|
Journal of Information & Systems Management (JISM) |
Project Management Plan Design for Developing E-learning Content | Ketmanto, Devi Pratami, Muhamad Azani Hasibuan, Deden Witarsyah Jacob School of Industrial and System Engineering Telkom University Jalan Terusan Buah Batu No.01, Bandung, 40257, Indonesia | Abstract: E-learning is considered as a better learning that provides technology assistance to support learning. While elearning
gives more flexibility toward learning, the creation of e-learning content needs more attention. The purpose of the
paper is to provide project management plan based on Project Management Body of Knowledge or PMBOK in short, to the
creation of e-learning content. The creation of something that produces product, service or result is considered as a project. In
other words, the e-learning content creation is one of the definitive project. However, 71% of the projects were failed or
challenged and one of the top reasons why project failed is bad estimates of planning in the project. Even more challenging, elearning
project suffers more than the failure rate of information system. Just having a plan and poor planning may lead to
failed project. Nevertheless, the e-learning project needs project management plan. Rather than as a methodology of the
research, the project management plan can be considered as a guide to carry out the work in the project. The study found that
the project management plan consists of scope, time, cost and quality. This research will be useful for those who concerned in
creating project management plan. Mostly of project plans are based on scope, time, and schedule. But it remains to be seen
whether the product has met the customer or owner expectation. Thus solution to the e-learning project failure lies in creating
project management plan which includes scope, schedule, cost, and quality. | Keywords: E-learning, Project Management, Project Management Plan, Agile |
DOI:https://doi.org/10.6025/jism/2019/9/2/37-47 | Full_Text   PDF (304 KB)   Download:   360  times | References:[1] Zhu, S., Han, Y., Wei, Y. (2015). Controlling Outsourcing Data in Cloud Computing with Attribute-Based Encryption,
International Conference on Intelligent Networking and Collaborative Systems, p. 257-261.
[2] Tamizharasi, Balamurugan, G. S.B., Manjula, R. (2016). Attribute Based Encryption with Fine-grained Access Provision in
Cloud Computing, Proceedings of the International Conference on Informatics and Analytics. ACM.
[3] Chandrasekaran, B., Balakrishnan, R. (2016). Attribute Based Encryption Using Quadratic Residue for the Big Data in Cloud
Environment, Proceedings of the International Conference on Informatics and Analytics. ACM.
[4] Kaci, A., Bouabana-Tebibel, T. (2014). Access Control Reinforcement over Searchable Encryption, IEEE IRI 2014, August 13-15, 2014, San Francisco, California, USA, p.130-137.
[5] Li, J., Shi, Y., Zhang, Y. (2015). Searchable ciphertext-policy attribute-based encryption with revocation in cloud storage,
International Journal of Communication Systems International Joirnal of Communication System.
[6] Li, L., Chen, X., Jiang, H. (2016). P-CP-ABE: Parallelizing Ciphertext-Policy Attribute-Based Encryption for Clouds, 17th IEEE/
ACIS International Conference on. IEEE, p.1-6.
[7] Wang, S., Zhou, J., Liu, J. K., Yu, J., Chen, J., Xie, W. (2016). An Efficient File Hierarchy Attribute-Based Encryption Scheme
in Cloud Computing, IEEE Transactions on Information Forensics and Security 11(6) 1265-1277.
[8] Warren, L., Chi, H. (2014). Securing EHRs via CPMA Attribute-Based Encryption on Cloud Systems, Proceedings of the 2014
ACM Southeast Regional Conference. ACM, 2014.
[9] Xhafa, F., Li, J., Zhao, G., Li, J., Chen, X., Wong, D. S. (2014). Designing cloud-based electronic health record system with
attribute-based encryption, Multimedia Tools and Applications 74 (10) 3441-3458.
[10] Yan, H., Li, X., Du, J. (2014). Secure Personal Health Record System with Attribute-Based Encryption in Cloud Computing,
Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, p. 329-332.
[11] Zhang, Y., Zheng, D., Li, Q., Li, J., Li, H. (2016). Online/offline unbounded multi-authority attribute-based encryption for data
sharing in mobile cloud computing, Security and Communication Networks 9 (16) 3688-3702.
[12] Zhenpeng, L., Xianchao, Z., Shouhua, Z. (2014). Multi authority attribute based encryption with attribute revocation, In:
IEEE 17th International Conference on Computational Science and Engineering, p. 1872-1876.
|
|
|
|