Académique Documents
Professionnel Documents
Culture Documents
In
Partial Fulfillment
of the Requirements for the Degree of
Bachelor of Science in Criminology
By:
GJENERRICK CARLO R. MATEO
JOHN MAHATMAL.BARLAM
JOHN CLARKS.NAYRE
ALYSSA CAMILLE R. BAUTISTA
KIMBERLY MARIAH JACQUELINE C. DOMINGO
October, 2014
Introduction
According to Walsh, the term criminal can and has been applied to many types of
behavior, some of which nearly all of us have been guilty of at some time in our lives. We
call think of acts that we feel ought to be criminal but are not, or acts that should not be
criminal but are. Paul Tappan in 1947 defined crime as an international act in violation
of the criminal law committed without defense or excuse, and penalized by the state.
A crime is thus an act or omission in violation of law for which punishment is prescribed;
the person committing it must have intended to do so and must have done so without
legally acceptable defense or justification.
Many studies have already been conducted since 18th century just to determine
the causes of criminality and criminal behavior. Because of this, many theories have
arisen from the minds of different scalars across the globe, they have different ideas, but
they share only one purpose, and that is to provide an answer.
of
offenders
from
committing
future
crimes.
(http://www.cops.usdoj.gov/Publications/e071112381_EvalPublicSurveillance.pdf p4,5)
municipalities
to
start
installing
CCTV
systems.
See
more
at:
http://journalistsresource.org/studies/government/criminal-justice/surveillance-camerasand-crime#sthash.feM704Zs.dpuf
Process
INPUT
Study basis
Theory
Effectiveness
of modern
technologies
in the
suppression
of crimes
OUTPUT
Data and
Information
Gathering
Evaluation of
collected datas
and information
Interpretation of
collected datas
and information
Conduct
surveys in
barangays
w/in the city
of Manila as
well as to ask
for datas
and
information
from Law
Enforcement
Agencies.
Record and
Organize all useful
collected datas
and information.
Make a thorough
Interpretation of
collected datas
and information
by means of
statistics and
scientific analysis.
Outcome
-Assessment of
the Effectiveness
of utilizing
modern
technologies in
the suppression
of crimes
-Effects in crime
control because
of its utilization
-Information
regarding its
effectiveness
-Proposal of its
use by stating its
importance
through
presentation
Figure 1.
Conceptual Paradigm
9
Sex
1.3.
Civil status
1.4.
Educational Attainment
1.5.
2. What are the common crimes committed within the community according to the
record of the police station?
3. What are the advantages of utilizing modern technologies relative crime prevention
and suppression?
4. What are the respondents recommended modern technologies necessary for the
enhancement of security in selected Barangays in Tondo Manila?
10
11
Scope of Limitation
The study will determine the effectiveness of Modern Technologies utilized in the
suppression of crimes in Tondo Manila. Covering Selected Barangays in Tondo Manila
and Police Stations 1 and 7. It encompasses all strategies in determining crimes inside
the City of Manila particularly in Tondo. However, in several places they have their own
techniques and different ways in detecting crimes which is not subject for furtherance of
study. It focuses on the strict and active monitoring of the conditions of the community so
as to suppress all the kinds of evil motive which result to wrongful acts. But it does not
help all the time to suppress the crime because the funds of local government of Manila
for public security is not sufficient, which the government should take proper action in
promulgating the safety of every person who lives in the City of Manila.
12
Technology- The science or study of the practical or industrial arts and applied science
(Websters New World Dictionary)
Utilize- Make practical and effective use of. (Websters New World Dictionary)
13
In this chapter, the researchers will bring additional information and ideas related
to the topic which were taken from literatures and studies. The researcher also believes
that this would help to make this study more understandable and accurate.
Foreign Literature.
14
Organizations across the globe in every industry sector are under increasing pressure
and scrutiny to maintain the security and integrity of their data. Companies are faced
with an enormous liability if sensitive, business critical, or confidential information gets
into the wrong hands.
The field of information security has grown and evolved significantly in recent years. As
a career choice there are many ways of gaining entry into the field. It offers many areas
for specialization including Information Systems Auditing, Business Continuity Planning
and Digital Forensics Science, to name a few. Although information security has
traditionally been the responsibility of IT departments, some companies have made it a
business issue as well as a technological one. Companies are now adding strategic,
operational, and organizational safeguards to the technological measures they currently
employ to protect corporate information. But most companies continue to view
15
16
Integrity: information and systems are reliable, correct and up-to-date and they have not
been altered nor can they be altered in an uncontrolled way as a result of hardware or
software faults, natural events or human activities.
Ten years is a long time on software industry, especially in the field of web applications.
During that ten years, web technologies have advanced immensely and many
applications that simply were impossible in 1999 are now used every day by millions of
users. Unfortunately, new technologies have bought new attacks with them. Many of the
attacks that were effective against Effect were not even invented when development of
Effect started. During those then years of Effect development, the development process
at Effect has changed from unstructured development to structured Scrum-process with
proper code reviews, testing and education. Effects of this change were visible also in
this work as many of the vulnerabilities found were old and could not get to the code
base nowadays. Until this thesis work, however, security issues were not substantially
brought up.
17
18
Different programming languages could offer at least two benefits: better specification of
levels of trust for the data and a possibility to separate security concerns from other
concerns, making parts of a program easier to understand and use.
Ultimately, none of these methods and tools will be a silver bullet for the slaying beast of
security problems. Still, sometimes even grazing it will be worthwhile.
19
1. At a majority of the control rooms, digital tools (e.g., intelligent CCTV, digital radio,
user interfaces etc.) were not used to support operators in their tasks.
20
5. In the control rooms which recorded analogue CCTV (n = 6), video was recorded at
low- quality as a result of tapes were being re-used far too often.
6. In the control rooms which recorded video digitally, the video quality was also poor.
The problems with video quality were apparent at eight of the control rooms (both
analogue and digital systems). Six control rooms recorded video at 1-2 fps and two
21
Luff and Heath (2001) carried out naturalistic observations within in one particular type
of control room: station control rooms in the London Underground. In-depth field work
which involved making audio-visual recordings were carried out in the major stations of
the London Underground. The study specifically examined how operators maintained
situation awareness: how they monitored their surrounding domain and the activities of
their colleagues. The results showed that operators made use of a wide range of
communication and information technologies: radios, passenger announcement
systems, train information, emergency control, and alarm systems. The technology most
used was the banks of video monitors that displayed CCTV video in real-time (4-12
monitors per bank with up to 80 CCTV cameras in total). These monitors displayed
video of various public areas within the London
22
23
was
proposed
to
reduce
the
need
for:
maintenance,
need
different
24
25
75% of operators were happy with their working environment (p 2), but several said
that there should be a better way to integrate applications to allow critical data to be
retrieved more easily.
70% of operators would have liked a map-based search tool for accessing geographical
information.
70% expected simpler procedures to login and log out of their systems.
60% thought a speech interface would be beneficial and 21% thought a multimodal
(speech, gesture, touch, and others) would be beneficial.
These findings were then examined with 11 control room operators using a
questionnaire. The two main issues reported in the questionnaire related to the
26
Once the field research was complete, a mock-up user interface (web based) was
created to validate the findings. The aim of the mock-up system was to examine
whether operators could be better supported when handling incidents.
The design involved integrating a number of company policies into the flow of
information within the user interface. This integration was included in the design to
reduce operators cognitive load when performing tasks with the system. A browsing
navigation was proposed rather than a stand-alone search function so that entry point
information can be found using an advanced search function. Other features included
the use of: 1) expansion of fields when completing information (this reduced the need to
scroll excessively); 2) completion markers (in the form of checkboxes) to allow
operators to visualise completed actions; and 3) error handling (the checkboxes trigger
warnings when actions are incomplete).
The mock-up user interface was evaluated with six operators using a real-life traffic
incident scenario.
27
28
In contrast to the study by Chen et al. (2005), McCarthy et al. (1997) carried out a 12month ethnographic study to compare two different systems currently being used by
operators within two ambulance controls rooms. The field research involved field
observations and open-ended interviews with operators at two different ambulance
control rooms. The main objectives of the field study were to: 1) understand how
operators performed a specific task (locating a scene of emergency in order to dispatch
an ambulance); 2) compare the effectiveness of tasks performed by operators at each
control room; and 3) use these findings to assess the potential usefulness of the
technology used at one control room if it was to be used at another control room (where
technology is not heavily used). The control rooms which were evaluated included:
29
30
McCarthy et al. described the nature and context of this scene locating task at each of
the ambulance control rooms in detail.
Similar to the study conducted by Chen et al. (2005), field research was carried out to
identify the problems operators experienced when locating a scene within a control
room environment. McCarthy et al. found that task performance was severely affected
as a result of ineffective communication between public callers (those requesting an
ambulance) and control room operators (those receiving calls from public callers to
dispatch an ambulance). Communication was ineffective for a number of reasons: 1)
pubic callers had strong regional accents; 2) public callers provided operators with
insufficient location descriptions; and 3) operators lacked experience in locating scenes
of emergency.
McCarthy et al. suggested that some technologies, such as the gazetteer and an
electronic map could compensate for operators lack of direct access to the knowledge
on the local geographical areas. This particular control room provided detailed insights
31
To conclude, there have been a number of field studies within control rooms which
examine the nature and context of operator tasks. These studies were carried out with
the aim of improving system design, apart from the security control room study by Gill et
al. (2005) which examined the overall effectiveness in terms of crime reduction. In
review of these studies, there is a common theme: all involved operators performing
what would be widely known (by operators and other researchers) a reactive task
whereby the operator is involved in locating a scene using CCTV cameras, video
technology, and maps based artefacts.
Reactive tasks are time critical tasks and the ability to perform these tasks effectively
and efficiently depends on two factors: 1) how well an operators work-system is set-up
and configured and 2) the effectiveness of communication (verbal and technical)
between operators and other users. The transport control room studies (Chen et al.,
2005 and Luff and Heath, 2001) did not examine the role and effectiveness of
technology in much detail across a wide range of control rooms. Instead, field research
was limited to 1-2 control rooms to examine a specific task with the aim of improving
system design. Furthermore, secondary tasks such as administrative paper work and
32
1. What tasks are performed by CCTV operators where CCTV and other associated
technologies are used within a control room environment?
4. How do CCTV operators communicate and collaborate with other CCTV control room
stakeholders, and is it effective?
33
Effective, Design, Configuration, and Use of Digital CCTV (Hina Uttam Keval )
The research carried out in this thesis was motivated by the need to understand how
CCTV is used in the management of security tasks, and the factors that reduce its
effectiveness. The overarching goals for this research were: 1) theoretical and 2)
practical. Firstly, an understanding of security observation tasks was needed as this
research does not currently exist. Secondly, by building an understanding of the context
and use of CCTV and other technologies used for security observation tasks, a practical
framework can be developed to support CCTV practitioners and owners. The purpose
of such a framework is to improve the design, configuration, and set-up of CCTV
systems to ensure they are fit for purpose. The field study in this thesis (presented in
Chapter 4) demonstrated the importance of taking into account and correctly configuring
the: CCTV system environment, CCTV users workstation set-up, task requirements
(number of video monitor displays, display type, video quality etc.), and stakeholder
communication (see Chapter 4, Section 4.4.2.5). The empirical studies (presentedin
Chapters 8 and 9) investigated the effect of using low-quality CCTV video for a face
identification and event detection task performed by human observers. The results from
these experiments provide minimum recommendations on video quality required for
34
This research was extremely timely as there is a lot of investment in CCTV deployments
and a large interest in using it for a growing range of security purposes. One of the key
reasons for the high interest in CCTV is because of events such as the terrorist attacks
in London (July 2005). In addition to terrorism, a number of changes led to people
investing more and more in CCTV deployments. Firstly, there was a change in the way
in which society perceived and utilized security systems (particularly CCTV). There
were also changes in peoples attitudes towards security in response to crime of all
types. The number of CCTV deployments and the overall interest in using CCTV for
security purposes was further encouraged by the rapid developments in the CCTV
technology market. Furthermore, there have been technical developments in video and
networking that transformed the way in which CCTV is being used. As a result, CCTV is
being applied to new application areas and there are a large number of CCTV owners
and a more heterogeneous group of users interacting with CCTV systems.
It has been a topic of debate for many years whether CCTV is effective or not. Several
studies in the field of criminology have examined the effectiveness of CCTV from a
sociological and political perspective - assessing whether CCTV has reduced, deterred
and/or displaced crime. Research has also been conducted to establish whether CCTV
35
36
37
38
These contributions have led to the development of a best-practice framework for CCTV
deployment (TEC-VIS), which provides guidance for a new CCTV deployment or a
redesign. Specific guidance isalso provided to CCTV owners on the configuration of
CCTV security systems (e.g., the users tasks, work environment and the technology
used to support their tasks).
Local Studies.
39
Recommendations
In the light of the above findings and conclusions, the ff. recommendations were
made:
1.) In the implementation of programs and campaigns the authorities should be more
responsible and serious so that the residents of the brgy should observe the
effort expert by the authorities.
2.) That those ordinances enacted and made the authorities are worth and for the
benefits or good of the members of the members of brgy. It should be effective to
maintain peace and order.
3.) The authorities in charge should be pro-active in for all violation and anticipation
of the elicit acts that would break and destroy the peace and order situation.
40
Conclusion:
Based on the above findings, the following conclusions are drawn:
1.) Socio-demographic profile of police personnel
1.1)
Functional assignment
Police eligibility
All police personnel assigned at the concerned police agency were having
their appropriate eligibility, commensurate to their present ranks.
1.3)
Educational Qualification
41
Most of the police personnel assigned the concerned police station were
already acquired enough experience in policing activities, and very few the
considered novices in the police service.
1.5)
All the police personnel assigned in the concerned police station have
already completed the highest training prescribed by their ranks, and as
required for promotion and permanency in the said ranks
2.1) Community Counseling
The concerned police agency was responsive in this particular
category, which this requires use of discretion in attending non-criminal conduct,
disposing of minor complaints.
2.2) Indefference of the public
The concerned police agency was meeting slightly serious problems in relation with this
particular category, especially the traditional apathy and negative attitude of the public
with the things that the police are doing.
2.3) Inter-Relationship with Society
42
Recommendations
In the light the above finding and conclusions, the following recommendations are
made:
1. Strictly observe 85 percent and 15 percent distributions of police personnel
assigned in field and office duties to ensure a more decentralized concept of
policing activities for more reponsive crime prevention strategies, and encourage
undergraduate police personnel to complete repective formal degrees.
2. Develop linkages with other concerned local government agencies, and the local
government unit as well, and to forestall participation in the police decision
making process.
3. Activation of more police community precinct(PCP), and community action
centers(COMPACT), and continiously advocate the concept and philosophy of
community oriented policing system(COPS)
4. Similar study be conducted in another time and setting which will focus on the
extent of responsiveness of the crime prevention strategies, purposely to confirm
or negate the findings of the present study.
43
Above enumerated studies and literature were focused more on law enforcement, crime
prevention and elimination of factors that contribute in criminality, which also are the
similar characteristics of this study, that makes it related to studies enumerated above.
This study (The use of Modern Technologies in the Suppression of Crimes in Selected
Barangays in Tondo Manila) focused more on the methods utilized in the total
abolishment of criminality, effect of modernity in the investigation of crimes by utilizing
new materials and other techniques in crime suppression which were not tackled or
discussed in those related studies mentioned above that were all conducted by scalars
in the same field of study and profession.
44
Research Design
In this research, the researcher will use a descriptive type of research in gathering data and
information. This type of research can effectively and accurately acquire information needed to
support the current study which can also give suggestions to answer the problems and
questions stated before. This is a collective type of data gathering to ensure that every opinion
of respondents was clearly and completely gathered.
Setting:
Tondo is one of the sixteen areas of Manila, Philippines. The locale has existed
prior to the arrival of the Spaniards, referred to as "Tundun" on the Laguna Copperplate
Inscription. One of the most densely populated areas of land in the world. Tondo is
located in the northwest portion of the city and is primarily residential-industrial in
nature. Many of the city's slums are found in this area.
45
Figure 2
Research Locale
46
Sampling Technique.
Purposive sampling will be utilized in this research. Within the population
sample there would be sample representative, depending on his opinion or purpose,
thus being the representation subjective.
Sampling size
1.
2.
3.
SAMPLES
A (Residents)
B (Law Enforcers)
C (Brgy Officials)
TOTAL =
47
QUANTITY
60
20
20
100
48
The questionnaires were the main instruments for data gathering which were
personally distributed by the researcher himself. They contained a covering letter
describing the study and indicating the confidentiality of the information that may be
given out by the respondents.
49
50