Strategy of Indonesian Navy Big Data Development Using SWOT Analysis and Analytic Hierarchy Process

The Indonesian Navy organization has the duties and responsibilities of state sovereignty. In carrying out its duties are needed very large and real time data include data on ships in all Indonesian waters from satellite and terrestrial AIS, from radar, data from long range cameras, data from other agencies such as weather data, marine accident data, natural disasters data and fishing areas data. The managed data are consists of structured, semi-structured and unstructured data. Thus, big data is needed within the Indonesian Navy. Therefore, this study analyzes the strategies that need to be taken to be able to develop a big data in the Indonesian Navy. The method used is qualitative analytic research using SWOT and AHP. The research subjects were Head of Section at Command and Control Center, and Head of Section at Information and Data Processing Services. The resulting main strategy is to implement Big Data with existing and adequate system resources, manageable costs, set up network infrastructure and sufficient bandwidth using available big data software by optimizing government regulations regarding single data for communication and data sharing from other agencies and optimizing advanced API technology.


INTRODUCTION
The Indonesian Navy is a large organization, with duties and responsibilities for the safety and sovereignty of the state as stated in Article 9 of the Republic of Indonesia Law Number 34 of 2004. In the implementation of its duties and activities management the Indonesian Navy has and requires very large data and must be managed. Most of the data in the surveillance and control of maritime security and sovereignty is very large and must be real time. Various data needed in supervision and control of the sea. Data from various other agencies in real time are also required to support the analysis. The data needed includes data on ships sailing in real time in Indonesia in real time obtained from the satellite and terrestrial Automatic Information System (AIS), data from radar, data from long range cameras, data from other agencies such as data weather from the Meteorology, Climatology and Geophysics Agency in real time, data from the National Search and Relief Agency in real time, data on natural disasters such as earthquakes that occur in real time as well as from the National Disaster Management Agency, data fishing areas and data on fishing vessels sailing in Indonesia in real time from the Ministry of Marine Affairs and Fisheries. The data types to be managed include structured data, such as marine and shipping databases, semi-structured data which are json data from other ministries and satellite AIS and unstructured data which includes data from long range cameras and radars.
Based on discussions with the Indonesian Navy Data Center team, it can be concluded that the existing database system is no longer adequate to use, because it only includes structured data so that it cannot accommodate existing semistructured and unstructured data. On the other hand, Big Data has the advantage of being able to accommodate all kinds of data and in large quantities. Big data analytics as a method for looking at big data to reveal hidden patterns, incomprehensible relationships, and other important data that can be used to resolve improved decisions. Big data continues to grow for big data because of its fast development and because it covers different application areas ( (Memon et al., 2017). Big data development requires large amounts of resources and funds. Various challenges faced in big data management include data availability, data standardization, data privacy, infrastructure and human resources ( (Sirait, 2016). These challenges are of course also faced by the Indonesian Navy in pursuing the development of big data implementation. Thus, the Indonesian Navy's big data development strategy is needed. analyze how the strategies that need to be taken to be able to develop big data in the Indonesian Navy.

Location and Time of Research
This research was conducted in the Indonesian Navy Command and Control Center and the Indonesian Navy's Information and Data Processing Service, because Command and Control Center is an office that manages the implementation of the main data for the Indonesian Navy in order to carry out operations and tasks of the Indonesian Navy. Meanwhile, Information and Data Processing Service is tasked with planning, developing, and maintaining all information systems in the Indonesian Navy. The research was conducted in November and December 2020. In November 2020, data collection, data processing and analysis were carried out and research report writing was carried out in December 2020.

Data and Subject of Research
The data to be managed is data on the strengths and weaknesses of the Indonesian Navy in the development of the Big Data system, as well as opportunities and threats outside the Indonesian Navy that must be overcome and anticipated. Based on these needs, this study used qualitative methods to obtain this data through structured interviews combined with expert opinions to be managed with analytic hierarchical process (AHP) for weighting and rating. The research subjects were Intermediate Officers level at the Command and Control Center and Information and Data Processing Service. In detail, there are 3 heads of Command and Control Center Sections, 11 Heads of Information and Data Processing Service Sections. They play a role in filling structured interviews and become experts in determining weights with AHP.

Data Analysis Technique
Data analysis was carried out by the following steps.

Formulation of Strengths and Weaknesses, Opportunities and Threats
Data collection used structured interview guides. The results are collected and then analyzed using content analysis which includes four main stages, namely: decontextualization, recontextualization, categorization, and compilation (Bengtsson, 2016). Furthermore, the technique of compiling strengths and weaknesses, opportunities and threats in the content analysis process is carried out, dependability analysis is carried out to obtain reliable opinions from research subjects in accordance with triangulation as a powerful technique that facilitates data reliability through triangulation or cross-verification of two or more sources (Johnson, 2017). So that each item that is concluded about strengths, weaknesses, opportunities and threats has been believed to be valid and reliable.

Compilation of weights and ratings
Weights and ratings are compiled after compiling items of strengths, weaknesses, opportunities and threats.

Flowchart Diagram
Based on these data analysis techniques, a research flow chart can be prepared as follows.

Analysis of Strengths, Weaknesses, Opportunities and Threats
The analysis of strengths, weaknesses, opportunities and threats which is the S-W-O-T analysis was carried out using data collection using structured interviews on research subjects consisting of 3 Heads of Command and Control Center Sections, 11 Heads of Information and Data Processing Service Sections. Data processing using qualitative data analysis techniques. Using content analysis with steps of decontextualization, recontextualization, categorization, and compilation as well as through triangulation of questionnaire results for all respondents to adjust the SWOT placement and obtain meaning from the data collected and draw realistic conclusions. The results of data processing from research subjects produce strengths, weaknesses, opportunities and threats as follows. The weight and rating analysis was carried out as with the help of the Analytic Hierarchy Process application. Data from research subjects who are also experts in the field of information technology and its use within the Indonesian Navy. Each research subject filled out a pairwise comparison questionnaire based on the level of importance. Then the pairwise comparison results are averaged with a geometric mean and input into the Super Decision application to calculate the weight, as follows. Furthermore, the output of calculating the weight of each indicator on the internal factors including strengths and weaknesses is presented as follows. Furthermore, the output of calculating the weight of each indicator on the external factors including strengths and weaknesses is presented as follows. The results of these calculations are obtained with an inconsistency level of 0.0806. The inconsistency value is less than 0.1. So, it can be said that the results of the weight calculation are consistent. Furthermore, the weight calculation results are equipped with a rating obtained from the opinion of the respondents in accordance with the average rounding with a rating of 1 to 10, as presented in the final calculation results as follows.

Figure 3. Vectors of SWOT strategy
From the calculation of the matrix, it appears that there are 4 strategic directions that can be developed. As well as the resultant strategy leading to an offensive strategy that will take advantage of many opportunities with the strength of the Indonesian Navy. Based on the results of the matrix calculation above, a detailed SO, ST, WO, and WT strategy and a combined strategy were developed. The results are as follows.

S-O Strategy
Implement Big Data with existing and adequate system resources, arrangements for costs that can be made, well-organized network infrastructure and sufficient bandwidth using the available big data software to optimize government regulations on single data when communication and data sharing from agencies are required. others and optimizing advanced API technology.

S-T Strategy
Managing information systems, financing arrangements, network infrastructure and existing internet bandwidth to deal with cyber attacks, developing ship spoofing technology, hacker attacks even though there are no rules for protecting IT between countries because basically internet technology can cover between countries so that it allows more freedom of protection Weakness IT HR Competencies • W3 Indonesian Navy network security • W4 Application platform compatibility

W-O Strategy
Optimizing collaboration with other agencies in accordance with big data rules to dominate human resource shortages, competence and network security that need to be overcome and the suitability of various platforms that can be overcome with big data technology that accommodates multiplatform and takes advantage of developed API technology.

W-T Strategy
Manage carefully with high vigilance by paying attention to the security of the Indonesian Navy's network and applications according to their respective platforms from cyber threats, ship spoofy technology, hackers and protecting against ITE protection rules between countries that don't yet exist.
Based on the results of the strategy analysis, a grand strategy for the Indonesian Navy Big Data strategy that is more offensive can be arranged according to the results of the vector calculation, which is S-O with a score of (2,4; 2,7) as follows. Implementing Big Data with existing and adequate system resources, managing costs that can be done, well-organized network infrastructure and sufficient bandwidth using available big data software to optimize government regulations a. optimizing cooperation with other agencies in accordance with big data rules to eliminate human resource shortages, competence and network security that need to be overcome and the suitability of various platforms that can be overcome with big data technology that accommodates multiplatform and takes advantage of developed API technology. b. Managing information systems, financing arrangements, network infrastructure and existing internet bandwidth to deal with cyber attacks, developing ship spoofing technology, hacker attacks even though there are no rules for protecting IT between countries because basically internet technology can cover between countries so that it allows more freedom of protection c. Manage carefully with high vigilance by paying attention to the security of the Indonesian Navy's network and applications according to their respective platforms from cyber threats, ship spoofy technology, hackers and protecting against IT protection rules between countries that don't yet exist.
This strategy is in accordance with the strategies developed in IT companies as carried out by Aneato (2020), namely communication, training, employee involvement in decision making, and teamwork strategies. Here the similarity in communication is an effort to eliminate weaknesses and use opportunities in the form of rules for one data and data required from other agencies. The strategy developed to establish communication and cooperation with other agencies is also in line with the results of research by Heriyadi et al (2017) that the problem of national defense is not only the task and responsibility of Military, but also the duties and responsibilities of all components of the nation. So that Big data is developed in a national big data ecosystem which is in line with research in the Indian Navy (Kulshrestha, 2017). Thus, it is believed that the strategy developed has found relevance and suitability with the IT world in general and the military in particular.

CONCLUSION
Based on the results of the calculations and discussion above, it can be concluded that by using SWOT and AHP, the main strategy for the Indonesian Navy's Big Data can be developed, namely implementing Big Data with existing and adequate system resources, managing costs that can be done, and well-organized network infrastructure. and sufficient bandwidth using the available big data software to optimize government regulations on single data when it requires communication and data sharing from other agencies and optimizing advanced API technology. The main strategy needs to be supported by: first, keeping in mind the optimization of cooperation with other agencies in accordance with regulations, to eliminate shortages of human resources, competence and network security as well as the suitability of various platforms with big data technology that accommodates multiplatform and utilizes already developed API technology. Managing information systems, financing arrangements, existing network infrastructure and internet bandwidth to deal with cyber-attacks, ship spoofing technology, hacker attacks even though there are no IT protection rules between countries because basically internet technology can cover between countries so that it allows more flexible protection. Manage carefully with high vigilance by paying attention to the security of the Indonesian Navy's network and applications according to their respective platforms from cyber threats, ship spoofy technology, hackers and protecting against IT protection rules between countries that don't yet exist.