| ORDER | PAPER ID | AUTHORS | PAPER TITLE | TOPIC / TRACK |
| 1 | 1 | Nedal Nwasra, Nurlida Basir and Mohd Fadzli Marhusin | Quality Aspects Priorities of Malaysian Universities Websites from End-Users and Decision-Makers Perspectives Based on QinUEM | Information Systems Management (ISM) |
| 2 | 3 | Lim Kian Long, Wan Mohd Nazmee Wan Zainon, Lim Chien Hui and Gim Yeong Fook | A Study on the Effectiveness of Tree-maps as Tree Visualization Techniques | Data Engineering and Business Intelligence (DEBI) |
| 3 | 5 | Narumon Sriratanaviriyakul and Jamal El-Den | Motivational Factors for Knowledge Sharing using Pedagogical Discussion Cases: Students, Educators, and Environmental Factors | Information Systems Management (ISM) |
| 4 | 6 | Fatemeh Mina Torabi and Jamal El-Den | The impact of Knowledge Management on Organizational Productivity: A Case Study; Koosar Bank of Iran | Information Systems Management (ISM) |
| 5 | 7 | Kamarul Faizal Hashim and Nawar Abbood Fadhil | Engaging with Customer using Social Media Platform: A Case Study of Malaysia Hotels | Data Acquisition and Information Dissemination (DAID) |
| 6 | 9 | Alhassan Adamu and Wan Mohd Nazmee Wan Zainon | Multiview Similarity Assessment Techniques of UML Diagrams | Information Systems Management (ISM) |
| 7 | 11 | Baydoun Ali and El-Den Jamal | A Framework for Knowledge Based Software Service Supply Chain (SSSC): A Comparative Analysis with Existing Frameworks | Enterprise Systems (ES) |
| 8 | 14 | Mahendra Adhi Nugroho and M. Andryzal Fajar | Effects of Technology Readiness Towards Acceptance of Mandatory Web-Based Attendance System | Information Systems Management (ISM) |
| 9 | 15 | Mahendra Adhi Nugroho, Arief Zuliyanto Susilo, M. Andryzal Fajar and Diana Rahmawati | Exploratory Study of SMEs Technology Adoption Readiness Factors | Information Systems Management (ISM) |
| 10 | 17 | Masrina Akmal Salleh, Mahadi Bahari and Nor Hidayati Zakaria | An Overview of Software Functionality Service: A Systematic Literature Review | Information Systems Management (ISM) |
| 11 | 20 | Wan Safra Diyana Wan Abdul Ghani, Nik Zulkarnaen Khidzir, Tse Guan Tan and Mohammad Ismail | The influences of Task-Technology Fit, Attitude, Subjective Norm and Perceived Behavioral Control on Textile Cyberpreneurâs Intention to Adopt Cloud-based m-Retail Application | Information Systems Management (ISM) |
| 12 | 21 | Dedi Iskandar Inan and Ghassan Beydoun | Disaster Knowledge Management Analysis Framework with Agent-Based Models: Design Science Research Approach | Data Engineering and Business Intelligence (DEBI) |
| 13 | 22 | Rendan Liu and Ayoung Suh | Self-Branding on Social Media: An Analysis of Style Bloggers on Instagram | Data Acquisition and Information Dissemination (DAID) |
| 14 | 24 | Noor Azizah Mohamadali and Nur Faizah Ab Aziz | The Organization Factors as Barriers for Sustainable Health Information Systems (HIS) – A Review | Information Systems Management (ISM) |
| 15 | 25 | Manik Hapsara, Ahmed Imranand Timothy Turner | Beyond Organizational Motives of e-Government Adoption: The Case of e-Voting Initiative in Indonesian Villages | Information Systems Management (ISM) |
| 16 | 26 | Saad Albishi, Ben Soh, Azmat Ullah and Fahad Algarni | Challenges and Solutions for Applications and Technologies in the Internet of Things | IT Infrastructure and Security (ITIS) |
| 17 | 27 | Noor Azizah Mohamadali and Nur Faizah Ab Aziz | The Technology Factors Barriers for Sustainable Health Information Systems (HIS) â A Review | Information Systems Management (ISM) |
| 18 | 28 | Adhi Setyo Santoso and Liza Agustina Maureen Nelloh | Factors of Satisfaction and Intention to Use Peer-to-Peer Online Transportation: a Replication Study | Information Systems Management (ISM) |
| 19 | 29 | Fajara Kurniawan Nasrullah Hariyadi, Nur Aini Rakhmawati, Abi Nubli Abadi, Muhammad Zuhri and Wisnu Tri Sugiyanto | Indonesia Government Information Completeness on the Web | Data Acquisition and Information Dissemination (DAID) |
| 20 | 30 | Hatma Suryotrisongko, Reginia Cindy Kusuma and Rv Hari Ginardi | Four-Hospitality : Friendly Smart City Design for Disability | IT Infrastructure and Security (ITIS) |
| 21 | 31 | Ammar Amran, Zarul Fitri Zaaba, Manmeet Kaur Mahinderjit Singh and Abdalla Wasef Marashdih | Usable Security: Revealing End-users Comprehension on Security Warnings | IT Infrastructure and Security (ITIS) |
| 22 | 36 | Aritra Rudra and Parag Kumar Guha Thakurta | Node Level Tuning for QoS Aware Routing in Wireless Cellular Networks | IT Infrastructure and Security (ITIS) |
| 23 | 37 | Mahendrawathi Er, Shania Olivia Zayyin and Firman Jati Pamungkas | ERP Post Implementation Review with Process Mining: A Case Study of Agricultural Chemicals Company Procurement Process | Enterprise Systems (ES) |
| 24 | 38 | Geetha Nadarajan, Jamil Bojei and Haliyana Khalid | Influence of Negative eWOM on Consumerâs Intention to Switch Mobile Service Provider | Information Systems Management (ISM) |
| 25 | 40 | Ari Kusyanti, Dita Rahma Puspitasari, Harin Puspa Ayu Catherina and Yustiyana April Lia Sari | Information Privacy Concerns on Teens as Facebook Users in Indonesia | IT Infrastructure and Security (ITIS) |
| 26 | 45 | Mohd Talmizie Amron, Dr Roslina Ibrahim and Dr Suriayati Chuprat | A Review of Factors of Cloud Computing Acceptance Factors | IT Infrastructure and Security (ITIS) |
| 27 | 46 | Yeow Pooi Mun, Haliyana Khalid and Devika Nadarajah | Millennialsâ Perception on Mobile Payment Services in Malaysia | Information Systems Management (ISM) |
| 28 | 47 | Melisa Helingo, Betty Purwandari, Riri Satria and Iis Solichah | The Use of Analytic Hierarchy Process (AHP) for Software Development Method Selection: A Perspective of e-Government in Indonesia | Information Systems Management (ISM) |
| 29 | 49 | Renny Sari Dewi, Sholiq and Apol Pribadi Subriadi | A Modification Complexity Factor in Function Points Method for Software Cost Estimation Towards Public Service Application | Information Systems Management (ISM) |
| 30 | 52 | Arif Ridho Lubis, Ferry Fachrizal and Muharman Lubis | The Effect of Social Media to Cultural Homecoming Tradition of Computer Programs Students in Medan | Information Systems Management (ISM) |
| 31 | 56 | Riska Asriana Sutrisnowati, Bernardo Nugroho Yahya, Hyerim Bae, Iq Reviessay Pulshashi and Taufik Nur Adi | Scalable Indexing Algorithm for Multi-dimensional Time-gap Analysis with Distributed Computing | Enterprise Systems (ES) |
| 32 | 58 | Abdalla Wasef Marashdih and Zarul Fitri Zaaba | Cross Site Scripting: Removing Approaches in Web Application | IT Infrastructure and Security (ITIS) |
| 33 | 59 | Anisah Herdiyanti, Nanda Restanena Listyawati and Hanim Maria Astuti | Understanding the Total Value of Information Technology Services from the Perspective of Students and Academic Staffs | Information Systems Management (ISM) |
| 34 | 60 | Khairun Ashikin Ismail, Manmeet Mahinderjit Singh, Norlia Mustaffa, Pantea Keikhosrokiani and Zakiah Zulkefli | Security Strategies for Hindering Watering Hole Cyber Crime Attack | IT Infrastructure and Security (ITIS) |
| 35 | 61 | Wawan Gunawan, Hari Ginardi and Septiawan Rosetya Wardana | WebGIS for Asset Management of Land and Building of Madiun City Government | Information Systems Management (ISM) |
| 36 | 62 | Satrio Baskoro Yudhoatmojo and Muhammad Arvin Samuar | Community Detection on Citation Network of DBLP Data Sample Set using LinkRank Algorithm | Data Acquisition and Information Dissemination (DAID) |
| 37 | 64 | Salama Mostafa, Aida Mustapha, Mohd Sharifuddin Ahmad and Moamin A. Mahmoud | An Adjustable Autonomy Management Module for Multi-agent Systems | Data Engineering and Business Intelligence (DEBI) |
| 38 | 65 | Zakiah Zulkefli, Manmeet Mahinderjit Singh, Azizul Rahman Mohd Shariff and Azman Samsudin | Typosquat Cyber Crime Attack Detection via Smartphone | IT Infrastructure and Security (ITIS) |
| 39 | 66 | Handaru Jati and Dhanapal Durai Dominic | A New Approach of Indonesian University Webometrics Ranking Using Entropy and PROMETHEE II | Information Systems Management (ISM) |
| 40 | 67 | Tiara Izrinda Jafni, Mahadi Bahari, Waidah Ismail and Abduljalil Radman | Understanding the Implementation of Telerehabilitation at Pre-Implementation Stage: A Systematic Literature Review | Information Systems Management (ISM) |
| 41 | 68 | Alifia Puspaningrum and Riyanarto Sarno | A Hybrid Cuckoo Optimization and Harmony Search Algorithm for Software Cost Estimation | Information Systems Management (ISM) |
| 42 | 69 | Aris Tjahyanto | The Utilization of Filter on Object-based Opinion Mining in Tourism Product Reviews | Data Acquisition and Information Dissemination (DAID) |
| 43 | 71 | Riyanarto Sarno and Kelly R. Sungkono | Coupled Hidden Markov Model for Process Discovery of Non-Free Choice and Invisible Prime Tasks | Data Engineering and Business Intelligence (DEBI) |
| 44 | 74 | Sholiq and Renny Sari Dewi | A Comparative Study of Software Development Size Estimation Method: UCPabc vs Function Points, Which One is Closest to the Actual Effort? | Information Systems Management (ISM) |
| 45 | 76 | Wiwik Anggraeni, Rafika Nurmasari, Edwin Riksakomara, Febriliyan Samopa, Radityo Prasetyanto Wibowo, Lulus Condro T. and Pujiadi | Regression Approach with Natural Logarithmic Transformation In Response Variables for Predicting Number of Dengue Fever Incidents Case Study : Malang Regency, Indonesia | Data Engineering and Business Intelligence (DEBI) |
| 46 | 78 | Bambang Setiawan, Supeno Djanali and Tohari Ahmad | A Study on Intrusion Detection Using Centroid-Based Classification | IT Infrastructure and Security (ITIS) |
| 47 | 82 | Muhammad Asep Subandri and Riyanarto Sarno | Cyclometer for Determining Product Complexity Cost Driver in COCOMO II | Information Systems Management (ISM) |
| 48 | 84 | Rangaballav Pradhan, Souvik Rakshit and Tanmay De | Performance Evaluation of RPL under Mobility for VANETs | IT Infrastructure and Security (ITIS) |
| 49 | 85 | Lilia Quentara and Erma Suryani | The Development of Photovoltaic Power Plant for Electricity Demand Fulfillment in Remote Regional of Madura Island using System Dynamics Model | Enterprise Systems (ES) |
| 50 | 86 | Subhendu Barat, Basuki Nath Keshri and Tanmay De | A Cost Function based Multi-objective Multicast Communication over WDM Optical Fiber Mesh Network | Data Engineering and Business Intelligence (DEBI) |
| 51 | 88 | Shilvia Silalahi, Putu Handayani and Qorib Munajat | Service Quality Analysis for Online Transportation Services: Case Study of Gojek | Information Systems Management (ISM) |
| 52 | 89 | Saed Tarapiah and Shadi Atalla | Analysis the Performance of Vehicles Ad Hoc Network | IT Infrastructure and Security (ITIS) |
| 53 | 90 | Elin Cahyaningsih, Dana Indra Sensuse and Handrie Noprisson | Multi Methods for Knowledge Management Strategy Roadmap of Government Human Capital Management | Information Systems Management (ISM) |
| 54 | 91 | Fatimah Azzahro, Putu Wuri Handayani and Rizky Septiani | Factors that Affects Behavioral Intention in Online Transportation Service: Case study of GO-JEK | Information Systems Management (ISM) |
| 55 | 92 | I Putu Eka N. Kencana, Ida Harini and Kadek Mayuliana | The Performance of Ant System in Solving Multi Traveling Salesmen Problem | Data Acquisition and Information Dissemination (DAID) |
| 56 | 93 | Feby Artwodini Muqtadiroh, Hanim Maria Astuti dan Eko Wahyu Tyas Darmaningrat | Usability Evaluation to Enhance Software Quality of Cultural Conservation System Based on Nielsen Model (WikiBudaya) | Information Systems Management (ISM) |
| 57 | 94 | Fayez Alqahtani | The Development of Information Security Policy (ISP): A Case Study Approach | IT Infrastructure and Security (ITIS) |
| 58 | 99 | Muhammad Rifki Shihab, Nina Meilatinova, Achmad Nizar Hidayanto and Herkules | Determinants of CAATT acceptance: Insights from public accounting firms in Indonesia | Information Systems Management (ISM) |
| 59 | 101 | Afira Putri Ghaisani, Putu Wuri Handayani and Qorib Munajat | Usersâ Motivation in Sharing Information on Social Media | Information Systems Management (ISM) |
| 60 | 102 | Totok R. Biyanto, Irawan Sonny, Henokh Y. Fibrianto, Matradji Matradji and Ahmad Hasinur Rahman | Killer Whale Algorithm: An Algorithm Inspired by the Life of Killer Whale | Data Engineering and Business Intelligence (DEBI) |
| 61 | 103 | Paul Jr. Bokingkito and Orven Llantos | Design and Implementation of Real-Time Mobile-based Water Temperature Monitoring System | IT Infrastructure and Security (ITIS) |
| 62 | 104 | Anggar Riskinanto, Bayu Kelana and Deliar Rifda Hilmawan | The Effect of Generation on Adopting E-Payment Technology | Information Systems Management (ISM) |
| 63 | 107 | Amna Shifia Nisafani | Developing Salesperson Performance Indicators on Instant Messaging Platform | Enterprise Systems (ES) |
| 64 | 108 | Zaini Zainol, Hawa Ahmad and Dahlia Fernandez Mohd Farid Fernandez | Public Sector Accountantsâ Opinion on Impact of a New Enterprise System | Enterprise Systems (ES) |
| 65 | 109 | Kristine Mae Galera and Orven Llantos | Mobile Web Energy Monitoring System Using DFRduino Uno | IT Infrastructure and Security (ITIS) |
| 66 | 110 | Jaillah Mae Gesulga, Almarie Berjame, Kristelle Sheen Moquiala and Adrian Galido | Barriers to Electronic Health Record System Implementation and Information Systems Resources: A Structured Review | Information Systems Management (ISM) |
| 67 | 111 | Totok R. Biyanto, Matradji Matradji, Ahmad Hasinur Rahman and Sonny Irawan | Application of Killer Whale Algorithm in ASP EOR Optimization | Data Engineering and Business Intelligence (DEBI) |
| 68 | 113 | Jatmiko Wahyu Nugroho Joshua, I Putu Agus Swastika and Tri Oktin Windha Daniaty | E-Government Integration through Implementation of GIS web-based on Community Health monitoring in Jembrana Regency, Bali | Information Systems Management (ISM) |
| 69 | 114 | Jerina Jean Ecleo and Adrian Galido | Surveying LinkedIn Profiles of Data Scientists: The Case of the Philippines | Data Acquisition and Information Dissemination (DAID) |
| 70 | 117 | Elin Cahyaningsih, Dana Indra Sensuse, Aniati Murni Arymurthy and Wahyu Catur Wibowo | NUSANTARA: A New Model of Knowledge Management in Government Human Capital Management | Data Acquisition and Information Dissemination (DAID) |
| 71 | 118 | Dyah Lestari Widaningrum, Isti Surjandari and Aniati Murni Arymurthy | Spatial Data Utilization for Location Pattern Analysis | Data Acquisition and Information Dissemination (DAID) |
| 72 | 119 | Nur Aini Rakhmawati, Valliant Ferlyando, Febriliyan Samopa and Hanim Maria Astuti | A Heuristic Evaluation for Assessing Registered Websites | IT Infrastructure and Security (ITIS) |
| 73 | 120 | Made Mira Diani, Tony Dwi Susanto and Irmasari Hafidz | Measurement of User’s Intention to Use of City113 Application Based on Decomposed Theory of Planned Behavior (DTPB) in Surabaya City (Case Study: East Surabaya) | Information Systems Management (ISM) |
| 74 | 121 | Dina Chahyati | Tracking People by Detection Using CNN Features | Data Engineering and Business Intelligence (DEBI) |
| 75 | 123 | Vania Beatrice Liwandouw and Alz Danny Wowor | The Existence Of Cryptography: A Study On Instant Messaging | IT Infrastructure and Security (ITIS) |
| 76 | 125 | Ifrina Nuritha and Mahendrawathi Er | Structural Similarity Measurement of Bussiness Process Model to Compare Performance of Heuristic and Inductive Miner Algorithm in Dealing with Noise | Enterprise Systems (ES) |
| 77 | 126 | Hanim Maria Astuti, Feby Artwodini Muqtadiroh and Eko Wahyu Tyas Darmaningrat | Risks Assessment of Information Technology Processes Based on COBIT 5 Framework: A Case Study of ITS Service Desk | Information Systems Management (ISM) |
| 78 | 127 | Noor Akma Abu Bakar, Ainil Fahsha Nasrun Adil, Mazlina Abdul Majid, Khalid Adam and Younis M. Younis | Decision Support Model for Vehicular Traffic Congestion using Discrete Event Simulation: A Case Study | Enterprise Systems (ES) |
| 79 | 128 | Satrio Priyambada, Mahendrawathi Er and Bernardo Nugroho Yahya | Curriculum Assessment of Higher Educational Institution Using Aggregate Profile Clustering | Enterprise Systems (ES) |
| 80 | 129 | Dedy Rahman Wijaya, Riyanarto Sarno, Enny Zulaika and Shoffi Izza Sabila | Development of Mobile Electronic Nose for Beef Quality Monitoring | IT Infrastructure and Security (ITIS) |
| 81 | 132 | Jockey Satria Wijaya, Wiwik Anggraenil, Ahmad Muklason, Faizal Mahananto, Edwin Riksakomara and Arif Djunaidy | Advanced Traveler Information System: Itinerary Optimisation As an Orienteering Problem Using Iterative Local Search-Hill Climbing Algorithm | Data Engineering and Business Intelligence (DEBI) |
| 82 | 133 | Linda Salma Angreani, Annas Vijaya | Designing an Effective Collaboration using Information Technology towards World Class University | Information Systems Management (ISM) |
| 83 | 135 | June Ling Ong Hui, Keng Hoon Gan and Wan Mohd Nazmee Wan Zainon | Effects of Word Class and Text Position in Sentiment-based News Classification | Data Acquisition and Information Dissemination (DAID) |
| 84 | 137 | Mahyuddin K M Nasution and Noah S A | Social Network Extraction Based on Web: 2. Comparison of Superficial Methods | Data Acquisition and Information Dissemination (DAID) |
| 85 | 139 | Shoffi Izza Sabilla, Riyanarto Sarno and Joko Siswantoro | Estimating Gas Concentration using Artiï¬cal Neural Network for Electronic Nose | Data Engineering and Business Intelligence (DEBI) |
| 86 | 141 | Berlilana, Taqwa Hariguna, Nurfaizah | Understanding of Public Behavioral Intent to Use e-Government Service: an Extended of Unified Theory of Acceptance Use of Technology and Information System Quality | Information Systems Management (ISM) |
| 87 | 142 | Muhammad Mustafa Hassan and Adnan Qureshi | Disrupting the Rote Learning Loop: CS Majors Iterating over Learning Modules with an Adaptive Educational Hypermedia | Enterprise Systems (ES) |
| 88 | 143 | Leo Santoso | Academic Data Warehouse with Big Data Technology for Higher Education | Data Acquisition and Information Dissemination (DAID) |
| 89 | 144 | Irmasari Hafidz, Alvin Rahman Kautsar, Tetha Valianta and Nur Aini Rakhmawati | Shaping Individual Online Behavior Through Time Teenstagram: A Visualization for Instagram Time Dataset from Teen Users (Case Study in Surabaya, Indonesia) | Data Acquisition and Information Dissemination (DAID) |
| 90 | 145 | Febriliyan Samopa, Hanim Maria Astuti, Mahesti Ayu Lestari | The Development of Work Instruction as a Solution to Handle IT Critical Incidents in Units within an Organization | Information Systems Management (ISM) |
