Jurnal Sistem Informasi, Teknik Informatika dan Teknologi Pendidikan (JUSTIKPEN)
Vol. 5 No. 1 (2025): Jurnal Sistem Informasi, Teknik Informatika dan Teknologi Pendidikan

Implementasi Critical Path Method (CPM) Dalam Pengembangan Sistem Informasi Manajemen Kontraktor Pada PT. Sari Karya Mandiri

Yohanes LIm, Irvan (Unknown)
Jando, Emanuel (Unknown)
Siki, Yovinia Carmeneja Hoar (Unknown)



Article Info

Publish Date
03 Jun 2025

Abstract

The development of a Contractor Management Information System is very important for the construction industry, particularly for PT. Sari Karya Mandiri, which has many permanent employees and projects that are physically completed. This research aims to develop a web-based management information system using the Critical Path Method (CPM) as a project management tool to make PT. Sari Karya Mandiri’s operations more efficient and effective. This framework is expected to address issues such as cost control, human asset management, unstructured project management, and improve project execution time efficiency. The system development method uses the waterfall model. The stages of completion include system requirements analysis, design, development, implementation, and testing. Testing is conducted to evaluate how well the system handles construction project management. The results of the research show that this framework can improve project planning, thereby reducing delays. The administrative data framework can function efficiently at PT. Sari Karya Mandiri and enhance the sustainability of the construction industry as a whole.

Copyrights © 2025






Journal Info

Abbrev

JUSTIKPEN

Publisher

Subject

Computer Science & IT Decision Sciences, Operations Research & Management Economics, Econometrics & Finance Engineering Mechanical Engineering Social Sciences Other

Description

Jurnal Sistem Informasi, Teknik Komputer dan Teknologi Pendidikan (JUSTIKPEN) memiliki Topik Utama untuk diterbitkan yang mencakup: 1. IT Infrastructure and Security (ITIS): Information Security and Privacy Digital Forensics Network Security Cryptography Cloud and Virtualization Emerging ...