Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
58 views20 pages

Software Development

The document introduces the problems faced by Commander Security Services Inc. in monitoring their security guards. It is difficult for the agency to ensure guards are present at assigned areas and inconvenient for guards to check schedules. The study aims to design a mobile and web application to allow guards to view schedules remotely and check-in using photos to address these issues. It will benefit guards through easier scheduling access, the agency through improved monitoring, and inform future research. The application scope is limited to Commander Security guards in Dumaguete City for scheduling and monitoring only.

Uploaded by

Herna Caluscusan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
58 views20 pages

Software Development

The document introduces the problems faced by Commander Security Services Inc. in monitoring their security guards. It is difficult for the agency to ensure guards are present at assigned areas and inconvenient for guards to check schedules. The study aims to design a mobile and web application to allow guards to view schedules remotely and check-in using photos to address these issues. It will benefit guards through easier scheduling access, the agency through improved monitoring, and inform future research. The application scope is limited to Commander Security guards in Dumaguete City for scheduling and monitoring only.

Uploaded by

Herna Caluscusan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 20

CHAPTER 1

The Problem and Its Scope

Introduction

Security guards is an important aspect of security when guarding physical

assets. It is also one of the major concerns of today’s daily living. Home and

businesses hire security guards so that investments will be protected from any

form of destruction or loss. Security Guards will not only protect homes and

businesses, but they also protect people from any harm or threats.

When considering security for businesses, homes or for oneself they should

need to hire a security guards in a security agency. Indeed, it’s the security

agencies which can manage safety issues perfectly and owners of the security

agency are much aware of the fact that they have the biggest responsibility in

protecting businesses, homes and people’s life.

One of the problems encountered by Commander Security Services Inc., is

that, it will be very hard for them to monitor their security guards if they are really

on their assigned areas during the time of their duty. In the side of the security

guards it will be very hassle for them to know their schedules every day or weekly

by going at the location of the said agency.

The objective of this study is to design and develop efficient and effective

security agency mobile and web applications for Commander Security Services

Inc. in solution to the problems that they encounter as well as the problems

encountered by the security guards.

Bachelor of Science in Information Technology

1
Through this application the security guards will be able to know their

monthly schedule by using their android phones. The security guards can also

prove to the security officer or the administrator that they are really on the area

assigned to them on the time of their duty by taking a picture of themselves the

picture will also provide the date and time of when and what time it was taken.

The Problem

Statement of the Problem

The present study tries to analyze the problems encountered by the

agency Commander Security Services Inc. in monitoring their security guards if

they are really on their assigned areas on the time of their duty. In the side of the

security guard it will be easier for them to view their schedules throughout the

month. This study aims to design and develop efficient and effective security

agency applications for Commander Security Services Inc.

Specifically, the research aims to answer the following questions:

1. What are the current problems encountered by Commander Security Services

Inc.?

2. What are the basic concepts in creating a Commander Security Guards

Monitoring and Scheduling System?

3. What are the necessary functional and non-functional requirements needed in

the design, development and implementation of making this application?

4. How the system will be implemented in both Mobile and Web Platform?

5. How effective is the system in terms of ease of use and usefulness?

Bachelor of Science in Information Technology

2
6. How efficient is the Commander Security Guards Monitoring and Scheduling

System as rated by IT experts in terms of usability, understandability and

maintainability?

Significance of the Study

The researcher hopes that the result of the study will prove to be important

to the following:

To the Security Guards. To the security guard it will be less hassle for

them to know their schedules. They can view their schedules anytime anywhere

for as long as they have their phone and internet connection.

To the Future Researcher. This study serves as a reference to the future

researcher who has the same goal in developing a system. This will help them to

conduct more studies to develop and enhance more on it. Through this study

future researcher will have an idea on developing a system and be able to add

some features.

To the BS Information Technology Students. This study will also serve

as guide in making their system. Through this study, students will have an idea on

how to design and develop a system and will also help them make a good

research.

To the Researcher. This study is important or beneficial because the

implementation of this project can be use in scheduling and in monitoring the

security guards of Commander Security Services.

Bachelor of Science in Information Technology

3
Scope and Limitations of the Study

The study focusses on providing an application wherein security guards can

view or access their schedules and to message the security officer if any problems

will occur and the security agency can monitor their guards specifically in

Dumaguete City. This study is only for the security guards of Commander Security

Services. This Application has also its limitations and these are the following:

1. It only focuses on Scheduling and Monitoring.

2. The system cannot be accessed without an internet connection.

Definition of Terms

Security – The state of being free from danger or threat.

Security Guard – A person whose job is to guard a place and make sure the

people and things in it are not harmed.

Monitor – To watch, observe, or check for special purpose over a period of

time.

Scheduling – Assigning an appropriate number of workers to the jobs during

each day of work.

Schedule - a list of planned activities or things to be done showing the times

or dates when they are intended to happen or be done.

Security Agency - is a business corporation, which provides armed and unarmed

security services and expertise to private and public clients.

Efficient - Using resources such as time, materials, or energy well without wasting.

Effective - Successful in achieving the result that a researchers want.

Functional - Designed to be practical and useful, rather than attractive.

Bachelor of Science in Information Technology

4
Non-functional - is a requirement that specifies criteria that can be used to judge

the operation of a system, rather than specific behaviors.

Usability - focuses on how well users can learn and use a product to achieve their

goals. It also refers to how satisfied users are with that process.

Understandability - is provided by the capability of each system component to

enable the user to understand what the purpose of the component is, how can it

be used for tasks and conditions of use.

Theoretical Framework of the study

This section consists of concepts and together with their definitions and

reference to relevant scholarly literature, existing theory that is used for your study.

The theoretical framework must demonstrate an understanding of theories and

concepts that are relevant to the topic of your research paper and that relate to the

broader areas of knowledge being considered.

Diffusion of Innovation Theory (DIT) - Theory, developed by E.M. Rogers in

1962, is one of the oldest social science theories. It originated in communication

to explain how, over time, an idea or product gains momentum and diffuses (or

spreads) through a specific population or social system. Diffusion of innovations is

a theory that seeks to explain how, why, and at what rate new ideas and

technology spread. Everett Rogers, a professor of communication studies,

popularized the theory in his book Diffusion of Innovations; the book was first

published in 1962, and is now in its fifth edition (2003).

In contrast, Rogers argues that diffusion is the process by which an

innovation is communicated over time among the participants in a social system.

Bachelor of Science in Information Technology

5
The origins of the diffusion of innovations theory are varied and span multiple

disciplines. Rogers proposes that four main elements influence the spread of a

new idea: the innovation itself, communication channels, time, and a social

system. This process relies heavily on human capital. The innovation must be

widely adopted in order to self-sustain.

Within the rate of adoption, there is a point at which an innovation

reaches critical mass. The categories of adopters are innovators, early adopters,

early majority, late majority, and laggards. Diffusion manifests itself in different

ways and is highly subject to the type of adopters and innovation-decision process.

The criterion for the adopter categorization is innovativeness, defined as the

degree to which an individual adopts a new idea.

The problem of the security guards in the security agency is that it will be

very hassle for them to know their schedules, hassle in the way that they will

always go to the security agency to know their schedules weekly or monthly. In the

side of the security officer it will be very hard for him to monitor the security guards

if they are really on their assigned areas on the time of their duty.

These problems are the main cause why the researchers develop this

application. The application is a big help to the security guards of Commander

Security Agency Services Inc. especially to the owner of the agency in monitoring

their security guards. The effectiveness of the application is a big help to the user.

Bachelor of Science in Information Technology

6
Figure1. Theoretical Framework of the study

The result of this concept is to create, design, and develop a system that is

capable of monitoring and making a schedule of the security guards of

Commander Security Services Inc.

Conceptual Framework of the Study

The study was based on the concept of effective analysis, designing, and

development that would lead to a successful implementation of Security agency

application. The schematic diagram in Figure 1 shows the direction of the study. It

indicates the systematic series of events in order to develop and implement the

Security Agency Application. It deals with abstractions that are assembled by virtue

of relevance of the project. A conceptual framework an analytical tool with several

Bachelor of Science in Information Technology

7
variations and contexts. It is used to make conceptual distinctions and organize

ideas.

The iterative model is an implementation of a software development life

cycle (SDLC) that focuses on an initial, simplified implementation, which then

progressively gains more complexity and a broader feature set until the final

system is complete. When discussing the iterative method, the concept of

incremental development will also often be used liberally and interchangeably,

which describes the incremental alterations made during the design and

implementation of each new iteration. Finally, the result of the study would direct

to successful implementation of the Security Agency app.

Figure 2. Conceptual Framework

Bachelor of Science in Information Technology

8
Related Literature and Studies

Related Literature

According to Lyons (2015), Nearly all security supervisors, at some point

in their careers, will be responsible for putting together a work schedule for their

subordinate officers. Although technology has simplified the scheduling process in

many ways, supervisors must still understand not just where to place their officers,

but when to place them. In determining a schedule, there are a few factors

involved, which include (but are not limited to) the following: how many officers are

available; how many positions, locations, or posts must be staffed; the opening

and closing hours of the locations; and whether overtime is authorized and how

much.

According to Doyle (2018), A work schedule generally refers to the days

per week and the hours per day that an employee works. There are several

different types of work schedules. Work schedules vary based on the organization

and the job. A work schedule can also vary based on the time of year. For example,

some jobs have work schedules that vary depending on the season. Make sure

you know the work schedule for any job before accepting a position. This will help

you avoid any surprises when you start work.

According to Landman (2002), it can be debated that little is known about

the experiences encountered by security guard officers working in the private

security industry. Such limited literature limits our understanding on the impact that

the absence of employees‟ wellness structures have in the lives of security guard

officers in relation to the workplace.

Bachelor of Science in Information Technology

9
According to Berg (2007), a security company is a structured organization

that renders private security care services to businesses and individuals. Security

guard officers are usually employed by security companies that use their services

to work at their clients‟ premises on a contract basis. Furthermore, it is crucial to

have knowledge about the practices and interventions that security companies

engage to, which results to employees‟ wellbeing.

According to Cameron (2013), Scheduling is a structured process for the

optimal allocation of resources to a set of tasks overtime. Since the educational

institutes have been increasing steady, it is essential to keep a track of all the

educational processes and other management related tasks within a specified

period

According to Piroozfard (2015), Scheduling is considered as a key task in

many industries, such as project-based scheduling, crew scheduling, flight

scheduling, machine scheduling, etc. In the machine scheduling area, the job shop

scheduling problems are important and highly complex, in which they are

characterized as NP-hard.

According to Mangan and Shanahan (2000), Private security is accountable

to customers, regulators, and the market which penalizes them for failing to meet

specific obligations.

According to Clarkson and Bartlam (2017), Monitoring system has also

evolved to account for subsequent changes in reporting requirements, as new

legislation, policies, and plans are developed to protect wetland biodiversity.

Bachelor of Science in Information Technology

10
Related Studies

According to Jackson, Schuler, & Werner (2009), Monitoring increased

concerns about employee privacy; therefore, employers must find a balance

between monitoring gains and the costs of invading employee privacy.

According to Mathis (2000), However, the use of emerging technologies in

monitoring employee practices is raising concerns that the privacy rights of

employees are vulnerable, and it is becoming more challenging to balance

employer security rights with employee privacy issues.

According to Gauthier (2016), Few things are more highly valued by the

clients of security firms than accountability. After all, your clients spend a fair

amount of their earnings on your security services, and as such, they like to see

evidence that your team is fulfilling what they’ve been hired to do.

As stated in the TrackTik (2016), Anyone who manages a security guard

company understands that managing security personnel isn’t always an easy task.

From timekeeping to employee accountability, there are many factors that can

hinder your ability to provide streamlined service to your clients. However, with the

help of a modern, efficient security guard monitoring system, you can ensure

improved performance from your guards and a positive outcome for your clients.

Methodology

As it is indicated in the title, this study will utilize the Iterative Model of

Software Development process as shown in figure 3 on the next page. This

process can be repeated until the complete system is ready. The entire study aims

Bachelor of Science in Information Technology

11
to answer how Commander Security Guards Monitoring and Scheduling

Application will benefit every user to design and develop function on android based

application.

Initialization
Requirement

Planning Design

Evaluation Implementation

Verification Deployment

Figure 3. Iterative Model

Research Respondents

The respondents were the security guards of Commander and Security

Services Inc., interviewed in their assigned areas or in another place which they

feel comfortable. The respondents were interviewed personally.

Research Design

The study emphasized the utilization of Iterative Model. This Model is used

to develop a system by specifying and implementing just part of the software,

which is then reviewed in order to identify further requirements. Also, this method

can be repeated until the complete system is ready.

Bachelor of Science in Information Technology

12
Research Procedures

The researchers interviewed the security guards on duty. Each respondent

was being interviewed personally. During the interview, security guards were being

asked multiple questions, and their answers served as basis in some features and

functionalities in making the system.

Research Environment

In order to satisfy the objectives of the security agency Monitoring and

Scheduling system application, we conducted an interview at the Provincial

Capitol area of Negros Oriental while the security guards are having their duty.

The main reason why the researcher conducted an interview to the security guards

are their answers are very important in creating the system. Their opinion will also

serve as basis of the features and capability of the system.

Bachelor of Science in Information Technology

13
CHAPTER II

Technical Background

System Analysis and Design

This will be the guide for developers of the project to be successful on time.

The project also includes schedules and project activity in developing the security

agency application. This section gives the overview on how and when certain tasks

should be executed. The developers must strictly follow and accomplish each task

step by step. Each scheduling will help the developers to know what task to be

followed.

Planning

Planning involves the first phase development in life cycle, conducted by

researchers on doing the chosen agency. It includes gathering of data in order to

make the application. The plan is to input a monthly schedule of the guards.

Gantt Chart

Table 2. Gantt Chart

Bachelor of Science in Information Technology

14
This study uses the Gantt Chart as shown in the previous page, it is used

as a timeline and a project management tool to illustrate how the project will run.

It also helps the researcher in managing the time in making the system.

Activity Chart

Activity chart is the part where each member of the group is appointed or

assigned to have a role or position on the development of the project.

Table 1. Activity Chart

The table above shows the activity chart done by the researchers. It starts

in Activity 1, which is the requirements analysis that includes data gathering,

evaluation, and interpretation. Second is the Design, which includes interaction

design, visual design, and information architecture. Then followed by Activity 3,

which is the coding. Then we have Activity 4, which includes prepare the

Bachelor of Science in Information Technology

15
infrastructure, perform the final verification, and monitor the solution. Lastly,

Activity 5 which is the Deployment of the fully functional system.

Analysis

Analysis is the second process which addressed to the security problems.

The key activities were: 1) analysis of schedules; 2) to perform functional

requirements and testing; and 3) prepare the initial document for system

accreditation.

Functional and Non-Functional Requirements

Functional requirements specify a function that a system or system

component must be able to perform. Non-functional requirements are usually

specifying criteria that can be used to judge the operation of the system, rather

than the specific behavior.

Use Case Diagram

Bachelor of Science in Information Technology

16
System Design

During this phase the system architecture of the application is design. It

describes the structural properties on how they constructed.

Figure 1. Commander Security Guards System Architecture

WEB

Figure 2. Web User Login

Figure 2 in the previous page shows the web user login in which user will be

redirected to his schedules and messages. In the schedules the user can view

the time and the location of his duty.

Figure 2.1. Web Admin Login

Bachelor of Science in Information Technology

17
Figure 2.1 as shown in the previous page is the web admin login in which the

administrator can view schedules, profile, available guard, monitor guard, add

guard and can message the security guard.

Figure 2.2. Web Admin Login Schedules

This is where the administrator can make schedules of the security guards.

Figure 2.3. Web Admin Login View Profile

This is where the administrator can view the profile of each security guards.

Figure 2.4. Web Admin Login Add Guard

This is where the administrator can add additional security guards.

Bachelor of Science in Information Technology

18
MOBILE

Figure 3. Mobile User Login

This is the mobile application where the security guards can login to his account

so that he can view his schedules and at the same time he can take a picture of

himself to prove to the administrator that he is on his assign area on the time of

his duty.

Figure 3.1. Mobile User Schedules

This is where the security guards can view his schedules.

Figure 3.2. Mobile User Messages

This is where the security guards can message the administrator for any purposes.

Bachelor of Science in Information Technology

19
References

Jackson, et, al., (2009). https://journals.sagepub.com/doi/pdf/10.1177/215824401

5580168

Mathis (2000). https://www.researchgate.net/publication/276114067 Monitoring

Employee_Behavior_Through_the_Use_of_Technology_and_Isues_of_Employe

e_Privacy_in_America

Gauthier (2016). https://www.tracktik.com/2016/09/20/security-guard-schedule-


Management/
Lyons (2015). https://books.google.com.ph/books?isbn=0128004894

Doyle (2018). https://www.thebalancecareers.com/what-is-a-work-schedule-

2062134

Piroozfard (2015). https://www.science.gov/topicpages/j/job+scheduling+problem

TrackTik (2016). https://www.tracktik.com/2016/09/20/security-guard-schedule-

management/

Bachelor of Science in Information Technology

20

You might also like