You are on page 1of 27

Accessible Online Security App with Warning and Tracking

System via GPS

A Research Proposal
for
Practical Research 2

Jan Brett C. Estrada


Judy Mae C. Magallo,
Adrian M. Villanura
Researchers

Antonio N. Legaspi, Ph.D


Research Teacher

November, 2021
TABLE OF CONTENTS

Chapter I

The Problem …..…………………………………………………………………................................1

Theoretical Framework.. ……...………………………………………………....................................2

Conceptual Framework..........…………………………………………………………………………3

Statement of the Problem……………………………………………...……………………………... 3

Significance of the Study.……………………………………………..…………................................4

Scope and Delimitations ……………………………………………………………………………...4

Definition of Terms…………………………………………………………………………………...4

Chapter II

Review of Related Literature …………………………………..……………................................5-16

Chapter III

Methodology.……………………………………..…….…………………………………………..17

Research Design…………………………………………..…………….………………………….17

Research Environment………………………………………………………………………….17-18

Participants of the Study……………………………………………...…………………….………18

Research Instruments………………………………...……………………………………………..18

Data Gathering Procedure………………………………………………………………………18-19


Treatment of Data/Data Collection and Analysis…………………………………………….…….19
1

CHAPTER I

THE PROBLEM

The thieving or any forms of stealing have been an on-going problem throughout every country.

As wide as it covers, thieving is one of the most prevalent and easiest crimes to conduct. It can be done

either on sidewalks, malls, parks, or on almost all the public places. This crime precisely shows us that

our personal security is not robust and we are dependable from our policemen. The people should

somehow initiate to find a way to increase our own security from these burglars.

Chasing suspects certainly consumes much energy, time, and money for our brave policemen. It

can even lead to a serious skirmish where either of them will be forced to use violence. Their escapes

would also give them another day to victimize vulnerable individual. They will not just target the richest

but everyone can be a victim especially because we use bags to situate our belongings.

In Philippines, this kind of matter still tops other crimes. According to the 2018 records of

Statista Research Department, it’s the most prevalent crime garnering 23,590 cases compared to its

counterpart the car mapping motor garnering 420 cases only. This, however, can be avoided or mitigated

if we raise awareness and have a serious discussion about it.

Although some factories are inventing bags that lure burglars by opening a fake zipper, it is still

figurable. As a result, the researchers thought of a way to design a reliable, effective, accurate, and user-

friendly mobile app to somehow neutralize this problem and provide better security system for the

smartphone users whenever they are in public.


2

THEORETICAL FRAMEWORK

This study is anchored from the theoretical support of Ron Kurtus’s theory of security. It is to

know the types of possible attacks, to be aware of the motivations for attacks and your relationship to

those motives. The security or defense against such a threat is to make it difficult to attack, threaten

counter-measures, or make a pre-emptive attack on a source of threat. The study is also supported by the

Modernization theory of Max Weber (1864-1920) which suggests that traditional societies will develop

as they adopt practices that are more modern. And as modernization continues, maximizing its

advantages to the extent must be observed and used in the development of different communities.

Rational Choice theory anchors it by stating that individuals use rational calculations to make rational

choices and achieve outcomes that are aligned with their own personal objectives. Not all people have

the wealth power and are in control of the resources hence some uses harmful ways to somehow meet

their needs, and this is everlasting. Karl Marx even mentioned in conflict theory that society is in a state

of perpetual conflict because of competition for limited resources. Associated with the conflict theory is

the adaptation, which in psychology is an ability to adjust to new information and experiences.

Therefore, developing and maintaining friendly social bonds will be a fundamental organizing principle

of human behaviour and the threats to social safety are critical features of psychological stressors that

increase risk for disease, stated by Social Safety theory.

These six theories combined to make the concept of the study. As the modernization continues,

the use of technology also expands and scopes vast problems. Anticipation of these shall be considered

and providing different applications of security to all communities must be one of the prioritizations.

Crimes and terrible psychological intentions will always circulate in our society. Thus, we must be

prepared.
3

CONCEPTUAL FRAMEWORK

Independent variable Intervening variable Dependent variable

Signal strength and Alarm, warning, tracking


Thieves
delays system of the app

Figure 1 shows the independent variable of this study is the thieves since they affect or dictate

the functionality of the app’s system. Signal strength and delays are the intervening variable on account

to the day-to-day stability of the connections of different cellular networks such as Smart, Globe, and

Sun cellular. The dependent variable will be the system of the app as they depend on the actions done by

the suspect.

STATEMENT OF THE PROBLEM

The major concern of this study is to provide effective, reliable, and user-friendly mobile app

that assures security for the people’s belongings. Specifically, this study answers the following

questions;

1. What is the level of accuracy that the portable security app gives warning if the carnap vehicle passes

by?

2. What is the level of accuracy that the portable security app gives tracking system for GPS to

distinguish the location of carnap vehicles?

3. Is there a significant difference between the accuracy of portable security app in terms of giving

warning and tracking system for GPS?


4

SIGNIFICANCE OF THE STUDY

The importance of this study is to address the problem of thieving by giving the owner stricter

security for their belongings. It is a user-friendly app, meaning it will not give the owner difficulties on

what to click, command, and search to function properly. It is designed to be accurate as possible in

order that it will not cause false alarms and other huge problems. Also, the best thing about this concept

is that the app is shareable and if sanctioned legally then it can influence not just nationally but

internationally.

SCOPE AND DELIMITATION OF THE STUDY

The app is mainly designed to those who own smartphones. The owner should own two

smartphones or have someone that owns smartphone with them when they go out in public in order for

the app to work accordingly. The researchers will only select 50 respondents as there are thousands

living in Iligan City.

DEFINITION OF TERMS

Global Positioning System (GPS) – A feature which traces the location of the suspect if he ever

successfully got out of the scene.

Thieving – An act where someone steals the owners’ belongings in public.

Cellular Networks – Networks that provide internet or data to the owners when the app sends

requests for the owners to respond.


5

CHAPTER II

REVIEW OF RELATED LITERATURE

A prototype is a model that fills in as a reason for future models. Prototyping offers creators a

chance to investigate new other options and test the current plan to affirm an item's usefulness before

creation.

A prototype has many advantages, like the engineer and the implementer getting important input

from the client even before the genuine undertaking is begun. The real course of making model includes

the accompanying advances: Identify Basic Requirements: Basic not set in stone, including information

and yields information required. Beginning Prototype Creation: The underlying model is made. Survey:

The customers and the end-clients check the model and give significant criticism on increases or

cancellations. Additionally important changes are made to the eventual outcome. Update and Improve

the Prototype: Using the criticism from the customer and end client, both the particulars and the model

can be changed in like manner and improved. If changes are incorporated, a repeat of steps #3 and #4

may be required.

A prototype can be in the accompanying structures paper, 3D printing, advanced, little model or

restricted utilization item. These models can be categorized as one of the accompanying regions

practical, show or a little model. The functional prototype spotlight on the functions and not on the
6

looks. The display prototype spotlights on the looks and less on the capacity. The small model

consolidates both and is a more modest adaptation of the eventual outcome. They type of prototype to

create should be chosen dependent on the planned purpose behind the model, the mechanism of

utilization and the normal life span of the model.

Prototypes can be throwable or non-throwable sorts. They both have their own advantages. A

throwable sort is done just to find out about an item, while a non-throwable is one which upgrade can be

made to show up at the end result. (https://www.techopedia.com/definition/678/prototype)

TYPES OF PROTOTYPES

A (film) model, here a model is made utilizing video just to show others the thought in a

graphical/visual organization. Attainability Prototype, this sort of model is normally evolved to decide

the possibility of different arrangements. It is applied to the purpose specialized dangers appended to the

advancement as far as execution, similarity of parts and so on Flat Prototype, this is the UI as screen
7

captures, showing the external layer of the human interface just, like windows, menus, and screens. The

model is utilized to explain the extension and prerequisites of the item. Fast Prototype, the quick

prototyping strategy is utilized to rapidly design an underlying model of an item utilizing a three-

dimensional PC supported plan when you need to create something in a limited ability to focus.

Reenactments, this model is carefully making of an actual item to foresee the presentation of the item in

reality. Storyboard, a storyboard portrays an item in a type of a story and shows an average request

where data should be introduced. It helps in deciding useable successions for introducing data. Vertical

Prototype, an upward model is the back finish of an item like an information base age to test front end. It

used to further develop information base plan, test key parts at beginning phases or feature a functioning

model, however incomplete, to actually take a look at the key capacities. Wireframe, this is a skeleton an

item, portrayed as outlines or schematics that catch a part of plan like a thought, design, structure,

engineering or succession. Animation, these are pictures drawn and placed in a grouping that strolls you

through the proposed 3D design of the item/arrangement. Model, this is without any functionalities, just

to get generally visual of the item. It is an unpolished variant of the item with no dynamic provisions.

(Singaram, Muthu, and Prathistha Jain, 2018)

DIAGRAM OF PROTOTYPE MODEL:


8

ADVANTAGES OF PROTOTYPE MODEL:

Clients are effectively associated with the turn of events. Since in this approach a functioning

model of the framework is given, the clients improve comprehension of the framework being created.

Blunders can be recognized a whole lot sooner. Speedier client input is accessible prompting better

arrangements. Missing usefulness can be recognized without any problem. Troublesome functions can

be recognized necessities approval, speedy execution of, inadequate, however practical, application.

(http://tryqa.com/what-is-prototype-model-advantages-disadvantages-and-when-to-use-it/)

DISADVANTAGES OF PROTOTYPE MODEL:

It prompts carrying out and afterward fixing method of building frameworks. Essentially, this

strategy might build the intricacy of the framework as extent of the framework might extend past unique

plans. Fragmented application might cause application not to be utilized as the full framework was

planned Incomplete or deficient issue investigation. (http://tryqa.com/what-is-prototype-model-

advantages-disadvantages-and-when-to-use-it/)

FURTHER EXPLANATIONS AND EXAMPLES OF RAPID PROTOTYPING:

The possibility of quick prototyping as it applies to informative plan, is to foster learning

encounters in a nonstop plan assessment cycle that proceeds for the duration of the existence of the

venture. This cycle, known as the twisting cycle or layered methodology, is viewed as iterative,
9

implying that items are constantly improved as they cycle proceeds. This can be seen all the more

plainly by contrasting Rapid Prototyping and a customary advancement model:

CLASSIC DESIGN (WATERFALL) MODEL

Exemplary plan contains the accompanying advances; idea and necessities definition, primer and

itemized configuration, code execution, test and acknowledgment. Finally fussing in light of the fact that

you presently understand that there was something that got forgotten about back in Preliminary plan.

RAPID PROTOTYPING (SPIRAL) MODEL

Rapid prototyping contains the following steps; concept definition, implementation of a skeletal

system, client assessment and idea refinement, execution of refined necessities. Lastly, repeat the

following steps.

Rapid prototyping permits the originator to begin with a low constancy medium (like paper and

pen) and move to progressively higher loyalty models over the long haul. There are two sorts of models

that can be created; the Vertical Prototypes and Horizontal Prototypes. Vertical Prototypes, is a top to

bottom usefulness for a couple of elements. While Horizontal Prototype centers the whole screen with

no fundamental usefulness. Moreover, there are different drawn closer to prototyping: Paper models

(model: portal.acm.org), it is not difficult to change; clients see that it is simpler to change, frequently

tossing in shading or fine art make a utilization thing that they can't recommend changes. Post-it

Prototypes (example:www.pocketppcmac.com/archives/may03/eprototyping.asp), Wizard of Oz

Prototyping, Wireframe Prototypes / Wireframing is nothing visual, just shaded blocks explaining what
10

will be there, Storyboarding and Electronic prototypes (inspiration).

(https://www.instructionaldesign.org/models/iterative_design/rapid_prototyping/)

RAPID PROTOTYPING ADVANTAGES

"A team-friendly prototyping is more conducive to communication between designers and

developers." (Jia G., 2019)

Rapid prototyping assists designers with rapidly testing and emphasize on numerous plan

thoughts and strategies, permitting them to utilize more instinctive visual plan materials during

discussions, not simply verbal depictions. It likewise guarantees that everybody in question has a

predictable arrangement, diminishing or in any event, staying away from the danger of missing

significant necessities. At last, finishing programming configuration is quicker. First the time has come

saving, quick prototyping assists originators with getting criticism as ahead of schedule as conceivable

to all the more adequately work on their last plan, diminish the requirement for changes during

improvement, and increment usefulness. Second it is cost-saving, it tests at a beginning phase can save a

great deal of advancement cost and time. Time committed to back-final result design isn't squandered on

a defective intelligent interface. The model is the ideal chance to test the item before it is shipped off

improvement. Third it is a fast test, it assists designers with rapidly testing and repeat on various plan

thoughts and techniques, permitting them to utilize more instinctive visual plan materials during

discussions, not simply verbal depictions. It likewise guarantees that everybody in question has a

predictable arrangement, diminishing or in any event, keeping away from the danger of missing

significant necessities. At last, finishing the product configuration is quicker and more proficient.
11

RAPID PROTOTYPING STEPS

First do conceptualizing, prior to prototyping; conceptualizing is the best way of building a

profile for your portable/web applications or site. Disappointment is unavoidable in this interaction;

conceptualizing permits us to work through great and ill-conceived notions in a protected, minimal

expense way prior to putting time and energy into the improvement of a model. Whenever thoughts are

figured out, a low-constancy model can be made to mirror these thoughts. Second the Prototyping; while

quick prototyping, it's superfluous and impulsive to invest immense measures of energy refining little

subtleties at the earliest reference point. With the increment in prerequisite and subtleties, it is fine to

expand devotion as item certainty develops in the wake of testing, yet toward the start, it is ideal to

begin in low-loyalty. In this progression, use prototyping devices with solid coordinated effort includes

that permit fashioners and customers to make an appearance with their criticism. Third; have an

assessment, share models with clients and assess if it addresses their issues. Fourth is improvement,

distinguish the parts that need improvement or further refinement and lucidity dependent on client input.
12

Models generally start with fully exploring the vital course of the item. As the model goes

through refinement, subtleties become more intricate until a last model is finished and conveyed to the

engineer for definite turn of events. The time and cost of quick prototyping will shift contingent on the

intricacy of the item to be created. (Jia G., 2019)

RAPID PROTOTYPING SOFTWARE

There is an assortment of programming models, going from harsh portrays on paper to intuitive

models that are practically the same in capacity and appearance to the final result. The way to making an

excellent quick model is powerful combination of client criticism into the fitting prototyping technique

to propose a plan arrangement that best addresses the issues of the client.

1. Paper + Pen

Rapid prototyping capabilities: ★ ★★ ★★

Commonly known as hand-sketched prototypes, these can be built very quickly but the design drafts

are often difficult to save. This option is generally not suitable for large-scale project development.

2.  Mockplus

Rapid prototyping design capabilities: ★ ★★ ★

“Prototype faster, simpler, and easier,” Mockplus is suitable for mobile, tablet, web, and desktop

prototyping requirements. With simple and fast interactive design, highly encapsulated components,
13

multiple preview methods, and time-saving team collaboration options, Mockplus’ high-end and

practical features are favored by designers and product managers alike.

3. iDoc

Rapid prototyping capabilities: ★★ ★★ ★

A new product released by the Mockplus team at the end of 2018, iDoc is not only a

collaboration and design handoff tool, but it is also a total rapid prototyping tool.

It allows you to upload your wireframes and visual designs from Photoshop, Adobe XD, and Sketch

through the plugin, and add them to your project folder in iDoc for rapid prototyping by adding

interaction links.

Related: Basic UI/UX Design Concept Difference Between Wireframe, Prototype, and

Mockup(Updated)

4. Balsamiq

Rapid prototyping capabilities: ★ ★★

Balsamiq is a UX design tool for simple and fast low-fidelity prototypes. It lacks interaction

design, so it is best suited for low-fidelity prototyping design of Web projects. When compared to a

paper and pen sketch, it is not flexible enough; when compared to Axure, it is not accurate enough.

5. Axure

Rapid prototyping capabilities: ★ ★


14

A seasoned prototyping design tool, it provides comprehensive support through tutorials and

production requirement documentation. At the same time, its learning curve is very high due to the

complexity of its interactions. As such, this is best left to experienced designers.

BEST RAPID PROTOTYPING EXAMPLES

It’s easy to create prototypes with the help of rapid prototyping applications. The rapid

prototyping examples provided below will help beginners in UI/UX design (*not recommended for the

manufacturing industry).

1. Paper Prototyping

Flexible and easy, with pen and paper, you can draw almost anything, from a mobile app to a

website. The main drawback is the lack of ability to save and reuse the work.

2. Rapid Prototyping Example for Mobile App - Kitchen Stories (App, Food)
15

This is an interactive prototype of a mobile app. Loved by millions of users, Kitchen Stories enables

users to find delicious recipes with beautiful pictures. It also offers many free recipes and how-to videos.

3. Rapid Prototyping Examples for Website- Sketch (Web, Design Tool)

This is a high-fidelity prototyping example for a website. You can open the original files in

Mockplus software and create a website for yourself.

Related: 23 Best Mobile App and Website Wireframe Examples for Inspiration

CONCLUSION

With the clarification and model examination, I accept you presently have a reasonable piece of

information of what is quick prototyping now. With the assistance of quick prototyping, the more you

will save, and the quicker the improvement of your versatile application and site.

(https://www.mockplus.com/blog/post/what-is-rapid-prototyping)
16

RELATED STUDIES

The app named “D’Chapman-Search for Fugitives”, in this app is a provided profile of every

fugitive, contacts of policemen and their stations. With this app, we could help the policemen to locate

these escapists of cells and report them to the police station by using our app installed in every

smartphone if it will be published. Also, you can’t just help the police with this work but you can earn

money too.

The study's main goal is to design and develop an app that aids police officers and the

government in capturing and apprehending fugitives on the run while also reducing the risk of putting

your life in danger by programming the app in such a way that you are as safe as humanly possible from

the threats of a specific fugitive. The researcher’s objective is also to improve the relationship of the

civilians and policemen.

This study is only limited to owners of Smartphones and it is prone to false reports and trolls but

if this happens more than twice with the same phone, the application will be deleted instantly from your

device. It can also only be used when you have registered yourself in a police station as one of the

certified bounty hunters so it won’t be easy to use it to distract and misdirect the work of the police.

Based on the results and discussions from this study, the following conclusions are drawn:

1. The application is efficient in helping the policemen capture the fugitives while also being

safe and not in complete danger.

2. The application was completely functional and capable of fulfilling its objective based on the

information gathered.

3. The “D’chapman-search for fugitives” as an application is fully free to install therefore it is

available to every android phone user.


17

CHAPTER III

METHODOLOGY

This chapter discusses the procedures utilized in the device's planning and design of the

prototype that the researchers have been working on, entitled “Portable Security App with Warning and

Tracking System via IoT and GPS. This shows the researchers' methods, steps, and activities in order to

achieve the intended gadget.

RESEARCH DESIGN

Due to that fact that there are a lot of crimes that happen involving robbery of personal items, the

goal of this research is to remedy that situation, in which there will be a device that Is being developed

for this certain purpose, the device will be tested according to its accuracy, functionality, safety, and

aesthetics. This specific research will rely on the Descriptive Research Design in which it will help the

researcher attain information regarding to the status quo of the community. The goal of this method is to

explain and look into the causes of this certain problem. A survey with specific assertions will be

conducted to further describe the study as qualitative research.

RESEARCH ENVIRONMENT
18

The study will be conducted in public places such as City Malls, Parks or Local Spots, and

Markets by the researchers. The researchers believe that these locations will be the most suitable for

conducting the thievery case study to further look into of what’s expected of the device according to its

accuracy, functionality, safety, and aesthetics.

PARTICIPANTS OF THE STUDY

The researchers will look at different public spaces based on how each one has dealt with

burglaries in the past. Any anyone, whether or not they have personally experienced robbery, can be a

chosen respondent / participant because these types of scenarios can occur at any time and the victim

may be taken off guard when the crime occurs.

RESEARCH INSTRUMENTS

To obtain adequate information on burglary difficulties in a certain location, a researcher-made

survey questionnaire will be undertaken, in which workers from nearby establishments will be asked if

they have observed a burglary in the past, and it will also be given to a random person who is now in the

location. The researchers chose this research instrument because it was the most portable, viable, and

convenient way of gathering information from every chosen location.

DATA GATHERING PROCEDURE


19

To establish what types of steps should be performed, the researchers gathered all essential

information and data for the study. The research instruments will then be distributed to the participants /

responders, allowing them to assess the significance of the study.

During the data collection procedure, the following steps were taken: preparatory investigation

into the concerns, objectives, scope, and importance of the study. The researchers ensured that their

endeavour was successful in persuading the public to join the security system indicated in the study's

objective, importance, and purpose.

SCORING PROCEDURES

To answer the level of accuracy that the portable security app gives warning if the carnap vehicle

passes by will be checked and interpreting the respondent’s mean, the following are used:

Mean Score Qualifying Description

0.1 – 1.0 Not Accurate

1.1 – 2.0 Less Accurate

2.1 – 3.0 Average Accurate

3.1 – 4.0 More Accurate

4.1 – 5.0 Very Accurate

STATISTICAL TREATMENT
20

To describe the accuracy of portable security app, Mean and Standard deviation will be computed. T- test

for two independent samples will be used to determine if there is a significant difference on the level of accuracy

that the portable security app gives warning and tracking system for GPS. After the researchers calculate the

means of the two populations, the test hypothesis will be determined.

APPENDIX A

Sample Evaluation Form

Evaluation sheet

Name of Evaluator: _____________________________________________________________

Profession: ____________________________________________________________________

To whom it may concern;

Greetings!

We would like to ask for your participation in the evaluation of our research project entitled

“Accessible Online Security App with Warning and Tracking System via GPS”. This evaluation rates

the functionality, effectiveness, efficiency, and appearance of the app. Kindly rate the application

objectively and without bias.

Your evaluation is essential to our research. We send all our gratitude for your cooperation.

Sincerely,

Jan Brett C. Estrada

Judy Mae C. Magallo


21

Adrian M. Villanura

Please rate the statements accordingly:


5 – Strongly Agree 3 – Adequate
4 – Agree 2 – Disagree 1 – Strongly Disagree
I. Functionality and Efficiency
___ The Application is easy to use.
___ The Application functions properly.
___ The Application is easily accessible at all times.
___ The Application can contact the police.

II. Safety

___ the application is user-friendly.


___ the application is virus-free.
___ the application does not leak personal info.
___ the application is safe and easy to use.

III. Aesthetics

___ the application is presentable.


___ the application is marketable, fit to be offered, and available to acquisition.

Comments and Recommendations:


____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
__________________________________________________

Signature over Printed Name


______________________________
22

APPENDIX B

“Accessible Online Security App with Warning and Tracking System via GPS”

SURVEY QUESTIONNAIRE

Name (Optional) Gender:


Please answer the items honestly, as you could to realize the purpose of this questionnaire.
Put a check in the blank provided that corresponds to your opinion about the study described.
Legend:
5 – Very Accurate
4 – More Accurate
3 – Average Accurate
2 – Less Accurate
1 – Not Accurate
Level of accuracy of the warning feature that the accessible security app provides to the owners if their
belongings are being stolen,

Level of accuracy of the warning feature that the accessible 5 4 3 2 1


security app provides to the owners if their belongings are
being stolen.
1. The app’s ability to give warning and provide you all the data
immediately after you lost your bag in a certain distance.
2. The app’s ability to send you a command where you can choose
to allow or deny its function given the situation.
3. The app’s ability to give you all the details shortly after the
23

GPS system triggers.


4. The app’s ability to provide nearby police station numbers after
the GPS system activates.
5. The app’s three featured systems coordination and sequence.

Level of accuracy that the accessible security app gives 5 4 3 2 1


tracking system for GPS to distinguish the location of lost
items
1. The app’s ability to pin point where the bag is located.
2. The app’s ability to show landmark areas to where the bag is

located.
3. The app’s ability to measure the distance of the owner’s current
location to the place where the bag is missing.
4. The app’s ability to provide a map and location where the bag is

located.
5. The possibility of the app to provide location in a low-coverage

area.

Level of accuracy that the accessible security app gives off 5 4 3 2 1


alarming system to exactly locate the lost items
1. The delays in the alarm after it activates. (rate 5 for short
delays and 1 for long delays)
2. The alarm’s loudness for the owner to hear and locate the
missing item.
3. The alarm’s ability to attract public attention whenever it goes
off.
4. The alarm’s ability to turn off exactly accord to the
programmed time duration.
5. The alarm’s usefulness in locating the object within the
coverage.
24

You might also like