Papers by Muhammad Fakhrul Safitra
WorldCIST 2023: Intelligent Sustainable Systems, 2024
This study provides a thorough historical literature analysis of cyber resilience, concentrating ... more This study provides a thorough historical literature analysis of cyber resilience, concentrating on its evolution and the lessons it gives for the future. The authors track the emergence of resilience in the context of cyber-security by studying a wide range of scholarly publications, research articles, and case studies. The examination reveals major milestones, contextual elements, framework integration, and methodology integration. A dynamic approach, interrelated perspectives, and different training programs are among the valuable insights that emerge. The findings emphasize the importance of collaboration, strong regulatory frameworks, emerging-area research, and ethical issues. Organizations may improve their cybersecurity resilience and contribute to a more secure digital ecosystem by implementing these ideas. This publication is a significant resource for scholars and practitioners looking to develop successful cyber resilience techniques and methodologies.
WorldCIST 2023: Intelligent Sustainable Systems, 2024
This research investigates the use of collaborative technology in the manufacturing industry to i... more This research investigates the use of collaborative technology in the manufacturing industry to improve worker safety. It looks into how these technologies affect incident prevention, safety communication, and employee engagement. The research used a case study technique to examine the integration of AR headsets and wearable devices with sensors in a manufacturing organization. The findings show that greater situational awareness and real-time visual signals lead to considerable increases in incident prevention. With consolidated platforms, safety communication has been improved, allowing for faster incident reporting and coordination. Employee involvement and empowerment have increased as a result of the implementation of collaborative technology. The report finishes with practical consequences, such as advice for industry practitioners and implementation instructions for collaborative technology. It also identifies future study objectives, such as investigating long-term effects and incorporating new technology.
WorldS4 2023: Intelligent Sustainable Systems, 2024
This paper presents a comprehensive review of green communication systems and network architectur... more This paper presents a comprehensive review of green communication systems and network architectures and highlights the need for energy-efficient networks. The paper begins by discussing the concept of green communication systems and the challenges associated with energy consumption in networks. The solutions and approaches for designing energy-efficient networks are then presented, including the use of energy-efficient transmission techniques, the optimization of network design and architecture, and the development of energyefficient devices and components. Additionally, the paper presents a case study of the use of Ultra-spectra Communication System (USCS) in green radio communication systems to demonstrate the effectiveness of this technology in reducing energy consumption and promoting sustainability. Finally, the paper concludes by providing recommendations for future research, including the development of energy-efficient devices and components and the implementation of advanced radio communication technologies in green communication systems and networks. This paper serves as a valuable resource for researchers, engineers, and professionals working in the field of green communication systems and network architectures.
2023 IEEE International Conference on Computing (ICOCO), 2023
In the digital age, network architecture's effectiveness and dependability play a vital role in s... more In the digital age, network architecture's effectiveness and dependability play a vital role in supporting the ever-increasing complex services and applications. Even though the 5G network has already been launched and widely deployed in various countries in recent years, network development continues, and currently, the 6G network is under development. The article aims to discuss the future and challenges of network architecture by focusing on the integrated 5G and 6G network. The paper covers various aspects, including satellite and terrestrial networks, data-driven learning, and network slicing technology. Additionally, the existing 5G network architecture is evaluated, and the article provides an in-depth analysis of requirements and key solutions for the integrated 5G and 6G network. The findings of this study can aid researchers and industry professionals in understanding and addressing the difficulties involved in developing dependable and effective network architecture in the future.
2023 IEEE International Conference on Computing (ICOCO), 2023
The Metaverse concept pertains to an interconnected virtual realm comprised of virtual communitie... more The Metaverse concept pertains to an interconnected virtual realm comprised of virtual communities and spaces of virtual reality. In this domain, users can engage with each other through digital entities within a shared environment. This extensive digital domain harbors considerable potential to function as a versatile platform for diverse applications, encompassing gaming, social interaction, education, and commerce. The advancement of the Metaverse offers numerous prospects, including the creation of innovative modes of entertainment and communication, enabling remote collaboration, and ushering in novel business paradigms. However, the emergence of the Metaverse also gives rise to significant legal and ethical considerations, encompassing apprehensions surrounding privacy, intellectual property, and governance. To contend with these challenges, it is imperative to initially scrutinize extant literature concerning the Metaverse, its implementation, and to explore suggested solutions aimed at enhancing security and privacy. By amalgamating the technical framework of the Metaverse with its application state, we can glean insights into prevailing vulnerabilities and formulate appropriate security measures to shape the trajectory of this virtual realm.
2023 IEEE International Conference on Computing (ICOCO), 2023
Communication networks can be transformed through the implementation of computing, which can impr... more Communication networks can be transformed through the implementation of computing, which can improve their overall performance, security, and energy efficiency. Nevertheless, several obstacles must be overcome before computing can be fully integrated into communication networks. This paper examines the challenges and research opportunities in the field of computing in communication networks. To take full advantage of computing, new algorithms and techniques must be developed, and machine learning must be explored. Big data analytics and the integration of edge and fog computing with computing techniques are also promising areas for research. The challenges that must be addressed include ethical and privacy concerns, energy consumption, integration with 5G networks, IoT, and cloud computing, and the development of resilient computing systems that can identify and respond to cyber threats. Overcoming these challenges will ensure that computing remains an essential tool for designing and optimizing communication networks.
2023 IEEE International Conference on Computing (ICOCO), 2023
The study delves into the growing trend of implementing Information Technology (IT) governance pr... more The study delves into the growing trend of implementing Information Technology (IT) governance principles across companies and organizations, particularly in the public sector. This approach has gained momentum due to its significance in enhancing performance, risk management, and aligning IT strategies with corporate objectives. The paper highlights the role of COBIT 2019, a standard that assesses IT governance effectiveness and its alignment with organizational goals. The integration of IT governance practices with strategic and operational policies in State-Owned Enterprises (SOEs) is explored, focusing on aspects like IT master planning, framework organization, IT investment management, and risk mitigation. Additionally, the study emphasizes the significance of the RACI method, a tool for delineating responsibilities within organizations, in enhancing governance clarity and effectiveness. By mapping ministerial regulations to COBIT 2019, the research establishes a robust foundation for aligning IT practices with organizational goals. Furthermore, it underscores the importance of internal control evaluation, as internal audit plays a vital role in ensuring effective control mechanisms. The aim, the paper advocates for a comprehensive integration of IT governance, COBIT 2019, and RACI methodologies to enhance IT management practices in SOEs, ultimately promoting efficient and effective organizational operations. Further research could explore practical implementation challenges and strategies to optimize the proposed frameworks
2023 11th International Conference on Cyber and IT Service Management (CITSM), 2023
The use of stakeholder management is crucial for achieving success in projects, specifically with... more The use of stakeholder management is crucial for achieving success in projects, specifically within the domain of e-government project consulting. The aforementioned procedure encompasses the identification of persons, organizations, or entities that possess the capacity to exert influence over a project, comprehending their expectations, and evaluating the probable consequences of their involvement. The development of effective management strategies involves the engagement of stakeholders in decision-making processes, the establishment of ongoing contacts, and the resolution of challenges, all with a focus on prioritizing their needs and expectations. Communication Management Plans are of utmost importance as they serve to ensure the implementation of effective communication methods that facilitate the alignment between stakeholders and project objectives. Within the realm of e-government consulting, the process entails actively involving diverse stakeholders, including IT Governance Boards, Project Managers, and other relevant parties. This is achieved by the use of different techniques, such as the regular dissemination of reports on a weekly basis, conducting surveys, carrying out interviews, and facilitating group discussions on dedicated forums. Stakeholder mapping is an effective method for addressing typical obstacles encountered in stakeholder management. This tool facilitates the classification of stakeholders according to their degrees of interest and power, hence enabling the development of customized engagement strategies. The successful execution of projects, particularly intricate endeavors such as e-government, relies heavily on thorough stakeholder management and well-defined communication protocols. The capacity to discern essential stakeholders, comprehend their issues, and develop efficient lines of communication is crucial in attaining project success.
2023 6th International Conference on Information and Communications Technology (ICOIACT), 2023
The utilization of cell phones and desktop computers on a global scale has experienced a signific... more The utilization of cell phones and desktop computers on a global scale has experienced a significant growth in recent years. This tendency has heightened global competition and demanded firms' regional development for their continued viability. For these criteria to be met, it is required to efficiently employ resources in pursuit of operational excellence. In the context of cloud computing (CC), task scheduling is a key research topic. Task scheduling is an approach that employs an efficient algorithm to map client tasks to appropriate and accessible virtualized resources. Since CC is a distributed and scalable realm, it is more difficult to schedule work. Therefore, an effective approach to work scheduling is required since it is regarded as vital for system performance. Traditional algorithms including round-robin (RR), first come first serve (FCFS), largest job first (LJF), and shortest job first (SJF). To enhance the RR algorithm, several researchers have concentrated on choosing a suitable quantum time and provided a variety of approaches. Several researchers use Cloudsim to model CC infrastructure and applications. This review is intended to explore further because there are still many problems that will be corrected and resolved in further research. This paper can be a valuable resource for researchers who want to improve or develop RR or implement it in CC or various other related fields.
Proceedings of the International Conference on Enterprise and Industrial Systems (ICOEINS 2023), 2023
In general, many banks have not fully optimized their IT-based investment efforts, particularly w... more In general, many banks have not fully optimized their IT-based investment efforts, particularly when anticipating gradual changes or adjustments in specific financial variables over time. This approach is primarily employed to assess the valuation of assets, securities, or companies. The primary data source for this study comprised Annual Reports from three prominent Indonesian banking institutions: BNI, Mandiri, and BRI, spanning the period from 2006 to 2021. The percentage values obtained for these banks are as follows: BNI at 30%, Mandiri at 25%, and BRI at 21%. Combining the percentages for these three banks, the overall percentages are 25% for BNI, 21% for BRI, and 30% for Mandiri. Conversely, the average percentages for these institutions are as follows: BNI at 75%, BRI at 63%, and Mandiri at 90%. Based on these findings, companies can enhance their performance by evaluating their IT investments and aligning their expectations with the future value of IT. Essentially, the improvement in performance for banking institutions can continue to rise without the need for additional capital expenditures, although income may increase without necessarily reaching the expected levels. Consequently, businesses must optimize the value of IT in accordance with their strategic plans, considering factors such as equity liquidity, minimum wages, labor costs, capital expenditure, and income.
Proceedings of the International Conference on Enterprise and Industrial Systems (ICOEINS 2023), 2023
PT Satoe Juara Nusantara (SJN), PT Biru Financial, and the Kowargi Cooperative have partnered to ... more PT Satoe Juara Nusantara (SJN), PT Biru Financial, and the Kowargi Cooperative have partnered to develop the Village Awakening Movement (Gerbang Desa) program, a flagship initiative for Micro, Small, and Medium Enterprises (MSMEs) in Indonesia. The program, approved by the Ministry of Cooperatives and SMEs, focuses on fostering SMEs, particularly those producing staple food products. The Kowargi Cooperative, a sharia cooperative in Bandung, supports small shops across villages in Bandung Regency. PT Biru Finance, a financial institution, provides capital assistance worth 2.5-4.0 million rupiahs per stall in the form of staple food to be sold to villagers. The program's success relies on the use of ICT in the digital era, with collaborations between government, universities, industry partners, lecturers and students, and the community. The pentahelix strategy is suitable for this activity, involving collaboration between government, universities, industry partners, lecturers and students, and the community. The program's success relies on careful planning and the design of business processes between all related entities, including tripartite entities, customers and consumers, stalls and distribution services, and payments. The enhanced business process improvement (E-BPI) method will be used for business process design.
ICIBE '23: Proceedings of the 2023 9th International Conference on Industrial and Business Engineering, 2023
Information technology plays a very important role in a company or institution. Good information ... more Information technology plays a very important role in a company or institution. Good information technology governance is required so that information technology can add value to companies and institutions. Every company or agency has assets that will support the success of the goals of their company or institution. With these assets, they also need IT asset management to control their assets. COBIT 2019 focuses on two things: governance systems and governance frameworks and addresses governance issues by integrating relevant governance components into governance and goal management that can be managed according to the required capabilities. The four-step methods of research are Systematic Research, Planning Analysis, Data Collection, Data Processing, and Conclusion Drawing. A combination of document study and interview results in primary data. In order to conduct asset management at the XYZ University Faculty in accordance with COBIT 2019 standards, it is necessary to carry out the Asset Management Assessment specified with the LAM-INFOKOM administering standard. The research will focus on the assessment of the capacity of the IT management of the assets management part of the Faculty of XYZ University using the COBIT 2019 framework with the BAI09 domain focus. The results obtained from this assessment are the mapping between the 2019 domain acquisition framework BAI09 and LAM INFOKOM criteria 5. Recommendations for improvement of people aspects such as job additions, training, and coordination meetings between staff. The recommendations of the upper process aspects consist of the creation of intrusion work and results reports. The improvement plan to solve the problems and gaps found is expected to help in meeting the COBIT 2019 standardization so as to reach maximum status at the meeting of the COVIT 2019 level.
ICIBE '23: Proceedings of the 2023 9th International Conference on Industrial and Business Engineering, 2023
Procurement is the process of meeting or providing needs between organizations carried out by two... more Procurement is the process of meeting or providing needs between organizations carried out by two roles: buyers and sellers with the aim of buying goods or services from sellers that are done with an agreement process in the form of documents. Procurement of goods and services of the Indonesian government is regulated in Presidential Regulation Number 54 of 2010 concerning the process of implementing electronic procurement of goods / services which is the forerunner of the eProcurement process in Indonesia. The implementation of Electronic Procurement Services (LPSE) is regulated in LKPP Regulation Number 10 of 2021 and Presidential Regulation Number 16 of 2018 and its amendments (Perpres 12/2021) in article 75. the flow of goods / services procurement using LPSE based on Presidential Regulation of the Republic of Indonesia Number 54 of 2010: Login/Register, Fill in Identity, Search for Auctions, Follow the Auction, Bidding, Verification, Determination of Winners, Refutation/Appeal, Contact. In accordance with the LPSE process flow, this research compares the procurement process flow at the Open University, namely the Promise Open University application. The results of the comparison found a difference in the process flow, namely there is no protest / appeal process in Promise Open University. This is also included in the principle of procurement of goods and services, namely fairness.
ICIBE '23: Proceedings of the 2023 9th International Conference on Industrial and Business Engineering, 2023
XYZ University has an Alpha Application used during the registration process for student courses ... more XYZ University has an Alpha Application used during the registration process for student courses each semester. There must be a hazard in the installation of this information system that could impede the process or functionality of the system; therefore, risk analysis is necessary to avoid troubles. By implementing ISO 31000 at XYZ University, it is believed that the risks associated with implementing Alpha can be reduced. This study uses Fishbone Analysis to identify the possible causes of an issue and then separates the root causes. It can also identify potential solutions to this problem (could be more than one problem). According to ISO 31000, risk analysis results are presented as documentation of potential hazards around the Alpha application, with risks grouped based on their impact. The results of this research will be included in the risk evaluation matrix per ISO 31000 recommendations. The evaluation matrix is divided into low, medium, and high-risk categories. So that universities can take advantage of the findings of this risk analysis to prevent and reduce risks and treat them based on the potential impact or risk priority in the Alpha application. Strengthening internal security systems, password policies, encryption, two-factor authentication, and educating students are some ways to mitigate these risks.
ICIBE '23: Proceedings of the 2023 9th International Conference on Industrial and Business Engineering, 2023
This paper examines the role of digital intelligence in leveraging the network economy and enhanc... more This paper examines the role of digital intelligence in leveraging the network economy and enhancing knowledge management in technology-focused firms. It explores the key elements of knowledge management, such as knowledge creation and sharing, and their importance in driving innovation and regional development. The relationship between digital intelligence and the resource-based view is explored, highlighting the strategic utilization of digital intelligence to optimize knowledge management strategies and gain a competitive advantage. The paper also investigates the significance of social capital, social network theory, and their connection to knowledge management, emphasizing the role of digital intelligence in strengthening social capital, facilitating collaboration, and enabling seamless knowledge sharing. Additionally, the implications of risk and real options theory in knowledge management are discussed, emphasizing how digital intelligence aids in identifying, assessing, and managing risks and real options, thereby enhancing decision-making processes. Furthermore, the paper explores the integration of digital intelligence in the network economy, highlighting its impact on connectivity, collaboration, and knowledge exchange among stakeholders. The findings underscore the transformative potential of digital intelligence in driving innovation and enhancing firm performance. In conclusion, this paper emphasizes the significance of digital intelligence in leveraging the network economy and optimizing knowledge management in technology-focused firms, providing valuable insights for practitioners and researchers, and calling for further exploration of innovative strategies and technologies in knowledge management and the network economy.
SEIKO : Journal of Management & Business, 2023
In Indonesia, the Pilkades (Village Head Elections) play a crucial role in local governance and d... more In Indonesia, the Pilkades (Village Head Elections) play a crucial role in local governance and democratic processes. This paper presents a case study of Godabaya Village in West Java, where an innovative approach to empower rural communities was implemented. The project aimed to enhance the Pilkades process by introducing a digital vote-counting system and providing training for village officials. This initiative addressed challenges such as limited technological infrastructure and expertise, ultimately improving transparency, efficiency, and overall readiness for the 2023 Pilkades. The project's success has broader implications for electoral processes in Indonesia and offers recommendations to enhance the Pilkades process, promote participatory democracy, and leverage technology for improved governance.
S E I K O : Journal of Management & Business, 2023
This paper explores the digital transformation of village head elections in Sukadana, Indonesia, ... more This paper explores the digital transformation of village head elections in Sukadana, Indonesia, with a focus on the implementation of database-driven technology. We examine the transition from traditional paper-based voting methods to electronic voting systems and the impact on voter participation, transparency, and the overall electoral process. We also analyze the results of this transformation, identify challenges encountered during the process, and draw lessons from this case study. Furthermore, we provide recommendations for other rural areas considering a similar digital shift. Our findings highlight a significant increase in voter participation, improved process transparency, and the potential for enhancing democracy at the village level. The success of this digital revolution in a rural context underscores the importance of a tailored approach to technology adoption in such settings, considering local needs and addressing security concerns.
ICCCM '23: Proceedings of the 2023 11th International Conference on Computer and Communications Management, 2023
The goal of this study is to analyze the current state of servers in five laboratories and sugges... more The goal of this study is to analyze the current state of servers in five laboratories and suggest a sustainable design for a green data center based on the TIA-942 standard. The findings indicate problems with dispersed servers, unstable electrical systems, insufficient cooling, disorganized cable arrangement, and excessive power consumption and heat generation because of numerous server utilization. A suggested data center architecture addresses these difficulties by centralizing servers in one area, building five supporting rooms, leveraging HVAC technology, adopting raised floor technology, and applying virtualization technology. Furthermore, for future development, extensive documentation of data center and server modifications, dedicated rooms, and additional research on the deployment, operation, and optimization phases of PPDIOO in the data center are required. This research is useful for organizations looking to improve their data centers for sustainability and efficiency.
ICCCM '23: Proceedings of the 2023 11th International Conference on Computer and Communications Management, 2023
This research discusses Green Networking, an important concept in reducing the environmental impa... more This research discusses Green Networking, an important concept in reducing the environmental impact of information and communication technology in the digital era. In this study, the author conducted secondary data analysis and reviewed published papers related to the implementation of green networking. The analysis results indicate that green networking has great potential to have a positive impact on the environment and reduce carbon emissions, but its implementation still faces several challenges such as higher costs and technological complexity. This research also discusses opportunities that can be taken in the implementation of green networking, such as improving energy efficiency in network infrastructure, developing renewable energy technologies, and increasing public awareness of the importance of preserving the environment through utilization of environmentally friendly technologies. Furthermore, future research and development of green networking are expected to be a primary focus in supporting sustainable development. In conclusion, this paper asserts that green networking has great potential to contribute to sustainable development and environmental preservation. However, the implementation of green networking requires collaboration among various parties, including industry, government, and society. With new innovations and increasing awareness of the importance of preserving the environment, it is expected that green networking can become an effective solution to reduce the environmental impact of information and communication technology in the future.
Sustainability
Amidst the rapid advancements in the digital landscape, the convergence of digitization and cyber... more Amidst the rapid advancements in the digital landscape, the convergence of digitization and cyber threats presents new challenges for organizational security. This article presents a comprehensive framework that aims to shape the future of cyber security. This framework responds to the complexities of modern cyber threats and provides guidance to organizations to enhance their resilience. The primary focus lies in the integration of capabilities with resilience. By combining these elements into cyber security practices, organizations can improve their ability to predict, mitigate, respond to, and recover from cyber disasters. This article emphasizes the importance of organizational leadership, accountability, and innovation in achieving cyber resilience. As cyber threat challenges continue to evolve, this framework offers strategic guidance to address the intricate dynamics between digitization and cyber security, moving towards a safer and more robust digital environment in the fut...
Uploads
Papers by Muhammad Fakhrul Safitra