Chapter 1

10
LEYTE NORMAL UNIVERSITY College of Arts & Sciences Tacloban City LEYTE NORMAL UNIVERSITY E-GATEPASS _____________________________________ A Research Paper Presented to The Faculty of College of Arts and Sciences Leyte Normal University Tacloban City ____________________________________ In Partial Fulfillment Of the Requirement in Bachelor of Science in Information Technology _____________________________________ By: Charry Joy M. Arcena Stephen Rey M. Bantugan Ram Angelo R. Caceres Vanessa Noelle R. Zamora IT & Computer Education Unit

Transcript of Chapter 1

Page 1: Chapter 1

LEYTE NORMAL UNIVERSITYCollege of Arts & Sciences

Tacloban City

LEYTE NORMAL UNIVERSITY E-GATEPASS

_____________________________________

A Research PaperPresented to

The Faculty of College of Arts and SciencesLeyte Normal University

Tacloban City

____________________________________

In Partial FulfillmentOf the Requirement in

Bachelor of Science in Information Technology

_____________________________________

By:

Charry Joy M. ArcenaStephen Rey M. BantuganRam Angelo R. Caceres

Vanessa Noelle R. Zamora

October 2014

CHAPTER 1

IT & Computer Education Unit

Page 2: Chapter 1

LEYTE NORMAL UNIVERSITYCollege of Arts & Sciences

Tacloban City

The Problem and its Background

Introduction

In today’s modern age where computers had become the way of life, it is evident that

some of the country’s institutions and schools still haven’t fully adapted from today’s high

technologies. Leyte Normal University, known as a Center of Excellence for Teacher Education

(COE) and one of five original Centers of Teaching Excellence in Eastern Visayas, have been

experiencing problems regarding the security of the school and of the students.

Only a few months ago, after typhoon Yolanda occurred, the school guards and personnel

were worried about the people going in and out of the campus, whether they are really students of

the University or not. Due to the strong typhoon, the only identification of every student, which is

their school IDs have been lost and damaged. After a while, they were records of people violating

the school rules, which are found in the Office of the Student Affairs. And as of now, the Chief

Security Guard, Mr. Jerauld M. Lerios, together with the school guards, said that they are having a

hard time checking the students entering the University, because they can’t clearly see the picture

of the student printed on their IDs. They can’t really determine if the student and the picture on the

student’s ID is the same. In some cases, students who forget their IDs might borrow an ID to their

classmate, or rather, people who are not students in the campus can easily get in by just borrowing

IDs.

We all know that the School guards are now operating at great pace in striving to serve

and secure the students inside the University. So, in the study, the researchers would want to

develop a software that will minimize the effort and work of the School guards by creating a Gate

Entry system for students that uses the barcode or student number on the Student ID, which can

display a large picture size of the student’s ID picture on a monitor. And by just one easy look, the

IT & Computer Education Unit

Page 3: Chapter 1

LEYTE NORMAL UNIVERSITYCollege of Arts & Sciences

Tacloban City

guards can now distinguish if the student is really wearing his or her own ID – a system that is

automated, user-friendly and time-efficient.

Statement of the Problem

The study aims to analyze the problems experienced by the Security Guards in Leyte

Normal University regarding in securing the entry of students at the gate.

Specifically, this study tries to answer the following questions:

1. What are the problems that LNU Security Guards encounter when students enter

the University in terms of security and time:

a. Identifying whether a student is officially enrolled in the current semester

b. Checking if the student and the student ID picture are of the same person

c. Identifying whether a student has an ID

2. What system prototype can be developed for the proposed system?

Theoretical Framework

In order for the researchers to fully understand the study and help the development of the

study we identified some theories that can be applied in the study.

Gatekeeeping Theory (Kurt Lewin, 1947). Kurt Lewin describes Gatekeeping as a wife or

mother that decides what food will be served in the family. The Gatekeeper is the person who

decides what shall pass through each gate section, of which, in any process, there are several.

In connection to our study, the system we are developing will be the gatekeeper which will

decide what shall pass through gate and the students and none students will be the one entering

the gate. Only students with validated identification card may enter.

IT & Computer Education Unit

Page 4: Chapter 1

LEYTE NORMAL UNIVERSITYCollege of Arts & Sciences

Tacloban City

Protection Motivation Theory (Rogers, 1983) is based on the work of Lazarus (1966) and

Leventhal (1970) and describes adaptive and maladaptive coping a threat as a result of two

appraisal processes. Threat Appraisal and Coping Appraisal, in which the behavioral options to

diminish the threat are evaluated (Boer, Seydel, 1996). Threat appraisal is the estimation of the

chance of a threat to occur while Coping Appraisal consists of response to prevent the threat. This

theory explains the importance of knowing the threat and prevent it from occurring.

We came up with system to cope with the problem of threats and security in Leyte Normal

University.

Conceptual Framework

In the light of the above-cited theoretical consideration, this conceptual framework was

formulated. Schematic diagram below shows how the researchers used the inputs to come up with

an output.

The researchers started this study by gathering the necessary inputs through interviewing

the respondents of the study. After they analyzed and interpret gathered data, they conceptualized,

created and designed the system. Once the system satisfies the needs of the respondents, it may

now be implemented and be developed.

IT & Computer Education Unit

INPUT

Observation

Planning

Interview

Questionnaire

Data Collection

Books and Articles

Software Resources

OUTPUT

Leyte Normal

University

E-Gatepass

PROCESS

Planning

Analysis

Design

Documentation

Page 5: Chapter 1

LEYTE NORMAL UNIVERSITYCollege of Arts & Sciences

Tacloban City

FEEDBACK

Figure 1.0 Conceptual Framework of Leyte Normal University E-Gatepass

Scope and Delimitation of the Study

The study highlights a system that displays the picture of the student entering the

university by using the barcode or the student number of the student’s ID. This study also focuses

on determining whether a student enrolled in the current semester.

However, the system is limited only to the students with validated School IDs, employees

and teachers are not allowed. Other forms of IDs and cards are not accepted.

Definition of Terms

For clearer understanding of the terms used in this study, below are their meanings:

E – Gatepass – it controls the entry as well as the exit hence at any given point of time

and it can have a record of number of student in the premises.

IT & Computer Education Unit

Page 6: Chapter 1

LEYTE NORMAL UNIVERSITYCollege of Arts & Sciences

Tacloban City

Barcode – a group of thick and thin lines that is placed on a product so that a computer

can get the price of the product and other information about it.

Barcode Scanner/Reader - captures and translates the barcode into number and / or

letters, the data must be sent to a computer so that a software application can make sense of the

data.

Student ID card – consist with student’s picture, name, student ID number, validation

mark, and barcode and it is issued to new students in the university.

IT & Computer Education Unit