Вы находитесь на странице: 1из 10

South East Asian Institute of Technology, Inc.

COLLEGE OF INFORMATION AND COMMUNICATION TECHNOLOGY


National Highway, Crossing Rubber, Tupi South Cotabato

THCRMS
TUBENG HEALTH CENTER RECORD MANAGEMENT SYSTEM

A Project Presented to the

Faculty of information Technology

South East Asian Institute of Technology

In Partial Fulfillment

Of the Requirements for the capstone project

By;

Christine Rose S. Alfonso


Christine Jadde D. Esperat
Donna Mae A. Marcelino
South East Asian Institute of Technology, Inc.
COLLEGE OF INFORMATION AND COMMUNICATION TECHNOLOGY
National Highway, Crossing Rubber, Tupi South Cotabato

APPROVAL SHEET

FIRST DEFENSE

The capstone project entitled Department of Tubeng Health Center Record


Management System (THCRMS) was prepared and submitted by Christine Rose S.
Alfonso, Christine Jadde D. Esperat, and Donna Mae A. Marcelino, in partial fulfillment of
the requirements for IT 400-Capstone has been approved and is recommended for
acceptance and approval of oral examination.

Rochelle P. Tamayo
Adviser

Approved by PANEL OF EXAMIINERS ON ORAL EXAMINATION with a grade


Of________
Date: _________

Reginald S. Prudente, MIT


CICT-DEAN
South East Asian Institute of Technology, Inc.
COLLEGE OF INFORMATION AND COMMUNICATION TECHNOLOGY
National Highway, Crossing Rubber, Tupi South Cotabato

Thesis Proposal
Name of Proponent

Alfonso, Christine Rose S.

Esperat, Christine Jadde D.

Marcelino, Donna Mae A.

1.0 Proposed Case Study Title

Department of Agriculture Record Keeping System (DARKS)

2.0 Area of Investigation

Tubeng Health Center


Tubeng Tupi South Cotabato
Cited Problems

1. Manually recording of patients important files and documents


2. It consumed time in terms of finding some papers in shelves.
3. Losing of files cause of lots of paper works. Some of it are misplaced
4. Time inconvenient cause of ddifficulty in retrieving files because of some paper
redundancy.
5. Difficulty in sorting of records from A-Z to Newest until oldest file.
South East Asian Institute of Technology, Inc.
COLLEGE OF INFORMATION AND COMMUNICATION TECHNOLOGY
National Highway, Crossing Rubber, Tupi South Cotabato

Method of Research

 Interview

Function of Proposed System

The researchers aim to develop and implement Tubeng Health Center Record
Management System that can provide accurate reliable process on every file keeping
especially in managing record.

Features of the Proposed System

Features include
 User-Friendly interface
 Automated system for easy transactions for finding and keeping of files.
 Easier and faster processing of documents.
 It secured data by placing files into database
 Can sort record from old to newest document.

Programming language, Database IDE to be used


 NetBeans
 MySQL
 Java

3.0 Objectives
1. To create automated File keeping system to secure file record.
2. To spend less time in searching and retrieving of files.
3. To easily check some old files and transact it easily.
4. To create backup files to the old documents that can’t be kept in shelf because of
termites.
5. To create a system that can securely keep record and retrieve it when it needed.
South East Asian Institute of Technology, Inc.
COLLEGE OF INFORMATION AND COMMUNICATION TECHNOLOGY
National Highway, Crossing Rubber, Tupi South Cotabato

4.0 Importance of the study

Employee
The researcher developed the Tubeng Health Center Record
Management System office work faster.

Personnel
The personnel will be easily done in their works because of the automated
file keeping

Researcher

This study can help the researcher by giving knowledge on how to


develop their skills as IT students.

Target Beneficiary
Tubeng Health Center Record Management System

Chapter II

REVIEW OF RELATED LITERATURE AND STUDIES


This chapter is about studies and literatures that are related to the online system that the
proponents made use of different reading materials (such as thesis, articles and other
web articles) that will help extending the knowledge of the proponents. This reading
materials will also guide the proponent to improve and develop their proposed system
more effectively.

Foreign Literature

Title: Records Management

Author: ataullah
South East Asian Institute of Technology, Inc.
COLLEGE OF INFORMATION AND COMMUNICATION TECHNOLOGY
National Highway, Crossing Rubber, Tupi South Cotabato

https://cs.uwaterloo.ca/~aataulla/papers/masters_thesis_ataullah.pdf

Storage of records has always been a fundamental objective of information

systems. However in the past decade managing sensitive information throughout its

lifecycle, from creation to destruction (or archival), has become of significant importance.

The increasing awareness of the impact of technology on privacy has added momentum

to the need to have better enforcement of records retention policies. Organizations today

not only have to comply with regulations, but also have to maintain a balance between

operational record keeping requirements, minimizing liability of storing private

information, and customer privacy preferences. This work will not attempt to define the

term “record” in the broad context. Instead the term will be treated in all its generality and

then applied to the world of relational databases. Without attempting to differentiate terms

such as data, knowledge, information and record, it is recommended that the reader

maintain a simple but consistent definition of a record throughout this thesis.

Foreign Studies

Title: AUTOMATED RECORD KEEPING SYSTEMS

Author: J. H. Smith et, al.

http://www.mtrules.org/gateway/ruleno.asp?RN=24.174.817
South East Asian Institute of Technology, Inc.
COLLEGE OF INFORMATION AND COMMUNICATION TECHNOLOGY
National Highway, Crossing Rubber, Tupi South Cotabato

(1) An automated system may be employed for the record keeping system, if the

following conditions have been met:

(a) The system shall have the capability of producing legible documents of all original

and refilled prescription information. During the course of an on-site inspection the

records must be accessible for viewing or printing.

(b) The individual pharmacist responsible for completeness and accuracy of the

entries to system must provide documentation of the fact that prescription information

entered into the computer is correct. In documenting this information, the pharmacy shall

have the option to either:

(i) Maintain a bound log book, or separate file, in which each individual pharmacist

involved in such dispensing shall sign a statement each day, attesting to the fact that the

prescription information entered into the computer that day has been reviewed and is

correct as shown. Such a book or file must be maintained at the pharmacy employing

such a system for a period of at least two years after the date of last dispensing; or

(ii) Provide a printout of each day's prescription information. That printout shall be

verified dated and signed by the individual pharmacist verifying that the information

indicated is correct and then sign this document in the same manner as signing a check

or legal document (e.g., J. H. Smith, or John H. Smith). Such printout must be maintained

at least two years from the date of last dispensing; or

(iii) Utilize a software system which requires a unique log in for each function such

that it can be easily and accurately determined who performed every function within the
South East Asian Institute of Technology, Inc.
COLLEGE OF INFORMATION AND COMMUNICATION TECHNOLOGY
National Highway, Crossing Rubber, Tupi South Cotabato

prescription dispensing process. The records must be readily accessible for viewing or

printing at the request of the board.

(c) An auxiliary recordkeeping system shall be established for the documentation of

refills if the automated system is inoperative for any reason. The auxiliary system shall

insure that all refills are authorized by the original prescription and that the maximum

number of refills is not exceeded. When this automated system is restored to operation,

the information regarding prescriptions filled and refilled during the inoperative period

shall be entered into the automated system within 96 hours. However, nothing in this

section shall preclude the pharmacist from using his professional judgment for the benefit

of a patient's health and safety.

(d) Any pharmacy using an automated system must comply with all applicable state

and federal laws and regulations.

Local Literature

Title: Class Search and Registration System

Author: danteliu

Year Published: May 2012

http://www.studymode.com/essays/Class-Search-And-Registration-System-

1002415.html?topic
South East Asian Institute of Technology, Inc.
COLLEGE OF INFORMATION AND COMMUNICATION TECHNOLOGY
National Highway, Crossing Rubber, Tupi South Cotabato

The purpose of this report is to explore and research the issues facing

students using the CSUEB online search and registration systems. We employed various

marketing research methodologies in order to effectively acquire and formulate our data.

These methodologies included constructing a research problem, research objectives and

associated research questions. Next a focus group was arranged taken from a random

sample of CSUEB business students. Information from the focus group was used

alongside the aforementioned marketing research methodologies in order to create and

compose a survey which was sent out to the entire college of business in order to gain a

much more in depth understanding of our research problem. The client therefore wanted

to know what specific problems the students while using the system as well as their

recommendations, suggestions and solutions to these issues.

Local Studies

Title: Securing Information Systems

Author: krissybriggs

Year Published: May 2011


South East Asian Institute of Technology, Inc.
COLLEGE OF INFORMATION AND COMMUNICATION TECHNOLOGY
National Highway, Crossing Rubber, Tupi South Cotabato

When firms develop more technologically oriented, they must become more

conscious of security and control issues close to their information systems and safeguard

the resources more strictly than ever before. As our civilization and the domain it comes

to be contingent on computers and information systems more and more, firms must put

out a better determination in making their systems not vulnerable and more reliable.

Software is a relatively new industry, less than fifty years old, and it has spent much of

that time trying to figure out how to create reliable software applications with minimum

errors.(Stickyminds.com) While much wonderful work has been done in a relatively short

time, software remains the weakest link in our advanced technological society.

(Stickyminds.com)

Imagine what would happen if you were to link to the Internet that didn’t have a

firewall or antivirus software. What do you think would be the outcome? To answer that

question your computer would become disabled in a matter of seconds, and can take as

long as a few days to recover (Laudon & Laudon 2010). In Chapter 8 it discussed why

systems today are vulnerable. When enormous amounts of data are stored in electronic

form, they become more vulnerable to different kinds of pressures than when they were

existed in manual form. Information systems are vulnerable to technical, organizational,

and environmental threats from internal and external sources. The weakest link in the

chain is deprived system management. If managers at all levels don't make security and

reliability their number one priority, then the threats to an information system can easily

become real.

Вам также может понравиться