Professional Documents
Culture Documents
Introduction
Businesses are growing all over the globe. It makes the economy growing
which generates jobs and make a country prosperous. According to Griffin and
to earn profit. But running a business is not only about having a great product or
service and earning profit but also requires certain licenses from several
Obtaining a business permit follow procedures and this procedures can be time
consuming because before a permit is issued there are also certain documents
Delivery Act of 2018, or Republic Act 11032 gives government agencies deadlines
to approve applications and provides sanctions for delays and violations. The
simple transactions at the local level should be processed within three (3) days,
more complex transactions such as building permits are given seven (7) days. At
the national government level processing time for highly technical transactions
Natural Resources are capped at twenty days. This law will develop the standards
Cities and municipalities implements the newly approves Anti Red Act.
Lawaan, Eastern Samar. This municipality issues permit manually and is time
Office and visit other government agencies to secure other requirements. It also
1|Page
takes time to release the license because it needs to be approved by the Mayor
and Municipal treasurer which makes the client to return back again several times.
If data are need to be accessed, the clerk have a particular difficult time of finding
it because documents are stored on folders and drawers. It also generates high
cost on paper and if natural disaster occurs documents should be still be placed in
one stop transaction and one-click process of applying a certain permit and
reduces manual efforts on issuing the license. The client will provide the necessary
details of the business to process it for registration and this details is stored to the
database. The goal of this system is to make the transaction faster and so the
agencies to secure requirements such as police permit, fire permit, sanitary permit,
and environmental permit. The database is accessed and maintained by the City
provide information about every issued permit. It also provides the information of
the proprietor, owner, and operator of business and has the ability to monitor which
computers and mobile devices where everyone uses it today. If the client can pay
it online then it will also reduce his visit to the treasurers office because the system
and ready for release the client will no longer come to the treasurer’s office to follow
up the status of the application because the system also provides SMS notification
2|Page
once all necessary documents from other government agencies is secured. The
Project Context
that uses computer or any other mobile devices that can access internet to apply
for a certain permit. The client will open an internet browser on his/her device, go
to the website, then select what kind of permit does he or she needs, and provide
the necessary information of the business to the textboxes in the user interface.
The system provides online transactions but they can also visit the Municipal
secured, those information of the permit is stored on the database and process it
for approval. If the permit is ready for release the system notifies the applicant via
SMS that the documents such as mayor’s permit,police permit, fire permit, sanitary
importance because the information of the permit are only accessed by the clerk
The researchers will conduct the study to the Municipal Treasurer’s Office
of Lawaan, Eastern Samar. The said office has a rough estimate of one-hundred
fifty (150) applicants for business permit, thirty (30) for building permit, one
hundred (100) for vehicle franchise and permit, sixty (60) for pedicab permit
annually. This office owns six (6) computers which is used by the clerks and the
Municipal Treasurer. The researchers will conduct the research to the said office,
since the employees and applicants are having a hard time on processing this
permits and licenses due to that all the documents must be manually processed
and the applicant must visit personally to the Municipal Treasurer’s Office to
3|Page
The proposed system is an upgrade to the current manual business
applicants to visit the office to follow up the status of their request. Employees will
use computers and applicants can use any other mobile device which will make
Theoretical Framework
different kinds of theories to help in making the proposed system better and to
is a series of six main phases to create a hardware system only, a software system
is a term that can be used in different industries, therefore SDLC is a limited term
that explains the phases of creating a software that intergrates with other software
components to create the whole system. To create the system the researchers will
use different kind of software so this theory is a great help because planning is
deciding in advance what to do, how to do, and who is to do it. Planning bridges
the gap from where we are to where we want to go. It makes it possible for things
force in the development of first computers was the need to automate human
4|Page
calculating operations, and one of those forces behind the expansion of
information technology can become part of an activity and vastly expand the scope
(2013), state that a database can be thought of as a kind of electronic filing cabinet;
kind, typically on magnetic disks. Users can insert new information into the
is to say, the database management system (DBMS for short). In relation to our
system, the researchers will have a better idea on how to use and connect
should be easy to use and to make this possible it must have a good design to
inform the users what is it all about. In fact, according also to Gregor and Jones
(2007), design work in information systems is important for both research and
practice. This theories will help the researchers to come up a well organized
and describe the controls in place or planned for meeting those requirements. The
system security plan also delineates responsibilities and expected behavior of all
5|Page
individuals who access the system. The system security plan should be viewed as
security protection for a system. It should reflect input from various managers with
owner, and the senior agency information security officer (SAISO). The proposed
theory will help the researchers to form a good plan to make those information
Conceptual Framework
diagram is shown.
6|Page
Objectives of the Study
of Lawaan, Eastern Samar, in order to improve the services given by the Municipal
Treasurers Office to the clients. This system seeks to create solutions to the
database.
6. To design a system that will keep track all the permits and sends
received.
Licensing of the Municipality of Lawaan, Eastern Samar only. The aim of this study
7|Page
vehicle franchise and permit, and pedicab permit in the municipality. The proposed
system is a web-based system that uses three (3) types of user which is the
Municipal Treasurer, clerk, and the applicants. The Municipal Treasurer which is
designed as the super admin will be in different interface who approves the
registration of the clerk. The clerk will be the admin and has the ability to view the
applications and process it for approval of the Municipal Treasurer. It also has the
ability to manipulate the permits on the database which is to delete those permits
that are expired, update those renewed and save those that are approved. The
applicants delimits only on accessing the user interface because only the clerk and
the Municipal Treasurer has the ability to access those documents on the
system provides different kinds of payments such as payment through online, pay
through the Money Remittances center such as Palawan Pawnshop, or client can
visit the Municipal Treasurers Office. Those approved permit will be automatically
saved to the database. The system will monitor every issued permit and notifies
the clerk and the Municipal Treasurer on their dashboard which permit is expired
and needs renewal. This proposed system wil be delimited to the process of
Eastern Samar. If there are clients that are not from the municipality but they are
operating inside the municipality then they are advise to process their registration
8|Page
Definition of Terms :
SMS - stands for “Short Message Service” and also commonly referred to as a “text
the admin.
Municipal Treasurer – the one who approves the renewal of permits and the
9|Page
Chapter II
This chapter indicates studies and literature that are related to the study.
These studies and literature are briefly discussed to provide the foundation of the
proposed studies. In order to develop a new method and procedure, careful review
of the literature and studies must be done for the development of the study.
Related Literature
common. Yet, there is relatively limited research in this area, particularly in the
context of electronic government (e-government). This paper fills this gap in the
Licensing Service (OBLS) that aims to streamline the various licensing (managed
suggest that multi-agency projects are inherently more complex than single agency
projects. A set of lesson on managing such project is presented and these lessons
management projects become increasingly more widespread. Teo, T. S., & Koh,
business model is in defining the manner by which the enterprise delivers value to
customers, entices customers to pay for value, and converts those payments to
profit. It thus reflects management’s hypothesis about what customers want, how
they want it, and how the enterprise can organize to best meet those needs, get
paid for doing so, and make a profit. The purpose of this article is to understand
the significance of business models and explore their connection with business
10 | P a g e
strategy, innovation management, and economic theory. Teece, D.J. (2010).
Business models, business strategy and innovation. Long range planning, 43(2-
3), 172-194.
countries. While business licensing has its origins in regulation, it is often seen a
little more than a revenue source of local government. This article reviews the
the various forms which local taxation of business has taken in a number of
there are pressure to sweep away most local business licenses as part of
deregulatory reform. Yet local governments in many countries are in dire need og
revenue sources I order to finance local service provision. The article analyses the
reforms that have been introduced to business licensing in Kenya. There, tradition
licenses have been replaced with a Single Business Permit, with the twin
on businesses. Initial results suggest that, while there have been some start-up
problems, both these objectives are being achieved. Copyright © 2001 John Wiley
& Sons, Ltd. Devas, N., & Kelly, R. (2001). Regulation or revenues? An analysis
Related System
List System (LORLS) at Dublin Business School (DBS), where it was installed in
2014. Data generated by the study will inform, advocacy, marketing and training
initiatives to promote the platform. LORLS provides library users with access to
online reading lists with live links to library catalogue records, e-book, e- journal
articles, e-journal titles and websites. A mixed method research style, comprising
quantitative and qualitative approaches was carried out for the purpose of this
11 | P a g e
study. Data was gathered from fulltime and part-time lecturers from the Business,
Law and Arts facilities. The study concludes with a number of deductive and
inductive findings. The first is that although DBS faculty are highly predisposed to
using LORLS, there a number of variables that impact its use. Non-arts faculty who
were teaching part-time and for shorter period of time tended not to be as aware
theory analysis of the focus group data also revealed that faculty would like LORLs
chart synthesizes the key findings of the literature review and of the data generated
Lists, Higher Education, reading strategies, resource lists. Musto, L., & O’Niel, M.
of describing how the strategies adopted by local actors may change and even go
against the initial aims of institutional development initiatives. The article discusses
the case of the system for the environmental licensing of rural properties (SLAPR),
the south eastern portion of the Brazilian amazon. It will be shown that even though
this initiative has earned the status of ‘best practice’ in controlling deforestation. A
closer look SLAPR reveals that it has led to contradictory outcomes. During the
12 | P a g e
authorization for this. According to an institutional analysis of the case study, the
in the region and other countries. In particular it is argued that by accepting the
economical dimensions. Copyright © 2012 John Wiley & Sons, Ltd. Rajao, R.,
Learning lessons from the system for the environmental licensing of rural
The use of ICT in Indonesia’s public services is still limited. For example, in
Bogor District, the use of ICT in the licensing service system especially industrial
business license is still at the preparation stage, website is only used in delivering
register and apply for an industrial business license by visiting licensing agency
office and it takes more than ten working days to process the application. ICT is
using Work Center Analysis (WCA) method, which includes six elements such
anywhere just sit with a computer connected to the internet to register, submit the
validation, verification and also certificate can be obtained through e-mail if the
application is approved. This system will shows the value of transparency in public
services that can enhance public trust to the government. (Nurhaddryani) Y. 2009.
13 | P a g e
Memahami konsep e-Governance serta hubungannya dengan e-Government dan
14 | P a g e
Chapter III
Technical Background
Current System
Lawaan Eastern Samar follows the traditional and manual processing of issuing a
certain permit, which requires materials such as pens and papers. It also requires
more time to process due to that the client must go to the other government
such as police clearance, sanitary permit, fire permit, environmental permit before
going to the Municipal Treasurer’s Office to formally apply and fill out the
franchise permit in the Municipal Treasurer’s Office takes 10 - 15 days due to that
from the start the client must personally visit those government agencies and wait
Proposed System
computers, smartphones, or any other mobile devices that meets the required
specification to access the internet and launch a web browser. The system can be
The system has three types of user, which is the Municipal Treasurer, Clerk,
and the Client. The Municipal Treasurer’s Account which is the admin does not
need registration because it has a different interface due to that he/she approves,
update, and delete the clerks account. It also has the privilege to view the permits
on the database. The most privilege goes to the clerk who processes all the
applications for final approval and manages the approved permits. The clerks
15 | P a g e
account has the ability to update and delete permits on the database. The Client
which is delimited on accessing the application forms only and does not need to
create an account
The system allows online transactions to pay the dues of the permit applied
and also allows payment from the partner money remittance centers. The system
can also generate a code and sent it via SMS to the client once his/her application
is approve. That code can be used to download the soft copy of the permit on the
system.
Hardware
The following are the specific hardware needed for the development of the
connection.
printing of hard copies. For best performance in using the proposed system, the
smartphones.
16 | P a g e
Software
Back end :
communicate with each other, the proposed system uses .Net to build the
application. Since, .Net can be used to create applications for both Windows
used SQL to query, insert, update and modify data to the database.
Front end :
language used for structuring and presenting content on the World Wide
Web.
CSS (Cascading Style Sheets) – the researchers use CSS to set the
appearance of any elements on the page other than Web server controls.
Database :
17 | P a g e
Peopleware
Municipal Treasurer, Clerk, and the Client. The system requires the interactions of
Network
The network that will be used by the system so that it can be easily access
every student
Domain - network that are administered as a unit with common rules and
18 | P a g e
Chapter IV
Methodology
Requirements Analysis
determines the needs and requirements of the proposed system. These features,
analysis also state what the development of the study is for and its purpose.
Performance Requirements
Desktop
to higher vewrsion
19 | P a g e
Browser Chrome (64 bit or 32 bit) Chrome application or
Safari
shows in Table 1.1 and Table 1.2 are the components of the device that will be
and a minimum of 8 GB capacity of RAM and 500 GB capacity of Hard Disk Drive.
This is to ensure that the system which is at the server side will not meet any
interruption during a transaction when applications received from the clients come
at the same time. The system also needs a fast response when contents on the
requirement is the OS and is recommended to use win 7/win 8/ win 8.1/ win 10.
The client PC can have the average specs, and the mobile device can be android
version or iOS. The mentioned requirements are needed in order for the system to
Safety Requirements
Faulty syntax and coding of insert data process can lead to problems such
lead the system to freeze and crash, to avoid such problems the devices used for
accessing the system must meet the required specifications. Power loss can result
into data loss, since the system is processing important documents the use of
Uninterrupted Power Source is required. To make sure that the proposed system
20 | P a g e
is error-free and bug-free, the system will be tested first for a number of times
before the implementation. Any issues or errors found during the test will be fixed,
and anything that needs improvement will be done to make the system much more
accurate.
failure. So, it is important to have backup file of the data wherein admin has the
capacity to update and manipulate the data. This safety measures will prevent
other external entities to misinterpret the information provided in the system. Bad
signal reception of the modem could cause registration process to fail, the system
Security Requirements
Municipal Treasurer, Clerks, and the Clients but only requires registration of 1
account, the Clerk. The Municipal Treasurer’s account which is the super admin
verifies and approves the clerk’s account and will be on a different interface and
has the most privilege to access the database of the proposed system. The Clerks
account which is the admin can access the database but has limitations, it can only
view and save those approve permit. Access to the database of the proposed
system is limited to make sure sensitive data will be protected. The system must
have security credentials that may only be changed by the admin and verified by
the super admin. Registration of accounts of the Clerks can be done on the main
page. Username and Password can be set to their own likings upon the
registration.
21 | P a g e
enough from identity theft, and other information threats. The two accounts have
different interfaces since each account has a different role in the system and this
Systems Design
describes how to develop, design and maintain the software project ensuring that
all the functional & user requirement, goals and objective are met. SDLC is a step
a high quality product. This methodology improves the quality of the software
development of the system. Figure 1.0 shows the Waterfall model, it is the earliest
SDLC approach that was used for software development. It is also referred to as
a linear-sequential life cycle model. In this waterfall model, the phases do not
linear sequential flow. This means that any phase in the development process
begins only if the previous phase is complete. Because of this nature, each phase
development are that it allows for departmentalization and control. A schedule can
be set with deadlines for each stage of development and a product can proceed
through the development process model phases one by one. Development moves
order.
22 | P a g e
Figure 1. System Development Life Cycle (Waterfall Model)
System Design Phase The second phase is the System Design Phase,
systems design.
23 | P a g e
Testing Phase Testing Phase is the third phase of the cycle,
implementation.
implementation.
Test Plan
Usability Testing
is. The goal of this testing is to allow end users to use the software, observe their
behavior, their emotional response and collect their feedback on how the software
can be made more useable or user friendly and incorporate the changes that make
24 | P a g e
Accessibility Testing
The aim of the testing is to determine if the contents of the software can be
easily accessed by disable people. Various checks such as colour and contrast,
font size for visually impaired, clear and concise text that is easy to read and
understand.
Security Plan
The purpose of a security plan is to show procedures that will secure the
system from any threats. This contains vary of security measures, daily procedures
and plans.
Physical Protection
This will deal with the security of the tangible components of the system like
the computer where the system will be deployed. This also deals with the security
Virus Protection
Malwares and viruses can cause data loss and even machine corruption.
scanning per week is required. Plugging peripherals like flash-drives and external-
This ensures that the systems database can only be accessed by the
system administrators only. It will prevent unauthorized access that will cause
Maintenance Plan
that the system is optimized, regularly backed up, and free of inconsistencies.
Maintenance plans helps in improving the system and fixes problems after its
25 | P a g e
deployment. During a system failure or system, a crash log file will be generated
for troubleshooting purposes. Maintenance of the system will not only be done
during a system failure, it will be done monthly to ensure the good health of the
system.
Gantt Chart
26 | P a g e
Pert Chart
27 | P a g e
Context Diagram
28 | P a g e
Data Flow Diagram
29 | P a g e
Client Data Flow Diagram
30 | P a g e
System Flow Chart
Start
Main
Page
No Yes Yes
No Yes
Application
Renewal Employee Register Clerk
Yes No
No
Create Login B
Permit Application Account
Details Request
Registration A
Request
Paymen
Permit
t
Details
Username,
Password,
Employee
Name
Permit
Datab Payment
ase
Account
Request
Database
Permit
Renew
Docum
al
ent Datab
Permit
Docum
ent
End
31 | P a g e
A
Municipal
Treasurers
Interface
No
Registered? Update Permit
Yes
Permit
Details
Account Account
Details Details
Permit Database
Login Database
Login Database
End
End
32 | P a g e
B
Clerks Interface
Permit No
Application
Request
Edit Account
Yes
No Permit
New? Details
Clerk Registration
Yes Form
Verify Payment
Permit
Details
Account
Details
Verify Payment
Renewal
Database
Login Database
Treasurers Approval
Permit Database
Issue Permit
End
End
33 | P a g e
Program Considerations/Issues
Internet connection is required in the online platform in able for the user to access
Skill of Users
Teaching and training the user on how to use the system is required in the
implementation. Although, technology oriented people will find it easy to use the system.
Device Specification
To have a best result in using the system, the researchers recommend the users
to use device/s that meet the required specifications to avoid unnecessary interruptions
Program Tools
structure and can also provides a visual interface for creating custom forms,
Cascading Style Sheets - is a style sheet language used for describing the
34 | P a g e
Software Requirements Specification
35 | P a g e
References:
https://onlinelibrary.wiley.com
https://ieexplore.ieee.org
https://esource.dbs.ie
Gregor, S., & Jones, D. (2007). The anatomy of a design theory. Journal of the
Association for Information Systems, 8(5), 312.
Retrieve from:
https://search.proquest.com/openview/524ec5f1aa1112a1e717d533fe479f34/1?p
q-origsite=gscholar&cbl=26427
Kuutti, K. (1996). Activity theory as a potential framework for human-computer
interaction research. Context and consciousness: Activity
theory and human- computer interaction, 1744.
Retrieve from:
https://books.google.com.ph/books?hl=en&lr=&id=JeqcgPlS2UAC&oi=fnd&pg
=PA17&dq=+Activity+Theory+by+Kuutti,+K.+(1996)&ots=e-
aeZvBTGq&sig=GthhaGX6Lb1al4qEUibbNAPWbm0&redir_esc=y#v=onepag
e&q&f=false
36 | P a g e