The Employee Time Discipline Monitoring System based on Fingerprint Sensor and Website
Main Article Content
Abstract
The problem of time discipline in the work environment is a common challenge that is often faced, especially in organizations with many employees. This problem becomes increasingly complicated when the organization has many employees with different work schedules and is spread across prominent locations. A time discipline monitoring system has been developed to overcome this problem. This system is designed to make monitoring employee attendance and time discipline easier by utilizing fingerprint scanner technology near the entrance to a room or office building. When an employee enters or leaves, they are required to scan their fingerprints using the fingerprint scanner. The data from the fingerprint scan is then recorded and stored on a server connected to the system. The administrator can easily access this data via a website provided by the system. This way, monitoring employee time discipline becomes more efficient. Furthermore, this system also has a feature that allows the head of organization to permit employees to have tasks outside the office. This simplifies the process of managing tasks outside the office and increases work flexibility. Based on the test results, the system demonstrates strong performance in monitoring, achieving a fingerprint detection accuracy of 95% and achieving a 100% success rate in website monitoring
Downloads
Article Details
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Please find the rights and licenses in the Journal of Information Technology and Computer Engineering (JITCE).
1. License
The non-commercial use of the article will be governed by the Creative Commons Attribution license as currently displayed on Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
2. Author(s)’ Warranties
The author(s) warrants that the article is original, written by stated author(s), has not been published before, contains no unlawful statements, does not infringe the rights of others, is subject to copyright that is vested exclusively in the author and free of any third party rights, and that any necessary permissions to quote from other sources have been obtained by the author(s).
3. User Rights
JITCE adopts the spirit of open access and open science, which disseminates articles published as free as possible under the Creative Commons license. JITCE permits users to copy, distribute, display, and perform the work for non-commercial purposes only. Users will also need to attribute authors and JITCE on distributing works in the journal.
4. Rights of Authors
Authors retain the following rights:
- Copyright, and other proprietary rights relating to the article, such as patent rights,
- the right to use the substance of the article in future own works, including lectures and books,
- the right to reproduce the article for own purposes,
- the right to self-archive the article.
- the right to enter into separate, additional contractual arrangements for the non-exclusive distribution of the article's published version (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal (Journal of Information Technology and Computer Engineering).
5. Co-Authorship
If the article was jointly prepared by other authors; upon submitting the article, the author is agreed on this form and warrants that he/she has been authorized by all co-authors on their behalf, and agrees to inform his/her co-authors. JITCE will be freed on any disputes that will occur regarding this issue.
7. Royalties
By submitting the articles, the authors agreed that no fees are payable from JITCE.
8. Miscellaneous
JITCE will publish the article (or have it published) in the journal if the article’s editorial process is successfully completed and JITCE or its sublicensee has become obligated to have the article published. JITCE may adjust the article to a style of punctuation, spelling, capitalization, referencing and usage that it deems appropriate. The author acknowledges that the article may be published so that it will be publicly accessible and such access will be free of charge for the readers.
References
[2] B. P. Statistik, “Penduduk Berumur 15 Tahun ke Atas yang Bekerja menurut Provinsi dan Status Pekerjaan Utama, 2022,” 2022. https://www.bps.go.id/id/statistics-table/1/MjIwMiMx/penduduk-berumur-15-tahun-ke-atas-yang-bekerja-menurut-provinsi-dan-status-pekerjaan-utama--2022.html.
[3] B. P. Statistik, “Penduduk Berumur 15 Tahun ke Atas yang Bekerja menurut Provinsi dan Status Pekerjaan Utama, 2023,” 2023. https://www.bps.go.id/id/statistics-table/1/MjIyNSMx/penduduk-berumur-15-tahun-ke-atas-yang-bekerja-menurut-provinsi-dan-status-pekerjaan-utama--2023.html.
[4] S. M. Rizal and R. Radiman, “Pengaruh Motivasi, Pengawasan, dan Kepemimpinan Terhadap Disiplin Kerja Pegawai,” Maneggio J. Ilm. Magister Manaj., vol. 2, no. 1, pp. 117–128, 2019, doi: 10.30596/maneggio.v2i1.3649.
[5] A. Rahmawan and S. Masruroh, “Pengaruh Motivasi, Pengawasan Dan Disiplin Kerja Terhadap Kinerja Pegawai Dinas Pemadam Kebakaran Kabupaten Pasuruan,” J. Manag. Bus. Appl., vol. 1, no. 1, pp. 1–11, 2020, [Online]. Available: http://ejurnal.stieyapan.ac.id/index.php/SAMBA/article/view/98.
[6] P. Sumampow, R. Koleangan, and V. Lengkong, “Penerapan Reward Dan Punishment Dalam Meningkatkan Hasil Kerja Pegawai Di Kantor Kecamatan Mandolang,” J. EMBA J. Ris. Ekon. Manajemen, Bisnis dan Akunt., vol. 7, no. 4, pp. 4581–4590, 2019, [Online]. Available: https://ejournal.unsrat.ac.id/index.php/emba/article/view/25253.
[7] R. R. Santika, Y. Wiharto, and A. Irawan, “Desain Sistem Absensi Karyawan Dengan Radio,” Res. Lembaran Publ. Ilm., vol. 4, no. 1, pp. 18–22, 2021.
[8] D. Haliza and N. Mahfudza, “Sistem Monitoring Karyawan PT Telkom Akses Medan Menggunakan Teknologi GPS,” vol. 3, pp. 5347–5364, 2023.
[9] A. Umarjati and A. Wibowo, “Implementasi JWT pada Aplikasi Presensi dengan Validasi Fingerprint ,” J. RESTI (Rekayasa Sist. dan Teknol. Informasi), vol. 1, no. 10, pp. 1085–1091, 2021, [Online]. Available: https://doi.org/10.29207/resti.v4i6.2650.
[10] F. Pradana and A. Amir, “Rancang Bangun Sistem Pengamanan Gedung Yang Dikontrol Melalui Aplikasi Android Berbasis IoT,” Foristek, vol. 10, no. 1, 2020, doi: 10.54757/fs.v10i1.51.