Development of a Web-Based Spare Parts Inventory System Using the First-In, First-Out Method and Acceptance Analysis Based on the Unified Theory of Acceptance and Use of Technology
DOI:
https://doi.org/10.30996/jitcs.13042Keywords:
First-In, First-Out (FIFO), Inventory System, Pearson Correlation Coefficient, Rapid Application Development (RAD), Unified Theory of Acceptance and Use of Technology (UTAUT)Abstract
As a service-oriented company, Jaya Sentosa faces significant challenges in managing its spare parts inventory, leading to resource inefficiencies. Key issues include documentation discrepancies, inventory inconsistencies, and inadequate monitoring mechanisms. To address these problems, this study designs and implements a web-based information system, referred to as SIWEB-JS, aimed at enhancing inventory accuracy and operational efficiency. The system was developed using the Rapid Application Development (RAD) approach, adopting the First-In, First-Out (FIFO) principle, and built with PHP using the CodeIgniter v4.4.4 framework, supported by a MySQL database. System functionality was evaluated through Black-Box Testing, while user acceptance was assessed using the Unified Theory of Acceptance and Use of Technology (UTAUT). The results indicate that SIWEB-JS effectively records real-time transactions, maintains accurate inventory levels, and improves data accessibility. The implementation of FIFO contributed to better inventory governance. Furthermore, the UTAUT-based evaluation revealed that Performance Expectancy (PE), Effort Expectancy (EE), and Social Influence (SI) significantly influenced Behavioral Intention (BI), suggesting that the system is perceived as useful, user-friendly, and well-supported by users.
Downloads
References
Aprillianie, B., & Muarie, M. S. (2023). Pemodelan Proses Layanan Donasi Pada Dompet Dhuafa Menggunakan Business Process Modelling Notation (BPMN). Prosiding Seminar Nasional Teknologi Komputer dan Sains. 1, pp. 1-9. Medan, Indonesia: ADA Research Center. Retrieved 9 19, 2025, from https://prosiding.seminars.id/prosainteks/article/view/21
Barto, J., Eruguz, A. S., Spliet, R., & Wøhlk, S. (2024). Reduced food waste through inventory control despite throwing out food before expiration: Online vs. offline retail. Omega, 128. doi:https://doi.org/10.1016/j.omega.2024.103131
Bose, R., Mondal, H., Sarkar, I., & Roy, S. (2022). Design of smart inventory management system for construction sector based on IoT and cloud computing. e-Prime - Advances in Electrical Engineering, Electronics and Energy, 2. doi:https://doi.org/10.1016/j.prime.2022.100051
Dhika, H., Isnain, N., & Tofan, M. (2019). Manajemen Villa Menggunakan Java Netbeans dan MySQL. IKRA-ITH Informatika: Jurnal Komputer dan Informatika, 3(2), 104-110. Retrieved 9 19, 2025, from https://journals.upi-yai.ac.id/index.php/ikraith-informatika/article/view/324
Erlangga, S., Yunita, A., & Satriana, S. (2022). Development of Automatic Real Time Inventory Monitoring System using RFID Technology in Warehouse. International Journal on Informatics Visualization (JOIV), 6(3), 636-642. doi:https://dx.doi.org/10.30630/joiv.6.3.1231
Fazli, D. N., & Jurmaryadi, Y. (2019). Perancangan Sistem Informasi Inventory Menggunakan Metode FIFO (First In First Out) pada CV. Jaya Mas Elektronik. Ensiklopedia of Journal, 1(2), 22-27. Retrieved 9 19, 2025, from https://jurnal.ensiklopediaku.org/ojs-2.4.8-3/index.php/ensiklopedia/article/view/64
Firdaus, A. (2022). Pemodelan Proses Bisnis Konveksi di Tasikmalaya dengan Business Process Model and Notation (BPMN). Jurnal Ekonomi dan Bisnis Digital (MINISTAL), 1(3), 133–142. doi:https://doi.org/10.55927/ministal.v1i3.826
Gunawan, V., & Sutarman, S. (2020, Oct 13). Implementasi Model View Controller (MVC) dengan Framework Codeigniter pada E-Commerce (Studi Kasus: Gendhis Bags Yogykarta). Retrieved 9 19, 2025, from eprints Universitas Teknologi Yogyakarta: https://eprints.uty.ac.id/5749/
Hendri, H., Manurung, J. W., Ferian, R. A., Hanaatmoko, W. F., & Yulianti, Y. (2020). Pengujian Black Box pada Aplikasi Sistem Informasi Pengelolaan Masjid Menggunakan Teknik Equivalence Partitions. Jurnal Teknologi Sistem Informasi dan Aplikasi, 3(2), 107–113. doi:http://doi.org/10.32493/jtsi.v3i2.4694
Huda, N., & Amalia, R. (2020). Implementasi Sistem Informasi Inventaris Barang pada PT.PLN (Persero) Palembang. Jurnal Sisfokom (Sistem Informasi dan Komputer), 9(1), 13-19. doi:https://doi.org/10.32736/sisfokom.v9i1.674
Ikhwan, A., Amri, M. F., & Harahap, C. A. (2025). Design of Inventory Information System at CV. Graha Raya Consultant Company. Journal of Artificial Intelligence and Engineering Applications (JAIEA), 4(3), 1963-1967. doi:https://doi.org/10.59934/jaiea.v4i3.1056
Kusmaryono, I., Wijayanti, D., & Maharani, H. R. (2022). Number of Response Options, Reliability, Validity, and Potential Bias in the Use of the Likert Scale Education and Social Science Research: A Literature Review. International Journal of Educational Methodology, 8(4), 625-637. doi:https://doi.org/10.12973/ijem.8.4.625
Mathaba, S., Adigun, M., Oladosu, J., & Oki, O. (2017). On the use of the Internet of Things and Web 2.0 in inventory management. Journal of Intelligent & Fuzzy Systems, 32(4), 3091-3101. doi:https://doi.org/10.3233/JIFS-169252
Mbugi, I. O., & Lutego, D. (2022). Effects of Inventory Control Management Systems on Organization Performance in Tanzania Manufacturing Industry- A Case Study of Food and Beverage Manufacturing Company in Mwanza City. International Journal Of Engineering, Business And Management (IJEBM), 6(2), 56-69. doi:https://dx.doi.org/10.22161/ijebm.6.2.5
Mengying, L., Dongquan, F., Lin, L., Yining, C., Huijuan, H., Siyu, Z., & Dan, Y. (2024). Pathway analysis of clinical nurse educator’s intention to use virtual reality technology based on the UTAUT model. Frontiers in Public Health, 12. doi:https://doi.org/10.3389/fpubh.2024.1437699
Murdiani, D., & Sobirin, M. (2022). Perbandingan Metodologi Waterfall dan RAD (Rapid Application Development) dalam Pengembangan Sistem Informasi. Jurnal Informatika Teknologi dan Sains (Jinteks), 4(4), 302-306. doi:https://doi.org/10.51401/jinteks.v4i4.2008
Novendri, M. S., Saputra, A., & Firman, C. E. (2019). Aplikasi Inventaris Barang pada MTs Nurul Islam Dumai Menggunakan PHP dan MySQL. Lentera Dumai : Jurnal Manajemen dan Teknologi Informasi, 10(2), 46-57. Retrieved 9 19, 2025, from https://download.garuda.kemdikbud.go.id/article.php?article=1278393&val=17003&title=APLIKASI%20INVENTARIS%20BARANG%20PADA%20MTS%20NURUL%20ISLAM%20DUMAI%20MENGGUNAKAN%20PHP%20DAN%20MYSQL
Nursichati, N., Susongko, P., & Mulyono, T. (2025). Critical Thinking Ability Test Instrument Design with Validity Test Pearson Correlation. Journal of English Language and Education, 10(1), 329-341. doi:https://doi.org/10.31004/jele.v10i1.642
Roosevelt, S. C., Veemaraj, E., & Kirubakaran, S. (2024). Real Time Stock Inventory Management System. 2024 8th International Conference on Inventive Systems and Control (ICISC). 8. Coimbatore, India: IEEE. doi:https://doi.org/10.1109/ICISC62624.2024.00034
Saputera, S. A., Sunardi, D., & Zulkarnain, J. (2022). Implementasi Siklus Rapid Aplication Devlopment Pada Pengembangan Sistem Informasi Inventaris. Jurnal Sistem Informasi dan E-Bisnis (JUSIBI), 4(1), 20-30. doi:https://doi.org/10.54650/jusibi.v4i1.423
Sembiring, A. C., Tampubolon, J., Sitanggang, D., Turnip, M., & Subash, S. (2019). Improvement of Inventory System Using First In First Out (FIFO) Method. Journal of Physics: Conference Series, 1361, 1361. doi:http://doi.org/10.1088/1742-6596/1361/1/012070
Setyaedhi, H. S. (2024). Comparative Test of Cronbach's Alpha Reliability Coefficient, Kr-20, Kr-21, And Split-Half Method. Journal of Education Research and Evaluation, 8(1), 47–57. doi:https://doi.org/10.23887/jere.v8i1.68164
Sholiq, S., & Yaqin, M. A. (2024). BPMN diagram dataset: Comprehensive collection of functional requirements. Data in Brief, 57. doi:https://doi.org/10.1016/j.dib.2024.110882
Syahroni, A. W., Heryadi, Y., Multazami, R., & Ramadhani, N. (2021). Rancang Bangun Website Rumah Tahfidz Al-Quran. Jurnal Sistem Informasi dan Manajemen (JURSIMA), 9(3), 350-359.
Tan, J. P., Tan, M. W., Towle, R. M., Lee, J. S., Lei, X., Liu, Y., . . . Low, L. L. (2023). mHealth App to Facilitate Remote Care for Patients With COVID-19: Rapid Development of the DrCovid+ App. JMIR Formative Research, 7. doi:https://doi.org/10.2196/38555
Usnaini, M., Yasin, V., & Sianipar, A. Z. (2021). Perancangan sistem informasi inventarisasi aset berbasis web menggunakan metode waterfall. Jurnal Manajemen Informatika Jayakarta, 1(1), 36-55. doi:https://doi.org/10.52362/jmijayakarta.v1i1.415
Wijaya, K., & Christian, A. (2019). Implementasi Metode Model View Controller (MVC) Dalam Rancang Bangun Website SMK Yayasan Bakti Prabumulih. Paradigma, 21(1), 95-102. doi:https://doi.org/10.31294/p.v21i1.5092
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 The Author(s)

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Copyright Notice based on COPE (Committee on Publication Ethics) for JITCS: Journal of Information Technology and Cyber Security
-
Ownership and Copyright:
- JITCS: Journal of Information Technology and Cyber Security respects the intellectual property rights of authors. The copyright for individual articles published in JITCS is retained by the respective authors, unless otherwise specified.
- The articles published in JITCS are licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License (CC BY-NC-ND 4.0), which permits use and distribution in any medium, provided the original work is properly cited, the use is non-commercial, and no modifications or adaptations are made.
- JITCS serves as the initial publisher of the articles, providing them with the first publication platform.
-
Permissions and Usage:
- Distribution for Non-Commercial Purposes: Permitted: Users are allowed to distribute the article for non-commercial purposes, provided the original work is properly cited and no modifications or adaptations are made.
- Distribution for Commercial Purposes: Not Permitted: The article may not be distributed for any commercial purposes without obtaining prior written permission from the author(s).
- Inclusion in a Collective Work (e.g., Anthology) for Non-Commercial Purposes: Permitted: Users are allowed to include the article in a collective work, such as an anthology, as long as the use is non-commercial and the work remains unchanged.
- Inclusion in a Collective Work for Commercial Purposes: Not Permitted: The article may not be included in any collective work or anthology intended for commercial purposes without prior permission from the author(s).
- Creation and Distribution of Revised Versions, Adaptations, or Derivative Works (e.g., Translation) for Non-Commercial Purposes: Not Permitted: Users may not create or distribute revised versions, adaptations, or derivative works, including translations, for non-commercial purposes.
- Creation and Distribution of Revised Versions, Adaptations, or Derivative Works for Commercial Purposes: Not Permitted: Users may not create or distribute revised versions, adaptations, or derivative works, including translations, for commercial purposes.
- Text or Data Mining for Non-Commercial Purposes: Permitted: Users are permitted to engage in text or data mining of the article for non-commercial research purposes, provided the original work is properly attributed.
- Text or Data Mining for Commercial Purposes: Not Permitted: Users may not engage in text or data mining of the article for commercial purposes without obtaining explicit permission from the author(s).
-
Attribution and Citation:
- Proper attribution and citation of the published work should be provided when using or referring to content from JITCS. This includes clearly indicating the authors, the title of the article, the journal name (JITCS), the volume/issue number, the publication year, and the article's DOI (Digital Object Identifier) when available.
- When adapting or modifying the published content, proper attribution to the original source should be given, and the adapted or modified content should be shared under the same CC BY-NC-ND 4.0 license.
-
Plagiarism and Copyright Infringement:
- JITCS considers plagiarism and copyright infringement as serious ethical violations. Authors are responsible for ensuring that their submitted work is original and does not infringe upon the copyright or intellectual property rights of others.
- Any allegations of plagiarism or copyright infringement will be investigated promptly and thoroughly. If proven, appropriate actions, including rejection of the manuscript, retraction of the published article, or other corrective measures, will be taken.
-
Open Access Licensing:
- JITCS supports open access publishing and encourages authors to consider publishing their work under the CC BY-NC-ND 4.0 license to promote the dissemination and use of knowledge in the field of information technology and cyber security.
- The specific terms and conditions of the CC BY-NC-ND 4.0 license will be clearly indicated on the published articles.
-
Policy Review: This Copyright Notice will be periodically reviewed and updated to ensure its continued relevance and compliance with copyright laws, ethical standards, and open access principles in scholarly publishing. Any updates or revisions to the notice will be communicated to the relevant stakeholders.
By adhering to this Copyright Notice, JITCS aims to protect the rights of authors, promote proper attribution and citation practices, and facilitate the responsible and legal use of the published content in accordance with the CC BY-NC-ND 4.0 license.


