Agile Implementation for Inventory (Case study: Business Unit of Private University)
Abstract
The Unitomo Employee and Lecturer Business unit in the city of Surabaya, Indonesia, has several problems arising from the implementation of a manual system in the form of a paper-based system, which has the potential risks, such as 1) Damage and Risk of data loss, 2) Ineffectiveness in making reports; 3) Increased risk of human error caused by transaction volume, lack of management, and non-integration data; 4) Limited user accesses to the ledger, Time-consuming processes, and no collaboration. This research aims to overcome this problem by developing an inventory recording system using an Agile approach with the Scrum framework, PHP with the Slim 3 framework, MySQL, black box testing, and adding revenue and sales features as a difference from previous research. The research results show that the system developed was successful in helping Unitomo Business unit employees and lecturers overcome their problems, especially in monitoring the amount of inventory stock. The proposed system has features for recording incoming and outgoing goods transactions and sales and income reports. The use of the Agile Scrum method in software development helps teams in project planning and monitoring progress throughout the design process.
Downloads
References
Agarina, M., Karnila, S., Karim, A. S., & Zulkarnaini, Z. (2020). The Application of Scrum Agile Development Method in the Design of Marketing Information Systems and Supply of Goods in CV. Melodi Mega Kencana. Proceeding International Conference on Information Technology and Business (ICITB) 6, 158–167. https://jurnal.darmajaya.ac.id/index.php/icitb/article/view/2513
Akesinro, S. A., & Adetoso, J. A. (2016). The Effects of Computerized Accounting System on the Performance of Banks in Nigeria. Journal of Economics and Sustainable Development, 7(14), 76–82.
Apolonio, S. D., & Norona, M. I. (2021). Automating Inventory Management in Distribution Centers of a Leading Fast Moving Consumer Goods (FMCG) Industry Player in the Beverage Market: A Supply Chain 4.0 Journey. Proceedings of the Second Asia Pacific International Conference on Industrial Engineering and Operations Management, 1602–1614. https://ieomsociety.org/proceedings/2021indonesia/277.pdf
Arlindayani, E. V., Yutanto, H., & Sihotang, E. T. (2022). Analisis Penerapan Perhitungan Fisik dan Pencatatan Persediaan pada Koperasi Karyawan. Nominal: Barometer Riset Akuntansi Dan Manajemen Indonesia, 11(1), 102–116. https://doi.org/10.21831/nominal.v11i1.44257
Baumgart, R., Hummel, M., & Holten, R. (2015). Personality Traits of Scrum Roles in Agile Software Development Teams - A Qualitative Analysis. ECIS 2015 Completed Research Papers, 24. https://aisel.aisnet.org/ecis2015_cr/16/
Crowd. (2021). Sprint review meeting: What it is, how it works, how and when to do the sprint review. Crowd. https://blog.crowd.br.com/en/sprint-review-meeting/
Dewi, I. A., Miftahuddin, Y., Fattah, M. A., Palenda, C. B., & Erawan, S. F. (2021). Point of Sales System in InHome Café Website using Agile Methodology. Journal of Innovation and Community Engagement, 01(01), 1–19. https://doi.org/10.28932/jice.v1i1.3321
Eme, O., A, U. U. C., Uwazuruike, F. O., & Ukpai, C. U. (2018). Computer – based Drug Sales and Inventory Control System and its Applications in Pharmaceutical Stores. International Journal of Education and Management Engineering, 8(1), 30–39. https://doi.org/10.5815/ijeme.2018.01.04
Kaluvakuri, S., & Amin, R. (2018). From Paper Trails to Digital Success: The Evolution of E-Accounting. Asian Accounting and Auditing Advancement, 9(1), 73–88.
Kholifaturrahman, M., Rachmatullah, S., & Said, B. (2023). Decision Support System for Single Tuition Scholarship Awardees in Higher Education Using Mamdani Fuzzy Inference. Journal of Information Technology and Cyber Security, 1(2), 85–97. https://doi.org/10.30996/jitcs.10009
Magdalena, L. (2023). Scrum Agile: Optimalisasi Kualitas Produk Manajemen. Sonpedia Publishing Indonesia.
Muyunda, C. L., & Phiri, J. (2016). A Wireless Sensor Network Based Grain Inventory Management System for Zambia’s Food Reserve Agency. International Journal of Innovative Research in Science, Engineering and Technology, 5(3), 3519–3526. https://doi.org/10.15680/IJIRSET.2016.0503144
Naz, R., Khan, M. N. A., & Aamir, M. (2016). Scrum-Based Methodology for Product Maintenance and Support. International Journal of Engineering and Manufacturing, 6(1), 10–27. https://doi.org/10.5815/ijem.2016.01.02
Nurmaizal, F. G., Setiawan, M. J., & Mulani, A. P. (2023). PembuatanAplikasi Website Second Hand Menggunakan Metodologi Scrum. Jurnal Pendidikan Tambusai, 7, 20029–20039. https://jptam.org/index.php/jptam/article/view/9431
Oliverio, M. B. M., Panes, D. E. T., Vinluan, T. M. C., Intal, G. L., & Balan, A. K. (2023). Business Process Reengineering And ERP System Implementation Plan For A Manufacturing Company: A Case Study. Journal of Namibian Studies, 32(S1), 4622–4643. https://namibian-studies.com/index.php/JNS/article/view/4569
Rochman, A., Sidik, A., & Nazahah, N. (2018). Perancangan Sistem Informasi Administrasi Pembayaran SPP Siswa Berbasis Web di SMK Al-Amanah. Jurnal Sisfotek Global, 8(1), 51–56. https://doi.org/10.38101/sisfotek.v8i1.170
Setiawan, A. D., & Oktavia, P. (2022). Perancangan Sistem Aplikasi Inventori Barang pada Unit Usaha Toko Koperasi Karyawan PLN Pusdiklat. Scientia Sacra, 2(2), 292–299.
Sridhar, P., Vishnu, C. R., & Sridharan, R. (2021). Simulation of inventory management systems in retail stores: A case study. Materials Today: Proceedings. https://doi.org/10.1016/j.matpr.2021.05.314
Terho, H., Suonsyrjä, S., Systä, K., & Mikkonen, T. (2017). Understanding the Relations Between Iterative Cycles in Software Engineering. Proceedings of the 50th Hawaii International Conference on System Sciences, 5900–5909. https://scholarspace.manoa.hawaii.edu/items/dbcae0dc-92d9-4d15-8640-0064f05c1331
Wrike. (2015). What Is Scrum in Project Management? Wrike. https://www.wrike.com/project-management-guide/faq/what-is-scrum-in-project-management/
Copyright (c) 2024 The Author(s)

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Copyright Notice based on COPE (Committee on Publication Ethics) for JITCS: Journal of Information Technology and Cyber Security
-
Ownership and Copyright:
- JITCS: Journal of Information Technology and Cyber Security respects the intellectual property rights of authors. The copyright for individual articles published in JITCS is retained by the respective authors, unless otherwise specified.
- The articles published in JITCS are licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License (CC BY-NC-ND 4.0), which permits use and distribution in any medium, provided the original work is properly cited, the use is non-commercial, and no modifications or adaptations are made.
- JITCS serves as the initial publisher of the articles, providing them with the first publication platform.
-
Permissions and Usage:
- Distribution for Non-Commercial Purposes: Permitted: Users are allowed to distribute the article for non-commercial purposes, provided the original work is properly cited and no modifications or adaptations are made.
- Distribution for Commercial Purposes: Not Permitted: The article may not be distributed for any commercial purposes without obtaining prior written permission from the author(s).
- Inclusion in a Collective Work (e.g., Anthology) for Non-Commercial Purposes: Permitted: Users are allowed to include the article in a collective work, such as an anthology, as long as the use is non-commercial and the work remains unchanged.
- Inclusion in a Collective Work for Commercial Purposes: Not Permitted: The article may not be included in any collective work or anthology intended for commercial purposes without prior permission from the author(s).
- Creation and Distribution of Revised Versions, Adaptations, or Derivative Works (e.g., Translation) for Non-Commercial Purposes: Not Permitted: Users may not create or distribute revised versions, adaptations, or derivative works, including translations, for non-commercial purposes.
- Creation and Distribution of Revised Versions, Adaptations, or Derivative Works for Commercial Purposes: Not Permitted: Users may not create or distribute revised versions, adaptations, or derivative works, including translations, for commercial purposes.
- Text or Data Mining for Non-Commercial Purposes: Permitted: Users are permitted to engage in text or data mining of the article for non-commercial research purposes, provided the original work is properly attributed.
- Text or Data Mining for Commercial Purposes: Not Permitted: Users may not engage in text or data mining of the article for commercial purposes without obtaining explicit permission from the author(s).
-
Attribution and Citation:
- Proper attribution and citation of the published work should be provided when using or referring to content from JITCS. This includes clearly indicating the authors, the title of the article, the journal name (JITCS), the volume/issue number, the publication year, and the article's DOI (Digital Object Identifier) when available.
- When adapting or modifying the published content, proper attribution to the original source should be given, and the adapted or modified content should be shared under the same CC BY-NC-ND 4.0 license.
-
Plagiarism and Copyright Infringement:
- JITCS considers plagiarism and copyright infringement as serious ethical violations. Authors are responsible for ensuring that their submitted work is original and does not infringe upon the copyright or intellectual property rights of others.
- Any allegations of plagiarism or copyright infringement will be investigated promptly and thoroughly. If proven, appropriate actions, including rejection of the manuscript, retraction of the published article, or other corrective measures, will be taken.
-
Open Access Licensing:
- JITCS supports open access publishing and encourages authors to consider publishing their work under the CC BY-NC-ND 4.0 license to promote the dissemination and use of knowledge in the field of information technology and cyber security.
- The specific terms and conditions of the CC BY-NC-ND 4.0 license will be clearly indicated on the published articles.
-
Policy Review: This Copyright Notice will be periodically reviewed and updated to ensure its continued relevance and compliance with copyright laws, ethical standards, and open access principles in scholarly publishing. Any updates or revisions to the notice will be communicated to the relevant stakeholders.
By adhering to this Copyright Notice, JITCS aims to protect the rights of authors, promote proper attribution and citation practices, and facilitate the responsible and legal use of the published content in accordance with the CC BY-NC-ND 4.0 license.