THESIS (With Scope and Limitation)

December 5, 2018 | Author: Rey Del Castillo Luar Jr. | Category: Securities, Security Alarm, Threat (Computer), Theft, Technology
Share Embed Donate


Short Description

ay wow...

Description

CHAPTER 1 THE PROBLEM AND ITS BACKGROUND

This chapter is entitled “The Problem and Its Background”. This chapter includes the Introduction, Statement of the Problem, Theoretical and Conceptual Framework, Significance of the Study, Scope and Limitations, and Definition of Terms. Introduction A security system is an electrical device that sets off an alarm when someone tries to break in. Security systems/alarms are used in residential, commercial, industrial, and military properties for protection against burglary (theft) or property damage, as well as personal protection against intruders. Car alarms likewise protect vehicles and their contents. Prisons also use security systems for control of inmates. Some alarm systems serve a single purpose of burglary protection; combination systems provide both fire and intrusion protection. Intrusion alarm systems may also be combined with closed-circuit television surveillance systems to automatically record the activities of intruders, and may interface to access control systems for electrically locked doors. Systems range from small, self-contained noisemakers, to complicated, multi-area systems with computer monitoring and control. It may even include two-way voice which allows communication between the panel and Monitoring station. As one of the main problems of travelers is the security of their luggage, anti-theft bags or luggage are now being produced by bag manufacturers. These anti-theft bags have features like slash roof or cut resistant so robbers won’t easily cut the owner’s bag with the use of a knife/cutter while the person’s doing other things. Some have bonus features like waterproof so the owner won’t have to worry about their belongings getting soaked during rainstorms or water being spilled on their bag/luggage.

Although these anti-theft bags are being produced, some situations are not foreseen such as your luggage being lost/left or in some cases is your luggage being taken by robber. These are the downsides of these anti-theft bags, they may be anti-theft but once the whole bag is stolen, the owner would not be able to know where it is or retrieve it because it has no tracking device. In virtual space technology, a tracking system is generally a system capable of rendering virtual space to a human observer while tracking the observer's body coordinates. For instance, in dynamic virtual auditory space simulations, a real-time head tracker provides feedback to the central processor, allowing for selection of appropriate head-related transfer functions at the estimated current position of the observer. As studies shows form the Philippine Crime and Safety Report from the past 3 years, Theft has been considered as a high crime rating with an approximate of 48,000 incidents a year and increasing. With tracking device/systems being installed or added to the owner’s valuables, this could help reduce the victims of this particular crime. With this kind of technology, the owner will have an all-in-one anti-theft luggage with features of slash proof or cut resistant, waterproof, a tracking device and it has its own security system that can be controlled with an application or program downloadable in both smart watches and phones that can only be used by its owner because it is only programmed to only one account.

We have chosen this as our topic in this research because we students would one day become travelers and we would like others especially those who constantly travel be at ease with their luggage and worry less about it being stolen.

Statement of the Problem

In line with this research, the researchers came up with series of questions in order to obtain the results needed to answer the general problem. The factors needed to consider are the efficiency, the weight, how the security system will work, and if the security system will interfere with the frequency of the airplane once the luggage is onboard. Accomplishing these questions will now let us determine how to ensure the safety and security of the luggage of the passenger before, during and after the flight, thus, answering the general problem of the research. •

How to reduce the risk of theft in the belongings on luggage using an internal lock mechanism operated via wireless security system?



How to provide reliable lock mechanism to the zipper of the luggage?



How does the lock mechanism interconnect with the security system?



How does the lock mechanism function?



How to manage the security system of the luggage using a wireless key access device?



What program or application will be used for the operation of the security system and wireless key access device?



What happens to the security system if the luggage is accidentally dropped, and how to minimize the risk of damaging the security system?



How do the security system of the luggage and the wireless key device function during airplane mode?



How the user will gain access to the security system of the luggage wirelessly after the flight?



What are the offline functions of the security system of the luggage while airplane

mode? •

How does the security system work?



Does the frequency of the system interfere with the airplane’s frequency?

Theoretical Framework The actus reus of Theft is usually defined as an unauthorized taking, keeping or using of another's property which must be accompanied by a mens rea of dishonesty and/or the intent to permanently deprive the owner or the person with rightful possession of that property or its use. Security is one of the factors each traveler should have whenever they travel from one place to another. Security applies to any vulnerable and valuable asset, such as a person, dwelling, community, item, nation, or organization. As noted by the Institute for Security and Open Methodologies (ISECOM) in the OSSTMM 3, security provides "a form of protection where a separation is created between the assets and the threat." These separations are generically called "controls," and sometimes include changes to the asset or the threat. Security is said to have two dialogues. Negative dialogue is about danger, risk, threat etc. Positive dialogue is about opportunities, interests, profits etc. Negative dialogue needs military equipment, armies, or police. Positive dialogue needs social capital, education, or social interaction. Lock Picking can also be considered in order for a traveler to have security, a clever skill most smart thieves had been used for centuries. Lock picking simply is unlocking the lock (commonly the padlock or door lock) without using keys. “The theory of lock picking may be known as the theory of exploiting mechanical defects” (Akira, capricorn.org, chapter 1). It is one of those many successfully committed actions which did not physically can affect human beings, but has a huge conflict factor for the “taking

something that is not yours” concept or the security of one’s property. The basic knowledge of the thief to know is “How to use the key on the lock?” and the factors that cause the defects such as applying sheer force and imperfections in binding pins. Somehow, a type of lock where the thief cannot see or access physically in the first place can greatly reduce the risk of theft by means of preventing the lock to be hacked or configured physically. In the case of a luggage, making the lock inside of it instead of the typical external padlock will provide a significant factor of reducing the case of stealing the belongings. The lock picking, by means of its definition, will be the basis of the classic stealing method that is needed to prevent, and to know the different defects of locks which is the primary concerns that are needed to be change by means of using an alternative way or device that also functions as a lock mechanism. Cut-resistant, one of the few things every traveler’s bag need. With this feature, any person who has the intention of cutting the owner’s bag/luggage will not be able to steal anything from the owner’s luggage. For a bag/luggage to be cut-resistant, it has to be made with particular materials that are tested as slash proof. There are many factors to consider for a traveler’s luggage to be secured and safe. One of the main reasons that a person’s luggage gets easily lost particularly in the airport is because for every day or flight, there are thousands or bags that will also be stored in the plane’s compartment, once tags are lost or the owner’s bag gets mistaken by someone else’s bag, there’s no guarantee that the bag will be returned to its rightful owner in a short period of time.

Conceptual Framework

The illustration shows what are the Independent, Dependent and Intervening variables in our research. We considered the security system and the tracking device as Independent variables because they will not be affected or changed if the two other variables are changed. The dependent variable showcases our research because in order to have the desired results or outcome or this research, the two other variables are needed, hence, it is called the dependent variable. Lastly, the Intervening variable, this variable affects both of the two other variables, Dependent and Independent

Hypothesis The safety and security of the luggage cannot be ensured before, during and after the flight.

Significance of the Study This study seeks to solve problems about the security of the luggage of the passengers. The result of the study was deemed useful to the following: To the Passengers, they are the main benefactor of this study. The study will ensure the safety of the luggage of the passenger before, during, and after the flight. The passengers will not be worried about their personal belongings. The issue of theft will be minimized. They have the control of their luggage even if it is not beside them. They are also aware of the current location of the luggage because of the tracking system. The issue of planting a bullet or bomb inside the luggage will be reduced.

To the Airport personnel, the study will help them with their job. It will give them ease in maintaining the security inside the airport because the luggage of the passenger is already secured. To the Airport Management, the study will be beneficial to them in maintaining the security and order in the vicinity. With this, there will be smooth flow in every day’s routine in the airport. This will cause less problems in their business.

To the University, the study will be beneficial because it is under the name of the school. Just like all the studies, any awards and accomplishments of the study will be credited to the school and also in the Department especially the Thesis advisers.

To the future researchers, the study will also benefit them in a way that they can gain insights from the result of this study. They could use the study as reference material for a more comprehensive research.

Scope and Limitations The study was conducted to reduce the risk of the passengers in terms of lossing and mislaying of items especially the luggage and to obviate the secureness of the important belongings by applying security system to the luggage. The success of this study strictly relies on the passengers who used luggage in travelling and how this device will help to improve the security of their luggage. To be specific, selected passengers from __place__ are intended to answer a survey in the form of questionaire where the respondents will be regarded to obtain brief and direct-to-point answer and will be able to used the wireless security system luggage bag in order to test the feature of the luggage. This method will be the basis of the researchers to determine how the wireless security system luggage bag will help to reduce the risk of theft in the belongings on luggage using an internal lock mechanism operated via wireless security system. The assessment of the respondents on the wireless security system luggage bag will be assessed in terms of accuracy, consistency, reliability, security and userfriendliness.

View more...

Comments

Copyright ©2017 KUPDF Inc.
SUPPORT KUPDF