RANCANG BANGUN PORTAL BIMBINGAN TUGAS AKHIR (LOG REVISI, PERSETUJUAN, ARSIP) BERBASIS WEB
Keywords:
portal bimbingan; tugas akhir; log revisi; persetujuan digital; arsip berbasis web.Abstract
Penelitian ini bertujuan untuk merancang dan membangun Portal Bimbingan Tugas Akhir berbasis web yang terintegrasi dengan fitur log revisi, persetujuan dosen pembimbing, dan sistem arsip digital. Permasalahan utama dalam proses bimbingan tugas akhir di perguruan tinggi meliputi kurangnya dokumentasi revisi yang terstruktur, keterlambatan persetujuan pembimbing, serta penyimpanan arsip yang belum terdigitalisasi secara optimal, sehingga berpotensi menimbulkan miskomunikasi dan menghambat efektivitas penyelesaian tugas akhir. Pengembangan sistem menggunakan pendekatan System Development Life Cycle (SDLC) dengan model Waterfall yang mencakup tahap analisis kebutuhan, perancangan sistem, implementasi, pengujian, dan pemeliharaan. Portal dikembangkan berbasis web dengan arsitektur client–server agar dapat diakses secara fleksibel oleh mahasiswa dan dosen. Fitur utama meliputi pencatatan log revisi secara kronologis, unggah dokumen tugas akhir, notifikasi persetujuan atau penolakan revisi, serta pengelolaan arsip digital secara sistematis. Hasil pengujian menunjukkan bahwa sistem mampu meningkatkan efisiensi proses bimbingan, transparansi riwayat revisi, serta kemudahan monitoring progres mahasiswa. Dengan demikian, portal ini mendukung tata kelola akademik yang lebih terdokumentasi, akuntabel, dan terintegrasi, serta menjadi solusi digital yang adaptif terhadap transformasi teknologi di lingkungan perguruan tinggi.
Downloads
References
Anti-Phishing Working Group (APWG). (2024). Phishing activity trends report. https://apwg.org
Beck, U. (1992). Risk society: Towards a new modernity. Sage Publications.
Carayon, P., & Smith, M. J. (2000). Work organization and ergonomics. Applied Ergonomics, 31(6), 649–662. https://doi.org/10.1016/S0003-6870(00)00040-5
Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 13(3), 319–340. https://doi.org/10.2307/249008
Deci, E. L., & Ryan, R. M. (2000). The “what” and “why” of goal pursuits: Human needs and self-determination of behavior. Psychological Inquiry, 11(4), 227–268. https://doi.org/10.1207/S15327965PLI1104_01
DeLone, W. H., & McLean, E. R. (2003). The DeLone and McLean model of information systems success: A ten-year update. Journal of Management Information Systems, 19(4), 9–30. https://doi.org/10.1080/07421222.2003.11045748
Dumas, M., La Rosa, M., Mendling, J., & Reijers, H. A. (2018). Fundamentals of business process management (2nd ed.). Springer. https://doi.org/10.1007/978-3-662-56509-4
Google & Harris Poll. (2024). Password security & authentication trends report. Google Safety Center.
ISO/IEC. (2013). ISO/IEC 27001:2013 Information technology—Security techniques—Information security management systems—Requirements. International Organization for Standardization.
Kolb, D. A. (1984). Experiential learning: Experience as the source of learning and development. Prentice Hall.
Microsoft Security. (2024). Digital defense report. Microsoft Corporation.
Nonaka, I., & Takeuchi, H. (1995). The knowledge-creating company. Oxford University Press.
Rahman, M. S., & Abdullah, A. (2022). Web-based academic information systems implementation in higher education institutions. International Journal of Advanced Computer Science and Applications, 13(2), 412–419. https://doi.org/10.14569/IJACSA.2022.0130249
Rifai, A., Setiawan, A., & Nugroho, Y. (2021). Digital transformation in higher education: Toward Education 4.0. Journal of Physics: Conference Series, 1833(1), 012046. https://doi.org/10.1088/1742-6596/1833/1/012046
Rogers, R. W. (1975). A protection motivation theory of fear appeals and attitude change. The Journal of Psychology, 91(1), 93–114. https://doi.org/10.1080/00223980.1975.9915803
Schein, E. H. (2010). Organizational culture and leadership (4th ed.). Jossey-Bass.
Schwaber, K., & Sutherland, J. (2020). The Scrum guide: The definitive guide to Scrum. Scrum.org.
Slovic, P., Finucane, M. L., Peters, E., & MacGregor, D. G. (2002). The affect heuristic. In T. Gilovich, D. Griffin, & D. Kahneman (Eds.), Heuristics and biases: The psychology of intuitive judgment (pp. 397–420). Cambridge University Press. https://doi.org/10.1017/CBO9780511808098.025
Stahl, G., Koschmann, T., & Suthers, D. (2006). Computer-supported collaborative learning: An historical perspective. In R. K. Sawyer (Ed.), The Cambridge handbook of the learning sciences. Cambridge University Press. https://doi.org/10.1017/CBO9780511816833.025
Sweller, J. (1988). Cognitive load during problem solving: Effects on learning. Cognitive Science, 12(2), 257–285. https://doi.org/10.1207/s15516709cog1202_4
Venkatesh, V., Thong, J. Y. L., & Xu, X. (2016). Unified theory of acceptance and use of technology: A synthesis and the road ahead. Journal of the Association for Information Systems, 17(5), 328–376. https://doi.org/10.17705/1jais.00428
Verizon. (2025). Data breach investigations report (DBIR). Verizon Enterprise.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Ari Suhartanto, Ignatus Budi

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Authors who publish with this journal agree to the following terms:
1. Copyright on any article is retained by the author(s).
2. The author grants the journal, right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work’s authorship and initial publication in this journal.
3. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal’s published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
4. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.
5. The article and any associated published material is distributed under the Creative Commons Attribution-ShareAlike 4.0 International License



