Handbook MTI 2013
Handbook MTI 2013
PROGRAM
Academic Guidelines
Academic Guidelines
Contents
General Information 4
History of Fasilkom UI . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Vision and Mission . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Admission Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Academic Requirements . . . . . . . . . . . . . . . . . . . . . . . 6
Administrative Requirements . . . . . . . . . . . . . . . . . . . . 6
Curriculum 7
IT fundamentals (IS/IT Foundations) . . . . . . . . . . . . . . . . . . 7
Core courses in Information Technology (IT Core) . . . . . . . . . . . 7
System Integration and Career Tracks . . . . . . . . . . . . . . . . . . 8
Thesis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Thesis Guidelines . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Activities and Assessment of the Thesis . . . . . . . . . . . . . . 9
Independent Study . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Course Credit Transfer . . . . . . . . . . . . . . . . . . . . . . . . 11
Evaluation Guidelines 12
Grading system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Academic Honesty . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Degree . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Syllabus 14
Database System Technology . . . . . . . . . . . . . . . . . . . . . . . 14
Computer Networking and Data Communication . . . . . . . . . . . . 14
Information Systems Design . . . . . . . . . . . . . . . . . . . . . . . . 15
Process Management and Software Engineering . . . . . . . . . . . . . 15
Strategic Planning in Information Systems . . . . . . . . . . . . . . . . 16
Information Technology Infrastructure Planning . . . . . . . . . . . . 16
Research Methodology and Scientific Writing . . . . . . . . . . . . . . 17
1
2
Management 26
Faculty Members . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Faculty Members (on leave) . . . . . . . . . . . . . . . . . . . . . . . . 27
Adjunct Faculty . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
Dean,
Prof. T. Basaruddin, Ph.D.
3
General Information
History of Fasilkom UI
The faculty of Computer Science, University of Indonesia (Fasilkom UI) cannot
be separated from the Computer Science Center, University of Indonesia (UI
Pusilkom) which was founded in 1972. The goal of this institute is to develop
the field of Computer Science in Indonesia, particularly in UI. Equipped with
several punch machines and funds from the Ford Foundation, Pusilkom develops
computer programs in the UI Salemba campus.
In 1976, Pusilkom UI was responsible for the data processing of the nationwide
college entrance exam (SKALU). Experience and support needed to process
these nationwide data gave encouragement Pusilkom UI to provide scholarships
for its personnels to further their studies in the United States of America.
Along with the support from UI, Pusilkom initiated the establishment of the
faculty of Computer Science in UI (Fasilkom). In 1986, The bachelor program
in Computer Science is officially opened; followed by the master level program
in 1988 and Doctorate level in 1993.
In line with developments in science and technology, in 1996 the Master level
program evolved into two separate programs, namely:
1. Master of Science program in Computer Science, with emphasis on re-
search in Computer Science
2. Master of Information Technology, with emphasis on the management of
Information Technology and Information Systems
Introduction
During the last decade, Information Technology (IT) has been undergone a
dramatic advancement. Today, IT plays a major role within the business and
management of the modern organization. This has brought increasing in trends
in demand of IT professionals capable in Assessing, building, and deploying IT
4
5
infrastructures.
Admission Requirements
To be accepted as graduate students, candidates must meet the following re-
quirements:
Academic Requirements
Candidates with a BSc degree in Computer Science, Informatics, Com-
puter Engineering, Electrical Engineering, Mathematics, Physics or other
Computational Science; or a BSc degree in other areas with work experi-
ence in the field of IT. The latter group must enroll in the matriculation
classes.
Passed the entrance exam, which includes two types of exams:
Administrative Requirements
Starting in Academic Year 2007/2008, the prospective students registration is
done through the following web site http://penerimaan.ui.edu/
7
8
Software Design
E-Business Integration
Final Project and Seminar
Second Semester
IKI82405T 3 Corporate Information Systems Man-
agement
IKI82406T 3 Information Systems Strategic Plan-
ning
IKI82702T 3 Prerequisites and Software Specifica-
tions
IKI80050T 3 Research Methodology and Scientific
Writing
Third Semester
IKI83409T 3 Project Management and Change Man-
agement in Information Technology
concentration: Software Engineering
IKI83703T 3 Software Quality Assurance
IKI83704T 3 Software Design
IKI83705T 3 Entrepreneurial in Software Industry
concentration: Enterprise System
IKI83402T 3 E-Business
IKI83401T 3 E-Government
IKI83401T 3 Risk Management
concentration: IT Governance
IKI80924T 3 IT Governance
IKI83401T 3 Risk Management
IKI83407T 3 Information Technology Investment
Management
concentration: Knowledge Management
IKI83420T 3 Knowledge Management
IKI83403T 3 Data Mining and Business Intelligence
IKI83501T 3 Multimedia Information Management
Fourth Semester
IKI83902T 4 Thesis
Thesis
Students are required to conduct research and produce a thesis document as
a result. Thesis is an academic activity done under the guidance of thesis
supervisors.
Thesis Guidelines
1. Students that are allowed to start the thesis are students who had finished
at least 23 credits, with a minimum cumulative GPA of 2.75.
2. Students must return the filled Thesis Topic Approval Form, which has
been approved and signed by the thesis advisor.
5. The format of the thesis document follows standard rules laid by UI. The
thesis document and can be viewed at libraries of UI Fasilkom.
6. The thesis is concluded with an oral presentation by the student and is
defended in front the thesis committee.
7. Audience are free to attend the thesis defense. The chair of the thesis
committee administers the defense process.
8. The thesis committee consists of the thesis advisor(s) and other examiners.
The committee consists of at least 3 (three) people.
9. The minimum grade for the graduation thesis is B.
10. Selected Thesis can be included into the Journal of Computer Science and
Information Technology, published by the Faculty of Computer Science.
If selected, students are expected to summarize their thesis into a paper
by following the standard journal-writing convention.
Independent Study
A portion of the elective credits can also be obtained by conducting an Indepen-
dent Study. An Independent Study is an academic activity to explore advanced
topics in Computer Science under the guidance of a supervisor from the faculty
or other qualified experts. An Independent Study carries the weight of 4 credits
(SKS).
The Independent Study supervisor must have a doctorate degree and an ex-
pertise on the subject concerned. The result of an Independent Study would be
a scientific report (of at least 10 pages) that could contain:
Grading system
The credit units used are Satuan Kredit Semester or SKS, which has the fol-
lowing guidelines.
1. A 4 credits course constitutes to 4 x 50 minutes lectures per week for 14-16
weeks.
2. At the end of every semester each student will get a list of their grades,
the current semesters grade point average (IPS), cumulative grade point
average (GPA) and the number of credits have been taken.
3. The Final grade of the courses is determined by the lecturer in question
based on the submitted assignments, quizzes, midterms (UTS) or final
exams (UAS).
4. Midterms (UTS) are usually given between weeks 6-8 and final exams
(UAS) are given at the end of the semester (between weeks 14-16). Weight-
ing of the exam grades and other assignments determined by the lecturer
concerned.
12
13
In calculating the Grade Point Average (GPA), the following table is used:
Academic Honesty
1. In accordance with Rule No. 1 dated December 30, 1996 (the UI Campus
Life Rules and Procedure, especially Article 4 of the Norms of Conduct),
students are required to be honest in following the process of education,
research, and other academic activities.
2. Dishonesty includes: plagiarism, falsification of examinations and / or the
assignment, cheating during the examination, giving false information or
data, and other academic dishonesty.
3. The Dean decides on penalties or sanctions in the form of warning, repri-
mand, probation, suspension, or dismissal from fasilkom UI for students
who committed any misconduct mentioned above.
Degree
Students who have completed a minimum of 40 credits (with no D and E), as
well as written a thesis (with the minimum grade of B) will be granted the
degree of Magister Teknologi Informasi (M.T.I).
Textbook(s):
Connolly, Thomas Begg, and Carolyn: Database Systems 4th edition, Prentice
Hall, 2005.
14
15
LAN, MAN and WAN, network design, network equipment, Internet networking
and internetworking protocols, networked applications and the scope / exam-
ples of Internet applications, intranets and extranets, network effects, network
management, and network security.
Textbook(s):
Goldman, James E. and Rawles, Philip T.: Applied Data Communications: a
Business-Oriented Approach 4th Edition, John Wiley, 2005.
Textbook(s):
Dennis, Alan: System Analysis and Design with UML Version 2.0.2 and Object
Oriented Approach, Prentice Hall, 2005.
Textbook(s):
Presmann, Roger S.: Software Engineering, 6th edition, McGraw Hill, 2004.
Humphrey, W.: Managing the Software Process, Addison Wesley, 1989.
Textbook(s):
Ward, John: Strategic Planning for Information Systems, John Wiley, 2003.
Hunger, Wheelen: Strategy Management and Business Policy, Prentice Hall,
2004.
Textbook(s):
Robertson, Bruce and Var, Sribar: The Adaptive Enterprise: IT Infrastructure
Textbook(s):
Sekaran, Uma: Research Methods for Business, 2nd edition.John Wiley & Sons,
1992.
Christensen, Larry B: Experimental methodology, Pearson, 9th Edition, 2004
Tan, Willie: Practical research methods. Singapore: Prentice Hall. 2002
Myers, Michel D: Qualitative research in information systems: a reader. Sage
Pub, 2002
Through this course students are expected to be able to understand the use and
the strategic role of Information Technology (IT) and the internal management
of Information Systems (IS).
The topics discussed include: the challenge of the SI technology, business strat-
egy in IT organization, IT and organization, manageable trends, the impact of
IT in the competition, internetworking infrastructure, the role of E-commerce
and the Internet, warranty in the reliability of IT services, IT infrastructure
management, management of IT functions, control of IT outsourcing, as well as
issues of globalization / trans-national.
Textbook(s):
Applegate, C: Corporate Information Strategy and Management: Text and
Cases, 7th Ed., 2005.McGraw-Hill.
Textbook(s):
Marchewka, J.: Information Technology Project Management: Providing Mea-
surable Organizational Value, 2nd Edition, Wiley, New Jersey, 2006.
Information Technology Project Management, Kathy Schwalbe, Thomson Course
Technology, ISBN 1-4239-0170-3
A Guide to the Project Management Body of Knowledge (PMBOK) 4e, Insti-
tute Project Management Institute (PMI), ISBN 1-930699-45-X, 2004
Software Design
Weight: 3 credit units
Description:
Textbook(s):
Conallen, Jim: Building Web Application with UML, Addison Wesley, 2003.
Eeles, Peter: Building J2EE Applications with the Rational Unified Process,
Addison Wesley, 2003.
Quatrani, Terry: Visual Modeling With Rational Rose 2002, Addison Wesley,
2003.
IT Governance
Weight: 3 credit units
Description:
In the development of the business, variety of behaviors and ethics, and reg-
ulations, corporate governances are an important issues. Even in some types
of industries, such as banking, they have a set strict regulations, ranging from
corporate governance to IT governance. Thus, an understanding of IT gover-
nance is absolute for professionals in the field of IS / IT. This course provides
an understanding in strategies and techniques in IT governance. This course
requires an understanding in the relationship with corporate governance, IT
governance, IT governance techniques, mechanisms of implementation, as well
as aspects of leadership in IT governance. Emphasis will be given to the prin-
ciples of Sarbanes-Oxley for IT governance and COBIT.
Textbook(s):
IT Governance: How Top performers Manage IT Decision Rights for Superior
Results, Peter Weill & Jeanne Ross, 2004.
Van Grembergen, Wim, et.al.: Strategies for Information Technology Gover-
nance, Idea Group Publishing, London, 2004.
Textbook(s):
Marilyn Parker et al, Information Economics - Linking Business Performance
to Information Technology, Prentice Hall, 1988.
Marilyn Parker, Strategic Transformation and IT - Paradigms for Performing
while Transforming, Prentice Hall, 1996.
And Remenyi, Arthur Money, and Michael Sherwood-Smith, The Effective Mea-
surement and Management of IT Coal mining rights and Benefits, (2nd eds.)
Butterworth-Heinemann Elsevier, 2000.
Hans van der Zee, Measuring the Value of Information Technology, IRM Press,
2002.
Jack M. Keen and Bonnie Digrius, Making Technology Investments Profitable
- ROI Road Map to Better Business Cases, John Wiley & Sons, 2003.
Ranti Benny, Identification of Information Systems / Information Technology
Business Values with Hermeneutics Approach: Cases in Indonesia, Doctoral
Dissertation, Faculty of Computer Science, University of Indonesia, in 2008.
Risk Management
Weight: 3 credit units
Description:
This course introduces the categories and introduces the risk of information
technology implementation (IT) in organizations. This course explains the IT
risk governance as the working framework in the comprehensive risk manage-
ment. Emphasis is given to one of the areas of IT risk: the risk management of
IT security.
Topics covered include: basic concepts of IT risk and risk management, IT risk
governance framework, risk management pillar of IT, IT management matu-
rity as a technical foundation, the IT risk governance processes, risk-conscious
culture of IT, IT risk management implementation, concepts and principles in
IT security risk management, processes and products of IT risk management,
access control, cryptography, and the architecture and design of IT security.
Textbook(s):
Westerman, George & Hunter, Richard, IT Risk: Turning Business Threats into
Competitive Advantage, Harvard Business School Press, 2007.
Tipton, Harold F., & Krause, Micki, Information Security Management Hand-
book, 6th ed., Auerbach Publications, 2007.
E-Business
Weight: 3 credit units
Description:
This course helps students develop the ability to form insights in designing and
guiding the development of e-Business; a business systems that utilize communi-
cation and computing technologies (Information Technology) as its main factor.
We will also discuss business system which will include the concept of business
models, business processes and application architectures and infrastructures.
In particular, this course will explore the applications of distributed systems
technology and methods for integrating business processes. Some case studies
will be given to provide insight into the success factors and general patterns of
an e-Business. This course is designed to support students interested in career
paths of business analysts and architects of information technology solutions.
Topics covered include: the introduction of e-business, the basics of e-commerce;
architecture and infrastructure in e-business, e-environment; design and integra-
tion of value chains; integration between logistics, banking and manufacturing;
B2B and e-Marketplace; strategy, standards and patterns of e-business archi-
tecture; customer relationship management, enterprise resource planning; case
study, prospects and challenges of e-Business in Indonesia.
Textbook(s):
Chaffey, Dave: E-Business and E-Commerce Management, 2 nd Ed., Prentice
Hall, ISBN: 0-273-68378-0, 2004.
Kalakota, Ravi: E-Business 2.0 Roadmap For Success, Addison Wesley, 2001.
Turban, King Lee: Electronic Commerce A Managerial Perspective, Prentice
Hall, 2004.
E-Government
Weight: 3 credit units
Description:
It is undeniable that the government sector is one of the important jobs for
IT professionals. This course introduces the use of IT in the administration
of governmental activities. Use of IT in governmental activities is expected to
improve the level of government services to the community and business.
Upon the completion of this course, students are expected to be able to: un-
derstand and analyze the theory and practice in e-government; understand and
describe the use of ICT in the government sector, as well as describing the dif-
ferent conditions for the use of ICT from the perspective of a multi-cultural
demographic.
Topics covered include: ICT for development (ICTD); policies, processes and
governance ICTD; overview of e-Government applications; model, strategy and
roadmap of e-Government; the types of applications and implementations of ICT
in government; governance Internet, network and information security; ICTD
financing, as well as case studies.
Textbook(s):
Modules of the Academy of ICT Essentials for Government Leaders, UN-APCICT,
http://www.unapcict.org/academy/translation/bahasa-indonesia.
Chen et.al (editors), Digital Government: e-Government Research, Case Stud-
ies, and Implementation, Springer, ISBN: 978-0-387-71610-7, 2008.
Knowledge Management
Weight: 3 credit units
Description:
This course includes theory and application of knowledge management, which
also covers the technologies and tools used in managing knowledge. The goal
is to provide knowledge effectively within an organization. In this course, we
also discuss the characteristics, computer representation, access and utilization
of knowledge versus information in the context of human resources.
Through this course students are expected to: understand the basic concepts of
knowledge, and the creation, acquisition, representation, dissemination, re-use,
and management of knowledge; understand the role and usefulness of knowledge
in organizations and institutions and obstacles to be overcome; acknowledge
concepts, methods, techniques, and computer tools used for knowledge manage-
ment; understand how to use and integrate the components and functions of
various KM systems; prepare for advanced studies; and evaluate current trends
in KM and its usefulness in business and industry.
Topics covered in this course include: overview of knowledge management (KM),
nature of a knowledge, solution of KM, organizational impact of KM, the fac-
tors that affect KM, KM assessment of an organization, acquisition and storing
of knowledge, knowledge sharing and practice in the community, application of
knowledge, the role of organizational culture, tools for KM, size and KM strate-
gies, as well as case studies.
Textbook(s):
Irma Becerra-Fernandez, Avelino Gonzalez, Rajiv Sabherwal: Knowledge Man-
agement Challenges, Solutions, and Technologies.Prentice Hall. ISBN: 0-13-
109931-0, 2004.
Elias M. Awad, Hassan M. Ghaziri: Knowledge Management.Prentice Hall.
ISBN: 0-13-034820-1, 2004.
Madanmohan Rao: Knowledge Management Tools and Techniques: Practi-
tioners and Experts Evaluate KM Solutions.Butterworth-Heinemann. ISBN:
0750678186, 2004.
Amrit Tiwana: The Knowledge Management Toolkit: Orchestrating IT, Strat-
egy, and Knowledge Platforms (2nd Edition).Prentice Hall. ISBN: 013009224X,
2002.
Textbook(s):
Jiawei Han and Micheline Kamber, Data Mining: Concepts and Techniques,
Morgan Kaufmann, 2001.
Ephraim Turban et al., Decision Support and Business Intelligence Systems,
Pearson, 2007.
David Olson and Yong Shi, Introduction to Business Data Mining, McGraw-Hill,
2007.
Thesis
Weight: 4 credits
Description:
Study, research, writing, and oral presentation on a subject in the field of In-
formation system.
Faculty Members
Abdul Muttalib, M.Sc
Dr. Achmad Nizar Hidayanto
Dr. Ade Azurat
Adhi Yuniarto, M.Kom
Adila A. Krisnadhi, MCS
Agus Kurniawan, M.Kom
Prof. Dr. Aniati Murni
Prof. Belawati H. Widjaja, Ph.D
Benny Nugroho, M.Kom
Bob Hardian, Ph.D
Budi Yuwono, Ph.D
Dadan Hardianto, M.Kom
Dana Indra Sensuse, Ph.D
Dina Chahyati, M.Kom
Dr. Eko K. Budiardjo
Prof. Heru Suhartanto, Ph.D
Heri Kurniawan, M.Kom
Herry, M.Kom
Hisar Manurung Maruli, Ph.D
dr. Iik Wilarso
Ika Alfina, M.Kom
Dr. Indra Budi
L. Yohanes Stefanus, Ph.D
26
27
Adjunct Faculty
Budiman Arief, M.Kom
Arrianto Mukti Wibowo, M.Sc
Dr. Benny Ranti
Husni Fahmi, Ph.D
Riri Satria, MM
Rusdianto, Ph.D
Fauzi Hasan, Ph.D
Ivano Afiandi. M.Sc Bobby AA Nazief, Ph.D