Sample Capstone Chapter 3 PDF
Sample Capstone Chapter 3 PDF
Sample Capstone Chapter 3 PDF
A Capstone Project
Presented to the Faculty of
College of Informatics and Computing Sciences
BATANGAS STATE UNIVERSITY
The National Engineering University
Alangilan, Batangas City
In Partial Fulfillment
of the Requirements for the Degree
Bachelor of Science in Information Technology
May 2021
1
**SAMPLE CONCEPTUAL FRAMEWORK IN CHAPTER 2
Conceptual Framework
In order to answer the identified need for a conceptual framework which would
provide a practical, evidence-based tool for informing the effective design of the
2
Moreover, the conceptual framework displayed is multidimensional in nature and
based on the operational experience of the proponents with studying education systems'
with the concepts and methodology used that contribute to the successful completion of
the project.
a critical analysis for employing internal and external evaluations as a significant aspect
towards establishing a central position for the study of educational quality in schools as it
systems.
3
CHAPTER III
DESIGN AND METHODOLOGY
system development structure comprised numerous phases that marked the success of
the system analysis and design effort, paving the way for process improvements to
4
In addition, the proponents of the study believed that Agile development is the most
suitable approach for the study since it hinges on the core strength of constant and
frequent iterations coming out on a regular basis as well as its ability to rapidly adapt to
the ever-changing needs of both the project or the whims of the client. Given that,
elaborated below are the various phases including their respective sub processes
a. Analysis, as considered as the heart of the project life cycle, consisted of the
documentation for the project plan. Among the processes involved in this phase
Define project purpose and scope. The purpose and scope of the project,
discussions. Each team member contributed for effective collaboration and further
project schedule were specified. Furthermore, this step entailed the creation of a
set of plans that directed the proponents through the project's implementation and
closure phases.
held to ensure that the project plan developed by the proponents was practical and
feasible. Moreover, the proponents believed that this is important for system
5
analysis because it will act as an efficient tool for subsequent procedures, such as
data collection.
b. Design. This served as the second phase of the project management wherein the
project's key features, structure, criteria for success, and major deliverables were
all planned out by the proponents. Based on the defined objectives, the modules
and interfaces of the system were first designed by the proponents according to
the needs as well as roles of the faculty users in the accreditation process. These
modules and interfaces were then modified to design the roles and tasks of staff,
students, and lastly, the administrator. Moreover, the measures that make up this
the proponents assessed the suitable components for the actual execution of the
agreement during the early phase, it was also essential to build an in-depth
innovative thoughts developed within the past weeks, it was only necessary for the
proponents to put lots of effort into understanding the system and translating the
System Design. Deemed as the most critical step within the development
of a system, the conceptual design was translated into a physical design by the
6
existing problems throughout the accreditation process. With regards to this, the
proponents of the study utilized various tools and techniques such as Data flow
The proponents of the study, in particular, took the time of developing the
system throughout this phase because they believed that specific tasks like
software application could become quite efficient due to a good software design.
Likewise, the proponents greatly considered that a good design would generate
c. Development. Featured within this phase is the system construction wherein the
actual system is built and coding is done by the proponents through the utilization
of automation tools to convert process and data models into actual prototypes. In
addition to this, the approaches involved in the process are described below:
translated the requirements of the program, provided by the client, into machine
aid of a computer language specified processes which are then converted into
7
UI Design. This phase took into account all the interactive and immersive
color schemes, and responsive design. In relation to this, the proponents aimed
for the UI design of the accreditation system to direct the user aesthetically through
contemplation.
of the study decided what information must be processed and how the elements
value to the client such as improved system quality and performance while at the
same time providing value to the project team like reducing operational costs and
improving response time. In relation to this, enumerated below are the steps
cost of the system is all about satisfying client needs and expectations, the
8
proponents offered an assurance that according to expectations or requirements,
software bugs but also to customize those. Through this process, the proponents
of the study were able to assess the software's reliability. Moreover, the
accreditation system making it effective and efficient in compliance with the quality
standards.
design, test and deploy new code influenced how easily software would react to
the proponents of the study streamlined the process of building, testing and
deploying new code to adapt quickly to client demand and regularly produce new
f. Maintenance. In order to remove errors in the system during its operating life and
crucial. As such, the proponents reviewed the system from time to time to satisfy
the potential future needs, meet the scope of any future enhancement, future
functionality and any other added functional characteristics through the following:
the most challenging aspect of managing the system. While the future could never
could be applied to predict the uncertainties of the project and diminish the
9
associated occurrence or impact. Moreover, this would not only help avoid
situations but also aid in remembering and learning from past mistakes. This would
itself against the standards in place and keep itself abreast of the latest demands of the
labor market, they invest a considerable amount of resources to develop its faculty,
research, and facilities. Throughout this labor intensive, paper-based operation dictated
photocopying and submissions are one of the major concerns of the department before
and during accreditation visits. To fulfill these expectations, both the faculty and the staff
work collaboratively and make sure that all documents must always be accessible and,
In the previous process, the college dean as well as the department chairs would
notify each faculty member to update their respective faculty profiles which are
email and Google Drive. This manual way of information submission resulted in inefficient
submitted by the faculty through the years, manual consolidation and sorting of faculty
information, monitoring problem due to the form are submitted thru email, record conflict
10
due to submission is sent to several administration personnel, and lastly, different data
formats. As such, the proponents sought for a solution to replace the paper-based and
session held by the proponents to systematically identify a wide range of possible causes
and further categorize these potential causes of problems or issues in an orderly manner.
As such, the proponents assessed each bone's validity by analyzing data and finding
By employing the fish bone analysis, the proponents identified six causes in the
Management including their respective effects. The proponents also observed that the
most significant bone pointed to the human factor as the likely cause of the problem: the
and inadequate communication were deemed to be the root causes throughout the
11
Figure 3. Fishbone Diagram
System Boundary
the system and what is outside in the environment is a central component of systems
design. As such, this necessitates the establishment of the system boundary as illustrated
in Figure 4. Based on the diagram, the dashed line serves as a boundary that separates
the internal components and entities of the accreditation system from the external entities
or the so-called environment. In particular, among the identified external entities are the
accrediting agencies such as AACCUP, ABET, and PICAB including ISO as well as the
ten areas of performance since these are the major factors that would provide the inputs
Since the CICS Online Accreditation Management System is intended for real-life
accreditation processes, the proponents designed the system to function efficiently in the
12
regarded that what happens outside the system, in the system’s environment, is of vital
importance.
Hardware Requirements
The hardware requirements intended to suit the needs of the system ranged from
engagement. In relation to this, the proponents specified these requirements as hard disk
drive, processor, memory as well as input and output devices. In terms of processor, the
Dual Core or Third Generation Processors. On the other hand, the minimum requirement
for hard disk drive is at least 5GB whereas at least 20GB is recommended. Meanwhile,
the minimum and recommended requirement for memory is 120 MB DDR and 1 GB DDR
or above, respectively.
13
Furthermore, in order to demonstrate compliance as well as enable collaboration
among faculty members, and enhance the educational experience for instructors and
students, the computer-assisted accreditation system ought to have input devices such
as keyboard, mouse and output devices such as monitors to accomplish its objectives. In
particular, since the main purpose of the CICS Online Accreditation Management System
procedures, and data storage, software requirements specifications were categorized into
the programming languages to be used as well as the knowledge for the end user's
Educational Objectives (PEOs) as well as Student Learning Outcomes (SLOs) since both
of these are critical determinants within the accreditation process in the College of
Software Requirements
requirements intended to suit the needs of the system are categorized into specification
14
and type. In relation to this, the proponents specified these requirements as operating
specifications whereas the types are 32-bit and 64-bit. On the other hand, the
recommended Mac operating system is OS X 10.7 or higher and is 64-bit. Meanwhile, the
the recommended specification for Google Chrome, Mozilla Firefox, Microsoft Edge, and
Safari is 2016 and higher. Consequently, the recommended database for the
accreditation system is MySQL (MariaDB) version 10.4.18 while the software tools
Functional Requirements
the end goal which is to deliver a high-quality accreditation system exactly what is asked
for.
1. Faculty
1.2 The faculty shall have access to all functionalities of the system.
15
1.5 The faculty shall also function as the system administrator.
2. Staff
2.2 The staff shall access the course and student portfolio.
2.4 The staff shall be able to upload copies of the course syllabus, modules, and
3. Students
3.2 The student shall create an archive for school projects and other academic-
related work.
3.3 The student shall upload respective individual grades per semester.
4. Evaluators
4.2 The evaluators shall assess the program dependent on the self-descriptive
4.3 The evaluators shall utilize the given rating sheet to provide a rubric-based
assessment.
16
Non-Functional Requirements
Specified below are the non-functional requirements which demonstrate how the
accreditation system should behave and were deemed constraints upon the system’s
accreditation system:
1. Accessibility
1.1 The system shall ensure accessibility from any location that has an Internet
1.2 The system shall provide complete documented evidence which illustrate self-
2. Accuracy
2.1 The system shall provide an accurate copy of the downloadable forms as well
2.2 The system shall incorporate the correct formulas in order to generate accurate
graphical analysis.
3. Compatibility
3.1 The system shall be able to operate efficiently even with the combination of
3.2 The system shall validate whether a web application runs on all versions of
4. Performance
17
4.1 The system shall complete updating the databases every time the
4.2 The system shall be able to function efficiently under stated conditions for a
4.3 The system shall facilitate an efficient accreditation process by centralizing all
5. Reliability
5.1 The system shall provide compliance and narrative reports of the ten areas of
development.
5.2 The system shall provide an online accreditation guide that will act as a detailed
5.3 The system shall yield consistent results despite repeated observations and/or
5.4 The system shall facilitate the evaluators' work during their visit by providing
6. Security
6.1 The system shall be secured from internal and external threats.
6.2 The system shall employ access control features such as passwords and
18
7. Usability
7.1 The system shall be made readily available with user-friendly interfaces as
7.2 The system shall focus on how well the users could conveniently learn and
7.3 The system shall easily reestablish proficiency when users return to the system
Constraints
The various software design constraints are addressed in the preceding tables
reviewing and critiquing each option dependent on the proponent’s familiarity and
background knowledge.
In terms of server-side scripting tools, the proponents came up with four options
namely CSS, JavaScript, PHP, and WordPress, as shown in Table 1. As the proponents
have sufficient knowledge to manipulate and control PHP, it was chosen as the server-
side scripting language. Moreover, the proponents believe that it would be of great help
in producing a dynamic and interactive web page since it could interact with MySQL
19
Table 1.
Server-Side Scripting Languages
Performance 8 8 9 7
Dependability 8 8 8 8
End User Criteria 8 7 8 7
Reliability 8 7 9 7
Usability 9 6 10 7
Availability 7 7 9 6
Security 9 8 8 8
In terms of database, the proponents came up with three options namely MySQL,
MS Access, and Oracle, as shown in Table 2. The aforementioned databases were rated
based on the resources with regards to PHP. As such, MySQL was chosen by the
proponents because it has a suitable database server for querying information. Also, it
password, making these more stable. MySQL and Oracle run on a multitude of platforms,
while MS Access only runs on Windows. In terms of usability, while Oracle has a lot of
features, MySQL has a number of advantages that Oracle doesn't, and it has better
20
Table 2.
Database
Performance 9 7 8
Dependability 9 7 8
End-User Criteria 9 7 7
Reliability 9 8 7
Usability 9 8 6
Availability 8 8 6
Security 9 7 9
Depicted in Table 3 are the distinctive text and image editors like Sublime Text,
Visual Studio Code, and Adobe Photoshop. Although NetBeans analyzes the codes, the
proponents conclude that it's too slow, based on their experience with text editors. Visual
Studio Code, on the other hand, has a fast source code editor that is qualified for
immediate usage. Moreover, with support for hundreds of languages, VS Code constantly
resizing, color correction, and HDR imaging, Photoshop, on the other hand, generates
superior results. Relative to this, the proponents favored Visual Studio Code and Adobe
21
Table 3.
Text and Image Editor
Performance 8 9 9
Dependability 7 9 9
End-User Criteria 7 8 9
Reliability 8 8 9
Usability 8 8 10
Availability 8 8 9
Security 8 9 8
As displayed in Table 4, the proponents identified three testing tools that are fit to
the developed system such as WAMP, MAMP and XAMPP. The proponents favored
XAMPP over the alternatives because it is straightforward and PHP error reporting is
available by default, which will aid the debugging of the scripts. MAMP, on the other hand,
is only available for the Mac operating system, which is why the developers rejected it.
Despite the fact that WAMP and XAMPP are almost identical, XAMPP has more
advanced features.
22
Table 4.
Testing Tools
Performance 7 8 9
Dependability 8 8 7
End-User Criteria 9 8 9
Reliability 9 9 9
Usability 8 9 10
Availability 8 7 9
Security 8 9 8
Multiple Designs
documents needed by the identified users such as the Faculty, Staff, Student, and
Evaluator. In order to support each user type, fourteen system modules were created for
the accreditation system and these are presented through a Block Diagram in Figure 5.
23
Figure 5. System Modules
As observed in the block diagram, the accreditation system has fourteen modules.
Each module is created and designed according to the functions described below:
24
2. Data Entry Module: This module encompasses the data entries to be done in the
system whereas the Create, Read, Update and Delete (CRUD) functions are
applied.
and/or modify the Program Educational Objectives (PEO) and Student Learning
Outcomes (SLO). It may also provide Course Intended Learning Outcomes (CILO)
5. Teaching and Learning Plan Module: The Course Intended Learning Outcomes
(CILO) and Student Learning Outcomes (SLO) would be analyzed in this module
once the corresponding program outcomes have been added. In addition, the
questionnaires.
skills to use in their respective programs. Alumni and employers could only
7. Course Assessment Module: This module links the answers of the student in
8. Program Evaluation Module: This module links the summary and other reports
25
9. Faculty Information Module: In this module, personal information for the faculty
10. Degree Earned Module: This module links the degrees earned records of the
faculty and displays it to the users. Degrees Earned are those considered to be
finished degrees, with data such as the bachelor's degree, master’s degree,
11. Work History Module: This module links the work history records of the faculty and
12. Publication Module: This module links to the research, publication, conferences
13. Grants/Awards Module: This module links the grants and awards details of the
14. Grades Module: This module links the individual grades per semester of students
Computing Sciences.
Security
such, the proponents applied specific methods for authentication and authorization based
designed for securing software systems; its constituting components are roles,
26
Figure 6. RBAC Component Schema
Likewise, the Principle of Least Privilege (POLP) also served as a basis for the
security architecture of the accreditation system. This concept in computer security would
limit users' access rights to only what is strictly required; users are granted permission to
read, write or execute only the files or resources necessary to do their jobs.
With regards to the CICS Online Accreditation Management System, this role-
based security framework would permit end-users to access the system dependent on
their roles within the CICS Department such as Student, Faculty, Evaluator, Staff, and
College Dean. The proponents believe that it would be less error-prone than granting
approvals one by one because it would have fine-grained control and a manageable
approach to access management. Moreover, this can reduce cybersecurity risk, protect
sensitive data, and ensure that users can only access information and perform actions
27
Trade-off
The analysis of trade-offs throughout the study is one of the major issues that the
proponents prioritized in order to attain the competitive objectives and further devote
resources to improve performance. Various halo effects would also be implicated since
these pertain to the cognitive biases a proponent directly/indirectly has, in which the
Table 5 are the sets of designs with their corresponding technology stack.
Table 5.
Multiple Technology Stacks
Based on the table, Design A consists of open source solutions which may be used
to develop the accreditation system. WordPress specified in Design B, on the other hand,
emerged as an alternative option since it is efficient to use and has an intuitive interface.
Moreover, since this technology is simple, time spent on formatting would be greatly
because of its versatility and flexibility. The proponents believe that it is a true all-rounder
28
Although all of the aforementioned alternatives would be greatly beneficial for the
To map out the flow of information through symbols for the accreditation system,
store, and distribute data between the system and its environment and between
components of a system.
System refers to the system under consideration as a single high-level process. Also, the
29
relationship that the system has with other external entities such as Evaluators, Students,
Link Architecture
Displayed in Figure 8 is the link architecture which shows the functionality of users
such as Admin, Dean of the College of Informatics and Computing Sciences, Faculty,
Staff, Student, and Evaluator and would further be used as a basis in constructing the
30
Use Case
Illustrated in the Use Case diagram are the different types of users such as Faculty,
Staff, Students, and Evaluators including their respective use cases. These interactions
relationship between the user and the different use cases they may encounter.
31
As presented, the faculty and staff users are authorized individuals who are
responsible for managing the website’s operation such as providing relevant self-study
reports with regards to quality objective measures and standards of the accrediting
agencies. They could also manage the faculty portfolio wherein faculty as well as staff
could curate their entire professional careers since the accreditation system could
streamline and aggregate their content through assessments and annual performance
evaluations. Likewise, both these users could oversee the course portfolio which would
allow them to document the planning, process, and outcomes of a single course and to
Conversely, students could manage their own portfolios which are collections of
student work that can demonstrate learning, specifically individual grades per semester,
and further be used as an effective assessment tool for student learning outcomes (SLO).
The external evaluators, on the other hand, could view the modules provided by the
College of Informatics and Computing Sciences with respect to the ten areas required.
Also, they could provide rubrics-based assessments from the given rating sheets in the
accreditation system.
Sequence Diagram
accreditation system would be carried out - what messages are sent and when. Based
on the diagram, the sequences were organized according to time which progresses as a
user navigates a page. Moreover, the objects involved in the operation such as Faculty,
32
Staff, Students, and Evaluators were listed from left to right with regards to when they
Database Design
The data that must be processed and how these data elements would interrelate
are specified in Figure 11. Moreover, this serves as a blueprint for implementing data in
33
specific software applications whereas the proponents gained a better understanding of
and actual screenshots of the entire user interface. This would further elaborate the
details of the accreditation system. Relatively, presented in Figure 12 is the Landing page
34
of the CICS Online Accreditation Management System which is designed with a single
focus or goal: persuade a visitor to take certain actions within the system.
In addition, displayed on the upper portion is the headline which would purposely
grab the visitor’s attention. As observed, the line ‘College of Informatics and Computing
Sciences’ has the largest font on the landing page, which distinguishes it from the rest of
the content. This is due to the proponents' belief that hierarchy is essential in any web
Transforming Lives’ is displayed under the headline. This brief yet official statement
summarizes the purpose or beliefs of the aforementioned Department and the wider
Batangas State University community. Also, it serves as a second hook to grab the user.
Exhibited within the center portion of the page is the welcome message as well as
the level of accreditation of each program within CICS. Furthermore, the Department’s as
35
well as the University’s official logos were featured to further establish recognition,
awareness, and consistency. Since humans are visual creatures, the proponents included
a video that showcases the University to keep them on the page long enough to pique
their curiosity. As the content as well as the quality was created and managed
professionally, the proponents were self-assured that this would further build trust among
Software
The proponents identified Windows Operating System as the system software for
this study wherein it would manage the computer hardware, software resources, and
provide common services for computer programs. Since this would serve as an interface
between the user and the computer hardware and would further control the execution of
all kinds of programs, the accreditation system will be compatible with any device running
scripting language since the proponents have ample knowledge of how to manipulate and
manage it. Since it could communicate with MySQL databases, it was thought to be very
36
Web Platform
The proponents considered Bootstrap as the web development platform for this
typography, forms, buttons, navigation, and other interface components. The proponents
believe that among the other alternatives, this efficient and inexpensive framework is
ideally suited for developing customized layouts for the accreditation system using HTML,
Database
For the Back-end Technology, the proponents utilized MySQL Server not only
of working as a stand-alone database directly on the client. Likewise, the scalability and
Subscription
Identified in the Table 6 are the Softwares as a Service (SaaS) that the proponents
have to subscribe to, in order to gain access to products or services. In particular, website
domain pertains to the unique address that users see in the address bar of the browser
whereas website hosting is a term subscription that keeps the website accessible on the
internet.
37
Table 6.
Subscription Fees
000webhost This term subscription would keep the ₱3,000 per year
website accessible on the internet.
Total: ₱5,000
Testing
framework, this could establish which quality characteristics will be considered when
ISO/IEC 25010 as an ideal framework for defining software metrics that were important
for the accreditation system since it comprises the eight quality characteristics a quality
Testing Procedure
proponents employed the Agile Testing with the Agile testing quadrant as a basis. As
displayed in Figure 29, this quadrant was considered by the proponents as a guide that
38
Figure 29. Agile Testing Quadrants
A. Agile Testing First Quadrant (Q1). This quadrant was concerned with the quality
of the code and the components and covers the Unit testing, and Component
testing of the accreditation system at a unit level. However, the participation of the
developer(s) in Q1 does not restrict the entry and work of a tester. A tester may go
structure of the software product which may help in designing effective test cases.
Once all the individual units are created and tested, combining “Unit Tested”
modules would begin and proceed to integrated testing. Moreover, the assigned
testers for this phase examined the interfaces between the units/modules wherein
the individual modules are first tested in isolation. Once the modules are unit
tested, they are integrated one by one, until all the modules are integrated, to check
39
the combinational behavior, and validate whether the requirements are
B. Agile Testing Second Quadrant (Q2). In this quadrant, the main focus was the
objectives of the study. Generally, it involved the usage of both manual and
automated testing and consisted of testing types such as Functional testing, and
Story tests done at the system level. A tester continuously interacted with the client
to gather and implement the evolved requirements in the test cases. Furthermore,
to validate the Graphic User Interface as per the client requirements and
expectations, Interface testing was employed whereas the size of buttons and
input field present on the screen, alignment of texts, tables as well as content within
C. Agile Testing Third Quadrant (Q3). In this quadrant, feedback and reviews of
previous testing phases or quadrants along with the real user experience, worked
as a driving force to test the system, using multiple scenarios. The Manual testing
method is being used for evaluation based on the user requirements and logical
thinking of the testers. Furthermore, this quadrant was used by the proponents to
build and gain confidence in the usability of the accreditation system. The testing
types covered under this quadrant were usability testing, and user acceptance
testing.
D. Agile Testing Fourth Quadrant (Q4). This quadrant involved the utilization of
40
accuracy, compatibility, performance, reliability, security, and usability. The testing
testing, Reliability testing, and Security testing including other types of testing
accreditation system.
To further elaborate, the testers checked how secured the system was from
internal and external threats. Also, testing of how secure and strong the
software behaves for any attack and malicious programs. Likewise, the testers
ensured that the system can run with the combination of different browsers and
operating systems.
Data Gathering
graduating students, and alumni. The collected information would then be categorized
into two types namely Direct Data, and Indirect Data. Direct data would be based on
as their verbal feedback, findings, and suggestions on different aspects of a course or the
program as a whole. On the other hand, the primary sources of indirect assessment
findings are surveys of enrolled students, graduating students, and alumni. Participants
in the survey are asked a series of multiple choice and subjective questions concerning
their attainment of Course Intended Learning Outcomes (CILOs) and Student Learning
41
Outcomes (SLOs). They also gave general insights and suggestions on various aspects
of the course or the curriculum as a whole. Furthermore, enrolled and graduated students
are surveyed per term, while alumni surveys are performed at longer intervals.
Deployment
This phase would serve as the how-to-guide of the proponents in order to deploy
the accreditation system from its current environment into the College of Informatics and
Computing Sciences Department. As such, presented in the Table 7 are the activities
relevant to this phase. In particular, those shaded with black are the recommended
phases for the activity at hand whereas the grey shade indicates that it would still be
possible to perform the activity, however, placing the activity in that particular phase may
imply risks.
42
Table 7.
Deployment Process Activities
43
Maintenance
anomaly and aimed at restoring normal operating conditions. In relation to this, presented
in Table 8 are the distinctive maintenance types which would be conducted by the
assigned proponent at a specific time interval. The indicated maintenance types within
the table would be carried out by the proponents following detection of an anomaly and
Table 8.
Maintenance Plan
Over time, the original environment (operating system, accreditation process and
rubrics, and external characteristics) for which the software was developed is likely to
change. In relation to this, the proponents included the adaptive maintenance in order to
44
On the other hand, as the software is used, the client/user will recognize additional
functions that will provide benefit. Relative to this, through Perfective maintenance it
would extend the software beyond its original function requirements. Lastly, computer
software could deteriorate due to change, and because of this, preventive maintenance,
often called software re-engineering, must be conducted to enable the software to serve
the needs of its end-users. In essence, Preventive maintenance would make changes to
computer programs so that they can be more easily corrected, adapted, and enhanced.
Only about 20% of all maintenance work would be spent "fixing mistakes". The
remaining 80% would be spent in adapting existing systems to changes in their external
Risk Management
identifying, analyzing and then responding to any risk that arises over the life cycle of a
project to help the project remain on track and meet its goal is crucial. Throughout the
management practice to ensure that the least number of surprises occur while the project
is underway.
While the future can never be predicted with certainty, a simple and streamlined
risk management process to predict the uncertainties in the projects and minimize the
45
occurrence or impact of these uncertainties could have a profound impact within the
whole project. Furthermore, this improves the chance of successful project completion
In relation to this, the proponents identified eight risks that could tremendously
RISK 001: Does not meet the level of demand for the project. If the
accreditation system’s level of quality is unacceptable, the project can suffer. It should be
emphasized that project quality should be valued as a key determinant of both customer
RISK 002: System Accuracy and Reliability. The use of web technologies to
deploy many classes of services through the Internet is becoming a de facto standard.
As such, system performance, accuracy and reliability remain key actors for the success
RISK 003: Project Schedule Delay. Delay throughout the project management
has a negative effect on project sponsor, stakeholders, and users in terms of growth in
been proven disastrous for many projects. Without user involvement, nobody within the
RISK 005: Poor Stakeholder Engagement. The behavioral patterns of, and
46
projects. Moreover, stakeholders may develop a lack of confidence in the project team,
either as a result of their concerns and opinions which have not been addressed or risks
RISK 006: Slow response time. Reducing server response time should be a
primary goal within the project management. Similarly, investing resources in creating a
website is a waste of time if it loads sluggishly and users would end up abandoning the
system. The first couple of seconds determine whether a customer stays on your page or
bounces to a competitor.
RISK 007: Data Leakage. The leakage of confidential user information, especially
with this kind of monitoring system, could tremendously harm the involved user as well
RISK 008: Unavailable / Dysfunctional Resources. Far too many projects fail
47
To further classify and elaborate the aforementioned risks, illustrated in Figure 30
is the Risk Matrix which would serve as the basis for risk analysis presented in Table 9.
Table 9.
Risk Analysis
Having identified and evaluated the risks, the next step involves the identification
of alternative appropriate actions for managing these risks and the specification and
implementation of treatment plans. Since identified risks may have varying impacts on
the organization, not all risks carry the prospect of loss or damage. As such, explained in
Table 10 are the risk treatments provided by the proponents for each risk.
48
Table 10.
Risk Treatment
RISK 002: System accuracy and Various Quality Assurance and testing processes would transpire
reliability to ensure that the proponents would deliver the best system for
accreditation or services for continuous quality improvement as
possible.
The proponents would involve the end-user within the early phases
RISK 004: Inadequate End-user of the project management to produce more accurate user
Involvement requirements thereby avoiding expensive and unnecessary
features as well as improved system acceptance. Also, they would
ensure successful system implementation.
49
However, throughout the risk treatments stated in Table 10, it is only necessary to
appoint a team member who can best monitor the risk trigger as well as drive the defined
immediate reporting of any changes and for driving the defined countermeasures.
Table 11.
Risk Ownership
ID RISK Owner
001 Does not meet the level of demand for the project Drendar Josh T. Dimasacat
002 System accuracy and reliability Drendar Josh T. Dimasacat
003 Project schedule delay Jem Krizelle L. Garing
004 Inadequate End-user Involvement Jem Krizelle L. Garing
005 Poor stakeholder engagement Jem Krizelle L. Garing
006 Slow response time Rod Andrew M. Dela Cruz
007 Confidential Data Leakage Rod Andrew M. Dela Cruz
008 Unavailable / Dysfunctional Resources Drendar Josh T. Dimasacat
50
APPENDIX A
information such as relevant dates, duration and the persons involved within the specific
task. Through this chart, delegating tasks to different members and aligning team
Moreover, the project management for this study consists of six phases namely
tools, and techniques to a broad range of activities in order to meet the objectives of this
particular project.
51
APPENDIX B
Summarized in Table 12 are the roles of the proponents throughout the study
whereas the structure for this team is identified as Domain Specialist. In relation to this,
the proponents worked effectively on the given project whereas each proponent is
Table 12.
Roles and Responsibilities
Based on the table above, Mr. Dela Cruz and Mr. Dimasacat were both responsible
for using the technical requirements provided by the client in translating the business
requirements into a technical solution. Likewise, they were also responsible for building
On the other hand, Ms. Garing was responsible for generating innovative ideas for
the content of the supporting documentation while also ensuring that the software solution
meets the business requirements and that it is free of bugs, errors and defects.
Throughout the test planning and preparation phases of the software testing, she
analyzed, reviewed and assessed the technical requirements and design specifications
52
with the help of Mr. Dela Cruz. They also developed test designs, cases, and procedure
system assessments. Also, with the radical departure from traditional development,
increased innovation was apparent as well as reduced defects since the proponents
shared overall responsibility for the outcomes. From the proponents’ standpoint, it was a
53
APPENDIX C
Presented in Table 13 is the budget cost management plan for the proposed
system.
Table 13.
Budget Cost Management Analysis
54
BIBLIOGRAPHY
https://doi.org/10.1109/CSCI46756.2018.00133
dictionary/accreditation-body
Aguilar-Alonso, I., Escobedo, F., Manco, M., & Amasifuen, M. (2020). Accreditation
Models and Digital Platforms Used for University Academic Programs in Peru.
https://doi.org/10.1109/ICACCCN51052.2020.9362887
Alhiyafi, J., & Abuaqel, I. (2018). An automated system for collection and analysis of
https://doi.org/10.1109/CSCI46756.2018.00133
https://www.ust.edu.ph/all-bs-engineering-programs-now-abet-accredited/
55
Association of Colleges of Pharmacy. https://www.aacp.org/research/
assessment- accreditation-management-system-aams.
/10.1109/ICACIT.2017.8358104
Chimhowu, A. O., Hulme, D., & Munro, L. T. (2019). The ‘New’ national development
https://www.smart-accredit.com/index.php
org/college-accreditation-explained-ednext-guide-how-it-works-whos-
responsible/
Course Objectives & Learning Outcomes | Course Design | Teaching Guides | Teaching
teaching-commons/teaching-guides/course-design/Pages/course-objectives-
learning-outcomes.aspx
Dumancas, G. A., & Prado, N. I. (2018). (PDF) Impact of Accreditation on the Quality of
56
Challenges. 2015 Asia Pacific Quality Network Conference & AGM. https://www.
researchgate.net/publication/327816022_Impact_of_Accreditation_on_the_Quali
ty_of_Academic_Programs_of_Central_Mindanao_University_Future_Directions
_and_Challenges
Fontana, L. B., & Oldekop, J. A. (2020). The sustainable development goals: The
bumpy road ahead. In World Development (Vol. 127). Elsevier Ltd. https://doi.
org/10.1016/j.worlddev.2019.104770
Forms and Guides from Philippine Accreditation Bureau (PAB) Philippines. (2018).
accreditation-bureau-pab-
Gao, X., & Wang, X. (2019). Information system of undergraduate training program for
404–408. https://doi.org/10.1109/ITME.2019.00097
Hashim, N. H., Supriyanto, E., Mohd Warid, M. N., & Md Khudzari, A. Z. (2018,
2018. https://doi.org/10.1109/INCAE.2018.8579373
Hegrenaes, C. (2020). Using Rubrics for Translation Assessment: The Case of the
Translatologia. http://www.translatologia.ukf.sk/2020/02/using-rubrics-for-
translation-assessment-the-case-of-the-national-translator-accreditation-exam-
57
in-norway/
Higher Ed – Eval Tools. (n.d.). MAKTEAM Software. Retrieved April 13, 2021, from
https://evaltools.com/higher-ed/
Hussain, W., Spady, W. G., Naqash, M. T., Khan, S. Z., Khawaja, B. A., & Conner, L.
(2020). ABET Accreditation during and after COVID19 - Navigating the Digital
3041736
and-evaluation/
Namoun, A., Taleb, A., & Benaida, M. (2018). Computer Science Journals | IJACSA.
http://www.ncbi.nlm.nih.gov/pubmed/32644665
Philippine Government Public Domain Forms All in One Location. (2018). https://www.
formsphilippines.com/
Development. https://ethics-accreditation.healthresearch.ph/
58
Rababaah, A. R., Al Maati, S. A., & Rabaa’i, A. A. (2017). Comprehensive guidelines for
151. https://doi.org/10.1504/ijtcs.2017.10007748
researchgate.net/publication/349521664_A_Systematic_Approach_of_Data_Pre
paration_for_ABET_Accreditation
Sabir, A., Abbasi, N. A., & Islam, M. N. (2018). An electronic data management and
05845
International Journal of Education and Research. Retrieved April 18, 2021, from
https://www.researchgate.net/publication/320919701_Measuring_Accreditation_
Experience_Impact_on_the_Quality_of_Education_of_Selected_ASAS_Member
-Schools_In_Luzon_and_the_NCR
605–622. https://doi.org/10.29333/iji.2019.12238a
Shanti, F. S., Ujir, H., Sapawi, R., & Fatma Hashim, H. (n.d.). ERIC - EJ1246431 -
59
Journal of Evaluation and Research in Education, 2020-Mar. International
Journal of Evaluation and Research in Education. Retrieved April 22, 2021, from
https://eric.ed.gov/?q=accreditation+system&ft=on&id=EJ1246431
/curriculum-committee/student-learning-outcomes-definition
upgraded-online-accreditation-system/
Vera, Y. P., & Pena, A. B. (2020, November 5). Experiences in the accreditation of the
https://doi.org/10.1109/ICACIT50253.2020.9277680
.2019.90286
60