STUDI KASUS SISTEM PENCARIAN DATA PENDUDUK MENGGUNAKAN METODE STUDY PRACTICE
##plugins.themes.academic_pro.article.main##
Abstract
Sistem kependudukan yang selalu up to date sangat dibutuhkan untuk kegiatan pelayanan masyarakat di bidang administrasi kependudukan pada suatu pemerintahan baik di daerah maupun pusat. Namun kondisi yang terjadi di masyarakat menunjukkan bahwa pelayanan masyarakat tersebut belum maksimal. Sistem kependudukan di Desa Patrol Lor saat ini masih manual sehingga kurang efisien dalam pengelolaan informasinya. Proses pelayanan pencarian data penduduk dari pihak desa masih dilakukan secara manual sehingga bisa dikatakan kurang efisien dalam melayani masyarakat. Pemanfaatan teknologi yang sudah ada dapat dilakukan dengan tujuan dapat menghemat waktu dan tenaga, oleh karena itu dibutuhkan sebuah sistem aplikasi kependudukan desa. Sistem aplikasi kependudukan di Desa Patol Lor ini dirancang untuk memudahkan pencarian NIK dengan menggunakn metode study practice dengan melalukan proses pretest dan posttest untuk mengetahui kebenaran hasil dari pemrosesan data serta melakukan analisa terhadap sistem tersebut. Sehingga dengan adanya sistem aplikasi kepedudukan desa ini dapat meningkatkan kualitas pelayanan bagi petugas desa dan dapat mempermudah petugas desa dalam mencari dan mengedit data kependudukan sehingga mempermudah melayani penduduk atau warga dalam mengontrol data penduduk dan menyediakan laporan kependudukan yang tepat dan akurat. Pada penelitian selanjutnya agar mengkombinasikan dengan metode laian akan system pencarian semakin cepat.
##plugins.themes.academic_pro.article.details##
This work is licensed under a Creative Commons Attribution-NoDerivatives 4.0 International License.
References
- T. Ravichandran, C. Lertwongsatien, and C. Ravichandran, T.Lertwongsatien, Chalermsak Lertwongsatien, “Effect of information systems resources and capabilities on firm performance: A resource-based perspective,” Journal of Management Information Systems, vol. 21, no. 4, pp. 237–276, Apr. 2005, doi: 10.1080/07421222.2005.11045820.
- F. R. Hizkia, N. B. Kurniawan, and Suhardi, “Hybrid IT value model validation for banking sector using partial adjustment valuation,” in 2017 International Conference on Information Technology Systems and Innovation (ICITSI), Oct. 2017, vol. 2018–Janua, pp. 54–60, doi: 10.1109/ICITSI.2017.8267918.
- L. M. Hitt and E. Brynjolfsson, “Productivity, business profitability, and consumer surplus: Three different measures of information technology value,” MIS Quarterly: Management Information Systems, vol. 20, no. 2, pp. 121–142, 1996, doi: 10.2307/249475.
- S. Rizq, M. D. Djamaludin, and Y. Nurhadryani, “Analysis of Service Quality Satisfaction of e-KTP Service at Public Administration and Civil Registration office of Bogor District,” Journal of Consumer Sciences, vol. 3, no. 2, p. 55, Aug. 2018, doi: 10.29244/jcs.3.2.55-65.
- A. Halik, “The Implementation of Administrative Registration on Population Migration (Case of Surabaya City, East Java Province),” Jurnal Bina Praja, vol. 8, no. 2, pp. 243–251, Nov. 2016, doi: 10.21787/jbp.08.2016.243-251.
- Z. Peiping and D. Zucheng, “The Design and Implementation of the Examination System Based on the Word – VBA,” no. Icmic, pp. 5–9, 2015.
- Y. Tan and S. Takakuwa, “A practical simulation approach for an effective truck dispatching system of open pit mines using VBA,” Proceedings - Winter Simulation Conference, vol. 0, no. 2009, pp. 2394–2405, 2016, doi: 10.1109/WSC.2016.7822279.
- K. Gaik, S. Long, T. Han, and R. Abdul-kahar, “The Fourth Order Runge-Kutta Spreadsheet Calculator Using VBA Programing For Ordinary Differential Equations,” Procedia - Social and Behavioral Sciences, vol. 204, no. November 2014, pp. 231–239, 2015, doi: 10.1016/j.sbspro.2015.08.145.
- M. E. Aminanto, “Development of Protection Profile and Security Target for Indonesia Electronic ID Card ’ s ( KTP-el ) Card Reader Based on Common Criteria V3 . 1 : 2012 / SNI ISO / IEC 15408 : 2014,” pp. 1–6, 2014.
- A. D. Method, “SPECIAL PROTECTION SYSTEM WITH MACRO VBA-BASED DESCENDING METHOD AT PT PLN ( PERSERO ) SOUTH AND CENTRAL,” pp. 51–54, 2019.
- Y. Dai, “Design and implementation of tourism education management system based on web,” Proceedings - 2016 International Conference on Intelligent Transportation, Big Data and Smart City, ICITBS 2016, pp. 428–431, 2017, doi: 10.1109/ICITBS.2016.112.
- S.-H. Moon and Y.-H. Kim, “An improved forecast of precipitation type using correlation-based feature selection and multinomial logistic regression,” Atmospheric Research, vol. 240, p. 104928, Aug. 2020, doi: 10.1016/j.atmosres.2020.104928.
- M. Carcary, E. Doherty, and C. Thornley, “Business innovation and differentiation: Maturing the IT capability,” IT Professional, vol. 17, no. 2, pp. 46–53, 2015, doi: 10.1109/MITP.2015.18.
- C. Florea, D. David, and A. Pop, “An approach to the didactic activity involving the use of new information and communication technology,” Procedia - Social and Behavioral Sciences, vol. 2, no. 2, pp. 1699–1702, 2010, doi: 10.1016/j.sbspro.2010.03.968.
- S. Kim, S. Hong, J. Oh, and H. Lee, “Obfuscated VBA Macro Detection Using Machine Learning,” in 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Jun. 2018, pp. 490–501, doi: 10.1109/DSN.2018.00057.
- Y. Bin, Z. Lei, J. Chun, and F. Shu-hai, “The Design and Development of Incentive Teaching System based on VBA,” no. 71171110, pp. 951–954, 2015, doi: 10.1109/ICICTA.2015.241.
- A. Sabani, M. H. Farah, and D. R. Sari Dewi, “Indonesia in the Spotlight: Combating Corruption through ICT enabled Governance,” Procedia Computer Science, vol. 161, pp. 324–332, 2019, doi: 10.1016/j.procs.2019.11.130.
Most read articles by the same author(s)
- Taufik Hidayat, Dewi Yunita Sari, Yasep Azzery, ANALISA PREDIKSI PERTUMBUHAN START-UP DI ERA INDUSTRI 4.0 MENGGUNAKAN METODE MARKOV CHAIN , TEKNOKOM: Vol. 3 No. 2 (2020): TEKNOKOM
- Taufik Hidayat, ENCRYPTION SECURITY SHARING DATA CLOUD COMPUTING BY USING AES ALGORITHM: A SYSTEMATIC REVIEW , TEKNOKOM: Vol. 2 No. 2 (2019): TEKNOKOM
- Luthfia Sodikin, Taufik Hidayat, ANALISA KEAMANAN E-COMMERCE MENGGUNAKAN METODE AES ALGORITMA , TEKNOKOM: Vol. 3 No. 2 (2020): TEKNOKOM
- Muhamad Dandi, Kinky Fernando, Taufik Hidayat, ANALISIS PREDIKSI TINGKAT KELULUSAN MAHASISWA UNIVERSITAS WIRALODRA INDRAMAYU MENGGUNAKAN METODE FUZZY TSUKAMOTO , TEKNOKOM: Vol. 3 No. 2 (2020): TEKNOKOM
- Indra Surya Permana, Taufik Hidayat, Rahutomo Mahardiko, RAW DATA SECURITY BY USING ELGAMAL AND SHA 256 PUBLIC KEY ALGORITHM , TEKNOKOM: Vol. 4 No. 1 (2021): TEKNOKOM
- Yasep Azzery, Nur Dwi Mulyanto, Taufik Hidayat, MEMORY FORENSIC DEVELOPMENT AND CHALLENGES IN IDENTIFYING DIGITAL CRIME : A REVIEW , TEKNOKOM: Vol. 5 No. 1 (2022): TEKNOKOM
- Ismail Ismail, Taufik Hidayat, TANTANGAN EKONOMI DIGITAL UNTUK PARIWISATA INDONESIA MENGGUNAKAN METODE FORECASTING , TEKNOKOM: Vol. 2 No. 2 (2019): TEKNOKOM
- Indra Surya Permana, Taufik Hidayat, Rahutomo Mahardiko, MOBILE SCANNER ADOPTION ANALYSIS BETWEEN EMPLOYMENT AND EDUCATIONAL BACKGROUND – AN ANALYSIS OF LOGISTIC REGRESSION , TEKNOKOM: Vol. 4 No. 2 (2021): TEKNOKOM
- Mohamad Adnan Fauzi, Rahmat Hidayat, Taufik Hidayat, STORAGE ROOM TEMPERATURE AND HUMIDITY MONITORING IOT- BASED MEDICINE , TEKNOKOM: Vol. 6 No. 2 (2023): TEKNOKOM
- Muhamad Dandi, Taufik Hidayat, ANALISIS PREDIKSI PROBLEM VIRTUAL MACHINE SERVER MENGGUNAKAN METODE FUZZY LOGIC , TEKNOKOM: Vol. 3 No. 1 (2020): TEKNOKOM