The Waterfall Model in the Implementation of a Room Reservation Information System: A Case Study at a University
Abstract
Politeknik Negeri Jember (National State of Jember Polytechnic), Indonesia, fully understand that infrastructure is one among various key factors to enhance the quality of the university. However, in the department of Information Technology, infrastructure management is a prominent issue. The primary cause of the issue appears to be a manual arrangement of room reservations, as room usage often crashes due to the scheduling mismatch. To tackle this issue, this study focuses on the development of a room reservation information system, known as “Sistem Informasi Peminjaman Ruangan dan Sarana Pembelajaran (SIPRu)”. The system is developed as an additional feature in the department website. It is developed using the Waterfall method, beginning with the requirements analysis (i.e., an identification of functional and non-functional requirements) and architectural processes design processes (i.e., the development of use case diagram, flowchart, data flow diagram, and database design). In this study, Laravel is used for the implementation, and black box testing is used to verify compliance with the functional requirements. During the testing process, 42 department stakeholders participated to validate the requirements and conduct user experience testing. The results indicated that the stakeholders have found the website to be sufficiently responsive to their needs. Furthermore, it is revealed that SIPRu is effective at assisting users in reserving rooms at the department of Information Technology, National State of Jember Polytechnic.
Downloads
References
Acharya, K. (2022). Social Media Management System Project Report. Kathmandu, Nepal: Tribhuvan University. Retrieved from https://www.authorea.com/doi/pdf/10.22541/au.172252491.11210579
Badan Pusat Statistik. (2023, February 20). Jumlah Perguruan Tinggi1, Dosen, dan Mahasiswa2 (Negeri dan Swasta) di Bawah Kementerian Pendidikan, Kebudayaan, Riset, dan Teknologi Menurut Provinsi, 2022. Retrieved from Badan Pusat Statistik: https://www.bps.go.id/id/statistics-table/3/Y21kVGRHNXZVMEl3S3pCRlIyMHJRbnB1WkVZemR6MDkjMw==/jumlah-perguruan-tinggi--tenaga-pendidik-dan-mahasiswa-negeri-dan-swasta--di-bawah-kementerian-riset--teknologi-dan-pendidikan-tinggi-kementerian-pendidikan-dan-k
Basir, M. S., Buckmaster, D., Raturi, A., & Zhang, Y. (2024). From pen and paper to digital precision: a comprehensive review of on farm recordkeeping. From pen and paper to digital precision: a comprehensive review of on-farm recordkeeping, 25, 2643–2682. doi:https://doi.org/10.1007/s11119-024-10172-7
Despa, M. L. (2015). Comparative study on software development methodologies. Database Systems Journal, 5(3), 37-56. Retrieved from https://dbjournal.ro/archive/17/17_4.pdf
Kementerian Pendidikan, Kebudayaan, Riset, dan Teknologi Republik Indonesia. (2024, December 2). Informasi Umum KIP Kuliah. Retrieved from Kementerian Pendidikan, Kebudayaan, Riset, dan Teknologi Republik Indonesia: https://pusatinformasi.ult.kemdikbud.go.id/hc/id/articles/40655706075545-Informasi-Umum-KIP-Kuliah
Kementerian Pendidikan, Kebudayaan, Riset, dan Teknologi Republik Indonesia. (2024, August 30). Seleksi Penerimaan CPNS Kemdikbudristek TA 2024. Retrieved from Kementerian Pendidikan, Kebudayaan, Riset, dan Teknologi Republik Indonesia: https://casn.kemdikbud.go.id/cpns/cpns2024
LAM INFOKOM. (2022, February). Peraturan PerBAN-PT No. 8 Th 2022 ttg IAPS Sarjana INFOKOM. Retrieved from LAM INFOKOM: https://laminfokom.or.id/official/instrumen1.html
Lubis, A. (2014). Evaluasi Tingkat Penerimaan Sistem Informasi Layanan Pengadaan Secara Elektronik oleh Pengusaha Menggunakan Metode Tecnology Acceptance Model (TAM) (Studi Kasus Rokan Hulu). Jurnal Ilmiah Cano Ekonomos, 3(2), 159-176.
Mangla, A. S., Ojasvi, O., Singh, P., & Dubey, S. K. (2024). Design and Development of a QR-Based Automated Form Filling Application. 2024 11th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO). Noida, India: IEEE. doi:https://doi.org/10.1109/ICRITO61523.2024.10522430
Nugraha, M., Setiawan, R. A., Fathi, H., & Baginda, M. R. (2023). Development a Web-Based Student Internship Application Using Laravel Framework and Waterfall Model. Journal of Information Technology and Its Utilization, 6(1), 31-38. doi:https://doi.org/10.56873/jitu.6.1.5139
Pargaonkar, S. (2023). A Comprehensive Research Analysis of Software Development Life Cycle (SDLC) Agile & Waterfall Model Advantages, Disadvantages, and Application Suitability in Software Quality Engineering. International Journal of Scientific and Research Publications, 13(8), 120-124. doi:http://dx.doi.org/10.29322/IJSRP.13.08.2023.p14015
Rachman, G. H., Gumilang, S. F., & Adi, T. N. (2015). Development of Web Application Based on Crowdsourcing for Car Rental Management by Using Scrum Methodology (Customer Side)., 2, pp. 5491-5498. Retrieved from https://openlibrarypublications.telkomuniversity.ac.id/index.php/engineering/article/view/2257
Rahma, F. A., & Samsudin, S. (2024). Android-Based Sports Infrastructure E-Booking Application at Provincial Youth and Sports Office Using Waterfall Method. Journal of Computer Networks, Architecture and High Performance Computing, 6(4), 1769-1780. doi:https://doi.org/10.47709/cnahpc.v6i4.4804
Rochmawati, N., Buditjahjanto, I. G., Putra, R. E., & Wicaksono, A. Y. (2018). A Responsive Web-Based QR Code for Inventory in The Laboratory of Informatics, UNESA. The 2nd Annual Applied Science and Engineering Conference (AASEC 2017). 288. Bandung, Indonesia: IOPscience. doi:https://doi.org/10.1088/1757-899X/288/1/012109
Sayekti, F., & Putarta, P. (2016). Penerapan Technology Acceptance Model (TAM) dalam Pengujian Model Penerimaan Sistem Informasi Keuangan Daerah. Jurnal Manajemen Teori dan Terapan, 9(3), 196-209. Retrieved from https://e-journal.unair.ac.id/index.php/JMTT/article/download/3075/2237
Sharma, P., & Hasteer, N. (2016). Analysis of linear sequential and extreme programming development methodology for a gaming application. 2016 International Conference on Communication and Signal Processing (ICCSP). Melmaruvathur, India: IEEE. doi:https://doi.org/10.1109/ICCSP.2016.7754505
Wahyudi, F., & Utomo, L. T. (2020). Design and Development of Information System of Population and Civil Registration Office of Malang Regency Based on Android. JEEMECS (Journal of Electrical Engineering, Mechatronic and Computer Science), 3(2), 105-110. doi: https://doi.org/10.26905/jeemecs.v3i2.4345
Wicaksono, S. R. (2022). Teori Dasar Technology Acceptance Model . Malang, Indonesia: Seribu Bintang.
Copyright (c) 2024 The Authors

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Copyright Notice based on COPE (Committee on Publication Ethics) for JITCS: Journal of Information Technology and Cyber Security
-
Ownership and Copyright:
- JITCS: Journal of Information Technology and Cyber Security respects the intellectual property rights of authors. The copyright for individual articles published in JITCS is retained by the respective authors, unless otherwise specified.
- The articles published in JITCS are licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License (CC BY-NC-ND 4.0), which permits use and distribution in any medium, provided the original work is properly cited, the use is non-commercial, and no modifications or adaptations are made.
- JITCS serves as the initial publisher of the articles, providing them with the first publication platform.
-
Permissions and Usage:
- Distribution for Non-Commercial Purposes: Permitted: Users are allowed to distribute the article for non-commercial purposes, provided the original work is properly cited and no modifications or adaptations are made.
- Distribution for Commercial Purposes: Not Permitted: The article may not be distributed for any commercial purposes without obtaining prior written permission from the author(s).
- Inclusion in a Collective Work (e.g., Anthology) for Non-Commercial Purposes: Permitted: Users are allowed to include the article in a collective work, such as an anthology, as long as the use is non-commercial and the work remains unchanged.
- Inclusion in a Collective Work for Commercial Purposes: Not Permitted: The article may not be included in any collective work or anthology intended for commercial purposes without prior permission from the author(s).
- Creation and Distribution of Revised Versions, Adaptations, or Derivative Works (e.g., Translation) for Non-Commercial Purposes: Not Permitted: Users may not create or distribute revised versions, adaptations, or derivative works, including translations, for non-commercial purposes.
- Creation and Distribution of Revised Versions, Adaptations, or Derivative Works for Commercial Purposes: Not Permitted: Users may not create or distribute revised versions, adaptations, or derivative works, including translations, for commercial purposes.
- Text or Data Mining for Non-Commercial Purposes: Permitted: Users are permitted to engage in text or data mining of the article for non-commercial research purposes, provided the original work is properly attributed.
- Text or Data Mining for Commercial Purposes: Not Permitted: Users may not engage in text or data mining of the article for commercial purposes without obtaining explicit permission from the author(s).
-
Attribution and Citation:
- Proper attribution and citation of the published work should be provided when using or referring to content from JITCS. This includes clearly indicating the authors, the title of the article, the journal name (JITCS), the volume/issue number, the publication year, and the article's DOI (Digital Object Identifier) when available.
- When adapting or modifying the published content, proper attribution to the original source should be given, and the adapted or modified content should be shared under the same CC BY-NC-ND 4.0 license.
-
Plagiarism and Copyright Infringement:
- JITCS considers plagiarism and copyright infringement as serious ethical violations. Authors are responsible for ensuring that their submitted work is original and does not infringe upon the copyright or intellectual property rights of others.
- Any allegations of plagiarism or copyright infringement will be investigated promptly and thoroughly. If proven, appropriate actions, including rejection of the manuscript, retraction of the published article, or other corrective measures, will be taken.
-
Open Access Licensing:
- JITCS supports open access publishing and encourages authors to consider publishing their work under the CC BY-NC-ND 4.0 license to promote the dissemination and use of knowledge in the field of information technology and cyber security.
- The specific terms and conditions of the CC BY-NC-ND 4.0 license will be clearly indicated on the published articles.
-
Policy Review: This Copyright Notice will be periodically reviewed and updated to ensure its continued relevance and compliance with copyright laws, ethical standards, and open access principles in scholarly publishing. Any updates or revisions to the notice will be communicated to the relevant stakeholders.
By adhering to this Copyright Notice, JITCS aims to protect the rights of authors, promote proper attribution and citation practices, and facilitate the responsible and legal use of the published content in accordance with the CC BY-NC-ND 4.0 license.