Preview

Ask for Item

Good Essays
Open Document
Open Document
6677 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Ask for Item
The Philippine Women’s University
CDCEC – Crossing Calamba City

Campus Security System

Database Management 2
2-IT-4
Gaspar, Chester V.
Erasga, Cristal B.

S.Y. 2012-2013

Mr. Zyrix Ryan Fagela
Instructor

Table of Content

Chapter 1 Abstract Conceptual Framework Introduction Background of the study Statement of the Problem Hypothesis Significant of the Study Scopes and Definition Definition and Terms TECHNICAL TERMS

Chapter 2 Related Literature Foreign Studies

Chapter 3 Research Methodology
Research Design Respondents Distribution Data Gathering Tools Instrument Used Administrations and Retrieval STATISTICAL TREATMENT

Chapter 4 1 Profile of the Respondents 2 HYPOTHESES Ratings of the students on the level of effectiveness in impression Ratings on the students on the level of effectiveness in dependability Ratings of the students on the level of effectiveness in efficiency Percentage of Frequency Summary of result on the survey of manual and automated System in Campus Security System

Chapter 5 Summary, Conclusion and Recommendation

ABSTRACT

This study aims to propose an automated system in campus security system in Philippine Women’s University (PWU)-Crossing, Calamba City, in order to meets the safety and security needs of students, their parents, the school’s staff and employee. But instead of using a top of the line video surveillance system that can be expensive, we are using affordable but precise equipment like the webcam. We build a program in the Visual Basic Software where in the webcam is connected. We used a survey method where in we gave our fellow students a set of questionnaires to be answer about automated and manual system in the campus security. We done this survey in order to identify the opinion of the PWU’s students and the problem they have encountered in the campus security system. This study also aims to increase the safety and

You May Also Find These Documents Helpful

  • Powerful Essays

    As a member of the Information Security team at a small college, you have been made the project manager to install an access control system (ACS) in a dormitory. The ACS will automatically unlock the dormitory doors via an electronic proximity reader and integrate with an existing security camera system. The cameras are designed to face and rotate to record a person as they use their identification card to unlock the door.…

    • 1220 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    Therefore after adding more security to authentication, the effect is witnessed through reduction in the acceptance rate of users while increasing the usability. Consequently, it is very challenging to find the most secure system of authentication that the users can accept. Users are always seeking new features and applications whose interfaces will be easy to use. At the same time, these users express worries that the dangers continues to increase. In addition, the legislations continue to punch companies and manufacturers towards protection of their clients’…

    • 1097 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Security is a compelling concern for business and employees. Employers need to establish that they carry out complete risk assessment and address security issues by implementing required security systems. Physical security system is a fundamental component of an establishment, which protects a several aspects such as building security, theft, vandalism and falsification of records. Therefore, organizations and companies need to highly aware of to protect their physical assets. The foundation of a competent security management can prevents such risk like discovering solutions, authorization, and controlling employee’s activities. As a result, organizations can ensure the safety and protection of employees and property.…

    • 1377 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    The purpose of this case study is to present the task of implementing a security video surveillance solution for DeVry University. DeVry University requests a high-definition security system that has the following features:…

    • 539 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Term paper

    • 1329 Words
    • 6 Pages

    A physical model and steps of building the security system will be discussed as well as its set up and mode of operation. System testing showed a quick and efficient operation of the system, where in case of smoke or fire detection, light and siren are triggered and fire department is called, and in case of break-in police is called as well as siren is triggered.…

    • 1329 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    sec 410

    • 1157 Words
    • 5 Pages

    It is important for all organizations to have physical security. Physical security protects the organization in every way. Every individual needs to be aware of the importance of physical security. Not only is important for the individual to be aware of the importance physical security has in an organization but to be able to understand how physical security works within the organization. In this paper the writer will be describing the core concepts of physical security. Additionally the writer would be writing about the security assessments. Last the writing would be writing about the basic physical controls.…

    • 1157 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Date: The purpose of this proposal is to outline my plans for a recommendation report. I will be comparing two different security measure tools, besides smartcards and security cameras to protect Penn State Harrisburg classrooms, severed rooms, main entrances and student dorm for Penn State Harrisburg. I will briefly describe the situation, including what they are using now. Next I will list the two security tools that would help as well as relevant qualities of each one, elaborating and describing as necessary.…

    • 1156 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    According to Cornell University, “ The researchers found that video surveillance systems were most effective in parking lots. Across the studies included in the analysis, CCTV resulted in a 51 percent decrease in crimes committed in parking lots. CCTV resulted in a 23 percent decrease in crime on public transportation.” This quote shows that security cameras cause criminals to think about their actions consequences before committing a crime. Which would never occur without the aid of the closed circuit television cameras, also known as CCTV. While a concern for privacy is a great factor when it comes to surveillance, majority of the citizens feel as the well being of those around them are far more important. Some falsely believe that CCTV cameras only infringe on society's privacy and has no effect when it comes to preventing possible crimes from occurring; yet, according to Urban Institutes, “ Our evaluation of three cities found that the most effective systems are monitored by trained staff, have enough cameras to detect crimes in progress, and integrate the technology into all manner of law enforcement activities.” This quote describes that it has been proven that using the CCTV cameras help discern criminals from the rest of the citizens. When they are monitored by trained staff, the use of the technology can allow police to find out exactly when…

    • 957 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    NAME- AMIT KR PASWAN CLASS- BA (3rd year, Chinese) CENTRE- CCSEAS TOPIC OF ASSIGNMENT--TECHNOLOGY AND SURVIELLANCE CONTROL TECHNOLOGY AND SURVEILLANCE CONTROL INTRDUCTION: Surveillance is a process of monitoring of behavior and activities of common people. The purpose of surveillance is to influence, manage , direct and protect common people.…

    • 1566 Words
    • 7 Pages
    Satisfactory Essays
  • Satisfactory Essays

    There is much controversy surrounding surveillance and computer monitoring. Tavani (2011, p.323) discusses both the perceived benefits and issues resulting from surveillance and computer monitoring. Some benefits include reduction of employee theft, elimination of waste, useful training tool, motivation tool, increased competitiveness and others. Some issues include increase of employee stress, reduction in autonomy, invasion of privacy, reduces morale and others.…

    • 496 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Information System Risks

    • 1562 Words
    • 7 Pages

    Businesses realize that the security of their information system is a major part for an organization in the continued pursuit of organizational operations and providing services. The principles of risk management, identification, assessment, and prioritization must be determined by management prior to establish and implementing levels of information system security. In addition, vulnerabilities, internal threats, and external threats must be uncovered and addressed to secure the information system. Establishing different levels of security to secure the information system of Professional Security Training School (PSTS) will limit potential security threats. In analyzing the information system risks of PSTS, decisions must be made to deter or limit potential security threats, which are the client database, staff accessibility, and client privacy.…

    • 1562 Words
    • 7 Pages
    Better Essays
  • Better Essays

    Physical Security - Essay

    • 1334 Words
    • 4 Pages

    In the United States everyone is concerned about safety in their homes and in his or her workplace. Individuals go to great lengths to ensure that all their possessions that they own could not be stolen from them. According to the 1999 FBI Uniform Crime Reports, nationwide 408,217 robberies were committed with the estimated amount of losses being reported at $508 million in losses. Many measures can be put in place to prevent such losses. This paper will discuss physical security and other components such as building security, grounds security, access control systems, perimeter security, information systems, and technology security.…

    • 1334 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    The lesson was designed with clear, measurable goals closely aligned with standards and unit outcomes.…

    • 853 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    MyRearch

    • 3542 Words
    • 15 Pages

    characteristics, evaluation costs, and quality of the evaluations in terms of the agreement between non-expert graders and expert/oracle judgments. Moreover, data…

    • 3542 Words
    • 15 Pages
    Powerful Essays
  • Satisfactory Essays

    Nicole Thesis

    • 873 Words
    • 5 Pages

    The researcher therefore concludes that bullying does affect the academic performance of selected high school students.…

    • 873 Words
    • 5 Pages
    Satisfactory Essays