Penerapan Business Intelligence Untuk Evaluasi Dan Analisis Keluhan Pengguna Terhadap Peningkatan Layanan Jaringan Star.Net
Kata Kunci:
Business Intelligence, Keluhan Pengguna, Layanan Jaringan, Looker Studio, Kepuasan Pelanggan, Proses ETL, Analisis DeskriptifAbstrak
Kemajuan teknologi digital menuntut penyedia layanan internet untuk terus meningkatkan kualitas jaringan agar mampu memenuhi kebutuhan masyarakat modern. Star.net, sebagai penyedia layanan jaringan di Desa Tanjung, Dusun Idaman, Kecamatan Camplong, Kabupaten Sampang, menghadapi berbagai keluhan pengguna seperti koneksi lambat, gangguan jaringan, dan respons customer service yang kurang cepat. Penelitian ini bertujuan untuk menerapkan Business Intelligence (BI) dalam mengevaluasi dan menganalisis keluhan pengguna sebagai dasar peningkatan kualitas layanan. Metode yang digunakan meliputi tahapan Extract, Transform, Load (ETL) untuk pengolahan data hasil survei pengguna yang dikumpulkan melalui Google Form dan disimpan pada Google Sheets. Data tersebut kemudian divisualisasikan menggunakan Looker Studio agar informasi dapat disajikan secara interaktif dan mudah dipahami. Hasil analisis menunjukkan bahwa mayoritas keluhan pelanggan berkaitan dengan aspek teknis seperti kecepatan dan stabilitas koneksi, sedangkan dari sisi non-teknis berkaitan dengan respons customer service dan persepsi harga. Penerapan BI terbukti efektif dalam mengubah data mentah menjadi informasi strategis yang membantu manajemen Star.net melakukan pengambilan keputusan berbasis data untuk peningkatan layanan secara berkelanjutan.
Unduhan
Referensi
REFERENCES
[1] F. Zeng, M. Chen, C. Qian, Y. Wang, Y. Zhou, and W. Tang, “Multivariate time series anomaly detection with adversarial transformer architecture in the Internet of Things,” Futur. Gener. Comput. Syst., vol. 144, pp. 244–255, 2023, doi: 10.1016/j.future.2023.02.015.
[2] A. K. Sahu et al., “Decision-making framework for supplier selection using an integrated MCDM approach in a lean-agile-resilient-green environment: evidence from Indian automotive sector,” TQM J., vol. 35, no. 4, pp. 964–1006, 2023, doi: 10.1108/TQM-12-2021-0372.
[3] D. R. Sokołowski, J. Pani, T. I. Hansen, and A. K. Håberg, “Participation and engagement in online cognitive testing,” Sci. Rep., vol. 14, no. 1, 2024, doi: 10.1038/s41598-024-65617-w.
[4] S. Promput, S. Maithomklang, and C. Panya-isara, “Design and Analysis Performance of IoT-Based Water Quality Monitoring System using LoRa Technology,” TEM J., vol. 12, no. 1, pp. 29–35, 2023, doi: 10.18421/TEM121-04.
[5] …, N. H. Abdurrahman, and Y. Prasetyo, “Application of Hybrid Contracts Concept in Factoring,” Zo. Law Public …, 2024, [Online]. Available: https://ejournal.zona-edu.org/index.php/ZLPAI/article/view/75
[6] R. Sukmawati, F. Prasetyo, N. Ramadhani, I. Darmawan, and N. H. Hari, “Aplikasi Pencarian Tempat Tinggal Sementara Di Lingkungan Universitas Madura (Unira) Berbasis Android,” Insa. Comtech Inf. Sci. Comput. Technol. J., vol. 8, no. 1, 2023, doi: 10.53712/jic.v8i1.1889.
[7] M. Banafaa et al., “6G Mobile Communication Technology: Requirements, Targets, Applications, Challenges, Advantages, and Opportunities,” 2023. doi: 10.1016/j.aej.2022.08.017.
[8] C. Pérez-Granados, “A First Assessment of Birdnet Performance at Varying Distances: A Playback Experiment,” Ardeola, vol. 70, no. 2, pp. 257–269, 2023, doi: 10.13157/arla.70.2.2023.sc1.
[9] Z. Zhang, H. Chai, and Z. Guo, “Quantitative resilience assessment of the network-level metro rail service’s responses to the COVID-19 pandemic,” Sustain. Cities Soc., vol. 89, 2023, doi: 10.1016/j.scs.2022.104315.
[10] H. W. Dong, C. Zhang, G. L. Li, and J. H. Feng, “Survey on Cloud-native Databases,” 2024. doi: 10.13328/j.cnki.jos.006952.
[11] N. Futra and E. H. Setyorini, Keadilan Transformatif dalam Penyelesaian Perkara Anak-Jejak Pustaka. books.google.com, 2023. [Online]. Available: https://books.google.com/books?hl=en&lr=&id=UEbsEAAAQBAJ&oi=fnd&pg=PA1&dq=fauzan+prasetyo&ots=__Imy3iJUb&sig=geNCfKI5OGOj7-knwZ6LOoT3UEg
[12] F. Barros, B. Rodrigues, J. Vieira, and F. Portela, “Pervasive Real-Time Analytical Framework—A Case Study on Car Parking Monitoring,” Inf., vol. 14, no. 11, 2023, doi: 10.3390/info14110584.
[13] A. Bonifati, “The Quest for Schemas in Graph Databases,” 2023. [Online]. Available: https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85153346024&origin=inward
[14] A. L. Rodríguez, “Analysis of associative entrepreneurship as a territorial strategy in the municipality of Mesetas, Meta,” Manag., vol. 1, 2023, doi: 10.62486/agma202315.
[15] M. Deitke et al., “Objaverse: A Universe of Annotated 3D Objects,” 2023. doi: 10.1109/CVPR52729.2023.01263.
[16] V. V. Sivov and V. A. Bogatyrev, “Data Warehouse Failover Cluster for Analytical Queries in Banking,” Adv. Eng. Res., vol. 23, no. 1, pp. 76–84, 2023, doi: 10.23947/2687-1653-2023-23-1-76-84.
[17] G. T. Ankley et al., “Assessing the Ecological Risks of Per- and Polyfluoroalkyl Substances: Current State-of-the Science and a Proposed Path Forward,” 2021. doi: 10.1002/etc.4869.
[18] A. Kumar Dinkar, M. Alimul Haque, and A. Kumar Choudhary, “Enhancing IoT Data Analysis with Machine Learning: A Comprehensive Overview,” 2024. doi: 10.62486/latia20249.
[19] M. Francia, E. Gallinucci, M. Golfarelli, and S. Rizzi, “VOOL: A modular insight-based framework for vocalizing OLAP sessions,” Inf. Syst., vol. 129, 2025, doi: 10.1016/j.is.2024.102496.
[20] A. Bhattacharjee and R. P. Deb Nath, “SET LonDEM AN D: Towards an On Demand ETL Approach for Semantic Data Warehouses,” 2024. doi: 10.1109/ICEEICT62016.2024.10534564.
[21] F. Sufi, “A global cyber-threat intelligence system with artificial intelligence and convolutional neural network,” Decis. Anal. J., vol. 9, 2023, doi: 10.1016/j.dajour.2023.100364.
[22] A. Gokce, M. Tajvidi, and N. Hajli, “Management Respond to Negative Feedback: AI-Powered Insights for Effective Engagement,” IEEE Trans. Eng. Manag., vol. 71, pp. 13983–13996, 2024, doi: 10.1109/TEM.2024.3432457.
[23] F. A. Prasetyo, A. Wibowo, D. Riza, and P. Syamsuddin, “Spatial-Temporal Variation of Land Surface Temperature in South Tambun District, Bekasi Regency in 2011-2022,” Sci. Educ., vol. 2, pp. 625–633, 2023, [Online]. Available: http://earthexplorer.usgs.gov/
[24] R. Gholivand, P. Goudarzi, and D. Maleki, “An Improved Hybrid Data Warehousing Architecture for Cloud Service Providers,” 2025. doi: 10.1109/CSICC65765.2025.10967465.
[25] M. F. Hossain et al., “Design and simulation numerically with performance enhancement of extremely efficient Sb2Se3-Based solar cell with V2O5 as the hole transport layer, using SCAPS-1D simulation program,” Opt. Commun., vol. 559, 2024, doi: 10.1016/j.optcom.2024.130410.
[26] S. Tahir et al., “Performance Optimization of Inorganic Cs2TiBr6 Based Perovskite Solar Cell via Numerical Simulation,” Energy Technol., vol. 11, no. 8, 2023, doi: 10.1002/ente.202300359.
[27] R. Refianti, A. B. Mutiara, and A. S. Ariyanto, “Data Visualization of Climate Patterns in Indonesia Using Python and Looker Studio Dashboard: A Visual Data Mining Approach,” J. Appl. Data Sci., vol. 5, no. 4, pp. 2054–2066, 2024, doi: 10.47738/jads.v5i4.420.
[28] F. Pang et al., “A handheld isothermal fluorescence detector for duplex visualization of aquatic pathogens via enhanced one-pot LAMP-PfAgo assay,” Biosens. Bioelectron., vol. 254, 2024, doi: 10.1016/j.bios.2024.116187.
[29] M. H. M. Rusli, M. K. Hassan, S. Muhamud-Kayat, and E. Michael, “Development of IoT Kaizen System for Smart Lean Raw Material Inventory Management: A case study at an SME factory in Malaysia,” J. Kejuruter., vol. 36, no. 4, pp. 1585–1598, 2024, doi: 10.17576/jkukm-2024-36(4)-24.
[30] J. M. Deza Castillo, O. R. Florian Castillo, G. M. A. Meléndez, and L. del Pilar Valqui Jimenez, “Design of Datamart for the Cargo Service of an SME in the Transport Sector,” 2023. doi: 10.18687/laccei2023.1.1.386.
[31] M. Younus, U. Pribadi, A. Nurmandi, and I. Z. Rahmawati, “Comparative analysis of E-Government Development Index: a case study of South Asian countries,” Transform. Gov. People, Process Policy, vol. 17, no. 4, pp. 552–574, 2023, doi: 10.1108/TG-05-2023-0068.
[32] P. Y. Tama and I. Suharjo, “Implementasi Perancangan Desain Transitif VPC Menggunakan Mikrotik Sebagai Routing Instance Pada Prototype Arsitektur Hub-and-Spoke GCP,” JEKIN-Jurnal Tek. Inform., 2024, [Online]. Available: https://rumahjurnal.or.id/index.php/JEKIN/article/view/821
[33] L. Siciliani, V. Taccardi, P. Basile, M. Di Ciano, and P. Lops, “AI-based decision support system for public procurement,” Inf. Syst., vol. 119, 2023, doi: 10.1016/j.is.2023.102284.
[34] S. Burk and G. Miner, It’s All Analytics, Part III: The Applications of AI, Analytics, and Data Science. 2023. doi: 10.4324/9780429343971.
[35] A. F. Stevens and P. Stetson, “Theory of trust and acceptance of artificial intelligence technology (TrAAIT): An instrument to assess clinician trust and acceptance of artificial intelligence,” J. Biomed. Inform., vol. 148, 2023, doi: 10.1016/j.jbi.2023.104550.
[36] X. Ma, X. Dai, Y. Bai, Y. Wang, and Y. Fu, “Rewrite the Stars,” 2024. doi: 10.1109/CVPR52733.2024.00544.
[37] L. Ma and B. Sun, “Machine learning and AI in marketing – Connecting computing power to human insights,” Int. J. Res. Mark., vol. 37, no. 3, pp. 481–504, 2020, doi: 10.1016/j.ijresmar.2020.04.005.
[38] …, D. Wahyuni, D. R. Fauzan, E. Hutabarat, E. T. Prasetyo, and ..., “Artikel Laporan KKN 6A1 Kelompok 5 Desa Srimukti RT 01/RW 02,” 2023.
[39] F. T. Karim, E. M. Y. Sihite, F. Y. Prasetyo, and ..., “Peran Pengauditan Eksternal dalam Meningkatkan Kepercayaan Publik Terhadap Laporan Keuangan,” … Natl. Semin. …, 2024, [Online]. Available: http://conference.um.ac.id/index.php/nsafe/article/view/10352
[40] F. Prasetyo et al., “Pertahanan Tingkat Server Terhadap Serangan Dns Spoofing Di Jaringan Modern,” Just IT J. Sist. …, vol. 14, no. 2, pp. 80–149, 2024, [Online]. Available: https://jurnal.umj.ac.id/index.php/just-it/index
[41] G. Raj, D. Roy, R. de Koster, and V. Bansal, “Stochastic modeling of integrated order fulfillment processes with delivery time promise: Order picking, batching, and last-mile delivery,” Eur. J. Oper. Res., vol. 316, no. 3, pp. 1114–1128, 2024, doi: 10.1016/j.ejor.2024.03.003.
[42] A. M. Iddrisu, S. Mensah, F. Boafo, G. R. Yeluripati, and P. Kudjo, “A sentiment analysis framework to classify instances of sarcastic sentiments within the aviation sector,” Int. J. Inf. Manag. Data Insights, vol. 3, no. 2, 2023, doi: 10.1016/j.jjimei.2023.100180.
[43] R. Dicarlo and A. M. Nino, “Use dashboards to support decision making in operations management,” 2023. doi: 10.1109/C358072.2023.10436318.
[44] G. A. Mendoza Ramirez, M. Y. Riscanevo Murillo, P. J. Chaparro Valderrama, M. Liceth Patiño, and Y. J. Rodríguez Mora, “Analysis of the strategic plan for the Acuña Ventures SAS company in Yopal city, Colombia,” Manag., vol. 2, 2024, doi: 10.62486/agma202429.
[45] A. Zulfikri, F. P. E. Putra, M. A. Huda, H. Hasbullah, M. Mahendra, and M. Surur, “Analisis Keamanan Jaringan Dari Serangan Malware Menggunakan Filtering Firewall Dengan Port Blocking,” 2023. doi: 10.47709/digitech.v3i2.3379.
[46] J. Santosh Kumar, K. Saravanan, R. Sharmila, S. Sivankalai, and S. Prabakar, “Implementation of Modeling and Distribution of a Big Data Warehouse,” 2023. doi: 10.1109/ICOSEC58147.2023.10275865.
[47] R. Rocca, N. Tamagnone, S. Fekih, X. Contla, and N. Rekabsaz, “Natural language processing for humanitarian action: Opportunities, challenges, and the path toward humanitarian NLP,” 2023. doi: 10.3389/fdata.2023.1082787.
[48] …, R. Ayyasy, W. Halim, A. Fauzan, H. Prasetyo, and ..., “PERAN LEMBAGA LEGISLATIF DALAM KONFIGURASI POLITIK HUKUM: ANTARA ASPIRASI PUBLIK DAN KEPENTINGAN POLITIK UNTUK MENCAPAI …,” J. Huk. …, 2024, [Online]. Available: https://ejournal.upnvj.ac.id/statuta/article/view/9930
[49] E. Krasniqi and D. Hyseni, “World Happiness Dataset: An Exploration of Advanced Data Analysis and Visualization Tools and Techniques,” 2023. doi: 10.1109/MECO58584.2023.10154957.
[50] A. A. Paz, A. C. de M. Paula, A. M. de Lima, G. L. Castro, M. C. B. da Silva, and L. T. Silva, “Health dashboard for information management in cervical cancer screening,” Rev. Lat. Am. Enfermagem, vol. 33, 2025, doi: 10.1590/1518-8345.7084.4446.
[51] F. P. E. Putra, U. Ubaidi, A. Zulfikri, G. Arifin, and R. M. Ilhamsyah, “Analysis of Phishing Attack Trends, Impacts and Prevention Methods: Literature Study,” 2024, pdfs.semanticscholar.org. doi: 10.47709/brilliance.v4i1.4357.
Unduhan
Diterbitkan
Terbitan
Bagian
Lisensi
Hak Cipta (c) 2025 Rica Oktavia, Mustafida (Penulis)

Artikel ini berlisensi Creative Commons Attribution 4.0 International License.








