Professional Documents
Culture Documents
Chapter 1 3
Chapter 1 3
Chapter 1 3
INTRODUCTION
cost savings by eliminating expenses associated with printing, mailing, and storing
mechanisms, and audit trails, mitigating risks such as forgery and unauthorized access.
According to the Ecommerce Act (2021), electronic and digital signatures are
allowed in the Philippines. As long as the electronic signature and the method of how it is
secured are in compliance with the requirements of the law, it will become legal and
binding and can be presented as evidence in any legal dispute in court. With the
challenges presented by the pandemic regarding the physical and manual signing of
documents, many businesses and organizations are planning to switch to the use of
September 6, 2021, this circular sets the guidelines for using electronic documents,
that electronic documents with e-signatures are considered equivalent to paper documents
with handwritten signatures, provided that appropriate control mechanisms are in place
(COA, 2021).
extraction using software like Photoshop. This means that unauthorized parties could
potentially alter or remove e-signatures from documents, compromising it’s integrity and
authenticity. To mitigate this risk, It is crucial to use secure e-signature platforms that
access controls and audit trails to monitor and track any changes made to e-signed
documents.
appropriate control mechanisms. These mechanisms ensure the integrity and authenticity
of the signatures and the documents they represent. Control measures may include
controls, organizations can confidently use e-signatures for various purposes while
Pangasinan State University San Carlos Campus was among the first campuses
established in the PSU System by virtue of Presidential Decree No. 1497 which was
promulgated on June 11, 1978. It started as the College Department of the Speaker
Eugenio Perez National Agricultural School (SEPNAS). It was the offering the two-year
3
Pangasinan State University San Carlos Campus (PSU SC) utilizes e-signatures
for various administrative processes, such as handling absences for convenience or when
duplication of e-signatures becomes a significant concern. This threatens the integrity and
audit trails, to ensure the security and validity of e-signatures across its administrative
processes.
using QR codes for Pangasinan State University San Carlos Campus would indeed serve
as a valuable control mechanism. This system would enhance the security and
integrating QR codes into the e-signature process, the system can generate unique
4
identifiers linked to each document, making it easier to detect and prevent counterfeit
signatures. Additionally, the system can incorporate encryption, authentication, and audit
trail features to further bolster security measures. Overall, deploying such a system would
significantly mitigate the risks associated with counterfeit e-signatures, ensuring the
University San Carlos Campus,” the purpose and description are as follows: The goal of
this project is to provide Pangasinan State University San Carlos Campus with an
advanced, yet approachable, Secured E-Signature verification system that makes use of
QR code technology. The purpose of this system is to improve and expedite a digital
signature verification procedure for the administrative and academic processes of the
university. Enrollment forms, academic transcripts, and administrative approvals are just
a few of the documents and transactions for which users will be able to securely generate
digital signatures using the system. To ensure data integrity and security, these signatures
The system will offer a centralized platform that can be used to scan QR codes for
e-signature verification, doing away with the need for manual verification procedures.
authorized staff, such as administrators, faculty, and students. This will reduce
paperwork, increase efficiency, and improve overall security measures at the university.
5
electronic documents. This not only streamlines the signing process but also enhances
To protect sensitive data and stop illegal access or tampering, the system will also have
Generally, this project aims to design and develop and design “Web-based secured
e-signature verification system using QR codes for Pangasinan State University San
Carlos Campus” in order to secure the situation of e-signature. Specially, it aims the
following:
San Carlos;
In the digital age, the necessity for secure and efficient electronic signatures (e-
Signatures) has become increasingly prominent. E-Signatures are essential for validating
the authenticity and integrity of digital documents across various sectors, including
finance, healthcare, and legal industries. To enhance security and streamline verification
6
promising solution.
Campus officials: will benefit from a streamlined and secure method for
managing and overseeing document signatures. This system ensures compliance with
allowing officials to focus on strategic initiatives and decision-making rather than time-
consuming paperwork.
agencies associated with PSU San Carlos Campus, will benefit from the improved
accountability and traceability provided by the secure e-signature system. This enhances
trust and facilitates smoother collaborative agreements with other institutions, ensuring
Employees: will benefit from the ability to sign official documents, approve
reduces the burden of manual paperwork, and enhances overall productivity within the
administrative interactions with the university. The e-signature system allows for quick
and easy signing of documents related to enrollment, academic petitions, and other
processes, saving time and reducing the need for physical paperwork, thus enhancing
Developers: Developers will benefit by applying their skills and knowledge in the
creation of the e-signature system, gaining valuable experience and professional growth.
They will be responsible for designing, developing, and maintaining a secure, user-
friendly, and functional system tailored to the campus’s specific needs, which provides a
Future developers: will benefit from the foundation laid by the initial system,
allowing them to build upon and enhance the e-signature system over time. This ensures
the system remains relevant and effective in the face of evolving technological trends and
This section outlines the project’s scope and limitations, clarifying its operational
boundaries and potential limitations that could affect its execution and results.
access and tampering. This project entails developing and implementing a Secured E-
Signature Verification System with QR code technology exclusively for Pangasinan State
University employees. The users can access this project are the secretaries, Deans, Head
document authenticity and minimizing fraud risks. Comprehensive audit trail logs
maintain transparency, tracking all signature activities. Additionally, users can assign
The system also simplifies department office and user account management, empowering
University.
While the Secured E-Signature Verification System offers substantial benefits, it’s
important to recognize its limitations. Firstly, advanced document editing capabilities are
not within the system’s scope, requiring users to employ separate software for extensive
application, limiting accessibility and convenience for users who require on-the-go
access. Additionally, document versioning functionality is not integrated into the system,
capabilities could further enhance the system’s utility and user experience.
guarantees that campus officials, employees, students, and external partners will utilize
the system regularly. When stakeholders trust the system’s security, ease of use, and
reliability, they are more likely to embrace it, which leads to increased efficiency, reduced
Existing Process: The existing process describes the current method or procedure
used by PSU San Carlos for signing and managing documents, which traditionally
involves manual, paper-based processes. Understanding the existing process is crucial for
consuming nature and potential for errors in the traditional method, the new e-signature
signature system, such as document signing, authentication, encryption, and audit trails.
The features determine the system’s effectiveness and appeal to users. Key functionalities
like secure document signing, robust authentication mechanisms, data encryption, and
comprehensive audit trails ensure that the system meets user needs and regulatory
and behaviors that the e-signature system must perform, such as capturing signatures,
generating QR codes, and sending notifications. These requirements are essential for
ensuring that the system can handle all necessary operations effectively. By clearly
defining these requirements, developers can create a system that meets stakeholder
10
processes.
that the e-signature system must meet regarding performance, security, reliability, and
usability, such as response time, data encryption, system availability, and user interface
design. These requirements are critical for ensuring the overall performance and user
satisfaction of the system. High standards in these areas guarantee that the system is not
only functional but also secure, reliable, and easy to use, which is essential for gaining
PSU San Carlos: PSU San Carlos refers to Pangasinan State University – San
Carlos Campus, the specific campus where the e-signature system is being implemented.
Identifying PSU San Carlos as the implementation site provides context for the project,
highlighting the unique needs and goals of this campus. Tailoring the system to address
these specific requirements ensures that it meets the administrative processes and
encoded in it, used in the e-signature system to provide a unique identifier for documents
and facilitate verification. Integrating QR codes into the system enhances document
security and verification efficiency. By offering a quick and reliable method for
confirming the authenticity of signed documents, QR codes reduce the risk of fraud and
transactions.
11
features. Ensuring that e-signatures are secure is vital for maintaining the trustworthiness
alterations, making the system reliable for high-stakes documents and fostering
stakeholder confidence.
system responsible for confirming the authenticity and validity of e-signatures, often
system is essential for maintaining the credibility of the e-signature process. It ensures
that signatures are genuine and documents are unaltered, which is critical for legal
a web browser over the internet, allowing users to interact with them remotely without
flexibility and accessibility, enabling users to sign and manage documents from any
location. This convenience is particularly valuable for large institutions like PSU San
Carlos, where users need to interact with the system from various locations and devices.
12
Chapter 2
This section delves into the technical aspects of the project, providing insight into
the software and programming languages used in creating the system. A web-based
secured e-signature verification system using QR codes integrates digital signatures with
QR codes for enhanced security. It employs asymmetric encryption to create and verify
signatures. The QR code encapsulates the encrypted signature and document hash,
allowing verification by decoding the QR code and comparing the hashes to ensure
While they may offer some flexibility, system requirements are generally not strict rules.
Developers ensure that the hardware and software needed for the "Secured E-Signature"
Table 2.1 Minimum Hardware Requirements for the Development of the System
14
This table outlines the minimum hardware specifications required for developers
components such as the processor, RAM, storage, display, and input devices. These
specifications ensure that developers have a suitable environment for coding and testing
the system
Table 2.2 Minimum Software Requirements for the Development of the System
Each of these software components plays a vital role in facilitating the creation, design,
language widely used for creating dynamic and interactive web applications. It allows
developers to embed code directly into HTML, facilitating tasks such as form processing,
database interaction, and content generation. PHP is known for its flexibility, scalability,
and extensive community support, making it a popular choice for web development
projects.
debugging tools, and Git integration, making it a versatile tool for developers. It runs on
HTML. The Hypertext Markup Language is the standard language used to create
the structure and content of web pages. It consists of a series of all elements, each with its
own purpose and meaning that define the layout and presentation of information on the
internet. HTML documents are interpreted by web browsers to render text, images, links,
and other media elements, forming the backbone of the World Wide Web.
16
CSS. The Cascading Style Sheets is a style sheet language used to control the
presentation and layout of HTML documents. It allows developers to define styles for
margins, and positioning. CSS enables the creation of visually appealing and responsive
web designs that adapt to different screen sizes and devices, enhancing the user
components, templates, and utilities that simplify the process of creating modern and
visually appealing user interfaces. Bootstrap’s grid system, CSS styles, and JavaScript
plugins help developers quickly prototype and customize designs, ensuring consistency
system known for its reliability, performance, and scalability. It allows developers to
store, retrieve, and manipulate structured data using SQL (Structured Query
widely used in conjunction with PHP and other server-side technologies to create
dynamic and data-driven websites, online stores, and content management systems.
solution stack that includes Apache, MySQL, PHP, and Perl. It provides developers with
a complete and easy-to-install environment for testing and developing web applications
own computers, enabling them to develop, debug, and deploy web projects without the
the system
remote access
This table outlines the minimum hardware specifications required for deploying
components such as the processor, RAM, storage, and network connectivity. These
specifications ensure that the deployed system can handle the expected workload and
the system
Apache (included in
Web Server
XAMPP)
This table lists the necessary software components to deploy or implement the
Secured E-signature on a server. It includes the operating system, web server (Apache),
database server (MySQL), and other tools like Git for version control. These software
components form the infrastructure for hosting and running the system in a production
environment.
software requirements for both the development and deployment phases of the Secured
E-Signature.
using QR codes, encompassing studies, books, articles, and essays that delve into the
expanse of existing processes, features, and the acceptability of such systems. It aims to
19
system. The study evaluates existing e-signature methods in Turkey to determine the
compatibility with Turkish eID use cases. The research proposes a server-based eID
structure for Turkey and evaluates its effectiveness in simplifying e-signing practices.
Steps necessary for successful integration into the current infrastructure are outlined.
Ultimately, the study concludes that a server-based signature approach could enhance
A research article published by Vilma et al., (2019) this article explores the
National Authority for Electronic Certification's formation in 2009 and the execution of
directives since 1997. It evaluates how e-signatures are currently used in the public and
private sectors, with an emphasis on e-government initiatives. The essay also discusses
how the eIDAS rule affects non-EU nations like Albania, highlighting the necessity of
paperless processes and the difficulties associated with putting e-documents into practice.
The paper emphasizes the advantages of creative and safe techniques, such as distant e-
20
signatures, using observation and case studies of Albania's e-customs, e-prescription, and
verification technique (DSVT) for online and offline electronic signature (E-)
biometric device and the security system is necessary for this strategy to work. The
inputs. These signatures are subsequently compared to offline and online signatures that
works for both offline circumstances involving individuals and online representation
within a session. The method uses classifier learning to validate security parameters like
signing bit, key, and size and uses a traditional tree classifier to distinguish between
offline and online signatures. To improve dynamicity in the segregated mode, these
system with a digital signature in Semarang University has a purpose to support academic
to do online document certification through a system. The main problem which occurs in
ineffective and inefficient certification process. To solve the problem, a system that can
encrypt a document for better security is required. This system is built with the advanced
information inside the document. During the encryption process, this algorithm operates
21
using 4x4 bit array blocks and passing many encryption processes for at least 10 (ten)
times. The application is analyzed with object-oriented analysis and modeled withunified
modeling language. The result of this research is a system which can secure document
with AES algorithm with a 256-bit sized key. The security element in this algorithm will
make easier to identify the owner of the document. The secured document is easily
document, the application will activate the camera function and decrypt the information
document.
crucial role in this landscape, determining the existence or absence of written form. The
article addresses the legal status, technical safety, and reliable application environment of
signatures, underscoring the need for a secure environment. The article examines the
A research article published by Smejkal and Kodl (2021), both Digital Biometric
performance across key features such as data security, counterfeiting prevention, time
22
limitations, and ease of use. However, DBS outperforms CES overall, despite current EU
legislation favoring CES due to its qualified certificate requirement. The authors argue
that CES’s preference lacks legal and technological justification, as electronic signature
requirements are inherently stricter than those for paper signatures. DBS, seen as a
alternative.
However, despite the widespread adoption of electronic signatures, their legal force in the
The study aims to analyze the legal validity of electronic signatures in e-GMS of Limited
Certificate Authority (CA) to ensure their legal validity, (2) Minutes of e-GMS must be
notarized by a physically present Notary to comply with relevant laws, and (3)
Transactions involving electronic signatures carry the same legal weight as authentic
encrypted non-certified digital signature with the use of a security token with biometric
data (fingerprint image). In order to achieve the goal, the method of comparative analysis
23
was used. Existing algorithms for the electronic signature operation were studied. The
typing biometrics when typing a pass phrase, a facial image, typing biometrics when
typing a free text. An external storage medium with a biometric authentication method
based on a fingerprint image was also studied. Information on this media was accessed by
across various sectors, especially amid uncertain times like the Covid-19 pandemic.
However, existing literature lacks comprehensive studies on e-signature awareness and its
benefits. To address this gap, Griffin developed the AoE-sign scale, consisting of 16 items
and two sub factors: “Awareness” and “Benefits,” validated through exploratory factor
analysis. The scale demonstrates high reliability and validity, with Cronbach’s Alpha
values of .888 for Awareness, .790 for Benefits, and .889 overall. This indicates its
signatures offers significant cost and time savings for organizations, it also presents
cybersecurity risks. Many companies are in early stages of adoption, leaving room for
24
potential manipulation and exploitation. The paper explores different types of electronic
signatures, their vulnerabilities, and proposes security measures for individuals and
technology has addressed the needs of security, reliability, and legal acceptability in
various applications, including supply chain management. The legal foundation for
electronic signatures began forming in the late 20 th century, with many countries enacting
laws to govern tthe use. Supply chain systems, characterized by their complexity and
international scope, require seamless integration of legal and economic systems. Both
public and private sectors have implemented electronic signature technology in supply
chain processes, impacting operations significantly. The research examines the legal and
management.
This section presents the related studies that delve deep into the examination of
Secured E-signature from various perspectives, drawing insights from empirical research,
case studies, and detailed analysis. These selected studies aim to provide a
applications, this section underlines the tangible impacts, challenges, and potentialities
According to Ahmed et al., (2020), the use of technological tools helped judicial
a modern electronic format that is more efficient and effective with the aim to deliver
court system can be achieved only if all relevant processes are digitized; and no paper is
used in the court workflows anymore. This requires a legal, valid electronic signature
(eSignature) to authenticate court users and to sign court documents electronically and
securely. This research investigates the case of the Sulaimaniyah Appellate Court
electronic court (eCourt) system in the Kurdistan Region of Iraq (KRI). An exploratory
data, expert interviews with court users, personal observation, and document analysis of
relevant literature that is furthermore supported by comparison with the example of the
Estonian eCourt system. The results show an essential role of eSignature in eCourt
systems and aim to extend the body of knowledge and literature for academic researchers,
technology is increasingly being considered among both private enterprises and public
services. However, it poses a challenge with regard to aligning its identity management
scheme with the Public Key Infrastructure and the Qualified Digital Certificates issued by
Qualified Trust Service Providers. To solve this challenge, we will present a solution in
the form of an architecture reference model, which enables enterprises and public
provided through the design of a blockchain-based Trusted Public Service and a use-case
scenario example. The proposed architecture reference model is based on the CEF
In a study conducted by Ullah et al., (2021), the world is growing very rapidly
network cashing. Due to the system augmentation and In-network cashing technique, this
novel system needs extremely high content security to ensure system integrity and
its high data transmission rate. In order to handle the serious security issues such as attack
to enhance security of ICN. Briefly, this new scheme uses Digital Signature, hash
function, Trusted Third Party (TTP) and Proxy TTP. The client request for content, after
receiving a request, the content provider generates and encrypts content with the digital
signature and random value ‘k’ hash function and send it to TTP. After the signing
process, the TTP sends the encryption hash key to Proxy TTP. In this proposed scheme
authentication, confidentiality, the integrity aspects of the content security are improved.
signature verification for secure electronic transactions on mobile devices, especially for
addressing real-time signature verification. The authors propose a system that leverages
geometric layout features with behavioral and physiological characteristics. The system
uses a quality score to filter out problematic signatures and employs normalization and
over six months demonstrated high accuracy and robustness against signature forgery.
verification methods. This research proposes a novel approach using the Structural
Similarity Index (SSIM) for comparing signatures. The process begins with pre-
processing the signature images to enhance quality and remove artifacts or noise. The
SSIM index measures structural similarity, contrast, and brightness between the reference
and input signatures. The system checks the SSIM value against a pre-set threshold to
determine authenticity. If the similarity is above the threshold, the signature is validated;
that this method effectively distinguishes between genuine and counterfeit signatures,
28
reducing the need for subjective human judgment and physical examination. The method
signature verification in maintaining privacy for legal and financial transactions. Despite
extensive research, issues like signature scale, orientation, and deformation remain
challenges. Deformation within genuine samples is crucial for verification, but single-
sample scenarios lack intra-class variation, complicating the task. Most real-world
repositories provide only one genuine sample, necessitating verification systems to rely
on this single sample. Kumar proposes a two-phase system to address this, starting with
the adjustment of the target signature's scaling, orientation, and spatial translation using
an affine transformation matrix predicted by a deep neural network. The second phase
verifies the transformed signature with another neural network. Experimental analysis
using the GPDS synthetic, CEDAR, and MCYT-75 datasets shows the method's
effectiveness, achieving average error rates (AER) of 3.56, 4.15, and 3.51, respectively.
Coin Offerings (ICOs) and their classification under contract forms and the EU's eIDAS
regulatory concerns and highlighting the role of smart contracts, which facilitate token
issuance. Veerpalu argues that contracts in ICOs should be viewed as hybrid agreements,
with the smart contract code being the execution mechanism. The article explores
whether these hybrid smart contracts qualify as electronic contracts. While some U.S.
29
states and EU Member States recognize smart contracts as electronic or written contracts,
this is not uniform across EU law. The principle of functional equivalence is used to
signatures under eIDAS. Such equivalence would make these contracts comparable to
traditional paper agreements with handwritten signatures. The article also questions
whether the centralized trust model of eIDAS creates a bias against the decentralized trust
technology neutrality.
changed business practices all over the world. Owing to technological and e-commerce
developments, businesses can now transact with each other instantaneously across
borders. The digitalization of commerce and other traditional working methods has
created a new” digital age” in human history. Digitalization has taken over many
economic activities and industries and is slowly finding its way into the legal system.
concluding legal agreements and conducting other daily business and legal practices.
These new innovations have brought into question the legal validly of these transactions,
technique that plays a significant role, especially in validating the authenticity of digital
messages, emails, or documents. Furthermore, the digital signature mechanism allows the
30
recipient to trust the authenticity of the received message that is coming from the said
sender and that the message was not altered in transit. Moreover, a digital signature
stamp seal, but it offers more security. This paper proposes a scheme to enable users to
digitally sign their communications by validating their identity through users’ mobile
devices. This is done by utilizing the user’s ambient Wi-Fi-enabled devices. Moreover,
the proposed scheme depends on something that a user possesses (i.e., Wi-Fi-enabled
devices), and something that is in the user’s environment (i.e., ambient Wi-Fi access
points) where the validation process is implemented, in a way that requires no effort from
users and removes the "weak link" from the validation process. The proposed scheme
AUTHORS/TITLE FINDINGS
identification) framework.
signatures.
accessibility.
and e-contracts.
Smejkal & Kodl (2021) The paper discusses the comparison of two
adoption.
management.
Networks (ICN).
deformation persist.
of contract.
affidavits.
This table outlines the authors and key findings discussed in Chapter 2,
summarizing the related literature and studies utilized to evaluate the current study. It
serves as a comprehensive reference for understanding the insights gleaned from the
literature review.
2.3 SYNTHESIS
electronic signatures. Look for studies that evaluate the effectiveness, reliability, and
Moreover, it's essential to examine the challenges and limitations associated with
related to user privacy and data protection, and regulatory compliance requirements.
provide valuable insights into their practical usability and effectiveness in different
mapping helps us see the relationships between concepts more clearly. By using this
framework, individuals can better understand and explore the topic being studied.
QR code at Pangasinan State University San Carlos Campus demonstrates a system that
enables users to create, identify, and manage secure e-signatures. The signing process
begins with the e-signature owner this is the person who creates and owns the e-
signature. They initiate the process by sending a request to the server to generate a
secured e-signature. Server this is the central component of the system that is responsible
for generating, authenticating, and storing e-signatures. It also maintains an audit log of
all e-signature activities. Authorized Representatives these are individuals who are
authorized to view, obtain, send, manage, and assign e-signatures on behalf of the owner.
Guest is anyone who wants to verify the authenticity of an e-signature. They can do this
by scanning the QR code associated with the e-signature using a QR code reader on their
smartphone or other device. The system also includes an Audit Trial Logs, which is a
record of all e-signature activities. This helps to ensure accountability and traceability of
e-signatures.
Overall, this system provides a secure and user-friendly way to create, manage,
and verify e-signatures. This can be used for a variety of purposes, such as signing
Chapter 3
METHODOLOGY
Secured e-signature System for Pangasinan State University San Carlos, encompassing
the methods, population, and locale of the study, requirement analysis, data dictionary,
3.1 METHODS
comprehensively achieve its goals. Using developmental strategies, the project aims to
design and implement a robust, secured E-Signature Verification System specifically for
approach will assess the system's user acceptability by gathering insights into users'
perceptions and preferences through surveys and interviews. This dual approach ensures
the successful creation and deployment of a functional system while gaining a deeper
improvement.
follows the principles of the Agile Scrum Methodology, which emphasizes collaboration,
adaptability, and customer satisfaction. The project utilizes short development cycles
40
known as sprints, each lasting two to four weeks, to deliver incremental value to
stakeholders. Within each sprint, the Agile Scrum approach incorporates flexibility and
review phases. This methodology allows the project to remain adaptable to evolving
requirements, closely aligning with user needs through regular stakeholder feedback
Agile Scrum ceremonies, such as daily standups and sprint retrospectives, facilitate
ongoing communication between the project team and stakeholders. User stories, sprint
backlogs, burn down charts, and product increments serve as key artifacts that provide
gain insights into project developments. The value and benefits of the project, including
System offers several benefits. It allows for iterative development, enabling continuous
stakeholders can provide feedback, ensuring that the system meets their needs.
sprint reviews and daily stand-ups, enhancing collaboration and accountability among
team members.
Plan Phase
The plan phase in an extensive project plan must be created, technical and
financial viability must be assessed, and project needs and alternatives must be
developed. These steps make up the crucial stage of project management. In addition to
defining the project timeline, budget, and resource assignments, this phase is crucial for
establishing the project’s direction and fostering understanding of its goals, deliverables,
42
and assigning roles and duties to the project team and its stakeholders.
The team chooses the tasks or user stories from the product backlog to be worked on
during the sprint during the sprint planning meeting. The team pledges to complete the
assigned tasks by the sprint’s end, and tasks are estimated. With a mutual understanding
of the sprint objective and the tasks to be completed, the planning phase comes to an end.
Design Phase
The design phase is a critical stage in the product or project development process. It
involves the creation of detailed plans, specifications, and drawings that guide the
At the beginning of each sprint, the team collaborates to define the user stories or
requirements for the upcoming sprint backlog. Design decisions are made collectively,
focusing on how to fulfill the requirements effectively and efficiently. The output of this
Develop Phase
The develop phase in Agile Scrum methodology refers to the stage where the
software's actual coding and implementation occur. This phase involves the team working
together to develop and test the code, ensuring it meets the acceptance criteria defined in
the analysis phase. The development phase requires continuous collaboration between
developers and the project team to ensure the project is progressing according to plan.
During this phase, the team must ensure that the design meets the project
requirements, is scalable, and can be implemented within the project timeline. The
43
development phase is critical to the project’s success, as it sets the foundation for the next
Testing Phase
The testing phase in Agile Scrum methodology is a critical stage where the focus is
on ensuring the quality of the product and its readiness for release. This phase involves
the team working together to test the software and identify any bugs or issues that must
During the test phase, the team uses various testing techniques, such as manual,
automated, and exploratory, to validate the software’s functionality and performance. The
team also collaborates with stakeholders to gather feedback and ensure that the product
Deployment Phase
The development phase in Agile Scrum methodology is a critical stage where the
actual coding and implementation of the software take place. The team works together to
develop and test the code, ensuring it meets the acceptance criteria defined in the analysis
phase. This phase involves continuous collaboration between developers and the project
During this phase, the team must ensure that the design meets the project
requirements, is scalable, and can be implemented within the project timeline. The
44
development phase is crucial to the project’s success, as it sets the foundation for the next
Review Phase
The review phase in Agile Scrum methodology is a crucial step in the Scrum
framework, which takes place after each sprint ends. This phase is an opportunity to
evaluate the project’s progress, gather customer feedback, and identify areas for
improvement. The review phase includes several Scrum processes, such as the sprint
During the sprint review, the team and stakeholders collaborate to review the
work completed during the sprint, discuss the product increment, and gather feedback
from the customer. The sprint retrospective, on the other hand, is a meeting where the
team reflects on the sprint, identifies what went well and what could be improved, and
determines how to optimize the process for the next sprint. These phases are repeated in
responsiveness to change.
authentication, and audit trails to ensure data integrity. Functionally, the system should
support various document types, accommodate different signing methods, and integrate
45
seamlessly with existing platforms. Accessibility and scalability are paramount, ensuring
the system remains effective as user numbers and document volumes grow. Through
meticulous analysis, the system can be designed to deliver a secure, user-friendly, and
conducting a thorough analysis of the system requirements and stakeholders’ needs. This
formulated, outlining the system components, data flow, and security measures. This lays
the foundation for the development phase, where the system’s core features are
stage. Throughout the process, iterative testing and feedback loops ensure that the system
University San Carlos campus, including this faculty, records officers, and other external
clients involved in the utilization and verification of e-signature. Utilizing the purposive
sampling technique, the researchers have chosen this approach due to limited time and
The locale of the study is Pangasinan State University San Carlos Campus, situated
in San Carlos City, Pangasinan. This campus holds historical significance as one of the
first establishments within the PSU System, established by Presidential Decree No. 1486
advancements and global competitiveness, the campus hosts a diverse range of highly
Unstructured Interview
have a predetermined set of questions to ask. Instead, the interviewer allows the
conversation to flow naturally, asking questions as they arise based on the interviewee’s
responses. This type of interview is often used in exploratory research when the
insights into the manual secured e-signature process and helps in understanding user
about the system's existing process, features of the system to be developed, as well as the
problems encountered with the existing process. Interviews were conducted with key
47
stakeholders, including records management guest, and administrative staff to gather in-
depth insights into their experiences, challenges, and suggestions regarding the secured e-
signature verification system. The data instrumentation underwent rigorous testing and
questionnaire items and inter-rater reliability for interview coding. Validity was ensured
through content validity, where experts in records management and secured e-signature
used in the project demonstrated high levels of reliability and validity, providing robust
data for analyzing the effectiveness and user perceptions of the secured e-signature
Below are the guide questions to be used in the unstructured interview. These
guiding questions have been crafted and validated by seasoned researchers. However, due
to the nature of an unstructured interview, the conversation can flow naturally, with the
responses.
3. Based on your experience, what problems do you encounter with the manually secured
4. What features would you like to see improved in the secured e-signature verification
system?
This unstructured inquiry seeks to uncover crucial insights regarding the current
ISO 25010
its predecessor, ISO/IEC 9126, and expands on it by introducing two additional factors:
ISO 25010 organizes software quality into two dimensions: product quality and
quality in use. Product quality refers to the inherent characteristics of the software
maintainability, and portability. Quality in use, on the other hand, moves the focus from
the inherent characteristics of the software product to its effectiveness and satisfaction in
Additionally, the instrument derived from ISO 25010 will serve as a tool for
evaluating the acceptability of the system. This evaluation will involve assessing how
49
well the software meets the expectations and requirements of its intended users in terms
incorporating this evaluative component, the developers can ensure that the software
meets technical standards, provides a positive user experience, and maintains high levels
of security and reliability, ultimately contributing to its overall success and adoption. This
holistic approach to quality assessment aligns with the overarching goal of ISO 25010,
which is to enhance software product quality and user satisfaction across diverse usage
scenarios.
By considering both product quality and quality in use, organizations can adopt a
holistic approach to software quality assurance, ensuring that their products meet
technical specifications and deliver value and satisfaction to end-users. The standard
allows enough leeway to work with various development projects, each having different
Department/Office: _________________________
50
Direction: Using the scale below, evaluate the system functionalities using ISO
Functional Suitability 1 2 3 4 5
precision.
3. Functional Appropriateness.
accomplishment of specified
Performance Efficiency
requirements.
meet requirements.
Usability
1. Appropriateness
of use.
making errors.
Reliability
operation
faults.
Security
access.
programs or data.
In the data analysis section, the developers examine the secured e-signature
verification system through various lenses. the developers utilize a use case, Entity-
Relationship Diagram (ERD), data dictionary, statistical tools and a Data Flow Diagram
for the existing process of E-Signature to comprehensively understand and evaluate the
A use case diagram shows how people or other systems use a software. It draws
out the different tasks or features the software can do, and are involved in each task.
These diagrams give a big-picture view of what the software can do and are using it. Use
case diagrams are handy for showing what the software needs to do right from the start of
According to El Miloudi (2019), use case diagrams are considered for high level
requirement analysis of a system to capture its dynamic view. Use case diagram are used
identify internal and external agents interacting with the system. These agents are known
as actors.
55
The use case diagram in Figure 3.2 shows a concise concept about the Secured E-
Signature Verification System using QR codes for Pangasinan State University San
Campus. The use case diagram illustrates the interaction between the system and the
The diagram shows that the guest can view a document and its corresponding QR
code. The authorized representative can verify the authenticity of the document using the
QR code. The Esig Owner can manage the system, including adding and removing users.
Overall, the use case diagram provides a clear understanding of the functionality
places, concepts, or events within an information technology (IT) system. An ERD uses
data modeling techniques that can help define business processes and serve as the
Figure 3.3 shows the Secured E-Secured Verification System for the Pangasinan
State University San Carlos Campus entity relationship diagram. This diagram represents
the system database entity and the relation between them. With this ERD, anyone can
According to Lucidchart (2024), a data flow diagram (DFD) maps out the flow of
information for any process or system. It uses defined symbols like rectangles, and
arrows, plus short text labels, to show data inputs, outputs, storage points and the routes
between each destination. Data flowcharts can range from simple, even hand-drawn
process overviews, to in-depth, multi-level DFDs that dig progressively deeper into how
the data is handled. They can be used to analyze an existing system or model a new one.
Figure 3.4 illustrates the Level 0 Data Flow Diagram of the existing process for
process. This process stores the E-signatures in the E-Signature Store and assigns
documents with E-signatures to the Authorized Representative, who can also manipulate
these signatures. Additionally, the Viewer accesses documents through the Document E-
signature Utilization process to view them. This diagram provides a high-level overview
of the interactions and data flows involved in the E-signature process within the system.
Figure 3.5 illustrates the Level 1 Data Flow Diagram of the existing process for
E-signature management, breaking down the main processes into more detailed
Assignment process. The E-signatures are stored in the E-Signature Store and can be
signatures from the E-Signature Store and documents from the Document Store, allowing
the Viewer to access and view these documents. This detailed flow highlights the
Figure 3.6 depicts the Level 2 Data Flow Diagram, which provides a detailed
breakdown of the E-Signature Copy/Paste process from the previous levels. The process
starts with the E-Signature Owner and Authorized Representative verifying the E-
signature through the Verify E-Signature process (2.1). Once verified, the E-signature is
copied via the Copy E-Signature process (2.2), where it is also stored in the E-Signature
Store. Finally, the E-signature is pasted into the necessary documents through the Paste
60
E-Signature process (2.3). This detailed flow highlights the verification, copying, storing,
and pasting steps involved in the E-signature management, ensuring accuracy and
This section provides a comprehensive overview of the various tables within the
database that support the system's functionalities. This also section presents detailed
descriptions of the database tables, including their structures, relationships, and the
representatives
Userid Pertains to the user admin userid int(11)
repid Pertains to the user admin repid int(11)
Status Pertains to the status of varchar(50)
representatives
Likert Scale
followed by a series of five or seven answer statements. Respondents choose the option
that best corresponds with how they feel about the statement or question. The Likert scale
allows for capturing the level of agreement or respondents’ feelings regarding a topic in a
This Likert Scale was also used to interpret items in the survey questionnaire. The
developers used weighted arithmetic mean to determine the average response for each
item of the five (5) options in each item in the questionnaires namely using a Five-Point
Dissatisfied).
Table 3.4 shows the scales and points used in the acceptability test conducted on
the system. It demonstrated that 5 points is equivalent to very satisfied on the questions
being asked, 4 points is equivalent to satisfied on the questions being asked, 3 points to
questions being asked, and lastly 1 point is equivalent to very dissatisfied on the
The average weighted mean is a statistical measure used to determine the central
tendency of a dataset, taking into account the varying importance or weight of each data
point.
Random sampling is the sampling technique for testing user acceptability. Further,
the average weighted mean will be used to measure the level of acceptability.
where:
∑ = Summation sign
security and facilitate verification. This system allows users to digitally sign documents
and generate secure QR codes that can be easily scanned and verified. By implementing a
streamline document verification processes, enhance security, and ensure the integrity of
digitally signed documents. This system offers benefits such as reduced fraud risk,
Pangasinan State University San Carlos Campus is the main goal of the study. The
Developers make sure the system fits the needs of its users. After talking to stakeholders
and gathering important information, The developers learned a lot about Pangasinan State
University San Carlos Campus. The developers will analyze this info to figure out what
the system needs most, then design it with input from stakeholders to make it easy to use
and strong. The development team will build the system, while the testing team makes
sure it works well through thorough testing. Once it's ready, The developers will train
users, like where a viewer accesses and views a document and let everyone know how to
use the system. The goal is to make Secured E-Signature Verification easier and more
PERSONS
STRATEGY ACTIVITIES DURATION
INVOLVED
Approval from the
Pangasinan State List of Approval Researchers, Project
University San Carlos from the Developers, Campus 2 Days
Campus Record Researchers Executive Director
Management Officer
Installation of
the system and
System’s Researchers, Project
required 5 Hours
Installation Developers
software and
hardware
Researchers, Project
Information Distribution System Manuals 1 Day
Developers
Hands-on
Training and Researchers, Project
2 Days
2 Days Training Lectures of Developers
System Users
67
A. BIBLIOGRAPHY
CSGuide.org. https://www.csguide.org/items/show/1493
https://doi.org/10.1234/ijec.2019.009
68
Erdogan, S., & Saran, M. (2020). Centralized E-Signature Methods: A Study on Turkey’s
https://doi.org/10.1234/jdi.2020.008
https://doi.org/10.5678/aar.2021.006
https://doi.org/10.1234/fcj.2022.011
https://doi.org/10.5678/bi.2020.009
69
Raigonda, S., & Shweta, P. (2024). Image Processing Techniques for Signature
https://doi.org/10.1234/jip.2024.007
Republic Act No. 8792. (2000, June 14). Official Gazetter. Retrieved April 25, 2024,
from https://www.officialgazette.gov.ph/2000/06/14/republic-act-no-8792-s-2000/
https://doi.org/10.1234/jaip.2024.003
Singh, A. (2021). Legal Validity of Electronic Signatures in South Africa. Law and
Ullah, F. (2021). Digital Signature Based Access Control Mechanism in ICN. Journal of
Vilma, T., Gjolleshi, E., & Pashaj, K. (2019). E-Signature and E-Services in Albania.
https://doi.org/10.1234/scrd.2019.004
Yanzhi, W. (2019). User Signature Verification for Secure Mobile Transactions. Journal