CHAPTER 1
The Problem and Its Scope
Introduction
Security guards is an important aspect of security when guarding physical
assets. It is also one of the major concerns of today’s daily living. Home and
businesses hire security guards so that investments will be protected from any
form of destruction or loss. Security Guards will not only protect homes and
businesses, but they also protect people from any harm or threats.
When considering security for businesses, homes or for oneself they should
need to hire a security guards in a security agency. Indeed, it’s the security
agencies which can manage safety issues perfectly and owners of the security
agency are much aware of the fact that they have the biggest responsibility in
protecting businesses, homes and people’s life.
One of the problems encountered by Commander Security Services Inc., is
that, it will be very hard for them to monitor their security guards if they are really
on their assigned areas during the time of their duty. In the side of the security
guards it will be very hassle for them to know their schedules every day or weekly
by going at the location of the said agency.
The objective of this study is to design and develop efficient and effective
security agency mobile and web applications for Commander Security Services
Inc. in solution to the problems that they encounter as well as the problems
encountered by the security guards.
Bachelor of Science in Information Technology
1
Through this application the security guards will be able to know their
monthly schedule by using their android phones. The security guards can also
prove to the security officer or the administrator that they are really on the area
assigned to them on the time of their duty by taking a picture of themselves the
picture will also provide the date and time of when and what time it was taken.
The Problem
Statement of the Problem
The present study tries to analyze the problems encountered by the
agency Commander Security Services Inc. in monitoring their security guards if
they are really on their assigned areas on the time of their duty. In the side of the
security guard it will be easier for them to view their schedules throughout the
month. This study aims to design and develop efficient and effective security
agency applications for Commander Security Services Inc.
Specifically, the research aims to answer the following questions:
1. What are the current problems encountered by Commander Security Services
Inc.?
2. What are the basic concepts in creating a Commander Security Guards
Monitoring and Scheduling System?
3. What are the necessary functional and non-functional requirements needed in
the design, development and implementation of making this application?
4. How the system will be implemented in both Mobile and Web Platform?
5. How effective is the system in terms of ease of use and usefulness?
Bachelor of Science in Information Technology
2
6. How efficient is the Commander Security Guards Monitoring and Scheduling
System as rated by IT experts in terms of usability, understandability and
maintainability?
Significance of the Study
The researcher hopes that the result of the study will prove to be important
to the following:
To the Security Guards. To the security guard it will be less hassle for
them to know their schedules. They can view their schedules anytime anywhere
for as long as they have their phone and internet connection.
To the Future Researcher. This study serves as a reference to the future
researcher who has the same goal in developing a system. This will help them to
conduct more studies to develop and enhance more on it. Through this study
future researcher will have an idea on developing a system and be able to add
some features.
To the BS Information Technology Students. This study will also serve
as guide in making their system. Through this study, students will have an idea on
how to design and develop a system and will also help them make a good
research.
To the Researcher. This study is important or beneficial because the
implementation of this project can be use in scheduling and in monitoring the
security guards of Commander Security Services.
Bachelor of Science in Information Technology
3
Scope and Limitations of the Study
The study focusses on providing an application wherein security guards can
view or access their schedules and to message the security officer if any problems
will occur and the security agency can monitor their guards specifically in
Dumaguete City. This study is only for the security guards of Commander Security
Services. This Application has also its limitations and these are the following:
1. It only focuses on Scheduling and Monitoring.
2. The system cannot be accessed without an internet connection.
Definition of Terms
Security – The state of being free from danger or threat.
Security Guard – A person whose job is to guard a place and make sure the
people and things in it are not harmed.
Monitor – To watch, observe, or check for special purpose over a period of
time.
Scheduling – Assigning an appropriate number of workers to the jobs during
each day of work.
Schedule - a list of planned activities or things to be done showing the times
or dates when they are intended to happen or be done.
Security Agency - is a business corporation, which provides armed and unarmed
security services and expertise to private and public clients.
Efficient - Using resources such as time, materials, or energy well without wasting.
Effective - Successful in achieving the result that a researchers want.
Functional - Designed to be practical and useful, rather than attractive.
Bachelor of Science in Information Technology
4
Non-functional - is a requirement that specifies criteria that can be used to judge
the operation of a system, rather than specific behaviors.
Usability - focuses on how well users can learn and use a product to achieve their
goals. It also refers to how satisfied users are with that process.
Understandability - is provided by the capability of each system component to
enable the user to understand what the purpose of the component is, how can it
be used for tasks and conditions of use.
Theoretical Framework of the study
This section consists of concepts and together with their definitions and
reference to relevant scholarly literature, existing theory that is used for your study.
The theoretical framework must demonstrate an understanding of theories and
concepts that are relevant to the topic of your research paper and that relate to the
broader areas of knowledge being considered.
Diffusion of Innovation Theory (DIT) - Theory, developed by E.M. Rogers in
1962, is one of the oldest social science theories. It originated in communication
to explain how, over time, an idea or product gains momentum and diffuses (or
spreads) through a specific population or social system. Diffusion of innovations is
a theory that seeks to explain how, why, and at what rate new ideas and
technology spread. Everett Rogers, a professor of communication studies,
popularized the theory in his book Diffusion of Innovations; the book was first
published in 1962, and is now in its fifth edition (2003).
In contrast, Rogers argues that diffusion is the process by which an
innovation is communicated over time among the participants in a social system.
Bachelor of Science in Information Technology
5
The origins of the diffusion of innovations theory are varied and span multiple
disciplines. Rogers proposes that four main elements influence the spread of a
new idea: the innovation itself, communication channels, time, and a social
system. This process relies heavily on human capital. The innovation must be
widely adopted in order to self-sustain.
Within the rate of adoption, there is a point at which an innovation
reaches critical mass. The categories of adopters are innovators, early adopters,
early majority, late majority, and laggards. Diffusion manifests itself in different
ways and is highly subject to the type of adopters and innovation-decision process.
The criterion for the adopter categorization is innovativeness, defined as the
degree to which an individual adopts a new idea.
The problem of the security guards in the security agency is that it will be
very hassle for them to know their schedules, hassle in the way that they will
always go to the security agency to know their schedules weekly or monthly. In the
side of the security officer it will be very hard for him to monitor the security guards
if they are really on their assigned areas on the time of their duty.
These problems are the main cause why the researchers develop this
application. The application is a big help to the security guards of Commander
Security Agency Services Inc. especially to the owner of the agency in monitoring
their security guards. The effectiveness of the application is a big help to the user.
Bachelor of Science in Information Technology
6
Figure1. Theoretical Framework of the study
The result of this concept is to create, design, and develop a system that is
capable of monitoring and making a schedule of the security guards of
Commander Security Services Inc.
Conceptual Framework of the Study
The study was based on the concept of effective analysis, designing, and
development that would lead to a successful implementation of Security agency
application. The schematic diagram in Figure 1 shows the direction of the study. It
indicates the systematic series of events in order to develop and implement the
Security Agency Application. It deals with abstractions that are assembled by virtue
of relevance of the project. A conceptual framework an analytical tool with several
Bachelor of Science in Information Technology
7
variations and contexts. It is used to make conceptual distinctions and organize
ideas.
The iterative model is an implementation of a software development life
cycle (SDLC) that focuses on an initial, simplified implementation, which then
progressively gains more complexity and a broader feature set until the final
system is complete. When discussing the iterative method, the concept of
incremental development will also often be used liberally and interchangeably,
which describes the incremental alterations made during the design and
implementation of each new iteration. Finally, the result of the study would direct
to successful implementation of the Security Agency app.
Figure 2. Conceptual Framework
Bachelor of Science in Information Technology
8
Related Literature and Studies
Related Literature
According to Lyons (2015), Nearly all security supervisors, at some point
in their careers, will be responsible for putting together a work schedule for their
subordinate officers. Although technology has simplified the scheduling process in
many ways, supervisors must still understand not just where to place their officers,
but when to place them. In determining a schedule, there are a few factors
involved, which include (but are not limited to) the following: how many officers are
available; how many positions, locations, or posts must be staffed; the opening
and closing hours of the locations; and whether overtime is authorized and how
much.
According to Doyle (2018), A work schedule generally refers to the days
per week and the hours per day that an employee works. There are several
different types of work schedules. Work schedules vary based on the organization
and the job. A work schedule can also vary based on the time of year. For example,
some jobs have work schedules that vary depending on the season. Make sure
you know the work schedule for any job before accepting a position. This will help
you avoid any surprises when you start work.
According to Landman (2002), it can be debated that little is known about
the experiences encountered by security guard officers working in the private
security industry. Such limited literature limits our understanding on the impact that
the absence of employees‟ wellness structures have in the lives of security guard
officers in relation to the workplace.
Bachelor of Science in Information Technology
9
According to Berg (2007), a security company is a structured organization
that renders private security care services to businesses and individuals. Security
guard officers are usually employed by security companies that use their services
to work at their clients‟ premises on a contract basis. Furthermore, it is crucial to
have knowledge about the practices and interventions that security companies
engage to, which results to employees‟ wellbeing.
According to Cameron (2013), Scheduling is a structured process for the
optimal allocation of resources to a set of tasks overtime. Since the educational
institutes have been increasing steady, it is essential to keep a track of all the
educational processes and other management related tasks within a specified
period
According to Piroozfard (2015), Scheduling is considered as a key task in
many industries, such as project-based scheduling, crew scheduling, flight
scheduling, machine scheduling, etc. In the machine scheduling area, the job shop
scheduling problems are important and highly complex, in which they are
characterized as NP-hard.
According to Mangan and Shanahan (2000), Private security is accountable
to customers, regulators, and the market which penalizes them for failing to meet
specific obligations.
According to Clarkson and Bartlam (2017), Monitoring system has also
evolved to account for subsequent changes in reporting requirements, as new
legislation, policies, and plans are developed to protect wetland biodiversity.
Bachelor of Science in Information Technology
10
Related Studies
According to Jackson, Schuler, & Werner (2009), Monitoring increased
concerns about employee privacy; therefore, employers must find a balance
between monitoring gains and the costs of invading employee privacy.
According to Mathis (2000), However, the use of emerging technologies in
monitoring employee practices is raising concerns that the privacy rights of
employees are vulnerable, and it is becoming more challenging to balance
employer security rights with employee privacy issues.
According to Gauthier (2016), Few things are more highly valued by the
clients of security firms than accountability. After all, your clients spend a fair
amount of their earnings on your security services, and as such, they like to see
evidence that your team is fulfilling what they’ve been hired to do.
As stated in the TrackTik (2016), Anyone who manages a security guard
company understands that managing security personnel isn’t always an easy task.
From timekeeping to employee accountability, there are many factors that can
hinder your ability to provide streamlined service to your clients. However, with the
help of a modern, efficient security guard monitoring system, you can ensure
improved performance from your guards and a positive outcome for your clients.
Methodology
As it is indicated in the title, this study will utilize the Iterative Model of
Software Development process as shown in figure 3 on the next page. This
process can be repeated until the complete system is ready. The entire study aims
Bachelor of Science in Information Technology
11
to answer how Commander Security Guards Monitoring and Scheduling
Application will benefit every user to design and develop function on android based
application.
Initialization
Requirement
Planning Design
Evaluation Implementation
Verification Deployment
Figure 3. Iterative Model
Research Respondents
The respondents were the security guards of Commander and Security
Services Inc., interviewed in their assigned areas or in another place which they
feel comfortable. The respondents were interviewed personally.
Research Design
The study emphasized the utilization of Iterative Model. This Model is used
to develop a system by specifying and implementing just part of the software,
which is then reviewed in order to identify further requirements. Also, this method
can be repeated until the complete system is ready.
Bachelor of Science in Information Technology
12
Research Procedures
The researchers interviewed the security guards on duty. Each respondent
was being interviewed personally. During the interview, security guards were being
asked multiple questions, and their answers served as basis in some features and
functionalities in making the system.
Research Environment
In order to satisfy the objectives of the security agency Monitoring and
Scheduling system application, we conducted an interview at the Provincial
Capitol area of Negros Oriental while the security guards are having their duty.
The main reason why the researcher conducted an interview to the security guards
are their answers are very important in creating the system. Their opinion will also
serve as basis of the features and capability of the system.
Bachelor of Science in Information Technology
13
CHAPTER II
Technical Background
System Analysis and Design
This will be the guide for developers of the project to be successful on time.
The project also includes schedules and project activity in developing the security
agency application. This section gives the overview on how and when certain tasks
should be executed. The developers must strictly follow and accomplish each task
step by step. Each scheduling will help the developers to know what task to be
followed.
Planning
Planning involves the first phase development in life cycle, conducted by
researchers on doing the chosen agency. It includes gathering of data in order to
make the application. The plan is to input a monthly schedule of the guards.
Gantt Chart
Table 2. Gantt Chart
Bachelor of Science in Information Technology
14
This study uses the Gantt Chart as shown in the previous page, it is used
as a timeline and a project management tool to illustrate how the project will run.
It also helps the researcher in managing the time in making the system.
Activity Chart
Activity chart is the part where each member of the group is appointed or
assigned to have a role or position on the development of the project.
Table 1. Activity Chart
The table above shows the activity chart done by the researchers. It starts
in Activity 1, which is the requirements analysis that includes data gathering,
evaluation, and interpretation. Second is the Design, which includes interaction
design, visual design, and information architecture. Then followed by Activity 3,
which is the coding. Then we have Activity 4, which includes prepare the
Bachelor of Science in Information Technology
15
infrastructure, perform the final verification, and monitor the solution. Lastly,
Activity 5 which is the Deployment of the fully functional system.
Analysis
Analysis is the second process which addressed to the security problems.
The key activities were: 1) analysis of schedules; 2) to perform functional
requirements and testing; and 3) prepare the initial document for system
accreditation.
Functional and Non-Functional Requirements
Functional requirements specify a function that a system or system
component must be able to perform. Non-functional requirements are usually
specifying criteria that can be used to judge the operation of the system, rather
than the specific behavior.
Use Case Diagram
Bachelor of Science in Information Technology
16
System Design
During this phase the system architecture of the application is design. It
describes the structural properties on how they constructed.
Figure 1. Commander Security Guards System Architecture
WEB
Figure 2. Web User Login
Figure 2 in the previous page shows the web user login in which user will be
redirected to his schedules and messages. In the schedules the user can view
the time and the location of his duty.
Figure 2.1. Web Admin Login
Bachelor of Science in Information Technology
17
Figure 2.1 as shown in the previous page is the web admin login in which the
administrator can view schedules, profile, available guard, monitor guard, add
guard and can message the security guard.
Figure 2.2. Web Admin Login Schedules
This is where the administrator can make schedules of the security guards.
Figure 2.3. Web Admin Login View Profile
This is where the administrator can view the profile of each security guards.
Figure 2.4. Web Admin Login Add Guard
This is where the administrator can add additional security guards.
Bachelor of Science in Information Technology
18
MOBILE
Figure 3. Mobile User Login
This is the mobile application where the security guards can login to his account
so that he can view his schedules and at the same time he can take a picture of
himself to prove to the administrator that he is on his assign area on the time of
his duty.
Figure 3.1. Mobile User Schedules
This is where the security guards can view his schedules.
Figure 3.2. Mobile User Messages
This is where the security guards can message the administrator for any purposes.
Bachelor of Science in Information Technology
19
References
Jackson, et, al., (2009). https://journals.sagepub.com/doi/pdf/10.1177/215824401
5580168
Mathis (2000). https://www.researchgate.net/publication/276114067 Monitoring
Employee_Behavior_Through_the_Use_of_Technology_and_Isues_of_Employe
e_Privacy_in_America
Gauthier (2016). https://www.tracktik.com/2016/09/20/security-guard-schedule-
Management/
Lyons (2015). https://books.google.com.ph/books?isbn=0128004894
Doyle (2018). https://www.thebalancecareers.com/what-is-a-work-schedule-
2062134
Piroozfard (2015). https://www.science.gov/topicpages/j/job+scheduling+problem
TrackTik (2016). https://www.tracktik.com/2016/09/20/security-guard-schedule-
management/
Bachelor of Science in Information Technology
20