Chapter HARD BINDING
Chapter HARD BINDING
A Research Study
Presented to
Faculty of the Senior High School Department
Asian College of Aeronautics
Jaro, Iloilo City, Philippines
In partial fulfillment
Of the requirements for the
Senior high school completion
Technical Vocational Livelihood
by
April 2019
i
Asian College of Aeronautics
SENIOR HIGH SCHOOL
Jaro, Iloilo City, Philippines
APPROVAL SHEET
ii
Asian College of Aeronautics
SENIOR HIGH SCHOOL
Jaro, Iloilo City, Philippines
ACKNOWLEDGEMENTS
iii
Asian College of Aeronautics
SENIOR HIGH SCHOOL
Jaro, Iloilo City, Philippines
All of the above, to God almighty, for his guidance, blessings,
unconditional love and enlighten the researchers body and mind.
April 2019
iv
Asian College of Aeronautics
SENIOR HIGH SCHOOL
Jaro, Iloilo City, Philippines
De Guia, Shayne Chizlette G. and Casiple, Therese Mae G., Installing
Intruder Alarm System Maintains the Security of Home. A Research
Study, Technical Vocational Livelihood, Asian Colleges of
Aeronautics, Jaro, Iloilo City, Philippines, March 2019.
Abstract
The purpose of this study was to determine the interest in the topic
of security and in particular to the security system is
understandable for various reasons, for this type of problem it is
important to understand that the more financial resources are used
for an inefficient security system the greater become the problems
and negative effects from its operation. Security system is a
revolutionary product in generation z, People come up in different
ideas how to protect their homes and installing security system is
the most common, in further generation the idea of securing the home
will be in demand especially in big companies. This study will be
realistic and appropriate design using alarms and thermal sensors.
Both researchers and device would access data for meta-analyses and
other kinds of re-use this is accessible using the trial and error
mode. The case study showed how the device reacts when detecting
thermal sensor and sensitivity sensor. It was observed by movement,
time and sound using parameters relevant to the case study (example:
meter from the device, sensitivity of the device, initiated time to
trigger the alarm, decibels produced by external siren). And still
leaves a positive outcome in evolving the technology entity.
v
Asian College of Aeronautics
SENIOR HIGH SCHOOL
Jaro, Iloilo City, Philippines
TABLE OF CONTENTS
Title Page…………………………………………………………………………………………………………………………………………………I
Approval Sheet……………………………………………………………………………………………………………………………………II
Acknowledgement…………………………………………………………………………………………………………………………………III
Abstract…………………………………………………………………………………………………………………………………………………IV
Table of Contents…………………………………………………………………………………………………………………………V
List of Refrences…………………………………………………………………………………………………………………………VI
List of Tables…………………………………………………………………………………………………………………………………23
List of Appendices………………………………………………………………………………………………………………………VII
Chapters 1
Introduction to the study
Background of The Study………………………………………………………………………………………………1
Conceptual Framework………………………………………………………………………………………………………3
Background and Theoretical Framework of the study…………………………4
Research Hypothesis…………………………………………………………………………………………………………7
Statement of the Problem………………………………………………………………………………………………7
Definition of terms…………………………………………………………………………………………………………9
Significance of the study…………………………………………………………………………………………12
Scope and Limitation……………………………………………………………………………………………………12
Chapter 2
On concept of security…………………………………………………………………………………13
Securitization theory……………………………………………………………………………………17
vi
Asian College of Aeronautics
SENIOR HIGH SCHOOL
Jaro, Iloilo City, Philippines
Criticism on concept of security……………………………………………………………………19
Chapter 3
Methodology…………………………………………………………………………………………………………………………………21
Research Design………………………………………………………………………………………………………………………21
Respondents of Study…………………………………………………………………………………………………………21
Sampling Method………………………………………………………………………………………………………………………22
Data Collection………………………………………………………………………………………………………………………22
Chapter 4
Table 1……………………………………………………………………………………………………………………………………23
Table 2……………………………………………………………………………………………………………………………………24
Chapter 5
Summary of Research…………………………………………………………………………………………………………25
Recommendation
References………………………………………………………………………………………………………………………………V
Appendices………………………………………………………………………………………………………………………………VII
A. Appendices……………………………………………………………………………………………………………………………VIII
B. Appendices……………………………………………………………………………………………………………………………VIIII
C. Appendices……………………………………………………………………………………………………………………………X
D. Appendices……………………………………………………………………………………………………………………………XI
vii
Asian College of Aeronautics
SENIOR HIGH SCHOOL
Jaro, Iloilo City, Philippines
List of Tables
Table 1………………………………………………………………………………………………………………………………23
Table 2………………………………………………………………………………………………………………………………24
viii
Asian College of Aeronautics
SENIOR HIGH SCHOOL
Jaro, Iloilo City, Philippines
ix
Asian College of Aeronautics
SENIOR HIGH SCHOOL
Jaro, Iloilo City, Philippines
1
Asian College of Aeronautics
SENIOR HIGH SCHOOL
Jaro, Iloilo City, Philippines
CHAPTER 1
1
Asian College of Aeronautics
SENIOR HIGH SCHOOL
Jaro, Iloilo City, Philippines
components considered separately. In this aspect, the security
system could be defined as a set of interrelated components
that generates and maintains security which could not be
generated and maintained by the components considered
separately. (Rachelle Green,2011)
2
Asian College of Aeronautics
SENIOR HIGH SCHOOL
Jaro, Iloilo City, Philippines
Conceptual Framework
3
Asian College of Aeronautics
SENIOR HIGH SCHOOL
Jaro, Iloilo City, Philippines
tigbauan Iloilo, Gedalanga’s Residendce ,Napnapan Sur,
Tigbauan Iloilo.
4
Asian College of Aeronautics
SENIOR HIGH SCHOOL
Jaro, Iloilo City, Philippines
traditional view of the sole concept of security, that is, its
essence, has become too narrow.
5
Asian College of Aeronautics
SENIOR HIGH SCHOOL
Jaro, Iloilo City, Philippines
the purpose of formulating an all-embracing definition. Rather,
it formulates a common denominator which expresses “common
conceptual distinctions underlying various conceptions of
security” (Baldwin A. David (1997) “The concept of security”, in
Huysman, 1998: 231). The question is whether there is a
generally accepted definition of the meaning of concept of
security in theory and whether it should be regarded as an
“essentially contested concept”[i] (Baldwin, 1997: 5) or it is
more suitable to say that the concept itself is insufficiently
explained and blurry. Anyways, the security concept can be
“dangerously ambiguous” (Wolfers 1952) should it be used without
additional specifications.
6
Asian College of Aeronautics
SENIOR HIGH SCHOOL
Jaro, Iloilo City, Philippines
construct security. At the same time, the conceptual framework
of securitization puts a special emphasis on the acceptance of
the audience which is claimed to be essential in the successful
securitization process. Contextual factors, which the Copenhagen
school terms facilitating conditions, help explain why some
securitizing moves are more likely to be accepted by the
audience than the other. These facilitating conditions are taken
as givens that either help or hinder securitization but are not
conceptualized as constitutive of the speech acts, which is at
odds with the claim that security is a social construction.
There is tension between understanding securitization as a
productive process by focusing on the per formative power of the
speech act, and as a constructed process by claiming that
security is inter-subjectively constituted. This tension gave
rise to critique by the so-called Second Generation of
securitization analysts who argue that securitization cannot be
properly understood outside historical and cultural context in
which security discourse takes place. Thus, the very meaning of
security is contextual. Finally, the framework of securitization
is narrow in the sense that the nature of the act is defined
solely in terms of the designation of threats to security
(McDonald, 2008: 564). This claim is based on a commitment to
the idea that security is constituted in oppositional terms: by
designating that which it is not or that from which it needs
preservation or protection (Weaver, 1995: 56). Sometimes it is
more effective if security is conceptualized in terms of
normative goals that should be achieved or expression of the
core values that are in need of being protected, than if it is
articulated only in terms of “from what and from whom it needs
7
Asian College of Aeronautics
SENIOR HIGH SCHOOL
Jaro, Iloilo City, Philippines
protection”. Thus, seeing security as something negative per se
does not represent a logical imperative anymore.
Research Hypothesis
8
Asian College of Aeronautics
SENIOR HIGH SCHOOL
Jaro, Iloilo City, Philippines
to be placed in public places because of the threat of terrorist
attacks, it is quite clear that a suicidal bomber is not going
to be deterred by the fact that there is a camera in place.
(Amanda Li,2018)
1.2. Economic
2.1. Witness
2.2. Authentication
3.1. Efficiency
3.2. Identification
9
Asian College of Aeronautics
SENIOR HIGH SCHOOL
Jaro, Iloilo City, Philippines
Definition of Terms
10
Asian College of Aeronautics
SENIOR HIGH SCHOOL
Jaro, Iloilo City, Philippines
Crime- an illegal act for which someone can be punished by the
law.
11
Asian College of Aeronautics
SENIOR HIGH SCHOOL
Jaro, Iloilo City, Philippines
Consequence- result of something that had happen.
Contextual- the words that are used with certain words or phrase
to help explain the meaning.
12
Asian College of Aeronautics
SENIOR HIGH SCHOOL
Jaro, Iloilo City, Philippines
Significance of Study
13
Asian College of Aeronautics
SENIOR HIGH SCHOOL
Jaro, Iloilo City, Philippines
CHAPTER 2
14
Asian College of Aeronautics
SENIOR HIGH SCHOOL
Jaro, Iloilo City, Philippines
suggests that by defining the meaning of a category (security
in
this particular case) we are condensing it into one sentence
(Huysmans, 1998: 229). The main function of the definition is
the identification of the subject of the research, or to put
it more precisely, the removal of any doubt reader could have
concerning the following content of the text. Conceptual
analysis is similar to the definition in extent that it also
condenses the meaning of security for the establishment of a
singular scientific goal’s sake of all future research
projects, but condensing its meaning is being performed in a
much more complex way than with just one sentence. The
starting assumption of the conceptual analysis is that the
meaning of the notion that is being examined is more or less
familiar, but also that it usually isn’t expressed in the
explicit manner. Making it explicit by eliminating its
ambiguities and inconsistencies in the different uses is the
sole purpose of the conceptual analysis. “Conceptual analysis
does not result with the new definition. It is not comparative
analysis of definitions with the purpose of formulating an
all-embracing definition. Rather, it formulates a common
denominator which expresses “common conceptual distinctions
underlying various conceptions of security” (Baldwin A. David
(1997) “The concept of security”, in (Huysman, 1998: 231).
The question is whether there is a generally accepted
definition of the meaning of concept of security in theory and
whether it should be regarded as an “essentially contested
concept” (Baldwin, 1997: 5) or it is more suitable to say that
the concept itself is insufficiently explained and blurry.
Anyways, the security concept can be “dangerously
15
Asian College of Aeronautics
SENIOR HIGH SCHOOL
Jaro, Iloilo City, Philippines
ambiguous”(Wolfers 1952) should it be used without additional
specifications. Baldwin, for example, formulate the entire
series of questions – security for whom, security for which
values, how much security, from what threats, by what means,
at what cost, in what time period (Baldwin,1997: 12-18) – that
should make appropriate analytical framework for future
security studies.
Therefore, the definition of the term itself is not
enough; a particular textual organization is also required.
16
Asian College of Aeronautics
SENIOR HIGH SCHOOL
Jaro, Iloilo City, Philippines
(Ejdus 2007). Second fundamental assumption of these theories
is an epistemological assumption, i.e. method that they apply
when responding to the question on
how to acquire the knowledge on certain social truths? Basic
method of these theories is positivist method. The starting
point of positivist approach is that social facts should be
regarded as things – like in natural sciences. The causal
relations and laws of social phenomena ought to be discovered
by description and arrangement of perceptible facts.
Observing and analyzing subject and object of their
analysis are separate in this case. The other school of
thought, so-called “wideners” with Barry Buzan in front, has
challenged this conception of security by widening and
deepening security studies agenda, both horizontally and
vertically. Having in mind the horizontal dimension, the
wideners think that in reality the security concept has
expended from exclusively military onto political, economic,
societal and environmental sectors. Vertically, the altered
security concept should
also be open to referent objects [ii] other than the state
(individuals, social groups, humanity as a whole). Ontological
standpoint of traditional understanding of security critics is
that “social relations and security threats are actually the
result of an inter-subjective ideational social construction
and that they do not exist objectively, independently” (Ejdus
2007). This is, in essence, anti-essentialist ontological
standpoint. Responding to the question on whether the truth
about social reality has one, unique, unchanging, essential
meaning, or there are more versions of its interpretation,
proponents of this school of thought undoubtedly opt for the
17
Asian College of Aeronautics
SENIOR HIGH SCHOOL
Jaro, Iloilo City, Philippines
latter solution. Complete and perfect knowledge does not
exist. The truth about reality is a socially constructed
interpretation. Therefore, it is clear that the method used in
their analysis can’t be positivist method, but a kind of
“empathic interpretation” (Ejdus 2007) of the facts.
Methodological interpretive (post-positivism) assumption is
that there is an unbreakable unity
between subject and object of cognition, therefore the facts
are relative and dependent upon the observer.[iii]
Constructivist’s majority opinion is that “the theory does not
take place after
the fact. Theories, instead, play a large part in constructing
and defining what the facts are”.
(Enloe and Zalewski, 1995: 299). Having that kind of
attitude in mind, relevance of
distinction between “real” and “perceived” threats seizes to
exist. Corollary of such epistemological approach is that the
main goal of security studies is to understand social reality,
not its explanation. To understand certain social phenomenon
means to grasp and interpret its meaning given by the social
actors.
18
Asian College of Aeronautics
SENIOR HIGH SCHOOL
Jaro, Iloilo City, Philippines
whether and how to broaden and deepen the security concept
without bringing its logical coherence into the dispute, how
to widen the focus of the research onto the other, non-
military
sectors, and keep the sole concept meaningful and to analysts
a useful tool. Enormous contribution to the contemporary
security studies was made by the so-called Copenhagen School
of Security Studies[iv], which offered a quite innovative,
original
perspective on a broad spectrum of security issues, perceiving
clearly that security dynamics could no longer be reduced only
to the military-political relations of the two super powers,
however important they might be. In that sense, proponents of
the Copenhagen School stand firmly on the wideners` side.
However, as shown in the text, the moment one leaves the idea
to tie the concept of security only to certain referent
objects (such as the state) and to certain kind of security
threats (such as military), a question “what quality makes
something a
security issue” (Buzan, Weaver and de Wilde, 1998: 21) arrives
at the very centre of controversy. Without distinctive
criteria which separate a security issue from non-security
issue, the concept of security is trivial and leaves only
confusion behind.
In an effort to give an answer to this particular
question, Barry Buzan, one of the representatives of the
Copenhagen School, starts with an assertion that undoubtedly
presents
a traditional view’s heritage: security is about survival; it
is when an issue, presented as posing an existential threat to
19
Asian College of Aeronautics
SENIOR HIGH SCHOOL
Jaro, Iloilo City, Philippines
a designated referent object, justifies the use of
extraordinary
measures to handle them (Buzan, Weaver and de Wilde, 1998:
21). However, radical severance from traditional security
studies commences with the multisectoral [v] approach to the
research on security. Statement of existence of other security
sectors, apart from military, allows the possibility of other
referent objects different from state and, in accordance with
that, existence of much wider scope of security threats, being
that their nature is variable in relation with the
characteristics of particular referent object. On the other
hand, the materialist assumption of traditional security
studies on the objectivity
of security threats, in which they exist independently and
outside the discourse, did not remain out of reach of
criticism. The Copenhagen School of Security Studies
conceptualizes
security as a process of social construction of threats which
includes securitizing actor[vi] (mostly political elite), who
declares certain matter as urgent and a posing threat for the
survival of the referent object, that, once accepted with the
audience[vii], legitimizes the use of extraordinary measures
for neutralization of the threat. Thus, the issue is
securitized and
removed outside the normal bounds of democratic political
procedure and put on the “panic politics” agenda (Buzan,
Weaver and de Wilde, 1998: 34).
20
Asian College of Aeronautics
SENIOR HIGH SCHOOL
Jaro, Iloilo City, Philippines
The securitization framework has been a useful tool to
analysts who want to challenge the notion of the objectivity
of security threats. The framework is elegant and has
generated
much academic interest and sparked the number of critiques and
debates, aiming to broaden and further specify the framework
in order to increase its logical coherence and explanatory
power.
However important and innovative contribution to our
understanding of security may it be, the securitization
framework is problematically narrow. First, the form of act
constructing security is defined narrowly, with the main focus
on the speech of dominant actors, usually political leaders,
which encourages an interpretation that securitization is only
happening when there are discursive interventions of those who
are institutionally legitimate to speak on behalf of a
particular political community (usually a state). This also
excludes a focus on other forms of representations, such as
images or material practices. (McDonald, 2008: 564).
Thus, the focus is on the speech and it is per formative power
to construct security. At the same time, the conceptual
framework of securitization puts a special emphasis on the
acceptance of the audience which is claimed to be essential in
the successful securitization process. Contextual factors,
which the Copenhagen school terms facilitating conditions,
help explain why some securitizing moves are more likely to be
accepted by the audience than the other. These facilitating
conditions are taken as givens that either help or hinder
securitization but are not conceptualized as constitutive of
the speech acts, which is at odds with the claim that security
21
Asian College of Aeronautics
SENIOR HIGH SCHOOL
Jaro, Iloilo City, Philippines
is a social construction. There is tension between
understanding securitization as a productive process by
focusing on the per formative power of the speech act, and as
a constructed process by claiming that security is inter-
subjectively constituted. This tension gave rise to critique
by the so-called Second Generation of securitization analysts
who argue that securitization cannot be properly understood
outside historical and cultural context in which security
discourse takes place. Thus, the very meaning of security is
contextual.
Finally, the framework of securitization is narrow in the
sense that the nature of the act is defined solely in terms of
the designation of threats to security (McDonald, 2008: 564).
This
claim is based on a commitment to the idea that security is
constituted in oppositional terms: by designating that which
it is not or that from which it needs preservation or
protection
(Weaver, 1995: 56). Sometimes it is more effective if security
is conceptualized in terms of normative goals that should be
achieved or expression of the core values that are in need of
being protected, then if it is articulated only in terms of
“from what and from whom it needs protection”. Thus, seeing
security as something negative per se does not represent a
logical imperative anymore.
22
Asian College of Aeronautics
SENIOR HIGH SCHOOL
Jaro, Iloilo City, Philippines
CHAPTER 3
Methodology
Research Design
23
Asian College of Aeronautics
SENIOR HIGH SCHOOL
Jaro, Iloilo City, Philippines
Sampling Method
Data Collection
The Wireless home security was ordered online and was design to
be more effective in performance using application remote
control card kit. It support gate, hall, bedroom, window,
balcony, perimeter, smoke gas, water leakage zone name settings.
It is made of plastic and metal, Color: black and white,
Size185X124X14.7mm/7.8X4.92X0.59 in approximate. Input voltage:
DC5 V/a (micro universal serial bus) jack). Standby Current:
120m, Siren Output<500m. Wireless Frequency: 433mHZV1527. Back-
up Battery: 3.7V/500mah Lithium Battery. Main panel, Wireless
Infrared sensor, Wireless door/window sensor, two remote
control, wired sensor, Power adapter, User manual
24
Asian College of Aeronautics
SENIOR HIGH SCHOOL
Jaro, Iloilo City, Philippines
Chapter 4
This chapter shows the presentation and analysis of data we use table
1 and table 2 to connect the research itself we used trial and error
mode to detect the distance of noise, the area, how long will the
battery last.
Table 1
This table 1 present the distance of intruder alarm sound from the
main door to the area. At the main door to the waiting shed which has
17m distance you could hear 100 decibels. From the main door to the
old house you could hear 80db in 30meters distance. From the main
door to the near the NNHS you could hear 50db in 50meter distance.
25
Asian College of Aeronautics
SENIOR HIGH SCHOOL
Jaro, Iloilo City, Philippines
Battery
percent
(%) of Hours
intruder
alarm
25% 5min
50% 10min
75% 15min
100% 20min
26
Asian College of Aeronautics
SENIOR HIGH SCHOOL
Jaro, Iloilo City, Philippines
Chapter 5
Summary of research
27
Asian College of Aeronautics
SENIOR HIGH SCHOOL
Jaro, Iloilo City, Philippines
movement, time and sound using parameters relevant to the case study
(example: meter from the device, sensitivity of the device,
initiated time to trigger the alarm, decibels produced by external
sire).
28
Asian College of Aeronautics
SENIOR HIGH SCHOOL
Jaro, Iloilo City, Philippines
Long term assessments are particularly constrained by
availability and reliable recorded data. The frequency, and often
methodology, in which censuses and conductions are made do not
always suit the purposes of this kind of research. Trial and error
are important, by limited memories and continuity. Documentation, if
available, it represents one of the most reliable sources to observe
changes. Nevertheless, a detailed process of observing the data is
very time consuming, make sure to only include important details.
Make sure to use strategies, to be developed in other countries in
the near future, Perhaps most important learning of this research
study is that the effectiveness and convenience of the device
acknowledges the survival and privacy of home protecting the family
and securing life. And still leaves a positive outcome in evolving
the technology entity.
29
Asian College of Aeronautics
SENIOR HIGH SCHOOL
Jaro, Iloilo City, Philippines
30
Asian College of Aeronautics
SENIOR HIGH SCHOOL
Jaro, Iloilo City, Philippines
x
Asian College of Aeronautics
SENIOR HIGH SCHOOL
Jaro, Iloilo City, Philippines
REFERENCES
v
Asian College of Aeronautics
SENIOR HIGH SCHOOL
Jaro, Iloilo City, Philippines
Buzan,1991: 18
Huysman, 1998:286
Wolfers 1952
Walt 199
Ejdus 2017
Iria, 2015
https://reolink.com/pros-cons-of-surveillance-cameras-in- publicplaces/
sulovic 2010
andutris 1995
vi
Asian College of Aeronautics
SENIOR HIGH SCHOOL
Jaro, Iloilo City, Philippines
APPENDICES
vii
Asian College of Aeronautics
SENIOR HIGH SCHOOL
Jaro, Iloilo City, Philippines
Appendix A
Dear Sir:
We, the undersigned, are presently working on our research study
entitled, “Installing Intruder Alarm System Maintains the Security of Home”
as part of academic requirements in our senior high school academic
requirements.
We are requesting permission from your good office that we be allowed
to present our device in our research adviser, it will only be use in
academic purposes.
We are looking forward towards your positive response on this request,
Thank you for anticipating.
Truly yours,
Shayne Chizlette De Guia Therese Mae Casiple
Researcher Researcher
Noted by:
Milo Diego Ferolino and Angeline Veloso
Research Adviser Research Teacher
viii
Asian College of Aeronautics
SENIOR HIGH SCHOOL
Jaro, Iloilo City, Philippines
Appendix B
Letter to the Respondent
Mrs. Ruby De Guia
Napnapan Sur,Tigbauan , Iloilo
Dear Ma’am:
Truly yours,
Researcher Researcher
Noted by:
ix
Asian College of Aeronautics
SENIOR HIGH SCHOOL
Jaro, Iloilo City, Philippines
Appendix C
Dear Ma’am:
We, the undersigned, are presently working on our research study
entitled, “Installing Intruder Alarm System Maintains the Security of Home”
as part of academic requirements in our senior high school academic
requirements.
We are requesting permission from your good residence that we be
allowed to use our device in your home, it will only be use in academic
purposes.
We are looking forward towards your positive response on this request,
Thank you for anticipating.
Truly yours,
Shayne Chizlette De Guia Therese Mae Casiple
Researcher Researcher
Noted by:
x
Asian College of Aeronautics
SENIOR HIGH SCHOOL
Jaro, Iloilo City, Philippines
Appendix D
3. What position PIR motion detector works well? Top view? Or Side
View
xi
Asian College of Aeronautics
SENIOR HIGH SCHOOL
Jaro, Iloilo City, Philippines
xii