You are on page 1of 41

CHAPTER I: INTRODUCTION OF THE STUDY

1.1 Introduction and its Background

The identification card is a pertinent document of every enrolled students it gives the
basic information and provides protection of the students. The information provided
in the identification card must accurate and untampered. With the suggested
implementation of the TFVC Computerized ID System using Signature Pad, the
contents of the identification card has its assurance of accuracy. This is a document
that is used to verify the identity of an individual. It is identification an official card that
contains your name and photograph or other pertinent information to prove who you
are. Until now the traditional way of making ID is still being used called a “Name
Tag”, this name tag contains the name of the student and grade or year level and
section. As time passes, the technology is evolving, the ID system is now being
implemented now in many schools, the ID system is convenient in the processing
and claiming of the id as well as in gathering implementation regarding the student.
The Fisher Valley College in Barangay Hagonoy, Taguig City has been founded by
ATTY.and MRS. Ronald R Yap in October 7, 1986 and was approved by the
Securities and Exchange Commission (Sec Reg #136699) in November 25, 1896.

Mrs. Rebecca M. Yap, who by profession is an educator and is well involved in the
field of education, then became the institution’s forerunner. Fisher Valley College is
the name given to the school primarily because of our Lord Jesus Christ’s mandate
requiring us to be “Fishers of Men,” and secondly because of its strategic location
within the fishing village of Taguig, Metro Manila. The first three (3) years of
existence was a great challenge to the people behind this institution of learning. With
a handful of teachers, moderators and parents working hand in hand in the spirit of
togetherness, obstacles were brought to a well taken solution.

Having complied with the law and requirements, the Department of Education,
Culture and Sports (DECS) issued the school permit to operate legally. But greater
and better things happened to The Fisher Valley College. The Kindergarten and
Elementary Departments were given full government recognition by the Department
of Education, Culture and Sports, and a High School Department was added. The
High School Department, also received Government recognition on March 1, 1995.

Year after year, the school strives to improve the standard of education. Moderators
and faculty members are screened and trained to live up to its slogan “Low Tuition
Fee/Quality Education.” The fees truthfully are minimal and affordable and caters to

1|Page
the needs of both the average, high and low income level groups in the community.
The School Directress Mrs. Rebecca M. Yap has kept her promise to the people of
Taguig and suburbs that this school is here to stay to take active part in the moulding
of our youth in this part of Metro Manila through Christian Education. On May 30,
1993, the Board of Trustees applied for a change of institutional name from FISHER
VALLEY SCHOOL to FISHER VALLEY ACADEMY. Said application was approved
by the Securities and Exchange Commission (SEC) on July 7, 1993.

THE FISHER VALLEY COLLEGE has truly been blessed by God. A College
Department with many academic offerings to choose from was opened in June 1996.
The name Fisher Valley Academy was changed to THE FISHER VALLEY COLLEGE
and approved by the SEC on January 16, 1996. In 1997 GOD blessed the school
with a branch “The Fisher Valley Academy” in Camaman-an, Cagayan de Oro City.

In the summer of 2001, the Commission on Higher Education issued Government


Recognition to the courses Bachelor of Elementary Education (BEED), Bachelor of
Secondary Education (BSE) majors in English and Math, Bachelor of Science in
Accountancy (BSA), Bachelor of Science in Business Administration (BSBA), and
Associate in Computer Technology (ACT). Later, recognition was also granted to the
courses Bachelor of Science in Information Technology (BSIT), Bachelor of Science
in Computer Science (BSCS), and Bachelor of Science in Hotel and Restaurant
Management (BSHRM).

In 2004, the C5 Annex was opened initially offering two-year vocational courses. Now
it has expanded to a new four-storey building offering pre-school, elementary and
high school levels and a newly offered two-year Nursing Assistant course in addition
to the 6-months caregiver.

The TFVC is currently using manual process in creating students ID’s: student fill up
a form and provide picture and the processing time is quite long.
As a solution the proponents will create Computerized ID system for TFVC to speed
up the process of creating ID for students and easy handling of clerical work and the
students will no longer required to bring a picture to the office, the programming
language used by the proponents is Visual Studio 2019 and the database is MS SQL
Server 2019.

The whole system can be accessed by the admin as well student assistant for them
to fill up the form.

2|Page
1.2 Objective of the Study

1.2.1 General Objective


 To innovate the existing ID system of TFVC with the use of the
Computerized ID System using Signature Pad.

1.2.2 Specific Objectives

 To design, develop and implement a module that will ready to print


out record.
 To design, develop and implement a module that will reduce the
time of releasing ID.
 To design, develop and implement a module that will create a
signature of the students.
 To design, develop and implement a module that will take a
picture of students.
 To design, develop and implement a module that will create user
account.
 To design develop and implement a module the list of students set
for releasing ID.

3|Page
1.3 Conceptual Framework

INPUT PROCESS OUTPUT


Software Requirements:
• Visual Studio 2019 Requirements
Engineering
• MS SQL Server 2019

• Windows 8 or Higher
Architectural
Design
• .Net Framework 4.8

• Crystal Report Sp33 Detailed Design


THE FISHER VALLEY
Hardware Requirements: COLLEGE,
Coding
INC.
Server: 8gb ram
COMPUTERIZED ID
500GB (Of Storage) SYSTEM USING
Unit Testing
SIGNATURE PAD
Dual Core or higher

(TFVC – CIDSSP)
Client: 4GB ram
System Testing
250GB (Of Storage)

Dual Core or higher


Acceptance
Other Devices:
• Signature Pad
• Webcam MODIFIED WATERFALL
MODEL WITH FEEDBACK
Peopleware:
• Admin Source: Software Engineering
• Student Assistant A PROGRAMMING APPROACH
(DOUGLAS BELL)
(3rd Edition Page 27)

4|Page
1.4 Statement of the Problem

1.4.1 General Problem


 How to innovate the existing ID system of TFVC with the use of
the Computerized ID System using Signature Pad?

1.4.2 Specific Problems

 How to design, develop and implement a module that will ready to


print out record?
 How to design, develop and implement a module that will reduce
the time of releasing ID?
 How to design, develop and implement a module that will create a
signature of the student?
 How to design, develop and implement a module that will take a
picture of students?
 How to design develop and implement a module the list of
students set for releasing ID?

5|Page
1.5 Statement of the Problem (after Implementation)

1. What are the results of evaluation of the Admin of the system with the respect of the
following?

 ACCURACY
 EFFICIENCY
 FUNCTIONALITY
 SECURITY
 USER-FRIENDLINESS
 MAINTAINABILITY

2. What are the results of evaluation of the Student of the system with the respect of the
following?

 ACCURACY
 EFFICIENCY
 FUNCTIONALITY
 SECURITY
 USER-FRIENDLINESS
 MAINTAINABILITY

3. Is there any difference among the results of evaluation of the Admin and Students of
the system with the respect to the following?

 ACCURACY
 EFFICIENCY
 FUNCTIONALITY
 SECURITY
 USER-FRIENDLINESS
 MAINTAINABILITY

6|Page
1.6 Hypothesis of the Study

At 0.05 (5%) level of significance, there is no difference among the results of the evaluation
of the Admin and Student of the system with respect of the following:

 ACCURACY
 EFFICIENCY
 FUNCTIONALITY
 SECURITY
 USER-FRIENDLINESS
 MAINTAINABILITY

7|Page
1.7 Significance of the Study

This study aims to benefit to the following:

Proponents:

The proponents will help the admin to create and process the ID in a short period of
time and to be more productive in the workplace.

Future Researchers:

The study will allow future researchers to acquire the necessary information
regarding the system.

The Fisher Valley College, INC.

This study will benefit the school by facilitating the organized claiming of ID’s

Admin:

The admin can reduce the time in creating an ID using the system.

Students:

The students can easily claim their ID’s accurately in just a short period of time.

8|Page
1.8 Scope and Limitation

Scope
File maintenance
• Department Module
• Course Module
• User Maintenance
Transaction
• Student Registration
• Job Order
Reports
• ID Printing
• List of the students for releasing
System Utilities
• Audit Trail
• Back up and Restore

Limitation

 No monitoring of payment of ID.


 Exclusive for TFVC college students only.
 The student cannot access the system.

9|Page
1.9 Definition of Terms

1.9.1 Technical Terms

 Barcode – A barcode, consisting of bars and spaces, is a machine-readable


representation of numerals and characters. Today, stripes as shown below on
packages of products sold at supermarkets, convenience stores and other stores
are ubiquitous.
 Database – A database is an organized collection of structured information, or
data, typically stored electronically in a computer system.
 ERD – An Entity Relationship (ER) Diagram is a type of flowchart that illustrates
how “entities” such as people, objects or concepts relate to each other within a
system. ER Diagrams are most often used to design or debug relational
databases in the fields of software engineering, business information systems,
education and research.
 Microsoft SQL – Microsoft SQL Server is a relational database management
system (RDBMS) that supports a wide variety of transaction processing, business
intelligence and analytics applications in corporate IT environments.
 Module – A module is a distinct assembly of components that can be easily
added, removed or replaced in a larger system.
 Query – A query is a request for data or information from a database table or
combination of tables. In the context of queries in a database, it can be either a
select query or an action query.
 Server – A server is a specialized computer or software system designed to
provide services, data, or resources to other computers, known as clients, over a
network. These services can range from delivering web pages and email to
storing and managing files or running applications.
 System – A system is a group of interacting or interrelated elements that act
according to a set of rules to form a unified whole. A system, surrounded and
influenced by its environment, is described by its boundaries, structure and
purpose and is expressed in its functioning.
 UML – Is a general-purpose visual modeling language that is intended to provide
a standard way to visualize the design of a system.
 Visual Studio – Is a powerful developer tool that you can use to complete the
entire development cycle in one place. It is a comprehensive integrated
development environment (IDE) that you can use to write, edit, debug, and build
code, and then deploy your app.

10 | P a g e
1.9.2 Operational Terms

 ID – Abbreviation for identification: any official card or document with your


name and photograph or other information on it that you use to prove who
you are.
 Import – Import files are documents, images or other digital items that a
person has transferred from one program into another. The process of
importing a file means to download it onto a platform from a different source.
 Picture – a visual representation of a person, object, or scene, as a painting,
drawing, photograph, etc.
 Print – To produce (a text, picture, etc.) by applying inked types, plates,
blocks, or the like, to paper or other material either by direct pressure or
indirectly by offsetting an image onto an intermediate roller. To reproduce (a
design or pattern) by engraving on a plate or block.
 Process – A process is defined as an entity which represents the basic unit
of work to be implemented in the system. To put it in simple terms, we write
our computer programs in a text file and when we execute this program, it
becomes a process which performs all the tasks mentioned in the program.
 Retrieve – Searching for, locating, and returning data. For example, a user
may retrieve a document on a computer to be viewed or modified.
 Save – Saving data means storing research materials so that they can be
accessed and used – by yourself or by others – at a later date.
 Signature – A person’s name, or a mark representing it, as signed personally
or by deputy, as in subscribing a letter or other document.
 Simultaneous - Simultaneous processing with two or more processors in one
computer or two or more computers processing together.
 Upload – Uploading is the transmission of data from a local device to a
remote device. Typically, the remote device is a larger server.

11 | P a g e
1.10 UML Diagrams

Can manage all the system


features.

ADMIN

Can only manages the fill up


form.

STUDENT
ASSISTANT

12 | P a g e
1.11 Entity Relationship Diagram
LEGENDS:

Relationship

One-to-many

tbl_department tbl_student
Has
ID
ID
StudNo
Department Lastname
Description Firstname
Middlename
Logo
MI
Fcolor CourseID
BRed Address

BGreen Guardian
GuardianContact
BBlue
RegisterDate
BColor BarcodeImage
StudImage
StudSignature
StudContact
Has

tbl_course
Has
ID

Course

Description tbl_JobOrder
DepartmentID
ID
Year
StudID
Status
Status

13 | P a g e
Chapter II: REVIEW ON RELATED LITERATURES AND STUDIES
This chapter presents the related studies and related literature of the study improvement for
THE FISHER VALLEY COLLEGE, INC. ID SYSTEM USING SIGNATURE PAD (TFVC -
ISSP). This chapter includes the ideas, finished thesis, generalization and conclusions,
methodologies and others. Those that were included in this chapter helps in familiarizing
information that are relevant and similar to the present study.

14 | P a g e
2.1 Review on Related Studies
2.1.1 Local Studies
2.1.1.1
Title: SSS Registration System

Proponents: Jemelma Ann Urbien, Rienel Bernabe, Renen Sorianosos

Date Published: October 2011

Source: TFVC School Library

The proponents of SSS Registration System developed a system for the SSS Company.
Their goal is to speed up the registration process of applicants and helps SSS personnel to
view the information of applicants if they already registered in their system, the devices they
used are pen tablet and fingerprint readers for thumb mark and directly attach of the system
and minimized the line in “forms and Counseling” desk.

In relation to this study, the proponents of TFVC Computerized ID System using Signature
Pad is also adapted the speed up process by using of devices.

15 | P a g e
2.1.1.2
Title: Enhancement of TFVC College Office Registration System
Proponents: Myra Joy Ann G. Bayot, Michael S. Dela Cruz, Kayvin L. Malawig
Date Published: February 2012
Source: TFVC School Library

The Enhancement of TFVC College Office Registration System (ETCORS) was designed,
developed and implemented, with the aim of helping office to organize the records, minimize
the processing time of transaction and lastly is to print out the registration form of student.

In relation to this study, the proponents of Enhancement of TFVC College Office Registration
System (ETCORS) designed and developed a system to enhance the existing TFVC College
Office Registration System for better and more organized flow of transactions while the
proponents of TFVC Computerized ID System using Signature Pad is also designed and
developed a system to enhance the existing TFVC ID System to speed up the process and
also minimizing the work load. Both proponents have the same purpose of helping the TFVC
enhance the College Office Registration System and College Office ID System.

16 | P a g e
2.1.1.3
Title: Our Lady of Lourdes Chapel Automated Record System

Proponents: Jesthony Buscargas, Harold Cortez

Date Published: March 2012

Source: TFVC School Library

The proponents of Our Lady of Lourdes Chapel Automated Record System, they created a
system for their beneficiary to avoid the redundancy of the information and store the
important files to the system, using a search bar as well as making the transaction process
easier and faster.

In relation to this study, both studies have slow process of registration and finding of
records, the proponents of Our Lady of Lourdes Chapel Automated Record System
developed a system that will find the records of the client into the search bar easily, also the
proponents of TFVC Computerized ID System using Signature Pad develop a system that
will help the admin or staff to fill up the information of students and this computerized ID
system will help the College Office to find the records of students faster by searching the
students name.

17 | P a g e
2.1.1.4

Title: ID System

Proponents: Ecalne Karl Eruel, Laggui Junior, Alcantara John Mark

Date Published: June 18, 2014

Source: TFVC Library

The proponents of ID System designed and developed a system for The Fisher Valley
College that will replace the manual process into computerized ID System, the student
assistant will no longer ask for the 1x1 photo of the student and the signature will be entered
in system when they use the signature pad, and the student is finished the all necessary
information will be automatically recorded to the database and ready to print out the ID, the
proponents of ID system wants to make the releasing of ID faster.

In relation to this study, the proponents of TFVC Computerized ID System using Signature
Pad is also replacing the manual process of ID, the student also will no longer provide a 1x1
picture and the signature is automatically entered to the system when they used the
signature pad, the proponents of ID System and TFVC Computerized ID System using
Signature Pad has a same purpose to make the College Office faster and easier to process
and releasing of Id for the students.

18 | P a g e
2.1.1.5
Title: Doctor Information System
Proponents: Marilyn S,J. Bergado, Joshua Regalario, Elenie Palce
Date Published: March 2012
Source: TFVC School Library

The proponents of Doctor Information System designed and developed a system to help
arrange disorganized records of the listed doctor information, likewise it will be arranged
according to specific number or name that is listed on the database and for easy access of
records.

In relation to this study. the TFVC Computerized ID System using Signature Pad is also
designed and developed to access the records and information of students. Both proponents
have the same purpose for faster access and also to avoid redundancy of data or
information of the doctors and students.

19 | P a g e
2.1.2 Foreign Studies
2.1.2.1
Title: Automated Student ID card
Proponents: Leo Simon Anfone

Date Published: 2012

Source:https://www.scribd.com/document/336997552/Automated-Student-Id-Card?
fbclid=IwAR04NJ9bxLhto6vx_fIZfQM3HOkT-2ZkcuVRyFYZdg-d9S1YhDnlyZZfSnk

The study aims to develop an automated system for student ID card generation, reducing
human effort. The fully automated solution generates and maintains student ID cards, which
are used to verify personal identity aspects. The entire process is done using computers,
collecting and storing student information in a database, while the administration can provide
the student ID card.

In relation to this study, the proponents of Automated Student ID card aimed to reduce the
human effort while the proponents of TFVC Computerized ID System using Signature Pad
design and develop a Computerized ID system to reduce the time of making ID and reduce
the work load of the admin.

20 | P a g e
2.1.2.2
Title: Biometric Signature Verification

Proponents: Suraiya Jabin and Farhana Javed Zareen

Date Published: August 3, 2015

Source: https://www.inderscienceonline.com/doi/abs/10.1504/IJBM.2015.070924

This study designed and developed a Biometric Signature Verification, Biometric signature
verification (BSV) is gaining interest due to the growing need for security and individual
authentication in various sectors, including banks, offices, and commercial organizations.
BSV is a behavioral biometric technique that uses unique individual behavior to authenticate
a signer during transactions. Digital signature pads use algorithms to record signature
features, ensuring a secure and unique authentication process.

In relation to this study, the proponents of Biometric Signature Verification get the signature
of an individual for authentication while the proponents of TFVC Computerized ID System
using Signature Pad also get the signature of the students for ID using signature pad, both
proponents have the same purpose of getting the signature of an individual.

21 | P a g e
2.1.2.3
Title: Online Registration System
Proponents: Emad Shafie, A. Al-Ajlan, K. Aldrawiesh, Abdullah Bajahzar
Date Published: January 2011
Source: https://www.researchgate.net/publication/261203302_Online_registration_system

This study designed and developed the Online Registration System, it consists of three main
users: student, instructor, and administrator. Students can access the application to view
their time table and attendance history, while instructors can register attendance and update
attendance history. The system administrator manages the system by adding, deleting, or
updating students, instructors, and modules. The system is designed for academic
purposes, allowing students to remind lecturers of their attendance and providing a platform
for instructors to manage their attendance.

In relation to this study, the proponents of TFVC Computerized ID System using Signature
Pad has two main users: student assistant and admin staff, the students can only access the
fill up form and the admin can access the whole system, also the admin can add, edit and
delete the information of the students.

22 | P a g e
2.1.2.4
Title: Enrollment System

Proponents: MaoWatanabe

Date Published: March 22 2015

Source:https://www.scribd.com/document/259551148/INFORMATION-SYSTEM-CHAPTER-
1-THESIS

This study designed and developed an Enrollment System. The computerized Enrollment
System helps the faculty and students to reduce the process of enrollment, storing of all the
information of the student in computerized system in a convenient and organized method
that will decrease a workload of the officed staff, the old students want to retrieve their
information, the office staff will immediately view the file without any problem.

In relation to this study, TFVC Computerized Id System using Signature Pad also aims to
help the College Office to lessen the work load, and to search quickly the information of
student when stored in the computerized ID system, the students will also reduce the waiting
time for the release of the IDs.

23 | P a g e
2.1.2.5
Title: Online Library Management System
Proponents: Pramod Ku Tiwari
Date Published: 2012
Source:https://www.scribd.com/document/31214406/Online-Library-Management-System?
fbclid=IwAR3olCiuX73o5vqiQIN8s6EO-mTGdORpbvVYPht1kd1xguxDHBu998tE744

The study aims to create an Online Library Management System that stores information
about users, workers, branch locations, and media stored in those locations. The system
focuses on books with each media item tracking its location, descriptive attributes, status,
and cost for losses and late returns. Books will be identified by their ISBN, while movies
will be identified by their title and year. Each media item will have a unique ID number for
multiple copies. Customers will provide their name, address, phone number, and date of
birth when signing up for a library card, which will assign a unique user name and ID
number. Checkout operations and media on hold requests will require a library card, with
each card having its own fines.

In relation to this study, both studies want to develop a system that will store the
information of a customer and student. The proponents of Online Library Management
System have a database need to store information of users while the proponents of TFVC
Computerized ID System using Signature Pad also a the information of the student
number and Signature. The information of the student also stored in database and can
also printed when the student information is in the database.

2.2 Review of Related Literature

24 | P a g e
2.2.1 Local Literature
2.2.1.1

Title: Basay National High School Online Registration System

Authors: Estrellado, Jeanalyn G.

Year Published: 2014

Source: https://repository.upou.edu.ph/items/ebb3e0ef-a52e-44dc-aa5c-4a650434457d

The project research focuses on the Online Registration System of Basay National High
School, addressing issues like excessive paper consumption, multiple form entries, filing
difficulties, and handwritten data entry errors. The proposed system automates enrollment,
organizes student files, and print IDs and records, thereby saving time and increasing
productivity.

In relation to this literature, the proponents of TFVC Computerized ID System using


Signature Pad aims to enhance the current way of ID processing in the college office and to
avoid incorrect spelling duplication of name and disorganized data record, and to increase
the productivity of college office staff.

2.2.1.2

25 | P a g e
Title: Computerized Record Management System of one National High School in the
Pangasinan Philippines

Authors: Kurt Phillip Danlog, Elinita Rebujio, Punnybhel De Guzman, Krelyssa Irish Arrieta,
Baden Darwin Carranza

Date Published: August 18, 2017

Source: https://www.sajst.org/online/index.php/sajst/article/view/130

The authors of Computerized Record Management System have designed, developed,


efficiently and accurately record of student information, maintained and secured their
records, and reduce staff workload. The system aims to focus processes such as
registration, sectioning, and grade generation at Quetegan National High School. Current
problems include unorganized and difficult searching, updating records, and unsecured files.
The proposed system features registration, computerized record filling, and automated
report generation. The current record management system at QNHS is still manual and
paper-based, and the proposed system aims to address these issues by providing a more
secure and efficient system.

In relation to this literature, the proponents of TFVC Computerized ID System using


Signature Pad will enhance the current ID system in TFVC, the problem in current ID system
having disorganized records, and it took a long time to release the ID, in TFVC Id System
using Signature Pad will have a record for the students who have an ID, it will speed up the
process of ID registration and it will reduce the waiting time of releasing an ID.

26 | P a g e
2.2.1.3

Title: Data Privacy Act of 2012: A Case Study Approach to Philippine Government Agencies
Compliance

Authors: Bernie Fabito, Michelle Renee Domingo Ching, Nelson J Celis

Date Published: October 2018

Source:https://www.researchgate.net/publication/
327281053_Data_Privacy_Act_of_2012_A_Case_Study_Approach_to_Philippine_Governm
ent_Agencies_Compliance

The Philippine Data Privacy Act (DPA) of 2012 aims to safeguard citizens' personal
information from unauthorized disclosure. The National Privacy Commission defines data
privacy as the individual's right to not disclose their information and live without surveillance.

In relation to this literature, the proponents of TFVC Computerized ID System using


Signature Pad is guided by the law of Data Privacy Act of 2012 to protect the information of
students and to prevent it from malicious activities.

27 | P a g e
2.2.1.4

Title: Implementation of Automated Student ID System And Its Effect On Security


Management Among Students.

Authors: Ines, Zyan Frances, R., Ambata, Aloelily Dianne, M., Cariazo, Mhelanie, S., Dela
Masa, Precious, G., Discallar, David, J.

Date Published: February 2020

Source:https://www.coursehero.com/file/96953882/Implementation-of-Automated-School-ID-
Systempdf/

This study aimed to determine the possible outcome of implementing the Automated Student
ID System in every school. The system can help the school management to improve its
security. Also, the system aimed to lessen the worries of parents in terms of security and
safety of their child inside the school campus.

In relation to this literature, the author of, Implementation of Automated Student ID System
And Its Effect On Security Management Among Students. Is to help their school
management to improve the security inside the school campus, while the proponents of
TFVC Computerized ID System using Signature Pad has a same purpose to make the
college office reduce their time to create an ID.

28 | P a g e
2.2.1.5

Title: How cashier system helpful


Author: Ace Adrian Sandoval
Source: TFVC Library

Cashier system is useful especially when the school retrieves the important information from
the student. The author conclude that computerized accounting system involves the use of
computers to handle large volume of data with speed, efficiency and accuracy aimed at
overcoming fundamental challenges which do not change the principle. The principle of
accounting remains the limitations of many accounting and hence producing quality and
reliable work.

In relation to this literature, the author and the proponents have similar way. The author of
How cashier system helpful is targeting the large volume of data with speed, efficiency, and
accuracy while the proponents of TFVC ID System using Signature Pad targeting the faster
and easier way of processing of id and printing large volume of student’s id.

29 | P a g e
2.2.2 Foreign Literature

2.2.2.1

Title: The Emerging Era of Digital Identities: Challenges and Opportunities for the G20

Authors: Shiva Kanwar, Aarti Reddy, Mansi Kedia, Mayank Manish

Date Published: August 3, 2022

Source:https://www.adb.org/sites/default/files/publication/822681/adbi-brief-emerging-era-
digital-identities-challenges-and-opportunities-g20.pdf

Identification is the process of identifying an entity or individual based on unique attributes


such as uniqueness, recognition, and coverage. The identity lifecycle involves registering,
issuing, using, and maintaining identities through stages such as enrolling data, storing it,
proving its validity, issuing credentials, verifying and authenticating, and updating
credentials.

In relation to this literature, TFVC Computerized ID System using Signature Pad will create
an Id with uniqueness, validity, maintain of the Id, and with no incorrect spelling. The authors
of The Emerging Era of Digital Identities: Challenges and Opportunities for the G20 and
TFVC Computerized ID System using Signature Pad have the same purpose to make an Id
readable and understandable information of a person.

30 | P a g e
2.2.2.2

Title: How School ID Cards Help Enhanced Student and Staff Safety

Author: Jack Travel

Date Published: November 9, 2020

Source: https://bodno.com/blogs/news/how-school-ids-enhance-student-staff-safety

School ID cards not only aid security personnel in identifying students and faculty but also
enhance campus safety by providing quick identification for teachers, administrative staff,
and school aids. An ID system improves visitor management and control over campus
access. ID cards also help manage access to various parts of the campus, such as the
library, labs, and administrative departments. Implementing policies like requiring students to
present their ID cards to security officers can further enhance security, preventing
unauthorized access and preventing potential trouble.

In relation to this literature, the author of How School ID Cards Help Enhanced Student and
Staff Safety, aims to safeguard the students and staff in school campus area while the TFVC
Computerized ID System using Signature Pad has the same purpose of safeguarding the
staff and student while in the campus area and gain access to library, laboratories, and
administrative department offices.

31 | P a g e
2.2.2.3

Title: The Importance of ID Card Systems in Schools

Author: Specialist ID Inc,

Date Published: APRIL 23, 2023

Source: https://www.specialistid.com/blogs/news/the-importance-of-id-cards-in-school

School ID cards help identify enrolled students, those from other campuses, or those with
revoked access privileges. Enrolled students can access various facilities, while non-
enrolled students cannot. Wearing a school ID card at all times helps security and resource
staff identify individuals, not permitting, allowing for appropriate and effective responses.
Attaching the ID card to a ID laces to ensures students have it on them at all times, making it
essential for emergencies. This ensures students have access to necessary resources and
facilities.

In relation to this literature, the proponents of TFVC Computerized ID System using


Signature Pad, propose a corresponding colors at the back of the ID for course identification
and also help to the security and staff find out if the student is enrolled in TFVC or not to
ensure the safety of the students.

32 | P a g e
2.2.2.4

Title: Facial recognition technology in schools: critical questions and concerns

Authors: Mark Andrejevic, Neil Selwyn

Date Published: 05 Nov 2019

Source: https://www.tandfonline.com/doi/full/10.1080/17439884.2020.1686014

Facial recognition technology is required in some schools to address issues like campus
security, automated registration, and student emotion detection. Initially seen as routine
additions to school systems with existing monitoring and surveillance cultures, these
technologies are now being combined into various public life aspects.

In relation to this literature, the authors of Facial recognition technology aimed to use the
technology for security purposes while the proponents of TFVC Computerized ID System
using Signatured Pad used student number for identification.

33 | P a g e
2.2.2.5
Title: Records Management and Electronic Records Management Opportunities and
Limitations. A case study in Greek companies.

Author: Konstantinos Manikas

Date Published: June 16, 2015

Source: https://www.diva-portal.org/smash/get/diva2:842828/FULLTEXT01.pdf

The implementation of IT systems has expanded the field of Records Management, enabling
electronic and distance record management. Electronic Records Management has a similar
to paper and electronic records. Although the types of records have changed, the necessity,
usefulness, and aim of Records Management remain the same to enhance business
processes by boosting and improving the management of both paper and electronic records.

In relation to this literature, the author of Records Management and Electronic Records
Management Opportunities and Limitations. They aimed to implement the Electronic
Records Management to make easier, while the proponents of TFVC Computerized ID
System using Signature Pad have the same purpose to keep the records digitally and
convenient in storing the information of the students.

34 | P a g e
2.3 Synthesis

This chapter review of Related Literature and Studies has been made, it was
observed that the current studies were focused on the proposed system entitled of
TFVC ID System using Signature Pad. With the above mention studies and
literature, it shows that the analysis has the same procedure on the system that
being proposed. With the help of this literature and studies, we gather information
and knowledge about the system that we are going to develop and implement in this
project. The following are the listed information and data adopted from the literature
and studies:

 This helps us identify the problem and flow about ID System.


 This also offers us idea about the control, features and objectives about the system.
 The problems and issues that we were going to encounter during the development of
this project.

35 | P a g e
CHAPTER III: RESEARCH METHODOLOGY

This chapter includes the research design, the data and its sources, the research
instrument(s), the procedure, the data gathering procedure, and the plan for data analysis.
This study will utilize descriptive method of research. Descriptive method is defined as
collection of data in order to gather information from participants. Using this methods of
research, the researchers will identify the major problems that occur in the current system,
the advantages and disadvantages of the current system and so that the researchers will be
able to identify what would be the solution for the problems that the current system has.

3.1: Research Design


Descriptive method of research will be employed in the different phases of the project.
Specifically, the proponents will be using descriptive research in identifying and defining the
nature, scope and conduct of the existing system so that the project will have a full grasp of
how they are going to translate the traditional transaction system to a computerized system.
Additionally, it will allow them to infuse innovation into the project to make it even more
useful and accessible to its target users and beneficiaries.

36 | P a g e
3.2 Method used in developing and evaluating the Software product

The proponents have decided to use the Modified Waterfall Model with Feedback, if errors or
problem has been detected at any phase, the feedback system helps the previous phase to
correct the errors of problems, and the Modified Waterfall Model with Feedback is commonly
known for creating a software or system.

MODIFIED WATERFALL
MODEL WITH FEEDBACK

Source: Software Engineering


A PROGRAMMING APPROACH
(DOUGLAS BELL)
(3rd Edition Page 27)

37 | P a g e
3.3 Respondents Distributions

Respondents Total Population Sample Percentage

Admin 4 4 67

Student Assistant 2 2 33

TOTAL 6 6 100

4
Admin P= (100) = 67%
6

2
Student P= (100) = 33%
6

6
n= 2 = 5.9 round off to 6
1+ 6 ( 0.05 )

38 | P a g e
3.4 Data gathering Procedure
• The proponents have planned to determined first who will benefit for the
system.
• after the planning, we wrote a request letter for the beneficiary to conduct an
interview to the College Office.
• when the request letter is accepted we have started to interview the admin to
collect and gather the necessary information for the ID system, after
interviewing the beneficiary.
• the proponents starts to brainstorming what will be used to build a system,
after the brainstorming the proponents started to code for the ID system.
• The proponents conduct trial and error to ID system.
• After coding the ID system was tested by the proponents.
• The ID system is finished and ready for implementation to the beneficiary.

39 | P a g e
3.5 Research Instruments
● Interview - An interview is a conversation for gathering information. A research
interviews involves an interviewer, who coordinates the process of the conversation
and ask questions, and an interviewer who respond to the questions.
● Internet Research- Was used by the proponents to look for the additional standards
questions that can be included in the questionnaires.
● Library Research- The books, articles, and thesis books that may help in
formulating and documentating the study.
● Brainstorming - A strategy for problem solving and creative thinking in the group is
brainstorming whereby the group approaches a creative problem by using their
collective intelligence. The method encourages people .to develop original ideas.
● Hardware/Software – Any type of data that is received through the software is
entered using the proponents' hardware. Whereas data is transformed into
information by software.

40 | P a g e
3.6 Statistical Treatment

The statistical method that is used to obtain the sample and percentage is
Slovin’s formula. Knowing that the proponents used a semi structured
interview, Slovin’s formula is the best option to use when lack of information
and data tabulation.

Slovin’s formula

N
n= 2
1+ Ne

Simple Percentage

P=(100)

Whereas:
F = Frequency

n = Sample size

N = Population size

e = Margin of error

P = Percentage

41 | P a g e

You might also like