Sie sind auf Seite 1von 6

Short Paper Proc. of Int. Conf.

on Advances in Computing, Control, and Telecommunication Technologies 2011

Framework of Electronic Voucher Infrastructure: Indonesia Case


Angga1 & Ford Lumban Gaol2
2

Graduate Program in Information System Faculty of Computer Science, Bina Nusantara Email: fordlg@gmail.com 3. How appropriate IT solutions to shorten the time of the transaction reload? This paper was divided into three parts. First with the background of the paper and it will be followed by technology integration into business process. The next section will discuss about the methodology of the research and it will be followed by the infrastructure of electronic voucher. II. TEHNOLOGY INTEGRATION INTO BUSINESS PROCESS Alignment between business strategy with Information Technology (IT) is a complex issue and is multidimensional. Often the decision to do the development in the field of Information Technology based solely on the ability of a sophisticated software without looking further if the devices are in compliance with the needs of the organization in the long run. Companies that successfully perform the integration between technology with business strategy showed a significant increase in revenue. Business and IT alignment strategy used by companies to improve efficiency, reduce costs, create barriers for new entrants, improving relationships with customers and suppliers, and creating new products and business solutions. Failure to perform this alignment can result in increased costs and lost opportunities. (Judge, 2008). Strategy is very important for companies to be able to win market competition. Strategy is the direction and scope of the company in the long run that will benefit the company through the use of existing resources in a supportive environment to meet market needs and meet the expectations of stakeholders. Strategy undertaken by a company will differentiate it from other companies. According to Michael E. Porter (1996), running operations in the company effectively and efficiently is no longer sufficient to be called as a corporate strategy. The essence of strategy is choosing to do different activities or performing similar activities in different ways and provide a better strategic position than its competitors. The company can provide better performance than its competitors only if the company can determine the differences they have and maintain it. Such differences should be able to deliver better value to consumers or to create value that is almost the same but with a cheaper cost, or even both. Because of this difference, then each company will certainly require the use of IT differently according to the strategy adopted. There are two possibilities that can be done, the first business process needs to be modified to fit the IT being used, or both make adjustments or customization of IT. 100

Abstract Alignment between business strategy with Information Technology (IT) is a complex issue and is multidimensional. Often the decision to do the development in the field of Information Technology based solely on the ability of a sophisticated software without looking further if the devices are in compliance with the needs of the organization in the long run.. Development of Information Technology (IT) is so rapid is very influential on the management of the business / company. Business refill these e-vouchers are in need of speed and accuracy in service and in the process of reload. Based on the description then formulated the problems faced by distributors e-vouchers service providers. Index Termse-vouchers, IT Integration, SMS Center, transaction reload, SMS Gateway

I. INTRODUCTION Communications and mobile is not a luxury anymore for now. Even when it has a lot of people who have more than one phone with different carriers for different communications. Where prepaid cards are the most common option used to restrict usage. After e-voucher was introduced in Indonesia, the pattern reload Indonesia mobile society tends to change to the way electric. It was elected by the people of Indonesia for practicality without the need to rub in the previous manner of physical vouchers. The increasing number of mobile phone users in Indonesia requires meeting the needs of distributors e-vouchers service providers. Currently in Indonesia has many distributors e-vouchers service providers. But sometimes the problems faced by the distributors e-vouchers service providers is almost equal in general. The problems faced are many offers to become a member (agent / sub-distributors) but not matched with excellent service, both in terms of system performance and in terms of quality of service provided to members. So that eventually the distributors lose the agents / sub-distributors and agents / sub-distributors move to other distributors. Development of Information Technology (IT) is so rapid is very influential on the management of the business / company. Business refill these e-vouchers are in need of speed and accuracy in service and in the process of reload. Based on the description then formulated the problems faced by distributors e-vouchers service providers are: 1. How is the level of satisfaction of agent / subdistributors to system performance and quality of services provided for this company? 2. What were the things that cause satisfaction agent / sub-distributors to be low? 2011 ACEEE DOI: 02.ACT.2011.03.104

Short Paper Proc. of Int. Conf. on Advances in Computing, Control, and Telecommunication Technologies 2011 According to Ali (2010, p109), to excel in a competitive business, managers need to understand the environmental situation of the organization / company that can interfere with the performance of the enterprise and manage information resources effectively and efficiently. To excel in business, companies must be able to create value (creating value) of goods or services offered so that customers will be satisfied and loyal. According to Kottler (2004), one of the ten deadly mistakes are companies not using the technology to the fullest. One of the mistakes that must be addressed is maximizing the use of technology. One technology that should be maximized is Information Technology. Information Technology can then make an impact on the completion of other mistakes to be successful marketing. E-Business includes all the things that should be done using Information and Communication Technology (ICT) to conduct business across the organization and from organization to the consumer. (Huff, 2000). Definition EBusiness by IBM is an approach that is safe, flexible, and integrated to deliver value by combining different business systems and processes that run core business operations with the use of Internet technology. (Stoole, 2000). According to Indrajit (2000), there are four stages of evolution that can be used as a handle or a guide for perusahanan who wish to build E-Business: the problem by using a Likert Scale. In this study discussed how to use TOGAF ADM in the design of enterprise architecture, so we get a clear picture of how to design enterprise architecture, to get a good enterprise architecture and can be used by organizations to achieve its strategic objectives. The initial steps to consider when implementing TOGAF ADM is to define the preparations that is by identifying the context of architecture to be developed, the second is to define the strategy of the architecture and assign parts of architecture that will be designed, ie starting from the business architecture, information system architecture , technology architecture, and to determine the ability of architecture to be designed and developed (Harrison and Varveris, 2006). Stages of the TOGAF ADM can be briefly described as follows: a. Architecture Vision Create uniformity of views on the importance of enterprise architecture to achieve organizational goals formulated in the form of strategies and determine the scope of the architecture will be developed. At this stage contains the questions posed to obtain the ideal architecture. b. Business Architecture Business architecture defines the initial conditions, determine the business model or business activities that are desired by the business scenario. At this stage the general tools and methods for modeling such as BPMN, IDEF and UML can be used to build the necessary models. c. Information System Architecture At this stage more emphasis on how the activity of information systems architecture is developed. Defining the architecture of information systems in this stage include data architecture and application architecture to be used by the organization. Architectural data are more focused on how the data used for the needs of business functions, processes and services. The technique can be used ie: ERDiagram, Class Diagram, and Object Diagrams. In the application architecture is more pressing at how the needs of planned applications using Application Portfolio Catalog, and focuses on the model application to be designed. The technique can be used include: Application Communication Diagram, Application and User Location Diagram and others.

Figure 1 Four Phase Evolution of E-Business (Indrajit, 2000)

1. Phase Inform Characterized by small units within the company began trying to build a small software-based Internet. 2. Automate Stage Integrating small units in the enterprise software. 3. Integrate Phase Integrating E-Business applications company with entityother entities outside the company. 4. Phase Reinvent The existence of a fundamental change of company management, especially relating to how to view existing business. II. RESEARCH METHODOLOGY The research method used is using interviews to find out the problems occurred and the solutions that have been used, then do a survey and distributed questionnaires to the respondents (members of the company) to measure how much performance and quality of enterprise services today. Research model used is read with reference to relevant theoretical problem and measure the success rate of solving 2011 ACEEE DOI: 02.ACT.2011.03.104 101

Figure 2 Architecture development method

d. Technology Architecture Build the desired technology architecture, starting from the determination of candidate technologies necessary to use Technology Portfolio Catalog which include software and

Short Paper Proc. of Int. Conf. on Advances in Computing, Control, and Telecommunication Technologies 2011 hardware. In this stage also to consider alternatives that are needed in the selection of technology. The techniques used include Environment and Location Diagram, Network Computing Diagram, and others. e. Opportunities and Solutions At this stage more pressing on the benefits of enterprise architecture that includes business architecture, data architecture, application architecture and technology architecture, so that became the basis for stakeholders to select and define the architecture will be implemented. To model this stage in the design could use a technique chart and Benefit Project Context Diagram. f. Migration Planning At this stage of assessment will be done in determining the migration plan from an information system. Usually at this stage to pemodelannya menggunakaan assessment and decision matrix to the needs of primary and support in the organization of information systems impelentation g. Implementation Governance Develop recommendations for the implementation of governance implementation has been done, governance conducted include organizational governance, governance of information technology, and governance architecture. Pemetaaan of these stages can also be integrated with the framework used for COBITS of governance such as IT Governance Institute (ITGI) (Open Group, 2009). h. Arcitecture Change Management Establish management plans of the new system architecture in a way to supervise the developments in technology and changes in organizational environment, both internally and externally as well as determine whether it will be the next enterprise architecture development cycle. IV. NETWORK TOPOLOGY After conducting a brief interview with the owner of the company and perform direct observation of the network objects to be studied, the researchers get the following information: A. Network Specifications Specifications that existed at the time this research was conducted were: 1. Local computer network (LAN) available using class C IP Address and has been using ADSL Internet connection from Telkom Speedy internet service provider. 1. Server : 192.168.1.200 2. PC Client #1 : 192.168.1.201 3. PC Client #2 : 192.168.1.202 4. Modem ADSL : 192.168.1.1 5. Router : 192.168.1.10 2 There is 1 (one) unit Server and 2 (two) unit of PC Client (for the benefit of CS / Customer Service) 1. Server, using Windows Server 2003 Operating System, Database using MySQL, and using software applications VRE (Voucher Refill Engine) version of the server in its activities as an e-vouchers server. 2. PC Client # 1 & # 2, using the Windows XP Operating System and software applications VRE (Voucher 2011 ACEEE DOI: 02.ACT.2011.03. 104 102 Refill Engine) version of the client in order to support the activities of daily customer service. 3. There are 5 (five) units of Mobile Phone GSM GSM (as a modem chip) and connect to the server using a data cable, each of which is: 1. 3 (three) units of Mobile Phone GSM Siemens C55, functioning as an SMS CENTRE 2. 1 (one) unit of Mobile Phone GSM Siemens C55, functioning as an SMS REPLY 3. 1 (one) unit of Mobile Phone GSM Siemens C55, serves as Product Stock (Chip H2H to the supplier via SMS) 4. There is 1 (one) unit ADSL modem to connect to the internet. 5. There is 1 (one) unit Router 8 ports to connect file sharing, printer sharing, and sharing intenet. 6. There is a wiring / cabling arrangement has not been good. B. Network Topology From the observations, topology on the network currently uses a star topology, where all the computers in the network is connected to one point (router). Here is a picture of the observed network topology:

Figure 3 Network Topology (Research 2011)

C. Application of VRE (Voucher Refill Engine) VRE (Voucher Refill Engine) is a software for e-vouchers server. Software VRE can serve the transaction via SMS, Yahoo Messenger and H2H (Host-to-Host). VRE supports GSM and CDMA operators through mkios, SIMPATI Autorefill, DOMPET Pulsa, Indosat SEV, MTRONIK, and Host-to-Host to authorized dealers and distributors. Software VRE transaction support Host-to-Host to Eratel, Datacell, Pulsa24, Cybertel, SM2, Dian Puri Kencana Prima, Telesindo, Cellpay Indonesia, SiPUTRI, Si-Ipul, and others.

Figure 4. Display Module VRE Administration (Research 2011)

VRE are easy operation. However users are advised to have business through 1 year or at least have had the number of 1500 transactions / day.

Short Paper Proc. of Int. Conf. on Advances in Computing, Control, and Telecommunication Technologies 2011 Server membership with per-day

Figure 5. Display Module Reseller Sales VRE (Research 2011)

Features of VRE (Voucher Refill Engine): VRE support transactions with the method: - Method menu / sim tool kit (DOMPET Pulsa, SEV, Axis, Three, etc.) - Transactions with SMS media - Connection to the internet media (Host-to-Host and Yahoo Messenger) Computers can use a client system, and the number of client computers is not limited Restrict user access (only access to certain menus and can only read and can not enter data) Report accurate transaction succeed or fail based on reports from providers Displays (SN) Serial Number voucher electrically Consolidated sales of stock (number of sales per product) Convert data to Microsoft Excel format Allows the transaction data stored on different computers automatically (data backup on another computer) Format the transaction counter customizable The SMS can be given additional information REPLY V. DISCUSSION OF RESEARCH Based on the results of questionnaires, interviews and direct observation conducted in the field, it was found that the problem (in terms of system performance) who complained of by the respondents (member) sourced from the existing network at this time. Analysis are as follows: Respondents (member) complained stock availability of products are often empty, particularly small-stock products with nominal; This is because the company does not have its own inventory of stock products, but rather rely solely on stock H2H (host-to-host) all operators of the supplier. Report back from every transaction made by members received very slow; This is because there is only 1 (one) unit of the modem that serves as an SMS REPLY, this resulted in long queues for sending SMS. Respondents (member) also complained to the transaction reload is felt slow, especially at night; This is because: - Companies rely solely on stock H2H (host-to-host) all operators of the supplier. - H2H connection (host to host) all operators to suppliers are still using SMS, it also resulted in queues in the process of purchasing the product to the supplier. 4. Respondents (member) wish to be informed if there are price changes. Respondents feel aggrieved if not given information about changes in prices, especially for an Owner 2011 ACEEE DOI: 02.ACT.2011.03.104 103

Figure 6. Grand Design Network Topology Suggested (Research 2011)

transactions are not least; This is because companies do not have a special modem to broadcast SMS. Actually the company could rely on SMS modem REPLY to do broadcasting, but the company did not want to take the risk with increasing number of queue in the modem SMS REPLY. 4.3 Grand Design Network Topology Responded to the problems that occurred in the company, then the following is the proposed grand design of the network topology that can be applied in TERRACE CELL company as distributors e-vouchers service providers. Changes contained in the network topology is compared to that of the previous network topology is: 1. The addition of several units of Mobile Phone GSM Siemens C55 and Mobile Phone CDMA Nokia 6235 that serve as a modem chips to stock their own products from several GSM operators and CDMA. So that companies do not rely solely on stock H2H (host-to-host) all operators of the supplier only. 2. For SMS and SMS CENTRE REPLY replaced with a modem chip from Wavecom products. The reason is because the replacement product is designed as a Wavecom modem chip and does not use batteries like those found on the Mobile Phone GSM Siemens C55, so the connection will be more stable and do not have to worry about battery life. To SMS CENTRE still use 3 (three) units and modem chips for SMS REPLY also use 3 (three) units of the modem chip. The reason the addition of SMS REPLY into 3 (three) units are to avoid long queues in the delivery of SMS. 3. Inside the network is there ADSL internet connection from Telkom Speedy internet service provider, so as to transactions H2H (host-to-host) to the supplier as well as to other distributors are no longer media use SMS, but using modules YM (Yahoo Messenger) VRE. Transactions using the module YM (Yahoo Messenger) VRE is very time saving, so the transaction H2H (host-to-host) to the supplier as well as to other distributors can be done very quickly. Here is a view of the module YM (Yahoo Messenger) VRE:

Figure 7. Display Module YM VRE (Research 2011)

Short Paper Proc. of Int. Conf. on Advances in Computing, Control, and Telecommunication Technologies 2011 4. In the grand design of the network topology is also found the addition of 2 (two) modem chips from Wavecom products on both PC Client. Each of these modems work the same, namely as a modem chips that are used specifically to broadcast SMS. Broadcast SMS is very much required to inform the member that will change product pricing and system maintenance. 5. To improve the performance of the server as well as the additional number of modem chips, it would require the addition of 1 (one) unit of a special server that serves as a repository database and also functions to serve the modem chip stock products. The addition of this server is also given that the software pulse VRE (Voucher Refill Engine) can only serve a 16 (sixteen) modem chip unit in 1 (one) server. 6. Because in the grand design of the network topology server transaction activity must have an internet connection, so internet connection is very important. To anticipate the interference with the ISP (Internet Service Provider) Telkom Speedy, then put 1 (one) unit with a HSDPA modem that uses a USB connection using Indosat 3.5G Broadband. CONCLUSIONS Having done the research process through a questionnaire, interviews, and direct observation in the field, then get some conclusions as follows: 1. The level of satisfaction agent / sub-distributors to system performance and quality of services provided during the company are: a. Stock products less attention, many members complained of stock products are often empty / not available. b. The time needed to get a report back from every transaction made by the member feels slow. c. Transactions reload to reach the mobile customers perceived slow by the member. d. Member complained can not complain at night (after hours). e. Members often do not get info if there are price changes. It was felt very detrimental to the member. 2. The things that cause satisfaction agent / sub-distributors to be low are: a. The Company does not have its own supply of stock products, but rather rely solely on stock H2H (host-tohost) all operators of the supplier. b. There is only 1 (one) unit of the modem that serves as an SMS REPLY, this resulted in long queues for sending SMS. c. H2H Connection (host to host) all operators to suppliers are still using SMS, it also resulted in queues in the process of purchasing the product to the supplier. d. The Company does not have service 24 Hour Customer Service. e. The Company does not have a special modem to broadcast SMS. 3. The right IT solutions to shorten the time of the transaction reload is: a. Companies need to add a few units as an SMS REPLY modem chip that aims to prevent long queues 2011 ACEEE DOI: 02.ACT.2011.03.104 104 in sending SMS. b. For transactions H2H (host-to-host) is recommended to use the internet connection through the module YM (Yahoo Messenger). Transactions using the module YM (Yahoo Messenger) is very time saving, so the transaction H2H (host-to-host) to the supplier as well as to other distributors can be done very quickly. c. Addition of 2 (two) modem chips on both the PC Client is specifically used to do a broadcast SMS. Broadcast SMS is very much required to inform the member that will change product pricing and system maintenance. d. The addition of 1 (one) unit of the server that serves specifically as a storage database, and also functions to serve the modem chip stock products. e. Because in the grand design of the network topology server transaction activity must have an internet connection, so internet connection is very important. To anticipate the interference with the ISP (Internet Service Provider) Telkom Speedy, then put 1 (one) unit with a HSDPA modem that uses a USB connection using the card Indosat 3.5G Broadband. ACKNOWLEDGMENT The authors wish to thank Graduate Program in Information System & University Research Directorate for technical and financial support. REFERENCES
[1] Ali, Hapzi. 2010, Sistem Informasi Bisnis Dalam Prospektif Keunggulan Kompetitif, Baduose Media, Padang [2] Barnes, James G. 2003, Secrets of Customer Relationship Management (Rahasia Manajemen Hubungan Pelanggan), ANDI, Yogyakarta [3] Engel, James F. Roger, D. Blacwell. and Minsard, Paul W. 1994, Perilaku Konsumen, Bainarupa Aksara, Jakarta [4] Hakim, M. Bisri. 2008. Penyelarasan Teknologi Informasi Dengan Strategi Bisnis, Penerbit ANDI, Yogyakarta [5] Harrison, K., Varveris, L. (2006). TOGAF: Establishing Itself As The Devenitive [6] Method for Building Enterprise Architecture in The Commercial World [7] Huff, Sid L. 2000, Cases in Electronic Commerce, McGrawHill [8] Indrajit, Richardus Eko. 2000, Konsep dan Aplikasi E-Business, Penerbit ANDI, Yogyakarta [9] Kourdi, H, S. (2007). Framework for Enterprise Architecture, IEEE. Septermber [10] Kotler, Philip. 1985, Prinsip-Prinsip Dasar Pemasaran, PT Midas Serum Grafindo, Jakarta [11] Kotler, Philip. 2002, Manajemen Pemasaran, PT Prenhalindo, Jakarta [12] Kotler, Philip. 2004, The Ten Deadly Sins of Marketing. John Wiley and Sons, Inc. [13] Kristanto, A. 2003. Jaringan Komputer, Graha Ilmu, Yogyakarta [14] Long, L., Long, N., 2001, Computers: Information Technology in Perspective, Prentice Hall [15] Lupiyoadi, Rambat. 2001. Manajemen Pemasaran Jasa: Teori dan Praktik, Salemba Empat, Jakarta [16] McLeod, R., Schell, G.P. 2001, Management Information

Short Paper Proc. of Int. Conf. on Advances in Computing, Control, and Telecommunication Technologies 2011
systems 8th ed., Prentice Hall [17] Nasution, M. Nur. 2004, Manajemen Jasa Terpadu, Ghalia Indonesia, Bogor [18] Osvalds, G. (2001). Definition od Enterprise Architecture Centric Models for The Systems Engineers, TASC Inc. [19] Sugiarto, Endar. 2002, Psikologi Pelayanan Dalam Industri Jasa, Gramedia Pustaka Utama, Jakarta [20] Sugiyono. 2005. Metode Penelitian Bisnis. Cetakan Ke8. CV Alfabeta, Bandung [21] Sugiyono. 2009. Metode Penelitian Administrasi. Cetakan Ke-17. CV Alfabeta, Bandung [22] Surendro, K. (2007). Pemanfaatan Enterprise Architecture Planning untuk Perencanaan Strategis Sistem Informasi, Jurnal Informtika, Fak. Teknologi Industri, Universitas Kristen Petra. Vol. 8, No.1: pp1-9 [23] Tugiono, Burat. 2009. Membangun Sendiri Bisnis Pulsa All Operator, Elexmedia Komputindo, Jakarta [24] Umar, Husein. 2003, Metode Riset Perilaku Konsumen Jasa, Gholia Indonesia, Jakarta [25] Viaene, S., Dedene, G. 2006, Managing for Better Business IT Alignment, IEEE [26] Wahidin. 2007, Jaringan Komputer Untuk Orang Awam, MAXIKOM, Palembang [27] Wahana Komputer, Tim Penelitian dan Pengembangan. 2003, Konsep Jaringan Komputer dan Pengembangannya, Salemba infotek, Jakarta [28] Ward, J., Peppard, J., 2002, Strategic Pallning for Information Systems, John Wiley & Sons Limited [29] Whitten, J., Bentley, L. 2005, Systems Analysis and Design Methods 7th ed., McGraw-Hill/Irwin [30] Yunis, R., (2006). Pemilihan Metodologi Pengembangan Enterprise Architecture untuk Indonesia. Thesis Magister Teknik Informatika, ITB, Bandung. [31] Yuwono, Sony., Sukarno, Edy., Ichsan, Muhammad. 2002, Petunjuk Praktis Penyusunan Balanced Scorecard: Menuju Organisasi yang berfokus pada Strategi, PT. Gramedia Pustaka Utama, Jakarta [32] Stoole, Christoper. 2000. E-business Just What is It?, [Online] Available: http://ebusiness.about.com/industry [2010, September 20] [33] Porter, M. E. 1996. What is a strategy? Harvard Business Review (November-December): 61-78, [Online] Available: http:// maaw.info/ArticleSummaries/ArtSumPorter96.htm [2010, September 29] [34] Open Group. (2009). The Open Group Architecture Framework:Architecture Development Method, [Online] Available: http://www.opengroup.org/architecture/togaf9-doc/arch/ [2010, Desember 18]

2011 ACEEE DOI: 02.ACT.2011.03.104

105

Das könnte Ihnen auch gefallen