Você está na página 1de 76

68

CHAPTER 1
THE PROBLEM AND ITS BACKGROUND
I N T R O D U C T I O N
Surveillance Camera are video cameras used for the purposed of
observing an area. They are often connected to a recording device, IP
network, and/or watched by a security personnel/law enforcement officer.
ideo Surveillance Systems consist of cameras placed in areas where
they can monitor activity as it takes place. These cameras may include
features like pan, tilt, and !oom" may be placed in outdoor or indoor
locations" and may include infrared recording options. #ost cameras are
used with recording systems, either C$%s or digital recorders. &sing a
digital recorder is the preferred option for easy storage, easy recall, and
easy viewing over different monitors.
The first ideo Surveillance System was installed by Siemens '(
at Test Stand II in Peenemunde, (ermany in )*+,, for observing the
launch of -, rockets. The noted (erman engineer .alter /ruch was
responsible for the design and installation of the system.
0utside government special facilities, ideo Surveillance was
developed initially as a means of increasing security in banks.
12periments in the &3 during the )*45s and )*65s led to several larger
trial programs later that decade.
68
These were deemed successful in the government report and paved
the way for a massive increase in the number of ideo Surveillance
systems installed. Today, systems cover most town and city centers, and
many stations, car-parks and estates.
ideo Surveillance recording systems are still often used at
modern launch sites to record the flight of the rockets, in order to find the
possible causes of malfunctions. ideo Surveillance System is one of the
most effective devices that can be used for monitoring the behavior
activities or other changing information, usually of the people and often
in surreptitious manner.
In our school, it is important to increased safety and security for
the students as well its7 personnel. The schools are the place where
students should feel safe from harm, outside stimulus, and other threats.
Sadly to say, in the past few years, there are some instances where
schools are not the safe haven we thought they were, take for instance
what happened at Philippine #aritime Institute 8P#I9, where one of the
professors was gun shot at the head inside the campus by one of the
students. If only the management of the school strengthen its security
system, none of this would happen. /ase on the above mentioned
situation, the researcher come up with an idea that could improve the
security system not only for schools and universities but for all the
entities and establishment in the Philippines. That is: The incorporation
of a surveillance camera to its security system. 0ne of the features of this
research is that, an embedded system is incorporated by integrating a
68
thermal scanner and an ;-ray in the security system 8for future
e2pansion9.
0ne of the most popular Surveillance tools for Schools is the
Secure iew System. The system transmits images from cameras to a
digital hard drive storage system. 0utput can be seen on a monitor that
displays four frames of video or on desktop computer monitors, which
are networked to receive video feeds from the cameras.
68
BACKGROUND OF THE STUDY
Student behavior is a problem that cannot be regarded as trivial.
The problem of students bringing weapons to school is an issue that will
not go away by itself. School children are harming each other with
regularity. The problems are particularly acute and are complicated by
their connection to the prevalence of poverty, crime, and despair.
Installing video surveillance system will help students focus on
their studies and not make them worry about outside violence. These
installations represent a huge amount of video to transmit, view and
archive, making it impossible for a human monitor to analy!e all of these
video recordings in order to detect suspicious behavior or events. This is
especially true since security control centre personnel are also re<uired to
manage other tasks, such as access control, issuance of
badges/keys/permits, handling emergency calls, following up on fire
alarms, radio communications control, etc.
0ver the past decade, the security of individuals and property, and
the security of information have become ma=or global issues. >aced with
problems such as the fight against terrorism, enhanced national security
and the rapid development of cyber crime, our societies are increasingly
investing in protection. This sector therefore offers great opportunities for
businesses, both with respect to technological development and services.
Information and communications technologies in particular provide new
and sophisticated solutions for physical and IT security.
68
'mong the solutions proposed, video surveillance is one of the
oldest and most widespread security technologies. 'lthough still mostly
analogical, it is undergoing a digital revolution with the ongoing
transition to videos on IP networks. Sometimes integrating hundreds of
cameras, these new systems create a huge amount of video information
that cannot be processed only by security agent screen surveillance. To
resolve this issue, intelligent video surveillance, by video analytic, can
process the information by software analysis in order to keep only the
data relevant to security.
ideo Surveillance should be place at dedicated viewing areas
such as entrances, hallways, stairwells or even classroom environments,
so that the best possible view can be achieved in relation to what the
camera%s primary focus should be. Schools can feature multiple entrances
or e2its and may span multiple buildings. It can soon become hard to
keep track of where potential security risks may occur at any given time.
It is important to note that all video surveillance will remain in a fi2ed
position thus providing a dedicated view of what is most important. It can
be repositioned which may result in the camera looking in the wrong
direction at the wrong time. ideo Surveillance cameras should only be
used in school campus environments as a secondary means of security.
' school campus may include a single building at one location up
to hundreds of buildings spanning multiple locations. 0ne of the many
benefits of video surveillance technology is the ability for centrali!ed
management. ?o longer is surveillance limited to a building by building
68
configuration. 'lso avoided is the cost of trying to bring all cameras
video feeds to a centrali!ed location.
ideo @uality and ideo >rame $ates Schools can become very
busy places rather <uickly. It is important that video <uality be at a level
high enough so that identification of persons can be made easily.
Cameras need both high video <uality and a reasonable video frame rate
for this to occur. This was once difficult due to cost and bandwidth
limitations.
.ith video surveillance applications over school campuses it is
important to focus on areas that are of key importance. These are the key
security risk areas that should be monitored at all times without changing
camera position. It is also important that video surveillance cameras used
in these areas are of high <uality so that proper identification can be
made easily. .ith the added benefits of video surveillance including
centrali!ed management capabilities and high resolution capable
cameras, a safe and secure environment can be created where students
and faculty can focus on education without the worry of feeling unsafe or
unprotected.
68
OBJECTIVES
The purpose of this study is to achieve a general understanding of
the technology implicated in using ideo Surveillance System in School.
This study identifies the security threats and concerns of a
particular place.
This study can address possible actions with regards to the problem
and to understand that video technology has benefits but at the same time
can have an effect on the privacy of individuals.
68
CONCEPTUAL FRAMEWORK
The research paradigm that guided this study is shown in >igure.
It follows the Input-Process-Output approach.
ideo
Surveillance
e<uipment
Survey
@uestionnaire
ideo
Surveillance
e<uipment
Survey
@uestionnaire
Installation of
ideo
Surveillance
1<uipment
0bservation
through
surveillance
e<uipment
Aistribution and
retrieval of the
survey
<uestionnaire
'nalysis and
computation of
data gathered
Installation of
ideo
Surveillance
1<uipment
0bservation
through
surveillance
e<uipment
Aistribution and
retrieval of the
survey
<uestionnaire
'nalysis and
computation of
data gathered
Immediate
response to a
possible/ actual
incident
'nalysis after
an incident
1videntiary
analysis after
an incident
Conducive
place for
teaching and
learning
process.
'ssessment of
the survey7s
outcome
Immediate
response to a
possible/ actual
incident
'nalysis after
an incident
1videntiary
analysis after
an incident
Conducive
place for
teaching and
learning
process.
'ssessment of
the survey7s
outcome
INPUT PROCESS OUPUT
68
The input of the study consisted of the typical ideo Surveillance
1<uipment like ideo Cameras, #onitor and a trap. This study also
consists of a Survey @uestionnaires.
The process composed of Installation of ideo Surveillance
1<uipment, an observation through the ideo Surveillance 1<uipment,
the distribution and retrieval of Survey @uestionnaires then the analysis
and computation of all the data gathered.
The output consisted of the immediate response to a possible /
actual incident, analysis after an incident, evidentiary analysis after an
incident, conducive place for teaching and learning process and the
assessment/evaluation on the survey7s outcome.
68
STATEMENT OF THE PROBLEM
This study aims to evaluate how video surveillance system helps to
secure the school.
Specifically, it sought answer the following <uestions:
). .hat are the specific security threats and concerns of the school
attempting to address by using a video surveillance system.
,. Bow will it help address those threats and how will the school
actually use it on a day-to-day basis.
C. Bow does the school management accept and interpret data
produce by the systemD
+. Bow does the student accept the new system if implementedD
E. Is there a significant difference between the security personnel
officer and the video surveillance systemD
68
SCOPE AND DELIMITATION OF THE STUDY
This study focused on the security system of the individuals in
schools by having a defense security system using video surveillance.
This study, intended for a non-e2pert audience, discusses the ins
and outs of this technology and tries to characteri!e the market it
represents, not for different places, but more specifically in schools. It
contains information on video surveillance technology, its application,
and leading edge video analytic techni<ues applicable to it, its needs, the
developments and trends in this field, the issues it raises, and the supply
and demand it generates.
>urthermore it only attempted to identify the needs of the group
concerned, e2planations or reasons for these needs were not concerns of
this study.
68
SIGNIFICANCE OF THE STUDY
Students
This analysis/ research will help the students to feel safe inside the
school" they can concentrate/focus on their studies without bothering on
what could possibly happen to them while they are in the school vicinity.
.ith the help of this study the security of the students inside the
campus will be intensively monitored by the use of the security system
installed within the school campus. Students may be less inclined to
cause trouble because of the solid documentation that the video
recordings provide.
School Administrators / Universities
.hen school campuses provide a video surveillance system for
their security, it will become a peaceful, conducive and friendly school
environment. It will maintain the peace of mind of the School
administrators or staff inside the school campus. School will easily
secure the safety of the students enrolled. 'nother thing is video
surveillance security system will help the school officials to find the
performance evaluation of their employee. This system will also use to
lessen or decrease the property damages such as vandalism and theft" far
too often the administration can only react to vandalism with time-
68
consuming, seldom successful and often fruitless attempts to identify the
perpetrators.
Researcher
This study serves as a ma=or part of the course re<uirement as it
has developed their skills in terms of self-esteem, time management,
practicality, strategic planning and patience. Bence, they are able to
obtain the necessary information on time and reporting it in the most
presentable manner they can. This study can be effective tool for
reference to know how to make the schools safer.
68
DEFINITION OF TERMS
To understand and clarify the terms used in the study, the
following are hereby defined:
Video S!"ei##$%&e ' is the monitoring of the behavior, activities, or
other changing information, usually of people and often in a surreptitious
manner. It most usually refers to observation of individuals or groups by
government organi!ations.
Se&!i() S)*(e+ ' a system that enforces boundaries between computer
networks. It is an electrical devise that sets off an alarm when someone
tries to break in
IP Ne(,o!- ' is a computer network made of devices that support the
Internet Protocol.
Mo%i(o! ' a device that displays images or symbols generated by
computers.
L$, E%.o!&e+e%( O..i&e! ' is any public-sector employee or agent
whose duties involve the enforcement of laws.
V$%d$#i*+ ' is the behavior attributed originally to the andals, by the
$omans, in respect of culture: ruthless destruction or spoiling of anything
beautiful or venerable. Such action includes defacement, graffiti and
criminal damage.
T/e.( ' is the illegal taking of another person%s property without that
person%s freely-given consent. The word is also used as an informal
68
shorthand term for some crimes against property, such as burglary,
embe!!lement, larceny, looting, robbery, shoplifting, fraud and
sometimes criminal conversion.
Di0i($# Video Re&o!de! ' is a device that records video in a digital
format to a disk drive, &S/ flash drive, SA memory card or other mass
storage device. The term includes set-top bo2es with recording facility,
portable media players 8P#P9 with recording facility, recorders 8P#$ as
camcorders that record onto memory cards9 and software for personal
computers which enables video capture and playback to and from disk.
A!&/i"ed ' is a collection of historical records, as well as the place they
are located. 'rchives contain primary source documents that have
accumulated over the course of an individual or organi!ation%s lifetime.
A#0o!i(/+ ' is an effective method for solving a problem e2pressed as a
finite se<uence of instructions. 'lgorithms are used for calculation, data
processing, and many other fields.
T/e!+$# S&$%%e! ' a thermal scanner takes a measurement of the
reflection of electromagnetic energy emitted in the infrared spectrum. It
has the ability to sense differences in temperatures of known ob=ects.
1'!$) ' is a form of electromagnetic radiation. It can penetrate solid
ob=ects and their largest use is to take images of the inside of ob=ects in
diagnostic radiography and crystallography.
HYPOTHESIS
The hypothesis pursued and tested in this study was
68
). There is no significant difference between the Security Personnel
officer and the ideo Surveillance Security System.
CHAPTER II
REVIEW OF RELATED LITERATURE
Fo!ei0% S(die*
#any 1uropean countries now employ public video surveillance as
a primary tool to monitor population movements and to prevent
terrorism. The &nited 3ingdom 8&39 in particular relies e2tensively on
video surveillance as a tool to fight crime and prevent terrorism.
'ccording to some researchers, the camera surveillance systems in the
&3 are discouraging and thus preventing crime.
Public video surveillance in the &3 began very unassumingly in
)*6F, on a single s<uare mile industrial estate outside the 1nglish town of
3ing%s Gynn. Three CCT video surveillance cameras were used and
their impact was immediate. In the years before the cameras were
installed, there had been E6 crimes 8mostly vandalism9 recorded on the
estate. In the two years following the installation, there were no crimes
reported. Subse<uently, cities and towns across (reat /ritain began using
this crime prevention measure. /y )**+, over C55 =urisdictions in the
country had installed some form of public video surveillance.
68
In )**E, the national government made available up to HC.) million
in matching grants available to cities and towns to establish CCT video
surveillance programs. 'ccording to the police superintendent of a large
metropolitan area, Ipublic video surveillance has been very helpful in
making arrests, and perhaps more important, helping to allocate resources
to where they%re most necessary.I 'lthough most municipal systems have
been operational since )**5, there is little longitudinal data indicating
how effective CCT surveillance systems actually have been in reducing
crime rates. $ecent /ritish government reports cite CCT surveillance as
a ma=or reason for declining crime rates: in the small town of /erwick
burglaries fell by F* percent" in ?orthampton overall crime decreased by
E4 percent" and in (lasgow, Scotland crime decreased by F6 percent.
,E

W/$( C!i+i%o#o0i*(* $%d O(/e!* S(d)i%0 C$+e!$* H$"e Fo%d
?oam /iale, 'dvocacy Coordinator, 'CG& Technology and Giberty
Program
E1ECUTIVE SUMMARY
'n increasing number of 'merican cities and towns are currently
investing millions of ta2payer dollars in surveillance camera systems. /ut
few are closely e2amining the costs and benefits of those investments, or
creating mechanisms for measuring those costs and benefits over time.
There is e2tensive academic literature on the sub=ectJstudies carried out
68
over many yearsJand that research strongly indicates that video
surveillance has no statistically significant effect on crime rates.
The principle studies on video surveillance have been conducted in
the &3, where surveillance cameras are pervasive. Those studies, which
have been commissioned by the /ritish Bome 0ffice, have found varying
results when they look at individual camera sites in isolation. Bowever,
the best studies combine results from multiple camera sites in a meta-
analysis, which eliminates anomalies. The two main meta-analyses
conducted for the /ritish Bome 0ffice show that video surveillance has
no impact on crime whatsoever.
ideo surveillance systems are more disparate and at various
levels of operability in the &nited States.
's such, fewer independent studies of their efficacy e2ist.
Bowever, preliminary studies of surveillance cameras in California show
similar results to studies conducted in the &3: Cameras having little to
no effect on crime reduction.
This .hite Paper is based on a literature review of ma=or studies of
video surveillance from ,555 to ,556.
It e2amines the key meta-analyses from the &3, discusses the
ma=or difficulties in determining the impact of video surveillance on
crime, and describes preliminary studies conducted in the &S.
The ma=or findings of these studies should, at a minimum, be part
of the debate around surveillance cameras.
'n increasing number of 'merican cities and towns are currently
investing millions of ta2payer dollars in surveillance camera systems. /ut
68
few are closely e2amining the costs and benefits of those investments, or
creating mechanisms for measuring those costs and benefits over time.
There is e2tensive academic literature on the sub=ectJstudies carried out
over many yearsJand that research strongly indicates the following:
K #eta-analyses 8studies that average the results of multiple
studies9 in the &3 show that video surveillance has no statistically
significant impact on crime.
K Preliminary studies on video surveillance systems in the &S show
little to no positive impact on crime.
This .hite Paper is based upon a literature review of independent
studies on the effect of video surveillance on crime rates from ,555 to
,556, particularly meta-analyses that aggregate data from several studies.
It surveys what these meta-analyses have found, the methodological
difficulties of studying video surveillance systems in isolation, and
preliminary results from studies in the &S.
The ma=or findings of these studies should, at a minimum, be part
of the debate around surveillance cameras.
DIFFICULTIES OF STUDYING SURVEILLANCE SYSTEMS
#easuring the success of public video surveillance systems is
comple2, because there are always innumerable factors that can e2plain a
rise or fall in crime rates. Simply showing an increase or decrease in
reported crime in an area under surveillance does not take into account
general trends in crime and crime reporting, additional police in the areas
68
under surveillance, better lighting, and perhaps most importantly, the
possible displacement of crime to other areas not under surveillance.
Several factors in particular make it difficult to assess the
effectiveness of surveillance cameras:
K Di*2#$&e+e%(3 Aisplacement complicates attempts to measure the
impact of surveillance cameras on crime rates, because it means that the
control area cannot be too close in pro2imity to the cameras. >or
e2ample, in looking at a downtown district and comparing the number of
muggings on particular blocks, one might reasonably assume that if the
rate of muggings increase near an area that is being monitored by
cameras, and decrease in the area being directly monitored, then the
cameras have been effective in reducing muggings. Bowever, it could
also be reasonably assumed that the placement of the cameras on a
particular block in fact pushed the muggings into surrounding areas, and
did not reduce crime overall. This is really a problem of interpretation,
not data, and as a result, displacement can be e2traordinarily difficult to
show.
K Co%.o%di%0 "$!i$4#e*3 It can be inaccurate to e2trapolate success
from specific locations to general areas. >or e2ample, enclosed places
such as parking lots tend to produce better outcomes than outdoor areas.
In addition, other factors such as increased police presence and better
lighting in areas under surveillance make it difficult to conclude which
intervention is most effective. It is unclear in many studies that appear to
show success whether surveillance cameras had a positive impact in
combination with improved lighting, or whether the improved lighting
68
might accomplish the positive outcome on its own. Studies vary on the
degree to which they take confounding factors into account.
/ecause of these problems, individual video surveillance studies
may not be reliable on their own. In evaluating the merits of video
surveillance it is important to look at the overall trend of multiple studies
and place particular reliance on studies with rigorous methodology. >or
this reason, the &3 Bome 0ffice has adopted the meta-analysis as the
best statistical tool for studying the efficacy of surveillance cameras.
META'ANALYSES OF UNITED KINGDOM SURVEILLANCE
SYSTEMS
The efficacy of public video surveillance as a crime-fighting tool
has been analy!ed in a wide range of studies over the last decade. The
ma=ority of research has been conducted in the &nited 3ingdom, which
more than any other country has embraced the widespread use of
cameras. The &37s network of public surveillance cameras is the largest
in the world 8although China is <uickly outpacing it9.) The number of
surveillance cameras in 1ngland and .ales increased from )55 in )**5
to +5,555 in ,55,,, and now stands above +., million, or one for every
)+ persons.C The center of Gondon is surrounded by a Lring of steel,M a
networked video surveillance system that is intended to allow law
enforcement to track individuals moving through the city, observe
patterns of behavior and respond immediately to threats.
68
The /ritish Bome 0ffice, the agency in charge of security, spent
46N of its criminal =ustice budget in the )**57s on surveillance
cameras,+ and is estimated to have spent over OE55 million
8appro2imately a H) billion9 in between )**E and ,55E.E
The Bome 0ffice has commissioned several key studies on the
effectiveness of these systems around the &3 using meta-analysis. #eta-
analysis combines the results of multiple studies that all have similar
hypotheses and methodological criteria. This is important because it
weeds out anomalies. >or e2ample, one installation of a video
surveillance system might coincide with a sharp drop in crime, but we
cannot know whether it caused the drop without comparing it to other
scenarios 8further e2planation of the difficulty of measuring success from
isolated studies is below9. ' meta-analysis can provide a clearer sense of
the impact of surveillance cameras by taking a variety of studies and
averaging their results.
The individual studies show moderate successes in some sites,
usually in parking lots, and for certain types of crimes, usually vehicle
crimes. Bowever, the ma=ority of studies show no effect on overall crime,
and when combined in a meta-analysis, CCT is shown to have no
statistically significant impact on crime rates at all.
The following is a summary of the Bome 0ffice studies.
Home Office Study, 22
In the first Bome 0ffice study in 'ugust ,55,, /randon C. .elsh
and Aavid P. >arringtonF surveyed ,, studies of CCT 8both in the &3
68
and the &S'9 for a meta-analysis, and found that, taken together, the
cameras had no significant impact on crime.
.elsh and >arrington began with +F studies, but whittled the
number down to )6 based on the criteria for inclusion in the meta-
analysis.4 0f the )6 studies, half showed some reduction in crime in the
area under surveillance, about a <uarter showed an increase in crime, and
the remaining studies showed a null effect. .elsh and >arrington then
created a meta-analysis for the included studies, by determining an odds-
ratio for each study and then combining these ratios. 'n odds-ratio is a
numerical e2pression of the net effect of an intervention, calculated by
comparing results in the e2perimental area with the control. 'n odds-
ratio of ) shows that there is no difference in crime rates between the
e2perimental 8surveilled9 area and the control. 'n odds-ratio greater than
) shows that the areas with cameras are e2periencing less crime than the
control areas. 'n odds-ratio of less than ) show that the areas with
cameras are e2periencing more crime than the control.
.hen .elsh and >arrington combined odd-ratios for all )6 studies
included in the meta-analysis, they found that the average was =ust over
), showing a very small impact on crime, and when measured against the
standard deviation, this impact was shown to be statistically insignificant.
The areas with cameras did not perform better than the areas without.
It is worth noting that the two areas included in which cameras
were the only intervention used 8no added police presence, increased
lighting, etc.9 showed no effect on crime in one case,6 and an increase in
crime in the other.* >ive of the eleven studies that showed reductions in
68
crime looked at camera systems located in enclosed parking lots. These
studies showed an overall odds-ratio of ).4, but included other
interventions, such as improved lighting, fencing, notices about CCT,
and increased security personnel. This suggests that cameras can be
effective when used in specific environments and combined with other
preventative measures.
Home Office Study, 2!
Criminologists #artin (ill and 'ngela Spriggs published a
comprehensive analysis of fourteen individual sites in the &3 for the
Bome 0ffice in ,55E,)5 which found, again through the use of meta-
analysis, that the cameras had Lno overall effectM on crime rates.
(ill and Spriggs concluded that only one of )C sites showed a
statistically significant reduction in crime 8one site was e2cluded for
failing to meet the crime statistics recording criteria9. This site showed a
reduction far larger than any othersJan odds-ratio of C.C+, indicating a
reduction in crime of over C55N, compared with the second-largest odds-
ratio of ).C6, or =ust under +5NJand was also the most e2pensive site, at
a cost of over OC million 8about HF million9 for the camera system. This
area also e2perienced several confounding factors including increased
fencing and improvements to security, though these were implemented
once the video surveillance system was fully installed and thus may not
have had a distorting impact on the outcome.
'lthough (ill and Spriggs% analysis found Ithat CCT schemes
produced no overall effect on all relevant crime viewed collectively,I))
68
the study did show overall better outcomes for vehicle crimes in seven of
the sites. iolent crimes were different. In the four urban city centers
included in the study, violence against persons increased in three sites.
(ill and Spriggs hypothesi!e that these crimes may be impulsive and
more often influenced by alcohol.), They also acknowledge that changes
to parking regulations in at least one site may have contributed to the
reduction in vehicle crime, by simply reducing the number of vehicles on
the street.)C In addition, burglary, a property crime that did show
reductions in one site, showed the highest rate of displacement in an area
ad=acent to the target area.)+
(ill and Spriggs additionally found that fear of being victimi!ed
by crime did not change significantly from before the cameras were
installed and after, though F*-*FN of individuals surveyed in the )+ sites
responded favorably to plans to install camera systems.
PRELIMINARY USA STUDIES SHOW LITTLE POSITIVE
IMPACT
>ewer studies of video surveillance have been conducted in the
&nited States, where cameras have been erected in a piecemeal manner,
and have not undergone an e2tensive process of networking 8though
Chicago)E and ?ew Pork)F are beginning this process9. Studies
are, at this point, insufficient to conduct meta-analyses based solely on
studies in the &S. Bowever, .elsh and >arrington7s ,55, meta-analysis
compared &3 and &S sites, and the two revisited this comparison in a
,55+ follow-up.)4
68
The 'merican studies that met the criteria for the meta-analysis
generally showed worse outcomes that those in the &3, showing an
undesirable or null effect on crime. .elsh and >arrington point out a few
key differences between the &3 and &S systems that might e2plain this.
0ne possibility is a difference in reporting time, with the &3 studies
generally taking longer to report findings. Bowever, as .elsh and
>arrington report, what is likely an even more important factor, is
that the surveillance sites in the &S lack the confounding elements of the
/ritish sites. .hile nine of the )+ &3 sites used several different
interventions simultaneously, such as improved lighting and increased
foot patrols, none of the &S schemes used any intervention besides
cameras. Thus, these studies provide a more unadulterated look at the
effect of surveillance cameras on crime rates than their &3 counterparts
and show that cameras on their own have virtually no impact on crime.)6
The following are two initial independent studies of small-scale
systems, both in California,)* that offer a preliminary view of the impact
of video surveillance on crime in &S cities.
U" #er$eley Preliminary Study
The city of San >rancisco7s F6 cameras appear to have had a small
impact on property crimes, but no impact on violent crimes.
Qennifer 3ing and colleagues at Center for Information Technology
$esearch in the Interest of Society 8CIT$IS9 and the Samuelson Clinic at
the &niversity of California, /erkeley, are currently in the process of
studying the impact of San >rancisco%s small video surveillance system.
68
In #arch ,556, they published preliminary findings.,5 Gooking at
aggregate statistics on serious violent crime and serious property crimes
before and after installation of cameras in high-crime neighborhoods,
3ing%s group found a ,,N decline in property crime occurring within )55
feet of the cameras, but no statistically significant changes between )55
and E55 feet from the cameras. This would seem to suggest that the
cameras are, in fact, working to reduce property crimes. Bowever,
without the benefit of aggregated multiple studies in a meta-analysis, we
cannot know whether this reduction is a fluke or not.
$egarding violent crime, there appeared to be no statistically
significant change in the level of crime anywhere in the E55 foot range
around the cameras. .hen violent crimes were disaggregated, a decline
in homicide was observed within ,E5 feet of the cameras, however this
reduction was offset completely by an e<ual increase in homicides
between ,E5 and E55 feet from the cameras, suggesting displacement.
The study also did preliminary analysis of crime statistics E55-
)555 feet away from the cameras, and thus, based on information
available from the San >rancisco Police Aepartment, out of the range of
surveillance, and found an increase in property crime between E55 to 4E5
feet from the cameras.
This might suggest displacement from the areas directly monitored
by the cameras, though an off setting decline in property crimes in the
area 4E5 to ),555 feet away makes a determination of displacement
inconclusive.
68
?otably when the preliminary findings of the &C /erkeley study
were reported in the San Francisco
Chronicle, Supervisor $oss #irkarimi, who heads the board%s
public safety committee, responded to the apparent null effect on violent
crime by asserting that the cameras provided Lpsychological reliefM to
citi!ens, and were thus =ustified.,) The city has so far spent H*55,555 on
the F6 cameras currently up and has budgeted an additional H,55,555 for
,E more cameras intended to target violent gang activity.,,
US" Study
Preliminary studies of camera systems in Gos 'ngeles show no
impact on crime.
Students at the &niversity of Southern California School of Policy,
Planning and Aevelopment released a report to the California $esearch
/ureau in #ay ,556 on the effects of video surveillance on crime in two
areas of Gos 'ngeles.,C The group looked at five out of )+ cameras
along a high-traffic section of Bollywood /lvd. and si2 cameras at the
Qordan Aowns Public Bousing Pro=ect in .atts. The study notes that,
unlike San >rancisco%s public video surveillance system, cameras in Gos
'ngeles have not been analy!ed by the city or some other official body to
determine their efficacy. This may be because while San >rancisco has
incurred substantial costs for installation and upkeep of the cameras,
many of G'%s cameras, including the clusters that the &SC group
e2amined, were installed through private donations 8on Bollywood /lvd,
for e2ample, the cameras were donated to the city by the film industry9 or
68
federal grants through the &S Aepartment of Bomeland Security%s (rant
Program. 'nother important distinction between the camera systems in
Gos 'ngeles and those in San >rancisco is active monitoring of G'%s
cameras Lin real time,M vs. a decision by the San >rancisco City Council
to allow only passive monitoring of the cameras for the purposes of
safeguarding citi!ens% privacy.
Gooking at the G'PA%s C0#PST'T figures to determine pre and
post installation crime rates, as well as arrest records, the study found no
significant impact on crime in either area. iolent crime went down in
both areas, but that reduction was offset by an overall crime reduction in
surrounding control areas 8though in the case of the Qordan Aowns
Bousing Pro=ect, the group hypothesi!ed that the cameras may have
played a role in preventing a substantial escalation of crime relative to
surrounding areas, since the housing pro=ect was the site of a gang war
during the period of the study9. The group was not able to find
statistically significant evidence of displacement in either area.
Lo&$# Li(e!$(!e
The Philippines is known as the Pearl of the 0rient, with its e2otic
and tropical islands, rare and valuable natural resources, stunning natural
wonders, warm and hospitable people, and rising national status in the
world. /ut with all these raves, the country is not e2empt from the terrors
of the rest of the world. Aespite its beauty, the country is also in danger
of relentless terrorist threats and terrorism incidences. Communications
68
and Information Technology industries are also booming and the
workplace is getting larger and more comple2 as time progresses. The
country is not bereft of crimes, in the cities, suburbs, and rural areas. The
fact is that this is the harsh reality that goes hand in hand with the
wonders and delight the country can offer.

/ut the good side to this is that we are not left helpless to these
looming possibilities of insecurity. Pou have the choice of taking a
proactive stance when it comes to securing your homes, your businesses,
your country, and your future. Philippine Security brings you the latest
and most reliable storage and security system technologies that can take
your safety and security confidence to a higher level. 0nly Philippine
Security offers the complete set of security solutions that can meet the
security needs of various types of clients R from the government, to the
business sector, to academic institutions, to individual homes and to the
schools and campuses. 0ur line-up of products and solutions include the
top-of-the-line surveillance cameras, access control and alarm systems.

68
CHAPTER 5
RESEARCH METHODOLOGY
RESEARCH DESIGN
This study will use the descriptive method of the survey type of
research which describe and interpret data and characteristics about the
population or phenomenon being studied. It involves some type of
comparison or contrast and attempts to discover relationships between
e2isting and non manipulative variables.
#oreover, '<uino describes the descriptive research as fact-
finding methodology with ade<uate interpretation. Be further claims that
the descriptive method is something more and beyond =ust data gathering.
Be believes that the discussions of those data are carried up to the level
of ade<uate interpretation. The data must be sub=ected to terms of ordered
reasoning.
POPULATION6 SAMPLE AND SAMPLING TECHNI7UES
The purposive sampling will be used in the selection of the
respondents only in 1'$IST, ?agtahan, Sampaloc, #anila will be
utili!ed to answer the <uestionnaires.
68
In this regard, Pagoso emphasi!ed that purposive sampling was
based on certain criteria laid down by the research such that the
respondents within the population have meaning for the data that will be
gathered.
The respondents of the study will be the students and faculties of
1'$IST, #anila.
RESEARCH INSTRUMENT
The survey <uestionnaire was used as the main data-gathering
instrument for this study. The <uestionnaire was divided into two main
sections: a personal data sheet or the profile and the survey proper. The
profile contains socio-demographic characteristics of the respondents such
as age, gender, and the respondent7s knowledge about video surveillance
system. The <uestions were structure using the Gikert format. In this
survey type, five choices are provided for every <uestion or statement. The
choices represent the degree of agreement each respondent has on the
given <uestion.
The Gikert survey was the selected <uestionnaire type as this
enabled the respondents to answer the survey easily. In addition, this
research instrument allowed the research to carry out the <uantitative
approach effectively with the use of statistics for data interpretation
68
DATA GATHERING PROCEDURE
Permission to conduct the study will be secured by the researcher
from the school administrator of 1ulogio L'mangM $odrigue! Institute of
Science and Technology, ?agtahan, Sampaloc, #anila. 'fter which, the
researcher will go to the school under study to personally distribute the
<uestionnaire to the students and employees who has a knowledge or
familiarity about the ideo Surveillance System. The <uestionnaire will
be scored, tallied and tabulated.
STATISTICAL TREATMENT OF DATA
The information gathered were tabulated and processed manually
and with the aid of computer to determine the precise interpretation of the
results. #atri2 tables were made to organi!e, summari!e, and analy!e the
data gathered for easy determination of its difference from each other.
Aata were collated, tabulated, and analy!ed. The following
statistical tools were used in the analysis of data:
%& Percenta'e
68
To describe the profile of the respondents, the percentage
will be computed. The measure of dominant <uantity was utili!ed to
determine the most probable scenario.
(ormula)
P S >/? 2 )55
where:
P S Percentage 8N9
> S >re<uency
? S Total ?umber of Population
,. The responses to <uestions in the given variables were scaled using
the Lfive-point-scaleM or Gikert Scale system and given weight as
follows:
C. The process of finding the L.eighted #ean,M which is referred to
as the central tendency was used, The formula is given below:
.#
; S T----------
R$(e Ve!4$# I%(e!2!e($(io% R$%0e
E Strongly 'gree +.F R E.5
+ 'gree C.F R +.E
C #oderately 'gree ,.F R C.E
, Aisagree ).F R ,.E
) Strongly Aisagree ).5 R ).E
68
?
where:
; S weighted mean
w S weighted factor
S summation
? S total number of respondents
2 S score
+. To test the level of significance between the assessments of the
respondents the Chi-S<uare were employed to determine the
relationship of factors as given.
The formula of &/i'*8$!e is presented as follows:
Where:
;
,
S Chi R S<uare
f 8a9 S 'ctual >re<uency or number of observations in
a cell
f 8e9 S 12pected >re<uency or number of observations
in a cell in the theoretical distribution
T S Symbol for LsummationM
E. $ank #ethod
68
$ank consists of arranging number of decreasing or
increasing order of si!e. The highest occurrences of behavior or the
class with the greater number was given the highest rank.
CHAPTER IV
Presentation, Analysis and Interpretation of Data
This Chapter presents, analy!es and interprets the data gathered
based on the <uestions posited in the study.
DEMOGRAPHIC PROFILE
>or the profile of the respondents, the <uestionnaire asked for the
participants7 age, gender and their 3nowledge in ideo Surveillance
System. /elow are the tables summari!ing the gathered values for each
profile category:
TABLE 1
Age Distribution of ! "espondents
AGE FRE7UENCY PERCENTAGE
,) years old and below ,5 +5N
,)-,E years old ,C +FN
,F-C5 years old + 6N
C)-CE years old , +N
CE years old U above ) ,N
TOTAL 9: 1::;
It can be seen in table ) that ma=ority of the respondents belong to
the age bracket of ,) R ,E years old with the fre<uency of ,C or +FN
68
followed by the age bracket of ,) years old and below with the
fre<uency of ,5 or +5N. + or 6N of the respondents are in the age bracket
of ,F R C5 years old.
TABLE <
#ender Distribution of ! "espondents
GENDER FRE7UENCY PERCENTAGE
#ale C, F+N
>emale )6 CFN
TOTAL 9: 1::;
Table , shows the Aistribution of respondents by age. /ased on
the data in the table, ma=ority of the respondents are male with the
fre<uency of C, or F+N and only )6 or CFN are female.
TABLE 5
$nowledge in %ideo Sur&eillance Syste' Distribution of ! "espondents
K%o,#ed0e i% Video FRE7UENCY PERCENTAGE
68
S!"ei##$%&e S)*(e+
'dvance E )5N
#oderate C, F+N
3nowledgeable )) ,,N
?ew , +N
TOTAL 9: 1::;
'll of the respondents are separated according to their 3nowledge
in ideo Surveillance System. 'lmost C, out of E5 respondents or F+N
of the respondents have a moderate knowledge in video surveillance
system. .hile ))of them or ,,N are moderately knowledgeable about
this system" E or )5N of the respondents have advance knowledge and
the , or +N left are new or not familiar about this system.
SURVEY ANALYSIS
Li-e!( S&$#e S)*(e+
R$(e Ve!4$# I%(e!2!e($(io% R$%0e
E
Strongly 'gree
8S'9
+.F R E.5
+
'gree
8'9
C.F R +.E
C &ncertain ,.F R C.E
68
8&9
,
Aisagree
8A9
).F R ,.E
)
Strongly Aisagree
8SA9
).5 R ).E
Chi-s<uare formula and degrees of freedom table
Where:
;
,
S Chi R S<uare
f 8a9 S 'ctual >re<uency or number of observations in a
cell
f 8e9 S 12pected >re<uency or number of observations in a
cell in the theoretical distribution
T S Symbol for LsummationM
SURVEY RESULTS
TABLE =
68
Specific security threats and concerns of the school atte'pting to
address by using a &ideo sur&eillance syste'
W3M V3I3 RANK
a. 1'$IST Security Personnel has less security
gadgets
C.*F ' E
b. #ost of the 1'$IST Security Personnel
doesn7t know how to use a security camera
C.+ & )
c. #ost of the 1'$IST Security Personnel
doesn7t know how to install and operate
video surveillance
C.E & C
d. 1'$IST Security 0ffice doesn7t fit the
installation area of the ideo Surveillance
System
C.E+ & +
d. Security threats are not address properly C.++ & ,
To($#
C.EF
6
'
/ased on my computation using weighted mean, table + shows that
letter ' got the highest rank among the five problems with the weighted
mean of C.*F. It could be noted that ma=ority of the respondents agree
that 1'$IST Security Personnel has less security gadgets.
TABLE 9
%ideo Sur&eillance Syste' will ease threats and will help the school on a
day(to(day basis
W3M V3I3 RANK
68
a. 1'$IST Security Personnel cannot actually
determine threats inside or outside school
premises.
C.46 ' )
b. ' routine check to all students and visitors
going in and out of the institute
C.* ' +
c. ' routine check on all vehicles going in and
out of the Institute
C.66 ' C
d. ' real time monitoring of all the Students
and visitors of the School
C.66 ' ,
e. ' real time recording of what is happening
beyond the scope of the surveillance camera
C.*+ ' E
Total
C.64
F
'
's shown in the table, ma=ority of the respondents says agree that a
real time recording of what is happening beyond the scope of the video
surveillance camera are one of the most important benefits of video
surveillance in school campus with the weighted mean of C.*+. ' routine
check to all students and visitors going in and out of the institute was
ranked fourth with the weighted mean of C.*. $anked third and second
has an e<ual weighted mean of C.66 and C.46 of the weighted mean also
agree that 1'$IST Security Personnel cannot actually determine threats
inside or outside school premises.
TABLE 6
Accepting and interpreting of data produce by the syste'
W3M V3I3 RANK
68
a. Student database will be used in monitoring
the students
C.66 ' +
b. ' faculty and employees database will be
used in monitoring faculty and employees
C.*6 ' E
c. ' print out will produce for manual
checking
C.4F ' ,
d. 'n automatic logging system will be
adopted
C.6, ' C
e. 0n the spot data report can be easily
produce.
C.E & )
To($#
C.46
6
'
It can be seen that C.*6 is the highest computed weighted mean on
how does the school management accept and interpret produce by the
system. /ased on the table, letter 8b9 got the highest rank followed by
letter 8a9 with the weighted mean of C.66, the third ranked has a weighted
mean of C.6,. Getter 8d9 got the second rank with the computed weighted
mean of C.4F while the calculated weighted mean for the first ranked is
C.E for letter 8e9
TABLE >
Students) acceptance on the syste'
W3M V3I3 RANK
a. 'ccredited Students organi!ations will be
consulted before applying the system
C.*, ' +
b. Institute student government will be the first
to summon on proper orientation of the
system
C.*, ' C
c. Comments and suggestions will be properly C.*F ' E
68
entertained
d. ' survey on the entire students will be
conducted to get their pulse
C.* ' ,
e. ' computational analysis will be conducted
to determine the acceptability of the system
C.6, ' )
To($# C.*5+ '
/ased on Table 4, it could be seen that C.*F of weighted mean
agree that comments and suggestions will be properly entertained for the
acceptance of the system" respondents agree that accredited Students
organi!ations will be consulted before applying system and also the
Institute Student (overnment will be the first to summon on proper
orientation of the system with a weighted mean of C.*," a weighted mean
of C.* also '($11 that a survey on the entire students will be conducted
to get their pulse" #oreover, C.6, of the computed weighted mean agree
for the computational analysis that will be conducting to determine the
acceptability of the system.
68
CHI'S7UARE DISTRIBUTION
The tables below are the distribution of the data gathered from the
survey <uestions. 1ach of the table consists of the 'ctual >re<uency or
number of observations in a cell, the 12pected >re<uency or number of
observations in a cell in the theoretical distribution and the values for 80
- 19
<
?E under its erbal Interpretation. 8E9 Strongly 'gree" 8+9 'gree" 8C9
&ncertain" 8,9 Aisagree" 8)9 Strongly Aisagree.
The tabular chi-s<uare is attained by computing the degree of
freedom 8df9 with the formula df S 8C - )9 8$ - )9 which is e<ual to )F at
5.5E level of significance. The computed chi-s<uare value is then
compared to the tabular chi-s<uare value which is e<ual to ,F.C5.
68
?ote, that if the computed chi-s<uare value is greater than the
tabular chi-s<uare, the null hypothesis - there is no significant difference
between the old and the new system - is re=ected.
68
TABLE 4
Specific security threats and concerns of the school atte'pting to address by using a &ideo sur&eillance syste'
9 = 5 < 1 @O'EAB<?E
O E &/i O E &/i O E &/i O E &/i O E &/i To($#
$ )) 4., ,.55F ,4 ,) ).4)+ )) )E.6 ).+E6 ) E C., 5 ) ) *.C46
4 + 4., ).+,, ,) ,) 5.555 )F )E.6 5.55C * E C., 5 ) ) E.F,E
& E 4., 5.F4, ,C ,) 5.)*5 )E )E.6 5.5+) F E 5., ) ) 5 ).)5C
d F 4., 5.,55 )* ,) 5.)*5 ,) )E.6 ).4)) + E 5., 5 ) ) C.C5,
e )5 4., ).56* )E ,) ).4)+ )F )E.6 5.55C E E 5 + ) * )).65F
To($# C).,)+
68
>rom the table we can see that:
S *.C46VE.F,EV).)5CVC.C5,V)).65F C 513<1=
and d. C @C ' 1A@R ' 1A @9 ' 1A@9 ' 1A C @=A@=A C 16
0ur null, for the chi-s<uare test, states that there are no differences
between the observed and the e2pected fre<uencies. The alternate
hypothesis states that there are significant differences between the
observed and e2pected fre<uencies 's usual we will set our alpha level at
.5E.
C 513<1=
df S @C ' 1A@R ' 1A @9 ' 1A@9 ' 1A C @=A@=A C 16
ReDe&( H
:
i. EC <6353
Since our calculated value of 8C).,)+9 is greater than ,F.C, we
re=ect the null hypothesis and accept the alternative hypothesis.
68
68
TABLE 8
%ideo Sur&eillance will ease the threats and help the school on the day(to(day basis
9 = 5 < 1 @O'EAB<?E
O E &/i O E &/i O E &/i O E &/i O E &/i &/i
$ )5 )5., 5.55+ ,+ ,4., 5.C4F ), *.F 5.F C ,., 5.,*5* ) 5.6 5.5E ).C,)
4 )5 )5., 5.55+ ,* ,4., 5.))* 6 *.F 5.,FF4 , ,., 5.5)6, ) 5.6 5.5E 5.+E6
& )) )5., 5.5FC ,F ,4., 5.5EC )5 *.F 5.5)F4 , ,., 5.5)6, ) 5.6 5.5E 5.,5)
d )) )5., 5.5FC ,4 ,4., 5.55) 6 *.F 5.,FF4 C ,., 5.,*5* ) 5.6 5.5E 5.F4,
e * )5., 5.)+) C5 ,4., 5.,66 )5 *.F 5.5)F4 ) ,., 5.FE+E 5 5.6 5.6 ).*5)
To($# +.EE,
68
>rom the table we can see that:
S ).C,)V5.+E6V5.,5)V5.F4,V).*5) C =399<
and d. C @C ' 1A@R ' 1A @9 ' 1A@9 ' 1A C @=A@=A C 16
0ur null, for the chi-s<uare test, states that there are no differences
between the observed and the e2pected fre<uencies. The alternate
hypothesis states that there are significant differences between the
observed and e2pected fre<uencies 's usual we will set our alpha level at
.5E.
C =399<
df S @C ' 1A@R ' 1A @9 ' 1A@9 ' 1A C @=A@=A C 16
ReDe&( H
:
i. EC <6353
Since our calculated value of 8+.EE,9 is less than ,F.C, we
accept the null hypothesis and re=ect the alternative hypothesis.
68
68
TABLE F
Accepting and Interpreting of data produce by the syste'
9 = 5 < 1 @O'EAB<?E
O E O E O E O E O E &/i
$ )C *.+ ).C4* ,5 ,C.F 5.E+*, )E )+.F 5.5)) , ).6 5.5,,, 5 5.F 5.F ,.EF)
4 )) *.+ 5.,4, ,4 ,C.F 5.+6*6 ), )+.F 5.+FC 5 ).6 ).6 5 5.F 5.F C.F,E
& * *.+ 5.5)4 ,) ,C.F 5.,6F+ )* )+.F ).C,F ) ).6 5.CEEF 5 5.F 5.F ,.E6E
d 4 *.+ 5.F)C C5 ,C.F ).4CEF )5 )+.F ).++*C C ).6 5.6 5 5.F 5.F E.)*6
e 4 *.+ 5.F)C ,5 ,C.F 5.E+*, )4 )+.F 5.C*+E C ).6 5.6 C 5.F *.F )).*EF
To($# ,E.*,E
68
>rom the table we can see that:
S ,.EF)VC.F,EV,.E6EVE.)*6V)).*EFC <93F<9
and d. C @C ' 1A@R ' 1A @9 ' 1A@9 ' 1A C @=A@=A C 16
0ur null, for the chi-s<uare test, states that there are no differences
between the observed and the e2pected fre<uencies. The alternate
hypothesis states that there are significant differences between the
observed and e2pected fre<uencies 's usual we will set our alpha level at
.5E.
C <93F<9
df S @C ' 1A@R ' 1A @9 ' 1A@9 ' 1A C @=A@=A C 16
ReDe&( H
:
i. EC <6353
Since our calculated value of 8,E.*,E9 is less than ,F.C, we
accept the null hypothesis and re=ect the alternative hypothesis.
68
68
TABLE 1:
Students) Acceptance on the Syste'

9 = 5 < 1 @O'EAB<?E
O E O E O E O E O E &/i
$ )) ), 5.56C ,F ,+., 5.)C+ )) ))., 5.55+ , ,., 5.5)6 5 5.+ 5.+ 5.FC*
4 )) ), 5.56C ,4 ,+., 5.C,+ * ))., 5.+C, C ,., 5.,*) 5 5.+ 5.+ ).EC5
& )) ), 5.56C ,6 ,+., 5.E*4 * ))., 5.+C, , ,., 5.5)6 5 5.+ 5.+ ).EC5
d )+ ), 5.CCC ,) ,+., 5.+,C ), ))., 5.5E4 , ,., 5.5)6 ) 5.+ 5.* ).4C,
e )C ), 5.56C )* ,+., ).))4 )E ))., ).,6* , ,., 5.5)6 ) 5.+ 5.* C.+56
To($# 6.6+5
68
>rom the table we can see that:
S 5.FC*V).EC5V).EC5V).4C,VC.+56C 838=:
and d. C @C ' 1A@R ' 1A @9 ' 1A@9 ' 1A C @=A@=A C 16
0ur null, for the chi-s<uare test, states that there are no differences
between the observed and the e2pected fre<uencies. The alternate
hypothesis states that there are significant differences between the
observed and e2pected fre<uencies 's usual we will set our alpha level at
.5E.
C 838=:
df S @C ' 1A@R ' 1A @9 ' 1A@9 ' 1A C @=A@=A C 16
ReDe&( H
:
i. EC <6353
Since our calculated value of 86.6+59 is less than ,F.C, we
accept the null hypothesis and re=ect the alternative hypothesis.
68
68
CHAPTER V
Su''ary, Conclusion, "eco''endation
SUMMARY
The main ob=ective of this research study was to make a
descriptive survey about the technology implicated in using ideo
Surveillance System in 1ulogio L'#'?(M $odrigue! Institute of
Science and Technology.
Specifically, it sought to answer the following <uestions.
.hat are the specific security threats and concerns of the
school attempting to address by using a video surveillance
system.
Bow will it help address those threats and how will the school
actually use it on a day-to-day basis.
Bow does the school management accept and interpret data
produce by the systemD
Bow does the student accept the new system if implementedD
Is there a significant difference between the security personnel
officer and the video surveillance systemD
68
The descriptive method of the survey type of research was used in
this study. Students and employees of 1'$IST served as the respondents,
out of 8E59 fifty respondents, 8C,9 thirty-two of them are male while the
other )6 are female.
To analy!e and interpret the data, the study utili!ed the following
statistical tools: Percentage, Gikert Scale System, .eighted #ean, Chi-
S<uare and $ank #ethod.
The study reveals the following findings: #a=ority or F+ percent of
the respondents are male and CF percent are females. #ost of the
respondents belong to the ,)-,E age brackets with a moderate knowledge
about the video surveillance system.
68
68
/elow is the table summari!ing the results of the survey responses given by the selected respondents:
TABLE A
13 S2e&i.i& *e&!i() (/!e$(* $%d &o%&e!%* o. (/e *&/oo#
$((e+2(i%0 (o $dd!e** 4) *i%0 $ "ideo *!"ei##$%&e
*)*(e+
9 = 5 < 1 W3M CHI
a. 1'$IST Security Personnel has less security gadgets )) ,4 )) ) 5 C.*F
*.C46
b. #ost of the 1'$IST Security Personnel doesn7t know
how to use a security camera
+ ,) )F * 5 C.+
E.F,E
c. #ost of the 1'$IST Security Personnel doesn7t know
how to install and operate video surveillance
E ,C )E F ) C.E
).)5C
d. 1'$IST Security 0ffice doesn7t fit the installation
area of the ideo Surveillance System
F )* ,) + 5 C.E+
C.C5,
d. Security threats are not address properly )5 )E )F E + C.++
)).65F
To($# CF )5E 4* ,E E
C.EF
6 513<1=
68
/ased on my computation using chi s<uare, it is evident that letter 8e9 on table ' shows the highest rank and clearly visible that security
threats are not address properly, while using the weighted mean computation, letter 8a9 on the said table shows the highest rank that 1'$IST
Security Personnel has less security gadgets.
TABLE B
<3 Video S!"ei##$%&e S)*(e+ ,i## e$*e (/!e$(* $%d ,i##
/e#2 (/e *&/oo# o% $ d$)'(o'd$) 4$*i*3
9 = 5 < 1 W3M CHI
a. 1'$IST Security Personnel cannot actually determine
threats inside or outside school premises.
)5 ,+ ), C ) C.46 ).C,)
b. ' routine check to all students and visitors going in
and out of the institute
)5 ,* 6 , ) C.* 5.+E6
c. ' routine check on all vehicles going in and out of the
Institute
)) ,F )5 , ) C.66 5.,5)
d. ' real time monitoring of all the Students and visitors
of the School
)) ,4 6 C ) C.66 5.F4,
e. ' real time recording of what is happening beyond the
scope of the surveillance camera
* C5 )5 ) 5 C.*+ ).*5)
To($# E) )CF +6 )) +
C.64
F
=399<
68
's gleaned in the table, the respondents gave almost the same highest rank for letter 8e9 using the computation for weighted
mean and chi-s<uare. It can be noted that a real time recording of what is happening beyond the scope of the surveillance camera will ease
the threats and will help the school on a day-to-day basis.
TABLE C
53 A&&e2(i%0 $%d i%(e!2!e(i%0 o. d$($ 2!od&e 4) (/e
*)*(e+
9 = 5 < 1 W3M CHI
a. Student database will be used in monitoring the
students
)C ,5 )E , 5 C.66 ,.EF)
b. ' faculty and employees database will be used in
monitoring faculty and employees
)) ,4 ), 5 5 C.*6 C.F,E
c. ' print out will produce for manual checking * ,) )* ) 5 C.4F ,.E6E
d. 'n automatic logging system will be adopted 4 C5 )5 C 5 C.6, E.)*6
e. 0n the spot data report can be easily produce. 4 ,5 )4 C C C.E )).*EF
To($# +4 ))6 4C * C
C.46
6 <93F<9
68
Gooking at the table, it can be seen that letter 8b9 is considered the highest ranked in computing the weighted mean, it reveals that a
faculty and employees database will be used in monitoring faculty and employees. The same table also reveals that on the spot data can be
easily produce as it computed using chi s<uare.
TABLE D
=3 S(de%(* $&&e2($%&e o% (/e *)*(e+ 9 = 5 < 1 W3M CHI
a. 'ccredited Students organi!ations will be consulted
before applying the system
)) ,F )) , 5 C.*, 5.FC*
b. Institute student government will be the first to
summon on proper orientation of the system
)) ,4 * C 5 C.*, ).EC5
c. Comments and suggestions will be properly entertained )) ,6 * , 5 C.*F ).EC5
d. ' survey on the entire students will be conducted to get
their pulse
)+ ,) ), , ) C.* ).4C,
e. ' computational analysis will be conducted to
determine the acceptability of the system
)C )* )E , ) C.6, C.+56
To($# F5 ),) EF )) ,
C.*5
+
8385F
68
/ased on the weighted mean computation, letter 8c9 got the highest rank with the average of C.*F" it was worth noting that comments
and suggestions should be properly entertained in the acceptance of the video surveillance system. .hile on the chi-s<uare computation
letter 8e9 was ranked first that in determining acceptability of the system, a computational analysis will be conducted.
68
CONCLUSION
Aue to increased terrors and crimes, the use of the video
surveillance camera system is increasing. It has been operated for public
interest such as prevention of crimes and fly-tipping by the police and
local government, but private information such as faces or behavior
patterns can be recorded in CCT. .hen the recorded video data is
e2posed, it may cause an invasion to privacy and crimes. This paper
analyses conventional methods of privacy protection in surveillance
camera systems and applied scrambling and $>IA system to e2isting
surveillance systems to prevent privacy e2posure in monitoring
simultaneously for both privacy protection and surveillance. The
proposed system ad=usts the intensities of privacy according to access
levels to reduce invasion of privacy by people who are not concerned.
68
RECOMMENDATION
ideo surveillance should only be considered where less intrusive
means of deterrence, such as increased monitoring by teachers, have
shown to be ineffective or unworkable. In its consultation with the school
community, the school administration should outline the less intrusive
means that have been considered and the reason why they are not
effective. /efore implementing a video surveillance program, a school
should be able to demonstrate.
ideo surveillance programs should only be adopted where
circumstances have shown that it is necessary for the purposes of
providing the safety of students and staff, or for the deterrence of
destructive acts, such as vandalism.
The school administration should provide =ustification for the use
and e2tent of a video surveillance program on the basis of addressing
specific and significant concerns about safety and/or the theft or
destruction of property.
They should also conduct an assessment into the effects that the
surveillance system will have on personal privacy and the ways in which
such adverse effects may be mitigated. They should consult openly with
parents, staff, students and the broader school community as to the
necessity of the proposed video surveillance program and its
68
acceptability to the school community. Consultation should provide
stakeholders with an opportunity to comment on the actual location of
cameras on school property, should the pro=ect proceed and they should
ensure that the proposed design and operation of the video surveillance
system minimi!es privacy intrusion to that which is necessary to achieve
appropriate goals through lawful activities.
68
BIBLIOGRAPHY
I%(e!%e(
,,,3)$/oo3&o+
,,,30oo0#e3&o+
,,,3,i-i2edi$3&o+
/((2G??,,,38$#i()$d"i*o!3&o+?*8&?.o!+#$*?&/iH*8$!eH.32/2
/((2G??,,,3+%*($(e3ed?,$**o%?ed6:<8iI1=3/(+
68
APPENDICES
SURVEY 7UESTIONNAIRE
P$!( 1G PERSONAL DATA SHEET
A0eG
,) years old and below
,)-,E years old
,F-C5 years old
C)-CE years old
CEyears old and above
SeJG
>emale
#ale
K%o,#ed0e i% Video S!"ei##$%&e S)*(e+
'dvance
#oderate
3nowledgeable
?ew
P$!( <G Check the appropriate bo*, which you belie&e applicable to the gi&en
&ariables+
*+,+-.
R$(e Ve!4$# I%(e!2!e($(io% R$%0e
E Strongly 'gree +.F R E.5
+ 'gree C.F R +.E
C &ncertain ,.F R C.E
, Aisagree ).F R ,.E
) Strongly Aisagree ).5 R ).E
68
A3 S2e&i.i& *e&!i() (/!e$(* $%d &o%&e!%* o. (/e *&/oo# $((e+2(i%0 (o
$dd!e** 4) *i%0 $ "ideo *!"ei##$%&e *)*(e+
E + C , )
a. 1'$IST Security Personnel has less
security gadgets
b. #ost of the 1'$IST Security Personnel
doesn7t know how to use a security
camera
c. #ost 1'$IST Security personnel
doesn7t know how to install and operate
video surveillance.
d. 1'$IST Security 0ffice doesn7t fit the
installation area of the ideo
Surveillance System
e. Security threats are not address properly
B3 Video S!"ei##$%&e S)*(e+ ,i## e$*e (/!e$(* $%d ,i## /e#2 (/e *&/oo# o%
$ d$)'(o'd$) 4$*i*3
E + C , )
a. 1'$IST Security Personnel cannot
actually determine threats inside or
outside school premises.
b. ' routine check to all students and
visitors going in and out of the institute
c. ' routine check on all vehicles going in
and out of the Institute
d. ' real time monitoring of all the
Students and visitors of the School
e. ' real time recording of what is
happening beyond the scope of the
surveillance camera
C3 A&&e2(i%0 $%d i%(e!2!e(i%0 o. d$($ 2!od&e 4) (/e *)*(e+
E + C , )
a. Student database will be used in
monitoring the students
b. ' faculty and employees database will
be used in monitoring faculty and
employees
c. ' print out will produce for manual
checking
d. 'n automatic logging system will be
adopted
e. 0n the spot data report can be easily
produce.
D3 S(de%(* $&&e2($%&e o% (/e *)*(e+
E + C , )
a. 'ccredited Students organi!ations will
be consulted before applying the system
b. Institute student government will be the
first to summon on proper orientation of
the system
c. Comments and suggestions will be
properly entertained
d. ' survey on the entire students will be
conducted to get their pulse
e. ' computational analysis will be
conducted to determine the acceptability
of the system
E3 Si0%i.i&$%( di..e!e%&e 4e(,ee% (/e *e&!i() 2e!*o%%e# o..i&e! $%d (/e
"ideo *!"ei##$%&e *)*(e+
E + C , )
a. There is no significant difference
between the old and the new system
APPENDI1 B
E7UIVALENT FOR THE DEGREE OF FREEDOM
'lpha value S
EN
'lpha value S )N
DF V$#e DF V$#e
) C.6+ ) F.FC
, E.** , *.,)
C 4.6, C )).C
+ *.+* + )C.C
E )).) E )E.)
F ),.F F )F.6
4 )+.) 4 )6.E
6 )E.E 6 ,5.)
* )F.* * ,C.,
)5 )6.C )5 ,+.4
)) )*.4 )) ,F.,
), ,) ), ,4.4
)C ,,.+ )C ,*.)
)+ ,C.4 )+ C5.F
)E ,E )E C5.F
)F ,F.C )F C,
)4 ,4.F )4 CC.+
)6 ,6.* )6 C+.6
)* C5.) )* CF.,
,5 C).+ ,5 C4.F
,) C,.4 ,) C6.*
,, CC.* ,, +5.C
,C CE., ,C +).F
,+ CF.+ ,+ +C
,E C4.4 ,E ++.C
,F C6.* ,F +E.F
,4 +5.) ,4 +4
,6 +).C ,6 +6.C
,* +,.F ,* +*.F
C5 +C.6 C5 E5.*
CURRICULUM VITAE
PERSONAL DATA
N$+e : 'nna #arie #agallanes Gucero
D$(e o. 4i!(/ : >ebruary)4, )**5
P#$&e o. 4i!(/ : San Quan City
Add!e** : +*,* r-C, Pina St. 0ld Sta. #esa, #anila
A0e : ,5
Hei0/( : +7))
Wei0/( : +* kilos
N$(io%$#i() : >ilipino
Ci"i# S($(* : Single
Re#i0io% : $oman Catholic
F$(/e!* N$+e : >ederico G. Gucero
Mo(/e!* N$+e : Aolores #. Gucero
EDUCATIONAL BACKGROUND
COLLEGE
1ulogio L'mangM $odrigue! Institute of Science and Technology
Computer 1ngineering
,55F R Present
SECONDARY
/agong Silangan Bigh School
,55,-,55F
ELEMENTARY
San Quan 1lementary School
)**F-,55,

Você também pode gostar