Information System Design and Application of the Critical Path Method (CPM) Determining the Optimal Time for Implementing Activities

Authors

  • Marsaa Noverdi Graceae Universitas Putra Indonesia YPTK Padang
  • Eva Rianti Universitas Putra Indonesia YPTK Padang
  • Hezy Kurnia Universitas Putra Indonesia YPTK Padang

DOI:

https://doi.org/10.35134/jcsitech.v10i3.108

Keywords:

Information Systems , Critical Path Method (CPM), Deterministic, Initial Target

Abstract

Information is the result of processing data from one or various sources, which is then processed so that it provides value, meaning and benefits. In the modern era, the use of technology plays a very important role as a means of information and promotion, especially in the field of websites in conveying information. The activity implementation plan carried out by the institution to determine the time period for completing activities still uses estimates as a guide. These estimates result in uncertain completion times. This is of course a problem in the implementation of activities, because late completion times result in time differences with the initial planned targets. Based on these conditions, the delivery of information is felt to be less than optimal because it does not yet have a website page, so the author feels that the West Sumatra Center for Public Policy Studies (PSKP) requires an information system that is able to support activities and provide information about the institution to be more effective and efficient. Then a schedule of the activity implementation process is needed from start to finish. One method that can be used for scheduling is the critical path method (CPM). This method is part of the work network method which is oriented towards determining schedules and estimating them which are deterministic (certain). With this CPM method, all activity processes are in accordance with the initial target

References

Putra, C. A. (2017). Pemanfaatan teknologi gadget sebagai media pembelajaran: Utilization of gadget technology as a learning media. Bitnet: Jurnal Pendidikan Teknologi Informasi, 2(2), 1-10.

Ama, A. T. (2021). Analisis Proyeksi Biaya Dan Waktu Pelaksanaan Proyek Konstruksi Dengan Metode Earned Value Management (Studi Kasus: Proyek Rehabilitasi Jalan Dan Pembangunan Jembatan Siangan-Lokasrana) (Doctoral dissertation, Universitas Mahasaraswati Denpasar).

Agustiar, I., & Handrianto, R. (2018). Evaluasi Penjadwalan Proyek Menggunakan Metode CPM Dan Kurva S. Wahana Teknik, 7(2), 99-105. https://doi.org/10.5281/zenodo.3634238

Purba, S. A. (2021). Analisis Jaringan Kerja dengan Metode Critical Path Method (CPM) dan Model Program Linier. Jurnal Absis: Jurnal Pendidikan Matematika dan Matematika, 4(1), 429-438. https://doi.org/10.30606/absis.v4i1.993

Tistogondo, J., Pratama, I. S., & Wulandari, D. A. R. (2024). Metode Percepatan Pembangunan Pasar Besar Ngawi Menggunakan Metode Half Slab. Ge-STRAM: Jurnal Perencanaan dan Rekayasa Sipil, 7(1), 8-15. https://doi.org/10.25139/jprs.v7i1.6632

Saputra, N., Handayani, E., & Dwiretnani, A. (2021). Analisa Penjadwalan Proyek dengan Metode Critical Path Method (CPM) Studi Kasus Pembangunan Gedung Rawat Inap RSUD Abdul Manap Kota Jambi. Jurnal Talenta Sipil, 4(1), 44-52. : http://dx.doi.org/10.33087/talentasipil.v4i1.48

Astari, N. M., Subagyo, A. M., & Kusnadi, K. (2022). Perencanaan Manajemen Proyek dengan Metode CPM (Critical Path Method) dan PERT (Program Evaluation and Review Technique). Konstruksia, 13(1), 164-180. https://doi.org/10.24853/jk.13.1.164-180

Muhammad, A., Kurniawan, B., Mufidah, A. P., & Pakarbudi, A. (2021, October). Analisa Jalur Kritis Pada Penjadwalan Proyek Pengembangan Sistem Informasi Menggunakan Teknik Critical Path Method (CPM)(Studi Kasus: PT. XYZ). In Prosiding Seminar Nasional Sains dan Teknologi Terapan (Vol. 9, No. 1, pp. 538-547).

Downloads

Published

2024-07-31

How to Cite

Graceae, M. N., Rianti, E., & Kurnia, H. (2024). Information System Design and Application of the Critical Path Method (CPM) Determining the Optimal Time for Implementing Activities. Journal of Computer Scine and Information Technology, 10(3), 88–92. https://doi.org/10.35134/jcsitech.v10i3.108