Thesis final Ch. 1-3

download Thesis final Ch. 1-3

of 50

Transcript of Thesis final Ch. 1-3

  • 8/10/2019 Thesis final Ch. 1-3

    1/50

    EMILIO AGUINALDO COLLEGE

    1

    THE USE OF MODERN TECHNOLOGIES IN THE

    SUPPRESSION OF CRIMES IN SELECTED

    BARANGAYS IN TONDO MANILA

    A Thesis Presented to the Faculty of

    The School of Criminology

    Emilio Aguinaldo College

    Ermita, Manila

    In

    Partial Fulfillment

    of the Requirements for the Degree of

    Bachelor of Science in Criminology

    By:

    GJENERRICK CARLO R. MATEOJOHN MAHATMAL.BARLAM

    JOHN CLARKS.NAYREALYSSA CAMILLE R. BAUTISTA

    KIMBERLY MARIAH JACQUELINE C. DOMINGO

    October, 2014

    http://www.google.com.ph/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&docid=tMnCU8F5vpAIcM&tbnid=TTtYDGlKoZfc6M:&ved=0CAUQjRw&url=http://en.wikipedia.org/wiki/Emilio_Aguinaldo_College&ei=J4P2UfrAI8W9kAXWzYDoBQ&bvm=bv.49784469,d.dGI&psig=AFQjCNHr0soYGqgZ9MMLpjMkBWwYtqAO7w&ust=1375196316520542
  • 8/10/2019 Thesis final Ch. 1-3

    2/50

    EMILIO AGUINALDO COLLEGE

    2

    Chapter 1

    THE PROBLEM AND ITS BACKGROUND

    Introduction

    According to Walsh, the term criminal can and has been applied to many types of

    behavior, some of which nearly all of us have been guilty of at some time in our lives. We

    call think of acts that we feel ought to be criminal but are not, or acts that should not be

    criminal but are. Paul Tappan in 1947 defined crime as an international act in violation

    of the criminal law committed without defense or excuse, and penalized by the state.

    A crime is thus an act or omission in violation of law for which punishment is prescribed;

    the person committing it must have intended to do so and must have done so without

    legally acceptable defense or justification.

    Many studies have already been conducted since 18thcentury just to determine

    the causes of criminality and criminal behavior. Because of this, many theories have

    arisen from the minds of different scalars across the globe, they have different ideas, but

    they share only one purpose, and that is to provide an answer.

    http://www.google.com.ph/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&docid=tMnCU8F5vpAIcM&tbnid=TTtYDGlKoZfc6M:&ved=0CAUQjRw&url=http://en.wikipedia.org/wiki/Emilio_Aguinaldo_College&ei=J4P2UfrAI8W9kAXWzYDoBQ&bvm=bv.49784469,d.dGI&psig=AFQjCNHr0soYGqgZ9MMLpjMkBWwYtqAO7w&ust=1375196316520542
  • 8/10/2019 Thesis final Ch. 1-3

    3/50

    EMILIO AGUINALDO COLLEGE

    3

    Some say that there are factors to be considered as reasons, like when some of

    them explains that the non-existence of norms in a society encourages a person to

    commit unlawful acts, some claimed that the body type of the person has something to

    do with regards to his criminal behavior, others put emphasis on a persons set of needs

    required for his survival and according to them, failure of a person to attain this needs

    will result in criminality, others blamed the bad spirits, others said it is inherited, but there

    is one theory that was appreciated by the majority and also accepted to stand as basis

    for the explanation of the causes of criminality and criminal behavior. The differential

    associational theory of Edwin Sutherland who is considered as the Dean of Modern

    Criminology by stating that Criminal Behavior is Learned and NOT Inherited

    Crime is learned through socialization of communication with other people. The

    techniques of committing crimes are also learned by participation with other people or

    group of people through verbal and non-verbal means Sutherland

    Crime happens in the environment, and just like a contagious disease it affects

    the members of society and just easily spread all throughout the world.Because of

    Sutherlands brilliant explanation about crimes and criminality, it was universally

    accepted even up until now. And since crime happens in the environment agencies all

    over the world utilized Police visibility as means of crime prevention. A Proactive Law

    Enforcement strategy that lessens the possibility of the occurrence of crimes by instilling

    fear or deterrence in the minds of possible criminal offenders.

    http://www.google.com.ph/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&docid=tMnCU8F5vpAIcM&tbnid=TTtYDGlKoZfc6M:&ved=0CAUQjRw&url=http://en.wikipedia.org/wiki/Emilio_Aguinaldo_College&ei=J4P2UfrAI8W9kAXWzYDoBQ&bvm=bv.49784469,d.dGI&psig=AFQjCNHr0soYGqgZ9MMLpjMkBWwYtqAO7w&ust=1375196316520542
  • 8/10/2019 Thesis final Ch. 1-3

    4/50

    EMILIO AGUINALDO COLLEGE

    4

    Deterrence is the main key in the effectiveness of this method. However, there

    are still some places in the Philippines wherein the utilization of Police Omnipresence is

    nearly impossible, especially in rural areas or provinces, and even in the dark streets of

    Metro Manila. The absence of deterrence might raise the possibility for criminality to

    occur. Criminals might just evade the punishment provided for the crime which they have

    committed especially when there is no witness.

    So, what might be the possible measures to take to provide solution to a crime

    that was committed because of the absence of deterrence on the part of the offenders?

    What would be the possible steps to be considered as recourse by someone who was

    victimized by a robber in one of the darkest allies in tondo? By the parents of a high

    school student who was raped in the backyard of the school in which shes enrolled? Or

    even by an Actor who was illegally detained, tied up and got beaten up by a group of

    men in one of the most fancy condominiums in Taguig?

    As we all know, on January 22, 2014 (Wednesday), Its Showtime host Vhong Navarro

    was allegedly tied up and attacked by a group of men inside a condominium unit in Fort

    Bonifacio, Taguig.

    http://www.google.com.ph/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&docid=tMnCU8F5vpAIcM&tbnid=TTtYDGlKoZfc6M:&ved=0CAUQjRw&url=http://en.wikipedia.org/wiki/Emilio_Aguinaldo_College&ei=J4P2UfrAI8W9kAXWzYDoBQ&bvm=bv.49784469,d.dGI&psig=AFQjCNHr0soYGqgZ9MMLpjMkBWwYtqAO7w&ust=1375196316520542
  • 8/10/2019 Thesis final Ch. 1-3

    5/50

    EMILIO AGUINALDO COLLEGE

    5

    His suspect is a businessman named Cedrick Lee together with its companion.

    Lee admitted that he and his companions are the ones responsible for beating up

    Navarro but just for purposes of defending his friend DenieceCornejo who according to

    Lee is about to be raped by Navarro. Contrary to the statement of Navarro who denied

    being a rapist, claiming that the incident was a setup.

    However, Lee has his witnessed and on the other hand Navarro has no evidence

    to prove his version of story. But on January 29, 2014 the National Bureau of

    Investigation released video footages from Forbeswood Condominium that became a

    turning point to the case providing what really happened. Because of this, it is evident

    that utilizing modern technologies is an important method in elucidating the truth for the

    proper administration of justice and to effectively suppress criminality.

    The main objective of this study is to provide the public in general, the citizens, or

    members of the community, law enforcement agencies, barangay officials, security

    agencies, the different branches of the government, the local government of Manila, and

    others nationwide, the knowledge regarding the benefits of utilizing modern technologies

    in the suppression of crimes, to furnish them information that was scientifically acquired

    through research with regards to its effectiveness, to propose the use of modern

    technologies as security measures in both public and private establishments by stating

    its importance and most of all to make our contributions by exerting our efforts as

    responsible members or the society in the pursuit of total absence of criminality and to

    support the continuous improvement of public safety.

    http://www.google.com.ph/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&docid=tMnCU8F5vpAIcM&tbnid=TTtYDGlKoZfc6M:&ved=0CAUQjRw&url=http://en.wikipedia.org/wiki/Emilio_Aguinaldo_College&ei=J4P2UfrAI8W9kAXWzYDoBQ&bvm=bv.49784469,d.dGI&psig=AFQjCNHr0soYGqgZ9MMLpjMkBWwYtqAO7w&ust=1375196316520542
  • 8/10/2019 Thesis final Ch. 1-3

    6/50

    EMILIO AGUINALDO COLLEGE

    6

    Theoretical Framework.

    The continuous increase in crime rate and in improper administration of justice

    became a major problem not only for law enforcement officers but also for every

    responsible members of the community as well as for all the participants in the criminal

    justice system. The utilization of modern technologies became a necessity for everyone

    who is in pursuit for the total absence of criminality and criminal behavior as well as for

    those who are trying to attain a safe place to live, invests and do business with.

    The dissemination of information regarding the effectiveness of modern

    technologies in the suppression of crimes and its contribution in the proper

    administration of justice is the purpose of conducting this study. Various studies have

    been conducted for assessing the effectiveness of modern technologies in the

    suppression of crimes.

    The theory underlying the effectiveness of public surveillance technology as a

    crime control tool is based on the belief that, if potential offenders know they are being

    watched, they will refrain from criminal activity. This belief is consistent with rational

    choice theory, which posits that potential offenders make purposeful, rational (albeit

    bounded) decisions to commit crimes after weighing the potential costs and benefits of

    the crime in question. Also, Video footagedocumenting crimes that transpired and

    http://www.google.com.ph/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&docid=tMnCU8F5vpAIcM&tbnid=TTtYDGlKoZfc6M:&ved=0CAUQjRw&url=http://en.wikipedia.org/wiki/Emilio_Aguinaldo_College&ei=J4P2UfrAI8W9kAXWzYDoBQ&bvm=bv.49784469,d.dGI&psig=AFQjCNHr0soYGqgZ9MMLpjMkBWwYtqAO7w&ust=1375196316520542
  • 8/10/2019 Thesis final Ch. 1-3

    7/50

    EMILIO AGUINALDO COLLEGE

    7

    identifying perpetrators and witnesses may aid in investigations and prosecutions,

    increasing police and prosecutorial efficiency, benefiting victims of crimes whose cases

    are able to be closed through the use of video evidence, and incapacitating a greater

    number of offenders from committing future crimes. -

    (http://www.cops.usdoj.gov/Publications/e071112381_EvalPublicSurveillance.pdf p4,5)

    Millions of closed-circuit television (CCTV) cameras are installed in streets and

    businesses throughout the world with the stated goal of reducing crime and increasing

    public safety. The United Kingdom is one of the most enthusiastic proponents, with an

    estimated 1.9 million cameras in 2011 one for every 32 U.K. residents and the

    number continues to rise. Chicago reportedly has at least 15,000 cameras installed in

    one of the largest U.S. networks which has prompted civil liberties groups to express

    strong concerns while in New York, cameras are increasingly found both on public

    transit as well as in businesses and even high-end residences. The 9/11 attacks led

    many municipalities to start installing CCTV systems. - See more at:

    http://journalistsresource.org/studies/government/criminal-justice/surveillance-cameras-

    and-crime#sthash.feM704Zs.dpuf

    http://www.google.com.ph/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&docid=tMnCU8F5vpAIcM&tbnid=TTtYDGlKoZfc6M:&ved=0CAUQjRw&url=http://en.wikipedia.org/wiki/Emilio_Aguinaldo_College&ei=J4P2UfrAI8W9kAXWzYDoBQ&bvm=bv.49784469,d.dGI&psig=AFQjCNHr0soYGqgZ9MMLpjMkBWwYtqAO7w&ust=1375196316520542
  • 8/10/2019 Thesis final Ch. 1-3

    8/50

    EMILIO AGUINALDO COLLEGE

    8

    Here in the Philippines, several barangays and business establishments started

    the utilization of modern technologies in the prevention of crimes by instilling fear of

    apprehension in the mind of the would be criminal offender as well as to suppress crime

    once it was committed by determining the perpetrator with the use of Closed-Circuit

    Television (CCTV).

    This study will determine the effectiveness of modern technologies in combatting

    crime in the city of Manila and to disseminate the information to its benefactors by

    collecting all the data and information from different barangays, law enforcement

    agencies and business establishments and making an assessment after thorough

    evaluation and scientific analysis.

    http://www.google.com.ph/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&docid=tMnCU8F5vpAIcM&tbnid=TTtYDGlKoZfc6M:&ved=0CAUQjRw&url=http://en.wikipedia.org/wiki/Emilio_Aguinaldo_College&ei=J4P2UfrAI8W9kAXWzYDoBQ&bvm=bv.49784469,d.dGI&psig=AFQjCNHr0soYGqgZ9MMLpjMkBWwYtqAO7w&ust=1375196316520542
  • 8/10/2019 Thesis final Ch. 1-3

    9/50

    EMILIO AGUINALDO COLLEGE

    9

    Figure 1.

    Conceptual Paradigm

    Effectiveness

    of modern

    technologies

    in the

    suppression

    of crimes

    Theory Conduct

    surveys in

    barangays

    w/in the city

    of Manila as

    well as to ask

    for datas

    and

    information

    from Law

    EnforcementAgencies.

    Record and

    Organize all useful

    collected datas

    and information.

    Make a thorough

    Interpretation of

    collected datas

    and information

    by means of

    statistics and

    scientific analysis.

    -Assessment of

    the Effectiveness

    of utilizing

    modern

    technologies in

    the suppression

    of crimes

    -Effects in crime

    control becauseof its utilization

    -Information

    regarding its

    effectiveness

    -Proposal of its

    use by stating its

    importance

    throughpresentation

    INPUT Process OUTPUT

    Study basis

    Data and

    Information

    Gathering

    Evaluation of

    collected datas

    and information

    Interpretation of

    collected datas

    and informationOutcome

    http://www.google.com.ph/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&docid=tMnCU8F5vpAIcM&tbnid=TTtYDGlKoZfc6M:&ved=0CAUQjRw&url=http://en.wikipedia.org/wiki/Emilio_Aguinaldo_College&ei=J4P2UfrAI8W9kAXWzYDoBQ&bvm=bv.49784469,d.dGI&psig=AFQjCNHr0soYGqgZ9MMLpjMkBWwYtqAO7w&ust=1375196316520542
  • 8/10/2019 Thesis final Ch. 1-3

    10/50

    EMILIO AGUINALDO COLLEGE

    10

    Statement of Problem

    This study determines the use of Modern Technologies in the Suppression of

    Crimes in the Selected Barangays in Tondo Manila.Specifically the following problem will

    be answered in this study:

    Specifically the following problem will be answered in this study:

    1. The Personal Profile of the Respondents in terms of:

    1.1.1. Age

    1.2. Sex

    1.3. Civil status

    1.4. Educational Attainment

    1.5. Length of stay in the locality

    2. What are the common crimes committed within the community according to the

    record of the police station?

    3. What are the advantages of utilizing modern technologies relative crime prevention

    and suppression?

    4. What are the respondents recommended modern technologies necessary for the

    enhancement of security in selected Barangays in Tondo Manila?

    http://www.google.com.ph/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&docid=tMnCU8F5vpAIcM&tbnid=TTtYDGlKoZfc6M:&ved=0CAUQjRw&url=http://en.wikipedia.org/wiki/Emilio_Aguinaldo_College&ei=J4P2UfrAI8W9kAXWzYDoBQ&bvm=bv.49784469,d.dGI&psig=AFQjCNHr0soYGqgZ9MMLpjMkBWwYtqAO7w&ust=1375196316520542
  • 8/10/2019 Thesis final Ch. 1-3

    11/50

    EMILIO AGUINALDO COLLEGE

    11

    Assumptions

    1. the utilization of modern technologies will help the people in their pursuit for the total

    absence of criminality.

    2. The utilization of modern technologies will be an effective way to assist the state in

    the proper administration of justice.

    3. The utilization of modern technologies will not only prevent the occurrence of crimes

    but also an effective method of suppressing it.

    4. The utilization of modern technologies will also be an effective way to assure ones

    feeling of safety and security.

    5. The utilization of modern technologies was used to monitor and record images of

    what takes place in specific locations in real time.

    Significance of the Study

    The ultimate benefactors of this study are:

    The community the citizenswho lives in the City of Manila particularly in Tondo. will

    be educated or be provided with knowledge regarding easy and efficient methods of

    pursuing justice with the help of modern technologies.

    Law Enforcement Agencies to inform them of the necessity of utilizing modern

    technologies as a helpful method in fulfilling their duty particularly in criminal

    investigation.

    http://www.google.com.ph/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&docid=tMnCU8F5vpAIcM&tbnid=TTtYDGlKoZfc6M:&ved=0CAUQjRw&url=http://en.wikipedia.org/wiki/Emilio_Aguinaldo_College&ei=J4P2UfrAI8W9kAXWzYDoBQ&bvm=bv.49784469,d.dGI&psig=AFQjCNHr0soYGqgZ9MMLpjMkBWwYtqAO7w&ust=1375196316520542
  • 8/10/2019 Thesis final Ch. 1-3

    12/50

    EMILIO AGUINALDO COLLEGE

    12

    Barangay Officials To propose the installations of cctv and other gadgets that can

    increase the safety and security within their community.

    Security AgenciesTo provide them information regarding modern technologies that

    will enhance their capacity in providing security within the establishment they are

    employed.

    Branches of GovernmentTo inform them all the help that can be provided of modern

    technologies particularly in security, crime prevention, crime suppression and even in the

    effective, efficient and appropriate means of administering justice.

    Scope of Limitation

    The study will determine the effectiveness of Modern Technologies utilized in the

    suppression of crimes in Tondo Manila. Covering Selected Barangays in Tondo Manila

    and Police Stations 1 and 7. It encompasses all strategies in determining crimes inside

    the City of Manila particularly in Tondo. However, in several places they have their own

    techniques and different ways in detecting crimes which is not subject for furtherance of

    study. It focuses on the strict and active monitoring of the conditions of the community so

    as to suppress all the kinds of evil motive which result to wrongful acts. But it does not

    help all the time to suppress the crime because the funds of local government of Manila

    for public security is not sufficient, which the government should take proper action in

    promulgating the safety of every person who lives in the City of Manila.

    http://www.google.com.ph/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&docid=tMnCU8F5vpAIcM&tbnid=TTtYDGlKoZfc6M:&ved=0CAUQjRw&url=http://en.wikipedia.org/wiki/Emilio_Aguinaldo_College&ei=J4P2UfrAI8W9kAXWzYDoBQ&bvm=bv.49784469,d.dGI&psig=AFQjCNHr0soYGqgZ9MMLpjMkBWwYtqAO7w&ust=1375196316520542
  • 8/10/2019 Thesis final Ch. 1-3

    13/50

    EMILIO AGUINALDO COLLEGE

    13

    Definition of Terms

    For the purpose of better understanding, the following terms were defined

    operationally:

    Crime- An act or omission that is punishable by the law. (Criminology Memory Aid)

    Criminality- The quality, state or fact about being criminal. (Websters New World

    Dictionary)

    Criminal Offender- A person that violates a law. (Criminology Memory Aid)

    Deterrence- To keep of discourage from doing something by instilling fear, anxiety or

    doubt. (Websters New World Dictionary)

    Modern- Having to do with the latest styles, methods or ideas. (Websters New World

    Dictionary)

    Modern Technology- Characterized by using the most up-to-date machinery and

    equipment developed from the application at scientific knowledge.

    Police Omnipresence- The civil force of a national or local government (by instilling)

    that ispresent in a place.

    Suppression- An action suppressing something such as an activity. (Websters New

    World Dictionary)

    Technology- The science or study of the practical or industrial arts and applied science

    (Websters New World Dictionary)

    Utilize- Make practical and effective use of. (Websters New World Dictionary)

    http://www.google.com.ph/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&docid=tMnCU8F5vpAIcM&tbnid=TTtYDGlKoZfc6M:&ved=0CAUQjRw&url=http://en.wikipedia.org/wiki/Emilio_Aguinaldo_College&ei=J4P2UfrAI8W9kAXWzYDoBQ&bvm=bv.49784469,d.dGI&psig=AFQjCNHr0soYGqgZ9MMLpjMkBWwYtqAO7w&ust=1375196316520542
  • 8/10/2019 Thesis final Ch. 1-3

    14/50

    EMILIO AGUINALDO COLLEGE

    14

    CHAPTER 2

    REVIEW OF RELATED STUDIES AND LITERATURES

    In this chapter, the researchers will bring additional information and ideas related

    to the topic which were taken from literatures and studies. The researcher also believes

    that this would help to make this study more understandable and accurate.

    Foreign Literature.

    Modern Technology (sample-essay-modern-technology-paragraphs.pdf)

    Accessibility to a wide range of options has been expanded through modern

    technology. Never before could people cross a continent or an ocean in an afternoon.

    Travel is not the only way technology has created accessibility. Software which types

    from voice commands has made using computers more accessible for school or work.

    People with special needs have many new options thanks to modern technology such

    as special chairs or text readers. Actually, those people who need hearing aids as a

    result of normal aging have access to continued communication and enjoyment of

    entertainment they did not previously have. There are many ways technology has

    improved lives through increased accessibility.

    http://www.google.com.ph/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&docid=tMnCU8F5vpAIcM&tbnid=TTtYDGlKoZfc6M:&ved=0CAUQjRw&url=http://en.wikipedia.org/wiki/Emilio_Aguinaldo_College&ei=J4P2UfrAI8W9kAXWzYDoBQ&bvm=bv.49784469,d.dGI&psig=AFQjCNHr0soYGqgZ9MMLpjMkBWwYtqAO7w&ust=1375196316520542
  • 8/10/2019 Thesis final Ch. 1-3

    15/50

    EMILIO AGUINALDO COLLEGE

    15

    Foreign Studies.

    Data And Information Security In Modern Day Businesses(Festus Olubukunmi Ajibuwa)

    All organizations require information for planning, controlling, recording

    transactions, performance measurement and decision-making. And such Information

    whether internal or external must be kept properly and well protected from intruders,

    hackers and unauthorized individuals.

    Organizations across the globe in every industry sector are under increasing pressure

    and scrutiny to maintain the security and integrity of their data. Companies are faced

    with an enormous liability if sensitive, business critical, or confidential information gets

    into the wrong hands.

    The field of information security has grown and evolved significantly in recent years. As

    a career choice there are many ways of gaining entry into the field. It offers many areas

    for specialization including Information Systems Auditing, Business Continuity Planning

    and Digital Forensics Science, to name a few. Although information security has

    traditionally been the responsibility of IT departments, some companies have made it a

    business issue as well as a technological one. Companies are now adding strategic,

    operational, and organizational safeguards to the technological measures they currently

    employ to protect corporate information. But most companies continue to view

    http://www.google.com.ph/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&docid=tMnCU8F5vpAIcM&tbnid=TTtYDGlKoZfc6M:&ved=0CAUQjRw&url=http://en.wikipedia.org/wiki/Emilio_Aguinaldo_College&ei=J4P2UfrAI8W9kAXWzYDoBQ&bvm=bv.49784469,d.dGI&psig=AFQjCNHr0soYGqgZ9MMLpjMkBWwYtqAO7w&ust=1375196316520542
  • 8/10/2019 Thesis final Ch. 1-3

    16/50

    EMILIO AGUINALDO COLLEGE

    16

    information security as a technological problem calling for technological solutions even

    though technology managers concede that today`s networks cannot be made

    impenetrable and that new security technologies have a short life span as hackers

    quickly devise ways around them. Delegating security to technologists also ignores

    fundamental questions that only business managers can answer. Not all of a company`s

    varied information assets have equal value, for instance; some require more attention

    than others. One on-line retailer, Egghead.com, lost 25 percent of its stock market value

    in December 2000, when hackers struck its customer information systems and gained

    access to 3.7 million credit card numbers. Egghead, of course, had security systems in

    place and claimed that no data were actually stolen, but it lacked the kind of coordinated

    organizational response necessary to convince customers and shareholders that their

    sensitive data were actually secure. Information security means the appropriate

    protection of information, systems, services and data communications by administrative,

    technical and other measures both in ordinary and exceptional circumstances. The

    confidentiality, integrity and availability of information is protected against threats

    and damage caused by faults in hardware and software, natural events and willful,

    negligent or accidental events.

    The central concepts of information security have the following meanings:

    Confidentiality: information and systems are accessible only to those authorized to use

    them. Third parties are not given a possibility to alter or destroy information nor to

    http://www.google.com.ph/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&docid=tMnCU8F5vpAIcM&tbnid=TTtYDGlKoZfc6M:&ved=0CAUQjRw&url=http://en.wikipedia.org/wiki/Emilio_Aguinaldo_College&ei=J4P2UfrAI8W9kAXWzYDoBQ&bvm=bv.49784469,d.dGI&psig=AFQjCNHr0soYGqgZ9MMLpjMkBWwYtqAO7w&ust=1375196316520542
  • 8/10/2019 Thesis final Ch. 1-3

    17/50

    EMILIO AGUINALDO COLLEGE

    17

    process it otherwise.

    Integrity: information and systems are reliable, correct and up-to-date and they have not

    been altered nor can they be altered in an uncontrolled way as a result of hardware or

    software faults, natural events or human activities.

    SECURITY ASPECTS IN MODERN WEB APPLICATIONS

    (Jarkko Miettinen )

    Ten years is a long time on software industry, especially in the field of web applications.

    During that ten years, web technologies have advanced immensely and many

    applications that simply were impossible in 1999 are now used every day by millions of

    users. Unfortunately, new technologies have bought new attacks with them. Many of the

    attacks that were effective against Effect were not even invented when development of

    Effect started. During those then years of Effect development, the development process

    at Effect has changed from unstructured development to structured Scrum-process with

    proper code reviews, testing and education. Effects of this change were visible also in

    this work as many of the vulnerabilities found were old and could not get to the code

    base nowadays. Until this thesis work, however, security issues were not substantially

    brought up.

    http://www.google.com.ph/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&docid=tMnCU8F5vpAIcM&tbnid=TTtYDGlKoZfc6M:&ved=0CAUQjRw&url=http://en.wikipedia.org/wiki/Emilio_Aguinaldo_College&ei=J4P2UfrAI8W9kAXWzYDoBQ&bvm=bv.49784469,d.dGI&psig=AFQjCNHr0soYGqgZ9MMLpjMkBWwYtqAO7w&ust=1375196316520542
  • 8/10/2019 Thesis final Ch. 1-3

    18/50

    EMILIO AGUINALDO COLLEGE

    18

    This thesis represented efforts of a security push at Effect similar to what Microsoft went

    through in 2002 [HL03], except in smaller scale. Work on the thesis started with self-

    education on the fundamentals of computer and information security. Fundamentals

    were followed by small parts from the field of computer security that seemed to make

    sense in the direction the thesis was going to although not all the knowledge found

    direct application in the empirical part.

    What found direct use in the empirical part was all the research into web technologies,

    as knowing the problem domain is the first requirement for any successful analysis.

    Thus, different web technologies used to build web applications and common

    vulnerabilities in such applications were discussed and provided a good starting point to

    later analyses. In the empirical part of this thesis, application of the security assessment

    methods suffered some reversals, partly for lack of proper tools, partly for lack of

    experience. Lack of tools made editing attack tree models cumbersome and proper

    attack surface analysis well nigh impossible. Still the result were, if not the best, at least

    good in the sense that new vulnerable areas in Effect were uncovered. Most of the

    earlier work of Effect security had been, rightly so, focused on common web application

    vulnerabilities and this thesis work demonstrated that an application is not made secure

    just by fixing the most common vulnerabilities. In a way, the security push is still

    ongoing. The knowledge gained in this thesis theoretical and experimental part has yet

    to diffuse to other developers and not all devised enhancements for security are

    implemented nor will they all ever be because of the trade off that need to made.

    http://www.google.com.ph/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&docid=tMnCU8F5vpAIcM&tbnid=TTtYDGlKoZfc6M:&ved=0CAUQjRw&url=http://en.wikipedia.org/wiki/Emilio_Aguinaldo_College&ei=J4P2UfrAI8W9kAXWzYDoBQ&bvm=bv.49784469,d.dGI&psig=AFQjCNHr0soYGqgZ9MMLpjMkBWwYtqAO7w&ust=1375196316520542
  • 8/10/2019 Thesis final Ch. 1-3

    19/50

    EMILIO AGUINALDO COLLEGE

    19

    In this thesis, two possibly very useful methods, attack trees and attack surface analysis

    could not be applied in full because lack of tools and knowledge. Should there be

    another security push, revisiting those analysis methods and tools should be a starting

    point. Two large stones that were left completely unturned were use of static analysis

    tools and of other programming languages.

    Static analysis tools, such as CodeSecure based on WebSSARI [HYH+ 04], analyze the

    code of the application without actually running it, hoping to find signs of vulnerabilities

    such as insecure flow of data or unchecked memory accesses. If such tool could be

    integrated seamlessly into development environment, benefits would be great. Warning

    of security errors as modern development environments warn of syntax errors is one

    thing but more importantly, such tool could most certainly analyze security issues in

    third party libraries used.

    Different programming languages could offer at least two benefits: better specification of

    levels of trust for the data and a possibility to separate security concerns from other

    concerns, making parts of a program easier to understand and use.

    Ultimately, none of these methods and tools will be a silver bullet for the slaying beast of

    security problems. Still, sometimes even grazing it will be worthwhile.

    http://www.google.com.ph/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&docid=tMnCU8F5vpAIcM&tbnid=TTtYDGlKoZfc6M:&ved=0CAUQjRw&url=http://en.wikipedia.org/wiki/Emilio_Aguinaldo_College&ei=J4P2UfrAI8W9kAXWzYDoBQ&bvm=bv.49784469,d.dGI&psig=AFQjCNHr0soYGqgZ9MMLpjMkBWwYtqAO7w&ust=1375196316520542
  • 8/10/2019 Thesis final Ch. 1-3

    20/50

    EMILIO AGUINALDO COLLEGE

    20

    Security Control Room Studies

    Gill et al. (2005) evaluated 13 CCTV projects which were set-up under the Home Office

    Crime Reduction Programme (comprising of 14 separate CCTV systems). At six control

    rooms, surveillance video was recorded on the more traditional analogue S-VHS tapes,

    six recorded video digitally on a computer hard drive, and one recorded video on digital

    tape. Various aspects of the control room operations were examined such as:

    ownership, design, management, work practices, communication, operator pay and

    training, as well as the processing of CCTV evidence. The study did not examine the

    impact of specific technologies on operator performance when carrying out tasks.

    Despite this, a number of findings which related to the technical aspects of a control

    room system which could have affected operator performance were identified:

    1. At a majority of the control rooms, digital tools (e.g., intelligent CCTV, digital radio,

    user interfaces etc.) were not used to support operators in their tasks.

    2. In comparison to analogue CCTV systems, digital systems could be searched more

    quickly, which saved police time when looking for evidence. The average search time

    required to search digital CCTV was 18 minutes and 40 minutes to search analogue

    CCTV video.

    http://www.google.com.ph/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&docid=tMnCU8F5vpAIcM&tbnid=TTtYDGlKoZfc6M:&ved=0CAUQjRw&url=http://en.wikipedia.org/wiki/Emilio_Aguinaldo_College&ei=J4P2UfrAI8W9kAXWzYDoBQ&bvm=bv.49784469,d.dGI&psig=AFQjCNHr0soYGqgZ9MMLpjMkBWwYtqAO7w&ust=1375196316520542
  • 8/10/2019 Thesis final Ch. 1-3

    21/50

  • 8/10/2019 Thesis final Ch. 1-3

    22/50

    EMILIO AGUINALDO COLLEGE

    22

    control rooms recorded at 1 frame every 3-5 seconds. At vast majority of the control

    rooms, Gill et al. found that the video quality was too low to aid the police in their

    investigations or even be used as evidence in court.

    7. Operators and management had limited knowledge of digital technology (recording

    settings) in the case of two systems which consequently compromised the effectiveness

    of the system.

    Non-Security Control Room Studies

    Luff and Heath (2001) carried out naturalistic observations within in one particular type

    of control room: station control rooms in the London Underground. In-depth field work

    which involved making audio-visual recordings were carried out in the major stations of

    the London Underground. The study specifically examined how operators maintained

    situation awareness: how they monitored their surrounding domain and the activities of

    their colleagues. The results showed that operators made use of a wide range of

    communication and information technologies: radios, passenger announcement

    systems, train information, emergency control, and alarm systems. The technology most

    used was the banks of video monitors that displayed CCTV video in real-time (4-12

    monitors per bank with up to 80 CCTV cameras in total). These monitors displayed

    video of various public areas within the London

    http://www.google.com.ph/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&docid=tMnCU8F5vpAIcM&tbnid=TTtYDGlKoZfc6M:&ved=0CAUQjRw&url=http://en.wikipedia.org/wiki/Emilio_Aguinaldo_College&ei=J4P2UfrAI8W9kAXWzYDoBQ&bvm=bv.49784469,d.dGI&psig=AFQjCNHr0soYGqgZ9MMLpjMkBWwYtqAO7w&ust=1375196316520542
  • 8/10/2019 Thesis final Ch. 1-3

    23/50

    EMILIO AGUINALDO COLLEGE

    23

    Underground such as train platforms, corridors, passageways etc. Control room

    operators (station supervisor as described by the authors) were responsible for utilising

    technology to monitor suspicious and troublesome behaviour within the station and

    track targets smoothly from one camera to another.

    The observations revealed that operators were not able to monitor platform scenes

    effectively, and this was because the images were not always clear due to a number of

    technical observational difficulties.

    Operators struggled with their tasks due to the low-quality CCTV images observed on-

    screen, and this was due to the following problems:

    1. Limited lighting provided near to the CCTV cameras.

    2. Dirty CCTV camera lenses from train break dust.

    3. Dirty video monitors within the control room due to a lack of cleaning.

    4. Monitors kept on the same view for long periods of time which caused a burnt-out

    effect.

    As a result of poor maintenance of the CCTV systems, operators struggled to monitor

    scenes. For example, they were unable to distinguish whether a crowd was stationary

    or moving. Furthermore, operators were unable to follow targets smoothly from one

    camera to another due to camera blind spots created as a result of hundreds of years of

    gradual station development. Luff and Heath believed that the problems operators faced

    http://www.google.com.ph/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&docid=tMnCU8F5vpAIcM&tbnid=TTtYDGlKoZfc6M:&ved=0CAUQjRw&url=http://en.wikipedia.org/wiki/Emilio_Aguinaldo_College&ei=J4P2UfrAI8W9kAXWzYDoBQ&bvm=bv.49784469,d.dGI&psig=AFQjCNHr0soYGqgZ9MMLpjMkBWwYtqAO7w&ust=1375196316520542
  • 8/10/2019 Thesis final Ch. 1-3

    24/50

    EMILIO AGUINALDO COLLEGE

    24

    when dealing with fragmented images was inevitable in the video coverage of a large

    and complex station (p 158).

    Operators reported that they found it difficult to visualize scenes at the end of train

    platforms. In fact, certain individuals such as beggars and buskers discovered some of

    the camera blind spots, and frequently placed themselves outside of the CCTV camera

    views. The analysis of these tasks revealed that operators used various technologies to

    monitor fragmented and difficult to see station scenes.

    Given these problems with surveying scenes, it is not surprising that operators

    struggled.

    Following 12-months of field work, Luff and Heath made a number of general design

    suggestions to improve operator task performance specifically when working on within a

    London Underground control room:

    1. Extend the existing London Underground systems so that they are more integrated.

    This was proposed to reduce the need for: maintenance, need different

    controls/connections, and information handling.

    2. Configure the technology appropriately to: allow for a selection of a sequence of

    images so that incidents can be easily tracked, monitored, and to support the invocation

    of appropriate next actions.

    3. Introduce automated surveillance technology to detect events such as crowding.

    4. Make relevant information about the station accessible to operators in different

    locations of the control room to improve the efficiency in locating scenes on CCTV.

    http://www.google.com.ph/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&docid=tMnCU8F5vpAIcM&tbnid=TTtYDGlKoZfc6M:&ved=0CAUQjRw&url=http://en.wikipedia.org/wiki/Emilio_Aguinaldo_College&ei=J4P2UfrAI8W9kAXWzYDoBQ&bvm=bv.49784469,d.dGI&psig=AFQjCNHr0soYGqgZ9MMLpjMkBWwYtqAO7w&ust=1375196316520542
  • 8/10/2019 Thesis final Ch. 1-3

    25/50

    EMILIO AGUINALDO COLLEGE

    25

    5. Implement a touch-screen interface allowing operators to quickly select camera views

    on their video monitors without delaying the situation assessment and response.

    Although these design recommendations can be applied to the design of all types of

    CCTV control rooms, Luff and Heath fail to discuss an important aspect of carrying out

    tasks within such a complex work environment: context and its impact on the design of

    systems. CCTV owners and managers therefore could benefit with additional

    recommendations which take into account the various contextual factors surrounding

    the operators work system (see Chapter 3, Section 3.3.2.2, Table 3.1).

    In another transport control room study (Chen, Choi, Ruiz, Shi and Taib, 2005), in-situ

    observations, interviews and questionnaires were carried out within a traffic control

    room to gain insights into how operators performed their work. The focus of the field

    work was to understand how operators utilize multiple hardware equipment and

    software applications when managing mobility and public safety related incidents within

    a control room. The results were used to formulate use scenarios1 and then implement

    a mock-up application to improve operator performance when dealing with traffic

    incidents. The main limitation with this study is the lack of background given on the

    research methodology and data analyses (this is discussed in more detail in Chapter 3,

    Section 3.5). Furthermore, in review of the study findings, it is unclear what tasks

    operators performed in the control room and what their work environment was like, as

    no discussion is given on the field study observations. Chen et al. instead placed more

    focus on the subjective findings gathered from the interviews and questionnaires and

    http://www.google.com.ph/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&docid=tMnCU8F5vpAIcM&tbnid=TTtYDGlKoZfc6M:&ved=0CAUQjRw&url=http://en.wikipedia.org/wiki/Emilio_Aguinaldo_College&ei=J4P2UfrAI8W9kAXWzYDoBQ&bvm=bv.49784469,d.dGI&psig=AFQjCNHr0soYGqgZ9MMLpjMkBWwYtqAO7w&ust=1375196316520542
  • 8/10/2019 Thesis final Ch. 1-3

    26/50

    EMILIO AGUINALDO COLLEGE

    26

    used this data to inform the design of a new mock-up system. Interviews with 14 control

    room operators revealed a number of the subjective preferences with the regards to the

    current information system they used to manage traffic incidents and specifically to

    locate scenes:

    75% of operators were happy with their working environment (p 2), but several said

    that there should be a better way to integrate applications to allow critical data to be

    retrieved more easily.

    70% of operators would have liked a map-based search tool for accessing geographical

    information.

    33% of operators preferred a personalised way to filter information.

    70% expected simpler procedures to login and log out of their systems.

    60% thought a speech interface would be beneficial and 21% thought a multimodal

    (speech, gesture, touch, and others) would be beneficial.

    These findings were then examined with 11 control room operators using a

    questionnaire. The two main issues reported in the questionnaire related to the

    http://www.google.com.ph/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&docid=tMnCU8F5vpAIcM&tbnid=TTtYDGlKoZfc6M:&ved=0CAUQjRw&url=http://en.wikipedia.org/wiki/Emilio_Aguinaldo_College&ei=J4P2UfrAI8W9kAXWzYDoBQ&bvm=bv.49784469,d.dGI&psig=AFQjCNHr0soYGqgZ9MMLpjMkBWwYtqAO7w&ust=1375196316520542
  • 8/10/2019 Thesis final Ch. 1-3

    27/50

    EMILIO AGUINALDO COLLEGE

    27

    problems with the contact pages (database), as the data was: 1) out-of-date and 2)

    inconsistent. The third biggest issue was the slow search speed at which the system

    operated; and this slow speed was potentially due to an indirect result of ineffective

    navigation tools

    Once the field research was complete, a mock-up user interface (web based) was

    created to validate the findings. The aim of the mock-up system was to examine

    whether operators could be better supported when handling incidents.

    The design involved integrating a number of company policies into the flow of

    information within the user interface. This integration was included in the design to

    reduce operators cognitive load when performing tasks with the system. A browsing

    navigation was proposed rather than a stand-alone search function so that entry point

    information can be found using an advanced search function. Other features included

    the use of: 1) expansion of fields when completing information (this reduced the need to

    scroll excessively); 2) completion markers (in the form of checkboxes) to allow

    operators to visualise completed actions; and 3) error handling (the checkboxes trigger

    warnings when actions are incomplete).

    The mock-up user interface was evaluated with six operators using a real-life traffic

    incident scenario.

    http://www.google.com.ph/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&docid=tMnCU8F5vpAIcM&tbnid=TTtYDGlKoZfc6M:&ved=0CAUQjRw&url=http://en.wikipedia.org/wiki/Emilio_Aguinaldo_College&ei=J4P2UfrAI8W9kAXWzYDoBQ&bvm=bv.49784469,d.dGI&psig=AFQjCNHr0soYGqgZ9MMLpjMkBWwYtqAO7w&ust=1375196316520542
  • 8/10/2019 Thesis final Ch. 1-3

    28/50

    EMILIO AGUINALDO COLLEGE

    28

    Operators were timed in their tasks which required the retrieval and handling of contact

    information with both the existing contact system and the mock-up system. In addition to

    task performance, operators were asked to rate the system under several criteria using

    a 5-point Likert scale. The results of the evaluation were described by the authors as

    preliminary. The overall findings from the evaluation revealed that the mock -up system

    was more efficient (37% overall improvement in task time completion), despite

    operators receiving no training with the new system. Chen et al. believed this finding

    was a result of introducing the process flow and progress markers within the user

    interface. The subjective results were in line with the task performance data. Operators

    preferred the mock-up system as they were able to enter specific geographical locations

    and perform searches by entering specific criteria into the database system. There was

    a strong preference for the new proposed system in terms of: easy to learn, ease of

    use, intuitiveness, speed and accuracy of retrieval, helpfulness, level of comfort, and

    overall its effectiveness. The integration of information sources was considered

    important for improving operator performance in the London Underground control rooms

    (Luff and Heath, 2001).

    The study by Chen et al. (2005) examined task performance issues within a real-world

    context, and like the study London Underground study by Luff and Heath (2001), both

    studies examine one specific task: locating a scene. As both these studies examines

    one specific task within one specific control room setting, the findings are limited and

    http://www.google.com.ph/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&docid=tMnCU8F5vpAIcM&tbnid=TTtYDGlKoZfc6M:&ved=0CAUQjRw&url=http://en.wikipedia.org/wiki/Emilio_Aguinaldo_College&ei=J4P2UfrAI8W9kAXWzYDoBQ&bvm=bv.49784469,d.dGI&psig=AFQjCNHr0soYGqgZ9MMLpjMkBWwYtqAO7w&ust=1375196316520542
  • 8/10/2019 Thesis final Ch. 1-3

    29/50

    EMILIO AGUINALDO COLLEGE

    29

    therefore do not provide a broader understanding of the task performance issues within

    control rooms where CCTV and other related technology is heavily used.

    For example, the interaction between different control room stakeholders was not

    examined, nor was there a discussion of the interplay between users when using

    communication devices such as radio and telephone.

    In contrast to the study by Chen et al. (2005), McCarthy et al. (1997) carried out a 12-

    month ethnographic study to compare two different systems currently being used by

    operators within two ambulance controls rooms. The field research involved field

    observations and open-ended interviews with operators at two different ambulance

    control rooms. The main objectives of the field study were to: 1) understand how

    operators performed a specific task (locating a scene of emergency in order to dispatch

    an ambulance); 2) compare the effectiveness of tasks performed by operators at each

    control room; and 3) use these findings to assess the potential usefulness of the

    technology used at one control room if it was to be used at another control room (where

    technology is not heavily used). The control rooms which were evaluated included:

    http://www.google.com.ph/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&docid=tMnCU8F5vpAIcM&tbnid=TTtYDGlKoZfc6M:&ved=0CAUQjRw&url=http://en.wikipedia.org/wiki/Emilio_Aguinaldo_College&ei=J4P2UfrAI8W9kAXWzYDoBQ&bvm=bv.49784469,d.dGI&psig=AFQjCNHr0soYGqgZ9MMLpjMkBWwYtqAO7w&ust=1375196316520542
  • 8/10/2019 Thesis final Ch. 1-3

    30/50

    EMILIO AGUINALDO COLLEGE

    30

    Ambulance Control Room 1 (ACC1):

    o Located within an urban environment.

    o Operators were supported by a high technology system.

    o Tasks involved: receiving calls, entering jobs electronically into a system, locating

    scenes using a database system, passing the information to a gazetteer (a reference

    tool for information about places and place names), which identifies the possible

    location, confirms the location to the caller, and then passes to the dispatch team

    electronically.

    Ambulance Control Room 1 (ACC2):

    o Located within a rural environment.

    o Operators were supported by a low technology system (a manual system to

    locate a scene).

    o Operators are given access to a database of telephone numbers of public

    telephone boxes, local general practitioners, and other important landmarks and

    locations.

    o Tasks involved: receiving calls, locating a scene of emergency using a paper

    map of the area, and then writing the job details down on note paper.

    http://www.google.com.ph/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&docid=tMnCU8F5vpAIcM&tbnid=TTtYDGlKoZfc6M:&ved=0CAUQjRw&url=http://en.wikipedia.org/wiki/Emilio_Aguinaldo_College&ei=J4P2UfrAI8W9kAXWzYDoBQ&bvm=bv.49784469,d.dGI&psig=AFQjCNHr0soYGqgZ9MMLpjMkBWwYtqAO7w&ust=1375196316520542
  • 8/10/2019 Thesis final Ch. 1-3

    31/50

    EMILIO AGUINALDO COLLEGE

    31

    The analysis of the field research revealed that the most critical activity operators

    performed was identifying a scene of emergency. This task was described as highly

    complex since postal addresses were difficult to identify (for e.g., some houses were not

    numbered, some street names clashed etc).

    McCarthy et al. described the nature and context of this scene locating task at each of

    the ambulance control rooms in detail.

    Similar to the study conducted by Chen et al. (2005), field research was carried out to

    identify the problems operators experienced when locating a scene within a control

    room environment. McCarthy et al. found that task performance was severely affected

    as a result of ineffective communication between public callers (those requesting an

    ambulance) and control room operators (those receiving calls from public callers to

    dispatch an ambulance). Communication was ineffective for a number of reasons: 1)

    pubic callers had strong regional accents; 2) public callers provided operators with

    insufficient location descriptions; and 3) operators lacked experience in locating scenes

    of emergency.

    McCarthy et al. suggested that some technologies, such as the gazetteer and an

    electronic map could compensate for operators lack of direct access to the knowledge

    on the local geographical areas. This particular control room provided detailed insights

    http://www.google.com.ph/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&docid=tMnCU8F5vpAIcM&tbnid=TTtYDGlKoZfc6M:&ved=0CAUQjRw&url=http://en.wikipedia.org/wiki/Emilio_Aguinaldo_College&ei=J4P2UfrAI8W9kAXWzYDoBQ&bvm=bv.49784469,d.dGI&psig=AFQjCNHr0soYGqgZ9MMLpjMkBWwYtqAO7w&ust=1375196316520542
  • 8/10/2019 Thesis final Ch. 1-3

    32/50

    EMILIO AGUINALDO COLLEGE

    32

    into the nature of ambulance control room work; however the study findings are largely

    task descriptive, and does not provide a detailed discussion on the implication of these

    problems on operator performance and system effectiveness.

    To conclude, there have been a number of field studies within control rooms which

    examine the nature and context of operator tasks. These studies were carried out with

    the aim of improving system design, apart from the security control room study by Gill et

    al. (2005) which examined the overall effectiveness in terms of crime reduction. In

    review of these studies, there is a common theme: all involved operators performing

    what would be widely known (by operators and other researchers) a reactive task

    whereby the operator is involved in locating a scene using CCTV cameras, video

    technology, and maps based artefacts.

    Reactive tasks are time critical tasks and the ability to perform these tasks effectively

    and efficiently depends on two factors: 1) how well an operators work-system is set-up

    and configured and 2) the effectiveness of communication (verbal and technical)

    between operators and other users. The transport control room studies (Chen et al.,

    2005 and Luff and Heath, 2001) did not examine the role and effectiveness of

    technology in much detail across a wide range of control rooms. Instead, field research

    was limited to 1-2 control rooms to examine a specific task with the aim of improving

    system design. Furthermore, secondary tasks such as administrative paper work and

    http://www.google.com.ph/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&docid=tMnCU8F5vpAIcM&tbnid=TTtYDGlKoZfc6M:&ved=0CAUQjRw&url=http://en.wikipedia.org/wiki/Emilio_Aguinaldo_College&ei=J4P2UfrAI8W9kAXWzYDoBQ&bvm=bv.49784469,d.dGI&psig=AFQjCNHr0soYGqgZ9MMLpjMkBWwYtqAO7w&ust=1375196316520542
  • 8/10/2019 Thesis final Ch. 1-3

    33/50

    EMILIO AGUINALDO COLLEGE

    33

    making copies of CCTV evidence were not mentioned in these studies. Based on the

    previous control room studies, a number of important research questions were identified

    for further investigation in Study 1

    1. What tasks are performed by CCTV operators where CCTV and other associated

    technologies are used within a control room environment?

    2. Do CCTV operators have a good understanding, knowledge, and experience in their

    tasks and the surveillance areas?

    3. What factors do CCTV operators use to aid their situational awareness?

    4. How do CCTV operators communicate and collaborate with other CCTV control room

    stakeholders, and is it effective?

    5. Are operators provided with integrated (e.g., a geographical information system

    linked to CCTV cameras) or segregated tools?

    It is clear that, a better understanding is needed on the nature and context of CCTV,

    what tasks are performed by operators and what problems they encounter, and it affect

    on other stakeholders and the technical parts of the system thus the socio-technical

    http://www.google.com.ph/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&docid=tMnCU8F5vpAIcM&tbnid=TTtYDGlKoZfc6M:&ved=0CAUQjRw&url=http://en.wikipedia.org/wiki/Emilio_Aguinaldo_College&ei=J4P2UfrAI8W9kAXWzYDoBQ&bvm=bv.49784469,d.dGI&psig=AFQjCNHr0soYGqgZ9MMLpjMkBWwYtqAO7w&ust=1375196316520542
  • 8/10/2019 Thesis final Ch. 1-3

    34/50

    EMILIO AGUINALDO COLLEGE

    34

    impact. This understanding is important so that it can then be used to improve the

    effectiveness of CCTV system design, configuration, and use.

    Effective, Design, Configuration, and Use of Digital CCTV (Hina Uttam Keval )

    The research carried out in this thesis was motivated by the need to understand how

    CCTV is used in the management of security tasks, and the factors that reduce its

    effectiveness. The overarching goals for this research were: 1) theoretical and 2)

    practical. Firstly, an understanding of security observation tasks was needed as this

    research does not currently exist. Secondly, by building an understanding of the context

    and use of CCTV and other technologies used for security observation tasks, a practical

    framework can be developed to support CCTV practitioners and owners. The purpose

    of such a framework is to improve the design, configuration, and set-up of CCTV

    systems to ensure they are fit for purpose. The field study in this thesis (presented in

    Chapter 4) demonstrated the importance of taking into account and correctly configuring

    the: CCTV system environment, CCTV users workstation set-up, task requirements

    (number of video monitor displays, display type, video quality etc.), and stakeholder

    communication (see Chapter 4, Section 4.4.2.5). The empirical studies (presentedin

    Chapters 8 and 9) investigated the effect of using low-quality CCTV video for a face

    identification and event detection task performed by human observers. The results from

    these experiments provide minimum recommendations on video quality required for

    http://www.google.com.ph/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&docid=tMnCU8F5vpAIcM&tbnid=TTtYDGlKoZfc6M:&ved=0CAUQjRw&url=http://en.wikipedia.org/wiki/Emilio_Aguinaldo_College&ei=J4P2UfrAI8W9kAXWzYDoBQ&bvm=bv.49784469,d.dGI&psig=AFQjCNHr0soYGqgZ9MMLpjMkBWwYtqAO7w&ust=1375196316520542
  • 8/10/2019 Thesis final Ch. 1-3

    35/50

    EMILIO AGUINALDO COLLEGE

    35

    achieving effective task performance when using digital CCTV systems (in real-time via

    a network or when in play-back mode).

    This research was extremely timely as there is a lot of investment in CCTV deployments

    and a large interest in using it for a growing range of security purposes. One of the key

    reasons for the high interest in CCTV is because of events such as the terrorist attacks

    in London (July 2005). In addition to terrorism, a number of changes led to people

    investing more and more in CCTV deployments. Firstly, there was a change in the way

    in which society perceived and utilized security systems (particularly CCTV). There

    were also changes in peoples attitudes towards security in response to crime of all

    types. The number of CCTV deployments and the overall interest in using CCTV for

    security purposes was further encouraged by the rapid developments in the CCTV

    technology market. Furthermore, there have been technical developments in video and

    networking that transformed the way in which CCTV is being used. As a result, CCTV is

    being applied to new application areas and there are a large number of CCTV owners

    and a more heterogeneous group of users interacting with CCTV systems.

    It has been a topic of debate for many years whether CCTV is effective or not. Several

    studies in the field of criminology have examined the effectiveness of CCTV from a

    sociological and political perspective - assessing whether CCTV has reduced, deterred

    and/or displaced crime. Research has also been conducted to establish whether CCTV

    http://www.google.com.ph/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&docid=tMnCU8F5vpAIcM&tbnid=TTtYDGlKoZfc6M:&ved=0CAUQjRw&url=http://en.wikipedia.org/wiki/Emilio_Aguinaldo_College&ei=J4P2UfrAI8W9kAXWzYDoBQ&bvm=bv.49784469,d.dGI&psig=AFQjCNHr0soYGqgZ9MMLpjMkBWwYtqAO7w&ust=1375196316520542
  • 8/10/2019 Thesis final Ch. 1-3

    36/50

    EMILIO AGUINALDO COLLEGE

    36

    has made society feel safer and whether the technology works well enough to support

    police activities (see the control room study by Gill et al., 2005: Chapter

    2, Section 2.2). These studies are important, as they provide policy-makers (such as

    Home Office and local authorities) with an understanding of CCTV and the key issues

    which reduce the effectiveness of public surveillance systems. These studies do not

    provide CCTV owners and consultants with meaningful guidance on how CCTV

    systems can be improved in terms of effectiveness. Therefore, further research was

    needed to examine both the social and technical factors surrounding CCTV design and

    usage to develop objective and therefore quantifiable guidance.

    A review of the research in HCI and security revealed that very few studies examine the

    effectiveness of CCTV security from the CCTV users perspective and how their task

    performance is affected by people and technology. The only study which looked at

    performance to some extent was the CCTV effectiveness study by Gill et al., 2005. This

    study identified a number of operator factors which reduced the effectiveness of CCTV:

    low-quality equipment, too few operators, low operator to monitor/video display ratio,

    insufficient operator training (these findings are discussed in more detail in

    Chapter 2, Section 2.2).

    Field studies at non-security control rooms which examine operator tasks, found that

    operator performance is reduced as a result of poor configuration and maintenance of

    equipment within the control room and the CCTV camera environment (see Chapter 2,

    Section 2.3). In addition, operator performance was reduced as a result of ineffective

    http://www.google.com.ph/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&docid=tMnCU8F5vpAIcM&tbnid=TTtYDGlKoZfc6M:&ved=0CAUQjRw&url=http://en.wikipedia.org/wiki/Emilio_Aguinaldo_College&ei=J4P2UfrAI8W9kAXWzYDoBQ&bvm=bv.49784469,d.dGI&psig=AFQjCNHr0soYGqgZ9MMLpjMkBWwYtqAO7w&ust=1375196316520542
  • 8/10/2019 Thesis final Ch. 1-3

    37/50

    EMILIO AGUINALDO COLLEGE

    37

    peer-to-peer communication (McCarthy et al., 1997; Luff et al., 2000). The implications

    of these findings were not discussed in much detail and the research was not taken

    further to improve the way in which CCTV and other technologies are used by operators

    within control rooms and other security work environments. Consequently, subsequent

    CCTV system deployments are being ignored, the various problems within CCTV

    control rooms and their designs still exist, and stakeholders are not paying attention to

    these problemssimply because they are not aware of the problems or solutions. The

    field study carried out in this thesis identified a number of issues which were discovered

    in the previous control room studies (see Chapter 4, Section 4.5.2), such as: 1)

    operators being overloaded with too many CCTV cameras (Gill et al., 2005); 2) CCTV

    video being recorded at low-quality (Gill et al., 2005); 3) an ineffective CCTV camera

    environment (Luff and Heath, 2001); and 4) poor radio communication (McCarthy et al.,

    1997). In addition to these findings, the field study presented in this thesis identified a

    wider number of operator performance issues: operators being overloaded with audio

    communication and other audio alerts; ineffective equipment set-up and layout;

    ineffective camera and mapping systems; and various technical issues were identified

    with CCTV cameras and operator radios. These findings are detailed in Chapter 4,

    Section

    4.4.2.5.

    Prior to this field research (Chapter 4), there was a limited awareness and

    understanding of what CCTV technology was being used for, and what security

    http://www.google.com.ph/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&docid=tMnCU8F5vpAIcM&tbnid=TTtYDGlKoZfc6M:&ved=0CAUQjRw&url=http://en.wikipedia.org/wiki/Emilio_Aguinaldo_College&ei=J4P2UfrAI8W9kAXWzYDoBQ&bvm=bv.49784469,d.dGI&psig=AFQjCNHr0soYGqgZ9MMLpjMkBWwYtqAO7w&ust=1375196316520542
  • 8/10/2019 Thesis final Ch. 1-3

    38/50

    EMILIO AGUINALDO COLLEGE

    38

    observation tasks were being performed by operators and other CCTV stakeholders.

    The BS EN ISO 11064 standard (ISO, 2004) is the only guidance that considers the

    human element of control room design. The standard is based on ergonomic principles

    and provides guidance on the physical aspects of control rooms such as: workstation

    arrangements, control room layout, use of displays and controls, and maintenance.

    Additional guidance is needed which details human-centred guidance on the set-up of

    digital CCTV and other technology used by human operators. Furthermore, greater

    emphasis is required on the configuration of CCTV systems as a whole.

    There has been little empirical research on the effectiveness of digital CCTV video for

    security observation tasks performed by human observers. The guidance which does

    exist (UK Home Office Operational Requirements: Aldridge, 1994; Cohen et al., 2007)

    offers very limited guidance on digital and networked CCTV systems. A number of

    empirical research studies have been conducted by human centered multimedia

    researchers to assess the impact of video quality on human task performance with a

    number of video applications. These studies were carried out to identify the minimum

    video quality requirements for networked multimedia applications. In both Internet and

    mobile applications and services, it is desirable to reduce the amount of bandwidth

    needed without affecting the users perception and performance with the interface. This

    type of evaluation has not been conducted for CCTV applications.

    This thesis provides field and empirical research on the problems associated with CCTV

    system design and specifically the performance limitations of digital CCTV video when

    http://www.google.com.ph/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&docid=tMnCU8F5vpAIcM&tbnid=TTtYDGlKoZfc6M:&ved=0CAUQjRw&url=http://en.wikipedia.org/wiki/Emilio_Aguinaldo_College&ei=J4P2UfrAI8W9kAXWzYDoBQ&bvm=bv.49784469,d.dGI&psig=AFQjCNHr0soYGqgZ9MMLpjMkBWwYtqAO7w&ust=1375196316520542
  • 8/10/2019 Thesis final Ch. 1-3

    39/50

    EMILIO AGUINALDO COLLEGE

    39

    used by human observers for security observation tasks. This research involved an

    investigation which required reviewing a number of interdisciplinary areas related to

    CCTV (HCI, psychology, computer science, sociology, human factors, as well as

    legislation and guidelines). From the research findings, a number of substantive and

    methodological contributions were made by applying HCI knowledge and methods to

    improve CCTV practice, in particular the design and deployment of CCTV security

    systems and their context of use.

    These contributions have led to the development of a best-practice framework for CCTV

    deployment (TEC-VIS), which provides guidance for a new CCTV deployment or a

    redesign. Specific guidance isalso provided to CCTV owners on the configuration of

    CCTV security systems (e.g., the users tasks, work environment and the technology

    used to support their tasks).

    Local Studies.

    The maintenance of Peace and Order in Brgy 212 zone 19 Manila

    (Jerome M. Mingo)

    Base on the findings, the ff. conclusions were drawn

    1.) The socio-demographic profile of the respondents which are the residents of

    Brgy. 212 zone 19 Manila was good enough to obsereved the maintenance of

    http://www.google.com.ph/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&docid=tMnCU8F5vpAIcM&tbnid=TTtYDGlKoZfc6M:&ved=0CAUQjRw&url=http://en.wikipedia.org/wiki/Emilio_Aguinaldo_College&ei=J4P2UfrAI8W9kAXWzYDoBQ&bvm=bv.49784469,d.dGI&psig=AFQjCNHr0soYGqgZ9MMLpjMkBWwYtqAO7w&ust=1375196316520542
  • 8/10/2019 Thesis final Ch. 1-3

    40/50

    EMILIO AGUINALDO COLLEGE

    40

    peace and order to their barangay relatively with effective maintenance of peace

    and order in the research locale of the study

    2.) The maintenance of peac e and order in Brgy. 212 zone 19 Manila was effective

    3.) The maintenance of the peace and order in Brgy. 212 zone 19 Manila was

    meeting serious problem with regards to the implementation of the ordinances,

    programs and campaigns.

    4.) The is ni significant difference on the assessment of the respondents on the

    extent of maintenance of peace and order of Brgy. 212 zone 19 Manila.

    Recommendations

    In the light of the above findings and conclusions, the ff. recommendations were

    made:

    1.) In the implementation of programs and campaigns the authorities should be more

    responsible and serious so that the residents of the brgy should observe the

    effort expert by the authorities.

    2.) That those ordinances enacted and made the authorities are worth and for the

    benefits or good of the members of the members of brgy. It should be effective to

    maintain peace and order.

    3.) The authorities in charge should be pro-active in for all violation and anticipation

    of the elicit acts that would break and destroy the peace and order situation.

    http://www.google.com.ph/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&docid=tMnCU8F5vpAIcM&tbnid=TTtYDGlKoZfc6M:&ved=0CAUQjRw&url=http://en.wikipedia.org/wiki/Emilio_Aguinaldo_College&ei=J4P2UfrAI8W9kAXWzYDoBQ&bvm=bv.49784469,d.dGI&psig=AFQjCNHr0soYGqgZ9MMLpjMkBWwYtqAO7w&ust=1375196316520542
  • 8/10/2019 Thesis final Ch. 1-3

    41/50

    EMILIO AGUINALDO COLLEGE

    41

    4.) That those programs, campaigns and ordinances made by the authorities should

    be versatile in making ordinances for the deterence to all offenders that the

    desire is to break and destroy the peace and order situation.

    5.) The authorities in charge should aware and observe if the ordinances are

    productive and effective to maintain peace and order.

    Crime prevention strategies in Roxas city: Impact to public safety

    (Sebastian C. Caduco Jr.) 2005

    Conclusion:

    Based on the above findings, the following conclusions are drawn:

    1.) Socio-demographic profile of police personnel

    1.1) Functional assignment

    The police personnel assigned in concerned police agency have not

    distributed according to the 85 percent and 15 percent and office

    distribution ratio as prescribed by the police organization to enhance

    police visibility.

    1.2) Police eligibility

    All police personnel assigned at the concerned police agency were having

    their appropriate eligibility, commensurate to their present ranks.

    1.3) Educational Qualification

    http://www.google.com.ph/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&docid=tMnCU8F5vpAIcM&tbnid=TTtYDGlKoZfc6M:&ved=0CAUQjRw&url=http://en.wikipedia.org/wiki/Emilio_Aguinaldo_College&ei=J4P2UfrAI8W9kAXWzYDoBQ&bvm=bv.49784469,d.dGI&psig=AFQjCNHr0soYGqgZ9MMLpjMkBWwYtqAO7w&ust=1375196316520542
  • 8/10/2019 Thesis final Ch. 1-3

    42/50

    EMILIO AGUINALDO COLLEGE

    42

    Majority of the police personnel assigned in concerned police agency were

    college graduates, and some from them are not yet completing the four

    year baccalauretate course as required by the police profession.

    1.4) Years in Police Service

    Most of the police personnel assigned the concerned police station were

    already acquired enough experience in policing activities, and very few the

    considered novices in the police service.

    1.5) Highest Training Completed

    All the police personnel assigned in the concerned police station have

    already completed the highest training prescribed by their ranks, and as

    required for promotion and permanency in the said ranks

    2.1) Community Counseling

    The concerned police agency was responsive in this particular

    category, which this requires use of discretion in attending non-criminal conduct,

    disposing of minor complaints.

    2.2) Indefference of the public

    The concerned police agency was meeting slightly serious problems in relation with this

    particular category, especially the traditional apathy and negative attitude of the public

    with the things that the police are doing.

    2.3) Inter-Relationship with Society

    http://www.google.com.ph/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&docid=tMnCU8F5vpAIcM&tbnid=TTtYDGlKoZfc6M:&ved=0CAUQjRw&url=http://en.wikipedia.org/wiki/Emilio_Aguinaldo_College&ei=J4P2UfrAI8W9kAXWzYDoBQ&bvm=bv.49784469,d.dGI&psig=AFQjCNHr0soYGqgZ9MMLpjMkBWwYtqAO7w&ust=1375196316520542
  • 8/10/2019 Thesis final Ch. 1-3

    43/50

    EMILIO AGUINALDO COLLEGE

    43

    The concerned police agency was meeting slightly serious problems in relation with this

    particular, more commonly the conflict arising out in the strict enforcement of the laws.

    Recommendations

    In the light the above finding and conclusions, the following recommendations are

    made:

    1. Strictly observe 85 percent and 15 percent distributions of police personnel

    assigned in field and office duties to ensure a more decentralized concept of

    policing activities for more reponsive crime prevention strategies, and encourage

    undergraduate police personnel to complete repective formal degrees.

    2. Develop linkages with other concerned local government agencies, and the local

    government unit as well, and to forestall participation in the police decision

    making process.

    3. Activation of more police community precinct(PCP), and community action

    centers(COMPACT), and continiously advocate the concept and philosophy of

    community oriented policing system(COPS)

    4. Similar study be conducted in another time and setting which will focus on the

    extent of responsiveness of the crime prevention strategies, purposely to confirm

    or negate the findings of the present study.

    http://www.google.com.ph/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&docid=tMnCU8F5vpAIcM&tbnid=TTtYDGlKoZfc6M:&ved=0CAUQjRw&url=http://en.wikipedia.org/wiki/Emilio_Aguinaldo_College&ei=J4P2UfrAI8W9kAXWzYDoBQ&bvm=bv.49784469,d.dGI&psig=AFQjCNHr0soYGqgZ9MMLpjMkBWwYtqAO7w&ust=1375196316520542
  • 8/10/2019 Thesis final Ch. 1-3

    44/50

    EMILIO AGUINALDO COLLEGE

    44

    Research Synthesis.

    Above enumerated studies and literature were focused more on law enforcement, crime

    prevention and elimination of factors that contribute in criminality, which also are the

    similar characteristics of this study, that makes it related to studies enumerated above.

    This study (The use of Modern Technologies in the Suppression of Crimes in Selected

    Barangays in Tondo Manila) focused more on the methods utilized in the total

    abolishment of criminality, effect of modernity in the investigation of crimes by utilizing

    new materials and other techniques in crime suppression which were not tackled or

    discussed in those related studies mentioned above that were all conducted by scalars

    in the same field of study and profession.

    http://www.google.com.ph/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&docid=tMnCU8F5vpAIcM&tbnid=TTtYDGlKoZfc6M:&ved=0CAUQjRw&url=http://en.wikipedia.org/wiki/Emilio_Aguinaldo_College&ei=J4P2UfrAI8W9kAXWzYDoBQ&bvm=bv.49784469,d.dGI&psig=AFQjCNHr0soYGqgZ9MMLpjMkBWwYtqAO7w&ust=1375196316520542
  • 8/10/2019 Thesis final Ch. 1-3

    45/50

    EMILIO AGUINALDO COLLEGE

    45

    Chapter 3

    RESEARCH METHODOLOGY

    Research Design

    In this research, the researcher will use a descriptive type of research in gathering data and

    information. This type of research can effectively and accurately acquire information needed to

    support the current study which can also give suggestions to answer the problems and

    questions stated before. This is a collective type of data gathering to ensure that every opinion

    of respondents was clearly and completely gathered.

    The subject of the study

    Setting:

    Tondo is one of the sixteen areas ofManila,Philippines.The locale has existed

    prior to the arrival of the Spaniards, referred to as "Tundun" on theLaguna Copperplate

    Inscription. One of the most densely populated areas of land in the world. Tondo is

    located in the northwest portion of the city and is primarily residential-industrial in

    nature. Many of the city's slums are found in this area.

    http://en.wikipedia.org/wiki/Manilahttp://en.wikipedia.org/wiki/Philippineshttp://en.wikipedia.org/wiki/Laguna_Copperplate_Inscriptionhttp://en.wikipedia.org/wiki/Laguna_Copperplate_Inscriptionhttp://en.wikipedia.org/wiki/Laguna_Copperplate_Inscriptionhttp://en.wikipedia.org/wiki/Laguna_Copperplate_Inscriptionhttp://en.wikipedia.org/wiki/Philippineshttp://en.wikipedia.org/wiki/Manilahttp://www.google.com.ph/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&docid=tMnCU8F5vpAIcM&tbnid=TTtYDGlKoZfc6M:&ved=0CAUQjRw&url=http://en.wikipedia.org/wiki/Emilio_Aguinaldo_College&ei=J4P2UfrAI8W9kAXWzYDoBQ&bvm=bv.49784469,d.dGI&psig=AFQjCNHr0soYGqgZ9MMLpjMkBWwYtqAO7w&ust=1375196316520542
  • 8/10/2019 Thesis final Ch. 1-3

    46/50

    EMILIO AGUINALDO COLLEGE

    46

    Figure 2

    Research Locale

    http://www.google.com.ph/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&docid=tMnCU8F5vpAIcM&tbnid=TTtYDGlKoZfc6M:&ved=0CAUQjRw&url=http://en.wikipedia.org/wiki/Emilio_Aguinaldo_College&ei=J4P2UfrAI8W9kAXWzYDoBQ&bvm=bv.49784469,d.dGI&psig=AFQjCNHr0soYGqgZ9MMLpjMkBWwYtqAO7w&ust=1375196316520542http://www.google.com.ph/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&docid=tMnCU8F5vpAIcM&tbnid=TTtYDGlKoZfc6M:&ved=0CAUQjRw&url=http://en.wikipedia.org/wiki/Emilio_Aguinaldo_College&ei=J4P2UfrAI8W9kAXWzYDoBQ&bvm=bv.49784469,d.dGI&psig=AFQjCNHr0soYGqgZ9MMLpjMkBWwYtqAO7w&ust=1375196316520542
  • 8/10/2019 Thesis final Ch. 1-3

    47/50

    EMILIO AGUINALDO COLLEGE

    47

    Respondents

    This study aims to determine the advantages of utilizing modern technologies in

    Tondo, Manila. The respondents will be composed of active members of community

    (preferably of legal age) residing and constantly aware of events and happenings in the

    locality, Personnel of Police Stations 1 and 7involve in the investigation, prosecution,

    and suppression of crimes within the area of Tondo, Barangay Officialsin different

    Barangay community in Tondo preferably those who are utilizing modern technologies

    in their fight against criminality.

    Sampling Technique.

    Purposive sampling will be utilized in this research. Within the population

    sample there would be sample representative, depending on his opinion or purpose,

    thus being the representation subjective.

    Sampling size

    SAMPLES QUANTITY

    1. A (Residents) 60

    2. B (Law Enforcers) 203. C (Brgy Officials) 20

    TOTAL = 100

    http://www.google.com.ph/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&docid=tMnCU8F5vpAIcM&tbnid=TTtYDGlKoZfc6M:&ved=0CAUQjRw&url=http://en.wikipedia.org/wiki/Emilio_Aguinaldo_College&ei=J4P2UfrAI8W9kAXWzYDoBQ&bvm=bv.49784469,d.dGI&psig=AFQjCNHr0soYGqgZ9MMLpjMkBWwYtqAO7w&ust=1375196316520542
  • 8/10/2019 Thesis final Ch. 1-3

    48/50

    EMILIO AGUINALDO COLLEGE

    48

    Research Instrument

    This study will be utilizing a survey questionnaire made by the researcher and will be

    validated by the experts. This is composed of four parts. The first partincludes items

    that will determine the Profile of the respondents in terms of age, gender, civil status,

    educational attainment and length of stay in the community. The second part involves

    the Respondents assessment regarding the Common Crimes committed in the

    community. The next part aims to determine the perception of the respondents relative

    to the advantages of utilizing modern technologies relative to crime prevention and

    suppression, and finally the last part will aim to determine the Modern Technologies as

    recommended by the respondents which for them are necessary for the enhancement

    of security in selected Barangays in Tondo Manila

    http://www.google.com.ph/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&docid=tMnCU8F5vpAIcM&tbnid=TTtYDGlKoZfc6M:&ved=0CAUQjRw&url=http://en.wikipedia.org/wiki/Emilio_Aguinaldo_College&ei=J4P2UfrAI8W9kAXWzYDoBQ&bvm=bv.49784469,d.dGI&psig=AFQjCNHr0soYGqgZ9MMLpjMkBWwYtqAO7w&ust=1375196316520542
  • 8/10/2019 Thesis final Ch. 1-3

    49/50

    EMILIO AGUINALDO COLLEGE

    49

    Data Collection Procedures

    The researchers will conduct study in selected barangays in Tondo Manila to

    obtain all details regarding crimes which are usually committed in the area of study, all

    pertinent data of the respondents and also the respondents recommended modern

    technologies necessary for the enhancement of security in selected Barangays in

    Tondo Manila.

    The questionnaires were the main instruments for data gathering which were

    personally distributed by the researcher himself. They contained a covering letter

    describing the study and indicating the confidentiality of the information that may be

    given out by the respondents.

    http://www.google.com.ph/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&docid=tMnCU8F5vpAIcM&tbnid=TTtYDGlKoZfc6M:&ved=0CAUQjRw&url=http://en.wikipedia.org/wiki/Emilio_Aguinaldo_College&ei=J4P2UfrAI8W9kAXWzYDoBQ&bvm=bv.49784469,d.dGI&psig=AFQjCNHr0soYGqgZ9MMLpjMkBWwYtqAO7w&ust=1375196316520542
  • 8/10/2019 Thesis final Ch. 1-3

    50/50

    EMILIO AGUINALDO COLLEGE

    STATISTICAL DESIGN

    In the computation of the responses, percentage formula and weighted

    percentage mean will be used in the tabulation of data.

    Percentage Formula

    P=F/N x 100

    Where:

    P = percentage

    F = frequency

    N = number of respondents

    Weighted Mean Formula

    WM = TWV/TF

    Where:

    WM = weighted mean

    TWV = total weighted value

    TF = total frequency/number of respondents

    http://www.google.com.ph/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&docid=tMnCU8F5vpAIcM&tbnid=TTtYDGlKoZfc6M:&ved=0CAUQjRw&url=http://en.wikipedia.org/wiki/Emilio_Aguinaldo_College&ei=J4P2UfrAI8W9kAXWzYDoBQ&bvm=bv.49784469,d.dGI&psig=AFQjCNHr0soYGqgZ9MMLpjMkBWwYtqAO7w&ust=1375196316520542