scholarly journals Perancangan dan Pembangunan Aplikasi Electronic Menu Restoran

2021 ◽  
Vol 13 (1) ◽  
pp. 1
Author(s):  
Finsa Nurpandi ◽  
Diki M Rosid Liki

Electronic Menu or abbreviated as eMenu is an application that designed to improve the performance of service processes in a business sector, especially restaurants. eMenu aims to change thefood ordering service process that was originally traditional using paper, into web-based digital media. Not only handling food ordering services, eMenu also handles almost all business processes in a restaurant such as menu management, managing information on orders received by waiters and chef, payment transactions, to sales reports. To handle payment transaction, eMenu using third party application payment gateway, called Duitku. eMenu is built using Single-Page Application concept that use AJAX calls which allows time efficiency in displaying the required data. By using the Single-Page Application, the browser does not reload the entire requested page but only part of data is displayed dynamically. The Single-Page Application uses Vue.js as Front-end stack, and Laravel to manage Back-end. eMenu application is responsive design, so that user can access via smartphone or desktop computer with properly.

2015 ◽  
Vol 7 (2) ◽  
pp. 185-194
Author(s):  
Endang Supriyadi

The development of internet users from year to year to date continues to increase, it can be known through a survey conducted Internet Worldstats. According to a survey conducted by Internet Worldstats, United Stated ranks 2nd of internet users worldwide after China. From the results of the survey shows that almost all activities / business activities undertaken by the world population and in particular the citizens of United State / America using internet facilities in all activities, especially transactions online. And one of the tools that can help to analyze online consumer behavior is by using web analytics. The purpose of this paper is to analyze how data analysis can be effectively used to understand current consumer behavior online. Expected with the use of web analytics, companies can predict future consumer behavior online and special messages on promotions that have been sent to each individual. Understanding the patterns and things on the web analytics is expected to help to develop business processes and the contents and design that need to be made especially "store steam powered". Store steam powered is one of Valve's web-based digital distributor. The main service that is done is steam game sales through an e-commerce web that aims to avoid piracy is very rampant at the moment.


2018 ◽  
Author(s):  
endang supriyadi

The development of internet users from year to year to date continues to increase, it can be known through a survey conducted Internet Worldstats. According to a survey conducted by Internet Worldstats, United Stated ranks 2nd of internet users worldwide after China. From the results of the survey shows that almost all activities / business activities undertaken by the world population and in particular the citizens of United State / America using internet facilities in all activities, especially transactions online. And one of the tools that can help to analyze online consumer behavior is by using web analytics. The purpose of this paper is to analyze how data analysis can be effectively used to understand current consumer behavior online. Expected with the use of web analytics, companies can predict future consumer behavior online and special messages on promotions that have been sent to each individual. Understanding the patterns and things on the web analytics is expected to help to develop business processes and the contents and design that need to be made especially "store steam powered". Store steam powered is one of Valve's web-based digital distributor. The main service that is done is steam game sales through an e-commerce web that aims to avoid piracy is very rampant at the moment.


Author(s):  
Yohanes Priadi Wibisono ◽  
Clara Hetty Primasari ◽  
Saverius Rischo Setyo Kurniawan

Almost all parts in an organization both commercial and non-commercial must have held an event. No exception in the education, especially at the University. The number of events carried out on campus is a phenomenon that makes students who are members of organizations learn to organize it so that it can run well. Organizing events is not easy and requires a lot of energy, time and costs starting from marketing, registering, ticketing, participant validation, and distribution of certificates. The aim of this research is to analyze the ineffectiveness and inefficiencies that occur in running an event. Analysis and observations were made based on the processes that took place in the holding of events held by students at Universitas Atma Jaya Yogyakarta. The process will be simplified by utilizing digital media so that the process of making an event becomes more effective and efficient. This research resulted in a BPR (Business Re-engineering Process) in which the marketing, registration, and ticketing processes that were originally done manually were, converted to digital with a web-based system. It is expected that from this BPR, researchers can develop an application to digitalize marketing, online event registration, ticketing, and event validation using QR Code.   Keywords— event; marketing; promotion; QR code; registration


ICSID Reports ◽  
2021 ◽  
Vol 19 ◽  
pp. 630-648

630Procedure — Addition of a party — Conditional application — UNCITRAL Rules, Article 22 — UNCITRAL Rules, Article 17 — Whether the UNCITRAL Rules or lex loci arbitri allowed for applications to be made conditional on a tribunal’s future decision — Whether the application was consistent with the State’s procedural rights — Whether the amendment to a claim under Article 22 of the UNCITRAL Rules allowed for the addition of a third party as claimantJurisdiction — Investment — Shares — Whether an investor’s shares and rights derived from those shares were protected investments under the BITJurisdiction — Investment — Assets of subsidiary — Whether profits, goodwill or know-how of a local subsidiary constituted investments of the investor protected by the BITJurisdiction — Consent — Cooling-off period — Premature claims — Whether the investor had communicated its own claims rather than those of its local subsidiary — Whether the investor’s failure to comply with a waiting period of six months under the BIT required a tribunal to deny jurisdiction or admissibility — Whether the negotiation of a local subsidiary’s dispute in good faith was relevant to jurisdiction over a foreign investor’s claimsInterpretation — Cooling-off period — VCLT, Article 31 — Object and purpose — Whether the object and purpose of the BIT required a tribunal not to adopt a strict or formalistic interpretation of the waiting period of six monthsRemedies — Declaratory award — Interpretation — Just compensation — Whether the tribunal had jurisdiction under the BIT to make a declaratory award on the interpretation and application of the term “just compensation”Jurisdiction — Dispute — Whether the tribunal had jurisdiction under the BIT to advise the parties of an imminent disputeExpropriation — Direct deprivation — Shares — Rights derived from shares — Whether the State directly deprived the investor of its rights as a shareholder in its local subsidiaryExpropriation — Indirect deprivation — Shares — Rights derived from shares — Whether the shares had lost all or almost all significant commercial value — Whether the measures were adopted in the public interest — Whether due process had been followed — Whether there were any undertakings by the StateExpropriation — Interpretation — “Just compensation” — Whether there was any difference between the terms of the BIT and general international law — Whether the meaning of just compensation could be determined in the abstract631Fair and equitable treatment — Whether the impending expropriation constituted a breach of the standard of fair and equitable treatment — Whether the claim concerned the investor’s rights derived from sharesFull protection and security — Whether the State failed to protect an investment from expropriation by local authorities — Whether the claim concerned the investor’s rights derived from sharesUmbrella clause — Whether there was any assurance directed at the investor that created any legal obligations — Whether the claim concerned the investor’s rights derived from sharesCosts — Arbitration costs — Variation by agreement — UNCITRAL Rules — Whether the terms of the BIT varied the default rules for the allocation of arbitration costs


2020 ◽  
Vol 4 (3) ◽  
pp. 683
Author(s):  
Muhamad Ridho Dwi Cahyo ◽  
Candiwan Candiwan

Yoga Farm is a Micro, Small, and Medium Enterprises (MSME) that focuses on catfish breeding that is still doing business processes manually. With this process, information received by related parties is very difficult to obtain quickly. Therefore, the product is still not widely known, and customers are still few because the system used in sales and promotions still uses a manual system. The research method used is qualitative. This study aims to create a sales information system recommended at Yoga Farm and design using Unified modeling language (UML) for the recommended business processes. Customers will get product information in real-time, products can be widely recognized, and the number of Yoga Farm customers can increase. Based on the results of this study, adoption of a web-based sales information system can certainly make it easier to get the latest information quickly, can expand the market and can also facilitate customers in the transaction. For future research, this research can be used as a reference for conducting similar studies at other MSMEs to increase sales


2021 ◽  
Vol 3 (1) ◽  
pp. 134-148
Author(s):  
Mardi Yudhi Putra ◽  
Nadya Safitri ◽  
Nofia Filda Fauziah ◽  
Ahmad Safei ◽  
Rayhan Wahyudin Ratu Lolly

Penguasaan terhadap Teknologi Informasi dan Komunikasi perlu diajarkan pada semua tingkatan agar suatu proses dan kegiatan dapat dilakukan dengan lebih cepat, mudah dan efisien. Para siswa kelas XII SMK Taruna Bangsa dituntut untuk memiliki kompetensi yang dapat dikuasai sebelum lulus sekolah. Salah satunya kompetensi adalah dapat membuat website atau aplikasi berbasis web. Disamping itu, kepala program jurusan RPL SMK Taruna Bangsa menyampaikan perlu adanya pendalaman dan pengetahuan lebih dalam pembuatan website selain yang dibekali di sekolah seperti mendesain website front end. Oleh karena itu perlu dilakukan pelatihan mendesain website menggunakan framework Bootstrap. Pelaksanaan Pengabdian kepada Masyarakat (PkM) ini dijalankan sesuai dengan wujud implementasi MoU yang telah dilakukan antara SMK Taruna Bangsa dengan Universitas Bina Insani. Pelaksanaan kegiatan pada masa pandemi Covid-19 dilakukan secara online melalui media konferensi www.zoom.us dan www.youtube.com. Kegiatan ini diikuti oleh 78 peserta dengan hasil akhir memberikan hasil yang positif, ditunjukkan pada umpan balik peserta terhadap materi yaitu pada nilai 4 (Baik) sebesar 32,1% dan nilai 5 (Sangat Baik) sebesar 60.7%. Berdasarkan paparan tersebut kegiatan PkM ini telah memberikan kemampuan dan penguasaan terhadap siswa dalam mendesain website dan memiliki bekal dalam mengimplementasikan pada bidang Teknologi informasi yang pada akhirnya mendorong smart education kota Bekasi. Kata kunci—bootstrap, pengabdian kepada masyarakat, website Mastery of Information and Communication Technology needs to be taught at all levels so that processes and activities can be carried out more quickly, easily and efficiently. Class XII students of SMK Taruna Bangsa are required to have competencies that can be mastered before graduating from school. One of the competencies is being able to create a website or web-based application. In addition, the head of the RPL department program at SMK Taruna Bangsa said that there is a need for more in-depth and knowledge in making websites other than those provided in schools such as designing front end websites. Therefore, training in designing websites using the Bootstrap framework is necessary. The implementation of Community Service (PkM) is carried out in accordance with the implementation of the MoU that has been carried out between SMK Taruna Bangsa and Bina Insani University. The implementation of activities during the Covid-19 pandemic was carried out online through the media conference www.zoom.us and www.youtube.com. This activity was attended by 78 participants with the final result giving positive results, shown in the participants' feedback on the material, namely a value of 4 (Good) of 32.1% and a value of 5 (Very Good) of 60.7%. Based on the explanation, this PkM activity has given students the ability and mastery in designing websites and has provisions in implementing it in the field of information technology which ultimately encourages smart education in the city of Bekasi. Keywords— bootstrap, community service, website,


Author(s):  
Warkim Warkim ◽  
Muhamad Hanif Muslim ◽  
Farham Harvianto ◽  
Setiawan Utama

The development of technology is very influential in the business processes of an organization to be able to carry out its duties and functions. As a government agency engaged in research, the Indonesian Institute of Sciences (LIPI) needs to make organizational changes to support its vision as a world-class research institution. One of the first steps taken is reorganizing and redistributing employees that have a high impact on the business process of service to employees because the supporting resources are placed corporately and no longer in the work units. To deal with this problem, we developed a Regional Service Information System using the Scrum methodology. The output is a web-based software that facilitates service requests needed by employees, ranging from service submission, processing by the Area Manager and Central Manager, to being received again by the service requester. The Regional Service Information System is expected to be a solution to the problems that arise as a result of the redistribution of employees at LIPI and to improve the effectiveness of employees as the research supporting resources.


10.2196/26031 ◽  
2021 ◽  
Vol 8 (9) ◽  
pp. e26031
Author(s):  
Candice Biernesser ◽  
Jamie Zelazny ◽  
David Brent ◽  
Todd Bear ◽  
Christina Mair ◽  
...  

Background Monitoring linguistic cues from adolescents’ digital media use (DMU; ie, digital content transmitted on the web, such as through text messages or social media) that could denote suicidal risk offers a unique opportunity to protect adolescents vulnerable to suicide, the second leading cause of death among youth. Adolescents communicate through digital media in high volumes and frequently express emotionality. In fact, web-based disclosures of suicidality are more common than in-person disclosures. The use of automated methods of digital media monitoring triggered by a natural language processing algorithm offers the potential to detect suicidal risk from subtle linguistic units (eg, negatively valanced words, phrases, or emoticons known to be associated with suicidality) present within adolescents’ digital media content and to use this information to respond to alerts of suicidal risk. Critical to the implementation of such an approach is the consideration of its acceptability in the clinical care of adolescents at high risk of suicide. Objective Through data collection among recently suicidal adolescents, parents, and clinicians, this study examines the current context of digital media monitoring for suicidal adolescents seeking clinical care to inform the need for automated monitoring and the factors that influence the acceptance of automated monitoring of suicidal adolescents’ DMU within clinical care. Methods A total of 15 recently suicidal adolescents (aged 13-17 years), 12 parents, and 10 clinicians participated in focus groups, qualitative interviews, and a group discussion, respectively. Data were recorded, transcribed, and analyzed using thematic analysis. Results Participants described important challenges to the current strategies for monitoring the DMU of suicidal youth. They felt that automated monitoring would have advantages over current monitoring approaches, namely, by protecting web-based environments and aiding adolescent disclosure and support seeking about web-based suicidal risk communication, which may otherwise go unnoticed. However, they identified barriers that could impede implementation within clinical care, namely, adolescents’ and parents’ concerns about unintended consequences of automated monitoring, that is, the potential for loss of privacy or false alerts, and clinicians’ concerns about liability to respond to alerts of suicidal risk. On the basis of the needs and preferences of adolescents, parents, and clinicians, a model for automated digital media monitoring is presented that aims to optimize acceptability within clinical care for suicidal youth. Conclusions Automated digital media monitoring offers a promising means to augment detection and response to suicidal risk within the clinical care of suicidal youth when strategies that address the preferences of adolescents, parents, and clinicians are in place.


10.28945/3557 ◽  
2016 ◽  
Vol 1 ◽  
pp. 001-016
Author(s):  
Grandon Gill ◽  
Joni Jones

Jeffrey Stiles pondered these seemingly straightforward questions. As IT Director of Jagged Peak, Inc., a developer of e-commerce solutions located in the Tampa Bay region of Florida, it would be his responsibility to oversee the implementation of security measures that went beyond the existing user name and password currently required for each user. Recent events suggested that a move towards increased security might be inevitable. In just the past year, highly publicized security failures at the U.S. Department of Defense, major healthcare providers and large companies, such as Sony and JP Morgan Chase, had made executives acutely aware of the adverse consequences of IT system vulnerabilities. In fact, a study of business risk managers conducted in 2014 found that 69% of all businesses had experienced some level of hacking in the previous year. The nature of Jagged Peak’s business made the security of its systems a particular concern. The company, which had grown rapidly over the years, reporting over $61 million in revenue in 2014, provided its customers with software that supported web-based ordering, fulfillment and logistics activities, built around a philosophy of “buy anywhere, fulfill anywhere, return anywhere”. To support these activities, the company’s Edge platform needed to handle a variety of payment types, including gift cards (a recent target of hackers), as well as sensitive personal identifying information (PII). Compounding the security challenge: each customer ran its own instance of the Edge platform, and managed its own users. When only a single customer was being considered, the addition of further layers of security to authenticate uses was an eminently solvable problem. A variety of alternative approaches existed, including the use of various biometrics, key fobs that provided codes the user could enter, personalized security questions, and many others. The problem was that where multiple customers were involved, it was much more difficult to form a consensus. One customer might object to biometrics because it users lacked the necessary hardware. Another might object to security keys as being too costly, easily stolen or lost. Personalized questions might be considered too failure-prone by some customers. Furthermore, it was not clear that adding additional layers of authentication would necessarily be the most cost-effective way to reduce vulnerability. Other approaches, such as user training might provide greater value. Even if Stiles decided to proceed with additional authentication, questions remained. Mandatory or a free/added-cost option? Developed in house or by a third party? Used for internal systems only, customer platforms only, or both? Implementation could not begin until these broad questions were answered.


Sign in / Sign up

Export Citation Format

Share Document