ABSTRACT
In the digital age, a transformation of a traditional business to an electronic organization becomes widely general. One of the resolutions is an adopted information technology to design and develop software supporting the whole process of organizations. End users enable to access and use digital services anywhere and anytime. Covid-19 has directed us to face a dramatic death of human life. Social distancing is an announcement of avoiding and touching unknown people, including colleagues, lecturers, and students. In this article, we aim to propose the design and development of a digitally signed document system. The system can handle documents of university processes to advance online forms significantly. By providing the digitally signed document system, a documented strategy can integrate users (e.g., general employees, executives, directors, and lecturers) to send electronic documents with proportional high security. The digital signature of user identification can perform via user identification and verification protocols in many methods. The design and development of software models are approached using rapid application development (RAD). RAD is the most compatible with project factors. The software functionaries of the digitally signed document system are decomposed into components for improving software quality. The interface components deliver indicators of a friendly environment of green information technology as well.
- Sanjiv Augustine, Bob Payne, Fred Sencindiver, and Susan Woodcock. 2009. Agile project management: Steering from the edges. Commun. ACM 48, 12 (Decomber 2005), 85-89. https://doi.org/10.1145/1101779.1101781Google ScholarDigital Library
- Cockton Gilbert, and Gram Christian. 1996. Design principles for interactive software. Chapman & Hall. Suffolk, London.Google Scholar
- Darja Smite, Claes Wohlin, Tony Gorschek, and Robert Feldt, 2009. Empirical evidence in global software engineering: a systematic review. Empir. Softw. Eng. J. 15, 91-118. https://doi.org/10.1007/s10664-009-9123-yGoogle ScholarDigital Library
- Sera Whitelaw, Mamas A. Mamas, Eric Topol, and Harriette G. V. Spall. 2020. Applications of digital technology in COVID-19 pandemic planning and response. The Lancet Digital Health 2, 8, (June 2009), 435-440. https://doi.org/10.1016/S2589-7500(20)30142-4Google Scholar
- Gourab Saha. 2017. DSign digital signature system for paperless operation. In Proceedings of the 2017 International Conference on Communication and Signal Processing (ICCSP’17). IEEE, Piscataway, NJ, USA, 108-117. https://doi.org/10.1109/iccsp.2017.8286370Google ScholarCross Ref
- Iqtidar A. Shah, Sohail Amjed, and Nasser A. Alkathiri. 2019. The economics of paper consumption in offices. J. Bus. Econ. Manag. 20, 1 (January 2019), 43-62. https://doi.org/10.3846/jbem.2019.6809Google ScholarCross Ref
- Ibrahim Akman, and Alok Misha. 2015. Sector diversity in green information technology practices: technology acceptance model perspective. Comput. Hum. Behav. 49, (August 2015), 477-486. https://doi.org/10.1016/j.chb.2015.03.009Google ScholarDigital Library
- Ibrahim Akman, and Alok Mishra. 2015. Sector diversity in Green Information Technology practices: Technology Acceptance Model perspective. Comput. Hum. Behav. 49, C (august 2015), 477-486. https://doi.org/10.1016/j.chb.2015.03.009Google ScholarDigital Library
- Deepti Misha, Ibrahim Akman, and Alok Mishra. 2014. Theory of reasoned action application for green information technology acceptance. Comput. Hum. Behav 36, (July 2014), 29-40. https://doi.org/10.1016/j.chb.2014.03.030Google ScholarDigital Library
- Mason Stephen. 2018. Documents signed or executed with electronic signatures in English law. Comput. Law Secur. Rev 34, 4 (August 2018), 933-945. https://doi.org/10.1016/j.clsr.2018.05.023Google Scholar
- Ricky N. Dlamini, and Grant R. Howard. 2018. Investigating the antecedents to teaching green information technology (Green IT): A survey of student teachers in Swaziland. In Proceedings of the Annual Conference of the South African Institute of Computer Scientists and Information Technologists (SAICSIT’18). Association for Computing Machinery, New York, NY, USA, 108-117. https://doi.org/10.1145/3278681.3278695Google ScholarDigital Library
- Thomas Zefferer, and Thomas Knall. 2010. An electronic-signature based circular resolution database system. In Proceedings of the 2010 ACM Symposium on Applied Computing (SAC’10). Association for Computing Machinery, New York, NY, USA, 1840-1845. https://doi.org/10.1145/1774088.1774479Google ScholarDigital Library
- Martin, James. 1991. Rapid application development. Macmillan Publishing. Indianapolis, United States.Google Scholar
- Alan Howard. 2002. Rapid Application Development: Rough and Dirty or Value-for Money Engineering?. Commun. ACM 45, 10 (October 2002), 27-29. https://doi.org/10.1145/570907.570925Google ScholarDigital Library
- Ritu Agarwal, Jayesh Prasad, Mohan Tanniru, and John Lynch. 2000. Risks of rapid application development. Commun. ACM, 43, 11es (November 2000, 177-188. https://doi.org/10.1145/352515.352516Google ScholarDigital Library
- Paul Beynon-Davies, Chris Carne, Hugh Mackay, and Douglas Tudhope. 1999. Rapid application development (RAD): an empirical review. Eur. J. Inform. Syst. 8, 3 (September 1999), 211-223. https://doi.org/10.1057/palgrave.ejis.3000325Google ScholarDigital Library
- Vadim V. Zubov. 2019. An electronic signature within the digital economy. European Proceedings of Social and Behavioural Sciences, 79, 621-625. https://doi.org/10.15405/epsbs.2020.03.89Google Scholar
- Ibrahim Lasheen. (2018). Digital signature in E-Commerce security. Middle. East. J. Sci. Res., 1, (February 2018), 26-34.Google Scholar
- Meennapa Rukhiran, and Paniti Netinant. 2020. A practical model from multidimensional layering personal financial information framework to mobile software interface operations, Journal of ICT 19, 3 (July 2020), 321-349.Google Scholar
- Chunkit Kwong, Li F. Mu, Jiafu Tang, and Xinggang Luo. 2010. Optimization of software components selection for component-based software system development. Comput. Ind. Eng. 58, 4, 618-624. https://doi.org/10.1016/j.cie.2010.01.003Google ScholarDigital Library
- Emmanuel Okewu, and Olawande Daramola. 2015. Component-based software engineering approach to development of a university e-administration system. In Proceedings of the IEEE 6th International Conference on Adaptive Science & Technology (ICAST’15). IEEE, Piscataway, NJ, USA, 1-8. https://doi.org/10.1109/ICASTECH.2014.7068152Google Scholar
- Barbara R. Barricelli, Fabio Cassano, Daniela Fogli, and Antonio Piccinno. 2019. End-user development, end-user programming and end-user software engineering: A systematic mapping study. J. Syst. Softw., 149, (March 2019). https://doi.org/10.1016/j.jss.2018.11.041.Google ScholarCross Ref
Recommendations
Security analysis on digital signature function implemented in PDF software
FGIT'11: Proceedings of the Third international conference on Future Generation Information TechnologyRecently, electronic documents are deployed in many areas, thanks to their cost-efficiency and utility. However, trust concerns arise owing to the hardness of detecting document modification. To solve these concerns, many document processing software ...
Design of Security Mechanism for Electronic Document Repository System
ICHIT '08: Proceedings of the 2008 International Conference on Convergence and Hybrid Information TechnologyThe management and deposit of paper document costs are increased gradually. Specially, it is too expensive to safekeeping paper document in the warehouse. Also paper based document system is exposed in several security problems. Therefore, demands of ...
A Component-Based Groupware Development Methodology
EDOC '00: Proceedings of the 4th International conference on Enterprise Distributed Object ComputingSoftware development in general and groupware applications in particular can greatly benefit from the reusability and interoperability aspects associated with software components. Component-based software development enables the construction of software ...
Comments