Professional Documents
Culture Documents
IP Network Security Personnel Law Enforcement Officer: The Problem and Its Background
IP Network Security Personnel Law Enforcement Officer: The Problem and Its Background
INTRODUCTION
they can monitor activity as it takes place. These cameras may include
features like pan, tilt, and zoom; may be placed in outdoor or indoor
locations; and may include infrared recording options. Most cameras are
digital recorder is the preferred option for easy storage, easy recall, and
launch of V-2 rockets. The noted German engineer Walter Bruch was
Experiments in the UK during the 1970s and 1980s led to several larger
4
These were deemed successful in the government report and paved
systems installed. Today, systems cover most town and city centers, and
modern launch sites to record the flight of the rockets, in order to find the
most effective devices that can be used for monitoring the behavior
in surreptitious manner.
the students as well its’ personnel. The schools are the place where
students should feel safe from harm, outside stimulus, and other threats.
Sadly to say, in the past few years, there are some instances where
schools are not the safe haven we thought they were, take for instance
professors was gun shot at the head inside the campus by one of the
situation, the researcher come up with an idea that could improve the
security system not only for schools and universities but for all the
4
thermal scanner and an X-ray in the security system (for future
expansion).
digital hard drive storage system. Output can be seen on a monitor that
4
BACKGROUND OF THE STUDY
not go away by itself. School children are harming each other with
their studies and not make them worry about outside violence. These
especially true since security control centre personnel are also required to
Over the past decade, the security of individuals and property, and
the security of information have become major global issues. Faced with
and the rapid development of cyber crime, our societies are increasingly
4
Among the solutions proposed, video surveillance is one of the
so that the best possible view can be achieved in relation to what the
camera's primary focus should be. Schools can feature multiple entrances
or exits and may span multiple buildings. It can soon become hard to
keep track of where potential security risks may occur at any given time.
4
configuration. Also avoided is the cost of trying to bring all cameras
Video Quality and Video Frame Rates Schools can become very
Cameras need both high video quality and a reasonable video frame rate
for this to occur. This was once difficult due to cost and bandwidth
limitations.
important to focus on areas that are of key importance. These are the key
security risk areas that should be monitored at all times without changing
and faculty can focus on education without the worry of feeling unsafe or
unprotected.
4
OBJECTIVES
particular place.
This study can address possible actions with regards to the problem
and to understand that video technology has benefits but at the same time
4
CONCEPTUAL FRAMEWORK
Installation of
Immediate
Video
response to a
Surveillance
possible/ actual
Equipment
incident
Analysis after
Observation
Video an incident
through Evidentiary
Surveillance
surveillance analysis after
equipment
an incident
equipment
Survey Conducive
computation of
4
The input of the study consisted of the typical Video Surveillance
Equipment like Video Cameras, Monitor and a trap. This study also
incident, conducive place for teaching and learning process and the
4
STATEMENT OF THE PROBLEM
1. What are the specific security threats and concerns of the school
2. How will it help address those threats and how will the school
4
SCOPE AND DELIMITATION OF THE STUDY
and leading edge video analytic techniques applicable to it, its needs, the
developments and trends in this field, the issues it raises, and the supply
this study.
4
SIGNIFICANCE OF THE STUDY
Students
This analysis/ research will help the students to feel safe inside the
what could possibly happen to them while they are in the school vicinity.
With the help of this study the security of the students inside the
recordings provide.
surveillance security system will help the school officials to find the
lessen or decrease the property damages such as vandalism and theft; far
too often the administration can only react to vandalism with time-
perpetrators.
4
Researcher
presentable manner they can. This study can be effective tool for
4
DEFINITION OF TERMS
government organizations.
tries to break in
Internet Protocol.
computers.
criminal damage.
4
embezzlement, larceny, looting, robbery, shoplifting, fraud and
format to a disk drive, USB flash drive, SD memory card or other mass
storage device. The term includes set-top boxes with recording facility,
camcorders that record onto memory cards) and software for personal
computers which enables video capture and playback to and from disk.
objects and their largest use is to take images of the inside of objects in
HYPOTHESIS
4
1. There is no significant difference between the Security Personnel
CHAPTER II
Foreign Studies
1986, on a single square mile industrial estate outside the English town of
King's Lynn. Three CCTV video surveillance cameras were used and
their impact was immediate. In the years before the cameras were
estate. In the two years following the installation, there were no crimes
reported. Subsequently, cities and towns across Great Britain began using
4
In 1995, the national government made available up to $3.1 million
a major reason for declining crime rates: in the small town of Berwick
Program
EXECUTIVE SUMMARY
few are closely examining the costs and benefits of those investments, or
creating mechanisms for measuring those costs and benefits over time.
4
over many years—and that research strongly indicates that video
the UK, where surveillance cameras are pervasive. Those studies, which
have been commissioned by the British Home Office, have found varying
the best studies combine results from multiple camera sites in a meta-
conducted for the British Home Office show that video surveillance has
4
few are closely examining the costs and benefits of those investments, or
creating mechanisms for measuring those costs and benefits over time.
complex, because there are always innumerable factors that can explain a
reported crime in an area under surveillance does not take into account
general trends in crime and crime reporting, additional police in the areas
4
under surveillance, better lighting, and perhaps most importantly, the
cameras, and decrease in the area being directly monitored, then the
particular block in fact pushed the muggings into surrounding areas, and
show.
such as parking lots tend to produce better outcomes than outdoor areas.
4
might accomplish the positive outcome on its own. Studies vary on the
this reason, the UK Home Office has adopted the meta-analysis as the
SYSTEMS
has been analyzed in a wide range of studies over the last decade. The
more than any other country has embraced the widespread use of
to 40,000 in 2002,2 and now stands above 4.2 million, or one for every
4
The British Home Office, the agency in charge of security, spent
analysis combines the results of multiple studies that all have similar
usually in parking lots, and for certain types of crimes, usually vehicle
4
and the USA) for a meta-analysis, and found that, taken together, the
the remaining studies showed a null effect. Welsh and Farrington then
ratio for each study and then combining these ratios. An odds-ratio is a
1 shows that the areas with cameras are experiencing less crime than the
control areas. An odds-ratio of less than 1 show that the areas with
included in the meta-analysis, they found that the average was just over
1, showing a very small impact on crime, and when measured against the
The areas with cameras did not perform better than the areas without.
were the only intervention used (no added police presence, increased
crime in the other.9 Five of the eleven studies that showed reductions in
4
crime looked at camera systems located in enclosed parking lots. These
preventative measures.
Home Office in 2005,10 which found, again through the use of meta-
analysis, that the cameras had “no overall effect” on crime rates.
failing to meet the crime statistics recording criteria). This site showed a
ratio of 1.38, or just under 40%—and was also the most expensive site, at
a cost of over £3 million (about $6 million) for the camera system. This
once the video surveillance system was fully installed and thus may not
4
the study did show overall better outcomes for vehicle crimes in seven of
the sites. Violent crimes were different. In the four urban city centers
Gill and Spriggs hypothesize that these crimes may be impulsive and
crime did not change significantly from before the cameras were installed
IMPACT
2004 follow-up.17
4
The American studies that met the criteria for the meta-analysis
undesirable or null effect on crime. Welsh and Farrington point out a few
key differences between the UK and US systems that might explain this.
that the surveillance sites in the US lack the confounding elements of the
and show that cameras on their own have virtually no impact on crime.18
4
In March 2008, they published preliminary findings.20 Looking at
King's group found a 22% decline in property crime occurring within 100
and 500 feet from the cameras. This would seem to suggest that the
significant change in the level of crime anywhere in the 500 foot range
in homicide was observed within 250 feet of the cameras, however this
between 250 and 500 feet from the cameras, suggesting displacement.
500-1000 feet away from the cameras, and thus, based on information
available from the San Francisco Police Department, out of the range of
inconclusive.
4
Notably when the preliminary findings of the UC Berkeley study
citizens, and were thus justified.21 The city has so far spent $900,000 on
USC Study
impact on crime.
Jordan Downs Public Housing Project in Watts. The study notes that,
Angeles have not been analyzed by the city or some other official body to
determine their efficacy. This may be because while San Francisco has
many of LA's cameras, including the clusters that the USC group
for example, the cameras were donated to the city by the film industry) or
4
federal grants through the US Department of Homeland Security's Grant
cameras “in real time,” vs. a decision by the San Francisco City Council
post installation crime rates, as well as arrest records, the study found no
both areas, but that reduction was offset by an overall crime reduction in
Housing Project, the group hypothesized that the cameras may have
surrounding areas, since the housing project was the site of a gang war
during the period of the study). The group was not able to find
Local Literature
The Philippines is known as the Pearl of the Orient, with its exotic
and tropical islands, rare and valuable natural resources, stunning natural
wonders, warm and hospitable people, and rising national status in the
world. But with all these raves, the country is not exempt from the terrors
of the rest of the world. Despite its beauty, the country is also in danger
4
and Information Technology industries are also booming and the
country is not bereft of crimes, in the cities, suburbs, and rural areas. The
fact is that this is the harsh reality that goes hand in hand with the
But the good side to this is that we are not left helpless to these
your country, and your future. Philippine Security brings you the latest
and most reliable storage and security system technologies that can take
Security offers the complete set of security solutions that can meet the
schools and campuses. Our line-up of products and solutions include the
4
CHAPTER 3
RESEARCH METHODOLOGY
RESEARCH DESIGN
This study will use the descriptive method of the survey type of
research which describe and interpret data and characteristics about the
the descriptive method is something more and beyond just data gathering.
He believes that the discussions of those data are carried up to the level
reasoning.
4
In this regard, Pagoso emphasized that purposive sampling was
based on certain criteria laid down by the research such that the
respondents within the population have meaning for the data that will be
gathered.
EARIST, Manila.
RESEARCH INSTRUMENT
instrument for this study. The questionnaire was divided into two main
sections: a personal data sheet or the profile and the survey proper. The
system. The questions were structure using the Likert format. In this
survey type, five choices are provided for every question or statement. The
given question.
4
DATA GATHERING PROCEDURE
and with the aid of computer to determine the precise interpretation of the
results. Matrix tables were made to organize, summarize, and analyze the
data gathered for easy determination of its difference from each other.
1. Percentage
4
To describe the profile of the respondents, the percentage
Formula:
P = F/N x 100
where:
P = Percentage (%)
F = Frequency
follows:
WM
X = ∑----------
4
N
where:
X = weighted mean
w = weighted factor
Σ = summation
x = score
Where:
X2 = Chi – Square
a cell
5. Rank Method
4
Rank consists of arranging number of decreasing or
class with the greater number was given the highest rank.
CHAPTER IV
DEMOGRAPHIC PROFILE
For the profile of the respondents, the questionnaire asked for the
System. Below are the tables summarizing the gathered values for each
profile category:
TABLE 1
4
followed by the age bracket of 21 years old and below with the
of 26 – 30 years old.
TABLE 2
data in the table, majority of the respondents are male with the frequency
TABLE 3
4
Surveillance System
Advance 5 10%
Moderate 32 64%
Knowledgeable 11 22%
New 2 4%
TOTAL 50 100%
SURVEY ANALYSIS
4
(U)
Disagree
2 1.6 – 2.5
(D)
Strongly Disagree
1 1.0 – 1.5
(SD)
Where:
X2 = Chi – Square
cell
SURVEY RESULTS
TABLE 4
4
Specific security threats and concerns of the school attempting to
video surveillance
d. EARIST Security Office doesn’t fit the
System
d. Security threats are not address properly 3.44 U 2
3.56
Total A
8
letter A got the highest rank among the five problems with the weighted
TABLE 5
Video Surveillance System will ease threats and will help the school on a
day-to-day basis
4
a. EARIST Security Personnel cannot actually
premises.
b. A routine check to all students and visitors
3.9 A 4
going in and out of the institute
c. A routine check on all vehicles going in and
3.88 A 3
out of the Institute
d. A real time monitoring of all the Students
3.88 A 2
and visitors of the School
e. A real time recording of what is happening
3.94 A 5
beyond the scope of the surveillance camera
3.87
Total A
6
real time recording of what is happening beyond the scope of the video
check to all students and visitors going in and out of the institute was
ranked fourth with the weighted mean of 3.9. Ranked third and second
has an equal weighted mean of 3.88 and 3.78 of the weighted mean also
TABLE 6
4
a. Student database will be used in monitoring
3.88 A 4
the students
b. A faculty and employees database will be
3.98 A 5
used in monitoring faculty and employees
c. A print out will produce for manual
3.76 A 2
checking
d. An automatic logging system will be
3.82 A 3
adopted
e. On the spot data report can be easily
3.5 U 1
produce.
3.78
Total A
8
how does the school management accept and interpret produce by the
system. Based on the table, letter (b) got the highest rank followed by
letter (a) with the weighted mean of 3.88, the third ranked has a weighted
mean of 3.82. Letter (d) got the second rank with the computed weighted
mean of 3.76 while the calculated weighted mean for the first ranked is
TABLE 7
system
c. Comments and suggestions will be properly 3.96 A 5
4
entertained
d. A survey on the entire students will be
3.9 A 2
conducted to get their pulse
e. A computational analysis will be conducted
3.82 A 1
to determine the acceptability of the system
Total 3.904 A
agree that comments and suggestions will be properly entertained for the
of 3.9 also AGREE that a survey on the entire students will be conducted
to get their pulse; Moreover, 3.82 of the computed weighted mean agree
4
CHI-SQUARE DISTRIBUTION
The tables below are the distribution of the data gathered from the
- E)2/E under its Verbal Interpretation. (5) Strongly Agree; (4) Agree; (3)
4
Note, that if the computed chi-square value is greater than the
4
TABLE 7
Specific security threats and concerns of the school attempting to address by using a video surveillance system
5 4 3 2 1 (O-E)^2/E
O E chi O E chi O E chi O E chi O E chi Total
a 11 7.2 2.006 27 21 1.714 11 15.8 1.458 1 5 3.2 0 1 1 9.378
b 4 7.2 1.422 21 21 0.000 16 15.8 0.003 9 5 3.2 0 1 1 5.625
c 5 7.2 0.672 23 21 0.190 15 15.8 0.041 6 5 0.2 1 1 0 1.103
d 6 7.2 0.200 19 21 0.190 21 15.8 1.711 4 5 0.2 0 1 1 3.302
e 10 7.2 1.089 15 21 1.714 16 15.8 0.003 5 5 0 4 1 9 11.806
Total 31.214
4
From the table we can see that:
= 9.378+5.625+1.103+3.302+11.806 = 31.214
Our null, for the chi-square test, states that there are no differences
observed and expected frequencies As usual we will set our alpha level at
.05.
= 31.214
4
4
TABLE 8
Video Surveillance will ease the threats and help the school on the day-to-day basis
5 4 3 2 1 (O-E)^2/E
O E chi O E chi O E chi O E chi O E chi chi
a 10 10.2 0.004 24 27.2 0.376 12 9.6 0.6 3 2.2 0.2909 1 0.8 0.05 1.321
b 10 10.2 0.004 29 27.2 0.119 8 9.6 0.2667 2 2.2 0.0182 1 0.8 0.05 0.458
c 11 10.2 0.063 26 27.2 0.053 10 9.6 0.0167 2 2.2 0.0182 1 0.8 0.05 0.201
d 11 10.2 0.063 27 27.2 0.001 8 9.6 0.2667 3 2.2 0.2909 1 0.8 0.05 0.672
e 9 10.2 0.141 30 27.2 0.288 10 9.6 0.0167 1 2.2 0.6545 0 0.8 0.8 1.901
Total 4.552
4
From the table we can see that:
= 1.321+0.458+0.201+0.672+1.901 = 4.552
Our null, for the chi-square test, states that there are no differences
observed and expected frequencies As usual we will set our alpha level at
.05.
= 4.552
4
4
TABLE 9
5 4 3 2 1 (O-E)^2/E
O E O E O E O E O E chi
a 13 9.4 1.379 20 23.6 0.5492 15 14.6 0.011 2 1.8 0.0222 0 0.6 0.6 2.561
b 11 9.4 0.272 27 23.6 0.4898 12 14.6 0.463 0 1.8 1.8 0 0.6 0.6 3.625
c 9 9.4 0.017 21 23.6 0.2864 19 14.6 1.326 1 1.8 0.3556 0 0.6 0.6 2.585
d 7 9.4 0.613 30 23.6 1.7356 10 14.6 1.4493 3 1.8 0.8 0 0.6 0.6 5.198
e 7 9.4 0.613 20 23.6 0.5492 17 14.6 0.3945 3 1.8 0.8 3 0.6 9.6 11.956
Total 25.925
4
From the table we can see that:
= 2.561+3.625+2.585+5.198+11.956= 25.925
Our null, for the chi-square test, states that there are no differences
observed and expected frequencies As usual we will set our alpha level at
.05.
= 25.925
4
4
TABLE 10
5 4 3 2 1 (O-E)^2/E
O E O E O E O E O E chi
a 11 12 0.083 26 24.2 0.134 11 11.2 0.004 2 2.2 0.018 0 0.4 0.4 0.639
b 11 12 0.083 27 24.2 0.324 9 11.2 0.432 3 2.2 0.291 0 0.4 0.4 1.530
c 11 12 0.083 28 24.2 0.597 9 11.2 0.432 2 2.2 0.018 0 0.4 0.4 1.530
d 14 12 0.333 21 24.2 0.423 12 11.2 0.057 2 2.2 0.018 1 0.4 0.9 1.732
e 13 12 0.083 19 24.2 1.117 15 11.2 1.289 2 2.2 0.018 1 0.4 0.9 3.408
Total 8.840
4
From the table we can see that:
= 0.639+1.530+1.530+1.732+3.408= 8.840
Our null, for the chi-square test, states that there are no differences
observed and expected frequencies As usual we will set our alpha level at
.05.
= 8.840
4
4
CHAPTER V
SUMMARY
system.
How will it help address those threats and how will the school
4
The descriptive method of the survey type of research was used in
out of (50) fifty respondents, (32) thirty-two of them are male while the
To analyze and interpret the data, the study utilized the following
the respondents are male and 36 percent are females. Most of the
4
4
Below is the table summarizing the results of the survey responses given by the selected respondents:
TABLE A
4
Based on my computation using chi square, it is evident that letter (e) on table A shows the highest rank and clearly visible that security
threats are not address properly, while using the weighted mean computation, letter (a) on the said table shows the highest rank that EARIST
TABLE B
4
As gleaned in the table, the respondents gave almost the same highest rank for letter (e) using the computation for weighted
mean and chi-square. It can be noted that a real time recording of what is happening beyond the scope of the surveillance camera will ease
TABLE C
4
Looking at the table, it can be seen that letter (b) is considered the highest ranked in computing the weighted mean, it reveals that a
faculty and employees database will be used in monitoring faculty and employees. The same table also reveals that on the spot data can be
TABLE D
4
Based on the weighted mean computation, letter (c) got the highest rank with the average of 3.96; it was worth noting that comments
and suggestions should be properly entertained in the acceptance of the video surveillance system. While on the chi-square computation
letter (e) was ranked first that in determining acceptability of the system, a computational analysis will be conducted.
4
CONCLUSION
4
RECOMMENDATION
means that have been considered and the reason why they are not
destruction of property.
They should also conduct an assessment into the effects that the
surveillance system will have on personal privacy and the ways in which
such adverse effects may be mitigated. They should consult openly with
4
acceptability to the school community. Consultation should provide
cameras on school property, should the project proceed and they should
ensure that the proposed design and operation of the video surveillance
4
BIBLIOGRAPHY
Internet
www.yahoo.com
www.google.com
www.wikipedia.com
http://www.qualityadvisor.com/sqc/formulas/chi_square_f.php
http://www.mnstate.edu/wasson/ed602quiz14.htm
4
APPENDICES
SURVEY QUESTIONNAIRE
Age:
21 years old and below
21-25 years old
26-30 years old
31-35 years old
35years old and above
Part 2: Check the appropriate box, which you believe applicable to the given
variables.
LEGEND
4
A. Specific security threats and concerns of the school attempting to
address by using a video surveillance system
5 4 3 2 1
a. EARIST Security Personnel has less
security gadgets
b. Most of the EARIST Security Personnel
doesn’t know how to use a security
camera
c. Most EARIST Security personnel
doesn’t know how to install and operate
video surveillance.
d. EARIST Security Office doesn’t fit the
installation area of the Video
Surveillance System
e. Security threats are not address properly
B. Video Surveillance System will ease threats and will help the school on
a day-to-day basis.
5 4 3 2 1
a. EARIST Security Personnel cannot
actually determine threats inside or
outside school premises.
b. A routine check to all students and
visitors going in and out of the institute
c. A routine check on all vehicles going in
and out of the Institute
d. A real time monitoring of all the
Students and visitors of the School
e. A real time recording of what is
happening beyond the scope of the
surveillance camera
4
C. Accepting and interpreting of data produce by the system
5 4 3 2 1
a. Student database will be used in
monitoring the students
b. A faculty and employees database will
be used in monitoring faculty and
employees
c. A print out will produce for manual
checking
d. An automatic logging system will be
adopted
e. On the spot data report can be easily
produce.
Alpha value =
Alpha value = 1%
5%
DF Value DF Value
1 3.84 1 6.63
2 5.99 2 9.21
3 7.82 3 11.3
4 9.49 4 13.3
5 11.1 5 15.1
6 12.6 6 16.8
7 14.1 7 18.5
8 15.5 8 20.1
9 16.9 9 23.2
10 18.3 10 24.7
11 19.7 11 26.2
12 21 12 27.7
13 22.4 13 29.1
14 23.7 14 30.6
15 25 15 30.6
16 26.3 16 32
17 27.6 17 33.4
18 28.9 18 34.8
19 30.1 19 36.2
20 31.4 20 37.6
21 32.7 21 38.9
22 33.9 22 40.3
23 35.2 23 41.6
24 36.4 24 43
25 37.7 25 44.3
26 38.9 26 45.6
27 40.1 27 47
28 41.3 28 48.3
29 42.6 29 49.6
30 43.8 30 50.9
CURRICULUM VITAE
PERSONAL DATA
Name : Anna Marie Magallanes Lucero
Date of birth : February17, 1990
Place of birth : San Juan City
Address : 4929 r-32 Pina St. Old Sta. Mesa, Manila
Age : 20
Height : 4’11
Weight : 49 kilos
Nationality : Filipino
Civil Status : Single
Religion : Roman Catholic
Fathers Name : Federico L. Lucero
Mothers Name : Dolores M. Lucero
EDUCATIONAL BACKGROUND
COLLEGE
Eulogio “Amang” Rodriguez Institute of Science and Technology
Computer Engineering
2006 – Present
SECONDARY
Bagong Silangan High School
2002-2006
ELEMENTARY
San Juan Elementary School
1996-2002