Professional Documents
Culture Documents
The Philippine National Public Key Infrastructure in Pamantasan NG Lungsod NG Muntinlupa Towards Digital Services Security Model
The Philippine National Public Key Infrastructure in Pamantasan NG Lungsod NG Muntinlupa Towards Digital Services Security Model
DOI: https://doi.org/10.54476/ioer-imrj/022761
ABSTRACT
The study explores the integration of the Philippine National Public Key Infrastructure (PNPKI) into the
digital services framework of Pamantasan ng Lungsod ng Muntinlupa (PLMun), highlighting the urgent need
for enhanced security measures in the academic digital landscape. It aims to evaluate the feasibility of
PNPKI incorporation into PLMun's digital services, assess its potential to bolster data security and integrity,
and propose a comprehensive security model for public universities utilizing PNPKI. Employing a systematic
approach, the research delves into PNPKI's compatibility with existing digital infrastructures and compares
it against current security models within educational institutions. Methods may include surveys or interviews
for stakeholder feedback. The anticipated findings suggest that PNPKI implementation could significantly
improve data security, authentication processes, and digital resilience for PLMun, setting a precedent for
similar initiatives in other public universities. This abstract encapsulates the study's objective, methodology,
and potential impact, offering valuable insights for policymakers, university administrators, and IT experts in
advancing a unified security architecture.
Keywords: Information Technology, Public Key Infrastructure, Digital Services, Security Model
METHODOLOGY
OBJECTIVES OF THE STUDY
The methods and techniques of data
collection will include research questionnaires for
The specific objectives of this research can
the evaluation, semi-structured interviews, and
be further specified as follows:
focus group discussions.
1. To evaluate the level of accuracy and Survey: To gather data from the sample, a
consistency of knowledge and training of standardized questionnaire will be employed. The
PLMun staff. poll will be done online, with participants notified
2. To assess user adoption of the PNPKI in through their respective email addresses.
terms of its efficiency and transparency.
3. To identify and analyze any regulatory and Interviews: Semi-structured interviews with
legal concerns related to the execution of chosen participants will be done to acquire a better
E.O. 810 and PLMun's use of the PNPKI in understanding of their experiences and viewpoints
terms of data privacy and security. on the usage of PNPKI.
1. PNPKI Outcome in terms of Accuracy and 2. Summary of findings based on the five
Consistency criteria of the PNKI
2. PNPKI Outcome in terms of Efficiency and
Table 1
Transparency Summary of findings based on the five criteria of the PNKI
3. PNPKI Outcome in terms of data privacy
and security
Llobrera, J. D. (2018). Towards a secure and reliable e- Vasiu, R., Stanciu, C. V., & Constantin, F. (2019). The
government through the use of public key impact of cybersecurity on the e-government
infrastructure in the Philippines. In Proceedings of system. Sustainability, 11(16), 4298.
the 2018 5th International Conference on Industrial https://doi.org/10.3390/su11164298
Engineering and Applications (pp. 39-42).
Verma, A., & Sethi, A. (2019). A secure PKI-based key
Manalo, C. M. (2019). Electronic signatures and public management scheme for smart grid communication
key infrastructure: A review of legal frameworks and networks. Journal of Ambient Intelligence and
implications for the Philippines. In Proceedings of Humanized Computing, 10(4), 1573-1584.
the 2019 4th International Conference on Computer
and Communication Systems (pp. 51-57). Villaluna, G. V. (2018). A legal framework for e-
commerce in the Philippines: Opportunities and
McLaughlin, S., & Polk, W. T. (2004). Public key challenges for public key infrastructure. In
infrastructure: building trusted applications and web Proceedings of the 2018 International Conference
services. John Wiley & Sons. on Cyberlaw, Cybercrime & Cybersecurity (pp. 144-
150).
Mukherjee, A., & Kekre, S. (2014). Analysis of public
key infrastructure (PKI) implementation in e- Wang, R., Wang, H., & Xu, R. (2018). A PKI-based
government: A case study of India. Electronic authentication scheme with privacy preservation for
Government, an International Journal, 11(4), 338- VANETs. Wireless Personal Communications,
356. doi: 10.1504/EG.2014.066812 101(2), 801-817.
Tandiono, S., Susanto, A. B., & Saputra, A. (2020). The Zheng, S., Wang, Q., & Zhang, Y. (2017). A PKI-based
effect of security awareness and perceived ease of certificateless signature scheme without bilinear
use on public key infrastructure (PKI) adoption for pairing. Journal of Computational and Theoretical
digital signature in Indonesia. Journal of Physics: Nanoscience, 14(8), 4001-4005.
Conference Series, 1527(1), 012010.
Zolbahari, A., Osman, S., & Yusuf, L. M. (2019). The
Ugwu, C. I., Ogbu, F. O., & Iwu, C. G. (2020). Electronic impact of public key infrastructure (PKI) adoption on
government and cybersecurity in developing organizational performance in digital transformation.
countries: The case of Nigeria. Journal of Journal of Theoretical and Applied Information
Technology, 97(15), 4271-4284.
COPYRIGHTS