Paulus Insap Santosa

Paulus Insap Santosa
Verified
Paulus verified their affiliation via an institutional email.
Verified
Paulus verified their affiliation via an institutional email.
  • Doctor of Philosophy
  • Professor (Full) at Universitas Gadjah Mada

About

278
Publications
195,197
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,662
Citations
Current institution
Universitas Gadjah Mada
Current position
  • Professor (Full)
Additional affiliations
Universitas Gadjah Mada
Position
  • Professor
January 2000 - May 2005
National University of Singapore
Position
  • Research Assistant
March 1985 - present
Universitas Gadjah Mada
Position
  • Research Assistant
Education
January 2000 - December 2006
National University of Singapore
Field of study
  • Information Systems
January 1989 - May 1991
University of Colorado Boulder
Field of study
  • Computer Science
July 1979 - October 1984
Universitas Gadjah Mada
Field of study
  • Computer & Informatic Systems

Publications

Publications (278)
Conference Paper
Full-text available
There are several things to consider in creating a website that is appealing to its users. Although there are many website genre, however, they share some design aspects. Among other aspects, information architecture, visual design, and navigation are three important aspects need to be considered very carefully when creating a website. Besides thes...
Article
Full-text available
Several success factors of online store can be summarized as usability. In general, usability focuses on how useful and usable the online store toward helping customers in doing their online shopping. Recently, more demand towards user positive experience becomes apparent. Usability and user experience are two different things but closely related....
Article
Full-text available
When students are dealing with online tutorial, there are challengers they must answer using any skill they have. The challenge and skill must be at the same 'height' in order for them to immerse with online tutorial activities. Several aspects will be considered as challenge and skill. One challenge under the scrutiny is the page length used to pr...
Article
Full-text available
Tangible user interfaces (TUIs) offer significant educational benefits, but their use in kindergarten, particularly for teaching geometric shapes, remains underexplored, with research largely focused on elementary education or higher levels. Moreover, usability evaluations assessing the ease of use of such tools by teachers as end-users are rarely...
Article
Full-text available
Trust is described in various contexts, such as e-commerce, e-government, reviews, and online health information. Credibility and information quality are fundamental to building trust in those contexts. This study aimed to develop trust perception (TP) and information use (IU) indicators in an information evaluation context. Indicators were develop...
Article
Full-text available
The popularity of batik reflects consumer demands for purchasing fulfillment. Digital technology can bring several advantages and new opportunities to the custom batik design process. Computer-Aided Design (CAD) is a popular digital tool used. This paper will provide the new User Interface (UI) design of CAD custom design batik, namely Batik 4.0. I...
Article
Online developments encourage various store businesses to set up online stores or e-commerce, including buying and selling batik products. Batik as one of the masterpieces as world-recognized Indonesian cultural heritage, is still being done by Small-Medium Industry (SMIs). Currently, batik SMI still has technological limitations, even though there...
Article
Full-text available
Nielsen’s heuristics are widely recognized for usability evaluation, but they are often considered insufficiently specific for assessing particular domains, such as e-learning. Currently, e-learning plays a pivotal role in higher education because of the shift in the educational paradigm from a teacher-centered approach to a student-centered approa...
Article
Full-text available
The use of information and communication technology could increase the quantity and quality of small medium enterprises (SME) production, including batik industry. This study focuses on the development of batik 4.0, a custom batik mobile-based interface that makes it easier for customer which can be used to quickly produce high-quality digital bati...
Article
Full-text available
Indonesia is an agricultural country where most people work as farmers. As an agricultural country, Indonesia produces staple foods, such as rice, corn, sago, and fruits. This research uses the Convolutional Neural Network (CNN), one of the popular algorithms in Deep Learning to classify two varieties of fruit using Stochastic Gradient Descent (SGD...
Article
Full-text available
Environmental resilience for sustainable village development is important, however, in general, strengthening environmental resilience has not become a priority for village government. This study aims to analyze how the institutional capacity of the village government can strengthen environmental resilience in Jayakarta village, Bengkulu Tengah. A...
Article
This research presents the INVys system aiming to solve the problem of indoor navigation for persons with visual impairment by leveraging the capabilities of an RGB-D camera. The system utilizes the depth information provided by the camera for micronavigation, which involves sensing and avoiding obstacles in the immediate environment. The INVys sys...
Article
Full-text available
The implementation of the smart city concept in Indonesia has become a necessity and is no longer an option, but a necessity. Indeed, the complexity of the problems facing the government is very high and requires smart solutions. As a form of supporting local governments in Indonesia in developing smart city master plans, the Ministry of Communicat...
Article
E-government implementation can facilitate public participation in terms of information disclosure, public services, as well as complaints and aspirations in formulating policies to achieve good governance. So it is necessary to analyze the determinant factors of e-government usage by citizens in th etechnical and social aspects. This research was...
Article
Full-text available
Surprising events can be beneficial for unwinnable persuasive games, especially since they can evoke players to reflect on their failure to win the game. Despite its presence in some titles, the usage of surprising events still lacks empirical support. This study aims to gain insight into it by comparing the effects of revealing the game’s context...
Conference Paper
The effectiveness of unwinnable persuasive games to persuade players by utilizing game loss and the subsequent experience has not been established with empirical evidence. In addition, game loss can result in negative experiences which might hinder the persuasion process. Therefore, it is essential to validate its effectiveness and gain insight on...
Article
Full-text available
The Coronavirus disease 2019 pandemic “forced” students to attend online classes roughly from mid-March 2020. This situation, which caused universities, among other institutions, to deal with an overnight change in course delivery from traditional face-to-face to online mode, has resulted in many students facing difficulties. They must cope with th...
Article
Full-text available
The low quality of the collected fish image data directly from its habitat affects its feature qualities. Previous studies tended to be more concerned with finding the best method rather than the feature quality. This article proposes a new fish classification workflow using a combination of Contrast-Adaptive Color Correction (NCACC) image enhancem...
Conference Paper
Trust perception is the reason for information use. Researchers defined trust perception through experiments to understand the factors that shape it. The factors that shape trust perception are proven to be reliable and valid through measurement. The study measured the reliability and validity of Trust Perception and Information Use during online i...
Article
Full-text available
The COVID-19 pandemic that hits almost all countries in the world has caused extraordinary changes, including education. To minimize the spread of the virus, educational institutions are forced to conduct online teaching and learning processes. Online learning using certain media and technology has been initiated and implemented long before the pan...
Article
Full-text available
MOOC (Massive Open Online Course) is an innovation in the field of online learning that has been popular since 2012. MOOC users during the COVID-19 pandemic increased dramatically, but the dropout rate for MOOC was also high. One of the things that causes the high dropout rate is the MOOC design. To get a good MOOC design, it is necessary to design...
Article
Full-text available
The system implementation within the company or organization is accompanied by the redesign of business processes and changes in organizational structure that are carried out to align system implementation with business strategies. In a mandatory environment,, the decision to adopt technology is determined by the management so that in the end emplo...
Article
Full-text available
Determining the stimulus is the first step in experimental research to classify personality types based on electroencephalography (EEG), which is stimulated by a visual form known as visual evoked potential (VEP). Matching the personality type of workers to work activities is an organizational concern. The organization demands the concentration of...
Article
Full-text available
Massive Open Online Course (MOOCs) has helped develop the education sector since the Covid-19 pandemic, though it causes low retention. This study used a systematic literature review method to analyze the factors affecting the retention level of MOOCs participants in developing countries and worldwide. A total of 89 publications in the Scopus journ...
Conference Paper
Full-text available
The event of the Covid-19 pandemic and the prerequisite for social distance has caused significant disturbances in the realm of work, including software development companies, including software development companies. The implementation of work from home (WFH) is a step taken by the government and private organizations to remain productive in the p...
Article
Full-text available
Sistem Informasi Ketenagakerjaan (Sisnaker) merupakan penerapan e-government di Kementerian Ketenagakerjaan yang ditujukan agar masyarakat dapat dengan mudah mengakses informasi dan layanan ketenagakerjaan. Untuk mencari informasi biasanya masyarakat menggunakan mesin pencari. Sisnaker harus berada dihalaman depan halaman mesin pencari agar mudah d...
Article
Full-text available
E-commerce can be used to increase companies or sellers’ profits. For consumers, e-commerce can help them shop faster. The weakness of e-commerce is that there is too much product information presented in the catalog which in turn makes consumers confused. The solution is by providing product recommendations. As the development of sensor technology...
Article
Full-text available
The Audit Board of the Republic of Indonesia is known as Badan Pemeriksa Keuangan (BPK). In carrying out its duties and functions, it empowers and relies on information technology (IT) infrastructure that covers all aspects, including planning, procurement, service provision, information asset security, service continuity, and evaluation. BPK imple...
Article
Full-text available
After obtaining the consistency of Visual Evoked Potential (VEP) by using a stimulus with data-entry user interface design. This study tries to confirm whether an individual's VEP will be classified according to personality type, which results from the proceeds of conventional personality tests usually carried out by the organization that is the pl...
Article
Full-text available
Master data management (MDM) is a method of maintaining, integrating, and harmonizing master data to ensure consistent system information. The primary function of MDM is to control master data to keep it consistent, accurate, current, relevant, and contextual to meet different business needs across applications and divisions. MDM also affects data...
Article
Full-text available
Identification of personality types is one of the activities commonly carried out by organizations to select human resources (HR). The personality type is adjusted to the job description that must be done by the selected individual. Maximum individual performance is the reason why personality tests are needed by organizations. The personality test...
Article
Full-text available
span lang="EN-US">Virtual reality is a combination of technology that are used to visualize and provide interaction with virtual environment. These environment often depict three-dimensional space which could be realistic or imaginary. One of the problem to build a virtual reality application is not yet available an approach as development lifecycl...
Article
Full-text available
Digital information plays an essential role in supporting organizational business. However, incidents of sensitive information leakage often happen in organization environment. Therefore, risk analysis needs to be performed to recognize the impact of information security threat in organization. In order to carry out those risk analyses, risk model...
Article
Full-text available
Background Stemming has long been used in data pre-processing to retrieve information by tracking affixed words back into their root. In an Indonesian setting, existing stemming methods have been observed, and the existing stemming methods are proven to result in high accuracy level. However, there are not many stemming methods for non-formal Indon...
Article
Full-text available
Computer technology emulates the human behaviour in presence of Artificial Intelligence (AI) and Natural Language Processing (NLP). The methods make computers act like humans to provide automatic answers according to the humans needs. However, the available tools for the Indonesian language in NLP are very limited, so the linguistic processing of I...
Article
Full-text available
User requirements are the highest level of requirements. Flawed user requirements document can cause defects in the software being built-aspects of applications that were not presented in the user requirements document to cause a defect. In learning applications for children, there are aspects of pedagogy that need to be well documented. This aspec...
Article
Mental stress is an undesirable condition for everyone. Increased stress can cause many problems, such as depression, heart attacks, and strokes. Psychophysiological conditions possible use as a reference to a person’s mental state of stress. The development of mobile device technology, along with the accompanying sensors, can be used to measure th...
Article
Full-text available
With the rapid development and popularization of Internet of Things (IoT) devices, an increasing number of cyber-attacks are targeting such devices. It was said that most of the attacks in IoT environments are botnet-based attacks. Many security weaknesses still exist on the IoT devices because most of them have not enough memory and computational...
Preprint
Full-text available
As social beings, humans always interact with one another using either verbal or non-verbal language. Language is an arbitrary sound-symbol system, which is used by members of a community to cooperate, interact, and identify themselves. Indonesian language is classified into two categories, namely formal and non-formal. The former meets the grammat...
Preprint
Full-text available
Stemming has long been used in data pre-processing in information retrieval, which aims to make affix words into root words. However, there are not many stemming methods for non-formal Indonesian text processing. The existing stemming method has high accuracy for formal Indonesian, but low for non-formal Indonesian. Thus, the stemming method which...
Preprint
Full-text available
Background: Stemming has long been used in data pre-processing to retrieve information by tracking affixed words back into their root. In an Indonesian setting, existing stemming methods have been observed, and the existing stemming methods are proven to result in high accuracy level. However, there are not many stemming methods for non-formal Indo...
Research
Full-text available
Learning styles is one aspect of pedagogy that needs to be considered in the learning process. Understanding of material will be achieved if it is by the learning styles. Children do not have experience in the learning process, so identification of children learning styles is needed. The cognitive, psycho-motor and emotional abilities of children i...
Article
Full-text available
Nowadays, the implementation of information and communication technology in education is important. In harmony with technological developments, the term mobile learning comes to represent learning that utilizes mobile communication devices. The implementation of augmented reality in education provides a new learning model in the form of a combinati...
Article
Full-text available
With the development of increasingly affordable smartphone technology that is owned by almost everyone, making some activities can be done only by using this device. Smartphone computing capability that is quite powerful, accompanied by various sensors embedded in it, allows the smartphone to be used as a measurement device in various fields of res...
Article
Full-text available
Users of stereo 3D technology commonly report physical discomfort during or after exposure of stereo 3D contents. The discomfort has been associated with sensation of arbitrary and optical flow-like self-motion. However, there is no information on whether arbitrary motion induces stronger physical discomfort compared with optical flow-like motion....
Article
Full-text available
The application of a large number of Internet of Things (IoT) devices makes our life more convenient and industries more efficient. However, it also makes cyber-attacks much easier to occur because so many IoT devices are deployed and most of them do not have enough resources (i.e., computation and storage capacity) to carry out ordinary intrusion...
Chapter
Full-text available
The application of many IoT devices is making our world more convenient and efficient. However, it also makes a large number of cyber-attacks possible because most IoT devices have very limited resources and cannot perform ordinary intrusion detection systems. How to implement efficient and lightweight IDS in IoT environments is a critically import...
Conference Paper
The role of technology seems real and has a big impact on the education system in Indonesia. More importantly, technology doesn't only play a role as a facility, but it also has a role in increasing students' academic integrity level in doing the National Examination (UN). This began to be seen and had a positive impact after the implementation of...
Article
Full-text available
In the era of digital communication, the use of Twitter as a customer service has been widely encountered. Companies have started to develop strategies around effective use of Twitter, one of which was to identify problems that customers frequently complain about. Twitter, with its straightforward tweet characteristics, will certainly contain sente...
Article
Penerapan e-government bertujuan untuk me-ningkatkan kualitas pelayanan publik. Salah satu bentuk penerapan e-government adalah Sistem Informasi Pasar Kerja bagi para pencari kerja yang dikelola Kementerian Tenaga Kerja RI. Akan tetapi, sistem ini belum diketahui kualitas layanannya menurut masyarakat pencari kerja sebagai pengguna utamanya. Usabi...

Network

Cited By