IMPLEMENTASI SISTEM PENDATAAN SISWA BARU MENGGUNAKAN METODE AGILE

Authors

  • Rizki Aditiya Universitas Pamulang
  • Aldis Sahputra Universitas Pamulang

Abstract

This internship report aims to document the implementation process of a student data collection system at the Baitul Yatim H. Caong Foundation using the Agile method. In today's digital era, efficient and accurate student data management is very important to support administrative activities and decision making. The Agile method was chosen because of its flexibility in dealing with changing needs and its ability to improve collaboration between the development team and stakeholders. This project began with a needs analysis involving the foundation to understand the existing data collection process. Furthermore, a system design was carried out that prioritized user experience and ease of access. Implementation was carried out in several iterations, where each iteration produced new features that were immediately tested and evaluated. The result of this implementation is an integrated student data collection system, allowing for faster and more accurate data management. From the evaluation results, this system has succeeded in increasing the efficiency of the data collection process and making it easier for foundation staff to access student information. This report is expected to be a reference for other institutions that want to implement a similar system and provide insight into the application of the Agile method in the development of educational information systems.

References

“Mengintip dasar pengembangan sistem informasi dengan metode Agile. Why Agile Rocks?,” Jurnal Sisfo Unsurya, vol. 6, no. 1, Jun. 2014, doi: 10.35968/jsi.v6i1.277.

M. H. Rumlus and H. Hartadi, “Kebijakan Penanggulangan Pencurian Data Pribadi dalam Media Elektronik,” j. ham, vol. 11, no. 2, p. 285, Aug. 2020, doi: 10.30641/ham.2020.11.285-299.

F. Anugerah And T. Tantimin, “Pencurian Data Pribadi Di Internet Dalam Perspektif Kriminologi,” J. Komun. Huk., Vol. 8, No. 1, Pp. 419–435, Feb. 2022, Doi: 10.23887/Jkh.V8i1.45434.

D. J. K. Putra And P. F. Tanaem, “Perancangan Aplikasi Pembukuan Menggunakan Metode Agile Scrum,” Jutisi, Vol. 8, No. 3, Dec. 2022, Doi: 10.28932/Jutisi.V8i3.5060.

L. J. Kotlikoff And J. Sachs, “The Personal Security System: A Framework For Reforming Social Security,” R, Vol. 80, No. 2, 2023, Doi: 10.20955/R.80.11-14.

U. D. Soer, S. Fauziah, And I. Nursida, “Pengembangan Sistem Informasi Absensi Karyawan Berbasis Rfid 125 Khz Menggunakan Metode Agile Development Pada Pt. Sanly Industries,” Jimik, Vol. 4, No. 1, Pp. 58–69, Jan. 2023, Doi: 10.35870/Jimik.V4i1.110.

M. Alda, Sabrina Putri, Adhe Eva Yolanda, and Syaidah Fiddarain, “Rancangan Sistem Pendataan Siswa Berprestasi Berbasis Mobile Dengan Metode Waterfall,” bulletincsr, vol. 4, no. 2, pp. 207–214, Feb. 2024, doi: 10.47065/bulletincsr.v4i2.327.

M. R. Edy, W. S. Saidar, R. A. Mansyur, and M. Maulida, “Intensifikasi Website yang Digunakan untuk Penerimaan Pendaftaran Siswa Baru di SMP 4 Mangarabombang sebagai Bentuk Adaptasi Pada Revolusi Industri 4.0,” indonesian. technology. and. education. j., pp. 1–17, Jun. 2024, doi: 10.61255/itej.v2i1.444.

S. Sunardi, R. Rusdan, D. S. Mz, and B. I. Indrayatni, “SISTEM INFORMASI PENDAFTARAN SISWA BARU BERBASIS ONLINE,” Jet, Vol. 5, No. 2, Pp. 328–339, Dec. 2024, Doi: 10.31932/Jutech.V5i2.3732.

Atlassian, “What is Agile?,” Atlassian. Accessed: Jan. 14, 2025. [Online]. Available: https://www.atlassian.com/agile

R. Kristian, “Keamanan Data: Pengertian, Jenis, dan Tujuannya,” Mekari Sign. Accessed: Jan. 14, 2025. [Online]. Available: https://mekarisign.com/id/blog/keamanan-data-adalah/

P. Indonesia, “Keamanan Data di Era Digital: Tantangan dan Solusinya,” PuskoMedia Indonesia. Accessed: Jan. 14, 2025. [Online]. Available: https://www.puskomedia.id/blog/keamanan-data-di-era-digital-tantangan-dan-solusinya/

eendigo, “Autentikasi Dua Faktor: Pengertian, Cara Kerjanya, & Contohnya,” eendigo. Accessed: Jan. 14, 2025. [Online]. Available: https://eendigo.co/id/articles/autentikasi-dua-faktor/

“Firewall: Pengertian, Fungsi, Cara Kerja dan Jenis-Jenisnya,” Corpnet. Accessed: Jan. 14, 2025. [Online]. Available: https://www.corpnet.net.id/blog/Informasi/firewall-adalah

B. A. O. S.H, “Terjadi Pencurian Data Pribadi (Identity Theft)? Tempuh Langkah Ini | Klinik Hukumonline.” Accessed: Jan. 14, 2025. [Online]. Available: https://www.hukumonline.com/klinik/a/terjadi-pencurian-data-pribadi-tempuh-langkah-ini-lt5d904597bfa6e/

Published

2025-01-20

Issue

Section

Articles