You are on page 1of 21

A MOBILE WEB-BASED STUDENT BEHAVIOR MANAGEMENT SYSTEM

CASE STUDY: MBARARA HIGH SCHOOL

By

AHWERA ATENSA

2020/BCS/O14/PS

DEPARTMENT OF COMPUTER SCIENCE

FACULTY OF COMPUTING AND INFORMATICS

ahweraatensa@gmail.com / 2020bcs014@std.must.ac.ug

+256784257126/ +256756111215

A Project Proposal Submitted to the Faculty of Computing and Informatics for the Study
Leading to a Project in Partial Fulfilment of the Requirements for the Award of the Degree
of Bachelor of Science in Computer Science Mbarara University of Science and Technology.

October, 2022.
CHAPTER ONE

1. Introduction

Behavior is defined as the way in which one acts or conducts oneself, especially towards others.
According to Wikipedia, the free encyclopedia, behavior is the range of actions and mannerisms
made by individuals, organisms, systems, or artificial entities in conjunction with themselves or
their environment, which includes the other systems or organisms around as well as the
(inanimate) physical environment. It is the response of the system or organism to various stimuli
or inputs, whether internal or external, conscious or subconscious, overt or covert,
and voluntary or involuntary.

According to Stewart et al, student misbehaviors such as disruptive talking, chronic avoidance of
work, clowning, interfering with teaching activities, harassing classmates, verbal insults,
rudeness to teachers, defiance, and hostility, ranging from infrequent to frequent, mild to severe,
is a thorny issue in everyday classroom. Teachers usually reported that these disturbing
behaviors in the classroom are intolerable and stress-provoking. Obviously, student misbehaviors
retard the smoothness and effectiveness of teaching and also impede the learning of the student
and his/her classmates. School misbehavior not only escalates with time but also lowers
academic achievement and increases delinquent behavior. Most students in schools find
themselves constantly in trouble at school due to different ranges of misbehavior. There are so
many ways to become distracted that include, teasing and bulling, disrespecting administrators,
being involved in strikes, dodging classes and other acts that are against the school rules and
regulations. This act of misbehavior has led to loss of fame among many schools in Uganda and
at most poor academic performance of students at their different levels of education.
Consideration of students’ academic results in secondary school admissions leaving out their
disciplinary records from their former schools has brought a challenge of handling the untamed
behaviors of such students in the current schools. It is therefore necessary for schools to use
disciplinary records as they enlighten them of their students’ conduct and also help them in the
context of admissions decision-making. This is believed to reduce the indiscipline among most
students having in their mind that any form of misconduct at one level or in one school could
affect them when joining another level of education or in case of changing the school.
1.2 BACKGROUND

According to Daniel Losen (2016), about 2.8 million American children were told at least once
during the 2013-2014 school year to leave public school for bad behavior. In the United States,
forcing a student to leave school is a punishment known as suspension. It is designed to stop
misbehaving students from interfering with classroom activities. But a number of recent studies
suggest the punishment does not work. One group, for example, found that suspended students
are more likely to be arrested by police or drop out of school. The Council of State Government
carried out the study. Another survey found that suspensions in 10th grade alone cost U.S.
taxpayers $35 billion for extra prison and social welfare spending. That finding came from
researchers at the University of California Los Angeles (UCLA). And suspensions may unfairly
target African-Americans, according to the U.S. Department of Education. It reported in June
that African-Americans are 3.8 times more likely to receive one or more suspensions as white
students. Education officials across the country are debating what to do with students, who talk
loudly in class, throw things at other students or arrive late. There is more agreement that a
student who physically attacks a fellow student or teacher should be expelled.

Students are placed at-risk for later low achievement and eventual drop out (Neild, Stoner-Eby,
& Furstenberg, 2008). They are likely to continue to receive discipline referrals (Atkins et al.,
2002) and be perceived by their teachers as uncooperative and defiant (Gregory & Weinstein,
2008). This all-encompassing view of risk obscures a more nuanced view of individuals within
context (American Psychological Association [APA] Task Force, 2008). Most low-achieving,
African American adolescents likely have a textured experience of their classroom teachers.
Their perceptions of teachers and their behavior may, in fact, vary from classroom to classroom.
Yet, little is known about what factors could help explain such variability. Given the deleterious
effects of perceived discrimination (Neblett, Philip, Cogburn, & Sellers, 2006), one promising
explanatory factor is student perceptions of unfair treatment. The current study follows a cohort
of African American high school students with a focus on variability in their cooperative and
defiant behavior with multiple classroom teachers. The study also examines whether student
perceptions of specific teachers as unfair are linked to increased risk for disciplinary referrals and
being perceived as defiant and uncooperative in those classrooms.
In Africa according to Wiley Periodicals (2010), many African adolescents who enter high
school with low achievement are at-risk for being perceived as defiant and uncooperative by
their classroom teachers. This generalized view of risk, however, offers little understanding of
the differentiated behavior these students have with their teachers. The study followed 35
African students, who have a history of low achievements, across multiple classrooms in their
school day. Hierarchical linear modeling showed that there was greater variability in teacher-
perceived defiance, cooperation, and office discipline referrals ‘‘within-student’’ compared with
‘‘between-students.’’ This shows that individual students tended to be perceived differently
across their teachers. Similarly, the study found that students also tended to differentiate their
teachers. Students who reported unfair treatment with a particular teacher were more likely to
receive a discipline referral and be perceived as defiant and uncooperative by that teacher.
Implications for a strengths-based approach to classroom behavior are discussed.

According to DoubleGist (2013), indiscipline is a great problem facing effectiveness of work in


the public and private sectors and in the school’s system in particular. It has generated bribery,
corruption, discrimination, hooliganism, absenteeism in the wider society in general and
destruction of property, cheating, examination mal-practices in most of the secondary schools in
Africa at large. Edwin(1974) Asserts that, the causes of indiscipline are numerous and diverse
that no individual can catalogue them. He says, indiscipline emanates from inadequate home
training on the part of the students, harsh school rules and regulations that students look at as
obstacles and sources of frustration and others. Weismann et al (October 29, 2009) asserts that, it
is notable that schools collect disciplinary information from applicants not to use it as a basis for
denying admission but as a solution to curb down indiscipline in schools. He adds that
indiscipline records have to be disclosed in order to trigger additional screening during
admissions rather than automatic disqualification. Using student disciplinary information is not
trying to keep students out but trying to find students who pose a significant risk to the
community.

On the ugandan scene according to Abaasa(2005), says that hardly a term passes without a
Ugandan school striking and the pattern is becoming bizarre with school property being
destroyed by students. For example, Ngabo academy School students went on rampage
destroying property worth millions of shillings, computers with their accessories were stolen,
others destroyed, dormitory windows smashed, school bus destroyed. By the time the police
from the nearby post arrived, the students were heading for the school administration block with
petrol to blaze it down. A good number was rounded up and are cooling off in kyamugolani
government prison. The police notified schools against admitting those students. Since no school
entertains indiscipline in its premises, they are on watch and strict about new students presenting
a report of good conduct as a requirement for admission.

It is therefore on this note that the researcher looks forward to designing “A Mobile Web-based
Student behavior management system” for Mbarara High School which for a past few years has
proved to be one of the notorious striking schools in western Uganda and being a last resort for
most students who are dismissed from different schools due to misbehavior, that will keep track
of the records of the misconduct students’ display during their academic journey in various
schools. The records will be centrally managed and accessed by various administrators during
admissions. This will enlighten schools of the kind of students they admit as well as class
teacher’s decision on whether to admit, promote a student, which stream to allocate a student,
when to call a student’s parent and when to expel a student.

1.2 Problem Statement

Indiscipline cases such as chronic avoidance of work, interfering with teaching activities,
harassing schoolmates, verbal insults, and rudeness to teachers, defiance, and strikes have led to
frequent underperformance in academics. Currently the school uses a manual system of
recording indiscipline cases in box files which is not efficient and the school finds it hard to
access the students’ conducts of misbehavior from previous schools, hard to determine the most
disciplined students in case they are awarding prizes, undisciplined students and at a risk of
losing all records in case of fire break out.
The proposed Mobile Web-based Student behavior management system is meant to link up
different schools which will help them share information regarding student’s behavior hence
improving the management of misconduct among students in schools and also enlighten schools
of the kind of students they admit and help in taming the untamed students to make them behave
as expected.
1.3 Objectives

1.3.1 Main Objective

To improve the management of student’s behavior using a Mobile Web-based Student behavior
management system

1.3.2 Specific Objectives

 Review related literature in order to gather requirements for the system.


 To design and develop a Mobile web-based management system for student’s behavior.
 Test and validate the system.
 To provide recommendations for the implementation of the developed system.

1.4 Scope

1.4.1Geographical scope

The system will basically be designed and installed for use on the servers of Mbarara High
School which is located in Mbarara City, Mbarara town in the western part of Uganda. It is from
here that the school will connect with the servers of other different potential schools from which
they most receive new students to evaluate their behavioral conduct before admission.

1.4.2Functional scope

This project will focus on students’ behaviors in secondary schools within Mbarara Town. The
system will capture students’ behavior inserted by the institution administrators, compute and
rank them, then store the data and process it to give off or produce analytical and accurate
information that can guide the institution administrators in proper decision making.

1.4.3Time scope

This study will last for five months from the time of writing the concept paper up to when the
system will be designed and installed for use by the specified stake holders.

1.5. Hypothesis
 Easy trucking of misconduct behaviors within secondary schools in Mbarara town.
 It will be made simple in trying to find students who pose a significant risk to the
community.
 Administrators of different secondary schools will be enlightened of their students’
conduct and also help them in the context of admissions decision-making.
 The continuous tracking of student’s misconduct is believed to reduce the rate of
misbehavior in secondary schools since it will be affecting their other steps taken in the
education career.

1.6 Research Questions

 What perceptions do teachers and administrators hold about the importance of discipline?
 What forms of behaviors are regarded as indiscipline in this school?
 What are the environmental causes of indiscipline?

1.7 Significance

 The rationale of this project is to develop a system that will help the administrators of
institutions in Uganda to capture, access statistical and analytical data on students’
behaviors.
 In addition to knowledge gained during this development, the researcher will get in
position to enhance his communication, reasoning and writing skills since all these will
be greatly deployed while carrying out this project.
 The system will also help the institution administrators to manage data and make clear
decisions basing on the analytical data.

 Enlighten schools of the kind of students they admit as well as class teacher’s decision on
whether to admit, promote a student, which stream to allocate a student, when to call a
student’s parent and when to expel a student.
CHAPTER TWO

LITERATURE REVIEW

2.1 Introduction

According to B.F. Skinner and Carl Rogers, behavior management is similar to behavior
modification. It is a less intensive version of behavior therapy. In behavior modification, the
focus is on changing behavior, while in behavior management the focus is on maintaining order.
Behavior management skills are of particular importance to teachers in the educational system.
Behavior management includes all of the actions and conscious in actions to enhance the
probability people, individually and in groups, choose behaviors which are personally fulfilling,
productive, and socially acceptable. Information Systems according to Silver et al. (1995) are
any organized system for the collection, organization, storage and communication of
information. More specifically, they are the study of complementary networks that people and
organizations use to collect, filter, process, create and distribute data. An information system is a
group of components that interact to produce information. Any specific information system aims
to support operations, management and decision making in organisations in this case schools,
and business processes. Information systems are used to manage behaviour by providing acts of
misconduct and ranks of various individuals regarding their previous indiscipline records.
Having this information shared among different schools helps in controlling and monitoring
student’s behaviour and at the end totally cubing out the acts of indiscipline in secondary
schools.

2.2 Definition of Indiscipline and some of the causes related to secondary schools.

The term “indiscipline” is a household word in Uganda today (Danuma, 2010). In fact, it is a
word that is found in government offices, private sectors, in politics and in all levels of
educational institutions. The trend in secondary schools in the present time is indiscipline of all
sorts. The trouble with the term is that every individual may know what they mean when they
talk about it, but individual meanings can still differ in a sense, therefore, we will at this juncture
present some of the meaning giving to the term by scholar in the literature.

Indiscipline according to Timothy,( 2008) is the direct opposite of discipline i.e., lack of
discipline. He further quoted Ditinuiya (1995) who defined it as any act that does not conform to
the societal value and norms. He went further to cite Otu (1995) who also define indiscipline as
unruly acts and behaviors, acts of lawlessness and disobedience to school rules and regulation.
Tuluchi & Bello, (1985) asserts that indiscipline is the breaking of rules and regulations of
institutions. Individuals willingly or unwillingly violate laid down rules of an institutions, which
hamper the smooth running of the institution. To this end, indiscipline can simply be seen as
mode of life NOT in conformity with rules and non-subjection to control. By extension, the term
connotes the violations of school rules and regulations capable of obstructing the smooth and
orderly functioning of the school system (Adeyemo, 1985) submitted. To cap it all, indiscipline
can be defined as any act, habit or behavior exhibited by the learners or students within the
school premises and outside the school, which attract condemnation (instead of praise) by the
public and/or the school staff.

2.3 Review of existing Student Discipline Tracking Systems

2.3.1 Mill Road Behavior System (MRBS)


The Mill Road Behavior System is based on the principles of applied behavior analysis,
primarily the principle of a token economy system. Positive reinforcement results in increase in
the rate of targeted behaviors. All students enter Mill Road School on a “white point sheet”
status. Contingent upon staying in class and maintaining academic and social standards, students
can earn a green sheet, gold sheet, gold card and platinum card. As students move up in the
system, they are afforded more responsibility and receive discounts on all items that are offered
within the school. (Almanza, H., & Mosley, W. 1980)
The strength of Mill Road Behavior System is that it enables students to have different privileges
according to their code of conduct or behavior. However, the Mill Road Behavior System also
like most web-based systems has weaknesses that include; The system uses paper-based cards
which may end up getting spoilt, forged or lost and the system is only operated or works for Mill
Road Behavior System yet students misconduct happens everywhere.
2.3.2 Sleuth
Sleuth is an electronic behavior tracking system that records and analyses behavior. It provides
an effective, consistent, whole school system for managing behavior, positive and negative.
Sleuth has been successful in contributing to improvements in behavior management in hundreds
of UK schools. Ames, C. (1992). Sleuth was designed specifically to track behavior. It is not a
whole school administration system or an add-on module for behavior management. Sleuth
shares data and works alongside MIS, Parent Portal and VLE so there is no need to compromise
ability to manage behavior by trying to do everything in your MIS. Strengthen of Sleuth is that
the system records observations about student behavior in detail and, unlike other systems, also
records all staff responses to student behavior in detail. Reviewing staff response to behavior is
essential to know whether your behavior policy works in practice. Weakness of Sleuth is that it
does not consider student’s misbehaviors before admitting them.

2.3.3 Behavior Watch


Behavior watch is an advanced web-based system which allows schools to centralize their own
recording systems and log incidents online, eliminating the need for paper-based reports. When
incidents are logged automatic emails alert relevant staff and intelligent analysis enable quick
identification of areas of concern. Most importantly the system is completely tailored to the
individual school’s needs.

2.4 Comparison of the reviewed System with the Proposed System

The current behavior systems only take into account the disciplinary records of students but do
not suggest any disciplinary action to be taken in case a student has the highest rank of behavior
misconduct. The proposed system will take into account what the standings of student’s behavior
are, rank the students from the most notorious to the list notorious and then give suggestion for
any for on disciplinary action that can be taken over an individual.

Proposed system capabilities

It will be web based, will allow real time access to information, there will be graphical
representation of data and data integrity.
The proposed system will further be capable of sharing information regarding student’s behavior
among different potential secondary schools around so that administrators are sure of the kind of
student being admitted discipline wise. There shall also be ranking of students according to the
acts of misbehavior exhibited and each rank will have a disciplinary action suggested to be taken
over those particular individuals that fall under it. For example, determining whether to expel a
student, give a suspension from school, which stream to allocate a student, whether to admit a
student referring to the previous school’s report on the discipline of an individual and most of it
all suggesting a reward for the most disciplined student in the school.

Characteristics MRBS Sleuth Behavior Watch Proposed system

Mobile Web based No Yes Yes Yes


Real time access to information No Yes No Yes
Graphical representation of data No No No Yes
Data integrity No Yes Yes Yes

Efficiency and dependability No No No Yes

Time saving during information No No No Yes


retrieval.
Minimizing the risks of losing No No Yes Yes
information in case of fire break
out and theft.
Linking up different various No No No Yes
schools to share information
regarding student’s behavior.
Easy tracking of well-disciplined No No No Yes
students for rewarding.
Guide in decision making No No No Yes

Table 1: Comparison of the reviewed System with the Proposed System

2.5 Conclusion
From different sources, I have managed to analyze and compare the existing students’ behavioral
management systems and therefore conclude that there is need to develop a better system to cater
for the weakness of the existing systems which is too manual and ineffective.
CHAPTER THREE

Methodology
3.1 Introduction
This section comprises of research/project design which describes the tools, instruments,
approaches, processes and techniques and data structures that are to be employed in the research
study, data collection, analysis, synthesis, design, logical flow, implementation, testing,
validation and many others. The methodology to be used in this project is waterfall model. 

WATERFALL MODEL
This methodology is a coherent description of the steps taken in the development of information
systems. The reason why it is referred to as the waterfall model should be obvious from the
following figure (Horner, 1993):

Diagrammatic illustration of waterfall model process

Requirements

Analysis

Design

Coding

Testing

Implementation

Figure 1: waterfall model diagram


This model of SDLC is closely related to structured system analysis and design. Waterfall
method involves a series of steps as follows;
i. Requirement gathering and analysis phase.
ii. System design.
iii. Implementation phase.
iv. Integration and testing phase.
v. System deployment phase.
vi. Maintenance phase.
Waterfall model illustrates the software development process in a linear flow hence it is also
called linear-sequential cycle model (Winston, 1970). Any phase/ unit in the development
process begins only if the previous phase is completed hence phases in waterfall do not overlap
(Jonasson, 2008). Waterfall methodology is a sequential design process. This means that as each
of the eight stages (conception, initiation, analysis, design, construction, testing, implementation,
and maintenance) are completed, the developers move on to the next step. As this process is
sequential, once a step has been completed, developers can’t go back to a previous step unless
the whole project is scratched and then start from the beginning. There’s no room for change or
error, so a project outcome and an extensive plan must be set in the beginning and then followed
carefully. 
The researcher prefers waterfall model from other models like Rapid Application Development
(RAD), Prototyping, Dynamic System Development, Spiral and many more others because the
waterfall methodology stresses meticulous record keeping. Having such records allows for the
ability to improve upon the existing program in the future. It helps the client to know what to
expect. They’ll have an idea of the size, cost, and timeline for the project. They’ll have a definite
idea of what their program will do in the end. In the case of employee turnover, waterfall’s
strong documentation allows for minimal project impact. However, waterfall model also has
some draw backs; for example, once a step has been completed, developers can’t go back to a
previous stage and make changes. Waterfall methodology relies heavily on initial requirements.
However, if these requirements are faulty in any manner, the project is doomed.

Requirement gathering and analysis phase

3.2 Data Collection Techniques


The techniques that will be used to collect data will be interviews and document review. These
techniques are elaborated below:

3.2.1 Interviews
This method is going to be used to acquire information from the director of studies at Mbarara
High School and Mary hill high school. This method is intended to attain hard facts, goals and
informal procedures. Interviews will be made because we could probe in great depth about how
schools captured and managed student’s behavior while at school. Again, personal contacts will
allow us to be responsive and adaptive to what the users of the system say. And lastly a lot of
time will be saved since the respondents are expected to be cooperative being of the elite class
and having encountered the problem that is being solved on several occasions. This will prompt
capturing of user requirements and attaining necessary insights in problem domain.

3.2.2 Document Review


This will be done by reviewing the documentation about the Student Behavior Information
Systems existing, studying the processing methods used to come up with the accurate records.
Through the use of written materials in form of internet materials and journals we shall be able to
gather information on concepts and challenges of the current system. Reports from the manual
system will be examined to identify the inputs, processes and outputs of the system.
3.3 System Analysis
In system analysis, requirements will be determined. The requirements include functional and
non-functional requirements basing on the system study.
Systems analysis is the process of looking at and summarizing data with the intent to extract
useful information and develop conclusions.
3.4 System Design
(i) Process Modeling
This will be achieved by use of DFDs to show processes and external entities in the system and
the end product will be a Data dictionary.

(ii)Data Modeling
This will be achieved by using ERDs to show the data requirements, model the entities and the
end product will be the structure of the relations in the relational schema (database).
3.4.1 Implementation Tools
In the implementation stage, the following tools are expected to be used; Wamp/Apache server,
MySQL, PHP, Microsoft Server Management Studio, JavaScript and Windows operating system,
and Microsoft Visual Studio(as the development environment)

3.4.2 Wamp/Apache Server


Wamp Server is a free server bundle that uses Apache server. When installed on the system, it
includes Apache, MySQL and PHP. Apache is a popular web server that many ISP’s and
individuals use to host web pages. When Apache is installed on the system, the machine
becomes a web server. Pages stored on the system in a special folder are accessible on the
Internet via the machine’s IP address. In order for pages to be viewed on the Internet, the files
must be stored in a special directory; this directory is usually called www.

3.4.3 PHP
Hypertext Preprocessor is an open-source server-side programming language extensively used
for web scripts. It is a popular server-side scripting language designed specifically for integration
with HTML and is used (often in conjunction with MySQL) in content Management System and
other web applications. It is available on many platforms, including Windows, Unix/Linux and
Mac OS X, and any open-source software.

3.4.4 MySQL
MySQL is an open-source relational database management system (RDBMS) that uses
Structured Query Language (SQL), the most popular language for adding, accessing, and
processing data in a database. Because it is open source, anyone can download MySQL and
tailor it to their needs in accordance with general public license. MySQL is noted mainly for its
speed, reliability, and flexibility. MySQL is designed as a multi-tasking/ multi-user database,
which is the main requirement for database.

3.4.5 HTML
HTML, referring to Hypertext Markup Language is the predominant markup language for web
pages. It provides a means to describe the structure of text-based information in a document by
denoting certain text as links, headings, paragraphs and lists among others and to supplement that
text with interactive forms, embedded images and other objects. HTML is written in the form of
tags, surrounded by angle brackets. HTML can also describe to some degree the appearance and
semantics of a document and include embedded scripting language code which can affect the
behavior of Web browsers and other HTML processor.

3.5 System Implementation

This is whereby the physical realization of the database and the application design is done. This
involves the implementation of both the database and the application programs. It will be
achieved by using the Data Definition Language (DDL) as well as the Data Manipulation
Language (DML) of the selected Database Management System (DBMS).
The system will capture students’ records data inserted by the institution administrators at all
levels of academic progress, compute and rank them as high, medium and low. They are ranked
by indicators of behavioural misconduct that fall in three categories such as; A, B and C as
shown in the table below. For each indicator a weight is assigned as shown in table 2 below.

Table showing behavioral misconduct grouped into three categories A, B and C.

Category A crimes Category B crimes Category C crimes


 Striking  Examination malpractices  Late coming
 Drug abuse and Alcohol  Fighting  Disrespecting others
consumption  Theft  Loitering in the
 Bullying  Coupling compound
 Murder  Escaping from school  Having missing
 Possession of weapons  Possession of unwanted class notes
 Dodging examinations properties  Intimidating others
 Vandalism  Missing classes
 Impersonation  Abuse of school uniform
 Falsification of documents  Dodging duties (assigned
house work)
Table 2: Table showing behavioral misconduct grouped into three categories A, B and C.

Table 3
CATEGORY RANK WEIGHT
A High 3
B Moderate 2
C Low 1
Table 3: Table showing categories, Rank and weight

Administrators shall be able to make more effective and efficient decisions when they have
the right data in the right form at the right time.
The Student Behaviour Information system will provide institution administrators with
instant access to a student’s entire disciplinary history, user-defined behaviours, behaviour
categories and information they need to make decisions during the admission process.
3.6 System Testing and Validation

3.6.1 Testing
This is the process of executing application programs with the intent of finding errors using
carefully planned test strategies and realistic data the system will be methodically and rigorously
tested to uncover faults in the application programs and the database structure. The faults will
then be corrected and the process be repeated until the system is proven to be working according
to users’ specification and performance requirements. This will be achieved by:

i. Testing the system performance, efficiency, disk space and its throughput to ensure
proper functioning of the system.
ii. Checking the compatibility of the system with different operating systems for example
Windows XP, Linux and Windows 7.
iii. Testing for security issues like resistance to remote attacks and authentication procedures

3.6.2 Validation
The validation process for the Student Behavior information system provides a high degree of
assurance that specific processes will consistently provide information which will meet
predetermined specification and quality attributes.
It will involve identifying compliance to quality capturing, storage and easy accessibility to data
for example user requirements specification and functional specification document controls and
various items of documentation for example user manuals, administrator documentation and
testing procedures

Ethical Issues in System Development

These are a list of ethical issues that are to be considered during the project development life
cycle and the actual programming in coming up with the information management system:
Using open-source code without properly crediting the source. Consuming illegal software to
achieve and accomplish tasks. Recoding shifts in business requirements. Not addressing business
requirements. Producing a workable prototype on time and within budget constraints
safeguarding and protecting data privacy. These are a list of ethical issues concerning the
completion of an undergraduate project: Protection and obscurity of participants. Break of
certainty/confidence, whereby the researcher might have access to commercially delicate data.
Concerning the customer; to get the consent of participants and educate them of the part they are
to play in the project. The behavior system will to some extent share information concerning
student’s conduct through apps and so when dealing with customers through app software, “it is
essential to use their information correctly and not falsely advertise their information” (Data
Protection Act 1998).

3.7 CONCLUSION
Conclusively, the Mobile Web-based Student behavior management system will generally cut
across the school’s processes of admission and the student’s way and acts of behavior bearing in
mind that any form of indiscipline will eventually affect them as they join other school hence
improvement on student’s discipline. This is hoped to be achieved by correctly following the
phases laid out in the methodology so as to get clear, efficient and reliable results at the end.
References

1. Almanza, H., & Mosley, W. (1980). Curriculum adaptations and modifications for culturally
diverse handicapped children. Exceptional Children, 46, 608-614.

2. American Psychological Association. (2000). Diagnostic and statistical manual of mental


disorders--Fourth edition--Text revision. Washington DC: American Psychiatric Publishing.

3. Ames, C. (1992). Home and school cooperation in social and motivational development.
Champaign, IL: Illinois University. (ERIC Document Reproduction Service No. ED 411629).

4. Banks, J. (1988). Ethnicity, class, cognitive, and motivational styles. Journal of Negro
Education, 57,452-467.

5. Bateman, B. D., & Linden, M. A. (1997). Better IEPs. Reston, VA: Council for Exceptional
Children.

6. Bennett, C. (1989). Teaching students as they would be taught. In B. Shade (Ed), Culture,
style, and the educative process (pp. 71-86). Springfield, IL: Charles C. Thomas.

7. Bossert, S. T. (1988). Cooperative activities in the classroom. In E. Rothkopf (Ed.), Review of


research in education (Vol. 15, pp. 225-250). Washington, DC: American Educational Research
Association.

8.Burnette, J. (1999). Critical behaviors and strategies for teaching culturally diverse students.
ERIC/OSEP Digest E584. Reston, VA: ERIC Clearinghouse on Disabilities and Gifted
Education. (ERIC Document Reproduction Service ED 435147).

9. Cairns, E., & Green, J. (1978). How to assess personality and social patterns: Observations or
ratings? In R. Cairns (Ed.), The analysis of social interactions (pp. 209-2261. Hillsdale, NJ:
Lawrence Erlbaum.

10. Carta, J., Renauer, M., Schiefelbusch, J., & Terry, B. (1998). Effective instructional
strategies to facilitate Classroom transitions, group instruction, independent performance, and
self-assessment. Kansas City, KS: Juniper Gardens Children's Project.
Time Schedule

ACTIVITY FEBRUARY MARCH APRIL MAY JUNE

Feasibility study 
Proposal writing 
Data collection 

Data analysis 
System design 
Coding and 
Validation
System 
Implementation
Report Writing  
and Presentation
Closure 

Appendix 1: Time schedule

You might also like