Chapter 1
Transcript of Chapter 1
![Page 1: Chapter 1](https://reader036.fdocuments.us/reader036/viewer/2022082901/56d6bea11a28ab301692f10d/html5/thumbnails/1.jpg)
LEYTE NORMAL UNIVERSITYCollege of Arts & Sciences
Tacloban City
LEYTE NORMAL UNIVERSITY E-GATEPASS
_____________________________________
A Research PaperPresented to
The Faculty of College of Arts and SciencesLeyte Normal University
Tacloban City
____________________________________
In Partial FulfillmentOf the Requirement in
Bachelor of Science in Information Technology
_____________________________________
By:
Charry Joy M. ArcenaStephen Rey M. BantuganRam Angelo R. Caceres
Vanessa Noelle R. Zamora
October 2014
CHAPTER 1
IT & Computer Education Unit
![Page 2: Chapter 1](https://reader036.fdocuments.us/reader036/viewer/2022082901/56d6bea11a28ab301692f10d/html5/thumbnails/2.jpg)
LEYTE NORMAL UNIVERSITYCollege of Arts & Sciences
Tacloban City
The Problem and its Background
Introduction
In today’s modern age where computers had become the way of life, it is evident that
some of the country’s institutions and schools still haven’t fully adapted from today’s high
technologies. Leyte Normal University, known as a Center of Excellence for Teacher Education
(COE) and one of five original Centers of Teaching Excellence in Eastern Visayas, have been
experiencing problems regarding the security of the school and of the students.
Only a few months ago, after typhoon Yolanda occurred, the school guards and personnel
were worried about the people going in and out of the campus, whether they are really students of
the University or not. Due to the strong typhoon, the only identification of every student, which is
their school IDs have been lost and damaged. After a while, they were records of people violating
the school rules, which are found in the Office of the Student Affairs. And as of now, the Chief
Security Guard, Mr. Jerauld M. Lerios, together with the school guards, said that they are having a
hard time checking the students entering the University, because they can’t clearly see the picture
of the student printed on their IDs. They can’t really determine if the student and the picture on the
student’s ID is the same. In some cases, students who forget their IDs might borrow an ID to their
classmate, or rather, people who are not students in the campus can easily get in by just borrowing
IDs.
We all know that the School guards are now operating at great pace in striving to serve
and secure the students inside the University. So, in the study, the researchers would want to
develop a software that will minimize the effort and work of the School guards by creating a Gate
Entry system for students that uses the barcode or student number on the Student ID, which can
display a large picture size of the student’s ID picture on a monitor. And by just one easy look, the
IT & Computer Education Unit
![Page 3: Chapter 1](https://reader036.fdocuments.us/reader036/viewer/2022082901/56d6bea11a28ab301692f10d/html5/thumbnails/3.jpg)
LEYTE NORMAL UNIVERSITYCollege of Arts & Sciences
Tacloban City
guards can now distinguish if the student is really wearing his or her own ID – a system that is
automated, user-friendly and time-efficient.
Statement of the Problem
The study aims to analyze the problems experienced by the Security Guards in Leyte
Normal University regarding in securing the entry of students at the gate.
Specifically, this study tries to answer the following questions:
1. What are the problems that LNU Security Guards encounter when students enter
the University in terms of security and time:
a. Identifying whether a student is officially enrolled in the current semester
b. Checking if the student and the student ID picture are of the same person
c. Identifying whether a student has an ID
2. What system prototype can be developed for the proposed system?
Theoretical Framework
In order for the researchers to fully understand the study and help the development of the
study we identified some theories that can be applied in the study.
Gatekeeeping Theory (Kurt Lewin, 1947). Kurt Lewin describes Gatekeeping as a wife or
mother that decides what food will be served in the family. The Gatekeeper is the person who
decides what shall pass through each gate section, of which, in any process, there are several.
In connection to our study, the system we are developing will be the gatekeeper which will
decide what shall pass through gate and the students and none students will be the one entering
the gate. Only students with validated identification card may enter.
IT & Computer Education Unit
![Page 4: Chapter 1](https://reader036.fdocuments.us/reader036/viewer/2022082901/56d6bea11a28ab301692f10d/html5/thumbnails/4.jpg)
LEYTE NORMAL UNIVERSITYCollege of Arts & Sciences
Tacloban City
Protection Motivation Theory (Rogers, 1983) is based on the work of Lazarus (1966) and
Leventhal (1970) and describes adaptive and maladaptive coping a threat as a result of two
appraisal processes. Threat Appraisal and Coping Appraisal, in which the behavioral options to
diminish the threat are evaluated (Boer, Seydel, 1996). Threat appraisal is the estimation of the
chance of a threat to occur while Coping Appraisal consists of response to prevent the threat. This
theory explains the importance of knowing the threat and prevent it from occurring.
We came up with system to cope with the problem of threats and security in Leyte Normal
University.
Conceptual Framework
In the light of the above-cited theoretical consideration, this conceptual framework was
formulated. Schematic diagram below shows how the researchers used the inputs to come up with
an output.
The researchers started this study by gathering the necessary inputs through interviewing
the respondents of the study. After they analyzed and interpret gathered data, they conceptualized,
created and designed the system. Once the system satisfies the needs of the respondents, it may
now be implemented and be developed.
IT & Computer Education Unit
INPUT
Observation
Planning
Interview
Questionnaire
Data Collection
Books and Articles
Software Resources
OUTPUT
Leyte Normal
University
E-Gatepass
PROCESS
Planning
Analysis
Design
Documentation
![Page 5: Chapter 1](https://reader036.fdocuments.us/reader036/viewer/2022082901/56d6bea11a28ab301692f10d/html5/thumbnails/5.jpg)
LEYTE NORMAL UNIVERSITYCollege of Arts & Sciences
Tacloban City
FEEDBACK
Figure 1.0 Conceptual Framework of Leyte Normal University E-Gatepass
Scope and Delimitation of the Study
The study highlights a system that displays the picture of the student entering the
university by using the barcode or the student number of the student’s ID. This study also focuses
on determining whether a student enrolled in the current semester.
However, the system is limited only to the students with validated School IDs, employees
and teachers are not allowed. Other forms of IDs and cards are not accepted.
Definition of Terms
For clearer understanding of the terms used in this study, below are their meanings:
E – Gatepass – it controls the entry as well as the exit hence at any given point of time
and it can have a record of number of student in the premises.
IT & Computer Education Unit
![Page 6: Chapter 1](https://reader036.fdocuments.us/reader036/viewer/2022082901/56d6bea11a28ab301692f10d/html5/thumbnails/6.jpg)
LEYTE NORMAL UNIVERSITYCollege of Arts & Sciences
Tacloban City
Barcode – a group of thick and thin lines that is placed on a product so that a computer
can get the price of the product and other information about it.
Barcode Scanner/Reader - captures and translates the barcode into number and / or
letters, the data must be sent to a computer so that a software application can make sense of the
data.
Student ID card – consist with student’s picture, name, student ID number, validation
mark, and barcode and it is issued to new students in the university.
IT & Computer Education Unit