RANCANG BANGUN PORTAL BIMBINGAN TUGAS AKHIR (LOG REVISI, PERSETUJUAN, ARSIP) BERBASIS WEB

Authors

  • Ari Suhartanto Universitas Doktor Nugroho Magetan
  • Ignatus Budi Universitas Doktor Nugroho Magetan

Keywords:

portal bimbingan; tugas akhir; log revisi; persetujuan digital; arsip berbasis web.

Abstract

Penelitian ini bertujuan untuk merancang dan membangun Portal Bimbingan Tugas Akhir berbasis web yang terintegrasi dengan fitur log revisi, persetujuan dosen pembimbing, dan sistem arsip digital. Permasalahan utama dalam proses bimbingan tugas akhir di perguruan tinggi meliputi kurangnya dokumentasi revisi yang terstruktur, keterlambatan persetujuan pembimbing, serta penyimpanan arsip yang belum terdigitalisasi secara optimal, sehingga berpotensi menimbulkan miskomunikasi dan menghambat efektivitas penyelesaian tugas akhir. Pengembangan sistem menggunakan pendekatan System Development Life Cycle (SDLC) dengan model Waterfall yang mencakup tahap analisis kebutuhan, perancangan sistem, implementasi, pengujian, dan pemeliharaan. Portal dikembangkan berbasis web dengan arsitektur client–server agar dapat diakses secara fleksibel oleh mahasiswa dan dosen. Fitur utama meliputi pencatatan log revisi secara kronologis, unggah dokumen tugas akhir, notifikasi persetujuan atau penolakan revisi, serta pengelolaan arsip digital secara sistematis. Hasil pengujian menunjukkan bahwa sistem mampu meningkatkan efisiensi proses bimbingan, transparansi riwayat revisi, serta kemudahan monitoring progres mahasiswa. Dengan demikian, portal ini mendukung tata kelola akademik yang lebih terdokumentasi, akuntabel, dan terintegrasi, serta menjadi solusi digital yang adaptif terhadap transformasi teknologi di lingkungan perguruan tinggi.

Downloads

Download data is not yet available.

References

Anti-Phishing Working Group (APWG). (2024). Phishing activity trends report. https://apwg.org

Beck, U. (1992). Risk society: Towards a new modernity. Sage Publications.

Carayon, P., & Smith, M. J. (2000). Work organization and ergonomics. Applied Ergonomics, 31(6), 649–662. https://doi.org/10.1016/S0003-6870(00)00040-5

Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 13(3), 319–340. https://doi.org/10.2307/249008

Deci, E. L., & Ryan, R. M. (2000). The “what” and “why” of goal pursuits: Human needs and self-determination of behavior. Psychological Inquiry, 11(4), 227–268. https://doi.org/10.1207/S15327965PLI1104_01

DeLone, W. H., & McLean, E. R. (2003). The DeLone and McLean model of information systems success: A ten-year update. Journal of Management Information Systems, 19(4), 9–30. https://doi.org/10.1080/07421222.2003.11045748

Dumas, M., La Rosa, M., Mendling, J., & Reijers, H. A. (2018). Fundamentals of business process management (2nd ed.). Springer. https://doi.org/10.1007/978-3-662-56509-4

Google & Harris Poll. (2024). Password security & authentication trends report. Google Safety Center.

ISO/IEC. (2013). ISO/IEC 27001:2013 Information technology—Security techniques—Information security management systems—Requirements. International Organization for Standardization.

Kolb, D. A. (1984). Experiential learning: Experience as the source of learning and development. Prentice Hall.

Microsoft Security. (2024). Digital defense report. Microsoft Corporation.

Nonaka, I., & Takeuchi, H. (1995). The knowledge-creating company. Oxford University Press.

Rahman, M. S., & Abdullah, A. (2022). Web-based academic information systems implementation in higher education institutions. International Journal of Advanced Computer Science and Applications, 13(2), 412–419. https://doi.org/10.14569/IJACSA.2022.0130249

Rifai, A., Setiawan, A., & Nugroho, Y. (2021). Digital transformation in higher education: Toward Education 4.0. Journal of Physics: Conference Series, 1833(1), 012046. https://doi.org/10.1088/1742-6596/1833/1/012046

Rogers, R. W. (1975). A protection motivation theory of fear appeals and attitude change. The Journal of Psychology, 91(1), 93–114. https://doi.org/10.1080/00223980.1975.9915803

Schein, E. H. (2010). Organizational culture and leadership (4th ed.). Jossey-Bass.

Schwaber, K., & Sutherland, J. (2020). The Scrum guide: The definitive guide to Scrum. Scrum.org.

Slovic, P., Finucane, M. L., Peters, E., & MacGregor, D. G. (2002). The affect heuristic. In T. Gilovich, D. Griffin, & D. Kahneman (Eds.), Heuristics and biases: The psychology of intuitive judgment (pp. 397–420). Cambridge University Press. https://doi.org/10.1017/CBO9780511808098.025

Stahl, G., Koschmann, T., & Suthers, D. (2006). Computer-supported collaborative learning: An historical perspective. In R. K. Sawyer (Ed.), The Cambridge handbook of the learning sciences. Cambridge University Press. https://doi.org/10.1017/CBO9780511816833.025

Sweller, J. (1988). Cognitive load during problem solving: Effects on learning. Cognitive Science, 12(2), 257–285. https://doi.org/10.1207/s15516709cog1202_4

Venkatesh, V., Thong, J. Y. L., & Xu, X. (2016). Unified theory of acceptance and use of technology: A synthesis and the road ahead. Journal of the Association for Information Systems, 17(5), 328–376. https://doi.org/10.17705/1jais.00428

Verizon. (2025). Data breach investigations report (DBIR). Verizon Enterprise.

Downloads

Published

2025-07-28

Issue

Section

Articles

How to Cite

RANCANG BANGUN PORTAL BIMBINGAN TUGAS AKHIR (LOG REVISI, PERSETUJUAN, ARSIP) BERBASIS WEB. (2025). Eduscotech, 6(2). https://journal.udn.ac.id/index.php/eduscotech/article/view/564