CommIT (Communication and Information Technology) Journal https://journal.binus.ac.id/index.php/commit <ul> <li>P-ISSN: <a title="P-ISSN" href="https://issn.brin.go.id/terbit/detail/1324686678" target="_blank" rel="noopener">1979-2484</a></li> <li>E-ISSN: <a title="E-ISSN" href="https://issn.brin.go.id/terbit/detail/1438070197" target="_blank" rel="noopener">2460-7010</a></li> </ul> <p align="Justify">CommIT is a semiannual journal, published in May and October. Journal of Communication and Information Technology focuses on various issues spanning in Computer Engineering, Computer Science, and Information System. CommIT has been accredited by the Ministry of Research, Technology and Higher Education under the decree number 105/E/KPT/2022 and has been indexed and abstracted by Scopus, ASEAN Citation Index, Directory of Open Access Journals (DOAJ), Science and Technology Index 1 (SINTA 1), Indonesia OneSearch, Academic Research Index (Research BIB), Garda Rujukan Digital (Garuda), Bielefeld Academic Search Engine (BASE), World Catalogue (WorldCat), Google Scholar, and Indonesian Research Repository (Neliti).</p> <p align="Justify"><a title="submit_submissions" href="https://journal.binus.ac.id/index.php/commit/about/submissions">Submit Here</a></p> <p align="Justify"><a title="link_statistic" href="https://statcounter.com/p10511723/summary/?account_id=5271177&amp;login_id=3&amp;code=6e08a41bb96015064756e180435ccfe9&amp;guest_login=1" target="_blank" rel="noopener">Statistic</a></p> <p align="Justify"><a title="link_contact" href="https://journal.binus.ac.id/index.php/commit/about/contact">Contact</a></p> Bina Nusantara University en-US CommIT (Communication and Information Technology) Journal 1979-2484 <p>Authors who publish with this journal agree to the following terms:<br />a. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License - Share Alike that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.</p> <p>b. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.</p> <p>c. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.</p> <p> </p> <p>USER RIGHTS</p> <p>All articles published Open Access will be immediately and permanently free for everyone to read and download. We are continuously working with our author communities to select the best choice of license options, currently being defined for this journal as follows: <a title="Copyright" href="https://creativecommons.org/licenses/by-sa/4.0" target="_blank" rel="noopener">Creative Commons Attribution-Share Alike (CC BY-SA)</a></p> Classification Taxonomies Genus of 90 Animals Using Transfer Learning Resnet-152 https://journal.binus.ac.id/index.php/commit/article/view/9482 <p>The process of learning theory and the limited ability to remember anything, especially a foreign language, often cause students to have difficulty understanding lessons, especially in determining the type and taxonomy of the animal. With the assistance of computer vision technology, students can more effectively face various challenges, enhance their understanding, and improve their ability to apply the concept of animal classification. The research classifies the taxonomy of 90 animals using Transfer Learning ResNet 152. It aims to analyze the performance of Transfer Learning ResNet 152 on the 90-animal dataset. The results show that in Model A with an architecture with frozen layers in 6 ResNet blocks, the highest evaluation value obtained is 0.9222 on Batch size 4 with Dropout 6, 0.9241 on Batch size 8 with Dropout 7, 0.9259 on Batch size 16 with Dropout 8, and 0.9296 on Batch size 32 with Dropout 4 and Dropout 7. Meanwhile, in model B with an architecture with frozen layers in 5 ResNet blocks and one non-frozen block, the highest evaluation value obtained is 0.7611 on Batch size 4 with Dropout 8, 0.8713 on Batch size 8 with Dropout 2, 0.8852 on Batch size 16 with Dropout 1, and 0.9204 on Batch size 32 with Dropout 3.</p> Satria Nur Saputro Faisal Dharma Adhinata Ummi Athiyah Copyright (c) 2024 Satria Nur Saputro, Faisal Dharma Adhinata, Ummi Athiyah https://creativecommons.org/licenses/by-sa/4.0 2024-04-05 2024-04-05 18 1 1 15 10.21512/commit.v18i1.9482 Simulating Free-Space Optical Communications to Support a Li-Fi Access Network in a Smart City Concept https://journal.binus.ac.id/index.php/commit/article/view/10458 <p>Smart city development has grown rapidly in the decades since 4G and 5G technologies have been released. Moreover, a highly reliable network is required to support the Internet of Things (IoT) and mobile access within a city. Light Fidelity (Li-Fi) technology can provide huge bitrate transmission and high-speed communications. In the research, a backbone based on Free-Space Optical (FSO) communication (FSO) is designed through simulation to provide a Li-Fi access network with a high capacity data rate. The originality of the proposed method is the implementation of double filtering techniques, which gives an advantage when forwarding the signal to a node and improves the quality of the signal received by the Li-Fi. The FSO as the Optical Relaying Network (ORN) is designed with a configuration of 12 channels of Dense Wavelength Division Multiplexing (DWDM) amplified by optical amplifiers in the transmitter and receiver. The signal output is filtered by a Fiber Bragg Grating (FBG) and a Gaussian filter. In the simulation, the ORN has node spacing in the range of 500 m to 2,000 m. Then, the data transmission rate at 120 Gbps is provided by the implementation of DWDM channels to serve as an access network. From the simulation, the FSO backbone can optimally deliver highly reliable Li-Fi access networks. When the nodes are spaced in a 500–2,000 m range, the Bit-Error-Rate (BER) performance is produced at the order of 10<sup>−6</sup>.</p> Ucuk Darusalam Novi Dian Nathasia Muhammad Zarlis Purnomo Sidi Priambodo Copyright (c) 2024 Ucuk Darusalam, Novi Dian Nathasia, Muhammad Zarlis, Purnomo Sidi Priambodo https://creativecommons.org/licenses/by-sa/4.0 2024-04-05 2024-04-05 18 1 17 27 10.21512/commit.v18i1.10458 The Determinant Factors of Shopping Cart Abandonment Among E-commerce Customers in Indonesia https://journal.binus.ac.id/index.php/commit/article/view/9308 <p>Predicting the non-purchase behavior of potential customers, such as the abandonment of online shopping carts, is a pivotal factor in determining the success of companies. Despite several conducted studies, further investigation is still required to gain a profound understanding of the underlying causes of these phenomena. The research aims to analyze the motivating factors behind shopping cart abandonment among ecommerce customers in Indonesia using a quantitative method. Furthermore, the population size is undefined, and the sample consists of 200 respondents selected through purposive sampling. The sample size is determined by five times the indicator number. The data analysis is conducted using Structural Equation Modeling (SEM) through SmartPLS 4.0.8.5, and the Coefficient of determination (R2) value for shopping cart abandonment is found to be 37.5%. The results show that complicated checkout, information overload, complicated policies, and limited shipping options positively impact shopping cart abandonment. Complicated checkout emerges as the most significant variable. Meanwhile, perceived cost and emotional ambivalence have no impact. The research also provides theoretical contributions and suggests future research for e-commerce companies and merchants. The theoretical contribution is how user emotions, user experience, merchant policies, and e-commerce regulation affect shopping cart abandonment. From the practical implications, e-commerce companies should focus on the user experience during checkout to reduce shopping cart abandonment.</p> Arta Moro Sundjaja Ariel Velasco Tatuil Dionisius Vincent Scholus Yolanda Dwi Restiani Copyright (c) 2024 Arta Moro Sundjaja, Ariel Velasco Tatuil, Dionisius Vincent Scholus, Yolanda Dwi Restiani https://creativecommons.org/licenses/by-sa/4.0 2024-04-05 2024-04-05 18 1 29 38 10.21512/commit.v18i1.9308 Uncovering the Risk of Academic Information System Vulnerability through PTES and OWASP Method https://journal.binus.ac.id/index.php/commit/article/view/9384 <p>The security of academic information systems needs consideration to anticipate various threats that can result in data leakage, misuse of information, modification, and data destruction. Thirty-six public and private universities utilize the academic information system provided by the software developed by Company XYZ. Moreover, limited resources in universities contribute to the weak handling of vulnerabilities in academic information systems. The research aims to determine the vulnerability level of academic information systems from Company XYZ through penetration testing. The research employs a deductive approach to explore academic system vulnerabilities based on incidents related to system security issues at a university. The research utilizes a combination of two testing methods: Penetration Testing Execution Standard (PTES) and Open Web Application Security Project (OWASP), chosen for their reliability, ease of use, and support by penetration testing tools. Penetration testing follows the PTES, involving seven steps: pre-engagement interaction, information collection, threat modeling, vulnerability analysis, exploitation, post-exploitation, and reporting. The threat focus in the research aligns with the top 10 of 2021 OWASP, ranking the ten most critical security risks. Results reveal eight critical security issues based on measurements using the Common Vulnerability Scoring System (CVSS) method. There are two high-level vulnerabilities, five medium-level vulnerabilities, and one lowlevel vulnerability. Moreover, the three principal vulnerabilities are Structured Query Language (SQL) Injection, broken access control, and weak encryption. Universities can enhance data integrity by independently remediating vulnerabilities discovered in this study. Furthermore, universities are encouraged to raise awareness within the academic community regarding the security of academic data.</p> Ferzha Putra Utama Raden Muhammad Hilmi Nurhadi Copyright (c) 2024 Ferzha Putra Utama, Raden Muhammad Hilmi Nurhadi https://creativecommons.org/licenses/by-sa/4.0 2024-04-05 2024-04-05 18 1 39 51 10.21512/commit.v18i1.9384