Design and Implementation of Digital Transmitter Monitoring Information System for TVRI East Java Transmission Unit Using Scrum Framework
DOI:
https://doi.org/10.30996/jitcs.12979Keywords:
monitoring information system, scrum, Technology Acceptance Model, transmitter monitoring, TVRIAbstract
The Digital Transmitter Monitoring Information System for the TVRI East Java Transmission Unit is developed to enhance efficiency in recording and monitoring transmitter conditions, which were previously documented manually using logbooks. This system is designed to facilitate operators in recording technical transmitter data and assist technicians in the failure analysis process. The development method used is the Scrum methodology, allowing the system to be developed iteratively with improvements based on user feedback. System testing is conducted using Black-Box Testing to ensure all features function according to user requirements, while system acceptance evaluation is carried out using the Technology Acceptance Model (TAM) to measure the system's usability and ease of use. The testing results indicate that all system features function properly without significant errors. The TAM evaluation produced an average score of 84.5% for perceived usefulness and 86.5% for perceived ease of use, indicating that the system is well accepted by users. With key features such as transmitter data recording, reporting, employee performance tracking, and data export, this system is expected to help TVRI East Java monitor digital transmitters more effectively and efficiently. Compared to the previous manual logbook system, this digital-based approach reduces dependency on physical documentation, minimizes the risk of data loss, and improves accessibility for operators and technicians. By enabling centralized data storage and streamlined reporting, the system ensures that monitoring activities are more structured, responsive, and cost-effective.
Downloads
References
Belmonte, Z. J., Prasetyo, Y. T., Cahigas, M. M., Nadlifatin, R., & Gumasing, M. J. (2024). Factors influencing the intention to use e-wallet among generation Z and millennials in the Philippines: An extended technology acceptance model (TAM) approach. Acta Psychologica, 250. doi:https://doi.org/10.1016/j.actpsy.2024.104526
Dewi, I. K., & Chairun, R. (2022). Sistem Informasi Monitoring Perbaikan dan Perawatan Pada Divisi Mekanik PT. XYZ. JR: Jurnal Responsive Teknik Informatika, 6(1), 49-61. doi:https://doi.org/10.36352/jr.v6i01.552
Eiter, S., Fjellstad, W., & Schaik, L. V. (2025). Monitoring sustainability of urban agriculture: Who is going to do it and how? Landscape and Urban Planning, 257. doi:https://doi.org/10.1016/j.landurbplan.2025.105300
Hakim, A., Marwiyati, M., Wahyudin, A., & Kristiadi, D. (2022). Penerapan Teknologi Siaran Digital Bagi LPP TVRI Jawa Timur. Jurnal Heritage, 10(1), 59-71. doi:https://doi.org/10.35891/heritage.v10i1.3196
Herdiansah, A., Borman, R. I., & Maylinda, S. (2021). Sistem Informasi Monitoring dan Reporting Quality Control Proses Laminating Berbasis Web Framework Laravel. Jurnal Tekno Kompak, 15(2), 13-24. doi:https://doi.org/10.33365/jtk.v15i2.1091
Kabir, K. H., Hassan, F., Mukta, M. Z., Roy, D., Darr, D., Leggette, H., & Ullah, S. A. (2022). Application of the technology acceptance model to assess the use and preferences of ICTs among field-level extension officers in Bangladesh. Digital Geography and Society, 3. doi:https://doi.org/10.1016/j.diggeo.2022.100027
Kadenic, M. D., Pacheco, D. A., Koumaditis, K., Tjørnehøj, G., & Tambo, T. (2023). Investigating the role of Product Owner in Scrum teams: Differentiation between organisational and individual impacts and opportunities. Journal of Systems and Software, 206. doi:https://doi.org/10.1016/j.jss.2023.111841
Katic, M. (2024). Effects of Daily Scrum Meeting on Software Quality–Open Questions. Proceedings of the Eleventh Workshop on Software Quality Analysis, Monitoring, Improvement, and Applications. 3845. Novi Sad, Serbia: CEUR-WS. Retrieved 8 15, 2025, from https://ceur-ws.org/Vol-3845/paper24.pdf
Kurniadi, D., Setiawan, R., & Ginanjar, G. P. (2023). Development of Information System Monitoring and Reporting on Company Employee Performance Using Balanced Scorecard and Scrum. JATISI (Jurnal Teknik Informatika dan Sistem Informasi), 10(1), 366-380. doi:https://doi.org/10.35957/jatisi.v10i1.3168
Lawong, D. A., & Akanfe, O. (2025). Overcoming team challenges in project management: The scrum framework. Organizational Dynamics, 54(1). doi:https://doi.org/10.1016/J.ORGDYN.2024.101073
Mansour, M. (2025). A mm-Wave On-Off-Keying radio transmitter with 10 GHz bandwidth employing 130 nm CMOS. Ain Shams Engineering Journal, 16(3). doi:https://doi.org/10.1016/j.asej.2025.103328
Nasution, N., Darmayunata, Y., & Wahyuni, S. (2022). Information System Design for Monitoring and Evaluation of Learning on Blended Learning. Al-Ishlah: Jurnal Pendidikan, 14(2), 1633-1644. doi:https://doi.org/10.35445/alishlah.v14i2.1368
Numa, Y., & Ohnishi, A. (2023). Supporting change management of UML class diagrams. Procedia Computer Science, 225, 208-217. doi:https://doi.org/10.1016/j.procs.2023.10.005
Purnama, D. H., Purwanto, P., & Herdiyanto, H. (2023). Pembangunan Sistem Informasi Monitoring Karyawan pada Bagian Logistik di PT. Mowilex Indonesia. Zonasi: Jurnal Sistem Informasi, 5(1), 111 - 125. doi:https://doi.org/10.31849/zn.v5i1.12831
Ramadaniah, D., Fitra, J., Satria, F., & Zidane, E. Y. (2022). Design of Library Information System Based on Framework Code Igniter Case Study of Instidla. Asia Information System Journal (AISJ), 1(1), 15-20. doi:https://doi.org/10.24042/aisj.v1i1.13622
Santos, R., Piqueiro, H., Dias, R., & Rocha, C. D. (2024). Transitioning trends into action: A simulation-based Digital Twin architecture for enhanced strategic and operational decision-making. Computers & Industrial Engineering, 198. doi:https://doi.org/10.1016/j.cie.2024.110616
Setiawan, D., Fatimah, F., & Primasari, D. (2023). Pengembangan Sistem Informasi Duta Inovasi Desa Berbasis WEB Menggunakan Metode Scrum. Processor: Jurnal Ilmiah Sistem Informasi, Teknologi Informasi dan Sistem Komputer, 18(1), 26-39. doi:https://doi.org/10.33998/processor.2023.18.1.191
Wei, W., Prasetyo, Y. T., Belmonte, Z. J., Cahigas, M. M., Nadlifatin, R., & Gumasing, M. J. (2025). Applying the technology acceptance model – Theory of planned behavior (TAM-TPB) model to study the acceptance of building information modeling (BIM) in green building in China. Acta Psychologica, 254. doi:https://doi.org/10.1016/j.actpsy.2025.104790
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 The Author(s)

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Copyright Notice based on COPE (Committee on Publication Ethics) for JITCS: Journal of Information Technology and Cyber Security
-
Ownership and Copyright:
- JITCS: Journal of Information Technology and Cyber Security respects the intellectual property rights of authors. The copyright for individual articles published in JITCS is retained by the respective authors, unless otherwise specified.
- The articles published in JITCS are licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License (CC BY-NC-ND 4.0), which permits use and distribution in any medium, provided the original work is properly cited, the use is non-commercial, and no modifications or adaptations are made.
- JITCS serves as the initial publisher of the articles, providing them with the first publication platform.
-
Permissions and Usage:
- Distribution for Non-Commercial Purposes: Permitted: Users are allowed to distribute the article for non-commercial purposes, provided the original work is properly cited and no modifications or adaptations are made.
- Distribution for Commercial Purposes: Not Permitted: The article may not be distributed for any commercial purposes without obtaining prior written permission from the author(s).
- Inclusion in a Collective Work (e.g., Anthology) for Non-Commercial Purposes: Permitted: Users are allowed to include the article in a collective work, such as an anthology, as long as the use is non-commercial and the work remains unchanged.
- Inclusion in a Collective Work for Commercial Purposes: Not Permitted: The article may not be included in any collective work or anthology intended for commercial purposes without prior permission from the author(s).
- Creation and Distribution of Revised Versions, Adaptations, or Derivative Works (e.g., Translation) for Non-Commercial Purposes: Not Permitted: Users may not create or distribute revised versions, adaptations, or derivative works, including translations, for non-commercial purposes.
- Creation and Distribution of Revised Versions, Adaptations, or Derivative Works for Commercial Purposes: Not Permitted: Users may not create or distribute revised versions, adaptations, or derivative works, including translations, for commercial purposes.
- Text or Data Mining for Non-Commercial Purposes: Permitted: Users are permitted to engage in text or data mining of the article for non-commercial research purposes, provided the original work is properly attributed.
- Text or Data Mining for Commercial Purposes: Not Permitted: Users may not engage in text or data mining of the article for commercial purposes without obtaining explicit permission from the author(s).
-
Attribution and Citation:
- Proper attribution and citation of the published work should be provided when using or referring to content from JITCS. This includes clearly indicating the authors, the title of the article, the journal name (JITCS), the volume/issue number, the publication year, and the article's DOI (Digital Object Identifier) when available.
- When adapting or modifying the published content, proper attribution to the original source should be given, and the adapted or modified content should be shared under the same CC BY-NC-ND 4.0 license.
-
Plagiarism and Copyright Infringement:
- JITCS considers plagiarism and copyright infringement as serious ethical violations. Authors are responsible for ensuring that their submitted work is original and does not infringe upon the copyright or intellectual property rights of others.
- Any allegations of plagiarism or copyright infringement will be investigated promptly and thoroughly. If proven, appropriate actions, including rejection of the manuscript, retraction of the published article, or other corrective measures, will be taken.
-
Open Access Licensing:
- JITCS supports open access publishing and encourages authors to consider publishing their work under the CC BY-NC-ND 4.0 license to promote the dissemination and use of knowledge in the field of information technology and cyber security.
- The specific terms and conditions of the CC BY-NC-ND 4.0 license will be clearly indicated on the published articles.
-
Policy Review: This Copyright Notice will be periodically reviewed and updated to ensure its continued relevance and compliance with copyright laws, ethical standards, and open access principles in scholarly publishing. Any updates or revisions to the notice will be communicated to the relevant stakeholders.
By adhering to this Copyright Notice, JITCS aims to protect the rights of authors, promote proper attribution and citation practices, and facilitate the responsible and legal use of the published content in accordance with the CC BY-NC-ND 4.0 license.


