Professional Documents
Culture Documents
NEWfinal Esig Docs 1
NEWfinal Esig Docs 1
INTRODUCTION
operations.
are allowed in the Philippines. As long as the electronic signature and the method
of how it is secured are in compliance with the requirements of the law, it will
become legal and binding and can be presented as evidence in any legal dispute
in court. With the challenges presented by the pandemic regarding the physical
1
Furthermore, using e-signatures in government transactions is officially
September 6, 2021, this circular sets the guidelines for using electronic
and extraction using software like Photoshop. This means that unauthorized
compromising it’s integrity and authenticity. To mitigate this risk, It is crucial to use
Additionally, organizations should implement strict access controls and audit trails
authenticity of the signatures and the documents they represent. Control measures
requirements.
2
Pangasinan State University San Carlos Campus was among the first
1497 which was promulgated on June 11, 1978. It started as the College
2024)
service delivery.
3
authentication, and audit trails, to ensure the security and validity of e-signatures
system using QR codes for Pangasinan State University San Carlos Campus
would indeed serve as a valuable control mechanism. This system would enhance
verifying their validity. By integrating QR codes into the e-signature process, the
system can generate unique identifiers linked to each document, making it easier
the risks associated with counterfeit e-signatures, ensuring the integrity of digital
In the capstone project titled “Secured E-Signature for Pangasinan State University
San Carlos Campus,” the purpose and description are as follows: The goal of this
use of QR code technology. The purpose of this system is to improve and expedite
administrative approvals are just a few of the documents and transactions for
which users will be able to securely generate digital signatures using the system.
To ensure data integrity and security, these signatures will be encrypted and
The system will offer a centralized platform that can be used to scan QR codes
for e-signature verification, doing away with the need for manual verification
will reduce paperwork, increase efficiency, and improve overall security measures
at the university.
authenticity of electronic documents. This not only streamlines the signing process
but also enhances security, reducing the risk of fraud and tampering.
To protect sensitive data and stop illegal access or tampering, the system will
encryption algorithms.
5
1.3 OBJECTIVES OF THE PROJECT
Generally, this project aims to design and develop and design “Web-based
In the digital age, the necessity for secure and efficient electronic signatures (e-
validating the authenticity and integrity of digital documents across various sectors,
Campus officials: will benefit from a streamlined and secure method for
agencies associated with PSU San Carlos Campus, will benefit from the improved
Employees: will benefit from the ability to sign official documents, approve
productivity within the university, allowing staff to focus more on their primary
responsibilities.
administrative interactions with the university. The e-signature system allows for
and other processes, saving time and reducing the need for physical paperwork,
Developers: Developers will benefit by applying their skills and knowledge in the
Future developers: will benefit from the foundation laid by the initial system,
allowing them to build upon and enhance the e-signature system over time. This
ensures the system remains relevant and effective in the face of evolving
This section outlines the project’s scope and limitations, clarifying its
operational boundaries and potential limitations that could affect its execution and
results.
University employees.
The users can access this project are the secretaries, Deans, Head
8
The system streamlines administrative processes through key features:
trail logs maintain transparency, tracking all signature activities. Additionally, users
approval workflows. The system also simplifies department office and user account
editing capabilities are not within the system’s scope, requiring users to employ
9
document versioning capabilities could further enhance the system’s utility and
user experience.
guarantees that campus officials, employees, students, and external partners will
utilize the system regularly. When stakeholders trust the system’s security, ease of
use, and reliability, they are more likely to embrace it, which leads to increased
objectives.
procedure used by PSU San Carlos for signing and managing documents, which
highlighting the time-consuming nature and potential for errors in the traditional
10
trails. The features determine the system’s effectiveness and appeal to users. Key
data encryption, and comprehensive audit trails ensure that the system meets user
needs and regulatory requirements, providing a secure and efficient solution for
document management.
and behaviors that the e-signature system must perform, such as capturing
are essential for ensuring that the system can handle all necessary operations
that the e-signature system must meet regarding performance, security, reliability,
and usability, such as response time, data encryption, system availability, and user
interface design. These requirements are critical for ensuring the overall
performance and user satisfaction of the system. High standards in these areas
guarantee that the system is not only functional but also secure, reliable, and easy
to use, which is essential for gaining stakeholder trust and ensuring long-term
success.
11
PSU San Carlos: PSU San Carlos refers to Pangasinan State University – San
Carlos Campus, the specific campus where the e-signature system is being
context for the project, highlighting the unique needs and goals of this campus.
Tailoring the system to address these specific requirements ensures that it meets
successful implementation.
encoded in it, used in the e-signature system to provide a unique identifier for
reduce the risk of fraud and streamline document management processes, thereby
evident features. Ensuring that e-signatures are secure is vital for maintaining the
unauthorized access and alterations, making the system reliable for high-stakes
12
Verification System: The verification system is the component of the e-signature
process. It ensures that signatures are genuine and documents are unaltered,
a web browser over the internet, allowing users to interact with them remotely
system offers flexibility and accessibility, enabling users to sign and manage
documents from any location. This convenience is particularly valuable for large
institutions like PSU San Carlos, where users need to interact with the system from
13
Chapter 2
This section delves into the technical aspects of the project, providing insight
into the software and programming languages used in creating the system. A web-
14
based secured e-signature verification system using QR codes integrates digital
signature and document hash, allowing verification by decoding the QR code and
requirements. While they may offer some flexibility, system requirements are
generally not strict rules. Developers ensure that the hardware and software
Table 2.1.1 Minimum Hardware Requirements for the Development of the System
Minimum
Hardware Component
Requirements
15
Storage 1TB or higher
It includes components such as the processor, RAM, storage, display, and input
Table 2.1.2 Minimum Software Requirements for the Development of the System
16
Software Component Minimum Requirement
Integrated Development
Visual Studio Code
Environment (IDE)
(XAMPP). Each of these software components plays a vital role in facilitating the
creation, design, and testing of the system’s code and user interface.
17
PHP. PHP stands for Hypertext Pre-processor, it is a server-side scripting
language widely used for creating dynamic and interactive web applications. It
allows developers to embed code directly into HTML, facilitating tasks such as
form processing, database interaction, and content generation. PHP is known for
debugging tools, and Git integration, making it a versatile tool for developers. It
HTML. The Hypertext Markup Language is the standard language used to create
the structure and content of web pages. It consists of a series of all elements, each
with its own purpose and meaning that define the layout and presentation of
render text, images, links, and other media elements, forming the backbone of the
CSS. The Cascading Style Sheets is a style sheet language used to control the
fonts, margins, and positioning. CSS enables the creation of visually appealing and
18
responsive web designs that adapt to different screen sizes and devices,
components, templates, and utilities that simplify the process of creating modern
and visually appealing user interfaces. Bootstrap’s grid system, CSS styles, and
system known for its reliability, performance, and scalability. It allows developers to
store, retrieve, and manipulate structured data using SQL (Structured Query
MySQL is widely used in conjunction with PHP and other server-side technologies
management systems.
XAMPP. The Xampp is a free and open-source cross-platform web server solution
stack that includes Apache, MySQL, PHP, and Perl. It provides developers with a
environment on their own computers, enabling them to develop, debug, and deploy
web projects without the need for internet connectivity or external hosting services.
19
Table 2.1.3 Minimum Hardware Requirements for Deployment or Implementation
of the system
Network
Stable internet connection for
remote access
20
network connectivity. These specifications ensure that the deployed system can
the system
Minimum
Software Component
Requirement
Apache (included in
Web Server
XAMPP)
the Secured E-signature on a server. It includes the operating system, web server
(Apache), database server (MySQL), and other tools like Git for version control.
These software components form the infrastructure for hosting and running the
21
Overall, these tables provide a comprehensive overview of the hardware and
software requirements for both the development and deployment phases of the
Secured E-Signature.
that delve into the expanse of existing processes, features, and the acceptability of
domains.
22
According to Erdogan & Saran (2020), investigates a server-based
Turkey’s current eID system. The study evaluates existing e-signature methods in
approach and assesses its compatibility with Turkish eID use cases. The research
proposes a server-based eID structure for Turkey and evaluates its effectiveness in
simplifying e-signing practices. Steps necessary for successful integration into the
current infrastructure are outlined. Ultimately, the study concludes that a server-
based signature approach could enhance online identification and bring Turkey
A research article published by Vilma et al., (2019) this article explores the
National Authority for Electronic Certification's formation in 2009 and the execution
of directives since 1997. It evaluates how e-signatures are currently used in the
essay also discusses how the eIDAS rule affects non-EU nations like Albania,
with putting e-documents into practice. The paper emphasizes the advantages of
creative and safe techniques, such as distant e-signatures, using observation and
23
In a study conducted by Huang (2023), the article presents a dynamic
signature verification technique (DSVT) for online and offline electronic signature
the biometric device and the security system is necessary for this strategy to work.
personal inputs. These signatures are subsequently compared to offline and online
signatures that have been stored using certificates for authentication. Certificate-
based authentication works for both offline circumstances involving individuals and
validate security parameters like signing bit, key, and size and uses a traditional
validated.
problem, a system that can encrypt a document for better security is required. This
system is built with the advanced encryption standard algorithm with a 128-bit
sized key to encrypt confidential information inside the document. During the
encryption process, this algorithm operates using 4x4 bit array blocks and passing
24
many encryption processes for at least 10 (ten) times. The application is analyzed
result of this research is a system which can secure document with AES algorithm
with a 256-bit sized key. The security element in this algorithm will make easier to
identify the owner of the document. The secured document is easily accessible
the application will activate the camera function and decrypt the information
document.
absence of written form. The article addresses the legal status, technical safety,
need for a secure environment. The article examines the legal framework
25
A research article published by Smejkal and Kodl (2021), both Digital
outperforms CES overall, despite current EU legislation favoring CES due to its
qualified certificate requirement. The authors argue that CES’s preference lacks
inherently stricter than those for paper signatures. DBS, seen as a traditional
their legal force in the context of electronic General Meetings of Shareholders (e-
GMS) remains ambiguous. The study aims to analyze the legal validity of
tools in shareholder meeting minutes. The study emphasizes several points: (1)
(CA) to ensure their legal validity, (2) Minutes of e-GMS must be notarized by a
physically present Notary to comply with relevant laws, and (3) Transactions
involving electronic signatures carry the same legal weight as authentic deeds,
26
According to Burganova et al., (2023) the purpose of this study is to develop
encrypted non-certified digital signature with the use of a security token with
biometric data (fingerprint image). In order to achieve the goal, the method of
comparative analysis was used. Existing algorithms for the electronic signature
signature using biometric data has been studied in detail. Biometric data included:
phrase, a facial image, typing biometrics when typing a free text. An external
image was also studied. Information on this media was accessed by scanning a
signatures across various sectors, especially amid uncertain times like the Covid-
signature awareness and its benefits. To address this gap, Griffin developed the
AoE-sign scale, consisting of 16 items and two sub factors: “Awareness” and
27
“Benefits,” validated through exploratory factor analysis. The scale demonstrates
high reliability and validity, with Cronbach’s Alpha values of .888 for
Awareness, .790 for Benefits, and .889 overall. This indicates its usefulness for
electronic signatures offers significant cost and time savings for organizations, it
also presents cybersecurity risks. Many companies are in early stages of adoption,
leaving room for potential manipulation and exploitation. The paper explores
measures for individuals and organizations to enhance the secure use of electronic
signatures.
signature technology has addressed the needs of security, reliability, and legal
foundation for electronic signatures began forming in the late 20 th century, with
many countries enacting laws to govern tthe use. Supply chain systems,
integration of legal and economic systems. Both public and private sectors have
operations significantly. The research examines the legal and technical aspects of
This section presents the related studies that delve deep into the
from empirical research, case studies, and detailed analysis. These selected
empirical data and real-world applications, this section underlines the tangible
effective with the aim to deliver better justice services to citizens. However,
implementing a fully electronic paperless court system can be achieved only if all
relevant processes are digitized; and no paper is used in the court workflows
This research investigates the case of the Sulaimaniyah Appellate Court electronic
court (eCourt) system in the Kurdistan Region of Iraq (KRI). An exploratory case
data, expert interviews with court users, personal observation, and document
example of the Estonian eCourt system. The results show an essential role of
eSignature in eCourt systems and aim to extend the body of knowledge and
public services. However, it poses a challenge with regard to aligning its identity
management scheme with the Public Key Infrastructure and the Qualified Digital
proposed architecture reference model is based on the CEF building blocks EBSI,
30
In a study conducted by Ullah et al., (2021), the world is growing very
centric networking is in-network cashing. Due to the system augmentation and In-
network cashing technique, this novel system needs extremely high content
rate. In order to handle the serious security issues such as attack on confidentiality,
enhance security of ICN. Briefly, this new scheme uses Digital Signature, hash
function, Trusted Third Party (TTP) and Proxy TTP. The client request for content,
after receiving a request, the content provider generates and encrypts content with
the digital signature and random value ‘k’ hash function and send it to TTP. After
the signing process, the TTP sends the encryption hash key to Proxy TTP. In this
and locations on touch screens. Experimental evaluation with 25 subjects over six
approach using the Structural Similarity Index (SSIM) for comparing signatures.
The process begins with pre-processing the signature images to enhance quality
and remove artifacts or noise. The SSIM index measures structural similarity,
contrast, and brightness between the reference and input signatures. The system
checks the SSIM value against a pre-set threshold to determine authenticity. If the
32
need for subjective human judgment and physical examination. The method
task. Most real-world repositories provide only one genuine sample, necessitating
system to address this, starting with the adjustment of the target signature's
predicted by a deep neural network. The second phase verifies the transformed
signature with another neural network. Experimental analysis using the GPDS
achieving average error rates (AER) of 3.56, 4.15, and 3.51, respectively.
Initial Coin Offerings (ICOs) and their classification under contract forms and the
2017, raising regulatory concerns and highlighting the role of smart contracts,
which facilitate token issuance. Veerpalu argues that contracts in ICOs should be
33
viewed as hybrid agreements, with the smart contract code being the execution
mechanism. The article explores whether these hybrid smart contracts qualify as
electronic contracts. While some U.S. states and EU Member States recognize
smart contracts as electronic or written contracts, this is not uniform across EU law.
agreements with handwritten signatures. The article also questions whether the
centralized trust model of eIDAS creates a bias against the decentralized trust
technology neutrality.
has changed business practices all over the world. Owing to technological and e-
traditional working methods has created a new” digital age” in human history.
Digitalization has taken over many economic activities and industries and is slowly
finding its way into the legal system. Several businesses are now concluding
conducting other daily business and legal practices. These new innovations have
34
brought into question the legal validly of these transactions, and in particular the
mechanism allows the recipient to trust the authenticity of the received message
that is coming from the said sender and that the message was not altered in
equivalent to a handwritten signature or stamp seal, but it offers more security. This
validating their identity through users’ mobile devices. This is done by utilizing the
that is in the user’s environment (i.e., ambient Wi-Fi access points) where the
validation process is implemented, in a way that requires no effort from users and
removes the "weak link" from the validation process. The proposed scheme was
experimentally examined.
35
2.1.3 SUMMARY OF RELATED LITERATURE
AUTHORS/TITLE FINDINGS
36
authentication of electronic signatures.
(CES).
37
particularly in the deed of minutes of the
signature adoption.
38
individuals and organizations.
39
signatures (e-signatures) and attestation
user.
40
image processing techniques like SSIM
domains.
contract.
41
Singh (2024) The article focuses on the legal validity of
and affidavits.
This table outlines the authors and key findings discussed in Chapter 2,
summarizing the related literature and studies utilized to evaluate the current study.
2.3 SYNTHESIS
42
The review of literature on secured e-signature verification systems,
surrounding electronic signatures. Look for studies that evaluate the effectiveness,
signature technology.
counterattacks, issues related to user privacy and data protection, and regulatory
of e-signature solutions can also provide valuable insights into their practical
this framework, individuals can better understand and explore the topic being
studied.
Carlos Campus
a system that enables users to create, identify, and manage secure e-signatures.
The signing process begins with the e-signature owner this is the person who
creates and owns the e-signature. They initiate the process by sending a request
44
to the server to generate a secured e-signature. Server this is the central
obtain, send, manage, and assign e-signatures on behalf of the owner. Guest is
anyone who wants to verify the authenticity of an e-signature. They can do this by
scanning the QR code associated with the e-signature using a QR code reader on
their smartphone or other device. The system also includes an Audit Trial Logs,
Overall, this system provides a secure and user-friendly way to create, manage,
and verify e-signatures. This can be used for a variety of purposes, such as signing
45
Chapter 3
METHODOLOGY
3.1 METHODS
the descriptive approach will assess the system's user acceptability by gathering
insights into users' perceptions and preferences through surveys and interviews.
This dual approach ensures the successful creation and deployment of a functional
46
system while gaining a deeper understanding of user needs, which facilitates
System follows the principles of the Agile Scrum Methodology, which emphasizes
development cycles known as sprints, each lasting two to four weeks, to deliver
incremental value to stakeholders. Within each sprint, the Agile Scrum approach
implementation, testing, deploy, and review phases. This methodology allows the
facilitate ongoing communication between the project team and stakeholders. User
stories, sprint backlogs, burn down charts, and product increments serve as key
quality, enabling stakeholders to gain insights into project developments. The value
and benefits of the project, including solving problems, satisfying needs, creating
47
The Agile Scrum methodology fosters a dynamic and customer-centric
Through frequent sprint cycles, stakeholders can provide feedback, ensuring that
48
Plan Phase
and financial viability must be assessed, and project needs and alternatives must
addition to defining the project timeline, budget, and resource assignments, this
phase is crucial for establishing the project’s direction and fostering understanding
communication, risk assessment, and assigning roles and duties to the project
The team chooses the tasks or user stories from the product backlog to
be worked on during the sprint during the sprint planning meeting. The team
pledges to complete the assigned tasks by the sprint’s end, and tasks are
estimated. With a mutual understanding of the sprint objective and the tasks to be
Design Phase
process. It involves the creation of detailed plans, specifications, and drawings that
At the beginning of each sprint, the team collaborates to define the user
stories or requirements for the upcoming sprint backlog. Design decisions are
49
made collectively, focusing on how to fulfill the requirements effectively and
Develop Phase
The develop phase in Agile Scrum methodology refers to the stage where
the software's actual coding and implementation occur. This phase involves the
team working together to develop and test the code, ensuring it meets the
acceptance criteria defined in the analysis phase. The development phase requires
continuous collaboration between developers and the project team to ensure the
During this phase, the team must ensure that the design meets the project
requirements, is scalable, and can be implemented within the project timeline. The
development phase is critical to the project’s success, as it sets the foundation for
Testing Phase
The testing phase in Agile Scrum methodology is a critical stage where the
focus is on ensuring the quality of the product and its readiness for release. This
50
phase involves the team working together to test the software and identify any
bugs or issues that must be addressed before the product can be released.
During the test phase, the team uses various testing techniques, such as
performance. The team also collaborates with stakeholders to gather feedback and
Deployment Phase
the actual coding and implementation of the software take place. The team works
together to develop and test the code, ensuring it meets the acceptance criteria
between developers and the project team to ensure the project is progressing
according to plan.
During this phase, the team must ensure that the design meets the project
requirements, is scalable, and can be implemented within the project timeline. The
development phase is crucial to the project’s success, as it sets the foundation for
Review Phase
51
The review phase in Agile Scrum methodology is a crucial step in the
Scrum framework, which takes place after each sprint ends. This phase is an
identify areas for improvement. The review phase includes several Scrum
processes, such as the sprint review, sprint retrospective, and product backlog
refinement.
During the sprint review, the team and stakeholders collaborate to review
the work completed during the sprint, discuss the product increment, and gather
feedback from the customer. The sprint retrospective, on the other hand, is a
meeting where the team reflects on the sprint, identifies what went well and what
could be improved, and determines how to optimize the process for the next sprint.
platforms. Accessibility and scalability are paramount, ensuring the system remains
formulated, outlining the system components, data flow, and security measures.
This lays the foundation for the development phase, where the system’s core
feedback loops ensure that the system meets both functional and security
University San Carlos campus, including this faculty, records officers, and other
53
external clients involved in the utilization and verification of e-signature. Utilizing
the purposive sampling technique, the researchers have chosen this approach due
The locale of the study is Pangasinan State University San Carlos Campus,
situated in San Carlos City, Pangasinan. This campus holds historical significance
Presidential Decree No. 1486 on June 21, 1968. Positioned amidst a backdrop of
Unstructured Interview
not have a predetermined set of questions to ask. Instead, the interviewer allows
the conversation to flow naturally, asking questions as they arise based on the
54
provides insights into the manual secured e-signature process and helps in
relevant information about the system's existing process, features of the system to
guest, and administrative staff to gather in-depth insights into their experiences,
questionnaire items and inter-rater reliability for interview coding. Validity was
Overall, the data instrumentation used in the project demonstrated high levels of
reliability and validity, providing robust data for analyzing the effectiveness and
user perceptions of the secured e-signature verification system in the PSU San
55
Below are the guide questions to be used in the unstructured interview. These
However, due to the nature of an unstructured interview, the conversation can flow
naturally, with the interviewer asking follow-up questions as they arise based on
3. Based on your experience, what problems do you encounter with the manually
4. What features would you like to see improved in the secured e-signature
verification system?
ISO 25010
56
standard is derived from its predecessor, ISO/IEC 9126, and expands on it by
ISO 25010 organizes software quality into two dimensions: product quality
and quality in use. Product quality refers to the inherent characteristics of the
maintainability, and portability. Quality in use, on the other hand, moves the focus
from the inherent characteristics of the software product to its effectiveness and
Additionally, the instrument derived from ISO 25010 will serve as a tool for
evaluating the acceptability of the system. This evaluation will involve assessing
how well the software meets the expectations and requirements of its intended
that the software meets technical standards, provides a positive user experience,
and maintains high levels of security and reliability, ultimately contributing to its
overall success and adoption. This holistic approach to quality assessment aligns
with the overarching goal of ISO 25010, which is to enhance software product
products meet technical specifications and deliver value and satisfaction to end-
57
users. The standard allows enough leeway to work with various development
Department/Office: _________________________
Direction: Using the scale below, evaluate the system functionalities using
Reliability, and Security by placing a check (√) mark on the appropriate column;
Dissatisfied
Functional 1 2 3 4 5
Suitability
58
1. Functional
Completeness. The
objectives.
2. Functional
degree of precision.
3. Functional
Appropriateness. The
accomplishment of
objectives.
Performance
Efficiency
59
meet requirements.
2. Resource Utilization.
functions, meet
requirements
maximum limits of
parameters meet
requirements.
Usability
1.Appropriateness
Recognizability. The
recognize if it is
needs.
2. Learnability. The
60
to use the application with
effectiveness, efficiency,
satisfaction in a specified
context of use.
errors.
5. User Interaction
Reliability
operation
is operational and
61
for use.
system operates as
presence of hardware or
software faults.
4. Recoverability. The
state.
Security
1.Confidentiality. The
access.
prevents unauthorized
data.
62
3. Non-repudiation. The
cannot be repudiated
later.
signature verification system through various lenses. the developers utilize a use
A use case diagram shows how people or other systems use a software. It
draws out the different tasks or features the software can do, and are involved in
each task. These diagrams give a big-picture view of what the software can do and
are using it. Use case diagrams are handy for showing what the software needs to
63
do right from the start of its development, helping everyone understand its goals
clearly.
According to El Miloudi (2019), use case diagrams are considered for high
level requirement analysis of a system to capture its dynamic view. Use case
in use cases and to identify internal and external agents interacting with the
64
Figure 3. Use Case Diagram
65
The use case diagram in Figure 3 shows a concise concept about the Secured E-
San Campus. The use case diagram illustrates the interaction between the system
and the different actors, which include a guest, an authorized representative, and
an admin.
The diagram shows that the guest can view a document and its corresponding QR
code. The authorized representative can verify the authenticity of the document
using the QR code. The Esig Owner can manage the system, including adding and
removing users.
Overall, the use case diagram provides a clear understanding of the functionality of
uses data modeling techniques that can help define business processes and serve
66
Figure 4. Entity Relationship Diagram (ERD)
Pangasinan State University San Carlos Campus entity relationship diagram. This
diagram represents the system database entity and the relation between them.
With this ERD, anyone can easily understand how our system works in database
labels.
information for any process or system. It uses defined symbols like rectangles, and
arrows, plus short text labels, to show data inputs, outputs, storage points and the
routes between each destination. Data flowcharts can range from simple, even
deeper into how the data is handled. They can be used to analyze an existing
68
Figure 5 shows the existing process begins with the Viewer, who accesses
and interacts with the document containing electronic signature elements. In the
View Document step, the Viewer examines the document's content, marking a
which signifies the core functionality where electronic signatures are used within
the secured e-sig verification system. The e-sig Owner, who holds and can apply
the electronic signature to the document through actions like Copy Paste/E-sig.
The Esig Owner is responsible for providing and applying their electronic signature.
electronic signatures via the same method. The connection labeled Assigns
between the E-sig Owner and the Authorized Representatives indicates that the
Esig Owner has the authority to delegate tasks, roles, or permissions related to
69
Figure 6 Context Diagram of the System
Level 1 of a Data Flow Diagram (DFD) breaks down the processes depicted
in Level 0 into more detailed subprocesses. It shows the interaction between these
subprocesses, data stores, and external entities. Each process in Level 1 is further
decomposed into smaller processes until the necessary level of detail is reached.
The view document process remains the central process, but it likely involves
accessing the document from a document data store and presenting it to the
viewer and assign esig is a sub-process might involve retrieving esig information
from an Esig Data Store and assigning it to a document. This view document likely
represents the document being retrieved from the Document Data Store and
delivered to the Viewer and also the assign esig is likely represents the e-signature
information being retrieved from the Esig Data Store and assigned to the
document. In essence, the level 1 DFD shows that viewing a document involves
70
retrieving it from the document data store. Assigning an e-signature to a document
provides a more granular view of how data flows through the system, including
71
transformations and interactions with data stores and external entities. This level of
and processes.
This level 2 DFD shows how the system extracts the e-signature information from
Data Dictionary
users:
72
Pertains to the purpose of
isActive Int(11)
signatures
representatives:
DATA
KEY FIELD NAME DESCRIPTION
TYPE
73
Pertains to the status of
status varchar(50)
representatives
documernttypes:
DATA
KEY FIELD NAME DESCRIPTION
TYPE
settings:
DATA
KEY FIELD NAME DESCRIPTION
TYPE
documents:
DATA
KEY FIELD NAME DESCRIPTION
TYPE
designations:
DATA
KEY FIELD NAME DESCRIPTION
TYPE
documentsiganatures:
DATA
KEY FIELD NAME DESCRIPTION
TYPE
Pertains to is approved
isApproved varchar(11)
document signatures
usersiganatures:
DATA
KEY FIELD NAME DESCRIPTION
TYPE
Likert Scale
76
According to Scribbr (2020), a Likert scale is a rating scale used to measure
option that best corresponds with how they feel about the statement or question.
The Likert scale allows for capturing the level of agreement or respondents’
This Likert Scale was also used to interpret items in the survey questionnaire.
response for each item of the five (5) options in each item in the questionnaires
Table 3.4 shows the scales and points used in the acceptability test
questions being asked, 3 points to neutral on the questions being asked, 2 points
77
Average Weighted Mean
central tendency of a dataset, taking into account the varying importance or weight
acceptability. Further, the average weighted mean will be used to measure the
security.
|N
where:
∑ = Summation sign
document security and facilitate verification. This system allows users to digitally
78
sign documents and generate secure QR codes that can be easily scanned and
security, and ensure the integrity of digitally signed documents. This system offers
benefits such as reduced fraud risk, improved document traceability, and increased
System for Pangasinan State University San Carlos Campus is the main goal of
the study. The Developers make sure the system fits the needs of its users. After
learned a lot about Pangasinan State University San Carlos Campus. The
developers will analyze this info to figure out what the system needs most, then
design it with input from stakeholders to make it easy to use and strong. The
development team will build the system, while the testing team makes sure it works
well through thorough testing. Once it's ready, The developers will train users, like
where a viewer accesses and views a document and let everyone know how to
use the system. The goal is to make Secured E-Signature Verification easier and
PERSONS
STRATEGY ACTIVITIES DURATION
INVOLVED
79
Approval
from the
Pangasinan Researchers,
State Project
List of Approval
University Developers,
from the 2 Days
San Carlos Campus
Researchers
Campus Executive
Record Director
Managemen
t Officer
Installation of the
System’s Researchers,
system and
Project 5 Hours
required software
Installation Developers
and hardware
Researchers,
Information
System Manuals Project 1 Day
Distribution
Developers
Hands-on
Researchers,
Training and
Project 2 Days
Lectures of
2 Days Training Developers
System Users
80