Professional Documents
Culture Documents
Information Quality System Quality System Use Figure 3. Participants SUS Score
Accuracy User Limitation Job Performance
Improvement
Preciseness Ease of System Use Goal Achievement The SUS 10-question evaluation guide in table 1,
Completeness Presenting Integrated Flexibility summarizes the results of the 22 participants. Mean score
Reports that achieved 3.59 showing 2 high scores representing a
Timeliness Response Time Ease of doing task in positive remark from the respondents. Also, the result falls
using the system
Compatibility Changeability in the User Friendliness
on fairly acceptable rates of the SUS scale shown in figure
system Condition 4.
Understandability Prevention form Productivity
Program Interruption Mean
Volume Data Transaction SUS 10 template questions
Score
Appropriateness Speed
1. I think that I would like to use this system
Table 1. Dimension and Measures of System Effectiveness frequently. 3.59
2. I found the system unnecessarily complex. 3.14
For determining the effectiveness of the system, three 3. I thought the system was easy to use. 3.59
independent variables are of relevance: Information 4. I think that I would need the support of a technical
Quality, System Quality and Information Use. person to be able to use this system. 3.32
Hypothesis: 5. I found the various functions in this system were
1. Users are satisfied by the system quality. well integrated. 3.27
2. Users are satisfied by the information quality of 6. I thought there was too much inconsistency in this
system system. 2.95
3. Users are satisfied by using system
7. I would imagine that most people would learn to with the limited number of security guards, not all gates
use this system very quickly. 3.45 are monitored. This study is for schools with limited
8. I found the system very cumbersome to use. 3.50 security guards not proportion to the number of possible
entrances and exits of the school. The system can only
9. I felt very confident using the system. 3.50 identify visible faces. Mask faces will be unidentified and
10. I needed to learn a lot of things before I could get can trigger the sound alarm. The study is ideal in the
going with this system. 3.27 implementation and adoption of the system but the
Table 1. Questionnaire Mean Scores. CCTV’s resolution and connections must be improved and
organized.
Based on the Likert scale, the average mean result of
the SUS 10-question, all showing under fair usability References
level. [1] S. Maeng, “A Geometric Approach to Video
Surveillance”, Indian Journal of Science and
Technology, Volume 8, Issue 21, 2015.
[2] H.J. Liao, C.H. R. Lin, Y.C. Lin, K.Y. Tung,
“Intrusion detection system: A comprehensive
review”, Journal of Network and Computer
Applications, Volume 36, Issue 1, 2013, pp. 16-24.
[3] N. Tilley, A. Sidebottom, “Handbook of Crime
Prevention and Community Safety”, Routledge, New
York, 2017.
[4] D.S. Meganathan, “System and Method of
Monitoring the Video Surveillance Activities”, US
Patent 9,218,729, 2015.
Figure 4. 10-question Mean Scores
[5] N. Boudriga, “A WSN-Based System for Country
For determining the effectiveness of the system,
Border Surveillance and Target Tracking”, Scientific
three independent variables are of relevance: Information
Research Publishing Inc., Vol.5 No.1, 2016.
Quality, System Quality and Information Use.
Using SPSS, data gathered were entered in the
[6] Shivani and L. Kaur, “A Brief Review: Border
Intruder Detection System Based On Computer
application and produces the following result. According
Vision”, Imperial Journal of Interdisciplinary
to the results of data analysis, all hypotheses are
Research, Vol 2, No 7, 2016.
confirmed. The statistical significance was established at
0.05. Therefore, the system is identified as effective. [7] D. Lyon, K. Ball, and K D. Haggerty, “Routledge
Handbook of Surveillance Studies”, Routledge, New
York, 2012, pp. 225-226.
[8] F. Flammini, R. Setola, and G. Franceschetti,
“Effective Surveillance for Homeland Security:
Balancing Technology and Social Issues”, CRC
Press New York, 2013, P414.
[9] Lee, Kyu-Su; Sim, Hyeon; Oh, Jai-Cheol, “The
Design and Implementation of Intruder Access
Control System by based of Ubiquitous Sensor
Network”, The Journal of the Korea institute of
electronic communication sciences, Volume 7, Issue
IV – CONCLUSION AND RECOMMENDATION 5, 2012, pp.1165-1171.
School Intrusion Detection needs continuous [10] John Brooke. SUS: A Retrospective. Journal of
enhancement. Using ICT’s improves security with Usability Studies. Vol. 8, Issue 2, February 2013 pp.
integration of dedicated Software. This study aims to 29-40.
enhance school security by detecting human intrusion [11] J. Jiang and G. Klein, “Software Development Risks
through face recognition. Security improves but due to to Project Effectiveness”, Journal of Systems and
poor camera resolutions the desired result was not fully Software, Volume 52, Issue 1, 2000, pp 3-10.
attained. Different types of cameras are now available to [12] L. G. Wallace and S. D. Sheetz, “The adoption of
the market. We have smart cameras that can further software measures: A technology acceptance model
improve the performance of the system. Since the server is (TAM) perspective”, Information and Management,
located in the main gate, when visitors enter the other gate, Volume 51, Issue 2, 2014, pp. 249-259.
they need to go first to the main gate for registration of
entry. So, additional workstation is needed in every gate
for efficiency purposes. Schools with wide premises and
many entrance and exits surely need security guards. But
Biography