Académique Documents
Professionnel Documents
Culture Documents
INTRODUCTION
The popularity of Online Platforms is increasing worldwide. Online Platform are websites that are
accessible using the internet. A Website can display the current state of a dialogue between users, monitor
a changing situation, or provide information in some way personalized to the requirements of the individual
user. Dynamic sites can be interactive by using HTML forms, storing and reading back browser cookies,
or by creating a series of pages that reflect the previous history of clicks. In response, the content of the
web page will spontaneously change the way it looked before, and will then display a list of Beatles products
like CDs, DVDs and books. Dynamic HTML uses JavaScript code to instruct the web browser how to
interactively modify the page contents. One way to simulate a certain type of dynamic website while
avoiding the performance loss of initiating the dynamic engine on a per-user or per-connection basis, is to
Gender and Development was developed in the 1980’s as an alternative to the Women in
Development (WID) approach. Unlike WID, the GAD approach is not concerned specifically with women,
but with the way in which a society assigns roles, responsibilities, and expectations to both men and women.
GAD applies gender analysis to uncover the ways in which men and women work together, presenting
Philippine Plan for Gender and Development, 1995-2025, is a National Plan that addresses,
provides and pursues full equality and development for men and women. Approved and adopted by former
President Fidel V. Ramos as Executive No. 273, on September 8, 1995, it is the successor of the Philippine
Development Plan for Women, 1989-1992 adopted by Executive No. 348 of February 17, 1989.
Projects that have been implemented under the GAD budget include providing health services,
advocating and disseminating information on gender issues, building capacity and providing technical
assistance on GAD and other gender issues, establishing or improving service facilities for women, issuing
policies on gender, establishing databases and mechanisms for reporting on gender issues, improving
awareness of gender issues when undertaking development planning at the national and local levels, and
However, several challenges still remain in the promotion of gender-responsive governance in the
country such as policy development and implementation, financing and financing capacity and generation
Isabela State University Echague Campus Gender and Development Office is still in the manual
method of information dissemination. The school have to promote activities and policies via orientations,
programs, flyers and tarpaulins. In this sense only the participants of these activities are properly informed.
Meanwhile, ISU-GAD is also experiencing issues on filing of complaints, most of the time complaints are
written in a piece of paper and is submitted to the office where focal persons’ review, validate and give
responses. However, it takes a lot of time, money and effort for a complainant to follow-up his / her
complaint. As a result, most of the complainants do not go back to the office and follow-up their complaints.
The solution for this problem is to develop a web based application to allow the that will allow
online users or the netizens to view updated GAD information and file and monitor online complaints. This
web based application will enable the GAD Office to upload their updated and timely information in the
website and so to monitor ad give feedbacks to online complaints. ISU-GAD office will then have less time
for information dissemination and inform a greater number of people through its online feature. Meanwhile,
Users can sign-up their accounts and can join forums, file online complaints and received complaints
feedback.
1.2 Purpose and Description
The main purpose of the study is to facilitate the information dissemination of GAD updates and
to monitor, and give responses to every complains. The administrator of the system will be capable of
uploading latest information about GAD like, News, Announcements, Policies, Forum Topics and
downloadable PDF’s. meanwhile every person with complaints does not have to visit ISU-GAD office
anymore. Users can just browse the internet and file online complaints. The Gender and Development
Complaint Portal is Web based application that access using different devices. The different
functionality describes the system below:
This project aims to design and develop Gender and Development Complaint Portal to
facilitate information dissemination and manage online complaints. Specifically, the project aim
to.
Administrator:
o Latest News
o Announcement
o FAQs
Registered Users
File Complaints
a. Google Chrome
b. Internet Explorer
c. Mozilla Firefox
a. Users Acceptability
Functionality
Usability
Reliability
Efficiency
Portability
The GAD complaints portal in an online platform that can be accessed through the use of internet. It is
designed to broadcast GAD information and reach-out more people to equip them with policies and
information pertaining GAD. The has two main modules namely the Administrator and the Users Module.
The administrator module will be the one in-charge of managing the website contents like, announcements,
forum topics, news, policies and downloadable PDFs. While the user’s module is capable of viewing the
website content. Meanwhile, users need to register their GAD account to file and submit their online
complaints. To implement the system through the web browser the student can be used in any platform
This topic encompasses the historical development of an information system as called from books, both old
indecent vintage, dealing with the different systems through which researchers were able to draw the line
of information system. These materials facilitated researcher’s conceptualization of the study the
appropriate research trust and the constructions of the questionnaire. The most relevant materials and
Related Literature
Said by McLemore (2014), the need for record management programs to be implemented as
standard operating procedures in any government agency is best evidence by real world specific examples
of good and bad scenarios. Readers may be familiar with the large-scale examples of how poor record
management ended in disaster for companies such as Enron. There are, however, other notable examples
of how record management plays a role in the way agencies and companies do business. This section
examine several scenarios of how record management practices impacted agency operations in a manner
According to Iwiwhu E.B. (2012) States that “the nature and extent of the record will vary
depending upon the purpose, setting the context of the services”. However, whatever the record maybe, it
is important that the staff get familiar with the legal and ethical requirements for record keeping professional
context and jurisdiction. Which means, generally record keeping must be guided by some level of
According to Igwoku (2012) said that an analysis of Record Management Strategies in Western
Nigeria, Profiling of record keeping occupies a strategic position in the efficient and effective management
of the university system. In fact, it is central in the administration of institutions of learning because it
documents the planning and implementation of appropriate course of services allowing proper monitoring
of work. Which means, in the conventional paper based organization such as the universities, paper
According to Yuliya Makarova (2012) suggested that efficient and effective environmental
performance. Business Information System (BIS) are recognized as a tool for the facilitation of collection,
storing, processing and communicating any kind of information. However, there are others benefits that
BIS can provide for a company. These benefits are related to the effective use of information, such as
support of informed decision making, increase of overall environmental awareness in an organization and,
as a consequence, behavioral change. Therefore, the purpose of the study is related to the extension of BIS’
functionalities through the integration of the environment information flow. Thus, records are maintained
indefinitely at the records center or storage area without regard to their time and utility values.
According to Gibson (2012) a business computers might use dozen or even a hundreds of files,
impacts the files and retrieve data manipulation which otherwise should require much effort to access
manually data is vital organization element. That is why there is a need to apply information you want form
organization relies processing system in which data are recognized in the file as document.
According to Winder A. Wallae (2012) says that accounts information system is the give that holds
the several of an organization together. But in order to have effective information system, people involved
should have a basic understanding of the information system. Through understanding the system will help
in managing and evaluating an organization which generally aims to improve the information provided by
the system, in quality, timeliness or structure of the information and internal check that is to improve
dependability of information system and to provide complete records, for the protection of the assets of the
business and to decrease the clerical cost of keeping the records. Information system is the combination of
personal, manual and procedures that an organization user to meet its routine needs of financial data, in
other words information system is a network of related procedures developed according to one integrated
system is considered an important factor for managing human resources in higher education institution
(HEIs). More importantly, when Information System (IS) is utilized for assisting such efforts, it inevitably
makes the HEIs more efficient and competitive. This research attempts to integrate performance appraisal
using competence-based appraisal (CBA). From this system, the HEIs are supposed to able to manage all
activities related to their human resources and carriers. The methodology implemented in this research is
by making the software of CBA model (the concept) and then the try out was done to find out both the
weaknesses and strengths of the software, and finally the improvement was conducted as well. In addition,
the evaluation of these software covers the aspects of validity and reliability testing so that the software are
really proved to be completely applicable. The results provide the HEIs with information about both the
weaknesses and strengths and therefore the system was made perfect based on such findings. It can be
concluded that the using CBA in HEIs, all the activities related to human resources in HEIs can be rated.
Thus, this CBA system enables the HEIs to do their human resources appraisal more accurately.
According to Amida, et.al (2015) in their book office management principle’s discuss the use of the system
they stated that the data are basically the content of record and are basis for what decided and what is to be
done. There are filling updating and retrieval are very important to any business, company or agency.
Education is one of the keys towards the reduction of gender disparities. There have been many
projects implemented by organizations such as the United Nations to enhance women‘s education. The UN
Millennium Development Goal (MDG) that focuses on promoting gender equality and empowerment of
women aimed to achieve equal access to school for girls and boys in primary and secondary school by 2005
and in all levels by 2015 (www.un.org/milleniumgoals as cited in Aikman, Underhalter, & Challender,
2005). A report from the Millennium Development Project 2004 showed that in order to reach this MDG,
in terms of education, increasing girls ‘enrollment in school is not enough because there is still a high rate
of dropouts due to aspects such as poor educational system, early pregnancies and many other difficulties
Aikman et al. (2005) state that unless a focus is made toward the educational system itself, not only
the number of girls vs. the number of boys in school, but what is taught and how it is taught to the two
groups, this MDG cannot be fully achieved by 2015. In other words the school systems in countries
concerned have to be revised; the curricula and pedagogies have to be redesigned to fit the education of
girls.
Aikman et al. (2005) conducted a research through the evaluation of two international seminars on
education and gender equality, and a case study about sexual abuse of girl pupils in Northern Mozambique.
The research was conducted through design, and critique of pedagogy and gender equality related scenarios
in Mozambique, Dakar and Beijing. In reviewing the curriculum, governments, policy-makers, NGOs and
other related organizations have to consider what is being taught to girls, the expectations of girls and their
parents in getting education. They have to consider the needs and specificities of girls, according to their
backgrounds, and also make sure the curriculum and educational institutions allow girls participation in the
learning process. In order to make this process successful, women have to be involved in the design of the
curriculum; they have to be informed of the social policies so as to make decisions that promote gender-
based education. There should also be a significant number of female teachers so that the girls can have
role models they can look up to in the school. After reviewing the curriculum, the pedagogies have to be
considered, in other words how the teachers are applying the curriculum into the classroom. Teacher-female
student interaction in the classroom school should not be gender-bias, the consideration given to boys in
terms of subject, feedback, school activities, such as sports, public speaking should be given to girls too.
Girls’ capacities and cognitive competences are most of the time in some societies underestimated. The
teachers play an important role in the classroom settings, they can make sure girls and boys understand that
they can do well for instance in mathematics as well as in family care. Still in dealing with the educational
environment of girls, the case study conducted in the research process for this article by Aikman et al.
(2005) in northern Mozambique shows how Oxfam GB, a nonprofit, in cooperation with the government
and AMME (a Mozambican Association for Gender and Education) fought against the sexual abuse of girl
pupils. Oxfam in Mozambique was able to pressure the government into making policies that punish any
student sexual offender in the school system; teachers themselves committed most sexual abuses. After the
first known case was settled with the help of the community, other girls got the courage to speak up against
the abusive teacher. This case shows that sexual abuse in Mozambique is one crucial cause of girls’ dropouts
from school, and this may be the case in many other countries where the MDGs are being implemented.
In order to achieve gender equality and empowerment of women policy-makers and government
officials have to create institutions that are ―fair to women and men‖. The curriculum has to be designed
to meet the needs and expectations of all the social groups; teachers have to be trained to deal with gender-
related issues and to apply the curriculum without bias. The community must be sensitized and involved in
the promotion of gender equality and struggle against any such act or policy that jeopardize the development
of the community as a whole. To implement all these resolutions there is a strong need for resources,
supervision and evaluation of different programs to see what is done, what is not working and why.
Curriculum and pedagogy redesign is a promising solution toward the achievement of gender equality and
Rao and Kelleher (2003) assert that development organizations cannot achieve gender equality
unless they negotiate with the very institutions and social groups that sustain gender disparities and bring
change. Institutions are the rules that define social and economic behavior; they frame the decisions
regarding individuals’ lives; women‘s conditions are deeply subject to those rules. Organizations play an
important role in changing institutions. Whenever organizations raise an issue about institutions, they can
either choose to change or support it. There are still reluctances about women holding certain positions in
the decision-making instances; organizations too are subject to those biases, in a less apparent way though.
So in order for organizations to change institutions that hinder gender equality, there must be some change
within organizations. Women in organizations must be empowered and involved in the decisions making
process. Rao and Kelleher (2003) suggest two approaches to bring about this change within the
organization: gender infrastructure approach and organizational approach. Gender infrastructure change
approach promotes the empowerment of women within the organization with training, more responsibilities
concerning women issues, and creating womenfriendly environments and policies on the job. This approach
is also known as ―gender mainstreaming‖. It promotes women leadership within organizations, but records
show that this approach has not been fully supported (Rao, & Kelleher, 2003). The organizational change
approach on the other hand focuses on the ‗the organization‘s capacity to challenge gender-biased
institutional rules (Rao, & Kelleher, 2003). In other words, empowering women to raise their voices and
challenge any injustice toward them, and making sure the organization is accountable to internal and
external women clients. This approach has been experimented within Bangladesh Rural Advancement
Committee (BRAC), an organization that works with over two million women in Bangladesh. The result
was that, in two years, women obtained more consideration and involvement in the decision-making process
within the organization, which allowed better communication among all the members and a smoother
management. However the results achieved in BRAC has not been proven to influence women conditions
in the rest of the area (Rao, & Kelleher, 2003). Changing institutions and organizations in order a achieve
gender equity is still a challenge since within the organizations there is still some work to do toward the
achievement of representative hierarchy and power sharing between men and women. Female staff should
be trained to leadership positions within organizations (Greet, 1994). Outside development organizations
women have to be trained to political leadership if they want to achieve equality and reduce disparities
between genders. Women have to be part of the decision-making process in order to design women-friendly
policies and ensure their implementation (Abdela, 2000). That can be done only if women are trained and
qualified to be leaders which is not an easy process. Abdela (2000) asserts that women are not involved in
politics because there are several social beliefs and biases that set women aside from decision making. Such
beliefs as women are not interested in politics or cannot be political leaders. She suggests development
organizations to invest in training women and preparing them to hold leadership positions in order to be
able to design policies that will bring a positive change to the lives of women.
One of the well-known models related to technology acceptance and use is the technology
acceptance model (TAM), originally proposed by Davis in 1986. TAM has proven to be a
theoretical model in helping to explain and predict user behavior of information technology
(Legris, Ingham, & Collerette, 2003). TAM is considered an influential extension of theory of
reasoned action (TRA), according to Ajzen and Fishbein (1980). Davis (1989) and Davis, Bagozzi,
and Warshaw (1989) proposed
TAM to explain why a user accepts or rejects information technology by adapting TRA.
TAM provides a basis with which one traces how external variables influence belief, attitude, and
intention to use. Two cognitive beliefs are posited by TAM: perceived usefulness and perceived
ease of use. According to TAM, one’s actual use of a technology system is influenced directly or
indirectly by the user’s behavioral intentions, attitude, perceived usefulness of the system, and
perceived ease of the system. TAM also proposes that external factors affect intention and actual
use through mediated effects on perceived usefulness and perceived ease of use. Figure 1 depicts
the original TAM (Davis, 1989).
TAM appears to be able to account for 40 percent to 50 percent of user acceptance. TAM
has evolved over time. TAM2 extended the original model to explain perceived usefulness and
usage intentions including social influence (subjective norm, voluntariness, and image), cognitive
instrumental processes (job relevance, output quality, and result demonstrability) and experience.
The new model was tested in both voluntary and mandatory settings. The results strongly
supported TAM2 and explained 60 percent of user adoption using this updated version of TAM
(Venkatesh & Davis, 2000). This study adopted TAM2 as the baseline model in addition to TAM.
Several studies have examined TAM as a model to explain how people adopt and use e-
learning. Selim (2003) stated that there was a need to investigate TAM with web-based learning.
He put forward the course website acceptance model (CWAM) and tested the relationships among
perceived usefulness, perceived ease of use and intention to use with university students using the
structural equation modeling techniques of the LISREL program. He concluded that the model fit
the collected data and that the usefulness and ease of use turned out to be good determinants of the
acceptance and use of a course website as an effective and efficient learning technology. Perceived
usefulness can be defined as the extent to which a university student believes using e-learning will
boost his or her learning. Meanwhile perceived ease of use is defined as the extent to which one
believes using e-learning will be free of cognitive effort. In this study, e-learning refers to pure,
web-based, asynchronous learning through an Internet site operated by the university. It is also
supported by the learning management system (LMS) of the university.
Lee, Cheung, & Chen (2005) did similar research with the LISREL program to investigate
university students’ adoption behavior towards an Internet-based learning medium (ILM)
introducing TAM, but they integrated TAM with motivational theory. They included perceived
enjoyment as an intrinsic motivator in addition to perceived usefulness and perceived ease of use
into the TAM. According to their results, perceived usefulness and perceived enjoyment had an
impact on both students’ attitude toward and intention to use ILM. However, perceived ease of use
was found to be unrelated to attitude. Meanwhile, Liu, Liao, and Peng (2005) integrated TAM with
flow theory that emphasizes concentration on the structural model. They argued that university e-
learning system users should be regarded as both system users and learners. In addition, Liu, Liao,
and Peng adopted e-learning presentation type as an external variable into the model. They
concluded that e-learning presentation type and users’ intention to use elearning were related to
one another, and concentration and perceived usefulness were considered intermediate variables.
Pituch and Lee (2006) added system and learner characteristics as external variables that were
hypothesized to impact perceived usefulness, perceived ease of use, and use of an e-learning
system. After conducting a structural equation modeling technique with LISREL, they concluded
that system characteristics were important determinants to perceived usefulness, perceived ease of
use, and use of an e-learning system, and that the theoretical model based on TAM was well
supported. Saadé, Nebebe, and Tan (2007) also insisted that university students’ participation and
involvement were important to successful e-learning systems and therefore students’ acceptance
behavior should be assessed. They suggested that TAM was a solid theoretical model where its
validity can extend to the multimedia and e-learning context. Venkatesh and Davis (1996) focused
on understanding the antecedents of the perceived ease of use. They concluded that computer self-
efficacy acts as a determinant of perceived ease of use both before and after hands-on use and that
the objective usability was found to be a determinant of ease of use only after direct experience
with a system. In the meantime, Grandon, Alshare, and Kwan (2005) insisted that e-learning self-
efficacy was found to have indirect effect on students’ intentions through perceived ease of use. In
addition, Mungania and Reio (2005) found a significant relationship between dispositional barriers
and e-learning self-efficacy. They argued that educational practitioners should take into
consideration the learners’ dispositions and find ways through which e-learning self-efficacy could
be improved. In this study, e-learning self-efficacy is generally represented as the personal
confidence in finding information and communicating with an instructor within the e-learning
system and the necessary skills for using the system.
Many Web-based educational applications are expected to be used by very different groups of users
without the assistance of a human teacher. Accordingly there is a need for systems which can adapt to users
with very different backgrounds, prior knowledge of the subject and learning goals. An electronic textbook
is one of the most prominent varieties of Web-based educational systems. In this paper we describe an
approach for developing adaptive textbooks and present InterBook—an authoring tool based on this
approach which simplifies the development of adaptive electronic textbooks on the Web.( Brusilovsky, P.,
Eklund, J., & Schwarz, E. (1998)
UK planning problems and policy formulation processes, participatory online systems are a useful
means of informing and engaging the public and can potentially bring the public closer to a participatory
planning system. (Kingston, R., Carver, S., Evans, A., & Turton, I. (2000).)
Despite the significant changes in the end-user computing environment during the past decade and
proliferation of web-based information systems, there has been little research on measurement of user
satisfaction with web-based information systems, which is a primary component of end-user computing
environment at present. People generally just apply the Doll and Torkzadeh (1988) instrument in their
studies to measure the extent of user satisfaction, assuming it is valid and reliable for web-based information
systems. (Xiao, L., & Dasgupta, S. (2002).)
This invention relates to secure end-to-end communications systems. More particularly, the
invention relates to a vault controller based registration application serving web-based registration
authorities and end users for conducting electronic commerce in a secure end-to-end distributed information
system, e.g. the Internet.( Patel, P., Lee, K., Reider, R., Kittel, D., & Lasida, L. (2002))
The entity relationship model (ERM) is a conceptual model that represents the information
structure of a problem domain in terms of entities and relationships. The result of modeling using
the ERM is graphically represented as an entity relationship diagram (ERD). Thus, an ERD
represents the conceptual structure of a problem domain being modeled. ERDs are widely used in
database design and systems analysis to capture requirements of a system or a problem domain. In
particular, when used for data modeling, the ERD assists the database designer in identifying both
the data and the rules that are represented and used in a database. ERDs are readily translated into
relational database schemas.( Chen, P. P. S. (1976))
A database design methodology is defined for the design of large relational databases. First,
the data requirements are conceptualized using an extended entity-relationship model, with the
extensions being additional semantics such as ternary relationships, optional relationships, and the
generalization abstraction. The extended entity-relationship model is then decomposed according
to a set of basic entity-relationship constructs, and these are transformed into candidate relations.
A set of basic transformations has been developed for the three types of relations: entity relations,
extended entity relations, and relationship relations. Candidate relations are further analyzed and
modified to attain the highest degree of normalization desired. The methodology produces database
designs that are not only accurate representations of reality, but flexible enough to accommodate
future processing requirements. It also reduces the number of data dependencies that must be
analyzed, using the extended ER model conceptualization, and maintains data integrity through
normalization. This approach can be implemented manually or in a simple software package as
long as a "good" solution is acceptable and absolute optimality is not required.( Teorey, T. J., Yang,
D., & Fry, J. P. (1986)).
The data flow diagram has been extensively used to model the data transformation aspects
of proposed systems. However, previous definitions of the data flow diagram have not provided a
comprehensive way to represent the interaction between the timing and control aspects of a system
and its data transformation behavior. An extension of the data flow diagram called the
transformation schema is described. This schema provides a notation and formation rules for
building a comprehensive system model, and a set of execution rules to allow prediction of the
behavior over time of a system modeled in this way. The notation and formation rules allow
depiction of a system as a network of potentially concurrent `centers of activity' (transformations),
and of data repositories (stores), linked by communication paths (flows). The execution rules
provide a qualitative prediction rather than a quantitative one, describing the acceptance of inputs
and the production of outputs by the transformations but not input and output values. (Ward, P. T.
(1986))
A method and apparatus for providing stricter data types, and stricter data type checking,
in a data flow diagram. For numeric data types, a unit data type is associated with the data type.
Therefore, if a user desires to change the units from one compatible type to another, such as feet to
meters, this can be done without recompilation. Unit type checking is also provided, whereby, as a
block diagram is created, the block diagram editor continually checks each node or function for
impermissible data unit operations. This provides a more powerful debugging environment than
that previously known in the art. Polymorphic unit capabilities are also provided whereby a virtual
instrument can perform calculations regardless of unit but also has unit type checking capabilities.
A stricter data type referred to as the enumerated data type is also included which is a variation of
an integer numeric data type that includes an enumerated list of mnemonics. Enumeration type
checking is provided to prevent invalid accesses. (Kodosky, J. L., & Shah, D. K. (1998))
Given a polyhedral object, its wire frame is the set of its edges and vertices. In this paper,
we present an algorithm which discovers all objects with a given wire frame. This algorithm, which
has a number of applications to mechanical design besides being of mathematical interest, has been
implemented and has performed well on complex objects. (Markowsky, G., & Wesley, M. A.
(1980))
According to Wisconsin, (2011), “An Online Scholarship Application System” for a foundation at
University of Wisconsin-La Crosse. This deals with a large number of scholarship applications as it uses
paper-based processing. This evolution focuses on replacement in which portions of the existing system is
substituted for re-engineered system portions. The system was developed under java development platform
using java in the business logic layer, JSP in the presentation layer and Oracle 10g Express Edition in the
database layer. It was run under IIS application server.In addition, Asia pacific issues. No. 48( 2001) sighted
that some basic applications areas like e-exams that are related to E -scholarship System were also reviewed.
In a paper titled "An Arabic Web- Based Exam Management System" [M. Z. Rashad 2010) proposed a web
According to Gregorio and Carmelita Miranda (2013) in their book of office management principles and
practice discuss filing and storage system; data are the contents of records and are the basis for what is
decided and what is done. Therefore, record filling and retrieval are very important. They also pointed out
the filling procedure should less in accordance with an established and proven system. The author
emphasizes the major purpose of filling that is to store them in safe and permanent place for availability
when needed.
According to Samson, (2013) investigated the records management practices and problems of three levels
of local government units in the province of Albay. The study found out that the needs and problems
regarding records management are allowed to stay in files since there was no proper method of record
dispensation. It was deemed necessary to formulate standard operating procedures in salvaging records in
enables us to easily retrieve and disseminate data for internal and external use. By doing so, we are able to
improve the efficiency of work both in terms of a performance of every employees and service we render
to the public. Thus, with the aid of automated system, work could be done easily and that it is more
According to Victor T. Hernandez (2014) said that nowadays, during the rising popularity of
automation and advancement in technology, one of the most basic components of our government. Is
unfortunately left behind: the barangay unit. Every aspect of the barangay’s processes and services are still
done manually: from filling recording a complain, checking the records before releasing a barangay
clearance, to filling records of incident that happen in the barangay. This somehow obsolete method of
filling records and complaints presented several problems. In most barangays, records were kept in log
books which could either damaged or get lost. Logbooks also make it difficult to search specific report or
record. Skimming through several logbooks for a certain report can be tedious and take a lot of time. This
will slow down proceeding, investigation, and inquires that need the production of that information.
Security and Integrity of the information also present another set of problems. It is difficult to keep track of
redundant record or even update the proceedings of a case. Also logbooks can be easily taken out of the
office or rip off page without anyone noticing it. Victor also said that one solution seen to minimize these
problems is the automation of barangay processes. This will improve the efficiency of filling reports and
complaints in the barangay level. Storing barangay information in a central database allows for easy storing
and updating of records. Retrieval of records will also be faster, translating to faster transaction time. With
the records readily available in the server, this will allow concerned government agencies to gather data for
for better ways of improving their quality of living and making their works more efficient. Myriad of years
had passed when man first uncovered the perplexity of using the perhaps most powerful machine today’s
modern age the computer. This human controlled device performs goal-directed tasks such as finding the
According to Albacena (2013), the computerization is one of the best solutions to facilitate and
speed-up the processing of large amount of data. Likewise, allowing updating and retrieval, thus, task
should be done manually. She found out the different educational and governmental organization,
computerization, had come out as one that has of great influence upon them. Not to mention actuate in
modern trend, it is much of the desire to have faster and more accurate processing, especially in the different
government agencies which all aim to aid the people in granting their needs at the earliest possible time.
SYSTEM (SRIS) AIMS-CeSS Department. Student Records Information System (SRIS) is a computer
application that deals with the collection, organization, storage, generation and publication of recorded
information. SRIS provide capabilities for entering student information, building student records and
managing othe student-related data of the school. Furthermore, it allows the quick flow and accessibility of
information. In this study, the development of an SRIS in AIMS, particularly at the Center for Students
According to Rado, M. & Angeles, B. D.. (2012). LAN – Based Management Information System
of Petron Gas Service Station – Puerto Branch. The LAN - Based Management Information System for
Petron Gas Station – Puerto Branch is developed to facilitate the following areas of operation: profiling of
employee and suppliers, point of sale, monitoring of payables, expenditures, sale, and inventory of supplies.
Compared to the current system of the company, the system minimizes human error and saves work time.
The system generates accurate report as well. It is user friendly and locally networked, operated by one
information dissemination system is important in every organization. This paper examines the Information
Dissemination System (IDS) of the University of Immaculate Concepcion in terms of media tool, quality
and clarity, and timeliness. A researcher- made questionnaire was used to evaluate the IDS and it was found
that the information for the entire student of both campuses, Fr. Selga campis (main) and Annex campus
(Bonifacio), are publicized through three different media tools-bulletin boards, sound systems (IC Radio
According to Tamayo, J. D. , Vicente, C. P., Malang, B. P,. Reyes, M. V. & Tanig, C. O.. (2013).
Keeping pace with technology can be time-consuming and resource-intensive. How-ever with e-
governance, we have to keep up with technological advancement and use our resources to make government
service more efficient through the use of technology. Thus, this study was conceptualized to introduce the
use of technology to the community of Baliwag, Bulacan to meet the requirements of e-governance. Using
System Analysis and Design in the development of the system and descriptive research in the assessment
of its acceptability, the study is designed to help government officials embrace technology. Findings
revealed that barangay officials look for the following characteristics in an automated system: easy to
operate, password-secured system, printable forms, readable test and simplicity of design. The barangay
officials considered the automated issuance of barangay clearance as efficient, accurate, user friendly, quick
response rate, and secured information. The overall assessment in the acceptability of the automated
TECHNICAL BACKGROUND
The diagram shows the different components of the framework. Each component function
distinctively within the framework. The following components are stated below their specific function.
The users send queries using a client computer, it is responsible for making queries and reading the
response from the web server. This is the interface of the user to the system. The user accesses a web
browser like Firefox and Google chrome to view and access the webpage of the system. The system is a
web based application. It means that can only access by the user using the internet. Without the internet
connection it is impossible for the user to access and view the webpage of the system. Using the internet,
the user can send and receive request. The server processes the request and response of the user. It is
responsible of the matching the given data to the database. If the match is found from the database it
processes again by the server and send it back to the user via internet. If match is not found the database
sends a notification to the server and the server from the database through the client computer. The database
acts as the back end or the repository of all the information. All information from the user is stored in the
database file. It organizes the information sent and receives by the user.
The following are the technologies used the development of the system:
jQuery – a JavaScript library that allows web developers to add extra functionality to their
websites. It is open source and provided for free under the MIT license. In recent years, jQuery has
Bootstrap – a technique of loading a program into a computer by means of a few initial instructions
that enable the introduction of the rest of the program an input device.
The proposed system is a web-based system. The system will only access through internet access
with the use of internet browser. The system use the three tier network: the Client Tier, Application
The Client Tier. This is also known as the user interface layer, it will run the ends-user computer.
The client provides the user interface for the web-based application. It is a front-end layer. Chrome
The Application Tier. This will be responsible for interacting with the client. Apache web server
will be running in windows platform and PHP, a server side scripting language to connect. The
application tier processes all the queries of the user. It accesses the database tier which is the
backend of the system. Also, it processes the response of the database tier and sends the response
The Database Tier. This is the place where data will be stored. The database server will maintain
the data needed for the web application. It is a back-end layer. It will store data and control the
basic system functionality. MYSQL database running in windows platform will be used.
CHAPTER IV
METHODOLOGY
This chapter deals with the methodology used by the researchers in conducting the research process.
In this chapter, the required specification of the project were discussed and presented. The project
description was one of the topics in this chapter. It includes data modelling results, processes model, and
system interface.
4.1 Environment
The study will be conducted at Isabela State University Echague Campus, San Fabian Echague
Non-teaching Staff 1
Students 15
IT Experts 2
TOTAL 18
This table shows the number of respondents who will evaluate the system as regard to its
acceptability.
4.1.3 Organizational Structure
The fishbone diagram below shows the major causes that have been undergone by the
system to achieve the desired effect.
Machinery Methods
Printer
Tarpaulins
Materials Manpower
This figure explains the diagram of the problems encountered by the researchers. It shows
that the main problem in information dissemination and filing of complaints is unreliable and time
consuming due to machinery, method, manpower and material.
4.2.2 Functional Decomposition Diagram
View Sign-in /
Information Register
Information
The figure above shows the different module in the system. The administrator can manage user,
update content validates and post comments, manage complaints and upload downloadable. It can provide
/ generate list of complaints report. Guest users can only view information that has been uploaded on the
website to be able to facility in filing complaints, the user can sign-up his account on the website.
4.2.3 Technical Feasibility
The table shows the deliverables and the duration of the system, the deliverables contains
the following: Concept Proposal, Project Planning, Development, Testing, Evaluation and
Documentation with the duration of date.
Requirements Modeling
Input-Process-Output Diagram
Feedback
Figure 5. Input-Process-Output Diagram
The above figure shows the basic inputs of a user to the system and how the system
processes it and return an output.
Basically for the Users and Administrator, they should log-in into the system using their
own accounts in order to use the system, as well as the Admin and Users, the system will verify
and validate the log-in and registration details and direct it to the system.
4.3.2 Control
The system provides log-in security to ensure that only the registered student can
use the system. The system verifies the users who registered through their personal information.
The system does not accept users who were not officially activated their accounts via email.
4.4 Data and Process Modeling
PROCESS MODELING
Administrator Panel
User Complain 0
Download Files
Guest
View Content
The figure shows the Context Level 0 Diagram of the Course Evaluation System. The
process of the system starts on the management of System users, Manage Gad Information, Upload
Files, Post Forum, Register Profiles and Manage Complaint Details. All Registered Users may
Access their account, post complaint and join forum that will be added by the administrator.
Meanwhile guest accounts or visitors of the website can view the content of the website, and
Successfully Updated
1.0
Successfully Saved
Successfully Deleted
Manage System Users
Delete System Users
Notice : Updated
Notice : Saved
Delete ID
Notice : Delete
Updates Info.
D1 m_system_users
Successfully Updated
2.0
Successfully Saved
Successfully Deleted
Manage
Delete Announcement Announcement
Announcement Info
Notice : Updated
Notice : Saved
Notice : Delete
Updates Info. Delete ID
D1 m_announcement
Successfully Updated
3.0
Successfully Saved
Successfully Deleted
Manage News
Delete News
News Info
Notice : Updated
Notice : Saved
Notice : Delete
Updates Info. Delete ID
D1 m_news
Register User
Information
Notice : Updated
Notice : Saved
Updates Info.
D1 m_user_information
Account info
Successfully Signed in User Account
5.0
Sucessfully Filed
complaint
File Complaints
Complaints Details
Saved Complaint
D1 M_complaints
Successfully Uploaded
File
8.0
Upload Files
Notice Updated
File
D1 m_files
Account info
Successfully Signed in User Account
7.0
Downloaded FIle
Download File
Requested File
Download
Download File
D1 m_files
IMAGE SLIDER
LOGO ISABELA STATE UIVERSITY Home | About Us | News | Announement | FAQs | Portal
IMAGE SLIDER
MISSION
VISION
CORE VALUES
IMAGE SLIDER
LOGO ISABELA STATE UIVERSITY Home | About Us | News | Announement | FAQs | Portal
IMAGE SLIDER
IMAGE SLIDER
Table above shows the about us information of the gad website and complaint
portal
Table above shows the system users and the users of the complaints portal table
Table 6 Data dictionary of the database t_comments
Attribute Data Null Pkey Length Description
Type
ID Int No Yes 11 Identification Number
Faq_id Varchar Yes No 255 FAQ Identification Number
feedback Varchar Yes No 255 Administrator Feedback
Date_posted Varchar Yes No 255 Date Posted
Table above shows the table for content manager where announcements and
news are stored.
This figure shows the three tier architecture broken down as follows: client tier, data tier,
application tier.
Presentation tier: The top-most level of the application is the user interface. The main function
of the interface is to translate tasks and results to something the user can understand.
Application tier: This layer coordinates the application, processes commands, makes logical
decisions and evaluations and performs calculations. It also moves and processes data between
the two surrounding layers.
Data tier: Here information are stored and retrieved from a database or file system. The
information is stored then passed back to the logic tier for processing and then eventually back
to the user.
4.8 Development
Specs
Hardware
Intel(R)Pentium(R)
1. Processor
Type: Intel Celeron
Processor 2.4 GHz
Number of Cores: Dual
Core
CPU:G630 2.70 GHz
CPU Upgradability:
Upgradable
Chipset Type: Intel E7230
RAM
2. Memory
Installed Size: 2.00 GB
Technology: DDR2
SDRAM-ECC
Memory Speed: 533,0
MHz
The table above shows the recommended hardware specifications needed by the system to
run. It must meet the necessary hardware specifications to avoid miscalculations and hanging of
the system.
4.8.2 Software Specification
XAMPP - The researchers used this as development tool, to allow website designers and
programmers to test their work on their own computers without any access to the Internet.
MySQL - The researchers used MySQL as the database management system.
Adobe Photoshop – it was used for cropping and resizing images, and for making the banner of
the system.
Sublime Text – the researchers used sublime text as a source code editor.
Bootstrap - The researchers used bootstrap in designing the web pages of the system.
Browsers (Google Chrome, Mozilla Firefox, & Internet Explorer) Those browsers was used for
testing and developing the system. The system works in any different browsers.
Administrator:
o Latest News
o Announcement
o FAQs
Registered Users
Download information
File Complaints
Generate Complaints Report
Front End
Adobe Photoshop - The developers used this to design and to edit pictures that are
embedded to the system. Button and images was edited using this software for styling
and designing.
PHP - The developers use this scripting language because it provides a full suite of
tools for building dynamic websites.
Bootstrap - The researchers used in designing the webpages of the system.
Back End
MySQL – The developers used MySQL as the database management system.
4.8.5 Deployment Diagram
4.8.6 Testing
Compatibility Testing
The developer used this type of testing to determine how compatible the system
interface into the different web browsers.
4.9 System Architecture
To evaluate the system researcher used the ISO/IEC 9126 standard in evaluating
the user’s perception. The
Four points Likert scale is used will be as follows.
Formula: X = x/n
Assumptions: