Developing IT Strategic Planning Using Mobile Enterprise Architecture In The Academic Process of Atma Jaya Makassar University
Keywords:IT strategic planning, mobile enterprise architecture, analysis, university
The purpose of this research was to examine the feasibility of the development of mobile enterprise strategic plan, analyze the academic process and the utilization of information technology (IT), and generate documentation IT strategic planning by implementing Mobile Enterprise Architecture in the academic process of Atma Jaya University in Makassar. Data were taken from distributing questionnaires to 297 respondents and conducting interviews to 18 respondents. Data were examined using SWOT analysis, the incorporation of academic scorecard analysis and IT balanced scorecard analysis, financial analysis, as well as analytic hierarchy process (AHP). SWOT analysis results indicate that case study is in a weak position, which possibly never take advantage of opportunities since the weakness of the stand or the power is not enough to work on it. In addition, the results of the performance analysis of the utilization of information technology using the Balanced Scorecard analysis show that the average performance is sufficient. The result of documentation of IT strategic planning was analyzed with financial analysis indicating the feasibility of implementation because it provides benefits for university of 141,32%. Furthermore, Analytic Hierarchy Process (AHP) to determine the priority of IT strategy proposals shows that the main priority is to develop portal for student and lecturer.
Akyel, N., KorkusuzPolat, T., & Arslankaya, S. (2012). Strategic planning in institutions of higher education: A case study of Sakarya university. Procedia - Social and Behavioral Sciences, 58, 66-72.
Alonso, J. A., & Lamata, M. T. (2006). Consistency in the analytic hierarchy process: A new approach. International Journal of Uncertainty, 14(4), 445-459.
Guy, R. (2009). The evolution of mobile teaching and learning. California: Informing Science Press.
Karpisek, F., Baggili, I., & Breitinger, F. (2015). WhatsApp network forensics: Decrypting and understanding the whatsapp call signaling messages. Digital Investigation, 15, 110–118.
Li, Z., & Steenkamp, A. L. (2010). Mobile enterprise architecture framework. International Journal of Information Technologies and the System Approach, 3(1), 1-20.
Microsoft Corporation. (2016). Security and compliance office 365. Washington DC: Microsoft Corporation.
Mtega, W. P., Bernard, R., Msungu, A. C., & Sanare, R. (2012). Using mobile phones for teaching and learning purposes in higher learning institutions: The case of Sokoine University of agriculture in Tanzania. Proceedings and Report of the 5th Ubuntu Net Alliance Annual Conference, 118-129.
O’Mahony, C. D. (2009). IT for educational management (ITEM) strategic planning. IFIP International Federation for Information Processing, 292, 15-22.
O’Neil, H. F., Bensimon, E., Diamond, M. A., & Moore, M. R. (1999). Designing and implementing an academic scorecard. Change The Magazine of Higher Learning, 31(6), 32-40.
Saragih, H., & Harisno. (2014). Rencana strategis teknologi informasi (IT) dan sistem informasi (IS) pada proses bisnis perusahaan. Yogyakarta: Graha Ilmu.
Titthaisiri, W. (2001). Information technology strategic planning process for institutions of higher education in Thailand. NECTEC Technical Journal, 3(11), 153-164.
Unhelkar, B., & Murugesan, S. (2010). The enterprise mobile applications development framework. IT Professional, 12(3), 33-39.
Authors who publish with this journal agree to the following terms:
a. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License - Share Alike that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
b. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
c. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.
All articles published Open Access will be immediately and permanently free for everyone to read and download. We are continuously working with our author communities to select the best choice of license options, currently being defined for this journal as follows: