1 CHAPTER 1 5 - Final
1 CHAPTER 1 5 - Final
1 CHAPTER 1 5 - Final
Introduction
clearance. This part highlights how modern applications help minimize labor in
tasks, staff members can save valuable time and resources, enabling them to
1
Background of the Study
the school management and culture for the quality of education. (Altinay, F.,
and requires resources such as papers for violation slips and logbooks which
leads to the possibility of duplication or loss of data. The introduction of the Web-
based Record Violation Monitoring System aims to address these challenges and
Office of Student Affairs, Information Desk, and the students through notification
and to lessen the time that the departments’ staff spend in their work with the use
2
Universidad De Manila represents an essential step toward improving student
Theoretical Framework
known as the theoretical framework. The theory that explains why the research
framework.
3
Figure 1.0 shows the Agile Methodology will be used to develop the system.
All potential specifications for the system being created are taken note of in this
Planning
timeframe, deciding on tracking and assessment, finalizing the plan, and sharing
Design Development
This process aids in defining hardware and system requirements designing the
In this stage, the system will be developed using the chosen programming
language by the proponents. After that, it will be Implemented. With inputs from
the system design, the system is first developed in small programs called units,
4
Review and Monitor
In this phase, the system will be tested to see if there are faults or failures. In this
phase the proponents can review the developed project to fix any errors or
update if there are changes. Lastly, they will monitor it for maintenance.
Conceptual Framework
illustrate and present the variables that will be used in the study, and the
procedures or methods that will be essential in constructing the output which are
5
Figure 2.0 depicts the conceptual framework, which displays the proposed
system's input, process, and output. The first section is Input, it contains the user,
software, and hardware requirements. This stage includes the crucial resources
required prior to putting the study and the proposed system into practice, such as
gathering ideas, concepts, pertinent study related data, identifying issues that will
help to pinpoint the needs of the users, and gathering hardware and software
that will also be required to use for study and to create the proposed system. The
proponents will test and execute the system on a PC and an Android smartphone
in accordance with the hardware specifications. The need for the program must
also be taken into account. The application will integrate HTML, CSS, JavaScript,
PhP, SQL. The tools to be used are Xampp and Sublime. The second section,
system. This part also goes through the entire process in great depth, step by
putting it into use. Lastly, the output section outlines the anticipated results of the
Web-based Record Violation Monitoring System with the intention of helping the
In the 21st century, where mostly everything runs and revolves around
Office of Student Affairs in Universidad De Manila that they are still using
6
develop a web-based record violation monitoring system. Specifically, this paper
students?
2. What are the difficulties that the offices encounter and what are the
system for the Office of Student Affairs that will boost efficiency
violation.
Hypothesis
The Web-based Record Violation Monitoring System will enable the Office of
7
and monitor the violation status of students. As for the OSA, they will be able to
efficiently record and monitor the violation status of the students. This system will
this system has the potential to positively change the way of managing student
data within the University. Thus, the usage of the web-based system has a
environment, the researchers proposed to adapt in the current trend and use
Violation Record and Clearance System. The following will benefit from this
study:
UDM Office of Student Affairs. The main focus of this study is to benefit the
UDM OSA Web-based System. They will be able to record violations in a more
systematic way. All will be done online saving them time, resources, and energy.
UDM Students. The students will save time, resources, and energy. The system
will allow them to monitor their violation status simply by giving them updates via
8
Future Researchers. This paper will also be of help to future researchers. In an
systems. They can use this as a basis to find more information that will help them
The system will encompass the collection, storage, and analysis of records of
Manila. It will not cover every aspect of a student's life, such as personal hobbies
comply with data privacy regulations to safeguard students' personal data and
Definition of Terms
9
Hypertext Markup Language (HTML). A markup language for the web that
scripting language that is especially suited for web development and can be
Information Desk. A desk in the university where you can acquire information on
manipulation.
Sublime Text. A shareware text and source code editor available for Windows,
markup languages.
10
Web-based. A particular type of software that allows users to interact with a
11
CHAPTER 2
This chapter offers the relevant literature and studies on the topic A Web-based
Foreign Studies
According to Rozy & Purnama (2022), although the rules have been
even when children commit violations. This is because the school has not
committed by their children in the school. The purpose of this study is to build a
violation point information system (ViMoIS) for students so that their recording
can be done digitally and can be monitored by parents. The location of study was
conducted in one of the High Schools in Gresik. The data collection technique
uses the Focus Group Discussion (FGD) method. The model used to build this
system is a waterfall starting with three stages of analysis, design, and testing.
The results of the study were in the form of a Web-Based Student Violation Point
testing that all components in this system run smoothly (success). The existence
12
of a ViMoIS is expected to modernize the process of recording student budgeting
carried out by students, including lack of respect for teachers, students who are
not on time, often late for class, skipping classes, jumping fences, smoking, and
not paying attention to the rules and other regulations in school. This study aims
to build a decision support system for sanctions for violations of student discipline
that has the ability to analyze each of the criteria and sub-criteria that have been
determined by the school. In this case, students who violate school rules will be
students.
Muhammadiyah 7 Serbelawan).
can be done in various ways. For example, at the middle school level, points for
violations committed by students are calculated based on the rules set by the
school. The number of fault points counted varies from warning to calling the
parent at the highest level and notifying the maximum number of fault points to
The school will apply penalty points for all infractions committed by students in an
13
attempt to enforce disciplinary action. To improve teacher performance in dealing
with problem students, the authors designed a system for calculating student
at SMK Gandasari.
about the condition of the children at school, whether they really behave well or
not, and parents cannot do direct monitoring but have to wait when the report
students still use paper media, namely by being recorded in a book, this makes
Title: Violation of digital and analog academic integrity through the eyes of
ethical perspectives?
According to Blau et al., (2020), this study aimed to address the gap in
14
their severity. The study explored differences in perceptions regarding students’
VAI and penalties for VAI among 1482 students and 42 faculty members.
(ethnic majority vs. minority students), gender, and academic degree on the
committee.
Foreign Literature
Title: Face recognition for a student violation point system in schools using
then the student will be processed by the teacher and record the violation into the
that can centrally record student violations that run on the Android platform. To
facilitate student recognition, the system is made using face recognition. Face
recognition is implemented into this research because data retrieval can be done
additional devices. Face recognition uses the Fisher face method, which is a
15
facial recognition method that uses Linear Discriminant Analytics for its feature
Local Studies
Title: Automated Student Record System for the Guidance Office of Jose
increased quality education and services. The study aimed to design and
records such as data from student record form, psychological test results,
counseling notes, admission slips, referral slips and generates good moral
objectives: a recording module that can record and update students violations
and incident reports; a search module that can easily access and retrieve any
16
information such as incident reports, violation reports and student information; a
student monitoring module that every department can see and monitor students if
they have violations; a barcode scanning module that will allow the security
information for efficient and accurate record of information; and, a function that
explained the processes performed to design and develop the prototype system.
was employed to guide the researcher in designing and developing the project.
Analysis, Design and Development, and Testing Stage. The researcher was able
the design and development of the prototype, the study provides essential
17
Title: Guidance: student information, counseling, evaluation, good morals,
and report.
record complaints and problems of students in the guidance office. This system
will keep track of the record of a certain student and also consists of all personal
data about the student, such as name, student number, address, course, etc.
This system also allows the admin to register students who violate school
policies and is accessible to the admin. The system also displays the five
Good Moral, and Report. Agile is a process by which a team can manage a
with stakeholders and continuous improvement and iteration at every stage. The
agile methodology begins with clients describing how the end product will be
used and what problem it will solve, which clarifies the customer’s expectations
to the project team. Once the work begins, the team’s cycle through a process of
planning, executing, and evaluating, which may change the final deliverable to fit
Based.
into a better person. Student moral evaluation system is a system used to assist
the school can foster or help students who are not disciplined. The purpose of
18
this study is to help both schools and parents to monitor student discipline while
of this system are expected to provide input to schools to implement the system,
Local Literature
According to Abe (2013), the Office of the Student Affairs and Discipline
(OSAD) of the University of the Immaculate Conception is one of the offices that
OSAD keeps these records manually and stores data in a computer and files
them in the cabinet. However, the current data management system of the OSAD
academic offices in the University need these data as reports to monitor their
students. These stakeholders are the Prefect of Discipline, Associate Dean of all
included features for the enhancement and maximization of the current data
management system of the OSAD. The design of the system included a UIC
database to maximize the storage capacity, an online feature that will allow
19
stakeholders to access records from the OSAD to maintain the monitoring
regularly, especially of student offenses. The current system also can generate
detailed reports using enhanced tools for the academic stakeholders in a quick
and easy way. Other features included in the system are the calendar of activities
the Office of Student Affairs and Discipline (OSAD). In general, this will bring
Synthesis
that the rules are consistently followed, and that quick action is taken when
violations occur, it helps to create a positive school culture. One of the key
20
actions taken, the Student Violation Management System helps administrators
environment. The related studies also stated that combining technology, data
measures.
21
CHAPTER 3
Methodology
and past studies were evaluated once more. It is notable that numerous tools
The methods listed below provide a general overview of how the researchers
planned the study. The process of the development of the system is necessary to
22
are different not in the data availability, but in their procedures of data collection
behaviors of a sample population. Since the study used surveys to gather data,
prove hypotheses which in turn will support or reject a theory. The data under
analysis are quantified and, therefore, numerical in nature leading to the use of
statistical formulas in the analysis. This kind of approach generates some kinds
The numerical data is collected through surveys and in the form of Likert scale
23
The sampling technique refers to the procedure used to choose a sample from a
accurate conclusions from your data. The proponents will use purposive
sampling technique to gather data for this study. Purposive sampling is a non-
Thirty (30) students, five (5) Professors, five (5) Office of Student Affairs staff,
were asked to answer the survey. This study follows these criteria to pick the
respondent comprises thirty (30) students, five (5) Professors, five (5) Office of
Student Affairs staff, and ten (10) security guards within the Universidad De
Manila campus. The sampling technique that will be used is purposive sampling.
24
Locale of the Study
The locale of this study was in the Universidad De Manila - Main Campus. This
Instrumentation
The tools that the proponent needs to use are presented in this paper. The
ISO/IEC 9126 was used to create the criteria and standards in the
inquiries, or addressing a certain subject. This will have been made in advance
and depend on the strategy employed by researchers. The proponents used the
Online Survey Method: The researchers used this method to obtain better
information from a large number of people or participants. The platform used for
25
Online Research Method: Researchers can gather data using the online
research method. Data obtained online. These internet research techniques are
often connected but re-invent and re-imagine them in accordance with current
related situations.
researchers in order to analyze the gathered data online. All of the details that
can be valuable are acquired, and data that has been carefully chosen is used to
Procedures
The proponents gather data by first asking the respondents for permission and
showing them consent form; Then, giving them a brief explanation about the
survey. After getting their permission, the researchers show them the study
proposal and then the survey. They will spend 10-15 minutes answering the
questionnaires. The question is dealing only with the current system of the Office
the questionnaire and online using Google Forms sent through Facebook
messenger.
26
The proponents also interviewed the head of Office of the Student Affairs
regarding the difficulties and problems about the existing system of how they
monitor and record student violations which will give us insight on how to develop
The following are the statistical tools to be used by the proponents in this study:
1. Weighted Mean
values. If all the weights are equal, then the weighted mean is the same as
properties.
Formula:
X w=
∑ W i Xi
∑ Wi
Where:
X = Repeating value
X = Weighted mean
27
∑ = Summation of mean
2. Frequency
Formula:
f
P= x 100
N
Where:
P = Percent
f = Frequency
N = Number of respondents
3. Percentage
hundred” in Latin.) It is often denoted using the percentage sign “%”, or the
abbreviation “pct”. Percentages are used to express how large/ small one
part of or change in the second quantity which should be greater than zero.
Formula:
N
P= x 100
F
28
Where:
P = Percent
f = Frequency
N = Number of respondents
The Likert Scale is an ordered; one dimension scale from which respondents
choose one option that best aligns with their view. A method of ascribing
value is assigned to each potential choice and a mean figure for all the
Criteria:
5 – Strongly Agree
4 – Agree
3 – Neutral
2 – Disagree
1 – Strongly Disagree
5. T-test
samples.
Formula:
WMPS−WMES
t=
√( ( Σ MPS ) ¿ ¿ 2+ ( Σ MES ) ) ¿
2
N (N−1)
29
Where:
N = sample size
30
CHAPTER 4
TABLES
Existing System
can take a little effort from security, professor, and Office of the Student Affairs
staff.
Frequenc
Scale Criteria Percentage Rank
y
5 Strongly Agree 1 1% 4
4 Agree 6 12% 3
3 Neutral 25 50% 1
2 Disagree 9 18% 2
31
Table 1.0 Existing System – Question 1
Table 1.0 shows the result of the survey on question 1. The total number of
respondents, Strongly Disagree and Disagree. 25 with a total of fifty percent 28%
16% of the respondents Agree. While the remaining 1 making up one percent 1%
Frequenc
Scale Criteria Percentage Rank
y
5 Strongly Agree 1 2% 4
4 Agree 1 2% 4
3 Neutral 14 28% 2
2 Disagree 26 52% 1
32
Table 2.0 Existing System – Question 2
Table 2.0 shows the result of the survey on question 2. The total number of
staffs.
Frequenc
Scale Criteria Percentage Rank
y
5 Strongly Agree 1 2% 4
4 Agree 1 2% 4
3 Neutral 22 44% 1
2 Disagree 17 34% 2
33
Table 2.1 shows the result of the survey on question 3. The total number of
with the current way of managing multiple logbooks and records manually.
Frequenc
Scale Criteria Percentage Rank
y
5 Strongly Agree 1 2% 4
4 Agree 0 0% 5
3 Neutral 18 36% 2
2 Disagree 23 46% 1
34
Table 3.0 shows that 23 of the 50 participants, making up forty-six percent 46%,
Frequenc
Scale Criteria Percentage Rank
y
5 Strongly Agree 0 0% 5
4 Agree 1 2% 4
3 Neutral 17 34% 2
2 Disagree 25 50% 1
Table 3.1 shows the result of the survey on question 5. The total number of
35
Disagree. 17 with a total of thirty-four percent 34% of the respondents remained
Frequenc
Scale Criteria Percentage Rank
y
5 Strongly Agree 0 0% 5
4 Agree 2 4% 4
3 Neutral 16 32% 2
2 Disagree 19 38% 1
36
Table 4.0 shows the result of the survey on question 6. The total number of
respondents remaining. The other 13, making up twenty-six percent 26% of the
Frequenc
Scale Criteria Percentage Rank
y
5 Strongly Agree 0 0% 5
4 Agree 2 4% 4
3 Neutral 16 32% 2
2 Disagree 21 42% 1
Table 4.1 shows the result of the survey on question 7. The total number of
37
respondents, Disagreed. 16 with a total of thirty-two percent 32% of the
Frequenc
Scale Criteria Percentage Rank
y
5 Strongly Agree 0 0% 5
4 Agree 2 4% 4
3 Neutral 18 36% 3
2 Disagree 22 44% 1
38
Table 5.0 shows the result of the survey on question 8. The total number of
Frequenc
Scale Criteria Percentage Rank
y
5 Strongly Agree 0 0% 5
4 Agree 4 8% 4
3 Neutral 14 28% 3
2 Disagree 21 42% 1
39
Table 6.0 shows the result of the survey on question 9. The total number of
percent 22% of the respondents strongly agree, while the remaining four percent
4% agree.
Question 10. The student can always check their violation records.
Frequenc
Scale Criteria Percentage Rank
y
5 Strongly Agree 1 2% 4
4 Agree 0 0% 5
3 Neutral 8 16% 3
2 Disagree 23 46% 1
Table 6.1 shows the result of the survey on question 10. The total number of
40
respondents disagree. 18 with a total of thirty-six percent 36% of the respondents
the respondents remained neutral. The last two percent 2% strongly agree.
Frequenc
Scale Criteria Percentage Rank
y
5 Strongly Agree 1 2% 4
4 Agree 0 0% 5
3 Neutral 5 10% 3
2 Disagree 25 50% 1
41
Table 7.0 shows the result of the survey on question 11. The total number of
Question 12. The process of manually delivering the records gathered by the
Security and Professors to the Office of Student Affairs is timely and that does
not result in further delay in synchronizing the records for both parties.
Frequenc
Scale Criteria Percentage Rank
y
5 Strongly Agree 0 0% 5
4 Agree 1 2% 4
3 Neutral 23 46% 1
2 Disagree 18 36% 2
42
Table 7.1 shows the result of the survey on question 12. The total number of
16% of the respondents strongly disagreed. The last two percent 2% agreed.
Question 13 The Office of Student Affairs can easily retrieve and track violation
records of students.
Frequenc
Scale Criteria Percentage Rank
y
5 Strongly Agree 1 2% 4
4 Agree 0 0% 5
3 Neutral 10 20% 2
2 Disagree 30 60% 1
43
Table 8.0 shows the result of the survey on question 13. The total number of
Question 14. The student can access their violation status even if they are not in
school.
Frequenc
Scale Criteria Percentage Rank
y
5 Strongly Agree 1 2% 4
4 Agree 0 0% 5
3 Neutral 3 6% 3
2 Disagree 19 38% 2
44
Table 8.1 shows the result of the survey on question 14. The total number of
6% of the respondents remained neutral. The last two percent (2%) Strongly
agree.
Question 15. The manual process offers security because only authorized
Frequenc
Scale Criteria Percentage Rank
y
5 Strongly Agree 1 2% 4
4 Agree 0 0% 5
3 Neutral 4 8% 3
2 Disagree 32 64% 1
45
Table 9.0 Existing System – Question 15
Table 9.0 shows the result of the survey on question 15. The total number of
strongly agreed.
Question 16. The violation recording and managing is secured and is free from
Frequenc
Scale Criteria Percentage Rank
y
5 Strongly Agree 1 2% 4
4 Agree 0 0% 5
3 Neutral 10 20% 2
2 Disagree 31 62% 1
46
Table 9.1 shows the result of the survey on question 16. The total number of
16% of the respondents strongly disagreed. The last two percent 2% strongly
agree.
Proposed System
timesaving and can take less effort from security, professor, and Office of
Frequenc
Scale Criteria Percentage Rank
y
4 Agree 14 28% 2
3 Neutral 0 0% 3
2 Disagree 0 0% 3
1 Strongly Disagree 0 0% 3
47
Total Respondents 50 100%
Table 10.0 Proposed System – Question 1
Table 10.0 shows the result of the survey on question 1. The total number of
violations that eliminates the likelihood of error and inaccuracies in the recording.
Frequenc
Scale Criteria Percentage Rank
y
4 Agree 23 46% 2
3 Neutral 2 4% 3
2 Disagree 0 0% 4
1 Strongly Disagree 0 0% 4
48
Table 11.0 Proposed System – Question 2
Table 11.0 shows the result of the survey on question 2. The total number of
Office of the Student Affairs staff which the proposed system offers.
Frequenc
Scale Criteria Percentage Rank
y
4 Agree 21 42% 2
3 Neutral 0 0% 3
2 Disagree 0 0% 3
1 Strongly Disagree 0 0% 3
49
Table 11.1 shows the result of the survey on question 3. The total number of
equivalent to forty-two percent 42% of the respondents Agree voted for Neutral.
Frequenc
Scale Criteria Percentage Rank
y
4 Agree 14 28% 2
3 Neutral 6 12% 3
2 Disagree 0 0% 4
1 Strongly Disagree 0 0% 4
50
Table 12.0 shows the result of the survey on question 4. The total number of
to twenty-eight percent 28% of the respondents Agree. While the remaining six
Question 5. The proposed system is easy to use, navigate and is functional that
Frequenc
Scale Criteria Percentage Rank
y
4 Agree 23 46% 2
3 Neutral 2 4% 3
2 Disagree 0 0% 4
1 Strongly Disagree 0 0% 4
Table 11.1 shows the result of the survey on question 5. The total number of
51
respondents voted for Strongly Agree. Twenty-three of the respondents is
Frequenc
Scale Criteria Percentage Rank
y
4 Agree 21 42% 2
3 Neutral 1 2% 3
2 Disagree 0 0% 4
1 Strongly Disagree 0 0% 4
52
Table 12.0 shows the result of the survey on question 6. The total number of
Frequenc
Scale Criteria Percentage Rank
y
4 Agree 25 50% 1
3 Neutral 2 4% 3
2 Disagree 0 0% 4
1 Strongly Disagree 0 0% 4
Table 12.1 shows the result of the survey on question 7. The total number of
53
equivalent to fifty percent 50% of the respondents Agree. While the remaining
Frequenc
Scale Criteria Percentage Rank
y
4 Agree 19 38% 2
3 Neutral 3 6% 3
2 Disagree 0 0% 4
1 Strongly Disagree 0 0% 4
54
Table 13.0 shows the result of the survey on question 8. The total number of
to thirty-eight percent 38% of the respondents Agree. While the remaining three
automated process.
Frequenc
Scale Criteria Percentage Rank
y
4 Agree 18 36% 2
3 Neutral 1 2% 3
2 Disagree 0 0% 4
1 Strongly Disagree 0 0% 4
55
Table 14.0 shows the result of the survey on question 9. The total number of
to thirty-six percent 36% of the respondents Agree. While the remaining one is
Question 10. The system has a feature that gives frequency of violation record
Frequenc
Scale Criteria Percentage Rank
y
4 Agree 25 50% 1
3 Neutral 2 4% 3
2 Disagree 0 0% 4
1 Strongly Disagree 0 0% 4
Table 14.1 shows the result of the survey on question 10. The total number of
56
equivalent to fifty percent 50% of the respondents voted for Agree. While the
Question 11. The automated process of notifying the students about their
Frequenc
Scale Criteria Percentage Rank
y
4 Agree 21 42% 2
3 Neutral 0 0% 3
2 Disagree 0 0% 3
1 Strongly Disagree 0 0% 3
57
Table 15.0 shows the result of the survey on question 11. The total number of
Question 12. The process of delivering the records gathered by the guards will
appear on the system of Office of the Student Affairs real-time that results in
Frequenc
Scale Criteria Percentage Rank
y
4 Agree 26 52% 1
3 Neutral 0 0% 3
2 Disagree 0 0% 3
1 Strongly Disagree 0 0% 3
58
Table 15.1 shows the result of the survey on question 12. The total number of
Question 13. The record of each student regarding their number of violations
and its degree of seriousness are easier to manage and track by the Office of
Frequenc
Scale Criteria Percentage Rank
y
4 Agree 21 42% 2
3 Neutral 1 2% 3
2 Disagree 0 0% 4
1 Strongly Disagree 0 0% 4
59
Table 16.0 Proposed System – Question 13
Table 16.0 shows the result of the survey on question 13. The total number of
equivalent to forty-two percent 42% of the respondents voted for Agree. While
Question 14. The record of each student regarding their number of violations
and its degree of seriousness are easier to manage and track by the Office of
Frequenc
Scale Criteria Percentage Rank
y
4 Agree 20 40% 2
3 Neutral 1 2% 3
2 Disagree 0 0% 4
1 Strongly Disagree 0 0% 4
60
Table 16.1 shows the result of the survey on question 14. The total number of
forty percent 40% of the respondents voted for Agree. While the remaining one is
Question 15. The proposed system is secure and has restrictions on who can
Frequenc
Scale Criteria Percentage Rank
y
4 Agree 21 42% 2
3 Neutral 4 8% 3
2 Disagree 0 0% 4
1 Strongly Disagree 0 0% 4
61
Table 17.0 shows the result of the survey on question 15. The total number of
equivalent to forty-two percent 42% of the respondents voted for Agree. While
the remaining four are equal to eight percent 8% voted for Neutral.
Question 16. Students can view only their information and their record of
Frequenc
Scale Criteria Percentage Rank
y
4 Agree 26 52% 1
3 Neutral 1 2% 3
2 Disagree 0 0% 4
1 Strongly Disagree 0 0% 4
62
Table 17.1 shows the result of the survey on question 16. The total number of
equivalent to fifty-two percent 52% of the respondents voted for Agree. While the
EXISTING SYSTEM
CRITERIA 5 4 3 2 1 MEAN MEAN2
SPEED 1 6 25 9 9 2.62 6.86
ACCURACY 1 1 18 21.5 8.5 2.29 5.24
USER-FRIENDLINESS 0 1 17.5 24 11 2.31 5.34
ADAPTABILITY 0 2 16 20 12 2.16 4.67
RELIABILITY 0 2 18 22 8 2.28 5.20
EFFICIENCY 0.5 2 11 22 14.5 2.04 4.16
TIMELINESS 1 0 14 21.5 13.5 2.07 4.28
ACCESSIBILITY 1 0 6.5 24.5 18 1.83 3.35
SECURITY 0 1 7 31.5 10.5 1.97 3.88
TOTAL 4.5 15 133 196 105 19.57 42.98
Table 18.0 Existing System
PROPOSED SYSTEM
63
CRITERIA 5 4 3 2 1 MEAN MEAN2
SPEED 36 14 0 0 0 4.72 22.28
ACCURACY 27 22 1 0 0 4.52 20.43
USER-FRIENDLINESS 27.5 18.5 4 0 0 4.47 19.98
ADAPTABILITY 25.5 23 1.5 0 0 4.48 20.07
RELIABILITY 28 19 3 0 0 4.5 20.25
EFFICIENCY 27 21.5 1.5 0 0 4.51 20.34
TIMELINESS 26.5 23.5 0 0 0 4.53 20.52
ACCESSIBILITY 28.5 20.5 1 0 0 4.55 20.70
SECURITY 24 23.5 2.5 0 0 4.43 19.62
TOTAL 250 185.5 14.5 0 0 40.71 184.20
Table 19.0 Proposed System
= 2.17
= 4.52
4.52−2.17
√
2
T-Computed = ( ( 40.71 ) ¿ ¿ 2+ ( 19.57 ) )
¿
50(50−1)
2.35
=
√ 1657.30+382.98
50(49)
64
2.35
=
√ 2040.28
2450
2.35
=
√ 0.83
2.35
=
0.91
= 2.57
CHAPTER 5
Summary of Findings
slips are issued, which can be lost or contain mistakes. Data loss is a significant
risk due to the vulnerable storage of paper records. The decentralized approach
65
increases the chances of duplicate records, causing confusion. This manual
system also consumes a lot of staff time and lacks efficiency when retrieving
The proponent proposed the Web-based violation monitoring system that will be
useful not only for the students but also for the faculty, security and OSA staff.
This system will reduce manual labor and process. The information supplied in
the tables provides useful insights into respondents' assessments of the existing
manual method for documenting and handling student breaches, as well as their
security are among the criteria considered. The survey had 50 respondents, and
their opinions were graded on a five-point scale ranging from "Strongly Agree"
2. The respondent’s rate for the speed criteria for the existing system has a
total weighted mean of 2.62 while 4.72 for the proposed system.
3. The respondent’s rate for the accuracy criteria for the existing system
has a total weighted mean of 2.29 while 4.52 for the proposed system.
66
4. The respondent’s rate for the user-friendliness criteria for the existing
system has a total weighted mean of 2.31 while 4.47 for the proposed
system.
5. The respondent’s rate for the adaptability criteria for the existing system
has a total weighted mean of 2.16 while 4.48 for the proposed system.
6. The respondent’s rate for the reliability criteria for the existing system has
a total weighted mean of 2.28 while 4.52 for the proposed system.
7. The respondent’s rate for the efficiency criteria for the existing system
has a total weighted mean of 2.04 while 4.51 for the proposed system.
8. The respondent’s rate for the timeliness criteria for the existing system
has a total weighted mean of 2.07 while 4.53 for the proposed system.
9. The respondent’s rate for the accessibility criteria for the existing system
has a total weighted mean of 1.83 while 4.55 for the proposed system.
10. The respondent’s rate for the security criteria for the existing system has
a total weighted mean of 1.97 while 4.43 for the proposed system.
11. The T-Test has a total of 2.57 which indicates that the respondents are
67
Conclusions
following:
and employees which are the Faculty, Security and OSA staff.
2. The proponent concluded that the respondents (Employees) can use the
system to report a violation without the manual process and keep track of
their records.
3. The proponent concluded that the respondents (students) can use the
Moreover, below are the conclusions based on the conducted survey by the
proponent:
records.
68
2. Respondents think the suggested automated system will solve the
and security.
Recommendation
Based on the findings and the conclusions, the proposed system is more efficient
to use than the old way of recording and overall management of students’
violation system. It will be way faster, more accurate, and more accessible than
the existing one. Second is to include yearly report for violation records.
consider in the pursuit of further advancements and refinements within this field
of study:
dedicated mobile application for the violation monitoring system. This can
their smartphones.
69
Password Reset via SMS: Provide users with the option to initiate a
and well-documented.
proposed system. This can allow students, faculty, and staff to provide
continuous enhancement.
such as email or SMS alerts, to inform users and student’s parents about
70
Violation System, ensuring its effectiveness in maintaining a secure and
71