Home| Contact Us| New Journals| Browse Journals| Journal Prices| For Authors|

Print ISSN: 2230 – 8776
Online ISSN:


  About JISM
  DLINE Portal Home
Home
Aims & Scope
Editorial Board
Current Issue
Next Issue
Previous Issue
Sample Issue
Upcoming Conferences
Self-archiving policy
Alert Services
Be a Reviewer
Publisher
Paper Submission
Subscription
Contact us
 
  How To Order
  Order Online
Price Information
Request for Complimentary
Print Copy
 
  For Authors
  Guidelines for Contributors
Online Submission
Call for Papers
Author Rights
 
 
RELATED JOURNALS
Journal of Digital Information Management (JDIM)
Journal of Multimedia Processing and Technologies (JMPT)
International Journal of Web Application (IJWA)

 

 
Journal of Information & Systems Management (JISM)

Project Management Plan Design for Developing E-learning Content
Ketmanto, Devi Pratami, Muhamad Azani Hasibuan, Deden Witarsyah Jacob
School of Industrial and System Engineering Telkom University Jalan Terusan Buah Batu No.01, Bandung, 40257, Indonesia
Abstract: E-learning is considered as a better learning that provides technology assistance to support learning. While elearning gives more flexibility toward learning, the creation of e-learning content needs more attention. The purpose of the paper is to provide project management plan based on Project Management Body of Knowledge or PMBOK in short, to the creation of e-learning content. The creation of something that produces product, service or result is considered as a project. In other words, the e-learning content creation is one of the definitive project. However, 71% of the projects were failed or challenged and one of the top reasons why project failed is bad estimates of planning in the project. Even more challenging, elearning project suffers more than the failure rate of information system. Just having a plan and poor planning may lead to failed project. Nevertheless, the e-learning project needs project management plan. Rather than as a methodology of the research, the project management plan can be considered as a guide to carry out the work in the project. The study found that the project management plan consists of scope, time, cost and quality. This research will be useful for those who concerned in creating project management plan. Mostly of project plans are based on scope, time, and schedule. But it remains to be seen whether the product has met the customer or owner expectation. Thus solution to the e-learning project failure lies in creating project management plan which includes scope, schedule, cost, and quality.
Keywords: E-learning, Project Management, Project Management Plan, Agile
DOI:https://doi.org/10.6025/jism/2019/9/2/37-47
Full_Text   PDF (304 KB)   Download:   360  times
References:[1] Zhu, S., Han, Y., Wei, Y. (2015). Controlling Outsourcing Data in Cloud Computing with Attribute-Based Encryption, International Conference on Intelligent Networking and Collaborative Systems, p. 257-261. [2] Tamizharasi, Balamurugan, G. S.B., Manjula, R. (2016). Attribute Based Encryption with Fine-grained Access Provision in Cloud Computing, Proceedings of the International Conference on Informatics and Analytics. ACM. [3] Chandrasekaran, B., Balakrishnan, R. (2016). Attribute Based Encryption Using Quadratic Residue for the Big Data in Cloud Environment, Proceedings of the International Conference on Informatics and Analytics. ACM. [4] Kaci, A., Bouabana-Tebibel, T. (2014). Access Control Reinforcement over Searchable Encryption, IEEE IRI 2014, August 13-15, 2014, San Francisco, California, USA, p.130-137. [5] Li, J., Shi, Y., Zhang, Y. (2015). Searchable ciphertext-policy attribute-based encryption with revocation in cloud storage, International Journal of Communication Systems International Joirnal of Communication System. [6] Li, L., Chen, X., Jiang, H. (2016). P-CP-ABE: Parallelizing Ciphertext-Policy Attribute-Based Encryption for Clouds, 17th IEEE/ ACIS International Conference on. IEEE, p.1-6. [7] Wang, S., Zhou, J., Liu, J. K., Yu, J., Chen, J., Xie, W. (2016). An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing, IEEE Transactions on Information Forensics and Security 11(6) 1265-1277. [8] Warren, L., Chi, H. (2014). Securing EHRs via CPMA Attribute-Based Encryption on Cloud Systems, Proceedings of the 2014 ACM Southeast Regional Conference. ACM, 2014. [9] Xhafa, F., Li, J., Zhao, G., Li, J., Chen, X., Wong, D. S. (2014). Designing cloud-based electronic health record system with attribute-based encryption, Multimedia Tools and Applications 74 (10) 3441-3458. [10] Yan, H., Li, X., Du, J. (2014). Secure Personal Health Record System with Attribute-Based Encryption in Cloud Computing, Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, p. 329-332. [11] Zhang, Y., Zheng, D., Li, Q., Li, J., Li, H. (2016). Online/offline unbounded multi-authority attribute-based encryption for data sharing in mobile cloud computing, Security and Communication Networks 9 (16) 3688-3702. [12] Zhenpeng, L., Xianchao, Z., Shouhua, Z. (2014). Multi authority attribute based encryption with attribute revocation, In: IEEE 17th International Conference on Computational Science and Engineering, p. 1872-1876.

Home | Aim & Scope | Editorial Board | Author Guidelines | Publisher | Subscription | Previous Issue | Contact Us |Upcoming Conferences|Sample Issues|Library Recommendation Form|

 

Copyright © 2011 dline.info