UPSI Digital Repository (UDRep)
|
|
|
Abstract : Universiti Pendidikan Sultan Idris |
Kajian ini bertujuan bagi mengenalpasti masalah yang dihadapi dalam pengurusan data di sekolah dan
Pejabat Pendidikan Daerah (PPD), membangunkan satu kaedah alternatif baru iaitu prototaip sistem
berasaskan web dan menilai kepenggunaan prototaip sistem yang dibangunkan. Pembangunan prototaip
sistem adalah berasaskan model prototyping. Manakala, penilaian bagi prototaip sistem pula
menggunakan kaedah kualitatif bagi menilai empat atribut utama iaitu kecekapan, keberkesanan,
kemudahbelajaran dan keselamatan. Bagi pengumpulan data, kaedah kualitatif menggunakan teknik temu
bual semi berstruktur digunakan. Responden bagi kajian ini terdiri daripada tiga pengetua sekolah
menengah serta sorang pegawai PPD di sebuah jajahan di Negeri Kelantan, Malaysia. Dapatan kajian
menunjukkan bahawa prototaip sistem yang dibangunkan menepati empat atribut kepenggunaan yang
dinilai. Kecekapan prototaip sistem dapat dilihat apabila ia tidak mengambil masa yang lama untuk
menyimpan maklumat. Prototaip sistem berkesan dengan adanya fungsi yang membantu pengguna seperti
dapat menambah, mengemaskini, memadam dan mencari maklumat yang dikehendaki dengan tepat. Selain
itu, prototaip sistem juga mudah dipelajari dengan adanya bantuan seperti manual pengguna. Pengguna
juga tidak boleh mengakses maklumat yang tidak dibenarkan kerana prototaip sistem telah dibangunkan
dengan fungsi had capaian mengikut kategori pengguna menjadikan ia sistem yang selamat untuk
menyimpan maklumat. Kesimpulannya sistem ini memenuhi empat atribut kepengguna yang dinilai
iaitu kecekapan, keberkesesanan, kemudahbelajaran dan keselamatan. Melalui sistem yang dibangunkan
didapati ia dapat membantu pihak sekolah dan PPD serta guru dalam penyimpanan maklumat
rekod perkhidmatan mereka dalam mendepani masalah banjir yang melanda.
|
References |
Abran, A., Khelifi, A., Suryn, W., & Seffah, A. (2003). Software Quality Journal, 11(4), 325–338. doi:10.1023/a:1025869312943
Adam. I (2008, November 6). Surat Pekeliling Perkhidmatan Bilangan 15 Tahun 2008 [Letter]. Jabatan Perkhidmatan Awam Malaysia Putrajaya.
Ahmad, A. R. (2014, December 27). Banjir 2014 Bakal Catat Sejarah Terburuk - Berita Semasa. Dicapai pada November 2, 2016, dari http://www.mstar.com.my/berita/beritasemasa/2014/12/27/sejarah-terburuk/.
Akasah, Z. A. & Doraisamy, S. V., 2015. 2014 Malaysia Flood: Impacts & Factors Contributing Towards The Restoration Of Damages. Journal Of Scientific Research And Development, Issue 2 (14) 2015, Pp. 53-59.
Alexander, P. M. 2002. Towards Reconstructing Meaning When Text Is Communicated Electronically. PhD thesis, Univ. of Pretoria, Pretoria.
Alshamari, M. (2016) A Review of Gaps between Usability and Security/Privacy. Alshamrani1, A., & Bahattab2, A. (Januari 2015). A Comparison Between Three SDLC Models Waterfall Model, Spiral Model, and Incremental/Iterative Model.
B. Sneiderman, “Usability testing,” in Software Interfaces, ITNP43:Interface Design and the WWW, 2014, Ch. 4.
Ballav, A. (2017). Nielsen’s Heuristic Evaluation: Limitations in Principles and Practice. User Experience Magazine, 17(4). Dicapai dari http://uxpamagazine.org/nielsens-heuristic-evaluation/
Banjir Kelantan Pembalakan masih aktif di Gua Musang. Dicapai pada 2 November 2016, dari http://www.astroawani.com/berita-malaysia/banjir-kelantan- pembalakan-masih-aktif-di-gua-musang-55597
Beaudouin-Lafon, M. and Mackay, W.E. (2002) Prototyping Development and Tools. In J.A. Jacko and A. Sears (Eds), Handbook of Human-Computer Interaction. New York: Lawrence Erlbaum Associates
Beng, T. S. (2001). Peranan Sistem Maklumat Dalam Pengurusan Maklumat Pendidikan: Kes Pelaksanaan Sistem Simpel Di Maktab Perguruan Batu Lintang. Dicapai pada 3 November 2016, dari http://www.ipbl.edu.my/portal/penyelidikan/2001/2001_tee.pdf
Bennett, S., Myatt, M., Jolley, D., & Radalowicz, A. (2001). Data Management for Surveys and Trials. A Practical Primer Using EpiData. The EpiData Documentation Project. Daripada: www.epidata.dk/downloads/dmepidata.pdf.
Blair-Early, A., & Zender, M. (2008). User Interface Design Principles for Interaction Design. Design Issues, 24(3), 85-107. doi:10.1162/desi.2008.24.3.85
Boell, Sebastian & Cecez-Kecmanovic, Dubravka. (2015). What is an Information System?. 2015. 10.1109/HICSS.2015.587.
Braz, C & Robert, J. (2006). Security and usability: the case of the user authentication methods.. 199-203. 10.1145/1132736.1132768.
C. (n.d.). Cambridge International AS & A Level Information Technology 9626 For examination from 2017 Topic 1.1 Data, information and knowledge [Cambridge International Examinations 2015 Version 1]. Dicapai pada 22 Disember 2018, dari https://www.cambridgeinternational.org/Images/285017- data-information-and knowledge.pdf.
Chen, T., & Gross, M.R. (2017). Usability Modeling of Academic Search User Interface. HCI.
Cook, P. (2008). Natural resources information management toolkit: Building capacity to implement natural resources information management solutions. Braddon, A.C.T.
Critical Data Elements: Identification, Validation, and Assessment. (2014). Competing with High Quality Data, 71–82. doi:10.1002/9781118840962.ch6
Dennis, A., Wixom, B. H., & Roth, R. M. (2012). System analysis and design (Fifth). United States of America: John Wiley & Sons, Inc.
Dixit, J. B. and Kumar, R. (2008). Structured System Analysis and Design. Paperback ed. New Delhi, India: Laxmi Publisher. doi:10.1007/s00521-016-2776-8
Egwoh, A. Y., & Nonyelum, O. F. (2017). A Software System Development Life Cycle Model for Improved Students Communication and Collaboration. International Journal of Computer Science & Engineering Survey, 8(4), 1-10. doi:10.5121/ijcses.2017.8401
Essays, UK. (November 2013). Importance Of Information Security In Organizations Information Technology Essay. Dicapai dari https://www.uniassignment.com/essay-samples/information- technology/importance-of-information-security-in-organizations-information- technology-essay.php?vref=1
Essays, UK. (November 2013). The Important Aspects Of Information System Security Information Technology Essay. Dicapai dari https://www.ukessays.com/essays/information-technology/the-important-aspects-of-information-system-security-information-technology-essay.php?
Fontdevila, D., Genero, M., Oliveros, A.: Towards a usability model for software development process and practice. In: Felderer, M.,Méndez Fernández, D., Turhan, B., Kalinowski, M., Sarro, F., Winkler, D. (eds.) PROFES 2017. LNCS, vol. 10611, pp. 137–145. Springer, Cham (2017). doi.org/10.1007/978-3-319-69926-4_11 CrossRefGoogle Scholar
Gary, S. (2011). Can your district survive a data disaster? Dicapai pada 10 Januari 2019, dari http://www.asbointi.com.
Gonzalez-Holland, E., Whitmer, D., Moralez, L., & Mouloua, M. (2017). Examination of the Use of Nielsen’s 10 Usability Heuristics & Outlooks for the Future. Proceedings of the Human Factors and Ergonomics Society Annual Meeting, 61(1), 1472–1475. https://doi.org/10.1177/1541931213601853
Gordon, K. (2008). Principles of data management: Facilitating information sharing. Swindon: British Computer Society.
Great Britain., Intra-governmental Group on Geographic Information. (2005). The principles of good data management (2nd ed.). London: Office for the Deputy Prime Minister.
Haapala, Hannu & Pesonen, Liisa & Nurkka, P. (2006). Usability as a Challenge in Precision Agriculture – Case Study: an ISOBUS VT. Agricultural Engineering International : The CIGR e-journal.
Hakim, H. H. BAH luar biasa yang melanda Pantai Timur meninggalkan kesan besar kepada penduduk yang kehilangan tempat tinggal. Dicapai pada 2 November 2016, dari http://www.utusan.com.my/rencana/hikmah-di-sebalik-tragedi- banjir-1.46640/bah-luar-biasa-yang-melanda-pantai-timur-meninggalkan- kesan-besar
Ind, K. S. (2015). A Simulation Model for the Spiral Software Development Life Cycle. International Journal of Innovative Research in Computer and Communication Engineering, 03(05), 3823-3830. doi:10.15680/ijircce.2015.0305013
International Journal of Communications, Network and System Sciences, 9, 413-429. doi: 10.4236/ijcns.2016.910034.
Iqbal, Syed Zaffar. (2017). Z-SDLC Model: A New Model For Software Development Life Cycle (SDLC). International Journal of Engineering and Advanced Research Technology (IJEART). 3. 1-8.
John, Spacey. (2016, July 02). Prototypes: Evolutionary vs Throwaway. Simplicable. Dicapai dari: https://simplicable.com/new/evolutionary-prototype-vs- throwaway-prototype
Jugulum, R. (2014). Critical Data Elements: Identifi cation, Validation, and Assessment 1. In Competing with High Quality Data: Concepts, Tools, and Techniques for Building a. Successful Approach to Data Quality. (pp. 71-72). John Wiley & Sons. doi:10.1002/9781118840962.ch6
Kabay, M. E. (2002) “What’s Important for Information Security: A Manager’s Guide”, Norwich University, Northfield.
Kappel et al., The Discipline of Systematic Development of Web Applications, 2003, John Wiley and Sons.
Keinonen, T. (2005) Usability Of Interactive Product daripada: http://www.uiah.fi/projects/metodi/169.htm
Kementerian Pendidikan Malaysia (2015). Garis panduan Sistem Pengurusan Sekolah. Dicapai pada 6 November 2016 dari http://sps.moe.gov.my/pdf/ Garis_Panduan_SPS_Final .pdf
Kruger, H.A. and Kearney, W.D. (2006). A Prototype For Assessing Information Security Awareness. Computers And Security, 25, 289-296
Lacerda, T. C., & von Wangenheim, C. G. (2018). Systematic literature review of usability capability/maturity models. Computer Standards & Interfaces, 55, 95–105. doi:10.1016/j.csi.2017.06.001
Learning Center. (n.d.). Dicapai pada September 15, 2018, dari https://www.website.com/beginnerguide/webhosting/6/1/what-is-web- hosting?.ws
Nacheva, Radka. (2017). Prototyping Approach In User Interface Development.
Norizan Yusof, (2016) Pengurusan elemen psikologikal sebagai persediaan menghadapi bencana: satu kajian kualitatif terhadap mangsa banjir di Kelantan. Jurnal Psikologi Malaysia, 30 (2). pp. 74-81. ISSN 2289-8174
Paul, R. J. (2009). What an Information System is, and why is it important to know this. Proceedings of the ITI 2009 31st International Conference on Information Technology Interfaces,2, 95-99. doi:10.1109/iti.2009.5196049
Pilev, Dimitar. (2014). Web-Based Information System Security. International Electronic Journal of Pure and Applied Mathematics. 7. 10.12732/iejpam.v8i4.1.
Quesenbery, W. (2001) What Does Usability Mean: Looking beyond Ease of Use. Proceeding of 48th Annual Conference-Society for Technical Communication, o, 13-16 May 2001.
Radka Nacheva, 2015. "Principles of User Interface Design: Important Rules that Every Designer Should Follow," Izvestia, Journal Of The Union Of Scientists Varna, Economic Sciences Series, Union of Scientists - Varna, Economic Sciences Section, issue 1, pages 140-149, November.
Rahardjo M (2010). Triangulasi dalam Penelitian Kualitatif. Jakarta. Dicapai pada 22 Disember 2018, dari http://mudjirahardjo.com.
Rainer, R. K., Cegielski, C. G. (2010), “Introduction to Information Systems: Enabling and Transforming Business”, 3rd Edition, John Wiley & Sons, Hoboken, NJ.
Rouse, M. (2005, September). What is data dictionary? - Definition dari WhatIs.com. Dicapai pada Ogos 25, 2018, dari https://searchmicroservices.techtarget.com/definition/data-dictionary
Royce, W., “Managing the Development of Large Software Systems”, Proceedings of IEEE WESCON 26, pp.1-9, 1970.
Ruparelia, Nayan. (2010). Software development lifecycle models. ACM SIGSOFT Software Engineering Notes. 35. 8-13. 10.1145/1764810.1764814.
Salleh, M. F. (April, 2007). Sistem Maklumat Pengurusan Kejohanan Olahraga majlis Sukan Sekolah-Sekolah Daerah Pontian (Unpublished master's thesis). Fakulti Sains Komputer dan Sistem MaklumatUniversiti Teknologi Malaysia. Dicapai pada 3 November 2016, darihttps://www.scribd.com/document/57835840/Mohammadvref=1FaizSalle hMFSKSM2007TTT
Samvedi, A., Goh, M., & de Souza, R. (2016). Handling network disruption risks for supply-chain information systems selection using fuzzy DEMOPSIS. In Proceedings of the IEEE International ConferenceManagement of Innovation and Technology (ICMIT) (pp. 89-94). doi:10.1109/ICMIT.2016.7605013
Shackel, B. (2009). Usability – Context, framework, definition, design and evaluation. Interacting with Computers, 21(5-6), 339–346. doi:10.1016/j.intcom.2009.04.007
Shahid, M., & Tasneem, K. A. (2017). Impact Of Avoiding Non-Functional Requirements In Software Development Stage. American Journal Of Information Science And Computer Engineering,3(4), 52-55. Dicapai pada Jun 19, 2018, dari Http://Www.Aiscience.Org/Journal/Ajisce
Shawgi, E., Noureldien, N.A.: Usability measurement model (umm): a new model for measuring websites usability. Int. J. Inf. Sci. 5(1), 5–13 (2015)
Soler, A. S., Ort, M., & Steckel, J. (2016, February 22). An Introduction to Data Management Dicapai pada 22 Disember 2018, dari https://www.gfbio.org/documents/10184/22817/Reader_GFBio_BefMate_201 60222/1ca43f24-2550-44b3-a05e-e180c3e544c0.
Somerville, I. (2015). Software Engineering, Addison Wesley, Harlow, England, 10th Edition.
Sonia Thind, Karambir (2015)“A simulation model for spiral software development lifecycle”International journal of innovative Research in computer and communication engineeringVol. 3, No. pp. 2320-2330.
Suryanto Nugroho, Sigit Hadi Waluyo, Luqman Hakim, "Comparative Analysis of Software Development Methods between Parallel, VShaped and Iterative", International Journal of Computer Applications (0975 – 8887) Volume 169 – No.11, July 2017
Ubaidullah, N. H., Saad, A., Hamid, J., Rashid, N. A., Mohamed, Z., & Hashim, M. (2018). The Formulation of a Critical Data Management Framework for Situations Facing Disasters through the Delphi Technique. International Journal of Academic Research in Business and Social Sciences, 8(9), 1193– 1210.
UNISDR. (2009). The United Nations International Strategy for Disaster Reduction (UNISDR) Terminology(p. 9, Rep.). United Nations International.
What is a disaster? (n.d.). Dicapai pada June, 2017, dari https://www.ifrc.org/en/what-we-do/disaster-management/about- disasters/what-is-a-disaster/
What is Critical Data: Definition | Informatica US. (n.d.). Dicapai pada 22 Disember 2018, daripada https://www.informatica.com/services-and-training/glossary- of-terms/critical-data-definition.html#fbid=wU5LT-kHMc1
Y. Bassil “A simulation model for the waterfall software development life cycle. International Journal of Engineering & Technology”, 2(5): 1-7, 2012.
|
This material may be protected under Copyright Act which governs the making of photocopies or reproductions of copyrighted materials. You may use the digitized material for private study, scholarship, or research. |