Web Based Security Services Administration Information System Design Case Study: PT Pasopati Guardian Security Services
https://doi.org/10.36342/teika.v11i01.2480
Keywords:
Information System Administration, Web Based, Security ServicesAbstract
Companies need integrated information technology capable of supporting the company's performance. Information Technology continues to grow rapidly, fills every field of the company with the system. One area or field that did not miss from Information Technology is field of Administration. PT Pasopati Guardian Security Services need an administration information system that help them to improve the company's performance and reduce the loss for the company. There were 4 goals of this research: 1) Improving the employee performance in doing his job. 2) Reducing unnecessary losses due to irregular available data. 3) Reducing the use of paper in the recording of data security force members, clients, financial expenses and income. 4) Saves time in searching existing data when needed. The methodology used in this research is SDLC (System Development Life Cycle) method which consists of five phases there are: (1) Requirement Analysis, (2) System Design, (3) Coding, (4) Testing and (5) Implementation. From the research that has been done, the authors conclude that: (1) The system that was built is able to improve the performance of employees in doing his job, (2) The system that was built is able to store and display data of financial expenses and income in accordance with the actual data so the data of old and new can be analyzed properly, (3) The system that was built is able to integrate data between members of the security force and client so we can know the number of members in the client's location, and (4) The system that was built is able to help users to make the invoice before the due date of payment by the client and reduce losses that may occur.
Downloads
References
Stair, R., dan Reynolds, G., Principles of Information Systems 9 Ed. USA: Cengage Learning, 2010, pp. 4–10.
Rainer Jr, R. K., dan Cegielski, C. G., Introduction to Information Systems 3Ed. USA: John Wiley & Sons, Inc., 2011, pp. 7–11.
Haryadi, H., Administrasi Perkantoran untuk Manajer dan Staff. Indonesia: Visimedia, 2009, pp. 1–3.
Kristanto, A., Perancangan Sistem Informasi dan Aplikasinya. Yogyakarta: Gaya Media, 2008 pp. 61.
Coronel, C., Morris, S., et. al, Database Systems Design, Implementation and Management 9th. Ed.. USA: Cengage Learning, 2011, pp. 7&100.
Teorey, T., Lightstone, S., et. al, Database Modeling and Design Logical Design 5th. Ed.. USA: Elsevier Inc., 2011, pp. 15–18.
Davis, M. E., dan Phillips, J. A., Learning PHP and MySQL, Second Edition. USA: O’Reilly Media, Inc., 2007, pp. 4–6.
Mendez, C. A., Villa, C., et. Al, Learning Ext JS, Fourth Edition. UK: Packt Publishing, 2015, pp. 15.
Duckett, J., HTML & CSS Design and Build Websites. USA: John Wiley & Sons, Inc., 2011, pp. 20, 22 & 25.
Larsen, R., Beginning HTML & CSS. USA: John Wiley & Sons, Inc., 2013, pp. 192.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2021 TeIKa
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
The submitting author warrants that the submission is original and that she/he is the author of the submission together with the named co-authors; to the extend the submission incorporates text passages, figures, data or other material from the work of others, the submitting author has obtained any necessary permission.
Articles in this journal are published under the Creative Commons Share Alike Attribution Licence (CC-BY-SA What does this mean?). This is to get more legal certainty about what readers can do with published articles, and thus a wider dissemination and archiving, which in turn makes publishing with this journal more valuable for you, the authors.
By submitting an article the author grants to this journal the non-exclusive right to publish it. The author retains the copyright and the publishing rights for his article without any restrictions.