Achmad Nizar Hidayanto

Achmad Nizar Hidayanto
University of Indonesia | UI · Faculty of Computer Science

About

452
Publications
173,360
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,142
Citations
Additional affiliations
September 2008 - September 2017
University of Indonesia
Position
  • Coordinator of IS/IT Stream

Publications

Publications (452)
Article
Full-text available
Social media has become a very commonplace way for many people to have social interactions. The role of social media has changed from what was originally only a way to bridge social interactions, to becoming a business tool in various industries, one of which is the tourism industry. The interaction between social media users can create new ways to...
Article
Full-text available
Online library resources can act as a trusted source to find various references for conducting research or writing research papers. With the increasing number of published papers, the use of online library resources becomes increasingly important for academics, including for university students. This study aims to investigate the factors that lead...
Article
The purpose of this study is to investigate the effect of using partitioning techniques on the density-cube-based spatio-temporal clustering method. This work further adapts this clustering approach to spatio-temporal data. We have compared the IMSTAGRID-the proposed algorithm to the ST-DBSCAN, AGRID+, and ST-AGRID algorithms and have found that th...
Article
Full-text available
This study aims to analyze the factors that influence a person's intention to use a subscription-based streaming service application using the perspective of the inertia of piracy movie application users. This study investigates the factors that affect the inertia of movie piracy application users. The theory used is a combination of the status quo...
Conference Paper
Full-text available
Digital literacy plays a critical role enabling individuals to participate in the contemporary workforce and society, including supply chain and port operation management. There are several existing digital literacy frameworks identified in the literature however, coverage is limited to general digital literacy indicators which do not consider indu...
Article
Ride-hailing service has been emerging not only to change dramatically the way people commute, but more importantly, it also generates various opportunities. However, given all the benefits offered by this service, its acceptance is still challenging. This research aims to investigate as to how technology anxiety and social influence as the anteced...
Article
This study aims to determine whether the use of the MTRS application can affect the intention to visit tourist destinations and the level of influence of the factors that can influence it. The model in this study involves the Task-Technology Fit (TTF) model and aspects, technological features, social motivation, visit intention, and use intention t...
Preprint
BACKGROUND Most data breaches in health care organizations are caused by human factors. The medical environment has specific characteristics that might impact the decision and behavior of their employee, including in performing security practices. OBJECTIVE This study aims to review the literature on antecedent factors of information security beha...
Article
BACKGROUND: Overcoming the disengagement feeling in a human- centric environment such as a workplace or a school is essential. In fact, the disengagement in a workplace or at school is one of the major challenges today. Lack of meaningful engagement contributes to this feeling. OBJECTIVE: It is to assess the impacts of external feedback on learning...
Article
The concept of system lifecycle models was born, emphasizing the importance of adhering to them. Some methodical technique to developing a new or improved system Several models were suggested, including the waterfall model, the V-shaped model, the iterative model, the spiral model, and the Bing bang model are all examples of models., etc. The compa...
Article
Full-text available
How to improve student engagement and educational learning outcomes in the classroom have always been high on a teacher’s priority list. Unfortunately, it seems these challenges have become more pronounced in teaching Generation Z. To address these challenges educators are exploring new teaching methodologies such as flipped learning. The authors e...
Article
Full-text available
During the COVID-19 pandemic, the application of e-payment has rapidly increased. However, e-payment has not been able to achieve a trustworthy level in e-commerce transactions. Thus, cash payment methods with Cash On Delivery (COD) services still dominate C2C e-commerce payment transactions in Indonesia. This study aims to investigate factors that...
Article
Full-text available
Business Intelligence (BI) is an essential technology in an increasingly competitive landscape since it helps make decisions more accurately. To achieve an effective BI implementation, the organization must formulate the right strategy to overcome its challenges. This research aimed to develop a framework to map barriers into strategies using quali...
Article
Full-text available
E-Learning has been massively used in higher education, one of which is in Universitas Indonesia. The e-learning system in Universitas Indonesia is called Student Centered E-Learning Environment Universitas Indonesia (SCELE UI). This research determines the effect of usability on the intention to use SCELE UI in a sustainable way. The Expectation C...
Article
Background Personal health record (PHR) has been extensively used in developed countries; however, it has been limitedly adopted in developing countries. This study was conducted in Indonesia: a developing country with the largest population in Southeast Asia. PHR that is integrated with health providers is needed to achieve a transformation from a...
Article
Full-text available
Massive Online Open Course (MOOC) is a web-based interactive online learning medium that allows users to take its courses and get completion certificates. The number of MOOC users does not run straight with the total rate of course completion. This is due to various user reasons, such as just to search for specific materials or sources without comp...
Conference Paper
A personal health record (PHR) is a type of health record maintained by patients. Integrated PHR is an ideal type of PHR that can empower patients to manage their health care and provide continuous connections between patients and their health providers. However, little is known about the adoption of integrated PHR in Indonesia. Thus, this study ai...
Article
Full-text available
The Brexit referendum has impacted both the UK and the EU economies in several ways. The uncertainty around Brexit highlighted the importance of a relationships network between directors of companies to access information and resources that are necessary for optimal decision making. It is difficult to develop informed business and economy policies...
Article
The research data management (RDM) readiness model assists research institutions in measuring their readiness level and identifying gaps to develop a strategy for implementing RDM. The technology, organization, people, and environment (TOPE) framework was used as a guideline in selecting the appropriate factors and indicators. The fuzzy delphi meth...
Conference Paper
Moreover, in a pandemic situation caused by coronavirus (COVID-19) which has infected more than 200 countries around the world. Every country should have strategic planning and a roadmap regarding how to stop the spread of the virus. One of those is trying to build an application to be an aggregator and a tool supporting other strategic planning. I...
Article
Data Warehouse/Business Intelligence nowadays has become a necessity for every organization. Data analysis supports in making decisions and policies. The problem is the data warehouse management process, both related to ETL, data modelling, and data architecture, which results in the non-optimal and inefficient dashboard that wastes energy, as a da...
Article
Cybersecurity is currently being used by government organizations in protecting their resources such as data and assets as well as avoiding catastrophic pollution and the failure of key infrastructure that can harm human health and environment. The increasingly modus operandi of modern drug crime syndicates which utilizing technology to attack the...
Article
span lang="EN-US">Many nonnegative matrix factorization based clusterings are employed in discovering pattern and knowledge. Considering the sparseness nature of our data set about the daily tuna fishing data, we attempted to utilize a clustering approach, which is based on non-negative matrix factorization. Adding sparseness constraint and assigni...
Article
Purpose This research set out to investigate the quality service and self-determination theory (SDT) that contributes to the continuance usage of m-banking. Design/methodology/approach A valid of 310 respondents who experienced and intensified using the m-banking is collected. The proposed research model is empirically tested using structural equa...
Conference Paper
Tourism has a reasonably severe impact due to physical restrictions during the COVID-19 pandemic. One of the programs responding to this condition is encouraging rural tourism, which has many natural resources. It is considered to be suitable for future tourism models after a reasonably long quarantine period. However, small and medium-sized enterp...
Article
BACKGROUND: Transition into Industry 4.0 has had many significant impacts. Customization symbolizes leanness, flexibility, adaptability, and agility. A business operator needs to recognize the factors that contribute to better utilization of the talents of its workforce and more effective workplace learning. OBJECTIVE: The study aims to provide a c...
Article
Full-text available
Web 2.0 is a technology that enables collaboration between citizens and the government to actualise the concept of open government. The adoption of technology in the public sector is known to have positive impacts in fostering public sector innovation, including in developing countries with various problems that require collaboration between citize...
Article
Full-text available
Purpose Whether the provision of online health care referral systems by the Indonesia National Health Insurance Agency has ensured healthcare referral compliance raises much concern due to the continuing deficit. This study examines the pattern of healthcare referral process, regional and referral compliance from 2015 to 2016. To provide comprehens...
Article
Full-text available
A new paradigm regarding a significant technological development has been introduced, each individual gets full trust in controlling an asset and can see the level of authenticity of a particular asset. Through qualitative methods, it is possible to have structured results as the first step to the perfection of the digitalisation era, in which the...
Article
Full-text available
Background: Functionalities of personal health record (PHR) are evolving, and continued discussions about PHR functionalities need to be performed to keep it up-to-date. Technological issues such as nonfunctional requirements should also be discussed in the implementation of PHR. Objective: This study systematically reviewed the main functionaliti...
Article
Full-text available
This article is a literature review on smart contract applications in various domains. The aim is to investigate technological developments and implementation of smart contracts in various domains. For this purpose, the theoretical basis of various papers that have been published in recent years is used as a source of theoretical and implementation...
Article
Full-text available
Background Health information security (IS) breaches are increasing with the use of information technology for health care services, and a strong security culture is important for driving employees’ information asset protection behavior. Objective This study aimed to analyze differences in information security cultures (ISCs) across health care pr...
Article
Full-text available
The blockchain system uses hash functions. Hash is used in the blockchain to mark each block of data. Hash function algorithms map a string that is usually hexadecimal of any size to a sequence of fixed-size bits. This journal will discuss the distributed hash model for immutable blockchain node storageThe methodology used in the preparation of thi...
Article
This study aims to determine the factors that influence user intention to use location-based emergency applications. The Unified Theory of Acceptance and Use of Technology (UTAUT) is used as a fundamental theory by adding other relevant variables: trust, privacy concern, and fear of crime. Data were collected through questionnaires distributed to t...
Article
Full-text available
Objectives: This study explored health workers’ perceptions and experiences regarding the maternal and neonatal referral system, focusing on barriers of health information systems and technologies (IS/IT) at primary health centers (PHCs) in South Tangerang, Indonesia. Methods: This qualitative study was conducted using semi-structured interviews,...
Article
Full-text available
This research evaluates the effects of normative beliefs toward citizen engagement on eParticipation. Normative beliefs herein were assessed from the perspectives of citizenship norms, which include engaged-citizenship norms and duty-based norms, as well as the perspective of subjective norms, namely civic norms. A questionnaire was devised as the...
Conference Paper
The usage of cloud computing is needed for educational sector, especially in universities to ease all of administration and learning access to everyone. So that, the development infrastructure cloud computing need to concern the aim of the university. Infrastructure as a Service (IaaS) in cloud computing has problems, like resource, security, and f...
Article
Full-text available
Financial Services Industry (FSI) is a sector with day-to-day business transaction operation dealing with numbers of classified information owned by its customers. It can be managed by the private sector or other institutions pointed by the government, either it is a bank or an insurance company. Aiming to improve services, acquisitions between com...
Article
Full-text available
User Satisfaction is a crucial factor to the success of the Information System which will have extensive impact on the benefits for individuals and organizations as well as users’ continuance intention. Paperless office system is the use of e-government which aims not only to reduce paper usage but to increase effectiveness and efficiency in public...
Article
Full-text available
Smart tourism is one component of smart village or smart city that aims to improve service quality of tourism. Smart tourism is expected to provide a better tourist experience for tourists by utilizing information technology. The purpose of this study is to develop for a culinary recommendation application to support smart tourism. Simple Multi-Att...
Article
BACKGROUND: How to reconnect the disengaged learners has been a major challenge for human learning. Motivating the disengaged learners through traditional interventions has not been effective. OBJECTIVE: The study aims to examine whether feedback from an external unit would be more persuasive for the disengaged learners. The perception on a lack of...
Article
Full-text available
The development of Blockchain and Smart Contract technology provides significant changes in the form of solutions to social technology problems, such as the problem of document forgery on e-government services. In its implementation of government services, there are several challenges faced, such as social technology problems, blockchain mechanisms...
Article
Full-text available
Around the world, the adoption of digital health applications is growing very fast. The use of e-health laboratory systems is increasing while research on the factors that impact users to use e-health laboratory systems in Indonesia has not been done much. The objective of this study is to analyze the behavioral factors of e-health laboratory users...
Preprint
BACKGROUND It is necessary to assess readiness amongst health workers as an approach to successful IT implementation. However, little attention has been paid to assess demographic and associate factors related to such readiness. OBJECTIVE The study aims to describe factors related to the readiness of health workers with respect to implementation o...