Widan Technology (Widantech), which operates in the software house sector, has several clients with small to medium scale projects. A high demand project is the company profile website application. In Widantech company profile projects, role and module management are not included, so any changes to module and data access must be carried out by the Widantech programming team. The increasing number of clients requires an adaptive development model according to module additions and changes. However, lack of skills are the main obstacle in analyzing adaptive system models. Even though an adaptive system is needed to facilitate user managers to manage access rights to modules and data. This setting is very important because it relates to the security of client company information. Implementing a module and data access rights model is needed to ensure the adaptability of the company profile product being created. Setting access rights is one important component to accommodate these requirements. Module and data access rights management are implemented through the stages of collecting entities related to company profiles, observing several Widantech client company profile systems, implementing modules and data access rights, and system testing. The module and data access rights model can support the development of an adaptive company profile system for Widantech clients.

1.
E.
Tungadi
, “Pemodelan Role User Sistem Informasi Politeknik Negeri Ujung Pandang,”
In Prosiding Seminar Nasional Penelitian dan Pengabdian Masyarakat 2017
(
P3M PNUP
,
Makassar, Indonesia
),
21
26
(
2017
).
2.
E.
Tungadi
, “Pemodelan Entitas Data Hak Akses Modul dan Data Pada Sistem Informasi Politeknik Negeri Ujung Pandang,”
In Prosiding Seminar Nasional Penelitian dan Pengabdian Masyarakat 2022
(
P3M PNUP
,
Makassar, Indonesia
),
51
56
(
2022
).
3.
M.
Diaz
,
U.N.
Hermina
, and
L.
Liliyana
, “
Faktor-Faktor yang Mempengaruhi Kinerja Sistem Informasi Akademik di Politeknik Negeri Pontianak
,”
Inovbiz: Jurnal Inovasi Bisnis
6
(
1
),
22
(
2018
).
4.
J. P.
Cornelissen
,
Corporate Communication: A guide to theory and practice
(
London
:
SAGE Publications Ltd
,
2020
).
5.
M.A.
Dixon
, "Corporate Communication," in
The International Encyclopedia of Organizational Communication
, edited by
C.R.
Scott
,
J.R.
Barker
,
T.
Kuhn
,
J.
Keyton
,
P.K.
Turner
, and
L.K.
Lewis
(
Wiley
,
2017
), pp.
1
11
.
6.
Victoria University
, “
Information Security-User Access Management Procedure
,” https://policy.vu.edu.au/document/view.php?id=331, Quoted in 28 April
2022
.
7.
E.
Andriyani
and
E.
Triyanto
, “
Faktor-Faktor Yang Mempengaruhi Kinerja Sistem Informasi Akuntansi Pada PT Dharma Husada Mandiri
,”
Jurnal Cakrawala Ilmiah
,
1
(
8
),
2069
(
2022
).
8.
N.
Dumitriţa
,
G.
Maria
,
M.
Camelia
, and
A.
Anişoara
, "
The Identification of the Company Profile Listed on the Romanian Stock Exchange Involved in CSR Actions
," in (
Moldova
,
2020
), pp.
525
540
.
9.
H. C.
Chang
,
C.Y.
Wang
and
S.
Hawamdeh
, “
Emerging trends in data analytics and knowledge management job market: extending KSA framework
,”
Journal of Knowledge Management
,
23
(
4
),
664
686
(
2018
).
10.
C.
Gurãu
, and
Y.
Mclaren
, “
Corporate reputations in UK biotechnology: an analysis of on-line ‘company profile’ texts
,”
Journal of Marketing Communications
9
(
4
),
241
256
(
2003
).
11.
L.
Dach
, and
K.
Allmendinger
, “
Sustainability in Corporate Communications and its Influence on Consumer Awareness and Perceptions: A study of H&M and Primark
,”
Procedia-Social and Behavioral Sciences
130
,
409
418
(
2014
).
12.
F.
Frandsen
and
W.
Johansen
, “
Corporate Communication
,” In
The International Encyclopedia of Strategic Communication
,
1
10
(
2018
).
This content is only available via PDF.
You do not currently have access to this content.