CHAPTER 1 THE PROBLEM AND ITS BACKGROUND

INTRODUCTION

Surveillance Camera are video cameras used for the purposed of observing an area. They are often connected to a recording device, IP network, and/or watched by a security personnel/law enforcement officer. Video Surveillance Systems consist of cameras placed in areas where they can monitor activity as it takes place. These cameras may include features like pan, tilt, and zoom; may be placed in outdoor or indoor locations; and may include infrared recording options. Most cameras are used with recording systems, either VCR's or digital recorders. Using a digital recorder is the preferred option for easy storage, easy recall, and easy viewing over different monitors. The first Video Surveillance System was installed by Siemens AG at Test Stand VII in Peenemunde, Germany in 1942, for observing the launch of V-2 rockets. The noted German engineer Walter Bruch was responsible for the design and installation of the system. Outside government special facilities, Video Surveillance was developed initially as a means of increasing security in banks. Experiments in the UK during the 1970s and 1980s led to several larger trial programs later that decade.

4

These were deemed successful in the government report and paved the way for a massive increase in the number of Video Surveillance systems installed. Today, systems cover most town and city centers, and many stations, car-parks and estates. Video Surveillance recording systems are still often used at modern launch sites to record the flight of the rockets, in order to find the possible causes of malfunctions. Video Surveillance System is one of the most effective devices that can be used for monitoring the behavior activities or other changing information, usually of the people and often in surreptitious manner. In our school, it is important to increased safety and security for the students as well its’ personnel. The schools are the place where students should feel safe from harm, outside stimulus, and other threats. Sadly to say, in the past few years, there are some instances where schools are not the safe haven we thought they were, take for instance what happened at Philippine Maritime Institute (PMI), where one of the professors was gun shot at the head inside the campus by one of the students. If only the management of the school strengthen its security system, none of this would happen. Base on the above mentioned situation, the researcher come up with an idea that could improve the security system not only for schools and universities but for all the entities and establishment in the Philippines. That is: The incorporation of a surveillance camera to its security system. One of the features of this research is that, an embedded system is incorporated by integrating a

4

thermal scanner and an X-ray in the security system (for future expansion). One of the most popular Surveillance tools for Schools is the Secure View System. The system transmits images from cameras to a digital hard drive storage system. Output can be seen on a monitor that displays four frames of video or on desktop computer monitors, which are networked to receive video feeds from the cameras.

4

The problem of students bringing weapons to school is an issue that will not go away by itself. issuance of badges/keys/permits. view and archive. These installations represent a huge amount of video to transmit. and despair. Over the past decade.BACKGROUND OF THE STUDY Student behavior is a problem that cannot be regarded as trivial. etc. Installing video surveillance system will help students focus on their studies and not make them worry about outside violence. crime. Information and communications technologies in particular provide new and sophisticated solutions for physical and IT security. such as access control. 4 . making it impossible for a human monitor to analyze all of these video recordings in order to detect suspicious behavior or events. Faced with problems such as the fight against terrorism. This is especially true since security control centre personnel are also required to manage other tasks. our societies are increasingly investing in protection. handling emergency calls. This sector therefore offers great opportunities for businesses. enhanced national security and the rapid development of cyber crime. radio communications control. the security of individuals and property. and the security of information have become major global issues. School children are harming each other with regularity. both with respect to technological development and services. The problems are particularly acute and are complicated by their connection to the prevalence of poverty. following up on fire alarms.

It can soon become hard to keep track of where potential security risks may occur at any given time. by video analytic. It can be repositioned which may result in the camera looking in the wrong direction at the wrong time.Among the solutions proposed. Sometimes integrating hundreds of cameras. One of the many benefits of video surveillance technology is the ability for centralized management. it is undergoing a digital revolution with the ongoing transition to videos on IP networks. To resolve this issue. so that the best possible view can be achieved in relation to what the camera's primary focus should be. can process the information by software analysis in order to keep only the data relevant to security. these new systems create a huge amount of video information that cannot be processed only by security agent screen surveillance. video surveillance is one of the oldest and most widespread security technologies. Video Surveillance should be place at dedicated viewing areas such as entrances. Although still mostly analogical. Schools can feature multiple entrances or exits and may span multiple buildings. A school campus may include a single building at one location up to hundreds of buildings spanning multiple locations. It is important to note that all video surveillance will remain in a fixed position thus providing a dedicated view of what is most important. hallways. intelligent video surveillance. stairwells or even classroom environments. No longer is surveillance limited to a building by building 4 . Video Surveillance cameras should only be used in school campus environments as a secondary means of security.

It is important that video quality be at a level high enough so that identification of persons can be made easily. Also avoided is the cost of trying to bring all cameras video feeds to a centralized location.configuration. These are the key security risk areas that should be monitored at all times without changing camera position. This was once difficult due to cost and bandwidth limitations. It is also important that video surveillance cameras used in these areas are of high quality so that proper identification can be made easily. Cameras need both high video quality and a reasonable video frame rate for this to occur. a safe and secure environment can be created where students and faculty can focus on education without the worry of feeling unsafe or unprotected. Video Quality and Video Frame Rates Schools can become very busy places rather quickly. With the added benefits of video surveillance including centralized management capabilities and high resolution capable cameras. With video surveillance applications over school campuses it is important to focus on areas that are of key importance. 4 .

This study can address possible actions with regards to the problem and to understand that video technology has benefits but at the same time can have an effect on the privacy of individuals. 4 .OBJECTIVES The purpose of this study is to achieve a general understanding of the technology implicated in using Video Surveillance System in School. This study identifies the security threats and concerns of a particular place.

INPUT PROCESS Installation of Video Surveillance Equipment Observation Video Surveillance equipment Survey Questionnaire through surveillance equipment Distribution and retrieval of the survey questionnaire Analysis and computation of data gathered Immediate response to a possible/ actual incident Analysis after an incident Evidentiary analysis after an incident Conducive place for teaching and learning process.CONCEPTUAL FRAMEWORK The research paradigm that guided this study is shown in Figure. Assessment of the survey’s outcome OUPUT 4 . It follows the Input-Process-Output approach.

conducive place for teaching and learning process and the assessment/evaluation on the survey’s outcome. the distribution and retrieval of Survey Questionnaires then the analysis and computation of all the data gathered. evidentiary analysis after an incident. an observation through the Video Surveillance Equipment. The process composed of Installation of Video Surveillance Equipment. Monitor and a trap. analysis after an incident. This study also consists of a Survey Questionnaires. 4 .The input of the study consisted of the typical Video Surveillance Equipment like Video Cameras. The output consisted of the immediate response to a possible / actual incident.

How will it help address those threats and how will the school actually use it on a day-to-day basis. Is there a significant difference between the security personnel officer and the video surveillance system? 4 .STATEMENT OF THE PROBLEM This study aims to evaluate how video surveillance system helps to secure the school. 2. How does the school management accept and interpret data produce by the system? 4. it sought answer the following questions: 1. Specifically. How does the student accept the new system if implemented? 5. What are the specific security threats and concerns of the school attempting to address by using a video surveillance system. 3.

4 . and leading edge video analytic techniques applicable to it.SCOPE AND DELIMITATION OF THE STUDY This study focused on the security system of the individuals in schools by having a defense security system using video surveillance. explanations or reasons for these needs were not concerns of this study. the developments and trends in this field. This study. Furthermore it only attempted to identify the needs of the group concerned. and the supply and demand it generates. but more specifically in schools. It contains information on video surveillance technology. its needs. the issues it raises. intended for a non-expert audience. discusses the ins and outs of this technology and tries to characterize the market it represents. its application. not for different places.

seldom successful and often fruitless attempts to identify the perpetrators.SIGNIFICANCE OF THE STUDY Students This analysis/ research will help the students to feel safe inside the school. It will maintain the peace of mind of the School administrators or staff inside the school campus. School will easily secure the safety of the students enrolled. 4 . they can concentrate/focus on their studies without bothering on what could possibly happen to them while they are in the school vicinity. With the help of this study the security of the students inside the campus will be intensively monitored by the use of the security system installed within the school campus. it will become a peaceful. far too often the administration can only react to vandalism with timeconsuming. School Administrators / Universities When school campuses provide a video surveillance system for their security. conducive and friendly school environment. This system will also use to lessen or decrease the property damages such as vandalism and theft. Another thing is video surveillance security system will help the school officials to find the performance evaluation of their employee. Students may be less inclined to cause trouble because of the solid documentation that the video recordings provide.

they are able to obtain the necessary information on time and reporting it in the most presentable manner they can. This study can be effective tool for reference to know how to make the schools safer. strategic planning and patience. practicality. time management. 4 . Hence.Researcher This study serves as a major part of the course requirement as it has developed their skills in terms of self-esteem.

Law Enforcement Officer .a system that enforces boundaries between computer networks.DEFINITION OF TERMS To understand and clarify the terms used in the study. 4 . Vandalism . such as burglary.a device that displays images or symbols generated by computers. The word is also used as an informal shorthand term for some crimes against property. Theft .is the monitoring of the behavior. It is an electrical devise that sets off an alarm when someone tries to break in IP Network . It most usually refers to observation of individuals or groups by government organizations. or other changing information. the following are hereby defined: Video Surveillance . Such action includes defacement. usually of people and often in a surreptitious manner. Security System .is the illegal taking of another person's property without that person's freely-given consent.is any public-sector employee or agent whose duties involve the enforcement of laws. Monitor . activities.is the behavior attributed originally to the Vandals. by the Romans.is a computer network made of devices that support the Internet Protocol. in respect of culture: ruthless destruction or spoiling of anything beautiful or venerable. graffiti and criminal damage.

looting. The term includes set-top boxes with recording facility. portable media players (PMP) with recording facility. Archives contain primary source documents that have accumulated over the course of an individual or organization's lifetime. as well as the place they are located. It can penetrate solid objects and their largest use is to take images of the inside of objects in diagnostic radiography and crystallography. Archived .embezzlement. USB flash drive. X-ray . It has the ability to sense differences in temperatures of known objects. shoplifting. Algorithm . and many other fields. Algorithms are used for calculation.is an effective method for solving a problem expressed as a finite sequence of instructions. recorders (PMR as camcorders that record onto memory cards) and software for personal computers which enables video capture and playback to and from disk.is a collection of historical records. HYPOTHESIS The hypothesis pursued and tested in this study was 4 .is a device that records video in a digital format to a disk drive. robbery. fraud and sometimes criminal conversion. Digital Video Recorder . larceny.a thermal scanner takes a measurement of the reflection of electromagnetic energy emitted in the infrared spectrum. data processing. SD memory card or other mass storage device. Thermal Scanner .is a form of electromagnetic radiation.

By 1994. Three CCTV video surveillance cameras were used and their impact was immediate. CHAPTER II REVIEW OF RELATED LITERATURE Foreign Studies Many European countries now employ public video surveillance as a primary tool to monitor population movements and to prevent terrorism. the camera surveillance systems in the UK are discouraging and thus preventing crime. There is no significant difference between the Security Personnel officer and the Video Surveillance Security System. 4 . on a single square mile industrial estate outside the English town of King's Lynn. Subsequently. cities and towns across Great Britain began using this crime prevention measure.1. In the years before the cameras were installed. The United Kingdom (UK) in particular relies extensively on video surveillance as a tool to fight crime and prevent terrorism. there had been 58 crimes (mostly vandalism) recorded on the estate. over 300 jurisdictions in the country had installed some form of public video surveillance. Public video surveillance in the UK began very unassumingly in 1986. In the two years following the installation. there were no crimes reported. According to some researchers.

There is extensive academic literature on the subject—studies carried out 4 . Scotland crime decreased by 68 percent. or creating mechanisms for measuring those costs and benefits over time.1 million in matching grants available to cities and towns to establish CCTV video surveillance programs." Although most municipal systems have been operational since 1990. "public video surveillance has been very helpful in making arrests. in Northampton overall crime decreased by 57 percent. the national government made available up to $3.25 What Criminologists and Others Studying Cameras Have Found Noam Biale. ACLU Technology and Liberty Program EXECUTIVE SUMMARY An increasing number of American cities and towns are currently investing millions of taxpayer dollars in surveillance camera systems. Recent British government reports cite CCTV surveillance as a major reason for declining crime rates: in the small town of Berwick burglaries fell by 69 percent. there is little longitudinal data indicating how effective CCTV surveillance systems actually have been in reducing crime rates. and perhaps more important. According to the police superintendent of a large metropolitan area. and in Glasgow. Advocacy Coordinator. But few are closely examining the costs and benefits of those investments.In 1995. helping to allocate resources to where they're most necessary.

Video surveillance systems are more disparate and at various levels of operability in the United States. As such. An increasing number of American cities and towns are currently investing millions of taxpayer dollars in surveillance camera systems. It examines the key meta-analyses from the UK. But 4 . However. have found varying results when they look at individual camera sites in isolation. This White Paper is based on a literature review of major studies of video surveillance from 2000 to 2008. The major findings of these studies should. fewer independent studies of their efficacy exist. which have been commissioned by the British Home Office. preliminary studies of surveillance cameras in California show similar results to studies conducted in the UK: Cameras having little to no effect on crime reduction. be part of the debate around surveillance cameras. the best studies combine results from multiple camera sites in a metaanalysis. and describes preliminary studies conducted in the US. where surveillance cameras are pervasive. However.over many years—and that research strongly indicates that video surveillance has no statistically significant effect on crime rates. which eliminates anomalies. at a minimum. The principle studies on video surveillance have been conducted in the UK. discusses the major difficulties in determining the impact of video surveillance on crime. The two main meta-analyses conducted for the British Home Office show that video surveillance has no impact on crime whatsoever. Those studies.

• Preliminary studies on video surveillance systems in the US show little to no positive impact on crime. or creating mechanisms for measuring those costs and benefits over time. Simply showing an increase or decrease in reported crime in an area under surveillance does not take into account general trends in crime and crime reporting. There is extensive academic literature on the subject—studies carried out over many years—and that research strongly indicates the following: • Meta-analyses (studies that average the results of multiple studies) in the UK show that video surveillance has no statistically significant impact on crime. and preliminary results from studies in the US. DIFFICULTIES OF STUDYING SURVEILLANCE SYSTEMS Measuring the success of public video surveillance systems is complex. because there are always innumerable factors that can explain a rise or fall in crime rates. The major findings of these studies should. particularly meta-analyses that aggregate data from several studies. It surveys what these meta-analyses have found.few are closely examining the costs and benefits of those investments. the methodological difficulties of studying video surveillance systems in isolation. This White Paper is based upon a literature review of independent studies on the effect of video surveillance on crime rates from 2000 to 2008. at a minimum. additional police in the areas 4 . be part of the debate around surveillance cameras.

Displacement complicates attempts to measure the impact of surveillance cameras on crime rates. and decrease in the area being directly monitored. Several factors in particular make it difficult to assess the effectiveness of surveillance cameras: • Displacement. • Confounding variables. and did not reduce crime overall. However. displacement can be extraordinarily difficult to show. one might reasonably assume that if the rate of muggings increase near an area that is being monitored by cameras.under surveillance. It is unclear in many studies that appear to show success whether surveillance cameras had a positive impact in combination with improved lighting. It can be inaccurate to extrapolate success from specific locations to general areas. This is really a problem of interpretation. then the cameras have been effective in reducing muggings. other factors such as increased police presence and better lighting in areas under surveillance make it difficult to conclude which intervention is most effective. For example. In addition. and perhaps most importantly. and as a result. or whether the improved lighting 4 . not data. because it means that the control area cannot be too close in proximity to the cameras. in looking at a downtown district and comparing the number of muggings on particular blocks. it could also be reasonably assumed that the placement of the cameras on a particular block in fact pushed the muggings into surrounding areas. enclosed places such as parking lots tend to produce better outcomes than outdoor areas. the possible displacement of crime to other areas not under surveillance. For example. better lighting.

might accomplish the positive outcome on its own. observe patterns of behavior and respond immediately to threats. 4 . Studies vary on the degree to which they take confounding factors into account. the UK Home Office has adopted the meta-analysis as the best statistical tool for studying the efficacy of surveillance cameras. The UK’s network of public surveillance cameras is the largest in the world (although China is quickly outpacing it). META-ANALYSES OF UNITED KINGDOM SURVEILLANCE SYSTEMS The efficacy of public video surveillance as a crime-fighting tool has been analyzed in a wide range of studies over the last decade. The majority of research has been conducted in the United Kingdom. In evaluating the merits of video surveillance it is important to look at the overall trend of multiple studies and place particular reliance on studies with rigorous methodology. individual video surveillance studies may not be reliable on their own.2 and now stands above 4. which more than any other country has embraced the widespread use of cameras. Because of these problems.3 The center of London is surrounded by a “ring of steel.1 The number of surveillance cameras in England and Wales increased from 100 in 1990 to 40.000 in 2002.2 million. For this reason. or one for every 14 persons.” a networked video surveillance system that is intended to allow law enforcement to track individuals moving through the city.

CCTV is shown to have no statistically significant impact on crime rates at all. and for certain types of crimes.4 and is estimated to have spent over £500 million (approximately a $1 billion) in between 1995 and 2005. 2002 In the first Home Office study in August 2002. the majority of studies show no effect on overall crime. Home Office Study. Farrington6 surveyed 22 studies of CCTV (both in the UK 4 .5 The Home Office has commissioned several key studies on the effectiveness of these systems around the UK using meta-analysis. The individual studies show moderate successes in some sites. This is important because it weeds out anomalies. usually in parking lots. A meta-analysis can provide a clearer sense of the impact of surveillance cameras by taking a variety of studies and averaging their results. For example. usually vehicle crimes. The following is a summary of the Home Office studies. However. spent 78% of its criminal justice budget in the 1990’s on surveillance cameras. and when combined in a meta-analysis. the agency in charge of security. Metaanalysis combines the results of multiple studies that all have similar hypotheses and methodological criteria. but we cannot know whether it caused the drop without comparing it to other scenarios (further explanation of the difficulty of measuring success from isolated studies is below). Brandon C. one installation of a video surveillance system might coincide with a sharp drop in crime. Welsh and David P.The British Home Office.

and the USA) for a meta-analysis, and found that, taken together, the cameras had no significant impact on crime. Welsh and Farrington began with 46 studies, but whittled the number down to 18 based on the criteria for inclusion in the metaanalysis.7 Of the 18 studies, half showed some reduction in crime in the area under surveillance, about a quarter showed an increase in crime, and the remaining studies showed a null effect. Welsh and Farrington then created a meta-analysis for the included studies, by determining an oddsratio for each study and then combining these ratios. An odds-ratio is a numerical expression of the net effect of an intervention, calculated by comparing results in the experimental area with the control. An oddsratio of 1 shows that there is no difference in crime rates between the experimental (surveilled) area and the control. An odds-ratio greater than 1 shows that the areas with cameras are experiencing less crime than the control areas. An odds-ratio of less than 1 show that the areas with cameras are experiencing more crime than the control. When Welsh and Farrington combined odd-ratios for all 18 studies included in the meta-analysis, they found that the average was just over 1, showing a very small impact on crime, and when measured against the standard deviation, this impact was shown to be statistically insignificant. The areas with cameras did not perform better than the areas without. It is worth noting that the two areas included in which cameras were the only intervention used (no added police presence, increased lighting, etc.) showed no effect on crime in one case,8 and an increase in crime in the other.9 Five of the eleven studies that showed reductions in 4

crime looked at camera systems located in enclosed parking lots. These studies showed an overall odds-ratio of 1.7, but included other interventions, such as improved lighting, fencing, notices about CCTV, and increased security personnel. This suggests that cameras can be effective when used in specific environments and combined with other preventative measures.

Home Office Study, 2005 Criminologists Martin Gill and Angela Spriggs published a comprehensive analysis of fourteen individual sites in the UK for the Home Office in 2005,10 which found, again through the use of metaanalysis, that the cameras had “no overall effect” on crime rates. Gill and Spriggs concluded that only one of 13 sites showed a statistically significant reduction in crime (one site was excluded for failing to meet the crime statistics recording criteria). This site showed a reduction far larger than any others—an odds-ratio of 3.34, indicating a reduction in crime of over 300%, compared with the second-largest oddsratio of 1.38, or just under 40%—and was also the most expensive site, at a cost of over £3 million (about $6 million) for the camera system. This area also experienced several confounding factors including increased fencing and improvements to security, though these were implemented once the video surveillance system was fully installed and thus may not have had a distorting impact on the outcome. Although Gill and Spriggs' analysis found "that CCTV schemes produced no overall effect on all relevant crime viewed collectively,"11 4

the study did show overall better outcomes for vehicle crimes in seven of the sites. Violent crimes were different. In the four urban city centers included in the study, violence against persons increased in three sites. Gill and Spriggs hypothesize that these crimes may be impulsive and more often influenced by alcohol.12 They also acknowledge that changes to parking regulations in at least one site may have contributed to the reduction in vehicle crime, by simply reducing the number of vehicles on the street.13 In addition, burglary, a property crime that did show reductions in one site, showed the highest rate of displacement in an area adjacent to the target area.14 Gill and Spriggs additionally found that fear of being victimized by crime did not change significantly from before the cameras were installed and after, though 69-96% of individuals surveyed in the 14 sites responded favorably to plans to install camera systems.

PRELIMINARY USA STUDIES SHOW LITTLE POSITIVE IMPACT Fewer studies of video surveillance have been conducted in the United States, where cameras have been erected in a piecemeal manner, and have not undergone an extensive process of networking (though Chicago15 and New York16 are beginning this process). Studies are, at this point, insufficient to conduct meta-analyses based solely on studies in the US. However, Welsh and Farrington’s 2002 meta-analysis compared UK and US sites, and the two revisited this comparison in a 2004 follow-up.17 4

One possibility is a difference in reporting time.19 that offer a preliminary view of the impact of video surveillance on crime in US cities. Jennifer King and colleagues at Center for Information Technology Research in the Interest of Society (CITRIS) and the Samuelson Clinic at the University of California. 4 . are currently in the process of studying the impact of San Francisco's small video surveillance system. showing an undesirable or null effect on crime. UC Berkeley Preliminary Study The city of San Francisco’s 68 cameras appear to have had a small impact on property crimes. Thus. these studies provide a more unadulterated look at the effect of surveillance cameras on crime rates than their UK counterparts and show that cameras on their own have virtually no impact on crime. but no impact on violent crimes. such as improved lighting and increased foot patrols.18 The following are two initial independent studies of small-scale systems. However. as Welsh and Farrington report. what is likely an even more important factor. both in California. is that the surveillance sites in the US lack the confounding elements of the British sites. Welsh and Farrington point out a few key differences between the UK and US systems that might explain this. Berkeley.The American studies that met the criteria for the meta-analysis generally showed worse outcomes that those in the UK. none of the US schemes used any intervention besides cameras. with the UK studies generally taking longer to report findings. While nine of the 14 UK sites used several different interventions simultaneously.

000 feet away makes a determination of displacement inconclusive. but no statistically significant changes between 100 and 500 feet from the cameras. and thus. Regarding violent crime. in fact. The study also did preliminary analysis of crime statistics 5001000 feet away from the cameras. there appeared to be no statistically significant change in the level of crime anywhere in the 500 foot range around the cameras. out of the range of surveillance. a decline in homicide was observed within 250 feet of the cameras. based on information available from the San Francisco Police Department. When violent crimes were disaggregated. This might suggest displacement from the areas directly monitored by the cameras. and found an increase in property crime between 500 to 750 feet from the cameras. however this reduction was offset completely by an equal increase in homicides between 250 and 500 feet from the cameras.In March 2008. 4 . However. suggesting displacement. This would seem to suggest that the cameras are. working to reduce property crimes. though an off setting decline in property crimes in the area 750 to 1. we cannot know whether this reduction is a fluke or not. they published preliminary findings. King's group found a 22% decline in property crime occurring within 100 feet of the cameras. without the benefit of aggregated multiple studies in a meta-analysis.20 Looking at aggregate statistics on serious violent crime and serious property crimes before and after installation of cameras in high-crime neighborhoods.

unlike San Francisco's public video surveillance system. This may be because while San Francisco has incurred substantial costs for installation and upkeep of the cameras. the cameras were donated to the city by the film industry) or 4 . responded to the apparent null effect on violent crime by asserting that the cameras provided “psychological relief” to citizens. Supervisor Ross Mirkarimi. The study notes that. for example.23 The group looked at five out of 14 cameras along a high-traffic section of Hollywood Blvd. Students at the University of Southern California School of Policy. were installed through private donations (on Hollywood Blvd.000 for 25 more cameras intended to target violent gang activity.000 on the 68 cameras currently up and has budgeted an additional $200. and were thus justified. Planning and Development released a report to the California Research Bureau in May 2008 on the effects of video surveillance on crime in two areas of Los Angeles. including the clusters that the USC group examined.Notably when the preliminary findings of the UC Berkeley study were reported in the San Francisco Chronicle. many of LA's cameras. cameras in Los Angeles have not been analyzed by the city or some other official body to determine their efficacy.21 The city has so far spent $900. who heads the board's public safety committee. and six cameras at the Jordan Downs Public Housing Project in Watts.22 USC Study Preliminary studies of camera systems in Los Angeles show no impact on crime.

but that reduction was offset by an overall crime reduction in surrounding control areas (though in the case of the Jordan Downs Housing Project. Violent crime went down in both areas. a decision by the San Francisco City Council to allow only passive monitoring of the cameras for the purposes of safeguarding citizens' privacy. stunning natural wonders. warm and hospitable people. the study found no significant impact on crime in either area. the country is not exempt from the terrors of the rest of the world. the group hypothesized that the cameras may have played a role in preventing a substantial escalation of crime relative to surrounding areas. with its exotic and tropical islands. But with all these raves.federal grants through the US Department of Homeland Security's Grant Program. as well as arrest records.” vs. Looking at the LAPD's COMPSTAT figures to determine pre and post installation crime rates. The group was not able to find statistically significant evidence of displacement in either area. since the housing project was the site of a gang war during the period of the study). rare and valuable natural resources. Another important distinction between the camera systems in Los Angeles and those in San Francisco is active monitoring of LA's cameras “in real time. Despite its beauty. and rising national status in the world. Local Literature The Philippines is known as the Pearl of the Orient. Communications 4 . the country is also in danger of relentless terrorist threats and terrorism incidences.

suburbs. to the business sector. The country is not bereft of crimes. Our line-up of products and solutions include the top-of-the-line surveillance cameras. and your future. But the good side to this is that we are not left helpless to these looming possibilities of insecurity. 4 . Only Philippine Security offers the complete set of security solutions that can meet the security needs of various types of clients – from the government. your businesses. You have the choice of taking a proactive stance when it comes to securing your homes. in the cities. to academic institutions. your country. to individual homes and to the schools and campuses.and Information Technology industries are also booming and the workplace is getting larger and more complex as time progresses. access control and alarm systems. The fact is that this is the harsh reality that goes hand in hand with the wonders and delight the country can offer. and rural areas. Philippine Security brings you the latest and most reliable storage and security system technologies that can take your safety and security confidence to a higher level.

It involves some type of comparison or contrast and attempts to discover relationships between existing and non manipulative variables. Nagtahan.CHAPTER 3 RESEARCH METHODOLOGY RESEARCH DESIGN This study will use the descriptive method of the survey type of research which describe and interpret data and characteristics about the population or phenomenon being studied. SAMPLE AND SAMPLING TECHNIQUES The purposive sampling will be used in the selection of the respondents only in EARIST. Moreover. Aquino describes the descriptive research as factfinding methodology with adequate interpretation. Sampaloc. POPULATION. Manila will be utilized to answer the questionnaires. He further claims that the descriptive method is something more and beyond just data gathering. The data must be subjected to terms of ordered reasoning. 4 . He believes that the discussions of those data are carried up to the level of adequate interpretation.

The choices represent the degree of agreement each respondent has on the given question. In this survey type. Pagoso emphasized that purposive sampling was based on certain criteria laid down by the research such that the respondents within the population have meaning for the data that will be gathered. five choices are provided for every question or statement. gender. The profile contains socio-demographic characteristics of the respondents such as age. The questions were structure using the Likert format. Manila.In this regard. RESEARCH INSTRUMENT The survey questionnaire was used as the main data-gathering instrument for this study. this research instrument allowed the research to carry out the quantitative approach effectively with the use of statistics for data interpretation 4 . The Likert survey was the selected questionnaire type as this enabled the respondents to answer the survey easily. In addition. The questionnaire was divided into two main sections: a personal data sheet or the profile and the survey proper. The respondents of the study will be the students and faculties of EARIST. and the respondent’s knowledge about video surveillance system.

Matrix tables were made to organize. tabulated. the researcher will go to the school under study to personally distribute the questionnaire to the students and employees who has a knowledge or familiarity about the Video Surveillance System. Data were collated. summarize. Sampaloc.DATA GATHERING PROCEDURE Permission to conduct the study will be secured by the researcher from the school administrator of Eulogio “Amang” Rodriguez Institute of Science and Technology. After which. and analyze the data gathered for easy determination of its difference from each other. tallied and tabulated. Manila. be scored. The questionnaire will STATISTICAL TREATMENT OF DATA The information gathered were tabulated and processed manually and with the aid of computer to determine the precise interpretation of the results. The following statistical tools were used in the analysis of data: 1. and analyzed. Nagtahan. Percentage 4 .

5 3. the percentage will be computed. The process of finding the “Weighted Mean.To describe the profile of the respondents.6 – 4.6 – 5.0 – 1.5 2.6 – 3. The formula is given below: WM X = ∑---------4 . Formula: P = F/N x 100 where: P = Percentage (%) F = Frequency N = Total Number of Population 2.5 1. The responses to questions in the given variables were scaled using the “five-point-scale” or Likert Scale system and given weight as follows: Rate 5 4 3 2 1 Verbal Interpretation Strongly Agree Agree Moderately Agree Disagree Strongly Disagree Range 4.6 – 2.” which is referred to as the central tendency was used. The measure of dominant quantity was utilized to determine the most probable scenario.0 3.5 1.

Rank Method 4 .N where: X w Σ N x = weighted mean = weighted factor = summation = total number of respondents = score 4. The formula of chi-square is presented as follows: Where: X2 f (a) = Chi – Square = Actual Frequency or number of observations in a cell f (e) = Expected Frequency or number of observations in a cell in the theoretical distribution ∑ = Symbol for “summation” 5. To test the level of significance between the assessments of the respondents the Chi-Square were employed to determine the relationship of factors as given.

The highest occurrences of behavior or the class with the greater number was given the highest rank.Rank consists of arranging number of decreasing or increasing order of size. CHAPTER IV Presentation. analyzes and interprets the data gathered based on the questions posited in the study. Below are the tables summarizing the gathered values for each profile category: TABLE 1 Age Distribution of 50 Respondents AGE 21 years old and below 21-25 years old 26-30 years old 31-35 years old 35 years old & above TOTAL FREQUENCY 20 23 4 2 1 50 PERCENTAGE 40% 46% 8% 4% 2% 100% It can be seen in table 1 that majority of the respondents belong to the age bracket of 21 – 25 years old with the frequency of 23 or 46% 4 . gender and their Knowledge in Video Surveillance System. DEMOGRAPHIC PROFILE For the profile of the respondents. the questionnaire asked for the participants’ age. Analysis and Interpretation of Data This Chapter presents.

TABLE 2 Gender Distribution of 50 Respondents GENDER Male Female TOTAL FREQUENCY 32 18 50 PERCENTAGE 64% 36% 100% Table 2 shows the Distribution of respondents by age. TABLE 3 Knowledge in Video Surveillance System Distribution of 50 Respondents Knowledge in Video FREQUENCY PERCENTAGE 4 . Based on the data in the table.followed by the age bracket of 21 years old and below with the frequency of 20 or 40%. majority of the respondents are male with the frequency of 32 or 64% and only 18 or 36% are female. 4 or 8% of the respondents are in the age bracket of 26 – 30 years old.

6 – 4. 5 or 10% of the respondents have advance knowledge and the 2 or 4% left are new or not familiar about this system.5 2. SURVEY ANALYSIS Likert Scale System Rate 5 4 3 Verbal Interpretation Strongly Agree (SA) Agree (A) Uncertain 4 Range 4. While 11of them or 22% are moderately knowledgeable about this system.Surveillance System Advance Moderate Knowledgeable New TOTAL 5 32 11 2 50 10% 64% 22% 4% 100% All of the respondents are separated according to their Knowledge in Video Surveillance System.0 3.5 .6 – 5. Almost 32 out of 50 respondents or 64% of the respondents have a moderate knowledge in video surveillance system.6 – 3.

5 1.5 Chi-square formula and degrees of freedom table Where: X2 = Chi – Square f (a) = Actual Frequency or number of observations in a cell f (e) = Expected Frequency or number of observations in a cell in the theoretical distribution ∑ = Symbol for “summation” SURVEY RESULTS TABLE 4 4 .2 1 (U) Disagree (D) Strongly Disagree (SD) 1.6 – 2.0 – 1.

M V. It could be noted that majority of the respondents agree that EARIST Security Personnel has less security gadgets.44 3. RANK 3. Security threats are not address properly Total 8 Based on my computation using weighted mean. RANK 4 . Most of the EARIST Security Personnel doesn’t know how to install and operate video surveillance d.96.5 U 3 U 1 A 5 V. Most of the EARIST Security Personnel 3.4 doesn’t know how to use a security camera c.I.54 U 4 3.M a.56 U A 2 TABLE 5 Video Surveillance System will ease threats and will help the school on a day-to-day basis W. EARIST Security Personnel has less security 3.Specific security threats and concerns of the school attempting to address by using a video surveillance system W. EARIST Security Office doesn’t fit the installation area of the Video Surveillance System d.96 gadgets b.I. 3. table 4 shows that letter A got the highest rank among the five problems with the weighted mean of 3.

9. A routine check on all vehicles going in and 3. EARIST Security Personnel cannot actually determine threats inside or outside school premises.87 Total 6 As shown in the table.88 and 3. A A 5 A 2 A 3 A 4 3. majority of the respondents says agree that a real time recording of what is happening beyond the scope of the video surveillance camera are one of the most important benefits of video surveillance in school campus with the weighted mean of 3. b. A real time monitoring of all the Students 3. A routine check to all students and visitors going in and out of the institute was ranked fourth with the weighted mean of 3.88 and visitors of the School e.78 of the weighted mean also agree that EARIST Security Personnel cannot actually determine threats inside or outside school premises.78 A 1 TABLE 6 Accepting and interpreting of data produce by the system W.94.88 out of the Institute d. A real time recording of what is happening 3.M V.94 beyond the scope of the surveillance camera 3.I. RANK 4 . A routine check to all students and visitors 3. Ranked third and second has an equal weighted mean of 3.a.9 going in and out of the institute c.

A print out will produce for manual 3. A faculty and employees database will be 3.I.92 consulted before applying the system b.88. Accredited Students organizations will be 3. Comments and suggestions will be properly 4 3.78 Total 8 It can be seen that 3.M V. Based on the table.82.5 for letter (e) TABLE 7 Students’ acceptance on the system W.76 while the calculated weighted mean for the first ranked is 3.92 3.96 A A 3 5 A 4 A U 1 A 3 A 2 A 5 A 4 .98 is the highest computed weighted mean on how does the school management accept and interpret produce by the system.98 used in monitoring faculty and employees c.a. the third ranked has a weighted mean of 3. An automatic logging system will be 3. Letter (d) got the second rank with the computed weighted mean of 3. RANK a.82 adopted e. Institute student government will be the first to summon on proper orientation of the system c. Student database will be used in monitoring 3. On the spot data report can be easily 3.5 produce. letter (b) got the highest rank followed by letter (a) with the weighted mean of 3.76 checking d. 3.88 the students b.

82 to determine the acceptability of the system Total 3. Moreover.9 also AGREE that a survey on the entire students will be conducted to get their pulse. a weighted mean of 3.904 A A 1 A 2 Based on Table 7.96 of weighted mean agree that comments and suggestions will be properly entertained for the acceptance of the system.entertained d.82 of the computed weighted mean agree for the computational analysis that will be conducting to determine the acceptability of the system. A computational analysis will be conducted 3. it could be seen that 3. 3. respondents agree that accredited Students organizations will be consulted before applying system and also the Institute Student Government will be the first to summon on proper orientation of the system with a weighted mean of 3.9 conducted to get their pulse e. 4 .92. A survey on the entire students will be 3.

CHI-SQUARE DISTRIBUTION The tables below are the distribution of the data gathered from the survey questions. The tabular chi-square is attained by computing the degree of freedom (df) with the formula df = (C .1) (R . (1) Strongly Disagree.E)2/E under its Verbal Interpretation. (4) Agree. (3) Uncertain. Each of the table consists of the Actual Frequency or number of observations in a cell. 4 .05 level of significance. the Expected Frequency or number of observations in a cell in the theoretical distribution and the values for (O .30. (2) Disagree.1) which is equal to 16 at 0. (5) Strongly Agree. The computed chi-square value is then compared to the tabular chi-square value which is equal to 26.

the null hypothesis . that if the computed chi-square value is greater than the tabular chi-square.there is no significant difference between the old and the new system .is rejected.Note. 4 .

006 1.2 chi 2.711 0.8 15.089 O 27 21 23 19 15 E 21 21 21 21 21 4 chi 1.041 1.378 5.103 3.190 1.2 7.8 3 chi 1.190 0.2 0 O 0 0 1 0 4 E 1 1 1 1 1 1 chi 1 1 0 1 9 Total (O-E)^2/E Total 9.2 0.214 4 .003 O 1 9 6 4 5 E 5 5 5 5 5 2 chi 3.806 31.8 15.2 0.458 0.8 15.625 1.714 O 11 16 15 21 16 E 15.2 7.8 15.TABLE 7 Specific security threats and concerns of the school attempting to address by using a video surveillance system 5 a b c d e O 11 4 5 6 10 E 7.714 0.672 0.2 3.2 7.422 0.003 0.302 11.2 7.200 1.000 0.

1)(R .05.806 = 31.214 and df = (C .1) = (4)(4) = 16 Reject H0 if Since our calculated value of >= 26. The alternate hypothesis states that there are significant differences between the observed and expected frequencies As usual we will set our alpha level at . for the chi-square test.1)(5 .1) (5 .214) is greater than 26.1)(R .103+3.214 df = (C .1)(5 .378+5.3.From the table we can see that: = 9. we reject the null hypothesis and accept the alternative hypothesis. (31.625+1.1) = (4)(4) = 16 Our null.3. = 31.1) (5 .302+11. states that there are no differences between the observed and the expected frequencies. 4 .

4 .

001 0.2 2.2 10.6 0.2 27.288 O 12 8 10 8 10 E 9.376 0.2 27.8 0.2 2.0182 0.2909 0.458 0.6 3 chi 0.004 0.2 2.063 0.05 0.6545 O 1 1 1 1 0 E 0.8 0.05 0.8 Total (O-E)^2/E chi 1.141 O 24 29 26 27 30 E 27.672 1.901 4.053 0.2 10.05 0.2667 0.2 27.321 0.2 2 chi 0.2 10.6 9.6 9.05 0.2 27.6 9.0167 O 3 2 2 3 1 E 2.201 0.2 4 chi 0.2 10.2 2.004 0.063 0.119 0.8 1 chi 0.8 0.2909 0.TABLE 8 Video Surveillance will ease the threats and help the school on the day-to-day basis 5 a b c d e O 10 10 11 11 9 E 10.552 4 .0167 0.0182 0.2667 0.6 9.2 chi 0.8 0.

From the table we can see that: = 1.458+0.552 df = (C .1) (5 . states that there are no differences between the observed and the expected frequencies.201+0.321+0.3.552 and df = (C .3.1)(R .901 = 4.1)(R .552) is less than 26. The alternate hypothesis states that there are significant differences between the observed and expected frequencies As usual we will set our alpha level at .1) = (4)(4) = 16 Our null. we accept the null hypothesis and reject the alternative hypothesis.05.1)(5 .1)(5 .1) (5 . 4 .1) = (4)(4) = 16 Reject H0 if Since our calculated value of >= 26. (4.672+1. for the chi-square test. = 4.

4 .

5492 O 15 12 19 10 17 E 14.6 0.625 2.463 1.2864 1.4 1.6 14.017 0.6 9.6 23.6 14.585 5.4 9.8 2 0.6 Total (O-E)^2/E chi 2.3556 0.6 23.8 1.6 23.8 O 0 0 0 0 3 1 E 0.6 0.6 14.4898 0.4 9.198 11.925 4 .561 3.6 0.326 1.272 0.8 1.6 14.6 3 0.6 4 0.6 0.0222 1.8 0.7356 0.6 0.8 1.6 0.8 1.8 0.TABLE 9 Accepting and Interpreting of data produce by the system 5 a b c d e O 13 11 9 7 7 E 9.956 25.6 0.4493 0.6 0.011 0.613 0.4 9.5492 0.613 O 20 27 21 30 20 E 23.3945 O 2 0 1 3 3 E 1.379 0.6 23.4 9.

3.1)(5 . = 25.925 df = (C .05.1) = (4)(4) = 16 Our null.1) (5 .From the table we can see that: = 2.625+2.925 and df = (C .585+5. we accept the null hypothesis and reject the alternative hypothesis.1)(5 .3.198+11. The alternate hypothesis states that there are significant differences between the observed and expected frequencies As usual we will set our alpha level at .1)(R . (25.1) (5 .925) is less than 26. for the chi-square test.561+3.1)(R . 4 . states that there are no differences between the observed and the expected frequencies.1) = (4)(4) = 16 Reject H0 if Since our calculated value of >= 26.956= 25.

4 .

289 O 2 3 2 2 2 E 2.134 0.4 0.2 4 0.2 24.530 1.333 0.432 0.083 0.4 0.2 24.597 0.291 0.2 2.2 11.004 0.639 1.083 O 26 27 28 21 19 E 24.4 0.018 0.2 11.2 2.2 2 0.432 0.530 1.9 0.018 O 0 0 0 1 1 1 E 0.4 0.9 Total (O-E)^2/E chi 0.117 O 11 9 9 12 15 E 11.018 0.2 2.423 1.2 3 0.018 0.4 0.083 0.732 3.324 0.2 24.4 0.4 0.083 0.2 24.840 4 .2 2.TABLE 10 Students’ Acceptance on the System 5 a b c d e O 11 11 11 14 13 E 12 12 12 12 12 0.057 1.2 11.408 8.2 11.4 0.

530+1.1)(R . states that there are no differences between the observed and the expected frequencies.530+1. for the chi-square test.3.1)(R .1) = (4)(4) = 16 Our null.1)(5 .732+3.840) is less than 26.1) = (4)(4) = 16 Reject H0 if >= 26.05.1)(5 .639+1.840 and df = (C . The alternate hypothesis states that there are significant differences between the observed and expected frequencies As usual we will set our alpha level at .From the table we can see that: = 0. 4 .3. = 8.408= 8.1) (5 . we accept the null hypothesis and reject the alternative hypothesis.1) (5 .840 df = (C . Since our calculated value of (8.

4 .

Specifically. Conclusion.CHAPTER V Summary. Recommendation SUMMARY The main objective of this research study was to make a descriptive survey about the technology implicated in using Video Surveillance System in Eulogio “AMANG” Rodriguez Institute of Science and Technology.  What are the specific security threats and concerns of the school attempting to address by using a video surveillance system. it sought to answer the following questions.  How will it help address those threats and how will the school actually use it on a day-to-day basis.  How does the school management accept and interpret data produce by the system?  How does the student accept the new system if implemented?  Is there a significant difference between the security personnel officer and the video surveillance system? 4 .

4 . the study utilized the following statistical tools: Percentage. The study reveals the following findings: Majority or 64 percent of the respondents are male and 36 percent are females. (32) thirty-two of them are male while the other 18 are female. ChiSquare and Rank Method. To analyze and interpret the data. Most of the respondents belong to the 21-25 age brackets with a moderate knowledge about the video surveillance system.The descriptive method of the survey type of research was used in this study. out of (50) fifty respondents. Likert Scale System. Students and employees of EARIST served as the respondents. Weighted Mean.

4 .

Most of the EARIST Security Personnel doesn’t know how to use a security camera c.5 3. EARIST Security Personnel has less security gadgets b.96 3.44 3.806 31.378 5. Specific security threats and concerns of the school attempting to address by using a video surveillance system a.625 1.56 8 CHI 9.302 11. Most of the EARIST Security Personnel doesn’t know how to install and operate video surveillance d.4 3.54 3.214 4 .103 3.M 3. EARIST Security Office doesn’t fit the installation area of the Video Surveillance System d.Below is the table summarizing the results of the survey responses given by the selected respondents: TABLE A 1. Security threats are not address properly Total 5 11 4 5 6 10 36 4 27 21 23 19 15 105 3 11 16 15 21 16 79 2 1 9 6 4 5 25 1 0 0 1 0 4 5 W.

M 3. A real time recording of what is happening beyond the scope of the surveillance camera Total 5 10 10 11 11 9 51 4 24 29 26 27 30 136 3 12 8 10 8 10 48 2 3 2 2 3 1 11 1 1 1 1 1 0 4 W. A routine check to all students and visitors going in and out of the institute c. TABLE B 2.552 4 .672 1. A real time monitoring of all the Students and visitors of the School e. while using the weighted mean computation. b.321 0.88 3. EARIST Security Personnel cannot actually determine threats inside or outside school premises.78 3.87 6 CHI 1.458 0.201 0.Based on my computation using chi square. letter (a) on the said table shows the highest rank that EARIST Security Personnel has less security gadgets.94 3. A routine check on all vehicles going in and out of the Institute d.9 3. Video Surveillance System will ease threats and will help the school on a day-to-day basis. a. it is evident that letter (e) on table A shows the highest rank and clearly visible that security threats are not address properly.88 3.901 4.

76 3.98 3.198 11.956 25. It can be noted that a real time recording of what is happening beyond the scope of the surveillance camera will ease the threats and will help the school on a day-to-day basis.585 5.M 3.561 3. Total 5 13 11 9 7 7 47 4 20 27 21 30 20 118 3 15 12 19 10 17 73 2 2 0 1 3 3 9 1 0 0 0 0 3 3 W. An automatic logging system will be adopted e. A faculty and employees database will be used in monitoring faculty and employees c. Accepting and interpreting of data produce by the system a.925 4 . On the spot data report can be easily produce. A print out will produce for manual checking d. the respondents gave almost the same highest rank for letter (e) using the computation for weighted mean and chi-square.625 2. TABLE C 3.5 3.88 3.82 3. Student database will be used in monitoring the students b.As gleaned in the table.78 8 CHI 2.

Institute student government will be the first to summon on proper orientation of the system c. it can be seen that letter (b) is considered the highest ranked in computing the weighted mean.530 1.96 3.530 1.90 4 CHI 0.M 3. A survey on the entire students will be conducted to get their pulse e. A computational analysis will be conducted to determine the acceptability of the system Total 5 11 11 11 14 13 60 4 26 27 28 21 19 121 3 11 9 9 12 15 56 2 2 3 2 2 2 11 1 0 0 0 1 1 2 W. The same table also reveals that on the spot data can be easily produce as it computed using chi square.9 3.Looking at the table.92 3.92 3. Students acceptance on the system a. Accredited Students organizations will be consulted before applying the system b. it reveals that a faculty and employees database will be used in monitoring faculty and employees.839 4 .732 3.639 1. Comments and suggestions will be properly entertained d.408 8.82 3. TABLE D 4.

a computational analysis will be conducted. it was worth noting that comments and suggestions should be properly entertained in the acceptance of the video surveillance system. 4 .Based on the weighted mean computation. letter (c) got the highest rank with the average of 3.96. While on the chi-square computation letter (e) was ranked first that in determining acceptability of the system.

It has been operated for public interest such as prevention of crimes and fly-tipping by the police and local government. the use of the video surveillance camera system is increasing. 4 . The proposed system adjusts the intensities of privacy according to access levels to reduce invasion of privacy by people who are not concerned. This paper analyses conventional methods of privacy protection in surveillance camera systems and applied scrambling and RFID system to existing surveillance systems to prevent privacy exposure in monitoring simultaneously for both privacy protection and surveillance.CONCLUSION Due to increased terrors and crimes. it may cause an invasion to privacy and crimes. When the recorded video data is exposed. but private information such as faces or behavior patterns can be recorded in CCTV.

They should consult openly with parents. In its consultation with the school community. such as increased monitoring by teachers. or for the deterrence of destructive acts. Video surveillance programs should only be adopted where circumstances have shown that it is necessary for the purposes of providing the safety of students and staff. have shown to be ineffective or unworkable. Before implementing a video surveillance program. The school administration should provide justification for the use and extent of a video surveillance program on the basis of addressing specific and significant concerns about safety and/or the theft or destruction of property. staff. a school should be able to demonstrate. such as vandalism.RECOMMENDATION Video surveillance should only be considered where less intrusive means of deterrence. students and the broader school community as to the necessity of the proposed video surveillance program and its 4 . the school administration should outline the less intrusive means that have been considered and the reason why they are not effective. They should also conduct an assessment into the effects that the surveillance system will have on personal privacy and the ways in which such adverse effects may be mitigated.

acceptability to the school community. should the project proceed and they should ensure that the proposed design and operation of the video surveillance system minimizes privacy intrusion to that which is necessary to achieve appropriate goals through lawful activities. Consultation should provide stakeholders with an opportunity to comment on the actual location of cameras on school property. 4 .

mnstate.BIBLIOGRAPHY Internet      www.yahoo.edu/wasson/ed602quiz14.com http://www.google.qualityadvisor.com www.php http://www.wikipedia.com www.com/sqc/formulas/chi_square_f.htm 4 .

6 – 4.0 3.6 – 3.6 – 2. LEGEND Verbal Interpretation Strongly Agree Agree Uncertain Disagree Strongly Disagree Range 4.5 1.6 – 5.0 – 1.5 2.5 1.APPENDICES SURVEY QUESTIONNAIRE Part 1: PERSONAL DATA SHEET Age: 21 years old and below 21-25 years old 26-30 years old 31-35 years old 35years old and above Rate 5 4 3 2 1 Sex: Female Male Knowledge in Video Surveillance System Advance Moderate Knowledgeable New Part 2: Check the appropriate box. which you believe applicable to the given variables.5 4 .

Most EARIST Security personnel doesn’t know how to install and operate video surveillance. 5 a. EARIST Security Personnel has less security gadgets b. Security threats are not address properly B. d. A routine check on all vehicles going in and out of the Institute d. b.Specific security threats and concerns of the school attempting to address by using a video surveillance system 5 a. EARIST Security Office doesn’t fit the installation area of the Video Surveillance System e. EARIST Security Personnel cannot actually determine threats inside or outside school premises. A real time monitoring of all the Students and visitors of the School e. Video Surveillance System will ease threats and will help the school on a day-to-day basis. A routine check to all students and visitors going in and out of the institute c. Most of the EARIST Security 4 3 2 1 Personnel doesn’t know how to use a security camera c. A real time recording of what is happening beyond the scope of the surveillance camera 4 3 2 1 4 .

Comments and suggestions will be properly entertained d. Institute student government will be the first to summon on proper orientation of the system c. A computational analysis will be conducted to determine the acceptability of the system 4 3 2 1 E. A survey on the entire students will be conducted to get their pulse e. Student database will be used in monitoring the students b. Accredited Students organizations will be consulted before applying the system b.C. Accepting and interpreting of data produce by the system 5 4 3 a. There is no significant difference between the old and the new system . On the spot data report can be easily produce. A faculty and employees database will be used in monitoring faculty and employees c. Students acceptance on the system 5 a. A print out will produce for manual checking d. Significant difference between the security personnel officer and the video surveillance system 5 4 3 2 1 a. An automatic logging system will be adopted e. 2 1 D.

1 28 41.4 14 23.9 10 18.1 23.3 29 42.6 18 28.4 21 32.8 36.6 30 43.6 32 33.6 30.6 47 48.5 20.7 26.99 3 7.7 12 21 13 22.9 40.63 9.3 15.1 6 12.6 50.1 30.9 27 40.9 .2 24.6 7 14.49 5 11.1 16.2 27.8 18.1 20 31.5 9 16.82 4 9.2 37.3 49.6 43 44.6 38.3 45.1 8 15.21 11.7 29.9 23 35.3 17 27.2 24 36.APPENDIX B EQUIVALENT FOR THE DEGREE OF FREEDOM Alpha value = 5% DF Value 1 3.84 2 5.7 26 38.3 13.4 34.7 22 33.8 Alpha value = 1% DF 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 Value 6.9 19 30.3 41.3 11 19.7 15 25 16 26.4 25 37.

Mesa. Old Sta. Lucero EDUCATIONAL BACKGROUND COLLEGE Eulogio “Amang” Rodriguez Institute of Science and Technology Computer Engineering 2006 – Present SECONDARY Bagong Silangan High School 2002-2006 ELEMENTARY San Juan Elementary School 1996-2002 . Lucero Dolores M. Manila 20 4’11 49 kilos Filipino Single Roman Catholic Federico L.CURRICULUM VITAE PERSONAL DATA Name Date of birth Place of birth Address Age Height Weight Nationality Civil Status Religion Fathers Name Mothers Name : : : : : : : : : : : : Anna Marie Magallanes Lucero February17. 1990 San Juan City 4929 r-32 Pina St.

Sign up to vote on this title
UsefulNot useful

Master Your Semester with Scribd & The New York Times

Special offer for students: Only $4.99/month.

Master Your Semester with a Special Offer from Scribd & The New York Times

Cancel anytime.