Next Article in Journal
Car-Free Day on a University Campus: Determinants of Participation and Potential Impacts on Sustainable Travel Behavior
Next Article in Special Issue
Coral Reef Bleaching under Climate Change: Prediction Modeling and Machine Learning
Previous Article in Journal
A Methodology to Qualitatively Select Upcycled Building Materials from Urban and Industrial Waste
Previous Article in Special Issue
Modeling Industrial Energy Demand in Relation to Subsector Manufacturing Output and Climate Change: Artificial Neural Network Insights
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Revisiting Cluster Vulnerabilities towards Information and Communication Technologies in the Eastern Island of Indonesia Using Fuzzy C Means

1
Faculty of Economics and Business, Universitas Indonesia, Depok 16424, Indonesia
2
Executive Secretariat, National Research and Innovation Agency (BRIN), BJ Habibie Building, DKI Jakarta 10340, Indonesia
3
Department of Mathematics, Universitas Sumatera Utara, Medan 20155, Indonesia
4
Department of Information Management, College of Informatics, Chaoyang University of Technology, Taichung City 41349, Taiwan
5
Bioinformatics and Data Science Research Center, Bina Nusantara University, DKI Jakarta 11480, Indonesia
6
Computer Science Department, Bina Nusantara University, DKI Jakarta 11480, Indonesia
*
Authors to whom correspondence should be addressed.
Sustainability 2022, 14(6), 3428; https://doi.org/10.3390/su14063428
Submission received: 24 January 2022 / Revised: 5 March 2022 / Accepted: 9 March 2022 / Published: 15 March 2022

Abstract

:
Design/methodology/approach: In the present digital era, technology infrastructure plays an important role in the development of digital literacy in various sectors that can provide various important information on a large scale. Purpose: The use of information and communication technology (ICT) in Indonesia in the last five years has shown a massive development of ICT indicators. The population using the internet also experienced an increase during the period 2016–2020, as indicated by the increasing percentage of the population accessing the internet in 2016 from around 25.37 percent to 53.73 percent in 2020. This study led to a review of the level of ICT vulnerability in eastern Indonesia through a machine learning-based cluster analysis approach. Implications: Data were collected in this study from Badan Pusat Statistik (BPS) through SUSENAS to obtain an overview of the socioeconomic level and SAKERNAS to capture the employment side. This study uses 15 variables based on aspects of business vulnerability covering 174 districts/cities. Practical implications: Cluster analysis using Fuzzy C Means (FCM) was used to obtain a profile of ICT level vulnerability in eastern Indonesia by selecting the best model. The best model is obtained by selecting the validation value such as Silhouette Index, Partition Entropy, Partition Coefficient, and Modified Partition Coefficient. Social implication: For some areas with a very high level of vulnerability, special attention is needed for the central or local government to support the improvement of information technology through careful planning. Socio-economic and occupational aspects have been reflected in this very vulnerable cluster, and the impact of the increase in ICT will provide a positive value for community development. Originality/value: From the modelling results, the best cluster model is two clusters, which are categorized as high vulnerability and low vulnerability. For each cluster member who has a similarity or proximity to each other, there will be one cluster member.

1. Introduction

The integration of Information and Communication Technologies (ICT) plays an important role to increase digital literacy, especially in a developing country. Indonesia is one of the developing countries with the largest area in ASEAN, which is divided into several islands with three main regions, namely west, middle, and east. Studies on ICT infrastructure are becoming regulatory basic information on profiling regions with vulnerable groups such as the eastern island of Indonesia. One of the interesting aspects of the advancement of ICT is its impact on the government ICT activity, especially in the dissemination of publicly accessible information about governance. The government’s efforts are mandated in UU No. 14 of 2008 concerning Openness of Public Information.
In 2011, the government regulated ICT financing for the development and widespread use of ICT, namely through the Minister of Communication and Information Technology Regulation No. 21/PER/M.KOMINFO/10/2011 concerning Utilization of Information and Communication Technology Financing. In practice, the mechanism in the regulation of the Ministry of Communication and Information Technology (PERKOMINFO) is mostly directed at providing optical and network networks, public access services for Wi-Fi internet services, data recovery centres, and financing the development of the domestic ICT industry. In 2014, the Government Regulation No. 96 of 2014 concerning the 2014–2019 Indonesian Broadband Plan or “Rencana Pita Lebar” provided strategic guidance in accelerating and expanding comprehensive and integrated “Rencana Pita Lebar” in Indonesia. As a result of the plan, in 2015 fibre optic was built in Indonesia along 41,151.6 km.
The Information and Communication Technology Development Index (ICT-DI) was developed by the International Telecommunication Union (ITU) under the name ICT Development Index (ICT-DI). ICT-DI is very important as a standard measure of the level of ICT development in a region that can be compared across time and between regions. In addition, ICT-DI is also able to measure the growth of ICT development, measure the digital gap or digital divide between regions, and measure the potential for ICT development. In general, there was an increase in the value of provincial ICT-DI in Indonesia from 2019 to 2020. DKI Jakarta became the province with the highest ICT-DI, which was 7.27 in 2019 and increased in 2020 to 7.46. Meanwhile, the province with the lowest ICT-DI was Papua, which was 3.35 in 2020, an increase from 3.29 in 2019. Papua is one of the largest provinces in eastern Indonesia, followed by Sulawesi, Nusa Tenggara, and the Maluku islands.
The research about ICT is indeed a crucial intrinsic component of Industrial 4.0 and Society 5.0 and penta-helix collaboration [1,2,3,4,5,6]. This is the reason the ICT attracts so much attention. To begin with, in Malaysia, the integration of ICT and technological tools in the education sector has a big challenge towards the new era of the Education 4.0 system [7]; these findings have shown significant positive impacts on students’ academic performance and teachers’ effective ICT utilization. An intensification of digital working driven by COVID-19 has been increasing in Saudi higher education [8] and social work students in Greece [9], including digital deprivation [10], digital exhaust, and digital footprints [11]. Based on this case, it can be concluded that the human dependency on information technology is getting stronger during the pandemic. The advantages of the implementation of ICT also drive a positive impact on the government’s environmental protection expenditure (GEPE) [12]. Internet penetration of GEPE is proven through its effect on restraining government’s behaviors, enhancing the public’s environmental protection awareness, and improving the government’s responsiveness to the public’s needs. The use of information technology through mass media such as radio can be used as a medium for introducing culture between various regions, which can be used as a way of promotion to introduce and spread culture [13].
The clustering techniques starting from traditional statistics, data mining, machine learning, and deep learning can provide information to group cities with the same characteristics [14,15]. Clustering is a statistical method for separating a data set into several groups by distance, then we can get information about the relationship between observations [16]. The objects in each cluster will be homogeneous, while heterogeneous compared to objects in other clusters [17].
The output generated from the cluster analysis can be used as an index for a certain group size where the index value can be used as a benchmark for measuring the gap between clusters. The indexing measurement that is very useful to determine socio-economic groups is called Environment Vulnerable Index (EVI). However, EVI was developed by the Pacific Islands Commission for Applied Geosciences as a global composite index that measures an area’s environmental vulnerability [18]. Overall results from these studies obtained using data in Greece suggested that EVI can be a good tool after further development in the context of decision making and environmental sustainability. In addition, Ref. [19] performs a multi-scenario model of plastic waste accumulation potential in Indonesia, potential of mangroves in Southeast Asia towards remote sensing, statistic, and socio-demographic data [20,21,22].
The use of an index in assessing social vulnerability can define conditions of social vulnerability in general. The studies by [23] aim to explain social vulnerability in Indonesia at the district level using the hybrid of Fuzzy C Means clustering method. Meanwhile, Ref. [24] introduces a model of vulnerability to disasters and generates a social vulnerability index (SoVI) using the Principal Component Analysis (PCA) method. In Indonesia, Ref. [25] was initiated a social vulnerability index (SoVI) in Padang which considers the disaster risk as a function of natural hazard. Recently, Refs. [26,27,28] introduce the social vulnerability index (SoVI) which was calculated using various variables. By referring to existing findings, this study aims to revisit the latest condition of ICT vulnerability in the Eastern Island of Indonesia using the 2020 National Socioeconomic Survey (SUSENAS) and National Labor Force Survey (SAKERNAS) data at the district/city level. The clustering method used in this study is Fuzzy C Means Clustering. Following the idea for this study, the next section will discuss a brief overview of the Fuzzy C Means Clustering method based on kinds of literature.

2. Methods

This study uses secondary data from Badan Pusat Statistik (BPS), namely the 2020 National Socio-Economic Survey (SUSENAS) and the 2019 National Labor Force Survey (SAKERNAS). The SUSENAS is a survey designed to collect population social data that are relatively very broad. The data collected include, among others, education, health/nutrition, housing, other socio-economic activities, socio-cultural activities, household consumption/expenditures and income, travel, and public opinion regarding their household welfare.
BPS also provides employment data through the National Labor Force Survey (SAKERNAS). The main objective of SAKERNAS is to obtain information on the unemployment rate and its changes from time to time at the national, provincial, and district/city levels. Table 1 shows the dataset with 15 variables based on aspects of business vulnerability covering 174 districts/cities.
The data used in this study includes information related to ICT such as ownership of telecommunications equipment, access to the internet, and the use of information technology in daily activities. In addition, information on socio-economic aspects is represented by variables such as education and savings.

2.1. Clustering

Cluster analysis is a statistical method that is used to classify objects into relatively homogeneous groups, which are called clusters based on their characteristics. Cluster analysis classifies objects so that each object with the closest similarity to another object is in the same cluster. The clusters formed have high internal homogeneity and high external heterogeneity [16,30,31,32].
The purpose of cluster analysis is to group similar objects together. Objects that have a smaller distance will be considered the same or similar in one group compared to other objects with a greater distance [33]. There are some commonly used distances:
  • Euclidean distance:
d A B = j = 1 p x A j x B j 2 1 2
  • d A B = distance between cluster objects,
  • p = many measurement variables,
  • x A j = observation of object-A; variables-j,
  • x B j = observation of object-B; variables-j.
  • Manhattan distance:
d A B = j = 1 p x A j x B j
  • The Chebychev distance is the difference in the maximum absolute value of each variable:
Other dissimilarity measures exist such as correlation-based distances, which is widely used for gene expression data analyses. Correlation-based distance is defined by subtracting the correlation coefficient from −1 to 1. Different types of correlation methods can be used such as:
  • Pearson correlation distance:
Pearson correlation measures the degree of a linear relationship between two profiles.
d c o r x , y = 1 i = 1 n x i x ¯ y i y ¯ i = 1 n x i x ¯ 2 i = 1 n y i y ¯ 2
  • Eisen cosine correlation distance:
It is a special case of Pearson’s correlation with x ¯ and y ¯ both replaced by zero:
d c o r x , y = 1 i = 1 n x i y i i = 1 n x i 2 i = 1 n y i 2
  • Spearman correlation distance:
The Spearman correlation method computes the correlation between the rank of x andthe rank of y variables.
d c o r x , y = 1 i = 1 n x i x ¯ y i y ¯ i = 1 n x i x ¯ 2 i = 1 n y i y ¯ 2
where, x i = r a n k   x i and y i = r a n k   y i .
  • Kendall correlation distance:
d c o r x , y = 1 n c n d 1 2 n n 1
where:
  • n c : total number of concordant pairs.
  • n d : total number of discordant pairs.
  • n : size of x and y .
Using different distance measures can lead to different conclusions. Therefore, it is suggested that researchers use several different methods, then compare the results. Within a cluster, there are many methods that can be used. However, in general, there are two basic methods that are commonly used. The following is an image of the classification of the clustering procedure. The cluster analysis chart in Figure 1 shows the types of clustering methods ranging from hierarchical methods to non-hierarchical methods and their derivatives.

2.2. Fuzzy C Means

Fuzzy statistics is a suitable technique to overcome various types of uncertainty and imprecision of the specifications of the hypothesis and the information obtained from the data [34]. Fuzzy set theory was first introduced by Lotfi Zadeh, a professor at the University of California in 1965. The basic rules of fuzzy logic do not require complex mathematical models to operate; what is needed is a practical and theoretical understanding of the behaviour of the system as a whole [35].
To calculate the infinite number of degrees between yes and no, Zadeh developed the idea of classifying sets called fuzzy sets [36]. Unlike mathematical logic, fuzzy logic has multiple values. Unlike the concept that states everything is true or wholly false, fuzzy logic divides it into degrees of membership and degrees of truth, namely something that can be partially true and partially false at the same time. A fuzzy set is a general form of an ordinary set that has a membership level of each element that is limited by the interval [0, 1].
Basically, all sets have a degree or membership value. However, in the classical set the membership values are binary, namely 1 (member) and 0 (non-member). While the fuzzy set membership value is in the interval [0, 1]. The following explains the basic differences between classical (crisp) and fuzzy sets:

2.3. Conventional Set (Crisp)

A classical set (crisp or hard) is a clear set of objects, defined as a way to separate the elements of the universe of speech which are divided into two, namely members and nonmembers. If x   A , then the membership value of x is equal to 1. However, if x   A then the membership value of x is equal to 0. The notation A = x | U X x reflects that A containing the value of x with U A x is correct. U A x is the degree of membership for crisp set and can be described as:
U A x = 1 ,   i f   x   A   0 ,   i f   x   A  
A fuzzy set is a general form of an ordinary set (crisp), which has a membership level of each element that is limited by the interval [0, 1].
Let the universal set E = a , b , c , d , e , f , g .
A = simple subset of E .
Then x   E can be described as:
  • x is not a member of A , if U A x = 0
  • x member of A with low membership degree, if U A x 0
  • x member of A with high membership degree, if U A x 1
  • x member of A, if U A x = 1 .
The mathematical concept above is called a fuzzy subset of E , and can be written as A ˜ E . The fuzzy subset of A ˜ can be written as follows:
A ˜ = x E | U A ˜ x
The fuzzy membership value indicates that an item in the universe is not only at 0 or 1, but also values that lie between them. In other words, the truth value of an item is not only true or false. A value of 0 indicates false, a value of 1 indicates true, and there are still values that lie between true and false. Based on Figure 2, it can be seen that the fuzzy cluster members will approach the center point of cluster and will define into the same cluster, as well as other fuzzy members, more detail we provide the pseudo-code step construction in eight steps to finish the algorithm.
Pseudo-code below represents the step construction of Fuzzy C Means (FCM).
Algorithm 1
Step 1:
Determine the data to be X clustered, in the form of a matrix of size  n × p  ( n = data sample size, p = variable for each data). X i j is the i - th sample data i = 1 , 2 , , n and the j - th variable j = 1 , 2 , , p
Step 2: Determine:
Number of clusters = c
Weighting power = m
Expected smallest error = ξ
Initial objective function = P o = 0
Step 3:
Generate random numbers μ i k , i = 1 , 2 , , n ; k = 1 , 2 , 3 , , c
Step 4:
Calculate the k - th cluster center v k j ,   with k = 1 , 2 , , c ; and j = 1 , 2 , , p
v k j = i = 1 n μ i k m   x i j i = 1 n μ i k m
Step 5:
Update fuzzy membership value
μ i k t + 1 = j = 1 p x i j v k j 2 1 m 1 k = 1 c j = 1 p x i j v k j 2 1 m 1 1
Step 6:
Calculating the objective function in the t - th iteration
P t = i 1 n k = 1 c μ i k m j = 1 p x i j v k j 2
Step 7:
Checking the stop condition (convergent) with condition below:
-
if P t P t 1 < ξ , then the iteration stops
-
If not, then t = t + 1 , repeat step 4
Step 8:
Finish

3. Results and Discussion

3.1. Bibliography towards Information and Communication Technologies Vulnerability

As mentioned before, the increase in digital literacy will be greatly influenced by the integration of ICT. By using bibliometric analysis, it shows what topics are being researched by scientists that are relevant to digital literacy through Scopus website until December 2021. From the results of the bibliometric analysis in Figure 3, it can be seen that internet access is the most researched topic, followed by digital inclusion and ICT. The most popular words that apparently shows that many scientists discuss internet access, digital inclusion, ICT, IOT, digital devices, etc. Another outcome from bibliometrics we could find some published articles from around the world compared with the Indonesian side. Figure 4, shows and defines that research in Indonesia on digital literacy is still on a small scale when compared to a global one.
ICT Research is very applicable especially to be a concern for all penta-helix collaboration, which includes businesses, public administration, local residents, the knowledge sector, and capital as an early warning system of the impacts that may be caused by uncontrolled natural disasters. Research on natural disasters is fascinating and essential, which concerns the topic of sustainable development goals (SDGs). In taking into account the accumulation of disaster risk generators, it is possible to position the community and the area concerned at different levels of risk. The higher the hazard threat in a room, the higher the risk of a disaster affecting the region. Likewise, the higher the level of vulnerability of the community or population, the higher the level of risk. Using the calculation of risk analysis can determine the level of risk faced by the area concerned. The vulnerability index is the expected level of damage from a particular hazard. Generally, although the type of threat or hazard is the same from one area to another, it causes different impacts due to other vulnerability indices. In line with this, Figure 5 represents the bibliography study on “Indonesia Vulnerability” by gathering data using Scopus 1181 document results.
Figure 5A,B represent why it is necessary to carry out disaster management which includes all activities that include aspects of planning and disaster management, before, during, and after a disaster occurs, known as the disaster management cycle, which aims to prevent loss of life, reduce human suffering, provide information to the community and stakeholders—authorities regarding risks, reducing damage to crucial infrastructure, property, and loss of economic resources. Disaster is a phenomenon that can minimize its impact on disaster areas by taking preventive, mitigation, preparedness, emergency response, recovery, and rebuilding (development) measures. Therefore, this paper also addresses the vulnerability of the social and economic conditions of the population, in the sense that this analysis is carried out on socio-economic conditions that affect the exposure of the community when a disaster occurs and natural hazards, non-natural hazards, and social hazards.
Figure 5C shows the collaboration of several researchers between countries on the topic of ICT research. This proves that many outside researchers want to study the issue of ICT vulnerability with Indonesian researchers. Figure 5D, similar to Figure 5A,B, discusses the ICT issue related to socio-economics vulnerability conditions under treat from disaster occurs (natural hazards, non-natural hazards, and social hazards).
This analysis is based on the variables that have been determined in the methodology, namely the population density variable, the percentage of the female population, the portion of the elderly population, and toddlers, and from an economic point of view, the poverty level and the existence of a business location were chosen because the poverty condition of the people and the place of the business will affect the prospective community in responding to the disaster that will occur. The existence of a threat to the community’s welfare certainly affects the socio-economic conditions. This analysis analyses the overall state of vulnerability, including physical, social, and economic conditions in the study area. In this case, it means that this analysis is carried out on diseases that affect the community’s vulnerability. This vulnerability is the result of the sum and overlay of several vulnerabilities above; this analysis is based on the variables that have been determined in methodology, namely 15 vulnerability variables. These variables are analysed because they will affect when the disaster is predicted. The existence of this threat certainly affects the community’s physical, social, and economic conditions. Based on the classification of total vulnerability, the level of real exposure in eastern Indonesia can be determined. Based on the results of the analysis carried out, it can be seen that the entire study area for total vulnerability consists of moderate to very high exposure.

3.2. Initial Diagnostic

At the initial step, descriptive statistical analysis was carried out on 15 variables for all districts and cities, which shows in Table 2. In addition, Figure 6 shows the data distribution including the square of skewness and kurtosis. In terms of the use of ICT, it can be seen that there are still many people from eastern Indonesia who have not yet benefited from access to information technology. On the other hand, the use of ICT to support work such as promotions, social media, and e-commerce is still very minimal because the average value is small (<25%). Access to the internet is also still very low on average (26.60%), this is a concern for the government that less than half of the population of eastern Indonesia feels the benefits of the presence of the internet.
Examining the data distribution is very important to gain insight into the information trend of the problem to be solved. This is because in the dataset, there is no information represented by 0/null. This means that that does not provide information in that area at the household level. Yet, it is different for the use_cellphone and saving variables.
The next step is to analyze the correlation between variables. In general, correlation analysis is a statistical method used to find out and measure the relationship between two variables or more. With this method, one can determine how strong the relationship between variables that have not been known before is.
Based on the results of the correlation analysis in Figure 7, there are several variables that have a strong relationship, such as ownership of a computer and the use of internet access. This can be an indication that the increase in people’s purchasing power for computers must also be supported by the availability of wide internet access. Another fact that can also be seen from the correlation plot is that many people use smartphones as a medium of communication at work. This will certainly have a good impact on improving public information services through central and local government regulations.

3.3. Spatial Fuzzy C Means Clustering

The next step is to find the optimal number of clusters. In addition, Silhouette, Elbow, and Gap statistics indicators as the statistical evaluation to measure the optimal cluster, which represents in Figure 8. In line with this, the Fuzzy C Means towards ICT clustering in Eastern Indonesia only can be performed by two clusters.
Before running the FCM machine learning model, validation is needed by taking the test with several clusters. This test uses measurement parameters including Fuzzy Silhouette Index, Partition Entropy, Partition Coefficient, and Modified Partition Coefficient, respectively. The purpose of this validation is to ensure that the cluster with two groups is the best when compared to several other groups.
Based on the validation measurements in Table 3 (SI, PE, PC, MPC), it can be ascertained that the number of two clusters is the best model. With the largest SI value of 0.5264, the smallest PE value of 0.5699, the largest PC value of 0.6153, and the largest MPC value of 0.2270. We also could define the cluster plot in Figure 9.
Having the optimal cluster plot can define which areas are included in the vulnerable or low category cluster through the cluster center point value. By looking at the output cluster center values in Table 4 shows can conclude that cluster 1 is for areas that are very vulnerable because most of the cluster center point values are lower than cluster 2. There is a very large gap between cluster 1 and cluster 2 for several variables, such as the use of personal computers (use_pc). This certainly needs to be a concern that the operational use of a very important PC has not been evenly distributed between regions, thus it needs support from the government for the equitable introduction of hardware such as PC and other supporting devices for the advancement of ICT. This automatically has an impact on the variable of using a PC for work (digitech1); if we look at the value of the center of cluster 1, it is very far (almost three times) compared to cluster 2. The very large gap is also shown in the variable of using information technology for buying and selling activities in e-commerce (jobint_use4), even though if the use of information technology is used properly it will be able to encourage the Micro Small Medium Enterprises (MSMEs) sector to be better known and sell to other areas both in terms of national and international scale.
From the results of the cluster output in Figure 10 obtained members who entered cluster 1 as many as 108 regions while members who entered cluster 2 as many as 66. This means that 62% of regions in eastern Indonesia fall into the category where ICT is very vulnerable, the remaining 38% fall into the category of low vulnerability.

3.4. Future Work toward ICT Expansion Based on an Existing Plan

It can be seen in Figure 10 that there are the first 5 locations with a low level of vulnerability, such as Maros, Gowa, Mamuju, Poso, and Pangkajene, which are included in Cluster 2. The ICT index for the Province of South Sulawesi (Maros, Gowa, Pangkajene, Indonesia) in 2020 has an ICT index value of 5.59 (Publication of BPS Indonesia). For the first five locations with high vulnerability, such as Central Sumba, Supiori, Yahukimo, Puncak, Banggai, which are included in Cluster 1 with lower ICT index values (Papua [3.35]: Supiori, Yahukimo, Puncak, Indonesia; Central Sulawesi [5.27]: Banggai, Indonesia; NTT [4.49]: Sumba Tengah, Sumba Tengah).
The Indonesian government already has an ICT development plan written in the Ministry of Communication and Information Technology Strategic Plan (RENSTRA KOMINFO), which seeks to support the establishment of a national digital foundation, one of which is the construction of the Palapa Ring, which has been running for the 2015–2019 period. The Palapa Ring program is a national strategic project to build a national fiber-optic backbone network in non-commercial. More detail in frontier, outermost and least developed regions often referred to as 3T ( terdepan, terluar, tertinggal ) regions as a step towards realizing an integrated telecommunications infrastructure. This project also aims at equal distribution of access and prices for broadband internet services in all cities/districts in Indonesia. As of 2019, the construction carried out by the PT Telkom Indonesia Tbk, also simply known as Telkom, is an Indonesian multinational telecommunications conglomerate. Telkom has completed connecting the national backbone network to 457 regencies/cities, and the construction by Public Private Partnership (PPP) has been completed in 57 regencies/cities so that a total of 514 regencies/cities have available a national backbone network shows in Figure 11. The purple line in Figure 11 shows the separation of the western Indonesian time (WIB), central Indonesian time(WITA), and eastern Indonesian time (WIT).
This research will significantly help answer the challenges in the Ministry of Communication and Information Technology Strategic Plan (RENSTRA KOMINFO) for the next period to ensure that the Palapa Ring coverage is well integrated, and there is great hope that the community can take advantage of broadband access with a deeper level of regional granularity, namely the districts.
Therefore, the Indonesian government is working optimally to minimize the risks caused [38,39,40]. ICT has an essential role in disaster mitigation, especially in the face of the new normal. In certain situations, especially threat situations such as COVID-19, information needs to be communicated and worked on as soon as possible. Delays in receiving information can trigger more significant problems and harm. Information and Communication Technology (ICT) has become an innovative strategy for penta-helix contributors to assist services, delivering services to produce sustainable competitive advantages. Meanwhile, ICT is all forms of computer-based technology used to process data. The processing includes processing, obtaining, compiling, storing, and manipulating data in various ways to produce quality information. This form of technology is facilities and infrastructure or products and services in the state of desktop computers, laptops, handled services, wired or wireless intranets, software, data storage, network security, and others. At the same time, the ICT is also information technology in the form of hardware, software, and user systems used as media in obtaining, transmitting, processing, interpreting, storing, organizing, and manipulating to produce quality and meaningful use, including the relevant information accurate and timely.

4. Conclusions

Although there are many benefits derived from the application of ICT. Nevertheless, the utilization of ICT by the eastern regions in Indonesia is still relatively low, even though ICT. For example, MSMEs cases can also provide opportunities to market their products and services so that MSMEs can expand the market. This could be due to the lack of financial resources owned by MSMEs, thus influencing MSMEs’ decisions in implementing ICT. The influence of MSME owners in all decision-making in the use of ICT is also one of the obstacles in using ICT. The importance of appropriate economic policies is really needed so that a large productive age population is truly became a demographic bonus. Entering the industrial revolution era 4.0 (IR 4.0), the Eastern of Indonesia also needs to develop a business sector that absorbs human labor. In line with this, the Eastern of Indonesia must have a wide range of job opportunities, and human resources have the education, skills, and competencies needed to enter the labor market. In the digital era, the younger generation must obtain a comprehensive education, especially in soft skills. Thus, the critical aspect is IT readiness. This concept is applied to assess IT infrastructure development in eastern Indonesia. Willingness to use IT in this research is seen from the use of a series of infrastructures as strategic media to support business activities, MSMEs business strategies and disaster mitigation so that Penta-helix contributors can also fully utilize ICT potential. In other words, IT readiness tries to see how much the Penta-helix contributor can gain strategic benefits through investment in the use of ICT to improve its ability to utilize ICT continuously.

Author Contributions

Conceptualization, F.A. and R.E.C.; methodology, R.E.C.; software, R.E.C. and P.U.G.; validation, R.E.C. formal analysis, F.A. and R.E.C.; investigation, F.A. and R.E.C.; resources, R.E.C. and R.-C.C.; data curation, R.E.C.; writing—original draft preparation, F.A., R.E.C., F.A.P. and M.R.; writing—review and editing, F.A., R.E.C., F.A.P., M.R., P.U.G., R.-C.C. and B.P.; visualization, R.E.C. and P.U.G.; supervision, R.E.C. and R.-C.C.; project administration, R.E.C., R.-C.C. and B.P.; funding acquisition, R.E.C. and R.-C.C. All authors have read and agreed to the published version of the manuscript.

Funding

This research is supported by the Ministry of Science and Technology, Taiwan [MOST 110-2221-E-324-010]. This research is part of the Research Grant Bank Indonesia (RGBI) 2021 under contact Bank Indonesia Institute [23/17/PKS/BINS/2021].

Ethical Statement

The results are appropriately placed in the context of prior and existing research. This paper has been reviewed in three rounds by independent reviewers. It does not affect the position of the corresponding author as the editorial board in the Special Issue “Recent Research on Statistics, Machine Learning, and Data Science in Sustainability and Penta Helix Contribution”.

Institutional Review Board Statement

Not Applicable.

Informed Consent Statement

Not Applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Schwarz, M.; Scherrer, A.; Hohmann, C.; Heiberg, J.; Brugger, A.; Nuñez-Jimenez, A. COVID-19 and the academy: It is time for going digital. Energy Res. Soc. Sci. 2020, 68, 1–2. [Google Scholar] [CrossRef] [PubMed]
  2. Potočan, V.; Mulej, M.; Nedelko, Z. Society 5.0: Balancing of Industry 4.0, economic advancement and social problems. Kybernetes 2021, 50, 794–811. [Google Scholar] [CrossRef]
  3. Deguchi, A.; Hirai, C.; Matsuoka, H.; Nakano, T.; Oshima, K.; Tai, M.; Tani, S. What Is Society 5.0. In Society 5.0 A People-Centric Super-Smart Society; Springer: Singapore, 2020; pp. 1–23. [Google Scholar]
  4. Martini, L.; Tjakraatmadja, J.H.; Anggoro, Y.; Pritasari, A.; Hutapea, L. Triple Helix Collaboration to Develop Economic Corridors as Knowledge Hub in Indonesia. Procedia Soc. Behav. Sci. 2012, 52, 130–139. [Google Scholar] [CrossRef] [Green Version]
  5. Anggoro, Y. Automotive and Logistics Clusters To Drive Economic. Ph.D. Thesis, The University of North Carolina at Charlotte, Charlotte, NC, USA, 2015. [Google Scholar]
  6. Upe, A.; Haluoleo, U.; Sumandiyar, A.; Makassar, U.S.; Jabar, A.; Haluoleo, U. Strengthening of Social Capital through Penta Helix Model in Handling COVID-19 Pandemic. Int. J. Pharm. Res. 2021, 13, 1–13. [Google Scholar] [CrossRef]
  7. Ghavifekr, S.; Wong, S.Y. Technology leadership in Malaysian schools: The way forward to education 4.0–ICT utilization and digital transformation. Int. J. Asian Bus. Inf. Manag. 2022, 13, 1–18. [Google Scholar] [CrossRef]
  8. Binsawad, M.H. Corporate Social Responsibility in Higher Education: A PLS-SEM Neural Network Approach. IEEE Access 2020, 8, 29125–29131. [Google Scholar] [CrossRef]
  9. Papouli, E.; Chatzifotiou, S.; Tsairidis, C. The use of digital technology at home during the COVID-19 outbreak: Views of social work students in Greece. Soc. Work Educ. 2020, 39, 1107–1115. [Google Scholar] [CrossRef]
  10. Kuc-Czarnecka, M. COVID-19 and digital deprivation in Poland. Oeconomia Copernic. 2020, 11, 415–431. [Google Scholar] [CrossRef]
  11. Leonardi, P.M. COVID-19 and the New Technologies of Organizing: Digital Exhaust, Digital Footprints, and Artificial Intelligence in the Wake of Remote Work. J. Manag. Stud. 2021, 58, 247–251. [Google Scholar] [CrossRef]
  12. Wang, W.; Liu, Y.; Zhang, L.; Ran, L.; Xiong, S.; Tan, X. Associations between Indoor Environmental Quality and Infectious Diseases Knowledge, Beliefs and Practices of Hotel Workers in Wuhan, China. Int. J. Environ. Res. Public Health 2021, 18, 6367. [Google Scholar] [CrossRef]
  13. Carias Pérez, F.; Hernando Gómez, Á.; Marín-Gutiérrez, I. La radio educativa como herramienta de alfabetización mediática en contextos de interculturalidad. Rev. Comun. 2021, 20, 93–112. [Google Scholar] [CrossRef]
  14. Rakotomamonjy, A. Variable Selection Using SVM-based Criteria. J. Mach. Learn. Res. 2003, 3, 1357–1370. [Google Scholar] [CrossRef]
  15. Muja, M.; Lowe, D.G. Scalable nearest neighbor algorithms for high dimensional data. IEEE Trans. Pattern Anal. Mach. Intell. 2014, 36, 2227–2240. [Google Scholar] [CrossRef] [PubMed]
  16. Caraka, R.E.; Lee, Y.; Chen, R.C.; Toharudin, T.; Gio, P.U.; Kurniawan, R.; Pardamean, B. Cluster around Latent Variable for Vulnerability Towards Natural Hazards, Non-Natural Hazards, Social Hazards in West Papua. IEEE Access 2021, 9, 1972–1986. [Google Scholar] [CrossRef]
  17. Nasution, B.I.; Kurniawan, R.; Siagian, T.H.; Fudholi, A. Revisiting social vulnerability analysis in Indonesia: An optimized spatial fuzzy clustering approach. Int. J. Disaster Risk Reduct. 2020, 51, 101801. [Google Scholar] [CrossRef]
  18. Skondras, N.A.; Karavitis, C.A.; Gkotsis, I.I.; Scott, P.J.B.; Kaly, U.L.; Alexandris, S.G. Application and assessment of the Environmental Vulnerability Index in Greece. Ecol. Indic. 2011, 11, 1699–1706. [Google Scholar] [CrossRef]
  19. Sakti, A.D.; Rinasti, A.N.; Agustina, E.; Diastomo, H.; Muhammad, F.; Anna, Z.; Wikantika, K. Multi-scenario model of plastic waste accumulation potential in indonesia using integrated remote sensing, statistic and socio-demographic data. ISPRS Int. J. Geo-Inf. 2021, 10, 481. [Google Scholar] [CrossRef]
  20. Syahid, L.N.; Sakti, A.D.; Virtriana, R.; Windupranata, W.; Sudhana, S.A.; Wilwatikta, F.N.; Fauzi, A.I.; Wikantika, K. Land suitability analysis for global mangrove rehabilitation in Indonesia. IOP Conf. Ser. Earth Environ. Sci. 2020, 500, 1–8. [Google Scholar] [CrossRef]
  21. Sakti, A.D.; Fauzi, A.I.; Wilwatikta, F.N.; Rajagukguk, Y.S.; Sudhana, S.A.; Yayusman, L.F.; Syahid, L.N.; Sritarapipat, T.; Principe, J.A.; Quynh Trang, N.T.; et al. Multi-source remote sensing data product analysis: Investigating anthropogenic and naturogenic impacts on mangroves in southeast asia. Remote Sens. 2020, 12, 2720. [Google Scholar] [CrossRef]
  22. Fauzi, A.; Sakti, A.; Yayusman, L.; Harto, A.; Prasetyo, L.; Irawan, B.; Kamal, M.; Wikantika, K. Contextualizing mangrove forest deforestation in southeast asia using environmental and socio-economic data products. Forests 2019, 10, 952. [Google Scholar] [CrossRef] [Green Version]
  23. Nasution, B.I.; Kurniawan, R. Robustness of Classical Fuzzy C-Means (FCM). In Proceedings of the 2018 International Conference on Information and Communications Technology ICOIACT 2018, Yogyakarta, Indonesia, 6–7 March 2018. [Google Scholar]
  24. Cutter, S.L.; Boruff, B.J.; Shirley, W.L. Social vulnerability to environmental hazards. Soc. Sci. Q. 2003, 84, 242–261. [Google Scholar] [CrossRef]
  25. Birkmannan, J.; Setiadi, N.J.; Gebert, N. Socio-economic Vulnerability Assessment at the Local Level in Context of Tsunami Early Warning and Evacuation Planning in the City of Padang, West Sumatra. In Proceedings of the International Conference on Tsunami Warning (ICTW), Bali, Indonesia, 12 –14 November 2008; pp. 1–8. [Google Scholar]
  26. Kaban, P.A.; Kurniawan, R.; Caraka, R.E.; Pardamean, B.; Yuniarto, B. Sukim Biclustering method to capture the spatial pattern and to identify the causes of social vulnerability in Indonesia: A new recommendation for disaster mitigation policy. Procedia Comput. Sci. 2019, 157, 31–37. [Google Scholar] [CrossRef]
  27. Pramana, S.; Yuniarto, B.; Kurniawan, R.; Yordani, R.; Lee, J.; Amin, I.; Satyaning, P.N.L.P.; Riyadi, Y.; Hasyyati, A.N.; Indriani, R. Big data for government policy: Potential implementations of bigdata for official statistics in Indonesia. In Proceedings of the 2017 International Workshop on Big Data and Information Security (IWBIS), Jakarta, Indonesia, 23–24 September 2017; pp. 17–21. [Google Scholar]
  28. Kurniawan, R.; Siagian, T.H.; Yuniarto, B.; Nasution, B.I.; Caraka, R.E. Construction of social vulnerability index in Indonesia using partial least squares structural equation modeling. Int. J. Eng. Technol. 2018, 7, 6131–6136. [Google Scholar] [CrossRef]
  29. Caraka, R.E.; Kurniawan, R.; Nasution, B.I.; Jamilatuzzahro, J.; Gio, P.; Basyuni, M.; Pardamean, B. Micro, Small, and Medium Enterprises’ Business Vulnerability Cluster in Indonesia: An Analysis Using Optimized Fuzzy Geodemographic Clustering. Sustainability 2021, 13, 7807. [Google Scholar] [CrossRef]
  30. Warren Liao, T. Clustering of time series data—A survey. Pattern Recognit. 2005, 38, 1857–1874. [Google Scholar] [CrossRef]
  31. Cios, K.J.; Pedrycz, W.; Swiniarski, R.W.; Kurgan, L.A. Data Mining: A Knowledge Discovery Approach; Springer: Boston, MA, USA, 2007; p. 3335. ISBN 9780387333335. [Google Scholar]
  32. Liang, J.; Li, L.; Chen, W.; Zeng, D. Towards an Understanding of Cryptocurrency: A Comparative Analysis of Cryptocurrency, Foreign Exchange, and Stock. In Proceedings of the 2019 IEEE International Conference on Intelligence and Security Informatics (ISI), Shenzhen, China, 7–9 July 2019; pp. 137–139. [Google Scholar]
  33. Gower, J.; Lubbe, S.; Roux, N. le Principal Component Analysis Biplots. In Understanding Biplots; Wiley: Hoboken, NJ, USA, 2011. [Google Scholar]
  34. Malathi, K.; Kavitha, R. Recognition and classification of diabetic retinopathy utilizing digital fundus image with hybrid algorithms. Int. J. Eng. Adv. Technol. 2019, 9, 109–122. [Google Scholar] [CrossRef]
  35. Runkler, T.A.; Katz, C. Fuzzy Clustering by Particle Swarm Optimization. In Proceedings of the 2006 IEEE International Conference on Fuzzy Systems, Vancouver, BC, Canada, 16–21 July 2006; IEEE: Piscataway, NJ, USA, 2006. [Google Scholar]
  36. Zadeh, L.A. Fuzzy logic. Computer (Long. Beach. Calif.) 1988, 21, 83–93. [Google Scholar] [CrossRef]
  37. Ministry of Communications and Informatics. Chapter 1 Introduction. In Strategic Plan of 2020–2024; Jakarta; 2020; pp. 1–179. Available online: https://web.kominfo.go.id (accessed on 13 March 2022).
  38. Djalante, R.; Lassa, J.; Nurhidayah, L.; Van Minh, H.; Mahendradhata, Y.; Ngoc, N.T. The ASEAN’s responses to COVID-19: A policy sciences analysis. PsyArXiv 2020, 368. [Google Scholar] [CrossRef]
  39. Djalante, R.; Lassa, J.; Setiamarga, D.; Sudjatma, A.; Indrawan, M.; Haryanto, B.; Mahfud, C.; Sinapoy, M.S.; Djalante, S.; Rafliana, I.; et al. Review and analysis of current responses to COVID-19 in Indonesia: Period of January to March 2020. Prog. Disaster Sci. 2020, 6, 100091. [Google Scholar] [CrossRef]
  40. Djalante, R.; Shaw, R.; DeWit, A. Building resilience against biological hazards and pandemics: COVID-19 and its implications for the Sendai Framework. Prog. Disaster Sci. 2020, 6, 100080. [Google Scholar] [CrossRef]
Figure 1. Cluster Analysis Chart adopted by [16].
Figure 1. Cluster Analysis Chart adopted by [16].
Sustainability 14 03428 g001
Figure 2. Fuzzy Cluster Membership adopted by [17].
Figure 2. Fuzzy Cluster Membership adopted by [17].
Sustainability 14 03428 g002
Figure 3. Co-Occurrences Digital Literacy.
Figure 3. Co-Occurrences Digital Literacy.
Sustainability 14 03428 g003
Figure 4. The Time Series Plot of Paper Publication Digital Literacy.
Figure 4. The Time Series Plot of Paper Publication Digital Literacy.
Sustainability 14 03428 g004
Figure 5. Bibliography Indonesia Related to Keywords Vulnerability (A), Most Relevant Words (B), Network Collaboration (C), and Keywords Wordcloud (D).
Figure 5. Bibliography Indonesia Related to Keywords Vulnerability (A), Most Relevant Words (B), Network Collaboration (C), and Keywords Wordcloud (D).
Sustainability 14 03428 g005
Figure 6. Data Distribution.
Figure 6. Data Distribution.
Sustainability 14 03428 g006aSustainability 14 03428 g006b
Figure 7. Correlation Plot.
Figure 7. Correlation Plot.
Sustainability 14 03428 g007
Figure 8. Optimal Cluster Test Silhouette (A), Elbow (B), and Gap Statistic (C).
Figure 8. Optimal Cluster Test Silhouette (A), Elbow (B), and Gap Statistic (C).
Sustainability 14 03428 g008aSustainability 14 03428 g008b
Figure 9. Cluster Plot Total Variance Explain.
Figure 9. Cluster Plot Total Variance Explain.
Sustainability 14 03428 g009
Figure 10. Final Clustering ICT Vulnerability.
Figure 10. Final Clustering ICT Vulnerability.
Sustainability 14 03428 g010
Figure 11. Palapa Ring Network Map [37].
Figure 11. Palapa Ring Network Map [37].
Sustainability 14 03428 g011
Table 1. Dataset ICT Vulnerability adopted [29].
Table 1. Dataset ICT Vulnerability adopted [29].
VariableDescriptionSource
use_cellph% of population who use cell phonesSUSENAS
have_cellph% of population who own a cell phone
use_pc% of population who use a PC
acc_int% of population who access the internet
saving% of population who have savings
edu% of population who recent graduation in junior high and below
course% of working population who attended trainingSAKERNAS
no_empl_14% of population who own a micro business
digitech1% of population who use computers to work
digitech2% of population who use smartphones to work
digitech3% of population who use other digital technologies to work
jobint_use1% of population who use the internet for communication
jobint_use2% of population who use the internet for promotion
jobint_use3% of population who use the internet to sell via email/social media
jobint_use4% of population who use the internet to sell via e-commerce
Table 2. Descriptive Statistic.
Table 2. Descriptive Statistic.
VariableMin1st Qu.MedianMean3rd Qu.Max
use_cellph24.0382.8790.6287.9997.74100
have_cellph070.8081.8679.3090.24100
use_pc04.8613.6115.7523.0662.60
acc_int015.1525.5826.6035.6677.42
saving3.4924.0533.2135.4846.0585.00
edu033.4647.9749.8065.48100
course082.3389.8287.5596.80100
no_empl_14076.9284.0480.5991.22100
digitech102.908.4912.7017.97100
digitech2023.5434.7638.2253.33100
digitech3011.2019.9424.0835.15100
jobint_use109.2018.3423.4435.52100
jobint_use2008.9011.2417.07100
jobint_use3007.6110.8417.2849.92
jobint_use40002.983.5132.47
Table 3. Cluster Validation.
Table 3. Cluster Validation.
n ClusterFuzzy Silhouette Index (SI)Partitiony
Entropy (PE)
Partition Coefficient (PC)Modified Partition Coefficient (MPC)
20.52640.56990.61350.2270
30.21750.96530.41580.1238
40.13211.25270.31510.0868
50.13451.47500.25350.0669
60.08591.65440.21250.0550
Table 4. Center of Cluster.
Table 4. Center of Cluster.
CentroidCluster 1Cluster 2
use_cellph86.403990.5869
have_cellph76.841183.2404
use_pc11.429421.9411
acc_int21.344034.3597
saving29.517343.5743
edu40.985161.5661
course90.380383.4344
no_empl_1483.319677.6748
digitech17.243020.4872
digitech228.649352.2365
digitech317.659633.2556
jobint_use114.720036.5879
jobint_use27.039117.2886
jobint_use36.772017.2540
jobint_use41.69645.0362
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Anggoro, F.; Caraka, R.E.; Prasetyo, F.A.; Ramadhani, M.; Gio, P.U.; Chen, R.-C.; Pardamean, B. Revisiting Cluster Vulnerabilities towards Information and Communication Technologies in the Eastern Island of Indonesia Using Fuzzy C Means. Sustainability 2022, 14, 3428. https://doi.org/10.3390/su14063428

AMA Style

Anggoro F, Caraka RE, Prasetyo FA, Ramadhani M, Gio PU, Chen R-C, Pardamean B. Revisiting Cluster Vulnerabilities towards Information and Communication Technologies in the Eastern Island of Indonesia Using Fuzzy C Means. Sustainability. 2022; 14(6):3428. https://doi.org/10.3390/su14063428

Chicago/Turabian Style

Anggoro, Faisal, Rezzy Eko Caraka, Fajar Agung Prasetyo, Muthia Ramadhani, Prana Ugiana Gio, Rung-Ching Chen, and Bens Pardamean. 2022. "Revisiting Cluster Vulnerabilities towards Information and Communication Technologies in the Eastern Island of Indonesia Using Fuzzy C Means" Sustainability 14, no. 6: 3428. https://doi.org/10.3390/su14063428

APA Style

Anggoro, F., Caraka, R. E., Prasetyo, F. A., Ramadhani, M., Gio, P. U., Chen, R. -C., & Pardamean, B. (2022). Revisiting Cluster Vulnerabilities towards Information and Communication Technologies in the Eastern Island of Indonesia Using Fuzzy C Means. Sustainability, 14(6), 3428. https://doi.org/10.3390/su14063428

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop