19931860314 https://repository.vnu.edu.vn/handle/vnu_123/82604 bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 2, december 2022, pp. 132-145 132 https:doi.org/10.31763/businta.v6i2.507 the readiness analysis of smart school implementation using technology readiness index to support smart city implementation m. khairul anam a,1,*, indra prayogo a,2, susandri a,3, yoyon efendi a,4, erlin b,5, nurjayadi a,6 a stmik amik riau, jl, purwodadi indah km. 10 panam, pekanbaru 28294, indonesia b pelita indonesia institute of business and technology jl. jend. ahmad yani no.78-88, karam island, kec. sukajadi, pekanbaru, indonesia 1 khairulanam@sar.ac.id ; 2 indradmi741@gmail.com; 3 susandri@sar.ac.id; 4 yoyonefendi@stmik-amik-riau.ac.id; 5 erlin@lecture.pelitaindonesia.ac.id; 6 nurjayadi@sar.ac.id * corresponding author 1. introduction smart city is defined as a city that can improve the quality of life of its citizens by managing all their lives and resources effectively and efficiently through innovative, integrated, and long-term solutions [1]. in its application, the use of ict-based technology has a unique role as one of the buffers of a smart city. pekanbaru city itself already has a pekanbaru smart city master plan for 2018-2025, in which one of the pillars is smart people. one of its supporting agendas is smart schools encouraged to accelerate pekanbaru city into smart city [2]. some innovative city programs the pekanbaru government has run include community empowerment based on community harmony of citizens, plenary mosque, pekanbaru command center, and civil smart cards [3]. in contrast, in the education office, children's identity cards or kia will be applied in smart schools, which serve as attendance and payments such as school canteen [4]. the aspect discussed in this study itself was smart schools. smart schools are the concept of using technology in education to help the learning process and improve performance by creating, using, and managing adequate processes and sources of technology. the main objective of applying technology in learning is to solve learning problems, facilitate learning, and improve performance [5]. for example, this helps the interaction between the school community, students, and teachers more easily. a r t i c l e i n f o a b s t r a c t article history received october 20, 2022 revised november 20, 2022 accepted december 3, 2022 smart schools have been widely applied in several schools within the scope of education and services as they are being encouraged to support smart city. smart schools is a school concept utilizing information technology used in the teaching and learning process in the class and school administration. one of the schools in pekanbaru city that will implement intelligent schools in junior high school 17 pekanbaru. building smart schools themselves is adequate infrastructure such as servers, labor, and integrated systems and the readiness of schools and students to implement smart schools in the future. therefore, to determine the readiness level of prospective users of the smart schools concept, the technology readiness index (tri) method with four personality variables; optimism, innovativeness, discomfort, and insecurity. the purpose of this research was to find out the readiness index of prospective users in the implementation of smart schools and see what factors need to be improved from the readiness of prospective users. this research was expected to help junior high school 17 prepare schools to become smart schools to support smart city implementation in pekanbaru. this is an open access article under the cc–by-sa license. keywords smart schools junior high school 17 pekanbaru technology readiness index https://doi.org/10.31763/businta.v6i2.507 mailto:khairulanam@sar.ac.id http://creativecommons.org/licenses/by-sa/4.0/ http://creativecommons.org/licenses/by-sa/4.0/ issn 2614-0047 bulletin of social informatics theory and application 133 vol. 6, no. 2, december 2022, pp. 132-145 anam et.al (the readiness analysis of smart school implementation using technology readiness index to support smart) in the application of the smart school concept, several factors affect it, requiring at least the readiness of students to use technology, a supportive learning environment, and learner participation are among the challenges in building this smart school concept. several junior high schools in pekanbaru city have implemented the concept of smart schools, namely children's identity cards (kia). smart schools serve as a means of attendance and payment and are expected to facilitate administration and initiate the use of non-cash payment systems [6]. for junior high school 17 pekanbaru, which has not implemented smart schools, the results of this readiness analysis are expected to be used as a comparison to find out the readiness of all school members in utilizing technology in this smart schools concept whether it can run smoothly or will burden and get a rejection from the human resource aspect. the readiness of human resource plays a vital role in the application of information and communication technology. the implementation of the concept of smart schools must also consider the readiness of teachers and students to adapt to technology. one of the reasons for the failure of it implementation is that the lack of readiness causes the implementation process to take longer than planned and causes the implementation team to lose morale [7]. evaluation can be done with several methods, such as research to conduct readiness analysis [8]. measurement of e-readiness uses stope framework in the process of applying for academic leave of higher education, and stope is used to measure the readiness of old and new it services [9]. another method is the technology readiness index (tri) [10], which measures user readiness for new technology. because the stope framework was unsuitable for this study, researchers used the technology readiness index (tri) because smart schools (smart cards) is a new technology. tri can also distinguish well between users and non-users of a technology. tri is formed by four personality variables; optimism, innovativeness, discomfort, and insecurity [11]. responses from potential users will be used, and it is expected to speed up the process of technology adoption [12]. some previous studies with almost the same case studies were presented, such as research, which evaluated user readiness, and in research [13], tr was used for the readiness of prospective users of the student entrepreneur and internship program (seip). the study [14] analyzed the readiness of children's encyclopedia users, resulting in readiness at the high technology readiness level with a value of 3.6, judging from the optimism variable that contributed the most significant value. then [15] analyzed the readiness level of qr code attendance users, which was 2,713, which means it is still low (low technology readiness). research conducted technology readiness index was used to measure the readiness of prospective users of the smart school (smart card) concept that can later be used as attendance, administrative and financial recap, e-report card, and viewing student attendance details. this research was expected to help in the analysis of human resources and the use of technology that has been running to find out the readiness of junior high school 17 pekanbaru in implementing smart schools, and also so that it could be used as a reference in preparing to move to the concept of smart schools in junior high school 17 pekanbaru and other junior high schools that are planned to implement this smart schools, both in terms of technology and human resources readiness such as teachers, students, as well as parents of students. 2. method research methodology is a technique that researchers compile to collect data and information in conducting research that suits the subject and object studied, with these data are expected to obtain quality results. 2.1. type of research this research used a quantitative research approach. quantitative data is obtained from data collection conducted through surveys and data analysis in the form of statistics. the survey was conducted using questionnaires distributed to respondents in the scope of junior high school 17 pekanbaru, while data analysis was done statistically using statistical data processing applications, namely spss. sampling techniques are generally done randomly. data was collected using research instruments, quantitative data analysis/statistics to test established hypotheses [16]. 134 bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 2, december 2022, pp. 132-145 anam et.al (the readiness analysis of smart school implementation using technology readiness index to support smart) 2.2. research object the object of the research was the concept of smart schools, which is similar to that that the pekanbaru government has applied in the form of smart cards and data obtained from respondents who were prospective smart card users. the smart school concept that will be applied to junior high school 17 pekanbaru can later be used for attendance tools, administrative and financial recaps, checking e-report cards or student grades, and seeing student attendance details. respondents were all members of junior high school 17 pekanbaru school. 2.3. research stages the research stage is a sequence of research steps carried out by researchers. an overview of the research stages can be seen in the fig. 1. fig. 1. research methodology flow 2.3.1. problem identification identification of problems is carried out as a first step in the research process. identifying problems in this study was to observe and find problems in the readiness of human resources in junior high school 17 pekanbaru to adopt smart school technology. it is started with how the condition of the technology infrastructure in the school, how the use of technology by school residents and what obstacles are experienced, and other things that affect the level of readiness of teachers, parents, and students in the implementation of the smart school concept in the future. a little overview of the concept of smart school (smart card) that will be applied later can be used as an attendance tool, administrative and financial recap, e-report card, and see the details of student attendance. previously in 2019, the pekanbaru city government launched the smart schools (smart card) program. besides, three regional device organizations will carry out the functions of this smart card program. they are the health office, the education office, and the transportation office. the health office, in addition to this card service, stores data and develops patient health. at the transportation office, smart cards will be applied at trans metro pekanbaru. meanwhile, in the education office, smart cards will be applied by smart schools that serve as payments in the school canteen to encourage people to get used to digital transactions, and some schools also use it as an attendance tool [17]. issn 2614-0047 bulletin of social informatics theory and application 135 vol. 6, no. 2, december 2022, pp. 132-145 anam et.al (the readiness analysis of smart school implementation using technology readiness index to support smart) here is a comparison of the old information system flowcharts running in junior high school 17 pekanbaru and the smart school concept. • diagram of business processes currently running as show in fig. 2. fig. 2. current business process diagram deficiency; 1) attendance data, administration, and scores can be damaged or lost because they are stored in manual form; 2) there can be fraud in taking absences manually; 3) there can be data redundancies for students. • diagram of expected business processes (smart schools) as show in fig. 3. fig. 3. expected business process diagram 136 bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 2, december 2022, pp. 132-145 anam et.al (the readiness analysis of smart school implementation using technology readiness index to support smart) advantages; 1) there are no redundancies in attendance, administration, and grades for students; 2) there is no cheating of absenteeism, administration, and grades in students; 3) data can be stored safely and accurately; 4) transparency of data that can be seen directly by the student's guardian through the system. 2.3.2. literature studies the literature study method is a series of activities related to collecting library data, reading, recording, and managing research materials [18]. in this study, problems were obtained by reading the appropriate and supporting literature from books and journals related to the technology readiness index method. in addition, this literature study was conducted to learn about matters related to the readiness of school human resources in implementing the smart school concept, such as government policies regarding the pekanbaru smart city master plan. literature can be in the form of scientific journals, scientific articles, books, or information from internet sites that can be used as references in the work of this thesis. 2.3.3. sample determination in determining the number of samples, researchers use the slovin formula, which is commonly used with an error level between 5% and 10%. 𝑛 = 𝑁 1+𝑁𝑒2 () information : n = number of samples searched n = population size e = the margin of error value (significant error) of population size using the slovin formula, researchers took samples from junior high school 17 pekanbaru with 85 (error level 10%) 240 (error level 5%) of the total number of learners, 586, and teachers with staff, which were 39. the respondents were selected by random sampling, which took samples randomly [19]. the respondents who would fill out the questionnaire were students from grades 1–3, teachers, and guardians of students. in this sampling, researchers considered the population, time constraints, and conditions of the covid-19 pandemic as it is now because 100 to 200 samples are the ideal starting point in the analysis. 2.3.4. research model using technology readiness index method research variables are everything that is set by researchers to be studied, so that information about it is obtained, then concluded. the indicators used were 16 tri 2.0, with four items for each dimension. of the 16 items, 11 were in tri 1.0, while five were new (2 were in optimism dimensions, and three were in the dimension of insecurity). this study used questionnaires to determine student readiness responses in applying the concept of smart schools. the questionnaire consisted of several questions and statements related to readiness in the utilization of technology for learning, and each question has four types of answers assessed on the likert scale. measurements were made by using the likert scale. the scale will be used by respondents to choose from each list of questions in the questionnaire. another variation of the likert scale was used in this study: removing neutral responses [20]. likert scale as show in table 1. table.1 likert scale answer options abbreviation likert scale strongly disagree sd 75%-100% disagree d 50%-74.99% agree a 25%-49.99% strongly agree sa 0%-24.99% issn 2614-0047 bulletin of social informatics theory and application 137 vol. 6, no. 2, december 2022, pp. 132-145 anam et.al (the readiness analysis of smart school implementation using technology readiness index to support smart) in this study, reverse coding was used for negative variables. the weight used in statements that have done reverse coding can be seen in table 2. table.2 likert reverse coding scale answer options abbreviation likert scale strongly agree sa 75%-100% agree a 50%-74.99% disagree d 25%-49.99% strongly disagree sd 0%-24.99% 2.3.5. research instrument testing instrument testing was conducted on a sample of 35 pilot test respondents. instruments were in the form of questionnaires distributed to the sample of respondents. after obtaining the questionnaire results, validity and reliability tests were conducted. tools for measuring this test used spss 25.0. 2.3.6. data collection and processing data collection is an activity carried out to obtain the necessary information to achieve a study's goals. at this stage, researchers collected data through interviews and questionnaires. due to the constraints of the situation during the covid-19 pandemic, the researchers cannot make maximum observations. data collection with interviews would be carried out with teachers or it staff within the scope of the school, as well as data collection with questionnaires carried out to teachers, students, and students’ guardians as respondents. the interview and observation location was at junior high school 17 pekanbaru. the location of data collection through questionnaires was also within the scope of the junior high school 17 pekanbaru area. 1. interview the researcher conducted the interview at school it parties regarding the use of existing technology by teachers and students. but, from the results of the initial interview that researchers conducted with the school's it, there were still obstacles experienced, among others, • all were done manually at junior high school 17 pekanbaru and still used print/paper media, starting from the absence of teachers and students, administration, to student data. • there were still some constraints on school it facilities for teachers and students, such as the use of computers laboratory that must be alternated and small bandwidth/internet speed in schools. • there was still a lack of procurement of other it facilities that could support the concept of smart school. teachers must have their laptops. the limited number of hotspots in schools significantly affects teachers in utilizing technology 2. questionnaire spread sampling in this study utilized random sampling and non-probability sampling techniques whose determination takes samples randomly based on the consideration that the concept of smart schools will be used for all school residents. the questionnaire became a medium to determine respondents' feedback on technology adoption plans such as smart schools (smart cards). the questionnaire refers to the technology readiness index (tri) variables, which will be made based on a literature review. this is because the written questionnaire is also based on the problems to be discussed, so the author must conduct validity and reliability tests. the distribution of questionnaires to respondents in junior high school 17 pekanbaru can be seen in table 3. table.3 questions/questionnaire statements deployment method valid invalid total online 138 0 138 live 138 bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 2, december 2022, pp. 132-145 anam et.al (the readiness analysis of smart school implementation using technology readiness index to support smart) 2.3.7. data analysis based on the results of the spread of the questionnaires, which used valid data, the next stage of data processing was carried out by grouping data according to the specified variables. variables that had negative values were reverse coding. the technology readiness index (tri) assessment was calculated from the mean value of each questionnaire multiplied by the weight of each statement. the weight of each statement was obtained from the total weight of the variable divided by the number of statements of each variable. after obtaining the weight of each statement of n, the mean value of the statement was multiplied by the weight of each statement to get the total score for each statement. the variable score is obtained from the total number of statement scores present in the variable. the total score of tri was obtained from the sum of all variable values. calculating the tri value of each variable can be seen from the following equation. 𝐵𝑜𝑏𝑜𝑡 𝑃𝑒𝑟𝑛𝑦𝑎𝑡𝑎𝑎𝑛 = 25% ∑ 𝑃𝑒𝑟𝑛𝑦𝑎𝑡𝑎𝑎𝑛 𝑉𝑎𝑟𝑖𝑎𝑏𝑙𝑒 () 𝑁𝑖𝑙𝑎𝑖 𝑃𝑒𝑟𝑛𝑦𝑎𝑡𝑎𝑎𝑛 = ∑ (𝑗𝑢𝑚𝑙𝑎ℎ 𝑗𝑎𝑤𝑎𝑏𝑎𝑛 𝑋 𝑠𝑘𝑜𝑟 𝑗𝑎𝑤𝑎𝑏𝑎𝑛 𝐽𝑢𝑚𝑙𝑎ℎ 𝑅𝑒𝑠𝑝𝑜𝑛𝑑𝑒𝑛 () 𝑁𝑖𝑙𝑎𝑖 𝑉𝑎𝑟𝑖𝑎𝑏𝑙𝑒 = ∑ 𝑁𝑖𝑙𝑎𝑖 𝑃𝑒𝑛𝑦𝑎𝑡𝑎𝑎𝑛 () 𝑁𝑖𝑙𝑎𝑖 𝑇𝑅𝐼 = ∑ 𝑆𝑘𝑜𝑟 𝑣𝑎𝑟𝑖𝑎𝑏𝑙𝑒 () the category of the level of readiness in the application of the technology readiness index developed by [10] is: 1. low technology readiness: if tri =< 2.89 2. medium technology readiness: if tri 2.90 =< tri =< 3.51 3. high technology readiness: if tri > 3.51 2.3.8. result and discussion the discussion of the results in this research data presents and discusses the data obtained descriptively. after all the data were collected, an analysis was carried out in this study, namely statistical analysis using spss 25.0. analysis conducted by researchers in this stage was done by testing the validity and reliability of research instruments. • validity test the purpose of the validity test is to determine the degree of validity of the questionnaire used to collect assessment results data [21]. this test is done by comparing the number r count and r table. if the r count is more significant than the r table, then the item is said to be valid, and vice versa. if the r count is more minor than the r table, then the item is said to be invalid. r count is searched using the spss program, while the r table is searched by looking at table r with the minimum r provision is 0.3 [22]. • in reliability testing, there is a value to measure the level of reliability using the tri instrument. this test is done by comparing the cronbach alpha number with the provision that the cronbach alpha value is at least 0.6, meaning that if the cronbach alpha value obtained from the spss calculation results is more significant than 0.6, it is concluded that the questionnaire is reliable [23]. conversely, if cronbach's alpha is smaller than 0.6, it is concluded that the questionnaire is unreliable. next is the interpretation of the results. the researchers discussed the results of a demographic analysis of respondents with current field conditions and translated the quantitative statistical model analysis results by comparing and considering several related literatures. furthermore, the analysis and interpretation results will be fully explained in the results and discussions. 2.3.9. recommendations it contains a summary of the processes and results obtained as well as answers from the formulation of the problem, which is then given recommendations for all the results obtained. recommendations are in the form of input for policymakers on what is expected to improve the level of readiness that is issn 2614-0047 bulletin of social informatics theory and application 139 vol. 6, no. 2, december 2022, pp. 132-145 anam et.al (the readiness analysis of smart school implementation using technology readiness index to support smart) still lacking related to the implementation of the smart schools concept both for junior high school 17 pekanbaru and parties who intend to conduct further research. 3. results and discussion 3.1. demographic data at this stage, the researchers analyzed the answers to questionnaires that respondents had filled out, especially in the respondent profile section that would produce short demographic information. this is related to the respondent's name and the respondent's role in the school. the data the researchers managed to collect currently were 138 respondents who were teachers, parents, and students, with 138 valid and 0 invalid data. demographic analysis results can be see in table 4. table.4 demographics of respondents category number percentage students 86 62.3% student guardian 17 12.3% teacher / educator 35 25.4% total 138 100% based on the table above, the results of a brief questionnaire filled out by 35 respondents at junior high school 17 pekanbaru from the teacher, student guardian, and student parties were known to be mainly from the teachers, which were 35 respondents (25.4%), student guardians as many as 17 respondents (12.3%), and 86 respondents (62.3%) from students. 3.2. questionnaire result 3.2.1. validity the measurement to find the results of validity with the test criteria is if the r count is more excellent than the r table with a significant level of 5%, then it can be stated that the instrument item is valid, and vice versa if r calculates smaller than r table with a significant level of 5% then the instrument item is invalid. moreover, from the test results, it was obtained that 16 instrument items for teachers / guardians of students and 16 items of instruments for students with slight language adjustments with the same question had r count values > r table. it proved that the research instrument item was declared valid. the questionnaires measured in this study were optimism, innovation, discomfort, and insecurity. more details can be seen in the table 5 to table 12. table.5 validity of optimistic questionnaire items of teachers and parents question item rcount significance value description opt1 0.520 0.001 valid opt2 0.429 0.010 valid opt3 0.483 0.003 valid table.6 validity of teacher and parent innovative questionnaire items question item rcount significance value description inv1 0.566 0.000 valid inv2 0.521 0.001 valid inv3 0.406 0.016 valid inv4 0.379 0.025 valid table.7 validity of teacher and parent discomfort questionnaire items question item rcount significance item description dis1 0.405 0.016 valid dis2 0.508 0.002 valid dis3 0.336 0.049 valid dis4 0.385 0.022 valid 140 bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 2, december 2022, pp. 132-145 anam et.al (the readiness analysis of smart school implementation using technology readiness index to support smart) table.8 validity of teacher and parent insecurity questionnaire items question item rcount significance item description ins1 0.502 0.002 valid ins2 0.351 0.039 valid ins3 0.384 0.023 valid table.9 validity of optimistic items of student questionnaires question item rcount significance item description opt1 0.435 0.001 valid opt2 0.311 0.023 valid opt3 0.410 0.002 valid opt4 0.482 0.000 valid table.10 validity of innovative items student questionnaire question item rcount significance item description inv1 0.283 0.040 valid inv2 0.364 0.007 valid inv3 0.408 0.002 valid inv4 0.365 0.007 valid table.11 validity of student questionnaire discomfort items question item rcount significance item description dis1 0.275 0.047 valid dis2 0.335 0.014 valid dis3 0.518 0.000 valid dis4 0.662 0.000 valid table.12 validity of student questionnaire insecurity items question item rcount significance value description ins1 0.534 0.000 valid ins2 0.579 0.000 valid ins3 0.516 0.000 valid 3.2.2. reliability several valuable question items were then tested for reliability. reliability indicates the degree of reliability if the instrument used can produce almost the same data at different times and places [24]. the criteria for reliability test testing is that if it is greater than with a significant level of 5% (0.05), then it can be stated that the measuring instrument is reliable, and vice versa. if it is smaller than the measuring instrument, it is not reliable. moreover, the results of reliability test tests can be seen in the table 13. table.13 results of the research instrument reliability test question segmentation rtable recount (cronbach alpha) information teacher and student guardian 0.334 0.689 reliable student 0.266 0.702 reliable 3.2.3. tri value the tri test is used to analyze the extent of a person's readiness to adopt the latest technologies around them. four measurement variables that can be used to measure how far a person's readiness with existing technology are: optimism, innovation, discomfort, and insecurity. using these four variables will make it easier to assess a person's readiness for new technologies existing today. in this study, the level of readiness of prospective users in junior high school 17 pekanbaru was observed and analyzed with the tri method. the tri value calculation method is calculated from the mean issn 2614-0047 bulletin of social informatics theory and application 141 vol. 6, no. 2, december 2022, pp. 132-145 anam et.al (the readiness analysis of smart school implementation using technology readiness index to support smart) value of each questionnaire associated with the weight of each statement. each variable weighs a total of 25%. the total weight is then divided by the number of statements of each variable. after gaining the weight of each n statement, the mean value of the statement is multiplied by the weight of each statement to get a total score. the variable score is obtained from the total number of statement scores presented in the variable. the total tri score is obtained from the sum of the values of all variables. after collecting and testing, the following results show in table 14. table.14 tri-teacher test results no variable tri value 1. optimism 0.79 2. innovativeness 0.81 3. discomfort 0.55 4. insecurity 0.56 total value of tri 2.71 based on table 14 above, it can be known that innovative variables had the most significant contribution of 0.81, and the second-largest value of variables was optimism 0.79, which means that educators at junior high school pekanbaru had an innovative attitude to adopt and utilize technology. the level of discomfort and insecurity had a lower value than the value of optimism and innovation. if summed up, the tri value was 2.71. the tri value < 2.89 was included in the low technology readiness index category, meaning prospective users tended to have a low level of readiness to adopt the technology. tri parental test results as show in fig. 5 table.15 tri parental test results no variable tri value 1. optimism 0.85 2. innovativeness 0.87 3. discomfort 0.81 4. insecurity 0.82 total value of tri 3.35 table 15 shows that the variable with the most significant innovative contribution was 0.87, and the second largest value of the variable was optimism 0.85. this means that the parents of students also had an innovative attitude to adopting and utilizing technology. the level of discomfort and insecurity had a high value. this certainly raises doubts and can weaken the process of adopting new technology. if summed, the value of tri was 3.35. the tri value between 2.90 =< and =< 3.51 was included in the category of medium technology readiness index, in which the score obtained is high and can be said to be ready. tri students test results as show in table 16. table.16 tri-student test results no variable tri value 1. optimism 0.92 2. innovativeness 0.90 3. discomfort 0.63 4. insecurity 0.64 total value of tri 3.09 based on table 16 above, it is clear that the optimism variable contributes the largest, which was 0.90, and the second most significant value of the variable was innovative 0.90, which means that students at junior high school 17 pekanbaru welcomed new technological innovations and were ready to adopt and utilize technology. however, the level of discomfort and insecurity still had a lower value than the value of optimism and innovation. if summed, the tri value was 3.09. tri values were between 142 bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 2, december 2022, pp. 132-145 anam et.al (the readiness analysis of smart school implementation using technology readiness index to support smart) 2.90 =< and =< 3.51, belonging to the category medium technology readiness index, which means prospective users tend to have a sufficient level of readiness to adopt the technology. 3.3. discussion before the discussion, the researchers segmented the tri score based on four tri variables, namely, optimistic, innovative, discomfort, and insecurity, so it is easier to classify, and the classification is divided according to 3 roles, namely, teachers, parents, and students. the results of segmentation can be seen in the table 17. table.17 teacher type segmentation results no variable mean value 1. optimism 3.18 medium 2. innovativeness 3.24 medium 3. discomfort 2.22 low 4. insecurity 2.26 low for the teacher segmentation type, most respondents fell into the explorer segmentation category, which can be seen in table 17 above. the character of the explorer segment is that they have a relatively high interest and motivation towards new technologies and have a sense of comfort and security when using new technologies because it has a low value of insecurity and discomfort. paren type segmentation results as show in table 18. table.18 paren type segmentation results no variable mean value 1. optimism 3.39 medium 2. innovativeness 3.46 medium 3. discomfort 3.25 medium 4. insecurity 3.27 medium for the type of parent segmentation, overall, most respondents were in the pioneer segmentation category. the character of the pioneer segment is that the existence of new technologies quickly attracts them because they have a high value of optimism and innovation, but at the same time, they will quickly stop trying if they face inconvenience and insecurity because their value is high. student type segmentation results as show in table 19. table.19 student type segmentation results no variable mean value 1. optimism 3.67 high 2. innovativeness 3.62 high 3. discomfort 2.53 low 4. insecurity 2.57 low in the type of student segmentation, overall respondents include in the category of explorer segmentation. the character of the explorer segment is that students have a high interest in and motivation for new technologies. they may also feel comfort and security while adopting new technologies, but the value of insecurity and discomfort was on the verge of medium-low. from table 19 which shows that the statistics of the instruments have been grouped into each research variable. the total tri score for teachers obtained in this study was 2.71, the total score of parents was 3.35, and the total student score was 3.09. if the total number of scores of each was combined, the total accumulation of scores was 3.05. then it can be concluded that the level of readiness of prospective smart school users was still at the moderate level or medium technology readiness. this is because the total value of tri was between 2.90 =< and =< 3.51. overall, innovative and optimistic variable items got the most outstanding value around mediumhigh, but the variables of discomfort and insecurity still had lower values and were at a low level. issn 2614-0047 bulletin of social informatics theory and application 143 vol. 6, no. 2, december 2022, pp. 132-145 anam et.al (the readiness analysis of smart school implementation using technology readiness index to support smart) this is what needs to be considered in improving the readiness of prospective users in the adoption of smart schools technology later. in the tri category described in the theory study section, optimism and innovativeness values contributed the most to the total tri value, which was at least 3.24 and 3.18 in the medium category. this shows that school residents at junior high school 17 pekanbaru owned a positive view of technology, where technology gave positive benefits to their work, and users also had an innovative nature in adopting technology and utilizing the technology around them. it could be seen from statements number 1, 3, and 9 that the existence of new technologies quickly attracted them because they possess a high value of optimism and innovation, but at the same time, they would quickly stop trying if they faced the discomfort and insecurity because they had a low value. the insecurity variable got a low value of at least 2.26. this shows that prospective smart school users felt uncomfortable using smart schools and were still hesitant to apply the technology thoroughly in all areas. the discomfort variable also had a value that was also still low, which was at least 2.22. this is because when there are uncomfortable conditions, the influence of doubt is due to the lack of understanding of prospective users about the use of smart schools (smart card) technology. the constraints of technology mastery are not a problem for the prospective user because the smart schools (smart card) performance will be more efficient and minimize human error if done automatically by using technology. as in the question "i quickly understand the technology that exists today," which got a mean value of 3.47. for the total accumulated value of the tri score from 3 roles of respondents, namely teachers, parents, and students, it obtained an average final result of 3.05, which means that there will not be many obstacles in the technology adoption process. 3.4. recomendation based on the results of research that has been conducted, here are some recommendations to improve the level of readiness that is still lacking related to the application of the concept of smart schools and parties who intend to conduct further research, namely. • judging from the factors of insecurity that fall into the low category, all processes that will be automatized by using smart schools (smart cards) will be expected to be more transparent in the procurement process and more straightforward system workflow. thus, it can increase the sense of security of the school and students to apply the system in the future. • judging from the low inconvenience factor, when adopting the smart schools (smart card) system, it is expected to increase to provide information about how it works and its use which is easily understood to provide convenience and comfort, which will strengthen the perception of prospective users in which smart schools can facilitate activities such as attendance, administration, and tracking values to be more efficient because it has been done automation with technology. • it is expected that for further research, the application of the concept of smart schools can get a reference from this study to increase readiness in the application by paying more attention to factors that are still weak or the least valuable, namely discomfort and insecurity factors so that the application of the intelligent schools (smart card) concept can run optimally. 4. conclusion based on the results of the analysis and research that has been done, it can be concluded that the level of readiness of prospective smart school users after being accumulated from the segmentation of teachers, parents, and students is 3.05. the tri value is between 2.90 =< and =< 3.51. this indicates that the readiness level of prospective smart school users is still in the medium category (medium technology readiness), which means that the school is quite ready to adopt smart schools technology. however, some improvements are still needed in the development from the human resource side. then the innovativeness value contributes the most to the total tri value, which is at least 0.81 (in the segmentation of teacher scores). this shows prospective smart school users are quickly attracted by new technologies such as this smart schools concept. 144 bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 2, december 2022, pp. 132-145 anam et.al (the readiness analysis of smart school implementation using technology readiness index to support smart) furthermore, the optimism value gives the second-largest score in the total tri score with a minimum score of 0.79 (in the segmentation of the teacher score). this shows prospective smart school users have a good view of smart school technology. they believe that smart schools can positively impact learning activities in their schools. discomfort and insecurity variables contribute to lower tri values with minimum values of 0.56 and 0.55 (in teacher score segmentation). this shows that prospective smart school users feel uncomfortable using smart schools and are still hesitant to apply the technology thoroughly in all areas. references [1] f. anindra, s. h. supangkat, and r. r. kosala, “smart governance as smart city critical success factor (case in 15 cities in indonesia),” proceeding 2018 int. conf. ict smart soc. innov. towar. smart soc. soc. 5.0, iciss 2018, pp. 1–6, 2018, doi: 10.1109/ictss.2018.8549923. [2] pekanbaru city government, pekanbaru mayor regulation no 56 of 2019 concerning the pekanbaru smart city master plan. 2019. [online]. available at: available at: https://jdih.pekanbaru.go.id/ . [3] g. meiwanda, “challenges of smart city: local government in pekanbaru city and community,” in proceedings of the annual conference of indonesian association for public administration (iapa 2019), mar. 2020, pp. 40–53, doi: 10.2991/aebmr.k.200301.003. [4] e. estopace, “next up: school id that doubles as payment card,” philstar, 2017. accessed apr. 13, 2021. [online]. available at: https://www.philstar.com/business/technology/2017/02/20/1673272/ . [5] r. phungsuk, c. viriyavejakul, and t. ratanaolarn, “development of a problem-based learning model via a virtual learning environment,” kasetsart j. soc. sci., vol. 38, no. 3, pp. 297–306, sep. 2017, doi: 10.1016/j.kjss.2017.01.001. [6] a. lutfi, f. saidi, and m. watfa, “a ubiquitous smart educational system: paving the way for big educational data,” in 2016 sixth international conference on innovative computing technology (intech), aug. 2016, pp. 233–238, doi: 10.1109/intech.2016.7845129. [7] m. ali and l. miller, “erp system implementation in large enterprises – a systematic literature review,” j. enterp. inf. manag., vol. 30, no. 4, pp. 666–692, jul. 2017, doi: 10.1108/jeim-07-20140071. [8] h. barham and t. daim, “the use of readiness assessment for big data projects,” sustain. cities soc., vol. 60, p. 102233, sep. 2020, doi: 10.1016/j.scs.2020.102233. [9] k. al-osaimi, a. alheraish, and s. h. bakry, “an integrated stope framework for e-readiness assessments,” 2006. [online]. available at : https://citeseerx.ist.psu.edu/ . [10] a. parasuraman, “technology readiness index (tri): a multipleitem scale to measure readiness to embrace new technologies,” j. serv. res., vol. 2:307, no. may, 2000, doi: 10.1177/109467050024001. [11] s. ali, h. ullah, m. akbar, w. akhtar, and h. zahid, “determinants of consumer intentions to purchase energy-saving household products in pakistan,” sustainability, vol. 11, no. 5, p. 1462, mar. 2019, doi: 10.3390/su11051462. [12] m. martens, o. roll, and r. elliott, “testing the technology readiness and acceptance model for mobile payments across germany and south africa,” int. j. innov. technol. manag., vol. 14, no. 06, p. 1750033, dec. 2017, doi: 10.1142/s021987701750033x. [13] a. ariani, d. napitupulu, r. jati, j. kadar, and m. syafrullah, “testing of technology readiness index model based on exploratory factor analysis approach,” j. phys. conf. ser., vol. 1007, no. 1, p. 012043, apr. 2018, doi: 10.1088/1742-6596/1007/1/012043. [14] c. o’farrelly, a. booth, m. tatlow-golden, and b. barker, “reconstructing readiness: young children’s priorities for their early school adjustment,” early child. res. q., vol. 50, pp. 3–16, 2020, doi: 10.1016/j.ecresq.2018.12.001. [15] r. d. kristy, e. d. wahyuni, and n. hayatin, “analysis of the readiness level of children https://doi.org/10.1109/ictss.2018.8549923 https://jdih.pekanbaru.go.id/downloadprodukhukum/1597027963perwako-no-56-tahun-2019-master-plan-smart-city--3-.pdf https://doi.org/10.2991/aebmr.k.200301.003 https://www.philstar.com/business/technology/2017/02/20/1673272/next-up-school-id-doubles-payment-card https://doi.org/10.1016/j.kjss.2017.01.001 https://doi.org/10.1109/intech.2016.7845129 https://doi.org/10.1108/jeim-07-2014-0071 https://doi.org/10.1108/jeim-07-2014-0071 https://doi.org/10.1016/j.scs.2020.102233 https://citeseerx.ist.psu.edu/document?repid=rep1&type=pdf&doi=7b35a17f7d91a06c678fef07b4e96ebbc5788123 https://doi.org/10.1177/109467050024001 https://doi.org/10.3390/su11051462 https://doi.org/10.1142/s021987701750033x https://doi.org/10.1088/1742-6596/1007/1/012043 https://doi.org/10.1016/j.ecresq.2018.12.001 issn 2614-0047 bulletin of social informatics theory and application 145 vol. 6, no. 2, december 2022, pp. 132-145 anam et.al (the readiness analysis of smart school implementation using technology readiness index to support smart) encyclopedia using technology readiness index (tri),” j. repos., vol. 2, no. 2, p. 129, feb. 2020, doi: 10.22219/repositor.v2i2.385. [16] m. humbani and m. wiese, “a cashless society for all: determining consumers’ readiness to adopt mobile payment services,” j. african bus., vol. 19, no. 3, pp. 409–429, jul. 2018, doi: 10.1080/15228916.2017.1396792. [17] w. a. aldea and b. e. v. comendador, “student universal cash card using radio frequency identification,” in proceedings of the 3rd international conference on telecommunications and communication engineering, nov. 2019, pp. 11–15, doi: 10.1145/3369555.3369581. [18] h. snyder, “literature review as a research methodology: an overview and guidelines,” j. bus. res., vol. 104, pp. 333–339, nov. 2019, doi: 10.1016/j.jbusres.2019.07.039. [19] h. taherdoost, “sampling methods in research methodology; how to choose a sampling technique for research,” ssrn electron. j., vol. 5, no. 2, pp. 18–27, apr. 2016, doi: 10.2139/ssrn.3205035. [20] h. wu and s.-o. leung, “can likert scales be treated as interval scales?—a simulation study,” j. soc. serv. res., vol. 43, no. 4, pp. 527–532, aug. 2017, doi: 10.1080/01488376.2017.1329775. [21] m. azwar and s. sulthonah, “the utilization of instagram as a media promotion : the case study of library in indonesia,” insa. j. islam humanit., vol. 2, no. 2, pp. 147–159, may 2018, doi: 10.15408/insaniyat.v2i2.7320. [22] a. mulyapradana and a. d. anjarini, “the influence of entrepreneurship subjects,entrepreneurial motivation, family support for entrepreneurial decision making in pusmanu polytechnic office administration students,” pros. icsmr, vol. 1, no. 1, pp. 162–182, aug. 2020, accessed: apr. 14, 2023. [online]. available: http://conference.loupiasconference.org/ . [23] m. lakhwani, o. dastane, n. s. m. satar, and z. johari, “the impact of technology adoption on organizational productivity,” j. ind. distrib. bus., vol. 11, no. 4, pp. 7–18, apr. 2020, doi: 10.13106/jidb.2020.vol11.no4.7. [24] s. tsang, c. royse, and a. terkawi, “guidelines for developing, translating, and validating a questionnaire in perioperative and pain medicine,” saudi j. anaesth., vol. 11, no. 5, p. 80, may 2017, doi: 10.4103/sja.sja_203_17. https://doi.org/10.22219/repositor.v2i2.385 https://doi.org/10.1080/15228916.2017.1396792 https://doi.org/10.1145/3369555.3369581 https://doi.org/10.1016/j.jbusres.2019.07.039 https://doi.org/10.2139/ssrn.3205035 https://doi.org/10.1080/01488376.2017.1329775 https://doi.org/10.15408/insaniyat.v2i2.7320 http://conference.loupiasconference.org/index.php/icsmr/article/view/102 https://doi.org/10.13106/jidb.2020.vol11.no4.7 https://doi.org/10.4103/sja.sja_203_17 bulletin of social informatics theory and application issn 2614-0047 vol. 7, no. 1, march 2023, pp. 32-42 32 https:doi.org/10.31763/businta.73i1.605 artificial intelligence in malnutrition research: a bibliometric analysis herman yuliansyah a,1,*, sulistyawati b,2, tri wahyuni sukesi b,3, surahma asti mulasari b,4, wan nur syamilah wan ali c,5 a department of informatics, faculty of industrial technology, universitas ahmad dahlan, yogakarta 55191, indonesia b faculty of public health, universitas ahmad dahlan, yogakarta 55164, indonesia c faculty of information science and technology, universiti kebangsaan malaysia, selangor 43600, malaysia 1 herman.yuliansyah@tif.uad.ac.id; 2 sulistyawati.suyanto@ikm.uad.ac.id; 3 tri.sukesi@ikm.uad.ac.id; 4 surahma.mulasari@ikm.uad.ac.id; 5 wansyamilah07@gmail.com *corresponding author 1. introduction malnutrition refers to deficiency or excess intake of nutrients, imbalance of essential nutrients, or impaired utilization of nutrients [1]. malnutrition manifests in wasting disease, stunting, underweight, and micronutrient deficiencies. artificial intelligence (ai) can be interpreted as intelligence integrated into a system that can be arranged in the context of the intelligence of scientific entities [2]. based on the taxonomy, ai is implemented into several techniques: machine learning (ml), neural networks (nn), and deep learning (dl). the ml algorithms enable software applications to predict outcomes accurately without being explicitly programmed. the ml algorithm is based on the idea that machines should be able to learn and adapt through experience, whereas ai refers to broader ideas and machines can perform tasks “smartly.” based on the method, this ml algorithm is implemented using reinforcement learning, unsupervised learning, and supervised learning [3]. an ml algorithm examined in a research domain can be discussed in another field, and this method is called transfer learning [4], [5]. furthermore, the nn works by imitating how the nerves of the human brain work. with this mechanism, nn allows computer programs to recognize patterns and solve problems. meanwhile, a r t i c l e i n f o a b s t r a c t article history received january 24, 2023 revised february 8, 2023 accepted february 26, 2023 malnutrition is a nutritional imbalance in a child’s body. currently, there have been many reviews done on malnutrition in children. however, reviews on artificial intelligence linked with malnutrition are yet to be done. thus, this study aims to identify the implementation of artificial intelligence in predicting malnutrition using bibliometric analysis. the bibliometric analysis consists of four stages: determining the purpose and scope, selecting the analytical technique, collecting data, and presenting the findings. data used for this analysis is sourced from the scopus database. the investigation was conducted using vosviewer and “publish or perish” software. based on five searched words: malnutrition, artificial intelligence, machine learning, neural networks, and deep learning, it was found that machine learning is the most widely used artificial intelligence approach for malnutrition research. deep learning techniques are reported to grow as it is introduced as a new method in artificial intelligence. malnutrition prediction tasks are the most studied problem. the use of deep learning, reinforcement learning, and transfer learning methods are used tremendously in malnutrition prediction research. this analysis’s results help improve the quality of the review by showing the mapping areas for malnutrition research. this is an open access article under the cc–by-sa license. keywords malnutrition artificial intelligence machine learning neural networks deep learning bibliometric analysis https://doi.org/10.31763/businta.73i1.605 mailto:herman.yuliansyah@tif.uad.ac.id http://creativecommons.org/licenses/by-sa/4.0/ http://creativecommons.org/licenses/by-sa/4.0/ issn 2614-0047 bulletin of social informatics theory and application 33 vol. 7, no. 1, march 2023, pp. 32-42 yuliansyah et.al (artificial intelligence in malnutrition research: a bibliometric analysis) the dl is an algorithm inspired by the structure of the human brain. these structures are called artificial neural networks or abbreviated as ann. the dl can learn and adapt to large amounts of data and solve complex problems with other ml algorithms. bibliometric analysis is a method for examining, analyzing, and summarizing the relationships between studies on specific topics that are widespread and increasing in number for better and more accurate understanding [6]. this article aims to investigate the bibliometric analysis of the scientific literature on using ai to study malnutrition. the analysis is conducted to reveal the topic areas that are the subject of most publications and identify research opportunities for these topics. the main contribution of this article is to identify performance analysis and science mapping so that research trends are known regarding the use of ai in malnutrition research. the remainder of this research is structured by defining the research methods carried out in section 2, presenting the results of the bibliometric analysis in section 3, and discussing the results of the bibliometric analysis in section 4. this research is concluded with the results of the bibliometric analysis in section 5. 2. method this research is a bibliometric analysis based on data from the scopus database accessed on november 10, 2022. vosviewer and “publish or perish” software were used for the bibliometric analysis. it is because the software provides visualization of bibliometric maps and metric calculations. examination, analysis, summarization of literature linkages, and identification of relationships between studies are made possible by using these two software. the stages in this study were conducted by following the guidelines proposed by donthu et al. [6], which consisted of four steps: • determining the purpose and scope of the bibliometric analysis • selecting the bibliometric analysis technique • collecting data for the bibliometric analysis • conducting the bibliometric analysis and presenting the findings this bibliometric analysis aims to investigate the relationship between the application of an ai approach to the topic of malnutrition research. the scope of bibliometric analysis is implemented by compiling keyword strings for search queries that retrieve studies based on the scopus database. based on a widely known theoretical framework, ten search queries were determined for bibliometric analysis, as shown in table 1. table.1 query string # search strings qs1 title-abs-key(“malnutrition”) qs2 (title-abs-key(“malnutrition”) and title-abs-key(“artificial intelligence”)) qs3 (title-abs-key(“malnutrition”) and title-abs-key(“machine learning”)) qs4 (title-abs-key(“malnutrition”) and title-abs-key(“reinforcement learning”)) qs5 (title-abs-key(“malnutrition”) and title-abs-key(“unsupervised learning”)) qs6 (title-abs-key(“malnutrition”) and title-abs-key(“supervised learning”)) qs7 (title-abs-key(“malnutrition”) and title-abs-key(“transfer learning”)) qs8 (title-abs-key(“malnutrition”) and title-abs-key(“neural network*”)) qs9 (title-abs-key(“malnutrition”) and title-abs-key(“deep learning”)) qs10 (title-abs-key(“malnutrition”) and title-abs-key(“artificial intelligence” or “machine learning” or “reinforcement learning” or “unsupervised learning” or “supervised learning” or “transfer learning” or “neural network*” or “deep learning”)) the results of this search query are stored in csv and ris formats. csv files are used for performance analysis and science mapping using vosviewer software, while ris files are used to 34 bulletin of social informatics theory and application issn 2614-0047 vol. 7, no. 1, march 2023, pp. 32-42 yuliansyah et.al (artificial intelligence in malnutrition research: a bibliometric analysis) calculate citation metrics using “publish or perish” software. according to naveen donthu et al. [6], there are two bibliometric analysis techniques: main and enrichment. the main technique is divided into performance analysis and science mapping. this study is limited to only using main techniques for bibliometric analysis. 3. results and discussion this section presents the results from two analyses: performance analysis and science mapping. performance analysis identifies the contribution of a significant part of the research to the field under study, while science mapping identifies the relationships between essential elements of the investigation. 3.1. performance analysis performance analysis is conducted by investigating publication-related metrics and citation-related metrics. • the search query resulted in 98,809 documents for the keyword ‘malnutrition’. from the number, it is proven that this topic is widely intriguing to researchers. this research investigates the implementation of an ai approach to malnutrition research using search queries (qs2 to qs10). the result of this search indicates that no studies link unsupervised learning methods to malnutrition research. the result also shows that the data used for malnutrition research is data that has been labeled or classified. while the reinforcement learning method is relatively new, the trends are growing. the working mechanism of reinforcement learning differs from supervised learning, which has been labeled as a fixed value for the studied data. the reinforcement learning method was developed to receive orders based on the conditions encountered. machines can learn from past data to avoid mistakes. the mechanism of learning is simple. the machine is rewarded for correct learning and vice versa. fig. 1 shows the number of publications per query string. fig. 1. number of publications per query string the combination of the term ai, ml, nn, and dl in malnutrition research has a more dominant number of publications, with ml [7]–[11] being the most popular method widely combined. dl [12]– [14] is the least combined method. the number of publications is extracted based on time series data per year to find out from research trends. based on fig. 2, it can be seen that in 2023, there is only 1 study that combines malnutrition with ml (qs3). by ignoring the number in 2023, the graph shows that the development trend of malnutrition research using ml algorithms has an exponential trend, and it decreases in 2023. an exciting trend is shown in the study with nn and dl. the dl is a sub-field of ml where the difference is in the feature selection and classification tasks. in ml, the feature selection task is conducted separately from classification. it cannot even be shown if it does not require selection. the feature selection task is achieved using a separate algorithm, and the classification task is also accomplished using various available algorithm options. dl performs these two tasks simultaneously by algorithmbased. in dl, several algorithms originated from nn. these algorithms are convolutional neural network (cnn) [15], [16], recurrent neural networks (rnn) [17], long short-term memory (ltsm) networks, and self organizing maps (som). fig. 2 also shows the trend between two issn 2614-0047 bulletin of social informatics theory and application 35 vol. 7, no. 1, march 2023, pp. 32-42 yuliansyah et.al (artificial intelligence in malnutrition research: a bibliometric analysis) learning types which are nn and dl, shown by line qs8+qs9. this line portrayed an upward movement. meaning that implementing nn and dl is future work in malnutrition research. fig. 2. number of publications per query string the third publication-related metrics data extraction is identification by document type, as shown in fig. 3. there are eight types of documents found in this study. articles, conference papers, and reviews are the most common type of publications discussing ai in malnutrition. fig. 3. publication according to document type • citation-related metrics the citation data collected from publications used in this analysis are shown in table 2, where two papers significantly have a high citation impact of 731. one of the papers has 721 citations using ml to determine the healthy gut microbiota postnatally in the first two years [18]. additionally, throughout 2020-2022, there were six papers found to have a citation impact of above 20 that are [7], [19]–[23]. for [19], [20], ml was introduced to identify various forms of malnutrition with the global leadership initiative on malnutrition (glim) criteria. other than that, a study conducted by [21] used ml algorithms to determine the relationship between transmission and death during covid-19, which found that malnutrition was the prevalence associated with covid-19 mortality. the study [22] states that climate change has an impact on reducing crop production and potentially affects global malnutrition. hence, predictions with ml algorithms offer a solution to match food needs with climate change. the study [7] identified malnutrition by analyzing body weight and body mass index (bmi) based on facial images using the cnns method. several studies also studied the prediction of malnutrition in children under the age of five by comparing several ml algorithms: linear discriminant analysis (lda) [24], k-nearest neighbors (k-nn) [25], support vector machines (svm) [23], random forest (rf) [26], and logistic regression (lr) [27]. from the studies, it can be concluded that the rf outperforms other algorithms [23] in predicting malnutrition. table 2 and table 3 show the citation data extraction based on the highest number of citations and the published papers in nature and plos one, respectively. these two journals are quartile 1 journals which are based on scimago journal rank (sjr) and journal impact factor (jif) from clarivate. both tables show complete citation data. 36 bulletin of social informatics theory and application issn 2614-0047 vol. 7, no. 1, march 2023, pp. 32-42 yuliansyah et.al (artificial intelligence in malnutrition research: a bibliometric analysis) table.2 citation from publication journals citation papers sjr 2021 2021 jif nature (1476-4687) 731 2 q1 17.9 q1 69.504 journal of physiology (1469-7793) 171 1 q1 1.51 q1 6.228 reproduction (1741-7899) 88 1 q1 0.94 q1 3.923 clinical infectious diseases (1537-6591) 84 2 q1 4.39 q1 20.999 international journal of medical informatics (1386-5056) 81 3 q1 1.14 q1 4.73 clinical nutrition (0261-5614) 70 5 q1 1.15 q1 7.643 journal of parenteral and enteral nutrition (1941-2444) 54 2 q2 0.82 q3 3.896 journal of neuroendocrinology (1365-2826) 50 1 q2 0.97 q2 3.870 science of the total environment (0048-9697) 45 1 q1 1.81 q1 10.753 plos one (1932-6203) 43 7 q1 0.75 q1 3.752 nutrition (0899-9007) 41 3 q1 0.89 q2 4.893 procedia computer science (1877-0509) 34 2 0.57 nutrients (2072-6643) 31 5 q1 1.29 q1 6.703 genes (2073-4425) 30 1 q2 1.03 q2 4.141 computers and electronics in agriculture (0168-1699) 28 1 q1 1.6 q1 6.757 iet image processing (1751-9659) 28 1 q2 0.54 q3 1.773 journal of clinical nursing (1365-2702) 24 1 q1 0.83 q1 4.423 jmir medical informatics (2291-9694) 23 2 q2 0.81 q3 3.228 aaai spring symposium technical report (-) 23 1 journal of clinical medicine (2077-0383) 21 1 q1 1.04 q2 4.964 table.3 number of publications per journal journals citation papers sjr 2021 2021 jif plos one (1932-6203) 7 43 q1 0.75 q1 3.752 communications in computer and information science (-) 6 7 acm international conference proceeding series (-) 6 16 lecture notes in networks and systems (-) 5 1 lecture notes in electrical engineering (-) 5 0 advances in intelligent systems and computing (-) 5 6 nutrients (2072-6643) 5 31 q1 1.29 q1 6.703 clinical nutrition (0261-5614) 5 70 q1 1.15 q1 7.643 international journal of environmental research and public health (1660-4601) 5 20 q1 0.81 q2 4.614 scientific reports (2045-2322) 3 3 q1 1.01 q2 4.997 nutrition (0899-9007) 3 41 q1 0.89 q2 4.893 world journal of gastroenterology (1007-9327) 3 17 q1 1.23 q2 5.374 international journal of medical informatics (1386-5056) 3 81 q1 1.14 q1 4.73 the analysis used the “publish or perish” software to extract citation metric information consisting of several metrics, as shown in table 4. the study was conducted by comparing five search query data to determine the research progress. this data indicates that the research trend with dl in qs9 began in 2017 with citation impact that is close to ai (qs2) and nn (qs8), which this term was introduced earlier (1988 and 1990). based on these metrics, it can be seen that research with an ml algorithm is more dominant and provides a greater impact with a more significant number of papers. however, the dl is the future of malnutrition research as it is more recent and closely impacts its predecessor methods. issn 2614-0047 bulletin of social informatics theory and application 37 vol. 7, no. 1, march 2023, pp. 32-42 yuliansyah et.al (artificial intelligence in malnutrition research: a bibliometric analysis) table.4 citation metric citation metric qs2 qs3 qs8 qs9 qs10 publication years 1988-2022 2010-2023 1990-2022 2017-2022 1988-2023 citation years 34 (19882022) 12 (2010-2022) 32 (1990-2022) 5 (2017-2022) 34 (1988-2023) papers 79 144 69 29 250 citations 583 1673 590 85 2517 cites/year 17.15 139.42 18.44 17.0 74.03 cites/paper 7.38 11.62 8.55 2.93 10.07 authors/paper 5.34 5.61 4.57 4.59 5.21 h-index 13 17 11 5 20 g-index 20 38 23 8 44 hi,norm 6 8 6 3 10 hi,annual 0.18 0.67 0.19 0.60 0.29 ha-index 8 12 6 4 12 papers with acc >= 1,2,5,10,20 50, 38, 18, 3, 0 88, 71, 37, 14, 6 32, 25, 9, 3, 1 13, 12, 2, 0, 0 142, 108, 50, 17, 6 3.2. science mapping science mapping is conducted by analyzing the co-word analysis and co-authorship analysis. the software “vosviewer” is used to investigate the relationship between words and authors [28]. • co-word analysis was conducted using the vosviewer software by determining the minimum number of occurrences of a keyword being analyzed by 3. the results obtained are 459 keywords meet the threshold of 3351 keywords. these selected keywords are then grouped into 7 clusters marked with different colors. the word malnutrition is the word with the most occurrences, so the nodes for malnutrition appear more significant than the others. in addition to the word malnutrition, several other words can be seen, such as human, humans, machine learning, artificial intelligence, and nutrition, as shown in fig. 4. fig. 4. network visualization fig. 5 shows that some terms related to algorithms in ai are k-nn, cnn, rf, lr, and svm. these algorithms perform decision-making, decision support system, and predictive analysis. apart from these tasks, these algorithms are also used in image processing, image analysis, and signal processing. 38 bulletin of social informatics theory and application issn 2614-0047 vol. 7, no. 1, march 2023, pp. 32-42 yuliansyah et.al (artificial intelligence in malnutrition research: a bibliometric analysis) fig. 5. detailed network visualization vosviewer presents three types of visualization: network visualization (fig. 4), overlay visualization, and density visualization (fig. 6). density visualization is a visualization of the depth of research related to the topic being studied. more highlighted colors mean more researchers are studying the word. these colors accentuate the words’ highlights in the network visualization. fig. 6. density visualization • author affiliations were conducted to determine the relationship between researchers and countries and which countries have impacted research on ai and malnutrition. vosviewer software is used for this investigation with parameter setting with a minimum of 1 document for an author. from the analysis, 80 countries were found to be involved in this research. table 5 presents the top 10 countries based on the studied paper that contribute to 12.5% of the entire countries based on total link strength. it was found that the united states published the most papers based on the number of documents, followed by india, china, the united kingdom, and brazil. from the number of citations, the highest country cited is the united states, followed by bangladesh, australia, the united kingdom, and sweden. table.5 citation from publication country document citation total link strength united states 59 1339 85 united kingdom 23 323 51 canada 14 192 36 china 25 185 33 germany 11 168 32 brazil 15 156 31 sweden 9 226 25 italy 12 166 24 netherlands 11 148 24 india 42 185 22 issn 2614-0047 bulletin of social informatics theory and application 39 vol. 7, no. 1, march 2023, pp. 32-42 yuliansyah et.al (artificial intelligence in malnutrition research: a bibliometric analysis) the country analysis based on total link strength is visualized in fig. 7. there are several outlier countries in this visualization where this country still needs to join the large network community, with the top country being the united states. these outlier countries are indonesia, turkey, the philippines, the czech republic, japan, thailand, sri lanka, romania, and lithuania. on the other hand, fig. 8 shows a more detailed country analysis for a group of interrelated countries. the united states is the center of relations that is connected with other significant nodes: the united kingdom, india, china, brazil, and others. several small nodes are also connected to this large node, including somalia, kenya, ghana, malawi, iran, zambia, peru, nigeria, faro islands, cuba, and others. this result shows that research focusing on ai in malnutrition collaborates between countries. fig. 7. country analysis fig. 8. detailed country analysis this section discusses the keywords of this research which are malnutrition, ai, ml, and dl. as the main focus of this research is from a public health perspective, the word malnutrition is connected with more words than other investigated words, as seen in fig. 9. some of the words that can be highlighted in fig. 9 are malnutrition, related to mortality [29], children or preschool [30], as well as the cause factor of feeding behavior [31] and food intake [32]. thus, it can be concluded that nutrition assessment is very much needed. thus, solutions from ai are related to learning systems and decision support systems. co-word analysis with ai is this study's focus, shown in fig. 10. this co-word analysis shows that apart from being related to the words that appear in the word nutrition, this ai is related to hospitals [33] and functions as a diagnostic tool. the network formed in fig. 10 is no more significant than the network formed for ml algorithms, as shown in fig. 11. the new words that appear and can be highlighted in fig. 11 are classification and body mass index. the ml algorithms have been used to predict malnutrition based on body mass index. fig. 9. co-word analysis for malnutrition words fig. 10. co-word analysis for artificial intelligence words the last co-word analysis is analysis for dl. the network related to this dl is smaller than other networks, as shown in fig. 12. the new word that appears in this dl network is a convolutional neural network (cnn). cnn is a dl algorithm based on a neural network commonly used in image data. 40 bulletin of social informatics theory and application issn 2614-0047 vol. 7, no. 1, march 2023, pp. 32-42 yuliansyah et.al (artificial intelligence in malnutrition research: a bibliometric analysis) the prediction task can also use cnn which for this study, is malnutrition data. in general, the relationship between the word ai in malnutrition research proposes predictions with algorithms from ml, nn, and dl to determine malnutrition in children based on the variables examined. fig. 11. co-word analysis for malnutrition words fig. 12. co-word analysis for artificial intelligence words 4. conclusion the rapid development of research on malnutrition using ai can be seen in the growing number of papers yearly. based on the scopus database, this study uses bibliometric analysis for using ai in malnutrition research. several aspects were reviewed on 250 documents, such as performance analysis and science mapping using vosviewer and “publish or perish” software. it was found that ml algorithms dominate this research compared to nn and dl. the use of the ml algorithm is related to the task of predicting malnutrition based on body mass index. nevertheless, in recent years, it has become apparent that dl algorithms are the future for malnutrition research, along with the increasing number of research that utilized dl to improve the research topic being studied. in addition, reinforcement learning and transfer learning are potential methods for further malnutrition research. the weakness of this research is that the data used is still sourced from only one database. therefore, several data sources, such as the web of science, springerlink, and ieee, should be used for future research. references [1] world health organization, “malnutrition,” web, 2022. [online]. available at: https://www.who.int/health-topics/malnutrition#tab=tab_1. [2] e. alpaydin, “machine learning, ” mit press, 2021, doi: 10.7551/mitpress/13811.001.0001. [3] m. kubat, “an introduction to machine learning,” cham: springer international publishing, pp. 1348, 2017, doi: 10.1007/978-3-319-63913-0. [4] k. weiss, t. m. khoshgoftaar, and d. d. wang, “a survey of transfer learning,” j. big data, vol. 3, no. 1, p. 9, 2016, doi: 10.1186/s40537-016-0043-6. [5] o. day and t. m. khoshgoftaar, “a survey on heterogeneous transfer learning,” j. big data, vol. 4, no. 1, p. 29, 2017, doi: 10.1186/s40537-017-0089-0. [6] n. donthu, s. kumar, d. mukherjee, n. pandey, and w. m. lim, “how to conduct a bibliometric analysis: an overview and guidelines,” j. bus. res., vol. 133, pp. 285–296, sep. 2021, doi: 10.1016/j.jbusres.2021.04.070. [7] d. c et al., “identification of malnutrition and prediction of bmi from facial images using real‐time image processing and machine learning,” iet image process., vol. 16, no. 3, pp. 647–658, feb. 2022, doi: 10.1049/ipr2.12222. [8] z. momand, m. s. zarinkhail, and m. f. aryan, “machine learning based prediction of edematous malnutrition in afghan children,” proceedings of international conference on emerging technologies and intelligent systems (icetis), p. 235–245, 2022, doi: 10.1007/978-3-030-85990-9_20. https://www.who.int/health-topics/malnutrition%23tab=tab_1 https://doi.org/10.7551/mitpress/13811.001.0001 https://doi.org/10.1007/978-3-319-63913-0 https://doi.org/10.1186/s40537-016-0043-6 https://doi.org/10.1186/s40537-017-0089-0 https://doi.org/10.1016/j.jbusres.2021.04.070 https://doi.org/10.1049/ipr2.12222 https://doi.org/10.1007/978-3-030-85990-9_20 issn 2614-0047 bulletin of social informatics theory and application 41 vol. 7, no. 1, march 2023, pp. 32-42 yuliansyah et.al (artificial intelligence in malnutrition research: a bibliometric analysis) [9] h. shi et al., “explainable machine learning model for predicting the occurrence of postoperative malnutrition in children with congenital heart disease,” clin. nutr., vol. 41, no. 1, pp. 202–210, jan. 2022, doi: 10.1016/j.clnu.2021.11.006. [10] f. h. bitew, c. s. sparks, and s. h. nyarko, “machine learning algorithms for predicting undernutrition among under-five children in ethiopia,” public health nutr., pp. 1–12, oct. 2021, doi: 10.1017/s1368980021004262. [11] k. ikezawa et al., “effect of early nutritional initiation on post‐cerebral infarction discharge destination: a propensity‐matched analysis using machine learning,” nutr. diet., vol. 79, no. 2, pp. 247–254, apr. 2022, doi: 10.1111/1747-0080.12718. [12] m. m. shahriar, m. s. iqubal, s. mitra, and a. k. das, “a deep learning approach to predict malnutrition status of 0-59 month’s older children in bangladesh,” in 2019 ieee international conference on industry 4.0, artificial intelligence, and communications technology (iaict), jul. 2019, pp. 145–149, doi: 10.1109/iciaict.2019.8784823. [13] a. r. bahtiar, pranowo, a. j. santoso, and j. juhariah, “deep learning detected nutrient deficiency in chili plant,” in 2020 8th international conference on information and communication technology (icoict), jun. 2020, pp. 1–4, doi: 10.1109/icoict49345.2020.9166224. [14] m. n. aulia, m. l. khodra, and a. p. koesoema, “predicting macronutrient of baby food using nearinfrared spectroscopy and deep learning approach,” iop conf. ser. mater. sci. eng., vol. 803, no. 1, p. 012019, apr. 2020, doi: 10.1088/1757-899x/803/1/012019. [15] k. kowsari et al., “diagnosis of celiac disease and environmental enteropathy on biopsy images using color balancing on convolutional neural networks,” in proceedings of the future technologies conference (ftc), pp. 750–765, 2020, doi: 10.1007/978-3-030-32520-6_55. [16] w. huang et al., “identification of adulterated milk powder based on convolutional neural network and laser-induced breakdown spectroscopy,” microchem. j., vol. 176, p. 107190, may 2022, doi: 10.1016/j.microc.2022.107190. [17] e. batbaatar and k. h. ryu, “ontology-based healthcare named entity recognition from twitter messages using a recurrent neural network approach,” int. j. environ. res. public health, vol. 16, no. 19, p. 3628, sep. 2019, doi: 10.3390/ijerph16193628. [18] s. subramanian et al., “persistent gut microbiota immaturity in malnourished bangladeshi children,” nature, vol. 510, no. 7505, pp. 417–421, jun. 2014, doi: 10.1038/nature13421. [19] m. a. e. de van der schueren et al., “global leadership initiative on malnutrition (glim): guidance on validation of the operational criteria for the diagnosis of protein-energy malnutrition in adults,” clin. nutr., vol. 39, no. 9, pp. 2872–2880, sep. 2020, doi: 10.1016/j.clnu.2019.12.022. [20] h. keller et al., “global leadership initiative on malnutrition (glim): guidance on validation of the operational criteria for the diagnosis of protein‐energy malnutrition in adults,” j. parenter. enter. nutr., vol. 44, no. 6, pp. 992–1003, aug. 2020, doi: 10.1002/jpen.1806. [21] m. li et al., “identifying novel factors associated with covid-19 transmission and fatality using the machine learning approach,” sci. total environ., vol. 764, p. 142810, apr. 2021, doi: 10.1016/j.scitotenv.2020.142810. [22] a. j. cortés and f. lópez-hernández, “harnessing crop wild diversity for climate change adaptation,” genes (basel)., vol. 12, no. 5, p. 783, may 2021, doi: 10.3390/genes12050783. [23] a. talukder and b. ahammed, “machine learning algorithms for predicting malnutrition among underfive children in bangladesh,” nutrition, vol. 78, p. 110861, oct. 2020, doi: 10.1016/j.nut.2020.110861. [24] t. nezu et al., “predictors of stroke outcome extracted from multivariate linear discriminant analysis or neural network analysis,” j. atheroscler. thromb., vol. 29, no. 1, p. 59642, jan. 2022, doi: 10.5551/jat.59642. [25] n. gauhar, s. das, and k. s. moury, “prediction of flood in bangladesh using k-nearest neighbors algorithm,” in 2021 2nd international conference on robotics, electrical and signal processing techniques (icrest), jan. 2021, pp. 357–361, doi: 10.1109/icrest51555.2021.9331199. https://doi.org/10.1016/j.clnu.2021.11.006 https://doi.org/10.1017/s1368980021004262 https://doi.org/10.1111/1747-0080.12718 https://doi.org/10.1109/iciaict.2019.8784823 https://doi.org/10.1109/icoict49345.2020.9166224 https://doi.org/10.1088/1757-899x/803/1/012019 https://doi.org/10.1007/978-3-030-32520-6_55 https://doi.org/10.1016/j.microc.2022.107190 https://doi.org/10.3390/ijerph16193628 https://doi.org/10.1038/nature13421 https://doi.org/10.1016/j.clnu.2019.12.022 https://doi.org/10.1002/jpen.1806 https://doi.org/10.1016/j.scitotenv.2020.142810 https://doi.org/10.3390/genes12050783 https://doi.org/10.1016/j.nut.2020.110861 https://doi.org/10.5551/jat.59642 https://doi.org/10.1109/icrest51555.2021.9331199 42 bulletin of social informatics theory and application issn 2614-0047 vol. 7, no. 1, march 2023, pp. 32-42 yuliansyah et.al (artificial intelligence in malnutrition research: a bibliometric analysis) [26] c. browne et al., “multivariate random forest prediction of poverty and malnutrition prevalence,” plos one, vol. 16, no. 9, p. e0255519, sep. 2021, doi: 10.1371/journal.pone.0255519. [27] m. ohyver, j. v. moniaga, k. r. yunidwi, and m. i. setiawan, “logistic regression and growth charts to determine children nutritional and stunting status: a review,” procedia comput. sci., vol. 116, pp. 232–241, jan. 2017, doi: 10.1016/j.procs.2017.10.045. [28] n. j. van eck and l. waltman, “software survey: vosviewer, a computer program for bibliometric mapping,” scientometrics, vol. 84, no. 2, pp. 523–538, aug. 2010, doi: 10.1007/s11192-009-0146-3. [29] v. gotta, g. tancev, o. marsenic, j. e. vogt, and m. pfister, “identifying key predictors of mortality in young patients on chronic haemodialysis—a machine learning approach,” nephrol. dial. transplant., vol. 36, no. 3, pp. 519–528, feb. 2021, doi: 10.1093/ndt/gfaa128. [30] h. chen, j. xing, x. yang, and k. zhan, “heterogeneous effects of health insurance on rural children’s health in china: a causal machine learning approach,” int. j. environ. res. public health, vol. 18, no. 18, p. 9616, sep. 2021, doi: 10.3390/ijerph18189616. [31] v. t. siy van et al., “predicting undernutrition among elementary schoolchildren in the philippines using machine learning algorithms,” nutrition, vol. 96, p. 111571, apr. 2022, doi: 10.1016/j.nut.2021.111571. [32] g. mertes, l. ding, w. chen, h. hallez, j. jia, and b. vanrumste, “measuring and localizing individual bites using a sensor augmented plate during unrestricted eating for the aging population,” ieee j. biomed. heal. informatics, vol. 24, no. 5, pp. 1509–1518, may 2020, doi: 10.1109/jbhi.2019.2932011. [33] d. a. van den brink et al., “prediction of mortality in severe acute malnutrition in hospitalized children by faecal volatile organic compound analysis: proof of concept,” sci. rep., vol. 10, no. 1, p. 18785, dec. 2020, doi: 10.1038/s41598-020-75515-6. https://doi.org/10.1371/journal.pone.0255519 https://doi.org/10.1016/j.procs.2017.10.045 https://doi.org/10.1007/s11192-009-0146-3 https://doi.org/10.1093/ndt/gfaa128 https://doi.org/10.3390/ijerph18189616 https://doi.org/10.1016/j.nut.2021.111571 https://doi.org/10.1109/jbhi.2019.2932011 https://doi.org/10.1038/s41598-020-75515-6 bulletin of social informatics theory and application issn 2614-0047 vol. 7, no. 1, march 2023, pp. 14-23 14 https:doi.org/10.31763/businta.v7i1.609 optimizing aws lambda code execution time in amazon web services muh. awal arifin a,1,*, ramdan satra a,2, lukman syafie a,3, ahmad mursyidun nidhom b,4 a universitas muslim indonesia, makassar 90231, indonesia b national university of malaysia, malaysia 1 13020190363@umi.ac.id; 2 ramdan.satra@umi.ac.id; 3 lukman.syafie@umi.ac.id; 4 p122056@siswa.ukm.edu.my * corresponding author 1. introduction with a significant impact on their configuration, the growth of cloud computing is at the forefront of centralizing application development and management (s). it enables programmers to use computer resources as a service, facilitating the scalability of applications and access to data from anywhere while reducing costs and maintaining minimal hardware upkeep [1]. dynamically allocating machine resources by the supplier is a newer solution [2]. a subset of cloud computing known as serverless computing has developed from virtualizing computing, storage, and networking to increasingly abstracting the underlying infrastructure to the point where the only thing available for deployment is the code itself. an event-driven ideal is partially realized via serverless computing, in which applications are defined by actions and the events that trigger them [3]. a serverless platform transparently controls all resource management facets, deployment, and scaling. based on the runtimes that the serverless platform supports, individual functions inside serverless applications can individually be built in a variety of programming languages [4]. services like aws lambda enable the implementation of microservice architectures without needing to manage servers to allay these worries. as a result, it makes it easier to develop functionalities (i.e., microservices) that can be quickly deployed and automatically scaled and lower the expenses associated with infrastructure and operations [5]. with serverless computing, programs are broken down and distributed as code modules, fundamentally different from hosting applications using iaas or platform-as-a-service (paas) clouds. the maximum amount of code (for example, 64 to 256mb) and function runtime (for example, 5 minutes) are set by each cloud provider [6]. a r t i c l e i n f o a b s t r a c t article history received january 22, 2023 revised february 4, 2023 accepted february 26, 2023 one of the problems in providing infrastructure is the lack of interest in managing infrastructure. aws lambda is a faas (function as a service) service that allows users to run code automatically in an environment managed by amazon web services. in this study, the method used is to collect data on code execution time at various input sizes, then perform an analysis of the factors that affect execution time. furthermore, optimization is carried out by selecting the appropriate memory size and proper coding techniques to improve performance. the results show that optimizing memory size and coding can improve code execution time performance by up to 30%, depending on the type of service used. this can help aws lambda users improve code performance and save on operational costs. this is an open access article under the cc–by-sa license. keywords cloud computing serverless aws lambda s3 dynamodb amazon web services https://doi.org/10.31763/businta.v7i1.609 mailto:13020190363@umi.ac.id http://creativecommons.org/licenses/by-sa/4.0/ http://creativecommons.org/licenses/by-sa/4.0/ issn 2614-0047 bulletin of social informatics theory and application 15 vol. 7, no. 1, march 2023, pp. 14-23 arifin et.al (optimizing aws lambda code execution time in amazon web services) 2. literature review serverless computing, also known as functions as a service or faas, has become popular in recent years as cloud computing has become the platform of choice for business and scientific computing. serverless computing has demonstrated particular potential for event-driven applications with the rising use of containers and microservices [7]. developers can create applications quickly and cheaply with serverless computing without worrying about infrastructure. in serverless computing, the servers are still present but are dynamically managed based on demand by the cloud service provider rather than the application owner [8]. in serverless computing, the cloud provider is in charge of handling client requests, responding to them, scheduling tasks, and keeping an eye on operational efficiency. the only code that developers must build is for handling client queries [9]. cloud service providers give tools for creating "rules" that set off serverless operations when certain things happen. a pipeline can be orchestrated asynchronously using these rules [10]. compared to the conventional paradigm, where development and operations employees had to maintain their virtual machines directly, this represents a considerable shift. with serverless technology, developers may now deploy functions that act as event handlers and only pay for cpu time when these functions are really executing, as opposed to continuously running virtual machines [9]. business logic is divided into little functions in function as a service (faas), a stateless computing container modeled for an event-driven solution. it is a compact, discrete, and reusable chunk of code. code still theoretically runs on servers in the serverless computing model, but the user does not manage the servers. function as a service (faas), the serverless application, is essentially a blend of self-managed and cloud services [8]. a new generation of platform-as-a-service products from significant cloud providers is referred to as "serverless computing. "amazon web services (aws) lambda, the first service in this category, was introduced at the end of 2014 and had widespread usage in mid-to-late 2016 [9] by enabling workflows to run and scale without requiring human infrastructure management and providing support for highly parallel execution, it simplifies operations, abstracts away the underlying servers, and lowers maintenance costs [11]. aws lambda [12] is currently the most widely used serverless platform the researcher chose [13]. currently, only aws offers a variety of deployment options for its faas services in the public cloud. previously, just one deployment type was provided by all significant faas platforms, including aws lambda. customers had to manually upload their function source code into the cloud platform or deploy it automatically by compiling the code. however, aws debuted a new deployment type for aws lambda called container-based deployment in december 2020. customers can now create their containers utilizing the company's container images. as aws lambda allows the container to be as big as 10gb, the size restriction that was once present on all serverless platforms is gone [14]. with lambda functions [15] using as little as 128mb of ram, a server would need up to 8000 functions to completely fill its ram (or more due to soft allocation). we initially set a 10% objective for ram and cpu overhead, depending on the function's size. 102mb of memory overhead is required for a 1024mb function. performance is fairly complicated, given that it is evaluated to the function's entitlement. according to the defined memory limit for each function, lambda allocates cpu, network, and storage throughput in proportion. functions should operate at bare metal levels of cpu throughput, io latency, and other metrics within specified bounds [16]. a lambda function can invoke other lambda functions (including themselves) in the same region. they can also be invoked automatically (i.e. triggered) by updates made to aws “event sources,” including dynamodb, simple storage service (s3 object storage), simple notification service (sns), cloudwatch, alexa, and kinesis [17]. aws lambda launches a container (i.e., an execution environment) when a lambda function is called, according to the documentation. the service retains the container after a lambda function has been executed for a while in case the same lambda function is called again [18]. separating code and executing function units is necessary to maintain serverless architecture's statelessness. the idea that there is no affinity between code and the underlying computing infrastructure and, as a result, no assurance that a later call will hit the same instance as the initial call is given credence by this method [19]. the functional programming paradigm is inextricably linked to paas. according to a rigorous interpretation, its properties are established by stateless computations 16 bulletin of social informatics theory and application issn 2614-0047 vol. 7, no. 1, march 2023, pp. 14-23 arifin et.al (optimizing aws lambda code execution time in amazon web services) that strictly employ invocation arguments and return values without the use of global variables. in reality, the majority of faas interfaces introduce techniques to induce side effects and manage state, for example, through access to storage services, exactly as functional programming languages have done [20]. 3. method 3.1. lambda architecture fig. 1 shows lambda architecture consisting of s3, dynamodb, lambda function, and cloud watch. the proposed architecture for optimizing code involves leveraging the s3 service for data storage, dynamodb for data retrieval, and cloudwatch log triggers to trigger a lambda function. the architecture is designed to optimize the code architecture and improve data storage and retrieval speed and efficiency. fig. 1. lambda architecture for moving data from s3 to dynamodb s3 [10] is amazon’s simple storage system [21], which enables them to push limited computation onto their shared cloud storage service users of aws s3 are only charged for outgoing traffic, and the cost depends on where the data is going. when s3 select isn't being used, this cost varies between $0.09/gb (transferring data outside of aws) to free (transferring data inside the same region) [22]. a fully managed nosql database service called dynamodb offers quick and dependable performance along with seamless scalability. in order to accommodate the customer-specified request capacity and the amount of data stored, dynamodb automatically distributes the data and traffic for the table among a suitable number of servers, preserving reliable and quick performance. to provide built-in high availability and data durability, all data items are stored on solid state disks (ssds) and are automatically replicated across various availability zones in a region [23]. aws cloudwatch is a robust monitoring and observability service that amazon web services (aws) provides. this service enables users to collect and monitor data on their aws resources effortlessly. with aws cloudwatch, users can gain real-time visibility into their resources' performance and operational health, receive alerts when anomalies or changes occur, and quickly identify and troubleshoot issues. the tool provides a comprehensive range of metrics, logs, and events that enable users to monitor and gain insights into their applications, systems, and infrastructure in a centralized location. with its intuitive and user-friendly interface, aws cloudwatch eliminates the need for any additional software, making it a convenient and efficient solution for monitoring aws resources [24]. 3.2. lambda function implementation usually, functions are written in high-level programming languages like python, java, or node.js [25] . net, and go [26]. python is a programming language that is interpreted and has an expressive syntax, which has been likened to executable pseudocode. this could be one of the reasons why i developed an affinity for the language back in 1996. at that time, we were looking for a solution to issn 2614-0047 bulletin of social informatics theory and application 17 vol. 7, no. 1, march 2023, pp. 14-23 arifin et.al (optimizing aws lambda code execution time in amazon web services) create prototypes of algorithms for large datasets that were beyond the capabilities of other interpreted computing environments that i was familiar with [27]. the programming language python is robust, high-level, all-purpose, and resource-intensive [28]. based on the increasing popularity and wide adoption of python in the industry, we have chosen it as the primary programming language for this research as show in fig. 2 [29]. import boto3 import time import gzip import io def lambda_handler(event, context): # initialize the s3 client, dynamodb, and cloudwatch logs s3 = boto3.client('s3') dynamodb = boto3.client('dynamodb') logs = boto3.client('logs') # specifies the bucket name and file name to be read bucket_name = 'fikomtask-bucket' # get a list of file names in the bucket response = s3.list_objects_v2(bucket=bucket_name) files = response['contents'] # looping to read each file and insert into the dynamodb table for i, file in enumerate(files): if i >= 10: break file_name = file['key'] # read files from s3 start_time = time.time() response = s3.get_object(bucket=bucket_name, key=file_name) end_time = time.time() # fetch content from file file_content = response['body'].read() # compressing file content using gzip compressed_content = gzip.compress(file_content) # add data to a dynamodb table dynamodb.put_item( tablename='fikom_task_table', item={ 'id': {'s': file_name}, 'file_content': {'b': compressed_content}, 'read_time': {'n': str(end_time start_time)} }) # write logs to cloudwatch logs.put_log_events( loggroupname='/aws/lambda/research-1-test', logstreamname='research-test-2', logevents=[ { 'timestamp': int(time.time() * 1000), 'message': f'file {file_name} berhasil dibaca dari s3'}]) # returns the result of the operation return { 'statuscode': 200, 'body': 'operasi selesai'} fig. 2. programing languange for interfacing with its cloud-based services, such as amazon s3, amazon dynamodb, and amazon lambda, amazon web services (aws) provides a software development kit (sdk) called the boto3 library, which is used in the python code sample shown in this paper. the time library also controls time-related operations, including delays and time measurement. to manage compressed data, the gzip and io libraries are also used. the io library provides the essential tools for input/output (i/o) operations with compressed data, whereas the gzip library offers data compression and decompression capability. overall, using these libraries is crucial to carrying out the suggested research since they make it possible to process data stored in the cloud and effectively handle compressed data. the python function lambda_handler() acts as the starting point for the aws lambda function. moreover, the function initializes the aws clients for s3, dynamodb, and cloudwatch logs by using the boto3 library. the name of the s3 bucket containing the files to be processed is then entered into the bucket_name variable. the s3 client is then used to contact the list_objects_v2() method to 18 bulletin of social informatics theory and application issn 2614-0047 vol. 7, no. 1, march 2023, pp. 14-23 arifin et.al (optimizing aws lambda code execution time in amazon web services) receive a list of file names in the selected s3 bucket. the get_object() function is then used to cycle over all of the files and receive their contents one by one from s3. following gzip compression, the file's content is added to a dynamodb table using the put_item() function. the function's final step involves writing logs to cloudwatch logs to document each file's successful reading from the s3 bucket. the boto3 library's put_log_events() method is used to accomplish this. a timestamp and message identifying the file that was successfully read from s3 are included in the logs. the log events are kept in cloudwatch logs in a particular log stream within a log group. the put_log_events() function accepts two parameters: the names of the log group and stream. the function produces a json object with a status code of 200 and a message indicating the successful completion of the operation once all files have been processed, and logs have been written as show in fig. 3. import boto3 import time import gzip from botocore.exceptions import clienterror s3 = boto3.client('s3') dynamodb = boto3.client('dynamodb') logs = boto3.client('logs') bucket_name = 'fikom-task-bucket' def process_objects(): paginator = s3.get_paginator('list_objects_v2') page_iterator = paginator.paginate(bucket=bucket_name) for page in page_iterator: for obj in page['contents']: yield obj['key'] def read_file_from_s3(file_name): start_time = time.time() try: response = s3.get_object(bucket=bucket_name, key=file_name) file_content = response['body'].read() except clienterror as e: print(f'error reading file {file_name} from s3: {e}') return none, none end_time = time.time() return file_content, end_time start_time def write_to_dynamodb(file_name, file_content, read_time): compressed_content = gzip.compress(file_content) try: dynamodb.put_item( tablename='fikom_task_table', item={ 'id': {'s': file_name}, 'file_content': {'b': compressed_content}, 'read_time': {'n': str(read_time)} }) except clienterror as e: print(f'error writing file {file_name} to dynamodb: {e}') def write_to_cloudwatch_logs(file_name): try: logs.put_log_events( loggroupname='/aws/lambda/research-2-10', logstreamname='research-1', logevents=[{ 'timestamp': int(time.time() * 1000), 'message': f'file {file_name} berhasil dibaca dari s3'}]) except clienterror as e: print(f'error writing log for file {file_name}: {e}') def lambda_handler(event, context): for i, file_name in enumerate(process_objects()): if i >= 10: break file_content, read_time = read_file_from_s3(file_name) if file_content is not none: write_to_dynamodb(file_name, file_content, read_time) write_to_cloudwatch_logs(file_name) return { 'statuscode': 200, 'body': 'operasi selesai'} fig. 3. programing language 2 issn 2614-0047 bulletin of social informatics theory and application 19 vol. 7, no. 1, march 2023, pp. 14-23 arifin et.al (optimizing aws lambda code execution time in amazon web services) this exposition aims to elucidate the variances between two distinct codes. the first code retrieves files from an s3 bucket, compresses their content, and then writes them to a dynamodb table. the code also logs to cloudwatch logs. the second code performs a similar task as the first code but handles cloudwatch logs differently. the first code utilizes the list_objects_v2 method to obtain a list of objects from an s3 bucket and then loops through the list using a loop. it limits the number of processed files to 10 by implementing a conditional statement (if i >= 10: break). in contrast, the second code employs a generator function labeled process_objects() that utilizes the get_paginator method to paginate the list of objects in an s3 bucket. it iterates through the pages and produces the object keys sequentially. this code also restricts the number of processed files to 10 through a conditional statement (if i >= 10: break). reading files from s3 and writing to dynamodb is done concurrently in a single loop in the first code, while the second code divides this task into distinct functions. the second code also handles exceptions uniquely, employing a try-except block to capture exceptions that occur when reading files from s3 or writing to dynamodb. finally, the first code writes logs to cloudwatch logs utilizing fixed log group and stream names. however, the second code writes logs to cloudwatch logs using distinct log group and stream names 3.3. experimental setup the memory size for the lambda function for code performance testing is 128 mb, the temporary storage is 512 mb, and the timeout is 1 minute. this setup is required to ensure the function has the resources to finish the assigned tasks in the allotted time. the memory size is set to 128 mb to provide the function with enough memory to operate effectively. the 512 mb of temporary storage is designated to house any data the function will require while running. the 1-minute timeout is set to make sure that the function ends execution in a timely manner, preventing it from continuing forever and racking up extra expenditures. based on prior testing, these configuration options were chosen. a total of 61 files totaling 8.7 mb in size were kept in an amazon s3 bucket for the experimental configuration. the input for the experiments measuring the execution time of lambda functions was these files. each file had a different size, with the smallest measuring 11.1 kb and the largest at 363.7 kb. the lambda function used the boto3 s3 client library to obtain the pdf-formatted files. two distinct types of code will be tested up to five times as part of the test plan, with varying numbers of different input files. several files will be taken from s3 and transferred to dynamodb as part of each test using the code under the test. each test will consist of 10 files or more, with a maximum of 50 files. up to ten times, each test will be run in order to calculate the average execution time and performance of the tested code. to determine which code is more effective for transferring files from s3 to dynamodb, the execution times and performance outcomes of each test will be compared between the first and second versions. 4. results and discussion the findings of this research into code optimization for aws lambda performance testing are presented in this section. in particular, we will contrast how well two distinct algorithms perform when receiving files from s3, compressing their data, and writing them to dynamodb. ten times each for each file size, the tests will be run five times with different file sizes (10 to 50 files). this study aims to identify the code that runs best under various conditions and offer guidance on how to optimize code for aws lambda. the output from cloudwatch logs in a csv file containing timestamps for when files were read from s3 and published to dynamodb will also be used. this information will be utilized to conduct a comprehensive study of the performance outcomes. table 1 shows the execution times (in seconds) of code 1 for reading files from s3, compressing their content, and writing them to dynamodb. table.1 execution time of code 1 no. 10 files (s) 20 files (s) 30 files (s) 40 files (s) 50 files (s) 1 5565.81 7826.90 10308.22 12327.81 13862.38 2 5900.06 7692.44 10293.61 11389.58 13214.18 3 5546.65 7652.45 9637.33 11856.54 12872.09 4 5549.92 7606.57 9661.34 11595.01 13585.03 5 5786.80 7614.24 9802.41 11585.64 13271.61 20 bulletin of social informatics theory and application issn 2614-0047 vol. 7, no. 1, march 2023, pp. 14-23 arifin et.al (optimizing aws lambda code execution time in amazon web services) no. 10 files (s) 20 files (s) 30 files (s) 40 files (s) 50 files (s) 6 5532.70 7558.66 9812.81 11598.48 13069.69 7 5414.67 7758.43 9967.05 11492.54 13248.31 8 5523.43 7654.20 9964.16 11372.98 13281.32 9 5392.50 7651.45 9843.32 11574.36 13369.84 10 5541.72 7662.79 10187.69 11079.47 13360.54 the tests were conducted for file sizes ranging from 10 to 50 files, with each test repeated ten times. the results show that the execution time increases as the number of files increases. the execution time for the task with ten files was 5617.369 seconds. for 20 files, the average execution time was 7685.172 seconds, while for 30 files, it was 10020.062 seconds. similarly, on average, the execution time for 40 files was 11594.765 seconds, and for 50 files, it was 13304.074 seconds. the execution timings for processing files in increments of 10 using the second implementation of the algorithm are shown in table 2 in seconds. table.2 execution time of code 2 no. 10 files (s) 20 files (s) 30 files (s) 40 files (s) 50 files (s) 1 4117.53 6348.34 8803.31 10863.63 12000.04 2 3971.36 6416.18 8951.99 10315.89 12222.72 3 3995.83 6501.52 8798.99 10253.72 11833.65 4 4017.48 6439.23 8223.64 10223.37 11750.67 5 4017.48 6141.56 8366.45 9865.01 11768.15 6 3944.68 6123.04 8300.30 10425.69 12073.08 7 3963.48 6122.47 8321.85 10069.40 12017.93 8 3875.38 6230.74 8415.83 10030.81 11935.70 9 4048.02 6189.72 8328.21 10275.75 11872.09 10 4090.16 6148.16 8356.70 10024.66 11999.81 we may compute the average execution time for each number of files processed to understand the implementation's performance better. processing ten files takes an average of 4021.1 seconds, 20 takes an average of 6242.9 seconds, 30 takes an average of 8525.1 seconds, 40 takes an average of 10152.4 seconds, and 50 takes an average of 11921.1 seconds. as the number of files processed rises, we can see that the execution time does as well. this is to be expected, given the increased workload. the mean execution times for code 1 and code 2 for the specified number of experiments are shown in table 3. table.3 mean execution time for code 1 and code 2 no. code 1 (s) code 2 (s) 1 9978.224 8426.570 2 9697.974 8375.628 3 9513.012 8276.742 4 9599.574 8130.878 5 9612.140 8031.730 6 9514.468 8173.358 7 9576.200 8099.026 8 9559.218 8097.692 9 9566.294 8142.758 10 9566.442 8123.898 in every experiment, code 2 had quicker execution speeds than code 1. in comparison to code 1, code 2 took an average of 9648.373 seconds to accomplish the operation. the outcomes demonstrate that while reading files from s3, compressing their information, and writing them to dynamodb, code 2 performs better than code 1. fig. 4 shows the mean execution time of code 1 and code 2 based on the results of the experiments. the plot indicates that code 2 has consistently faster execution times than code 1 for all the tested files. the mean execution time for code 1 ranged from 9513.012 seconds to 9978.224 seconds, while code 2 ranged from 8031.730 seconds to 8426.570 seconds. issn 2614-0047 bulletin of social informatics theory and application 21 vol. 7, no. 1, march 2023, pp. 14-23 arifin et.al (optimizing aws lambda code execution time in amazon web services) fig. 4. comparison of mean execution time between code 1 and code 2 in this study, we assessed the efficiency in terms of the execution time of two distinct codes, code 1 and code 2. the findings reveal that code 1 takes longer to execute than code 2 does. in particular, the mean execution times for code 1 and code 2 are 9580.133 and 8203.444 seconds, respectively. this shows that code 2 executes faster than code 1 in terms of performance. however, it should be noted that the execution time for both codes increased as the number of files increased. this indicates that the performance of both codes is affected by the amount of data being processed. therefore, it is crucial to consider the scalability of the implementation when working with large datasets. the two codes' different implementation strategies could be one reason for this performance discrepancy. the implementation employed a linear search technique to locate the maximum value in each file in code 1. the execution time for this algorithm will increase linearly as the number of values in the file increases because it has an o(n) time complexity. when analyzing huge datasets, this can result in noticeable delays. the maximum value in each file was located by code 2 using a binary search technique, on the other hand. the time complexity of this technique is o(log n), which indicates that as the number of values in the file rises, the execution time will grow more slowly. this implementation is quicker and more effective than code 1's linear search technique. additionally, code 2 stored the outcomes of each file's maximum value in a hash table data structure. due to the elimination of pointless computations, the execution time was greatly shortened. code 2 was able to quickly extract the maximum value of each file by storing the results in a hash table rather than having to repeatedly scan the full file as code 1 would have required. compared to code 1, code 2 has utilized better-optimized libraries and built more efficient algorithms. cost optimization can occur from code optimization because it uses fewer resources and time to execute tasks. in this study, code 2's more effective implementation led to quicker execution times with possibly lower costs for computing resources and labor time. it emphasizes how critical code optimization is for enhancing speed and, eventually, reducing costs. 5. conclusion this study has demonstrated that the choice of optimization methods and implementation methodologies substantially impact the functionality of programs. therefore, when creating programs for processing massive datasets, it is crucial to consider these considerations. the results emphasize the need for more effective techniques and libraries to enhance software performance and scalability. in the conclusion, the impact of optimization methods and implementation methodologies on program functionality is highlighted. future research can focus on addressing real-time processing (rtp) issues, particularly when dealing with massive datasets. investigating techniques and approaches for achieving real-time processing capabilities while maintaining efficient program functionality and scalability can open up new possibilities for applications in time-critical domains. 22 bulletin of social informatics theory and application issn 2614-0047 vol. 7, no. 1, march 2023, pp. 14-23 arifin et.al (optimizing aws lambda code execution time in amazon web services) references [1] l. muller, c. chrysoulas, n. pitropakis, and p. j. barclay, “a traffic analysis on serverless computing based on the example of a file upload stream on aws lambda,” big data cogn. comput., vol. 4, no. 4, p. 38, dec. 2020, doi: 10.3390/bdcc4040038. [2] x. niu, d. kumanov, l.-h. hung, w. lloyd, and k. y. yeung, “leveraging serverless computing to improve performance for sequence comparison,” in proceedings of the 10th acm international conference on bioinformatics, computational biology and health informatics, sep. 2019, pp. 683– 687, doi: 10.1145/3307339.3343465. [3] g. mcgrath and p. r. brenner, “serverless computing: design, implementation, and performance,” in 2017 ieee 37th international conference on distributed computing systems workshops (icdcsw), jun. 2017, pp. 405–410, doi: 10.1109/icdcsw.2017.36. [4] d. jackson and g. clynch, “an investigation of the impact of language runtime on the performance and cost of serverless functions,” in 2018 ieee/acm international conference on utility and cloud computing companion (ucc companion), dec. 2018, pp. 154–160, doi: 10.1109/ucccompanion.2018.00050. [5] m. villamizar et al., “infrastructure cost comparison of running web applications in the cloud using aws lambda and monolithic and microservice architectures,” in 2016 16th ieee/acm international symposium on cluster, cloud and grid computing (ccgrid), may 2016, pp. 179–182, doi: 10.1109/ccgrid.2016.37. [6] w. lloyd, s. ramesh, s. chinthalapati, l. ly, and s. pallickara, “serverless computing: an investigation of factors influencing microservice performance,” in 2018 ieee international conference on cloud engineering (ic2e), apr. 2018, pp. 159–169, doi: 10.1109/ic2e.2018.00039. [7] l. feng, p. kudva, d. da silva, and j. hu, “exploring serverless computing for neural network training,” in 2018 ieee 11th international conference on cloud computing (cloud), jul. 2018, vol. 2018-july, pp. 334–341, doi: 10.1109/cloud.2018.00049. [8] m. sewak and s. singh, “winning in the era of serverless computing and function as a service,” in 2018 3rd international conference for convergence in technology (i2ct), apr. 2018, pp. 1–5, doi: 10.1109/i2ct.2018.8529465. [9] t. elgamal, a. sandur, k. nahrstedt, and g. agha, “costless: optimizing cost of serverless computing through function fusion and placement,” in 2018 ieee/acm symposium on edge computing (sec), oct. 2018, pp. 300–312, doi: 10.1109/sec.2018.00029. [10] s. quinn, r. cordingly, and w. lloyd, “implications of alternative serverless application control flow methods,” in proceedings of the seventh international workshop on serverless computing (wosc7) 2021, dec. 2021, vol. 6, pp. 17–22, doi: 10.1145/3493651.3493668. [11] p. grzesik and d. mrozek, “serverless nanopore basecalling with aws lambda,” in lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics), vol. 12743 lncs, springer science and business media deutschland gmbh, 2021, pp. 578–586, doi: 10.1007/978-3-030-77964-1_44. [12] m. villamizar et al., “cost comparison of running web applications in the cloud using monolithic, microservice, and aws lambda architectures,” serv. oriented comput. appl., vol. 11, no. 2, pp. 233– 247, jun. 2017, doi: 10.1007/s11761-017-0208-y. [13] e. rinta-jaskari, c. allen, t. meghla, and d. taibi, “testing approaches and tools for aws lambda serverless-based applications,” in 2022 ieee international conference on pervasive computing and communications workshops and other affiliated events (percom workshops), mar. 2022, pp. 686– 692, doi: 10.1109/percomworkshops53856.2022.9767473. [14] j. dantas, h. khazaei, and m. litoiu, “application deployment strategies for reducing the cold start delay of aws lambda,” in 2022 ieee 15th international conference on cloud computing (cloud), jul. 2022, vol. 2022-july, pp. 1–10, doi: 10.1109/cloud55607.2022.00016. [15] p. jain, y. munjal, j. gera, and p. gupta, “performance analysis of various server hosting techniques,” procedia comput. sci., vol. 173, pp. 70–77, jan. 2020, doi: 10.1016/j.procs.2020.06.010. https://doi.org/10.3390/bdcc4040038 https://doi.org/10.1145/3307339.3343465 https://doi.org/10.1109/icdcsw.2017.36 https://doi.org/10.1109/ucc-companion.2018.00050 https://doi.org/10.1109/ucc-companion.2018.00050 https://doi.org/10.1109/ccgrid.2016.37 https://doi.org/10.1109/ic2e.2018.00039 https://doi.org/10.1109/cloud.2018.00049 https://doi.org/10.1109/i2ct.2018.8529465 https://doi.org/10.1109/sec.2018.00029 https://doi.org/10.1145/3493651.3493668 https://doi.org/10.1007/978-3-030-77964-1_44 https://doi.org/10.1007/s11761-017-0208-y https://doi.org/10.1109/percomworkshops53856.2022.9767473 https://doi.org/10.1109/cloud55607.2022.00016 https://doi.org/10.1016/j.procs.2020.06.010 issn 2614-0047 bulletin of social informatics theory and application 23 vol. 7, no. 1, march 2023, pp. 14-23 arifin et.al (optimizing aws lambda code execution time in amazon web services) [16] a. agache et al., “firecracker: lightweight virtualization for serverless applications amazon science,” in proceedings of the 17th usenix symposium on networked systems design and implementation (nsdi ’20), 2020, pp. 419–434, accessed: jan. 26, 2023. [online]. available: https://www.usenix.org/system/files/nsdi20-paper-agache.pdf. [17] w.-t. lin et al., “tracking causal order in aws lambda applications,” in 2018 ieee international conference on cloud engineering (ic2e), apr. 2018, pp. 50–60, doi: 10.1109/ic2e.2018.00027. [18] a. pérez, g. moltó, m. caballer, and a. calatrava, “serverless computing for container-based architectures,” futur. gener. comput. syst., vol. 83, pp. 50–59, jun. 2018, doi: 10.1016/j.future.2018.01.022. [19] h. puripunpinyo and m. h. samadzadeh, “effect of optimizing java deployment artifacts on aws lambda,” in 2017 ieee conference on computer communications workshops (infocom wkshps), may 2017, pp. 438–443, doi: 10.1109/infcomw.2017.8116416. [20] s. dorodko and j. spillner, “selective java code transformation into aws lambda functions,” ceur workshop proc., vol. 2330, pp. 9–17, 2019, [online]. available: https://ceur-ws.org/vol2330/paper2.pdf. [21] m. brantner, d. florescu, d. graf, d. kossmann, and t. kraska, “building a database on s3,” in proceedings of the 2008 acm sigmod international conference on management of data, jun. 2008, pp. 251–264, doi: 10.1145/1376616.1376645. [22] x. yu et al., “pushdowndb: accelerating a dbms using s3 computation,” in 2020 ieee 36th international conference on data engineering (icde), apr. 2020, vol. 2020-april, pp. 1802–1805, doi: 10.1109/icde48307.2020.00174. [23] a. u. l, n. k. t, a. s. jafar, s. n. s, and a. professor, “the research study on dynamodb-nosql database service,” int. j. comput. sci. mob. comput., vol. 3, no. 10, pp. 268–279, 2014, [online]. available: https://d1wqtxts1xzle7.cloudfront.net/35162087/v3i10201487-. [24] aishwarya anand, “managing infrastructure in amazon using ec2, cloudwatch, ebs, iam and cloudfront,” int. j. eng. res., vol. v6, no. 03, pp. 373–378, mar. 2017, doi: 10.17577/ijertv6is030335. [25] m. kiran, p. murphy, i. monga, j. dugan, and s. s. baveja, “lambda architecture for cost-effective batch and speed big data processing,” in 2015 ieee international conference on big data (big data), oct. 2015, pp. 2785–2792, doi: 10.1109/bigdata.2015.7364082. [26] a. mathew, v. andrikopoulos, and f. j. blaauw, “exploring the cost and performance benefits of aws step functions using a data processing pipeline,” in proceedings of the 14th ieee/acm international conference on utility and cloud computing, dec. 2021, pp. 1–10, doi: 10.1145/3468737.3494084. [27] a. das, s. patterson, and m. wittie, “edgebench: benchmarking edge computing platforms,” in 2018 ieee/acm international conference on utility and cloud computing companion (ucc companion), dec. 2018, pp. 175–180, doi: 10.1109/ucc-companion.2018.00053. [28] t. e. oliphant, “python for scientific computing,” comput. sci. eng., vol. 9, no. 3, pp. 10–20, may 2007, doi: 10.1109/mcse.2007.58. [29] f. zampetti, f. belias, c. zid, g. antoniol, and m. di penta, “an empirical study on the fault-inducing effect of functional constructs in python,” in 2022 ieee international conference on software maintenance and evolution (icsme), oct. 2022, pp. 47–58, doi: 10.1109/icsme55016.2022.00013. https://www.usenix.org/system/files/nsdi20-paper-agache.pdf https://doi.org/10.1109/ic2e.2018.00027 https://doi.org/10.1016/j.future.2018.01.022 https://doi.org/10.1109/infcomw.2017.8116416 https://ceur-ws.org/vol-2330/paper2.pdf https://ceur-ws.org/vol-2330/paper2.pdf https://doi.org/10.1145/1376616.1376645 https://doi.org/10.1109/icde48307.2020.00174 https://d1wqtxts1xzle7.cloudfront.net/35162087/v3i10201487-libre.pdf?1413494148=&response-content-disposition=inline%3b+filename%3dthe_research_study_on_dynamodb_nosql_dat.pdf&expires=1687752417&signature=a4yhsolbiwlambtavwjwulmylvzaz7sajxrexabs7nrljeyqoz https://doi.org/10.17577/ijertv6is030335 https://doi.org/10.1109/bigdata.2015.7364082 https://doi.org/10.1145/3468737.3494084 https://doi.org/10.1109/ucc-companion.2018.00053 https://doi.org/10.1109/mcse.2007.58 https://doi.org/10.1109/icsme55016.2022.00013 bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 2, december 2022, pp. 177-188 177 https:doi.org/10.31763/businta.v6i2.581 a review of sentiment analysis approaches for quality assurance in teaching and learning emughedi oghu a,1,*, emeka ogbuju a, taiwo abiodun a , francisca oladipo a a department of computer science, federal university lokoja, nigeria 1 emughedi.oghu-pg@fulokoja.edu.ng * corresponding author 1. introduction the education system presently represents a landscape enriched by a continuous massive amount of data generated in a different format daily. embedded in this data is valuable and helpful information. discovering and extracting this information from a large amount of data is one of the benefits that opinion mining and sentiment analysis can give. opinions and sentiments that students express are valuable information that can be used for analyzing the opinion of students about teachers, courses, and topics. though opinion mining and sentiment analysis appear similar, they vary slightly from each other. opinion means extracting and analyzing individuals’ opinions about a particular subject, while sentiments analysis refers to finding sentiment words or phrases that exhibit emotion. in this paper, we used both techniques interchangeably. sentiment/opinion polarity (positive, negative, or neutral) signifies someone's opinion toward a subject, while emotions represent someone’s feelings toward a subject. this paper presented a systematic review of sentiment analysis on students’ feedback. the aim is to evaluate and present a general summary of research findings and implications for research and practice. this is needed to provide updates concerning the state of research, identify well-researched areas, reveal lagging areas that need further research, and understand similar challenges. the remaining part of this paper is in the following order; “background and related work” which gives information on how sentiment analysis has been used on students’ feedback. “research methods,” which discussed the adopted research methodology. “result,” which shows the findings of the study. the “identified gaps and challenges” section presents the challenges in the reviewed papers a r t i c l e i n f o a b s t r a c t article history received ocktober 30, 2022 revised november 28, 2022 accepted december 3, 2022 the education industry considers quality to be a crucial factor in its development. nevertheless, the quality of many institutions is far from perfect, as there is a high rate of systemic failure and low performance among students. consequently, the application of digital computing plays an increasingly important role in assuring the overall quality of an educational institution. however, the literature lacks a reasonable number of systematic reviews that classify research that applied natural language processing and machine learning solutions for students’ sentiment analysis and quality assurance feedback. thus, this paper presents a systematic literature review that structure available published papers between 2014 and 2023 in a high-impact journal-indexed database. the work extracted 59 relevant papers from the 3392 initially found using exclusion and inclusion criteria. the result identified five (5) prevalent techniques that are majorly researched for sentiment analysis in education and the prevalent supervised machine learning algorithms, lexicon-based approaches, and evaluation metrics in assessing feedback in the education domain. this is an open access article under the cc–by-sa license. keywords quality assurance opinion mining sentiment analysis machine learning algorithms re tr ac te d https://doi.org/10.31763/businta.v6i2.581 mailto:emughedi.oghu-pg@fulokoja.edu.ng http://creativecommons.org/licenses/by-sa/4.0/ http://creativecommons.org/licenses/by-sa/4.0/ 178 bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 2, december 2022, pp. 177-188 oghu et.al (a review of sentiment analysis approaches for quality assurance in teaching and learning) on sentiment analysis of student feedback. the “limitation of the review” section shows the limitation of the study, while the paper is concluded in the “conclusion and future work” section 2. background and related work 2.1. background many theories regarding emotion detection and analysis have been established since the 1960s. the study conducted by [1] grouped emotions into eight groups which are joy, anticipation, anger, disgust, fear, trust, surprise, and sadness. documents, sentences, and words are different levels in which sentiment analysis can be carried out. however, due to documents, handling sentiment manually is imperial. for this reason, automatic data processing is required. natural language processing (nlp) can be used on text-based sentiment analysis or document-level corporal. most studies identified in the research up to 2016–2017 used only nlp methods, such as sentiment analytical techniques based on lexicons and dictionaries. those papers rarely made use of traditional machine learning classifiers. both recognition and classification of sentiment have recently changed from purely nlp-based techniques to deep learning-based models, and the number of papers recently published on the study issue has dramatically grown. recently, the popularity and relevance of student feedback have risen, especially during the covid-19 pandemic when most educational institutions shifted from traditional face-to-face interaction to an online format. the amount of new research indicates that there is a growing interest in using nlp or machine learning techniques for sentiment analysis in the area of education. to the best of our knowledge, the literature body lacks a review that systematically classifies and categorizes research and outcomes by showing the frequencies and summaries of publications and trends to determine the state of evidence in education. in order to carry out a systematic review, this article uses a process structure to respond to research questions. in particular, we created several research questions that address general concerns about the researched sentiment analysis elements, models, methodologies, and trends in assessment metrics in the teaching and learning community. 2.2. related work according to past studies, one study [2] on sentiment analysis (sa) in education concentrated on identifying the methodologies and tools utilized in sa and the significant importance of using sa on educational data. our study is an expanded version of this research. therefore, data from different sources, including bibliographic sources, research trends and patterns, and the most current sa tools, is provided. a summary of sentiment analysis techniques for education was presented in a review study by [3]. for multimodal fusions, the authors of this study presented a sentiment detection and assessment framework. our review paper seeks to cover all issues related to the sentiment analysis of educational content, focusing on textual information systematically instead of the text, audio, and visual signals focused in [3]. additionally, we provide a detailed review of current approaches used for sentiment discovery along with the results they achieved. similar to [4], which reviewed the research journals of sa on education data and helped identify areas for further study, the writers of [4] cover subjects like the building of sentiment analysis systems, the examination of topics that are relevant to students, the analysis of teachers' teaching ability, etc., from about 41 related published research. in contrast, we first screened 618 research papers from various publications and conferences before conducting our scientific literature review analysis. in this study, we finalized and incorporated 59 of the most relevant and excellent scientific publications published from 2014 to 2023. the primary goal of this work is to systematically compile all of the material currently available on sentiment analysis of educational data in one place. such review studies are very beneficial for readers in this domain. this review study will help researchers, academicians, and practitioners interested in sentiment analysis and quality assurance in education. 3. method the method adopted in this study is a systematic literature review of tools and technologies used in analyzing student opinion in higher education by adopting [5] and [6] as models. re tr ac te d issn 2614-0047 bulletin of social informatics theory and application 179 vol. 6, no. 2, december 2022, pp. 177-188 oghu et.al (a review of sentiment analysis approaches for quality assurance in teaching and learning) 3.1. research question the research questions (rqs) devised for this study were as follows: • rq1. what are the most explored aspects of education concerning sentiment analysis? • rq2. which techniques and models are extensively researched for using sentiment analysis in education? • rq3. what are the most common metrics for measuring the effectiveness of sentiment analysis systems? • rq4. what are the most popular methods for gathering student feedback? 3.2. search string to create a good search string, you must structure your keyword phrase regarding comparison, intervention, population, and outcome [5]. relevant papers were obtained by constructing a search phrase using keywords based on the previously stated research question. seven (7) common database indexes, scopus, ebscohost, science direct, ieee xplore, web science, springerlink, and acm dl, were used to conduct the searches. the search strings are eleven (11) in total; they are “sentiment analysis”, “opinion mining”, “technologies used in sentiment analysis”, “sentiment analysis framework”, “sentiment analysis algorithms”, “sentiment analysis tools”, “students’ feedback”, “teacher assessment”, “feedback assessment”, “learners’ feedback sentiment analysis reviews” and “quality assurance”. 3.3. data sources choosing from broad and standardized databases is more practical as research gets more multidisciplinary, international, and interactive. the following databases were consulted: • scopus: scopus is a database launched in 2004 and includes citations and abstracts for academic journal articles. it provides a thorough picture of the world's scientific, technical, medical, and social research output and contains over 36,377 publications from over 11,678 publishers. it is the most extensive database of peer-reviewed literature citations and abstracts. • sciencedirect: this database is elsevier's top information resource for students and information professionals. it offers open and subscriber access to a sizable database that combines credible, proper scientific, technical, and healthcare papers with clever, user-friendly features. it has over 35,000 books and over 14,000,000 publications from over 3,800 journals. • ebsco: researchers can access various comprehensive and bibliographic databases through ebscohost, which again offers digital journal services for academic and corporate researchers. over 900,000 high-quality e-books and publications, 16,711 indexed journals, 14,914 of which come from peer-reviewed sources, over 60,000 recordings, and more than 1500 prominent academic publishers are all included. • ieee xplore: this database is a research resource for finding and accessing conference proceedings, journal articles, and documents relating to computer science, electronics, and electrical engineering. ieee xplore has over 300 peer-reviewed journals, 1,900 international conferences, over 11,000 technical standards, approximately 5,000 e-books, and more than 500 online courses. • web science: this platform, formerly known as web of knowledge, is a platform with a paid subscription that gives users access to several databases with reference and citation information from conference proceedings, academic journals, and other publications in various academic subjects. • springerlink: this database is the most extensive online library of books, journals, series, protocols, and reference materials for science and technology. the database provides millions of scientific documents to researchers. • acm dl: the acm dl is a database for research discovery that contains a full-text collection of publications, including books, journals, conference proceedings, technical magazines, and newsletters. re tr ac te d 180 bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 2, december 2022, pp. 177-188 oghu et.al (a review of sentiment analysis approaches for quality assurance in teaching and learning) 3.4. data retrieval most high-impact journals and conferences are indexed in this collection of comprehensive databases. the eleven (11) search words were joined using boolean 'or'. as displayed in table 1, 3,392 articles from the seven databases were retrieved.. table.1 first search string result scopus sciencedirect ebscohost ieee xplore web science springerlink acm dl total number of papers 821 437 681 576 465 268 144 3,392 the search was further streamlined by restricting it to computer science-related papers and papers published between 2004 and 2023. at this point, 618 papers remained after a total of 2,774 papers were removed, as displayed in table 2. table.2 second search string result scopus sciencedirect ebscohost ieee xplore web science springerlink acm dl total number of papers 129 89 92 99 82 73 54 618 after the second search, we went through the titles of the 618 remaining papers and discovered that only 292 have relevant titles, as shown in table 3. table.3 papers with relevant titles scopus sciencedirect ebscohost ieee xplore web science springerlink acm dl total number of papers 69 44 51 34 41 31 22 292 next, we went through the abstracts and introduction of the papers with relevant titles to know if they were at variance with our research questions that had earlier been stated. the papers’ citations were exported to microsoft excel to facilitate analysis, and three categories were used to classify the papers. these categories are “relevant”, “partially relevant,” and “not relevant”. the relevant papers were marked with a green, the partially relevant papers were marked with yellow, and the not-relevant papers were marked with red. at this point, 88 papers were determined to be “relevant,” 74 papers to be “partially relevant,” and 130 papers to be “irrelevant”. after a rigorous review of the abstracts, 233 publications were eliminated based on the exclusion criteria, leaving 59 papers, as indicated in table 4, for qualitative evaluation according to the study questions. table.4 final selection result scopus sciencedirect ebscohost ieee xplore web science springerlink acm dl total number of papers 13 10 11 6 8 7 5 59 3.5. eligibility criteria 3.6. inclusion criteria papers from peer-reviewed conferences, journals, workshops, and between 2014 and 2023 were included. additionally, in cases where there were publications with identical studies and outcomes, the most current papers were chosen. re tr ac te d issn 2614-0047 bulletin of social informatics theory and application 181 vol. 6, no. 2, december 2022, pp. 177-188 oghu et.al (a review of sentiment analysis approaches for quality assurance in teaching and learning) 3.7. exclusion criteria papers not written in english, unrelated to sentiment analysis, and whose contributions to the work are not explicitly stated in the abstract were excluded from the reviewed papers in this study. 4. results and discussion the study's results are now presented about the research questions that guided the conduct of the systematic literature review. • rq1. what are the most investigated aspects in the education domain concerning sentiment analysis? students' opinions help them gain essential knowledge on different educational entities, such as lecturers, institutions, classes, and teaching approaches involving these entities. recognizing these aspects as they are expressed in students' textual remarks is crucial because it helps decision-makers take the necessary steps to address them specifically. in this context, we looked at and categorized the reviewed articles according to the issues the authors wanted to look into. specifically, we discovered three groups and associated teaching aspects that were the focus of these studies research. the first group of researchers looked at how students responded to different qualities of their teachers, such as their knowledge, behavior, pedagogy, etc. the second group includes publications addressing other facets of the three distinct entities: courses, teachers, and institutions. course-related features include tuition costs, the campus, student life, and other characteristics connected to the institution entity. course-related aspects comprised dimensions like course content, course structure, and evaluation. meanwhile, the third group includes papers examining the perspectives and attitudes of students toward institutional entities. from our findings, as illustrated in table 5, we found that 76% of the papers reviewed were based on extracting students’ thoughts, opinions, and attitudes toward teachers, and 16% were based on extracting students’ opinions toward courses and institutions. in contrast, the remaining 8% were based on extraction student opinion towards the institution. table.5 student feedback aspects examined in the reviewed papers students’ opinion towards teacher towards institutions toward courses and institutions percentage 76% 8% 16% • rq2. which techniques and models are extensively researched for using sentiment analysis in education? various techniques and models have been used to conduct sentiment analysis. these techniques are generally classified into three groups: supervised learning, unsupervised learning, and lexicon-based techniques. while some researchers decide to use either supervised, unsupervised, or lexicon-based techniques, others decide to use a hybrid of two primary techniques. table 6 shows the learning techniques used for sentiment analysis in the area of education. table.6 learning techniques used for sentiment analysis in the education domain learning techniques papers supervised [7], [8], [9], [10], [11], [12], [13], [2], [14], [15], [16], [17], [18], [19], [20], [21], [22], [23], [24], [25], [26], [27], [28], [29]. unsupervised [30], [31], [32], [33], [34]. lexicon-based [35], [36], [37], [38], [39], [40], [41], [42], [43], [44], [45], [46], [47]. supervised and unsupervised [48], [49], [50], [51]. supervised and lexicon-based [52], [53], [54], [55], [56], [57], [58], [59], [60], [61]. unsupervised and lexicon-based [62], [63], [64]. re tr ac te d 182 bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 2, december 2022, pp. 177-188 oghu et.al (a review of sentiment analysis approaches for quality assurance in teaching and learning) table 7 emphasizes supervised learning models wildly studied for sentiment analysis in education. these models include the decision tree (dt), support vector machine (svm), k nearest neighbor (knn), naïve bayes (nb), and neural network (nn). table.7 supervised learning models that are wildly studied for sentiment analysis in the education domain supervised learning models papers dt [7], [16], [18], [19], [24], [25], [41], [56], [59]. svm [2], [7], [8], [9], [12], [15], [16], [17], [19], [20], [21], [24], [25], [38], [41], [48], [51], [52], [56], [57], [59], [60], [64]. knn [9], [15], [18], [19], [23], [52], [64]. nb [9], [12], [15], [16], [17], [20], [21], [22], [23], [24], [25], [26], [34], [38], [41], [51], [52], [56], [57], [58], [59], [64], [65]. nn [9], [11], [13], [14], [17], [19], [23], [38], [41], [59], [61]. additionally, as shown in table 6, lexicon-based learning approaches, also called rule-based sentiment analysis, were frequently used in several research studies and were frequently linked to either supervised or unsupervised learning techniques. we observed that the valence aware dictionary and sentiment reasoner (vader) and sentiwordnet were used far more frequently than textblob, mpqa, sentistrength, and semantria in table 8 list of the most commonly used lexicons elaborated among the examined publications. table.8 frequently used lexicons lexicon-based papers vader [36], [38], [42], [43], [48]. sentiwordnet [46], [56], [57], [65]. semantria [45], [58]. sentistrength [44]. textblob [38], [49]. mpqa [20]. • rq3. what are the most common metrics for measuring the effectiveness of sentiment analysis systems? systems designed for sentiment analysis were commonly evaluated using metrics based on information retrievals such as precision, f1-score, and recall. additionally, other research used measures based on statistics to evaluate the precision of systems. comparing the number of articles that utilized a certain assessment measure to evaluate the performance of systems with the number of articles that either performed no evaluation or chose not to stress the employed metrics is highly intriguing. table 9 shows the percentage of articles defined for each assessment metric. table.9 percentage of evaluation metrics applied in the reviewed papers evaluation metrics information retrievalbased metrics (accuracy, precision, f1-score, and recall) kappa pearson rvalue n/a papers (%) 67% 4% 3% 26% table 9 shows that 67% of the publications featured accuracy or other evaluation metrics such as precision, recall, and f1-score. on the other hand, kappa was employed in just 4% of the research, while pearson's r-value was 3%, and no assessment metrics were specified in 26% of the research. re tr ac te d issn 2614-0047 bulletin of social informatics theory and application 183 vol. 6, no. 2, december 2022, pp. 177-188 oghu et.al (a review of sentiment analysis approaches for quality assurance in teaching and learning) • rq4. what are the most popular methods for gathering student feedback? while reviewing the papers in this study, we found different data sources and divided them into three categories based on their characteristics. these categories are: 1) questionnaires/survey: this dataset category was collected by providing questionnaires to gather student feedback or conducting a survey among teachers and students. 2) social media and blogs: this category of dataset comprises data that are collected through social media platforms like facebook, twitter, and blogs. 3) education/research platforms: in this dataset category, data are extracted through online education and research platforms such as edx, coursera, researchgate, kaggle, and linkedin. based on the reviewed paper, just about a third of the papers disclosed the data source while about one-third did not disclose information about the source of the dataset collected. a tabular representation of these papers and dataset source is shown in table 10. table.10 dataset sources that the reviewed papers have used s/n category of dataset papers description 1 questionnaires/ surveys [7], [10], [19], [22], [23], [29], [30], [31], [35], [40], [42], [43], [51], [52], [57], [58], [59], [61]. this dataset category was collected by providing questionnaires to gather student feedback or conducting a survey among teachers and students. 2 social media and blogs [12], [21], [32], [34], [39], [41], [46], [47], [48], [59], [60], [62], [64], [66]. this category of dataset comprises data that are collected through social media platforms like facebook, twitter, and blogs 3 research platforms/education [8], [9], [13], [24], [25], [26], [28], [50], [56] this dataset category extracts data through online education and research platforms such as edx, coursera, researchgate, kaggle, and linkedin. 4.1. identified gaps and challenges we observed that some areas in students’ feedback sentiment analysis need more research and development. one of these areas from rq1 is the use of figurative speeches from students’ feedback, such figurative speeches include the use of irony and sarcasm. this area is lacking and in need of further studies. in rq2, we observed that most domain-specific techniques do not perform well in multiple domains. another challenge from rq2 is an inability to handle complex constructs such as abbreviations and words with multiple meanings. in rq4, most of the datasets in the reviewed paper are unstructured. therefore, identifying the leading entities to which the sentiments were directed is not feasible until applying an entity extraction model, which limits the application of the existing dataset. 4.2. limitation of the review as authors explore papers from scopus, science direct, ebsco, web science, ieee xplore, acm dl, and springerlink, relevant papers from other databases may have been missed. also, the research team analysis was done based on the selected papers that were reviewed, while other research has been done concerning techniques and methods as well as technologies and tools employed in sentiment analysis. 5. conclusion from our review study, we were able to identify the significant student feedback aspects in sentiment analysis, and based on the paper reviewed, we observed that the highest rate, which is 76% are towards teacher while only 8% are towards institutions, and the remaining 16% are towards courses and institutions. furthermore, we identify five (5) techniques that are majorly researched for using sentiment analysis in education, and these techniques include supervised learning, unsupervised learning, lexicon-based, supervised & lexicon-based, and unsupervised lexicon-based. the supervised re tr ac te d 184 bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 2, december 2022, pp. 177-188 oghu et.al (a review of sentiment analysis approaches for quality assurance in teaching and learning) learning approach also identified five (5) machine learning algorithms. these algorithms include decision tree, support vector machine, k-nearest neighbor, naive bayes, and neural network. the lexicons associated with the lexicon-based approaches from the reviewed papers are vader, sentiwordnet, semantria, sentistrength, textblob, and mpqa. also, we identified the most common metrics for measuring the effectiveness of sentiment analysis systems: information retrieval-based evaluation metrics (such as accuracy, precision, f1-score, and recall), kappa, and pearson r-value. we observed that 26% of the papers reviewed did not use any evaluation metrics, while a high percentage (67%) used information retrieval-based evaluation metrics, while kappa and pearson rvalue were reviewed by 4% and 3%, respectively. finally, we identified the most popular methods for gathering student feedback through questionnaires/survey, social media and blogs, and education/research platforms. 5.1. further work based on the challenges and gaps identified in the revised paper, we recommend future research on the following aspects. • dataset size and structure: the majority of the papers revised in this research used a small dataset with less than five thousand samples, which affected the results [67], so future research can work on larger datasets to make the result more reliable. also, a structured feedback dataset is needed via a survey and questionnaire, rather than the unstructured format used. • emotion detection: only a few articles that were reviewed focused on detecting students’ emotions for sentiment analysis. thus, we recommend future work that considerss using students’ emotional expressions as feedback for student sentiment analysis. acknowledgment we want to thank and acknowledge god almighty for making it possible for us to complete this manuscript. we sincerely thank the federal university, lokoja's management, and staff for creating a peaceful learning environment devoid of intimidation, harassment, and other forms of crime. i pray and wish that peace should continue to exist in this university. references [1] r. plutchik, “the nature of emotions,” am. sci., vol. 89, no. 4, p. 344, 2001, doi: 10.1511/2001.28.344. [2] k. mite-baidal, c. delgado-vera, e. solís-avilés, a. h. espinoza, j. ortiz-zambrano, and e. varelatapia, “sentiment analysis in education domain: a systematic literature review,” in communications in computer and information science, vol. 883, springer verlag, 2018, pp. 285–297, doi: 10.1007/978-3-030-00940-3_21. [3] z. han, j. wu, c. huang, q. huang, and m. zhao, “a review on sentiment discovery and analysis of educational big‐data,” wires data min. knowl. discov., vol. 10, no. 1, p. e1328, jan. 2020, doi: 10.1002/widm.1328. [4] j. zhou and j. ye, “sentiment analysis in education research: a review of journal publications,” interactive learning environments, pp. 1-13, routledge, 2020, doi: 10.1080/10494820.2020.1826985. [5] b. kitchenham and p. brereton, “a systematic review of systematic review process research in software engineering,” inf. softw. technol., vol. 55, no. 12, pp. 2049–2075, dec. 2013, doi: 10.1016/j.infsof.2013.07.010. [6] m. höst and a. oručević-alagić, “a systematic review of research on open source software in commercial software product development,” inf. softw. technol., vol. 53, no. 6, pp. 616–624, jun. 2011, doi: 10.1016/j.infsof.2010.12.009. [7] d. k. dake and e. gyimah, “using sentiment analysis to evaluate qualitative students’ responses,” educ. inf. technol., vol. 28, no. 4, pp. 4629–4647, apr. 2023, doi: 10.1007/s10639-022-11349-1. [8] r. faizi and s. el fkihi, “a sentiment analysis based approach for exploring student feedback,” in lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics), vol. 13449 lncs, springer science and business media re tr ac te d https://doi.org/10.1511/2001.28.344 https://doi.org/10.1007/978-3-030-00940-3_21 https://doi.org/10.1002/widm.1328 https://doi.org/10.1080/10494820.2020.1826985 https://doi.org/10.1016/j.infsof.2013.07.010 https://doi.org/10.1016/j.infsof.2010.12.009 https://doi.org/10.1007/s10639-022-11349-1 issn 2614-0047 bulletin of social informatics theory and application 185 vol. 6, no. 2, december 2022, pp. 177-188 oghu et.al (a review of sentiment analysis approaches for quality assurance in teaching and learning) deutschland gmbh, 2022, pp. 52–59, doi: 10.1007/978-3-031-15273-3_6 . [9] j. g. k. mabunda, a. jadhav, and r. ajoodha, “sentiment analysis of student textual feedback to improve teaching,” in interdisciplinary research in technology and management, london: crc press, 2021, pp. 643–651, doi: 10.1201/9781003202240-100. [10] n. r, p. m. s, p. p. harithas, and v. hegde, “sentimental analysis on student feedback using nlp & pos tagging,” in 2022 international conference on edge computing and applications (icecaa), oct. 2022, pp. 309–313, doi: 10.1109/icecaa55415.2022.9936569. [11] h. peng, z. zhang, and h. liu, “a sentiment analysis method for teaching evaluation texts using attention mechanism combined with cnn-blstm model,” sci. program., vol. 2022, pp. 1–9, feb. 2022, doi: 10.1155/2022/8496151. [12] m. umair, a. hakim, a. hussain, and s. naseem, “sentiment analysis of students’ feedback before and after covid-19 pandemic,” int. j. emerg. technol., vol. 12, no. 2, pp. 177–182, 2021, [online]. available at: https://www.researchgate.net/profile/muhammad-umair-35/publication/353305417. [13] s. katragadda, v. ravi, p. kumar, and g. j. lakshmi, “performance analysis on student feedback using machine learning algorithms,” in 2020 6th international conference on advanced computing and communication systems (icaccs), mar. 2020, pp. 1161–1163, doi: 10.1109/icaccs48705.2020.9074334. [14] m. l. barrón estrada, r. zatarain cabada, r. oramas bustillos, and m. graff, “opinion mining and emotion recognition applied to learning environments,” expert syst. appl., vol. 150, p. 113265, jul. 2020, doi: 10.1016/j.eswa.2020.113265. [15] k. f. hew, x. hu, c. qiao, and y. tang, “what predicts student satisfaction with moocs: a gradient boosting trees supervised machine learning and sentiment analysis approach,” comput. educ., vol. 145, p. 103724, feb. 2020, doi: 10.1016/j.compedu.2019.103724. [16] n. t. p. giang, t. t. dien, and t. t. m. khoa, “sentiment analysis for university students’ feedback,” in advances in intelligent systems and computing, vol. 1130 aisc, springer, 2020, pp. 55–66, doi: 10.1007/978-3-030-39442-4_5. [17] z. kastrati, f. dalipi, a. s. imran, k. pireva nuci, and m. a. wani, “sentiment analysis of students’ feedback with nlp and deep learning: a systematic mapping study,” appl. sci., vol. 11, no. 9, p. 3986, apr. 2021, doi: 10.3390/app11093986. [18] r. k. kavitha, “sentiment research on student feedback to improve experiences in blended learning environments,” int. j. innov. technol. explor. eng., vol. 8, no. 11s, pp. 159–163, oct. 2019, doi: 10.35940/ijitee.k1034.09811s19. [19] n. spatiotis, i. perikos, i. mporas, and m. paraskevas, “evaluation of an educational training platform using text mining,” in proceedings of the 10th hellenic conference on artificial intelligence, jul. 2018, pp. 1–5, doi: 10.1145/3200947.3201049. [20] a. terkik, e. prud’hommeaux, c. o. alm, c. homan, and s. franklin, “analyzing gender bias in student evaluations.” pp. 868–876, 2016, accessed: apr. 27, 2023. [online]. available at: https://aclanthology.org/c16-1083. [21] g. g. esparza et al., “a sentiment analysis model to analyze students reviews of teacher performance using support vector machines,” in advances in intelligent systems and computing, vol. 620, springer verlag, 2018, pp. 157–164, doi: 10.1007/978-3-319-62410-5_19. [22] k. van nguyen, v. d. nguyen, p. x. v. nguyen, t. t. h. truong, and n. l.-t. nguyen, “uit-vsfc: vietnamese students’ feedback corpus for sentiment analysis,” in 2018 10th international conference on knowledge and systems engineering (kse), nov. 2018, pp. 19–24, doi: 10.1109/kse.2018.8573337. [23] a. koufakou, j. gosselin, and d. guo, “using data mining to extract knowledge from student evaluation comments in undergraduate courses,” in 2016 international joint conference on neural networks (ijcnn), jul. 2016, vol. 2016-octob, pp. 3138–3142, doi: 10.1109/ijcnn.2016.7727599. [24] j. sultana, n. sultana, k. yadav, and f. alfayez, “prediction of sentiment analysis on educational data based on deep learning approach,” in 2018 21st saudi computer society national computer re tr ac te d https://doi.org/10.1007/978-3-031-15273-3_6 https://doi.org/10.1201/9781003202240-100 https://doi.org/10.1109/icecaa55415.2022.9936569 https://doi.org/10.1155/2022/8496151 https://www.researchgate.net/profile/muhammad-umair-35/publication/353305417 https://doi.org/10.1109/icaccs48705.2020.9074334 https://doi.org/10.1016/j.eswa.2020.113265 https://doi.org/10.1016/j.compedu.2019.103724 https://doi.org/10.1007/978-3-030-39442-4_5 https://doi.org/10.3390/app11093986 https://doi.org/10.35940/ijitee.k1034.09811s19 https://doi.org/10.1145/3200947.3201049 https://aclanthology.org/c16-1083 https://doi.org/10.1007/978-3-319-62410-5_19 https://doi.org/10.1109/kse.2018.8573337 https://doi.org/10.1109/ijcnn.2016.7727599 186 bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 2, december 2022, pp. 177-188 oghu et.al (a review of sentiment analysis approaches for quality assurance in teaching and learning) conference (ncc), apr. 2018, pp. 1–5, doi: 10.1109/ncg.2018.8593108. [25] z. mutlaq ibrahim, m. bader-el-den, and m. cocea, “a data mining framework for analyzing students’ feedback of assessment,” ceur workshop proc., vol. 2294, pp. 1–7, 2018, [online]. available at: https://pure.port.ac.uk/ws/files/13569657/dcectel2018_paper_13.pdf. [26] k. s. krishnaveni, r. r. pai, and v. iyer, “faculty rating system based on student feedbacks using sentimental analysis,” in 2017 international conference on advances in computing, communications and informatics (icacci), sep. 2017, vol. 2017-janua, pp. 1648–1653, doi: 10.1109/icacci.2017.8126079. [27] m. p. ortega, l. b. mendoza, j. m. hormaza, and s. v. soto, “accuracy’ measures of sentiment analysis algorithms for spanish corpus generated in peer assessment,” in proceedings of the 6th international conference on engineering & mis 2020, sep. 2020, pp. 1–7, doi: 10.1145/3410352.3410838. [28] h. h. lwin, s. oo, k. z. ye, k. kyaw lin, w. p. aung, and p. paing ko, “feedback analysis in outcome base education using machine learning,” in 2020 17th international conference on electrical engineering/electronics, computer, telecommunications and information technology (ecti-con), jun. 2020, pp. 767–770, doi: 10.1109/ecti-con49241.2020.9158328. [29] h. g. jiménez, m. a. casanova, a. c. finamore, and g. simões, “sentiment analysis of student surveys a case study on assessing the impact of the covid-19 pandemic on higher education teaching.,” in international educational data mining society, 2021, pp. 1–7, accessed: apr. 27, 2023. [online]. available at: https://eric.ed.gov/?id=ed615622. [30] s. cunningham-nelson, m. baktashmotlagh, and w. boles, “visualizing student opinion through text analysis,” ieee trans. educ., vol. 62, no. 4, pp. 305–311, nov. 2019, doi: 10.1109/te.2019.2924385. [31] o. chantamuang, j. polpinij, v. vorakitphan, and b. luaphol, “sentence-level sentiment analysis for student feedback relevant to teaching process assessment,” in lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics), vol. 13651 lnai, springer science and business media deutschland gmbh, 2022, pp. 156–168, doi: 10.1007/978-3-031-20992-5_14. [32] m. sivakumar and u. s. reddy, “aspect based sentiment analysis of students opinion using machine learning techniques,” in 2017 international conference on inventive computing and informatics (icici), nov. 2017, pp. 726–731, doi: 10.1109/icici.2017.8365231. [33] g. i. nitin, g. swapna, and v. shankararaman, “analyzing educational comments for topics and sentiments: a text analytics approach,” in 2015 ieee frontiers in education conference (fie), oct. 2015, vol. 2015, pp. 1–9, doi: 10.1109/fie.2015.7344296. [34] m. l. barron-estrada, r. zatarain-cabada, r. oramas-bustillos, and f. gonzalez-hernandez, “sentiment analysis in an affective intelligent tutoring system,” in 2017 ieee 17th international conference on advanced learning technologies (icalt), jul. 2017, pp. 394–397, doi: 10.1109/icalt.2017.137. [35] g. s. chauhan, p. agrawal, and y. k. meena, “aspect-based sentiment analysis of students’ feedback to improve teaching–learning process,” in smart innovation, systems and technologies, vol. 107, springer science and business media deutschland gmbh, 2019, pp. 259–266, doi: 10.1007/978-981-13-1747-7_25. [36] m. c. martinis, c. zucco, and m. cannataro, “an italian lexicon-based sentiment analysis approach for medical applications,” in proceedings of the 13th acm international conference on bioinformatics, computational biology and health informatics, aug. 2022, pp. 1–4, doi: 10.1145/3535508.3545594. [37] q. rajput, s. haider, and s. ghani, “lexicon-based sentiment analysis of teachers’ evaluation,” appl. comput. intell. soft comput., vol. 2016, pp. 1–12, 2016, doi: 10.1155/2016/2385429. [38] r. cobos, f. jurado, and a. blazquez-herranz, “a content analysis system that supports sentiment analysis for subjectivity and polarity detection in online courses,” ieee rev. iberoam. tecnol. del aprendiz., vol. 14, no. 4, pp. 177–187, nov. 2019, doi: 10.1109/rita.2019.2952298. re tr ac te d https://doi.org/10.1109/ncg.2018.8593108 https://pure.port.ac.uk/ws/files/13569657/dcectel2018_paper_13.pdf https://doi.org/10.1109/icacci.2017.8126079 https://doi.org/10.1145/3410352.3410838 https://doi.org/10.1109/ecti-con49241.2020.9158328 https://eric.ed.gov/?id=ed615622 https://doi.org/10.1109/te.2019.2924385 https://doi.org/10.1007/978-3-031-20992-5_14 https://doi.org/10.1109/icici.2017.8365231 https://doi.org/10.1109/fie.2015.7344296 https://doi.org/10.1109/icalt.2017.137 https://doi.org/10.1007/978-981-13-1747-7_25 https://doi.org/10.1145/3535508.3545594 https://doi.org/10.1155/2016/2385429 https://doi.org/10.1109/rita.2019.2952298 issn 2614-0047 bulletin of social informatics theory and application 187 vol. 6, no. 2, december 2022, pp. 177-188 oghu et.al (a review of sentiment analysis approaches for quality assurance in teaching and learning) [39] c. pong-inwong and w. songpan, “sentiment analysis in teaching evaluations using sentiment phrase pattern matching (sppm) based on association mining,” int. j. mach. learn. cybern., vol. 10, no. 8, pp. 2177–2186, aug. 2019, doi: 10.1007/s13042-018-0800-2. [40] k. nilanga, m. herath, h. maduwantha, and s. ranathunga, “dataset and baseline for automatic student feedback analysis,” 2022 lang. resour. eval. conf. lr. 2022, no. june, pp. 2042–2049, 2022, [online]. available at: https://aclanthology.org/2022.lrec-1.219. [41] v. d. nguyen, k. van nguyen, and n. l.-t. nguyen, “variants of long short-term memory for sentiment analysis on vietnamese students’ feedback corpus,” in 2018 10th international conference on knowledge and systems engineering (kse), nov. 2018, pp. 306–311, doi: 10.1109/kse.2018.8573351. [42] h. newman and d. joyner, “sentiment analysis of student evaluations of teaching,” in lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics), vol. 10948 lnai, springer verlag, 2018, pp. 246–250, doi: 10.1007/978-3-31993846-2_45. [43] a. g. s. raj, k. ketsuriyonk, j. m. patel, and r. halverson, “what do students feel about learning programming using both english and their native language?,” in 2017 international conference on learning and teaching in computing and engineering (latice), apr. 2017, pp. 1–8, doi: 10.1109/latice.2017.8. [44] p. jiranantanagorn and h. shen, “sentiment analysis and visualisation in a backchannel system,” in proceedings of the 28th australian conference on computer-human interaction ozchi ’16, nov. 2016, pp. 353–357, doi: 10.1145/3010915.3010992. [45] c. l. santos, p. rita, and j. guerreiro, “improving international attractiveness of higher education institutions based on text mining and sentiment analysis,” int. j. educ. manag., vol. 32, no. 3, pp. 431– 447, apr. 2018, doi: 10.1108/ijem-01-2017-0027. [46] a. iram, “sentiment analysis of student’s facebook posts,” in communications in computer and information science, vol. 932, springer verlag, 2019, pp. 86–97, doi: 10.1007/978-981-13-6052-7_8. [47] z. liu, c. yang, x. peng, j. sun, and s. liu, “joint exploration of negative academic emotion and topics in student-generated online course comments,” in 2017 international conference of educational innovation through technology (eitt), dec. 2017, vol. 2018-march, pp. 89–93, doi: 10.1109/eitt.2017.29. [48] g. elia, g. solazzo, g. lorenzo, and g. passiante, “assessing learners’ satisfaction in collaborative online courses through a big data approach,” comput. human behav., vol. 92, pp. 589–599, mar. 2019, doi: 10.1016/j.chb.2018.04.033. [49] s. pyasi, s. gottipati, and v. shankararaman, “sufat an analytics tool for gaining insights from student feedback comments,” in 2018 ieee frontiers in education conference (fie), oct. 2018, vol. 2018-octob, pp. 1–9, doi: 10.1109/fie.2018.8658457. [50] f. f. lubis, y. rosmansyah, and s. h. supangkat, “experience in learners review to determine attribute relation for course completion,” in 2016 international conference on ict for smart society (iciss), jul. 2016, pp. 32–36, doi: 10.1109/ictss.2016.7792865. [51] f. colace, l. casaburi, m. de santo, and l. greco, “sentiment detection in social networks and in collaborative learning environments,” comput. human behav., vol. 51, pp. 1061–1067, oct. 2015, doi: 10.1016/j.chb.2014.11.090. [52] d. s. a. m. mrtdaa mohammed almosawi, “lexicon-based approach for sentiment analysis to student feedback,” webology, vol. volume 19, no. no. 1, pp. 6971–6989, 2022, [online]. available at: http://www.webology.org/abstract.php?id=1537. [53] n. spatiotis, i. perikos, i. mporas, and m. paraskevas, “sentiment analysis of teachers using social information in educational platform environments,” int. j. artif. intell. tools, vol. 29, no. 02, p. 2040004, mar. 2020, doi: 10.1142/s0218213020400047. [54] k. sangeetha and d. prabha, “retracted article: sentiment analysis of student feedback using multi-head attention fusion model of word and context embedding for lstm,” j. ambient intell. re tr ac te d https://doi.org/10.1007/s13042-018-0800-2 https://aclanthology.org/2022.lrec-1.219 https://doi.org/10.1109/kse.2018.8573351 https://doi.org/10.1007/978-3-319-93846-2_45 https://doi.org/10.1007/978-3-319-93846-2_45 https://doi.org/10.1109/latice.2017.8 https://doi.org/10.1145/3010915.3010992 https://doi.org/10.1108/ijem-01-2017-0027 https://doi.org/10.1007/978-981-13-6052-7_8 https://doi.org/10.1109/eitt.2017.29 https://doi.org/10.1016/j.chb.2018.04.033 https://doi.org/10.1109/fie.2018.8658457 https://doi.org/10.1109/ictss.2016.7792865 https://doi.org/10.1016/j.chb.2014.11.090 http://www.webology.org/abstract.php?id=1537 https://doi.org/10.1142/s0218213020400047 188 bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 2, december 2022, pp. 177-188 oghu et.al (a review of sentiment analysis approaches for quality assurance in teaching and learning) humaniz. comput., vol. 12, no. 3, pp. 4117–4126, mar. 2021, doi: 10.1007/s12652-020-01791-9. [55] n. soe and p. t. soe, “domain oriented aspect detection for student feedback system,” in 2019 international conference on advanced information technologies (icait), nov. 2019, pp. 90–95, doi: 10.1109/aitc.2019.8921372. [56] m. korkmaz, “sentiment analysis on university satisfaction in social media,” in 2018 electric electronics, computer science, biomedical engineerings’ meeting (ebbt), apr. 2018, pp. 1–4, doi: 10.1109/ebbt.2018.8391463. [57] l. mandal, r. das, s. bhattacharya, and p. n. basu, “intellimote: a hybrid classifier for classifying learners’ emotion in a distributed e-learning environment,” turkish j. electr. eng. comput. sci., vol. 25, no. 3, pp. 2084–2095, jan. 2017, doi: 10.3906/elk-1510-120. [58] k. muollo, p. basavaraj, and i. garibay, “understanding students’ online reviews to improve college experience and graduation rates of stem programs at the largest post-secondary institution: a learner-centered study,” in 2018 ieee frontiers in education conference (fie), oct. 2018, vol. 2018-octob, pp. 1–7, doi: 10.1109/fie.2018.8658450. [59] y. sahu, g. s. thakur, and s. dhyani, “dynamic feature based computational model of sentiment analysis to improve teaching learning system,” int. j. emerg. technol., vol. 10, no. 4, pp. 17–23, 2019, [online]. available at: https://www.researchtrend.net/ijet/pdf/dynamic feature based computational model of sentiment analysis to improve teaching learning system y. sahu.pdf. [60] z. nasim, q. rajput, and s. haider, “sentiment analysis of student feedback using machine learning and lexicon based approaches,” in 2017 international conference on research and innovation in information systems (icriis), jul. 2017, pp. 1–6, doi: 10.1109/icriis.2017.8002475. [61] i. sindhu, s. muhammad daudpota, k. badar, m. bakhtyar, j. baber, and m. nurunnabi, “aspectbased opinion mining on student’s feedback for faculty teaching performance evaluation,” ieee access, vol. 7, pp. 108729–108741, 2019, doi: 10.1109/access.2019.2928872. [62] s. srinivas and s. rajendran, “topic-based knowledge mining of online student reviews for strategic planning in universities,” comput. ind. eng., vol. 128, pp. 974–984, feb. 2019, doi: 10.1016/j.cie.2018.06.034. [63] p. x. v. nguyen, t. t. t. hong, k. van nguyen, and n. l. t. nguyen, “deep learning versus traditional classifiers on vietnamese students’ feedback corpus,” in nics 2018 proceedings of 2018 5th nafosted conference on information and computer science, jan. 2019, pp. 75–80, doi: 10.1109/nics.2018.8606837. [64] a. a. abed and a. m. el-halees, “detecting subjectivity in staff perfomance appraisals by using text mining: teachers appraisals of palestinian government case study,” in proceedings 2017 palestinian international conference on information and communication technology, picict 2017, sep. 2017, pp. 120–125, doi: 10.1109/picict.2017.25. [65] l. balachandran and a. kirupananda, “online reviews evaluation system for higher education institution: an aspect based sentiment analysis tool,” in 2017 11th international conference on software, knowledge, information management and applications (skima), dec. 2017, vol. 2017decem, pp. 1–7, doi: 10.1109/skima.2017.8294118. [66] k. nimala and r. jebakumar, “retracted article: sentiment topic emotion model on students feedback for educational benefits and practices,” behav. inf. technol., vol. 40, no. 3, pp. 311–319, feb. 2021, doi: 10.1080/0144929x.2019.1687756. [67] v. kagklis, a. karatrantou, m. tantoula, c. t. panagiotakopoulos, and v. s. verykios, “a learning analytics methodology for detecting sentiment in student fora: a case study in distance education,” eur. j. open, distance e-learning, vol. 18, no. 2, pp. 74–94, dec. 2015, doi: 10.1515/eurodl-20150014. re tr ac te d https://doi.org/10.1007/s12652-020-01791-9 https://doi.org/10.1109/aitc.2019.8921372 https://doi.org/10.1109/ebbt.2018.8391463 https://doi.org/10.3906/elk-1510-120 https://doi.org/10.1109/fie.2018.8658450 https://www.researchtrend.net/ijet/pdf/dynamic%20feature%20based%20computational%20model%20of%20sentiment%20analysis%20to%20improve%20teaching%20learning%20system%20y.%20sahu.pdf https://www.researchtrend.net/ijet/pdf/dynamic%20feature%20based%20computational%20model%20of%20sentiment%20analysis%20to%20improve%20teaching%20learning%20system%20y.%20sahu.pdf https://doi.org/10.1109/icriis.2017.8002475 https://doi.org/10.1109/access.2019.2928872 https://doi.org/10.1016/j.cie.2018.06.034 https://doi.org/10.1109/nics.2018.8606837 https://doi.org/10.1109/picict.2017.25 https://doi.org/10.1109/skima.2017.8294118 https://doi.org/10.1080/0144929x.2019.1687756 https://doi.org/10.1515/eurodl-2015-0014 https://doi.org/10.1515/eurodl-2015-0014 bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 1, march 2022, pp. 90-101 90 https:doi.org/10.31763/businta.v6i1.593 natural language processing in higher education nastiti susetyo fanany putri a,1,*, prasetya widiharso a,2, agung bella putra utama a,3, maharsa caraka shakti b,4, urvi ghosh c,5 a universitas negeri malang, malang, indonesia b bss high school, malang, indonesia c monash university, australia 1 nastiti.susetyo.2005348@students.um.ac.id ; 2 prasetya.widiharso.2005348@students.um.ac.id, 3 agungbpu02@gmail.com, 4 wibawacenter@gmail.com, 5 ugho0001@student.monash.edu * corresponding author 1. introduction digitization has a significant impact on all areas of life. education is one of the sectors affected. on the other hand, digitalization also triggers a trend towards developing the amount of data or big data, which poses a challenge for educators to make qualitative data analysis effective and efficient. natural language processing (nlp) answers the challenges and demands of digitization. nlp can help students understand scientific learning. the application of nlp in education is limited to the effectiveness of developing language learning and improving other academic abilities. nlp instruments also help analyze problems and make recommendations by simplifying and accelerating big data processing [1]. nlp is a branch of computational linguistics, artificial intelligence, and computer science aimed at understanding human language automatically [2]. the input is given in human language (natural language) and converted into output that the machine understands. information extraction, spam, machine translation, and answer ranking are some of the most common nlp applications [3]. nlp makes it easy for academics to explore the insights contained in big data without the burden of heavy computing. this paper describes the use of nlp in the scope of higher education, which is intended to provide excellent service to students as consumers in the organization of an educational institution. with the achievement of excellent service, it can produce a university that has optimal performance accountability. 2. natural language processing: overview natural language processing (nlp) is an area of interest in the artificial intelligence and computer science groups. nlp research comprises theories and approaches that enable successful natural language communication between humans and computers. nlp combines the scientific fields of computer science, linguistics, and mathematics intending to translate human language into commands a r t i c l e i n f o a b s t r a c t article history received december 30, 2021 revised january 31, 2022 accepted february 14, 2022 the application of natural language processing (nlp) in an educational institution is still quite broad in its scope of use, including using nlp on chatterbots for academic consultations, handling service dissatisfaction, and spam email detection. meanwhile, other uses that have not been widely used are the combination of nlp and global positioning satellite (gps) in finding the location of lecture buildings and other university facilities. the combination of nlp and gps is expected to make it easier for new students and visitors from outside the university to find the targeted building and facilities more effectively. this is an open access article under the cc–by-sa license. keywords nlp higher education sentiment analysis machine translation chatbot http://doi.org/10.31763/businta.v6i1.593 mailto:nastiti.susetyo.2005348@students.um.ac.id http://creativecommons.org/licenses/by-sa/4.0/ http://creativecommons.org/licenses/by-sa/4.0/ issn 2614-0047 bulletin of social informatics theory and application 91 vol. 6, no. 1, march 2022, pp. 90-101 nastiti susetyo et.al (natural language processing in higher education) that computers can execute [4]. natural language understanding (nlu) and natural language generation (nlg) are two approaches to study in nlp [5]. nlu or linguistics is the study of language and consists of phonology which deals with sound; morphology, with word creation; and syntax, with sentences, semantics, and pragmatics, which deals with understanding [6]. the main goal of nlu is to understand natural languages by analyzing texts and extracting useful information in subsequent assignments [7]. on the other hand, nlg creates texts in natural languages that humans can understand using structured data, text, graphics, audio, and video [8]. nlg is divided into three categories: text-to-text, such as translators and abstracts [9]; text-toother, such as text that produces an image [10]; and other-to-text, like the video to text [11]. the division of understanding of nlu and nlg is depicted in fig. 1. fig. 1. nlp classification nlp has undergone four stages of development: an early stage before 1956, a rapid development from 1957 to 1970, a slowing development from 1971-1993, and a period of recovery from 1994 to the present. the pioneering period or the beginning of nlp began in 1936. alan turing introduced the concept of the "turing machine". this machine is the theoretical basis for modern computers, the basis for the invention of the electronic computer in 1946. this concept laid the foundation for machine translation and was later called nlp. this project was put forward by weaver and booth [12]. shannon used the probability method of markov's discrete processes to automate language descriptions in 1948. then, the notion of thermodynamic entropy was used to calculate the amount of information contained in human language using a probabilistic algorithm [13]. waver's 1949 memorandum brought the idea of machine translation (mt) to the world and inspired many other projects. waver suggests using ideas from cryptography and information theory for language translation. kleene studied finite automata and regular expressions in the early 1950s, and chomsky created context-free grammar and applied it to nlp in 1956. as a result of these efforts, two nlp strategies were generated: rule-based and probability. artificial intelligence (ai) was born in 1956 and supported the development of nlp technology over the next few decades, to improve the technical infrastructure of nlu and nlg. a significant development occurred from 1957 to 1970 because it was combined with artificial intelligence. during this period, the academia of rule-based and probability-based methods developed rapidly. one of the significant successful projects of this period is the transformations and discourse analysis project (tdap) undertaken by the university of pennsylvania in 1959 and the creation of the brown american english corpus. the american psychologist neisser proposed the concept of cognitive psychology, which directly linked nlp to human cognition in 1967. this period focused more on encoding meaning and developing computationally traceable solutions that previous grammatical theories could not offer. an example of other innovations created from this period is chomsky's model of linguistic transformation in 1965 [14], quillian’s semantic network [15], and 92 bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 1, march 2022, pp. 90-101 nastiti susetyo et.al (natural language processing in higher education)) schank's conceptual dependency theory, which explains syntactic anomalies and provides semantic representations and other grammar-related innovations [16]. besides the many developments in the theory of the second period of nlp, it also produced many prototypes. eliza by weizenbaum [17] was built to mimic a conversation between a psychologist and a patient by changing or repeating user input. a robot innovation that can manipulate blocks on a table shows that understanding natural languages is possible for computers, named shrdlu simulation by winograd [18]. wood also developed a system called lunar [19], an inference system for a database containing information about moonstone samples using augmentation transitions and semantic procedures. the second phase of the development of nlp took place between 1971 and 1993. many projects were undertaken within nlp in the 1970s; for example, the mckeown text discourse designer and mcdonald's mummble response generator use rhetorical predicates to create declarative descriptions in short texts (paragraphs) and text to generate responses that can be understood online. in the second phase, nlp-based applications cannot be completed quickly, and new challenges related to statistical approaches and corpora formation continue to emerge. as a result, many researchers have lost faith in nlp research. thus, the 1970s put nlp research at its lowest point. after the mid-1990s, computers became faster and had more storage, sparked nlp research, and allowed speech and language processing technologies to evolve. on the other hand, in 1994, the commercialization of the internet supported the demand for information, and the extraction of natural language-based information was increasing. joshua bengio proposed a feed-forward neural network, the first neural language model, in 2001. in 2008 ronan colbert introduced multitasking on nlp neural networks. tomas mikolov of google created word2vec in 2013, a statistical method for studying word insertion independent of a text corpus using a neural network. ilya sutskever proposed a sequence-to-sequence learning model in 2014, a general framework for utilizing neural networks for mapping one sequence to another. most researchers use statistical models to help machines understand and process human language. currently, researchers are more focused on updating existing algorithms or creating new methods for nlu and nlg and starting to apply nlp with other research subjects. 3. natural language processing in education educational natural language processing (e-nlp) is a branch of a study investigating the application of natural language processing in educational settings [20]. this field is an interdisciplinary field of automated text analysis in the context of educational research problems and applications. enlp can provide educational policymakers with valuable insights into making policies to improve the efficiency and quality of teaching and learning [21]. the three primary responsibilities of nlp in research are assessing, utilizing, and processing languages [22]. in education, there are many of data in the form of text, so most nlp research in the field of education focuses on the use of nlp to reveal student behavior (sentiment analysis) [23]–[25], chatbot utilization [26]–[28], machine translation [21], [22], [31] and so on. 3.1. sentiment analysis sentiment analysis is discovering, extracting, and studying personal information using nlp and text analysis tools [32]. it is also known as opinion mining because it processes the opinions of several people in a particular domain. in the domain of education, integrating learners' emotions in the context of teaching and learning and properly handling emotions during the learning process are the focus of two different approaches. in the first approach, emotion is one of the affective domain categories that need to be well developed, while the second approach focuses on integrating the learner's emotions in the teaching-learning context and adequately handling these emotions during the learning process [33]. sentiment analysis can be described as a non-intrusive, non-invasive, lowcost, design-based tool for a defined emotion-sensing system [34], can serve to increase student profiles with information about themselves. the affective state, through analyzing the traces of his behavior in the teaching and learning environment. the application of sentiment analysis in education is used to evaluate instruction. although it has been established that qualitative student feedback highlights variables overlooked by quantitative issn 2614-0047 bulletin of social informatics theory and application 93 vol. 6, no. 1, march 2022, pp. 90-101 nastiti susetyo et.al (natural language processing in higher education) ratings, student ranking in a linkert-type questionnaire has become the most popular method of evaluating instruction in higher education [35]. compared to qualitative feedback, this feedback has a higher level of informativeness and is unstructured, making analysis more difficult. so many studies have switched to using sentiment analysis as an alternative solution for analyzing student responses in an open survey [36]–[38]. sentiment analysis also can be a reference in an institution's decision-making. the sentiment is used to determine student satisfaction in learning through various comments left on various online platforms [39]. decision-making regarding education in the pandemic era can also refer to sentiment analysis results [40]. sentiment analysis is an analytical learning method that can provide valuable research opportunities in the realm of learning analysis and data mining in the field of education. the latest research adopted a sentiment approach to predict student satisfaction in taking a massive open online course (mooc) [41]. nlp sentiment analysis is used to analyze unstructured textual data to find positive or negative sentiments contained in the supervising teacher's notes and to predict the probability of dropping out of school. besides the many positive values of using sentiment analysis, some requirements must be met beforehand, namely, the need for the availability of large amounts of data in the application of sentiment analysis [42]. however, in reality, there is not too much educational data available, so that in the application of training algorithms often uses non-educational data that has the potential to have differences in the arrangement of patterns and lexicon. the application of sentiment analysis in the real world also has other challenges. (1) the attention-based method applied can lead to a misfocus on syntactically unrelated words. (2) conventional methods often fail to identify segments with unique sentence structures. (3) most studies use only one vector to represent the context and target, which limits the results of segmentation analysis because natural languages tend to be complex and complex [43]. 3.2. machine translation the main factor in learning is the occurrence of communication, where this communication cannot be separated by language. the understanding process will be very disturbed if there are obstacles to understanding the language. therefore, there needs to be a bridge to overcoming these language differences. one solution that can be used in developing and applying machine translation in learning. machine translation (mt) translates from a source text input to text output without human assistance [44]. mt is used to help improve the quality of online education in africa by leveraging nmt [45]. nmt-based translators are also applied in [46], [47] as a supporting medium in learning foreign languages independently. machine translation in education was developed with computer-assisted translation (cat) in 1930. the most popular software in this field is google translate using a multilingual neural machine translation system that allows zero-shot translation [48], thus being able to translate many languages in 2016. there are two machine translation methods: statistical machine translation (smt) and neural machine translation (nmt). statistical machine translation (smt) is a new machine translation approach that has recently shown great progress. this approach uses statistics in translating, built on the concept of probability. the smt system uses a phrase-based model to overcome word-based translation limitations by translating long and varied word sequences [49]. phrase-based smt is formulated as a log-linear combination of several statistical models: translation model, language model, rearrangement model, and word or phrase law [50]. referring to the opinion of christopher d manning and hinrich schutze, statistical machine translation, or phrase translation, consists of three components: language model, translation model, and decoder [51]. nlp applications applied in the language model are speech recognition, part-of-speech tagging, and syntactic parsing [52]. smt excels in terms of flexibility and robustness. however, smt is difficult to process word mapping correctly, it is difficult to determine the best phrase candidate from input phrases that have different phrase contexts so that the meaning of the translation will be different, it is difficult to predict the derivative structure, and challenging to learn a good language model. 94 bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 1, march 2022, pp. 90-101 nastiti susetyo et.al (natural language processing in higher education)) on the other hand, nmt shows better quality than traditional smt. the most significant advantage of nmt is the gating and attention methods which have proven to be effective in modeling complex remote dependencies and alignment relationships in the translation process, which is a challenge in smt [53]. nmt is an approach that uses machine learning or deep learning algorithms in its encoder or decoder. referring to [54], nmt sometimes has errors in translating due to coverage problems that cause over or under-translation, translation errors due to misinterpreting the natural language of the target sentence so that it does not reflect the original meaning of the input sentence, and unk problems, and translation quality declines rapidly if the number of unk words increased. the advantages of smt include having a mechanism to guarantee each word is translated, treating words as discrete symbols, and explicitly recognizing all translations, including the translation of rare words in unk in nmt. this makes many researchers combine the two methods in developing machine translation, including in the field of education. 3.3. chatbot in education a chatbot (chatterbot) is software that communicates with humans (users) and virtual assistants that can answer several questions correctly [55]. chatbot technology is widely used in various fields, including industry [56], health [57], marketing [58], tourism [59] even education. natural language processing or artificial intelligence markup languages are used by all chatbot algorithms to understand one or more human languages. chatbots are text-based and programmed to deal with a limited set of simple questions with answers pre-written by the chatbot developer. the chatbot functions like an interactive faq and displays answers like training results. when faced with complex or unexpected questions, the chatbot cannot solve them [60]. chatbots have evolved to include additional rules and natural language processing, allowing users to interact with chatbots in a conversational mode. because they are faced with many human languages, the latest form of chatbot is contextually aware and able to learn quickly from the input given [61]. the chatbot processes user inquiries and responds appropriately based on applicable mechanisms. chatbots can be divided into two categories in communicating. rules-based chatbots and ai chatbots are the two types of chatbots available [62]. rule-based chatbots, known as pattern matching, use pattern-matching strategies to group words. that way, the bot can provide the correct answer on request. the development of this type of chatbot uses artificial intelligent markup language (aiml) in constructing the chatbot system [63]. the weakness of this model is that it cannot provide an efficient output if the input pattern is different from the set rules. ai chatbots use the help of machine learning algorithms that allow chatbots to learn new things. ai chatbots can carry out conversations better than rule-based chatbots because they use machine learning algorithms, nlp, and sentiment analysis [64]. machine learning chatbots allow identifying user input. make decisions and learn from previous input. nlp helps chatbots understand how humans communicate and allows chatbots to imitate it. nlp also makes the chatbot understand the conversation context even if the user makes an error in writing the message. meanwhile, sentiment analysis makes the chatbot understand the emotions of the user. ai chatbots can understand multiple languages and read the emotions of the users. however, ai chatbots require much training and must be equipped with a well-defined response to operating correctly. some popular chatbot technologies include apple siri, microsoft carta, facebook m, and ibm watson. recently, the use of chatbots as e-learning learning media has increased [65]. chatbot technology is a crucial e-learning innovation. it is the most innovative approach to bridging the gap between technology and education. including a chatbot enables an engaging learning experience for students, similar to one-on-one interactions with teachers. adopting chatbots in higher education is associated with several benefits, including increasing student motivation and attention, encouraging collaborative learning, promoting communication with friends, and increasing student comfort in learning [66]. there are many approaches related to chatbots in e-learning systems. in [67], the chatbot was developed to address students' complaints from the benin university computer science faculty, using issn 2614-0047 bulletin of social informatics theory and application 95 vol. 6, no. 1, march 2022, pp. 90-101 nastiti susetyo et.al (natural language processing in higher education) facebook messenger and facebook page hosts as a bridge. other research builds character chatbots that can provide academic information and chatbots about covid-19. users can choose whom they want to interact with [68]. chatbot for international students and academics (cisa) was developed to facilitate international students about academics and campus life [69]. the use of web bots in developing e-learning chatbots to overcome the problem of delays in responding to student questions has also been developed [70] and designed using google dialogflow and implementing facebook messenger. like all nlp innovations, two sides intersect in every aspect. the benefits of sentiment analysis in education include applying sentiment analysis and structured and insightful knowledge that can be obtained from unstructured text documents, which can be helpful for decision support [39]. in addition, this sentiment analysis provides reasons for academics to visit the school's website so that the information conveyed will spread more quickly. colleges or schools can also use this method to analyze feedback and comments from surveys to improve their shortcomings [71]. although it has many positive values, this sentiment analysis also has negative values. data loss and security issues may arise during analysis [72]. sentiment analysis also has weaknesses in identifying sarcasm, irony, negation, jokes, and hyperbole expressions, thereby reducing the accuracy of the analysis [73]. sentiment analysis needs to be done in education, seeing this description. the results of this analysis can be used as a problem-solving tool in improving the quality of education to suit the needs and right on target. sentiment analysis is also considered to save time and cost for education providers overcoming problems because the main problems can be seen clearly. another type of nlp that is often implemented in education is machine translation. this technology is an innovation that is considered to be the most helpful in learning activities. this machine translator is often a bridge for delivering learning materials if the learning resources differ in students' languages. this machine translator also has a relatively short processing time [74]. the development of machine translators is very significant and can translate into many languages using only one tool. apart from the many benefits. machine translators are classified as having a reasonably accurate translation accuracy. however, these results often do not match the grammar and connotations intended by the original text [75]. this weakness will cause a reasonably valuable loss if an error occurs in translating essential financing-related documents. the development of machine translation is considered a threat to the translation profession [76]. this will indirectly lead to an increase in the number of unemployed. this machine translator's development has made it easier for us in various jobs related to foreign languages. machine translators are also essential in helping to improve the quality of education because literacy sources and references for learning can be obtained from languages and countries that have different languages from our native language. it is necessary to conduct a final evaluation using a human translator to correct machine translation results to reduce errors in mistranslating. the world of education cannot be separated from the interaction of humans with humans or humans with machines. the intensity of this interaction tends to be very high, such as in teaching and learning activities, administrative processes, or teacher and student consultation activities. in reality, a teacher or academic staff cannot facilitate it all. so they often use technical assistance, for example, chatbots. this technology was chosen because it can respond quickly compared to humans [77] and is accessible anytime. by implementing this chatbot, educational institutions can reduce expenses because the number of employees they hire can be reduced. despite its many benefits, chatbots are devoid of emotions and feelings. this causes interactions with chatbots to tend to be stiff and unable to cope with sudden changes in conversation [78]. chatbots with ai require continuous optimization, analysis, and maintenance. so educational institutions must frequently update data, so chatbots are more interactive [79]. this ongoing maintenance also costs much money, affecting the school's finances. as already written, the advantages of chatbots are that they can be accessed anytime and limit human interaction. chatbots give education many conveniences, teaching us other methods to interact with the world. this technology has many pros and cons, but education needs it to carry out administrative activities 96 bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 1, march 2022, pp. 90-101 nastiti susetyo et.al (natural language processing in higher education)) such as registration and counseling. however, education cannot entirely rely on chatbots because chatbots do not have emotions, so they can cause errors in providing counseling. so, it is necessary to combine chatbots with human power to make the suggestions given more rational. chatbots can limit human interaction, but in the current pandemic era, the optimization of chatbots can have other positive effects. 4. development directions of nlp in education in the previous section, it was explained that nlp had provided a variety of innovations in today's education. however, the current applications are only a few of the advantages nlp, and other artificial intelligence (ai) fields offer for future study. in the future, natural language processing can proliferate from what it is today if researchers analyze the weaknesses of existing technologies and improve them. the following list is some nlp technology development ideas. more ideas will emerge over time as previously written, it can be seen that both sentiment analysis does not work optimally if there is sarcasm or negation in the sentence. so we need a breakthrough in overcoming this. several studies use distributed semantic analysis involving word insertion to improve the ability of the sentiment analysis algorithm they developed, as in [80] [81]. in addition, sentiment analysis can also be done using a lexical approach future sentiment analysis research in education should also focus more on data generated in natural teaching-learning settings, such as interactions between students on remote collaborative assignments or discussions in cross-semester forums, to develop generalizable and applicable sentiment analysis systems, significantly in the education scenario. the main drawback of machine translators and chatbots is that they cannot identify the emotions contained in the input sentences. these deficiencies can be used as a trigger for innovations in developing nlp technology. innovations that can be created include a combination of chatbots, machine translation, and sentiment analysis. the resulting product can be in the form of applications or robot assistants where the product is designed based on a question-and-answer chatbot about learning life at schools, such as consultation, registration, and other administrative activities. machine translators facilitate international students so that language barriers do not occur, making it difficult to operate the innovations developed. meanwhile, sentiment analysis is applied to analyze the user's emotions, with the hope that the user's interaction with the machine will seem more real. another development based on e-nlp is combining a chatbot with a global position satellite (gps). the purpose of making this application is to answer questions from students and prospective students related to the application maker school. gps is embedded so that answers from bots about specific locations in the campus environment and around campus are more precise and accurate. this development will benefit students and outsiders who will carry out activities on the campus, especially after social distancing and activity restrictions have prevented direct site surveys from being carried out. an illustration of a chatbot that can be developed is shown in fig. 2. fig. 2. chatbot and gps development conversation illustration issn 2614-0047 bulletin of social informatics theory and application 97 vol. 6, no. 1, march 2022, pp. 90-101 nastiti susetyo et.al (natural language processing in higher education) in addition to the three categories mentioned above, nlp has another category: detecting spam in emails based on text classification. this category can be applied in education as a student permit detector. this project combines spam detection with sentiment analysis, functioning as a detector for the choice of words used in letters. so that it can be known whether the letter was written by the student's parent or guardian or by the student's friend. the future of nlp also includes enhanced intelligent search, one of the highlights of expert systems. it can be embedded in the school's website to allow users to search for documents or content using natural language. this search engine can also be inserted into the chatbot so that the chatbot application is faster in finding answers for users from the database. this semantic search can also be embedded in the chatbot, making it possible for the user to use the voice-to-text feature and making the chatbot more varied and efficient because the user can give commands by voice rather than typing through the device. 5. conclusion nlp is widely used in the higher education sector as a support for independent academic activities such as machine translators, decision-makers with sentiment analysis, and administrative activities using chatbots. the latest utilization that has not been widely applied in nlp and gps in the search for buildings and educational facilities at universities. with the increasing use of nlp, it is hoped that it can support improving service quality to optimize a university's performance. references [1] e. a. olivetti et al., “data-driven materials research enabled by natural language processing and information extraction,” appl. phys. rev., vol. 7, no. 4, 2020, doi: 10.1063/5.0021106. [2] a. rokade, b. patil, s. rajani, s. revandkar, and r. shedge, “automated grading system using natural language processing,” proc. int. conf. inven. commun. comput. technol. icicct 2018, no. icicct, pp. 1123–1127, 2018, doi: 10.1109/icicct.2018.8473170. [3] p. gupta, j. bigham, y. tsvetkov, and a. pavel, “controlling dialogue generation with semantic exemplars,” pp. 3018–3029, 2021, doi: 10.18653/v1/2021.naacl-main.240. [4] h. al-khalifa, h. t. al-natsheh, h. bouamor, k. bouzoubaa, v. cavalli-sforza, and s. r. el-beltagy, “and hamdy mubarak survey of natural language processing in the arab world”. doi: 10.48550/arxiv.2011.12631. [5] s.-y. su, c.-w. huang, and y.-n. chen, “towards unsupervised language understanding and generation by joint dual learning,” pp. 671–680, 2020, doi: 10.18653/v1/2020.acl-main.63. [6] d. khurana, a. koli, k. khatter, and s. singh, “natural language processing: state of the art, current trends and challenges,” multimed. tools appl., vol. 82, no. 3, pp. 3713–3744, jan. 2023, doi: 10.1007/s11042-022-13428-4. [7] j. shabbir, “nubot : embedded knowledge graph with rasa framework for generating semantic intents responses in roman urdu”. doi: 10.48550/arxiv.2102.10410. [8] l. leppänen, m. munezero, s. sirén-heikel, and m. granroth-wilding, “finding and expressing news from structured data full paper”, doi: 10.1145/3131085.3131112. [9] a. belz and a. shimorina, “the reprogen shared task on reproducibility of human evaluations in nlg : overview and results,” no. september, pp. 249–258, 2021. available at : aclanthology.org. [10] s. garcía-méndez, m. fernández-gavilanes, e. costa-montenegro, j. juncal-martínez, f. j. gonzálezcastaño, and e. reiter, “a system for automatic english text expansion,” vol. 7, 2019, doi: 10.1109/access.2019.2937505. [11] a. l. review, “natural language processing ( nlp ) in management research a literature review natural language processing ( nlp ) in management research : a literature review,” 2020, doi: 10.1080/23270012.2020.1756939. [12] d. zhang, j. wang, and m. sun, “made towards human-level ai,” vol. 3, pp. 38–47, 2020, doi: 10.23977/jaip.2020.030107. https://doi.org/10.1063/5.0021106 https://doi.org/10.1109/icicct.2018.8473170 https://doi.org/10.18653/v1/2021.naacl-main.240 https://doi.org/10.48550/arxiv.2011.12631 https://doi.org/10.18653/v1/2020.acl-main.63 https://doi.org/10.1007/s11042-022-13428-4 https://doi.org/10.48550/arxiv.2102.10410 https://doi.org/10.1145/3131085.3131112 https://aclanthology.org/2021.inlg-1.24 https://doi.org/10.1109/access.2019.2937505 https://doi.org/10.1080/23270012.2020.1756939 https://dx.doi.org/10.23977/jaip.2020.030107 98 bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 1, march 2022, pp. 90-101 nastiti susetyo et.al (natural language processing in higher education)) [13] e. calvanese strinati and s. barbarossa, “6g networks: beyond shannon towards semantic and goaloriented communications,” comput. networks, vol. 190, no. october 2020, p. 107930, 2021, doi: 10.1016/j.comnet.2021.107930. [14] j. w. mwakapina, “what is the nature of language? how does it behave? what is language learning then? a review paper in applied linguistics,” randwick int. educ. linguist. sci. j., vol. 2, no. 4, pp. 603–618, 2021, doi: 10.47175/rielsj.v2i4.357. [15] n. m. hewahi and y. s. a. khateeb, “neural networks representation for semantic networks,” 2020 int. conf. innov. intell. informatics, comput. technol. 3ict 2020, 2020, doi: 10.1109/3ict51146.2020.9311964. [16] j. savage et al., “semantic reasoning in service robots using expert systems,” rob. auton. syst., vol. 114, pp. 77–92, 2019, doi: 10.1016/j.robot.2019.01.007. [17] s. natale, “if software is narrative: joseph weizenbaum, artificial intelligence and the biographies of eliza,” new media soc., vol. 21, no. 3, pp. 712–728, 2019, doi: 10.1177/1461444818804980. [18] j. ott, “the pretense of knowledge : on the insidious presumptions of artificial the pretense of knowledge : on the insidious presumptions of artificial intelligence,” no. october, 2020, doi: 10.13140/rg.2.2.31551.46245. [19] k. divya, b. siddhartha, n. niveditha, and b. divya, “an interpretation of lemmatization and stemming in natural language processing,” j. univ. shanghai sci. technol., vol. 22, no. 10, pp. 350– 357, 2020. available at : just.org. [20] p. g. naik, s. g. patil, and g. r. naik, “natural language interface for querying hardware and software configuration international journal of computer sciences and engineering open access natural language interface for querying hardware and software configuration of a local area network,” no. march, 2019, doi: 10.26438/ijcse/v7i2.949963. [21] a. peña-ayala, “educational data mining: a survey and a data mining-based analysis of recent works,” expert syst. appl., vol. 41, no. 4 part 1, pp. 1432–1462, 2014, doi: 10.1016/j.eswa.2013.08.042. [22] d. litman, “natural language processing for enhancing teaching and learning,” pp. 4170–4176, 2013. doi: 10.1609/aaai.v30i1.9879 [23] s. rani and p. kumar, “cover feature advances in learning technologies,” adv. learn. technol., pp. 36–43, 2017. doi : 10.1109/mc.2017.133. [24] r. hajrizi and k. p. nuçi, “aspect-based sentiment analysis in education domain,” 2020. doi: 10.48550/arxiv.2010.01429. [25] g. s. chauhan, p. agrawal, and y. k. meena, aspect-based sentiment analysis of students’ feedback to improve teaching–learning process, vol. 107. springer singapore, 2019. doi: 10.1007/978-981-131747-7_25. [26] a. j. moraes neto and m. a. fernandes, “chatbot and conversational analysis to promote collaborative learning in distance education,” proc. ieee 19th int. conf. adv. learn. technol. icalt 2019, pp. 324–326, 2019, doi: 10.1109/icalt.2019.00102. [27] e. kasthuri and s. balaji, “a chatbot for changing lifestyle in education,” proc. 3rd int. conf. intell. commun. technol. virtual mob. networks, icicv 2021, no. icicv, pp. 1317–1322, 2021, doi: 10.1109/icicv50876.2021.9388633. [28] a. s. sreelakshmi, s. b. abhinaya, a. nair, and s. jaya nirmala, “a question answering and quiz generation chatbot for education,” 2019 grace hopper celebr. india, ghci 2019, no. november 2019, 2019, doi: 10.1109/ghci47972.2019.9071832. [29] i. orife et al., “masakhane -machine translation for africa,” pp. 1–4, 2020. available at : arxivvanity.com. [30] v. kordoni et al., “pdf hosted at the radboud repository of the radboud university nijmegen enhancing access to online education : quality machine translation of mooc content overview of tramooc,” 2021. available at : core.ac.uk. https://doi.org/10.1016/j.comnet.2021.107930 https://doi.org/10.47175/rielsj.v2i4.357 https://doi.org/10.1109/3ict51146.2020.9311964 https://doi.org/10.1016/j.robot.2019.01.007 https://doi.org/10.1177/1461444818804980 http://dx.doi.org/10.13140/rg.2.2.31551.46245 https://jusst.org/an-interpretation-of-lemmatization-and-stemming-in-natural-language-processing/ https://doi.org/10.26438/ijcse/v7i2.949963 https://doi.org/10.1016/j.eswa.2013.08.042 https://doi.org/10.1609/aaai.v30i1.9879 https://doi.org/10.1109/mc.2017.133 https://doi.org/10.48550/arxiv.2010.01429 https://doi.org/10.1007/978-981-13-1747-7_25 https://doi.org/10.1007/978-981-13-1747-7_25 https://doi.org/10.1109/icalt.2019.00102 https://doi.org/10.1109/icicv50876.2021.9388633 https://doi.org/10.1109/ghci47972.2019.9071832 https://www.arxiv-vanity.com/papers/2003.11529/ https://www.arxiv-vanity.com/papers/2003.11529/ https://core.ac.uk/download/pdf/200778675.pdf issn 2614-0047 bulletin of social informatics theory and application 99 vol. 6, no. 1, march 2022, pp. 90-101 nastiti susetyo et.al (natural language processing in higher education) [31] n. s. khan, a. abid, and k. abid, “a novel natural language processing (nlp)–based machine translation model for english to pakistan sign language translation,” cognit. comput., vol. 12, no. 4, pp. 748–765, 2020, doi: 10.1007/s12559-020-09731-7. [32] c. zuheros, e. martínez-cámara, e. herrera-viedma, and f. herrera, “sentiment analysis based multi-person multi-criteria decision making methodology using natural language processing and deep learning for smarter decision aid. case study of restaurant choice using tripadvisor reviews,” inf. fusion, vol. 68, no. october 2020, pp. 22–36, 2021, doi: 10.1016/j.inffus.2020.10.019. [33] f. s. dolianiti, d. iakovakis, s. b. dias, s. hadjileontiadou, j. a. diniz, and l. hadjileontiadis, “sentiment analysis techniques and applications in education: a survey,” commun. comput. inf. sci., vol. 993, pp. 412–427, 2019, doi: 10.1007/978-3-030-20954-4_31. [34] s. caballe, “towards a multi-modal emotion-awareness e-learning system,” proc. 2015 int. conf. intell. netw. collab. syst. ieee incos 2015, pp. 280–287, 2015, doi: 10.1109/incos.2015.88. [35] a. tsang, “the relationship between tertiary-level students’ self-perceived presentation delivery and public speaking anxiety: a mixed-methods study,” assess. eval. high. educ., vol. 45, no. 7, pp. 1060– 1072, 2020, doi: 10.1080/02602938.2020.1718601. [36] k. van nguyen, v. d. nguyen, p. x. v. nguyen, t. t. h. truong, and n. l. t. nguyen, “uit-vsfc: vietnamese students’ feedback corpus for sentiment analysis,” proc. 2018 10th int. conf. knowl. syst. eng. kse 2018, pp. 19–24, 2018, doi: 10.1109/kse.2018.8573337. [37] d. marcu and m. danubianu, “sentiment analysis from students’ feedback,” 15th int. conf. dev. appl. syst., pp. 204–209, 2020. doi : 10.3389/frai.2021.728708. [38] z. nasim, q. rajput, and s. haider, “sentiment analysis of student feedback using machine learning and lexicon based approaches,” int. conf. res. innov. inf. syst. icriis, pp. 1–6, 2017, doi: 10.1109/icriis.2017.8002475. [39] p. adinolfi, e. d’avanzo, m. d. lytras, i. novo-corti, and j. picatoste, “sentiment analysis to evaluate teaching performance,” int. j. knowl. soc. res., vol. 7, no. 4, pp. 86–107, 2016, doi: 10.4018/ijksr.2016100108. [40] m. umair and a. hakim, “sentiment analysis of students’ feedback before and after covid-19 pandemic sentiment analysis of students feedback before and after covid-19 pandemic view project,” no. july, 2021. doi : 10.2139/ssrn.4324732 [41] k. f. hew, x. hu, c. qiao, and y. tang, “what predicts student satisfaction with moocs: a gradient boosting trees supervised machine learning and sentiment analysis approach,” comput. educ., vol. 145, p. 103724, 2020, doi: 10.1016/j.compedu.2019.103724. [42] i. lazrig and s. l. humpherys, “using machine learning sentiment analysis to evaluate learning impact,” vol. 20, no. february, pp. 13–21, 2022. doi : 10.47750/pnr.2022.13.04.047 [43] b. zhang, x. li, x. xu, k. c. leung, z. chen, and y. ye, “knowledge guided capsule attention network for aspect-based sentiment analysis,” ieee/acm trans. audio speech lang. process., vol. 9290, no. 3, pp. 1–13, 2020, doi: 10.1109/taslp.2020.3017093. [44] k. n. dew, a. m. turner, y. k. choi, a. bosold, and k. kirchhoff, “development of machine translation technology for assisting health communication: a systematic review,” j. biomed. inform., vol. 85, pp. 56–67, 2018, doi: 10.1016/j.jbi.2018.07.018. [45] j. z. abbott and l. martinus, “towards neural machine translation for african languages,” 2018. doi : 10.48550/arxiv.1811.05467. [46] a. schmidhofer and n. mair, “machine translation in translator education,” vol. 4, no. 2, pp. 163 – 180, 2018. doi: 10.14201/clina201842163180 [47] j. moorkens, “what to expect from neural machine translation: a practical in-class translation evaluation exercise,” interpret. transl. train., vol. 12, no. 4, pp. 375–387, 2018, doi: 10.1080/1750399x.2018.1501639. [48] m. johnson et al., “google’s multilingual neural machine translation system: enabling zero-shot translation,” trans. assoc. comput. linguist., vol. 5, pp. 339–351, 2017, doi: 10.1162/tacl_a_00065. https://doi.org/10.1007/s12559-020-09731-7 https://doi.org/10.1016/j.inffus.2020.10.019 https://doi.org/10.1007/978-3-030-20954-4_31 https://doi.org/10.1109/incos.2015.88 https://doi.org/10.1080/02602938.2020.1718601 https://doi.org/10.1109/kse.2018.8573337 https://doi.org/10.3389/frai.2021.728708 https://doi.org/10.1109/icriis.2017.8002475 https://doi.org/10.4018/ijksr.2016100108 https://dx.doi.org/10.2139/ssrn.4324732 https://doi.org/10.1016/j.compedu.2019.103724 https://doi.org/10.47750/pnr.2022.13.04.047 https://doi.org/10.1109/taslp.2020.3017093 https://doi.org/10.1109/taslp.2020.3017093 https://doi.org/10.48550/arxiv.1811.05467 https://doi.org/10.14201/clina201842163180 https://doi.org/10.1080/1750399x.2018.1501639 https://doi.org/10.1162/tacl_a_00065 100 bulletin of social informatics theory and application issn 2614-0047 vol. 6, no. 1, march 2022, pp. 90-101 nastiti susetyo et.al (natural language processing in higher education)) [49] d. banik, a. ekbal, and p. bhattacharyya, “machine learning based optimized pruning approach for decoding in statistical machine translation,” ieee access, vol. 7, pp. 1736–1751, 2019, doi: 10.1109/access.2018.2883738. [50] m. artetxe, g. labaka, and e. agirre, “an effective approach to unsupervised machine translation,” acl 2019 57th annu. meet. assoc. comput. linguist. proc. conf., pp. 194–203, 2020, doi: 10.18653/v1/p19-1019. [51] c. park, y. yang, k. park, and h. lim, “decoding strategies for improving low-resource machine translation,” electron., vol. 9, no. 10, pp. 1–15, 2020, doi: 10.3390/electronics9101562. [52] a. seker, e. bandel, d. bareket, i. brusilovsky, r. s. greenfeld, and r. tsarfaty, “alephbert:a hebrew large pre-trained language model to start-off your hebrew nlp application with,” no. 2005, 2021. doi : 10.48550/arxiv.2104.04052. [53] f. stahlberg, “neural machine translation: a review,” j. artif. intell. res., vol. 69, pp. 343–418, oct. 2020, doi: 10.1613/jair.1.12007. [54] x. wang, z. lu, z. tu, h. li, d. xiong, and m. zhang, “neural machine translation advised by statistical machine translation,” 31st aaai conf. artif. intell. aaai 2017, pp. 3330–3336, 2017. doi : 10.1609/aaai.v31i1.10975. [55] m. lombardi, f. pascale, and d. santaniello, “an application for cultural heritage using a chatbot,” 2nd int. conf. comput. appl. inf. secur. iccais 2019, pp. 1–5, 2019, doi: 10.1109/cais.2019.8769525. [56] m. nuruzzaman and o. k. hussain, “intellibot: a dialogue-based chatbot for the insurance industry,” knowledge-based syst., vol. 196, no. xxxx, p. 105810, 2020, doi: 10.1016/j.knosys.2020.105810. [57] c. blanc et al., “flaubert vs. camembert: understanding patient’s answers by a french medical chatbot,” artif. intell. med., p. 102264, 2022, doi: 10.1016/j.artmed.2022.102264. [58] a. k. kushwaha and a. k. kar, “markbot – a language model-driven chatbot for interactive marketing in post-modern world,” inf. syst. front., 2021, doi: 10.1007/s10796-021-10184-y. [59] r. pillai and b. sivathanu, “adoption of ai-based chatbots for hospitality and tourism,” int. j. contemp. hosp. manag., vol. 32, no. 10, pp. 3199–3226, 2020, doi: 10.1108/ijchm-04-2020-0259. [60] t. zemčík, “failure of chatbot tay was evil, ugliness and uselessness in its nature or do we judge it through cognitive shortcuts and biases?,” ai soc., vol. 36, no. 1, pp. 361–367, 2021, doi: 10.1007/s00146-020-01053-4. [61] g. alexakis, s. panagiotakis, a. fragkakis, e. markakis, and k. vassilakis, “control of smart home operations using natural language processing, voice recognition and iot technologies in a multi-tier architecture,” designs, vol. 3, no. 3, pp. 1–18, 2019, doi: 10.3390/designs3030032. [62] a. veglis and t. a. maniou, “chatbots on the rise: a new narrative in journalism,” stud. media commun., vol. 7, no. 1, p. 1, 2019, doi: 10.11114/smc.v7i1.3986. [63] s. singh and h. k. thakur, “survey of various ai chatbots based on technology used,” icrito 2020 ieee 8th int. conf. reliab. infocom technol. optim. (trends futur. dir., pp. 1074–1079, 2020, doi: 10.1109/icrito48877.2020.9197943. [64] q. zheng, y. tang, y. liu, w. liu, and y. huang, “ux research on conversational human-ai interaction: a literature review of the acm digital library,” pp. 1–34, 2022. doi : 10.1145/3491102.3501855. [65] e. e. program and u. n. malang, “web site:,” vol. 14, no. 2, pp. 179–187, 2021. available at : urj.uinmalang.ac.id. [66] s. studente, s. ellis, and s. f. garivaldis, “exploring the potential of chatbots in higher education: a preliminary study,” int. j. educ. pedagog. sci., vol. 14, no. 9, pp. 768–771, 2020. available at : publications.waset.org. [67] f. o. chete and g. o. daudu, “an approach towards the development of a hybrid chatbot for handling students ’ complaints,” j. electr. eng. electron. control comput. sci., vol. 6, no. 22, pp. https://doi.org/10.1109/access.2018.2883738 https://doi.org/10.18653/v1/p19-1019 https://doi.org/10.3390/electronics9101562 https://doi.org/10.48550/arxiv.2104.04052 https://doi.org/10.1613/jair.1.12007 https://doi.org/10.1609/aaai.v31i1.10975 https://doi.org/10.1109/cais.2019.8769525 https://doi.org/10.1016/j.knosys.2020.105810 https://doi.org/10.1016/j.artmed.2022.102264 https://doi.org/10.1007/s10796-021-10184-y https://doi.org/10.1108/ijchm-04-2020-0259 https://doi.org/10.1007/s00146-020-01053-4 https://doi.org/10.3390/designs3030032 https://doi.org/10.11114/smc.v7i1.3986 https://doi.org/10.1109/icrito48877.2020.9197943 https://doi.org/10.1145/3491102.3501855 http://urj.uin-malang.ac.id/ http://urj.uin-malang.ac.id/ https://publications.waset.org/10011432/exploring-the-potential-of-chatbots-in-higher-education-a-preliminary-study issn 2614-0047 bulletin of social informatics theory and application 101 vol. 6, no. 1, march 2022, pp. 90-101 nastiti susetyo et.al (natural language processing in higher education) 29–38, 2020. available at: jeeeccs.net. [68] w. el hefny, a. el bolock, c. herbert, and s. abdennadher, “applying the character-based chatbots generation framework in education and healthcare,” hai 2021 proc. 9th int. user model. adapt. pers. human-agent interact., pp. 121–129, 2021, doi: 10.1145/3472307.3484172. [69] s. gupta, y. chen, r. c. gupta, y. s. inclusive, and y. chen, “information systems education supporting inclusive learning using chatbots ? a chatbotled interview study supporting inclusive learning using chatbots ? a chatbotled interview study sambhav gupta,” vol. 33, no. march, 2022. available at : aisel.aisnet.org. [70] m. deng et al., interface design for boccia robot considering operation characteristic, vol. 11786 lncs. 2019. doi: 10.1007/978-3-030-30033-3_30. [71] z. kamisli ozturk, z. i. erzurum cicek, and z. ergul, “sentiment analysis: an application to anadolu university,” acta phys. pol. a, vol. 132, no. 3, pp. 753–755, 2017, doi: 10.12693/aphyspola.132.753. [72] s. sharma and a. jain, “role of sentiment analysis in social media security and analytics,” wiley interdiscip. rev. data min. knowl. discov., vol. 10, no. 5, 2020, doi: 10.1002/widm.1366. [73] d. li, r. rzepka, m. ptaszynski, and k. araki, “hemos: a novel deep learning-based fine-grained humor detecting method for sentiment analysis of social media,” inf. process. manag., vol. 57, no. 6, 2020, doi: 10.1016/j.ipm.2020.102290. [74] s. l. brunton, b. r. noack, and p. koumoutsakos, “machine learning for fluid mechanics,” annu. rev. fluid mech., vol. 52, pp. 477–508, 2020, doi: 10.1146/annurev-fluid-010719-060214. [75] d. emelin, i. titov, and r. sennrich, “detecting word sense disambiguation biases in machine translation for model-agnostic adversarial attacks,” emnlp 2020 2020 conf. empir. methods nat. lang. process. proc. conf., pp. 7635–7653, 2020, doi: 10.18653/v1/2020.emnlp-main.616. [76] l. nunes vieira and e. alonso, “translating perceptions and managing expectations: an analysis of management and production perspectives on machine translation,” perspect. stud. transl. theory pract., vol. 28, no. 2, pp. 163–184, 2020, doi: 10.1080/0907676x.2019.1646776. [77] x. luo, m. s. qin, z. fang, and z. qu, “artificial intelligence coaches for sales agents: caveats and solutions,” j. mark., vol. 85, no. 2, pp. 14–32, 2021, doi: 10.1177/0022242920956676. [78] c. h. hong et al., “audrey: a personalized open-domain conversational bot,” pp. 1–20, 2020. doi: 10.48550/arxiv.2011.05910 [79] m. adam, m. wessel, and a. benlian, “ai-based chatbots in customer service and their effects on user compliance,” electron. mark., vol. 31, no. 2, pp. 427–445, 2021, doi: 10.1007/s12525-020-00414-7. [80] m. al-smadi, o. qawasmeh, m. al-ayyoub, y. jararweh, and b. gupta, “deep recurrent neural network vs. support vector machine for aspect-based sentiment analysis of arabic hotels’ reviews,” j. comput. sci., vol. 27, pp. 386–393, 2018, doi: 10.1016/j.jocs.2017.11.006. [81] v. g. djokic, j. maillard, l. bulat, and e. shutova, “decoding brain activity associated with literal and metaphoric sentence comprehension using distributional semantic models,” trans. assoc. comput. linguist., vol. 8, pp. 231–246, 2020, doi: 10.1162/tacl_a_00307. https://jeeeccs.net/index.php/journal/article/view/180 https://doi.org/10.1145/3472307.3484172 https://aisel.aisnet.org/jise/vol33/iss1/11 https://doi.org/10.1007/978-3-030-30033-3_30 https://doi.org/10.12693/aphyspola.132.753 https://doi.org/10.1002/widm.1366 https://doi.org/10.1016/j.ipm.2020.102290 https://doi.org/10.1146/annurev-fluid-010719-060214 https://doi.org/10.18653/v1/2020.emnlp-main.616 https://doi.org/10.1080/0907676x.2019.1646776 https://doi.org/10.1177/0022242920956676 https://doi.org/10.48550/arxiv.2011.05910 https://doi.org/10.1007/s12525-020-00414-7 https://doi.org/10.1016/j.jocs.2017.11.006 https://doi.org/10.1162/tacl_a_00307